JTSEC1333

Anonymous JTSEC #OpAssange Full Recon #3

Mar 31st, 2020
19,592
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 615.05 KB | None | 0 0
  1. ##################################################################################################################################
  2. =================================================================================================================================
  3. Hostname www.cityoflondon.gov.uk ISP COLT Technology Services Group Limited
  4. Continent Europe Flag
  5. GB
  6. Country United Kingdom Country Code GB
  7. Region England Local time 31 Mar 2020 04:55 BST
  8. City London Postal Code EC2V
  9. IP Address 80.169.89.102 Latitude 51.516
  10. Longitude -0.093
  11. ================================================================================================================================
  12. ################################################################################################################################
  13. Target:https://www.cityoflondon.gov.uk/
  14. IP:80.169.89.102
  15. ################################################################################################################################
  16. > set type=A
  17. > www.cityoflondon.gov.uk
  18. Server: 10.101.0.243
  19. Address: 10.101.0.243#53
  20.  
  21. Non-authoritative answer:
  22. Name: www.cityoflondon.gov.uk
  23. Address: 80.169.89.102
  24. > set type=NS
  25. > www.cityoflondon.gov.uk
  26. Server: 10.101.0.243
  27. Address: 10.101.0.243#53
  28.  
  29. Non-authoritative answer:
  30. *** Can't find www.cityoflondon.gov.uk: No answer
  31.  
  32. Authoritative answers can be found from:
  33. cityoflondon.gov.uk
  34. origin = jake.ns.cloudflare.com
  35. mail addr = dns.cloudflare.com
  36. serial = 2033627693
  37. refresh = 10000
  38. retry = 2400
  39. expire = 604800
  40. minimum = 3600
  41. > set type=MX
  42. > www.cityoflondon.gov.uk
  43. Server: 10.101.0.243
  44. Address: 10.101.0.243#53
  45.  
  46. Non-authoritative answer:
  47. *** Can't find www.cityoflondon.gov.uk: No answer
  48.  
  49. Authoritative answers can be found from:
  50. cityoflondon.gov.uk
  51. origin = jake.ns.cloudflare.com
  52. mail addr = dns.cloudflare.com
  53. serial = 2033627693
  54. refresh = 10000
  55. retry = 2400
  56. expire = 604800
  57. minimum = 3600
  58. >
  59. ################################################################################################################################
  60. Domain:
  61. cityoflondon.gov.uk
  62.  
  63. Registered For:
  64. City of London Corporation
  65.  
  66. Domain Owner:
  67. City of London Corporation
  68.  
  69. Registered By:
  70. Colt Technology Services
  71.  
  72. Servers:
  73. jake.ns.cloudflare.com
  74. treasure.ns.cloudflare.com
  75.  
  76. Registrant Contact:
  77. City of London Corporation
  78.  
  79. Registrant Address:
  80. PO Box 270
  81. Guildhall
  82. London
  83. EC2P 2EJ
  84. United Kingdom
  85. +447596 279 077 (Phone)
  86. carl.walker@cityoflondon.gov.uk
  87.  
  88. Renewal date:
  89. Wednesday 18th May 2022
  90.  
  91. Entry updated:
  92. Tuesday 18th February 2020
  93.  
  94. Entry created:
  95. Wednesday 17th September 2003
  96. ################################################################################################################################
  97. Trying "cityoflondon.gov.uk"
  98. ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 6277
  99. ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 4
  100.  
  101. ;; QUESTION SECTION:
  102. ;cityoflondon.gov.uk. IN ANY
  103.  
  104. ;; ANSWER SECTION:
  105. cityoflondon.gov.uk. 3789 IN HINFO "RFC8482" ""
  106. cityoflondon.gov.uk. 28630 IN NS treasure.ns.cloudflare.com.
  107. cityoflondon.gov.uk. 28630 IN NS jake.ns.cloudflare.com.
  108.  
  109. ;; ADDITIONAL SECTION:
  110. treasure.ns.cloudflare.com. 32543 IN A 162.159.38.116
  111. jake.ns.cloudflare.com. 18813 IN A 173.245.59.122
  112. treasure.ns.cloudflare.com. 32543 IN AAAA 2606:4700:50::a29f:2674
  113. jake.ns.cloudflare.com. 18813 IN AAAA 2606:4700:58::adf5:3b7a
  114.  
  115. Received 205 bytes from 2001:18c0:121:6900:724f:b8ff:fefd:5b6a#53 in 447 ms
  116. ################################################################################################################################
  117. ; <<>> DiG 9.11.16-2-Debian <<>> +trace cityoflondon.gov.uk
  118. ;; global options: +cmd
  119. . 86400 IN NS a.root-servers.net.
  120. . 86400 IN NS b.root-servers.net.
  121. . 86400 IN NS c.root-servers.net.
  122. . 86400 IN NS d.root-servers.net.
  123. . 86400 IN NS e.root-servers.net.
  124. . 86400 IN NS f.root-servers.net.
  125. . 86400 IN NS g.root-servers.net.
  126. . 86400 IN NS h.root-servers.net.
  127. . 86400 IN NS i.root-servers.net.
  128. . 86400 IN NS j.root-servers.net.
  129. . 86400 IN NS k.root-servers.net.
  130. . 86400 IN NS l.root-servers.net.
  131. . 86400 IN NS m.root-servers.net.
  132. . 86400 IN RRSIG NS 8 0 518400 20200412170000 20200330160000 33853 . 0CZ/She0YSzr3cBeCWPkQ4fbgGTZ3XW7AZViR+vXPMIQnwGCfutTgISI 8DeQlatHn+5KmyHYAC17bzQ8jU21//7ZXEP6WDVewK8NblE1/8yCciN+ jd/J5wHY3MqWFa8CL7MyGjE+LsUu4M69XJ7tZ1WbBOqoyJVOJy2ckXv4 Ffd5Lzm7BgigN85BqdaEUZdOh80nQ/u0ic3DvWj8+cUchhmksRbO/w3M p5GEkeEvFp5rq1deCSPfZ86Ym2lqF+YYH9wvuegqja0X4JGzFH+PdWQn ED1dN6ZvPxRuIbyqx4Mcu7H8zkLSFFSBdJNJMD/ERv3TPd2yI+wRL4Qg WaTYtA==
  133. ;; Received 525 bytes from 10.101.0.243#53(10.101.0.243) in 106 ms
  134.  
  135. uk. 172800 IN NS nsa.nic.uk.
  136. uk. 172800 IN NS dns1.nic.uk.
  137. uk. 172800 IN NS nsb.nic.uk.
  138. uk. 172800 IN NS nsd.nic.uk.
  139. uk. 172800 IN NS dns2.nic.uk.
  140. uk. 172800 IN NS dns3.nic.uk.
  141. uk. 172800 IN NS dns4.nic.uk.
  142. uk. 172800 IN NS nsc.nic.uk.
  143. uk. 86400 IN DS 43876 8 2 A107ED2AC1BD14D924173BC7E827A1153582072394F9272BA37E2353 BC659603
  144. uk. 86400 IN RRSIG DS 8 1 86400 20200412170000 20200330160000 33853 . cE3IH5poLc6c9AWBgeKLcp47sDjY4AR2e04YU0foLiMwrFJGTWEYLgec KgFakc1/0RdG9yI+8HHUqOuYgXQvSjhq+We9Qp6o8qqE9XigPtQ3Oq9D O8ILwmITPEK0MWJqzrPeGinMuc5a8MJeHK/v6QnioVV9ofciV9c/wyU8 VKSSSUk8XA3VXPBPkSt9CIkYpLuDyJTlpIotPzYvN4oyQgEUg52La3WS LbZksabQ6wqHfZjFq6xHtZXrZpctSthv1yo13HT4PSmIjv4Xt3i8hh1K eA7sSYjqBrDCD8dFntH//OS7qoElq/3F2ewSHykrF9r06PX1b07jVJdI ASs9sA==
  145. ;; Received 831 bytes from 192.33.4.12#53(c.root-servers.net) in 112 ms
  146.  
  147. gov.uk. 172800 IN NS ns0.ja.net.
  148. gov.uk. 172800 IN NS ns1.surfnet.nl.
  149. gov.uk. 172800 IN NS ns2.ja.net.
  150. gov.uk. 172800 IN NS ns3.ja.net.
  151. gov.uk. 172800 IN NS ns4.ja.net.
  152. gov.uk. 172800 IN NS auth00.ns.de.uu.net.
  153. gov.uk. 172800 IN NS auth50.ns.de.uu.net.
  154. gov.uk. 300 IN DS 17539 8 2 2F0A0A65DB9E930F5B2C0425F67DF66416C076124652A281D9A8FFA7 73828F57
  155. gov.uk. 300 IN RRSIG DS 8 2 300 20200413041808 20200330034320 43056 uk. EtYXeEqkxLinKQ1b9mQE+mv6iwTi4zOY4y1hJhMNkN29jjMWKB6x71d2 k6ZfTtTlT4ARmbRYv+qfzpmfdBGmNvzLwO9RAXh0dbjkh2EZp7Qtpdrh WFd3CQSh+q94YPhs+VxUMjQm5eSKDuSKPClrOgxMJTXosztmkF4Z3oyG fr0=
  156. ;; Received 415 bytes from 2a01:618:404::1#53(dns3.nic.uk) in 89 ms
  157.  
  158. cityoflondon.gov.uk. 86400 IN NS jake.ns.cloudflare.com.
  159. cityoflondon.gov.uk. 86400 IN NS treasure.ns.cloudflare.com.
  160. P64J5KUTD6UCANBTQOO2AA0I5H5AUPKR.gov.uk. 14400 IN NSEC3 1 0 10 - P6BLR4VP0JD859HHF4L0MH54AIED54LM NS
  161. P64J5KUTD6UCANBTQOO2AA0I5H5AUPKR.gov.uk. 14400 IN RRSIG NSEC3 8 3 14400 20200429124823 20200330124823 41286 gov.uk. JcYAMryiyrQpKzeTN0lxxfCneu2feOCsP3/P/8RWB06jPEsFUfjfFiUE s1XRud0TQ90oMkOQktksMa97SoJ7W3scZ7RA0qphfCnG/0Mh9dcz0IsJ yygzDsPI08YOGc3zzzLcvUPwdA/em/dJHu412eXE2MO7MqCUzIvQyqKO Ohk=
  162. ;; Received 347 bytes from 192.76.144.14#53(auth00.ns.de.uu.net) in 116 ms
  163.  
  164. cityoflondon.gov.uk. 300 IN A 80.169.89.102
  165. ;; Received 64 bytes from 173.245.59.122#53(jake.ns.cloudflare.com) in 107 ms
  166. ################################################################################################################################
  167. [i] Scanning Site: https://www.cityoflondon.gov.uk
  168.  
  169.  
  170.  
  171. B A S I C I N F O
  172. ====================
  173.  
  174.  
  175. [+] Site Title: Welcome to the City of London Corporation
  176. [+] IP address: 80.169.89.102
  177. [+] Web Server: Microsoft-IIS/7.5
  178. [+] CMS: Could Not Detect
  179. [+] Cloudflare: Not Detected
  180. [+] Robots File: Could NOT Find robots.txt!
  181.  
  182.  
  183.  
  184.  
  185. W H O I S L O O K U P
  186. ========================
  187.  
  188.  
  189. Domain:
  190. cityoflondon.gov.uk
  191.  
  192. Registered For:
  193. City of London Corporation
  194.  
  195. Domain Owner:
  196. City of London Corporation
  197.  
  198. Registered By:
  199. Colt Technology Services
  200.  
  201. Servers:
  202. jake.ns.cloudflare.com
  203. treasure.ns.cloudflare.com
  204.  
  205. Registrant Contact:
  206. City of London Corporation
  207.  
  208. Registrant Address:
  209. PO Box 270
  210. Guildhall
  211. London
  212. EC2P 2EJ
  213. United Kingdom
  214. +447596 279 077 (Phone)
  215. carl.walker@cityoflondon.gov.uk
  216.  
  217. Renewal date:
  218. Wednesday 18th May 2022
  219.  
  220. Entry updated:
  221. Tuesday 18th February 2020
  222.  
  223. Entry created:
  224. Wednesday 17th September 2003
  225.  
  226.  
  227.  
  228.  
  229.  
  230. G E O I P L O O K U P
  231. =========================
  232.  
  233. [i] IP Address: 80.169.89.102
  234. [i] Country: United Kingdom
  235. [i] State: England
  236. [i] City: London
  237. [i] Latitude: 51.5132
  238. [i] Longitude: -0.0961
  239.  
  240.  
  241.  
  242.  
  243. H T T P H E A D E R S
  244. =======================
  245.  
  246.  
  247. [i] HTTP/1.1 302 Redirect
  248. [i] Content-Type: text/html; charset=UTF-8
  249. [i] Location: http://www.cityoflondon.gov.uk/Pages/default.aspx
  250. [i] Server: Microsoft-IIS/7.5
  251. [i] SPRequestGuid: 02486b7c-70b0-425d-98de-2551efdf842c
  252. [i] X-SharePointHealthScore: 0
  253. [i] X-Powered-By: ASP.NET
  254. [i] MicrosoftSharePointTeamServices: 14.0.0.7239
  255. [i] X-MS-InvokeApp: 1; RequireReadOnly
  256. [i] Date: Tue, 31 Mar 2020 04:12:16 GMT
  257. [i] Connection: close
  258. [i] Content-Length: 172
  259. [i] HTTP/1.1 301 Moved Permanently
  260. [i] Location: https://www.cityoflondon.gov.uk/Pages/default.aspx
  261. [i] Server: COL-VMW-M-LB02
  262. [i] Cache-Control: no-cache
  263. [i] Connection: close
  264. [i] HTTP/1.1 200 OK
  265. [i] Cache-Control: private
  266. [i] Content-Type: text/html; charset=utf-8
  267. [i] Expires: Tue, 31 Mar 2020 04:21:08 GMT
  268. [i] Vary: *
  269. [i] Server: Microsoft-IIS/7.5
  270. [i] SPRequestGuid: 377e7433-aca1-409f-97ec-c413b79efbd9
  271. [i] X-SharePointHealthScore: 0
  272. [i] X-AspNet-Version: 2.0.50727
  273. [i] X-Powered-By: ASP.NET
  274. [i] MicrosoftSharePointTeamServices: 14.0.0.7239
  275. [i] X-MS-InvokeApp: 1; RequireReadOnly
  276. [i] Date: Tue, 31 Mar 2020 04:12:16 GMT
  277. [i] Connection: close
  278. [i] Content-Length: 32781
  279.  
  280.  
  281.  
  282.  
  283. D N S L O O K U P
  284. ===================
  285.  
  286. cityoflondon.gov.uk. 3788 IN HINFO "RFC8482" ""
  287.  
  288.  
  289.  
  290.  
  291. S U B N E T C A L C U L A T I O N
  292. ====================================
  293.  
  294. Address = 80.169.89.102
  295. Network = 80.169.89.102 / 32
  296. Netmask = 255.255.255.255
  297. Broadcast = not needed on Point-to-Point links
  298. Wildcard Mask = 0.0.0.0
  299. Hosts Bits = 0
  300. Max. Hosts = 1 (2^0 - 0)
  301. Host Range = { 80.169.89.102 - 80.169.89.102 }
  302.  
  303.  
  304.  
  305. N M A P P O R T S C A N
  306. ============================
  307.  
  308. Starting Nmap 7.70 ( https://nmap.org ) at 2020-03-31 04:08 UTC
  309. Nmap scan report for cityoflondon.gov.uk (80.169.89.102)
  310. Host is up (0.078s latency).
  311.  
  312. PORT STATE SERVICE
  313. 21/tcp filtered ftp
  314. 22/tcp filtered ssh
  315. 80/tcp open http
  316. 443/tcp open https
  317.  
  318. Nmap done: 1 IP address (1 host up) scanned in 2.08 seconds
  319.  
  320.  
  321.  
  322. S U B - D O M A I N F I N D E R
  323. ==================================
  324.  
  325.  
  326. [i] Total Subdomains Found : 30
  327.  
  328. [+] Subdomain: mail1.cityoflondon.gov.uk
  329. [-] IP: 80.169.89.80
  330.  
  331. [+] Subdomain: www1.cityoflondon.gov.uk
  332. [-] IP: 80.169.89.96
  333.  
  334. [+] Subdomain: www.planning2.cityoflondon.gov.uk
  335. [-] IP: 195.171.176.91
  336.  
  337. [+] Subdomain: www.mapping2.cityoflondon.gov.uk
  338. [-] IP: 195.171.176.90
  339.  
  340. [+] Subdomain: mail2.cityoflondon.gov.uk
  341. [-] IP: 80.169.89.106
  342.  
  343. [+] Subdomain: fypsd.cityoflondon.gov.uk
  344. [-] IP: 80.169.89.101
  345.  
  346. [+] Subdomain: housingselfservice.cityoflondon.gov.uk
  347. [-] IP: 195.20.223.214
  348.  
  349. [+] Subdomain: wwwstage.cityoflondon.gov.uk
  350. [-] IP: 80.169.89.82
  351.  
  352. [+] Subdomain: mobile.cityoflondon.gov.uk
  353. [-] IP: 80.169.89.102
  354.  
  355. [+] Subdomain: fdonline.cityoflondon.gov.uk
  356. [-] IP: 80.169.89.106
  357.  
  358. [+] Subdomain: learningzone.cityoflondon.gov.uk
  359. [-] IP: 31.25.189.168
  360.  
  361. [+] Subdomain: librarycatalogue.cityoflondon.gov.uk
  362. [-] IP: 217.169.37.149
  363.  
  364. [+] Subdomain: elearning.cityoflondon.gov.uk
  365. [-] IP: 146.177.9.125
  366.  
  367. [+] Subdomain: www.mapping.cityoflondon.gov.uk
  368. [-] IP: 195.171.176.88
  369.  
  370. [+] Subdomain: biztalk.cityoflondon.gov.uk
  371. [-] IP: 80.169.89.97
  372.  
  373. [+] Subdomain: email.cityoflondon.gov.uk
  374. [-] IP: 91.206.118.10
  375.  
  376. [+] Subdomain: www.guildhall.cityoflondon.gov.uk
  377. [-] IP: 176.32.230.9
  378.  
  379. [+] Subdomain: pcn.cityoflondon.gov.uk
  380. [-] IP: 212.50.171.54
  381.  
  382. [+] Subdomain: ldfconsultation.cityoflondon.gov.uk
  383. [-] IP: 195.12.22.232
  384.  
  385. [+] Subdomain: shop.cityoflondon.gov.uk
  386. [-] IP: 23.227.38.32
  387.  
  388. [+] Subdomain: jobs.cityoflondon.gov.uk
  389. [-] IP: 195.20.223.210
  390.  
  391. [+] Subdomain: revenues.cityoflondon.gov.uk
  392. [-] IP: 195.20.223.210
  393.  
  394. [+] Subdomain: hyms.cityoflondon.gov.uk
  395. [-] IP: 195.171.176.87
  396.  
  397. [+] Subdomain: careers.cityoflondon.gov.uk
  398. [-] IP: 77.104.134.194
  399.  
  400. [+] Subdomain: citybenefits.cityoflondon.gov.uk
  401. [-] IP: 134.213.36.31
  402.  
  403. [+] Subdomain: consult.cityoflondon.gov.uk
  404. [-] IP: 31.25.189.114
  405.  
  406. [+] Subdomain: www.consult.cityoflondon.gov.uk
  407. [-] IP: 31.25.189.114
  408.  
  409. [+] Subdomain: www.cityoflondon.gov.uk
  410. [-] IP: 80.169.89.102
  411.  
  412. [+] Subdomain: democracy.cityoflondon.gov.uk
  413. [-] IP: 80.169.89.107
  414.  
  415. [+] Subdomain: www.guildhallartgallery.cityoflondon.gov.uk
  416. [-] IP: 80.169.89.101
  417. ################################################################################################################################
  418. [*] Users found: 45
  419. ---------------------
  420. Abiola Ashiru - Estate Manager - City of London Corporation
  421. Amadou Balde - CRM Database Officer - City of London
  422. Andrew J. Cross - Managing Director - Zuzumi
  423. Andrew McMurtrie - Councillor - City of London Corporation
  424. Andrews Bryony - APFM - City of London Corporation
  425. Anthonia Ifeanyi-Okoro - Project Manager - City of London
  426. Ben Grainger - Chief Operating Officer - Metfriendly
  427. Clarke Cover - Engineer - City of London
  428. Damian Nussbaum - Director - City of London Corporation
  429. David Roalfe - Security - City of London
  430. Deborah Jones - animal health inspector - City of London
  431. Deborah Ley MRICS - Estate Manager - Royal Mail Group
  432. Edward Jones - Researcher - City of London Corporation
  433. Frederick Bergann - Fiber Technician - Vicario AS
  434. Geoff Parnell - Head of Transformation - Octavia
  435. Giles Radford - Highways Manager - City of London
  436. Ian Hughes - Traffic Manager - City of London
  437. Jamel Morris - Sole trader - eBay
  438. James Lee - Advisory Board Member - Thrive - UnLtd
  439. Jasmine Cumbers - Animal Welfare Officer - City of London
  440. Jeremy Young - Countryside Ranger - City of London
  441. Jon White - Group Building Control Officer - City of London
  442. Kenneth Page - Interpretation Officer - City of London
  443. Kerrigan Abbott - Asset Manager - City of London
  444. Lizzie Jupp - Event Manager - The Clink Charity
  445. Lucy McDonald - Head of Regional Marketing - Arriva Group
  446. Mark Pundsack - Assistant District Surveyor - City of London
  447. Mark Sherlock MBIFM - Superintendent - City of London
  448. Mehzebin Adam - Museum Curator - British Red Cross
  449. Michelle Cavanagh - PA - City of London
  450. Mick Bagnall - Film Officer - City of London Corporation
  451. Muhibur Rahman - Post Room Supervisor - City of London
  452. Nirupa Gardner - Ms - CIty Of London
  453. Paul Jeal - Senior Supervisor - City of London
  454. Prem Goyal OBE JP - Non Executive Director - rise inc
  455. Richard Gentry - Local Authority Manager - City of London
  456. Rory McMullan - Press Officer - London road safety council
  457. Ruth Shilston - Associate - RWDI
  458. Sammy Neillis - Personal Assistant - City of London
  459. Serafino Manca - Head Of Marketing Operations - Koine
  460. Sufina Ahmad - Director - The John Ellerman Foundation
  461. Tom Noble - Group Manager - City of London Corporation
  462. Vince Dignam FCILT - Chairman Of The Board - BITA
  463. martin goodwin - housing options officer - City of London
  464. paula walton - Secretary - City of London
  465. Searching 400 results.
  466. Searching 500 results.
  467. [*] Searching Linkedin.
