- Nikto --------------------------------------------------------------------------- + Multiple IPs found: 20.232.75.127, 45.223.180.139, 45.223.160.139 + Target IP: 20.232.75.127 + Target Hostname: doylestownhealth.org + Target Port: 80 + Start Time: 2024-08-12 12:27:13 (GMT-4) --------------------------------------------------------------------------- + Server: No banner retrieved + /: Cookie incap_ses_532_2840357 created without the httponly flag. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies + /: Uncommon header 'x-iinfo' found, with contents: 9-35174919-0 0NNN RT(1723480033328 0) q(0 -1 -1 1) r(0 -1) B10(4,312,0) U18. + /: The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type. See: https://www.netsparker.com/web-vulnerability-scanner/vulnerabilities/missing-content-type-header/ + /S7QbTCpT.htpasswd: Cookie incap_ses_1700_2840357 created without the httponly flag. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies + No CGI Directories found (use '-C all' to force check all possible dirs) + /: Incapsula WAF is in use. See: https://www.sumasoft.com/incapsula-cloud-based-web-application-firewall-waf/ + /pbserver/pbserver.dll: This may contain a buffer overflow. See: https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/MS00-094 + /isqlplus: Oracle iSQL*Plus is installed. This may be vulnerable to a buffer overflow in the user ID field. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1264 + /jk-status: mod_jk status page is visible. + /admin-console: JBoss admin console is visible. + Scan terminated: 0 error(s) and 9 item(s) reported on remote host + End Time: 2024-08-12 12:28:14 (GMT-4) (61 seconds) --------------------------------------------------------------------------- + 1 host(s) tested