Scan report for "www.antifurry.xyz"

Membership level: Free member
Summary

Found

6

Duration

1min 1sec

Date

2025-02-27

IP

38.46.216.103

Report
Nikto scan (max 60 sec) (nikto -host www.antifurry.xyz -maxtime 60)
- Nikto 
---------------------------------------------------------------------------
+ Target IP:          38.46.216.103
+ Target Hostname:    www.antifurry.xyz
+ Target Port:        80
+ Start Time:         2025-02-27 00:05:40 (GMT-8)
---------------------------------------------------------------------------
+ Server: nginx
+ /: The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type. See: https://www.netsparker.com/web-vulnerability-scanner/vulnerabilities/missing-content-type-header/
+ OPTIONS: Allowed HTTP Methods: GET, POST, OPTIONS, HEAD .
+ /webmail/blank.html: IlohaMail 0.8.10 contains an XSS vulnerability. Previous versions contain other non-descript vulnerabilities.
+ /securecontrolpanel/: Web Server Control Panel.
+ /webmail/: Web based mail package installed.
+ /mailman/listinfo: Mailman was found on the server. See: CWE-552
+ Scan terminated: 0 error(s) and 6 item(s) reported on remote host
+ End Time:           2025-02-27 00:06:41 (GMT-8) (61 seconds)
---------------------------------------------------------------------------
+ 1 host(s) tested
Detailed report
Target
www.antifurry.xyz
Target IP
38.46.216.103
Scan method
Nikto scan (max 60 sec)
Run command
nikto -host www.antifurry.xyz -maxtime 60
Duration
Quick report
Scan date
27 Feb 2025 03:06
Copy scan report
Download report
Remove scan result
$
Check ports
API - Scan ID