  468.  
  469. [*] Links found: 1
  470. ---------------------
  471. https://www.linkedin.com/in/nick-bensted-smith-7021535/
  472.  
  473.  
  474. [*] IPs found: 52
  475. -------------------
  476. 23.227.38.32
  477. 31.25.189.114
  478. 31.25.189.168
  479. 34.243.0.23
  480. 52.18.141.94
  481. 52.56.67.36
  482. 77.104.134.194
  483. 80.169.89.80
  484. 80.169.89.82
  485. 80.169.89.91
  486. 80.169.89.96
  487. 80.169.89.97
  488. 80.169.89.101
  489. 80.169.89.102
  490. 80.169.89.106
  491. 80.169.89.107
  492. 85.92.209.141
  493. 86.54.118.84
  494. 91.206.118.10
  495. 104.22.14.166
  496. 104.22.15.166
  497. 134.213.36.31
  498. 141.211.243.19
  499. 146.177.9.125
  500. 176.32.230.9
  501. 193.34.187.148
  502. 195.12.22.232
  503. 195.20.223.210
  504. 195.20.223.213
  505. 195.20.223.214
  506. 195.171.176.87
  507. 195.171.176.88
  508. 195.171.176.90
  509. 195.171.176.91
  510. 195.171.176.93
  511. 212.50.171.54
  512. 217.169.37.149
  513. 217.174.252.152
  514.  
  515. [*] Emails found: 309
  516. ----------------------
  517. adam.green@cityoflondon.gov.uk
  518. adam.reeve@cityoflondon.gov.uk
  519. adrian.dressekie@cityoflondon.gov.uk
  520. adultsduty@cityoflondon.gov.uk
  521. afsana.rahman@cityoflondon.gov.uk
  522. alan.lilly@cityoflondon.gov.uk
  523. alexander.barr@cityoflondon.gov.uk
  524. amanda.owens@cityoflondon.gov.uk
  525. amicus.unions@cityoflondon.gov.uk
  526. andrea.merciar@cityoflondon.gov.uk
  527. andrew.bellingham@cityoflondon.gov.uk
  528. andrew.cammarano@cityoflondon.gov.uk
  529. andrew.harvey@cityoflondon.gov.uk
  530. andrew.king@cityoflondon.gov.uk
  531. andrew.lenihan@cityoflondon.gov.uk
  532. andrew.tregidgo@cityoflondon.gov.uk
  533. andrew.woods@cityoflondon.gov.uk
  534. andy.waker@cityoflondon.gov.uk
  535. angela.starling@cityoflondon.gov.uk
  536. angela.thomas@cityoflondon.gov.uk
  537. angela.turnbull@cityoflondon.gov.uk
  538. anthony.riley@cityoflondon.gov.uk
  539. ask.lma@cityoflondon.gov.uk
  540. babzzyandrea.merciar@cityoflondon.gov.uk
  541. bankarea@cityoflondon.gov.uk
  542. barbicanlib@cityoflondon.gov.uk
  543. barbicanmusic@cityoflondon.gov.uk
  544. barrie.ellis@cityoflondon.gov.uk
  545. beech.street@cityoflondon.gov.uk
  546. bella.longman@cityoflondon.gov.uk
  547. ben.kennedy@cityoflondon.gov.uk
  548. ben.manku@cityoflondon.gov.uk
  549. ben.mossop@cityoflondon.gov.uk
  550. benjamin.mossop@cityoflondon.gov.uk
  551. beverly.campbell@cityoflondon.gov.uk
  552. blanca.daniel@cityoflondon.gov.uk
  553. bradley.viljoen@cityoflondon.gov.uk
  554. brian.henderson@cityoflondon.gov.uk
  555. bryn.aldridge@cityoflondon.gov.uk
  556. burnham.beeches@cityoflondon.gov.uk
  557. carl.bernhardt@cityoflondon.gov.uk
  558. carla-maria.heath@cityoflondon.gov.uk
  559. carly.cheeseman@cityoflondon.gov.uk
  560. carly.harris@cityoflondon.gov.uk
  561. carol.boswarthack@cityoflondon.gov.uk
  562. caroline.pyke@cityoflondon.gov.uk
  563. carolyn.piper@cityoflondon.gov.uk
  564. carolynn.holmes@cityoflondon.gov.uk
  565. carroll.stanbury@cityoflondon.gov.uk
  566. catherine.hughes@cityoflondon.gov.uk
  567. catherine.mcguinness@cityoflondon.gov.uk
  568. cathy.lawson@cityoflondon.gov.uk
  569. charlie.turpie@cityoflondon.gov.uk
  570. charlotte.factor@cityoflondon.gov.uk
  571. charlotte.hopkins@cityoflondon.gov.uk
  572. che.christie@cityoflondon.gov.uk
  573. cheryl.mcgee@cityoflondon.gov.uk
  574. china@cityoflondon.gov.uk
  575. chris.anderson@cityoflondon.gov.uk
  576. chris.barlow@cityoflondon.gov.uk
  577. chris.fcips@cityoflondon.gov.uk
  578. chris.hartwell@cityoflondon.gov.uk
  579. chris.punter@cityoflondon.gov.uk
  580. chris.smith2@cityoflondon.gov.uk
  581. christine.beaumont@cityoflondon.gov.uk
  582. christine.connolly@cityoflondon.gov.uk
  583. christine.josef@cityoflondon.gov.uk
  584. christopher.bell@cityoflondon.gov.uk
  585. cirla.peall@cityoflondon.gov.uk
  586. citybridgetrust@cityoflondon.gov.uk
  587. claire.dumontier-marriage@cityoflondon.gov.uk
  588. claire.scott@cityoflondon.gov.uk
  589. colin.bull@cityoflondon.gov.uk
  590. colpolicemuseum@cityoflondon.gov.uk
  591. cru@cityoflondon.gov.uk
  592. dafydd.jones@cityoflondon.gov.uk
  593. dagley@cityoflondon.gov.uk
  594. dan.tomkins@cityoflondon.gov.uk
  595. dave.davis@cityoflondon.gov.uk
  596. david.bentley@cityoflondon.gov.uk
  597. david.buckley@cityoflondon.gov.uk
  598. david.kemp@cityoflondon.gov.uk
  599. david.laird@cityoflondon.gov.uk
  600. david.mackintosh@cityoflondon.gov.uk
  601. david.mckay@cityoflondon.gov.uk
  602. david.pack@cityoflondon.gov.uk
  603. david.renshaw@cityoflondon.gov.uk
  604. david.summers@cityoflondon.gov.uk
  605. deanobrowno@cityoflondon.gov.uk
  606. deborah.cluett@cityoflondon.gov.uk
  607. derek.meddings@cityoflondon.gov.uk
  608. diane.marcou@cityoflondon.gov.uk
  609. douglas.wilkinson@cityoflondon.gov.uk
  610. dulcie.felton@cityoflondon.gov.uk
  611. education@cityoflondon.gov.uk
  612. edward.chaning-cotter@cityoflondon.gov.uk
  613. elizabeth.rogula@cityoflondon.gov.uk
  614. emma.martin@cityoflondon.gov.uk
  615. emma.marwood@cityoflondon.gov.uk
  616. emmanuel.ojugo@cityoflondon.gov.uk
  617. gary.flint@cityoflondon.gov.uk
  618. gary.marshall@cityoflondon.gov.uk
  619. gavin.felgate@cityoflondon.gov.uk
  620. gavin.simpson@cityoflondon.gov.uk
  621. george.abrahams@cityoflondon.gov.uk
  622. gill@cityoflondon.gov.uk
  623. gillian.maxwell@cityoflondon.gov.uk
  624. grace.stilgoe@cityoflondon.gov.uk
  625. graham.bell@cityoflondon.gov.uk
  626. greg.nott@cityoflondon.gov.uk
  627. gregory.moore@cityoflondon.gov.uk
  628. guildhall.events@cityoflondon.gov.uk
  629. guildhall.library@cityoflondon.gov.uk
  630. harper.ozkulac@cityoflondon.gov.uk
  631. harry.king@cityoflondon.gov.uk
  632. hayley.hajduczek@cityoflondon.gov.uk
  633. heinrich.storm@cityoflondon.gov.uk
  634. helen.armstrong@cityoflondon.gov.uk
  635. iain.mudge@cityoflondon.gov.uk
  636. iain.stanton@cityoflondon.gov.uk
  637. ian.hughes@cityoflondon.gov.uk
  638. ian.partington@cityoflondon.gov.uk
  639. information.officer@cityoflondon.gov.uk
  640. isabelle.almeida@cityoflondon.gov.uk
  641. jack.dixon@cityoflondon.gov.uk
  642. jacqueline.cover@cityoflondon.gov.uk
  643. jacqueline.watson@cityoflondon.gov.uk
  644. james.barber@cityoflondon.gov.uk
  645. james.gardiner@cityoflondon.gov.uk
  646. jamie.bottono@cityoflondon.gov.uk
  647. jan.horton@cityoflondon.gov.uk
  648. jane.doe@cityoflondon.gov.uk
  649. janet.fortune@cityoflondon.gov.uk
  650. janet.laban@cityoflondon.gov.uk
  651. janet.pearman@cityoflondon.gov.uk
  652. jeremy.dagley@cityoflondon.gov.uk
  653. jeremy.mullins@cityoflondon.gov.uk
  654. jeremy.tuck@cityoflondon.gov.uk
  655. jerry.buncombe@cityoflondon.gov.uk
  656. jim.graham@cityoflondon.gov.uk
  657. joan.westley@cityoflondon.gov.uk
  658. joanna.burnaby-atkins@cityoflondon.gov.uk
  659. john.ambrose@cityoflondon.gov.uk
  660. john.barker@cityoflondon.gov.uk
  661. john.bennett@cityoflondon.gov.uk
  662. john.davies@cityoflondon.gov.uk
  663. john.lake@cityoflondon.gov.uk
  664. jonathan.meares@cityoflondon.gov.uk
  665. kajal.maisuria@cityoflondon.gov.uk
  666. karyn.ramsay@cityoflondon.gov.uk
  667. katherine.bowen@cityoflondon.gov.uk
  668. katie.bishop@cityoflondon.gov.uk
  669. kayleigh.rippe@cityoflondon.gov.uk
  670. kelly.montague@cityoflondon.gov.uk
  671. kelly.stokes@cityoflondon.gov.uk
  672. kevin.mulcahy@cityoflondon.gov.uk
  673. kimberley.hall@cityoflondon.gov.uk
  674. kirsty.leitch@cityoflondon.gov.uk
  675. kk@cityoflondon.gov.uk
  676. lado@cityoflondon.gov.uk
  677. laurence.ward@cityoflondon.gov.uk
  678. lee.jones@cityoflondon.gov.uk
  679. leigh.sherkin@cityoflondon.gov.uk
  680. leila.ben-hassel@cityoflondon.gov.uk
  681. leshay.jardine@cityoflondon.gov.uk
  682. libby.grant@cityoflondon.gov.uk
  683. libsupportservices@cityoflondon.gov.uk
  684. licensing@cityoflondon.gov.uk
  685. linda.antonioni@cityoflondon.gov.uk
  686. linda.burgess@cityoflondon.gov.uk
  687. lisa.russell@cityoflondon.gov.uk
  688. liz.yamada@cityoflondon.gov.uk
  689. lorraine.brook@cityoflondon.gov.uk
  690. louise.stirna@cityoflondon.gov.uk
  691. lucie.martin@cityoflondon.gov.uk
  692. lucy.sandford@cityoflondon.gov.uk
  693. lydia.blackley@cityoflondon.gov.uk
  694. malcolm.key@cityoflondon.gov.uk
  695. margaret.jackson@cityoflondon.gov.uk
  696. marika.ludmann@cityoflondon.gov.uk
  697. mark.anthony@cityoflondon.gov.uk
  698. mark.mojsak@cityoflondon.gov.uk
  699. mark.pundsack@cityoflondon.gov.uk
  700. marketsprogramme@cityoflondon.gov.uk
  701. martin.hall@cityoflondon.gov.uk
  702. martin.howe@cityoflondon.gov.uk
  703. martin.till@cityoflondon.gov.uk
  704. matthew.green@cityoflondon.gov.uk
  705. matthew.payne@cityoflondon.gov.uk
  706. michael.bennett@cityoflondon.gov.uk
  707. michelle.ilbert@cityoflondon.gov.uk
  708. michelle.vancayseele@cityoflondon.gov.uk
  709. mick.bagnall@cityoflondon.gov.uk
  710. mick.collins@cityoflondon.gov.uk
  711. mike.braude@cityoflondon.gov.uk
  712. murdo.macmillan@cityoflondon.gov.uk
  713. murray.craig@cityoflondon.gov.uk
  714. nasrin.khan@cityoflondon.gov.uk
  715. nathalie.rebillon-lopez@cityoflondon.gov.uk
  716. neil.edkins@cityoflondon.gov.uk
  717. nestor.alfonzosantamaria@cityoflondon.gov.uk
  718. nicholas.anstee@cityoflondon.gov.uk
  719. nick.pouyioukkas@cityoflondon.gov.uk
  720. nicola.avery@cityoflondon.gov.uk
  721. nigel.challis@cityoflondon.gov.uk
  722. nigel.francis@cityoflondon.gov.uk
  723. officer@cityoflondon.gov.uk
  724. oluremi.ogunde@cityoflondon.gov.uk
  725. pam.rampasard@cityoflondon.gov.uk
  726. paola.galley@cityoflondon.gov.uk
  727. patricia.jones@cityoflondon.gov.uk
  728. paul.crudgington@cityoflondon.gov.uk
  729. paul.hutson@cityoflondon.gov.uk
  730. paul.maskell@cityoflondon.gov.uk
  731. paul.taylor@cityoflondon.gov.uk
  732. paula.jackson@cityoflondon.gov.uk
  733. paula.walton@cityoflondon.gov.uk
  734. pauline.halliday@cityoflondon.gov.uk
  735. peter.brett@cityoflondon.gov.uk
  736. peter.davenport@cityoflondon.gov.uk
  737. peter.henson@cityoflondon.gov.uk
  738. peter.shadbolt@cityoflondon.gov.uk
  739. petra.sprowson@cityoflondon.gov.uk
  740. philip.jordan@cityoflondon.gov.uk
  741. pixel-1585627870370944-web-@cityoflondon.gov.uk
  742. porthealth.denton@cityoflondon.gov.uk
  743. porthealth@cityoflondon.gov.uk
  744. pro@cityoflondon.gov.uk
  745. publicprotection@cityoflondon.gov.uk
  746. rachel.sambells@cityoflondon.gov.uk
  747. raymond.sibson@cityoflondon.gov.uk
  748. rdr@cityoflondon.gov.uk
  749. rex.egesi@cityoflondon.gov.uk
  750. richard.anshuh@cityoflondon.gov.uk
  751. richard.chamberlain@cityoflondon.gov.uk
  752. richard.gentry@cityoflondon.gov.uk
  753. robert.butcher@cityoflondon.gov.uk
  754. robert.michell@cityoflondon.gov.uk
  755. robert.quest@cityoflondon.gov.uk
  756. robert.renwick@cityoflondon.gov.uk
  757. roger.adams@cityoflondon.gov.uk
  758. rory.pereira@cityoflondon.gov.uk
  759. rosalina.banfield@cityoflondon.gov.uk
  760. rosemarie.garcia@cityoflondon.gov.uk
  761. ruth.calderwood@cityoflondon.gov.uk
  762. ruth.duston@cityoflondon.gov.uk
  763. ryan.clark@cityoflondon.gov.uk
  764. safercity@cityoflondon.gov.uk
  765. sailesh.shah@cityoflondon.gov.uk
  766. sandra.davidson@cityoflondon.gov.uk
  767. sanjay.odedra@cityoflondon.gov.uk
  768. sara.pink@cityoflondon.gov.uk
  769. sarah.leigh@cityoflondon.gov.uk
  770. scott.mcelwaine@cityoflondon.gov.uk
  771. seamus.mckenna@cityoflondon.gov.uk
  772. sharon.brosnan@cityoflondon.gov.uk
  773. sheila.huntley@cityoflondon.gov.uk
  774. sheila.kingsland@cityoflondon.gov.uk
  775. shoelane@cityoflondon.gov.uk
  776. sid.brewer@cityoflondon.gov.uk
  777. siobhan.marshall@cityoflondon.gov.uk
  778. sonia.solicari@cityoflondon.gov.uk
  779. sophie.jordan@cityoflondon.gov.uk
  780. sophie.lillington@cityoflondon.gov.uk
  781. soraya.john-baptiste@cityoflondon.gov.uk
  782. steve.blake@cityoflondon.gov.uk
  783. steve.higgon@cityoflondon.gov.uk
  784. steve.kelly@cityoflondon.gov.uk
  785. steve.presland@cityoflondon.gov.uk
  786. steven.bender@cityoflondon.gov.uk
  787. steven.skurr@cityoflondon.gov.uk
  788. stuart.morrison@cityoflondon.gov.uk
  789. stuart.smith@cityoflondon.gov.uk
  790. sukhjit.gill@cityoflondon.gov.uk
  791. susan.pearson@cityoflondon.gov.uk
  792. suzanne.wilding@cityoflondon.gov.uk
  793. tak.chung@cityoflondon.gov.uk
  794. tania.mauro@cityoflondon.gov.uk
  795. terence.short@cityoflondon.gov.uk
  796. terry.coulthrust@cityoflondon.gov.uk
  797. terry.patten@cityoflondon.gov.uk
  798. terry.rowhan@cityoflondon.gov.uk
  799. terry.sore@cityoflondon.gov.uk
  800. thecitycentre@cityoflondon.gov.uk
  801. tina.garwood@cityoflondon.gov.uk
  802. tom.hoffman@cityoflondon.gov.uk
  803. tom.hughes@cityoflondon.gov.uk
  804. tony.halmos@cityoflondon.gov.uk
  805. tracy.williams@cityoflondon.gov.uk
  806. val.lawrence@cityoflondon.gov.uk
  807. verity.creamer@cityoflondon.gov.uk
  808. vicki.wells@cityoflondon.gov.uk
  809. vikki.edwards@cityoflondon.gov.uk
  810. vince.dignam@cityoflondon.gov.uk
  811. wayne.garrigan@cityoflondon.gov.uk
  812. wells@cityoflondon.gov.uk
  813. wendy.mead@cityoflondon.gov.uk
  814. wootton@cityoflondon.gov.uk
  815. zoe.nation@cityoflondon.gov.uk
  816.  
