wirehack7

Untitled

Aug 29th, 2017
333
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.34 KB | None | 0 0
  1. - Nikto v2.1.6/2.1.5
  2. + Target Host: 10.10.10.27
  3. + Target Port: 80
  4. + GET Server leaks inodes via ETags, header found with file /, fields: 0x202 0x552f4401e2464
  5. + GET The anti-clickjacking X-Frame-Options header is not present.
  6. + GET The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
  7. + GET The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
  8. + OPTIONS Allowed HTTP Methods: OPTIONS, GET, HEAD, POST
  9. + OSVDB-29786: GET /admin.php?en_log_id=0&action=config: EasyNews from http://www.webrc.ca version 4.3 allows remote admin access. This PHP file should be protected.
  10. + OSVDB-29786: GET /admin.php?en_log_id=0&action=users: EasyNews from http://www.webrc.ca version 4.3 allows remote admin access. This PHP file should be protected.
  11. + OSVDB-3092: GET /admin.php: This might be interesting...
  12. + OSVDB-3233: GET /icons/README: Apache default file found.
  13. + GET The anti-clickjacking X-Frame-Options header is not present.
  14. + GET The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
  15. + GET The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
Advertisement
Add Comment
Please, Sign In to add comment