Found
Duration
Date
IP
- Nikto --------------------------------------------------------------------------- + Multiple IPs found: 172.66.162.142, 104.20.32.246, 2606:4700:10::ac42:a28e, 2606:4700:10::6814:20f6 + Target IP: 172.66.162.142 + Target Hostname: bel.com.bz + Target Port: 80 + Start Time: 2025-11-26 12:31:39 (GMT-8) --------------------------------------------------------------------------- + Server: cloudflare + All CGI directories 'found', use '-C none' to test none + /: Uncommon header 'proxy-status' found, with contents: Cloudflare-Proxy;error=http_request_error. + /kboard/: KBoard Forum 0.3.0 and prior have a security problem in forum_edit_post.php, forum_post.php and forum_reply.php. + /lists/admin/: PHPList pre 2.6.4 contains a number of vulnerabilities including remote administrative access, harvesting user info and more. Default login to admin interface is admin/phplist. + /tiki/: Tiki 1.7.2 and previous allowed restricted Wiki pages to be viewed via a 'URL trick'. Default login/pass could be admin/admin. + /cgi.cgi/finger.pl: finger other users, may be other commands?. + /cgi-914/finger.pl: finger other users, may be other commands?. + /cgi-915/finger.pl: finger other users, may be other commands?. + /bin/finger.pl: finger other users, may be other commands?. + /cgi-bin/finger.pl: finger other users, may be other commands?. + /ows-bin/finger.pl: finger other users, may be other commands?. + /scripts/finger.pl: finger other users, may be other commands?. + /fcgi-bin/finger.pl: finger other users, may be other commands?. + /~root/: Allowed to browse root's home directory. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1013 + /webcgi/guestbook.pl: May allow attackers to execute commands as the web daemon. + /cgi-914/guestbook.pl: May allow attackers to execute commands as the web daemon. + /cgi/guestbook.pl: May allow attackers to execute commands as the web daemon. + /ows-bin/guestbook.pl: May allow attackers to execute commands as the web daemon. + /cgibin/guestbook.pl: May allow attackers to execute commands as the web daemon. + /fcgi-bin/guestbook.pl: May allow attackers to execute commands as the web daemon. + /cgi-home/guestbook.pl: May allow attackers to execute commands as the web daemon. + /cgi-perl/guestbook.pl: May allow attackers to execute commands as the web daemon. + /scgi-bin/guestbook.pl: May allow attackers to execute commands as the web daemon. + /cgi.cgi/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands. + /webcgi/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands. + /cgi-915/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands. + /bin/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands. + /cgi-local/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands. + /htbin/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands. + /cgibin/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands. + /scripts/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands. + /cgi-win/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands. + /fcgi-bin/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands. + /cgi-exe/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands. + /cgi-perl/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands. + /cgi-mod/architext_query.pl: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands. + /mpcgi/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more. + /cgi-bin/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more. + /cgi-sys/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more. + /cgi-local/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more. + /cgis/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more. + /fcgi-bin/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more. + /cgi-exe/blog/: A blog was found. May contain security problems in CGIs, weak passwords, and more. + /scripts/Carello/Carello.dll: Carello 1.3 may allow commands to be executed on the server by replacing hidden form elements. This could not be tested by Nikto. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0614 + /scripts/httpodbc.dll: Possible IIS backdoor found. + /siteseed/: Siteseed pre 1.4.2 have 'major' security problems. + /iisadmin/: Access to /iisadmin should be restricted to localhost or allowed hosts only. + /w-agora/: w-agora pre 4.1.4 may allow a remote user to execute arbitrary PHP scripts via URL includes in include/*.php and user/*.php files. Default account is 'admin' but password set during install. + /vider.php3: MySimpleNews may allow deleting of news items without authentication. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2320 + /cgi.cgi/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0762 + /cgi-914/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0762 + /cgi-915/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0762 + /bin/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0762 + /cgi/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0762 + /cgi-bin/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0762 + /cgibin/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0762 + /cgis/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0762 + /scripts/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0762 + /cgi-exe/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0762 + /cgi-perl/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0762 + /cgi-bin-sdb/foxweb.dll: Foxweb 2.5 and below is vulnerable to a buffer overflow (not tested or confirmed). Verify Foxweb is the latest available version. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0762 + /cgi.cgi/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data. + /cgi-915/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data. + /cgi/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data. + /cgi-bin/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data. + /cgi-sys/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data. + /htbin/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data. + /cgibin/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data. + /cgis/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data. + /cgi-win/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data. + /cgi-perl/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data. + /scgi-bin/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data. + /cgi-mod/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data. + /pbserver/pbserver.dll: This may contain a buffer overflow. See: https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/MS00-094 + /scripts/cpshost.dll: Posting acceptor possibly allows you to upload files. + /basilix/compose-attach.php3: BasiliX webmail application prior to 1.1.1 contains a non-descript security vulnerability in compose-attach.php3 related to attachment uploads. + /cgi-914/.cobalt: May allow remote admin of CGI scripts. + /cgi-915/.cobalt: May allow remote admin of CGI scripts. + /bin/.cobalt: May allow remote admin of CGI scripts. + /cgi/.cobalt: May allow remote admin of CGI scripts. + /mpcgi/.cobalt: May allow remote admin of CGI scripts. + /cgi-bin/.cobalt: May allow remote admin of CGI scripts. + /ows-bin/.cobalt: May allow remote admin of CGI scripts. + /cgi-local/.cobalt: May allow remote admin of CGI scripts. + /scripts/.cobalt: May allow remote admin of CGI scripts. + /cgi-win/.cobalt: May allow remote admin of CGI scripts. + /cgi-exe/.cobalt: May allow remote admin of CGI scripts. + /cgi-home/.cobalt: May allow remote admin of CGI scripts. + /scgi-bin/.cobalt: May allow remote admin of CGI scripts. + /cgi-bin-sdb/.cobalt: May allow remote admin of CGI scripts. + /cgi-mod/.cobalt: May allow remote admin of CGI scripts. + /mpcsoftweb_guestbook/database/mpcsoftweb_guestdata.mdb: MPCSoftWeb Guest Book passwords retrieved. See: https://www.exploit-db.com/exploits/22513 + /news/news.mdb: Web Wiz Site News release v3.06 admin password database is available and unencrypted. + /shopping300.mdb: VP-ASP shopping cart application allows .mdb files (which may include customer data) to be downloaded via the web. These should not be available. See: https://securitytracker.com/id/1004382 + /shopping400.mdb: VP-ASP shopping cart application allows .mdb files (which may include customer data) to be downloaded via the web. These should not be available. See: https://securitytracker.com/id/1004382 + /database/db2000.mdb: Max Web Portal database is available remotely. It should be moved from the default location to a directory outside the web root. See: https://www.medae.co/en/max/web-app + /webcgi/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI. See: https://vulners.com/nessus/SAMBAR_MAILIT.NASL + /cgi-914/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI. See: https://vulners.com/nessus/SAMBAR_MAILIT.NASL + /cgi-915/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI. See: https://vulners.com/nessus/SAMBAR_MAILIT.NASL + /bin/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI. See: https://vulners.com/nessus/SAMBAR_MAILIT.NASL + /cgi/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI. See: https://vulners.com/nessus/SAMBAR_MAILIT.NASL + /mpcgi/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI. See: https://vulners.com/nessus/SAMBAR_MAILIT.NASL + /ows-bin/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI. See: https://vulners.com/nessus/SAMBAR_MAILIT.NASL + /htbin/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI. See: https://vulners.com/nessus/SAMBAR_MAILIT.NASL + /cgis/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI. See: https://vulners.com/nessus/SAMBAR_MAILIT.NASL + /cgi-win/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI. See: https://vulners.com/nessus/SAMBAR_MAILIT.NASL + /fcgi-bin/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI. See: https://vulners.com/nessus/SAMBAR_MAILIT.NASL + /cgi-perl/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI. See: https://vulners.com/nessus/SAMBAR_MAILIT.NASL + /scgi-bin/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI. See: https://vulners.com/nessus/SAMBAR_MAILIT.NASL + /cgi-bin-sdb/mailit.pl: Sambar may allow anonymous email to be sent from any host via this CGI. See: https://vulners.com/nessus/SAMBAR_MAILIT.NASL + /cgi.cgi/.access: Contains authorization information. + /webcgi/.access: Contains authorization information. + /cgi-915/.access: Contains authorization information. + /bin/.access: Contains authorization information. + /mpcgi/.access: Contains authorization information. + /cgi-bin/.access: Contains authorization information. + /ows-bin/.access: Contains authorization information. + /cgi-sys/.access: Contains authorization information. + /htbin/.access: Contains authorization information. + /cgibin/.access: Contains authorization information. + /cgis/.access: Contains authorization information. + /scripts/.access: Contains authorization information. + /cgi-win/.access: Contains authorization information. + /cgi-exe/.access: Contains authorization information. + /cgi-home/.access: Contains authorization information. + /cgi-perl/.access: Contains authorization information. + /scgi-bin/.access: Contains authorization information. + /cgi-mod/.access: Contains authorization information. + /typo3conf/: This may contain sensitive TYPO3 files. + /cms/typo3conf/: This may contain sensitive TYPO3 files. + /typo/typo3conf/: This may contain sensitive TYPO3 files. + /webcart/config/: This may allow attackers to read credit card data. Reconfigure to make this dir not accessible via the web. See: https://packetstormsecurity.com/files/32406/xmas.txt.html + /webcart/orders/: This may allow attackers to read credit card data. Reconfigure to make this dir not accessible via the web. See: https://packetstormsecurity.com/files/32406/xmas.txt.html + /ws_ftp.ini: Can contain saved passwords for FTP sites. + /jamdb/: JamDB pre 0.9.2 mp3.php and image.php can allow user to read arbitrary file out of docroot. + /webcgi/shtml.dll: This may allow attackers to retrieve document source. + /cgi-914/shtml.dll: This may allow attackers to retrieve document source. + /cgi-915/shtml.dll: This may allow attackers to retrieve document source. + /cgi/shtml.dll: This may allow attackers to retrieve document source. + /ows-bin/shtml.dll: This may allow attackers to retrieve document source. + /cgi-local/shtml.dll: This may allow attackers to retrieve document source. + /htbin/shtml.dll: This may allow attackers to retrieve document source. + /cgibin/shtml.dll: This may allow attackers to retrieve document source. + /scripts/shtml.dll: This may allow attackers to retrieve document source. + /cgi-mod/shtml.dll: This may allow attackers to retrieve document source. + /cgi-915/post32.exe|dir%20c:\\: post32 can execute arbitrary commands. + /mpcgi/post32.exe|dir%20c:\\: post32 can execute arbitrary commands. + /cgi-local/post32.exe|dir%20c:\\: post32 can execute arbitrary commands. + /cgibin/post32.exe|dir%20c:\\: post32 can execute arbitrary commands. + /cgis/post32.exe|dir%20c:\\: post32 can execute arbitrary commands. + /scripts/post32.exe|dir%20c:\\: post32 can execute arbitrary commands. + /cgi-exe/post32.exe|dir%20c:\\: post32 can execute arbitrary commands. + /cgi-home/post32.exe|dir%20c:\\: post32 can execute arbitrary commands. + /cgi-perl/post32.exe|dir%20c:\\: post32 can execute arbitrary commands. + /securecontrolpanel/: Web Server Control Panel. + /nsn/..%5Cutil/attrib.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server. + /nsn/..%5Cutil/chkvol.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server. + /nsn/..%5Cutil/copy.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server. + /nsn/..%5Cutil/dir.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server. + /nsn/..%5Cutil/glist.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server. + /nsn/..%5Cutil/lancard.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server. + /nsn/..%5Cutil/md.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server. + /nsn/..%5Cutil/rd.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server. + /nsn/..%5Cutil/ren.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server. + /nsn/..%5Cutil/send.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server. + /nsn/..%5Cutil/set.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server. + /nsn/..%5Cutil/slist.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server. + /nsn/..%5Cutil/type.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server. + /nsn/..%5Cwebdemo/env.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server. + /nsn/..%5Cwebdemo/fdir.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server. + /webcgi/calendar.pl: Gateway to the unix command, may be able to submit extra commands. + /cgi-914/calendar.pl: Gateway to the unix command, may be able to submit extra commands. + /cgi/calendar.pl: Gateway to the unix command, may be able to submit extra commands. + /ows-bin/calendar.pl: Gateway to the unix command, may be able to submit extra commands. + /cgi-local/calendar.pl: Gateway to the unix command, may be able to submit extra commands. + /cgibin/calendar.pl: Gateway to the unix command, may be able to submit extra commands. + /cgis/calendar.pl: Gateway to the unix command, may be able to submit extra commands. + /cgi-exe/calendar.pl: Gateway to the unix command, may be able to submit extra commands. + /cgi-home/calendar.pl: Gateway to the unix command, may be able to submit extra commands. + /cgi-perl/calendar.pl: Gateway to the unix command, may be able to submit extra commands. + /cgi-bin-sdb/calendar.pl: Gateway to the unix command, may be able to submit extra commands. + /cgi-mod/calendar.pl: Gateway to the unix command, may be able to submit extra commands. + /cgi.cgi/wais.pl: Gateway to the unix command, may be able to submit extra commands. + /webcgi/wais.pl: Gateway to the unix command, may be able to submit extra commands. + /cgi-914/wais.pl: Gateway to the unix command, may be able to submit extra commands. + /cgi-915/wais.pl: Gateway to the unix command, may be able to submit extra commands. + /mpcgi/wais.pl: Gateway to the unix command, may be able to submit extra commands. + /htbin/wais.pl: Gateway to the unix command, may be able to submit extra commands. + /scripts/wais.pl: Gateway to the unix command, may be able to submit extra commands. + /fcgi-bin/wais.pl: Gateway to the unix command, may be able to submit extra commands. + /cgi-exe/wais.pl: Gateway to the unix command, may be able to submit extra commands. + /cgi-perl/wais.pl: Gateway to the unix command, may be able to submit extra commands. + /cgi.cgi/nph-error.pl: Gives more information in error messages. + /cgi-914/nph-error.pl: Gives more information in error messages. + /cgi-915/nph-error.pl: Gives more information in error messages. + /bin/nph-error.pl: Gives more information in error messages. + /cgi/nph-error.pl: Gives more information in error messages. + /mpcgi/nph-error.pl: Gives more information in error messages. + /cgibin/nph-error.pl: Gives more information in error messages. + /cgi-win/nph-error.pl: Gives more information in error messages. + /fcgi-bin/nph-error.pl: Gives more information in error messages. + /cgi-perl/nph-error.pl: Gives more information in error messages. + /scgi-bin/nph-error.pl: Gives more information in error messages. + /cgi-local/post-query: IP address found in the 'content-security-policy-report-only' header. The IP is "1.0.1.1". See: https://portswigger.net/kb/issues/00600300_private-ip-addresses-disclosed + /cgi-local/post-query: IP address found in the 'report-to' header. The IP is "1.0.1.1". See: https://portswigger.net/kb/issues/00600300_private-ip-addresses-disclosed + /cgi.cgi/snorkerz.cmd: Arguments passed to DOS CGI without checking. + /bin/snorkerz.cmd: Arguments passed to DOS CGI without checking. + /cgi/snorkerz.cmd: Arguments passed to DOS CGI without checking. + /cgi-bin/snorkerz.cmd: Arguments passed to DOS CGI without checking. + /cgi-sys/snorkerz.cmd: Arguments passed to DOS CGI without checking. + /cgi-local/snorkerz.cmd: Arguments passed to DOS CGI without checking. + /htbin/snorkerz.cmd: Arguments passed to DOS CGI without checking. + /cgibin/snorkerz.cmd: Arguments passed to DOS CGI without checking. + /cgis/snorkerz.cmd: Arguments passed to DOS CGI without checking. + /scripts/snorkerz.cmd: Arguments passed to DOS CGI without checking. + /cgi-win/snorkerz.cmd: Arguments passed to DOS CGI without checking. + /fcgi-bin/snorkerz.cmd: Arguments passed to DOS CGI without checking. + /cgi-exe/snorkerz.cmd: Arguments passed to DOS CGI without checking. + /cgi-home/snorkerz.cmd: Arguments passed to DOS CGI without checking. + /scgi-bin/snorkerz.cmd: Arguments passed to DOS CGI without checking. + Scan terminated: 0 error(s) and 219 item(s) reported on remote host + End Time: 2025-11-26 12:32:40 (GMT-8) (61 seconds) --------------------------------------------------------------------------- + 1 host(s) tested