  817. [*] Hosts found: 345
  818. ---------------------
  819. biztalk.cityoflondon.gov.uk:80.169.89.97
  820. biztalk.cityoflondon.gov.uk:80.169.89.97
  821. capitacloud.cityoflondon.gov.uk:
  822. capitacloud2.cityoflondon.gov.uk:
  823. capitacloud2.cityoflondon.gov.uk:
  824. capitacloud3.cityoflondon.gov.uk:
  825. capitacloud3.cityoflondon.gov.uk:
  826. careers.cityoflondon.gov.uk:77.104.134.194
  827. careers.cityoflondon.gov.uk:77.104.134.194
  828. careers.cityoflondon.gov.uk:77.104.134.194
  829. careers.cityoflondon.gov.uk:77.104.134.194
  830. careers.cityoflondon.gov.uk:77.104.134.194
  831. careers.cityoflondon.gov.uk:77.104.134.194
  832. cisco.cityoflondon.gov.uk:
  833. citybenefits.cityoflondon.gov.uk:134.213.36.31
  834. citybenefits.cityoflondon.gov.uk:134.213.36.31
  835. citybenefits.cityoflondon.gov.uk:134.213.36.31
  836. cityoflondon.gov.uk:80.169.89.102
  837. cityoflondon.gov.uk:80.169.89.102
  838. cityoflondon.gov.uk:80.169.89.102
  839. cityoflondon.gov.uk:80.169.89.102
  840. cityoflondon.gov.uk/about-the-city/history/pages/how-to-apply.aspx:
  841. cityoflondon.gov.uk/corporation/:
  842. cityoflondon.gov.uk/corporation/homepage.htm:
  843. cityoflondon.gov.uk/corporation/leisure_heritage/:
  844. cityoflondon.gov.uk/media_centre/files/future_stock_exchanges.htm:
  845. cityoflondon.gov.uk/nr/:
  846. cityoflondon.gov.uk/nr/rdonlyres/08a4077b-:
  847. cityoflondon.gov.uk/nr/rdonlyres/35263589-5a42-:
  848. cityoflondon.gov.uk/nr/rdonlyres/c9c2a52b-:
  849. cityoflondon.gov.uk/pages/default.aspx:
  850. cityoflondon.gov.uk/search/results.aspx:
  851. cityoflondon.gov.uk/services/transport-and-streets/parking/pages/car-parks.aspx:
  852. cityoflondon.gov.uk/stct:
  853. collage-researcher.cityoflondon.gov.uk:35.176.130.30, 3.11.208.146
  854. collage-researcher.cityoflondon.gov.uk:35.176.130.30, 3.11.208.146
  855. collage.cityoflondon.gov.uk:35.176.130.30, 3.11.208.146
  856. collage.cityoflondon.gov.uk:3.11.208.146, 35.176.130.30
  857. collage.cityoflondon.gov.uk:35.176.130.30, 3.11.208.146
  858. collage.cityoflondon.gov.uk:3.11.208.146, 35.176.130.30
  859. collage.cityoflondon.gov.uk:35.176.130.30, 3.11.208.146
  860. collage.cityoflondon.gov.uk:35.176.130.30, 3.11.208.146
  861. collage.cityoflondon.gov.uk:3.11.208.146, 35.176.130.30
  862. collage.cityoflondon.gov.uk:35.176.130.30, 3.11.208.146
  863. collage.cityoflondon.gov.uk:3.11.208.146, 35.176.130.30
  864. collage.cityoflondon.gov.uk:35.176.130.30, 3.11.208.146
  865. consult.cityoflondon.gov.uk:31.25.189.114
  866. consult.cityoflondon.gov.uk:31.25.189.114
  867. consult.cityoflondon.gov.uk:31.25.189.114
  868. consult.cityoflondon.gov.uk:31.25.189.114
  869. consult.cityoflondon.gov.uk:31.25.189.114
  870. contracts.cityoflondon.gov.uk:188.95.135.70
  871. contracts.cityoflondon.gov.uk:188.95.135.70
  872. cwi.cityoflondon.gov.uk:
  873. cwi.cityoflondon.gov.uk:
  874. cwi.cityoflondon.gov.uk:
  875. cwidr.cityoflondon.gov.uk:
  876. democracy.cityoflondon.gov.uk:80.169.89.107
  877. democracy.cityoflondon.gov.uk:80.169.89.107
  878. democracy.cityoflondon.gov.uk:80.169.89.107
  879. democracy.cityoflondon.gov.uk:80.169.89.107
  880. democracy.cityoflondon.gov.uk:80.169.89.107
  881. democracy.cityoflondon.gov.uk:80.169.89.107
  882. democracy.cityoflondon.gov.uk:80.169.89.107
  883. democracy.cityoflondon.gov.uk:80.169.89.107
  884. democracy.cityoflondon.gov.uk:80.169.89.107
  885. dwp-cis.cityoflondon.gov.uk:
  886. edge.cityoflondon.gov.uk:
  887. eemocracy.cityoflondon.gov.uk:
  888. elearning.cityoflondon.gov.uk:146.177.9.125
  889. elearning.cityoflondon.gov.uk:146.177.9.125
  890. elearning.cityoflondon.gov.uk:146.177.9.125
  891. elearning.cityoflondon.gov.uk:146.177.9.125
  892. email.cityoflondon.gov.uk:91.206.118.10
  893. email.cityoflondon.gov.uk:91.206.118.10
  894. email.cityoflondon.gov.uk:91.206.118.10
  895. email.cityoflondon.gov.uk:91.206.118.10
  896. email.cityoflondon.gov.uk:91.206.118.10
  897. email.cityoflondon.gov.uk:91.206.118.10
  898. emocracy.cityoflondon.gov.uk:
  899. ext.cityoflondon.gov.uk:80.169.89.106
  900. ext.cityoflondon.gov.uk:80.169.89.106
  901. eyp.cityoflondon.gov.uk:193.34.187.146
  902. fdonline.cityoflondon.gov.uk:80.169.89.106
  903. fdonline.cityoflondon.gov.uk:80.169.89.106
  904. fdonline.cityoflondon.gov.uk:80.169.89.106
  905. femocracy.cityoflondon.gov.uk:
  906. fyi.cityoflondon.gov.uk:193.34.187.147
  907. fyi.cityoflondon.gov.uk:193.34.187.147
  908. fyi.cityoflondon.gov.uk:193.34.187.147
  909. fyi.cityoflondon.gov.uk:193.34.187.147
  910. fyi.cityoflondon.gov.uk:193.34.187.147
  911. fypsd.cityoflondon.gov.uk:80.169.89.101
  912. fypsd.cityoflondon.gov.uk:80.169.89.101
  913. fypsd.cityoflondon.gov.uk:80.169.89.101
  914. fypsd.cityoflondon.gov.uk:80.169.89.101
  915. guildhall.cityoflondon.gov.uk:
  916. guildhall.cityoflondon.gov.uk:
  917. guildhall.cityoflondon.gov.uk:
  918. guildhall.cityoflondon.gov.uk:
  919. guildhallartgallery.cityoflondon.gov.uk:
  920. guildhallartgallery.cityoflondon.gov.uk:
  921. highwaysreporting.cityoflondon.gov.uk:89.145.127.203
  922. highwaysreporting.cityoflondon.gov.uk:89.145.127.203
  923. highwaysreporting.cityoflondon.gov.uk:89.145.127.203
  924. highwaysreporting.cityoflondon.gov.uk:89.145.127.203
  925. highwaysreporting.cityoflondon.gov.uk:89.145.127.203
  926. host13.cityoflondon.gov.uk:
  927. housingselfservice.cityoflondon.gov.uk:195.20.223.214
  928. housingselfservice.cityoflondon.gov.uk:195.20.223.214
  929. hybrid.cityoflondon.gov.uk:195.20.223.210, 195.20.223.245
  930. hybrid.cityoflondon.gov.uk:195.20.223.245, 195.20.223.210
  931. hyms.cityoflondon.gov.uk:195.171.176.92
  932. hyms.cityoflondon.gov.uk:195.171.176.92
  933. hyms.cityoflondon.gov.uk:195.171.176.92
  934. intranet.cityoflondon.gov.uk:
  935. jobs.cityoflondon.gov.uk:104.22.15.166, 104.22.14.166
  936. jobs.cityoflondon.gov.uk:104.22.14.166, 104.22.15.166
  937. jobs.cityoflondon.gov.uk:104.22.14.166, 104.22.15.166
  938. jobs.cityoflondon.gov.uk:104.22.15.166, 104.22.14.166
  939. jobs.cityoflondon.gov.uk:104.22.15.166, 104.22.14.166
  940. jobs.cityoflondon.gov.uk:104.22.14.166, 104.22.15.166
  941. keatshouse.cityoflondon.gov.uk:
  942. keatshouse.cityoflondon.gov.uk:
  943. keatshouse.cityoflondon.gov.uk:
  944. ldfconsultation.cityoflondon.gov.uk:195.12.22.232
  945. ldfconsultation.cityoflondon.gov.uk:195.12.22.232
  946. learningzone.cityoflondon.gov.uk:31.25.189.168
  947. learningzone.cityoflondon.gov.uk:31.25.189.168
  948. learningzone.cityoflondon.gov.uk:31.25.189.168
  949. learningzone.cityoflondon.gov.uk:31.25.189.168
  950. learningzone.cityoflondon.gov.uk:31.25.189.168
  951. librarycatalogue.cityoflondon.gov.uk:217.169.37.149
  952. librarycatalogue.cityoflondon.gov.uk:217.169.37.149
  953. librarycatalogue.cityoflondon.gov.uk:217.169.37.149
  954. librarycatalogue.cityoflondon.gov.uk:217.169.37.149
  955. lovethesquaremile.cityoflondon.gov.uk:51.140.85.106
  956. lovethesquaremile.cityoflondon.gov.uk:51.140.85.106
  957. lovethesquaremile.cityoflondon.gov.uk:51.140.85.106
  958. lovethesquaremile.cityoflondon.gov.uk:51.140.85.106
  959. lovethesquaremile.cityoflondon.gov.uk:51.140.85.106
  960. lovethesquaremile.cityoflondon.gov.uk:51.140.85.106
  961. mail.consult.cityoflondon.gov.uk:
  962. mail1.cityoflondon.gov.uk:80.169.89.80
  963. mail1.cityoflondon.gov.uk:80.169.89.80
  964. mail2.cityoflondon.gov.uk:80.169.89.106
  965. mail2.cityoflondon.gov.uk:80.169.89.106
  966. mapping.cityoflondon.gov.uk:195.171.176.88
  967. mapping.cityoflondon.gov.uk:195.171.176.88
  968. mapping.cityoflondon.gov.uk:195.171.176.88
  969. mapping.cityoflondon.gov.uk:195.171.176.88
  970. mobile.cityoflondon.gov.uk:80.169.89.102
  971. mobile.cityoflondon.gov.uk:80.169.89.102
  972. mobile.cityoflondon.gov.uk:80.169.89.102
  973. mobile01.cityoflondon.gov.uk:195.20.223.213
  974. mobile01.cityoflondon.gov.uk:195.20.223.213
  975. news.cityoflondon.gov.uk:52.50.147.113, 52.31.6.52, 18.203.123.9
  976. news.cityoflondon.gov.uk:18.203.123.9, 52.31.6.52, 52.50.147.113
  977. news.cityoflondon.gov.uk:52.50.147.113, 18.203.123.9, 52.31.6.52
  978. news.cityoflondon.gov.uk:18.203.123.9, 52.31.6.52, 52.50.147.113
  979. news.cityoflondon.gov.uk:52.50.147.113, 52.31.6.52, 18.203.123.9
  980. news.cityoflondon.gov.uk:52.50.147.113, 18.203.123.9, 52.31.6.52
  981. news.cityoflondon.gov.uk:52.31.6.52, 52.50.147.113, 18.203.123.9
  982. onlinecatalogue.cityoflondon.gov.uk:104.22.15.166, 104.22.14.166
  983. onlinecatalogue.cityoflondon.gov.uk:104.22.14.166, 104.22.15.166
  984. onlinecatalogue.cityoflondon.gov.uk:104.22.15.166, 104.22.14.166
  985. pcn.cityoflondon.gov.uk:104.22.15.166, 104.22.14.166
  986. pcn.cityoflondon.gov.uk:104.22.14.166, 104.22.15.166
  987. pcn.cityoflondon.gov.uk:104.22.15.166, 104.22.14.166
  988. pcn.cityoflondon.gov.uk:104.22.14.166, 104.22.15.166
  989. pcn.cityoflondon.gov.uk:104.22.15.166, 104.22.14.166
  990. pcn.cityoflondon.gov.uk:104.22.14.166, 104.22.15.166
  991. pcn.cityoflondon.gov.uk:104.22.15.166, 104.22.14.166
  992. pcn.cityoflondon.gov.uk:104.22.14.166, 104.22.15.166
  993. pcn.cityoflondon.gov.uk:104.22.15.166, 104.22.14.166
  994. planning2.cityoflondon.gov.uk:
  995. planning2.cityoflondon.gov.uk:
  996. planninguat.cityoflondon.gov.uk:
  997. production.cityoflondon.gov.uk:104.22.15.166, 104.22.14.166
  998. remote.cityoflondon.gov.uk:52.59.241.213
  999. remote.cityoflondon.gov.uk:52.59.241.213
  1000. remote.cityoflondon.gov.uk:52.59.241.213
  1001. remote.cityoflondon.gov.uk:52.59.241.213
  1002. remotedr.cityoflondon.gov.uk:
  1003. revenues.cityoflondon.gov.uk:104.22.14.166, 104.22.15.166
  1004. revenues.cityoflondon.gov.uk:104.22.14.166, 104.22.15.166
  1005. revenues.cityoflondon.gov.uk:104.22.15.166, 104.22.14.166
  1006. revenues.cityoflondon.gov.uk:104.22.14.166, 104.22.15.166
  1007. semocracy.cityoflondon.gov.uk:
  1008. shop.cityoflondon.gov.uk:23.227.38.32
  1009. shop.cityoflondon.gov.uk:23.227.38.32
  1010. shop.cityoflondon.gov.uk:23.227.38.32
  1011. shop.cityoflondon.gov.uk:23.227.38.32
  1012. sip.cityoflondon.gov.uk:52.113.64.147
  1013. sip.cityoflondon.gov.uk:52.113.64.147
  1014. sni.cloudflaressl.com:104.22.62.243, 104.22.63.243
  1015. sp2.cityoflondon.gov.uk:
  1016. sp2.cityoflondon.gov.uk:
  1017. sts.cityoflondon.gov.uk:80.169.89.84, 80.169.89.100
  1018. sts.cityoflondon.gov.uk:80.169.89.100, 80.169.89.84
  1019. tokenbookslma.cityoflondon.gov.uk:
  1020. townclerk.cityoflondon.gov.uk:
  1021. u00careers.cityoflondon.gov.uk:
  1022. u00email.cityoflondon.gov.uk:
  1023. u00news.cityoflondon.gov.uk:
  1024. u00www.cityoflondon.gov.uk:
  1025. wholesalemarkets.cityoflondon.gov.uk:134.213.214.65
  1026. wholesalemarkets.cityoflondon.gov.uk:134.213.214.65
  1027. wholesalemarkets.cityoflondon.gov.uk:134.213.214.65
  1028. wholesalemarkets.cityoflondon.gov.uk:134.213.214.65
  1029. ws1.cityoflondon.gov.uk:
  1030. www.careers.cityoflondon.gov.uk:
  1031. www.careers.cityoflondon.gov.uk:
  1032. www.cityoflondon.gov.uk:80.169.89.102
  1033. www.cityoflondon.gov.uk:80.169.89.102
  1034. www.cityoflondon.gov.uk:80.169.89.102
  1035. www.cityoflondon.gov.uk:80.169.89.102
  1036. www.cityoflondon.gov.uk:80.169.89.102
  1037. www.cityoflondon.gov.uk:80.169.89.102
  1038. www.cityoflondon.gov.uk:80.169.89.102
  1039. www.cityoflondon.gov.uk:80.169.89.102
  1040. www.cityoflondon.gov.uk:80.169.89.102
  1041. www.cityoflondon.gov.uk:80.169.89.102
  1042. www.cityoflondon.gov.uk:80.169.89.102
  1043. www.cityoflondon.gov.uk:80.169.89.102
  1044. www.cityoflondon.gov.uk:80.169.89.102
  1045. www.collage.cityoflondon.gov.uk:
  1046. www.collage.cityoflondon.gov.uk:
  1047. www.consult.cityoflondon.gov.uk:31.25.189.114
  1048. www.consult.cityoflondon.gov.uk:31.25.189.114
  1049. www.consult.cityoflondon.gov.uk:31.25.189.114
  1050. www.democracy.cityoflondon.gov.uk:
  1051. www.elearning.cityoflondon.gov.uk:
  1052. www.fyi.cityoflondon.gov.uk:193.34.187.147
  1053. www.fyi.cityoflondon.gov.uk:193.34.187.147
  1054. www.fyi.cityoflondon.gov.uk:193.34.187.147
  1055. www.fyi.cityoflondon.gov.uk:193.34.187.147
  1056. www.fyi.cityoflondon.gov.uk:193.34.187.147
  1057. www.fyi.cityoflondon.gov.uk:193.34.187.147
  1058. www.guildhall.cityoflondon.gov.uk:176.32.230.9
  1059. www.guildhall.cityoflondon.gov.uk:176.32.230.9
  1060. www.guildhall.cityoflondon.gov.uk:176.32.230.9
  1061. www.guildhall.cityoflondon.gov.uk:176.32.230.9
  1062. www.guildhall.cityoflondon.gov.uk:176.32.230.9
  1063. www.guildhall.cityoflondon.gov.uk:176.32.230.9
  1064. www.guildhall.cityoflondon.gov.uk:176.32.230.9
  1065. www.guildhall.cityoflondon.gov.uk:176.32.230.9
  1066. www.guildhallartgallery.cityoflondon.gov.uk:80.169.89.101
  1067. www.guildhallartgallery.cityoflondon.gov.uk:80.169.89.101
  1068. www.guildhallartgallery.cityoflondon.gov.uk:80.169.89.101
  1069. www.guildhallartgallery.cityoflondon.gov.uk:80.169.89.101
  1070. www.housingselfservice.cityoflondon.gov.uk:
  1071. www.keatshouse.cityoflondon.gov.uk:
  1072. www.keatshouse.cityoflondon.gov.uk:
  1073. www.keatshouse.cityoflondon.gov.uk:
  1074. www.keatshouse.cityoflondon.gov.uk:
  1075. www.learningzone.cityoflondon.gov.uk:
  1076. www.learningzone.cityoflondon.gov.uk:
  1077. www.learningzone.cityoflondon.gov.uk:
  1078. www.learningzone.cityoflondon.gov.uk:
  1079. www.learningzone.cityoflondon.gov.uk:
  1080. www.mapping.cityoflondon.gov.uk:195.171.176.88
  1081. www.mapping.cityoflondon.gov.uk:195.171.176.88
  1082. www.mapping.cityoflondon.gov.uk:195.171.176.88
  1083. www.mapping.cityoflondon.gov.uk:195.171.176.88
  1084. www.mapping.cityoflondon.gov.uk:195.171.176.88
  1085. www.mapping.cityoflondon.gov.uk:195.171.176.88
  1086. www.mapping.cityoflondon.gov.uk:195.171.176.88
  1087. www.mapping2.cityoflondon.gov.uk:195.171.176.90
  1088. www.mapping2.cityoflondon.gov.uk:195.171.176.90
  1089. www.mapping2.cityoflondon.gov.uk:195.171.176.90
  1090. www.mapping2.cityoflondon.gov.uk:195.171.176.90
  1091. www.mapping2.cityoflondon.gov.uk:195.171.176.90
  1092. www.planning.cityoflondon.gov.uk:85.92.209.141
  1093. www.planning.cityoflondon.gov.uk:85.92.209.141
  1094. www.planning.cityoflondon.gov.uk:85.92.209.141
  1095. www.planning.cityoflondon.gov.uk:85.92.209.141
  1096. www.planning2.cityoflondon.gov.uk:195.171.176.91
  1097. www.planning2.cityoflondon.gov.uk:195.171.176.91
  1098. www.planning2.cityoflondon.gov.uk:195.171.176.91
  1099. www.planning2.cityoflondon.gov.uk:195.171.176.91
  1100. www.planning2.cityoflondon.gov.uk:195.171.176.91
  1101. www.planning2.cityoflondon.gov.uk:195.171.176.91
  1102. www.remote.cityoflondon.gov.uk:
  1103. www.remote.cityoflondon.gov.uk:
  1104. www.tokenbookslma.cityoflondon.gov.uk:141.211.54.243
  1105. www.tokenbookslma.cityoflondon.gov.uk:141.211.54.243
  1106. www.tokenbookslma.cityoflondon.gov.uk:141.211.54.243
  1107. www1.cityoflondon.gov.uk:80.169.89.96
  1108. www1.cityoflondon.gov.uk:80.169.89.96
  1109. www1.cityoflondon.gov.uk:80.169.89.96
  1110. www1.cityoflondon.gov.uk:80.169.89.96
  1111. www1.cityoflondon.gov.uk:80.169.89.96
  1112. www2.cityoflondon.gov.uk:80.169.89.98
  1113. wwwstage.cityoflondon.gov.uk:104.22.14.166, 104.22.15.166
  1114. wwwstage.cityoflondon.gov.uk:104.22.14.166, 104.22.15.166
  1115. wwwstage.cityoflondon.gov.uk:104.22.15.166, 104.22.14.166
  1116. wwwstage.cityoflondon.gov.uk:104.22.14.166, 104.22.15.166
  1117. xemocracy.cityoflondon.gov.uk:
  1118.  
  1119. [*] Trello URLs found: 18
  1120. --------------------
  1121. https://trello.com/b/0vrqonpj/sgammaxis-pipeline
  1122. https://trello.com/b/1x85hecb/blog
  1123. https://trello.com/b/4hbytqj9/golondoninfo
  1124. https://trello.com/b/faxhwzze/uk-acts-of-parliament
  1125. https://trello.com/b/kmzaxwqy/space-time-mobile-self-storage
  1126. https://trello.com/b/ktkni9yj/admin-team
  1127. https://trello.com/b/lebr3heu/uk-acts-of-parliament
  1128. https://trello.com/b/o00atmzs/dc-quests
  1129. https://trello.com/b/pgi2qqb4/uk-medical-qualification-course
  1130. https://trello.com/b/pgsrsaoy/bonnie
  1131. https://trello.com/b/stn2unnu/uk-gala-dinners
  1132. https://trello.com/b/vbodrljf/greater-london-authority
  1133. https://trello.com/b/ykbjj7r5/united-kingdom-business-registrations
  1134. https://trello.com/c/glbmw15b/8-london-metropolitan-archives
  1135. https://trello.com/c/hpc4lmfp/12-london-metropolitan-archives
  1136. https://trello.com/c/p6ouwi3m/96-capital-city-of-london-england-united-kingdom-1807
  1137. https://trello.com/c/wti5v4cm/211-concert-in-the-trees-friday-18th
  1138. https://trello.com/c/xjyg0uca/22-add-save-for-later-function-to-website
  1139. ################################################################################################################################
  1140. AVAILABLE PLUGINS
  1141. -----------------
  1142.  
  1143. HttpHeadersPlugin
  1144. CertificateInfoPlugin
  1145. HeartbleedPlugin
  1146. RobotPlugin
  1147. EarlyDataPlugin
  1148. OpenSslCipherSuitesPlugin
  1149. OpenSslCcsInjectionPlugin
  1150. SessionResumptionPlugin
  1151. SessionRenegotiationPlugin
  1152. CompressionPlugin
  1153. FallbackScsvPlugin
  1154.  
  1155.  
  1156.  
  1157. CHECKING HOST(S) AVAILABILITY
  1158. -----------------------------
  1159.  
  1160. 80.169.89.102:443 => 80.169.89.102
  1161.  
  1162.  
  1163.  
  1164.  
  1165. SCAN RESULTS FOR 80.169.89.102:443 - 80.169.89.102
  1166. --------------------------------------------------
  1167.  
  1168. * Downgrade Attacks:
  1169. TLS_FALLBACK_SCSV: OK - Supported
  1170.  
