URL: https://wemerecords.com/ [83.166.140.135] Started: Mon Nov 4 17:51:06 2024 Interesting Finding(s): Headers | Interesting Entry: Server: Apache | Found By: Headers (Passive Detection) | Confidence: 100% XML-RPC seems to be enabled: https://wemerecords.com/app/xmlrpc.php | Found By: Direct Access (Aggressive Detection) | Confidence: 100% | References: | - http://codex.wordpress.org/XML-RPC_Pingback_API | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner/ | - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos/ | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login/ | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access/ WordPress readme found: https://wemerecords.com/app/readme.html | Found By: Direct Access (Aggressive Detection) | Confidence: 100% The external WP-Cron seems to be enabled: https://wemerecords.com/app/wp-cron.php | Found By: Direct Access (Aggressive Detection) | Confidence: 60% | References: | - https://www.iplocation.net/defend-wordpress-from-ddos | - https://github.com/wpscanteam/wpscan/issues/1299 WordPress version 4.7.4 identified (Insecure, released on 2017-04-20). | Found By: Rss Generator (Passive Detection) | - https://wemerecords.com/feed/, https://wordpress.org/?v=4.7.4 | - https://wemerecords.com/comments/feed/, https://wordpress.org/?v=4.7.4 | - https://wemerecords.com/shop/feed/, https://wordpress.org/?v=4.7.4 WordPress theme in use: weme | Location: https://wemerecords.com/app/assets/themes/weme/ | Style URL: https://wemerecords.com/app/assets/themes/weme/style.css?ver=4.7.4 | Style Name: Weme records | Style URI: https://woocommerce.com/storefront | Description: Un thème fait réalisé par Variable pour Weme records... | Author: Variable | Author URI: https://variable.club | | Found By: Css Style In Homepage (Passive Detection) | Confirmed By: Css Style In 404 Page (Passive Detection) | | The version could not be determined. Enumerating Users (via Passive and Aggressive Methods) Brute Forcing Author IDs -: |=================================================| User(s) Identified: Constant Mathieu | Found By: Rss Generator (Passive Detection) No WPScan API Token given, as a result vulnerability data has not been output. You can get a free API token with 25 daily requests by registering at https://wpscan.com/register Finished: Mon Nov 4 17:51:33 2024 Requests Done: 55 Cached Requests: 7 Data Sent: 21.794 KB Data Received: 569.308 KB Memory used: 191 MB Elapsed time: 00:00:26