94.31.29.54 |
443 |
vv |
http-php-obsolete |
|
10 |
Obsolete Version of PHP |
94.31.29.54 |
0 |
vv |
wordpress-obsolete |
|
10 |
Obsolete Version of WordPress |
94.31.29.54 |
0 |
vv |
wordpress-cve-2017-14723 |
CVE-2017-14723 |
8 |
Wordpress: CVE-2017-14723: $wpdb->prepare() can create unexpected and unsafe queries leading to potential SQL injection |
94.31.29.54 |
0 |
vv |
wordpress-cve-2017-5611 |
CVE-2017-5611 |
8 |
Wordpress: CVE-2017-5611: 'WP_Query' is vulnerable to SQL injection when passing unsafe data |
94.31.29.54 |
443 |
vv |
php-cve-2015-1351 |
CVE-2015-1351 |
8 |
PHP Vulnerability: CVE-2015-1351 |
94.31.29.54 |
0 |
vv |
wordpress-cve-2017-16510 |
CVE-2017-16510 |
8 |
Wordpress: CVE-2017-16510: $wpdb->prepare() can create unexpected and unsafe queries leading to potential SQL injection |
94.31.29.54 |
443 |
ve |
certificate-common-name-mismatch |
|
7 |
X.509 Certificate Subject CN Does Not Match the Entity Name |
94.31.29.54 |
0 |
vv |
wordpress-cve-2017-9064 |
CVE-2017-9064 |
7 |
Wordpress: CVE-2017-9064: Cross-Site Request Forgery (CRSF) vulnerability in the filesystem credentials dialog |
94.31.29.54 |
0 |
vv |
wordpress-cve-2017-5489 |
CVE-2017-5489 |
7 |
Wordpress: CVE-2017-5489: Cross-site request forgery (CSRF) bypass via uploading a Flash file |
94.31.29.54 |
0 |
vv |
wordpress-cve-2016-7169 |
CVE-2016-7169 |
7 |
Wordpress: CVE-2016-7169: Directory Traversal Vulnerability in the upgrade package uploader |
94.31.29.54 |
0 |
vv |
wordpress-cve-2017-17091 |
CVE-2017-17091 |
7 |
Wordpress: CVE-2017-17091: wp-admin/user-new.php allows remote attackers to bypass intended access restrictions |
94.31.29.54 |
0 |
vv |
wordpress-cve-2017-5492 |
CVE-2017-5492 |
7 |
Wordpress: CVE-2017-5492: Cross-site request forgery (CSRF) in the accessibility mode of widget editing |
94.31.29.54 |
0 |
vv |
wordpress-cve-2017-6815 |
CVE-2017-6815 |
6 |
Wordpress: CVE-2017-6815: Control characters can trick redirect URL validation |
94.31.29.54 |
0 |
vv |
wordpress-cve-2016-6896 |
CVE-2016-6896 |
6 |
Wordpress: CVE-2016-6896: Directory Traversal Vulnerability in the wp_ajax_update_plugin function of 'wp-admin/includes/ajax-actions.php' |
94.31.29.54 |
0 |
vv |
wordpress-cve-2016-5839 |
CVE-2016-5839 |
5 |
Wordpress: CVE-2016-5839: 'sanitize_file_name' protection bypass via unspecified vectors |
94.31.29.54 |
0 |
vv |
wordpress-cve-2016-5835 |
CVE-2016-5835 |
5 |
Wordpress: CVE-2016-5835: Information Disclosure Vulnerability allowing remote attackers to obtain sensitive revision-history information |
94.31.29.54 |
0 |
vv |
wordpress-cve-2017-5610 |
CVE-2017-5610 |
5 |
Wordpress: CVE-2017-5610: User interface for assigning taxonomy terms in Press This is shown to users who do not have permissions to use it |
94.31.29.54 |
0 |
vv |
wordpress-cve-2017-14725 |
CVE-2017-14725 |
5 |
Wordpress: CVE-2017-14725: An open redirect was discovered on the user and term edit screens |
94.31.29.54 |
0 |
vv |
wordpress-cve-2017-9062 |
CVE-2017-9062 |
5 |
Wordpress: CVE-2017-9062: Improper handling of post meta data values in the XML-RPC |
94.31.29.54 |
0 |
vv |
wordpress-cve-2017-9065 |
CVE-2017-9065 |
5 |
Wordpress: CVE-2017-9065: Lack of capability checks for post meta data in the XML-RPC API |
94.31.29.54 |
0 |
vv |
wordpress-cve-2018-6389 |
CVE-2018-6389 |
5 |
Wordpress: CVE-2018-6389: Application Denial of Service (DoS) |
94.31.29.54 |
0 |
vv |
wordpress-cve-2017-14719 |
CVE-2017-14719 |