  1171. * SSLV2 Cipher Suites:
  1172. Server rejected all cipher suites.
  1173.  
  1174. * Deflate Compression:
  1175. OK - Compression disabled
  1176.  
  1177. * TLSV1_3 Cipher Suites:
  1178. Server rejected all cipher suites.
  1179.  
  1180. * Certificate Information:
  1181. Content
  1182. SHA1 Fingerprint: 414c9a2ce74fb30a5c45a40d2288a04393d74d99
  1183. Common Name: *.cityoflondon.gov.uk
  1184. Issuer: Entrust Certification Authority - L1K
  1185. Serial Number: 42593082139691491010162019823312957291
  1186. Not Before: 2019-01-09 10:15:04
  1187. Not After: 2021-01-09 10:45:03
  1188. Signature Algorithm: sha256
  1189. Public Key Algorithm: RSA
  1190. Key Size: 2048
  1191. Exponent: 65537 (0x10001)
  1192. DNS Subject Alternative Names: ['*.cityoflondon.gov.uk', 'cityoflondon.gov.uk']
  1193.  
  1194. Trust
  1195. Hostname Validation: FAILED - Certificate does NOT match 80.169.89.102
  1196. Android CA Store (9.0.0_r9): OK - Certificate is trusted
  1197. Apple CA Store (iOS 12, macOS 10.14, watchOS 5, and tvOS 12):OK - Certificate is trusted
  1198. Java CA Store (jdk-12.0.1): OK - Certificate is trusted
  1199. Mozilla CA Store (2019-03-14): OK - Certificate is trusted
  1200. Windows CA Store (2019-05-27): OK - Certificate is trusted
  1201. Symantec 2018 Deprecation: WARNING: Certificate distrusted by Google and Mozilla on September 2018
  1202. Received Chain: *.cityoflondon.gov.uk --> Entrust Certification Authority - L1K --> Entrust Root Certification Authority - G2
  1203. Verified Chain: *.cityoflondon.gov.uk --> Entrust Certification Authority - L1K --> Entrust Root Certification Authority - G2
  1204. Received Chain Contains Anchor: WARNING - Received certificate chain contains the anchor certificate
  1205. Received Chain Order: OK - Order is valid
  1206. Verified Chain contains SHA1: OK - No SHA1-signed certificate in the verified certificate chain
  1207.  
  1208. Extensions
  1209. OCSP Must-Staple: NOT SUPPORTED - Extension not found
  1210. Certificate Transparency: OK - 4 SCTs included
  1211.  
  1212. OCSP Stapling
  1213. NOT SUPPORTED - Server did not send back an OCSP response
  1214.  
  1215. * TLSV1_1 Cipher Suites:
  1216. Server rejected all cipher suites.
  1217.  
  1218. * OpenSSL CCS Injection:
  1219. OK - Not vulnerable to OpenSSL CCS injection
  1220.  
  1221. * OpenSSL Heartbleed:
  1222. OK - Not vulnerable to Heartbleed
  1223.  
  1224. * TLSV1 Cipher Suites:
  1225. Server rejected all cipher suites.
  1226.  
  1227. * TLS 1.2 Session Resumption Support:
  1228. With Session IDs: OK - Supported (5 successful, 0 failed, 0 errors, 5 total attempts).
  1229. With TLS Tickets: NOT SUPPORTED - TLS ticket not assigned.
  1230.  
  1231. * Session Renegotiation:
  1232. Client-initiated Renegotiation: VULNERABLE - Server honors client-initiated renegotiations
  1233. Secure Renegotiation: OK - Supported
  1234.  
  1235. * TLSV1_2 Cipher Suites:
  1236. Forward Secrecy OK - Supported
  1237. RC4 OK - Not Supported
  1238.  
  1239. Preferred:
  1240. TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 302 Redirect - https://80.169.89.102/Pages/default.aspx
  1241. Accepted:
  1242. TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 302 Redirect - https://80.169.89.102/Pages/default.aspx
  1243. TLS_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 302 Redirect - https://80.169.89.102/Pages/default.aspx
  1244. TLS_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 302 Redirect - https://80.169.89.102/Pages/default.aspx
  1245. TLS_RSA_WITH_AES_256_CBC_SHA256 256 bits HTTP 302 Redirect - https://80.169.89.102/Pages/default.aspx
  1246. TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 302 Redirect - https://80.169.89.102/Pages/default.aspx
  1247. TLS_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 302 Redirect - https://80.169.89.102/Pages/default.aspx
  1248. TLS_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 302 Redirect - https://80.169.89.102/Pages/default.aspx
  1249. TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 302 Redirect - https://80.169.89.102/Pages/default.aspx
  1250. TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 302 Redirect - https://80.169.89.102/Pages/default.aspx
  1251. TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 256 bits HTTP 302 Redirect - https://80.169.89.102/Pages/default.aspx
  1252. TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 302 Redirect - https://80.169.89.102/Pages/default.aspx
  1253. TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 302 Redirect - https://80.169.89.102/Pages/default.aspx
  1254. TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 302 Redirect - https://80.169.89.102/Pages/default.aspx
  1255. TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 302 Redirect - https://80.169.89.102/Pages/default.aspx
  1256.  
  1257. * SSLV3 Cipher Suites:
  1258. Server rejected all cipher suites.
  1259.  
  1260. * ROBOT Attack:
  1261. OK - Not vulnerable
  1262.  
  1263.  
  1264. SCAN COMPLETED IN 24.98 S
  1265. -------------------------
  1266. ################################################################################################################################
  1267. [+] Target : https://www.cityoflondon.gov.uk
  1268.  
  1269. [+] IP Address : 80.169.89.102
  1270.  
  1271. [+] Headers :
  1272.  
  1273. [+] Cache-Control : private
  1274. [+] Content-Type : text/html; charset=utf-8
  1275. [+] Content-Encoding : gzip
  1276. [+] Expires : Tue, 31 Mar 2020 04:21:08 GMT
  1277. [+] Vary : Accept-Encoding
  1278. [+] Server : Microsoft-IIS/7.5
  1279. [+] SPRequestGuid : 377e7433-aca1-409f-97ec-c413b79efbd9
  1280. [+] X-SharePointHealthScore : 0
  1281. [+] X-AspNet-Version : 2.0.50727
  1282. [+] X-Powered-By : ASP.NET
  1283. [+] MicrosoftSharePointTeamServices : 14.0.0.7239
  1284. [+] X-MS-InvokeApp : 1; RequireReadOnly
  1285. [+] Date : Tue, 31 Mar 2020 04:19:00 GMT
  1286. [+] Content-Length : 8648
  1287.  
  1288. [!] SSL Certificate Information :
  1289.  
  1290. [+] countryName : GB
  1291. [+] localityName : London
  1292. [+] organizationName : City of London Corporation
  1293. [+] commonName : *.cityoflondon.gov.uk
  1294. [+] countryName : US
  1295. [+] organizationName : Entrust, Inc.
  1296. [+] organizationalUnitName : (c) 2012 Entrust, Inc. - for authorized use only
  1297. [+] commonName : Entrust Certification Authority - L1K
  1298. [+] version : 3
  1299. [+] serialNumber : 200B2115536F6E220000000050EBEF6B
  1300. [+] notBefore : Jan 9 10:15:04 2019 GMT
  1301. [+] notAfter : Jan 9 10:45:03 2021 GMT
  1302. [+] OCSP : http://ocsp.entrust.net
  1303. [+] caIssuers : http://aia.entrust.net/l1k-chain256.cer
  1304. [+] crlDistributionPoints : http://crl.entrust.net/level1k.crl
  1305.  
  1306. [!] Whois Lookup :
  1307.  
  1308. [+] asn_registry : ripencc
  1309. [+] asn : 8220
  1310. [+] asn_cidr : 80.169.0.0/16
  1311. [+] asn_country_code : GB
  1312. [+] asn_date : 2003-03-28
  1313. [+] query : 80.169.89.102
  1314. [+] cidr : 80.169.89.96/28
  1315. [+] name : NET-GB-AGILISYS-LTD
  1316. [+] handle : DR6199-RIPE
  1317. [+] range : 80.169.89.96 - 80.169.89.111
  1318. [+] description : AGILISYS LTD
  1319. [+] country : GB
  1320. [+] address : AGILISYS UNIT 13 VOLT AVENUE LONDON NW106PN United Kingdom
  1321. [+] created : 2015-02-19T14:42:23Z
  1322. [+] updated : 2015-02-19T14:42:23Z
  1323. [+] cidr : 80.169.0.0/16
  1324. [+] range : 80.169.0.0/16
  1325. [+] description : COLT
  1326. [+] emails : ['abuse@colt.net']
  1327. [+] created : 2003-04-01T12:11:15Z
  1328. [+] updated : 2012-02-10T14:30:48Z
  1329.  
  1330. [!] Starting DNS Enumeration...
  1331.  
  1332. [+] cityoflondon.gov.uk. 1799 IN SOA jake.ns.cloudflare.com. dns.cloudflare.com. 2033627693 10000 2400 604800 3600
  1333. [+] cityoflondon.gov.uk. 299 IN MX 1 cityoflondon-gov-uk.mail.protection.outlook.com.
  1334. [+] cityoflondon.gov.uk. 3788 IN HINFO 075246433834383200
  1335. [+] cityoflondon.gov.uk. 21599 IN NS jake.ns.cloudflare.com.
  1336. [+] cityoflondon.gov.uk. 299 IN A 80.169.89.102
  1337. [+] cityoflondon.gov.uk. 119 IN TXT "v=spf1 ip4:23.227.38.64/32 include:sp2.cityoflondon.gov.uk include:spf.protection.outlook.com include:mailcontrol.com include:servers.mcsv.net include:customers.clickdimensions.com -all"
  1338. [+] cityoflondon.gov.uk. 119 IN TXT "MS=ms45080239"
  1339. [+] cityoflondon.gov.uk. 119 IN TXT "v=msv1t=0F2DCBB1-D8B0-4698-9721-6B2B48AA12AD"
  1340. [+] cityoflondon.gov.uk. 21599 IN NS treasure.ns.cloudflare.com.
  1341. [+] cityoflondon.gov.uk. 119 IN TXT "Z6qxeDy0jOHWN2UQVDa4jnTnX9tNBG4nZ3TSEegiBUyI1p353x11ce/W4sgbxFySXXUlc2QmY8itoEXnTR0kKw=="
  1342. [+] _dmarc.cityoflondon.gov.uk. 3599 IN TXT "v=DMARC1;p=reject;sp=reject;pct=100;rua=mailto:dmarc-rua@dmarc.service.gov.uk"
  1343.  
  1344. [!] Starting Sub-Domain Enumeration...
  1345.  
  1346. [!] Requesting BuffOver
  1347. [!] Requesting ThreadCrowd
  1348. [!] Requesting crt.sh
  1349. [!] Requesting AnubisDB
  1350. [!] Requesting ThreatMiner
  1351.  
  1352. [+] Results :
  1353.  
  1354. [+] shop.cityoflondon.gov.uk
  1355. [+] cs-cityoflondon.delib.net
  1356. [+] 31.25.189.114
  1357. [+] email.cityoflondon.gov.uk
  1358. [+] hybrid.cityoflondon.gov.uk
  1359. [+] 195.20.223.214
  1360. [+] sts.cityoflondon.gov.uk
  1361. [+] 91.206.118.10
  1362. [+] *.Mapping.CityofLondon.gov.uk
  1363. [+] remotedr.cityoflondon.gov.uk
  1364. [+] www.housingselfservice.cityoflondon.gov.uk
  1365. [+] 77.104.134.194
  1366. [+] www.cityoflondon.gov.uk
  1367. [+] www.consult.cityoflondon.gov.uk
  1368. [+] 195.171.176.88
  1369. [+] www1.cityoflondon.gov.uk
  1370. [+] highwaysreporting.cityoflondon.gov.uk
  1371. [+] www.elearning.cityoflondon.gov.uk
  1372. [+] fyi.cityoflondon.gov.uk
  1373. [+] cwidr.cityoflondon.gov.uk
  1374. [+] mail1.cityoflondon.gov.uk
  1375. [+] Mapping.CityofLondon.gov.uk
  1376. [+] Hyms.cityoflondon.gov.uk
  1377. [+] lovethesquaremile.cityoflondon.gov.uk
  1378. [+] democracy.cityoflondon.gov.uk
  1379. [+] collage.cityoflondon.gov.uk
  1380. [+] dwp-cis.cityoflondon.gov.uk
  1381. [+] www.fyi.cityoflondon.gov.uk
  1382. [+] www.planninguat.cityoflondon.gov.uk
  1383. [+] learningzone.cityoflondon.gov.uk
  1384. [+] www.learningzone.cityoflondon.gov.uk
  1385. [+] keatshouse.cityoflondon.gov.uk
  1386. [+] 80.169.89.96
  1387. [+] Mobile01.cityoflondon.gov.uk
  1388. [+] sipdir.online.lync.com
  1389. [+] sip.cityoflondon.gov.uk
  1390. [+] jobs.cityoflondon.gov.uk
  1391. [+] Mobile01.Cityoflondon.gov.uk
  1392. [+] mail.consult.cityoflondon.gov.uk
  1393. [+] elearning.cityoflondon.gov.uk
  1394. [+] onlinecatalogue.cityoflondon.gov.uk
  1395. [+] 195.171.176.87
  1396. [+] remote.cityoflondon.gov.uk
  1397. [+] www.remote.cityoflondon.gov.uk
  1398. [+] capitacloud.cityoflondon.gov.uk
  1399. [+] www.planning2.cityoflondon.gov.uk
  1400. [+] 104.22.14.166
  1401. [+] 23.227.38.32
  1402. [+] townclerk.cityoflondon.gov.uk
  1403. [+] 104.22.15.166
  1404. [+] 195.171.176.90
  1405. [+] citybenefits.cityoflondon.gov.uk
  1406. [+] mobile.cityoflondon.gov.uk
  1407. [+] www.collage.cityoflondon.gov.uk
  1408. [+] www.careers.cityoflondon.gov.uk
  1409. [+] mobile01.cityoflondon.gov.uk
  1410. [+] biztalk.cityoflondon.gov.uk
  1411. [+] www.mapping2.cityoflondon.gov.uk
  1412. [+] capitacloud2.cityoflondon.gov.uk
  1413. [+] fypsd.cityoflondon.gov.uk
  1414. [+] cityoflondon.beyondtrustcloud.com
  1415. [+] news.cityoflondon.gov.uk
  1416. [+] wwwstage.cityoflondon.gov.uk
  1417. [+] cwi.cityoflondon.gov.uk
  1418. [+] lma.ibase.media
  1419. [+] 176.32.230.9
  1420. [+] 146.177.9.125
  1421. [+] 217.169.37.149
  1422. [+] www.mapping.cityoflondon.gov.uk
  1423. [+] www.guildhallartgallery.cityoflondon.gov.uk
  1424. [+] collage-researcher.cityoflondon.gov.uk
  1425. [+] ldfconsultation.cityoflondon.gov.uk
  1426. [+] www.guildhall.cityoflondon.gov.uk
  1427. [+] CityBenefits.cityoflondon.gov.uk
  1428. [+] housingselfservice.cityoflondon.gov.uk
  1429. [+] 195.12.22.232
  1430. [+] mail2.cityoflondon.gov.uk
  1431. [+] www.planning.cityoflondon.gov.uk
  1432. [+] 80.169.89.97
  1433. [+] 134.213.36.31
  1434. [+] *.cityoflondon.gov.uk
  1435. [+] planninguat.cityoflondon.gov.uk
  1436. [+] 80.169.89.106
  1437. [+] contracts.cityoflondon.gov.uk
  1438. [+] edge.cityoflondon.gov.uk
  1439. [+] 80.169.89.102
  1440. [+] ext.cityoflondon.gov.uk
  1441. [+] consult.cityoflondon.gov.uk
  1442. [+] revenues.cityoflondon.gov.uk
  1443. [+] 80.169.89.80
  1444. [+] pcn.cityoflondon.gov.uk
  1445. [+] 31.25.189.168
  1446. [+] planning2.cityoflondon.gov.uk
  1447. [+] 195.20.223.213
  1448. [+] fdonline.cityoflondon.gov.uk
  1449. [+] www.keatshouse.cityoflondon.gov.uk
  1450. [+] librarycatalogue.cityoflondon.gov.uk
  1451. [+] 80.169.89.107
  1452. [+] hyms.cityoflondon.gov.uk
  1453. [+] 195.171.176.91
  1454. [+] www.tokenbookslma.cityoflondon.gov.uk
  1455. [+] mapping.cityoflondon.gov.uk
  1456. [+] eyp.cityoflondon.gov.uk
  1457. [+] careers.cityoflondon.gov.uk
  1458. [+] 80.169.89.101
  1459. [+] wholesalemarkets.cityoflondon.gov.uk
  1460.  
  1461. [+] Total Found : 106
  1462.  
  1463. [+] Port : 33434
  1464. [+] Timeout : 1.0
  1465.  
  1466. [!] Starting UDP Traceroute...
  1467.  
  1468. HOPS IP HOST
  1469.  
  1470. 1 10.203.9.1 _gateway
  1471. 2 45.131.5.3 Unknown
  1472. 3 109.236.95.226 Unknown
  1473. 4 109.236.95.108 Unknown
  1474. 5 80.249.208.236 et-0-0-1-pr2.AMS.router.colt.net
  1475. 6 212.74.75.37 Unknown
  1476. 7 212.74.75.37 Unknown
  1477. 8 80.169.196.38 cpeuk_lon002520.ia.colt.net
  1478. 9 195.110.81.4 Unknown
  1479. 10 * * *
  1480. 11 * * *
  1481. 12 * * *
  1482. 13 * * *
  1483. 14 * * *
  1484. 15 * * *
  1485. 16 * * *
  1486. 17 * * *
  1487. 18 * * *
  1488. 19 * * *
  1489. 20 * * *
  1490. 21 * * *
  1491. 22 * * *
  1492. 23 * * *
  1493. 24 * * *
  1494. 25 * * *
  1495. 26 * * *
  1496. 27 * * *
  1497. 28 * * *
  1498. 29 * * *
  1499. 30 * * *
  1500.  
  1501. [!] Starting Port Scan...
  1502.  
  1503. [+] Testing Top 1000 Ports...
  1504.  
  1505.  
  1506. [!] Starting Crawler...
  1507.  
  1508. [+] Looking for robots.txt........[ Not Found ]
  1509. [+] Looking for sitemap.xml.......[ Found ]
  1510. [+] Extracting sitemap Links......[ 2664 ]
  1511. [+] Extracting CSS Links..........[ 2 ]
  1512. [+] Extracting Javascript Links...[ 2 ]
  1513. [+] Extracting Internal Links.....[ 6 ]
  1514. [+] Extracting External Links.....[ 3 ]
  1515. [+] Extracting Images.............[ 13 ]
  1516. [+] Crawling Sitemaps.............[ 0 ]
  1517. [+] Crawling Javascripts..........[ 0 ]
  1518.  
  1519. [+] Total Unique Links Extracted : 2690
  1520.  
  1521. [!] Starting Directory Search...
  1522.  
  1523. [+] Threads : 50
  1524. [+] Timeout : 10.0
  1525. [+] Wordlist : wordlists/dirb_common.txt
  1526. [+] Allow Redirects : False
  1527. [+] SSL Verification : True
  1528. [+] DNS Servers : 1.1.1.1
  1529.  
  1530. [+] 302 | https://www.cityoflondon.gov.uk/
  1531. [+] 301 | https://www.cityoflondon.gov.uk/_layouts
  1532. [+] 301 | https://www.cityoflondon.gov.uk/_vti_bin
  1533. [+] 200 | https://www.cityoflondon.gov.uk/_vti_bin/_vti_adm/admin.dll
  1534. [+] 200 | https://www.cityoflondon.gov.uk/_vti_bin/_vti_aut/author.dll
  1535. [+] 200 | https://www.cityoflondon.gov.uk/_vti_bin/shtml.dll
  1536. [+] 301 | https://www.cityoflondon.gov.uk/_vti_pvt
  1537. [+] 301 | https://www.cityoflondon.gov.uk/apply
  1538. [+] 301 | https://www.cityoflondon.gov.uk/asia
  1539. [+] 403 | https://www.cityoflondon.gov.uk/aspnet_client
  1540. [+] 301 | https://www.cityoflondon.gov.uk/basket
  1541. [+] 302 | https://www.cityoflondon.gov.uk/business
  1542. [+] 302 | https://www.cityoflondon.gov.uk/Business
  1543. [+] 301 | https://www.cityoflondon.gov.uk/ccs
  1544. [+] 301 | https://www.cityoflondon.gov.uk/china
  1545. [+] 301 | https://www.cityoflondon.gov.uk/contact
  1546. [+] 301 | https://www.cityoflondon.gov.uk/Contact
  1547. [+] 302 | https://www.cityoflondon.gov.uk/contact-us
  1548. [+] 302 | https://www.cityoflondon.gov.uk/documents
  1549. [+] 301 | https://www.cityoflondon.gov.uk/education
  1550. [+] 301 | https://www.cityoflondon.gov.uk/Education
  1551. [+] 301 | https://www.cityoflondon.gov.uk/emailtemplates
  1552. [+] 301 | https://www.cityoflondon.gov.uk/error
  1553. [+] 302 | https://www.cityoflondon.gov.uk/events
  1554. [+] 302 | https://www.cityoflondon.gov.uk/Events
  1555. [+] 301 | https://www.cityoflondon.gov.uk/extranet
  1556. [+] 301 | https://www.cityoflondon.gov.uk/Extranet
  1557. [+] 301 | https://www.cityoflondon.gov.uk/feedback
  1558. [+] 301 | https://www.cityoflondon.gov.uk/finance
  1559. [+] 301 | https://www.cityoflondon.gov.uk/ftp
  1560. [+] 302 | https://www.cityoflondon.gov.uk/jobs
  1561. [+] 301 | https://www.cityoflondon.gov.uk/libraries
  1562. [+] 301 | https://www.cityoflondon.gov.uk/licensing
  1563. [+] 301 | https://www.cityoflondon.gov.uk/mailinglist
  1564. [+] 302 | https://www.cityoflondon.gov.uk/maps
  1565. [+] 301 | https://www.cityoflondon.gov.uk/markets
  1566. [+] 302 | https://www.cityoflondon.gov.uk/newsroom
  1567. [+] 301 | https://www.cityoflondon.gov.uk/order
  1568. [+] 302 | https://www.cityoflondon.gov.uk/pages
  1569. [+] 302 | https://www.cityoflondon.gov.uk/Pages
  1570. [+] 301 | https://www.cityoflondon.gov.uk/power
  1571. [+] 301 | https://www.cityoflondon.gov.uk/privacy
  1572. [+] 301 | https://www.cityoflondon.gov.uk/Privacy
  1573. [+] 301 | https://www.cityoflondon.gov.uk/procurement
  1574. [+] 301 | https://www.cityoflondon.gov.uk/publications
  1575. [+] 301 | https://www.cityoflondon.gov.uk/Publications
  1576. [+] 302 | https://www.cityoflondon.gov.uk/reports%20list
  1577. [+] 301 | https://www.cityoflondon.gov.uk/research
  1578. [+] 301 | https://www.cityoflondon.gov.uk/Research
  1579. [+] 301 | https://www.cityoflondon.gov.uk/resource
  1580. [+] 302 | https://www.cityoflondon.gov.uk/reusablecontent
  1581. [+] 302 | https://www.cityoflondon.gov.uk/search
  1582. [+] 302 | https://www.cityoflondon.gov.uk/Search
  1583. [+] 302 | https://www.cityoflondon.gov.uk/services
  1584. [+] 302 | https://www.cityoflondon.gov.uk/Services
  1585. [+] 301 | https://www.cityoflondon.gov.uk/shop
  1586. [+] 301 | https://www.cityoflondon.gov.uk/shop_closed
  1587. [+] 301 | https://www.cityoflondon.gov.uk/shop_content
  1588. [+] 301 | https://www.cityoflondon.gov.uk/shopadmin
  1589. [+] 301 | https://www.cityoflondon.gov.uk/shopper
  1590. [+] 301 | https://www.cityoflondon.gov.uk/shopping
  1591. [+] 301 | https://www.cityoflondon.gov.uk/shopping_cart
  1592. [+] 301 | https://www.cityoflondon.gov.uk/shoppingcart
  1593. [+] 301 | https://www.cityoflondon.gov.uk/shopping-lists
  1594. [+] 301 | https://www.cityoflondon.gov.uk/shops
  1595. [+] 301 | https://www.cityoflondon.gov.uk/shops_buyaction
  1596. [+] 301 | https://www.cityoflondon.gov.uk/shopstat
  1597. [+] 301 | https://www.cityoflondon.gov.uk/shopsys
  1598. [+] 200 | https://www.cityoflondon.gov.uk/sitemap.xml
  1599. [+] 301 | https://www.cityoflondon.gov.uk/social
  1600. [+] 301 | https://www.cityoflondon.gov.uk/sport
  1601. [+] 301 | https://www.cityoflondon.gov.uk/thankyou
  1602. [+] 302 | https://www.cityoflondon.gov.uk/training
  1603. [+] 301 | https://www.cityoflondon.gov.uk/transport
  1604. [+] 301 | https://www.cityoflondon.gov.uk/wifi
  1605. [+] 302 | https://www.cityoflondon.gov.uk/workflowtasks
  1606.  
  1607. [+] Directories Found : 76
  1608. [+] Directories Skipped : 4538
  1609. [+] Total Requests : 4614
  1610.  
  1611. [+] Completed in 0:03:30.605832
  1612. ################################################################################################################################
  1613. *] Processing domain cityoflondon.gov.uk
  1614. [*] Using system resolvers ['10.101.0.243', '192.168.0.1', '2001:18c0:121:6900:724f:b8ff:fefd:5b6a']
  1615. [+] Getting nameservers
  1616. 173.245.59.122 - jake.ns.cloudflare.com
  1617. 162.159.38.116 - treasure.ns.cloudflare.com
  1618. [-] Zone transfer failed
  1619.  
  1620. [+] TXT records found
  1621. "MS=ms45080239"
  1622. "v=msv1t=0F2DCBB1-D8B0-4698-9721-6B2B48AA12AD"
  1623. "v=spf1 ip4:23.227.38.64/32 include:sp2.cityoflondon.gov.uk include:spf.protection.outlook.com include:mailcontrol.com include:servers.mcsv.net include:customers.clickdimensions.com -all"
  1624. "Z6qxeDy0jOHWN2UQVDa4jnTnX9tNBG4nZ3TSEegiBUyI1p353x11ce/W4sgbxFySXXUlc2QmY8itoEXnTR0kKw=="
  1625.  
  1626. [+] DMARC records found
  1627. "v=DMARC1;p=reject;sp=reject;pct=100;rua=mailto:dmarc-rua@dmarc.service.gov.uk"
  1628.  
  1629. [+] MX records found, added to target list
  1630. 1 cityoflondon-gov-uk.mail.protection.outlook.com.
  1631.  
  1632. [*] Scanning cityoflondon.gov.uk for A records
  1633. 80.169.89.102 - cityoflondon.gov.uk
  1634. 80.169.89.106 - apps.cityoflondon.gov.uk
  1635. 40.101.81.152 - autodiscover.cityoflondon.gov.uk
  1636. 40.101.12.72 - autodiscover.cityoflondon.gov.uk
  1637. 40.101.12.136 - autodiscover.cityoflondon.gov.uk
  1638. 52.97.155.120 - autodiscover.cityoflondon.gov.uk
  1639. 52.97.135.120 - autodiscover.cityoflondon.gov.uk
  1640. 40.101.18.248 - autodiscover.cityoflondon.gov.uk
  1641. 52.97.158.168 - autodiscover.cityoflondon.gov.uk
  1642. 40.101.121.24 - autodiscover.cityoflondon.gov.uk
  1643. 77.104.134.194 - careers.cityoflondon.gov.uk
  1644. 80.169.89.102 - cn.cityoflondon.gov.uk
  1645. 80.169.89.101 - demo.cityoflondon.gov.uk
  1646. 91.206.118.10 - email.cityoflondon.gov.uk
  1647. 146.177.9.125 - elearning.cityoflondon.gov.uk
  1648. 217.154.230.198 - forms.cityoflondon.gov.uk
  1649. 104.22.14.166 - jobs.cityoflondon.gov.uk
  1650. 104.22.15.166 - jobs.cityoflondon.gov.uk
  1651. 52.113.64.150 - lyncdiscover.cityoflondon.gov.uk
  1652. 80.169.89.82 - m.cityoflondon.gov.uk
  1653. 80.169.89.80 - mail1.cityoflondon.gov.uk
  1654. 80.169.89.106 - mail2.cityoflondon.gov.uk
  1655. 80.169.89.109 - mail3.cityoflondon.gov.uk
  1656. 80.169.89.85 - mail4.cityoflondon.gov.uk
  1657. 80.169.89.102 - mobile.cityoflondon.gov.uk
  1658. 18.203.123.9 - news.cityoflondon.gov.uk
  1659. 52.31.6.52 - news.cityoflondon.gov.uk
  1660. 52.50.147.113 - news.cityoflondon.gov.uk
  1661. 104.22.14.166 - payment.cityoflondon.gov.uk
  1662. 104.22.15.166 - payment.cityoflondon.gov.uk
  1663. 104.22.15.166 - press.cityoflondon.gov.uk
  1664. 104.22.14.166 - press.cityoflondon.gov.uk
  1665. 104.22.14.166 - production.cityoflondon.gov.uk
  1666. 104.22.15.166 - production.cityoflondon.gov.uk
  1667. 52.59.241.213 - remote.cityoflondon.gov.uk
  1668. 23.227.38.32 - shop.cityoflondon.gov.uk
  1669. 52.113.64.147 - sip.cityoflondon.gov.uk
  1670. 104.22.15.166 - stage.cityoflondon.gov.uk
  1671. 104.22.14.166 - stage.cityoflondon.gov.uk
  1672. 104.22.14.166 - staging.cityoflondon.gov.uk
  1673. 104.22.15.166 - staging.cityoflondon.gov.uk
  1674. 86.54.176.2 - vpn.cityoflondon.gov.uk
  1675. 80.169.89.102 - www.cityoflondon.gov.uk
  1676. 80.169.89.96 - www1.cityoflondon.gov.uk
  1677. 80.169.89.98 - www2.cityoflondon.gov.uk
  1678. ################################################################################################################################
  1679. [INFO] ------TARGET info------
  1680. [*] TARGET: :https://www.cityoflondon.gov.uk/
  1681. [*] TARGET IP: 80.169.89.102
  1682. [INFO] NO load balancer detected for www.cityoflondon.gov.uk...
  1683. [*] DNS servers: jake.ns.cloudflare.com.
  1684. Microsoft-IIS/7.5 COL-VMW-M-LB02
  1685. [*] CC: GB
  1686. [*] Country: United Kingdom
  1687. [*] RegionCode: ENG
  1688. [*] RegionName: England
  1689. [*] City: London
  1690. [*] ASN: AS8220
  1691. [*] BGP_PREFIX: 80.169.0.0/16
  1692. [*] ISP: COLT COLT Technology Services Group Limited, GB
  1693. [INFO] DNS enumeration:
  1694. [*] jobs.cityoflondon.gov.uk 104.22.14.166 104.22.15.166
  1695. [*] m.cityoflondon.gov.uk 80.169.89.82
  1696. [*] mail2.cityoflondon.gov.uk 80.169.89.106
  1697. [*] mobile.cityoflondon.gov.uk 80.169.89.102
  1698. [*] news.cityoflondon.gov.uk ssl-client.presspage.com. 18.203.123.9 52.31.6.52 52.50.147.113
  1699. [*] vpn.cityoflondon.gov.uk 86.54.176.2
  1700. [*] www2.cityoflondon.gov.uk 80.169.89.98
  1701. [INFO] Possible abuse mails are:
  1702. [*] abuse@cityoflondon.gov.uk
  1703. [*] abuse@colt.net
  1704. [*] abuse@www.cityoflondon.gov.uk
  1705. [INFO] NO PAC (Proxy Auto Configuration) file FOUND
  1706. [INFO] Starting FUZZing in http://www.cityoflondon.gov.uk/FUzZzZzZzZz...
  1707. [INFO] Status code Folders
  1708. [ALERT] Look in the source code. It may contain passwords
  1709.  
  1710. Accès impossible `file://localhost/opt/URLextractor/:https://www.cityoflondon.gov.uk/'
  1711. Alerte ! : Impossible d’accéder au document.
  1712.  
  1713. lynx : accès impossible au fichier de départ
  1714.  
  1715. Recherche 80.169.89.102
  1716. Connexion HTTP à 80.169.89.102
  1717. Envoi de la requête HTTP.
  1718. Requête HTTP envoyée. Attente de réponse.
  1719. HTTP/1.1 301 Moved Permanently
  1720. Transfert de données terminé
  1721. HTTP/1.1 301 Moved Permanently
  1722. Utilisation de https://80.169.89.102/
  1723. Recherche 80.169.89.102
  1724. Connexion HTTPS à 80.169.89.102
  1725.  
  1726. lynx : accès impossible au fichier de départ http://80.169.89.102/
  1727. [INFO] Links found from :https://www.cityoflondon.gov.uk/ http://80.169.89.102/:
  1728. cut: intervalle de champ incorrecte
  1729. Saisissez « cut --help » pour plus d'informations.
  1730. [INFO] Shodan detected the following opened ports on 80.169.89.102:
  1731. [*] 3
  1732. [*] 4
  1733. [*] 443
  1734. [*] 5
  1735. [*] 6
  1736. [*] 8
  1737. [*] 80
  1738. [INFO] ------VirusTotal SECTION------
  1739. [INFO] VirusTotal passive DNS only stores address records. The following domains resolved to the given IP address:
  1740. [INFO] Latest URLs hosted in this IP address detected by at least one URL scanner or malicious URL dataset:
  1741. [INFO] Latest files that are not detected by any antivirus solution and were downloaded by VirusTotal from the IP address provided:
  1742. [INFO] ------Alexa Rank SECTION------
  1743. [INFO] Percent of Visitors Rank in Country:
  1744. [INFO] Percent of Search Traffic:
  1745. [INFO] Percent of Unique Visits:
  1746. [INFO] Total Sites Linking In:
  1747. [*] Total Sites
  1748. [INFO] Useful links related to www.cityoflondon.gov.uk - 80.169.89.102:
  1749. [*] https://www.virustotal.com/pt/ip-address/80.169.89.102/information/
  1750. [*] https://www.hybrid-analysis.com/search?host=80.169.89.102
  1751. [*] https://www.shodan.io/host/80.169.89.102
  1752. [*] https://www.senderbase.org/lookup/?search_string=80.169.89.102
  1753. [*] https://www.alienvault.com/open-threat-exchange/ip/80.169.89.102
  1754. [*] http://pastebin.com/search?q=80.169.89.102
  1755. [*] http://urlquery.net/search.php?q=80.169.89.102
  1756. [*] http://www.alexa.com/siteinfo/www.cityoflondon.gov.uk
  1757. [*] http://www.google.com/safebrowsing/diagnostic?site=www.cityoflondon.gov.uk
  1758. [*] https://censys.io/ipv4/80.169.89.102
  1759. [*] https://www.abuseipdb.com/check/80.169.89.102
  1760. [*] https://urlscan.io/search/#80.169.89.102
  1761. [*] https://github.com/search?q=80.169.89.102&type=Code
  1762. [INFO] Useful links related to AS8220 - 80.169.0.0/16:
  1763. [*] http://www.google.com/safebrowsing/diagnostic?site=AS:8220
  1764. [*] https://www.senderbase.org/lookup/?search_string=80.169.0.0/16
  1765. [*] http://bgp.he.net/AS8220
  1766. [*] https://stat.ripe.net/AS8220
  1767. [INFO] Date: 31/03/20 | Time: 00:22:47
  1768. [INFO] Total time: 0 minute(s) and 53 second(s)
  1769. ###############################################################################################################################
  1770. [*] Performing General Enumeration of Domain:cityoflondon.gov.uk
  1771. [-] DNSSEC is not configured for cityoflondon.gov.uk
  1772. [*] SOA jake.ns.cloudflare.com 173.245.59.122
  1773. [*] NS jake.ns.cloudflare.com 173.245.59.122
  1774. [*] Bind Version for 173.245.59.122 b'20171212'
  1775. [*] NS jake.ns.cloudflare.com 2606:4700:58::adf5:3b7a
  1776. [*] Bind Version for 2606:4700:58::adf5:3b7a b'20171212'
  1777. [*] NS treasure.ns.cloudflare.com 162.159.38.116
  1778. [*] Bind Version for 162.159.38.116 b'20171212'
  1779. [*] NS treasure.ns.cloudflare.com 2606:4700:50::a29f:2674
  1780. [*] Bind Version for 2606:4700:50::a29f:2674 b'20171212'
  1781. [*] MX cityoflondon-gov-uk.mail.protection.outlook.com 104.47.21.36
  1782. [*] MX cityoflondon-gov-uk.mail.protection.outlook.com 104.47.20.36
  1783. [*] A cityoflondon.gov.uk 80.169.89.102
  1784. [*] Enumerating SRV Records
  1785. [*] SRV _sip._tls.cityoflondon.gov.uk sipdir.online.lync.com 52.113.64.147 443 1
  1786. [*] SRV _sip._tls.cityoflondon.gov.uk sipdir.online.lync.com 2603:1047:0:2::b 443 1
  1787. [*] SRV _sip._tls.cityoflondon.gov.uk sipdir.online.lync.com 2603:1047:0:1::b 443 1
  1788. [*] SRV _sip._tls.cityoflondon.gov.uk sipdir.online.lync.com 2603:1047:0:5::b 443 1
  1789. [*] SRV _sip._tls.cityoflondon.gov.uk sipdir.online.lync.com 2603:1047:0:8::f 443 1
  1790. [*] SRV _sip._tls.cityoflondon.gov.uk sipdir.online.lync.com 2603:1047:0:9::f 443 1
  1791. [*] SRV _sipfederationtls._tcp.cityoflondon.gov.uk sipfed.online.lync.com 52.113.64.147 5061 1
  1792. [*] SRV _sipfederationtls._tcp.cityoflondon.gov.uk sipfed.online.lync.com 2603:1047:0:2::b 5061 1
  1793. [*] SRV _autodiscover._tcp.cityoflondon.gov.uk autodiscover.outlook.com 40.101.83.24 443 1
  1794. [*] SRV _autodiscover._tcp.cityoflondon.gov.uk autodiscover.outlook.com 40.101.12.72 443 1
  1795. [*] SRV _autodiscover._tcp.cityoflondon.gov.uk autodiscover.outlook.com 40.101.12.40 443 1
  1796. [*] SRV _autodiscover._tcp.cityoflondon.gov.uk autodiscover.outlook.com 40.101.80.200 443 1
  1797. [*] SRV _autodiscover._tcp.cityoflondon.gov.uk autodiscover.outlook.com 52.97.158.168 443 1
  1798. [*] SRV _autodiscover._tcp.cityoflondon.gov.uk autodiscover.outlook.com 40.101.121.8 443 1
  1799. [*] SRV _autodiscover._tcp.cityoflondon.gov.uk autodiscover.outlook.com 40.101.81.152 443 1
  1800. [*] SRV _autodiscover._tcp.cityoflondon.gov.uk autodiscover.outlook.com 40.101.18.232 443 1
  1801. [*] SRV _autodiscover._tcp.cityoflondon.gov.uk autodiscover.outlook.com 2603:1026:206:7::8 443 1
  1802. [*] SRV _autodiscover._tcp.cityoflondon.gov.uk autodiscover.outlook.com 2603:1026:200:8b::8 443 1
  1803. [*] SRV _autodiscover._tcp.cityoflondon.gov.uk autodiscover.outlook.com 2603:1026:207:15::8 443 1
  1804. [*] SRV _autodiscover._tcp.cityoflondon.gov.uk autodiscover.outlook.com 2603:1026:206:5::8 443 1
  1805. [+] 20 Records Found
  1806. ################################################################################################################################
  1807. [+] Starting At 2020-03-31 00:23:55.291308
  1808. [+] Collecting Information On: https://www.cityoflondon.gov.uk/
  1809. [#] Status: 200
  1810. --------------------------------------------------
  1811. [#] Web Server Detected: Microsoft-IIS/7.5
  1812. [#] X-Powered-By: ASP.NET
  1813. [!] X-Frame-Options Headers not detect! target might be vulnerable Click Jacking
  1814. - Cache-Control: private
  1815. - Content-Type: text/html; charset=utf-8
  1816. - Content-Encoding: gzip
  1817. - Expires: Tue, 31 Mar 2020 04:33:37 GMT
  1818. - Vary: Accept-Encoding
  1819. - Server: Microsoft-IIS/7.5
  1820. - SPRequestGuid: 7887bf2b-311d-406b-ae80-eed1367d4e26
  1821. - X-SharePointHealthScore: 0
  1822. - X-AspNet-Version: 2.0.50727
  1823. - X-Powered-By: ASP.NET
  1824. - MicrosoftSharePointTeamServices: 14.0.0.7239
  1825. - X-MS-InvokeApp: 1; RequireReadOnly
  1826. - Date: Tue, 31 Mar 2020 04:27:40 GMT
  1827. - Content-Length: 8648
  1828. --------------------------------------------------
  1829. [#] Finding Location..!
  1830. [#] status: success
  1831. [#] country: United Kingdom
  1832. [#] countryCode: GB
  1833. [#] region: ENG
  1834. [#] regionName: England
  1835. [#] city: London
  1836. [#] zip: EC2V
  1837. [#] lat: 51.5132
  1838. [#] lon: -0.0961
  1839. [#] timezone: Europe/London
  1840. [#] isp: COLT Technology Services Group Limited
  1841. [#] org: Agilisys LTD
  1842. [#] as: AS8220 COLT Technology Services Group Limited
  1843. [#] query: 80.169.89.102
  1844. --------------------------------------------------
  1845. [+] Detected WAF Presence in web application: ASP.NET Generic Web Application Protection
  1846. --------------------------------------------------
  1847. [#] Starting Reverse DNS
  1848. [-] Failed ! Fail
  1849. --------------------------------------------------
  1850. [!] Scanning Open Port
  1851. [#] 4/tcp open unknown
  1852. [#] 30/tcp open unknown
  1853. [#] 80/tcp open http
  1854. [#] 443/tcp open https
  1855. [#] 481/tcp open dvs
  1856. [#] 524/tcp open ncp
  1857. [#] 543/tcp open klogin
  1858. [#] 667/tcp open disclose
  1859. [#] 1038/tcp open mtqp
  1860. [#] 1039/tcp open sbl
  1861. [#] 1061/tcp open kiosk
  1862. [#] 1062/tcp open veracity
  1863. [#] 1074/tcp open warmspotMgmt
  1864. [#] 1104/tcp open xrl
  1865. [#] 1132/tcp open kvm-via-ip
  1866. [#] 1533/tcp open virtual-places
  1867. [#] 2034/tcp open scoremgr
  1868. [#] 3300/tcp open ceph
  1869. [#] 4445/tcp open upnotifyp
  1870. [#] 5998/tcp open ncd-diag
  1871. [#] 6565/tcp open unknown
  1872. [#] 8099/tcp open unknown
  1873. [#] 8193/tcp open sophos
  1874. [#] 20221/tcp open unknown
  1875. [#] 44443/tcp open coldfusion-auth
  1876. [#] 55600/tcp open unknown
  1877. --------------------------------------------------
  1878. [+] Getting SSL Info
  1879. {'OCSP': ('http://ocsp.entrust.net',),
  1880. 'caIssuers': ('http://aia.entrust.net/l1k-chain256.cer',),
  1881. 'crlDistributionPoints': ('http://crl.entrust.net/level1k.crl',),
  1882. 'issuer': ((('countryName', 'US'),),
  1883. (('organizationName', 'Entrust, Inc.'),),
  1884. (('organizationalUnitName', 'See www.entrust.net/legal-terms'),),
  1885. (('organizationalUnitName',
  1886. '(c) 2012 Entrust, Inc. - for authorized use only'),),
  1887. (('commonName', 'Entrust Certification Authority - L1K'),)),
  1888. 'notAfter': 'Jan 9 10:45:03 2021 GMT',
  1889. 'notBefore': 'Jan 9 10:15:04 2019 GMT',
  1890. 'serialNumber': '200B2115536F6E220000000050EBEF6B',
  1891. 'subject': ((('countryName', 'GB'),),
  1892. (('localityName', 'London'),),
  1893. (('organizationName', 'City of London Corporation'),),
  1894. (('commonName', '*.cityoflondon.gov.uk'),)),
  1895. 'subjectAltName': (('DNS', '*.cityoflondon.gov.uk'),
  1896. ('DNS', 'cityoflondon.gov.uk')),
  1897. 'version': 3}
  1898. -----BEGIN CERTIFICATE-----
  1899. MIIHRTCCBi2gAwIBAgIQIAshFVNvbiIAAAAAUOvvazANBgkqhkiG9w0BAQsFADCB
  1900. ujELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNVBAsT
  1901. H1NlZSB3d3cuZW50cnVzdC5uZXQvbGVnYWwtdGVybXMxOTA3BgNVBAsTMChjKSAy
  1902. MDEyIEVudHJ1c3QsIEluYy4gLSBmb3IgYXV0aG9yaXplZCB1c2Ugb25seTEuMCwG
  1903. A1UEAxMlRW50cnVzdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIEwxSzAeFw0x
  1904. OTAxMDkxMDE1MDRaFw0yMTAxMDkxMDQ1MDNaMGMxCzAJBgNVBAYTAkdCMQ8wDQYD
  1905. VQQHEwZMb25kb24xIzAhBgNVBAoTGkNpdHkgb2YgTG9uZG9uIENvcnBvcmF0aW9u
  1906. MR4wHAYDVQQDDBUqLmNpdHlvZmxvbmRvbi5nb3YudWswggEiMA0GCSqGSIb3DQEB
  1907. AQUAA4IBDwAwggEKAoIBAQDZy8XY/gcyTSZkfjN4UKLFhYeMeEJQQnyWxTA3Y+hB
  1908. zxDn0wqK5hLxDC2ix9M7geq+2I4ick6CFPIkzQukzVWsl2ktvVtf8wyhsT4XA5zh
  1909. TQRwBjJ4XXojNxo67wGmmPlEK+1bJL/R9Ez7g+7gbCz51Ixvo/I+1WHT+NvAMLt4
  1910. YmqNIkz8wqMSp/4OcfhntQIacW1jEOx7/Hckan4P+Pt+suRD+paWmf4b0GjTZYpj
  1911. 9Zb5fNSS+7RYm5pxjTaN1SR8adJIvw36XThK8KoZqMBulA7lEN2FmsEdj5lvUAOT
  1912. HIWdjK/d6YuwP6CMobNaSwaWllH+xc5XE6joCzOW8EFfAgMBAAGjggObMIIDlzA1
  1913. BgNVHREELjAsghUqLmNpdHlvZmxvbmRvbi5nb3YudWuCE2NpdHlvZmxvbmRvbi5n
  1914. b3YudWswggH2BgorBgEEAdZ5AgQCBIIB5gSCAeIB4AB2AId1v+dZfPiMQ5lfvfNu
  1915. /1aNR1Y2/0q1YMG06v9eoIMPAAABaDI3NmEAAAQDAEcwRQIhAPZExxkpGaxdVzOJ
  1916. UErKFq6OoqJn73n72VE0ehPC42w1AiAJEM2yBPkJPN6aO7x9kpCySo2Jx2Iqinuk
  1917. i5WCHFjKgQB2AFWB1MIWkDYBSuoLm1c8U/DA5Dh4cCUIFy+jqh0HE9MMAAABaDI3
  1918. NlwAAAQDAEcwRQIhAIzSlCQ8vODbhfb02wTBMLobwjQAi8/NSZR9NFnk9L6FAiBD
  1919. Xc4gXr76I1lGPWjQlmfNPIe9mSOB8eSL0w5cXyBp+AB3AESUZS6w7s6vxEAH2Kj+
  1920. KMDa5oK+2MsxtT/TM5a1toGoAAABaDI3NnUAAAQDAEgwRgIhAJjvgOVkJ/v7lc6b
  1921. zsrBjbJ2+Uvex1rilJBtHrztR8gVAiEA7mEAOypp3oUZ1VLqSXj92Yy6CHXkntyT
  1922. xDjonKOxmGQAdQDuS723dc5guuFCaR+r4Z5mow9+X7By2IMAxHuJeqj9ywAAAWgy
  1923. NzZ1AAAEAwBGMEQCIDpm7rHSfmZh5VI2V0FR7y08tE+1r3P1VghrmX5Pk26nAiBy
  1924. KAlKJuqZYq9BCGLxaLC+tGim7G1xPgeIJHTpYI1iMzAOBgNVHQ8BAf8EBAMCBaAw
  1925. HQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMDMGA1UdHwQsMCowKKAmoCSG
  1926. Imh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvbGV2ZWwxay5jcmwwSwYDVR0gBEQwQjA2
  1927. BgpghkgBhvpsCgEFMCgwJgYIKwYBBQUHAgEWGmh0dHA6Ly93d3cuZW50cnVzdC5u
  1928. ZXQvcnBhMAgGBmeBDAECAjBoBggrBgEFBQcBAQRcMFowIwYIKwYBBQUHMAGGF2h0
  1929. dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDMGCCsGAQUFBzAChidodHRwOi8vYWlhLmVu
  1930. dHJ1c3QubmV0L2wxay1jaGFpbjI1Ni5jZXIwHwYDVR0jBBgwFoAUgqJwdN28Uz/P
  1931. e9T3zX+nYMYKTL8wHQYDVR0OBBYEFOj4ygYW+gZdMo6ZdBwKF7499mzZMAkGA1Ud
  1932. EwQCMAAwDQYJKoZIhvcNAQELBQADggEBAMMcyrzEURxxlTey5nxn3+9SoE+C/YgD
  1933. 9UWx5NjGaTa1aQ/jgyQPd8hTVlS+0roK4cE1bGZQiwJwRn+dyBnhg4rOxY2X6//x
  1934. nsUiA3DXaXPZqkTX6vNf64qVu5Q1uYYYPCzjFT8HXZaPbt0V/0fx273SI4MgXeJu
  1935. j5JenJku50utRxWbAVrn0cc43x9uKlC5Nmw/jLDLGrLDqPTpTwkUtR7tKuf3qJ+c
  1936. cTJwOVUul145JMUJq9ogyuMXCiE1Ycw3oj5m0n5lGFPscSG7n7OC6CiWP89wslSu
  1937. OSjbjdIHs+Pal/L0tnpE3ivSMvLFLE9uM/npU4491kw+Clk1p85JOTw=
  1938. -----END CERTIFICATE-----
  1939.  
  1940. --------------------------------------------------
  1941. [+] Collecting Information Disclosure!
  1942. [#] Detecting sitemap.xml file
  1943. [!] sitemap.xml File Found: https://www.cityoflondon.gov.uk//sitemap.xml
  1944. [#] Detecting robots.txt file
  1945. [-] robots.txt file not Found!?
  1946. [#] Detecting GNU Mailman
  1947. [-] GNU Mailman App Not Detected!?
  1948. --------------------------------------------------
  1949. [+] Crawling Url Parameter On: https://www.cityoflondon.gov.uk/Pages/default.aspx
  1950. --------------------------------------------------
  1951. [#] Searching Html Form !
  1952. [+] Html Form Discovered
  1953. [#] action: default.aspx
  1954. [#] class: None
  1955. [#] id: aspnetForm
  1956. [#] method: post
  1957. --------------------------------------------------
  1958. [!] Found 4 dom parameter
  1959. [#] https://www.cityoflondon.gov.uk//#maincontent
  1960. [#] https://www.cityoflondon.gov.uk///about-our-website/Pages/legal-notices.aspx#socialmedia
  1961. [#] https://www.cityoflondon.gov.uk//#PAGETOP
  1962. [#] https://www.cityoflondon.gov.uk//#
  1963. --------------------------------------------------
  1964. [!] 3 Internal Dynamic Parameter Discovered
  1965. [+] https://www.cityoflondon.gov.uk///_layouts/CityOfLondon.SharePoint/css/screen.css?v=20171016
  1966. [+] http://email.cityoflondon.gov.uk/linkapp/cmasubs.aspx?LinkID=pageid986790jkkzhq%40f%40f%40n9qh%40z%40f%40n9qh%40f%40f
  1967. [+] http://email.cityoflondon.gov.uk/linkapp/cmasubs.aspx?LinkID=pageid986790jkkzhq@f@f@n9qh@z@f@n9qh@f@f
  1968. --------------------------------------------------
  1969. [-] No external Dynamic Paramter Found!?
  1970. --------------------------------------------------
  1971. [!] 49 Internal links Discovered
  1972. [+] https://www.cityoflondon.gov.uk///_layouts/CityOfLondon.SharePoint/css/print.css
  1973. [+] https://www.cityoflondon.gov.uk///_layouts/CityOfLondon.SharePoint/images/favicon.ico
  1974. [+] https://www.cityoflondon.gov.uk///_layouts/CityOfLondon.SharePoint/css/fixes-ie8.css
  1975. [+] https://www.cityoflondon.gov.uk///Pages/default.aspx
  1976. [+] https://www.cityoflondon.gov.uk///report-pay-apply/Pages/report-pay-apply.aspx
  1977. [+] https://www.cityoflondon.gov.uk///search/Pages/a-to-z.aspx
  1978. [+] https://www.cityoflondon.gov.uk///_layouts/col/shop.aspx
  1979. [+] https://www.cityoflondon.gov.uk///events/Pages/default.aspx
  1980. [+] https://careers.cityoflondon.gov.uk/
  1981. [+] http://news.cityoflondon.gov.uk/
  1982. [+] https://www.cityoflondon.gov.uk///contact-us/Pages/default.aspx
  1983. [+] https://www.cityoflondon.gov.uk///about-the-city/Pages/default.aspx
  1984. [+] https://www.cityoflondon.gov.uk///services/Pages/default.aspx
  1985. [+] https://www.cityoflondon.gov.uk///business/Pages/default.aspx
  1986. [+] https://www.cityoflondon.gov.uk///things-to-do/Pages/default.aspx
  1987. [+] https://www.cityoflondon.gov.uk///services/health-and-wellbeing/Pages/covid-19.aspx
  1988. [+] https://www.cityoflondon.gov.uk///business/support-promotion-and-advice/Pages/covid-19-advice-for-businesses.aspx
  1989. [+] https://www.cityoflondon.gov.uk///services/health-and-wellbeing/Pages/covid-19.aspx
  1990. [+] https://www.cityoflondon.gov.uk///business/support-promotion-and-advice/Pages/covid-19-advice-for-businesses.aspx
  1991. [+] https://www.cityoflondon.gov.uk///services/health-and-wellbeing/Pages/covid-19.aspx
  1992. [+] https://www.cityoflondon.gov.uk///business/support-promotion-and-advice/Pages/support-relief-efforts-COVID-19.aspx
  1993. [+] https://news.cityoflondon.gov.uk/square-mile-businesses-offered-additional-rental-relief/
  1994. [+] https://news.cityoflondon.gov.uk/covid19-city-corporation-encourages-people-to-follow-new-government-instructions-on-parks/
  1995. [+] https://www.cityoflondon.gov.uk///services/transport-and-streets/parking/Pages/covid-19-parking-and-driving-in-the-city.aspx
  1996. [+] https://www.cityoflondon.gov.uk///business/business-rates/Pages/default.aspx
  1997. [+] https://www.cityoflondon.gov.uk///maps/Pages/geocortex-redirect.aspx
  1998. [+] https://www.cityoflondon.gov.uk///services/transport-and-streets/roads-highways-and-pavements/Pages/current-road-closures-works-and-events.aspx
  1999. [+] https://www.cityoflondon.gov.uk///events/Pages/default.aspx
  2000. [+] https://www.cityoflondon.gov.uk///about-the-city/about-us/Pages/default.aspx
  2001. [+] https://www.cityoflondon.gov.uk///about-the-city/voting-elections/Pages/default.aspx
  2002. [+] https://www.cityoflondon.gov.uk///business/Pages/default.aspx
  2003. [+] https://www.cityoflondon.gov.uk///things-to-do/visit-the-city/whats-on/Pages/default.aspx
  2004. [+] https://www.cityoflondon.gov.uk///services/transport-and-streets/roads-highways-and-pavements/Pages/current-road-closures-works-and-events.aspx
  2005. [+] https://www.cityoflondon.gov.uk///things-to-do/green-spaces/Pages/default.aspx
  2006. [+] https://www.cityoflondon.gov.uk///about-the-city/about-us/Pages/how-to-find-us.aspx
  2007. [+] https://www.cityoflondon.gov.uk///Pages/default.aspx
  2008. [+] https://www.cityoflondon.gov.uk///about-our-website/Pages/mobile.aspx
  2009. [+] https://www.cityoflondon.gov.uk///report-pay-apply/Pages/report-pay-apply.aspx
  2010. [+] https://www.cityoflondon.gov.uk///maps/Pages/interactive-maps.aspx
  2011. [+] https://www.cityoflondon.gov.uk///contact-us/Pages/default.aspx
  2012. [+] https://www.cityoflondon.gov.uk///about-our-website/Pages/social-media.aspx
  2013. [+] https://www.cityoflondon.gov.uk///contact-us/Pages/default.aspx
  2014. [+] https://www.cityoflondon.gov.uk///about-our-website/Pages/accessibility.aspx
  2015. [+] https://www.cityoflondon.gov.uk///about-our-website/Pages/legal-notices.aspx
  2016. [+] https://www.cityoflondon.gov.uk///about-our-website/Pages/privacy-notice.aspx
  2017. [+] https://www.cityoflondon.gov.uk///about-our-website/Pages/Cookies.aspx
  2018. [+] https://www.cityoflondon.gov.uk///about-our-website/sitemap.aspx
  2019. [+] https://www.cityoflondon.gov.uk///business/tenders-and-procurement/pages/responsible-procurement.aspx
  2020. [+] https://www.cityoflondon.gov.uk///about-our-website/Pages/cookies.aspx
  2021. --------------------------------------------------
  2022. [!] 3 External links Discovered
  2023. [#] https://www.facebook.com/CityofLondonCorp
  2024. [#] https://twitter.com/cityoflondon
  2025. [#] https://www.youtube.com/user/CityofLondonvideos/videos
  2026. --------------------------------------------------
  2027. [#] Mapping Subdomain..
  2028. [-] No Any Subdomain Found
  2029. [!] Found 0 Subdomain
  2030. --------------------------------------------------
  2031. [!] Done At 2020-03-31 00:24:19.295106
  2032. #################################################################################################################################
  2033. traceroute to cityoflondon.gov.uk (80.169.89.102), 30 hops max, 60 byte packets
  2034. 1 _gateway (10.203.9.1) 102.583 ms 102.590 ms 102.577 ms
  2035. 2 45.131.5.2 (45.131.5.2) 102.572 ms 102.568 ms 102.580 ms
  2036. 3 109.236.95.224 (109.236.95.224) 102.555 ms 109.236.95.226 (109.236.95.226) 102.550 ms 109.236.95.230 (109.236.95.230) 102.546 ms
  2037. 4 109.236.95.173 (109.236.95.173) 103.218 ms 103.212 ms 109.236.95.108 (109.236.95.108) 103.404 ms
  2038. 5 et-0-0-1-pr2.AMS.router.colt.net (80.249.208.236) 103.829 ms 103.810 ms 104.188 ms
  2039. 6 xe4-2-1-sar18.LON.router.colt.net (212.74.73.181) 113.402 ms 212.74.75.37 (212.74.75.37) 113.012 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181) 113.525 ms
  2040. 7 xe0-3-0-sar18.LON.router.colt.net (212.74.68.145) 111.945 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181) 116.700 ms 212.74.75.37 (212.74.75.37) 116.378 ms
  2041. 8 cpeuk_lon002520.ia.colt.net (80.169.196.38) 116.354 ms 116.319 ms 116.320 ms
  2042. 9 195.110.81.4 (195.110.81.4) 116.614 ms 112.411 ms 112.165 ms
  2043. 10 * * *
  2044. ################################################################################################################################
  2045. Domains still to check: 1
  2046. Checking if the hostname cityoflondon.gov.uk. given is in fact a domain...
  2047.  
  2048. Analyzing domain: cityoflondon.gov.uk.
  2049. Checking NameServers using system default resolver...
  2050. IP: 173.245.59.122 (United States)
  2051. HostName: jake.ns.cloudflare.com Type: NS
  2052. HostName: jake.ns.cloudflare.com Type: PTR
  2053. IP: 162.159.38.116 (None)
  2054. HostName: treasure.ns.cloudflare.com Type: NS
  2055. HostName: treasure.ns.cloudflare.com Type: PTR
  2056.  
  2057. Checking MailServers using system default resolver...
  2058. IP: 104.47.20.36 (United Kingdom)
  2059. HostName: cityoflondon-gov-uk.mail.protection.outlook.com Type: MX
  2060. HostName: mail-cwlgbr010036.inbound.protection.outlook.com Type: PTR
  2061. IP: 104.47.21.36 (United Kingdom)
  2062. HostName: cityoflondon-gov-uk.mail.protection.outlook.com Type: MX
  2063. HostName: mail-lo2gbr010036.inbound.protection.outlook.com Type: PTR
  2064.  
  2065. Checking the zone transfer for each NS... (if this takes more than 10 seconds, just hit CTRL-C and it will continue. Bug in the libs)
  2066. No zone transfer found on nameserver 173.245.59.122
  2067. No zone transfer found on nameserver 162.159.38.116
  2068.  
  2069. Checking SPF record...
  2070. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 23.227.38.64/32, but only the network IP
  2071. New IP found: 23.227.38.64
  2072.  
  2073. Checking SPF record...
  2074. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 212.50.171.0/25, but only the network IP
  2075. New IP found: 212.50.171.0
  2076. New IP found: 80.169.89.106
  2077. New IP found: 80.169.89.109
  2078. New IP found: 80.169.89.85
  2079. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 205.201.128.0/20, but only the network IP
  2080. New IP found: 205.201.128.0
  2081. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 198.2.128.0/18, but only the network IP
  2082. New IP found: 198.2.128.0
  2083. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 148.105.0.0/16, but only the network IP
  2084. New IP found: 148.105.0.0
  2085. New IP found: 132.174.100.127
  2086. New IP found: 89.145.127.252
  2087. New IP found: 84.45.34.163
  2088.  
  2089. Checking SPF record...
  2090. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 40.92.0.0/15, but only the network IP
  2091. New IP found: 40.92.0.0
  2092. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 40.107.0.0/16, but only the network IP
  2093. New IP found: 40.107.0.0
  2094. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 52.100.0.0/14, but only the network IP
  2095. New IP found: 52.100.0.0
  2096. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 104.47.0.0/17, but only the network IP
  2097. New IP found: 104.47.0.0
  2098. There are no IPv4 addresses in the SPF. Maybe IPv6.
  2099. There are no IPv4 addresses in the SPF. Maybe IPv6.
  2100.  
  2101. Checking SPF record...
  2102. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 85.115.32.0/19, but only the network IP
  2103. New IP found: 85.115.32.0
  2104. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 86.111.216.0/21, but only the network IP
  2105. New IP found: 86.111.216.0
  2106. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 116.50.56.0/21, but only the network IP
  2107. New IP found: 116.50.56.0
  2108. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 208.87.232.0/21, but only the network IP
  2109. New IP found: 208.87.232.0
  2110. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 196.216.238.0/23, but only the network IP
  2111. New IP found: 196.216.238.0
  2112. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 192.151.176.0/20, but only the network IP
  2113. New IP found: 192.151.176.0
  2114.  
  2115. Checking SPF record...
  2116. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 205.201.128.0/20, but only the network IP
  2117. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 198.2.128.0/18, but only the network IP
  2118. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 148.105.8.0/21, but only the network IP
  2119. New IP found: 148.105.8.0
  2120.  
  2121. Checking SPF record...
  2122.  
  2123. Checking SPF record...
  2124. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 135.84.216.0/22, but only the network IP
  2125. New IP found: 135.84.216.0
  2126. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 66.240.227.0/24, but only the network IP
  2127. New IP found: 66.240.227.0
  2128. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 63.143.59.128/25, but only the network IP
  2129. New IP found: 63.143.59.128
  2130. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 63.143.57.128/25, but only the network IP
  2131. New IP found: 63.143.57.128
  2132. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 216.98.158.0/24, but only the network IP
  2133. New IP found: 216.98.158.0
  2134. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 74.63.212.0/24, but only the network IP
  2135. New IP found: 74.63.212.0
  2136. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 52.200.59.0/24, but only the network IP
  2137. New IP found: 52.200.59.0
  2138. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 34.245.210.0/24, but only the network IP
  2139. New IP found: 34.245.210.0
  2140.  
  2141. Checking SPF record...
  2142. WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 34.245.210.0/24, but only the network IP
  2143.  
