Scan report for "anshinfotech.org"

Membership level: Free member
Summary

Found

17

Duration

1min 1sec

Date

2025-06-19

IP

162.215.226.6

Report
Nikto scan (max 60 sec) (nikto -host anshinfotech.org -maxtime 60)
- Nikto 
---------------------------------------------------------------------------
+ Target IP:          162.215.226.6
+ Target Hostname:    anshinfotech.org
+ Target Port:        80
+ Start Time:         2025-06-18 22:49:18 (GMT-7)
---------------------------------------------------------------------------
+ Server: nginx
+ /: Retrieved x-powered-by header: PHP/8.1.31.
+ /:X-Frame-Options header is deprecated and has been replaced with the Content-Security-Policy HTTP header with the frame-ancestors directive instead. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Frame-Options
+ /: The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type. See: https://www.netsparker.com/web-vulnerability-scanner/vulnerabilities/missing-content-type-header/
+ /cgi-sys/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems.
+ /vgn/performance/TMT: Vignette CMS admin/maintenance script available.
+ /cartcart.cgi: If this is Dansie Shopping Cart 3.0.8 or earlier, it contains a backdoor to allow attackers to execute arbitrary commands.
+ /cgi-sys/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data.
+ /vgn/ac/data: Vignette CMS admin/maintenance script available.
+ /vgn/jsp/metadataupdate: Vignette CMS admin/maintenance script available.
+ /cgi-sys/.access: Contains authorization information.
+ /shopa_sessionlist.asp: VP-ASP shopping cart test application is available from the web. This page may give the location of .mdb files which may also be available.
+ /vchat/msg.txt: VChat allows user information to be retrieved. See: https://www.securityfocus.com/bid/7186/info
+ /cgi-sys/architext_query.cgi: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands.
+ /securecontrolpanel/: Web Server Control Panel.
+ /nsn/..%5Cutil/send.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server.
+ /WebAdmin.dll?View=Logon: Some versions of WebAdmin are vulnerable to a remote DoS (not tested). See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1247
+ /cgi-sys/classifieds/index.cgi: My Classifieds pre 2.12 is vulnerable to SQL injection attacks.
+ Scan terminated: 0 error(s) and 17 item(s) reported on remote host
+ End Time:           2025-06-18 22:50:19 (GMT-7) (61 seconds)
---------------------------------------------------------------------------
+ 1 host(s) tested
Detailed report
Target
anshinfotech.org
Target IP
162.215.226.6
Scan method
Nikto scan (max 60 sec)
Run command
nikto -host anshinfotech.org -maxtime 60
Duration
Quick report
Scan date
19 Jun 2025 01:50
Copy scan report
Download report
Remove scan result
$
Total scans
Check ports
API - Scan ID