Scan report for "frankfourie.com"

Membership level: Free member
Summary

Found

45

Duration

1min 1sec

Date

2026-02-25

IP

15.197.148.33

Report
Nikto scan (max 60 sec) (nikto -host frankfourie.com -maxtime 60)
- Nikto v2.6.0
---------------------------------------------------------------------------
+ Your Nikto installation is out of date.
+ Target IP:          15.197.148.33
+ Target Hostname:    frankfourie.com
+ Target Port:        80
+ Platform:           Unknown
+ Start Time:         2026-02-25 15:38:27 (GMT-5)
---------------------------------------------------------------------------
+ Server: No banner retrieved
+ Multiple IPs found: 15.197.148.33, 3.33.130.190
+ No CGI Directories found (use '-C all' to force check all possible dirs). CGI tests skipped.
+ [999996] /robots.txt: contains 1 entry which should be manually viewed. See: https://developer.mozilla.org/en-US/docs/Glossary/Robots.txt
+ [013587] /: Suggested security header missing: strict-transport-security. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security
+ [013587] /: Suggested security header missing: content-security-policy. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP
+ [013587] /: Suggested security header missing: permissions-policy. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Permissions-Policy
+ [013587] /: Suggested security header missing: x-content-type-options. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Content-Type-Options
+ [013587] /: Suggested security header missing: referrer-policy. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Referrer-Policy
+ [000324] /tvcs/getservers.exe?action=selects1: Following steps 2-4 of this page may reveal a zip file that contains passwords and system details.
+ [000365] /smg_Smxcfg30.exe?vcc=3560121183d3: This may be a Trend Micro Officescan 'backdoor'.
+ [000486] /WebAdmin.dll?View=Logon: Some versions of WebAdmin are vulnerable to a remote DoS (not tested). See: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1247
+ [000885] /guestbook/?number=5&lng=%3Cscript%3Ealert(document.domain);%3C/script%3E: MPM Guestbook 1.2 and previous are vulnreable to XSS attacks. See: CVE‑2003‑1182
+ [000962] /ext.dll?MfcIsapiCommand=LoadPage&page=admin.hts%20&a0=add&a1=root&a2=%5C: This check (A) sets up the next BadBlue test (B) for possible exploit. See: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0595
+ [001170] /ncl_items.shtml?SUBJECT=1: This may allow attackers to reconfigure your Tektronix printer. See: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0484
+ [001174] /pub/english.cgi?op=rmail: BSCW self-registration may be enabled. This could allow untrusted users semi-trusted access to the software. 3.x version (and probably some 4.x) allow arbitrary commands to be executed remotely. See: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0095
+ [001176] /scripts/wsisa.dll/WService=anything?WSMadmin: Allows Webspeed to be remotely administered. Edit unbroker.properties and set AllowMsngrCmds to 0. See: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0127
+ [001218] /sitemap.xml: The sitemap.xml file provides a listing of the site content.
+ [001239] /ab2/\@AdminAddadmin?uid=foo&password=bar&re_password=bar: Sun Answerbook may allow users to be created without proper authentication first. Attempted to add user 'foo' with password 'bar'. See: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0696
+ [002078] /carbo.dll: This might be interesting.
+ [002318] /csPassword.cgi?command=remove%20: This might be interesting: has been seen in web logs from an unknown scanner.
+ [002341] /emumail.cgi?type=.%00: This might be interesting: has been seen in web logs from an unknown scanner.
+ [002456] /forum_arc.asp?n=268: This might be interesting: has been seen in web logs from an unknown scanner.
+ [002468] /forum_professionnel.asp?n=100: This might be interesting: has been seen in web logs from an unknown scanner.
+ [002551] /myguestBk/admin/index.asp?|-|0|404_Object_Not_Found: This might be interesting: has been seen in web logs from an unknown scanner.
+ [002552] /netget?sid=Safety&msg=2002&file=Safety: This might be interesting: has been seen in web logs from an unknown scanner.
+ [002611] /sw000.asp?|-|0|404_Object_Not_Found: This might be interesting: has been seen in web logs from an unknown scanner.
+ [002612] /syslog.htm?%20: This might be interesting: has been seen in web logs from an unknown scanner.
+ [002717] /ows-bin/oaskill.exe?abcde.exe: This might be interesting: has been seen in web logs from an unknown scanner.
+ [002718] /ows-bin/oasnetconf.exe?-l%20-s%20BlahBlah: This might be interesting: has been seen in web logs from an unknown scanner.
+ [002743] /.bash_history: A user's home directory may be set to the web root, the shell history was retrieved. This should not be accessible via the web.
+ [002756] /.sh_history: A user's home directory may be set to the web root, the shell history was retrieved. This should not be accessible via the web.
+ [003182] /texis.exe/?-dump: Texis installation may reveal sensitive information. See: OSVDB-4314
+ [003183] /texis.exe/?-version: Texis installation may reveal sensitive information. See: OSVDB-4314
+ [003225] /sysuser/docmgr/iecreate.stm?template=../: Sambar default file may allow directory listings. See: https://seclists.org/fulldisclosure/2003/Mar/265
+ [003328] /cgi-bin/hpnst.exe?c=p+i=SrvSystemInfo.html: HP Instant TopTools GoAhead WebServer hpnst.exe may be vulnerable to a DoS. See: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0169
+ [003330] /launch.asp?NFuse_Application=LookOut&NFuse_MIMEExtension=.ica: Citrix server may reveal sensitive information by accessing the 'advanced' tab on the login screen. See: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0301
+ [003380] /iissamples/sdk/asp/docs/CodeBrws.asp?Source=/IISSAMPLES/%c0%ae%c0%ae/default.asp: IIS may be vulnerable to source code viewing via the example CodeBrws.asp file. Remove all default files from the web root. See: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0739 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2099/MS99-013
+ [003445] /reports/rwservlet: Oracle Reports. See: CWE-552
+ [003449] /reports/rwservlet/getjobid7?server=myrep: Oracle Reports. See: CWE-552
+ [003450] /reports/rwservlet/getjobid4?server=myrep: Oracle Reports. See: CWE-552
+ [003451] /reports/rwservlet/showmap?server=myserver: Oracle Reports. See: CWE-552
+ [003452] /pls/portal/owa_util.cellsprint?p_theQuery=select: Direct access to Oracle packages could have an unknown impact.
+ [003453] /pls/portal/owa_util.listprint?p_theQuery=select: Access to Oracle pages could have an unknown impact.
+ [003454] /pls/portal/owa_util.show_query_columns?ctable=sys.dba_users: Access to Oracle pages could have an unknown impact.
+ [003455] /pls/portal/owa_util.showsource?cname=owa_util: Access to Oracle pages could have an unknown impact.
+ [003456] /pls/portal/owa_util.cellsprint?p_theQuery=select+*+from+sys.dba_users: Access to Oracle pages could have an unknown impact.
+ [003483] /OA_HTML/jsp/fnd/fndhelp.jsp?dbc=/u01/oracle/prodappl/fnd/11.5.0/secure/dbprod2_prod.dbc: Oracle Applications help page found. See: CWE-552
+ Scan terminated: 0 errors and 45 items reported on the remote host
+ End Time:           2026-02-25 15:39:28 (GMT-5) (61 seconds)
---------------------------------------------------------------------------
+ 1 host(s) tested
Detailed report
Target
frankfourie.com
Target IP
15.197.148.33
Scan method
Nikto scan (max 60 sec)
Run command
nikto -host frankfourie.com -maxtime 60
Duration
Quick report
Scan date
25 Feb 2026 15:39
Copy scan report
Download report
Remove scan result
$
Check ports
API - Scan ID