Found
Duration
Date
IP
- Nikto v2.6.0 --------------------------------------------------------------------------- + Your Nikto installation is out of date. + Target IP: 15.197.148.33 + Target Hostname: frankfourie.com + Target Port: 80 + Platform: Unknown + Start Time: 2026-02-25 15:38:27 (GMT-5) --------------------------------------------------------------------------- + Server: No banner retrieved + Multiple IPs found: 15.197.148.33, 3.33.130.190 + No CGI Directories found (use '-C all' to force check all possible dirs). CGI tests skipped. + [999996] /robots.txt: contains 1 entry which should be manually viewed. See: https://developer.mozilla.org/en-US/docs/Glossary/Robots.txt + [013587] /: Suggested security header missing: strict-transport-security. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security + [013587] /: Suggested security header missing: content-security-policy. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP + [013587] /: Suggested security header missing: permissions-policy. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Permissions-Policy + [013587] /: Suggested security header missing: x-content-type-options. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Content-Type-Options + [013587] /: Suggested security header missing: referrer-policy. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Referrer-Policy + [000324] /tvcs/getservers.exe?action=selects1: Following steps 2-4 of this page may reveal a zip file that contains passwords and system details. + [000365] /smg_Smxcfg30.exe?vcc=3560121183d3: This may be a Trend Micro Officescan 'backdoor'. + [000486] /WebAdmin.dll?View=Logon: Some versions of WebAdmin are vulnerable to a remote DoS (not tested). See: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1247 + [000885] /guestbook/?number=5&lng=%3Cscript%3Ealert(document.domain);%3C/script%3E: MPM Guestbook 1.2 and previous are vulnreable to XSS attacks. See: CVE‑2003‑1182 + [000962] /ext.dll?MfcIsapiCommand=LoadPage&page=admin.hts%20&a0=add&a1=root&a2=%5C: This check (A) sets up the next BadBlue test (B) for possible exploit. See: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0595 + [001170] /ncl_items.shtml?SUBJECT=1: This may allow attackers to reconfigure your Tektronix printer. See: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0484 + [001174] /pub/english.cgi?op=rmail: BSCW self-registration may be enabled. This could allow untrusted users semi-trusted access to the software. 3.x version (and probably some 4.x) allow arbitrary commands to be executed remotely. See: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0095 + [001176] /scripts/wsisa.dll/WService=anything?WSMadmin: Allows Webspeed to be remotely administered. Edit unbroker.properties and set AllowMsngrCmds to 0. See: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0127 + [001218] /sitemap.xml: The sitemap.xml file provides a listing of the site content. + [001239] /ab2/\@AdminAddadmin?uid=foo&password=bar&re_password=bar: Sun Answerbook may allow users to be created without proper authentication first. Attempted to add user 'foo' with password 'bar'. See: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0696 + [002078] /carbo.dll: This might be interesting. + [002318] /csPassword.cgi?command=remove%20: This might be interesting: has been seen in web logs from an unknown scanner. + [002341] /emumail.cgi?type=.%00: This might be interesting: has been seen in web logs from an unknown scanner. + [002456] /forum_arc.asp?n=268: This might be interesting: has been seen in web logs from an unknown scanner. + [002468] /forum_professionnel.asp?n=100: This might be interesting: has been seen in web logs from an unknown scanner. + [002551] /myguestBk/admin/index.asp?|-|0|404_Object_Not_Found: This might be interesting: has been seen in web logs from an unknown scanner. + [002552] /netget?sid=Safety&msg=2002&file=Safety: This might be interesting: has been seen in web logs from an unknown scanner. + [002611] /sw000.asp?|-|0|404_Object_Not_Found: This might be interesting: has been seen in web logs from an unknown scanner. + [002612] /syslog.htm?%20: This might be interesting: has been seen in web logs from an unknown scanner. + [002717] /ows-bin/oaskill.exe?abcde.exe: This might be interesting: has been seen in web logs from an unknown scanner. + [002718] /ows-bin/oasnetconf.exe?-l%20-s%20BlahBlah: This might be interesting: has been seen in web logs from an unknown scanner. + [002743] /.bash_history: A user's home directory may be set to the web root, the shell history was retrieved. This should not be accessible via the web. + [002756] /.sh_history: A user's home directory may be set to the web root, the shell history was retrieved. This should not be accessible via the web. + [003182] /texis.exe/?-dump: Texis installation may reveal sensitive information. See: OSVDB-4314 + [003183] /texis.exe/?-version: Texis installation may reveal sensitive information. See: OSVDB-4314 + [003225] /sysuser/docmgr/iecreate.stm?template=../: Sambar default file may allow directory listings. See: https://seclists.org/fulldisclosure/2003/Mar/265 + [003328] /cgi-bin/hpnst.exe?c=p+i=SrvSystemInfo.html: HP Instant TopTools GoAhead WebServer hpnst.exe may be vulnerable to a DoS. See: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0169 + [003330] /launch.asp?NFuse_Application=LookOut&NFuse_MIMEExtension=.ica: Citrix server may reveal sensitive information by accessing the 'advanced' tab on the login screen. See: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0301 + [003380] /iissamples/sdk/asp/docs/CodeBrws.asp?Source=/IISSAMPLES/%c0%ae%c0%ae/default.asp: IIS may be vulnerable to source code viewing via the example CodeBrws.asp file. Remove all default files from the web root. See: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0739 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2099/MS99-013 + [003445] /reports/rwservlet: Oracle Reports. See: CWE-552 + [003449] /reports/rwservlet/getjobid7?server=myrep: Oracle Reports. See: CWE-552 + [003450] /reports/rwservlet/getjobid4?server=myrep: Oracle Reports. See: CWE-552 + [003451] /reports/rwservlet/showmap?server=myserver: Oracle Reports. See: CWE-552 + [003452] /pls/portal/owa_util.cellsprint?p_theQuery=select: Direct access to Oracle packages could have an unknown impact. + [003453] /pls/portal/owa_util.listprint?p_theQuery=select: Access to Oracle pages could have an unknown impact. + [003454] /pls/portal/owa_util.show_query_columns?ctable=sys.dba_users: Access to Oracle pages could have an unknown impact. + [003455] /pls/portal/owa_util.showsource?cname=owa_util: Access to Oracle pages could have an unknown impact. + [003456] /pls/portal/owa_util.cellsprint?p_theQuery=select+*+from+sys.dba_users: Access to Oracle pages could have an unknown impact. + [003483] /OA_HTML/jsp/fnd/fndhelp.jsp?dbc=/u01/oracle/prodappl/fnd/11.5.0/secure/dbprod2_prod.dbc: Oracle Applications help page found. See: CWE-552 + Scan terminated: 0 errors and 45 items reported on the remote host + End Time: 2026-02-25 15:39:28 (GMT-5) (61 seconds) --------------------------------------------------------------------------- + 1 host(s) tested