- Nikto --------------------------------------------------------------------------- + Target IP: 193.25.197.199 + Target Hostname: ville-royan.fr + Target Port: 80 + Start Time: 2024-11-28 04:26:35 (GMT-5) --------------------------------------------------------------------------- + Server: nginx + /: Cookie celeo_w_id created without the httponly flag. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies + Root page / redirects to: https://www.ville-royan.fr/ + No CGI Directories found (use '-C all' to force check all possible dirs) + /index: Apache mod_negotiation is enabled with MultiViews, which allows attackers to easily brute force file names. The following alternatives for 'index' were found: HTTP_NOT_FOUND.html.var, HTTP_NOT_FOUND.html.var, HTTP_NOT_FOUND.html.var, HTTP_NOT_FOUND.html.var, HTTP_NOT_FOUND.html.var, HTTP_NOT_FOUND.html.var, HTTP_NOT_FOUND.html.var, HTTP_NOT_FOUND.html.var, HTTP_NOT_FOUND.html.var, HTTP_NOT_FOUND.html.var, HTTP_NOT_FOUND.html.var, HTTP_NOT_FOUND.html.var, HTTP_NOT_FOUND.html.var, HTTP_NOT_FOUND.html.var, HTTP_NOT_FOUND.html.var, HTTP_NOT_FOUND.html.var, HTTP_NOT_FOUND.html.var, HTTP_NOT_FOUND.html.var, HTTP_NOT_FOUND.html.var, HTTP_NOT_FOUND.html.var, HTTP_NOT_FOUND.html.var. See: http://www.wisec.it/sectou.php?id=4698ebdc59d15,https://exchange.xforce.ibmcloud.com/vulnerabilities/8275 + Scan terminated: 0 error(s) and 2 item(s) reported on remote host + End Time: 2024-11-28 04:27:36 (GMT-5) (61 seconds) --------------------------------------------------------------------------- + 1 host(s) tested