Advertisement
Guest User

Untitled

a guest
Nov 2nd, 2012
231
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 9.03 KB | None | 0 0
  1. ---------------------------------------------------------------------------
  2. + Target IP: 193.87.86.14
  3. + Target Hostname: forestportal.nlcsk.org
  4. + Target Port: 80
  5. + Start Time: 2012-11-03 19:06:36
  6. ---------------------------------------------------------------------------
  7. + Server: Microsoft-IIS/7.5
  8. + Retrieved x-powered-by header: ASP.NET
  9. + Retrieved x-aspnet-version header: 2.0.50727
  10. + OSVDB-396: /_vti_bin/shtml.exe: Attackers may be able to crash FrontPage by requesting a DOS device, like shtml.exe/aux.htm -- a DoS was not attempted.
  11. + /cgi.cgi/formmail.cgi: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  12. + /webcgi/formmail.cgi: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  13. + /cgi-914/formmail.cgi: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  14. + /cgi-915/formmail.cgi: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  15. + /bin/formmail.cgi: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  16. + /cgi/formmail.cgi: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  17. + /mpcgi/formmail.cgi: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  18. + /cgi-bin/formmail.cgi: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  19. + /ows-bin/formmail.cgi: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  20. + /cgi-sys/formmail.cgi: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  21. + /cgi-local/formmail.cgi: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  22. + /htbin/formmail.cgi: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  23. + /cgibin/formmail.cgi: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  24. + /cgis/formmail.cgi: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  25. + /scripts/formmail.cgi: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  26. + /cgi-win/formmail.cgi: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  27. + /fcgi-bin/formmail.cgi: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  28. + /cgi-exe/formmail.cgi: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  29. + /cgi-home/formmail.cgi: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  30. + /cgi-perl/formmail.cgi: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  31. + /scgi-bin/formmail.cgi: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  32. + /cgi.cgi/formmail.pl: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  33. + /webcgi/formmail.pl: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  34. + /cgi-914/formmail.pl: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  35. + /cgi-915/formmail.pl: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  36. + /bin/formmail.pl: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  37. + /cgi/formmail.pl: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  38. + /mpcgi/formmail.pl: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  39. + /cgi-bin/formmail.pl: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  40. + /ows-bin/formmail.pl: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  41. + /cgi-sys/formmail.pl: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  42. + /cgi-local/formmail.pl: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  43. + /htbin/formmail.pl: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  44. + /cgibin/formmail.pl: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  45. + /cgis/formmail.pl: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  46. + /scripts/formmail.pl: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  47. + /cgi-win/formmail.pl: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  48. + /fcgi-bin/formmail.pl: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  49. + /cgi-exe/formmail.pl: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  50. + /cgi-home/formmail.pl: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  51. + /cgi-perl/formmail.pl: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  52. + /scgi-bin/formmail.pl: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  53. + /cgi.cgi/formmail: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  54. + /webcgi/formmail: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  55. + /cgi-914/formmail: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  56. + /cgi-915/formmail: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  57. + /bin/formmail: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  58. + /cgi/formmail: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  59. + /mpcgi/formmail: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  60. + /cgi-bin/formmail: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  61. + /ows-bin/formmail: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  62. + /cgi-sys/formmail: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  63. + /cgi-local/formmail: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  64. + /htbin/formmail: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  65. + /cgibin/formmail: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  66. + /cgis/formmail: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  67. + /scripts/formmail: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  68. + /cgi-win/formmail: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  69. + /fcgi-bin/formmail: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  70. + /cgi-exe/formmail: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  71. + /cgi-home/formmail: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  72. + /cgi-perl/formmail: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  73. + /scgi-bin/formmail: The remote CGI reveals its version number, which may aid attackers in finding vulnerabilities in the script.
  74. + Server banner has changed from Microsoft-IIS/7.5 to Microsoft-HTTPAPI/2.0, this may suggest a WAF or load balancer is in place
  75. + /admin.cgi: InterScan VirusWall administration is accessible without authentication.
  76. + /interscan/: InterScan VirusWall administration is accessible without authentication.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement