Found
Duration
Date
IP
- Nikto v2.6.0 --------------------------------------------------------------------------- + Your Nikto installation is out of date. + Target IP: 212.56.45.230 + Target Hostname: subway-surfers.paineldemonstrativo.com.br + Target Port: 80 + Platform: Linux/Unix + Start Time: 2026-02-23 15:55:18 (GMT-5) --------------------------------------------------------------------------- + Server: Apache/2.4.62 (Unix) OpenSSL/1.1.1k + No CGI Directories found (use '-C all' to force check all possible dirs). CGI tests skipped. + [013587] /: Suggested security header missing: x-content-type-options. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Content-Type-Options + [013587] /: Suggested security header missing: strict-transport-security. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security + [013587] /: Suggested security header missing: referrer-policy. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Referrer-Policy + [013587] /: Suggested security header missing: content-security-policy. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP + [013587] /: Suggested security header missing: permissions-policy. See: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Permissions-Policy + [600595] OpenSSL/1.1.1k appears to be outdated (current is at least 3.6.0). OpenSSL 1.1.1w is current for 1.x and is supported via contract, and 3.0.12 for 3.0.x, and 3.1.4 for 3.1.x. + [600050] Apache/2.4.62 appears to be outdated (current is at least 2.4.66). + [000434] /: HTTP TRACE method is active and replies which suggests the host is vulnerable to XST. See: https://owasp.org/www-community/attacks/Cross_Site_Tracing + [999962] /: Server banner changed from 'Apache/2.4.62 (Unix) OpenSSL/1.1.1k' to 'cwpsrv'. + [999986] /webmail/: Retrieved x-powered-by header: PHP/7.2.30. + [000362] /webmail/: Web based mail package installed. + [000777] /user.php?op=confirmnewuser&module=NS-NewUser&uNikto=%22%3E%3Cimg%20src=%22javascript:alert(document.cookie);%22%3E&email=test@test.com: Post Nuke 0.7.2.3-Phoenix is vulnerable to Cross Site Scripting (XSS). + Scan terminated: 0 errors and 12 items reported on the remote host + End Time: 2026-02-23 15:56:19 (GMT-5) (61 seconds) --------------------------------------------------------------------------- + 1 host(s) tested