NotesWhat is notes.io?

Notes brand slogan

Notes - notes.io

Vulnerabilities: 37

-# Vulnerabilities #-

-- Domain Disclosure (vulnerability/information_disclosure/domain_disclosure) --

+---------------+-------------------------------------------------------------+
| Occurrence ID | bb2cd1f7d21e821cc54b7a2ea5321522 |
+===============+=============================================================+
| Title | Possible subdomain leak |
+---------------+-------------------------------------------------------------+
| Found By | DNS Bruteforcer |
+---------------+-------------------------------------------------------------+
| Level | low |
+---------------+-------------------------------------------------------------+
| CVSS Base | 2.2 |
+---------------+-------------------------------------------------------------+
| Location | webmail.bizimtavuklar.com |
+---------------+-------------------------------------------------------------+
| Description | A subdomain was discovered which may be an unwanted |
| | information disclosure. |
+---------------+-------------------------------------------------------------+
| Solution | Please visit the reference website for more information on |
| | how to patch this vulnerability. |
+---------------+-------------------------------------------------------------+
| Taxonomy | CWE-200 |
+---------------+-------------------------------------------------------------+
| References | https://cwe.mitre.org/data/definitions/200.html |
| | https://www.owasp.org/index.php/Information_Leakage |
+---------------+-------------------------------------------------------------+

-- Invalid SSL/TLS Certificate (vulnerability/ssl/invalid_certificate) --

+---------------+-------------------------------------------------------------+
| Occurrence ID | fccade227d04319877bab1b43231ad1a |
+===============+=============================================================+
| Title | Invalid SSL/TLS Certificate |
+---------------+-------------------------------------------------------------+
| Found By | SSLScan |
+---------------+-------------------------------------------------------------+
| Level | low |
+---------------+-------------------------------------------------------------+
| CVSS Base | 5.8 |
+---------------+-------------------------------------------------------------+
| Location | bizimtavuklar.com |
+---------------+-------------------------------------------------------------+
| Description | An invalid SSL/TLS certificate was found. This may allow a |
| | strategically located attacker to snoop on network traffic, |
| | or perform a Man-In-The-Middle attack against unsuspecting |
| | users connecting to this host. |
+---------------+-------------------------------------------------------------+
| Solution | Create a new certificate. |
+---------------+-------------------------------------------------------------+
| Taxonomy | CWE-327 |
+---------------+-------------------------------------------------------------+
| References | https://cwe.mitre.org/data/definitions/327.html |
+---------------+-------------------------------------------------------------+

+---------------+-------------------------------------------------------------+
| Occurrence ID | aa2091a8f9419919c5b981023ea1e2a3 |
+===============+=============================================================+
| Title | Invalid SSL/TLS Certificate |
+---------------+-------------------------------------------------------------+
| Found By | SSLScan |
+---------------+-------------------------------------------------------------+
| Level | low |
+---------------+-------------------------------------------------------------+
| CVSS Base | 5.8 |
+---------------+-------------------------------------------------------------+
| Location | giris.bizimtavuklar.com |
+---------------+-------------------------------------------------------------+
| Description | An invalid SSL/TLS certificate was found. This may allow a |
| | strategically located attacker to snoop on network traffic, |
| | or perform a Man-In-The-Middle attack against unsuspecting |
| | users connecting to this host. |
+---------------+-------------------------------------------------------------+
| Solution | Create a new certificate. |
+---------------+-------------------------------------------------------------+
| Taxonomy | CWE-327 |
+---------------+-------------------------------------------------------------+
| References | https://cwe.mitre.org/data/definitions/327.html |
+---------------+-------------------------------------------------------------+

-- URL Disclosure (vulnerability/information_disclosure/url_disclosure) --

+---------------+-------------------------------------------------------------+
| Occurrence ID | a699eb7889a17c3b8c5e7bb6e7c952fe |
+===============+=============================================================+
| Title | URL Disclosure |
+---------------+-------------------------------------------------------------+
| Found By | Bruteforce predictables discovery |
+---------------+-------------------------------------------------------------+
| Level | informational |
+---------------+-------------------------------------------------------------+
| CVSS Base | 2.9 |
+---------------+-------------------------------------------------------------+
| Location | http://giris.bizimtavuklar.com/index.php?u= |
+---------------+-------------------------------------------------------------+
| Description | These are URLs that are accessible but not linked from the |
| | web site itself. It may indicate a poor attempt at |
| | concealing information. For example: - Backup files: |
| | http://www.example.com/ **index.php.old** - Alternative |
| | file names: http://www.example.com/ **index4.php** - |
| | Remnants of deployment: http://www.example.com/ |
| | **build.xml** - Poorly configured servers: |
| | http://www.example.com/ **error_log** - Forgotten server |
| | files: http://www.example.com/ **server-status** |
+---------------+-------------------------------------------------------------+
| Solution | Remove any sensitive information that may have been left |
| | behind. If it's not possible to remove it, block access to |
| | it from the HTTP server. |
+---------------+-------------------------------------------------------------+
| Taxonomy | CWE-200 |
+---------------+-------------------------------------------------------------+
| References | https://cwe.mitre.org/data/definitions/200.html |
| | https://www.owasp.org/index.php/Information_Leakage |
+---------------+-------------------------------------------------------------+

