Advertisement
tremblerz

scan_after_applying_patch.xml

Jul 16th, 2016
35
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
XML 68.99 KB | None | 0 0
  1. <?xml version="1.0" encoding="UTF-8"?>
  2. <!DOCTYPE nmaprun>
  3. <?xml-stylesheet href="file:///usr/local/bin/../share/nmap/nmap.xsl" type="text/xsl"?>
  4. <!-- Nmap 7.12SVN scan initiated Sat Jul 16 04:45:59 2016 as: nmap -oX scan1.xml -&#45;script vuln localhost -->
  5. <nmaprun scanner="nmap" args="nmap -oX scan1.xml -&#45;script vuln localhost" start="1468624559" startstr="Sat Jul 16 04:45:59 2016" version="7.12SVN" xmloutputversion="1.04">
  6. <scaninfo type="connect" protocol="tcp" numservices="1000" services="1,3-4,6-7,9,13,17,19-26,30,32-33,37,42-43,49,53,70,79-85,88-90,99-100,106,109-111,113,119,125,135,139,143-144,146,161,163,179,199,211-212,222,254-256,259,264,280,301,306,311,340,366,389,406-407,416-417,425,427,443-445,458,464-465,481,497,500,512-515,524,541,543-545,548,554-555,563,587,593,616-617,625,631,636,646,648,666-668,683,687,691,700,705,711,714,720,722,726,749,765,777,783,787,800-801,808,843,873,880,888,898,900-903,911-912,981,987,990,992-993,995,999-1002,1007,1009-1011,1021-1100,1102,1104-1108,1110-1114,1117,1119,1121-1124,1126,1130-1132,1137-1138,1141,1145,1147-1149,1151-1152,1154,1163-1166,1169,1174-1175,1183,1185-1187,1192,1198-1199,1201,1213,1216-1218,1233-1234,1236,1244,1247-1248,1259,1271-1272,1277,1287,1296,1300-1301,1309-1311,1322,1328,1334,1352,1417,1433-1434,1443,1455,1461,1494,1500-1501,1503,1521,1524,1533,1556,1580,1583,1594,1600,1641,1658,1666,1687-1688,1700,1717-1721,1723,1755,1761,1782-1783,1801,1805,1812,1839-1840,1862-1864,1875,1900,1914,1935,1947,1971-1972,1974,1984,1998-2010,2013,2020-2022,2030,2033-2035,2038,2040-2043,2045-2049,2065,2068,2099-2100,2103,2105-2107,2111,2119,2121,2126,2135,2144,2160-2161,2170,2179,2190-2191,2196,2200,2222,2251,2260,2288,2301,2323,2366,2381-2383,2393-2394,2399,2401,2492,2500,2522,2525,2557,2601-2602,2604-2605,2607-2608,2638,2701-2702,2710,2717-2718,2725,2800,2809,2811,2869,2875,2909-2910,2920,2967-2968,2998,3000-3001,3003,3005-3007,3011,3013,3017,3030-3031,3052,3071,3077,3128,3168,3211,3221,3260-3261,3268-3269,3283,3300-3301,3306,3322-3325,3333,3351,3367,3369-3372,3389-3390,3404,3476,3493,3517,3527,3546,3551,3580,3659,3689-3690,3703,3737,3766,3784,3800-3801,3809,3814,3826-3828,3851,3869,3871,3878,3880,3889,3905,3914,3918,3920,3945,3971,3986,3995,3998,4000-4006,4045,4111,4125-4126,4129,4224,4242,4279,4321,4343,4443-4446,4449,4550,4567,4662,4848,4899-4900,4998,5000-5004,5009,5030,5033,5050-5051,5054,5060-5061,5080,5087,5100-5102,5120,5190,5200,5214,5221-5222,5225-5226,5269,5280,5298,5357,5405,5414,5431-5432,5440,5500,5510,5544,5550,5555,5560,5566,5631,5633,5666,5678-5679,5718,5730,5800-5802,5810-5811,5815,5822,5825,5850,5859,5862,5877,5900-5904,5906-5907,5910-5911,5915,5922,5925,5950,5952,5959-5963,5987-5989,5998-6007,6009,6025,6059,6100-6101,6106,6112,6123,6129,6156,6346,6389,6502,6510,6543,6547,6565-6567,6580,6646,6666-6669,6689,6692,6699,6779,6788-6789,6792,6839,6881,6901,6969,7000-7002,7004,7007,7019,7025,7070,7100,7103,7106,7200-7201,7402,7435,7443,7496,7512,7625,7627,7676,7741,7777-7778,7800,7911,7920-7921,7937-7938,7999-8002,8007-8011,8021-8022,8031,8042,8045,8080-8090,8093,8099-8100,8180-8181,8192-8194,8200,8222,8254,8290-8292,8300,8333,8383,8400,8402,8443,8500,8600,8649,8651-8652,8654,8701,8800,8873,8888,8899,8994,9000-9003,9009-9011,9040,9050,9071,9080-9081,9090-9091,9099-9103,9110-9111,9200,9207,9220,9290,9415,9418,9485,9500,9502-9503,9535,9575,9593-9595,9618,9666,9876-9878,9898,9900,9917,9929,9943-9944,9968,9998-10004,10009-10010,10012,10024-10025,10082,10180,10215,10243,10566,10616-10617,10621,10626,10628-10629,10778,11110-11111,11967,12000,12174,12265,12345,13456,13722,13782-13783,14000,14238,14441-14442,15000,15002-15004,15660,15742,16000-16001,16012,16016,16018,16080,16113,16992-16993,17877,17988,18040,18101,18988,19101,19283,19315,19350,19780,19801,19842,20000,20005,20031,20221-20222,20828,21571,22939,23502,24444,24800,25734-25735,26214,27000,27352-27353,27355-27356,27715,28201,30000,30718,30951,31038,31337,32768-32785,33354,33899,34571-34573,35500,38292,40193,40911,41511,42510,44176,44442-44443,44501,45100,48080,49152-49161,49163,49165,49167,49175-49176,49400,49999-50003,50006,50300,50389,50500,50636,50800,51103,51493,52673,52822,52848,52869,54045,54328,55055-55056,55555,55600,56737-56738,57294,57797,58080,60020,60443,61532,61900,62078,63331,64623,64680,65000,65129,65389"/>
  7. <verbose level="0"/>
  8. <debugging level="0"/>
  9.  
  10. <script id="broadcast-avahi-dos" phase="PRE_SCAN" selection="category"></script><prescript><script id="broadcast-avahi-dos" output="&#xa;  Discovered hosts:&#xa;    224.0.0.251&#xa;  After NULL UDP avahi packet DoS (CVE-2011-1002).&#xa;  Hosts are all up (not vulnerable).&#xa;"/></prescript>
  11. <script id="firewall-bypass" phase="HOST_SCAN" selection="category"></script>
  12. <script id="samba-vuln-cve-2012-1182" phase="HOST_SCAN" selection="category"></script>
  13. <script id="smb-vuln-conficker" phase="HOST_SCAN" selection="category"></script>
  14. <script id="smb-vuln-cve2009-3103" phase="HOST_SCAN" selection="category"></script>
  15. <script id="smb-vuln-ms06-025" phase="HOST_SCAN" selection="category"></script>
  16. <script id="smb-vuln-ms07-029" phase="HOST_SCAN" selection="category"></script>
  17. <script id="smb-vuln-ms08-067" phase="HOST_SCAN" selection="category"></script>
  18. <script id="smb-vuln-ms10-054" phase="HOST_SCAN" selection="category"></script>
  19. <script id="smb-vuln-ms10-061" phase="HOST_SCAN" selection="category"></script>
  20. <script id="smb-vuln-regsvc-dos" phase="HOST_SCAN" selection="category"></script>
  21. <script id="afp-path-vuln" phase="PORT_SCAN" selection="category"></script>
  22. <script id="distcc-cve2004-2687" phase="PORT_SCAN" selection="category"></script>
  23. <script id="dns-update" phase="PORT_SCAN" selection="category"></script>
  24. <script id="ftp-libopie" phase="PORT_SCAN" selection="category"></script>
  25. <script id="ftp-proftpd-backdoor" phase="PORT_SCAN" selection="category"></script>
  26. <script id="ftp-vsftpd-backdoor" phase="PORT_SCAN" selection="category"></script>
  27. <script id="ftp-vuln-cve2010-4221" phase="PORT_SCAN" selection="category"></script>
  28. <script id="http-adobe-coldfusion-apsa1301" phase="PORT_SCAN" selection="category"></script>
  29. <script id="http-avaya-ipoffice-users" phase="PORT_SCAN" selection="category"></script>
  30. <script id="http-awstatstotals-exec" phase="PORT_SCAN" selection="category"></script>
  31. <script id="http-axis2-dir-traversal" phase="PORT_SCAN" selection="category"></script>
  32. <script id="http-cross-domain-policy" phase="PORT_SCAN" selection="category"></script>
  33. <script id="http-csrf" phase="PORT_SCAN" selection="category"></script>
  34. <script id="http-dlink-backdoor" phase="PORT_SCAN" selection="category"></script>
  35. <script id="http-dombased-xss" phase="PORT_SCAN" selection="category"></script>
  36. <script id="http-enum" phase="PORT_SCAN" selection="category"></script>
  37. <script id="http-fileupload-exploiter" phase="PORT_SCAN" selection="category"></script>
  38. <script id="http-frontpage-login" phase="PORT_SCAN" selection="category"></script>
  39. <script id="http-git" phase="PORT_SCAN" selection="category"></script>
  40. <script id="http-huawei-hg5xx-vuln" phase="PORT_SCAN" selection="category"></script>
  41. <script id="http-iis-webdav-vuln" phase="PORT_SCAN" selection="category"></script>
  42. <script id="http-litespeed-sourcecode-download" phase="PORT_SCAN" selection="category"></script>
  43. <script id="http-majordomo2-dir-traversal" phase="PORT_SCAN" selection="category"></script>
  44. <script id="http-method-tamper" phase="PORT_SCAN" selection="category"></script>
  45. <script id="http-passwd" phase="PORT_SCAN" selection="category"></script>
  46. <script id="http-phpmyadmin-dir-traversal" phase="PORT_SCAN" selection="category"></script>
  47. <script id="http-phpself-xss" phase="PORT_SCAN" selection="category"></script>
  48. <script id="http-shellshock" phase="PORT_SCAN" selection="category"></script>
  49. <script id="http-slowloris-check" phase="PORT_SCAN" selection="category"></script>
  50. <script id="http-sql-injection" phase="PORT_SCAN" selection="category"></script>
  51. <script id="http-stored-xss" phase="PORT_SCAN" selection="category"></script>
  52. <script id="http-tplink-dir-traversal" phase="PORT_SCAN" selection="category"></script>
  53. <script id="http-trace" phase="PORT_SCAN" selection="category"></script>
  54. <script id="http-vmware-path-vuln" phase="PORT_SCAN" selection="category"></script>
  55. <script id="http-vuln-cve2006-3392" phase="PORT_SCAN" selection="category"></script>
  56. <script id="http-vuln-cve2010-0738" phase="PORT_SCAN" selection="category"></script>
  57. <script id="http-vuln-cve2010-2861" phase="PORT_SCAN" selection="category"></script>
  58. <script id="http-vuln-cve2011-3192" phase="PORT_SCAN" selection="category"></script>
  59. <script id="http-vuln-cve2011-3368" phase="PORT_SCAN" selection="category"></script>
  60. <script id="http-vuln-cve2012-1823" phase="PORT_SCAN" selection="category"></script>
  61. <script id="http-vuln-cve2013-0156" phase="PORT_SCAN" selection="category"></script>
  62. <script id="http-vuln-cve2013-6786" phase="PORT_SCAN" selection="category"></script>
  63. <script id="http-vuln-cve2013-7091" phase="PORT_SCAN" selection="category"></script>
  64. <script id="http-vuln-cve2014-2126" phase="PORT_SCAN" selection="category"></script>
  65. <script id="http-vuln-cve2014-2127" phase="PORT_SCAN" selection="category"></script>
  66. <script id="http-vuln-cve2014-2128" phase="PORT_SCAN" selection="category"></script>
  67. <script id="http-vuln-cve2014-2129" phase="PORT_SCAN" selection="category"></script>
  68. <script id="http-vuln-cve2014-3704" phase="PORT_SCAN" selection="category"></script>
  69. <script id="http-vuln-cve2014-8877" phase="PORT_SCAN" selection="category"></script>
  70. <script id="http-vuln-cve2015-1427" phase="PORT_SCAN" selection="category"></script>
  71. <script id="http-vuln-cve2015-1635" phase="PORT_SCAN" selection="category"></script>
  72. <script id="http-vuln-misfortune-cookie" phase="PORT_SCAN" selection="category"></script>
  73. <script id="http-vuln-wnr1000-creds" phase="PORT_SCAN" selection="category"></script>
  74. <script id="http-wordpress-users" phase="PORT_SCAN" selection="category"></script>
  75. <script id="irc-botnet-channels" phase="PORT_SCAN" selection="category"></script>
  76. <script id="irc-unrealircd-backdoor" phase="PORT_SCAN" selection="category"></script>
  77. <script id="mysql-vuln-cve2012-2122" phase="PORT_SCAN" selection="category"></script>
  78. <script id="netbus-auth-bypass" phase="PORT_SCAN" selection="category"></script>
  79. <script id="qconn-exec" phase="PORT_SCAN" selection="category"></script>
  80. <script id="rdp-vuln-ms12-020" phase="PORT_SCAN" selection="category"></script>
  81. <script id="rmi-vuln-classloader" phase="PORT_SCAN" selection="category"></script>
  82. <script id="smtp-vuln-cve2010-4344" phase="PORT_SCAN" selection="category"></script>
  83. <script id="smtp-vuln-cve2011-1720" phase="PORT_SCAN" selection="category"></script>
  84. <script id="smtp-vuln-cve2011-1764" phase="PORT_SCAN" selection="category"></script>
  85. <script id="ssl-ccs-injection" phase="PORT_SCAN" selection="category"></script>
  86. <script id="ssl-dh-params" phase="PORT_SCAN" selection="category"></script>
  87. <script id="ssl-heartbleed" phase="PORT_SCAN" selection="category"></script>
  88. <script id="ssl-known-key" phase="PORT_SCAN" selection="category"></script>
  89. <script id="ssl-poodle" phase="PORT_SCAN" selection="category"></script>
  90. <script id="supermicro-ipmi-conf" phase="PORT_SCAN" selection="category"></script>
  91. <script id="wdb-version" phase="PORT_SCAN" selection="category"></script>
  92. <script id="afp-path-vuln" phase="PORT_SCAN" selection="category"></script>
  93. <script id="distcc-cve2004-2687" phase="PORT_SCAN" selection="category"></script>
  94. <script id="dns-update" phase="PORT_SCAN" selection="category"></script>
  95. <script id="ftp-libopie" phase="PORT_SCAN" selection="category"></script>
  96. <script id="ftp-proftpd-backdoor" phase="PORT_SCAN" selection="category"></script>
  97. <script id="ftp-vsftpd-backdoor" phase="PORT_SCAN" selection="category"></script>
  98. <script id="ftp-vuln-cve2010-4221" phase="PORT_SCAN" selection="category"></script>
  99. <script id="http-adobe-coldfusion-apsa1301" phase="PORT_SCAN" selection="category"></script>
  100. <script id="http-avaya-ipoffice-users" phase="PORT_SCAN" selection="category"></script>
  101. <script id="http-awstatstotals-exec" phase="PORT_SCAN" selection="category"></script>
  102. <script id="http-axis2-dir-traversal" phase="PORT_SCAN" selection="category"></script>
  103. <script id="http-cross-domain-policy" phase="PORT_SCAN" selection="category"></script>
  104. <script id="http-csrf" phase="PORT_SCAN" selection="category"></script>
  105. <script id="http-dlink-backdoor" phase="PORT_SCAN" selection="category"></script>
  106. <script id="http-dombased-xss" phase="PORT_SCAN" selection="category"></script>
  107. <script id="http-enum" phase="PORT_SCAN" selection="category"></script>
  108. <script id="http-fileupload-exploiter" phase="PORT_SCAN" selection="category"></script>
  109. <script id="http-frontpage-login" phase="PORT_SCAN" selection="category"></script>
  110. <script id="http-git" phase="PORT_SCAN" selection="category"></script>
  111. <script id="http-huawei-hg5xx-vuln" phase="PORT_SCAN" selection="category"></script>
  112. <script id="http-iis-webdav-vuln" phase="PORT_SCAN" selection="category"></script>
  113. <script id="http-litespeed-sourcecode-download" phase="PORT_SCAN" selection="category"></script>
  114. <script id="http-majordomo2-dir-traversal" phase="PORT_SCAN" selection="category"></script>
  115. <script id="http-method-tamper" phase="PORT_SCAN" selection="category"></script>
  116. <script id="http-passwd" phase="PORT_SCAN" selection="category"></script>
  117. <script id="http-phpmyadmin-dir-traversal" phase="PORT_SCAN" selection="category"></script>
  118. <script id="http-phpself-xss" phase="PORT_SCAN" selection="category"></script>
  119. <script id="http-shellshock" phase="PORT_SCAN" selection="category"></script>
  120. <script id="http-slowloris-check" phase="PORT_SCAN" selection="category"></script>
  121. <script id="http-sql-injection" phase="PORT_SCAN" selection="category"></script>
  122. <script id="http-stored-xss" phase="PORT_SCAN" selection="category"></script>
  123. <script id="http-tplink-dir-traversal" phase="PORT_SCAN" selection="category"></script>
  124. <script id="http-trace" phase="PORT_SCAN" selection="category"></script>
  125. <script id="http-vmware-path-vuln" phase="PORT_SCAN" selection="category"></script>
  126. <script id="http-vuln-cve2006-3392" phase="PORT_SCAN" selection="category"></script>
  127. <script id="http-vuln-cve2010-0738" phase="PORT_SCAN" selection="category"></script>
  128. <script id="http-vuln-cve2010-2861" phase="PORT_SCAN" selection="category"></script>
  129. <script id="http-vuln-cve2011-3192" phase="PORT_SCAN" selection="category"></script>
  130. <script id="http-vuln-cve2011-3368" phase="PORT_SCAN" selection="category"></script>
  131. <script id="http-vuln-cve2012-1823" phase="PORT_SCAN" selection="category"></script>
  132. <script id="http-vuln-cve2013-0156" phase="PORT_SCAN" selection="category"></script>
  133. <script id="http-vuln-cve2013-6786" phase="PORT_SCAN" selection="category"></script>
  134. <script id="http-vuln-cve2013-7091" phase="PORT_SCAN" selection="category"></script>
  135. <script id="http-vuln-cve2014-2126" phase="PORT_SCAN" selection="category"></script>
  136. <script id="http-vuln-cve2014-2127" phase="PORT_SCAN" selection="category"></script>
  137. <script id="http-vuln-cve2014-2128" phase="PORT_SCAN" selection="category"></script>
  138. <script id="http-vuln-cve2014-2129" phase="PORT_SCAN" selection="category"></script>
  139. <script id="http-vuln-cve2014-3704" phase="PORT_SCAN" selection="category"></script>
  140. <script id="http-vuln-cve2014-8877" phase="PORT_SCAN" selection="category"></script>
  141. <script id="http-vuln-cve2015-1427" phase="PORT_SCAN" selection="category"></script>
  142. <script id="http-vuln-cve2015-1635" phase="PORT_SCAN" selection="category"></script>
  143. <script id="http-vuln-misfortune-cookie" phase="PORT_SCAN" selection="category"></script>
  144. <script id="http-vuln-wnr1000-creds" phase="PORT_SCAN" selection="category"></script>
  145. <script id="http-wordpress-users" phase="PORT_SCAN" selection="category"></script>
  146. <script id="irc-botnet-channels" phase="PORT_SCAN" selection="category"></script>
  147. <script id="irc-unrealircd-backdoor" phase="PORT_SCAN" selection="category"></script>
  148. <script id="mysql-vuln-cve2012-2122" phase="PORT_SCAN" selection="category"></script>
  149. <script id="netbus-auth-bypass" phase="PORT_SCAN" selection="category"></script>
  150. <script id="qconn-exec" phase="PORT_SCAN" selection="category"></script>
  151. <script id="rdp-vuln-ms12-020" phase="PORT_SCAN" selection="category"></script>
  152. <script id="rmi-vuln-classloader" phase="PORT_SCAN" selection="category"></script>
  153. <script id="smtp-vuln-cve2010-4344" phase="PORT_SCAN" selection="category"></script>
  154. <script id="smtp-vuln-cve2011-1720" phase="PORT_SCAN" selection="category"></script>
  155. <script id="smtp-vuln-cve2011-1764" phase="PORT_SCAN" selection="category"></script>
  156. <script id="ssl-ccs-injection" phase="PORT_SCAN" selection="category"></script>
  157. <script id="ssl-dh-params" phase="PORT_SCAN" selection="category"></script>
  158. <script id="ssl-heartbleed" phase="PORT_SCAN" selection="category"></script>
  159. <script id="ssl-known-key" phase="PORT_SCAN" selection="category"></script>
  160. <script id="ssl-poodle" phase="PORT_SCAN" selection="category"></script>
  161. <script id="supermicro-ipmi-conf" phase="PORT_SCAN" selection="category"></script>
  162. <script id="wdb-version" phase="PORT_SCAN" selection="category"></script>
  163. <script id="afp-path-vuln" phase="PORT_SCAN" selection="category"></script>
  164. <script id="distcc-cve2004-2687" phase="PORT_SCAN" selection="category"></script>
  165. <script id="dns-update" phase="PORT_SCAN" selection="category"></script>
  166. <script id="ftp-libopie" phase="PORT_SCAN" selection="category"></script>
  167. <script id="ftp-proftpd-backdoor" phase="PORT_SCAN" selection="category"></script>
  168. <script id="ftp-vsftpd-backdoor" phase="PORT_SCAN" selection="category"></script>