  2144. Checking 192 most common hostnames using system default resolver...
  2145. IP: 80.169.89.102 (United Kingdom)
  2146. HostName: www.cityoflondon.gov.uk. Type: A
  2147. IP: 80.169.89.96 (United Kingdom)
  2148. HostName: www1.cityoflondon.gov.uk. Type: A
  2149. IP: 80.169.89.98 (United Kingdom)
  2150. HostName: www2.cityoflondon.gov.uk. Type: A
  2151.  
  2152. Checking with nmap the reverse DNS hostnames of every <ip>/24 netblock using system default resolver...
  2153. Checking netblock 52.100.0.0
  2154. Checking netblock 52.200.59.0
  2155. Checking netblock 148.105.0.0
  2156. Checking netblock 162.159.38.0
  2157. Checking netblock 74.63.212.0
  2158. Checking netblock 148.105.8.0
  2159. Checking netblock 205.201.128.0
  2160. Checking netblock 80.169.89.0
  2161. Checking netblock 66.240.227.0
  2162. Checking netblock 86.111.216.0
  2163. Checking netblock 198.2.128.0
  2164. Checking netblock 34.245.210.0
  2165. Checking netblock 63.143.59.0
  2166. Checking netblock 85.115.32.0
  2167. Checking netblock 89.145.127.0
  2168. Checking netblock 63.143.57.0
  2169. Checking netblock 104.47.21.0
  2170. Checking netblock 192.151.176.0
  2171. Checking netblock 84.45.34.0
  2172. Checking netblock 212.50.171.0
  2173. Checking netblock 135.84.216.0
  2174. Checking netblock 40.107.0.0
  2175. Checking netblock 173.245.59.0
  2176. Checking netblock 40.92.0.0
  2177. Checking netblock 196.216.238.0
  2178. Checking netblock 116.50.56.0
  2179. Checking netblock 208.87.232.0
  2180. Checking netblock 104.47.0.0
  2181. Checking netblock 132.174.100.0
  2182. Checking netblock 216.98.158.0
  2183. Checking netblock 23.227.38.0
  2184. Checking netblock 104.47.20.0
  2185.  
  2186. Searching for cityoflondon.gov.uk. emails in Google
  2187. thecitycentre@cityoflondon.gov.uk.
  2188. Susan.Pearson@cityoflondon.gov.uk&
  2189. Wootton@cityoflondon.gov.uk&
  2190. kevin.mulcahy@cityoflondon.gov.uk
  2191. bankarea@cityoflondon.gov.uk]
  2192. artizanlib@cityoflondon.gov.uk.
  2193. LADO@cityoflondon.gov.uk
  2194. vicki.wells@cityoflondon.gov.uk.
  2195. citybridgetrust@cityoflondon.gov.uk
  2196. pro@cityoflondon.gov.uk�
  2197. roger.gifford@cityoflondon.gov.uk.
  2198. kevin.mulcahy@cityoflondon.gov.uk�
  2199. Sukhjit.Gill@cityoflondon.gov.uk.
  2200. zoe.nation@cityoflondon.gov.uk
  2201. Sukhjit.Gill@cityoflondon.gov.uk
  2202. zoe.nation@cityoflondon.gov.uk�
  2203. joanna.burnaby-atkins@cityoflondon.gov.uk. - Is this real?
  2204. Vicki.Wells@cityoflondon.gov.uk]
  2205. michael.bennett@cityoflondon.gov.uk:
  2206. citybridgetrust@cityoflondon.gov.uk.
  2207. barbicanlib@cityoflondon.gov.uk.
  2208.  
  2209. Checking 37 active hosts using nmap... (nmap -sn -n -v -PP -PM -PS80,25 -PA -PY -PU53,40125 -PE --reason <ip> -oA <output_directory>/nmap/<ip>.sn)
  2210. Host 52.100.0.0 is down
  2211. Host 52.200.59.0 is down
  2212. Host 148.105.0.0 is down
  2213. Host 162.159.38.116 is up (echo-reply ttl 59)
  2214. Host 74.63.212.0 is down
  2215. Host 148.105.8.0 is down
  2216. Host 205.201.128.0 is up (syn-ack ttl 58)
  2217. Host 80.169.89.98 is up (syn-ack ttl 117)
  2218. Host 66.240.227.0 is down
  2219. Host 86.111.216.0 is down
  2220. Host 198.2.128.0 is up (reset ttl 58)
  2221. Host 34.245.210.0 is down
  2222. Host 63.143.59.128 is down
  2223. Host 85.115.32.0 is down
  2224. Host 80.169.89.85 is down
  2225. Host 89.145.127.252 is up (echo-reply ttl 56)
  2226. Host 63.143.57.128 is down
  2227. Host 104.47.21.36 is up (syn-ack ttl 115)
  2228. Host 192.151.176.0 is down
  2229. Host 84.45.34.163 is up (echo-reply ttl 56)
  2230. Host 212.50.171.0 is up (abort ttl 244)
  2231. Host 135.84.216.0 is down
  2232. Host 40.107.0.0 is down
  2233. Host 173.245.59.122 is up (echo-reply ttl 59)
  2234. Host 40.92.0.0 is down
  2235. Host 196.216.238.0 is down
  2236. Host 80.169.89.109 is down
  2237. Host 116.50.56.0 is down
  2238. Host 208.87.232.0 is down
  2239. Host 80.169.89.102 is up (syn-ack ttl 53)
  2240. Host 80.169.89.106 is up (syn-ack ttl 117)
  2241. Host 104.47.0.0 is down
  2242. Host 132.174.100.127 is down
  2243. Host 216.98.158.0 is down
  2244. Host 23.227.38.64 is up (echo-reply ttl 59)
  2245. Host 80.169.89.96 is down
  2246. Host 104.47.20.36 is up (syn-ack ttl 112)
  2247.  
  2248. Checking ports on every active host using nmap... (nmap -O --reason --webxml --traceroute -sS -sV -sC -Pn -n -v -F <ip> -oA <output_directory>/nmap/<ip>)
  2249. Scanning ip 162.159.38.116 (treasure.ns.cloudflare.com (PTR)):
  2250. 53/tcp open domain syn-ack ttl 59 (unknown banner: 20171212)
  2251. | dns-nsid:
  2252. | NSID: 20m391 (32306d333931)
  2253. | id.server: AMS
  2254. |_ bind.version: 20171212
  2255. | fingerprint-strings:
  2256. | DNSVersionBindReqTCP:
  2257. | version
  2258. | bind
  2259. |_ 20171212
  2260. Scanning ip 205.201.128.0 ():
  2261. 25/tcp open smtp syn-ack ttl 58 Postfix smtpd
  2262. |_smtp-commands: pmta45.mailchimp.prod.atl01.rsglab.com, PIPELINING, SIZE 10240000, ENHANCEDSTATUSCODES, 8BITMIME, SMTPUTF8,
  2263. 80/tcp open http syn-ack ttl 58 nginx 1.8.1
  2264. | http-methods:
  2265. |_ Supported Methods: GET HEAD POST OPTIONS
  2266. |_http-server-header: nginx/1.8.1
  2267. |_http-title: Did not follow redirect to https://mailchimp.com/about/mcsv-static
  2268. OS Info: Service Info: Host: pmta45.mailchimp.prod.atl01.rsglab.com
  2269. Scanning ip 80.169.89.98 (www2.cityoflondon.gov.uk.):
  2270. 80/tcp open http syn-ack ttl 117 Microsoft IIS httpd 10.0
  2271. | http-methods:
  2272. | Supported Methods: OPTIONS TRACE GET HEAD POST
  2273. |_ Potentially risky methods: TRACE
  2274. |_http-server-header: Microsoft-IIS/10.0
  2275. |_http-title: IIS Windows Server
  2276. 443/tcp open ssl/http syn-ack ttl 117 Microsoft IIS httpd 10.0
  2277. | http-methods:
  2278. | Supported Methods: OPTIONS TRACE GET HEAD POST
  2279. |_ Potentially risky methods: TRACE
  2280. |_http-server-header: Microsoft-IIS/10.0
  2281. |_http-title: IIS Windows Server
  2282. | ssl-cert: Subject: commonName=WMSvc-SHA2-COL-VMW-P-LIM01
  2283. | Issuer: commonName=WMSvc-SHA2-COL-VMW-P-LIM01
  2284. | Public Key type: rsa
  2285. | Public Key bits: 2048
  2286. | Signature Algorithm: sha256WithRSAEncryption
  2287. | Not valid before: 2020-01-09T15:25:04
  2288. | Not valid after: 2030-01-06T15:25:04
  2289. | MD5: b2e4 3b70 c10c ffc8 c699 3005 94ab 1fe1
  2290. |_SHA-1: 8b35 9e30 d522 59a4 b205 a607 4cfa 5a0e df4f dc13
  2291. |_ssl-date: 2020-03-31T04:40:55+00:00; +3m45s from scanner time.
  2292. | tls-alpn:
  2293. | h2
  2294. |_ http/1.1
  2295. OS Info: Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
  2296. |_clock-skew: 3m44s
  2297. Scanning ip 198.2.128.0 ():
  2298. 80/tcp open http syn-ack ttl 58 nginx 1.6.1
  2299. |_http-server-header: nginx/1.6.1
  2300. |_http-title: 403 Forbidden
  2301. Device type: general purpose|storage-misc|broadband router|router|WAP
  2302. Running (JUST GUESSING): Linux 2.6.X|3.X (93%), HP embedded (90%), MikroTik RouterOS 6.X (89%), Ubiquiti AirOS 5.X (89%), Ubiquiti embedded (87%), Ruckus embedded (87%), AVM FritzOS 6.X (87%)
  2303. Scanning ip 89.145.127.252 ():
  2304. Scanning ip 104.47.21.36 (mail-lo2gbr010036.inbound.protection.outlook.com (PTR)):
  2305. 25/tcp open smtp syn-ack ttl 115 Microsoft Exchange smtpd
  2306. | smtp-commands: LO2GBR01FT005.mail.protection.outlook.com Hello [45.131.5.15], SIZE 157286400, PIPELINING, DSN, ENHANCEDSTATUSCODES, STARTTLS, 8BITMIME, BINARYMIME, CHUNKING, SMTPUTF8,
  2307. |_ This server supports the following commands: HELO EHLO STARTTLS RCPT DATA RSET MAIL QUIT HELP AUTH BDAT
  2308. | ssl-cert: Subject: commonName=mail.protection.outlook.com/organizationName=Microsoft Corporation/stateOrProvinceName=Washington/countryName=US
  2309. | Subject Alternative Name: DNS:mail.protection.outlook.com, DNS:*.mail.eo.outlook.com, DNS:*.mail.protection.outlook.com, DNS:mail.messaging.microsoft.com, DNS:outlook.com, DNS:*.olc.protection.outlook.com, DNS:*.pamx1.hotmail.com
  2310. | Issuer: commonName=GlobalSign Organization Validation CA - SHA256 - G3/organizationName=GlobalSign nv-sa/countryName=BE
  2311. | Public Key type: rsa
  2312. | Public Key bits: 2048
  2313. | Signature Algorithm: sha256WithRSAEncryption
  2314. | Not valid before: 2020-02-24T18:33:10
  2315. | Not valid after: 2022-02-24T18:33:10
  2316. | MD5: 4f90 9eee 29eb abe5 e29a d55e 8c08 c310
  2317. |_SHA-1: ea85 9504 40a6 97c1 8482 3304 a7dc 19e5 fcd5 8e6b
  2318. |_ssl-date: 2020-03-31T04:38:16+00:00; -1s from scanner time.
  2319. OS Info: Service Info: Host: LO2GBR01FT012.mail.protection.outlook.com; OS: Windows; CPE: cpe:/o:microsoft:windows
  2320. |_clock-skew: -1s
  2321. Scanning ip 84.45.34.163 ():
  2322. Scanning ip 212.50.171.0 ():
  2323. Scanning ip 173.245.59.122 (jake.ns.cloudflare.com (PTR)):
  2324. 53/tcp open domain syn-ack ttl 59 (unknown banner: 20171212)
  2325. | dns-nsid:
  2326. | NSID: 20m226 (32306d323236)
  2327. | id.server: AMS
  2328. |_ bind.version: 20171212
  2329. | fingerprint-strings:
  2330. | DNSVersionBindReqTCP:
  2331. | version
  2332. | bind
  2333. |_ 20171212
  2334. Scanning ip 80.169.89.102 (www.cityoflondon.gov.uk.):
  2335. 80/tcp open http syn-ack ttl 53 COL-VMW-M-LB02
  2336. | fingerprint-strings:
  2337. | FourOhFourRequest:
  2338. | HTTP/1.1 301 Moved Permanently
  2339. | Location: https:///nice%20ports%2C/Tri%6Eity.txt%2ebak
  2340. | Server: COL-VMW-M-LB02
  2341. | Cache-Control: no-cache
  2342. | Connection: close
  2343. | GenericLines:
  2344. | HTTP/1.1 301 Moved Permanently
  2345. | Location: https://
  2346. | Server: COL-VMW-M-LB02
  2347. | Cache-Control: no-cache
  2348. | Connection: close
  2349. | GetRequest, HTTPOptions, RTSPRequest:
  2350. | HTTP/1.1 301 Moved Permanently
  2351. | Location: https:///
  2352. | Server: COL-VMW-M-LB02
  2353. | Cache-Control: no-cache
  2354. | Connection: close
  2355. | SIPOptions:
  2356. | HTTP/1.1 301 Moved Permanently
  2357. | Location: https://sip:nm
  2358. | Server: COL-VMW-M-LB02
  2359. | Cache-Control: no-cache
  2360. |_ Connection: close
  2361. | http-methods:
  2362. |_ Supported Methods: GET HEAD POST OPTIONS
  2363. |_http-server-header: COL-VMW-M-LB02
  2364. |_http-title: Did not follow redirect to https://80.169.89.102/
  2365. |_https-redirect: ERROR: Script execution failed (use -d to debug)
  2366. 443/tcp open ssl/http syn-ack ttl 53 Microsoft IIS httpd 7.5
  2367. | http-methods:
  2368. |_ Supported Methods: GET HEAD POST OPTIONS
  2369. |_http-server-header: Microsoft-IIS/7.5
  2370. | http-title: Welcome to the City of London Corporation
  2371. |_Requested resource was https://80.169.89.102/Pages/default.aspx
  2372. | ssl-cert: Subject: commonName=*.cityoflondon.gov.uk/organizationName=City of London Corporation/countryName=GB
  2373. | Subject Alternative Name: DNS:*.cityoflondon.gov.uk, DNS:cityoflondon.gov.uk
  2374. | Issuer: commonName=Entrust Certification Authority - L1K/organizationName=Entrust, Inc./countryName=US
  2375. | Public Key type: rsa
  2376. | Public Key bits: 2048
  2377. | Signature Algorithm: sha256WithRSAEncryption
  2378. | Not valid before: 2019-01-09T10:15:04
  2379. | Not valid after: 2021-01-09T10:45:03
  2380. | MD5: 4f24 791b 0cf7 72b6 48e0 faac 5dd4 3c66
  2381. |_SHA-1: 414c 9a2c e74f b30a 5c45 a40d 2288 a043 93d7 4d99
  2382. |_ssl-date: TLS randomness does not represent time
  2383. OS Info: Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
  2384. Scanning ip 80.169.89.106 ():
  2385. 80/tcp open http syn-ack ttl 117 Microsoft IIS httpd 8.5
  2386. | http-methods:
  2387. | Supported Methods: OPTIONS TRACE GET HEAD POST
  2388. |_ Potentially risky methods: TRACE
  2389. |_http-server-header: Microsoft-IIS/8.5
  2390. |_http-title: 403 - Forbidden: Access is denied.
  2391. 443/tcp open ssl/https? syn-ack ttl 117
  2392. |_ssl-date: 2020-03-31T04:47:53+00:00; +3m45s from scanner time.
  2393. OS Info: Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
  2394. |_clock-skew: 3m44s
  2395. Scanning ip 23.227.38.64 ():
  2396. 80/tcp open http syn-ack ttl 59 cloudflare
  2397. | fingerprint-strings:
  2398. | FourOhFourRequest:
  2399. | HTTP/1.1 400 Bad Request
  2400. | Date: Tue, 31 Mar 2020 04:45:17 GMT
  2401. | Content-Type: text/html
  2402. | Content-Length: 155
  2403. | Connection: close
  2404. | Server: cloudflare
  2405. | CF-RAY: 57c76b857cf3faa0-AMS
  2406. | <html>
  2407. | <head><title>400 Bad Request</title></head>
  2408. | <body>
  2409. | <center><h1>400 Bad Request</h1></center>
  2410. | <hr><center>cloudflare</center>
  2411. | </body>
  2412. | </html>
  2413. | GetRequest:
  2414. | HTTP/1.1 400 Bad Request
  2415. | Date: Tue, 31 Mar 2020 04:45:16 GMT
  2416. | Content-Type: text/html
  2417. | Content-Length: 155
  2418. | Connection: close
  2419. | Server: cloudflare
  2420. | CF-RAY: 57c76b800fb19ccf-AMS
  2421. | <html>
  2422. | <head><title>400 Bad Request</title></head>
  2423. | <body>
  2424. | <center><h1>400 Bad Request</h1></center>
  2425. | <hr><center>cloudflare</center>
  2426. | </body>
  2427. | </html>
  2428. | HTTPOptions:
  2429. | HTTP/1.1 400 Bad Request
  2430. | Date: Tue, 31 Mar 2020 04:45:16 GMT
  2431. | Content-Type: text/html
  2432. | Content-Length: 155
  2433. | Connection: close
  2434. | Server: cloudflare
  2435. | CF-RAY: 57c76b81791dd8c9-AMS
  2436. | <html>
  2437. | <head><title>400 Bad Request</title></head>
  2438. | <body>
  2439. | <center><h1>400 Bad Request</h1></center>
  2440. | <hr><center>cloudflare</center>
  2441. | </body>
  2442. | </html>
  2443. | RPCCheck:
  2444. | HTTP/1.1 400 Bad Request
  2445. | Server: cloudflare
  2446. | Date: Tue, 31 Mar 2020 04:45:22 GMT
  2447. | Content-Type: text/html
  2448. | Content-Length: 155
  2449. | Connection: close
  2450. | CF-RAY: -
  2451. | <html>
  2452. | <head><title>400 Bad Request</title></head>
  2453. | <body>
  2454. | <center><h1>400 Bad Request</h1></center>
  2455. | <hr><center>cloudflare</center>
  2456. | </body>
  2457. | </html>
  2458. | RTSPRequest:
  2459. | <html>
  2460. | <head><title>400 Bad Request</title></head>
  2461. | <body>
  2462. | <center><h1>400 Bad Request</h1></center>
  2463. | <hr><center>cloudflare</center>
  2464. | </body>
  2465. | </html>
  2466. | X11Probe:
  2467. | HTTP/1.1 400 Bad Request
  2468. | Server: cloudflare
  2469. | Date: Tue, 31 Mar 2020 04:45:16 GMT
  2470. | Content-Type: text/html
  2471. | Content-Length: 155
  2472. | Connection: close
  2473. | CF-RAY: -
  2474. | <html>
  2475. | <head><title>400 Bad Request</title></head>
  2476. | <body>
  2477. | <center><h1>400 Bad Request</h1></center>
  2478. | <hr><center>cloudflare</center>
  2479. | </body>
  2480. |_ </html>
  2481. |_http-server-header: cloudflare
  2482. |_http-title: Site doesn't have a title (text/plain; charset=UTF-8).
  2483. 443/tcp open ssl/https syn-ack ttl 59 cloudflare
  2484. | fingerprint-strings:
  2485. | FourOhFourRequest:
  2486. | HTTP/1.1 403 Forbidden
  2487. | Server: cloudflare
  2488. | Date: Tue, 31 Mar 2020 04:45:23 GMT
  2489. | Content-Type: text/html
  2490. | Content-Length: 151
  2491. | Connection: close
  2492. | CF-RAY: 57c76bad182bfaac-AMS
  2493. | <html>
  2494. | <head><title>403 Forbidden</title></head>
  2495. | <body>
  2496. | <center><h1>403 Forbidden</h1></center>
  2497. | <hr><center>cloudflare</center>
  2498. | </body>
  2499. | </html>
  2500. | GetRequest:
  2501. | HTTP/1.1 403 Forbidden
  2502. | Server: cloudflare
  2503. | Date: Tue, 31 Mar 2020 04:45:22 GMT
  2504. | Content-Type: text/html
  2505. | Content-Length: 151
  2506. | Connection: close
  2507. | CF-RAY: 57c76ba7af85fa5c-AMS
  2508. | <html>
  2509. | <head><title>403 Forbidden</title></head>
  2510. | <body>
  2511. | <center><h1>403 Forbidden</h1></center>
  2512. | <hr><center>cloudflare</center>
  2513. | </body>
  2514. | </html>
  2515. | HTTPOptions:
  2516. | HTTP/1.1 403 Forbidden
  2517. | Server: cloudflare
  2518. | Date: Tue, 31 Mar 2020 04:45:22 GMT
  2519. | Content-Type: text/html
  2520. | Content-Length: 151
  2521. | Connection: close
  2522. | CF-RAY: 57c76baa6b02d8f5-AMS
  2523. | <html>
  2524. | <head><title>403 Forbidden</title></head>
  2525. | <body>
  2526. | <center><h1>403 Forbidden</h1></center>
  2527. | <hr><center>cloudflare</center>
  2528. | </body>
  2529. | </html>
  2530. | RPCCheck:
  2531. | HTTP/1.1 400 Bad Request
  2532. | Server: cloudflare
  2533. | Date: Tue, 31 Mar 2020 04:45:29 GMT
  2534. | Content-Type: text/html
  2535. | Content-Length: 155
  2536. | Connection: close
  2537. | CF-RAY: -
  2538. | <html>
  2539. | <head><title>400 Bad Request</title></head>
  2540. | <body>
  2541. | <center><h1>400 Bad Request</h1></center>
  2542. | <hr><center>cloudflare</center>
  2543. | </body>
  2544. | </html>
  2545. | RTSPRequest:
  2546. | <html>
  2547. | <head><title>400 Bad Request</title></head>
  2548. | <body>
  2549. | <center><h1>400 Bad Request</h1></center>
  2550. | <hr><center>cloudflare</center>
  2551. | </body>
  2552. | </html>
  2553. | tor-versions:
  2554. | HTTP/1.1 400 Bad Request
  2555. | Server: cloudflare
  2556. | Date: Tue, 31 Mar 2020 04:45:23 GMT
  2557. | Content-Type: text/html
  2558. | Content-Length: 155
  2559. | Connection: close
  2560. | CF-RAY: -
  2561. | <html>
  2562. | <head><title>400 Bad Request</title></head>
  2563. | <body>
  2564. | <center><h1>400 Bad Request</h1></center>
  2565. | <hr><center>cloudflare</center>
  2566. | </body>
  2567. |_ </html>
  2568. |_http-server-header: cloudflare
  2569. |_http-title: 403 Forbidden
  2570. | ssl-cert: Subject: commonName=*.myshopify.com/organizationName=CloudFlare, Inc./stateOrProvinceName=CA/countryName=US
  2571. | Subject Alternative Name: DNS:myshopify.com, DNS:*.myshopify.com
  2572. | Issuer: commonName=CloudFlare Inc ECC CA-2/organizationName=CloudFlare, Inc./stateOrProvinceName=CA/countryName=US
  2573. | Public Key type: ec
  2574. | Public Key bits: 256
  2575. | Signature Algorithm: ecdsa-with-SHA256
  2576. | Not valid before: 2019-05-02T00:00:00
  2577. | Not valid after: 2020-05-02T12:00:00
  2578. | MD5: fe65 4aba cdcd ccaf a90d 23a3 d4f1 32ac
  2579. |_SHA-1: 8381 f18f 5e77 f549 a0f0 3adf 21d7 a486 0b73 85ac
  2580. |_ssl-date: 2020-03-31T04:45:48+00:00; -2s from scanner time.