+---------------+-------------------------------------------------------------+
| Occurrence ID | e735cf2fccd56df4d14756abcd7f58d3 |
+===============+=============================================================+
| Title | URL Disclosure |
+---------------+-------------------------------------------------------------+
| Found By | Bruteforce predictables discovery |
+---------------+-------------------------------------------------------------+
| Level | informational |
+---------------+-------------------------------------------------------------+
| CVSS Base | 2.9 |
+---------------+-------------------------------------------------------------+
| Location | http://giris.bizimtavuklar.com/admin.php |
+---------------+-------------------------------------------------------------+
| Description | These are URLs that are accessible but not linked from the |
| | web site itself. It may indicate a poor attempt at |
| | concealing information. For example: - Backup files: |
| | http://www.example.com/ **index.php.old** - Alternative |
| | file names: http://www.example.com/ **index4.php** - |
| | Remnants of deployment: http://www.example.com/ |
| | **build.xml** - Poorly configured servers: |
| | http://www.example.com/ **error_log** - Forgotten server |
| | files: http://www.example.com/ **server-status** |
+---------------+-------------------------------------------------------------+
| Solution | Remove any sensitive information that may have been left |
| | behind. If it's not possible to remove it, block access to |
| | it from the HTTP server. |
+---------------+-------------------------------------------------------------+
| Taxonomy | CWE-200 |
+---------------+-------------------------------------------------------------+
| References | https://cwe.mitre.org/data/definitions/200.html |
| | https://www.owasp.org/index.php/Information_Leakage |
+---------------+-------------------------------------------------------------+

+---------------+-------------------------------------------------------------+
| Occurrence ID | 9744e80f0d6fc3ff16bcee1a25f32bfa |
+===============+=============================================================+
| Title | URL Disclosure |
+---------------+-------------------------------------------------------------+
| Found By | Bruteforce predictables discovery |
+---------------+-------------------------------------------------------------+
| Level | informational |
+---------------+-------------------------------------------------------------+
| CVSS Base | 2.9 |
+---------------+-------------------------------------------------------------+
| Location | http://bizimtavuklar.com/index.php?u= |
+---------------+-------------------------------------------------------------+
| Description | These are URLs that are accessible but not linked from the |
| | web site itself. It may indicate a poor attempt at |
| | concealing information. For example: - Backup files: |
| | http://www.example.com/ **index.php.old** - Alternative |
| | file names: http://www.example.com/ **index4.php** - |
| | Remnants of deployment: http://www.example.com/ |
| | **build.xml** - Poorly configured servers: |
| | http://www.example.com/ **error_log** - Forgotten server |
| | files: http://www.example.com/ **server-status** |
+---------------+-------------------------------------------------------------+
| Solution | Remove any sensitive information that may have been left |
| | behind. If it's not possible to remove it, block access to |
| | it from the HTTP server. |
+---------------+-------------------------------------------------------------+
| Taxonomy | CWE-200 |
+---------------+-------------------------------------------------------------+
| References | https://cwe.mitre.org/data/definitions/200.html |
| | https://www.owasp.org/index.php/Information_Leakage |
+---------------+-------------------------------------------------------------+

-- Vulnerable Web Application (vulnerability/infrastructure/vulnerable_webapp) --

+---------------+-------------------------------------------------------------+
| Occurrence ID | f9be8ccb245c7b6ec25f0a76a3bf7647 |
+===============+=============================================================+
| Title | Vulnerable Web Application |
+---------------+-------------------------------------------------------------+
| Found By | Nikto |
+---------------+-------------------------------------------------------------+
| Level | high |
+---------------+-------------------------------------------------------------+
| CVSS Base | 8.5 |
+---------------+-------------------------------------------------------------+
| Location | http://bizimtavuklar.com/?=PHPE9568F35-D428-11d2-A769-00AA0 |
| | 01ACF42 |
+---------------+-------------------------------------------------------------+
| Description | PHP reveals potentially sensitive information via certain |
| | HTTP requests that contain specific QUERY strings. |
+---------------+-------------------------------------------------------------+
| Solution | Apply all missing patches or upgrade to a newer version. |
+---------------+-------------------------------------------------------------+
| Taxonomy | OSVDB-12184 |
+---------------+-------------------------------------------------------------+
| References | http://osvdb.org/show/osvdb/12184 |
+---------------+-------------------------------------------------------------+

