· 6 years ago · Mar 24, 2020, 10:07 PM
1###########################################################################################################################
2===========================================================================================================================
3Hostname www.boywiki.org ISP Xs4all Internet BV
4Continent Europe Flag
5NL
6Country Netherlands Country Code NL
7Region North Brabant Local time 24 Mar 2020 21:55 CET
8City Dorst Postal Code 4849
9IP Address 82.94.228.252 Latitude 51.594
10 Longitude 4.862
11===========================================================================================================================
12##########################################################################################################################
13> www.boywiki.org
14Server: 10.101.0.243
15Address: 10.101.0.243#53
16
17Non-authoritative answer:
18Name: www.boywiki.org
19Address: 82.94.228.252
20>
21###########################################################################################################################
22Domain Name: BOYWIKI.ORG
23Registry Domain ID: D105861569-LROR
24Registrar WHOIS Server: whois.dynadot.com
25Registrar URL: http://www.dynadot.com
26Updated Date: 2019-02-17T18:30:34Z
27Creation Date: 2005-03-10T08:42:20Z
28Registry Expiry Date: 2021-03-10T08:42:20Z
29Registrar Registration Expiration Date:
30Registrar: Dynadot, LLC
31Registrar IANA ID: 472
32Registrar Abuse Contact Email: abuse@dynadot.com
33Registrar Abuse Contact Phone: +1.6502620100
34Reseller:
35Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
36Registrant Organization:
37Registrant State/Province: CA
38Registrant Country: US
39Name Server: NS2.FSCODNS.NET
40Name Server: NS1.FSCODNS.NET
41Name Server: NS3.FSCODNS.NET
42DNSSEC: unsigned
43###########################################################################################################################
44[i] Scanning Site: https://www.boywiki.org
45
46
47
48B A S I C I N F O
49====================
50
51
52[+] Site Title: BoyWiki
53[+] IP address: 82.94.228.252
54[+] Web Server: nginx
55[+] CMS: Could Not Detect
56[+] Cloudflare: Not Detected
57[+] Robots File: Found
58
59-------------[ contents ]----------------
60# robots.txt for BoyWiki
61
62User-agent: *
63
64Disallow: /test/
65
66
67
68-----------[end of contents]-------------
69
70
71
72W H O I S L O O K U P
73========================
74
75 Domain Name: BOYWIKI.ORG
76Registry Domain ID: D105861569-LROR
77Registrar WHOIS Server: whois.dynadot.com
78Registrar URL: http://www.dynadot.com
79Updated Date: 2019-02-17T18:30:34Z
80Creation Date: 2005-03-10T08:42:20Z
81Registry Expiry Date: 2021-03-10T08:42:20Z
82Registrar Registration Expiration Date:
83Registrar: Dynadot, LLC
84Registrar IANA ID: 472
85Registrar Abuse Contact Email: abuse@dynadot.com
86Registrar Abuse Contact Phone: +1.6502620100
87Reseller:
88Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
89Registrant Organization:
90Registrant State/Province: CA
91Registrant Country: US
92Name Server: NS2.FSCODNS.NET
93Name Server: NS1.FSCODNS.NET
94Name Server: NS3.FSCODNS.NET
95DNSSEC: unsigned
96URL of the ICANN Whois Inaccuracy Complaint Form https://www.icann.org/wicf/)
97>>> Last update of WHOIS database: 2020-03-24T20:58:10Z <<<
98
99For more information on Whois status codes, please visit https://icann.org/epp
100
101
102
103
104
105G E O I P L O O K U P
106=========================
107
108[i] IP Address: 82.94.228.252
109[i] Country: Netherlands
110[i] State: Provincie Flevoland
111[i] City: Swifterbant
112[i] Latitude: 52.5685
113[i] Longitude: 5.6416
114
115
116
117
118H T T P H E A D E R S
119=======================
120
121
122[i] HTTP/1.1 200 OK
123[i] Server: nginx
124[i] Date: Tue, 24 Mar 2020 20:59:16 GMT
125[i] Content-Type: text/html
126[i] Content-Length: 3162
127[i] Last-Modified: Mon, 31 Mar 2014 16:34:08 GMT
128[i] Connection: close
129[i] Accept-Ranges: bytes
130
131
132
133
134D N S L O O K U P
135===================
136
137boywiki.org. 1799 IN SOA ns1.fscodns.net. hostmaster.freespirits.info. 2017042301 1800 1200 604800 600
138boywiki.org. 1799 IN SPF "v=spf1 mx -all"
139boywiki.org. 1799 IN TXT "v=spf1 mx -all"
140boywiki.org. 1799 IN MX 10 box.isp-email.net.
141boywiki.org. 1799 IN A 82.94.228.252
142boywiki.org. 1799 IN NS ns2.fscodns.net.
143boywiki.org. 1799 IN NS ns1.fscodns.net.
144boywiki.org. 1799 IN NS ns3.fscodns.net.
145
146
147
148
149S U B N E T C A L C U L A T I O N
150====================================
151
152Address = 82.94.228.252
153Network = 82.94.228.252 / 32
154Netmask = 255.255.255.255
155Broadcast = not needed on Point-to-Point links
156Wildcard Mask = 0.0.0.0
157Hosts Bits = 0
158Max. Hosts = 1 (2^0 - 0)
159Host Range = { 82.94.228.252 - 82.94.228.252 }
160
161
162
163N M A P P O R T S C A N
164============================
165
166Starting Nmap 7.70 ( https://nmap.org ) at 2020-03-24 20:59 UTC
167Nmap scan report for boywiki.org (82.94.228.252)
168Host is up (0.083s latency).
169
170PORT STATE SERVICE
17121/tcp filtered ftp
17222/tcp filtered ssh
17380/tcp open http
174443/tcp open https
175
176Nmap done: 1 IP address (1 host up) scanned in 4.22 seconds
177
178
179
180S U B - D O M A I N F I N D E R
181==================================
182
183
184[i] Total Subdomains Found : 4
185
186[+] Subdomain: mail.boywiki.org
187[-] IP: 82.94.228.252
188
189[+] Subdomain: en.boywiki.org
190[-] IP: 82.94.228.252
191
192[+] Subdomain: fr.boywiki.org
193[-] IP: 82.94.228.252
194
195[+] Subdomain: www.boywiki.org
196[-] IP: 82.94.228.252
197#########################################################################################################################
198[+] Target : https://www.boywiki.org
199
200[+] IP Address : 82.94.228.252
201
202[+] Headers :
203
204[+] Server : nginx
205[+] Date : Tue, 24 Mar 2020 21:00:09 GMT
206[+] Content-Type : text/html
207[+] Last-Modified : Mon, 31 Mar 2014 16:34:08 GMT
208[+] Transfer-Encoding : chunked
209[+] Connection : keep-alive
210[+] Content-Encoding : gzip
211
212[!] SSL Certificate Information :
213
214[+] commonName : boywiki.org
215[+] countryName : US
216[+] organizationName : Let's Encrypt
217[+] commonName : Let's Encrypt Authority X3
218[+] version : 3
219[+] serialNumber : 033BE93F5BC1A569CC933C53A07F08E2BA8B
220[+] notBefore : Feb 3 01:04:33 2020 GMT
221[+] notAfter : May 3 01:04:33 2020 GMT
222[+] OCSP : http://ocsp.int-x3.letsencrypt.org
223[+] caIssuers : http://cert.int-x3.letsencrypt.org/
224
225[!] Whois Lookup :
226
227[+] asn_registry : ripencc
228[+] asn : 3265
229[+] asn_cidr : 82.92.0.0/14
230[+] asn_country_code : NL
231[+] asn_date : 2003-11-25
232[+] query : 82.94.228.252
233[+] cidr : 82.94.228.240/28
234[+] name : XS4ALL-CUST
235[+] handle : XS42-RIPE
236[+] range : 82.94.228.240 - 82.94.228.255
237[+] description : Stichting B.C.C.O.
238[+] country : NL
239[+] address : XS4ALL Internet BV Postbus 1848 1000BV Amsterdam The Netherlands
240[+] emails : ['abuse@xs4all.nl']
241[+] created : 2009-03-17T16:09:25Z
242[+] updated : 2018-02-15T09:07:53Z
243[+] cidr : 82.92.0.0/14
244[+] range : 82.92.0.0/14
245[+] description : XS4ALL networking
246[+] created : 2003-11-25T11:51:48Z
247[+] updated : 2003-11-25T11:51:48Z
248
249[!] Starting DNS Enumeration...
250
251[+] boywiki.org. 833 IN A 82.94.228.252
252[+] boywiki.org. 599 IN SOA ns1.fscodns.net. hostmaster.freespirits.info. 2017042301 1800 1200 604800 600
253[+] boywiki.org. 1799 IN SOA ns1.fscodns.net. hostmaster.freespirits.info. 2017042301 1800 1200 604800 600
254[+] boywiki.org. 1799 IN NS ns3.fscodns.net.
255[+] boywiki.org. 1799 IN SPF 0e763d73706631206d78202d616c6c
256[+] boywiki.org. 1799 IN NS ns1.fscodns.net.
257[+] boywiki.org. 1799 IN MX 10 box.isp-email.net.
258[+] boywiki.org. 1799 IN TXT "v=spf1 mx -all"
259[+] boywiki.org. 1799 IN NS ns2.fscodns.net.
260[+] boywiki.org. 12 IN SOA ns1.fscodns.net. hostmaster.freespirits.info. 2017042301 1800 1200 604800 600
261[+] boywiki.org. 1799 IN A 82.94.228.252
262
263[-] DMARC Record Not Found!
264
265[!] Starting Sub-Domain Enumeration...
266
267[!] Requesting BuffOver
268[!] Requesting ThreadCrowd
269[!] Requesting crt.sh
270[!] Requesting AnubisDB
271[!] Requesting ThreatMiner
272
273[+] Results :
274
275[+] www.boywiki.org
276[+] fr.boywiki.org
277[+] en.boywiki.org
278[+] de.boywiki.org
279[+] mail.boywiki.org
280[+] 82.94.228.252
281
282[+] Total Found : 6
283
284[+] Port : 33434
285[+] Timeout : 1.0
286
287[!] Starting UDP Traceroute...
288
289HOPS IP HOST
290
2911 10.203.3.1 Unknown
2922 * * *
2933 96.44.144.17 br1.dal.as8100.net
2944 38.122.58.57 be5814.rcr21.b010621-0.dfw01.atlas.cogentco.com
2955 154.54.5.237 be2560.ccr31.dfw01.atlas.cogentco.com
2966 154.54.3.214 be2433.ccr22.mci01.atlas.cogentco.com
2977 154.54.44.170 be2832.ccr42.ord01.atlas.cogentco.com
2988 154.54.45.18 be2765.ccr41.ord03.atlas.cogentco.com
2999 154.54.11.22 kpn.ord03.atlas.cogentco.com
30010 134.222.48.91 asd-s8-rou-1041.NL.eurorings.net
30111 * * *
30212 194.109.5.6 0.et-3-1-0.xr3.3d12.xs4all.net
30313 194.109.5.58 0.ae10.xrc1.1d12.xs4all.net
30414 * * *
30515 * * *
30616 * * *
30717 * * *
30818 * * *
30919 * * *
31020 * * *
31121 * * *
31222 * * *
31323 * * *
31424 * * *
31525 * * *
31626 * * *
31727 * * *
31828 * * *
31929 * * *
32030 * * *
321
322[!] Starting Port Scan...
323
324[+] Testing Top 1000 Ports...
325
326[+] 25 smtp
327[+] 80 http
328[+] 110 pop3
329[+] 143 imap2
330[+] 443 https
331[+] 587 submission
332[+] 993 imaps
333[+] 995 pop3s
334[+] 10000 webmin
335
336[!] Starting Crawler...
337
338[+] Looking for robots.txt........[ Found ]
339[+] Extracting robots Links.......[ 1 ]
340[+] Looking for sitemap.xml.......[ Not Found ]
341[+] Extracting CSS Links..........[ 1 ]
342[+] Extracting Javascript Links...[ 0 ]
343[+] Extracting Internal Links.....[ 0 ]
344[+] Extracting External Links.....[ 11 ]
345[+] Extracting Images.............[ 1 ]
346[+] Crawling Sitemaps.............[ 0 ]
347[+] Crawling Javascripts..........[ 0 ]
348
349[+] Total Unique Links Extracted : 14
350
351[!] Starting Directory Search...
352
353[+] Threads : 50
354[+] Timeout : 10.0
355[+] Wordlist : wordlists/dirb_common.txt
356[+] Allow Redirects : False
357[+] SSL Verification : True
358[+] DNS Servers : 1.1.1.1
359
360[+] 200 | https://www.boywiki.org/
361[+] 301 | https://www.boywiki.org/de
362[+] 301 | https://www.boywiki.org/en
363[+] 200 | https://www.boywiki.org/favicon.ico
364[+] 301 | https://www.boywiki.org/fr
365[+] 301 | https://www.boywiki.org/images
366[+] 200 | https://www.boywiki.org/index.html
367[+] 301 | https://www.boywiki.org/media
368[+] 200 | https://www.boywiki.org/robots.txt
369[+] 301 | https://www.boywiki.org/stats
370[+] 301 | https://www.boywiki.org/wiki
371
372[+] Directories Found : 11
373[+] Directories Skipped : 4603
374[+] Total Requests : 4614
375
376[+] Completed in 0:01:07.686942
377##########################################################################################################################
378[INFO] ------TARGET info------
379[*] TARGET: https://www.boywiki.org/
380[*] TARGET IP: 82.94.228.252
381[INFO] NO load balancer detected for www.boywiki.org...
382[*] DNS servers: ns1.fscodns.net.
383[*] TARGET server: nginx
384[*] CC: NL
385[*] Country: Netherlands
386[*] RegionCode: NB
387[*] RegionName: North Brabant
388[*] City: Dorst
389[*] ASN: AS3265
390[*] BGP_PREFIX: 82.92.0.0/14
391[*] ISP: XS4ALL-NL Xs4all Internet BV, NL
392[INFO] SSL/HTTPS certificate detected
393[*] Issuer: issuer=C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X3
394[*] Subject: subject=CN = boywiki.org
395[ALERT] Let's Encrypt is commonly used for Phishing
396[INFO] DNS enumeration:
397[*] mail.boywiki.org 82.94.228.252
398[*] new.boywiki.org 88.80.6.206
399[INFO] Possible abuse mails are:
400[*] abuse@boywiki.org
401[*] abuse@www.boywiki.org
402[*] abuse@xs4all.nl
403[INFO] NO PAC (Proxy Auto Configuration) file FOUND
404[ALERT] robots.txt file FOUND in http://www.boywiki.org/robots.txt
405[INFO] Checking for HTTP status codes recursively from http://www.boywiki.org/robots.txt
406[INFO] Status code Folders
407[INFO] Starting FUZZing in http://www.boywiki.org/FUzZzZzZzZz...
408[INFO] Status code Folders
409[ALERT] Look in the source code. It may contain passwords
410[INFO] Links found from https://www.boywiki.org/ http://82.94.228.252/:
411[*] https://boywrite.ivan.net/
412[*] https://freespirits.org/
413[*] https://legarcon.net/
414[*] https://lifeline.ivan.net/
415[*] https://www.boychat.org/
416[*] https://www.boylinks.net/
417[*] https://www.boywiki.org/de
418[*] https://www.boywiki.org/en
419[*] https://www.boywiki.org/fr
420[*] https://www.castilloazul.org/
421[*] https://www.freespirits.org/
422[*] https://www.jongensforum.net/
423[*] https://www.jungsforum.net/
424[*] https://www.pedagora.com/
425cut: intervalle de champ incorrecte
426Saisissez « cut --help » pour plus d'informations.
427[INFO] Shodan detected the following opened ports on 82.94.228.252:
428[*] 0
429[*] 1
430[*] 10000
431[*] 110
432[*] 143
433[*] 25
434[*] 4
435[*] 443
436[*] 53
437[*] 587
438[*] 8
439[*] 80
440[*] 993
441[*] 995
442[INFO] ------VirusTotal SECTION------
443[INFO] VirusTotal passive DNS only stores address records. The following domains resolved to the given IP address:
444[INFO] Latest URLs hosted in this IP address detected by at least one URL scanner or malicious URL dataset:
445[INFO] Latest files that are not detected by any antivirus solution and were downloaded by VirusTotal from the IP address provided:
446[INFO] ------Alexa Rank SECTION------
447[INFO] Percent of Visitors Rank in Country:
448[INFO] Percent of Search Traffic:
449[INFO] Percent of Unique Visits:
450[INFO] Total Sites Linking In:
451[*] Total Sites
452[INFO] Useful links related to www.boywiki.org - 82.94.228.252:
453[*] https://www.virustotal.com/pt/ip-address/82.94.228.252/information/
454[*] https://www.hybrid-analysis.com/search?host=82.94.228.252
455[*] https://www.shodan.io/host/82.94.228.252
456[*] https://www.senderbase.org/lookup/?search_string=82.94.228.252
457[*] https://www.alienvault.com/open-threat-exchange/ip/82.94.228.252
458[*] http://pastebin.com/search?q=82.94.228.252
459[*] http://urlquery.net/search.php?q=82.94.228.252
460[*] http://www.alexa.com/siteinfo/www.boywiki.org
461[*] http://www.google.com/safebrowsing/diagnostic?site=www.boywiki.org
462[*] https://censys.io/ipv4/82.94.228.252
463[*] https://www.abuseipdb.com/check/82.94.228.252
464[*] https://urlscan.io/search/#82.94.228.252
465[*] https://github.com/search?q=82.94.228.252&type=Code
466[INFO] Useful links related to AS3265 - 82.92.0.0/14:
467[*] http://www.google.com/safebrowsing/diagnostic?site=AS:3265
468[*] https://www.senderbase.org/lookup/?search_string=82.92.0.0/14
469[*] http://bgp.he.net/AS3265
470[*] https://stat.ripe.net/AS3265
471[INFO] Date: 24/03/20 | Time: 17:03:11
472[INFO] Total time: 1 minute(s) and 16 second(s)
473##########################################################################################################################
474[+] Starting At 2020-03-24 17:02:17.258479
475[+] Collecting Information On: https://www.boywiki.org/
476[#] Status: 200
477--------------------------------------------------
478[#] Web Server Detected: nginx
479[!] X-Frame-Options Headers not detect! target might be vulnerable Click Jacking
480- Server: nginx
481- Date: Tue, 24 Mar 2020 21:02:17 GMT
482- Content-Type: text/html
483- Last-Modified: Mon, 31 Mar 2014 16:34:08 GMT
484- Transfer-Encoding: chunked
485- Connection: keep-alive
486- Content-Encoding: gzip
487--------------------------------------------------
488[#] Finding Location..!
489[#] status: success
490[#] country: Netherlands
491[#] countryCode: NL
492[#] region: NB
493[#] regionName: North Brabant
494[#] city: Dorst
495[#] zip: 4849
496[#] lat: 51.5979
497[#] lon: 4.8639
498[#] timezone: Europe/Amsterdam
499[#] isp: Xs4all Internet BV
500[#] org: Xs4all
501[#] as: AS3265 Xs4all Internet BV
502[#] query: 82.94.228.252
503--------------------------------------------------
504[x] Didn't Detect WAF Presence on: https://www.boywiki.org/
505--------------------------------------------------
506[#] Starting Reverse DNS
507[-] Failed ! Fail
508--------------------------------------------------
509[!] Scanning Open Port
510[#] 25/tcp open smtp
511[#] 80/tcp open http
512[#] 110/tcp open pop3
513[#] 143/tcp open imap
514[#] 443/tcp open https
515[#] 587/tcp open submission
516[#] 993/tcp open imaps
517[#] 995/tcp open pop3s
518[#] 10000/tcp open snet-sensor-mgmt
519--------------------------------------------------
520[+] Getting SSL Info
521{'OCSP': ('http://ocsp.int-x3.letsencrypt.org',),
522 'caIssuers': ('http://cert.int-x3.letsencrypt.org/',),
523 'issuer': ((('countryName', 'US'),),
524 (('organizationName', "Let's Encrypt"),),
525 (('commonName', "Let's Encrypt Authority X3"),)),
526 'notAfter': 'May 3 01:04:33 2020 GMT',
527 'notBefore': 'Feb 3 01:04:33 2020 GMT',
528 'serialNumber': '033BE93F5BC1A569CC933C53A07F08E2BA8B',
529 'subject': ((('commonName', 'boywiki.org'),),),
530 'subjectAltName': (('DNS', 'boywiki.org'), ('DNS', 'www.boywiki.org')),
531 'version': 3}
532-----BEGIN CERTIFICATE-----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563-----END CERTIFICATE-----
564
565--------------------------------------------------
566[+] Collecting Information Disclosure!
567[#] Detecting sitemap.xml file
568[-] sitemap.xml file not Found!?
569[#] Detecting robots.txt file
570[!] robots.txt File Found: https://www.boywiki.org//robots.txt
571[#] Detecting GNU Mailman
572[-] GNU Mailman App Not Detected!?
573--------------------------------------------------
574[+] Crawling Url Parameter On: https://www.boywiki.org/
575--------------------------------------------------
576[#] Searching Html Form !
577[-] No Html Form Found!?
578--------------------------------------------------
579[-] No DOM Paramter Found!?
580--------------------------------------------------
581[-] No internal Dynamic Parameter Found!?
582--------------------------------------------------
583[-] No external Dynamic Paramter Found!?
584--------------------------------------------------
585[!] 5 Internal links Discovered
586[+] https://www.boywiki.org///favicon.ico
587[+] https://www.boywiki.org//boywiki.css
588[+] https://www.boywiki.org///en
589[+] https://www.boywiki.org///fr
590[+] https://www.boywiki.org///de
591--------------------------------------------------
592[!] 11 External links Discovered
593[#] https://www.freespirits.org/
594[#] https://www.boylinks.net/
595[#] https://boywrite.ivan.net/
596[#] https://www.boychat.org/
597[#] https://www.castilloazul.org/
598[#] https://legarcon.net/
599[#] https://www.pedagora.com/
600[#] https://www.jungsforum.net/
601[#] https://www.jongensforum.net/
602[#] https://lifeline.ivan.net/
603[#] https://freespirits.org/
604--------------------------------------------------
605[#] Mapping Subdomain..
606[-] No Any Subdomain Found
607[!] Found 0 Subdomain
608--------------------------------------------------
609[!] Done At 2020-03-24 17:03:02.565289
610#########################################################################################################################
611; <<>> DiG 9.11.16-2-Debian <<>> +trace boywiki.org any
612;; global options: +cmd
613. 86400 IN NS a.root-servers.net.
614. 86400 IN NS b.root-servers.net.
615. 86400 IN NS c.root-servers.net.
616. 86400 IN NS d.root-servers.net.
617. 86400 IN NS e.root-servers.net.
618. 86400 IN NS f.root-servers.net.
619. 86400 IN NS g.root-servers.net.
620. 86400 IN NS h.root-servers.net.
621. 86400 IN NS i.root-servers.net.
622. 86400 IN NS j.root-servers.net.
623. 86400 IN NS k.root-servers.net.
624. 86400 IN NS l.root-servers.net.
625. 86400 IN NS m.root-servers.net.
626. 86400 IN RRSIG NS 8 0 518400 20200406200000 20200324190000 33853 . tg7NjfyAN7TNdARqp5cggnQ9Pr3d4vHp+c8/Pr1AnRBAO24ey0aQSqQg B1HBumh5axiil9zx02+yDyYnNPHZNCJ3bspY29rsop0MEUDrIQu0Vqxb mgbJ6i/Ms1RDvOzqyJvT78in2k0ybltRvhuFDf3mNu3+nGelblaUUxhb hOySK7NNjJivEtT0mHGAQDwb6rTlybjDhIKf0o6Nm5c+tArt9cUrAU7P k9xcl2K2TXaxy7ChflGWXhM84Fldc1vZUww4QnyfrWgphNu0uO/pCaxT t7ZsRd4AZcNZN2by+sSEqFhbYe8LPYQjoMrcTygOqr+GalF8qKu0AFTa PN8beQ==
627;; Received 525 bytes from 10.101.0.243#53(10.101.0.243) in 93 ms
628
629org. 172800 IN NS a0.org.afilias-nst.info.
630org. 172800 IN NS a2.org.afilias-nst.info.
631org. 172800 IN NS b0.org.afilias-nst.org.
632org. 172800 IN NS b2.org.afilias-nst.org.
633org. 172800 IN NS c0.org.afilias-nst.info.
634org. 172800 IN NS d0.org.afilias-nst.org.
635org. 86400 IN DS 9795 7 1 364DFAB3DAF254CAB477B5675B10766DDAA24982
636org. 86400 IN DS 9795 7 2 3922B31B6F3A4EA92B19EB7B52120F031FD8E05FF0B03BAFCF9F891B FE7FF8E5
637org. 86400 IN RRSIG DS 8 1 86400 20200406170000 20200324160000 33853 . TM20+IgkHWpzM+87+HSKwwQCdjZ2jMJUzQ+tgVDaerAZc3KZIT0wYLuf KaBbAszAECzk+SfbyJ6x/EzHrkvZ+xEMq7LvvCxTqB4H4h+MhZ6eYTlv VkBqYOnyy5tq9RQtCoganiwchjmAq9zNMFWplgLV44T0qX8qE+yolig9 izN6X8DA+fIMczQKiiw5yQWb40XvNvAAJooXTnPKYN+muaiHeQOsNCpp TiRX4rgHkzcUOpAROjEIMo813RVI2IvAoE86jnMulbLcE5tqESQZTELX k7pTQQtmG+aXe18NEUDyHUe4BfJq3CCaWBPNEjc8nmfhGYuvBAx9Zihd HX+Jzw==
638;; Received 813 bytes from 199.7.83.42#53(l.root-servers.net) in 99 ms
639
640boywiki.org. 86400 IN NS ns1.fscodns.net.
641boywiki.org. 86400 IN NS ns2.fscodns.net.
642boywiki.org. 86400 IN NS ns3.fscodns.net.
643h9p7u7tr2u91d0v0ljs9l1gidnp90u3h.org. 86400 IN NSEC3 1 1 1 D399EAAB H9PARR669T6U8O1GSG9E1LMITK4DEM0T NS SOA RRSIG DNSKEY NSEC3PARAM
644h9p7u7tr2u91d0v0ljs9l1gidnp90u3h.org. 86400 IN RRSIG NSEC3 7 2 86400 20200414210645 20200324200645 33209 org. Z8wBYqHVJBveY8ySaUuUxMEuiAK+Ql/7bCdFiQ7JUmPzQMhRqjEuDKUM wVjguL7Fbil5TUmtJBNaYwuPs42kRKn7daMn9ny8moa0HzWc9mX6Ws+K DsawHyxJEP4RUZnX9A6euMJGa4hluDO9GIVixWoHe9vbicIHfB9Oy90C 9uc=
6456kqj2kvb6ja5sj958nrotsbdj9po4q8e.org. 86400 IN NSEC3 1 1 1 D399EAAB 6KQSOK99T9H6D7J8RDO834HP7N5AN5TL NS DS RRSIG
6466kqj2kvb6ja5sj958nrotsbdj9po4q8e.org. 86400 IN RRSIG NSEC3 7 2 86400 20200407152816 20200317142816 33209 org. kbgP86kZa2uKj6ySJ7EVi7IA2mpbZ6kxiRxmH3XyFMAjQQXUBThNSOpa L08VfNZNWWx9n6GptL6VlJ0Y//1KZ+FqfuQG7nLKbO3+RGpPDOtWlwFk NWVTDmikNNsCyC85QKPuWwyl09G6/MXzEv4zJJUJ+nLK5WaaxgTHnlv2 X2c=
647;; Received 598 bytes from 199.249.120.1#53(b2.org.afilias-nst.org) in 68 ms
648
649boywiki.org. 1800 IN SOA ns1.fscodns.net. hostmaster.freespirits.info. 2017042301 1800 1200 604800 600
650boywiki.org. 1800 IN NS ns3.fscodns.net.
651boywiki.org. 1800 IN NS ns1.fscodns.net.
652boywiki.org. 1800 IN NS ns2.fscodns.net.
653boywiki.org. 1800 IN A 82.94.228.252
654boywiki.org. 1800 IN MX 10 box.isp-email.net.
655boywiki.org. 1800 IN TXT "v=spf1 mx -all"
656boywiki.org. 1800 IN SPF "v=spf1 mx -all"
657;; Received 316 bytes from 82.94.222.130#53(ns1.fscodns.net) in 176 ms
658#########################################################################################################################
659[*] Performing General Enumeration of Domain: boywiki.org
660[-] DNSSEC is not configured for boywiki.org
661[*] SOA ns1.fscodns.net 82.94.222.130
662[*] NS ns2.fscodns.net 88.80.6.203
663[*] NS ns3.fscodns.net 82.94.228.252
664[*] Bind Version for 82.94.228.252 b''
665[*] NS ns1.fscodns.net 82.94.222.130
666[*] Bind Version for 82.94.222.130 b'private'
667[*] MX box.isp-email.net 185.250.106.93
668[*] MX box.isp-email.net 2a06:cd40:400:1::3f1
669[*] A boywiki.org 82.94.228.252
670[*] Enumerating SRV Records
671[-] No SRV Records Found for boywiki.org
672[+] 0 Records Found
673#########################################################################################################################
674
675 AVAILABLE PLUGINS
676 -----------------
677
678 CompressionPlugin
679 FallbackScsvPlugin
680 HttpHeadersPlugin
681 OpenSslCcsInjectionPlugin
682 RobotPlugin
683 EarlyDataPlugin
684 CertificateInfoPlugin
685 HeartbleedPlugin
686 SessionRenegotiationPlugin
687 SessionResumptionPlugin
688 OpenSslCipherSuitesPlugin
689
690
691
692 CHECKING HOST(S) AVAILABILITY
693 -----------------------------
694
695 82.94.228.252:443 => 82.94.228.252
696
697
698
699
700 SCAN RESULTS FOR 82.94.228.252:443 - 82.94.228.252
701 --------------------------------------------------
702
703 * Deflate Compression:
704 OK - Compression disabled
705
706 * Session Renegotiation:
707 Client-initiated Renegotiation: OK - Rejected
708 Secure Renegotiation: OK - Supported
709
710 * Downgrade Attacks:
711 TLS_FALLBACK_SCSV: OK - Supported
712
713 * SSLV3 Cipher Suites:
714 Server rejected all cipher suites.
715
716 * TLSV1_1 Cipher Suites:
717 Forward Secrecy OK - Supported
718 RC4 INSECURE - Supported
719
720 Preferred:
721 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 403 Forbidden
722 Accepted:
723 TLS_RSA_WITH_RC4_128_SHA 128 bits HTTP 403 Forbidden
724 TLS_ECDHE_RSA_WITH_RC4_128_SHA 128 bits HTTP 403 Forbidden
725 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 403 Forbidden
726 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 403 Forbidden
727 TLS_DHE_RSA_WITH_SEED_CBC_SHA 128 bits HTTP 403 Forbidden
728 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 403 Forbidden
729 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 403 Forbidden
730 TLS_DHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 403 Forbidden
731 TLS_DHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 403 Forbidden
732
733 * Certificate Information:
734 Content
735 SHA1 Fingerprint: 62fc6092f257778f77969679a7da7694a7bf2489
736 Common Name: boywiki.org
737 Issuer: Let's Encrypt Authority X3
738 Serial Number: 320332838433975962341547120723424248697085
739 Not Before: 2019-01-31 05:56:40
740 Not After: 2019-05-01 05:56:40
741 Signature Algorithm: sha256
742 Public Key Algorithm: RSA
743 Key Size: 2048
744 Exponent: 65537 (0x10001)
745 DNS Subject Alternative Names: ['boywiki.org', 'de.boywiki.org', 'en.boywiki.org', 'fr.boywiki.org', 'www.boywiki.org']
746
747 Trust
748 Hostname Validation: FAILED - Certificate does NOT match 82.94.228.252
749 Android CA Store (9.0.0_r9): FAILED - Certificate is NOT Trusted: certificate has expired
750 Apple CA Store (iOS 12, macOS 10.14, watchOS 5, and tvOS 12):FAILED - Certificate is NOT Trusted: certificate has expired
751 Java CA Store (jdk-12.0.1): FAILED - Certificate is NOT Trusted: certificate has expired
752 Mozilla CA Store (2019-03-14): FAILED - Certificate is NOT Trusted: certificate has expired
753 Windows CA Store (2019-05-27): FAILED - Certificate is NOT Trusted: certificate has expired
754 Symantec 2018 Deprecation: OK - Not a Symantec-issued certificate
755 Received Chain: boywiki.org --> Let's Encrypt Authority X3
756 Verified Chain: ERROR - Could not build verified chain (certificate untrusted?)
757 Received Chain Contains Anchor: ERROR - Could not build verified chain (certificate untrusted?)
758 Received Chain Order: OK - Order is valid
759 Verified Chain contains SHA1: ERROR - Could not build verified chain (certificate untrusted?)
760
761 Extensions
762 OCSP Must-Staple: NOT SUPPORTED - Extension not found
763 Certificate Transparency: WARNING - Only 2 SCTs included but Google recommends 3 or more
764
765 OCSP Stapling
766 NOT SUPPORTED - Server did not send back an OCSP response
767
768 * TLSV1 Cipher Suites:
769 Forward Secrecy OK - Supported
770 RC4 INSECURE - Supported
771
772 Preferred:
773 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 403 Forbidden
774 Accepted:
775 TLS_RSA_WITH_RC4_128_SHA 128 bits HTTP 403 Forbidden
776 TLS_ECDHE_RSA_WITH_RC4_128_SHA 128 bits HTTP 403 Forbidden
777 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 403 Forbidden
778 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 403 Forbidden
779 TLS_DHE_RSA_WITH_SEED_CBC_SHA 128 bits HTTP 403 Forbidden
780 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 403 Forbidden
781 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 403 Forbidden
782 TLS_DHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 403 Forbidden
783 TLS_DHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 403 Forbidden
784
785 * OpenSSL CCS Injection:
786 OK - Not vulnerable to OpenSSL CCS injection
787
788 * SSLV2 Cipher Suites:
789 Server rejected all cipher suites.
790
791 * TLSV1_3 Cipher Suites:
792 Server rejected all cipher suites.
793
794 * TLS 1.2 Session Resumption Support:
795 With Session IDs: OK - Supported (5 successful, 0 failed, 0 errors, 5 total attempts).
796 With TLS Tickets: OK - Supported
797
798 * OpenSSL Heartbleed:
799 OK - Not vulnerable to Heartbleed
800
801 * TLSV1_2 Cipher Suites:
802 Forward Secrecy OK - Supported
803 RC4 INSECURE - Supported
804
805 Preferred:
806 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 403 Forbidden
807 Accepted:
808 TLS_RSA_WITH_RC4_128_SHA 128 bits HTTP 403 Forbidden
809 TLS_ECDHE_RSA_WITH_RC4_128_SHA 128 bits HTTP 403 Forbidden
810 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 403 Forbidden
811 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 256 bits HTTP 403 Forbidden
812 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 403 Forbidden
813 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 403 Forbidden
814 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 403 Forbidden
815 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 403 Forbidden
816 TLS_DHE_RSA_WITH_SEED_CBC_SHA 128 bits HTTP 403 Forbidden
817 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 403 Forbidden
818 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 403 Forbidden
819 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 403 Forbidden
820 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 256 bits HTTP 403 Forbidden
821 TLS_DHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 403 Forbidden
822 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 403 Forbidden
823 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 403 Forbidden
824 TLS_DHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 403 Forbidden
825
826 * ROBOT Attack:
827 OK - Not vulnerable
828#########################################################################################################################
829traceroute to www.boywiki.org (82.94.228.252), 30 hops max, 60 byte packets
830 1 10.203.3.1 (10.203.3.1) 66.251 ms 66.226 ms 69.543 ms
831 2 * * *
832 3 br1.dal.as8100.net (96.44.144.17) 71.530 ms 71.517 ms 71.440 ms
833 4 be5814.rcr21.b010621-0.dfw01.atlas.cogentco.com (38.122.58.57) 72.133 ms 72.073 ms 72.101 ms
834 5 be2561.ccr32.dfw01.atlas.cogentco.com (154.54.6.73) 71.980 ms 72.024 ms be2560.ccr31.dfw01.atlas.cogentco.com (154.54.5.237) 71.964 ms
835 6 be2432.ccr21.mci01.atlas.cogentco.com (154.54.3.134) 80.166 ms be2433.ccr22.mci01.atlas.cogentco.com (154.54.3.214) 71.886 ms 71.779 ms
836 7 be2831.ccr41.ord01.atlas.cogentco.com (154.54.42.166) 88.574 ms be2832.ccr42.ord01.atlas.cogentco.com (154.54.44.170) 89.605 ms 89.545 ms
837 8 be2765.ccr41.ord03.atlas.cogentco.com (154.54.45.18) 88.373 ms be2766.ccr41.ord03.atlas.cogentco.com (154.54.46.178) 89.747 ms be2765.ccr41.ord03.atlas.cogentco.com (154.54.45.18) 88.365 ms
838 9 kpn.ord03.atlas.cogentco.com (154.54.11.22) 88.381 ms 88.399 ms 88.303 ms
83910 asd-s8-rou-1041.NL.eurorings.net (134.222.48.91) 199.305 ms 198.587 ms 188.821 ms
84011 * * *
84112 0.et-3-1-0.xr3.3d12.xs4all.net (194.109.5.6) 180.226 ms 0.et-8-1-0.xr4.1d12.xs4all.net (194.109.5.4) 178.715 ms 178.630 ms
84213 0.ae10.xrc1.1d12.xs4all.net (194.109.5.58) 180.133 ms 179.318 ms 0.ae11.xrc1.1d12.xs4all.net (194.109.5.102) 177.848 ms
843#########################################################################################################################
844
845Domains still to check: 1
846 Checking if the hostname boywiki.org. given is in fact a domain...
847
848Analyzing domain: boywiki.org.
849 Checking NameServers using system default resolver...
850 IP: 82.94.228.252 (Netherlands)
851 HostName: ns3.fscodns.net Type: NS
852 IP: 82.94.222.130 (Netherlands)
853 HostName: ns1.fscodns.net Type: NS
854 IP: 88.80.6.203 (Sweden)
855 HostName: ns2.fscodns.net Type: NS
856 HostName: box.freespirits.info Type: PTR
857
858 Checking MailServers using system default resolver...
859 IP: 185.250.106.93 (Romania)
860 HostName: box.isp-email.net Type: MX
861 HostName: box.isp-email.net Type: PTR
862
863 Checking the zone transfer for each NS... (if this takes more than 10 seconds, just hit CTRL-C and it will continue. Bug in the libs)
864 No zone transfer found on nameserver 82.94.222.130
865 No zone transfer found on nameserver 82.94.228.252
866 No zone transfer found on nameserver 88.80.6.203
867
868 Checking SPF record...
869
870 Checking 192 most common hostnames using system default resolver...
871 IP: 82.94.228.252 (Netherlands)
872 HostName: ns3.fscodns.net Type: NS
873 HostName: www.boywiki.org. Type: A
874 IP: 82.94.228.252 (Netherlands)
875 HostName: ns3.fscodns.net Type: NS
876 HostName: www.boywiki.org. Type: A
877 HostName: mail.boywiki.org. Type: A
878
879 Checking with nmap the reverse DNS hostnames of every <ip>/24 netblock using system default resolver...
880 Checking netblock 82.94.222.0
881 Checking netblock 82.94.228.0
882 Checking netblock 88.80.6.0
883 Checking netblock 185.250.106.0
884
885 Searching for boywiki.org. emails in Google
886 etenne@boywiki.org�
887 info@boywiki.org.
888 Etenne@boywiki.org�
889 info@boywiki.org�
890 info@boywiki.org"
891
892 Checking 4 active hosts using nmap... (nmap -sn -n -v -PP -PM -PS80,25 -PA -PY -PU53,40125 -PE --reason <ip> -oA <output_directory>/nmap/<ip>.sn)
893 Host 82.94.222.130 is up (syn-ack ttl 49)
894 Host 82.94.228.252 is up (syn-ack ttl 49)
895 Host 88.80.6.203 is down
896 Host 185.250.106.93 is up (udp-response ttl 48)
897
898 Checking ports on every active host using nmap... (nmap -O --reason --webxml --traceroute -sS -sV -sC -Pn -n -v -F <ip> -oA <output_directory>/nmap/<ip>)
899 Scanning ip 82.94.222.130 (ns1.fscodns.net):
900 993/tcp open tcpwrapped syn-ack ttl 49
901 Scanning ip 82.94.228.252 (mail.boywiki.org.):
902 25/tcp open smtp syn-ack ttl 49 Postfix smtpd
903 |_smtp-commands: mail.boywiki.org, PIPELINING, SIZE 30720000, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN,
904 |_ssl-date: TLS randomness does not represent time
905 80/tcp open http syn-ack ttl 49 nginx
906 | http-methods:
907 |_ Supported Methods: GET HEAD POST
908 |_http-title: 404 Not Found
909 110/tcp open pop3 syn-ack ttl 49 Dovecot pop3d
910 |_pop3-capabilities: TOP SASL(CRAM-MD5) UIDL STLS RESP-CODES PIPELINING CAPA
911 |_ssl-date: TLS randomness does not represent time
912 143/tcp open imap syn-ack ttl 49 Dovecot imapd
913 |_imap-capabilities: SASL-IR STARTTLS IDLE LITERAL+ LOGINDISABLED capabilities more ENABLE OK ID have LOGIN-REFERRALS post-login listed IMAP4rev1 Pre-login AUTH=CRAM-MD5A0001
914 |_ssl-date: TLS randomness does not represent time
915 443/tcp open ssl/http syn-ack ttl 49 nginx
916 | http-methods:
917 |_ Supported Methods: GET HEAD POST
918 |_http-title: 403 Forbidden
919 | ssl-cert: Subject: commonName=boywiki.org
920 | Subject Alternative Name: DNS:boywiki.org, DNS:de.boywiki.org, DNS:en.boywiki.org, DNS:fr.boywiki.org, DNS:www.boywiki.org
921 | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
922 | Public Key type: rsa
923 | Public Key bits: 2048
924 | Signature Algorithm: sha256WithRSAEncryption
925 | Not valid before: 2019-01-31T05:56:40
926 | Not valid after: 2019-05-01T05:56:40
927 | MD5: eab9 284b 91a6 bc59 e1d8 02b3 4a22 d593
928 |_SHA-1: 62fc 6092 f257 778f 7796 9679 a7da 7694 a7bf 2489
929 |_ssl-date: TLS randomness does not represent time
930 587/tcp open smtp syn-ack ttl 49 Postfix smtpd
931 |_smtp-commands: mail.boywiki.org, PIPELINING, SIZE 30720000, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN,
932 |_ssl-date: TLS randomness does not represent time
933 993/tcp open ssl/imaps? syn-ack ttl 49
934 |_ssl-date: TLS randomness does not represent time
935 995/tcp open ssl/pop3s? syn-ack ttl 49
936 |_ssl-date: TLS randomness does not represent time
937 10000/tcp open http syn-ack ttl 49 MiniServ 1.850 (Webmin httpd)
938 |_http-favicon: Unknown favicon MD5: 14F7CB161F9A836880B17A5F6EF890BD
939 | http-methods:
940 |_ Supported Methods: GET POST OPTIONS
941 |_http-title: Site doesn't have a title (text/html; Charset=iso-8859-1).
942 OS Info: Service Info: Host: mail.boywiki.org
943 Scanning ip 185.250.106.93 (box.isp-email.net (PTR)):
944 25/tcp open smtp syn-ack ttl 48 Postfix smtpd
945 |_smtp-commands: box.isp-email.net, PIPELINING, SIZE 134217728, VRFY, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN, SMTPUTF8,
946 | ssl-cert: Subject: commonName=box.isp-email.net
947 | Subject Alternative Name: DNS:box.isp-email.net
948 | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
949 | Public Key type: rsa
950 | Public Key bits: 2048
951 | Signature Algorithm: sha256WithRSAEncryption
952 | Not valid before: 2020-02-16T00:01:06
953 | Not valid after: 2020-05-16T00:01:06
954 | MD5: 9227 6c74 5a16 9708 99d0 d7de 4456 a192
955 |_SHA-1: c4e9 252e 099a ddee 98fa ef2d 125b 8e12 2a71 03a4
956 |_ssl-date: TLS randomness does not represent time
957 53/tcp open domain? syn-ack ttl 48
958 | dns-nsid:
959 |_ id.server:
960 | fingerprint-strings:
961 | DNSVersionBindReqTCP:
962 | version
963 |_ bind
964 80/tcp open http syn-ack ttl 48 nginx
965 | http-methods:
966 |_ Supported Methods: GET HEAD POST OPTIONS
967 |_http-title: Did not follow redirect to https://box.isp-email.net/
968 443/tcp open ssl/http syn-ack ttl 48 nginx
969 | http-methods:
970 |_ Supported Methods: GET HEAD
971 |_http-title: this is a mail-in-a-box
972 | ssl-cert: Subject: commonName=box.isp-email.net
973 | Subject Alternative Name: DNS:box.isp-email.net
974 | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
975 | Public Key type: rsa
976 | Public Key bits: 2048
977 | Signature Algorithm: sha256WithRSAEncryption
978 | Not valid before: 2020-02-16T00:01:06
979 | Not valid after: 2020-05-16T00:01:06
980 | MD5: 9227 6c74 5a16 9708 99d0 d7de 4456 a192
981 |_SHA-1: c4e9 252e 099a ddee 98fa ef2d 125b 8e12 2a71 03a4
982 |_ssl-date: TLS randomness does not represent time
983 | tls-alpn:
984 | h2
985 |_ http/1.1
986 | tls-nextprotoneg:
987 | h2
988 |_ http/1.1
989 587/tcp open smtp syn-ack ttl 48 Postfix smtpd
990 |_smtp-commands: box.isp-email.net, PIPELINING, SIZE 134217728, VRFY, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN, SMTPUTF8,
991 | ssl-cert: Subject: commonName=box.isp-email.net
992 | Subject Alternative Name: DNS:box.isp-email.net
993 | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
994 | Public Key type: rsa
995 | Public Key bits: 2048
996 | Signature Algorithm: sha256WithRSAEncryption
997 | Not valid before: 2020-02-16T00:01:06
998 | Not valid after: 2020-05-16T00:01:06
999 | MD5: 9227 6c74 5a16 9708 99d0 d7de 4456 a192
1000 |_SHA-1: c4e9 252e 099a ddee 98fa ef2d 125b 8e12 2a71 03a4
1001 |_ssl-date: TLS randomness does not represent time
1002 993/tcp open ssl/imap syn-ack ttl 48 Dovecot imapd (Ubuntu)
1003 |_imap-capabilities: more Pre-login AUTH=LOGINA0001 LITERAL+ have AUTH=PLAIN IDLE SASL-IR post-login LOGIN-REFERRALS listed IMAP4rev1 ID OK capabilities ENABLE
1004 | ssl-cert: Subject: commonName=box.isp-email.net
1005 | Subject Alternative Name: DNS:box.isp-email.net
1006 | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
1007 | Public Key type: rsa
1008 | Public Key bits: 2048
1009 | Signature Algorithm: sha256WithRSAEncryption
1010 | Not valid before: 2020-02-16T00:01:06
1011 | Not valid after: 2020-05-16T00:01:06
1012 | MD5: 9227 6c74 5a16 9708 99d0 d7de 4456 a192
1013 |_SHA-1: c4e9 252e 099a ddee 98fa ef2d 125b 8e12 2a71 03a4
1014 |_ssl-date: TLS randomness does not represent time
1015 995/tcp open ssl/pop3 syn-ack ttl 48 Dovecot pop3d
1016 |_pop3-capabilities: SASL(PLAIN LOGIN) USER TOP RESP-CODES AUTH-RESP-CODE CAPA PIPELINING UIDL
1017 | ssl-cert: Subject: commonName=box.isp-email.net
1018 | Subject Alternative Name: DNS:box.isp-email.net
1019 | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
1020 | Public Key type: rsa
1021 | Public Key bits: 2048
1022 | Signature Algorithm: sha256WithRSAEncryption
1023 | Not valid before: 2020-02-16T00:01:06
1024 | Not valid after: 2020-05-16T00:01:06
1025 | MD5: 9227 6c74 5a16 9708 99d0 d7de 4456 a192
1026 |_SHA-1: c4e9 252e 099a ddee 98fa ef2d 125b 8e12 2a71 03a4
1027 |_ssl-date: TLS randomness does not represent time
1028 OS Info: Service Info: Host: box.isp-email.net; OS: Linux; CPE: cpe:/o:linux:linux_kernel
1029 WebCrawling domain's web servers... up to 50 max links.
1030
1031 + URL to crawl: http://www.boywiki.org.
1032 + Date: 2020-03-24
1033
1034 + Crawling URL: http://www.boywiki.org.:
1035 + Links:
1036 + Crawling http://www.boywiki.org.
1037 + Crawling http://www.boywiki.org./en
1038 + Crawling http://www.boywiki.org./fr
1039 + Crawling http://www.boywiki.org./de
1040 + Crawling http://www.boywiki.org./en/load.php?debug=false&lang=en&modules=mediawiki.legacy.commonPrint%2Cshared%7Cmediawiki.sectionAnchor%7Cmediawiki.skinning.interface%7Cskins.vector.styles&only=styles&skin=vector (File! Not crawling it.)
1041 + Crawling http://www.boywiki.org./en/load.php?debug=false&lang=en&modules=site&only=styles&skin=vector (File! Not crawling it.)
1042 + Crawling http://www.boywiki.org./en/load.php?debug=false&lang=en&modules=startup&only=scripts&skin=vector (File! Not crawling it.)
1043 + Crawling http://www.boywiki.org./en/opensearch_desc.php (File! Not crawling it.)
1044 + Crawling http://www.boywiki.org./en/index.php?title=Special:RecentChanges&
1045 + Crawling http://www.boywiki.org./en/Category:Encyclopedia
1046 + Crawling http://www.boywiki.org./en/Category:Entertainment
1047 + Crawling http://www.boywiki.org./en/Category:Life
1048 + Crawling http://www.boywiki.org./en/BoyWiki
1049 + Crawling http://www.boywiki.org./en/Boylover
1050 + Crawling http://www.boywiki.org./en/BoyWiki:Copyrights
1051 + Crawling http://www.boywiki.org./en/Special:RequestAccount
1052 + Crawling http://www.boywiki.org./en/Category:Help
1053 + Crawling http://www.boywiki.org./en/Special:AllPages
1054 + Crawling http://www.boywiki.org./en/Portal:Index
1055 + Crawling http://www.boywiki.org./en/International_Boylove_Day
1056 + Crawling http://www.boywiki.org./en/Portal:Featured_articles
1057 + Crawling http://www.boywiki.org./en/IBLD
1058 + Crawling http://www.boywiki.org./en/Online_boylove_community
1059 + Crawling http://www.boywiki.org./en/BoyWiki:Feature_article_nominations
1060 + Crawling http://www.boywiki.org./en/Boyland_on_line
1061 + Crawling http://www.boywiki.org./en/The_%22Bau_a%22_Ceremonial_Hunting_Lodge_of_the_Kaluli_of_Papua_New_Guinea
1062 + Crawling http://www.boywiki.org./en/Pederasty_in_the_Arabic_Literature_of_the_Early_Ottoman_Period
1063 + Crawling http://www.boywiki.org./en/Special:NewPages
1064 + Crawling http://www.boywiki.org./en/BoyWiki:New_and_recently_improved_articles_nominations
1065 + Crawling http://www.boywiki.org./en/Eromenos_(dictionary)
1066 + Crawling http://www.boywiki.org./en/Category:Dictionary
1067 + Crawling http://www.boywiki.org./en/Portal:Boylove_News_Channel
1068 + Crawling http://www.boywiki.org./en/NAMBLA_used_to_incite_fear_in_Oregon
1069 + Crawling http://www.boywiki.org./en/Azov_Films_Prosecutions
1070 + Crawling http://www.boywiki.org./en/Azov_Films_Prosecutions_-_Canada
1071 + Crawling http://www.boywiki.org./en/Azov_Films_Prosecutions_-_United_Kingdom
1072 + Crawling http://www.boywiki.org./en/The_Birth_of_New_BoyLove_Venues
1073 + Crawling http://www.boywiki.org./en/Review_of_Full_Service_by_Scotty_Bowers
1074 + Crawling http://www.boywiki.org./en/Alexander%27s_Choice_(book)
1075 + Crawling http://www.boywiki.org./en/Review_of_Reasons_of_the_Heart
1076 + Crawling http://www.boywiki.org./en/The_Sex_Offender_Registry:_Public_Safety_or_Witch_Hunt%3F
1077 + Crawling http://www.boywiki.org./en/User:Dragonlover
1078 + Crawling http://www.boywiki.org./en/BoyWiki:Current_events
1079 + Crawling http://www.boywiki.org./en/
1080 + Crawling http://www.boywiki.org./en/BoyWiki:Requests_for_file_uploads
1081 + Crawling http://www.boywiki.org./en/BoyWiki:Donations
1082 + Crawling http://www.boywiki.org./en/March_24
1083 + Crawling http://www.boywiki.org./en/index.php?title=2020&action=edit&redlink=1 (404 Not Found)
1084 + Crawling http://www.boywiki.org./en/Man_with_ephebe
1085 + Crawling http://www.boywiki.org./en/Ephebe
1086 + Crawling http://www.boywiki.org./en/Edward_Perry_Warren
1087 + Crawling http://www.boywiki.org./en/BoyWiki:Image_of_the_day_archive
1088 + Crawling http://www.boywiki.org./en/Category:Activism
1089 + Crawling http://www.boywiki.org./en/Category:Births
1090 + Searching for directories...
1091 - Found: http://www.boywiki.org./en/
1092 - Found: http://www.boywiki.org./images/
1093 - Found: http://www.boywiki.org./en/resources/
1094 - Found: http://www.boywiki.org./en/resources/assets/
1095 - Found: http://www.boywiki.org./fr/
1096 - Found: http://www.boywiki.org./fr/resources/
1097 - Found: http://www.boywiki.org./fr/resources/assets/
1098 - Found: http://www.boywiki.org./de/
1099 - Found: http://www.boywiki.org./de/resources/
1100 - Found: http://www.boywiki.org./de/resources/assets/
1101 + Searching open folders...
1102 - http://www.boywiki.org./en/ (No Open Folder)
1103 - http://www.boywiki.org./images/ (403 Forbidden)
1104 - http://www.boywiki.org./en/resources/ (404 Not Found)
1105 - http://www.boywiki.org./en/resources/assets/ (404 Not Found)
1106 - http://www.boywiki.org./fr/ (No Open Folder)
1107 - http://www.boywiki.org./fr/resources/ (404 Not Found)
1108 - http://www.boywiki.org./fr/resources/assets/ (404 Not Found)
1109 - http://www.boywiki.org./de/ (No Open Folder)
1110 - http://www.boywiki.org./de/resources/ (404 Not Found)
1111 - http://www.boywiki.org./de/resources/assets/ (404 Not Found)
1112 + Crawl finished successfully.
1113----------------------------------------------------------------------
1114Summary of http://http://www.boywiki.org.
1115----------------------------------------------------------------------
1116+ Links crawled:
1117 - http://www.boywiki.org.
