Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ##################################################################################################################################
- =================================================================================================================================
- Hostname www.cityoflondon.gov.uk ISP COLT Technology Services Group Limited
- Continent Europe Flag
- GB
- Country United Kingdom Country Code GB
- Region England Local time 31 Mar 2020 04:55 BST
- City London Postal Code EC2V
- IP Address 80.169.89.102 Latitude 51.516
- Longitude -0.093
- ================================================================================================================================
- ################################################################################################################################
- Target:https://www.cityoflondon.gov.uk/
- IP:80.169.89.102
- ################################################################################################################################
- > set type=A
- > www.cityoflondon.gov.uk
- Server: 10.101.0.243
- Address: 10.101.0.243#53
- Non-authoritative answer:
- Name: www.cityoflondon.gov.uk
- Address: 80.169.89.102
- > set type=NS
- > www.cityoflondon.gov.uk
- Server: 10.101.0.243
- Address: 10.101.0.243#53
- Non-authoritative answer:
- *** Can't find www.cityoflondon.gov.uk: No answer
- Authoritative answers can be found from:
- cityoflondon.gov.uk
- origin = jake.ns.cloudflare.com
- mail addr = dns.cloudflare.com
- serial = 2033627693
- refresh = 10000
- retry = 2400
- expire = 604800
- minimum = 3600
- > set type=MX
- > www.cityoflondon.gov.uk
- Server: 10.101.0.243
- Address: 10.101.0.243#53
- Non-authoritative answer:
- *** Can't find www.cityoflondon.gov.uk: No answer
- Authoritative answers can be found from:
- cityoflondon.gov.uk
- origin = jake.ns.cloudflare.com
- mail addr = dns.cloudflare.com
- serial = 2033627693
- refresh = 10000
- retry = 2400
- expire = 604800
- minimum = 3600
- >
- ################################################################################################################################
- Domain:
- cityoflondon.gov.uk
- Registered For:
- City of London Corporation
- Domain Owner:
- City of London Corporation
- Registered By:
- Colt Technology Services
- Servers:
- jake.ns.cloudflare.com
- treasure.ns.cloudflare.com
- Registrant Contact:
- City of London Corporation
- Registrant Address:
- PO Box 270
- Guildhall
- London
- EC2P 2EJ
- United Kingdom
- +447596 279 077 (Phone)
- carl.walker@cityoflondon.gov.uk
- Renewal date:
- Wednesday 18th May 2022
- Entry updated:
- Tuesday 18th February 2020
- Entry created:
- Wednesday 17th September 2003
- ################################################################################################################################
- Trying "cityoflondon.gov.uk"
- ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 6277
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 4
- ;; QUESTION SECTION:
- ;cityoflondon.gov.uk. IN ANY
- ;; ANSWER SECTION:
- cityoflondon.gov.uk. 3789 IN HINFO "RFC8482" ""
- cityoflondon.gov.uk. 28630 IN NS treasure.ns.cloudflare.com.
- cityoflondon.gov.uk. 28630 IN NS jake.ns.cloudflare.com.
- ;; ADDITIONAL SECTION:
- treasure.ns.cloudflare.com. 32543 IN A 162.159.38.116
- jake.ns.cloudflare.com. 18813 IN A 173.245.59.122
- treasure.ns.cloudflare.com. 32543 IN AAAA 2606:4700:50::a29f:2674
- jake.ns.cloudflare.com. 18813 IN AAAA 2606:4700:58::adf5:3b7a
- Received 205 bytes from 2001:18c0:121:6900:724f:b8ff:fefd:5b6a#53 in 447 ms
- ################################################################################################################################
- ; <<>> DiG 9.11.16-2-Debian <<>> +trace cityoflondon.gov.uk
- ;; global options: +cmd
- . 86400 IN NS a.root-servers.net.
- . 86400 IN NS b.root-servers.net.
- . 86400 IN NS c.root-servers.net.
- . 86400 IN NS d.root-servers.net.
- . 86400 IN NS e.root-servers.net.
- . 86400 IN NS f.root-servers.net.
- . 86400 IN NS g.root-servers.net.
- . 86400 IN NS h.root-servers.net.
- . 86400 IN NS i.root-servers.net.
- . 86400 IN NS j.root-servers.net.
- . 86400 IN NS k.root-servers.net.
- . 86400 IN NS l.root-servers.net.
- . 86400 IN NS m.root-servers.net.
- . 86400 IN RRSIG NS 8 0 518400 20200412170000 20200330160000 33853 . 0CZ/She0YSzr3cBeCWPkQ4fbgGTZ3XW7AZViR+vXPMIQnwGCfutTgISI 8DeQlatHn+5KmyHYAC17bzQ8jU21//7ZXEP6WDVewK8NblE1/8yCciN+ jd/J5wHY3MqWFa8CL7MyGjE+LsUu4M69XJ7tZ1WbBOqoyJVOJy2ckXv4 Ffd5Lzm7BgigN85BqdaEUZdOh80nQ/u0ic3DvWj8+cUchhmksRbO/w3M p5GEkeEvFp5rq1deCSPfZ86Ym2lqF+YYH9wvuegqja0X4JGzFH+PdWQn ED1dN6ZvPxRuIbyqx4Mcu7H8zkLSFFSBdJNJMD/ERv3TPd2yI+wRL4Qg WaTYtA==
- ;; Received 525 bytes from 10.101.0.243#53(10.101.0.243) in 106 ms
- uk. 172800 IN NS nsa.nic.uk.
- uk. 172800 IN NS dns1.nic.uk.
- uk. 172800 IN NS nsb.nic.uk.
- uk. 172800 IN NS nsd.nic.uk.
- uk. 172800 IN NS dns2.nic.uk.
- uk. 172800 IN NS dns3.nic.uk.
- uk. 172800 IN NS dns4.nic.uk.
- uk. 172800 IN NS nsc.nic.uk.
- uk. 86400 IN DS 43876 8 2 A107ED2AC1BD14D924173BC7E827A1153582072394F9272BA37E2353 BC659603
- uk. 86400 IN RRSIG DS 8 1 86400 20200412170000 20200330160000 33853 . cE3IH5poLc6c9AWBgeKLcp47sDjY4AR2e04YU0foLiMwrFJGTWEYLgec KgFakc1/0RdG9yI+8HHUqOuYgXQvSjhq+We9Qp6o8qqE9XigPtQ3Oq9D O8ILwmITPEK0MWJqzrPeGinMuc5a8MJeHK/v6QnioVV9ofciV9c/wyU8 VKSSSUk8XA3VXPBPkSt9CIkYpLuDyJTlpIotPzYvN4oyQgEUg52La3WS LbZksabQ6wqHfZjFq6xHtZXrZpctSthv1yo13HT4PSmIjv4Xt3i8hh1K eA7sSYjqBrDCD8dFntH//OS7qoElq/3F2ewSHykrF9r06PX1b07jVJdI ASs9sA==
- ;; Received 831 bytes from 192.33.4.12#53(c.root-servers.net) in 112 ms
- gov.uk. 172800 IN NS ns0.ja.net.
- gov.uk. 172800 IN NS ns1.surfnet.nl.
- gov.uk. 172800 IN NS ns2.ja.net.
- gov.uk. 172800 IN NS ns3.ja.net.
- gov.uk. 172800 IN NS ns4.ja.net.
- gov.uk. 172800 IN NS auth00.ns.de.uu.net.
- gov.uk. 172800 IN NS auth50.ns.de.uu.net.
- gov.uk. 300 IN DS 17539 8 2 2F0A0A65DB9E930F5B2C0425F67DF66416C076124652A281D9A8FFA7 73828F57
- gov.uk. 300 IN RRSIG DS 8 2 300 20200413041808 20200330034320 43056 uk. EtYXeEqkxLinKQ1b9mQE+mv6iwTi4zOY4y1hJhMNkN29jjMWKB6x71d2 k6ZfTtTlT4ARmbRYv+qfzpmfdBGmNvzLwO9RAXh0dbjkh2EZp7Qtpdrh WFd3CQSh+q94YPhs+VxUMjQm5eSKDuSKPClrOgxMJTXosztmkF4Z3oyG fr0=
- ;; Received 415 bytes from 2a01:618:404::1#53(dns3.nic.uk) in 89 ms
- cityoflondon.gov.uk. 86400 IN NS jake.ns.cloudflare.com.
- cityoflondon.gov.uk. 86400 IN NS treasure.ns.cloudflare.com.
- P64J5KUTD6UCANBTQOO2AA0I5H5AUPKR.gov.uk. 14400 IN NSEC3 1 0 10 - P6BLR4VP0JD859HHF4L0MH54AIED54LM NS
- P64J5KUTD6UCANBTQOO2AA0I5H5AUPKR.gov.uk. 14400 IN RRSIG NSEC3 8 3 14400 20200429124823 20200330124823 41286 gov.uk. JcYAMryiyrQpKzeTN0lxxfCneu2feOCsP3/P/8RWB06jPEsFUfjfFiUE s1XRud0TQ90oMkOQktksMa97SoJ7W3scZ7RA0qphfCnG/0Mh9dcz0IsJ yygzDsPI08YOGc3zzzLcvUPwdA/em/dJHu412eXE2MO7MqCUzIvQyqKO Ohk=
- ;; Received 347 bytes from 192.76.144.14#53(auth00.ns.de.uu.net) in 116 ms
- cityoflondon.gov.uk. 300 IN A 80.169.89.102
- ;; Received 64 bytes from 173.245.59.122#53(jake.ns.cloudflare.com) in 107 ms
- ################################################################################################################################
- [i] Scanning Site: https://www.cityoflondon.gov.uk
- B A S I C I N F O
- ====================
- [+] Site Title: Welcome to the City of London Corporation
- [+] IP address: 80.169.89.102
- [+] Web Server: Microsoft-IIS/7.5
- [+] CMS: Could Not Detect
- [+] Cloudflare: Not Detected
- [+] Robots File: Could NOT Find robots.txt!
- W H O I S L O O K U P
- ========================
- Domain:
- cityoflondon.gov.uk
- Registered For:
- City of London Corporation
- Domain Owner:
- City of London Corporation
- Registered By:
- Colt Technology Services
- Servers:
- jake.ns.cloudflare.com
- treasure.ns.cloudflare.com
- Registrant Contact:
- City of London Corporation
- Registrant Address:
- PO Box 270
- Guildhall
- London
- EC2P 2EJ
- United Kingdom
- +447596 279 077 (Phone)
- carl.walker@cityoflondon.gov.uk
- Renewal date:
- Wednesday 18th May 2022
- Entry updated:
- Tuesday 18th February 2020
- Entry created:
- Wednesday 17th September 2003
- G E O I P L O O K U P
- =========================
- [i] IP Address: 80.169.89.102
- [i] Country: United Kingdom
- [i] State: England
- [i] City: London
- [i] Latitude: 51.5132
- [i] Longitude: -0.0961
- H T T P H E A D E R S
- =======================
- [i] HTTP/1.1 302 Redirect
- [i] Content-Type: text/html; charset=UTF-8
- [i] Location: http://www.cityoflondon.gov.uk/Pages/default.aspx
- [i] Server: Microsoft-IIS/7.5
- [i] SPRequestGuid: 02486b7c-70b0-425d-98de-2551efdf842c
- [i] X-SharePointHealthScore: 0
- [i] X-Powered-By: ASP.NET
- [i] MicrosoftSharePointTeamServices: 14.0.0.7239
- [i] X-MS-InvokeApp: 1; RequireReadOnly
- [i] Date: Tue, 31 Mar 2020 04:12:16 GMT
- [i] Connection: close
- [i] Content-Length: 172
- [i] HTTP/1.1 301 Moved Permanently
- [i] Location: https://www.cityoflondon.gov.uk/Pages/default.aspx
- [i] Server: COL-VMW-M-LB02
- [i] Cache-Control: no-cache
- [i] Connection: close
- [i] HTTP/1.1 200 OK
- [i] Cache-Control: private
- [i] Content-Type: text/html; charset=utf-8
- [i] Expires: Tue, 31 Mar 2020 04:21:08 GMT
- [i] Vary: *
- [i] Server: Microsoft-IIS/7.5
- [i] SPRequestGuid: 377e7433-aca1-409f-97ec-c413b79efbd9
- [i] X-SharePointHealthScore: 0
- [i] X-AspNet-Version: 2.0.50727
- [i] X-Powered-By: ASP.NET
- [i] MicrosoftSharePointTeamServices: 14.0.0.7239
- [i] X-MS-InvokeApp: 1; RequireReadOnly
- [i] Date: Tue, 31 Mar 2020 04:12:16 GMT
- [i] Connection: close
- [i] Content-Length: 32781
- D N S L O O K U P
- ===================
- cityoflondon.gov.uk. 3788 IN HINFO "RFC8482" ""
- S U B N E T C A L C U L A T I O N
- ====================================
- Address = 80.169.89.102
- Network = 80.169.89.102 / 32
- Netmask = 255.255.255.255
- Broadcast = not needed on Point-to-Point links
- Wildcard Mask = 0.0.0.0
- Hosts Bits = 0
- Max. Hosts = 1 (2^0 - 0)
- Host Range = { 80.169.89.102 - 80.169.89.102 }
- N M A P P O R T S C A N
- ============================
- Starting Nmap 7.70 ( https://nmap.org ) at 2020-03-31 04:08 UTC
- Nmap scan report for cityoflondon.gov.uk (80.169.89.102)
- Host is up (0.078s latency).
- PORT STATE SERVICE
- 21/tcp filtered ftp
- 22/tcp filtered ssh
- 80/tcp open http
- 443/tcp open https
- Nmap done: 1 IP address (1 host up) scanned in 2.08 seconds
- S U B - D O M A I N F I N D E R
- ==================================
- [i] Total Subdomains Found : 30
- [+] Subdomain: mail1.cityoflondon.gov.uk
- [-] IP: 80.169.89.80
- [+] Subdomain: www1.cityoflondon.gov.uk
- [-] IP: 80.169.89.96
- [+] Subdomain: www.planning2.cityoflondon.gov.uk
- [-] IP: 195.171.176.91
- [+] Subdomain: www.mapping2.cityoflondon.gov.uk
- [-] IP: 195.171.176.90
- [+] Subdomain: mail2.cityoflondon.gov.uk
- [-] IP: 80.169.89.106
- [+] Subdomain: fypsd.cityoflondon.gov.uk
- [-] IP: 80.169.89.101
- [+] Subdomain: housingselfservice.cityoflondon.gov.uk
- [-] IP: 195.20.223.214
- [+] Subdomain: wwwstage.cityoflondon.gov.uk
- [-] IP: 80.169.89.82
- [+] Subdomain: mobile.cityoflondon.gov.uk
- [-] IP: 80.169.89.102
- [+] Subdomain: fdonline.cityoflondon.gov.uk
- [-] IP: 80.169.89.106
- [+] Subdomain: learningzone.cityoflondon.gov.uk
- [-] IP: 31.25.189.168
- [+] Subdomain: librarycatalogue.cityoflondon.gov.uk
- [-] IP: 217.169.37.149
- [+] Subdomain: elearning.cityoflondon.gov.uk
- [-] IP: 146.177.9.125
- [+] Subdomain: www.mapping.cityoflondon.gov.uk
- [-] IP: 195.171.176.88
- [+] Subdomain: biztalk.cityoflondon.gov.uk
- [-] IP: 80.169.89.97
- [+] Subdomain: email.cityoflondon.gov.uk
- [-] IP: 91.206.118.10
- [+] Subdomain: www.guildhall.cityoflondon.gov.uk
- [-] IP: 176.32.230.9
- [+] Subdomain: pcn.cityoflondon.gov.uk
- [-] IP: 212.50.171.54
- [+] Subdomain: ldfconsultation.cityoflondon.gov.uk
- [-] IP: 195.12.22.232
- [+] Subdomain: shop.cityoflondon.gov.uk
- [-] IP: 23.227.38.32
- [+] Subdomain: jobs.cityoflondon.gov.uk
- [-] IP: 195.20.223.210
- [+] Subdomain: revenues.cityoflondon.gov.uk
- [-] IP: 195.20.223.210
- [+] Subdomain: hyms.cityoflondon.gov.uk
- [-] IP: 195.171.176.87
- [+] Subdomain: careers.cityoflondon.gov.uk
- [-] IP: 77.104.134.194
- [+] Subdomain: citybenefits.cityoflondon.gov.uk
- [-] IP: 134.213.36.31
- [+] Subdomain: consult.cityoflondon.gov.uk
- [-] IP: 31.25.189.114
- [+] Subdomain: www.consult.cityoflondon.gov.uk
- [-] IP: 31.25.189.114
- [+] Subdomain: www.cityoflondon.gov.uk
- [-] IP: 80.169.89.102
- [+] Subdomain: democracy.cityoflondon.gov.uk
- [-] IP: 80.169.89.107
- [+] Subdomain: www.guildhallartgallery.cityoflondon.gov.uk
- [-] IP: 80.169.89.101
- ################################################################################################################################
- [*] Users found: 45
- ---------------------
- Abiola Ashiru - Estate Manager - City of London Corporation
- Amadou Balde - CRM Database Officer - City of London
- Andrew J. Cross - Managing Director - Zuzumi
- Andrew McMurtrie - Councillor - City of London Corporation
- Andrews Bryony - APFM - City of London Corporation
- Anthonia Ifeanyi-Okoro - Project Manager - City of London
- Ben Grainger - Chief Operating Officer - Metfriendly
- Clarke Cover - Engineer - City of London
- Damian Nussbaum - Director - City of London Corporation
- David Roalfe - Security - City of London
- Deborah Jones - animal health inspector - City of London
- Deborah Ley MRICS - Estate Manager - Royal Mail Group
- Edward Jones - Researcher - City of London Corporation
- Frederick Bergann - Fiber Technician - Vicario AS
- Geoff Parnell - Head of Transformation - Octavia
- Giles Radford - Highways Manager - City of London
- Ian Hughes - Traffic Manager - City of London
- Jamel Morris - Sole trader - eBay
- James Lee - Advisory Board Member - Thrive - UnLtd
- Jasmine Cumbers - Animal Welfare Officer - City of London
- Jeremy Young - Countryside Ranger - City of London
- Jon White - Group Building Control Officer - City of London
- Kenneth Page - Interpretation Officer - City of London
- Kerrigan Abbott - Asset Manager - City of London
- Lizzie Jupp - Event Manager - The Clink Charity
- Lucy McDonald - Head of Regional Marketing - Arriva Group
- Mark Pundsack - Assistant District Surveyor - City of London
- Mark Sherlock MBIFM - Superintendent - City of London
- Mehzebin Adam - Museum Curator - British Red Cross
- Michelle Cavanagh - PA - City of London
- Mick Bagnall - Film Officer - City of London Corporation
- Muhibur Rahman - Post Room Supervisor - City of London
- Nirupa Gardner - Ms - CIty Of London
- Paul Jeal - Senior Supervisor - City of London
- Prem Goyal OBE JP - Non Executive Director - rise inc
- Richard Gentry - Local Authority Manager - City of London
- Rory McMullan - Press Officer - London road safety council
- Ruth Shilston - Associate - RWDI
- Sammy Neillis - Personal Assistant - City of London
- Serafino Manca - Head Of Marketing Operations - Koine
- Sufina Ahmad - Director - The John Ellerman Foundation
- Tom Noble - Group Manager - City of London Corporation
- Vince Dignam FCILT - Chairman Of The Board - BITA
- martin goodwin - housing options officer - City of London
- paula walton - Secretary - City of London
- Searching 400 results.
- Searching 500 results.
- [*] Searching Linkedin.
- [*] Links found: 1
- ---------------------
- https://www.linkedin.com/in/nick-bensted-smith-7021535/
- [*] IPs found: 52
- -------------------
- 23.227.38.32
- 31.25.189.114
- 31.25.189.168
- 34.243.0.23
- 52.18.141.94
- 52.56.67.36
- 77.104.134.194
- 80.169.89.80
- 80.169.89.82
- 80.169.89.91
- 80.169.89.96
- 80.169.89.97
- 80.169.89.101
- 80.169.89.102
- 80.169.89.106
- 80.169.89.107
- 85.92.209.141
- 86.54.118.84
- 91.206.118.10
- 104.22.14.166
- 104.22.15.166
- 134.213.36.31
- 141.211.243.19
- 146.177.9.125
- 176.32.230.9
- 193.34.187.148
- 195.12.22.232
- 195.20.223.210
- 195.20.223.213
- 195.20.223.214
- 195.171.176.87
- 195.171.176.88
- 195.171.176.90
- 195.171.176.91
- 195.171.176.93
- 212.50.171.54
- 217.169.37.149
- 217.174.252.152
- [*] Emails found: 309
- ----------------------
- adam.green@cityoflondon.gov.uk
- adam.reeve@cityoflondon.gov.uk
- adrian.dressekie@cityoflondon.gov.uk
- adultsduty@cityoflondon.gov.uk
- afsana.rahman@cityoflondon.gov.uk
- alan.lilly@cityoflondon.gov.uk
- alexander.barr@cityoflondon.gov.uk
- amanda.owens@cityoflondon.gov.uk
- amicus.unions@cityoflondon.gov.uk
- andrea.merciar@cityoflondon.gov.uk
- andrew.bellingham@cityoflondon.gov.uk
- andrew.cammarano@cityoflondon.gov.uk
- andrew.harvey@cityoflondon.gov.uk
- andrew.king@cityoflondon.gov.uk
- andrew.lenihan@cityoflondon.gov.uk
- andrew.tregidgo@cityoflondon.gov.uk
- andrew.woods@cityoflondon.gov.uk
- andy.waker@cityoflondon.gov.uk
- angela.starling@cityoflondon.gov.uk
- angela.thomas@cityoflondon.gov.uk
- angela.turnbull@cityoflondon.gov.uk
- anthony.riley@cityoflondon.gov.uk
- ask.lma@cityoflondon.gov.uk
- babzzyandrea.merciar@cityoflondon.gov.uk
- bankarea@cityoflondon.gov.uk
- barbicanlib@cityoflondon.gov.uk
- barbicanmusic@cityoflondon.gov.uk
- barrie.ellis@cityoflondon.gov.uk
- beech.street@cityoflondon.gov.uk
- bella.longman@cityoflondon.gov.uk
- ben.kennedy@cityoflondon.gov.uk
- ben.manku@cityoflondon.gov.uk
- ben.mossop@cityoflondon.gov.uk
- benjamin.mossop@cityoflondon.gov.uk
- beverly.campbell@cityoflondon.gov.uk
- blanca.daniel@cityoflondon.gov.uk
- bradley.viljoen@cityoflondon.gov.uk
- brian.henderson@cityoflondon.gov.uk
- bryn.aldridge@cityoflondon.gov.uk
- burnham.beeches@cityoflondon.gov.uk
- carl.bernhardt@cityoflondon.gov.uk
- carla-maria.heath@cityoflondon.gov.uk
- carly.cheeseman@cityoflondon.gov.uk
- carly.harris@cityoflondon.gov.uk
- carol.boswarthack@cityoflondon.gov.uk
- caroline.pyke@cityoflondon.gov.uk
- carolyn.piper@cityoflondon.gov.uk
- carolynn.holmes@cityoflondon.gov.uk
- carroll.stanbury@cityoflondon.gov.uk
- catherine.hughes@cityoflondon.gov.uk
- catherine.mcguinness@cityoflondon.gov.uk
- cathy.lawson@cityoflondon.gov.uk
- charlie.turpie@cityoflondon.gov.uk
- charlotte.factor@cityoflondon.gov.uk
- charlotte.hopkins@cityoflondon.gov.uk
- che.christie@cityoflondon.gov.uk
- cheryl.mcgee@cityoflondon.gov.uk
- china@cityoflondon.gov.uk
- chris.anderson@cityoflondon.gov.uk
- chris.barlow@cityoflondon.gov.uk
- chris.fcips@cityoflondon.gov.uk
- chris.hartwell@cityoflondon.gov.uk
- chris.punter@cityoflondon.gov.uk
- chris.smith2@cityoflondon.gov.uk
- christine.beaumont@cityoflondon.gov.uk
- christine.connolly@cityoflondon.gov.uk
- christine.josef@cityoflondon.gov.uk
- christopher.bell@cityoflondon.gov.uk
- cirla.peall@cityoflondon.gov.uk
- citybridgetrust@cityoflondon.gov.uk
- claire.dumontier-marriage@cityoflondon.gov.uk
- claire.scott@cityoflondon.gov.uk
- colin.bull@cityoflondon.gov.uk
- colpolicemuseum@cityoflondon.gov.uk
- cru@cityoflondon.gov.uk
- dafydd.jones@cityoflondon.gov.uk
- dagley@cityoflondon.gov.uk
- dan.tomkins@cityoflondon.gov.uk
- dave.davis@cityoflondon.gov.uk
- david.bentley@cityoflondon.gov.uk
- david.buckley@cityoflondon.gov.uk
- david.kemp@cityoflondon.gov.uk
- david.laird@cityoflondon.gov.uk
- david.mackintosh@cityoflondon.gov.uk
- david.mckay@cityoflondon.gov.uk
- david.pack@cityoflondon.gov.uk
- david.renshaw@cityoflondon.gov.uk
- david.summers@cityoflondon.gov.uk
- deanobrowno@cityoflondon.gov.uk
- deborah.cluett@cityoflondon.gov.uk
- derek.meddings@cityoflondon.gov.uk
- diane.marcou@cityoflondon.gov.uk
- douglas.wilkinson@cityoflondon.gov.uk
- dulcie.felton@cityoflondon.gov.uk
- education@cityoflondon.gov.uk
- edward.chaning-cotter@cityoflondon.gov.uk
- elizabeth.rogula@cityoflondon.gov.uk
- emma.martin@cityoflondon.gov.uk
- emma.marwood@cityoflondon.gov.uk
- emmanuel.ojugo@cityoflondon.gov.uk
- gary.flint@cityoflondon.gov.uk
- gary.marshall@cityoflondon.gov.uk
- gavin.felgate@cityoflondon.gov.uk
- gavin.simpson@cityoflondon.gov.uk
- george.abrahams@cityoflondon.gov.uk
- gill@cityoflondon.gov.uk
- gillian.maxwell@cityoflondon.gov.uk
- grace.stilgoe@cityoflondon.gov.uk
- graham.bell@cityoflondon.gov.uk
- greg.nott@cityoflondon.gov.uk
- gregory.moore@cityoflondon.gov.uk
- guildhall.events@cityoflondon.gov.uk
- guildhall.library@cityoflondon.gov.uk
- harper.ozkulac@cityoflondon.gov.uk
- harry.king@cityoflondon.gov.uk
- hayley.hajduczek@cityoflondon.gov.uk
- heinrich.storm@cityoflondon.gov.uk
- helen.armstrong@cityoflondon.gov.uk
- iain.mudge@cityoflondon.gov.uk
- iain.stanton@cityoflondon.gov.uk
- ian.hughes@cityoflondon.gov.uk
- ian.partington@cityoflondon.gov.uk
- information.officer@cityoflondon.gov.uk
- isabelle.almeida@cityoflondon.gov.uk
- jack.dixon@cityoflondon.gov.uk
- jacqueline.cover@cityoflondon.gov.uk
- jacqueline.watson@cityoflondon.gov.uk
- james.barber@cityoflondon.gov.uk
- james.gardiner@cityoflondon.gov.uk
- jamie.bottono@cityoflondon.gov.uk
- jan.horton@cityoflondon.gov.uk
- jane.doe@cityoflondon.gov.uk
- janet.fortune@cityoflondon.gov.uk
- janet.laban@cityoflondon.gov.uk
- janet.pearman@cityoflondon.gov.uk
- jeremy.dagley@cityoflondon.gov.uk
- jeremy.mullins@cityoflondon.gov.uk
- jeremy.tuck@cityoflondon.gov.uk
- jerry.buncombe@cityoflondon.gov.uk
- jim.graham@cityoflondon.gov.uk
- joan.westley@cityoflondon.gov.uk
- joanna.burnaby-atkins@cityoflondon.gov.uk
- john.ambrose@cityoflondon.gov.uk
- john.barker@cityoflondon.gov.uk
- john.bennett@cityoflondon.gov.uk
- john.davies@cityoflondon.gov.uk
- john.lake@cityoflondon.gov.uk
- jonathan.meares@cityoflondon.gov.uk
- kajal.maisuria@cityoflondon.gov.uk
- karyn.ramsay@cityoflondon.gov.uk
- katherine.bowen@cityoflondon.gov.uk
- katie.bishop@cityoflondon.gov.uk
- kayleigh.rippe@cityoflondon.gov.uk
- kelly.montague@cityoflondon.gov.uk
- kelly.stokes@cityoflondon.gov.uk
- kevin.mulcahy@cityoflondon.gov.uk
- kimberley.hall@cityoflondon.gov.uk
- kirsty.leitch@cityoflondon.gov.uk
- kk@cityoflondon.gov.uk
- lado@cityoflondon.gov.uk
- laurence.ward@cityoflondon.gov.uk
- lee.jones@cityoflondon.gov.uk
- leigh.sherkin@cityoflondon.gov.uk
- leila.ben-hassel@cityoflondon.gov.uk
- leshay.jardine@cityoflondon.gov.uk
- libby.grant@cityoflondon.gov.uk
- libsupportservices@cityoflondon.gov.uk
- licensing@cityoflondon.gov.uk
- linda.antonioni@cityoflondon.gov.uk
- linda.burgess@cityoflondon.gov.uk
- lisa.russell@cityoflondon.gov.uk
- liz.yamada@cityoflondon.gov.uk
- lorraine.brook@cityoflondon.gov.uk
- louise.stirna@cityoflondon.gov.uk
- lucie.martin@cityoflondon.gov.uk
- lucy.sandford@cityoflondon.gov.uk
- lydia.blackley@cityoflondon.gov.uk
- malcolm.key@cityoflondon.gov.uk
- margaret.jackson@cityoflondon.gov.uk
- marika.ludmann@cityoflondon.gov.uk
- mark.anthony@cityoflondon.gov.uk
- mark.mojsak@cityoflondon.gov.uk
- mark.pundsack@cityoflondon.gov.uk
- marketsprogramme@cityoflondon.gov.uk
- martin.hall@cityoflondon.gov.uk
- martin.howe@cityoflondon.gov.uk
- martin.till@cityoflondon.gov.uk
- matthew.green@cityoflondon.gov.uk
- matthew.payne@cityoflondon.gov.uk
- michael.bennett@cityoflondon.gov.uk
- michelle.ilbert@cityoflondon.gov.uk
- michelle.vancayseele@cityoflondon.gov.uk
- mick.bagnall@cityoflondon.gov.uk
- mick.collins@cityoflondon.gov.uk
- mike.braude@cityoflondon.gov.uk
- murdo.macmillan@cityoflondon.gov.uk
- murray.craig@cityoflondon.gov.uk
- nasrin.khan@cityoflondon.gov.uk
- nathalie.rebillon-lopez@cityoflondon.gov.uk
- neil.edkins@cityoflondon.gov.uk
- nestor.alfonzosantamaria@cityoflondon.gov.uk
- nicholas.anstee@cityoflondon.gov.uk
- nick.pouyioukkas@cityoflondon.gov.uk
- nicola.avery@cityoflondon.gov.uk
- nigel.challis@cityoflondon.gov.uk
- nigel.francis@cityoflondon.gov.uk
- officer@cityoflondon.gov.uk
- oluremi.ogunde@cityoflondon.gov.uk
- pam.rampasard@cityoflondon.gov.uk
- paola.galley@cityoflondon.gov.uk
- patricia.jones@cityoflondon.gov.uk
- paul.crudgington@cityoflondon.gov.uk
- paul.hutson@cityoflondon.gov.uk
- paul.maskell@cityoflondon.gov.uk
- paul.taylor@cityoflondon.gov.uk
- paula.jackson@cityoflondon.gov.uk
- paula.walton@cityoflondon.gov.uk
- pauline.halliday@cityoflondon.gov.uk
- peter.brett@cityoflondon.gov.uk
- peter.davenport@cityoflondon.gov.uk
- peter.henson@cityoflondon.gov.uk
- peter.shadbolt@cityoflondon.gov.uk
- petra.sprowson@cityoflondon.gov.uk
- philip.jordan@cityoflondon.gov.uk
- pixel-1585627870370944-web-@cityoflondon.gov.uk
- porthealth.denton@cityoflondon.gov.uk
- porthealth@cityoflondon.gov.uk
- pro@cityoflondon.gov.uk
- publicprotection@cityoflondon.gov.uk
- rachel.sambells@cityoflondon.gov.uk
- raymond.sibson@cityoflondon.gov.uk
- rdr@cityoflondon.gov.uk
- rex.egesi@cityoflondon.gov.uk
- richard.anshuh@cityoflondon.gov.uk
- richard.chamberlain@cityoflondon.gov.uk
- richard.gentry@cityoflondon.gov.uk
- robert.butcher@cityoflondon.gov.uk
- robert.michell@cityoflondon.gov.uk
- robert.quest@cityoflondon.gov.uk
- robert.renwick@cityoflondon.gov.uk
- roger.adams@cityoflondon.gov.uk
- rory.pereira@cityoflondon.gov.uk
- rosalina.banfield@cityoflondon.gov.uk
- rosemarie.garcia@cityoflondon.gov.uk
- ruth.calderwood@cityoflondon.gov.uk
- ruth.duston@cityoflondon.gov.uk
- ryan.clark@cityoflondon.gov.uk
- safercity@cityoflondon.gov.uk
- sailesh.shah@cityoflondon.gov.uk
- sandra.davidson@cityoflondon.gov.uk
- sanjay.odedra@cityoflondon.gov.uk
- sara.pink@cityoflondon.gov.uk
- sarah.leigh@cityoflondon.gov.uk
- scott.mcelwaine@cityoflondon.gov.uk
- seamus.mckenna@cityoflondon.gov.uk
- sharon.brosnan@cityoflondon.gov.uk
- sheila.huntley@cityoflondon.gov.uk
- sheila.kingsland@cityoflondon.gov.uk
- shoelane@cityoflondon.gov.uk
- sid.brewer@cityoflondon.gov.uk
- siobhan.marshall@cityoflondon.gov.uk
- sonia.solicari@cityoflondon.gov.uk
- sophie.jordan@cityoflondon.gov.uk
- sophie.lillington@cityoflondon.gov.uk
- soraya.john-baptiste@cityoflondon.gov.uk
- steve.blake@cityoflondon.gov.uk
- steve.higgon@cityoflondon.gov.uk
- steve.kelly@cityoflondon.gov.uk
- steve.presland@cityoflondon.gov.uk
- steven.bender@cityoflondon.gov.uk
- steven.skurr@cityoflondon.gov.uk
- stuart.morrison@cityoflondon.gov.uk
- stuart.smith@cityoflondon.gov.uk
- sukhjit.gill@cityoflondon.gov.uk
- susan.pearson@cityoflondon.gov.uk
- suzanne.wilding@cityoflondon.gov.uk
- tak.chung@cityoflondon.gov.uk
- tania.mauro@cityoflondon.gov.uk
- terence.short@cityoflondon.gov.uk
- terry.coulthrust@cityoflondon.gov.uk
- terry.patten@cityoflondon.gov.uk
- terry.rowhan@cityoflondon.gov.uk
- terry.sore@cityoflondon.gov.uk
- thecitycentre@cityoflondon.gov.uk
- tina.garwood@cityoflondon.gov.uk
- tom.hoffman@cityoflondon.gov.uk
- tom.hughes@cityoflondon.gov.uk
- tony.halmos@cityoflondon.gov.uk
- tracy.williams@cityoflondon.gov.uk
- val.lawrence@cityoflondon.gov.uk
- verity.creamer@cityoflondon.gov.uk
- vicki.wells@cityoflondon.gov.uk
- vikki.edwards@cityoflondon.gov.uk
- vince.dignam@cityoflondon.gov.uk
- wayne.garrigan@cityoflondon.gov.uk
- wells@cityoflondon.gov.uk
- wendy.mead@cityoflondon.gov.uk
- wootton@cityoflondon.gov.uk
- zoe.nation@cityoflondon.gov.uk
- [*] Hosts found: 345
- ---------------------
- biztalk.cityoflondon.gov.uk:80.169.89.97
- biztalk.cityoflondon.gov.uk:80.169.89.97
- capitacloud.cityoflondon.gov.uk:
- capitacloud2.cityoflondon.gov.uk:
- capitacloud2.cityoflondon.gov.uk:
- capitacloud3.cityoflondon.gov.uk:
- capitacloud3.cityoflondon.gov.uk:
- careers.cityoflondon.gov.uk:77.104.134.194
- careers.cityoflondon.gov.uk:77.104.134.194
- careers.cityoflondon.gov.uk:77.104.134.194
- careers.cityoflondon.gov.uk:77.104.134.194
- careers.cityoflondon.gov.uk:77.104.134.194
- careers.cityoflondon.gov.uk:77.104.134.194
- cisco.cityoflondon.gov.uk:
- citybenefits.cityoflondon.gov.uk:134.213.36.31
- citybenefits.cityoflondon.gov.uk:134.213.36.31
- citybenefits.cityoflondon.gov.uk:134.213.36.31
- cityoflondon.gov.uk:80.169.89.102
- cityoflondon.gov.uk:80.169.89.102
- cityoflondon.gov.uk:80.169.89.102
- cityoflondon.gov.uk:80.169.89.102
- cityoflondon.gov.uk/about-the-city/history/pages/how-to-apply.aspx:
- cityoflondon.gov.uk/corporation/:
- cityoflondon.gov.uk/corporation/homepage.htm:
- cityoflondon.gov.uk/corporation/leisure_heritage/:
- cityoflondon.gov.uk/media_centre/files/future_stock_exchanges.htm:
- cityoflondon.gov.uk/nr/:
- cityoflondon.gov.uk/nr/rdonlyres/08a4077b-:
- cityoflondon.gov.uk/nr/rdonlyres/35263589-5a42-:
- cityoflondon.gov.uk/nr/rdonlyres/c9c2a52b-:
- cityoflondon.gov.uk/pages/default.aspx:
- cityoflondon.gov.uk/search/results.aspx:
- cityoflondon.gov.uk/services/transport-and-streets/parking/pages/car-parks.aspx:
- cityoflondon.gov.uk/stct:
- collage-researcher.cityoflondon.gov.uk:35.176.130.30, 3.11.208.146
- collage-researcher.cityoflondon.gov.uk:35.176.130.30, 3.11.208.146
- collage.cityoflondon.gov.uk:35.176.130.30, 3.11.208.146
- collage.cityoflondon.gov.uk:3.11.208.146, 35.176.130.30
- collage.cityoflondon.gov.uk:35.176.130.30, 3.11.208.146
- collage.cityoflondon.gov.uk:3.11.208.146, 35.176.130.30
- collage.cityoflondon.gov.uk:35.176.130.30, 3.11.208.146
- collage.cityoflondon.gov.uk:35.176.130.30, 3.11.208.146
- collage.cityoflondon.gov.uk:3.11.208.146, 35.176.130.30
- collage.cityoflondon.gov.uk:35.176.130.30, 3.11.208.146
- collage.cityoflondon.gov.uk:3.11.208.146, 35.176.130.30
- collage.cityoflondon.gov.uk:35.176.130.30, 3.11.208.146
- consult.cityoflondon.gov.uk:31.25.189.114
- consult.cityoflondon.gov.uk:31.25.189.114
- consult.cityoflondon.gov.uk:31.25.189.114
- consult.cityoflondon.gov.uk:31.25.189.114
- consult.cityoflondon.gov.uk:31.25.189.114
- contracts.cityoflondon.gov.uk:188.95.135.70
- contracts.cityoflondon.gov.uk:188.95.135.70
- cwi.cityoflondon.gov.uk:
- cwi.cityoflondon.gov.uk:
- cwi.cityoflondon.gov.uk:
- cwidr.cityoflondon.gov.uk:
- democracy.cityoflondon.gov.uk:80.169.89.107
- democracy.cityoflondon.gov.uk:80.169.89.107
- democracy.cityoflondon.gov.uk:80.169.89.107
- democracy.cityoflondon.gov.uk:80.169.89.107
- democracy.cityoflondon.gov.uk:80.169.89.107
- democracy.cityoflondon.gov.uk:80.169.89.107
- democracy.cityoflondon.gov.uk:80.169.89.107
- democracy.cityoflondon.gov.uk:80.169.89.107
- democracy.cityoflondon.gov.uk:80.169.89.107
- dwp-cis.cityoflondon.gov.uk:
- edge.cityoflondon.gov.uk:
- eemocracy.cityoflondon.gov.uk:
- elearning.cityoflondon.gov.uk:146.177.9.125
- elearning.cityoflondon.gov.uk:146.177.9.125
- elearning.cityoflondon.gov.uk:146.177.9.125
- elearning.cityoflondon.gov.uk:146.177.9.125
- email.cityoflondon.gov.uk:91.206.118.10
- email.cityoflondon.gov.uk:91.206.118.10
- email.cityoflondon.gov.uk:91.206.118.10
- email.cityoflondon.gov.uk:91.206.118.10
- email.cityoflondon.gov.uk:91.206.118.10
- email.cityoflondon.gov.uk:91.206.118.10
- emocracy.cityoflondon.gov.uk:
- ext.cityoflondon.gov.uk:80.169.89.106
- ext.cityoflondon.gov.uk:80.169.89.106
- eyp.cityoflondon.gov.uk:193.34.187.146
- fdonline.cityoflondon.gov.uk:80.169.89.106
- fdonline.cityoflondon.gov.uk:80.169.89.106
- fdonline.cityoflondon.gov.uk:80.169.89.106
- femocracy.cityoflondon.gov.uk:
- fyi.cityoflondon.gov.uk:193.34.187.147
- fyi.cityoflondon.gov.uk:193.34.187.147
- fyi.cityoflondon.gov.uk:193.34.187.147
- fyi.cityoflondon.gov.uk:193.34.187.147
- fyi.cityoflondon.gov.uk:193.34.187.147
- fypsd.cityoflondon.gov.uk:80.169.89.101
- fypsd.cityoflondon.gov.uk:80.169.89.101
- fypsd.cityoflondon.gov.uk:80.169.89.101
- fypsd.cityoflondon.gov.uk:80.169.89.101
- guildhall.cityoflondon.gov.uk:
- guildhall.cityoflondon.gov.uk:
- guildhall.cityoflondon.gov.uk:
- guildhall.cityoflondon.gov.uk:
- guildhallartgallery.cityoflondon.gov.uk:
- guildhallartgallery.cityoflondon.gov.uk:
- highwaysreporting.cityoflondon.gov.uk:89.145.127.203
- highwaysreporting.cityoflondon.gov.uk:89.145.127.203
- highwaysreporting.cityoflondon.gov.uk:89.145.127.203
- highwaysreporting.cityoflondon.gov.uk:89.145.127.203
- highwaysreporting.cityoflondon.gov.uk:89.145.127.203
- host13.cityoflondon.gov.uk:
- housingselfservice.cityoflondon.gov.uk:195.20.223.214
- housingselfservice.cityoflondon.gov.uk:195.20.223.214
- hybrid.cityoflondon.gov.uk:195.20.223.210, 195.20.223.245
- hybrid.cityoflondon.gov.uk:195.20.223.245, 195.20.223.210
- hyms.cityoflondon.gov.uk:195.171.176.92
- hyms.cityoflondon.gov.uk:195.171.176.92
- hyms.cityoflondon.gov.uk:195.171.176.92
- intranet.cityoflondon.gov.uk:
- jobs.cityoflondon.gov.uk:104.22.15.166, 104.22.14.166
- jobs.cityoflondon.gov.uk:104.22.14.166, 104.22.15.166
- jobs.cityoflondon.gov.uk:104.22.14.166, 104.22.15.166
- jobs.cityoflondon.gov.uk:104.22.15.166, 104.22.14.166
- jobs.cityoflondon.gov.uk:104.22.15.166, 104.22.14.166
- jobs.cityoflondon.gov.uk:104.22.14.166, 104.22.15.166
- keatshouse.cityoflondon.gov.uk:
- keatshouse.cityoflondon.gov.uk:
- keatshouse.cityoflondon.gov.uk:
- ldfconsultation.cityoflondon.gov.uk:195.12.22.232
- ldfconsultation.cityoflondon.gov.uk:195.12.22.232
- learningzone.cityoflondon.gov.uk:31.25.189.168
- learningzone.cityoflondon.gov.uk:31.25.189.168
- learningzone.cityoflondon.gov.uk:31.25.189.168
- learningzone.cityoflondon.gov.uk:31.25.189.168
- learningzone.cityoflondon.gov.uk:31.25.189.168
- librarycatalogue.cityoflondon.gov.uk:217.169.37.149
- librarycatalogue.cityoflondon.gov.uk:217.169.37.149
- librarycatalogue.cityoflondon.gov.uk:217.169.37.149
- librarycatalogue.cityoflondon.gov.uk:217.169.37.149
- lovethesquaremile.cityoflondon.gov.uk:51.140.85.106
- lovethesquaremile.cityoflondon.gov.uk:51.140.85.106
- lovethesquaremile.cityoflondon.gov.uk:51.140.85.106
- lovethesquaremile.cityoflondon.gov.uk:51.140.85.106
- lovethesquaremile.cityoflondon.gov.uk:51.140.85.106
- lovethesquaremile.cityoflondon.gov.uk:51.140.85.106
- mail.consult.cityoflondon.gov.uk:
- mail1.cityoflondon.gov.uk:80.169.89.80
- mail1.cityoflondon.gov.uk:80.169.89.80
- mail2.cityoflondon.gov.uk:80.169.89.106
- mail2.cityoflondon.gov.uk:80.169.89.106
- mapping.cityoflondon.gov.uk:195.171.176.88
- mapping.cityoflondon.gov.uk:195.171.176.88
- mapping.cityoflondon.gov.uk:195.171.176.88
- mapping.cityoflondon.gov.uk:195.171.176.88
- mobile.cityoflondon.gov.uk:80.169.89.102
- mobile.cityoflondon.gov.uk:80.169.89.102
- mobile.cityoflondon.gov.uk:80.169.89.102
- mobile01.cityoflondon.gov.uk:195.20.223.213
- mobile01.cityoflondon.gov.uk:195.20.223.213
- news.cityoflondon.gov.uk:52.50.147.113, 52.31.6.52, 18.203.123.9
- news.cityoflondon.gov.uk:18.203.123.9, 52.31.6.52, 52.50.147.113
- news.cityoflondon.gov.uk:52.50.147.113, 18.203.123.9, 52.31.6.52
- news.cityoflondon.gov.uk:18.203.123.9, 52.31.6.52, 52.50.147.113
- news.cityoflondon.gov.uk:52.50.147.113, 52.31.6.52, 18.203.123.9
- news.cityoflondon.gov.uk:52.50.147.113, 18.203.123.9, 52.31.6.52
- news.cityoflondon.gov.uk:52.31.6.52, 52.50.147.113, 18.203.123.9
- onlinecatalogue.cityoflondon.gov.uk:104.22.15.166, 104.22.14.166
- onlinecatalogue.cityoflondon.gov.uk:104.22.14.166, 104.22.15.166
- onlinecatalogue.cityoflondon.gov.uk:104.22.15.166, 104.22.14.166
- pcn.cityoflondon.gov.uk:104.22.15.166, 104.22.14.166
- pcn.cityoflondon.gov.uk:104.22.14.166, 104.22.15.166
- pcn.cityoflondon.gov.uk:104.22.15.166, 104.22.14.166
- pcn.cityoflondon.gov.uk:104.22.14.166, 104.22.15.166
- pcn.cityoflondon.gov.uk:104.22.15.166, 104.22.14.166
- pcn.cityoflondon.gov.uk:104.22.14.166, 104.22.15.166
- pcn.cityoflondon.gov.uk:104.22.15.166, 104.22.14.166
- pcn.cityoflondon.gov.uk:104.22.14.166, 104.22.15.166
- pcn.cityoflondon.gov.uk:104.22.15.166, 104.22.14.166
- planning2.cityoflondon.gov.uk:
- planning2.cityoflondon.gov.uk:
- planninguat.cityoflondon.gov.uk:
- production.cityoflondon.gov.uk:104.22.15.166, 104.22.14.166
- remote.cityoflondon.gov.uk:52.59.241.213
- remote.cityoflondon.gov.uk:52.59.241.213
- remote.cityoflondon.gov.uk:52.59.241.213
- remote.cityoflondon.gov.uk:52.59.241.213
- remotedr.cityoflondon.gov.uk:
- revenues.cityoflondon.gov.uk:104.22.14.166, 104.22.15.166
- revenues.cityoflondon.gov.uk:104.22.14.166, 104.22.15.166
- revenues.cityoflondon.gov.uk:104.22.15.166, 104.22.14.166
- revenues.cityoflondon.gov.uk:104.22.14.166, 104.22.15.166
- semocracy.cityoflondon.gov.uk:
- shop.cityoflondon.gov.uk:23.227.38.32
- shop.cityoflondon.gov.uk:23.227.38.32
- shop.cityoflondon.gov.uk:23.227.38.32
- shop.cityoflondon.gov.uk:23.227.38.32
- sip.cityoflondon.gov.uk:52.113.64.147
- sip.cityoflondon.gov.uk:52.113.64.147
- sni.cloudflaressl.com:104.22.62.243, 104.22.63.243
- sp2.cityoflondon.gov.uk:
- sp2.cityoflondon.gov.uk:
- sts.cityoflondon.gov.uk:80.169.89.84, 80.169.89.100
- sts.cityoflondon.gov.uk:80.169.89.100, 80.169.89.84
- tokenbookslma.cityoflondon.gov.uk:
- townclerk.cityoflondon.gov.uk:
- u00careers.cityoflondon.gov.uk:
- u00email.cityoflondon.gov.uk:
- u00news.cityoflondon.gov.uk:
- u00www.cityoflondon.gov.uk:
- wholesalemarkets.cityoflondon.gov.uk:134.213.214.65
- wholesalemarkets.cityoflondon.gov.uk:134.213.214.65
- wholesalemarkets.cityoflondon.gov.uk:134.213.214.65
- wholesalemarkets.cityoflondon.gov.uk:134.213.214.65
- ws1.cityoflondon.gov.uk:
- www.careers.cityoflondon.gov.uk:
- www.careers.cityoflondon.gov.uk:
- www.cityoflondon.gov.uk:80.169.89.102
- www.cityoflondon.gov.uk:80.169.89.102
- www.cityoflondon.gov.uk:80.169.89.102
- www.cityoflondon.gov.uk:80.169.89.102
- www.cityoflondon.gov.uk:80.169.89.102
- www.cityoflondon.gov.uk:80.169.89.102
- www.cityoflondon.gov.uk:80.169.89.102
- www.cityoflondon.gov.uk:80.169.89.102
- www.cityoflondon.gov.uk:80.169.89.102
- www.cityoflondon.gov.uk:80.169.89.102
- www.cityoflondon.gov.uk:80.169.89.102
- www.cityoflondon.gov.uk:80.169.89.102
- www.cityoflondon.gov.uk:80.169.89.102
- www.collage.cityoflondon.gov.uk:
- www.collage.cityoflondon.gov.uk:
- www.consult.cityoflondon.gov.uk:31.25.189.114
- www.consult.cityoflondon.gov.uk:31.25.189.114
- www.consult.cityoflondon.gov.uk:31.25.189.114
- www.democracy.cityoflondon.gov.uk:
- www.elearning.cityoflondon.gov.uk:
- www.fyi.cityoflondon.gov.uk:193.34.187.147
- www.fyi.cityoflondon.gov.uk:193.34.187.147
- www.fyi.cityoflondon.gov.uk:193.34.187.147
- www.fyi.cityoflondon.gov.uk:193.34.187.147
- www.fyi.cityoflondon.gov.uk:193.34.187.147
- www.fyi.cityoflondon.gov.uk:193.34.187.147
- www.guildhall.cityoflondon.gov.uk:176.32.230.9
- www.guildhall.cityoflondon.gov.uk:176.32.230.9
- www.guildhall.cityoflondon.gov.uk:176.32.230.9
- www.guildhall.cityoflondon.gov.uk:176.32.230.9
- www.guildhall.cityoflondon.gov.uk:176.32.230.9
- www.guildhall.cityoflondon.gov.uk:176.32.230.9
- www.guildhall.cityoflondon.gov.uk:176.32.230.9
- www.guildhall.cityoflondon.gov.uk:176.32.230.9
- www.guildhallartgallery.cityoflondon.gov.uk:80.169.89.101
- www.guildhallartgallery.cityoflondon.gov.uk:80.169.89.101
- www.guildhallartgallery.cityoflondon.gov.uk:80.169.89.101
- www.guildhallartgallery.cityoflondon.gov.uk:80.169.89.101
- www.housingselfservice.cityoflondon.gov.uk:
- www.keatshouse.cityoflondon.gov.uk:
- www.keatshouse.cityoflondon.gov.uk:
- www.keatshouse.cityoflondon.gov.uk:
- www.keatshouse.cityoflondon.gov.uk:
- www.learningzone.cityoflondon.gov.uk:
- www.learningzone.cityoflondon.gov.uk:
- www.learningzone.cityoflondon.gov.uk:
- www.learningzone.cityoflondon.gov.uk:
- www.learningzone.cityoflondon.gov.uk:
- www.mapping.cityoflondon.gov.uk:195.171.176.88
- www.mapping.cityoflondon.gov.uk:195.171.176.88
- www.mapping.cityoflondon.gov.uk:195.171.176.88
- www.mapping.cityoflondon.gov.uk:195.171.176.88
- www.mapping.cityoflondon.gov.uk:195.171.176.88
- www.mapping.cityoflondon.gov.uk:195.171.176.88
- www.mapping.cityoflondon.gov.uk:195.171.176.88
- www.mapping2.cityoflondon.gov.uk:195.171.176.90
- www.mapping2.cityoflondon.gov.uk:195.171.176.90
- www.mapping2.cityoflondon.gov.uk:195.171.176.90
- www.mapping2.cityoflondon.gov.uk:195.171.176.90
- www.mapping2.cityoflondon.gov.uk:195.171.176.90
- www.planning.cityoflondon.gov.uk:85.92.209.141
- www.planning.cityoflondon.gov.uk:85.92.209.141
- www.planning.cityoflondon.gov.uk:85.92.209.141
- www.planning.cityoflondon.gov.uk:85.92.209.141
- www.planning2.cityoflondon.gov.uk:195.171.176.91
- www.planning2.cityoflondon.gov.uk:195.171.176.91
- www.planning2.cityoflondon.gov.uk:195.171.176.91
- www.planning2.cityoflondon.gov.uk:195.171.176.91
- www.planning2.cityoflondon.gov.uk:195.171.176.91
- www.planning2.cityoflondon.gov.uk:195.171.176.91
- www.remote.cityoflondon.gov.uk:
- www.remote.cityoflondon.gov.uk:
- www.tokenbookslma.cityoflondon.gov.uk:141.211.54.243
- www.tokenbookslma.cityoflondon.gov.uk:141.211.54.243
- www.tokenbookslma.cityoflondon.gov.uk:141.211.54.243
- www1.cityoflondon.gov.uk:80.169.89.96
- www1.cityoflondon.gov.uk:80.169.89.96
- www1.cityoflondon.gov.uk:80.169.89.96
- www1.cityoflondon.gov.uk:80.169.89.96
- www1.cityoflondon.gov.uk:80.169.89.96
- www2.cityoflondon.gov.uk:80.169.89.98
- wwwstage.cityoflondon.gov.uk:104.22.14.166, 104.22.15.166
- wwwstage.cityoflondon.gov.uk:104.22.14.166, 104.22.15.166
- wwwstage.cityoflondon.gov.uk:104.22.15.166, 104.22.14.166
- wwwstage.cityoflondon.gov.uk:104.22.14.166, 104.22.15.166
- xemocracy.cityoflondon.gov.uk:
- [*] Trello URLs found: 18
- --------------------
- https://trello.com/b/0vrqonpj/sgammaxis-pipeline
- https://trello.com/b/1x85hecb/blog
- https://trello.com/b/4hbytqj9/golondoninfo
- https://trello.com/b/faxhwzze/uk-acts-of-parliament
- https://trello.com/b/kmzaxwqy/space-time-mobile-self-storage
- https://trello.com/b/ktkni9yj/admin-team
- https://trello.com/b/lebr3heu/uk-acts-of-parliament
- https://trello.com/b/o00atmzs/dc-quests
- https://trello.com/b/pgi2qqb4/uk-medical-qualification-course
- https://trello.com/b/pgsrsaoy/bonnie
- https://trello.com/b/stn2unnu/uk-gala-dinners
- https://trello.com/b/vbodrljf/greater-london-authority
- https://trello.com/b/ykbjj7r5/united-kingdom-business-registrations
- https://trello.com/c/glbmw15b/8-london-metropolitan-archives
- https://trello.com/c/hpc4lmfp/12-london-metropolitan-archives
- https://trello.com/c/p6ouwi3m/96-capital-city-of-london-england-united-kingdom-1807
- https://trello.com/c/wti5v4cm/211-concert-in-the-trees-friday-18th
- https://trello.com/c/xjyg0uca/22-add-save-for-later-function-to-website
- ################################################################################################################################
- AVAILABLE PLUGINS
- -----------------
- HttpHeadersPlugin
- CertificateInfoPlugin
- HeartbleedPlugin
- RobotPlugin
- EarlyDataPlugin
- OpenSslCipherSuitesPlugin
- OpenSslCcsInjectionPlugin
- SessionResumptionPlugin
- SessionRenegotiationPlugin
- CompressionPlugin
- FallbackScsvPlugin
- CHECKING HOST(S) AVAILABILITY
- -----------------------------
- 80.169.89.102:443 => 80.169.89.102
- SCAN RESULTS FOR 80.169.89.102:443 - 80.169.89.102
- --------------------------------------------------
- * Downgrade Attacks:
- TLS_FALLBACK_SCSV: OK - Supported
- * SSLV2 Cipher Suites:
- Server rejected all cipher suites.
- * Deflate Compression:
- OK - Compression disabled
- * TLSV1_3 Cipher Suites:
- Server rejected all cipher suites.
- * Certificate Information:
- Content
- SHA1 Fingerprint: 414c9a2ce74fb30a5c45a40d2288a04393d74d99
- Common Name: *.cityoflondon.gov.uk
- Issuer: Entrust Certification Authority - L1K
- Serial Number: 42593082139691491010162019823312957291
- Not Before: 2019-01-09 10:15:04
- Not After: 2021-01-09 10:45:03
- Signature Algorithm: sha256
- Public Key Algorithm: RSA
- Key Size: 2048
- Exponent: 65537 (0x10001)
- DNS Subject Alternative Names: ['*.cityoflondon.gov.uk', 'cityoflondon.gov.uk']
- Trust
- Hostname Validation: FAILED - Certificate does NOT match 80.169.89.102
- Android CA Store (9.0.0_r9): OK - Certificate is trusted
- Apple CA Store (iOS 12, macOS 10.14, watchOS 5, and tvOS 12):OK - Certificate is trusted
- Java CA Store (jdk-12.0.1): OK - Certificate is trusted
- Mozilla CA Store (2019-03-14): OK - Certificate is trusted
- Windows CA Store (2019-05-27): OK - Certificate is trusted
- Symantec 2018 Deprecation: WARNING: Certificate distrusted by Google and Mozilla on September 2018
- Received Chain: *.cityoflondon.gov.uk --> Entrust Certification Authority - L1K --> Entrust Root Certification Authority - G2
- Verified Chain: *.cityoflondon.gov.uk --> Entrust Certification Authority - L1K --> Entrust Root Certification Authority - G2
- Received Chain Contains Anchor: WARNING - Received certificate chain contains the anchor certificate
- Received Chain Order: OK - Order is valid
- Verified Chain contains SHA1: OK - No SHA1-signed certificate in the verified certificate chain
- Extensions
- OCSP Must-Staple: NOT SUPPORTED - Extension not found
- Certificate Transparency: OK - 4 SCTs included
- OCSP Stapling
- NOT SUPPORTED - Server did not send back an OCSP response
- * TLSV1_1 Cipher Suites:
- Server rejected all cipher suites.
- * OpenSSL CCS Injection:
- OK - Not vulnerable to OpenSSL CCS injection
- * OpenSSL Heartbleed:
- OK - Not vulnerable to Heartbleed
- * TLSV1 Cipher Suites:
- Server rejected all cipher suites.
- * TLS 1.2 Session Resumption Support:
- With Session IDs: OK - Supported (5 successful, 0 failed, 0 errors, 5 total attempts).
- With TLS Tickets: NOT SUPPORTED - TLS ticket not assigned.
- * Session Renegotiation:
- Client-initiated Renegotiation: VULNERABLE - Server honors client-initiated renegotiations
- Secure Renegotiation: OK - Supported
- * TLSV1_2 Cipher Suites:
- Forward Secrecy OK - Supported
- RC4 OK - Not Supported
- Preferred:
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 302 Redirect - https://80.169.89.102/Pages/default.aspx
- Accepted:
- TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 302 Redirect - https://80.169.89.102/Pages/default.aspx
- TLS_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 302 Redirect - https://80.169.89.102/Pages/default.aspx
- TLS_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 302 Redirect - https://80.169.89.102/Pages/default.aspx
- TLS_RSA_WITH_AES_256_CBC_SHA256 256 bits HTTP 302 Redirect - https://80.169.89.102/Pages/default.aspx
- TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 302 Redirect - https://80.169.89.102/Pages/default.aspx
- TLS_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 302 Redirect - https://80.169.89.102/Pages/default.aspx
- TLS_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 302 Redirect - https://80.169.89.102/Pages/default.aspx
- TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 302 Redirect - https://80.169.89.102/Pages/default.aspx
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 302 Redirect - https://80.169.89.102/Pages/default.aspx
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 256 bits HTTP 302 Redirect - https://80.169.89.102/Pages/default.aspx
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 302 Redirect - https://80.169.89.102/Pages/default.aspx
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 302 Redirect - https://80.169.89.102/Pages/default.aspx
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 302 Redirect - https://80.169.89.102/Pages/default.aspx
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 302 Redirect - https://80.169.89.102/Pages/default.aspx
- * SSLV3 Cipher Suites:
- Server rejected all cipher suites.
- * ROBOT Attack:
- OK - Not vulnerable
- SCAN COMPLETED IN 24.98 S
- -------------------------
- ################################################################################################################################
- [+] Target : https://www.cityoflondon.gov.uk
- [+] IP Address : 80.169.89.102
- [+] Headers :
- [+] Cache-Control : private
- [+] Content-Type : text/html; charset=utf-8
- [+] Content-Encoding : gzip
- [+] Expires : Tue, 31 Mar 2020 04:21:08 GMT
- [+] Vary : Accept-Encoding
- [+] Server : Microsoft-IIS/7.5
- [+] SPRequestGuid : 377e7433-aca1-409f-97ec-c413b79efbd9
- [+] X-SharePointHealthScore : 0
- [+] X-AspNet-Version : 2.0.50727
- [+] X-Powered-By : ASP.NET
- [+] MicrosoftSharePointTeamServices : 14.0.0.7239
- [+] X-MS-InvokeApp : 1; RequireReadOnly
- [+] Date : Tue, 31 Mar 2020 04:19:00 GMT
- [+] Content-Length : 8648
- [!] SSL Certificate Information :
- [+] countryName : GB
- [+] localityName : London
- [+] organizationName : City of London Corporation
- [+] commonName : *.cityoflondon.gov.uk
- [+] countryName : US
- [+] organizationName : Entrust, Inc.
- [+] organizationalUnitName : (c) 2012 Entrust, Inc. - for authorized use only
- [+] commonName : Entrust Certification Authority - L1K
- [+] version : 3
- [+] serialNumber : 200B2115536F6E220000000050EBEF6B
- [+] notBefore : Jan 9 10:15:04 2019 GMT
- [+] notAfter : Jan 9 10:45:03 2021 GMT
- [+] OCSP : http://ocsp.entrust.net
- [+] caIssuers : http://aia.entrust.net/l1k-chain256.cer
- [+] crlDistributionPoints : http://crl.entrust.net/level1k.crl
- [!] Whois Lookup :
- [+] asn_registry : ripencc
- [+] asn : 8220
- [+] asn_cidr : 80.169.0.0/16
- [+] asn_country_code : GB
- [+] asn_date : 2003-03-28
- [+] query : 80.169.89.102
- [+] cidr : 80.169.89.96/28
- [+] name : NET-GB-AGILISYS-LTD
- [+] handle : DR6199-RIPE
- [+] range : 80.169.89.96 - 80.169.89.111
- [+] description : AGILISYS LTD
- [+] country : GB
- [+] address : AGILISYS UNIT 13 VOLT AVENUE LONDON NW106PN United Kingdom
- [+] created : 2015-02-19T14:42:23Z
- [+] updated : 2015-02-19T14:42:23Z
- [+] cidr : 80.169.0.0/16
- [+] range : 80.169.0.0/16
- [+] description : COLT
- [+] emails : ['abuse@colt.net']
- [+] created : 2003-04-01T12:11:15Z
- [+] updated : 2012-02-10T14:30:48Z
- [!] Starting DNS Enumeration...
- [+] cityoflondon.gov.uk. 1799 IN SOA jake.ns.cloudflare.com. dns.cloudflare.com. 2033627693 10000 2400 604800 3600
- [+] cityoflondon.gov.uk. 299 IN MX 1 cityoflondon-gov-uk.mail.protection.outlook.com.
- [+] cityoflondon.gov.uk. 3788 IN HINFO 075246433834383200
- [+] cityoflondon.gov.uk. 21599 IN NS jake.ns.cloudflare.com.
- [+] cityoflondon.gov.uk. 299 IN A 80.169.89.102
- [+] cityoflondon.gov.uk. 119 IN TXT "v=spf1 ip4:23.227.38.64/32 include:sp2.cityoflondon.gov.uk include:spf.protection.outlook.com include:mailcontrol.com include:servers.mcsv.net include:customers.clickdimensions.com -all"
- [+] cityoflondon.gov.uk. 119 IN TXT "MS=ms45080239"
- [+] cityoflondon.gov.uk. 119 IN TXT "v=msv1t=0F2DCBB1-D8B0-4698-9721-6B2B48AA12AD"
- [+] cityoflondon.gov.uk. 21599 IN NS treasure.ns.cloudflare.com.
- [+] cityoflondon.gov.uk. 119 IN TXT "Z6qxeDy0jOHWN2UQVDa4jnTnX9tNBG4nZ3TSEegiBUyI1p353x11ce/W4sgbxFySXXUlc2QmY8itoEXnTR0kKw=="
- [+] _dmarc.cityoflondon.gov.uk. 3599 IN TXT "v=DMARC1;p=reject;sp=reject;pct=100;rua=mailto:dmarc-rua@dmarc.service.gov.uk"
- [!] Starting Sub-Domain Enumeration...
- [!] Requesting BuffOver
- [!] Requesting ThreadCrowd
- [!] Requesting crt.sh
- [!] Requesting AnubisDB
- [!] Requesting ThreatMiner
- [+] Results :
- [+] shop.cityoflondon.gov.uk
- [+] cs-cityoflondon.delib.net
- [+] 31.25.189.114
- [+] email.cityoflondon.gov.uk
- [+] hybrid.cityoflondon.gov.uk
- [+] 195.20.223.214
- [+] sts.cityoflondon.gov.uk
- [+] 91.206.118.10
- [+] *.Mapping.CityofLondon.gov.uk
- [+] remotedr.cityoflondon.gov.uk
- [+] www.housingselfservice.cityoflondon.gov.uk
- [+] 77.104.134.194
- [+] www.cityoflondon.gov.uk
- [+] www.consult.cityoflondon.gov.uk
- [+] 195.171.176.88
- [+] www1.cityoflondon.gov.uk
- [+] highwaysreporting.cityoflondon.gov.uk
- [+] www.elearning.cityoflondon.gov.uk
- [+] fyi.cityoflondon.gov.uk
- [+] cwidr.cityoflondon.gov.uk
- [+] mail1.cityoflondon.gov.uk
- [+] Mapping.CityofLondon.gov.uk
- [+] Hyms.cityoflondon.gov.uk
- [+] lovethesquaremile.cityoflondon.gov.uk
- [+] democracy.cityoflondon.gov.uk
- [+] collage.cityoflondon.gov.uk
- [+] dwp-cis.cityoflondon.gov.uk
- [+] www.fyi.cityoflondon.gov.uk
- [+] www.planninguat.cityoflondon.gov.uk
- [+] learningzone.cityoflondon.gov.uk
- [+] www.learningzone.cityoflondon.gov.uk
- [+] keatshouse.cityoflondon.gov.uk
- [+] 80.169.89.96
- [+] Mobile01.cityoflondon.gov.uk
- [+] sipdir.online.lync.com
- [+] sip.cityoflondon.gov.uk
- [+] jobs.cityoflondon.gov.uk
- [+] Mobile01.Cityoflondon.gov.uk
- [+] mail.consult.cityoflondon.gov.uk
- [+] elearning.cityoflondon.gov.uk
- [+] onlinecatalogue.cityoflondon.gov.uk
- [+] 195.171.176.87
- [+] remote.cityoflondon.gov.uk
- [+] www.remote.cityoflondon.gov.uk
- [+] capitacloud.cityoflondon.gov.uk
- [+] www.planning2.cityoflondon.gov.uk
- [+] 104.22.14.166
- [+] 23.227.38.32
- [+] townclerk.cityoflondon.gov.uk
- [+] 104.22.15.166
- [+] 195.171.176.90
- [+] citybenefits.cityoflondon.gov.uk
- [+] mobile.cityoflondon.gov.uk
- [+] www.collage.cityoflondon.gov.uk
- [+] www.careers.cityoflondon.gov.uk
- [+] mobile01.cityoflondon.gov.uk
- [+] biztalk.cityoflondon.gov.uk
- [+] www.mapping2.cityoflondon.gov.uk
- [+] capitacloud2.cityoflondon.gov.uk
- [+] fypsd.cityoflondon.gov.uk
- [+] cityoflondon.beyondtrustcloud.com
- [+] news.cityoflondon.gov.uk
- [+] wwwstage.cityoflondon.gov.uk
- [+] cwi.cityoflondon.gov.uk
- [+] lma.ibase.media
- [+] 176.32.230.9
- [+] 146.177.9.125
- [+] 217.169.37.149
- [+] www.mapping.cityoflondon.gov.uk
- [+] www.guildhallartgallery.cityoflondon.gov.uk
- [+] collage-researcher.cityoflondon.gov.uk
- [+] ldfconsultation.cityoflondon.gov.uk
- [+] www.guildhall.cityoflondon.gov.uk
- [+] CityBenefits.cityoflondon.gov.uk
- [+] housingselfservice.cityoflondon.gov.uk
- [+] 195.12.22.232
- [+] mail2.cityoflondon.gov.uk
- [+] www.planning.cityoflondon.gov.uk
- [+] 80.169.89.97
- [+] 134.213.36.31
- [+] *.cityoflondon.gov.uk
- [+] planninguat.cityoflondon.gov.uk
- [+] 80.169.89.106
- [+] contracts.cityoflondon.gov.uk
- [+] edge.cityoflondon.gov.uk
- [+] 80.169.89.102
- [+] ext.cityoflondon.gov.uk
- [+] consult.cityoflondon.gov.uk
- [+] revenues.cityoflondon.gov.uk
- [+] 80.169.89.80
- [+] pcn.cityoflondon.gov.uk
- [+] 31.25.189.168
- [+] planning2.cityoflondon.gov.uk
- [+] 195.20.223.213
- [+] fdonline.cityoflondon.gov.uk
- [+] www.keatshouse.cityoflondon.gov.uk
- [+] librarycatalogue.cityoflondon.gov.uk
- [+] 80.169.89.107
- [+] hyms.cityoflondon.gov.uk
- [+] 195.171.176.91
- [+] www.tokenbookslma.cityoflondon.gov.uk
- [+] mapping.cityoflondon.gov.uk
- [+] eyp.cityoflondon.gov.uk
- [+] careers.cityoflondon.gov.uk
- [+] 80.169.89.101
- [+] wholesalemarkets.cityoflondon.gov.uk
- [+] Total Found : 106
- [+] Port : 33434
- [+] Timeout : 1.0
- [!] Starting UDP Traceroute...