+---------------+-------------------------------------------------------------+
| Occurrence ID | 72865321a4d014d427f2d4c003507f7c |
+===============+=============================================================+
| Title | Vulnerable Web Application |
+---------------+-------------------------------------------------------------+
| Found By | Nikto |
+---------------+-------------------------------------------------------------+
| Level | high |
+---------------+-------------------------------------------------------------+
| CVSS Base | 8.5 |
+---------------+-------------------------------------------------------------+
| Location | http://giris.bizimtavuklar.com/?=PHPE9568F35-D428-11d2-A769 |
| | -00AA001ACF42 |
+---------------+-------------------------------------------------------------+
| Description | PHP reveals potentially sensitive information via certain |
| | HTTP requests that contain specific QUERY strings. |
+---------------+-------------------------------------------------------------+
| Solution | Apply all missing patches or upgrade to a newer version. |
+---------------+-------------------------------------------------------------+
| Taxonomy | OSVDB-12184 |
+---------------+-------------------------------------------------------------+
| References | http://osvdb.org/show/osvdb/12184 |
+---------------+-------------------------------------------------------------+

+---------------+-------------------------------------------------------------+
| Occurrence ID | 08d7db1880422feb421c7a25e3fa002d |
+===============+=============================================================+
| Title | Vulnerable Web Application |
+---------------+-------------------------------------------------------------+
| Found By | Nikto |
+---------------+-------------------------------------------------------------+
| Level | high |
+---------------+-------------------------------------------------------------+
| CVSS Base | 8.5 |
+---------------+-------------------------------------------------------------+
| Location | http://bizimtavuklar.com/?=PHPE9568F34-D428-11d2-A769-00AA0 |
| | 01ACF42 |
+---------------+-------------------------------------------------------------+
| Description | PHP reveals potentially sensitive information via certain |
| | HTTP requests that contain specific QUERY strings. |
+---------------+-------------------------------------------------------------+
| Solution | Apply all missing patches or upgrade to a newer version. |
+---------------+-------------------------------------------------------------+
| Taxonomy | OSVDB-12184 |
+---------------+-------------------------------------------------------------+
| References | http://osvdb.org/show/osvdb/12184 |
+---------------+-------------------------------------------------------------+

+---------------+-------------------------------------------------------------+
| Occurrence ID | 517a6881465a0c17ea5287323af5367b |
+===============+=============================================================+
| Title | Vulnerable Web Application |
+---------------+-------------------------------------------------------------+
| Found By | Nikto |
+---------------+-------------------------------------------------------------+
| Level | high |
+---------------+-------------------------------------------------------------+
| CVSS Base | 8.5 |
+---------------+-------------------------------------------------------------+
| Location | http://giris.bizimtavuklar.com/?=PHPE9568F34-D428-11d2-A769 |
| | -00AA001ACF42 |
+---------------+-------------------------------------------------------------+
| Description | PHP reveals potentially sensitive information via certain |
| | HTTP requests that contain specific QUERY strings. |
+---------------+-------------------------------------------------------------+
| Solution | Apply all missing patches or upgrade to a newer version. |
+---------------+-------------------------------------------------------------+
| Taxonomy | OSVDB-12184 |
+---------------+-------------------------------------------------------------+
| References | http://osvdb.org/show/osvdb/12184 |
+---------------+-------------------------------------------------------------+

+---------------+-------------------------------------------------------------+
| Occurrence ID | cf1e82b1663823ab6e8383cac578bd9e |
+===============+=============================================================+
| Title | Vulnerable Web Application |
+---------------+-------------------------------------------------------------+
| Found By | Nikto |
+---------------+-------------------------------------------------------------+
| Level | high |
+---------------+-------------------------------------------------------------+
| CVSS Base | 8.5 |
+---------------+-------------------------------------------------------------+
| Location | http://bizimtavuklar.com/icons/ |
+---------------+-------------------------------------------------------------+
| Description | Directory indexing found. |
+---------------+-------------------------------------------------------------+
| Solution | Apply all missing patches or upgrade to a newer version. |
+---------------+-------------------------------------------------------------+
| Taxonomy | OSVDB-3268 |
+---------------+-------------------------------------------------------------+
| References | http://osvdb.org/show/osvdb/3268 |
+---------------+-------------------------------------------------------------+

+---------------+-------------------------------------------------------------+
| Occurrence ID | 6b8c4bc16fc5e87373431a09d0a09c26 |
+===============+=============================================================+
| Title | Vulnerable Web Application |
+---------------+-------------------------------------------------------------+
| Found By | Nikto |
+---------------+-------------------------------------------------------------+
| Level | high |
+---------------+-------------------------------------------------------------+
| CVSS Base | 8.5 |
+---------------+-------------------------------------------------------------+
| Location | http://giris.bizimtavuklar.com/admin.php?action=users&en_lo |
| | g_id=0 |
+---------------+-------------------------------------------------------------+
| Description | EasyNews from http://www.webrc.ca version 4.3 allows remote |
| | admin access. This PHP file should be protected. |
+---------------+-------------------------------------------------------------+
| Solution | Apply all missing patches or upgrade to a newer version. |
+---------------+-------------------------------------------------------------+
| Taxonomy | OSVDB-29786 |
+---------------+-------------------------------------------------------------+
| References | http://osvdb.org/show/osvdb/29786 |
| | http://www.webrc.ca |
+---------------+-------------------------------------------------------------+

