Date: 2026-02-09 19:07 UTC
Scanner: Bounty Hunt CLI v4.0
Target: https://www.mercadolibre.com.ar
Date: 2026-02-09 19:07 UTC
Scanner: Bounty Hunt CLI v4.0
Target: https://www.mercadolibre.com.ar
Date: 2026-02-09
Severity: MEDIUM-HIGH
Target: www.clarin.com
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/bash | |
| # | |
| # Clarín Security PoC - HTTP Methods Vulnerability Demonstration | |
| # | |
| # Author: Security Researcher | |
| # Date: 2026-02-09 | |
| # Target: www.clarin.com | |
| # | |
| # PURPOSE: Demonstrate dangerous HTTP methods are enabled | |
| # NOTE: All tests are NON-DESTRUCTIVE - uses non-existent test paths |
Date: 2026-02-09 18:15 UTC
Scanner: Bounty Hunt CLI v4.0 (Phase 4)
Target: https://www.clarin.com
Date: 2026-02-09 18:09 UTC
Scanner: Bounty Hunt CLI v4.0 (Phase 4)
Target: https://arielfuggini.com
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/bash | |
| # openclaw-security-check.sh - Verify server security configuration | |
| # Run this periodically to check security status | |
| # Usage: ./openclaw-security-check.sh | |
| echo "==========================================" | |
| echo "OpenClaw Security Status Check" | |
| echo "$(date)" | |
| echo "==========================================" | |
| echo "" |
NewerOlder