· 6 years ago · Oct 31, 2019, 08:16 PM
1######################################################################################################################################
2======================================================================================================================================
3Hostname www.suleymansoylu.com ISP Cizgi Telekomunikasyon Anonim Sirketi
4Continent Asia Flag
5TR
6Country Turkey Country Code TR
7Region Unknown Local time 31 Oct 2019 22:00 +03
8City Unknown Postal Code Unknown
9IP Address 37.148.210.195 Latitude 41.021
10 Longitude 28.995
11
12======================================================================================================================================
13######################################################################################################################################
14> www.suleymansoylu.com
15Server: 185.93.180.131
16Address: 185.93.180.131#53
17
18Non-authoritative answer:
19Name: www.suleymansoylu.com
20Address: 37.148.210.195
21>
22#######################################################################################################################################
23 Domain Name: SULEYMANSOYLU.COM
24 Registry Domain ID: 1512738857_DOMAIN_COM-VRSN
25 Registrar WHOIS Server: whois.namecheap.com
26 Registrar URL: http://www.namecheap.com
27 Updated Date: 2019-05-27T12:02:40Z
28 Creation Date: 2008-08-08T12:25:47Z
29 Registry Expiry Date: 2024-08-08T12:25:47Z
30 Registrar: NameCheap, Inc.
31 Registrar IANA ID: 1068
32 Registrar Abuse Contact Email: abuse@namecheap.com
33 Registrar Abuse Contact Phone: +1.6613102107
34 Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
35 Name Server: NS1.SULEYMANSOYLU.COM
36 Name Server: NS2.SULEYMANSOYLU.COM
37 DNSSEC: unsigned
38#######################################################################################################################################
39Domain name: suleymansoylu.com
40Registry Domain ID: 1512738857_DOMAIN_COM-VRSN
41Registrar WHOIS Server: whois.namecheap.com
42Registrar URL: http://www.namecheap.com
43Updated Date: 2019-05-27T12:02:40.26Z
44Creation Date: 2008-08-08T12:25:47.00Z
45Registrar Registration Expiration Date: 2024-08-08T12:25:47.00Z
46Registrar: NAMECHEAP INC
47Registrar IANA ID: 1068
48Registrar Abuse Contact Email: abuse@namecheap.com
49Registrar Abuse Contact Phone: +1.6613102107
50Reseller: NAMECHEAP INC
51Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
52Registry Registrant ID:
53Registrant Name: WhoisGuard Protected
54Registrant Organization: WhoisGuard, Inc.
55Registrant Street: P.O. Box 0823-03411
56Registrant City: Panama
57Registrant State/Province: Panama
58Registrant Postal Code:
59Registrant Country: PA
60Registrant Phone: +507.8365503
61Registrant Phone Ext:
62Registrant Fax: +51.17057182
63Registrant Fax Ext:
64Registrant Email: 76caf3cdfe224c7bb127fa0147802d3f.protect@whoisguard.com
65Registry Admin ID:
66Admin Name: WhoisGuard Protected
67Admin Organization: WhoisGuard, Inc.
68Admin Street: P.O. Box 0823-03411
69Admin City: Panama
70Admin State/Province: Panama
71Admin Postal Code:
72Admin Country: PA
73Admin Phone: +507.8365503
74Admin Phone Ext:
75Admin Fax: +51.17057182
76Admin Fax Ext:
77Admin Email: 76caf3cdfe224c7bb127fa0147802d3f.protect@whoisguard.com
78Registry Tech ID:
79Tech Name: WhoisGuard Protected
80Tech Organization: WhoisGuard, Inc.
81Tech Street: P.O. Box 0823-03411
82Tech City: Panama
83Tech State/Province: Panama
84Tech Postal Code:
85Tech Country: PA
86Tech Phone: +507.8365503
87Tech Phone Ext:
88Tech Fax: +51.17057182
89Tech Fax Ext:
90Tech Email: 76caf3cdfe224c7bb127fa0147802d3f.protect@whoisguard.com
91Name Server: ns1.suleymansoylu.com
92Name Server: ns2.suleymansoylu.com
93DNSSEC: unsigned
94#######################################################################################################################################
95[+] Target : www.suleymansoylu.com
96
97[+] IP Address : 37.148.210.195
98
99[+] Headers :
100
101[+] Server : nginx
102[+] Date : Thu, 31 Oct 2019 19:11:11 GMT
103[+] Content-Type : text/html; charset=UTF-8
104[+] Transfer-Encoding : chunked
105[+] Connection : keep-alive
106[+] Keep-Alive : timeout=60
107[+] Vary : Accept-Encoding
108[+] X-Powered-By : PHP/5.6.40
109[+] X-Pingback : http://www.suleymansoylu.com/xmlrpc.php
110[+] Link : <http://www.suleymansoylu.com/wp-json/>; rel="https://api.w.org/", <http://www.suleymansoylu.com/>; rel=shortlink
111[+] Content-Encoding : gzip
112
113[+] SSL Certificate Information :
114
115[-] SSL is not Present on Target URL...Skipping...
116
117[+] Whois Lookup :
118
119[+] NIR : None
120[+] ASN Registry : ripencc
121[+] ASN : 34619
122[+] ASN CIDR : 37.148.210.0/24
123[+] ASN Country Code : TR
124[+] ASN Date : 2012-03-07
125[+] ASN Description : CIZGI, TR
126[+] cidr : 37.148.210.0/23
127[+] name : XCloud_IP_Subnets
128[+] handle : NCBG1-RIPE
129[+] range : 37.148.210.0 - 37.148.211.255
130[+] description : XCloud IP Subnets
131[+] country : TR
132[+] state : None
133[+] city : None
134[+] address : Gulbahar Mah. Elif Sok. No4 K3
135Sisli - Istanbul - Turkey
136[+] postal_code : None
137[+] emails : ['abuse@natro.com']
138[+] created : 2013-04-01T07:45:20Z
139[+] updated : 2017-03-02T12:07:54Z
140
141[+] Crawling Target...
142
143[+] Looking for robots.txt........[ Found ]
144[+] Extracting robots Links.......[ 0 ]
145[+] Looking for sitemap.xml.......[ Not Found ]
146[+] Extracting CSS Links..........[ 5 ]
147[+] Extracting Javascript Links...[ 6 ]
148[+] Extracting Internal Links.....[ 23 ]
149[+] Extracting External Links.....[ 2 ]
150[+] Extracting Images.............[ 14 ]
151
152[+] Total Links Extracted : 50
153
154[+] Dumping Links in /opt/FinalRecon/dumps/www.suleymansoylu.com.dump
155[+] Completed!
156######################################################################################################################################
157[+] Starting At 2019-10-31 15:20:03.911999
158[+] Collecting Information On: http://www.suleymansoylu.com/
159[#] Status: 200
160--------------------------------------------------
161[#] Web Server Detected: nginx
162[#] X-Powered-By: PHP/5.6.40
163[!] X-Frame-Options Headers not detect! target might be vulnerable Click Jacking
164- Server: nginx
165- Date: Thu, 31 Oct 2019 19:20:04 GMT
166- Content-Type: text/html; charset=UTF-8
167- Transfer-Encoding: chunked
168- Connection: keep-alive
169- Keep-Alive: timeout=60
170- Vary: Accept-Encoding
171- X-Powered-By: PHP/5.6.40
172- X-Pingback: http://www.suleymansoylu.com/xmlrpc.php
173- Link: <http://www.suleymansoylu.com/wp-json/>; rel="https://api.w.org/", <http://www.suleymansoylu.com/>; rel=shortlink
174- Content-Encoding: gzip
175--------------------------------------------------
176[#] Finding Location..!
177[#] status: success
178[#] country: Turkey
179[#] countryCode: TR
180[#] region: 34
181[#] regionName: Istanbul
182[#] city: Istanbul
183[#] zip: 34122
184[#] lat: 41.0053
185[#] lon: 28.977
186[#] timezone: Europe/Istanbul
187[#] isp: Cizgi Telekom Network
188[#] org:
189[#] as: AS34619 CIZGI TELEKOMUNIKASYON ANONIM SIRKETI
190[#] query: 37.148.210.195
191--------------------------------------------------
192[x] Didn't Detect WAF Presence on: http://www.suleymansoylu.com/
193--------------------------------------------------
194[#] Starting Reverse DNS
195[-] Failed ! Fail
196--------------------------------------------------
197[!] Scanning Open Port
198[#] 21/tcp open ftp
199[#] 22/tcp open ssh
200[#] 53/tcp open domain
201[#] 80/tcp open http
202[#] 110/tcp open pop3
203[#] 143/tcp open imap
204[#] 465/tcp open smtps
205[#] 587/tcp open submission
206[#] 993/tcp open imaps
207[#] 995/tcp open pop3s
208[#] 2525/tcp open ms-v-worlds
209[#] 3306/tcp open mysql
210[#] 8083/tcp open us-srv
211--------------------------------------------------
212[+] Collecting Information Disclosure!
213[#] Detecting sitemap.xml file
214[-] sitemap.xml file not Found!?
215[#] Detecting robots.txt file
216[!] robots.txt File Found: http://www.suleymansoylu.com//robots.txt
217[#] Detecting GNU Mailman
218[-] GNU Mailman App Not Detected!?
219--------------------------------------------------
220[+] Crawling Url Parameter On: http://www.suleymansoylu.com/
221--------------------------------------------------
222[#] Searching Html Form !
223[+] Html Form Discovered
224[#] action: http://www.suleymansoylu.com/wp-login.php
225[#] class: None
226[#] id: None
227[#] method: post
228--------------------------------------------------
229[!] Found 2 dom parameter
230[#] http://www.suleymansoylu.com/wp-json/oembed/1.0/embed?url=http%3A%2F%2Fwww.suleymansoylu.com%2F&format=xml
231[#] https://www.youtube.com/watch?v=SlQOIbUTnk8&feature=youtu.be
232--------------------------------------------------
233[!] 4 Internal Dynamic Parameter Discovered
234[+] http://www.suleymansoylu.com/xmlrpc.php?rsd
235[+] http://www.suleymansoylu.com/wp-json/oembed/1.0/embed?url=http%3A%2F%2Fwww.suleymansoylu.com%2F
236[+] http://www.suleymansoylu.com/wp-json/oembed/1.0/embed?url=http%3A%2F%2Fwww.suleymansoylu.com%2F&format=xml
237[+] http://www.suleymansoylu.com/wp-login.php?action=lostpassword
238--------------------------------------------------
239[!] 1 External Dynamic Parameter Discovered
240[#] https://www.youtube.com/watch?v=SlQOIbUTnk8&feature=youtu.be
241--------------------------------------------------
242[!] 36 Internal links Discovered
243[+] http://suleymansoylu.com/wp-content/themes/mw/images/fav.jpg
244[+] http://www.suleymansoylu.com/feed/
245[+] http://www.suleymansoylu.com/comments/feed/
246[+] http://www.suleymansoylu.com/home/feed/
247[+] http://www.suleymansoylu.com/wp-includes/wlwmanifest.xml
248[+] http://www.suleymansoylu.com/
249[+] http://www.suleymansoylu.com/wp-content/themes/mw/styles/grid960.css
250[+] http://www.suleymansoylu.com/wp-content/themes/mw/style.css
251[+] http://www.suleymansoylu.com//javascript:void()
252[+] http://www.suleymansoylu.com//javascript:void()
253[+] http://www.suleymansoylu.com
254[+] http://www.suleymansoylu.com/
255[+] http://www.suleymansoylu.com/hakkimda/
256[+] http://www.suleymansoylu.com/category/mesajlar/
257[+] http://www.suleymansoylu.com/category/konusmalarim/
258[+] http://www.suleymansoylu.com/category/roportajlar/
259[+] http://www.suleymansoylu.com/category/multimedya/
260[+] http://www.suleymansoylu.com/videolar/
261[+] http://www.suleymansoylu.com/iletisim/
262[+] http://www.suleymansoylu.com/ukrayna-guvenlik-konferansi-konusmasi/
263[+] http://www.suleymansoylu.com/anlasiliyor-ki-turkiyede-birileri-alevi-sunni-meselesini-kasimak-icin-planlama-icinde-olmuslar/
264[+] http://www.suleymansoylu.com/icisleri-bakani-soylu-dogumuzda-yangin-batimizda-duyarsizlik-var/
265[+] http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-bagdadi-ne-kadar-teroristse-ferhat-abdi-sahin-de-o-kadar-teroristtir/
266[+] http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-bagdadi-ne-kadar-teroristse-ferhat-abdi-sahin-de-o-kadar-teroristtir/
267[+] http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-bagdadi-ne-kadar-teroristse-ferhat-abdi-sahin-de-o-kadar-teroristtir/
268[+] http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-bir-afet-durumunda-herkes-ne-yapacagini-bilecek/
269[+] http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-bir-afet-durumunda-herkes-ne-yapacagini-bilecek/
270[+] http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-bir-afet-durumunda-herkes-ne-yapacagini-bilecek/
271[+] http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-teror-koridoruna-musamaha-gostermeyecegiz/
272[+] http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-teror-koridoruna-musamaha-gostermeyecegiz/
273[+] http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-teror-koridoruna-musamaha-gostermeyecegiz/
274[+] http://www.suleymansoylu.com/tb_video/icisleri-bakani-suleyman-soylu-tgrt-haber-gundem-ozel-programi-16-mayis-2019/
275[+] http://www.suleymansoylu.com/
276[+] http://www.suleymansoylu.com/hakkimda/
277[+] http://www.suleymansoylu.com/videolar/
278[+] http://www.suleymansoylu.com/iletisim/
279--------------------------------------------------
280[!] 1 External links Discovered
281[#] http://www.hunkarkocali.com/
282--------------------------------------------------
283[#] Mapping Subdomain..
284[!] Found 4 Subdomain
285- ns1.suleymansoylu.com
286- ns2.suleymansoylu.com
287- mail.suleymansoylu.com
288- www.suleymansoylu.com
289--------------------------------------------------
290[!] Done At 2019-10-31 15:20:26.709779
291######################################################################################################################################
292[*] TARGET: http://www.suleymansoylu.com/
293[*] TARGET IP: 37.148.210.195
294[INFO] NO load balancer detected for www.suleymansoylu.com...
295[*] DNS servers: ns1.suleymansoylu.com.
296[*] TARGET server: nginx
297[*] CC: TR
298[*] Country: Turkey
299[*] RegionCode: 34
300[*] RegionName: Istanbul
301[*] City: Istanbul
302[*] ASN: AS34619
303[*] BGP_PREFIX: 37.148.210.0/24
304[*] ISP: CIZGI CIZGI TELEKOMUNIKASYON ANONIM SIRKETI, TR
305[INFO] DNS enumeration:
306[*] ftp.suleymansoylu.com 37.148.210.195
307[*] mail.suleymansoylu.com 37.148.210.195
308[*] ns1.suleymansoylu.com 37.148.210.195
309[*] ns2.suleymansoylu.com 37.148.210.195
310[INFO] Possible abuse mails are:
311[*] abuse@natro.com
312[*] abuse@natrohost.com
313[*] abuse@suleymansoylu.com
314[*] abuse@ttnet.net.tr
315[*] abuse@www.suleymansoylu.com
316[*] postmaster@natro.com
317[INFO] NO PAC (Proxy Auto Configuration) file FOUND
318[ALERT] robots.txt file FOUND in http://www.suleymansoylu.com/robots.txt
319[INFO] Checking for HTTP status codes recursively from http://www.suleymansoylu.com/robots.txt
320[INFO] Status code Folders
321[INFO] Starting FUZZing in http://www.suleymansoylu.com/FUzZzZzZzZz...
322[INFO] Status code Folders
323[ALERT] Look in the source code. It may contain passwords
324[INFO] SAME content in http://www.suleymansoylu.com/ AND http://37.148.210.195/
325[INFO] Links found from http://www.suleymansoylu.com/:
326[*] https://www.youtube.com/watch?v=SlQOIbUTnk8&feature=youtu.be
327[*] http://www.hunkarkocali.com/
328[*] http://www.suleymansoylu.com/
329[*] http://www.suleymansoylu.com/anlasiliyor-ki-turkiyede-birileri-alevi-sunni-meselesini-kasimak-icin-planlama-icinde-olmuslar/
330[*] http://www.suleymansoylu.com/?attachment_id=10282
331[*] http://www.suleymansoylu.com/bu-nesil-butun-dunyaya-da-huzurun-barisin-kardesligin-samimiyetin-ihlasin-ne-demek-oldugunu-anlatacak/8638b2d6-5821-4c08-a6f0-032eb4898f95/
332[*] http://www.suleymansoylu.com/category/konusmalarim/
333[*] http://www.suleymansoylu.com/category/mesajlar/
334[*] http://www.suleymansoylu.com/category/multimedya/
335[*] http://www.suleymansoylu.com/category/roportajlar/
336[*] http://www.suleymansoylu.com/comments/feed/
337[*] http://www.suleymansoylu.com/feed/
338[*] http://www.suleymansoylu.com/hakkimda/
339[*] http://www.suleymansoylu.com/home/feed/
340[*] http://www.suleymansoylu.com/icisleri-bakani-soylu-dogumuzda-yangin-batimizda-duyarsizlik-var/
341[*] http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-325-pkk-ve-hdp-iltisakliyi-meclis-uyesi-adayi-yaptilar/b535c7ce-6016-423b-86e9-b11258d0e35c/
342[*] http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-bagdadi-ne-kadar-teroristse-ferhat-abdi-sahin-de-o-kadar-teroristtir/
343[*] http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-bir-afet-durumunda-herkes-ne-yapacagini-bilecek/
344[*] http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-teror-koridoruna-musamaha-gostermeyecegiz/
345[*] http://www.suleymansoylu.com/iletisim/
346[*] http://www.suleymansoylu.com/on-yillardir-bu-ulkeye-saldiriyorlar/b5fdb1f7-19ea-42e2-a780-22ec70e4a5b2/
347[*] http://www.suleymansoylu.com/tb_video/icisleri-bakani-suleyman-soylu-tgrt-haber-gundem-ozel-programi-16-mayis-2019/
348[*] http://www.suleymansoylu.com/tb_video/icisleri-bakani-suleyman-soylu-trt-haber-ekranlarinda-basin-karti-programina-konuk-oldu-25-03-2019/trthaber-2/
349[*] http://www.suleymansoylu.com/ukrayna-guvenlik-konferansi-konusmasi/
350[*] http://www.suleymansoylu.com/videolar/
351[*] http://www.suleymansoylu.com/whatsapp-image-2019-05-14-at-21-07-57/
352[*] http://www.suleymansoylu.com/wp-json/oembed/1.0/embed?url=http://www.suleymansoylu.com/
353[*] http://www.suleymansoylu.com/wp-json/oembed/1.0/embed?url=http://www.suleymansoylu.com/&format=xml
354[*] http://www.suleymansoylu.com/wp-login.php?action=lostpassword
355[INFO] GOOGLE has 13,100,000 results (0.18 seconds) about http://www.suleymansoylu.com/
356[INFO] Shodan detected the following opened ports on 37.148.210.195:
357[*] 1
358[*] 110
359[*] 143
360[*] 21
361[*] 22
362[*] 25
363[*] 3306
364[*] 4
365[*] 53
366[*] 587
367[*] 80
368[*] 8083
369[*] 993
370[*] 995
371[INFO] ------VirusTotal SECTION------
372[INFO] VirusTotal passive DNS only stores address records. The following domains resolved to the given IP address:
373[INFO] Latest URLs hosted in this IP address detected by at least one URL scanner or malicious URL dataset:
374[INFO] Latest files that are not detected by any antivirus solution and were downloaded by VirusTotal from the IP address provided:
375[INFO] ------Alexa Rank SECTION------
376[INFO] Percent of Visitors Rank in Country:
377[INFO] Percent of Search Traffic:
378[INFO] Percent of Unique Visits:
379[INFO] Total Sites Linking In:
380[*] Total Sites
381[INFO] Useful links related to www.suleymansoylu.com - 37.148.210.195:
382[*] https://www.virustotal.com/pt/ip-address/37.148.210.195/information/
383[*] https://www.hybrid-analysis.com/search?host=37.148.210.195
384[*] https://www.shodan.io/host/37.148.210.195
385[*] https://www.senderbase.org/lookup/?search_string=37.148.210.195
386[*] https://www.alienvault.com/open-threat-exchange/ip/37.148.210.195
387[*] http://pastebin.com/search?q=37.148.210.195
388[*] http://urlquery.net/search.php?q=37.148.210.195
389[*] http://www.alexa.com/siteinfo/www.suleymansoylu.com
390[*] http://www.google.com/safebrowsing/diagnostic?site=www.suleymansoylu.com
391[*] https://censys.io/ipv4/37.148.210.195
392[*] https://www.abuseipdb.com/check/37.148.210.195
393[*] https://urlscan.io/search/#37.148.210.195
394[*] https://github.com/search?q=37.148.210.195&type=Code
395[INFO] Useful links related to AS34619 - 37.148.210.0/24:
396[*] http://www.google.com/safebrowsing/diagnostic?site=AS:34619
397[*] https://www.senderbase.org/lookup/?search_string=37.148.210.0/24
398[*] http://bgp.he.net/AS34619
399[*] https://stat.ripe.net/AS34619
400[INFO] Date: 31/10/19 | Time: 15:21:59
401[INFO] Total time: 0 minute(s) and 55 second(s)
402######################################################################################################################################
403[i] Scanning Site: http://www.suleymansoylu.com
404
405
406
407B A S I C I N F O
408====================
409
410
411[+] Site Title: Süleyman Soylu – İçişleri Bakanı
412[+] IP address: 37.148.210.195
413[+] Web Server: nginx
414[+] CMS: WordPress
415[+] Cloudflare: Not Detected
416[+] Robots File: Found
417
418-------------[ contents ]----------------
419# vestacp autogenerated robots.txt
420User-agent: *
421Crawl-delay: 10
422
423-----------[end of contents]-------------
424
425
426
427W H O I S L O O K U P
428========================
429
430 Domain Name: SULEYMANSOYLU.COM
431 Registry Domain ID: 1512738857_DOMAIN_COM-VRSN
432 Registrar WHOIS Server: whois.namecheap.com
433 Registrar URL: http://www.namecheap.com
434 Updated Date: 2019-05-27T12:02:40Z
435 Creation Date: 2008-08-08T12:25:47Z
436 Registry Expiry Date: 2024-08-08T12:25:47Z
437 Registrar: NameCheap, Inc.
438 Registrar IANA ID: 1068
439 Registrar Abuse Contact Email: abuse@namecheap.com
440 Registrar Abuse Contact Phone: +1.6613102107
441 Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
442 Name Server: NS1.SULEYMANSOYLU.COM
443 Name Server: NS2.SULEYMANSOYLU.COM
444 DNSSEC: unsigned
445 URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
446>>> Last update of whois database: 2019-10-31T19:12:59Z <<<
447
448For more information on Whois status codes, please visit https://icann.org/epp
449
450
451
452The Registry database contains ONLY .COM, .NET, .EDU domains and
453Registrars.
454
455
456
457
458G E O I P L O O K U P
459=========================
460
461[i] IP Address: 37.148.210.195
462[i] Country: Turkey
463[i] State:
464[i] City:
465[i] Latitude: 41.0214
466[i] Longitude: 28.9948
467
468
469
470
471H T T P H E A D E R S
472=======================
473
474
475[i] HTTP/1.1 200 OK
476[i] Server: nginx
477[i] Date: Thu, 31 Oct 2019 19:13:10 GMT
478[i] Content-Type: text/html; charset=UTF-8
479[i] Connection: close
480[i] Vary: Accept-Encoding
481[i] X-Powered-By: PHP/5.6.40
482[i] X-Pingback: http://www.suleymansoylu.com/xmlrpc.php
483[i] Link: <http://www.suleymansoylu.com/wp-json/>; rel="https://api.w.org/"
484[i] Link: <http://www.suleymansoylu.com/>; rel=shortlink
485
486
487
488
489D N S L O O K U P
490===================
491
492suleymansoylu.com. 14399 IN MX 10 mail.suleymansoylu.com.
493suleymansoylu.com. 14399 IN TXT "v=spf1 a mx ip4:37.148.210.195 ~all"
494suleymansoylu.com. 14399 IN SOA ns1.suleymansoylu.com. root.suleymansoylu.com. 2019052404 7200 3600 1209600 180
495suleymansoylu.com. 14399 IN NS ns2.suleymansoylu.com.
496suleymansoylu.com. 14399 IN NS ns1.suleymansoylu.com.
497suleymansoylu.com. 14399 IN A 37.148.210.195
498
499
500
501
502S U B N E T C A L C U L A T I O N
503====================================
504
505Address = 37.148.210.195
506Network = 37.148.210.195 / 32
507Netmask = 255.255.255.255
508Broadcast = not needed on Point-to-Point links
509Wildcard Mask = 0.0.0.0
510Hosts Bits = 0
511Max. Hosts = 1 (2^0 - 0)
512Host Range = { 37.148.210.195 - 37.148.210.195 }
513
514
515
516N M A P P O R T S C A N
517============================
518
519Starting Nmap 7.70 ( https://nmap.org ) at 2019-10-31 19:13 UTC
520Nmap scan report for suleymansoylu.com (37.148.210.195)
521Host is up (0.14s latency).
522rDNS record for 37.148.210.195: ns1.technowork.com.tr
523
524PORT STATE SERVICE
52521/tcp open ftp
52622/tcp open ssh
52723/tcp filtered telnet
52880/tcp open http
529110/tcp open pop3
530143/tcp open imap
531443/tcp filtered https
5323389/tcp filtered ms-wbt-server
533
534Nmap done: 1 IP address (1 host up) scanned in 2.30 seconds
535
536
537
538S U B - D O M A I N F I N D E R
539==================================
540
541
542[i] Total Subdomains Found : 3
543
544[+] Subdomain: ns2.suleymansoylu.com
545[-] IP: 37.148.210.195
546
547[+] Subdomain: mail.suleymansoylu.com
548[-] IP: 37.148.210.195
549
550[+] Subdomain: www.suleymansoylu.com
551[-] IP: 37.148.210.195
552######################################################################################################################################
553Trying "suleymansoylu.com"
554;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 21308
555;; flags: qr rd ra; QUERY: 1, ANSWER: 6, AUTHORITY: 2, ADDITIONAL: 2
556
557;; QUESTION SECTION:
558;suleymansoylu.com. IN ANY
559
560;; ANSWER SECTION:
561suleymansoylu.com. 14400 IN A 37.148.210.195
562suleymansoylu.com. 14400 IN SOA ns1.suleymansoylu.com. root.suleymansoylu.com. 2019052404 7200 3600 1209600 180
563suleymansoylu.com. 14400 IN TXT "v=spf1 a mx ip4:37.148.210.195 ~all"
564suleymansoylu.com. 14400 IN MX 10 mail.suleymansoylu.com.
565suleymansoylu.com. 14400 IN NS ns1.suleymansoylu.com.
566suleymansoylu.com. 14400 IN NS ns2.suleymansoylu.com.
567
568;; AUTHORITY SECTION:
569suleymansoylu.com. 14400 IN NS ns2.suleymansoylu.com.
570suleymansoylu.com. 14400 IN NS ns1.suleymansoylu.com.
571
572;; ADDITIONAL SECTION:
573ns2.suleymansoylu.com. 43200 IN A 37.148.210.195
574ns1.suleymansoylu.com. 43200 IN A 37.148.210.195
575
576Received 257 bytes from 2001:18c0:121:6900:724f:b8ff:fefd:5b6a#53 in 212 ms
577#######################################################################################################################################
578; <<>> DiG 9.11.5-P4-5.1+b1-Debian <<>> +trace suleymansoylu.com
579;; global options: +cmd
580. 84692 IN NS g.root-servers.net.
581. 84692 IN NS i.root-servers.net.
582. 84692 IN NS f.root-servers.net.
583. 84692 IN NS c.root-servers.net.
584. 84692 IN NS m.root-servers.net.
585. 84692 IN NS h.root-servers.net.
586. 84692 IN NS j.root-servers.net.
587. 84692 IN NS l.root-servers.net.
588. 84692 IN NS b.root-servers.net.
589. 84692 IN NS k.root-servers.net.
590. 84692 IN NS e.root-servers.net.
591. 84692 IN NS d.root-servers.net.
592. 84692 IN NS a.root-servers.net.
593. 84692 IN RRSIG NS 8 0 518400 20191113170000 20191031160000 22545 . IfUBOQoUHIRbNm2b3KTGaL5upJQoLwHH4igQyu7kit7b5XsTjuyflhN3 IeAHmFhARZgXRUNOU66o9G0BBCLxAt2YUDPkR67Ezp46h2Oj8LnDX4dx kf9hfydIC0+TeSGKknGXHtcMDCqqq6i4a9EHGsdJzEqczbrv4seI+mPc ima8SZzXdVYHWIIGWkCDyY3nw6lrTlc/jHX9mbBJm92bF+szVMwvblSM 52Yg5kJmrjB9oL6MEqjDMkJG97EhvC036EgM0oxdgDQNorKGDt/K99UU 6m3wqa1A0J1RpCZYFOhZSGiUbrwBEL3bQgfH0t9icmijpRVVKQbwGGhZ LDU8oQ==
594;; Received 525 bytes from 38.132.106.139#53(38.132.106.139) in 31 ms
595
596com. 172800 IN NS a.gtld-servers.net.
597com. 172800 IN NS b.gtld-servers.net.
598com. 172800 IN NS c.gtld-servers.net.
599com. 172800 IN NS d.gtld-servers.net.
600com. 172800 IN NS e.gtld-servers.net.
601com. 172800 IN NS f.gtld-servers.net.
602com. 172800 IN NS g.gtld-servers.net.
603com. 172800 IN NS h.gtld-servers.net.
604com. 172800 IN NS i.gtld-servers.net.
605com. 172800 IN NS j.gtld-servers.net.
606com. 172800 IN NS k.gtld-servers.net.
607com. 172800 IN NS l.gtld-servers.net.
608com. 172800 IN NS m.gtld-servers.net.
609com. 86400 IN DS 30909 8 2 E2D3C916F6DEEAC73294E8268FB5885044A833FC5459588F4A9184CF C41A5766
610com. 86400 IN RRSIG DS 8 1 86400 20191113170000 20191031160000 22545 . UEC85qqrUaAML/8TSKs6971lvQAI0jCFAEamLCV2e5N/wnnY2xsUF3TE WBfBB7VByxpRzzB87NuWNGh9jf6wlx7pQQ/FidKxV+lk3LGDb6aqfM9A CRKlSm6xQb9k4Y21A2aOlDsHXdfJaKsUvw7AHS6WqBDBsh6AKuDCL5zm /E03UP2A8cDhVr1yNnvcY48il3JLAYsSMRviID/Q6lND446za6H3w2Li qaMoXg4s/pVj0uV8Sc9G4csWesgXXthQSy3nBe77DYca7vt89uN2eYFl TwTnCVYTkkNC67L0B95NRqRhMISAMgdoFCcfwAgPpWeWLEcd72EuJ/IW BWBSgA==
611;; Received 1177 bytes from 193.0.14.129#53(k.root-servers.net) in 104 ms
612
613suleymansoylu.com. 172800 IN NS ns1.suleymansoylu.com.
614suleymansoylu.com. 172800 IN NS ns2.suleymansoylu.com.
615CK0POJMG874LJREF7EFN8430QVIT8BSM.com. 86400 IN NSEC3 1 1 0 - CK0Q1GIN43N1ARRC9OSM6QPQR81H5M9A NS SOA RRSIG DNSKEY NSEC3PARAM
616CK0POJMG874LJREF7EFN8430QVIT8BSM.com. 86400 IN RRSIG NSEC3 8 2 86400 20191107054855 20191031033855 12163 com. cQ5/tMKyC7ucV22HS+QMAPEO3rdLxNCjeNwx/LdXh8tuE1KycSjtxHhG ZD3ee/5g8NQBM+mc8/4eKhjf9NHdj8Zm49SCZiBT534mfPYxihwpdeQ/ UySSyiUzvPZft90gDWgVBKDcMdw85gewP+6K7p7ER4uzgFj4EM1gkHYV DkY57Xzf0i97ltHlshv06YTvsexwbOCYT96bm5G1V+BLJw==
617NAAHN8SI0C65P7I8O92DTIBQCFMEC43O.com. 86400 IN NSEC3 1 1 0 - NAALF8UU9PKB0SRLGBQUVO7ARRNLEO5C NS DS RRSIG
618NAAHN8SI0C65P7I8O92DTIBQCFMEC43O.com. 86400 IN RRSIG NSEC3 8 2 86400 20191104062558 20191028041558 12163 com. QPBCZ+qtHE23gqOhKOXsYE6vQeidHgxuea+1L0i6oDmeZu2LPe9AQX3k 9QDHei+drSD4lCXOP7dBRktp5pGbD+pKfT0zl6Pvsgxs0BLOoUveiK4B /OEtt5X5YdzIAFnDez+xBeDvDC7M7HKQZ8YLkfYoqrGctklAC1kA7i2P eqTl2lh6O0rEKj4yyvV1Vumzsq7yPkwi14W3F5HDXX67lg==
619;; Received 663 bytes from 2001:503:eea3::30#53(g.gtld-servers.net) in 45 ms
620
621suleymansoylu.com. 14400 IN A 37.148.210.195
622suleymansoylu.com. 14400 IN NS ns2.suleymansoylu.com.
623suleymansoylu.com. 14400 IN NS ns1.suleymansoylu.com.
624;; Received 130 bytes from 37.148.210.195#53(ns2.suleymansoylu.com) in 172 ms
625######################################################################################################################################
626[*] Performing General Enumeration of Domain: suleymansoylu.com
627[-] DNSSEC is not configured for suleymansoylu.com
628[*] SOA ns1.suleymansoylu.com 37.148.210.195
629[*] NS ns1.suleymansoylu.com 37.148.210.195
630[*] Bind Version for 37.148.210.195 get lost
631[*] NS ns2.suleymansoylu.com 37.148.210.195
632[*] Bind Version for 37.148.210.195 get lost
633[*] MX mail.suleymansoylu.com 37.148.210.195
634[*] A suleymansoylu.com 37.148.210.195
635[*] TXT suleymansoylu.com v=spf1 a mx ip4:37.148.210.195 ~all
636[*] TXT _domainkey.suleymansoylu.com t=y; o=~;
637[*] Enumerating SRV Records
638[-] No SRV Records Found for suleymansoylu.com
639[+] 0 Records Found
640######################################################################################################################################
641[*] Processing domain suleymansoylu.com
642[*] Using system resolvers ['38.132.106.139', '194.187.251.67', '185.93.180.131', '192.168.0.1', '2001:18c0:121:6900:724f:b8ff:fefd:5b6a']
643[+] Getting nameservers
64437.148.210.195 - ns1.suleymansoylu.com
64537.148.210.195 - ns2.suleymansoylu.com
646[-] Zone transfer failed
647
648[+] TXT records found
649"v=spf1 a mx ip4:37.148.210.195 ~all"
650
651[+] MX records found, added to target list
65210 mail.suleymansoylu.com.
653
654[*] Scanning suleymansoylu.com for A records
65537.148.210.195 - suleymansoylu.com
65637.148.210.195 - ftp.suleymansoylu.com
65737.148.210.195 - imap.suleymansoylu.com
65837.148.210.195 - mail.suleymansoylu.com
65937.148.210.195 - ns1.suleymansoylu.com
66037.148.210.195 - ns2.suleymansoylu.com
66137.148.210.195 - pop.suleymansoylu.com
66237.148.210.195 - smtp.suleymansoylu.com
66337.148.210.195 - www.suleymansoylu.com
664######################################################################################################################################
665Domains still to check: 1
666 Checking if the hostname suleymansoylu.com. given is in fact a domain...
667
668Analyzing domain: suleymansoylu.com.
669 Checking NameServers using system default resolver...
670 IP: 37.148.210.195 (Turkey)
671 HostName: ns1.suleymansoylu.com Type: NS
672 HostName: ns1.technowork.com.tr Type: PTR
673 IP: 37.148.210.195 (Turkey)
674 HostName: ns1.suleymansoylu.com Type: NS
675 HostName: ns1.technowork.com.tr Type: PTR
676 HostName: ns2.suleymansoylu.com Type: NS
677
678 Checking MailServers using system default resolver...
679 IP: 37.148.210.195 (Turkey)
680 HostName: ns1.suleymansoylu.com Type: NS
681 HostName: ns1.technowork.com.tr Type: PTR
682 HostName: ns2.suleymansoylu.com Type: NS
683 HostName: mail.suleymansoylu.com Type: MX
684
685 Checking the zone transfer for each NS... (if this takes more than 10 seconds, just hit CTRL-C and it will continue. Bug in the libs)
686 No zone transfer found on nameserver 37.148.210.195
687 No zone transfer found on nameserver 37.148.210.195
688
689 Checking SPF record...
690
691 Checking 192 most common hostnames using system default resolver...
692 IP: 37.148.210.195 (Turkey)
693 HostName: ns1.suleymansoylu.com Type: NS
694 HostName: ns1.technowork.com.tr Type: PTR
695 HostName: ns2.suleymansoylu.com Type: NS
696 HostName: mail.suleymansoylu.com Type: MX
697 Type: SPF
698 HostName: www.suleymansoylu.com. Type: A
699 IP: 37.148.210.195 (Turkey)
700 HostName: ns1.suleymansoylu.com Type: NS
701 HostName: ns1.technowork.com.tr Type: PTR
702 HostName: ns2.suleymansoylu.com Type: NS
703 HostName: mail.suleymansoylu.com Type: MX
704 Type: SPF
705 HostName: www.suleymansoylu.com. Type: A
706 HostName: ftp.suleymansoylu.com. Type: A
707 IP: 37.148.210.195 (Turkey)
708 HostName: ns1.suleymansoylu.com Type: NS
709 HostName: ns1.technowork.com.tr Type: PTR
710 HostName: ns2.suleymansoylu.com Type: NS
711 HostName: mail.suleymansoylu.com Type: MX
712 Type: SPF
713 HostName: www.suleymansoylu.com. Type: A
714 HostName: ftp.suleymansoylu.com. Type: A
715 HostName: mail.suleymansoylu.com. Type: A
716 IP: 37.148.210.195 (Turkey)
717 HostName: ns1.suleymansoylu.com Type: NS
718 HostName: ns1.technowork.com.tr Type: PTR
719 HostName: ns2.suleymansoylu.com Type: NS
720 HostName: mail.suleymansoylu.com Type: MX
721 Type: SPF
722 HostName: www.suleymansoylu.com. Type: A
723 HostName: ftp.suleymansoylu.com. Type: A
724 HostName: mail.suleymansoylu.com. Type: A
725 HostName: ns1.suleymansoylu.com. Type: A
726 IP: 37.148.210.195 (Turkey)
727 HostName: ns1.suleymansoylu.com Type: NS
728 HostName: ns1.technowork.com.tr Type: PTR
729 HostName: ns2.suleymansoylu.com Type: NS
730 HostName: mail.suleymansoylu.com Type: MX
731 Type: SPF
732 HostName: www.suleymansoylu.com. Type: A
733 HostName: ftp.suleymansoylu.com. Type: A
734 HostName: mail.suleymansoylu.com. Type: A
735 HostName: ns1.suleymansoylu.com. Type: A
736 HostName: ns2.suleymansoylu.com. Type: A
737 IP: 37.148.210.195 (Turkey)
738 HostName: ns1.suleymansoylu.com Type: NS
739 HostName: ns1.technowork.com.tr Type: PTR
740 HostName: ns2.suleymansoylu.com Type: NS
741 HostName: mail.suleymansoylu.com Type: MX
742 Type: SPF
743 HostName: www.suleymansoylu.com. Type: A
744 HostName: ftp.suleymansoylu.com. Type: A
745 HostName: mail.suleymansoylu.com. Type: A
746 HostName: ns1.suleymansoylu.com. Type: A
747 HostName: ns2.suleymansoylu.com. Type: A
748 HostName: smtp.suleymansoylu.com. Type: A
749 IP: 37.148.210.195 (Turkey)
750 HostName: ns1.suleymansoylu.com Type: NS
751 HostName: ns1.technowork.com.tr Type: PTR
752 HostName: ns2.suleymansoylu.com Type: NS
753 HostName: mail.suleymansoylu.com Type: MX
754 Type: SPF
755 HostName: www.suleymansoylu.com. Type: A
756 HostName: ftp.suleymansoylu.com. Type: A
757 HostName: mail.suleymansoylu.com. Type: A
758 HostName: ns1.suleymansoylu.com. Type: A
759 HostName: ns2.suleymansoylu.com. Type: A
760 HostName: smtp.suleymansoylu.com. Type: A
761 HostName: pop.suleymansoylu.com. Type: A
762 IP: 37.148.210.195 (Turkey)
763 HostName: ns1.suleymansoylu.com Type: NS
764 HostName: ns1.technowork.com.tr Type: PTR
765 HostName: ns2.suleymansoylu.com Type: NS
766 HostName: mail.suleymansoylu.com Type: MX
767 Type: SPF
768 HostName: www.suleymansoylu.com. Type: A
769 HostName: ftp.suleymansoylu.com. Type: A
770 HostName: mail.suleymansoylu.com. Type: A
771 HostName: ns1.suleymansoylu.com. Type: A
772 HostName: ns2.suleymansoylu.com. Type: A
773 HostName: smtp.suleymansoylu.com. Type: A
774 HostName: pop.suleymansoylu.com. Type: A
775 HostName: imap.suleymansoylu.com. Type: A
776
777 Checking with nmap the reverse DNS hostnames of every <ip>/24 netblock using system default resolver...
778 Checking netblock 37.148.210.0
779
780 Searching for suleymansoylu.com. emails in Google
781
782 Checking 1 active hosts using nmap... (nmap -sn -n -v -PP -PM -PS80,25 -PA -PY -PU53,40125 -PE --reason <ip> -oA <output_directory>/nmap/<ip>.sn)
783 Host 37.148.210.195 is up (reset ttl 64)
784
785 Checking ports on every active host using nmap... (nmap -O --reason --webxml --traceroute -sS -sV -sC -Pn -n -v -F <ip> -oA <output_directory>/nmap/<ip>)
786 Scanning ip 37.148.210.195 (imap.suleymansoylu.com.):
787 21/tcp open ftp syn-ack ttl 46 vsftpd 3.0.2
788 53/tcp open domain syn-ack ttl 46 (unknown banner: get lost)
789 | dns-nsid:
790 |_ bind.version: get lost
791 | fingerprint-strings:
792 | DNSVersionBindReqTCP:
793 | version
794 | bind
795 |_ lost
796 80/tcp open http syn-ack ttl 46 nginx
797 |_http-favicon: Unknown favicon MD5: D41D8CD98F00B204E9800998ECF8427E
798 | http-methods:
799 |_ Supported Methods: GET HEAD POST OPTIONS
800 |_http-title: Did not follow redirect to http://www.suleymansoylu.com/
801 110/tcp open pop3 syn-ack ttl 46 Dovecot pop3d
802 |_pop3-capabilities: PIPELINING USER AUTH-RESP-CODE TOP STLS RESP-CODES SASL(PLAIN LOGIN) UIDL CAPA
803 |_ssl-date: TLS randomness does not represent time
804 143/tcp open imap syn-ack ttl 46 Dovecot imapd
805 |_imap-capabilities: OK LOGIN-REFERRALS listed IMAP4rev1 IDLE SASL-IR post-login ID more have AUTH=LOGINA0001 AUTH=PLAIN STARTTLS LITERAL+ Pre-login capabilities ENABLE
806 |_ssl-date: TLS randomness does not represent time
807 465/tcp open ssl/smtp syn-ack ttl 46 Exim smtpd 4.91
808 |_smtp-commands: SMTP EHLO nmap.scanme.org: failed to receive data: failed to receive data
809 | ssl-cert: Subject: commonName=lcl.local.lcl/organizationName=Vesta Control Panel/stateOrProvinceName=California/countryName=US
810 | Issuer: commonName=lcl.local.lcl/organizationName=Vesta Control Panel/stateOrProvinceName=California/countryName=US
811 | Public Key type: rsa
812 | Public Key bits: 4096
813 | Signature Algorithm: sha256WithRSAEncryption
814 | Not valid before: 2019-05-23T13:48:26
815 | Not valid after: 2020-05-22T13:48:26
816 | MD5: f3e7 8e18 986c ae35 5854 05ca a0e7 6105
817 |_SHA-1: 66e3 fb80 829f 742a 2578 6b59 9090 bef0 6ae9 18b3
818 | vulners:
819 | cpe:/a:exim:exim:4.91:
820 | CVE-2019-15846 10.0 https://vulners.com/cve/CVE-2019-15846
821 | CVE-2019-13917 10.0 https://vulners.com/cve/CVE-2019-13917
822 |_ CVE-2019-10149 7.5 https://vulners.com/cve/CVE-2019-10149
823 587/tcp open smtp syn-ack ttl 46 Exim smtpd 4.91
824 | smtp-commands: lcl.local.lcl Hello nmap.scanme.org [176.113.74.91], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, CHUNKING, STARTTLS, HELP,
825 |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
826 | ssl-cert: Subject: commonName=lcl.local.lcl/organizationName=Vesta Control Panel/stateOrProvinceName=California/countryName=US
827 | Issuer: commonName=lcl.local.lcl/organizationName=Vesta Control Panel/stateOrProvinceName=California/countryName=US
828 | Public Key type: rsa
829 | Public Key bits: 4096
830 | Signature Algorithm: sha256WithRSAEncryption
831 | Not valid before: 2019-05-23T13:48:26
832 | Not valid after: 2020-05-22T13:48:26
833 | MD5: f3e7 8e18 986c ae35 5854 05ca a0e7 6105
834 |_SHA-1: 66e3 fb80 829f 742a 2578 6b59 9090 bef0 6ae9 18b3
835 |_ssl-date: TLS randomness does not represent time
836 | vulners:
837 | cpe:/a:exim:exim:4.91:
838 | CVE-2019-15846 10.0 https://vulners.com/cve/CVE-2019-15846
839 | CVE-2019-13917 10.0 https://vulners.com/cve/CVE-2019-13917
840 |_ CVE-2019-10149 7.5 https://vulners.com/cve/CVE-2019-10149
841 993/tcp open ssl/imaps? syn-ack ttl 46
842 |_ssl-date: TLS randomness does not represent time
843 995/tcp open ssl/pop3s? syn-ack ttl 46
844 |_ssl-date: TLS randomness does not represent time
845 3306/tcp open mysql syn-ack ttl 46 MySQL 5.5.60-MariaDB
846 | mysql-info:
847 | Protocol: 10
848 | Version: 5.5.60-MariaDB
849 | Thread ID: 1491
850 | Capabilities flags: 63487
851 | Some Capabilities: ODBCClient, DontAllowDatabaseTableColumn, InteractiveClient, Support41Auth, LongColumnFlag, SupportsTransactions, FoundRows, ConnectWithDatabase, Speaks41ProtocolOld, Speaks41ProtocolNew, LongPassword, IgnoreSigpipes, IgnoreSpaceBeforeParenthesis, SupportsLoadDataLocal, SupportsCompression, SupportsMultipleResults, SupportsAuthPlugins, SupportsMultipleStatments
852 | Status: Autocommit
853 | Salt: DfVY>iw;_MBDmy9N[_MA
854 |_ Auth Plugin Name: mysql_native_password
855 OS Info: Service Info: Host: lcl.local.lcl; OS: Unix
856 WebCrawling domain's web servers... up to 50 max links.
857
858 + URL to crawl: http://ns2.suleymansoylu.com.
859 + Date: 2019-10-31
860
861 + Crawling URL: http://ns2.suleymansoylu.com.:
862 + Links:
863 + Crawling http://ns2.suleymansoylu.com.
864 + Crawling http://ns2.suleymansoylu.com./ajax.googleapis.com (404 Not Found)
865 + Crawling http://ns2.suleymansoylu.com./s.w.org (404 Not Found)
866 + Searching for directories...
867 + Searching open folders...
868 + Crawl finished successfully.
869----------------------------------------------------------------------
870Summary of http://http://ns2.suleymansoylu.com.
871----------------------------------------------------------------------
872+ Links crawled:
873 - http://ns2.suleymansoylu.com.