  169. <script id="ftp-vuln-cve2010-4221" phase="PORT_SCAN" selection="category"></script>
  170. <script id="http-adobe-coldfusion-apsa1301" phase="PORT_SCAN" selection="category"></script>
  171. <script id="http-avaya-ipoffice-users" phase="PORT_SCAN" selection="category"></script>
  172. <script id="http-awstatstotals-exec" phase="PORT_SCAN" selection="category"></script>
  173. <script id="http-axis2-dir-traversal" phase="PORT_SCAN" selection="category"></script>
  174. <script id="http-cross-domain-policy" phase="PORT_SCAN" selection="category"></script>
  175. <script id="http-csrf" phase="PORT_SCAN" selection="category"></script>
  176. <script id="http-dlink-backdoor" phase="PORT_SCAN" selection="category"></script>
  177. <script id="http-dombased-xss" phase="PORT_SCAN" selection="category"></script>
  178. <script id="http-enum" phase="PORT_SCAN" selection="category"></script>
  179. <script id="http-fileupload-exploiter" phase="PORT_SCAN" selection="category"></script>
  180. <script id="http-frontpage-login" phase="PORT_SCAN" selection="category"></script>
  181. <script id="http-git" phase="PORT_SCAN" selection="category"></script>
  182. <script id="http-huawei-hg5xx-vuln" phase="PORT_SCAN" selection="category"></script>
  183. <script id="http-iis-webdav-vuln" phase="PORT_SCAN" selection="category"></script>
  184. <script id="http-litespeed-sourcecode-download" phase="PORT_SCAN" selection="category"></script>
  185. <script id="http-majordomo2-dir-traversal" phase="PORT_SCAN" selection="category"></script>
  186. <script id="http-method-tamper" phase="PORT_SCAN" selection="category"></script>
  187. <script id="http-passwd" phase="PORT_SCAN" selection="category"></script>
  188. <script id="http-phpmyadmin-dir-traversal" phase="PORT_SCAN" selection="category"></script>
  189. <script id="http-phpself-xss" phase="PORT_SCAN" selection="category"></script>
  190. <script id="http-shellshock" phase="PORT_SCAN" selection="category"></script>
  191. <script id="http-slowloris-check" phase="PORT_SCAN" selection="category"></script>
  192. <script id="http-sql-injection" phase="PORT_SCAN" selection="category"></script>
  193. <script id="http-stored-xss" phase="PORT_SCAN" selection="category"></script>
  194. <script id="http-tplink-dir-traversal" phase="PORT_SCAN" selection="category"></script>
  195. <script id="http-trace" phase="PORT_SCAN" selection="category"></script>
  196. <script id="http-vmware-path-vuln" phase="PORT_SCAN" selection="category"></script>
  197. <script id="http-vuln-cve2006-3392" phase="PORT_SCAN" selection="category"></script>
  198. <script id="http-vuln-cve2010-0738" phase="PORT_SCAN" selection="category"></script>
  199. <script id="http-vuln-cve2010-2861" phase="PORT_SCAN" selection="category"></script>
  200. <script id="http-vuln-cve2011-3192" phase="PORT_SCAN" selection="category"></script>
  201. <script id="http-vuln-cve2011-3368" phase="PORT_SCAN" selection="category"></script>
  202. <script id="http-vuln-cve2012-1823" phase="PORT_SCAN" selection="category"></script>
  203. <script id="http-vuln-cve2013-0156" phase="PORT_SCAN" selection="category"></script>
  204. <script id="http-vuln-cve2013-6786" phase="PORT_SCAN" selection="category"></script>
  205. <script id="http-vuln-cve2013-7091" phase="PORT_SCAN" selection="category"></script>
  206. <script id="http-vuln-cve2014-2126" phase="PORT_SCAN" selection="category"></script>
  207. <script id="http-vuln-cve2014-2127" phase="PORT_SCAN" selection="category"></script>
  208. <script id="http-vuln-cve2014-2128" phase="PORT_SCAN" selection="category"></script>
  209. <script id="http-vuln-cve2014-2129" phase="PORT_SCAN" selection="category"></script>
  210. <script id="http-vuln-cve2014-3704" phase="PORT_SCAN" selection="category"></script>
  211. <script id="http-vuln-cve2014-8877" phase="PORT_SCAN" selection="category"></script>
  212. <script id="http-vuln-cve2015-1427" phase="PORT_SCAN" selection="category"></script>
  213. <script id="http-vuln-cve2015-1635" phase="PORT_SCAN" selection="category"></script>
  214. <script id="http-vuln-misfortune-cookie" phase="PORT_SCAN" selection="category"></script>
  215. <script id="http-vuln-wnr1000-creds" phase="PORT_SCAN" selection="category"></script>
  216. <script id="http-wordpress-users" phase="PORT_SCAN" selection="category"></script>
  217. <script id="irc-botnet-channels" phase="PORT_SCAN" selection="category"></script>
  218. <script id="irc-unrealircd-backdoor" phase="PORT_SCAN" selection="category"></script>
  219. <script id="mysql-vuln-cve2012-2122" phase="PORT_SCAN" selection="category"></script>
  220. <script id="netbus-auth-bypass" phase="PORT_SCAN" selection="category"></script>
  221. <script id="qconn-exec" phase="PORT_SCAN" selection="category"></script>
  222. <script id="rdp-vuln-ms12-020" phase="PORT_SCAN" selection="category"></script>
  223. <script id="rmi-vuln-classloader" phase="PORT_SCAN" selection="category"></script>
  224. <script id="smtp-vuln-cve2010-4344" phase="PORT_SCAN" selection="category"></script>
  225. <script id="smtp-vuln-cve2011-1720" phase="PORT_SCAN" selection="category"></script>
  226. <script id="smtp-vuln-cve2011-1764" phase="PORT_SCAN" selection="category"></script>
  227. <script id="ssl-ccs-injection" phase="PORT_SCAN" selection="category"></script>
  228. <script id="ssl-dh-params" phase="PORT_SCAN" selection="category"></script>
  229. <script id="ssl-heartbleed" phase="PORT_SCAN" selection="category"></script>
  230. <script id="ssl-known-key" phase="PORT_SCAN" selection="category"></script>
  231. <script id="ssl-poodle" phase="PORT_SCAN" selection="category"></script>
  232. <script id="supermicro-ipmi-conf" phase="PORT_SCAN" selection="category"></script>
  233. <script id="wdb-version" phase="PORT_SCAN" selection="category"></script>
  234. <script id="afp-path-vuln" phase="PORT_SCAN" selection="category"></script>
  235. <script id="distcc-cve2004-2687" phase="PORT_SCAN" selection="category"></script>
  236. <script id="dns-update" phase="PORT_SCAN" selection="category"></script>
  237. <script id="ftp-libopie" phase="PORT_SCAN" selection="category"></script>
  238. <script id="ftp-proftpd-backdoor" phase="PORT_SCAN" selection="category"></script>
  239. <script id="ftp-vsftpd-backdoor" phase="PORT_SCAN" selection="category"></script>
  240. <script id="ftp-vuln-cve2010-4221" phase="PORT_SCAN" selection="category"></script>
  241. <script id="http-adobe-coldfusion-apsa1301" phase="PORT_SCAN" selection="category"></script>
  242. <script id="http-avaya-ipoffice-users" phase="PORT_SCAN" selection="category"></script>
  243. <script id="http-awstatstotals-exec" phase="PORT_SCAN" selection="category"></script>
  244. <script id="http-axis2-dir-traversal" phase="PORT_SCAN" selection="category"></script>
  245. <script id="http-cross-domain-policy" phase="PORT_SCAN" selection="category"></script>
  246. <script id="http-csrf" phase="PORT_SCAN" selection="category"></script>
  247. <script id="http-dlink-backdoor" phase="PORT_SCAN" selection="category"></script>
  248. <script id="http-dombased-xss" phase="PORT_SCAN" selection="category"></script>
  249. <script id="http-enum" phase="PORT_SCAN" selection="category"></script>
  250. <script id="http-fileupload-exploiter" phase="PORT_SCAN" selection="category"></script>
  251. <script id="http-frontpage-login" phase="PORT_SCAN" selection="category"></script>
  252. <script id="http-git" phase="PORT_SCAN" selection="category"></script>
  253. <script id="http-huawei-hg5xx-vuln" phase="PORT_SCAN" selection="category"></script>
  254. <script id="http-iis-webdav-vuln" phase="PORT_SCAN" selection="category"></script>
  255. <script id="http-litespeed-sourcecode-download" phase="PORT_SCAN" selection="category"></script>
  256. <script id="http-majordomo2-dir-traversal" phase="PORT_SCAN" selection="category"></script>
  257. <script id="http-method-tamper" phase="PORT_SCAN" selection="category"></script>
  258. <script id="http-passwd" phase="PORT_SCAN" selection="category"></script>
  259. <script id="http-phpmyadmin-dir-traversal" phase="PORT_SCAN" selection="category"></script>
  260. <script id="http-phpself-xss" phase="PORT_SCAN" selection="category"></script>
  261. <script id="http-shellshock" phase="PORT_SCAN" selection="category"></script>
  262. <script id="http-slowloris-check" phase="PORT_SCAN" selection="category"></script>
  263. <script id="http-sql-injection" phase="PORT_SCAN" selection="category"></script>
  264. <script id="http-stored-xss" phase="PORT_SCAN" selection="category"></script>
  265. <script id="http-tplink-dir-traversal" phase="PORT_SCAN" selection="category"></script>
  266. <script id="http-trace" phase="PORT_SCAN" selection="category"></script>
  267. <script id="http-vmware-path-vuln" phase="PORT_SCAN" selection="category"></script>
  268. <script id="http-vuln-cve2006-3392" phase="PORT_SCAN" selection="category"></script>
  269. <script id="http-vuln-cve2010-0738" phase="PORT_SCAN" selection="category"></script>
  270. <script id="http-vuln-cve2010-2861" phase="PORT_SCAN" selection="category"></script>
  271. <script id="http-vuln-cve2011-3192" phase="PORT_SCAN" selection="category"></script>
  272. <script id="http-vuln-cve2011-3368" phase="PORT_SCAN" selection="category"></script>
  273. <script id="http-vuln-cve2012-1823" phase="PORT_SCAN" selection="category"></script>
  274. <script id="http-vuln-cve2013-0156" phase="PORT_SCAN" selection="category"></script>
  275. <script id="http-vuln-cve2013-6786" phase="PORT_SCAN" selection="category"></script>
  276. <script id="http-vuln-cve2013-7091" phase="PORT_SCAN" selection="category"></script>
  277. <script id="http-vuln-cve2014-2126" phase="PORT_SCAN" selection="category"></script>
  278. <script id="http-vuln-cve2014-2127" phase="PORT_SCAN" selection="category"></script>
  279. <script id="http-vuln-cve2014-2128" phase="PORT_SCAN" selection="category"></script>
  280. <script id="http-vuln-cve2014-2129" phase="PORT_SCAN" selection="category"></script>
  281. <script id="http-vuln-cve2014-3704" phase="PORT_SCAN" selection="category"></script>
  282. <script id="http-vuln-cve2014-8877" phase="PORT_SCAN" selection="category"></script>
  283. <script id="http-vuln-cve2015-1427" phase="PORT_SCAN" selection="category"></script>
  284. <script id="http-vuln-cve2015-1635" phase="PORT_SCAN" selection="category"></script>
  285. <script id="http-vuln-misfortune-cookie" phase="PORT_SCAN" selection="category"></script>
  286. <script id="http-vuln-wnr1000-creds" phase="PORT_SCAN" selection="category"></script>
  287. <script id="http-wordpress-users" phase="PORT_SCAN" selection="category"></script>
  288. <script id="irc-botnet-channels" phase="PORT_SCAN" selection="category"></script>
  289. <script id="irc-unrealircd-backdoor" phase="PORT_SCAN" selection="category"></script>
  290. <script id="mysql-vuln-cve2012-2122" phase="PORT_SCAN" selection="category"></script>
  291. <script id="netbus-auth-bypass" phase="PORT_SCAN" selection="category"></script>
  292. <script id="qconn-exec" phase="PORT_SCAN" selection="category"></script>
  293. <script id="rdp-vuln-ms12-020" phase="PORT_SCAN" selection="category"></script>
  294. <script id="rmi-vuln-classloader" phase="PORT_SCAN" selection="category"></script>
  295. <script id="smtp-vuln-cve2010-4344" phase="PORT_SCAN" selection="category"></script>
  296. <script id="smtp-vuln-cve2011-1720" phase="PORT_SCAN" selection="category"></script>
  297. <script id="smtp-vuln-cve2011-1764" phase="PORT_SCAN" selection="category"></script>
  298. <script id="ssl-ccs-injection" phase="PORT_SCAN" selection="category"></script>
  299. <script id="ssl-dh-params" phase="PORT_SCAN" selection="category"></script>
  300. <script id="ssl-heartbleed" phase="PORT_SCAN" selection="category"></script>
  301. <script id="ssl-known-key" phase="PORT_SCAN" selection="category"></script>
  302. <script id="ssl-poodle" phase="PORT_SCAN" selection="category"></script>
  303. <script id="supermicro-ipmi-conf" phase="PORT_SCAN" selection="category"></script>
  304. <script id="wdb-version" phase="PORT_SCAN" selection="category"></script>
  305. <script id="afp-path-vuln" phase="PORT_SCAN" selection="category"></script>
  306. <script id="distcc-cve2004-2687" phase="PORT_SCAN" selection="category"></script>
  307. <script id="dns-update" phase="PORT_SCAN" selection="category"></script>
  308. <script id="ftp-libopie" phase="PORT_SCAN" selection="category"></script>
  309. <script id="ftp-proftpd-backdoor" phase="PORT_SCAN" selection="category"></script>
  310. <script id="ftp-vsftpd-backdoor" phase="PORT_SCAN" selection="category"></script>
  311. <script id="ftp-vuln-cve2010-4221" phase="PORT_SCAN" selection="category"></script>
  312. <script id="http-adobe-coldfusion-apsa1301" phase="PORT_SCAN" selection="category"></script>
  313. <script id="http-avaya-ipoffice-users" phase="PORT_SCAN" selection="category"></script>
  314. <script id="http-awstatstotals-exec" phase="PORT_SCAN" selection="category"></script>
  315. <script id="http-axis2-dir-traversal" phase="PORT_SCAN" selection="category"></script>
  316. <script id="http-cross-domain-policy" phase="PORT_SCAN" selection="category"></script>
  317. <script id="http-csrf" phase="PORT_SCAN" selection="category"></script>
  318. <script id="http-dlink-backdoor" phase="PORT_SCAN" selection="category"></script>
  319. <script id="http-dombased-xss" phase="PORT_SCAN" selection="category"></script>
  320. <script id="http-enum" phase="PORT_SCAN" selection="category"></script>
  321. <script id="http-fileupload-exploiter" phase="PORT_SCAN" selection="category"></script>
  322. <script id="http-frontpage-login" phase="PORT_SCAN" selection="category"></script>
  323. <script id="http-git" phase="PORT_SCAN" selection="category"></script>
  324. <script id="http-huawei-hg5xx-vuln" phase="PORT_SCAN" selection="category"></script>
  325. <script id="http-iis-webdav-vuln" phase="PORT_SCAN" selection="category"></script>
  326. <script id="http-litespeed-sourcecode-download" phase="PORT_SCAN" selection="category"></script>
  327. <script id="http-majordomo2-dir-traversal" phase="PORT_SCAN" selection="category"></script>
  328. <script id="http-method-tamper" phase="PORT_SCAN" selection="category"></script>
  329. <script id="http-passwd" phase="PORT_SCAN" selection="category"></script>
  330. <script id="http-phpmyadmin-dir-traversal" phase="PORT_SCAN" selection="category"></script>
  331. <script id="http-phpself-xss" phase="PORT_SCAN" selection="category"></script>
  332. <script id="http-shellshock" phase="PORT_SCAN" selection="category"></script>
  333. <script id="http-slowloris-check" phase="PORT_SCAN" selection="category"></script>
  334. <script id="http-sql-injection" phase="PORT_SCAN" selection="category"></script>
  335. <script id="http-stored-xss" phase="PORT_SCAN" selection="category"></script>
  336. <script id="http-tplink-dir-traversal" phase="PORT_SCAN" selection="category"></script>
  337. <script id="http-trace" phase="PORT_SCAN" selection="category"></script>
  338. <script id="http-vmware-path-vuln" phase="PORT_SCAN" selection="category"></script>
  339. <script id="http-vuln-cve2006-3392" phase="PORT_SCAN" selection="category"></script>
  340. <script id="http-vuln-cve2010-0738" phase="PORT_SCAN" selection="category"></script>
  341. <script id="http-vuln-cve2010-2861" phase="PORT_SCAN" selection="category"></script>
  342. <script id="http-vuln-cve2011-3192" phase="PORT_SCAN" selection="category"></script>
  343. <script id="http-vuln-cve2011-3368" phase="PORT_SCAN" selection="category"></script>
  344. <script id="http-vuln-cve2012-1823" phase="PORT_SCAN" selection="category"></script>
  345. <script id="http-vuln-cve2013-0156" phase="PORT_SCAN" selection="category"></script>
  346. <script id="http-vuln-cve2013-6786" phase="PORT_SCAN" selection="category"></script>
  347. <script id="http-vuln-cve2013-7091" phase="PORT_SCAN" selection="category"></script>
  348. <script id="http-vuln-cve2014-2126" phase="PORT_SCAN" selection="category"></script>
  349. <script id="http-vuln-cve2014-2127" phase="PORT_SCAN" selection="category"></script>
  350. <script id="http-vuln-cve2014-2128" phase="PORT_SCAN" selection="category"></script>
  351. <script id="http-vuln-cve2014-2129" phase="PORT_SCAN" selection="category"></script>
  352. <script id="http-vuln-cve2014-3704" phase="PORT_SCAN" selection="category"></script>
  353. <script id="http-vuln-cve2014-8877" phase="PORT_SCAN" selection="category"></script>
  354. <script id="http-vuln-cve2015-1427" phase="PORT_SCAN" selection="category"></script>
  355. <script id="http-vuln-cve2015-1635" phase="PORT_SCAN" selection="category"></script>
  356. <script id="http-vuln-misfortune-cookie" phase="PORT_SCAN" selection="category"></script>
  357. <script id="http-vuln-wnr1000-creds" phase="PORT_SCAN" selection="category"></script>
  358. <script id="http-wordpress-users" phase="PORT_SCAN" selection="category"></script>
  359. <script id="irc-botnet-channels" phase="PORT_SCAN" selection="category"></script>
  360. <script id="irc-unrealircd-backdoor" phase="PORT_SCAN" selection="category"></script>
  361. <script id="mysql-vuln-cve2012-2122" phase="PORT_SCAN" selection="category"></script>
  362. <script id="netbus-auth-bypass" phase="PORT_SCAN" selection="category"></script>
  363. <script id="qconn-exec" phase="PORT_SCAN" selection="category"></script>
  364. <script id="rdp-vuln-ms12-020" phase="PORT_SCAN" selection="category"></script>
  365. <script id="rmi-vuln-classloader" phase="PORT_SCAN" selection="category"></script>
  366. <script id="smtp-vuln-cve2010-4344" phase="PORT_SCAN" selection="category"></script>
  367. <script id="smtp-vuln-cve2011-1720" phase="PORT_SCAN" selection="category"></script>
  368. <script id="smtp-vuln-cve2011-1764" phase="PORT_SCAN" selection="category"></script>
  369. <script id="ssl-ccs-injection" phase="PORT_SCAN" selection="category"></script>
  370. <script id="ssl-dh-params" phase="PORT_SCAN" selection="category"></script>
  371. <script id="ssl-heartbleed" phase="PORT_SCAN" selection="category"></script>
  372. <script id="ssl-known-key" phase="PORT_SCAN" selection="category"></script>
  373. <script id="ssl-poodle" phase="PORT_SCAN" selection="category"></script>
  374. <script id="supermicro-ipmi-conf" phase="PORT_SCAN" selection="category"></script>
  375. <script id="wdb-version" phase="PORT_SCAN" selection="category"></script>
  376. <script id="afp-path-vuln" phase="PORT_SCAN" selection="category"></script>
  377. <script id="distcc-cve2004-2687" phase="PORT_SCAN" selection="category"></script>
  378. <script id="dns-update" phase="PORT_SCAN" selection="category"></script>
  379. <script id="ftp-libopie" phase="PORT_SCAN" selection="category"></script>
  380. <script id="ftp-proftpd-backdoor" phase="PORT_SCAN" selection="category"></script>
  381. <script id="ftp-vsftpd-backdoor" phase="PORT_SCAN" selection="category"></script>
  382. <script id="ftp-vuln-cve2010-4221" phase="PORT_SCAN" selection="category"></script>
  383. <script id="http-adobe-coldfusion-apsa1301" phase="PORT_SCAN" selection="category"></script>
  384. <script id="http-avaya-ipoffice-users" phase="PORT_SCAN" selection="category"></script>
  385. <script id="http-awstatstotals-exec" phase="PORT_SCAN" selection="category"></script>
  386. <script id="http-axis2-dir-traversal" phase="PORT_SCAN" selection="category"></script>
  387. <script id="http-cross-domain-policy" phase="PORT_SCAN" selection="category"></script>
  388. <script id="http-csrf" phase="PORT_SCAN" selection="category"></script>
  389. <script id="http-dlink-backdoor" phase="PORT_SCAN" selection="category"></script>
  390. <script id="http-dombased-xss" phase="PORT_SCAN" selection="category"></script>
  391. <script id="http-enum" phase="PORT_SCAN" selection="category"></script>
  392. <script id="http-fileupload-exploiter" phase="PORT_SCAN" selection="category"></script>
  393. <script id="http-frontpage-login" phase="PORT_SCAN" selection="category"></script>
  394. <script id="http-git" phase="PORT_SCAN" selection="category"></script>
  395. <script id="http-huawei-hg5xx-vuln" phase="PORT_SCAN" selection="category"></script>
  396. <script id="http-iis-webdav-vuln" phase="PORT_SCAN" selection="category"></script>
  397. <script id="http-litespeed-sourcecode-download" phase="PORT_SCAN" selection="category"></script>
  398. <script id="http-majordomo2-dir-traversal" phase="PORT_SCAN" selection="category"></script>
  399. <script id="http-method-tamper" phase="PORT_SCAN" selection="category"></script>
  400. <script id="http-passwd" phase="PORT_SCAN" selection="category"></script>
  401. <script id="http-phpmyadmin-dir-traversal" phase="PORT_SCAN" selection="category"></script>
  402. <script id="http-phpself-xss" phase="PORT_SCAN" selection="category"></script>
  403. <script id="http-shellshock" phase="PORT_SCAN" selection="category"></script>
  404. <script id="http-slowloris-check" phase="PORT_SCAN" selection="category"></script>
  405. <script id="http-sql-injection" phase="PORT_SCAN" selection="category"></script>
  406. <script id="http-stored-xss" phase="PORT_SCAN" selection="category"></script>
  407. <script id="http-tplink-dir-traversal" phase="PORT_SCAN" selection="category"></script>
  408. <script id="http-trace" phase="PORT_SCAN" selection="category"></script>
  409. <script id="http-vmware-path-vuln" phase="PORT_SCAN" selection="category"></script>
  410. <script id="http-vuln-cve2006-3392" phase="PORT_SCAN" selection="category"></script>
  411. <script id="http-vuln-cve2010-0738" phase="PORT_SCAN" selection="category"></script>
  412. <script id="http-vuln-cve2010-2861" phase="PORT_SCAN" selection="category"></script>
  413. <script id="http-vuln-cve2011-3192" phase="PORT_SCAN" selection="category"></script>
  414. <script id="http-vuln-cve2011-3368" phase="PORT_SCAN" selection="category"></script>
  415. <script id="http-vuln-cve2012-1823" phase="PORT_SCAN" selection="category"></script>
  416. <script id="http-vuln-cve2013-0156" phase="PORT_SCAN" selection="category"></script>
  417. <script id="http-vuln-cve2013-6786" phase="PORT_SCAN" selection="category"></script>
  418. <script id="http-vuln-cve2013-7091" phase="PORT_SCAN" selection="category"></script>
  419. <script id="http-vuln-cve2014-2126" phase="PORT_SCAN" selection="category"></script>
  420. <script id="http-vuln-cve2014-2127" phase="PORT_SCAN" selection="category"></script>
  421. <script id="http-vuln-cve2014-2128" phase="PORT_SCAN" selection="category"></script>
  422. <script id="http-vuln-cve2014-2129" phase="PORT_SCAN" selection="category"></script>
  423. <script id="http-vuln-cve2014-3704" phase="PORT_SCAN" selection="category"></script>
  424. <script id="http-vuln-cve2014-8877" phase="PORT_SCAN" selection="category"></script>
  425. <script id="http-vuln-cve2015-1427" phase="PORT_SCAN" selection="category"></script>
  426. <script id="http-vuln-cve2015-1635" phase="PORT_SCAN" selection="category"></script>
  427. <script id="http-vuln-misfortune-cookie" phase="PORT_SCAN" selection="category"></script>
  428. <script id="http-vuln-wnr1000-creds" phase="PORT_SCAN" selection="category"></script>
  429. <script id="http-wordpress-users" phase="PORT_SCAN" selection="category"></script>
  430. <script id="irc-botnet-channels" phase="PORT_SCAN" selection="category"></script>
  431. <script id="irc-unrealircd-backdoor" phase="PORT_SCAN" selection="category"></script>
  432. <script id="mysql-vuln-cve2012-2122" phase="PORT_SCAN" selection="category"></script>
  433. <script id="netbus-auth-bypass" phase="PORT_SCAN" selection="category"></script>
  434. <script id="qconn-exec" phase="PORT_SCAN" selection="category"></script>
  435. <script id="rdp-vuln-ms12-020" phase="PORT_SCAN" selection="category"></script>
  436. <script id="rmi-vuln-classloader" phase="PORT_SCAN" selection="category"></script>
  437. <script id="smtp-vuln-cve2010-4344" phase="PORT_SCAN" selection="category"></script>
  438. <script id="smtp-vuln-cve2011-1720" phase="PORT_SCAN" selection="category"></script>
  439. <script id="smtp-vuln-cve2011-1764" phase="PORT_SCAN" selection="category"></script>
  440. <script id="ssl-ccs-injection" phase="PORT_SCAN" selection="category"></script>
  441. <script id="ssl-dh-params" phase="PORT_SCAN" selection="category"></script>
  442. <script id="ssl-heartbleed" phase="PORT_SCAN" selection="category"></script>
  443. <script id="ssl-known-key" phase="PORT_SCAN" selection="category"></script>
  444. <script id="ssl-poodle" phase="PORT_SCAN" selection="category"></script>
  445. <script id="supermicro-ipmi-conf" phase="PORT_SCAN" selection="category"></script>
  446. <script id="wdb-version" phase="PORT_SCAN" selection="category"></script>
  447. <script id="afp-path-vuln" phase="PORT_SCAN" selection="category"></script>
  448. <script id="distcc-cve2004-2687" phase="PORT_SCAN" selection="category"></script>
  449. <script id="dns-update" phase="PORT_SCAN" selection="category"></script>
  450. <script id="ftp-libopie" phase="PORT_SCAN" selection="category"></script>
  451. <script id="ftp-proftpd-backdoor" phase="PORT_SCAN" selection="category"></script>
  452. <script id="ftp-vsftpd-backdoor" phase="PORT_SCAN" selection="category"></script>
  453. <script id="ftp-vuln-cve2010-4221" phase="PORT_SCAN" selection="category"></script>
  454. <script id="http-adobe-coldfusion-apsa1301" phase="PORT_SCAN" selection="category"></script>
  455. <script id="http-avaya-ipoffice-users" phase="PORT_SCAN" selection="category"></script>
  456. <script id="http-awstatstotals-exec" phase="PORT_SCAN" selection="category"></script>
  457. <script id="http-axis2-dir-traversal" phase="PORT_SCAN" selection="category"></script>
  458. <script id="http-cross-domain-policy" phase="PORT_SCAN" selection="category"></script>
  459. <script id="http-csrf" phase="PORT_SCAN" selection="category"></script>
  460. <script id="http-dlink-backdoor" phase="PORT_SCAN" selection="category"></script>
  461. <script id="http-dombased-xss" phase="PORT_SCAN" selection="category"></script>
  462. <script id="http-enum" phase="PORT_SCAN" selection="category"></script>
  463. <script id="http-fileupload-exploiter" phase="PORT_SCAN" selection="category"></script>
  464. <script id="http-frontpage-login" phase="PORT_SCAN" selection="category"></script>
  465. <script id="http-git" phase="PORT_SCAN" selection="category"></script>
  466. <script id="http-huawei-hg5xx-vuln" phase="PORT_SCAN" selection="category"></script>
  467. <script id="http-iis-webdav-vuln" phase="PORT_SCAN" selection="category"></script>
  468. <script id="http-litespeed-sourcecode-download" phase="PORT_SCAN" selection="category"></script>
  469. <script id="http-majordomo2-dir-traversal" phase="PORT_SCAN" selection="category"></script>
  470. <script id="http-method-tamper" phase="PORT_SCAN" selection="category"></script>
  471. <script id="http-passwd" phase="PORT_SCAN" selection="category"></script>
  472. <script id="http-phpmyadmin-dir-traversal" phase="PORT_SCAN" selection="category"></script>
  473. <script id="http-phpself-xss" phase="PORT_SCAN" selection="category"></script>
  474. <script id="http-shellshock" phase="PORT_SCAN" selection="category"></script>
  475. <script id="http-slowloris-check" phase="PORT_SCAN" selection="category"></script>
  476. <script id="http-sql-injection" phase="PORT_SCAN" selection="category"></script>
  477. <script id="http-stored-xss" phase="PORT_SCAN" selection="category"></script>
  478. <script id="http-tplink-dir-traversal" phase="PORT_SCAN" selection="category"></script>
  479. <script id="http-trace" phase="PORT_SCAN" selection="category"></script>
  480. <script id="http-vmware-path-vuln" phase="PORT_SCAN" selection="category"></script>
  481. <script id="http-vuln-cve2006-3392" phase="PORT_SCAN" selection="category"></script>
  482. <script id="http-vuln-cve2010-0738" phase="PORT_SCAN" selection="category"></script>
  483. <script id="http-vuln-cve2010-2861" phase="PORT_SCAN" selection="category"></script>