- HOPS IP HOST
- 1 10.203.9.1 _gateway
- 2 45.131.5.3 Unknown
- 3 109.236.95.226 Unknown
- 4 109.236.95.108 Unknown
- 5 80.249.208.236 et-0-0-1-pr2.AMS.router.colt.net
- 6 212.74.75.37 Unknown
- 7 212.74.75.37 Unknown
- 8 80.169.196.38 cpeuk_lon002520.ia.colt.net
- 9 195.110.81.4 Unknown
- 10 * * *
- 11 * * *
- 12 * * *
- 13 * * *
- 14 * * *
- 15 * * *
- 16 * * *
- 17 * * *
- 18 * * *
- 19 * * *
- 20 * * *
- 21 * * *
- 22 * * *
- 23 * * *
- 24 * * *
- 25 * * *
- 26 * * *
- 27 * * *
- 28 * * *
- 29 * * *
- 30 * * *
- [!] Starting Port Scan...
- [+] Testing Top 1000 Ports...
- [!] Starting Crawler...
- [+] Looking for robots.txt........[ Not Found ]
- [+] Looking for sitemap.xml.......[ Found ]
- [+] Extracting sitemap Links......[ 2664 ]
- [+] Extracting CSS Links..........[ 2 ]
- [+] Extracting Javascript Links...[ 2 ]
- [+] Extracting Internal Links.....[ 6 ]
- [+] Extracting External Links.....[ 3 ]
- [+] Extracting Images.............[ 13 ]
- [+] Crawling Sitemaps.............[ 0 ]
- [+] Crawling Javascripts..........[ 0 ]
- [+] Total Unique Links Extracted : 2690
- [!] Starting Directory Search...
- [+] Threads : 50
- [+] Timeout : 10.0
- [+] Wordlist : wordlists/dirb_common.txt
- [+] Allow Redirects : False
- [+] SSL Verification : True
- [+] DNS Servers : 1.1.1.1
- [+] 302 | https://www.cityoflondon.gov.uk/
- [+] 301 | https://www.cityoflondon.gov.uk/_layouts
- [+] 301 | https://www.cityoflondon.gov.uk/_vti_bin
- [+] 200 | https://www.cityoflondon.gov.uk/_vti_bin/_vti_adm/admin.dll
- [+] 200 | https://www.cityoflondon.gov.uk/_vti_bin/_vti_aut/author.dll
- [+] 200 | https://www.cityoflondon.gov.uk/_vti_bin/shtml.dll
- [+] 301 | https://www.cityoflondon.gov.uk/_vti_pvt
- [+] 301 | https://www.cityoflondon.gov.uk/apply
- [+] 301 | https://www.cityoflondon.gov.uk/asia
- [+] 403 | https://www.cityoflondon.gov.uk/aspnet_client
- [+] 301 | https://www.cityoflondon.gov.uk/basket
- [+] 302 | https://www.cityoflondon.gov.uk/business
- [+] 302 | https://www.cityoflondon.gov.uk/Business
- [+] 301 | https://www.cityoflondon.gov.uk/ccs
- [+] 301 | https://www.cityoflondon.gov.uk/china
- [+] 301 | https://www.cityoflondon.gov.uk/contact
- [+] 301 | https://www.cityoflondon.gov.uk/Contact
- [+] 302 | https://www.cityoflondon.gov.uk/contact-us
- [+] 302 | https://www.cityoflondon.gov.uk/documents
- [+] 301 | https://www.cityoflondon.gov.uk/education
- [+] 301 | https://www.cityoflondon.gov.uk/Education
- [+] 301 | https://www.cityoflondon.gov.uk/emailtemplates
- [+] 301 | https://www.cityoflondon.gov.uk/error
- [+] 302 | https://www.cityoflondon.gov.uk/events
- [+] 302 | https://www.cityoflondon.gov.uk/Events
- [+] 301 | https://www.cityoflondon.gov.uk/extranet
- [+] 301 | https://www.cityoflondon.gov.uk/Extranet
- [+] 301 | https://www.cityoflondon.gov.uk/feedback
- [+] 301 | https://www.cityoflondon.gov.uk/finance
- [+] 301 | https://www.cityoflondon.gov.uk/ftp
- [+] 302 | https://www.cityoflondon.gov.uk/jobs
- [+] 301 | https://www.cityoflondon.gov.uk/libraries
- [+] 301 | https://www.cityoflondon.gov.uk/licensing
- [+] 301 | https://www.cityoflondon.gov.uk/mailinglist
- [+] 302 | https://www.cityoflondon.gov.uk/maps
- [+] 301 | https://www.cityoflondon.gov.uk/markets
- [+] 302 | https://www.cityoflondon.gov.uk/newsroom
- [+] 301 | https://www.cityoflondon.gov.uk/order
- [+] 302 | https://www.cityoflondon.gov.uk/pages
- [+] 302 | https://www.cityoflondon.gov.uk/Pages
- [+] 301 | https://www.cityoflondon.gov.uk/power
- [+] 301 | https://www.cityoflondon.gov.uk/privacy
- [+] 301 | https://www.cityoflondon.gov.uk/Privacy
- [+] 301 | https://www.cityoflondon.gov.uk/procurement
- [+] 301 | https://www.cityoflondon.gov.uk/publications
- [+] 301 | https://www.cityoflondon.gov.uk/Publications
- [+] 302 | https://www.cityoflondon.gov.uk/reports%20list
- [+] 301 | https://www.cityoflondon.gov.uk/research
- [+] 301 | https://www.cityoflondon.gov.uk/Research
- [+] 301 | https://www.cityoflondon.gov.uk/resource
- [+] 302 | https://www.cityoflondon.gov.uk/reusablecontent
- [+] 302 | https://www.cityoflondon.gov.uk/search
- [+] 302 | https://www.cityoflondon.gov.uk/Search
- [+] 302 | https://www.cityoflondon.gov.uk/services
- [+] 302 | https://www.cityoflondon.gov.uk/Services
- [+] 301 | https://www.cityoflondon.gov.uk/shop
- [+] 301 | https://www.cityoflondon.gov.uk/shop_closed
- [+] 301 | https://www.cityoflondon.gov.uk/shop_content
- [+] 301 | https://www.cityoflondon.gov.uk/shopadmin
- [+] 301 | https://www.cityoflondon.gov.uk/shopper
- [+] 301 | https://www.cityoflondon.gov.uk/shopping
- [+] 301 | https://www.cityoflondon.gov.uk/shopping_cart
- [+] 301 | https://www.cityoflondon.gov.uk/shoppingcart
- [+] 301 | https://www.cityoflondon.gov.uk/shopping-lists
- [+] 301 | https://www.cityoflondon.gov.uk/shops
- [+] 301 | https://www.cityoflondon.gov.uk/shops_buyaction
- [+] 301 | https://www.cityoflondon.gov.uk/shopstat
- [+] 301 | https://www.cityoflondon.gov.uk/shopsys
- [+] 200 | https://www.cityoflondon.gov.uk/sitemap.xml
- [+] 301 | https://www.cityoflondon.gov.uk/social
- [+] 301 | https://www.cityoflondon.gov.uk/sport
- [+] 301 | https://www.cityoflondon.gov.uk/thankyou
- [+] 302 | https://www.cityoflondon.gov.uk/training
- [+] 301 | https://www.cityoflondon.gov.uk/transport
- [+] 301 | https://www.cityoflondon.gov.uk/wifi
- [+] 302 | https://www.cityoflondon.gov.uk/workflowtasks
- [+] Directories Found : 76
- [+] Directories Skipped : 4538
- [+] Total Requests : 4614
- [+] Completed in 0:03:30.605832
- ################################################################################################################################
- *] Processing domain cityoflondon.gov.uk
- [*] Using system resolvers ['10.101.0.243', '192.168.0.1', '2001:18c0:121:6900:724f:b8ff:fefd:5b6a']
- [+] Getting nameservers
- 173.245.59.122 - jake.ns.cloudflare.com
- 162.159.38.116 - treasure.ns.cloudflare.com
- [-] Zone transfer failed
- [+] TXT records found
- "MS=ms45080239"
- "v=msv1t=0F2DCBB1-D8B0-4698-9721-6B2B48AA12AD"
- "v=spf1 ip4:23.227.38.64/32 include:sp2.cityoflondon.gov.uk include:spf.protection.outlook.com include:mailcontrol.com include:servers.mcsv.net include:customers.clickdimensions.com -all"
- "Z6qxeDy0jOHWN2UQVDa4jnTnX9tNBG4nZ3TSEegiBUyI1p353x11ce/W4sgbxFySXXUlc2QmY8itoEXnTR0kKw=="
- [+] DMARC records found
- "v=DMARC1;p=reject;sp=reject;pct=100;rua=mailto:dmarc-rua@dmarc.service.gov.uk"
- [+] MX records found, added to target list
- 1 cityoflondon-gov-uk.mail.protection.outlook.com.
- [*] Scanning cityoflondon.gov.uk for A records
- 80.169.89.102 - cityoflondon.gov.uk
- 80.169.89.106 - apps.cityoflondon.gov.uk
- 40.101.81.152 - autodiscover.cityoflondon.gov.uk
- 40.101.12.72 - autodiscover.cityoflondon.gov.uk
- 40.101.12.136 - autodiscover.cityoflondon.gov.uk
- 52.97.155.120 - autodiscover.cityoflondon.gov.uk
- 52.97.135.120 - autodiscover.cityoflondon.gov.uk
- 40.101.18.248 - autodiscover.cityoflondon.gov.uk
- 52.97.158.168 - autodiscover.cityoflondon.gov.uk
- 40.101.121.24 - autodiscover.cityoflondon.gov.uk
- 77.104.134.194 - careers.cityoflondon.gov.uk
- 80.169.89.102 - cn.cityoflondon.gov.uk
- 80.169.89.101 - demo.cityoflondon.gov.uk
- 91.206.118.10 - email.cityoflondon.gov.uk
- 146.177.9.125 - elearning.cityoflondon.gov.uk
- 217.154.230.198 - forms.cityoflondon.gov.uk
- 104.22.14.166 - jobs.cityoflondon.gov.uk
- 104.22.15.166 - jobs.cityoflondon.gov.uk
- 52.113.64.150 - lyncdiscover.cityoflondon.gov.uk
- 80.169.89.82 - m.cityoflondon.gov.uk
- 80.169.89.80 - mail1.cityoflondon.gov.uk
- 80.169.89.106 - mail2.cityoflondon.gov.uk
- 80.169.89.109 - mail3.cityoflondon.gov.uk
- 80.169.89.85 - mail4.cityoflondon.gov.uk
- 80.169.89.102 - mobile.cityoflondon.gov.uk
- 18.203.123.9 - news.cityoflondon.gov.uk
- 52.31.6.52 - news.cityoflondon.gov.uk
- 52.50.147.113 - news.cityoflondon.gov.uk
- 104.22.14.166 - payment.cityoflondon.gov.uk
- 104.22.15.166 - payment.cityoflondon.gov.uk
- 104.22.15.166 - press.cityoflondon.gov.uk
- 104.22.14.166 - press.cityoflondon.gov.uk
- 104.22.14.166 - production.cityoflondon.gov.uk
- 104.22.15.166 - production.cityoflondon.gov.uk
- 52.59.241.213 - remote.cityoflondon.gov.uk
- 23.227.38.32 - shop.cityoflondon.gov.uk
- 52.113.64.147 - sip.cityoflondon.gov.uk
- 104.22.15.166 - stage.cityoflondon.gov.uk
- 104.22.14.166 - stage.cityoflondon.gov.uk
- 104.22.14.166 - staging.cityoflondon.gov.uk
- 104.22.15.166 - staging.cityoflondon.gov.uk
- 86.54.176.2 - vpn.cityoflondon.gov.uk
- 80.169.89.102 - www.cityoflondon.gov.uk
- 80.169.89.96 - www1.cityoflondon.gov.uk
- 80.169.89.98 - www2.cityoflondon.gov.uk
- ################################################################################################################################
- [INFO] ------TARGET info------
- [*] TARGET: :https://www.cityoflondon.gov.uk/
- [*] TARGET IP: 80.169.89.102
- [INFO] NO load balancer detected for www.cityoflondon.gov.uk...
- [*] DNS servers: jake.ns.cloudflare.com.
- Microsoft-IIS/7.5 COL-VMW-M-LB02
- [*] CC: GB
- [*] Country: United Kingdom
- [*] RegionCode: ENG
- [*] RegionName: England
- [*] City: London
- [*] ASN: AS8220
- [*] BGP_PREFIX: 80.169.0.0/16
- [*] ISP: COLT COLT Technology Services Group Limited, GB
- [INFO] DNS enumeration:
- [*] jobs.cityoflondon.gov.uk 104.22.14.166 104.22.15.166
- [*] m.cityoflondon.gov.uk 80.169.89.82
- [*] mail2.cityoflondon.gov.uk 80.169.89.106
- [*] mobile.cityoflondon.gov.uk 80.169.89.102
- [*] news.cityoflondon.gov.uk ssl-client.presspage.com. 18.203.123.9 52.31.6.52 52.50.147.113
- [*] vpn.cityoflondon.gov.uk 86.54.176.2
- [*] www2.cityoflondon.gov.uk 80.169.89.98
- [INFO] Possible abuse mails are:
- [*] abuse@cityoflondon.gov.uk
- [*] abuse@colt.net
- [*] abuse@www.cityoflondon.gov.uk
- [INFO] NO PAC (Proxy Auto Configuration) file FOUND
- [INFO] Starting FUZZing in http://www.cityoflondon.gov.uk/FUzZzZzZzZz...
- [INFO] Status code Folders
- [ALERT] Look in the source code. It may contain passwords
- Accès impossible `file://localhost/opt/URLextractor/:https://www.cityoflondon.gov.uk/'
- Alerte ! : Impossible d’accéder au document.
- lynx : accès impossible au fichier de départ
- Recherche 80.169.89.102
- Connexion HTTP Ã 80.169.89.102
- Envoi de la requête HTTP.
- Requête HTTP envoyée. Attente de réponse.
- HTTP/1.1 301 Moved Permanently
- Transfert de données terminé
- HTTP/1.1 301 Moved Permanently
- Utilisation de https://80.169.89.102/
- Recherche 80.169.89.102
- Connexion HTTPS Ã 80.169.89.102
- lynx : accès impossible au fichier de départ http://80.169.89.102/
- [INFO] Links found from :https://www.cityoflondon.gov.uk/ http://80.169.89.102/:
- cut: intervalle de champ incorrecte
- Saisissez « cut --help » pour plus d'informations.
- [INFO] Shodan detected the following opened ports on 80.169.89.102:
- [*] 3
- [*] 4
- [*] 443
- [*] 5
- [*] 6
- [*] 8
- [*] 80
- [INFO] ------VirusTotal SECTION------
- [INFO] VirusTotal passive DNS only stores address records. The following domains resolved to the given IP address:
- [INFO] Latest URLs hosted in this IP address detected by at least one URL scanner or malicious URL dataset:
- [INFO] Latest files that are not detected by any antivirus solution and were downloaded by VirusTotal from the IP address provided:
- [INFO] ------Alexa Rank SECTION------
- [INFO] Percent of Visitors Rank in Country:
- [INFO] Percent of Search Traffic:
- [INFO] Percent of Unique Visits:
- [INFO] Total Sites Linking In:
- [*] Total Sites
- [INFO] Useful links related to www.cityoflondon.gov.uk - 80.169.89.102:
- [*] https://www.virustotal.com/pt/ip-address/80.169.89.102/information/
- [*] https://www.hybrid-analysis.com/search?host=80.169.89.102
- [*] https://www.shodan.io/host/80.169.89.102
- [*] https://www.senderbase.org/lookup/?search_string=80.169.89.102
- [*] https://www.alienvault.com/open-threat-exchange/ip/80.169.89.102
- [*] http://pastebin.com/search?q=80.169.89.102
- [*] http://urlquery.net/search.php?q=80.169.89.102
- [*] http://www.alexa.com/siteinfo/www.cityoflondon.gov.uk
- [*] http://www.google.com/safebrowsing/diagnostic?site=www.cityoflondon.gov.uk
- [*] https://censys.io/ipv4/80.169.89.102
- [*] https://www.abuseipdb.com/check/80.169.89.102
- [*] https://urlscan.io/search/#80.169.89.102
- [*] https://github.com/search?q=80.169.89.102&type=Code
- [INFO] Useful links related to AS8220 - 80.169.0.0/16:
- [*] http://www.google.com/safebrowsing/diagnostic?site=AS:8220
- [*] https://www.senderbase.org/lookup/?search_string=80.169.0.0/16
- [*] http://bgp.he.net/AS8220
- [*] https://stat.ripe.net/AS8220
- [INFO] Date: 31/03/20 | Time: 00:22:47
- [INFO] Total time: 0 minute(s) and 53 second(s)
- ###############################################################################################################################
- [*] Performing General Enumeration of Domain:cityoflondon.gov.uk
- [-] DNSSEC is not configured for cityoflondon.gov.uk
- [*] SOA jake.ns.cloudflare.com 173.245.59.122
- [*] NS jake.ns.cloudflare.com 173.245.59.122
- [*] Bind Version for 173.245.59.122 b'20171212'
- [*] NS jake.ns.cloudflare.com 2606:4700:58::adf5:3b7a
- [*] Bind Version for 2606:4700:58::adf5:3b7a b'20171212'
- [*] NS treasure.ns.cloudflare.com 162.159.38.116
- [*] Bind Version for 162.159.38.116 b'20171212'
- [*] NS treasure.ns.cloudflare.com 2606:4700:50::a29f:2674
- [*] Bind Version for 2606:4700:50::a29f:2674 b'20171212'
- [*] MX cityoflondon-gov-uk.mail.protection.outlook.com 104.47.21.36
- [*] MX cityoflondon-gov-uk.mail.protection.outlook.com 104.47.20.36
- [*] A cityoflondon.gov.uk 80.169.89.102
- [*] Enumerating SRV Records
- [*] SRV _sip._tls.cityoflondon.gov.uk sipdir.online.lync.com 52.113.64.147 443 1
- [*] SRV _sip._tls.cityoflondon.gov.uk sipdir.online.lync.com 2603:1047:0:2::b 443 1
- [*] SRV _sip._tls.cityoflondon.gov.uk sipdir.online.lync.com 2603:1047:0:1::b 443 1
- [*] SRV _sip._tls.cityoflondon.gov.uk sipdir.online.lync.com 2603:1047:0:5::b 443 1
- [*] SRV _sip._tls.cityoflondon.gov.uk sipdir.online.lync.com 2603:1047:0:8::f 443 1
- [*] SRV _sip._tls.cityoflondon.gov.uk sipdir.online.lync.com 2603:1047:0:9::f 443 1
- [*] SRV _sipfederationtls._tcp.cityoflondon.gov.uk sipfed.online.lync.com 52.113.64.147 5061 1
- [*] SRV _sipfederationtls._tcp.cityoflondon.gov.uk sipfed.online.lync.com 2603:1047:0:2::b 5061 1
- [*] SRV _autodiscover._tcp.cityoflondon.gov.uk autodiscover.outlook.com 40.101.83.24 443 1
- [*] SRV _autodiscover._tcp.cityoflondon.gov.uk autodiscover.outlook.com 40.101.12.72 443 1
- [*] SRV _autodiscover._tcp.cityoflondon.gov.uk autodiscover.outlook.com 40.101.12.40 443 1
- [*] SRV _autodiscover._tcp.cityoflondon.gov.uk autodiscover.outlook.com 40.101.80.200 443 1
- [*] SRV _autodiscover._tcp.cityoflondon.gov.uk autodiscover.outlook.com 52.97.158.168 443 1
- [*] SRV _autodiscover._tcp.cityoflondon.gov.uk autodiscover.outlook.com 40.101.121.8 443 1
- [*] SRV _autodiscover._tcp.cityoflondon.gov.uk autodiscover.outlook.com 40.101.81.152 443 1
- [*] SRV _autodiscover._tcp.cityoflondon.gov.uk autodiscover.outlook.com 40.101.18.232 443 1
- [*] SRV _autodiscover._tcp.cityoflondon.gov.uk autodiscover.outlook.com 2603:1026:206:7::8 443 1
- [*] SRV _autodiscover._tcp.cityoflondon.gov.uk autodiscover.outlook.com 2603:1026:200:8b::8 443 1
- [*] SRV _autodiscover._tcp.cityoflondon.gov.uk autodiscover.outlook.com 2603:1026:207:15::8 443 1
- [*] SRV _autodiscover._tcp.cityoflondon.gov.uk autodiscover.outlook.com 2603:1026:206:5::8 443 1
- [+] 20 Records Found
- ################################################################################################################################
- [+] Starting At 2020-03-31 00:23:55.291308
- [+] Collecting Information On: https://www.cityoflondon.gov.uk/
- [#] Status: 200
- --------------------------------------------------
- [#] Web Server Detected: Microsoft-IIS/7.5
- [#] X-Powered-By: ASP.NET
- [!] X-Frame-Options Headers not detect! target might be vulnerable Click Jacking
- - Cache-Control: private
- - Content-Type: text/html; charset=utf-8
- - Content-Encoding: gzip
- - Expires: Tue, 31 Mar 2020 04:33:37 GMT
- - Vary: Accept-Encoding
- - Server: Microsoft-IIS/7.5
- - SPRequestGuid: 7887bf2b-311d-406b-ae80-eed1367d4e26
- - X-SharePointHealthScore: 0
- - X-AspNet-Version: 2.0.50727
- - X-Powered-By: ASP.NET
- - MicrosoftSharePointTeamServices: 14.0.0.7239
- - X-MS-InvokeApp: 1; RequireReadOnly
- - Date: Tue, 31 Mar 2020 04:27:40 GMT
- - Content-Length: 8648
- --------------------------------------------------
- [#] Finding Location..!
- [#] status: success
- [#] country: United Kingdom
- [#] countryCode: GB
- [#] region: ENG
- [#] regionName: England
- [#] city: London
- [#] zip: EC2V
- [#] lat: 51.5132
- [#] lon: -0.0961
- [#] timezone: Europe/London
- [#] isp: COLT Technology Services Group Limited
- [#] org: Agilisys LTD
- [#] as: AS8220 COLT Technology Services Group Limited
- [#] query: 80.169.89.102
- --------------------------------------------------
- [+] Detected WAF Presence in web application: ASP.NET Generic Web Application Protection
- --------------------------------------------------
- [#] Starting Reverse DNS
- [-] Failed ! Fail
- --------------------------------------------------
- [!] Scanning Open Port
- [#] 4/tcp open unknown
- [#] 30/tcp open unknown
- [#] 80/tcp open http
- [#] 443/tcp open https
- [#] 481/tcp open dvs
- [#] 524/tcp open ncp
- [#] 543/tcp open klogin
- [#] 667/tcp open disclose
- [#] 1038/tcp open mtqp
- [#] 1039/tcp open sbl
- [#] 1061/tcp open kiosk
- [#] 1062/tcp open veracity
- [#] 1074/tcp open warmspotMgmt
- [#] 1104/tcp open xrl
- [#] 1132/tcp open kvm-via-ip
- [#] 1533/tcp open virtual-places
- [#] 2034/tcp open scoremgr
- [#] 3300/tcp open ceph
- [#] 4445/tcp open upnotifyp
- [#] 5998/tcp open ncd-diag
- [#] 6565/tcp open unknown
- [#] 8099/tcp open unknown
- [#] 8193/tcp open sophos
- [#] 20221/tcp open unknown
- [#] 44443/tcp open coldfusion-auth
- [#] 55600/tcp open unknown
- --------------------------------------------------
- [+] Getting SSL Info
- {'OCSP': ('http://ocsp.entrust.net',),
- 'caIssuers': ('http://aia.entrust.net/l1k-chain256.cer',),
- 'crlDistributionPoints': ('http://crl.entrust.net/level1k.crl',),
- 'issuer': ((('countryName', 'US'),),
- (('organizationName', 'Entrust, Inc.'),),
- (('organizationalUnitName', 'See www.entrust.net/legal-terms'),),
- (('organizationalUnitName',
- '(c) 2012 Entrust, Inc. - for authorized use only'),),
- (('commonName', 'Entrust Certification Authority - L1K'),)),
- 'notAfter': 'Jan 9 10:45:03 2021 GMT',
- 'notBefore': 'Jan 9 10:15:04 2019 GMT',
- 'serialNumber': '200B2115536F6E220000000050EBEF6B',
- 'subject': ((('countryName', 'GB'),),
- (('localityName', 'London'),),
- (('organizationName', 'City of London Corporation'),),
- (('commonName', '*.cityoflondon.gov.uk'),)),
- 'subjectAltName': (('DNS', '*.cityoflondon.gov.uk'),
- ('DNS', 'cityoflondon.gov.uk')),
- 'version': 3}
- -----BEGIN CERTIFICATE-----
- MIIHRTCCBi2gAwIBAgIQIAshFVNvbiIAAAAAUOvvazANBgkqhkiG9w0BAQsFADCB
- ujELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNVBAsT
- H1NlZSB3d3cuZW50cnVzdC5uZXQvbGVnYWwtdGVybXMxOTA3BgNVBAsTMChjKSAy
- MDEyIEVudHJ1c3QsIEluYy4gLSBmb3IgYXV0aG9yaXplZCB1c2Ugb25seTEuMCwG
- A1UEAxMlRW50cnVzdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIEwxSzAeFw0x
- OTAxMDkxMDE1MDRaFw0yMTAxMDkxMDQ1MDNaMGMxCzAJBgNVBAYTAkdCMQ8wDQYD
- VQQHEwZMb25kb24xIzAhBgNVBAoTGkNpdHkgb2YgTG9uZG9uIENvcnBvcmF0aW9u
- MR4wHAYDVQQDDBUqLmNpdHlvZmxvbmRvbi5nb3YudWswggEiMA0GCSqGSIb3DQEB
- AQUAA4IBDwAwggEKAoIBAQDZy8XY/gcyTSZkfjN4UKLFhYeMeEJQQnyWxTA3Y+hB
- zxDn0wqK5hLxDC2ix9M7geq+2I4ick6CFPIkzQukzVWsl2ktvVtf8wyhsT4XA5zh
- TQRwBjJ4XXojNxo67wGmmPlEK+1bJL/R9Ez7g+7gbCz51Ixvo/I+1WHT+NvAMLt4
- YmqNIkz8wqMSp/4OcfhntQIacW1jEOx7/Hckan4P+Pt+suRD+paWmf4b0GjTZYpj
- 9Zb5fNSS+7RYm5pxjTaN1SR8adJIvw36XThK8KoZqMBulA7lEN2FmsEdj5lvUAOT
- HIWdjK/d6YuwP6CMobNaSwaWllH+xc5XE6joCzOW8EFfAgMBAAGjggObMIIDlzA1
- BgNVHREELjAsghUqLmNpdHlvZmxvbmRvbi5nb3YudWuCE2NpdHlvZmxvbmRvbi5n
- b3YudWswggH2BgorBgEEAdZ5AgQCBIIB5gSCAeIB4AB2AId1v+dZfPiMQ5lfvfNu
- /1aNR1Y2/0q1YMG06v9eoIMPAAABaDI3NmEAAAQDAEcwRQIhAPZExxkpGaxdVzOJ
- UErKFq6OoqJn73n72VE0ehPC42w1AiAJEM2yBPkJPN6aO7x9kpCySo2Jx2Iqinuk
- i5WCHFjKgQB2AFWB1MIWkDYBSuoLm1c8U/DA5Dh4cCUIFy+jqh0HE9MMAAABaDI3
- NlwAAAQDAEcwRQIhAIzSlCQ8vODbhfb02wTBMLobwjQAi8/NSZR9NFnk9L6FAiBD
- Xc4gXr76I1lGPWjQlmfNPIe9mSOB8eSL0w5cXyBp+AB3AESUZS6w7s6vxEAH2Kj+
- KMDa5oK+2MsxtT/TM5a1toGoAAABaDI3NnUAAAQDAEgwRgIhAJjvgOVkJ/v7lc6b
- zsrBjbJ2+Uvex1rilJBtHrztR8gVAiEA7mEAOypp3oUZ1VLqSXj92Yy6CHXkntyT
- xDjonKOxmGQAdQDuS723dc5guuFCaR+r4Z5mow9+X7By2IMAxHuJeqj9ywAAAWgy
- NzZ1AAAEAwBGMEQCIDpm7rHSfmZh5VI2V0FR7y08tE+1r3P1VghrmX5Pk26nAiBy
- KAlKJuqZYq9BCGLxaLC+tGim7G1xPgeIJHTpYI1iMzAOBgNVHQ8BAf8EBAMCBaAw
- HQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMDMGA1UdHwQsMCowKKAmoCSG
- Imh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvbGV2ZWwxay5jcmwwSwYDVR0gBEQwQjA2
- BgpghkgBhvpsCgEFMCgwJgYIKwYBBQUHAgEWGmh0dHA6Ly93d3cuZW50cnVzdC5u
- ZXQvcnBhMAgGBmeBDAECAjBoBggrBgEFBQcBAQRcMFowIwYIKwYBBQUHMAGGF2h0
- dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDMGCCsGAQUFBzAChidodHRwOi8vYWlhLmVu
- dHJ1c3QubmV0L2wxay1jaGFpbjI1Ni5jZXIwHwYDVR0jBBgwFoAUgqJwdN28Uz/P
- e9T3zX+nYMYKTL8wHQYDVR0OBBYEFOj4ygYW+gZdMo6ZdBwKF7499mzZMAkGA1Ud
- EwQCMAAwDQYJKoZIhvcNAQELBQADggEBAMMcyrzEURxxlTey5nxn3+9SoE+C/YgD
- 9UWx5NjGaTa1aQ/jgyQPd8hTVlS+0roK4cE1bGZQiwJwRn+dyBnhg4rOxY2X6//x
- nsUiA3DXaXPZqkTX6vNf64qVu5Q1uYYYPCzjFT8HXZaPbt0V/0fx273SI4MgXeJu
- j5JenJku50utRxWbAVrn0cc43x9uKlC5Nmw/jLDLGrLDqPTpTwkUtR7tKuf3qJ+c
- cTJwOVUul145JMUJq9ogyuMXCiE1Ycw3oj5m0n5lGFPscSG7n7OC6CiWP89wslSu
- OSjbjdIHs+Pal/L0tnpE3ivSMvLFLE9uM/npU4491kw+Clk1p85JOTw=
- -----END CERTIFICATE-----
- --------------------------------------------------
- [+] Collecting Information Disclosure!
- [#] Detecting sitemap.xml file
- [!] sitemap.xml File Found: https://www.cityoflondon.gov.uk//sitemap.xml
- [#] Detecting robots.txt file
- [-] robots.txt file not Found!?
- [#] Detecting GNU Mailman
- [-] GNU Mailman App Not Detected!?
- --------------------------------------------------
- [+] Crawling Url Parameter On: https://www.cityoflondon.gov.uk/Pages/default.aspx
- --------------------------------------------------
- [#] Searching Html Form !
- [+] Html Form Discovered
- [#] action: default.aspx
- [#] class: None
- [#] id: aspnetForm
- [#] method: post
- --------------------------------------------------
- [!] Found 4 dom parameter
- [#] https://www.cityoflondon.gov.uk//#maincontent
- [#] https://www.cityoflondon.gov.uk///about-our-website/Pages/legal-notices.aspx#socialmedia
- [#] https://www.cityoflondon.gov.uk//#PAGETOP
- [#] https://www.cityoflondon.gov.uk//#
- --------------------------------------------------
- [!] 3 Internal Dynamic Parameter Discovered
- [+] https://www.cityoflondon.gov.uk///_layouts/CityOfLondon.SharePoint/css/screen.css?v=20171016
- [+] http://email.cityoflondon.gov.uk/linkapp/cmasubs.aspx?LinkID=pageid986790jkkzhq%40f%40f%40n9qh%40z%40f%40n9qh%40f%40f
- [+] http://email.cityoflondon.gov.uk/linkapp/cmasubs.aspx?LinkID=pageid986790jkkzhq@f@f@n9qh@z@f@n9qh@f@f
- --------------------------------------------------
- [-] No external Dynamic Paramter Found!?
- --------------------------------------------------
- [!] 49 Internal links Discovered
- [+] https://www.cityoflondon.gov.uk///_layouts/CityOfLondon.SharePoint/css/print.css
- [+] https://www.cityoflondon.gov.uk///_layouts/CityOfLondon.SharePoint/images/favicon.ico
- [+] https://www.cityoflondon.gov.uk///_layouts/CityOfLondon.SharePoint/css/fixes-ie8.css
- [+] https://www.cityoflondon.gov.uk///Pages/default.aspx
- [+] https://www.cityoflondon.gov.uk///report-pay-apply/Pages/report-pay-apply.aspx
- [+] https://www.cityoflondon.gov.uk///search/Pages/a-to-z.aspx
- [+] https://www.cityoflondon.gov.uk///_layouts/col/shop.aspx
- [+] https://www.cityoflondon.gov.uk///events/Pages/default.aspx
- [+] https://careers.cityoflondon.gov.uk/
- [+] http://news.cityoflondon.gov.uk/
- [+] https://www.cityoflondon.gov.uk///contact-us/Pages/default.aspx
- [+] https://www.cityoflondon.gov.uk///about-the-city/Pages/default.aspx
- [+] https://www.cityoflondon.gov.uk///services/Pages/default.aspx
- [+] https://www.cityoflondon.gov.uk///business/Pages/default.aspx
- [+] https://www.cityoflondon.gov.uk///things-to-do/Pages/default.aspx
- [+] https://www.cityoflondon.gov.uk///services/health-and-wellbeing/Pages/covid-19.aspx
- [+] https://www.cityoflondon.gov.uk///business/support-promotion-and-advice/Pages/covid-19-advice-for-businesses.aspx
- [+] https://www.cityoflondon.gov.uk///services/health-and-wellbeing/Pages/covid-19.aspx
- [+] https://www.cityoflondon.gov.uk///business/support-promotion-and-advice/Pages/covid-19-advice-for-businesses.aspx
- [+] https://www.cityoflondon.gov.uk///services/health-and-wellbeing/Pages/covid-19.aspx
- [+] https://www.cityoflondon.gov.uk///business/support-promotion-and-advice/Pages/support-relief-efforts-COVID-19.aspx
- [+] https://news.cityoflondon.gov.uk/square-mile-businesses-offered-additional-rental-relief/
- [+] https://news.cityoflondon.gov.uk/covid19-city-corporation-encourages-people-to-follow-new-government-instructions-on-parks/
- [+] https://www.cityoflondon.gov.uk///services/transport-and-streets/parking/Pages/covid-19-parking-and-driving-in-the-city.aspx
- [+] https://www.cityoflondon.gov.uk///business/business-rates/Pages/default.aspx
- [+] https://www.cityoflondon.gov.uk///maps/Pages/geocortex-redirect.aspx
- [+] https://www.cityoflondon.gov.uk///services/transport-and-streets/roads-highways-and-pavements/Pages/current-road-closures-works-and-events.aspx
- [+] https://www.cityoflondon.gov.uk///events/Pages/default.aspx
- [+] https://www.cityoflondon.gov.uk///about-the-city/about-us/Pages/default.aspx
- [+] https://www.cityoflondon.gov.uk///about-the-city/voting-elections/Pages/default.aspx
- [+] https://www.cityoflondon.gov.uk///business/Pages/default.aspx
- [+] https://www.cityoflondon.gov.uk///things-to-do/visit-the-city/whats-on/Pages/default.aspx
- [+] https://www.cityoflondon.gov.uk///services/transport-and-streets/roads-highways-and-pavements/Pages/current-road-closures-works-and-events.aspx
- [+] https://www.cityoflondon.gov.uk///things-to-do/green-spaces/Pages/default.aspx
- [+] https://www.cityoflondon.gov.uk///about-the-city/about-us/Pages/how-to-find-us.aspx
- [+] https://www.cityoflondon.gov.uk///Pages/default.aspx
- [+] https://www.cityoflondon.gov.uk///about-our-website/Pages/mobile.aspx
- [+] https://www.cityoflondon.gov.uk///report-pay-apply/Pages/report-pay-apply.aspx
- [+] https://www.cityoflondon.gov.uk///maps/Pages/interactive-maps.aspx
- [+] https://www.cityoflondon.gov.uk///contact-us/Pages/default.aspx
- [+] https://www.cityoflondon.gov.uk///about-our-website/Pages/social-media.aspx
- [+] https://www.cityoflondon.gov.uk///contact-us/Pages/default.aspx
- [+] https://www.cityoflondon.gov.uk///about-our-website/Pages/accessibility.aspx
- [+] https://www.cityoflondon.gov.uk///about-our-website/Pages/legal-notices.aspx
- [+] https://www.cityoflondon.gov.uk///about-our-website/Pages/privacy-notice.aspx
- [+] https://www.cityoflondon.gov.uk///about-our-website/Pages/Cookies.aspx
- [+] https://www.cityoflondon.gov.uk///about-our-website/sitemap.aspx
- [+] https://www.cityoflondon.gov.uk///business/tenders-and-procurement/pages/responsible-procurement.aspx
- [+] https://www.cityoflondon.gov.uk///about-our-website/Pages/cookies.aspx
- --------------------------------------------------
- [!] 3 External links Discovered
- [#] https://www.facebook.com/CityofLondonCorp
- [#] https://twitter.com/cityoflondon
- [#] https://www.youtube.com/user/CityofLondonvideos/videos
- --------------------------------------------------
- [#] Mapping Subdomain..
- [-] No Any Subdomain Found
- [!] Found 0 Subdomain
- --------------------------------------------------
- [!] Done At 2020-03-31 00:24:19.295106
- #################################################################################################################################
- traceroute to cityoflondon.gov.uk (80.169.89.102), 30 hops max, 60 byte packets
- 1 _gateway (10.203.9.1) 102.583 ms 102.590 ms 102.577 ms
- 2 45.131.5.2 (45.131.5.2) 102.572 ms 102.568 ms 102.580 ms
- 3 109.236.95.224 (109.236.95.224) 102.555 ms 109.236.95.226 (109.236.95.226) 102.550 ms 109.236.95.230 (109.236.95.230) 102.546 ms
- 4 109.236.95.173 (109.236.95.173) 103.218 ms 103.212 ms 109.236.95.108 (109.236.95.108) 103.404 ms
- 5 et-0-0-1-pr2.AMS.router.colt.net (80.249.208.236) 103.829 ms 103.810 ms 104.188 ms
- 6 xe4-2-1-sar18.LON.router.colt.net (212.74.73.181) 113.402 ms 212.74.75.37 (212.74.75.37) 113.012 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181) 113.525 ms
- 7 xe0-3-0-sar18.LON.router.colt.net (212.74.68.145) 111.945 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181) 116.700 ms 212.74.75.37 (212.74.75.37) 116.378 ms
- 8 cpeuk_lon002520.ia.colt.net (80.169.196.38) 116.354 ms 116.319 ms 116.320 ms
- 9 195.110.81.4 (195.110.81.4) 116.614 ms 112.411 ms 112.165 ms
- 10 * * *
- ################################################################################################################################
- Domains still to check: 1
- Checking if the hostname cityoflondon.gov.uk. given is in fact a domain...
- Analyzing domain: cityoflondon.gov.uk.
- Checking NameServers using system default resolver...
- IP: 173.245.59.122 (United States)
- HostName: jake.ns.cloudflare.com Type: NS
- HostName: jake.ns.cloudflare.com Type: PTR
- IP: 162.159.38.116 (None)
- HostName: treasure.ns.cloudflare.com Type: NS
- HostName: treasure.ns.cloudflare.com Type: PTR
- Checking MailServers using system default resolver...
- IP: 104.47.20.36 (United Kingdom)
- HostName: cityoflondon-gov-uk.mail.protection.outlook.com Type: MX
- HostName: mail-cwlgbr010036.inbound.protection.outlook.com Type: PTR
- IP: 104.47.21.36 (United Kingdom)
- HostName: cityoflondon-gov-uk.mail.protection.outlook.com Type: MX
- HostName: mail-lo2gbr010036.inbound.protection.outlook.com Type: PTR
- Checking the zone transfer for each NS... (if this takes more than 10 seconds, just hit CTRL-C and it will continue. Bug in the libs)
- No zone transfer found on nameserver 173.245.59.122
- No zone transfer found on nameserver 162.159.38.116
- Checking SPF record...
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 23.227.38.64/32, but only the network IP
- New IP found: 23.227.38.64
- Checking SPF record...
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 212.50.171.0/25, but only the network IP
- New IP found: 212.50.171.0
- New IP found: 80.169.89.106
- New IP found: 80.169.89.109
- New IP found: 80.169.89.85
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 205.201.128.0/20, but only the network IP
- New IP found: 205.201.128.0
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 198.2.128.0/18, but only the network IP
- New IP found: 198.2.128.0
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 148.105.0.0/16, but only the network IP
- New IP found: 148.105.0.0
- New IP found: 132.174.100.127
- New IP found: 89.145.127.252
- New IP found: 84.45.34.163
- Checking SPF record...
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 40.92.0.0/15, but only the network IP
- New IP found: 40.92.0.0
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 40.107.0.0/16, but only the network IP
- New IP found: 40.107.0.0
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 52.100.0.0/14, but only the network IP
- New IP found: 52.100.0.0
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 104.47.0.0/17, but only the network IP
- New IP found: 104.47.0.0
- There are no IPv4 addresses in the SPF. Maybe IPv6.
- There are no IPv4 addresses in the SPF. Maybe IPv6.
- Checking SPF record...
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 85.115.32.0/19, but only the network IP
- New IP found: 85.115.32.0
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 86.111.216.0/21, but only the network IP
- New IP found: 86.111.216.0
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 116.50.56.0/21, but only the network IP
- New IP found: 116.50.56.0
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 208.87.232.0/21, but only the network IP
- New IP found: 208.87.232.0
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 196.216.238.0/23, but only the network IP
- New IP found: 196.216.238.0
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 192.151.176.0/20, but only the network IP
- New IP found: 192.151.176.0
- Checking SPF record...
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 205.201.128.0/20, but only the network IP
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 198.2.128.0/18, but only the network IP
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 148.105.8.0/21, but only the network IP
- New IP found: 148.105.8.0
- Checking SPF record...
- Checking SPF record...
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 135.84.216.0/22, but only the network IP
- New IP found: 135.84.216.0
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 66.240.227.0/24, but only the network IP
- New IP found: 66.240.227.0
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 63.143.59.128/25, but only the network IP
- New IP found: 63.143.59.128
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 63.143.57.128/25, but only the network IP
- New IP found: 63.143.57.128
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 216.98.158.0/24, but only the network IP
- New IP found: 216.98.158.0
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 74.63.212.0/24, but only the network IP
- New IP found: 74.63.212.0
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 52.200.59.0/24, but only the network IP
- New IP found: 52.200.59.0
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 34.245.210.0/24, but only the network IP
- New IP found: 34.245.210.0
- Checking SPF record...
- WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 34.245.210.0/24, but only the network IP
- Checking 192 most common hostnames using system default resolver...
- IP: 80.169.89.102 (United Kingdom)
- HostName: www.cityoflondon.gov.uk. Type: A
- IP: 80.169.89.96 (United Kingdom)
- HostName: www1.cityoflondon.gov.uk. Type: A
- IP: 80.169.89.98 (United Kingdom)
- HostName: www2.cityoflondon.gov.uk. Type: A
- Checking with nmap the reverse DNS hostnames of every <ip>/24 netblock using system default resolver...
- Checking netblock 52.100.0.0
- Checking netblock 52.200.59.0
- Checking netblock 148.105.0.0
- Checking netblock 162.159.38.0
- Checking netblock 74.63.212.0
- Checking netblock 148.105.8.0
- Checking netblock 205.201.128.0
- Checking netblock 80.169.89.0
- Checking netblock 66.240.227.0
- Checking netblock 86.111.216.0
- Checking netblock 198.2.128.0
- Checking netblock 34.245.210.0
- Checking netblock 63.143.59.0
- Checking netblock 85.115.32.0
- Checking netblock 89.145.127.0
- Checking netblock 63.143.57.0
- Checking netblock 104.47.21.0
- Checking netblock 192.151.176.0
- Checking netblock 84.45.34.0
- Checking netblock 212.50.171.0
- Checking netblock 135.84.216.0
- Checking netblock 40.107.0.0
- Checking netblock 173.245.59.0
- Checking netblock 40.92.0.0
- Checking netblock 196.216.238.0
- Checking netblock 116.50.56.0
- Checking netblock 208.87.232.0
- Checking netblock 104.47.0.0
- Checking netblock 132.174.100.0
- Checking netblock 216.98.158.0
- Checking netblock 23.227.38.0
- Checking netblock 104.47.20.0
- Searching for cityoflondon.gov.uk. emails in Google
- thecitycentre@cityoflondon.gov.uk.
- Susan.Pearson@cityoflondon.gov.uk&
- Wootton@cityoflondon.gov.uk&
- kevin.mulcahy@cityoflondon.gov.uk
- bankarea@cityoflondon.gov.uk]
- artizanlib@cityoflondon.gov.uk.
- LADO@cityoflondon.gov.uk
- vicki.wells@cityoflondon.gov.uk.
- citybridgetrust@cityoflondon.gov.uk
- pro@cityoflondon.gov.uk�
- roger.gifford@cityoflondon.gov.uk.
- kevin.mulcahy@cityoflondon.gov.uk�
- Sukhjit.Gill@cityoflondon.gov.uk.
- zoe.nation@cityoflondon.gov.uk
- Sukhjit.Gill@cityoflondon.gov.uk
- zoe.nation@cityoflondon.gov.uk�
- joanna.burnaby-atkins@cityoflondon.gov.uk. - Is this real?
- Vicki.Wells@cityoflondon.gov.uk]
- michael.bennett@cityoflondon.gov.uk:
- citybridgetrust@cityoflondon.gov.uk.
- barbicanlib@cityoflondon.gov.uk.
- Checking 37 active hosts using nmap... (nmap -sn -n -v -PP -PM -PS80,25 -PA -PY -PU53,40125 -PE --reason <ip> -oA <output_directory>/nmap/<ip>.sn)
- Host 52.100.0.0 is down
- Host 52.200.59.0 is down
- Host 148.105.0.0 is down
- Host 162.159.38.116 is up (echo-reply ttl 59)
- Host 74.63.212.0 is down
- Host 148.105.8.0 is down
- Host 205.201.128.0 is up (syn-ack ttl 58)
- Host 80.169.89.98 is up (syn-ack ttl 117)
- Host 66.240.227.0 is down
- Host 86.111.216.0 is down
- Host 198.2.128.0 is up (reset ttl 58)
- Host 34.245.210.0 is down
- Host 63.143.59.128 is down
- Host 85.115.32.0 is down
- Host 80.169.89.85 is down
- Host 89.145.127.252 is up (echo-reply ttl 56)
- Host 63.143.57.128 is down
- Host 104.47.21.36 is up (syn-ack ttl 115)
- Host 192.151.176.0 is down
- Host 84.45.34.163 is up (echo-reply ttl 56)
- Host 212.50.171.0 is up (abort ttl 244)
- Host 135.84.216.0 is down
- Host 40.107.0.0 is down
- Host 173.245.59.122 is up (echo-reply ttl 59)
- Host 40.92.0.0 is down
- Host 196.216.238.0 is down
- Host 80.169.89.109 is down
- Host 116.50.56.0 is down
- Host 208.87.232.0 is down
- Host 80.169.89.102 is up (syn-ack ttl 53)
- Host 80.169.89.106 is up (syn-ack ttl 117)
- Host 104.47.0.0 is down
- Host 132.174.100.127 is down
- Host 216.98.158.0 is down
- Host 23.227.38.64 is up (echo-reply ttl 59)
- Host 80.169.89.96 is down
- Host 104.47.20.36 is up (syn-ack ttl 112)
- Checking ports on every active host using nmap... (nmap -O --reason --webxml --traceroute -sS -sV -sC -Pn -n -v -F <ip> -oA <output_directory>/nmap/<ip>)
- Scanning ip 162.159.38.116 (treasure.ns.cloudflare.com (PTR)):
- 53/tcp open domain syn-ack ttl 59 (unknown banner: 20171212)
- | dns-nsid:
- | NSID: 20m391 (32306d333931)
- | id.server: AMS
- |_ bind.version: 20171212
- | fingerprint-strings:
- | DNSVersionBindReqTCP:
- | version
- | bind
- |_ 20171212
- Scanning ip 205.201.128.0 ():
- 25/tcp open smtp syn-ack ttl 58 Postfix smtpd
- |_smtp-commands: pmta45.mailchimp.prod.atl01.rsglab.com, PIPELINING, SIZE 10240000, ENHANCEDSTATUSCODES, 8BITMIME, SMTPUTF8,
- 80/tcp open http syn-ack ttl 58 nginx 1.8.1
- | http-methods:
- |_ Supported Methods: GET HEAD POST OPTIONS
- |_http-server-header: nginx/1.8.1
- |_http-title: Did not follow redirect to https://mailchimp.com/about/mcsv-static
- OS Info: Service Info: Host: pmta45.mailchimp.prod.atl01.rsglab.com
- Scanning ip 80.169.89.98 (www2.cityoflondon.gov.uk.):
- 80/tcp open http syn-ack ttl 117 Microsoft IIS httpd 10.0
- | http-methods:
- | Supported Methods: OPTIONS TRACE GET HEAD POST
- |_ Potentially risky methods: TRACE
- |_http-server-header: Microsoft-IIS/10.0
- |_http-title: IIS Windows Server
- 443/tcp open ssl/http syn-ack ttl 117 Microsoft IIS httpd 10.0
- | http-methods:
- | Supported Methods: OPTIONS TRACE GET HEAD POST
- |_ Potentially risky methods: TRACE
- |_http-server-header: Microsoft-IIS/10.0
- |_http-title: IIS Windows Server
- | ssl-cert: Subject: commonName=WMSvc-SHA2-COL-VMW-P-LIM01
- | Issuer: commonName=WMSvc-SHA2-COL-VMW-P-LIM01
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2020-01-09T15:25:04
- | Not valid after: 2030-01-06T15:25:04
- | MD5: b2e4 3b70 c10c ffc8 c699 3005 94ab 1fe1
- |_SHA-1: 8b35 9e30 d522 59a4 b205 a607 4cfa 5a0e df4f dc13
- |_ssl-date: 2020-03-31T04:40:55+00:00; +3m45s from scanner time.
- | tls-alpn:
- | h2
- |_ http/1.1
- OS Info: Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
- |_clock-skew: 3m44s
- Scanning ip 198.2.128.0 ():
- 80/tcp open http syn-ack ttl 58 nginx 1.6.1
- |_http-server-header: nginx/1.6.1
- |_http-title: 403 Forbidden
- Device type: general purpose|storage-misc|broadband router|router|WAP
- Running (JUST GUESSING): Linux 2.6.X|3.X (93%), HP embedded (90%), MikroTik RouterOS 6.X (89%), Ubiquiti AirOS 5.X (89%), Ubiquiti embedded (87%), Ruckus embedded (87%), AVM FritzOS 6.X (87%)
- Scanning ip 89.145.127.252 ():
- Scanning ip 104.47.21.36 (mail-lo2gbr010036.inbound.protection.outlook.com (PTR)):
- 25/tcp open smtp syn-ack ttl 115 Microsoft Exchange smtpd
- | smtp-commands: LO2GBR01FT005.mail.protection.outlook.com Hello [45.131.5.15], SIZE 157286400, PIPELINING, DSN, ENHANCEDSTATUSCODES, STARTTLS, 8BITMIME, BINARYMIME, CHUNKING, SMTPUTF8,
- |_ This server supports the following commands: HELO EHLO STARTTLS RCPT DATA RSET MAIL QUIT HELP AUTH BDAT
- | ssl-cert: Subject: commonName=mail.protection.outlook.com/organizationName=Microsoft Corporation/stateOrProvinceName=Washington/countryName=US
- | Subject Alternative Name: DNS:mail.protection.outlook.com, DNS:*.mail.eo.outlook.com, DNS:*.mail.protection.outlook.com, DNS:mail.messaging.microsoft.com, DNS:outlook.com, DNS:*.olc.protection.outlook.com, DNS:*.pamx1.hotmail.com
- | Issuer: commonName=GlobalSign Organization Validation CA - SHA256 - G3/organizationName=GlobalSign nv-sa/countryName=BE
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2020-02-24T18:33:10
- | Not valid after: 2022-02-24T18:33:10
- | MD5: 4f90 9eee 29eb abe5 e29a d55e 8c08 c310
- |_SHA-1: ea85 9504 40a6 97c1 8482 3304 a7dc 19e5 fcd5 8e6b
- |_ssl-date: 2020-03-31T04:38:16+00:00; -1s from scanner time.
- OS Info: Service Info: Host: LO2GBR01FT012.mail.protection.outlook.com; OS: Windows; CPE: cpe:/o:microsoft:windows
- |_clock-skew: -1s
- Scanning ip 84.45.34.163 ():
- Scanning ip 212.50.171.0 ():
- Scanning ip 173.245.59.122 (jake.ns.cloudflare.com (PTR)):
- 53/tcp open domain syn-ack ttl 59 (unknown banner: 20171212)
- | dns-nsid:
- | NSID: 20m226 (32306d323236)
- | id.server: AMS
- |_ bind.version: 20171212
- | fingerprint-strings:
- | DNSVersionBindReqTCP:
- | version
- | bind
- |_ 20171212
- Scanning ip 80.169.89.102 (www.cityoflondon.gov.uk.):
- 80/tcp open http syn-ack ttl 53 COL-VMW-M-LB02
- | fingerprint-strings:
- | FourOhFourRequest:
- | HTTP/1.1 301 Moved Permanently
- | Location: https:///nice%20ports%2C/Tri%6Eity.txt%2ebak
- | Server: COL-VMW-M-LB02
- | Cache-Control: no-cache
- | Connection: close
- | GenericLines:
- | HTTP/1.1 301 Moved Permanently
- | Location: https://
- | Server: COL-VMW-M-LB02
- | Cache-Control: no-cache
- | Connection: close
- | GetRequest, HTTPOptions, RTSPRequest:
- | HTTP/1.1 301 Moved Permanently
- | Location: https:///
- | Server: COL-VMW-M-LB02
- | Cache-Control: no-cache
- | Connection: close
- | SIPOptions:
- | HTTP/1.1 301 Moved Permanently
- | Location: https://sip:nm
- | Server: COL-VMW-M-LB02
- | Cache-Control: no-cache
- |_ Connection: close
- | http-methods:
- |_ Supported Methods: GET HEAD POST OPTIONS
- |_http-server-header: COL-VMW-M-LB02
- |_http-title: Did not follow redirect to https://80.169.89.102/
- |_https-redirect: ERROR: Script execution failed (use -d to debug)
- 443/tcp open ssl/http syn-ack ttl 53 Microsoft IIS httpd 7.5
- | http-methods:
- |_ Supported Methods: GET HEAD POST OPTIONS
- |_http-server-header: Microsoft-IIS/7.5
- | http-title: Welcome to the City of London Corporation
- |_Requested resource was https://80.169.89.102/Pages/default.aspx
- | ssl-cert: Subject: commonName=*.cityoflondon.gov.uk/organizationName=City of London Corporation/countryName=GB
- | Subject Alternative Name: DNS:*.cityoflondon.gov.uk, DNS:cityoflondon.gov.uk
- | Issuer: commonName=Entrust Certification Authority - L1K/organizationName=Entrust, Inc./countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2019-01-09T10:15:04
- | Not valid after: 2021-01-09T10:45:03
- | MD5: 4f24 791b 0cf7 72b6 48e0 faac 5dd4 3c66
- |_SHA-1: 414c 9a2c e74f b30a 5c45 a40d 2288 a043 93d7 4d99
- |_ssl-date: TLS randomness does not represent time
- OS Info: Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
- Scanning ip 80.169.89.106 ():
- 80/tcp open http syn-ack ttl 117 Microsoft IIS httpd 8.5
- | http-methods:
- | Supported Methods: OPTIONS TRACE GET HEAD POST
- |_ Potentially risky methods: TRACE
- |_http-server-header: Microsoft-IIS/8.5
- |_http-title: 403 - Forbidden: Access is denied.
- 443/tcp open ssl/https? syn-ack ttl 117
- |_ssl-date: 2020-03-31T04:47:53+00:00; +3m45s from scanner time.
- OS Info: Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
- |_clock-skew: 3m44s
- Scanning ip 23.227.38.64 ():
- 80/tcp open http syn-ack ttl 59 cloudflare
- | fingerprint-strings:
- | FourOhFourRequest:
- | HTTP/1.1 400 Bad Request
- | Date: Tue, 31 Mar 2020 04:45:17 GMT
- | Content-Type: text/html
- | Content-Length: 155
- | Connection: close
- | Server: cloudflare
- | CF-RAY: 57c76b857cf3faa0-AMS
- | <html>
- | <head><title>400 Bad Request</title></head>
- | <body>
- | <center><h1>400 Bad Request</h1></center>
- | <hr><center>cloudflare</center>
- | </body>
- | </html>
- | GetRequest:
- | HTTP/1.1 400 Bad Request
- | Date: Tue, 31 Mar 2020 04:45:16 GMT
- | Content-Type: text/html
- | Content-Length: 155
- | Connection: close
- | Server: cloudflare
- | CF-RAY: 57c76b800fb19ccf-AMS
- | <html>
- | <head><title>400 Bad Request</title></head>
- | <body>
- | <center><h1>400 Bad Request</h1></center>
- | <hr><center>cloudflare</center>
- | </body>
- | </html>
- | HTTPOptions:
- | HTTP/1.1 400 Bad Request
- | Date: Tue, 31 Mar 2020 04:45:16 GMT
- | Content-Type: text/html
- | Content-Length: 155
- | Connection: close
- | Server: cloudflare
- | CF-RAY: 57c76b81791dd8c9-AMS
- | <html>
- | <head><title>400 Bad Request</title></head>
- | <body>
- | <center><h1>400 Bad Request</h1></center>
- | <hr><center>cloudflare</center>
- | </body>
- | </html>
- | RPCCheck:
- | HTTP/1.1 400 Bad Request
- | Server: cloudflare
- | Date: Tue, 31 Mar 2020 04:45:22 GMT
- | Content-Type: text/html
- | Content-Length: 155
- | Connection: close
- | CF-RAY: -
- | <html>
- | <head><title>400 Bad Request</title></head>
- | <body>
- | <center><h1>400 Bad Request</h1></center>
- | <hr><center>cloudflare</center>
- | </body>
- | </html>
- | RTSPRequest:
- | <html>
- | <head><title>400 Bad Request</title></head>
- | <body>
- | <center><h1>400 Bad Request</h1></center>
- | <hr><center>cloudflare</center>
- | </body>
- | </html>
- | X11Probe:
- | HTTP/1.1 400 Bad Request
- | Server: cloudflare
- | Date: Tue, 31 Mar 2020 04:45:16 GMT
- | Content-Type: text/html
- | Content-Length: 155
- | Connection: close
- | CF-RAY: -
- | <html>
- | <head><title>400 Bad Request</title></head>
- | <body>
- | <center><h1>400 Bad Request</h1></center>
- | <hr><center>cloudflare</center>
- | </body>
- |_ </html>
- |_http-server-header: cloudflare
- |_http-title: Site doesn't have a title (text/plain; charset=UTF-8).
- 443/tcp open ssl/https syn-ack ttl 59 cloudflare
- | fingerprint-strings:
- | FourOhFourRequest:
- | HTTP/1.1 403 Forbidden
- | Server: cloudflare
- | Date: Tue, 31 Mar 2020 04:45:23 GMT
- | Content-Type: text/html
- | Content-Length: 151
- | Connection: close
- | CF-RAY: 57c76bad182bfaac-AMS
- | <html>
- | <head><title>403 Forbidden</title></head>
- | <body>
- | <center><h1>403 Forbidden</h1></center>
- | <hr><center>cloudflare</center>
- | </body>
- | </html>
- | GetRequest:
- | HTTP/1.1 403 Forbidden
- | Server: cloudflare
- | Date: Tue, 31 Mar 2020 04:45:22 GMT
- | Content-Type: text/html
- | Content-Length: 151
- | Connection: close
- | CF-RAY: 57c76ba7af85fa5c-AMS
- | <html>
- | <head><title>403 Forbidden</title></head>
- | <body>
- | <center><h1>403 Forbidden</h1></center>
- | <hr><center>cloudflare</center>
- | </body>
- | </html>
- | HTTPOptions:
- | HTTP/1.1 403 Forbidden
- | Server: cloudflare
- | Date: Tue, 31 Mar 2020 04:45:22 GMT
- | Content-Type: text/html
- | Content-Length: 151
- | Connection: close
- | CF-RAY: 57c76baa6b02d8f5-AMS
- | <html>
- | <head><title>403 Forbidden</title></head>
- | <body>
- | <center><h1>403 Forbidden</h1></center>
- | <hr><center>cloudflare</center>
- | </body>
- | </html>
- | RPCCheck:
- | HTTP/1.1 400 Bad Request
- | Server: cloudflare
- | Date: Tue, 31 Mar 2020 04:45:29 GMT
- | Content-Type: text/html
- | Content-Length: 155
- | Connection: close
- | CF-RAY: -
- | <html>
- | <head><title>400 Bad Request</title></head>
- | <body>
- | <center><h1>400 Bad Request</h1></center>
- | <hr><center>cloudflare</center>
- | </body>
- | </html>
- | RTSPRequest:
- | <html>
- | <head><title>400 Bad Request</title></head>
- | <body>
- | <center><h1>400 Bad Request</h1></center>
- | <hr><center>cloudflare</center>
- | </body>
- | </html>
- | tor-versions:
- | HTTP/1.1 400 Bad Request
- | Server: cloudflare
- | Date: Tue, 31 Mar 2020 04:45:23 GMT
- | Content-Type: text/html
- | Content-Length: 155
- | Connection: close
- | CF-RAY: -
- | <html>
- | <head><title>400 Bad Request</title></head>
- | <body>
- | <center><h1>400 Bad Request</h1></center>
- | <hr><center>cloudflare</center>
- | </body>
- |_ </html>
- |_http-server-header: cloudflare
- |_http-title: 403 Forbidden
- | ssl-cert: Subject: commonName=*.myshopify.com/organizationName=CloudFlare, Inc./stateOrProvinceName=CA/countryName=US
- | Subject Alternative Name: DNS:myshopify.com, DNS:*.myshopify.com
- | Issuer: commonName=CloudFlare Inc ECC CA-2/organizationName=CloudFlare, Inc./stateOrProvinceName=CA/countryName=US
- | Public Key type: ec
- | Public Key bits: 256
- | Signature Algorithm: ecdsa-with-SHA256
- | Not valid before: 2019-05-02T00:00:00
- | Not valid after: 2020-05-02T12:00:00
- | MD5: fe65 4aba cdcd ccaf a90d 23a3 d4f1 32ac
- |_SHA-1: 8381 f18f 5e77 f549 a0f0 3adf 21d7 a486 0b73 85ac
- |_ssl-date: 2020-03-31T04:45:48+00:00; -2s from scanner time.
- | tls-alpn:
- | h2
- |_ http/1.1
- | tls-nextprotoneg:
- | h2
- |_ http/1.1
- 8080/tcp open http-proxy syn-ack ttl 59 cloudflare
- | fingerprint-strings:
- | FourOhFourRequest:
- | HTTP/1.1 400 Bad Request
- | Date: Tue, 31 Mar 2020 04:45:16 GMT
- | Content-Type: text/html
- | Content-Length: 155
- | Connection: close
- | Server: cloudflare
- | CF-RAY: 57c76b841bb9fa54-AMS
- | <html>
- | <head><title>400 Bad Request</title></head>
- | <body>
- | <center><h1>400 Bad Request</h1></center>
- | <hr><center>cloudflare</center>
- | </body>
- | </html>
- | GetRequest:
- | HTTP/1.1 400 Bad Request
- | Date: Tue, 31 Mar 2020 04:45:16 GMT
- | Content-Type: text/html
- | Content-Length: 155
- | Connection: close
- | Server: cloudflare
- | CF-RAY: 57c76b800d5a9d36-AMS
- | <html>
- | <head><title>400 Bad Request</title></head>
- | <body>
- | <center><h1>400 Bad Request</h1></center>
- | <hr><center>cloudflare</center>
- | </body>
- | </html>
- | HTTPOptions:
- | HTTP/1.1 400 Bad Request
- | Date: Tue, 31 Mar 2020 04:45:16 GMT
- | Content-Type: text/html
- | Content-Length: 155
- | Connection: close
- | Server: cloudflare
- | CF-RAY: 57c76b816a842b38-AMS
- | <html>
- | <head><title>400 Bad Request</title></head>
- | <body>
- | <center><h1>400 Bad Request</h1></center>
- | <hr><center>cloudflare</center>
- | </body>
- | </html>
- | RTSPRequest:
- | <html>
- | <head><title>400 Bad Request</title></head>
- | <body>
- | <center><h1>400 Bad Request</h1></center>
- | <hr><center>cloudflare</center>
- | </body>
- | </html>
- | Socks4, Socks5:
- | HTTP/1.1 400 Bad Request
- | Server: cloudflare
- | Date: Tue, 31 Mar 2020 04:45:17 GMT
- | Content-Type: text/html
- | Content-Length: 155
- | Connection: close
- | CF-RAY: -
- | <html>
- | <head><title>400 Bad Request</title></head>
- | <body>
- | <center><h1>400 Bad Request</h1></center>
- | <hr><center>cloudflare</center>
- | </body>
- |_ </html>
- |_http-server-header: cloudflare
- |_http-title: Site doesn't have a title (text/plain; charset=UTF-8).
- 8443/tcp open ssl/https-alt syn-ack ttl 59 cloudflare
- | fingerprint-strings:
- | DNSVersionBindReqTCP, RPCCheck:
- | HTTP/1.1 400 Bad Request
- | Server: cloudflare
- | Date: Tue, 31 Mar 2020 04:45:29 GMT
- | Content-Type: text/html
- | Content-Length: 155
- | Connection: close
- | CF-RAY: -
- | <html>
- | <head><title>400 Bad Request</title></head>
- | <body>
- | <center><h1>400 Bad Request</h1></center>
- | <hr><center>cloudflare</center>
- | </body>
- | </html>
- | FourOhFourRequest:
- | HTTP/1.1 403 Forbidden
- | Server: cloudflare
- | Date: Tue, 31 Mar 2020 04:45:23 GMT
- | Content-Type: text/html
- | Content-Length: 151
- | Connection: close
- | CF-RAY: 57c76bad0db9d92d-AMS
- | <html>
- | <head><title>403 Forbidden</title></head>
- | <body>
- | <center><h1>403 Forbidden</h1></center>
- | <hr><center>cloudflare</center>
- | </body>
- | </html>
- | GetRequest:
- | HTTP/1.1 403 Forbidden
- | Server: cloudflare
- | Date: Tue, 31 Mar 2020 04:45:22 GMT
- | Content-Type: text/html
- | Content-Length: 151
- | Connection: close
- | CF-RAY: 57c76ba7af2d727b-AMS
- | <html>
- | <head><title>403 Forbidden</title></head>
- | <body>
- | <center><h1>403 Forbidden</h1></center>
- | <hr><center>cloudflare</center>
- | </body>
- | </html>
- | HTTPOptions:
- | HTTP/1.1 403 Forbidden
- | Server: cloudflare
- | Date: Tue, 31 Mar 2020 04:45:22 GMT
- | Content-Type: text/html
- | Content-Length: 151
- | Connection: close
- | CF-RAY: 57c76baa68cafa40-AMS
- | <html>
- | <head><title>403 Forbidden</title></head>
- | <body>
- | <center><h1>403 Forbidden</h1></center>
- | <hr><center>cloudflare</center>
- | </body>
- | </html>
- | RTSPRequest:
- | <html>
- | <head><title>400 Bad Request</title></head>
- | <body>
- | <center><h1>400 Bad Request</h1></center>
- | <hr><center>cloudflare</center>
- | </body>
- |_ </html>
- |_http-server-header: cloudflare
- |_http-title: 403 Forbidden
- | ssl-cert: Subject: commonName=*.myshopify.com/organizationName=CloudFlare, Inc./stateOrProvinceName=CA/countryName=US
- | Subject Alternative Name: DNS:myshopify.com, DNS:*.myshopify.com
- | Issuer: commonName=CloudFlare Inc ECC CA-2/organizationName=CloudFlare, Inc./stateOrProvinceName=CA/countryName=US
- | Public Key type: ec
- | Public Key bits: 256
- | Signature Algorithm: ecdsa-with-SHA256
- | Not valid before: 2019-05-02T00:00:00
- | Not valid after: 2020-05-02T12:00:00
- | MD5: fe65 4aba cdcd ccaf a90d 23a3 d4f1 32ac
- |_SHA-1: 8381 f18f 5e77 f549 a0f0 3adf 21d7 a486 0b73 85ac
- |_ssl-date: 2020-03-31T04:45:48+00:00; -2s from scanner time.
- | tls-alpn:
- | h2
- |_ http/1.1
- | tls-nextprotoneg:
- | h2
- |_ http/1.1
- Scanning ip 104.47.20.36 (mail-cwlgbr010036.inbound.protection.outlook.com (PTR)):
- 25/tcp open smtp syn-ack ttl 112 Microsoft Exchange smtpd
- | smtp-commands: CWLGBR01FT007.mail.protection.outlook.com Hello [45.131.5.15], SIZE 157286400, PIPELINING, DSN, ENHANCEDSTATUSCODES, STARTTLS, 8BITMIME, BINARYMIME, CHUNKING, SMTPUTF8,
- |_ This server supports the following commands: HELO EHLO STARTTLS RCPT DATA RSET MAIL QUIT HELP AUTH BDAT
- | ssl-cert: Subject: commonName=mail.protection.outlook.com/organizationName=Microsoft Corporation/stateOrProvinceName=Washington/countryName=US
- | Subject Alternative Name: DNS:mail.protection.outlook.com, DNS:*.mail.eo.outlook.com, DNS:*.mail.protection.outlook.com, DNS:mail.messaging.microsoft.com, DNS:outlook.com, DNS:*.olc.protection.outlook.com, DNS:*.pamx1.hotmail.com
- | Issuer: commonName=GlobalSign Organization Validation CA - SHA256 - G3/organizationName=GlobalSign nv-sa/countryName=BE
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2020-02-24T18:33:10
- | Not valid after: 2022-02-24T18:33:10
- | MD5: 4f90 9eee 29eb abe5 e29a d55e 8c08 c310
- |_SHA-1: ea85 9504 40a6 97c1 8482 3304 a7dc 19e5 fcd5 8e6b
- |_ssl-date: 2020-03-31T04:46:05+00:00; -1s from scanner time.
- OS Info: Service Info: Host: CWLGBR01FT007.mail.protection.outlook.com; OS: Windows; CPE: cpe:/o:microsoft:windows
- |_clock-skew: -1s
- WebCrawling domain's web servers... up to 50 max links.
- + URL to crawl: http://www2.cityoflondon.gov.uk.
- + Date: 2020-03-31
- + Crawling URL: http://www2.cityoflondon.gov.uk.:
- + Links:
- + Crawling http://www2.cityoflondon.gov.uk. (400 Bad Request)
- + Searching for directories...
- + Searching open folders...
- + URL to crawl: https://www2.cityoflondon.gov.uk.
- + Date: 2020-03-31
- + Crawling URL: https://www2.cityoflondon.gov.uk.:
- + Links:
- + Crawling https://www2.cityoflondon.gov.uk. ([SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:727))
- + Searching for directories...
- + Searching open folders...
- + URL to crawl: http://www.cityoflondon.gov.uk.
- + Date: 2020-03-31
- + Crawling URL: http://www.cityoflondon.gov.uk.:
- + Links:
- + Crawling http://www.cityoflondon.gov.uk.
- + Searching for directories...
- + Searching open folders...
- + URL to crawl: https://www.cityoflondon.gov.uk.
- + Date: 2020-03-31
- + Crawling URL: https://www.cityoflondon.gov.uk.:
- + Links:
- + Crawling https://www.cityoflondon.gov.uk.
- + Searching for directories...
- + Searching open folders...
- --Finished--
- Summary information for domain cityoflondon.gov.uk.
- -----------------------------------------
- Domain Specific Information:
- Email: thecitycentre@cityoflondon.gov.uk.
- Email: Susan.Pearson@cityoflondon.gov.uk&
- Email: Wootton@cityoflondon.gov.uk&
- Email: kevin.mulcahy@cityoflondon.gov.uk
- Email: bankarea@cityoflondon.gov.uk]
- Email: artizanlib@cityoflondon.gov.uk.
- Email: LADO@cityoflondon.gov.uk
- Email: vicki.wells@cityoflondon.gov.uk.
- Email: citybridgetrust@cityoflondon.gov.uk
- Email: pro@cityoflondon.gov.uk�
- Email: roger.gifford@cityoflondon.gov.uk.
- Email: kevin.mulcahy@cityoflondon.gov.uk�
- Email: Sukhjit.Gill@cityoflondon.gov.uk.
- Email: zoe.nation@cityoflondon.gov.uk
- Email: Sukhjit.Gill@cityoflondon.gov.uk
- Email: zoe.nation@cityoflondon.gov.uk�
- Email: joanna.burnaby-atkins@cityoflondon.gov.uk. - Is this real?
- Email: Vicki.Wells@cityoflondon.gov.uk]
- Email: michael.bennett@cityoflondon.gov.uk:
- Email: citybridgetrust@cityoflondon.gov.uk.
- Email: barbicanlib@cityoflondon.gov.uk.
- Domain Ips Information:
- IP: 52.100.0.0
- Type: SPF
- Is Active: False
- IP: 52.200.59.0
- Type: SPF
- Is Active: False
- IP: 148.105.0.0
- Type: SPF
- Is Active: False
- IP: 162.159.38.116
- HostName: treasure.ns.cloudflare.com Type: NS
- HostName: treasure.ns.cloudflare.com Type: PTR
- Country: None
- Is Active: True (echo-reply ttl 59)
- Port: 53/tcp open domain syn-ack ttl 59 (unknown banner: 20171212)
- Script Info: | dns-nsid:
- Script Info: | NSID: 20m391 (32306d333931)
- Script Info: | id.server: AMS
- Script Info: |_ bind.version: 20171212
- Script Info: | fingerprint-strings:
- Script Info: | DNSVersionBindReqTCP:
- Script Info: | version
- Script Info: | bind
- Script Info: |_ 20171212
- IP: 74.63.212.0
- Type: SPF
- Is Active: False
- IP: 148.105.8.0
- Type: SPF
- Is Active: False
- IP: 205.201.128.0
- Type: SPF
- Type: SPF
- Is Active: True (syn-ack ttl 58)
- Port: 25/tcp open smtp syn-ack ttl 58 Postfix smtpd
- Script Info: |_smtp-commands: pmta45.mailchimp.prod.atl01.rsglab.com, PIPELINING, SIZE 10240000, ENHANCEDSTATUSCODES, 8BITMIME, SMTPUTF8,
- Port: 80/tcp open http syn-ack ttl 58 nginx 1.8.1
- Script Info: | http-methods:
- Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
- Script Info: |_http-server-header: nginx/1.8.1
- Script Info: |_http-title: Did not follow redirect to https://mailchimp.com/about/mcsv-static
- Os Info: Host: pmta45.mailchimp.prod.atl01.rsglab.com
- IP: 80.169.89.98
- HostName: www2.cityoflondon.gov.uk. Type: A
- Country: United Kingdom
- Is Active: True (syn-ack ttl 117)
- Port: 80/tcp open http syn-ack ttl 117 Microsoft IIS httpd 10.0
- Script Info: | http-methods:
- Script Info: | Supported Methods: OPTIONS TRACE GET HEAD POST
- Script Info: |_ Potentially risky methods: TRACE
- Script Info: |_http-server-header: Microsoft-IIS/10.0
- Script Info: |_http-title: IIS Windows Server
- Port: 443/tcp open ssl/http syn-ack ttl 117 Microsoft IIS httpd 10.0
- Script Info: | http-methods:
- Script Info: | Supported Methods: OPTIONS TRACE GET HEAD POST
- Script Info: |_ Potentially risky methods: TRACE
- Script Info: |_http-server-header: Microsoft-IIS/10.0
- Script Info: |_http-title: IIS Windows Server
- Script Info: | ssl-cert: Subject: commonName=WMSvc-SHA2-COL-VMW-P-LIM01
- Script Info: | Issuer: commonName=WMSvc-SHA2-COL-VMW-P-LIM01
- Script Info: | Public Key type: rsa
- Script Info: | Public Key bits: 2048
- Script Info: | Signature Algorithm: sha256WithRSAEncryption
- Script Info: | Not valid before: 2020-01-09T15:25:04
- Script Info: | Not valid after: 2030-01-06T15:25:04
- Script Info: | MD5: b2e4 3b70 c10c ffc8 c699 3005 94ab 1fe1
- Script Info: |_SHA-1: 8b35 9e30 d522 59a4 b205 a607 4cfa 5a0e df4f dc13
- Script Info: |_ssl-date: 2020-03-31T04:40:55+00:00; +3m45s from scanner time.
- Script Info: | tls-alpn:
- Script Info: | h2
- Script Info: |_ http/1.1
- Os Info: OS: Windows; CPE: cpe:/o:microsoft:windows
- Script Info: |_clock-skew: 3m44s
- IP: 66.240.227.0
- Type: SPF
- Is Active: False
- IP: 86.111.216.0
- Type: SPF
- Is Active: False
- IP: 198.2.128.0
- Type: SPF
- Type: SPF
- Is Active: True (reset ttl 58)
- Port: 80/tcp open http syn-ack ttl 58 nginx 1.6.1
- Script Info: |_http-server-header: nginx/1.6.1
- Script Info: |_http-title: 403 Forbidden
- Script Info: Device type: general purpose|storage-misc|broadband router|router|WAP
- Script Info: Running (JUST GUESSING): Linux 2.6.X|3.X (93%), HP embedded (90%), MikroTik RouterOS 6.X (89%), Ubiquiti AirOS 5.X (89%), Ubiquiti embedded (87%), Ruckus embedded (87%), AVM FritzOS 6.X (87%)
- IP: 34.245.210.0
- Type: SPF
- Type: SPF
- Is Active: False
- IP: 63.143.59.128
- Type: SPF
- Is Active: False
- IP: 85.115.32.0
- Type: SPF
- Is Active: False
- IP: 80.169.89.85
- Type: SPF
- Is Active: False
- IP: 89.145.127.252
- Type: SPF
- Is Active: True (echo-reply ttl 56)
- IP: 63.143.57.128
- Type: SPF
- Is Active: False
- IP: 104.47.21.36
- HostName: cityoflondon-gov-uk.mail.protection.outlook.com Type: MX
- HostName: mail-lo2gbr010036.inbound.protection.outlook.com Type: PTR
- Country: United Kingdom
- Is Active: True (syn-ack ttl 115)
- Port: 25/tcp open smtp syn-ack ttl 115 Microsoft Exchange smtpd
- Script Info: | smtp-commands: LO2GBR01FT005.mail.protection.outlook.com Hello [45.131.5.15], SIZE 157286400, PIPELINING, DSN, ENHANCEDSTATUSCODES, STARTTLS, 8BITMIME, BINARYMIME, CHUNKING, SMTPUTF8,
- Script Info: |_ This server supports the following commands: HELO EHLO STARTTLS RCPT DATA RSET MAIL QUIT HELP AUTH BDAT
- Script Info: | ssl-cert: Subject: commonName=mail.protection.outlook.com/organizationName=Microsoft Corporation/stateOrProvinceName=Washington/countryName=US
- Script Info: | Subject Alternative Name: DNS:mail.protection.outlook.com, DNS:*.mail.eo.outlook.com, DNS:*.mail.protection.outlook.com, DNS:mail.messaging.microsoft.com, DNS:outlook.com, DNS:*.olc.protection.outlook.com, DNS:*.pamx1.hotmail.com
- Script Info: | Issuer: commonName=GlobalSign Organization Validation CA - SHA256 - G3/organizationName=GlobalSign nv-sa/countryName=BE
- Script Info: | Public Key type: rsa
- Script Info: | Public Key bits: 2048
- Script Info: | Signature Algorithm: sha256WithRSAEncryption
- Script Info: | Not valid before: 2020-02-24T18:33:10
- Script Info: | Not valid after: 2022-02-24T18:33:10
- Script Info: | MD5: 4f90 9eee 29eb abe5 e29a d55e 8c08 c310
- Script Info: |_SHA-1: ea85 9504 40a6 97c1 8482 3304 a7dc 19e5 fcd5 8e6b
- Script Info: |_ssl-date: 2020-03-31T04:38:16+00:00; -1s from scanner time.
- Os Info: Host: LO2GBR01FT012.mail.protection.outlook.com; OS: Windows; CPE: cpe:/o:microsoft:windows
- Script Info: |_clock-skew: -1s
- IP: 192.151.176.0
- Type: SPF
- Is Active: False
- IP: 84.45.34.163
- Type: SPF
- Is Active: True (echo-reply ttl 56)
- IP: 212.50.171.0
- Type: SPF
- Is Active: True (abort ttl 244)
- IP: 135.84.216.0
- Type: SPF
- Is Active: False
- IP: 40.107.0.0
- Type: SPF
- Is Active: False
- IP: 173.245.59.122
- HostName: jake.ns.cloudflare.com Type: NS
- HostName: jake.ns.cloudflare.com Type: PTR
- Country: United States
- Is Active: True (echo-reply ttl 59)
- Port: 53/tcp open domain syn-ack ttl 59 (unknown banner: 20171212)
- Script Info: | dns-nsid:
- Script Info: | NSID: 20m226 (32306d323236)
- Script Info: | id.server: AMS
- Script Info: |_ bind.version: 20171212
- Script Info: | fingerprint-strings:
- Script Info: | DNSVersionBindReqTCP:
- Script Info: | version
- Script Info: | bind
- Script Info: |_ 20171212
- IP: 40.92.0.0
- Type: SPF
- Is Active: False
- IP: 196.216.238.0
- Type: SPF
- Is Active: False
- IP: 80.169.89.109
- Type: SPF
- Is Active: False
- IP: 116.50.56.0
- Type: SPF
- Is Active: False
- IP: 208.87.232.0
- Type: SPF
- Is Active: False
- IP: 80.169.89.102
- HostName: www.cityoflondon.gov.uk. Type: A
- Country: United Kingdom
- Is Active: True (syn-ack ttl 53)
- Port: 80/tcp open http syn-ack ttl 53 COL-VMW-M-LB02
- Script Info: | fingerprint-strings:
- Script Info: | FourOhFourRequest:
- Script Info: | HTTP/1.1 301 Moved Permanently
- Script Info: | Location: https:///nice%20ports%2C/Tri%6Eity.txt%2ebak
- Script Info: | Server: COL-VMW-M-LB02
- Script Info: | Cache-Control: no-cache
- Script Info: | Connection: close
- Script Info: | GenericLines:
- Script Info: | HTTP/1.1 301 Moved Permanently
- Script Info: | Location: https://
- Script Info: | Server: COL-VMW-M-LB02
- Script Info: | Cache-Control: no-cache
- Script Info: | Connection: close
- Script Info: | GetRequest, HTTPOptions, RTSPRequest:
- Script Info: | HTTP/1.1 301 Moved Permanently
- Script Info: | Location: https:///
- Script Info: | Server: COL-VMW-M-LB02
- Script Info: | Cache-Control: no-cache
- Script Info: | Connection: close
- Script Info: | SIPOptions:
- Script Info: | HTTP/1.1 301 Moved Permanently
- Script Info: | Location: https://sip:nm
- Script Info: | Server: COL-VMW-M-LB02
- Script Info: | Cache-Control: no-cache
- Script Info: |_ Connection: close
- Script Info: | http-methods:
- Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
- Script Info: |_http-server-header: COL-VMW-M-LB02
- Script Info: |_http-title: Did not follow redirect to https://80.169.89.102/
- Script Info: |_https-redirect: ERROR: Script execution failed (use -d to debug)
- Port: 443/tcp open ssl/http syn-ack ttl 53 Microsoft IIS httpd 7.5
- Script Info: | http-methods:
- Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
- Script Info: |_http-server-header: Microsoft-IIS/7.5
- Script Info: | http-title: Welcome to the City of London Corporation
- Script Info: |_Requested resource was https://80.169.89.102/Pages/default.aspx
- Script Info: | ssl-cert: Subject: commonName=*.cityoflondon.gov.uk/organizationName=City of London Corporation/countryName=GB
- Script Info: | Subject Alternative Name: DNS:*.cityoflondon.gov.uk, DNS:cityoflondon.gov.uk
- Script Info: | Issuer: commonName=Entrust Certification Authority - L1K/organizationName=Entrust, Inc./countryName=US
- Script Info: | Public Key type: rsa
- Script Info: | Public Key bits: 2048
- Script Info: | Signature Algorithm: sha256WithRSAEncryption
- Script Info: | Not valid before: 2019-01-09T10:15:04
- Script Info: | Not valid after: 2021-01-09T10:45:03
- Script Info: | MD5: 4f24 791b 0cf7 72b6 48e0 faac 5dd4 3c66
- Script Info: |_SHA-1: 414c 9a2c e74f b30a 5c45 a40d 2288 a043 93d7 4d99
- Script Info: |_ssl-date: TLS randomness does not represent time
- Os Info: OS: Windows; CPE: cpe:/o:microsoft:windows
- IP: 80.169.89.106
- Type: SPF
- Is Active: True (syn-ack ttl 117)
- Port: 80/tcp open http syn-ack ttl 117 Microsoft IIS httpd 8.5
- Script Info: | http-methods:
- Script Info: | Supported Methods: OPTIONS TRACE GET HEAD POST
- Script Info: |_ Potentially risky methods: TRACE
- Script Info: |_http-server-header: Microsoft-IIS/8.5
- Script Info: |_http-title: 403 - Forbidden: Access is denied.
- Port: 443/tcp open ssl/https? syn-ack ttl 117
- Script Info: |_ssl-date: 2020-03-31T04:47:53+00:00; +3m45s from scanner time.
- Os Info: OS: Windows; CPE: cpe:/o:microsoft:windows
- Script Info: |_clock-skew: 3m44s
- IP: 104.47.0.0
- Type: SPF
- Is Active: False
- IP: 132.174.100.127
- Type: SPF
- Is Active: False
- IP: 216.98.158.0
- Type: SPF
- Is Active: False
- IP: 23.227.38.64
- Type: SPF
- Is Active: True (echo-reply ttl 59)
- Port: 80/tcp open http syn-ack ttl 59 cloudflare
- Script Info: | fingerprint-strings:
- Script Info: | FourOhFourRequest:
- Script Info: | HTTP/1.1 400 Bad Request
- Script Info: | Date: Tue, 31 Mar 2020 04:45:17 GMT
- Script Info: | Content-Type: text/html
- Script Info: | Content-Length: 155
- Script Info: | Connection: close
- Script Info: | Server: cloudflare
- Script Info: | CF-RAY: 57c76b857cf3faa0-AMS
- Script Info: | <html>
- Script Info: | <head><title>400 Bad Request</title></head>
- Script Info: | <body>
- Script Info: | <center><h1>400 Bad Request</h1></center>
- Script Info: | <hr><center>cloudflare</center>
- Script Info: | </body>
- Script Info: | </html>
- Script Info: | GetRequest:
- Script Info: | HTTP/1.1 400 Bad Request
- Script Info: | Date: Tue, 31 Mar 2020 04:45:16 GMT
- Script Info: | Content-Type: text/html
- Script Info: | Content-Length: 155
- Script Info: | Connection: close
- Script Info: | Server: cloudflare
- Script Info: | CF-RAY: 57c76b800fb19ccf-AMS
- Script Info: | <html>
- Script Info: | <head><title>400 Bad Request</title></head>
- Script Info: | <body>
- Script Info: | <center><h1>400 Bad Request</h1></center>
- Script Info: | <hr><center>cloudflare</center>
- Script Info: | </body>
- Script Info: | </html>
- Script Info: | HTTPOptions:
- Script Info: | HTTP/1.1 400 Bad Request
- Script Info: | Date: Tue, 31 Mar 2020 04:45:16 GMT
- Script Info: | Content-Type: text/html
- Script Info: | Content-Length: 155
- Script Info: | Connection: close
- Script Info: | Server: cloudflare
- Script Info: | CF-RAY: 57c76b81791dd8c9-AMS
- Script Info: | <html>
- Script Info: | <head><title>400 Bad Request</title></head>
- Script Info: | <body>
- Script Info: | <center><h1>400 Bad Request</h1></center>
- Script Info: | <hr><center>cloudflare</center>
- Script Info: | </body>
- Script Info: | </html>
- Script Info: | RPCCheck:
- Script Info: | HTTP/1.1 400 Bad Request
- Script Info: | Server: cloudflare
- Script Info: | Date: Tue, 31 Mar 2020 04:45:22 GMT
- Script Info: | Content-Type: text/html
- Script Info: | Content-Length: 155
- Script Info: | Connection: close
- Script Info: | CF-RAY: -
- Script Info: | <html>
- Script Info: | <head><title>400 Bad Request</title></head>
- Script Info: | <body>
- Script Info: | <center><h1>400 Bad Request</h1></center>
- Script Info: | <hr><center>cloudflare</center>
- Script Info: | </body>
- Script Info: | </html>
- Script Info: | RTSPRequest:
- Script Info: | <html>
- Script Info: | <head><title>400 Bad Request</title></head>
- Script Info: | <body>
- Script Info: | <center><h1>400 Bad Request</h1></center>
- Script Info: | <hr><center>cloudflare</center>
- Script Info: | </body>
- Script Info: | </html>
- Script Info: | X11Probe:
- Script Info: | HTTP/1.1 400 Bad Request
- Script Info: | Server: cloudflare
- Script Info: | Date: Tue, 31 Mar 2020 04:45:16 GMT
- Script Info: | Content-Type: text/html
- Script Info: | Content-Length: 155
- Script Info: | Connection: close
- Script Info: | CF-RAY: -
- Script Info: | <html>
- Script Info: | <head><title>400 Bad Request</title></head>
- Script Info: | <body>
- Script Info: | <center><h1>400 Bad Request</h1></center>
- Script Info: | <hr><center>cloudflare</center>
- Script Info: | </body>
- Script Info: |_ </html>
- Script Info: |_http-server-header: cloudflare
- Script Info: |_http-title: Site doesn't have a title (text/plain; charset=UTF-8).
- Port: 443/tcp open ssl/https syn-ack ttl 59 cloudflare
- Script Info: | fingerprint-strings:
- Script Info: | FourOhFourRequest:
- Script Info: | HTTP/1.1 403 Forbidden
- Script Info: | Server: cloudflare
- Script Info: | Date: Tue, 31 Mar 2020 04:45:23 GMT
- Script Info: | Content-Type: text/html
- Script Info: | Content-Length: 151
- Script Info: | Connection: close
- Script Info: | CF-RAY: 57c76bad182bfaac-AMS
- Script Info: | <html>
- Script Info: | <head><title>403 Forbidden</title></head>
- Script Info: | <body>
- Script Info: | <center><h1>403 Forbidden</h1></center>
- Script Info: | <hr><center>cloudflare</center>
- Script Info: | </body>
- Script Info: | </html>
- Script Info: | GetRequest:
- Script Info: | HTTP/1.1 403 Forbidden
- Script Info: | Server: cloudflare
- Script Info: | Date: Tue, 31 Mar 2020 04:45:22 GMT
- Script Info: | Content-Type: text/html
- Script Info: | Content-Length: 151
- Script Info: | Connection: close
- Script Info: | CF-RAY: 57c76ba7af85fa5c-AMS
- Script Info: | <html>
- Script Info: | <head><title>403 Forbidden</title></head>
- Script Info: | <body>
- Script Info: | <center><h1>403 Forbidden</h1></center>
- Script Info: | <hr><center>cloudflare</center>
- Script Info: | </body>
- Script Info: | </html>
- Script Info: | HTTPOptions:
- Script Info: | HTTP/1.1 403 Forbidden
- Script Info: | Server: cloudflare
- Script Info: | Date: Tue, 31 Mar 2020 04:45:22 GMT
- Script Info: | Content-Type: text/html
- Script Info: | Content-Length: 151
- Script Info: | Connection: close
- Script Info: | CF-RAY: 57c76baa6b02d8f5-AMS
- Script Info: | <html>
- Script Info: | <head><title>403 Forbidden</title></head>
- Script Info: | <body>
- Script Info: | <center><h1>403 Forbidden</h1></center>
- Script Info: | <hr><center>cloudflare</center>
- Script Info: | </body>
- Script Info: | </html>
- Script Info: | RPCCheck:
- Script Info: | HTTP/1.1 400 Bad Request
- Script Info: | Server: cloudflare
- Script Info: | Date: Tue, 31 Mar 2020 04:45:29 GMT
- Script Info: | Content-Type: text/html
- Script Info: | Content-Length: 155
- Script Info: | Connection: close
- Script Info: | CF-RAY: -
- Script Info: | <html>
- Script Info: | <head><title>400 Bad Request</title></head>
- Script Info: | <body>
- Script Info: | <center><h1>400 Bad Request</h1></center>
- Script Info: | <hr><center>cloudflare</center>
- Script Info: | </body>
- Script Info: | </html>
- Script Info: | RTSPRequest:
- Script Info: | <html>
- Script Info: | <head><title>400 Bad Request</title></head>
- Script Info: | <body>
- Script Info: | <center><h1>400 Bad Request</h1></center>
- Script Info: | <hr><center>cloudflare</center>
- Script Info: | </body>
- Script Info: | </html>
- Script Info: | tor-versions:
- Script Info: | HTTP/1.1 400 Bad Request
- Script Info: | Server: cloudflare
- Script Info: | Date: Tue, 31 Mar 2020 04:45:23 GMT
- Script Info: | Content-Type: text/html
- Script Info: | Content-Length: 155
- Script Info: | Connection: close
- Script Info: | CF-RAY: -
- Script Info: | <html>
- Script Info: | <head><title>400 Bad Request</title></head>
- Script Info: | <body>
- Script Info: | <center><h1>400 Bad Request</h1></center>
- Script Info: | <hr><center>cloudflare</center>
- Script Info: | </body>
- Script Info: |_ </html>
- Script Info: |_http-server-header: cloudflare
- Script Info: |_http-title: 403 Forbidden
- Script Info: | ssl-cert: Subject: commonName=*.myshopify.com/organizationName=CloudFlare, Inc./stateOrProvinceName=CA/countryName=US
- Script Info: | Subject Alternative Name: DNS:myshopify.com, DNS:*.myshopify.com
- Script Info: | Issuer: commonName=CloudFlare Inc ECC CA-2/organizationName=CloudFlare, Inc./stateOrProvinceName=CA/countryName=US
- Script Info: | Public Key type: ec
- Script Info: | Public Key bits: 256
- Script Info: | Signature Algorithm: ecdsa-with-SHA256
- Script Info: | Not valid before: 2019-05-02T00:00:00
- Script Info: | Not valid after: 2020-05-02T12:00:00
- Script Info: | MD5: fe65 4aba cdcd ccaf a90d 23a3 d4f1 32ac
- Script Info: |_SHA-1: 8381 f18f 5e77 f549 a0f0 3adf 21d7 a486 0b73 85ac
- Script Info: |_ssl-date: 2020-03-31T04:45:48+00:00; -2s from scanner time.
- Script Info: | tls-alpn:
- Script Info: | h2
- Script Info: |_ http/1.1
- Script Info: | tls-nextprotoneg:
- Script Info: | h2
- Script Info: |_ http/1.1
- Port: 8080/tcp open http-proxy syn-ack ttl 59 cloudflare
- Script Info: | fingerprint-strings:
- Script Info: | FourOhFourRequest:
- Script Info: | HTTP/1.1 400 Bad Request
- Script Info: | Date: Tue, 31 Mar 2020 04:45:16 GMT
- Script Info: | Content-Type: text/html
- Script Info: | Content-Length: 155
- Script Info: | Connection: close
- Script Info: | Server: cloudflare
- Script Info: | CF-RAY: 57c76b841bb9fa54-AMS
- Script Info: | <html>
- Script Info: | <head><title>400 Bad Request</title></head>
- Script Info: | <body>
- Script Info: | <center><h1>400 Bad Request</h1></center>
- Script Info: | <hr><center>cloudflare</center>
- Script Info: | </body>
- Script Info: | </html>
- Script Info: | GetRequest:
- Script Info: | HTTP/1.1 400 Bad Request
- Script Info: | Date: Tue, 31 Mar 2020 04:45:16 GMT
- Script Info: | Content-Type: text/html
- Script Info: | Content-Length: 155
- Script Info: | Connection: close
- Script Info: | Server: cloudflare
- Script Info: | CF-RAY: 57c76b800d5a9d36-AMS
- Script Info: | <html>
- Script Info: | <head><title>400 Bad Request</title></head>
- Script Info: | <body>
- Script Info: | <center><h1>400 Bad Request</h1></center>
- Script Info: | <hr><center>cloudflare</center>
- Script Info: | </body>
- Script Info: | </html>
- Script Info: | HTTPOptions:
- Script Info: | HTTP/1.1 400 Bad Request
- Script Info: | Date: Tue, 31 Mar 2020 04:45:16 GMT
- Script Info: | Content-Type: text/html
- Script Info: | Content-Length: 155
- Script Info: | Connection: close
- Script Info: | Server: cloudflare
- Script Info: | CF-RAY: 57c76b816a842b38-AMS
- Script Info: | <html>
- Script Info: | <head><title>400 Bad Request</title></head>
- Script Info: | <body>
- Script Info: | <center><h1>400 Bad Request</h1></center>
- Script Info: | <hr><center>cloudflare</center>
- Script Info: | </body>
- Script Info: | </html>
- Script Info: | RTSPRequest:
- Script Info: | <html>
- Script Info: | <head><title>400 Bad Request</title></head>
- Script Info: | <body>
- Script Info: | <center><h1>400 Bad Request</h1></center>
- Script Info: | <hr><center>cloudflare</center>
- Script Info: | </body>
- Script Info: | </html>
- Script Info: | Socks4, Socks5:
- Script Info: | HTTP/1.1 400 Bad Request
- Script Info: | Server: cloudflare
- Script Info: | Date: Tue, 31 Mar 2020 04:45:17 GMT
- Script Info: | Content-Type: text/html
- Script Info: | Content-Length: 155
- Script Info: | Connection: close
- Script Info: | CF-RAY: -
- Script Info: | <html>
- Script Info: | <head><title>400 Bad Request</title></head>
- Script Info: | <body>
- Script Info: | <center><h1>400 Bad Request</h1></center>
- Script Info: | <hr><center>cloudflare</center>
- Script Info: | </body>
- Script Info: |_ </html>
- Script Info: |_http-server-header: cloudflare
- Script Info: |_http-title: Site doesn't have a title (text/plain; charset=UTF-8).
- Port: 8443/tcp open ssl/https-alt syn-ack ttl 59 cloudflare
- Script Info: | fingerprint-strings:
- Script Info: | DNSVersionBindReqTCP, RPCCheck:
- Script Info: | HTTP/1.1 400 Bad Request
- Script Info: | Server: cloudflare
- Script Info: | Date: Tue, 31 Mar 2020 04:45:29 GMT
- Script Info: | Content-Type: text/html
- Script Info: | Content-Length: 155
- Script Info: | Connection: close
- Script Info: | CF-RAY: -
- Script Info: | <html>
- Script Info: | <head><title>400 Bad Request</title></head>
- Script Info: | <body>
- Script Info: | <center><h1>400 Bad Request</h1></center>
- Script Info: | <hr><center>cloudflare</center>
- Script Info: | </body>
- Script Info: | </html>
- Script Info: | FourOhFourRequest:
- Script Info: | HTTP/1.1 403 Forbidden
- Script Info: | Server: cloudflare
- Script Info: | Date: Tue, 31 Mar 2020 04:45:23 GMT
- Script Info: | Content-Type: text/html
- Script Info: | Content-Length: 151
- Script Info: | Connection: close
- Script Info: | CF-RAY: 57c76bad0db9d92d-AMS
- Script Info: | <html>
- Script Info: | <head><title>403 Forbidden</title></head>
- Script Info: | <body>
- Script Info: | <center><h1>403 Forbidden</h1></center>
- Script Info: | <hr><center>cloudflare</center>
- Script Info: | </body>
- Script Info: | </html>
- Script Info: | GetRequest:
- Script Info: | HTTP/1.1 403 Forbidden
- Script Info: | Server: cloudflare
- Script Info: | Date: Tue, 31 Mar 2020 04:45:22 GMT
- Script Info: | Content-Type: text/html
- Script Info: | Content-Length: 151
- Script Info: | Connection: close
- Script Info: | CF-RAY: 57c76ba7af2d727b-AMS
- Script Info: | <html>
- Script Info: | <head><title>403 Forbidden</title></head>
- Script Info: | <body>
- Script Info: | <center><h1>403 Forbidden</h1></center>
- Script Info: | <hr><center>cloudflare</center>
- Script Info: | </body>
- Script Info: | </html>
- Script Info: | HTTPOptions:
- Script Info: | HTTP/1.1 403 Forbidden
- Script Info: | Server: cloudflare
- Script Info: | Date: Tue, 31 Mar 2020 04:45:22 GMT
- Script Info: | Content-Type: text/html
- Script Info: | Content-Length: 151
- Script Info: | Connection: close
- Script Info: | CF-RAY: 57c76baa68cafa40-AMS
- Script Info: | <html>
- Script Info: | <head><title>403 Forbidden</title></head>
- Script Info: | <body>
- Script Info: | <center><h1>403 Forbidden</h1></center>
- Script Info: | <hr><center>cloudflare</center>
- Script Info: | </body>
- Script Info: | </html>
- Script Info: | RTSPRequest:
- Script Info: | <html>
- Script Info: | <head><title>400 Bad Request</title></head>
- Script Info: | <body>
- Script Info: | <center><h1>400 Bad Request</h1></center>
- Script Info: | <hr><center>cloudflare</center>
- Script Info: | </body>
- Script Info: |_ </html>
- Script Info: |_http-server-header: cloudflare
- Script Info: |_http-title: 403 Forbidden
- Script Info: | ssl-cert: Subject: commonName=*.myshopify.com/organizationName=CloudFlare, Inc./stateOrProvinceName=CA/countryName=US
- Script Info: | Subject Alternative Name: DNS:myshopify.com, DNS:*.myshopify.com
- Script Info: | Issuer: commonName=CloudFlare Inc ECC CA-2/organizationName=CloudFlare, Inc./stateOrProvinceName=CA/countryName=US
- Script Info: | Public Key type: ec
- Script Info: | Public Key bits: 256
- Script Info: | Signature Algorithm: ecdsa-with-SHA256
- Script Info: | Not valid before: 2019-05-02T00:00:00
- Script Info: | Not valid after: 2020-05-02T12:00:00
- Script Info: | MD5: fe65 4aba cdcd ccaf a90d 23a3 d4f1 32ac
- Script Info: |_SHA-1: 8381 f18f 5e77 f549 a0f0 3adf 21d7 a486 0b73 85ac
- Script Info: |_ssl-date: 2020-03-31T04:45:48+00:00; -2s from scanner time.
- Script Info: | tls-alpn:
- Script Info: | h2
- Script Info: |_ http/1.1
- Script Info: | tls-nextprotoneg:
- Script Info: | h2
- Script Info: |_ http/1.1
- IP: 80.169.89.96
- HostName: www1.cityoflondon.gov.uk. Type: A
- Country: United Kingdom
- Is Active: False
- IP: 104.47.20.36
- HostName: cityoflondon-gov-uk.mail.protection.outlook.com Type: MX
- HostName: mail-cwlgbr010036.inbound.protection.outlook.com Type: PTR
- Country: United Kingdom
- Is Active: True (syn-ack ttl 112)
- Port: 25/tcp open smtp syn-ack ttl 112 Microsoft Exchange smtpd
- Script Info: | smtp-commands: CWLGBR01FT007.mail.protection.outlook.com Hello [45.131.5.15], SIZE 157286400, PIPELINING, DSN, ENHANCEDSTATUSCODES, STARTTLS, 8BITMIME, BINARYMIME, CHUNKING, SMTPUTF8,
- Script Info: |_ This server supports the following commands: HELO EHLO STARTTLS RCPT DATA RSET MAIL QUIT HELP AUTH BDAT
- Script Info: | ssl-cert: Subject: commonName=mail.protection.outlook.com/organizationName=Microsoft Corporation/stateOrProvinceName=Washington/countryName=US
- Script Info: | Subject Alternative Name: DNS:mail.protection.outlook.com, DNS:*.mail.eo.outlook.com, DNS:*.mail.protection.outlook.com, DNS:mail.messaging.microsoft.com, DNS:outlook.com, DNS:*.olc.protection.outlook.com, DNS:*.pamx1.hotmail.com
- Script Info: | Issuer: commonName=GlobalSign Organization Validation CA - SHA256 - G3/organizationName=GlobalSign nv-sa/countryName=BE
- Script Info: | Public Key type: rsa
- Script Info: | Public Key bits: 2048
- Script Info: | Signature Algorithm: sha256WithRSAEncryption
- Script Info: | Not valid before: 2020-02-24T18:33:10
- Script Info: | Not valid after: 2022-02-24T18:33:10
- Script Info: | MD5: 4f90 9eee 29eb abe5 e29a d55e 8c08 c310
- Script Info: |_SHA-1: ea85 9504 40a6 97c1 8482 3304 a7dc 19e5 fcd5 8e6b
- Script Info: |_ssl-date: 2020-03-31T04:46:05+00:00; -1s from scanner time.
- Os Info: Host: CWLGBR01FT007.mail.protection.outlook.com; OS: Windows; CPE: cpe:/o:microsoft:windows
- Script Info: |_clock-skew: -1s
- --------------End Summary --------------
- -----------------------------------------
- ##############################################################################################################################
- [+] searching (sub)domains for cityoflondon.gov.uk using built-in wordlist
- [+] using maximum random delay of 10 millisecond(s) between requests
- cn.cityoflondon.gov.uk
- IP address #1: 80.169.89.102
- demo.cityoflondon.gov.uk
- IP address #1: 80.169.89.101
- email.cityoflondon.gov.uk
- IP address #1: 91.206.118.10
- m.cityoflondon.gov.uk
- IP address #1: 80.169.89.82
- mobile.cityoflondon.gov.uk
- IP address #1: 80.169.89.102
- news.cityoflondon.gov.uk
- IP address #1: 18.203.123.9
- IP address #2: 52.50.147.113
- IP address #3: 52.31.6.52
- remote.cityoflondon.gov.uk
- IP address #1: 52.59.241.213
- shop.cityoflondon.gov.uk
- IP address #1: 23.227.38.32
- staging.cityoflondon.gov.uk
- IPv6 address #1: 2606:4700:10::6816:ea6
- IPv6 address #2: 2606:4700:10::6816:fa6
- staging.cityoflondon.gov.uk
- IP address #1: 104.22.14.166
- IP address #2: 104.22.15.166
- vpn.cityoflondon.gov.uk
- IP address #1: 86.54.176.2
- www.cityoflondon.gov.uk
- IP address #1: 80.169.89.102
- www1.cityoflondon.gov.uk
- IP address #1: 80.169.89.96
- www2.cityoflondon.gov.uk
- IP address #1: 80.169.89.98
- [+] 14 (sub)domains and 18 IP address(es) found
- [+] completion time: 956 second(s)
- ###############################################################################################################################
- ----- cityoflondon.gov.uk -----
- Host's addresses:
- __________________
- cityoflondon.gov.uk. 300 IN A 80.169.89.102
- Name Servers:
- ______________
- treasure.ns.cloudflare.com. 86400 IN A 162.159.38.116
- jake.ns.cloudflare.com. 86400 IN A 173.245.59.122
- Mail (MX) Servers:
- ___________________
- cityoflondon-gov-uk.mail.protection.outlook.com. 10 IN A 104.47.21.36
- cityoflondon-gov-uk.mail.protection.outlook.com. 10 IN A 104.47.20.36
- Google Results:
- ________________
- democracy.cityoflondon.gov.uk. 300 IN A 80.169.89.107
- fyi.cityoflondon.gov.uk. 299 IN CNAME (
- fyi.cityoflondon.gov.uk.openobjects.com. 3599 IN CNAME (
- search4.openobjects.com. 3599 IN A 193.34.187.147
- Brute forcing with /usr/share/dnsenum/dns.txt:
- _______________________________________________
- apps.cityoflondon.gov.uk. 300 IN A 80.169.89.106
- ext.cityoflondon.gov.uk. 300 IN A 80.169.89.106
- jobs.cityoflondon.gov.uk. 300 IN A 104.22.15.166
- jobs.cityoflondon.gov.uk. 300 IN A 104.22.14.166
- mail1.cityoflondon.gov.uk. 300 IN A 80.169.89.80
- mail2.cityoflondon.gov.uk. 300 IN A 80.169.89.106
- mobile.cityoflondon.gov.uk. 300 IN A 80.169.89.102
- news.cityoflondon.gov.uk. 300 IN CNAME ssl-client.presspage.com.
- ssl-client.presspage.com. 60 IN A 18.203.123.9
- ssl-client.presspage.com. 60 IN A 52.31.6.52
- ssl-client.presspage.com. 60 IN A 52.50.147.113
- shop.cityoflondon.gov.uk. 260 IN A 23.227.38.32
- vpn.cityoflondon.gov.uk. 300 IN A 86.54.176.2
- www.cityoflondon.gov.uk. 77 IN A 80.169.89.102
- www2.cityoflondon.gov.uk. 300 IN A 80.169.89.98
- Launching Whois Queries:
- _________________________
- whois ip result: 23.227.38.0 -> 23.227.32.0/19
- whois ip result: 86.54.176.0 -> 86.54.176.0/29
- whois ip result: 104.22.14.0 -> 104.16.0.0/12
- whois ip result: 80.169.89.0 -> 80.169.89.0/30
- cityoflondon.gov.uk___________________
- 80.169.89.0/30
- 86.54.176.0/29
- 104.16.0.0/12
- 23.227.32.0/19
- ###############################################################################################################################
- URLCrazy Domain Report
- Domain : www.cityoflondon.gov.uk
- Keyboard : qwerty
- At : 2020-03-31 00:30:34 -0400
- # Please wait. 228 hostnames to process
- Typo Type Typo DNS-A CC-A DNS-MX Extn
- -----------------------------------------------------------------------------------------------------------------------------------------------------------------------
- Character Omission ww.cityoflondon.gov.uk ? gov.uk
- Character Omission www.citoflondon.gov.uk ? gov.uk
- Character Omission www.cityflondon.gov.uk ? gov.uk
- Character Omission www.cityoflndon.gov.uk ? gov.uk
- Character Omission www.cityoflodon.gov.uk ? gov.uk
- Character Omission www.cityoflondn.gov.uk ? gov.uk
- Character Omission www.cityoflondo.gov.uk ? gov.uk
- Character Omission www.cityoflonon.gov.uk ? gov.uk
- Character Omission www.cityofondon.gov.uk ? gov.uk
- Character Omission www.cityolondon.gov.uk ? gov.uk
- Character Omission www.ciyoflondon.gov.uk ? gov.uk
- Character Omission www.ctyoflondon.gov.uk ? gov.uk
- Character Omission www.ityoflondon.gov.uk ? gov.uk
- Character Omission wwwcityoflondon.gov.uk ? gov.uk
- Character Repeat www.ccityoflondon.gov.uk ? gov.uk
- Character Repeat www.ciityoflondon.gov.uk ? gov.uk
- Character Repeat www.cittyoflondon.gov.uk ? gov.uk
- Character Repeat www.cityofflondon.gov.uk ? gov.uk
- Character Repeat www.cityofllondon.gov.uk ? gov.uk
- Character Repeat www.cityoflonddon.gov.uk ? gov.uk
- Character Repeat www.cityoflondonn.gov.uk ? gov.uk
- Character Repeat www.cityoflondoon.gov.uk ? gov.uk
- Character Repeat www.cityoflonndon.gov.uk ? gov.uk
- Character Repeat www.cityofloondon.gov.uk ? gov.uk
- Character Repeat www.cityooflondon.gov.uk ? gov.uk
- Character Repeat www.cityyoflondon.gov.uk ? gov.uk
- Character Repeat wwww.cityoflondon.gov.uk ? gov.uk
- Character Swap ww.wcityoflondon.gov.uk ? gov.uk
- Character Swap www.citoyflondon.gov.uk ? gov.uk
- Character Swap www.cityfolondon.gov.uk ? gov.uk
- Character Swap www.cityoflnodon.gov.uk ? gov.uk
- Character Swap www.cityoflodnon.gov.uk ? gov.uk
- Character Swap www.cityoflondno.gov.uk ? gov.uk
- Character Swap www.cityoflonodn.gov.uk ? gov.uk
- Character Swap www.cityofolndon.gov.uk ? gov.uk
- Character Swap www.cityolfondon.gov.uk ? gov.uk
- Character Swap www.ciytoflondon.gov.uk ? gov.uk
- Character Swap www.ctiyoflondon.gov.uk ? gov.uk
- Character Swap www.ictyoflondon.gov.uk ? gov.uk
- Character Swap wwwc.ityoflondon.gov.uk ? gov.uk
- Character Replacement eww.cityoflondon.gov.uk ? gov.uk
- Character Replacement qww.cityoflondon.gov.uk ? gov.uk
- Character Replacement wew.cityoflondon.gov.uk ? gov.uk
- Character Replacement wqw.cityoflondon.gov.uk ? gov.uk
- Character Replacement wwe.cityoflondon.gov.uk ? gov.uk
- Character Replacement wwq.cityoflondon.gov.uk ? gov.uk
- Character Replacement www.ciryoflondon.gov.uk ? gov.uk
- Character Replacement www.cittoflondon.gov.uk ? gov.uk
- Character Replacement www.cituoflondon.gov.uk ? gov.uk
- Character Replacement www.cityiflondon.gov.uk ? gov.uk
- Character Replacement www.cityodlondon.gov.uk ? gov.uk
- Character Replacement www.cityofkondon.gov.uk ? gov.uk
- Character Replacement www.cityoflindon.gov.uk ? gov.uk
- Character Replacement www.cityoflobdon.gov.uk ? gov.uk
- Character Replacement www.cityoflomdon.gov.uk ? gov.uk
- Character Replacement www.cityoflondin.gov.uk ? gov.uk
- Character Replacement www.cityoflondob.gov.uk ? gov.uk
- Character Replacement www.cityoflondom.gov.uk ? gov.uk
- Character Replacement www.cityoflondpn.gov.uk ? gov.uk
- Character Replacement www.cityoflonfon.gov.uk ? gov.uk
- Character Replacement www.cityoflonson.gov.uk ? gov.uk
- Character Replacement www.cityoflpndon.gov.uk ? gov.uk
- Character Replacement www.cityoglondon.gov.uk ? gov.uk
- Character Replacement www.citypflondon.gov.uk ? gov.uk
- Character Replacement www.ciyyoflondon.gov.uk ? gov.uk
- Character Replacement www.cotyoflondon.gov.uk ? gov.uk
- Character Replacement www.cutyoflondon.gov.uk ? gov.uk
- Character Replacement www.vityoflondon.gov.uk ? gov.uk
- Character Replacement www.xityoflondon.gov.uk ? gov.uk
- Double Character Replacement eew.cityoflondon.gov.uk ? gov.uk
- Double Character Replacement qqw.cityoflondon.gov.uk ? gov.uk
- Double Character Replacement wee.cityoflondon.gov.uk ? gov.uk
- Double Character Replacement wqq.cityoflondon.gov.uk ? gov.uk
- Character Insertion weww.cityoflondon.gov.uk ? gov.uk
- Character Insertion wqww.cityoflondon.gov.uk ? gov.uk
- Character Insertion wwew.cityoflondon.gov.uk ? gov.uk
- Character Insertion wwqw.cityoflondon.gov.uk ? gov.uk
- Character Insertion www.ciotyoflondon.gov.uk ? gov.uk
- Character Insertion www.citryoflondon.gov.uk ? gov.uk
- Character Insertion www.cityofdlondon.gov.uk ? gov.uk
- Character Insertion www.cityofglondon.gov.uk ? gov.uk
- Character Insertion www.cityoflkondon.gov.uk ? gov.uk
- Character Insertion www.cityofloindon.gov.uk ? gov.uk
- Character Insertion www.cityoflonbdon.gov.uk ? gov.uk
- Character Insertion www.cityoflondfon.gov.uk ? gov.uk
- Character Insertion www.cityoflondoin.gov.uk ? gov.uk
- Character Insertion www.cityoflondonb.gov.uk ? gov.uk
- Character Insertion www.cityoflondonm.gov.uk ? gov.uk
- Character Insertion www.cityoflondopn.gov.uk ? gov.uk
- Character Insertion www.cityoflondson.gov.uk ? gov.uk
- Character Insertion www.cityoflonmdon.gov.uk ? gov.uk
- Character Insertion www.cityoflopndon.gov.uk ? gov.uk
- Character Insertion www.cityoiflondon.gov.uk ? gov.uk
- Character Insertion www.cityopflondon.gov.uk ? gov.uk
- Character Insertion www.citytoflondon.gov.uk ? gov.uk
- Character Insertion www.cityuoflondon.gov.uk ? gov.uk
- Character Insertion www.ciutyoflondon.gov.uk ? gov.uk
- Character Insertion www.cvityoflondon.gov.uk ? gov.uk
- Character Insertion www.cxityoflondon.gov.uk ? gov.uk
- Character Insertion wwwe.cityoflondon.gov.uk ? gov.uk
- Character Insertion wwwq.cityoflondon.gov.uk ? gov.uk
- Missing Dot wwwwww.cityoflondon.gov.uk ? gov.uk
- Singular or Pluralise cityoflondon.gov.uk 80.169.89.102 GB,UNITED KINGDOM cityoflondon-gov-uk.mail.protection.outlook.com gov.uk
- Singular or Pluralise cityoflondons.gov.uk ? gov.uk
- Vowel Swap www.catyoflondon.gov.uk ? gov.uk
- Vowel Swap www.cetyoflondon.gov.uk ? gov.uk
- Homophones www.cayetyoflondon.gov.uk ? gov.uk
- Homophones www.ceyetyoflondon.gov.uk ? gov.uk
- Homophones www.cityoflondewn.gov.uk ? gov.uk
- Homophones www.cityoflonduen.gov.uk ? gov.uk
- Homophones www.cityoflowndon.gov.uk ? gov.uk
- Bit Flipping 7ww.cityoflondon.gov.uk ? gov.uk
- Bit Flipping gww.cityoflondon.gov.uk ? gov.uk
- Bit Flipping sww.cityoflondon.gov.uk ? gov.uk
- Bit Flipping uww.cityoflondon.gov.uk ? gov.uk
- Bit Flipping vww.cityoflondon.gov.uk ? gov.uk
- Bit Flipping w7w.cityoflondon.gov.uk ? gov.uk
- Bit Flipping wgw.cityoflondon.gov.uk ? gov.uk
- Bit Flipping wsw.cityoflondon.gov.uk ? gov.uk
- Bit Flipping wuw.cityoflondon.gov.uk ? gov.uk
- Bit Flipping wvw.cityoflondon.gov.uk ? gov.uk
- Bit Flipping ww7.cityoflondon.gov.uk ? gov.uk
- Bit Flipping wwg.cityoflondon.gov.uk ? gov.uk
- Bit Flipping wws.cityoflondon.gov.uk ? gov.uk
- Bit Flipping wwu.cityoflondon.gov.uk ? gov.uk
- Bit Flipping wwv.cityoflondon.gov.uk ? gov.uk
- Bit Flipping www.aityoflondon.gov.uk ? gov.uk
- Bit Flipping www.bityoflondon.gov.uk ? gov.uk
- Bit Flipping www.chtyoflondon.gov.uk ? gov.uk
- Bit Flipping www.ci4yoflondon.gov.uk ? gov.uk
- Bit Flipping www.cidyoflondon.gov.uk ? gov.uk
- Bit Flipping www.cipyoflondon.gov.uk ? gov.uk
- Bit Flipping www.cit9oflondon.gov.uk ? gov.uk
- Bit Flipping www.citioflondon.gov.uk ? gov.uk
- Bit Flipping www.citqoflondon.gov.uk ? gov.uk
- Bit Flipping www.citxoflondon.gov.uk ? gov.uk
- Bit Flipping www.citygflondon.gov.uk ? gov.uk
- Bit Flipping www.citykflondon.gov.uk ? gov.uk
- Bit Flipping www.citymflondon.gov.uk ? gov.uk
- Bit Flipping www.citynflondon.gov.uk ? gov.uk
- Bit Flipping www.cityoblondon.gov.uk ? gov.uk
- Bit Flipping www.cityofdondon.gov.uk ? gov.uk
- Bit Flipping www.cityofhondon.gov.uk ? gov.uk
- Bit Flipping www.cityoflgndon.gov.uk ? gov.uk
- Bit Flipping www.cityoflkndon.gov.uk ? gov.uk
- Bit Flipping www.cityoflmndon.gov.uk ? gov.uk
- Bit Flipping www.cityoflnndon.gov.uk ? gov.uk
- Bit Flipping www.cityoflo.don.gov.uk ? gov.uk
- Bit Flipping www.cityoflofdon.gov.uk ? gov.uk
- Bit Flipping www.cityoflojdon.gov.uk ? gov.uk
- Bit Flipping www.cityofloldon.gov.uk ? gov.uk
- Bit Flipping www.cityoflondgn.gov.uk ? gov.uk
- Bit Flipping www.cityoflondkn.gov.uk ? gov.uk
- Bit Flipping www.cityoflondmn.gov.uk ? gov.uk
- Bit Flipping www.cityoflondnn.gov.uk ? gov.uk
- Bit Flipping www.cityoflondof.gov.uk ? gov.uk
- Bit Flipping www.cityoflondoj.gov.uk ? gov.uk
- Bit Flipping www.cityoflondol.gov.uk ? gov.uk
- Bit Flipping www.cityoflondon.gov.tk ? tk
- Bit Flipping www.cityoflondoo.gov.uk ? gov.uk
- Bit Flipping www.cityofloneon.gov.uk ? gov.uk
- Bit Flipping www.cityoflonlon.gov.uk ? gov.uk
- Bit Flipping www.cityoflonton.gov.uk ? gov.uk
- Bit Flipping www.cityofloodon.gov.uk ? gov.uk
- Bit Flipping www.cityofmondon.gov.uk ? gov.uk
- Bit Flipping www.cityofnondon.gov.uk ? gov.uk
- Bit Flipping www.cityonlondon.gov.uk ? gov.uk
- Bit Flipping www.cityovlondon.gov.uk ? gov.uk
- Bit Flipping www.ciuyoflondon.gov.uk ? gov.uk
- Bit Flipping www.civyoflondon.gov.uk ? gov.uk
- Bit Flipping www.cktyoflondon.gov.uk ? gov.uk
- Bit Flipping www.cmtyoflondon.gov.uk ? gov.uk
- Bit Flipping www.cytyoflondon.gov.uk ? gov.uk
- Bit Flipping www.gityoflondon.gov.uk ? gov.uk
- Bit Flipping www.kityoflondon.gov.uk ? gov.uk
- Bit Flipping www.sityoflondon.gov.uk ? gov.uk
- Bit Flipping wwwncityoflondon.gov.uk ? gov.uk
- Homoglyphs vvvvvv.cityoflondon.gov.uk ? gov.uk
- Homoglyphs vvvvw.cityoflondon.gov.uk ? gov.uk
- Homoglyphs vvwvv.cityoflondon.gov.uk ? gov.uk
- Homoglyphs vvww.cityoflondon.gov.uk ? gov.uk
- Homoglyphs wvvvv.cityoflondon.gov.uk ? gov.uk
- Homoglyphs wvvw.cityoflondon.gov.uk ? gov.uk
- Homoglyphs wwvv.cityoflondon.gov.uk ? gov.uk
- Homoglyphs www.city0fl0nd0n.gov.uk ? gov.uk
- Homoglyphs www.city0fl0ndon.gov.uk ? gov.uk
- Homoglyphs www.city0flond0n.gov.uk ? gov.uk
- Homoglyphs www.city0flondon.gov.uk ? gov.uk
- Homoglyphs www.cityof1ondon.gov.uk ? gov.uk
- Homoglyphs www.cityofl0nd0n.gov.uk ? gov.uk
- Homoglyphs www.cityofl0ndon.gov.uk ? gov.uk
- Homoglyphs www.cityoflonclon.gov.uk ? gov.uk
- Homoglyphs www.cityoflond0n.gov.uk ? gov.uk
- Homoglyphs www.cltyoflondon.gov.uk ? gov.uk
- Wrong TLD cityoflondon.ca 69.172.201.153 US,UNITED STATES mx247.in-mx.com ca
- Wrong TLD cityoflondon.ch ? ch
- Wrong TLD cityoflondon.com 212.124.206.2 GB,UNITED KINGDOM com
- Wrong TLD cityoflondon.de 69.12.74.201 CO,COLOMBIA de
- Wrong TLD cityoflondon.edu ? edu
- Wrong TLD cityoflondon.es 69.172.201.153 US,UNITED STATES mx247.in-mx.net es
- Wrong TLD cityoflondon.fr ? fr
- Wrong TLD cityoflondon.it 185.53.178.7 mail.h-email.net it
- Wrong TLD cityoflondon.jp ? jp
- Wrong TLD cityoflondon.net ? net
- Wrong TLD cityoflondon.nl ? nl
- Wrong TLD cityoflondon.no ? no
- Wrong TLD cityoflondon.org 212.227.53.126 DE,GERMANY mail.cityoflondon.org org
- Wrong TLD cityoflondon.ru ? ru
- Wrong TLD cityoflondon.se ? se
- Wrong TLD cityoflondon.us ? us
- Wrong SLD cityoflondon.ac.uk ? ac.uk
- Wrong SLD cityoflondon.bl.uk ? bl.uk
- Wrong SLD cityoflondon.british-library.uk ? british-library.uk
- Wrong SLD cityoflondon.co.uk 87.117.232.10 GB,UNITED KINGDOM mail.adsonline.co.uk co.uk
- Wrong SLD cityoflondon.icnet.uk ? icnet.uk
- Wrong SLD cityoflondon.jet.uk ? jet.uk
- Wrong SLD cityoflondon.ltd.uk ? ltd.uk
- Wrong SLD cityoflondon.me.uk ? me.uk
- Wrong SLD cityoflondon.mod.uk ? mod.uk
- Wrong SLD cityoflondon.net.uk ? net.uk
- Wrong SLD cityoflondon.nhs.uk ? mail.nhs.uk nhs.uk
- Wrong SLD cityoflondon.nic.uk ? nic.uk
- Wrong SLD cityoflondon.nls.uk ? nls.uk
- Wrong SLD cityoflondon.org.uk 87.117.232.10 GB,UNITED KINGDOM mail.adsonline.co.uk org.uk
- Wrong SLD cityoflondon.parliament.uk ? parliament.uk
- Wrong SLD cityoflondon.plc.uk ? plc.uk
- Wrong SLD cityoflondon.police.uk ? pnn-gw.pnn.police.uk police.uk
- Wrong SLD cityoflondon.sch.uk ? sch.uk
- ###############################################################################################################################
- ------------------------------------------------------------------------------------------------------------------------------
- [x] Error downloading /advanced_search
- [3/25] https://www.cityoflondon.gov.uk/propertysearch/resourcefiles/pdf/epc-4chiswellst.pdf
- [x] Error in PDF metadata Creator
- [4/25] https://www.cityoflondon.gov.uk/propertysearch/resourcefiles/pdf/epc-eastcheap2-4.pdf
- [x] Error in PDF metadata Creator
- [5/25] http://www.cityoflondon.gov.uk/jobs/Documents/Previous_Pension_Rights_form.pdf
- [6/25] https://www.cityoflondon.gov.uk/jobs/Documents/TrainingRoomsLocationMap.pdf
- [7/25] https://www.cityoflondon.gov.uk/propertysearch/resourcefiles/pdf/38CharterhouseStreet.pdf
- [8/25] https://www.cityoflondon.gov.uk/about-our-website/Documents/complaint_form.pdf
- [x] Error downloading https://www.cityoflondon.gov.uk/about-our-website/Documents/complaint_form.pdf
- [9/25] https://www.cityoflondon.gov.uk/training/old/Documents/security-policy.pdf
- [10/25] https://www.cityoflondon.gov.uk/propertysearch/resourcefiles/pdf/38charterhouse-offices-epccert-0660-0831-4750-5509-3006.pdf
- [11/25] https://www.cityoflondon.gov.uk/propertysearch/resourcefiles/pdf/76-78FleetSt.pdf
- [12/25] http://www.cityoflondon.gov.uk/propertysearch/resourcefiles/pdf/38charterhouse-bar-retail-epccert-0983-3039-0211-0200-6705.pdf
- [13/25] https://www.cityoflondon.gov.uk/jobs/Documents/Job-Information-Pack-GS496.pdf
- [x] Error in the parsing process
- [14/25] https://www.cityoflondon.gov.uk/business/licensing/Documents/street-trading-policy.pdf
- [x] Error in the parsing process
- [15/25] https://www.cityoflondon.gov.uk/business/licensing/Documents/hmo-standards-2019.pdf
- [x] Error in the parsing process
- [16/25] https://www.cityoflondon.gov.uk/jobs/Documents/Job-Information-Pack-CLSG143.pdf
- [x] Error in the parsing process
- [17/25] https://www.cityoflondon.gov.uk/jobs/Documents/Job-Information-Pack-TC776.pdf
- [18/25] https://www.cityoflondon.gov.uk/jobs/Documents/Job-Information-Pack-TC750.pdf
- [19/25] https://www.cityoflondon.gov.uk/jobs/Documents/Job-Information-Pack-TC745.pdf
- [x] Error in the parsing process
- [20/25] https://www.cityoflondon.gov.uk/jobs/Documents/Project-Coordintaor-Background-Information.pdf
- [21/25] https://www.cityoflondon.gov.uk/jobs/Documents/Job-Information-Pack-CCS614.pdf
- [22/25] https://www.cityoflondon.gov.uk/jobs/Documents/Job-Information-Pack-TC753.pdf
- [23/25] https://www.cityoflondon.gov.uk/jobs/Documents/Job-Information-Pack-OS477.pdf
- [x] Error in the parsing process
- [24/25] https://www.cityoflondon.gov.uk/jobs/Documents/Job-Information-Pack-LC750.pdf
- [25/25] https://www.cityoflondon.gov.uk/jobs/Documents/Job-Information-Pack-OS482.pdf
- ------------------------------------------------------------------------------------------------------------------------------
- [+] List of users found:
- --------------------------
- DCMS
- PRO117
- laptopuser
- Shelley Bower
- London Metropolitan Archives
- BRE
- readk
- Louise Mankowska
- Sylvia Kelcher;City of London Corporation
- [+] List of software found:
- -----------------------------
- Microsoft Word 9.0
- iText 1.4.8 (by lowagie.com)
- Adobe PDF Library 10.0
- Acrobat PDFMaker 10.0 for Word
- Adobe PDF Library 9.0
- Adobe InDesign CS4 (6.0.4)
- ��Microsoft� Word 2010
- Haru Free PDF Library 2.0.8
- EPCgen
- ��Microsoft� Word for Office 365
- Microsoft� Word for Office 365
- Microsoft Excel
- [+] List of paths and servers found:
- ---------------------------------------
- 'C:\Bala\A_\A_42-4 Application to vary a premises licence.doc'
- 'L:\Alcohol Licensing\Unit\Unit Tested Application Forms\Local Authority Version\A_42-4 Application to vary a premises licence.doc'
- 'F:\AutoRecovery save of A_42-4 Application to vary a premises licence.asd'
- 'L:\Alcohol Licensing\Unit\Live Application Forms\Local Authority Version\A_42-4 Application to vary a premises licence.doc'
- 'L:\Alcohol Licensing\Unit\Live Application Forms\Public version\P_42-4 Application to vary a premises licence.doc'
- 'G:\Licensing\REGULATIONS CONSULTATION\FINAL REGULATIONS\forms\050228 Forms final\premises licences and club certificates\P_Website\P_42-4 Application to vary a premises licence.doc'
- Dot 42 4.dot
- [+] List of e-mails found:
- ----------------------------
- pensions@cityoflondon.gov.uk
- londonagency@fleurets.com.
- londonagency@fleurets.com
- ask.lma@cityoflondon.gov.uk
- Rob.Macnab@knightfrank.com
- Davies@knightfrank.com
- cru@cityoflondon.gov.uk
- ###############################################################################################################################
- aldersgateward.org.uk
- dowgateward.org.uk
- cityofsport.org
- guildhall-art-gallery.org.uk
- towerbridge.org
- towerbridge.eu
- bassishawward.org.uk
- bluebadgelondon.org.uk
- cityacademies.co.uk
- cityoflondonchina.cn
- tomlinsoninquest.org.uk
- towerward.org.uk
- cripplegateward.org.uk
- cityoflondon.gov.uk
- keatshouse.org.uk
- towerbridgeexhibition.org
- visitthecity.co.uk
- cityoflondon.police.uk
- bridgehousegrants.org.uk
- towerbridge.net
- towerbridgeexhibition.info
- ##############################################################################################################################
- [+] www.cityoflondon.gov.uk has no SPF record!
- [*] No DMARC record found. Looking for organizational record
- [*] Found organizational DMARC record:
- [*] v=DMARC1;p=reject;sp=reject;pct=100;rua=mailto:dmarc-rua@dmarc.service.gov.uk
- [-] Organizational subdomain policy explicitly set to reject
- [-] Spoofing not possible for www.cityoflondon.gov.uk
- ###############################################################################################################################
- WARNING: Duplicate port number(s) specified. Are you alert enough to be using Nmap? Have some coffee or Jolt(tm).
- Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-31 00:35 EDT
- Nmap scan report for www.cityoflondon.gov.uk (80.169.89.102)
- Host is up (0.12s latency).
- Not shown: 494 filtered ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 80/tcp open http
- 443/tcp open https
- Nmap done: 1 IP address (1 host up) scanned in 7.21 seconds
- ###############################################################################################################################
- Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-31 00:35 EDT
- Nmap scan report for www.cityoflondon.gov.uk (80.169.89.102)
- Host is up.