5 |
Wordpress: CVE-2017-14719: A path traversal vulnerability was discovered in the file unzipping code |
94.31.29.54 |
0 |
vv |
wordpress-cve-2017-9066 |
CVE-2017-9066 |
5 |
Wordpress: CVE-2017-9066: Insufficient redirect validation in the HTTP class, leading to SSRF. |
94.31.29.54 |
0 |
vv |
wordpress-cve-2016-5838 |
CVE-2016-5838 |
5 |
Wordpress: CVE-2016-5838: Password-change restriction bypass via stolen cookie |
94.31.29.54 |
0 |
vv |
wordpress-cve-2016-5836 |
CVE-2016-5836 |
5 |
Wordpress: CVE-2016-5836: Potential Denial of Service (DoS) attack vectors via oEmbed protocol implementation |
94.31.29.54 |
0 |
vv |
wordpress-cve-2017-5487 |
CVE-2017-5487 |
5 |
Wordpress: CVE-2017-5487: REST API exposed user data for all users who had authored a post of a public post type |
94.31.29.54 |
0 |
vv |
wordpress-cve-2017-5493 |
CVE-2017-5493 |
5 |
Wordpress: CVE-2017-5493: Weak cryptographic security for Multisite activation key |
94.31.29.54 |
0 |
vv |
wordpress-cve-2012-6707 |
CVE-2012-6707 |
5 |
Wordpress: CVE-2012-6707: A vulnerability due to weak MD5-based password hashing algorithm |
94.31.29.54 |
0 |
vv |
wordpress-cve-2017-14722 |
CVE-2017-14722 |
5 |
Wordpress: CVE-2017-14722: A path traversal vulnerability was discovered in the customizer |
94.31.29.54 |
0 |
vv |
wordpress-cve-2016-5837 |
CVE-2016-5837 |
5 |
Wordpress: CVE-2016-5837: Unauthorized category removal from a post |
94.31.29.54 |
0 |
vv |
wordpress-cve-2016-5832 |
CVE-2016-5832 |
5 |
Wordpress: CVE-2016-5832: Redirect bypass in the customizer |
94.31.29.54 |
0 |
vv |
wordpress-cve-2017-5491 |
CVE-2017-5491 |
5 |
Wordpress: CVE-2017-5491: Post via email checks mail.example.com if default settings aren't changed |
94.31.29.54 |
0 |
vv |
wordpress-cve-2017-8295 |
CVE-2017-8295 |
4 |
Wordpress: CVE-2017-8295: Potential Unauthorized Password Reset |
94.31.29.54 |
0 |
vv |
wordpress-cve-2017-14720 |
CVE-2017-14720 |
4 |
Wordpress: CVE-2017-14720: A cross-site scripting (XSS) vulnerability was discovered in template names |
94.31.29.54 |
0 |
vv |
wordpress-cve-2017-14718 |
CVE-2017-14718 |
4 |
Wordpress: CVE-2017-14718: A cross-site scripting (XSS) vulnerability was discovered in the link modal |
94.31.29.54 |
0 |
vv |
wordpress-cve-2017-17093 |
CVE-2017-17093 |
4 |
Wordpress: CVE-2017-17093: wp-includes/general-template.php allows attackers to conduct XSS attacks |
94.31.29.54 |
0 |
vv |
wordpress-cve-2016-7168 |
CVE-2016-7168 |
4 |
Wordpress: CVE-2016-7168: Cross-Site Scripting (XSS) Vulnerability in the media_handle_upload function in 'wp-admin/includes/media.php' |
94.31.29.54 |
0 |
vv |
wordpress-cve-2018-5776 |
CVE-2018-5776 |
4 |
Wordpress: CVE-2018-5776: WordPress before 4.9.2 has XSS in the Flash fallback files in MediaElement (under wp-includes/js/mediaelement) |
94.31.29.54 |
0 |
vv |
wordpress-cve-2017-14721 |
CVE-2017-14721 |
4 |
Wordpress: CVE-2017-14721: A cross-site scripting (XSS) vulnerability was discovered in the plugin editor |
94.31.29.54 |
0 |
vv |
wordpress-cve-2017-9063 |
CVE-2017-9063 |
4 |
Wordpress: CVE-2017-9063: Cross-Site Scripting (XSS) vulnerability related to the Customizer |
94.31.29.54 |
0 |
vv |
wordpress-cve-2017-17092 |
CVE-2017-17092 |
4 |
Wordpress: CVE-2017-17092: wp-includes/functions.php allows remote attackers to conduct XSS attacks |
94.31.29.54 |
0 |
vv |
wordpress-cve-2017-17094 |
CVE-2017-17094 |
4 |
Wordpress: CVE-2017-17094: wp-includes/feed.php allows attackers to conduct XSS attacks |
