Scan report for "subway-surfers.paineldemonstrativo.com.br"

Membership level: Free member
Summary

Found

12

Duration

1min 1sec

Date

2026-02-23

IP

212.56.45.230

Report
Nikto scan (max 60 sec) (nikto -host subway-surfers.paineldemonstrativo.com.br -maxtime 60)
- Nikto v2.6.0
---------------------------------------------------------------------------
+ Your Nikto installation is out of date.
+ Target IP:          212.56.45.230
+ Target Hostname:    subway-surfers.paineldemonstrativo.com.br
+ Target Port:        80
+ Platform:           Linux/Unix
+ Start Time:         2026-02-23 15:55:18 (GMT-5)
---------------------------------------------------------------------------
+ Server: Apache/2.4.62 (Unix) OpenSSL/1.1.1k
+ No CGI Directories found (use '-C all' to force check all possible dirs). CGI tests skipped.
+ [013587] /: Suggested security header missing: x-content-type-options. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Content-Type-Options
+ [013587] /: Suggested security header missing: strict-transport-security. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security
+ [013587] /: Suggested security header missing: referrer-policy. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Referrer-Policy
+ [013587] /: Suggested security header missing: content-security-policy. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP
+ [013587] /: Suggested security header missing: permissions-policy. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Permissions-Policy
+ [600595] OpenSSL/1.1.1k appears to be outdated (current is at least 3.6.0). OpenSSL 1.1.1w is current for 1.x and is supported via contract, and 3.0.12 for 3.0.x, and 3.1.4 for 3.1.x.
+ [600050] Apache/2.4.62 appears to be outdated (current is at least 2.4.66).
+ [000434] /: HTTP TRACE method is active and replies which suggests the host is vulnerable to XST. See: https://owasp.org/www-community/attacks/Cross_Site_Tracing
+ [999962] /: Server banner changed from 'Apache/2.4.62 (Unix) OpenSSL/1.1.1k' to 'cwpsrv'.
+ [999986] /webmail/: Retrieved x-powered-by header: PHP/7.2.30.
+ [000362] /webmail/: Web based mail package installed.
+ [000777] /user.php?op=confirmnewuser&module=NS-NewUser&uNikto=%22%3E%3Cimg%20src=%22javascript:alert(document.cookie);%22%3E&email=test@test.com: Post Nuke 0.7.2.3-Phoenix is vulnerable to Cross Site Scripting (XSS).
+ Scan terminated: 0 errors and 12 items reported on the remote host
+ End Time:           2026-02-23 15:56:19 (GMT-5) (61 seconds)
---------------------------------------------------------------------------
+ 1 host(s) tested
Detailed report
Target
subway-surfers.paineldemonstrativo.com.br
Target IP
212.56.45.230
Scan method
Nikto scan (max 60 sec)
Run command
nikto -host subway-surfers.paineldemonstrativo.com.br -maxtime 60
Duration
Quick report
Scan date
23 Feb 2026 15:56
Copy scan report
Download report
Remove scan result
$
Total scans
Check ports
API - Scan ID