- PORT STATE SERVICE
- 53/udp open|filtered domain
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 123/udp open|filtered ntp
- 137/udp open|filtered netbios-ns
- 138/udp open|filtered netbios-dgm
- 139/udp open|filtered netbios-ssn
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 500/udp open|filtered isakmp
- 520/udp open|filtered route
- 2049/udp open|filtered nfs
- Nmap done: 1 IP address (1 host up) scanned in 5.23 seconds
- ##############################################################################################################################
- HTTP/1.1 301 Moved Permanently
- Location: https://www.cityoflondon.gov.uk/
- Server: COL-VMW-M-LB02
- Cache-Control: no-cache
- Connection: close
- ###############################################################################################################################
- /about-our-website/Pages/accessibility.aspx
- /about-our-website/Pages/Cookies.aspx
- /about-our-website/Pages/cookies.aspx
- /about-our-website/Pages/legal-notices.aspx
- /about-our-website/Pages/legal-notices.aspx#socialmedia
- /about-our-website/Pages/mobile.aspx
- /about-our-website/Pages/privacy-notice.aspx
- /about-our-website/Pages/social-media.aspx
- /about-our-website/sitemap.aspx
- /about-the-city/about-us/Pages/default.aspx
- /about-the-city/about-us/Pages/how-to-find-us.aspx
- /about-the-city/Pages/default.aspx
- /about-the-city/PublishingImages/about-explore.jpg
- /about-the-city/PublishingImages/pins-on-map.jpg
- /about-the-city/voting-elections/Pages/default.aspx
- /about-the-city/voting-elections/PublishingImages/voting.jpg
- /business/business-rates/Pages/default.aspx
- /business/Pages/default.aspx
- /business/PublishingImages/business-people.jpg
- /business/support-promotion-and-advice/Pages/covid-19-advice-for-businesses.aspx
- /business/support-promotion-and-advice/Pages/support-relief-efforts-COVID-19.aspx
- /business/support-promotion-and-advice/PublishingImages/covid-19-businesses-advice.jpg
- /business/tenders-and-procurement/pages/responsible-procurement.aspx
- /contact-us/Pages/default.aspx
- /events/Pages/default.aspx
- http://email.cityoflondon.gov.uk/linkapp/cmasubs.aspx?LinkID=pageid986790jkkzhq%40f%40f%40n9qh%40z%40f%40n9qh%40f%40f
- http://email.cityoflondon.gov.uk/linkapp/cmasubs.aspx?LinkID=pageid986790jkkzhq@f@f@n9qh@z@f@n9qh@f@f
- http://news.cityoflondon.gov.uk/
- https://careers.cityoflondon.gov.uk/
- https://news.cityoflondon.gov.uk/covid19-city-corporation-encourages-people-to-follow-new-government-instructions-on-parks/
- https://news.cityoflondon.gov.uk/square-mile-businesses-offered-additional-rental-relief/
- https://twitter.com/cityoflondon
- https://www.facebook.com/CityofLondonCorp
- https://www.youtube.com/user/CityofLondonvideos/videos
- http://www.barbican.org.uk/
- http://www.citybridgetrust.org.uk/
- http://www.cityoflondon.police.uk/
- http://www.towerbridge.org.uk/
- http://www.w3.org/1999/xhtml
- /_layouts/col/shop.aspx
- /maps/Pages/geocortex-redirect.aspx
- /maps/Pages/interactive-maps.aspx
- /Pages/default.aspx
- /report-pay-apply/Pages/report-pay-apply.aspx
- /search/Pages/a-to-z.aspx
- /services/health-and-wellbeing/Pages/covid-19.aspx
- /services/health-and-wellbeing/PublishingImages/covid-19-residents.jpg
- /services/Pages/default.aspx
- /services/transport-and-streets/parking/Pages/covid-19-parking-and-driving-in-the-city.aspx
- /services/transport-and-streets/roads-highways-and-pavements/Pages/current-road-closures-works-and-events.aspx
- /services/transport-and-streets/roads-highways-and-pavements/PublishingImages/street-closures-130x86.jpg
- /SiteCollectionImages/icons/icon-calendar.png
- /SiteCollectionImages/icons/icon-eshot.png
- /SiteCollectionImages/icons/icon-streetworks.png
- text/javascript
- /things-to-do/green-spaces/Pages/default.aspx
- /things-to-do/green-spaces/PublishingImages/city-green.jpg
- /things-to-do/Pages/default.aspx
- /things-to-do/visit-the-city/whats-on/Pages/default.aspx
- /things-to-do/visit-the-city/whats-on/PublishingImages/events-bubble.jpg
- -//W3C//DTD XHTML 1.0 Transitional//EN
- ###############################################################################################################################
- http://www.cityoflondon.gov.uk [301 Moved Permanently] Country[UNITED KINGDOM][GB], HTTPServer[COL-VMW-M-LB02], IP[80.169.89.102], RedirectLocation[https://www.cityoflondon.gov.uk/]
- https://www.cityoflondon.gov.uk/ [302 Found] Country[UNITED KINGDOM][GB], HTTPServer[Microsoft-IIS/7.5], IP[80.169.89.102], Microsoft-IIS[7.5], Microsoft-Sharepoint[14.0.0.7239], RedirectLocation[http://www.cityoflondon.gov.uk/Pages/default.aspx], Title[Document Moved], UncommonHeaders[sprequestguid,x-sharepointhealthscore,microsoftsharepointteamservices,x-ms-invokeapp], X-Powered-By[ASP.NET]
- http://www.cityoflondon.gov.uk/Pages/default.aspx [301 Moved Permanently] Country[UNITED KINGDOM][GB], HTTPServer[COL-VMW-M-LB02], IP[80.169.89.102], RedirectLocation[https://www.cityoflondon.gov.uk/Pages/default.aspx]
- https://www.cityoflondon.gov.uk/Pages/default.aspx [200 OK] ASP_NET[2.0.50727], Country[UNITED KINGDOM][GB], HTTPServer[Microsoft-IIS/7.5], IP[80.169.89.102], JQuery[1.6.2], Microsoft-IIS[7.5], Microsoft-Sharepoint[14.0.0.7239], Script[text/javascript], Title[Welcome to the City of London Corporation], UncommonHeaders[sprequestguid,x-sharepointhealthscore,microsoftsharepointteamservices,x-ms-invokeapp], X-Powered-By[ASP.NET], X-UA-Compatible[
- ###############################################################################################################################
- wig - WebApp Information Gatherer
- Scanning https://www.cityoflondon.gov.uk...
- _____________________________________ SITE INFO _____________________________________
- IP Title
- 80.169.89.102 Welcome to the City of London Corporation
- ______________________________________ VERSION ______________________________________
- Name Versions Type
- SharePoint 14.0.0.7239 CMS
- ASP.NET 2.0.50727 Platform
- IIS 7.5 Platform
- Microsoft Windows Server 2008 R2 OS
- ____________________________________ INTERESTING ____________________________________
- URL Note Type
- /_layouts/help.aspx SharePoint Help Page Interesting
- _______________________________________ TOOLS _______________________________________
- Name Link Software
- sparty https://github.com/alias1/sparty SharePoint
- spscan https://github.com/toddsiegel/spscan SharePoint
- Sharepoint URL Brute http://www.bishopfox.com/download/414/ SharePoint
- _____________________________________________________________________________________
- Time: 37.7 sec Urls: 216 Fingerprints: 40401
- ###############################################################################################################################
- Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-31 00:37 EDT
- NSE: Loaded 161 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 00:37
- Completed NSE at 00:37, 0.00s elapsed
- Initiating NSE at 00:37
- Completed NSE at 00:37, 0.00s elapsed
- Initiating Parallel DNS resolution of 1 host. at 00:37
- Completed Parallel DNS resolution of 1 host. at 00:37, 0.02s elapsed
- Initiating SYN Stealth Scan at 00:37
- Scanning www.cityoflondon.gov.uk (80.169.89.102) [1 port]
- Discovered open port 80/tcp on 80.169.89.102
- Completed SYN Stealth Scan at 00:37, 0.16s elapsed (1 total ports)
- Initiating Service scan at 00:37
- Scanning 1 service on www.cityoflondon.gov.uk (80.169.89.102)
- Completed Service scan at 00:39, 127.62s elapsed (1 service on 1 host)
- Initiating OS detection (try #1) against www.cityoflondon.gov.uk (80.169.89.102)
- Retrying OS detection (try #2) against www.cityoflondon.gov.uk (80.169.89.102)
- Initiating Traceroute at 00:39
- Completed Traceroute at 00:39, 0.23s elapsed
- Initiating Parallel DNS resolution of 10 hosts. at 00:39
- Completed Parallel DNS resolution of 10 hosts. at 00:39, 0.16s elapsed
- NSE: Script scanning 80.169.89.102.
- Initiating NSE at 00:39
- Completed NSE at 00:40, 89.72s elapsed
- Initiating NSE at 00:40
- Completed NSE at 00:40, 1.13s elapsed
- Nmap scan report for www.cityoflondon.gov.uk (80.169.89.102)
- Host is up (0.11s latency).
- PORT STATE SERVICE VERSION
- 80/tcp open http COL-VMW-M-LB02
- | fingerprint-strings:
- | FourOhFourRequest:
- | HTTP/1.1 301 Moved Permanently
- | Location: https:///nice%20ports%2C/Tri%6Eity.txt%2ebak
- | Server: COL-VMW-M-LB02
- | Cache-Control: no-cache
- | Connection: close
- | GenericLines:
- | HTTP/1.1 301 Moved Permanently
- | Location: https://
- | Server: COL-VMW-M-LB02
- | Cache-Control: no-cache
- | Connection: close
- | GetRequest, HTTPOptions, RTSPRequest:
- | HTTP/1.1 301 Moved Permanently
- | Location: https:///
- | Server: COL-VMW-M-LB02
- | Cache-Control: no-cache
- | Connection: close
- | SIPOptions:
- | HTTP/1.1 301 Moved Permanently
- | Location: https://sip:nm
- | Server: COL-VMW-M-LB02
- | Cache-Control: no-cache
- |_ Connection: close
- | http-brute:
- |_ Path "/" does not require authentication
- |_http-chrono: Request times for /; avg: 510.15ms; min: 455.02ms; max: 562.86ms
- |_http-csrf: Couldn't find any CSRF vulnerabilities.
- |_http-devframework: Couldn't determine the underlying framework or CMS. Try increasing 'httpspider.maxpagecount' value to spider more pages.
- |_http-dombased-xss: Couldn't find any DOM based XSS.
- |_http-drupal-enum: Nothing found amongst the top 100 resources,use --script-args number=<number|all> for deeper analysis)
- |_http-errors: Couldn't find any error pages.
- |_http-feed: Couldn't find any feeds.
- |_http-fetch: Please enter the complete path of the directory to save data in.
- | http-headers:
- | Location: https://www.cityoflondon.gov.uk/
- | Server: COL-VMW-M-LB02
- | Cache-Control: no-cache
- | Connection: close
- |
- |_ (Request type: GET)
- |_http-jsonp-detection: Couldn't find any JSONP endpoints.
- | http-methods:
- |_ Supported Methods: GET HEAD POST OPTIONS
- |_http-mobileversion-checker: No mobile version detected.
- |_http-passwd: ERROR: Script execution failed (use -d to debug)
- | http-security-headers:
- | Cache_Control:
- |_ Header: Cache-Control: no-cache
- |_http-server-header: COL-VMW-M-LB02
- | http-sitemap-generator:
- | Directory structure:
- | Longest directory structure:
- | Depth: 0
- | Dir: /
- | Total files found (by extension):
- |_
- |_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
- |_http-title: Did not follow redirect to https://www.cityoflondon.gov.uk/
- | http-vhosts:
- |_127 names had status 301
- |_http-wordpress-enum: Nothing found amongst the top 100 resources,use --script-args search-limit=<number|all> for deeper analysis)
- |_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
- | http-xssed:
- |
- | UNFIXED XSS vuln.
- |
- | http://www.cityoflondon.gov.uk/cgi-bin/semaphoreserver.exe?CMD=search.run&SAVEDB=col&SAVEQUERY00=%22<br>%3e%3cscript%3ealert%28'C1c4Tr1Z'%29%3c/script%3e&SAVESTYPE=simple&SAVEORGANISE_CODED=:F9&B2=I1disab<br>ility&PROP00=t%3Di&QUERY01=disability&B2_DESC=Disability&PROP01=P%3DI1%2CS%3Dnone%2CZ%3Don&THES_REC=<br>1222&TBDB=col_taxonomy&HIDECONCEPT=1
- |
- | http://www.cityoflondon.gov.uk/cgi-bin/select.exe
- |
- |_
- |_https-redirect: ERROR: Script execution failed (use -d to debug)
- 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
- SF-Port80-TCP:V=7.80%I=7%D=3/31%Time=5E82C900%P=x86_64-pc-linux-gnu%r(GetR
- SF:equest,7B,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nLocation:\x20htt
- SF:ps:///\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20no-cache\r\nCo
- SF:nnection:\x20close\r\n\r\n")%r(HTTPOptions,7B,"HTTP/1\.1\x20301\x20Move
- SF:d\x20Permanently\r\nLocation:\x20https:///\r\nServer:\x20COL-VMW-M-LB02
- SF:\r\nCache-Control:\x20no-cache\r\nConnection:\x20close\r\n\r\n")%r(RTSP
- SF:Request,7B,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nLocation:\x20ht
- SF:tps:///\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20no-cache\r\nC
- SF:onnection:\x20close\r\n\r\n")%r(FourOhFourRequest,9E,"HTTP/1\.1\x20301\
- SF:x20Moved\x20Permanently\r\nLocation:\x20https:///nice%20ports%2C/Tri%6E
- SF:ity\.txt%2ebak\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20no-cac
- SF:he\r\nConnection:\x20close\r\n\r\n")%r(GenericLines,7A,"HTTP/1\.1\x2030
- SF:1\x20Moved\x20Permanently\r\nLocation:\x20https://\r\nServer:\x20COL-VM
- SF:W-M-LB02\r\nCache-Control:\x20no-cache\r\nConnection:\x20close\r\n\r\n"
- SF:)%r(SIPOptions,80,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nLocation
- SF::\x20https://sip:nm\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20n
- SF:o-cache\r\nConnection:\x20close\r\n\r\n");
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose|firewall|storage-misc
- Running (JUST GUESSING): Linux 2.6.X|3.X (90%), WatchGuard Fireware 11.X (89%), Synology DiskStation Manager 5.X (88%)
- OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3.10 cpe:/o:watchguard:fireware:11.8 cpe:/o:linux:linux_kernel cpe:/a:synology:diskstation_manager:5.1
- Aggressive OS guesses: Linux 2.6.32 (90%), Linux 2.6.39 (90%), Linux 3.10 (89%), Linux 3.4 (89%), WatchGuard Fireware 11.8 (89%), Linux 3.1 - 3.2 (89%), Synology DiskStation Manager 5.1 (88%), Linux 2.6.32 or 3.10 (87%), Linux 2.6.32 - 2.6.39 (85%)
- No exact OS matches for host (test conditions non-ideal).
- Uptime guess: 0.188 days (since Mon Mar 30 20:10:15 2020)
- Network Distance: 12 hops
- TCP Sequence Prediction: Difficulty=262 (Good luck!)
- IP ID Sequence Generation: All zeros
- TRACEROUTE (using port 80/tcp)
- HOP RTT ADDRESS
- 1 105.93 ms 10.203.9.1
- 2 106.02 ms 45.131.5.3
- 3 106.01 ms 109.236.95.226
- 4 106.90 ms 109.236.95.173
- 5 107.47 ms et-0-0-1-pr2.AMS.router.colt.net (80.249.208.236)
- 6 188.37 ms xe0-3-0-sar18.LON.router.colt.net (212.74.68.145)
- 7 112.44 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
- 8 112.41 ms cpeuk_lon002520.ia.colt.net (80.169.196.38)
- 9 112.47 ms 195.110.81.4
- 10 113.39 ms 195.110.81.4
- 11 111.90 ms 195.110.81.4
- 12 116.12 ms 80.169.89.102
- NSE: Script Post-scanning.
- Initiating NSE at 00:40
- Completed NSE at 00:40, 0.00s elapsed
- Initiating NSE at 00:40
- Completed NSE at 00:40, 0.00s elapsed
- Read data files from: /usr/bin/../share/nmap
- ###############################################################################################################################
- ------------------------------------------------------------------------------------------------------------------------
- [ ! ] Starting SCANNER INURLBR 2.1 at [31-03-2020 00:41:22]
- [ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
- It is the end user's responsibility to obey all applicable local, state and federal laws.
- Developers assume no liability and are not responsible for any misuse or damage caused by this program
- [ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.cityoflondon.gov.uk/output/inurlbr-www.cityoflondon.gov.uk ]
- [ INFO ][ DORK ]::[ site:www.cityoflondon.gov.uk ]
- [ INFO ][ SEARCHING ]:: {
- [ INFO ][ ENGINE ]::[ GOOGLE - www.google.co.tz ]
- [ INFO ][ SEARCHING ]::
- -[:::]
- [ INFO ][ ENGINE ]::[ GOOGLE API ]
- [ INFO ][ SEARCHING ]::
- -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
- [ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.com.sv ID: 012873187529719969291:yexdhbzntue ]
- [ INFO ][ SEARCHING ]::
- -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
- [ INFO ][ TOTAL FOUND VALUES ]:: [ 100 ]
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 0 / 100 ]-[00:41:39] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 302 Redirect, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 1 / 100 ]-[00:41:40] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/newsplan/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 2 / 100 ]-[00:41:41] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/propertysearch/results.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 3 / 100 ]-[00:41:42] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/barbicansongindex/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 4 / 100 ]-[00:41:44] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 5 / 100 ]-[00:41:49] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 6 / 100 ]-[00:41:50] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/_layouts/col/basket.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 7 / 100 ]-[00:41:52] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/contact-us/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 8 / 100 ]-[00:41:54] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-our-website/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 9 / 100 ]-[00:41:56] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/Pages/estate-services.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 10 / 100 ]-[00:41:59] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/licensing/gambling/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 11 / 100 ]-[00:42:01] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/Pages/homeowner-leaseholder.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 12 / 100 ]-[00:42:02] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-our-website/Pages/accessibility.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 13 / 100 ]-[00:42:04] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/council-tax/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 14 / 100 ]-[00:42:06] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/licensing/Pages/street-trading.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 15 / 100 ]-[00:42:10] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/asia-programme/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 16 / 100 ]-[00:42:14] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/business-rates/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 17 / 100 ]-[00:42:16] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-our-website/Pages/Cookies.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 18 / 100 ]-[00:42:18] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/business-rates/Pages/contact.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 19 / 100 ]-[00:42:21] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 20 / 100 ]-[00:42:23] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?start1=13 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 21 / 100 ]-[00:42:24] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/business-rates/Pages/payment.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 22 / 100 ]-[00:42:27] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/environmental-health/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 23 / 100 ]-[00:42:29] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Today ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 24 / 100 ]-[00:42:30] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/search/Pages/a-to-z.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 25 / 100 ]-[00:42:32] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-our-website/Pages/mobile.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 26 / 100 ]-[00:42:34] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/filming/Pages/permissions.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 27 / 100 ]-[00:42:36] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Aug-2019 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 28 / 100 ]-[00:42:38] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/asia-programme/india/Pages/publications.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 29 / 100 ]-[00:42:41] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/Pages/tenancy-visits-programme.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 30 / 100 ]-[00:42:42] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Dec-2019 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 31 / 100 ]-[00:42:44] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Jul-2018 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 32 / 100 ]-[00:42:45] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Jan-2018 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 33 / 100 ]-[00:42:48] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/Pages/pay-your-rent.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 34 / 100 ]-[00:42:49] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Jan-2020 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 35 / 100 ]-[00:42:51] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Mar-2020 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 36 / 100 ]-[00:42:53] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/Pages/police-authority.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 37 / 100 ]-[00:42:56] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/children-and-families/Pages/adoption.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 38 / 100 ]-[00:42:57] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Nov-2017 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 39 / 100 ]-[00:42:59] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/adult-social-care/Pages/carers.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 40 / 100 ]-[00:43:01] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/adult-social-care/Pages/dementia.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 41 / 100 ]-[00:43:04] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/asia-programme/india/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 42 / 100 ]-[00:43:06] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/wholesale-food-markets/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 43 / 100 ]-[00:43:08] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/barbican-estate/Pages/resident-involvement.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 44 / 100 ]-[00:43:10] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/history/Pages/mayoralty.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 45 / 100 ]-[00:43:12] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/pages/default.aspx?Date=Jan-2019 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 46 / 100 ]-[00:43:16] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/libraries-and-archives/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 47 / 100 ]-[00:43:21] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/environment-and-planning/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 48 / 100 ]-[00:43:23] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/history/Pages/ceremony.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 49 / 100 ]-[00:43:26] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/things-to-do/Pages/leadenhall-market.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 50 / 100 ]-[00:43:28] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/eu-and-regulation/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 51 / 100 ]-[00:43:30] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/licensing/charity-collections/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 52 / 100 ]-[00:43:33] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/barbican-estate/services/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 53 / 100 ]-[00:43:35] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/environmental-health/Pages/primary-authority.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 54 / 100 ]-[00:43:37] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/community-and-living/Pages/hospitals.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 55 / 100 ]-[00:43:41] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/transport-and-streets/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 56 / 100 ]-[00:43:43] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/barbican-estate/Pages/baggage-stores.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 57 / 100 ]-[00:43:46] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/history/Pages/merchandise.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 58 / 100 ]-[00:43:48] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/education-learning/apprenticeships/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 59 / 100 ]-[00:43:50] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/things-to-do/keats-house/Pages/Schools.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 60 / 100 ]-[00:43:53] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/mansion-house/Pages/inside.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 61 / 100 ]-[00:43:54] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/children-and-families/Pages/Sofia-Simpson.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 62 / 100 ]-[00:43:56] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/adult-social-care/Pages/concessionary-travel.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 63 / 100 ]-[00:43:58] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/Pages/Housing-Fire-Safety-.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 64 / 100 ]-[00:44:00] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/mansion-house/Pages/tours.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 65 / 100 ]-[00:44:02] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/health-and-wellbeing/Pages/mental-wellbeing.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 66 / 100 ]-[00:44:06] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/community-and-living/Pages/volunteering-opportunities.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 67 / 100 ]-[00:44:08] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/barbican-estate/services/Pages/buildings-insurance.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 68 / 100 ]-[00:44:10] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/children-and-families/Pages/Mandheep-Dasi.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 69 / 100 ]-[00:44:13] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/housing-estates/Pages/middlesex-street.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 70 / 100 ]-[00:44:16] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/tenders-and-procurement/Pages/contract-lists.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 71 / 100 ]-[00:44:18] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/health-and-wellbeing/Pages/sexual-health.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 72 / 100 ]-[00:44:20] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/health-and-wellbeing/Pages/covid-19.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 73 / 100 ]-[00:44:21] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/children-and-families/Pages/Tito-Oshewa.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 74 / 100 ]-[00:44:24] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/housing-estates/Pages/holloway-estate.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 75 / 100 ]-[00:44:27] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/education-learning/schools/Pages/education-policies.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 76 / 100 ]-[00:44:29] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/Pages/brexit.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 77 / 100 ]-[00:44:31] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/voting-elections/Pages/results.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 78 / 100 ]-[00:44:34] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/adult-social-care/Pages/safeguarding-adults.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 79 / 100 ]-[00:44:36] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/homelessness/Pages/duty-to-refer.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 80 / 100 ]-[00:44:38] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/history/Pages/temple-bar.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 81 / 100 ]-[00:44:40] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/community-work/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 82 / 100 ]-[00:44:44] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/barbican-estate/Pages/barbican-history-architecture.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 83 / 100 ]-[00:44:46] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/barbican-estate/Pages/service-charge-schedules.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 84 / 100 ]-[00:44:48] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/barbican-estate/Pages/barbican-estate-parking.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 85 / 100 ]-[00:44:50] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/children-and-families/Pages/contact-us.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 86 / 100 ]-[00:44:52] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/tenders-and-procurement/Pages/useful-links.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 87 / 100 ]-[00:44:55] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/about-us/Pages/publications.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 88 / 100 ]-[00:44:58] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/Pages/remembrancers.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 89 / 100 ]-[00:44:59] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Next Weekend ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 400 Bad Request, Server: Microsoft-HTTPAPI/2.0 , IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 90 / 100 ]-[00:45:02] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/port-health/environmental-control/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 91 / 100 ]-[00:45:06] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/environment-and-planning/planning/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 92 / 100 ]-[00:45:07] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/things-to-do/keats-house/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 93 / 100 ]-[00:45:10] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/wholesale-food-markets/smithfield/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 94 / 100 ]-[00:45:12] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/asia-programme/india/Pages/mumbai-office.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 95 / 100 ]-[00:45:16] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/environment-and-planning/sustainability/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 96 / 100 ]-[00:45:19] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/licensing/gambling/Pages/Temporary-use-notices.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 97 / 100 ]-[00:45:20] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/jobs/Documents/TrainingRoomsLocationMap.pdf ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 98 / 100 ]-[00:45:23] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/port-health/import-controls/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 99 / 100 ]-[00:45:25] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/financial-help-benefits/Pages/fraud.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- [ INFO ] [ Shutting down ]
- [ INFO ] [ End of process INURLBR at [31-03-2020 00:45:25]
- [ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
- [ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.cityoflondon.gov.uk/output/inurlbr-www.cityoflondon.gov.uk ]
- |_________________________________________________________________________________________
- \_________________________________________________________________________________________/
- ###############################################################################################################################
- HTTP/1.1 302 Redirect
- Content-Length: 172
- Content-Type: text/html; charset=UTF-8
- Location: http://www.cityoflondon.gov.uk/Pages/default.aspx
- Server: Microsoft-IIS/7.5
- SPRequestGuid: 6fd454ed-1997-42f7-887e-f0367a7d12c7
- X-SharePointHealthScore: 0
- X-Powered-By: ASP.NET
- MicrosoftSharePointTeamServices: 14.0.0.7239
- X-MS-InvokeApp: 1; RequireReadOnly
- Date: Tue, 31 Mar 2020 04:49:13 GMT
- ###############################################################################################################################
- /about-our-website/Pages/accessibility.aspx
- /about-our-website/Pages/Cookies.aspx
- /about-our-website/Pages/cookies.aspx
- /about-our-website/Pages/legal-notices.aspx
- /about-our-website/Pages/legal-notices.aspx#socialmedia
- /about-our-website/Pages/mobile.aspx
- /about-our-website/Pages/privacy-notice.aspx
- /about-our-website/Pages/social-media.aspx
- /about-our-website/sitemap.aspx
- /about-the-city/about-us/Pages/default.aspx
- /about-the-city/about-us/Pages/how-to-find-us.aspx
- /about-the-city/Pages/default.aspx
- /about-the-city/PublishingImages/about-explore.jpg
- /about-the-city/PublishingImages/pins-on-map.jpg
- /about-the-city/voting-elections/Pages/default.aspx
- /about-the-city/voting-elections/PublishingImages/voting.jpg
- /business/business-rates/Pages/default.aspx
- /business/Pages/default.aspx
- /business/PublishingImages/business-people.jpg
- /business/support-promotion-and-advice/Pages/covid-19-advice-for-businesses.aspx
- /business/support-promotion-and-advice/Pages/support-relief-efforts-COVID-19.aspx
- /business/support-promotion-and-advice/PublishingImages/covid-19-businesses-advice.jpg
- /business/tenders-and-procurement/pages/responsible-procurement.aspx
- /contact-us/Pages/default.aspx
- /events/Pages/default.aspx
- http://email.cityoflondon.gov.uk/linkapp/cmasubs.aspx?LinkID=pageid986790jkkzhq%40f%40f%40n9qh%40z%40f%40n9qh%40f%40f
- http://email.cityoflondon.gov.uk/linkapp/cmasubs.aspx?LinkID=pageid986790jkkzhq@f@f@n9qh@z@f@n9qh@f@f
- http://news.cityoflondon.gov.uk/
- https://careers.cityoflondon.gov.uk/
- https://news.cityoflondon.gov.uk/covid19-city-corporation-encourages-people-to-follow-new-government-instructions-on-parks/
- https://news.cityoflondon.gov.uk/square-mile-businesses-offered-additional-rental-relief/
- https://twitter.com/cityoflondon
- https://www.facebook.com/CityofLondonCorp
- https://www.youtube.com/user/CityofLondonvideos/videos
- http://www.barbican.org.uk/
- http://www.citybridgetrust.org.uk/
- http://www.cityoflondon.police.uk/
- http://www.towerbridge.org.uk/
- http://www.w3.org/1999/xhtml
- /_layouts/col/shop.aspx
- /maps/Pages/geocortex-redirect.aspx
- /maps/Pages/interactive-maps.aspx
- /Pages/default.aspx
- /report-pay-apply/Pages/report-pay-apply.aspx
- /search/Pages/a-to-z.aspx
- /services/health-and-wellbeing/Pages/covid-19.aspx
- /services/health-and-wellbeing/PublishingImages/covid-19-residents.jpg
- /services/Pages/default.aspx
- /services/transport-and-streets/parking/Pages/covid-19-parking-and-driving-in-the-city.aspx
- /services/transport-and-streets/roads-highways-and-pavements/Pages/current-road-closures-works-and-events.aspx
- /services/transport-and-streets/roads-highways-and-pavements/PublishingImages/street-closures-130x86.jpg
- /SiteCollectionImages/icons/icon-calendar.png
- /SiteCollectionImages/icons/icon-eshot.png
- /SiteCollectionImages/icons/icon-streetworks.png
- text/javascript
- /things-to-do/green-spaces/Pages/default.aspx
- /things-to-do/green-spaces/PublishingImages/city-green.jpg
- /things-to-do/Pages/default.aspx
- /things-to-do/visit-the-city/whats-on/Pages/default.aspx
- /things-to-do/visit-the-city/whats-on/PublishingImages/events-bubble.jpg
- -//W3C//DTD XHTML 1.0 Transitional//EN
- ##############################################################################################################################
- https://www.cityoflondon.gov.uk [302 Found] Country[UNITED KINGDOM][GB], HTTPServer[Microsoft-IIS/7.5], IP[80.169.89.102], Microsoft-IIS[7.5], Microsoft-Sharepoint[14.0.0.7239], RedirectLocation[http://www.cityoflondon.gov.uk/Pages/default.aspx], Title[Document Moved], UncommonHeaders[sprequestguid,x-sharepointhealthscore,microsoftsharepointteamservices,x-ms-invokeapp], X-Powered-By[ASP.NET]
- http://www.cityoflondon.gov.uk/Pages/default.aspx [301 Moved Permanently] Country[UNITED KINGDOM][GB], HTTPServer[COL-VMW-M-LB02], IP[80.169.89.102], RedirectLocation[https://www.cityoflondon.gov.uk/Pages/default.aspx]
- https://www.cityoflondon.gov.uk/Pages/default.aspx [200 OK] ASP_NET[2.0.50727], Country[UNITED KINGDOM][GB], HTTPServer[Microsoft-IIS/7.5], IP[80.169.89.102], JQuery[1.6.2], Microsoft-IIS[7.5], Microsoft-Sharepoint[14.0.0.7239], Script[text/javascript], Title[Welcome to the City of London Corporation], UncommonHeaders[sprequestguid,x-sharepointhealthscore,microsoftsharepointteamservices,x-ms-invokeapp], X-Powered-By[ASP.NET], X-UA-Compatible[IE=9]
- ###############################################################################################################################
- wig - WebApp Information Gatherer
- Scanning https://www.cityoflondon.gov.uk...
- _____________________________________ SITE INFO _____________________________________
- IP Title
- 80.169.89.102 Welcome to the City of London Corporation
- ______________________________________ VERSION ______________________________________
- Name Versions Type
- SharePoint 14.0.0.7239 CMS
- ASP.NET 2.0.50727 Platform
- IIS 7.5 Platform
- Microsoft Windows Server 2008 R2 OS
- ____________________________________ INTERESTING ____________________________________
- URL Note Type
- /_layouts/help.aspx SharePoint Help Page Interesting
- _______________________________________ TOOLS _______________________________________
- Name Link Software
- sparty https://github.com/alias1/sparty SharePoint
- spscan https://github.com/toddsiegel/spscan SharePoint
- Sharepoint URL Brute http://www.bishopfox.com/download/414/ SharePoint
- _____________________________________________________________________________________
- Time: 0.9 sec Urls: 216 Fingerprints: 40401
- ###############################################################################################################################
- Microsoft SharePoint 14.0.0.7239
- IIS 7.5
- jQuery 1.6.2
- Microsoft ASP.NET
- Microsoft ASP.NET 2.0.50727
- X-MS-InvokeApp: 1; RequireReadOnly
- ###############################################################################################################################
- Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-31 00:45 EDT
- NSE: Loaded 161 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 00:45
- Completed NSE at 00:45, 0.00s elapsed
- Initiating NSE at 00:45
- Completed NSE at 00:45, 0.00s elapsed
- Initiating Parallel DNS resolution of 1 host. at 00:45
- Completed Parallel DNS resolution of 1 host. at 00:45, 0.02s elapsed
- Initiating SYN Stealth Scan at 00:45
- Scanning www.cityoflondon.gov.uk (80.169.89.102) [1 port]
- Discovered open port 443/tcp on 80.169.89.102
- Completed SYN Stealth Scan at 00:45, 0.15s elapsed (1 total ports)
- Initiating Service scan at 00:45
- Scanning 1 service on www.cityoflondon.gov.uk (80.169.89.102)
- Completed Service scan at 00:46, 12.97s elapsed (1 service on 1 host)
- Initiating OS detection (try #1) against www.cityoflondon.gov.uk (80.169.89.102)
- Retrying OS detection (try #2) against www.cityoflondon.gov.uk (80.169.89.102)
- Initiating Traceroute at 00:46
- Completed Traceroute at 00:46, 0.62s elapsed
- Initiating Parallel DNS resolution of 10 hosts. at 00:46
- Completed Parallel DNS resolution of 10 hosts. at 00:46, 0.11s elapsed
- NSE: Script scanning 80.169.89.102.
- Initiating NSE at 00:46
- Completed NSE at 00:47, 91.00s elapsed
- Initiating NSE at 00:47
- Completed NSE at 00:47, 1.06s elapsed
- Nmap scan report for www.cityoflondon.gov.uk (80.169.89.102)
- Host is up (0.11s latency).
- PORT STATE SERVICE VERSION
- 443/tcp open ssl/http Microsoft IIS httpd 7.5
- | http-brute:
- |_ Path "/" does not require authentication
- |_http-chrono: Request times for /Pages/default.aspx; avg: 2425.09ms; min: 2266.29ms; max: 2592.53ms
- |_http-csrf: Couldn't find any CSRF vulnerabilities.
- |_http-date: Tue, 31 Mar 2020 04:49:53 GMT; +3m43s from local time.
- |_http-devframework: ASP.NET detected. Found related header.
- |_http-dombased-xss: Couldn't find any DOM based XSS.
- |_http-errors: Couldn't find any error pages.
- |_http-feed: Couldn't find any feeds.
- |_http-fetch: Please enter the complete path of the directory to save data in.
- | http-frontpage-login:
- | VULNERABLE:
- | Frontpage extension anonymous login
- | State: VULNERABLE
- | Default installations of older versions of frontpage extensions allow anonymous logins which can lead to server compromise.
- |
- | References:
- |_ http://insecure.org/sploits/Microsoft.frontpage.insecurities.html
- | http-headers:
- | Content-Type: text/html; charset=UTF-8
- | Location: http://www.cityoflondon.gov.uk/Pages/default.aspx
- | Server: Microsoft-IIS/7.5
- | SPRequestGuid: 113736c6-a39f-48e3-b304-fa4caf5c58d5
- | X-SharePointHealthScore: 0
- | X-Powered-By: ASP.NET
- | MicrosoftSharePointTeamServices: 14.0.0.7239
- | X-MS-InvokeApp: 1; RequireReadOnly
- | Date: Tue, 31 Mar 2020 04:50:03 GMT
- | Connection: close
- | Content-Length: 172
- |
- |_ (Request type: GET)
- |_http-jsonp-detection: Couldn't find any JSONP endpoints.
- | http-methods:
- |_ Supported Methods: GET HEAD POST OPTIONS
- |_http-mobileversion-checker: No mobile version detected.
- | http-security-headers:
- | Strict_Transport_Security:
- | HSTS not configured in HTTPS Server
- | Cache_Control:
- | Header: Cache-Control: private
- | Expires:
- |_ Header: Expires: Tue, 31 Mar 2020 04:52:16 GMT
- |_http-server-header: Microsoft-IIS/7.5
- | http-sitemap-generator:
- | Directory structure:
- | Longest directory structure:
- | Depth: 0
- | Dir: /
- | Total files found (by extension):
- |_
- |_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
- |_http-title: Did not follow redirect to http://www.cityoflondon.gov.uk/Pages/default.aspx
- |_http-userdir-enum: Potential Users: root, admin, administrator, webadmin, sysadmin, netadmin, guest, user, web, test
- | http-vhosts:
- |_127 names had status 302
- |_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
- | http-xssed:
- |
- | UNFIXED XSS vuln.
- |
- | http://www.cityoflondon.gov.uk/cgi-bin/semaphoreserver.exe?CMD=search.run&SAVEDB=col&SAVEQUERY00=%22<br>%3e%3cscript%3ealert%28'C1c4Tr1Z'%29%3c/script%3e&SAVESTYPE=simple&SAVEORGANISE_CODED=:F9&B2=I1disab<br>ility&PROP00=t%3Di&QUERY01=disability&B2_DESC=Disability&PROP01=P%3DI1%2CS%3Dnone%2CZ%3Don&THES_REC=<br>1222&TBDB=col_taxonomy&HIDECONCEPT=1
- |
- | http://www.cityoflondon.gov.uk/cgi-bin/select.exe
- |
- |_
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose|firewall|storage-misc
- Running (JUST GUESSING): Linux 2.6.X|3.X (90%), WatchGuard Fireware 11.X (89%), Synology DiskStation Manager 5.X (88%)
- OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3.10 cpe:/o:watchguard:fireware:11.8 cpe:/o:linux:linux_kernel cpe:/a:synology:diskstation_manager:5.1
- Aggressive OS guesses: Linux 2.6.32 (90%), Linux 2.6.32 or 3.10 (89%), Linux 2.6.39 (89%), WatchGuard Fireware 11.8 (89%), Linux 3.1 - 3.2 (89%), Synology DiskStation Manager 5.1 (88%), Linux 3.10 (87%), Linux 3.4 (87%), Linux 2.6.32 - 2.6.39 (85%)
- No exact OS matches for host (test conditions non-ideal).
- Uptime guess: 0.193 days (since Mon Mar 30 20:10:15 2020)
- Network Distance: 12 hops
- TCP Sequence Prediction: Difficulty=256 (Good luck!)
- IP ID Sequence Generation: All zeros
- Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
- TRACEROUTE (using port 443/tcp)
- HOP RTT ADDRESS
- 1 104.58 ms 10.203.9.1
- 2 615.31 ms 45.131.5.2
- 3 104.66 ms 109.236.95.228
- 4 105.98 ms 109.236.95.108
- 5 106.39 ms et-0-0-1-pr2.AMS.router.colt.net (80.249.208.236)
- 6 115.38 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
- 7 115.11 ms xe0-3-0-sar18.LON.router.colt.net (212.74.68.145)
- 8 115.04 ms cpeuk_lon002520.ia.colt.net (80.169.196.38)
- 9 115.41 ms 195.110.81.4
- 10 112.13 ms 195.110.81.4
- 11 113.45 ms 195.110.81.4
- 12 113.52 ms 80.169.89.102
- NSE: Script Post-scanning.
- Initiating NSE at 00:47
- Completed NSE at 00:47, 0.00s elapsed
- Initiating NSE at 00:47
- Completed NSE at 00:47, 0.00s elapsed
- ###############################################################################################################################
- ===============================================================
- Gobuster v3.0.1
- by OJ Reeves (@TheColonial) & Christian Mehlmauer (@_FireFart_)
- ===============================================================
- [+] Url: https://www.cityoflondon.gov.uk
- [+] Threads: 10
- [+] Wordlist: /usr/share/sniper/wordlists/vhosts.txt
- [+] User Agent: gobuster/3.0.1
- [+] Timeout: 10s
- ===============================================================
- 2020/03/31 00:47:39 Starting gobuster
- ===============================================================
- Found: 127.0.0.1.www.cityoflondon.gov.uk (Status: 302) [Size: 183]
- Found: administration.www.cityoflondon.gov.uk (Status: 302) [Size: 188]
- Found: api.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
- Found: ap.www.cityoflondon.gov.uk (Status: 302) [Size: 176]
- Found: apps.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
- Found: apache.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
- Found: adserver.www.cityoflondon.gov.uk (Status: 302) [Size: 182]
- Found: alerts.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
- Found: admin.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
- Found: alpha.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
- Found: app.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
- Found: ads.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
- Found: appserver.www.cityoflondon.gov.uk (Status: 302) [Size: 183]
- Found: aptest.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
- Found: beta.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
- Found: auth.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
- Found: backup.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
- Found: blog.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
- Found: cdn.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
- Found: chat.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
- Found: citrix.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
- Found: cms.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
- Found: corp.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
- Found: crs.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
- Found: cvs.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
- Found: dashboard.www.cityoflondon.gov.uk (Status: 302) [Size: 183]
- Found: database.www.cityoflondon.gov.uk (Status: 302) [Size: 182]
- Found: db.www.cityoflondon.gov.uk (Status: 302) [Size: 176]
- Found: demo.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
- Found: dev.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
- Found: devel.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
- Found: development.www.cityoflondon.gov.uk (Status: 302) [Size: 185]
- Found: devsql.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
- Found: devtest.www.cityoflondon.gov.uk (Status: 302) [Size: 181]
- Found: direct.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
- Found: dhcp.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
- Found: dmz.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
- Found: dns.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
- Found: dns0.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
- Found: dns1.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
- Found: dns2.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
- Found: download.www.cityoflondon.gov.uk (Status: 302) [Size: 182]
- Found: en.www.cityoflondon.gov.uk (Status: 302) [Size: 176]
- Found: erp.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
- Found: eshop.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
- Found: f5.www.cityoflondon.gov.uk (Status: 302) [Size: 176]
- Found: fileserver.www.cityoflondon.gov.uk (Status: 302) [Size: 184]
- Found: exchange.www.cityoflondon.gov.uk (Status: 302) [Size: 182]
- Found: firewall.www.cityoflondon.gov.uk (Status: 302) [Size: 182]
- Found: forum.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
- Found: ftp.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
- Found: ftp0.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
- Found: git.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
- Found: gw.www.cityoflondon.gov.uk (Status: 302) [Size: 176]
- Found: help.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
- Found: helpdesk.www.cityoflondon.gov.uk (Status: 302) [Size: 182]
- Found: host.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
- Found: home.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
- Found: http.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
- Found: id.www.cityoflondon.gov.uk (Status: 302) [Size: 176]
- Found: images.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
- Found: info.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
- Found: internal.www.cityoflondon.gov.uk (Status: 302) [Size: 182]
- Found: internet.www.cityoflondon.gov.uk (Status: 302) [Size: 182]
- Found: intra.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
- Found: intranet.www.cityoflondon.gov.uk (Status: 302) [Size: 182]
- Found: ipv6.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
- Found: lab.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
- Found: ldap.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
- Found: linux.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
- Found: local.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
- Found: localhost.www.cityoflondon.gov.uk (Status: 302) [Size: 183]
- Found: log.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
- Found: m.www.cityoflondon.gov.uk (Status: 302) [Size: 175]
- Found: mail2.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
- Found: mail.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
- Found: mail3.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
- Found: mailgate.www.cityoflondon.gov.uk (Status: 302) [Size: 182]
- Found: main.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
- Found: manage.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
- Found: mgmt.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
- Found: mobile.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
- Found: mirror.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
- Found: monitor.www.cityoflondon.gov.uk (Status: 302) [Size: 181]
- Found: mssql.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
- Found: mta.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
- Found: mx0.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
- Found: mx.www.cityoflondon.gov.uk (Status: 302) [Size: 176]
- Found: mx1.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
- Found: mysql.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
- Found: news.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
- Found: noc.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
- Found: ns.www.cityoflondon.gov.uk (Status: 302) [Size: 176]
- Found: ns0.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
- Found: ns1.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
- Found: ns2.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
- Found: ns3.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
- Found: ntp.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
- Found: old.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
- Found: ops.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
- Found: oracle.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
- Found: owa.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
- Found: pbx.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
- Found: portal.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
- Found: s3.www.cityoflondon.gov.uk (Status: 302) [Size: 176]
- Found: secure.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
- Found: server.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
- Found: sharepoint.www.cityoflondon.gov.uk (Status: 302) [Size: 184]
- Found: shop.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
- Found: sip.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
- Found: ssh.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
- Found: smtp.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
- Found: sql.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
- Found: squid.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
- Found: ssl.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
- Found: stage.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
- Found: stats.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
- Found: staging.www.cityoflondon.gov.uk (Status: 302) [Size: 181]
- Found: status.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
- Found: svn.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
- Found: syslog.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
- Found: test.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
- Found: test1.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
- Found: test2.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
- Found: testing.www.cityoflondon.gov.uk (Status: 302) [Size: 181]
- Found: uat.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
- Found: upload.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
- Found: v1.www.cityoflondon.gov.uk (Status: 302) [Size: 176]
- Found: v2.www.cityoflondon.gov.uk (Status: 302) [Size: 176]
- Found: vm.www.cityoflondon.gov.uk (Status: 302) [Size: 176]
- Found: v3.www.cityoflondon.gov.uk (Status: 302) [Size: 176]
- Found: vnc.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
- Found: voip.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
- Found: vpn.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
- Found: web.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
- Found: web2test.www.cityoflondon.gov.uk (Status: 302) [Size: 182]
- Found: whois.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
- Found: wiki.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
- Found: www2.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
- Found: www.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
- Found: xml.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
- ===============================================================
- 2020/03/31 00:47:42 Finished
- ===============================================================
- ###############################################################################################################################
- Version: 2.0.0-static
- OpenSSL 1.1.1f-dev xx XXX xxxx
- Connected to 80.169.89.102
- Testing SSL server www.cityoflondon.gov.uk on port 443 using SNI name www.cityoflondon.gov.uk
- SSL/TLS Protocols:
- SSLv2 disabled
- SSLv3 disabled
- TLSv1.0 disabled
- TLSv1.1 disabled
- TLSv1.2 enabled
- TLSv1.3 disabled
- TLS Fallback SCSV:
- Server supports TLS Fallback SCSV
- TLS renegotiation:
- Session renegotiation not supported
- TLS Compression:
- Compression disabled
- Heartbleed:
- TLSv1.2 not vulnerable to heartbleed
- Supported Server Cipher(s):
- Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits AES256-GCM-SHA384
- Accepted TLSv1.2 128 bits AES128-GCM-SHA256
- Accepted TLSv1.2 256 bits AES256-SHA256
- Accepted TLSv1.2 256 bits AES256-SHA
- Accepted TLSv1.2 128 bits AES128-SHA256
- Accepted TLSv1.2 128 bits AES128-SHA
- Accepted TLSv1.2 256 bits CAMELLIA256-SHA
- Accepted TLSv1.2 128 bits CAMELLIA128-SHA
- Server Key Exchange Group(s):
- TLSv1.2 128 bits secp256r1 (NIST P-256)
- Server Signature Algorithm(s):
- TLSv1.2 rsa_pkcs1_sha1
- TLSv1.2 dsa_sha1
- TLSv1.2 ecdsa_sha1
- TLSv1.2 rsa_pkcs1_sha224
- TLSv1.2 dsa_sha224
- TLSv1.2 ecdsa_sha224
- TLSv1.2 rsa_pkcs1_sha256
- TLSv1.2 dsa_sha256
- TLSv1.2 ecdsa_secp256r1_sha256
- TLSv1.2 rsa_pkcs1_sha384
- TLSv1.2 dsa_sha384
- TLSv1.2 ecdsa_secp384r1_sha384
- TLSv1.2 rsa_pkcs1_sha512
- TLSv1.2 dsa_sha512
- TLSv1.2 ecdsa_secp521r1_sha512
- SSL Certificate:
- Signature Algorithm: sha256WithRSAEncryption
- RSA Key Strength: 2048
- Subject: *.cityoflondon.gov.uk
- Altnames: DNS:*.cityoflondon.gov.uk, DNS:cityoflondon.gov.uk
- Issuer: Entrust Certification Authority - L1K
- Not valid before: Jan 9 10:15:04 2019 GMT
- Not valid after: Jan 9 10:45:03 2021 GMT
- ##############################################################################################################################
- ------------------------------------------------------------------------------------------------------------------------
- [ ! ] Starting SCANNER INURLBR 2.1 at [31-03-2020 00:48:36]
- [ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
- It is the end user's responsibility to obey all applicable local, state and federal laws.
- Developers assume no liability and are not responsible for any misuse or damage caused by this program
- [ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.cityoflondon.gov.uk/output/inurlbr-www.cityoflondon.gov.uk ]
- [ INFO ][ DORK ]::[ site:www.cityoflondon.gov.uk ]
- [ INFO ][ SEARCHING ]:: {
- [ INFO ][ ENGINE ]::[ GOOGLE - www.google.ki ]
- [ INFO ][ SEARCHING ]::
- -[:::]
- [ INFO ][ ENGINE ]::[ GOOGLE API ]
- [ INFO ][ SEARCHING ]::
- -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
- [ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.gf ID: 012984904789461885316:oy3-mu17hxk ]
- [ INFO ][ SEARCHING ]::
- -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
- [ INFO ][ TOTAL FOUND VALUES ]:: [ 100 ]
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 0 / 100 ]-[00:48:53] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 302 Redirect, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 1 / 100 ]-[00:48:54] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/newsplan/ ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 2 / 100 ]-[00:48:55] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/propertysearch/results.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 3 / 100 ]-[00:48:57] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 4 / 100 ]-[00:48:58] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/keatsHouse/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 5 / 100 ]-[00:48:59] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 6 / 100 ]-[00:49:00] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/_layouts/col/basket.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 7 / 100 ]-[00:49:02] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/contact-us/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 8 / 100 ]-[00:49:03] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-our-website/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 9 / 100 ]-[00:49:04] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/licensing/gambling/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 10 / 100 ]-[00:49:05] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/Pages/homeowner-leaseholder.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 11 / 100 ]-[00:49:06] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-our-website/Pages/accessibility.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 12 / 100 ]-[00:49:07] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/council-tax/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 13 / 100 ]-[00:49:08] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/licensing/Pages/street-trading.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 14 / 100 ]-[00:49:09] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/asia-programme/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 15 / 100 ]-[00:49:10] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/business-rates/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 16 / 100 ]-[00:49:12] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-our-website/Pages/Cookies.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 17 / 100 ]-[00:49:13] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/Pages/resident-involvement.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 18 / 100 ]-[00:49:15] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/business-rates/Pages/contact.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 19 / 100 ]-[00:49:16] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 20 / 100 ]-[00:49:18] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?start1=13 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 21 / 100 ]-[00:49:19] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/business-rates/Pages/payment.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 22 / 100 ]-[00:49:20] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/environmental-health/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 23 / 100 ]-[00:49:21] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Today ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 24 / 100 ]-[00:49:22] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/search/Pages/a-to-z.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 25 / 100 ]-[00:49:23] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/filming/Pages/permissions.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 26 / 100 ]-[00:49:24] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Aug-2019 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 27 / 100 ]-[00:49:26] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/asia-programme/india/Pages/publications.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 28 / 100 ]-[00:49:27] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/Pages/tenancy-visits-programme.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 29 / 100 ]-[00:49:28] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Dec-2019 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 30 / 100 ]-[00:49:29] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Jan-2018 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 31 / 100 ]-[00:49:30] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/Pages/pay-your-rent.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 32 / 100 ]-[00:49:32] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Jan-2020 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 33 / 100 ]-[00:49:33] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Mar-2020 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 34 / 100 ]-[00:49:35] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/Pages/police-authority.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 35 / 100 ]-[00:49:37] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/children-and-families/Pages/adoption.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 36 / 100 ]-[00:49:39] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/adult-social-care/Pages/carers.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 37 / 100 ]-[00:49:41] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/adult-social-care/Pages/dementia.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 38 / 100 ]-[00:49:43] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/asia-programme/india/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 39 / 100 ]-[00:49:44] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/wholesale-food-markets/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 40 / 100 ]-[00:49:46] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/barbican-estate/Pages/resident-involvement.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 41 / 100 ]-[00:49:48] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/history/Pages/mayoralty.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 42 / 100 ]-[00:49:49] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-our-website/Pages/social-media.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 43 / 100 ]-[00:49:51] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Feb-2020 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 44 / 100 ]-[00:49:52] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/pages/default.aspx?Date=Jan-2019 ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 45 / 100 ]-[00:49:54] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/history/Pages/ceremonial.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 46 / 100 ]-[00:49:56] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-our-website/Pages/legal-notices.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 47 / 100 ]-[00:49:59] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/libraries-and-archives/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 48 / 100 ]-[00:50:00] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/environment-and-planning/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 49 / 100 ]-[00:50:02] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/history/Pages/ceremony.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 50 / 100 ]-[00:50:03] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/things-to-do/Pages/leadenhall-market.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 51 / 100 ]-[00:50:05] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/eu-and-regulation/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 52 / 100 ]-[00:50:07] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/licensing/charity-collections/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 53 / 100 ]-[00:50:09] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/environmental-health/Pages/primary-authority.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 54 / 100 ]-[00:50:10] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/community-and-living/Pages/hospitals.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 55 / 100 ]-[00:50:14] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/transport-and-streets/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 56 / 100 ]-[00:50:15] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/barbican-estate/Pages/baggage-stores.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 57 / 100 ]-[00:50:18] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/education-learning/apprenticeships/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 58 / 100 ]-[00:50:20] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/things-to-do/keats-house/Pages/Schools.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 59 / 100 ]-[00:50:22] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/mansion-house/Pages/inside.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 60 / 100 ]-[00:50:23] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/children-and-families/Pages/Sofia-Simpson.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 61 / 100 ]-[00:50:25] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/adult-social-care/Pages/concessionary-travel.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 62 / 100 ]-[00:50:27] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/Pages/Housing-Fire-Safety-.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 63 / 100 ]-[00:50:28] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/mansion-house/Pages/tours.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 64 / 100 ]-[00:50:30] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/health-and-wellbeing/Pages/mental-wellbeing.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 65 / 100 ]-[00:50:31] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/community-and-living/Pages/volunteering-opportunities.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 66 / 100 ]-[00:50:33] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/barbican-estate/services/Pages/buildings-insurance.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 67 / 100 ]-[00:50:36] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/housing-estates/Pages/middlesex-street.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 68 / 100 ]-[00:50:37] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/tenders-and-procurement/Pages/contract-lists.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 69 / 100 ]-[00:50:38] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/health-and-wellbeing/Pages/sexual-health.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 70 / 100 ]-[00:50:40] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/health-and-wellbeing/Pages/covid-19.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 71 / 100 ]-[00:50:41] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/housing-estates/Pages/holloway-estate.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 72 / 100 ]-[00:50:43] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/education-learning/schools/Pages/education-policies.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 73 / 100 ]-[00:50:45] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/Pages/brexit.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 74 / 100 ]-[00:50:47] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/voting-elections/Pages/results.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 75 / 100 ]-[00:50:50] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/housing-estates/Pages/dron-house.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 76 / 100 ]-[00:50:52] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/adult-social-care/Pages/safeguarding-adults.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 77 / 100 ]-[00:50:53] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/homelessness/Pages/duty-to-refer.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 78 / 100 ]-[00:50:54] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/history/Pages/temple-bar.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 79 / 100 ]-[00:50:55] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=This Month ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 400 Bad Request, Server: Microsoft-HTTPAPI/2.0 , IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 80 / 100 ]-[00:50:57] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/things-to-do/keats-house/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 81 / 100 ]-[00:50:58] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/barbican-estate/Pages/barbican-history-architecture.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 82 / 100 ]-[00:50:59] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/barbican-estate/Pages/service-charge-schedules.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 83 / 100 ]-[00:51:01] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/barbican-estate/Pages/barbican-estate-parking.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 84 / 100 ]-[00:51:02] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/children-and-families/Pages/contact-us.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 85 / 100 ]-[00:51:05] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/wholesale-food-markets/billingsgate/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 86 / 100 ]-[00:51:07] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/tenders-and-procurement/Pages/useful-links.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 87 / 100 ]-[00:51:08] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/tenders-and-procurement/pages/responsible-procurement.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 88 / 100 ]-[00:51:11] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/about-us/Pages/publications.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 89 / 100 ]-[00:51:11] [ - ]
- |_[ + ] Target:: [ http://www.cityoflondon.gov.uk/jobs/Documents/Previous_Pension_Rights_form.pdf ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: COL-VMW-M-LB02 , IP:80.169.89.102:80
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 90 / 100 ]-[00:51:14] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/Pages/remembrancers.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 91 / 100 ]-[00:51:16] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/voting-elections/Pages/representation.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 92 / 100 ]-[00:51:18] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/port-health/environmental-control/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 93 / 100 ]-[00:51:19] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/environment-and-planning/planning/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 94 / 100 ]-[00:51:21] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/wholesale-food-markets/smithfield/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 95 / 100 ]-[00:51:23] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/asia-programme/india/Pages/mumbai-office.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 96 / 100 ]-[00:51:27] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/environment-and-planning/sustainability/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 97 / 100 ]-[00:51:28] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/jobs/Documents/TrainingRoomsLocationMap.pdf ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 98 / 100 ]-[00:51:29] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/port-health/import-controls/Pages/default.aspx ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- _[ - ]::--------------------------------------------------------------------------------------------------------------
- |_[ + ] [ 99 / 100 ]-[00:51:31] [ - ]
- |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/search/Pages/a-to-z.aspx?Filter=G ]
- |_[ + ] Exploit::
- |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
- |_[ + ] More details:: / - / , ISP:
- |_[ + ] Found:: UNIDENTIFIED
- [ INFO ] [ Shutting down ]
- [ INFO ] [ End of process INURLBR at [31-03-2020 00:51:31]
- [ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
- [ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.cityoflondon.gov.uk/output/inurlbr-www.cityoflondon.gov.uk ]
- |_________________________________________________________________________________________
- \_________________________________________________________________________________________/
- ################################################################################################################################
- Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-31 00:29 EDT
- Nmap scan report for 80.169.89.102
- Host is up (0.11s latency).
- Not shown: 474 filtered ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE VERSION
- 80/tcp open http COL-VMW-M-LB02
- | fingerprint-strings:
- | FourOhFourRequest:
- | HTTP/1.1 301 Moved Permanently
- | Location: https:///nice%20ports%2C/Tri%6Eity.txt%2ebak
- | Server: COL-VMW-M-LB02
- | Cache-Control: no-cache
- | Connection: close
- | GenericLines:
- | HTTP/1.1 301 Moved Permanently
- | Location: https://
- | Server: COL-VMW-M-LB02
- | Cache-Control: no-cache
- | Connection: close
- | GetRequest, HTTPOptions, RTSPRequest:
- | HTTP/1.1 301 Moved Permanently
- | Location: https:///
- | Server: COL-VMW-M-LB02
- | Cache-Control: no-cache
- | Connection: close
- | SIPOptions:
- | HTTP/1.1 301 Moved Permanently
- | Location: https://sip:nm
- | Server: COL-VMW-M-LB02
- | Cache-Control: no-cache
- |_ Connection: close
- |_http-server-header: COL-VMW-M-LB02
- |_http-title: Did not follow redirect to https://80.169.89.102/
- |_https-redirect: ERROR: Script execution failed (use -d to debug)
- 443/tcp open ssl/http Microsoft IIS httpd 7.5
- |_http-server-header: Microsoft-IIS/7.5
- | http-title: Welcome to the City of London Corporation
- |_Requested resource was https://80.169.89.102/Pages/default.aspx
- | ssl-cert: Subject: commonName=*.cityoflondon.gov.uk/organizationName=City of London Corporation/countryName=GB
- | Subject Alternative Name: DNS:*.cityoflondon.gov.uk, DNS:cityoflondon.gov.uk
- | Not valid before: 2019-01-09T10:15:04
- |_Not valid after: 2021-01-09T10:45:03
- |_ssl-date: TLS randomness does not represent time
- 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
- SF-Port80-TCP:V=7.80%I=7%D=3/31%Time=5E82C73A%P=x86_64-pc-linux-gnu%r(GetR
- SF:equest,7B,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nLocation:\x20htt
- SF:ps:///\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20no-cache\r\nCo
- SF:nnection:\x20close\r\n\r\n")%r(HTTPOptions,7B,"HTTP/1\.1\x20301\x20Move
- SF:d\x20Permanently\r\nLocation:\x20https:///\r\nServer:\x20COL-VMW-M-LB02
- SF:\r\nCache-Control:\x20no-cache\r\nConnection:\x20close\r\n\r\n")%r(RTSP
- SF:Request,7B,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nLocation:\x20ht
- SF:tps:///\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20no-cache\r\nC
- SF:onnection:\x20close\r\n\r\n")%r(FourOhFourRequest,9E,"HTTP/1\.1\x20301\
- SF:x20Moved\x20Permanently\r\nLocation:\x20https:///nice%20ports%2C/Tri%6E
- SF:ity\.txt%2ebak\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20no-cac
- SF:he\r\nConnection:\x20close\r\n\r\n")%r(GenericLines,7A,"HTTP/1\.1\x2030
- SF:1\x20Moved\x20Permanently\r\nLocation:\x20https://\r\nServer:\x20COL-VM
- SF:W-M-LB02\r\nCache-Control:\x20no-cache\r\nConnection:\x20close\r\n\r\n"
- SF:)%r(SIPOptions,80,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nLocation
- SF::\x20https://sip:nm\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20n
- SF:o-cache\r\nConnection:\x20close\r\n\r\n");
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose|firewall|storage-misc
- Running (JUST GUESSING): Linux 2.6.X|3.X (90%), WatchGuard Fireware 11.X (89%), Synology DiskStation Manager 5.X (88%)
- OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3.10 cpe:/o:watchguard:fireware:11.8 cpe:/o:linux:linux_kernel cpe:/a:synology:diskstation_manager:5.1
- Aggressive OS guesses: Linux 2.6.32 (90%), Linux 2.6.39 (90%), Linux 2.6.32 or 3.10 (89%), Linux 3.10 (89%), Linux 3.4 (89%), WatchGuard Fireware 11.8 (89%), Linux 3.1 - 3.2 (89%), Synology DiskStation Manager 5.1 (88%), Linux 2.6.32 - 2.6.39 (85%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 12 hops
- Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
- TRACEROUTE (using port 443/tcp)
- HOP RTT ADDRESS
- 1 104.57 ms 10.203.9.1
- 2 104.74 ms 45.131.5.3
- 3 104.78 ms 109.236.95.224
- 4 106.07 ms 109.236.95.106
- 5 106.39 ms et-0-0-1-pr2.AMS.router.colt.net (80.249.208.236)
- 6 115.80 ms xe0-3-0-sar18.LON.router.colt.net (212.74.68.145)
- 7 115.11 ms xe0-3-0-sar18.LON.router.colt.net (212.74.68.145)
- 8 115.09 ms cpeuk_lon002520.ia.colt.net (80.169.196.38)
- 9 115.87 ms 195.110.81.4
- 10 116.64 ms 195.110.81.4
- 11 113.08 ms 195.110.81.4
- 12 112.98 ms 80.169.89.102
- ###############################################################################################################################
- Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-31 00:32 EDT
- Nmap scan report for 80.169.89.102
- Host is up.
- Not shown: 14 filtered ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE VERSION
- 53/udp open|filtered domain
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 123/udp open|filtered ntp
- 137/udp open|filtered netbios-ns
- 138/udp open|filtered netbios-dgm
- 139/udp open|filtered netbios-ssn
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 520/udp open|filtered route
- 2049/udp open|filtered nfs
- Too many fingerprints match this host to give specific OS details
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 108.63 ms 10.203.9.1
- 2 108.66 ms 45.131.5.2
- 3 108.68 ms 109.236.95.228
- 4 108.82 ms 109.236.95.167
- 5 109.44 ms et-0-0-1-pr2.AMS.router.colt.net (80.249.208.236)
- 6 114.00 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
- 7 113.80 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
- 8 113.61 ms cpeuk_lon002520.ia.colt.net (80.169.196.38)
- 9 113.99 ms 195.110.81.4
- 10 ... 30
- ###############################################################################################################################
- Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-31 00:37 EDT
- Nmap scan report for 80.169.89.102
- Host is up.
- PORT STATE SERVICE VERSION
- 67/tcp filtered dhcps
- 67/udp open|filtered dhcps
- |_dhcp-discover: ERROR: Script execution failed (use -d to debug)
- Too many fingerprints match this host to give specific OS details
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 104.58 ms 10.203.9.1
- 2 104.64 ms 45.131.5.2
- 3 105.60 ms 109.236.95.228
- 4 106.38 ms 109.236.95.167
- 5 106.98 ms et-0-0-1-pr2.AMS.router.colt.net (80.249.208.236)
- 6 116.59 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
- 7 112.26 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
- 8 112.21 ms cpeuk_lon002520.ia.colt.net (80.169.196.38)
- 9 112.30 ms 195.110.81.4
- 10 ... 30
- ##############################################################################################################################
- Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-31 00:39 EDT
- Nmap scan report for 80.169.89.102
- Host is up.
- PORT STATE SERVICE VERSION
- 68/tcp filtered dhcpc
- 68/udp open|filtered dhcpc
- Too many fingerprints match this host to give specific OS details
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 102.08 ms 10.203.9.1
- 2 102.94 ms 45.131.5.2
- 3 102.95 ms 109.236.95.228
- 4 103.36 ms 109.236.95.167
- 5 103.37 ms et-0-0-1-pr2.AMS.router.colt.net (80.249.208.236)
- 6 112.15 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
- 7 112.05 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
- 8 112.03 ms cpeuk_lon002520.ia.colt.net (80.169.196.38)
- 9 112.32 ms 195.110.81.4
- 10 ... 30
- ################################################################################################################################
- Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-31 00:41 EDT
- Nmap scan report for 80.169.89.102
- Host is up.
- PORT STATE SERVICE VERSION
- 69/tcp filtered tftp
- 69/udp open|filtered tftp
- Too many fingerprints match this host to give specific OS details
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 100.67 ms 10.203.9.1
- 2 100.85 ms 45.131.5.2
- 3 100.82 ms 109.236.95.228
- 4 101.71 ms 109.236.95.167
- 5 127.31 ms et-0-0-1-pr2.AMS.router.colt.net (80.249.208.236)
- 6 111.72 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
- 7 111.69 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
- 8 111.33 ms cpeuk_lon002520.ia.colt.net (80.169.196.38)
- 9 111.85 ms 195.110.81.4
- 10 ... 30
- ###############################################################################################################################
- http://80.169.89.102 [301 Moved Permanently] Country[UNITED KINGDOM][GB], HTTPServer[COL-VMW-M-LB02], IP[80.169.89.102], RedirectLocation[https://80.169.89.102/]
- https://80.169.89.102/ [302 Found] Country[UNITED KINGDOM][GB], HTTPServer[Microsoft-IIS/7.5], IP[80.169.89.102], Microsoft-IIS[7.5], Microsoft-Sharepoint[14.0.0.7239], RedirectLocation[https://80.169.89.102/Pages/default.aspx], Title[Document Moved], UncommonHeaders[sprequestguid,x-sharepointhealthscore,microsoftsharepointteamservices,x-ms-invokeapp], X-Powered-By[ASP.NET]
- https://80.169.89.102/Pages/default.aspx [200 OK] ASP_NET[2.0.50727], Country[UNITED KINGDOM][GB], HTTPServer[Microsoft-IIS/7.5], IP[80.169.89.102], JQuery[1.6.2], Microsoft-IIS[7.5], Microsoft-Sharepoint[14.0.0.7239], Script[text/javascript], Title[Welcome to the City of London Corporation], UncommonHeaders[sprequestguid,x-sharepointhealthscore,microsoftsharepointteamservices,x-ms-invokeapp], X-Powered-By[ASP.NET], X-UA-Compatible[IE=9]
- ###############################################################################################################################
- HTTP/1.1 301 Moved Permanently
- Location: https://80.169.89.102/
- Server: COL-VMW-M-LB02
- Cache-Control: no-cache
- Connection: close
- HTTP/1.1 301 Moved Permanently
- Location: https://80.169.89.102/
- Server: COL-VMW-M-LB02
- Cache-Control: no-cache
- Connection: close
- ###############################################################################################################################
- IIS 7.5
- jQuery 1.6.2
- Microsoft ASP.NET 2.0.50727
- Microsoft ASP.NET
- Microsoft SharePoint 14.0.0.7239
- X-MS-InvokeApp: 1; RequireRead
- ###############################################################################################################################
- Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-31 00:44 EDT
- Nmap scan report for 80.169.89.102
- Host is up.
- PORT STATE SERVICE VERSION
- 123/tcp filtered ntp
- 123/udp open|filtered ntp
- Too many fingerprints match this host to give specific OS details
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 101.15 ms 10.203.9.1
- 2 101.34 ms 45.131.5.2
- 3 101.40 ms 109.236.95.228
- 4 102.32 ms 109.236.95.167
- 5 103.12 ms et-0-0-1-pr2.AMS.router.colt.net (80.249.208.236)
- 6 112.00 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
- 7 111.73 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
- 8 111.49 ms cpeuk_lon002520.ia.colt.net (80.169.196.38)
- 9 112.04 ms 195.110.81.4
- 10 ... 30
- ###############################################################################################################################
- https://80.169.89.102/ [302 Found] Country[UNITED KINGDOM][GB], HTTPServer[Microsoft-IIS/7.5], IP[80.169.89.102], Microsoft-IIS[7.5], Microsoft-Sharepoint[14.0.0.7239], RedirectLocation[https://80.169.89.102/Pages/default.aspx], Title[Document Moved], UncommonHeaders[sprequestguid,x-sharepointhealthscore,microsoftsharepointteamservices,x-ms-invokeapp], X-Powered-By[ASP.NET]
- https://80.169.89.102/Pages/default.aspx [200 OK] ASP_NET[2.0.50727], Country[UNITED KINGDOM][GB], HTTPServer[Microsoft-IIS/7.5], IP[80.169.89.102], JQuery[1.6.2], Microsoft-IIS[7.5], Microsoft-Sharepoint[14.0.0.7239], Script[text/javascript], Title[Welcome to the City of London Corporation], UncommonHeaders[sprequestguid,x-sharepointhealthscore,microsoftsharepointteamservices,x-ms-invokeapp], X-Powered-By[ASP.NET], X-UA-Compatible[IE=9]
- ###############################################################################################################################
- jQuery 1.6.2
- IIS 7.5
- Microsoft ASP.NET
- Microsoft SharePoint 14.0.0.7239
- Microsoft ASP.NET 2.0.50727
- X-MS-InvokeApp: 1; RequireReadOnly
- ###############################################################################################################################
- Version: 2.0.0-static
- OpenSSL 1.1.1f-dev xx XXX xxxx
- Connected to 80.169.89.102
- Testing SSL server 80.169.89.102 on port 443 using SNI name 80.169.89.102
- SSL/TLS Protocols:
- SSLv2 disabled
- SSLv3 disabled
- TLSv1.0 disabled
- TLSv1.1 disabled
- TLSv1.2 enabled
- TLSv1.3 disabled
- TLS Fallback SCSV:
- Server supports TLS Fallback SCSV
- TLS renegotiation:
- Session renegotiation not supported
- TLS Compression:
- Compression disabled
- Heartbleed:
- TLSv1.2 not vulnerable to heartbleed
- Supported Server Cipher(s):
- Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
- Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
- Accepted TLSv1.2 256 bits AES256-GCM-SHA384
- Accepted TLSv1.2 128 bits AES128-GCM-SHA256
- Accepted TLSv1.2 256 bits AES256-SHA256
- Accepted TLSv1.2 256 bits AES256-SHA
- Accepted TLSv1.2 128 bits AES128-SHA256
- Accepted TLSv1.2 128 bits AES128-SHA
- Accepted TLSv1.2 256 bits CAMELLIA256-SHA
- Accepted TLSv1.2 128 bits CAMELLIA128-SHA
- Server Key Exchange Group(s):
- TLSv1.2 128 bits secp256r1 (NIST P-256)
- Server Signature Algorithm(s):
- TLSv1.2 rsa_pkcs1_sha1
- TLSv1.2 dsa_sha1
- TLSv1.2 ecdsa_sha1
- TLSv1.2 rsa_pkcs1_sha224
- TLSv1.2 dsa_sha224
- TLSv1.2 ecdsa_sha224
- TLSv1.2 rsa_pkcs1_sha256
- TLSv1.2 dsa_sha256
- TLSv1.2 ecdsa_secp256r1_sha256
- TLSv1.2 rsa_pkcs1_sha384
- TLSv1.2 dsa_sha384
- TLSv1.2 ecdsa_secp384r1_sha384
- TLSv1.2 rsa_pkcs1_sha512
- TLSv1.2 dsa_sha512
- TLSv1.2 ecdsa_secp521r1_sha512
- SSL Certificate:
- Signature Algorithm: sha256WithRSAEncryption
- RSA Key Strength: 2048
- Subject: *.cityoflondon.gov.uk
- Altnames: DNS:*.cityoflondon.gov.uk, DNS:cityoflondon.gov.uk
- Issuer: Entrust Certification Authority - L1K
- Not valid before: Jan 9 10:15:04 2019 GMT
- Not valid after: Jan 9 10:45:03 2021 GMT
- ###############################################################################################################################
- Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-31 00:53 EDT
- Nmap scan report for 80.169.89.102
- Host is up (0.11s latency).
- Not shown: 65533 filtered ports
- PORT STATE SERVICE VERSION
- 80/tcp open http COL-VMW-M-LB02
- | fingerprint-strings:
- | FourOhFourRequest:
- | HTTP/1.1 301 Moved Permanently
- | Location: https:///nice%20ports%2C/Tri%6Eity.txt%2ebak
- | Server: COL-VMW-M-LB02
- | Cache-Control: no-cache
- | Connection: close
- | GenericLines:
- | HTTP/1.1 301 Moved Permanently
- | Location: https://
- | Server: COL-VMW-M-LB02
- | Cache-Control: no-cache
- | Connection: close
- | GetRequest, HTTPOptions, RTSPRequest:
- | HTTP/1.1 301 Moved Permanently
- | Location: https:///
- | Server: COL-VMW-M-LB02
- | Cache-Control: no-cache
- | Connection: close
- | SIPOptions:
- | HTTP/1.1 301 Moved Permanently
- | Location: https://sip:nm
- | Server: COL-VMW-M-LB02
- | Cache-Control: no-cache
- |_ Connection: close
- |_http-server-header: COL-VMW-M-LB02
- |_http-title: Did not follow redirect to https://80.169.89.102/
- |_https-redirect: ERROR: Script execution failed (use -d to debug)
- 443/tcp open ssl/http Microsoft IIS httpd 7.5
- |_http-server-header: Microsoft-IIS/7.5
- | http-title: Welcome to the City of London Corporation
- |_Requested resource was https://80.169.89.102/Pages/default.aspx
- | ssl-cert: Subject: commonName=*.cityoflondon.gov.uk/organizationName=City of London Corporation/countryName=GB
- | Subject Alternative Name: DNS:*.cityoflondon.gov.uk, DNS:cityoflondon.gov.uk
- | Not valid before: 2019-01-09T10:15:04
- |_Not valid after: 2021-01-09T10:45:03
- |_ssl-date: TLS randomness does not represent time
- 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
- SF-Port80-TCP:V=7.80%I=7%D=3/31%Time=5E82CD4F%P=x86_64-pc-linux-gnu%r(GetR
- SF:equest,7B,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nLocation:\x20htt
- SF:ps:///\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20no-cache\r\nCo
- SF:nnection:\x20close\r\n\r\n")%r(HTTPOptions,7B,"HTTP/1\.1\x20301\x20Move
- SF:d\x20Permanently\r\nLocation:\x20https:///\r\nServer:\x20COL-VMW-M-LB02
- SF:\r\nCache-Control:\x20no-cache\r\nConnection:\x20close\r\n\r\n")%r(RTSP
- SF:Request,7B,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nLocation:\x20ht
- SF:tps:///\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20no-cache\r\nC
- SF:onnection:\x20close\r\n\r\n")%r(FourOhFourRequest,9E,"HTTP/1\.1\x20301\
- SF:x20Moved\x20Permanently\r\nLocation:\x20https:///nice%20ports%2C/Tri%6E
- SF:ity\.txt%2ebak\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20no-cac
- SF:he\r\nConnection:\x20close\r\n\r\n")%r(GenericLines,7A,"HTTP/1\.1\x2030
- SF:1\x20Moved\x20Permanently\r\nLocation:\x20https://\r\nServer:\x20COL-VM
- SF:W-M-LB02\r\nCache-Control:\x20no-cache\r\nConnection:\x20close\r\n\r\n"
- SF:)%r(SIPOptions,80,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nLocation
- SF::\x20https://sip:nm\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20n
- SF:o-cache\r\nConnection:\x20close\r\n\r\n");
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose|firewall|storage-misc
- Running (JUST GUESSING): Linux 2.6.X|3.X (90%), WatchGuard Fireware 11.X (89%), Synology DiskStation Manager 5.X (88%)
- OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3.10 cpe:/o:watchguard:fireware:11.8 cpe:/o:linux:linux_kernel cpe:/a:synology:diskstation_manager:5.1
- Aggressive OS guesses: Linux 2.6.32 (90%), Linux 2.6.39 (90%), Linux 3.10 (89%), Linux 3.4 (89%), WatchGuard Fireware 11.8 (89%), Linux 3.1 - 3.2 (89%), Synology DiskStation Manager 5.1 (88%), Linux 2.6.32 or 3.10 (87%), Linux 2.6.32 - 2.6.39 (85%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 12 hops
- Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
- TRACEROUTE (using port 443/tcp)
- HOP RTT ADDRESS
- 1 103.49 ms 10.203.9.1
- 2 100.74 ms 45.131.5.3
- 3 100.76 ms 109.236.95.228
- 4 100.91 ms 109.236.95.173
- 5 101.74 ms et-0-0-1-pr2.AMS.router.colt.net (80.249.208.236)
- 6 111.04 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
- 7 110.61 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
- 8 110.59 ms cpeuk_lon002520.ia.colt.net (80.169.196.38)
- 9 111.04 ms 195.110.81.4
- 10 111.82 ms 195.110.81.4
- 11 113.00 ms 195.110.81.4
- 12 113.00 ms 80.169.89.102
- ###############################################################################################################################
- Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-31 00:58 EDT
- Nmap scan report for 80.169.89.102
- Host is up.
- PORT STATE SERVICE VERSION
- 53/tcp filtered domain
- 67/tcp filtered dhcps
- 68/tcp filtered dhcpc
- 69/tcp filtered tftp
- 88/tcp filtered kerberos-sec
- 123/tcp filtered ntp
- 137/tcp filtered netbios-ns
- 138/tcp filtered netbios-dgm
- 139/tcp filtered netbios-ssn
- 161/tcp filtered snmp
- 162/tcp filtered snmptrap
- 389/tcp filtered ldap
- 520/tcp filtered efs
- 2049/tcp filtered nfs
- 53/udp open|filtered domain
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 123/udp open|filtered ntp
- 137/udp open|filtered netbios-ns
- 138/udp open|filtered netbios-dgm
- 139/udp open|filtered netbios-ssn
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 520/udp open|filtered route
- 2049/udp open|filtered nfs
- Too many fingerprints match this host to give specific OS details
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 104.79 ms 10.203.9.1
- 2 104.88 ms 45.131.5.2
- 3 104.86 ms 109.236.95.228
- 4 105.98 ms 109.236.95.167
- 5 106.79 ms et-0-0-1-pr2.AMS.router.colt.net (80.249.208.236)
- 6 118.96 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
- 7 118.92 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
- 8 115.43 ms cpeuk_lon002520.ia.colt.net (80.169.196.38)
- 9 116.07 ms 195.110.81.4
- 10 ... 30
- ###############################################################################################################################
- Hosts
- =====
- address mac name os_name os_flavor os_sp purpose info comments
- ------- --- ---- ------- --------- ----- ------- ---- --------
- 23.100.15.180 Unknown device
- 52.52.234.222 ec2-52-52-234-222.us-west-1.compute.amazonaws.com embedded device
- 80.169.89.102 Linux 2.6.X server
- 91.211.89.189 embedded device
- 93.174.93.84 Linux 3.X server
- 94.140.114.104 Linux 3.X server
- 104.87.36.73 a104-87-36-73.deploy.static.akamaitechnologies.com Unknown device
- 201.148.104.59 hcenter10459.dedicados.cl Unknown device
- 217.148.69.93 217-148-69-93.lacaixa.com Unknown device
- 217.148.69.235 caixabank.com Unknown device
- 217.148.71.93 217-148-71-93.lacaixa.com Unknown device
- 217.148.71.235 caixabank.com Unknown device
- ###############################################################################################################################
- Services
- ========
- host port proto name state info
- ---- ---- ----- ---- ----- ----
- 23.100.15.180 53 tcp domain filtered
- 23.100.15.180 53 udp domain unknown
- 23.100.15.180 67 tcp dhcps filtered
- 23.100.15.180 67 udp dhcps unknown
- 23.100.15.180 68 tcp dhcpc filtered
- 23.100.15.180 68 udp dhcpc unknown
- 23.100.15.180 69 tcp tftp filtered
- 23.100.15.180 69 udp tftp unknown
- 23.100.15.180 88 tcp kerberos-sec filtered
- 23.100.15.180 88 udp kerberos-sec unknown
- 23.100.15.180 123 tcp ntp filtered
- 23.100.15.180 123 udp ntp unknown
- 23.100.15.180 137 tcp netbios-ns filtered
- 23.100.15.180 137 udp netbios-ns unknown
- 23.100.15.180 138 tcp netbios-dgm filtered
- 23.100.15.180 138 udp netbios-dgm unknown
- 23.100.15.180 139 tcp netbios-ssn filtered
- 23.100.15.180 139 udp netbios-ssn unknown
- 23.100.15.180 161 tcp snmp filtered
- 23.100.15.180 161 udp snmp unknown
- 23.100.15.180 162 tcp snmptrap filtered
- 23.100.15.180 162 udp snmptrap unknown
- 23.100.15.180 389 tcp ldap filtered
- 23.100.15.180 389 udp ldap unknown
- 23.100.15.180 520 tcp efs filtered
- 23.100.15.180 520 udp route unknown
- 23.100.15.180 2049 tcp nfs filtered
- 23.100.15.180 2049 udp nfs unknown
- 52.52.234.222 53 tcp domain filtered
- 52.52.234.222 53 udp domain unknown
- 52.52.234.222 67 tcp dhcps filtered
- 52.52.234.222 67 udp dhcps unknown
- 52.52.234.222 68 tcp dhcpc filtered
- 52.52.234.222 68 udp dhcpc unknown
- 52.52.234.222 69 tcp tftp filtered
- 52.52.234.222 69 udp tftp unknown
- 52.52.234.222 80 tcp http open Apache httpd 2.2.34
- 52.52.234.222 88 tcp kerberos-sec filtered
- 52.52.234.222 88 udp kerberos-sec unknown
- 52.52.234.222 123 tcp ntp filtered
- 52.52.234.222 123 udp ntp unknown
- 52.52.234.222 137 tcp netbios-ns filtered
- 52.52.234.222 137 udp netbios-ns unknown
- 52.52.234.222 138 tcp netbios-dgm filtered
- 52.52.234.222 138 udp netbios-dgm unknown
- 52.52.234.222 139 tcp netbios-ssn filtered
- 52.52.234.222 139 udp netbios-ssn unknown
- 52.52.234.222 161 tcp snmp filtered
- 52.52.234.222 161 udp snmp unknown
- 52.52.234.222 162 tcp snmptrap filtered
- 52.52.234.222 162 udp snmptrap unknown
- 52.52.234.222 389 tcp ldap filtered
- 52.52.234.222 389 udp ldap unknown
- 52.52.234.222 443 tcp ssl/http open Apache Tomcat/Coyote JSP engine 1.1
- 52.52.234.222 520 tcp efs filtered
- 52.52.234.222 520 udp route unknown
- 52.52.234.222 2049 tcp nfs filtered
- 52.52.234.222 2049 udp nfs unknown
- 80.169.89.102 53 tcp domain filtered
- 80.169.89.102 53 udp domain unknown
- 80.169.89.102 67 tcp dhcps filtered
- 80.169.89.102 67 udp dhcps unknown
- 80.169.89.102 68 tcp dhcpc filtered
- 80.169.89.102 68 udp dhcpc unknown
- 80.169.89.102 69 tcp tftp filtered
- 80.169.89.102 69 udp tftp unknown
- 80.169.89.102 80 tcp http open COL-VMW-M-LB02
- 80.169.89.102 88 tcp kerberos-sec filtered
- 80.169.89.102 88 udp kerberos-sec unknown
- 80.169.89.102 123 tcp ntp filtered
- 80.169.89.102 123 udp ntp unknown
- 80.169.89.102 137 tcp netbios-ns filtered
- 80.169.89.102 137 udp netbios-ns unknown
- 80.169.89.102 138 tcp netbios-dgm filtered
- 80.169.89.102 138 udp netbios-dgm unknown
- 80.169.89.102 139 tcp netbios-ssn filtered
- 80.169.89.102 139 udp netbios-ssn unknown
- 80.169.89.102 161 tcp snmp filtered
- 80.169.89.102 161 udp snmp unknown
- 80.169.89.102 162 tcp snmptrap filtered
- 80.169.89.102 162 udp snmptrap unknown
- 80.169.89.102 389 tcp ldap filtered
- 80.169.89.102 389 udp ldap unknown
- 80.169.89.102 443 tcp ssl/http open Microsoft IIS httpd 7.5
- 80.169.89.102 520 tcp efs filtered
- 80.169.89.102 520 udp route unknown
- 80.169.89.102 2049 tcp nfs filtered
- 80.169.89.102 2049 udp nfs unknown
- 91.211.89.189 53 tcp domain closed
- 91.211.89.189 53 udp domain closed
- 91.211.89.189 67 tcp dhcps filtered
- 91.211.89.189 67 udp dhcps closed
- 91.211.89.189 68 tcp dhcpc closed
- 91.211.89.189 68 udp dhcpc unknown
- 91.211.89.189 69 tcp tftp closed
- 91.211.89.189 69 udp tftp closed
- 91.211.89.189 88 tcp kerberos-sec filtered
- 91.211.89.189 88 udp kerberos-sec closed
- 91.211.89.189 123 tcp ntp closed
- 91.211.89.189 123 udp ntp closed
- 91.211.89.189 137 tcp netbios-ns closed
- 91.211.89.189 137 udp netbios-ns closed
- 91.211.89.189 138 tcp netbios-dgm closed
- 91.211.89.189 138 udp netbios-dgm unknown
- 91.211.89.189 139 tcp netbios-ssn filtered
- 91.211.89.189 139 udp netbios-ssn unknown
- 91.211.89.189 161 tcp snmp filtered
- 91.211.89.189 161 udp snmp unknown
- 91.211.89.189 162 tcp snmptrap closed
- 91.211.89.189 162 udp snmptrap closed
- 91.211.89.189 389 tcp ldap closed
- 91.211.89.189 389 udp ldap closed
- 91.211.89.189 520 tcp efs filtered
- 91.211.89.189 520 udp route unknown
- 91.211.89.189 2049 tcp nfs closed
- 91.211.89.189 2049 udp nfs closed
- 93.174.93.84 53 tcp domain filtered
- 93.174.93.84 53 udp domain unknown
- 93.174.93.84 67 tcp dhcps filtered
- 93.174.93.84 67 udp dhcps unknown
- 93.174.93.84 68 tcp dhcpc filtered
- 93.174.93.84 68 udp dhcpc unknown
- 93.174.93.84 69 tcp tftp filtered
- 93.174.93.84 69 udp tftp unknown
- 93.174.93.84 80 tcp http open Apache httpd 2.4.6 (CentOS) PHP/5.4.16
- 93.174.93.84 88 tcp kerberos-sec filtered
- 93.174.93.84 88 udp kerberos-sec unknown
- 93.174.93.84 123 tcp ntp filtered
- 93.174.93.84 123 udp ntp filtered
- 93.174.93.84 137 tcp netbios-ns filtered
- 93.174.93.84 137 udp netbios-ns unknown
- 93.174.93.84 138 tcp netbios-dgm filtered
- 93.174.93.84 138 udp netbios-dgm filtered
- 93.174.93.84 139 tcp netbios-ssn filtered
- 93.174.93.84 139 udp netbios-ssn filtered
- 93.174.93.84 161 tcp snmp filtered
- 93.174.93.84 161 udp snmp unknown
- 93.174.93.84 162 tcp snmptrap filtered
- 93.174.93.84 162 udp snmptrap filtered
- 93.174.93.84 389 tcp ldap filtered
- 93.174.93.84 389 udp ldap unknown
- 93.174.93.84 520 tcp efs filtered
- 93.174.93.84 520 udp route unknown
- 93.174.93.84 2049 tcp nfs filtered
- 93.174.93.84 2049 udp nfs unknown
- 93.174.93.84 3030 tcp http-proxy open tinyproxy 1.8.3
- 94.140.114.104 22 tcp ssh open OpenSSH 7.4 protocol 2.0
- 94.140.114.104 53 tcp domain closed
- 94.140.114.104 53 udp domain closed
- 94.140.114.104 67 tcp dhcps closed
- 94.140.114.104 67 udp dhcps unknown
- 94.140.114.104 68 tcp dhcpc closed
- 94.140.114.104 68 udp dhcpc unknown
- 94.140.114.104 69 tcp tftp closed
- 94.140.114.104 69 udp tftp closed
- 94.140.114.104 80 tcp http open nginx 1.16.1
- 94.140.114.104 88 tcp kerberos-sec closed
- 94.140.114.104 88 udp kerberos-sec closed
- 94.140.114.104 111 tcp rpcbind open 2-4 RPC #100000
- 94.140.114.104 123 tcp ntp closed
- 94.140.114.104 123 udp ntp unknown
- 94.140.114.104 135 tcp msrpc filtered
- 94.140.114.104 137 tcp netbios-ns filtered
- 94.140.114.104 137 udp netbios-ns unknown
- 94.140.114.104 138 tcp netbios-dgm filtered
- 94.140.114.104 138 udp netbios-dgm unknown
- 94.140.114.104 139 tcp netbios-ssn closed
- 94.140.114.104 139 udp netbios-ssn closed
- 94.140.114.104 161 tcp snmp closed
- 94.140.114.104 161 udp snmp closed
- 94.140.114.104 162 tcp snmptrap closed
- 94.140.114.104 162 udp snmptrap unknown
- 94.140.114.104 389 tcp ldap closed
- 94.140.114.104 389 udp ldap unknown
- 94.140.114.104 520 tcp efs closed
- 94.140.114.104 520 udp route closed
- 94.140.114.104 2049 tcp nfs closed
- 94.140.114.104 2049 udp nfs unknown
- 104.87.36.73 53 tcp domain filtered
- 104.87.36.73 53 udp domain unknown
- 104.87.36.73 67 tcp dhcps filtered
- 104.87.36.73 67 udp dhcps unknown
- 104.87.36.73 68 tcp dhcpc filtered
- 104.87.36.73 68 udp dhcpc unknown
- 104.87.36.73 69 tcp tftp filtered
- 104.87.36.73 69 udp tftp unknown
- 104.87.36.73 88 tcp kerberos-sec filtered
- 104.87.36.73 88 udp kerberos-sec unknown
- 104.87.36.73 123 tcp ntp filtered
- 104.87.36.73 123 udp ntp unknown
- 104.87.36.73 137 tcp netbios-ns filtered
- 104.87.36.73 137 udp netbios-ns unknown
- 104.87.36.73 138 tcp netbios-dgm filtered
- 104.87.36.73 138 udp netbios-dgm unknown
- 104.87.36.73 139 tcp netbios-ssn filtered
- 104.87.36.73 139 udp netbios-ssn unknown
- 104.87.36.73 161 tcp snmp filtered
- 104.87.36.73 161 udp snmp unknown
- 104.87.36.73 162 tcp snmptrap filtered
- 104.87.36.73 162 udp snmptrap unknown
- 104.87.36.73 389 tcp ldap filtered
- 104.87.36.73 389 udp ldap unknown
- 104.87.36.73 520 tcp efs filtered
- 104.87.36.73 520 udp route unknown
- 104.87.36.73 2049 tcp nfs filtered
- 104.87.36.73 2049 udp nfs unknown
- 201.148.104.59 21 tcp ftp open The firewall on this server is blocking your connection. You need to contact the server owner or hosting provider for further information. Your blocked IP address is: 190.105.229.22 This server's hostname is: hcenter10459.dedicados.cl \x0d\x0a
- 201.148.104.59 53 tcp domain filtered
- 201.148.104.59 53 udp domain unknown
- 201.148.104.59 67 tcp dhcps filtered
- 201.148.104.59 67 udp dhcps unknown
- 201.148.104.59 68 tcp dhcpc filtered
- 201.148.104.59 68 udp dhcpc unknown
- 201.148.104.59 69 tcp tftp filtered
- 201.148.104.59 69 udp tftp unknown
- 201.148.104.59 88 tcp kerberos-sec filtered
- 201.148.104.59 88 udp kerberos-sec unknown
- 201.148.104.59 123 tcp ntp filtered
- 201.148.104.59 123 udp ntp unknown
- 201.148.104.59 137 tcp netbios-ns filtered
- 201.148.104.59 137 udp netbios-ns unknown
- 201.148.104.59 138 tcp netbios-dgm filtered
- 201.148.104.59 138 udp netbios-dgm unknown
- 201.148.104.59 139 tcp netbios-ssn filtered
- 201.148.104.59 139 udp netbios-ssn unknown
- 201.148.104.59 161 tcp snmp filtered
- 201.148.104.59 161 udp snmp unknown
- 201.148.104.59 162 tcp snmptrap filtered
- 201.148.104.59 162 udp snmptrap unknown
- 201.148.104.59 389 tcp ldap filtered
- 201.148.104.59 389 udp ldap unknown
- 201.148.104.59 520 tcp efs filtered
- 201.148.104.59 520 udp route unknown
- 201.148.104.59 2049 tcp nfs filtered
- 201.148.104.59 2049 udp nfs unknown
- 217.148.69.93 53 tcp domain filtered
- 217.148.69.93 53 udp domain unknown
- 217.148.69.93 67 tcp dhcps filtered
- 217.148.69.93 67 udp dhcps unknown
- 217.148.69.93 68 tcp dhcpc filtered
- 217.148.69.93 68 udp dhcpc unknown
- 217.148.69.93 69 tcp tftp filtered
- 217.148.69.93 69 udp tftp unknown
- 217.148.69.93 88 tcp kerberos-sec filtered
- 217.148.69.93 88 udp kerberos-sec unknown
- 217.148.69.93 123 tcp ntp filtered
- 217.148.69.93 123 udp ntp unknown
- 217.148.69.93 137 tcp netbios-ns filtered
- 217.148.69.93 137 udp netbios-ns unknown
- 217.148.69.93 138 tcp netbios-dgm filtered
- 217.148.69.93 138 udp netbios-dgm unknown
- 217.148.69.93 139 tcp netbios-ssn filtered
- 217.148.69.93 139 udp netbios-ssn unknown
- 217.148.69.93 161 tcp snmp filtered
- 217.148.69.93 161 udp snmp unknown
- 217.148.69.93 162 tcp snmptrap filtered
- 217.148.69.93 162 udp snmptrap unknown
- 217.148.69.93 389 tcp ldap filtered
- 217.148.69.93 389 udp ldap unknown
- 217.148.69.93 520 tcp efs filtered
- 217.148.69.93 520 udp route unknown
- 217.148.69.93 2049 tcp nfs filtered
- 217.148.69.93 2049 udp nfs unknown
- 217.148.69.235 53 tcp domain filtered
- 217.148.69.235 53 udp domain unknown
- 217.148.69.235 67 tcp dhcps filtered
- 217.148.69.235 67 udp dhcps unknown
- 217.148.69.235 68 tcp dhcpc filtered
- 217.148.69.235 68 udp dhcpc unknown
- 217.148.69.235 69 tcp tftp filtered
- 217.148.69.235 69 udp tftp unknown
- 217.148.69.235 88 tcp kerberos-sec filtered
- 217.148.69.235 88 udp kerberos-sec unknown
- 217.148.69.235 123 tcp ntp filtered
- 217.148.69.235 123 udp ntp unknown
- 217.148.69.235 137 tcp netbios-ns filtered
- 217.148.69.235 137 udp netbios-ns unknown
- 217.148.69.235 138 tcp netbios-dgm filtered
- 217.148.69.235 138 udp netbios-dgm unknown
- 217.148.69.235 139 tcp netbios-ssn filtered
- 217.148.69.235 139 udp netbios-ssn unknown
- 217.148.69.235 161 tcp snmp filtered
- 217.148.69.235 161 udp snmp unknown
- 217.148.69.235 162 tcp snmptrap filtered
- 217.148.69.235 162 udp snmptrap unknown
- 217.148.69.235 389 tcp ldap filtered
- 217.148.69.235 389 udp ldap unknown
- 217.148.69.235 520 tcp efs filtered
- 217.148.69.235 520 udp route unknown
- 217.148.69.235 2049 tcp nfs filtered
- 217.148.69.235 2049 udp nfs unknown
- 217.148.71.93 53 tcp domain filtered
- 217.148.71.93 53 udp domain unknown
- 217.148.71.93 67 tcp dhcps filtered
- 217.148.71.93 67 udp dhcps unknown
- 217.148.71.93 68 tcp dhcpc filtered
- 217.148.71.93 68 udp dhcpc unknown
- 217.148.71.93 69 tcp tftp filtered
- 217.148.71.93 69 udp tftp unknown
- 217.148.71.93 88 tcp kerberos-sec filtered
- 217.148.71.93 88 udp kerberos-sec unknown
- 217.148.71.93 123 tcp ntp filtered
- 217.148.71.93 123 udp ntp unknown
- 217.148.71.93 137 tcp netbios-ns filtered
- 217.148.71.93 137 udp netbios-ns unknown
- 217.148.71.93 138 tcp netbios-dgm filtered
- 217.148.71.93 138 udp netbios-dgm unknown
- 217.148.71.93 139 tcp netbios-ssn filtered
- 217.148.71.93 139 udp netbios-ssn unknown
- 217.148.71.93 161 tcp snmp filtered
- 217.148.71.93 161 udp snmp unknown
- 217.148.71.93 162 tcp snmptrap filtered
- 217.148.71.93 162 udp snmptrap unknown
- 217.148.71.93 389 tcp ldap filtered
- 217.148.71.93 389 udp ldap unknown
- 217.148.71.93 520 tcp efs filtered
- 217.148.71.93 520 udp route unknown
- 217.148.71.93 2049 tcp nfs filtered
- 217.148.71.93 2049 udp nfs unknown
- 217.148.71.235 53 tcp domain filtered
- 217.148.71.235 53 udp domain unknown
- 217.148.71.235 67 tcp dhcps filtered
- 217.148.71.235 67 udp dhcps unknown
- 217.148.71.235 68 tcp dhcpc filtered
- 217.148.71.235 68 udp dhcpc unknown
- 217.148.71.235 69 tcp tftp filtered
- 217.148.71.235 69 udp tftp unknown
- 217.148.71.235 88 tcp kerberos-sec filtered
- 217.148.71.235 88 udp kerberos-sec unknown
- 217.148.71.235 123 tcp ntp filtered
- 217.148.71.235 123 udp ntp unknown
- 217.148.71.235 137 tcp netbios-ns filtered
- 217.148.71.235 137 udp netbios-ns unknown
- 217.148.71.235 138 tcp netbios-dgm filtered
- 217.148.71.235 138 udp netbios-dgm unknown
- 217.148.71.235 139 tcp netbios-ssn filtered
- 217.148.71.235 139 udp netbios-ssn unknown
- 217.148.71.235 161 tcp snmp filtered
- 217.148.71.235 161 udp snmp unknown
- 217.148.71.235 162 tcp snmptrap filtered
- 217.148.71.235 162 udp snmptrap unknown
- 217.148.71.235 389 tcp ldap filtered
- 217.148.71.235 389 udp ldap unknown
- 217.148.71.235 520 tcp efs filtered
- 217.148.71.235 520 udp route unknown
- 217.148.71.235 2049 tcp nfs filtered
- 217.148.71.235 2049 udp nfs unknown
- ##############################################################################################################################
- Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-31 00:32 EDT
- NSE: Loaded 151 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 00:32
- Completed NSE at 00:32, 0.00s elapsed
- Initiating NSE at 00:32
- Completed NSE at 00:32, 0.00s elapsed
- Initiating NSE at 00:32
- Completed NSE at 00:32, 0.00s elapsed
- Initiating Ping Scan at 00:32
- Scanning 80.169.89.102 [4 ports]
- Completed Ping Scan at 00:32, 0.15s elapsed (1 total hosts)
- Initiating Parallel DNS resolution of 1 host. at 00:32
- Completed Parallel DNS resolution of 1 host. at 00:32, 0.03s elapsed
- Initiating SYN Stealth Scan at 00:32
- Scanning 80.169.89.102 [1000 ports]
- Discovered open port 80/tcp on 80.169.89.102
- Discovered open port 443/tcp on 80.169.89.102
- Completed SYN Stealth Scan at 00:32, 8.41s elapsed (1000 total ports)
- Initiating Service scan at 00:32
- Scanning 2 services on 80.169.89.102
- Completed Service scan at 00:34, 127.59s elapsed (2 services on 1 host)
- Initiating OS detection (try #1) against 80.169.89.102
- Retrying OS detection (try #2) against 80.169.89.102
- Initiating Traceroute at 00:34
- Completed Traceroute at 00:34, 0.59s elapsed
- Initiating Parallel DNS resolution of 9 hosts. at 00:34
- Completed Parallel DNS resolution of 9 hosts. at 00:34, 0.17s elapsed
- NSE: Script scanning 80.169.89.102.
- Initiating NSE at 00:34
- Completed NSE at 00:35, 17.45s elapsed
- Initiating NSE at 00:35
- Completed NSE at 00:35, 1.24s elapsed
- Initiating NSE at 00:35
- Completed NSE at 00:35, 0.00s elapsed
- Nmap scan report for 80.169.89.102
- Host is up (0.11s latency).
- Not shown: 998 filtered ports
- PORT STATE SERVICE VERSION
- 80/tcp open http COL-VMW-M-LB02
- | fingerprint-strings:
- | FourOhFourRequest:
- | HTTP/1.1 301 Moved Permanently
- | Location: https:///nice%20ports%2C/Tri%6Eity.txt%2ebak
- | Server: COL-VMW-M-LB02
- | Cache-Control: no-cache
- | Connection: close
- | GenericLines:
- | HTTP/1.1 301 Moved Permanently
- | Location: https://
- | Server: COL-VMW-M-LB02
- | Cache-Control: no-cache
- | Connection: close
- | GetRequest, HTTPOptions, RTSPRequest:
- | HTTP/1.1 301 Moved Permanently
- | Location: https:///
- | Server: COL-VMW-M-LB02
- | Cache-Control: no-cache
- | Connection: close
- | SIPOptions:
- | HTTP/1.1 301 Moved Permanently
- | Location: https://sip:nm
- | Server: COL-VMW-M-LB02
- | Cache-Control: no-cache
- |_ Connection: close
- | http-methods:
- |_ Supported Methods: GET HEAD POST OPTIONS
- |_http-server-header: COL-VMW-M-LB02
- |_http-title: Did not follow redirect to https://80.169.89.102/
- |_https-redirect: ERROR: Script execution failed (use -d to debug)
- 443/tcp open ssl/http Microsoft IIS httpd 7.5
- | http-methods:
- |_ Supported Methods: GET HEAD POST OPTIONS
- |_http-server-header: Microsoft-IIS/7.5
- | http-title: Welcome to the City of London Corporation
- |_Requested resource was https://80.169.89.102/Pages/default.aspx
- | ssl-cert: Subject: commonName=*.cityoflondon.gov.uk/organizationName=City of London Corporation/countryName=GB
- | Subject Alternative Name: DNS:*.cityoflondon.gov.uk, DNS:cityoflondon.gov.uk
- | Issuer: commonName=Entrust Certification Authority - L1K/organizationName=Entrust, Inc./countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2019-01-09T10:15:04
- | Not valid after: 2021-01-09T10:45:03
- | MD5: 4f24 791b 0cf7 72b6 48e0 faac 5dd4 3c66
- |_SHA-1: 414c 9a2c e74f b30a 5c45 a40d 2288 a043 93d7 4d99
- |_ssl-date: TLS randomness does not represent time
- 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
- SF-Port80-TCP:V=7.80%I=7%D=3/31%Time=5E82C7F0%P=x86_64-pc-linux-gnu%r(GetR
- SF:equest,7B,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nLocation:\x20htt
- SF:ps:///\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20no-cache\r\nCo
- SF:nnection:\x20close\r\n\r\n")%r(HTTPOptions,7B,"HTTP/1\.1\x20301\x20Move
- SF:d\x20Permanently\r\nLocation:\x20https:///\r\nServer:\x20COL-VMW-M-LB02
- SF:\r\nCache-Control:\x20no-cache\r\nConnection:\x20close\r\n\r\n")%r(RTSP
- SF:Request,7B,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nLocation:\x20ht
- SF:tps:///\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20no-cache\r\nC
- SF:onnection:\x20close\r\n\r\n")%r(FourOhFourRequest,9E,"HTTP/1\.1\x20301\
- SF:x20Moved\x20Permanently\r\nLocation:\x20https:///nice%20ports%2C/Tri%6E
- SF:ity\.txt%2ebak\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20no-cac
- SF:he\r\nConnection:\x20close\r\n\r\n")%r(GenericLines,7A,"HTTP/1\.1\x2030
- SF:1\x20Moved\x20Permanently\r\nLocation:\x20https://\r\nServer:\x20COL-VM
- SF:W-M-LB02\r\nCache-Control:\x20no-cache\r\nConnection:\x20close\r\n\r\n"
- SF:)%r(SIPOptions,80,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nLocation
- SF::\x20https://sip:nm\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20n
- SF:o-cache\r\nConnection:\x20close\r\n\r\n");
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose|firewall|storage-misc
- Running (JUST GUESSING): Linux 2.6.X|3.X (90%), WatchGuard Fireware 11.X (89%), Synology DiskStation Manager 5.X (88%)
- OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3.10 cpe:/o:watchguard:fireware:11.8 cpe:/o:linux:linux_kernel cpe:/a:synology:diskstation_manager:5.1
- Aggressive OS guesses: Linux 2.6.32 (90%), Linux 2.6.39 (90%), Linux 3.10 (89%), Linux 3.4 (89%), WatchGuard Fireware 11.8 (89%), Linux 3.1 - 3.2 (89%), Synology DiskStation Manager 5.1 (88%), Linux 2.6.32 or 3.10 (87%), Linux 2.6.32 - 2.6.39 (85%)
- No exact OS matches for host (test conditions non-ideal).
- Uptime guess: 0.184 days (since Mon Mar 30 20:10:16 2020)
- Network Distance: 12 hops
- TCP Sequence Prediction: Difficulty=261 (Good luck!)
- IP ID Sequence Generation: All zeros
- Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
- TRACEROUTE (using port 443/tcp)
- HOP RTT ADDRESS
- 1 104.79 ms 10.203.9.1
- 2 577.87 ms 45.131.5.2
- 3 104.87 ms 109.236.95.230
- 4 106.03 ms 109.236.95.106
- 5 106.15 ms et-0-0-1-pr2.AMS.router.colt.net (80.249.208.236)
- 6 115.49 ms 212.74.75.37
- 7 115.46 ms 212.74.75.37
- 8 111.26 ms cpeuk_lon002520.ia.colt.net (80.169.196.38)
- 9 111.76 ms 195.110.81.4
- 10 113.12 ms 195.110.81.4
- 11 115.47 ms 195.110.81.4
- 12 115.31 ms 80.169.89.102
- NSE: Script Post-scanning.
- Initiating NSE at 00:35
- Completed NSE at 00:35, 0.00s elapsed
- Initiating NSE at 00:35
- Completed NSE at 00:35, 0.00s elapsed
- Initiating NSE at 00:35
- Completed NSE at 00:35, 0.00s elapsed
- ###########################################################################################################################
- Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-31 00:29 EDT
- Nmap scan report for cityoflondon.gov.uk (80.169.89.102)
- Host is up (0.11s latency).
- Not shown: 998 filtered ports
- PORT STATE SERVICE VERSION
- 80/tcp open http COL-VMW-M-LB02
- | fingerprint-strings:
- | FourOhFourRequest:
- | HTTP/1.1 301 Moved Permanently
- | Location: https:///nice%20ports%2C/Tri%6Eity.txt%2ebak
- | Server: COL-VMW-M-LB02
- | Cache-Control: no-cache
- | Connection: close
- | GenericLines:
- | HTTP/1.1 301 Moved Permanently
- | Location: https://
- | Server: COL-VMW-M-LB02
- | Cache-Control: no-cache
- | Connection: close
- | GetRequest, HTTPOptions, RTSPRequest:
- | HTTP/1.1 301 Moved Permanently
- | Location: https:///
- | Server: COL-VMW-M-LB02
- | Cache-Control: no-cache
- | Connection: close
- | SIPOptions:
- | HTTP/1.1 301 Moved Permanently
- | Location: https://sip:nm
- | Server: COL-VMW-M-LB02
- | Cache-Control: no-cache
- |_ Connection: close
- |_http-server-header: COL-VMW-M-LB02
- |_https-redirect: ERROR: Script execution failed (use -d to debug)
- 443/tcp open ssl/http Microsoft IIS httpd 7.5
- | http-server-header:
- | COL-VMW-M-LB02
- |_ Microsoft-IIS/7.5
- | vulscan: VulDB - https://vuldb.com:
- | [68404] Microsoft IIS 7.5 Error Message mypage cross site scripting
- | [6924] Microsoft IIS 7.5 Log File Permission information disclosure
- | [5623] Microsoft IIS up to 7.5 File Name Tilde privilege escalation
- | [4234] Microsoft IIS 7.5 FTP Server Telnet IAC Character Heap-based denial of service
- | [4179] Microsoft IIS 7.5 FastCGI Request Header memory corruption
- | [98097] Microsoft IIS 7.0/7.5/8.0/8.5/10 /uncpath/ cross site scripting
- | [6925] Microsoft IIS 7.0/7.5 FTP Command information disclosure
- | [4484] Microsoft Windows Phone 7.5 SMS Service denial of service
- |
- | MITRE CVE - https://cve.mitre.org:
- | [CVE-2012-2532] Microsoft FTP Service 7.0 and 7.5 for Internet Information Services (IIS) processes unspecified commands before TLS is enabled for a session, which allows remote attackers to obtain sensitive information by reading the replies to these commands, aka "FTP Command Injection Vulnerability."
- | [CVE-2012-2531] Microsoft Internet Information Services (IIS) 7.5 uses weak permissions for the Operational log, which allows local users to discover credentials by reading this file, aka "Password Disclosure Vulnerability."
- | [CVE-2010-3972] Heap-based buffer overflow in the TELNET_STREAM_CONTEXT::OnSendData function in ftpsvc.dll in Microsoft FTP Service 7.0 and 7.5 for Internet Information Services (IIS) 7.0, and IIS 7.5, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a crafted FTP command, aka "IIS FTP Service Heap Buffer Overrun Vulnerability." NOTE: some of these details are obtained from third party information.
- | [CVE-2010-2730] Buffer overflow in Microsoft Internet Information Services (IIS) 7.5, when FastCGI is enabled, allows remote attackers to execute arbitrary code via crafted headers in a request, aka "Request Header Buffer Overflow Vulnerability."
- | [CVE-2010-1899] Stack consumption vulnerability in the ASP implementation in Microsoft Internet Information Services (IIS) 5.1, 6.0, 7.0, and 7.5 allows remote attackers to cause a denial of service (daemon outage) via a crafted request, related to asp.dll, aka "IIS Repeated Parameter Request Denial of Service Vulnerability."
- | [CVE-2010-1256] Unspecified vulnerability in Microsoft IIS 6.0, 7.0, and 7.5, when Extended Protection for Authentication is enabled, allows remote authenticated users to execute arbitrary code via unknown vectors related to "token checking" that trigger memory corruption, aka "IIS Authentication Memory Corruption Vulnerability."
- | [CVE-2013-0941] EMC RSA Authentication API before 8.1 SP1, RSA Web Agent before 5.3.5 for Apache Web Server, RSA Web Agent before 5.3.5 for IIS, RSA PAM Agent before 7.0, and RSA Agent before 6.1.4 for Microsoft Windows use an improper encryption algorithm and a weak key for maintaining the stored data of the node secret for the SecurID Authentication API, which allows local users to obtain sensitive information via cryptographic attacks on this data.
- | [CVE-2010-3229] The Secure Channel (aka SChannel) security package in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7, when IIS 7.x is used, does not properly process client certificates during SSL and TLS handshakes, which allows remote attackers to cause a denial of service (LSASS outage and reboot) via a crafted packet, aka "TLSv1 Denial of Service Vulnerability."
- | [CVE-2010-1886] Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 SP2 and R2, and Windows 7 allow local users to gain privileges by leveraging access to a process with NetworkService credentials, as demonstrated by TAPI Server, SQL Server, and IIS processes, and related to the Windows Service Isolation feature. NOTE: the vendor states that privilege escalation from NetworkService to LocalSystem does not cross a "security boundary."
- | [CVE-2009-3555] The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
- | [CVE-2009-2521] Stack consumption vulnerability in the FTP Service in Microsoft Internet Information Services (IIS) 5.0 through 7.0 allows remote authenticated users to cause a denial of service (daemon crash) via a list (ls) -R command containing a wildcard that references a subdirectory, followed by a .. (dot dot), aka "IIS FTP Service DoS Vulnerability."
- | [CVE-2009-1536] ASP.NET in Microsoft .NET Framework 2.0 SP1 and SP2 and 3.5 Gold and SP1, when ASP 2.0 is used in integrated mode on IIS 7.0, does not properly manage request scheduling, which allows remote attackers to cause a denial of service (daemon outage) via a series of crafted HTTP requests, aka "Remote Unauthenticated Denial of Service in ASP.NET Vulnerability."
- | [CVE-2008-1446] Integer overflow in the Internet Printing Protocol (IPP) ISAPI extension in Microsoft Internet Information Services (IIS) 5.0 through 7.0 on Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, and Server 2008 allows remote authenticated users to execute arbitrary code via an HTTP POST request that triggers an outbound IPP connection from a web server to a machine operated by the attacker, aka "Integer Overflow in IPP Service Vulnerability."
- | [CVE-2008-0074] Unspecified vulnerability in Microsoft Internet Information Services (IIS) 5.0 through 7.0 allows local users to gain privileges via unknown vectors related to file change notifications in the TPRoot, NNTPFile\Root, or WWWRoot folders.
- | [CVE-2007-2931] Heap-based buffer overflow in Microsoft MSN Messenger 6.2, 7.0, and 7.5, and Live Messenger 8.0 allows user-assisted remote attackers to execute arbitrary code via unspecified vectors involving video conversation handling in Web Cam and video chat sessions.
- | [CVE-2007-1278] Unspecified vulnerability in the IIS connector in Adobe JRun 4.0 Updater 6, and ColdFusion MX 6.1 and 7.0 Enterprise, when using Microsoft IIS 6, allows remote attackers to cause a denial of service via unspecified vectors, involving the request of a file in the JRun web root.
- | [CVE-2006-5858] Adobe ColdFusion MX 7 through 7.0.2, and JRun 4, when run on Microsoft IIS, allows remote attackers to read arbitrary files, list directories, or read source code via a double URL-encoded NULL byte in a ColdFusion filename, such as a CFM file.
- | [CVE-2006-5028] Directory traversal vulnerability in filemanager/filemanager.php in SWsoft Plesk 7.5 Reload and Plesk 7.6 for Microsoft Windows allows remote attackers to list arbitrary directories via a ../ (dot dot slash) in the file parameter in a chdir action.
- | [CVE-2006-0363] The "Remember my Password" feature in MSN Messenger 7.5 stores passwords in an encrypted format under the HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Creds registry key, which might allow local users to obtain the original passwords via a program that calls CryptUnprotectData, as demonstrated by the "MSN Password Recovery.exe" program. NOTE: it could be argued that local-only password recovery is inherently insecure because the decryption methods and keys must be stored somewhere on the local system, and are thus inherently accessible with varying degrees of effort. Perhaps this issue should not be included in CVE.
- |
- | SecurityFocus - https://www.securityfocus.com/bid/:
- | [55569] Microsoft Windows Phone 7 SSL Certificate 'Common Name' Validation Security Bypass Vulnerability
- | [28820] Microsoft Works 7 'WkImgSrv.dll' ActiveX Control Remote Code Execution Vulnerability
- | [28498] Microsoft Internet Explorer 7 Popup Window Address Bar URI Spoofing Vulnerability
- | [24483] Microsoft Internet Explorer 7 HTTP Authentication International Domain Name Spoofing Weakness
- | [20728] Microsoft Internet Explorer 7 Popup Window Address Bar Spoofing Weakness
- | [18736] Microsoft Internet Explorer 7 Denial of Service Vulnerability
- | [5877] Microsoft SQL Server 7.0/2000 DBCC Buffer Overflow Vulnerability
- | [4108] Microsoft Visual C++ 7/Visual C++.Net Buffer Overflow Protection Weakness
- | [1714] Microsoft Windows Media Player 7 Embedded OCX Control Vulnerability
- | [1444] Microsoft SQL Server 7.0 Stored Procedure Vulnerability
- | [1281] Microsoft SQL Server 7.0 System Administrator Password Disclosure Vulnerability
- | [817] Microsoft SQL Server 7.0 NULL Data DoS Vulnerability
- | [90065] Microsoft Windows Kernel 'Win32k.sys' CVE-2016-0174 Local Privilege Escalation Vulnerability
- | [86059] Microsoft IIS CVE-1999-0561 Remote Security Vulnerability
- | [56440] Microsoft IIS FTP Service CVE-2012-2532 Remote Command Injection Vulnerability
- | [56439] Microsoft IIS CVE-2012-2531 Password Information Disclosure Vulnerability
- | [54276] Microsoft IIS Multiple FTP Command Request Denial of Service Vulnerability
- | [54251] Microsoft IIS File Enumeration Weakness
- | [53906] Microsoft IIS Authentication Bypass and Source Code Disclosure Vulnerabilities
- | [45542] Microsoft IIS FTP Service Remote Buffer Overflow Vulnerability
- | [43140] Microsoft IIS Repeated Parameter Request Denial of Service Vulnerability
- | [43138] Microsoft IIS Request Header Buffer Overflow Vulnerability
- | [41314] Microsoft IIS 5.1 Alternate Data Stream Authentication Bypass Vulnerability
- | [40573] Microsoft IIS Authentication Remote Code Execution Vulnerability
- | [37460] RETIRED: Microsoft IIS Malformed Local Filename Security Bypass Vulnerability
- | [36276] RETIRED: Microsoft IIS FTPd Globbing Functionality Remote Denial of Service Vulnerability
- | [36273] Microsoft IIS FTPd Globbing Functionality Remote Denial of Service Vulnerability
- | [36189] Microsoft IIS FTPd NLST Remote Buffer Overflow Vulnerability
- | [35232] Microsoft IIS 5.0 WebDAV Authentication Bypass Vulnerability
- | [34993] Microsoft IIS Unicode Requests to WebDAV Multiple Authentication Bypass Vulnerabilities
- | [33374] Microsoft IIS HTTP TRACK Method Information Disclosure Vulnerability
- | [27101] Microsoft IIS File Change Notification Local Privilege Escalation Vulnerability
- | [21865] Apache And Microsoft IIS Range Denial of Service Vulnerability
- | [18858] Microsoft IIS ASP Remote Code Execution Vulnerability
- | [14764] Microsoft IIS WebDAV HTTP Request Source Code Disclosure Vulnerability
- | [10706] Microsoft IIS 4 Redirect Remote Buffer Overflow Vulnerability
- | [9660] Microsoft IIS Unspecified Remote Denial Of Service Vulnerability
- | [9313] Microsoft IIS Failure To Log Undocumented TRACK Requests Vulnerability
- | [8244] Microsoft Multiple IIS 6.0 Web Admin Vulnerabilities
- | [8092] Microsoft IIS _VTI_BOT Malicious WebBot Elevated Permissions Vulnerability
- | [8035] Microsoft Windows Media Services NSIISlog.DLL Remote Buffer Overflow Vulnerability
- | [7735] Microsoft IIS WebDAV PROPFIND and SEARCH Method Denial of Service Vulnerability
- | [7734] Microsoft IIS SSINC.DLL Server Side Includes Buffer Overflow Vulnerability
- | [7733] Microsoft IIS ASP Header Denial Of Service Vulnerability
- | [7731] Microsoft IIS Redirection Error Page Cross-Site Scripting Vulnerability
- | [7492] Microsoft IIS User Existence Disclosure Vulnerability
- | [6795] Microsoft IIS False Logging Weakness
- | [6789] Microsoft IIS Malformed HTTP Get Request Denial Of Service Vulnerability
- | [6072] Microsoft IIS Administrative Pages Cross Site Scripting Vulnerabilities
- | [6071] Microsoft IIS Script Source Access File Upload Vulnerability
- | [6070] Microsoft IIS WebDAV Denial Of Service Vulnerability
- | [6069] Microsoft IIS Out Of Process Privilege Escalation Vulnerability
- | [6068] Multiple Microsoft IIS Vulnerabilities
- | [5907] Microsoft IIS Malformed HTTP HOST Header Field Denial Of Service Vulnerability
- | [5900] Microsoft IIS IDC Extension Cross Site Scripting Vulnerability
- | [5213] Microsoft IIS SMTP Service Encapsulated SMTP Address Vulnerability
- | [4855] Microsoft IIS HTR Chunked Encoding Transfer Heap Overflow Vulnerability
- | [4846] Microsoft IIS 5.0 Denial Of Service Vulnerability
- | [4543] Microsoft IIS CodeBrws.ASP File Extension Check Out By One Vulnerability
- | [4525] Microsoft IIS CodeBrws.ASP Source Code Disclosure Vulnerability
- | [4490] Microsoft IIS Chunked Encoding Heap Overflow Variant Vulnerability
- | [4487] Microsoft IIS HTTP Redirect Cross Site Scripting Vulnerability
- | [4486] Microsoft IIS HTTP Error Page Cross Site Scripting Vulnerability
- | [4485] Microsoft IIS Chunked Encoding Transfer Heap Overflow Vulnerability
- | [4483] Microsoft IIS Help File Search Cross Site Scripting Vulnerability
- | [4482] Microsoft IIS FTP Connection Status Request Denial of Service Vulnerability
- | [4479] Microsoft IIS ISAPI Filter Access Violation Denial of Service Vulnerability
- | [4478] Microsoft IIS ASP Server-Side Include Buffer Overflow Vulnerability
- | [4476] Microsoft IIS HTTP Header Field Delimiter Buffer Overflow Vulnerability
- | [4474] Microsoft IIS HTR ISAPI Extension Buffer Overflow Vulnerability
- | [4235] Microsoft IIS Authentication Method Disclosure Vulnerability
- | [4084] Microsoft IIS 5.1 Frontpage Server Extensions File Source Disclosure Vulnerability
- | [4078] Microsoft IIS 5.1 Frontpage Extensions Path Disclosure Information Vulnerability
- | [3667] Microsoft IIS False Content-Length Field DoS Vulnerability
- | [3195] Microsoft IIS MIME Header Denial of Service Vulnerability
- | [3194] Microsoft IIS WebDAV Invalid Request Denial of Service Vulnerability
- | [3193] Microsoft IIS 5.0 In-Process Table Privelege Elevation Vulnerability
- | [3191] Microsoft IIS 4.0 URL Redirection DoS Vulnerability
- | [3190] Microsoft IIS SSI Buffer Overrun Privelege Elevation Vulnerability
- | [2977] Microsoft IIS Device File Remote DoS Vulnerability
- | [2973] Microsoft IIS Device File Local DoS Vulnerability
- | [2909] Microsoft IIS Unicode .asp Source Code Disclosure Vulnerability
- | [2719] Microsoft IIS Various Domain User Account Access Vulnerability
- | [2717] Microsoft IIS FTP Denial of Service Vulnerability
- | [2690] Microsoft IIS WebDAV 'Propfind' Server Restart Vulnerability
- | [2674] Microsoft IIS 5.0 .printer ISAPI Extension Buffer Overflow Vulnerability
- | [2654] Microsoft IIS Long URL Denial of Service Vulnerability
- | [2483] Microsoft IIS WebDAV 'Search' Denial of Service Vulnerability
- | [2453] Microsoft IIS WebDAV Denial of Service Vulnerability
- | [2441] Microsoft Exchange 2000 / IIS 5.0 Multiple Invalid URL Request DoS Vulnerability
- | [2440] Microsoft IIS Multiple Invalid URL Request DoS Vulnerability
- | [2313] Microsoft IIS File Fragment Disclosure Vulnerability
- | [2280] Microsoft IIS 3.0/4.0 Upgrade BDIR.HTR Vulnerability
- | [2218] Microsoft IIS '../..' Denial of Service Vulnerability
- | [2144] Microsoft IIS Front Page Server Extension DoS Vulnerability
- | [2110] Microsoft IIS 4.0 IISADMPWD Proxied Password Attack
- | [2100] Microsoft IIS Far East Edition DBCS File Disclosure Vulnerability
- | [2074] Microsoft IIS Appended Dot Script Source Disclosure Vulnerability
- | [1912] Microsoft IIS Executable File Parsing Vulnerability
- | [1911] Microsoft IIS 4.0 ISAPI Buffer Overflow Vulnerability
- | [1832] Microsoft IIS 4.0/5.0 Session ID Cookie Disclosure Vulnerability
- | [1819] Microsoft IIS 4.0 Pickup Directory DoS Vulnerability
- | [1818] Microsoft IIS 3.0 newdsn.exe File Creation Vulnerability
- | [1814] Microsoft IIS 3.0 %2e ASP Source Disclosure Vulnerability
- | [1811] Microsoft Site Server 2.0 with IIS 4.0 Malicious File Upload Vulnerability
- | [1806] Microsoft IIS and PWS Extended Unicode Directory Traversal Vulnerability
- | [1756] Microsoft IIS 5.0 Indexed Directory Disclosure Vulnerability
- | [1642] Microsoft NT 4.0 and IIS 4.0 Invalid URL Request DoS Vulnerability
- | [1595] Microsoft IIS Cross Site Scripting .shtml Vulnerability
- | [1594] Microsoft FrontPage/IIS Cross Site Scripting shtml.dll Vulnerability
- | [1578] Microsoft IIS 5.0 Translate: f Source Disclosure Vulnerability
- | [1565] Microsoft IIS 4.0/5.0 File Permission Canonicalization Vulnerability
- | [1499] Microsoft IIS Internal IP Address Disclosure Vulnerability
- | [1488] Microsoft IIS 4.0/5.0 Source Fragment Disclosure Vulnerability
- | [1476] Microsoft IIS 3.0 .htr Missing Variable Denial of Service Vulnerability
- | [1193] Microsoft IIS 4.0/5.0 Malformed Filename Request Vulnerability
- | [1191] Microsoft IIS 4.0/5.0 Malformed .htr Request Vulnerability
- | [1190] Microsoft IIS 4.0/5.0 Malformed File Extension DoS Vulnerability
- | [1101] Microsoft IIS 4.0/5.0 Escaped Characters Vulnerability
- | [1081] Microsoft IIS UNC Mapped Virtual Host Vulnerability
- | [1066] Microsoft IIS 4.0 Chunked Transfer Encoding Buffer Overflow Vulnerability
- | [1065] Microsoft IIS UNC Path Disclosure Vulnerability
- | [886] Microsoft IIS Escape Character Parsing Vulnerability
- | [882] Microsoft IIS Virtual Directory Naming Vulnerability
- | [658] Microsoft IIS FTP NO ACCESS Read/Delete File Vulnerability
- | [657] Microsoft IIS 4.0 Domain Resolution Vulnerability
- | [582] Microsoft IIS And PWS 8.3 Directory Name Vulnerability
- | [190] Microsoft VisualInterDev 6.0 - IIS4- Management With No Authentication Vulnerability
- |
- | IBM X-Force - https://exchange.xforce.ibmcloud.com:
- | [78620] Microsoft Windows Phone 7 domain name spoofing
- | [66401] Microsoft Windows kernel-mode driver (win32k.sys) variant 7 privilege escalation
- | [29670] Microsoft Internet Explorer 7 is installed
- | [76716] Microsoft IIS FTP denial of service
- | [76664] Microsoft IIS tilde information disclosure
- | [61513] Microsoft Internet Information Services (IIS) URL authentication bypass
- | [58864] Microsoft Internet Information Services (IIS) authentication code execution
- | [55031] Microsoft Internet Information Services (IIS) filenames security bypass
- | [53034] Microsoft Internet Information Services (IIS) directory listings denial of service
- | [52915] Microsoft Internet Information Services (IIS) FTP buffer overflow
- | [52243] Microsoft IIS With .NET Path Disclosure
- | [52241] Microsoft IIS servervariables_vbscript.asp Information Disclosure
- | [52240] Microsoft IIS Sample Application Physical Path Disclosure
- | [52233] Microsoft IIS With .NET Path Disclosure
- | [50573] Microsoft Internet Information Services (IIS) WebDAV security bypass
- | [45584] Microsoft IIS adsiis.dll ActiveX control denial of service
- | [42899] Microsoft IIS HTTP request smuggling
- | [39235] Microsoft IIS root folders file change notification privilege escalation
- | [39230] Microsoft IIS HTML encoded ASP code execution
- | [34434] Microsoft IIS Hit-highlighting security bypass
- | [34418] Microsoft Internet Information Server (IIS) AUX/.aspx denial of service
- | [32074] Microsoft IIS iissamples directory present
- | [31644] Microsoft IIS Web server access.cnf file detected
- | [31642] Microsoft IIS Web server service.cnf file detected
- | [31638] Microsoft IIS Web server svcacl.cnf file detected
- | [31630] Microsoft Internet Information Services IISAdmin directory detected
- | [27854] Microsoft IIS ASP cache virtual server information disclosure
- | [26796] Microsoft Internet Information Services (IIS) ASP buffer overflow
- | [16872] Microsoft Internet Information Server (IIS) ActivePerl command execution
- | [16656] Microsoft Internet Information Server (IIS) MS04-021 patch is not installed
- | [16578] Microsoft Internet Information Server (IIS) redirect buffer overflow
- | [14077] Microsoft Internet Information Server (IIS) fails to properly log HTTP TRACK requests
- | [13116] Microsoft IIS MS03-018 patch is not installed on the system
- | [13088] Microsoft IIS running RealSecure Server Sensor ISAPI plug-in denial of service
- | [12687] Microsoft IIS Remote Administration Tool allows attacker to reset administrative password
- | [12686] Microsoft IIS Remote Administration Tool could allow an attacker to obtain valid session IDs
- | [12652] Microsoft Windows 2000 and NT 4.0 Server IIS ISAPI nsiislog.dll extension POST request buffer overflow
- | [12100] Microsoft IIS long WebDAV requests containing XML denial of service
- | [12099] Microsoft IIS Response.AddHeader denial of service
- | [12098] Microsoft IIS Server-Side Include (SSI) long file name buffer overflow
- | [12097] Microsoft IIS redirect error cross-site scripting
- | [12092] Microsoft Windows 2000 and NT 4.0 Server IIS ISAPI nsiislog.dll extension buffer overflow
- | [11918] Microsoft IIS authentication mechanism could allow an attacker to determine valid user account names
- | [11537] Microsoft IIS WebDAV service is running on the system
- | [11533] Microsoft IIS WebDAV long request buffer overflow
- | [10590] Microsoft Internet Information Server (IIS) MS02-062 patch
- | [10504] Microsoft IIS script source access could be bypassed to upload .COM files
- | [10503] Microsoft IIS WebDAV memory allocation denial of service
- | [10502] Microsoft IIS out-of-process applications could be used to gain elevated privileges
- | [10501] Microsoft IIS administrative Web pages cross-site scripting
- | [10370] Microsoft IIS HTTP HOST header denial of service
- | [10294] Microsoft IIS .idc extension error message cross-site scripting
- | [10184] Microsoft IIS 5.0 resource utilization denial of service
- | [9791] Microsoft Exchange IIS license exhaustion denial of service
- | [9580] Microsoft IIS SMTP service encapsulated addresses could allow mail relaying
- | [9327] Microsoft IIS ISAPI HTR chunked encoding heap buffer overflow
- | [9123] Microsoft IIS 5.0 Log Files Directory Permission Exposure
- | [8853] Microsoft IIS CodeBrws.asp sample script can be used to view arbitrary file source code
- | [8811] Microsoft IIS MS02-018 patch is not installed on the system
- | [8804] Microsoft IIS redirected URL error cross-site scripting
- | [8803] Microsoft IIS HTTP error page cross-site scripting
- | [8802] Microsoft IIS Help File search cross-site scripting
- | [8801] Microsoft IIS FTP session status request denial of service
- | [8800] Microsoft IIS FrontPage Server Extensions and ASP.NET ISAPI filter error handling denial of service
- | [8799] Microsoft IIS HTR ISAPI ISM.DLL extension buffer overflow
- | [8798] Microsoft IIS SSI safety check buffer overflow
- | [8797] Microsoft IIS ASP HTTP header parsing buffer overflow
- | [8796] Microsoft IIS ASP data transfer heap buffer overflow
- | [8795] Microsoft IIS ASP chunked encoding heap buffer overflow
- | [8388] Microsoft Windows NT Server with IIS 4.0 could allow users to bypass "
- | [8385] Microsoft IIS specially-crafted request reveals IP address
- | [8382] Microsoft IIS authentication error messages reveal configuration information
- | [8191] Microsoft IIS 5.1 specially-crafted .cnf file request could reveal file contents
- | [8174] Microsoft IIS 5.1 .cnf file request could reveal sensitive information
- | [8056] Microsoft IIS is running on the system
- | [7919] Microsoft IIS 4.0 and Norton Internet Security 2001 default permissions could allow an attacker to modify log files
- | [7691] Microsoft IIS HTTP GET request with false "
- | [7640] Microsoft IIS is present on the system
- | [7613] Microsoft IIS allows attackers to create fake log entries
- | [7566] Microsoft IIS 2.0 and 3.0 upgraded to Microsoft IIS 4.0 fails to remove the ism.dll file
- | [7559] Microsoft Index Server installed with IIS 4.0 could allow a local attacker to obtain physical path information
- | [7558] Microsoft IIS FileSystemObject in showfile.asp could allow remote attackers to read arbitrary files
- | [7202] Microsoft IIS 4.0/5.0 escaped percent found
- | [7201] Microsoft IIS 4.0/5.0 malformed double percent sequence
- | [7199] Microsoft IIS 4.0/5.0 malformed hex sequence
- | [6995] Microsoft IIS %u Unicode wide character encoding detected
- | [6994] Microsoft IIS %u Unicode encoding detected
- | [6985] Microsoft IIS relative path usage in system file process table could allow elevated privileges
- | [6984] Microsoft IIS specially-crafted SSI directives buffer overflow
- | [6983] Microsoft IIS invalid MIME header denial of service
- | [6982] Microsoft IIS WebDAV long invalid request denial of service
- | [6981] Microsoft IIS URL redirection denial of service
- | [6963] Microsoft IIS HTTPS connection could reveal internal IP address
- | [6858] Microsoft IIS cross-site scripting patch denial of service
- | [6800] Microsoft IIS device file request can crash the ASP processor
- | [6742] Microsoft IIS reveals .asp source code with Unicode extensions
- | [6705] Microsoft IIS idq.dll ISAPI extension buffer overflow
- | [6549] Microsoft IIS WebDAV lock method memory leak can cause a denial of service
- | [6545] Microsoft IIS FTP weak domain authentication
- | [6535] Microsoft IIS FTP wildcard processing function denial of service
- | [6534] Microsoft IIS URL decoding error could allow remote code execution
- | [6485] Microsoft IIS 5.0 ISAPI Internet Printing Protocol extension buffer overflow
- | [6205] Microsoft IIS WebDAV denial of service
- | [6171] Microsoft IIS and Exchange malformed URL request denial of service
- | [6029] Microsoft IIS CmdAsp could allow remote attackers to gain privileges
- | [5903] Microsoft IIS 5.0 allows the viewing of files through malformed URL
- | [5823] Microsoft IIS Web form submission denial of service
- | [5729] Microsoft IIS Far East editions file disclosure
- | [5510] Microsoft Internet Information Service (IIS) ISAPI buffer overflow
- | [5470] Microsoft Internet Information Service (IIS) invalid executable filename passing
- | [5441] Microsoft IIS .htw cross-site scripting
- | [5377] Microsoft IIS Unicode translation error allows remote command execution
- | [5335] Microsoft IIS Index Server directory traversal
- | [5202] Microsoft IIS invalid URL allows attackers to crash service
- | [5156] Microsoft IIS Cross-Site Scripting
- | [5106] Microsoft IIS 4.0 discloses internal IP addresses
- | [5104] Microsoft IIS allows remote attackers to obtain source code fragments using +.htr
- | [5071] Microsoft IIS canonicalization error applies incorrect permissions to certain types of files
- | [4960] Microsoft IIS on Win2kPro security button restriction
- | [4951] Microsoft IIS absent directory browser argument
- | [4790] Microsoft IIS \mailroot\pickup directory denial of service
- | [4757] Microsoft IIS server-side includes (SSI) #exec directive
- | [4558] Microsoft IIS is installed on a domain controller
- | [4448] Microsoft IIS ISM.DLL could allow users to read file contents
- | [4430] Microsoft IIS malformed URL extension data denial of service
- | [4392] Microsoft IIS could reveal source code of ASP files in some virtual directories
- | [4302] Microsoft IIS malformed AuthChangUrl request can cause the server to stop servicing requests
- | [4279] Microsoft IIS escape characters denial of service
- | [4204] Microsoft IIS virtual UNC share source read
- | [4183] Microsoft IIS could disclose path of network shares
- | [4117] Microsoft IIS chunked encoding post or put denial of service
- | [3986] Microsoft IIS ASP could be used to gain sensitive information
- | [3892] Microsoft IIS Long URL with excessive forward slashes passed to ASP causes an access violation
- | [3306] Microsoft IIS could allow remote access to servers marked as Restrict Access
- | [3115] Microsoft IIS and SiteServer denial of service caused by malformed HTTP requests
- | [2675] Microsoft IIS 4.0 samples installation on Web server
- | [2673] Microsoft IIS samples installation on Web server
- | [2671] Microsoft IIS Passive FTP patch not applied (asp.dll out of date)
- | [2670] Microsoft IIS Passive FTP patch not applied (wam.dll out of date)
- | [2669] Microsoft IIS Passive FTP patch not applied (w3svc.dll out of date)
- | [2668] Microsoft IIS Passive FTP patch not applied (infocomm.dll out of date)
- | [2662] Microsoft IIS CGI overflow
- | [2412] Microsoft IIS account is member of Domain Users
- | [2381] Microsoft IIS and SiteServer Showcode.asp sample file allows remote file viewing
- | [2302] Microsoft IIS using double-byte code pages could allow remote attackers to retrieve source code
- | [2282] Microsoft IIS bdir.htr allows remote traversal of directory structure
- | [2281] Microsoft IIS buffer overflow in HTR requests can allow remote code execution
- | [2229] Microsoft IIS ExAir sample site denial of service
- | [2185] Microsoft IIS and Site Server sample programs can be used to remotely view files
- | [1823] Microsoft IIS long GET request denial of service
- | [1735] Microsoft IIS with Visual InterDev no authentication
- | [1656] Microsoft IIS 4.0 allows user to avoid HTTP request logging
- | [1654] Microsoft IIS remote FTP buffer overflow
- | [1638] Microsoft IIS crashes processing some GET commands
- | [1530] Microsoft IIS 3.0 newdsn.exe sample application allows remote creation of arbitrary files
- | [1368] Microsoft IIS 4.0 allows file execution in the Web site directory
- | [1273] Microsoft IIS special characters allowed in shell
- | [1272] Microsoft IIS CGI scripts run as system
- | [1271] Microsoft IIS version 2 installed
- | [1270] Microsoft IIS incorrect permissions on restricted item
- | [1269] Microsoft IIS incorrect Web permissions
- | [1268] Microsoft IIS SSI #exec enabled
- | [1216] Microsoft IIS SSL patch not applied
- | [1215] Microsoft IIS Passive FTP patch not applied
- | [1212] Microsoft IIS unauthorized ODBC data access with RDS
- | [1125] Microsoft IIS ASP DATA issue could reveal source code
- | [949] Microsoft IIS server script debugging enabled
- | [948] Microsoft IIS samples installed on Web server
- | [936] Microsoft IIS NTFS insecure permissions
- | [935] Microsoft IIS executable paths
- | [621] Microsoft IIS 3.0 script source revealed by appending 2E to requests
- | [336] Microsoft IIS ASP dot bug
- | [256] Microsoft IIS can be remotely crashed by excessively long client requests
- | [7] Microsoft IIS ASP source visible
- |
- | Exploit-DB - https://www.exploit-db.com:
- | [19033] microsoft iis 6.0 and 7.5 - Multiple Vulnerabilities
- | [17476] Microsoft IIS FTP Server <= 7.0 Stack Exhaustion DoS [MS09-053]
- |
- | OpenVAS (Nessus) - http://www.openvas.org:
- | [902914] Microsoft IIS GET Request Denial of Service Vulnerability
- | [902796] Microsoft IIS IP Address/Internal Network Name Disclosure Vulnerability
- | [902694] Microsoft Windows IIS FTP Service Information Disclosure Vulnerability (2761226)
- | [901120] Microsoft IIS Authentication Remote Code Execution Vulnerability (982666)
- | [900944] Microsoft IIS FTP Server 'ls' Command DOS Vulnerability
- | [900874] Microsoft IIS FTP Service Remote Code Execution Vulnerabilities (975254)
- | [900711] Microsoft IIS WebDAV Remote Authentication Bypass Vulnerability
- | [900567] Microsoft IIS Security Bypass Vulnerability (970483)
- | [802806] Microsoft IIS Default Welcome Page Information Disclosure Vulnerability
- | [801669] Microsoft Windows IIS FTP Server DOS Vulnerability
- | [801520] Microsoft IIS ASP Stack Based Buffer Overflow Vulnerability
- | [100952] Microsoft IIS FTPd NLST stack overflow
- | [11443] Microsoft IIS UNC Mapped Virtual Host Vulnerability
- | [10680] Test Microsoft IIS Source Fragment Disclosure
- | [903041] Microsoft Windows Kernel Privilege Elevation Vulnerability (2724197)
- | [903037] Microsoft JScript and VBScript Engines Remote Code Execution Vulnerability (2706045)
- | [903036] Microsoft Windows Networking Components Remote Code Execution Vulnerabilities (2733594)
- | [903035] Microsoft Windows Kernel-Mode Drivers Privilege Elevation Vulnerability (2731847)
- | [903033] Microsoft Windows Kernel-Mode Drivers Privilege Elevation Vulnerabilities (2718523)
- | [903026] Microsoft Office Remote Code Execution Vulnerabilities (2663830)
- | [903017] Microsoft Office Remote Code Execution Vulnerability (2639185)
- | [903000] Microsoft Expression Design Remote Code Execution Vulnerability (2651018)
- | [902936] Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (2783534)
- | [902934] Microsoft .NET Framework Remote Code Execution Vulnerability (2745030)
- | [902933] Microsoft Windows Shell Remote Code Execution Vulnerabilities (2727528)
- | [902932] Microsoft Internet Explorer Multiple Use-After-Free Vulnerabilities (2761451)
- | [902931] Microsoft Office Remote Code Execution Vulnerabilities - 2720184 (Mac OS X)
- | [902930] Microsoft Office Remote Code Execution Vulnerabilities (2720184)
- | [902923] Microsoft Internet Explorer Multiple Vulnerabilities (2722913)
- | [902922] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerability (2723135)
- | [902921] Microsoft Office Visio/Viewer Remote Code Execution Vulnerability (2733918)
- | [902920] Microsoft Office Remote Code Execution Vulnerability (2731879)
- | [902919] Microsoft SharePoint Privilege Elevation Vulnerabilities (2663841)
- | [902916] Microsoft Windows Kernel Privilege Elevation Vulnerabilities (2711167)
- | [902913] Microsoft Office Remote Code Execution Vulnerabilities-2663830 (Mac OS X)
- | [902912] Microsoft Office Word Remote Code Execution Vulnerability-2680352 (Mac OS X)
- | [902911] Microsoft Office Word Remote Code Execution Vulnerability (2680352)
- | [902910] Microsoft Office Visio Viewer Remote Code Execution Vulnerability (2597981)
- | [902909] Microsoft Windows Service Pack Missing Multiple Vulnerabilities
- | [902908] Microsoft Windows DirectWrite Denial of Service Vulnerability (2665364)
- | [902906] Microsoft Windows DNS Server Denial of Service Vulnerability (2647170)
- | [902900] Microsoft Windows SSL/TLS Information Disclosure Vulnerability (2643584)
- | [902846] Microsoft Windows TLS Protocol Information Disclosure Vulnerability (2655992)
- | [902845] Microsoft Windows Shell Remote Code Execution Vulnerability (2691442)
- | [902842] Microsoft Lync Remote Code Execution Vulnerabilities (2707956)
- | [902841] Microsoft .NET Framework Remote Code Execution Vulnerability (2706726)
- | [902839] Microsoft FrontPage Server Extensions MS-DOS Device Name DoS Vulnerability
- | [902833] Microsoft .NET Framework Remote Code Execution Vulnerability (2693777)
- | [902832] MS Security Update For Microsoft Office, .NET Framework, and Silverlight (2681578)
- | [902829] Microsoft Windows Common Controls Remote Code Execution Vulnerability (2664258)
- | [902828] Microsoft .NET Framework Remote Code Execution Vulnerability (2671605)
- | [902818] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerabilities (2671387)
- | [902817] Microsoft Visual Studio Privilege Elevation Vulnerability (2651019)
- | [902811] Microsoft .NET Framework and Microsoft Silverlight Remote Code Execution Vulnerabilities (2651026)
- | [902807] Microsoft Windows Media Could Allow Remote Code Execution Vulnerabilities (2636391)
- | [902798] Microsoft SMB Signing Enabled and Not Required At Server
- | [902797] Microsoft SMB Signing Information Disclosure Vulnerability
- | [902785] Microsoft AntiXSS Library Information Disclosure Vulnerability (2607664)
- | [902784] Microsoft Windows Object Packager Remote Code Execution Vulnerability (2603381)
- | [902783] Microsoft Windows Kernel Security Feature Bypass Vulnerability (2644615)
- | [902782] MicroSoft Windows Server Service Remote Code Execution Vulnerability (921883)
- | [902766] Microsoft Windows Kernel Privilege Elevation Vulnerability (2633171)
- | [902746] Microsoft Active Accessibility Remote Code Execution Vulnerability (2623699)
- | [902727] Microsoft Office Excel Remote Code Execution Vulnerabilities (2587505)
- | [902708] Microsoft Remote Desktop Protocol Denial of Service Vulnerability (2570222)
- | [902696] Microsoft Internet Explorer Multiple Vulnerabilities (2761465)
- | [902693] Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (2761226)
- | [902692] Microsoft Office Excel ReadAV Arbitrary Code Execution Vulnerability
- | [902689] Microsoft SQL Server Report Manager Cross Site Scripting Vulnerability (2754849)
- | [902688] Microsoft System Center Configuration Manager XSS Vulnerability (2741528)
- | [902687] Microsoft Windows Data Access Components Remote Code Execution Vulnerability (2698365)
- | [902686] Microsoft Internet Explorer Multiple Vulnerabilities (2719177)
- | [902683] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerability (2685939)
- | [902682] Microsoft Internet Explorer Multiple Vulnerabilities (2699988)
- | [902678] Microsoft Silverlight Code Execution Vulnerabilities - 2681578 (Mac OS X)
- | [902677] Microsoft Windows Prtition Manager Privilege Elevation Vulnerability (2690533)
- | [902676] Microsoft Windows TCP/IP Privilege Elevation Vulnerabilities (2688338)
- | [902670] Microsoft Internet Explorer Multiple Vulnerabilities (2675157)
- | [902663] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerabilities (2671387)
- | [902662] MicroSoft SMB Server Trans2 Request Remote Code Execution Vulnerability
- | [902660] Microsoft SMB Transaction Parsing Remote Code Execution Vulnerability
- | [902658] Microsoft RDP Server Private Key Information Disclosure Vulnerability
- | [902649] Microsoft Internet Explorer Multiple Vulnerabilities (2647516)
- | [902642] Microsoft Internet Explorer Multiple Vulnerabilities (2618444)
- | [902626] Microsoft SharePoint SafeHTML Information Disclosure Vulnerabilities (2412048)
- | [902625] Microsoft SharePoint Multiple Privilege Escalation Vulnerabilities (2451858)
- | [902613] Microsoft Internet Explorer Multiple Vulnerabilities (2559049)
- | [902609] Microsoft Windows CSRSS Privilege Escalation Vulnerabilities (2507938)
- | [902598] Microsoft Windows Time Component Remote Code Execution Vulnerability (2618451)
- | [902597] Microsoft Windows Media Remote Code Execution Vulnerability (2648048)
- | [902596] Microsoft Windows OLE Remote Code Execution Vulnerability (2624667)
- | [902588] Microsoft Windows Internet Protocol Validation Remote Code Execution Vulnerability
- | [902581] Microsoft .NET Framework and Silverlight Remote Code Execution Vulnerability (2604930)
- | [902580] Microsoft Host Integration Server Denial of Service Vulnerabilities (2607670)
- | [902567] Microsoft Office Remote Code Execution Vulnerabilites (2587634)
- | [902566] Microsoft Windows WINS Local Privilege Escalation Vulnerability (2571621)
- | [902552] Microsoft .NET Framework Chart Control Information Disclosure Vulnerability (2567943)
- | [902551] Microsoft .NET Framework Information Disclosure Vulnerability (2567951)
- | [902523] Microsoft .NET Framework and Silverlight Remote Code Execution Vulnerability (2514842)
- | [902522] Microsoft .NET Framework Remote Code Execution Vulnerability (2538814)
- | [902518] Microsoft .NET Framework Security Bypass Vulnerability
- | [902516] Microsoft Windows WINS Remote Code Execution Vulnerability (2524426)
- | [902502] Microsoft .NET Framework Remote Code Execution Vulnerability (2484015)
- | [902501] Microsoft JScript and VBScript Scripting Engines Remote Code Execution Vulnerability (2514666)
- | [902496] Microsoft Office IME (Chinese) Privilege Elevation Vulnerability (2652016)
- | [902495] Microsoft Office Remote Code Execution Vulnerability (2590602)
- | [902494] Microsoft Office Excel Remote Code Execution Vulnerability (2640241)
- | [902493] Microsoft Publisher Remote Code Execution Vulnerabilities (2607702)
- | [902492] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2639142)
- | [902487] Microsoft Windows Active Directory LDAPS Authentication Bypass Vulnerability (2630837)
- | [902484] Microsoft Windows TCP/IP Remote Code Execution Vulnerability (2588516)
- | [902464] Microsoft Visio Remote Code Execution Vulnerabilities (2560978)
- | [902463] Microsoft Windows Client/Server Run-time Subsystem Privilege Escalation Vulnerability (2567680)
- | [902455] Microsoft Visio Remote Code Execution Vulnerability (2560847)
- | [902445] Microsoft XML Editor Information Disclosure Vulnerability (2543893)
- | [902443] Microsoft Internet Explorer Multiple Vulnerabilities (2530548)
- | [902440] Microsoft Windows SMB Server Remote Code Execution Vulnerability (2536275)
- | [902430] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2545814)
- | [902425] Microsoft Windows SMB Accessible Shares
- | [902423] Microsoft Office Visio Viewer Remote Code Execution Vulnerabilities (2663510)
- | [902411] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2489283)
- | [902410] Microsoft Office Excel Remote Code Execution Vulnerabilities (2489279)
- | [902403] Microsoft Windows Fraudulent Digital Certificates Spoofing Vulnerability
- | [902395] Microsoft Bluetooth Stack Remote Code Execution Vulnerability (2566220)
- | [902378] Microsoft Office Excel Remote Code Execution Vulnerabilities (2537146)
- | [902377] Microsoft Windows OLE Automation Remote Code Execution Vulnerability (2476490)
- | [902365] Microsoft GDI+ Remote Code Execution Vulnerability (2489979)
- | [902364] Microsoft Office Remote Code Execution Vulnerabilites (2489293)
- | [902351] Microsoft Groove Remote Code Execution Vulnerability (2494047)
- | [902337] Microsoft Windows Kernel Elevation of Privilege Vulnerability (2393802)
- | [902336] Microsoft JScript and VBScript Scripting Engines Information Disclosure Vulnerability (2475792)
- | [902325] Microsoft Internet Explorer 'CSS Import Rule' Use-after-free Vulnerability
- | [902324] Microsoft SharePoint Could Allow Remote Code Execution Vulnerability (2455005)
- | [902319] Microsoft Foundation Classes Could Allow Remote Code Execution Vulnerability (2387149)
- | [902290] Microsoft Windows Active Directory SPN Denial of Service (2478953)
- | [902289] Microsoft Windows LSASS Privilege Escalation Vulnerability (2478960)
- | [902288] Microsoft Kerberos Privilege Escalation Vulnerabilities (2496930)
- | [902287] Microsoft Visio Remote Code Execution Vulnerabilities (2451879)
- | [902285] Microsoft Internet Explorer Information Disclosure Vulnerability (2501696)
- | [902281] Microsoft Windows Data Access Components Remote Code Execution Vulnerabilities (2451910)
- | [902280] Microsoft Windows BranchCache Remote Code Execution Vulnerability (2385678)
- | [902277] Microsoft Windows Netlogon Service Denial of Service Vulnerability (2207559)
- | [902276] Microsoft Windows Task Scheduler Elevation of Privilege Vulnerability (2305420)
- | [902274] Microsoft Publisher Remote Code Execution Vulnerability (2292970)
- | [902269] Microsoft Windows SMB Server NTLM Multiple Vulnerabilities (971468)
- | [902265] Microsoft Office Word Remote Code Execution Vulnerabilities (2293194)
- | [902264] Microsoft Office Excel Remote Code Execution Vulnerabilities (2293211)
- | [902263] Microsoft Windows Media Player Network Sharing Remote Code Execution Vulnerability (2281679)
- | [902262] Microsoft Windows Shell and WordPad COM Validation Vulnerability (2405882)
- | [902256] Microsoft Windows win32k.sys Driver 'CreateDIBPalette()' BOF Vulnerability
- | [902255] Microsoft Visual Studio Insecure Library Loading Vulnerability
- | [902254] Microsoft Office Products Insecure Library Loading Vulnerability
- | [902250] Microsoft Word 2003 'MSO.dll' Null Pointer Dereference Vulnerability
- | [902246] Microsoft Internet Explorer 'toStaticHTML()' Cross Site Scripting Vulnerability
- | [902243] Microsoft Outlook TNEF Remote Code Execution Vulnerability (2315011)
- | [902232] Microsoft Windows TCP/IP Privilege Elevation Vulnerabilities (978886)
- | [902231] Microsoft Windows Tracing Feature Privilege Elevation Vulnerabilities (982799)
- | [902230] Microsoft .NET Common Language Runtime Remote Code Execution Vulnerability (2265906)
- | [902229] Microsoft Window MPEG Layer-3 Remote Code Execution Vulnerability (2115168)
- | [902228] Microsoft Office Word Remote Code Execution Vulnerabilities (2269638)
- | [902227] Microsoft Windows LSASS Denial of Service Vulnerability (975467)
- | [902226] Microsoft Windows Shell Remote Code Execution Vulnerability (2286198)
- | [902217] Microsoft Outlook SMB Attachment Remote Code Execution Vulnerability (978212)
- | [902210] Microsoft IE cross-domain IFRAME gadgets keystrokes steal Vulnerability
- | [902193] Microsoft .NET Framework XML HMAC Truncation Vulnerability (981343)
- | [902192] Microsoft Office COM Validation Remote Code Execution Vulnerability (983235)
- | [902191] Microsoft Internet Explorer Multiple Vulnerabilities (982381)
- | [902183] Microsoft Internet Explorer 'IFRAME' Denial Of Service Vulnerability
- | [902178] Microsoft Visual Basic Remote Code Execution Vulnerability (978213)
- | [902176] Microsoft SharePoint '_layouts/help.aspx' Cross Site Scripting Vulnerability
- | [902166] Microsoft Internet Explorer 'neutering' Mechanism XSS Vulnerability
- | [902159] Microsoft VBScript Scripting Engine Remote Code Execution Vulnerability (980232)
- | [902158] Microsoft Office Publisher Remote Code Execution Vulnerability (981160)
- | [902157] Microsoft 'ISATAP' Component Spoofing Vulnerability (978338)
- | [902156] Microsoft SMB Client Remote Code Execution Vulnerabilities (980232)
- | [902155] Microsoft Internet Explorer Multiple Vulnerabilities (980182)
- | [902151] Microsoft Internet Explorer Denial of Service Vulnerability - Mar10
- | [902133] Microsoft Office Excel Multiple Vulnerabilities (980150)
- | [902117] Microsoft DirectShow Remote Code Execution Vulnerability (977935)
- | [902116] Microsoft Client/Server Run-time Subsystem Privilege Elevation Vulnerability (978037)
- | [902115] Microsoft Kerberos Denial of Service Vulnerability (977290)
- | [902114] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (975416)
- | [902112] Microsoft SMB Client Remote Code Execution Vulnerabilities (978251)
- | [902095] Microsoft Office Excel Remote Code Execution Vulnerability (2269707)
- | [902094] Microsoft Windows Kernel Mode Drivers Privilege Elevation Vulnerabilities (2160329)
- | [902093] Microsoft Windows Kernel Privilege Elevation Vulnerabilities (981852)
- | [902080] Microsoft Help and Support Center Remote Code Execution Vulnerability (2229593)
- | [902069] Microsoft SharePoint Privilege Elevation Vulnerabilities (2028554)
- | [902068] Microsoft Office Excel Remote Code Execution Vulnerabilities (2027452)
- | [902067] Microsoft Windows Kernel Mode Drivers Privilege Escalation Vulnerabilities (979559)
- | [902039] Microsoft Visio Remote Code Execution Vulnerabilities (980094)
- | [902038] Microsoft MPEG Layer-3 Codecs Remote Code Execution Vulnerability (977816)
- | [902033] Microsoft Windows '.ani' file Denial of Service vulnerability
- | [902015] Microsoft Paint Remote Code Execution Vulnerability (978706)
- | [901305] Microsoft Windows IP-HTTPS Component Security Feature Bypass Vulnerability (2765809)
- | [901304] Microsoft Windows File Handling Component Remote Code Execution Vulnerability (2758857)
- | [901301] Microsoft Windows Kerberos Denial of Service Vulnerability (2743555)
- | [901212] Microsoft Windows DirectPlay Remote Code Execution Vulnerability (2770660)
- | [901211] Microsoft Windows Common Controls Remote Code Execution Vulnerability (2720573)
- | [901210] Microsoft Office Privilege Elevation Vulnerability - 2721015 (Mac OS X)
- | [901209] Microsoft Windows Media Center Remote Code Execution Vulnerabilities (2604926)
- | [901208] Microsoft Internet Explorer Multiple Vulnerabilities (2586448)
- | [901205] Microsoft Windows Components Remote Code Execution Vulnerabilities (2570947)
- | [901193] Microsoft Windows Media Remote Code Execution Vulnerabilities (2510030)
- | [901183] Internet Information Services (IIS) FTP Service Remote Code Execution Vulnerability (2489256)
- | [901180] Microsoft Internet Explorer Multiple Vulnerabilities (2482017)
- | [901169] Microsoft Windows Address Book Remote Code Execution Vulnerability (2423089)
- | [901166] Microsoft Office Remote Code Execution Vulnerabilites (2423930)
- | [901164] Microsoft Windows SChannel Denial of Service Vulnerability (2207566)
- | [901163] Microsoft Windows Media Player Remote Code Execution Vulnerability (2378111))
- | [901162] Microsoft Internet Explorer Multiple Vulnerabilities (2360131)
- | [901161] Microsoft ASP.NET Information Disclosure Vulnerability (2418042)
- | [901151] Microsoft Internet Information Services Remote Code Execution Vulnerabilities (2267960)
- | [901150] Microsoft Windows Print Spooler Service Remote Code Execution Vulnerability(2347290)
- | [901140] Microsoft Windows SMB Code Execution and DoS Vulnerabilities (982214)
- | [901139] Microsoft Internet Explorer Multiple Vulnerabilities (2183461)
- | [901119] Microsoft Windows OpenType Compact Font Format Driver Privilege Escalation Vulnerability (980218)
- | [901102] Microsoft Windows Media Services Remote Code Execution Vulnerability (980858)
- | [901097] Microsoft Internet Explorer Multiple Vulnerabilities (978207)
- | [901095] Microsoft Embedded OpenType Font Engine Remote Code Execution Vulnerabilities (972270)
- | [901069] Microsoft Office Project Remote Code Execution Vulnerability (967183)
- | [901065] Microsoft Windows IAS Remote Code Execution Vulnerability (974318)
- | [901064] Microsoft Windows ADFS Remote Code Execution Vulnerability (971726)
- | [901063] Microsoft Windows LSASS Denial of Service Vulnerability (975467)
- | [901048] Microsoft Windows Active Directory Denial of Service Vulnerability (973309)
- | [901041] Microsoft Internet Explorer Multiple Code Execution Vulnerabilities (974455)
- | [901012] Microsoft Windows Media Format Remote Code Execution Vulnerability (973812)
- | [900973] Microsoft Office Word Remote Code Execution Vulnerability (976307)
- | [900965] Microsoft Windows SMB2 Negotiation Protocol Remote Code Execution Vulnerability
- | [900964] Microsoft .NET Common Language Runtime Code Execution Vulnerability (974378)
- | [900963] Microsoft Windows Kernel Privilege Escalation Vulnerability (971486)
- | [900957] Microsoft Windows Patterns & Practices EntLib DOS Vulnerability
- | [900956] Microsoft Windows Patterns & Practices EntLib Version Detection
- | [900929] Microsoft JScript Scripting Engine Remote Code Execution Vulnerability (971961)
- | [900908] Microsoft Windows Message Queuing Privilege Escalation Vulnerability (971032)
- | [900907] Microsoft Windows AVI Media File Parsing Vulnerabilities (971557)
- | [900898] Microsoft Internet Explorer 'XSS Filter' XSS Vulnerabilities - Nov09
- | [900897] Microsoft Internet Explorer PDF Information Disclosure Vulnerability - Nov09
- | [900891] Microsoft Internet Denial Of Service Vulnerability - Nov09
- | [900887] Microsoft Office Excel Multiple Vulnerabilities (972652)
- | [900886] Microsoft Windows Kernel-Mode Drivers Multiple Vulnerabilities (969947)
- | [900881] Microsoft Windows Indexing Service ActiveX Vulnerability (969059)
- | [900880] Microsoft Windows ATL COM Initialization Code Execution Vulnerability (973525)
- | [900879] Microsoft Windows Media Player ASF Heap Overflow Vulnerability (974112)
- | [900878] Microsoft Products GDI Plus Code Execution Vulnerabilities (957488)
- | [900877] Microsoft Windows LSASS Denial of Service Vulnerability (975467)
- | [900876] Microsoft Windows CryptoAPI X.509 Spoofing Vulnerabilities (974571)
- | [900873] Microsoft Windows DNS Devolution Third-Level Domain Name Resolving Weakness (971888)
- | [900863] Microsoft Internet Explorer 'window.print()' DOS Vulnerability
- | [900838] Microsoft Windows TCP/IP Remote Code Execution Vulnerability (967723)
- | [900837] Microsoft DHTML Editing Component ActiveX Remote Code Execution Vulnerability (956844)
- | [900836] Microsoft Internet Explorer Address Bar Spoofing Vulnerability
- | [900826] Microsoft Internet Explorer 'location.hash' DOS Vulnerability
- | [900814] Microsoft Windows WINS Remote Code Execution Vulnerability (969883)
- | [900813] Microsoft Remote Desktop Connection Remote Code Execution Vulnerability (969706)
- | [900809] Microsoft Visual Studio ATL Remote Code Execution Vulnerability (969706)
- | [900808] Microsoft Visual Products Version Detection
- | [900757] Microsoft Windows Media Player '.AVI' File DOS Vulnerability
- | [900741] Microsoft Internet Explorer Information Disclosure Vulnerability Feb10
- | [900740] Microsoft Windows Kernel Could Allow Elevation of Privilege (977165)
- | [900690] Microsoft Virtual PC/Server Privilege Escalation Vulnerability (969856)
- | [900689] Microsoft Embedded OpenType Font Engine Remote Code Execution Vulnerabilities (961371))
- | [900670] Microsoft Office Excel Remote Code Execution Vulnerabilities (969462)
- | [900589] Microsoft ISA Server Privilege Escalation Vulnerability (970953)
- | [900588] Microsoft DirectShow Remote Code Execution Vulnerability (961373)
- | [900568] Microsoft Windows Search Script Execution Vulnerability (963093)
- | [900566] Microsoft Active Directory LDAP Remote Code Execution Vulnerability (969805)
- | [900476] Microsoft Excel Remote Code Execution Vulnerabilities (968557)
- | [900465] Microsoft Windows DNS Memory Corruption Vulnerability - Mar09
- | [900461] Microsoft MSN Live Messneger Denial of Service Vulnerability
- | [900445] Microsoft Autorun Arbitrary Code Execution Vulnerability (08-038)
- | [900404] Microsoft Windows RTCP Unspecified Remote DoS Vulnerability
- | [900400] Microsoft Internet Explorer Unicode String DoS Vulnerability
- | [900391] Microsoft Office Publisher Remote Code Execution Vulnerability (969516)
- | [900366] Microsoft Internet Explorer Web Script Execution Vulnerabilites
- | [900365] Microsoft Office Word Remote Code Execution Vulnerabilities (969514)
- | [900337] Microsoft Internet Explorer Denial of Service Vulnerability - Apr09
- | [900336] Microsoft Windows Media Player MID File Integer Overflow Vulnerability
- | [900328] Microsoft Internet Explorer Remote Code Execution Vulnerability (963027)
- | [900314] Microsoft XML Core Service Information Disclosure Vulnerability
- | [900303] Microsoft Internet Explorer HTML Form Value DoS Vulnerability
- | [900299] Microsoft Report Viewer Information Disclosure Vulnerability (2578230)
- | [900297] Microsoft Windows Kernel Denial of Service Vulnerability (2556532)
- | [900296] Microsoft Windows TCP/IP Stack Denial of Service Vulnerability (2563894)
- | [900295] Microsoft Windows DNS Server Remote Code Execution Vulnerability (2562485)
- | [900294] Microsoft Data Access Components Remote Code Execution Vulnerabilities (2560656)
- | [900288] Microsoft Distributed File System Remote Code Execution Vulnerabilities (2535512)
- | [900287] Microsoft SMB Client Remote Code Execution Vulnerabilities (2536276)
- | [900285] Microsoft Foundation Class (MFC) Library Remote Code Execution Vulnerability (2500212)
- | [900282] Microsoft DNS Resolution Remote Code Execution Vulnerability (2509553)
- | [900281] Microsoft IE Developer Tools WMITools and Windows Messenger ActiveX Control Vulnerability (2508272)
- | [900280] Microsoft Windows SMB Server Remote Code Execution Vulnerability (2508429)
- | [900279] Microsoft SMB Client Remote Code Execution Vulnerabilities (2511455)
- | [900278] Microsoft Internet Explorer Multiple Vulnerabilities (2497640)
- | [900273] Microsoft Remote Desktop Client Remote Code Execution Vulnerability (2508062)
- | [900267] Microsoft Media Decompression Remote Code Execution Vulnerability (2447961)
- | [900266] Microsoft Windows Movie Maker Could Allow Remote Code Execution Vulnerability (2424434)
- | [900263] Microsoft Windows OpenType Compact Font Format Driver Privilege Escalation Vulnerability (2296199)
- | [900262] Microsoft Internet Explorer Multiple Vulnerabilities (2416400)
- | [900261] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2293386)
- | [900248] Microsoft Windows Movie Maker Could Allow Remote Code Execution Vulnerability (981997)
- | [900246] Microsoft Media Decompression Remote Code Execution Vulnerability (979902)
- | [900245] Microsoft Data Analyzer and IE Developer Tools ActiveX Control Vulnerability (980195)
- | [900241] Microsoft Outlook Express and Windows Mail Remote Code Execution Vulnerability (978542)
- | [900240] Microsoft Exchange and Windows SMTP Service Denial of Service Vulnerability (981832)
- | [900237] Microsoft Windows Authentication Verification Remote Code Execution Vulnerability (981210)
- | [900236] Microsoft Windows Kernel Could Allow Elevation of Privilege (979683)
- | [900235] Microsoft Windows Media Player Could Allow Remote Code Execution (979402)
- | [900232] Microsoft Windows Movie Maker Could Allow Remote Code Execution Vulnerability (975561)
- | [900230] Microsoft Windows SMB Server Multiple Vulnerabilities (971468)
- | [900229] Microsoft Data Analyzer ActiveX Control Vulnerability (978262)
- | [900228] Microsoft Office (MSO) Remote Code Execution Vulnerability (978214)
- | [900227] Microsoft Windows Shell Handler Could Allow Remote Code Execution Vulnerability (975713)
- | [900223] Microsoft Ancillary Function Driver Elevation of Privilege Vulnerability (956803)
- | [900192] Microsoft Internet Explorer Information Disclosure Vulnerability
- | [900187] Microsoft Internet Explorer Argument Injection Vulnerability
- | [900178] Microsoft Windows 'UnhookWindowsHookEx' Local DoS Vulnerability
- | [900173] Microsoft Windows Media Player Version Detection
- | [900172] Microsoft Windows Media Player 'MIDI' or 'DAT' File DoS Vulnerability
- | [900170] Microsoft iExplorer '&NBSP
- | [900131] Microsoft Internet Explorer Denial of Service Vulnerability
- | [900125] Microsoft SQL Server 2000 sqlvdir.dll ActiveX Buffer Overflow Vulnerability
- | [900120] Microsoft Organization Chart Remote Code Execution Vulnerability
- | [900108] Microsoft Windows NSlookup.exe Remote Code Execution Vulnerability
- | [900097] Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution
- | [900095] Microsoft ISA Server and Forefront Threat Management Gateway DoS Vulnerability (961759)
- | [900093] Microsoft DirectShow Remote Code Execution Vulnerability (961373)
- | [900080] Vulnerabilities in Microsoft Office Visio Could Allow Remote Code Execution (957634)
- | [900079] Vulnerabilities in Microsoft Exchange Could Allow Remote Code Execution (959239)
- | [900064] Vulnerability in Microsoft Office SharePoint Server Could Cause Elevation of Privilege (957175)
- | [900063] Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution (957173)
- | [900061] Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution (959070)
- | [900058] Microsoft XML Core Services Remote Code Execution Vulnerability (955218)
- | [900048] Microsoft Excel Remote Code Execution Vulnerability (956416)
- | [900047] Microsoft Office nformation Disclosure Vulnerability (957699)
- | [900046] Microsoft Office Remote Code Execution Vulnerabilities (955047)
- | [900033] Microsoft PowerPoint Could Allow Remote Code Execution Vulnerabilities (949785)
- | [900029] Microsoft Office Filters Could Allow Remote Code Execution Vulnerabilities (924090)
- | [900028] Microsoft Excel Could Allow Remote Code Execution Vulnerabilities (954066)
- | [900025] Microsoft Office Version Detection
- | [900006] Microsoft Word Could Allow Remote Code Execution Vulnerability
- | [900004] Microsoft Access Snapshot Viewer ActiveX Control Vulnerability
- | [855384] Solaris Update for snmp/mibiisa 108870-36
- | [855273] Solaris Update for snmp/mibiisa 108869-36
- | [803028] Microsoft Internet Explorer Remote Code Execution Vulnerability (2757760)
- | [803007] Microsoft Windows Minimum Certificate Key Length Spoofing Vulnerability (2661254)
- | [802912] Microsoft Unauthorized Digital Certificates Spoofing Vulnerability (2728973)
- | [802888] Microsoft Windows Media Service Handshake Sequence DoS Vulnerability
- | [802886] Microsoft Sidebar and Gadgets Remote Code Execution Vulnerability (2719662)
- | [802864] Microsoft XML Core Services Remote Code Execution Vulnerability (2719615)
- | [802774] Microsoft VPN ActiveX Control Remote Code Execution Vulnerability (2695962)
- | [802726] Microsoft SMB Signing Disabled
- | [802708] Microsoft Internet Explorer Code Execution and DoS Vulnerabilities
- | [802634] Microsoft Windows Unauthorized Digital Certificates Spoofing Vulnerability (2718704)
- | [802500] Microsoft Windows TrueType Font Parsing Privilege Elevation Vulnerability
- | [802468] Compatibility Issues Affecting Signed Microsoft Binaries (2749655)
- | [802462] Microsoft ActiveSync Null Pointer Dereference Denial Of Service Vulnerability
- | [802426] Microsoft Windows ActiveX Control Multiple Vulnerabilities (2647518)
- | [802383] Microsoft Windows Color Control Panel Privilege Escalation Vulnerability
- | [802379] Microsoft Windows Kernel 'win32k.sys' Memory Corruption Vulnerability
- | [802287] Microsoft Internet Explorer Cache Objects History Information Disclosure Vulnerability
- | [802286] Microsoft Internet Explorer Multiple Information Disclosure Vulnerabilities
- | [802260] Microsoft Windows WINS Remote Code Execution Vulnerability (2524426)
- | [802203] Microsoft Internet Explorer Cookie Hijacking Vulnerability
- | [802202] Microsoft Internet Explorer Cookie Hijacking Vulnerability
- | [802140] Microsoft Explorer HTTPS Sessions Multiple Vulnerabilities (Windows)
- | [802136] Microsoft Windows Insecure Library Loading Vulnerability (2269637)
- | [801991] Microsoft Windows SMB/NETBIOS NULL Session Authentication Bypass Vulnerability
- | [801966] Microsoft Windows ActiveX Control Multiple Vulnerabilities (2562937)
- | [801935] Microsoft Silverlight Multiple Memory Leak Vulnerabilities
- | [801934] Microsoft Silverlight Version Detection
- | [801914] Microsoft Windows IPv4 Default Configuration Security Bypass Vulnerability
- | [801876] Microsoft Internet Explorer 'msxml.dll' Information Disclosure Vulnerability
- | [801831] Microsoft Internet Explorer Incorrect GUI Display Vulnerability
- | [801830] Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability
- | [801725] Microsoft Products GDI Plus Remote Code Execution Vulnerabilities (954593)
- | [801721] Microsoft Active Directory Denial of Service Vulnerability (953235)
- | [801719] Microsoft Windows CSRSS CSRFinalizeContext Local Privilege Escalation Vulnerability (930178)
- | [801718] Microsoft Windows Vista Information Disclosure Vulnerability (931213)
- | [801717] Microsoft Windows Vista Teredo Interface Firewall Bypass Vulnerability
- | [801716] Microsoft Outlook Express/Windows Mail MHTML URI Handler Information Disclosure Vulnerability (929123)
- | [801715] Microsoft XML Core Services Remote Code Execution Vulnerability (936227)
- | [801713] Microsoft Outlook Express And Windows Mail NNTP Protocol Heap Buffer Overflow Vulnerability (941202)
- | [801707] Microsoft Internet Explorer mshtml.dll Remote Memory Corruption Vulnerability (942615)
- | [801706] Microsoft Windows TCP/IP Remote Code Execution Vulnerabilities (941644)
- | [801705] Microsoft Windows TCP/IP Denial of Service Vulnerability (946456)
- | [801704] Microsoft Internet Information Services Privilege Elevation Vulnerability (942831)
- | [801702] Microsoft Internet Explorer HTML Rendering Remote Memory Corruption Vulnerability (944533)
- | [801701] Microsoft Windows DNS Client Service Response Spoofing Vulnerability (945553)
- | [801677] Microsoft WMI Administrative Tools ActiveX Control Remote Code Execution Vulnerabilities
- | [801606] Microsoft Internet Explorer 'mshtml.dll' Information Disclosure Vulnerability
- | [801598] Microsoft Windows2k3 Active Directory 'BROWSER ELECTION' Buffer Overflow Vulnerability
- | [801597] Microsoft Office Excel 2003 Invalid Object Type Remote Code Execution Vulnerability
- | [801596] Microsoft Excel 2007 Office Drawing Layer Remote Code Execution Vulnerability
- | [801595] Microsoft Office Excel Axis and Art Object Parsing Remote Code Execution Vulnerabilities
- | [801594] Microsoft PowerPoint 2007 OfficeArt Atom Remote Code Execution Vulnerability
- | [801580] Microsoft Windows Fax Cover Page Editor BOF Vulnerabilities
- | [801527] Microsoft Windows 32-bit Platforms Unspecified vulnerabilities
- | [801491] Microsoft 'hxvz.dll' ActiveX Control Memory Corruption Vulnerability (948881)
- | [801489] Microsoft Office Graphics Filters Remote Code Execution Vulnerabilities (968095)
- | [801488] Microsoft Internet Explorer Data Stream Handling Remote Code Execution Vulnerability (947864)
- | [801487] Microsoft Windows Kernel Usermode Callback Local Privilege Elevation Vulnerability (941693)
- | [801486] Microsoft Windows Speech Components Voice Recognition Command Execution Vulnerability (950760)
- | [801485] Microsoft Pragmatic General Multicast (PGM) Denial of Service Vulnerability (950762)
- | [801484] Microsoft Windows IPsec Policy Processing Information Disclosure Vulnerability (953733)
- | [801483] Microsoft Windows Search Remote Code Execution Vulnerability (959349)
- | [801482] Microsoft Windows ASP.NET Denial of Service Vulnerability(970957)
- | [801481] Microsoft Wireless LAN AutoConfig Service Remote Code Execution Vulnerability (970710)
- | [801480] Microsoft Web Services on Devices API Remote Code Execution Vulnerability (973565)
- | [801479] Microsoft Windows TCP/IP Could Allow Remote Code Execution (974145)
- | [801457] Microsoft Windows Address Book Insecure Library Loading Vulnerability
- | [801456] Microsoft Windows Progman Group Converter Insecure Library Loading Vulnerability
- | [801349] Microsoft Internet Explorer 'IFRAME' Denial Of Service Vulnerability (June-10)
- | [801348] Microsoft Internet Explorer 'IFRAME' Denial Of Service Vulnerability -june 10
- | [801345] Microsoft .NET 'ASP.NET' Cross-Site Scripting vulnerability
- | [801344] Microsoft .NET '__VIEWSTATE' Cross-Site Scripting vulnerability
- | [801342] Microsoft ASP.NET Cross-Site Scripting vulnerability
- | [801333] Microsoft Windows Kernel 'win32k.sys' Multiple DOS Vulnerabilities
- | [801330] Microsoft Internet Explorer Cross Site Data Leakage Vulnerability
- | [801109] Microsoft IE CA SSL Certificate Security Bypass Vulnerability - Oct09
- | [801090] Microsoft Windows Indeo Codec Multiple Vulnerabilities
- | [800968] Microsoft SharePoint Team Services Information Disclosure Vulnerability
- | [800910] Microsoft Internet Explorer Buffer Overflow Vulnerability - Jul09
- | [800902] Microsoft Internet Explorer XSS Vulnerability - July09
- | [800872] Microsoft Internet Explorer 'li' Element DoS Vulnerability - Sep09
- | [800863] Microsoft Internet Explorer XML Document DoS Vulnerability - Aug09
- | [800862] Microsoft Windows Kernel win32k.sys Privilege Escalation Vulnerability
- | [800861] Microsoft Internet Explorer 'findText()' Unicode Parsing DoS Vulnerability
- | [800845] Microsoft Office Web Components ActiveX Control Code Execution Vulnerability
- | [800829] Microsoft Video ActiveX Control 'msvidctl.dll' BOF Vulnerability
- | [800742] Microsoft Internet Explorer Unspecified vulnerability
- | [800700] Microsoft GDIPlus PNG Infinite Loop Vulnerability
- | [800687] Microsoft Windows Server 2003 OpenType Font Engine DoS Vulnerability
- | [800669] Microsoft Internet Explorer Denial Of Service Vulnerability - July09
- | [800577] Microsoft Windows Server 2003 win32k.sys DoS Vulnerability
- | [800505] Microsoft HTML Help Workshop buffer overflow vulnerability
- | [800504] Microsoft Windows XP SP3 denial of service vulnerability
- | [800481] Microsoft SharePoint Cross Site Scripting Vulnerability
- | [800480] Microsoft Windows Media Player '.mpg' Buffer Overflow Vulnerability
- | [800466] Microsoft Windows TLS/SSL Spoofing Vulnerability (977377)
- | [800461] Microsoft Internet Explorer Information Disclosure Vulnerability (980088)
- | [800442] Microsoft Windows GP Trap Handler Privilege Escalation Vulnerability
- | [800429] Microsoft Internet Explorer Remote Code Execution Vulnerability (979352)
- | [800382] Microsoft PowerPoint File Parsing Remote Code Execution Vulnerability (967340)
- | [800347] Microsoft Internet Explorer Clickjacking Vulnerability
- | [800343] Microsoft Word 2007 Sensitive Information Disclosure Vulnerability
- | [800337] Microsoft Internet Explorer NULL Pointer DoS Vulnerability
- | [800332] Microsoft Windows Live Messenger Information Disclosure Vulnerability
- | [800331] Microsoft Windows Live Messenger Client Version Detection
- | [800328] Integer Overflow vulnerability in Microsoft Windows Media Player
- | [800310] Microsoft Windows Media Services nskey.dll ActiveX BOF Vulnerability
- | [800267] Microsoft GDIPlus Library File Integer Overflow Vulnerability
- | [800218] Microsoft Money 'prtstb06.dll' Denial of Service vulnerability
- | [800217] Microsoft Money Version Detection
- | [800209] Microsoft Internet Explorer Version Detection (Win)
- | [800208] Microsoft Internet Explorer Anti-XSS Filter Vulnerabilities
- | [800083] Microsoft Outlook Express Malformed MIME Message DoS Vulnerability
- | [800082] Microsoft SQL Server sp_replwritetovarbin() BOF Vulnerability
- | [800023] Microsoft Windows Image Color Management System Code Execution Vulnerability (952954)
- | [103254] Microsoft SharePoint Server 2007 '_layouts/help.aspx' Cross Site Scripting Vulnerability
- | [102059] Microsoft Windows Vector Markup Language Buffer Overflow (938127)
- | [102055] Microsoft Windows GDI Multiple Vulnerabilities (925902)
- | [102053] Microsoft Windows Vector Markup Language Vulnerabilities (929969)
- | [102015] Microsoft RPC Interface Buffer Overrun (KB824146)
- | [101100] Vulnerabilities in Microsoft ATL Could Allow Remote Code Execution (973908)
- | [101017] Microsoft MS03-018 security check
- | [101016] Microsoft MS03-022 security check
- | [101015] Microsoft MS03-034 security check
- | [101014] Microsoft MS00-078 security check
- | [101012] Microsoft MS03-051 security check
- | [101010] Microsoft Security Bulletin MS05-004
- | [101009] Microsoft Security Bulletin MS06-033
- | [101007] Microsoft dotNET version grabber
- | [101006] Microsoft Security Bulletin MS06-056
- | [101005] Microsoft Security Bulletin MS07-040
- | [101004] Microsoft MS04-017 security check
- | [101003] Microsoft MS00-058 security check
- | [101000] Microsoft MS00-060 security check
- | [100950] Microsoft DNS server internal hostname disclosure detection
- | [100624] Microsoft Windows SMTP Server DNS spoofing vulnerability
- | [100607] Microsoft SMTP Service and Exchange Routing Engine Buffer Overflow Vulnerability
- | [100596] Microsoft Windows SMTP Server MX Record Denial of Service Vulnerability
- | [100283] Microsoft Windows SMB2 '_Smb2ValidateProviderCallback()' Remote Code Execution Vulnerability
- | [100062] Microsoft Remote Desktop Protocol Detection
- | [90024] Windows Vulnerability in Microsoft Jet Database Engine
- | [80007] Microsoft MS00-06 security check
- | [13752] Denial of Service (DoS) in Microsoft SMS Client
- | [11992] Vulnerability in Microsoft ISA Server 2000 H.323 Filter(816458)
- | [11874] IIS Service Pack - 404
- | [11808] Microsoft RPC Interface Buffer Overrun (823980)
- | [11433] Microsoft ISA Server DNS - Denial Of Service (MS03-009)
- | [11217] Microsoft's SQL Version Query
- | [11177] Flaw in Microsoft VM Could Allow Code Execution (810030)
- | [11146] Microsoft RDP flaws could allow sniffing and DOS(Q324380)
- | [11142] IIS XSS via IDC error
- | [11067] Microsoft's SQL Hello Overflow
- | [11003] IIS Possible Compromise
- | [10993] IIS ASP.NET Application Trace Enabled
- | [10991] IIS Global.asa Retrieval
- | [10936] IIS XSS via 404 error
- | [10862] Microsoft's SQL Server Brute Force
- | [10755] Microsoft Exchange Public Folders Information Leak
- | [10732] IIS 5.0 WebDav Memory Leakage
- | [10699] IIS FrontPage DoS II
- | [10695] IIS .IDA ISAPI filter applied
- | [10674] Microsoft's SQL UDP Info Query
- | [10673] Microsoft's SQL Blank Password
- | [10671] IIS Remote Command Execution
- | [10667] IIS 5.0 PROPFIND Vulnerability
- | [10661] IIS 5 .printer ISAPI filter applied
- | [10657] NT IIS 5.0 Malformed HTTP Printer Request Header Buffer Overflow Vulnerability
- | [10585] IIS FrontPage DoS
- | [10576] Check for dangerous IIS default files
- | [10575] Check for IIS .cnf file leakage
- | [10573] IIS 5.0 Sample App reveals physical path of web root
- | [10572] IIS 5.0 Sample App vulnerable to cross-site scripting attack
- | [10537] IIS directory traversal
- | [10492] IIS IDA/IDQ Path Disclosure
- | [10491] ASP/ASA source using Microsoft Translate f: bug
- | [10144] Microsoft SQL TCP/IP listener is running
- |
- | SecurityTracker - https://www.securitytracker.com:
- | [1027751] Microsoft Internet Information Server (IIS) FTP Server Lets Remote Users Obtain Files and Local Users Obtain Passwords
- | [1027223] Microsoft IIS Web Server Discloses Potentially Sensitive Information to Remote Users
- | [1024921] Microsoft IIS FTP Server Lets Remote Users Deny Service
- | [1024496] Microsoft Internet Information Server (IIS) Web Server Stack Overflow in Reading POST Data Lets Remote Users Deny Service
- | [1023387] Microsoft Internet Information Services (IIS) Filename Extension Parsing Configuration Error May Let Users Bypass Security Controls
- | [1022792] Microsoft Internet Information Server (IIS) FTP Server Buffer Overflows Let Remote Authenticated Users Execute Arbitrary Code and Deny Service
- | [1016466] Microsoft Internet Information Server (IIS) Buffer Overflow in Processing ASP Pages Lets Remote Authenticated Users Execute Arbitrary Code
- | [1015376] Microsoft IIS Lets Remote Users Deny Service or Execute Arbitrary Code With Malformed HTTP GET Requests
- | [1015049] Microsoft Internet Explorer Drag-and-Drop Timing May Let Remote Users Install Arbitrary Files
- | [1014777] Microsoft IIS ASP Error Page May Disclose System Information in Certain Cases
- | [1011633] Microsoft IIS WebDAV XML Message Handler Error Lets Remote Users Deny Service
- | [1010692] Microsoft IIS 4.0 Buffer Overflow in Redirect Function Lets Remote Users Execute Arbitrary Code
- | [1010610] Microsoft IIS Web Server May Disclose Private IP Addresses in Certain Cases
- | [1010079] Microsoft IIS ASP Script Cookie Processing Flaw May Disclose Application Information to Remote Users
- | [1008563] Microsoft IIS Fails to Log HTTP TRACK Requests
- | [1007262] Microsoft IIS 6.0 Vulnerabilities Permit Cross-Site Scripting and Password Changing Attacks Against Administrators
- | [1007059] Microsoft Windows Media Services (nsiislog.dll) Extension to Internet Information Server (IIS) Has Another Buffer Overflow That Lets Remote Execute Arbitrary Code
- | [1006867] Microsoft IIS Buffer Overflow Lets Remote Users With Upload Privileges Execute Code - Remote Users Can Also Crash the Service
- | [1006866] Microsoft Windows Media Services (nsiislog.dll) Extension to Internet Information Server (IIS) Lets Remote Execute Arbitrary Code
- | [1006704] Microsoft IIS Authentication Manager Discloses Validity of User Names to Remote Users
- | [1006305] Microsoft IIS Web Server WebDAV Buffer Overflow Lets Remote Users Execute Arbitrary Code
- | [1005505] Microsoft Internet Information Server (IIS) Script Access Control Bug May Let Remote Authenticated Users Upload Unauthorized Executable Files
- | [1005504] Microsoft Internet Information Server (IIS) WebDAV Memory Allocation Flaw Lets Remote Users Crash the Server
- | [1005503] Microsoft Internet Information Server (IIS) Administrative Pages Allow Cross-Site Scripting Attacks
- | [1005502] Microsoft Internet Information Server (IIS) Out-of-Process Access Control Bug Lets Certain Authenticated Users Gain Full Control of the Server
- | [1005083] Microsoft Internet Information Server (IIS) Web Server Fails to Properly Validate Client-side Certificates, Allowing Remote Users to Impersonate Other Users or Certificate Issuers
- | [1004757] Microsoft IIS SMTP Service Encapsulation Bug Lets Remote Users Relay Mail and Send SPAM Via the Service
- | [1004646] ColdFusion MX Buffer Overflow When Used With Microsoft Internet Information Server (IIS) Lets Remote Users Crash the IIS Web Server or Execute Arbitrary Code
- | [1004526] Microsoft Internet Information Server (IIS) Heap Overflow in HTR ISAPI Extension While Processing Chunked Encoded Data Lets Remote Users Execute Arbitrary Code
- | [1004044] Cisco CallManager Affected by Microsoft Internet Information Server (IIS) Bugs
- | [1004032] Microsoft Internet Information Server (IIS) FTP STAT Command Bug Lets Remote Users Crash Both the FTP and the Web Services
- | [1004031] Microsoft Internet Information Server (IIS) URL Length Bug Lets Remote Users Crash the Web Service
- | [1004011] Microsoft Internet Information Server (IIS) Buffer Overflow in ASP Server-Side Include Function May Let Remote Users Execute Arbitrary Code on the Web Server
- | [1004006] Microsoft Internet Information Server (IIS) Off-By-One Heap Overflow in .HTR Processing May Let Remote Users Execute Arbitrary Code on the Server
- | [1003224] Microsoft Internet Information Server (IIS) Version 4 Lets Local Users Modify the Log File Undetected
- | [1002778] Microsoft Internet Information Server (IIS) Lets Remote Users Create Bogus Web Log Entries
- | [1002733] Microsoft IIS 4.0 Configuration Error May Allow Remote Users to Obtain Physical Directory Path Information
- | [1002651] Microsoft Internet Information Server (IIS) May Disclose PHP Scripting Source Code
- | [1002212] Microsoft IIS Web Server Contains Multiple Vulnerabilities That Allow Local Users to Gain System Privileges and Allow Remote Users to Cause the Web Server to Crash
- | [1002161] Microsoft Internet Information Server (IIS) Web Server Discloses Internal IP Addresses or NetBIOS Host Names to Remote Users
- | [1001818] Microsoft Internet Information Server (IIS) Web Server Discloses ASP Source Code When Installed on FAT-based Filesystem
- | [1001576] eEye Digital Security's SecureIIS Application Firewall for Microsoft Web Servers Fails to Filter Certain Web URL Characters, Allowing Remote Users to Bypass the SecureIIS Firewall
- | [1001565] Microsoft IIS Web Server on Windows 2000 Allows Remote Users to Cause the Server to Consume All Available Memory Due to Memory Leak in WebDAV Lock Method
- | [1001530] Microsoft IIS Web Server Allows Remote Users to Execute Commands on the Server Due to CGI Decoding Error
- | [1001483] Microsoft IIS Web Server Lets Remote Users Restart the Web Server with Another Specially Crafted PROPFIND XML Command
- | [1001464] Microsoft Internet Information Server IIS 5.0 for Windows 2000 Lets Remote Users Execute Arbitrary Code on the Server and Gain Control of the Server
- | [1001402] Microsoft IIS Web Server Can Be Effectively Shutdown By Certain Internal-Network Attacks When The Underlying OS Supports User Account Lockouts
- | [1001116] Microsoft Personal Web Server Contains An Old Internet Information Server (IIS) Vulnerability Allowing Unauthorized Directory Listings and Possible Code Execution For Remote Users
- | [1001050] Microsoft IIS 5.0 Web Server Can Be Restarted Remotely By Any User
- | [1028908] Microsoft Active Directory Federation Services Discloses Account Information to Remote Users
- | [1028905] (Microsoft Issues Fix for Exchange Server) Oracle Fusion Middleware Bugs Let Remote Users Deny Service and Access and Modify Data
- | [1028904] (Microsoft Issues Fix for Exchange Server) Oracle PeopleSoft Products Bugs Let Remote Users Partially Access and Modify Data and Partially Deny Service
- | [1028903] Microsoft Windows Unicode Scripts Processor Memory Corruption Error Lets Remote Users Execute Arbitrary Code
- | [1028902] Microsoft Internet Explorer Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks
- | [1028759] (Microsoft Issues Fix for Internet Explorer) Adobe Flash Player Buffer Overflows Let Remote Users Execute Arbitrary Code
- | [1028756] Microsoft .NET Bug Lets Remote Users Execute Arbitrary Code and Bypass Security Restrictions
- | [1028755] Microsoft Silverlight Null Pointer Dereference Lets Remote Users Execute Arbitrary Code
- | [1028754] Microsoft Windows Defender Pathname Bug Lets Local Users Gain Elevated Privileges
- | [1028752] Microsoft DirectShow GIF Image Processing Flaw Lets Remote Users Execute Arbitrary Code
- | [1028751] Microsoft Office TrueType Font Parsing Flaw Lets Remote Users Execute Arbitrary Code
- | [1028750] Microsoft Visual Studio .NET TrueType Font Parsing Flaw Lets Remote Users Execute Arbitrary Code
- | [1028749] Microsoft Lync TrueType Font Parsing Flaw Lets Remote Users Execute Arbitrary Code
- | [1028748] Microsoft Windows GDI+ TrueType Font Parsing Flaw Lets Remote Users Execute Arbitrary Code
- | [1028745] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks
- | [1028651] Microsoft Internet Explorer Multiple Memory Corruption Bugs Let Remote Users Execute Arbitrary Code
- | [1028650] Microsoft Office Buffer Overflow in PNG Image Processing Lets Remote Users Execute Arbitrary Code
- | [1028560] Microsoft Visio Discloses Information to Remote Users
- | [1028558] Microsoft .NET Flaws Let Remote Users Bypass Authentication and Bypass XML File Signature Verification
- | [1028557] Microsoft Malware Protection Engine Flaw Lets Remote Users Execute Arbitrary Code
- | [1028553] Microsoft Word RTF Shape Data Parsing Error Lets Remote Users Execute Arbitrary Code
- | [1028552] Microsoft Publisher Multiple Bugs Let Remote Users Execute Arbitrary Code
- | [1028551] Microsoft Lync Object Access Flaw Lets Remote Users Execute Arbitrary Code
- | [1028550] Microsoft Office Communicator Object Access Flaw Lets Remote Users Execute Arbitrary Code
- | [1028545] Microsoft Internet Explorer Multiple Use-After-Free Bugs Let Remote Users Execute Arbitrary Code
- | [1028514] Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code
- | [1028412] Microsoft SharePoint Server Discloses Files to Remote Authenticated Users
- | [1028411] Microsoft Office Web Apps Input Validation Flaw in Sanitization Component Permits Cross-Site Scripting Attacks
- | [1028410] Microsoft InfoPath Input Validation Flaw in Sanitization Component Permits Cross-Site Scripting Attacks
- | [1028409] Microsoft Groove Server Input Validation Flaw in Sanitization Component Permits Cross-Site Scripting Attacks
- | [1028408] Microsoft SharePoint Input Validation Flaw in HTML Sanitization Component Permits Cross-Site Scripting Attacks
- | [1028405] Microsoft Active Directory LDAP Processing Flaw Lets Remote Users Deny Service
- | [1028404] Microsoft Antimalware Client Path Name Flaw Lets Local Users Gain Elevated Privileges
- | [1028398] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
- | [1028281] Microsoft Office for Mac HTML Loading Bug Lets Remote Users Obtain Potentially Sensitive Information
- | [1028279] Microsoft OneNote Buffer Validation Flaw Lets Remote Users Obtain Potentially Sensitive Information
- | [1028278] Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks
- | [1028276] Microsoft Visio Viewer Tree Object Type Confusion Error Lets Remote Users Execute Arbitrary Code
- | [1028275] Microsoft Internet Explorer Use-After-Free Bugs Let Remote Users Execute Arbitrary Code
- | [1028273] Microsoft Silverlight Memory Pointer Dereference Lets Remote Users Execute Arbitrary Code
- | [1028123] Microsoft .NET Bug Lets Remote Users Execute Arbitrary Code and Bypass Security Restrictions
- | [1028119] Microsoft DirectShow Media Decompression Flaw Lets Remote Users Execute Arbitrary Code
- | [1028117] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Access Information Across Domains
- | [1028116] Microsoft Internet Explorer Vector Markup Language Memory Corruption Error Lets Remote Users Execute Arbitrary Code
- | [1027949] Microsoft .NET Open Data (OData) Protocol Bug Lets Remote Users Deny Service
- | [1027948] Microsoft System Center Configuration Manager Input Validation Flaws Permit Cross-Site Scripting Attacks
- | [1027945] Microsoft .NET Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, and Bypass Security Restrictions
- | [1027943] Microsoft XML Core Services (MSXML) XML Parsing Flaws Let Remote Users Execute Arbitrary Code
- | [1027934] Microsoft Windows Includes Some Invalid TURKTRUST Certificates
- | [1027930] Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code
- | [1027870] Microsoft Internet Explorer Discloses Mouse Location to Remote Users
- | [1027859] Microsoft DirectPlay Heap Overflow Lets Remote Users Execute Arbitrary Code
- | [1027857] Microsoft Exchange Server RSS Feed Bug Lets Remote Users Deny Service
- | [1027852] Microsoft Word RTF Parsing Error Lets Remote Users Execute Arbitrary Code
- | [1027851] Microsoft Internet Explorer Multiple Use-After-Free Bugs Let Remote Users Execute Arbitrary Code
- | [1027753] Microsoft .NET Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, and Bypass Security Restrictions
- | [1027752] Microsoft Excel Buffer Overflow, Memory Corruption, and Use-After-Free Errors Let Remote Users Execute Arbitrary Code
- | [1027749] Microsoft Internet Explorer Multiple Use-After-Free Bugs Let Remote Users Execute Arbitrary Code
- | [1027647] EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords
- | [1027629] Microsoft Office InfoPath HTML Sanitizer Flaw Permits Cross-Site Scripting Attacks
- | [1027628] Microsoft Office Communicator HTML Sanitizer Flaw Permits Cross-Site Scripting Attacks
- | [1027627] Microsoft Lync HTML Sanitizer Flaw Permits Cross-Site Scripting Attacks
- | [1027626] Microsoft SharePoint HTML Sanitizer Flaw Permits Cross-Site Scripting Attacks
- | [1027625] Microsoft Groove Server HTML Sanitizer Flaw Permits Cross-Site Scripting Attacks
- | [1027623] Microsoft SQL Server Input Validation Flaw in Reporting Services Permits Cross-Site Scripting Attacks
- | [1027621] Microsoft Works Heap Corruption Flaw Lets Remote Users Execute Arbitrary Code
- | [1027620] Microsoft Kerberos Null Pointer Dereference Lets Remote Users Deny Service
- | [1027618] Microsoft Word Memory Errors Let Remote Users Execute Arbitrary Code
- | [1027555] Microsoft Internet Explorer Multiple Use-After-Free Bugs Let Remote Users Execute Arbitrary Code
- | [1027538] Microsoft Internet Explorer execCommand Flaw Lets Remote Users Execute Arbitrary Code
- | [1027512] Microsoft System Center Configuration Manager Input Validation Flaw Permits Cross-Site Scripting Attacks
- | [1027511] Microsoft Visual Studio Team Foundation Server Input Validation Flaw Permits Cross-Site Scripting Attacks
- | [1027394] Microsoft Visio Buffer Overflow in Processing DXF Format Files Lets Remote Users Execute Arbitrary Code
- | [1027393] Microsoft Office CGM Graphics File Memory Corruption Error Lets Remote Users Execute Arbitrary Code
- | [1027392] Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code
- | [1027390] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
- | [1027389] Microsoft Visual Basic Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
- | [1027385] Microsoft Visual FoxPro Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
- | [1027384] Microsoft Host Integration Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
- | [1027383] Microsoft Commerce Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
- | [1027381] Microsoft SQL Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
- | [1027380] Microsoft Office Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
- | [1027295] Microsoft SharePoint Server Bugs in Oracle Outside In Libraries Let Remote Users Execute Arbitrary Code
- | [1027294] Microsoft Exchange Server Bugs in Oracle Outside In Libraries Let Remote Users Execute Arbitrary Code
- | [1027234] Microsoft Office for Mac Folder Permission Flaw Lets Local Users Gain Elevated Privileges
- | [1027232] Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting, Information Disclosure, and URL Redirection Attacks
- | [1027229] Microsoft Office DLL Loading Error Lets Remote Users Execute Arbitrary Code
- | [1027228] Microsoft Visual Basic for Applications DLL Loading Error Lets Remote Users Execute Arbitrary Code
- | [1027227] Microsoft Data Access Components (MDAC) ADO Cachesize Buffer Overflow Lets Remote Users Execute Arbitrary Code
- | [1027226] Microsoft Internet Explorer Deleted Object Access Bugs Let Remote Users Execute Arbitrary Code
- | [1027157] Microsoft XML Core Services (MSXML) Object Access Error Lets Remote Users Execute Arbitrary Code
- | [1027151] Microsoft Dynamics AX Input Validation Flaw Permits Cross-Site Scripting Attacks
- | [1027150] Microsoft Lync DLL Loading Error Lets Remote Users Execute Arbitrary Code
- | [1027149] Microsoft .NET Memory Access Bug Lets Remote Users Execute Arbitrary Code
- | [1027147] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information
- | [1027114] Microsoft Windows Includes Some Invalid Certificates
- | [1027048] Microsoft .NET Bugs Let Remote Users Execute Arbitrary Code and Deny Service
- | [1027043] Microsoft Windows Partition Manager Memory Allocation Error Lets Local Users Gain Elevated Privileges
- | [1027042] Microsoft Visio Viewer Memory Corruption Error Lets Remote Users Execute Arbitrary Code
- | [1027041] Microsoft Office Excel File Memory Corruption Errors and Heap Overflows Let Remote Users Execute Arbitrary Code
- | [1027040] Microsoft Silverlight Double Free Memory Error Lets Remote Users Execute Arbitrary Code
- | [1027038] Microsoft GDI+ Bugs Let Remote Users Execute Arbitrary Code
- | [1027036] Microsoft .NET Framework Serialization Bugs Let Remote Users Execute Arbitrary Code
- | [1027035] Microsoft Word RTF Processing Flaw Lets Remote Users Execute Arbitrary Code
- | [1026911] Microsoft Office WPS File Heap Overflow Lets Remote Users Execute Arbitrary Code
- | [1026910] Microsoft Works WPS File Heap Overflow Lets Remote Users Execute Arbitrary Code
- | [1026909] Microsoft Forefront Unified Access Gateway Bugs Let Remote Users Obtain Potentially Sensitive Information and Conduct Browser Redirection Attacks
- | [1026907] Microsoft .NET Parameter Validation Flaw Lets Remote Users Execute Arbitrary Code
- | [1026905] Microsoft BizTalk Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
- | [1026904] Microsoft Visual Basic Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
- | [1026903] Microsoft Visual FoxPro Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
- | [1026902] Microsoft Commerce Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
- | [1026901] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
- | [1026900] Microsoft Office Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
- | [1026899] Microsoft SQL Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
- | [1026794] Microsoft DirectWrite Unicode Character Processing Flaw Lets Remote Users Deny Service
- | [1026792] Microsoft Visual Studio Lets Local Users Gain Elevated Privileges
- | [1026791] Microsoft Expression Design DLL Loading Error Lets Remote Users Execute Arbitrary Code
- | [1026789] Microsoft DNS Server Lets Remote Users Deny Service
- | [1026686] Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting Attacks
- | [1026685] Microsoft Windows Ancillary Function Driver Lets Local Users Gain Elevated Privileges
- | [1026684] Microsoft Visio Viewer Multiple Bugs Let Remote Users Execute Arbitrary Code
- | [1026681] Microsoft Silverlight Bugs Let Remote Users Execute Arbitrary Code
- | [1026680] Microsoft .NET Bugs Let Remote Users Execute Arbitrary Code
- | [1026677] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information
- | [1026499] Microsoft Anti-Cross Site Scripting Library Flaw May Permit Cross-Site Scripting Attacks
- | [1026497] Microsoft Windows ClickOnce Feature Lets Remote Users Execute Arbitrary Code
- | [1026479] Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users
- | [1026469] Microsoft ASP.NET Hash Table Collision Bug Lets Remote Users Deny Service
- | [1026416] Microsoft Office IME (Chinese) Lets Local Users Gain Elevated Privileges
- | [1026414] Microsoft Publisher Multiple Errors Let Remote Users Execute Arbitrary Code
- | [1026413] Microsoft Internet Explorer DLL Loading Error Lets Remote Users Execute Arbitrary Code and HTML Processing Bugs Let Remote Users Obtain Information
- | [1026412] Microsoft Active Directory Memory Access Error Lets Remote Authenticated Users Execute Arbitrary Code
- | [1026411] Microsoft PowerPoint DLL Loading and OfficeArt Object Processing Flaws Let Remote Users Execute Arbitrary Code
- | [1026410] Microsoft Office Excel File Memory Error Lets Remote Users Execute Arbitrary Code
- | [1026409] Microsoft Office Use-After-Free Bug Lets Remote Users Execute Arbitrary Code
- | [1026408] Microsoft Internet Explorer Error in Microsoft Time Component Lets Remote Users Execute Arbitrary Code
- | [1026294] Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication
- | [1026271] Microsoft Windows TrueType Font Parsing Flaw Lets Remote Users Execute Arbitrary Code
- | [1026220] Microsoft Publisher 'Pubconv.dll' Memory Corruption Error Lets Remote Users Execute Arbitrary Code
- | [1026169] Microsoft Forefront Unified Access Gateway Input Validation Flaws Permits Cross-Site Scripting, HTTP Response Splitting, and Denial of Service Attacks
- | [1026168] Microsoft Host Integration Server Bugs Let Remote Users Deny Service
- | [1026167] Microsoft Windows Ancillary Function Driver Lets Local Users Gain Elevated Privileges
- | [1026164] Microsoft Active Accessibility Component DLL Loading Error Lets Remote Users Execute Arbitrary Code
- | [1026162] Microsoft .NET Inheritance Restriction Error Lets Remote Users Execute Arbitrary Code
- | [1026161] Microsoft Silverlight Inheritance Restriction Error Lets Remote Users Execute Arbitrary Code
- | [1026160] Microsoft Internet Explorer Multiple Flaws Let Remote Users Execute Arbitrary Code
- | [1026103] Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions
- | [1026041] Microsoft Windows Components DLL Loading Error Lets Remote Users Execute Arbitrary Code
- | [1026040] Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting and Information Disclosure Attacks
- | [1026039] Microsoft Office DLL Loading Error and Unspecified Bug Lets Remote Users Execute Arbitrary Code
- | [1026038] Microsoft Excel Multiple Bugs Let Remote Users Execute Arbitrary Code
- | [1026037] Microsoft Windows Internet Name Service (WINS) Input Validation Flaw in ECommEndDlg() Lets Local Users Gain Elevated Privileges
- | [1025937] Microsoft Windows DHCPv6 Processing Flaw Lets Remote Denial of Service to RPC Services
- | [1025905] Microsoft .NET Socket Trust Validation Error Lets Remote Users Obtain Information and Redirect Certain Network Traffic
- | [1025903] Microsoft Visual Studio Input Validation Hole Permits Cross-Site Scripting Attacks
- | [1025902] Microsoft ASP.NET Chart Control Remote File Disclosure
- | [1025896] Microsoft Visio Memory Corruption Errors Let Remote Users Execute Arbitrary Code
- | [1025895] Microsoft Data Access Components Insecure Library Loading Lets Remote Users Execute Arbitrary Code
- | [1025894] Microsoft DNS Server Flaws Let Remote Users Execute Arbitrary Code and Deny Service
- | [1025893] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information
- | [1025847] Microsoft Internet Explorer Flaw in Processing EUC-JP Encoded Characters Lets Remote Users Conduct Cross-Site Scripting Attacks
- | [1025763] Microsoft Visio May Load DLLs Unsafely and Remotely Execute Arbitrary Code
- | [1025760] Microsoft Windows Bluetooth Stack Memory Access Error Lets Remote Users Execute Arbitrary Code
- | [1025675] Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code
- | [1025655] Microsoft MHTML Input Validation Hole Permits Cross-Site Scripting Attacks
- | [1025654] Microsoft Internet Explorer Vector Markup Language (VML) Object Access Error Lets Remote Users Execute Arbitrary Code
- | [1025653] Microsoft Active Directory Input Validation Flaw in Certificate Services Web Enrollment Permits Cross-Site Scripting Attacks
- | [1025649] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information
- | [1025648] Microsoft SQL Server XML Editor External Entity Resolution Flaw Lets Remote Users Obtain Potentially Sensitive Information
- | [1025647] Microsoft Visual Studio XML Editor External Entity Resolution Flaw Lets Remote Users Obtain Potentially Sensitive Information
- | [1025646] Microsoft Office InfoPath XML Editor External Entity Resolution Flaw Lets Remote Users Obtain Potentially Sensitive Information
- | [1025644] Microsoft Hyper-V VMBus Packet Validation Flaw Lets Local Users Deny Service
- | [1025643] Microsoft Windows Ancillary Function Driver Lets Local Users Gain Elevated Privileges
- | [1025642] Microsoft Excel Multiple Bugs Let Remote Users Execute Arbitrary Code
- | [1025641] Microsoft .NET JIT Compiler Validation Flaw Lets Remote Users Execute Arbitrary Code
- | [1025639] Microsoft Distributed File System Bugs Let Remote Users Deny Service and Execute Arbitrary Code
- | [1025637] Microsoft Forefront Threat Management Gateway Bounds Validation Flaw in Winsock Provider Lets Remote Users Execute Arbitrary Code
- | [1025636] Microsoft .NET Array Offset Error Lets Remote Users Execute Code
- | [1025635] Microsoft Silverlight Array Offset Error Lets Remote Users Execute Arbitrary Code
- | [1025634] Microsoft Windows OLE Automation Underflow Lets Remote Users Execute Arbitrary Code
- | [1025513] Microsoft PowerPoint Memory Corruption Errors Let Remote Users Execute Arbitrary Code
- | [1025512] Microsoft Windows Internet Name Service Socket Send Exception Handling Bug Lets Remote Users Execute Arbitrary Code
- | [1025360] Microsoft Reader Memory Corruption Errors Let Remote Users Execute Arbitrary Code
- | [1025359] Microsoft MHTML Stack Overflow Lets Remote Users Execute Arbitrary Code
- | [1025347] Microsoft Fax Cover Page Editor Memory Corruption Error Lets Remote Users Execute Arbitrary Code
- | [1025346] Microsoft Foundation Classes May Load DLLs Unsafely and Remotely Execute Arbitrary Code
- | [1025344] Microsoft WordPad Parsing Error Lets Remote Users Execute Arbitrary Code
- | [1025343] Microsoft Office DLL Loading and Graphic Object Processing Flaws Let Remote Users Execute Arbitrary Code
- | [1025340] Microsoft PowerPoint Bugs Let Remote Users Execute Arbitrary Code
- | [1025337] Microsoft Excel Multiple Bugs Let Remote Users Execute Arbitrary Code
- | [1025335] Microsoft GDI+ EMF Image Integer Overflow Lets Remote Users Execute Arbitrary Code
- | [1025334] Microsoft OpenType Compact Font Format (CFF) Driver Stack Overflow Lets Remote Users Execute Arbitrary Code
- | [1025333] Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code
- | [1025331] Microsoft .NET Stack Corruption Error in JIT Compiler Lets Remote Users Execute Arbitrary Code
- | [1025330] Microsoft WMITools and Windows Messenger ActiveX Controls Let Remote Users Execute Arbitrary Code
- | [1025327] Microsoft Internet Explorer Bugs Let Remote Users Obtain Potentially Sensitive Information, Execute Arbitrary Code, and Hijack User Clicks
- | [1025312] Microsoft Windows Kernel Bug in AFD.sys Lets Local Users Deny Service
- | [1025248] Microsoft Windows Includes Some Invalid Comodo Certificates
- | [1025171] Microsoft Groove DLL Loading Error Lets Remote Users Execute Arbitrary Code
- | [1025170] Microsoft DirectShow DLL Loading Error Lets Remote Users Execute Arbitrary Code
- | [1025164] Microsoft Internet Explorer Lets Remote Users Spoof the Address Bar
- | [1025117] Microsoft Malware Protection Engine Registry Processing Error Lets Local Users Gain Elevated Privileges
- | [1025086] Microsoft Active Directory Heap Overflow in Processing BROWSER ELECTION Packets May Let Remote Users Execute Arbitrary Code
- | [1025049] Microsoft Local Security Authority Subsystem Service (LSASS) Lets Local Users Gain Elevated Privileges
- | [1025044] Microsoft JScript and VBScript Disclose Information to Remote Users
- | [1025043] Microsoft Visio Memory Corruption Error in Processing Visio Files Lets Remote Users Execute Arbitrary Code
- | [1025042] Microsoft Active Directory SPN Collosions May Let Remote Authenticated Users Deny Service
- | [1025038] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
- | [1025003] Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks
- | [1024947] Microsoft Data Access Components (MDAC) Memory Corruption Errors in Processing DSN Data and ADO Records Let Remote Users Execute Arbitrary Code
- | [1024940] Microsoft Internet Explorer Use-After-Free in 'mshtml.dll' May Let Remote Users Execute Arbitrary Code
- | [1024925] Microsoft Fax Cover Page Editor Memory Corruption Error Lets Remote Users Execute Arbitrary Code
- | [1024922] Microsoft Internet Explorer Recursive CSS Import Memory Corruption Error Lets Remote Users Execute Arbitrary Code
- | [1024888] Microsoft Exchange Server RPC Processing Flaw Lets Remote Authenticated Users Deny Service
- | [1024887] Microsoft Office Graphics Filters Let Remote Users Execute Arbitrary Code
- | [1024886] Microsoft SharePoint Input Validation Flaw in Processing SOAP Requests Let Remote Users Execute Arbitrary Code
- | [1024885] Microsoft Publisher Bugs Let Remote Users Execute Arbitrary Code
- | [1024884] Microsoft Hyper-V Input Validation Flaw Lets Local Guest Operating System Users Deny Service
- | [1024879] Microsoft Windows Internet Connection Signup Wizard May Load DLLs Unsafely and Remotely Execute Arbitrary Code
- | [1024877] Microsoft Windows May Load DLLs Unsafely and Remotely Execute Arbitrary Code
- | [1024874] Microsoft Windows Task Scheduler Lets Local Users Gain Elevated Privileges
- | [1024872] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Domain Attacks
- | [1024790] Microsoft Outlook Attachment Processing Flaw Lets Remote Users Deny Service
- | [1024707] Microsoft Forefront Unified Access Gateway Input Validation Flaws Permit Cross-Site Scripting and URL Redirection Attacks
- | [1024706] Microsoft PowerPoint Bugs Let Remote Users Execute Arbitrary Code
- | [1024705] Microsoft Office Flaws Let Remote Users Execute Arbitrary Code
- | [1024676] Microsoft Internet Explorer Freed Object Invalid Flag Reference Access Lets Remote Users Execute Arbitrary Code
- | [1024630] Microsoft Internet Explorer 'window.onerror' Callback Lets Remote Users Obtain Information From Other Domains
- | [1024559] Microsoft SharePoint Input Validation Hole in SafeHTML Permits Cross-Site Scripting Attacks
- | [1024558] Microsoft Cluster Service Disk Permission Flaw Lets Local Users Gain Elevated Privileges
- | [1024557] Microsoft Foundation Classes Library Buffer Overflow in Window Title Lets Remote Users Execute Arbitrary Code
- | [1024552] Microsoft Office Excel Has Multiple Flaws That Let Remote Users Execute Arbitrary Code
- | [1024551] Microsoft Office Word Processing Flaws Let Remote Users Execute Arbitrary Code
- | [1024546] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code, Obtain Information, and Conduct Cross-Site Scripting Attacks
- | [1024543] Microsoft .NET Framework JIT Compiler Memory Access Error Lets Remote Users Execute Arbitrary Code
- | [1024459] Microsoft ASP.NET Padding Oracle Attack Lets Remote Users Decrypt Data
- | [1024445] Microsoft Outlook Web Access Authentication Flaw Lets Remote Users Hijack User Sessions
- | [1024443] Microsoft Local Security Authority Subsystem Service (LSASS) Heap Overflow Lets Remote Authenticated Users Execute Arbitrary Code
- | [1024442] Microsoft WordPad Parsing Error in Text Converters Lets Remote Users Execute Arbitrary Code
- | [1024441] Microsoft Windows RPC Memory Allocation Error Lets Remote Users Execute Arbitrary Code
- | [1024440] Microsoft Internet Information Services Bugs Let Remote Users Bypass Authentication, Deny Service, and Execute Arbitrary Code
- | [1024439] Microsoft Outlook Heap Overflow Lets Remote Users Execute Arbitrary Code
- | [1024438] Microsoft Office Unicode Font Parsing in USP10.DLL Lets Remote Users Execute Arbitrary Code
- | [1024312] Microsoft Windows Tracing Feature for Services Lets Local Users Gain Elevated Privileges
- | [1024310] Microsoft Office Excel Flaw Lets Remote Users Execute Arbitrary Code
- | [1024306] Microsoft Silverlight Memory Corruption Errors Let Remote Users Execute Arbitrary Code
- | [1024305] Microsoft .NET Framework Virtual Method Delegate Processing Error Lets Remote Users Execute Arbitrary Code
- | [1024304] Microsoft Cinepak Codec Memory Pointer Error Lets Remote Users Execute Arbitary Code
- | [1024303] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Domain Attacks
- | [1024302] Microsoft MPEG Layer-3 Codecs Stack Overflow Lets Remote Users Execute Arbitary Code
- | [1024301] Microsoft XML Core Services (MSXML) HTTP Response Processing Flaw Lets Remote Users Execute Arbitrary Code
- | [1024298] Microsoft Office Word RTF, Word, and HTML Processing Errors Let Remote Users Execute Arbitrary Code
- | [1024216] Microsoft Windows Shell LNK Shortcut Processing Flaw Lets Users Execute Arbitrary Code
- | [1024189] Microsoft Office Outlook Validation Error in Processing Attachments Lets Remote Users Execute Arbitrary Code
- | [1024188] Microsoft Office Access ActiveX Controls Let Remote Users Execute Arbitrary Code
- | [1024084] Microsoft Help and Support Center URL Escaping Flaw Lets Remote Users Execute Arbitrary Commands
- | [1024080] Microsoft .NET XML Digital Signature Flaw May Let Remote Users Bypass Authentication
- | [1024079] Microsoft Internet Information Services Memory Allocation Error Lets Remote Authenticated Users Execute Arbitrary Code
- | [1024078] Microsoft SharePoint Input Validation Flaw in toStaticHTML API Permits Cross-Site Scripting Attacks
- | [1024077] Microsoft SharePoint Help Page Processing Bug Lets Remote Users Deny Service
- | [1024076] Microsoft Office Excel Has Multiple Flaws That Let Remote Users Execute Arbitrary Code
- | [1024075] Microsoft Office Open XML File Format Converter for Mac Lets Local Users Gain Elevated Privileges
- | [1024073] Microsoft Office COM Object Instantiation Error Lets Remote Users Execute Arbitrary Code
- | [1024070] Microsoft Internet Explorer 8 Developer Tools ActiveX Control Memory Corruption Error Lets Remote Users Execute Arbitrary Code
- | [1024068] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks
- | [1023975] Microsoft Office Memory Corruption Error in VBE6.DLL Lets Remote Users Execute Arbitrary Code
- | [1023974] Microsoft Visual Basic for Applications Memory Corruption Error in VBE6.DLL Lets Remote Users Execute Arbitrary Code
- | [1023972] Microsoft Outlook Express Integer Overflow in Processing POP3/IMAP Responses Lets Remote Users Execute Arbitrary Code
- | [1023938] Microsoft Office Visio Buffer Overflow in Processing DXF Files Lets Remote Users Execute Arbitrary Code
- | [1023932] Microsoft Office SharePoint Input Validation Flaw in 'help.aspx' Permits Cross-Site Scripting Attacks
- | [1023856] Microsoft Visio Index Calculation and Attribute Validation Flaws Let Remote Users Execute Code
- | [1023855] Microsoft Exchange May Disclose Message Fragments to Remote Users
- | [1023854] Microsoft Exchange Error in Parsing MX Records Lets Remote Users Deny Service
- | [1023853] Microsoft Office Publisher TextBox Processing Buffer Overflow Lets Remote Users Execute Arbitrary Code
- | [1023848] Microsoft MPEG Layer-3 Codecs Stack Overflow Lets Remote Users Execute Arbitary Code
- | [1023773] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information
- | [1023720] Microsoft Virtual PC/Server Lets Local Users Gain Elevated Privileges
- | [1023699] Microsoft Internet Explorer Invalid Pointer Reference Lets Remote Users Execute Arbitrary Code
- | [1023698] Microsoft Office Excel Bugs Let Remote Users Execute Arbitrary Code
- | [1023571] Microsoft Windows Protocol Flaw in SSL Renegotiation Lets Remote Users Conduct Man-in-the-Middle Attacks
- | [1023567] Microsoft Hyper-V Instruction Validation Bug Lets Local Users Deny Service
- | [1023566] Microsoft Windows Kerberos Ticket-Granting-Ticket Processing Flaw Lets Remote Authenticated Users Deny Service
- | [1023565] Microsoft Office Buffer Overflow in 'MSO.DLL' Lets Remote Users Execute Arbitrary Code
- | [1023564] Microsoft Paint Integer Overflow Lets Remote Users Execute Arbitrary Code
- | [1023563] Microsoft PowerPoint Buffer Overflows and Memory Errors Let Remote Users Execute Arbitrary Code
- | [1023562] Microsoft DirectShow Heap Overflow Lets Remote Users Execute Arbitrary Code
- | [1023560] Microsoft Internet Explorer Flaw in Microsoft Data Analyzer ActiveX Control Lets Remote Users Execute Arbitrary Code
- | [1023542] Microsoft Internet Explorer Discloses Known Files to Remote Users
- | [1023495] Microsoft Internet Explorer and Windows OS Shell Handler URL Validation Flaw Lets Remote Users Execute Arbitrary Code
- | [1023494] Microsoft Internet Explorer Cross-Site Scripting Filter Can Be Bypassed
- | [1023493] Microsoft Internet Explorer Multiple Memory Access Flaws Let Remote Users Execute Arbitrary Code
- | [1023462] Microsoft Internet Explorer Invalid Pointer Reference Lets Remote Users Execute Arbitrary Code
- | [1023432] Microsoft Embedded OpenType Font Engine Integer Overflow Lets Remote Users Execute Arbitrary Code
- | [1023301] Microsoft Internet Explorer Indeo Codec Bugs Let Remote Users Execute Arbitrary Code
- | [1023297] Microsoft Local Security Authority Subsystem Service Validation Flaw Lets Remote Users Deny Service
- | [1023296] Microsoft Active Directory Federation Services Lets Remote Authenticated Users Execute Arbitrary Code and Spoof Web Sites
- | [1023294] Microsoft Office Word and WordPad Text Converter Memory Errors Let Remote Users Execute Arbitrary Code
- | [1023293] Microsoft Internet Explorer Memory Access Flaws Let Remote Users Execute Arbitrary Code
- | [1023292] Microsoft Office Publisher Memory Allocation Validation Flaw Lets Remote Users Execute Arbitrary Code
- | [1023291] Microsoft Internet Authentication Service Bugs Let Remote Authenticated Users Execute Arbitrary Code or Gain Privileges of the Target User
- | [1023233] Microsoft Internet Explorer Discloses Local Path Names When Printing Local HTML Files to PDF Files
- | [1023226] Microsoft Internet Explorer Invalid Pointer Reference in getElementsByTagName() Method Lets Remote Users Execute Arbitrary Code
- | [1023158] Microsoft Word Memory Corruption Error Lets Remote Users Execute Arbitrary Code
- | [1023157] Microsoft Excel Bugs Let Remote Users Execute Arbitrary Code
- | [1023156] Microsoft Active Directory Stack Memory Consumption Flaw Lets Remote Users Deny Service
- | [1023154] Microsoft License Logging Service Buffer Overflow Lets Remote Users Execute Arbitrary Code
- | [1023153] Microsoft Web Services on Devices API (WSDAPI) Validation Error Lets Remote Users Execute Arbitrary Code
- | [1023013] Microsoft Crypto API NULL Character Flaw in Common Name Field and ASN.1 Integer Overflow Lets Remote Users Spoof Certficiates
- | [1023011] Microsoft Indexing Service ActiveX Control Lets Remote Users Execute Arbitrary Code
- | [1023010] Microsoft Local Security Authority Subsystem Service (LSASS) Integer Underflow Lets Local Users Deny Service
- | [1023009] Microsoft Silverlight Memory Modification Flaw Lets Remote Users Execute Arbitrary Code
- | [1023008] Microsoft .NET Bugs Let Remote Users Execute Arbitrary Code
- | [1023006] Microsoft GDI+ Overflows Let Remote Users Execute Arbitrary Code
- | [1023002] Microsoft Internet Explorer Flaws Let Remote Users Execute Arbitrary Code
- | [1022846] Microsoft Wireless LAN AutoConfig Service Heap Overflow Lets Remote Wireless Users Execute Arbitrary Code
- | [1022843] Microsoft DHTML Editing Component ActiveX Control Lets Remote Users Execute Arbitrary Code
- | [1022842] Microsoft JScript Scripting Engine Memory Corruption Error Lets Remote Users Execute Arbitrary Code
- | [1022716] Microsoft Telnet NTLM Credential Reflection Flaw Lets Remote Users Gain Access
- | [1022715] Microsoft ASP.NET Request Scheduling Flaw Lets Remote Users Deny Service
- | [1022712] Microsoft Active Template Library (ATL) Bugs Let Remote Users Execute Arbitrary Code
- | [1022710] Microsoft Windows Internet Name Service (WINS) Buffer Overflows Let Remote Users Execute Arbitrary Code
- | [1022708] Microsoft Office Web Components Buffer Overflows in ActiveX Control Let Remote Users Execute Arbitrary Code
- | [1022611] Microsoft Internet Explorer Memory Corruption Bugs Let Remote Users Execute Arbitrary Code
- | [1022610] Microsoft Visual Studio Active Template Library Bugs Let Remote Users Execute Arbitrary Code
- | [1022547] Microsoft Internet Security and Acceleration Server OTP Authentication Bug Lets Remote Users Access Resources
- | [1022546] Microsoft Office Publisher Pointer Dereference Bug Lets Remote Users Execute Arbitrary Code
- | [1022545] Microsoft DirectX DirectShow Validation Bugs Let Remote Users Execute Arbitrary Code
- | [1022544] Microsoft Virtual PC/Server Lets Local Users Gain Elevated Privileges Within a Guest Operating System
- | [1022535] Microsoft Office Web Components Bug in Spreadsheet ActiveX Control Lets Remote Users Execute Arbitrary Code
- | [1022514] Microsoft DirectShow Buffer Overflow in ActiveX Control Lets Remote Users Execute Arbitrary Code
- | [1022369] Microsoft PowerPoint Buffer Overflow in Freelance Translator Lets Remote Users Execute Arbitrary Code
- | [1022358] Microsoft Internet Information Services WebDAV Bug Lets Remote Users Bypass Authentication
- | [1022356] Microsoft Word Buffer Overflows Let Remote USers Execute Arbitrary Code
- | [1022355] Microsoft Office Works Document Converter Bug Lets Remote Users Execute Arbitrary Code
- | [1022354] Microsoft Works Document Converter Bug Lets Remote Users Execute Arbitrary Code
- | [1022351] Microsoft Excel Bugs Let Remote Users Execute Arbitrary Code
- | [1022350] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
- | [1022349] Microsoft Active Directory Bugs Let Remote Users Execute Arbitrary Code or Deny Service
- | [1022330] Microsoft Windows Bug in SETDESKWALLPAPER and GETDESKWALLPAPER Calls Let Local Users Deny Service
- | [1022299] Microsoft DirectX Bug in DirectShow QuickTime Parser Lets Remote Users Execute Arbitrary Code
- | [1022240] Microsoft Internet Information Server WebDAV Input Validation Flaw Lets Remote Users Execute Arbitrary Code
- | [1022205] Microsoft PowerPoint Has Multiple Buffer Overflows and Memory Corruption Bugs That Let Remote Users Execute Arbitrary Code
- | [1022047] Microsoft Windows SearchPath Function May Let Remote Users Execute Arbitrary Code
- | [1022046] Microsoft ISA Server Input Validation Flaw in 'cookieauth.dll' Permits Cross-Site Scripting Attacks
- | [1022045] Microsoft ISA Server TCP State Error Lets Remote Users Deny Service
- | [1022044] Microsoft Windows Privilege Separation and Access Control Bugs Let Local Users Gain Elevated Privileges
- | [1022043] Microsoft WordPad and Office Text Converter Bugs Let Remote Users Execute Arbitrary Code
- | [1022042] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
- | [1022040] Microsoft DirectX Bug in Decompressing DirectShow MJPEG Content Lets Remote Users Execute Arbitrary Code
- | [1022039] Microsoft Excel Malformed Object Memory Corruption Bug Lets Remote Users Execute Arbitrary Code
- | [1021967] Microsoft Office PowerPoint Invalid Object Access Bug Lets Remote Users Execute Arbitrary Code
- | [1021880] Microsoft Internet Explorer Unspecified Bug Lets Remote Users Execute Arbitrary Code
- | [1021831] Microsoft DNS Server Bugs Let Remote Users Spoof the DNS Service
- | [1021830] Microsoft DNS Server Registration Validation Flaw Lets Remote Users Conduct Spoofing Attacks
- | [1021829] Microsoft WINS Server Registration Validation Flaw Lets Remote Users Conduct Spoofing Attacks
- | [1021744] Microsoft Excel Invalid Object Access Flaw Lets Remote Users Execute Arbitrary Code
- | [1021702] Microsoft Visio Bugs Let Remote Users Execute Arbitrary Code
- | [1021701] Microsoft Exchange MAPI Command Literal Processing Bug Lets Remote Users Deny Service
- | [1021700] Microsoft Exchange Memory Corruption Error in Decoding TNEF Data Lets Remote Users Execute Arbitrary Code
- | [1021699] Microsoft Internet Explorer Bugs in Handling CSS Sheets and Deleted Objects Lets Remote Users Execute Arbitrary Code
- | [1021629] Microsoft Windows Guidelines for Disabling AutoRun are Ineffective and May Permit Code Execution
- | [1021490] Microsoft SQL Server Heap Overflow Lets Remote Authenticated Users Execute Arbitrary Code
- | [1021381] Microsoft Internet Explorer DHTML Data Binding Invalid Pointer Reference Bug Lets Remote Users Execute Arbitrary Code
- | [1021376] Microsoft WordPad Word 97 Text Converter Memory Corruption Error Lets Remote Users Execute Arbitrary Code
- | [1021371] Microsoft Internet Explorer HTML Processing Bugs Let Remote Users Execute Arbitrary Code
- | [1021370] Microsoft Word Memory Corruption Errors Let Remote Users Execute Arbitrary Code
- | [1021369] Microsoft Visual Basic DataGrid/FlexGrid/Heirarchival FlexGrid/Windows Common/Charts ActiveX Controls Let Remote Users Execute Arbitrary Code
- | [1021368] Microsoft Excel Formula, Object, and Global Array Bugs Let Remote Users Execute Arbitrary Code
- | [1021367] Microsoft Office SharePoint Server Access Control Flaw Lets Remote Users Gain Administrative Access
- | [1021365] Microsoft GDI Buffer Overflows in Processing WMF Files Lets Remote Users Execute Arbitrary Code
- | [1021363] Microsoft SQL Server Memory Overwrite Bug in sp_replwritetovarbin May Let Remote Users Execute Arbitrary Code
- | [1021294] Microsoft Office Communicator VoIP Processing Bugs Let Remote Users Deny Service
- | [1021164] Microsoft XML Core Services (MSXML) Bugs Let Remote Users Obtain Information and Execute Arbitrary Code
- | [1021053] Microsoft Ancillary Function Driver 'afd.sys' Lets Local Users Gain Elevated Privileges
- | [1021052] Microsoft Message Queuing (MSMQ) Heap Overflow Lets Remote Users Execute Arbitrary Code
- | [1021047] Microsoft Internet Explorer Flaws Permit Cross-Domain Scripting Attacks and Let Remote Users Execute Arbitrary Code
- | [1021045] Microsoft Office CDO Protocol Bug Lets Remote Users Execute Arbitrary Scripting Code
- | [1021044] Microsoft Excel Object, Calendar, and Formula Bugs Let Remote Users Execute Arbitrary Code
- | [1021043] Microsoft Host Integration Server RPC Buffer Overflow Lets Remote Users Execute Arbitrary Code
- | [1021042] Microsoft Active Directory LDAP Memory Allocation Error Lets Remote Users Execute Arbitrary Code
- | [1021020] Cisco Unity Bug in Microsoft API Lets Remote Users Deny Service
- | [1021018] Microsoft Digital Image 'PipPPush.DLL' ActiveX Control Lets Remote Users Access Files
- | [1020838] Microsoft GDI+ Integer Overflow in Processing BMP Files Lets Remote Users Execute Arbitrary Code
- | [1020837] Microsoft GDI+ Buffer Overflow in Processing WMF Files Lets Remote Users Execute Arbitrary Code
- | [1020836] Microsoft GDI+ Bug in Processing GIF Image Files Lets Remote Users Execute Arbitrary Code
- | [1020835] Microsoft GDI+ Memory Corruption Error in Processing EMF Image Files Lets Remote Users Execute Arbitrary Code
- | [1020834] Microsoft GDI+ Heap Overflow in Processing Gradient Sizes Lets Remote Users Execute Arbitrary Code
- | [1020833] Microsoft Office OneNote Buffer Overflow Lets Remote Users Execute Arbitrary Code
- | [1020679] Microsoft Outlook Express MTHML Redirect Bug Lets Remote Users Obtain Information
- | [1020678] Microsoft Windows IPSec Policy May Not Be Enforced in Certain Cases
- | [1020677] Microsoft Windows Event System Bugs Let Remote Authenticated Users Execute Arbitrary Code
- | [1020676] Microsoft PowerPoint Memory Errors Let Remote Users Execute Arbitrary Code
- | [1020675] Microsoft Color Management Module Heap Overflow Lets Remote Users Execute Arbitrary Code
- | [1020674] Microsoft Internet Explorer Multiple Bugs Let Remote Users Execute Arbitrary Code
- | [1020673] Microsoft Office Format Filter Bugs Let Remote Users Execute Arbitrary Code
- | [1020672] Microsoft Excel Input Validation Bug in Parsing Records Lets Remote Users Execute Arbitrary Code
- | [1020671] Microsoft Excel Input Validation Bug in Processing Array Index Values Lets Remote Users Execute Arbitrary Code
- | [1020670] Microsoft Excel Input Validation Bug in Processing Index Values Lets Remote Users Execute Arbitrary Code
- | [1020669] Microsoft Excel Credential Caching Bug Lets Local Users Gain Access to Remote Data Sources
- | [1020607] Mac OS X Quick Look Buffer Overflow in Downloading Microsoft Office Files Lets Remote Users Execute Arbitrary Code
- | [1020447] Microsoft Word Memory Corruption Error Lets Remote Users Execute Arbitrary Code
- | [1020446] Microsoft Windows AutoRun Bug May Let Users Execute Arbitrary Code
- | [1020441] Microsoft SQL Server Bugs Let Remote Authenticated Users Obtain Information and Execute Arbitrary Code
- | [1020439] Microsoft Outlook Web Access for Exchange Server Input Validation Bugs Permit Cross-Site Scripting Attacks
- | [1020433] Microsoft Access Snapshot Viewer ActiveX Control Lets Remote Users Download Files to Arbitrary Locations
- | [1020382] Microsoft Internet Explorer Lets Remote Users Conduct Cross-Domain Scripting Attacks
- | [1020232] Microsoft Speech API Lets Remote Users Execute Arbitrary Commands
- | [1020229] Microsoft Active Directory LDAP Validation Bug Lets Remote Users Deny Service
- | [1020228] Microsoft WINS Data Structure Validation Bug Lets Local Users Gain Elevated Privileges
- | [1020226] Microsoft Internet Explorer HTTP Request Header Bug May Let Remote Users Obtain Information in a Different Domain
- | [1020225] Microsoft Internet Explorer Bug in Processing Method Calls Lets Remote Users Execute Arbitrary Code
- | [1020223] Microsoft DirectX SAMI File Validation Bug Lets Remote Users Execute Arbitrary Code
- | [1020222] Microsoft DirectX MJPEG Stream Error Handling Bug Lets Remote Users Execute Arbitrary Code
- | [1020016] Microsoft Malware Protection Engine Lets Remote Users Deny Service
- | [1020015] Microsoft Publisher Bug in Processing Object Header Data Lets Remote Users Execute Arbitrary Code
- | [1020014] Microsoft Word Memory Error in Processing CSS Values Lets Remote Users Execute Arbitrary Code
- | [1020013] Microsoft Word Memory Error in Processing RTF Files Lets Remote Users Execute Arbitrary Code
- | [1020006] Microsoft Windows XP 'i2omgmt.sys' Input Validation Flaw Lets Local Users Gain Elevated Privileges
- | [1019804] Microsoft Visio Lets Remote Users Execute Arbitrary Code
- | [1019801] Microsoft Internet Explorer Data Stream Processing Bug Lets Remote Users Execute Arbitrary Code
- | [1019800] Microsoft Internet Explorer 'hxvz.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code
- | [1019798] Microsoft GDI Buffer Overflow in Processing EMF and WMF Files Lets Remote Users Execute Arbitrary Code
- | [1019797] Microsoft Project Memory Error Lets Remote Users Execute Arbitrary Code
- | [1019738] Microsoft Office S/MIME Processing Lets Remote Users Access Arbitrary URLs
- | [1019736] Microsoft Outlook S/MIME Processing Lets Remote Users Access Arbitrary URLs
- | [1019686] Microsoft Jet Database Buffer Overflow in 'msjet40.dll' Lets Remote Users Execute Arbitrary Code via Word Documents
- | [1019587] Microsoft Excel Input Validation Bug in Processing Conditional Formatting Values Lets Remote Users Execute Arbitrary Code
- | [1019586] Microsoft Excel Input Validation Bug in Processing Rich Text Data Lets Remote Users Execute Arbitrary Code
- | [1019585] Microsoft Excel Formula Parsing Error Lets Remote Users Execute Arbitrary Code
- | [1019584] Microsoft Excel Input Validation Bug in Processing Style Record Data Lets Remote Users Execute Arbitrary Code
- | [1019583] Microsoft Excel Flaw in Importing '.slk' Files Lets Remote Users Execute Arbitrary Code
- | [1019582] Microsoft Excel Input Validation Bug in Processing Data Validation Records Lets Remote Users Execute Arbitrary Code
- | [1019581] Microsoft Office Web Components DataSource Bug Lets Remote Users Execute Arbitrary Code
- | [1019580] Microsoft Office Web Components URL Parsing Bug Lets Remote Users Execute Arbitrary Code
- | [1019579] Microsoft Outlook 'mailto:' URL Validation Flaw Lets Remote Users Execute Arbitrary Code
- | [1019578] Microsoft Office and Excel Memory Corruption Bugs Let Remote Users Execute Arbitrary Code
- | [1019388] Microsoft Works/Microsoft Office Bug in Processing '.wps' Field Length Values Lets Remote Users Execute Arbitrary Code
- | [1019387] Microsoft Works/Microsoft Office Bug in Processing '.wps' Header Index Table Lets Remote Users Execute Arbitrary Code
- | [1019386] Microsoft Works/Microsoft Office Bug in Processing '.wps' File Section Length Headers Lets Remote Users Execute Arbitrary Code
- | [1019385] Microsoft Internet Information Services Error in Processing ASP Page Input Lets Remote Users Execute Arbitrary Code
- | [1019384] Microsoft Internet Information Services File Change Notification Bug Lets Local Users Gain Elevated Privileges
- | [1019381] Microsoft Internet Explorer Argument Validation Flaw in 'dxtmsft.dll' Lets Remote Users Execute Arbitrary Code
- | [1019380] Microsoft Internet Explorer Property Method Processing Bug Lets Remote Users Execute Arbitrary Code
- | [1019379] Microsoft Internet Explorer HTML Layout Rendering Bug Lets Remote Users Execute Arbitrary Code
- | [1019378] Microsoft Internet Explorer Buffer Overflow in Fox Pro ActiveX Control Lets Remote Users Execute Arbitrary Code
- | [1019377] Microsoft Office Publisher Memory Corruption Bug Lets Remote Users Execute Arbitrary Code
- | [1019376] Microsoft Office Publisher Invalid Memory Reference Bug Lets Remote Users Execute Arbitrary Code
- | [1019375] Microsoft Office Object Processing Flaw Lets Remote Users Execute Arbitrary Code
- | [1019374] Microsoft Word Memory Error Lets Remote Users Execute Arbitrary Code
- | [1019258] Microsoft Visual Basic '.dsr' File Buffer Overflow Lets Remote Users Execute Arbitrary Code
- | [1019200] Microsoft Excel File Header Bug Lets Remote Users Execute Arbitrary Code
- | [1019165] Microsoft Windows LSASS Lets Local Users Gain Elevated Privileges
- | [1019078] Microsoft Internet Explorer Object Access Bugs Let Remote Users Execute Arbitrary Code
- | [1019077] Microsoft Message Queuing (MSMQ) Buffer Overflow Lets Remote Users Execute Arbitrary Code
- | [1019073] Microsoft DirectX Bugs in Parsing SAMI, WAV, and AVI Files Let Remote Users Execute Arbitrary Code
- | [1019033] Microsoft Web Proxy Auto-Discovery Name Server Resolution Bug Lets Remote Users Conduct Man-in-the-Middle Attacks
- | [1018976] Microsoft Jet Engine Stack Overflow May Let Remote Users Execute Arbitrary Code
- | [1018942] Microsoft Windows DNS Service Insufficent Entropy Lets Remote Users Spoof the DNS Service
- | [1018903] Microsoft DebugView 'Dbgv.sys' Module Lets Local Users Gain Kernel Level Privileges
- | [1018831] Microsoft Windows ShellExecute() URI Handler Bug Lets Remote Users Execute Arbitrary Commands
- | [1018790] Microsoft Word Bug in Processing Office Files Lets Remote Users Execute Arbitrary Code
- | [1018789] Microsoft SharePoint Input Validation Hole Permits Cross-Site Scripting Attacks
- | [1018788] Microsoft Internet Explorer Bugs Let Remote Users Spoof the Address Bar and Execute Arbitrary Code
- | [1018786] Microsoft Outlook Express Bug in Processing NNTP Responses Lets Remote Users Execute Arbitrary Code
- | [1018727] Microsoft Internet Security and Acceleration Server SOCKS4 Proxy Discloses IP Address Information to Remote Users
- | [1018677] Microsoft Agent ActiveX Control Memory Corruption Error Lets Remote Users Execute Arbitrary Code
- | [1018676] Microsoft Visual Basic VBP File Buffer Overflow Lets Remote Users Execute Arbitrary Code
- | [1018568] Microsoft Vector Markup Language Buffer Overflow Lets Remote Users Execute Arbitrary Code
- | [1018567] Microsoft Virtual PC/Server Heap Overflow Lets Local Users Gain Elevated Privileges
- | [1018563] Microsoft GDI Buffer Overflow Lets Remote Users Execute Arbitrary Code
- | [1018562] Microsoft Internet Explorer CSS and ActiveX Control Bugs Let Remote Users Execute Arbitrary Code
- | [1018561] Microsoft Excel Workspace Index Validation Bug Lets Remote Users Execute Arbitrary Code
- | [1018560] Microsoft OLE Automation Memory Corruption Bug Lets Remote Users Execute Arbitrary Code
- | [1018559] Microsoft Core XML Services Memory Corruption Error Lets Remote Users Execute Arbitrary Code
- | [1018551] Microsoft DirectX Buffer Overflow in FlashPix ActiveX Control Lets Remote Users Execute Arbitrary Code
- | [1018520] Microsoft Visual Database Tools Buffer Overflow in ActiveX Control Lets Remote Users Execute Arbitrary Code
- | [1018420] Microsoft DirectX Heap Overflow in Processing RLE-Compressed Targa Images Lets Remote Users Execute Arbitrary Code
- | [1018353] Microsoft Office Publisher Lets Remote Users Execute Arbitrary Code
- | [1018352] Microsoft Excel Caculation Error and Memory Corruption Error Lets Remote Users Execute Arbitrary Code
- | [1018351] Microsoft Internet Explorer Bug in Firefox URL Protocol Handler Lets Remote Users Execute Arbitrary Commands
- | [1018321] Microsoft Excel Sheet Name Buffer Overflow Lets Remote Users Execute Arbitrary Code
- | [1018251] Microsoft Office Buffer Overflow in MSODataSourceControl ActiveX Control May Let Remote Users Execute Arbitrary Code
- | [1018235] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
- | [1018202] Microsoft GDI+ ICO File Divide By Zero Bug Lets Remote Users Deny Service
- | [1018193] Microsoft Internet Explorer Lets Remote Users Spoof Certain Objects
- | [1018192] Microsoft Internet Explorer Input Validation Hole Permits Cross-Site Scripting Attacks
- | [1018107] Microsoft Office Buffer Overflow in OUACTRL.OCX ActiveX Control Lets Remote Users Execute Arbitrary Code
- | [1018019] Microsoft Internet Explorer Bugs Let Remote Users Modify Files or Execute Arbitrary Code
- | [1018017] Microsoft CAPICOM 'CAPICOM.Certificates' ActiveX Control Lets Remote Users Execute Arbitrary Code
- | [1018016] Microsoft BizTalk Server 'CAPICOM.Certificates' ActiveX Control Lets Remote Users Execute Arbitrary Code
- | [1018015] Microsoft Exchange Base64, iCal, IMAP, and Attachment Processing Bugs Let Remote Users Deny Service or Execute Arbitrary Code
- | [1018014] Microsoft Office Drawing Object Validation Flaw Lets Remote Users Execute Arbitrary Code
- | [1018013] Microsoft Word Array and RTF Processing Bugs Let Remote Users Execute Arbitrary Code
- | [1018012] Microsoft Excel Specially Crafted BIFF Records, Set Font Values, and Filter Records Permit Remote Code Execution
- | [1017969] Microsoft Internet Explorer Digest Authentication Bug Lets Remote Users Conduct HTTP Request Splitting Attacks
- | [1017910] Microsoft Windows DNS Service RPC Stack Overflow Lets Remote Users Execute Arbitrary Code
- | [1017902] Microsoft Word Lets Remote Users Cause Arbitrary Code to Be Executed
- | [1017901] Microsoft Windows Help File Heap Overflow Lets Remote Users Execute Arbitrary Code
- | [1017896] Microsoft Agent URL Parsing Bug Lets Remote Users Execute Arbitrary Code
- | [1017894] Microsoft Content Management Server Permits Cross-Site Scripting Attacks and Lets Remote Users Execute Arbitrary Code
- | [1017827] Microsoft Windows Animated Cursor Bug Lets Remote Users Execute Arbitrary Code
- | [1017752] Adobe JRun IIS Connector Bug Lets Remote Users Deny Service
- | [1017736] Microsoft Windows Explorer OLE Parsing Bug Lets Users Deny Service
- | [1017694] VeriSign Secure Messaging for Microsoft Exchange Stack Overflow in ConfigChk ActiveX Control Lets Remote Users Execute Arbitrary Code
- | [1017653] Microsoft Word Unspecified Vulnerability Lets Remote Users Execute Arbitrary Code
- | [1017643] Microsoft Internet Explorer Multiple COM Objects Let Remote Users Execute Arbitrary Code
- | [1017642] Microsoft Internet Explorer FTP Server Response Memory Corruption Error Lets Remote Users Execute Arbitrary Code
- | [1017641] Microsoft Windows RichEdit OLE Memory Corruption Error Lets Remote Users Execute Arbitrary Code
- | [1017640] Microsoft Office OLE Memory Corruption Error Lets Remote Users Execute Arbitrary Code
- | [1017639] Microsoft Word Macro Security Warning Bug and Drawing Object Memory Corrupution Error Lets Remote Users Execute Arbitrary Code
- | [1017638] Microsoft MFC Memory Corruption Error Lets Remote Users Execute Arbitrary Code
- | [1017637] Microsoft OLE Dialog RTF File Memory Corruption Error Lets Remote Users Execute Arbitrary Code
- | [1017636] Microsoft Windows Defender Integer Overflow in Parsing PDF Files Lets Remote Users Execute Arbitrary Code
- | [1017635] Microsoft HTML Help ActiveX Control Lets Remote Users Execute Arbitrary Code
- | [1017632] Microsoft Step-by-Step Interactive Training Buffer Overflow in Processing Bookmark Links Lets Remote Users Execute Arbitrary Code
- | [1017584] Microsoft Office Excel Buffer Overflow Lets Remote Users Execute Arbitrary Code
- | [1017579] [Duplicate Entry] Microsoft Word Unspecified Vulnerability Lets Remote Users Execute Arbitrary Code
- | [1017564] Microsoft Word Function Processing Bug Lets Remote Users Execute Arbitrary Code
- | [1017530] Microsoft Help Workshop Buffer Overflow in Processing '.CNT' Files Lets Remote Users Execute Arbitrary Code
- | [1017488] Microsoft Outlook '.iCal', '.oss', and SMTP Header Bugs Let Remote Users Execute Arbitrary Code or Deny Service
- | [1017487] Microsoft Excel Buffer Overflows in Processing Various Records and Strings Lets Remote Users Execute Arbitrary Code
- | [1017486] Microsoft Office Brazilian Portuguese Grammar Checker Lets Remote Users Execute Arbitrary Code
- | [1017485] Microsoft Excel Memory Access Error Lets Remote Users Execute Arbitrary Code
- | [1017441] Microsoft Windows Workstation Service Memory Allocation Error in NetrWkstaUserEnum() Lets Remote Users Deny Service
- | [1017397] Microsoft Outlook Recipient ActiveX Control Lets Remote Users Deny Service
- | [1017390] Microsoft Word Unchecked Count Vulnerability Lets Remote Users Execute Arbitrary Code
- | [1017388] Microsoft Project Discloses Database Password to Remote Authenticated Users
- | [1017374] Microsoft Internet Explorer May Disclose Contents of the Temporary Internet Files Folder to Remote Users
- | [1017373] Microsoft Internet Explorer DHTML and Script Error Handling Bugs Let Remote Users Execute Arbitrary Code
- | [1017369] Microsoft Outlook Express Buffer Overflow in Processing Windows Address Book Files Let Remote Users Execute Arbitrary Code
- | [1017358] Microsoft Word Data Structure Processing Bug Lets Remote Users Cause Arbitrary Code to Be Executed
- | [1017339] Microsoft Word String Processing Bug Lets Remote Users Execute Arbitrary Code
- | [1017224] Microsoft Client Service for Netware Buffer Overflows Let Remote Users Execute Arbitrary Code and Crash the System
- | [1017223] Microsoft Internet Explorer Bug in Rending HTML Layout Combinations May Let Remote Users Execute Arbitrary Code
- | [1017222] Microsoft Agent '.ACF' File Memory Corruption Error Lets Remote Users Execute Arbitrary Code
- | [1017168] Microsoft Windows Kernel GDI Data Structure Processing Bug Lets Local Users Gain Elevated Privileges
- | [1017165] Microsoft Internet Explorer 'ieframe.dll' Lets Remote Users Spoof Invalid Certificates
- | [1017157] Microsoft XML Core Services ActiveX Control Lets Remote Users Execute Arbitrary Code
- | [1017142] Microsoft Visual Studio WMI Object Broker ActiveX Control Lets Remote Users Execute Arbitrary Code
- | [1017133] Microsoft NAT Helper 'ipnathlp.dll' Lets Remote Users Deny Service
- | [1017127] Microsoft Data Access Components 'ADODB.Connection' Execute Function Lets Remote Users Execute Arbitrary Code
- | [1017122] Microsoft Internet Explorer Lets Remote Users Partially Spoof Address Bar URLs
- | [1017059] Microsoft PowerPoint Bug Causes PowerPoint to Crash
- | [1017034] Microsoft Office String, Chart Record, and SmartTag Validation Errors Let Remote Users Execute Arbitrary Code
- | [1017033] Microsoft XML Core Services Lets Remote Users Execute Arbitrary Code or Obtain Information
- | [1017032] Microsoft Word String and Mail Merge Record Validation Flaws Let Remote Users Execute Arbitrary Code
- | [1017031] Microsoft Excel DATETIME/COLINFO Record Errors and Lotus 1-2-3 Errors Let Remote Users Execute Arbitrary Code
- | [1017030] Microsoft PowerPoint Errors in Parsing Object Pointers and Data Records Lets Remote Users Execute Arbitrary Code
- | [1016941] Microsoft Windows Shell Integer Overflow Lets Remote Users Execute Arbitrary Code
- | [1016937] Microsoft PowerPoint Memory Corruption Bug Lets Remote Users Execute Arbitrary Code
- | [1016886] [Duplicate] Microsoft PowerPoint Bug Lets Remote Users Execute Arbitrary Code
- | [1016879] Microsoft Internet Explorer VML Buffer Overflow Lets Remote Users Execute Arbitrary Code
- | [1016854] Microsoft Internet Explorer Buffer Overflow in 'daxctle.ocx' ActiveX in KeyFrame Method Control Lets Remote Users Execute Arbitrary Code
- | [1016839] Microsoft Internet Explorer URLMON.DLL Buffer Overflow Lets Remote Users Execute Arbitrary Code
- | [1016827] Microsoft PGM Implementation Buffer Overflow in MSMQ Service Lets Remote Users Execute Arbitrary Code
- | [1016825] Microsoft Publisher Buffer Overflow in Parsing '.pub' Files Lets Remote Users Execute Arbitrary Code
- | [1016787] Microsoft Word Record Validation Vulnerability Lets Remote Users Execute Arbitrary Code
- | [1016764] Microsoft Internet Explorer (IE) Buffer Overflow in 'daxctle.ocx' ActiveX Control Lets Remote Users Execute Arbitrary Code
- | [1016731] Microsoft Internet Explorer URL Buffer Overflow in Processing HTTP 1.1 Protocol with Compression Lets Remote Users Execute Arbitrary Code
- | [1016720] [Duplicate Entry] Microsoft PowerPoint Unknown Bug May Let Remote Users Execute Arbitrary Code
- | [1016663] Microsoft Internet Explorer Bugs Let Remote Users Obtain Information or Execute Arbitrary Code
- | [1016657] Microsoft Office Buffer Overflow in Processing PowerPoint Records Lets Remote Users Execute Arbitrary Code
- | [1016656] Microsoft Visual Basic for Applications Buffer Overflow Lets Remote Users Execute Arbitrary Code
- | [1016655] Microsoft Management Console Input Validation Hole Permits Remote Code Execution
- | [1016654] Microsoft Outlook Express MHTML Parsing Error Lets Remote Users Execute Arbitrary Code
- | [1016506] Microsoft Internet Security and Acceleration Server HTTP File Exentsion Filter Can Be Bypassed By Remote Users
- | [1016504] Microsoft Works Buffer Overflow in Processing Spreadsheet Files May Let Remote Users Execute Arbitrary Code
- | [1016496] Microsoft PowerPoint 'mso.dll' Buffer Overflow May Let Remote Users Execute Arbitrary Code
- | [1016472] Microsoft Excel Errors in Processing Various Malformed Records Let Remote Users Execute Arbitrary Code
- | [1016470] Microsoft Office PNG and GIF File Buffer Error Lets Remote Users Execute Arbitrary Code
- | [1016469] Microsoft Office String Parsing and Property Bugs Let Remote Users Execute Arbitrary Code
- | [1016468] Microsoft DHCP Client Buffer Overflow Lets Remote Users Execute Arbitrary Code
- | [1016453] Microsoft Office LsCreateLine() Function May Let Remote Users Execute Arbitrary Code
- | [1016434] Microsoft HTML Help Heap Overflow in HHCtrl ActiveX Control May Let Remote Users Execute Arbitrary Code
- | [1016430] Microsoft Excel STYLE Record Bug May Let Remote Users Execute Arbitrary Code
- | [1016388] Microsoft Windows Explorer Lets Remote Users Access Information in Other Domains and Execute HTA Applications
- | [1016344] Microsoft Excel 'Shockwave Flash Object' Lets Remote Users Execute Code Automatically
- | [1016339] Microsoft Windows 'hlink.dll' Buffer Overflow in Processing Hyperlinks Lets Remote Users Execute Arbitrary Code
- | [1016316] Microsoft Excel Memory Validation Flaw May Let Remote Users Cause Arbitrary Code to Be Executed
- | [1016292] Microsoft Windows Buffer Overflow in AOL ART Image Rendering Library Lets Remote Users Execute Arbitrary Code
- | [1016291] Microsoft Internet Explorer Multiple Memory and Access Control Errors Let Remote Users Execute Arbitrary Code
- | [1016290] Microsoft Windows Buffer Overflow in TCP/IP Stack Lets Remote Users Execute Arbitrary Code
- | [1016289] Microsoft RPC Mutual Authentication Bug Lets Remote Users Spoof Other Systems
- | [1016287] Microsoft PowerPoint Buffer Overflow in Processing Malformed Records Lets Remote Users Execute Arbitrary Code
- | [1016286] Microsoft Windows 98 Graphics Rendering Engine Buffer Overflow in Processing WMF Images Lets Remote Users Execute Arbitrary Code
- | [1016283] Microsoft JScript Memory Corruption Bug Lets Remote Users Execute Arbitrary Code
- | [1016280] Microsoft Outlook Web Access Input Validation Hole Permits Cross-Site Scripting Attacks
- | [1016196] F-Secure Anti-Virus for Microsoft Exchange Buffer Overflow in Web Console May Let Remote Users Execute Arbitrary Code
- | [1016130] Microsoft Word Lets Remote Users Cause Arbitrary Code to Be Executed
- | [1016048] Microsoft Exchange Error in Processing iCAL/vCAL Properties Lets Remote Users Execute Arbitrary Code
- | [1016047] Microsoft Distributed Transaction Coordinator Bugs Let Remote Users Deny Service
- | [1016005] Microsoft Outlook Express 'mhtml:' Redirect URL Processing Lets Remote Users Bypass Security Domains
- | [1016001] Microsoft Internet Explorer Bug in Processing Nested OBJECT Tags Lets Remote Users Execute Arbitrary Code
- | [1015900] Microsoft Internet Explorer Parsing and State Errors Let Remote Users Execute Arbitrary Code
- | [1015899] Microsoft Internet Explorer Lets Remote Users Spoof the Address Bar URL
- | [1015898] Microsoft Outlook Express Buffer Overflow in Processing Windows Address Books Lets Remote Users Execute Arbitrary Code
- | [1015897] Microsoft Windows Explorer COM Object Bug Lets Remote Users Execute Arbitrary Code
- | [1015896] Microsoft FrontPage Server Extensions Input Validation Holes Permit Cross-Site Scripting Attacks
- | [1015895] Microsoft SharePoint Team Services Input Validation Holes Permit Cross-Site Scripting Attacks
- | [1015894] Microsoft Data Access Components RDS.Dataspace Access Control Bug Lets Remote Users Execute Arbitrary Code
- | [1015892] Microsoft Internet Explorer Popup Window Object Bugs Let Remote Users Execute Scripting Code in Arbitrary Domains
- | [1015855] Microsoft Office Array Index Boundary Error Lets Remote Users Execute Arbitrary Code
- | [1015825] Microsoft ASP.NET Incorrect COM Component Reference Lets Remote Users Deny Service
- | [1015812] Microsoft Internet Explorer createTextRange() Memory Error Lets Remote Users Execute Arbitrary Code
- | [1015800] (Vendor Issues Fix) Microsoft Internet Explorer (IE) Lets Remote Users Cause HTA Files to Be Executed
- | [1015794] (Vendor Issues Fix) Microsoft Internet Explorer 'mshtml.dll' Bug in Processing Multiple Action Handlers Lets Remote Users Deny Service
- | [1015766] Microsoft Office and Excel Buffer Overflows Let Remote Users Execute Arbitrary Code
- | [1015765] Microsoft Windows Services Have Unsafe Default ACLs That Let Remote Authenticated Users Gain Elevated Privileges
- | [1015720] Microsoft Internet Explorer Modal Security Dialog Race Condition May Let Remote Users Install Code or Obtain Information
- | [1015632] Microsoft PowerPoint May Let Users Access Contents of the Temporary Internet Files Folder
- | [1015631] Microsoft Office Korean Input Method Editor Lets Local Users Gain Elevated Privileges
- | [1015630] Microsoft Windows Web Client Buffer Overflow Lets Remote Authenticated Users Execute Arbitrary Code
- | [1015629] Microsoft Windows IGMP Processing Bug Lets Remote Users Deny Service
- | [1015595] Microsoft Windows UPnP/NetBT/SCardSvr/SSDP Services May Be Incorrectly Configured By 3rd Party Applications, Allowing Local Users to Gain Elevated Privileges
- | [1015585] Microsoft HTML Help Workshop Buffer Overflow in Processing .hhp Files Lets Remote User Execute Arbitrary Code
- | [1015559] Microsoft Internet Explorer Shockwave Flash Scripting Bug Lets Remote Users Deny Service
- | [1015489] Microsoft Wireless Network Connection Software May Broadcast Ad-Hoc SSID Information in Certain Cases
- | [1015461] Microsoft Outlook Buffer Overflow in Processing TNEF Messages Lets Remote Users Execute Arbitrary Code
- | [1015460] Microsoft Exchange Buffer Overflow in Processing TNEF Messages Lets Remote Users Execute Arbitrary Code
- | [1015459] Microsoft Windows Embedded Web Fonts Buffer Overflow Lets Remote Users Execute Arbitrary Code
- | [1015453] Microsoft Windows Graphics Rendering Engine WMF File Memory Access Error Lets Remote Users Execute Arbitrary Code
- | [1015416] Microsoft Windows Unspecified WMF Rendering Bug Lets Remote Users Execute Arbitrary Code
- | [1015350] Microsoft Internet Explorer Bug in Using HTTPS Proxies May Disclose Web URLs to Remote Users
- | [1015349] Microsoft Windows Internet Explorer May Let Remote Users Obfuscate the Download Dialog Box
- | [1015348] Microsoft Internet Explorer Bug in Instantiating COM Objects May Let Remote Users Execute Arbitrary Code
- | [1015347] Microsoft Windows 2000 Kernel APC Queue Bug Lets Local Users Gain Elevated Privileges
- | [1015333] Microsoft Excel Unspecified Stack Overflow May Let Remote Users Cause Arbitrary Code to Be Executed
- | [1015251] Microsoft Internet Explorer Bug in Processing Mismatched Document Object Model Objects May Let Remote Users Execute Arbitrary Code
- | [1015233] Microsoft Windows RPC Service May Let Remote Users Deny Service
- | [1015226] Microsoft AntiSpyware Improper CreateProcess() Call Lets Local Users Execute Arbitrary Code
- | [1015168] Microsoft Windows Buffer Overflows in Graphics Rendering Engine Lets Remote Users Execute Arbitrary Code
- | [1015143] F-Secure Anti-Virus for Microsoft Exchange Web Console May Disclose Files to Remote Users
- | [1015101] Microsoft Internet Explorer J2SE Runtime Environment Bug Lets Remote Users Crash the Target User's Browser
- | [1015044] Microsoft Windows Multiple COM Objects Let Remote Users Execute Arbitrary Code
- | [1015043] Microsoft Network Connection Manager Lets Remote Users Deny Service
- | [1015042] Microsoft Windows Plug and Play Buffer Overflow Lets Remote Users Execute Arbitrary Code
- | [1015041] Microsoft Client Service for NetWare Buffer Overflow Lets Remote Users Execute Arbitrary Code
- | [1015040] Microsoft Windows Shell Bugs in Processing '.lnk' Files and in Web View Preview Mode Lets Remote Users Execute Arbitrary Code
- | [1015039] Microsoft Windows Buffer Overflow in Collaboration Data Objects Lets Remote Users Execute Arbitrary Code
- | [1015038] Microsoft Exchange Buffer Overflow in Collaboration Data Objects Lets Remote Users Execute Arbitrary Code
- | [1015037] Microsoft Windows Buffer Overflows in MSDTC and COM+ Let Remote Users Execute Arbitrary Code and Local User Gain Elevated Privileges
- | [1015036] Microsoft Windows FTP Client Input Validation Hole Lets Remote Servers Create/Overwrite Files on the Target User's System
- | [1015034] Microsoft DirectX DirectShow Buffer Overflow Lets Remote Users Execute Arbitrary Code
- | [1014829] Microsoft Windows Firewall User Interface May Not Properly Display Exception Rules
- | [1014809] Microsoft Internet Explorer Unspecified Bug May Permit Remote Code Execution
- | [1014727] Microsoft 'msdds.dll' COM Object Lets Remote Users Execute Arbitrary Code
- | [1014643] Microsoft Internet Explorer COM Object Instantiation Bug May Let Remote Users Execute Arbitrary Code
- | [1014642] Microsoft Windows Kerberos and PKINIT Vulnerabilities Allow Denial of Service, Information Disclosure, and Spoofing
- | [1014641] Microsoft Internet Explorer Web Folder URL Validation Bug Lets Remote Users Execute Scripting Code in an Arbitrary Security Domain
- | [1014640] Microsoft Windows Plug and Play Stack Overflow Lets Remote Users Execute Arbitrary Code
- | [1014639] Microsoft Windows Telephony Service Remote Code Execution or Local Privilege Escalation
- | [1014638] Microsoft Windows Print Spooler Service Buffer Overflow Lets Remote Users Execute Arbitrary Code
- | [1014501] Hosting Controller 'IISActions.asp' Script Lets Remote Authenticated Users Add Domains/Subdomains
- | [1014500] Microsoft Internet Explorer (IE) JPEG Rendering Bugs Let Remote Users Deny Service or Execute Arbitrary Code
- | [1014498] Microsoft Windows Remote Desktop Protocol Bug Lets Remote Users Deny Service
- | [1014458] Microsoft Office Buffer Overflow in Parsing Fonts Lets Remote Users Cause Arbitrary Code to Be Executed
- | [1014457] Microsoft Microsoft Color Management Module Lets Remote Users Execute Arbitrary Code
- | [1014417] Microsoft Windows Named Pipe NULL Session Bugs in svcctl and eventlog RPC Interfaces Disclose Information to Remote Users
- | [1014364] Microsoft Internet Information Server May Allow Remote Users to Conduct HTTP Response Smuggling Attacks
- | [1014356] Microsoft ISA Server May Accept HTTP Authentication Even When SSL Is Required
- | [1014352] Microsoft Front Page May Crash When Editing a Specially Crafted Web Page
- | [1014329] Microsoft Internet Explorer 'javaprxy.dll' COM Object Exception Handling Lets Remote Users Execute Arbitrary Code
- | [1014261] Microsoft Internet Explorer Lets Remote Users Spoof Javascript Dialog Boxes
- | [1014201] Microsoft Internet Explorer Buffer Overflow in Rendering PNG Images Lets Remote Users Execute Arbitrary Code
- | [1014200] Microsoft Outlook Express Buffer Overflow in NNTP Response Parser Lets Remote Users Execute Arbitrary Code
- | [1014199] Microsoft Outlook Web Access Input Validation Hole in IMG Tags Permits Cross-Site Scripting Attacks
- | [1014198] Microsoft Windows Buffer Overflow in Processing Server Message Block Packets Lets Remote Users Execute Arbitrary Code
- | [1014197] Microsoft Agent Lets Remote Users Spoof Security Dialog Box Contents
- | [1014196] Microsoft Windows Buffer Overflow in Web Client Service Lets Remote Authenticated Users Execute Arbitrary Code
- | [1014195] Microsoft HTML Help Input Validation Flaw Lets Remote Users Execute Arbitrary Code
- | [1014194] Microsoft Step-by-Step Interactive Training Bookmark Link File Validation Flaw Lets Remote Users Execute Arbitrary Code
- | [1014193] Microsoft Internet Security and Acceleration Server Bugs Let Remote Users Poison the Cache and Establish NetBIOS Connections
- | [1014174] Microsoft Internet Explorer Lets Remote Users Obfuscate Scripting Code
- | [1014113] Microsoft ISA Server in SecureNAT Configuration Can Be Crashed By Remote Users
- | [1014050] Computer Associates eTrust Antivirus Integer Overflow in Processing Microsoft OLE Data Lets Remote Users Execute Arbitrary Code
- | [1013996] Microsoft ASP.NET May Disclose System Information to Remote Users in Certain Cases
- | [1013761] Microsoft Windows Explorer 'webvw.dll' Input Validation Error Lets Remote Users Execute Arbitrary Scripting Code
- | [1013724] RSA Authentication Agent for Web for IIS Input Validation Bug Lets Remote Users Conduct Cross-Site Scripting Attacks
- | [1013692] Microsoft Internet Explorer Buffer Overflows in DHTML, URL Parsing, and Content Advisor Let Remote Users Execute Arbitrary Code
- | [1013691] Microsoft Message Queuing Buffer Overflow Lets Remote Users Execute Arbitrary Code
- | [1013689] Microsoft Windows Shell MSHTA Lets Remote Users Code Execute Arbitrary Scripting Code
- | [1013688] Microsoft Windows Kernel and Font Buffer Overflows Let Local Users Deny Service or Obtain System Privileges
- | [1013687] Microsoft Exchange Heap Overlow in Processing Extended SMTP Verb Lets Remote Users Execute Arbitrary Code
- | [1013686] Microsoft Windows TCP, IP, and ICMP Processing Errors Let Remote Users Deny Service and Execute Arbitrary Code
- | [1013684] Microsoft Word Unspecified Buffer Overflow in Processing Documents Lets Remote Users Execute Arbitrary Code
- | [1013669] Microsoft Outlook Web Access 'From' Address Display Lets Remote Users Spoof Origination Addresses
- | [1013668] Microsoft Outlook 'From' Address Display Lets Remote Users Spoof Origination Addresses
- | [1013618] Microsoft Jet Database Buffer Overflow in 'msjet40.dll' Lets Remote Users Execute Arbitrary Code
- | [1013583] Microsoft Outlook Connector for IBM Lotus Domino Lets Users Bypass Password Storage Policy
- | [1013552] Microsoft Windows Remote Desktop 'TSShutdn.exe' Lets Remote Authenticated Users Shutdown the System
- | [1013454] Microsoft Office InfoPath 2003 May Disclose System and Authentication Information to Remote Users
- | [1013284] Microsoft Windows 2000 and XP Group Policy Can Be Bypassed By Microsoft Office Applications and By Flash Drives
- | [1013205] Microsoft Internet Explorer Can Be Crashed With URL Containing Special URL Characters
- | [1013126] Microsoft Internet Explorer CDF Scripting Error Lets Remote Users Execute Scripting Code in Arbitrary Domains
- | [1013125] Microsoft Internet Explorer DHTML Method Heap Overflow Lets Remote Users Execute Arbitrary Code
- | [1013124] Microsoft Internet Explorer URL Encoding Error Lets Remote Users Spoof Arbitrary URLs and Execute Scripting Code in Arbitrary Security Zone
- | [1013120] Microsoft Windows OLE Buffer Overflow Lets Remote Users Execute Arbitrary Code and COM Access Flaw Lets Remote Authenticated Users Gain Elevated Privileges
- | [1013119] Microsoft Windows Hyperlink Object Library Lets Remote Users Execute Arbitrary Code
- | [1013117] Microsoft Windows License Logging Service Lets Remote Users Execute Arbitrary Code
- | [1013115] Microsoft Windows Media Player Buffer Overflow in Processing PNG Files Lets Remote Users Execute Arbitrary Code
- | [1013114] Microsoft Windows SMB Lets Remote Users Execute Arbitrary Code
- | [1013112] Microsoft Windows XP Named Pipe Validation Error Lets Remote Users Obtain Information
- | [1013111] Microsoft SharePoint Services Redirection Query Input Validation Hole Lets Remote Users Conduct Cross-Site Scripting Attacks
- | [1013110] Microsoft Office XP Buffer Overflow in Processing URLs Lets Remote Users Execute Arbitrary Code
- | [1013086] Microsoft Outlook Web Access 'owalogon.asp' Lets Remote Users Redirect Login Requests
- | [1012891] Microsoft IE Windows XP SP2 File Download Security Can Be Bypassed With Dynamic IFRAME Tag
- | [1012836] Microsoft HTML Help Active Control Cross-Domain Error Lets Remote Users Execute Arbitrary Commands
- | [1012835] Microsoft Cursor and Icon Validation Error Lets Remote Users Execute Arbitrary Code
- | [1012684] Microsoft Windows LoadImage API Buffer Overflow Lets Remote Users Execute Arbitrary Code
- | [1012683] Microsoft Windows ANI File Parsing Errors Let Remote Users Deny Service
- | [1012682] Microsoft Windows Help System Buffer Overflows in Processing Phrase Compressed Help Files Lets Remote Users Execute Arbitrary Code
- | [1012626] Microsoft Windows Media Player setItemInfo Lets Remote Users Execute Arbitrary Code
- | [1012584] Microsoft IE dhtmled.ocx Lets Remote Users Execute Cross-Domain Scripting Attacks
- | [1012518] Microsoft HyperTerminal Buffer Overflow Lets Remote Users Execute Arbitrary Code
- | [1012517] Microsoft WINS Buffer Overflow in Name Value Lets Remote Users Execute Arbitrary Code
- | [1012515] Microsoft Windows NT 4.0 Buffer Overflows in the Logging and Processing of DHCP Packets May Let Remote Users Execute Arbitrary Code
- | [1012514] Microsoft WordPad Error in Converting Tables/Fonts Lets Remote Users Execute Arbitrary Code
- | [1012513] Microsoft Windows Kernel Buffer Overflow in Processing Local Procedure Call Messages Lets Local Users Gain System Privileges
- | [1012512] Microsoft LSASS Bug in Validating Identity Tokens Lets Local Users Gain Elevated Privileges
- | [1012458] Microsoft Internet Explorer Lets Remote Users Inject Content into Open Windows
- | [1012444] Microsoft Internet Explorer Input Validation Error in Processing FTP URLs May Let Remote Users Inject Arbitrary FTP Commands
- | [1012435] Microsoft Windows Resource Kit Buffer Overflow and Input Validation Holes in 'w3who.dll' May Permit Remote Code Execution and Cross-Site Scripting Attacks
- | [1012341] Microsoft WINS Memory Overwrite Lets Remote Users Execute Arbitary Code
- | [1012288] Microsoft IE Custom 404 Error Message and execCommand SaveAs Lets Remote Users Bypass XP SP2 Download Warning Mechanisms
- | [1012234] Microsoft Internet Explorer on XP SP2 Has Unspecified Flaws That Let Remote Users Bypass File Download Restrictions
- | [1012155] Microsoft Internet Security and Acceleration Server Reverse DNS Caching Bug Lets Remote Users Spoof Web Sites
- | [1012154] Microsoft Proxy Server Reverse DNS Caching Bug Lets Remote Users Spoof Web Sites
- | [1012138] Microsoft IE Discloses Whether Specified Files Exist to Remote Users
- | [1012057] F-Secure Anti-Virus for Microsoft Exchange Lets Remote Users Bypass Anti-Virus Detection With a ZIP Archive
- | [1012049] (Exploit Code Has Been Released) Microsoft Internet Explorer Buffer Overflow in IFRAME/EMBED Tag Processing Lets Remote Users Execute Arbitrary Code
- | [1011987] Microsoft Internet Explorer Lets Remote Users Spoof the Status Bar Address with a Table Within a Link
- | [1011940] Microsoft Remote Desktop on Windows XP Lets Remote Authenticated Users Restart the System
- | [1011895] Microsoft IE for Mac Multi-Window Browsing Errors Let Remote Users Spoof Sites
- | [1011890] Microsoft Outlook May Display Images in Plaintext Only Mode
- | [1011880] Microsoft Windows XP Error in Explorer in Processing WAV Files Lets Remote Users Deny Service
- | [1011859] Microsoft Internet Explorer on Windows XP Fails to Restrict Drag and Drop Operations When Configured to Disable These Operations
- | [1011851] Microsoft IE AnchorClick Behavior and HTML Help Let Remote Users Execute Arbitrary Code
- | [1011735] Microsoft Internet Explorer May Display the Incorrect URL When Loading a Javascript Homepage
- | [1011706] Microsoft Operating System 'asycpict.dll' Lets Remote Users Crash the System
- | [1011678] Microsoft IE MSN 'heartbeat.ocx' Component Has Unspecified Flaw
- | [1011647] Microsoft Windows Shell Buffer Overflows Let Remote Users Execute Arbitrary Code
- | [1011646] Microsoft Program Group Converter Buffer Overflow Lets Remote Users Execute Arbitrary Code
- | [1011645] Microsoft Various Operating System Flaws Lets Remote Users Execute Code and Local Users Gain Elevated Privileges or Deny Service
- | [1011644] Microsoft IE Plug-in Navigation Flaw Lets Remote Users Spoof URLs in the Addresses Bar
- | [1011643] Microsoft IE Double Byte Parsing Flaw Lets Remote Users Spoof URLs in the Addresses Bar
- | [1011642] Microsoft IE SSL Caching Flaw Lets Remote Users Run Scripting Code in the Context of Arbitrary Secure Sites
- | [1011640] Microsoft IE Buffer Overflow in Install Engine Lets Remote Users Execute Arbitrary Code
- | [1011639] Microsoft IE Buffer Overflow in Processing Cascading Style Sheets Lets Remote Users Execute Arbitrary Code
- | [1011637] Microsoft Windows Buffer Overflow in Processing Compressed Folders Lets Remote Users Execute Arbitrary Code
- | [1011636] Microsoft SMTP Service Buffer Overflow in Processing DNS Responses May Let Remote Users Execute Arbitrary Code
- | [1011635] Microsoft Excel Unspecified Flaw Lets Remote Users Execute Arbitrary Code
- | [1011634] Microsoft NetDDE Buffer Overflow Lets Remote Users Execute Arbitrary Code With System Privileges
- | [1011632] Microsoft NT RPC Runtime Library Buffer Overflow Lets Remote Users Deny Service
- | [1011631] Microsoft NNTP Buffer Overflow Lets Remote Users Execute Arbitrary Code With SYSTEM Privileges
- | [1011626] Microsoft Cabarc Directory Traversal Flaw Lets Remote Users Create/Overwrite Files on the Target System
- | [1011565] Microsoft Word Parsing Flaw May Let Remote Users Execute Arbitrary Code
- | [1011563] Microsoft Internet Explorer Lets Remote Users Access XML Documents
- | [1011559] Microsoft .NET Forms Authentication Can Be Bypassed By Remote Users
- | [1011434] Microsoft SQL Server Can Be Crashed By Remote Users Sending a Specially Crafted Large Buffer
- | [1011332] Microsoft Internet Explorer Bug in Setting Cookies in Certain Domains May Let Remote Users Conduct Session Fixation Attacks
- | [1011253] Microsoft GDI+ Buffer Overflow in Processing JPEG Images Lets Remote Users Execute Arbitrary Code
- | [1011252] Microsoft Works Suite Buffer Overflow in WordPerfect Converter Lets Remote Users Execute Arbitrary Code
- | [1011251] Microsoft Publisher Buffer Overflow in WordPerfect Converter Lets Remote Users Execute Arbitrary Code
- | [1011250] Microsoft FrontPage Buffer Overflow in WordPerfect Converter Lets Remote Users Execute Arbitrary Code
- | [1011249] Microsoft Office Buffer Overflow in WordPerfect Converter Lets Remote Users Execute Arbitrary Code
- | [1011200] F-Secure Anti-Virus for Microsoft Exchange Input Validation Bug in Content Scanner Server Lets Remote Users Deny Service
- | [1011141] HP Systems Insight Manager May Not Let Users Login After Applying a Microsoft Security Patch
- | [1011067] Microsoft Outlook Express May Disclose 'bcc:' Recipient Addresses
- | [1011043] Microsoft Internet Explorer Local File IFRAME Error Response Lets Remote Users Determine if Files or Directories Exist
- | [1010996] Microsoft Windows XP SP2 Local Computer Scripting Restrictions Can Be Bypassed With a Specially Crafted MHT File
- | [1010992] Microsoft Internet Security and Acceleration Server Does Not Block FTP Bounce Attacks
- | [1010959] Microsoft Windows Explorer (in XP SP2) May Fail to Warn Users When Executing Untrusted Files
- | [1010957] Microsoft Internet Explorer Unregistered Protocol State Error Lets Remote Users Spoof Location Bar
- | [1010916] Microsoft Outlook Web Access Input Validation Hole in Redirection Query Permits Cross-Site Scripting Attacks
- | [1010827] Microsoft Internet Explorer Error in 'mshtml.dll' in Processing GIF Files Lets Remote Users Crash the Browser
- | [1010713] Microsoft Systems Management Server (SMS) Client Can Be Crashed By Remote Users
- | [1010694] Microsoft IE Lets Remote Users Spoof Filenames Using CLSIDs
- | [1010693] Microsoft Internet Explorer 'shell:' Protocol Lets Remote Users Execute Arbitrary Scripting Code in the Local Zone
- | [1010690] Microsoft HTML Help Input Validation Error Lets Remote Users Execute Arbitrary Code
- | [1010688] Microsoft Windows Task Scheduler Buffer Overflow Lets Remote Users Execute Arbitrary Code
- | [1010687] Microsoft Windows 2000/NT POSIX Subsystem Buffer Overflow Lets Local Users Gain Elevated Privileges
- | [1010686] Microsoft Utility Manager Permits Local Applications to Run With Elevated Privileges
- | [1010683] Microsoft Internet Explorer Same Name Javascript Bug Lets Remote Users Execute Arbitrary Javascript in the Domain of an Arbitrary Site
- | [1010679] Microsoft Internet Explorer Access Control Flaw in popup.show() Lets Remote Users Execute Mouse-Click Actions
- | [1010673] Microsoft Internet Explorer Can Be Crashed By Remote Users With Large Text Files
- | [1010550] Microsoft MN-500 Wireless Base Station Lets Remote Users Deny Administrative Access
- | [1010491] Microsoft Internet Explorer Crashes When Saving Files With Special Character Strings
- | [1010482] Microsoft Internet Explorer '%2F' URL Parsing Error Lets Remote Users Spoof Sites in the Trusted Zone
- | [1010479] (US-CERT Issues Advisory) Microsoft Internet Explorer Cross-Domain Redirect Hole Lets Remote Users Execute Arbitrary Code
- | [1010427] Microsoft DirectX DirectPlay Input Validation Error Lets Remote Users Crash the Application
- | [1010352] Microsoft Windows 2000 Domains With Eight Characters May Let Remote Users With Expired Passwords Login
- | [1010314] Microsoft Windows IPSec Filtering Can Be Bypassed By Remote Users
- | [1010189] Microsoft Outlook 2003 Scripting Restrictions Can Be Bypassed By Remote Users
- | [1010175] Microsoft Visual Basic Buffer Overflow May Let Local Users Gain Elevated Privileges
- | [1010166] Microsoft Outlook Express Mail Troubleshooting Function May Disclose SMTP Password to Local Users
- | [1010165] Microsoft Internet Explorer Image Map URL Display Error Lets Remote Users Spoof URLs
- | [1010157] Microsoft Internet Explorer showHelp Path Search Lets Remote Users Load Existing Local CHM Files
- | [1010125] Microsoft Outlook 2003 Lets Remote Users Send E-mail to Cause the Recipient's Client to Contact a Remote Server
- | [1010119] Microsoft Help and Support Center HCP URL Validation Error May Let Remote Users Execute Arbitrary Code If User Interactions Occur
- | [1010092] Microsoft Internet Explorer 'file://' URL Processing Flaw Lets Remote Users Damage the Registry
- | [1010009] Microsoft Internet Explorer SSL Icon Error May Let Remote Users Impersonate Secure Web Sites
- | [1009940] Microsoft Windows Explorer Buffer Overflow in Processing SMB Share Names Lets Remote Users Execute Arbitrary Code
- | [1009939] Microsoft Internet Explorer Buffer Overflow in Processing SMB Share Names Lets Remote Users Execute Arbitrary Code
- | [1009778] Microsoft H.323 Buffer Overflow Lets Remote Users Execute Arbitrary Code
- | [1009777] Microsoft SSL Library Input Validation Error Lets Remote Users Crash the Service
- | [1009776] Microsoft Windows Kernel Local Descriptor Table Flaw Lets Local Users Gain Elevated Privileges
- | [1009771] Microsoft Windows Negotiate Security Software Provider (SSP) Buffer Overflow Lets Remote and Local Users Execute Arbitrary Code
- | [1009770] Microsoft Windows Management Interface Provider Lets Local Users Gain Elevated Privileges
- | [1009769] Microsoft Utility Manager Lets Local Users Run Applications With Elevated Privileges
- | [1009768] Microsoft Winlogon Buffer Overflow Lets Certain Remote Users Execute Arbitrary Code
- | [1009767] Microsoft Windows 2000 Domain Controller LDAP Flaw May Let Remote Users Restart the Authentication Service
- | [1009762] Microsoft Windows COM Internet Services and RPC over HTTP Can Be Crashed By Remote Users
- | [1009761] Microsoft Windows COM Object Identifier Creation Flaw May Let Remote Users Cause Applications to Open Network Ports
- | [1009760] Microsoft Virtual DOS Machine (VDM) Lets Local Users Gain Elevated Privileges
- | [1009758] Microsoft Windows RCP Memory Leak Lets Remote Users Deny Service
- | [1009757] Microsoft Jet Database Engine 'msjet40.dll' Buffer Overflow Lets Remote Users Execute Arbitrary Code
- | [1009754] Microsoft ASN.1 Library (msasn1.dll) Double-Free Memory Allocation Error May Let Remote Users Execute Arbitrary Code
- | [1009753] Microsoft SSL Library PCT Buffer Overflow Lets Remote Users Execute Arbitrary Code
- | [1009752] Microsoft Help and Support Center Input Validation Flaw Lets Remote Users Execute Arbitrary Code in the My Computer Zone
- | [1009751] Microsoft LSASS Service Buffer Overflow Lets Remote Users Execute Arbitrary Code With SYSTEM Privileges
- | [1009746] Microsoft Internet Explorer Bitmap Memory Allocation Error Lets Remote Users Cause All Available Memory to Be Consumed
- | [1009743] Microsoft Outlook Express Can Be Crashed By Remote Users With Specially Crafted EML File
- | [1009739] Microsoft Internet Explorer Javascript OLE Object Lets Remote Users Automatically Print Without Authorization
- | [1009690] Microsoft Internet Explorer Security Domain Flaw in Accessing CHM Files Lets Remote Users Execute Arbitrary Code
- | [1009673] Microsoft Windows XP 'mswebdvd.dll' Buffer Overflow Lets Remote Users Deny Service
- | [1009666] Microsoft SharePoint Portal Server Input Validation Holes Permit Cross-Site Scripting Attacks
- | [1009604] Microsoft Internet Explorer Does Not Correctly Display Links With Embedded FORM Data
- | [1009603] Microsoft Outlook Express Does Not Correctly Display Links With Embedded FORM Data
- | [1009546] Microsoft Operating Systems Have Unspecified Flaw That Yields Kernel Level Access to Local Users
- | [1009361] Microsoft Internet Explorer Cookie Path Restrictions Can Be Bypassed By Remote Servers
- | [1009360] Microsoft MSN Messenger May Disclose Known Files to Remote Users
- | [1009359] Microsoft Windows Media Services Can Be Crashed By Remote Users
- | [1009358] Microsoft Office XP 'mailto' URL Parsing Bug Lets Remote Users Execute Arbitrary Code in the Local Computer Domain
- | [1009357] Microsoft Outlook 'mailto' URL Parsing Bug Lets Remote Users Execute Arbitrary Code in the Local Computer Domain
- | [1009243] Microsoft Internet Explorer (IE) May Leak Keystrokes Across Frames
- | [1009181] Microsoft Windows Explorer Heap Overflow in Processing '.emf' Files Permits Code Execution
- | [1009067] Microsoft Internet Explorer Integer Overflow in Processing Bitmap Files Lets Remote Users Execute Arbitrary Code
- | [1009009] Microsoft Virtual PC for Mac Temporary File Flaw Lets Local Users Gain Root Privileges
- | [1009008] Microsoft Windows Internet Naming Service (WINS) Length Validation Flaw Lets Remote Users Deny Service
- | [1009007] Microsoft ASN.1 Library Heap Overflows Let Remote Users Execute Arbitrary Code With SYSTEM Privileges
- | [1008901] Microsoft Internet Explorer Travel Log Input Validation Flaw Lets Remote Users Run Arbitrary Scripting Code in the Local Computer Domain
- | [1008699] Microsoft Windows Buffer Overflow in MDAC Lets Remote Users Execute Arbitrary Code
- | [1008698] Microsoft Internet Security and Acceleration Server H.323 Buffer Overflow Lets Remote Users Execute Arbitrary Code
- | [1008586] Microsoft Office Security Features Can Be Bypassed
- | [1008583] Microsoft Internet Explorer Flaw in Processing '.lnk' Shortcuts Lets Remote Users Execute Arbitrary Code
- | [1008578] Microsoft Internet Explorer showHelp() '\..\' Directory Traversal Flaw Lets Remote Users Execute Files on the Target System
- | [1008558] Microsoft Internet Explorer Trusted Domain Default Settings Facilitate Silent Installation of Executables
- | [1008554] Microsoft IE for Mac May Disclose Sensitive Information in Secure URLs to Remote Sites via HTTP Referer Field
- | [1008510] Openwares.org 'Microsoft IE Security Patch' URL Buffer Overflow Lets Remote Users Execute Arbitrary Code
- | [1008428] Microsoft ASP.NET Web Services XML Parsing Lets Remote Users Consume CPU Resources With SOAP Requests
- | [1008425] Microsoft IE Does Not Properly Display Some URLs
- | [1008324] Microsoft Exchange 2003 With Outlook Web Access and Windows SharePoint Services May Grant Incorrect E-mail Account Access to Remote Authenticated Users
- | [1008293] Microsoft Internet Explorer Invalid ContentType May Disclose Cache Directory Location to Remote Users
- | [1008292] Microsoft Internet Explorer MHT Redirect Flaws Let Remote Users Execute Arbitrary Code
- | [1008245] Microsoft SharePoint May Let Remote Users Access Protected Pages Without Authenticating
- | [1008151] Microsoft Works Macro Name Length Buffer Overflow Lets Remote Users Execute Arbitrary Code
- | [1008150] Microsoft Word Macro Name Length Buffer Overflow Lets Remote Users Execute Arbitrary Code
- | [1008149] Microsoft Excel Macro Security Flaw Lets Remote Users Execute Arbitrary Macro Codes
- | [1008148] Microsoft SharePoint Team Services Buffer Overflow May Let Remote Users Execute Arbitrary Code
- | [1008147] Microsoft FrontPage Server Extensions Buffer Overflow May Let Remote Users Execute Arbitrary Code
- | [1008146] Microsoft Windows Workstation Service (wkssvc.dll) Buffer Overflow Lets Remote Users Execute Arbitrary Code with System Privileges
- | [1008053] Microsoft Internet Explorer IFRAME Refresh Lets Remote HTML Access Local Files
- | [1008000] Microsoft Internet Explorer Lets Remote Users Execute Arbitrary Files in the Local Zone Using a Specially Crafted IFRAME/Location Header
- | [1007937] Microsoft Exchange Server Buffer Overflow in Processing Extended Verb Requests May Let Remote Users Execute Arbitrary Code
- | [1007936] Microsoft Outlook Web Access Input Validation Flaw in 'Compose New Message' Permits Remote Cross-Site Scripting Attacks
- | [1007935] Microsoft ListBox and ComboBox 'user32.dll' Buffer Overflow May Allow Local Users to Gain Elevated Privileges
- | [1007934] Microsoft Help and Support Center HCP Buffer Overflow Lets Remote and Local Users Execute Arbitrary Code With Local Computer Privileges
- | [1007933] Microsoft Windows Messenger Service Buffer Overflow Lets Remote Users Execute Arbitrary Code With Local System Privileges
- | [1007932] Microsoft Windows Troubleshooter ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code
- | [1007931] Microsoft Authenticode Low Memory Flaw May Let Remote Users Execute Arbitrary Code
- | [1007922] Microsoft Windows RPC Multi-threaded Race Condition Lets Remote Users Crash the Service or Execute Arbitrary Code
- | [1007905] Microsoft Windows Server 2003 Shell Folders Can Be Referenced Using Directory Traversal Characters
- | [1007874] Microsoft Windows OS PostThreadMessage() API Permits Local Users to Terminate Processes That Have Message Queues
- | [1007750] Microsoft BizTalk Server Default Directory Permissions May Let Remote Users Deny Service
- | [1007689] Microsoft Internet Explorer Media Sidebar Flaw Lets Remote Users Execute Arbitrary Code on the System
- | [1007687] Microsoft Internet Explorer Various Cross-Domain Flaws Permit Remote Scripting in Arbitrary Domains
- | [1007670] Microsoft Windows Remote Procedure Call (RPC) DCOM Activation Buffer Overflows Let Remote Users Execute Arbitrary Code
- | [1007651] RealSecure Server Sensor Unicode Flaw Lets Remote Users Crash the IIS Web Service
- | [1007618] Microsoft Visual Basic for Applications (VBA) in Multiple Microsoft Products Permits Remote Code Execution
- | [1007617] Microsoft Converter for WordPerfect Has Buffer Overflow That Lets Remote Users Execute Arbitrary Code
- | [1007616] Microsoft Word Document Validation Error Lets Macros Run Without Warning
- | [1007615] Microsoft Windows NetBIOS Name Service May Disclose Memory Contents to Remote Users
- | [1007614] Microsoft Access Snapshot Viewer ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code
- | [1007599] Microsoft Outlook May Fail to Delete Outlook Data From the PST File
- | [1007538] Microsoft Internet Explorer Buffer Overflow in CR549.DLL ActiveX Control Permits Remote Code Execution
- | [1007537] Microsoft Internet Explorer Object Tag Flaw Lets Remote Users Execute Arbitrary Code
- | [1007536] Microsoft Internet Explorer Cache Script Flaw Lets Remote Users Execute Code in the My Computer Zone
- | [1007535] Microsoft MDAC Database Component Lets Remote Users Execute Arbitrary Code
- | [1007507] RSA SecurID Interaction With Microsoft URLScan May Disclose URLScan Configuration to Remote Users
- | [1007493] Microsoft Visual Studio Buffer Overflow in 'mciwndx.ocx' May Let Remote Users Execute Arbitrary Code
- | [1007388] Microsoft WebServer Beta for Pocket PC Yields Administrative Access to Remote Users
- | [1007364] IISShield May Fail to Drop a Specific Malformed HTTP Request
- | [1007306] Microsoft Outlook Express Again Executes Scripting Code in Plain Text E-mail Messages
- | [1007281] Microsoft Windows NT File Management Flaw May Let Remote Users Crash Certain Applications
- | [1007280] Microsoft Data/Desktop Engine Named Pipe and LPC Flaws Let Local Users Execute Arbitrary Code
- | [1007279] Microsoft SQL Server Named Pipe and LPC Flaws Let Local Users Execute Arbitrary Code
- | [1007278] Microsoft DirectX Heap Overflow in Loading MIDI Files Lets Remote Users Execute Arbitrary Code
- | [1007265] Microsoft MDAC ODBC Component May Store Database Passwords in Plaintext in the Registry
- | [1007238] Microsoft Outlook Web Access Can Be Crashed By Remote Authenticated Users With an Outlook 2003 Client
- | [1007214] Microsoft Windows XP Shell Buffer Overflow in Processing Folder Display Attributes Permits Remote Code Execution
- | [1007212] Microsoft Windows Remote Procedure Call (RPC) Service Buffer Overflow in Processing DCOM Requests Allows Remote Code Execution
- | [1007206] Microsoft SMTP Service Can Be Crashed By Remote Users Sending Mail With an Invalid FILETIME Header
- | [1007205] Microsoft Exchange Server Can Be Crashed By Remote Users Sending Mail With an Invalid FILETIME Header
- | [1007190] Microsoft Internet Explorer 'Chromeless' Window May Let Remote Users Spoof Various User Interface Characteristics
- | [1007172] Microsoft Jet Database Engine Buffer Overflow May Let Remote Users Execute Arbitrary Code
- | [1007154] Microsoft SMB Buffer Overflow Lets Remote Authenticated Users Execute Arbitrary Code
- | [1007152] Microsoft Windows 2000 Accessibility Utility Manager Lets Local Users Gain Elevated Privileges
- | [1007133] Microsoft Outlook Web Access (OWA) May Disclose The User's OWA Password to Remote Users
- | [1007126] Microsoft Internet Explorer Can By Crashed By Loading 'C:\aux' URL
- | [1007099] Microsoft Windows 2000 ShellExecute() Buffer Overflow May Let Users Execute Arbitrary Code
- | [1007098] Microsoft Commerce Server Discloses SQL Server Password to Local Users
- | [1007094] Microsoft NetMeeting Directory Traversal Flaw Lets Remote Users Execute Arbitrary Code
- | [1007093] Microsoft Active Directory Stack Overflow in 'Lsaas.exe' Lets Remote Users Crash the Windows 2000 Server
- | [1007072] Microsoft Internet Explorer Buffer Overflow in Processing Scripted 'HR' Tags Lets Remote Users Execute Arbitrary Code
- | [1007057] Microsoft Windows Media Player Access Control Flaw Lets Remote Users View, Modify, and Delete Media Library Metadata
- | [1007022] SurfControl for Microsoft ISA Server Discloses Files to Remote Users
- | [1007008] Microsoft Internet Explorer XML Parsing Error Lets Remote Users Conduct Cross-Site Scripting Attacks
- | [1007007] Microsoft Internet Explorer Custom HTTP Error Pages May Let Remote Users Execute Scripts in the Local Computer Zone
- | [1006959] Microsoft Windows Server 2003 Drivers May Leak Information From Memory Via Ethernet Packets Containing TCP Streams
- | [1006924] Microsoft Internet Explorer Input Validation Flaw in Displaying FTP Site Names Lets Remote Users Execute Arbitrary Scripting Code in Arbitrary Domains
- | [1006918] Microsoft Internet Explorer (IE) Object Tag Buffer Overflow Lets Remote Users Execute Arbitrary Code
- | [1006901] Microsoft UrlScan Default Configuration Displays Identifying Characteristics to Remote Users
- | [1006894] iisCART2000 Upload Authentication Error Lets Remote Users Upload and Execute Arbitrary Scripts
- | [1006844] Microsoft Internet Connection Firewall Fails to Block IP Version 6 Protocol
- | [1006829] iisPROTECT Input Validation Hole Lets Remote Users Execute SQL Stored Procedures
- | [1006815] iisPROTECT Lets Remote Users Access Protected Files Using URL Encoding
- | [1006809] Microsoft Outlook Express Lets Remote Users Silently Install Arbitrary Code Using Audio and Media Files
- | [1006808] Microsoft Outlook Express May Be Affected by W32/Palyh@MM Mass-Mailing Worm
- | [1006807] Microsoft Outlook May Be Affected by W32/Palyh@MM Mass-Mailing Worm
- | [1006803] Microsoft Windows Can Be Crashed By Remote Users via Malformed NetMeeting URLs
- | [1006789] Microsoft ISA Server Input Validation Flaw Lets Remote Users Execute Scripting Code in Arbitrary Security Domains
- | [1006774] Microsoft Internet Explorer May Execute Arbitrary Code in the Wrong Security Domain When Processing Large Numbers of Download Requests
- | [1006771] Microsoft Outlook Express Integer Overflow Lets Remote IMAP Servers Cause the Client to Crash
- | [1006748] Microsoft Outlook Express May Be Affected by W32.Fizzer.A@mm Mass-Mailing Worm
- | [1006747] Microsoft Outlook May Be Affected by W32.Fizzer.A@mm Mass-Mailing Worm
- | [1006728] Microsoft .NET Passport Passwords, Including Hotmail Passwords, Can Be Changed By Remote Users
- | [1006696] Microsoft Internet Explorer Web Folder Access Flaw Lets Remote Users Execute Arbitrary Scripting Code in the My Computer Zone
- | [1006691] Microsoft MN-500 Wireless Base Station Backup Configuration File Discloses Administrator Password
- | [1006686] Microsoft BizTalk Server Buffer Overflow Lets Remote Users Execute Arbitrary Code
- | [1006634] Microsoft Internet Explorer Bugs (URLMON.DLL Buffer Overflow, File Upload Control Bypass, Plug-in URL Input Validation Flaw, CSS Modal Dialog Input Validation Flaw) Let Remote Users Execute Arbitrary Code or Access Local Files
- | [1006608] Microsoft NTLM Authentication Protocol Flaw Lets Malicious SMB Servers Gain Access to Systems
- | [1006599] Microsoft REGEDIT.EXE May Let Local Users Gain Elevated Privileges
- | [1006588] Microsoft Windows OS Kernel Messaging Buffer Overflow Lets Local Users Gain Full Control of the System
- | [1006580] Microsoft Windows 2003 'win2k.sys' Printing Bug Lets Users Crash the System
- | [1006534] Microsoft Proxy Service in Proxy Server 2.0 Has Unspecified Flaw That Lets Remote Users Stop Traffic
- | [1006533] Microsoft Firewall Service in ISA Server Has Unspecified Flaw That Lets Remote Users Stop Traffic
- | [1006532] Microsoft Windows VM Input Validation Flaw in ByteCode Verifier Lets Malicious Java Applets Execute Arbitrary Code
- | [1006447] Microsoft Windows Terminal Services RDP Implementation Does Not Validate Server Identity, Allowing Man-in-the-Middle Attacks
- | [1006361] Microsoft ActiveSync Application Can Be Crashed By Remote Users
- | [1006323] Microsoft Windows Buffer Overflow in Windows Script Engine JScript.DLL Lets Remote Users Execute Arbitrary Code
- | [1006322] Microsoft ISA Server DNS Intrusion Detection Flaw Lets Remote Users Block DNS Inbound Requests
- | [1006286] Microsoft Windows 2000/XP PostMessage() API Flaw May Let Local Users Grab Passwords from Local Dialog Boxes
- | [1006280] Protegrity Secure.Data for Microsoft SQL Server 2000 Contains Buffer Oveflows That Let Remote Users Execute Arbitrary Code
- | [1006257] Microsoft Internet Explorer Buffer Overflow in Processing '.MHT' Web Archives Lets Remote Users Execute Arbitrary Code
- | [1006179] Microsoft Windows Me Help and Support Center URL Handler Overflow Lets Remote Users Execute Arbitrary Code
- | [1006169] Microsoft Internet Explorer Vulnerable Codebase Object Lets Remote Users Execute Arbitrary Code
- | [1006148] Microsoft Outlook Express Security Domain Flaw Lets Remote Users Silently Install and Execute Arbitrary Code
- | [1006121] Microsoft Windows 'riched20.DLL' Buffer Overflow May Let Remote Users Crash Applications
- | [1006046] Microsoft Internet Explorer showHelp() Domain Security Flaw Lets Remote Users Execute Commands
- | [1006045] Microsoft Windows XP Redirector Buffer Overflow May Let Local Users Gain System Level Privileges
- | [1006036] Microsoft Internet Explorer May Let Remote Users Read or Write Files Via the dragDrop() Method
- | [1006023] ColdFusion MX Configuration Error When Used With IIS and NT Authentication May Grant Unauthorized Access to Remote Authenticated Users
- | [1005986] Microsoft Windows Terminal Server MSGINA.DLL Flaw Lets Remote Authenticated Users Reboot the Server
- | [1005966] Microsoft Outlook May Fail to Encrypt User E-mail, Disclosing the Contents to Remote Users
- | [1005964] Microsoft Locator Service Buffer Overflow Lets Remote Users Execute Arbitrary Code with System Level Privileges
- | [1005859] Microsoft Windows File Protection Mechanism Weakness in Trusting Code-Signing Certificate Chains Lets Arbitrary Remote Users Sign Code That Will Be Trusted By Windows
- | [1005858] Microsoft Windows File Protection Weakness May Let Local Users Replace Code With Previous Vulnerable Versions Without Detection
- | [1005857] Microsoft Internet Explorer Bug in Loading Multimedia Files May Let Remote Users Execute Arbitrary Scripting Code in Other Domains
- | [1005833] Microsoft Windows XP Shell Buffer Overflow in Processing Audio Files Allows Remote Users to Execute Arbitrary Code
- | [1005799] Microsoft Windows OS Bug in Processing WM_TIMER Messages May Let Local Users Gain Elevated Privileges
- | [1005796] Microsoft SMB Signing Flaw May Let Remote Users With Access to an SMB Session Gain Control of a Network Client
- | [1005761] Microsoft Windows XP Wireless LAN Support May Disclose Access Point Information to Remote Users
- | [1005757] Microsoft Outlook Bug in Processing Malformed E-mail Headers Lets Remote Users Crash the Client
- | [1005747] Microsoft Internet Explorer showModalDialog() Input Validation Flaw Lets Remote Users Execute Arbitary Scripting Code in Any Security Zone
- | [1005699] Microsoft Internet Explorer (IE) Java Class Loader Security Flaw Lets Remote Users Bypass Java Security Restrictions
- | [1005698] Microsoft Java Virtual Machine (VM) Class Loader Security Flaw Lets Remote Users Bypass Java Security Restrictions
- | [1005674] Microsoft Internet Explorer Buffer Overflow in Processing PNG Images Allows Denial of Service Attacks
- | [1005672] Microsoft Internet Explorer MDAC Component Buffer Overflow Allows Remote Users to Execute Arbitrary Code
- | [1005671] Microsoft Data Access Components (MDAC) Buffer Overflow Allows Remote Users to Execute Arbitrary Code
- | [1005627] IISPop EMail Server Can Be Crashed By Remote Users
- | [1005489] Microsoft Outlook Express May Fail to Delete E-mail Messages from Local Storage
- | [1005466] Microsoft Internet Explorer Cached Object Flaw Lets Remote Users Execute Arbitrary Programs on the Target User's Computer
- | [1005455] Microsoft Windows Remote Procedure Call (RPC) Service Null Pointer Dereference Allows Remote Users to Crash the Service
- | [1005454] Microsoft Windows Media Player for Solaris Uses Unsafe Default Permissions
- | [1005436] Microsoft Data Engine/Desktop Engine (MSDE) Bugs Let Remote Authenticated Users Create/Delete/Execute Web Tasks With SQL Server Agent Privileges
- | [1005435] Microsoft SQL Server Bugs Let Remote Authenticated Users Create/Delete/Execute Web Tasks With SQL Server Agent Privileges
- | [1005416] Microsoft Internet Explorer Flaw in WebBrowser Control Document Property Lets Remote Users Run Code in the My Computer Security Zone
- | [1005405] Microsoft Outlook Express Buffer Overflow in Parsing S/MIME Messages Lets Remote Users Execute Arbitrary Code
- | [1005395] Microsoft Content Management Server Input Validation Bug in 'ManualLogin.asp' Allows Cross-Site Scripting Attacks
- | [1005377] Microsoft MSN Hotmail/Passport Login Page May Permit Cookie Stealing Via Cross-Site Scripting Attacks
- | [1005343] Microsoft Windows Help System Bug in Processing Compiled HTML Help Files Lets Remote Users Execute Arbitrary Commands in the Local Computer Security Zone
- | [1005339] Microsoft Services for Unix Interix SDK Bugs May Allow Denial of Service Conditions or May Execute Arbitrary Code
- | [1005338] Microsoft Data/Desktop Engine (MSDE) Buffer Overflow Lets Remote Users Execute Arbitrary Code
- | [1005337] Microsoft SQL Server Buffer Overflow Lets Remote Users Execute Arbitrary Code
- | [1005336] Microsoft Windows Operating System Compressed Folders Allow Arbitrary Files to Be Created
- | [1005335] Microsoft Windows Operating System Compressed Folders Allow Arbitrary Code to Be Executed
- | [1005332] Microsoft Windows Help System Buffer Overflow in 'hhctrl.ocx' Lets Remote Users Execute Arbitrary Code
- | [1005296] Microsoft PPTP Service Buffer Overflow May Let Remote Users Execute Arbitrary Code
- | [1005287] Microsoft FrontPage Server Extensions SmartHTML Interpreter Bugs May Let Remote Users Execute Arbitrary Code with System Privileges
- | [1005256] (Vendor Issues Fix) Microsoft Windows XP Remote Desktop Implementation Bug Lets Remote Users Crash the Operating System
- | [1005254] Microsoft NT, 2000, and XP Operating Systems May Execute a 16-bit Application Even When The File Has No Execute Permissions
- | [1005246] Microsoft Remote Desktop Protocol (RDP) Design Flaw May Disclose Information About the Unencrypted Data to Remote Users and May Let Data Be Modified During Transmission
- | [1005243] Microsoft NetMeeting Remote Desktop Sharing Screen Saver Access Control Flaw Lets Physically Local Users Hijack Remote Sessions
- | [1005242] Microsoft Windows XP Remote Desktop Can Be Crashed By Remote Users Sending a Modified RDP Packet
- | [1005223] (Microsoft Responds) Microsoft Word Document Processing File Include Bug May Let Remote Users Obtain Files From a Target User's System
- | [1005207] Microsoft Outlook Express Can Be Crashed By Remote Users Sending HTML Mail With Long Links Embedded
- | [1005203] Microsoft Internet Explorer Frame Domain Security Bug Lets Remote Users Execute Arbitrary Code in the Local Computer Zone Via Frame URLs
- | [1005200] Microsoft Internet Explorer Implementation Bugs in Java Native Methods May Let Remote Users Execute Arbitrary Code Via Malicious Applets
- | [1005182] Microsoft Internet Explorer URL Decoding Inconsistency May Result in a Web Page Loading in the Incorrect Security Domain
- | [1005177] Microsoft Visual FoxPro Filename Processing Bug Lets Remote Users Create HTML That Will Cause Arbitrary Code to Be Executed When the HTML is Loaded
- | [1005150] Microsoft Windows Operating System Certificate Enrollment ActiveX Control Allows Remote Users to Delete Certificates on a Target User's System
- | [1005128] Microsoft Internet Explorer XML Script Element Redirect Bug Lets Remote Users View XML Files on the Target User's Computer
- | [1005127] Microsoft Visual Studio .NET Web Projects May Disclose the Web Directory Structure to Remote Users
- | [1005123] Microsoft Internet Explorer Buffer Overflow in Unspecified Text Formatting ActiveX Control Lets Remote Users Execute Arbitrary Code
- | [1005120] Microsoft Terminal Services Advanced Client (TSAC) ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code
- | [1005119] Microsoft Operating System SMB Protocol Implementation in the Network
- | [1005112] Microsoft File Transfer Manager ActiveX Control Buffer Overflow May Let Remote Users Execute Arbitrary Code
- | [1005108] Microsoft Windows Media Player Allows Malicious Windows Media Download (.wmd) Files to Silently Create Files in a Known Location and Execute Them
- | [1005075] Microsoft Internet Explorer XMLDSO Java Class Lets Remote HTML Code Access Local Files
- | [1005071] Microsoft DirectX Files Viewer ActiveX Control Has Buffer Overflow That Allows Remote Users to Execute Arbitrary Code
- | [1005070] Microsoft Internet Explorer (IE) Browser Error Message Processing Allows Remote Users to Execute Arbitrary Code on Certain Windows 98 Platforms
- | [1005068] Microsoft NTFS Filesystem in Windows NT and Windows 2000 Has Auditing Hole That Lets Local Users Access Files Without the File Access Being Audited
- | [1005067] Microsoft Desktop Engine (MSDE) Extended Stored Procedures May Let Local Users Execute Commands With Database Administrator Privileges
- | [1005066] Microsoft SQL Server Extended Stored Procedures May Let Local Users Execute Commands With Database Administrator Privileges
- | [1005065] Microsoft Network Connection Manager Could Give a Local User System Level Privileges
- | [1005063] Microsoft Windows XP Help and Support Center Hole Lets Remote Users Create URLs That, When Loaded, Will Delete Arbitrary Files on Your System
- | [1004986] Microsoft Content Management Server Buffer Overflow in Authentication Function May Allow Remote Users to Execute Arbitrary Code With System Level Privileges
- | [1004983] Microsoft Visual C++ Flaw in calloc() and Similar Functions May Result in Buffer Overflows in Applications That Use the Compiler or Runtime Library
- | [1004965] Microsoft Internet Explorer SSL Implementation Flaw in Following Certificate Chains Allows Remote Users to Conduct Man-in-the-Middle Attacks to Obtain Unencrypted Data from the Browser
- | [1004927] Microsoft Terminal Services Can Be Crashed By Remote Users Conducting a TCP SYN Scan in Certain Situations
- | [1004917] Microsoft SQL Server MDAC Function Buffer Overflow May Let Remote Users Execute Arbitrary Code to Gain Full Control Over the Database
- | [1004877] Microsoft Internet Explorer (IE) Web Browser JavaScript 'Same Origin Policy' Flaw Allows Remote Users to Create Malicious JavaScript to Retrieve Web Data from a Victim's Internal Network
- | [1004862] Microsoft Outlook Express Flaw in Parsing XML Using Internet Explorer Allows a Remote User to Silently Deliver and Install an Executable on a Target User's Computer
- | [1004831] Microsoft Data Engine (MSDE) Buffer Overflow in Database Consistency Checker May Let Remote Authenticated Users Execute Arbitrary Code with the Privileges of the Database Service
- | [1004830] Microsoft SQL Server Buffer Overflow in Database Consistency Checker May Let Remote Authenticated Users Execute Arbitrary Code with the Privileges of the Database Service
- | [1004829] Microsoft SQL Server Resolution Service Buffer Overflows Let Remote Users Execute Arbitrary Code with the Privileges of the SQL Service
- | [1004828] Microsoft Exchange Server Buffer Overflow in Processing SMTP EHLO Command Lets Remote Users Execute Arbitrary Code on the Server with System Level Privileges
- | [1004827] Microsoft Metadirectory Services Authentication Flaw May Let Remote Users Modify Data and Obtain Elevated Privileges on the System
- | [1004805] Microsoft Outlook Express (and Possibly Outlook) Has File Attachment Name Bugs That Let Remote Users Send Malicious Mail to Bypass Attachment Type Filters and Modify the Apparent File Name and File Size
- | [1004761] Microsoft Foundation Classes (MFC) Information Server Application Programming Interface (ISAPI) 'mfc42.dll' Contains Buffer Overflows That Can Crash the System or Possibly Allow for the Remote Execution of Arbitrary Code
- | [1004746] Microsoft Internet Explorer Flaw in OBJECT Domain Security Enforcement Lets Remote Users Execute Code in Arbitrary Domains
- | [1004744] Microsoft SQL Server Install Process May Disclose Sensitive Passwords to Local Users
- | [1004739] Microsoft SQL Server Desktop Engine (MSDE) Buffer Overflow and Access Control Bug May Let Remote Authorized Users Execute Code with Elevated Privileges, Possibly Including Local System Privileges
- | [1004738] Microsoft SQL Server Buffer Overflow and Access Control Bug May Let Remote Authorized Users Execute Code with Elevated Privileges, Possibly Including Local System Privileges
- | [1004637] Microsoft Commerce Server Buffer Overflows and Other Flaws Let Remote Users Execute Arbitrary Code with LocalSystem Privileges
- | [1004618] Microsoft Internet Explorer Can Be Crashed By Malicious AVI Object in HTML
- | [1004595] Microsoft Word Documents May Execute Remotely Supplied Macro Code Under Certain Conditions
- | [1004594] Microsoft Excel Spreadsheet May Execute Remotely Supplied Macro Code Within Malicious Documents
- | [1004587] Microsoft SQL Server 2000 Buffer Overflow in OpenDataSource() Function May Let Remote Users Gain SYSTEM Privileges on the Server
- | [1004569] Microsoft Visual Studio .NET Korean Language Version Contains Nimda Virus
- | [1004544] Microsoft SQL Server Buffer Overflow in 'pwdencrypt()' Function May Let Remote Authorized Users Execute Arbitrary Code
- | [1004542] Lumigent Log Explorer Buffer Overflow May Let Remote Users Crash the Microsoft SQL Server Service or Execute Arbitrary Code on the System
- | [1004541] Compaq Insight Manager May Include a Vulnerable Default Configuration of Microsoft MSDE/SQL Server That Allows Remote Users to Execute Commands on the System
- | [1004529] Microsoft Remote Access Service (RAS) Phonebook Buffer Overflow May Let Local Users Execute Arbitrary Code with Local System Privileges
- | [1004528] Microsoft SQLXML Component of Microsoft SQL Server 2000 Contains an Input Validation Flaw in an XML SQL Tag That Allows Cross-Site Scripting Attacks
- | [1004527] Microsoft SQLXML Component of Microsoft SQL Server 2000 Contains a Buffer Overflow That Lets Remote Users Take Full Control of the System
- | [1004518] Microsoft Proxy Server Buffer Overflow in Processing Gopher Protocol Responses Allows Remote Users to Execute Code on the Server to Gain Full Control of the Server
- | [1004517] Microsoft Internet Security and Acceleration Server (ISA) Buffer Overflow in Processing Gopher Protocol Responses Allows Remote Users to Execute Code on the Server to Gain Full Control of the Server
- | [1004486] Microsoft ASP.NET Buffer Overflow in Processing Cookies in StateServer Mode May Let Remote Users Crash the Service or Execute Arbitrary Code on the Server
- | [1004479] Microsoft Internet Explorer May Execute Remotely Supplied Scripting in the My Computer Zone if FTP Folder Viewing is Enabled
- | [1004464] Microsoft Internet Explorer Buffer Overflow in Processing Gopher Protocol Responses Allows Remote Users to Execute Code on the Victim's Computer
- | [1004441] Microsoft Windows Help System Buffer Overflows in 'htctrl.ocx' ActiveX Control May Let Remote Users Execute Arbitrary Code on a Target User's Computer By Sending Malicious HTML
- | [1004436] Microsoft Internet Explorer Allows HTML-Delivered Compiled Help Files to Be Automatically Executed on the Target User's Computer
- | [1004407] Microsoft Exchange 2000 Flaw in Processing a Certain Malformed SMTP Command Allows Remote Users to Deny Service to the Server
- | [1004372] Microsoft Excel Spreadsheet XML Stylesheet ActiveX Object Flaw Lets Remote Users Create Malicious Excel Spreadsheets That May Execute Arbitrary Code When Opened With the XML Stylesheet Option
- | [1004369] Microsoft Active Directory May Have Bug That Allows Remote Users to Crash the Directory
- | [1004361] Microsoft Date Engine (MSDE) Default Configuration Leaves Blank Password for System Administrator Account
- | [1004360] Opty-Way Enterprise Glassworks Management Application Installs Microsoft Data Engine Insecurely, Allowing Remote Users to Execute Commands on the System
- | [1004357] Microsoft Windows Debugging Facility for Windows NT4 and 2000 Has Authentication Hole That Lets Local Users Execute Arbitrary Code with SYSTEM Privileges
- | [1004304] Microsoft Internet Explorer (IE) New Content-Disposition Bugs May Let Remote Users Execute Arbitrary Code on the Victim's Computer
- | [1004300] Microsoft Internet Explorer (IE) Zone Spoofing Hole Lets Remote Users Create HTML That, When Loaded, May Run in a Less-Secure IE Security Zone
- | [1004290] Microsoft Internet Explorer Bugs in 'BGSOUND' and 'IFRAME' Tags Let Remote Users Create HTML That Will Cause Denial of Service Conditions or Will Access Special DOS Devices
- | [1004251] Microsoft Exchange Instant Messenger ActiveX Control Has 'ResDLL' Parameter Buffer Overflow That Lets Remote Users Execute Arbitrary Code
- | [1004250] Microsoft MSN Messenger Includes an ActiveX Control That Has 'ResDLL' Parameter Buffer Overflow That Lets Remote Users Execute Arbitrary Code
- | [1004249] Microsoft MSN Chat Control ActiveX Control Has 'ResDLL' Parameter Buffer Overflow That Lets Remote Users Execute Arbitrary Code
- | [1004236] L.Y.S.I.A.S. Lidik Web Server for Microsoft Windows Systems Lets Remote Users View Files Located Anywhere on the Partition
- | [1004229] Microsoft Office 'Word Mail Merge' Feature Allows Remote Users to Cause Arbitrary Programs to Be Executed on the Target User's Computer
- | [1004226] Microsoft MSN Messenger Instant Messaging Client Malformed Header Processing Flaw Lets Remote Users Crash the Client
- | [1004197] Microsoft Internet Explorer Can Be Crashed By Incorrectly Sized XBM Graphics Files
- | [1004157] Microsoft Outlook Weak Security Enforcement When Editing Messages with Microsoft Word Lets Remote Users Send Malicious Code to Outlook Recipients That Will Be Executed When Forwarded or Replied To
- | [1004146] Microsoft Internet Explorer Browser Can Be Crashed By Remote HTML Containing Malicious Image Tags That Cause Infinite Processing Loops
- | [1004130] Microsoft MSN Messenger Instant Messaging Client Discloses Buddy List to Local Users
- | [1004121] Microsoft Internet Explorer Web Browser Can Be Crashed By Remote Users With OLE OBJECT Element Dependency Loops
- | [1004109] Microsoft Distributed Transaction Coordinator Can Be Crashed By Remote Users Sending Malformed Packets
- | [1004090] Microsoft Back Office Web Administration Authentication Mechanism Can Be Bypassed By Remote Users
- | [1004083] Microsoft Windows 2000 'microsoft-ds' Service Flaw Allows Remote Users to Create Denial of Service Conditions By Sending Malformed Packets
- | [1004079] Microsoft Internet Explorer (IE) 'dialogArguments' Flaw Lets Remote Users Conduct Cross-Site Scripting Attacks Against IE Users
- | [1004051] Microsoft Outlook Express for Mac OS Has Buffer Overflow in Processing the 'file://' URL That Allows Remote Users to Cause Arbitrary Code to Be Executed
- | [1004050] Microsoft Office for Mac OS Has Buffer Overflow in Processing the 'file://' URL That Allows Remote Users to Cause Arbitrary Code to Be Executed
- | [1004049] Microsoft Internet Explorer for Mac OS Has Buffer Overflow in Processing the 'file://' URL That Allows Remote Users to Cause Arbitrary Code to Be Executed
- | [1004048] Microsoft Word Object Creation Flaw Lets Remote Users Create ActiveX That Will Consume Memory on the Victim's Computer
- | [1004022] Microsoft Windows 2000 Group Policy Object Enforcement Can Be Circumvented if User License Limits are Exceeded
- | [1004014] Microsoft Internet Information Server ASP HTTP Header Processing Buffer Overflow Lets Remote Users Execute Arbitrary Code on the Server
- | [1004008] Microsoft Internet Information Server Comes With Code That Allows Remote Users to Conduct Cross-Site Scripting Attacks
- | [1004005] Microsoft Internet Information Server Buffer Overflow in Chunked Encoding Mechanism Lets Remote Users Run Arbitrary Code on the Server
- | [1004002] Microsoft Office Web Components Let Remote Users Determine if Specified Files Exist on Another User's Host
- | [1004001] Microsoft Office Web Components Let Remote Users Gain Full Read and Write Control Over Another User's Clipboard, Even if Clipboard Access Via Scripts is Disabled
- | [1004000] Microsoft Office Web Components Let Remote Users Write Code to Run in the Victim's Local Security Domain and Access Local or Remote Files
- | [1003999] Microsoft Office Web Components in Office XP Lets Remote Users Cause Malicious Scripting to Be Executed By Another User's Browser Even If Scripting is Disabled
- | [1003975] Microsoft Windows NT, 2000, and XP Kernel Buffer Overflow in Processing Multiple UNC Provider (MUP) Requests May Let Local Users Obtain System Level Privileges
- | [1003949] Microsoft Windows 2000 DCOM Implementation Flaw May Disclose Memory Contents to Remote Users
- | [1003948] Microsoft Internet Explorer Cascading Style Sheets (CSS) Invalid Attribute Bug Lets Remote Users Read Portions of Files on the Victim's Computer
- | [1003932] Microsoft Office XP Active Content Bug Lets Remote Users Cause Code to Be Executed on an Office User's Computer
- | [1003922] Microsoft Outlook Web Access With SecurID Authentication May Allow Remote Users to Avoid the SecurID Authentication in Certain Cases
- | [1003915] Microsoft Internet Explorer Browser Security Zone Flaw Lets Remote Users Cause Cookie-based Scripts to Be Executed on Another User's Browser in the Incorrect Security Domain
- | [1003907] Microsoft Internet Explorer Discloses The Existence of and Details of Local Files to Remote Users
- | [1003871] Microsoft .NET Unspecified Vulnerabilities May Allow a Remote User to Cause Arbitrary Code to Be Executed on Another User's Systems
- | [1003856] Microsoft Internet Explorer Can Be Crashed By Malicious 'location.replace' Javascript
- | [1003839] Microsoft Internet Explorer (IE) 6 Lets Remote Users Cause Files to Be Downloaded and Executed Without the Knowledge or Consent of the Victim
- | [1003816] Microsoft Windows 2000 Automatic Log Off Policy Fails to Expire Sessions in Progress
- | [1003800] A Multitude of Microsoft SQL Server Extended Stored Procedures Have Buffer Overflows That Allow Remote Users to Crash the Database Server or Execute Arbitrary Code on the Server to Gain Full Control of the System
- | [1003764] Microsoft Windows Operating System Shell URL Handler Bug Lets Remote Users Create HTML That Could Cause Arbitrary Code to Be Executed on Another User's System in Certain Situations
- | [1003756] Microsoft Internet Information Server 4.0 .HTR Web Application Lets Users Change Their Passwords When the NT Security Policy is Configured to Prohibit Password Changing
- | [1003744] Microsoft SQL Server 'xp_dirtree' Buffer Overflow Lets Users Crash the Database Service
- | [1003730] Microsoft Java Virtual Machine in Internet Explorer Lets Remote Malicious Applets Redirect Web Proxy Connections
- | [1003688] Microsoft Exchange Server 2000 Command Processing Bug Lets Remote Users Cause the SMTP Service to Crash
- | [1003687] Microsoft Windows 2000 and Windows XP SMTP Service Command Processing Bug Lets Remote Users Cause the SMTP Service to Crash
- | [1003686] Microsoft Windows SMTP Service Lets Remote Users Send or Relay Unauthorized Mail (including SPAM) Via the Server
- | [1003685] Microsoft Exchange Server Lets Remote Users Send or Relay Unauthorized Mail (including SPAM) Via the Server
- | [1003634] Microsoft XML Core Services in SQL Server 2000 Lets Remote Scripts Access and Send Local Files
- | [1003633] Microsoft XML Core Services in Microsoft Windows XP Operating System Lets Remote Scripts Access and Send Local Files
- | [1003630] Microsoft Internet Explorer Has Another Frame Domain Security Bug That Lets Remote Users View Files or Other Personal Information from a Victim's Computer By Using Malicious VBScripts
- | [1003629] Microsoft Commerce Server 2000 AuthFilter Buffer Overflow Lets Remote Users Execute Arbitrary Code on the Server With LocalSystem Privileges to Gain Full Control of the Server
- | [1003611] Gator Plugin for Microsoft Internet Explorer Lets Remote Users Install Arbitrary Software on the User's Host
- | [1003605] Microsoft SQL Server Buffer Overflow Lets Remote Users Crash the Server and May Allow Remote Code to Be Executed on the Database Server
- | [1003597] Microsoft Outlook Web Access Discloses 'Include' Archive Files in the 'lib' Directory to Remote Users
- | [1003591] Microsoft Windows Terminal Services May Cause the System's Screen Saver Lockout Mechanism to Fail in Certain Situations
- | [1003582] Microsoft Internet Security Acceleration Server Can Be Affected By Remote Users Conducting a LAND Flood Attack
- | [1003556] Microsoft Visual C++ Compiler Buffer Security Mode Does Not Eliminate Buffer Overflows in Compiled Applications
- | [1003546] Microsoft Outlook E-mail Client May Display Potentially Malicious File Attachments Illegally Embedded Within Mail Headers
- | [1003540] Microsoft Internet Explorer Browser MIME Flaw Causes 'text/plain' Pages to Be Displayed as HTML and Any Embedded Scripting to Be Executed By the Browser
- | [1003538] NetWin CWMail Web-Mail Server Buffer Overflow Lets Remote Users Execute Arbitrary Code on the System With the Privileges of the IIS Web Server
- | [1003519] Microsoft Internet Explorer (IE) HTML Directive Buffer Overflow Lets Remote Users Cause Arbitrary Code to Be Executed on Another User's Computer
- | [1003517] Microsoft Internet Explorer (IE) 'Content-Type' Processing Hole Lets Remote Users Open Applications on Another User's Computer
- | [1003516] Microsoft Internet Explorer (IE) Web Browser Has New Frame Domain Verification Bug That Lets Remote Users Obtain Files from Another User's Local File System
- | [1003472] Microsoft Telnet Server for Windows 2000 and for Interix Has a Buffer Overflow That May Let Remote Users Execute Code on the Server with System Level Privileges
- | [1003469] Microsoft Exchange 2000 Server Allows Remote Users to View and Possibly Modify Registry Settings
- | [1003462] Microsoft Internet Explorer Web Browser Allows Cross-site Scripting Attacks Via Non-HTTP Servers
- | [1003458] Microsoft Office v. X for Mac OS X Can Be Crashed By Remote Users Sending Malformed Product Identification Packets
- | [1003446] Microsoft Internet Information Server Can Be Stopped By Local Users Removing Virtual Directories in a Shared Hosting Environment
- | [1003434] Microsoft ASP.NET Web Application Framework Allows Cross Site Scritping Attacks and Discloses Path Information to Remote Users
- | [1003420] Microsoft Site Server Commerce Edition Discloses Potentially Sensitive Administration Information and Source Code to Remote Users With Valid Accounts and Discloses User Passwords from the LDAP Directory to Anonymous Remote Users
- | [1003419] Microsoft Site Server Commerce Edition Lets Remote Users With Valid NT Accounts Upload and Then Execute ASP Scripts on the Server or Consume Disk Space on the Server
- | [1003415] Microsoft Distributed Transaction Coordinator (MSDTC) Service Can Be Crashed By Remote Users
- | [1003402] Microsoft Windows NT 4.0 and Windows 2000 Domain Controllers May Give Elevated Privileges to Remote Users Who Are Valid Administrators on Other Trusted Domains
- | [1003369] PGPfire Personal Firewall for Microsoft Windows Discloses Identifying Information to Remote Users
- | [1003326] Microsoft Internet Explorer for Macintosh OS Executes Remotely Supplied Commands in AppleScripts
- | [1003310] Microsoft Windows NT/2000 Authentication Lockout Bug May Record Successful Logins as Failed Login Attempts in Certain Situations
- | [1003308] Microsoft Windows XP Manifest Processing Bug Lets Local Users Corrupt the System and Cause the Boot Process to Fail
- | [1003257] Microsoft Windows XP Upgrade Effectively Removes Patches from Internet Explorer (IE) During Upgrade, Leaving Users Exposed to IE Vulnerabilities
- | [1003239] Python Language Implementation on Microsoft Windows Allows a Remote Server to Access Files on a Web Surfing User's PC
- | [1003228] Microsoft Windows Media Player Discloses Unique ID to Remote Users in the Default Configuration, Allowing Web Sites to Track Users
- | [1003221] Microsoft Internet Explorer (IE) Default Configuration Allows HTML-based Scripts to Access Your Windows Clipboard Contents
- | [1003215] Microsoft Internet Explorer Popup Object Tag Flaw Lets Remote Users Execute Programs on the Browser's Host
- | [1003201] Microsoft Windows 95 Backup Utility Has Buffer Overflow That Could Cause Denial of Service Conditions
- | [1003135] Microsoft Internet Explorer Can Be Crashed By Remote Users With Javascript That Calls an Endless Loop of Modeless Dialogs
- | [1003121] Microsoft Windows XP Task Manager Will Not Kill Certain Processes
- | [1003109] Microsoft Internet Explorer (IE) May Allow Malicious Javascript to Poll a User's System for Known Files
- | [1003084] Microsoft Internet Explorer GetObject() Active Scripting Bug Lets Remote Code Access Files on the PC
- | [1003050] Microsoft Internet Explorer Web Browser Can Be Crashed By Malicious Image Source Tag Javascript Supplied By Remote Users
- | [1003049] Microsoft Internet Explorer (IE) Text Form Processing Flaw May Cause IE to Crash
- | [1003043] PGP Plug-in For Microsoft Outlook May Fail to Encrypt E-mail in Certain Situations
- | [1003042] Microsoft Internet Explorer Web Browser SSL Security Flaw Lets Remote Users Conduct Man-in-the-Middle Attacks to Access Sensitive Information
- | [1003041] Microsoft Windows XP Remote Desktop Client May Disclose Recently Used Account Names to Remote Users
- | [1003040] Microsoft Excel Password Protection Flaw Lets Local Users Obtain Contents of Password-Protect Cells
- | [1003033] Microsoft C Runtime Format String Flaw Lets Remote Users Crash the Microsoft SQL Server Service
- | [1003032] Microsoft SQL Server Buffer Overflow Lets Remote Users Execute Arbitrary Code in the Security Context of the SQL Server
- | [1003028] Microsoft Windows Universal Plug and Play Component Buffer Overflow Gives Remote Users System Level Access to Windows XP and 98/ME Hosts
- | [1003024] Microsoft Internet Explorer (IE) Web Browser 'document.open()' Scripting Flaw Lets Remote Users Steal Cookies, Read Local Files, and Spoof Web Sites
- | [1003003] Microsoft Windows XP Hot Key Function Lets Physically Local Users Execute Administrator Hot Key Functions in Certain Situations
- | [1002986] Microsoft Internet Explorer Version 6 Lets Remote Scripts Access and Send Local Files
- | [1002979] Microsoft Windows Explorer Discloses Stored FTP Passwords to Local Users
- | [1002973] Microsoft Internet Explorer (IE 6) Browser May Automatically and Silently Execute Arbitrary Code from a Remote Web Site When the User Views a Web Page or HTML-based E-mail
- | [1002957] Microsoft Internet Information Server Can Be Crashed By Remote Users With HTTP Requests Containing Invalid Content-Length Values
- | [1002942] Microsoft Internet Explorer May Execute Javascript Contained Within an 'About:' URL in an Unauthorized Security Domain When the URL Contains an Extraneous '%' Character
- | [1002926] Microsoft Windows Operating System File Locking Design May Allow Local Users to Block Group Policy Scripts
- | [1002922] Microsoft Windows 2000 Internet Key Exchange (IKE) Service Can Be Crashed By Remote Users
- | [1002919] Microsoft Internet Explorer Browser Can Be Crashed By Certain Image Tags
- | [1002915] Microsoft Outlook Web Access for Exchange May Execute Remotely Supplied Scripts When a Recipient Views a Malicious E-mail Message
- | [1002885] Microsoft Internet Explorer Can Be Crashed By Malicious Javascript Causing a Stack Overflow in setTimeout() Function
- | [1002823] Microsoft Internet Explorer Fails to Enforce Cookie Prompting Preferences for Local Security Zone
- | [1002820] Microsoft Internet Explorer Allows Malicious Web Pages to Spoof Downloadable File Types And Execute Code on the User's Computer When Opened Directly from the Browser
- | [1002819] Microsoft Internet Explorer ActiveX Flaw Permits Remote Malicious HTML Code Containing an 'htmlfile' or 'htmlfile_FullWindowEmbed' Object to Access Local Files and Potentially Execute Commands
- | [1002802] Microsoft Help and Support Center Software (helpctr.exe) Has Buffer Overflow That May Allow a Remote User to Cause Arbitrary Code to Be Executed on a User's PC
- | [1002773] Titan Application Firewall for IIS Web Server Fails to Decode URLs, Letting Remote Users Bypass URL-based Firewall Restrictions
- | [1002772] Microsoft Internet Explorer Cookie Disclosure Fix Discloses Patch Information to Remote Users
- | [1002754] Terminal Services on Microsoft Windows 2000 and XP Allow Remote Users to Log Bogus IP Addresses Instead of the User's Genuine Address
- | [1002731] Microsoft Windows 2000 RunAs Service May Disclose Authentication Credentials to Local Users
- | [1002730] Microsoft Windows 2000 RunAs Utility May Disclose Sensitive Information to Local Users
- | [1002729] Microsoft Windows 2000 RunAs Service Allows Local Users to Disable the Service
- | [1002728] Microsoft SQL Server May Disclose Database Passwords When Creating Data Transformation Service (DTS) Packages
- | [1002702] Microsoft Passport May Disclose Wallet Contents, Including Credit Card and Contact Information, to Remote Users
- | [1002693] Microsoft Internet Security and Acceleration Server UDP Fragmentation Processing Can Cause 100% of CPU Resources to Be Consumed
- | [1002601] Microsoft Windows Me Universal Plug and Play (UPnP) Ssdpsrv.exe Server Component Can Be Crashed by Remote Users
- | [1002595] Microsoft Internet Explorer Has Fixed Security Zone for about: URLs and Has Shared Cookie Flaw That Diminishes Cross-Site Scripting Protections
- | [1002594] Microsoft Internet Explorer for Mac OS X is Configured to Automatically Execute Downloaded Files
- | [1002581] Microsoft Terminal Servers Can Be Crashed By Remote Users Sending Certain Remote Desktop Protocol (RDP) Packets
- | [1002560] Internet Explorer Sends Potentially Sensitive Web Browser Contents to Microsoft via the Network When an Error Occurs
- | [1002559] Microsoft Office XP Sends Potentially Sensitive Information to Microsoft Via the Network When an Error Occurs
- | [1002526] Microsoft Internet Explorer (IE) Web Browser Has Multiple URL-related Flaws That May Allow for Remote Code Execution, Remote HTTP Request Generation, and Application of Incorrect Security Restrictions
- | [1002519] TYPSoft FTP Server for Microsoft Windows Can Be Crashed by Remote Users
- | [1002487] Microsoft PowerPoint Macro Security Features Can Be Bypassed by Malformed PowerPoint Documents
- | [1002486] Microsoft Excel Macro Security Features Can Be Bypassed by Malformed Excel Documents
- | [1002456] Microsoft Outlook Web Access Directory Validation Flaw Lets Remote Users Consume CPU Resources by Requesting Mail from Nested Folders
- | [1002421] Microsoft Index Server Sample File Discloses File Information to Remote Users
- | [1002418] Counterpane's Password Safe Password Encryption Utility for Microsoft Windows May Disclose Passwords to Local Users in Certain Situations
- | [1002413] Microsoft Outlook Express Will Execute Active Scripting in Plain Text E-mail Messages, Circumventing Some Scripting Controls
- | [1002394] Microsoft Windows NT Remote Procedure Call (RPC) Services Can Be Crashed With Malformed Packets
- | [1002385] Norton Anti-Virus For Microsoft Exchange Discloses User Path Information to Remote Users
- | [1002356] Microsoft Outlook 2000 Animated Assistant Prevents the Screen Saver from Activating, Allowing Physically Local Users to Access the System
- | [1002331] Internet Security Systems RealSecure Intrusion Detection Misses '%u' Encoded Attacks Against Microsoft Web Servers
- | [1002330] Cisco Catalyst 6000 Intrusion Detection System Module Fails to Detect '%u' Encoding Obfuscation Attacks Against Microsoft Web Servers
- | [1002329] Dragon Sensor Intrusion Detection System Does Not Detect Certain Attacks Against Microsoft Web Servers
- | [1002327] Snort Network Intrusion Detection System Will Not Detect '%u' URL Encoding Attacks Against Microsoft Web Servers
- | [1002326] Cisco Secure Intrusion Detection System (NetRanger) Fails to Detect Certain Attacks Against Microsoft Web Servers
- | [1002317] Microsoft DNS Server Software Susceptible to DNS Cache Poisoning in Default Configuration, Allowing Remote Users to Inject False DNS Records in Certain Situations
- | [1002269] Microsoft Outlook Web Access with SSL Can Be Crashed by Remote Users
- | [1002206] Microsoft Internet Security and Acceleration (ISA) Server 2000 Can Be Disrupted By Remote Users Due to Memory Leaks and Also Allows Cross-Site Scripting Attacks
- | [1002201] Microsoft Windows TCP/IP Stack Vulnerable to a Certain Man-in-the-Middle Denial of Service Attack
- | [1002197] Microsoft Windows NNTP Network News Service Has a Memory Leak That Allows Remote Users to Cause the Server to Crash
- | [1002124] Microsoft Windows 98 Operating System Can Be Crashed When Running a Web Server or Other Servers And the AUX Device is Accessed By the Program
- | [1002106] Microsoft Windows 2000 and Windows NT 4.0 RPC Input Validation Failure Lets Remote Users Destabilize the Operating System
- | [1002105] Microsoft SQL Database Server RPC Input Validation Failure Lets Remote Users Crash the Database Service
- | [1002104] Microsoft Exchange Server RPC Input Validation Failure Lets Remote Users Crash the Exchange Service
- | [1002099] Microsoft Windows 2000 Telnet Service Can Be Crashed By Remote Users
- | [1002098] Windows Terminal Services in Microsoft Windows 2000 and NT 4.0 Can Be Crashed By Remote Users Due to a Memory Leak
- | [1002075] Microsoft Services for Unix Memory Leak in Telnet and NFS Services Allows Remote Users to Crash the Operating System
- | [1002028] Microsoft Exchange LDAP Service Can Be Crashed By Remote Users
- | [1001993] Microsoft Windows 2000, Linux 2.4, NetBSD, FreeBSD, and OpenBSD May Let Remote Users Affect TCP Performance
- | [1001992] Microsoft Windows NT Lets Remote Users Cause Increased Packet Overhead and Increased CPU Resource Consumption
- | [1001984] Microsoft Outlook Allows Rogue HTML to Execute Arbitrary Commands on the User's Host
- | [1001931] Microsoft Windows 2000 SMTP Service May Allow Unauthorized Remote Users to Relay E-mail via the Service
- | [1001923] Microsoft's Internet Information Server's ASP Processor Can Be Crashed by Remote Users in Certain Situations
- | [1001832] Microsoft Windows 2000 LDAP Server Lets Remote Users Gain Administrator Access to the Domain Controller When Configured to Support LDAP over SSL
- | [1001819] Microsoft NetMeeting Can Be Crashed By Remote Users
- | [1001816] Microsoft Visual Studio RAD Support Component of FrontPage Lets Remote Users Execute Arbitrary Code on the FrontPage Server
- | [1001815] Microsoft Word May Execute Macros in Malformed Word Documents Without Warning Even if Macros are Disabled
- | [1001775] Microsoft Index Server Lets Remote Users Execute Arbitrary Code With System Level Privileges, Giving Remote Users Full Control of the Operating System
- | [1001734] Microsoft SQL Server May Let Remote Authenticated Users Take Full Control of the Database Server and the Underlying Operating System
- | [1001701] Microsoft Windows 2000 Telnet Server Allows Local Users to Gain System-Level Privileges and Lets Remote Users Crash the Server
- | [1001699] Microsoft Internet Explorer Web Browser May Allow Remote Users to Read Some Text Files on the Browser's Hard Drive
- | [1001696] Microsoft Exchange Server's Outlook Web Access (OWA) Lets Remote Users Execute Arbitrary Code on the OWA User's Web Browser
- | [1001687] Microsoft Outlook Express May Allow A Remote User to Obtain E-mail Destined for a Different User
- | [1001661] Microsoft Hotmail May Allow a Worm to Send Mail to Other Destinations Listed in a Remote User's Inbox
- | [1001605] Microsoft Windows 2000 Allows Local Users to Elevate Privileges
- | [1001603] Microsoft Windows Media Player May Allow Remote Users to Execute Code Contained in Internet Shortcuts and View Files on the Media Player's Host
- | [1001587] Microsoft Word for Windows and for Mac May Run Macros Linked By RTF Documents Without Warning
- | [1001572] Apache Web Server on Microsoft Windows Platforms Allows Remote Users to Crash the Web Server
- | [1001562] Microsoft Internet Explorer Allows Remote Web Sites to Cause a Different Web URL Address to Be Displayed in the Browser's Address Bar, Allowing Rogue Web Sites to Spoof the Browser and Masquerade as Different Web Sites
- | [1001561] Microsoft Internet Explorer Web Browser Fails To Validate Digital Certificates in Some Configurations, Allowing Rogue Secure Web Sites to Spoof the Browser and Masquerade as a Different Secure Web Site
- | [1001538] Older Version of Microsoft Internet Explorer Web Browser Can Be Crashed By Remote Users
- | [1001537] Microsoft's Internet Information Server's FTP Services May Give Remote Users Information About User Account Names on the Server's Domain and Trusted Domains
- | [1001535] Microsoft's Internet Information Server's FTP Services Can Be Crashed By Remote Users
- | [1001513] Microsoft Windows 2000 Indexing Service Allows Remote Users to View Include Programming Files
- | [1001512] Microsoft Index Server for NT Can Be Crashed By Local Users, Allows Local Users to Execute Arbitrary Code With System Level Privileges, and Lets Remote Users View Certain Include Files
- | [1001501] Microsoft Windows 2000 Domain Controllers Can Be Effectively Halted By Remote Users
- | [1001467] Microsoft Windows Media Player ASX Processing Vulnerability Lets Remote Users Execute Arbitrary Code on the Player's Host System
- | [1001445] Microsoft Internet Security and Acceleration Server May Allow Remote Users to Execute Arbitrary Code on the Firewall
- | [1001424] Microsoft Internet Explorer Can Consume All Memory Due to Malicious HTML Code
- | [1001380] Microsoft Internet Explorer and Outlook Express May Execute Arbitrary Code Without User Authorization or Intervention
- | [1001360] Microsoft Windows Operating System DLL May Allow Malicious Remote Scripts to Run Code on the User's Host Without the User's Intervention
- | [1001344] Microsoft Internet Explorer May Not Display File Extensions in Certain Cases
- | [1001330] Microsoft ActiveSync Software for Portable Computing Devices Allows Portable Devices to Access Files on a Locked Server
- | [1001319] Microsoft Internet Security and Acceleration Server Can Be Crashed By Remote Users
- | [1001311] Netscape's SmartDownload Can Automatically Execute Arbitrary Code Without User Intervention or Knowledge for Both Netscape and Microsoft Browsers
- | [1001255] Microsoft's Ping.exe Allows Local Users to Cause Certain Applications to Crash
- | [1001240] Microsoft FTP Client for Windows 2000 Still Vulnerable to Executing Arbitrary Code in Limited Situations
- | [1001221] E-Mail Clients that use Microsoft Internet Explorer to Process HTML May Disguise Executable Attachments as Data Files
- | [1001219] Microsoft's Internet Security and Acceleration Server Performance Can Be Significantly Affected By Remote Users Under Certain Configurations
- | [1001216] Microsoft Internet Explorer Can Be Made to Execute Arbitrary Files on the User's Computer
- | [1001211] TrendMicro's ScanMail E-Mail Virus Scanner for Microsoft Exchange Discloses Administrative System Usernames and Passwords
- | [1001210] Microsoft Internet Explorer Allows Malicious Web Pages to Retrieve Files from the User's Computer
- | [1001209] Microsoft Telnet Can Be Crashed Locally, Causing Other Applications Including Outlook Express To Crash
- | [1001197] Microsoft Internet Explorer May Automatically Execute Certain E-mail Attachments
- | [1001187] Microsoft Internet Explorer Is Vulnerable to Malicious Web Pages That May Obtain the User's Exchange E-mail Messages and May Access Restricted Web Server Directory Listings
- | [1001186] Microsoft Windows Me Operating System and Windows 98 with the Plus! 98 Package Disclose Data Compression Passwords
- | [1001172] Microsoft Visual Studio Could Allow Users to Crash the Debugger or to Execute Code on the Server
- | [1001163] Microsoft's Dr. Watson Diagnostic Utility May Reveal Passwords and Other Sensitive Information
- | [1001147] Microsoft Outlook Express Crashes When Reading Certain E-mail Messages
- | [1001142] Microsoft Internet Explorer Does Not Check for Revoked Digital Certificates (Two Fraudlent Certificates Are Known to Exist)
- | [1001139] SurfControl for Microsoft Proxy Server May Fail to Block Sites
- | [1001123] Microsoft's FTP Server May Allow Remote Users to Deny Service on the Server
- | [1001110] A Microsoft German-Language Hotfix for Windows NT 4 Incorrectly Displays Some Security Events as Other Security Events
- | [1001088] Microsoft Internet Explorer with Services for Unix 2.0 Can Create Malicious Files on the User's Host
- |
- | OSVDB - http://www.osvdb.org:
- | [91195] Microsoft Windows 7 Unspecified ASLR Protection Mechanism Bypass
- | [91194] Microsoft Windows 7 Kernel Unspecified Local Privilege Escalation (pwn2own)
- | [91193] Microsoft Windows 7 Unspecified ASLR / DEP Protection Mechanism Bypass (pwn2own)
- | [85619] Microsoft Windows Phone 7 X.509 Certificate Subject's Common Name (CN) Field Domain Name Validation Multiple Protocol SSL Server MitM Spoofing Weakness
- | [67783] Microsoft Windows SDK for Windows 7 / .NET Framework 4 GraphEdit Path Subversion Arbitrary DLL Injection Code Execution
- | [87555] Adobe ColdFusion for Microsoft IIS Unspecified DoS
- | [87262] Microsoft IIS FTP Command Injection Information Disclosure
- | [87261] Microsoft IIS Log File Permission Weakness Local Password Disclosure
- | [86899] Microsoft IIS 302 Red