Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- <?xml version="1.0" encoding="UTF-8"?>
- <!DOCTYPE nmaprun>
- <?xml-stylesheet href="file:///usr/local/bin/../share/nmap/nmap.xsl" type="text/xsl"?>
- <!-- Nmap 7.12SVN scan initiated Sat Jul 16 04:45:59 2016 as: nmap -oX scan1.xml --script vuln localhost -->
- <nmaprun scanner="nmap" args="nmap -oX scan1.xml --script vuln localhost" start="1468624559" startstr="Sat Jul 16 04:45:59 2016" version="7.12SVN" xmloutputversion="1.04">
- <scaninfo type="connect" protocol="tcp" numservices="1000" services="1,3-4,6-7,9,13,17,19-26,30,32-33,37,42-43,49,53,70,79-85,88-90,99-100,106,109-111,113,119,125,135,139,143-144,146,161,163,179,199,211-212,222,254-256,259,264,280,301,306,311,340,366,389,406-407,416-417,425,427,443-445,458,464-465,481,497,500,512-515,524,541,543-545,548,554-555,563,587,593,616-617,625,631,636,646,648,666-668,683,687,691,700,705,711,714,720,722,726,749,765,777,783,787,800-801,808,843,873,880,888,898,900-903,911-912,981,987,990,992-993,995,999-1002,1007,1009-1011,1021-1100,1102,1104-1108,1110-1114,1117,1119,1121-1124,1126,1130-1132,1137-1138,1141,1145,1147-1149,1151-1152,1154,1163-1166,1169,1174-1175,1183,1185-1187,1192,1198-1199,1201,1213,1216-1218,1233-1234,1236,1244,1247-1248,1259,1271-1272,1277,1287,1296,1300-1301,1309-1311,1322,1328,1334,1352,1417,1433-1434,1443,1455,1461,1494,1500-1501,1503,1521,1524,1533,1556,1580,1583,1594,1600,1641,1658,1666,1687-1688,1700,1717-1721,1723,1755,1761,1782-1783,1801,1805,1812,1839-1840,1862-1864,1875,1900,1914,1935,1947,1971-1972,1974,1984,1998-2010,2013,2020-2022,2030,2033-2035,2038,2040-2043,2045-2049,2065,2068,2099-2100,2103,2105-2107,2111,2119,2121,2126,2135,2144,2160-2161,2170,2179,2190-2191,2196,2200,2222,2251,2260,2288,2301,2323,2366,2381-2383,2393-2394,2399,2401,2492,2500,2522,2525,2557,2601-2602,2604-2605,2607-2608,2638,2701-2702,2710,2717-2718,2725,2800,2809,2811,2869,2875,2909-2910,2920,2967-2968,2998,3000-3001,3003,3005-3007,3011,3013,3017,3030-3031,3052,3071,3077,3128,3168,3211,3221,3260-3261,3268-3269,3283,3300-3301,3306,3322-3325,3333,3351,3367,3369-3372,3389-3390,3404,3476,3493,3517,3527,3546,3551,3580,3659,3689-3690,3703,3737,3766,3784,3800-3801,3809,3814,3826-3828,3851,3869,3871,3878,3880,3889,3905,3914,3918,3920,3945,3971,3986,3995,3998,4000-4006,4045,4111,4125-4126,4129,4224,4242,4279,4321,4343,4443-4446,4449,4550,4567,4662,4848,4899-4900,4998,5000-5004,5009,5030,5033,5050-5051,5054,5060-5061,5080,5087,5100-5102,5120,5190,5200,5214,5221-5222,5225-5226,5269,5280,5298,5357,5405,5414,5431-5432,5440,5500,5510,5544,5550,5555,5560,5566,5631,5633,5666,5678-5679,5718,5730,5800-5802,5810-5811,5815,5822,5825,5850,5859,5862,5877,5900-5904,5906-5907,5910-5911,5915,5922,5925,5950,5952,5959-5963,5987-5989,5998-6007,6009,6025,6059,6100-6101,6106,6112,6123,6129,6156,6346,6389,6502,6510,6543,6547,6565-6567,6580,6646,6666-6669,6689,6692,6699,6779,6788-6789,6792,6839,6881,6901,6969,7000-7002,7004,7007,7019,7025,7070,7100,7103,7106,7200-7201,7402,7435,7443,7496,7512,7625,7627,7676,7741,7777-7778,7800,7911,7920-7921,7937-7938,7999-8002,8007-8011,8021-8022,8031,8042,8045,8080-8090,8093,8099-8100,8180-8181,8192-8194,8200,8222,8254,8290-8292,8300,8333,8383,8400,8402,8443,8500,8600,8649,8651-8652,8654,8701,8800,8873,8888,8899,8994,9000-9003,9009-9011,9040,9050,9071,9080-9081,9090-9091,9099-9103,9110-9111,9200,9207,9220,9290,9415,9418,9485,9500,9502-9503,9535,9575,9593-9595,9618,9666,9876-9878,9898,9900,9917,9929,9943-9944,9968,9998-10004,10009-10010,10012,10024-10025,10082,10180,10215,10243,10566,10616-10617,10621,10626,10628-10629,10778,11110-11111,11967,12000,12174,12265,12345,13456,13722,13782-13783,14000,14238,14441-14442,15000,15002-15004,15660,15742,16000-16001,16012,16016,16018,16080,16113,16992-16993,17877,17988,18040,18101,18988,19101,19283,19315,19350,19780,19801,19842,20000,20005,20031,20221-20222,20828,21571,22939,23502,24444,24800,25734-25735,26214,27000,27352-27353,27355-27356,27715,28201,30000,30718,30951,31038,31337,32768-32785,33354,33899,34571-34573,35500,38292,40193,40911,41511,42510,44176,44442-44443,44501,45100,48080,49152-49161,49163,49165,49167,49175-49176,49400,49999-50003,50006,50300,50389,50500,50636,50800,51103,51493,52673,52822,52848,52869,54045,54328,55055-55056,55555,55600,56737-56738,57294,57797,58080,60020,60443,61532,61900,62078,63331,64623,64680,65000,65129,65389"/>
- <verbose level="0"/>
- <debugging level="0"/>
- <script id="broadcast-avahi-dos" phase="PRE_SCAN" selection="category"></script><prescript><script id="broadcast-avahi-dos" output="
 Discovered hosts:
 224.0.0.251
 After NULL UDP avahi packet DoS (CVE-2011-1002).
 Hosts are all up (not vulnerable).