+---------------+-------------------------------------------------------------+
| Occurrence ID | dafd50d51fc41074e2a1e241984b269b |
+===============+=============================================================+
| Title | Vulnerable Web Application |
+---------------+-------------------------------------------------------------+
| Found By | Nikto |
+---------------+-------------------------------------------------------------+
| Level | high |
+---------------+-------------------------------------------------------------+
| CVSS Base | 8.5 |
+---------------+-------------------------------------------------------------+
| Location | http://bizimtavuklar.com/?=PHPB8B5F2A0-3C92-11d3-A3A9-4C7B0 |
| | 8C10000 |
+---------------+-------------------------------------------------------------+
| Description | PHP reveals potentially sensitive information via certain |
| | HTTP requests that contain specific QUERY strings. |
+---------------+-------------------------------------------------------------+
| Solution | Apply all missing patches or upgrade to a newer version. |
+---------------+-------------------------------------------------------------+
| Taxonomy | OSVDB-12184 |
+---------------+-------------------------------------------------------------+
| References | http://osvdb.org/show/osvdb/12184 |
+---------------+-------------------------------------------------------------+

+---------------+-------------------------------------------------------------+
| Occurrence ID | ad9e4b5cb79acfb5ecd7bd6c20053271 |
+===============+=============================================================+
| Title | Vulnerable Web Application |
+---------------+-------------------------------------------------------------+
| Found By | Nikto |
+---------------+-------------------------------------------------------------+
| Level | high |
+---------------+-------------------------------------------------------------+
| CVSS Base | 8.5 |
+---------------+-------------------------------------------------------------+
| Location | http://giris.bizimtavuklar.com/admin.php |
+---------------+-------------------------------------------------------------+
| Description | This might be interesting... |
+---------------+-------------------------------------------------------------+
| Solution | Apply all missing patches or upgrade to a newer version. |
+---------------+-------------------------------------------------------------+
| Taxonomy | OSVDB-3092 |
+---------------+-------------------------------------------------------------+
| References | http://osvdb.org/show/osvdb/3092 |
+---------------+-------------------------------------------------------------+

+---------------+-------------------------------------------------------------+
| Occurrence ID | 8c90654ce3d461dc8041811be081c16c |
+===============+=============================================================+
| Title | Vulnerable Web Application |
+---------------+-------------------------------------------------------------+
| Found By | Nikto |
+---------------+-------------------------------------------------------------+
| Level | high |
+---------------+-------------------------------------------------------------+
| CVSS Base | 8.5 |
+---------------+-------------------------------------------------------------+
| Location | http://giris.bizimtavuklar.com/icons/ |
+---------------+-------------------------------------------------------------+
| Description | Directory indexing found. |
+---------------+-------------------------------------------------------------+
| Solution | Apply all missing patches or upgrade to a newer version. |
+---------------+-------------------------------------------------------------+
| Taxonomy | OSVDB-3268 |
+---------------+-------------------------------------------------------------+
| References | http://osvdb.org/show/osvdb/3268 |
+---------------+-------------------------------------------------------------+

+---------------+-------------------------------------------------------------+
| Occurrence ID | d69a399d54cd0a39ddd97add4207c940 |
+===============+=============================================================+
| Title | Vulnerable Web Application |
+---------------+-------------------------------------------------------------+
| Found By | Nikto |
+---------------+-------------------------------------------------------------+
| Level | high |
+---------------+-------------------------------------------------------------+
| CVSS Base | 8.5 |
+---------------+-------------------------------------------------------------+
| Location | http://giris.bizimtavuklar.com/?=PHPB8B5F2A0-3C92-11d3-A3A9 |
| | -4C7B08C10000 |
+---------------+-------------------------------------------------------------+
| Description | PHP reveals potentially sensitive information via certain |
| | HTTP requests that contain specific QUERY strings. |
+---------------+-------------------------------------------------------------+
| Solution | Apply all missing patches or upgrade to a newer version. |
+---------------+-------------------------------------------------------------+
| Taxonomy | OSVDB-12184 |
+---------------+-------------------------------------------------------------+
| References | http://osvdb.org/show/osvdb/12184 |
+---------------+-------------------------------------------------------------+

