- Nikto --------------------------------------------------------------------------- + Multiple IPs found: 172.67.142.215, 104.21.54.215, 2606:4700:3037::6815:36d7, 2606:4700:3037::ac43:8ed7 + Target IP: 172.67.142.215 + Target Hostname: www.indiegamebundles.com + Target Port: 80 + Start Time: 2024-09-19 06:50:42 (GMT-4) --------------------------------------------------------------------------- + Server: cloudflare + /: Uncommon header 'x-nginx-upstream-cache-status' found, with contents: MISS. + /: Uncommon header 'speculation-rules' found, with contents: "/cdn-cgi/speculation". + /: Uncommon header 'x-server-powered-by' found, with contents: Engintron. + /: An alt-svc header was found which is advertising HTTP/3. The endpoint is: ':443'. Nikto cannot test HTTP/3 over QUIC. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/alt-svc + Root page / redirects to: https://www.indiegamebundles.com/ + No CGI Directories found (use '-C all' to force check all possible dirs) + /sips/sipssys/users/a/admin/user: Uncommon header 'cf-edge-cache' found, with contents: no-cache. + /sips/sipssys/users/a/admin/user: The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type. See: https://www.netsparker.com/web-vulnerability-scanner/vulnerabilities/missing-content-type-header/ + /typo3conf/: This may contain sensitive TYPO3 files. + /cms/typo3conf/: This may contain sensitive TYPO3 files. + /site/typo3conf/: This may contain sensitive TYPO3 files. + /typo/typo3conf/: This may contain sensitive TYPO3 files. + /typo3/typo3conf/: This may contain sensitive TYPO3 files. + /typo3conf/database.sql: TYPO3 SQL file found. + /cms/typo3conf/database.sql: TYPO3 SQL file found. + /site/typo3conf/database.sql: TYPO3 SQL file found. + /typo/typo3conf/database.sql: TYPO3 SQL file found. + /typo3/typo3conf/database.sql: TYPO3 SQL file found. + /typo3conf/localconf.php: TYPO3 config file found. + /cms/typo3conf/localconf.php: TYPO3 config file found. + /site/typo3conf/localconf.php: TYPO3 config file found. + /typo/typo3conf/localconf.php: TYPO3 config file found. + /typo3/typo3conf/localconf.php: TYPO3 config file found. + /vchat/msg.txt: VChat allows user information to be retrieved. See: https://www.securityfocus.com/bid/7186/info + /vgn/license: Vignette server license file found. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0403 + /webcart-lite/config/import.txt: This may allow attackers to read credit card data. Reconfigure to make this file not accessible via the web. See: https://packetstormsecurity.com/files/32406/xmas.txt.html + /webcart-lite/orders/import.txt: This may allow attackers to read credit card data. Reconfigure to make this file not accessible via the web. See: https://packetstormsecurity.com/files/32406/xmas.txt.html + /webcart/carts/: This may allow attackers to read credit card data. Reconfigure to make this dir not accessible via the web. See: https://packetstormsecurity.com/files/32406/xmas.txt.html + /webcart/config/: This may allow attackers to read credit card data. Reconfigure to make this dir not accessible via the web. See: https://packetstormsecurity.com/files/32406/xmas.txt.html + /webcart/config/clients.txt: This may allow attackers to read credit card data. Reconfigure to make this file not accessible via the web. See: https://packetstormsecurity.com/files/32406/xmas.txt.html + /webcart/orders/: This may allow attackers to read credit card data. Reconfigure to make this dir not accessible via the web. See: https://packetstormsecurity.com/files/32406/xmas.txt.html + /webcart/orders/import.txt: This may allow attackers to read credit card data. Reconfigure to make this file not accessible via the web. See: https://packetstormsecurity.com/files/32406/xmas.txt.html + /ws_ftp.ini: Can contain saved passwords for FTP sites. + /WS_FTP.ini: Can contain saved passwords for FTP sites. + /_mem_bin/auoconfig.asp: Displays the default AUO (LDAP) schema, including host and port. + /SiteServer/Admin/knowledge/persmbr/vs.asp: Expose various LDAP service and backend configuration parameters. See: https://vulners.com/osvdb/OSVDB:17659 + /SiteServer/Admin/knowledge/persmbr/VsLsLpRd.asp: Expose various LDAP service and backend configuration parameters. See: https://vulners.com/osvdb/OSVDB:17661 + /SiteServer/Admin/knowledge/persmbr/VsPrAuoEd.asp: Expose various LDAP service and backend configuration parameters. See: https://vulners.com/osvdb/OSVDB:17662 + /SiteServer/Admin/knowledge/persmbr/VsTmPr.asp: Expose various LDAP service and backend configuration parameters. See: https://vulners.com/osvdb/OSVDB:17660 + /tvcs/getservers.exe?action=selects1: Following steps 2-4 of this page may reveal a zip file that contains passwords and system details. + /nsn/fdir.bas:ShowVolume: You can use ShowVolume and ShowDirectory directly on the Novell server (NW5.1) to view the filesystem without having to log in. + /forum/admin/database/wwForum.mdb: Web Wiz Forums pre 7.5 is vulnerable to Cross-Site Scripting attacks. Default login/pass is Administrator/letmein. + /webmail/blank.html: IlohaMail 0.8.10 contains an XSS vulnerability. Previous versions contain other non-descript vulnerabilities. + /jamdb/: JamDB pre 0.9.2 mp3.php and image.php can allow user to read arbitrary file out of docroot. + /cgi/cgiproc?: It may be possible to crash Nortel Contivity VxWorks by requesting '/cgi/cgiproc?$' (not attempted!). Upgrade to version 2.60 or later. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0063 + /servlet/SchedulerTransfer: PeopleSoft SchedulerTransfer servlet found, which may allow remote command execution. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0104 + /servlet/sunexamples.BBoardServlet: This default servlet lets attackers execute arbitrary commands. + /servlets/SchedulerTransfer: PeopleSoft SchedulerTransfer servlet found, which may allow remote command execution. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0104 + /perl/-e%20print%20Hello: The Perl interpreter on the Novell system may allow any command to be executed. See: http://www.securityfocus.com/bid/5520 + /vgn/legacy/save: Vignette Legacy Tool may be unprotected. To access this resource, set a cookie called 'vgn_creds' with any value. + /IDSWebApp/IDSjsp/Login.jsp: Tivoli Directory Server Web Administration. + /quikstore.cfg: Shopping cart config file, http://www.quikstore.com/, http://www.mindsec.com/advisories/post2.txt. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0607 + /quikstore.cgi: A shopping cart. + /securecontrolpanel/: Web Server Control Panel. + Scan terminated: 0 error(s) and 52 item(s) reported on remote host + End Time: 2024-09-19 06:51:43 (GMT-4) (61 seconds) --------------------------------------------------------------------------- + 1 host(s) tested