"/></prescript>
- <script id="firewall-bypass" phase="HOST_SCAN" selection="category"></script>
- <script id="samba-vuln-cve-2012-1182" phase="HOST_SCAN" selection="category"></script>
- <script id="smb-vuln-conficker" phase="HOST_SCAN" selection="category"></script>
- <script id="smb-vuln-cve2009-3103" phase="HOST_SCAN" selection="category"></script>
- <script id="smb-vuln-ms06-025" phase="HOST_SCAN" selection="category"></script>
- <script id="smb-vuln-ms07-029" phase="HOST_SCAN" selection="category"></script>
- <script id="smb-vuln-ms08-067" phase="HOST_SCAN" selection="category"></script>
- <script id="smb-vuln-ms10-054" phase="HOST_SCAN" selection="category"></script>
- <script id="smb-vuln-ms10-061" phase="HOST_SCAN" selection="category"></script>
- <script id="smb-vuln-regsvc-dos" phase="HOST_SCAN" selection="category"></script>
- <script id="afp-path-vuln" phase="PORT_SCAN" selection="category"></script>
- <script id="distcc-cve2004-2687" phase="PORT_SCAN" selection="category"></script>
- <script id="dns-update" phase="PORT_SCAN" selection="category"></script>
- <script id="ftp-libopie" phase="PORT_SCAN" selection="category"></script>
- <script id="ftp-proftpd-backdoor" phase="PORT_SCAN" selection="category"></script>
- <script id="ftp-vsftpd-backdoor" phase="PORT_SCAN" selection="category"></script>
- <script id="ftp-vuln-cve2010-4221" phase="PORT_SCAN" selection="category"></script>
- <script id="http-adobe-coldfusion-apsa1301" phase="PORT_SCAN" selection="category"></script>
- <script id="http-avaya-ipoffice-users" phase="PORT_SCAN" selection="category"></script>
- <script id="http-awstatstotals-exec" phase="PORT_SCAN" selection="category"></script>
- <script id="http-axis2-dir-traversal" phase="PORT_SCAN" selection="category"></script>
- <script id="http-cross-domain-policy" phase="PORT_SCAN" selection="category"></script>
- <script id="http-csrf" phase="PORT_SCAN" selection="category"></script>
- <script id="http-dlink-backdoor" phase="PORT_SCAN" selection="category"></script>
- <script id="http-dombased-xss" phase="PORT_SCAN" selection="category"></script>
- <script id="http-enum" phase="PORT_SCAN" selection="category"></script>
- <script id="http-fileupload-exploiter" phase="PORT_SCAN" selection="category"></script>
- <script id="http-frontpage-login" phase="PORT_SCAN" selection="category"></script>
- <script id="http-git" phase="PORT_SCAN" selection="category"></script>
- <script id="http-huawei-hg5xx-vuln" phase="PORT_SCAN" selection="category"></script>
- <script id="http-iis-webdav-vuln" phase="PORT_SCAN" selection="category"></script>
- <script id="http-litespeed-sourcecode-download" phase="PORT_SCAN" selection="category"></script>
- <script id="http-majordomo2-dir-traversal" phase="PORT_SCAN" selection="category"></script>
- <script id="http-method-tamper" phase="PORT_SCAN" selection="category"></script>
- <script id="http-passwd" phase="PORT_SCAN" selection="category"></script>
- <script id="http-phpmyadmin-dir-traversal" phase="PORT_SCAN" selection="category"></script>
- <script id="http-phpself-xss" phase="PORT_SCAN" selection="category"></script>
- <script id="http-shellshock" phase="PORT_SCAN" selection="category"></script>
- <script id="http-slowloris-check" phase="PORT_SCAN" selection="category"></script>
- <script id="http-sql-injection" phase="PORT_SCAN" selection="category"></script>
- <script id="http-stored-xss" phase="PORT_SCAN" selection="category"></script>
- <script id="http-tplink-dir-traversal" phase="PORT_SCAN" selection="category"></script>
- <script id="http-trace" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vmware-path-vuln" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2006-3392" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2010-0738" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2010-2861" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2011-3192" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2011-3368" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2012-1823" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2013-0156" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2013-6786" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2013-7091" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-2126" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-2127" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-2128" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-2129" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-3704" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-8877" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2015-1427" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2015-1635" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-misfortune-cookie" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-wnr1000-creds" phase="PORT_SCAN" selection="category"></script>
- <script id="http-wordpress-users" phase="PORT_SCAN" selection="category"></script>
- <script id="irc-botnet-channels" phase="PORT_SCAN" selection="category"></script>
- <script id="irc-unrealircd-backdoor" phase="PORT_SCAN" selection="category"></script>
- <script id="mysql-vuln-cve2012-2122" phase="PORT_SCAN" selection="category"></script>
- <script id="netbus-auth-bypass" phase="PORT_SCAN" selection="category"></script>
- <script id="qconn-exec" phase="PORT_SCAN" selection="category"></script>
- <script id="rdp-vuln-ms12-020" phase="PORT_SCAN" selection="category"></script>
- <script id="rmi-vuln-classloader" phase="PORT_SCAN" selection="category"></script>
- <script id="smtp-vuln-cve2010-4344" phase="PORT_SCAN" selection="category"></script>
- <script id="smtp-vuln-cve2011-1720" phase="PORT_SCAN" selection="category"></script>
- <script id="smtp-vuln-cve2011-1764" phase="PORT_SCAN" selection="category"></script>
- <script id="ssl-ccs-injection" phase="PORT_SCAN" selection="category"></script>
- <script id="ssl-dh-params" phase="PORT_SCAN" selection="category"></script>
- <script id="ssl-heartbleed" phase="PORT_SCAN" selection="category"></script>
- <script id="ssl-known-key" phase="PORT_SCAN" selection="category"></script>
- <script id="ssl-poodle" phase="PORT_SCAN" selection="category"></script>
- <script id="supermicro-ipmi-conf" phase="PORT_SCAN" selection="category"></script>
- <script id="wdb-version" phase="PORT_SCAN" selection="category"></script>
- <script id="afp-path-vuln" phase="PORT_SCAN" selection="category"></script>
- <script id="distcc-cve2004-2687" phase="PORT_SCAN" selection="category"></script>
- <script id="dns-update" phase="PORT_SCAN" selection="category"></script>
- <script id="ftp-libopie" phase="PORT_SCAN" selection="category"></script>
- <script id="ftp-proftpd-backdoor" phase="PORT_SCAN" selection="category"></script>
- <script id="ftp-vsftpd-backdoor" phase="PORT_SCAN" selection="category"></script>
- <script id="ftp-vuln-cve2010-4221" phase="PORT_SCAN" selection="category"></script>
- <script id="http-adobe-coldfusion-apsa1301" phase="PORT_SCAN" selection="category"></script>
- <script id="http-avaya-ipoffice-users" phase="PORT_SCAN" selection="category"></script>
- <script id="http-awstatstotals-exec" phase="PORT_SCAN" selection="category"></script>
- <script id="http-axis2-dir-traversal" phase="PORT_SCAN" selection="category"></script>
- <script id="http-cross-domain-policy" phase="PORT_SCAN" selection="category"></script>
- <script id="http-csrf" phase="PORT_SCAN" selection="category"></script>
- <script id="http-dlink-backdoor" phase="PORT_SCAN" selection="category"></script>
- <script id="http-dombased-xss" phase="PORT_SCAN" selection="category"></script>
- <script id="http-enum" phase="PORT_SCAN" selection="category"></script>
- <script id="http-fileupload-exploiter" phase="PORT_SCAN" selection="category"></script>
- <script id="http-frontpage-login" phase="PORT_SCAN" selection="category"></script>
- <script id="http-git" phase="PORT_SCAN" selection="category"></script>
- <script id="http-huawei-hg5xx-vuln" phase="PORT_SCAN" selection="category"></script>
- <script id="http-iis-webdav-vuln" phase="PORT_SCAN" selection="category"></script>
- <script id="http-litespeed-sourcecode-download" phase="PORT_SCAN" selection="category"></script>
- <script id="http-majordomo2-dir-traversal" phase="PORT_SCAN" selection="category"></script>
- <script id="http-method-tamper" phase="PORT_SCAN" selection="category"></script>
- <script id="http-passwd" phase="PORT_SCAN" selection="category"></script>
- <script id="http-phpmyadmin-dir-traversal" phase="PORT_SCAN" selection="category"></script>
- <script id="http-phpself-xss" phase="PORT_SCAN" selection="category"></script>
- <script id="http-shellshock" phase="PORT_SCAN" selection="category"></script>
- <script id="http-slowloris-check" phase="PORT_SCAN" selection="category"></script>
- <script id="http-sql-injection" phase="PORT_SCAN" selection="category"></script>
- <script id="http-stored-xss" phase="PORT_SCAN" selection="category"></script>
- <script id="http-tplink-dir-traversal" phase="PORT_SCAN" selection="category"></script>
- <script id="http-trace" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vmware-path-vuln" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2006-3392" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2010-0738" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2010-2861" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2011-3192" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2011-3368" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2012-1823" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2013-0156" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2013-6786" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2013-7091" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-2126" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-2127" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-2128" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-2129" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-3704" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-8877" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2015-1427" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2015-1635" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-misfortune-cookie" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-wnr1000-creds" phase="PORT_SCAN" selection="category"></script>
- <script id="http-wordpress-users" phase="PORT_SCAN" selection="category"></script>
- <script id="irc-botnet-channels" phase="PORT_SCAN" selection="category"></script>
- <script id="irc-unrealircd-backdoor" phase="PORT_SCAN" selection="category"></script>
- <script id="mysql-vuln-cve2012-2122" phase="PORT_SCAN" selection="category"></script>
- <script id="netbus-auth-bypass" phase="PORT_SCAN" selection="category"></script>
- <script id="qconn-exec" phase="PORT_SCAN" selection="category"></script>
- <script id="rdp-vuln-ms12-020" phase="PORT_SCAN" selection="category"></script>
- <script id="rmi-vuln-classloader" phase="PORT_SCAN" selection="category"></script>
- <script id="smtp-vuln-cve2010-4344" phase="PORT_SCAN" selection="category"></script>
- <script id="smtp-vuln-cve2011-1720" phase="PORT_SCAN" selection="category"></script>
- <script id="smtp-vuln-cve2011-1764" phase="PORT_SCAN" selection="category"></script>
- <script id="ssl-ccs-injection" phase="PORT_SCAN" selection="category"></script>
- <script id="ssl-dh-params" phase="PORT_SCAN" selection="category"></script>
- <script id="ssl-heartbleed" phase="PORT_SCAN" selection="category"></script>
- <script id="ssl-known-key" phase="PORT_SCAN" selection="category"></script>
- <script id="ssl-poodle" phase="PORT_SCAN" selection="category"></script>
- <script id="supermicro-ipmi-conf" phase="PORT_SCAN" selection="category"></script>
- <script id="wdb-version" phase="PORT_SCAN" selection="category"></script>
- <script id="afp-path-vuln" phase="PORT_SCAN" selection="category"></script>
- <script id="distcc-cve2004-2687" phase="PORT_SCAN" selection="category"></script>
- <script id="dns-update" phase="PORT_SCAN" selection="category"></script>
- <script id="ftp-libopie" phase="PORT_SCAN" selection="category"></script>
- <script id="ftp-proftpd-backdoor" phase="PORT_SCAN" selection="category"></script>
- <script id="ftp-vsftpd-backdoor" phase="PORT_SCAN" selection="category"></script>
- <script id="ftp-vuln-cve2010-4221" phase="PORT_SCAN" selection="category"></script>
- <script id="http-adobe-coldfusion-apsa1301" phase="PORT_SCAN" selection="category"></script>
- <script id="http-avaya-ipoffice-users" phase="PORT_SCAN" selection="category"></script>
- <script id="http-awstatstotals-exec" phase="PORT_SCAN" selection="category"></script>
- <script id="http-axis2-dir-traversal" phase="PORT_SCAN" selection="category"></script>
- <script id="http-cross-domain-policy" phase="PORT_SCAN" selection="category"></script>
- <script id="http-csrf" phase="PORT_SCAN" selection="category"></script>
- <script id="http-dlink-backdoor" phase="PORT_SCAN" selection="category"></script>
- <script id="http-dombased-xss" phase="PORT_SCAN" selection="category"></script>
- <script id="http-enum" phase="PORT_SCAN" selection="category"></script>
- <script id="http-fileupload-exploiter" phase="PORT_SCAN" selection="category"></script>
- <script id="http-frontpage-login" phase="PORT_SCAN" selection="category"></script>
- <script id="http-git" phase="PORT_SCAN" selection="category"></script>
- <script id="http-huawei-hg5xx-vuln" phase="PORT_SCAN" selection="category"></script>
- <script id="http-iis-webdav-vuln" phase="PORT_SCAN" selection="category"></script>
- <script id="http-litespeed-sourcecode-download" phase="PORT_SCAN" selection="category"></script>
- <script id="http-majordomo2-dir-traversal" phase="PORT_SCAN" selection="category"></script>
- <script id="http-method-tamper" phase="PORT_SCAN" selection="category"></script>
- <script id="http-passwd" phase="PORT_SCAN" selection="category"></script>
- <script id="http-phpmyadmin-dir-traversal" phase="PORT_SCAN" selection="category"></script>
- <script id="http-phpself-xss" phase="PORT_SCAN" selection="category"></script>
- <script id="http-shellshock" phase="PORT_SCAN" selection="category"></script>
- <script id="http-slowloris-check" phase="PORT_SCAN" selection="category"></script>
- <script id="http-sql-injection" phase="PORT_SCAN" selection="category"></script>
- <script id="http-stored-xss" phase="PORT_SCAN" selection="category"></script>
- <script id="http-tplink-dir-traversal" phase="PORT_SCAN" selection="category"></script>
- <script id="http-trace" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vmware-path-vuln" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2006-3392" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2010-0738" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2010-2861" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2011-3192" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2011-3368" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2012-1823" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2013-0156" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2013-6786" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2013-7091" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-2126" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-2127" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-2128" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-2129" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-3704" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-8877" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2015-1427" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2015-1635" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-misfortune-cookie" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-wnr1000-creds" phase="PORT_SCAN" selection="category"></script>
- <script id="http-wordpress-users" phase="PORT_SCAN" selection="category"></script>
- <script id="irc-botnet-channels" phase="PORT_SCAN" selection="category"></script>
- <script id="irc-unrealircd-backdoor" phase="PORT_SCAN" selection="category"></script>
- <script id="mysql-vuln-cve2012-2122" phase="PORT_SCAN" selection="category"></script>
- <script id="netbus-auth-bypass" phase="PORT_SCAN" selection="category"></script>
- <script id="qconn-exec" phase="PORT_SCAN" selection="category"></script>
- <script id="rdp-vuln-ms12-020" phase="PORT_SCAN" selection="category"></script>
- <script id="rmi-vuln-classloader" phase="PORT_SCAN" selection="category"></script>
- <script id="smtp-vuln-cve2010-4344" phase="PORT_SCAN" selection="category"></script>
- <script id="smtp-vuln-cve2011-1720" phase="PORT_SCAN" selection="category"></script>
- <script id="smtp-vuln-cve2011-1764" phase="PORT_SCAN" selection="category"></script>
- <script id="ssl-ccs-injection" phase="PORT_SCAN" selection="category"></script>
- <script id="ssl-dh-params" phase="PORT_SCAN" selection="category"></script>
- <script id="ssl-heartbleed" phase="PORT_SCAN" selection="category"></script>
- <script id="ssl-known-key" phase="PORT_SCAN" selection="category"></script>
- <script id="ssl-poodle" phase="PORT_SCAN" selection="category"></script>
- <script id="supermicro-ipmi-conf" phase="PORT_SCAN" selection="category"></script>
- <script id="wdb-version" phase="PORT_SCAN" selection="category"></script>
- <script id="afp-path-vuln" phase="PORT_SCAN" selection="category"></script>
- <script id="distcc-cve2004-2687" phase="PORT_SCAN" selection="category"></script>
- <script id="dns-update" phase="PORT_SCAN" selection="category"></script>
- <script id="ftp-libopie" phase="PORT_SCAN" selection="category"></script>
