Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Nmap NSE net: http-php-version

Information

Severity

Severity

Informational

Family

Family

Nmap NSE net

CVSSv2 Base

CVSSv2 Base

0.0

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:N/A:N

Created

Created

12 years ago

Modified

Modified

5 years ago

Summary

Attempts to retrieve the PHP version from a web server. PHP has a number of magic queries that return images or text that can vary with the PHP version. This script uses the following queries: * '/?=PHPE9568F36-D428-11d2-A769-00AA001ACF42': gets a GIF logo, which changes on April Fool's Day. * '/?=PHPB8B5F2A0-3C92-11d3-A3A9-4C7B08C10000': gets an HTML credits page. A list of magic queries is available at the references. The script also checks if any header field value starts with ''PHP'' and reports that value if found. SYNTAX: http.pipeline: If set, it represents the number of HTTP requests that'll be pipelined (ie, sent in a single request). This can be set low to make debugging easier, or it can be set high to test how a server reacts (its chosen max is ignored). http-max-cache-size: The maximum memory size (in bytes) of the cache.