874 - http://ns2.suleymansoylu.com./ajax.googleapis.com (404 Not Found)
875 - http://ns2.suleymansoylu.com./s.w.org (404 Not Found)
876 Total links crawled: 3
877
878+ Links to files found:
879 Total links to files: 0
880
881+ Externals links found:
882 - http://ajax.googleapis.com/ajax/libs/jquery/1.8.0/jquery.min.js?ver=1.8.0
883 - http://suleymansoylu.com/wp-content/themes/mw/images/fav.jpg
884 - http://www.hunkarkocali.com/
885 - http://www.suleymansoylu.com
886 - http://www.suleymansoylu.com/
887 - http://www.suleymansoylu.com/?attachment_id=10282
888 - http://www.suleymansoylu.com/anlasiliyor-ki-turkiyede-birileri-alevi-sunni-meselesini-kasimak-icin-planlama-icinde-olmuslar/
889 - http://www.suleymansoylu.com/bu-nesil-butun-dunyaya-da-huzurun-barisin-kardesligin-samimiyetin-ihlasin-ne-demek-oldugunu-anlatacak/8638b2d6-5821-4c08-a6f0-032eb4898f95/
890 - http://www.suleymansoylu.com/category/konusmalarim/
891 - http://www.suleymansoylu.com/category/mesajlar/
892 - http://www.suleymansoylu.com/category/multimedya/
893 - http://www.suleymansoylu.com/category/roportajlar/
894 - http://www.suleymansoylu.com/comments/feed/
895 - http://www.suleymansoylu.com/feed/
896 - http://www.suleymansoylu.com/hakkimda/
897 - http://www.suleymansoylu.com/home/feed/
898 - http://www.suleymansoylu.com/icisleri-bakani-soylu-dogumuzda-yangin-batimizda-duyarsizlik-var/
899 - http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-325-pkk-ve-hdp-iltisakliyi-meclis-uyesi-adayi-yaptilar/b535c7ce-6016-423b-86e9-b11258d0e35c/
900 - http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-bagdadi-ne-kadar-teroristse-ferhat-abdi-sahin-de-o-kadar-teroristtir/
901 - http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-bir-afet-durumunda-herkes-ne-yapacagini-bilecek/
902 - http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-teror-koridoruna-musamaha-gostermeyecegiz/
903 - http://www.suleymansoylu.com/iletisim/
904 - http://www.suleymansoylu.com/on-yillardir-bu-ulkeye-saldiriyorlar/b5fdb1f7-19ea-42e2-a780-22ec70e4a5b2/
905 - http://www.suleymansoylu.com/tb_video/icisleri-bakani-suleyman-soylu-tgrt-haber-gundem-ozel-programi-16-mayis-2019/
906 - http://www.suleymansoylu.com/tb_video/icisleri-bakani-suleyman-soylu-trt-haber-ekranlarinda-basin-karti-programina-konuk-oldu-25-03-2019/trthaber-2/
907 - http://www.suleymansoylu.com/ukrayna-guvenlik-konferansi-konusmasi/
908 - http://www.suleymansoylu.com/videolar/
909 - http://www.suleymansoylu.com/whatsapp-image-2019-05-14-at-21-07-57/
910 - http://www.suleymansoylu.com/wp-content/themes/mw/js/jquery.quicksand.js?ver=1.2.2
911 - http://www.suleymansoylu.com/wp-content/themes/mw/js/jquery.uniform.min.js?ver=1.1
912 - http://www.suleymansoylu.com/wp-content/themes/mw/js/tbUniform.js?ver=1.1
913 - http://www.suleymansoylu.com/wp-content/themes/mw/js/themeblossom.js?ver=1.0
914 - http://www.suleymansoylu.com/wp-content/themes/mw/style.css
915 - http://www.suleymansoylu.com/wp-content/themes/mw/styles/fonts/quattrocento.css
916 - http://www.suleymansoylu.com/wp-content/themes/mw/styles/fonts2/greatVibes.css
917 - http://www.suleymansoylu.com/wp-content/themes/mw/styles/grid960.css
918 - http://www.suleymansoylu.com/wp-content/uploads/2016/09/logo513.png
919 - http://www.suleymansoylu.com/wp-content/uploads/2017/02/WhatsApp-Image-2017-02-18-at-16.00.24.jpeg
920 - http://www.suleymansoylu.com/wp-content/uploads/2017/12/iller_idaresi.jpg
921 - http://www.suleymansoylu.com/wp-content/uploads/2018/02/8638B2D6-5821-4C08-A6F0-032EB4898F95-150x150.jpeg
922 - http://www.suleymansoylu.com/wp-content/uploads/2018/04/kiev2-1-150x150.jpg
923 - http://www.suleymansoylu.com/wp-content/uploads/2018/04/kiev2-1.jpg
924 - http://www.suleymansoylu.com/wp-content/uploads/2019/03/B535C7CE-6016-423B-86E9-B11258D0E35C-150x150.jpeg
925 - http://www.suleymansoylu.com/wp-content/uploads/2019/03/B5FDB1F7-19EA-42E2-A780-22EC70E4A5B2-150x150.jpeg
926 - http://www.suleymansoylu.com/wp-content/uploads/2019/03/trthaber-150x146.jpg
927 - http://www.suleymansoylu.com/wp-content/uploads/2019/05/E69B2049-889C-4C89-BEBC-B43BFA4BF226-365x197.jpeg
928 - http://www.suleymansoylu.com/wp-content/uploads/2019/05/WhatsApp-Image-2019-05-14-at-21.07.57-150x150.jpeg
929 - http://www.suleymansoylu.com/wp-content/uploads/2019/10/04723E94-6856-4082-9562-36ED9B685187-202x136.jpeg
930 - http://www.suleymansoylu.com/wp-content/uploads/2019/10/7DBA5B45-96EF-4B9C-850A-0D6F635EED0B-81x85.jpeg
931 - http://www.suleymansoylu.com/wp-content/uploads/2019/10/BD728213-3F77-4962-A081-F8578523A838-81x85.jpeg
932 - http://www.suleymansoylu.com/wp-includes/css/dist/block-library/style.min.css?ver=5.2.4
933 - http://www.suleymansoylu.com/wp-includes/js/wp-embed.min.js?ver=5.2.4
934 - http://www.suleymansoylu.com/wp-includes/wlwmanifest.xml
935 - http://www.suleymansoylu.com/wp-json/
936 - http://www.suleymansoylu.com/wp-json/oembed/1.0/embed?url=http%3A%2F%2Fwww.suleymansoylu.com%2F
937 - http://www.suleymansoylu.com/wp-json/oembed/1.0/embed?url=http%3A%2F%2Fwww.suleymansoylu.com%2F&
938 - http://www.suleymansoylu.com/wp-login.php?action=lostpassword
939 - http://www.suleymansoylu.com/xmlrpc.php?rsd
940 - https://www.youtube.com/watch?v=SlQOIbUTnk8&
941 Total external links: 59
942
943+ Email addresses found:
944 Total email address found: 0
945
946+ Directories found:
947 Total directories: 0
948
949+ Directory indexing found:
950 Total directories with indexing: 0
951
952----------------------------------------------------------------------
953
954
955 + URL to crawl: http://ftp.suleymansoylu.com.
956 + Date: 2019-10-31
957
958 + Crawling URL: http://ftp.suleymansoylu.com.:
959 + Links:
960 + Crawling http://ftp.suleymansoylu.com.
961 + Crawling http://ftp.suleymansoylu.com./ajax.googleapis.com (404 Not Found)
962 + Crawling http://ftp.suleymansoylu.com./s.w.org (404 Not Found)
963 + Searching for directories...
964 + Searching open folders...
965 + Crawl finished successfully.
966----------------------------------------------------------------------
967Summary of http://http://ftp.suleymansoylu.com.
968----------------------------------------------------------------------
969+ Links crawled:
970 - http://ftp.suleymansoylu.com.
971 - http://ftp.suleymansoylu.com./ajax.googleapis.com (404 Not Found)
972 - http://ftp.suleymansoylu.com./s.w.org (404 Not Found)
973 Total links crawled: 3
974
975+ Links to files found:
976 Total links to files: 0
977
978+ Externals links found:
979 - http://ajax.googleapis.com/ajax/libs/jquery/1.8.0/jquery.min.js?ver=1.8.0
980 - http://suleymansoylu.com/wp-content/themes/mw/images/fav.jpg
981 - http://www.hunkarkocali.com/
982 - http://www.suleymansoylu.com
983 - http://www.suleymansoylu.com/
984 - http://www.suleymansoylu.com/?attachment_id=10282
985 - http://www.suleymansoylu.com/anlasiliyor-ki-turkiyede-birileri-alevi-sunni-meselesini-kasimak-icin-planlama-icinde-olmuslar/
986 - http://www.suleymansoylu.com/bu-nesil-butun-dunyaya-da-huzurun-barisin-kardesligin-samimiyetin-ihlasin-ne-demek-oldugunu-anlatacak/8638b2d6-5821-4c08-a6f0-032eb4898f95/
987 - http://www.suleymansoylu.com/category/konusmalarim/
988 - http://www.suleymansoylu.com/category/mesajlar/
989 - http://www.suleymansoylu.com/category/multimedya/
990 - http://www.suleymansoylu.com/category/roportajlar/
991 - http://www.suleymansoylu.com/comments/feed/
992 - http://www.suleymansoylu.com/feed/
993 - http://www.suleymansoylu.com/hakkimda/
994 - http://www.suleymansoylu.com/home/feed/
995 - http://www.suleymansoylu.com/icisleri-bakani-soylu-dogumuzda-yangin-batimizda-duyarsizlik-var/
996 - http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-325-pkk-ve-hdp-iltisakliyi-meclis-uyesi-adayi-yaptilar/b535c7ce-6016-423b-86e9-b11258d0e35c/
997 - http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-bagdadi-ne-kadar-teroristse-ferhat-abdi-sahin-de-o-kadar-teroristtir/
998 - http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-bir-afet-durumunda-herkes-ne-yapacagini-bilecek/
999 - http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-teror-koridoruna-musamaha-gostermeyecegiz/
1000 - http://www.suleymansoylu.com/iletisim/
1001 - http://www.suleymansoylu.com/on-yillardir-bu-ulkeye-saldiriyorlar/b5fdb1f7-19ea-42e2-a780-22ec70e4a5b2/
1002 - http://www.suleymansoylu.com/tb_video/icisleri-bakani-suleyman-soylu-tgrt-haber-gundem-ozel-programi-16-mayis-2019/
1003 - http://www.suleymansoylu.com/tb_video/icisleri-bakani-suleyman-soylu-trt-haber-ekranlarinda-basin-karti-programina-konuk-oldu-25-03-2019/trthaber-2/
1004 - http://www.suleymansoylu.com/ukrayna-guvenlik-konferansi-konusmasi/
1005 - http://www.suleymansoylu.com/videolar/
1006 - http://www.suleymansoylu.com/whatsapp-image-2019-05-14-at-21-07-57/
1007 - http://www.suleymansoylu.com/wp-content/themes/mw/js/jquery.quicksand.js?ver=1.2.2
1008 - http://www.suleymansoylu.com/wp-content/themes/mw/js/jquery.uniform.min.js?ver=1.1
1009 - http://www.suleymansoylu.com/wp-content/themes/mw/js/tbUniform.js?ver=1.1
1010 - http://www.suleymansoylu.com/wp-content/themes/mw/js/themeblossom.js?ver=1.0
1011 - http://www.suleymansoylu.com/wp-content/themes/mw/style.css
1012 - http://www.suleymansoylu.com/wp-content/themes/mw/styles/fonts/quattrocento.css
1013 - http://www.suleymansoylu.com/wp-content/themes/mw/styles/fonts2/greatVibes.css
1014 - http://www.suleymansoylu.com/wp-content/themes/mw/styles/grid960.css
1015 - http://www.suleymansoylu.com/wp-content/uploads/2016/09/logo513.png
1016 - http://www.suleymansoylu.com/wp-content/uploads/2017/02/WhatsApp-Image-2017-02-18-at-16.00.24.jpeg
1017 - http://www.suleymansoylu.com/wp-content/uploads/2017/12/iller_idaresi.jpg
1018 - http://www.suleymansoylu.com/wp-content/uploads/2018/02/8638B2D6-5821-4C08-A6F0-032EB4898F95-150x150.jpeg
1019 - http://www.suleymansoylu.com/wp-content/uploads/2018/04/kiev2-1-150x150.jpg
1020 - http://www.suleymansoylu.com/wp-content/uploads/2018/04/kiev2-1.jpg
1021 - http://www.suleymansoylu.com/wp-content/uploads/2019/03/B535C7CE-6016-423B-86E9-B11258D0E35C-150x150.jpeg
1022 - http://www.suleymansoylu.com/wp-content/uploads/2019/03/B5FDB1F7-19EA-42E2-A780-22EC70E4A5B2-150x150.jpeg
1023 - http://www.suleymansoylu.com/wp-content/uploads/2019/03/trthaber-150x146.jpg
1024 - http://www.suleymansoylu.com/wp-content/uploads/2019/05/E69B2049-889C-4C89-BEBC-B43BFA4BF226-365x197.jpeg
1025 - http://www.suleymansoylu.com/wp-content/uploads/2019/05/WhatsApp-Image-2019-05-14-at-21.07.57-150x150.jpeg
1026 - http://www.suleymansoylu.com/wp-content/uploads/2019/10/04723E94-6856-4082-9562-36ED9B685187-202x136.jpeg
1027 - http://www.suleymansoylu.com/wp-content/uploads/2019/10/7DBA5B45-96EF-4B9C-850A-0D6F635EED0B-81x85.jpeg
1028 - http://www.suleymansoylu.com/wp-content/uploads/2019/10/BD728213-3F77-4962-A081-F8578523A838-81x85.jpeg
1029 - http://www.suleymansoylu.com/wp-includes/css/dist/block-library/style.min.css?ver=5.2.4
1030 - http://www.suleymansoylu.com/wp-includes/js/wp-embed.min.js?ver=5.2.4
1031 - http://www.suleymansoylu.com/wp-includes/wlwmanifest.xml
1032 - http://www.suleymansoylu.com/wp-json/
1033 - http://www.suleymansoylu.com/wp-json/oembed/1.0/embed?url=http%3A%2F%2Fwww.suleymansoylu.com%2F
1034 - http://www.suleymansoylu.com/wp-json/oembed/1.0/embed?url=http%3A%2F%2Fwww.suleymansoylu.com%2F&
1035 - http://www.suleymansoylu.com/wp-login.php?action=lostpassword
1036 - http://www.suleymansoylu.com/xmlrpc.php?rsd
1037 - https://www.youtube.com/watch?v=SlQOIbUTnk8&
1038 Total external links: 59
1039
1040+ Email addresses found:
1041 Total email address found: 0
1042
1043+ Directories found:
1044 Total directories: 0
1045
1046+ Directory indexing found:
1047 Total directories with indexing: 0
1048
1049----------------------------------------------------------------------
1050
1051
1052 + URL to crawl: http://ns1.suleymansoylu.com
1053 + Date: 2019-10-31
1054
1055 + Crawling URL: http://ns1.suleymansoylu.com:
1056 + Links:
1057 + Crawling http://ns1.suleymansoylu.com
1058 + Crawling http://ns1.suleymansoylu.com/ajax.googleapis.com (404 Not Found)
1059 + Crawling http://ns1.suleymansoylu.com/s.w.org (404 Not Found)
1060 + Searching for directories...
1061 + Searching open folders...
1062 + Crawl finished successfully.
1063----------------------------------------------------------------------
1064Summary of http://http://ns1.suleymansoylu.com
1065----------------------------------------------------------------------
1066+ Links crawled:
1067 - http://ns1.suleymansoylu.com
1068 - http://ns1.suleymansoylu.com/ajax.googleapis.com (404 Not Found)
1069 - http://ns1.suleymansoylu.com/s.w.org (404 Not Found)
1070 Total links crawled: 3
1071
1072+ Links to files found:
1073 Total links to files: 0
1074
1075+ Externals links found:
1076 - http://ajax.googleapis.com/ajax/libs/jquery/1.8.0/jquery.min.js?ver=1.8.0
1077 - http://suleymansoylu.com/wp-content/themes/mw/images/fav.jpg
1078 - http://www.hunkarkocali.com/
1079 - http://www.suleymansoylu.com
1080 - http://www.suleymansoylu.com/
1081 - http://www.suleymansoylu.com/?attachment_id=10282
1082 - http://www.suleymansoylu.com/anlasiliyor-ki-turkiyede-birileri-alevi-sunni-meselesini-kasimak-icin-planlama-icinde-olmuslar/
1083 - http://www.suleymansoylu.com/bu-nesil-butun-dunyaya-da-huzurun-barisin-kardesligin-samimiyetin-ihlasin-ne-demek-oldugunu-anlatacak/8638b2d6-5821-4c08-a6f0-032eb4898f95/
1084 - http://www.suleymansoylu.com/category/konusmalarim/
1085 - http://www.suleymansoylu.com/category/mesajlar/
1086 - http://www.suleymansoylu.com/category/multimedya/
1087 - http://www.suleymansoylu.com/category/roportajlar/
1088 - http://www.suleymansoylu.com/comments/feed/
1089 - http://www.suleymansoylu.com/feed/
1090 - http://www.suleymansoylu.com/hakkimda/
1091 - http://www.suleymansoylu.com/home/feed/
1092 - http://www.suleymansoylu.com/icisleri-bakani-soylu-dogumuzda-yangin-batimizda-duyarsizlik-var/
1093 - http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-325-pkk-ve-hdp-iltisakliyi-meclis-uyesi-adayi-yaptilar/b535c7ce-6016-423b-86e9-b11258d0e35c/
1094 - http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-bagdadi-ne-kadar-teroristse-ferhat-abdi-sahin-de-o-kadar-teroristtir/
1095 - http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-bir-afet-durumunda-herkes-ne-yapacagini-bilecek/
1096 - http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-teror-koridoruna-musamaha-gostermeyecegiz/
1097 - http://www.suleymansoylu.com/iletisim/
1098 - http://www.suleymansoylu.com/on-yillardir-bu-ulkeye-saldiriyorlar/b5fdb1f7-19ea-42e2-a780-22ec70e4a5b2/
1099 - http://www.suleymansoylu.com/tb_video/icisleri-bakani-suleyman-soylu-tgrt-haber-gundem-ozel-programi-16-mayis-2019/
1100 - http://www.suleymansoylu.com/tb_video/icisleri-bakani-suleyman-soylu-trt-haber-ekranlarinda-basin-karti-programina-konuk-oldu-25-03-2019/trthaber-2/
1101 - http://www.suleymansoylu.com/ukrayna-guvenlik-konferansi-konusmasi/
1102 - http://www.suleymansoylu.com/videolar/
1103 - http://www.suleymansoylu.com/whatsapp-image-2019-05-14-at-21-07-57/
1104 - http://www.suleymansoylu.com/wp-content/themes/mw/js/jquery.quicksand.js?ver=1.2.2
1105 - http://www.suleymansoylu.com/wp-content/themes/mw/js/jquery.uniform.min.js?ver=1.1
1106 - http://www.suleymansoylu.com/wp-content/themes/mw/js/tbUniform.js?ver=1.1
1107 - http://www.suleymansoylu.com/wp-content/themes/mw/js/themeblossom.js?ver=1.0
1108 - http://www.suleymansoylu.com/wp-content/themes/mw/style.css
1109 - http://www.suleymansoylu.com/wp-content/themes/mw/styles/fonts/quattrocento.css
1110 - http://www.suleymansoylu.com/wp-content/themes/mw/styles/fonts2/greatVibes.css
1111 - http://www.suleymansoylu.com/wp-content/themes/mw/styles/grid960.css
1112 - http://www.suleymansoylu.com/wp-content/uploads/2016/09/logo513.png
1113 - http://www.suleymansoylu.com/wp-content/uploads/2017/02/WhatsApp-Image-2017-02-18-at-16.00.24.jpeg
1114 - http://www.suleymansoylu.com/wp-content/uploads/2017/12/iller_idaresi.jpg
1115 - http://www.suleymansoylu.com/wp-content/uploads/2018/02/8638B2D6-5821-4C08-A6F0-032EB4898F95-150x150.jpeg
1116 - http://www.suleymansoylu.com/wp-content/uploads/2018/04/kiev2-1-150x150.jpg
1117 - http://www.suleymansoylu.com/wp-content/uploads/2018/04/kiev2-1.jpg
1118 - http://www.suleymansoylu.com/wp-content/uploads/2019/03/B535C7CE-6016-423B-86E9-B11258D0E35C-150x150.jpeg
1119 - http://www.suleymansoylu.com/wp-content/uploads/2019/03/B5FDB1F7-19EA-42E2-A780-22EC70E4A5B2-150x150.jpeg
1120 - http://www.suleymansoylu.com/wp-content/uploads/2019/03/trthaber-150x146.jpg
1121 - http://www.suleymansoylu.com/wp-content/uploads/2019/05/E69B2049-889C-4C89-BEBC-B43BFA4BF226-365x197.jpeg
1122 - http://www.suleymansoylu.com/wp-content/uploads/2019/05/WhatsApp-Image-2019-05-14-at-21.07.57-150x150.jpeg
1123 - http://www.suleymansoylu.com/wp-content/uploads/2019/10/04723E94-6856-4082-9562-36ED9B685187-202x136.jpeg
1124 - http://www.suleymansoylu.com/wp-content/uploads/2019/10/7DBA5B45-96EF-4B9C-850A-0D6F635EED0B-81x85.jpeg
1125 - http://www.suleymansoylu.com/wp-content/uploads/2019/10/BD728213-3F77-4962-A081-F8578523A838-81x85.jpeg
1126 - http://www.suleymansoylu.com/wp-includes/css/dist/block-library/style.min.css?ver=5.2.4
1127 - http://www.suleymansoylu.com/wp-includes/js/wp-embed.min.js?ver=5.2.4
1128 - http://www.suleymansoylu.com/wp-includes/wlwmanifest.xml
1129 - http://www.suleymansoylu.com/wp-json/
1130 - http://www.suleymansoylu.com/wp-json/oembed/1.0/embed?url=http%3A%2F%2Fwww.suleymansoylu.com%2F
1131 - http://www.suleymansoylu.com/wp-json/oembed/1.0/embed?url=http%3A%2F%2Fwww.suleymansoylu.com%2F&
1132 - http://www.suleymansoylu.com/wp-login.php?action=lostpassword
1133 - http://www.suleymansoylu.com/xmlrpc.php?rsd
1134 - https://www.youtube.com/watch?v=SlQOIbUTnk8&
1135 Total external links: 59
1136
1137+ Email addresses found:
1138 Total email address found: 0
1139
1140+ Directories found:
1141 Total directories: 0
1142
1143+ Directory indexing found:
1144 Total directories with indexing: 0
1145
1146----------------------------------------------------------------------
1147
1148
1149 + URL to crawl: http://ns2.suleymansoylu.com
1150 + Date: 2019-10-31
1151
1152 + Crawling URL: http://ns2.suleymansoylu.com:
1153 + Links:
1154 + Crawling http://ns2.suleymansoylu.com
1155 + Crawling http://ns2.suleymansoylu.com/ajax.googleapis.com (404 Not Found)
1156 + Crawling http://ns2.suleymansoylu.com/s.w.org (404 Not Found)
1157 + Searching for directories...
1158 + Searching open folders...
1159 + Crawl finished successfully.
1160----------------------------------------------------------------------
1161Summary of http://http://ns2.suleymansoylu.com
1162----------------------------------------------------------------------
1163+ Links crawled:
1164 - http://ns2.suleymansoylu.com
1165 - http://ns2.suleymansoylu.com/ajax.googleapis.com (404 Not Found)
1166 - http://ns2.suleymansoylu.com/s.w.org (404 Not Found)
1167 Total links crawled: 3
1168
1169+ Links to files found:
1170 Total links to files: 0
1171
1172+ Externals links found:
1173 - http://ajax.googleapis.com/ajax/libs/jquery/1.8.0/jquery.min.js?ver=1.8.0
1174 - http://suleymansoylu.com/wp-content/themes/mw/images/fav.jpg
1175 - http://www.hunkarkocali.com/
1176 - http://www.suleymansoylu.com
1177 - http://www.suleymansoylu.com/
1178 - http://www.suleymansoylu.com/?attachment_id=10282
1179 - http://www.suleymansoylu.com/anlasiliyor-ki-turkiyede-birileri-alevi-sunni-meselesini-kasimak-icin-planlama-icinde-olmuslar/
1180 - http://www.suleymansoylu.com/bu-nesil-butun-dunyaya-da-huzurun-barisin-kardesligin-samimiyetin-ihlasin-ne-demek-oldugunu-anlatacak/8638b2d6-5821-4c08-a6f0-032eb4898f95/
1181 - http://www.suleymansoylu.com/category/konusmalarim/
1182 - http://www.suleymansoylu.com/category/mesajlar/
1183 - http://www.suleymansoylu.com/category/multimedya/
1184 - http://www.suleymansoylu.com/category/roportajlar/
1185 - http://www.suleymansoylu.com/comments/feed/
1186 - http://www.suleymansoylu.com/feed/
1187 - http://www.suleymansoylu.com/hakkimda/
1188 - http://www.suleymansoylu.com/home/feed/
1189 - http://www.suleymansoylu.com/icisleri-bakani-soylu-dogumuzda-yangin-batimizda-duyarsizlik-var/
1190 - http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-325-pkk-ve-hdp-iltisakliyi-meclis-uyesi-adayi-yaptilar/b535c7ce-6016-423b-86e9-b11258d0e35c/
1191 - http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-bagdadi-ne-kadar-teroristse-ferhat-abdi-sahin-de-o-kadar-teroristtir/
1192 - http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-bir-afet-durumunda-herkes-ne-yapacagini-bilecek/
1193 - http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-teror-koridoruna-musamaha-gostermeyecegiz/
1194 - http://www.suleymansoylu.com/iletisim/
1195 - http://www.suleymansoylu.com/on-yillardir-bu-ulkeye-saldiriyorlar/b5fdb1f7-19ea-42e2-a780-22ec70e4a5b2/
1196 - http://www.suleymansoylu.com/tb_video/icisleri-bakani-suleyman-soylu-tgrt-haber-gundem-ozel-programi-16-mayis-2019/
1197 - http://www.suleymansoylu.com/tb_video/icisleri-bakani-suleyman-soylu-trt-haber-ekranlarinda-basin-karti-programina-konuk-oldu-25-03-2019/trthaber-2/
1198 - http://www.suleymansoylu.com/ukrayna-guvenlik-konferansi-konusmasi/
1199 - http://www.suleymansoylu.com/videolar/
1200 - http://www.suleymansoylu.com/whatsapp-image-2019-05-14-at-21-07-57/
1201 - http://www.suleymansoylu.com/wp-content/themes/mw/js/jquery.quicksand.js?ver=1.2.2
1202 - http://www.suleymansoylu.com/wp-content/themes/mw/js/jquery.uniform.min.js?ver=1.1
1203 - http://www.suleymansoylu.com/wp-content/themes/mw/js/tbUniform.js?ver=1.1
1204 - http://www.suleymansoylu.com/wp-content/themes/mw/js/themeblossom.js?ver=1.0
1205 - http://www.suleymansoylu.com/wp-content/themes/mw/style.css
1206 - http://www.suleymansoylu.com/wp-content/themes/mw/styles/fonts/quattrocento.css
1207 - http://www.suleymansoylu.com/wp-content/themes/mw/styles/fonts2/greatVibes.css
1208 - http://www.suleymansoylu.com/wp-content/themes/mw/styles/grid960.css
1209 - http://www.suleymansoylu.com/wp-content/uploads/2016/09/logo513.png
1210 - http://www.suleymansoylu.com/wp-content/uploads/2017/02/WhatsApp-Image-2017-02-18-at-16.00.24.jpeg
1211 - http://www.suleymansoylu.com/wp-content/uploads/2017/12/iller_idaresi.jpg
1212 - http://www.suleymansoylu.com/wp-content/uploads/2018/02/8638B2D6-5821-4C08-A6F0-032EB4898F95-150x150.jpeg
1213 - http://www.suleymansoylu.com/wp-content/uploads/2018/04/kiev2-1-150x150.jpg
1214 - http://www.suleymansoylu.com/wp-content/uploads/2018/04/kiev2-1.jpg
1215 - http://www.suleymansoylu.com/wp-content/uploads/2019/03/B535C7CE-6016-423B-86E9-B11258D0E35C-150x150.jpeg
1216 - http://www.suleymansoylu.com/wp-content/uploads/2019/03/B5FDB1F7-19EA-42E2-A780-22EC70E4A5B2-150x150.jpeg
1217 - http://www.suleymansoylu.com/wp-content/uploads/2019/03/trthaber-150x146.jpg
1218 - http://www.suleymansoylu.com/wp-content/uploads/2019/05/E69B2049-889C-4C89-BEBC-B43BFA4BF226-365x197.jpeg
1219 - http://www.suleymansoylu.com/wp-content/uploads/2019/05/WhatsApp-Image-2019-05-14-at-21.07.57-150x150.jpeg
1220 - http://www.suleymansoylu.com/wp-content/uploads/2019/10/04723E94-6856-4082-9562-36ED9B685187-202x136.jpeg
1221 - http://www.suleymansoylu.com/wp-content/uploads/2019/10/7DBA5B45-96EF-4B9C-850A-0D6F635EED0B-81x85.jpeg
1222 - http://www.suleymansoylu.com/wp-content/uploads/2019/10/BD728213-3F77-4962-A081-F8578523A838-81x85.jpeg
1223 - http://www.suleymansoylu.com/wp-includes/css/dist/block-library/style.min.css?ver=5.2.4
1224 - http://www.suleymansoylu.com/wp-includes/js/wp-embed.min.js?ver=5.2.4
1225 - http://www.suleymansoylu.com/wp-includes/wlwmanifest.xml
1226 - http://www.suleymansoylu.com/wp-json/
1227 - http://www.suleymansoylu.com/wp-json/oembed/1.0/embed?url=http%3A%2F%2Fwww.suleymansoylu.com%2F
1228 - http://www.suleymansoylu.com/wp-json/oembed/1.0/embed?url=http%3A%2F%2Fwww.suleymansoylu.com%2F&
1229 - http://www.suleymansoylu.com/wp-login.php?action=lostpassword
1230 - http://www.suleymansoylu.com/xmlrpc.php?rsd
1231 - https://www.youtube.com/watch?v=SlQOIbUTnk8&
1232 Total external links: 59
1233
1234+ Email addresses found:
1235 Total email address found: 0
1236
1237+ Directories found:
1238 Total directories: 0
1239
1240+ Directory indexing found:
1241 Total directories with indexing: 0
1242
1243----------------------------------------------------------------------
1244
1245
1246 + URL to crawl: http://pop.suleymansoylu.com.
1247 + Date: 2019-10-31
1248
1249 + Crawling URL: http://pop.suleymansoylu.com.:
1250 + Links:
1251 + Crawling http://pop.suleymansoylu.com.
1252 + Crawling http://pop.suleymansoylu.com./ajax.googleapis.com (404 Not Found)
1253 + Crawling http://pop.suleymansoylu.com./s.w.org (404 Not Found)
1254 + Searching for directories...
1255 + Searching open folders...
1256 + Crawl finished successfully.
1257----------------------------------------------------------------------
1258Summary of http://http://pop.suleymansoylu.com.
1259----------------------------------------------------------------------
1260+ Links crawled:
1261 - http://pop.suleymansoylu.com.
1262 - http://pop.suleymansoylu.com./ajax.googleapis.com (404 Not Found)
1263 - http://pop.suleymansoylu.com./s.w.org (404 Not Found)
1264 Total links crawled: 3
1265
1266+ Links to files found:
1267 Total links to files: 0
1268
1269+ Externals links found:
1270 - http://ajax.googleapis.com/ajax/libs/jquery/1.8.0/jquery.min.js?ver=1.8.0
1271 - http://suleymansoylu.com/wp-content/themes/mw/images/fav.jpg
1272 - http://www.hunkarkocali.com/
1273 - http://www.suleymansoylu.com
1274 - http://www.suleymansoylu.com/
1275 - http://www.suleymansoylu.com/?attachment_id=10282
1276 - http://www.suleymansoylu.com/anlasiliyor-ki-turkiyede-birileri-alevi-sunni-meselesini-kasimak-icin-planlama-icinde-olmuslar/
1277 - http://www.suleymansoylu.com/bu-nesil-butun-dunyaya-da-huzurun-barisin-kardesligin-samimiyetin-ihlasin-ne-demek-oldugunu-anlatacak/8638b2d6-5821-4c08-a6f0-032eb4898f95/
1278 - http://www.suleymansoylu.com/category/konusmalarim/
1279 - http://www.suleymansoylu.com/category/mesajlar/
1280 - http://www.suleymansoylu.com/category/multimedya/
1281 - http://www.suleymansoylu.com/category/roportajlar/
1282 - http://www.suleymansoylu.com/comments/feed/
1283 - http://www.suleymansoylu.com/feed/
1284 - http://www.suleymansoylu.com/hakkimda/
1285 - http://www.suleymansoylu.com/home/feed/
1286 - http://www.suleymansoylu.com/icisleri-bakani-soylu-dogumuzda-yangin-batimizda-duyarsizlik-var/
1287 - http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-325-pkk-ve-hdp-iltisakliyi-meclis-uyesi-adayi-yaptilar/b535c7ce-6016-423b-86e9-b11258d0e35c/
1288 - http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-bagdadi-ne-kadar-teroristse-ferhat-abdi-sahin-de-o-kadar-teroristtir/
1289 - http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-bir-afet-durumunda-herkes-ne-yapacagini-bilecek/
1290 - http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-teror-koridoruna-musamaha-gostermeyecegiz/
1291 - http://www.suleymansoylu.com/iletisim/
1292 - http://www.suleymansoylu.com/on-yillardir-bu-ulkeye-saldiriyorlar/b5fdb1f7-19ea-42e2-a780-22ec70e4a5b2/
1293 - http://www.suleymansoylu.com/tb_video/icisleri-bakani-suleyman-soylu-tgrt-haber-gundem-ozel-programi-16-mayis-2019/
1294 - http://www.suleymansoylu.com/tb_video/icisleri-bakani-suleyman-soylu-trt-haber-ekranlarinda-basin-karti-programina-konuk-oldu-25-03-2019/trthaber-2/
1295 - http://www.suleymansoylu.com/ukrayna-guvenlik-konferansi-konusmasi/
1296 - http://www.suleymansoylu.com/videolar/
1297 - http://www.suleymansoylu.com/whatsapp-image-2019-05-14-at-21-07-57/
1298 - http://www.suleymansoylu.com/wp-content/themes/mw/js/jquery.quicksand.js?ver=1.2.2
1299 - http://www.suleymansoylu.com/wp-content/themes/mw/js/jquery.uniform.min.js?ver=1.1
1300 - http://www.suleymansoylu.com/wp-content/themes/mw/js/tbUniform.js?ver=1.1
1301 - http://www.suleymansoylu.com/wp-content/themes/mw/js/themeblossom.js?ver=1.0
1302 - http://www.suleymansoylu.com/wp-content/themes/mw/style.css
1303 - http://www.suleymansoylu.com/wp-content/themes/mw/styles/fonts/quattrocento.css
1304 - http://www.suleymansoylu.com/wp-content/themes/mw/styles/fonts2/greatVibes.css
1305 - http://www.suleymansoylu.com/wp-content/themes/mw/styles/grid960.css
1306 - http://www.suleymansoylu.com/wp-content/uploads/2016/09/logo513.png
1307 - http://www.suleymansoylu.com/wp-content/uploads/2017/02/WhatsApp-Image-2017-02-18-at-16.00.24.jpeg
1308 - http://www.suleymansoylu.com/wp-content/uploads/2017/12/iller_idaresi.jpg
1309 - http://www.suleymansoylu.com/wp-content/uploads/2018/02/8638B2D6-5821-4C08-A6F0-032EB4898F95-150x150.jpeg
1310 - http://www.suleymansoylu.com/wp-content/uploads/2018/04/kiev2-1-150x150.jpg
1311 - http://www.suleymansoylu.com/wp-content/uploads/2018/04/kiev2-1.jpg
1312 - http://www.suleymansoylu.com/wp-content/uploads/2019/03/B535C7CE-6016-423B-86E9-B11258D0E35C-150x150.jpeg
1313 - http://www.suleymansoylu.com/wp-content/uploads/2019/03/B5FDB1F7-19EA-42E2-A780-22EC70E4A5B2-150x150.jpeg
1314 - http://www.suleymansoylu.com/wp-content/uploads/2019/03/trthaber-150x146.jpg
1315 - http://www.suleymansoylu.com/wp-content/uploads/2019/05/E69B2049-889C-4C89-BEBC-B43BFA4BF226-365x197.jpeg
1316 - http://www.suleymansoylu.com/wp-content/uploads/2019/05/WhatsApp-Image-2019-05-14-at-21.07.57-150x150.jpeg
1317 - http://www.suleymansoylu.com/wp-content/uploads/2019/10/04723E94-6856-4082-9562-36ED9B685187-202x136.jpeg
1318 - http://www.suleymansoylu.com/wp-content/uploads/2019/10/7DBA5B45-96EF-4B9C-850A-0D6F635EED0B-81x85.jpeg
1319 - http://www.suleymansoylu.com/wp-content/uploads/2019/10/BD728213-3F77-4962-A081-F8578523A838-81x85.jpeg
1320 - http://www.suleymansoylu.com/wp-includes/css/dist/block-library/style.min.css?ver=5.2.4
1321 - http://www.suleymansoylu.com/wp-includes/js/wp-embed.min.js?ver=5.2.4
1322 - http://www.suleymansoylu.com/wp-includes/wlwmanifest.xml
1323 - http://www.suleymansoylu.com/wp-json/
1324 - http://www.suleymansoylu.com/wp-json/oembed/1.0/embed?url=http%3A%2F%2Fwww.suleymansoylu.com%2F
1325 - http://www.suleymansoylu.com/wp-json/oembed/1.0/embed?url=http%3A%2F%2Fwww.suleymansoylu.com%2F&
1326 - http://www.suleymansoylu.com/wp-login.php?action=lostpassword
1327 - http://www.suleymansoylu.com/xmlrpc.php?rsd
1328 - https://www.youtube.com/watch?v=SlQOIbUTnk8&
1329 Total external links: 59
1330
1331+ Email addresses found:
1332 Total email address found: 0
1333
1334+ Directories found:
1335 Total directories: 0
1336
1337+ Directory indexing found:
1338 Total directories with indexing: 0
1339
1340----------------------------------------------------------------------
1341
1342
1343 + URL to crawl: http://imap.suleymansoylu.com.
1344 + Date: 2019-10-31
1345
1346 + Crawling URL: http://imap.suleymansoylu.com.:
1347 + Links:
1348 + Crawling http://imap.suleymansoylu.com.
1349 + Crawling http://imap.suleymansoylu.com./ajax.googleapis.com (404 Not Found)
1350 + Crawling http://imap.suleymansoylu.com./s.w.org (404 Not Found)
1351 + Searching for directories...
1352 + Searching open folders...
1353 + Crawl finished successfully.
1354----------------------------------------------------------------------
1355Summary of http://http://imap.suleymansoylu.com.
1356----------------------------------------------------------------------
1357+ Links crawled:
1358 - http://imap.suleymansoylu.com.
1359 - http://imap.suleymansoylu.com./ajax.googleapis.com (404 Not Found)
1360 - http://imap.suleymansoylu.com./s.w.org (404 Not Found)
1361 Total links crawled: 3
1362
1363+ Links to files found:
1364 Total links to files: 0
1365
1366+ Externals links found:
1367 - http://ajax.googleapis.com/ajax/libs/jquery/1.8.0/jquery.min.js?ver=1.8.0
1368 - http://suleymansoylu.com/wp-content/themes/mw/images/fav.jpg
1369 - http://www.hunkarkocali.com/
1370 - http://www.suleymansoylu.com
1371 - http://www.suleymansoylu.com/
1372 - http://www.suleymansoylu.com/?attachment_id=10282
1373 - http://www.suleymansoylu.com/anlasiliyor-ki-turkiyede-birileri-alevi-sunni-meselesini-kasimak-icin-planlama-icinde-olmuslar/
1374 - http://www.suleymansoylu.com/bu-nesil-butun-dunyaya-da-huzurun-barisin-kardesligin-samimiyetin-ihlasin-ne-demek-oldugunu-anlatacak/8638b2d6-5821-4c08-a6f0-032eb4898f95/
1375 - http://www.suleymansoylu.com/category/konusmalarim/
1376 - http://www.suleymansoylu.com/category/mesajlar/
1377 - http://www.suleymansoylu.com/category/multimedya/
1378 - http://www.suleymansoylu.com/category/roportajlar/
1379 - http://www.suleymansoylu.com/comments/feed/
1380 - http://www.suleymansoylu.com/feed/
1381 - http://www.suleymansoylu.com/hakkimda/
1382 - http://www.suleymansoylu.com/home/feed/
1383 - http://www.suleymansoylu.com/icisleri-bakani-soylu-dogumuzda-yangin-batimizda-duyarsizlik-var/
1384 - http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-325-pkk-ve-hdp-iltisakliyi-meclis-uyesi-adayi-yaptilar/b535c7ce-6016-423b-86e9-b11258d0e35c/
1385 - http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-bagdadi-ne-kadar-teroristse-ferhat-abdi-sahin-de-o-kadar-teroristtir/
1386 - http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-bir-afet-durumunda-herkes-ne-yapacagini-bilecek/
1387 - http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-teror-koridoruna-musamaha-gostermeyecegiz/
1388 - http://www.suleymansoylu.com/iletisim/
1389 - http://www.suleymansoylu.com/on-yillardir-bu-ulkeye-saldiriyorlar/b5fdb1f7-19ea-42e2-a780-22ec70e4a5b2/
1390 - http://www.suleymansoylu.com/tb_video/icisleri-bakani-suleyman-soylu-tgrt-haber-gundem-ozel-programi-16-mayis-2019/
1391 - http://www.suleymansoylu.com/tb_video/icisleri-bakani-suleyman-soylu-trt-haber-ekranlarinda-basin-karti-programina-konuk-oldu-25-03-2019/trthaber-2/
1392 - http://www.suleymansoylu.com/ukrayna-guvenlik-konferansi-konusmasi/
1393 - http://www.suleymansoylu.com/videolar/
1394 - http://www.suleymansoylu.com/whatsapp-image-2019-05-14-at-21-07-57/
1395 - http://www.suleymansoylu.com/wp-content/themes/mw/js/jquery.quicksand.js?ver=1.2.2
1396 - http://www.suleymansoylu.com/wp-content/themes/mw/js/jquery.uniform.min.js?ver=1.1
1397 - http://www.suleymansoylu.com/wp-content/themes/mw/js/tbUniform.js?ver=1.1
1398 - http://www.suleymansoylu.com/wp-content/themes/mw/js/themeblossom.js?ver=1.0
1399 - http://www.suleymansoylu.com/wp-content/themes/mw/style.css
1400 - http://www.suleymansoylu.com/wp-content/themes/mw/styles/fonts/quattrocento.css
1401 - http://www.suleymansoylu.com/wp-content/themes/mw/styles/fonts2/greatVibes.css
1402 - http://www.suleymansoylu.com/wp-content/themes/mw/styles/grid960.css
1403 - http://www.suleymansoylu.com/wp-content/uploads/2016/09/logo513.png
1404 - http://www.suleymansoylu.com/wp-content/uploads/2017/02/WhatsApp-Image-2017-02-18-at-16.00.24.jpeg
1405 - http://www.suleymansoylu.com/wp-content/uploads/2017/12/iller_idaresi.jpg
1406 - http://www.suleymansoylu.com/wp-content/uploads/2018/02/8638B2D6-5821-4C08-A6F0-032EB4898F95-150x150.jpeg
1407 - http://www.suleymansoylu.com/wp-content/uploads/2018/04/kiev2-1-150x150.jpg
1408 - http://www.suleymansoylu.com/wp-content/uploads/2018/04/kiev2-1.jpg
1409 - http://www.suleymansoylu.com/wp-content/uploads/2019/03/B535C7CE-6016-423B-86E9-B11258D0E35C-150x150.jpeg
1410 - http://www.suleymansoylu.com/wp-content/uploads/2019/03/B5FDB1F7-19EA-42E2-A780-22EC70E4A5B2-150x150.jpeg
1411 - http://www.suleymansoylu.com/wp-content/uploads/2019/03/trthaber-150x146.jpg
1412 - http://www.suleymansoylu.com/wp-content/uploads/2019/05/E69B2049-889C-4C89-BEBC-B43BFA4BF226-365x197.jpeg
1413 - http://www.suleymansoylu.com/wp-content/uploads/2019/05/WhatsApp-Image-2019-05-14-at-21.07.57-150x150.jpeg
1414 - http://www.suleymansoylu.com/wp-content/uploads/2019/10/04723E94-6856-4082-9562-36ED9B685187-202x136.jpeg
1415 - http://www.suleymansoylu.com/wp-content/uploads/2019/10/7DBA5B45-96EF-4B9C-850A-0D6F635EED0B-81x85.jpeg
1416 - http://www.suleymansoylu.com/wp-content/uploads/2019/10/BD728213-3F77-4962-A081-F8578523A838-81x85.jpeg
1417 - http://www.suleymansoylu.com/wp-includes/css/dist/block-library/style.min.css?ver=5.2.4
1418 - http://www.suleymansoylu.com/wp-includes/js/wp-embed.min.js?ver=5.2.4
1419 - http://www.suleymansoylu.com/wp-includes/wlwmanifest.xml
1420 - http://www.suleymansoylu.com/wp-json/
1421 - http://www.suleymansoylu.com/wp-json/oembed/1.0/embed?url=http%3A%2F%2Fwww.suleymansoylu.com%2F
1422 - http://www.suleymansoylu.com/wp-json/oembed/1.0/embed?url=http%3A%2F%2Fwww.suleymansoylu.com%2F&
1423 - http://www.suleymansoylu.com/wp-login.php?action=lostpassword
1424 - http://www.suleymansoylu.com/xmlrpc.php?rsd
1425 - https://www.youtube.com/watch?v=SlQOIbUTnk8&
1426 Total external links: 59
1427
1428+ Email addresses found:
1429 Total email address found: 0
1430
1431+ Directories found:
1432 Total directories: 0
1433
1434+ Directory indexing found:
1435 Total directories with indexing: 0
1436
1437----------------------------------------------------------------------
1438
1439
1440 + URL to crawl: http://mail.suleymansoylu.com
1441 + Date: 2019-10-31
1442
1443 + Crawling URL: http://mail.suleymansoylu.com:
1444 + Links:
1445 + Crawling http://mail.suleymansoylu.com
1446 + Crawling http://mail.suleymansoylu.com/ajax.googleapis.com (404 Not Found)
1447 + Crawling http://mail.suleymansoylu.com/s.w.org (404 Not Found)
1448 + Searching for directories...
1449 + Searching open folders...
1450 + Crawl finished successfully.
1451----------------------------------------------------------------------
1452Summary of http://http://mail.suleymansoylu.com
1453----------------------------------------------------------------------
1454+ Links crawled:
1455 - http://mail.suleymansoylu.com
1456 - http://mail.suleymansoylu.com/ajax.googleapis.com (404 Not Found)
1457 - http://mail.suleymansoylu.com/s.w.org (404 Not Found)
1458 Total links crawled: 3
1459
1460+ Links to files found:
1461 Total links to files: 0
1462
1463+ Externals links found:
1464 - http://ajax.googleapis.com/ajax/libs/jquery/1.8.0/jquery.min.js?ver=1.8.0
1465 - http://suleymansoylu.com/wp-content/themes/mw/images/fav.jpg
1466 - http://www.hunkarkocali.com/
1467 - http://www.suleymansoylu.com
1468 - http://www.suleymansoylu.com/
1469 - http://www.suleymansoylu.com/?attachment_id=10282
1470 - http://www.suleymansoylu.com/anlasiliyor-ki-turkiyede-birileri-alevi-sunni-meselesini-kasimak-icin-planlama-icinde-olmuslar/
1471 - http://www.suleymansoylu.com/bu-nesil-butun-dunyaya-da-huzurun-barisin-kardesligin-samimiyetin-ihlasin-ne-demek-oldugunu-anlatacak/8638b2d6-5821-4c08-a6f0-032eb4898f95/
1472 - http://www.suleymansoylu.com/category/konusmalarim/
1473 - http://www.suleymansoylu.com/category/mesajlar/
1474 - http://www.suleymansoylu.com/category/multimedya/
1475 - http://www.suleymansoylu.com/category/roportajlar/
1476 - http://www.suleymansoylu.com/comments/feed/
1477 - http://www.suleymansoylu.com/feed/
1478 - http://www.suleymansoylu.com/hakkimda/
1479 - http://www.suleymansoylu.com/home/feed/
1480 - http://www.suleymansoylu.com/icisleri-bakani-soylu-dogumuzda-yangin-batimizda-duyarsizlik-var/
1481 - http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-325-pkk-ve-hdp-iltisakliyi-meclis-uyesi-adayi-yaptilar/b535c7ce-6016-423b-86e9-b11258d0e35c/
1482 - http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-bagdadi-ne-kadar-teroristse-ferhat-abdi-sahin-de-o-kadar-teroristtir/
1483 - http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-bir-afet-durumunda-herkes-ne-yapacagini-bilecek/
1484 - http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-teror-koridoruna-musamaha-gostermeyecegiz/
1485 - http://www.suleymansoylu.com/iletisim/
1486 - http://www.suleymansoylu.com/on-yillardir-bu-ulkeye-saldiriyorlar/b5fdb1f7-19ea-42e2-a780-22ec70e4a5b2/
1487 - http://www.suleymansoylu.com/tb_video/icisleri-bakani-suleyman-soylu-tgrt-haber-gundem-ozel-programi-16-mayis-2019/
1488 - http://www.suleymansoylu.com/tb_video/icisleri-bakani-suleyman-soylu-trt-haber-ekranlarinda-basin-karti-programina-konuk-oldu-25-03-2019/trthaber-2/
1489 - http://www.suleymansoylu.com/ukrayna-guvenlik-konferansi-konusmasi/
1490 - http://www.suleymansoylu.com/videolar/
1491 - http://www.suleymansoylu.com/whatsapp-image-2019-05-14-at-21-07-57/
1492 - http://www.suleymansoylu.com/wp-content/themes/mw/js/jquery.quicksand.js?ver=1.2.2
1493 - http://www.suleymansoylu.com/wp-content/themes/mw/js/jquery.uniform.min.js?ver=1.1
1494 - http://www.suleymansoylu.com/wp-content/themes/mw/js/tbUniform.js?ver=1.1
1495 - http://www.suleymansoylu.com/wp-content/themes/mw/js/themeblossom.js?ver=1.0
1496 - http://www.suleymansoylu.com/wp-content/themes/mw/style.css
1497 - http://www.suleymansoylu.com/wp-content/themes/mw/styles/fonts/quattrocento.css
1498 - http://www.suleymansoylu.com/wp-content/themes/mw/styles/fonts2/greatVibes.css
1499 - http://www.suleymansoylu.com/wp-content/themes/mw/styles/grid960.css
1500 - http://www.suleymansoylu.com/wp-content/uploads/2016/09/logo513.png
1501 - http://www.suleymansoylu.com/wp-content/uploads/2017/02/WhatsApp-Image-2017-02-18-at-16.00.24.jpeg
1502 - http://www.suleymansoylu.com/wp-content/uploads/2017/12/iller_idaresi.jpg
1503 - http://www.suleymansoylu.com/wp-content/uploads/2018/02/8638B2D6-5821-4C08-A6F0-032EB4898F95-150x150.jpeg
1504 - http://www.suleymansoylu.com/wp-content/uploads/2018/04/kiev2-1-150x150.jpg
1505 - http://www.suleymansoylu.com/wp-content/uploads/2018/04/kiev2-1.jpg
1506 - http://www.suleymansoylu.com/wp-content/uploads/2019/03/B535C7CE-6016-423B-86E9-B11258D0E35C-150x150.jpeg
1507 - http://www.suleymansoylu.com/wp-content/uploads/2019/03/B5FDB1F7-19EA-42E2-A780-22EC70E4A5B2-150x150.jpeg
1508 - http://www.suleymansoylu.com/wp-content/uploads/2019/03/trthaber-150x146.jpg
1509 - http://www.suleymansoylu.com/wp-content/uploads/2019/05/E69B2049-889C-4C89-BEBC-B43BFA4BF226-365x197.jpeg
1510 - http://www.suleymansoylu.com/wp-content/uploads/2019/05/WhatsApp-Image-2019-05-14-at-21.07.57-150x150.jpeg
1511 - http://www.suleymansoylu.com/wp-content/uploads/2019/10/04723E94-6856-4082-9562-36ED9B685187-202x136.jpeg
1512 - http://www.suleymansoylu.com/wp-content/uploads/2019/10/7DBA5B45-96EF-4B9C-850A-0D6F635EED0B-81x85.jpeg
1513 - http://www.suleymansoylu.com/wp-content/uploads/2019/10/BD728213-3F77-4962-A081-F8578523A838-81x85.jpeg
1514 - http://www.suleymansoylu.com/wp-includes/css/dist/block-library/style.min.css?ver=5.2.4
1515 - http://www.suleymansoylu.com/wp-includes/js/wp-embed.min.js?ver=5.2.4
1516 - http://www.suleymansoylu.com/wp-includes/wlwmanifest.xml
1517 - http://www.suleymansoylu.com/wp-json/
1518 - http://www.suleymansoylu.com/wp-json/oembed/1.0/embed?url=http%3A%2F%2Fwww.suleymansoylu.com%2F
1519 - http://www.suleymansoylu.com/wp-json/oembed/1.0/embed?url=http%3A%2F%2Fwww.suleymansoylu.com%2F&
1520 - http://www.suleymansoylu.com/wp-login.php?action=lostpassword
1521 - http://www.suleymansoylu.com/xmlrpc.php?rsd
1522 - https://www.youtube.com/watch?v=SlQOIbUTnk8&
1523 Total external links: 59
1524
1525+ Email addresses found:
1526 Total email address found: 0
1527
1528+ Directories found:
1529 Total directories: 0
1530
1531+ Directory indexing found:
1532 Total directories with indexing: 0
1533
1534----------------------------------------------------------------------
1535
1536
1537 + URL to crawl: http://smtp.suleymansoylu.com.