- <script id="ftp-proftpd-backdoor" phase="PORT_SCAN" selection="category"></script>
- <script id="ftp-vsftpd-backdoor" phase="PORT_SCAN" selection="category"></script>
- <script id="ftp-vuln-cve2010-4221" phase="PORT_SCAN" selection="category"></script>
- <script id="http-adobe-coldfusion-apsa1301" phase="PORT_SCAN" selection="category"></script>
- <script id="http-avaya-ipoffice-users" phase="PORT_SCAN" selection="category"></script>
- <script id="http-awstatstotals-exec" phase="PORT_SCAN" selection="category"></script>
- <script id="http-axis2-dir-traversal" phase="PORT_SCAN" selection="category"></script>
- <script id="http-cross-domain-policy" phase="PORT_SCAN" selection="category"></script>
- <script id="http-csrf" phase="PORT_SCAN" selection="category"></script>
- <script id="http-dlink-backdoor" phase="PORT_SCAN" selection="category"></script>
- <script id="http-dombased-xss" phase="PORT_SCAN" selection="category"></script>
- <script id="http-enum" phase="PORT_SCAN" selection="category"></script>
- <script id="http-fileupload-exploiter" phase="PORT_SCAN" selection="category"></script>
- <script id="http-frontpage-login" phase="PORT_SCAN" selection="category"></script>
- <script id="http-git" phase="PORT_SCAN" selection="category"></script>
- <script id="http-huawei-hg5xx-vuln" phase="PORT_SCAN" selection="category"></script>
- <script id="http-iis-webdav-vuln" phase="PORT_SCAN" selection="category"></script>
- <script id="http-litespeed-sourcecode-download" phase="PORT_SCAN" selection="category"></script>
- <script id="http-majordomo2-dir-traversal" phase="PORT_SCAN" selection="category"></script>
- <script id="http-method-tamper" phase="PORT_SCAN" selection="category"></script>
- <script id="http-passwd" phase="PORT_SCAN" selection="category"></script>
- <script id="http-phpmyadmin-dir-traversal" phase="PORT_SCAN" selection="category"></script>
- <script id="http-phpself-xss" phase="PORT_SCAN" selection="category"></script>
- <script id="http-shellshock" phase="PORT_SCAN" selection="category"></script>
- <script id="http-slowloris-check" phase="PORT_SCAN" selection="category"></script>
- <script id="http-sql-injection" phase="PORT_SCAN" selection="category"></script>
- <script id="http-stored-xss" phase="PORT_SCAN" selection="category"></script>
- <script id="http-tplink-dir-traversal" phase="PORT_SCAN" selection="category"></script>
- <script id="http-trace" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vmware-path-vuln" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2006-3392" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2010-0738" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2010-2861" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2011-3192" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2011-3368" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2012-1823" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2013-0156" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2013-6786" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2013-7091" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-2126" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-2127" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-2128" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-2129" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-3704" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-8877" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2015-1427" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2015-1635" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-misfortune-cookie" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-wnr1000-creds" phase="PORT_SCAN" selection="category"></script>
- <script id="http-wordpress-users" phase="PORT_SCAN" selection="category"></script>
- <script id="irc-botnet-channels" phase="PORT_SCAN" selection="category"></script>
- <script id="irc-unrealircd-backdoor" phase="PORT_SCAN" selection="category"></script>
- <script id="mysql-vuln-cve2012-2122" phase="PORT_SCAN" selection="category"></script>
- <script id="netbus-auth-bypass" phase="PORT_SCAN" selection="category"></script>
- <script id="qconn-exec" phase="PORT_SCAN" selection="category"></script>
- <script id="rdp-vuln-ms12-020" phase="PORT_SCAN" selection="category"></script>
- <script id="rmi-vuln-classloader" phase="PORT_SCAN" selection="category"></script>
- <script id="smtp-vuln-cve2010-4344" phase="PORT_SCAN" selection="category"></script>
- <script id="smtp-vuln-cve2011-1720" phase="PORT_SCAN" selection="category"></script>
- <script id="smtp-vuln-cve2011-1764" phase="PORT_SCAN" selection="category"></script>
- <script id="ssl-ccs-injection" phase="PORT_SCAN" selection="category"></script>
- <script id="ssl-dh-params" phase="PORT_SCAN" selection="category"></script>
- <script id="ssl-heartbleed" phase="PORT_SCAN" selection="category"></script>
- <script id="ssl-known-key" phase="PORT_SCAN" selection="category"></script>
- <script id="ssl-poodle" phase="PORT_SCAN" selection="category"></script>
- <script id="supermicro-ipmi-conf" phase="PORT_SCAN" selection="category"></script>
- <script id="wdb-version" phase="PORT_SCAN" selection="category"></script>
- <script id="afp-path-vuln" phase="PORT_SCAN" selection="category"></script>
- <script id="distcc-cve2004-2687" phase="PORT_SCAN" selection="category"></script>
- <script id="dns-update" phase="PORT_SCAN" selection="category"></script>
- <script id="ftp-libopie" phase="PORT_SCAN" selection="category"></script>
- <script id="ftp-proftpd-backdoor" phase="PORT_SCAN" selection="category"></script>
- <script id="ftp-vsftpd-backdoor" phase="PORT_SCAN" selection="category"></script>
- <script id="ftp-vuln-cve2010-4221" phase="PORT_SCAN" selection="category"></script>
- <script id="http-adobe-coldfusion-apsa1301" phase="PORT_SCAN" selection="category"></script>
- <script id="http-avaya-ipoffice-users" phase="PORT_SCAN" selection="category"></script>
- <script id="http-awstatstotals-exec" phase="PORT_SCAN" selection="category"></script>
- <script id="http-axis2-dir-traversal" phase="PORT_SCAN" selection="category"></script>
- <script id="http-cross-domain-policy" phase="PORT_SCAN" selection="category"></script>
- <script id="http-csrf" phase="PORT_SCAN" selection="category"></script>
- <script id="http-dlink-backdoor" phase="PORT_SCAN" selection="category"></script>
- <script id="http-dombased-xss" phase="PORT_SCAN" selection="category"></script>
- <script id="http-enum" phase="PORT_SCAN" selection="category"></script>
- <script id="http-fileupload-exploiter" phase="PORT_SCAN" selection="category"></script>
- <script id="http-frontpage-login" phase="PORT_SCAN" selection="category"></script>
- <script id="http-git" phase="PORT_SCAN" selection="category"></script>
- <script id="http-huawei-hg5xx-vuln" phase="PORT_SCAN" selection="category"></script>
- <script id="http-iis-webdav-vuln" phase="PORT_SCAN" selection="category"></script>
- <script id="http-litespeed-sourcecode-download" phase="PORT_SCAN" selection="category"></script>
- <script id="http-majordomo2-dir-traversal" phase="PORT_SCAN" selection="category"></script>
- <script id="http-method-tamper" phase="PORT_SCAN" selection="category"></script>
- <script id="http-passwd" phase="PORT_SCAN" selection="category"></script>
- <script id="http-phpmyadmin-dir-traversal" phase="PORT_SCAN" selection="category"></script>
- <script id="http-phpself-xss" phase="PORT_SCAN" selection="category"></script>
- <script id="http-shellshock" phase="PORT_SCAN" selection="category"></script>
- <script id="http-slowloris-check" phase="PORT_SCAN" selection="category"></script>
- <script id="http-sql-injection" phase="PORT_SCAN" selection="category"></script>
- <script id="http-stored-xss" phase="PORT_SCAN" selection="category"></script>
- <script id="http-tplink-dir-traversal" phase="PORT_SCAN" selection="category"></script>
- <script id="http-trace" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vmware-path-vuln" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2006-3392" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2010-0738" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2010-2861" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2011-3192" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2011-3368" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2012-1823" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2013-0156" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2013-6786" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2013-7091" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-2126" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-2127" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-2128" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-2129" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-3704" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-8877" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2015-1427" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2015-1635" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-misfortune-cookie" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-wnr1000-creds" phase="PORT_SCAN" selection="category"></script>
- <script id="http-wordpress-users" phase="PORT_SCAN" selection="category"></script>
- <script id="irc-botnet-channels" phase="PORT_SCAN" selection="category"></script>
- <script id="irc-unrealircd-backdoor" phase="PORT_SCAN" selection="category"></script>
- <script id="mysql-vuln-cve2012-2122" phase="PORT_SCAN" selection="category"></script>
- <script id="netbus-auth-bypass" phase="PORT_SCAN" selection="category"></script>
- <script id="qconn-exec" phase="PORT_SCAN" selection="category"></script>
- <script id="rdp-vuln-ms12-020" phase="PORT_SCAN" selection="category"></script>
- <script id="rmi-vuln-classloader" phase="PORT_SCAN" selection="category"></script>
- <script id="smtp-vuln-cve2010-4344" phase="PORT_SCAN" selection="category"></script>
- <script id="smtp-vuln-cve2011-1720" phase="PORT_SCAN" selection="category"></script>
- <script id="smtp-vuln-cve2011-1764" phase="PORT_SCAN" selection="category"></script>
- <script id="ssl-ccs-injection" phase="PORT_SCAN" selection="category"></script>
- <script id="ssl-dh-params" phase="PORT_SCAN" selection="category"></script>
- <script id="ssl-heartbleed" phase="PORT_SCAN" selection="category"></script>
- <script id="ssl-known-key" phase="PORT_SCAN" selection="category"></script>
- <script id="ssl-poodle" phase="PORT_SCAN" selection="category"></script>
- <script id="supermicro-ipmi-conf" phase="PORT_SCAN" selection="category"></script>
- <script id="wdb-version" phase="PORT_SCAN" selection="category"></script>
- <script id="afp-path-vuln" phase="PORT_SCAN" selection="category"></script>
- <script id="distcc-cve2004-2687" phase="PORT_SCAN" selection="category"></script>
- <script id="dns-update" phase="PORT_SCAN" selection="category"></script>
- <script id="ftp-libopie" phase="PORT_SCAN" selection="category"></script>
- <script id="ftp-proftpd-backdoor" phase="PORT_SCAN" selection="category"></script>
- <script id="ftp-vsftpd-backdoor" phase="PORT_SCAN" selection="category"></script>
- <script id="ftp-vuln-cve2010-4221" phase="PORT_SCAN" selection="category"></script>
- <script id="http-adobe-coldfusion-apsa1301" phase="PORT_SCAN" selection="category"></script>
- <script id="http-avaya-ipoffice-users" phase="PORT_SCAN" selection="category"></script>
- <script id="http-awstatstotals-exec" phase="PORT_SCAN" selection="category"></script>
- <script id="http-axis2-dir-traversal" phase="PORT_SCAN" selection="category"></script>
- <script id="http-cross-domain-policy" phase="PORT_SCAN" selection="category"></script>
- <script id="http-csrf" phase="PORT_SCAN" selection="category"></script>
- <script id="http-dlink-backdoor" phase="PORT_SCAN" selection="category"></script>
- <script id="http-dombased-xss" phase="PORT_SCAN" selection="category"></script>
- <script id="http-enum" phase="PORT_SCAN" selection="category"></script>
- <script id="http-fileupload-exploiter" phase="PORT_SCAN" selection="category"></script>
- <script id="http-frontpage-login" phase="PORT_SCAN" selection="category"></script>
- <script id="http-git" phase="PORT_SCAN" selection="category"></script>
- <script id="http-huawei-hg5xx-vuln" phase="PORT_SCAN" selection="category"></script>
- <script id="http-iis-webdav-vuln" phase="PORT_SCAN" selection="category"></script>
- <script id="http-litespeed-sourcecode-download" phase="PORT_SCAN" selection="category"></script>
- <script id="http-majordomo2-dir-traversal" phase="PORT_SCAN" selection="category"></script>
- <script id="http-method-tamper" phase="PORT_SCAN" selection="category"></script>
- <script id="http-passwd" phase="PORT_SCAN" selection="category"></script>
- <script id="http-phpmyadmin-dir-traversal" phase="PORT_SCAN" selection="category"></script>
- <script id="http-phpself-xss" phase="PORT_SCAN" selection="category"></script>
- <script id="http-shellshock" phase="PORT_SCAN" selection="category"></script>
- <script id="http-slowloris-check" phase="PORT_SCAN" selection="category"></script>
- <script id="http-sql-injection" phase="PORT_SCAN" selection="category"></script>
- <script id="http-stored-xss" phase="PORT_SCAN" selection="category"></script>
- <script id="http-tplink-dir-traversal" phase="PORT_SCAN" selection="category"></script>
- <script id="http-trace" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vmware-path-vuln" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2006-3392" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2010-0738" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2010-2861" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2011-3192" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2011-3368" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2012-1823" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2013-0156" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2013-6786" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2013-7091" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-2126" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-2127" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-2128" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-2129" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-3704" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-8877" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2015-1427" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2015-1635" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-misfortune-cookie" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-wnr1000-creds" phase="PORT_SCAN" selection="category"></script>
- <script id="http-wordpress-users" phase="PORT_SCAN" selection="category"></script>
- <script id="irc-botnet-channels" phase="PORT_SCAN" selection="category"></script>
- <script id="irc-unrealircd-backdoor" phase="PORT_SCAN" selection="category"></script>
- <script id="mysql-vuln-cve2012-2122" phase="PORT_SCAN" selection="category"></script>
- <script id="netbus-auth-bypass" phase="PORT_SCAN" selection="category"></script>
- <script id="qconn-exec" phase="PORT_SCAN" selection="category"></script>
- <script id="rdp-vuln-ms12-020" phase="PORT_SCAN" selection="category"></script>
- <script id="rmi-vuln-classloader" phase="PORT_SCAN" selection="category"></script>
- <script id="smtp-vuln-cve2010-4344" phase="PORT_SCAN" selection="category"></script>
- <script id="smtp-vuln-cve2011-1720" phase="PORT_SCAN" selection="category"></script>
- <script id="smtp-vuln-cve2011-1764" phase="PORT_SCAN" selection="category"></script>
- <script id="ssl-ccs-injection" phase="PORT_SCAN" selection="category"></script>
- <script id="ssl-dh-params" phase="PORT_SCAN" selection="category"></script>
- <script id="ssl-heartbleed" phase="PORT_SCAN" selection="category"></script>
- <script id="ssl-known-key" phase="PORT_SCAN" selection="category"></script>
- <script id="ssl-poodle" phase="PORT_SCAN" selection="category"></script>
- <script id="supermicro-ipmi-conf" phase="PORT_SCAN" selection="category"></script>
- <script id="wdb-version" phase="PORT_SCAN" selection="category"></script>
- <script id="afp-path-vuln" phase="PORT_SCAN" selection="category"></script>
- <script id="distcc-cve2004-2687" phase="PORT_SCAN" selection="category"></script>
- <script id="dns-update" phase="PORT_SCAN" selection="category"></script>
- <script id="ftp-libopie" phase="PORT_SCAN" selection="category"></script>
- <script id="ftp-proftpd-backdoor" phase="PORT_SCAN" selection="category"></script>
- <script id="ftp-vsftpd-backdoor" phase="PORT_SCAN" selection="category"></script>
- <script id="ftp-vuln-cve2010-4221" phase="PORT_SCAN" selection="category"></script>
- <script id="http-adobe-coldfusion-apsa1301" phase="PORT_SCAN" selection="category"></script>
- <script id="http-avaya-ipoffice-users" phase="PORT_SCAN" selection="category"></script>
- <script id="http-awstatstotals-exec" phase="PORT_SCAN" selection="category"></script>
- <script id="http-axis2-dir-traversal" phase="PORT_SCAN" selection="category"></script>
- <script id="http-cross-domain-policy" phase="PORT_SCAN" selection="category"></script>
- <script id="http-csrf" phase="PORT_SCAN" selection="category"></script>
- <script id="http-dlink-backdoor" phase="PORT_SCAN" selection="category"></script>
- <script id="http-dombased-xss" phase="PORT_SCAN" selection="category"></script>
- <script id="http-enum" phase="PORT_SCAN" selection="category"></script>
- <script id="http-fileupload-exploiter" phase="PORT_SCAN" selection="category"></script>
- <script id="http-frontpage-login" phase="PORT_SCAN" selection="category"></script>
- <script id="http-git" phase="PORT_SCAN" selection="category"></script>
- <script id="http-huawei-hg5xx-vuln" phase="PORT_SCAN" selection="category"></script>
- <script id="http-iis-webdav-vuln" phase="PORT_SCAN" selection="category"></script>
- <script id="http-litespeed-sourcecode-download" phase="PORT_SCAN" selection="category"></script>
- <script id="http-majordomo2-dir-traversal" phase="PORT_SCAN" selection="category"></script>
- <script id="http-method-tamper" phase="PORT_SCAN" selection="category"></script>
- <script id="http-passwd" phase="PORT_SCAN" selection="category"></script>
- <script id="http-phpmyadmin-dir-traversal" phase="PORT_SCAN" selection="category"></script>
- <script id="http-phpself-xss" phase="PORT_SCAN" selection="category"></script>
- <script id="http-shellshock" phase="PORT_SCAN" selection="category"></script>
- <script id="http-slowloris-check" phase="PORT_SCAN" selection="category"></script>
- <script id="http-sql-injection" phase="PORT_SCAN" selection="category"></script>
- <script id="http-stored-xss" phase="PORT_SCAN" selection="category"></script>
- <script id="http-tplink-dir-traversal" phase="PORT_SCAN" selection="category"></script>
- <script id="http-trace" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vmware-path-vuln" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2006-3392" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2010-0738" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2010-2861" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2011-3192" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2011-3368" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2012-1823" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2013-0156" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2013-6786" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2013-7091" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-2126" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-2127" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-2128" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-2129" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-3704" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-8877" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2015-1427" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2015-1635" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-misfortune-cookie" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-wnr1000-creds" phase="PORT_SCAN" selection="category"></script>
- <script id="http-wordpress-users" phase="PORT_SCAN" selection="category"></script>
- <script id="irc-botnet-channels" phase="PORT_SCAN" selection="category"></script>
- <script id="irc-unrealircd-backdoor" phase="PORT_SCAN" selection="category"></script>
- <script id="mysql-vuln-cve2012-2122" phase="PORT_SCAN" selection="category"></script>
- <script id="netbus-auth-bypass" phase="PORT_SCAN" selection="category"></script>
- <script id="qconn-exec" phase="PORT_SCAN" selection="category"></script>
- <script id="rdp-vuln-ms12-020" phase="PORT_SCAN" selection="category"></script>
- <script id="rmi-vuln-classloader" phase="PORT_SCAN" selection="category"></script>
- <script id="smtp-vuln-cve2010-4344" phase="PORT_SCAN" selection="category"></script>
- <script id="smtp-vuln-cve2011-1720" phase="PORT_SCAN" selection="category"></script>
- <script id="smtp-vuln-cve2011-1764" phase="PORT_SCAN" selection="category"></script>
- <script id="ssl-ccs-injection" phase="PORT_SCAN" selection="category"></script>
- <script id="ssl-dh-params" phase="PORT_SCAN" selection="category"></script>
- <script id="ssl-heartbleed" phase="PORT_SCAN" selection="category"></script>
- <script id="ssl-known-key" phase="PORT_SCAN" selection="category"></script>
- <script id="ssl-poodle" phase="PORT_SCAN" selection="category"></script>
- <script id="supermicro-ipmi-conf" phase="PORT_SCAN" selection="category"></script>
- <script id="wdb-version" phase="PORT_SCAN" selection="category"></script>
- <script id="afp-path-vuln" phase="PORT_SCAN" selection="category"></script>
- <script id="distcc-cve2004-2687" phase="PORT_SCAN" selection="category"></script>
- <script id="dns-update" phase="PORT_SCAN" selection="category"></script>
- <script id="ftp-libopie" phase="PORT_SCAN" selection="category"></script>
- <script id="ftp-proftpd-backdoor" phase="PORT_SCAN" selection="category"></script>
- <script id="ftp-vsftpd-backdoor" phase="PORT_SCAN" selection="category"></script>
- <script id="ftp-vuln-cve2010-4221" phase="PORT_SCAN" selection="category"></script>
- <script id="http-adobe-coldfusion-apsa1301" phase="PORT_SCAN" selection="category"></script>
- <script id="http-avaya-ipoffice-users" phase="PORT_SCAN" selection="category"></script>
- <script id="http-awstatstotals-exec" phase="PORT_SCAN" selection="category"></script>
- <script id="http-axis2-dir-traversal" phase="PORT_SCAN" selection="category"></script>
- <script id="http-cross-domain-policy" phase="PORT_SCAN" selection="category"></script>
- <script id="http-csrf" phase="PORT_SCAN" selection="category"></script>
- <script id="http-dlink-backdoor" phase="PORT_SCAN" selection="category"></script>
- <script id="http-dombased-xss" phase="PORT_SCAN" selection="category"></script>
- <script id="http-enum" phase="PORT_SCAN" selection="category"></script>
- <script id="http-fileupload-exploiter" phase="PORT_SCAN" selection="category"></script>
- <script id="http-frontpage-login" phase="PORT_SCAN" selection="category"></script>
- <script id="http-git" phase="PORT_SCAN" selection="category"></script>
- <script id="http-huawei-hg5xx-vuln" phase="PORT_SCAN" selection="category"></script>
- <script id="http-iis-webdav-vuln" phase="PORT_SCAN" selection="category"></script>
- <script id="http-litespeed-sourcecode-download" phase="PORT_SCAN" selection="category"></script>
- <script id="http-majordomo2-dir-traversal" phase="PORT_SCAN" selection="category"></script>
- <script id="http-method-tamper" phase="PORT_SCAN" selection="category"></script>
- <script id="http-passwd" phase="PORT_SCAN" selection="category"></script>
- <script id="http-phpmyadmin-dir-traversal" phase="PORT_SCAN" selection="category"></script>
- <script id="http-phpself-xss" phase="PORT_SCAN" selection="category"></script>
- <script id="http-shellshock" phase="PORT_SCAN" selection="category"></script>
- <script id="http-slowloris-check" phase="PORT_SCAN" selection="category"></script>
- <script id="http-sql-injection" phase="PORT_SCAN" selection="category"></script>
- <script id="http-stored-xss" phase="PORT_SCAN" selection="category"></script>
- <script id="http-tplink-dir-traversal" phase="PORT_SCAN" selection="category"></script>
- <script id="http-trace" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vmware-path-vuln" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2006-3392" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2010-0738" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2010-2861" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2011-3192" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2011-3368" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2012-1823" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2013-0156" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2013-6786" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2013-7091" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-2126" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-2127" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-2128" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-2129" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-3704" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-8877" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2015-1427" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2015-1635" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-misfortune-cookie" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-wnr1000-creds" phase="PORT_SCAN" selection="category"></script>
- <script id="http-wordpress-users" phase="PORT_SCAN" selection="category"></script>
- <script id="irc-botnet-channels" phase="PORT_SCAN" selection="category"></script>
- <script id="irc-unrealircd-backdoor" phase="PORT_SCAN" selection="category"></script>
- <script id="mysql-vuln-cve2012-2122" phase="PORT_SCAN" selection="category"></script>
- <script id="netbus-auth-bypass" phase="PORT_SCAN" selection="category"></script>
- <script id="qconn-exec" phase="PORT_SCAN" selection="category"></script>
- <script id="rdp-vuln-ms12-020" phase="PORT_SCAN" selection="category"></script>
- <script id="rmi-vuln-classloader" phase="PORT_SCAN" selection="category"></script>
- <script id="smtp-vuln-cve2010-4344" phase="PORT_SCAN" selection="category"></script>
- <script id="smtp-vuln-cve2011-1720" phase="PORT_SCAN" selection="category"></script>
- <script id="smtp-vuln-cve2011-1764" phase="PORT_SCAN" selection="category"></script>
- <script id="ssl-ccs-injection" phase="PORT_SCAN" selection="category"></script>
- <script id="ssl-dh-params" phase="PORT_SCAN" selection="category"></script>
- <script id="ssl-heartbleed" phase="PORT_SCAN" selection="category"></script>
- <script id="ssl-known-key" phase="PORT_SCAN" selection="category"></script>
- <script id="ssl-poodle" phase="PORT_SCAN" selection="category"></script>
- <script id="supermicro-ipmi-conf" phase="PORT_SCAN" selection="category"></script>
- <script id="wdb-version" phase="PORT_SCAN" selection="category"></script>
- <script id="afp-path-vuln" phase="PORT_SCAN" selection="category"></script>
- <script id="distcc-cve2004-2687" phase="PORT_SCAN" selection="category"></script>
- <script id="dns-update" phase="PORT_SCAN" selection="category"></script>
- <script id="ftp-libopie" phase="PORT_SCAN" selection="category"></script>
- <script id="ftp-proftpd-backdoor" phase="PORT_SCAN" selection="category"></script>
- <script id="ftp-vsftpd-backdoor" phase="PORT_SCAN" selection="category"></script>
- <script id="ftp-vuln-cve2010-4221" phase="PORT_SCAN" selection="category"></script>
- <script id="http-adobe-coldfusion-apsa1301" phase="PORT_SCAN" selection="category"></script>
- <script id="http-avaya-ipoffice-users" phase="PORT_SCAN" selection="category"></script>
- <script id="http-awstatstotals-exec" phase="PORT_SCAN" selection="category"></script>
- <script id="http-axis2-dir-traversal" phase="PORT_SCAN" selection="category"></script>
- <script id="http-cross-domain-policy" phase="PORT_SCAN" selection="category"></script>
- <script id="http-csrf" phase="PORT_SCAN" selection="category"></script>
- <script id="http-dlink-backdoor" phase="PORT_SCAN" selection="category"></script>
- <script id="http-dombased-xss" phase="PORT_SCAN" selection="category"></script>
- <script id="http-enum" phase="PORT_SCAN" selection="category"></script>
- <script id="http-fileupload-exploiter" phase="PORT_SCAN" selection="category"></script>
- <script id="http-frontpage-login" phase="PORT_SCAN" selection="category"></script>
- <script id="http-git" phase="PORT_SCAN" selection="category"></script>
- <script id="http-huawei-hg5xx-vuln" phase="PORT_SCAN" selection="category"></script>
- <script id="http-iis-webdav-vuln" phase="PORT_SCAN" selection="category"></script>
- <script id="http-litespeed-sourcecode-download" phase="PORT_SCAN" selection="category"></script>
- <script id="http-majordomo2-dir-traversal" phase="PORT_SCAN" selection="category"></script>
- <script id="http-method-tamper" phase="PORT_SCAN" selection="category"></script>
- <script id="http-passwd" phase="PORT_SCAN" selection="category"></script>
- <script id="http-phpmyadmin-dir-traversal" phase="PORT_SCAN" selection="category"></script>
- <script id="http-phpself-xss" phase="PORT_SCAN" selection="category"></script>
- <script id="http-shellshock" phase="PORT_SCAN" selection="category"></script>
- <script id="http-slowloris-check" phase="PORT_SCAN" selection="category"></script>
- <script id="http-sql-injection" phase="PORT_SCAN" selection="category"></script>
- <script id="http-stored-xss" phase="PORT_SCAN" selection="category"></script>
- <script id="http-tplink-dir-traversal" phase="PORT_SCAN" selection="category"></script>
- <script id="http-trace" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vmware-path-vuln" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2006-3392" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2010-0738" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2010-2861" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2011-3192" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2011-3368" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2012-1823" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2013-0156" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2013-6786" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2013-7091" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-2126" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-2127" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-2128" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-2129" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-3704" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2014-8877" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2015-1427" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-cve2015-1635" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-misfortune-cookie" phase="PORT_SCAN" selection="category"></script>
- <script id="http-vuln-wnr1000-creds" phase="PORT_SCAN" selection="category"></script>
- <script id="http-wordpress-users" phase="PORT_SCAN" selection="category"></script>
- <script id="irc-botnet-channels" phase="PORT_SCAN" selection="category"></script>
- <script id="irc-unrealircd-backdoor" phase="PORT_SCAN" selection="category"></script>
- <script id="mysql-vuln-cve2012-2122" phase="PORT_SCAN" selection="category"></script>
- <script id="netbus-auth-bypass" phase="PORT_SCAN" selection="category"></script>
- <script id="qconn-exec" phase="PORT_SCAN" selection="category"></script>
- <script id="rdp-vuln-ms12-020" phase="PORT_SCAN" selection="category"></script>
- <script id="rmi-vuln-classloader" phase="PORT_SCAN" selection="category"></script>
- <script id="smtp-vuln-cve2010-4344" phase="PORT_SCAN" selection="category"></script>
- <script id="smtp-vuln-cve2011-1720" phase="PORT_SCAN" selection="category"></script>
- <script id="smtp-vuln-cve2011-1764" phase="PORT_SCAN" selection="category"></script>
- <script id="ssl-ccs-injection" phase="PORT_SCAN" selection="category"></script>
- <script id="ssl-dh-params" phase="PORT_SCAN" selection="category"></script>
- <script id="ssl-heartbleed" phase="PORT_SCAN" selection="category"></script>
- <script id="ssl-known-key" phase="PORT_SCAN" selection="category"></script>
- <script id="ssl-poodle" phase="PORT_SCAN" selection="category"></script>
- <script id="supermicro-ipmi-conf" phase="PORT_SCAN" selection="category"></script>
- <script id="wdb-version" phase="PORT_SCAN" selection="category"></script><host starttime="1468624594" endtime="1468624906"><status state="up" reason="syn-ack" reason_ttl="0"/>
- <address addr="127.0.0.1" addrtype="ipv4"/>
- <hostnames>
- <hostname name="localhost" type="user"/>
- <hostname name="localhost" type="PTR"/>
- </hostnames>
- <ports><extraports state="closed" count="991">
- <extrareasons reason="conn-refused" count="991"/>
- </extraports>
- <port protocol="tcp" portid="22"><state state="open" reason="syn-ack" reason_ttl="0"/><service name="ssh" method="table" conf="3"/></port>
- <port protocol="tcp" portid="80"><state state="open" reason="syn-ack" reason_ttl="0"/><service name="http" method="table" conf="3"/><script id="http-csrf" output="
Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=localhost
 Found the following possible CSRF vulnerabilities: 
 
 Path: http://localhost/adminlogin.php
 Form id: form2
 Form action: 
 
 Path: http://localhost/employeelogin.php
 Form id: form1
 Form action: 
"/><script id="http-dombased-xss" output="Couldn't find any DOM based XSS."/><script id="http-enum" output="
 /login.php: Possible admin folder
 /css/: Potentially interesting directory w/ listing on 'apache/2.4.10 (ubuntu)'
 /images/: Potentially interesting directory w/ listing on 'apache/2.4.10 (ubuntu)'
 /js/: Potentially interesting directory w/ listing on 'apache/2.4.10 (ubuntu)'
 /server-status/: Potentially interesting folder
 /upload/: Potentially interesting directory w/ listing on 'apache/2.4.10 (ubuntu)'
"/><script id="http-fileupload-exploiter" output="
"></script><script id="http-frontpage-login" output="false">false</script><script id="http-slowloris-check" output="
 VULNERABLE:
 Slowloris DOS attack
 State: LIKELY VULNERABLE
 IDs: CVE:CVE-2007-6750
 Slowloris tries to keep many connections to the target web server open and hold
 them open as long as possible. It accomplishes this by opening connections to
 the target web server and sending a partial request. By doing so, it starves
 the http server's resources causing Denial Of Service.
 
 Disclosure date: 2009-09-17
 References:
 http://ha.ckers.org/slowloris/
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6750
"><table key="CVE-2007-6750">
- <elem key="title">Slowloris DOS attack</elem>
- <elem key="state">LIKELY VULNERABLE</elem>
- <table key="ids">
- <elem>CVE:CVE-2007-6750</elem>
- </table>
- <table key="description">
- <elem>Slowloris tries to keep many connections to the target web server open and hold
them open as long as possible. It accomplishes this by opening connections to
the target web server and sending a partial request. By doing so, it starves
the http server's resources causing Denial Of Service.