94.31.29.54 |
0 |
vv |
wordpress-cve-2017-5488 |
CVE-2017-5488 |
4 |
Wordpress: CVE-2017-5488: Cross-Site Scripting (XSS) Vulnerability via the plugin name or version header on 'update-core.php' |
94.31.29.54 |
0 |
vv |
wordpress-cve-2017-6814 |
CVE-2017-6814 |
4 |
Wordpress: CVE-2017-6814: Cross-Site Scripting (XSS) Vulnerability via media file metadata |
94.31.29.54 |
443 |
ve |
ssl-cve-2011-3389-beast |
CVE-2011-3389 |
4 |
TLS/SSL Server is enabling the BEAST attack |
94.31.29.54 |
0 |
vv |
wordpress-cve-2017-14724 |
CVE-2017-14724 |
4 |
Wordpress: CVE-2017-14724: A cross-site scripting (XSS) vulnerability was discovered in the oEmbed discovery |
94.31.29.54 |
0 |
vv |
wordpress-cve-2017-14726 |
CVE-2017-14726 |
4 |
Wordpress: CVE-2017-14726: A cross-site scripting (XSS) vulnerability was discovered in the visual editor |
94.31.29.54 |
0 |
vv |
wordpress-cve-2016-5834 |
CVE-2016-5834 |
4 |
Wordpress: CVE-2016-5834: Cross-Site Scripting (XSS) Vulnerability in the wp_get_attachment_link function in 'wp-includes/post-template.php' |
94.31.29.54 |
0 |
vv |
wordpress-cve-2016-5833 |
CVE-2016-5833 |
4 |
Wordpress: CVE-2016-5833: Cross-Site Scripting (XSS) Vulnerability in the column_title function in 'wp-admin/includes/class-wp-media-list-table.php' |
94.31.29.54 |
0 |
vv |
wordpress-cve-2016-6897 |
CVE-2016-6897 |
4 |
Wordpress: CVE-2016-6897: Cross-site request forgery (CSRF) in the wp_ajax_update_plugin function of 'wp-admin/includes/ajax-actions.php' |
94.31.29.54 |
0 |
vv |
wordpress-cve-2017-5612 |
CVE-2017-5612 |
4 |
Wordpress: CVE-2017-5612: Cross-Site Scripting (XSS) Vulnerability in the posts list table |
94.31.29.54 |
0 |
vv |
wordpress-cve-2017-6817 |
CVE-2017-6817 |
4 |
Wordpress: CVE-2017-6817: Cross-Site Scripting (XSS) Vulnerability via video URL in YouTube Embeds |
94.31.29.54 |
0 |
vv |
wordpress-cve-2017-6816 |
CVE-2017-6816 |
4 |
Wordpress: CVE-2017-6816: Unintended files can be deleted by administrators using the plugin deletion functionality |
94.31.29.54 |
443 |
ve |
tlsv1_0-enabled |
|
4 |
TLS Server Supports TLS version 1.0 |
94.31.29.54 |
0 |
vv |
wordpress-cve-2017-9061 |
CVE-2017-9061 |
4 |
Wordpress: CVE-2017-9061: Cross-Site Scripting (XSS) vulnerability when attempting to upload very large files |
94.31.29.54 |
0 |
vv |
wordpress-cve-2017-5490 |
CVE-2017-5490 |
4 |
Wordpress: CVE-2017-5490: Cross-Site Scripting (XSS) Vulnerability via theme name fallback |
94.31.29.54 |
0 |
vv |
wordpress-cve-2017-6819 |
CVE-2017-6819 |
4 |
Wordpress: CVE-2017-6819: Cross-site request forgery (CSRF) in Press This leading to excessive use of server resources |
94.31.29.54 |
0 |
vv |
wordpress-cve-2017-6818 |
CVE-2017-6818 |
4 |
Wordpress: CVE-2017-6818: Cross-Site Scripting (XSS) Vulnerability via taxonomy term names |
94.31.29.54 |
443 |
ve |
ssl-static-key-ciphers |
|
3 |
TLS/SSL Server Supports The Use of Static Key Ciphers |
94.31.29.54 |
443 |
vp |
ssl-cbc-ciphers |
CVE-2013-0169 |
3 |
TLS/SSL Timing Side-Channel Attacks, aka the "Lucky Thirteen" Attack |
94.31.29.54 |
0 |
vv |
wordpress-cve-2016-9263 |
CVE-2016-9263 |
3 |
Wordpress: CVE-2016-9263: A cross-domain Flash injection vulnerability found in flashmediaelement.swf |
94.31.29.54 |
443 |
ve |
tlsv1_1-enabled |
|
3 |
TLS Server Supports TLS version 1.1 |
94.31.29.54 |
0 |
ve |
generic-icmp-timestamp |
CVE-1999-0524 |
1 |
ICMP timestamp response |