  484. <script id="http-vuln-cve2011-3192" phase="PORT_SCAN" selection="category"></script>
  485. <script id="http-vuln-cve2011-3368" phase="PORT_SCAN" selection="category"></script>
  486. <script id="http-vuln-cve2012-1823" phase="PORT_SCAN" selection="category"></script>
  487. <script id="http-vuln-cve2013-0156" phase="PORT_SCAN" selection="category"></script>
  488. <script id="http-vuln-cve2013-6786" phase="PORT_SCAN" selection="category"></script>
  489. <script id="http-vuln-cve2013-7091" phase="PORT_SCAN" selection="category"></script>
  490. <script id="http-vuln-cve2014-2126" phase="PORT_SCAN" selection="category"></script>
  491. <script id="http-vuln-cve2014-2127" phase="PORT_SCAN" selection="category"></script>
  492. <script id="http-vuln-cve2014-2128" phase="PORT_SCAN" selection="category"></script>
  493. <script id="http-vuln-cve2014-2129" phase="PORT_SCAN" selection="category"></script>
  494. <script id="http-vuln-cve2014-3704" phase="PORT_SCAN" selection="category"></script>
  495. <script id="http-vuln-cve2014-8877" phase="PORT_SCAN" selection="category"></script>
  496. <script id="http-vuln-cve2015-1427" phase="PORT_SCAN" selection="category"></script>
  497. <script id="http-vuln-cve2015-1635" phase="PORT_SCAN" selection="category"></script>
  498. <script id="http-vuln-misfortune-cookie" phase="PORT_SCAN" selection="category"></script>
  499. <script id="http-vuln-wnr1000-creds" phase="PORT_SCAN" selection="category"></script>
  500. <script id="http-wordpress-users" phase="PORT_SCAN" selection="category"></script>
  501. <script id="irc-botnet-channels" phase="PORT_SCAN" selection="category"></script>
  502. <script id="irc-unrealircd-backdoor" phase="PORT_SCAN" selection="category"></script>
  503. <script id="mysql-vuln-cve2012-2122" phase="PORT_SCAN" selection="category"></script>
  504. <script id="netbus-auth-bypass" phase="PORT_SCAN" selection="category"></script>
  505. <script id="qconn-exec" phase="PORT_SCAN" selection="category"></script>
  506. <script id="rdp-vuln-ms12-020" phase="PORT_SCAN" selection="category"></script>
  507. <script id="rmi-vuln-classloader" phase="PORT_SCAN" selection="category"></script>
  508. <script id="smtp-vuln-cve2010-4344" phase="PORT_SCAN" selection="category"></script>
  509. <script id="smtp-vuln-cve2011-1720" phase="PORT_SCAN" selection="category"></script>
  510. <script id="smtp-vuln-cve2011-1764" phase="PORT_SCAN" selection="category"></script>
  511. <script id="ssl-ccs-injection" phase="PORT_SCAN" selection="category"></script>
  512. <script id="ssl-dh-params" phase="PORT_SCAN" selection="category"></script>
  513. <script id="ssl-heartbleed" phase="PORT_SCAN" selection="category"></script>
  514. <script id="ssl-known-key" phase="PORT_SCAN" selection="category"></script>
  515. <script id="ssl-poodle" phase="PORT_SCAN" selection="category"></script>
  516. <script id="supermicro-ipmi-conf" phase="PORT_SCAN" selection="category"></script>
  517. <script id="wdb-version" phase="PORT_SCAN" selection="category"></script>
  518. <script id="afp-path-vuln" phase="PORT_SCAN" selection="category"></script>
  519. <script id="distcc-cve2004-2687" phase="PORT_SCAN" selection="category"></script>
  520. <script id="dns-update" phase="PORT_SCAN" selection="category"></script>
  521. <script id="ftp-libopie" phase="PORT_SCAN" selection="category"></script>
  522. <script id="ftp-proftpd-backdoor" phase="PORT_SCAN" selection="category"></script>
  523. <script id="ftp-vsftpd-backdoor" phase="PORT_SCAN" selection="category"></script>
  524. <script id="ftp-vuln-cve2010-4221" phase="PORT_SCAN" selection="category"></script>
  525. <script id="http-adobe-coldfusion-apsa1301" phase="PORT_SCAN" selection="category"></script>
  526. <script id="http-avaya-ipoffice-users" phase="PORT_SCAN" selection="category"></script>
  527. <script id="http-awstatstotals-exec" phase="PORT_SCAN" selection="category"></script>
  528. <script id="http-axis2-dir-traversal" phase="PORT_SCAN" selection="category"></script>
  529. <script id="http-cross-domain-policy" phase="PORT_SCAN" selection="category"></script>
  530. <script id="http-csrf" phase="PORT_SCAN" selection="category"></script>
  531. <script id="http-dlink-backdoor" phase="PORT_SCAN" selection="category"></script>
  532. <script id="http-dombased-xss" phase="PORT_SCAN" selection="category"></script>
  533. <script id="http-enum" phase="PORT_SCAN" selection="category"></script>
  534. <script id="http-fileupload-exploiter" phase="PORT_SCAN" selection="category"></script>
  535. <script id="http-frontpage-login" phase="PORT_SCAN" selection="category"></script>
  536. <script id="http-git" phase="PORT_SCAN" selection="category"></script>
  537. <script id="http-huawei-hg5xx-vuln" phase="PORT_SCAN" selection="category"></script>
  538. <script id="http-iis-webdav-vuln" phase="PORT_SCAN" selection="category"></script>
  539. <script id="http-litespeed-sourcecode-download" phase="PORT_SCAN" selection="category"></script>
  540. <script id="http-majordomo2-dir-traversal" phase="PORT_SCAN" selection="category"></script>
  541. <script id="http-method-tamper" phase="PORT_SCAN" selection="category"></script>
  542. <script id="http-passwd" phase="PORT_SCAN" selection="category"></script>
  543. <script id="http-phpmyadmin-dir-traversal" phase="PORT_SCAN" selection="category"></script>
  544. <script id="http-phpself-xss" phase="PORT_SCAN" selection="category"></script>
  545. <script id="http-shellshock" phase="PORT_SCAN" selection="category"></script>
  546. <script id="http-slowloris-check" phase="PORT_SCAN" selection="category"></script>
  547. <script id="http-sql-injection" phase="PORT_SCAN" selection="category"></script>
  548. <script id="http-stored-xss" phase="PORT_SCAN" selection="category"></script>
  549. <script id="http-tplink-dir-traversal" phase="PORT_SCAN" selection="category"></script>
  550. <script id="http-trace" phase="PORT_SCAN" selection="category"></script>
  551. <script id="http-vmware-path-vuln" phase="PORT_SCAN" selection="category"></script>
  552. <script id="http-vuln-cve2006-3392" phase="PORT_SCAN" selection="category"></script>
  553. <script id="http-vuln-cve2010-0738" phase="PORT_SCAN" selection="category"></script>
  554. <script id="http-vuln-cve2010-2861" phase="PORT_SCAN" selection="category"></script>
  555. <script id="http-vuln-cve2011-3192" phase="PORT_SCAN" selection="category"></script>
  556. <script id="http-vuln-cve2011-3368" phase="PORT_SCAN" selection="category"></script>
  557. <script id="http-vuln-cve2012-1823" phase="PORT_SCAN" selection="category"></script>
  558. <script id="http-vuln-cve2013-0156" phase="PORT_SCAN" selection="category"></script>
  559. <script id="http-vuln-cve2013-6786" phase="PORT_SCAN" selection="category"></script>
  560. <script id="http-vuln-cve2013-7091" phase="PORT_SCAN" selection="category"></script>
  561. <script id="http-vuln-cve2014-2126" phase="PORT_SCAN" selection="category"></script>
  562. <script id="http-vuln-cve2014-2127" phase="PORT_SCAN" selection="category"></script>
  563. <script id="http-vuln-cve2014-2128" phase="PORT_SCAN" selection="category"></script>
  564. <script id="http-vuln-cve2014-2129" phase="PORT_SCAN" selection="category"></script>
  565. <script id="http-vuln-cve2014-3704" phase="PORT_SCAN" selection="category"></script>
  566. <script id="http-vuln-cve2014-8877" phase="PORT_SCAN" selection="category"></script>
  567. <script id="http-vuln-cve2015-1427" phase="PORT_SCAN" selection="category"></script>
  568. <script id="http-vuln-cve2015-1635" phase="PORT_SCAN" selection="category"></script>
  569. <script id="http-vuln-misfortune-cookie" phase="PORT_SCAN" selection="category"></script>
  570. <script id="http-vuln-wnr1000-creds" phase="PORT_SCAN" selection="category"></script>
  571. <script id="http-wordpress-users" phase="PORT_SCAN" selection="category"></script>
  572. <script id="irc-botnet-channels" phase="PORT_SCAN" selection="category"></script>
  573. <script id="irc-unrealircd-backdoor" phase="PORT_SCAN" selection="category"></script>
  574. <script id="mysql-vuln-cve2012-2122" phase="PORT_SCAN" selection="category"></script>
  575. <script id="netbus-auth-bypass" phase="PORT_SCAN" selection="category"></script>
  576. <script id="qconn-exec" phase="PORT_SCAN" selection="category"></script>
  577. <script id="rdp-vuln-ms12-020" phase="PORT_SCAN" selection="category"></script>
  578. <script id="rmi-vuln-classloader" phase="PORT_SCAN" selection="category"></script>
  579. <script id="smtp-vuln-cve2010-4344" phase="PORT_SCAN" selection="category"></script>
  580. <script id="smtp-vuln-cve2011-1720" phase="PORT_SCAN" selection="category"></script>
  581. <script id="smtp-vuln-cve2011-1764" phase="PORT_SCAN" selection="category"></script>
  582. <script id="ssl-ccs-injection" phase="PORT_SCAN" selection="category"></script>
  583. <script id="ssl-dh-params" phase="PORT_SCAN" selection="category"></script>
  584. <script id="ssl-heartbleed" phase="PORT_SCAN" selection="category"></script>
  585. <script id="ssl-known-key" phase="PORT_SCAN" selection="category"></script>
  586. <script id="ssl-poodle" phase="PORT_SCAN" selection="category"></script>
  587. <script id="supermicro-ipmi-conf" phase="PORT_SCAN" selection="category"></script>
  588. <script id="wdb-version" phase="PORT_SCAN" selection="category"></script>
  589. <script id="afp-path-vuln" phase="PORT_SCAN" selection="category"></script>