</elem>
- </table>
- <table key="dates">
- <table key="disclosure">
- <elem key="year">2009</elem>
- <elem key="day">17</elem>
- <elem key="month">09</elem>
- </table>
- </table>
- <elem key="disclosure">2009-09-17</elem>
- <table key="exploit_results">
- </table>
- <table key="refs">
- <elem>http://ha.ckers.org/slowloris/</elem>
- <elem>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6750</elem>
- </table>
- </table>
- </script><script id="http-stored-xss" output="Couldn't find any stored XSS vulnerabilities."/></port>
- <port protocol="tcp" portid="111"><state state="open" reason="syn-ack" reason_ttl="0"/><service name="rpcbind" method="table" conf="3"/></port>
- <port protocol="tcp" portid="139"><state state="open" reason="syn-ack" reason_ttl="0"/><service name="netbios-ssn" method="table" conf="3"/></port>
- <port protocol="tcp" portid="445"><state state="open" reason="syn-ack" reason_ttl="0"/><service name="microsoft-ds" method="table" conf="3"/></port>
- <port protocol="tcp" portid="902"><state state="open" reason="syn-ack" reason_ttl="0"/><service name="iss-realsecure" method="table" conf="3"/></port>
- <port protocol="tcp" portid="3306"><state state="open" reason="syn-ack" reason_ttl="0"/><service name="mysql" method="table" conf="3"/></port>
- <port protocol="tcp" portid="5432"><state state="open" reason="syn-ack" reason_ttl="0"/><service name="postgresql" method="table" conf="3"/><script id="ssl-dh-params" output="
 VULNERABLE:
 Diffie-Hellman Key Exchange Insufficient Group Strength
 State: VULNERABLE
 Transport Layer Security (TLS) services that use Diffie-Hellman groups of
 insufficient strength, especially those using one of a few commonly shared
 groups, may be susceptible to passive eavesdropping attacks.
 Check results:
 WEAK DH GROUP 1
 Cipher Suite: TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
 Modulus Type: Safe prime
 Modulus Source: Unknown/Custom-generated
 Modulus Length: 1024
 Generator Length: 8
 Public Key Length: 1024
 References:
 https://weakdh.org
"><table key="NMAP-8">
- <elem key="title">Diffie-Hellman Key Exchange Insufficient Group Strength</elem>
- <elem key="state">VULNERABLE</elem>
- <table key="description">
- <elem>Transport Layer Security (TLS) services that use Diffie-Hellman groups of
insufficient strength, especially those using one of a few commonly shared
groups, may be susceptible to passive eavesdropping attacks.</elem>
- </table>
- <table key="check_results">
- <elem>WEAK DH GROUP 1
 Cipher Suite: TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
 Modulus Type: Safe prime
 Modulus Source: Unknown/Custom-generated
 Modulus Length: 1024
 Generator Length: 8
 Public Key Length: 1024</elem>
- </table>
- <table key="refs">
- <elem>https://weakdh.org</elem>
- </table>
- </table>
- </script><script id="ssl-poodle" output="
 VULNERABLE:
 SSL POODLE information leak
 State: LIKELY VULNERABLE
 IDs: CVE:CVE-2014-3566 OSVDB:113251
 The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and
 other products, uses nondeterministic CBC padding, which makes it easier
 for man-in-the-middle attackers to obtain cleartext data via a
 padding-oracle attack, aka the "POODLE" issue.
 Disclosure date: 2014-10-14
 Check results:
 TLS_RSA_WITH_AES_128_CBC_SHA
 TLS_FALLBACK_SCSV properly implemented
 References:
 https://www.imperialviolet.org/2014/10/14/poodle.html
 http://osvdb.org/113251
 https://www.openssl.org/~bodo/ssl-poodle.pdf
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
"><table key="CVE-2014-3566">
- <elem key="title">SSL POODLE information leak</elem>
- <elem key="state">LIKELY VULNERABLE</elem>
- <table key="ids">
- <elem>CVE:CVE-2014-3566</elem>
- <elem>OSVDB:113251</elem>
- </table>
- <table key="description">
- <elem> The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and
 other products, uses nondeterministic CBC padding, which makes it easier
 for man-in-the-middle attackers to obtain cleartext data via a
 padding-oracle attack, aka the "POODLE" issue.</elem>
- </table>
- <table key="dates">
- <table key="disclosure">
- <elem key="year">2014</elem>
- <elem key="day">14</elem>
- <elem key="month">10</elem>
- </table>
- </table>
- <elem key="disclosure">2014-10-14</elem>
- <table key="check_results">
- <elem>TLS_RSA_WITH_AES_128_CBC_SHA</elem>
- <elem>TLS_FALLBACK_SCSV properly implemented</elem>
- </table>
- <table key="refs">
- <elem>https://www.imperialviolet.org/2014/10/14/poodle.html</elem>
- <elem>http://osvdb.org/113251</elem>
- <elem>https://www.openssl.org/~bodo/ssl-poodle.pdf</elem>
- <elem>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566</elem>
- </table>
- </table>
- </script></port>
- <port protocol="tcp" portid="9050"><state state="open" reason="syn-ack" reason_ttl="0"/><service name="tor-socks" method="table" conf="3"/></port>
- </ports>
- <hostscript><script id="smb-vuln-cve2009-3103" output="
 VULNERABLE:
 SMBv2 exploit (CVE-2009-3103, Microsoft Security Advisory 975497)
 State: VULNERABLE
 IDs: CVE:CVE-2009-3103
 Array index error in the SMBv2 protocol implementation in srv2.sys in Microsoft Windows Vista Gold, SP1, and SP2, 
 Windows Server 2008 Gold and SP2, and Windows 7 RC allows remote attackers to execute arbitrary code or cause a 
 denial of service (system crash) via an & (ampersand) character in a Process ID High header field in a NEGOTIATE 
 PROTOCOL REQUEST packet, which triggers an attempted dereference of an out-of-bounds memory location, 
 aka "SMBv2 Negotiation Vulnerability." 
 
 Disclosure date: 2009-09-08
 References:
 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3103
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3103
"><table key="CVE-2009-3103">
- <elem key="title">SMBv2 exploit (CVE-2009-3103, Microsoft Security Advisory 975497)</elem>
- <elem key="state">VULNERABLE</elem>
- <table key="ids">
- <elem>CVE:CVE-2009-3103</elem>
- </table>
- <table key="description">
- <elem> Array index error in the SMBv2 protocol implementation in srv2.sys in Microsoft Windows Vista Gold, SP1, and SP2, 
 Windows Server 2008 Gold and SP2, and Windows 7 RC allows remote attackers to execute arbitrary code or cause a 
 denial of service (system crash) via an & (ampersand) character in a Process ID High header field in a NEGOTIATE 
 PROTOCOL REQUEST packet, which triggers an attempted dereference of an out-of-bounds memory location, 
 aka "SMBv2 Negotiation Vulnerability." 
 </elem>
- </table>
- <table key="dates">
- <table key="disclosure">
- <elem key="year">2009</elem>
- <elem key="day">08</elem>
- <elem key="month">09</elem>
- </table>
- </table>
- <elem key="disclosure">2009-09-08</elem>
- <table key="refs">
- <elem>http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3103</elem>
- <elem>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3103</elem>
- </table>
- </table>
- </script><script id="smb-vuln-ms10-054" output="false">false</script><script id="smb-vuln-ms10-061" output="false">false</script><script id="smb-vuln-regsvc-dos" output="
 VULNERABLE:
 Service regsvc in Microsoft Windows systems vulnerable to denial of service
 State: VULNERABLE
 The service regsvc in Microsoft Windows 2000 systems is vulnerable to denial of service caused by a null deference 
 pointer. This script will crash the service if it is vulnerable. This vulnerability was discovered by Ron Bowes 
 while working on smb-enum-sessions.
 
"><table key="NMAP-6">
- <elem key="title">Service regsvc in Microsoft Windows systems vulnerable to denial of service</elem>
- <elem key="state">VULNERABLE</elem>
- <table key="description">
- <elem>The service regsvc in Microsoft Windows 2000 systems is vulnerable to denial of service caused by a null deference 
pointer. This script will crash the service if it is vulnerable. This vulnerability was discovered by Ron Bowes 
while working on smb-enum-sessions.
 </elem>
- </table>
- </table>
- </script></hostscript><times srtt="70" rttvar="61" to="100000"/>
- </host>
- <runstats><finished time="1468624906" timestr="Sat Jul 16 04:51:46 2016" elapsed="346.24" summary="Nmap done at Sat Jul 16 04:51:46 2016; 1 IP address (1 host up) scanned in 346.24 seconds" exit="success"/><hosts up="1" down="0" total="1"/>
- </runstats>
- </nmaprun>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement