Found
Duration
Date
IP
- Nikto v2.5.0 --------------------------------------------------------------------------- + Target IP: 45.60.11.242 + Target Hostname: www.copart.com + Target Port: 80 + Start Time: 2024-09-07 06:02:25 (GMT-4) --------------------------------------------------------------------------- + Server: No banner retrieved + /: Cookie incap_ses_242_242093 created without the httponly flag. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies + /: Uncommon header 'x-iinfo' found, with contents: 18-10690592-0 0NNN RT(1725703345567 0) q(0 -1 -1 -1) r(0 -1) B12(11,1330701,0) U18. + /: The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type. See: https://www.netsparker.com/web-vulnerability-scanner/vulnerabilities/missing-content-type-header/ + No CGI Directories found (use '-C all' to force check all possible dirs) + Multiple index files found: /index.cgi, /index.htm, /index.html, /default.aspx, /index.jhtml, /index.php5, /index.pl, /index.php3, /index.cfm, /index.asp, /index.php4, /index.shtml, /index.xml, /index.php, /default.htm, /index.do, /index.jsp, /default.asp, /index.php7, /index.aspx. + /www.copart.com.tgz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /dump.gz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www.copart.tgz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /archive.tar.lzma: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /site.jks: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /backup.cer: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /database.cer: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /archive.tgz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /com.tar.lzma: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /backup.war: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /wwwcopartcom.alz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /wwwcopartcom.zip: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www.copart.egg: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /wwwcopart.gz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /wwwcopart.tar: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /archive.alz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /45.60.11.242.tar: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www.copart.tar.lzma: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www.copart.com.war: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www.tgz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /archive.war: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /45.60.11.242.gz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www.copart.gz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /wwwcopartcom.war: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /database.jks: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /wwwcopart.alz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /wwwcopartcom.cer: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www.copart.pem: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /dump.tar: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /wwwcopart.tar.gz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www.copart.war: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /backup.tar.lzma: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /com.war: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /archive.egg: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /dump.tar.gz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /archive.gz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www.copart.tar: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www.copart.com.pem: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /copart.com.tar.gz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /wwwcopart.tgz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /wwwcopartcom.tar.gz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /copart.com.alz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www.copart.com.jks: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /45.60.11.242.zip: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www.jks: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /45.60.11.242.tar.gz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www.tar.lzma: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /database.gz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /database.war: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www.tar.bz2: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /45.60.11.242.pem: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /site.tar.gz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www.copart.com.cer: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /site.egg: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www.war: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /com.pem: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /wwwcopart.war: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /database.pem: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www_copart_com.gz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www_copart_com.egg: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /dump.tar.lzma: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www.pem: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /archive.tar.bz2: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /com.tar.gz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /database.zip: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /site.pem: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www.alz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /wwwcopartcom.tgz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /copart.war: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /45.60.11.242.alz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /wwwcopart.tar.bz2: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /com.tar: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /copart.com.tar: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /com.tar.bz2: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /copart.zip: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /copart.tgz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /database.tar.gz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www.tar: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /backup.egg: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /wwwcopartcom.gz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /archive.tar: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /copart.tar.gz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www.copart.com.tar: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www.copart.com.tar.gz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /copart.gz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /database.egg: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /dump.jks: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /45.60.11.242.cer: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /copart.alz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www.copart.tar.gz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /45.60.11.242.tar.bz2: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /backup.tar: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /wwwcopartcom.jks: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www.copart.com.egg: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /com.cer: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /site.war: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /copart.com.pem: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www_copart_com.tar: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /site.tar.lzma: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www.copart.com.alz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www.copart.com.gz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /wwwcopartcom.tar.lzma: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www.copart.jks: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /dump.egg: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /45.60.11.242.war: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /backup.gz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www_copart_com.jks: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www_copart_com.cer: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /dump.zip: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /dump.tar.bz2: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /copart.egg: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www_copart_com.alz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /wwwcopartcom.egg: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /com.jks: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www.egg: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /archive.tar.gz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www.tar.gz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www_copart_com.tar.bz2: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www.copart.alz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www.gz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /archive.jks: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /copart.cer: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /dump.pem: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /copart.com.tar.lzma: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /45.60.11.242.jks: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /com.gz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www_copart_com.war: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /45.60.11.242.tgz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /copart.tar: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www_copart_com.pem: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /backup.tgz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /site.gz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /site.tar.bz2: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /dump.alz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /wwwcopart.egg: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /copart.com.tgz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /database.tar.lzma: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /backup.alz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /database.tgz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /wwwcopart.zip: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www.copart.tar.bz2: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /copart.com.gz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /site.tgz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /backup.tar.gz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /wwwcopart.pem: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /database.tar: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /copart.pem: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www_copart_com.zip: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www_copart_com.tgz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /site.alz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /archive.pem: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /wwwcopart.tar.lzma: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /copart.tar.bz2: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /45.60.11.242.egg: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /dump.tgz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www.copart.zip: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www.copart.cer: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /archive.cer: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /dump.war: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /database.tar.bz2: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /wwwcopart.jks: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /wwwcopartcom.pem: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /database.alz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /com.alz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /copart.com.zip: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /site.zip: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /45.60.11.242.tar.lzma: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /site.tar: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /com.tgz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /copart.com.war: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /site.cer: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /archive.zip: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /wwwcopartcom.tar: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www_copart_com.tar.lzma: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /backup.pem: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /copart.com.tar.bz2: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www.copart.com.tar.lzma: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www_copart_com.tar.gz: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /com.zip: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /copart.com.jks: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /dump.cer: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /wwwcopartcom.tar.bz2: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /copart.com.egg: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /backup.jks: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www.zip: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www.cer: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www.copart.com.tar.bz2: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /www.copart.com.zip: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /backup.zip: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /backup.tar.bz2: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /copart.jks: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /wwwcopart.cer: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /copart.tar.lzma: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /com.egg: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /copart.com.cer: Potentially interesting backup/cert file found. . See: https://cwe.mitre.org/data/definitions/530.html + /: Web Server returns a valid response with junk HTTP methods which may cause false positives. + /: DEBUG HTTP verb may show server debugging information. See: https://docs.microsoft.com/en-us/visualstudio/debugger/how-to-enable-debugging-for-aspnet-applications?view=vs-2017 + /kboard/: KBoard Forum 0.3.0 and prior have a security problem in forum_edit_post.php, forum_post.php and forum_reply.php. + /lists/admin/: PHPList pre 2.6.4 contains a number of vulnerabilities including remote administrative access, harvesting user info and more. Default login to admin interface is admin/phplist. + /splashAdmin.php: Cobalt Qube 3 admin is running. This may have multiple security problems which could not be tested remotely. See: https://seclists.org/bugtraq/2002/Jul/262 + /ssdefs/: Siteseed pre 1.4.2 has 'major' security problems. + /sshome/: Siteseed pre 1.4.2 has 'major' security problems. + /tiki/: Tiki 1.7.2 and previous allowed restricted Wiki pages to be viewed via a 'URL trick'. Default login/pass could be admin/admin. + /tiki/tiki-install.php: Tiki 1.7.2 and previous allowed restricted Wiki pages to be viewed via a 'URL trick'. Default login/pass could be admin/admin. + /scripts/samples/details.idc: NT ODBC Remote Compromise. See: http://attrition.org/security/advisory/individual/rfp/rfp.9901.nt_odbc + /_vti_bin/shtml.exe: Attackers may be able to crash FrontPage by requesting a DOS device, like shtml.exe/aux.htm -- a DoS was not attempted. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0709 + /~root/: Allowed to browse root's home directory. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1013 + /cgi-bin/wrap: Allows viewing of directories. + /forums//admin/config.php: PHP Config file may contain database IDs and passwords. + /forums//adm/config.php: PHP Config file may contain database IDs and passwords. + /forums//administrator/config.php: PHP Config file may contain database IDs and passwords. + /forums/config.php: PHP Config file may contain database IDs and passwords. + /guestbook/guestbookdat: PHP-Gastebuch 1.60 Beta reveals sensitive information about its configuration. + /guestbook/pwd: PHP-Gastebuch 1.60 Beta reveals the md5 hash of the admin password. + /help/: Help directory should not be accessible. + /hola/admin/cms/htmltags.php?datei=./sec/data.php: hola-cms-1.2.9-10 may reveal the administrator ID and password. See: https://vulners.com/exploitdb/EDB-ID:23027 + /global.inc: PHP-Survey's include file should not be available via the web. Configure the web server to ignore .inc files or change this to global.inc.php. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0614 + /inc/common.load.php: Bookmark4U v1.8.3 include files are not protected and may contain remote source injection by using the 'prefix' variable. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1253 + /inc/config.php: Bookmark4U v1.8.3 include files are not protected and may contain remote source injection by using the 'prefix' variable. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1253 + /inc/dbase.php: Bookmark4U v1.8.3 include files are not protected and may contain remote source injection by using the 'prefix' variable. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1253 + /geeklog/users.php: Geeklog prior to 1.3.8-1sr2 contains a SQL injection vulnerability that lets a remote attacker reset admin password. See: https://vulners.com/osvdb/OSVDB:2703 + /gb/index.php?login=true: gBook may allow admin login by setting the value 'login' equal to 'true'. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1560 + /guestbook/admin.php: Guestbook admin page available without authentication. + /getaccess: This may be an indication that the server is running getAccess for SSO. + /cfdocs/expeval/openfile.cfm: Can use to expose the system/server path. + /tsweb/: Microsoft TSAC found. See: https://web.archive.org/web/20040910030506/http://www.dslwebserver.com/main/fr_index.html?/main/sbs-Terminal-Services-Advanced-Client-Configuration.html + /vgn/performance/TMT: Vignette CMS admin/maintenance script available. + /vgn/performance/TMT/Report: Vignette CMS admin/maintenance script available. + /vgn/performance/TMT/Report/XML: Vignette CMS admin/maintenance script available. + /vgn/performance/TMT/reset: Vignette CMS admin/maintenance script available. + /vgn/ppstats: Vignette CMS admin/maintenance script available. + /vgn/previewer: Vignette CMS admin/maintenance script available. + /vgn/record/previewer: Vignette CMS admin/maintenance script available. + /vgn/stylepreviewer: Vignette CMS admin/maintenance script available. + /vgn/vr/Deleting: Vignette CMS admin/maintenance script available. + /vgn/vr/Editing: Vignette CMS admin/maintenance script available. + /vgn/vr/Saving: Vignette CMS admin/maintenance script available. + /vgn/vr/Select: Vignette CMS admin/maintenance script available. + /scripts/iisadmin/bdir.htr: This default script shows host info, may allow file browsing and buffer a overrun in the Chunked Encoding data transfer mechanism, request /scripts/iisadmin/bdir.htr??c:\<dir>. See: https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/MS02-028 + /scripts/iisadmin/ism.dll: Allows you to mount a brute force attack on passwords. + /scripts/tools/ctss.idc: This CGI allows remote users to view and modify SQL DB contents, server paths, docroot and more. + /bigconf.cgi: BigIP Configuration CGI. + /blah_badfile.shtml: Allaire ColdFusion allows JSP source viewed through a vulnerable SSI call. + /vgn/style: Vignette server may reveal system information through this file. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0401 + /SiteServer/Admin/commerce/foundation/domain.asp: Displays known domains of which that server is involved. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1769 + /SiteServer/Admin/commerce/foundation/driver.asp: Displays a list of installed ODBC drivers. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1769 + /SiteServer/Admin/commerce/foundation/DSN.asp: Displays all DSNs configured for selected ODBC drivers. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1769 + /SiteServer/admin/findvserver.asp: Gives a list of installed Site Server components. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1769 + /SiteServer/Admin/knowledge/dsmgr/default.asp: Used to view current search catalog configurations. + /basilix/mbox-list.php3: BasiliX webmail application prior to 1.1.1 contains a XSS issue in 'message list' function/page. + /basilix/message-read.php3: BasiliX webmail application prior to 1.1.1 contains a XSS issue in 'read message' function/page. + /clusterframe.jsp: Macromedia JRun 4 build 61650 remote administration interface is vulnerable to several XSS attacks. + /IlohaMail/blank.html: IlohaMail 0.8.10 contains a XSS vulnerability. Previous versions contain other non-descript vulnerabilities. + /bb-dnbd/faxsurvey: This may allow arbitrary command execution. + /cartcart.cgi: If this is Dansie Shopping Cart 3.0.8 or earlier, it contains a backdoor to allow attackers to execute arbitrary commands. + /scripts/Carello/Carello.dll: Carello 1.3 may allow commands to be executed on the server by replacing hidden form elements. This could not be tested by Nikto. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0614 + /scripts/tools/dsnform.exe: Allows creation of ODBC Data Source. + /scripts/tools/dsnform: Allows creation of ODBC Data Source. + /SiteServer/Admin/knowledge/dsmgr/users/GroupManager.asp: Microsoft Site Server script used to create, modify, and potentially delete LDAP users and groups. See: https://securitytracker.com/id/1003420 + /SiteServer/Admin/knowledge/dsmgr/users/UserManager.asp: Microsoft Site Server used to create, modify, and potentially delete LDAP users and groups. See: https://securitytracker.com/id/1003420 + /prd.i/pgen/: Has MS Merchant Server 1.0. + /readme.eml: Remote server may be infected with the Nimda virus. + /scripts/httpodbc.dll: Possible IIS backdoor found. + /scripts/proxy/w3proxy.dll: MSProxy v1.0 installed. + /siteseed/: Siteseed pre 1.4.2 have 'major' security problems. + /pccsmysqladm/incs/dbconnect.inc: This file should not be accessible, as it contains database connectivity information. Upgrade to version 1.2.5 or higher. + /iisadmin/: Access to /iisadmin should be restricted to localhost or allowed hosts only. + /PDG_Cart/order.log: PDG Commerce log found. See: http://zodi.com/cgi-bin/shopper.cgi?display=intro&template=Intro/commerce.html + /ows/restricted%2eshow: OWS may allow restricted files to be viewed by replacing a character with its encoded equivalent. + /view_source.jsp: Resin 2.1.2 view_source.jsp allows any file on the system to be viewed by using \..\ directory traversal. This script may be vulnerable. + /w-agora/: w-agora pre 4.1.4 may allow a remote user to execute arbitrary PHP scripts via URL includes in include/*.php and user/*.php files. Default account is 'admin' but password set during install. + /vider.php3: MySimpleNews may allow deleting of news items without authentication. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2320 + /officescan/cgi/cgiChkMasterPwd.exe: Trend Micro Officescan allows you to skip the login page and access some CGI programs directly. See: https://web.archive.org/web/20030607054822/http://support.microsoft.com/support/exchange/content/whitepapers/owaguide.doc + /pbserver/pbserver.dll: This may contain a buffer overflow. See: https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/MS00-094 + /pafiledb/includes/team/file.php: paFileDB 3.1 and below may allow file upload without authentication. + /phpEventCalendar/file_upload.php: phpEventCalendar 1.1 and prior are vulnerable to file upload bug. + /servlet/com.unify.servletexec.UploadServlet: This servlet allows attackers to upload files to the server. + /scripts/cpshost.dll: Posting acceptor possibly allows you to upload files. + /upload.asp: An ASP page that allows attackers to upload files to server. + /uploadn.asp: An ASP page that allows attackers to upload files to server. + /uploadx.asp: An ASP page that allows attackers to upload files to server. + /wa.exe: An ASP page that allows attackers to upload files to server. + /basilix/compose-attach.php3: BasiliX webmail application prior to 1.1.1 contains a non-descript security vulnerability in compose-attach.php3 related to attachment uploads. + /server/: Possibly Macromedia JRun or CRX WebDAV upload. + /vgn/ac/data: Vignette CMS admin/maintenance script available. + /vgn/ac/delete: Vignette CMS admin/maintenance script available. + /vgn/ac/edit: Vignette CMS admin/maintenance script available. + /vgn/ac/esave: Vignette CMS admin/maintenance script available. + /vgn/ac/fsave: Vignette CMS admin/maintenance script available. + /vgn/ac/index: Vignette CMS admin/maintenance script available. + /vgn/asp/MetaDataUpdate: Vignette CMS admin/maintenance script available. + /vgn/asp/previewer: Vignette CMS admin/maintenance script available. + /vgn/asp/status: Vignette CMS admin/maintenance script available. + /vgn/asp/style: Vignette CMS admin/maintenance script available. + /vgn/errors: Vignette CMS admin/maintenance script available. + /vgn/jsp/controller: Vignette CMS admin/maintenance script available. + /vgn/jsp/errorpage: Vignette CMS admin/maintenance script available. + /vgn/jsp/initialize: Vignette CMS admin/maintenance script available. + /vgn/jsp/jspstatus: Vignette CMS admin/maintenance script available. + /vgn/jsp/jspstatus56: Vignette CMS admin/maintenance script available. + /vgn/jsp/metadataupdate: Vignette CMS admin/maintenance script available. + /vgn/jsp/previewer: Vignette CMS admin/maintenance script available. + /vgn/jsp/style: Vignette CMS admin/maintenance script available. + /vgn/legacy/edit: Vignette CMS admin/maintenance script available. + /vgn/login: Vignette server may allow user enumeration based on the login attempts to this file. + /adm/config.php: PHP Config file may contain database IDs and passwords. + /contents.php?new_language=elvish&mode=select: Requesting a file with an invalid language selection from DC Portal may reveal the system path. + /pw/storemgr.pw: Encrypted ID/Pass for Mercantec's SoftCart. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0609 + /servlet/com.livesoftware.jrun.plugins.ssi.SSIFilter: Allaire ColdFusion allows JSP source viewed through a vulnerable SSI call. + /shopa_sessionlist.asp: VP-ASP shopping cart test application is available from the web. This page may give the location of .mdb files which may also be available. + /simplebbs/users/users.php: Simple BBS 1.0.6 allows user information and passwords to be viewed remotely. See: https://www.webhostingtalk.nl/bugtraq-mailing-lijst/23898-simplebbs-1-0-6-default-permissions-vuln.html + /typo3conf/: This may contain sensitive TYPO3 files. + /cms/typo3conf/: This may contain sensitive TYPO3 files. + /site/typo3conf/: This may contain sensitive TYPO3 files. + /typo/typo3conf/: This may contain sensitive TYPO3 files. + /typo3/typo3conf/: This may contain sensitive TYPO3 files. + /typo3conf/localconf.php: TYPO3 config file found. + /cms/typo3conf/localconf.php: TYPO3 config file found. + /site/typo3conf/localconf.php: TYPO3 config file found. + /typo/typo3conf/localconf.php: TYPO3 config file found. + /typo3/typo3conf/localconf.php: TYPO3 config file found. + /vchat/msg.txt: VChat allows user information to be retrieved. See: https://www.securityfocus.com/bid/7186/info + /vgn/license: Vignette server license file found. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0403 + /webcart-lite/config/import.txt: This may allow attackers to read credit card data. Reconfigure to make this file not accessible via the web. See: https://packetstormsecurity.com/files/32406/xmas.txt.html + /webcart-lite/orders/import.txt: This may allow attackers to read credit card data. Reconfigure to make this file not accessible via the web. See: https://packetstormsecurity.com/files/32406/xmas.txt.html + /webcart/carts/: This may allow attackers to read credit card data. Reconfigure to make this dir not accessible via the web. See: https://packetstormsecurity.com/files/32406/xmas.txt.html + /webcart/config/: This may allow attackers to read credit card data. Reconfigure to make this dir not accessible via the web. See: https://packetstormsecurity.com/files/32406/xmas.txt.html + /webcart/config/clients.txt: This may allow attackers to read credit card data. Reconfigure to make this file not accessible via the web. See: https://packetstormsecurity.com/files/32406/xmas.txt.html + /webcart/orders/: This may allow attackers to read credit card data. Reconfigure to make this dir not accessible via the web. See: https://packetstormsecurity.com/files/32406/xmas.txt.html + /webcart/orders/import.txt: This may allow attackers to read credit card data. Reconfigure to make this file not accessible via the web. See: https://packetstormsecurity.com/files/32406/xmas.txt.html + /ws_ftp.ini: Can contain saved passwords for FTP sites. + /WS_FTP.ini: Can contain saved passwords for FTP sites. + /_mem_bin/auoconfig.asp: Displays the default AUO (LDAP) schema, including host and port. + /SiteServer/Admin/knowledge/persmbr/vs.asp: Expose various LDAP service and backend configuration parameters. See: https://vulners.com/osvdb/OSVDB:17659 + /SiteServer/Admin/knowledge/persmbr/VsLsLpRd.asp: Expose various LDAP service and backend configuration parameters. See: https://vulners.com/osvdb/OSVDB:17661 + /SiteServer/Admin/knowledge/persmbr/VsPrAuoEd.asp: Expose various LDAP service and backend configuration parameters. See: https://vulners.com/osvdb/OSVDB:17662 + /SiteServer/Admin/knowledge/persmbr/VsTmPr.asp: Expose various LDAP service and backend configuration parameters. See: https://vulners.com/osvdb/OSVDB:17660 + /tvcs/getservers.exe?action=selects1: Following steps 2-4 of this page may reveal a zip file that contains passwords and system details. + /nsn/fdir.bas:ShowVolume: You can use ShowVolume and ShowDirectory directly on the Novell server (NW5.1) to view the filesystem without having to log in. + /webmail/blank.html: IlohaMail 0.8.10 contains an XSS vulnerability. Previous versions contain other non-descript vulnerabilities. + /jamdb/: JamDB pre 0.9.2 mp3.php and image.php can allow user to read arbitrary file out of docroot. + /cgi/cgiproc?: It may be possible to crash Nortel Contivity VxWorks by requesting '/cgi/cgiproc?$' (not attempted!). Upgrade to version 2.60 or later. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0063 + /servlet/SchedulerTransfer: PeopleSoft SchedulerTransfer servlet found, which may allow remote command execution. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0104 + /servlet/sunexamples.BBoardServlet: This default servlet lets attackers execute arbitrary commands. + /servlets/SchedulerTransfer: PeopleSoft SchedulerTransfer servlet found, which may allow remote command execution. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0104 + /perl/-e%20print%20Hello: The Perl interpreter on the Novell system may allow any command to be executed. See: http://www.securityfocus.com/bid/5520 + /vgn/legacy/save: Vignette Legacy Tool may be unprotected. To access this resource, set a cookie called 'vgn_creds' with any value. + /IDSWebApp/IDSjsp/Login.jsp: Tivoli Directory Server Web Administration. + /quikstore.cfg: Shopping cart config file, http://www.quikstore.com/, http://www.mindsec.com/advisories/post2.txt. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0607 + /quikstore.cgi: A shopping cart. + /securecontrolpanel/: Web Server Control Panel. + /siteminder: This may be an indication that the server is running Siteminder for SSO. + /webmail/: Web based mail package installed. + /_cti_pvt/: FrontPage directory found. + /smg_Smxcfg30.exe?vcc=3560121183d3: This may be a Trend Micro Officescan 'backdoor'. + /nsn/..%5Cutil/attrib.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server. + /nsn/..%5Cutil/chkvol.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server. + /nsn/..%5Cutil/copy.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server. + 7883 requests: 0 error(s) and 362 item(s) reported on remote host + End Time: 2024-09-07 06:02:58 (GMT-4) (33 seconds) --------------------------------------------------------------------------- + 1 host(s) tested