URL: https://www.panasef.com/ [51.91.51.79] Started: Mon May 19 13:14:01 2025 Interesting Finding(s): Headers | Interesting Entries: | - Server: Apache | - X-Powered-By: PHP/8.1.32, PleskLin | Found By: Headers (Passive Detection) | Confidence: 100% robots.txt found: https://www.panasef.com/robots.txt | Found By: Robots Txt (Aggressive Detection) | Confidence: 100% The external WP-Cron seems to be enabled: https://www.panasef.com/wp-cron.php | Found By: Direct Access (Aggressive Detection) | Confidence: 60% | References: | - https://www.iplocation.net/defend-wordpress-from-ddos | - https://github.com/wpscanteam/wpscan/issues/1299 WordPress version 6.7.2 identified (Outdated, released on 2025-02-11). | Found By: Query Parameter In Upgrade Page (Aggressive Detection) | - https://www.panasef.com/wp-includes/css/dashicons.min.css?ver=6.7.2 | - https://www.panasef.com/wp-includes/css/buttons.min.css?ver=6.7.2 | - https://www.panasef.com/wp-admin/css/forms.min.css?ver=6.7.2 | - https://www.panasef.com/wp-admin/css/l10n.min.css?ver=6.7.2 | - https://www.panasef.com/wp-admin/css/install.min.css?ver=6.7.2 The main theme could not be detected. Enumerating Users (via Passive and Aggressive Methods) Brute Forcing Author IDs -: |=================================================| No Users Found. No WPScan API Token given, as a result vulnerability data has not been output. You can get a free API token with 25 daily requests by registering at https://wpscan.com/register Finished: Mon May 19 13:14:21 2025 Requests Done: 54 Cached Requests: 9 Data Sent: 14.096 KB Data Received: 74.02 KB Memory used: 144.699 MB Elapsed time: 00:00:20