alguem me da uma ajuda com essa analise aii com o nikto, o resultado foi esse
+ Server: Apache/2.2.9 (Debian) mod_python/3.3.1 Python/2.5.2 mod_ssl/2.2.9 Open
SSL/0.9.8g mod_perl/2.0.4 Perl/v5.10.0
+ Retrieved x-powered-by header: PHP/5.2.17-0.dotdeb.0
+ The anti-clickjacking X-Frame-Options header is not present.
+ Root page / redirects to: site/content/home/
+ No CGI Directories found (use '-C all' to force check all possible dirs)
+ Cookie phpMyAdmin created without the httponly flag
+ OpenSSL/0.9.8g appears to be outdated (current is at least 1.0.1c). OpenSSL 0.
9.8r is also current.
+ mod_ssl/2.2.9 appears to be outdated (current is at least 2.8.31) (may depend
on server version)
+ Apache/2.2.9 appears to be outdated (current is at least Apache/2.2.22). Apach
e 1.3.42 (final release) and 2.0.64 are also current.
+ Perl/v5.10.0 appears to be outdated (current is at least v5.14.2)
+ mod_perl/2.0.4 appears to be outdated (current is at least 2.0.7)
+ Python/2.5.2 appears to be outdated (current is at least 2.7.3)
+ mod_ssl/2.2.9 OpenSSL/0.9.8g mod_perl/2.0.4 Perl/v5.10.0 - mod_ssl 2.8.7 and l
ower are vulnerable to a remote buffer overflow which may allow a remote shell (
difficult to exploit). CVE-2002-0082, OSVDB-756.
+ OSVDB-12184: /index.php?=PHPB8B5F2A0-3C92-11d3-A3A9-4C7B08C10000: PHP reveals
potentially sensitive information via certain HTTP requests that contain specifi
c QUERY strings.
+ OSVDB-3092: /info/: This might be interesting...
+ 6544 items checked: 3100 error(s) and 12 item(s) reported on remote host
+ End Time: 2012-12-25 16:44:11 (GMT-2) (1463 seconds)
---------------------------------------------------------------------------
+ 1 host(s) tested
+ Server: Apache/2.2.9 (Debian) mod_python/3.3.1 Python/2.5.2 mod_ssl/2.2.9 Open
SSL/0.9.8g mod_perl/2.0.4 Perl/v5.10.0
+ Retrieved x-powered-by header: PHP/5.2.17-0.dotdeb.0
+ The anti-clickjacking X-Frame-Options header is not present.
+ Root page / redirects to: site/content/home/
+ No CGI Directories found (use '-C all' to force check all possible dirs)
+ Cookie phpMyAdmin created without the httponly flag
+ OpenSSL/0.9.8g appears to be outdated (current is at least 1.0.1c). OpenSSL 0.
9.8r is also current.
+ mod_ssl/2.2.9 appears to be outdated (current is at least 2.8.31) (may depend
on server version)
+ Apache/2.2.9 appears to be outdated (current is at least Apache/2.2.22). Apach
e 1.3.42 (final release) and 2.0.64 are also current.
+ Perl/v5.10.0 appears to be outdated (current is at least v5.14.2)
+ mod_perl/2.0.4 appears to be outdated (current is at least 2.0.7)
+ Python/2.5.2 appears to be outdated (current is at least 2.7.3)
+ mod_ssl/2.2.9 OpenSSL/0.9.8g mod_perl/2.0.4 Perl/v5.10.0 - mod_ssl 2.8.7 and l
ower are vulnerable to a remote buffer overflow which may allow a remote shell (
difficult to exploit). CVE-2002-0082, OSVDB-756.
+ OSVDB-12184: /index.php?=PHPB8B5F2A0-3C92-11d3-A3A9-4C7B08C10000: PHP reveals
potentially sensitive information via certain HTTP requests that contain specifi
c QUERY strings.
+ OSVDB-3092: /info/: This might be interesting...
+ 6544 items checked: 3100 error(s) and 12 item(s) reported on remote host
+ End Time: 2012-12-25 16:44:11 (GMT-2) (1463 seconds)
---------------------------------------------------------------------------
+ 1 host(s) tested
Comment