1538 + Date: 2019-10-31
1539
1540 + Crawling URL: http://smtp.suleymansoylu.com.:
1541 + Links:
1542 + Crawling http://smtp.suleymansoylu.com.
1543 + Crawling http://smtp.suleymansoylu.com./ajax.googleapis.com (404 Not Found)
1544 + Crawling http://smtp.suleymansoylu.com./s.w.org (404 Not Found)
1545 + Searching for directories...
1546 + Searching open folders...
1547 + Crawl finished successfully.
1548----------------------------------------------------------------------
1549Summary of http://http://smtp.suleymansoylu.com.
1550----------------------------------------------------------------------
1551+ Links crawled:
1552 - http://smtp.suleymansoylu.com.
1553 - http://smtp.suleymansoylu.com./ajax.googleapis.com (404 Not Found)
1554 - http://smtp.suleymansoylu.com./s.w.org (404 Not Found)
1555 Total links crawled: 3
1556
1557+ Links to files found:
1558 Total links to files: 0
1559
1560+ Externals links found:
1561 - http://ajax.googleapis.com/ajax/libs/jquery/1.8.0/jquery.min.js?ver=1.8.0
1562 - http://suleymansoylu.com/wp-content/themes/mw/images/fav.jpg
1563 - http://www.hunkarkocali.com/
1564 - http://www.suleymansoylu.com
1565 - http://www.suleymansoylu.com/
1566 - http://www.suleymansoylu.com/?attachment_id=10282
1567 - http://www.suleymansoylu.com/anlasiliyor-ki-turkiyede-birileri-alevi-sunni-meselesini-kasimak-icin-planlama-icinde-olmuslar/
1568 - http://www.suleymansoylu.com/bu-nesil-butun-dunyaya-da-huzurun-barisin-kardesligin-samimiyetin-ihlasin-ne-demek-oldugunu-anlatacak/8638b2d6-5821-4c08-a6f0-032eb4898f95/
1569 - http://www.suleymansoylu.com/category/konusmalarim/
1570 - http://www.suleymansoylu.com/category/mesajlar/
1571 - http://www.suleymansoylu.com/category/multimedya/
1572 - http://www.suleymansoylu.com/category/roportajlar/
1573 - http://www.suleymansoylu.com/comments/feed/
1574 - http://www.suleymansoylu.com/feed/
1575 - http://www.suleymansoylu.com/hakkimda/
1576 - http://www.suleymansoylu.com/home/feed/
1577 - http://www.suleymansoylu.com/icisleri-bakani-soylu-dogumuzda-yangin-batimizda-duyarsizlik-var/
1578 - http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-325-pkk-ve-hdp-iltisakliyi-meclis-uyesi-adayi-yaptilar/b535c7ce-6016-423b-86e9-b11258d0e35c/
1579 - http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-bagdadi-ne-kadar-teroristse-ferhat-abdi-sahin-de-o-kadar-teroristtir/
1580 - http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-bir-afet-durumunda-herkes-ne-yapacagini-bilecek/
1581 - http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-teror-koridoruna-musamaha-gostermeyecegiz/
1582 - http://www.suleymansoylu.com/iletisim/
1583 - http://www.suleymansoylu.com/on-yillardir-bu-ulkeye-saldiriyorlar/b5fdb1f7-19ea-42e2-a780-22ec70e4a5b2/
1584 - http://www.suleymansoylu.com/tb_video/icisleri-bakani-suleyman-soylu-tgrt-haber-gundem-ozel-programi-16-mayis-2019/
1585 - http://www.suleymansoylu.com/tb_video/icisleri-bakani-suleyman-soylu-trt-haber-ekranlarinda-basin-karti-programina-konuk-oldu-25-03-2019/trthaber-2/
1586 - http://www.suleymansoylu.com/ukrayna-guvenlik-konferansi-konusmasi/
1587 - http://www.suleymansoylu.com/videolar/
1588 - http://www.suleymansoylu.com/whatsapp-image-2019-05-14-at-21-07-57/
1589 - http://www.suleymansoylu.com/wp-content/themes/mw/js/jquery.quicksand.js?ver=1.2.2
1590 - http://www.suleymansoylu.com/wp-content/themes/mw/js/jquery.uniform.min.js?ver=1.1
1591 - http://www.suleymansoylu.com/wp-content/themes/mw/js/tbUniform.js?ver=1.1
1592 - http://www.suleymansoylu.com/wp-content/themes/mw/js/themeblossom.js?ver=1.0
1593 - http://www.suleymansoylu.com/wp-content/themes/mw/style.css
1594 - http://www.suleymansoylu.com/wp-content/themes/mw/styles/fonts/quattrocento.css
1595 - http://www.suleymansoylu.com/wp-content/themes/mw/styles/fonts2/greatVibes.css
1596 - http://www.suleymansoylu.com/wp-content/themes/mw/styles/grid960.css
1597 - http://www.suleymansoylu.com/wp-content/uploads/2016/09/logo513.png
1598 - http://www.suleymansoylu.com/wp-content/uploads/2017/02/WhatsApp-Image-2017-02-18-at-16.00.24.jpeg
1599 - http://www.suleymansoylu.com/wp-content/uploads/2017/12/iller_idaresi.jpg
1600 - http://www.suleymansoylu.com/wp-content/uploads/2018/02/8638B2D6-5821-4C08-A6F0-032EB4898F95-150x150.jpeg
1601 - http://www.suleymansoylu.com/wp-content/uploads/2018/04/kiev2-1-150x150.jpg
1602 - http://www.suleymansoylu.com/wp-content/uploads/2018/04/kiev2-1.jpg
1603 - http://www.suleymansoylu.com/wp-content/uploads/2019/03/B535C7CE-6016-423B-86E9-B11258D0E35C-150x150.jpeg
1604 - http://www.suleymansoylu.com/wp-content/uploads/2019/03/B5FDB1F7-19EA-42E2-A780-22EC70E4A5B2-150x150.jpeg
1605 - http://www.suleymansoylu.com/wp-content/uploads/2019/03/trthaber-150x146.jpg
1606 - http://www.suleymansoylu.com/wp-content/uploads/2019/05/E69B2049-889C-4C89-BEBC-B43BFA4BF226-365x197.jpeg
1607 - http://www.suleymansoylu.com/wp-content/uploads/2019/05/WhatsApp-Image-2019-05-14-at-21.07.57-150x150.jpeg
1608 - http://www.suleymansoylu.com/wp-content/uploads/2019/10/04723E94-6856-4082-9562-36ED9B685187-202x136.jpeg
1609 - http://www.suleymansoylu.com/wp-content/uploads/2019/10/7DBA5B45-96EF-4B9C-850A-0D6F635EED0B-81x85.jpeg
1610 - http://www.suleymansoylu.com/wp-content/uploads/2019/10/BD728213-3F77-4962-A081-F8578523A838-81x85.jpeg
1611 - http://www.suleymansoylu.com/wp-includes/css/dist/block-library/style.min.css?ver=5.2.4
1612 - http://www.suleymansoylu.com/wp-includes/js/wp-embed.min.js?ver=5.2.4
1613 - http://www.suleymansoylu.com/wp-includes/wlwmanifest.xml
1614 - http://www.suleymansoylu.com/wp-json/
1615 - http://www.suleymansoylu.com/wp-json/oembed/1.0/embed?url=http%3A%2F%2Fwww.suleymansoylu.com%2F
1616 - http://www.suleymansoylu.com/wp-json/oembed/1.0/embed?url=http%3A%2F%2Fwww.suleymansoylu.com%2F&
1617 - http://www.suleymansoylu.com/wp-login.php?action=lostpassword
1618 - http://www.suleymansoylu.com/xmlrpc.php?rsd
1619 - https://www.youtube.com/watch?v=SlQOIbUTnk8&
1620 Total external links: 59
1621
1622+ Email addresses found:
1623 Total email address found: 0
1624
1625+ Directories found:
1626 Total directories: 0
1627
1628+ Directory indexing found:
1629 Total directories with indexing: 0
1630
1631----------------------------------------------------------------------
1632
1633
1634 + URL to crawl: http://www.suleymansoylu.com.
1635 + Date: 2019-10-31
1636
1637 + Crawling URL: http://www.suleymansoylu.com.:
1638 + Links:
1639 + Crawling http://www.suleymansoylu.com.
1640 + Crawling http://www.suleymansoylu.com./ajax.googleapis.com (404 Not Found)
1641 + Crawling http://www.suleymansoylu.com./s.w.org (404 Not Found)
1642 + Searching for directories...
1643 + Searching open folders...
1644 + Crawl finished successfully.
1645----------------------------------------------------------------------
1646Summary of http://http://www.suleymansoylu.com.
1647----------------------------------------------------------------------
1648+ Links crawled:
1649 - http://www.suleymansoylu.com.
1650 - http://www.suleymansoylu.com./ajax.googleapis.com (404 Not Found)
1651 - http://www.suleymansoylu.com./s.w.org (404 Not Found)
1652 Total links crawled: 3
1653
1654+ Links to files found:
1655 Total links to files: 0
1656
1657+ Externals links found:
1658 - http://ajax.googleapis.com/ajax/libs/jquery/1.8.0/jquery.min.js?ver=1.8.0
1659 - http://suleymansoylu.com/wp-content/themes/mw/images/fav.jpg
1660 - http://www.hunkarkocali.com/
1661 - http://www.suleymansoylu.com
1662 - http://www.suleymansoylu.com/
1663 - http://www.suleymansoylu.com/?attachment_id=10282
1664 - http://www.suleymansoylu.com/anlasiliyor-ki-turkiyede-birileri-alevi-sunni-meselesini-kasimak-icin-planlama-icinde-olmuslar/
1665 - http://www.suleymansoylu.com/bu-nesil-butun-dunyaya-da-huzurun-barisin-kardesligin-samimiyetin-ihlasin-ne-demek-oldugunu-anlatacak/8638b2d6-5821-4c08-a6f0-032eb4898f95/
1666 - http://www.suleymansoylu.com/category/konusmalarim/
1667 - http://www.suleymansoylu.com/category/mesajlar/
1668 - http://www.suleymansoylu.com/category/multimedya/
1669 - http://www.suleymansoylu.com/category/roportajlar/
1670 - http://www.suleymansoylu.com/comments/feed/
1671 - http://www.suleymansoylu.com/feed/
1672 - http://www.suleymansoylu.com/hakkimda/
1673 - http://www.suleymansoylu.com/home/feed/
1674 - http://www.suleymansoylu.com/icisleri-bakani-soylu-dogumuzda-yangin-batimizda-duyarsizlik-var/
1675 - http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-325-pkk-ve-hdp-iltisakliyi-meclis-uyesi-adayi-yaptilar/b535c7ce-6016-423b-86e9-b11258d0e35c/
1676 - http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-bagdadi-ne-kadar-teroristse-ferhat-abdi-sahin-de-o-kadar-teroristtir/
1677 - http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-bir-afet-durumunda-herkes-ne-yapacagini-bilecek/
1678 - http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-teror-koridoruna-musamaha-gostermeyecegiz/
1679 - http://www.suleymansoylu.com/iletisim/
1680 - http://www.suleymansoylu.com/on-yillardir-bu-ulkeye-saldiriyorlar/b5fdb1f7-19ea-42e2-a780-22ec70e4a5b2/
1681 - http://www.suleymansoylu.com/tb_video/icisleri-bakani-suleyman-soylu-tgrt-haber-gundem-ozel-programi-16-mayis-2019/
1682 - http://www.suleymansoylu.com/tb_video/icisleri-bakani-suleyman-soylu-trt-haber-ekranlarinda-basin-karti-programina-konuk-oldu-25-03-2019/trthaber-2/
1683 - http://www.suleymansoylu.com/ukrayna-guvenlik-konferansi-konusmasi/
1684 - http://www.suleymansoylu.com/videolar/
1685 - http://www.suleymansoylu.com/whatsapp-image-2019-05-14-at-21-07-57/
1686 - http://www.suleymansoylu.com/wp-content/themes/mw/js/jquery.quicksand.js?ver=1.2.2
1687 - http://www.suleymansoylu.com/wp-content/themes/mw/js/jquery.uniform.min.js?ver=1.1
1688 - http://www.suleymansoylu.com/wp-content/themes/mw/js/tbUniform.js?ver=1.1
1689 - http://www.suleymansoylu.com/wp-content/themes/mw/js/themeblossom.js?ver=1.0
1690 - http://www.suleymansoylu.com/wp-content/themes/mw/style.css
1691 - http://www.suleymansoylu.com/wp-content/themes/mw/styles/fonts/quattrocento.css
1692 - http://www.suleymansoylu.com/wp-content/themes/mw/styles/fonts2/greatVibes.css
1693 - http://www.suleymansoylu.com/wp-content/themes/mw/styles/grid960.css
1694 - http://www.suleymansoylu.com/wp-content/uploads/2016/09/logo513.png
1695 - http://www.suleymansoylu.com/wp-content/uploads/2017/02/WhatsApp-Image-2017-02-18-at-16.00.24.jpeg
1696 - http://www.suleymansoylu.com/wp-content/uploads/2017/12/iller_idaresi.jpg
1697 - http://www.suleymansoylu.com/wp-content/uploads/2018/02/8638B2D6-5821-4C08-A6F0-032EB4898F95-150x150.jpeg
1698 - http://www.suleymansoylu.com/wp-content/uploads/2018/04/kiev2-1-150x150.jpg
1699 - http://www.suleymansoylu.com/wp-content/uploads/2018/04/kiev2-1.jpg
1700 - http://www.suleymansoylu.com/wp-content/uploads/2019/03/B535C7CE-6016-423B-86E9-B11258D0E35C-150x150.jpeg
1701 - http://www.suleymansoylu.com/wp-content/uploads/2019/03/B5FDB1F7-19EA-42E2-A780-22EC70E4A5B2-150x150.jpeg
1702 - http://www.suleymansoylu.com/wp-content/uploads/2019/03/trthaber-150x146.jpg
1703 - http://www.suleymansoylu.com/wp-content/uploads/2019/05/E69B2049-889C-4C89-BEBC-B43BFA4BF226-365x197.jpeg
1704 - http://www.suleymansoylu.com/wp-content/uploads/2019/05/WhatsApp-Image-2019-05-14-at-21.07.57-150x150.jpeg
1705 - http://www.suleymansoylu.com/wp-content/uploads/2019/10/04723E94-6856-4082-9562-36ED9B685187-202x136.jpeg
1706 - http://www.suleymansoylu.com/wp-content/uploads/2019/10/7DBA5B45-96EF-4B9C-850A-0D6F635EED0B-81x85.jpeg
1707 - http://www.suleymansoylu.com/wp-content/uploads/2019/10/BD728213-3F77-4962-A081-F8578523A838-81x85.jpeg
1708 - http://www.suleymansoylu.com/wp-includes/css/dist/block-library/style.min.css?ver=5.2.4
1709 - http://www.suleymansoylu.com/wp-includes/js/wp-embed.min.js?ver=5.2.4
1710 - http://www.suleymansoylu.com/wp-includes/wlwmanifest.xml
1711 - http://www.suleymansoylu.com/wp-json/
1712 - http://www.suleymansoylu.com/wp-json/oembed/1.0/embed?url=http%3A%2F%2Fwww.suleymansoylu.com%2F
1713 - http://www.suleymansoylu.com/wp-json/oembed/1.0/embed?url=http%3A%2F%2Fwww.suleymansoylu.com%2F&
1714 - http://www.suleymansoylu.com/wp-login.php?action=lostpassword
1715 - http://www.suleymansoylu.com/xmlrpc.php?rsd
1716 - https://www.youtube.com/watch?v=SlQOIbUTnk8&
1717 Total external links: 59
1718
1719+ Email addresses found:
1720 Total email address found: 0
1721
1722+ Directories found:
1723 Total directories: 0
1724
1725+ Directory indexing found:
1726 Total directories with indexing: 0
1727
1728----------------------------------------------------------------------
1729
1730
1731 + URL to crawl: http://ns1.suleymansoylu.com.
1732 + Date: 2019-10-31
1733
1734 + Crawling URL: http://ns1.suleymansoylu.com.:
1735 + Links:
1736 + Crawling http://ns1.suleymansoylu.com.
1737 + Crawling http://ns1.suleymansoylu.com./ajax.googleapis.com (404 Not Found)
1738 + Crawling http://ns1.suleymansoylu.com./s.w.org (404 Not Found)
1739 + Searching for directories...
1740 + Searching open folders...
1741 + Crawl finished successfully.
1742----------------------------------------------------------------------
1743Summary of http://http://ns1.suleymansoylu.com.
1744----------------------------------------------------------------------
1745+ Links crawled:
1746 - http://ns1.suleymansoylu.com.
1747 - http://ns1.suleymansoylu.com./ajax.googleapis.com (404 Not Found)
1748 - http://ns1.suleymansoylu.com./s.w.org (404 Not Found)
1749 Total links crawled: 3
1750
1751+ Links to files found:
1752 Total links to files: 0
1753
1754+ Externals links found:
1755 - http://ajax.googleapis.com/ajax/libs/jquery/1.8.0/jquery.min.js?ver=1.8.0
1756 - http://suleymansoylu.com/wp-content/themes/mw/images/fav.jpg
1757 - http://www.hunkarkocali.com/
1758 - http://www.suleymansoylu.com
1759 - http://www.suleymansoylu.com/
1760 - http://www.suleymansoylu.com/?attachment_id=10282
1761 - http://www.suleymansoylu.com/anlasiliyor-ki-turkiyede-birileri-alevi-sunni-meselesini-kasimak-icin-planlama-icinde-olmuslar/
1762 - http://www.suleymansoylu.com/bu-nesil-butun-dunyaya-da-huzurun-barisin-kardesligin-samimiyetin-ihlasin-ne-demek-oldugunu-anlatacak/8638b2d6-5821-4c08-a6f0-032eb4898f95/
1763 - http://www.suleymansoylu.com/category/konusmalarim/
1764 - http://www.suleymansoylu.com/category/mesajlar/
1765 - http://www.suleymansoylu.com/category/multimedya/
1766 - http://www.suleymansoylu.com/category/roportajlar/
1767 - http://www.suleymansoylu.com/comments/feed/
1768 - http://www.suleymansoylu.com/feed/
1769 - http://www.suleymansoylu.com/hakkimda/
1770 - http://www.suleymansoylu.com/home/feed/
1771 - http://www.suleymansoylu.com/icisleri-bakani-soylu-dogumuzda-yangin-batimizda-duyarsizlik-var/
1772 - http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-325-pkk-ve-hdp-iltisakliyi-meclis-uyesi-adayi-yaptilar/b535c7ce-6016-423b-86e9-b11258d0e35c/
1773 - http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-bagdadi-ne-kadar-teroristse-ferhat-abdi-sahin-de-o-kadar-teroristtir/
1774 - http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-bir-afet-durumunda-herkes-ne-yapacagini-bilecek/
1775 - http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-teror-koridoruna-musamaha-gostermeyecegiz/
1776 - http://www.suleymansoylu.com/iletisim/
1777 - http://www.suleymansoylu.com/on-yillardir-bu-ulkeye-saldiriyorlar/b5fdb1f7-19ea-42e2-a780-22ec70e4a5b2/
1778 - http://www.suleymansoylu.com/tb_video/icisleri-bakani-suleyman-soylu-tgrt-haber-gundem-ozel-programi-16-mayis-2019/
1779 - http://www.suleymansoylu.com/tb_video/icisleri-bakani-suleyman-soylu-trt-haber-ekranlarinda-basin-karti-programina-konuk-oldu-25-03-2019/trthaber-2/
1780 - http://www.suleymansoylu.com/ukrayna-guvenlik-konferansi-konusmasi/
1781 - http://www.suleymansoylu.com/videolar/
1782 - http://www.suleymansoylu.com/whatsapp-image-2019-05-14-at-21-07-57/
1783 - http://www.suleymansoylu.com/wp-content/themes/mw/js/jquery.quicksand.js?ver=1.2.2
1784 - http://www.suleymansoylu.com/wp-content/themes/mw/js/jquery.uniform.min.js?ver=1.1
1785 - http://www.suleymansoylu.com/wp-content/themes/mw/js/tbUniform.js?ver=1.1
1786 - http://www.suleymansoylu.com/wp-content/themes/mw/js/themeblossom.js?ver=1.0
1787 - http://www.suleymansoylu.com/wp-content/themes/mw/style.css
1788 - http://www.suleymansoylu.com/wp-content/themes/mw/styles/fonts/quattrocento.css
1789 - http://www.suleymansoylu.com/wp-content/themes/mw/styles/fonts2/greatVibes.css
1790 - http://www.suleymansoylu.com/wp-content/themes/mw/styles/grid960.css
1791 - http://www.suleymansoylu.com/wp-content/uploads/2016/09/logo513.png
1792 - http://www.suleymansoylu.com/wp-content/uploads/2017/02/WhatsApp-Image-2017-02-18-at-16.00.24.jpeg
1793 - http://www.suleymansoylu.com/wp-content/uploads/2017/12/iller_idaresi.jpg
1794 - http://www.suleymansoylu.com/wp-content/uploads/2018/02/8638B2D6-5821-4C08-A6F0-032EB4898F95-150x150.jpeg
1795 - http://www.suleymansoylu.com/wp-content/uploads/2018/04/kiev2-1-150x150.jpg
1796 - http://www.suleymansoylu.com/wp-content/uploads/2018/04/kiev2-1.jpg
1797 - http://www.suleymansoylu.com/wp-content/uploads/2019/03/B535C7CE-6016-423B-86E9-B11258D0E35C-150x150.jpeg
1798 - http://www.suleymansoylu.com/wp-content/uploads/2019/03/B5FDB1F7-19EA-42E2-A780-22EC70E4A5B2-150x150.jpeg
1799 - http://www.suleymansoylu.com/wp-content/uploads/2019/03/trthaber-150x146.jpg
1800 - http://www.suleymansoylu.com/wp-content/uploads/2019/05/E69B2049-889C-4C89-BEBC-B43BFA4BF226-365x197.jpeg
1801 - http://www.suleymansoylu.com/wp-content/uploads/2019/05/WhatsApp-Image-2019-05-14-at-21.07.57-150x150.jpeg
1802 - http://www.suleymansoylu.com/wp-content/uploads/2019/10/04723E94-6856-4082-9562-36ED9B685187-202x136.jpeg
1803 - http://www.suleymansoylu.com/wp-content/uploads/2019/10/7DBA5B45-96EF-4B9C-850A-0D6F635EED0B-81x85.jpeg
1804 - http://www.suleymansoylu.com/wp-content/uploads/2019/10/BD728213-3F77-4962-A081-F8578523A838-81x85.jpeg
1805 - http://www.suleymansoylu.com/wp-includes/css/dist/block-library/style.min.css?ver=5.2.4
1806 - http://www.suleymansoylu.com/wp-includes/js/wp-embed.min.js?ver=5.2.4
1807 - http://www.suleymansoylu.com/wp-includes/wlwmanifest.xml
1808 - http://www.suleymansoylu.com/wp-json/
1809 - http://www.suleymansoylu.com/wp-json/oembed/1.0/embed?url=http%3A%2F%2Fwww.suleymansoylu.com%2F
1810 - http://www.suleymansoylu.com/wp-json/oembed/1.0/embed?url=http%3A%2F%2Fwww.suleymansoylu.com%2F&
1811 - http://www.suleymansoylu.com/wp-login.php?action=lostpassword
1812 - http://www.suleymansoylu.com/xmlrpc.php?rsd
1813 - https://www.youtube.com/watch?v=SlQOIbUTnk8&
1814 Total external links: 59
1815
1816+ Email addresses found:
1817 Total email address found: 0
1818
1819+ Directories found:
1820 Total directories: 0
1821
1822+ Directory indexing found:
1823 Total directories with indexing: 0
1824
1825----------------------------------------------------------------------
1826
1827
1828 + URL to crawl: http://mail.suleymansoylu.com.
1829 + Date: 2019-10-31
1830
1831 + Crawling URL: http://mail.suleymansoylu.com.:
1832 + Links:
1833 + Crawling http://mail.suleymansoylu.com.
1834 + Crawling http://mail.suleymansoylu.com./ajax.googleapis.com (404 Not Found)
1835 + Crawling http://mail.suleymansoylu.com./s.w.org (404 Not Found)
1836 + Searching for directories...
1837 + Searching open folders...
1838 + Crawl finished successfully.
1839----------------------------------------------------------------------
1840Summary of http://http://mail.suleymansoylu.com.
1841----------------------------------------------------------------------
1842+ Links crawled:
1843 - http://mail.suleymansoylu.com.
1844 - http://mail.suleymansoylu.com./ajax.googleapis.com (404 Not Found)
1845 - http://mail.suleymansoylu.com./s.w.org (404 Not Found)
1846 Total links crawled: 3
1847
1848+ Links to files found:
1849 Total links to files: 0
1850
1851+ Externals links found:
1852 - http://ajax.googleapis.com/ajax/libs/jquery/1.8.0/jquery.min.js?ver=1.8.0
1853 - http://suleymansoylu.com/wp-content/themes/mw/images/fav.jpg
1854 - http://www.hunkarkocali.com/
1855 - http://www.suleymansoylu.com
1856 - http://www.suleymansoylu.com/
1857 - http://www.suleymansoylu.com/?attachment_id=10282
1858 - http://www.suleymansoylu.com/anlasiliyor-ki-turkiyede-birileri-alevi-sunni-meselesini-kasimak-icin-planlama-icinde-olmuslar/
1859 - http://www.suleymansoylu.com/bu-nesil-butun-dunyaya-da-huzurun-barisin-kardesligin-samimiyetin-ihlasin-ne-demek-oldugunu-anlatacak/8638b2d6-5821-4c08-a6f0-032eb4898f95/
1860 - http://www.suleymansoylu.com/category/konusmalarim/
1861 - http://www.suleymansoylu.com/category/mesajlar/
1862 - http://www.suleymansoylu.com/category/multimedya/
1863 - http://www.suleymansoylu.com/category/roportajlar/
1864 - http://www.suleymansoylu.com/comments/feed/
1865 - http://www.suleymansoylu.com/feed/
1866 - http://www.suleymansoylu.com/hakkimda/
1867 - http://www.suleymansoylu.com/home/feed/
1868 - http://www.suleymansoylu.com/icisleri-bakani-soylu-dogumuzda-yangin-batimizda-duyarsizlik-var/
1869 - http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-325-pkk-ve-hdp-iltisakliyi-meclis-uyesi-adayi-yaptilar/b535c7ce-6016-423b-86e9-b11258d0e35c/
1870 - http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-bagdadi-ne-kadar-teroristse-ferhat-abdi-sahin-de-o-kadar-teroristtir/
1871 - http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-bir-afet-durumunda-herkes-ne-yapacagini-bilecek/
1872 - http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-teror-koridoruna-musamaha-gostermeyecegiz/
1873 - http://www.suleymansoylu.com/iletisim/
1874 - http://www.suleymansoylu.com/on-yillardir-bu-ulkeye-saldiriyorlar/b5fdb1f7-19ea-42e2-a780-22ec70e4a5b2/
1875 - http://www.suleymansoylu.com/tb_video/icisleri-bakani-suleyman-soylu-tgrt-haber-gundem-ozel-programi-16-mayis-2019/
1876 - http://www.suleymansoylu.com/tb_video/icisleri-bakani-suleyman-soylu-trt-haber-ekranlarinda-basin-karti-programina-konuk-oldu-25-03-2019/trthaber-2/
1877 - http://www.suleymansoylu.com/ukrayna-guvenlik-konferansi-konusmasi/
1878 - http://www.suleymansoylu.com/videolar/
1879 - http://www.suleymansoylu.com/whatsapp-image-2019-05-14-at-21-07-57/
1880 - http://www.suleymansoylu.com/wp-content/themes/mw/js/jquery.quicksand.js?ver=1.2.2
1881 - http://www.suleymansoylu.com/wp-content/themes/mw/js/jquery.uniform.min.js?ver=1.1
1882 - http://www.suleymansoylu.com/wp-content/themes/mw/js/tbUniform.js?ver=1.1
1883 - http://www.suleymansoylu.com/wp-content/themes/mw/js/themeblossom.js?ver=1.0
1884 - http://www.suleymansoylu.com/wp-content/themes/mw/style.css
1885 - http://www.suleymansoylu.com/wp-content/themes/mw/styles/fonts/quattrocento.css
1886 - http://www.suleymansoylu.com/wp-content/themes/mw/styles/fonts2/greatVibes.css
1887 - http://www.suleymansoylu.com/wp-content/themes/mw/styles/grid960.css
1888 - http://www.suleymansoylu.com/wp-content/uploads/2016/09/logo513.png
1889 - http://www.suleymansoylu.com/wp-content/uploads/2017/02/WhatsApp-Image-2017-02-18-at-16.00.24.jpeg
1890 - http://www.suleymansoylu.com/wp-content/uploads/2017/12/iller_idaresi.jpg
1891 - http://www.suleymansoylu.com/wp-content/uploads/2018/02/8638B2D6-5821-4C08-A6F0-032EB4898F95-150x150.jpeg
1892 - http://www.suleymansoylu.com/wp-content/uploads/2018/04/kiev2-1-150x150.jpg
1893 - http://www.suleymansoylu.com/wp-content/uploads/2018/04/kiev2-1.jpg
1894 - http://www.suleymansoylu.com/wp-content/uploads/2019/03/B535C7CE-6016-423B-86E9-B11258D0E35C-150x150.jpeg
1895 - http://www.suleymansoylu.com/wp-content/uploads/2019/03/B5FDB1F7-19EA-42E2-A780-22EC70E4A5B2-150x150.jpeg
1896 - http://www.suleymansoylu.com/wp-content/uploads/2019/03/trthaber-150x146.jpg
1897 - http://www.suleymansoylu.com/wp-content/uploads/2019/05/E69B2049-889C-4C89-BEBC-B43BFA4BF226-365x197.jpeg
1898 - http://www.suleymansoylu.com/wp-content/uploads/2019/05/WhatsApp-Image-2019-05-14-at-21.07.57-150x150.jpeg
1899 - http://www.suleymansoylu.com/wp-content/uploads/2019/10/04723E94-6856-4082-9562-36ED9B685187-202x136.jpeg
1900 - http://www.suleymansoylu.com/wp-content/uploads/2019/10/7DBA5B45-96EF-4B9C-850A-0D6F635EED0B-81x85.jpeg
1901 - http://www.suleymansoylu.com/wp-content/uploads/2019/10/BD728213-3F77-4962-A081-F8578523A838-81x85.jpeg
1902 - http://www.suleymansoylu.com/wp-includes/css/dist/block-library/style.min.css?ver=5.2.4
1903 - http://www.suleymansoylu.com/wp-includes/js/wp-embed.min.js?ver=5.2.4
1904 - http://www.suleymansoylu.com/wp-includes/wlwmanifest.xml
1905 - http://www.suleymansoylu.com/wp-json/
1906 - http://www.suleymansoylu.com/wp-json/oembed/1.0/embed?url=http%3A%2F%2Fwww.suleymansoylu.com%2F
1907 - http://www.suleymansoylu.com/wp-json/oembed/1.0/embed?url=http%3A%2F%2Fwww.suleymansoylu.com%2F&
1908 - http://www.suleymansoylu.com/wp-login.php?action=lostpassword
1909 - http://www.suleymansoylu.com/xmlrpc.php?rsd
1910 - https://www.youtube.com/watch?v=SlQOIbUTnk8&
1911 Total external links: 59
1912
1913+ Email addresses found:
1914 Total email address found: 0
1915
1916+ Directories found:
1917 Total directories: 0
1918
1919+ Directory indexing found:
1920 Total directories with indexing: 0
1921
1922----------------------------------------------------------------------
1923
1924--Finished--
1925Summary information for domain suleymansoylu.com.
1926-----------------------------------------
1927
1928 Domain Ips Information:
1929 IP: 37.148.210.195
1930 HostName: ns1.suleymansoylu.com Type: NS
1931 HostName: ns1.technowork.com.tr Type: PTR
1932 HostName: ns2.suleymansoylu.com Type: NS
1933 HostName: mail.suleymansoylu.com Type: MX
1934 Type: SPF
1935 HostName: www.suleymansoylu.com. Type: A
1936 HostName: ftp.suleymansoylu.com. Type: A
1937 HostName: mail.suleymansoylu.com. Type: A
1938 HostName: ns1.suleymansoylu.com. Type: A
1939 HostName: ns2.suleymansoylu.com. Type: A
1940 HostName: smtp.suleymansoylu.com. Type: A
1941 HostName: pop.suleymansoylu.com. Type: A
1942 HostName: imap.suleymansoylu.com. Type: A
1943 Country: Turkey
1944 Is Active: True (reset ttl 64)
1945 Port: 21/tcp open ftp syn-ack ttl 46 vsftpd 3.0.2
1946 Port: 53/tcp open domain syn-ack ttl 46 (unknown banner: get lost)
1947 Script Info: | dns-nsid:
1948 Script Info: |_ bind.version: get lost
1949 Script Info: | fingerprint-strings:
1950 Script Info: | DNSVersionBindReqTCP:
1951 Script Info: | version
1952 Script Info: | bind
1953 Script Info: |_ lost
1954 Port: 80/tcp open http syn-ack ttl 46 nginx
1955 Script Info: |_http-favicon: Unknown favicon MD5: D41D8CD98F00B204E9800998ECF8427E
1956 Script Info: | http-methods:
1957 Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
1958 Script Info: |_http-title: Did not follow redirect to http://www.suleymansoylu.com/
1959 Port: 110/tcp open pop3 syn-ack ttl 46 Dovecot pop3d
1960 Script Info: |_pop3-capabilities: PIPELINING USER AUTH-RESP-CODE TOP STLS RESP-CODES SASL(PLAIN LOGIN) UIDL CAPA
1961 Script Info: |_ssl-date: TLS randomness does not represent time
1962 Port: 143/tcp open imap syn-ack ttl 46 Dovecot imapd
1963 Script Info: |_imap-capabilities: OK LOGIN-REFERRALS listed IMAP4rev1 IDLE SASL-IR post-login ID more have AUTH=LOGINA0001 AUTH=PLAIN STARTTLS LITERAL+ Pre-login capabilities ENABLE
1964 Script Info: |_ssl-date: TLS randomness does not represent time
1965 Port: 465/tcp open ssl/smtp syn-ack ttl 46 Exim smtpd 4.91
1966 Script Info: |_smtp-commands: SMTP EHLO nmap.scanme.org: failed to receive data: failed to receive data
1967 Script Info: | ssl-cert: Subject: commonName=lcl.local.lcl/organizationName=Vesta Control Panel/stateOrProvinceName=California/countryName=US
1968 Script Info: | Issuer: commonName=lcl.local.lcl/organizationName=Vesta Control Panel/stateOrProvinceName=California/countryName=US
1969 Script Info: | Public Key type: rsa
1970 Script Info: | Public Key bits: 4096
1971 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1972 Script Info: | Not valid before: 2019-05-23T13:48:26
1973 Script Info: | Not valid after: 2020-05-22T13:48:26
1974 Script Info: | MD5: f3e7 8e18 986c ae35 5854 05ca a0e7 6105
1975 Script Info: |_SHA-1: 66e3 fb80 829f 742a 2578 6b59 9090 bef0 6ae9 18b3
1976 Script Info: | vulners:
1977 Script Info: | cpe:/a:exim:exim:4.91:
1978 Script Info: | CVE-2019-15846 10.0 https://vulners.com/cve/CVE-2019-15846
1979 Script Info: | CVE-2019-13917 10.0 https://vulners.com/cve/CVE-2019-13917
1980 Script Info: |_ CVE-2019-10149 7.5 https://vulners.com/cve/CVE-2019-10149
1981 Port: 587/tcp open smtp syn-ack ttl 46 Exim smtpd 4.91
1982 Script Info: | smtp-commands: lcl.local.lcl Hello nmap.scanme.org [176.113.74.91], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, CHUNKING, STARTTLS, HELP,
1983 Script Info: |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
1984 Script Info: | ssl-cert: Subject: commonName=lcl.local.lcl/organizationName=Vesta Control Panel/stateOrProvinceName=California/countryName=US
1985 Script Info: | Issuer: commonName=lcl.local.lcl/organizationName=Vesta Control Panel/stateOrProvinceName=California/countryName=US
1986 Script Info: | Public Key type: rsa
1987 Script Info: | Public Key bits: 4096
1988 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1989 Script Info: | Not valid before: 2019-05-23T13:48:26
1990 Script Info: | Not valid after: 2020-05-22T13:48:26
1991 Script Info: | MD5: f3e7 8e18 986c ae35 5854 05ca a0e7 6105
1992 Script Info: |_SHA-1: 66e3 fb80 829f 742a 2578 6b59 9090 bef0 6ae9 18b3
1993 Script Info: |_ssl-date: TLS randomness does not represent time
1994 Script Info: | vulners:
1995 Script Info: | cpe:/a:exim:exim:4.91:
1996 Script Info: | CVE-2019-15846 10.0 https://vulners.com/cve/CVE-2019-15846
1997 Script Info: | CVE-2019-13917 10.0 https://vulners.com/cve/CVE-2019-13917
1998 Script Info: |_ CVE-2019-10149 7.5 https://vulners.com/cve/CVE-2019-10149
1999 Port: 993/tcp open ssl/imaps? syn-ack ttl 46
2000 Script Info: |_ssl-date: TLS randomness does not represent time
2001 Port: 995/tcp open ssl/pop3s? syn-ack ttl 46
2002 Script Info: |_ssl-date: TLS randomness does not represent time
2003 Port: 3306/tcp open mysql syn-ack ttl 46 MySQL 5.5.60-MariaDB
2004 Script Info: | mysql-info:
2005 Script Info: | Protocol: 10
2006 Script Info: | Version: 5.5.60-MariaDB
2007 Script Info: | Thread ID: 1491
2008 Script Info: | Capabilities flags: 63487
2009 Script Info: | Some Capabilities: ODBCClient, DontAllowDatabaseTableColumn, InteractiveClient, Support41Auth, LongColumnFlag, SupportsTransactions, FoundRows, ConnectWithDatabase, Speaks41ProtocolOld, Speaks41ProtocolNew, LongPassword, IgnoreSigpipes, IgnoreSpaceBeforeParenthesis, SupportsLoadDataLocal, SupportsCompression, SupportsMultipleResults, SupportsAuthPlugins, SupportsMultipleStatments
2010 Script Info: | Status: Autocommit
2011 Script Info: | Salt: DfVY>iw;_MBDmy9N[_MA
2012 Script Info: |_ Auth Plugin Name: mysql_native_password
2013 Os Info: Host: lcl.local.lcl; OS: Unix
2014#######################################################################################################################################
2015Ip Address Status Type Domain Name Server
2016---------- ------ ---- ----------- ------
201737.148.210.195 301 host ftp.suleymansoylu.com nginx
201837.148.210.195 301 host imap.suleymansoylu.com nginx
201937.148.210.195 301 host mail.suleymansoylu.com nginx
202037.148.210.195 301 host ns1.suleymansoylu.com nginx
202137.148.210.195 301 host ns2.suleymansoylu.com nginx
202237.148.210.195 301 host pop.suleymansoylu.com nginx
202337.148.210.195 301 host smtp.suleymansoylu.com nginx
202437.148.210.195 200 host www.suleymansoylu.com nginx
2025#######################################################################################################################################
2026[+] Testing domain
2027 www.suleymansoylu.com 37.148.210.195
2028[+] Dns resolving
2029 Domain name Ip address Name server
2030 suleymansoylu.com 37.148.210.195 ns1.technowork.com.tr
2031Found 1 host(s) for suleymansoylu.com
2032[+] Testing wildcard
2033 Ok, no wildcard found.
2034
2035[+] Scanning for subdomain on suleymansoylu.com
2036[!] Wordlist not specified. I scannig with my internal wordlist...
2037 Estimated time about 177.19 seconds
2038
2039 Subdomain Ip address Name server
2040
2041 ftp.suleymansoylu.com 37.148.210.195 ns1.technowork.com.tr
2042 imap.suleymansoylu.com 37.148.210.195 ns1.technowork.com.tr
2043 mail.suleymansoylu.com 37.148.210.195 ns1.technowork.com.tr
2044 ns1.suleymansoylu.com 37.148.210.195 ns1.technowork.com.tr
2045 ns2.suleymansoylu.com 37.148.210.195 ns1.technowork.com.tr
2046 pop.suleymansoylu.com 37.148.210.195 ns1.technowork.com.tr
2047 smtp.suleymansoylu.com 37.148.210.195 ns1.technowork.com.tr
2048 www.suleymansoylu.com 37.148.210.195 ns1.technowork.com.tr
2049######################################################################################################################################
2050Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-31 15:24 EDT
2051Nmap scan report for ns1.technowork.com.tr (37.148.210.195)
2052Host is up (0.17s latency).
2053Not shown: 984 filtered ports, 3 closed ports
2054Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
2055PORT STATE SERVICE
205621/tcp open ftp
205722/tcp open ssh
205853/tcp open domain
205980/tcp open http
2060110/tcp open pop3
2061143/tcp open imap
2062465/tcp open smtps
2063587/tcp open submission
2064993/tcp open imaps
2065995/tcp open pop3s
20662525/tcp open ms-v-worlds
20673306/tcp open mysql
20688083/tcp open us-srv
2069
2070Nmap done: 1 IP address (1 host up) scanned in 11.41 seconds
2071######################################################################################################################################
2072Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-31 15:24 EDT
2073Nmap scan report for ns1.technowork.com.tr (37.148.210.195)
2074Host is up (0.088s latency).
2075Not shown: 2 filtered ports
2076PORT STATE SERVICE
207753/udp open domain
207867/udp open|filtered dhcps
207968/udp open|filtered dhcpc
208069/udp open|filtered tftp
208188/udp open|filtered kerberos-sec
2082123/udp open|filtered ntp
2083139/udp open|filtered netbios-ssn
2084161/udp open|filtered snmp
2085162/udp open|filtered snmptrap
2086389/udp open|filtered ldap
2087500/udp open|filtered isakmp
2088520/udp open|filtered route
20892049/udp open|filtered nfs
2090
2091Nmap done: 1 IP address (1 host up) scanned in 1.98 seconds
2092######################################################################################################################################
2093Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-31 15:24 EDT
2094NSE: [ftp-brute] usernames: Time limit 10m00s exceeded.
2095NSE: [ftp-brute] usernames: Time limit 10m00s exceeded.
2096NSE: [ftp-brute] passwords: Time limit 10m00s exceeded.
2097Nmap scan report for ns1.technowork.com.tr (37.148.210.195)
2098Host is up (0.20s latency).
2099
2100PORT STATE SERVICE VERSION
210121/tcp open ftp vsftpd 3.0.2
2102| ftp-brute:
2103| Accounts: No valid accounts found
2104|_ Statistics: Performed 6174 guesses in 606 seconds, average tps: 10.0
2105| vulscan: VulDB - https://vuldb.com:
2106| [68991] vsftpd 3.0.2 deny_file unknown vulnerability
2107|
2108| MITRE CVE - https://cve.mitre.org:
2109| [CVE-2012-2127] fs/proc/root.c in the procfs implementation in the Linux kernel before 3.2 does not properly interact with CLONE_NEWPID clone system calls, which allows remote attackers to cause a denial of service (reference leak and memory consumption) by making many connections to a daemon that uses PID namespaces to isolate clients, as demonstrated by vsftpd.
2110| [CVE-2008-2375] Memory leak in a certain Red Hat deployment of vsftpd before 2.0.5 on Red Hat Enterprise Linux (RHEL) 3 and 4, when PAM is used, allows remote attackers to cause a denial of service (memory consumption) via a large number of invalid authentication attempts within the same session, a different vulnerability than CVE-2007-5962.
2111|
2112| SecurityFocus - https://www.securityfocus.com/bid/:
2113| [82285] Vsftpd CVE-2004-0042 Remote Security Vulnerability
2114| [72451] vsftpd CVE-2015-1419 Security Bypass Vulnerability
2115| [51013] vsftpd '__tzfile_read()' Function Heap Based Buffer Overflow Vulnerability
2116| [48539] vsftpd Compromised Source Packages Backdoor Vulnerability
2117| [46617] vsftpd FTP Server 'ls.c' Remote Denial of Service Vulnerability
2118| [41443] Vsftpd Webmin Module Multiple Unspecified Vulnerabilities
2119| [30364] vsftpd FTP Server Pluggable Authentication Module (PAM) Remote Denial of Service Vulnerability
2120| [29322] vsftpd FTP Server 'deny_file' Option Remote Denial of Service Vulnerability
2121| [10394] Vsftpd Listener Denial of Service Vulnerability
2122| [7253] Red Hat Linux 9 vsftpd Compiling Error Weakness
2123|
2124| IBM X-Force - https://exchange.xforce.ibmcloud.com:
2125| [68366] vsftpd package backdoor
2126| [65873] vsftpd vsf_filename_passes_filter denial of service
2127| [55148] VSFTPD-WEBMIN-MODULE unknown unspecified
2128| [43685] vsftpd authentication attempts denial of service
2129| [42593] vsftpd deny_file denial of service
2130| [16222] vsftpd connection denial of service
2131| [14844] vsftpd message allows attacker to obtain username
2132| [11729] Red Hat Linux vsftpd FTP daemon tcp_wrapper could allow an attacker to gain access to server
2133|
2134| Exploit-DB - https://www.exploit-db.com:
2135| [17491] VSFTPD 2.3.4 - Backdoor Command Execution
2136| [16270] vsftpd 2.3.2 - Denial of Service Vulnerability
2137| [5814] vsftpd 2.0.5 (CWD) Remote Memory Consumption Exploit (post auth)
2138|
2139| OpenVAS (Nessus) - http://www.openvas.org:
2140| [881289] CentOS Update for vsftpd CESA-2011:0337 centos5 x86_64
2141| [880533] CentOS Update for vsftpd CESA-2011:0337 centos5 i386
2142| [880479] CentOS Update for vsftpd CESA-2011:0337 centos4 i386
2143| [880293] CentOS Update for vsftpd CESA-2008:0579 centos3 i386
2144| [880025] CentOS Update for vsftpd CESA-2008:0579 centos3 x86_64
2145| [870407] RedHat Update for vsftpd RHSA-2011:0337-01
2146| [870152] RedHat Update for vsftpd RHSA-2008:0680-01
2147| [870114] RedHat Update for vsftpd RHSA-2008:0295-01
2148| [870032] RedHat Update for vsftpd RHSA-2008:0579-01
2149| [862926] Fedora Update for vsftpd FEDORA-2011-2615
2150| [862925] Fedora Update for vsftpd FEDORA-2011-2590
2151| [860821] Fedora Update for vsftpd FEDORA-2008-4347
2152| [860676] Fedora Update for vsftpd FEDORA-2008-4373
2153| [860005] Fedora Update for vsftpd FEDORA-2008-4362
2154| [840831] Ubuntu Update for vsftpd USN-1288-1
2155| [840623] Ubuntu Update for vsftpd vulnerability USN-1098-1
2156| [831351] Mandriva Update for vsftpd MDVSA-2011:049 (vsftpd)
2157| [103362] vsftpd '__tzfile_read()' Function Heap Based Buffer Overflow Vulnerability
2158| [103185] vsftpd Compromised Source Packages Backdoor Vulnerability
2159| [103101] vsftpd FTP Server 'ls.c' Remote Denial of Service Vulnerability
2160| [71966] Slackware Advisory SSA:2012-041-05 vsftpd
2161| [70770] Gentoo Security Advisory GLSA 201110-07 (vsftpd)
2162| [70399] Debian Security Advisory DSA 2305-1 (vsftpd)
2163| [65857] SLES10: Security update for vsftpd
2164| [65225] SLES9: Security update for vsftpd
2165|
2166| SecurityTracker - https://www.securitytracker.com:
2167| [1025186] vsftpd vsf_filename_passes_filter() Bug Lets Remote Authenticated Users Deny Service
2168| [1020546] vsftpd Memory Leak When Invalid Authentication Attempts Occur Lets Remote Authenticated Users Deny Service
2169| [1020079] vsftpd Memory Leak in 'deny_file' Option Lets Remote Authenticated Users Deny Service
2170| [1008628] vsftpd Discloses Whether Usernames are Valid or Not
2171|
2172| OSVDB - http://www.osvdb.org:
2173| [73573] vsftpd on vsftpd.beasts.org Trojaned Distribution
2174| [73340] vsftpd ls.c vsf_filename_passes_filter STAT Command glob Expression Remote DoS
2175| [61362] Vsftpd Webmin Module Unspecified Issues
2176| [46930] Red Hat Linux vsftpd w/ PAM Memory Exhaustion Remote DoS
2177| [45626] vsftpd deny_file Option Crafted FTP Data Remote Memory Exhaustion DoS
2178| [36515] BlockHosts sshd/vsftpd hosts.allow Arbitrary Deny Entry Manipulation
2179| [28610] vsftpd SIGURG Handler Unspecified Issue
2180| [28609] vsftpd tunable_chroot_local_user Filesystem Root Access
2181| [6861] vsftpd Login Error Message Username Enumeration
2182| [6306] vsftpd Connection Handling DoS
2183| [4564] vsftpd on Red Hat Linux Restricted Access Failure
2184|_
2185Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2186Device type: general purpose
2187Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (91%)
2188OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4.4 cpe:/o:linux:linux_kernel:2.6
2189Aggressive OS guesses: Linux 3.10 - 3.12 (91%), Linux 4.4 (91%), Linux 4.9 (91%), Linux 2.6.18 - 2.6.22 (86%), Linux 3.10 (86%), Linux 3.10 - 4.11 (85%), Linux 3.11 - 4.1 (85%), Linux 3.2 - 4.9 (85%)
2190No exact OS matches for host (test conditions non-ideal).
2191Network Distance: 25 hops
2192Service Info: OS: Unix
2193
2194TRACEROUTE (using port 21/tcp)
2195HOP RTT ADDRESS
21961 45.51 ms 10.245.204.1
21972 65.29 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
21983 65.37 ms irb-0.agg1.qc1.ca.m247.com (37.120.128.168)
21994 65.40 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
22005 65.38 ms te0-7-0-2.rcr21.ymq02.atlas.cogentco.com (38.122.42.161)
22016 65.38 ms be2090.ccr22.ymq01.atlas.cogentco.com (154.54.45.117)
22027 65.46 ms be2104.ccr22.alb02.atlas.cogentco.com (154.54.43.22)
22038 65.50 ms be3600.ccr32.bos01.atlas.cogentco.com (154.54.0.222)
22049 65.50 ms verio.bos01.atlas.cogentco.com (154.54.11.238)
220510 ... 11
220612 107.13 ms ae-3.r22.asbnva02.us.bb.gin.ntt.net (129.250.6.116)
220713 127.98 ms ae-1.r05.asbnva02.us.bb.gin.ntt.net (129.250.2.20)
220814 127.92 ms ce-0-0-0-0.r05.asbnva02.us.ce.gin.ntt.net (128.242.179.54)
220915 127.97 ms ash-eqx-01gw.voxility.net (5.254.81.129)
221016 127.98 ms ash-eqx-02t.voxility.net (5.254.109.43)
221117 192.84 ms fra-eqx-02t.voxility.net (93.115.91.27)
221218 210.04 ms fra-eq5-01c.voxility.net (93.115.91.25)
221319 210.07 ms 5.254.122.138
221420 170.76 ms 77.223.136.36
221521 236.39 ms 10.60.0.1
221622 214.86 ms 172.16.16.13
221723 ... 24
221825 197.46 ms ns1.technowork.com.tr (37.148.210.195)
2219######################################################################################################################################
2220# general
2221(gen) banner: SSH-2.0-OpenSSH_7.4
2222(gen) software: OpenSSH 7.4
2223(gen) compatibility: OpenSSH 7.3+ (some functionality from 6.6), Dropbear SSH 2016.73+ (some functionality from 0.52)
2224(gen) compression: enabled (zlib@openssh.com)
2225
2226# key exchange algorithms
2227(kex) curve25519-sha256 -- [warn] unknown algorithm
2228(kex) curve25519-sha256@libssh.org -- [info] available since OpenSSH 6.5, Dropbear SSH 2013.62
2229(kex) ecdh-sha2-nistp256 -- [fail] using weak elliptic curves
2230 `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
2231(kex) ecdh-sha2-nistp384 -- [fail] using weak elliptic curves
2232 `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
2233(kex) ecdh-sha2-nistp521 -- [fail] using weak elliptic curves
2234 `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
2235(kex) diffie-hellman-group-exchange-sha256 -- [warn] using custom size modulus (possibly weak)
2236 `- [info] available since OpenSSH 4.4
2237(kex) diffie-hellman-group16-sha512 -- [info] available since OpenSSH 7.3, Dropbear SSH 2016.73
2238(kex) diffie-hellman-group18-sha512 -- [info] available since OpenSSH 7.3
2239(kex) diffie-hellman-group-exchange-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
2240 `- [warn] using weak hashing algorithm
2241 `- [info] available since OpenSSH 2.3.0
2242(kex) diffie-hellman-group14-sha256 -- [info] available since OpenSSH 7.3, Dropbear SSH 2016.73
2243(kex) diffie-hellman-group14-sha1 -- [warn] using weak hashing algorithm
2244 `- [info] available since OpenSSH 3.9, Dropbear SSH 0.53
2245(kex) diffie-hellman-group1-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
2246 `- [fail] disabled (in client) since OpenSSH 7.0, logjam attack
2247 `- [warn] using small 1024-bit modulus
2248 `- [warn] using weak hashing algorithm
2249 `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
2250
2251# host-key algorithms
2252(key) ssh-rsa -- [info] available since OpenSSH 2.5.0, Dropbear SSH 0.28
2253(key) rsa-sha2-512 -- [info] available since OpenSSH 7.2
2254(key) rsa-sha2-256 -- [info] available since OpenSSH 7.2
2255(key) ecdsa-sha2-nistp256 -- [fail] using weak elliptic curves
2256 `- [warn] using weak random number generator could reveal the key
2257 `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
2258(key) ssh-ed25519 -- [info] available since OpenSSH 6.5
2259
2260# encryption algorithms (ciphers)
2261(enc) chacha20-poly1305@openssh.com -- [info] available since OpenSSH 6.5
2262 `- [info] default cipher since OpenSSH 6.9.
2263(enc) aes128-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
2264(enc) aes192-ctr -- [info] available since OpenSSH 3.7
2265(enc) aes256-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
2266(enc) aes128-gcm@openssh.com -- [info] available since OpenSSH 6.2
2267(enc) aes256-gcm@openssh.com -- [info] available since OpenSSH 6.2
2268(enc) aes128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
2269 `- [warn] using weak cipher mode
2270 `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
2271(enc) aes192-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
2272 `- [warn] using weak cipher mode
2273 `- [info] available since OpenSSH 2.3.0
2274(enc) aes256-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
2275 `- [warn] using weak cipher mode
2276 `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.47
2277(enc) blowfish-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
2278 `- [fail] disabled since Dropbear SSH 0.53
2279 `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
2280 `- [warn] using weak cipher mode
2281 `- [warn] using small 64-bit block size
2282 `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
2283(enc) cast128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
2284 `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
2285 `- [warn] using weak cipher mode
2286 `- [warn] using small 64-bit block size
2287 `- [info] available since OpenSSH 2.1.0
2288(enc) 3des-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
2289 `- [warn] using weak cipher
2290 `- [warn] using weak cipher mode
2291 `- [warn] using small 64-bit block size
2292 `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
2293
2294# message authentication code algorithms
2295(mac) umac-64-etm@openssh.com -- [warn] using small 64-bit tag size
2296 `- [info] available since OpenSSH 6.2
2297(mac) umac-128-etm@openssh.com -- [info] available since OpenSSH 6.2
2298(mac) hmac-sha2-256-etm@openssh.com -- [info] available since OpenSSH 6.2
2299(mac) hmac-sha2-512-etm@openssh.com -- [info] available since OpenSSH 6.2
2300(mac) hmac-sha1-etm@openssh.com -- [warn] using weak hashing algorithm
2301 `- [info] available since OpenSSH 6.2
2302(mac) umac-64@openssh.com -- [warn] using encrypt-and-MAC mode
2303 `- [warn] using small 64-bit tag size
2304 `- [info] available since OpenSSH 4.7
2305(mac) umac-128@openssh.com -- [warn] using encrypt-and-MAC mode
2306 `- [info] available since OpenSSH 6.2
2307(mac) hmac-sha2-256 -- [warn] using encrypt-and-MAC mode
2308 `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
2309(mac) hmac-sha2-512 -- [warn] using encrypt-and-MAC mode
2310 `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
2311(mac) hmac-sha1 -- [warn] using encrypt-and-MAC mode
2312 `- [warn] using weak hashing algorithm
2313 `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
2314
2315# algorithm recommendations (for OpenSSH 7.4)
2316(rec) -diffie-hellman-group14-sha1 -- kex algorithm to remove
2317(rec) -ecdh-sha2-nistp256 -- kex algorithm to remove
2318(rec) -diffie-hellman-group-exchange-sha256 -- kex algorithm to remove
2319(rec) -diffie-hellman-group1-sha1 -- kex algorithm to remove
2320(rec) -diffie-hellman-group-exchange-sha1 -- kex algorithm to remove
2321(rec) -ecdh-sha2-nistp521 -- kex algorithm to remove
2322(rec) -ecdh-sha2-nistp384 -- kex algorithm to remove
2323(rec) -ecdsa-sha2-nistp256 -- key algorithm to remove
2324(rec) -blowfish-cbc -- enc algorithm to remove
2325(rec) -3des-cbc -- enc algorithm to remove
2326(rec) -aes256-cbc -- enc algorithm to remove
2327(rec) -cast128-cbc -- enc algorithm to remove
2328(rec) -aes192-cbc -- enc algorithm to remove
2329(rec) -aes128-cbc -- enc algorithm to remove
2330(rec) -hmac-sha2-512 -- mac algorithm to remove
2331(rec) -umac-128@openssh.com -- mac algorithm to remove
2332(rec) -hmac-sha2-256 -- mac algorithm to remove
2333(rec) -umac-64@openssh.com -- mac algorithm to remove
2334(rec) -hmac-sha1 -- mac algorithm to remove
2335(rec) -hmac-sha1-etm@openssh.com -- mac algorithm to remove
2336(rec) -umac-64-etm@openssh.com -- mac algorithm to remove
2337######################################################################################################################################
2338USER_FILE => /usr/share/brutex/wordlists/simple-users.txt
2339RHOSTS => 37.148.210.195
2340RHOST => 37.148.210.195
2341[*] 37.148.210.195:22 - SSH - Using malformed packet technique
2342[*] 37.148.210.195:22 - SSH - Starting scan
2343[+] 37.148.210.195:22 - SSH - User 'admin' found
2344[-] 37.148.210.195:22 - SSH - User 'administrator' not found
2345[-] 37.148.210.195:22 - SSH - User 'anonymous' not found
2346[+] 37.148.210.195:22 - SSH - User 'backup' found
2347[-] 37.148.210.195:22 - SSH - User 'bee' not found
2348[+] 37.148.210.195:22 - SSH - User 'ftp' found
2349[-] 37.148.210.195:22 - SSH - User 'guest' not found
2350[-] 37.148.210.195:22 - SSH - User 'GUEST' not found
2351[-] 37.148.210.195:22 - SSH - User 'info' not found
2352[-] 37.148.210.195:22 - SSH - User 'mail' on could not connect
2353[-] 37.148.210.195:22 - SSH - User 'mailadmin' on could not connect
2354[-] 37.148.210.195:22 - SSH - User 'msfadmin' on could not connect
2355[-] 37.148.210.195:22 - SSH - User 'mysql' on could not connect
2356[-] 37.148.210.195:22 - SSH - User 'nobody' on could not connect
2357[-] 37.148.210.195:22 - SSH - User 'oracle' on could not connect
2358[-] 37.148.210.195:22 - SSH - User 'owaspbwa' on could not connect
2359[-] 37.148.210.195:22 - SSH - User 'postfix' on could not connect
2360[-] 37.148.210.195:22 - SSH - User 'postgres' on could not connect
2361[-] 37.148.210.195:22 - SSH - User 'private' on could not connect
2362[-] 37.148.210.195:22 - SSH - User 'proftpd' on could not connect
2363[-] 37.148.210.195:22 - SSH - User 'public' on could not connect
2364[-] 37.148.210.195:22 - SSH - User 'root' on could not connect
2365[-] 37.148.210.195:22 - SSH - User 'superadmin' on could not connect
2366[-] 37.148.210.195:22 - SSH - User 'support' on could not connect
2367[-] 37.148.210.195:22 - SSH - User 'sys' on could not connect
2368[-] 37.148.210.195:22 - SSH - User 'system' on could not connect
2369[-] 37.148.210.195:22 - SSH - User 'systemadmin' on could not connect
2370[-] 37.148.210.195:22 - SSH - User 'systemadministrator' on could not connect
2371[-] 37.148.210.195:22 - SSH - User 'test' on could not connect
2372[-] 37.148.210.195:22 - SSH - User 'tomcat' on could not connect
2373[-] 37.148.210.195:22 - SSH - User 'user' on could not connect
2374[-] 37.148.210.195:22 - SSH - User 'webmaster' on could not connect
2375[-] 37.148.210.195:22 - SSH - User 'www-data' on could not connect
2376[-] 37.148.210.195:22 - SSH - User 'Fortimanager_Access' on could not connect
2377[*] Scanned 1 of 1 hosts (100% complete)
2378[*] Auxiliary module execution completed
2379######################################################################################################################################
2380Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-31 15:42 EDT
2381Nmap scan report for ns1.technowork.com.tr (37.148.210.195)
2382Host is up (0.20s latency).
2383
2384PORT STATE SERVICE VERSION
238553/tcp open domain (unknown banner: get lost)
2386|_dns-fuzz: Server didn't response to our probe, can't fuzz
2387| dns-nsec-enum:
2388|_ No NSEC records found
2389| dns-nsec3-enum:
2390|_ DNSSEC NSEC3 not supported
2391| dns-nsid:
2392|_ bind.version: get lost
2393| fingerprint-strings:
2394| DNSVersionBindReqTCP:
2395| version
2396| bind
2397|_ lost
23981 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
2399SF-Port53-TCP:V=7.80%I=7%D=10/31%Time=5DBB3944%P=x86_64-pc-linux-gnu%r(DNS
2400SF:VersionBindReqTCP,43,"\0A\0\x06\x85\0\0\x01\0\x01\0\x01\0\0\x07version\
2401SF:x04bind\0\0\x10\0\x03\xc0\x0c\0\x10\0\x03\0\0\0\0\0\t\x08get\x20lost\xc
2402SF:0\x0c\0\x02\0\x03\0\0\0\0\0\x02\xc0\x0c");
2403Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2404Device type: general purpose
2405Running (JUST GUESSING): Linux 4.X|3.X|2.6.X (91%)
2406OS CPE: cpe:/o:linux:linux_kernel:4.4 cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:2.6
2407Aggressive OS guesses: Linux 4.4 (91%), Linux 4.9 (91%), Linux 3.10 - 3.12 (89%), Linux 2.6.18 - 2.6.22 (86%), Linux 3.10 (86%), Linux 3.10 - 3.16 (86%), Linux 4.0 (86%), Linux 3.10 - 4.11 (85%), Linux 3.11 - 4.1 (85%), Linux 3.18 (85%)
2408No exact OS matches for host (test conditions non-ideal).
2409Network Distance: 20 hops
2410
2411Host script results:
2412| dns-brute:
2413| DNS Brute-force hostnames:
2414| ns1.technowork.com.tr - 85.159.64.2
2415| ns2.technowork.com.tr - 85.159.67.2
2416| mail.technowork.com.tr - 89.19.2.235
2417| www.technowork.com.tr - 94.73.148.53
2418|_ ftp.technowork.com.tr - 94.73.148.53
2419
2420TRACEROUTE (using port 53/tcp)
2421HOP RTT ADDRESS
24221 92.81 ms 10.245.204.1
24232 93.06 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
24243 92.98 ms irb-0.agg1.qc1.ca.m247.com (37.120.128.168)
24254 92.97 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
24265 92.89 ms motl-b1-link.telia.net (62.115.162.41)
24276 93.08 ms nyk-bb3-link.telia.net (62.115.137.142)
24287 93.06 ms ash-bb3-link.telia.net (62.115.141.244)
24298 93.06 ms ash-b1-link.telia.net (62.115.143.121)
24309 93.05 ms voxility-ic-311384-ash-b3.c.telia.net (62.115.55.66)
243110 33.25 ms ash-eqx-02gw.voxility.net (5.254.81.133)
243211 79.00 ms ash-eqx-02t.voxility.net (5.254.109.43)
243312 134.85 ms fra-eqx-02t.voxility.net (93.115.91.27)
243413 155.13 ms fra-eq5-01c.voxility.net (93.115.91.25)
243514 155.15 ms 5.254.122.138
243615 217.20 ms 77.223.136.36
243716 217.23 ms 10.60.0.1
243817 217.15 ms 172.16.16.13
243918 217.18 ms 172.16.16.10
244019 217.10 ms 85-159-71-2.cizgi.net.tr (85.159.71.2)
244120 217.03 ms ns1.technowork.com.tr (37.148.210.195)
2442#######################################################################################################################################
2443HTTP/1.1 301 Moved Permanently
2444Server: nginx
2445Date: Thu, 31 Oct 2019 19:43:36 GMT
2446Content-Type: text/html; charset=UTF-8
2447Connection: keep-alive
2448Keep-Alive: timeout=60
2449X-Powered-By: PHP/5.6.40
2450X-Pingback: http://www.suleymansoylu.com/xmlrpc.php
2451X-Redirect-By: WordPress
2452Location: http://www.suleymansoylu.com/
2453######################################################################################################################################
2454<!-- STYLES -->
2455<!-- include scripts -->
2456<!-- HEADER -->
2457<!-- .HEADER -->
2458<!-- CONTENT -->
2459 <!-- MAIN -->
2460 <!-- Navigation -->
2461 <!-- .Navigation -->
2462 <!-- Content -->
2463 <!-- Home -->
2464 <!-- Slider -->
2465 <!-- .Slider -->
2466 <!-- INNER content -->
2467 <!-- .INNER content -->
2468<!-- SIDEBAR -->
2469<!-- SIDEBAR -->
2470 <!-- .Home -->
2471 <!-- .Content -->
2472 <!-- .MAIN -->
2473 <!-- CAMPAIGN -->
2474 <!-- .CAMPAIGN -->
2475<!-- .CONTENT -->
2476<!-- FOOTER -->
2477<!-- .FOOTER -->
2478#######################################################################################################################################
2479https://www.youtube.com/watch?v=SlQOIbUTnk8&feature=youtu.be
2480http://www.suleymansoylu.com/anlasiliyor-ki-turkiyede-birileri-alevi-sunni-meselesini-kasimak-icin-planlama-icinde-olmuslar/
2481http://www.suleymansoylu.com/icisleri-bakani-soylu-dogumuzda-yangin-batimizda-duyarsizlik-var/
2482http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-bagdadi-ne-kadar-teroristse-ferhat-abdi-sahin-de-o-kadar-teroristtir/
2483http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-bir-afet-durumunda-herkes-ne-yapacagini-bilecek/
2484http://www.suleymansoylu.com/icisleri-bakani-suleyman-soylu-teror-koridoruna-musamaha-gostermeyecegiz/
2485http://www.suleymansoylu.com/tb_video/icisleri-bakani-suleyman-soylu-tgrt-haber-gundem-ozel-programi-16-mayis-2019/
2486http://www.suleymansoylu.com/ukrayna-guvenlik-konferansi-konusmasi/
2487http://www.suleymansoylu.com/wp-login.php
2488http://www.suleymansoylu.com/wp-login.php?action=lostpassword
2489text/css
2490text/javascript
2491######################################################################################################################################
2492http://37.148.210.195 [301 Moved Permanently] Country[TURKEY][TR], HTTPServer[nginx], IP[37.148.210.195], PHP[5.6.40], RedirectLocation[http://www.suleymansoylu.com/], UncommonHeaders[x-redirect-by], X-Powered-By[PHP/5.6.40], nginx, x-pingback[http://www.suleymansoylu.com/xmlrpc.php]
2493http://www.suleymansoylu.com/ [200 OK] Country[TURKEY][TR], Google-API[ajax/libs/jquery/1.8.0/jquery.min.js?ver=1.8.0], Google-Analytics[Universal][UA-51514005-1], HTML5, HTTPServer[nginx], IP[37.148.210.195], JQuery[1.8.0], MetaGenerator[WordPress 5.2.4], PHP[5.6.40], PasswordField[pwd], Script[text/javascript], Title[Süleyman Soylu – İçişleri Bakanı], UncommonHeaders[link], WordPress[5.2.4], X-Powered-By[PHP/5.6.40], nginx, x-pingback[http://www.suleymansoylu.com/xmlrpc.php]
2494#######################################################################################################################################
2495
2496wig - WebApp Information Gatherer
2497
2498
2499Scanning http://www.suleymansoylu.com...
2500_______________________________ SITE INFO _______________________________
2501IP Title
250237.148.210.195 Süleyman Soylu – İçişleri Bakanı
2503
2504________________________________ VERSION ________________________________
2505Name Versions Type
2506WordPress 5.2.4 CMS
2507phpMyAdmin CMS
2508Apache 2.4.5 | 2.4.6 | 2.4.7 Platform
2509PHP 5.6.40 Platform
2510nginx Platform
2511
2512______________________________ INTERESTING ______________________________
2513URL Note Type
2514/readme.html Readme file Interesting
2515/login/ Login Page Interesting
2516/test/ Test directory Interesting
2517
2518_________________________________ TOOLS _________________________________
2519Name Link Software
2520wpscan https://github.com/wpscanteam/wpscan WordPress
2521CMSmap https://github.com/Dionach/CMSmap WordPress
2522
2523_________________________________________________________________________
2524Time: 79.4 sec Urls: 508 Fingerprints: 40401
2525#######################################################################################################################################
2526Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-31 15:46 EDT
2527NSE: Loaded 163 scripts for scanning.
2528NSE: Script Pre-scanning.
2529Initiating NSE at 15:46
2530Completed NSE at 15:46, 0.00s elapsed
2531Initiating NSE at 15:46
2532Completed NSE at 15:46, 0.00s elapsed
2533Initiating Parallel DNS resolution of 1 host. at 15:46
2534Completed Parallel DNS resolution of 1 host. at 15:46, 0.03s elapsed
2535Initiating SYN Stealth Scan at 15:46
2536Scanning ns1.technowork.com.tr (37.148.210.195) [1 port]
2537Discovered open port 80/tcp on 37.148.210.195
2538Completed SYN Stealth Scan at 15:46, 0.20s elapsed (1 total ports)
2539Initiating Service scan at 15:46
2540Scanning 1 service on ns1.technowork.com.tr (37.148.210.195)
2541Completed Service scan at 15:47, 6.62s elapsed (1 service on 1 host)
2542Initiating OS detection (try #1) against ns1.technowork.com.tr (37.148.210.195)
2543Retrying OS detection (try #2) against ns1.technowork.com.tr (37.148.210.195)
2544Initiating Traceroute at 15:47
2545Completed Traceroute at 15:47, 3.06s elapsed
2546Initiating Parallel DNS resolution of 18 hosts. at 15:47
2547Completed Parallel DNS resolution of 18 hosts. at 15:47, 5.62s elapsed
2548NSE: Script scanning 37.148.210.195.
2549Initiating NSE at 15:47
2550Completed NSE at 15:49, 125.63s elapsed
2551Initiating NSE at 15:49
2552Completed NSE at 15:49, 1.40s elapsed
2553Nmap scan report for ns1.technowork.com.tr (37.148.210.195)
2554Host is up (0.20s latency).
2555
2556PORT STATE SERVICE VERSION
255780/tcp open http nginx
2558| http-brute:
2559|_ Path "/" does not require authentication
2560|_http-chrono: Request times for /; avg: 2482.54ms; min: 2249.20ms; max: 2768.17ms
2561|_http-csrf: Couldn't find any CSRF vulnerabilities.
2562|_http-date: Thu, 31 Oct 2019 19:47:50 GMT; -1s from local time.
2563|_http-devframework: Couldn't determine the underlying framework or CMS. Try increasing 'httpspider.maxpagecount' value to spider more pages.
2564|_http-dombased-xss: Couldn't find any DOM based XSS.
2565|_http-drupal-enum: Nothing found amongst the top 100 resources,use --script-args number=<number|all> for deeper analysis)
2566|_http-errors: Couldn't find any error pages.
2567|_http-feed: Couldn't find any feeds.
2568|_http-fetch: Please enter the complete path of the directory to save data in.
2569| http-headers:
2570| Server: nginx
2571| Date: Thu, 31 Oct 2019 19:47:50 GMT
2572| Content-Type: text/html; charset=UTF-8
2573| Content-Length: 0
2574| Connection: close
2575| X-Powered-By: PHP/5.6.40
2576| X-Pingback: http://www.suleymansoylu.com/xmlrpc.php
2577| X-Redirect-By: WordPress
2578| Location: http://www.suleymansoylu.com/
2579|
2580|_ (Request type: GET)
2581|_http-jsonp-detection: Couldn't find any JSONP endpoints.
2582| http-methods:
2583|_ Supported Methods: GET HEAD POST OPTIONS
2584|_http-mobileversion-checker: ERROR: Script execution failed (use -d to debug)
2585|_http-passwd: ERROR: Script execution failed (use -d to debug)
2586| http-php-version: Logo query returned unknown hash 3dd6347a8b0582f83b2b6efbd498782f
2587| Credits query returned unknown hash a4374bb0ef46a76ab07dd1be3e7c224d
2588|_Version from header x-powered-by: PHP/5.6.40
2589|_http-security-headers:
2590| http-sitemap-generator:
2591| Directory structure:
2592| Longest directory structure:
2593| Depth: 0
2594| Dir: /
2595| Total files found (by extension):
2596|_
2597|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
2598|_http-title: Did not follow redirect to http://www.suleymansoylu.com/
2599| http-vhosts:
2600|_127 names had status 301
2601| http-waf-detect: IDS/IPS/WAF detected:
2602|_ns1.technowork.com.tr:80/?p4yl04d3=<script>alert(document.cookie)</script>
2603| http-wordpress-brute:
2604| Accounts: No valid accounts found
2605| Statistics: Performed 0 guesses in 1 seconds, average tps: 0.0
2606|_ ERROR: The service seems to have failed or is heavily firewalled...
2607| http-wordpress-enum:
2608| Search limited to top 100 themes/plugins
2609| plugins
2610| akismet
2611| photo-gallery
2612| themes
2613|_ twentyeleven 2.7
2614| http-wordpress-users:
2615| Username found: cengiz
2616|_Search stopped at ID #25. Increase the upper limit if necessary with 'http-wordpress-users.limit'
2617|_http-xssed: No previously reported XSS vuln.
2618| vulscan: VulDB - https://vuldb.com:
2619| [133852] Sangfor Sundray WLAN Controller up to 3.7.4.2 Cookie Header nginx_webconsole.php Code Execution
2620| [132132] SoftNAS Cloud 4.2.0/4.2.1 Nginx privilege escalation
2621| [131858] Puppet Discovery up to 1.3.x Nginx Container weak authentication
2622| [130644] Nginx Unit up to 1.7.0 Router Process Request Heap-based memory corruption
2623| [127759] VeryNginx 0.3.3 Web Application Firewall privilege escalation
2624| [126525] nginx up to 1.14.0/1.15.5 ngx_http_mp4_module Loop denial of service
2625| [126524] nginx up to 1.14.0/1.15.5 HTTP2 CPU Exhaustion denial of service
2626| [126523] nginx up to 1.14.0/1.15.5 HTTP2 Memory Consumption denial of service
2627| [119845] Pivotal Operations Manager up to 2.0.13/2.1.5 Nginx privilege escalation
2628| [114368] SuSE Portus 2.3 Nginx Certificate weak authentication
2629| [103517] nginx up to 1.13.2 Range Filter Request Integer Overflow memory corruption
2630| [89849] nginx RFC 3875 Namespace Conflict Environment Variable Open Redirect
2631| [87719] nginx up to 1.11.0 ngx_files.c ngx_chain_to_iovec denial of service
2632| [80760] nginx 0.6.18/1.9.9 DNS CNAME Record Crash denial of service
2633| [80759] nginx 0.6.18/1.9.9 DNS CNAME Record Use-After-Free denial of service
2634| [80758] nginx 0.6.18/1.9.9 DNS UDP Packet Crash denial of service
2635| [67677] nginx up to 1.7.3 SSL weak authentication
2636| [67296] nginx up to 1.7.3 SMTP Proxy ngx_mail_smtp_starttls privilege escalation
2637| [12822] nginx up to 1.5.11 SPDY SPDY Request Heap-based memory corruption
2638| [12824] nginx 1.5.10 on 32-bit SPDY memory corruption
2639| [11237] nginx up to 1.5.6 URI String Bypass privilege escalation
2640| [65364] nginx up to 1.1.13 Default Configuration information disclosure
2641| [8671] nginx up to 1.4 proxy_pass denial of service
2642| [8618] nginx 1.3.9/1.4.0 http/ngx_http_parse.c ngx_http_parse_chunked() memory corruption
2643| [7247] nginx 1.2.6 Proxy Function spoofing
2644| [61434] nginx 1.2.0/1.3.0 on Windows Access Restriction privilege escalation
2645| [5293] nginx up to 1.1.18 ngx_http_mp4_module MP4 File memory corruption
2646| [4843] nginx up to 1.0.13/1.1.16 HTTP Header Response Parser ngx_http_parse.c information disclosure
2647| [59645] nginx up to 0.8.9 Heap-based memory corruption
2648| [53592] nginx 0.8.36 memory corruption
2649| [53590] nginx up to 0.8.9 unknown vulnerability
2650| [51533] nginx 0.7.64 Terminal privilege escalation
2651| [50905] nginx up to 0.8.9 directory traversal
2652| [50903] nginx up to 0.8.10 NULL Pointer Dereference denial of service
2653| [50043] nginx up to 0.8.10 memory corruption
2654|
2655| MITRE CVE - https://cve.mitre.org:
2656| [CVE-2013-2070] http/modules/ngx_http_proxy_module.c in nginx 1.1.4 through 1.2.8 and 1.3.0 through 1.4.0, when proxy_pass is used with untrusted HTTP servers, allows remote attackers to cause a denial of service (crash) and obtain sensitive information from worker process memory via a crafted proxy response, a similar vulnerability to CVE-2013-2028.
2657| [CVE-2013-2028] The ngx_http_parse_chunked function in http/ngx_http_parse.c in nginx 1.3.9 through 1.4.0 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a chunked Transfer-Encoding request with a large chunk size, which triggers an integer signedness error and a stack-based buffer overflow.
2658| [CVE-2012-3380] Directory traversal vulnerability in naxsi-ui/nx_extract.py in the Naxsi module before 0.46-1 for Nginx allows local users to read arbitrary files via unspecified vectors.
2659| [CVE-2012-2089] Buffer overflow in ngx_http_mp4_module.c in the ngx_http_mp4_module module in nginx 1.0.7 through 1.0.14 and 1.1.3 through 1.1.18, when the mp4 directive is used, allows remote attackers to cause a denial of service (memory overwrite) or possibly execute arbitrary code via a crafted MP4 file.
2660| [CVE-2012-1180] Use-after-free vulnerability in nginx before 1.0.14 and 1.1.x before 1.1.17 allows remote HTTP servers to obtain sensitive information from process memory via a crafted backend response, in conjunction with a client request.
2661| [CVE-2011-4963] nginx/Windows 1.3.x before 1.3.1 and 1.2.x before 1.2.1 allows remote attackers to bypass intended access restrictions and access restricted files via (1) a trailing . (dot) or (2) certain "$index_allocation" sequences in a request.
2662| [CVE-2011-4315] Heap-based buffer overflow in compression-pointer processing in core/ngx_resolver.c in nginx before 1.0.10 allows remote resolvers to cause a denial of service (daemon crash) or possibly have unspecified other impact via a long response.
2663| [CVE-2010-2266] nginx 0.8.36 allows remote attackers to cause a denial of service (crash) via certain encoded directory traversal sequences that trigger memory corruption, as demonstrated using the "%c0.%c0." sequence.
2664| [CVE-2010-2263] nginx 0.8 before 0.8.40 and 0.7 before 0.7.66, when running on Windows, allows remote attackers to obtain source code or unparsed content of arbitrary files under the web document root by appending ::$DATA to the URI.
2665| [CVE-2009-4487] nginx 0.7.64 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.
2666| [CVE-2009-3898] Directory traversal vulnerability in src/http/modules/ngx_http_dav_module.c in nginx (aka Engine X) before 0.7.63, and 0.8.x before 0.8.17, allows remote authenticated users to create or overwrite arbitrary files via a .. (dot dot) in the Destination HTTP header for the WebDAV (1) COPY or (2) MOVE method.
2667| [CVE-2009-3896] src/http/ngx_http_parse.c in nginx (aka Engine X) 0.1.0 through 0.4.14, 0.5.x before 0.5.38, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.14 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a long URI.
2668| [CVE-2009-2629] Buffer underflow in src/http/ngx_http_parse.c in nginx 0.1.0 through 0.5.37, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.15 allows remote attackers to execute arbitrary code via crafted HTTP requests.
2669|
2670| SecurityFocus - https://www.securityfocus.com/bid/:
2671| [99534] Nginx CVE-2017-7529 Remote Integer Overflow Vulnerability
2672| [93903] Nginx CVE-2016-1247 Remote Privilege Escalation Vulnerability
2673| [91819] Nginx CVE-2016-1000105 Security Bypass Vulnerability
2674| [90967] nginx CVE-2016-4450 Denial of Service Vulnerability
2675| [82230] nginx Multiple Denial of Service Vulnerabilities
2676| [78928] Nginx CVE-2010-2266 Denial-Of-Service Vulnerability
2677| [70025] nginx CVE-2014-3616 SSL Session Fixation Vulnerability
2678| [69111] nginx SMTP Proxy Remote Command Injection Vulnerability
2679| [67507] nginx SPDY Implementation CVE-2014-0088 Arbitrary Code Execution Vulnerability
2680| [66537] nginx SPDY Implementation Heap Based Buffer Overflow Vulnerability
2681| [63814] nginx CVE-2013-4547 URI Processing Security Bypass Vulnerability
2682| [59824] Nginx CVE-2013-2070 Remote Security Vulnerability
2683| [59699] nginx 'ngx_http_parse.c' Stack Buffer Overflow Vulnerability
2684| [59496] nginx 'ngx_http_close_connection()' Remote Integer Overflow Vulnerability
2685| [59323] nginx NULL-Byte Arbitrary Code Execution Vulnerability
2686| [58105] Nginx 'access.log' Insecure File Permissions Vulnerability
2687| [57139] nginx CVE-2011-4968 Man in The Middle Vulnerability
2688| [55920] nginx CVE-2011-4963 Security Bypass Vulnerability
2689| [54331] Nginx Naxsi Module 'nx_extract.py' Script Remote File Disclosure Vulnerability
2690| [52999] nginx 'ngx_http_mp4_module.c' Buffer Overflow Vulnerability
2691| [52578] nginx 'ngx_cpystrn()' Information Disclosure Vulnerability
2692| [50710] nginx DNS Resolver Remote Heap Buffer Overflow Vulnerability
2693| [40760] nginx Remote Source Code Disclosure and Denial of Service Vulnerabilities
2694| [40434] nginx Space String Remote Source Code Disclosure Vulnerability
2695| [40420] nginx Directory Traversal Vulnerability
2696| [37711] nginx Terminal Escape Sequence in Logs Command Injection Vulnerability
2697| [36839] nginx 'ngx_http_process_request_headers()' Remote Buffer Overflow Vulnerability
2698| [36490] nginx WebDAV Multiple Directory Traversal Vulnerabilities
2699| [36438] nginx Proxy DNS Cache Domain Spoofing Vulnerability
2700| [36384] nginx HTTP Request Remote Buffer Overflow Vulnerability
2701|
2702| IBM X-Force - https://exchange.xforce.ibmcloud.com:
2703| [84623] Phusion Passenger gem for Ruby with nginx configuration insecure permissions
2704| [84172] nginx denial of service
2705| [84048] nginx buffer overflow
2706| [83923] nginx ngx_http_close_connection() integer overflow
2707| [83688] nginx null byte code execution
2708| [83103] Naxsi module for Nginx naxsi_unescape_uri() function security bypass
2709| [82319] nginx access.log information disclosure
2710| [80952] nginx SSL spoofing
2711| [77244] nginx and Microsoft Windows request security bypass
2712| [76778] Naxsi module for Nginx nx_extract.py directory traversal
2713| [74831] nginx ngx_http_mp4_module.c buffer overflow
2714| [74191] nginx ngx_cpystrn() information disclosure
2715| [74045] nginx header response information disclosure
2716| [71355] nginx ngx_resolver_copy() buffer overflow
2717| [59370] nginx characters denial of service
2718| [59369] nginx DATA source code disclosure
2719| [59047] nginx space source code disclosure
2720| [58966] nginx unspecified directory traversal
2721| [54025] nginx ngx_http_parse.c denial of service
2722| [53431] nginx WebDAV component directory traversal
2723| [53328] Nginx CRC-32 cached domain name spoofing
2724| [53250] Nginx ngx_http_parse_complex_uri() function code execution
2725|
2726| Exploit-DB - https://www.exploit-db.com:
2727| [26737] nginx 1.3.9/1.4.0 x86 Brute Force Remote Exploit
2728| [25775] Nginx HTTP Server 1.3.9-1.4.0 Chuncked Encoding Stack Buffer Overflow
2729| [25499] nginx 1.3.9-1.4.0 DoS PoC
2730| [24967] nginx 0.6.x Arbitrary Code Execution NullByte Injection
2731| [14830] nginx 0.6.38 - Heap Corruption Exploit
2732| [13822] Nginx <= 0.7.65 / 0.8.39 (dev) Source Disclosure / Download Vulnerability
2733| [13818] Nginx 0.8.36 Source Disclosure and DoS Vulnerabilities
2734| [12804] nginx [engine x] http server <= 0.6.36 Path Draversal
2735| [9901] nginx 0.7.0-0.7.61, 0.6.0-0.6.38, 0.5.0-0.5.37, 0.4.0-0.4.14 PoC
2736| [9829] nginx 0.7.61 WebDAV directory traversal
2737|
2738| OpenVAS (Nessus) - http://www.openvas.org:
2739| [864418] Fedora Update for nginx FEDORA-2012-3846
2740| [864310] Fedora Update for nginx FEDORA-2012-6238
2741| [864209] Fedora Update for nginx FEDORA-2012-6411
2742| [864204] Fedora Update for nginx FEDORA-2012-6371
2743| [864121] Fedora Update for nginx FEDORA-2012-4006
2744| [864115] Fedora Update for nginx FEDORA-2012-3991
2745| [864065] Fedora Update for nginx FEDORA-2011-16075
2746| [863654] Fedora Update for nginx FEDORA-2011-16110
2747| [861232] Fedora Update for nginx FEDORA-2007-1158
2748| [850180] SuSE Update for nginx openSUSE-SU-2012:0237-1 (nginx)
2749| [831680] Mandriva Update for nginx MDVSA-2012:043 (nginx)
2750| [802045] 64-bit Debian Linux Rootkit with nginx Doing iFrame Injection
2751| [801636] nginx HTTP Request Remote Buffer Overflow Vulnerability
2752| [103470] nginx 'ngx_http_mp4_module.c' Buffer Overflow Vulnerability
2753| [103469] nginx 'ngx_cpystrn()' Information Disclosure Vulnerability
2754| [103344] nginx DNS Resolver Remote Heap Buffer Overflow Vulnerability
2755| [100676] nginx Remote Source Code Disclosure and Denial of Service Vulnerabilities
2756| [100659] nginx Directory Traversal Vulnerability
2757| [100658] nginx Space String Remote Source Code Disclosure Vulnerability
2758| [100441] nginx Terminal Escape Sequence in Logs Command Injection Vulnerability
2759| [100321] nginx 'ngx_http_process_request_headers()' Remote Buffer Overflow Vulnerability
2760| [100277] nginx Proxy DNS Cache Domain Spoofing Vulnerability
2761| [100276] nginx HTTP Request Remote Buffer Overflow Vulnerability
2762| [100275] nginx WebDAV Multiple Directory Traversal Vulnerabilities
2763| [71574] Gentoo Security Advisory GLSA 201206-07 (nginx)
2764| [71308] Gentoo Security Advisory GLSA 201203-22 (nginx)
2765| [71297] FreeBSD Ports: nginx
2766| [71276] FreeBSD Ports: nginx
2767| [71239] Debian Security Advisory DSA 2434-1 (nginx)
2768| [66451] Fedora Core 11 FEDORA-2009-12782 (nginx)
2769| [66450] Fedora Core 10 FEDORA-2009-12775 (nginx)
2770| [66449] Fedora Core 12 FEDORA-2009-12750 (nginx)
2771| [64924] Gentoo Security Advisory GLSA 200909-18 (nginx)
2772| [64912] Fedora Core 10 FEDORA-2009-9652 (nginx)
2773| [64911] Fedora Core 11 FEDORA-2009-9630 (nginx)
2774| [64894] FreeBSD Ports: nginx
2775| [64869] Debian Security Advisory DSA 1884-1 (nginx)
2776|
2777| SecurityTracker - https://www.securitytracker.com:
2778| [1028544] nginx Bug Lets Remote Users Deny Service or Obtain Potentially Sensitive Information
2779| [1028519] nginx Stack Overflow Lets Remote Users Execute Arbitrary Code
2780| [1026924] nginx Buffer Overflow in ngx_http_mp4_module Lets Remote Users Execute Arbitrary Code
2781| [1026827] nginx HTTP Response Processing Lets Remote Users Obtain Portions of Memory Contents
2782|
2783| OSVDB - http://www.osvdb.org:
2784| [94864] cPnginx Plugin for cPanel nginx Configuration Manipulation Arbitrary File Access
2785| [93282] nginx proxy_pass Crafted Upstream Proxied Server Response Handling Worker Process Memory Disclosure
2786| [93037] nginx /http/ngx_http_parse.c Worker Process Crafted Request Handling Remote Overflow
2787| [92796] nginx ngx_http_close_connection Function Crafted r->
2788| [92634] nginx ngx_http_request.h zero_in_uri URL Null Byte Handling Remote Code Execution
2789| [90518] nginx Log Directory Permission Weakness Local Information Disclosure
2790| [88910] nginx Proxy Functionality SSL Certificate Validation MitM Spoofing Weakness
2791| [84339] nginx/Windows Multiple Request Sequence Parsing Arbitrary File Access
2792| [83617] Naxsi Module for Nginx naxsi-ui/ nx_extract.py Traversal Arbitrary File Access
2793| [81339] nginx ngx_http_mp4_module Module Atom MP4 File Handling Remote Overflow
2794| [80124] nginx HTTP Header Response Parsing Freed Memory Information Disclosure
2795| [77184] nginx ngx_resolver.c ngx_resolver_copy() Function DNS Response Parsing Remote Overflow
2796| [65531] nginx on Windows URI ::$DATA Append Arbitrary File Access
2797| [65530] nginx Encoded Traversal Sequence Memory Corruption Remote DoS
2798| [65294] nginx on Windows Encoded Space Request Remote Source Disclosure
2799| [63136] nginx on Windows 8.3 Filename Alias Request Access Rules / Authentication Bypass
2800| [62617] nginx Internal DNS Cache Poisoning Weakness
2801| [61779] nginx HTTP Request Escape Sequence Terminal Command Injection
2802| [59278] nginx src/http/ngx_http_parse.c ngx_http_process_request_headers() Function URL Handling NULL Dereference DoS
2803| [58328] nginx WebDAV Multiple Method Traversal Arbitrary File Write
2804| [58128] nginx ngx_http_parse_complex_uri() Function Underflow
2805| [44447] nginx (engine x) msie_refresh Directive Unspecified XSS
2806| [44446] nginx (engine x) ssl_verify_client Directive HTTP/0.9 Protocol Bypass
2807| [44445] nginx (engine x) ngx_http_realip_module satisfy_any Directive Unspecified Access Bypass
2808| [44444] nginx (engine x) X-Accel-Redirect Header Unspecified Traversal
2809| [44443] nginx (engine x) rtsig Method Signal Queue Overflow
2810| [44442] nginx (engine x) Worker Process Millisecond Timers Unspecified Overflow
2811|_
2812Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2813Device type: general purpose
2814Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (91%)
2815OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4.4 cpe:/o:linux:linux_kernel:2.6
2816Aggressive OS guesses: Linux 3.10 - 3.12 (91%), Linux 4.4 (91%), Linux 4.9 (91%), Linux 2.6.18 - 2.6.22 (86%), Linux 3.10 (86%), Linux 3.10 - 3.16 (86%), Linux 4.0 (86%), Linux 3.10 - 4.11 (85%), Linux 3.11 - 4.1 (85%), Linux 3.18 (85%)
2817No exact OS matches for host (test conditions non-ideal).
2818Uptime guess: 0.254 days (since Thu Oct 31 09:44:12 2019)
2819Network Distance: 20 hops
2820TCP Sequence Prediction: Difficulty=260 (Good luck!)
2821IP ID Sequence Generation: All zeros
2822
2823TRACEROUTE (using port 80/tcp)
2824HOP RTT ADDRESS
28251 43.99 ms 10.245.204.1
28262 44.04 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
28273 44.11 ms irb-0.agg1.qc1.ca.m247.com (37.120.128.168)
28284 44.10 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
28295 44.10 ms motl-b1-link.telia.net (62.115.183.72)
28306 ...
28317 44.17 ms ash-bb4-link.telia.net (62.115.136.201)
28328 44.16 ms ash-b1-link.telia.net (213.155.136.39)
28339 44.22 ms voxility-ic-311384-ash-b3.c.telia.net (62.115.55.66)
283410 44.23 ms ash-eqx-01gw.voxility.net (5.254.81.129)
283511 47.63 ms ash-eqx-02t.voxility.net (5.254.109.43)
283612 150.80 ms fra-eqx-02t.voxility.net (93.115.91.27)
283713 150.82 ms fra-eq5-01c.voxility.net (93.115.91.25)
283814 130.19 ms 5.254.122.138
283915 176.83 ms 77.223.136.36
284016 194.81 ms 10.60.0.1
284117 194.84 ms 172.16.16.13
284218 ...
284319 194.83 ms 85-159-71-2.cizgi.net.tr (85.159.71.2)
284420 225.01 ms ns1.technowork.com.tr (37.148.210.195)
2845
2846NSE: Script Post-scanning.
2847Initiating NSE at 15:49
2848Completed NSE at 15:49, 0.00s elapsed
2849Initiating NSE at 15:49
2850Completed NSE at 15:49, 0.00s elapsed
2851######################################################################################################################################
2852Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-31 15:49 EDT
2853Nmap scan report for ns1.technowork.com.tr (37.148.210.195)
2854Host is up (0.20s latency).
2855
2856PORT STATE SERVICE VERSION
2857110/tcp open pop3 Dovecot pop3d
2858| pop3-brute:
2859| Accounts: No valid accounts found
2860| Statistics: Performed 45 guesses in 41 seconds, average tps: 1.1
2861|_ ERROR: Failed to connect.
2862|_pop3-capabilities: CAPA STLS AUTH-RESP-CODE SASL(PLAIN LOGIN) RESP-CODES USER PIPELINING TOP UIDL
2863| vulscan: VulDB - https://vuldb.com:
2864| [139289] cPanel up to 68.0.14 dovecot-xaps-plugin Format privilege escalation
2865| [134480] Dovecot up to 2.3.5.2 Submission-Login Crash denial of service
2866| [134479] Dovecot up to 2.3.5.2 IMAP Server Crash denial of service
2867| [134024] Dovecot up to 2.3.5.1 JSON Encoder Username Crash denial of service
2868| [132543] Dovecot up to 2.2.36.0/2.3.4.0 Certificate Impersonation weak authentication
2869| [119762] Dovecot up to 2.2.28 dict Authentication var_expand() denial of service
2870| [114012] Dovecot up to 2.2.33 TLS SNI Restart denial of service
2871| [114009] Dovecot SMTP Delivery Email Message Out-of-Bounds memory corruption
2872| [112447] Dovecot up to 2.2.33/2.3.0 SASL Auth Memory Leak denial of service
2873| [106837] Dovecot up to 2.2.16 ssl-proxy-openssl.c ssl-proxy-opensslc denial of service
2874| [97052] Dovecot up to 2.2.26 auth-policy Unset Crash denial of service
2875| [69835] Dovecot 2.2.0/2.2.1 denial of service
2876| [13348] Dovecot up to 1.2.15/2.1.15 IMAP4/POP3 SSL/TLS Handshake denial of service
2877| [65684] Dovecot up to 2.2.6 unknown vulnerability
2878| [9807] Dovecot up to 1.2.7 on Exim Input Sanitizer privilege escalation
2879| [63692] Dovecot up to 2.0.15 spoofing
2880| [7062] Dovecot 2.1.10 mail-search.c denial of service
2881| [57517] Dovecot up to 2.0.12 Login directory traversal
2882| [57516] Dovecot up to 2.0.12 Access Restriction directory traversal
2883| [57515] Dovecot up to 2.0.12 Crash denial of service
2884| [54944] Dovecot up to 1.2.14 denial of service
2885| [54943] Dovecot up to 1.2.14 Access Restriction Symlink privilege escalation
2886| [54942] Dovecot up to 2.0.4 Access Restriction denial of service
2887| [54941] Dovecot up to 2.0.4 Access Restriction unknown vulnerability
2888| [54840] Dovecot up to 1.2.12 AGate unknown vulnerability
2889| [53277] Dovecot up to 1.2.10 denial of service
2890| [50082] Dovecot up to 1.1.6 Stack-based memory corruption
2891| [45256] Dovecot up to 1.1.5 directory traversal
2892| [44846] Dovecot 1.1.4/1.1.5 IMAP Client Crash denial of service
2893| [44546] Dovecot up to 1.0.x Access Restriction unknown vulnerability
2894| [44545] Dovecot up to 1.0.x Access Restriction unknown vulnerability
2895| [41430] Dovecot 1.0.12/1.1 Locking unknown vulnerability
2896| [40356] Dovecot 1.0.9 Cache unknown vulnerability
2897| [38222] Dovecot 1.0.2 directory traversal
2898| [36376] Dovecot up to 1.0.x directory traversal
2899| [33332] Timo Sirainen Dovecot up to 1.0test53 Off-By-One memory corruption
2900|
2901| MITRE CVE - https://cve.mitre.org:
2902| [CVE-2011-4318] Dovecot 2.0.x before 2.0.16, when ssl or starttls is enabled and hostname is used to define the proxy destination, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a valid certificate for a different hostname.
2903| [CVE-2011-2167] script-login in Dovecot 2.0.x before 2.0.13 does not follow the chroot configuration setting, which might allow remote authenticated users to conduct directory traversal attacks by leveraging a script.
2904| [CVE-2011-2166] script-login in Dovecot 2.0.x before 2.0.13 does not follow the user and group configuration settings, which might allow remote authenticated users to bypass intended access restrictions by leveraging a script.
2905| [CVE-2011-1929] lib-mail/message-header-parser.c in Dovecot 1.2.x before 1.2.17 and 2.0.x before 2.0.13 does not properly handle '\0' characters in header names, which allows remote attackers to cause a denial of service (daemon crash or mailbox corruption) via a crafted e-mail message.
2906| [CVE-2010-4011] Dovecot in Apple Mac OS X 10.6.5 10H574 does not properly manage memory for user names, which allows remote authenticated users to read the private e-mail of other persons in opportunistic circumstances via standard e-mail clients accessing a user's own mailbox, related to a "memory aliasing issue."
2907| [CVE-2010-3780] Dovecot 1.2.x before 1.2.15 allows remote authenticated users to cause a denial of service (master process outage) by simultaneously disconnecting many (1) IMAP or (2) POP3 sessions.
2908| [CVE-2010-3779] Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.beta2 grants the admin permission to the owner of each mailbox in a non-public namespace, which might allow remote authenticated users to bypass intended access restrictions by changing the ACL of a mailbox, as demonstrated by a symlinked shared mailbox.
2909| [CVE-2010-3707] plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving more specific entries that occur after less specific entries, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
2910| [CVE-2010-3706] plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving the private namespace of a user, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
2911| [CVE-2010-3304] The ACL plugin in Dovecot 1.2.x before 1.2.13 propagates INBOX ACLs to newly created mailboxes in certain configurations, which might allow remote attackers to read mailboxes that have unintended weak ACLs.
2912| [CVE-2010-0745] Unspecified vulnerability in Dovecot 1.2.x before 1.2.11 allows remote attackers to cause a denial of service (CPU consumption) via long headers in an e-mail message.
2913| [CVE-2010-0535] Dovecot in Apple Mac OS X 10.6 before 10.6.3, when Kerberos is enabled, does not properly enforce the service access control list (SACL) for sending and receiving e-mail, which allows remote authenticated users to bypass intended access restrictions via unspecified vectors.
2914| [CVE-2010-0433] The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiation, as demonstrated by a chroot installation of Dovecot or stunnel without Kerberos configuration files inside the chroot.
2915| [CVE-2009-3897] Dovecot 1.2.x before 1.2.8 sets 0777 permissions during creation of certain directories at installation time, which allows local users to access arbitrary user accounts by replacing the auth socket, related to the parent directories of the base_dir directory, and possibly the base_dir directory itself.
2916| [CVE-2009-3235] Multiple stack-based buffer overflows in the Sieve plugin in Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, as derived from Cyrus libsieve, allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SIEVE script, as demonstrated by forwarding an e-mail message to a large number of recipients, a different vulnerability than CVE-2009-2632.
2917| [CVE-2009-2632] Buffer overflow in the SIEVE script component (sieve/script.c), as used in cyrus-imapd in Cyrus IMAP Server 2.2.13 and 2.3.14, and Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, allows local users to execute arbitrary code and read or modify arbitrary messages via a crafted SIEVE script, related to the incorrect use of the sizeof operator for determining buffer length, combined with an integer signedness error.
2918| [CVE-2008-5301] Directory traversal vulnerability in the ManageSieve implementation in Dovecot 1.0.15, 1.1, and 1.2 allows remote attackers to read and modify arbitrary .sieve files via a ".." (dot dot) in a script name.
2919| [CVE-2008-4907] The message parsing feature in Dovecot 1.1.4 and 1.1.5, when using the FETCH ENVELOPE command in the IMAP client, allows remote attackers to cause a denial of service (persistent crash) via an email with a malformed From address, which triggers an assertion error, aka "invalid message address parsing bug."
2920| [CVE-2008-4870] dovecot 1.0.7 in Red Hat Enterprise Linux (RHEL) 5, and possibly Fedora, uses world-readable permissions for dovecot.conf, which allows local users to obtain the ssl_key_password parameter value.
2921| [CVE-2008-4578] The ACL plugin in Dovecot before 1.1.4 allows attackers to bypass intended access restrictions by using the "k" right to create unauthorized "parent/child/child" mailboxes.
2922| [CVE-2008-4577] The ACL plugin in Dovecot before 1.1.4 treats negative access rights as if they are positive access rights, which allows attackers to bypass intended access restrictions.
2923| [CVE-2008-1218] Argument injection vulnerability in Dovecot 1.0.x before 1.0.13, and 1.1.x before 1.1.rc3, when using blocking passdbs, allows remote attackers to bypass the password check via a password containing TAB characters, which are treated as argument delimiters that enable the skip_password_check field to be specified.
2924| [CVE-2008-1199] Dovecot before 1.0.11, when configured to use mail_extra_groups to allow Dovecot to create dotlocks in /var/mail, might allow local users to read sensitive mail files for other users, or modify files or directories that are writable by group, via a symlink attack.
2925| [CVE-2007-6598] Dovecot before 1.0.10, with certain configuration options including use of %variables, does not properly maintain the LDAP+auth cache, which might allow remote authenticated users to login as a different user who has the same password.
2926| [CVE-2007-5794] Race condition in nss_ldap, when used in applications that are linked against the pthread library and fork after a call to nss_ldap, might send user data to the wrong process because of improper handling of the LDAP connection. NOTE: this issue was originally reported for Dovecot with the wrong mailboxes being returned, but other applications might also be affected.
2927| [CVE-2007-4211] The ACL plugin in Dovecot before 1.0.3 allows remote authenticated users with the insert right to save certain flags via a (1) COPY or (2) APPEND command.
2928| [CVE-2007-2231] Directory traversal vulnerability in index/mbox/mbox-storage.c in Dovecot before 1.0.rc29, when using the zlib plugin, allows remote attackers to read arbitrary gzipped (.gz) mailboxes (mbox files) via a .. (dot dot) sequence in the mailbox name.
2929| [CVE-2007-2173] Eval injection vulnerability in (1) courier-imapd.indirect and (2) courier-pop3d.indirect in Courier-IMAP before 4.0.6-r2, and 4.1.x before 4.1.2-r1, on Gentoo Linux allows remote attackers to execute arbitrary commands via the XMAILDIR variable, related to the LOGINRUN variable.
2930| [CVE-2007-0618] Unspecified vulnerability in (1) pop3d, (2) pop3ds, (3) imapd, and (4) imapds in IBM AIX 5.3.0 has unspecified impact and attack vectors, involving an "authentication vulnerability."
2931| [CVE-2006-5973] Off-by-one buffer overflow in Dovecot 1.0test53 through 1.0.rc14, and possibly other versions, when index files are used and mmap_disable is set to "yes," allows remote authenticated IMAP or POP3 users to cause a denial of service (crash) via unspecified vectors involving the cache file.
2932| [CVE-2006-2502] Stack-based buffer overflow in pop3d in Cyrus IMAPD (cyrus-imapd) 2.3.2, when the popsubfolders option is enabled, allows remote attackers to execute arbitrary code via a long USER command.
2933| [CVE-2006-2414] Directory traversal vulnerability in Dovecot 1.0 beta and 1.0 allows remote attackers to list files and directories under the mbox parent directory and obtain mailbox names via ".." sequences in the (1) LIST or (2) DELETE IMAP command.
2934| [CVE-2006-0730] Multiple unspecified vulnerabilities in Dovecot before 1.0beta3 allow remote attackers to cause a denial of service (application crash or hang) via unspecified vectors involving (1) "potential hangs" in the APPEND command and "potential crashes" in (2) dovecot-auth and (3) imap/pop3-login. NOTE: vector 2 might be related to a double free vulnerability.
2935| [CVE-2002-0925] Format string vulnerability in mmsyslog function allows remote attackers to execute arbitrary code via (1) the USER command to mmpop3d for mmmail 0.0.13 and earlier, (2) the HELO command to mmsmtpd for mmmail 0.0.13 and earlier, or (3) the USER command to mmftpd 0.0.7 and earlier.
2936| [CVE-2001-0143] vpop3d program in linuxconf 1.23r and earlier allows local users to overwrite arbitrary files via a symlink attack.
2937| [CVE-2000-1197] POP2 or POP3 server (pop3d) in imap-uw IMAP package on FreeBSD and other operating systems creates lock files with predictable names, which allows local users to cause a denial of service (lack of mail access) for other users by creating lock files for other mail boxes.
2938| [CVE-1999-1445] Vulnerability in imapd and ipop3d in Slackware 3.4 and 3.3 with shadowing enabled, and possibly other operating systems, allows remote attackers to cause a core dump via a short sequence of USER and PASS commands that do not provide valid usernames or passwords.
2939|
2940| SecurityFocus - https://www.securityfocus.com/bid/:
2941| [103201] Dovecot CVE-2017-14461 Out-Of-Bounds Read Information Disclosure Vulnerability
2942| [97536] Dovecot CVE-2017-2669 Denial of Service Vulnerability
2943| [94639] Dovecot Auth Component CVE-2016-8652 Denial of Service Vulnerability
2944| [91175] Dovecot CVE-2016-4982 Local Information Disclosure Vulnerability
2945| [84736] Dovecot CVE-2008-4870 Local Security Vulnerability
2946| [74335] Dovecot 'ssl-proxy-openssl.c' Remote Denial of Service Vulnerability
2947| [67306] Dovecot Denial of Service Vulnerability
2948| [67219] akpop3d 'pszQuery' Remote Memory Corruption Vulnerability
2949| [63367] Dovecot Checkpassword Authentication Protocol Local Authentication Bypass Vulnerability
2950| [61763] RETIRED: Dovecot 'LIST' Command Denial of Service Vulnerability
2951| [60465] Exim for Dovecot 'use_shell' Remote Command Execution Vulnerability
2952| [60052] Dovecot 'APPEND' Parameter Denial of Service Vulnerability
2953| [56759] RETIRED: Dovecot 'mail-search.c' Denial of Service Vulnerability
2954| [50709] Dovecot SSL Certificate 'Common Name' Field Validation Security Bypass Vulnerability
2955| [48003] Dovecot 'script-login' Multiple Security Bypass Vulnerabilities
2956| [47930] Dovecot Header Name NULL Character Denial of Service Vulnerability
2957| [44874] Apple Mac OS X Dovecot (CVE-2010-4011) Memory Corruption Vulnerability
2958| [43690] Dovecot Access Control List (ACL) Multiple Remote Vulnerabilities
2959| [41964] Dovecot Access Control List (ACL) Plugin Security Bypass Weakness
2960| [39838] tpop3d Remote Denial of Service Vulnerability
2961| [39258] Dovecot Service Control Access List Security Bypass Vulnerability
2962| [37084] Dovecot Insecure 'base_dir' Permissions Local Privilege Escalation Vulnerability
2963| [36377] Dovecot Sieve Plugin Multiple Unspecified Buffer Overflow Vulnerabilities
2964| [32582] Dovecot ManageSieve Service '.sieve' Files Directory Traversal Vulnerability
2965| [31997] Dovecot Invalid Message Address Parsing Denial of Service Vulnerability
2966| [31587] Dovecot ACL Plugin Multiple Security Bypass Vulnerabilities
2967| [28181] Dovecot 'Tab' Character Password Check Security Bypass Vulnerability
2968| [28092] Dovecot 'mail_extra_groups' Insecure Settings Local Unauthorized Access Vulnerability
2969| [27093] Dovecot Authentication Cache Security Bypass Vulnerability
2970| [25182] Dovecot ACL Plugin Security Bypass Vulnerability
2971| [23552] Dovecot Zlib Plugin Remote Information Disclosure Vulnerability
2972| [22262] IBM AIX Pop3D/Pop3DS/IMapD/IMapDS Authentication Bypass Vulnerability
2973| [21183] Dovecot IMAP Server Mapped Pages Off-By-One Buffer Overflow Vulnerability
2974| [18056] Cyrus IMAPD POP3D Remote Buffer Overflow Vulnerability
2975| [17961] Dovecot Remote Information Disclosure Vulnerability
2976| [16672] Dovecot Double Free Denial of Service Vulnerability
2977| [8495] akpop3d User Name SQL Injection Vulnerability
2978| [8473] Vpop3d Remote Denial Of Service Vulnerability
2979| [3990] ZPop3D Bad Login Logging Failure Vulnerability
2980| [2781] DynFX MailServer POP3d Denial of Service Vulnerability
2981|
2982| IBM X-Force - https://exchange.xforce.ibmcloud.com:
2983| [86382] Dovecot POP3 Service denial of service
2984| [84396] Dovecot IMAP APPEND denial of service
2985| [80453] Dovecot mail-search.c denial of service
2986| [71354] Dovecot SSL Common Name (CN) weak security
2987| [67675] Dovecot script-login security bypass
2988| [67674] Dovecot script-login directory traversal
2989| [67589] Dovecot header name denial of service
2990| [63267] Apple Mac OS X Dovecot information disclosure
2991| [62340] Dovecot mailbox security bypass
2992| [62339] Dovecot IMAP or POP3 denial of service
2993| [62256] Dovecot mailbox security bypass
2994| [62255] Dovecot ACL entry security bypass
2995| [60639] Dovecot ACL plugin weak security
2996| [57267] Apple Mac OS X Dovecot Kerberos security bypass
2997| [56763] Dovecot header denial of service
2998| [54363] Dovecot base_dir privilege escalation
2999| [53248] CMU Sieve plugin for Dovecot unspecified buffer overflow
3000| [46323] Dovecot dovecot.conf information disclosure
3001| [46227] Dovecot message parsing denial of service
3002| [45669] Dovecot ACL mailbox security bypass
3003| [45667] Dovecot ACL plugin rights security bypass
3004| [41085] Dovecot TAB characters authentication bypass
3005| [41009] Dovecot mail_extra_groups option unauthorized access
3006| [39342] Dovecot LDAP auth cache configuration security bypass
3007| [35767] Dovecot ACL plugin security bypass
3008| [34082] Dovecot mbox-storage.c directory traversal
3009| [30433] Dovecot IMAP/POP3 server dovecot.index.cache buffer overflow
3010| [26578] Cyrus IMAP pop3d buffer overflow
3011| [26536] Dovecot IMAP LIST information disclosure
3012| [24710] Dovecot dovecot-auth and imap/pop3-login denial of service
3013| [24709] Dovecot APPEND command denial of service
3014| [13018] akpop3d authentication code SQL injection
3015| [7345] Slackware Linux imapd and ipop3d core dump
3016| [6269] imap, ipop2d and ipop3d buffer overflows
3017| [5923] Linuxconf vpop3d symbolic link
3018| [4918] IPOP3D, Buffer overflow attack
3019| [1560] IPOP3D, user login successful
3020| [1559] IPOP3D user login to remote host successful
3021| [1525] IPOP3D, user logout
3022| [1524] IPOP3D, user auto-logout
3023| [1523] IPOP3D, user login failure
3024| [1522] IPOP3D, brute force attack
3025| [1521] IPOP3D, user kiss of death logout
3026| [418] pop3d mktemp creates insecure temporary files
3027|
3028| Exploit-DB - https://www.exploit-db.com:
3029| [25297] Dovecot with Exim sender_address Parameter - Remote Command Execution
3030| [23053] Vpop3d Remote Denial of Service Vulnerability
3031| [16836] Cyrus IMAPD pop3d popsubfolders USER Buffer Overflow
3032| [11893] tPop3d 1.5.3 DoS
3033| [5257] Dovecot IMAP 1.0.10 <= 1.1rc2 - Remote Email Disclosure Exploit
3034| [2185] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (3)
3035| [2053] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (2)
3036| [1813] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit
3037|
3038| OpenVAS (Nessus) - http://www.openvas.org:
3039| [901026] Dovecot Sieve Plugin Multiple Buffer Overflow Vulnerabilities
3040| [901025] Dovecot Version Detection
3041| [881402] CentOS Update for dovecot CESA-2011:1187 centos5 x86_64
3042| [881358] CentOS Update for dovecot CESA-2011:1187 centos4 x86_64
3043| [880980] CentOS Update for dovecot CESA-2011:1187 centos5 i386
3044| [880967] CentOS Update for dovecot CESA-2011:1187 centos4 i386
3045| [870607] RedHat Update for dovecot RHSA-2011:0600-01
3046| [870471] RedHat Update for dovecot RHSA-2011:1187-01
3047| [870153] RedHat Update for dovecot RHSA-2008:0297-02
3048| [863272] Fedora Update for dovecot FEDORA-2011-7612
3049| [863115] Fedora Update for dovecot FEDORA-2011-7258
3050| [861525] Fedora Update for dovecot FEDORA-2007-664
3051| [861394] Fedora Update for dovecot FEDORA-2007-493
3052| [861333] Fedora Update for dovecot FEDORA-2007-1485
3053| [860845] Fedora Update for dovecot FEDORA-2008-9202
3054| [860663] Fedora Update for dovecot FEDORA-2008-2475
3055| [860169] Fedora Update for dovecot FEDORA-2008-2464
3056| [860089] Fedora Update for dovecot FEDORA-2008-9232
3057| [840950] Ubuntu Update for dovecot USN-1295-1
3058| [840668] Ubuntu Update for dovecot USN-1143-1
3059| [840583] Ubuntu Update for dovecot vulnerabilities USN-1059-1
3060| [840335] Ubuntu Update for dovecot vulnerabilities USN-593-1
3061| [840290] Ubuntu Update for dovecot vulnerability USN-567-1
3062| [840234] Ubuntu Update for dovecot vulnerability USN-666-1
3063| [840072] Ubuntu Update for dovecot vulnerability USN-487-1
3064| [831405] Mandriva Update for dovecot MDVSA-2011:101 (dovecot)
3065| [831230] Mandriva Update for dovecot MDVSA-2010:217 (dovecot)
3066| [831197] Mandriva Update for dovecot MDVSA-2010:196 (dovecot)
3067| [831054] Mandriva Update for dovecot MDVSA-2010:104 (dovecot)
3068| [830496] Mandriva Update for dovecot MDVSA-2008:232 (dovecot)
3069| [801055] Dovecot 'base_dir' Insecure Permissions Security Bypass Vulnerability
3070| [800030] Dovecot ACL Plugin Security Bypass Vulnerabilities
3071| [70767] Gentoo Security Advisory GLSA 201110-04 (Dovecot)
3072| [70259] FreeBSD Ports: dovecot
3073| [69959] Debian Security Advisory DSA 2252-1 (dovecot)
3074| [66522] FreeBSD Ports: dovecot
3075| [65010] Ubuntu USN-838-1 (dovecot)
3076| [64978] Debian Security Advisory DSA 1892-1 (dovecot)
3077| [64953] Mandrake Security Advisory MDVSA-2009:242-1 (dovecot)
3078| [64952] Mandrake Security Advisory MDVSA-2009:242 (dovecot)
3079| [64861] Fedora Core 10 FEDORA-2009-9559 (dovecot)
3080| [62965] Gentoo Security Advisory GLSA 200812-16 (dovecot)
3081| [62854] FreeBSD Ports: dovecot-managesieve
3082| [61916] FreeBSD Ports: dovecot
3083| [60588] Gentoo Security Advisory GLSA 200803-25 (dovecot)
3084| [60568] Debian Security Advisory DSA 1516-1 (dovecot)
3085| [60528] FreeBSD Ports: dovecot
3086| [60134] Debian Security Advisory DSA 1457-1 (dovecot)
3087| [60089] FreeBSD Ports: dovecot
3088| [58578] Debian Security Advisory DSA 1359-1 (dovecot)
3089| [56834] Debian Security Advisory DSA 1080-1 (dovecot)
3090|
3091| SecurityTracker - https://www.securitytracker.com:
3092| [1028585] Dovecot APPEND Parameter Processing Flaw Lets Remote Authenticated Users Deny Service
3093| [1024740] Mac OS X Server Dovecot Memory Aliasing Bug May Cause Mail to Be Delivered to the Wrong User
3094| [1017288] Dovecot POP3/IMAP Cache File Buffer Overflow May Let Remote Users Execute Arbitrary Code
3095|
3096| OSVDB - http://www.osvdb.org:
3097| [96172] Dovecot POP3 Service Terminated LIST Command Remote DoS
3098| [93525] Dovecot IMAP APPEND Command Malformed Parameter Parsing Remote DoS
3099| [93004] Dovecot with Exim sender_address Parameter Remote Command Execution
3100| [88058] Dovecot lib-storage/mail-search.c Multiple Keyword Search Handling Remote DoS
3101| [77185] Dovecot SSL Certificate Common Name Field MitM Spoofing Weakness
3102| [74515] Dovecot script-login chroot Configuration Setting Traversal Arbitrary File Access
3103| [74514] Dovecot script-login User / Group Configuration Settings Remote Access Restriction Bypass
3104| [72495] Dovecot lib-mail/message-header-parser.c Mail Header Name NULL Character Handling Remote DoS
3105| [69260] Apple Mac OS X Server Dovecot Memory Aliasing Mail Delivery Issue
3106| [68516] Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition User Private Namespace Mailbox Access Restriction Remote Bypass
3107| [68515] Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition Specific Entry Order Mailbox Access Restriction Remote Bypass
3108| [68513] Dovecot Non-public Namespace Mailbox ACL Manipulation Access Restriction Remote Bypass
3109| [68512] Dovecot IMAP / POP3 Session Disconnect Master Process Outage Remote DoS
3110| [66625] Dovecot ACL Plugin INBOX ACL Copying Weakness Restriction Bypass
3111| [66113] Dovecot Mail Root Directory Creation Permission Weakness
3112| [66112] Dovecot Installation base_dir Parent Directory Permission Weakness
3113| [66111] Dovecot SEARCH Functionality str_find_init() Function Overflow
3114| [66110] Dovecot Multiple Unspecified Buffer Overflows
3115| [66108] Dovecot Malformed Message Body Processing Unspecified Functions Remote DoS
3116| [64783] Dovecot E-mail Message Header Unspecified DoS
3117| [63372] Apple Mac OS X Dovecot Kerberos Authentication SACL Restriction Bypass
3118| [62796] Dovecot mbox Format Email Header Handling DoS
3119| [60316] Dovecot base_dir Directory Permission Weakness Local Privilege Escalation
3120| [58103] Dovecot CMU Sieve Plugin Script Handling Multiple Overflows
3121| [50253] Dovecot dovecot.conf Permission Weakness Local ssl_key_password Parameter Disclosure
3122| [49918] Dovecot ManageSieve Script Name Handling Traversal Arbitrary File Manipulation
3123| [49429] Dovecot Message Parsing Feature Crafted Email Header Handling Remote DoS
3124| [49099] Dovecot ACL Plugin k Right Mailbox Creation Restriction Bypass
3125| [49098] Dovecot ACL Plugin Negative Access Rights Bypass
3126| [43137] Dovecot mail_extra_groups Symlink File Manipulation
3127| [42979] Dovecot passdbs Argument Injection Authentication Bypass
3128| [39876] Dovecot LDAP Auth Cache Security Bypass
3129| [39386] Dovecot ACL Plugin Insert Right APPEND / COPY Command Unauthorized Flag Manipulation
3130| [35489] Dovecot index/mbox/mbox-storage.c Traversal Arbitrary Gzip File Access
3131| [30524] Dovecot IMAP/POP3 Server dovecot.index.cache Handling Overflow
3132| [25853] Cyrus IMAPD pop3d USER Command Remote Overflow
3133| [25727] Dovecot Multiple Command Traversal Arbitrary Directory Listing
3134| [23281] Dovecot imap/pop3-login dovecot-auth DoS
3135| [23280] Dovecot Malformed APPEND Command DoS
3136| [14459] mmmail mmpop3d USER Command mmsyslog Function Format String
3137| [12033] Slackware Linux imapd/ipop3d Malformed USER/PASS Sequence DoS
3138| [5857] Linux pop3d Arbitrary Mail File Access
3139| [2471] akpop3d username SQL Injection
3140|_
3141Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
3142Device type: general purpose
3143Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (91%)
3144OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4.4 cpe:/o:linux:linux_kernel:2.6
3145Aggressive OS guesses: Linux 3.10 - 3.12 (91%), Linux 4.4 (91%), Linux 4.9 (89%), Linux 2.6.18 - 2.6.22 (86%), Linux 3.10 - 3.16 (86%), Linux 4.0 (86%), Linux 3.10 - 4.11 (85%), Linux 3.11 - 4.1 (85%), Linux 3.2 - 4.9 (85%)
3146No exact OS matches for host (test conditions non-ideal).
3147Network Distance: 20 hops
3148
3149TRACEROUTE (using port 110/tcp)
3150HOP RTT ADDRESS
31511 101.44 ms 10.245.204.1
31522 101.50 ms vlan102.as02.qc1.ca.m247.com (176.113.74.17)
31533 101.52 ms irb-0.agg1.qc1.ca.m247.com (37.120.128.168)
31544 101.50 ms te-1-5-2-0.bb1.fra2.de.m247.com (82.102.29.44)
31555 101.52 ms motl-b1-link.telia.net (62.115.183.72)
31566 101.57 ms nyk-bb4-link.telia.net (62.115.134.52)
31577 101.57 ms ash-bb4-link.telia.net (62.115.136.201)
31588 101.61 ms ash-b1-link.telia.net (62.115.143.79)
31599 101.61 ms voxility-ic-311384-ash-b3.c.telia.net (62.115.55.66)
316010 37.74 ms ash-eqx-01gw.voxility.net (5.254.81.129)
316111 80.35 ms ash-eqx-02t.voxility.net (5.254.109.43)
316212 122.12 ms fra-eqx-02t.voxility.net (93.115.91.27)
316313 161.14 ms fra-eq5-01c.voxility.net (93.115.91.25)
316414 179.57 ms 5.254.122.138
316515 225.42 ms 77.223.136.36
316616 225.57 ms 10.60.0.1
316717 225.47 ms 172.16.16.13
316818 225.48 ms 172.16.16.10
316919 225.43 ms 85-159-71-2.cizgi.net.tr (85.159.71.2)
317020 206.27 ms ns1.technowork.com.tr (37.148.210.195)
3171######################################################################################################################################
3172--------------------------------------------------------
3173<<<Yasuo discovered following vulnerable applications>>>
3174--------------------------------------------------------
3175+------------+--------------------------------------+--------------------------------------------------+-----------+-----------+
3176| App Name | URL to Application | Potential Exploit | Username | Password |
3177+------------+--------------------------------------+--------------------------------------------------+-----------+-----------+
3178| phpMyAdmin | http://37.148.210.195:80/phpmyadmin/ | ./exploits/multi/http/phpmyadmin_preg_replace.rb | Not Found | Not Found |
3179+------------+--------------------------------------+--------------------------------------------------+-----------+-----------+
3180#######################################################################################################################################
3181Starting Nmap 7.80 ( https://nmap.org ) at 2019-10-31 15:53 EDT
3182NSE: Loaded 47 scripts for scanning.
3183NSE: Script Pre-scanning.
3184Initiating NSE at 15:53
3185Completed NSE at 15:53, 0.00s elapsed
3186Initiating NSE at 15:53
3187Completed NSE at 15:53, 0.00s elapsed
3188Initiating Ping Scan at 15:53
3189Scanning 37.148.210.195 [4 ports]
3190Completed Ping Scan at 15:53, 0.22s elapsed (1 total hosts)
3191Initiating Parallel DNS resolution of 1 host. at 15:53
3192Completed Parallel DNS resolution of 1 host. at 15:53, 0.03s elapsed
3193Initiating SYN Stealth Scan at 15:53
3194Scanning ns1.technowork.com.tr (37.148.210.195) [65535 ports]
3195Discovered open port 53/tcp on 37.148.210.195
3196Discovered open port 22/tcp on 37.148.210.195
3197Discovered open port 80/tcp on 37.148.210.195
3198Discovered open port 3306/tcp on 37.148.210.195
3199Discovered open port 21/tcp on 37.148.210.195
3200SYN Stealth Scan Timing: About 8.20% done; ETC: 16:00 (0:05:47 remaining)
3201SYN Stealth Scan Timing: About 27.26% done; ETC: 15:57 (0:02:43 remaining)
3202Discovered open port 8083/tcp on 37.148.210.195
3203SYN Stealth Scan Timing: About 29.77% done; ETC: 15:58 (0:03:35 remaining)
3204SYN Stealth Scan Timing: About 46.54% done; ETC: 15:58 (0:02:19 remaining)
3205SYN Stealth Scan Timing: About 65.36% done; ETC: 15:57 (0:01:20 remaining)
3206SYN Stealth Scan Timing: About 84.40% done; ETC: 15:57 (0:00:33 remaining)
3207Completed SYN Stealth Scan at 15:57, 203.56s elapsed (65535 total ports)
3208Initiating Service scan at 15:57
3209Scanning 6 services on ns1.technowork.com.tr (37.148.210.195)
3210Completed Service scan at 15:57, 16.43s elapsed (6 services on 1 host)
3211Initiating OS detection (try #1) against ns1.technowork.com.tr (37.148.210.195)
3212Retrying OS detection (try #2) against ns1.technowork.com.tr (37.148.210.195)
3213Initiating Traceroute at 15:57
3214Completed Traceroute at 15:57, 0.11s elapsed
3215Initiating Parallel DNS resolution of 2 hosts. at 15:57
3216Completed Parallel DNS resolution of 2 hosts. at 15:57, 0.00s elapsed
3217NSE: Script scanning 37.148.210.195.
3218Initiating NSE at 15:57
3219Completed NSE at 15:57, 14.15s elapsed
3220Initiating NSE at 15:57
3221Completed NSE at 15:57, 1.39s elapsed
3222Nmap scan report for ns1.technowork.com.tr (37.148.210.195)
3223Host is up (0.11s latency).
3224Not shown: 65526 filtered ports
3225PORT STATE SERVICE VERSION
322621/tcp open ftp vsftpd 3.0.2
3227| vulscan: VulDB - https://vuldb.com:
3228| [68991] vsftpd 3.0.2 deny_file unknown vulnerability
3229|
3230| MITRE CVE - https://cve.mitre.org:
3231| [CVE-2012-2127] fs/proc/root.c in the procfs implementation in the Linux kernel before 3.2 does not properly interact with CLONE_NEWPID clone system calls, which allows remote attackers to cause a denial of service (reference leak and memory consumption) by making many connections to a daemon that uses PID namespaces to isolate clients, as demonstrated by vsftpd.
3232| [CVE-2008-2375] Memory leak in a certain Red Hat deployment of vsftpd before 2.0.5 on Red Hat Enterprise Linux (RHEL) 3 and 4, when PAM is used, allows remote attackers to cause a denial of service (memory consumption) via a large number of invalid authentication attempts within the same session, a different vulnerability than CVE-2007-5962.
3233|
3234| SecurityFocus - https://www.securityfocus.com/bid/:
3235| [82285] Vsftpd CVE-2004-0042 Remote Security Vulnerability
3236| [72451] vsftpd CVE-2015-1419 Security Bypass Vulnerability
3237| [51013] vsftpd '__tzfile_read()' Function Heap Based Buffer Overflow Vulnerability
3238| [48539] vsftpd Compromised Source Packages Backdoor Vulnerability
3239| [46617] vsftpd FTP Server 'ls.c' Remote Denial of Service Vulnerability
3240| [41443] Vsftpd Webmin Module Multiple Unspecified Vulnerabilities
3241| [30364] vsftpd FTP Server Pluggable Authentication Module (PAM) Remote Denial of Service Vulnerability
3242| [29322] vsftpd FTP Server 'deny_file' Option Remote Denial of Service Vulnerability
3243| [10394] Vsftpd Listener Denial of Service Vulnerability
3244| [7253] Red Hat Linux 9 vsftpd Compiling Error Weakness
3245|
3246| IBM X-Force - https://exchange.xforce.ibmcloud.com:
3247| [68366] vsftpd package backdoor
3248| [65873] vsftpd vsf_filename_passes_filter denial of service
3249| [55148] VSFTPD-WEBMIN-MODULE unknown unspecified
3250| [43685] vsftpd authentication attempts denial of service
3251| [42593] vsftpd deny_file denial of service
3252| [16222] vsftpd connection denial of service
3253| [14844] vsftpd message allows attacker to obtain username
3254| [11729] Red Hat Linux vsftpd FTP daemon tcp_wrapper could allow an attacker to gain access to server
3255|
3256| Exploit-DB - https://www.exploit-db.com:
3257| [17491] VSFTPD 2.3.4 - Backdoor Command Execution
3258| [16270] vsftpd 2.3.2 - Denial of Service Vulnerability
3259| [5814] vsftpd 2.0.5 (CWD) Remote Memory Consumption Exploit (post auth)
3260|
3261| OpenVAS (Nessus) - http://www.openvas.org:
3262| [881289] CentOS Update for vsftpd CESA-2011:0337 centos5 x86_64
3263| [880533] CentOS Update for vsftpd CESA-2011:0337 centos5 i386
3264| [880479] CentOS Update for vsftpd CESA-2011:0337 centos4 i386
3265| [880293] CentOS Update for vsftpd CESA-2008:0579 centos3 i386
3266| [880025] CentOS Update for vsftpd CESA-2008:0579 centos3 x86_64
3267| [870407] RedHat Update for vsftpd RHSA-2011:0337-01
3268| [870152] RedHat Update for vsftpd RHSA-2008:0680-01
3269| [870114] RedHat Update for vsftpd RHSA-2008:0295-01
3270| [870032] RedHat Update for vsftpd RHSA-2008:0579-01
3271| [862926] Fedora Update for vsftpd FEDORA-2011-2615
3272| [862925] Fedora Update for vsftpd FEDORA-2011-2590
3273| [860821] Fedora Update for vsftpd FEDORA-2008-4347
3274| [860676] Fedora Update for vsftpd FEDORA-2008-4373
3275| [860005] Fedora Update for vsftpd FEDORA-2008-4362
3276| [840831] Ubuntu Update for vsftpd USN-1288-1
3277| [840623] Ubuntu Update for vsftpd vulnerability USN-1098-1
3278| [831351] Mandriva Update for vsftpd MDVSA-2011:049 (vsftpd)
3279| [103362] vsftpd '__tzfile_read()' Function Heap Based Buffer Overflow Vulnerability
3280| [103185] vsftpd Compromised Source Packages Backdoor Vulnerability
3281| [103101] vsftpd FTP Server 'ls.c' Remote Denial of Service Vulnerability
3282| [71966] Slackware Advisory SSA:2012-041-05 vsftpd
3283| [70770] Gentoo Security Advisory GLSA 201110-07 (vsftpd)
3284| [70399] Debian Security Advisory DSA 2305-1 (vsftpd)
3285| [65857] SLES10: Security update for vsftpd
3286| [65225] SLES9: Security update for vsftpd
3287|
3288| SecurityTracker - https://www.securitytracker.com:
3289| [1025186] vsftpd vsf_filename_passes_filter() Bug Lets Remote Authenticated Users Deny Service
3290| [1020546] vsftpd Memory Leak When Invalid Authentication Attempts Occur Lets Remote Authenticated Users Deny Service
3291| [1020079] vsftpd Memory Leak in 'deny_file' Option Lets Remote Authenticated Users Deny Service
3292| [1008628] vsftpd Discloses Whether Usernames are Valid or Not
3293|
3294| OSVDB - http://www.osvdb.org:
3295| [73573] vsftpd on vsftpd.beasts.org Trojaned Distribution
3296| [73340] vsftpd ls.c vsf_filename_passes_filter STAT Command glob Expression Remote DoS
3297| [61362] Vsftpd Webmin Module Unspecified Issues
3298| [46930] Red Hat Linux vsftpd w/ PAM Memory Exhaustion Remote DoS
3299| [45626] vsftpd deny_file Option Crafted FTP Data Remote Memory Exhaustion DoS
3300| [36515] BlockHosts sshd/vsftpd hosts.allow Arbitrary Deny Entry Manipulation
3301| [28610] vsftpd SIGURG Handler Unspecified Issue
3302| [28609] vsftpd tunable_chroot_local_user Filesystem Root Access
3303| [6861] vsftpd Login Error Message Username Enumeration
3304| [6306] vsftpd Connection Handling DoS
3305| [4564] vsftpd on Red Hat Linux Restricted Access Failure
3306|_
330722/tcp open ssh OpenSSH 7.4 (protocol 2.0)
3308| vulners:
3309| cpe:/a:openbsd:openssh:7.4:
3310| CVE-2018-15919 5.0 https://vulners.com/cve/CVE-2018-15919
3311|_ CVE-2017-15906 5.0 https://vulners.com/cve/CVE-2017-15906
3312| vulscan: VulDB - https://vuldb.com:
3313| [130671] gsi-openssh-server 7.9p1 on Fedora /etc/gsissh/sshd_config weak authentication
3314| [130371] OpenSSH 7.9 scp Man-in-the-Middle directory traversal
3315| [130370] OpenSSH 7.9 Man-in-the-Middle spoofing
3316| [130369] OpenSSH 7.9 Encoding progressmeter.c refresh_progress_meter() spoofing
3317| [129007] OpenSSH 7.9 scp Client scp.c Filename privilege escalation
3318| [123343] OpenSSH up to 7.8 GSS2 auth-gss2.c information disclosure
3319| [123011] OpenSSH up to 7.7 auth2-gss.c Request information disclosure
3320| [112267] OpenSSH up to 7.3 sshd kex.c/packet.c NEWKEYS Message denial of service
3321| [108627] OpenSSH up to 7.5 Readonly Mode sftp-server.c process_open unknown vulnerability
3322| [94611] OpenSSH up to 7.3 Access Control privilege escalation
3323| [94610] OpenSSH up to 7.3 Shared Memory Manager privilege escalation
3324| [94608] OpenSSH up to 7.3 Unix-Domain Socket privilege escalation
3325| [94607] OpenSSH up to 7.3 Forwarded Agent Channel privilege escalation
3326| [90671] OpenSSH up to 7.2 auth-passwd.c auth_password denial of service
3327| [90405] OpenSSH up to 7.2p2 sshd information disclosure
3328| [90404] OpenSSH up to 7.2p2 sshd information disclosure
3329| [90403] OpenSSH up to 7.2p2 sshd CPU Exhaustion denial of service
3330| [89622] OpenSSH 7.2p2 Authentication Username information disclosure
3331| [81320] OpenSSH up to 7.2p1 X11 Authentication Credential xauth privilege escalation
3332| [80656] OpenBSD OpenSSH 7.1 X11 Forwarding privilege escalation
3333| [80330] OpenSSH up to 7.1p1 packet.c ssh_packet_read_poll2 memory corruption
3334|
3335| MITRE CVE - https://cve.mitre.org:
3336| [CVE-2010-4755] The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in SSH_FXP_STAT requests to an sftp daemon, a different vulnerability than CVE-2010-2632.
3337| [CVE-1999-0661] A system is running a version of software that was replaced with a Trojan Horse at one of its distribution points, such as (1) TCP Wrappers 7.6, (2) util-linux 2.9g, (3) wuarchive ftpd (wuftpd) 2.2 and 2.1f, (4) IRC client (ircII) ircII 2.2.9, (5) OpenSSH 3.4p1, or (6) Sendmail 8.12.6.
3338|
3339| SecurityFocus - https://www.securityfocus.com/bid/:
3340| [102780] OpenSSH CVE-2016-10708 Multiple Denial of Service Vulnerabilities
3341| [101552] OpenSSH 'sftp-server.c' Remote Security Bypass Vulnerability
3342| [94977] OpenSSH CVE-2016-10011 Local Information Disclosure Vulnerability
3343| [94975] OpenSSH CVE-2016-10012 Security Bypass Vulnerability
3344| [94972] OpenSSH CVE-2016-10010 Privilege Escalation Vulnerability
3345| [94968] OpenSSH CVE-2016-10009 Remote Code Execution Vulnerability
3346| [93776] OpenSSH 'ssh/kex.c' Denial of Service Vulnerability
3347| [92212] OpenSSH CVE-2016-6515 Denial of Service Vulnerability
3348| [92210] OpenSSH CBC Padding Weak Encryption Security Weakness
3349| [92209] OpenSSH MAC Verification Security Bypass Vulnerability
3350| [91812] OpenSSH CVE-2016-6210 User Enumeration Vulnerability
3351| [90440] OpenSSH CVE-2004-1653 Remote Security Vulnerability
3352| [90340] OpenSSH CVE-2004-2760 Remote Security Vulnerability
3353| [89385] OpenSSH CVE-2005-2666 Local Security Vulnerability
3354| [88655] OpenSSH CVE-2001-1382 Remote Security Vulnerability
3355| [88513] OpenSSH CVE-2000-0999 Remote Security Vulnerability
3356| [88367] OpenSSH CVE-1999-1010 Local Security Vulnerability
3357| [87789] OpenSSH CVE-2003-0682 Remote Security Vulnerability
3358| [86187] OpenSSH 'session.c' Local Security Bypass Vulnerability
3359| [86144] OpenSSH CVE-2007-2768 Remote Security Vulnerability
3360| [84427] OpenSSH CVE-2016-1908 Security Bypass Vulnerability
3361| [84314] OpenSSH CVE-2016-3115 Remote Command Injection Vulnerability
3362| [84185] OpenSSH CVE-2006-4925 Denial-Of-Service Vulnerability
3363| [81293] OpenSSH CVE-2016-1907 Denial of Service Vulnerability
3364| [80698] OpenSSH CVE-2016-0778 Heap Based Buffer Overflow Vulnerability
3365| [80695] OpenSSH CVE-2016-0777 Information Disclosure Vulnerability
3366| [76497] OpenSSH CVE-2015-6565 Local Security Bypass Vulnerability
3367| [76317] OpenSSH PAM Support Multiple Remote Code Execution Vulnerabilities
3368| [75990] OpenSSH Login Handling Security Bypass Weakness
3369| [75525] OpenSSH 'x11_open_helper()' Function Security Bypass Vulnerability
3370| [71420] Portable OpenSSH 'gss-serv-krb5.c' Security Bypass Vulnerability
3371| [68757] OpenSSH Multiple Remote Denial of Service Vulnerabilities
3372| [66459] OpenSSH Certificate Validation Security Bypass Vulnerability
3373| [66355] OpenSSH 'child_set_env()' Function Security Bypass Vulnerability
3374| [65674] OpenSSH 'ssh-keysign.c' Local Information Disclosure Vulnerability
3375| [65230] OpenSSH 'schnorr.c' Remote Memory Corruption Vulnerability
3376| [63605] OpenSSH 'sshd' Process Remote Memory Corruption Vulnerability
3377| [61286] OpenSSH Remote Denial of Service Vulnerability
3378| [58894] GSI-OpenSSH PAM_USER Security Bypass Vulnerability
3379| [58162] OpenSSH CVE-2010-5107 Denial of Service Vulnerability
3380| [54114] OpenSSH 'ssh_gssapi_parse_ename()' Function Denial of Service Vulnerability
3381| [51702] Debian openssh-server Forced Command Handling Information Disclosure Vulnerability
3382| [50416] Linux Kernel 'kdump' and 'mkdumprd' OpenSSH Integration Remote Information Disclosure Vulnerability
3383| [49473] OpenSSH Ciphersuite Specification Information Disclosure Weakness
3384| [48507] OpenSSH 'pam_thread()' Remote Buffer Overflow Vulnerability
3385| [47691] Portable OpenSSH 'ssh-keysign' Local Unauthorized Access Vulnerability
3386| [46155] OpenSSH Legacy Certificate Signing Information Disclosure Vulnerability
3387| [45304] OpenSSH J-PAKE Security Bypass Vulnerability
3388| [36552] Red Hat Enterprise Linux OpenSSH 'ChrootDirectory' Option Local Privilege Escalation Vulnerability
3389| [32319] OpenSSH CBC Mode Information Disclosure Vulnerability
3390| [30794] Red Hat OpenSSH Backdoor Vulnerability
3391| [30339] OpenSSH 'X11UseLocalhost' X11 Forwarding Session Hijacking Vulnerability
3392| [30276] Debian OpenSSH SELinux Privilege Escalation Vulnerability
3393| [28531] OpenSSH ForceCommand Command Execution Weakness
3394| [28444] OpenSSH X Connections Session Hijacking Vulnerability
3395| [26097] OpenSSH LINUX_AUDIT_RECORD_EVENT Remote Log Injection Weakness
3396| [25628] OpenSSH X11 Cookie Local Authentication Bypass Vulnerability
3397| [23601] OpenSSH S/Key Remote Information Disclosure Vulnerability
3398| [20956] OpenSSH Privilege Separation Key Signature Weakness
3399| [20418] OpenSSH-Portable Existing Password Remote Information Disclosure Weakness
3400| [20245] OpenSSH-Portable GSSAPI Authentication Abort Information Disclosure Weakness
3401| [20241] Portable OpenSSH GSSAPI Remote Code Execution Vulnerability
3402| [20216] OpenSSH Duplicated Block Remote Denial of Service Vulnerability
3403| [16892] OpenSSH Remote PAM Denial Of Service Vulnerability
3404| [14963] OpenSSH LoginGraceTime Remote Denial Of Service Vulnerability
3405| [14729] OpenSSH GSSAPI Credential Disclosure Vulnerability
3406| [14727] OpenSSH DynamicForward Inadvertent GatewayPorts Activation Vulnerability
3407| [11781] OpenSSH-portable PAM Authentication Remote Information Disclosure Vulnerability
3408| [9986] RCP, OpenSSH SCP Client File Corruption Vulnerability
3409| [9040] OpenSSH PAM Conversation Memory Scrubbing Weakness
3410| [8677] Multiple Portable OpenSSH PAM Vulnerabilities
3411| [8628] OpenSSH Buffer Mismanagement Vulnerabilities
3412| [7831] OpenSSH Reverse DNS Lookup Access Control Bypass Vulnerability
3413| [7482] OpenSSH Remote Root Authentication Timing Side-Channel Weakness
3414| [7467] OpenSSH-portable Enabled PAM Delay Information Disclosure Vulnerability
3415| [7343] OpenSSH Authentication Execution Path Timing Information Leakage Weakness
3416| [6168] OpenSSH Visible Password Vulnerability
3417| [5374] OpenSSH Trojan Horse Vulnerability
3418| [5093] OpenSSH Challenge-Response Buffer Overflow Vulnerabilities
3419| [4560] OpenSSH Kerberos 4 TGT/AFS Token Buffer Overflow Vulnerability
3420| [4241] OpenSSH Channel Code Off-By-One Vulnerability
3421| [3614] OpenSSH UseLogin Environment Variable Passing Vulnerability
3422| [3560] OpenSSH Kerberos Arbitrary Privilege Elevation Vulnerability
3423| [3369] OpenSSH Key Based Source IP Access Control Bypass Vulnerability
3424| [3345] OpenSSH SFTP Command Restriction Bypassing Vulnerability
3425| [2917] OpenSSH PAM Session Evasion Vulnerability
3426| [2825] OpenSSH Client X11 Forwarding Cookie Removal File Symbolic Link Vulnerability
3427| [2356] OpenSSH Private Key Authentication Check Vulnerability
3428| [1949] OpenSSH Client Unauthorized Remote Forwarding Vulnerability
3429| [1334] OpenSSH UseLogin Vulnerability
3430|
3431| IBM X-Force - https://exchange.xforce.ibmcloud.com:
3432| [83258] GSI-OpenSSH auth-pam.c security bypass
3433| [82781] OpenSSH time limit denial of service
3434| [82231] OpenSSH pam_ssh_agent_auth PAM code execution
3435| [74809] OpenSSH ssh_gssapi_parse_ename denial of service
3436| [72756] Debian openssh-server commands information disclosure
3437| [68339] OpenSSH pam_thread buffer overflow
3438| [67264] OpenSSH ssh-keysign unauthorized access
3439| [65910] OpenSSH remote_glob function denial of service
3440| [65163] OpenSSH certificate information disclosure
3441| [64387] OpenSSH J-PAKE security bypass
3442| [63337] Cisco Unified Videoconferencing OpenSSH weak security
3443| [46620] OpenSSH and multiple SSH Tectia products CBC mode information disclosure
3444| [45202] OpenSSH signal handler denial of service
3445| [44747] RHEL OpenSSH backdoor
3446| [44280] OpenSSH PermitRootLogin information disclosure
3447| [44279] OpenSSH sshd weak security
3448| [44037] OpenSSH sshd SELinux role unauthorized access
3449| [43940] OpenSSH X11 forwarding information disclosure
3450| [41549] OpenSSH ForceCommand directive security bypass
3451| [41438] OpenSSH sshd session hijacking
3452| [40897] OpenSSH known_hosts weak security
3453| [40587] OpenSSH username weak security
3454| [37371] OpenSSH username data manipulation
3455| [37118] RHSA update for OpenSSH privilege separation monitor authentication verification weakness not installed
3456| [37112] RHSA update for OpenSSH signal handler race condition not installed
3457| [37107] RHSA update for OpenSSH identical block denial of service not installed
3458| [36637] OpenSSH X11 cookie privilege escalation
3459| [35167] OpenSSH packet.c newkeys[mode] denial of service
3460| [34490] OpenSSH OPIE information disclosure
3461| [33794] OpenSSH ChallengeResponseAuthentication information disclosure
3462| [32975] Apple Mac OS X OpenSSH denial of service
3463| [32387] RHSA-2006:0738 updates for openssh not installed
3464| [32359] RHSA-2006:0697 updates for openssh not installed
3465| [32230] RHSA-2006:0298 updates for openssh not installed
3466| [32132] RHSA-2006:0044 updates for openssh not installed
3467| [30120] OpenSSH privilege separation monitor authentication verification weakness
3468| [29255] OpenSSH GSSAPI user enumeration
3469| [29254] OpenSSH signal handler race condition
3470| [29158] OpenSSH identical block denial of service
3471| [28147] Apple Mac OS X OpenSSH nonexistent user login denial of service
3472| [25116] OpenSSH OpenPAM denial of service
3473| [24305] OpenSSH SCP shell expansion command execution
3474| [22665] RHSA-2005:106 updates for openssh not installed
3475| [22117] OpenSSH GSSAPI allows elevated privileges
3476| [22115] OpenSSH GatewayPorts security bypass
3477| [20930] OpenSSH sshd.c LoginGraceTime denial of service
3478| [19441] Sun Solaris OpenSSH LDAP (1) client authentication denial of service
3479| [17213] OpenSSH allows port bouncing attacks
3480| [16323] OpenSSH scp file overwrite
3481| [13797] OpenSSH PAM information leak
3482| [13271] OpenSSH could allow an attacker to corrupt the PAM conversion stack
3483| [13264] OpenSSH PAM code could allow an attacker to gain access
3484| [13215] OpenSSH buffer management errors could allow an attacker to execute code
3485| [13214] OpenSSH memory vulnerabilities
3486| [13191] OpenSSH large packet buffer overflow
3487| [12196] OpenSSH could allow an attacker to bypass login restrictions
3488| [11970] OpenSSH could allow an attacker to obtain valid administrative account
3489| [11902] OpenSSH PAM support enabled information leak
3490| [9803] OpenSSH "
3491| [9763] OpenSSH downloaded from the OpenBSD FTP site or OpenBSD FTP mirror sites could contain a Trojan Horse
3492| [9307] OpenSSH is running on the system
3493| [9169] OpenSSH "
3494| [8896] OpenSSH Kerberos 4 TGT/AFS buffer overflow
3495| [8697] FreeBSD libutil in OpenSSH fails to drop privileges prior to using the login class capability database
3496| [8383] OpenSSH off-by-one error in channel code
3497| [7647] OpenSSH UseLogin option arbitrary code execution
3498| [7634] OpenSSH using sftp and restricted keypairs could allow an attacker to bypass restrictions
3499| [7598] OpenSSH with Kerberos allows attacker to gain elevated privileges
3500| [7179] OpenSSH source IP access control bypass
3501| [6757] OpenSSH "
3502| [6676] OpenSSH X11 forwarding symlink attack could allow deletion of arbitrary files
3503| [6084] OpenSSH 2.3.1 allows remote users to bypass authentication
3504| [5517] OpenSSH allows unauthorized access to resources
3505| [4646] OpenSSH UseLogin option allows remote users to execute commands as root
3506|
3507| Exploit-DB - https://www.exploit-db.com:
3508| [21579] OpenSSH 3.x Challenge-Response Buffer Overflow Vulnerabilities (2)
3509| [21578] OpenSSH 3.x Challenge-Response Buffer Overflow Vulnerabilities (1)
3510| [21402] OpenSSH 2.x/3.x Kerberos 4 TGT/AFS Token Buffer Overflow Vulnerability
3511| [21314] OpenSSH 2.x/3.0.1/3.0.2 Channel Code Off-By-One Vulnerability
3512| [20253] OpenSSH 1.2 scp File Create/Overwrite Vulnerability
3513| [17462] FreeBSD OpenSSH 3.5p1 - Remote Root Exploit
3514| [14866] Novell Netware 6.5 - OpenSSH Remote Stack Overflow
3515| [6094] Debian OpenSSH Remote SELinux Privilege Elevation Exploit (auth)
3516| [3303] Portable OpenSSH <= 3.6.1p-PAM / 4.1-SUSE Timing Attack Exploit
3517| [2444] OpenSSH <= 4.3 p1 (Duplicated Block) Remote Denial of Service Exploit
3518| [1572] Dropbear / OpenSSH Server (MAX_UNAUTH_CLIENTS) Denial of Service
3519| [258] glibc-2.2 and openssh-2.3.0p1 exploits glibc => 2.1.9x
3520| [26] OpenSSH/PAM <= 3.6.1p1 Remote Users Ident (gossh.sh)
3521| [25] OpenSSH/PAM <= 3.6.1p1 Remote Users Discovery Tool
3522|
3523| OpenVAS (Nessus) - http://www.openvas.org:
3524| [902488] OpenSSH 'sshd' GSSAPI Credential Disclosure Vulnerability
3525| [900179] OpenSSH CBC Mode Information Disclosure Vulnerability
3526| [881183] CentOS Update for openssh CESA-2012:0884 centos6
3527| [880802] CentOS Update for openssh CESA-2009:1287 centos5 i386
3528| [880746] CentOS Update for openssh CESA-2009:1470 centos5 i386
3529| [870763] RedHat Update for openssh RHSA-2012:0884-04
3530| [870129] RedHat Update for openssh RHSA-2008:0855-01
3531| [861813] Fedora Update for openssh FEDORA-2010-5429
3532| [861319] Fedora Update for openssh FEDORA-2007-395
3533| [861170] Fedora Update for openssh FEDORA-2007-394
3534| [861012] Fedora Update for openssh FEDORA-2007-715
3535| [840345] Ubuntu Update for openssh vulnerability USN-597-1
3536| [840300] Ubuntu Update for openssh update USN-612-5
3537| [840271] Ubuntu Update for openssh vulnerability USN-612-2
3538| [840268] Ubuntu Update for openssh update USN-612-7
3539| [840259] Ubuntu Update for openssh vulnerabilities USN-649-1
3540| [840214] Ubuntu Update for openssh vulnerability USN-566-1
3541| [831074] Mandriva Update for openssh MDVA-2010:162 (openssh)
3542| [830929] Mandriva Update for openssh MDVA-2010:090 (openssh)
3543| [830807] Mandriva Update for openssh MDVA-2010:026 (openssh)
3544| [830603] Mandriva Update for openssh MDVSA-2008:098 (openssh)
3545| [830523] Mandriva Update for openssh MDVSA-2008:078 (openssh)
3546| [830317] Mandriva Update for openssh-askpass-qt MDKA-2007:127 (openssh-askpass-qt)
3547| [830191] Mandriva Update for openssh MDKSA-2007:236 (openssh)
3548| [802407] OpenSSH 'sshd' Challenge Response Authentication Buffer Overflow Vulnerability
3549| [103503] openssh-server Forced Command Handling Information Disclosure Vulnerability
3550| [103247] OpenSSH Ciphersuite Specification Information Disclosure Weakness
3551| [103064] OpenSSH Legacy Certificate Signing Information Disclosure Vulnerability
3552| [100584] OpenSSH X Connections Session Hijacking Vulnerability
3553| [100153] OpenSSH CBC Mode Information Disclosure Vulnerability
3554| [66170] CentOS Security Advisory CESA-2009:1470 (openssh)
3555| [65987] SLES10: Security update for OpenSSH
3556| [65819] SLES10: Security update for OpenSSH
3557| [65514] SLES9: Security update for OpenSSH
3558| [65513] SLES9: Security update for OpenSSH
3559| [65334] SLES9: Security update for OpenSSH
3560| [65248] SLES9: Security update for OpenSSH
3561| [65218] SLES9: Security update for OpenSSH
3562| [65169] SLES9: Security update for openssh,openssh-askpass
3563| [65126] SLES9: Security update for OpenSSH
3564| [65019] SLES9: Security update for OpenSSH
3565| [65015] SLES9: Security update for OpenSSH
3566| [64931] CentOS Security Advisory CESA-2009:1287 (openssh)
3567| [61639] Debian Security Advisory DSA 1638-1 (openssh)
3568| [61030] Debian Security Advisory DSA 1576-2 (openssh)
3569| [61029] Debian Security Advisory DSA 1576-1 (openssh)
3570| [60840] FreeBSD Security Advisory (FreeBSD-SA-08:05.openssh.asc)
3571| [60803] Gentoo Security Advisory GLSA 200804-03 (openssh)
3572| [60667] Slackware Advisory SSA:2008-095-01 openssh
3573| [59014] Slackware Advisory SSA:2007-255-01 openssh
3574| [58741] Gentoo Security Advisory GLSA 200711-02 (openssh)
3575| [57919] Gentoo Security Advisory GLSA 200611-06 (openssh)
3576| [57895] Gentoo Security Advisory GLSA 200609-17 (openssh)
3577| [57585] Debian Security Advisory DSA 1212-1 (openssh (1:3.8.1p1-8.sarge.6))
3578| [57492] Slackware Advisory SSA:2006-272-02 openssh
3579| [57483] Debian Security Advisory DSA 1189-1 (openssh-krb5)
3580| [57476] FreeBSD Security Advisory (FreeBSD-SA-06:22.openssh.asc)
3581| [57470] FreeBSD Ports: openssh
3582| [56352] FreeBSD Security Advisory (FreeBSD-SA-06:09.openssh.asc)
3583| [56330] Gentoo Security Advisory GLSA 200602-11 (OpenSSH)
3584| [56294] Slackware Advisory SSA:2006-045-06 openssh
3585| [53964] Slackware Advisory SSA:2003-266-01 New OpenSSH packages
3586| [53885] Slackware Advisory SSA:2003-259-01 OpenSSH Security Advisory
3587| [53884] Slackware Advisory SSA:2003-260-01 OpenSSH updated again
3588| [53788] Debian Security Advisory DSA 025-1 (openssh)
3589| [52638] FreeBSD Security Advisory (FreeBSD-SA-03:15.openssh.asc)
3590| [52635] FreeBSD Security Advisory (FreeBSD-SA-03:12.openssh.asc)
3591| [11343] OpenSSH Client Unauthorized Remote Forwarding
3592| [10954] OpenSSH AFS/Kerberos ticket/token passing
3593| [10883] OpenSSH Channel Code Off by 1
3594| [10823] OpenSSH UseLogin Environment Variables
3595|
3596| SecurityTracker - https://www.securitytracker.com:
3597| [1028187] OpenSSH pam_ssh_agent_auth Module on Red Hat Enterprise Linux Lets Remote Users Execute Arbitrary Code
3598| [1026593] OpenSSH Lets Remote Authenticated Users Obtain Potentially Sensitive Information
3599| [1025739] OpenSSH on FreeBSD Has Buffer Overflow in pam_thread() That Lets Remote Users Execute Arbitrary Code
3600| [1025482] OpenSSH ssh-keysign Utility Lets Local Users Gain Elevated Privileges
3601| [1025028] OpenSSH Legacy Certificates May Disclose Stack Contents to Remote Users
3602| [1022967] OpenSSH on Red Hat Enterprise Linux Lets Remote Authenticated Users Gain Elevated Privileges
3603| [1021235] OpenSSH CBC Mode Error Handling May Let Certain Remote Users Obtain Plain Text in Certain Cases
3604| [1020891] OpenSSH on Debian Lets Remote Users Prevent Logins
3605| [1020730] OpenSSH for Red Hat Enterprise Linux Packages May Have Been Compromised
3606| [1020537] OpenSSH on HP-UX Lets Local Users Hijack X11 Sessions
3607| [1019733] OpenSSH Unsafe Default Configuration May Let Local Users Execute Arbitrary Commands
3608| [1019707] OpenSSH Lets Local Users Hijack Forwarded X Sessions in Certain Cases
3609| [1017756] Apple OpenSSH Key Generation Process Lets Remote Users Deny Service
3610| [1017183] OpenSSH Privilege Separation Monitor Validation Error May Cause the Monitor to Fail to Properly Control the Unprivileged Process
3611| [1016940] OpenSSH Race Condition in Signal Handler Lets Remote Users Deny Service and May Potentially Permit Code Execution
3612| [1016939] OpenSSH GSSAPI Authentication Abort Error Lets Remote Users Determine Valid Usernames
3613| [1016931] OpenSSH SSH v1 CRC Attack Detection Implementation Lets Remote Users Deny Service
3614| [1016672] OpenSSH on Mac OS X Lets Remote Users Deny Service
3615| [1015706] OpenSSH Interaction With OpenPAM Lets Remote Users Deny Service
3616| [1015540] OpenSSH scp Double Shell Character Expansion During Local-to-Local Copying May Let Local Users Gain Elevated Privileges in Certain Cases
3617| [1014845] OpenSSH May Unexpectedly Activate GatewayPorts and Also May Disclose GSSAPI Credentials in Certain Cases
3618| [1011193] OpenSSH scp Directory Traversal Flaw Lets Remote SSH Servers Overwrite Files in Certain Cases
3619| [1011143] OpenSSH Default Configuration May Be Unsafe When Used With Anonymous SSH Services
3620| [1007791] Portable OpenSSH PAM free() Bug May Let Remote Users Execute Root Code
3621| [1007716] OpenSSH buffer_append_space() and Other Buffer Management Errors May Let Remote Users Execute Arbitrary Code
3622| [1006926] OpenSSH Host Access Restrictions Can Be Bypassed By Remote Users
3623| [1006688] OpenSSH Timing Flaw With Pluggable Authentication Modules Can Disclose Valid User Account Names to Remote Users
3624| [1004818] OpenSSH's Secure Shell (SSH) Implementation Weakness May Disclose User Passwords to Remote Users During Man-in-the-Middle Attacks
3625| [1004616] OpenSSH Integer Overflow and Buffer Overflow May Allow Remote Users to Gain Root Access to the System
3626| [1004391] OpenSSH 'BSD_AUTH' Access Control Bug May Allow Unauthorized Remote Users to Authenticated to the System
3627| [1004115] OpenSSH Buffer Overflow in Kerberos Ticket and AFS Token Processing Lets Local Users Execute Arbitrary Code With Root Level Permissions
3628| [1003758] OpenSSH Off-by-one 'Channels' Bug May Let Authorized Remote Users Execute Arbitrary Code with Root Privileges
3629| [1002895] OpenSSH UseLogin Environment Variable Bug Lets Local Users Execute Commands and Gain Root Access
3630| [1002748] OpenSSH 3.0 Denial of Service Condition May Allow Remote Users to Crash the sshd Daemon and KerberosV Configuration Error May Allow Remote Users to Partially Authenticate When Authentication Should Not Be Permitted
3631| [1002734] OpenSSH's S/Key Implementation Information Disclosure Flaw Provides Remote Users With Information About Valid User Accounts
3632| [1002455] OpenSSH May Fail to Properly Restrict IP Addresses in Certain Configurations
3633| [1002432] OpenSSH's Sftp-server Subsystem Lets Authorized Remote Users with Restricted Keypairs Obtain Additional Access on the Server
3634| [1001683] OpenSSH Allows Authorized Users to Delete Other User Files Named Cookies
3635|
3636| OSVDB - http://www.osvdb.org:
3637| [92034] GSI-OpenSSH auth-pam.c Memory Management Authentication Bypass
3638| [90474] Red Hat / Fedora PAM Module for OpenSSH Incorrect error() Function Calling Local Privilege Escalation
3639| [90007] OpenSSH logingracetime / maxstartup Threshold Connection Saturation Remote DoS
3640| [81500] OpenSSH gss-serv.c ssh_gssapi_parse_ename Function Field Length Value Parsing Remote DoS
3641| [78706] OpenSSH auth-options.c sshd auth_parse_options Function authorized_keys Command Option Debug Message Information Disclosure
3642| [75753] OpenSSH PAM Module Aborted Conversation Local Information Disclosure
3643| [75249] OpenSSH sftp-glob.c remote_glob Function Glob Expression Parsing Remote DoS
3644| [75248] OpenSSH sftp.c process_put Function Glob Expression Parsing Remote DoS
3645| [72183] Portable OpenSSH ssh-keysign ssh-rand-helper Utility File Descriptor Leak Local Information Disclosure
3646| [70873] OpenSSH Legacy Certificates Stack Memory Disclosure
3647| [69658] OpenSSH J-PAKE Public Parameter Validation Shared Secret Authentication Bypass
3648| [67743] Novell NetWare OpenSSH SSHD.NLM Absolute Path Handling Remote Overflow
3649| [59353] OpenSSH sshd Local TCP Redirection Connection Masking Weakness
3650| [58495] OpenSSH sshd ChrootDirectory Feature SetUID Hard Link Local Privilege Escalation
3651| [56921] OpenSSH Unspecified Remote Compromise
3652| [53021] OpenSSH on ftp.openbsd.org Trojaned Distribution
3653| [50036] OpenSSH CBC Mode Chosen Ciphertext 32-bit Chunk Plaintext Context Disclosure
3654| [49386] OpenSSH sshd TCP Connection State Remote Account Enumeration
3655| [48791] OpenSSH on Debian sshd Crafted Username Arbitrary Remote SELinux Role Access
3656| [47635] OpenSSH Packages on Red Hat Enterprise Linux Compromised Distribution
3657| [47227] OpenSSH X11UseLocalhost X11 Forwarding Port Hijacking
3658| [45873] Cisco WebNS SSHield w/ OpenSSH Crafted Large Packet Remote DoS
3659| [43911] OpenSSH ~/.ssh/rc ForceCommand Bypass Arbitrary Command Execution
3660| [43745] OpenSSH X11 Forwarding Local Session Hijacking
3661| [43371] OpenSSH Trusted X11 Cookie Connection Policy Bypass
3662| [39214] OpenSSH linux_audit_record_event Crafted Username Audit Log Injection
3663| [37315] pam_usb OpenSSH Authentication Unspecified Issue
3664| [34850] OpenSSH on Mac OS X Key Generation Remote Connection DoS
3665| [34601] OPIE w/ OpenSSH Account Enumeration
3666| [34600] OpenSSH S/KEY Authentication Account Enumeration
3667| [32721] OpenSSH Username Password Complexity Account Enumeration
3668| [30232] OpenSSH Privilege Separation Monitor Weakness
3669| [29494] OpenSSH packet.c Invalid Protocol Sequence Remote DoS
3670| [29266] OpenSSH GSSAPI Authentication Abort Username Enumeration
3671| [29264] OpenSSH Signal Handler Pre-authentication Race Condition Code Execution
3672| [29152] OpenSSH Identical Block Packet DoS
3673| [27745] Apple Mac OS X OpenSSH Nonexistent Account Login Enumeration DoS
3674| [23797] OpenSSH with OpenPAM Connection Saturation Forked Process Saturation DoS
3675| [22692] OpenSSH scp Command Line Filename Processing Command Injection
3676| [20216] OpenSSH with KerberosV Remote Authentication Bypass
3677| [19142] OpenSSH Multiple X11 Channel Forwarding Leaks
3678| [19141] OpenSSH GSSAPIAuthentication Credential Escalation
3679| [18236] OpenSSH no pty Command Execution Local PAM Restriction Bypass
3680| [16567] OpenSSH Privilege Separation LoginGraceTime DoS
3681| [16039] Solaris 108994 Series Patch OpenSSH LDAP Client Authentication DoS
3682| [9562] OpenSSH Default Configuration Anon SSH Service Port Bounce Weakness
3683| [9550] OpenSSH scp Traversal Arbitrary File Overwrite
3684| [6601] OpenSSH *realloc() Unspecified Memory Errors
3685| [6245] OpenSSH SKEY/BSD_AUTH Challenge-Response Remote Overflow
3686| [6073] OpenSSH on FreeBSD libutil Arbitrary File Read
3687| [6072] OpenSSH PAM Conversation Function Stack Modification
3688| [6071] OpenSSH SSHv1 PAM Challenge-Response Authentication Privilege Escalation
3689| [5536] OpenSSH sftp-server Restricted Keypair Restriction Bypass
3690| [5408] OpenSSH echo simulation Information Disclosure
3691| [5113] OpenSSH NIS YP Netgroups Authentication Bypass
3692| [4536] OpenSSH Portable AIX linker Privilege Escalation
3693| [3938] OpenSSL and OpenSSH /dev/random Check Failure
3694| [3456] OpenSSH buffer_append_space() Heap Corruption
3695| [2557] OpenSSH Multiple Buffer Management Multiple Overflows
3696| [2140] OpenSSH w/ PAM Username Validity Timing Attack
3697| [2112] OpenSSH Reverse DNS Lookup Bypass
3698| [2109] OpenSSH sshd Root Login Timing Side-Channel Weakness
3699| [1853] OpenSSH Symbolic Link 'cookies' File Removal
3700| [839] OpenSSH PAMAuthenticationViaKbdInt Challenge-Response Remote Overflow
3701| [781] OpenSSH Kerberos TGT/AFS Token Passing Remote Overflow
3702| [730] OpenSSH Channel Code Off by One Remote Privilege Escalation
3703| [688] OpenSSH UseLogin Environment Variable Local Command Execution
3704| [642] OpenSSH Multiple Key Type ACL Bypass
3705| [504] OpenSSH SSHv2 Public Key Authentication Bypass
3706| [341] OpenSSH UseLogin Local Privilege Escalation
3707|_
370825/tcp closed smtp
370953/tcp open domain (unknown banner: get lost)
3710| fingerprint-strings:
3711| DNSVersionBindReqTCP:
3712| version
3713| bind
3714|_ lost
371580/tcp open http nginx
3716| vulscan: VulDB - https://vuldb.com:
3717| [133852] Sangfor Sundray WLAN Controller up to 3.7.4.2 Cookie Header nginx_webconsole.php Code Execution
3718| [132132] SoftNAS Cloud 4.2.0/4.2.1 Nginx privilege escalation
3719| [131858] Puppet Discovery up to 1.3.x Nginx Container weak authentication
3720| [130644] Nginx Unit up to 1.7.0 Router Process Request Heap-based memory corruption
3721| [127759] VeryNginx 0.3.3 Web Application Firewall privilege escalation
3722| [126525] nginx up to 1.14.0/1.15.5 ngx_http_mp4_module Loop denial of service
3723| [126524] nginx up to 1.14.0/1.15.5 HTTP2 CPU Exhaustion denial of service
3724| [126523] nginx up to 1.14.0/1.15.5 HTTP2 Memory Consumption denial of service
3725| [119845] Pivotal Operations Manager up to 2.0.13/2.1.5 Nginx privilege escalation
3726| [114368] SuSE Portus 2.3 Nginx Certificate weak authentication
3727| [103517] nginx up to 1.13.2 Range Filter Request Integer Overflow memory corruption
3728| [89849] nginx RFC 3875 Namespace Conflict Environment Variable Open Redirect
3729| [87719] nginx up to 1.11.0 ngx_files.c ngx_chain_to_iovec denial of service
3730| [80760] nginx 0.6.18/1.9.9 DNS CNAME Record Crash denial of service
3731| [80759] nginx 0.6.18/1.9.9 DNS CNAME Record Use-After-Free denial of service
3732| [80758] nginx 0.6.18/1.9.9 DNS UDP Packet Crash denial of service
3733| [67677] nginx up to 1.7.3 SSL weak authentication
3734| [67296] nginx up to 1.7.3 SMTP Proxy ngx_mail_smtp_starttls privilege escalation
3735| [12822] nginx up to 1.5.11 SPDY SPDY Request Heap-based memory corruption
3736| [12824] nginx 1.5.10 on 32-bit SPDY memory corruption
3737| [11237] nginx up to 1.5.6 URI String Bypass privilege escalation
3738| [65364] nginx up to 1.1.13 Default Configuration information disclosure
3739| [8671] nginx up to 1.4 proxy_pass denial of service
3740| [8618] nginx 1.3.9/1.4.0 http/ngx_http_parse.c ngx_http_parse_chunked() memory corruption
3741| [7247] nginx 1.2.6 Proxy Function spoofing
3742| [61434] nginx 1.2.0/1.3.0 on Windows Access Restriction privilege escalation
3743| [5293] nginx up to 1.1.18 ngx_http_mp4_module MP4 File memory corruption
3744| [4843] nginx up to 1.0.13/1.1.16 HTTP Header Response Parser ngx_http_parse.c information disclosure
3745| [59645] nginx up to 0.8.9 Heap-based memory corruption
3746| [53592] nginx 0.8.36 memory corruption
3747| [53590] nginx up to 0.8.9 unknown vulnerability
3748| [51533] nginx 0.7.64 Terminal privilege escalation
3749| [50905] nginx up to 0.8.9 directory traversal
3750| [50903] nginx up to 0.8.10 NULL Pointer Dereference denial of service
3751| [50043] nginx up to 0.8.10 memory corruption
3752|
3753| MITRE CVE - https://cve.mitre.org:
3754| [CVE-2013-2070] http/modules/ngx_http_proxy_module.c in nginx 1.1.4 through 1.2.8 and 1.3.0 through 1.4.0, when proxy_pass is used with untrusted HTTP servers, allows remote attackers to cause a denial of service (crash) and obtain sensitive information from worker process memory via a crafted proxy response, a similar vulnerability to CVE-2013-2028.
3755| [CVE-2013-2028] The ngx_http_parse_chunked function in http/ngx_http_parse.c in nginx 1.3.9 through 1.4.0 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a chunked Transfer-Encoding request with a large chunk size, which triggers an integer signedness error and a stack-based buffer overflow.
3756| [CVE-2012-3380] Directory traversal vulnerability in naxsi-ui/nx_extract.py in the Naxsi module before 0.46-1 for Nginx allows local users to read arbitrary files via unspecified vectors.
3757| [CVE-2012-2089] Buffer overflow in ngx_http_mp4_module.c in the ngx_http_mp4_module module in nginx 1.0.7 through 1.0.14 and 1.1.3 through 1.1.18, when the mp4 directive is used, allows remote attackers to cause a denial of service (memory overwrite) or possibly execute arbitrary code via a crafted MP4 file.
3758| [CVE-2012-1180] Use-after-free vulnerability in nginx before 1.0.14 and 1.1.x before 1.1.17 allows remote HTTP servers to obtain sensitive information from process memory via a crafted backend response, in conjunction with a client request.
3759| [CVE-2011-4963] nginx/Windows 1.3.x before 1.3.1 and 1.2.x before 1.2.1 allows remote attackers to bypass intended access restrictions and access restricted files via (1) a trailing . (dot) or (2) certain "$index_allocation" sequences in a request.
3760| [CVE-2011-4315] Heap-based buffer overflow in compression-pointer processing in core/ngx_resolver.c in nginx before 1.0.10 allows remote resolvers to cause a denial of service (daemon crash) or possibly have unspecified other impact via a long response.
3761| [CVE-2010-2266] nginx 0.8.36 allows remote attackers to cause a denial of service (crash) via certain encoded directory traversal sequences that trigger memory corruption, as demonstrated using the "%c0.%c0." sequence.
3762| [CVE-2010-2263] nginx 0.8 before 0.8.40 and 0.7 before 0.7.66, when running on Windows, allows remote attackers to obtain source code or unparsed content of arbitrary files under the web document root by appending ::$DATA to the URI.
3763| [CVE-2009-4487] nginx 0.7.64 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.
3764| [CVE-2009-3898] Directory traversal vulnerability in src/http/modules/ngx_http_dav_module.c in nginx (aka Engine X) before 0.7.63, and 0.8.x before 0.8.17, allows remote authenticated users to create or overwrite arbitrary files via a .. (dot dot) in the Destination HTTP header for the WebDAV (1) COPY or (2) MOVE method.
3765| [CVE-2009-3896] src/http/ngx_http_parse.c in nginx (aka Engine X) 0.1.0 through 0.4.14, 0.5.x before 0.5.38, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.14 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a long URI.
3766| [CVE-2009-2629] Buffer underflow in src/http/ngx_http_parse.c in nginx 0.1.0 through 0.5.37, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.15 allows remote attackers to execute arbitrary code via crafted HTTP requests.
3767|
3768| SecurityFocus - https://www.securityfocus.com/bid/:
3769| [99534] Nginx CVE-2017-7529 Remote Integer Overflow Vulnerability
3770| [93903] Nginx CVE-2016-1247 Remote Privilege Escalation Vulnerability
3771| [91819] Nginx CVE-2016-1000105 Security Bypass Vulnerability
3772| [90967] nginx CVE-2016-4450 Denial of Service Vulnerability
3773| [82230] nginx Multiple Denial of Service Vulnerabilities
3774| [78928] Nginx CVE-2010-2266 Denial-Of-Service Vulnerability
3775| [70025] nginx CVE-2014-3616 SSL Session Fixation Vulnerability
3776| [69111] nginx SMTP Proxy Remote Command Injection Vulnerability
3777| [67507] nginx SPDY Implementation CVE-2014-0088 Arbitrary Code Execution Vulnerability
3778| [66537] nginx SPDY Implementation Heap Based Buffer Overflow Vulnerability
3779| [63814] nginx CVE-2013-4547 URI Processing Security Bypass Vulnerability
3780| [59824] Nginx CVE-2013-2070 Remote Security Vulnerability
3781| [59699] nginx 'ngx_http_parse.c' Stack Buffer Overflow Vulnerability
3782| [59496] nginx 'ngx_http_close_connection()' Remote Integer Overflow Vulnerability
3783| [59323] nginx NULL-Byte Arbitrary Code Execution Vulnerability
3784| [58105] Nginx 'access.log' Insecure File Permissions Vulnerability
3785| [57139] nginx CVE-2011-4968 Man in The Middle Vulnerability
3786| [55920] nginx CVE-2011-4963 Security Bypass Vulnerability
3787| [54331] Nginx Naxsi Module 'nx_extract.py' Script Remote File Disclosure Vulnerability
3788| [52999] nginx 'ngx_http_mp4_module.c' Buffer Overflow Vulnerability
3789| [52578] nginx 'ngx_cpystrn()' Information Disclosure Vulnerability
3790| [50710] nginx DNS Resolver Remote Heap Buffer Overflow Vulnerability
3791| [40760] nginx Remote Source Code Disclosure and Denial of Service Vulnerabilities
3792| [40434] nginx Space String Remote Source Code Disclosure Vulnerability
3793| [40420] nginx Directory Traversal Vulnerability
3794| [37711] nginx Terminal Escape Sequence in Logs Command Injection Vulnerability
3795| [36839] nginx 'ngx_http_process_request_headers()' Remote Buffer Overflow Vulnerability
3796| [36490] nginx WebDAV Multiple Directory Traversal Vulnerabilities
3797| [36438] nginx Proxy DNS Cache Domain Spoofing Vulnerability
3798| [36384] nginx HTTP Request Remote Buffer Overflow Vulnerability
3799|
3800| IBM X-Force - https://exchange.xforce.ibmcloud.com:
3801| [84623] Phusion Passenger gem for Ruby with nginx configuration insecure permissions
3802| [84172] nginx denial of service
3803| [84048] nginx buffer overflow
3804| [83923] nginx ngx_http_close_connection() integer overflow
3805| [83688] nginx null byte code execution
3806| [83103] Naxsi module for Nginx naxsi_unescape_uri() function security bypass
3807| [82319] nginx access.log information disclosure
3808| [80952] nginx SSL spoofing
3809| [77244] nginx and Microsoft Windows request security bypass
3810| [76778] Naxsi module for Nginx nx_extract.py directory traversal
3811| [74831] nginx ngx_http_mp4_module.c buffer overflow
3812| [74191] nginx ngx_cpystrn() information disclosure
3813| [74045] nginx header response information disclosure
3814| [71355] nginx ngx_resolver_copy() buffer overflow
3815| [59370] nginx characters denial of service
3816| [59369] nginx DATA source code disclosure
3817| [59047] nginx space source code disclosure
3818| [58966] nginx unspecified directory traversal
3819| [54025] nginx ngx_http_parse.c denial of service
3820| [53431] nginx WebDAV component directory traversal
3821| [53328] Nginx CRC-32 cached domain name spoofing
3822| [53250] Nginx ngx_http_parse_complex_uri() function code execution
3823|
3824| Exploit-DB - https://www.exploit-db.com:
3825| [26737] nginx 1.3.9/1.4.0 x86 Brute Force Remote Exploit
3826| [25775] Nginx HTTP Server 1.3.9-1.4.0 Chuncked Encoding Stack Buffer Overflow
3827| [25499] nginx 1.3.9-1.4.0 DoS PoC
3828| [24967] nginx 0.6.x Arbitrary Code Execution NullByte Injection
3829| [14830] nginx 0.6.38 - Heap Corruption Exploit
3830| [13822] Nginx <= 0.7.65 / 0.8.39 (dev) Source Disclosure / Download Vulnerability
3831| [13818] Nginx 0.8.36 Source Disclosure and DoS Vulnerabilities
3832| [12804] nginx [engine x] http server <= 0.6.36 Path Draversal
3833| [9901] nginx 0.7.0-0.7.61, 0.6.0-0.6.38, 0.5.0-0.5.37, 0.4.0-0.4.14 PoC
3834| [9829] nginx 0.7.61 WebDAV directory traversal
3835|
3836| OpenVAS (Nessus) - http://www.openvas.org:
3837| [864418] Fedora Update for nginx FEDORA-2012-3846
3838| [864310] Fedora Update for nginx FEDORA-2012-6238
3839| [864209] Fedora Update for nginx FEDORA-2012-6411
3840| [864204] Fedora Update for nginx FEDORA-2012-6371
3841| [864121] Fedora Update for nginx FEDORA-2012-4006
3842| [864115] Fedora Update for nginx FEDORA-2012-3991
3843| [864065] Fedora Update for nginx FEDORA-2011-16075
3844| [863654] Fedora Update for nginx FEDORA-2011-16110
3845| [861232] Fedora Update for nginx FEDORA-2007-1158
3846| [850180] SuSE Update for nginx openSUSE-SU-2012:0237-1 (nginx)
3847| [831680] Mandriva Update for nginx MDVSA-2012:043 (nginx)
3848| [802045] 64-bit Debian Linux Rootkit with nginx Doing iFrame Injection
3849| [801636] nginx HTTP Request Remote Buffer Overflow Vulnerability
3850| [103470] nginx 'ngx_http_mp4_module.c' Buffer Overflow Vulnerability
3851| [103469] nginx 'ngx_cpystrn()' Information Disclosure Vulnerability
3852| [103344] nginx DNS Resolver Remote Heap Buffer Overflow Vulnerability
3853| [100676] nginx Remote Source Code Disclosure and Denial of Service Vulnerabilities
3854| [100659] nginx Directory Traversal Vulnerability
3855| [100658] nginx Space String Remote Source Code Disclosure Vulnerability
3856| [100441] nginx Terminal Escape Sequence in Logs Command Injection Vulnerability
3857| [100321] nginx 'ngx_http_process_request_headers()' Remote Buffer Overflow Vulnerability
3858| [100277] nginx Proxy DNS Cache Domain Spoofing Vulnerability
3859| [100276] nginx HTTP Request Remote Buffer Overflow Vulnerability
3860| [100275] nginx WebDAV Multiple Directory Traversal Vulnerabilities
3861| [71574] Gentoo Security Advisory GLSA 201206-07 (nginx)
3862| [71308] Gentoo Security Advisory GLSA 201203-22 (nginx)
3863| [71297] FreeBSD Ports: nginx
3864| [71276] FreeBSD Ports: nginx
3865| [71239] Debian Security Advisory DSA 2434-1 (nginx)
3866| [66451] Fedora Core 11 FEDORA-2009-12782 (nginx)
3867| [66450] Fedora Core 10 FEDORA-2009-12775 (nginx)
3868| [66449] Fedora Core 12 FEDORA-2009-12750 (nginx)
3869| [64924] Gentoo Security Advisory GLSA 200909-18 (nginx)
3870| [64912] Fedora Core 10 FEDORA-2009-9652 (nginx)
3871| [64911] Fedora Core 11 FEDORA-2009-9630 (nginx)
3872| [64894] FreeBSD Ports: nginx
3873| [64869] Debian Security Advisory DSA 1884-1 (nginx)
3874|
3875| SecurityTracker - https://www.securitytracker.com:
3876| [1028544] nginx Bug Lets Remote Users Deny Service or Obtain Potentially Sensitive Information
3877| [1028519] nginx Stack Overflow Lets Remote Users Execute Arbitrary Code
3878| [1026924] nginx Buffer Overflow in ngx_http_mp4_module Lets Remote Users Execute Arbitrary Code
3879| [1026827] nginx HTTP Response Processing Lets Remote Users Obtain Portions of Memory Contents
3880|
3881| OSVDB - http://www.osvdb.org:
3882| [94864] cPnginx Plugin for cPanel nginx Configuration Manipulation Arbitrary File Access
3883| [93282] nginx proxy_pass Crafted Upstream Proxied Server Response Handling Worker Process Memory Disclosure
3884| [93037] nginx /http/ngx_http_parse.c Worker Process Crafted Request Handling Remote Overflow
3885| [92796] nginx ngx_http_close_connection Function Crafted r->
3886| [92634] nginx ngx_http_request.h zero_in_uri URL Null Byte Handling Remote Code Execution
3887| [90518] nginx Log Directory Permission Weakness Local Information Disclosure
3888| [88910] nginx Proxy Functionality SSL Certificate Validation MitM Spoofing Weakness
3889| [84339] nginx/Windows Multiple Request Sequence Parsing Arbitrary File Access
3890| [83617] Naxsi Module for Nginx naxsi-ui/ nx_extract.py Traversal Arbitrary File Access
3891| [81339] nginx ngx_http_mp4_module Module Atom MP4 File Handling Remote Overflow
3892| [80124] nginx HTTP Header Response Parsing Freed Memory Information Disclosure
3893| [77184] nginx ngx_resolver.c ngx_resolver_copy() Function DNS Response Parsing Remote Overflow
3894| [65531] nginx on Windows URI ::$DATA Append Arbitrary File Access
3895| [65530] nginx Encoded Traversal Sequence Memory Corruption Remote DoS
3896| [65294] nginx on Windows Encoded Space Request Remote Source Disclosure
3897| [63136] nginx on Windows 8.3 Filename Alias Request Access Rules / Authentication Bypass
3898| [62617] nginx Internal DNS Cache Poisoning Weakness
3899| [61779] nginx HTTP Request Escape Sequence Terminal Command Injection
3900| [59278] nginx src/http/ngx_http_parse.c ngx_http_process_request_headers() Function URL Handling NULL Dereference DoS
3901| [58328] nginx WebDAV Multiple Method Traversal Arbitrary File Write
3902| [58128] nginx ngx_http_parse_complex_uri() Function Underflow
3903| [44447] nginx (engine x) msie_refresh Directive Unspecified XSS
3904| [44446] nginx (engine x) ssl_verify_client Directive HTTP/0.9 Protocol Bypass
3905| [44445] nginx (engine x) ngx_http_realip_module satisfy_any Directive Unspecified Access Bypass
3906| [44444] nginx (engine x) X-Accel-Redirect Header Unspecified Traversal
3907| [44443] nginx (engine x) rtsig Method Signal Queue Overflow
3908| [44442] nginx (engine x) Worker Process Millisecond Timers Unspecified Overflow
3909|_
3910139/tcp closed netbios-ssn
3911445/tcp closed microsoft-ds
39123306/tcp open mysql MySQL 5.5.60-MariaDB
3913| vulners:
3914| MySQL 5.5.60-MariaDB:
3915|_ NODEJS:602 0.0 https://vulners.com/nodejs/NODEJS:602
3916| vulscan: VulDB - https://vuldb.com:
3917| [121800] Oracle MySQL Server up to 5.5.60/5.6.40/5.7.22 Encryption weak encryption
3918| [121799] Oracle MySQL Server up to 5.5.60/5.6.40/5.7.22 Options unknown vulnerability
3919| [121796] Oracle MySQL Server up to 5.5.60/5.6.40/5.7.22 MyISAM information disclosure
3920| [121794] Oracle MySQL Server up to 5.5.60 Privileges denial of service
3921| [121785] Oracle MySQL Client up to 5.5.60/5.6.40/5.7.22/8.0.11 Client Programs denial of service
3922| [121777] Oracle MySQL Server up to 5.5.60/5.6.40/5.7.22 Client mysqldump denial of service
3923| [125564] Oracle MySQL Server up to 5.5.61/5.6.41/5.7.23/8.0.12 Storage Engines denial of service
3924| [125543] Oracle MySQL Server up to 5.5.61/5.6.41/5.7.23/8.0.12 Parser denial of service
3925| [125535] Oracle MySQL Server up to 5.5.61/5.6.41/5.7.23/8.0.12 InnoDB unknown vulnerability
3926|
3927| MITRE CVE - https://cve.mitre.org:
3928| [CVE-2010-3839] MySQL 5.1 before 5.1.51 and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (infinite loop) via multiple invocations of a (1) prepared statement or (2) stored procedure that creates a query with nested JOIN statements.
3929| [CVE-2010-3838] MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via a query that uses the (1) GREATEST or (2) LEAST function with a mixed list of numeric and LONGBLOB arguments, which is not properly handled when the function's result is "processed using an intermediate temporary table."
3930| [CVE-2010-3837] MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via a prepared statement that uses GROUP_CONCAT with the WITH ROLLUP modifier, probably triggering a use-after-free error when a copied object is modified in a way that also affects the original object.
3931| [CVE-2010-3836] MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (assertion failure and server crash) via vectors related to view preparation, pre-evaluation of LIKE predicates, and IN Optimizers.
3932| [CVE-2010-3835] MySQL 5.1 before 5.1.51 and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (mysqld server crash) by performing a user-variable assignment in a logical expression that is calculated and stored in a temporary table for GROUP BY, then causing the expression value to be used after the table is created, which causes the expression to be re-evaluated instead of accessing its value from the table.
3933| [CVE-2010-3834] Unspecified vulnerability in MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via vectors related to "materializing a derived table that required a temporary table for grouping" and "user variable assignments."
3934| [CVE-2010-3833] MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 does not properly propagate type errors, which allows remote attackers to cause a denial of service (server crash) via crafted arguments to extreme-value functions such as (1) LEAST and (2) GREATEST, related to KILL_BAD_DATA and a "CREATE TABLE ... SELECT."
3935|
3936| SecurityFocus - https://www.securityfocus.com/bid/:
3937| [52154] RETIRED: MySQL 5.5.20 Unspecified Remote Code Execution Vulnerability
3938|
3939| IBM X-Force - https://exchange.xforce.ibmcloud.com:
3940| [85724] Oracle MySQL Server XA Transactions denial of service
3941| [85723] Oracle MySQL Server Server Replication denial of service
3942| [85722] Oracle MySQL Server InnoDB denial of service
3943| [85721] Oracle MySQL Server Server Privileges unspecified
3944| [85720] Oracle MySQL Server Server Partition denial of service
3945| [85719] Oracle MySQL Server Server Parser denial of service
3946| [85718] Oracle MySQL Server Server Options denial of service
3947| [85717] Oracle MySQL Server Server Options denial of service
3948| [85716] Oracle MySQL Server Server Optimizer denial of service
3949| [85715] Oracle MySQL Server Server Optimizer denial of service
3950| [85714] Oracle MySQL Server Prepared Statements denial of service
3951| [85713] Oracle MySQL Server InnoDB denial of service
3952| [85712] Oracle MySQL Server Full Text Search denial of service
3953| [85711] Oracle MySQL Server Data Manipulation Language denial of service
3954| [85710] Oracle MySQL Server Data Manipulation Language denial of service
3955| [85709] Oracle MySQL Server Audit Log unspecified
3956| [85708] Oracle MySQL Server MemCached unspecified
3957| [84846] Debian mysql-server package information disclosure
3958| [84375] Wireshark MySQL dissector denial of service
3959| [83554] Oracle MySQL Server Server Partition denial of service
3960| [83553] Oracle MySQL Server Server Locking denial of service
3961| [83552] Oracle MySQL Server Server Install unspecified
3962| [83551] Oracle MySQL Server Server Types denial of service
3963| [83550] Oracle MySQL Server Server Privileges unspecified
3964| [83549] Oracle MySQL Server InnoDB denial of service
3965| [83548] Oracle MySQL Server InnoDB denial of service
3966| [83547] Oracle MySQL Server Data Manipulation Language denial of service
3967| [83546] Oracle MySQL Server Stored Procedure denial of service
3968| [83545] Oracle MySQL Server Server Replication denial of service
3969| [83544] Oracle MySQL Server Server Partition denial of service
3970| [83543] Oracle MySQL Server Server Optimizer denial of service
3971| [83542] Oracle MySQL Server InnoDB denial of service
3972| [83541] Oracle MySQL Server Information Schema denial of service
3973| [83540] Oracle MySQL Server Data Manipulation Language denial of service
3974| [83539] Oracle MySQL Server Data Manipulation Language denial of service
3975| [83538] Oracle MySQL Server Server Optimizer unspecified
3976| [83537] Oracle MySQL Server MemCached denial of service
3977| [83536] Oracle MySQL Server Server Privileges unspecified
3978| [83535] Oracle MySQL Server Server Privileges unspecified
3979| [83534] Oracle MySQL Server Server unspecified
3980| [83533] Oracle MySQL Server Information Schema unspecified
3981| [83532] Oracle MySQL Server Server Locking unspecified
3982| [83531] Oracle MySQL Server Data Manipulation Language denial of service
3983| [83388] MySQL administrative login attempt detected
3984| [82963] Mambo MySQL database information disclosure
3985| [82946] Oracle MySQL buffer overflow
3986| [82945] Oracle MySQL buffer overflow
3987| [82895] Oracle MySQL and MariaDB geometry queries denial of service
3988| [81577] MySQL2JSON extension for TYPO3 unspecified SQL injection
3989| [81325] Oracle MySQL Server Server Privileges denial of service
3990| [81324] Oracle MySQL Server Server Partition denial of service
3991| [81323] Oracle MySQL Server Server Optimizer denial of service
3992| [81322] Oracle MySQL Server Server Optimizer denial of service
3993| [81321] Oracle MySQL Server Server denial of service
3994| [81320] Oracle MySQL Server MyISAM denial of service
3995| [81319] Oracle MySQL Server InnoDB denial of service
3996| [81318] Oracle MySQL Server InnoDB denial of service
3997| [81317] Oracle MySQL Server Server Locking denial of service
3998| [81316] Oracle MySQL Server Server denial of service
3999| [81315] Oracle MySQL Server Server Replication unspecified
4000| [81314] Oracle MySQL Server Server Replication unspecified
4001| [81313] Oracle MySQL Server Stored Procedure denial of service
4002| [81312] Oracle MySQL Server Server Optimizer denial of service
4003| [81311] Oracle MySQL Server Information Schema denial of service
4004| [81310] Oracle MySQL Server GIS Extension denial of service
4005| [80790] Oracle MySQL yaSSL buffer overflow
4006| [80553] Oracle MySQL and MariaDB salt security bypass
4007| [80443] Oracle MySQL Server unspecified code execution
4008| [80442] Oracle MySQL Server acl_get() buffer overflow
4009| [80440] Oracle MySQL Server table buffer overflow
4010| [80435] Oracle MySQL Server database privilege escalation
4011| [80434] Oracle MySQL Server COM_BINLOG_DUMP denial of service
4012| [80433] Oracle MySQL Server Stuxnet privilege escalation
4013| [80432] Oracle MySQL Server authentication information disclosure
4014| [79394] Oracle MySQL Server Server Installation information disclosure
4015| [79393] Oracle MySQL Server Server Replication denial of service
4016| [79392] Oracle MySQL Server Server Full Text Search denial of service
4017| [79391] Oracle MySQL Server Server denial of service
4018| [79390] Oracle MySQL Server Client information disclosure
4019| [79389] Oracle MySQL Server Server Optimizer denial of service
4020| [79388] Oracle MySQL Server Server Optimizer denial of service
4021| [79387] Oracle MySQL Server Server denial of service
4022| [79386] Oracle MySQL Server InnoDB Plugin denial of service
4023| [79385] Oracle MySQL Server InnoDB denial of service
4024| [79384] Oracle MySQL Server Client unspecified
4025| [79383] Oracle MySQL Server Server denial of service
4026| [79382] Oracle MySQL Server Protocol unspecified
4027| [79381] Oracle MySQL Server Information Schema unspecified
4028| [78954] SilverStripe MySQLDatabase.php information disclosure
4029| [78948] MySQL MyISAM table symlink
4030| [77865] MySQL unknown vuln
4031| [77864] MySQL sort order denial of service
4032| [77768] MySQLDumper refresh_dblist.php information disclosure
4033| [77177] MySQL Squid Access Report unspecified cross-site scripting
4034| [77065] Oracle MySQL Server Optimizer denial of service
4035| [77064] Oracle MySQL Server Optimizer denial of service
4036| [77063] Oracle MySQL Server denial of service
4037| [77062] Oracle MySQL InnoDB denial of service
4038| [77061] Oracle MySQL GIS Extension denial of service
4039| [77060] Oracle MySQL Server Optimizer denial of service
4040| [76189] MySQL unspecified error
4041| [76188] MySQL attempts security bypass
4042| [75287] MySQLDumper restore.php information disclosure
4043| [75286] MySQLDumper filemanagement.php directory traversal
4044| [75285] MySQLDumper main.php cross-site request forgery
4045| [75284] MySQLDumper install.php cross-site scripting
4046| [75283] MySQLDumper install.php file include
4047| [75282] MySQLDumper menu.php code execution
4048| [75022] Oracle MySQL Server Server Optimizer denial of service
4049| [75021] Oracle MySQL Server Server Optimizer denial of service
4050| [75020] Oracle MySQL Server Server DML denial of service
4051| [75019] Oracle MySQL Server Partition denial of service
4052| [75018] Oracle MySQL Server MyISAM denial of service
4053| [75017] Oracle MySQL Server Server Optimizer denial of service
4054| [74672] Oracle MySQL Server multiple unspecified
4055| [73092] MySQL unspecified code execution
4056| [72540] Oracle MySQL Server denial of service
4057| [72539] Oracle MySQL Server unspecified
4058| [72538] Oracle MySQL Server denial of service
4059| [72537] Oracle MySQL Server denial of service
4060| [72536] Oracle MySQL Server unspecified
4061| [72535] Oracle MySQL Server denial of service
4062| [72534] Oracle MySQL Server denial of service
4063| [72533] Oracle MySQL Server denial of service
4064| [72532] Oracle MySQL Server denial of service
4065| [72531] Oracle MySQL Server denial of service
4066| [72530] Oracle MySQL Server denial of service
4067| [72529] Oracle MySQL Server denial of service
4068| [72528] Oracle MySQL Server denial of service
4069| [72527] Oracle MySQL Server denial of service
4070| [72526] Oracle MySQL Server denial of service
4071| [72525] Oracle MySQL Server information disclosure
4072| [72524] Oracle MySQL Server denial of service
4073| [72523] Oracle MySQL Server denial of service
4074| [72522] Oracle MySQL Server denial of service
4075| [72521] Oracle MySQL Server denial of service
4076| [72520] Oracle MySQL Server denial of service
4077| [72519] Oracle MySQL Server denial of service
4078| [72518] Oracle MySQL Server unspecified
4079| [72517] Oracle MySQL Server unspecified
4080| [72516] Oracle MySQL Server unspecified
4081| [72515] Oracle MySQL Server denial of service
4082| [72514] Oracle MySQL Server unspecified
4083| [71965] MySQL port denial of service
4084| [70680] DBD::mysqlPP unspecified SQL injection
4085| [70370] TaskFreak! multi-mysql unspecified path disclosure
4086| [68799] mod_authnz_external module for Apache mysql-auth.pl SQL injection
4087| [68294] MySQLDriverCS statement.cs sql injection
4088| [68175] Prosody MySQL denial of service
4089| [67539] Zend Framework MySQL PDO security bypass
4090| [67254] DirectAdmin MySQL information disclosure
4091| [66567] Xoops mysql.sql information disclosure
4092| [65871] PyWebDAV MySQLAuthHandler class SQL injection
4093| [65543] MySQL Select Arbitrary data into a File
4094| [65529] MySQL Eventum full_name field cross-site scripting
4095| [65380] Oracle MySQL Eventum forgot_password.php cross-site scripting
4096| [65379] Oracle MySQL Eventum list.php cross-site scripting
4097| [65266] Accellion File Transfer Appliance MySQL default password
4098| [64878] MySQL Geometry denial of service
4099| [64877] MySQL EXPLAIN EXTENDED denial of service
4100| [64876] MySQL prepared statement denial of service
4101| [64845] MySQL extreme-value denial of service
4102| [64844] MySQL Gis_line_string::init_from_wkb denial of service
4103| [64843] MySQL user-variable denial of service
4104| [64842] MySQL view preparation denial of service
4105| [64841] MySQL prepared statement denial of service
4106| [64840] MySQL LONGBLOB denial of service
4107| [64839] MySQL invocations denial of service
4108| [64838] MySQL Gis_line_string::init_from_wkb denial of service
4109| [64689] MySQL dict0crea.c denial of service
4110| [64688] MySQL SET column denial of service
4111| [64687] MySQL BINLOG command denial of service
4112| [64686] MySQL InnoDB denial of service
4113| [64685] MySQL HANDLER interface denial of service
4114| [64684] MySQL Item_singlerow_subselect::store denial of service
4115| [64683] MySQL OK packet denial of service
4116| [63518] MySQL Query Browser GUI Tools information disclosure
4117| [63517] MySQL Administrator GUI Tools information disclosure
4118| [62272] MySQL PolyFromWKB() denial of service
4119| [62269] MySQL LIKE predicates denial of service
4120| [62268] MySQL joins denial of service
4121| [62267] MySQL GREATEST() or LEAST() denial of service
4122| [62266] MySQL GROUP_CONCAT() denial of service
4123| [62265] MySQL expression values denial of service
4124| [62264] MySQL temporary table denial of service
4125| [62263] MySQL LEAST() or GREATEST() denial of service
4126| [62262] MySQL replication privilege escalation
4127| [61739] MySQL WITH ROLLUP denial of service
4128| [61343] MySQL LOAD DATA INFILE denial of service
4129| [61342] MySQL EXPLAIN denial of service
4130| [61341] MySQL HANDLER denial of service
4131| [61340] MySQL BINLOG denial of service
4132| [61339] MySQL IN() or CASE denial of service
4133| [61338] MySQL SET denial of service
4134| [61337] MySQL DDL denial of service
4135| [61318] PHP mysqlnd_wireprotocol.c buffer overflow
4136| [61317] PHP php_mysqlnd_read_error_from_line buffer overflow
4137| [61316] PHP php_mysqlnd_auth_write buffer overflow
4138| [61274] MySQL TEMPORARY InnoDB denial of service
4139| [59905] MySQL ALTER DATABASE denial of service
4140| [59841] CMySQLite updateUser.php cross-site request forgery
4141| [59112] MySQL Enterprise Monitor unspecified cross-site request forgery
4142| [59075] PHP php_mysqlnd_auth_write() buffer overflow
4143| [59074] PHP php_mysqlnd_read_error_from_line() buffer overflow
4144| [59073] PHP php_mysqlnd_rset_header_read() buffer overflow
4145| [59072] PHP php_mysqlnd_ok_read() information disclosure
4146| [58842] MySQL DROP TABLE file deletion
4147| [58676] Template Shares MySQL information disclosure
4148| [58531] MySQL COM_FIELD_LIST buffer overflow
4149| [58530] MySQL packet denial of service
4150| [58529] MySQL COM_FIELD_LIST security bypass
4151| [58311] ClanSphere the captcha generator and MySQL driver SQL injection
4152| [57925] MySQL UNINSTALL PLUGIN security bypass
4153| [57006] Quicksilver Forums mysqldump information disclosure
4154| [56800] Employee Timeclock Software mysqldump information disclosure
4155| [56200] Flex MySQL Connector ActionScript SQL injection
4156| [55877] MySQL yaSSL buffer overflow
4157| [55622] kiddog_mysqldumper extension for TYPO3 information disclosure
4158| [55416] MySQL unspecified buffer overflow
4159| [55382] Ublog UblogMySQL.sql information disclosure
4160| [55251] PHP-MySQL-Quiz editquiz.php SQL injection
4161| [54597] MySQL sql_table.cc security bypass
4162| [54596] MySQL mysqld denial of service
4163| [54365] MySQL OpenSSL security bypass
4164| [54364] MySQL MyISAM table symlink
4165| [53950] The mysql-ocaml mysql_real_escape_string weak security
4166| [52978] Zmanda Recovery Manager for MySQL mysqlhotcopy privilege escalation
4167| [52977] Zmanda Recovery Manager for MySQL socket-server.pl command execution
4168| [52660] iScouter PHP Web Portal MySQL Password Retrieval
4169| [52220] aa33code mysql.inc information disclosure
4170| [52122] MySQL Connector/J unicode SQL injection
4171| [51614] MySQL dispatch_command() denial of service
4172| [51406] MySQL Connector/NET SSL spoofing
4173| [49202] MySQL UDF command execution
4174| [49050] MySQL XPath denial of service
4175| [48919] Cisco Application Networking Manager MySQL default account password
4176| [48163] libapache2-mod-auth-mysql module for Debian multibyte encoding SQL injection
4177| [47544] MySQL Calendar index.php SQL injection
4178| [47476] MySQL Calendar index.php nodstrumCalendarV2 security bypass
4179| [45649] MySQL MyISAM symlink security bypass
4180| [45648] MySQL MyISAM symlinks security bypass
4181| [45607] MySQL Quick Admin actions.php file include
4182| [45606] MySQL Quick Admin index.php file include
4183| [45590] MySQL command-line client cross-site scripting
4184| [45436] PromoteWeb MySQL go.php SQL injection
4185| [45042] MySQL empty bit-string literal denial of service
4186| [44662] mysql-lists unspecified cross-site scripting
4187| [42267] MySQL MyISAM security bypass
4188| [42211] GEDCOM_to_MySQL2 index.php, info.php and prenom.php cross-site scripting
4189| [42014] miniBB setup_mysql.php and setup_options.php SQL injection
4190| [40920] MySQL sql_select.cc denial of service
4191| [40734] MySQL Server BINLOG privilege escalation
4192| [40350] MySQL password information disclosure
4193| [39415] Debian GNU/Linux libdspam7-drv-mysql cron job password disclosure
4194| [39402] PHP LOCAL INFILE and MySQL extension security bypass
4195| [38999] aurora framework db_mysql.lib SQL injection
4196| [38990] MySQL federated engine denial of service
4197| [38989] MySQL DEFINER value privilege escalation
4198| [38988] MySQL DATA DIRECTORY and INDEX DIRECTORY privilege escalation
4199| [38964] MySQL RENAME TABLE symlink
4200| [38733] ManageEngine EventLog Analyzer MySQL default password
4201| [38284] MySQL ha_innodb.cc convert_search_mode_to_innobase() denial of service
4202| [38189] MySQL default root password
4203| [37235] Asterisk-Addons cdr_addon_mysql module SQL injection
4204| [37099] RHSA update for MySQL case sensistive database name privilege escalation not installed
4205| [36555] PHP MySQL extension multiple functions security bypass
4206| [35960] MySQL view privilege escalation
4207| [35959] MySQL CREATE TABLE LIKE information disclosure
4208| [35958] MySQL connection protocol denial of service
4209| [35291] MySQLDumper main.php security bypass
4210| [34811] MySQL udf_init and mysql_create_function command execution
4211| [34809] MySQL mysql_update privilege escalation
4212| [34349] MySQL ALTER information disclosure
4213| [34348] MySQL mysql_change_db privilege escalation
4214| [34347] MySQL RENAME TABLE weak security
4215| [34232] MySQL IF clause denial of service
4216| [33388] Advanced Website Creator (AWC) mysql_escape_string SQL injection
4217| [33285] Eve-Nuke mysql.php file include
4218| [32957] MySQL Commander dbopen.php file include
4219| [32933] cPanel load_language.php and mysqlconfig.php file include
4220| [32911] MySQL filesort function denial of service
4221| [32462] cPanel passwdmysql cross-site scripting
4222| [32288] RHSA-2006:0544 updates for mysql not installed
4223| [32266] MySQLNewsEngine affichearticles.php3 file include
4224| [31244] The Address Book MySQL export.php password information disclosure
4225| [31037] Php/Mysql Site Builder (PHPBuilder) htm2php.php directory traversal
4226| [30760] BTSaveMySql URL file disclosure
4227| [30191] StoryStream mysql.php and mysqli.php file include
4228| [30085] MySQL MS-DOS device name denial of service
4229| [30031] Agora MysqlfinderAdmin.php file include
4230| [29438] MySQLDumper mysqldumper_path/sql.php cross-site scripting
4231| [29179] paBugs class.mysql.php file include
4232| [29120] ZoomStats MySQL file include
4233| [28448] MySQL case sensitive database name privilege escalation
4234| [28442] MySQL GRANT EXECUTE privilege escalation
4235| [28387] FunkBoard admin/mysql_install.php and admin/pg_install.php unauthorized access
4236| [28202] MySQL multiupdate subselect query denial of service
4237| [28180] MySQL MERGE table security bypass
4238| [28176] PHP MySQL Banner Exchange lib.inc information disclosure
4239| [27995] Opsware Network Automation System MySQL plaintext password
4240| [27904] MySQL date_format() format string
4241| [27635] MySQL Instance Manager denial of service
4242| [27212] MySQL SELECT str_to_date denial of service
4243| [26875] MySQL ASCII escaping SQL injection
4244| [26420] Apple Mac OS X MySQL Manager blank password
4245| [26236] MySQL login packet information disclosure
4246| [26232] MySQL COM_TABLE_DUMP buffer overflow
4247| [26228] MySQL sql_parce.cc information disclosure
4248| [26042] MySQL running
4249| [25313] WoltLab Burning Board class_db_mysql.php cross-site scripting
4250| [24966] MySQL mysql_real_query logging bypass
4251| [24653] PAM-MySQL logging function denial of service
4252| [24652] PAM-MySQL authentication double free code execution
4253| [24567] PHP/MYSQL Timesheet index.php and changehrs.php SQL injection
4254| [24095] PHP ext/mysqli exception handling format string
4255| [23990] PHP mysql_connect() buffer overflow
4256| [23596] MySQL Auction search module could allow cross-site scripting
4257| [22642] RHSA-2005:334 updates for mysql not installed
4258| [21757] MySQL UDF library functions command execution
4259| [21756] MySQL LoadLibraryEx function denial of service
4260| [21738] MySQL UDF mysql_create_function function directory traversal
4261| [21737] MySQL user defined function buffer overflow
4262| [21640] MySQL Eventum multiple class SQL injection
4263| [21638] MySQL Eventum multiple scripts cross-site scripting
4264| [20984] xmysqladmin temporary file symlink
4265| [20656] MySQL mysql_install_db script symlink
4266| [20333] Plans MySQL password information disclosure
4267| [19659] MySQL CREATE TEMPORARY TABLE command creates insecure files
4268| [19658] MySQL udf_init function gain access
4269| [19576] auraCMS mysql_fetch_row function path disclosure
4270| [18922] MySQL mysqlaccess script symlink attack
4271| [18824] MySQL UDF root privileges
4272| [18464] mysql_auth unspecified vulnerability
4273| [18449] Sugar Sales plaintext MySQL password
4274| [17783] MySQL underscore allows elevated privileges
4275| [17768] MySQL MATCH ... AGAINST SQL statement denial of service
4276| [17667] MySQL UNION change denial of service
4277| [17666] MySQL ALTER TABLE RENAME bypass restriction
4278| [17493] MySQL libmysqlclient bulk inserts buffer overflow
4279| [17462] MySQLGuest AWSguest.php script cross-site scripting
4280| [17047] MySQL mysql_real_connect buffer overflow
4281| [17030] MySQL mysqlhotcopy insecure temporary file
4282| [16612] MySQL my_rnd buffer overflow
4283| [16604] MySQL check_scramble_323 function allows unauthorized access
4284| [15883] MySQL mysqld_multi script symlink attack
4285| [15617] MySQL mysqlbug script symlink attack
4286| [15417] Confixx db_mysql_loeschen2.php SQL injection
4287| [15280] Proofpoint Protection Server MySQL allows unauthorized access
4288| [13404] HP Servicecontrol Manager multiple vulnerabilities in MySQL could allow execution of code
4289| [13153] MySQL long password buffer overflow
4290| [12689] MySQL AB ODBC Driver stores ODBC passwords and usernames in plain text
4291| [12540] Teapop PostSQL and MySQL modules SQL injection
4292| [12337] MySQL mysql_real_connect function buffer overflow
4293| [11510] MySQL datadir/my.cnf modification could allow root privileges
4294| [11493] mysqlcc configuration and connection files are world writable
4295| [11340] SuckBot mod_mysql_logger denial of service
4296| [11199] MySQL mysql_change_user() double-free memory pointer denial of service
4297| [10850] MySQL libmysql client read_one_row buffer overflow
4298| [10849] MySQL libmysql client read_rows buffer overflow
4299| [10848] MySQL COM_CHANGE_USER password buffer overflow
4300| [10847] MySQL COM_CHANGE_USER command password authentication bypass
4301| [10846] MySQL COM_TABLE_DUMP unsigned integer denial of service
4302| [10483] Bugzilla stores passwords in plain text in the MySQL database
4303| [10455] gBook MySQL could allow administrative access
4304| [10243] MySQL my.ini "
4305| [9996] MySQL SHOW GRANTS command discloses adminstrator`s encrypted password
4306| [9909] MySQL logging disabled by default on Windows
4307| [9908] MySQL binding to the loopback adapter is disabled
4308| [9902] MySQL default root password could allow unauthorized access
4309| [8748] Cyrus SASL LDAP+MySQL patch allows user unauthorized POP access
4310| [8105] PHP MySQL client library allows an attacker to bypass safe_mode restrictions
4311| [7923] Conectiva Linux MySQL /var/log/mysql file has insecure permissions
4312| [7206] WinMySQLadmin stores MySQL password in plain text
4313| [6617] MySQL "
4314| [6419] MySQL drop database command buffer overflow
4315| [6418] MySQL libmysqlclient.so buffer overflow
4316| [5969] MySQL select buffer overflow
4317| [5447] pam_mysql authentication input
4318| [5409] MySQL authentication algorithm obtain password hash
4319| [5057] PCCS MySQL Database Admin Tool could reveal username and password
4320| [4228] MySQL unauthenticated remote access
4321| [3849] MySQL default test account could allow any user to connect to the database
4322| [1568] MySQL creates readable log files
4323|
4324| Exploit-DB - https://www.exploit-db.com:
4325| [18269] MySQL 5.5.8 - Remote Denial of Service (DOS)
4326|
4327| OpenVAS (Nessus) - http://www.openvas.org:
4328| [53251] Debian Security Advisory DSA 562-1 (mysql)
4329| [53230] Debian Security Advisory DSA 540-1 (mysql)
4330|
4331| SecurityTracker - https://www.securitytracker.com:
4332| [1028790] MySQL Multiple Bugs Let Remote Users Deny Service and Partially Access and Modify Data
4333| [1028449] MySQL Multiple Bugs Let Remote Authenticated Users Deny Service and Partially Access and Modify Data
4334| [1028004] MySQL Multiple Bugs Let Remote Authenticated Users Take Full Control or Deny Service and Let Local Users Access and Modify Data
4335| [1027829] MySQL Bug in UpdateXML() Lets Remote Authenticated Users Deny Service
4336| [1027828] MySQL Heap Overflow May Let Remote Authenticated Users Execute Arbitrary Code
4337| [1027827] MySQL Stack Overflow May Let Remote Authenticated Users Execute Arbitrary Code
4338| [1027665] MySQL Multiple Bugs Let Remote Authenticated Users Access and Modify Data and Deny Service and Local Users Access Data
4339| [1027263] MySQL Multiple Bugs Let Remote Authenticated Users Deny Service
4340| [1027143] MySQL memcmp() Comparison Error Lets Remote Users Bypass Authentication
4341| [1026934] MySQL Multiple Bugs Let Remote Users Deny Service
4342| [1026896] MySQL Unspecified Flaws Have Unspecified Impact
4343| [1026659] MySQL Unspecified Flaw Lets Remote Users Execute Arbitrary Code
4344| [1026530] MySQL Multiple Bugs Let Local and Remote Users Partially Access and Modifiy Data and Partially Deny Service
4345| [1024508] MySQL Replication Flaw Lets Remote Authenticated Users Gain Elevated Privileges
4346| [1024507] MySQL Multiple Flaws Let Remote Authenticated Users Deny Service
4347| [1024360] MySQL Multiple Flaws Let Remote Authenticated Users Deny Service
4348| [1024160] MySQL ALTER DATABASE Processing Error Lets Remote Authenticated Users Deny Service
4349| [1024033] MySQL COM_FIELD_LIST Packet Buffer Overflow Lets Remote Authenticated Users Execute Arbitrary Code
4350| [1024032] MySQL Large Packet Processing Flaw in my_net_skip_rest() Lets Remote Users Deny Service
4351| [1024031] MySQL COM_FIELD_LIST Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges
4352| [1024004] MySQL mi_delete_table() Symlink Flaw Lets Remote Authenticated Users Delete Data and Index Files
4353| [1023402] MySQL Unspecified Flaw Lets Remote Users Execute Arbitrary Code
4354| [1023220] MySQL Client Fails to Check Server Certificates in Certain Cases
4355| [1022812] MySQL Unspecified Buffer Overflow Lets Remote Users Execute Arbitrary Code
4356| [1022533] MySQL Format String Bug in dispatch_command() Lets Remote Users Deny Service
4357| [1022482] MySQL Connector/Net is Missing SSL Certificate Validation
4358| [1021786] MySQL Bug in ExtractValue()/UpdateXML() in Processing XPath Expressions Lets Remote Authenticated Users Deny Service
4359| [1021714] (Red Hat Issues Fix) mod_auth_mysql Input Validation Flaw Lets Remote Users Inject SQL Commands
4360| [1020858] MySQL Item_bin_string::Item_bin_string() Binary Value Processing Bug Lets Remote Authenticated Users Deny Service
4361| [1019995] MySQL MyISAM Options Let Local Users Overwrite Table Files
4362| [1019085] MySQL Bugs Let Remote Authenticated Users Gain Elevated Privileges and Deny Service
4363| [1019084] MySQL DATA DIRECTORY and INDEX DIRECTORY Options May Let Remote Authenticated Users Gain Elevated Privileges
4364| [1019083] MySQL BINLOG Filename Path Bug May Let Remote Authenticated Users Gain Elevated Privileges
4365| [1019060] MySQL Rename Table Bug Lets Remote Authenticated Users Modify System Table Information
4366| [1018978] MySQL convert_search_mode_to_innobase() Bug Lets Remote Authenticated Users Deny Service
4367| [1018824] Asterisk-Addons Input Validation Flaw in cdr_addon_mysql Lets Remote Users Inject SQL Commands
4368| [1018663] MySQL Table View Access Bug Lets Remote Authenticated Users Gain Elevated Privileges
4369| [1018629] MySQL Authentication Protocol Bug Lets Remote Users Deny Service
4370| [1018071] MySQL ALTER TABLE Function Lets Remote Authenticated Users Obtain Potentially Sensitive Information
4371| [1018070] MySQL SQL SECURITY INVOKER Routines Let Remote Authenticated Users Gain Elevated Privileges
4372| [1018069] MySQL Lets Remote Authenticated Users Issue the RENAME TABLE Command
4373| [1017746] MySQL Single Row Subselect Statements Let Remote Users Deny Service
4374| [1016790] MySQL Replication Error Lets Local Users Deny Service
4375| [1016710] MySQL Case-Sensitive Database Names May Let Users Access Restricted Databases
4376| [1016709] MySQL Error in Checking suid Routine Arguments May Let Users Gain Elevated Privileges
4377| [1016617] MySQL MERGE Access Control Error May Let Users Access a Restricted Table
4378| [1016566] Opsware Network Automation System Discloses MySQL Password to Local Users
4379| [1016216] MySQL Error in Parsing Multibyte Encoded Data in mysql_real_escape() Lets Remote Users Inject SQL Commands
4380| [1016077] Apple MySQL Manager Database Initialization Bug May Let Local Users Access the Database
4381| [1016017] MySQL Anonymous Login Processing May Disclose Some Memory Contents to Remote Users
4382| [1016016] MySQL COM_TABLE_DUMP Processing Lets Remote Authenticated Users Execute Arbitrary Code or Obtain Information
4383| [1015789] Woltlab Burning Board Input Validation Hole in 'class_db_mysql.php' Permits Cross-Site Scripting Attacks
4384| [1015693] MySQL Query Bug Lets Remote Users Bypass Query Logging
4385| [1015603] PAM-MySQL pam_get_item() Double Free May Let Remote Users Execute Arbitrary Code
4386| [1015485] PHP mysqli Extension Error Mode Format String Flaw May Let Users Execute Arbitrary Code
4387| [1014603] MySQL Eventum Input Validation Hole in 'class.auth.php' Permits SQL Injection and Other Input Validation Bugs Permit Cross-Site Scripting Attacks
4388| [1014172] xMySQLadmin Lets Local Users Delete Files
4389| [1013995] MySQL 'mysql_install_db' Uses Unsafe Temporary Files and May Let Local Users Gain Elevated Privilege
4390| [1013994] MySQL Non-existent '--user' Error May Allow the Database to Run With Incorrect Privileges
4391| [1013415] MySQL CREATE FUNCTION Lets Authenticated Users Invoke libc Functions to Execute Arbitrary Code
4392| [1013414] MySQL udf_init() Path Validation Flaw Lets Authenticated Users Execute Arbitrary Libraries
4393| [1013413] MySQL CREATE TEMPORARY TABLE Uses Predictable Temporary Files That May Let Users Gain Elevated Privileges
4394| [1012914] MySQL 'mysqlaccess.sh' Unsafe Temporary Files May Let Local Users Gain Elevated Privileges
4395| [1012893] MySQL MaxDB Buffer Overflow in websql Password Parameter Lets Remote Users Execute Arbitrary Code
4396| [1012500] mysql_auth Memory Leak Has Unspecified Impact
4397| [1011741] MySQL Access Control Error in Databases With Underscore Wildcard Character May Grant Unauthorized Access
4398| [1011606] MySQL May Let Remote Authenticated Users Access Restricted Tables or Crash the System
4399| [1011408] MySQL libmysqlclient Buffer Overflow in Executing Prepared Statements Has Unspecified Impact
4400| [1011376] MySQLGuest Lack of Input Validation Lets Remote Users Conduct Cross-Site Scripting Attacks
4401| [1011008] MySQL Buffer Overflow in mysql_real_connect() May Let Remote Users Execute Arbitrary Code
4402| [1010979] MySQL 'mysqlhotcopy' Unsafe Temporary Files May Let Local Users Gain Elevated Privileges
4403| [1010645] MySQL check_scramble_323() Zero-Length Comparison Lets Remote Users Bypass Authentication
4404| [1009784] MySQL 'mysqld_multi' Temporary File Flaw Lets Local Users Overwrite Files
4405| [1009554] MySQL 'mysqlbug' Temporary File Flaw Lets Local Users Overwrite Files
4406| [1007979] MySQL mysql_change_user() Double Free Error Lets Remote Authenticated Users Crash mysqld
4407| [1007673] MySQL acl_init() Buffer Overflow Permits Remote Authenticated Administrators to Execute Arbitrary Code
4408| [1007518] DWebPro Discloses MySQL Database Password to Local Users
4409| [1007312] MySQL World-Writable Configuration File May Let Local Users Gain Root Privileges
4410| [1006976] MySQL Buffer Overflow in 'mysql_real_connect()' Client Function May Let Remote or Local Users Execute Arbitrary Code
4411| [1005800] MySQL Overflow and Authentication Bugs May Let Remote Users Execute Code or Access Database Accounts
4412| [1005345] MySQL Buffer Overflow Lets Local Users Gain System Privileges on Windows NT
4413| [1004506] vBulletin PHP-based Forum Software Has Unspecified Security Flaw in the 'db_mysql.php' Module
4414| [1004172] PHP-Survey Script Discloses Underlying MySQL Database Username and Password to Remote Users
4415| [1003955] 3rd Party Patch for Cyrus SASL ('auxprop for mysql and ldap') Lets Remote Users Access Protected POP Mail Accounts Without Authentication
4416| [1003290] Conectiva Linux MySQL Distribution May Allow Local Users to Obtain Sensitive Information
4417| [1002993] PurePostPro Script Add-on for PureFTPd and MySQL Allows Remote Users to Execute SQL Commands on the Server
4418| [1002485] WinMySQLadmin Database Administration Tool Discloses MySQL Password to Local Users
4419| [1002324] Vpopmail Mail Server Discloses Database Password to Local Users When Installed with MySQL
4420| [1001411] phpMyAdmin Administration Tool for MySQL Allows Remote Users to Execute Commands on the Server
4421| [1001118] MySQL Database Allows Authorized Users to Modify Server Files to Deny Service or Obtain Additional Access
4422|
4423| OSVDB - http://www.osvdb.org:
4424| [95337] Oracle MySQL Server XA Transactions Subcomponent Unspecified Remote DoS
4425| [95336] Oracle MySQL Server Replication Subcomponent Unspecified Remote DoS
4426| [95335] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS
4427| [95334] Oracle MySQL Server Privileges Subcomponent Unspecified Remote Issue
4428| [95333] Oracle MySQL Server Partition Subcomponent Unspecified Remote DoS
4429| [95332] Oracle MySQL Server Parser Subcomponent Unspecified Remote DoS
4430| [95331] Oracle MySQL Server Options Subcomponent Unspecified Remote DoS (2013-3801)
4431| [95330] Oracle MySQL Server Options Subcomponent Unspecified Remote DoS (2013-3808)
4432| [95329] Oracle MySQL Server Optimizer Subcomponent Unspecified Remote DoS (2013-3796)
4433| [95328] Oracle MySQL Server Optimizer Subcomponent Unspecified Remote DoS (2013-3804)
4434| [95327] Oracle MySQL Server Prepared Statements Subcomponent Unspecified Remote DoS
4435| [95326] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS
4436| [95325] Oracle MySQL Server Full Text Search Subcomponent Unspecified Remote DoS
4437| [95324] Oracle MySQL Server Data Manipulation Language Subcomponent Unspecified Remote DoS (2013-3795)
4438| [95323] Oracle MySQL Server Data Manipulation Language Subcomponent Unspecified Remote DoS (2013-3793)
4439| [95322] Oracle MySQL Server Audit Log Subcomponent Unspecified Remote Issue
4440| [95321] Oracle MySQL Server MemCached Subcomponent Unspecified Remote Issue
4441| [95131] AutoMySQLBackup /usr/sbin/automysqlbackup Database Name Arbitrary Code Injection
4442| [94076] Debian Linux MySQL Server mysql-server-5.5.postinst Race Condition debian.cnf Plaintext Credential Local Disclosure
4443| [93505] Wireshark MySQL Dissector (packet-mysql.c) Malformed Packet Handling Infinite Loop Remote DoS
4444| [93174] MySQL Crafted Derived Table Handling DoS
4445| [92967] MySQL2JSON (mn_mysql2json) Extension for TYPO3 Unspecified SQL Injection
4446| [92950] MySQL Running START SLAVE Statement Process Listing Plaintext Local Password Disclosure
4447| [92485] Oracle MySQL Server Partition Subcomponent Unspecified Local DoS
4448| [92484] Oracle MySQL Server Locking Subcomponent Unspecified Remote DoS (2013-1506)
4449| [92483] Oracle MySQL Server Install Subcomponent Unspecified Local Issue
4450| [92482] Oracle MySQL Server Types Subcomponent Unspecified Remote DoS
4451| [92481] Oracle MySQL Server Privileges Subcomponent Unspecified Remote Issue (2013-2381)
4452| [92480] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS (2013-1566)
4453| [92479] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS (2013-1511)
4454| [92478] Oracle MySQL Server Data Manipulation Language Subcomponent Unspecified Remote DoS (2013-1567)
4455| [92477] Oracle MySQL Server Stored Procedure Subcomponent Unspecified Remote DoS
4456| [92476] Oracle MySQL Server Replication Subcomponent Unspecified Remote DoS
4457| [92475] Oracle MySQL Server Partition Subcomponent Unspecified Remote DoS
4458| [92474] Oracle MySQL Server Optimizer Subcomponent Unspecified Remote DoS
4459| [92473] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS (2013-2389)
4460| [92472] Oracle MySQL Server Information Schema Subcomponent Unspecified Remote DoS
4461| [92471] Oracle MySQL Server Data Manipulation Language Subcomponent Unspecified Remote DoS (2013-1512)
4462| [92470] Oracle MySQL Server Data Manipulation Language Subcomponent Unspecified Remote DoS (2013-1544)
4463| [92469] Oracle MySQL Server Optimizer Subcomponent Unspecified Remote Issue
4464| [92468] Oracle MySQL Server MemCached Subcomponent Unspecified Remote DoS
4465| [92467] Oracle MySQL Server Privileges Subcomponent Unspecified Remote Issue (2013-2375)
4466| [92466] Oracle MySQL Server Privileges Subcomponent Unspecified Remote Issue (2013-1531)
4467| [92465] Oracle MySQL Server Server Subcomponent Unspecified Remote Issue
4468| [92464] Oracle MySQL Server Information Schema Subcomponent Unspecified Remote Issue
4469| [92463] Oracle MySQL Server Locking Subcomponent Unspecified Remote Issue (2013-1521)
4470| [92462] Oracle MySQL Server Data Manipulation Language Subcomponent Unspecified Remote DoS (2013-2395)
4471| [91536] Oracle MySQL yaSSL Unspecified Overflow (2012-0553)
4472| [91534] Oracle MySQL yaSSL Unspecified Overflow (2013-1492)
4473| [91415] MySQL Raw Geometry Object String Conversion Remote DoS
4474| [91108] Juju mysql Charm Install Script mysql.passwd MySQL Password Plaintext Local Disclosure
4475| [89970] Site Go /site-go/admin/extra/mysql/index.php idm Parameter Traversal Arbitrary File Access
4476| [89265] Oracle MySQL Server Server Privileges Subcomponent Unspecified Remote DoS
4477| [89264] Oracle MySQL Server Server Partition Subcomponent Unspecified Remote DoS
4478| [89263] Oracle MySQL Server Server Optimizer Subcomponent Unspecified Remote DoS (2012-0578)
4479| [89262] Oracle MySQL Server Server Optimizer Subcomponent Unspecified Remote DoS (2012-1705)
4480| [89261] Oracle MySQL Server Server Subcomponent Unspecified Remote DoS (2012-0574)
4481| [89260] Oracle MySQL Server MyISAM Subcomponent Unspecified Remote DoS
4482| [89259] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS (2012-0572)
4483| [89258] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS (2013-0368)
4484| [89257] Oracle MySQL Server Server Locking Subcomponent Unspecified Remote DoS
4485| [89256] Oracle MySQL Server Server Subcomponent Unspecified Remote DoS (2012-1702)
4486| [89255] Oracle MySQL Server Server Replication Subcomponent Unspecified Remote Issue
4487| [89254] Oracle MySQL Server Server Replication Subcomponent Unspecified Local Issue
4488| [89253] Oracle MySQL Server Stored Procedure Subcomponent Unspecified Remote DoS
4489| [89252] Oracle MySQL Server Server Optimizer Subcomponent Unspecified Remote DoS
4490| [89251] Oracle MySQL Server Information Schema Subcomponent Unspecified Remote DoS
4491| [89250] Oracle MySQL Server GIS Extension Subcomponent Unspecified Remote DoS
4492| [89042] ViciBox Server MySQL cron Service Default Credentials
4493| [88415] Oracle MySQL Server COM_CHANGE_USER Account Password Brute-Force Weakness
4494| [88118] Oracle MySQL Server FILE Privilege Database Privilege Escalation
4495| [88067] Oracle MySQL Server Authentication Error Message User Enumeration
4496| [88066] Oracle MySQL Server for Linux Access Rights Checking Routine Database Name Handling Stack Buffer Overflow
4497| [88065] Oracle MySQL Server COM_BINLOG_DUMP Invalid Data Handling DoS
4498| [88064] Oracle MySQL Server Multiple-Table DELETE Heap Buffer Overflow
4499| [87704] CodeIgniter MySQL / MySQLi Driver Database Client Multi-byte Character Set Unspecified SQL Injection
4500| [87507] Oracle MySQL Statement Logging Multiple Log Plaintext Local Password Disclosure
4501| [87501] Oracle MySQL optimizer_switch Malformed Value Processing Local DoS
4502| [87494] Oracle MySQL on Windows Field_new_decimal::store_value dbug_buff Variable Overflow DoS
4503| [87480] MySQL Malformed XML Comment Handling DoS
4504| [87466] MySQL SSL Certificate Revocation Weakness
4505| [87356] Oracle MySQL do_div_mod DIV Expression Handling Remote DoS
4506| [87355] Oracle MySQL handler::pushed_cond Table Cache Handling mysqld DoS
4507| [87354] Oracle MySQL Polygon Union / Intersection Spatial Operations DoS
4508| [86273] Oracle MySQL Server Server Installation Subcomponent Unspecified Local Information Disclosure
4509| [86272] Oracle MySQL Server Server Replication Subcomponent Unspecified Remote DoS
4510| [86271] Oracle MySQL Server Server Full Text Search Subcomponent Unspecified Remote DoS
4511| [86270] Oracle MySQL Server Server Subcomponent Unspecified Remote DoS (2012-3156)
4512| [86269] Oracle MySQL Server MySQL Client Subcomponent Unspecified Remote Information Disclosure
4513| [86268] Oracle MySQL Server Server Optimizer Subcomponent Unspecified Remote DoS (2012-3180)
4514| [86267] Oracle MySQL Server Server Optimizer Subcomponent Unspecified Remote DoS (2012-3150)
4515| [86266] Oracle MySQL Server Server Subcomponent Unspecified Remote DoS (2012-3144)
4516| [86265] Oracle MySQL Server InnoDB Plugin Subcomponent Unspecified Remote DoS
4517| [86264] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS
4518| [86263] Oracle MySQL Server MySQL Client Subcomponent Unspecified Remote Issue
4519| [86262] Oracle MySQL Server Server Subcomponent Unspecified Remote DoS (2012-3177)
4520| [86261] Oracle MySQL Server Protocol Subcomponent Unspecified Remote Issue
4521| [86260] Oracle MySQL Server Information Schema Subcomponent Unspecified Remote Code Execution
4522| [86175] Oracle MySQL on Windows Path Subversion Arbitrary DLL Injection Code Execution
4523| [85155] Icinga module/idoutils/db/scripts/create_mysqldb.sh Icinga User Database Access Restriction Bypass
4524| [84755] Oracle MySQL Sort Order Index Calculation Remote DoS
4525| [84719] MySQLDumper index.php page Parameter XSS
4526| [84680] MySQL Squid Access Report access.log File Path XSS
4527| [83980] Oracle MySQL Server Optimizer Subcomponent Unspecified Remote DoS (2012-1689)
4528| [83979] Oracle MySQL Server Optimizer Subcomponent Unspecified Remote DoS (2012-1734)
4529| [83978] Oracle MySQL Server Subcomponent Unspecified Remote DoS
4530| [83977] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS
4531| [83976] Oracle MySQL Server GIS Extension Subcomponent Unspecified Remote DoS
4532| [83975] Oracle MySQL Server Optimizer Subcomponent Unspecified Remote DoS (2012-1735)
4533| [83661] Oracle MySQL Unspecified Issue (59533)
4534| [82804] Oracle MySQL Authentication Protocol Token Comparison Casting Failure Password Bypass
4535| [82803] Oracle MySQL Unspecified Issue (59387)
4536| [82120] Oracle MySQL Version Specific Comment Handling Arbitrary SQL Command Execution
4537| [81897] Viscacha classes/database/mysql.inc.php Multiple Parameter SQL Injection
4538| [81616] MySQLDumper Multiple Script Direct Request Information Disclosure
4539| [81615] MySQLDumper filemanagement.php f Parameter Traversal Arbitrary File Access
4540| [81614] MySQLDumper File Upload PHP Code Execution
4541| [81613] MySQLDumper main.php Multiple Function CSRF
4542| [81612] MySQLDumper restore.php filename Parameter XSS
4543| [81611] MySQLDumper sql.php Multiple Parameter XSS
4544| [81610] MySQLDumper install.php Multiple Parameter XSS
4545| [81609] MySQLDumper install.php language Parameter Traversal Arbitrary File Access
4546| [81378] Oracle MySQL Server Server Optimizer Component Unspecified Remote DoS (2012-1690)
4547| [81377] Oracle MySQL Server Server Optimizer Component Unspecified Remote DoS (2012-1696)
4548| [81376] Oracle MySQL Server Server DML Component Unspecified Remote DoS
4549| [81375] Oracle MySQL Server Partition Component Unspecified Remote DoS
4550| [81374] Oracle MySQL Server MyISAM Component Unspecified Remote DoS
4551| [81373] Oracle MySQL Server Server Optimizer Component Unspecified Remote DoS (2012-1703)
4552| [81059] Oracle MySQL Server Multiple Unspecified Issues
4553| [79038] Webmin Process Listing MySQL Password Local Disclosure
4554| [78919] Oracle MySQL Unspecified Pre-authentication Remote Code Execution
4555| [78710] WordPress wp-admin/setup-config.php MySQL Query Saturation Brute-Force Proxy Weakness
4556| [78708] WordPress wp-admin/setup-config.php MySQL Database Verification Code Injection Weakness
4557| [78707] WordPress wp-admin/setup-config.php MySQL Credentials Error Message Brute-Force Weakness
4558| [78394] Oracle MySQL Server Unspecified Remote DoS (2012-0493)
4559| [78393] Oracle MySQL Server Unspecified Remote DoS (2012-0492)
4560| [78392] Oracle MySQL Server Unspecified Remote DoS (2012-0117)
4561| [78391] Oracle MySQL Server Unspecified Remote DoS (2012-0112)
4562| [78390] Oracle MySQL Server Unspecified Remote DoS (2012-0495)
4563| [78389] Oracle MySQL Server Unspecified Remote DoS (2012-0491)
4564| [78388] Oracle MySQL Server Unspecified Remote DoS (2012-0490)
4565| [78387] Oracle MySQL Server Unspecified Remote DoS (2012-0489)
4566| [78386] Oracle MySQL Server Unspecified Remote DoS (2012-0488)
4567| [78385] Oracle MySQL Server Unspecified Remote DoS (2012-0487)
4568| [78384] Oracle MySQL Server Unspecified Remote DoS (2012-0486)
4569| [78383] Oracle MySQL Server Unspecified Remote DoS (2012-0485)
4570| [78382] Oracle MySQL Server Unspecified Remote DoS (2012-0120)
4571| [78381] Oracle MySQL Server Unspecified Remote DoS (2012-0119)
4572| [78380] Oracle MySQL Server Unspecified Remote DoS (2012-0115)
4573| [78379] Oracle MySQL Server Unspecified Remote DoS (2012-0102)
4574| [78378] Oracle MySQL Server Unspecified Remote DoS (2012-0101)
4575| [78377] Oracle MySQL Server Unspecified Remote DoS (2012-0087)
4576| [78376] Oracle MySQL Server Unspecified Remote DoS (2011-2262)
4577| [78375] Oracle MySQL Server Unspecified Local DoS
4578| [78374] Oracle MySQL Server Unspecified Remote Issue (2012-0075)
4579| [78373] Oracle MySQL Server Unspecified Local Issue
4580| [78372] Oracle MySQL Server Unspecified Remote Information Disclosure
4581| [78371] Oracle MySQL Server Unspecified Remote Issue (2012-0496)
4582| [78370] Oracle MySQL Server Unspecified Remote Issue (2012-0118)
4583| [78369] Oracle MySQL Server Unspecified Remote Issue (2012-0116)
4584| [78368] Oracle MySQL Server Unspecified Remote Issue (2012-0113)
4585| [78283] Oracle MySQL NULL Pointer Dereference Packet Parsing Remote DoS
4586| [77042] e107 CMS install_.php MySQL Server Name Parsing Remote PHP Code Execution
4587| [77040] DBD::mysqlPP Unspecified SQL Injection
4588| [75888] TaskFreak! multi-mysql Multiple Script Direct Request Path Disclosure
4589| [74120] Apache HTTP Server mod_authnz_external mysql/mysql-auth.pl user Field SQL Injection
4590| [73555] Prosody MySQL Value Column Invalid Data Type Handling DoS
4591| [73387] Zend Framework PDO_MySql Character Set Security Bypass
4592| [72836] Arctic Fox CMS Multiple Script Direct Request MySQL Settings Disclosure
4593| [72660] MySQL GUI Tools Administrator / Query Browser Command Line Credentials Local Disclosure
4594| [72120] DirectAdmin mysql_backups Folder MySQL Database Backup Local Disclosure
4595| [71368] Accellion File Transfer Appliance Weak MySQL root Password
4596| [70967] MySQL Eventum Admin User Creation CSRF
4597| [70966] MySQL Eventum preferences.php full_name Parameter XSS
4598| [70961] MySQL Eventum list.php Multiple Parameter XSS
4599| [70960] MySQL Eventum forgot_password.php URI XSS
4600| [70947] PyWebDAV DAVServer/mysqlauth.py get_userinfo() Multiple Parameter SQL Injection
4601| [70610] PHP MySQLi Extension set_magic_quotes_runtime Function mysqli_fetch_assoc Function Interaction Weakness
4602| [69885] SilverStripe modules/sapphire/trunk/core/model/MySQLDatabase.php showqueries Parameter SQL Command Disclosure
4603| [69395] MySQL Derived Table Grouping DoS
4604| [69394] MySQL Temporary Table Expression Re-Evaluation DoS
4605| [69393] MySQL GROUP_CONCAT() WITH ROLLUP Modifier DoS
4606| [69392] MySQL Extreme-Value Functions Mixed Arguments DoS
4607| [69391] MySQL Stored Procedures / Prepared Statements Nested Joins DoS
4608| [69390] MySQL Extreme-Value Functions Argument Parsing Type Error DoS
4609| [69389] MySQL CONVERT_TZ() Function Empty SET Column DoS
4610| [69388] MySQL InnoDB Storage Engine Table Handling Overflow
4611| [69387] MySQL LIKE Predicates Pre-Evaluation DoS
4612| [69001] MySQL PolyFromWKB() Function WKB Data Remote DoS
4613| [69000] MySQL HANDLER Interface Unspecified READ Request DoS
4614| [68997] MySQL Prepared-Statement Mode EXPLAIN DoS
4615| [68996] MySQL EXPLAIN EXTENDED Statement DoS
4616| [68995] MySQL GeometryCollection non-Geometry Value Assignment DoS
4617| [67488] phpMyAdmin libraries/dbi/mysqli.dbi.lib.php Unspecified Parameter XSS
4618| [67487] phpMyAdmin libraries/dbi/mysql.dbi.lib.php Unspecified Parameter XSS
4619| [67421] PHP Mysqlnd Extension mysqlnd_wireprotocol.c php_mysqlnd_rset_header_read Function Overflow
4620| [67420] PHP Mysqlnd Extension mysqlnd_wireprotocol.c php_mysqlnd_ok_read Function Arbitrary Memory Content Disclosure
4621| [67419] PHP Mysqlnd Extension php_mysqlnd_read_error_from_line Function Negative Buffer Length Value Overflow
4622| [67418] PHP Mysqlnd Extension php_mysqlnd_auth_write Function Multiple Overflows
4623| [67384] MySQL LOAD DATA INFILE Statement Incorrect OK Packet DoS
4624| [67383] MySQL EXPLAIN Statement Item_singlerow_subselect::store Function NULL Dereference DoS
4625| [67381] MySQL InnoDB Temporary Table Handling DoS
4626| [67380] MySQL BINLOG Statement Unspecified Argument DoS
4627| [67379] MySQL Multiple Operation NULL Argument Handling DoS
4628| [67378] MySQL Unique SET Column Join Statement Remote DoS
4629| [67377] MySQL DDL Statement Multiple Configuration Parameter DoS
4630| [66800] PHP Multiple mysqlnd_* Function Unspecified Overflow
4631| [66799] PHP mysqlnd Error Packet Handling Multiple Overflows
4632| [66731] PHP Bundled MySQL Library Unspecified Issue
4633| [66665] PHP MySQL LOAD DATA LOCAL open_basedir Bypass
4634| [65851] MySQL ALTER DATABASE #mysql50# Prefix Handling DoS
4635| [65450] phpGraphy mysql_cleanup.php include_path Parameter Remote File Inclusion
4636| [65085] MySQL Enterprise Monitor Unspecified CSRF
4637| [64843] MySQL DROP TABLE Command Symlink MyISAM Table Local Data Deletion
4638| [64588] MySQL sql/net_serv.cc my_net_skip_rest Function Large Packet Handling Remote DoS
4639| [64587] MySQL COM_FIELD_LIST Command Packet Table Name Argument Overflow
4640| [64586] MySQL COM_FIELD_LIST Command Packet Authentication Bypass
4641| [64524] Advanced Poll misc/get_admin.php mysql_host Parameter XSS
4642| [64447] Tirzen Framework (TZN) tzn_mysql.php Username Parameter SQL Injection Authentication Bypass
4643| [64320] ClanSphere MySQL Driver s_email Parameter SQL Injection
4644| [63903] MySQL sql/sql_plugin.cc mysql_uninstall_plugin Function UNINSTALL PLUGIN Command Privilege Check Weakness
4645| [63115] Quicksilver Forums mysqldump Process List Database Password Disclosure
4646| [62830] Employee Timeclock Software mysqldump Command-line Database Password Disclosure
4647| [62640] PHP mysqli_real_escape_string() Function Error Message Path Disclosure
4648| [62216] Flex MySQL Connector ActionScript SQL Query Arbitrary Code Execution
4649| [61752] kiddog_mysqldumper Extension for TYPO3 Unspecified Information Disclosure
4650| [61497] microTopic admin/mysql.php rating Parameter SQL Injection
4651| [60665] MySQL CREATE TABLE MyISAM Table mysql_unpacked_real_data_home Local Restriction Bypass
4652| [60664] MySQL sql/sql_table.cc Data Home Directory Symlink CREATE TABLE Access Restriction Bypass
4653| [60516] RADIO istek scripti estafresgaftesantusyan.inc Direct Request MySQL Database Credentials Disclosure
4654| [60489] MySQL GeomFromWKB() Function First Argument Geometry Value Handling DoS
4655| [60488] MySQL SELECT Statement WHERE Clause Sub-query DoS
4656| [60487] MySQL vio_verify_callback() Function Crafted Certificate MiTM Weakness
4657| [60356] MySql Client Library (libmysqlclient) mysql_real_connect Function Local Overflow
4658| [59907] MySQL on Windows bind-address Remote Connection Weakness
4659| [59906] MySQL on Windows Default Configuration Logging Weakness
4660| [59616] MySQL Hashed Password Weakness
4661| [59609] Suckbot mod_mysql_logger Shared Object Unspecified Remote DoS
4662| [59495] Cyrus SASL LDAP / MySQL Authentication Patch password Field SQL Injection Authentication Bypass
4663| [59062] phpMyAdmin Extension for TYPO3 MySQL Table Name Unspecified XSS
4664| [59045] phpMyAdmin Crafted MYSQL Table Name XSS
4665| [59030] mysql-ocaml for MySQL mysql_real_escape_string() Function Character Escaping Weakness
4666| [57587] Zmanda Recovery Manager for MySQL socket-server.pl system() Function Local Privilege Escalation
4667| [57586] Zmanda Recovery Manager for MySQL socket-server.pl system() Function Remote Shell Command Execution
4668| [56741] MySQL Connector/J Unicode w/ SJIS/Windows-31J Charset SQL Injection
4669| [56134] Virtualmin MySQL Module Execute SQL Feature Arbitrary File Access
4670| [55734] MySQL sql_parse.cc dispatch_command() Function Format String DoS
4671| [55566] MySQL Connector/NET SSL Certificate Verification Weakness
4672| [53525] MyBlog /config/mysqlconnection.inc Direct Request Information Disclosure
4673| [53524] blog+ includes/window_top.php row_mysql_bloginfo[theme] Parameter Traversal Local File Inclusion
4674| [53523] blog+ includes/block_center_down.php row_mysql_blocks_center_down[file] Parameter Traversal Local File Inclusion
4675| [53522] blog+ includes/block_center_top.php row_mysql_blocks_center_top[file] Parameter Traversal Local File Inclusion
4676| [53521] blog+ includes/block_left.php row_mysql_blocks_left[file] Parameter Traversal Local File Inclusion
4677| [53520] blog+ includes/block_right.php row_mysql_blocks_right[file] Parameter Traversal Local File Inclusion
4678| [53519] blog+ includes/window_down.php row_mysql_bloginfo[theme] Parameter Traversal Local File Inclusion
4679| [53366] GEDCOM_TO_MYSQL php/info.php Multiple Parameter XSS
4680| [53365] GEDCOM_TO_MYSQL php/index.php nom_branche Parameter XSS
4681| [53364] GEDCOM_TO_MYSQL php/prenom.php Multiple Parameter XSS
4682| [53360] Blogplus includes/window_top.php row_mysql_bloginfo[theme] Parameter Traversal Local File Inclusion
4683| [53359] Blogplus includes/window_down.php row_mysql_bloginfo[theme] Parameter Traversal Local File Inclusion
4684| [53358] Blogplus includes/block_right.php row_mysql_blocks_right[file] Parameter Traversal Local File Inclusion
4685| [53357] Blogplus includes/block_left.php row_mysql_blocks_left[file] Parameter Traversal Local File Inclusion
4686| [53356] Blogplus block_center_top.php row_mysql_blocks_center_top[file] Parameter Traversal Local File Inclusion
4687| [53355] Blogplus includes/block_center_down.php row_mysql_blocks_center_down[file] Parameter Traversal Local File Inclusion
4688| [53110] XOOPS Cube Legacy ErrorHandler::show() Function MySQL Error Message XSS
4689| [52729] Asterisk-addon cdr_addon_mysql.c Call Detail Record SQL Injection
4690| [52728] Tribox cdr_addon_mysql.c Call Detail Record XSS
4691| [52727] FreePBX cdr_addon_mysql.c Call Detail Record XSS
4692| [52726] Areski cdr_addon_mysql.c Call Detail Record XSS
4693| [52464] MySQL charset Column Truncation Weakness
4694| [52453] MySQL sql/item_xmlfunc.cc ExtractValue() / UpdateXML() Functions Scalar XPath DoS
4695| [52378] Cisco ANM MySQL root Account Default Password
4696| [52264] Broadcast Machine MySQLController.php controllers/baseDir Parameter Remote File Inclusion
4697| [51923] Apache HTTP Server mod-auth-mysql Module mod_auth_mysql.c Multibyte Character Encoding SQL Injection
4698| [51171] MySQL InnoDB convert_search_mode_to_innobase Function DoS
4699| [50892] MySQL Calendar index.php username Parameter SQL Injection
4700| [50827] Nodstrum MySQL Calendar nodstrumCalendarV2 Cookie Manipulation Admin Authentication Bypass
4701| [49875] PromoteWeb MySQL go.php id Parameter SQL Injection
4702| [48710] MySQL Command Line Client HTML Output XSS
4703| [48709] MySQL Quick Admin actions.php lang Parameter Traversal Local File Inclusion
4704| [48708] MySQL Quick Admin index.php language Cookie Traversal Local File Inclusion
4705| [48021] MySQL Empty Bit-String Literal Token SQL Statement DoS
4706| [47789] mysql-lists Unspecified XSS
4707| [47394] Keld PHP-MySQL News Script login.php username Parameter SQL Injection
4708| [45073] MySQLDumper Extension for TYPO3 Unspecified Authentication Bypass
4709| [44937] MySQL MyISAM Table CREATE TABLE Privilege Check Bypass
4710| [44138] Debian GNU/Linux libdspam7-drv-mysql Cron MySQL dspam Database Password Local Disclosure
4711| [44071] Phorum /include/db/mysql.php Unspecified Search SQL Injection
4712| [43180] MySQL sql_select.cc INFORMATION_SCHEMA Table Crafted Query Remote DoS
4713| [43179] MySQL Server BINLOG Statement Rights Checking Failure
4714| [42610] MySQL DEFINER View Value Crafted Statements Remote Privilege Escalation
4715| [42609] MySQL Federated Engine SHOW TABLE STATUS Query Remote DoS
4716| [42608] MySQL RENAME TABLE Symlink System Table Overwrite
4717| [42607] MySQL Multiple table-level DIRECTORY Remote Privilege Escalation
4718| [42460] MySQLDumper HTTP POST Request Remote Authentication Bypass
4719| [42423] AdventNet EventLog Analyzer MySQL Installation Default root Account
4720| [41861] Bacula make_catalog_backup Function MySQL Director Password Cleartext Disclosure
4721| [40232] PHP MySQL Banner Exchange inc/lib.inc Direct Request Database Disclosure
4722| [40188] Password Manager Pro (PMP) mysql Unspecified Remote Command Injection
4723| [39279] PHP mysql_error() Function XSS
4724| [39145] aurora framework db_mysql.lib pack_var() value Parameter SQL Injection
4725| [38567] NetClassifieds Mysql_db.php Halt_On_Error Setting Error Message Path Disclosure
4726| [38112] Excel Parser Pro sample/xls2mysql parser_path Parameter Remote File Inclusion
4727| [37880] Asterisk-Addons source/destination Numbers cdr_addon_mysql Module SQL Injection
4728| [37784] PHP MySQL Extension Multiple Function Security Restriction Bypass
4729| [37783] MySQL Community Server CREATE TABLE LIKE Table Structure Disclosure
4730| [37782] MySQL Community Server External Table View Privilege Escalation
4731| [37781] MySQL ALTER TABLE Information Disclosure
4732| [37539] GPL PHP Board db.mysql.inc.php root_path Parameter Remote File Inclusion
4733| [37195] Eve-Nuke Module for PHP-Nuke db/mysql.php phpbb_root_path
4734| [37015] paBugs class.mysql.php path_to_bt_dir Parameter Remote File Inclusion
4735| [36868] PHP MySQLi Extension LOCAL INFILE Operation Security Restriction Bypass
4736| [36867] PHP MySQL Extension LOCAL INFILE Operation Security Restriction Bypass
4737| [36771] InterWorx-CP SiteWorx mysql.php PATH_INFO Parameter XSS
4738| [36757] InterWorx-CP NodeWorx mysql.php PATH_INFO Parameter XSS
4739| [36732] MySQL Community Server Connection Protocol Malformed Password Packet Remote DoS
4740| [36251] Associated Press (AP) Newspower Default MySQL root Password
4741| [35168] Study Planner (Studiewijzer) db/mysql/db.inc.php SPL_CFG[dirroot] Parameter Remote File Inclusion
4742| [35037] Fantastico for cPanel includes/mysqlconfig.php fantasticopath Parameter Traversal Local File Inclusion
4743| [34780] Backup Manager Command Line Cleartext MySQL Password Disclosure
4744| [34766] MySQL RENAME TABLE Statement Arbitrary Table Name Modification
4745| [34765] MySQL mysql_change_db Function THD::db_access Privilege Escalation
4746| [34734] MySQL Crafted IF Clause Divide-by-zero NULL Dereference DoS
4747| [34038] MySQL Commander ressourcen/dbopen.php home Parameter Remote File Inclusion
4748| [33974] MySQL information_schema Table Subselect Single-Row DoS
4749| [33678] MySQLNewsEngine affichearticles.php3 newsenginedir Parameter Remote File Inclusion
4750| [33447] WGS-PPC (PPC Search Engine) config/mysql_config.php INC Parameter Remote File Inclusion
4751| [33372] deV!L'z Clanportal inc/filebrowser/browser.php MySQL Data Disclosure
4752| [33147] ActiveCalendar data/mysqlevents.php css Parameter XSS
4753| [32784] Storystream mysqli.php baseDir Parameter Remote File Inclusion
4754| [32783] Storystream mysql.php baseDir Parameter Remote File Inclusion
4755| [32421] Contenido CMS conlib/db_mysqli.inc Direct Request Path Disclosure
4756| [32272] JevonCMS /phplib/db_mysql.inc Direct Request Path Disclosure
4757| [32171] Blue Magic Board db_mysql_error.php Direct Request Path Disclosure
4758| [32056] BTSaveMySql Direct Request Config File Disclosure
4759| [32044] cPanel WebHost Manager (WHM) scripts/passwdmysql password Parameter XSS
4760| [32024] TikiWiki tiki-wiki_rss.php ver MySQL Credential Disclosure
4761| [31963] Agora MysqlfinderAdmin.php _SESSION[PATH_COMPOSANT] Parameter Remote File Inclusion
4762| [31431] ZoomStats libs/dbmax/mysql.php GLOBALS[lib][db][path] Parameter Remote File Inclusion
4763| [30172] TikiWiki Multiple Script Empty sort_mode Parameter MySQL Authentication Credential Disclosure
4764| [29696] MySQLDumper sql.php db Parameter XSS
4765| [29453] ConPresso CMS db_mysql.inc.php msg Parameter XSS
4766| [29122] cPanel mysqladmin/hooksadmin Unspecified Privilege Escalation
4767| [28296] MySQL Crafted multiupdate / subselects Query Local DoS
4768| [28288] MySQL Instance_options::complete_initialization Function Overflow
4769| [28030] Tutti Nova class.novaRead.mysql.php TNLIB_DIR Parameter Remote File Inclusion
4770| [28029] Tutti Nova class.novaAdmin.mysql.php TNLIB_DIR Parameter Remote File Inclusion
4771| [28028] Tutti Nova class.novaEdit.mysql.php TNLIB_DIR Parameter Remote File Inclusion
4772| [28013] MySQL SUID Routine Miscalculation Arbitrary DML Statement Execution
4773| [28012] MySQL Case Sensitivity Unauthorized Database Creation
4774| [27919] MySQL VIEW Access information_schema.views Information Disclosure
4775| [27703] MySQL MERGE Table Privilege Persistence
4776| [27593] Drupal database.mysqli.inc Multiple Parameter SQL Injection
4777| [27549] Opsware NAS /etc/init.d/mysqll MySQL root Cleartext Password Local Disclosure
4778| [27416] MySQL Server time.cc date_format Function Format String
4779| [27054] MySQL mysqld str_to_date Function NULL Argument DoS
4780| [26923] PHP/MySQL Classifieds (PHP Classifieds) search.php rate Parameter SQL Injection
4781| [26922] PHP/MySQL Classifieds (PHP Classifieds) AddAsset1.php Multiple Field XSS
4782| [26822] Bee-hive Lite include/listall.inc.php mysqlcall Parameter Remote File Inclusion
4783| [26821] Bee-hive Lite conad/include/mysqlCall.inc.php config Parameter Remote File Inclusion
4784| [26820] Bee-hive Lite conad/logout.inc.php mysqlCall Parameter Remote File Inclusion
4785| [26819] Bee-hive Lite conad/login.inc.php mysqlCall Parameter Remote File Inclusion
4786| [26818] Bee-hive Lite conad/checkPasswd.inc.php mysqlCall Parameter Remote File Inclusion
4787| [26817] Bee-hive Lite conad/changeUserDetails.inc.php mysqlCall Parameter Remote File Inclusion
4788| [26816] Bee-hive Lite conad/changeEmail.inc.php mysqlCall Parameter Remote File Inclusion
4789| [26125] Open Searchable Image Catalogue core.php do_mysql_query Function Error Message XSS
4790| [26123] Open Searchable Image Catalogue core.php do_mysql_query Function SQL Injection
4791| [25987] MySQL Multibyte Encoding SQL Injection Filter Bypass
4792| [25908] Drupal database.mysql.inc Multiple Parameter SQL Injection
4793| [25595] Apple Mac OS X MySQL Manager Blank root Password
4794| [25228] MySQL Crafted COM_TABLE_DUMP Request Arbitrary Memory Disclosure
4795| [25227] MySQL COM_TABLE_DUMP Packet Overflow
4796| [25226] MySQL Malformed Login Packet Remote Memory Disclosure
4797| [24245] Cholod Mysql Based Message Board Unspecified XSS
4798| [24244] Cholod Mysql Based Message Board mb.cgi showmessage Action SQL Injection
4799| [23963] WoltLab Burning Board class_db_mysql.php SQL Error Message XSS
4800| [23915] Netcool/NeuSecure MySQL Database Connection Restriction Bypass
4801| [23611] Aztek Forum index.php msg Variable Forced MySQL Error Information Disclosure
4802| [23526] MySQL Query NULL Charcter Logging Bypass
4803| [23157] PHP/MYSQL Timesheet changehrs.php Multiple Parameter SQL Injection
4804| [23156] PHP/MYSQL Timesheet index.php Multiple Parameter SQL Injection
4805| [22995] PAM-MySQL Authentication pam_get_item() Function Unspecified Privilege Escalation
4806| [22994] PAM-MySQL SQL Logging Facility Segfault DoS
4807| [22485] Recruitment Software admin/site.xml MySQL Authentication Credential Disclosure
4808| [22479] PHP mysqli Extension Error Message Format String
4809| [22232] PHP Pipe Variable mysql_connect() Function Overflow
4810| [21685] MySQL Auction Search Module keyword XSS
4811| [20698] Campsite notifyendsubs Cron MySQL Password Cleartext Remote Disclosure
4812| [20145] Proofpoint Protection Server Embedded MySQL Server Unpassworded root Account
4813| [19457] aMember Pro mysql.inc.php Remote File Inclusion
4814| [19377] MAXdev MD-Pro /MySQL_Tools/admin.php Path Disclosure
4815| [18899] MySQL UDF Library Arbitrary Function Load Privilege Escalation
4816| [18898] MySQL UDF LoadLibraryEx Function Nonexistent Library Load DoS
4817| [18897] MySQL on Windows UDF Create Function Traversal Privilege Escalation
4818| [18896] MySQL User-Defined Function init_syms() Function Overflow
4819| [18895] MySQL libmysqlclient.so host Parameter Remote Overflow
4820| [18894] MySQL drop database Request Remote Overflow
4821| [18622] FunkBoard mysql_install.php Email Field Arbitrary PHP Code Injection
4822| [18620] FunkBoard mysql_install.php Admin/Database Password Manipulation
4823| [18406] MySQL Eventum releases.php SQL Injection
4824| [18405] MySQL Eventum custom_fields_graph.php SQL Injection
4825| [18404] MySQL Eventum custom_fields.php SQL Injection
4826| [18403] MySQL Eventum login.php email Parameter SQL Injection Authentication Bypass
4827| [18402] MySQL Eventum get_jsrs_data.php F Parameter XSS
4828| [18401] MySQL Eventum list.php release Parameter XSS
4829| [18400] MySQL Eventum view.php id Parameter XSS
4830| [18173] MySQL on Windows USE Command MS-DOS Device Name DoS
4831| [17801] Bugzilla MySQL Replication Race Condition Information Disclosure
4832| [17223] xMySQLadmin Symlink Arbitrary File Deletion
4833| [16727] MySQL Nonexistent '--user' Error Incorrect Privilege Database Invocation
4834| [16689] MySQL mysql_install_db Symlink Arbitrary File Overwrite
4835| [16056] Plans Unspecified mySQL Remote Password Disclosure
4836| [15993] MySQL MaxDB Webtool Remote getIfHeader() WebDAV Function Remote Overflow
4837| [15817] MySQL MaxDB Web Tool getLockTokenHeader() Function Remote Overflow
4838| [15816] MySQL MaxDB Web Administration Service Malformed GET Request Overflow
4839| [15451] paNews auth.php mysql_prefix Parameter SQL Injection
4840| [14748] MySQL MS-DOS Device Names Request DoS
4841| [14678] MySQL CREATE FUNCTION Arbitrary libc Code Execution
4842| [14677] MySQL CREATE FUNCTION mysql.func Table Arbitrary Library Injection
4843| [14676] MySQL CREATE TEMPORARY TABLE Symlink Privilege Escalation
4844| [14386] phpMyAdmin mysqli.dbi.lib.php Path Disclosure
4845| [14052] Symantec Brightmail AntiSpam Multiple Default MySQL Accounts
4846| [13086] MySQL MaxDB Web Agent Malformed HTTP Header DoS
4847| [13085] MySQL MaxDB Web Agent WebDAV sapdbwa_GetUserData() Function Remote DoS
4848| [13013] MySQL mysqlaccess.sh Symlink Arbitrary File Manipulation
4849| [12919] MySQL MaxDB WebAgent websql Remote Overflow
4850| [12779] MySQL User Defined Function Privilege Escalation
4851| [12609] MySQL Eventum projects.php Multiple Parameter XSS
4852| [12608] MySQL Eventum preferences.php Multiple Parameter XSS
4853| [12607] MySQL Eventum forgot_password.php email Parameter XSS
4854| [12606] MySQL Eventum index.php email Parameter XSS
4855| [12605] MySQL Eventum Default Vendor Account
4856| [12275] MySQL MaxDB Web Tools wahttp Nonexistent File Request DoS
4857| [12274] MySQL MaxDB Web Tools WebDAV Handler Remote Overflow
4858| [11689] Roxen Web Server MySQL Socket Permission Weakness
4859| [10985] MySQL MATCH..AGAINST Query DoS
4860| [10959] MySQL GRANT ALL ON Privilege Escalation
4861| [10660] MySQL ALTER TABLE/RENAME Forces Old Permission Checks
4862| [10659] MySQL ALTER MERGE Tables to Change the UNION DoS
4863| [10658] MySQL mysql_real_connect() Function Remote Overflow
4864| [10532] MySQL MaxDB webdbm Server Field DoS
4865| [10491] AWS MySQLguest AWSguest.php Script Insertion
4866| [10244] MySQL libmysqlclient Prepared Statements API Overflow
4867| [10226] MySQLGuest AWSguest.php Multiple Field XSS
4868| [9912] PHP safe_mode MySQL Database Access Restriction Bypass
4869| [9911] Inter7 vpopmail MySQL Module Authentication Credential Disclosure
4870| [9910] MySQL mysql_change_user() Double-free Memory Pointer DoS
4871| [9909] MySQL datadir/my.cnf Modification Privilege Escalation
4872| [9908] MySQL my.ini Initialization File datadir Parameter Overflow
4873| [9907] MySQL SELECT Statement String Handling Overflow
4874| [9906] MySQL GRANT Privilege Arbitrary Password Modification
4875| [9509] teapop MySQL Authentication Module SQL Injection
4876| [9018] MySQL Backup Pro getbackup() Method Unspecified Issue
4877| [9015] MySQL mysqlhotcopy Insecure Temporary File Creation
4878| [8997] Cacti config.php MySQL Authentication Credential Cleartext Disclosure
4879| [8979] MySQL SHOW GRANTS Encrypted Password Disclosure
4880| [8889] MySQL COM_TABLE_DUMP Package Negative Integer DoS
4881| [8888] MySQL COM_CHANGE_USER Command Long Repsonse Overflow
4882| [8887] MySQL COM_CHANGE_USER Command One Character Password Brute Force
4883| [8886] MySQL libmysqlclient Library read_one_row Overflow
4884| [8885] MySQL libmysqlclient Library read_rows Overflow
4885| [7476] MySQL Protocol 4.1 Authentication Scramble String Overflow
4886| [7475] MySQL Zero-length Scrambled String Crafted Packet Authentication Bypass
4887| [7245] MySQL Pluggable Authentication Module (pam_mysql) Password Disclosure
4888| [7128] MySQL show database Database Name Exposure
4889| [6716] MySQL Database Engine Weak Authentication Information Disclosure
4890| [6605] MySQL mysqld Readable Log File Information Disclosure
4891| [6443] PowerPhlogger db_dump.php View Arbitrary mySQL Dump
4892| [6421] MySQL mysqld_multi Symlink Arbitrary File Overwrite
4893| [6420] MySQL mysqlbug Symlink Arbitrary File Overwrite
4894| [2537] MySQL sql_acl.cc get_salt_from_password Function Password Handling Remote Overflow
4895| [2144] WinMySQLadmin my.ini Cleartext Password Disclosure
4896| [653] PCCS-Linux MySQL Database Admin Tool Authentication Credential Disclosure
4897| [520] MySQL Database Name Traversal Arbitrary File Modification
4898| [380] MySQL Server on Windows Default Null Root Password
4899| [261] MySQL Short Check String Authentication Bypass
4900|_
49018083/tcp open http nginx
4902| vulscan: VulDB - https://vuldb.com:
4903| [133852] Sangfor Sundray WLAN Controller up to 3.7.4.2 Cookie Header nginx_webconsole.php Code Execution
4904| [132132] SoftNAS Cloud 4.2.0/4.2.1 Nginx privilege escalation
4905| [131858] Puppet Discovery up to 1.3.x Nginx Container weak authentication
4906| [130644] Nginx Unit up to 1.7.0 Router Process Request Heap-based memory corruption
4907| [127759] VeryNginx 0.3.3 Web Application Firewall privilege escalation
4908| [126525] nginx up to 1.14.0/1.15.5 ngx_http_mp4_module Loop denial of service
4909| [126524] nginx up to 1.14.0/1.15.5 HTTP2 CPU Exhaustion denial of service
4910| [126523] nginx up to 1.14.0/1.15.5 HTTP2 Memory Consumption denial of service
4911| [119845] Pivotal Operations Manager up to 2.0.13/2.1.5 Nginx privilege escalation
4912| [114368] SuSE Portus 2.3 Nginx Certificate weak authentication
4913| [103517] nginx up to 1.13.2 Range Filter Request Integer Overflow memory corruption
4914| [89849] nginx RFC 3875 Namespace Conflict Environment Variable Open Redirect
4915| [87719] nginx up to 1.11.0 ngx_files.c ngx_chain_to_iovec denial of service
4916| [80760] nginx 0.6.18/1.9.9 DNS CNAME Record Crash denial of service
4917| [80759] nginx 0.6.18/1.9.9 DNS CNAME Record Use-After-Free denial of service
4918| [80758] nginx 0.6.18/1.9.9 DNS UDP Packet Crash denial of service
4919| [67677] nginx up to 1.7.3 SSL weak authentication
4920| [67296] nginx up to 1.7.3 SMTP Proxy ngx_mail_smtp_starttls privilege escalation
4921| [12822] nginx up to 1.5.11 SPDY SPDY Request Heap-based memory corruption
4922| [12824] nginx 1.5.10 on 32-bit SPDY memory corruption
4923| [11237] nginx up to 1.5.6 URI String Bypass privilege escalation
4924| [65364] nginx up to 1.1.13 Default Configuration information disclosure
4925| [8671] nginx up to 1.4 proxy_pass denial of service
4926| [8618] nginx 1.3.9/1.4.0 http/ngx_http_parse.c ngx_http_parse_chunked() memory corruption
4927| [7247] nginx 1.2.6 Proxy Function spoofing
4928| [61434] nginx 1.2.0/1.3.0 on Windows Access Restriction privilege escalation
4929| [5293] nginx up to 1.1.18 ngx_http_mp4_module MP4 File memory corruption
4930| [4843] nginx up to 1.0.13/1.1.16 HTTP Header Response Parser ngx_http_parse.c information disclosure
4931| [59645] nginx up to 0.8.9 Heap-based memory corruption
4932| [53592] nginx 0.8.36 memory corruption
4933| [53590] nginx up to 0.8.9 unknown vulnerability
4934| [51533] nginx 0.7.64 Terminal privilege escalation
4935| [50905] nginx up to 0.8.9 directory traversal
4936| [50903] nginx up to 0.8.10 NULL Pointer Dereference denial of service
4937| [50043] nginx up to 0.8.10 memory corruption
4938|
4939| MITRE CVE - https://cve.mitre.org:
4940| [CVE-2013-2070] http/modules/ngx_http_proxy_module.c in nginx 1.1.4 through 1.2.8 and 1.3.0 through 1.4.0, when proxy_pass is used with untrusted HTTP servers, allows remote attackers to cause a denial of service (crash) and obtain sensitive information from worker process memory via a crafted proxy response, a similar vulnerability to CVE-2013-2028.
4941| [CVE-2013-2028] The ngx_http_parse_chunked function in http/ngx_http_parse.c in nginx 1.3.9 through 1.4.0 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a chunked Transfer-Encoding request with a large chunk size, which triggers an integer signedness error and a stack-based buffer overflow.
4942| [CVE-2012-3380] Directory traversal vulnerability in naxsi-ui/nx_extract.py in the Naxsi module before 0.46-1 for Nginx allows local users to read arbitrary files via unspecified vectors.
4943| [CVE-2012-2089] Buffer overflow in ngx_http_mp4_module.c in the ngx_http_mp4_module module in nginx 1.0.7 through 1.0.14 and 1.1.3 through 1.1.18, when the mp4 directive is used, allows remote attackers to cause a denial of service (memory overwrite) or possibly execute arbitrary code via a crafted MP4 file.
4944| [CVE-2012-1180] Use-after-free vulnerability in nginx before 1.0.14 and 1.1.x before 1.1.17 allows remote HTTP servers to obtain sensitive information from process memory via a crafted backend response, in conjunction with a client request.
4945| [CVE-2011-4963] nginx/Windows 1.3.x before 1.3.1 and 1.2.x before 1.2.1 allows remote attackers to bypass intended access restrictions and access restricted files via (1) a trailing . (dot) or (2) certain "$index_allocation" sequences in a request.
4946| [CVE-2011-4315] Heap-based buffer overflow in compression-pointer processing in core/ngx_resolver.c in nginx before 1.0.10 allows remote resolvers to cause a denial of service (daemon crash) or possibly have unspecified other impact via a long response.
4947| [CVE-2010-2266] nginx 0.8.36 allows remote attackers to cause a denial of service (crash) via certain encoded directory traversal sequences that trigger memory corruption, as demonstrated using the "%c0.%c0." sequence.
4948| [CVE-2010-2263] nginx 0.8 before 0.8.40 and 0.7 before 0.7.66, when running on Windows, allows remote attackers to obtain source code or unparsed content of arbitrary files under the web document root by appending ::$DATA to the URI.
4949| [CVE-2009-4487] nginx 0.7.64 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.
4950| [CVE-2009-3898] Directory traversal vulnerability in src/http/modules/ngx_http_dav_module.c in nginx (aka Engine X) before 0.7.63, and 0.8.x before 0.8.17, allows remote authenticated users to create or overwrite arbitrary files via a .. (dot dot) in the Destination HTTP header for the WebDAV (1) COPY or (2) MOVE method.
4951| [CVE-2009-3896] src/http/ngx_http_parse.c in nginx (aka Engine X) 0.1.0 through 0.4.14, 0.5.x before 0.5.38, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.14 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a long URI.
4952| [CVE-2009-2629] Buffer underflow in src/http/ngx_http_parse.c in nginx 0.1.0 through 0.5.37, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.15 allows remote attackers to execute arbitrary code via crafted HTTP requests.
4953|
4954| SecurityFocus - https://www.securityfocus.com/bid/:
4955| [99534] Nginx CVE-2017-7529 Remote Integer Overflow Vulnerability
4956| [93903] Nginx CVE-2016-1247 Remote Privilege Escalation Vulnerability
4957| [91819] Nginx CVE-2016-1000105 Security Bypass Vulnerability
4958| [90967] nginx CVE-2016-4450 Denial of Service Vulnerability
4959| [82230] nginx Multiple Denial of Service Vulnerabilities
4960| [78928] Nginx CVE-2010-2266 Denial-Of-Service Vulnerability
4961| [70025] nginx CVE-2014-3616 SSL Session Fixation Vulnerability
4962| [69111] nginx SMTP Proxy Remote Command Injection Vulnerability
4963| [67507] nginx SPDY Implementation CVE-2014-0088 Arbitrary Code Execution Vulnerability
4964| [66537] nginx SPDY Implementation Heap Based Buffer Overflow Vulnerability
4965| [63814] nginx CVE-2013-4547 URI Processing Security Bypass Vulnerability
4966| [59824] Nginx CVE-2013-2070 Remote Security Vulnerability
4967| [59699] nginx 'ngx_http_parse.c' Stack Buffer Overflow Vulnerability
4968| [59496] nginx 'ngx_http_close_connection()' Remote Integer Overflow Vulnerability
4969| [59323] nginx NULL-Byte Arbitrary Code Execution Vulnerability
4970| [58105] Nginx 'access.log' Insecure File Permissions Vulnerability
4971| [57139] nginx CVE-2011-4968 Man in The Middle Vulnerability
4972| [55920] nginx CVE-2011-4963 Security Bypass Vulnerability
4973| [54331] Nginx Naxsi Module 'nx_extract.py' Script Remote File Disclosure Vulnerability
4974| [52999] nginx 'ngx_http_mp4_module.c' Buffer Overflow Vulnerability
4975| [52578] nginx 'ngx_cpystrn()' Information Disclosure Vulnerability
4976| [50710] nginx DNS Resolver Remote Heap Buffer Overflow Vulnerability
4977| [40760] nginx Remote Source Code Disclosure and Denial of Service Vulnerabilities
4978| [40434] nginx Space String Remote Source Code Disclosure Vulnerability
4979| [40420] nginx Directory Traversal Vulnerability
4980| [37711] nginx Terminal Escape Sequence in Logs Command Injection Vulnerability
4981| [36839] nginx 'ngx_http_process_request_headers()' Remote Buffer Overflow Vulnerability
4982| [36490] nginx WebDAV Multiple Directory Traversal Vulnerabilities
4983| [36438] nginx Proxy DNS Cache Domain Spoofing Vulnerability
4984| [36384] nginx HTTP Request Remote Buffer Overflow Vulnerability
4985|
4986| IBM X-Force - https://exchange.xforce.ibmcloud.com:
4987| [84623] Phusion Passenger gem for Ruby with nginx configuration insecure permissions
4988| [84172] nginx denial of service
4989| [84048] nginx buffer overflow
4990| [83923] nginx ngx_http_close_connection() integer overflow
4991| [83688] nginx null byte code execution
4992| [83103] Naxsi module for Nginx naxsi_unescape_uri() function security bypass
4993| [82319] nginx access.log information disclosure
4994| [80952] nginx SSL spoofing
4995| [77244] nginx and Microsoft Windows request security bypass
4996| [76778] Naxsi module for Nginx nx_extract.py directory traversal
4997| [74831] nginx ngx_http_mp4_module.c buffer overflow
4998| [74191] nginx ngx_cpystrn() information disclosure
4999| [74045] nginx header response information disclosure
5000| [71355] nginx ngx_resolver_copy() buffer overflow
5001| [59370] nginx characters denial of service
5002| [59369] nginx DATA source code disclosure
5003| [59047] nginx space source code disclosure
5004| [58966] nginx unspecified directory traversal
5005| [54025] nginx ngx_http_parse.c denial of service
5006| [53431] nginx WebDAV component directory traversal
5007| [53328] Nginx CRC-32 cached domain name spoofing
5008| [53250] Nginx ngx_http_parse_complex_uri() function code execution
5009|
5010| Exploit-DB - https://www.exploit-db.com:
5011| [26737] nginx 1.3.9/1.4.0 x86 Brute Force Remote Exploit
5012| [25775] Nginx HTTP Server 1.3.9-1.4.0 Chuncked Encoding Stack Buffer Overflow
5013| [25499] nginx 1.3.9-1.4.0 DoS PoC
5014| [24967] nginx 0.6.x Arbitrary Code Execution NullByte Injection
5015| [14830] nginx 0.6.38 - Heap Corruption Exploit
5016| [13822] Nginx <= 0.7.65 / 0.8.39 (dev) Source Disclosure / Download Vulnerability
5017| [13818] Nginx 0.8.36 Source Disclosure and DoS Vulnerabilities
5018| [12804] nginx [engine x] http server <= 0.6.36 Path Draversal
5019| [9901] nginx 0.7.0-0.7.61, 0.6.0-0.6.38, 0.5.0-0.5.37, 0.4.0-0.4.14 PoC
5020| [9829] nginx 0.7.61 WebDAV directory traversal
5021|
5022| OpenVAS (Nessus) - http://www.openvas.org:
5023| [864418] Fedora Update for nginx FEDORA-2012-3846
5024| [864310] Fedora Update for nginx FEDORA-2012-6238
5025| [864209] Fedora Update for nginx FEDORA-2012-6411
5026| [864204] Fedora Update for nginx FEDORA-2012-6371
5027| [864121] Fedora Update for nginx FEDORA-2012-4006
5028| [864115] Fedora Update for nginx FEDORA-2012-3991
5029| [864065] Fedora Update for nginx FEDORA-2011-16075
5030| [863654] Fedora Update for nginx FEDORA-2011-16110
5031| [861232] Fedora Update for nginx FEDORA-2007-1158
5032| [850180] SuSE Update for nginx openSUSE-SU-2012:0237-1 (nginx)
5033| [831680] Mandriva Update for nginx MDVSA-2012:043 (nginx)
5034| [802045] 64-bit Debian Linux Rootkit with nginx Doing iFrame Injection
5035| [801636] nginx HTTP Request Remote Buffer Overflow Vulnerability
5036| [103470] nginx 'ngx_http_mp4_module.c' Buffer Overflow Vulnerability
5037| [103469] nginx 'ngx_cpystrn()' Information Disclosure Vulnerability
5038| [103344] nginx DNS Resolver Remote Heap Buffer Overflow Vulnerability
5039| [100676] nginx Remote Source Code Disclosure and Denial of Service Vulnerabilities
5040| [100659] nginx Directory Traversal Vulnerability
5041| [100658] nginx Space String Remote Source Code Disclosure Vulnerability
5042| [100441] nginx Terminal Escape Sequence in Logs Command Injection Vulnerability
5043| [100321] nginx 'ngx_http_process_request_headers()' Remote Buffer Overflow Vulnerability
5044| [100277] nginx Proxy DNS Cache Domain Spoofing Vulnerability
5045| [100276] nginx HTTP Request Remote Buffer Overflow Vulnerability
5046| [100275] nginx WebDAV Multiple Directory Traversal Vulnerabilities
5047| [71574] Gentoo Security Advisory GLSA 201206-07 (nginx)
5048| [71308] Gentoo Security Advisory GLSA 201203-22 (nginx)
5049| [71297] FreeBSD Ports: nginx
5050| [71276] FreeBSD Ports: nginx
5051| [71239] Debian Security Advisory DSA 2434-1 (nginx)
5052| [66451] Fedora Core 11 FEDORA-2009-12782 (nginx)
5053| [66450] Fedora Core 10 FEDORA-2009-12775 (nginx)
5054| [66449] Fedora Core 12 FEDORA-2009-12750 (nginx)
5055| [64924] Gentoo Security Advisory GLSA 200909-18 (nginx)
5056| [64912] Fedora Core 10 FEDORA-2009-9652 (nginx)
5057| [64911] Fedora Core 11 FEDORA-2009-9630 (nginx)
5058| [64894] FreeBSD Ports: nginx
5059| [64869] Debian Security Advisory DSA 1884-1 (nginx)
5060|
5061| SecurityTracker - https://www.securitytracker.com:
5062| [1028544] nginx Bug Lets Remote Users Deny Service or Obtain Potentially Sensitive Information
5063| [1028519] nginx Stack Overflow Lets Remote Users Execute Arbitrary Code
5064| [1026924] nginx Buffer Overflow in ngx_http_mp4_module Lets Remote Users Execute Arbitrary Code
5065| [1026827] nginx HTTP Response Processing Lets Remote Users Obtain Portions of Memory Contents
5066|
5067| OSVDB - http://www.osvdb.org:
5068| [94864] cPnginx Plugin for cPanel nginx Configuration Manipulation Arbitrary File Access
5069| [93282] nginx proxy_pass Crafted Upstream Proxied Server Response Handling Worker Process Memory Disclosure
5070| [93037] nginx /http/ngx_http_parse.c Worker Process Crafted Request Handling Remote Overflow
5071| [92796] nginx ngx_http_close_connection Function Crafted r->
5072| [92634] nginx ngx_http_request.h zero_in_uri URL Null Byte Handling Remote Code Execution
5073| [90518] nginx Log Directory Permission Weakness Local Information Disclosure
5074| [88910] nginx Proxy Functionality SSL Certificate Validation MitM Spoofing Weakness
5075| [84339] nginx/Windows Multiple Request Sequence Parsing Arbitrary File Access
5076| [83617] Naxsi Module for Nginx naxsi-ui/ nx_extract.py Traversal Arbitrary File Access
5077| [81339] nginx ngx_http_mp4_module Module Atom MP4 File Handling Remote Overflow
5078| [80124] nginx HTTP Header Response Parsing Freed Memory Information Disclosure
5079| [77184] nginx ngx_resolver.c ngx_resolver_copy() Function DNS Response Parsing Remote Overflow
5080| [65531] nginx on Windows URI ::$DATA Append Arbitrary File Access
5081| [65530] nginx Encoded Traversal Sequence Memory Corruption Remote DoS
5082| [65294] nginx on Windows Encoded Space Request Remote Source Disclosure
5083| [63136] nginx on Windows 8.3 Filename Alias Request Access Rules / Authentication Bypass
5084| [62617] nginx Internal DNS Cache Poisoning Weakness
5085| [61779] nginx HTTP Request Escape Sequence Terminal Command Injection
5086| [59278] nginx src/http/ngx_http_parse.c ngx_http_process_request_headers() Function URL Handling NULL Dereference DoS
5087| [58328] nginx WebDAV Multiple Method Traversal Arbitrary File Write
5088| [58128] nginx ngx_http_parse_complex_uri() Function Underflow
5089| [44447] nginx (engine x) msie_refresh Directive Unspecified XSS
5090| [44446] nginx (engine x) ssl_verify_client Directive HTTP/0.9 Protocol Bypass
5091| [44445] nginx (engine x) ngx_http_realip_module satisfy_any Directive Unspecified Access Bypass
5092| [44444] nginx (engine x) X-Accel-Redirect Header Unspecified Traversal
5093| [44443] nginx (engine x) rtsig Method Signal Queue Overflow
5094| [44442] nginx (engine x) Worker Process Millisecond Timers Unspecified Overflow
5095|_
50961 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
5097SF-Port53-TCP:V=7.80%I=7%D=10/31%Time=5DBB3CA1%P=x86_64-pc-linux-gnu%r(DNS
5098SF:VersionBindReqTCP,43,"\0A\0\x06\x85\0\0\x01\0\x01\0\x01\0\0\x07version\
5099SF:x04bind\0\0\x10\0\x03\xc0\x0c\0\x10\0\x03\0\0\0\0\0\t\x08get\x20lost\xc
5100SF:0\x0c\0\x02\0\x03\0\0\0\0\0\x02\xc0\x0c");
5101Device type: general purpose|storage-misc|media device|WAP
5102Running (JUST GUESSING): Linux 2.6.X|3.X|4.X (92%), HP embedded (85%), Infomir embedded (85%), Ubiquiti embedded (85%), Ubiquiti AirOS 5.X (85%)
5103OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4.4 cpe:/h:hp:p2000_g3 cpe:/h:infomir:mag-250 cpe:/o:linux:linux_kernel:2.6.32 cpe:/h:ubnt:airmax_nanostation cpe:/o:ubnt:airos:5.5.9
5104Aggressive OS guesses: Linux 2.6.18 - 2.6.22 (92%), Linux 3.10 - 3.12 (88%), Linux 4.4 (88%), Linux 4.9 (87%), Linux 3.10 - 4.11 (87%), Linux 2.6.18 (86%), Linux 3.2 - 4.9 (86%), Linux 3.7 (85%), HP P2000 G3 NAS device (85%), Linux 3.16 - 4.6 (85%)
5105No exact OS matches for host (test conditions non-ideal).
5106Uptime guess: 0.259 days (since Thu Oct 31 09:44:12 2019)
5107Network Distance: 2 hops
5108TCP Sequence Prediction: Difficulty=260 (Good luck!)
5109IP ID Sequence Generation: All zeros
5110Service Info: OS: Unix
5111
5112TRACEROUTE (using port 25/tcp)
5113HOP RTT ADDRESS
51141 104.75 ms 10.245.204.1
51152 104.74 ms ns1.technowork.com.tr (37.148.210.195)
5116
5117NSE: Script Post-scanning.
5118Initiating NSE at 15:57
5119Completed NSE at 15:57, 0.00s elapsed
5120Initiating NSE at 15:57
5121Completed NSE at 15:57, 0.00s elapsed
5122######################################################################################################################################
5123Hosts
5124=====
5125
5126address mac name os_name os_flavor os_sp purpose info comments
5127------- --- ---- ------- --------- ----- ------- ---- --------
512837.148.210.195 ns1.technowork.com.tr Linux 2.6.X server
5129
5130Services
5131========
5132
5133host port proto name state info
5134---- ---- ----- ---- ----- ----
513537.148.210.195 21 tcp ftp open vsftpd 3.0.2
513637.148.210.195 22 tcp ssh open OpenSSH 7.4 protocol 2.0
513737.148.210.195 25 tcp smtp closed
513837.148.210.195 53 tcp domain open unknown banner: get lost
513937.148.210.195 53 udp domain open
514037.148.210.195 67 udp dhcps unknown
514137.148.210.195 68 udp dhcpc unknown
514237.148.210.195 69 udp tftp unknown
514337.148.210.195 80 tcp http open nginx
514437.148.210.195 88 udp kerberos-sec unknown
514537.148.210.195 123 udp ntp unknown
514637.148.210.195 139 tcp netbios-ssn closed
514737.148.210.195 139 udp netbios-ssn unknown
514837.148.210.195 161 udp snmp unknown
514937.148.210.195 162 udp snmptrap unknown
515037.148.210.195 389 udp ldap unknown
515137.148.210.195 445 tcp microsoft-ds closed
515237.148.210.195 500 udp isakmp unknown
515337.148.210.195 520 udp route unknown
515437.148.210.195 2049 udp nfs unknown
515537.148.210.195 3306 tcp mysql open MySQL 5.5.60-MariaDB
515637.148.210.195 8083 tcp http open nginx
5157#######################################################################################################################################
5158[+] URL: http://www.suleymansoylu.com/
5159[+] Started: Thu Oct 31 15:04:04 2019
5160
5161Interesting Finding(s):
5162
5163[+] http://www.suleymansoylu.com/
5164 | Interesting Entries:
5165 | - Server: nginx
5166 | - X-Powered-By: PHP/5.6.40
5167 | Found By: Headers (Passive Detection)
5168 | Confidence: 100%
5169
5170[+] http://www.suleymansoylu.com/robots.txt
5171 | Found By: Robots Txt (Aggressive Detection)
5172 | Confidence: 100%
5173
5174[+] http://www.suleymansoylu.com/xmlrpc.php
5175 | Found By: Headers (Passive Detection)
5176 | Confidence: 100%
5177 | Confirmed By: Direct Access (Aggressive Detection), 100% confidence
5178 | References:
5179 | - http://codex.wordpress.org/XML-RPC_Pingback_API
5180 | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner
5181 | - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos
5182 | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login
5183 | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access
5184
5185[+] http://www.suleymansoylu.com/readme.html
5186 | Found By: Direct Access (Aggressive Detection)
5187 | Confidence: 100%
5188
5189[+] http://www.suleymansoylu.com/wp-cron.php
5190 | Found By: Direct Access (Aggressive Detection)
5191 | Confidence: 60%
5192 | References:
5193 | - https://www.iplocation.net/defend-wordpress-from-ddos
5194 | - https://github.com/wpscanteam/wpscan/issues/1299
5195
5196[+] WordPress version 5.2.4 identified (Latest, released on 2019-10-14).
5197 | Detected By: Rss Generator (Passive Detection)
5198 | - http://www.suleymansoylu.com/feed/, <generator>https://wordpress.org/?v=5.2.4</generator>
5199 | - http://www.suleymansoylu.com/comments/feed/, <generator>https://wordpress.org/?v=5.2.4</generator>
5200 | - http://www.suleymansoylu.com/home/feed/, <generator>https://wordpress.org/?v=5.2.4</generator>
5201
5202[+] WordPress theme in use: mw
5203 | Location: http://www.suleymansoylu.com/wp-content/themes/mw/
5204 | Style URL: http://www.suleymansoylu.com/wp-content/themes/mw/style.css
5205 |
5206 | Detected By: Css Style (Passive Detection)
5207 | Confirmed By: Urls In Homepage (Passive Detection)
5208 |
5209 | The version could not be determined.
5210
5211[+] Enumerating All Plugins (via Passive Methods)
5212
5213[i] No plugins Found.
5214
5215[+] Enumerating Config Backups (via Passive and Aggressive Methods)
5216 Checking Config Backups - Time: 00:00:04 <=============> (21 / 21) 100.00% Time: 00:00:04
5217
5218[i] No Config Backups Found.
5219
5220[!] No WPVulnDB API Token given, as a result vulnerability data has not been output.
5221[!] You can get a free API token with 50 daily requests by registering at https://wpvulndb.com/users/sign_up.
5222
5223[+] Finished: Thu Oct 31 15:04:32 2019
5224[+] Requests Done: 53
5225[+] Cached Requests: 8
5226[+] Data Sent: 12.324 KB
5227[+] Data Received: 259.479 KB
5228[+] Memory used: 138.105 MB
5229[+] Elapsed time: 00:00:28
5230#######################################################################################################################################
5231[+] URL: http://www.suleymansoylu.com/
5232[+] Started: Thu Oct 31 15:04:08 2019
5233
5234Interesting Finding(s):
5235
5236[+] http://www.suleymansoylu.com/
5237 | Interesting Entries:
5238 | - Server: nginx
5239 | - X-Powered-By: PHP/5.6.40
5240 | Found By: Headers (Passive Detection)
5241 | Confidence: 100%
5242
5243[+] http://www.suleymansoylu.com/robots.txt
5244 | Found By: Robots Txt (Aggressive Detection)
5245 | Confidence: 100%
5246
5247[+] http://www.suleymansoylu.com/xmlrpc.php
5248 | Found By: Headers (Passive Detection)
5249 | Confidence: 100%
5250 | Confirmed By: Direct Access (Aggressive Detection), 100% confidence
5251 | References:
5252 | - http://codex.wordpress.org/XML-RPC_Pingback_API
5253 | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner
5254 | - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos
5255 | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login
5256 | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access
5257
5258[+] http://www.suleymansoylu.com/readme.html
5259 | Found By: Direct Access (Aggressive Detection)
5260 | Confidence: 100%
5261
5262[+] http://www.suleymansoylu.com/wp-cron.php
5263 | Found By: Direct Access (Aggressive Detection)
5264 | Confidence: 60%
5265 | References:
5266 | - https://www.iplocation.net/defend-wordpress-from-ddos
5267 | - https://github.com/wpscanteam/wpscan/issues/1299
5268
5269[+] WordPress version 5.2.4 identified (Latest, released on 2019-10-14).
5270 | Detected By: Rss Generator (Passive Detection)
5271 | - http://www.suleymansoylu.com/feed/, <generator>https://wordpress.org/?v=5.2.4</generator>
5272 | - http://www.suleymansoylu.com/comments/feed/, <generator>https://wordpress.org/?v=5.2.4</generator>
5273 | - http://www.suleymansoylu.com/home/feed/, <generator>https://wordpress.org/?v=5.2.4</generator>
5274
5275[+] WordPress theme in use: mw
5276 | Location: http://www.suleymansoylu.com/wp-content/themes/mw/
5277 | Style URL: http://www.suleymansoylu.com/wp-content/themes/mw/style.css
5278 |
5279 | Detected By: Css Style (Passive Detection)
5280 | Confirmed By: Urls In Homepage (Passive Detection)
5281 |
5282 | The version could not be determined.
5283
5284[+] Enumerating Users (via Passive and Aggressive Methods)
5285 Brute Forcing Author IDs - Time: 00:00:06 <==> (10 / 10) 100.00% Time: 00:00:06
5286
5287[i] User(s) Identified:
5288
5289[+] cengiz
5290 | Detected By: Rss Generator (Passive Detection)
5291 | Confirmed By:
5292 | Wp Json Api (Aggressive Detection)
5293 | - http://www.suleymansoylu.com/wp-json/wp/v2/users/?per_page=100&page=1
5294 | Oembed API - Author URL (Aggressive Detection)
5295 | - http://www.suleymansoylu.com/wp-json/oembed/1.0/embed?url=http://www.suleymansoylu.com/&format=json
5296 | Rss Generator (Aggressive Detection)
5297 | Author Id Brute Forcing - Author Pattern (Aggressive Detection)
5298
5299[+] hilmi1273
5300 | Detected By: Wp Json Api (Aggressive Detection)
5301 | - http://www.suleymansoylu.com/wp-json/wp/v2/users/?per_page=100&page=1
5302
5303[!] No WPVulnDB API Token given, as a result vulnerability data has not been output.
5304[!] You can get a free API token with 50 daily requests by registering at https://wpvulndb.com/users/sign_up.
5305
5306[+] Finished: Thu Oct 31 15:04:41 2019
5307[+] Requests Done: 40
5308[+] Cached Requests: 21
5309[+] Data Sent: 10.391 KB
5310[+] Data Received: 368.687 KB
5311[+] Memory used: 132.953 MB
5312[+] Elapsed time: 00:00:32
5313######################################################################################################################################
5314
5315[+] URL: http://www.suleymansoylu.com/
5316[+] Started: Thu Oct 31 15:09:29 2019
5317
5318Interesting Finding(s):
5319
5320[+] http://www.suleymansoylu.com/
5321 | Interesting Entries:
5322 | - Server: nginx
5323 | - X-Powered-By: PHP/5.6.40
5324 | Found By: Headers (Passive Detection)
5325 | Confidence: 100%
5326
5327[+] http://www.suleymansoylu.com/robots.txt
5328 | Found By: Robots Txt (Aggressive Detection)
5329 | Confidence: 100%
5330
5331[+] http://www.suleymansoylu.com/xmlrpc.php
5332 | Found By: Headers (Passive Detection)
5333 | Confidence: 100%
5334 | Confirmed By: Direct Access (Aggressive Detection), 100% confidence
5335 | References:
5336 | - http://codex.wordpress.org/XML-RPC_Pingback_API
5337 | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner
5338 | - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos
5339 | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login
5340 | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access
5341
5342[+] http://www.suleymansoylu.com/readme.html
5343 | Found By: Direct Access (Aggressive Detection)
5344 | Confidence: 100%
5345
5346[+] http://www.suleymansoylu.com/wp-cron.php
5347 | Found By: Direct Access (Aggressive Detection)
5348 | Confidence: 60%
5349 | References:
5350 | - https://www.iplocation.net/defend-wordpress-from-ddos
5351 | - https://github.com/wpscanteam/wpscan/issues/1299
5352
5353[+] WordPress version 5.2.4 identified (Latest, released on 2019-10-14).
5354 | Detected By: Rss Generator (Passive Detection)
5355 | - http://www.suleymansoylu.com/feed/, <generator>https://wordpress.org/?v=5.2.4</generator>
5356 | - http://www.suleymansoylu.com/comments/feed/, <generator>https://wordpress.org/?v=5.2.4</generator>
5357 | - http://www.suleymansoylu.com/home/feed/, <generator>https://wordpress.org/?v=5.2.4</generator>
5358
5359[+] WordPress theme in use: mw
5360 | Location: http://www.suleymansoylu.com/wp-content/themes/mw/
5361 | Style URL: http://www.suleymansoylu.com/wp-content/themes/mw/style.css
5362 |
5363 | Detected By: Css Style (Passive Detection)
5364 | Confirmed By: Urls In Homepage (Passive Detection)
5365 |
5366 | The version could not be determined.
5367
5368[+] Enumerating Users (via Passive and Aggressive Methods)
5369 Brute Forcing Author IDs - Time: 00:00:04 <============> (10 / 10) 100.00% Time: 00:00:04
5370
5371[i] User(s) Identified:
5372
5373[+] cengiz
5374 | Detected By: Rss Generator (Passive Detection)
5375 | Confirmed By:
5376 | Wp Json Api (Aggressive Detection)
5377 | - http://www.suleymansoylu.com/wp-json/wp/v2/users/?per_page=100&page=1
5378 | Oembed API - Author URL (Aggressive Detection)
5379 | - http://www.suleymansoylu.com/wp-json/oembed/1.0/embed?url=http://www.suleymansoylu.com/&format=json
5380 | Rss Generator (Aggressive Detection)
5381 | Author Id Brute Forcing - Author Pattern (Aggressive Detection)
5382
5383[+] hilmi1273
5384 | Detected By: Wp Json Api (Aggressive Detection)
5385 | - http://www.suleymansoylu.com/wp-json/wp/v2/users/?per_page=100&page=1
5386
5387[!] No WPVulnDB API Token given, as a result vulnerability data has not been output.
5388[!] You can get a free API token with 50 daily requests by registering at https://wpvulndb.com/users/sign_up.
5389
5390[+] Finished: Thu Oct 31 15:09:40 2019
5391[+] Requests Done: 15
5392[+] Cached Requests: 46
5393[+] Data Sent: 3.727 KB
5394[+] Data Received: 21.962 KB
5395[+] Memory used: 132.992 MB
5396[+] Elapsed time: 00:00:10
5397#######################################################################################################################################
5398[-] Target: http://www.suleymansoylu.com (37.148.210.195)
5399[M] Website Not in HTTPS: http://www.suleymansoylu.com
5400[I] Server: nginx
5401[I] X-Powered-By: PHP/5.6.40
5402[L] X-Frame-Options: Not Enforced
5403[I] Strict-Transport-Security: Not Enforced
5404[I] X-Content-Security-Policy: Not Enforced
5405[I] X-Content-Type-Options: Not Enforced
5406[L] Robots.txt Found: http://www.suleymansoylu.com/robots.txt
5407[I] CMS Detection: WordPress
5408[I] Wordpress Version: 5.2.4
5409[M] EDB-ID: 47557 "Wordpress 5.2.4 - Cross-Origin Resource Sharing"
5410[I] Wordpress Theme: mw
5411[M] EDB-ID: 39536 "WordPress Theme SiteMile Project 2.0.9.5 - Multiple Vulnerabilities"
5412[-] WordPress usernames identified:
5413[M] cengiz
5414[M] XML-RPC services are enabled
5415[M] Website vulnerable to XML-RPC Brute Force Vulnerability
5416[I] Autocomplete Off Not Found: http://www.suleymansoylu.com/wp-login.php
5417[-] Default WordPress Files:
5418[I] http://www.suleymansoylu.com/license.txt
5419[I] http://www.suleymansoylu.com/readme.html
5420[I] http://www.suleymansoylu.com/wp-content/themes/twentyeleven/license.txt
5421[I] http://www.suleymansoylu.com/wp-content/themes/twentyeleven/readme.txt
5422[I] http://www.suleymansoylu.com/wp-includes/ID3/license.commercial.txt
5423[I] http://www.suleymansoylu.com/wp-includes/ID3/license.txt
5424[I] http://www.suleymansoylu.com/wp-includes/ID3/readme.txt
5425[I] http://www.suleymansoylu.com/wp-includes/images/crystal/license.txt
5426[I] http://www.suleymansoylu.com/wp-includes/js/plupload/license.txt
5427[I] http://www.suleymansoylu.com/wp-includes/js/swfupload/license.txt
5428[I] http://www.suleymansoylu.com/wp-includes/js/tinymce/license.txt
5429[-] Searching Wordpress Plugins ...
5430[I] akismet v4.1.1
5431[M] EDB-ID: 37826 "WordPress 3.4.2 - Multiple Path Disclosure Vulnerabilities"
5432[M] EDB-ID: 37902 "WordPress Plugin Akismet - Multiple Cross-Site Scripting Vulnerabilities"
5433[I] feed
5434[M] EDB-ID: 38624 "WordPress Plugin WP Feed - 'nid' SQL Injection"
5435[I] Checking for Directory Listing Enabled ...
5436[-] Date & Time: 31/10/2019 15:11:49
5437[-] Completed in: 0:07:36
5438#######################################################################################################################################
5439 Anonymous JTSEC #OpTurkey Full Recon #18