Having just updated to Bookworm and fully-updated the PIAware installation, I’ve used one of the Kali tools to check for vulnerabilities - the results are as follows:
- Nikto v2.5.0
- Target IP: 192.168.x.x
- Target Hostname: 192.168.x.x
- Target Port: 80
- Start Time: 2025-03-17 09:58:55 (GMT0)
- Server: lighttpd/1.4.69
- /: The anti-clickjacking X-Frame-Options header is not present. See: X-Frame-Options - HTTP | MDN
- /: The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type. See: https://www.netsparker.com/web-vulnerability-scanner/vulnerabilities/missing-content-type-header/
- No CGI Directories found (use ‘-C all’ to force check all possible dirs)
- OPTIONS: Allowed HTTP Methods: OPTIONS, GET, HEAD, POST .
- /%2e/: Weblogic allows source code or directory listing, upgrade to v6.0 SP1 or higher. http://www.securityfocus.com/bid/2513. See: http://www.securityfocus.com/bid/2513
- /%2f/: Weblogic allows source code or directory listing, upgrade to v6.0 SP1 or higher. http://www.securityfocus.com/bid/2513. See: http://www.securityfocus.com/bid/2513
- /#wp-config.php#: #wp-config.php# file found. This file contains the credentials.
- 8103 requests: 0 error(s) and 6 item(s) reported on remote host
- End Time: 2025-03-17 09:59:34 (GMT0) (39 seconds)
- 1 host(s) tested