Found
Duration
Date
IP
- Nikto --------------------------------------------------------------------------- + Target IP: 38.45.71.22 + Target Hostname: lasalleinfocentre.mg + Target Port: 80 + Start Time: 2025-06-07 01:22:24 (GMT-7) --------------------------------------------------------------------------- + Server: nginx/1.18.0 (Ubuntu) + /: The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type. See: https://www.netsparker.com/web-vulnerability-scanner/vulnerabilities/missing-content-type-header/ + No CGI Directories found (use '-C all' to force check all possible dirs) + /: Retrieved x-powered-by header: PHP/8.1.31. + /:X-Frame-Options header is deprecated and has been replaced with the Content-Security-Policy HTTP header with the frame-ancestors directive instead. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Frame-Options + /: Server may leak inodes via ETags, header found with file /, inode: 5482, size: 62b414fdc96b4, mtime: gzip. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1418 + nginx/1.18.0 appears to be outdated (current is at least 1.25.3). + /index: Uncommon header 'tcn' found, with contents: list. + /index: Apache mod_negotiation is enabled with MultiViews, which allows attackers to easily brute force file names. The following alternatives for 'index' were found: index.html. See: http://www.wisec.it/sectou.php?id=4698ebdc59d15,https://exchange.xforce.ibmcloud.com/vulnerabilities/8275 + OPTIONS: Allowed HTTP Methods: POST, OPTIONS, HEAD, GET . + Scan terminated: 0 error(s) and 8 item(s) reported on remote host + End Time: 2025-06-07 01:23:25 (GMT-7) (61 seconds) --------------------------------------------------------------------------- + 1 host(s) tested