+---------------+-------------------------------------------------------------+
| Occurrence ID | 95c2b9a32864fd9a8624566ca02af601 |
+===============+=============================================================+
| Title | Vulnerable Web Application |
+---------------+-------------------------------------------------------------+
| Found By | Nikto |
+---------------+-------------------------------------------------------------+
| Level | high |
+---------------+-------------------------------------------------------------+
| CVSS Base | 8.5 |
+---------------+-------------------------------------------------------------+
| Location | http://giris.bizimtavuklar.com/error_log |
+---------------+-------------------------------------------------------------+
| Description | This might be interesting... |
+---------------+-------------------------------------------------------------+
| Solution | Apply all missing patches or upgrade to a newer version. |
+---------------+-------------------------------------------------------------+
| Taxonomy | OSVDB-3092 |
+---------------+-------------------------------------------------------------+
| References | http://osvdb.org/show/osvdb/3092 |
+---------------+-------------------------------------------------------------+

+---------------+-------------------------------------------------------------+
| Occurrence ID | a49507ed956407e576fc09369b6fac4a |
+===============+=============================================================+
| Title | Vulnerable Web Application |
+---------------+-------------------------------------------------------------+
| Found By | Nikto |
+---------------+-------------------------------------------------------------+
| Level | high |
+---------------+-------------------------------------------------------------+
| CVSS Base | 8.5 |
+---------------+-------------------------------------------------------------+
| Location | http://giris.bizimtavuklar.com/admin.php?action=config&en_l |
| | og_id=0 |
+---------------+-------------------------------------------------------------+
| Description | EasyNews from http://www.webrc.ca version 4.3 allows remote |
| | admin access. This PHP file should be protected. |
+---------------+-------------------------------------------------------------+
| Solution | Apply all missing patches or upgrade to a newer version. |
+---------------+-------------------------------------------------------------+
| Taxonomy | OSVDB-29786 |
+---------------+-------------------------------------------------------------+
| References | http://osvdb.org/show/osvdb/29786 |
| | http://www.webrc.ca |
+---------------+-------------------------------------------------------------+

+---------------+-------------------------------------------------------------+
| Occurrence ID | 769b03552d0d1dc90575678393f0b1f6 |
+===============+=============================================================+
| Title | Vulnerable Web Application |
+---------------+-------------------------------------------------------------+
| Found By | Nikto |
+---------------+-------------------------------------------------------------+
| Level | high |
+---------------+-------------------------------------------------------------+
| CVSS Base | 8.5 |
+---------------+-------------------------------------------------------------+
| Location | http://bizimtavuklar.com/icons/README |
+---------------+-------------------------------------------------------------+
| Description | Apache default file found. |
+---------------+-------------------------------------------------------------+
| Solution | Apply all missing patches or upgrade to a newer version. |
+---------------+-------------------------------------------------------------+
| Taxonomy | OSVDB-3233 |
+---------------+-------------------------------------------------------------+
| References | http://osvdb.org/show/osvdb/3233 |
+---------------+-------------------------------------------------------------+

+---------------+-------------------------------------------------------------+
| Occurrence ID | 94fec252e51414a83a514458e44e860a |
+===============+=============================================================+
| Title | Vulnerable Web Application |
+---------------+-------------------------------------------------------------+
| Found By | Nikto |
+---------------+-------------------------------------------------------------+
| Level | high |
+---------------+-------------------------------------------------------------+
| CVSS Base | 8.5 |
+---------------+-------------------------------------------------------------+
| Location | http://giris.bizimtavuklar.com/icons/README |
+---------------+-------------------------------------------------------------+
| Description | Apache default file found. |
+---------------+-------------------------------------------------------------+
| Solution | Apply all missing patches or upgrade to a newer version. |
+---------------+-------------------------------------------------------------+
| Taxonomy | OSVDB-3233 |
+---------------+-------------------------------------------------------------+
| References | http://osvdb.org/show/osvdb/3233 |
+---------------+-------------------------------------------------------------+

-- Uncategorized Vulnerability (vulnerability/generic) --

+---------------+-------------------------------------------------------------+
| Occurrence ID | dc657a99331fe28d96dcc74359033d95 |
+===============+=============================================================+
| Title | User attention required by: Nikto |
+---------------+-------------------------------------------------------------+
| Found By | Nikto |
+---------------+-------------------------------------------------------------+
| Level | informational |
+---------------+-------------------------------------------------------------+
| CVSS Base | 0.0 |
+---------------+-------------------------------------------------------------+
| Location | http://bizimtavuklar.com/ |
+---------------+-------------------------------------------------------------+
| Description | Cookie PHPSESSID created without the httponly flag |
+---------------+-------------------------------------------------------------+
| Solution | No additional details are available. |
+---------------+-------------------------------------------------------------+

+---------------+-------------------------------------------------------------+
| Occurrence ID | 543514af9969915bb35cdd489bfe9a53 |
+===============+=============================================================+
| Title | User attention required by: Nikto |
+---------------+-------------------------------------------------------------+
| Found By | Nikto |
+---------------+-------------------------------------------------------------+
| Level | informational |
+---------------+-------------------------------------------------------------+
| CVSS Base | 0.0 |
+---------------+-------------------------------------------------------------+
| Location | http://bizimtavuklar.com/ |
+---------------+-------------------------------------------------------------+
| Description | The X-XSS-Protection header is not defined. This header can |
| | hint to the user agent to protect against some forms of XSS |
+---------------+-------------------------------------------------------------+
| Solution | No additional details are available. |
+---------------+-------------------------------------------------------------+

+---------------+-------------------------------------------------------------+
| Occurrence ID | 99acf030d90006a177bfb1a89e014e3b |
+===============+=============================================================+
| Title | User attention required by: Nikto |
+---------------+-------------------------------------------------------------+
| Found By | Nikto |
+---------------+-------------------------------------------------------------+
| Level | informational |
+---------------+-------------------------------------------------------------+
| CVSS Base | 0.0 |
+---------------+-------------------------------------------------------------+
| Location | http://giris.bizimtavuklar.com/ |
+---------------+-------------------------------------------------------------+
| Description | The anti-clickjacking X-Frame-Options header is not |
| | present. |
+---------------+-------------------------------------------------------------+
| Solution | No additional details are available. |
+---------------+-------------------------------------------------------------+

+---------------+-------------------------------------------------------------+
| Occurrence ID | af8260da297afaab9de5bd15c2eceb41 |
+===============+=============================================================+
| Title | User attention required by: Nikto |
+---------------+-------------------------------------------------------------+
| Found By | Nikto |
+---------------+-------------------------------------------------------------+
| Level | informational |
+---------------+-------------------------------------------------------------+
| CVSS Base | 0.0 |
+---------------+-------------------------------------------------------------+
| Location | http://bizimtavuklar.com/ |
+---------------+-------------------------------------------------------------+
| Description | The X-Content-Type-Options header is not set. This could |
| | allow the user agent to render the content of the site in a |
| | different fashion to the MIME type |
+---------------+-------------------------------------------------------------+
| Solution | No additional details are available. |
+---------------+-------------------------------------------------------------+

+---------------+-------------------------------------------------------------+
| Occurrence ID | bb4743d7d66b4a0e3831d3cbdd32bc0d |
+===============+=============================================================+
| Title | User attention required by: Nikto |
+---------------+-------------------------------------------------------------+
| Found By | Nikto |
+---------------+-------------------------------------------------------------+
| Level | informational |
+---------------+-------------------------------------------------------------+
| CVSS Base | 0.0 |
+---------------+-------------------------------------------------------------+
| Location | http://bizimtavuklar.com/ |
+---------------+-------------------------------------------------------------+
| Description | The anti-clickjacking X-Frame-Options header is not |
| | present. |
+---------------+-------------------------------------------------------------+
| Solution | No additional details are available. |
+---------------+-------------------------------------------------------------+

+---------------+-------------------------------------------------------------+
| Occurrence ID | dedd1155baba9f0ab0886dfea13f833e |
+===============+=============================================================+
| Title | User attention required by: Nikto |
+---------------+-------------------------------------------------------------+
| Found By | Nikto |
+---------------+-------------------------------------------------------------+
| Level | informational |
+---------------+-------------------------------------------------------------+
| CVSS Base | 0.0 |
+---------------+-------------------------------------------------------------+
| Location | http://giris.bizimtavuklar.com/index2.php?content=http%3A%2 |
| | F%2Fcirt.net%2Frfiinc.txt%3F |
+---------------+-------------------------------------------------------------+
| Description | A database error may reveal internal details about the |
| | running database. |
+---------------+-------------------------------------------------------------+
| Solution | No additional details are available. |
+---------------+-------------------------------------------------------------+

+---------------+-------------------------------------------------------------+
| Occurrence ID | 51158b9175295cbe68c40b429f5b720a |
+===============+=============================================================+
| Title | User attention required by: Nikto |
+---------------+-------------------------------------------------------------+
| Found By | Nikto |
+---------------+-------------------------------------------------------------+
| Level | informational |
+---------------+-------------------------------------------------------------+
| CVSS Base | 0.0 |
+---------------+-------------------------------------------------------------+
| Location | http://giris.bizimtavuklar.com/ |
+---------------+-------------------------------------------------------------+
| Description | The X-XSS-Protection header is not defined. This header can |
| | hint to the user agent to protect against some forms of XSS |
+---------------+-------------------------------------------------------------+
| Solution | No additional details are available. |
+---------------+-------------------------------------------------------------+

+---------------+-------------------------------------------------------------+
| Occurrence ID | 945bcd021b371b7a4881909b36820c41 |
+===============+=============================================================+
| Title | User attention required by: Nikto |
+---------------+-------------------------------------------------------------+
| Found By | Nikto |
+---------------+-------------------------------------------------------------+
| Level | informational |
+---------------+-------------------------------------------------------------+
| CVSS Base | 0.0 |
+---------------+-------------------------------------------------------------+
| Location | http://giris.bizimtavuklar.com/ |
+---------------+-------------------------------------------------------------+
| Description | Cookie PHPSESSID created without the httponly flag |
+---------------+-------------------------------------------------------------+
| Solution | No additional details are available. |
+---------------+-------------------------------------------------------------+

+---------------+-------------------------------------------------------------+
| Occurrence ID | fd52b756c52b1ceb5c80a033f7467568 |
+===============+=============================================================+
| Title | User attention required by: Nikto |
+---------------+-------------------------------------------------------------+
| Found By | Nikto |
+---------------+-------------------------------------------------------------+
| Level | informational |
+---------------+-------------------------------------------------------------+
| CVSS Base | 0.0 |
+---------------+-------------------------------------------------------------+
| Location | http://bizimtavuklar.com/blogindex/ |
+---------------+-------------------------------------------------------------+
| Description | Admin login page/section found. |
+---------------+-------------------------------------------------------------+
| Solution | No additional details are available. |
+---------------+-------------------------------------------------------------+

+---------------+-------------------------------------------------------------+
| Occurrence ID | 89033a0924a52cd9376bddb6442534f4 |
+===============+=============================================================+
| Title | User attention required by: Nikto |
+---------------+-------------------------------------------------------------+
| Found By | Nikto |
+---------------+-------------------------------------------------------------+
| Level | informational |
+---------------+-------------------------------------------------------------+
| CVSS Base | 0.0 |
+---------------+-------------------------------------------------------------+
| Location | http://bizimtavuklar.com/ |
+---------------+-------------------------------------------------------------+
| Description | Retrieved x-powered-by header: ARRAY(0x55aa7f8c45b0) |
+---------------+-------------------------------------------------------------+
| Solution | No additional details are available. |
+---------------+-------------------------------------------------------------+

+---------------+-------------------------------------------------------------+
| Occurrence ID | 686dc49b867198e6207839a061ae05f2 |
+===============+=============================================================+
| Title | User attention required by: Nikto |
+---------------+-------------------------------------------------------------+
| Found By | Nikto |
+---------------+-------------------------------------------------------------+
| Level | informational |
+---------------+-------------------------------------------------------------+
| CVSS Base | 0.0 |
+---------------+-------------------------------------------------------------+
| Location | http://bizimtavuklar.com/VH0pfo83._ |
+---------------+-------------------------------------------------------------+
| Description | Server leaks inodes via ETags, header found with file |
| | /VH0pfo83._, inode: 2361340, size: 1027, mtime: Tue May 2 |
| | 11:20:16 2017 |
+---------------+-------------------------------------------------------------+
| Solution | No additional details are available. |
+---------------+-------------------------------------------------------------+

+---------------+-------------------------------------------------------------+
| Occurrence ID | 2b6c9840e148097f935f3f58b77a2ea7 |
+===============+=============================================================+
| Title | User attention required by: Nikto |
+---------------+-------------------------------------------------------------+
| Found By | Nikto |
+---------------+-------------------------------------------------------------+
| Level | informational |
+---------------+-------------------------------------------------------------+
| CVSS Base | 0.0 |
+---------------+-------------------------------------------------------------+
| Location | http://giris.bizimtavuklar.com/index2.php?s=http%3A%2F%2Fci |
| | rt.net%2Frfiinc.txt%3F |
+---------------+-------------------------------------------------------------+
| Description | A database error may reveal internal details about the |
| | running database. |
+---------------+-------------------------------------------------------------+
| Solution | No additional details are available. |
+---------------+-------------------------------------------------------------+

+---------------+-------------------------------------------------------------+
| Occurrence ID | 17cd538575efe172a6d79255124be7c5 |
+===============+=============================================================+
| Title | User attention required by: Nikto |
+---------------+-------------------------------------------------------------+
| Found By | Nikto |
+---------------+-------------------------------------------------------------+
| Level | informational |
+---------------+-------------------------------------------------------------+
| CVSS Base | 0.0 |
+---------------+-------------------------------------------------------------+
| Location | http://giris.bizimtavuklar.com/index2.php?=http%3A%2F%2Fcir |
| | t.net%2Frfiinc.txt%3F |
+---------------+-------------------------------------------------------------+
| Description | A database error may reveal internal details about the |
| | running database. |
+---------------+-------------------------------------------------------------+
| Solution | No additional details are available. |
+---------------+-------------------------------------------------------------+

+---------------+-------------------------------------------------------------+
| Occurrence ID | e2ad59258311237a1cd5dc44878cb703 |
+===============+=============================================================+
| Title | User attention required by: Nikto |
+---------------+-------------------------------------------------------------+
| Found By | Nikto |
+---------------+-------------------------------------------------------------+
| Level | informational |
+---------------+-------------------------------------------------------------+
| CVSS Base | 0.0 |
+---------------+-------------------------------------------------------------+
| Location | http://giris.bizimtavuklar.com/ |
+---------------+-------------------------------------------------------------+
| Description | Retrieved x-powered-by header: ARRAY(0x55d2e39dc760) |
+---------------+-------------------------------------------------------------+
| Solution | No additional details are available. |
+---------------+-------------------------------------------------------------+

+---------------+-------------------------------------------------------------+
| Occurrence ID | f78d1646f3ee63c259623a322b6c4ee8 |
+===============+=============================================================+
| Title | User attention required by: Nikto |
+---------------+-------------------------------------------------------------+
| Found By | Nikto |
+---------------+-------------------------------------------------------------+
| Level | informational |
+---------------+-------------------------------------------------------------+
| CVSS Base | 0.0 |
+---------------+-------------------------------------------------------------+
| Location | http://giris.bizimtavuklar.com/index2.php?x=http%3A%2F%2Fci |
| | rt.net%2Frfiinc.txt%3F |
+---------------+-------------------------------------------------------------+
| Description | A database error may reveal internal details about the |
| | running database. |
+---------------+-------------------------------------------------------------+
| Solution | No additional details are available. |
+---------------+-------------------------------------------------------------+

+---------------+-------------------------------------------------------------+
| Occurrence ID | 28ac3e7114fbfc8294d81cf26092f972 |
+===============+=============================================================+
| Title | User attention required by: Nikto |
+---------------+-------------------------------------------------------------+
| Found By | Nikto |
+---------------+-------------------------------------------------------------+
| Level | informational |
+---------------+-------------------------------------------------------------+
| CVSS Base | 0.0 |
+---------------+-------------------------------------------------------------+
| Location | http://giris.bizimtavuklar.com/ |
+---------------+-------------------------------------------------------------+
| Description | The X-Content-Type-Options header is not set. This could |
| | allow the user agent to render the content of the site in a |
| | different fashion to the MIME type |
+---------------+-------------------------------------------------------------+
| Solution | No additional details are available. |
+---------------+-------------------------------------------------------------+

+---------------+-------------------------------------------------------------+
| Occurrence ID | 5233da2aecccbc6440579f9a69b7d7bc |
+===============+=============================================================+
| Title | User attention required by: Nikto |
+---------------+-------------------------------------------------------------+
| Found By | Nikto |
+---------------+-------------------------------------------------------------+
| Level | informational |
+---------------+-------------------------------------------------------------+
| CVSS Base | 0.0 |
+---------------+-------------------------------------------------------------+
| Location | http://giris.bizimtavuklar.com/djBMuHja.show_query_columns |
+---------------+-------------------------------------------------------------+
| Description | Server leaks inodes via ETags, header found with file |
| | /djBMuHja.show_query_columns, inode: 2361340, size: 1027, |
| | mtime: Tue May 2 11:20:16 2017 |
+---------------+-------------------------------------------------------------+
| Solution | No additional details are available. |
+---------------+-------------------------------------------------------------+

     
 
what is notes.io
 

Notes.io is a web-based application for taking notes. You can take your notes and share with others people. If you like taking long notes, notes.io is designed for you. To date, over 8,000,000,000 notes created and continuing...

With notes.io;

  • * You can take a note from anywhere and any device with internet connection.
  • * You can share the notes in social platforms (YouTube, Facebook, Twitter, instagram etc.).
  • * You can quickly share your contents without website, blog and e-mail.
  • * You don't need to create any Account to share a note. As you wish you can use quick, easy and best shortened notes with sms, websites, e-mail, or messaging services (WhatsApp, iMessage, Telegram, Signal).
  • * Notes.io has fabulous infrastructure design for a short link and allows you to share the note as an easy and understandable link.

Fast: Notes.io is built for speed and performance. You can take a notes quickly and browse your archive.

Easy: Notes.io doesn’t require installation. Just write and share note!

Short: Notes.io’s url just 8 character. You’ll get shorten link of your note when you want to share. (Ex: notes.io/q )

Free: Notes.io works for 12 years and has been free since the day it was started.


You immediately create your first note and start sharing with the ones you wish. If you want to contact us, you can use the following communication channels;


Email: [email protected]

Twitter: http://twitter.com/notesio

Instagram: http://instagram.com/notes.io

Facebook: http://facebook.com/notesio



Regards;
Notes.io Team

     
 
Shortened Note Link
 
 
Looding Image
 
     
 
Long File
 
 

For written notes was greater than 18KB Unable to shorten.

To be smaller than 18KB, please organize your notes, or sign in.