Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.
HTTP/1.1 200 OK Date: Sat, 01 Feb 2025 12:53:42 GMT Server: Apache/2.4.37 (Win32) OpenSSL/1.1.1a PHP/7.3.0 X-Powered-By: PHP/7.3.0 Set-Cookie: c1884f2d2609a51499724b70e807b2c5=r97i2lkord88gior74l092n9pn; path=/; HttpOnly X-Logged-In: False X-Content-Powered-By: K2 v2.10.3 (by JoomlaWorks) Expires: Wed, 17 Aug 2005 00:00:00 GMT Last-Modified: Sat, 01 Feb 2025 12:53:43 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Transfer-Encoding: chunked Content-Type: text/html; charset=utf-8
HTTP/1.1 400 Bad Request Date: Sat, 25 Jan 2025 11:37:21 GMT Server: Apache/2.4.37 (Win32) OpenSSL/1.1.1a PHP/7.3.0 Vary: accept-language,accept-charset Accept-Ranges: bytes Connection: close Content-Type: text/html; charset=utf-8 Content-Language: en Expires: Sat, 25 Jan 2025 11:37:21 GMT <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en"> <head> <title>Bad request!</title> <link rev="made" href="mailto:admin@example.com" /> <style type="text/css"><!--/*--><![CDATA[/*><!--*/ body { color: #000000; background-color: #FFFFFF; } a:link { color: #0000CC; } p, address {margin-left: 3em;} span {font-size: smaller;} /*]]>*/--></style> </head> <body> <h1>Bad request!</h1> <p> Your browser (or proxy) sent a request that this server could not understand. </p> <p> If you think this is a server error, please contact the <a href="mailto:admin@example.com">webmaster</a>. </p> <h2>Error 400</h2> <address> <a href="/">www.example.com</a><br /> <span>Apache/2.4.37 (Win32) OpenSSL/1.1.1a PHP/7.3.0</span> </address> </body> </html>
Shodan ® - All rights reserved