1118 - http://www.boywiki.org./de
1119 - http://www.boywiki.org./en
1120 - http://www.boywiki.org./en/
1121 - http://www.boywiki.org./en/Alexander%27s_Choice_(book)
1122 - http://www.boywiki.org./en/Azov_Films_Prosecutions
1123 - http://www.boywiki.org./en/Azov_Films_Prosecutions_-_Canada
1124 - http://www.boywiki.org./en/Azov_Films_Prosecutions_-_United_Kingdom
1125 - http://www.boywiki.org./en/BoyWiki
1126 - http://www.boywiki.org./en/BoyWiki:Copyrights
1127 - http://www.boywiki.org./en/BoyWiki:Current_events
1128 - http://www.boywiki.org./en/BoyWiki:Donations
1129 - http://www.boywiki.org./en/BoyWiki:Feature_article_nominations
1130 - http://www.boywiki.org./en/BoyWiki:Image_of_the_day_archive
1131 - http://www.boywiki.org./en/BoyWiki:New_and_recently_improved_articles_nominations
1132 - http://www.boywiki.org./en/BoyWiki:Requests_for_file_uploads
1133 - http://www.boywiki.org./en/Boyland_on_line
1134 - http://www.boywiki.org./en/Boylover
1135 - http://www.boywiki.org./en/Category:Activism
1136 - http://www.boywiki.org./en/Category:Births
1137 - http://www.boywiki.org./en/Category:Dictionary
1138 - http://www.boywiki.org./en/Category:Encyclopedia
1139 - http://www.boywiki.org./en/Category:Entertainment
1140 - http://www.boywiki.org./en/Category:Help
1141 - http://www.boywiki.org./en/Category:Life
1142 - http://www.boywiki.org./en/Edward_Perry_Warren
1143 - http://www.boywiki.org./en/Ephebe
1144 - http://www.boywiki.org./en/Eromenos_(dictionary)
1145 - http://www.boywiki.org./en/IBLD
1146 - http://www.boywiki.org./en/International_Boylove_Day
1147 - http://www.boywiki.org./en/Man_with_ephebe
1148 - http://www.boywiki.org./en/March_24
1149 - http://www.boywiki.org./en/NAMBLA_used_to_incite_fear_in_Oregon
1150 - http://www.boywiki.org./en/Online_boylove_community
1151 - http://www.boywiki.org./en/Pederasty_in_the_Arabic_Literature_of_the_Early_Ottoman_Period
1152 - http://www.boywiki.org./en/Portal:Boylove_News_Channel
1153 - http://www.boywiki.org./en/Portal:Featured_articles
1154 - http://www.boywiki.org./en/Portal:Index
1155 - http://www.boywiki.org./en/Review_of_Full_Service_by_Scotty_Bowers
1156 - http://www.boywiki.org./en/Review_of_Reasons_of_the_Heart
1157 - http://www.boywiki.org./en/Special:AllPages
1158 - http://www.boywiki.org./en/Special:NewPages
1159 - http://www.boywiki.org./en/Special:RequestAccount
1160 - http://www.boywiki.org./en/The_%22Bau_a%22_Ceremonial_Hunting_Lodge_of_the_Kaluli_of_Papua_New_Guinea
1161 - http://www.boywiki.org./en/The_Birth_of_New_BoyLove_Venues
1162 - http://www.boywiki.org./en/The_Sex_Offender_Registry:_Public_Safety_or_Witch_Hunt%3F
1163 - http://www.boywiki.org./en/User:Dragonlover
1164 - http://www.boywiki.org./en/index.php?title=2020&action=edit&redlink=1 (404 Not Found)
1165 - http://www.boywiki.org./en/index.php?title=Special:RecentChanges&
1166 - http://www.boywiki.org./fr
1167 Total links crawled: 50
1168
1169+ Links to files found:
1170 - http://www.boywiki.org./boywiki.css
1171 - http://www.boywiki.org./de/Datei:Boywiki-de-banner2.png
1172 - http://www.boywiki.org./de/resources/assets/poweredby_mediawiki_88x31.png
1173 - http://www.boywiki.org./en/File:462px-Cscr-featured_.png
1174 - http://www.boywiki.org./en/File:82857621092e2d72.gif
1175 - http://www.boywiki.org./en/File:ANKER_Albert_1873_Der_Schneeb%C3%A4r_600x358.jpg
1176 - http://www.boywiki.org./en/File:ANKER_Albert_1875c_Schulknabe_2638x3000.jpg
1177 - http://www.boywiki.org./en/File:ANKER_Albert_1895c_Knabe_%C3%BCber_dem_Schulheft_eingeschlafen_695x488.jpg
1178 - http://www.boywiki.org./en/File:ANSHUTZ_Thomas_Pollock_1900c_Boy_reading_-_Ned_Anshutz_543x768.jpg
1179 - http://www.boywiki.org./en/File:Alexanders-choice-edmund-marlowe-paperback-cover-art.jpg
1180 - http://www.boywiki.org./en/File:Anacreon_Louvre.png
1181 - http://www.boywiki.org./en/File:BERLIN_PAINTER_-495c_Ganymede_holding_a_hoop_and_a_cock_(Louvre_G175)_1874x1998.jpg
1182 - http://www.boywiki.org./en/File:BLogo_930x818.png
1183 - http://www.boywiki.org./en/File:BRISEIS_PAINTER_-480c_Man_kissing_a_boy_(Louvre_G278)_(detail)_900x1200.jpg
1184 - http://www.boywiki.org./en/File:BRISEIS_PAINTER_-480c_Man_kissing_a_boy_(Louvre_G278)_2240x2180.jpg
1185 - http://www.boywiki.org./en/File:Blol.png
1186 - http://www.boywiki.org./en/File:Brecha_Jose_sun_smile.jpg
1187 - http://www.boywiki.org./en/File:Connor_YourIBLD_MainPage_842x921.JPG
1188 - http://www.boywiki.org./en/File:Cornell_Capa_-_N.Y._Boys%27_Summer_Home.png
1189 - http://www.boywiki.org./en/File:Didessa_village,_Kaluli_ethnic_group,_Mt._Bosavi_region,_Papua_New_Guinea.png
1190 - http://www.boywiki.org./en/File:Donations.png
1191 - http://www.boywiki.org./en/File:Etenne%27s_IBLD_page.jpg
1192 - http://www.boywiki.org./en/File:FR%C3%88RE_Pierre-%C3%89douard_-_Apr%C3%A8s_l%27%C3%A9cole_500x655.jpg
1193 - http://www.boywiki.org./en/File:FR%C3%88RE_Pierre-%C3%89douard_1858_Jeune_gar%C3%A7on_courant_dans_la_neige_565x899.jpg
1194 - http://www.boywiki.org./en/File:FR%C3%88RE_Pierre-%C3%89douard_1859_La_glissade_512x378.jpg
1195 - http://www.boywiki.org./en/File:FR%C3%88RE_Pierre-%C3%89douard_1860_Jeux_dans_la_neige_683x536.jpg
1196 - http://www.boywiki.org./en/File:FR%C3%88RE_Pierre-%C3%89douard_1861_Bataille_de_boules_de_neige_944x721.jpg
1197 - http://www.boywiki.org./en/File:FR%C3%88RE_Pierre-%C3%89douard_1867_La_sortie_de_l%27%C3%A9cole_600x783.jpg
1198 - http://www.boywiki.org./en/File:FR%C3%88RE_Pierre-%C3%89douard_1876_Gar%C3%A7ons_de_courses_543x568.jpg
1199 - http://www.boywiki.org./en/File:FR%C3%88RE_Pierre-%C3%89douard_1879_Sur_le_chemin_de_l%27%C3%A9cole_702x900.jpg
1200 - http://www.boywiki.org./en/File:FREUND_Fritz_-_Die_Schneeballschlacht_III_550x333.jpg
1201 - http://www.boywiki.org./en/File:FREUND_Fritz_-_Die_Schneeballschlacht_II_800x535.jpg
1202 - http://www.boywiki.org./en/File:FREUND_Fritz_-_Die_Schneeballschlacht_I_1641x1080.jpg
1203 - http://www.boywiki.org./en/File:Fake_News1.png
1204 - http://www.boywiki.org./en/File:GIBRAN_Gibran_Khalil_1916_Abu_Nuwas.jpg
1205 - http://www.boywiki.org./en/File:GOOR_Gaston_1974_L%27Amour_couronn%C3%A9_de_roses_1978x2943.jpg
1206 - http://www.boywiki.org./en/File:HANSEN_Peter_1901_P%C3%A5_isen_bag_byen_-_F%C3%A5borg_1100x676.jpg
1207 - http://www.boywiki.org./en/File:Hyacinth.jpg
1208 - http://www.boywiki.org./en/File:IBLD_Animation1_BoyChat.gif
1209 - http://www.boywiki.org./en/File:IBLD_Blue_candle.jpg
1210 - http://www.boywiki.org./en/File:IBLD_Blue_candle2.jpg
1211 - http://www.boywiki.org./en/File:Illustration_depicting_a_kulampara_(lover_of_boys).jpg
1212 - http://www.boywiki.org./en/File:Information_icon.png
1213 - http://www.boywiki.org./en/File:KR%C3%9CGER_Franz_1850a_Beim_Weihnachtsbaumholen_1984x2362.jpg
1214 - http://www.boywiki.org./en/File:Kaluli_tribesman_dressed_for_a_special_occasion_from_Sugu_village.png
1215 - http://www.boywiki.org./en/File:LEYENDECKER_Joseph_Christian_1911_Snowball_fight_1036x1458.jpg
1216 - http://www.boywiki.org./en/File:MACDONALD_Lawrence_1842_Hyacinthus_980x980.jpg
1217 - http://www.boywiki.org./en/File:MAYNE_Jean_1903_La_boule_de_neige_g%C3%A9ante_900x754.jpg
1218 - http://www.boywiki.org./en/File:MORGAN_John_-_The_mel%C3%A9e_1153x512.jpg
1219 - http://www.boywiki.org./en/File:Man_with_Ephebe_(6th_century_BC)_Greece_01.jpg
1220 - http://www.boywiki.org./en/File:Man_with_Ephebe_(6th_century_BC)_Greece_02.jpg
1221 - http://www.boywiki.org./en/File:News_icon.jpg
1222 - http://www.boywiki.org./en/File:On_the_roof_in_1925_with_the_YMCA_Pyramid_Leaders_Corp.png
1223 - http://www.boywiki.org./en/File:Operation_Nowruz_Jhala_DVIDS54124.png
1224 - http://www.boywiki.org./en/File:PIFFARD_Harold_Hume_-_The_snowball_-_Guilty_or_not_guilty%3F_550x717.jpg
1225 - http://www.boywiki.org./en/File:Puce_11x11_gr.png
1226 - http://www.boywiki.org./en/File:Puce_9x9_bl.png
1227 - http://www.boywiki.org./en/File:Puce_9x9_gr.png
1228 - http://www.boywiki.org./en/File:RING_Laurits_Andersen_1897_Maleren_i_landsbyen_1000x788.jpg
1229 - http://www.boywiki.org./en/File:Siwa-Homes2009.png
1230 - http://www.boywiki.org./en/File:Sub-arrows.png
1231 - http://www.boywiki.org./en/File:The_poet_Figani_with_a_young_cupbearer._Ottoman_miniature_painting_from_an_illustrated_volume_of_a_copy_of_the_Me%C5%9Fair%C3%BC%27%C5%9F-%C5%9Euara_by_A%C5%9F%C4%B1k_%C3%87elebi,_16th_century.png
1232 - http://www.boywiki.org./en/File:Thecast001_zpsaade0f53.jpg
1233 - http://www.boywiki.org./en/File:Warren_Cup_Scene_A_20thCentury_london_British_Museum.jpg
1234 - http://www.boywiki.org./en/File:Warren_Cup_modenature_20thCentury_london_British_Museum.jpg
1235 - http://www.boywiki.org./en/File:Woods_crew_(men)._Group_portrait._1910._(4586899393).jpg
1236 - http://www.boywiki.org./en/File:Zeus_Carries_Away_a_Sleeping_Ganymede.png
1237 - http://www.boywiki.org./en/load.php?debug=false&lang=en&modules=mediawiki.legacy.commonPrint%2Cshared%7Cmediawiki.sectionAnchor%7Cmediawiki.skinning.interface%7Cskins.vector.styles&only=styles&skin=vector
1238 - http://www.boywiki.org./en/load.php?debug=false&lang=en&modules=site&only=styles&skin=vector
1239 - http://www.boywiki.org./en/load.php?debug=false&lang=en&modules=startup&only=scripts&skin=vector
1240 - http://www.boywiki.org./en/opensearch_desc.php
1241 - http://www.boywiki.org./en/resources/assets/poweredby_mediawiki_88x31.png
1242 - http://www.boywiki.org./favicon.ico
1243 - http://www.boywiki.org./fr/Fichier:Boywiki-fr-banner-transparent.png
1244 - http://www.boywiki.org./fr/resources/assets/poweredby_mediawiki_88x31.png
1245 - http://www.boywiki.org./images/boywiki-banner.jpg
1246 Total links to files: 76
1247
1248+ Externals links found:
1249 - http://5newsonline.com/2013/02/13/ozark-guidance-employee-arrested-in-child-porn-case/
1250 - http://adc.arkansas.gov/inmate_info/search.php?dcnum=156004&RACE=W&RUN=109
1251 - http://artcontroversies.wordpress.com/2012/09/14/azovs-child-nudist-videos-labelled-pornography/
1252 - http://azdailysun.com/news/local/flagstaff-man-sentenced-to-eight-years-in-prison-for-ties/article_d12fb178-bbca-11e3-9d85-0019bb2963f4.html
1253 - http://bangordailynews.com/2012/10/12/news/portland/ex-school-janitor-arrested-on-child-pornography-charges/?ref=latest
1254 - http://blackpepperpublishing.com/nicholls.html
1255 - http://blog.al.com/live/2013/05/judge_imposes_prison_on_cathol.html
1256 - http://blog.al.com/spotnews/2012/10/longtime_birmingham_museum_of.html
1257 - http://blog.al.com/spotnews/2012/11/former_birmingham_museum_of_ar.html
1258 - http://blog.al.com/spotnews/2013/02/court_briefs_ex-museum_guard_t.html
1259 - http://books.google.com/books?id=lzAeAQAAIAAJ&pg=PA701&
1260 - http://boston.cbslocal.com/2012/10/09/mansfield-man-charged-with-child-pornography/
1261 - http://buckhead.patch.com/groups/police-and-fire/p/former-pace-academy-teacher-sentenced-for-receiving-child-porn
1262 - http://crimeblog.dallasnews.com/2012/10/grapevine-police-officer-charged-with-receiving-child-pornography.html/
1263 - http://crimeblog.dallasnews.com/2013/03/former-grapvine-police-officer-admits-to-child-pornography-offenses-in-federal-court.html/
1264 - http://crimeblog.dallasnews.com/2013/09/ex-grapevine-police-officer-given-15-years-in-prison-for-making-child-porn.html/
1265 - http://dailycaller.com/2013/12/12/investigators-describe-horrifically-graphic-child-porn-on-hard-drive-of-alexander-aide/
1266 - http://david-slane-criminal-defense.com/
1267 - http://douglasville.patch.com/groups/police-and-fire/p/former-villa-rica-teacher-sentenced-for-child-pornography-possession
1268 - http://dx.doi.org/10.1007%2Fs10508-008-9399-9
1269 - http://dx.doi.org/10.1093%2Ffmls%2FXXIV.2.126
1270 - http://en.academic.ru/dic.nsf/enwiki/190142
1271 - http://en.wikipedia.org/wiki/Dokimasia
1272 - http://en.wikipedia.org/wiki/Edward_Perry_Warren
1273 - http://en.wikipedia.org/wiki/Ephebophilia
1274 - http://en.wikipedia.org/wiki/Golden_Rule_(ethics)
1275 - http://en.wikipedia.org/wiki/Magnus_Hirschfeld
1276 - http://enchanted-island.com/Ethos/Ethos01R.pdf
1277 - http://fightback385.tumblr.com/
1278 - http://fox43.com/2014/11/13/york-county-man-convicted-of-receipt-and-distribution-of-child-pornography/
1279 - http://fox8.com/2012/11/14/police-coach-put-cameras-in-locker-room/
1280 - http://fr.boywiki.org/wiki/Azov_Films
1281 - http://hazard-herald.com/news/3523/pikveille-man-sentenced-15-years-for-receipt-of-child-pornography
1282 - http://ici.radio-canada.ca/regions/ontario/2015/03/16/009-proces-brian-way-pronographie-juvenile-toronto.shtml
1283 - http://jay-h.fpc.li/
1284 - http://khon2.com/2014/09/04/shark-expert-sentenced-to-two-months-for-downloading-child-porn/
1285 - http://kitchener.ctvnews.ca/computer-security-expert-sentenced-for-accessing-child-porn-1.2055150
1286 - http://koin.com/2014/05/27/ex-trooper-pleads-not-guilty-to-child-sex-abuse/
1287 - http://lmtribune.com/northwest/article_7f97b920-96f1-579a-b892-5a6a8945e873.html
1288 - http://london.ctvnews.ca/local-men-charged-in-project-spade-pornography-investigation-have-court-dates-within-a-month-1.1545479
1289 - http://mackinnonfuneralhomes.com/edward-f-cousens-lll
1290 - http://manchester.patch.com/articles/arrest-affidavit-south-windsor-man-bought-49-dvds-depicting-child-pornography
1291 - http://manchester.patch.com/articles/east-hartford-police-officer-faces-child-pornography-charge
1292 - http://media.mwcradio.com/mimesis/2014-03/17/Michael%20Switalski%20Criminal%20Complaint.pdf
1293 - http://msnbcmedia.msn.com/i/msnbc/sections/news/keller-affidavit.pdf
1294 - http://mynorthwest.com/11/2422400/Elementary-school-teacher-Boy-Scout-volunteer-pleads-guilty-to-child-porn
1295 - http://nashua.patch.com/groups/police-and-fire/p/man-73-charged-for-possession-of-child-porn
1296 - http://news.fredericksburg.com/justiceforum/2013/05/24/former-stafford-music-instructor-receives-14-year-prison-sentence-on-child-pornography-charges/
1297 - http://news.fredericksburg.com/newsdesk/2013/02/02/child-porn-convictions-worries-area-parents/
1298 - http://news.nationalpost.com/2015/02/23/christie-blatchford-alleged-child-porn-king-admits-he-had-illegal-images-but-denies-they-were-for-sale/
1299 - http://news.providencejournal.com/breaking-news/2012/09/state-probation-officer-assigned-to-sex-offenders-is-charged-with-buying-ch.html
1300 - http://openlibrary.org/books/OL7220178M/Alcmaeon_Hypermestra_Caeneus
1301 - http://ourlovefrontier.wordpress.com/page-ibld-index/
1302 - http://people.com/human-interest/boy-wakes-after-parents-sign-organ-donation-papers/
1303 - http://photos.cinematreasures.org/production/photos/240149/1523873462/large.jpg?1523873462
1304 - http://pittsburgh.cbslocal.com/2015/04/02/swissvale-man-faces-charges-for-kiddie-porn/
1305 - http://qctimes.com/news/local/clinton-man-charged-with-child-porn-possession/article_208bb5dd-7fd3-548d-8fc6-aeb439d0d129.html
1306 - http://redwoodcity-woodside.patch.com/groups/police-and-fire/p/former-county-probation-officer-on-trial-for-child-pornography-possession
1307 - http://select.nytimes.com/gst/abstract.html?res=F00816F9345811738DDDAF0A94DD405B808CF1D3&
1308 - http://select.nytimes.com/gst/abstract.html?res=F50C14F6385B147B93C5A81783D85F458485F9&
1309 - http://select.nytimes.com/gst/abstract.html?res=F50D15FA385E127A93C0A8178AD95F468785F9&
1310 - http://select.nytimes.com/gst/abstract.html?res=F70811FD3B55167A93C2AA1789D95F4C8285F9&
1311 - http://shfri.net/phpbb/viewforum.php?f=1&sid=63b904224bd2ce2b104ba359f8fcef93
1312 - http://theadvocate.com/home/4134347-125/man-indicted-on-porn-charges
1313 - http://theadvocate.com/news/8879323-123/former-child-psychiatrist-sentenced-to
1314 - http://thechronicleherald.ca/canada/1277693-lawyer-defends-movies-of-%E2%80%98naked-boys-doing-silly-things%E2%80%99-in-child-porn-case
1315 - http://thechronicleherald.ca/novascotia/1171266-ex-principal-guilty-in-child-porn-case?from=most_read&most_read=1171266
1316 - http://thehill.com/blogs/blog-briefing-room/news/196346-senate-staffer-arrested-on-child-pornography-charges-found-dead
1317 - http://triblive.com/news/adminpage/5990500-74/appel-judge-videos
1318 - http://triblive.com/news/allegheny/8100004-74/child-pornography-carrick
1319 - http://wgno.com/2017/12/16/former-teacher-north-shore-scout-leader-convicted-on-child-porn-molestation-charges/
1320 - http://www.11alive.com/assetpool/documents/121026030425_EnsleyCriminalComplaint.pdf
1321 - http://www.11alive.com/news/article/261917/3/Paideia-janitor-accused-of-videotaping-students-in-bathrooms
1322 - http://www.11alive.com/news/article/262419/40/Pace-Academy-teacher-due-in-court-on-child-porn-charges
1323 - http://www.11alive.com/news/article/300676/3/School-bus-driver-sentenced-for-producing-child-pornography
1324 - http://www.14news.com/story/22756650/former-boy-scout-leader-sentenced-in-child-pornography-case
1325 - http://www.680news.com/2015/05/28/judge-orders-psychiatric-assessment-for-man-convicted-in-child-porn-case/
1326 - http://www.680news.com/2016/06/08/prolific-child-pornographer-seeks-stay-of-conviction-claiming-abuse-by-jail-guards/
1327 - http://www.abc27.com/story/23467953/ex-guidance-counselor-pleads-guilty-in-child-porn-case
1328 - http://www.abc3340.com/story/22301127/museum-guard-sentenced-to-8-years-in-prison-for-child-pornography
1329 - http://www.allstatescremation.info/obit.aspx?obitID=4321&BLT=85d00064-e35c-4ec4-afc3-7070cc462e89
1330 - http://www.amazon.co.uk/Alexanders-Choice-Edmund-Marlowe/dp/1481222112/ref=sr_1_1?ie=UTF8&qid=1360749088&sr=8-1
1331 - http://www.amazon.com/Alexanders-Choice-Edmund-Marlowe/product-reviews/1481222112/ref=cm_cr_dp_see_all_btm?ie=UTF8&showViewpoints=1&sortBy=bySubmissionDateDescending
1332 - http://www.auroraadvocate.com/news%20local/2012/12/12/alleged-sex-with-minors-nets-charges
1333 - http://www.auroraadvocate.com/news%20local/2013/07/19/auroran-to-serve-life-in-prison-for-child-sex-incidents
1334 - http://www.bbc.com/news/technology-44039616
1335 - http://www.bbc.com/news/uk-england-cambridgeshire-29240758
1336 - http://www.bbc.com/news/uk-england-dorset-33163485
1337 - http://www.bbc.com/news/uk-wales-26953879
1338 - http://www.bethesdanow.com/2013/01/28/former-bethesda-preschool-teacher-pleads-guilty-to-child-pornography/
1339 - http://www.bgdailynews.com/news/convicted-sex-offender-enters-guilty-plea/article_a04d95bb-b4cf-50bd-b895-228269843c17.html
1340 - http://www.bgdailynews.com/news/local/man-pleads-guilty-to-child-porn-weapons-offenses/article_bd6875f6-f4da-56b8-b5c4-7ee7d4f8e319.html
1341 - http://www.bgdailynews.com/news/local/sex-offender-admits-guilt-in-porn-case-sentencing-is-feb/article_2e956cd8-8283-5385-9887-7fcddae45409.html
1342 - http://www.bgdailynews.com/news/local/suspect-arraigned-in-child-porn-case/article_0f1c8e81-8d2b-560e-98cc-61d5ec289b71.html
1343 - http://www.bgdailynews.com/news/logan-county-man-sentenced-for-porn-weapons-charges/article_71b99b71-01b6-56e4-907a-356a54e2e421.html
1344 - http://www.blackturtle.us/BLOG/UNLINKED/cheesecake.html
1345 - http://www.bostonglobe.com/metro/2014/03/12/former-children-hospital-doctor-sentenced-years-child-porn-charges/nz1g1BAgYRo5MLhPEpVf3H/story.html
1346 - http://www.bournemouthecho.co.uk/news/13337265._Sexual_predator__who_abused_children_jailed_for_12_and_a_half_years/
1347 - http://www.boychat.org/bcd/bcd9812.html
1348 - http://www.boychat.org/messages/1317045.htm
1349 - http://www.boychat.org/messages/1323615.htm
1350 - http://www.boychat.org/messages/1323733.htm
1351 - http://www.boychat.org/messages/1325821.htm
1352 - http://www.boychat.org/messages/1332762.htm
1353 - http://www.boychat.org/messages/1342269.htm
1354 - http://www.boychat.org/messages/1343387.htm
1355 - http://www.boychat.org/messages/1346811.htm
1356 - http://www.boychat.org/messages/1346831.htm
1357 - http://www.boychat.org/messages/1355216.htm
1358 - http://www.boychat.org/messages/1356213.htm
1359 - http://www.boychat.org/messages/1362646.htm
1360 - http://www.boychat.org/messages/1371249.htm
1361 - http://www.boychat.org/messages/1374347.htm
1362 - http://www.boychat.org/messages/1374772.htm
1363 - http://www.boychat.org/messages/1376494.htm
1364 - http://www.boychat.org/messages/1377504.htm
1365 - http://www.boychat.org/messages/1377699.htm
1366 - http://www.boychat.org/messages/1382017.htm
1367 - http://www.boychat.org/messages/1383941.htm
1368 - http://www.boychat.org/messages/1384336.htm
1369 - http://www.boychat.org/messages/1403171.htm
1370 - http://www.boychat.org/messages/1423392.htm
1371 - http://www.boychat.org/messages/1440529.htm
1372 - http://www.boychat.org/messages/1452573.htm
1373 - http://www.boywiki.org/archives/boywiki.org/
1374 - http://www.brightonourstory.co.uk/newsletters/rodin.html
1375 - http://www.bristolpost.co.uk/Bristol-Crown-Court-Paedophile-jailed-buying/story-24552082-detail/story.html
1376 - http://www.bristolpost.co.uk/Police-joined-forces-nail-child-porn-viewer-Yate/story-26065089-detail/story.html
1377 - http://www.broomfieldenterprise.com/broomfield-news/ci_24124571/broomfield-man-sentenced-7-years-prison-receiving-child
1378 - http://www.buckscountycouriertimes.com/news/crime/convicted-lower-makefield-child-porn-collector-faces-federal-charges/article_7d3a11f7-4417-5493-b707-9fe354d3d97c.html
1379 - http://www.buckscountycouriertimes.com/news/crime/lower-makefield-sexually-violent-predator-sentenced-in-child-porn-case/article_afa16032-06df-5552-b3ec-43934c262131.html
1380 - http://www.ca5.uscourts.gov/opinions/unpub/14/14-30385.0.pdf
1381 - http://www.calgarysun.com/2016/02/05/calgary-man-gets-seven-years-for-child-porn
1382 - http://www.canlii.org/en/on/onsc/doc/2014/2014onsc6472/2014onsc6472.html
1383 - http://www.cantonrep.com/news/x1922379911/Studer-gets-15-prison-term
1384 - http://www.cbsatlanta.com/story/20339463/cobb-county-bus-driver-charged-with-production-of-child-porn
1385 - http://www.cbsatlanta.com/story/20351360/fourth-metro-atlanta-man-arrested-for-child-pornography
1386 - http://www.citynews.ca/2016/08/08/sentence-for-convicted-child-pornographer-reduced-due-to-jail-abuse/
1387 - http://www.columbian.com/news/2014/dec/26/teacher-scouts-leader-accused-having-child-porn/
1388 - http://www.columbian.com/news/2016/aug/23/former-substitute-teacher-scout-leader-sentenced-in-child-porn-case/
1389 - http://www.courier-journal.com/story/news/local/2016/05/23/priest-abuse-victim-sentenced-child-porn/84792584/
1390 - http://www.couriermail.com.au/news/queensland/police-arrest-professor-on-child-pornography-charges-as-part-of-worldwide-sting-operation/story-fnihsrf2-1226761774163
1391 - http://www.courierpress.com/news/2012/nov/27/former-local-boy-scouts-executive-charged-child-po/
1392 - http://www.courierpress.com/news/2013/mar/12/no-headline---boyscouts/
1393 - http://www.dailyastorian.com/Local_News/20150812/former-astoria-osp-trooper-sentenced-for-child-porn-charges
1394 - http://www.dailyastorian.com/free/former-astoria-based-osp-trooper-arrested-on-child-pornography-charges/article_c0b97e84-cfff-11e3-a5c0-0019bb2963f4.html
1395 - http://www.dailymail.co.uk/news/article-2632984/Deputy-headmaster-jailed-five-years-installing-secret-cameras-toilets-showers-sports-day-film-30-pupils.html
1396 - http://www.dailymail.co.uk/news/article-2774879/Child-porn-inquiry-teacher-dead-home-hundreds-secretly-filmed-images-boys-changing-rooms.html
1397 - http://www.dailymail.co.uk/news/article-2780174/How-detectives-let-child-porn-suspects-hook-They-sat-list-2-300-paedophiles-14-months-did-nothing.html
1398 - http://www.dailymail.co.uk/news/article-2784079/BA-pilot-guilty-grooming-Indian-boy-sex-showering-gifts-stopover-possessing-child-porn-videos.html
1399 - http://www.dailymail.co.uk/news/article-2855803/Paedophile-children-s-doctor-Myles-Bradbury-jailed-22-years.html
1400 - http://www.dailymail.co.uk/news/article-2933992/British-police-accused-catastrophic-blunders-file-2-000-child-abuse-suspects-handed-Canadian-investigators-ignored-TWO-YEARS.html
1401 - http://www.dailymail.co.uk/news/article-2994890/Scout-leader-caught-boys-underwear-bed-collection-child-porn-walks-free-court-judge-says-community-order-best-way-protect-public.html
1402 - http://www.dailyrecord.co.uk/incoming/former-social-worker-snared-child-6633893
1403 - http://www.democratandchronicle.com/article/20121114/NEWS01/311140045
1404 - http://www.denverpost.com/breakingnews/ci_24426943/federal-grand-jury-indictes-colorado-springs-man-child
1405 - http://www.denverpost.com/dnc/ci_22168668/broomfield-man-registered-sex-offender-charged-having-child
1406 - http://www.denverpost.com/news/ci_24695454/man-who-built-torture-chamber-home-gets-prison
1407 - http://www.denverpost.com/news/ci_25981257/denver-man-arrested-federal-child-pornography-charges
1408 - http://www.derrynow.com/news/child-porn-images-found-during-search-of-derry-house/27936
1409 - http://www.dover-express.co.uk/Police-slammed-paedo-vicar-threw-Dover-cliffs/story-25956711-detail/story.html
1410 - http://www.eagletribune.com/latestnews/x964640161/Movie-house-probe-led-to-2-Andover-child-porn-arrests
1411 - http://www.eagletribune.com/local/x1442597400/Man-sentenced-in-child-porn-case
1412 - http://www.eagletribune.com/local/x2040133270/Beverly-police-Man-sold-child-porn-on-Amazon-com
1413 - http://www.edmontonjournal.com/news/Retired+University+Alberta+math+professor+charged+international+child+exploitation/9165942/story.html
1414 - http://www.eickenhorstfuneral.com/obituaries/John-Mason-9/
1415 - http://www.enchanted-island.com
1416 - http://www.eveshamjournal.co.uk/news/11552010.80_year_old_s_child_porn_shame__Worcester_pensioner_had_naked_snap_of_lad_aged_11/
1417 - http://www.flayrah.com/7280/rc-fox-commits-suicide-regretted-taking-plea-bargain
1418 - http://www.fltimes.com/news/article_4d9987b4-db7b-11e3-a5d1-001a4bcf887a.html
1419 - http://www.fosters.com/apps/pbcs.dll/article?AID=/20130815/GJNEWS_01/308159971
1420 - http://www.freep.com/article/20130702/NEWS03/307020080/Birmingham-child-porn-protective-services
1421 - http://www.gloucestercitizen.co.uk/Gloucester-carer-jailed-93-000-indecent-images/story-21265342-detail/story.html
1422 - http://www.gloucestercitizen.co.uk/Severn-Vale-teacher-John-Fleck-jailed-obsession/story-23784085-detail/story.html
1423 - http://www.godlikeproductions.com/forum1/message2121464/pg1
1424 - http://www.greek-love.com/index.php/2-uncategorised/96-scotty-bowers-full-service
1425 - http://www.hawaiinewsnow.com/story/24487638/exclusive-shark-expert-faces-child-porn-charge
1426 - http://www.homoerotimuseum.net/eur/eur07/202/007.html
1427 - http://www.hsconnect.com/page/content.detail/id/580978/Suspect-appears-on-porn-charges.html
1428 - http://www.ihlia.nl/documents/pdflib/Vriendschap/1960/1960-04.pdf
1429 - http://www.istockanalyst.com/business/news/6482950/probation-chief-accused-of-having-child-porn
1430 - http://www.ithacajournal.com/story/news/public-safety/2015/09/24/tompkins-substitute-teacher-accused-having-child-pornography/72729200/
1431 - http://www.itv.com/news/central/2015-05-13/vicar-sentenced-for-posession-of-child-porn-images/
1432 - http://www.jungsforum.net
1433 - http://www.justice.gov/usao-wdwa/pr/kirkland-man-sentenced-ten-years-prison-large-collection-images-child-rape-and
1434 - http://www.justice.gov/usao/cas/press/2013/cas13-1206-MitchellSent.pdf
1435 - http://www.justice.gov/usao/co/news/2013/jun/6-5-13.html
1436 - http://www.justice.gov/usao/co/news/2014/aug/8-20-14.html
1437 - http://www.justice.gov/usao/co/press_releases/2012/December2012/12_11_12.html
1438 - http://www.justice.gov/usao/flm/press/2014/Jul/20140729_Beavers.html
1439 - http://www.justice.gov/usao/gan/press/2012/07-30-12.html
1440 - http://www.justice.gov/usao/id/news/2014/aug/carlson08192014.html
1441 - http://www.justice.gov/usao/nj/Press/files/Roman,%20Jorge%20Sentencing%20News%20Release.html
1442 - http://www.justice.gov/usao/nj/Press/files/pdffiles/2012/Sysock,%20Nicholas%20Complaint.pdf
1443 - http://www.justice.gov/usao/nyw/press/press_releases/Higgins.pdf
1444 - http://www.justice.gov/usao/pam/news/2014/Corbin_11_13_14.html
1445 - http://www.justice.gov/usao/paw/news/2014/2014_april/2014_04_22_01.html
1446 - http://www.justice.gov/usao/paw/news/2014/2014_july/2014_07_08_03.html
1447 - http://www.justice.gov/usao/paw/news/2014/2014_october/2014_10_31_01.html
1448 - http://www.justice.gov/usao/ri/news/2012/sept2012/silva.html
1449 - http://www.justice.gov/usao/ri/news/2013/feb2013/Stephen%20Hickey%20Affidavit%20and%20Complaint.pdf
1450 - http://www.justice.gov/usao/waw/press/2012/November/engle.html
1451 - http://www.justice.gov/usao/waw/press/2013/Jan/mobley.html
1452 - http://www.kameramuseum.de
1453 - http://www.kansascity.com/news/local/crime/article97626847.html
1454 - http://www.kentreporter.com/news/177551401.html
1455 - http://www.khou.com/news/local/Montgomery-County-youth-counselor-busted-for-allegedly-possessing-child-porn-175876621.html
1456 - http://www.kilburntimes.co.uk/news/crime-court/queen_s_park_paedophile_downloaded_indecent_images_of_children_and_animals_1_4556365
1457 - http://www.kirotv.com/news/news/uw-employee-charged-child-porn-and-still-works-cam/nYcMP/
1458 - http://www.kjonline.com/news/Bath-man-pleads-guilty-to-child-porn-charges-.html
1459 - http://www.kwtx.com/ourtown/home/headlines/Bell-County--Man-Pleads-Guilty-In-Child-Pornography-Case-187354861.html
1460 - http://www.laits.utexas.edu/ancienthomosexuality/imageindex.php?topic_id=103
1461 - http://www.laits.utexas.edu/ancienthomosexuality/imageindex.php?topic_id=104&pc=1
1462 - http://www.lapresse.ca/le-nouvelliste/justice-et-faits-divers/201409/19/01-4801844-pierre-laplante-aura-sa-sentence-le-24-septembre.php
1463 - http://www.lawyershop.ca/regions/ontario/toronto/toronto-criminal-lawyers-bytensky.php
1464 - http://www.ledger-enquirer.com/2015/04/22/3682544_former-body-shop-owner-gets-15.html?rh=1
1465 - http://www.leecountycourier.net/articles/2012/11/10/news/doc509ecff189bea310431158.txt
1466 - http://www.lewes.gov.uk/business/15716.asp:
1467 - http://www.lfpress.com/2015/09/03/youtube-stuntman-david-rock-found-guilty-of-possessing-child-pornography
1468 - http://www.lfpress.com/2016/01/20/lucan-area-youtube-celebrity-david-rock-jailed-for-possession-of-child-pornography
1469 - http://www.lohud.com/story/news/crime/2015/02/02/feds-say-former-mamaroneck-teacher-kiddie-porn/22767067/
1470 - http://www.lohud.com/story/news/crime/2017/03/01/ex-mamaroneck-teacher-porn/98609724/
1471 - http://www.lrb.co.uk/blog/2013/07/15/nick-richardson/eton-life/
1472 - http://www.mancunianmatters.co.uk/content/200773946-bolton-youth-worker-found-thousands-images-child-porn-avoids-jail-time
1473 - http://www.mdjonline.com/view/full_story/21121889/article-Bus-driver-arrested-on-charges-connected-to-child-pornography
1474 - http://www.mercurynews.com/breaking-news/ci_22648295/former-san-mateo-county-probation-chief-pleads-not
1475 - http://www.mercurynews.com/san-mateo-county-times/ci_23192913/stuart-forest-ex-probation-chief-san-mateo-county
1476 - http://www.mercurynews.com/san-mateo-county-times/ci_23671975/peninsula-probation-official-collected-child-porn-prosecutor-says
1477 - http://www.mercurynews.com/san-mateo-county-times/ci_24140859/ex-san-mateo-county-official-gets-jail-child
1478 - http://www.mfa.org/
1479 - http://www.milfordbeacon.com/article/20110311/NEWS/303119968
1480 - http://www.mirror.co.uk/news/uk-news/arrogant-scout-master-sexually-abused-5191234
1481 - http://www.mirror.co.uk/news/uk-news/elliot-easterby-pervert-scout-leader-5209570
1482 - http://www.mirror.co.uk/news/uk-news/junior-football-coach-jailed-after-4309704
1483 - http://www.mirror.co.uk/news/uk-news/national-crime-agency-police-finally-2859681
1484 - http://www.mlive.com/news/grand-rapids/index.ssf/2016/02/ex-teacher_trainer_secretly_re.html
1485 - http://www.mlive.com/news/grand-rapids/index.ssf/2016/06/ex-teacher_trainer_who_secretl.html
1486 - http://www.mycentraljersey.com/article/20121024/NJNEWS14/310240028/Carteret-High-School-vice-principal-faces-child-porn-charge
1487 - http://www.myfoxwausau.com/story/29321296/2015/06/15/religion-teacher-to-be-sentenced-in-child-porn-case
1488 - http://www.nbc4i.com/story/22657054/man-sentenced-to-15-years-for-child-pornography-charge
1489 - http://www.nbcconnecticut.com/news/local/Former-East-Hartford-Officer-Sentenced-to-Prison-in-Child-Pornography-Case-269257041.html
1490 - http://www.news9.com/story/19788768/concerns-raised-after-tecumseh-man-arrested-with-child-porn
1491 - http://www.newswest9.com/story/27968743/swat-raids-registered-sex-offenders-home
1492 - http://www.nj.com/middlesex/index.ssf/2012/10/carteret_high_school_vice_prin.html
1493 - http://www.nj.com/middlesex/index.ssf/2013/08/former_carteret_high_school_vice_principal_sentenced_to_prison_for_possession_child_pornography.html
1494 - http://www.northumberlandnews.com/news-story/4901248-guilty-plea-from-computer-expert-on-child-porn-charge/
1495 - http://www.nottinghampost.com/Clifton-fish-chip-shop-worker-convicted/story-26017260-detail/story.html
1496 - http://www.nottinghampost.com/Nottingham-men-charged-child-porn-offences/story-26002749-detail/story.html
1497 - http://www.nugget.ca/2012/06/05/junior-sports-sponsor-jailed-for-possessing-child-pornography
1498 - http://www.nuzzapp.com/2012/12/19/deacon-pleads-guilty-in-child-porn-possession/
1499 - http://www.nvva.nl/rijzendezon/catalogs/c00137.htm
1500 - http://www.nytimes.com/1999/04/18/arts/art-architecture-open-house-for-the-ancients.html?
1501 - http://www.ottawacitizen.com/news/Public+servant+partner+jailed+child+porn+offences/9654620/story.html
1502 - http://www.patriotledger.com/topstories/x383193846/Holbrook-man-accused-of-buying-child-porn-DVDs
1503 - http://www.peacearchnews.com/news/261018571.html
1504 - http://www.pennlive.com/midstate/index.ssf/2014/07/midstate_teacher_gets_9_years.html
1505 - http://www.philly.com/philly/news/breaking/Princeton_soccer_coach_charged_with_child_pornography.html
1506 - http://www.philly.com/philly/news/pennsylvania/Ex-principal_sentenced_for_possessing_child_porn.html
1507 - http://www.phillymag.com/news/2015/04/10/thomas-silber-school-bus-driver-child-porn/
1508 - http://www.politico.com/story/2013/12/ryan-loskarn-custody-ruling-101638.html
1509 - http://www.post-gazette.com/local/east/2015/04/02/Swissvale-man-charged-with-possession-of-child-porn/stories/201504020188
1510 - http://www.post-gazette.com/stories/local/neighborhoods-north/prosecutors-seek-information-on-slippery-rock-porn-suspect-685663/
1511 - http://www.providencejournal.com/breaking-news/content/20140211-ri-probation-officer-convicted-on-federal-child-pornography-charges.ece
1512 - http://www.providencejournal.com/news/courts/20140627-ex-probation-officer-to-serve-6-years-for-possessing-child-porn.ece
1513 - http://www.rubyshiller.com/
1514 - http://www.salemnews.com/local/x2117345101/Man-gets-5-years-for-selling-child-porn-online
1515 - http://www.salemnews.com/local/x651172733/Beverly-man-admits-to-child-porn-charges
1516 - http://www.salisburyjournal.co.uk/news/14706958.Businessman_convicted_of_sexually_assaulting_young_child__taking_indecent_photos_and_downloading_child_porn/
1517 - http://www.seacoastonline.com/articles/20130204-NEWS-130209915
1518 - http://www.seacoastonline.com/articles/20130212-NEWS-130219940
1519 - http://www.seacoastonline.com/articles/20130816-PUBLICRECORDS04-308160387
1520 - http://www.seattlepi.com/local/article/Charge-Substitute-teacher-caught-with-boy-5985934.php
1521 - http://www.seattlepi.com/local/article/Prosecutors-Youth-baseball-coach-caught-with-450-4913911.php
1522 - http://www.shieldsgazette.com/news/crime/pervert-oap-faces-jail-over-animal-porn-videos-1-6837079
1523 - http://www.signalscv.com/section/36/article/102004/
1524 - http://www.signalscv.com/section/36/article/94490/
1525 - http://www.sistilawoffices.com/
1526 - http://www.smdailyjournal.com/articles/bnews/2013-07-26/former-probation-chief-guilty-of-child-porn/1772449.html
1527 - http://www.smdailyjournal.com/articles/lnews/2013-07-17/former-probation-head-begins-child-pornography-trial/1771874.html
1528 - http://www.smdailyjournal.com/articles/lnews/2013-10-26/no-restitution-for-convicted-county-official/1776425112287.html
1529 - http://www.spdefence.ca/st-johns-criminal-lawyers-team/
1530 - http://www.spokesman.com/stories/2013/may/24/child-porn-investigation-prompts-raid-gonzaga/
1531 - http://www.sunjournal.com/news/1368868
1532 - http://www.sunnewsnetwork.ca/sunnews/canada/archives/2014/06/20140618-202728.html
1533 - http://www.thecitizen.us/article/ben-avon-man-indicted-porn
1534 - http://www.thecourier.co.uk/news/local/angus-the-mearns/crown-considering-appeal-after-former-teacher-avoids-jail-for-child-and-bestiality-images-1.792270
1535 - http://www.thedenverchannel.com/news/local-news/denver-man-arrested-in-federal-child-porn-case
1536 - http://www.themonitor.com/news/local/weslaco-man-pleads-guilty-to-child-porn-charges/article_bde0def0-2cd7-11e6-a1f8-077db465fe7e.html
1537 - http://www.themorningsun.com/article/MS/20160407/NEWS/160409761
1538 - http://www.themorningsun.com/article/MS/20160706/NEWS/160709852
1539 - http://www.theolympian.com/2015/02/02/3557674_tumwater-man-77-pleads-guilty.html
1540 - http://www.theonion.com/articles/feds-bust-massive-child-pornography-corporation,35897/
1541 - http://www.therecord.com/news-story/4219344-local-entrepreneur-fights-child-porn-charges/
1542 - http://www.therepublic.com/view/story/1b08176e2124487ca28e73ae1503fe3c/GA--Child-Porn-Sentencing
1543 - http://www.thestar.com/news/crime/2014/11/18/creative_child_porn_ruling_uses_charter_argument_to_skirt_mandatory_sentence.html
1544 - http://www.thestar.com/news/crime/2015/05/12/canadas-biggest-child-porn-case-ends-with-conviction-on-15-charges.html
1545 - http://www.thestar.com/news/world/2013/11/14/toronto_man_charged_in_international_childporn_network_bust.html
1546 - http://www.thestarphoenix.com/news/Huge+child+porn+ring+busted+Saskatoon+arrested/9167852/story.html
1547 - http://www.thesunchronicle.com/devices/breaking_news/former-tri-county-teacher-sentenced-to-halfway-house-for-possessing/article_930dc81c-5d2e-11e3-a882-0019bb2963f4.html
1548 - http://www.thetelegram.com/News/Local/2013-11-15/article-3483089/Two-Newfoundlanders-charged-in-international-child-porn-bust/1
1549 - http://www.thetelegram.com/News/Local/2014-03-28/article-3667705/Child-porn-charges-dropped-against-Clarke%26rsquo%3Bs-Beach-man/1
1550 - http://www.torontonews24.com/toronto-crime-news-releases/5578-toronto-police-service-announces-results-of-international-child-sexual-abuse-investigation-project-spade-341-people-arrested-386-children-rescued
1551 - http://www.torontopolice.on.ca/newsreleases/32803
1552 - http://www.torontosun.com/2014/06/19/crown-wants-7-year-sentence-for-child-pornographer
1553 - http://www.torontosun.com/2014/09/24/high-school-worker-sentenced-for-peeping-on-kids
1554 - http://www.torontosun.com/2014/11/06/aurora-man-spared-prison-on-child-porn-editing-rap
1555 - http://www.torontosun.com/2015/09/24/mom-charged-in-sons-child-porn-operation
1556 - http://www.trentonian.com/article/20130516/NEWS01/130519711/youth-soccer-coach-arrested-for-child-porn
1557 - http://www.trentonian.com/general-news/20140605/bucks-county-man-indicted-on-child-porn-charges-related-to-videos-from-international-pedophile-ring
1558 - http://www.tsn.ca/canada-upsets-japan-in-opener-of-llws-1.551058
1559 - http://www.twcnews.com/nys/binghamton/crime/2016/07/22/former-teacher-convicted-on-child-pornography-charges.html
1560 - http://www.twcnews.com/nys/binghamton/news/2016/07/20/opening-statements-robert-snyder-trial-former-teacher-accused-child-pornography.html
1561 - http://www.unionleader.com/article/20130205/NEWS03/130209591
1562 - http://www.warringtonguardian.co.uk/news/11757745.Great_Sankey_man__liked_incest__not_child_abuse_/
1563 - http://www.waterloochronicle.ca/news-story/6733329-man-convicted-in-child-porn-case-alleges-abuse/
1564 - http://www.wausaudailyherald.com/article/20140317/WDH0101/303170166/Update-Bond-set-Wausau-teacher-charged-child-porn-case
1565 - http://www.wausaudailyherald.com/story/news/crime/2015/03/23/former-newman-teacher-convicted-child-porn-charges/25217643/
1566 - http://www.wbir.com/news/article/280739/2/Ex-UT-exec-held-on-child-porn-charges-back-in-court
1567 - http://www.wbir.com/story/news/local/downtown-ut/2013/10/28/ut-fundraiser-charges/3293109/
1568 - http://www.wbir.com/story/news/local/downtown-ut/2014/05/16/sentencing-for-former-ut-fundraiser-set-for-today/9174305/
1569 - http://www.webcitation.org/6BuQjBMfX
1570 - http://www.webcitation.org/6D5W6hOzH
1571 - http://www.webcitation.org/6GfV8IWhJ
1572 - http://www.webcitation.org/6GfVVvNFa
1573 - http://www.webcitation.org/6GfVkN5iF
1574 - http://www.westerndailypress.co.uk/Bristol-school-worker-court-Canadian-child-porn/story-23049830-detail/story.html
1575 - http://www.westerngazette.co.uk/Ex-teacher-bought-child-porn-Azov-Films-avoids/story-23849938-detail/story.html
1576 - http://www.wigantoday.net/news/local/cabbie-had-sickening-child-porn-collection-1-7638936
1577 - http://www.winnipegsun.com/2016/09/12/totally-rehabilitated-man-caught-in-child-porn-ring-bust-to-serve-only-on-weekends
1578 - http://www.wkyc.com/news/article/269487/3/Jackson-Twp-Police-Coach-put-cameras-in-showers-for-8-years
1579 - http://www.worcesternews.co.uk/news/11514347.Pensioner_who_had_collection_of_more_than_100_000_indecent_pictures_of_children_jailed/
1580 - http://www.wowt.com/news/headlines/Retired-Iowa-State-Professor-Sentenced-For-Possession-Of-Child-Pornography-230089701.html
1581 - http://www.wpri.com/dpp/news/local_news/west_bay/franklin-high-school-teacher-charged-with-child-porn
1582 - http://www.wpxi.com/news/news/local/swissvale-man-accused-ordering-child-porn/nkk3B/
1583 - http://www.wric.com/story/19989255/former-school-employee-arrested-on-child-porn-charges
1584 - http://www.wsaw.com/home/headlines/Newman-Catholic-Teacher-Expected-to-reach-Deal-in-Child-Porn-Case-291746441.html
1585 - http://www.yorkregion.com/news-story/4237204-2-york-residents-nabbed-in-major-child-pornography-bust/
1586 - http://www.yourhoustonnews.com/courier/news/cpd-arrests-youth-counselor-for-child-porn-possession/article_887d82be-b158-557f-b8fd-c618442371ad.html
1587 - http://www.yourhoustonnews.com/courier/news/grand-jury-re-indicts-man-on-counts-of-child-pornography/article_b5263e67-e7c2-5a09-9757-336ec4c1fcca.html?mode=story
1588 - http://www4.egov.nh.gov/nsor/Display.aspx?offenderID=5644
1589 - https://antipaedo.wordpress.com/2006/06/23/help-protest-ibld-june-24-2006/
1590 - https://antipaedo.wordpress.com/2008/06/21/in-support-of-childrens-innocence/
1591 - https://archive.org/details/EthosBoyloverMagazineIssue012016
1592 - https://beta.theglobeandmail.com/news/national/man-poisons-himself-after-being-sentenced-in-child-pornography-case/article36374086/?ref=http://www.theglobeandmail.com
1593 - https://boylandonline.com/
1594 - https://boylandonline.com/guidelines/
1595 - https://boylandonline.com/privacy/
1596 - https://boylandonline.com/status/
1597 - https://boywrite.ivan.net/
1598 - https://casetext.com/case/united-states-v-notman-1
1599 - https://consentinghumans.wordpress.com/
1600 - https://creativecommons.org/licenses/by/3.0/deed.en
1601 - https://de.boywiki.org/wiki/pagename
1602 - https://docs.google.com/file/d/0B9hyw3-Boc65MU1ZSWNwMmlva00/edit?pli=1
1603 - https://docs.google.com/file/d/0B9hyw3-Boc65N0xQcXQzRk5lM2M/edit
1604 - https://docs.google.com/file/d/0B9hyw3-Boc65OTcya2Zyd1hZMGM/edit
1605 - https://docs.google.com/file/d/0B9hyw3-Boc65QzZiQlloaWNTUk0/edit
1606 - https://docs.google.com/file/d/0B9hyw3-Boc65RzFESUM2eVRQWUE/edit
1607 - https://docs.google.com/file/d/0B9hyw3-Boc65VTZJZ2hNcjJHRTA/edit
1608 - https://docs.google.com/file/d/0B9hyw3-Boc65VmhWWWQ3VWNCWnc/edit
1609 - https://docs.google.com/file/d/0B9hyw3-Boc65YVN0V05JMVhEdFk/edit
1610 - https://docs.google.com/file/d/0B9hyw3-Boc65YlJYNk5raWpXNlk/edit
1611 - https://docs.google.com/file/d/0B9hyw3-Boc65Z0xpRUNJQXAwekk/edit
1612 - https://docs.google.com/file/d/0B9hyw3-Boc65aG41THF5STMxMkU/edit
1613 - https://docs.google.com/file/d/0B9hyw3-Boc65cTFTMlpoTVQ2a2M/edit
1614 - https://docs.google.com/file/d/0B9hyw3-Boc65d2hSODZzOGx2djA/edit
1615 - https://docs.google.com/file/d/0B9hyw3-Boc65dVNPOFZTaGlhSEE/edit
1616 - https://docs.google.com/file/d/0B9hyw3-Boc65dVhGY01hOEs2elE/edit
1617 - https://docs.google.com/file/d/0B9hyw3-Boc65djRueHE0NGtfdDA/edit
1618 - https://docs.google.com/open?id=0B9hyw3-Boc65MUxpRVRCQWRodmM
1619 - https://docs.google.com/open?id=0B9hyw3-Boc65QlMyQkoyZU8xN1k
1620 - https://docs.google.com/open?id=0B9hyw3-Boc65b1QwWEkwWDAyYjA
1621 - https://drive.google.com/file/d/0B50_ZAI56ei1UnlYTGx2UmRma3M/view
1622 - https://drive.google.com/file/d/0B50_ZAI56ei1dkJ0bFB0Tkp5Wms/view
1623 - https://drive.google.com/file/d/0B9hyw3-Boc65MUVfenZxRW9ONzA/view
1624 - https://drive.google.com/file/d/0B9hyw3-Boc65Q3B4a0h4RzM3bUU/view
1625 - https://drive.google.com/file/d/0B9hyw3-Boc65SjZwdWFKQUp4d2c/edit?usp=sharing
1626 - https://drive.google.com/file/d/0B9hyw3-Boc65U0VQWVNpR2NMcGc/view?usp=sharing
1627 - https://drive.google.com/file/d/0B9hyw3-Boc65UWJPQjB1R3lkOWs/view
1628 - https://drive.google.com/file/d/0B9hyw3-Boc65WUdBS0pkbmNFTmc/edit
1629 - https://drive.google.com/file/d/0B9hyw3-Boc65YVdWMEx2SHhwQnc/view
1630 - https://drive.google.com/file/d/0B9hyw3-Boc65aWlnd1NOenByV2s/view
1631 - https://drive.google.com/file/d/0B9hyw3-Boc65aWlqTnlWTDVWdUU/view
1632 - https://drive.google.com/file/d/0B9hyw3-Boc65am5aRm1oWFVwTHc/view
1633 - https://drive.google.com/file/d/0B9hyw3-Boc65c09Uc0pBUDdTeFU/view
1634 - https://drive.google.com/file/d/0B9hyw3-Boc65eUlWSXo4NzdGZk0/view
1635 - https://ecf.ksd.uscourts.gov/cgi-bin/show_public_doc?2013cr40028-44
1636 - https://en.boywiki.org/wiki/pagename
1637 - https://en.wikipedia.org/wiki/MediaWiki_talk:Spam-blacklist/archives/October_2011
1638 - https://en.wikipedia.org/wiki/News_style
1639 - https://en.wikipedia.org/wiki/Talk:Pedophile_movement/Archive_14
1640 - https://en.wiktionary.org/wiki/Help:Writing_definitions
1641 - https://ethosonline.net/
1642 - https://ethosonline.net/issues/ethos/jpg/10/ethos-issue-10-p01.jpg
1643 - https://ethosonline.net/issues/ethos/jpg/11/ethos-issue-11-p01.jpg
1644 - https://floridaactioncommittee.org/wp-content/uploads/2018/04/SOR-Info-Center-Fact-Sheet-April-2018.pdf
1645 - https://fr.boywiki.org
1646 - https://fr.boywiki.org/wiki/pagename
1647 - https://freespirits.org/
1648 - https://fsco.freespirits.info/fundraiser/
1649 - https://greek-love.com/near-east-north-africa/arab-islamic-loved-boy-age-pederasty
1650 - https://greek-love.com/near-east-north-africa/egypt/egypt-volney-pederasty
1651 - https://greek-love.com/near-east-north-africa/henry-blount-pederasty-voyage-levant
1652 - https://greek-love.com/near-east-north-africa/moslem-accounts-of-france-1803-46
1653 - https://greek-love.com/near-east-north-africa/religion-manners-mahometans-pederasty
1654 - https://greek-love.com/oceania/kaluli-new-guinea-pederasty
1655 - https://i.ebayimg.com/images/g/~osAAOSweuNcqyOY/s-l1600.jpg
1656 - https://i.pinimg.com/736x/31/c1/dc/31c1dcd59bbc73324960e27ecde00d73.jpg
1657 - https://i.vimeocdn.com/portrait/4149915_300x300.jpg
1658 - https://legarcon.net/
1659 - https://lifeline.ivan.net/
1660 - https://media.boywiki.org
1661 - https://metro.co.uk/2018/07/22/boy-14-banned-from-performing-his-drag-act-at-school-talent-show-7745259/
1662 - https://s3.amazonaws.com/s3.documentcloud.org/documents/1534584/us-v-lyle-kamlet-complaint-1.pdf
1663 - https://secure.boychat.org
1664 - https://takearisknz.wordpress.com/
1665 - https://theconversation.com/the-causes-of-paedophilia-and-child-sexual-abuse-are-more-complex-than-the-public-believes-94915
1666 - https://tomocarroll.wordpress.com/
1667 - https://ujsportal.pacourts.us/DocketSheets/CPReport.ashx?docketNumber=CP-02-CR-0006287-2015
1668 - https://upload.wikimedia.org/wikipedia/commons/5/58/Dt_Kameramuseum_Plech_Beaulieu_R_16.jpg
1669 - https://upload.wikimedia.org/wikipedia/commons/thumb/1/11/Arriflex_-_35mm_Cine_Camera_with_Accessories_-_Kolkata_2012-09-27_1141.JPG/289px-Arriflex_-_35mm_Cine_Camera_with_Accessories_-_Kolkata_2012-09-27_1141.JPG
1670 - https://vimeo.com/user2068991
1671 - https://web.archive.org/web/*/https://www.boywiki.org
1672 - https://web.archive.org/web/20030401162150/http://www.fpc.net/sites/ibld/
1673 - https://web.archive.org/web/20050410074353/http://www.ibld.net/
1674 - https://web.archive.org/web/20070103213711/http://boylandonline.com:80/
1675 - https://web.archive.org/web/20070326122730/http://etenne.8m.net/
1676 - https://web.archive.org/web/20080414170841/http://ibld.fpc.li/
1677 - https://web.archive.org/web/20080903130201/http://www.boylandonline.com:80/
1678 - https://web.archive.org/web/20080914030926/http://boylandonline.com:80/whathappend.html
1679 - https://web.archive.org/web/20130320122219/http://www.cjat.org/ipb/index.php?showtopic=1112
1680 - https://web.archive.org/web/20160110004707/http://ibld.nfshost.com/
1681 - https://www.boychat.org/
1682 - https://www.boychat.org/messages/853891.htm
1683 - https://www.boychat.org/messages/951399.htm
1684 - https://www.boylinks.net/
1685 - https://www.boywiki.org/de/24._M%C3%A4rz
1686 - https://www.boywiki.org/de/Hauptseite
1687 - https://www.boywiki.org/de/IBLD
1688 - https://www.boywiki.org/de/Jungs.wtf
1689 - https://www.boywiki.org/de/api.php?action=rsd
1690 - https://www.boywiki.org/de/index.php?title=Hauptseite&oldid=3752
1691 - https://www.boywiki.org/de/pagename
1692 - https://www.boywiki.org/en/(BLSB)_-_Pederasty_in_Early_Ottoman_Arabic_Literature
1693 - https://www.boywiki.org/en/(BLSB)_-_The_%22Bau_a%22_Ceremonial_Hunting_Lodge_of_the_Kaluli_of_Papua_New_Guinea
1694 - https://www.boywiki.org/en/Boyland
1695 - https://www.boywiki.org/en/Category:Dictionary
1696 - https://www.boywiki.org/en/Ephebophilia
1697 - https://www.boywiki.org/en/International_Boylove_Day
1698 - https://www.boywiki.org/en/Main_Page
1699 - https://www.boywiki.org/en/Review_of_%27Full_Service%27
1700 - https://www.boywiki.org/en/Review_of_%27Reasons_of_the_Heart%27
1701 - https://www.boywiki.org/en/Special:AllPages
1702 - https://www.boywiki.org/en/Special:NewPages
1703 - https://www.boywiki.org/en/Special:RecentChanges
1704 - https://www.boywiki.org/en/Special:RequestAccount
1705 - https://www.boywiki.org/en/Template_talk:Navbox_Azov_Films_and_related_articles
1706 - https://www.boywiki.org/en/Template_talk:Navbox_Edmund_Marlowe
1707 - https://www.boywiki.org/en/Template_talk:Navbox_Free_Spirits
1708 - https://www.boywiki.org/en/Template_talk:Navbox_Help_pages