  590. <script id="distcc-cve2004-2687" phase="PORT_SCAN" selection="category"></script>
  591. <script id="dns-update" phase="PORT_SCAN" selection="category"></script>
  592. <script id="ftp-libopie" phase="PORT_SCAN" selection="category"></script>
  593. <script id="ftp-proftpd-backdoor" phase="PORT_SCAN" selection="category"></script>
  594. <script id="ftp-vsftpd-backdoor" phase="PORT_SCAN" selection="category"></script>
  595. <script id="ftp-vuln-cve2010-4221" phase="PORT_SCAN" selection="category"></script>
  596. <script id="http-adobe-coldfusion-apsa1301" phase="PORT_SCAN" selection="category"></script>
  597. <script id="http-avaya-ipoffice-users" phase="PORT_SCAN" selection="category"></script>
  598. <script id="http-awstatstotals-exec" phase="PORT_SCAN" selection="category"></script>
  599. <script id="http-axis2-dir-traversal" phase="PORT_SCAN" selection="category"></script>
  600. <script id="http-cross-domain-policy" phase="PORT_SCAN" selection="category"></script>
  601. <script id="http-csrf" phase="PORT_SCAN" selection="category"></script>
  602. <script id="http-dlink-backdoor" phase="PORT_SCAN" selection="category"></script>
  603. <script id="http-dombased-xss" phase="PORT_SCAN" selection="category"></script>
  604. <script id="http-enum" phase="PORT_SCAN" selection="category"></script>
  605. <script id="http-fileupload-exploiter" phase="PORT_SCAN" selection="category"></script>
  606. <script id="http-frontpage-login" phase="PORT_SCAN" selection="category"></script>
  607. <script id="http-git" phase="PORT_SCAN" selection="category"></script>
  608. <script id="http-huawei-hg5xx-vuln" phase="PORT_SCAN" selection="category"></script>
  609. <script id="http-iis-webdav-vuln" phase="PORT_SCAN" selection="category"></script>
  610. <script id="http-litespeed-sourcecode-download" phase="PORT_SCAN" selection="category"></script>
  611. <script id="http-majordomo2-dir-traversal" phase="PORT_SCAN" selection="category"></script>
  612. <script id="http-method-tamper" phase="PORT_SCAN" selection="category"></script>
  613. <script id="http-passwd" phase="PORT_SCAN" selection="category"></script>
  614. <script id="http-phpmyadmin-dir-traversal" phase="PORT_SCAN" selection="category"></script>
  615. <script id="http-phpself-xss" phase="PORT_SCAN" selection="category"></script>
  616. <script id="http-shellshock" phase="PORT_SCAN" selection="category"></script>
  617. <script id="http-slowloris-check" phase="PORT_SCAN" selection="category"></script>
  618. <script id="http-sql-injection" phase="PORT_SCAN" selection="category"></script>
  619. <script id="http-stored-xss" phase="PORT_SCAN" selection="category"></script>
  620. <script id="http-tplink-dir-traversal" phase="PORT_SCAN" selection="category"></script>
  621. <script id="http-trace" phase="PORT_SCAN" selection="category"></script>
  622. <script id="http-vmware-path-vuln" phase="PORT_SCAN" selection="category"></script>
  623. <script id="http-vuln-cve2006-3392" phase="PORT_SCAN" selection="category"></script>
  624. <script id="http-vuln-cve2010-0738" phase="PORT_SCAN" selection="category"></script>
  625. <script id="http-vuln-cve2010-2861" phase="PORT_SCAN" selection="category"></script>
  626. <script id="http-vuln-cve2011-3192" phase="PORT_SCAN" selection="category"></script>
  627. <script id="http-vuln-cve2011-3368" phase="PORT_SCAN" selection="category"></script>
  628. <script id="http-vuln-cve2012-1823" phase="PORT_SCAN" selection="category"></script>
  629. <script id="http-vuln-cve2013-0156" phase="PORT_SCAN" selection="category"></script>
  630. <script id="http-vuln-cve2013-6786" phase="PORT_SCAN" selection="category"></script>
  631. <script id="http-vuln-cve2013-7091" phase="PORT_SCAN" selection="category"></script>
  632. <script id="http-vuln-cve2014-2126" phase="PORT_SCAN" selection="category"></script>
  633. <script id="http-vuln-cve2014-2127" phase="PORT_SCAN" selection="category"></script>
  634. <script id="http-vuln-cve2014-2128" phase="PORT_SCAN" selection="category"></script>
  635. <script id="http-vuln-cve2014-2129" phase="PORT_SCAN" selection="category"></script>
  636. <script id="http-vuln-cve2014-3704" phase="PORT_SCAN" selection="category"></script>
  637. <script id="http-vuln-cve2014-8877" phase="PORT_SCAN" selection="category"></script>
  638. <script id="http-vuln-cve2015-1427" phase="PORT_SCAN" selection="category"></script>
  639. <script id="http-vuln-cve2015-1635" phase="PORT_SCAN" selection="category"></script>
  640. <script id="http-vuln-misfortune-cookie" phase="PORT_SCAN" selection="category"></script>
  641. <script id="http-vuln-wnr1000-creds" phase="PORT_SCAN" selection="category"></script>
  642. <script id="http-wordpress-users" phase="PORT_SCAN" selection="category"></script>
  643. <script id="irc-botnet-channels" phase="PORT_SCAN" selection="category"></script>
  644. <script id="irc-unrealircd-backdoor" phase="PORT_SCAN" selection="category"></script>
  645. <script id="mysql-vuln-cve2012-2122" phase="PORT_SCAN" selection="category"></script>
  646. <script id="netbus-auth-bypass" phase="PORT_SCAN" selection="category"></script>
  647. <script id="qconn-exec" phase="PORT_SCAN" selection="category"></script>
  648. <script id="rdp-vuln-ms12-020" phase="PORT_SCAN" selection="category"></script>
  649. <script id="rmi-vuln-classloader" phase="PORT_SCAN" selection="category"></script>
  650. <script id="smtp-vuln-cve2010-4344" phase="PORT_SCAN" selection="category"></script>
  651. <script id="smtp-vuln-cve2011-1720" phase="PORT_SCAN" selection="category"></script>
  652. <script id="smtp-vuln-cve2011-1764" phase="PORT_SCAN" selection="category"></script>
  653. <script id="ssl-ccs-injection" phase="PORT_SCAN" selection="category"></script>
  654. <script id="ssl-dh-params" phase="PORT_SCAN" selection="category"></script>
  655. <script id="ssl-heartbleed" phase="PORT_SCAN" selection="category"></script>
  656. <script id="ssl-known-key" phase="PORT_SCAN" selection="category"></script>
  657. <script id="ssl-poodle" phase="PORT_SCAN" selection="category"></script>
  658. <script id="supermicro-ipmi-conf" phase="PORT_SCAN" selection="category"></script>
  659. <script id="wdb-version" phase="PORT_SCAN" selection="category"></script><host starttime="1468624594" endtime="1468624906"><status state="up" reason="syn-ack" reason_ttl="0"/>
  660. <address addr="127.0.0.1" addrtype="ipv4"/>
  661. <hostnames>
  662. <hostname name="localhost" type="user"/>
  663. <hostname name="localhost" type="PTR"/>
  664. </hostnames>
  665. <ports><extraports state="closed" count="991">
  666. <extrareasons reason="conn-refused" count="991"/>
  667. </extraports>
  668. <port protocol="tcp" portid="22"><state state="open" reason="syn-ack" reason_ttl="0"/><service name="ssh" method="table" conf="3"/></port>
  669. <port protocol="tcp" portid="80"><state state="open" reason="syn-ack" reason_ttl="0"/><service name="http" method="table" conf="3"/><script id="http-csrf" output="&#xa;Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=localhost&#xa;  Found the following possible CSRF vulnerabilities: &#xa;    &#xa;    Path: http://localhost/adminlogin.php&#xa;    Form id: form2&#xa;    Form action: &#xa;    &#xa;    Path: http://localhost/employeelogin.php&#xa;    Form id: form1&#xa;    Form action: &#xa;"/><script id="http-dombased-xss" output="Couldn&apos;t find any DOM based XSS."/><script id="http-enum" output="&#xa;  /login.php: Possible admin folder&#xa;  /css/: Potentially interesting directory w/ listing on &apos;apache/2.4.10 (ubuntu)&apos;&#xa;  /images/: Potentially interesting directory w/ listing on &apos;apache/2.4.10 (ubuntu)&apos;&#xa;  /js/: Potentially interesting directory w/ listing on &apos;apache/2.4.10 (ubuntu)&apos;&#xa;  /server-status/: Potentially interesting folder&#xa;  /upload/: Potentially interesting directory w/ listing on &apos;apache/2.4.10 (ubuntu)&apos;&#xa;"/><script id="http-fileupload-exploiter" output="&#xa;"></script><script id="http-frontpage-login" output="false">false</script><script id="http-slowloris-check" output="&#xa;  VULNERABLE:&#xa;  Slowloris DOS attack&#xa;    State: LIKELY VULNERABLE&#xa;    IDs:  CVE:CVE-2007-6750&#xa;      Slowloris tries to keep many connections to the target web server open and hold&#xa;      them open as long as possible.  It accomplishes this by opening connections to&#xa;      the target web server and sending a partial request. By doing so, it starves&#xa;      the http server&apos;s resources causing Denial Of Service.&#xa;      &#xa;    Disclosure date: 2009-09-17&#xa;    References:&#xa;      http://ha.ckers.org/slowloris/&#xa;      https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6750&#xa;"><table key="CVE-2007-6750">
  670. <elem key="title">Slowloris DOS attack</elem>
  671. <elem key="state">LIKELY VULNERABLE</elem>
  672. <table key="ids">
  673. <elem>CVE:CVE-2007-6750</elem>
  674. </table>
  675. <table key="description">
  676. <elem>Slowloris tries to keep many connections to the target web server open and hold&#xa;them open as long as possible.  It accomplishes this by opening connections to&#xa;the target web server and sending a partial request. By doing so, it starves&#xa;the http server&apos;s resources causing Denial Of Service.&#xa;</elem>
  677. </table>
  678. <table key="dates">
  679. <table key="disclosure">
  680. <elem key="year">2009</elem>
  681. <elem key="day">17</elem>
  682. <elem key="month">09</elem>
  683. </table>
  684. </table>
  685. <elem key="disclosure">2009-09-17</elem>
  686. <table key="exploit_results">
  687. </table>
  688. <table key="refs">
  689. <elem>http://ha.ckers.org/slowloris/</elem>
  690. <elem>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6750</elem>
  691. </table>
  692. </table>
  693. </script><script id="http-stored-xss" output="Couldn&apos;t find any stored XSS vulnerabilities."/></port>
  694. <port protocol="tcp" portid="111"><state state="open" reason="syn-ack" reason_ttl="0"/><service name="rpcbind" method="table" conf="3"/></port>
  695. <port protocol="tcp" portid="139"><state state="open" reason="syn-ack" reason_ttl="0"/><service name="netbios-ssn" method="table" conf="3"/></port>
  696. <port protocol="tcp" portid="445"><state state="open" reason="syn-ack" reason_ttl="0"/><service name="microsoft-ds" method="table" conf="3"/></port>
  697. <port protocol="tcp" portid="902"><state state="open" reason="syn-ack" reason_ttl="0"/><service name="iss-realsecure" method="table" conf="3"/></port>
  698. <port protocol="tcp" portid="3306"><state state="open" reason="syn-ack" reason_ttl="0"/><service name="mysql" method="table" conf="3"/></port>
  699. <port protocol="tcp" portid="5432"><state state="open" reason="syn-ack" reason_ttl="0"/><service name="postgresql" method="table" conf="3"/><script id="ssl-dh-params" output="&#xa;  VULNERABLE:&#xa;  Diffie-Hellman Key Exchange Insufficient Group Strength&#xa;    State: VULNERABLE&#xa;      Transport Layer Security (TLS) services that use Diffie-Hellman groups of&#xa;      insufficient strength, especially those using one of a few commonly shared&#xa;      groups, may be susceptible to passive eavesdropping attacks.&#xa;    Check results:&#xa;      WEAK DH GROUP 1&#xa;            Cipher Suite: TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA&#xa;            Modulus Type: Safe prime&#xa;            Modulus Source: Unknown/Custom-generated&#xa;            Modulus Length: 1024&#xa;            Generator Length: 8&#xa;            Public Key Length: 1024&#xa;    References:&#xa;      https://weakdh.org&#xa;"><table key="NMAP-8">
  700. <elem key="title">Diffie-Hellman Key Exchange Insufficient Group Strength</elem>
  701. <elem key="state">VULNERABLE</elem>
  702. <table key="description">
  703. <elem>Transport Layer Security (TLS) services that use Diffie-Hellman groups of&#xa;insufficient strength, especially those using one of a few commonly shared&#xa;groups, may be susceptible to passive eavesdropping attacks.</elem>
  704. </table>
  705. <table key="check_results">
  706. <elem>WEAK DH GROUP 1&#xa;      Cipher Suite: TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA&#xa;      Modulus Type: Safe prime&#xa;      Modulus Source: Unknown/Custom-generated&#xa;      Modulus Length: 1024&#xa;      Generator Length: 8&#xa;      Public Key Length: 1024</elem>
  707. </table>
  708. <table key="refs">
  709. <elem>https://weakdh.org</elem>
  710. </table>
  711. </table>
  712. </script><script id="ssl-poodle" output="&#xa;  VULNERABLE:&#xa;  SSL POODLE information leak&#xa;    State: LIKELY VULNERABLE&#xa;    IDs:  CVE:CVE-2014-3566  OSVDB:113251&#xa;          The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and&#xa;          other products, uses nondeterministic CBC padding, which makes it easier&#xa;          for man-in-the-middle attackers to obtain cleartext data via a&#xa;          padding-oracle attack, aka the &quot;POODLE&quot; issue.&#xa;    Disclosure date: 2014-10-14&#xa;    Check results:&#xa;      TLS_RSA_WITH_AES_128_CBC_SHA&#xa;      TLS_FALLBACK_SCSV properly implemented&#xa;    References:&#xa;      https://www.imperialviolet.org/2014/10/14/poodle.html&#xa;      http://osvdb.org/113251&#xa;      https://www.openssl.org/~bodo/ssl-poodle.pdf&#xa;      https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566&#xa;"><table key="CVE-2014-3566">
  713. <elem key="title">SSL POODLE information leak</elem>
  714. <elem key="state">LIKELY VULNERABLE</elem>
  715. <table key="ids">
  716. <elem>CVE:CVE-2014-3566</elem>
  717. <elem>OSVDB:113251</elem>
  718. </table>
  719. <table key="description">
  720. <elem>    The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and&#xa;    other products, uses nondeterministic CBC padding, which makes it easier&#xa;    for man-in-the-middle attackers to obtain cleartext data via a&#xa;    padding-oracle attack, aka the &quot;POODLE&quot; issue.</elem>
  721. </table>
  722. <table key="dates">
  723. <table key="disclosure">
  724. <elem key="year">2014</elem>
  725. <elem key="day">14</elem>
  726. <elem key="month">10</elem>
  727. </table>
  728. </table>
  729. <elem key="disclosure">2014-10-14</elem>
  730. <table key="check_results">
  731. <elem>TLS_RSA_WITH_AES_128_CBC_SHA</elem>
  732. <elem>TLS_FALLBACK_SCSV properly implemented</elem>
  733. </table>
  734. <table key="refs">
  735. <elem>https://www.imperialviolet.org/2014/10/14/poodle.html</elem>
  736. <elem>http://osvdb.org/113251</elem>
  737. <elem>https://www.openssl.org/~bodo/ssl-poodle.pdf</elem>
  738. <elem>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566</elem>
  739. </table>
  740. </table>
  741. </script></port>
  742. <port protocol="tcp" portid="9050"><state state="open" reason="syn-ack" reason_ttl="0"/><service name="tor-socks" method="table" conf="3"/></port>
  743. </ports>
  744. <hostscript><script id="smb-vuln-cve2009-3103" output="&#xa;  VULNERABLE:&#xa;  SMBv2 exploit (CVE-2009-3103, Microsoft Security Advisory 975497)&#xa;    State: VULNERABLE&#xa;    IDs:  CVE:CVE-2009-3103&#xa;          Array index error in the SMBv2 protocol implementation in srv2.sys in Microsoft Windows Vista Gold, SP1, and SP2, &#xa;          Windows Server 2008 Gold and SP2, and Windows 7 RC allows remote attackers to execute arbitrary code or cause a &#xa;          denial of service (system crash) via an &amp; (ampersand) character in a Process ID High header field in a NEGOTIATE &#xa;          PROTOCOL REQUEST packet, which triggers an attempted dereference of an out-of-bounds memory location, &#xa;          aka &quot;SMBv2 Negotiation Vulnerability.&quot; &#xa;          &#xa;    Disclosure date: 2009-09-08&#xa;    References:&#xa;      http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3103&#xa;      https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3103&#xa;"><table key="CVE-2009-3103">
  745. <elem key="title">SMBv2 exploit (CVE-2009-3103, Microsoft Security Advisory 975497)</elem>
  746. <elem key="state">VULNERABLE</elem>
  747. <table key="ids">
  748. <elem>CVE:CVE-2009-3103</elem>
  749. </table>
  750. <table key="description">
  751. <elem>    Array index error in the SMBv2 protocol implementation in srv2.sys in Microsoft Windows Vista Gold, SP1, and SP2, &#xa;    Windows Server 2008 Gold and SP2, and Windows 7 RC allows remote attackers to execute arbitrary code or cause a &#xa;    denial of service (system crash) via an &amp; (ampersand) character in a Process ID High header field in a NEGOTIATE &#xa;    PROTOCOL REQUEST packet, which triggers an attempted dereference of an out-of-bounds memory location, &#xa;    aka &quot;SMBv2 Negotiation Vulnerability.&quot; &#xa;    </elem>
  752. </table>
  753. <table key="dates">
  754. <table key="disclosure">
  755. <elem key="year">2009</elem>
  756. <elem key="day">08</elem>
  757. <elem key="month">09</elem>
  758. </table>
  759. </table>
  760. <elem key="disclosure">2009-09-08</elem>
  761. <table key="refs">
  762. <elem>http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3103</elem>
  763. <elem>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3103</elem>
  764. </table>
  765. </table>
  766. </script><script id="smb-vuln-ms10-054" output="false">false</script><script id="smb-vuln-ms10-061" output="false">false</script><script id="smb-vuln-regsvc-dos" output="&#xa;  VULNERABLE:&#xa;  Service regsvc in Microsoft Windows systems vulnerable to denial of service&#xa;    State: VULNERABLE&#xa;      The service regsvc in Microsoft Windows 2000 systems is vulnerable to denial of service caused by a null deference &#xa;      pointer. This script will crash the service if it is vulnerable. This vulnerability was discovered by Ron Bowes &#xa;      while working on smb-enum-sessions.&#xa;          &#xa;"><table key="NMAP-6">
  767. <elem key="title">Service regsvc in Microsoft Windows systems vulnerable to denial of service</elem>
  768. <elem key="state">VULNERABLE</elem>
  769. <table key="description">
  770. <elem>The service regsvc in Microsoft Windows 2000 systems is vulnerable to denial of service caused by a null deference &#xa;pointer. This script will crash the service if it is vulnerable. This vulnerability was discovered by Ron Bowes &#xa;while working on smb-enum-sessions.&#xa;    </elem>
  771. </table>
  772. </table>
  773. </script></hostscript><times srtt="70" rttvar="61" to="100000"/>
  774. </host>
  775. <runstats><finished time="1468624906" timestr="Sat Jul 16 04:51:46 2016" elapsed="346.24" summary="Nmap done at Sat Jul 16 04:51:46 2016; 1 IP address (1 host up) scanned in 346.24 seconds" exit="success"/><hosts up="1" down="0" total="1"/>
  776. </runstats>
  777. </nmaprun>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement