Found
Duration
Date
IP
- Nikto --------------------------------------------------------------------------- + Target IP: 162.215.226.6 + Target Hostname: anshinfotech.org + Target Port: 80 + Start Time: 2025-06-18 22:49:18 (GMT-7) --------------------------------------------------------------------------- + Server: nginx + /: Retrieved x-powered-by header: PHP/8.1.31. + /:X-Frame-Options header is deprecated and has been replaced with the Content-Security-Policy HTTP header with the frame-ancestors directive instead. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Frame-Options + /: The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type. See: https://www.netsparker.com/web-vulnerability-scanner/vulnerabilities/missing-content-type-header/ + /cgi-sys/photo/protected/manage.cgi: My Photo Gallery management interface. May allow full access to photo galleries and more. Versions before 3.8 allowed anyone to view contents of any directory on systems. + /vgn/performance/TMT: Vignette CMS admin/maintenance script available. + /cartcart.cgi: If this is Dansie Shopping Cart 3.0.8 or earlier, it contains a backdoor to allow attackers to execute arbitrary commands. + /cgi-sys/wconsole.dll: It may be possible to overflow this dll with 1024 bytes of data. + /vgn/ac/data: Vignette CMS admin/maintenance script available. + /vgn/jsp/metadataupdate: Vignette CMS admin/maintenance script available. + /cgi-sys/.access: Contains authorization information. + /shopa_sessionlist.asp: VP-ASP shopping cart test application is available from the web. This page may give the location of .mdb files which may also be available. + /vchat/msg.txt: VChat allows user information to be retrieved. See: https://www.securityfocus.com/bid/7186/info + /cgi-sys/architext_query.cgi: Versions older than 1.1 of Excite for Web Servers allow attackers to execute arbitrary commands. + /securecontrolpanel/: Web Server Control Panel. + /nsn/..%5Cutil/send.bas: Netbase util access is possible which means that several utility scripts might be run (including directory listings, NDS tree enumeration and running .bas files on server. + /WebAdmin.dll?View=Logon: Some versions of WebAdmin are vulnerable to a remote DoS (not tested). See: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1247 + /cgi-sys/classifieds/index.cgi: My Classifieds pre 2.12 is vulnerable to SQL injection attacks. + Scan terminated: 0 error(s) and 17 item(s) reported on remote host + End Time: 2025-06-18 22:50:19 (GMT-7) (61 seconds) --------------------------------------------------------------------------- + 1 host(s) tested