1709 - https://www.boywiki.org/en/Template_talk:Navbox_Pederasty
1710 - https://www.boywiki.org/en/Template_talk:Navbox_RSOL_organizations
1711 - https://www.boywiki.org/en/Template_talk:Sidebar/Guideline_list
1712 - https://www.boywiki.org/en/api.php?action=rsd
1713 - https://www.boywiki.org/en/index.php?title=(BLSB)_-_Pederasty_in_Early_Ottoman_Arabic_Literature&oldid=45500
1714 - https://www.boywiki.org/en/index.php?title=(BLSB)_-_The_%22Bau_a%22_Ceremonial_Hunting_Lodge_of_the_Kaluli_of_Papua_New_Guinea&oldid=45374
1715 - https://www.boywiki.org/en/index.php?title=Alexander%27s_Choice_(book)&oldid=39613
1716 - https://www.boywiki.org/en/index.php?title=Azov_Films_Prosecutions&oldid=42868
1717 - https://www.boywiki.org/en/index.php?title=Azov_Films_Prosecutions_-_Canada&oldid=39884
1718 - https://www.boywiki.org/en/index.php?title=Azov_Films_Prosecutions_-_United_Kingdom&oldid=37318
1719 - https://www.boywiki.org/en/index.php?title=BoyWiki&oldid=37527
1720 - https://www.boywiki.org/en/index.php?title=BoyWiki:Copyrights&oldid=37651
1721 - https://www.boywiki.org/en/index.php?title=BoyWiki:Current_events&oldid=37827
1722 - https://www.boywiki.org/en/index.php?title=BoyWiki:Donations&oldid=37968
1723 - https://www.boywiki.org/en/index.php?title=BoyWiki:Feature_article_nominations&oldid=36496
1724 - https://www.boywiki.org/en/index.php?title=BoyWiki:Image_of_the_day_archive&oldid=29790
1725 - https://www.boywiki.org/en/index.php?title=BoyWiki:New_and_recently_improved_articles_nominations&oldid=34260
1726 - https://www.boywiki.org/en/index.php?title=BoyWiki:Requests_for_file_uploads&oldid=45053
1727 - https://www.boywiki.org/en/index.php?title=Boyland&oldid=44893
1728 - https://www.boywiki.org/en/index.php?title=Boylover&oldid=31706
1729 - https://www.boywiki.org/en/index.php?title=Category:Activism&oldid=11769
1730 - https://www.boywiki.org/en/index.php?title=Category:Births&oldid=28713
1731 - https://www.boywiki.org/en/index.php?title=Category:Dictionary&from=0
1732 - https://www.boywiki.org/en/index.php?title=Category:Dictionary&from=A
1733 - https://www.boywiki.org/en/index.php?title=Category:Dictionary&from=B
1734 - https://www.boywiki.org/en/index.php?title=Category:Dictionary&from=C
1735 - https://www.boywiki.org/en/index.php?title=Category:Dictionary&from=D
1736 - https://www.boywiki.org/en/index.php?title=Category:Dictionary&from=E
1737 - https://www.boywiki.org/en/index.php?title=Category:Dictionary&from=F
1738 - https://www.boywiki.org/en/index.php?title=Category:Dictionary&from=G
1739 - https://www.boywiki.org/en/index.php?title=Category:Dictionary&from=H
1740 - https://www.boywiki.org/en/index.php?title=Category:Dictionary&from=I
1741 - https://www.boywiki.org/en/index.php?title=Category:Dictionary&from=J
1742 - https://www.boywiki.org/en/index.php?title=Category:Dictionary&from=K
1743 - https://www.boywiki.org/en/index.php?title=Category:Dictionary&from=L
1744 - https://www.boywiki.org/en/index.php?title=Category:Dictionary&from=M
1745 - https://www.boywiki.org/en/index.php?title=Category:Dictionary&from=N
1746 - https://www.boywiki.org/en/index.php?title=Category:Dictionary&from=O
1747 - https://www.boywiki.org/en/index.php?title=Category:Dictionary&from=P
1748 - https://www.boywiki.org/en/index.php?title=Category:Dictionary&from=Q
1749 - https://www.boywiki.org/en/index.php?title=Category:Dictionary&from=R
1750 - https://www.boywiki.org/en/index.php?title=Category:Dictionary&from=S
1751 - https://www.boywiki.org/en/index.php?title=Category:Dictionary&from=T
1752 - https://www.boywiki.org/en/index.php?title=Category:Dictionary&from=U
1753 - https://www.boywiki.org/en/index.php?title=Category:Dictionary&from=V
1754 - https://www.boywiki.org/en/index.php?title=Category:Dictionary&from=W
1755 - https://www.boywiki.org/en/index.php?title=Category:Dictionary&from=X
1756 - https://www.boywiki.org/en/index.php?title=Category:Dictionary&from=Y
1757 - https://www.boywiki.org/en/index.php?title=Category:Dictionary&from=Z
1758 - https://www.boywiki.org/en/index.php?title=Category:Dictionary&oldid=38010
1759 - https://www.boywiki.org/en/index.php?title=Category:Encyclopedia&oldid=35439
1760 - https://www.boywiki.org/en/index.php?title=Category:Entertainment&oldid=20046
1761 - https://www.boywiki.org/en/index.php?title=Category:Help&oldid=11865
1762 - https://www.boywiki.org/en/index.php?title=Category:Life&oldid=22805
1763 - https://www.boywiki.org/en/index.php?title=Edward_Perry_Warren&oldid=41263
1764 - https://www.boywiki.org/en/index.php?title=Ephebophilia&oldid=44306
1765 - https://www.boywiki.org/en/index.php?title=Eromenos_(dictionary)&oldid=43249
1766 - https://www.boywiki.org/en/index.php?title=International_Boylove_Day&oldid=42714
1767 - https://www.boywiki.org/en/index.php?title=Main_Page&oldid=41133
1768 - https://www.boywiki.org/en/index.php?title=Man_with_ephebe&oldid=21657
1769 - https://www.boywiki.org/en/index.php?title=March_24&oldid=19914
1770 - https://www.boywiki.org/en/index.php?title=NAMBLA_used_to_incite_fear_in_Oregon&oldid=40442
1771 - https://www.boywiki.org/en/index.php?title=Online_boylove_community&oldid=38383
1772 - https://www.boywiki.org/en/index.php?title=Portal:Boylove_News_Channel&oldid=40139
1773 - https://www.boywiki.org/en/index.php?title=Portal:Featured_articles&oldid=37248
1774 - https://www.boywiki.org/en/index.php?title=Portal:Index&oldid=37543
1775 - https://www.boywiki.org/en/index.php?title=Review_of_%27Full_Service%27&oldid=39416
1776 - https://www.boywiki.org/en/index.php?title=Review_of_%27Reasons_of_the_Heart%27&oldid=39418
1777 - https://www.boywiki.org/en/index.php?title=Template:Community_Calendar&action=edit
1778 - https://www.boywiki.org/en/index.php?title=Template:MBM_magazine/Current_events&action=edit
1779 - https://www.boywiki.org/en/index.php?title=Template:Navbox_Azov_Films_and_related_articles&action=edit
1780 - https://www.boywiki.org/en/index.php?title=Template:Navbox_Edmund_Marlowe&action=edit
1781 - https://www.boywiki.org/en/index.php?title=Template:Navbox_Free_Spirits&action=edit
1782 - https://www.boywiki.org/en/index.php?title=Template:Navbox_Help_pages&action=edit
1783 - https://www.boywiki.org/en/index.php?title=Template:Navbox_Pederasty&action=edit
1784 - https://www.boywiki.org/en/index.php?title=Template:Navbox_RSOL_organizations&action=edit
1785 - https://www.boywiki.org/en/index.php?title=Template:News/Azov_Films_and_related_articles&action=edit
1786 - https://www.boywiki.org/en/index.php?title=Template:News/Boys_in_the_news&action=edit
1787 - https://www.boywiki.org/en/index.php?title=Template:News/Breaking_news_stories&action=edit
1788 - https://www.boywiki.org/en/index.php?title=Template:News/Headline&action=edit
1789 - https://www.boywiki.org/en/index.php?title=Template:News/In_other_news&action=edit
1790 - https://www.boywiki.org/en/index.php?title=Template:News/Popular_interest&action=edit
1791 - https://www.boywiki.org/en/index.php?title=Template:News/Recently_added&action=edit
1792 - https://www.boywiki.org/en/index.php?title=Template:News/That%27s_Just_Insane&action=edit
1793 - https://www.boywiki.org/en/index.php?title=Template:News/column_1&action=edit
1794 - https://www.boywiki.org/en/index.php?title=Template:News/column_2&action=edit
1795 - https://www.boywiki.org/en/index.php?title=Template:News/column_3&action=edit
1796 - https://www.boywiki.org/en/index.php?title=Template:Popular_Blogs/Current_events&action=edit
1797 - https://www.boywiki.org/en/index.php?title=Template:Portal:Current_events/Current_events&action=edit
1798 - https://www.boywiki.org/en/index.php?title=Template:Radio/Current_events&action=edit
1799 - https://www.boywiki.org/en/index.php?title=Template:Sidebar/Guideline_list&action=edit
1800 - https://www.boywiki.org/en/index.php?title=The_Birth_of_New_BoyLove_Venues&oldid=37494
1801 - https://www.boywiki.org/en/index.php?title=The_Sex_Offender_Registry:_Public_Safety_or_Witch_Hunt%3F&oldid=36744
1802 - https://www.boywiki.org/en/index.php?title=User:Dragonlover&oldid=34593
1803 - https://www.boywiki.org/en/pagename
1804 - https://www.boywiki.org/fr/24_mars
1805 - https://www.boywiki.org/fr/Accueil
1806 - https://www.boywiki.org/fr/Albert_Anker
1807 - https://www.boywiki.org/fr/Alexander%E2%80%99s_choice_(Edmund_Marlowe)
1808 - https://www.boywiki.org/fr/Journ%C3%A9e_internationale_de_l%E2%80%99amour_des_gar%C3%A7ons
1809 - https://www.boywiki.org/fr/api.php?action=rsd
1810 - https://www.boywiki.org/fr/index.php?title=Accueil&oldid=19177
1811 - https://www.boywiki.org/fr/pagename
1812 - https://www.boywiki.org/media/Main_Page
1813 - https://www.boywiki.org/media/Special:NewFiles
1814 - https://www.boywiki.org/media/Special:Upload
1815 - https://www.boywiki.org/media/images/1/12/TN_little_league_baseball_batter_05.jpg
1816 - https://www.boywiki.org/media/images/3/30/Puce_9x9_bl.png
1817 - https://www.boywiki.org/media/images/3/37/Blol.png
1818 - https://www.boywiki.org/media/images/6/64/Azov_banner_logo.jpg
1819 - https://www.boywiki.org/media/images/7/72/BLSmileyface.png
1820 - https://www.boywiki.org/media/images/9/9b/76px-Wooden_hourglass_3.jpg
1821 - https://www.boywiki.org/media/images/9/9f/Boywiki-fr-banner-transparent.png
1822 - https://www.boywiki.org/media/images/a/a4/Newbnc.png
1823 - https://www.boywiki.org/media/images/a/ae/Fake_News1.png
1824 - https://www.boywiki.org/media/images/b/b1/IBLD_Animation1_BoyChat.gif
1825 - https://www.boywiki.org/media/images/d/d1/Boywiki-de-banner2.png
1826 - https://www.boywiki.org/media/images/d/d9/Sub-arrows.png
1827 - https://www.boywiki.org/media/images/e/e2/News_icon.jpg
1828 - https://www.boywiki.org/media/images/f/ff/Puce_9x9_gr.png
1829 - https://www.boywiki.org/media/images/thumb/0/01/IBLD_Blue_candle.jpg/15px-IBLD_Blue_candle.jpg
1830 - https://www.boywiki.org/media/images/thumb/0/04/Alexanders-choice-edmund-marlowe-paperback-cover-art.jpg/170px-Alexanders-choice-edmund-marlowe-paperback-cover-art.jpg
1831 - https://www.boywiki.org/media/images/thumb/0/04/Alexanders-choice-edmund-marlowe-paperback-cover-art.jpg/90px-Alexanders-choice-edmund-marlowe-paperback-cover-art.jpg
1832 - https://www.boywiki.org/media/images/thumb/0/05/Boywiki-icon.png/25px-Boywiki-icon.png
1833 - https://www.boywiki.org/media/images/thumb/0/05/Boywiki-icon.png/30px-Boywiki-icon.png
1834 - https://www.boywiki.org/media/images/thumb/0/07/A_Decent_Life_movie_poster.jpg/200px-A_Decent_Life_movie_poster.jpg
1835 - https://www.boywiki.org/media/images/thumb/0/0a/ANKER_Albert_1895c_Knabe_%C3%BCber_dem_Schulheft_eingeschlafen_695x488.jpg/250px-ANKER_Albert_1895c_Knabe_%C3%BCber_dem_Schulheft_eingeschlafen_695x488.jpg
1836 - https://www.boywiki.org/media/images/thumb/0/0c/Clip_art_boy_reading.JPG/50px-Clip_art_boy_reading.JPG
1837 - https://www.boywiki.org/media/images/thumb/0/0c/Clip_art_fledgling.JPG/40px-Clip_art_fledgling.JPG
1838 - https://www.boywiki.org/media/images/thumb/0/0c/SO_PASSPORT-3.jpg/300px-SO_PASSPORT-3.jpg
1839 - https://www.boywiki.org/media/images/thumb/0/0f/Warren_Cup_modenature_20thCentury_london_British_Museum.jpg/150px-Warren_Cup_modenature_20thCentury_london_British_Museum.jpg
1840 - https://www.boywiki.org/media/images/thumb/1/10/FR%C3%88RE_Pierre-%C3%89douard_1876_Gar%C3%A7ons_de_courses_543x568.jpg/150px-FR%C3%88RE_Pierre-%C3%89douard_1876_Gar%C3%A7ons_de_courses_543x568.jpg
1841 - https://www.boywiki.org/media/images/thumb/1/12/Megans-law-2.jpg/200px-Megans-law-2.jpg
1842 - https://www.boywiki.org/media/images/thumb/1/13/RING_Laurits_Andersen_1897_Maleren_i_landsbyen_1000x788.jpg/300px-RING_Laurits_Andersen_1897_Maleren_i_landsbyen_1000x788.jpg
1843 - https://www.boywiki.org/media/images/thumb/1/18/Ethos-issue-8-p01.jpg/150px-Ethos-issue-8-p01.jpg
1844 - https://www.boywiki.org/media/images/thumb/1/18/Ethos-issue-8-p01.jpg/200px-Ethos-issue-8-p01.jpg
1845 - https://www.boywiki.org/media/images/thumb/1/1b/Man_with_Ephebe_%286th_century_BC%29_Greece_02.jpg/200px-Man_with_Ephebe_%286th_century_BC%29_Greece_02.jpg
1846 - https://www.boywiki.org/media/images/thumb/1/1b/Man_with_Ephebe_%286th_century_BC%29_Greece_02.jpg/400px-Man_with_Ephebe_%286th_century_BC%29_Greece_02.jpg
1847 - https://www.boywiki.org/media/images/thumb/1/1c/Information_icon.png/50px-Information_icon.png
1848 - https://www.boywiki.org/media/images/thumb/2/21/Clip_art_theatrical_masks.JPG/40px-Clip_art_theatrical_masks.JPG
1849 - https://www.boywiki.org/media/images/thumb/2/24/Eo-scale_of_justice.gif/40px-Eo-scale_of_justice.gif
1850 - https://www.boywiki.org/media/images/thumb/2/25/ANKER_Albert_1875c_Schulknabe_2638x3000.jpg/150px-ANKER_Albert_1875c_Schulknabe_2638x3000.jpg
1851 - https://www.boywiki.org/media/images/thumb/2/26/Erastes_and_Eromenos_Flanked_by_a_Dead_Hare_and_a_Dead_Fox.png/250px-Erastes_and_Eromenos_Flanked_by_a_Dead_Hare_and_a_Dead_Fox.png
1852 - https://www.boywiki.org/media/images/thumb/2/26/Kaluli_tribesman_dressed_for_a_special_occasion_from_Sugu_village.png/300px-Kaluli_tribesman_dressed_for_a_special_occasion_from_Sugu_village.png
1853 - https://www.boywiki.org/media/images/thumb/2/2a/MACDONALD_Lawrence_1842_Hyacinthus_980x980.jpg/200px-MACDONALD_Lawrence_1842_Hyacinthus_980x980.jpg
1854 - https://www.boywiki.org/media/images/thumb/2/2f/FR%C3%88RE_Pierre-%C3%89douard_1879_Sur_le_chemin_de_l%27%C3%A9cole_702x900.jpg/150px-FR%C3%88RE_Pierre-%C3%89douard_1879_Sur_le_chemin_de_l%27%C3%A9cole_702x900.jpg
1855 - https://www.boywiki.org/media/images/thumb/3/30/Brecha_Jose_sun_smile.jpg/250px-Brecha_Jose_sun_smile.jpg
1856 - https://www.boywiki.org/media/images/thumb/3/34/MORGAN_John_-_The_mel%C3%A9e_1153x512.jpg/300px-MORGAN_John_-_The_mel%C3%A9e_1153x512.jpg
1857 - https://www.boywiki.org/media/images/thumb/3/38/Clip_art_book.JPG/60px-Clip_art_book.JPG
1858 - https://www.boywiki.org/media/images/thumb/4/47/FR%C3%88RE_Pierre-%C3%89douard_1859_La_glissade_512x378.jpg/250px-FR%C3%88RE_Pierre-%C3%89douard_1859_La_glissade_512x378.jpg
1859 - https://www.boywiki.org/media/images/thumb/4/48/FR%C3%88RE_Pierre-%C3%89douard_-_Apr%C3%A8s_l%27%C3%A9cole_500x655.jpg/150px-FR%C3%88RE_Pierre-%C3%89douard_-_Apr%C3%A8s_l%27%C3%A9cole_500x655.jpg
1860 - https://www.boywiki.org/media/images/thumb/4/4c/FR%C3%88RE_Pierre-%C3%89douard_1867_La_sortie_de_l%27%C3%A9cole_600x783.jpg/150px-FR%C3%88RE_Pierre-%C3%89douard_1867_La_sortie_de_l%27%C3%A9cole_600x783.jpg
1861 - https://www.boywiki.org/media/images/thumb/5/54/BRISEIS_PAINTER_-480c_Man_kissing_a_boy_%28Louvre_G278%29_%28detail%29_900x1200.jpg/264px-BRISEIS_PAINTER_-480c_Man_kissing_a_boy_%28Louvre_G278%29_%28detail%29_900x1200.jpg
1862 - https://www.boywiki.org/media/images/thumb/5/55/DHS-CBP-MONTAGE-2.jpg/250px-DHS-CBP-MONTAGE-2.jpg
1863 - https://www.boywiki.org/media/images/thumb/5/58/PIFFARD_Harold_Hume_-_The_snowball_-_Guilty_or_not_guilty%3F_550x717.jpg/150px-PIFFARD_Harold_Hume_-_The_snowball_-_Guilty_or_not_guilty%3F_550x717.jpg
1864 - https://www.boywiki.org/media/images/thumb/5/5a/KR%C3%9CGER_Franz_1850a_Beim_Weihnachtsbaumholen_1984x2362.jpg/200px-KR%C3%9CGER_Franz_1850a_Beim_Weihnachtsbaumholen_1984x2362.jpg
1865 - https://www.boywiki.org/media/images/thumb/5/5d/Thecast001_zpsaade0f53.jpg/250px-Thecast001_zpsaade0f53.jpg
1866 - https://www.boywiki.org/media/images/thumb/5/5f/462px-Cscr-featured_.png/15px-462px-Cscr-featured_.png
1867 - https://www.boywiki.org/media/images/thumb/5/5f/462px-Cscr-featured_.png/20px-462px-Cscr-featured_.png
1868 - https://www.boywiki.org/media/images/thumb/5/5f/462px-Cscr-featured_.png/60px-462px-Cscr-featured_.png
1869 - https://www.boywiki.org/media/images/thumb/6/60/Clip_art_births.JPG/40px-Clip_art_births.JPG
1870 - https://www.boywiki.org/media/images/thumb/6/60/MAYNE_Jean_1903_La_boule_de_neige_g%C3%A9ante_900x754.jpg/250px-MAYNE_Jean_1903_La_boule_de_neige_g%C3%A9ante_900x754.jpg
1871 - https://www.boywiki.org/media/images/thumb/6/63/ANSHUTZ_Thomas_Pollock_1900c_Boy_reading_-_Ned_Anshutz_543x768.jpg/275px-ANSHUTZ_Thomas_Pollock_1900c_Boy_reading_-_Ned_Anshutz_543x768.jpg
1872 - https://www.boywiki.org/media/images/thumb/6/6b/Donations.png/125px-Donations.png
1873 - https://www.boywiki.org/media/images/thumb/6/6b/Donations.png/250px-Donations.png
1874 - https://www.boywiki.org/media/images/thumb/6/6c/Connor_YourIBLD_MainPage_842x921.JPG/200px-Connor_YourIBLD_MainPage_842x921.JPG
1875 - https://www.boywiki.org/media/images/thumb/7/71/BRISEIS_PAINTER_-480c_Man_kissing_a_boy_%28Louvre_G278%29_2240x2180.jpg/175px-BRISEIS_PAINTER_-480c_Man_kissing_a_boy_%28Louvre_G278%29_2240x2180.jpg
1876 - https://www.boywiki.org/media/images/thumb/7/72/BLSmileyface.png/40px-BLSmileyface.png
1877 - https://www.boywiki.org/media/images/thumb/7/73/BRYGOS_PAINTER_-475c_Man_fondling_a_boy_at_the_palaestra_%28Ashmolean_Museum_1967.304%29.jpg/150px-BRYGOS_PAINTER_-475c_Man_fondling_a_boy_at_the_palaestra_%28Ashmolean_Museum_1967.304%29.jpg
1878 - https://www.boywiki.org/media/images/thumb/7/74/Clip_art_Technology.JPG/35px-Clip_art_Technology.JPG
1879 - https://www.boywiki.org/media/images/thumb/7/75/Hyacinth.jpg/200px-Hyacinth.jpg
1880 - https://www.boywiki.org/media/images/thumb/7/79/Didessa_village%2C_Kaluli_ethnic_group%2C_Mt._Bosavi_region%2C_Papua_New_Guinea.png/300px-Didessa_village%2C_Kaluli_ethnic_group%2C_Mt._Bosavi_region%2C_Papua_New_Guinea.png
1881 - https://www.boywiki.org/media/images/thumb/8/81/Bloge.png/30px-Bloge.png
1882 - https://www.boywiki.org/media/images/thumb/8/81/Bloge.png/90px-Bloge.png
1883 - https://www.boywiki.org/media/images/thumb/8/82/The_poet_Figani_with_a_young_cupbearer._Ottoman_miniature_painting_from_an_illustrated_volume_of_a_copy_of_the_Me%C5%9Fair%C3%BC%27%C5%9F-%C5%9Euara_by_A%C5%9F%C4%B1k_%C3%87elebi%2C_16th_century.png/100px-The_poet_Figani_with_a_young_cupbearer._Ottoman_miniature_painting_from_an_illustrated_volume_of_a_copy_of_the_Me%C5%9Fair%C3%BC%27%C5%9F-%C5%9Euara_by_A%C5%9F%C4%B1k_%C3%87elebi%2C_16th_century.png
1884 - https://www.boywiki.org/media/images/thumb/8/82/The_poet_Figani_with_a_young_cupbearer._Ottoman_miniature_painting_from_an_illustrated_volume_of_a_copy_of_the_Me%C5%9Fair%C3%BC%27%C5%9F-%C5%9Euara_by_A%C5%9F%C4%B1k_%C3%87elebi%2C_16th_century.png/300px-The_poet_Figani_with_a_young_cupbearer._Ottoman_miniature_painting_from_an_illustrated_volume_of_a_copy_of_the_Me%C5%9Fair%C3%BC%27%C5%9F-%C5%9Euara_by_A%C5%9F%C4%B1k_%C3%87elebi%2C_16th_century.png
1885 - https://www.boywiki.org/media/images/thumb/8/88/IBLD_Blue_candle2.jpg/175px-IBLD_Blue_candle2.jpg
1886 - https://www.boywiki.org/media/images/thumb/8/8a/UA_Flight_175_hits_WTC_south_tower_9-11_edit.jpeg/150px-UA_Flight_175_hits_WTC_south_tower_9-11_edit.jpeg
1887 - https://www.boywiki.org/media/images/thumb/8/8a/UA_Flight_175_hits_WTC_south_tower_9-11_edit.jpeg/200px-UA_Flight_175_hits_WTC_south_tower_9-11_edit.jpeg
1888 - https://www.boywiki.org/media/images/thumb/8/8b/Comet-ping-pong-pizza-pizzagate-podesta-brock.jpg/150px-Comet-ping-pong-pizza-pizzagate-podesta-brock.jpg
1889 - https://www.boywiki.org/media/images/thumb/8/8d/FREUND_Fritz_-_Die_Schneeballschlacht_II_800x535.jpg/250px-FREUND_Fritz_-_Die_Schneeballschlacht_II_800x535.jpg
1890 - https://www.boywiki.org/media/images/thumb/9/93/Ethos_1.jpg/100px-Ethos_1.jpg
1891 - https://www.boywiki.org/media/images/thumb/9/93/Ethos_1.jpg/300px-Ethos_1.jpg
1892 - https://www.boywiki.org/media/images/thumb/9/95/Man_with_Ephebe_%286th_century_BC%29_Greece_01.jpg/400px-Man_with_Ephebe_%286th_century_BC%29_Greece_01.jpg
1893 - https://www.boywiki.org/media/images/thumb/9/99/LEYENDECKER_Joseph_Christian_1911_Snowball_fight_1036x1458.jpg/200px-LEYENDECKER_Joseph_Christian_1911_Snowball_fight_1036x1458.jpg
1894 - https://www.boywiki.org/media/images/thumb/9/9b/76px-Wooden_hourglass_3.jpg/25px-76px-Wooden_hourglass_3.jpg
1895 - https://www.boywiki.org/media/images/thumb/9/9b/BERLIN_PAINTER_-495c_Ganymede_holding_a_hoop_and_a_cock_%28Louvre_G175%29_1874x1998.jpg/150px-BERLIN_PAINTER_-495c_Ganymede_holding_a_hoop_and_a_cock_%28Louvre_G175%29_1874x1998.jpg
1896 - https://www.boywiki.org/media/images/thumb/9/9c/125px-template_icon.png/50px-125px-template_icon.png
1897 - https://www.boywiki.org/media/images/thumb/9/9e/GOOR_Gaston_1974_L%27Amour_couronn%C3%A9_de_roses_1978x2943.jpg/150px-GOOR_Gaston_1974_L%27Amour_couronn%C3%A9_de_roses_1978x2943.jpg
1898 - https://www.boywiki.org/media/images/thumb/9/9f/Illustration_depicting_a_kulampara_%28lover_of_boys%29.jpg/300px-Illustration_depicting_a_kulampara_%28lover_of_boys%29.jpg
1899 - https://www.boywiki.org/media/images/thumb/a/a9/Puce_11x11_gr.png/6px-Puce_11x11_gr.png
1900 - https://www.boywiki.org/media/images/thumb/a/ae/Fake_News1.png/150px-Fake_News1.png
1901 - https://www.boywiki.org/media/images/thumb/a/ae/Fake_News1.png/250px-Fake_News1.png
1902 - https://www.boywiki.org/media/images/thumb/a/ae/The_tutor_poster_450.jpg/150px-The_tutor_poster_450.jpg
1903 - https://www.boywiki.org/media/images/thumb/a/ae/The_tutor_poster_450.jpg/200px-The_tutor_poster_450.jpg
1904 - https://www.boywiki.org/media/images/thumb/b/b1/HANSEN_Peter_1901_P%C3%A5_isen_bag_byen_-_F%C3%A5borg_1100x676.jpg/300px-HANSEN_Peter_1901_P%C3%A5_isen_bag_byen_-_F%C3%A5borg_1100x676.jpg
1905 - https://www.boywiki.org/media/images/thumb/c/c8/FR%C3%88RE_Pierre-%C3%89douard_1861_Bataille_de_boules_de_neige_944x721.jpg/250px-FR%C3%88RE_Pierre-%C3%89douard_1861_Bataille_de_boules_de_neige_944x721.jpg
1906 - https://www.boywiki.org/media/images/thumb/d/d4/Warren_Cup_Scene_A_20thCentury_london_British_Museum.jpg/300px-Warren_Cup_Scene_A_20thCentury_london_British_Museum.jpg
1907 - https://www.boywiki.org/media/images/thumb/d/d8/FR%C3%88RE_Pierre-%C3%89douard_1860_Jeux_dans_la_neige_683x536.jpg/250px-FR%C3%88RE_Pierre-%C3%89douard_1860_Jeux_dans_la_neige_683x536.jpg
1908 - https://www.boywiki.org/media/images/thumb/d/dc/BLogo_930x818.png/250px-BLogo_930x818.png
1909 - https://www.boywiki.org/media/images/thumb/d/dc/BLogo_930x818.png/35px-BLogo_930x818.png
1910 - https://www.boywiki.org/media/images/thumb/d/dc/BLogo_930x818.png/90px-BLogo_930x818.png
1911 - https://www.boywiki.org/media/images/thumb/e/e3/82857621092e2d72.gif/600px-82857621092e2d72.gif
1912 - https://www.boywiki.org/media/images/thumb/e/e4/Extended_pink_Humvee_of_Pulse_nightclub_at_come_Out_With_Pride_2013_%2810118387633%29.jpg/150px-Extended_pink_Humvee_of_Pulse_nightclub_at_come_Out_With_Pride_2013_%2810118387633%29.jpg
1913 - https://www.boywiki.org/media/images/thumb/e/e6/Life.png/35px-Life.png
1914 - https://www.boywiki.org/media/images/thumb/e/ef/ANKER_Albert_1873_Der_Schneeb%C3%A4r_600x358.jpg/250px-ANKER_Albert_1873_Der_Schneeb%C3%A4r_600x358.jpg
1915 - https://www.boywiki.org/media/images/thumb/f/f6/WfmTQfF.png/300px-WfmTQfF.png
1916 - https://www.boywiki.org/media/images/thumb/f/fb/FREUND_Fritz_-_Die_Schneeballschlacht_III_550x333.jpg/300px-FREUND_Fritz_-_Die_Schneeballschlacht_III_550x333.jpg
1917 - https://www.boywiki.org/media/images/thumb/f/fc/ISSUE_14.jpg/150px-ISSUE_14.jpg
1918 - https://www.boywiki.org/media/images/thumb/f/fd/Etenne%27s_IBLD_page.jpg/200px-Etenne%27s_IBLD_page.jpg
1919 - https://www.boywiki.org/media/images/thumb/f/fd/FR%C3%88RE_Pierre-%C3%89douard_1858_Jeune_gar%C3%A7on_courant_dans_la_neige_565x899.jpg/150px-FR%C3%88RE_Pierre-%C3%89douard_1858_Jeune_gar%C3%A7on_courant_dans_la_neige_565x899.jpg
1920 - https://www.boywiki.org/media/images/thumb/f/ff/FREUND_Fritz_-_Die_Schneeballschlacht_I_1641x1080.jpg/250px-FREUND_Fritz_-_Die_Schneeballschlacht_I_1641x1080.jpg
1921 - https://www.boywiki.org/media/images/thumb/f/ff/Puce_9x9_gr.png/6px-Puce_9x9_gr.png
1922 - https://www.buckinghamlaw.ca/
1923 - https://www.canlii.org/en/on/onca/doc/2017/2017onca754/2017onca754.html
1924 - https://www.canlii.org/en/on/onsc/doc/2015/2015onsc3080/2015onsc3080.html
1925 - https://www.castilloazul.org/
1926 - https://www.dailymail.co.uk/news/article-2250889/Scott-Studer-High-school-basketball-coach-videotaped-boys-locker-room-shower-sentenced-15-years-ordered-5-000-Newtown-massacre-victims.html
1927 - https://www.documentcloud.org/documents/895037-statement-of-facts-loskarn-case.html
1928 - https://www.freespirits.org/
1929 - https://www.gpo.gov/fdsys/pkg/USCOURTS-alsd-1_12-cr-00269/pdf/USCOURTS-alsd-1_12-cr-00269-0.pdf
1930 - https://www.gpo.gov/fdsys/pkg/USCOURTS-rid-1_13-cr-00043/pdf/USCOURTS-rid-1_13-cr-00043-0.pdf
1931 - https://www.houstonlgbthistory.org/Houston80s/Assorted%20Pubs/Citizens%20News/Citizens-News-64-65.pdf
1932 - https://www.huffingtonpost.com/entry/anthony-avalos-california-death_us_5b33b9dee4b0b745f17a0520
1933 - https://www.independent.co.uk/life-style/health-and-families/permission-nappy-change-consent-sexuality-expert-deanne-carson-a8345581.html
1934 - https://www.irishcentral.com/news/brendan-phelan-child-porn-walks-free
1935 - https://www.jongensforum.net/
1936 - https://www.jungsforum.net/
1937 - https://www.jungsforum.net/user/kontakt.php
1938 - https://www.justice.gov/usao-edtx/pr/hardin-county-deputy-guilty-lying-federal-agent
1939 - https://www.justice.gov/usao-mdpa/pr/cumberland-county-man-sentenced-five-years-prison-receipt-child-pornography
1940 - https://www.justice.gov/usao-sdtx/pr/weslaco-man-convicted-possessing-child-pornography-videos
1941 - https://www.justice.gov/usao-wdmo/pr/former-high-school-teacher-pleads-guilty-possessing-child-porn
1942 - https://www.kxly.com/news/former-gonzaga-priest-and-professor-sentenced-for-child-porn-possession/742632415
1943 - https://www.legarcon.net/
1944 - https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents
1945 - https://www.pedagora.com/
1946 - https://www.thestar.com/news/crime/2015/05/12/canadas-biggest-child-porn-case-ends-with-conviction-on-15-charges.html
1947 - https://www.thestar.com/news/crime/2016/08/08/torontos-child-porn-kingpin-gets-10-year-sentence.html
1948 - https://www.weirdpm.xyz/
1949 - https://www.weirdpm.xyz/wired-pm-radio-show-schedule/
1950 - https://www.youtube.com/watch?v=_8MKEpXqGko
1951 - https://www.youtube.com/watch?v=u2J7AXRIA-U
1952 Total external links: 703
1953
1954+ Email addresses found:
1955 Total email address found: 0
1956
1957+ Directories found:
1958 - http://www.boywiki.org./de/ (No open folder)
1959 - http://www.boywiki.org./de/resources/ (404 Not Found)
1960 - http://www.boywiki.org./de/resources/assets/ (404 Not Found)
1961 - http://www.boywiki.org./en/ (No open folder)
1962 - http://www.boywiki.org./en/resources/ (404 Not Found)
1963 - http://www.boywiki.org./en/resources/assets/ (404 Not Found)
1964 - http://www.boywiki.org./fr/ (No open folder)
1965 - http://www.boywiki.org./fr/resources/ (404 Not Found)
1966 - http://www.boywiki.org./fr/resources/assets/ (404 Not Found)
1967 - http://www.boywiki.org./images/ (403 Forbidden)
1968 Total directories: 10
1969
1970+ Directory indexing found:
1971 Total directories with indexing: 0
1972
1973----------------------------------------------------------------------
1974
1975
1976 + URL to crawl: http://ns3.fscodns.net
1977 + Date: 2020-03-24
1978
1979 + Crawling URL: http://ns3.fscodns.net:
1980 + Links:
1981 + Crawling http://ns3.fscodns.net (404 Not Found)
1982 + Searching for directories...
1983 + Searching open folders...
1984
1985
1986 + URL to crawl: http://mail.boywiki.org.
1987 + Date: 2020-03-24
1988
1989 + Crawling URL: http://mail.boywiki.org.:
1990 + Links:
1991 + Crawling http://mail.boywiki.org. (404 Not Found)
1992 + Searching for directories...
1993 + Searching open folders...
1994
1995
1996 + URL to crawl: https://www.boywiki.org.
1997 + Date: 2020-03-24
1998
1999 + Crawling URL: https://www.boywiki.org.:
2000 + Links:
2001 + Crawling https://www.boywiki.org.
2002 + Searching for directories...
2003 + Searching open folders...
2004
2005
2006 + URL to crawl: https://ns3.fscodns.net
2007 + Date: 2020-03-24
2008
2009 + Crawling URL: https://ns3.fscodns.net:
2010 + Links:
2011 + Crawling https://ns3.fscodns.net ([SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:727))
2012 + Searching for directories...
2013 + Searching open folders...
2014
2015
2016 + URL to crawl: https://mail.boywiki.org.
2017 + Date: 2020-03-24
2018
2019 + Crawling URL: https://mail.boywiki.org.:
2020 + Links:
2021 + Crawling https://mail.boywiki.org. ([SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:727))
2022 + Searching for directories...
2023 + Searching open folders...
2024
2025
2026 + URL to crawl: http://www.boywiki.org.:10000
2027 + Date: 2020-03-24
2028
2029 + Crawling URL: http://www.boywiki.org.:10000:
2030 + Links:
2031 + Crawling http://www.boywiki.org.:10000
2032 + Searching for directories...
2033 + Searching open folders...
2034
2035
2036 + URL to crawl: http://ns3.fscodns.net:10000
2037 + Date: 2020-03-24
2038
2039 + Crawling URL: http://ns3.fscodns.net:10000:
2040 + Links:
2041 + Crawling http://ns3.fscodns.net:10000
2042 + Searching for directories...
2043 + Searching open folders...
2044
2045
2046 + URL to crawl: http://mail.boywiki.org.:10000
2047 + Date: 2020-03-24
2048
2049 + Crawling URL: http://mail.boywiki.org.:10000:
2050 + Links:
2051 + Crawling http://mail.boywiki.org.:10000
2052 + Searching for directories...
2053 + Searching open folders...
2054
2055
2056 + URL to crawl: http://box.isp-email.net
2057 + Date: 2020-03-24
2058
2059 + Crawling URL: http://box.isp-email.net:
2060 + Links:
2061 + Crawling http://box.isp-email.net
2062 + Searching for directories...
2063 + Searching open folders...
2064
2065
2066 + URL to crawl: https://box.isp-email.net
2067 + Date: 2020-03-24
2068
2069 + Crawling URL: https://box.isp-email.net:
2070 + Links:
2071 + Crawling https://box.isp-email.net
2072 + Searching for directories...
2073 + Searching open folders...
2074
2075--Finished--
2076Summary information for domain boywiki.org.
2077-----------------------------------------
2078 Domain Specific Information:
2079 Email: etenne@boywiki.org�
2080 Email: info@boywiki.org.
2081 Email: Etenne@boywiki.org�
2082 Email: info@boywiki.org�
2083 Email: info@boywiki.org"
2084
2085 Domain Ips Information:
2086 IP: 82.94.222.130
2087 HostName: ns1.fscodns.net Type: NS
2088 Country: Netherlands
2089 Is Active: True (syn-ack ttl 49)
2090 Port: 993/tcp open tcpwrapped syn-ack ttl 49
2091 IP: 82.94.228.252
2092 HostName: ns3.fscodns.net Type: NS
2093 HostName: www.boywiki.org. Type: A
2094 HostName: mail.boywiki.org. Type: A
2095 Country: Netherlands
2096 Is Active: True (syn-ack ttl 49)
2097 Port: 25/tcp open smtp syn-ack ttl 49 Postfix smtpd
2098 Script Info: |_smtp-commands: mail.boywiki.org, PIPELINING, SIZE 30720000, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN,
2099 Script Info: |_ssl-date: TLS randomness does not represent time
2100 Port: 80/tcp open http syn-ack ttl 49 nginx
2101 Script Info: | http-methods:
2102 Script Info: |_ Supported Methods: GET HEAD POST
2103 Script Info: |_http-title: 404 Not Found
2104 Port: 110/tcp open pop3 syn-ack ttl 49 Dovecot pop3d
2105 Script Info: |_pop3-capabilities: TOP SASL(CRAM-MD5) UIDL STLS RESP-CODES PIPELINING CAPA
2106 Script Info: |_ssl-date: TLS randomness does not represent time
2107 Port: 143/tcp open imap syn-ack ttl 49 Dovecot imapd
2108 Script Info: |_imap-capabilities: SASL-IR STARTTLS IDLE LITERAL+ LOGINDISABLED capabilities more ENABLE OK ID have LOGIN-REFERRALS post-login listed IMAP4rev1 Pre-login AUTH=CRAM-MD5A0001
2109 Script Info: |_ssl-date: TLS randomness does not represent time
2110 Port: 443/tcp open ssl/http syn-ack ttl 49 nginx
2111 Script Info: | http-methods:
2112 Script Info: |_ Supported Methods: GET HEAD POST
2113 Script Info: |_http-title: 403 Forbidden
2114 Script Info: | ssl-cert: Subject: commonName=boywiki.org
2115 Script Info: | Subject Alternative Name: DNS:boywiki.org, DNS:de.boywiki.org, DNS:en.boywiki.org, DNS:fr.boywiki.org, DNS:www.boywiki.org
2116 Script Info: | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
2117 Script Info: | Public Key type: rsa
2118 Script Info: | Public Key bits: 2048
2119 Script Info: | Signature Algorithm: sha256WithRSAEncryption
2120 Script Info: | Not valid before: 2019-01-31T05:56:40
2121 Script Info: | Not valid after: 2019-05-01T05:56:40
2122 Script Info: | MD5: eab9 284b 91a6 bc59 e1d8 02b3 4a22 d593
2123 Script Info: |_SHA-1: 62fc 6092 f257 778f 7796 9679 a7da 7694 a7bf 2489
2124 Script Info: |_ssl-date: TLS randomness does not represent time
2125 Port: 587/tcp open smtp syn-ack ttl 49 Postfix smtpd
2126 Script Info: |_smtp-commands: mail.boywiki.org, PIPELINING, SIZE 30720000, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN,
2127 Script Info: |_ssl-date: TLS randomness does not represent time
2128 Port: 993/tcp open ssl/imaps? syn-ack ttl 49
2129 Script Info: |_ssl-date: TLS randomness does not represent time
2130 Port: 995/tcp open ssl/pop3s? syn-ack ttl 49
2131 Script Info: |_ssl-date: TLS randomness does not represent time
2132 Port: 10000/tcp open http syn-ack ttl 49 MiniServ 1.850 (Webmin httpd)
2133 Script Info: |_http-favicon: Unknown favicon MD5: 14F7CB161F9A836880B17A5F6EF890BD
2134 Script Info: | http-methods:
2135 Script Info: |_ Supported Methods: GET POST OPTIONS
2136 Script Info: |_http-title: Site doesn't have a title (text/html; Charset=iso-8859-1).
2137 Os Info: Host: mail.boywiki.org
2138 IP: 88.80.6.203
2139 HostName: ns2.fscodns.net Type: NS
2140 HostName: box.freespirits.info Type: PTR
2141 Country: Sweden
2142 Is Active: False
2143 IP: 185.250.106.93
2144 HostName: box.isp-email.net Type: MX
2145 HostName: box.isp-email.net Type: PTR
2146 Country: Romania
2147 Is Active: True (udp-response ttl 48)
2148 Port: 25/tcp open smtp syn-ack ttl 48 Postfix smtpd
2149 Script Info: |_smtp-commands: box.isp-email.net, PIPELINING, SIZE 134217728, VRFY, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN, SMTPUTF8,
2150 Script Info: | ssl-cert: Subject: commonName=box.isp-email.net
2151 Script Info: | Subject Alternative Name: DNS:box.isp-email.net
2152 Script Info: | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
2153 Script Info: | Public Key type: rsa
2154 Script Info: | Public Key bits: 2048
2155 Script Info: | Signature Algorithm: sha256WithRSAEncryption
2156 Script Info: | Not valid before: 2020-02-16T00:01:06
2157 Script Info: | Not valid after: 2020-05-16T00:01:06
2158 Script Info: | MD5: 9227 6c74 5a16 9708 99d0 d7de 4456 a192
2159 Script Info: |_SHA-1: c4e9 252e 099a ddee 98fa ef2d 125b 8e12 2a71 03a4
2160 Script Info: |_ssl-date: TLS randomness does not represent time
2161 Port: 53/tcp open domain? syn-ack ttl 48
2162 Script Info: | dns-nsid:
2163 Script Info: |_ id.server:
2164 Script Info: | fingerprint-strings:
2165 Script Info: | DNSVersionBindReqTCP:
2166 Script Info: | version
2167 Script Info: |_ bind
2168 Port: 80/tcp open http syn-ack ttl 48 nginx
2169 Script Info: | http-methods:
2170 Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
2171 Script Info: |_http-title: Did not follow redirect to https://box.isp-email.net/
2172 Port: 443/tcp open ssl/http syn-ack ttl 48 nginx
2173 Script Info: | http-methods:
2174 Script Info: |_ Supported Methods: GET HEAD
2175 Script Info: |_http-title: this is a mail-in-a-box
2176 Script Info: | ssl-cert: Subject: commonName=box.isp-email.net
2177 Script Info: | Subject Alternative Name: DNS:box.isp-email.net
2178 Script Info: | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
2179 Script Info: | Public Key type: rsa
2180 Script Info: | Public Key bits: 2048
2181 Script Info: | Signature Algorithm: sha256WithRSAEncryption
2182 Script Info: | Not valid before: 2020-02-16T00:01:06
2183 Script Info: | Not valid after: 2020-05-16T00:01:06
2184 Script Info: | MD5: 9227 6c74 5a16 9708 99d0 d7de 4456 a192
2185 Script Info: |_SHA-1: c4e9 252e 099a ddee 98fa ef2d 125b 8e12 2a71 03a4
2186 Script Info: |_ssl-date: TLS randomness does not represent time
2187 Script Info: | tls-alpn:
2188 Script Info: | h2
2189 Script Info: |_ http/1.1
2190 Script Info: | tls-nextprotoneg:
2191 Script Info: | h2
2192 Script Info: |_ http/1.1
2193 Port: 587/tcp open smtp syn-ack ttl 48 Postfix smtpd
2194 Script Info: |_smtp-commands: box.isp-email.net, PIPELINING, SIZE 134217728, VRFY, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN, SMTPUTF8,
2195 Script Info: | ssl-cert: Subject: commonName=box.isp-email.net
2196 Script Info: | Subject Alternative Name: DNS:box.isp-email.net
2197 Script Info: | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
2198 Script Info: | Public Key type: rsa
2199 Script Info: | Public Key bits: 2048
2200 Script Info: | Signature Algorithm: sha256WithRSAEncryption
2201 Script Info: | Not valid before: 2020-02-16T00:01:06
2202 Script Info: | Not valid after: 2020-05-16T00:01:06
2203 Script Info: | MD5: 9227 6c74 5a16 9708 99d0 d7de 4456 a192
2204 Script Info: |_SHA-1: c4e9 252e 099a ddee 98fa ef2d 125b 8e12 2a71 03a4
2205 Script Info: |_ssl-date: TLS randomness does not represent time
2206 Port: 993/tcp open ssl/imap syn-ack ttl 48 Dovecot imapd (Ubuntu)
2207 Script Info: |_imap-capabilities: more Pre-login AUTH=LOGINA0001 LITERAL+ have AUTH=PLAIN IDLE SASL-IR post-login LOGIN-REFERRALS listed IMAP4rev1 ID OK capabilities ENABLE
2208 Script Info: | ssl-cert: Subject: commonName=box.isp-email.net
2209 Script Info: | Subject Alternative Name: DNS:box.isp-email.net
2210 Script Info: | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
2211 Script Info: | Public Key type: rsa
2212 Script Info: | Public Key bits: 2048
2213 Script Info: | Signature Algorithm: sha256WithRSAEncryption
2214 Script Info: | Not valid before: 2020-02-16T00:01:06
2215 Script Info: | Not valid after: 2020-05-16T00:01:06
2216 Script Info: | MD5: 9227 6c74 5a16 9708 99d0 d7de 4456 a192
2217 Script Info: |_SHA-1: c4e9 252e 099a ddee 98fa ef2d 125b 8e12 2a71 03a4
2218 Script Info: |_ssl-date: TLS randomness does not represent time
2219 Port: 995/tcp open ssl/pop3 syn-ack ttl 48 Dovecot pop3d
2220 Script Info: |_pop3-capabilities: SASL(PLAIN LOGIN) USER TOP RESP-CODES AUTH-RESP-CODE CAPA PIPELINING UIDL
2221 Script Info: | ssl-cert: Subject: commonName=box.isp-email.net
2222 Script Info: | Subject Alternative Name: DNS:box.isp-email.net
2223 Script Info: | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
2224 Script Info: | Public Key type: rsa
2225 Script Info: | Public Key bits: 2048
2226 Script Info: | Signature Algorithm: sha256WithRSAEncryption
2227 Script Info: | Not valid before: 2020-02-16T00:01:06
2228 Script Info: | Not valid after: 2020-05-16T00:01:06
2229 Script Info: | MD5: 9227 6c74 5a16 9708 99d0 d7de 4456 a192
2230 Script Info: |_SHA-1: c4e9 252e 099a ddee 98fa ef2d 125b 8e12 2a71 03a4
2231 Script Info: |_ssl-date: TLS randomness does not represent time
2232 Os Info: Host: box.isp-email.net; OS: Linux; CPE: cpe:/o:linux:linux_kernel
2233
2234--------------End Summary --------------
2235-----------------------------------------
2236#########################################################################################################################
2237----- boywiki.org -----
2238
2239
2240Host's addresses:
2241__________________
2242
2243boywiki.org. 1800 IN A 82.94.228.252
2244
2245
2246Name Servers:
2247______________
2248
2249ns2.fscodns.net. 4 IN A 88.80.6.203
2250ns1.fscodns.net. 4 IN A 82.94.222.130
2251ns3.fscodns.net. 4 IN A 82.94.228.252
2252
2253
2254Mail (MX) Servers:
2255___________________
2256
2257box.isp-email.net. 3486 IN A 185.250.106.93
2258
2259
2260
2261
2262Brute forcing with /usr/share/dnsenum/dns.txt:
2263_______________________________________________
2264
2265fr.boywiki.org. 1800 IN A 82.94.228.252
2266mail.boywiki.org. 1800 IN A 82.94.228.252
2267www.boywiki.org. 1046 IN A 82.94.228.252
2268
2269
2270Launching Whois Queries:
2271_________________________
2272
2273 whois ip result: 82.94.228.0 -> 82.94.228.0/27
2274
2275
2276boywiki.org___________
2277
2278 82.94.228.0/27
2279#########################################################################################################################
2280URLCrazy Domain Report
2281Domain : www.boywiki.org
2282Keyboard : qwerty
2283At : 2020-03-24 17:09:54 -0400
2284
2285# Please wait. 159 hostnames to process
2286
2287Typo Type Typo DNS-A CC-A DNS-MX Extn
2288-------------------------------------------------------------------------------------------------------------
2289Character Omission ww.boywiki.org ? org
2290Character Omission www.bowiki.org ? org
2291Character Omission www.boyiki.org ? org
2292Character Omission www.boywii.org ? org
2293Character Omission www.boywik.org ? org
2294Character Omission www.boywki.org ? org
2295Character Omission www.bywiki.org ? org
2296Character Omission www.oywiki.org ? org
2297Character Omission wwwboywiki.org ? org
2298Character Repeat www.bboywiki.org ? org
2299Character Repeat www.booywiki.org ? org
2300Character Repeat www.boywiiki.org ? org
2301Character Repeat www.boywikii.org ? org
2302Character Repeat www.boywikki.org ? org
2303Character Repeat www.boywwiki.org ? org
2304Character Repeat www.boyywiki.org ? org
2305Character Repeat wwww.boywiki.org ? org
2306Character Swap ww.wboywiki.org ? org
2307Character Swap www.bowyiki.org ? org
2308Character Swap www.boyiwki.org ? org
2309Character Swap www.boywiik.org ? org
2310Character Swap www.boywkii.org ? org
2311Character Swap www.byowiki.org ? org
2312Character Swap www.obywiki.org ? org
2313Character Swap wwwb.oywiki.org ? org
2314Character Replacement eww.boywiki.org ? org
2315Character Replacement qww.boywiki.org ? org
2316Character Replacement wew.boywiki.org ? org
2317Character Replacement wqw.boywiki.org ? org
2318Character Replacement wwe.boywiki.org ? org
2319Character Replacement wwq.boywiki.org ? org
2320Character Replacement www.biywiki.org ? org
2321Character Replacement www.botwiki.org 107.170.4.146 org
2322Character Replacement www.bouwiki.org ? org
2323Character Replacement www.boyeiki.org ? org
2324Character Replacement www.boyqiki.org ? org
2325Character Replacement www.boywiji.org ? org
2326Character Replacement www.boywiko.org ? org
2327Character Replacement www.boywiku.org ? org
2328Character Replacement www.boywili.org ? org
2329Character Replacement www.boywoki.org ? org
2330Character Replacement www.boywuki.org ? org
2331Character Replacement www.bpywiki.org ? org
2332Character Replacement www.noywiki.org ? org
2333Character Replacement www.voywiki.org ? org
2334Double Character Replacement eew.boywiki.org ? org
2335Double Character Replacement qqw.boywiki.org ? org
2336Double Character Replacement wee.boywiki.org ? org
2337Double Character Replacement wqq.boywiki.org ? org
2338Character Insertion weww.boywiki.org ? org
2339Character Insertion wqww.boywiki.org ? org
2340Character Insertion wwew.boywiki.org ? org
2341Character Insertion wwqw.boywiki.org ? org
2342Character Insertion www.bnoywiki.org ? org
2343Character Insertion www.boiywiki.org ? org
2344Character Insertion www.bopywiki.org ? org
2345Character Insertion www.boytwiki.org ? org
2346Character Insertion www.boyuwiki.org ? org
2347Character Insertion www.boyweiki.org ? org
2348Character Insertion www.boywikio.org ? org
2349Character Insertion www.boywikiu.org ? org
2350Character Insertion www.boywikji.org ? org
2351Character Insertion www.boywikli.org ? org
2352Character Insertion www.boywioki.org ? org
2353Character Insertion www.boywiuki.org ? org
2354Character Insertion www.boywqiki.org ? org
2355Character Insertion www.bvoywiki.org ? org
2356Character Insertion wwwe.boywiki.org ? org
2357Character Insertion wwwq.boywiki.org ? org
2358Missing Dot wwwwww.boywiki.org ? org
2359Singular or Pluralise boywiki.org 82.94.228.252 NL,NETHERLANDS box.isp-email.net org
2360Singular or Pluralise boywikis.org ? org
2361Vowel Swap www.boywaka.org ? org
2362Vowel Swap www.boyweke.org ? org
2363Vowel Swap www.boywoko.org ? org
2364Vowel Swap www.boywuku.org ? org
2365Homophones www.boywayekaye.org ? org
2366Homophones www.boyweyekeye.org ? org
2367Homophones www.buoywiki.org ? org
2368Bit Flipping 7ww.boywiki.org ? org
2369Bit Flipping gww.boywiki.org ? org
2370Bit Flipping sww.boywiki.org ? org
2371Bit Flipping uww.boywiki.org ? org
2372Bit Flipping vww.boywiki.org ? org
2373Bit Flipping w7w.boywiki.org ? org
2374Bit Flipping wgw.boywiki.org ? org
2375Bit Flipping wsw.boywiki.org ? org
2376Bit Flipping wuw.boywiki.org ? org
2377Bit Flipping wvw.boywiki.org ? org
2378Bit Flipping ww7.boywiki.org ? org
2379Bit Flipping wwg.boywiki.org ? org
2380Bit Flipping wws.boywiki.org ? org
2381Bit Flipping wwu.boywiki.org ? org
2382Bit Flipping wwv.boywiki.org ? org
2383Bit Flipping www.bgywiki.org ? org
2384Bit Flipping www.bkywiki.org ? org
2385Bit Flipping www.bmywiki.org ? org
2386Bit Flipping www.bnywiki.org ? org
2387Bit Flipping www.bo9wiki.org ? org
2388Bit Flipping www.boiwiki.org ? org
2389Bit Flipping www.boqwiki.org ? org
2390Bit Flipping www.boxwiki.org ? org
2391Bit Flipping www.boy7iki.org ? org
2392Bit Flipping www.boygiki.org ? org
2393Bit Flipping www.boysiki.org ? org
2394Bit Flipping www.boyuiki.org ? org
2395Bit Flipping www.boyviki.org ? org
2396Bit Flipping www.boywaki.org ? org
2397Bit Flipping www.boywhki.org ? org
2398Bit Flipping www.boywici.org ? org
2399Bit Flipping www.boywiii.org ? org
2400Bit Flipping www.boywika.org ? org
2401Bit Flipping www.boywikh.org ? org
2402Bit Flipping www.boywikk.org ? org
2403Bit Flipping www.boywikm.org ? org
2404Bit Flipping www.boywiky.org ? org
2405Bit Flipping www.boywioi.org ? org
2406Bit Flipping www.boywkki.org ? org
2407Bit Flipping www.boywmki.org ? org
2408Bit Flipping www.boywyki.org ? org
2409Bit Flipping www.coywiki.org ? org
2410Bit Flipping www.foywiki.org ? org
2411Bit Flipping www.joywiki.org ? org
2412Bit Flipping www.roywiki.org ? org
2413Bit Flipping wwwnboywiki.org ? org
2414Homoglyphs vvvvvv.boyvviki.org ? org
2415Homoglyphs vvvvvv.boywiki.org ? org
2416Homoglyphs vvvvw.boyvviki.org ? org
2417Homoglyphs vvvvw.boywiki.org ? org
2418Homoglyphs vvwvv.boyvviki.org ? org
2419Homoglyphs vvwvv.boywiki.org ? org
2420Homoglyphs vvww.boyvviki.org ? org
2421Homoglyphs vvww.boywiki.org ? org
2422Homoglyphs wvvvv.boyvviki.org ? org
2423Homoglyphs wvvvv.boywiki.org ? org
2424Homoglyphs wvvw.boyvviki.org ? org
2425Homoglyphs wvvw.boywiki.org ? org
2426Homoglyphs wwvv.boyvviki.org ? org
2427Homoglyphs wwvv.boywiki.org ? org
2428Homoglyphs www.b0ywiki.org ? org
2429Homoglyphs www.boyvviki.org ? org
2430Homoglyphs www.boywikl.org ? org
2431Homoglyphs www.boywlki.org ? org
2432Homoglyphs www.boywlkl.org ? org
2433Wrong TLD boywiki.ca ? ca
2434Wrong TLD boywiki.ch ? ch
2435Wrong TLD boywiki.com 23.20.239.12 US,UNITED STATES com
2436Wrong TLD boywiki.de ? de
2437Wrong TLD boywiki.edu ? edu
2438Wrong TLD boywiki.es ? es
2439Wrong TLD boywiki.fr ? fr
2440Wrong TLD boywiki.it ? it
2441Wrong TLD boywiki.jp ? jp
2442Wrong TLD boywiki.net ? net
2443Wrong TLD boywiki.nl ? nl
2444Wrong TLD boywiki.no ? no
2445Wrong TLD boywiki.ru ? ru
2446Wrong TLD boywiki.se ? se
2447Wrong TLD boywiki.us ? us
2448#########################################################################################################################
2449ipce.info
2450ahs-online.de
2451pedofili.eu
2452stichtingbcco.com
2453tegenwicht.net
2454darkspeak.org
2455pedofilie.be
2456pedofilie.nl
2457newgon.net
2458frankvrijman.nl
2459pnvd.nl
2460boywiki.org
2461jorisoost.nl
2462paedo-portal.de
2463jgaa.biz
2464jgaa.com
2465freediscussion.org
2466ipce.org
2467brongersma.info
2468erase.be
2469tegenwicht.org
2470#########################################################################################################################
2471[+] www.boywiki.org has no SPF record!
2472[*] No DMARC record found. Looking for organizational record
2473[+] No organizational DMARC record
2474[+] Spoofing possible for www.boywiki.org!
2475########################################################################################################################
2476WARNING: Duplicate port number(s) specified. Are you alert enough to be using Nmap? Have some coffee or Jolt(tm).
2477Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-24 17:14 EDT
2478Nmap scan report for www.boywiki.org (82.94.228.252)
2479Host is up (0.18s latency).
2480Not shown: 487 filtered ports
2481Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
2482PORT STATE SERVICE
248325/tcp open smtp
248480/tcp open http
2485110/tcp open pop3
2486143/tcp open imap
2487443/tcp open https
2488587/tcp open submission
2489993/tcp open imaps
2490995/tcp open pop3s
249110000/tcp open snet-sensor-mgmt
2492
2493Nmap done: 1 IP address (1 host up) scanned in 6.39 seconds
2494#########################################################################################################################
2495Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-24 17:14 EDT
2496Nmap scan report for www.boywiki.org (82.94.228.252)
2497Host is up (0.18s latency).
2498Not shown: 1 closed port
2499PORT STATE SERVICE
250053/udp open|filtered domain
250167/udp open|filtered dhcps
250268/udp open|filtered dhcpc
250369/udp open|filtered tftp
250488/udp open|filtered kerberos-sec
2505123/udp open|filtered ntp
2506137/udp open|filtered netbios-ns
2507138/udp open|filtered netbios-dgm
2508139/udp open|filtered netbios-ssn
2509161/udp open|filtered snmp
2510162/udp open|filtered snmptrap
2511389/udp open|filtered ldap
2512520/udp open|filtered route
25132049/udp open|filtered nfs
2514
2515Nmap done: 1 IP address (1 host up) scanned in 4.50 seconds
2516#########################################################################################################################
2517Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-24 17:14 EDT
2518NSE: Loaded 55 scripts for scanning.
2519NSE: Script Pre-scanning.
2520Initiating NSE at 17:14
2521Completed NSE at 17:14, 0.00s elapsed
2522Initiating NSE at 17:14
2523Completed NSE at 17:14, 0.00s elapsed
2524Initiating Parallel DNS resolution of 1 host. at 17:14
2525Completed Parallel DNS resolution of 1 host. at 17:14, 0.07s elapsed
2526Initiating SYN Stealth Scan at 17:14
2527Scanning www.boywiki.org (82.94.228.252) [1 port]
2528Discovered open port 25/tcp on 82.94.228.252
2529Completed SYN Stealth Scan at 17:14, 0.24s elapsed (1 total ports)
2530Initiating Service scan at 17:14
2531Scanning 1 service on www.boywiki.org (82.94.228.252)
2532Completed Service scan at 17:14, 0.47s elapsed (1 service on 1 host)
2533Initiating OS detection (try #1) against www.boywiki.org (82.94.228.252)
2534Retrying OS detection (try #2) against www.boywiki.org (82.94.228.252)
2535Initiating Traceroute at 17:14
2536Completed Traceroute at 17:14, 3.09s elapsed
2537Initiating Parallel DNS resolution of 13 hosts. at 17:14
2538Completed Parallel DNS resolution of 13 hosts. at 17:14, 0.48s elapsed
2539NSE: Script scanning 82.94.228.252.
2540Initiating NSE at 17:14
2541Completed NSE at 17:15, 28.32s elapsed
2542Initiating NSE at 17:15
2543Completed NSE at 17:15, 0.00s elapsed
2544Nmap scan report for www.boywiki.org (82.94.228.252)
2545Host is up (0.18s latency).
2546
2547PORT STATE SERVICE VERSION
254825/tcp open smtp Postfix smtpd
2549|_smtp-commands: mail.boywiki.org, PIPELINING, SIZE 30720000, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN,
2550| smtp-enum-users:
2551|_ Method RCPT returned a unhandled status code.
2552|_smtp-open-relay: Server doesn't seem to be an open relay, all tests failed
2553| smtp-vuln-cve2010-4344:
2554|_ The SMTP server is not Exim: NOT VULNERABLE
2555Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2556Aggressive OS guesses: Linux 2.6.32 - 3.1 (92%), OpenWrt 12.09-rc1 Attitude Adjustment (Linux 3.3 - 3.7) (92%), Linux 3.2 (92%), Linux 3.2 - 3.10 (92%), Linux 3.2 - 3.16 (92%), Linux 3.2 - 3.8 (92%), Linux 3.8 (92%), XBMCbuntu Frodo v12.2 (Linux 3.X) (92%), Olivetti 65C-9 printer (92%), Linux 2.6.32 - 3.10 (92%)
2557No exact OS matches for host (test conditions non-ideal).
2558Uptime guess: 61.160 days (since Thu Jan 23 12:25:28 2020)
2559Network Distance: 14 hops
2560TCP Sequence Prediction: Difficulty=262 (Good luck!)
2561IP ID Sequence Generation: All zeros
2562Service Info: Host: mail.boywiki.org
2563
2564TRACEROUTE (using port 25/tcp)
2565HOP RTT ADDRESS
25661 69.55 ms 10.203.3.1
25672 70.52 ms 161.129.68.81.static.quadranet.com (161.129.68.81)
25683 86.73 ms br1.dal.as8100.net (96.44.144.17)
25694 76.14 ms be5814.rcr21.b010621-0.dfw01.atlas.cogentco.com (38.122.58.57)
25705 72.77 ms be2560.ccr31.dfw01.atlas.cogentco.com (154.54.5.237)
25716 76.99 ms be2432.ccr21.mci01.atlas.cogentco.com (154.54.3.134)
25727 93.87 ms be2832.ccr42.ord01.atlas.cogentco.com (154.54.44.170)
25738 95.21 ms be2766.ccr41.ord03.atlas.cogentco.com (154.54.46.178)
25749 96.59 ms kpn.ord03.atlas.cogentco.com (154.54.11.22)
257510 200.02 ms asd-s8-rou-1041.NL.eurorings.net (134.222.48.91)
257611 ...
257712 183.05 ms 0.et-3-1-0.xr3.3d12.xs4all.net (194.109.5.6)
257813 184.11 ms 0.ae10.xrc1.1d12.xs4all.net (194.109.5.58)
257914 182.46 ms 82.94.228.252
2580
2581NSE: Script Post-scanning.
2582Initiating NSE at 17:15
2583Completed NSE at 17:15, 0.00s elapsed
2584Initiating NSE at 17:15
2585Completed NSE at 17:15, 0.00s elapsed
2586#########################################################################################################################
2587HTTP/1.1 301 Moved Permanently
2588Server: nginx
2589Date: Tue, 24 Mar 2020 21:21:13 GMT
2590Content-Type: text/html
2591Content-Length: 178
2592Connection: keep-alive
2593Location: https://www.boywiki.org/
2594#########################################################################################################################
2595/de
2596/en
2597/fr
2598https://boywrite.ivan.net/
2599https://freespirits.org/
2600https://legarcon.net/
2601https://lifeline.ivan.net/
2602https://www.boychat.org/
2603https://www.boylinks.net/
2604https://www.castilloazul.org/
2605https://www.freespirits.org/
2606https://www.jongensforum.net/
2607https://www.jungsforum.net/
2608https://www.pedagora.com/
2609images/boywiki-banner.jpg
2610#########################################################################################################################
2611http://www.boywiki.org [301 Moved Permanently] Country[NETHERLANDS][NL], HTTPServer[nginx], IP[82.94.228.252], RedirectLocation[https://www.boywiki.org/], Title[301 Moved Permanently], nginx
2612https://www.boywiki.org/ [200 OK] Country[NETHERLANDS][NL], HTML5, HTTPServer[nginx], IP[82.94.228.252], Title[BoyWiki], nginx
2613#########################################################################################################################
2614
2615wig - WebApp Information Gatherer
2616
2617
2618Scanning https://www.boywiki.org...
2619_____________________ SITE INFO _____________________
2620IP Title
262182.94.228.252 BoyWiki
2622
2623______________________ VERSION ______________________
2624Name Versions Type
2625PHP 5.4.45-0+deb7u9 Platform
2626nginx Platform
2627
2628____________________ INTERESTING ____________________
2629URL Note Type
2630/robots.txt robots.txt index Interesting
2631
2632_____________________________________________________
2633Time: 93.5 sec Urls: 609 Fingerprints: 40401
2634#########################################################################################################################
2635Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-24 17:23 EDT
2636NSE: Loaded 161 scripts for scanning.
2637NSE: Script Pre-scanning.
2638Initiating NSE at 17:23
2639Completed NSE at 17:23, 0.00s elapsed
2640Initiating NSE at 17:23
2641Completed NSE at 17:23, 0.00s elapsed
2642Initiating Parallel DNS resolution of 1 host. at 17:23
2643Completed Parallel DNS resolution of 1 host. at 17:23, 0.06s elapsed
2644Initiating SYN Stealth Scan at 17:23
2645Scanning www.boywiki.org (82.94.228.252) [1 port]
2646Discovered open port 80/tcp on 82.94.228.252
2647Completed SYN Stealth Scan at 17:23, 0.21s elapsed (1 total ports)
2648Initiating Service scan at 17:23
2649Scanning 1 service on www.boywiki.org (82.94.228.252)
2650Completed Service scan at 17:23, 6.37s elapsed (1 service on 1 host)
2651Initiating OS detection (try #1) against www.boywiki.org (82.94.228.252)
2652Retrying OS detection (try #2) against www.boywiki.org (82.94.228.252)
2653Initiating Traceroute at 17:23
2654Completed Traceroute at 17:23, 3.08s elapsed
2655Initiating Parallel DNS resolution of 12 hosts. at 17:23
2656Completed Parallel DNS resolution of 12 hosts. at 17:23, 0.43s elapsed
2657NSE: Script scanning 82.94.228.252.
2658Initiating NSE at 17:23
2659Completed NSE at 17:24, 40.43s elapsed
2660Initiating NSE at 17:24
2661Completed NSE at 17:24, 0.76s elapsed
2662Nmap scan report for www.boywiki.org (82.94.228.252)
2663Host is up (0.18s latency).
2664
2665PORT STATE SERVICE VERSION
266680/tcp open http nginx
2667| http-brute:
2668|_ Path "/" does not require authentication
2669|_http-chrono: Request times for /; avg: 487.24ms; min: 429.77ms; max: 546.97ms
2670|_http-csrf: Couldn't find any CSRF vulnerabilities.
2671|_http-date: Tue, 24 Mar 2020 21:23:32 GMT; -1s from local time.
2672|_http-devframework: Couldn't determine the underlying framework or CMS. Try increasing 'httpspider.maxpagecount' value to spider more pages.
2673|_http-dombased-xss: Couldn't find any DOM based XSS.
2674|_http-drupal-enum: Nothing found amongst the top 100 resources,use --script-args number=<number|all> for deeper analysis)
2675|_http-errors: Couldn't find any error pages.
2676|_http-feed: Couldn't find any feeds.
2677|_http-fetch: Please enter the complete path of the directory to save data in.
2678| http-headers:
2679| Server: nginx
2680| Date: Tue, 24 Mar 2020 21:23:35 GMT
2681| Content-Type: text/html
2682| Content-Length: 178
2683| Connection: close
2684| Location: https://www.boywiki.org/
2685|
2686|_ (Request type: GET)
2687|_http-jsonp-detection: Couldn't find any JSONP endpoints.
2688| http-methods:
2689|_ Supported Methods: GET HEAD POST OPTIONS
2690|_http-mobileversion-checker: No mobile version detected.
2691|_http-passwd: ERROR: Script execution failed (use -d to debug)
2692|_http-security-headers:
2693| http-sitemap-generator:
2694| Directory structure:
2695| Longest directory structure:
2696| Depth: 0
2697| Dir: /
2698| Total files found (by extension):
2699|_
2700|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
2701|_http-title: Did not follow redirect to https://www.boywiki.org/
2702| http-vhosts:
2703| 125 names had status 404
2704| en.boywiki.org : 301 -> https://www.boywiki.org/en/
2705|_www.boywiki.org : 301 -> https://www.boywiki.org/
2706|_http-wordpress-enum: Nothing found amongst the top 100 resources,use --script-args search-limit=<number|all> for deeper analysis)
2707|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
2708|_http-xssed: No previously reported XSS vuln.
2709Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2710Aggressive OS guesses: Linux 3.2 - 3.16 (92%), Linux 2.6.32 - 3.10 (92%), Linux 2.6.32 - 3.13 (92%), Linux 2.6.32 - 3.9 (92%), Linux 3.5 (91%), Linux 2.6.32 - 3.1 (90%), OpenWrt 12.09-rc1 Attitude Adjustment (Linux 3.3 - 3.7) (90%), Linux 3.2 (90%), Linux 3.2 - 3.10 (90%), Linux 3.2 - 3.8 (90%)
2711No exact OS matches for host (test conditions non-ideal).
2712Uptime guess: 61.166 days (since Thu Jan 23 12:25:28 2020)
2713Network Distance: 14 hops
2714TCP Sequence Prediction: Difficulty=259 (Good luck!)
2715IP ID Sequence Generation: All zeros
2716
2717TRACEROUTE (using port 80/tcp)
2718HOP RTT ADDRESS
27191 62.90 ms 10.203.3.1
27202 ...
27213 71.08 ms br1.dal.as8100.net (96.44.144.17)
27224 71.51 ms be5814.rcr21.b010621-0.dfw01.atlas.cogentco.com (38.122.58.57)
27235 72.13 ms be2560.ccr31.dfw01.atlas.cogentco.com (154.54.5.237)
27246 70.94 ms be2432.ccr21.mci01.atlas.cogentco.com (154.54.3.134)
27257 93.53 ms be2832.ccr42.ord01.atlas.cogentco.com (154.54.44.170)
27268 94.36 ms be2766.ccr41.ord03.atlas.cogentco.com (154.54.46.178)
27279 83.97 ms kpn.ord03.atlas.cogentco.com (154.54.11.22)
272810 205.02 ms asd-s8-rou-1041.NL.eurorings.net (134.222.48.91)
272911 ...
273012 191.48 ms 0.et-3-1-0.xr3.3d12.xs4all.net (194.109.5.6)
273113 176.04 ms 0.ae10.xrc2.3d12.xs4all.net (194.109.5.118)
273214 178.86 ms 82.94.228.252
2733
2734NSE: Script Post-scanning.
2735Initiating NSE at 17:24
2736Completed NSE at 17:24, 0.00s elapsed
2737Initiating NSE at 17:24
2738Completed NSE at 17:24, 0.00s elapsed
2739#########################################################################################################################
2740------------------------------------------------------------------------------------------------------------------------
2741
2742[ ! ] Starting SCANNER INURLBR 2.1 at [24-03-2020 17:24:36]
2743[ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
2744It is the end user's responsibility to obey all applicable local, state and federal laws.
2745Developers assume no liability and are not responsible for any misuse or damage caused by this program
2746
2747[ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.boywiki.org/output/inurlbr-www.boywiki.org ]
2748[ INFO ][ DORK ]::[ site:www.boywiki.org ]
2749[ INFO ][ SEARCHING ]:: {
2750[ INFO ][ ENGINE ]::[ GOOGLE - www.google.com.mt ]
2751
2752[ INFO ][ SEARCHING ]::
2753-[:::]
2754[ INFO ][ ENGINE ]::[ GOOGLE API ]
2755
2756[ INFO ][ SEARCHING ]::
2757-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
2758[ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.gg ID: 002901626849897788481:cpnctza84gq ]
2759
2760[ INFO ][ SEARCHING ]::
2761-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
2762
2763[ INFO ][ TOTAL FOUND VALUES ]:: [ 100 ]
2764
2765
2766 _[ - ]::--------------------------------------------------------------------------------------------------------------
2767|_[ + ] [ 0 / 100 ]-[17:24:52] [ - ]
2768|_[ + ] Target:: [ https://www.boywiki.org/ ]
2769|_[ + ] Exploit::
2770|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:82.94.228.252:443
2771|_[ + ] More details:: / - / , ISP:
2772|_[ + ] Found:: UNIDENTIFIED
2773
2774 _[ - ]::--------------------------------------------------------------------------------------------------------------
2775|_[ + ] [ 1 / 100 ]-[17:24:53] [ - ]
2776|_[ + ] Target:: [ https://www.boywiki.org/fr/Le_prêtre_et_l’enfant_de_chœur_–_2e_partie ]
2777|_[ + ] Exploit::
2778|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
2779|_[ + ] More details:: / - / , ISP:
2780|_[ + ] Found:: UNIDENTIFIED
2781
2782 _[ - ]::--------------------------------------------------------------------------------------------------------------
2783|_[ + ] [ 2 / 100 ]-[17:24:55] [ - ]
2784|_[ + ] Target:: [ https://www.boywiki.org/fr/13_décembre ]
2785|_[ + ] Exploit::
2786|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
2787|_[ + ] More details:: / - / , ISP:
2788|_[ + ] Found:: UNIDENTIFIED
2789
2790 _[ - ]::--------------------------------------------------------------------------------------------------------------
2791|_[ + ] [ 3 / 100 ]-[17:24:57] [ - ]
2792|_[ + ] Target:: [ https://www.boywiki.org/en/Insider_Video_Club ]
2793|_[ + ] Exploit::
2794|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
2795|_[ + ] More details:: / - / , ISP:
2796|_[ + ] Found:: UNIDENTIFIED
2797
2798 _[ - ]::--------------------------------------------------------------------------------------------------------------
2799|_[ + ] [ 4 / 100 ]-[17:24:59] [ - ]
2800|_[ + ] Target:: [ https://www.boywiki.org/de/Therapie ]
2801|_[ + ] Exploit::
2802|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
2803|_[ + ] More details:: / - / , ISP:
2804|_[ + ] Found:: UNIDENTIFIED
2805
2806 _[ - ]::--------------------------------------------------------------------------------------------------------------
2807|_[ + ] [ 5 / 100 ]-[17:25:01] [ - ]
2808|_[ + ] Target:: [ https://www.boywiki.org/en/Philippines ]
2809|_[ + ] Exploit::
2810|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
2811|_[ + ] More details:: / - / , ISP:
2812|_[ + ] Found:: UNIDENTIFIED
2813
2814 _[ - ]::--------------------------------------------------------------------------------------------------------------
2815|_[ + ] [ 6 / 100 ]-[17:25:03] [ - ]
2816|_[ + ] Target:: [ https://www.boywiki.org/en/Freedom_of_speech ]
2817|_[ + ] Exploit::
2818|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
2819|_[ + ] More details:: / - / , ISP:
2820|_[ + ] Found:: UNIDENTIFIED
2821
2822 _[ - ]::--------------------------------------------------------------------------------------------------------------
2823|_[ + ] [ 7 / 100 ]-[17:25:05] [ - ]
2824|_[ + ] Target:: [ https://www.boywiki.org/fr/John_Henry_Mackay ]
2825|_[ + ] Exploit::
2826|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
2827|_[ + ] More details:: / - / , ISP:
2828|_[ + ] Found:: UNIDENTIFIED
2829
2830 _[ - ]::--------------------------------------------------------------------------------------------------------------
2831|_[ + ] [ 8 / 100 ]-[17:25:07] [ - ]
2832|_[ + ] Target:: [ https://www.boywiki.org/fr/Bataille_contre_Genet ]
2833|_[ + ] Exploit::
2834|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
2835|_[ + ] More details:: / - / , ISP:
2836|_[ + ] Found:: UNIDENTIFIED
2837
2838 _[ - ]::--------------------------------------------------------------------------------------------------------------
2839|_[ + ] [ 9 / 100 ]-[17:25:08] [ - ]
2840|_[ + ] Target:: [ https://www.boywiki.org/fr/Génie ]
2841|_[ + ] Exploit::
2842|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
2843|_[ + ] More details:: / - / , ISP:
2844|_[ + ] Found:: UNIDENTIFIED
2845
2846 _[ - ]::--------------------------------------------------------------------------------------------------------------
2847|_[ + ] [ 10 / 100 ]-[17:25:10] [ - ]
2848|_[ + ] Target:: [ https://www.boywiki.org/en/Gold_Cup ]
2849|_[ + ] Exploit::
2850|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
2851|_[ + ] More details:: / - / , ISP:
2852|_[ + ] Found:: UNIDENTIFIED
2853
2854 _[ - ]::--------------------------------------------------------------------------------------------------------------
2855|_[ + ] [ 11 / 100 ]-[17:25:12] [ - ]
2856|_[ + ] Target:: [ https://www.boywiki.org/fr/Gabriel_Matzneff ]
2857|_[ + ] Exploit::
2858|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
2859|_[ + ] More details:: / - / , ISP:
2860|_[ + ] Found:: UNIDENTIFIED
2861
2862 _[ - ]::--------------------------------------------------------------------------------------------------------------
2863|_[ + ] [ 12 / 100 ]-[17:25:14] [ - ]
2864|_[ + ] Target:: [ https://www.boywiki.org/en/Jokes ]
2865|_[ + ] Exploit::
2866|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
2867|_[ + ] More details:: / - / , ISP:
2868|_[ + ] Found:: UNIDENTIFIED
2869
2870 _[ - ]::--------------------------------------------------------------------------------------------------------------
2871|_[ + ] [ 13 / 100 ]-[17:25:17] [ - ]
2872|_[ + ] Target:: [ https://www.boywiki.org/en/A_History_of_BoyChat_by_Alexis ]
2873|_[ + ] Exploit::
2874|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
2875|_[ + ] More details:: / - / , ISP:
2876|_[ + ] Found:: UNIDENTIFIED
2877
2878 _[ - ]::--------------------------------------------------------------------------------------------------------------
2879|_[ + ] [ 14 / 100 ]-[17:25:20] [ - ]
2880|_[ + ] Target:: [ https://www.boywiki.org/en/Rhadamanthus ]
2881|_[ + ] Exploit::
2882|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
2883|_[ + ] More details:: / - / , ISP:
2884|_[ + ] Found:: UNIDENTIFIED
2885
2886 _[ - ]::--------------------------------------------------------------------------------------------------------------
2887|_[ + ] [ 15 / 100 ]-[17:25:22] [ - ]
2888|_[ + ] Target:: [ https://www.boywiki.org/en/The_pool_with_the_cinderblock_walls ]
2889|_[ + ] Exploit::
2890|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
2891|_[ + ] More details:: / - / , ISP:
2892|_[ + ] Found:: UNIDENTIFIED
2893
2894 _[ - ]::--------------------------------------------------------------------------------------------------------------
2895|_[ + ] [ 16 / 100 ]-[17:25:26] [ - ]
2896|_[ + ] Target:: [ https://www.boywiki.org/en/Commodus ]
2897|_[ + ] Exploit::
2898|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
2899|_[ + ] More details:: / - / , ISP:
2900|_[ + ] Found:: UNIDENTIFIED
2901
2902 _[ - ]::--------------------------------------------------------------------------------------------------------------
2903|_[ + ] [ 17 / 100 ]-[17:25:28] [ - ]
2904|_[ + ] Target:: [ https://www.boywiki.org/fr/Roger_Peyrefitte ]
2905|_[ + ] Exploit::
2906|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
2907|_[ + ] More details:: / - / , ISP:
2908|_[ + ] Found:: UNIDENTIFIED
2909
2910 _[ - ]::--------------------------------------------------------------------------------------------------------------
2911|_[ + ] [ 18 / 100 ]-[17:25:31] [ - ]
2912|_[ + ] Target:: [ https://www.boywiki.org/fr/22_janvier ]
2913|_[ + ] Exploit::
2914|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
2915|_[ + ] More details:: / - / , ISP:
2916|_[ + ] Found:: UNIDENTIFIED
2917
2918 _[ - ]::--------------------------------------------------------------------------------------------------------------
2919|_[ + ] [ 19 / 100 ]-[17:25:32] [ - ]
2920|_[ + ] Target:: [ https://www.boywiki.org/fr/Bibliographie_garçonnière_–_L ]
2921|_[ + ] Exploit::
2922|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
2923|_[ + ] More details:: / - / , ISP:
2924|_[ + ] Found:: UNIDENTIFIED
2925
2926 _[ - ]::--------------------------------------------------------------------------------------------------------------
2927|_[ + ] [ 20 / 100 ]-[17:25:34] [ - ]
2928|_[ + ] Target:: [ https://www.boywiki.org/en/Paperboy ]
2929|_[ + ] Exploit::
2930|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
2931|_[ + ] More details:: / - / , ISP:
2932|_[ + ] Found:: UNIDENTIFIED
2933
2934 _[ - ]::--------------------------------------------------------------------------------------------------------------
2935|_[ + ] [ 21 / 100 ]-[17:25:36] [ - ]
2936|_[ + ] Target:: [ https://www.boywiki.org/en/Gil_Hardwick ]
2937|_[ + ] Exploit::
2938|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
2939|_[ + ] More details:: / - / , ISP:
2940|_[ + ] Found:: UNIDENTIFIED
2941
2942 _[ - ]::--------------------------------------------------------------------------------------------------------------
2943|_[ + ] [ 22 / 100 ]-[17:25:37] [ - ]
2944|_[ + ] Target:: [ https://www.boywiki.org/fr/XXe_siècle ]
2945|_[ + ] Exploit::
2946|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
2947|_[ + ] More details:: / - / , ISP:
2948|_[ + ] Found:: UNIDENTIFIED
2949
2950 _[ - ]::--------------------------------------------------------------------------------------------------------------
2951|_[ + ] [ 23 / 100 ]-[17:25:39] [ - ]
2952|_[ + ] Target:: [ https://www.boywiki.org/fr/Couple_pédérastique ]
2953|_[ + ] Exploit::
2954|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
2955|_[ + ] More details:: / - / , ISP:
2956|_[ + ] Found:: UNIDENTIFIED
2957
2958 _[ - ]::--------------------------------------------------------------------------------------------------------------
2959|_[ + ] [ 24 / 100 ]-[17:25:40] [ - ]
2960|_[ + ] Target:: [ https://www.boywiki.org/fr/Comité_d’action_pédérastique_révolutionnaire ]
2961|_[ + ] Exploit::
2962|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
2963|_[ + ] More details:: / - / , ISP:
2964|_[ + ] Found:: UNIDENTIFIED
2965
2966 _[ - ]::--------------------------------------------------------------------------------------------------------------
2967|_[ + ] [ 25 / 100 ]-[17:25:42] [ - ]
2968|_[ + ] Target:: [ https://www.boywiki.org/en/Justin_Berry ]
2969|_[ + ] Exploit::
2970|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
2971|_[ + ] More details:: / - / , ISP:
2972|_[ + ] Found:: UNIDENTIFIED
2973
2974 _[ - ]::--------------------------------------------------------------------------------------------------------------
2975|_[ + ] [ 26 / 100 ]-[17:25:44] [ - ]
2976|_[ + ] Target:: [ https://www.boywiki.org/en/Operation_Rescue ]
2977|_[ + ] Exploit::
2978|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
2979|_[ + ] More details:: / - / , ISP:
2980|_[ + ] Found:: UNIDENTIFIED
2981
2982 _[ - ]::--------------------------------------------------------------------------------------------------------------
2983|_[ + ] [ 27 / 100 ]-[17:25:46] [ - ]
2984|_[ + ] Target:: [ https://www.boywiki.org/fr/Dictons_et_proverbes ]
2985|_[ + ] Exploit::
2986|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
2987|_[ + ] More details:: / - / , ISP:
2988|_[ + ] Found:: UNIDENTIFIED
2989
2990 _[ - ]::--------------------------------------------------------------------------------------------------------------
2991|_[ + ] [ 28 / 100 ]-[17:25:49] [ - ]
2992|_[ + ] Target:: [ https://www.boywiki.org/fr/Femme ]
2993|_[ + ] Exploit::
2994|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
2995|_[ + ] More details:: / - / , ISP:
2996|_[ + ] Found:: UNIDENTIFIED
2997
2998 _[ - ]::--------------------------------------------------------------------------------------------------------------
2999|_[ + ] [ 29 / 100 ]-[17:25:51] [ - ]
3000|_[ + ] Target:: [ https://www.boywiki.org/fr/Willem_Geets ]
3001|_[ + ] Exploit::
3002|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3003|_[ + ] More details:: / - / , ISP:
3004|_[ + ] Found:: UNIDENTIFIED
3005
3006 _[ - ]::--------------------------------------------------------------------------------------------------------------
3007|_[ + ] [ 30 / 100 ]-[17:25:54] [ - ]
3008|_[ + ] Target:: [ https://www.boywiki.org/en/Kottabos ]
3009|_[ + ] Exploit::
3010|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3011|_[ + ] More details:: / - / , ISP:
3012|_[ + ] Found:: UNIDENTIFIED
3013
3014 _[ - ]::--------------------------------------------------------------------------------------------------------------
3015|_[ + ] [ 31 / 100 ]-[17:25:55] [ - ]
3016|_[ + ] Target:: [ https://www.boywiki.org/fr/Sava_Petković ]
3017|_[ + ] Exploit::
3018|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3019|_[ + ] More details:: / - / , ISP:
3020|_[ + ] Found:: UNIDENTIFIED
3021
3022 _[ - ]::--------------------------------------------------------------------------------------------------------------
3023|_[ + ] [ 32 / 100 ]-[17:25:57] [ - ]
3024|_[ + ] Target:: [ https://www.boywiki.org/en/Michigan_Citizens_for_Justice ]
3025|_[ + ] Exploit::
3026|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3027|_[ + ] More details:: / - / , ISP:
3028|_[ + ] Found:: UNIDENTIFIED
3029
3030 _[ - ]::--------------------------------------------------------------------------------------------------------------
3031|_[ + ] [ 33 / 100 ]-[17:26:00] [ - ]
3032|_[ + ] Target:: [ https://www.boywiki.org/fr/1971 ]
3033|_[ + ] Exploit::
3034|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3035|_[ + ] More details:: / - / , ISP:
3036|_[ + ] Found:: UNIDENTIFIED
3037
3038 _[ - ]::--------------------------------------------------------------------------------------------------------------
3039|_[ + ] [ 34 / 100 ]-[17:26:02] [ - ]
3040|_[ + ] Target:: [ https://www.boywiki.org/en/BoyLinks ]
3041|_[ + ] Exploit::
3042|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3043|_[ + ] More details:: / - / , ISP:
3044|_[ + ] Found:: UNIDENTIFIED
3045
3046 _[ - ]::--------------------------------------------------------------------------------------------------------------
3047|_[ + ] [ 35 / 100 ]-[17:26:04] [ - ]
3048|_[ + ] Target:: [ https://www.boywiki.org/en/February_18 ]
3049|_[ + ] Exploit::
3050|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3051|_[ + ] More details:: / - / , ISP:
3052|_[ + ] Found:: UNIDENTIFIED
3053
3054 _[ - ]::--------------------------------------------------------------------------------------------------------------
3055|_[ + ] [ 36 / 100 ]-[17:26:06] [ - ]
3056|_[ + ] Target:: [ https://www.boywiki.org/fr/Internat ]
3057|_[ + ] Exploit::
3058|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3059|_[ + ] More details:: / - / , ISP:
3060|_[ + ] Found:: UNIDENTIFIED
3061
3062 _[ - ]::--------------------------------------------------------------------------------------------------------------
3063|_[ + ] [ 37 / 100 ]-[17:26:08] [ - ]
3064|_[ + ] Target:: [ https://www.boywiki.org/en/Edward_Perry_Warren ]
3065|_[ + ] Exploit::
3066|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3067|_[ + ] More details:: / - / , ISP:
3068|_[ + ] Found:: UNIDENTIFIED
3069
3070 _[ - ]::--------------------------------------------------------------------------------------------------------------
3071|_[ + ] [ 38 / 100 ]-[17:26:11] [ - ]
3072|_[ + ] Target:: [ https://www.boywiki.org/en/Florida_Action_Committee ]
3073|_[ + ] Exploit::
3074|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3075|_[ + ] More details:: / - / , ISP:
3076|_[ + ] Found:: UNIDENTIFIED
3077
3078 _[ - ]::--------------------------------------------------------------------------------------------------------------
3079|_[ + ] [ 39 / 100 ]-[17:26:13] [ - ]
3080|_[ + ] Target:: [ https://www.boywiki.org/en/March_6 ]
3081|_[ + ] Exploit::
3082|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3083|_[ + ] More details:: / - / , ISP:
3084|_[ + ] Found:: UNIDENTIFIED
3085
3086 _[ - ]::--------------------------------------------------------------------------------------------------------------
3087|_[ + ] [ 40 / 100 ]-[17:26:15] [ - ]
3088|_[ + ] Target:: [ https://www.boywiki.org/de/Krumme_13 ]
3089|_[ + ] Exploit::
3090|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3091|_[ + ] More details:: / - / , ISP:
3092|_[ + ] Found:: UNIDENTIFIED
3093
3094 _[ - ]::--------------------------------------------------------------------------------------------------------------
3095|_[ + ] [ 41 / 100 ]-[17:26:17] [ - ]
3096|_[ + ] Target:: [ https://www.boywiki.org/fr/Christian_Mormont ]
3097|_[ + ] Exploit::
3098|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3099|_[ + ] More details:: / - / , ISP:
3100|_[ + ] Found:: UNIDENTIFIED
3101
3102 _[ - ]::--------------------------------------------------------------------------------------------------------------
3103|_[ + ] [ 42 / 100 ]-[17:26:19] [ - ]
3104|_[ + ] Target:: [ https://www.boywiki.org/de/Ralfsches_Gesetz ]
3105|_[ + ] Exploit::
3106|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3107|_[ + ] More details:: / - / , ISP:
3108|_[ + ] Found:: UNIDENTIFIED
3109
3110 _[ - ]::--------------------------------------------------------------------------------------------------------------
3111|_[ + ] [ 43 / 100 ]-[17:26:21] [ - ]
3112|_[ + ] Target:: [ https://www.boywiki.org/fr/Couple_pédérastique_historique ]
3113|_[ + ] Exploit::
3114|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3115|_[ + ] More details:: / - / , ISP:
3116|_[ + ] Found:: UNIDENTIFIED
3117
3118 _[ - ]::--------------------------------------------------------------------------------------------------------------
3119|_[ + ] [ 44 / 100 ]-[17:26:22] [ - ]
3120|_[ + ] Target:: [ https://www.boywiki.org/fr/L’Élu_–_Chapitre_XIX ]
3121|_[ + ] Exploit::
3122|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3123|_[ + ] More details:: / - / , ISP:
3124|_[ + ] Found:: UNIDENTIFIED
3125
3126 _[ - ]::--------------------------------------------------------------------------------------------------------------
3127|_[ + ] [ 45 / 100 ]-[17:26:24] [ - ]
3128|_[ + ] Target:: [ https://www.boywiki.org/en/CRIME_WITHOUT_VICTIMS_A_book_about_paedophilia ]
3129|_[ + ] Exploit::
3130|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3131|_[ + ] More details:: / - / , ISP:
3132|_[ + ] Found:: UNIDENTIFIED
3133
3134 _[ - ]::--------------------------------------------------------------------------------------------------------------
3135|_[ + ] [ 46 / 100 ]-[17:26:26] [ - ]
3136|_[ + ] Target:: [ https://www.boywiki.org/en/Gaston_Goor ]
3137|_[ + ] Exploit::
3138|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3139|_[ + ] More details:: / - / , ISP:
3140|_[ + ] Found:: UNIDENTIFIED
3141
3142 _[ - ]::--------------------------------------------------------------------------------------------------------------
3143|_[ + ] [ 47 / 100 ]-[17:26:28] [ - ]
3144|_[ + ] Target:: [ https://www.boywiki.org/fr/La_sexualité_chez_les_crétins ]
3145|_[ + ] Exploit::
3146|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3147|_[ + ] More details:: / - / , ISP:
3148|_[ + ] Found:: UNIDENTIFIED
3149
3150 _[ - ]::--------------------------------------------------------------------------------------------------------------
3151|_[ + ] [ 48 / 100 ]-[17:26:30] [ - ]
3152|_[ + ] Target:: [ https://www.boywiki.org/fr/Richard_Renvoisy ]
3153|_[ + ] Exploit::
3154|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3155|_[ + ] More details:: / - / , ISP:
3156|_[ + ] Found:: UNIDENTIFIED
3157
3158 _[ - ]::--------------------------------------------------------------------------------------------------------------
3159|_[ + ] [ 49 / 100 ]-[17:26:31] [ - ]
3160|_[ + ] Target:: [ https://www.boywiki.org/fr/L’érotisme_n’est_pas_un_violon_d’Ingres ]
3161|_[ + ] Exploit::
3162|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3163|_[ + ] More details:: / - / , ISP:
3164|_[ + ] Found:: UNIDENTIFIED
3165
3166 _[ - ]::--------------------------------------------------------------------------------------------------------------
3167|_[ + ] [ 50 / 100 ]-[17:26:33] [ - ]
3168|_[ + ] Target:: [ https://www.boywiki.org/en/Boarding_school ]
3169|_[ + ] Exploit::
3170|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3171|_[ + ] More details:: / - / , ISP:
3172|_[ + ] Found:: UNIDENTIFIED
3173
3174 _[ - ]::--------------------------------------------------------------------------------------------------------------
3175|_[ + ] [ 51 / 100 ]-[17:26:35] [ - ]
3176|_[ + ] Target:: [ https://www.boywiki.org/fr/Poèmes_d’Hilaire_d’Orléans ]
3177|_[ + ] Exploit::
3178|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3179|_[ + ] More details:: / - / , ISP:
3180|_[ + ] Found:: UNIDENTIFIED
3181
3182 _[ - ]::--------------------------------------------------------------------------------------------------------------
3183|_[ + ] [ 52 / 100 ]-[17:26:36] [ - ]
3184|_[ + ] Target:: [ https://www.boywiki.org/fr/Boudewijn_Büch ]
3185|_[ + ] Exploit::
3186|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3187|_[ + ] More details:: / - / , ISP:
3188|_[ + ] Found:: UNIDENTIFIED
3189
3190 _[ - ]::--------------------------------------------------------------------------------------------------------------
3191|_[ + ] [ 53 / 100 ]-[17:26:38] [ - ]
3192|_[ + ] Target:: [ https://www.boywiki.org/en/Africa ]
3193|_[ + ] Exploit::
3194|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3195|_[ + ] More details:: / - / , ISP:
3196|_[ + ] Found:: UNIDENTIFIED
3197
3198 _[ - ]::--------------------------------------------------------------------------------------------------------------
3199|_[ + ] [ 54 / 100 ]-[17:26:40] [ - ]
3200|_[ + ] Target:: [ https://www.boywiki.org/fr/Roman_policier ]
3201|_[ + ] Exploit::
3202|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3203|_[ + ] More details:: / - / , ISP:
3204|_[ + ] Found:: UNIDENTIFIED
3205
3206 _[ - ]::--------------------------------------------------------------------------------------------------------------
3207|_[ + ] [ 55 / 100 ]-[17:26:42] [ - ]
3208|_[ + ] Target:: [ https://www.boywiki.org/en/March_8 ]
3209|_[ + ] Exploit::
3210|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3211|_[ + ] More details:: / - / , ISP:
3212|_[ + ] Found:: UNIDENTIFIED
3213
3214 _[ - ]::--------------------------------------------------------------------------------------------------------------
3215|_[ + ] [ 56 / 100 ]-[17:26:46] [ - ]
3216|_[ + ] Target:: [ https://www.boywiki.org/en/Historical_boylove_relationships_in_Japan ]
3217|_[ + ] Exploit::
3218|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3219|_[ + ] More details:: / - / , ISP:
3220|_[ + ] Found:: UNIDENTIFIED
3221
3222 _[ - ]::--------------------------------------------------------------------------------------------------------------
3223|_[ + ] [ 57 / 100 ]-[17:26:47] [ - ]
3224|_[ + ] Target:: [ https://www.boywiki.org/de/I2P ]
3225|_[ + ] Exploit::
3226|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3227|_[ + ] More details:: / - / , ISP:
3228|_[ + ] Found:: UNIDENTIFIED
3229
3230 _[ - ]::--------------------------------------------------------------------------------------------------------------
3231|_[ + ] [ 58 / 100 ]-[17:26:50] [ - ]
3232|_[ + ] Target:: [ https://www.boywiki.org/en/About_Sophocles ]
3233|_[ + ] Exploit::
3234|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3235|_[ + ] More details:: / - / , ISP:
3236|_[ + ] Found:: UNIDENTIFIED
3237
3238 _[ - ]::--------------------------------------------------------------------------------------------------------------
3239|_[ + ] [ 59 / 100 ]-[17:26:52] [ - ]
3240|_[ + ] Target:: [ https://www.boywiki.org/fr/Nicolas_Gombert ]
3241|_[ + ] Exploit::
3242|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3243|_[ + ] More details:: / - / , ISP:
3244|_[ + ] Found:: UNIDENTIFIED
3245
3246 _[ - ]::--------------------------------------------------------------------------------------------------------------
3247|_[ + ] [ 60 / 100 ]-[17:26:54] [ - ]
3248|_[ + ] Target:: [ https://www.boywiki.org/fr/Orphelin ]
3249|_[ + ] Exploit::
3250|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3251|_[ + ] More details:: / - / , ISP:
3252|_[ + ] Found:: UNIDENTIFIED
3253
3254 _[ - ]::--------------------------------------------------------------------------------------------------------------
3255|_[ + ] [ 61 / 100 ]-[17:26:56] [ - ]
3256|_[ + ] Target:: [ https://www.boywiki.org/fr/Lettres_de_Tony_Duvert_à_Michel_Longuet ]
3257|_[ + ] Exploit::
3258|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3259|_[ + ] More details:: / - / , ISP:
3260|_[ + ] Found:: UNIDENTIFIED
3261
3262 _[ - ]::--------------------------------------------------------------------------------------------------------------
3263|_[ + ] [ 62 / 100 ]-[17:26:58] [ - ]
3264|_[ + ] Target:: [ https://www.boywiki.org/fr/Claude_Joseph_Bail ]
3265|_[ + ] Exploit::
3266|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3267|_[ + ] More details:: / - / , ISP:
3268|_[ + ] Found:: UNIDENTIFIED
3269
3270 _[ - ]::--------------------------------------------------------------------------------------------------------------
3271|_[ + ] [ 63 / 100 ]-[17:27:00] [ - ]
3272|_[ + ] Target:: [ https://www.boywiki.org/fr/Fresque_des_enfants_boxeurs ]
3273|_[ + ] Exploit::
3274|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3275|_[ + ] More details:: / - / , ISP:
3276|_[ + ] Found:: UNIDENTIFIED
3277
3278 _[ - ]::--------------------------------------------------------------------------------------------------------------
3279|_[ + ] [ 64 / 100 ]-[17:27:02] [ - ]
3280|_[ + ] Target:: [ https://www.boywiki.org/fr/Abû_Nuwâs ]
3281|_[ + ] Exploit::
3282|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3283|_[ + ] More details:: / - / , ISP:
3284|_[ + ] Found:: UNIDENTIFIED
3285
3286 _[ - ]::--------------------------------------------------------------------------------------------------------------
3287|_[ + ] [ 65 / 100 ]-[17:27:04] [ - ]
3288|_[ + ] Target:: [ https://www.boywiki.org/en/Cole_and_Dylan_Sprouse ]
3289|_[ + ] Exploit::
3290|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3291|_[ + ] More details:: / - / , ISP:
3292|_[ + ] Found:: UNIDENTIFIED
3293
3294 _[ - ]::--------------------------------------------------------------------------------------------------------------
3295|_[ + ] [ 66 / 100 ]-[17:27:06] [ - ]
3296|_[ + ] Target:: [ https://www.boywiki.org/fr/Kjeld_Frydenlund ]
3297|_[ + ] Exploit::
3298|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3299|_[ + ] More details:: / - / , ISP:
3300|_[ + ] Found:: UNIDENTIFIED
3301
3302 _[ - ]::--------------------------------------------------------------------------------------------------------------
3303|_[ + ] [ 67 / 100 ]-[17:27:08] [ - ]
3304|_[ + ] Target:: [ https://www.boywiki.org/fr/1986 ]
3305|_[ + ] Exploit::
3306|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3307|_[ + ] More details:: / - / , ISP:
3308|_[ + ] Found:: UNIDENTIFIED
3309
3310 _[ - ]::--------------------------------------------------------------------------------------------------------------
3311|_[ + ] [ 68 / 100 ]-[17:27:10] [ - ]
3312|_[ + ] Target:: [ https://www.boywiki.org/en/Joseph_Geraci ]
3313|_[ + ] Exploit::
3314|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3315|_[ + ] More details:: / - / , ISP:
3316|_[ + ] Found:: UNIDENTIFIED
3317
3318 _[ - ]::--------------------------------------------------------------------------------------------------------------
3319|_[ + ] [ 69 / 100 ]-[17:27:12] [ - ]
3320|_[ + ] Target:: [ https://www.boywiki.org/fr/Filmographie_garçonnière_–_I ]
3321|_[ + ] Exploit::
3322|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3323|_[ + ] More details:: / - / , ISP:
3324|_[ + ] Found:: UNIDENTIFIED
3325
3326 _[ - ]::--------------------------------------------------------------------------------------------------------------
3327|_[ + ] [ 70 / 100 ]-[17:27:14] [ - ]
3328|_[ + ] Target:: [ https://www.boywiki.org/de/Literatur_zum_Thema_Sexueller_Missbrauch_von_Kindern ]
3329|_[ + ] Exploit::
3330|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3331|_[ + ] More details:: / - / , ISP:
3332|_[ + ] Found:: UNIDENTIFIED
3333
3334 _[ - ]::--------------------------------------------------------------------------------------------------------------
3335|_[ + ] [ 71 / 100 ]-[17:27:15] [ - ]
3336|_[ + ] Target:: [ https://www.boywiki.org/fr/Filmographie_garçonnière ]
3337|_[ + ] Exploit::
3338|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3339|_[ + ] More details:: / - / , ISP:
3340|_[ + ] Found:: UNIDENTIFIED
3341
3342 _[ - ]::--------------------------------------------------------------------------------------------------------------
3343|_[ + ] [ 72 / 100 ]-[17:27:17] [ - ]
3344|_[ + ] Target:: [ https://www.boywiki.org/en/March_19 ]
3345|_[ + ] Exploit::
3346|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3347|_[ + ] More details:: / - / , ISP:
3348|_[ + ] Found:: UNIDENTIFIED
3349
3350 _[ - ]::--------------------------------------------------------------------------------------------------------------
3351|_[ + ] [ 73 / 100 ]-[17:27:19] [ - ]
3352|_[ + ] Target:: [ https://www.boywiki.org/en/Absolute_Zero ]
3353|_[ + ] Exploit::
3354|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3355|_[ + ] More details:: / - / , ISP:
3356|_[ + ] Found:: UNIDENTIFIED
3357
3358 _[ - ]::--------------------------------------------------------------------------------------------------------------
3359|_[ + ] [ 74 / 100 ]-[17:27:24] [ - ]
3360|_[ + ] Target:: [ https://www.boywiki.org/en/Pederastic_relationships_in_classical_antiquity ]
3361|_[ + ] Exploit::
3362|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3363|_[ + ] More details:: / - / , ISP:
3364|_[ + ] Found:: UNIDENTIFIED
3365
3366 _[ - ]::--------------------------------------------------------------------------------------------------------------
3367|_[ + ] [ 75 / 100 ]-[17:27:26] [ - ]
3368|_[ + ] Target:: [ https://www.boywiki.org/en/Joseph_Doucé ]
3369|_[ + ] Exploit::
3370|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3371|_[ + ] More details:: / - / , ISP:
3372|_[ + ] Found:: UNIDENTIFIED
3373
3374 _[ - ]::--------------------------------------------------------------------------------------------------------------
3375|_[ + ] [ 76 / 100 ]-[17:27:29] [ - ]
3376|_[ + ] Target:: [ https://www.boywiki.org/en/Police_state ]
3377|_[ + ] Exploit::
3378|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3379|_[ + ] More details:: / - / , ISP:
3380|_[ + ] Found:: UNIDENTIFIED
3381
3382 _[ - ]::--------------------------------------------------------------------------------------------------------------
3383|_[ + ] [ 77 / 100 ]-[17:27:31] [ - ]
3384|_[ + ] Target:: [ https://www.boywiki.org/en/Ann_Wolbert_Burgess ]
3385|_[ + ] Exploit::
3386|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3387|_[ + ] More details:: / - / , ISP:
3388|_[ + ] Found:: UNIDENTIFIED
3389
3390 _[ - ]::--------------------------------------------------------------------------------------------------------------
3391|_[ + ] [ 78 / 100 ]-[17:27:33] [ - ]
3392|_[ + ] Target:: [ https://www.boywiki.org/en/Mental_disorder ]
3393|_[ + ] Exploit::
3394|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3395|_[ + ] More details:: / - / , ISP:
3396|_[ + ] Found:: UNIDENTIFIED
3397
3398 _[ - ]::--------------------------------------------------------------------------------------------------------------
3399|_[ + ] [ 79 / 100 ]-[17:27:36] [ - ]
3400|_[ + ] Target:: [ https://www.boywiki.org/en/Halloween ]
3401|_[ + ] Exploit::
3402|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3403|_[ + ] More details:: / - / , ISP:
3404|_[ + ] Found:: UNIDENTIFIED
3405
3406 _[ - ]::--------------------------------------------------------------------------------------------------------------
3407|_[ + ] [ 80 / 100 ]-[17:27:39] [ - ]
3408|_[ + ] Target:: [ https://www.boywiki.org/en/About_Heinz_Kohut ]
3409|_[ + ] Exploit::
3410|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3411|_[ + ] More details:: / - / , ISP:
3412|_[ + ] Found:: UNIDENTIFIED
3413
3414 _[ - ]::--------------------------------------------------------------------------------------------------------------
3415|_[ + ] [ 81 / 100 ]-[17:27:41] [ - ]
3416|_[ + ] Target:: [ https://www.boywiki.org/en/Bruce_Rind ]
3417|_[ + ] Exploit::
3418|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3419|_[ + ] More details:: / - / , ISP:
3420|_[ + ] Found:: UNIDENTIFIED
3421
3422 _[ - ]::--------------------------------------------------------------------------------------------------------------
3423|_[ + ] [ 82 / 100 ]-[17:27:46] [ - ]
3424|_[ + ] Target:: [ https://www.boywiki.org/en/Ivan_Noel ]
3425|_[ + ] Exploit::
3426|_[ + ] Information Server:: , , IP::0
3427|_[ + ] More details::
3428|_[ + ] Found:: UNIDENTIFIED
3429
3430 _[ - ]::--------------------------------------------------------------------------------------------------------------
3431|_[ + ] [ 83 / 100 ]-[17:27:48] [ - ]
3432|_[ + ] Target:: [ https://www.boywiki.org/en/LifeLine ]
3433|_[ + ] Exploit::
3434|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3435|_[ + ] More details:: / - / , ISP:
3436|_[ + ] Found:: UNIDENTIFIED
3437
3438 _[ - ]::--------------------------------------------------------------------------------------------------------------
3439|_[ + ] [ 84 / 100 ]-[17:27:50] [ - ]
3440|_[ + ] Target:: [ https://www.boywiki.org/en/Alexis ]
3441|_[ + ] Exploit::
3442|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3443|_[ + ] More details:: / - / , ISP:
3444|_[ + ] Found:: UNIDENTIFIED
3445
3446 _[ - ]::--------------------------------------------------------------------------------------------------------------
3447|_[ + ] [ 85 / 100 ]-[17:27:53] [ - ]
3448|_[ + ] Target:: [ https://www.boywiki.org/en/International_Journal_of_Greek_Love ]
3449|_[ + ] Exploit::
3450|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3451|_[ + ] More details:: / - / , ISP:
3452|_[ + ] Found:: UNIDENTIFIED
3453
3454 _[ - ]::--------------------------------------------------------------------------------------------------------------
3455|_[ + ] [ 86 / 100 ]-[17:27:54] [ - ]
3456|_[ + ] Target:: [ https://www.boywiki.org/fr/Filmographie_garçonnière_–_Q ]
3457|_[ + ] Exploit::
3458|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3459|_[ + ] More details:: / - / , ISP:
3460|_[ + ] Found:: UNIDENTIFIED
3461
3462 _[ - ]::--------------------------------------------------------------------------------------------------------------
3463|_[ + ] [ 87 / 100 ]-[17:27:56] [ - ]
3464|_[ + ] Target:: [ https://www.boywiki.org/fr/Lettres_de_Tony_Duvert_à_Claude_Hastaire ]
3465|_[ + ] Exploit::
3466|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3467|_[ + ] More details:: / - / , ISP:
3468|_[ + ] Found:: UNIDENTIFIED
3469
3470 _[ - ]::--------------------------------------------------------------------------------------------------------------
3471|_[ + ] [ 88 / 100 ]-[17:27:59] [ - ]
3472|_[ + ] Target:: [ https://www.boywiki.org/en/Andreas_Embiricos ]
3473|_[ + ] Exploit::
3474|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3475|_[ + ] More details:: / - / , ISP:
3476|_[ + ] Found:: UNIDENTIFIED
3477
3478 _[ - ]::--------------------------------------------------------------------------------------------------------------
3479|_[ + ] [ 89 / 100 ]-[17:28:01] [ - ]
3480|_[ + ] Target:: [ https://www.boywiki.org/en/Child_labor ]
3481|_[ + ] Exploit::
3482|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3483|_[ + ] More details:: / - / , ISP:
3484|_[ + ] Found:: UNIDENTIFIED
3485
3486 _[ - ]::--------------------------------------------------------------------------------------------------------------
3487|_[ + ] [ 90 / 100 ]-[17:28:03] [ - ]
3488|_[ + ] Target:: [ https://www.boywiki.org/en/Wikisposure ]
3489|_[ + ] Exploit::
3490|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3491|_[ + ] More details:: / - / , ISP:
3492|_[ + ] Found:: UNIDENTIFIED
3493
3494 _[ - ]::--------------------------------------------------------------------------------------------------------------
3495|_[ + ] [ 91 / 100 ]-[17:28:06] [ - ]
3496|_[ + ] Target:: [ https://www.boywiki.org/en/BoyChat_Steering_Committee ]
3497|_[ + ] Exploit::
3498|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3499|_[ + ] More details:: / - / , ISP:
3500|_[ + ] Found:: UNIDENTIFIED
3501
3502 _[ - ]::--------------------------------------------------------------------------------------------------------------
3503|_[ + ] [ 92 / 100 ]-[17:28:08] [ - ]
3504|_[ + ] Target:: [ https://www.boywiki.org/fr/Bibliographie_garçonnière_–_G ]
3505|_[ + ] Exploit::
3506|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3507|_[ + ] More details:: / - / , ISP:
3508|_[ + ] Found:: UNIDENTIFIED
3509
3510 _[ - ]::--------------------------------------------------------------------------------------------------------------
3511|_[ + ] [ 93 / 100 ]-[17:28:10] [ - ]
3512|_[ + ] Target:: [ https://www.boywiki.org/en/Tom_Reeves ]
3513|_[ + ] Exploit::
3514|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3515|_[ + ] More details:: / - / , ISP:
3516|_[ + ] Found:: UNIDENTIFIED
3517
3518 _[ - ]::--------------------------------------------------------------------------------------------------------------
3519|_[ + ] [ 94 / 100 ]-[17:28:13] [ - ]
3520|_[ + ] Target:: [ https://www.boywiki.org/en/Asa_Butterfield ]
3521|_[ + ] Exploit::
3522|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3523|_[ + ] More details:: / - / , ISP:
3524|_[ + ] Found:: UNIDENTIFIED
3525
3526 _[ - ]::--------------------------------------------------------------------------------------------------------------
3527|_[ + ] [ 95 / 100 ]-[17:28:16] [ - ]
3528|_[ + ] Target:: [ https://www.boywiki.org/en/James_Cantor ]
3529|_[ + ] Exploit::
3530|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3531|_[ + ] More details:: / - / , ISP:
3532|_[ + ] Found:: UNIDENTIFIED
3533
3534 _[ - ]::--------------------------------------------------------------------------------------------------------------
3535|_[ + ] [ 96 / 100 ]-[17:28:18] [ - ]
3536|_[ + ] Target:: [ https://www.boywiki.org/en/Albanian_pederasty ]
3537|_[ + ] Exploit::
3538|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3539|_[ + ] More details:: / - / , ISP:
3540|_[ + ] Found:: UNIDENTIFIED
3541
3542 _[ - ]::--------------------------------------------------------------------------------------------------------------
3543|_[ + ] [ 97 / 100 ]-[17:28:21] [ - ]
3544|_[ + ] Target:: [ https://www.boywiki.org/en/Libera ]
3545|_[ + ] Exploit::
3546|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3547|_[ + ] More details:: / - / , ISP:
3548|_[ + ] Found:: UNIDENTIFIED
3549
3550 _[ - ]::--------------------------------------------------------------------------------------------------------------
3551|_[ + ] [ 98 / 100 ]-[17:28:24] [ - ]
3552|_[ + ] Target:: [ https://www.boywiki.org/en/Guy_Strait ]
3553|_[ + ] Exploit::
3554|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3555|_[ + ] More details:: / - / , ISP:
3556|_[ + ] Found:: UNIDENTIFIED
3557
3558 _[ - ]::--------------------------------------------------------------------------------------------------------------
3559|_[ + ] [ 99 / 100 ]-[17:28:29] [ - ]
3560|_[ + ] Target:: [ https://www.boywiki.org/en/Pederasty_in_ancient_Greece ]
3561|_[ + ] Exploit::
3562|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
3563|_[ + ] More details:: / - / , ISP:
3564|_[ + ] Found:: UNIDENTIFIED
3565
3566[ INFO ] [ Shutting down ]
3567[ INFO ] [ End of process INURLBR at [24-03-2020 17:28:29]
3568[ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
3569[ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.boywiki.org/output/inurlbr-www.boywiki.org ]
3570|_________________________________________________________________________________________
3571
3572\_________________________________________________________________________________________/
3573########################################################################################################################
3574Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-24 17:28 EDT
3575NSE: Loaded 49 scripts for scanning.
3576NSE: Script Pre-scanning.
3577Initiating NSE at 17:28
3578Completed NSE at 17:28, 0.00s elapsed
3579Initiating NSE at 17:28
3580Completed NSE at 17:28, 0.00s elapsed
3581Initiating Ping Scan at 17:28
3582Scanning www.boywiki.org (82.94.228.252) [4 ports]
3583Completed Ping Scan at 17:28, 0.23s elapsed (1 total hosts)
3584Initiating Parallel DNS resolution of 1 host. at 17:28
3585Completed Parallel DNS resolution of 1 host. at 17:28, 0.07s elapsed
3586Initiating SYN Stealth Scan at 17:28
3587Scanning www.boywiki.org (82.94.228.252) [1 port]
3588Discovered open port 110/tcp on 82.94.228.252
3589Completed SYN Stealth Scan at 17:28, 0.22s elapsed (1 total ports)
3590Initiating Service scan at 17:28
3591Scanning 1 service on www.boywiki.org (82.94.228.252)
3592Completed Service scan at 17:28, 0.38s elapsed (1 service on 1 host)
3593Initiating OS detection (try #1) against www.boywiki.org (82.94.228.252)
3594Retrying OS detection (try #2) against www.boywiki.org (82.94.228.252)
3595adjust_timeouts2: packet supposedly had rtt of -51914 microseconds. Ignoring time.
3596adjust_timeouts2: packet supposedly had rtt of -51914 microseconds. Ignoring time.
3597Initiating Traceroute at 17:28
3598Completed Traceroute at 17:28, 3.09s elapsed
3599Initiating Parallel DNS resolution of 12 hosts. at 17:28
3600Completed Parallel DNS resolution of 12 hosts. at 17:28, 1.24s elapsed
3601NSE: Script scanning 82.94.228.252.
3602Initiating NSE at 17:28
3603NSE Timing: About 68.66% done; ETC: 17:30 (0:00:30 remaining)
3604Completed NSE at 17:30, 90.27s elapsed
3605Initiating NSE at 17:30
3606Completed NSE at 17:30, 0.02s elapsed
3607Nmap scan report for www.boywiki.org (82.94.228.252)
3608Host is up (0.16s latency).
3609
3610PORT STATE SERVICE VERSION
3611110/tcp open pop3 Dovecot pop3d
3612|_pop3-capabilities: PIPELINING UIDL RESP-CODES TOP STLS CAPA SASL(CRAM-MD5)
3613Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
3614Aggressive OS guesses: OpenWrt 12.09-rc1 Attitude Adjustment (Linux 3.3 - 3.7) (92%), Linux 3.2 (92%), Linux 3.2 - 3.10 (92%), Linux 3.2 - 3.16 (92%), Linux 3.2 - 3.8 (92%), Linux 3.8 (92%), XBMCbuntu Frodo v12.2 (Linux 3.X) (92%), Olivetti 65C-9 printer (92%), Linux 2.6.32 - 3.10 (92%), Linux 2.6.32 - 3.13 (92%)
3615No exact OS matches for host (test conditions non-ideal).
3616Uptime guess: 59.736 days (since Fri Jan 24 22:49:56 2020)
3617Network Distance: 14 hops
3618TCP Sequence Prediction: Difficulty=263 (Good luck!)
3619IP ID Sequence Generation: All zeros
3620
3621TRACEROUTE (using port 443/tcp)
3622HOP RTT ADDRESS
36231 79.91 ms 10.203.3.1
36242 ...
36253 82.14 ms br1.dal.as8100.net (96.44.144.17)
36264 82.18 ms be5814.rcr21.b010621-0.dfw01.atlas.cogentco.com (38.122.58.57)
36275 82.21 ms be2561.ccr32.dfw01.atlas.cogentco.com (154.54.6.73)
36286 110.76 ms be2433.ccr22.mci01.atlas.cogentco.com (154.54.3.214)
36297 122.58 ms be2831.ccr41.ord01.atlas.cogentco.com (154.54.42.166)
36308 105.19 ms be2765.ccr41.ord03.atlas.cogentco.com (154.54.45.18)
36319 122.36 ms kpn.ord03.atlas.cogentco.com (154.54.11.22)
363210 212.02 ms asd-s8-rou-1041.NL.eurorings.net (134.222.48.91)
363311 ...
363412 194.02 ms 0.et-3-1-0.xr3.3d12.xs4all.net (194.109.5.6)
363513 195.95 ms 0.ae10.xrc1.1d12.xs4all.net (194.109.5.58)
363614 194.35 ms 82.94.228.252
3637
3638NSE: Script Post-scanning.
3639Initiating NSE at 17:30
3640Completed NSE at 17:30, 0.00s elapsed
3641Initiating NSE at 17:30
3642Completed NSE at 17:30, 0.00s elapsed
3643#########################################################################################################################
3644HTTP/1.1 200 OK
3645Server: nginx
3646Date: Tue, 24 Mar 2020 21:30:15 GMT
3647Content-Type: text/html
3648Content-Length: 3162
3649Last-Modified: Mon, 31 Mar 2014 16:34:08 GMT
3650Connection: keep-alive
3651Accept-Ranges: bytes
3652#########################################################################################################################
3653/de
3654/en
3655/fr
3656https://boywrite.ivan.net/
3657https://freespirits.org/
3658https://legarcon.net/
3659https://lifeline.ivan.net/
3660https://www.boychat.org/
3661https://www.boylinks.net/
3662https://www.castilloazul.org/
3663https://www.freespirits.org/
3664https://www.jongensforum.net/
3665https://www.jungsforum.net/
3666https://www.pedagora.com/
3667images/boywiki-banner.jpg
3668#########################################################################################################################
3669
3670wig - WebApp Information Gatherer
3671
3672
3673Scanning https://www.boywiki.org...
3674____________________ SITE INFO _____________________
3675IP Title
367682.94.228.252 BoyWiki
3677
3678_____________________ VERSION ______________________
3679Name Versions Type
3680PHP 5.4.45-0+deb7u9 Platform
3681nginx Platform
3682
3683___________________ INTERESTING ____________________
3684URL Note Type
3685/robots.txt robots.txt index Interesting
3686
3687____________________________________________________
3688Time: 0.9 sec Urls: 609 Fingerprints: 40401
3689#########################################################################################################################
3690Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-24 17:30 EDT
3691NSE: Loaded 161 scripts for scanning.
3692NSE: Script Pre-scanning.
3693Initiating NSE at 17:30
3694Completed NSE at 17:30, 0.00s elapsed
3695Initiating NSE at 17:30
3696Completed NSE at 17:30, 0.00s elapsed
3697Initiating Parallel DNS resolution of 1 host. at 17:30
3698Completed Parallel DNS resolution of 1 host. at 17:30, 0.06s elapsed
3699Initiating SYN Stealth Scan at 17:30
3700Scanning www.boywiki.org (82.94.228.252) [1 port]
3701Discovered open port 443/tcp on 82.94.228.252
3702Completed SYN Stealth Scan at 17:30, 0.22s elapsed (1 total ports)
3703Initiating Service scan at 17:30
3704Scanning 1 service on www.boywiki.org (82.94.228.252)
3705Completed Service scan at 17:30, 13.17s elapsed (1 service on 1 host)
3706Initiating OS detection (try #1) against www.boywiki.org (82.94.228.252)
3707Retrying OS detection (try #2) against www.boywiki.org (82.94.228.252)
3708Initiating Traceroute at 17:30
3709Completed Traceroute at 17:30, 3.08s elapsed
3710Initiating Parallel DNS resolution of 12 hosts. at 17:30
3711Completed Parallel DNS resolution of 12 hosts. at 17:30, 0.18s elapsed
3712NSE: Script scanning 82.94.228.252.
3713Initiating NSE at 17:30
3714Completed NSE at 17:32, 90.36s elapsed
3715Initiating NSE at 17:32
3716Completed NSE at 17:32, 2.04s elapsed
3717Nmap scan report for www.boywiki.org (82.94.228.252)
3718Host is up (0.18s latency).
3719
3720PORT STATE SERVICE VERSION
3721443/tcp open ssl/http nginx
3722| http-brute:
3723|_ Path "/" does not require authentication
3724|_http-chrono: Request times for /; avg: 1144.32ms; min: 897.77ms; max: 1531.28ms
3725| http-csrf:
3726| Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=www.boywiki.org
3727| Found the following possible CSRF vulnerabilities:
3728|
3729| Path: https://www.boywiki.org:443/en/Main_Page
3730| Form id: searchform
3731| Form action: /en/index.php
3732|
3733| Path: https://www.boywiki.org:443/fr/Accueil
3734| Form id: searchform
3735| Form action: /fr/index.php
3736|
3737| Path: https://www.boywiki.org:443/de/Hauptseite
3738| Form id: searchform
3739| Form action: /de/index.php
3740|
3741| Path: https://www.boywiki.org:443/en/index.php?title=Special:UserLogin&returnto=Main+Page
3742| Form id: searchform
3743| Form action: /en/index.php
3744|
3745| Path: https://www.boywiki.org:443/en/Boylover
3746| Form id: searchform
3747| Form action: /en/index.php
3748|
3749| Path: https://www.boywiki.org:443/en/Special:AllPages
3750| Form id: nsselect
3751| Form action: /en/index.php
3752|
3753| Path: https://www.boywiki.org:443/en/Special:AllPages
3754| Form id: searchform
3755| Form action: /en/index.php
3756|
3757| Path: https://www.boywiki.org:443/en/BoyWiki:Community_portal
3758| Form id: searchform
3759| Form action: /en/index.php
3760|
3761| Path: https://www.boywiki.org:443/en/index.php?title=Special:RecentChanges&feed=atom
3762| Form id: namespace
3763| Form action: /en/index.php
3764|
3765| Path: https://www.boywiki.org:443/en/index.php?title=Special:RecentChanges&feed=atom
3766| Form id: searchform
3767| Form action: /en/index.php
3768|
3769| Path: https://www.boywiki.org:443/en/Review_of_Reasons_of_the_Heart
3770| Form id: searchform
3771| Form action: /en/index.php
3772|
3773| Path: https://www.boywiki.org:443/en/Category:Technology
3774| Form id: searchform
3775| Form action: /en/index.php
3776|
3777| Path: https://www.boywiki.org:443/media/Special:NewFiles
3778| Form id: mw-input-like
3779| Form action: /media/Special:NewFiles
3780|
3781| Path: https://www.boywiki.org:443/media/Special:NewFiles
3782| Form id: searchform
3783| Form action: /media/index.php
3784|
3785| Path: https://www.boywiki.org:443/en/BoyWiki:Image_of_the_day_archive
3786| Form id: searchform
3787| Form action: /en/index.php
3788|
3789| Path: https://www.boywiki.org:443/en/Main_Page
3790| Form id: searchform
3791| Form action: /en/index.php
3792|
3793| Path: https://www.boywiki.org:443/en/Category:Births
3794| Form id: searchform
3795| Form action: /en/index.php
3796|
3797| Path: https://www.boywiki.org:443/en/Portal:Boylove_News_Channel
3798| Form id: searchform
3799|_ Form action: /en/index.php
3800|_http-date: Tue, 24 Mar 2020 21:31:00 GMT; -1s from local time.
3801|_http-devframework: Couldn't determine the underlying framework or CMS. Try increasing 'httpspider.maxpagecount' value to spider more pages.
3802|_http-dombased-xss: Couldn't find any DOM based XSS.
3803|_http-errors: Couldn't find any error pages.
3804|_http-feed: Couldn't find any feeds.
3805|_http-fetch: Please enter the complete path of the directory to save data in.
3806| http-grep:
3807| (1) https://www.boywiki.org:443/en/Main_Page:
3808| (1) email:
3809| + etenne@boywiki.org
3810| (1) https://www.boywiki.org:443/fr/Accueil:
3811| (1) email:
3812|_ + fr.info@boywiki.org
3813| http-headers:
3814| Server: nginx
3815| Date: Tue, 24 Mar 2020 21:31:05 GMT
3816| Content-Type: text/html
3817| Content-Length: 3162
3818| Last-Modified: Mon, 31 Mar 2014 16:34:08 GMT
3819| Connection: close
3820| Accept-Ranges: bytes
3821|
3822|_ (Request type: HEAD)
3823| http-methods:
3824|_ Supported Methods: GET HEAD
3825|_http-mobileversion-checker: No mobile version detected.
3826|_http-php-version: Credits query returned unknown hash ae9d8f0ba5b52df17452e4a4b108dc81
3827| http-security-headers:
3828| Strict_Transport_Security:
3829|_ HSTS not configured in HTTPS Server
3830| http-sitemap-generator:
3831| Directory structure:
3832| /
3833| Other: 1; css: 1; ico: 1
3834| /de/
3835| Other: 1
3836| /en/
3837| Other: 8; php: 2
3838| /fr/
3839| Other: 1
3840| /images/
3841| jpg: 1
3842| /media/
3843| Other: 1
3844| Longest directory structure:
3845| Depth: 1
3846| Dir: /images/
3847| Total files found (by extension):
3848|_ Other: 12; css: 1; ico: 1; jpg: 1; php: 2
3849|_http-title: BoyWiki
3850| http-vhosts:
3851| ns1.boywiki.org : 400
3852| linux.boywiki.org : 400
3853| 124 names had status 200
3854|_en.boywiki.org : 301 -> https://www.boywiki.org/en/
3855| http-vuln-cve2011-3192:
3856| VULNERABLE:
3857| Apache byterange filter DoS
3858| State: VULNERABLE
3859| IDs: BID:49303 CVE:CVE-2011-3192
3860| The Apache web server is vulnerable to a denial of service attack when numerous
3861| overlapping byte ranges are requested.
3862| Disclosure date: 2011-08-19
3863| References:
3864| https://seclists.org/fulldisclosure/2011/Aug/175
3865| https://www.securityfocus.com/bid/49303
3866| https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3192
3867|_ https://www.tenable.com/plugins/nessus/55976
3868| http-waf-detect: IDS/IPS/WAF detected:
3869|_www.boywiki.org:443/?p4yl04d3=<script>alert(document.cookie)</script>
3870|_http-wordpress-enum: Nothing found amongst the top 100 resources,use --script-args search-limit=<number|all> for deeper analysis)
3871|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
3872|_http-xssed: No previously reported XSS vuln.
3873Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
3874Aggressive OS guesses: Linux 3.2 (92%), Linux 3.2 - 3.10 (92%), Linux 3.2 - 3.16 (92%), Linux 3.2 - 3.8 (92%), Linux 3.5 (92%), Linux 2.6.32 - 3.10 (92%), Linux 2.6.32 - 3.13 (92%), Linux 2.6.32 - 3.9 (92%), Linux 2.6.32 - 3.1 (90%), OpenWrt 12.09-rc1 Attitude Adjustment (Linux 3.3 - 3.7) (90%)
3875No exact OS matches for host (test conditions non-ideal).
3876Uptime guess: 61.665 days (since Thu Jan 23 00:35:06 2020)
3877Network Distance: 14 hops
3878TCP Sequence Prediction: Difficulty=252 (Good luck!)
3879IP ID Sequence Generation: All zeros
3880
3881TRACEROUTE (using port 443/tcp)
3882HOP RTT ADDRESS
38831 67.84 ms 10.203.3.1
38842 ...
38853 68.21 ms br1.dal.as8100.net (96.44.144.17)
38864 68.83 ms be5814.rcr21.b010621-0.dfw01.atlas.cogentco.com (38.122.58.57)
38875 68.89 ms be2561.ccr32.dfw01.atlas.cogentco.com (154.54.6.73)
38886 82.96 ms be2433.ccr22.mci01.atlas.cogentco.com (154.54.3.214)
38897 94.29 ms be2831.ccr41.ord01.atlas.cogentco.com (154.54.42.166)
38908 90.63 ms be2765.ccr41.ord03.atlas.cogentco.com (154.54.45.18)
38919 94.38 ms kpn.ord03.atlas.cogentco.com (154.54.11.22)
389210 196.32 ms asd-s8-rou-1041.NL.eurorings.net (134.222.48.91)
389311 ...
389412 176.10 ms 0.et-8-1-0.xr4.1d12.xs4all.net (194.109.5.4)
389513 176.05 ms 0.ae11.xrc2.3d12.xs4all.net (194.109.5.78)
389614 179.58 ms 82.94.228.252
3897
3898NSE: Script Post-scanning.
3899Initiating NSE at 17:32
3900Completed NSE at 17:32, 0.00s elapsed
3901Initiating NSE at 17:32
3902Completed NSE at 17:32, 0.00s elapsed
3903#########################################################################################################################
3904Version: 2.0.0-static
3905OpenSSL 1.1.1f-dev xx XXX xxxx
3906
3907Connected to 82.94.228.252
3908
3909Testing SSL server www.boywiki.org on port 443 using SNI name www.boywiki.org
3910
3911 SSL/TLS Protocols:
3912SSLv2 disabled
3913SSLv3 disabled
3914TLSv1.0 enabled
3915TLSv1.1 enabled
3916TLSv1.2 enabled
3917TLSv1.3 disabled
3918
3919 TLS Fallback SCSV:
3920Server supports TLS Fallback SCSV
3921
3922 TLS renegotiation:
3923Secure session renegotiation supported
3924
3925 TLS Compression:
3926Compression disabled
3927
3928 Heartbleed:
3929TLSv1.2 not vulnerable to heartbleed
3930TLSv1.1 not vulnerable to heartbleed
3931TLSv1.0 not vulnerable to heartbleed
3932
3933 Supported Server Cipher(s):
3934Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
3935Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
3936Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
3937Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
3938Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
3939Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
3940Accepted TLSv1.2 256 bits DHE-RSA-AES256-GCM-SHA384 DHE 1024 bits
3941Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA256 DHE 1024 bits
3942Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA DHE 1024 bits
3943Accepted TLSv1.2 256 bits DHE-RSA-CAMELLIA256-SHA DHE 1024 bits
3944Accepted TLSv1.2 128 bits DHE-RSA-AES128-GCM-SHA256 DHE 1024 bits
3945Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA256 DHE 1024 bits
3946Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA DHE 1024 bits
3947Accepted TLSv1.2 128 bits DHE-RSA-SEED-SHA DHE 1024 bits
3948Accepted TLSv1.2 128 bits DHE-RSA-CAMELLIA128-SHA DHE 1024 bits
3949Accepted TLSv1.2 128 bits ECDHE-RSA-RC4-SHA Curve P-256 DHE 256
3950Accepted TLSv1.2 128 bits RC4-SHA
3951Preferred TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
3952Accepted TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
3953Accepted TLSv1.1 256 bits DHE-RSA-AES256-SHA DHE 1024 bits
3954Accepted TLSv1.1 256 bits DHE-RSA-CAMELLIA256-SHA DHE 1024 bits
3955Accepted TLSv1.1 128 bits DHE-RSA-AES128-SHA DHE 1024 bits
3956Accepted TLSv1.1 128 bits DHE-RSA-SEED-SHA DHE 1024 bits
3957Accepted TLSv1.1 128 bits DHE-RSA-CAMELLIA128-SHA DHE 1024 bits
3958Accepted TLSv1.1 128 bits ECDHE-RSA-RC4-SHA Curve P-256 DHE 256
3959Accepted TLSv1.1 128 bits RC4-SHA
3960Preferred TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
3961Accepted TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
3962Accepted TLSv1.0 256 bits DHE-RSA-AES256-SHA DHE 1024 bits
3963Accepted TLSv1.0 256 bits DHE-RSA-CAMELLIA256-SHA DHE 1024 bits
3964Accepted TLSv1.0 128 bits DHE-RSA-AES128-SHA DHE 1024 bits
3965Accepted TLSv1.0 128 bits DHE-RSA-SEED-SHA DHE 1024 bits
3966Accepted TLSv1.0 128 bits DHE-RSA-CAMELLIA128-SHA DHE 1024 bits
3967Accepted TLSv1.0 128 bits ECDHE-RSA-RC4-SHA Curve P-256 DHE 256
3968Accepted TLSv1.0 128 bits RC4-SHA
3969
3970 Server Key Exchange Group(s):
3971TLSv1.2 128 bits secp256r1 (NIST P-256)
3972
3973 Server Signature Algorithm(s):
3974TLSv1.2 Server accepts all signature algorithms.
3975
3976 SSL Certificate:
3977Signature Algorithm: sha256WithRSAEncryption
3978RSA Key Strength: 4096
3979
3980Subject: boywiki.org
3981Altnames: DNS:boywiki.org, DNS:www.boywiki.org
3982Issuer: Let's Encrypt Authority X3
3983
3984Not valid before: Feb 3 01:04:33 2020 GMT
3985Not valid after: May 3 01:04:33 2020 GMT
3986########################################################################################################################
3987------------------------------------------------------------------------------------------------------------------------
3988
3989[ ! ] Starting SCANNER INURLBR 2.1 at [24-03-2020 17:33:54]
3990[ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
3991It is the end user's responsibility to obey all applicable local, state and federal laws.
3992Developers assume no liability and are not responsible for any misuse or damage caused by this program
3993
3994[ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.boywiki.org/output/inurlbr-www.boywiki.org ]
3995[ INFO ][ DORK ]::[ site:www.boywiki.org ]
3996[ INFO ][ SEARCHING ]:: {
3997[ INFO ][ ENGINE ]::[ GOOGLE - www.google.nr ]
3998
3999[ INFO ][ SEARCHING ]::
4000-[:::]
4001[ INFO ][ ENGINE ]::[ GOOGLE API ]
4002
4003[ INFO ][ SEARCHING ]::
4004-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
4005[ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.com.sa ID: 003917828085772992913:gmoeray5sa8 ]
4006
4007[ INFO ][ SEARCHING ]::
4008-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
4009
4010[ INFO ][ TOTAL FOUND VALUES ]:: [ 100 ]
4011
4012
4013 _[ - ]::--------------------------------------------------------------------------------------------------------------
4014|_[ + ] [ 0 / 100 ]-[17:34:11] [ - ]
4015|_[ + ] Target:: [ https://www.boywiki.org/ ]
4016|_[ + ] Exploit::
4017|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx , IP:82.94.228.252:443
4018|_[ + ] More details:: / - / , ISP:
4019|_[ + ] Found:: UNIDENTIFIED
4020
4021 _[ - ]::--------------------------------------------------------------------------------------------------------------
4022|_[ + ] [ 1 / 100 ]-[17:34:16] [ - ]
4023|_[ + ] Target:: [ https://www.boywiki.org/fr/Le_prêtre_et_l’enfant_de_chœur_–_2e_partie ]
4024|_[ + ] Exploit::
4025|_[ + ] Information Server:: , , IP::0
4026|_[ + ] More details::
4027|_[ + ] Found:: UNIDENTIFIED
4028
4029 _[ - ]::--------------------------------------------------------------------------------------------------------------
4030|_[ + ] [ 2 / 100 ]-[17:34:18] [ - ]
4031|_[ + ] Target:: [ https://www.boywiki.org/fr/13_décembre ]
4032|_[ + ] Exploit::
4033|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4034|_[ + ] More details:: / - / , ISP:
4035|_[ + ] Found:: UNIDENTIFIED
4036
4037 _[ - ]::--------------------------------------------------------------------------------------------------------------
4038|_[ + ] [ 3 / 100 ]-[17:34:20] [ - ]
4039|_[ + ] Target:: [ https://www.boywiki.org/en/Insider_Video_Club ]
4040|_[ + ] Exploit::
4041|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4042|_[ + ] More details:: / - / , ISP:
4043|_[ + ] Found:: UNIDENTIFIED
4044
4045 _[ - ]::--------------------------------------------------------------------------------------------------------------
4046|_[ + ] [ 4 / 100 ]-[17:34:22] [ - ]
4047|_[ + ] Target:: [ https://www.boywiki.org/de/Therapie ]
4048|_[ + ] Exploit::
4049|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4050|_[ + ] More details:: / - / , ISP:
4051|_[ + ] Found:: UNIDENTIFIED
4052
4053 _[ - ]::--------------------------------------------------------------------------------------------------------------
4054|_[ + ] [ 5 / 100 ]-[17:34:24] [ - ]
4055|_[ + ] Target:: [ https://www.boywiki.org/en/Philippines ]
4056|_[ + ] Exploit::
4057|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4058|_[ + ] More details:: / - / , ISP:
4059|_[ + ] Found:: UNIDENTIFIED
4060
4061 _[ - ]::--------------------------------------------------------------------------------------------------------------
4062|_[ + ] [ 6 / 100 ]-[17:34:26] [ - ]
4063|_[ + ] Target:: [ https://www.boywiki.org/en/Freedom_of_speech ]
4064|_[ + ] Exploit::
4065|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4066|_[ + ] More details:: / - / , ISP:
4067|_[ + ] Found:: UNIDENTIFIED
4068
4069 _[ - ]::--------------------------------------------------------------------------------------------------------------
4070|_[ + ] [ 7 / 100 ]-[17:34:28] [ - ]
4071|_[ + ] Target:: [ https://www.boywiki.org/fr/John_Henry_Mackay ]
4072|_[ + ] Exploit::
4073|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4074|_[ + ] More details:: / - / , ISP:
4075|_[ + ] Found:: UNIDENTIFIED
4076
4077 _[ - ]::--------------------------------------------------------------------------------------------------------------
4078|_[ + ] [ 8 / 100 ]-[17:34:29] [ - ]
4079|_[ + ] Target:: [ https://www.boywiki.org/fr/Génie ]
4080|_[ + ] Exploit::
4081|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4082|_[ + ] More details:: / - / , ISP:
4083|_[ + ] Found:: UNIDENTIFIED
4084
4085 _[ - ]::--------------------------------------------------------------------------------------------------------------
4086|_[ + ] [ 9 / 100 ]-[17:34:31] [ - ]
4087|_[ + ] Target:: [ https://www.boywiki.org/en/Gold_Cup ]
4088|_[ + ] Exploit::
4089|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4090|_[ + ] More details:: / - / , ISP:
4091|_[ + ] Found:: UNIDENTIFIED
4092
4093 _[ - ]::--------------------------------------------------------------------------------------------------------------
4094|_[ + ] [ 10 / 100 ]-[17:34:33] [ - ]
4095|_[ + ] Target:: [ https://www.boywiki.org/fr/Gabriel_Matzneff ]
4096|_[ + ] Exploit::
4097|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4098|_[ + ] More details:: / - / , ISP:
4099|_[ + ] Found:: UNIDENTIFIED
4100
4101 _[ - ]::--------------------------------------------------------------------------------------------------------------
4102|_[ + ] [ 11 / 100 ]-[17:34:36] [ - ]
4103|_[ + ] Target:: [ https://www.boywiki.org/en/BoyChat ]
4104|_[ + ] Exploit::
4105|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4106|_[ + ] More details:: / - / , ISP:
4107|_[ + ] Found:: UNIDENTIFIED
4108
4109 _[ - ]::--------------------------------------------------------------------------------------------------------------
4110|_[ + ] [ 12 / 100 ]-[17:34:37] [ - ]
4111|_[ + ] Target:: [ https://www.boywiki.org/en/Jokes ]
4112|_[ + ] Exploit::
4113|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4114|_[ + ] More details:: / - / , ISP:
4115|_[ + ] Found:: UNIDENTIFIED
4116
4117 _[ - ]::--------------------------------------------------------------------------------------------------------------
4118|_[ + ] [ 13 / 100 ]-[17:34:41] [ - ]
4119|_[ + ] Target:: [ https://www.boywiki.org/en/A_History_of_BoyChat_by_Alexis ]
4120|_[ + ] Exploit::
4121|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4122|_[ + ] More details:: / - / , ISP:
4123|_[ + ] Found:: UNIDENTIFIED
4124
4125 _[ - ]::--------------------------------------------------------------------------------------------------------------
4126|_[ + ] [ 14 / 100 ]-[17:34:43] [ - ]
4127|_[ + ] Target:: [ https://www.boywiki.org/en/Rhadamanthus ]
4128|_[ + ] Exploit::
4129|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4130|_[ + ] More details:: / - / , ISP:
4131|_[ + ] Found:: UNIDENTIFIED
4132
4133 _[ - ]::--------------------------------------------------------------------------------------------------------------
4134|_[ + ] [ 15 / 100 ]-[17:34:45] [ - ]
4135|_[ + ] Target:: [ https://www.boywiki.org/en/The_pool_with_the_cinderblock_walls ]
4136|_[ + ] Exploit::
4137|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4138|_[ + ] More details:: / - / , ISP:
4139|_[ + ] Found:: UNIDENTIFIED
4140
4141 _[ - ]::--------------------------------------------------------------------------------------------------------------
4142|_[ + ] [ 16 / 100 ]-[17:34:47] [ - ]
4143|_[ + ] Target:: [ https://www.boywiki.org/en/Commodus ]
4144|_[ + ] Exploit::
4145|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4146|_[ + ] More details:: / - / , ISP:
4147|_[ + ] Found:: UNIDENTIFIED
4148
4149 _[ - ]::--------------------------------------------------------------------------------------------------------------
4150|_[ + ] [ 17 / 100 ]-[17:34:50] [ - ]
4151|_[ + ] Target:: [ https://www.boywiki.org/fr/Roger_Peyrefitte ]
4152|_[ + ] Exploit::
4153|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4154|_[ + ] More details:: / - / , ISP:
4155|_[ + ] Found:: UNIDENTIFIED
4156
4157 _[ - ]::--------------------------------------------------------------------------------------------------------------
4158|_[ + ] [ 18 / 100 ]-[17:34:52] [ - ]
4159|_[ + ] Target:: [ https://www.boywiki.org/fr/22_janvier ]
4160|_[ + ] Exploit::
4161|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4162|_[ + ] More details:: / - / , ISP:
4163|_[ + ] Found:: UNIDENTIFIED
4164
4165 _[ - ]::--------------------------------------------------------------------------------------------------------------
4166|_[ + ] [ 19 / 100 ]-[17:34:54] [ - ]
4167|_[ + ] Target:: [ https://www.boywiki.org/fr/Bibliographie_garçonnière_–_L ]
4168|_[ + ] Exploit::
4169|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4170|_[ + ] More details:: / - / , ISP:
4171|_[ + ] Found:: UNIDENTIFIED
4172
4173 _[ - ]::--------------------------------------------------------------------------------------------------------------
4174|_[ + ] [ 20 / 100 ]-[17:34:55] [ - ]
4175|_[ + ] Target:: [ https://www.boywiki.org/en/Paperboy ]
4176|_[ + ] Exploit::
4177|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4178|_[ + ] More details:: / - / , ISP:
4179|_[ + ] Found:: UNIDENTIFIED
4180
4181 _[ - ]::--------------------------------------------------------------------------------------------------------------
4182|_[ + ] [ 21 / 100 ]-[17:34:57] [ - ]
4183|_[ + ] Target:: [ https://www.boywiki.org/en/Gil_Hardwick ]
4184|_[ + ] Exploit::
4185|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4186|_[ + ] More details:: / - / , ISP:
4187|_[ + ] Found:: UNIDENTIFIED
4188
4189 _[ - ]::--------------------------------------------------------------------------------------------------------------
4190|_[ + ] [ 22 / 100 ]-[17:34:59] [ - ]
4191|_[ + ] Target:: [ https://www.boywiki.org/fr/XXe_siècle ]
4192|_[ + ] Exploit::
4193|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4194|_[ + ] More details:: / - / , ISP:
4195|_[ + ] Found:: UNIDENTIFIED
4196
4197 _[ - ]::--------------------------------------------------------------------------------------------------------------
4198|_[ + ] [ 23 / 100 ]-[17:35:00] [ - ]
4199|_[ + ] Target:: [ https://www.boywiki.org/fr/Couple_pédérastique ]
4200|_[ + ] Exploit::
4201|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4202|_[ + ] More details:: / - / , ISP:
4203|_[ + ] Found:: UNIDENTIFIED
4204
4205 _[ - ]::--------------------------------------------------------------------------------------------------------------
4206|_[ + ] [ 24 / 100 ]-[17:35:02] [ - ]
4207|_[ + ] Target:: [ https://www.boywiki.org/fr/Comité_d’action_pédérastique_révolutionnaire ]
4208|_[ + ] Exploit::
4209|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4210|_[ + ] More details:: / - / , ISP:
4211|_[ + ] Found:: UNIDENTIFIED
4212
4213 _[ - ]::--------------------------------------------------------------------------------------------------------------
4214|_[ + ] [ 25 / 100 ]-[17:35:04] [ - ]
4215|_[ + ] Target:: [ https://www.boywiki.org/en/Justin_Berry ]
4216|_[ + ] Exploit::
4217|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4218|_[ + ] More details:: / - / , ISP:
4219|_[ + ] Found:: UNIDENTIFIED
4220
4221 _[ - ]::--------------------------------------------------------------------------------------------------------------
4222|_[ + ] [ 26 / 100 ]-[17:35:06] [ - ]
4223|_[ + ] Target:: [ https://www.boywiki.org/en/Operation_Rescue ]
4224|_[ + ] Exploit::
4225|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4226|_[ + ] More details:: / - / , ISP:
4227|_[ + ] Found:: UNIDENTIFIED
4228
4229 _[ - ]::--------------------------------------------------------------------------------------------------------------
4230|_[ + ] [ 27 / 100 ]-[17:35:08] [ - ]
4231|_[ + ] Target:: [ https://www.boywiki.org/fr/Dictons_et_proverbes ]
4232|_[ + ] Exploit::
4233|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4234|_[ + ] More details:: / - / , ISP:
4235|_[ + ] Found:: UNIDENTIFIED
4236
4237 _[ - ]::--------------------------------------------------------------------------------------------------------------
4238|_[ + ] [ 28 / 100 ]-[17:35:10] [ - ]
4239|_[ + ] Target:: [ https://www.boywiki.org/fr/Femme ]
4240|_[ + ] Exploit::
4241|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4242|_[ + ] More details:: / - / , ISP:
4243|_[ + ] Found:: UNIDENTIFIED
4244
4245 _[ - ]::--------------------------------------------------------------------------------------------------------------
4246|_[ + ] [ 29 / 100 ]-[17:35:12] [ - ]
4247|_[ + ] Target:: [ https://www.boywiki.org/fr/Willem_Geets ]
4248|_[ + ] Exploit::
4249|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4250|_[ + ] More details:: / - / , ISP:
4251|_[ + ] Found:: UNIDENTIFIED
4252
4253 _[ - ]::--------------------------------------------------------------------------------------------------------------
4254|_[ + ] [ 30 / 100 ]-[17:35:14] [ - ]
4255|_[ + ] Target:: [ https://www.boywiki.org/fr/Sava_Petković ]
4256|_[ + ] Exploit::
4257|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4258|_[ + ] More details:: / - / , ISP:
4259|_[ + ] Found:: UNIDENTIFIED
4260
4261 _[ - ]::--------------------------------------------------------------------------------------------------------------
4262|_[ + ] [ 31 / 100 ]-[17:35:16] [ - ]
4263|_[ + ] Target:: [ https://www.boywiki.org/en/Michigan_Citizens_for_Justice ]
4264|_[ + ] Exploit::
4265|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4266|_[ + ] More details:: / - / , ISP:
4267|_[ + ] Found:: UNIDENTIFIED
4268
4269 _[ - ]::--------------------------------------------------------------------------------------------------------------
4270|_[ + ] [ 32 / 100 ]-[17:35:18] [ - ]
4271|_[ + ] Target:: [ https://www.boywiki.org/fr/1971 ]
4272|_[ + ] Exploit::
4273|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4274|_[ + ] More details:: / - / , ISP:
4275|_[ + ] Found:: UNIDENTIFIED
4276
4277 _[ - ]::--------------------------------------------------------------------------------------------------------------
4278|_[ + ] [ 33 / 100 ]-[17:35:20] [ - ]
4279|_[ + ] Target:: [ https://www.boywiki.org/en/BoyLinks ]
4280|_[ + ] Exploit::
4281|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4282|_[ + ] More details:: / - / , ISP:
4283|_[ + ] Found:: UNIDENTIFIED
4284
4285 _[ - ]::--------------------------------------------------------------------------------------------------------------
4286|_[ + ] [ 34 / 100 ]-[17:35:22] [ - ]
4287|_[ + ] Target:: [ https://www.boywiki.org/en/February_18 ]
4288|_[ + ] Exploit::
4289|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4290|_[ + ] More details:: / - / , ISP:
4291|_[ + ] Found:: UNIDENTIFIED
4292
4293 _[ - ]::--------------------------------------------------------------------------------------------------------------
4294|_[ + ] [ 35 / 100 ]-[17:35:24] [ - ]
4295|_[ + ] Target:: [ https://www.boywiki.org/fr/Internat ]
4296|_[ + ] Exploit::
4297|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4298|_[ + ] More details:: / - / , ISP:
4299|_[ + ] Found:: UNIDENTIFIED
4300
4301 _[ - ]::--------------------------------------------------------------------------------------------------------------
4302|_[ + ] [ 36 / 100 ]-[17:35:26] [ - ]
4303|_[ + ] Target:: [ https://www.boywiki.org/en/Edward_Perry_Warren ]
4304|_[ + ] Exploit::
4305|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4306|_[ + ] More details:: / - / , ISP:
4307|_[ + ] Found:: UNIDENTIFIED
4308
4309 _[ - ]::--------------------------------------------------------------------------------------------------------------
4310|_[ + ] [ 37 / 100 ]-[17:35:28] [ - ]
4311|_[ + ] Target:: [ https://www.boywiki.org/en/Florida_Action_Committee ]
4312|_[ + ] Exploit::
4313|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4314|_[ + ] More details:: / - / , ISP:
4315|_[ + ] Found:: UNIDENTIFIED
4316
4317 _[ - ]::--------------------------------------------------------------------------------------------------------------
4318|_[ + ] [ 38 / 100 ]-[17:35:30] [ - ]
4319|_[ + ] Target:: [ https://www.boywiki.org/en/March_6 ]
4320|_[ + ] Exploit::
4321|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4322|_[ + ] More details:: / - / , ISP:
4323|_[ + ] Found:: UNIDENTIFIED
4324
4325 _[ - ]::--------------------------------------------------------------------------------------------------------------
4326|_[ + ] [ 39 / 100 ]-[17:35:32] [ - ]
4327|_[ + ] Target:: [ https://www.boywiki.org/de/Krumme_13 ]
4328|_[ + ] Exploit::
4329|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4330|_[ + ] More details:: / - / , ISP:
4331|_[ + ] Found:: UNIDENTIFIED
4332
4333 _[ - ]::--------------------------------------------------------------------------------------------------------------
4334|_[ + ] [ 40 / 100 ]-[17:35:34] [ - ]
4335|_[ + ] Target:: [ https://www.boywiki.org/fr/Christian_Mormont ]
4336|_[ + ] Exploit::
4337|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4338|_[ + ] More details:: / - / , ISP:
4339|_[ + ] Found:: UNIDENTIFIED
4340
4341 _[ - ]::--------------------------------------------------------------------------------------------------------------
4342|_[ + ] [ 41 / 100 ]-[17:35:36] [ - ]
4343|_[ + ] Target:: [ https://www.boywiki.org/en/YoungCity ]
4344|_[ + ] Exploit::
4345|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4346|_[ + ] More details:: / - / , ISP:
4347|_[ + ] Found:: UNIDENTIFIED
4348
4349 _[ - ]::--------------------------------------------------------------------------------------------------------------
4350|_[ + ] [ 42 / 100 ]-[17:35:38] [ - ]
4351|_[ + ] Target:: [ https://www.boywiki.org/de/Ralfsches_Gesetz ]
4352|_[ + ] Exploit::
4353|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4354|_[ + ] More details:: / - / , ISP:
4355|_[ + ] Found:: UNIDENTIFIED
4356
4357 _[ - ]::--------------------------------------------------------------------------------------------------------------
4358|_[ + ] [ 43 / 100 ]-[17:35:39] [ - ]
4359|_[ + ] Target:: [ https://www.boywiki.org/fr/Couple_pédérastique_historique ]
4360|_[ + ] Exploit::
4361|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4362|_[ + ] More details:: / - / , ISP:
4363|_[ + ] Found:: UNIDENTIFIED
4364
4365 _[ - ]::--------------------------------------------------------------------------------------------------------------
4366|_[ + ] [ 44 / 100 ]-[17:35:41] [ - ]
4367|_[ + ] Target:: [ https://www.boywiki.org/fr/L’Élu_–_Chapitre_XIX ]
4368|_[ + ] Exploit::
4369|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4370|_[ + ] More details:: / - / , ISP:
4371|_[ + ] Found:: UNIDENTIFIED
4372
4373 _[ - ]::--------------------------------------------------------------------------------------------------------------
4374|_[ + ] [ 45 / 100 ]-[17:35:43] [ - ]
4375|_[ + ] Target:: [ https://www.boywiki.org/en/CRIME_WITHOUT_VICTIMS_A_book_about_paedophilia ]
4376|_[ + ] Exploit::
4377|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4378|_[ + ] More details:: / - / , ISP:
4379|_[ + ] Found:: UNIDENTIFIED
4380
4381 _[ - ]::--------------------------------------------------------------------------------------------------------------
4382|_[ + ] [ 46 / 100 ]-[17:35:45] [ - ]
4383|_[ + ] Target:: [ https://www.boywiki.org/en/Gaston_Goor ]
4384|_[ + ] Exploit::
4385|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4386|_[ + ] More details:: / - / , ISP:
4387|_[ + ] Found:: UNIDENTIFIED
4388
4389 _[ - ]::--------------------------------------------------------------------------------------------------------------
4390|_[ + ] [ 47 / 100 ]-[17:35:46] [ - ]
4391|_[ + ] Target:: [ https://www.boywiki.org/fr/La_sexualité_chez_les_crétins ]
4392|_[ + ] Exploit::
4393|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4394|_[ + ] More details:: / - / , ISP:
4395|_[ + ] Found:: UNIDENTIFIED
4396
4397 _[ - ]::--------------------------------------------------------------------------------------------------------------
4398|_[ + ] [ 48 / 100 ]-[17:35:48] [ - ]
4399|_[ + ] Target:: [ https://www.boywiki.org/fr/Richard_Renvoisy ]
4400|_[ + ] Exploit::
4401|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4402|_[ + ] More details:: / - / , ISP:
4403|_[ + ] Found:: UNIDENTIFIED
4404
4405 _[ - ]::--------------------------------------------------------------------------------------------------------------
4406|_[ + ] [ 49 / 100 ]-[17:35:50] [ - ]
4407|_[ + ] Target:: [ https://www.boywiki.org/fr/L’érotisme_n’est_pas_un_violon_d’Ingres ]
4408|_[ + ] Exploit::
4409|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4410|_[ + ] More details:: / - / , ISP:
4411|_[ + ] Found:: UNIDENTIFIED
4412
4413 _[ - ]::--------------------------------------------------------------------------------------------------------------
4414|_[ + ] [ 50 / 100 ]-[17:35:52] [ - ]
4415|_[ + ] Target:: [ https://www.boywiki.org/en/Boarding_school ]
4416|_[ + ] Exploit::
4417|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4418|_[ + ] More details:: / - / , ISP:
4419|_[ + ] Found:: UNIDENTIFIED
4420
4421 _[ - ]::--------------------------------------------------------------------------------------------------------------
4422|_[ + ] [ 51 / 100 ]-[17:35:53] [ - ]
4423|_[ + ] Target:: [ https://www.boywiki.org/fr/Poèmes_d’Hilaire_d’Orléans ]
4424|_[ + ] Exploit::
4425|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4426|_[ + ] More details:: / - / , ISP:
4427|_[ + ] Found:: UNIDENTIFIED
4428
4429 _[ - ]::--------------------------------------------------------------------------------------------------------------
4430|_[ + ] [ 52 / 100 ]-[17:35:55] [ - ]
4431|_[ + ] Target:: [ https://www.boywiki.org/en/Africa ]
4432|_[ + ] Exploit::
4433|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4434|_[ + ] More details:: / - / , ISP:
4435|_[ + ] Found:: UNIDENTIFIED
4436
4437 _[ - ]::--------------------------------------------------------------------------------------------------------------
4438|_[ + ] [ 53 / 100 ]-[17:35:57] [ - ]
4439|_[ + ] Target:: [ https://www.boywiki.org/fr/Roman_policier ]
4440|_[ + ] Exploit::
4441|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4442|_[ + ] More details:: / - / , ISP:
4443|_[ + ] Found:: UNIDENTIFIED
4444
4445 _[ - ]::--------------------------------------------------------------------------------------------------------------
4446|_[ + ] [ 54 / 100 ]-[17:35:59] [ - ]
4447|_[ + ] Target:: [ https://www.boywiki.org/en/Historical_boylove_relationships_in_Japan ]
4448|_[ + ] Exploit::
4449|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4450|_[ + ] More details:: / - / , ISP:
4451|_[ + ] Found:: UNIDENTIFIED
4452
4453 _[ - ]::--------------------------------------------------------------------------------------------------------------
4454|_[ + ] [ 55 / 100 ]-[17:36:01] [ - ]
4455|_[ + ] Target:: [ https://www.boywiki.org/en/About_Sophocles ]
4456|_[ + ] Exploit::
4457|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4458|_[ + ] More details:: / - / , ISP:
4459|_[ + ] Found:: UNIDENTIFIED
4460
4461 _[ - ]::--------------------------------------------------------------------------------------------------------------
4462|_[ + ] [ 56 / 100 ]-[17:36:03] [ - ]
4463|_[ + ] Target:: [ https://www.boywiki.org/fr/Nicolas_Gombert ]
4464|_[ + ] Exploit::
4465|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4466|_[ + ] More details:: / - / , ISP:
4467|_[ + ] Found:: UNIDENTIFIED
4468
4469 _[ - ]::--------------------------------------------------------------------------------------------------------------
4470|_[ + ] [ 57 / 100 ]-[17:36:08] [ - ]
4471|_[ + ] Target:: [ https://www.boywiki.org/fr/Orphelin ]
4472|_[ + ] Exploit::
4473|_[ + ] Information Server:: , , IP::0
4474|_[ + ] More details::
4475|_[ + ] Found:: UNIDENTIFIED
4476
4477 _[ - ]::--------------------------------------------------------------------------------------------------------------
4478|_[ + ] [ 58 / 100 ]-[17:36:10] [ - ]
4479|_[ + ] Target:: [ https://www.boywiki.org/fr/Lettres_de_Tony_Duvert_à_Michel_Longuet ]
4480|_[ + ] Exploit::
4481|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4482|_[ + ] More details:: / - / , ISP:
4483|_[ + ] Found:: UNIDENTIFIED
4484
4485 _[ - ]::--------------------------------------------------------------------------------------------------------------
4486|_[ + ] [ 59 / 100 ]-[17:36:12] [ - ]
4487|_[ + ] Target:: [ https://www.boywiki.org/fr/Claude_Joseph_Bail ]
4488|_[ + ] Exploit::
4489|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4490|_[ + ] More details:: / - / , ISP:
4491|_[ + ] Found:: UNIDENTIFIED
4492
4493 _[ - ]::--------------------------------------------------------------------------------------------------------------
4494|_[ + ] [ 60 / 100 ]-[17:36:13] [ - ]
4495|_[ + ] Target:: [ https://www.boywiki.org/fr/Fresque_des_enfants_boxeurs ]
4496|_[ + ] Exploit::
4497|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4498|_[ + ] More details:: / - / , ISP:
4499|_[ + ] Found:: UNIDENTIFIED
4500
4501 _[ - ]::--------------------------------------------------------------------------------------------------------------
4502|_[ + ] [ 61 / 100 ]-[17:36:17] [ - ]
4503|_[ + ] Target:: [ https://www.boywiki.org/fr/Octobre ]
4504|_[ + ] Exploit::
4505|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4506|_[ + ] More details:: / - / , ISP:
4507|_[ + ] Found:: UNIDENTIFIED
4508
4509 _[ - ]::--------------------------------------------------------------------------------------------------------------
4510|_[ + ] [ 62 / 100 ]-[17:36:18] [ - ]
4511|_[ + ] Target:: [ https://www.boywiki.org/fr/Abû_Nuwâs ]
4512|_[ + ] Exploit::
4513|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4514|_[ + ] More details:: / - / , ISP:
4515|_[ + ] Found:: UNIDENTIFIED
4516
4517 _[ - ]::--------------------------------------------------------------------------------------------------------------
4518|_[ + ] [ 63 / 100 ]-[17:36:20] [ - ]
4519|_[ + ] Target:: [ https://www.boywiki.org/en/Cole_and_Dylan_Sprouse ]
4520|_[ + ] Exploit::
4521|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4522|_[ + ] More details:: / - / , ISP:
4523|_[ + ] Found:: UNIDENTIFIED
4524
4525 _[ - ]::--------------------------------------------------------------------------------------------------------------
4526|_[ + ] [ 64 / 100 ]-[17:36:22] [ - ]
4527|_[ + ] Target:: [ https://www.boywiki.org/fr/Kjeld_Frydenlund ]
4528|_[ + ] Exploit::
4529|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4530|_[ + ] More details:: / - / , ISP:
4531|_[ + ] Found:: UNIDENTIFIED
4532
4533 _[ - ]::--------------------------------------------------------------------------------------------------------------
4534|_[ + ] [ 65 / 100 ]-[17:36:24] [ - ]
4535|_[ + ] Target:: [ https://www.boywiki.org/fr/1986 ]
4536|_[ + ] Exploit::
4537|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4538|_[ + ] More details:: / - / , ISP:
4539|_[ + ] Found:: UNIDENTIFIED
4540
4541 _[ - ]::--------------------------------------------------------------------------------------------------------------
4542|_[ + ] [ 66 / 100 ]-[17:36:26] [ - ]
4543|_[ + ] Target:: [ https://www.boywiki.org/en/Joseph_Geraci ]
4544|_[ + ] Exploit::
4545|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4546|_[ + ] More details:: / - / , ISP:
4547|_[ + ] Found:: UNIDENTIFIED
4548
4549 _[ - ]::--------------------------------------------------------------------------------------------------------------
4550|_[ + ] [ 67 / 100 ]-[17:36:28] [ - ]
4551|_[ + ] Target:: [ https://www.boywiki.org/de/Literatur_zum_Thema_Sexueller_Missbrauch_von_Kindern ]
4552|_[ + ] Exploit::
4553|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4554|_[ + ] More details:: / - / , ISP:
4555|_[ + ] Found:: UNIDENTIFIED
4556
4557 _[ - ]::--------------------------------------------------------------------------------------------------------------
4558|_[ + ] [ 68 / 100 ]-[17:36:29] [ - ]
4559|_[ + ] Target:: [ https://www.boywiki.org/fr/Filmographie_garçonnière ]
4560|_[ + ] Exploit::
4561|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4562|_[ + ] More details:: / - / , ISP:
4563|_[ + ] Found:: UNIDENTIFIED
4564
4565 _[ - ]::--------------------------------------------------------------------------------------------------------------
4566|_[ + ] [ 69 / 100 ]-[17:36:31] [ - ]
4567|_[ + ] Target:: [ https://www.boywiki.org/en/March_19 ]
4568|_[ + ] Exploit::
4569|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4570|_[ + ] More details:: / - / , ISP:
4571|_[ + ] Found:: UNIDENTIFIED
4572
4573 _[ - ]::--------------------------------------------------------------------------------------------------------------
4574|_[ + ] [ 70 / 100 ]-[17:36:34] [ - ]
4575|_[ + ] Target:: [ https://www.boywiki.org/fr/29_octobre ]
4576|_[ + ] Exploit::
4577|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4578|_[ + ] More details:: / - / , ISP:
4579|_[ + ] Found:: UNIDENTIFIED
4580
4581 _[ - ]::--------------------------------------------------------------------------------------------------------------
4582|_[ + ] [ 71 / 100 ]-[17:36:36] [ - ]
4583|_[ + ] Target:: [ https://www.boywiki.org/fr/Arandas ]
4584|_[ + ] Exploit::
4585|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4586|_[ + ] More details:: / - / , ISP:
4587|_[ + ] Found:: UNIDENTIFIED
4588
4589 _[ - ]::--------------------------------------------------------------------------------------------------------------
4590|_[ + ] [ 72 / 100 ]-[17:36:38] [ - ]
4591|_[ + ] Target:: [ https://www.boywiki.org/en/Absolute_Zero ]
4592|_[ + ] Exploit::
4593|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4594|_[ + ] More details:: / - / , ISP:
4595|_[ + ] Found:: UNIDENTIFIED
4596
4597 _[ - ]::--------------------------------------------------------------------------------------------------------------
4598|_[ + ] [ 73 / 100 ]-[17:36:42] [ - ]
4599|_[ + ] Target:: [ https://www.boywiki.org/en/Pederastic_relationships_in_classical_antiquity ]
4600|_[ + ] Exploit::
4601|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4602|_[ + ] More details:: / - / , ISP:
4603|_[ + ] Found:: UNIDENTIFIED
4604
4605 _[ - ]::--------------------------------------------------------------------------------------------------------------
4606|_[ + ] [ 74 / 100 ]-[17:36:43] [ - ]
4607|_[ + ] Target:: [ https://www.boywiki.org/en/Joseph_Doucé ]
4608|_[ + ] Exploit::
4609|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4610|_[ + ] More details:: / - / , ISP:
4611|_[ + ] Found:: UNIDENTIFIED
4612
4613 _[ - ]::--------------------------------------------------------------------------------------------------------------
4614|_[ + ] [ 75 / 100 ]-[17:36:46] [ - ]
4615|_[ + ] Target:: [ https://www.boywiki.org/en/Police_state ]
4616|_[ + ] Exploit::
4617|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4618|_[ + ] More details:: / - / , ISP:
4619|_[ + ] Found:: UNIDENTIFIED
4620
4621 _[ - ]::--------------------------------------------------------------------------------------------------------------
4622|_[ + ] [ 76 / 100 ]-[17:36:48] [ - ]
4623|_[ + ] Target:: [ https://www.boywiki.org/en/Ann_Wolbert_Burgess ]
4624|_[ + ] Exploit::
4625|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4626|_[ + ] More details:: / - / , ISP:
4627|_[ + ] Found:: UNIDENTIFIED
4628
4629 _[ - ]::--------------------------------------------------------------------------------------------------------------
4630|_[ + ] [ 77 / 100 ]-[17:36:50] [ - ]
4631|_[ + ] Target:: [ https://www.boywiki.org/en/Mental_disorder ]
4632|_[ + ] Exploit::
4633|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4634|_[ + ] More details:: / - / , ISP:
4635|_[ + ] Found:: UNIDENTIFIED
4636
4637 _[ - ]::--------------------------------------------------------------------------------------------------------------
4638|_[ + ] [ 78 / 100 ]-[17:36:52] [ - ]
4639|_[ + ] Target:: [ https://www.boywiki.org/en/Halloween ]
4640|_[ + ] Exploit::
4641|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4642|_[ + ] More details:: / - / , ISP:
4643|_[ + ] Found:: UNIDENTIFIED
4644
4645 _[ - ]::--------------------------------------------------------------------------------------------------------------
4646|_[ + ] [ 79 / 100 ]-[17:36:54] [ - ]
4647|_[ + ] Target:: [ https://www.boywiki.org/en/About_Heinz_Kohut ]
4648|_[ + ] Exploit::
4649|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4650|_[ + ] More details:: / - / , ISP:
4651|_[ + ] Found:: UNIDENTIFIED
4652
4653 _[ - ]::--------------------------------------------------------------------------------------------------------------
4654|_[ + ] [ 80 / 100 ]-[17:36:56] [ - ]
4655|_[ + ] Target:: [ https://www.boywiki.org/en/Bruce_Rind ]
4656|_[ + ] Exploit::
4657|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4658|_[ + ] More details:: / - / , ISP:
4659|_[ + ] Found:: UNIDENTIFIED
4660
4661 _[ - ]::--------------------------------------------------------------------------------------------------------------
4662|_[ + ] [ 81 / 100 ]-[17:36:58] [ - ]
4663|_[ + ] Target:: [ https://www.boywiki.org/en/Ivan_Noel ]
4664|_[ + ] Exploit::
4665|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4666|_[ + ] More details:: / - / , ISP:
4667|_[ + ] Found:: UNIDENTIFIED
4668
4669 _[ - ]::--------------------------------------------------------------------------------------------------------------
4670|_[ + ] [ 82 / 100 ]-[17:37:00] [ - ]
4671|_[ + ] Target:: [ https://www.boywiki.org/en/LifeLine ]
4672|_[ + ] Exploit::
4673|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4674|_[ + ] More details:: / - / , ISP:
4675|_[ + ] Found:: UNIDENTIFIED
4676
4677 _[ - ]::--------------------------------------------------------------------------------------------------------------
4678|_[ + ] [ 83 / 100 ]-[17:37:02] [ - ]
4679|_[ + ] Target:: [ https://www.boywiki.org/en/Alexis ]
4680|_[ + ] Exploit::
4681|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4682|_[ + ] More details:: / - / , ISP:
4683|_[ + ] Found:: UNIDENTIFIED
4684
4685 _[ - ]::--------------------------------------------------------------------------------------------------------------
4686|_[ + ] [ 84 / 100 ]-[17:37:04] [ - ]
4687|_[ + ] Target:: [ https://www.boywiki.org/en/BoyWrite ]
4688|_[ + ] Exploit::
4689|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4690|_[ + ] More details:: / - / , ISP:
4691|_[ + ] Found:: UNIDENTIFIED
4692
4693 _[ - ]::--------------------------------------------------------------------------------------------------------------
4694|_[ + ] [ 85 / 100 ]-[17:37:06] [ - ]
4695|_[ + ] Target:: [ https://www.boywiki.org/en/International_Journal_of_Greek_Love ]
4696|_[ + ] Exploit::
4697|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4698|_[ + ] More details:: / - / , ISP:
4699|_[ + ] Found:: UNIDENTIFIED
4700
4701 _[ - ]::--------------------------------------------------------------------------------------------------------------
4702|_[ + ] [ 86 / 100 ]-[17:37:07] [ - ]
4703|_[ + ] Target:: [ https://www.boywiki.org/fr/Filmographie_garçonnière_–_Q ]
4704|_[ + ] Exploit::
4705|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4706|_[ + ] More details:: / - / , ISP:
4707|_[ + ] Found:: UNIDENTIFIED
4708
4709 _[ - ]::--------------------------------------------------------------------------------------------------------------
4710|_[ + ] [ 87 / 100 ]-[17:37:09] [ - ]
4711|_[ + ] Target:: [ https://www.boywiki.org/fr/Lettres_de_Tony_Duvert_à_Claude_Hastaire ]
4712|_[ + ] Exploit::
4713|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4714|_[ + ] More details:: / - / , ISP:
4715|_[ + ] Found:: UNIDENTIFIED
4716
4717 _[ - ]::--------------------------------------------------------------------------------------------------------------
4718|_[ + ] [ 88 / 100 ]-[17:37:11] [ - ]
4719|_[ + ] Target:: [ https://www.boywiki.org/en/Andreas_Embiricos ]
4720|_[ + ] Exploit::
4721|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4722|_[ + ] More details:: / - / , ISP:
4723|_[ + ] Found:: UNIDENTIFIED
4724
4725 _[ - ]::--------------------------------------------------------------------------------------------------------------
4726|_[ + ] [ 89 / 100 ]-[17:37:13] [ - ]
4727|_[ + ] Target:: [ https://www.boywiki.org/en/Wikisposure ]
4728|_[ + ] Exploit::
4729|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4730|_[ + ] More details:: / - / , ISP:
4731|_[ + ] Found:: UNIDENTIFIED
4732
4733 _[ - ]::--------------------------------------------------------------------------------------------------------------
4734|_[ + ] [ 90 / 100 ]-[17:37:15] [ - ]
4735|_[ + ] Target:: [ https://www.boywiki.org/fr/Humour ]
4736|_[ + ] Exploit::
4737|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4738|_[ + ] More details:: / - / , ISP:
4739|_[ + ] Found:: UNIDENTIFIED
4740
4741 _[ - ]::--------------------------------------------------------------------------------------------------------------
4742|_[ + ] [ 91 / 100 ]-[17:37:17] [ - ]
4743|_[ + ] Target:: [ https://www.boywiki.org/en/BoyChat_Steering_Committee ]
4744|_[ + ] Exploit::
4745|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4746|_[ + ] More details:: / - / , ISP:
4747|_[ + ] Found:: UNIDENTIFIED
4748
4749 _[ - ]::--------------------------------------------------------------------------------------------------------------
4750|_[ + ] [ 92 / 100 ]-[17:37:18] [ - ]
4751|_[ + ] Target:: [ https://www.boywiki.org/fr/Bibliographie_garçonnière_–_G ]
4752|_[ + ] Exploit::
4753|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4754|_[ + ] More details:: / - / , ISP:
4755|_[ + ] Found:: UNIDENTIFIED
4756
4757 _[ - ]::--------------------------------------------------------------------------------------------------------------
4758|_[ + ] [ 93 / 100 ]-[17:37:20] [ - ]
4759|_[ + ] Target:: [ https://www.boywiki.org/en/Tom_Reeves ]
4760|_[ + ] Exploit::
4761|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4762|_[ + ] More details:: / - / , ISP:
4763|_[ + ] Found:: UNIDENTIFIED
4764
4765 _[ - ]::--------------------------------------------------------------------------------------------------------------
4766|_[ + ] [ 94 / 100 ]-[17:37:22] [ - ]
4767|_[ + ] Target:: [ https://www.boywiki.org/en/James_Cantor ]
4768|_[ + ] Exploit::
4769|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4770|_[ + ] More details:: / - / , ISP:
4771|_[ + ] Found:: UNIDENTIFIED
4772
4773 _[ - ]::--------------------------------------------------------------------------------------------------------------
4774|_[ + ] [ 95 / 100 ]-[17:37:24] [ - ]
4775|_[ + ] Target:: [ https://www.boywiki.org/en/Albanian_pederasty ]
4776|_[ + ] Exploit::
4777|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4778|_[ + ] More details:: / - / , ISP:
4779|_[ + ] Found:: UNIDENTIFIED
4780
4781 _[ - ]::--------------------------------------------------------------------------------------------------------------
4782|_[ + ] [ 96 / 100 ]-[17:37:26] [ - ]
4783|_[ + ] Target:: [ https://www.boywiki.org/en/Libera ]
4784|_[ + ] Exploit::
4785|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4786|_[ + ] More details:: / - / , ISP:
4787|_[ + ] Found:: UNIDENTIFIED
4788
4789 _[ - ]::--------------------------------------------------------------------------------------------------------------
4790|_[ + ] [ 97 / 100 ]-[17:37:29] [ - ]
4791|_[ + ] Target:: [ https://www.boywiki.org/en/Guy_Strait ]
4792|_[ + ] Exploit::
4793|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4794|_[ + ] More details:: / - / , ISP:
4795|_[ + ] Found:: UNIDENTIFIED
4796
4797 _[ - ]::--------------------------------------------------------------------------------------------------------------
4798|_[ + ] [ 98 / 100 ]-[17:37:32] [ - ]
4799|_[ + ] Target:: [ https://www.boywiki.org/en/Pederasty_in_ancient_Greece ]
4800|_[ + ] Exploit::
4801|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4802|_[ + ] More details:: / - / , ISP:
4803|_[ + ] Found:: UNIDENTIFIED
4804
4805 _[ - ]::--------------------------------------------------------------------------------------------------------------
4806|_[ + ] [ 99 / 100 ]-[17:37:34] [ - ]
4807|_[ + ] Target:: [ https://www.boywiki.org/en/Hajime_Takeda ]
4808|_[ + ] Exploit::
4809|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PHP/5.4.45-0+deb7u9, IP:82.94.228.252:443
4810|_[ + ] More details:: / - / , ISP:
4811|_[ + ] Found:: UNIDENTIFIED
4812
4813[ INFO ] [ Shutting down ]
4814[ INFO ] [ End of process INURLBR at [24-03-2020 17:37:34]
4815[ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
4816[ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.boywiki.org/output/inurlbr-www.boywiki.org ]
4817|_________________________________________________________________________________________
4818
4819\_________________________________________________________________________________________/
4820########################################################################################################################
4821--------------------------------------------------------
4822<<<Yasuo discovered following vulnerable applications>>>
4823--------------------------------------------------------
4824+------------+---------------------------------------+--------------------------------------------------+-----------+-----------+
4825| App Name | URL to Application | Potential Exploit | Username | Password |
4826+------------+---------------------------------------+--------------------------------------------------+-----------+-----------+
4827| phpMyAdmin | https://82.94.228.252:443/phpmyadmin/ | ./exploits/multi/http/phpmyadmin_preg_replace.rb | Not Found | Not Found |
4828+------------+---------------------------------------+--------------------------------------------------+-----------+-----------+
4829#########################################################################################################################
4830Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-24 17:05 EDT
4831Nmap scan report for 82.94.228.252
4832Host is up (0.18s latency).
4833Not shown: 467 filtered ports
4834Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
4835PORT STATE SERVICE VERSION
483625/tcp open smtp Postfix smtpd
4837|_smtp-commands: mail.boywiki.org, PIPELINING, SIZE 30720000, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN,
4838|_ssl-date: TLS randomness does not represent time
483980/tcp open http nginx
4840|_http-title: 404 Not Found
4841110/tcp open pop3 Dovecot pop3d
4842|_pop3-capabilities: RESP-CODES CAPA SASL(CRAM-MD5) STLS UIDL TOP PIPELINING
4843|_ssl-date: TLS randomness does not represent time
4844143/tcp open imap Dovecot imapd
4845|_imap-capabilities: STARTTLS LITERAL+ LOGIN-REFERRALS post-login OK ID capabilities Pre-login IMAP4rev1 SASL-IR more listed IDLE ENABLE have LOGINDISABLED AUTH=CRAM-MD5A0001
4846|_ssl-date: TLS randomness does not represent time
4847443/tcp open ssl/http nginx
4848|_http-title: 403 Forbidden
4849| ssl-cert: Subject: commonName=boywiki.org
4850| Subject Alternative Name: DNS:boywiki.org, DNS:de.boywiki.org, DNS:en.boywiki.org, DNS:fr.boywiki.org, DNS:www.boywiki.org
4851| Not valid before: 2019-01-31T05:56:40
4852|_Not valid after: 2019-05-01T05:56:40
4853|_ssl-date: TLS randomness does not represent time
4854587/tcp open smtp Postfix smtpd
4855|_smtp-commands: mail.boywiki.org, PIPELINING, SIZE 30720000, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN,
4856|_ssl-date: TLS randomness does not represent time
4857993/tcp open ssl/imaps?
4858|_ssl-date: TLS randomness does not represent time
4859995/tcp open ssl/pop3s?
4860|_ssl-date: TLS randomness does not represent time
486110000/tcp open http MiniServ 1.850 (Webmin httpd)
4862|_http-title: Site doesn't have a title (text/html; Charset=iso-8859-1).
4863Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
4864Aggressive OS guesses: Linux 2.6.32 - 3.1 (92%), OpenWrt 12.09-rc1 Attitude Adjustment (Linux 3.3 - 3.7) (92%), Linux 3.2 (92%), Linux 3.2 - 3.10 (92%), Linux 3.2 - 3.16 (92%), Linux 3.2 - 3.8 (92%), Linux 3.8 (92%), Olivetti 65C-9 printer (92%), Linux 2.6.32 - 3.10 (92%), Linux 2.6.32 - 3.13 (92%)
4865No exact OS matches for host (test conditions non-ideal).
4866Network Distance: 14 hops
4867Service Info: Host: mail.boywiki.org
4868
4869TRACEROUTE (using port 80/tcp)
4870HOP RTT ADDRESS
48711 65.34 ms 10.203.3.1
48722 ...
48733 95.47 ms br1.dal.as8100.net (96.44.144.17)
48744 66.31 ms be5814.rcr21.b010621-0.dfw01.atlas.cogentco.com (38.122.58.57)
48755 66.93 ms be2560.ccr31.dfw01.atlas.cogentco.com (154.54.5.237)
48766 72.15 ms be2432.ccr21.mci01.atlas.cogentco.com (154.54.3.134)
48777 85.33 ms be2832.ccr42.ord01.atlas.cogentco.com (154.54.44.170)
48788 85.37 ms be2766.ccr41.ord03.atlas.cogentco.com (154.54.46.178)
48799 85.38 ms kpn.ord03.atlas.cogentco.com (154.54.11.22)
488010 190.44 ms asd-s8-rou-1041.NL.eurorings.net (134.222.48.91)
488111 ...
488212 174.14 ms 0.et-3-1-0.xr3.3d12.xs4all.net (194.109.5.6)
488313 172.08 ms 0.ae10.xrc2.3d12.xs4all.net (194.109.5.118)
488414 172.80 ms 82.94.228.252
4885#########################################################################################################################
4886Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-24 17:09 EDT
4887Nmap scan report for 82.94.228.252
4888Host is up (0.18s latency).
4889Not shown: 14 filtered ports
4890Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
4891PORT STATE SERVICE VERSION
489253/udp open domain (generic dns response: NOTIMP)
4893| dns-nsid:
4894|_ bind.version:
4895| fingerprint-strings:
4896| DNSVersionBindReq:
4897| version
4898| bind
4899| NBTStat:
4900|_ CKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
490167/udp open|filtered dhcps
490268/udp open|filtered dhcpc
490369/udp open|filtered tftp
490488/udp open|filtered kerberos-sec
4905123/udp open|filtered ntp
4906137/udp open|filtered netbios-ns
4907138/udp open|filtered netbios-dgm
4908139/udp open|filtered netbios-ssn
4909161/udp open|filtered snmp
4910162/udp open|filtered snmptrap
4911389/udp open|filtered ldap
4912520/udp open|filtered route
49132049/udp open|filtered nfs
49141 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
4915SF-Port53-UDP:V=7.80%I=7%D=3/24%Time=5E7A7703%P=x86_64-pc-linux-gnu%r(DNSV
4916SF:ersionBindReq,39,"\0\x06\x85\0\0\x01\0\x01\0\x01\0\0\x07version\x04bind
4917SF:\0\0\x10\0\x03\xc0\x0c\0\x10\0\x03\0\0\0\0\0\x01\0\xc0\x0c\0\x02\0\x03\
4918SF:0\0\0\0\0\x02\xc0\x0c")%r(DNSStatusRequest,C,"\0\0\x90\x04\0\0\0\0\0\0\
4919SF:0\0")%r(NBTStat,32,"\x80\xf0\x80\x15\0\x01\0\0\0\0\0\0\x20CKAAAAAAAAAAA
4920SF:AAAAAAAAAAAAAAAAAAA\0\0!\0\x01");
4921Too many fingerprints match this host to give specific OS details
4922Network Distance: 14 hops
4923
4924TRACEROUTE (using port 53/udp)
4925HOP RTT ADDRESS
49261 68.32 ms 10.203.3.1
49272 ...
49283 69.65 ms br1.dal.as8100.net (96.44.144.17)
49294 69.71 ms be5814.rcr21.b010621-0.dfw01.atlas.cogentco.com (38.122.58.57)
49305 69.90 ms be2561.ccr32.dfw01.atlas.cogentco.com (154.54.6.73)
49316 82.80 ms be2433.ccr22.mci01.atlas.cogentco.com (154.54.3.214)
49327 94.85 ms be2831.ccr41.ord01.atlas.cogentco.com (154.54.42.166)
49338 90.41 ms be2765.ccr41.ord03.atlas.cogentco.com (154.54.45.18)
49349 88.28 ms kpn.ord03.atlas.cogentco.com (154.54.11.22)
493510 194.14 ms asd-s8-rou-1041.NL.eurorings.net (134.222.48.91)
493611 ...
493712 175.42 ms 0.et-3-1-0.xr3.3d12.xs4all.net (194.109.5.6)
493813 230.98 ms 0.ae11.xrc1.1d12.xs4all.net (194.109.5.102)
493914 178.36 ms 82.94.228.252
4940#########################################################################################################################
4941Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-24 17:14 EDT
4942Nmap scan report for 82.94.228.252
4943Host is up (0.18s latency).
4944
4945PORT STATE SERVICE VERSION
494625/tcp open smtp Postfix smtpd
4947|_smtp-commands: mail.boywiki.org, PIPELINING, SIZE 30720000, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN,
4948| smtp-enum-users:
4949|_ Method RCPT returned a unhandled status code.
4950|_smtp-open-relay: Server doesn't seem to be an open relay, all tests failed
4951| smtp-vuln-cve2010-4344:
4952|_ The SMTP server is not Exim: NOT VULNERABLE
4953Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
4954Aggressive OS guesses: Linux 2.6.32 - 3.1 (92%), OpenWrt 12.09-rc1 Attitude Adjustment (Linux 3.3 - 3.7) (92%), Linux 3.2 (92%), Linux 3.2 - 3.10 (92%), Linux 3.2 - 3.16 (92%), Linux 3.2 - 3.8 (92%), Linux 3.5 (92%), Linux 3.8 (92%), XBMCbuntu Frodo v12.2 (Linux 3.X) (92%), Olivetti 65C-9 printer (92%)
4955No exact OS matches for host (test conditions non-ideal).
4956Network Distance: 14 hops
4957Service Info: Host: mail.boywiki.org
4958
4959TRACEROUTE (using port 25/tcp)
4960HOP RTT ADDRESS
49611 74.90 ms 10.203.3.1
49622 79.46 ms 161.129.68.81.static.quadranet.com (161.129.68.81)
49633 75.04 ms br1.dal.as8100.net (96.44.144.17)
49644 75.71 ms be5814.rcr21.b010621-0.dfw01.atlas.cogentco.com (38.122.58.57)
49655 75.79 ms be2560.ccr31.dfw01.atlas.cogentco.com (154.54.5.237)
49666 85.91 ms be2432.ccr21.mci01.atlas.cogentco.com (154.54.3.134)
49677 93.74 ms be2832.ccr42.ord01.atlas.cogentco.com (154.54.44.170)
49688 93.98 ms be2766.ccr41.ord03.atlas.cogentco.com (154.54.46.178)
49699 101.21 ms kpn.ord03.atlas.cogentco.com (154.54.11.22)
497010 201.30 ms asd-s8-rou-1041.NL.eurorings.net (134.222.48.91)
497111 ...
497212 178.03 ms 0.et-8-1-0.xr4.1d12.xs4all.net (194.109.5.4)
497313 182.24 ms 0.ae10.xrc2.3d12.xs4all.net (194.109.5.118)
497414 182.33 ms 82.94.228.252
4975#########################################################################################################################
4976Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-24 17:20 EDT
4977Nmap scan report for 82.94.228.252
4978Host is up (0.18s latency).
4979
4980PORT STATE SERVICE VERSION
498167/tcp filtered dhcps
498267/udp open|filtered dhcps
4983|_dhcp-discover: ERROR: Script execution failed (use -d to debug)
4984Too many fingerprints match this host to give specific OS details
4985Network Distance: 14 hops
4986
4987TRACEROUTE (using proto 1/icmp)
4988HOP RTT ADDRESS
49891 70.28 ms 10.203.3.1
49902 173.43 ms 161.129.68.81.static.quadranet.com (161.129.68.81)
49913 83.81 ms br1.dal.as8100.net (96.44.144.17)
49924 73.29 ms be5814.rcr21.b010621-0.dfw01.atlas.cogentco.com (38.122.58.57)
49935 73.34 ms be2560.ccr31.dfw01.atlas.cogentco.com (154.54.5.237)
49946 81.81 ms be2432.ccr21.mci01.atlas.cogentco.com (154.54.3.134)
49957 97.43 ms be2831.ccr41.ord01.atlas.cogentco.com (154.54.42.166)
49968 93.46 ms be2765.ccr41.ord03.atlas.cogentco.com (154.54.45.18)
49979 97.07 ms kpn.ord03.atlas.cogentco.com (154.54.11.22)
499810 196.81 ms asd-s8-rou-1041.NL.eurorings.net (134.222.48.91)
499911 ...
500012 224.85 ms 0.et-8-1-0.xr4.1d12.xs4all.net (194.109.5.4)
500113 224.80 ms 0.ae11.xrc2.3d12.xs4all.net (194.109.5.78)
500214 214.71 ms 82.94.228.252
5003#########################################################################################################################
5004Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-24 17:22 EDT
5005Nmap scan report for 82.94.228.252
5006Host is up (0.22s latency).
5007
5008PORT STATE SERVICE VERSION
500968/tcp filtered dhcpc
501068/udp open|filtered dhcpc
5011Too many fingerprints match this host to give specific OS details
5012Network Distance: 14 hops
5013
5014TRACEROUTE (using proto 1/icmp)
5015HOP RTT ADDRESS
50161 73.56 ms 10.203.3.1
50172 84.12 ms 161.129.68.81.static.quadranet.com (161.129.68.81)
50183 92.61 ms br1.dal.as8100.net (96.44.144.17)
50194 88.87 ms be5814.rcr21.b010621-0.dfw01.atlas.cogentco.com (38.122.58.57)
50205 89.28 ms be2560.ccr31.dfw01.atlas.cogentco.com (154.54.5.237)
50216 81.17 ms be2432.ccr21.mci01.atlas.cogentco.com (154.54.3.134)
50227 103.84 ms be2831.ccr41.ord01.atlas.cogentco.com (154.54.42.166)
50238 93.47 ms be2765.ccr41.ord03.atlas.cogentco.com (154.54.45.18)
50249 104.06 ms kpn.ord03.atlas.cogentco.com (154.54.11.22)
502510 216.32 ms asd-s8-rou-1041.NL.eurorings.net (134.222.48.91)
502611 ...
502712 184.40 ms 0.et-8-1-0.xr4.1d12.xs4all.net (194.109.5.4)
502813 185.41 ms 0.ae11.xrc2.3d12.xs4all.net (194.109.5.78)
502914 195.50 ms 82.94.228.252
5030#########################################################################################################################
5031Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-24 17:24 EDT
5032Nmap scan report for 82.94.228.252
5033Host is up (0.18s latency).
5034
5035PORT STATE SERVICE VERSION
503669/tcp filtered tftp
503769/udp open|filtered tftp
5038Too many fingerprints match this host to give specific OS details
5039Network Distance: 14 hops
5040
5041TRACEROUTE (using proto 1/icmp)
5042HOP RTT ADDRESS
50431 68.79 ms 10.203.3.1
50442 84.64 ms 161.129.68.81.static.quadranet.com (161.129.68.81)
50453 74.18 ms br1.dal.as8100.net (96.44.144.17)
50464 74.65 ms be5814.rcr21.b010621-0.dfw01.atlas.cogentco.com (38.122.58.57)
50475 74.83 ms be2560.ccr31.dfw01.atlas.cogentco.com (154.54.5.237)
50486 79.41 ms be2432.ccr21.mci01.atlas.cogentco.com (154.54.3.134)
50497 96.79 ms be2831.ccr41.ord01.atlas.cogentco.com (154.54.42.166)
50508 91.96 ms be2765.ccr41.ord03.atlas.cogentco.com (154.54.45.18)
50519 96.72 ms kpn.ord03.atlas.cogentco.com (154.54.11.22)
505210 197.09 ms asd-s8-rou-1041.NL.eurorings.net (134.222.48.91)
505311 ...
505412 180.63 ms 0.et-8-1-0.xr4.1d12.xs4all.net (194.109.5.4)
505513 182.24 ms 0.ae11.xrc2.3d12.xs4all.net (194.109.5.78)
505614 180.36 ms 82.94.228.252
5057#########################################################################################################################
5058HTTP/1.1 404 Not Found
5059Server: nginx
5060Date: Tue, 24 Mar 2020 21:27:09 GMT
5061Content-Type: text/html
5062Content-Length: 162
5063Connection: keep-alive
5064
5065HTTP/1.1 404 Not Found
5066Server: nginx
5067Date: Tue, 24 Mar 2020 21:27:09 GMT
5068Content-Type: text/html
5069Content-Length: 162
5070Connection: keep-alive
5071#########################################################################################################################
5072Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-24 17:27 EDT
5073NSE: [pop3-brute] usernames: Time limit 3m00s exceeded.
5074NSE: [pop3-brute] usernames: Time limit 3m00s exceeded.
5075NSE: [pop3-brute] passwords: Time limit 3m00s exceeded.
5076Nmap scan report for 82.94.228.252
5077Host is up (0.17s latency).
5078
5079PORT STATE SERVICE VERSION
5080110/tcp open pop3 Dovecot pop3d
5081| pop3-brute:
5082| Accounts: No valid accounts found
5083|_ Statistics: Performed 5417 guesses in 180 seconds, average tps: 29.7
5084|_pop3-capabilities: SASL(CRAM-MD5) UIDL STLS RESP-CODES TOP PIPELINING CAPA
5085Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
5086Aggressive OS guesses: Linux 2.6.32 - 3.1 (92%), OpenWrt 12.09-rc1 Attitude Adjustment (Linux 3.3 - 3.7) (92%), Linux 3.2 (92%), Linux 3.2 - 3.10 (92%), Linux 3.2 - 3.16 (92%), Linux 3.2 - 3.8 (92%), Linux 3.8 (92%), Olivetti 65C-9 printer (92%), Linux 2.6.32 - 3.10 (92%), Linux 2.6.32 - 3.13 (92%)
5087No exact OS matches for host (test conditions non-ideal).
5088Network Distance: 14 hops
5089
5090TRACEROUTE (using port 110/tcp)
5091HOP RTT ADDRESS
50921 99.61 ms 10.203.3.1
50932 106.44 ms 161.129.68.81.static.quadranet.com (161.129.68.81)
50943 109.43 ms br1.dal.as8100.net (96.44.144.17)
50954 109.86 ms be5814.rcr21.b010621-0.dfw01.atlas.cogentco.com (38.122.58.57)
50965 110.27 ms be2560.ccr31.dfw01.atlas.cogentco.com (154.54.5.237)
50976 110.51 ms be2432.ccr21.mci01.atlas.cogentco.com (154.54.3.134)
50987 132.13 ms be2832.ccr42.ord01.atlas.cogentco.com (154.54.44.170)
50998 132.27 ms be2766.ccr41.ord03.atlas.cogentco.com (154.54.46.178)
51009 166.53 ms kpn.ord03.atlas.cogentco.com (154.54.11.22)
510110 240.96 ms asd-s8-rou-1041.NL.eurorings.net (134.222.48.91)
510211 ...
510312 205.53 ms 0.et-8-1-0.xr4.1d12.xs4all.net (194.109.5.4)
510413 226.42 ms 0.ae10.xrc1.1d12.xs4all.net (194.109.5.58)
510514 193.87 ms 82.94.228.252
5106#########################################################################################################################
5107Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-24 17:30 EDT
5108Nmap scan report for 82.94.228.252
5109Host is up (0.18s latency).
5110
5111PORT STATE SERVICE VERSION
5112123/tcp filtered ntp
5113123/udp open|filtered ntp
5114Too many fingerprints match this host to give specific OS details
5115Network Distance: 14 hops
5116
5117TRACEROUTE (using proto 1/icmp)
5118HOP RTT ADDRESS
51191 66.42 ms 10.203.3.1
51202 81.40 ms 161.129.68.81.static.quadranet.com (161.129.68.81)
51213 71.82 ms br1.dal.as8100.net (96.44.144.17)
51224 71.85 ms be5814.rcr21.b010621-0.dfw01.atlas.cogentco.com (38.122.58.57)
51235 71.85 ms be2560.ccr31.dfw01.atlas.cogentco.com (154.54.5.237)
51246 78.16 ms be2432.ccr21.mci01.atlas.cogentco.com (154.54.3.134)
51257 92.29 ms be2831.ccr41.ord01.atlas.cogentco.com (154.54.42.166)
51268 89.47 ms be2765.ccr41.ord03.atlas.cogentco.com (154.54.45.18)
51279 92.09 ms kpn.ord03.atlas.cogentco.com (154.54.11.22)
512810 193.38 ms asd-s8-rou-1041.NL.eurorings.net (134.222.48.91)
512911 ...
513012 179.37 ms 0.et-8-1-0.xr4.1d12.xs4all.net (194.109.5.4)
513113 179.70 ms 0.ae11.xrc2.3d12.xs4all.net (194.109.5.78)
513214 185.34 ms 82.94.228.252
5133#########################################################################################################################
5134Version: 2.0.0-static
5135OpenSSL 1.1.1f-dev xx XXX xxxx
5136
5137Connected to 82.94.228.252
5138
5139Testing SSL server 82.94.228.252 on port 443 using SNI name 82.94.228.252
5140
5141 SSL/TLS Protocols:
5142SSLv2 disabled
5143SSLv3 disabled
5144TLSv1.0 enabled
5145TLSv1.1 enabled
5146TLSv1.2 enabled
5147TLSv1.3 disabled
5148
5149 TLS Fallback SCSV:
5150Server supports TLS Fallback SCSV
5151
5152 TLS renegotiation:
5153Secure session renegotiation supported
5154
5155 TLS Compression:
5156Compression disabled
5157
5158 Heartbleed:
5159TLSv1.2 not vulnerable to heartbleed
5160TLSv1.1 not vulnerable to heartbleed
5161TLSv1.0 not vulnerable to heartbleed
5162
5163 Supported Server Cipher(s):
5164Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
5165Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
5166Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
5167Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
5168Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
5169Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
5170Accepted TLSv1.2 256 bits DHE-RSA-AES256-GCM-SHA384 DHE 1024 bits
5171Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA256 DHE 1024 bits
5172Accepted TLSv1.2 256 bits DHE-RSA-AES256-SHA DHE 1024 bits
5173Accepted TLSv1.2 256 bits DHE-RSA-CAMELLIA256-SHA DHE 1024 bits
5174Accepted TLSv1.2 128 bits DHE-RSA-AES128-GCM-SHA256 DHE 1024 bits
5175Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA256 DHE 1024 bits
5176Accepted TLSv1.2 128 bits DHE-RSA-AES128-SHA DHE 1024 bits
5177Accepted TLSv1.2 128 bits DHE-RSA-SEED-SHA DHE 1024 bits
5178Accepted TLSv1.2 128 bits DHE-RSA-CAMELLIA128-SHA DHE 1024 bits
5179Accepted TLSv1.2 128 bits ECDHE-RSA-RC4-SHA Curve P-256 DHE 256
5180Accepted TLSv1.2 128 bits RC4-SHA
5181Preferred TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
5182Accepted TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
5183Accepted TLSv1.1 256 bits DHE-RSA-AES256-SHA DHE 1024 bits
5184Accepted TLSv1.1 256 bits DHE-RSA-CAMELLIA256-SHA DHE 1024 bits
5185Accepted TLSv1.1 128 bits DHE-RSA-AES128-SHA DHE 1024 bits
5186Accepted TLSv1.1 128 bits DHE-RSA-SEED-SHA DHE 1024 bits
5187Accepted TLSv1.1 128 bits DHE-RSA-CAMELLIA128-SHA DHE 1024 bits
5188Accepted TLSv1.1 128 bits ECDHE-RSA-RC4-SHA Curve P-256 DHE 256
5189Accepted TLSv1.1 128 bits RC4-SHA
5190Preferred TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
5191Accepted TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
5192Accepted TLSv1.0 256 bits DHE-RSA-AES256-SHA DHE 1024 bits
5193Accepted TLSv1.0 256 bits DHE-RSA-CAMELLIA256-SHA DHE 1024 bits
5194Accepted TLSv1.0 128 bits DHE-RSA-AES128-SHA DHE 1024 bits
5195Accepted TLSv1.0 128 bits DHE-RSA-SEED-SHA DHE 1024 bits
5196Accepted TLSv1.0 128 bits DHE-RSA-CAMELLIA128-SHA DHE 1024 bits
5197Accepted TLSv1.0 128 bits ECDHE-RSA-RC4-SHA Curve P-256 DHE 256
5198Accepted TLSv1.0 128 bits RC4-SHA
5199
5200 Server Key Exchange Group(s):
5201TLSv1.2 128 bits secp256r1 (NIST P-256)
5202
5203 Server Signature Algorithm(s):
5204TLSv1.2 Server accepts all signature algorithms.
5205
5206 SSL Certificate:
5207Signature Algorithm: sha256WithRSAEncryption
5208RSA Key Strength: 2048
5209
5210Subject: boywiki.org
5211Altnames: DNS:boywiki.org, DNS:de.boywiki.org, DNS:en.boywiki.org, DNS:fr.boywiki.org, DNS:www.boywiki.org
5212Issuer: Let's Encrypt Authority X3
5213
5214Not valid before: Jan 31 05:56:40 2019 GMT
5215Not valid after: May 1 05:56:40 2019 GMT
5216modes/normal.sh: ligne 675 : [: == : opérateur unaire attendu
5217#########################################################################################################################
5218--------------------------------------------------------
5219<<<Yasuo discovered following vulnerable applications>>>
5220--------------------------------------------------------
5221+------------+---------------------------------------+--------------------------------------------------+-----------+-----------+
5222| App Name | URL to Application | Potential Exploit | Username | Password |
5223+------------+---------------------------------------+--------------------------------------------------+-----------+-----------+
5224| phpMyAdmin | https://82.94.228.252:443/phpmyadmin/ | ./exploits/multi/http/phpmyadmin_preg_replace.rb | Not Found | Not Found |
5225+------------+---------------------------------------+--------------------------------------------------+-----------+--
5226#########################################################################################################################
5227Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-24 17:37 EDT
5228Nmap scan report for 82.94.228.252
5229Host is up (0.19s latency).
5230Not shown: 65524 filtered ports
5231PORT STATE SERVICE VERSION
523225/tcp open smtp Postfix smtpd
5233|_smtp-commands: mail.boywiki.org, PIPELINING, SIZE 30720000, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN,
5234|_ssl-date: TLS randomness does not represent time
523580/tcp open http nginx
5236|_http-title: 404 Not Found
5237110/tcp open pop3 Dovecot pop3d
5238|_pop3-capabilities: RESP-CODES SASL(CRAM-MD5) TOP UIDL PIPELINING CAPA STLS
5239|_ssl-date: TLS randomness does not represent time
5240122/tcp open ssh OpenSSH 6.0p1 Debian 4+deb7u6 (protocol 2.0)
5241| ssh-hostkey:
5242| 1024 30:f6:e9:f7:ae:fd:60:9c:55:39:0f:9c:2a:ff:40:06 (DSA)
5243| 2048 57:d2:07:23:2a:4e:a8:fd:cf:8c:f7:99:a3:7a:94:6e (RSA)
5244|_ 256 ec:f1:7a:d3:83:c2:5c:ef:77:07:30:bb:b2:d8:9c:dd (ECDSA)
5245143/tcp open imap Dovecot imapd
5246|_imap-capabilities: capabilities IDLE listed SASL-IR OK LITERAL+ IMAP4rev1 have AUTH=CRAM-MD5A0001 post-login STARTTLS more ENABLE LOGIN-REFERRALS ID LOGINDISABLED Pre-login
5247|_ssl-date: TLS randomness does not represent time
5248443/tcp open ssl/http nginx
5249|_http-title: 403 Forbidden
5250| ssl-cert: Subject: commonName=boywiki.org
5251| Subject Alternative Name: DNS:boywiki.org, DNS:de.boywiki.org, DNS:en.boywiki.org, DNS:fr.boywiki.org, DNS:www.boywiki.org
5252| Not valid before: 2019-01-31T05:56:40
5253|_Not valid after: 2019-05-01T05:56:40
5254|_ssl-date: TLS randomness does not represent time
5255587/tcp open smtp Postfix smtpd
5256|_smtp-commands: mail.boywiki.org, PIPELINING, SIZE 30720000, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN,
5257|_ssl-date: TLS randomness does not represent time
5258993/tcp open ssl/imaps?
5259|_ssl-date: TLS randomness does not represent time
5260995/tcp open ssl/pop3s?
5261|_ssl-date: TLS randomness does not represent time
526210000/tcp open http MiniServ 1.850 (Webmin httpd)
5263|_http-title: Site doesn't have a title (text/html; Charset=iso-8859-1).
526438754/tcp closed unknown
5265Aggressive OS guesses: Linux 3.2 - 3.8 (94%), Linux 2.6.32 - 3.1 (92%), Linux 3.2 (92%), Linux 2.6.32 - 3.13 (92%), OpenWrt 12.09-rc1 Attitude Adjustment (Linux 3.3 - 3.7) (91%), Linux 3.2 - 3.10 (91%), Linux 3.2 - 3.16 (91%), XBMCbuntu Frodo v12.2 (Linux 3.X) (91%), Olivetti 65C-9 printer (91%), Linux 2.6.32 - 2.6.39 (90%)
5266No exact OS matches for host (test conditions non-ideal).
5267Network Distance: 14 hops
5268Service Info: Host: mail.boywiki.org; OS: Linux; CPE: cpe:/o:linux:linux_kernel
5269
5270TRACEROUTE (using port 38754/tcp)
5271HOP RTT ADDRESS
52721 75.97 ms 10.203.3.1
52732 81.34 ms 161.129.68.81.static.quadranet.com (161.129.68.81)
52743 77.16 ms br1.dal.as8100.net (96.44.144.17)
52754 76.75 ms be5814.rcr21.b010621-0.dfw01.atlas.cogentco.com (38.122.58.57)
52765 77.14 ms be2561.ccr32.dfw01.atlas.cogentco.com (154.54.6.73)
52776 100.75 ms be2433.ccr22.mci01.atlas.cogentco.com (154.54.3.214)
52787 112.16 ms be2831.ccr41.ord01.atlas.cogentco.com (154.54.42.166)
52798 100.12 ms be2765.ccr41.ord03.atlas.cogentco.com (154.54.45.18)
52809 107.49 ms kpn.ord03.atlas.cogentco.com (154.54.11.22)
528110 204.04 ms asd-s8-rou-1041.NL.eurorings.net (134.222.48.91)
528211 ...
528312 184.21 ms 0.et-8-1-0.xr4.1d12.xs4all.net (194.109.5.4)
528413 298.83 ms 0.ae10.xrc2.3d12.xs4all.net (194.109.5.118)
528514 188.40 ms 82.94.228.252
5286#########################################################################################################################
5287Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-24 17:43 EDT
5288Nmap scan report for 82.94.228.252
5289Host is up (0.18s latency).
5290
5291PORT STATE SERVICE VERSION
529253/tcp filtered domain
529367/tcp filtered dhcps
529468/tcp filtered dhcpc
529569/tcp filtered tftp
529688/tcp filtered kerberos-sec
5297123/tcp filtered ntp
5298137/tcp filtered netbios-ns
5299138/tcp filtered netbios-dgm
5300139/tcp filtered netbios-ssn
5301161/tcp filtered snmp
5302162/tcp filtered snmptrap
5303389/tcp filtered ldap
5304520/tcp filtered efs
53052049/tcp filtered nfs
530653/udp open domain (generic dns response: NOTIMP)
5307| dns-nsid:
5308|_ bind.version:
5309| fingerprint-strings:
5310| DNSVersionBindReq:
5311| version
5312| bind
5313| NBTStat:
5314|_ CKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
531567/udp open|filtered dhcps
531668/udp open|filtered dhcpc
531769/udp open|filtered tftp
531888/udp open|filtered kerberos-sec
5319123/udp open|filtered ntp
5320137/udp open|filtered netbios-ns
5321138/udp open|filtered netbios-dgm
5322139/udp open|filtered netbios-ssn
5323161/udp open|filtered snmp
5324162/udp open|filtered snmptrap
5325389/udp open|filtered ldap
5326520/udp open|filtered route
53272049/udp open|filtered nfs
53281 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
5329SF-Port53-UDP:V=7.80%I=7%D=3/24%Time=5E7A7F29%P=x86_64-pc-linux-gnu%r(DNSV
5330SF:ersionBindReq,39,"\0\x06\x85\0\0\x01\0\x01\0\x01\0\0\x07version\x04bind
5331SF:\0\0\x10\0\x03\xc0\x0c\0\x10\0\x03\0\0\0\0\0\x01\0\xc0\x0c\0\x02\0\x03\
5332SF:0\0\0\0\0\x02\xc0\x0c")%r(DNSStatusRequest,C,"\0\0\x90\x04\0\0\0\0\0\0\
5333SF:0\0")%r(NBTStat,32,"\x80\xf0\x80\x15\0\x01\0\0\0\0\0\0\x20CKAAAAAAAAAAA
5334SF:AAAAAAAAAAAAAAAAAAA\0\0!\0\x01");
5335Too many fingerprints match this host to give specific OS details
5336Network Distance: 14 hops
5337
5338TRACEROUTE (using port 53/udp)
5339HOP RTT ADDRESS
53401 65.65 ms 10.203.3.1
53412 ...
53423 67.03 ms br1.dal.as8100.net (96.44.144.17)
53434 67.18 ms be5814.rcr21.b010621-0.dfw01.atlas.cogentco.com (38.122.58.57)
53445 67.68 ms be2560.ccr31.dfw01.atlas.cogentco.com (154.54.5.237)
53456 76.70 ms be2432.ccr21.mci01.atlas.cogentco.com (154.54.3.134)
53467 91.32 ms be2832.ccr42.ord01.atlas.cogentco.com (154.54.44.170)
53478 91.39 ms be2766.ccr41.ord03.atlas.cogentco.com (154.54.46.178)
53489 92.95 ms kpn.ord03.atlas.cogentco.com (154.54.11.22)
534910 190.44 ms asd-s8-rou-1041.NL.eurorings.net (134.222.48.91)
535011 ...
535112 177.15 ms 0.et-3-1-0.xr3.3d12.xs4all.net (194.109.5.6)
535213 176.86 ms 0.ae10.xrc1.1d12.xs4all.net (194.109.5.58)
535314 176.23 ms 82.94.228.252
5354#######################################################################################################################
5355address mac name os_name os_flavor os_sp purpose info comments
5356------- --- ---- ------- --------- ----- ------- ---- --------
535782.94.228.252 Linux 3.X server
5358
5359Services
5360========
5361
5362host port proto name state info
5363---- ---- ----- ---- ----- ----
536482.94.228.252 25 tcp smtp open Postfix smtpd
536582.94.228.252 53 tcp domain filtered
536682.94.228.252 53 udp domain open generic dns response: NOTIMP
536782.94.228.252 67 tcp dhcps filtered
536882.94.228.252 67 udp dhcps unknown
536982.94.228.252 68 tcp dhcpc filtered
537082.94.228.252 68 udp dhcpc unknown
537182.94.228.252 69 tcp tftp filtered
537282.94.228.252 69 udp tftp unknown
537382.94.228.252 80 tcp http open nginx
537482.94.228.252 88 tcp kerberos-sec filtered
537582.94.228.252 88 udp kerberos-sec unknown
537682.94.228.252 110 tcp pop3 open Dovecot pop3d
537782.94.228.252 122 tcp ssh open OpenSSH 6.0p1 Debian 4+deb7u6 protocol 2.0
537882.94.228.252 123 tcp ntp filtered
537982.94.228.252 123 udp ntp unknown
538082.94.228.252 137 tcp netbios-ns filtered
538182.94.228.252 137 udp netbios-ns unknown
538282.94.228.252 138 tcp netbios-dgm filtered
538382.94.228.252 138 udp netbios-dgm unknown
538482.94.228.252 139 tcp netbios-ssn filtered
538582.94.228.252 139 udp netbios-ssn unknown
538682.94.228.252 143 tcp imap open Dovecot imapd
538782.94.228.252 161 tcp snmp filtered
538882.94.228.252 161 udp snmp unknown
538982.94.228.252 162 tcp snmptrap filtered
539082.94.228.252 162 udp snmptrap unknown
539182.94.228.252 389 tcp ldap filtered
539282.94.228.252 389 udp ldap unknown
539382.94.228.252 443 tcp ssl/http open nginx
539482.94.228.252 520 tcp efs filtered
539582.94.228.252 520 udp route unknown
539682.94.228.252 587 tcp smtp open Postfix smtpd
539782.94.228.252 993 tcp ssl/imaps open
539882.94.228.252 995 tcp ssl/pop3s open
539982.94.228.252 2049 tcp nfs filtered
540082.94.228.252 2049 udp nfs unknown
540182.94.228.252 10000 tcp http open MiniServ 1.850 Webmin httpd
540282.94.228.252 38754 tcp closed
5403##########################################################################################################################
5404Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-24 17:05 EDT
5405Nmap scan report for 82.94.228.252
5406Host is up (0.18s latency).
5407Not shown: 991 filtered ports
5408PORT STATE SERVICE VERSION
540925/tcp open smtp Postfix smtpd
5410| vulscan: VulDB - https://vuldb.com:
5411| [108975] Apple macOS up to 10.13.1 Postfix unknown vulnerability
5412| [98314] PostfixAdmin up to 3.0.1 AliasHandler delete.php gen_show_status denial of service
5413| [71720] Postfix up to 2.3.0 backup.php pacrypt sql injection
5414| [12746] Postfix Admin 2.3.6 functions.inc.php sql injection
5415| [57422] Postfix memory corruption
5416| [56843] Postfix up to 2.7.2 Cleartext weak encryption
5417|
5418| MITRE CVE - https://cve.mitre.org:
5419| [CVE-2013-2852] Format string vulnerability in the b43_request_firmware function in drivers/net/wireless/b43/main.c in the Broadcom B43 wireless driver in the Linux kernel through 3.9.4 allows local users to gain privileges by leveraging root access and including format string specifiers in an fwpostfix modprobe parameter, leading to improper construction of an error message.
5420| [CVE-2011-1720] The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method.
5421| [CVE-2011-0411] The STARTTLS implementation in Postfix 2.4.x before 2.4.16, 2.5.x before 2.5.12, 2.6.x before 2.6.9, and 2.7.x before 2.7.3 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack.
5422| [CVE-2010-0230] SUSE Linux Enterprise 10 SP3 (SLE10-SP3) and openSUSE 11.2 configures postfix to listen on all network interfaces, which might allow remote attackers to bypass intended access restrictions.
5423| [CVE-2009-2939] The postfix.postinst script in the Debian GNU/Linux and Ubuntu postfix 2.5.5 package grants the postfix user write access to /var/spool/postfix/pid, which might allow local users to conduct symlink attacks that overwrite arbitrary files.
5424| [CVE-2008-4977] ** DISPUTED ** postfix_groups.pl in Postfix 2.5.2 allows local users to overwrite arbitrary files via a symlink attack on the (1) /tmp/postfix_groups.stdout, (2) /tmp/postfix_groups.stderr, and (3) /tmp/postfix_groups.message temporary files. NOTE: the vendor disputes this vulnerability, stating "This is not a real issue ... users would have to edit a script under /usr/lib to enable it."
5425| [CVE-2008-3889] Postfix 2.4 before 2.4.9, 2.5 before 2.5.5, and 2.6 before 2.6-20080902, when used with the Linux 2.6 kernel, leaks epoll file descriptors during execution of "non-Postfix" commands, which allows local users to cause a denial of service (application slowdown or exit) via a crafted command, as demonstrated by a command in a .forward file.
5426| [CVE-2008-3646] The Postfix configuration file in Mac OS X 10.5.5 causes Postfix to be network-accessible when mail is sent from a local command-line tool, which allows remote attackers to send mail to local Mac OS X users.
5427| [CVE-2008-2937] Postfix 2.5 before 2.5.4 and 2.6 before 2.6-20080814 delivers to a mailbox file even when this file is not owned by the recipient, which allows local users to read e-mail messages by creating a mailbox file corresponding to another user's account name.
5428| [CVE-2008-2936] Postfix before 2.3.15, 2.4 before 2.4.8, 2.5 before 2.5.4, and 2.6 before 2.6-20080814, when the operating system supports hard links to symlinks, allows local users to append e-mail messages to a file to which a root-owned symlink points, by creating a hard link to this symlink and then sending a message. NOTE: this can be leveraged to gain privileges if there is a symlink to an init script.
5429| [CVE-2007-3791] Buffer overflow in the w_read function in sockets.c in Cami Sardinha and Nigel Kukard policyd before 1.81 for Postfix allows remote attackers to cause a denial of service and possibly execute arbitrary code via long SMTP commands. NOTE: some of these details are obtained from third party information.
5430| [CVE-2006-0213] Kolab Server 2.0.1, 2.0.2 and development versions pre-2.1-20051215 and earlier, when authenticating users via secure SMTP, stores authentication credentials in plaintext in the postfix.log file, which allows local users to gain privileges.
5431| [CVE-2005-1127] Format string vulnerability in the log function in Net::Server 0.87 and earlier, as used in Postfix Greylisting Policy Server (Postgrey) 1.18 and earlier, and possibly other products, allows remote attackers to cause a denial of service (crash) via format string specifiers that are not properly handled before being sent to syslog, as demonstrated using sender addresses to Postgrey.
5432| [CVE-2005-0337] Postfix 2.1.3, when /proc/net/if_inet6 is not available and permit_mx_backup is enabled in smtpd_recipient_restrictions, allows remote attackers to bypass e-mail restrictions and perform mail relaying by sending mail to an IPv6 hostname.
5433| [CVE-2004-1113] SQL injection vulnerability in SQLgrey Postfix greylisting service before 1.2.0 allows remote attackers to execute arbitrary SQL commands via the (1) sender or (2) recipient e-mail addresses.
5434| [CVE-2004-1088] Postfix server for Apple Mac OS X 10.3.6, when using CRAM-MD5, allows remote attackers to send mail without authentication by replaying authentication information.
5435| [CVE-2004-0925] Postfix on Mac OS X 10.3.x through 10.3.5, with SMTPD AUTH enabled, does not properly clear the username between authentication attempts, which allows users with the longest username to prevent other valid users from being able to authenticate.
5436| [CVE-2003-0540] The address parser code in Postfix 1.1.12 and earlier allows remote attackers to cause a denial of service (lock) via (1) a malformed envelope address to a local host that would generate a bounce and contains the ".!" string in the MAIL FROM or Errors-To headers, which causes nqmgr to lock up, or (2) via a valid MAIL FROM with a RCPT TO containing a ".!" string, which causes an instance of the SMTP listener to lock up.
5437| [CVE-2003-0468] Postfix 1.1.11 and earlier allows remote attackers to use Postfix to conduct "bounce scans" or DDos attacks of other hosts via an email address to the local host containing the target IP address and service name followed by a "!" string, which causes Postfix to attempt to use SMTP to communicate with the target on the associated port.
5438| [CVE-2001-0894] Vulnerability in Postfix SMTP server before 20010228-pl07, when configured to email the postmaster when SMTP errors cause the session to terminate, allows remote attackers to cause a denial of service (memory exhaustion) by generating a large number of SMTP errors, which forces the SMTP session log to grow too large.
5439|
5440| SecurityFocus - https://www.securityfocus.com/bid/:
5441| [96142] PostfixAdmin CVE-2017-5930 Session Management Security Bypass Vulnerability
5442| [90814] Postfix Admin Multiple Cross Site Request Forgery Vulnerabilities
5443| [67250] Postfix Arbitrary Content Security Bypass Vulnerability
5444| [66455] Postfix Admin 'functions.inc.php' SQL Injection Vulnerability
5445| [65184] Fail2ban Postfix Filter Remote Denial of Service Vulnerability
5446| [51680] Postfix Admin Multiple SQL Injection and Cross Site Scripting Vulnerabilities
5447| [47778] Postfix SMTP Server Cyrus SASL Support Memory Corruption Vulnerability
5448| [36469] Debian and Ubuntu Postfix Insecure Temporary File Creation Vulnerability
5449| [31721] Apple Mac OS X 10.5 Postfix Security Bypass Vulnerability
5450| [30977] Postfix 'epoll' Linux Event Handler Local Denial of Service Vulnerability
5451| [30691] Postfix Local Information Disclosure and Local Privilege Escalation Vulnerabilities
5452| [13133] Salim Gasmi GLD Postfix Greylisting Daemon Format String Vulnerability
5453| [13129] Salim Gasmi GLD Postfix Greylisting Daemon Buffer Overflow Vulnerability
5454| [12445] Postfix IPv6 Unauthorized Mail Relay Vulnerability
5455| [11898] SQLgrey Postfix Greylisting Service Unspecified SQL Injection Vulnerability
5456| [11633] SQLgrey Postfix Greylisting Service SQL Injection Vulnerability
5457| [11323] Apple Mac OS X Postfix Release SMTPD AUTH Username Denial Of Service Vulnerability
5458| [8362] Postfix SMTP Malformed E-mail Envelope Address Denial of Service Vulnerability
5459| [8361] Postfix Connection Proxying Vulnerability
5460| [8333] Multiple Postfix Denial of Service Vulnerabilities
5461| [3638] SuSEConfig.postfix chroot Local DoS Attack Vulnerability
5462| [3637] SuSEConfig.postfix chroot File Ownership Vulnerability
5463| [3544] Postfix SMTP Log Denial Of Service Vulnerability
5464| [1428] cyrus With postfix and Procmail Remote Shell Expansion Vulnerabilities
5465|
5466| IBM X-Force - https://exchange.xforce.ibmcloud.com:
5467| [72752] Postfix Admin multiple parameters SQL injection
5468| [72751] PostfixAdmin multiple parameters cross-site scripting
5469| [67359] Postfix Cyrus SASL library in the SMTP server code execution
5470| [55970] SUSE Linux Enterprise postfix security bypass
5471| [53425] Postfix in Debian and Ubuntu pid symlink
5472| [45876] Apple Mac OS X Postfix configuration file weak security
5473| [44865] Postfix file descriptor denial of service
5474| [44461] Postfix email information disclosure
5475| [44460] Postfix symlink code execution
5476| [22655] RHSA-2005:152 updates for postfix not installed
5477| [19218] Postfix IPv6 mail relay
5478| [18435] SQLgrey Postfix greylisting service SQL injection
5479| [18353] Postfix CRAM-MD5 authentication replay attack
5480| [17998] SQLgrey Postfix greylisting service SQL injection
5481| [17595] Apple Mac OS postfix SMTPD AUTH denial of service
5482| [12816] Postfix MAIL FROM or RCPT TO denial of service
5483| [12815] Postfix could be used as a distributed denial of service tool
5484| [7568] Postfix SMTP log denial of service
5485| [4905] Cyrus with postfix and procmail integration could allow remote command execution
5486|
5487| Exploit-DB - https://www.exploit-db.com:
5488| [25392] Salim Gasmi GLD 1.x Postfix Greylisting Daemon Buffer Overflow Vulnerability
5489| [22982] Postfix 1.1.x Denial of Service Vulnerabilities (2)
5490| [22981] Postfix 1.1.x Denial of Service Vulnerabilities (1)
5491| [16841] GLD (Greylisting Daemon) Postfix Buffer Overflow
5492| [10023] Salim Gasmi GLD 1.0 - 1.4 Postfix Greylisting Buffer Overflow
5493| [6472] Postfix < 2.4.9, 2.5.5, 2.6-20080902 - (.forward) Local DoS Exploit
5494| [6337] Postfix <= 2.6-20080814 - (symlink) Local Privilege Escalation Exploit
5495| [934] gld 1.4 (Postfix Greylisting Daemon) Remote Format String Exploit
5496|
5497| OpenVAS (Nessus) - http://www.openvas.org:
5498| [902517] Postfix SMTP Server Cyrus SASL Support Memory Corruption Vulnerability
5499| [881389] CentOS Update for postfix CESA-2011:0422 centos5 x86_64
5500| [881293] CentOS Update for postfix CESA-2011:0843 centos4 x86_64
5501| [881278] CentOS Update for postfix CESA-2011:0422 centos4 x86_64
5502| [881267] CentOS Update for postfix CESA-2011:0843 centos5 x86_64
5503| [880520] CentOS Update for postfix CESA-2011:0422 centos5 i386
5504| [880509] CentOS Update for postfix CESA-2011:0843 centos5 i386
5505| [880488] CentOS Update for postfix CESA-2011:0843 centos4 i386
5506| [880485] CentOS Update for postfix CESA-2011:0422 centos4 i386
5507| [880268] CentOS Update for postfix CESA-2008:0839 centos3 i386
5508| [880023] CentOS Update for postfix CESA-2008:0839 centos3 x86_64
5509| [870658] RedHat Update for postfix RHSA-2011:0423-01
5510| [870440] RedHat Update for postfix RHSA-2011:0843-01
5511| [870418] RedHat Update for postfix RHSA-2011:0422-01
5512| [870021] RedHat Update for postfix RHSA-2008:0839-01
5513| [863100] Fedora Update for postfix FEDORA-2011-6777
5514| [863097] Fedora Update for postfix FEDORA-2011-6771
5515| [862950] Fedora Update for postfix FEDORA-2011-3394
5516| [862938] Fedora Update for postfix FEDORA-2011-3355
5517| [860510] Fedora Update for postfix FEDORA-2008-8593
5518| [860419] Fedora Update for postfix FEDORA-2008-8595
5519| [850126] SuSE Update for postfix SUSE-SA:2010:011
5520| [850031] SuSE Update for postfix SUSE-SA:2008:040
5521| [840658] Ubuntu Update for postfix USN-1131-1
5522| [840648] Ubuntu Update for postfix USN-1113-1
5523| [840227] Ubuntu Update for postfix vulnerabilities USN-642-1
5524| [840190] Ubuntu Update for postfix vulnerability USN-636-1
5525| [831400] Mandriva Update for postfix MDVSA-2011:090 (postfix)
5526| [830713] Mandriva Update for postfix MDVSA-2008:171 (postfix)
5527| [830635] Mandriva Update for postfix MDVSA-2008:190 (postfix)
5528| [830075] Mandriva Update for postfix MDKA-2007:079 (postfix)
5529| [72452] Gentoo Security Advisory GLSA 201209-18 (postfixadmin)
5530| [71559] Gentoo Security Advisory GLSA 201206-33 (Postfix)
5531| [70744] FreeBSD Ports: postfixadmin
5532| [69770] FreeBSD Ports: postfix, postfix-base
5533| [69733] Debian Security Advisory DSA 2233-1 (postfix)
5534| [69363] FreeBSD Ports: postfix, postfix-base
5535| [66394] Mandriva Security Advisory MDVSA-2009:224-1 (postfix)
5536| [65957] SLES10: Security update for Postfix
5537| [65911] SLES10: Security update for Postfix
5538| [65353] SLES9: Security update for Postfix
5539| [65350] SLES9: Security update for postfix
5540| [64696] Mandrake Security Advisory MDVSA-2009:224 (postfix)
5541| [61646] Gentoo Security Advisory GLSA 200809-09 (postfix)
5542| [61445] Gentoo Security Advisory GLSA 200808-12 (postfix)
5543| [61435] Debian Security Advisory DSA 1629-2 (postfix)
5544| [61434] Debian Security Advisory DSA 1629-1 (postfix)
5545| [60836] FreeBSD Ports: postfix-policyd-weight
5546| [58580] Debian Security Advisory DSA 1361-1 (postfix-policyd)
5547| [53833] Debian Security Advisory DSA 093-1 (postfix)
5548| [53652] Debian Security Advisory DSA 363-1 (postfix)
5549|
5550| SecurityTracker - https://www.securitytracker.com:
5551| [1025521] Postfix SASL Authentication Heap Overflow Lets Remote Users Deny Service
5552| [1025179] Postfix Plaintext to TLS Switching Error Lets Remote Users Inject Plaintext Commands
5553| [1020800] Postfix Linux epoll File Descriptor Leak Lets Local Users Deny Service
5554| [1020700] Postfix Symlink Dereference Bug Lets Local Users Gain Elevated Privileges
5555| [1012395] Postfix CRAM-MD5 Replay Attack May Let Remote Users Send Mail
5556| [1011532] Postfix Buffer Error May Prevent Remote Users from Being Able to Authenticate Using SMTPD AUTH
5557| [1007382] Postfix Bounce Messages Let Remote Users Scan for Open Ports on Other Hosts
5558| [1007381] Postfix Address Resolver Parsing Bug Lets Remote Users Hang the System
5559| [1002756] Postfix Mail Server Can Be Crashed By Remote Users Initiating Unsuccessful Sessions
5560|
5561| OSVDB - http://www.osvdb.org:
5562| [94034] Linux Kernel Broadcom B43 Wireless Driver b43_request_firmware Function fwpostfix modprobe Parameter Format String Local Privilege Escalation
5563| [78567] Postfix Admin backup.php Unspecified SQL Injection
5564| [78566] Postfix Admin functions.inc.php pacrypt() Function Unspecified SQL Injection
5565| [78565] Postfix Admin create-domain.php Unspecified SQL Injection
5566| [78564] Postfix Admin Unspecified XSS
5567| [78563] Postfix Admin edit-alias.php Unspecified XSS
5568| [78562] Postfix Admin create-alias.php Unspecified XSS
5569| [78561] Postfix Admin create-domain.php Unspecified XSS
5570| [78560] Postfix Admin templates/edit-vacation.php domain Parameter XSS
5571| [78559] Postfix Admin templates/menu.php domain Parameter XSS
5572| [72259] Postfix SMTP Cyrus SASL Authentication Context Data Reuse Memory Corruption
5573| [71021] Postfix STARTTLS Arbitrary Plaintext Command Injection
5574| [68340] Artica postfix.events.php Unrestricted Access Information Disclosure
5575| [61983] SUSE Linux postfix Network Interface Remote Access Restriction Bypass
5576| [58325] Debian GNU/Linux postfix postfix.postinst Symlink Arbitrary File Overwrite
5577| [49634] Postfix postfix_groups.pl Multiple Temporary File Symlink Arbitrary File Overwrite
5578| [48973] Apple Mac OS X Postfix Network Access Configuration Weakness
5579| [48108] Postfix epoll File Descriptor Leak Local DoS
5580| [47659] Postfix Cross-user Filename Local Mail Interception
5581| [47658] Postfix Hardlink to Symlink Mailspool Arbitrary Content Append
5582| [43888] policyd-weight for Postfix Socket Handling Unspecified Arbitrary File Manipulation
5583| [38091] policyd for Postfix sockets.c read_w() Function SMTP Command Remote Overflow
5584| [22381] Kolab Server Secure SMTP postfix.log Authentication Credential Disclosure
5585| [13470] Postfix IPv6 Patch if_inet6 Failure Arbitrary Mail Relay
5586| [12339] SQLgrey Postfix greylisting service Unspecified SQL Injection
5587| [12200] Apple Mac OS X Postfix CRAM-MD5 Replay Credentials
5588| [11571] SQLgrey Postfix greylisting Email Address SQL Injection
5589| [10545] Postfix Multiple Mail Header SMTP listener DoS
5590| [10544] Postfix Malformed Envelope Address nqmgr DoS
5591| [10500] Apple Mac OS X Postfix SMTPD AUTH Username Overflow DoS
5592| [6551] Postfix Bounce Scan / Packet Amplification DDoS
5593| [1991] Postfix SMTP Log DoS
5594|_
559580/tcp open http nginx
5596| vulscan: VulDB - https://vuldb.com:
5597| [133852] Sangfor Sundray WLAN Controller up to 3.7.4.2 Cookie Header nginx_webconsole.php Code Execution
5598| [132132] SoftNAS Cloud 4.2.0/4.2.1 Nginx privilege escalation
5599| [131858] Puppet Discovery up to 1.3.x Nginx Container weak authentication
5600| [130644] Nginx Unit up to 1.7.0 Router Process Request Heap-based memory corruption
5601| [127759] VeryNginx 0.3.3 Web Application Firewall privilege escalation
5602| [126525] nginx up to 1.14.0/1.15.5 ngx_http_mp4_module Loop denial of service
5603| [126524] nginx up to 1.14.0/1.15.5 HTTP2 CPU Exhaustion denial of service
5604| [126523] nginx up to 1.14.0/1.15.5 HTTP2 Memory Consumption denial of service
5605| [119845] Pivotal Operations Manager up to 2.0.13/2.1.5 Nginx privilege escalation
5606| [114368] SuSE Portus 2.3 Nginx Certificate weak authentication
5607| [103517] nginx up to 1.13.2 Range Filter Request Integer Overflow memory corruption
5608| [89849] nginx RFC 3875 Namespace Conflict Environment Variable Open Redirect
5609| [87719] nginx up to 1.11.0 ngx_files.c ngx_chain_to_iovec denial of service
5610| [80760] nginx 0.6.18/1.9.9 DNS CNAME Record Crash denial of service
5611| [80759] nginx 0.6.18/1.9.9 DNS CNAME Record Use-After-Free denial of service
5612| [80758] nginx 0.6.18/1.9.9 DNS UDP Packet Crash denial of service
5613| [67677] nginx up to 1.7.3 SSL weak authentication
5614| [67296] nginx up to 1.7.3 SMTP Proxy ngx_mail_smtp_starttls privilege escalation
5615| [12822] nginx up to 1.5.11 SPDY SPDY Request Heap-based memory corruption
5616| [12824] nginx 1.5.10 on 32-bit SPDY memory corruption
5617| [11237] nginx up to 1.5.6 URI String Bypass privilege escalation
5618| [65364] nginx up to 1.1.13 Default Configuration information disclosure
5619| [8671] nginx up to 1.4 proxy_pass denial of service
5620| [8618] nginx 1.3.9/1.4.0 http/ngx_http_parse.c ngx_http_parse_chunked() memory corruption
5621| [7247] nginx 1.2.6 Proxy Function spoofing
5622| [61434] nginx 1.2.0/1.3.0 on Windows Access Restriction privilege escalation
5623| [5293] nginx up to 1.1.18 ngx_http_mp4_module MP4 File memory corruption
5624| [4843] nginx up to 1.0.13/1.1.16 HTTP Header Response Parser ngx_http_parse.c information disclosure
5625| [59645] nginx up to 0.8.9 Heap-based memory corruption
5626| [53592] nginx 0.8.36 memory corruption
5627| [53590] nginx up to 0.8.9 unknown vulnerability
5628| [51533] nginx 0.7.64 Terminal privilege escalation
5629| [50905] nginx up to 0.8.9 directory traversal
5630| [50903] nginx up to 0.8.10 NULL Pointer Dereference denial of service
5631| [50043] nginx up to 0.8.10 memory corruption
5632|
5633| MITRE CVE - https://cve.mitre.org:
5634| [CVE-2013-2070] http/modules/ngx_http_proxy_module.c in nginx 1.1.4 through 1.2.8 and 1.3.0 through 1.4.0, when proxy_pass is used with untrusted HTTP servers, allows remote attackers to cause a denial of service (crash) and obtain sensitive information from worker process memory via a crafted proxy response, a similar vulnerability to CVE-2013-2028.
5635| [CVE-2013-2028] The ngx_http_parse_chunked function in http/ngx_http_parse.c in nginx 1.3.9 through 1.4.0 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a chunked Transfer-Encoding request with a large chunk size, which triggers an integer signedness error and a stack-based buffer overflow.
5636| [CVE-2012-3380] Directory traversal vulnerability in naxsi-ui/nx_extract.py in the Naxsi module before 0.46-1 for Nginx allows local users to read arbitrary files via unspecified vectors.
5637| [CVE-2012-2089] Buffer overflow in ngx_http_mp4_module.c in the ngx_http_mp4_module module in nginx 1.0.7 through 1.0.14 and 1.1.3 through 1.1.18, when the mp4 directive is used, allows remote attackers to cause a denial of service (memory overwrite) or possibly execute arbitrary code via a crafted MP4 file.
5638| [CVE-2012-1180] Use-after-free vulnerability in nginx before 1.0.14 and 1.1.x before 1.1.17 allows remote HTTP servers to obtain sensitive information from process memory via a crafted backend response, in conjunction with a client request.
5639| [CVE-2011-4963] nginx/Windows 1.3.x before 1.3.1 and 1.2.x before 1.2.1 allows remote attackers to bypass intended access restrictions and access restricted files via (1) a trailing . (dot) or (2) certain "$index_allocation" sequences in a request.
5640| [CVE-2011-4315] Heap-based buffer overflow in compression-pointer processing in core/ngx_resolver.c in nginx before 1.0.10 allows remote resolvers to cause a denial of service (daemon crash) or possibly have unspecified other impact via a long response.
5641| [CVE-2010-2266] nginx 0.8.36 allows remote attackers to cause a denial of service (crash) via certain encoded directory traversal sequences that trigger memory corruption, as demonstrated using the "%c0.%c0." sequence.
5642| [CVE-2010-2263] nginx 0.8 before 0.8.40 and 0.7 before 0.7.66, when running on Windows, allows remote attackers to obtain source code or unparsed content of arbitrary files under the web document root by appending ::$DATA to the URI.
5643| [CVE-2009-4487] nginx 0.7.64 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.
5644| [CVE-2009-3898] Directory traversal vulnerability in src/http/modules/ngx_http_dav_module.c in nginx (aka Engine X) before 0.7.63, and 0.8.x before 0.8.17, allows remote authenticated users to create or overwrite arbitrary files via a .. (dot dot) in the Destination HTTP header for the WebDAV (1) COPY or (2) MOVE method.
5645| [CVE-2009-3896] src/http/ngx_http_parse.c in nginx (aka Engine X) 0.1.0 through 0.4.14, 0.5.x before 0.5.38, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.14 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a long URI.
5646| [CVE-2009-2629] Buffer underflow in src/http/ngx_http_parse.c in nginx 0.1.0 through 0.5.37, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.15 allows remote attackers to execute arbitrary code via crafted HTTP requests.
5647|
5648| SecurityFocus - https://www.securityfocus.com/bid/:
5649| [99534] Nginx CVE-2017-7529 Remote Integer Overflow Vulnerability
5650| [93903] Nginx CVE-2016-1247 Remote Privilege Escalation Vulnerability
5651| [91819] Nginx CVE-2016-1000105 Security Bypass Vulnerability
5652| [90967] nginx CVE-2016-4450 Denial of Service Vulnerability
5653| [82230] nginx Multiple Denial of Service Vulnerabilities
5654| [78928] Nginx CVE-2010-2266 Denial-Of-Service Vulnerability
5655| [70025] nginx CVE-2014-3616 SSL Session Fixation Vulnerability
5656| [69111] nginx SMTP Proxy Remote Command Injection Vulnerability
5657| [67507] nginx SPDY Implementation CVE-2014-0088 Arbitrary Code Execution Vulnerability
5658| [66537] nginx SPDY Implementation Heap Based Buffer Overflow Vulnerability
5659| [63814] nginx CVE-2013-4547 URI Processing Security Bypass Vulnerability
5660| [59824] Nginx CVE-2013-2070 Remote Security Vulnerability
5661| [59699] nginx 'ngx_http_parse.c' Stack Buffer Overflow Vulnerability
5662| [59496] nginx 'ngx_http_close_connection()' Remote Integer Overflow Vulnerability
5663| [59323] nginx NULL-Byte Arbitrary Code Execution Vulnerability
5664| [58105] Nginx 'access.log' Insecure File Permissions Vulnerability
5665| [57139] nginx CVE-2011-4968 Man in The Middle Vulnerability
5666| [55920] nginx CVE-2011-4963 Security Bypass Vulnerability
5667| [54331] Nginx Naxsi Module 'nx_extract.py' Script Remote File Disclosure Vulnerability
5668| [52999] nginx 'ngx_http_mp4_module.c' Buffer Overflow Vulnerability
5669| [52578] nginx 'ngx_cpystrn()' Information Disclosure Vulnerability
5670| [50710] nginx DNS Resolver Remote Heap Buffer Overflow Vulnerability
5671| [40760] nginx Remote Source Code Disclosure and Denial of Service Vulnerabilities
5672| [40434] nginx Space String Remote Source Code Disclosure Vulnerability
5673| [40420] nginx Directory Traversal Vulnerability
5674| [37711] nginx Terminal Escape Sequence in Logs Command Injection Vulnerability
5675| [36839] nginx 'ngx_http_process_request_headers()' Remote Buffer Overflow Vulnerability
5676| [36490] nginx WebDAV Multiple Directory Traversal Vulnerabilities
5677| [36438] nginx Proxy DNS Cache Domain Spoofing Vulnerability
5678| [36384] nginx HTTP Request Remote Buffer Overflow Vulnerability
5679|
5680| IBM X-Force - https://exchange.xforce.ibmcloud.com:
5681| [84623] Phusion Passenger gem for Ruby with nginx configuration insecure permissions
5682| [84172] nginx denial of service
5683| [84048] nginx buffer overflow
5684| [83923] nginx ngx_http_close_connection() integer overflow
5685| [83688] nginx null byte code execution
5686| [83103] Naxsi module for Nginx naxsi_unescape_uri() function security bypass
5687| [82319] nginx access.log information disclosure
5688| [80952] nginx SSL spoofing
5689| [77244] nginx and Microsoft Windows request security bypass
5690| [76778] Naxsi module for Nginx nx_extract.py directory traversal
5691| [74831] nginx ngx_http_mp4_module.c buffer overflow
5692| [74191] nginx ngx_cpystrn() information disclosure
5693| [74045] nginx header response information disclosure
5694| [71355] nginx ngx_resolver_copy() buffer overflow
5695| [59370] nginx characters denial of service
5696| [59369] nginx DATA source code disclosure
5697| [59047] nginx space source code disclosure
5698| [58966] nginx unspecified directory traversal
5699| [54025] nginx ngx_http_parse.c denial of service
5700| [53431] nginx WebDAV component directory traversal
5701| [53328] Nginx CRC-32 cached domain name spoofing
5702| [53250] Nginx ngx_http_parse_complex_uri() function code execution
5703|
5704| Exploit-DB - https://www.exploit-db.com:
5705| [26737] nginx 1.3.9/1.4.0 x86 Brute Force Remote Exploit
5706| [25775] Nginx HTTP Server 1.3.9-1.4.0 Chuncked Encoding Stack Buffer Overflow
5707| [25499] nginx 1.3.9-1.4.0 DoS PoC
5708| [24967] nginx 0.6.x Arbitrary Code Execution NullByte Injection
5709| [14830] nginx 0.6.38 - Heap Corruption Exploit
5710| [13822] Nginx <= 0.7.65 / 0.8.39 (dev) Source Disclosure / Download Vulnerability
5711| [13818] Nginx 0.8.36 Source Disclosure and DoS Vulnerabilities
5712| [12804] nginx [engine x] http server <= 0.6.36 Path Draversal
5713| [9901] nginx 0.7.0-0.7.61, 0.6.0-0.6.38, 0.5.0-0.5.37, 0.4.0-0.4.14 PoC
5714| [9829] nginx 0.7.61 WebDAV directory traversal
5715|
5716| OpenVAS (Nessus) - http://www.openvas.org:
5717| [864418] Fedora Update for nginx FEDORA-2012-3846
5718| [864310] Fedora Update for nginx FEDORA-2012-6238
5719| [864209] Fedora Update for nginx FEDORA-2012-6411
5720| [864204] Fedora Update for nginx FEDORA-2012-6371
5721| [864121] Fedora Update for nginx FEDORA-2012-4006
5722| [864115] Fedora Update for nginx FEDORA-2012-3991
5723| [864065] Fedora Update for nginx FEDORA-2011-16075
5724| [863654] Fedora Update for nginx FEDORA-2011-16110
5725| [861232] Fedora Update for nginx FEDORA-2007-1158
5726| [850180] SuSE Update for nginx openSUSE-SU-2012:0237-1 (nginx)
5727| [831680] Mandriva Update for nginx MDVSA-2012:043 (nginx)
5728| [802045] 64-bit Debian Linux Rootkit with nginx Doing iFrame Injection
5729| [801636] nginx HTTP Request Remote Buffer Overflow Vulnerability
5730| [103470] nginx 'ngx_http_mp4_module.c' Buffer Overflow Vulnerability
5731| [103469] nginx 'ngx_cpystrn()' Information Disclosure Vulnerability
5732| [103344] nginx DNS Resolver Remote Heap Buffer Overflow Vulnerability
5733| [100676] nginx Remote Source Code Disclosure and Denial of Service Vulnerabilities
5734| [100659] nginx Directory Traversal Vulnerability
5735| [100658] nginx Space String Remote Source Code Disclosure Vulnerability
5736| [100441] nginx Terminal Escape Sequence in Logs Command Injection Vulnerability
5737| [100321] nginx 'ngx_http_process_request_headers()' Remote Buffer Overflow Vulnerability
5738| [100277] nginx Proxy DNS Cache Domain Spoofing Vulnerability
5739| [100276] nginx HTTP Request Remote Buffer Overflow Vulnerability
5740| [100275] nginx WebDAV Multiple Directory Traversal Vulnerabilities
5741| [71574] Gentoo Security Advisory GLSA 201206-07 (nginx)
5742| [71308] Gentoo Security Advisory GLSA 201203-22 (nginx)
5743| [71297] FreeBSD Ports: nginx
5744| [71276] FreeBSD Ports: nginx
5745| [71239] Debian Security Advisory DSA 2434-1 (nginx)
5746| [66451] Fedora Core 11 FEDORA-2009-12782 (nginx)
5747| [66450] Fedora Core 10 FEDORA-2009-12775 (nginx)
5748| [66449] Fedora Core 12 FEDORA-2009-12750 (nginx)
5749| [64924] Gentoo Security Advisory GLSA 200909-18 (nginx)
5750| [64912] Fedora Core 10 FEDORA-2009-9652 (nginx)
5751| [64911] Fedora Core 11 FEDORA-2009-9630 (nginx)
5752| [64894] FreeBSD Ports: nginx
5753| [64869] Debian Security Advisory DSA 1884-1 (nginx)
5754|
5755| SecurityTracker - https://www.securitytracker.com:
5756| [1028544] nginx Bug Lets Remote Users Deny Service or Obtain Potentially Sensitive Information
5757| [1028519] nginx Stack Overflow Lets Remote Users Execute Arbitrary Code
5758| [1026924] nginx Buffer Overflow in ngx_http_mp4_module Lets Remote Users Execute Arbitrary Code
5759| [1026827] nginx HTTP Response Processing Lets Remote Users Obtain Portions of Memory Contents
5760|
5761| OSVDB - http://www.osvdb.org:
5762| [94864] cPnginx Plugin for cPanel nginx Configuration Manipulation Arbitrary File Access
5763| [93282] nginx proxy_pass Crafted Upstream Proxied Server Response Handling Worker Process Memory Disclosure
5764| [93037] nginx /http/ngx_http_parse.c Worker Process Crafted Request Handling Remote Overflow
5765| [92796] nginx ngx_http_close_connection Function Crafted r->
5766| [92634] nginx ngx_http_request.h zero_in_uri URL Null Byte Handling Remote Code Execution
5767| [90518] nginx Log Directory Permission Weakness Local Information Disclosure
5768| [88910] nginx Proxy Functionality SSL Certificate Validation MitM Spoofing Weakness
5769| [84339] nginx/Windows Multiple Request Sequence Parsing Arbitrary File Access
5770| [83617] Naxsi Module for Nginx naxsi-ui/ nx_extract.py Traversal Arbitrary File Access
5771| [81339] nginx ngx_http_mp4_module Module Atom MP4 File Handling Remote Overflow
5772| [80124] nginx HTTP Header Response Parsing Freed Memory Information Disclosure
5773| [77184] nginx ngx_resolver.c ngx_resolver_copy() Function DNS Response Parsing Remote Overflow
5774| [65531] nginx on Windows URI ::$DATA Append Arbitrary File Access
5775| [65530] nginx Encoded Traversal Sequence Memory Corruption Remote DoS
5776| [65294] nginx on Windows Encoded Space Request Remote Source Disclosure
5777| [63136] nginx on Windows 8.3 Filename Alias Request Access Rules / Authentication Bypass
5778| [62617] nginx Internal DNS Cache Poisoning Weakness
5779| [61779] nginx HTTP Request Escape Sequence Terminal Command Injection
5780| [59278] nginx src/http/ngx_http_parse.c ngx_http_process_request_headers() Function URL Handling NULL Dereference DoS
5781| [58328] nginx WebDAV Multiple Method Traversal Arbitrary File Write
5782| [58128] nginx ngx_http_parse_complex_uri() Function Underflow
5783| [44447] nginx (engine x) msie_refresh Directive Unspecified XSS
5784| [44446] nginx (engine x) ssl_verify_client Directive HTTP/0.9 Protocol Bypass
5785| [44445] nginx (engine x) ngx_http_realip_module satisfy_any Directive Unspecified Access Bypass
5786| [44444] nginx (engine x) X-Accel-Redirect Header Unspecified Traversal
5787| [44443] nginx (engine x) rtsig Method Signal Queue Overflow
5788| [44442] nginx (engine x) Worker Process Millisecond Timers Unspecified Overflow
5789|_
5790110/tcp open pop3 Dovecot pop3d
5791| vulscan: VulDB - https://vuldb.com:
5792| [139289] cPanel up to 68.0.14 dovecot-xaps-plugin Format privilege escalation
5793| [134480] Dovecot up to 2.3.5.2 Submission-Login Crash denial of service
5794| [134479] Dovecot up to 2.3.5.2 IMAP Server Crash denial of service
5795| [134024] Dovecot up to 2.3.5.1 JSON Encoder Username Crash denial of service
5796| [132543] Dovecot up to 2.2.36.0/2.3.4.0 Certificate Impersonation weak authentication
5797| [119762] Dovecot up to 2.2.28 dict Authentication var_expand() denial of service
5798| [114012] Dovecot up to 2.2.33 TLS SNI Restart denial of service
5799| [114009] Dovecot SMTP Delivery Email Message Out-of-Bounds memory corruption
5800| [112447] Dovecot up to 2.2.33/2.3.0 SASL Auth Memory Leak denial of service
5801| [106837] Dovecot up to 2.2.16 ssl-proxy-openssl.c ssl-proxy-opensslc denial of service
5802| [97052] Dovecot up to 2.2.26 auth-policy Unset Crash denial of service
5803| [69835] Dovecot 2.2.0/2.2.1 denial of service
5804| [13348] Dovecot up to 1.2.15/2.1.15 IMAP4/POP3 SSL/TLS Handshake denial of service
5805| [65684] Dovecot up to 2.2.6 unknown vulnerability
5806| [9807] Dovecot up to 1.2.7 on Exim Input Sanitizer privilege escalation
5807| [63692] Dovecot up to 2.0.15 spoofing
5808| [7062] Dovecot 2.1.10 mail-search.c denial of service
5809| [57517] Dovecot up to 2.0.12 Login directory traversal
5810| [57516] Dovecot up to 2.0.12 Access Restriction directory traversal
5811| [57515] Dovecot up to 2.0.12 Crash denial of service
5812| [54944] Dovecot up to 1.2.14 denial of service
5813| [54943] Dovecot up to 1.2.14 Access Restriction Symlink privilege escalation
5814| [54942] Dovecot up to 2.0.4 Access Restriction denial of service
5815| [54941] Dovecot up to 2.0.4 Access Restriction unknown vulnerability
5816| [54840] Dovecot up to 1.2.12 AGate unknown vulnerability
5817| [53277] Dovecot up to 1.2.10 denial of service
5818| [50082] Dovecot up to 1.1.6 Stack-based memory corruption
5819| [45256] Dovecot up to 1.1.5 directory traversal
5820| [44846] Dovecot 1.1.4/1.1.5 IMAP Client Crash denial of service
5821| [44546] Dovecot up to 1.0.x Access Restriction unknown vulnerability
5822| [44545] Dovecot up to 1.0.x Access Restriction unknown vulnerability
5823| [41430] Dovecot 1.0.12/1.1 Locking unknown vulnerability
5824| [40356] Dovecot 1.0.9 Cache unknown vulnerability
5825| [38222] Dovecot 1.0.2 directory traversal
5826| [36376] Dovecot up to 1.0.x directory traversal
5827| [33332] Timo Sirainen Dovecot up to 1.0test53 Off-By-One memory corruption
5828|
5829| MITRE CVE - https://cve.mitre.org:
5830| [CVE-2011-4318] Dovecot 2.0.x before 2.0.16, when ssl or starttls is enabled and hostname is used to define the proxy destination, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a valid certificate for a different hostname.
5831| [CVE-2011-2167] script-login in Dovecot 2.0.x before 2.0.13 does not follow the chroot configuration setting, which might allow remote authenticated users to conduct directory traversal attacks by leveraging a script.
5832| [CVE-2011-2166] script-login in Dovecot 2.0.x before 2.0.13 does not follow the user and group configuration settings, which might allow remote authenticated users to bypass intended access restrictions by leveraging a script.
5833| [CVE-2011-1929] lib-mail/message-header-parser.c in Dovecot 1.2.x before 1.2.17 and 2.0.x before 2.0.13 does not properly handle '\0' characters in header names, which allows remote attackers to cause a denial of service (daemon crash or mailbox corruption) via a crafted e-mail message.
5834| [CVE-2010-4011] Dovecot in Apple Mac OS X 10.6.5 10H574 does not properly manage memory for user names, which allows remote authenticated users to read the private e-mail of other persons in opportunistic circumstances via standard e-mail clients accessing a user's own mailbox, related to a "memory aliasing issue."
5835| [CVE-2010-3780] Dovecot 1.2.x before 1.2.15 allows remote authenticated users to cause a denial of service (master process outage) by simultaneously disconnecting many (1) IMAP or (2) POP3 sessions.
5836| [CVE-2010-3779] Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.beta2 grants the admin permission to the owner of each mailbox in a non-public namespace, which might allow remote authenticated users to bypass intended access restrictions by changing the ACL of a mailbox, as demonstrated by a symlinked shared mailbox.
5837| [CVE-2010-3707] plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving more specific entries that occur after less specific entries, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
5838| [CVE-2010-3706] plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving the private namespace of a user, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
5839| [CVE-2010-3304] The ACL plugin in Dovecot 1.2.x before 1.2.13 propagates INBOX ACLs to newly created mailboxes in certain configurations, which might allow remote attackers to read mailboxes that have unintended weak ACLs.
5840| [CVE-2010-0745] Unspecified vulnerability in Dovecot 1.2.x before 1.2.11 allows remote attackers to cause a denial of service (CPU consumption) via long headers in an e-mail message.
5841| [CVE-2010-0535] Dovecot in Apple Mac OS X 10.6 before 10.6.3, when Kerberos is enabled, does not properly enforce the service access control list (SACL) for sending and receiving e-mail, which allows remote authenticated users to bypass intended access restrictions via unspecified vectors.
5842| [CVE-2010-0433] The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiation, as demonstrated by a chroot installation of Dovecot or stunnel without Kerberos configuration files inside the chroot.
5843| [CVE-2009-3897] Dovecot 1.2.x before 1.2.8 sets 0777 permissions during creation of certain directories at installation time, which allows local users to access arbitrary user accounts by replacing the auth socket, related to the parent directories of the base_dir directory, and possibly the base_dir directory itself.
5844| [CVE-2009-3235] Multiple stack-based buffer overflows in the Sieve plugin in Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, as derived from Cyrus libsieve, allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SIEVE script, as demonstrated by forwarding an e-mail message to a large number of recipients, a different vulnerability than CVE-2009-2632.
5845| [CVE-2009-2632] Buffer overflow in the SIEVE script component (sieve/script.c), as used in cyrus-imapd in Cyrus IMAP Server 2.2.13 and 2.3.14, and Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, allows local users to execute arbitrary code and read or modify arbitrary messages via a crafted SIEVE script, related to the incorrect use of the sizeof operator for determining buffer length, combined with an integer signedness error.
5846| [CVE-2008-5301] Directory traversal vulnerability in the ManageSieve implementation in Dovecot 1.0.15, 1.1, and 1.2 allows remote attackers to read and modify arbitrary .sieve files via a ".." (dot dot) in a script name.
5847| [CVE-2008-4907] The message parsing feature in Dovecot 1.1.4 and 1.1.5, when using the FETCH ENVELOPE command in the IMAP client, allows remote attackers to cause a denial of service (persistent crash) via an email with a malformed From address, which triggers an assertion error, aka "invalid message address parsing bug."
5848| [CVE-2008-4870] dovecot 1.0.7 in Red Hat Enterprise Linux (RHEL) 5, and possibly Fedora, uses world-readable permissions for dovecot.conf, which allows local users to obtain the ssl_key_password parameter value.
5849| [CVE-2008-4578] The ACL plugin in Dovecot before 1.1.4 allows attackers to bypass intended access restrictions by using the "k" right to create unauthorized "parent/child/child" mailboxes.
5850| [CVE-2008-4577] The ACL plugin in Dovecot before 1.1.4 treats negative access rights as if they are positive access rights, which allows attackers to bypass intended access restrictions.
5851| [CVE-2008-1218] Argument injection vulnerability in Dovecot 1.0.x before 1.0.13, and 1.1.x before 1.1.rc3, when using blocking passdbs, allows remote attackers to bypass the password check via a password containing TAB characters, which are treated as argument delimiters that enable the skip_password_check field to be specified.
5852| [CVE-2008-1199] Dovecot before 1.0.11, when configured to use mail_extra_groups to allow Dovecot to create dotlocks in /var/mail, might allow local users to read sensitive mail files for other users, or modify files or directories that are writable by group, via a symlink attack.
5853| [CVE-2007-6598] Dovecot before 1.0.10, with certain configuration options including use of %variables, does not properly maintain the LDAP+auth cache, which might allow remote authenticated users to login as a different user who has the same password.
5854| [CVE-2007-5794] Race condition in nss_ldap, when used in applications that are linked against the pthread library and fork after a call to nss_ldap, might send user data to the wrong process because of improper handling of the LDAP connection. NOTE: this issue was originally reported for Dovecot with the wrong mailboxes being returned, but other applications might also be affected.
5855| [CVE-2007-4211] The ACL plugin in Dovecot before 1.0.3 allows remote authenticated users with the insert right to save certain flags via a (1) COPY or (2) APPEND command.
5856| [CVE-2007-2231] Directory traversal vulnerability in index/mbox/mbox-storage.c in Dovecot before 1.0.rc29, when using the zlib plugin, allows remote attackers to read arbitrary gzipped (.gz) mailboxes (mbox files) via a .. (dot dot) sequence in the mailbox name.
5857| [CVE-2007-2173] Eval injection vulnerability in (1) courier-imapd.indirect and (2) courier-pop3d.indirect in Courier-IMAP before 4.0.6-r2, and 4.1.x before 4.1.2-r1, on Gentoo Linux allows remote attackers to execute arbitrary commands via the XMAILDIR variable, related to the LOGINRUN variable.
5858| [CVE-2007-0618] Unspecified vulnerability in (1) pop3d, (2) pop3ds, (3) imapd, and (4) imapds in IBM AIX 5.3.0 has unspecified impact and attack vectors, involving an "authentication vulnerability."
5859| [CVE-2006-5973] Off-by-one buffer overflow in Dovecot 1.0test53 through 1.0.rc14, and possibly other versions, when index files are used and mmap_disable is set to "yes," allows remote authenticated IMAP or POP3 users to cause a denial of service (crash) via unspecified vectors involving the cache file.
5860| [CVE-2006-2502] Stack-based buffer overflow in pop3d in Cyrus IMAPD (cyrus-imapd) 2.3.2, when the popsubfolders option is enabled, allows remote attackers to execute arbitrary code via a long USER command.
5861| [CVE-2006-2414] Directory traversal vulnerability in Dovecot 1.0 beta and 1.0 allows remote attackers to list files and directories under the mbox parent directory and obtain mailbox names via ".." sequences in the (1) LIST or (2) DELETE IMAP command.
5862| [CVE-2006-0730] Multiple unspecified vulnerabilities in Dovecot before 1.0beta3 allow remote attackers to cause a denial of service (application crash or hang) via unspecified vectors involving (1) "potential hangs" in the APPEND command and "potential crashes" in (2) dovecot-auth and (3) imap/pop3-login. NOTE: vector 2 might be related to a double free vulnerability.
5863| [CVE-2002-0925] Format string vulnerability in mmsyslog function allows remote attackers to execute arbitrary code via (1) the USER command to mmpop3d for mmmail 0.0.13 and earlier, (2) the HELO command to mmsmtpd for mmmail 0.0.13 and earlier, or (3) the USER command to mmftpd 0.0.7 and earlier.
5864| [CVE-2001-0143] vpop3d program in linuxconf 1.23r and earlier allows local users to overwrite arbitrary files via a symlink attack.
5865| [CVE-2000-1197] POP2 or POP3 server (pop3d) in imap-uw IMAP package on FreeBSD and other operating systems creates lock files with predictable names, which allows local users to cause a denial of service (lack of mail access) for other users by creating lock files for other mail boxes.
5866| [CVE-1999-1445] Vulnerability in imapd and ipop3d in Slackware 3.4 and 3.3 with shadowing enabled, and possibly other operating systems, allows remote attackers to cause a core dump via a short sequence of USER and PASS commands that do not provide valid usernames or passwords.
5867|
5868| SecurityFocus - https://www.securityfocus.com/bid/:
5869| [103201] Dovecot CVE-2017-14461 Out-Of-Bounds Read Information Disclosure Vulnerability
5870| [97536] Dovecot CVE-2017-2669 Denial of Service Vulnerability
5871| [94639] Dovecot Auth Component CVE-2016-8652 Denial of Service Vulnerability
5872| [91175] Dovecot CVE-2016-4982 Local Information Disclosure Vulnerability
5873| [84736] Dovecot CVE-2008-4870 Local Security Vulnerability
5874| [74335] Dovecot 'ssl-proxy-openssl.c' Remote Denial of Service Vulnerability
5875| [67306] Dovecot Denial of Service Vulnerability
5876| [67219] akpop3d 'pszQuery' Remote Memory Corruption Vulnerability
5877| [63367] Dovecot Checkpassword Authentication Protocol Local Authentication Bypass Vulnerability
5878| [61763] RETIRED: Dovecot 'LIST' Command Denial of Service Vulnerability
5879| [60465] Exim for Dovecot 'use_shell' Remote Command Execution Vulnerability
5880| [60052] Dovecot 'APPEND' Parameter Denial of Service Vulnerability
5881| [56759] RETIRED: Dovecot 'mail-search.c' Denial of Service Vulnerability
5882| [50709] Dovecot SSL Certificate 'Common Name' Field Validation Security Bypass Vulnerability
5883| [48003] Dovecot 'script-login' Multiple Security Bypass Vulnerabilities
5884| [47930] Dovecot Header Name NULL Character Denial of Service Vulnerability
5885| [44874] Apple Mac OS X Dovecot (CVE-2010-4011) Memory Corruption Vulnerability
5886| [43690] Dovecot Access Control List (ACL) Multiple Remote Vulnerabilities
5887| [41964] Dovecot Access Control List (ACL) Plugin Security Bypass Weakness
5888| [39838] tpop3d Remote Denial of Service Vulnerability
5889| [39258] Dovecot Service Control Access List Security Bypass Vulnerability
5890| [37084] Dovecot Insecure 'base_dir' Permissions Local Privilege Escalation Vulnerability
5891| [36377] Dovecot Sieve Plugin Multiple Unspecified Buffer Overflow Vulnerabilities
5892| [32582] Dovecot ManageSieve Service '.sieve' Files Directory Traversal Vulnerability
5893| [31997] Dovecot Invalid Message Address Parsing Denial of Service Vulnerability
5894| [31587] Dovecot ACL Plugin Multiple Security Bypass Vulnerabilities
5895| [28181] Dovecot 'Tab' Character Password Check Security Bypass Vulnerability
5896| [28092] Dovecot 'mail_extra_groups' Insecure Settings Local Unauthorized Access Vulnerability
5897| [27093] Dovecot Authentication Cache Security Bypass Vulnerability
5898| [25182] Dovecot ACL Plugin Security Bypass Vulnerability
5899| [23552] Dovecot Zlib Plugin Remote Information Disclosure Vulnerability
5900| [22262] IBM AIX Pop3D/Pop3DS/IMapD/IMapDS Authentication Bypass Vulnerability
5901| [21183] Dovecot IMAP Server Mapped Pages Off-By-One Buffer Overflow Vulnerability
5902| [18056] Cyrus IMAPD POP3D Remote Buffer Overflow Vulnerability
5903| [17961] Dovecot Remote Information Disclosure Vulnerability
5904| [16672] Dovecot Double Free Denial of Service Vulnerability
5905| [8495] akpop3d User Name SQL Injection Vulnerability
5906| [8473] Vpop3d Remote Denial Of Service Vulnerability
5907| [3990] ZPop3D Bad Login Logging Failure Vulnerability
5908| [2781] DynFX MailServer POP3d Denial of Service Vulnerability
5909|
5910| IBM X-Force - https://exchange.xforce.ibmcloud.com:
5911| [86382] Dovecot POP3 Service denial of service
5912| [84396] Dovecot IMAP APPEND denial of service
5913| [80453] Dovecot mail-search.c denial of service
5914| [71354] Dovecot SSL Common Name (CN) weak security
5915| [67675] Dovecot script-login security bypass
5916| [67674] Dovecot script-login directory traversal
5917| [67589] Dovecot header name denial of service
5918| [63267] Apple Mac OS X Dovecot information disclosure
5919| [62340] Dovecot mailbox security bypass
5920| [62339] Dovecot IMAP or POP3 denial of service
5921| [62256] Dovecot mailbox security bypass
5922| [62255] Dovecot ACL entry security bypass
5923| [60639] Dovecot ACL plugin weak security
5924| [57267] Apple Mac OS X Dovecot Kerberos security bypass
5925| [56763] Dovecot header denial of service
5926| [54363] Dovecot base_dir privilege escalation
5927| [53248] CMU Sieve plugin for Dovecot unspecified buffer overflow
5928| [46323] Dovecot dovecot.conf information disclosure
5929| [46227] Dovecot message parsing denial of service
5930| [45669] Dovecot ACL mailbox security bypass
5931| [45667] Dovecot ACL plugin rights security bypass
5932| [41085] Dovecot TAB characters authentication bypass
5933| [41009] Dovecot mail_extra_groups option unauthorized access
5934| [39342] Dovecot LDAP auth cache configuration security bypass
5935| [35767] Dovecot ACL plugin security bypass
5936| [34082] Dovecot mbox-storage.c directory traversal
5937| [30433] Dovecot IMAP/POP3 server dovecot.index.cache buffer overflow
5938| [26578] Cyrus IMAP pop3d buffer overflow
5939| [26536] Dovecot IMAP LIST information disclosure
5940| [24710] Dovecot dovecot-auth and imap/pop3-login denial of service
5941| [24709] Dovecot APPEND command denial of service
5942| [13018] akpop3d authentication code SQL injection
5943| [7345] Slackware Linux imapd and ipop3d core dump
5944| [6269] imap, ipop2d and ipop3d buffer overflows
5945| [5923] Linuxconf vpop3d symbolic link
5946| [4918] IPOP3D, Buffer overflow attack
5947| [1560] IPOP3D, user login successful
5948| [1559] IPOP3D user login to remote host successful
5949| [1525] IPOP3D, user logout
5950| [1524] IPOP3D, user auto-logout
5951| [1523] IPOP3D, user login failure
5952| [1522] IPOP3D, brute force attack
5953| [1521] IPOP3D, user kiss of death logout
5954| [418] pop3d mktemp creates insecure temporary files
5955|
5956| Exploit-DB - https://www.exploit-db.com:
5957| [25297] Dovecot with Exim sender_address Parameter - Remote Command Execution
5958| [23053] Vpop3d Remote Denial of Service Vulnerability
5959| [16836] Cyrus IMAPD pop3d popsubfolders USER Buffer Overflow
5960| [11893] tPop3d 1.5.3 DoS
5961| [5257] Dovecot IMAP 1.0.10 <= 1.1rc2 - Remote Email Disclosure Exploit
5962| [2185] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (3)
5963| [2053] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (2)
5964| [1813] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit
5965|
5966| OpenVAS (Nessus) - http://www.openvas.org:
5967| [901026] Dovecot Sieve Plugin Multiple Buffer Overflow Vulnerabilities
5968| [901025] Dovecot Version Detection
5969| [881402] CentOS Update for dovecot CESA-2011:1187 centos5 x86_64
5970| [881358] CentOS Update for dovecot CESA-2011:1187 centos4 x86_64
5971| [880980] CentOS Update for dovecot CESA-2011:1187 centos5 i386
5972| [880967] CentOS Update for dovecot CESA-2011:1187 centos4 i386
5973| [870607] RedHat Update for dovecot RHSA-2011:0600-01
5974| [870471] RedHat Update for dovecot RHSA-2011:1187-01
5975| [870153] RedHat Update for dovecot RHSA-2008:0297-02
5976| [863272] Fedora Update for dovecot FEDORA-2011-7612
5977| [863115] Fedora Update for dovecot FEDORA-2011-7258
5978| [861525] Fedora Update for dovecot FEDORA-2007-664
5979| [861394] Fedora Update for dovecot FEDORA-2007-493
5980| [861333] Fedora Update for dovecot FEDORA-2007-1485
5981| [860845] Fedora Update for dovecot FEDORA-2008-9202
5982| [860663] Fedora Update for dovecot FEDORA-2008-2475
5983| [860169] Fedora Update for dovecot FEDORA-2008-2464
5984| [860089] Fedora Update for dovecot FEDORA-2008-9232
5985| [840950] Ubuntu Update for dovecot USN-1295-1
5986| [840668] Ubuntu Update for dovecot USN-1143-1
5987| [840583] Ubuntu Update for dovecot vulnerabilities USN-1059-1
5988| [840335] Ubuntu Update for dovecot vulnerabilities USN-593-1
5989| [840290] Ubuntu Update for dovecot vulnerability USN-567-1
5990| [840234] Ubuntu Update for dovecot vulnerability USN-666-1
5991| [840072] Ubuntu Update for dovecot vulnerability USN-487-1
5992| [831405] Mandriva Update for dovecot MDVSA-2011:101 (dovecot)
5993| [831230] Mandriva Update for dovecot MDVSA-2010:217 (dovecot)
5994| [831197] Mandriva Update for dovecot MDVSA-2010:196 (dovecot)
5995| [831054] Mandriva Update for dovecot MDVSA-2010:104 (dovecot)
5996| [830496] Mandriva Update for dovecot MDVSA-2008:232 (dovecot)
5997| [801055] Dovecot 'base_dir' Insecure Permissions Security Bypass Vulnerability
5998| [800030] Dovecot ACL Plugin Security Bypass Vulnerabilities
5999| [70767] Gentoo Security Advisory GLSA 201110-04 (Dovecot)
6000| [70259] FreeBSD Ports: dovecot
6001| [69959] Debian Security Advisory DSA 2252-1 (dovecot)
6002| [66522] FreeBSD Ports: dovecot
6003| [65010] Ubuntu USN-838-1 (dovecot)
6004| [64978] Debian Security Advisory DSA 1892-1 (dovecot)
6005| [64953] Mandrake Security Advisory MDVSA-2009:242-1 (dovecot)
6006| [64952] Mandrake Security Advisory MDVSA-2009:242 (dovecot)
6007| [64861] Fedora Core 10 FEDORA-2009-9559 (dovecot)
6008| [62965] Gentoo Security Advisory GLSA 200812-16 (dovecot)
6009| [62854] FreeBSD Ports: dovecot-managesieve
6010| [61916] FreeBSD Ports: dovecot
6011| [60588] Gentoo Security Advisory GLSA 200803-25 (dovecot)
6012| [60568] Debian Security Advisory DSA 1516-1 (dovecot)
6013| [60528] FreeBSD Ports: dovecot
6014| [60134] Debian Security Advisory DSA 1457-1 (dovecot)
6015| [60089] FreeBSD Ports: dovecot
6016| [58578] Debian Security Advisory DSA 1359-1 (dovecot)
6017| [56834] Debian Security Advisory DSA 1080-1 (dovecot)
6018|
6019| SecurityTracker - https://www.securitytracker.com:
6020| [1028585] Dovecot APPEND Parameter Processing Flaw Lets Remote Authenticated Users Deny Service
6021| [1024740] Mac OS X Server Dovecot Memory Aliasing Bug May Cause Mail to Be Delivered to the Wrong User
6022| [1017288] Dovecot POP3/IMAP Cache File Buffer Overflow May Let Remote Users Execute Arbitrary Code
6023|
6024| OSVDB - http://www.osvdb.org:
6025| [96172] Dovecot POP3 Service Terminated LIST Command Remote DoS
6026| [93525] Dovecot IMAP APPEND Command Malformed Parameter Parsing Remote DoS
6027| [93004] Dovecot with Exim sender_address Parameter Remote Command Execution
6028| [88058] Dovecot lib-storage/mail-search.c Multiple Keyword Search Handling Remote DoS
6029| [77185] Dovecot SSL Certificate Common Name Field MitM Spoofing Weakness
6030| [74515] Dovecot script-login chroot Configuration Setting Traversal Arbitrary File Access
6031| [74514] Dovecot script-login User / Group Configuration Settings Remote Access Restriction Bypass
6032| [72495] Dovecot lib-mail/message-header-parser.c Mail Header Name NULL Character Handling Remote DoS
6033| [69260] Apple Mac OS X Server Dovecot Memory Aliasing Mail Delivery Issue
6034| [68516] Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition User Private Namespace Mailbox Access Restriction Remote Bypass
6035| [68515] Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition Specific Entry Order Mailbox Access Restriction Remote Bypass
6036| [68513] Dovecot Non-public Namespace Mailbox ACL Manipulation Access Restriction Remote Bypass
6037| [68512] Dovecot IMAP / POP3 Session Disconnect Master Process Outage Remote DoS
6038| [66625] Dovecot ACL Plugin INBOX ACL Copying Weakness Restriction Bypass
6039| [66113] Dovecot Mail Root Directory Creation Permission Weakness
6040| [66112] Dovecot Installation base_dir Parent Directory Permission Weakness
6041| [66111] Dovecot SEARCH Functionality str_find_init() Function Overflow
6042| [66110] Dovecot Multiple Unspecified Buffer Overflows
6043| [66108] Dovecot Malformed Message Body Processing Unspecified Functions Remote DoS
6044| [64783] Dovecot E-mail Message Header Unspecified DoS
6045| [63372] Apple Mac OS X Dovecot Kerberos Authentication SACL Restriction Bypass
6046| [62796] Dovecot mbox Format Email Header Handling DoS
6047| [60316] Dovecot base_dir Directory Permission Weakness Local Privilege Escalation
6048| [58103] Dovecot CMU Sieve Plugin Script Handling Multiple Overflows
6049| [50253] Dovecot dovecot.conf Permission Weakness Local ssl_key_password Parameter Disclosure
6050| [49918] Dovecot ManageSieve Script Name Handling Traversal Arbitrary File Manipulation
6051| [49429] Dovecot Message Parsing Feature Crafted Email Header Handling Remote DoS
6052| [49099] Dovecot ACL Plugin k Right Mailbox Creation Restriction Bypass
6053| [49098] Dovecot ACL Plugin Negative Access Rights Bypass
6054| [43137] Dovecot mail_extra_groups Symlink File Manipulation
6055| [42979] Dovecot passdbs Argument Injection Authentication Bypass
6056| [39876] Dovecot LDAP Auth Cache Security Bypass
6057| [39386] Dovecot ACL Plugin Insert Right APPEND / COPY Command Unauthorized Flag Manipulation
6058| [35489] Dovecot index/mbox/mbox-storage.c Traversal Arbitrary Gzip File Access
6059| [30524] Dovecot IMAP/POP3 Server dovecot.index.cache Handling Overflow
6060| [25853] Cyrus IMAPD pop3d USER Command Remote Overflow
6061| [25727] Dovecot Multiple Command Traversal Arbitrary Directory Listing
6062| [23281] Dovecot imap/pop3-login dovecot-auth DoS
6063| [23280] Dovecot Malformed APPEND Command DoS
6064| [14459] mmmail mmpop3d USER Command mmsyslog Function Format String
6065| [12033] Slackware Linux imapd/ipop3d Malformed USER/PASS Sequence DoS
6066| [5857] Linux pop3d Arbitrary Mail File Access
6067| [2471] akpop3d username SQL Injection
6068|_
6069143/tcp open imap Dovecot imapd
6070| vulscan: VulDB - https://vuldb.com:
6071| [139289] cPanel up to 68.0.14 dovecot-xaps-plugin Format privilege escalation
6072| [134480] Dovecot up to 2.3.5.2 Submission-Login Crash denial of service
6073| [134479] Dovecot up to 2.3.5.2 IMAP Server Crash denial of service
6074| [134024] Dovecot up to 2.3.5.1 JSON Encoder Username Crash denial of service
6075| [132543] Dovecot up to 2.2.36.0/2.3.4.0 Certificate Impersonation weak authentication
6076| [119762] Dovecot up to 2.2.28 dict Authentication var_expand() denial of service
6077| [114012] Dovecot up to 2.2.33 TLS SNI Restart denial of service
6078| [114009] Dovecot SMTP Delivery Email Message Out-of-Bounds memory corruption
6079| [112447] Dovecot up to 2.2.33/2.3.0 SASL Auth Memory Leak denial of service
6080| [106837] Dovecot up to 2.2.16 ssl-proxy-openssl.c ssl-proxy-opensslc denial of service
6081| [97052] Dovecot up to 2.2.26 auth-policy Unset Crash denial of service
6082| [69835] Dovecot 2.2.0/2.2.1 denial of service
6083| [13348] Dovecot up to 1.2.15/2.1.15 IMAP4/POP3 SSL/TLS Handshake denial of service
6084| [65684] Dovecot up to 2.2.6 unknown vulnerability
6085| [9807] Dovecot up to 1.2.7 on Exim Input Sanitizer privilege escalation
6086| [63692] Dovecot up to 2.0.15 spoofing
6087| [7062] Dovecot 2.1.10 mail-search.c denial of service
6088| [59792] Cyrus IMAPd 2.4.11 weak authentication
6089| [57517] Dovecot up to 2.0.12 Login directory traversal
6090| [57516] Dovecot up to 2.0.12 Access Restriction directory traversal
6091| [57515] Dovecot up to 2.0.12 Crash denial of service
6092| [54944] Dovecot up to 1.2.14 denial of service
6093| [54943] Dovecot up to 1.2.14 Access Restriction Symlink privilege escalation
6094| [54942] Dovecot up to 2.0.4 Access Restriction denial of service
6095| [54941] Dovecot up to 2.0.4 Access Restriction unknown vulnerability
6096| [54840] Dovecot up to 1.2.12 AGate unknown vulnerability
6097| [53277] Dovecot up to 1.2.10 denial of service
6098| [50082] Dovecot up to 1.1.6 Stack-based memory corruption
6099| [45256] Dovecot up to 1.1.5 directory traversal
6100| [44846] Dovecot 1.1.4/1.1.5 IMAP Client Crash denial of service
6101| [44546] Dovecot up to 1.0.x Access Restriction unknown vulnerability
6102| [44545] Dovecot up to 1.0.x Access Restriction unknown vulnerability
6103| [41430] Dovecot 1.0.12/1.1 Locking unknown vulnerability
6104| [40356] Dovecot 1.0.9 Cache unknown vulnerability
6105| [38222] Dovecot 1.0.2 directory traversal
6106| [37927] Ipswitch Ipswitch Collaboration Suite up to 2006.1 IMAP Service imapd32.exe memory corruption
6107| [36376] Dovecot up to 1.0.x directory traversal
6108| [35759] Atrium MERCUR IMAPD IMAP4 mcrimap4.exe memory corruption
6109| [33332] Timo Sirainen Dovecot up to 1.0test53 Off-By-One memory corruption
6110|
6111| MITRE CVE - https://cve.mitre.org:
6112| [CVE-2009-2632] Buffer overflow in the SIEVE script component (sieve/script.c), as used in cyrus-imapd in Cyrus IMAP Server 2.2.13 and 2.3.14, and Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, allows local users to execute arbitrary code and read or modify arbitrary messages via a crafted SIEVE script, related to the incorrect use of the sizeof operator for determining buffer length, combined with an integer signedness error.
6113| [CVE-2011-4318] Dovecot 2.0.x before 2.0.16, when ssl or starttls is enabled and hostname is used to define the proxy destination, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a valid certificate for a different hostname.
6114| [CVE-2011-3481] The index_get_ids function in index.c in imapd in Cyrus IMAP Server before 2.4.11, when server-side threading is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted References header in an e-mail message.
6115| [CVE-2011-3372] imap/nntpd.c in the NNTP server (nntpd) for Cyrus IMAPd 2.4.x before 2.4.12 allows remote attackers to bypass authentication by sending an AUTHINFO USER command without sending an additional AUTHINFO PASS command.
6116| [CVE-2011-2167] script-login in Dovecot 2.0.x before 2.0.13 does not follow the chroot configuration setting, which might allow remote authenticated users to conduct directory traversal attacks by leveraging a script.
6117| [CVE-2011-2166] script-login in Dovecot 2.0.x before 2.0.13 does not follow the user and group configuration settings, which might allow remote authenticated users to bypass intended access restrictions by leveraging a script.
6118| [CVE-2011-1929] lib-mail/message-header-parser.c in Dovecot 1.2.x before 1.2.17 and 2.0.x before 2.0.13 does not properly handle '\0' characters in header names, which allows remote attackers to cause a denial of service (daemon crash or mailbox corruption) via a crafted e-mail message.
6119| [CVE-2010-4011] Dovecot in Apple Mac OS X 10.6.5 10H574 does not properly manage memory for user names, which allows remote authenticated users to read the private e-mail of other persons in opportunistic circumstances via standard e-mail clients accessing a user's own mailbox, related to a "memory aliasing issue."
6120| [CVE-2010-3780] Dovecot 1.2.x before 1.2.15 allows remote authenticated users to cause a denial of service (master process outage) by simultaneously disconnecting many (1) IMAP or (2) POP3 sessions.
6121| [CVE-2010-3779] Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.beta2 grants the admin permission to the owner of each mailbox in a non-public namespace, which might allow remote authenticated users to bypass intended access restrictions by changing the ACL of a mailbox, as demonstrated by a symlinked shared mailbox.
6122| [CVE-2010-3707] plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving more specific entries that occur after less specific entries, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
6123| [CVE-2010-3706] plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving the private namespace of a user, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
6124| [CVE-2010-3304] The ACL plugin in Dovecot 1.2.x before 1.2.13 propagates INBOX ACLs to newly created mailboxes in certain configurations, which might allow remote attackers to read mailboxes that have unintended weak ACLs.
6125| [CVE-2010-0745] Unspecified vulnerability in Dovecot 1.2.x before 1.2.11 allows remote attackers to cause a denial of service (CPU consumption) via long headers in an e-mail message.
6126| [CVE-2010-0535] Dovecot in Apple Mac OS X 10.6 before 10.6.3, when Kerberos is enabled, does not properly enforce the service access control list (SACL) for sending and receiving e-mail, which allows remote authenticated users to bypass intended access restrictions via unspecified vectors.
6127| [CVE-2010-0433] The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiation, as demonstrated by a chroot installation of Dovecot or stunnel without Kerberos configuration files inside the chroot.
6128| [CVE-2009-3897] Dovecot 1.2.x before 1.2.8 sets 0777 permissions during creation of certain directories at installation time, which allows local users to access arbitrary user accounts by replacing the auth socket, related to the parent directories of the base_dir directory, and possibly the base_dir directory itself.
6129| [CVE-2009-3235] Multiple stack-based buffer overflows in the Sieve plugin in Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, as derived from Cyrus libsieve, allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SIEVE script, as demonstrated by forwarding an e-mail message to a large number of recipients, a different vulnerability than CVE-2009-2632.
6130| [CVE-2008-5301] Directory traversal vulnerability in the ManageSieve implementation in Dovecot 1.0.15, 1.1, and 1.2 allows remote attackers to read and modify arbitrary .sieve files via a ".." (dot dot) in a script name.
6131| [CVE-2008-4907] The message parsing feature in Dovecot 1.1.4 and 1.1.5, when using the FETCH ENVELOPE command in the IMAP client, allows remote attackers to cause a denial of service (persistent crash) via an email with a malformed From address, which triggers an assertion error, aka "invalid message address parsing bug."
6132| [CVE-2008-4870] dovecot 1.0.7 in Red Hat Enterprise Linux (RHEL) 5, and possibly Fedora, uses world-readable permissions for dovecot.conf, which allows local users to obtain the ssl_key_password parameter value.
6133| [CVE-2008-4578] The ACL plugin in Dovecot before 1.1.4 allows attackers to bypass intended access restrictions by using the "k" right to create unauthorized "parent/child/child" mailboxes.
6134| [CVE-2008-4577] The ACL plugin in Dovecot before 1.1.4 treats negative access rights as if they are positive access rights, which allows attackers to bypass intended access restrictions.
6135| [CVE-2008-1218] Argument injection vulnerability in Dovecot 1.0.x before 1.0.13, and 1.1.x before 1.1.rc3, when using blocking passdbs, allows remote attackers to bypass the password check via a password containing TAB characters, which are treated as argument delimiters that enable the skip_password_check field to be specified.
6136| [CVE-2008-1199] Dovecot before 1.0.11, when configured to use mail_extra_groups to allow Dovecot to create dotlocks in /var/mail, might allow local users to read sensitive mail files for other users, or modify files or directories that are writable by group, via a symlink attack.
6137| [CVE-2007-6598] Dovecot before 1.0.10, with certain configuration options including use of %variables, does not properly maintain the LDAP+auth cache, which might allow remote authenticated users to login as a different user who has the same password.
6138| [CVE-2007-5794] Race condition in nss_ldap, when used in applications that are linked against the pthread library and fork after a call to nss_ldap, might send user data to the wrong process because of improper handling of the LDAP connection. NOTE: this issue was originally reported for Dovecot with the wrong mailboxes being returned, but other applications might also be affected.
6139| [CVE-2007-5740] The format string protection mechanism in IMAPD for Perdition Mail Retrieval Proxy 1.17 and earlier allows remote attackers to execute arbitrary code via an IMAP tag with a null byte followed by a format string specifier, which is not counted by the mechanism.
6140| [CVE-2007-5018] Stack-based buffer overflow in IMAPD in Mercury/32 4.52 allows remote authenticated users to execute arbitrary code via a long argument in a SEARCH ON command. NOTE: this issue might overlap with CVE-2004-1211.
6141| [CVE-2007-4211] The ACL plugin in Dovecot before 1.0.3 allows remote authenticated users with the insert right to save certain flags via a (1) COPY or (2) APPEND command.
6142| [CVE-2007-3925] Multiple buffer overflows in the IMAP service (imapd32.exe) in Ipswitch IMail Server 2006 before 2006.21 allow remote authenticated users to execute arbitrary code via the (1) Search or (2) Search Charset command.
6143| [CVE-2007-2231] Directory traversal vulnerability in index/mbox/mbox-storage.c in Dovecot before 1.0.rc29, when using the zlib plugin, allows remote attackers to read arbitrary gzipped (.gz) mailboxes (mbox files) via a .. (dot dot) sequence in the mailbox name.
6144| [CVE-2007-2173] Eval injection vulnerability in (1) courier-imapd.indirect and (2) courier-pop3d.indirect in Courier-IMAP before 4.0.6-r2, and 4.1.x before 4.1.2-r1, on Gentoo Linux allows remote attackers to execute arbitrary commands via the XMAILDIR variable, related to the LOGINRUN variable.
6145| [CVE-2007-1579] Stack-based buffer overflow in Atrium MERCUR IMAPD allows remote attackers to have an unknown impact via a certain SUBSCRIBE command.
6146| [CVE-2007-1578] Multiple integer signedness errors in the NTLM implementation in Atrium MERCUR IMAPD (mcrimap4.exe) 5.00.14, with SP4, allow remote attackers to execute arbitrary code via a long NTLMSSP argument that triggers a stack-based buffer overflow.
6147| [CVE-2007-0618] Unspecified vulnerability in (1) pop3d, (2) pop3ds, (3) imapd, and (4) imapds in IBM AIX 5.3.0 has unspecified impact and attack vectors, involving an "authentication vulnerability."
6148| [CVE-2006-6762] The IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to cause a denial of service via an APPEND command with a single "(" (parenthesis) in the argument.
6149| [CVE-2006-6761] Stack-based buffer overflow in the IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to execute arbitrary code via a long argument to the SUBSCRIBE command.
6150| [CVE-2006-6425] Stack-based buffer overflow in the IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to execute arbitrary code via unspecified vectors involving the APPEND command.
6151| [CVE-2006-6424] Multiple buffer overflows in Novell NetMail before 3.52e FTF2 allow remote attackers to execute arbitrary code (1) by appending literals to certain IMAP verbs when specifying command continuation requests to IMAPD, resulting in a heap overflow
6152| [CVE-2006-5973] Off-by-one buffer overflow in Dovecot 1.0test53 through 1.0.rc14, and possibly other versions, when index files are used and mmap_disable is set to "yes," allows remote authenticated IMAP or POP3 users to cause a denial of service (crash) via unspecified vectors involving the cache file.
6153| [CVE-2006-2502] Stack-based buffer overflow in pop3d in Cyrus IMAPD (cyrus-imapd) 2.3.2, when the popsubfolders option is enabled, allows remote attackers to execute arbitrary code via a long USER command.
6154| [CVE-2006-2414] Directory traversal vulnerability in Dovecot 1.0 beta and 1.0 allows remote attackers to list files and directories under the mbox parent directory and obtain mailbox names via ".." sequences in the (1) LIST or (2) DELETE IMAP command.
6155| [CVE-2006-0730] Multiple unspecified vulnerabilities in Dovecot before 1.0beta3 allow remote attackers to cause a denial of service (application crash or hang) via unspecified vectors involving (1) "potential hangs" in the APPEND command and "potential crashes" in (2) dovecot-auth and (3) imap/pop3-login. NOTE: vector 2 might be related to a double free vulnerability.
6156| [CVE-2005-2278] Stack-based buffer overflow in the IMAP daemon (imapd) in MailEnable Professional 1.54 allows remote authenticated users to execute arbitrary code via the status command with a long mailbox name.
6157| [CVE-2005-1256] Stack-based buffer overflow in the IMAP daemon (IMAPD32.EXE) in IMail 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to execute arbitrary code via a STATUS command with a long mailbox name.
6158| [CVE-2005-1249] The IMAP daemon (IMAPD32.EXE) in Ipswitch Collaboration Suite (ICS) allows remote attackers to cause a denial of service (CPU consumption) via an LSUB command with a large number of null characters, which causes an infinite loop.
6159| [CVE-2005-1015] Buffer overflow in MailEnable Imapd (MEIMAP.exe) allows remote attackers to execute arbitrary code via a long LOGIN command.
6160| [CVE-2005-0546] Multiple buffer overflows in Cyrus IMAPd before 2.2.11 may allow attackers to execute arbitrary code via (1) an off-by-one error in the imapd annotate extension, (2) an off-by-one error in "cached header handling," (3) a stack-based buffer overflow in fetchnews, or (4) a stack-based buffer overflow in imapd.
6161| [CVE-2003-1322] Multiple stack-based buffer overflows in Atrium MERCUR IMAPD in MERCUR Mailserver before 4.2.15.0 allow remote attackers to execute arbitrary code via a long (1) EXAMINE, (2) DELETE, (3) SUBSCRIBE, (4) RENAME, (5) UNSUBSCRIBE, (6) LIST, (7) LSUB, (8) STATUS, (9) LOGIN, (10) CREATE, or (11) SELECT command.
6162| [CVE-2002-1782] The default configuration of University of Washington IMAP daemon (wu-imapd), when running on a system that does not allow shell access, allows a local user with a valid IMAP account to read arbitrary files as that user.
6163| [CVE-2002-1604] Multiple buffer overflows in HP Tru64 UNIX allow local and possibly remote attackers to execute arbitrary code via a long NLSPATH environment variable to (1) csh, (2) dtsession, (3) dxsysinfo, (4) imapd, (5) inc, (6) uucp, (7) uux, (8) rdist, or (9) deliver.
6164| [CVE-2002-0997] Buffer overflows in IMAP Agent (imapd) for Novell NetMail (NIMS) 3.0.3 before 3.0.3A allows remote attackers to cause a denial of service.
6165| [CVE-2002-0379] Buffer overflow in University of Washington imap server (uw-imapd) imap-2001 (imapd 2001.315) and imap-2001a (imapd 2001.315) with legacy RFC 1730 support, and imapd 2000.287 and earlier, allows remote authenticated users to execute arbitrary code via a long BODY request.
6166| [CVE-2001-0691] Buffer overflows in Washington University imapd 2000a through 2000c could allow local users without shell access to execute code as themselves in certain configurations.
6167| [CVE-2000-0284] Buffer overflow in University of Washington imapd version 4.7 allows users with a valid account to execute commands via LIST or other commands.
6168| [CVE-1999-1557] Buffer overflow in the login functions in IMAP server (imapd) in Ipswitch IMail 5.0 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via (1) a long user name or (2) a long password.
6169| [CVE-1999-1445] Vulnerability in imapd and ipop3d in Slackware 3.4 and 3.3 with shadowing enabled, and possibly other operating systems, allows remote attackers to cause a core dump via a short sequence of USER and PASS commands that do not provide valid usernames or passwords.
6170| [CVE-1999-1224] IMAP 4.1 BETA, and possibly other versions, does not properly handle the SIGABRT (abort) signal, which allows local users to crash the server (imapd) via certain sequences of commands, which causes a core dump that may contain sensitive password information.
6171|
6172| SecurityFocus - https://www.securityfocus.com/bid/:
6173| [103201] Dovecot CVE-2017-14461 Out-Of-Bounds Read Information Disclosure Vulnerability
6174| [97536] Dovecot CVE-2017-2669 Denial of Service Vulnerability
6175| [94639] Dovecot Auth Component CVE-2016-8652 Denial of Service Vulnerability
6176| [91175] Dovecot CVE-2016-4982 Local Information Disclosure Vulnerability
6177| [84736] Dovecot CVE-2008-4870 Local Security Vulnerability
6178| [84478] imapd CVE-1999-1224 Denial-Of-Service Vulnerability
6179| [74335] Dovecot 'ssl-proxy-openssl.c' Remote Denial of Service Vulnerability
6180| [67306] Dovecot Denial of Service Vulnerability
6181| [65650] Eudora WorldMail imapd 'UID' Command Buffer Overflow Vulnerability
6182| [63367] Dovecot Checkpassword Authentication Protocol Local Authentication Bypass Vulnerability
6183| [61763] RETIRED: Dovecot 'LIST' Command Denial of Service Vulnerability
6184| [60465] Exim for Dovecot 'use_shell' Remote Command Execution Vulnerability
6185| [60052] Dovecot 'APPEND' Parameter Denial of Service Vulnerability
6186| [56759] RETIRED: Dovecot 'mail-search.c' Denial of Service Vulnerability
6187| [51403] Eudora WorldMail imapd 'LIST' Command Buffer Overflow Vulnerability
6188| [50709] Dovecot SSL Certificate 'Common Name' Field Validation Security Bypass Vulnerability
6189| [49949] Cyrus IMAPd NTTP Logic Error Authentication Bypass Vulnerability
6190| [48003] Dovecot 'script-login' Multiple Security Bypass Vulnerabilities
6191| [47930] Dovecot Header Name NULL Character Denial of Service Vulnerability
6192| [44874] Apple Mac OS X Dovecot (CVE-2010-4011) Memory Corruption Vulnerability
6193| [43690] Dovecot Access Control List (ACL) Multiple Remote Vulnerabilities
6194| [41964] Dovecot Access Control List (ACL) Plugin Security Bypass Weakness
6195| [39258] Dovecot Service Control Access List Security Bypass Vulnerability
6196| [37084] Dovecot Insecure 'base_dir' Permissions Local Privilege Escalation Vulnerability
6197| [36377] Dovecot Sieve Plugin Multiple Unspecified Buffer Overflow Vulnerabilities
6198| [32582] Dovecot ManageSieve Service '.sieve' Files Directory Traversal Vulnerability
6199| [31997] Dovecot Invalid Message Address Parsing Denial of Service Vulnerability
6200| [31587] Dovecot ACL Plugin Multiple Security Bypass Vulnerabilities
6201| [28181] Dovecot 'Tab' Character Password Check Security Bypass Vulnerability
6202| [28092] Dovecot 'mail_extra_groups' Insecure Settings Local Unauthorized Access Vulnerability
6203| [27093] Dovecot Authentication Cache Security Bypass Vulnerability
6204| [26270] Perdition IMAPD __STR_VWRITE Remote Format String Vulnerability
6205| [25733] Mercury/32 IMAPD SEARCH Command Remote Stack Buffer Overflow Vulnerability
6206| [25182] Dovecot ACL Plugin Security Bypass Vulnerability
6207| [23552] Dovecot Zlib Plugin Remote Information Disclosure Vulnerability
6208| [23058] Atrium Mercur IMapD NTLM Buffer Overflow Vulnerability
6209| [22262] IBM AIX Pop3D/Pop3DS/IMapD/IMapDS Authentication Bypass Vulnerability
6210| [21183] Dovecot IMAP Server Mapped Pages Off-By-One Buffer Overflow Vulnerability
6211| [18056] Cyrus IMAPD POP3D Remote Buffer Overflow Vulnerability
6212| [17961] Dovecot Remote Information Disclosure Vulnerability
6213| [16672] Dovecot Double Free Denial of Service Vulnerability
6214| [15980] Qualcomm WorldMail IMAPD Buffer Overflow Vulnerability
6215| [15753] Ipswitch Collaboration Suite and IMail Server IMAPD LIST Command Denial Of Service Vulnerability
6216| [12636] Cyrus IMAPD Multiple Remote Buffer Overflow Vulnerabilities
6217| [11738] Cyrus IMAPD Multiple Remote Unspecified Vulnerabilities
6218| [11729] Cyrus IMAPD Multiple Remote Vulnerabilities
6219| [6298] Cyrus IMAPD Pre-Login Heap Corruption Vulnerability
6220| [4713] Wu-imapd Partial Mailbox Attribute Remote Buffer Overflow Vulnerability
6221| [2856] Imapd 'Local' Buffer Overflow Vulnerabilities
6222| [1110] Univ. Of Washington imapd Buffer Overflow Vulnerabilities
6223| [502] NT IMail Imapd Buffer Overflow DoS Vulnerability
6224| [130] imapd Buffer Overflow Vulnerability
6225|
6226| IBM X-Force - https://exchange.xforce.ibmcloud.com:
6227| [86382] Dovecot POP3 Service denial of service
6228| [84396] Dovecot IMAP APPEND denial of service
6229| [80453] Dovecot mail-search.c denial of service
6230| [71354] Dovecot SSL Common Name (CN) weak security
6231| [70325] Cyrus IMAPd NNTP security bypass
6232| [67675] Dovecot script-login security bypass
6233| [67674] Dovecot script-login directory traversal
6234| [67589] Dovecot header name denial of service
6235| [63267] Apple Mac OS X Dovecot information disclosure
6236| [62340] Dovecot mailbox security bypass
6237| [62339] Dovecot IMAP or POP3 denial of service
6238| [62256] Dovecot mailbox security bypass
6239| [62255] Dovecot ACL entry security bypass
6240| [60639] Dovecot ACL plugin weak security
6241| [57267] Apple Mac OS X Dovecot Kerberos security bypass
6242| [56763] Dovecot header denial of service
6243| [54363] Dovecot base_dir privilege escalation
6244| [53248] CMU Sieve plugin for Dovecot unspecified buffer overflow
6245| [47526] UW-imapd rfc822_output_char() denial of service
6246| [46323] Dovecot dovecot.conf information disclosure
6247| [46227] Dovecot message parsing denial of service
6248| [45669] Dovecot ACL mailbox security bypass
6249| [45667] Dovecot ACL plugin rights security bypass
6250| [41085] Dovecot TAB characters authentication bypass
6251| [41009] Dovecot mail_extra_groups option unauthorized access
6252| [39342] Dovecot LDAP auth cache configuration security bypass
6253| [35767] Dovecot ACL plugin security bypass
6254| [34082] Dovecot mbox-storage.c directory traversal
6255| [30433] Dovecot IMAP/POP3 server dovecot.index.cache buffer overflow
6256| [26536] Dovecot IMAP LIST information disclosure
6257| [24710] Dovecot dovecot-auth and imap/pop3-login denial of service
6258| [24709] Dovecot APPEND command denial of service
6259| [22629] RHSA-2005:408 updates for cyrus-imapd not installed
6260| [19460] Cyrus IMAP imapd buffer overflow
6261| [19455] Cyrus IMAP imapd extension off-by-one buffer overflow
6262| [18492] Novell NetMail IMAPD 101_mEna buffer overflow
6263| [10803] UW IMAP (wu-imapd) authenticated user buffer overflow
6264| [9238] UW IMAP (wu-imapd) could allow a remote attacker to access arbitrary files
6265| [9055] UW IMAP (wu-imapd) partial mailbox attributes to request buffer overflow
6266| [7345] Slackware Linux imapd and ipop3d core dump
6267| [573] Imapd denial of service
6268|
6269| Exploit-DB - https://www.exploit-db.com:
6270| [30724] Perdition 1.17 IMAPD __STR_VWRITE Remote Format String Vulnerability
6271| [25297] Dovecot with Exim sender_address Parameter - Remote Command Execution
6272| [22061] Cyrus IMAPD 1.4/1.5.19/2.0.12/2.0.16/2.1.9/2.1.10 Pre-Login Heap Corruption Vulnerability
6273| [21443] Wu-imapd 2000/2001 Partial Mailbox Attribute Remote Buffer Overflow Vulnerability (2)
6274| [21442] Wu-imapd 2000/2001 Partial Mailbox Attribute Remote Buffer Overflow Vulnerability (1)
6275| [19849] UoW imapd 10.234/12.264 COPY Buffer Overflow (meta)
6276| [19848] UoW imapd 10.234/12.264 LSUB Buffer Overflow (meta)
6277| [19847] UoW imapd 10.234/12.264 Buffer Overflow Vulnerabilities
6278| [19377] Ipswitch IMail 5.0 Imapd Buffer Overflow DoS Vulnerability
6279| [19107] Netscape Messaging Server 3.55,University of Washington imapd 10.234 Buffer Overflow Vulnerability
6280| [18354] WorldMail imapd 3.0 SEH overflow (egg hunter)
6281| [16836] Cyrus IMAPD pop3d popsubfolders USER Buffer Overflow
6282| [16485] MailEnable IMAPD 1.54 - STATUS Request Buffer Overflow
6283| [16482] MDaemon 9.6.4 IMAPD FETCH Buffer Overflow
6284| [16480] MailEnable IMAPD W3C Logging Buffer Overflow
6285| [16477] Mdaemon 8.0.3 IMAPD CRAM-MD5 Authentication Overflow
6286| [16475] MailEnable IMAPD (2.35) Login Request Buffer Overflow
6287| [16474] Qualcomm WorldMail 3.0 IMAPD LIST Buffer Overflow
6288| [5257] Dovecot IMAP 1.0.10 <= 1.1rc2 - Remote Email Disclosure Exploit
6289| [4429] Mercury/32 4.52 IMAPD SEARCH command Post-Auth Overflow Exploit
6290| [3627] IPSwitch IMail Server <= 8.20 IMAPD Remote Buffer Overflow Exploit
6291| [3527] Mercur IMAPD 5.00.14 Remote Denial of Service Exploit (win32)
6292| [2185] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (3)
6293| [2053] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (2)
6294| [1813] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit
6295| [1380] Eudora Qualcomm WorldMail 3.0 (IMAPd) Remote Overflow Exploit
6296| [1332] MailEnable 1.54 Pro Universal IMAPD W3C Logging BoF Exploit
6297| [1327] FTGate4 Groupware Mail Server 4.1 (imapd) Remote Buffer Overflow PoC
6298| [1151] MDaemon 8.0.3 IMAPD CRAM-MD5 Authentication Overflow Exploit
6299| [1124] IPSwitch IMail Server <= 8.15 IMAPD Remote Root Exploit
6300| [915] MailEnable Enterprise 1.x Imapd Remote Exploit
6301| [903] Cyrus imapd 2.2.4 - 2.2.8 (imapmagicplus) Remote Exploit
6302| [340] Linux imapd Remote Overflow File Retrieve Exploit
6303|
6304| OpenVAS (Nessus) - http://www.openvas.org:
6305| [901026] Dovecot Sieve Plugin Multiple Buffer Overflow Vulnerabilities
6306| [901025] Dovecot Version Detection
6307| [881425] CentOS Update for cyrus-imapd CESA-2011:1508 centos5 x86_64
6308| [881403] CentOS Update for cyrus-imapd CESA-2011:0859 centos5 x86_64
6309| [881402] CentOS Update for dovecot CESA-2011:1187 centos5 x86_64
6310| [881397] CentOS Update for cyrus-imapd CESA-2011:1317 centos4 x86_64
6311| [881370] CentOS Update for cyrus-imapd CESA-2011:1508 centos4 x86_64
6312| [881358] CentOS Update for dovecot CESA-2011:1187 centos4 x86_64
6313| [881318] CentOS Update for cyrus-imapd CESA-2011:0859 centos4 x86_64
6314| [881255] CentOS Update for cyrus-imapd CESA-2011:1317 centos5 x86_64
6315| [881050] CentOS Update for cyrus-imapd CESA-2011:1508 centos5 i386
6316| [881049] CentOS Update for cyrus-imapd CESA-2011:1508 centos4 i386
6317| [881007] CentOS Update for cyrus-imapd CESA-2011:1317 centos5 i386
6318| [880980] CentOS Update for dovecot CESA-2011:1187 centos5 i386
6319| [880978] CentOS Update for cyrus-imapd CESA-2011:1317 centos4 i386
6320| [880967] CentOS Update for dovecot CESA-2011:1187 centos4 i386
6321| [880958] CentOS Update for cyrus-imapd CESA-2011:0859 centos4 i386
6322| [880905] CentOS Update for cyrus-imapd CESA-2009:1459 centos4 i386
6323| [880864] CentOS Update for cyrus-imapd CESA-2009:1459 centos5 i386
6324| [880826] CentOS Update for cyrus-imapd CESA-2009:1116 centos5 i386
6325| [880536] CentOS Update for cyrus-imapd CESA-2011:0859 centos5 i386
6326| [870607] RedHat Update for dovecot RHSA-2011:0600-01
6327| [870520] RedHat Update for cyrus-imapd RHSA-2011:1508-01
6328| [870489] RedHat Update for cyrus-imapd RHSA-2011:1317-01
6329| [870471] RedHat Update for dovecot RHSA-2011:1187-01
6330| [870443] RedHat Update for cyrus-imapd RHSA-2011:0859-01
6331| [870153] RedHat Update for dovecot RHSA-2008:0297-02
6332| [864075] Fedora Update for cyrus-imapd FEDORA-2011-13832
6333| [863585] Fedora Update for cyrus-imapd FEDORA-2011-13869
6334| [863579] Fedora Update for cyrus-imapd FEDORA-2011-13860
6335| [863281] Fedora Update for cyrus-imapd FEDORA-2011-7193
6336| [863273] Fedora Update for cyrus-imapd FEDORA-2011-7217
6337| [863272] Fedora Update for dovecot FEDORA-2011-7612
6338| [863115] Fedora Update for dovecot FEDORA-2011-7258
6339| [861525] Fedora Update for dovecot FEDORA-2007-664
6340| [861394] Fedora Update for dovecot FEDORA-2007-493
6341| [861333] Fedora Update for dovecot FEDORA-2007-1485
6342| [860845] Fedora Update for dovecot FEDORA-2008-9202
6343| [860663] Fedora Update for dovecot FEDORA-2008-2475
6344| [860169] Fedora Update for dovecot FEDORA-2008-2464
6345| [860089] Fedora Update for dovecot FEDORA-2008-9232
6346| [840950] Ubuntu Update for dovecot USN-1295-1
6347| [840668] Ubuntu Update for dovecot USN-1143-1
6348| [840583] Ubuntu Update for dovecot vulnerabilities USN-1059-1
6349| [840335] Ubuntu Update for dovecot vulnerabilities USN-593-1
6350| [840290] Ubuntu Update for dovecot vulnerability USN-567-1
6351| [840234] Ubuntu Update for dovecot vulnerability USN-666-1
6352| [840072] Ubuntu Update for dovecot vulnerability USN-487-1
6353| [831590] Mandriva Update for cyrus-imapd MDVSA-2012:037 (cyrus-imapd)
6354| [831468] Mandriva Update for cyrus-imapd MDVSA-2011:149 (cyrus-imapd)
6355| [831410] Mandriva Update for cyrus-imapd MDVSA-2011:100 (cyrus-imapd)
6356| [831405] Mandriva Update for dovecot MDVSA-2011:101 (dovecot)
6357| [831230] Mandriva Update for dovecot MDVSA-2010:217 (dovecot)
6358| [831207] Mandriva Update for cyrus-imapd MDVA-2010:208 (cyrus-imapd)
6359| [831197] Mandriva Update for dovecot MDVSA-2010:196 (dovecot)
6360| [831054] Mandriva Update for dovecot MDVSA-2010:104 (dovecot)
6361| [830496] Mandriva Update for dovecot MDVSA-2008:232 (dovecot)
6362| [801055] Dovecot 'base_dir' Insecure Permissions Security Bypass Vulnerability
6363| [800149] UW-imapd tmail and dmail BOF Vulnerabilities (Linux)
6364| [800030] Dovecot ACL Plugin Security Bypass Vulnerabilities
6365| [70767] Gentoo Security Advisory GLSA 201110-04 (Dovecot)
6366| [70696] Debian Security Advisory DSA 2377-1 (cyrus-imapd-2.2)
6367| [70407] Debian Security Advisory DSA 2318-1 (cyrus-imapd-2.2)
6368| [70259] FreeBSD Ports: dovecot
6369| [69965] Debian Security Advisory DSA 2258-1 (kolab-cyrus-imapd)
6370| [69959] Debian Security Advisory DSA 2252-1 (dovecot)
6371| [69740] Debian Security Advisory DSA 2242-1 (cyrus-imapd-2.2)
6372| [66522] FreeBSD Ports: dovecot
6373| [66416] Mandriva Security Advisory MDVSA-2009:229-1 (cyrus-imapd)
6374| [66233] SLES10: Security update for Cyrus IMAPD
6375| [66226] SLES11: Security update for Cyrus IMAPD
6376| [66222] SLES9: Security update for Cyrus IMAPD
6377| [65938] SLES10: Security update for Cyrus IMAPD
6378| [65723] SLES11: Security update for Cyrus IMAPD
6379| [65523] SLES9: Security update for Cyrus IMAPD
6380| [65479] SLES9: Security update for cyrus-imapd
6381| [65094] SLES9: Security update for cyrus-imapd
6382| [65010] Ubuntu USN-838-1 (dovecot)
6383| [64989] CentOS Security Advisory CESA-2009:1459 (cyrus-imapd)
6384| [64978] Debian Security Advisory DSA 1892-1 (dovecot)
6385| [64977] Debian Security Advisory DSA 1893-1 (cyrus-imapd-2.2 kolab-cyrus-imapd)
6386| [64965] Fedora Core 11 FEDORA-2009-9901 (cyrus-imapd)
6387| [64963] Fedora Core 10 FEDORA-2009-9869 (cyrus-imapd)
6388| [64953] Mandrake Security Advisory MDVSA-2009:242-1 (dovecot)
6389| [64952] Mandrake Security Advisory MDVSA-2009:242 (dovecot)
6390| [64898] FreeBSD Ports: cyrus-imapd
6391| [64864] Debian Security Advisory DSA 1881-1 (cyrus-imapd-2.2)
6392| [64861] Fedora Core 10 FEDORA-2009-9559 (dovecot)
6393| [64847] Fedora Core 10 FEDORA-2009-9428 (cyrus-imapd)
6394| [64846] Fedora Core 11 FEDORA-2009-9417 (cyrus-imapd)
6395| [64838] Mandrake Security Advisory MDVSA-2009:229 (cyrus-imapd)
6396| [64271] CentOS Security Advisory CESA-2009:1116 (cyrus-imapd)
6397| [62965] Gentoo Security Advisory GLSA 200812-16 (dovecot)
6398| [62854] FreeBSD Ports: dovecot-managesieve
6399| [61916] FreeBSD Ports: dovecot
6400| [60588] Gentoo Security Advisory GLSA 200803-25 (dovecot)
6401| [60568] Debian Security Advisory DSA 1516-1 (dovecot)
6402| [60528] FreeBSD Ports: dovecot
6403| [60134] Debian Security Advisory DSA 1457-1 (dovecot)
6404| [60089] FreeBSD Ports: dovecot
6405| [58578] Debian Security Advisory DSA 1359-1 (dovecot)
6406| [56834] Debian Security Advisory DSA 1080-1 (dovecot)
6407| [55807] Slackware Advisory SSA:2005-310-06 imapd
6408| [54861] Gentoo Security Advisory GLSA 200502-29 (cyrus-imapd)
6409| [54755] Gentoo Security Advisory GLSA 200411-34 (cyrus-imapd)
6410| [53739] Debian Security Advisory DSA 215-1 (cyrus-imapd)
6411| [53288] Debian Security Advisory DSA 597-1 (cyrus-imapd)
6412| [52297] FreeBSD Ports: cyrus-imapd
6413| [52296] FreeBSD Ports: cyrus-imapd
6414| [52295] FreeBSD Ports: cyrus-imapd
6415| [52294] FreeBSD Ports: cyrus-imapd
6416| [52172] FreeBSD Ports: cyrus-imapd
6417|
6418| SecurityTracker - https://www.securitytracker.com:
6419| [1028585] Dovecot APPEND Parameter Processing Flaw Lets Remote Authenticated Users Deny Service
6420| [1024740] Mac OS X Server Dovecot Memory Aliasing Bug May Cause Mail to Be Delivered to the Wrong User
6421| [1017288] Dovecot POP3/IMAP Cache File Buffer Overflow May Let Remote Users Execute Arbitrary Code
6422| [1013278] Cyrus IMAPd Buffer Overflows in Annotate Extension, Cached Header, and Fetchnews May Let Remote Users Execute Arbitrary Code
6423|
6424| OSVDB - http://www.osvdb.org:
6425| [96172] Dovecot POP3 Service Terminated LIST Command Remote DoS
6426| [93525] Dovecot IMAP APPEND Command Malformed Parameter Parsing Remote DoS
6427| [93004] Dovecot with Exim sender_address Parameter Remote Command Execution
6428| [88058] Dovecot lib-storage/mail-search.c Multiple Keyword Search Handling Remote DoS
6429| [78304] Eudora WorldMail imapd SEH LIST Command Parsing Remote Overflow
6430| [77185] Dovecot SSL Certificate Common Name Field MitM Spoofing Weakness
6431| [75445] Cyrus IMAP Server imapd index.c index_get_ids Function References Header NULL Dereference Remote DoS
6432| [74515] Dovecot script-login chroot Configuration Setting Traversal Arbitrary File Access
6433| [74514] Dovecot script-login User / Group Configuration Settings Remote Access Restriction Bypass
6434| [72495] Dovecot lib-mail/message-header-parser.c Mail Header Name NULL Character Handling Remote DoS
6435| [69260] Apple Mac OS X Server Dovecot Memory Aliasing Mail Delivery Issue
6436| [68516] Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition User Private Namespace Mailbox Access Restriction Remote Bypass
6437| [68515] Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition Specific Entry Order Mailbox Access Restriction Remote Bypass
6438| [68513] Dovecot Non-public Namespace Mailbox ACL Manipulation Access Restriction Remote Bypass
6439| [68512] Dovecot IMAP / POP3 Session Disconnect Master Process Outage Remote DoS
6440| [66625] Dovecot ACL Plugin INBOX ACL Copying Weakness Restriction Bypass
6441| [66113] Dovecot Mail Root Directory Creation Permission Weakness
6442| [66112] Dovecot Installation base_dir Parent Directory Permission Weakness
6443| [66111] Dovecot SEARCH Functionality str_find_init() Function Overflow
6444| [66110] Dovecot Multiple Unspecified Buffer Overflows
6445| [66108] Dovecot Malformed Message Body Processing Unspecified Functions Remote DoS
6446| [64783] Dovecot E-mail Message Header Unspecified DoS
6447| [63372] Apple Mac OS X Dovecot Kerberos Authentication SACL Restriction Bypass
6448| [62796] Dovecot mbox Format Email Header Handling DoS
6449| [60316] Dovecot base_dir Directory Permission Weakness Local Privilege Escalation
6450| [58103] Dovecot CMU Sieve Plugin Script Handling Multiple Overflows
6451| [57843] Cyrus IMAP Server (cyrus-imapd) SIEVE Script Component (sieve/script.c) Crafted Script Handling Overflow
6452| [57681] UoW imap Server (uw-imapd) Arbitrary Remote File Access
6453| [52906] UW-imapd c-client Initial Request Remote Format String
6454| [52905] UW-imapd c-client Library RFC822BUFFER Routines rfc822_output_char Function Off-by-one
6455| [52456] UW-imapd on Debian Linux LOGIN Command Remote DoS
6456| [50253] Dovecot dovecot.conf Permission Weakness Local ssl_key_password Parameter Disclosure
6457| [49918] Dovecot ManageSieve Script Name Handling Traversal Arbitrary File Manipulation
6458| [49485] UW-imapd dmail Utility Mailbox Name Handling Overflow
6459| [49484] UW-imapd tmail Utility Mailbox Name Handling Overflow
6460| [49429] Dovecot Message Parsing Feature Crafted Email Header Handling Remote DoS
6461| [49099] Dovecot ACL Plugin k Right Mailbox Creation Restriction Bypass
6462| [49098] Dovecot ACL Plugin Negative Access Rights Bypass
6463| [43137] Dovecot mail_extra_groups Symlink File Manipulation
6464| [42979] Dovecot passdbs Argument Injection Authentication Bypass
6465| [42004] Perdition Mail Retrieval Proxy IMAPD IMAP Tag Remote Format String Arbitrary Code Execution
6466| [39876] Dovecot LDAP Auth Cache Security Bypass
6467| [39670] Mercury Mail Transport System IMAPD SEARCH Command Remote Overflow
6468| [39386] Dovecot ACL Plugin Insert Right APPEND / COPY Command Unauthorized Flag Manipulation
6469| [35489] Dovecot index/mbox/mbox-storage.c Traversal Arbitrary Gzip File Access
6470| [31362] Novell NetMail IMAP Daemon (IMAPD) APPEND Command Remote Overflow
6471| [31361] Novell NetMail IMAP Daemon (IMAPD) APPEND Command DoS
6472| [31360] Novell NetMail IMAP Daemon (IMAPD) SUBSCRIBE Command Remote Overflow
6473| [30524] Dovecot IMAP/POP3 Server dovecot.index.cache Handling Overflow
6474| [25853] Cyrus IMAPD pop3d USER Command Remote Overflow
6475| [25727] Dovecot Multiple Command Traversal Arbitrary Directory Listing
6476| [23281] Dovecot imap/pop3-login dovecot-auth DoS
6477| [23280] Dovecot Malformed APPEND Command DoS
6478| [18179] HP Tru64 UNIX imapd NLSPATH Environment Variable Local Overflow
6479| [13242] UW-imapd CRAM-MD5 Authentication Bypass
6480| [12385] Novell NetMail IMAPD 101_mEna Script Remote Overflow
6481| [12042] UoW imapd Multiple Unspecified Overflows
6482| [12037] UoW imapd (UW-IMAP) Multiple Command Remote Overflows
6483| [12033] Slackware Linux imapd/ipop3d Malformed USER/PASS Sequence DoS
6484| [911] UoW imapd AUTHENTICATE Command Remote Overflow
6485| [790] UoW imap Server (uw-imapd) BODY Request Remote Overflow
6486| [519] UoW imapd SIGABRT Signal Forced Crash Information Disclosure
6487|_
6488443/tcp open ssl/http nginx
6489| vulscan: VulDB - https://vuldb.com:
6490| [133852] Sangfor Sundray WLAN Controller up to 3.7.4.2 Cookie Header nginx_webconsole.php Code Execution
6491| [132132] SoftNAS Cloud 4.2.0/4.2.1 Nginx privilege escalation
6492| [131858] Puppet Discovery up to 1.3.x Nginx Container weak authentication
6493| [130644] Nginx Unit up to 1.7.0 Router Process Request Heap-based memory corruption
6494| [127759] VeryNginx 0.3.3 Web Application Firewall privilege escalation
6495| [126525] nginx up to 1.14.0/1.15.5 ngx_http_mp4_module Loop denial of service
6496| [126524] nginx up to 1.14.0/1.15.5 HTTP2 CPU Exhaustion denial of service
6497| [126523] nginx up to 1.14.0/1.15.5 HTTP2 Memory Consumption denial of service
6498| [119845] Pivotal Operations Manager up to 2.0.13/2.1.5 Nginx privilege escalation
6499| [114368] SuSE Portus 2.3 Nginx Certificate weak authentication
6500| [103517] nginx up to 1.13.2 Range Filter Request Integer Overflow memory corruption
6501| [89849] nginx RFC 3875 Namespace Conflict Environment Variable Open Redirect
6502| [87719] nginx up to 1.11.0 ngx_files.c ngx_chain_to_iovec denial of service
6503| [80760] nginx 0.6.18/1.9.9 DNS CNAME Record Crash denial of service
6504| [80759] nginx 0.6.18/1.9.9 DNS CNAME Record Use-After-Free denial of service
6505| [80758] nginx 0.6.18/1.9.9 DNS UDP Packet Crash denial of service
6506| [67677] nginx up to 1.7.3 SSL weak authentication
6507| [67296] nginx up to 1.7.3 SMTP Proxy ngx_mail_smtp_starttls privilege escalation
6508| [12822] nginx up to 1.5.11 SPDY SPDY Request Heap-based memory corruption
6509| [12824] nginx 1.5.10 on 32-bit SPDY memory corruption
6510| [11237] nginx up to 1.5.6 URI String Bypass privilege escalation
6511| [65364] nginx up to 1.1.13 Default Configuration information disclosure
6512| [8671] nginx up to 1.4 proxy_pass denial of service
6513| [8618] nginx 1.3.9/1.4.0 http/ngx_http_parse.c ngx_http_parse_chunked() memory corruption
6514| [7247] nginx 1.2.6 Proxy Function spoofing
6515| [61434] nginx 1.2.0/1.3.0 on Windows Access Restriction privilege escalation
6516| [5293] nginx up to 1.1.18 ngx_http_mp4_module MP4 File memory corruption
6517| [4843] nginx up to 1.0.13/1.1.16 HTTP Header Response Parser ngx_http_parse.c information disclosure
6518| [59645] nginx up to 0.8.9 Heap-based memory corruption
6519| [53592] nginx 0.8.36 memory corruption
6520| [53590] nginx up to 0.8.9 unknown vulnerability
6521| [51533] nginx 0.7.64 Terminal privilege escalation
6522| [50905] nginx up to 0.8.9 directory traversal
6523| [50903] nginx up to 0.8.10 NULL Pointer Dereference denial of service
6524| [50043] nginx up to 0.8.10 memory corruption
6525|
6526| MITRE CVE - https://cve.mitre.org:
6527| [CVE-2013-2070] http/modules/ngx_http_proxy_module.c in nginx 1.1.4 through 1.2.8 and 1.3.0 through 1.4.0, when proxy_pass is used with untrusted HTTP servers, allows remote attackers to cause a denial of service (crash) and obtain sensitive information from worker process memory via a crafted proxy response, a similar vulnerability to CVE-2013-2028.
6528| [CVE-2013-2028] The ngx_http_parse_chunked function in http/ngx_http_parse.c in nginx 1.3.9 through 1.4.0 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a chunked Transfer-Encoding request with a large chunk size, which triggers an integer signedness error and a stack-based buffer overflow.
6529| [CVE-2012-3380] Directory traversal vulnerability in naxsi-ui/nx_extract.py in the Naxsi module before 0.46-1 for Nginx allows local users to read arbitrary files via unspecified vectors.
6530| [CVE-2012-2089] Buffer overflow in ngx_http_mp4_module.c in the ngx_http_mp4_module module in nginx 1.0.7 through 1.0.14 and 1.1.3 through 1.1.18, when the mp4 directive is used, allows remote attackers to cause a denial of service (memory overwrite) or possibly execute arbitrary code via a crafted MP4 file.
6531| [CVE-2012-1180] Use-after-free vulnerability in nginx before 1.0.14 and 1.1.x before 1.1.17 allows remote HTTP servers to obtain sensitive information from process memory via a crafted backend response, in conjunction with a client request.
6532| [CVE-2011-4963] nginx/Windows 1.3.x before 1.3.1 and 1.2.x before 1.2.1 allows remote attackers to bypass intended access restrictions and access restricted files via (1) a trailing . (dot) or (2) certain "$index_allocation" sequences in a request.
6533| [CVE-2011-4315] Heap-based buffer overflow in compression-pointer processing in core/ngx_resolver.c in nginx before 1.0.10 allows remote resolvers to cause a denial of service (daemon crash) or possibly have unspecified other impact via a long response.
6534| [CVE-2010-2266] nginx 0.8.36 allows remote attackers to cause a denial of service (crash) via certain encoded directory traversal sequences that trigger memory corruption, as demonstrated using the "%c0.%c0." sequence.
6535| [CVE-2010-2263] nginx 0.8 before 0.8.40 and 0.7 before 0.7.66, when running on Windows, allows remote attackers to obtain source code or unparsed content of arbitrary files under the web document root by appending ::$DATA to the URI.
6536| [CVE-2009-4487] nginx 0.7.64 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.
6537| [CVE-2009-3898] Directory traversal vulnerability in src/http/modules/ngx_http_dav_module.c in nginx (aka Engine X) before 0.7.63, and 0.8.x before 0.8.17, allows remote authenticated users to create or overwrite arbitrary files via a .. (dot dot) in the Destination HTTP header for the WebDAV (1) COPY or (2) MOVE method.
6538| [CVE-2009-3896] src/http/ngx_http_parse.c in nginx (aka Engine X) 0.1.0 through 0.4.14, 0.5.x before 0.5.38, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.14 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a long URI.
6539| [CVE-2009-2629] Buffer underflow in src/http/ngx_http_parse.c in nginx 0.1.0 through 0.5.37, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.15 allows remote attackers to execute arbitrary code via crafted HTTP requests.
6540|
6541| SecurityFocus - https://www.securityfocus.com/bid/:
6542| [99534] Nginx CVE-2017-7529 Remote Integer Overflow Vulnerability
6543| [93903] Nginx CVE-2016-1247 Remote Privilege Escalation Vulnerability
6544| [91819] Nginx CVE-2016-1000105 Security Bypass Vulnerability
6545| [90967] nginx CVE-2016-4450 Denial of Service Vulnerability
6546| [82230] nginx Multiple Denial of Service Vulnerabilities
6547| [78928] Nginx CVE-2010-2266 Denial-Of-Service Vulnerability
6548| [70025] nginx CVE-2014-3616 SSL Session Fixation Vulnerability
6549| [69111] nginx SMTP Proxy Remote Command Injection Vulnerability
6550| [67507] nginx SPDY Implementation CVE-2014-0088 Arbitrary Code Execution Vulnerability
6551| [66537] nginx SPDY Implementation Heap Based Buffer Overflow Vulnerability
6552| [63814] nginx CVE-2013-4547 URI Processing Security Bypass Vulnerability
6553| [59824] Nginx CVE-2013-2070 Remote Security Vulnerability
6554| [59699] nginx 'ngx_http_parse.c' Stack Buffer Overflow Vulnerability
6555| [59496] nginx 'ngx_http_close_connection()' Remote Integer Overflow Vulnerability
6556| [59323] nginx NULL-Byte Arbitrary Code Execution Vulnerability
6557| [58105] Nginx 'access.log' Insecure File Permissions Vulnerability
6558| [57139] nginx CVE-2011-4968 Man in The Middle Vulnerability
6559| [55920] nginx CVE-2011-4963 Security Bypass Vulnerability
6560| [54331] Nginx Naxsi Module 'nx_extract.py' Script Remote File Disclosure Vulnerability
6561| [52999] nginx 'ngx_http_mp4_module.c' Buffer Overflow Vulnerability
6562| [52578] nginx 'ngx_cpystrn()' Information Disclosure Vulnerability
6563| [50710] nginx DNS Resolver Remote Heap Buffer Overflow Vulnerability
6564| [40760] nginx Remote Source Code Disclosure and Denial of Service Vulnerabilities
6565| [40434] nginx Space String Remote Source Code Disclosure Vulnerability
6566| [40420] nginx Directory Traversal Vulnerability
6567| [37711] nginx Terminal Escape Sequence in Logs Command Injection Vulnerability
6568| [36839] nginx 'ngx_http_process_request_headers()' Remote Buffer Overflow Vulnerability
6569| [36490] nginx WebDAV Multiple Directory Traversal Vulnerabilities
6570| [36438] nginx Proxy DNS Cache Domain Spoofing Vulnerability
6571| [36384] nginx HTTP Request Remote Buffer Overflow Vulnerability
6572|
6573| IBM X-Force - https://exchange.xforce.ibmcloud.com:
6574| [84623] Phusion Passenger gem for Ruby with nginx configuration insecure permissions
6575| [84172] nginx denial of service
6576| [84048] nginx buffer overflow
6577| [83923] nginx ngx_http_close_connection() integer overflow
6578| [83688] nginx null byte code execution
6579| [83103] Naxsi module for Nginx naxsi_unescape_uri() function security bypass
6580| [82319] nginx access.log information disclosure
6581| [80952] nginx SSL spoofing
6582| [77244] nginx and Microsoft Windows request security bypass
6583| [76778] Naxsi module for Nginx nx_extract.py directory traversal
6584| [74831] nginx ngx_http_mp4_module.c buffer overflow
6585| [74191] nginx ngx_cpystrn() information disclosure
6586| [74045] nginx header response information disclosure
6587| [71355] nginx ngx_resolver_copy() buffer overflow
6588| [59370] nginx characters denial of service
6589| [59369] nginx DATA source code disclosure
6590| [59047] nginx space source code disclosure
6591| [58966] nginx unspecified directory traversal
6592| [54025] nginx ngx_http_parse.c denial of service
6593| [53431] nginx WebDAV component directory traversal
6594| [53328] Nginx CRC-32 cached domain name spoofing
6595| [53250] Nginx ngx_http_parse_complex_uri() function code execution
6596|
6597| Exploit-DB - https://www.exploit-db.com:
6598| [26737] nginx 1.3.9/1.4.0 x86 Brute Force Remote Exploit
6599| [25775] Nginx HTTP Server 1.3.9-1.4.0 Chuncked Encoding Stack Buffer Overflow
6600| [25499] nginx 1.3.9-1.4.0 DoS PoC
6601| [24967] nginx 0.6.x Arbitrary Code Execution NullByte Injection
6602| [14830] nginx 0.6.38 - Heap Corruption Exploit
6603| [13822] Nginx <= 0.7.65 / 0.8.39 (dev) Source Disclosure / Download Vulnerability
6604| [13818] Nginx 0.8.36 Source Disclosure and DoS Vulnerabilities
6605| [12804] nginx [engine x] http server <= 0.6.36 Path Draversal
6606| [9901] nginx 0.7.0-0.7.61, 0.6.0-0.6.38, 0.5.0-0.5.37, 0.4.0-0.4.14 PoC
6607| [9829] nginx 0.7.61 WebDAV directory traversal
6608|
6609| OpenVAS (Nessus) - http://www.openvas.org:
6610| [864418] Fedora Update for nginx FEDORA-2012-3846
6611| [864310] Fedora Update for nginx FEDORA-2012-6238
6612| [864209] Fedora Update for nginx FEDORA-2012-6411
6613| [864204] Fedora Update for nginx FEDORA-2012-6371
6614| [864121] Fedora Update for nginx FEDORA-2012-4006
6615| [864115] Fedora Update for nginx FEDORA-2012-3991
6616| [864065] Fedora Update for nginx FEDORA-2011-16075
6617| [863654] Fedora Update for nginx FEDORA-2011-16110
6618| [861232] Fedora Update for nginx FEDORA-2007-1158
6619| [850180] SuSE Update for nginx openSUSE-SU-2012:0237-1 (nginx)
6620| [831680] Mandriva Update for nginx MDVSA-2012:043 (nginx)
6621| [802045] 64-bit Debian Linux Rootkit with nginx Doing iFrame Injection
6622| [801636] nginx HTTP Request Remote Buffer Overflow Vulnerability
6623| [103470] nginx 'ngx_http_mp4_module.c' Buffer Overflow Vulnerability
6624| [103469] nginx 'ngx_cpystrn()' Information Disclosure Vulnerability
6625| [103344] nginx DNS Resolver Remote Heap Buffer Overflow Vulnerability
6626| [100676] nginx Remote Source Code Disclosure and Denial of Service Vulnerabilities
6627| [100659] nginx Directory Traversal Vulnerability
6628| [100658] nginx Space String Remote Source Code Disclosure Vulnerability
6629| [100441] nginx Terminal Escape Sequence in Logs Command Injection Vulnerability
6630| [100321] nginx 'ngx_http_process_request_headers()' Remote Buffer Overflow Vulnerability
6631| [100277] nginx Proxy DNS Cache Domain Spoofing Vulnerability
6632| [100276] nginx HTTP Request Remote Buffer Overflow Vulnerability
6633| [100275] nginx WebDAV Multiple Directory Traversal Vulnerabilities
6634| [71574] Gentoo Security Advisory GLSA 201206-07 (nginx)
6635| [71308] Gentoo Security Advisory GLSA 201203-22 (nginx)
6636| [71297] FreeBSD Ports: nginx
6637| [71276] FreeBSD Ports: nginx
6638| [71239] Debian Security Advisory DSA 2434-1 (nginx)
6639| [66451] Fedora Core 11 FEDORA-2009-12782 (nginx)
6640| [66450] Fedora Core 10 FEDORA-2009-12775 (nginx)
6641| [66449] Fedora Core 12 FEDORA-2009-12750 (nginx)
6642| [64924] Gentoo Security Advisory GLSA 200909-18 (nginx)
6643| [64912] Fedora Core 10 FEDORA-2009-9652 (nginx)
6644| [64911] Fedora Core 11 FEDORA-2009-9630 (nginx)
6645| [64894] FreeBSD Ports: nginx
6646| [64869] Debian Security Advisory DSA 1884-1 (nginx)
6647|
6648| SecurityTracker - https://www.securitytracker.com:
6649| [1028544] nginx Bug Lets Remote Users Deny Service or Obtain Potentially Sensitive Information
6650| [1028519] nginx Stack Overflow Lets Remote Users Execute Arbitrary Code
6651| [1026924] nginx Buffer Overflow in ngx_http_mp4_module Lets Remote Users Execute Arbitrary Code
6652| [1026827] nginx HTTP Response Processing Lets Remote Users Obtain Portions of Memory Contents
6653|
6654| OSVDB - http://www.osvdb.org:
6655| [94864] cPnginx Plugin for cPanel nginx Configuration Manipulation Arbitrary File Access
6656| [93282] nginx proxy_pass Crafted Upstream Proxied Server Response Handling Worker Process Memory Disclosure
6657| [93037] nginx /http/ngx_http_parse.c Worker Process Crafted Request Handling Remote Overflow
6658| [92796] nginx ngx_http_close_connection Function Crafted r->
6659| [92634] nginx ngx_http_request.h zero_in_uri URL Null Byte Handling Remote Code Execution
6660| [90518] nginx Log Directory Permission Weakness Local Information Disclosure
6661| [88910] nginx Proxy Functionality SSL Certificate Validation MitM Spoofing Weakness
6662| [84339] nginx/Windows Multiple Request Sequence Parsing Arbitrary File Access
6663| [83617] Naxsi Module for Nginx naxsi-ui/ nx_extract.py Traversal Arbitrary File Access
6664| [81339] nginx ngx_http_mp4_module Module Atom MP4 File Handling Remote Overflow
6665| [80124] nginx HTTP Header Response Parsing Freed Memory Information Disclosure
6666| [77184] nginx ngx_resolver.c ngx_resolver_copy() Function DNS Response Parsing Remote Overflow
6667| [65531] nginx on Windows URI ::$DATA Append Arbitrary File Access
6668| [65530] nginx Encoded Traversal Sequence Memory Corruption Remote DoS
6669| [65294] nginx on Windows Encoded Space Request Remote Source Disclosure
6670| [63136] nginx on Windows 8.3 Filename Alias Request Access Rules / Authentication Bypass
6671| [62617] nginx Internal DNS Cache Poisoning Weakness
6672| [61779] nginx HTTP Request Escape Sequence Terminal Command Injection
6673| [59278] nginx src/http/ngx_http_parse.c ngx_http_process_request_headers() Function URL Handling NULL Dereference DoS
6674| [58328] nginx WebDAV Multiple Method Traversal Arbitrary File Write
6675| [58128] nginx ngx_http_parse_complex_uri() Function Underflow
6676| [44447] nginx (engine x) msie_refresh Directive Unspecified XSS
6677| [44446] nginx (engine x) ssl_verify_client Directive HTTP/0.9 Protocol Bypass
6678| [44445] nginx (engine x) ngx_http_realip_module satisfy_any Directive Unspecified Access Bypass
6679| [44444] nginx (engine x) X-Accel-Redirect Header Unspecified Traversal
6680| [44443] nginx (engine x) rtsig Method Signal Queue Overflow
6681| [44442] nginx (engine x) Worker Process Millisecond Timers Unspecified Overflow
6682|_
6683587/tcp open smtp Postfix smtpd
6684| vulscan: VulDB - https://vuldb.com:
6685| [108975] Apple macOS up to 10.13.1 Postfix unknown vulnerability
6686| [98314] PostfixAdmin up to 3.0.1 AliasHandler delete.php gen_show_status denial of service
6687| [71720] Postfix up to 2.3.0 backup.php pacrypt sql injection
6688| [12746] Postfix Admin 2.3.6 functions.inc.php sql injection
6689| [57422] Postfix memory corruption
6690| [56843] Postfix up to 2.7.2 Cleartext weak encryption
6691|
6692| MITRE CVE - https://cve.mitre.org:
6693| [CVE-2013-2852] Format string vulnerability in the b43_request_firmware function in drivers/net/wireless/b43/main.c in the Broadcom B43 wireless driver in the Linux kernel through 3.9.4 allows local users to gain privileges by leveraging root access and including format string specifiers in an fwpostfix modprobe parameter, leading to improper construction of an error message.
6694| [CVE-2011-1720] The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method.
6695| [CVE-2011-0411] The STARTTLS implementation in Postfix 2.4.x before 2.4.16, 2.5.x before 2.5.12, 2.6.x before 2.6.9, and 2.7.x before 2.7.3 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack.
6696| [CVE-2010-0230] SUSE Linux Enterprise 10 SP3 (SLE10-SP3) and openSUSE 11.2 configures postfix to listen on all network interfaces, which might allow remote attackers to bypass intended access restrictions.
6697| [CVE-2009-2939] The postfix.postinst script in the Debian GNU/Linux and Ubuntu postfix 2.5.5 package grants the postfix user write access to /var/spool/postfix/pid, which might allow local users to conduct symlink attacks that overwrite arbitrary files.
6698| [CVE-2008-4977] ** DISPUTED ** postfix_groups.pl in Postfix 2.5.2 allows local users to overwrite arbitrary files via a symlink attack on the (1) /tmp/postfix_groups.stdout, (2) /tmp/postfix_groups.stderr, and (3) /tmp/postfix_groups.message temporary files. NOTE: the vendor disputes this vulnerability, stating "This is not a real issue ... users would have to edit a script under /usr/lib to enable it."
6699| [CVE-2008-3889] Postfix 2.4 before 2.4.9, 2.5 before 2.5.5, and 2.6 before 2.6-20080902, when used with the Linux 2.6 kernel, leaks epoll file descriptors during execution of "non-Postfix" commands, which allows local users to cause a denial of service (application slowdown or exit) via a crafted command, as demonstrated by a command in a .forward file.
6700| [CVE-2008-3646] The Postfix configuration file in Mac OS X 10.5.5 causes Postfix to be network-accessible when mail is sent from a local command-line tool, which allows remote attackers to send mail to local Mac OS X users.
6701| [CVE-2008-2937] Postfix 2.5 before 2.5.4 and 2.6 before 2.6-20080814 delivers to a mailbox file even when this file is not owned by the recipient, which allows local users to read e-mail messages by creating a mailbox file corresponding to another user's account name.
6702| [CVE-2008-2936] Postfix before 2.3.15, 2.4 before 2.4.8, 2.5 before 2.5.4, and 2.6 before 2.6-20080814, when the operating system supports hard links to symlinks, allows local users to append e-mail messages to a file to which a root-owned symlink points, by creating a hard link to this symlink and then sending a message. NOTE: this can be leveraged to gain privileges if there is a symlink to an init script.
6703| [CVE-2007-3791] Buffer overflow in the w_read function in sockets.c in Cami Sardinha and Nigel Kukard policyd before 1.81 for Postfix allows remote attackers to cause a denial of service and possibly execute arbitrary code via long SMTP commands. NOTE: some of these details are obtained from third party information.
6704| [CVE-2006-0213] Kolab Server 2.0.1, 2.0.2 and development versions pre-2.1-20051215 and earlier, when authenticating users via secure SMTP, stores authentication credentials in plaintext in the postfix.log file, which allows local users to gain privileges.
6705| [CVE-2005-1127] Format string vulnerability in the log function in Net::Server 0.87 and earlier, as used in Postfix Greylisting Policy Server (Postgrey) 1.18 and earlier, and possibly other products, allows remote attackers to cause a denial of service (crash) via format string specifiers that are not properly handled before being sent to syslog, as demonstrated using sender addresses to Postgrey.
6706| [CVE-2005-0337] Postfix 2.1.3, when /proc/net/if_inet6 is not available and permit_mx_backup is enabled in smtpd_recipient_restrictions, allows remote attackers to bypass e-mail restrictions and perform mail relaying by sending mail to an IPv6 hostname.
6707| [CVE-2004-1113] SQL injection vulnerability in SQLgrey Postfix greylisting service before 1.2.0 allows remote attackers to execute arbitrary SQL commands via the (1) sender or (2) recipient e-mail addresses.
6708| [CVE-2004-1088] Postfix server for Apple Mac OS X 10.3.6, when using CRAM-MD5, allows remote attackers to send mail without authentication by replaying authentication information.
6709| [CVE-2004-0925] Postfix on Mac OS X 10.3.x through 10.3.5, with SMTPD AUTH enabled, does not properly clear the username between authentication attempts, which allows users with the longest username to prevent other valid users from being able to authenticate.
6710| [CVE-2003-0540] The address parser code in Postfix 1.1.12 and earlier allows remote attackers to cause a denial of service (lock) via (1) a malformed envelope address to a local host that would generate a bounce and contains the ".!" string in the MAIL FROM or Errors-To headers, which causes nqmgr to lock up, or (2) via a valid MAIL FROM with a RCPT TO containing a ".!" string, which causes an instance of the SMTP listener to lock up.
6711| [CVE-2003-0468] Postfix 1.1.11 and earlier allows remote attackers to use Postfix to conduct "bounce scans" or DDos attacks of other hosts via an email address to the local host containing the target IP address and service name followed by a "!" string, which causes Postfix to attempt to use SMTP to communicate with the target on the associated port.
6712| [CVE-2001-0894] Vulnerability in Postfix SMTP server before 20010228-pl07, when configured to email the postmaster when SMTP errors cause the session to terminate, allows remote attackers to cause a denial of service (memory exhaustion) by generating a large number of SMTP errors, which forces the SMTP session log to grow too large.
6713|
6714| SecurityFocus - https://www.securityfocus.com/bid/:
6715| [96142] PostfixAdmin CVE-2017-5930 Session Management Security Bypass Vulnerability
6716| [90814] Postfix Admin Multiple Cross Site Request Forgery Vulnerabilities
6717| [67250] Postfix Arbitrary Content Security Bypass Vulnerability
6718| [66455] Postfix Admin 'functions.inc.php' SQL Injection Vulnerability
6719| [65184] Fail2ban Postfix Filter Remote Denial of Service Vulnerability
6720| [51680] Postfix Admin Multiple SQL Injection and Cross Site Scripting Vulnerabilities
6721| [47778] Postfix SMTP Server Cyrus SASL Support Memory Corruption Vulnerability
6722| [36469] Debian and Ubuntu Postfix Insecure Temporary File Creation Vulnerability
6723| [31721] Apple Mac OS X 10.5 Postfix Security Bypass Vulnerability
6724| [30977] Postfix 'epoll' Linux Event Handler Local Denial of Service Vulnerability
6725| [30691] Postfix Local Information Disclosure and Local Privilege Escalation Vulnerabilities
6726| [13133] Salim Gasmi GLD Postfix Greylisting Daemon Format String Vulnerability
6727| [13129] Salim Gasmi GLD Postfix Greylisting Daemon Buffer Overflow Vulnerability
6728| [12445] Postfix IPv6 Unauthorized Mail Relay Vulnerability
6729| [11898] SQLgrey Postfix Greylisting Service Unspecified SQL Injection Vulnerability
6730| [11633] SQLgrey Postfix Greylisting Service SQL Injection Vulnerability
6731| [11323] Apple Mac OS X Postfix Release SMTPD AUTH Username Denial Of Service Vulnerability
6732| [8362] Postfix SMTP Malformed E-mail Envelope Address Denial of Service Vulnerability
6733| [8361] Postfix Connection Proxying Vulnerability
6734| [8333] Multiple Postfix Denial of Service Vulnerabilities
6735| [3638] SuSEConfig.postfix chroot Local DoS Attack Vulnerability
6736| [3637] SuSEConfig.postfix chroot File Ownership Vulnerability
6737| [3544] Postfix SMTP Log Denial Of Service Vulnerability
6738| [1428] cyrus With postfix and Procmail Remote Shell Expansion Vulnerabilities
6739|
6740| IBM X-Force - https://exchange.xforce.ibmcloud.com:
6741| [72752] Postfix Admin multiple parameters SQL injection
6742| [72751] PostfixAdmin multiple parameters cross-site scripting
6743| [67359] Postfix Cyrus SASL library in the SMTP server code execution
6744| [55970] SUSE Linux Enterprise postfix security bypass
6745| [53425] Postfix in Debian and Ubuntu pid symlink
6746| [45876] Apple Mac OS X Postfix configuration file weak security
6747| [44865] Postfix file descriptor denial of service
6748| [44461] Postfix email information disclosure
6749| [44460] Postfix symlink code execution
6750| [22655] RHSA-2005:152 updates for postfix not installed
6751| [19218] Postfix IPv6 mail relay
6752| [18435] SQLgrey Postfix greylisting service SQL injection
6753| [18353] Postfix CRAM-MD5 authentication replay attack
6754| [17998] SQLgrey Postfix greylisting service SQL injection
6755| [17595] Apple Mac OS postfix SMTPD AUTH denial of service
6756| [12816] Postfix MAIL FROM or RCPT TO denial of service
6757| [12815] Postfix could be used as a distributed denial of service tool
6758| [7568] Postfix SMTP log denial of service
6759| [4905] Cyrus with postfix and procmail integration could allow remote command execution
6760|
6761| Exploit-DB - https://www.exploit-db.com:
6762| [25392] Salim Gasmi GLD 1.x Postfix Greylisting Daemon Buffer Overflow Vulnerability
6763| [22982] Postfix 1.1.x Denial of Service Vulnerabilities (2)
6764| [22981] Postfix 1.1.x Denial of Service Vulnerabilities (1)
6765| [16841] GLD (Greylisting Daemon) Postfix Buffer Overflow
6766| [10023] Salim Gasmi GLD 1.0 - 1.4 Postfix Greylisting Buffer Overflow
6767| [6472] Postfix < 2.4.9, 2.5.5, 2.6-20080902 - (.forward) Local DoS Exploit
6768| [6337] Postfix <= 2.6-20080814 - (symlink) Local Privilege Escalation Exploit
6769| [934] gld 1.4 (Postfix Greylisting Daemon) Remote Format String Exploit
6770|
6771| OpenVAS (Nessus) - http://www.openvas.org:
6772| [902517] Postfix SMTP Server Cyrus SASL Support Memory Corruption Vulnerability
6773| [881389] CentOS Update for postfix CESA-2011:0422 centos5 x86_64
6774| [881293] CentOS Update for postfix CESA-2011:0843 centos4 x86_64
6775| [881278] CentOS Update for postfix CESA-2011:0422 centos4 x86_64
6776| [881267] CentOS Update for postfix CESA-2011:0843 centos5 x86_64
6777| [880520] CentOS Update for postfix CESA-2011:0422 centos5 i386
6778| [880509] CentOS Update for postfix CESA-2011:0843 centos5 i386
6779| [880488] CentOS Update for postfix CESA-2011:0843 centos4 i386
6780| [880485] CentOS Update for postfix CESA-2011:0422 centos4 i386
6781| [880268] CentOS Update for postfix CESA-2008:0839 centos3 i386
6782| [880023] CentOS Update for postfix CESA-2008:0839 centos3 x86_64
6783| [870658] RedHat Update for postfix RHSA-2011:0423-01
6784| [870440] RedHat Update for postfix RHSA-2011:0843-01
6785| [870418] RedHat Update for postfix RHSA-2011:0422-01
6786| [870021] RedHat Update for postfix RHSA-2008:0839-01
6787| [863100] Fedora Update for postfix FEDORA-2011-6777
6788| [863097] Fedora Update for postfix FEDORA-2011-6771
6789| [862950] Fedora Update for postfix FEDORA-2011-3394
6790| [862938] Fedora Update for postfix FEDORA-2011-3355
6791| [860510] Fedora Update for postfix FEDORA-2008-8593
6792| [860419] Fedora Update for postfix FEDORA-2008-8595
6793| [850126] SuSE Update for postfix SUSE-SA:2010:011
6794| [850031] SuSE Update for postfix SUSE-SA:2008:040
6795| [840658] Ubuntu Update for postfix USN-1131-1
6796| [840648] Ubuntu Update for postfix USN-1113-1
6797| [840227] Ubuntu Update for postfix vulnerabilities USN-642-1
6798| [840190] Ubuntu Update for postfix vulnerability USN-636-1
6799| [831400] Mandriva Update for postfix MDVSA-2011:090 (postfix)
6800| [830713] Mandriva Update for postfix MDVSA-2008:171 (postfix)
6801| [830635] Mandriva Update for postfix MDVSA-2008:190 (postfix)
6802| [830075] Mandriva Update for postfix MDKA-2007:079 (postfix)
6803| [72452] Gentoo Security Advisory GLSA 201209-18 (postfixadmin)
6804| [71559] Gentoo Security Advisory GLSA 201206-33 (Postfix)
6805| [70744] FreeBSD Ports: postfixadmin
6806| [69770] FreeBSD Ports: postfix, postfix-base
6807| [69733] Debian Security Advisory DSA 2233-1 (postfix)
6808| [69363] FreeBSD Ports: postfix, postfix-base
6809| [66394] Mandriva Security Advisory MDVSA-2009:224-1 (postfix)
6810| [65957] SLES10: Security update for Postfix
6811| [65911] SLES10: Security update for Postfix
6812| [65353] SLES9: Security update for Postfix
6813| [65350] SLES9: Security update for postfix
6814| [64696] Mandrake Security Advisory MDVSA-2009:224 (postfix)
6815| [61646] Gentoo Security Advisory GLSA 200809-09 (postfix)
6816| [61445] Gentoo Security Advisory GLSA 200808-12 (postfix)
6817| [61435] Debian Security Advisory DSA 1629-2 (postfix)
6818| [61434] Debian Security Advisory DSA 1629-1 (postfix)
6819| [60836] FreeBSD Ports: postfix-policyd-weight
6820| [58580] Debian Security Advisory DSA 1361-1 (postfix-policyd)
6821| [53833] Debian Security Advisory DSA 093-1 (postfix)
6822| [53652] Debian Security Advisory DSA 363-1 (postfix)
6823|
6824| SecurityTracker - https://www.securitytracker.com:
6825| [1025521] Postfix SASL Authentication Heap Overflow Lets Remote Users Deny Service
6826| [1025179] Postfix Plaintext to TLS Switching Error Lets Remote Users Inject Plaintext Commands
6827| [1020800] Postfix Linux epoll File Descriptor Leak Lets Local Users Deny Service
6828| [1020700] Postfix Symlink Dereference Bug Lets Local Users Gain Elevated Privileges
6829| [1012395] Postfix CRAM-MD5 Replay Attack May Let Remote Users Send Mail
6830| [1011532] Postfix Buffer Error May Prevent Remote Users from Being Able to Authenticate Using SMTPD AUTH
6831| [1007382] Postfix Bounce Messages Let Remote Users Scan for Open Ports on Other Hosts
6832| [1007381] Postfix Address Resolver Parsing Bug Lets Remote Users Hang the System
6833| [1002756] Postfix Mail Server Can Be Crashed By Remote Users Initiating Unsuccessful Sessions
6834|
6835| OSVDB - http://www.osvdb.org:
6836| [94034] Linux Kernel Broadcom B43 Wireless Driver b43_request_firmware Function fwpostfix modprobe Parameter Format String Local Privilege Escalation
6837| [78567] Postfix Admin backup.php Unspecified SQL Injection
6838| [78566] Postfix Admin functions.inc.php pacrypt() Function Unspecified SQL Injection
6839| [78565] Postfix Admin create-domain.php Unspecified SQL Injection
6840| [78564] Postfix Admin Unspecified XSS
6841| [78563] Postfix Admin edit-alias.php Unspecified XSS
6842| [78562] Postfix Admin create-alias.php Unspecified XSS
6843| [78561] Postfix Admin create-domain.php Unspecified XSS
6844| [78560] Postfix Admin templates/edit-vacation.php domain Parameter XSS
6845| [78559] Postfix Admin templates/menu.php domain Parameter XSS
6846| [72259] Postfix SMTP Cyrus SASL Authentication Context Data Reuse Memory Corruption
6847| [71021] Postfix STARTTLS Arbitrary Plaintext Command Injection
6848| [68340] Artica postfix.events.php Unrestricted Access Information Disclosure
6849| [61983] SUSE Linux postfix Network Interface Remote Access Restriction Bypass
6850| [58325] Debian GNU/Linux postfix postfix.postinst Symlink Arbitrary File Overwrite
6851| [49634] Postfix postfix_groups.pl Multiple Temporary File Symlink Arbitrary File Overwrite
6852| [48973] Apple Mac OS X Postfix Network Access Configuration Weakness
6853| [48108] Postfix epoll File Descriptor Leak Local DoS
6854| [47659] Postfix Cross-user Filename Local Mail Interception
6855| [47658] Postfix Hardlink to Symlink Mailspool Arbitrary Content Append
6856| [43888] policyd-weight for Postfix Socket Handling Unspecified Arbitrary File Manipulation
6857| [38091] policyd for Postfix sockets.c read_w() Function SMTP Command Remote Overflow
6858| [22381] Kolab Server Secure SMTP postfix.log Authentication Credential Disclosure
6859| [13470] Postfix IPv6 Patch if_inet6 Failure Arbitrary Mail Relay
6860| [12339] SQLgrey Postfix greylisting service Unspecified SQL Injection
6861| [12200] Apple Mac OS X Postfix CRAM-MD5 Replay Credentials
6862| [11571] SQLgrey Postfix greylisting Email Address SQL Injection
6863| [10545] Postfix Multiple Mail Header SMTP listener DoS
6864| [10544] Postfix Malformed Envelope Address nqmgr DoS
6865| [10500] Apple Mac OS X Postfix SMTPD AUTH Username Overflow DoS
6866| [6551] Postfix Bounce Scan / Packet Amplification DDoS
6867| [1991] Postfix SMTP Log DoS
6868|_
6869993/tcp open ssl/imaps?
6870995/tcp open ssl/pop3s?
687110000/tcp open http MiniServ 1.850 (Webmin httpd)
6872| vulscan: VulDB - https://vuldb.com:
6873| No findings
6874|
6875| MITRE CVE - https://cve.mitre.org:
6876| [CVE-2005-3912] Format string vulnerability in miniserv.pl Perl web server in Webmin before 1.250 and Usermin before 1.180, with syslog logging enabled, allows remote attackers to cause a denial of service (crash or memory consumption) and possibly execute arbitrary code via format string specifiers in the username parameter to the login form, which is ultimately used in a syslog call. NOTE: the code execution might be associated with an issue in Perl.
6877| [CVE-2005-3042] miniserv.pl in Webmin before 1.230 and Usermin before 1.160, when "full PAM conversations" is enabled, allows remote attackers to bypass authentication by spoofing session IDs via certain metacharacters (line feed or carriage return).
6878| [CVE-2005-0427] The ebuild of Webmin before 1.170-r3 on Gentoo Linux includes the encrypted root password in the miniserv.users file when building a tbz2 of the webmin package, which allows remote attackers to obtain and possibly crack the encrypted password.
6879| [CVE-2003-0101] miniserv.pl in (1) Webmin before 1.070 and (2) Usermin before 1.000 does not properly handle metacharacters such as line feeds and carriage returns (CRLF) in Base-64 encoded strings during Basic authentication, which allows remote attackers to spoof a session ID and gain root privileges.
6880|
6881| SecurityFocus - https://www.securityfocus.com/bid/:
6882| No findings
6883|
6884| IBM X-Force - https://exchange.xforce.ibmcloud.com:
6885| [23277] Webmin miniserv.pl Web server component username format string
6886|
6887| Exploit-DB - https://www.exploit-db.com:
6888| No findings
6889|
6890| OpenVAS (Nessus) - http://www.openvas.org:
6891| No findings
6892|
6893| SecurityTracker - https://www.securitytracker.com:
6894| [1006161] Usermin Input Validation Flaw in 'miniserv.pl' May Let Remote Users Gain User or Root Access
6895| [1006160] Webmin Input Validation Flaw in 'miniserv.pl' May Let Remote Users Spoof Session IDs and Gain Root Access
6896|
6897| OSVDB - http://www.osvdb.org:
6898| [79044] Webmin miniserv.pl Unspecified Local Password Disclosure
6899| [21222] Webmin/Usermin miniserv.pl Format String Remote Code Execution
6900| [19575] Webmin/Usermin miniserv.pl Metacharacter PAM Authentication Bypass
6901| [13772] Gentoo Webmin miniserv.users Encrypted Root Password Remote Disclosure
6902| [10803] Webmin/Usermin miniserv.pl Base-64 String Metacharacter Handling Session Spoofing
6903| [1844] Webmin miniserv.pl Environment Variable Cleartext Password Local Disclosure
6904|_
6905Service Info: Host: mail.boywiki.org
6906#######################################################################################################################################
6907 Anonymous JTSEC #OpDeathEathers Full Recon #38