Scan report for "loganchurch.com"

Membership level: Free member
Summary

Found

-

Duration

1min 1sec

Date

2024-09-27

IP

-

Report
Nikto scan (max 60 sec) (nikto -host loganchurch.com -maxtime 60)
- Nikto 
---------------------------------------------------------------------------
+ Target IP:          67.227.186.215
+ Target Hostname:    loganchurch.com
+ Target Port:        80
+ Start Time:         2024-09-27 17:03:08 (GMT-4)
---------------------------------------------------------------------------
+ Server: Apache
+ /: The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type. See: https://www.netsparker.com/web-vulnerability-scanner/vulnerabilities/missing-content-type-header/
+ OPTIONS: Allowed HTTP Methods: GET, POST, OPTIONS, HEAD .
+ /_vti_bin/shtml.exe: Attackers may be able to crash FrontPage by requesting a DOS device, like shtml.exe/aux.htm -- a DoS was not attempted. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0709
+ /webmail/blank.html: IlohaMail 0.8.10 contains an XSS vulnerability. Previous versions contain other non-descript vulnerabilities.
+ /securecontrolpanel/: Web Server Control Panel.
+ /webmail/: Web based mail package installed.
+ Scan terminated: 0 error(s) and 6 item(s) reported on remote host
+ End Time:           2024-09-27 17:04:09 (GMT-4) (61 seconds)
---------------------------------------------------------------------------
+ 1 host(s) tested
Detailed report
Target
loganchurch.com
Scan method
Nikto scan (max 60 sec)
Run command
nikto -host loganchurch.com -maxtime 60
Duration
Quick report
Scan date
27 Sep 2024 17:04
Copy scan report
Download report
Remove scan result
$
Check ports
API - Scan ID