Vulnerabilities on website. WordPress: Warning Directory Indexing Enabled In the test we attempted to list the directory contents of the uploads and plugins folders to determine if Directory Indexing is enabled. This is an information leakage vulnerability that can reveal sensitive information regarding your site configuration or content.
/wp-content/uploads/ enabled
-http://teamfourstar.com Detected libraries: jquery-migrate - 1.2.1 : -http://teamfourstar.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.2.1 Info: Severity: medium http://bugs.jquery.com/ticket/11290 http://research.insecurelabs.org/jquery/test/ jquery - 1.11.3 : (active1) -http://teamfourstar.com (active) - the library was also found to be active by running code 1 vulnerable library detected
Vulnerability DOM-XSS: http://www.domxssscanner.com/scan?url=http%3A%2F%2Fconnect.facebook.net%2Fen_US%2Fall.js
On this external link: http://www.domxssscanner.com/scan?url=http%3A%2F%2Fcdnjs.cloudflare.com%2Fajax%2Flibs%2Fmodernizr%2F2.7.1%2Fmodernizr.min.js%3Fver%3D2.7.1 -https://cdnjs.cloudflare.com Detected libraries: handlebars.js - 1.0.0 : (active1) -https://cdnjs.cloudflare.com/ajax/libs/handlebars.js/1.0.0/handlebars.min.js Info: Severity: medium https://github.com/wycats/handlebars.js/pull/1083 jquery - 1.7.2 : (active1) -https://cdnjs.cloudflare.com/ajax/libs/jquery/1.7.2/jquery.min.js Info: Severity: medium http://bugs.jquery.com/ticket/11290 http://research.insecurelabs.org/jquery/test/ (active) - the library was also found to be active by running code 2 vulnerable libraries detected
& http://www.domxssscanner.com/scan?url=http%3A%2F%2Fcdnjs.cloudflare.com%2Fajax%2Flibs%2Fselectivizr%2F1.0.2%2Fselectivizr-min.js%3Fver%3D1.0.2
polonus