  2581. | tls-alpn:
  2582. | h2
  2583. |_ http/1.1
  2584. | tls-nextprotoneg:
  2585. | h2
  2586. |_ http/1.1
  2587. 8080/tcp open http-proxy syn-ack ttl 59 cloudflare
  2588. | fingerprint-strings:
  2589. | FourOhFourRequest:
  2590. | HTTP/1.1 400 Bad Request
  2591. | Date: Tue, 31 Mar 2020 04:45:16 GMT
  2592. | Content-Type: text/html
  2593. | Content-Length: 155
  2594. | Connection: close
  2595. | Server: cloudflare
  2596. | CF-RAY: 57c76b841bb9fa54-AMS
  2597. | <html>
  2598. | <head><title>400 Bad Request</title></head>
  2599. | <body>
  2600. | <center><h1>400 Bad Request</h1></center>
  2601. | <hr><center>cloudflare</center>
  2602. | </body>
  2603. | </html>
  2604. | GetRequest:
  2605. | HTTP/1.1 400 Bad Request
  2606. | Date: Tue, 31 Mar 2020 04:45:16 GMT
  2607. | Content-Type: text/html
  2608. | Content-Length: 155
  2609. | Connection: close
  2610. | Server: cloudflare
  2611. | CF-RAY: 57c76b800d5a9d36-AMS
  2612. | <html>
  2613. | <head><title>400 Bad Request</title></head>
  2614. | <body>
  2615. | <center><h1>400 Bad Request</h1></center>
  2616. | <hr><center>cloudflare</center>
  2617. | </body>
  2618. | </html>
  2619. | HTTPOptions:
  2620. | HTTP/1.1 400 Bad Request
  2621. | Date: Tue, 31 Mar 2020 04:45:16 GMT
  2622. | Content-Type: text/html
  2623. | Content-Length: 155
  2624. | Connection: close
  2625. | Server: cloudflare
  2626. | CF-RAY: 57c76b816a842b38-AMS
  2627. | <html>
  2628. | <head><title>400 Bad Request</title></head>
  2629. | <body>
  2630. | <center><h1>400 Bad Request</h1></center>
  2631. | <hr><center>cloudflare</center>
  2632. | </body>
  2633. | </html>
  2634. | RTSPRequest:
  2635. | <html>
  2636. | <head><title>400 Bad Request</title></head>
  2637. | <body>
  2638. | <center><h1>400 Bad Request</h1></center>
  2639. | <hr><center>cloudflare</center>
  2640. | </body>
  2641. | </html>
  2642. | Socks4, Socks5:
  2643. | HTTP/1.1 400 Bad Request
  2644. | Server: cloudflare
  2645. | Date: Tue, 31 Mar 2020 04:45:17 GMT
  2646. | Content-Type: text/html
  2647. | Content-Length: 155
  2648. | Connection: close
  2649. | CF-RAY: -
  2650. | <html>
  2651. | <head><title>400 Bad Request</title></head>
  2652. | <body>
  2653. | <center><h1>400 Bad Request</h1></center>
  2654. | <hr><center>cloudflare</center>
  2655. | </body>
  2656. |_ </html>
  2657. |_http-server-header: cloudflare
  2658. |_http-title: Site doesn't have a title (text/plain; charset=UTF-8).
  2659. 8443/tcp open ssl/https-alt syn-ack ttl 59 cloudflare
  2660. | fingerprint-strings:
  2661. | DNSVersionBindReqTCP, RPCCheck:
  2662. | HTTP/1.1 400 Bad Request
  2663. | Server: cloudflare
  2664. | Date: Tue, 31 Mar 2020 04:45:29 GMT
  2665. | Content-Type: text/html
  2666. | Content-Length: 155
  2667. | Connection: close
  2668. | CF-RAY: -
  2669. | <html>
  2670. | <head><title>400 Bad Request</title></head>
  2671. | <body>
  2672. | <center><h1>400 Bad Request</h1></center>
  2673. | <hr><center>cloudflare</center>
  2674. | </body>
  2675. | </html>
  2676. | FourOhFourRequest:
  2677. | HTTP/1.1 403 Forbidden
  2678. | Server: cloudflare
  2679. | Date: Tue, 31 Mar 2020 04:45:23 GMT
  2680. | Content-Type: text/html
  2681. | Content-Length: 151
  2682. | Connection: close
  2683. | CF-RAY: 57c76bad0db9d92d-AMS
  2684. | <html>
  2685. | <head><title>403 Forbidden</title></head>
  2686. | <body>
  2687. | <center><h1>403 Forbidden</h1></center>
  2688. | <hr><center>cloudflare</center>
  2689. | </body>
  2690. | </html>
  2691. | GetRequest:
  2692. | HTTP/1.1 403 Forbidden
  2693. | Server: cloudflare
  2694. | Date: Tue, 31 Mar 2020 04:45:22 GMT
  2695. | Content-Type: text/html
  2696. | Content-Length: 151
  2697. | Connection: close
  2698. | CF-RAY: 57c76ba7af2d727b-AMS
  2699. | <html>
  2700. | <head><title>403 Forbidden</title></head>
  2701. | <body>
  2702. | <center><h1>403 Forbidden</h1></center>
  2703. | <hr><center>cloudflare</center>
  2704. | </body>
  2705. | </html>
  2706. | HTTPOptions:
  2707. | HTTP/1.1 403 Forbidden
  2708. | Server: cloudflare
  2709. | Date: Tue, 31 Mar 2020 04:45:22 GMT
  2710. | Content-Type: text/html
  2711. | Content-Length: 151
  2712. | Connection: close
  2713. | CF-RAY: 57c76baa68cafa40-AMS
  2714. | <html>
  2715. | <head><title>403 Forbidden</title></head>
  2716. | <body>
  2717. | <center><h1>403 Forbidden</h1></center>
  2718. | <hr><center>cloudflare</center>
  2719. | </body>
  2720. | </html>
  2721. | RTSPRequest:
  2722. | <html>
  2723. | <head><title>400 Bad Request</title></head>
  2724. | <body>
  2725. | <center><h1>400 Bad Request</h1></center>
  2726. | <hr><center>cloudflare</center>
  2727. | </body>
  2728. |_ </html>
  2729. |_http-server-header: cloudflare
  2730. |_http-title: 403 Forbidden
  2731. | ssl-cert: Subject: commonName=*.myshopify.com/organizationName=CloudFlare, Inc./stateOrProvinceName=CA/countryName=US
  2732. | Subject Alternative Name: DNS:myshopify.com, DNS:*.myshopify.com
  2733. | Issuer: commonName=CloudFlare Inc ECC CA-2/organizationName=CloudFlare, Inc./stateOrProvinceName=CA/countryName=US
  2734. | Public Key type: ec
  2735. | Public Key bits: 256
  2736. | Signature Algorithm: ecdsa-with-SHA256
  2737. | Not valid before: 2019-05-02T00:00:00
  2738. | Not valid after: 2020-05-02T12:00:00
  2739. | MD5: fe65 4aba cdcd ccaf a90d 23a3 d4f1 32ac
  2740. |_SHA-1: 8381 f18f 5e77 f549 a0f0 3adf 21d7 a486 0b73 85ac
  2741. |_ssl-date: 2020-03-31T04:45:48+00:00; -2s from scanner time.
  2742. | tls-alpn:
  2743. | h2
  2744. |_ http/1.1
  2745. | tls-nextprotoneg:
  2746. | h2
  2747. |_ http/1.1
  2748. Scanning ip 104.47.20.36 (mail-cwlgbr010036.inbound.protection.outlook.com (PTR)):
  2749. 25/tcp open smtp syn-ack ttl 112 Microsoft Exchange smtpd
  2750. | smtp-commands: CWLGBR01FT007.mail.protection.outlook.com Hello [45.131.5.15], SIZE 157286400, PIPELINING, DSN, ENHANCEDSTATUSCODES, STARTTLS, 8BITMIME, BINARYMIME, CHUNKING, SMTPUTF8,
  2751. |_ This server supports the following commands: HELO EHLO STARTTLS RCPT DATA RSET MAIL QUIT HELP AUTH BDAT
  2752. | ssl-cert: Subject: commonName=mail.protection.outlook.com/organizationName=Microsoft Corporation/stateOrProvinceName=Washington/countryName=US
  2753. | Subject Alternative Name: DNS:mail.protection.outlook.com, DNS:*.mail.eo.outlook.com, DNS:*.mail.protection.outlook.com, DNS:mail.messaging.microsoft.com, DNS:outlook.com, DNS:*.olc.protection.outlook.com, DNS:*.pamx1.hotmail.com
  2754. | Issuer: commonName=GlobalSign Organization Validation CA - SHA256 - G3/organizationName=GlobalSign nv-sa/countryName=BE
  2755. | Public Key type: rsa
  2756. | Public Key bits: 2048
  2757. | Signature Algorithm: sha256WithRSAEncryption
  2758. | Not valid before: 2020-02-24T18:33:10
  2759. | Not valid after: 2022-02-24T18:33:10
  2760. | MD5: 4f90 9eee 29eb abe5 e29a d55e 8c08 c310
  2761. |_SHA-1: ea85 9504 40a6 97c1 8482 3304 a7dc 19e5 fcd5 8e6b
  2762. |_ssl-date: 2020-03-31T04:46:05+00:00; -1s from scanner time.
  2763. OS Info: Service Info: Host: CWLGBR01FT007.mail.protection.outlook.com; OS: Windows; CPE: cpe:/o:microsoft:windows
  2764. |_clock-skew: -1s
  2765. WebCrawling domain's web servers... up to 50 max links.
  2766.  
  2767. + URL to crawl: http://www2.cityoflondon.gov.uk.
  2768. + Date: 2020-03-31
  2769.  
  2770. + Crawling URL: http://www2.cityoflondon.gov.uk.:
  2771. + Links:
  2772. + Crawling http://www2.cityoflondon.gov.uk. (400 Bad Request)
  2773. + Searching for directories...
  2774. + Searching open folders...
  2775.  
  2776.  
  2777. + URL to crawl: https://www2.cityoflondon.gov.uk.
  2778. + Date: 2020-03-31
  2779.  
  2780. + Crawling URL: https://www2.cityoflondon.gov.uk.:
  2781. + Links:
  2782. + Crawling https://www2.cityoflondon.gov.uk. ([SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:727))
  2783. + Searching for directories...
  2784. + Searching open folders...
  2785.  
  2786.  
  2787. + URL to crawl: http://www.cityoflondon.gov.uk.
  2788. + Date: 2020-03-31
  2789.  
  2790. + Crawling URL: http://www.cityoflondon.gov.uk.:
  2791. + Links:
  2792. + Crawling http://www.cityoflondon.gov.uk.
  2793. + Searching for directories...
  2794. + Searching open folders...
  2795.  
  2796.  
  2797. + URL to crawl: https://www.cityoflondon.gov.uk.
  2798. + Date: 2020-03-31
  2799.  
  2800. + Crawling URL: https://www.cityoflondon.gov.uk.:
  2801. + Links:
  2802. + Crawling https://www.cityoflondon.gov.uk.
  2803. + Searching for directories...
  2804. + Searching open folders...
  2805.  
  2806. --Finished--
  2807. Summary information for domain cityoflondon.gov.uk.
  2808. -----------------------------------------
  2809. Domain Specific Information:
  2810. Email: thecitycentre@cityoflondon.gov.uk.
  2811. Email: Susan.Pearson@cityoflondon.gov.uk&
  2812. Email: Wootton@cityoflondon.gov.uk&
  2813. Email: kevin.mulcahy@cityoflondon.gov.uk
  2814. Email: bankarea@cityoflondon.gov.uk]
  2815. Email: artizanlib@cityoflondon.gov.uk.
  2816. Email: LADO@cityoflondon.gov.uk
  2817. Email: vicki.wells@cityoflondon.gov.uk.
  2818. Email: citybridgetrust@cityoflondon.gov.uk
  2819. Email: pro@cityoflondon.gov.uk�
  2820. Email: roger.gifford@cityoflondon.gov.uk.
  2821. Email: kevin.mulcahy@cityoflondon.gov.uk�
  2822. Email: Sukhjit.Gill@cityoflondon.gov.uk.
  2823. Email: zoe.nation@cityoflondon.gov.uk
  2824. Email: Sukhjit.Gill@cityoflondon.gov.uk
  2825. Email: zoe.nation@cityoflondon.gov.uk�
  2826. Email: joanna.burnaby-atkins@cityoflondon.gov.uk. - Is this real?
  2827. Email: Vicki.Wells@cityoflondon.gov.uk]
  2828. Email: michael.bennett@cityoflondon.gov.uk:
  2829. Email: citybridgetrust@cityoflondon.gov.uk.
  2830. Email: barbicanlib@cityoflondon.gov.uk.
  2831.  
  2832. Domain Ips Information:
  2833. IP: 52.100.0.0
  2834. Type: SPF
  2835. Is Active: False
  2836. IP: 52.200.59.0
  2837. Type: SPF
  2838. Is Active: False
  2839. IP: 148.105.0.0
  2840. Type: SPF
  2841. Is Active: False
  2842. IP: 162.159.38.116
  2843. HostName: treasure.ns.cloudflare.com Type: NS
  2844. HostName: treasure.ns.cloudflare.com Type: PTR
  2845. Country: None
  2846. Is Active: True (echo-reply ttl 59)
  2847. Port: 53/tcp open domain syn-ack ttl 59 (unknown banner: 20171212)
  2848. Script Info: | dns-nsid:
  2849. Script Info: | NSID: 20m391 (32306d333931)
  2850. Script Info: | id.server: AMS
  2851. Script Info: |_ bind.version: 20171212
  2852. Script Info: | fingerprint-strings:
  2853. Script Info: | DNSVersionBindReqTCP:
  2854. Script Info: | version
  2855. Script Info: | bind
  2856. Script Info: |_ 20171212
  2857. IP: 74.63.212.0
  2858. Type: SPF
  2859. Is Active: False
  2860. IP: 148.105.8.0
  2861. Type: SPF
  2862. Is Active: False
  2863. IP: 205.201.128.0
  2864. Type: SPF
  2865. Type: SPF
  2866. Is Active: True (syn-ack ttl 58)
  2867. Port: 25/tcp open smtp syn-ack ttl 58 Postfix smtpd
  2868. Script Info: |_smtp-commands: pmta45.mailchimp.prod.atl01.rsglab.com, PIPELINING, SIZE 10240000, ENHANCEDSTATUSCODES, 8BITMIME, SMTPUTF8,
  2869. Port: 80/tcp open http syn-ack ttl 58 nginx 1.8.1
  2870. Script Info: | http-methods:
  2871. Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
  2872. Script Info: |_http-server-header: nginx/1.8.1
  2873. Script Info: |_http-title: Did not follow redirect to https://mailchimp.com/about/mcsv-static
  2874. Os Info: Host: pmta45.mailchimp.prod.atl01.rsglab.com
  2875. IP: 80.169.89.98
  2876. HostName: www2.cityoflondon.gov.uk. Type: A
  2877. Country: United Kingdom
  2878. Is Active: True (syn-ack ttl 117)
  2879. Port: 80/tcp open http syn-ack ttl 117 Microsoft IIS httpd 10.0
  2880. Script Info: | http-methods:
  2881. Script Info: | Supported Methods: OPTIONS TRACE GET HEAD POST
  2882. Script Info: |_ Potentially risky methods: TRACE
  2883. Script Info: |_http-server-header: Microsoft-IIS/10.0
  2884. Script Info: |_http-title: IIS Windows Server
  2885. Port: 443/tcp open ssl/http syn-ack ttl 117 Microsoft IIS httpd 10.0
  2886. Script Info: | http-methods:
  2887. Script Info: | Supported Methods: OPTIONS TRACE GET HEAD POST
  2888. Script Info: |_ Potentially risky methods: TRACE
  2889. Script Info: |_http-server-header: Microsoft-IIS/10.0
  2890. Script Info: |_http-title: IIS Windows Server
  2891. Script Info: | ssl-cert: Subject: commonName=WMSvc-SHA2-COL-VMW-P-LIM01
  2892. Script Info: | Issuer: commonName=WMSvc-SHA2-COL-VMW-P-LIM01
  2893. Script Info: | Public Key type: rsa
  2894. Script Info: | Public Key bits: 2048
  2895. Script Info: | Signature Algorithm: sha256WithRSAEncryption
  2896. Script Info: | Not valid before: 2020-01-09T15:25:04
  2897. Script Info: | Not valid after: 2030-01-06T15:25:04
  2898. Script Info: | MD5: b2e4 3b70 c10c ffc8 c699 3005 94ab 1fe1
  2899. Script Info: |_SHA-1: 8b35 9e30 d522 59a4 b205 a607 4cfa 5a0e df4f dc13
  2900. Script Info: |_ssl-date: 2020-03-31T04:40:55+00:00; +3m45s from scanner time.
  2901. Script Info: | tls-alpn:
  2902. Script Info: | h2
  2903. Script Info: |_ http/1.1
  2904. Os Info: OS: Windows; CPE: cpe:/o:microsoft:windows
  2905. Script Info: |_clock-skew: 3m44s
  2906. IP: 66.240.227.0
  2907. Type: SPF
  2908. Is Active: False
  2909. IP: 86.111.216.0
  2910. Type: SPF
  2911. Is Active: False
  2912. IP: 198.2.128.0
  2913. Type: SPF
  2914. Type: SPF
  2915. Is Active: True (reset ttl 58)
  2916. Port: 80/tcp open http syn-ack ttl 58 nginx 1.6.1
  2917. Script Info: |_http-server-header: nginx/1.6.1
  2918. Script Info: |_http-title: 403 Forbidden
  2919. Script Info: Device type: general purpose|storage-misc|broadband router|router|WAP
  2920. Script Info: Running (JUST GUESSING): Linux 2.6.X|3.X (93%), HP embedded (90%), MikroTik RouterOS 6.X (89%), Ubiquiti AirOS 5.X (89%), Ubiquiti embedded (87%), Ruckus embedded (87%), AVM FritzOS 6.X (87%)
  2921. IP: 34.245.210.0
  2922. Type: SPF
  2923. Type: SPF
  2924. Is Active: False
  2925. IP: 63.143.59.128
  2926. Type: SPF
  2927. Is Active: False
  2928. IP: 85.115.32.0
  2929. Type: SPF
  2930. Is Active: False
  2931. IP: 80.169.89.85
  2932. Type: SPF
  2933. Is Active: False
  2934. IP: 89.145.127.252
  2935. Type: SPF
  2936. Is Active: True (echo-reply ttl 56)
  2937. IP: 63.143.57.128
  2938. Type: SPF
  2939. Is Active: False
  2940. IP: 104.47.21.36
  2941. HostName: cityoflondon-gov-uk.mail.protection.outlook.com Type: MX
  2942. HostName: mail-lo2gbr010036.inbound.protection.outlook.com Type: PTR
  2943. Country: United Kingdom
  2944. Is Active: True (syn-ack ttl 115)
  2945. Port: 25/tcp open smtp syn-ack ttl 115 Microsoft Exchange smtpd
  2946. Script Info: | smtp-commands: LO2GBR01FT005.mail.protection.outlook.com Hello [45.131.5.15], SIZE 157286400, PIPELINING, DSN, ENHANCEDSTATUSCODES, STARTTLS, 8BITMIME, BINARYMIME, CHUNKING, SMTPUTF8,
  2947. Script Info: |_ This server supports the following commands: HELO EHLO STARTTLS RCPT DATA RSET MAIL QUIT HELP AUTH BDAT
  2948. Script Info: | ssl-cert: Subject: commonName=mail.protection.outlook.com/organizationName=Microsoft Corporation/stateOrProvinceName=Washington/countryName=US
  2949. Script Info: | Subject Alternative Name: DNS:mail.protection.outlook.com, DNS:*.mail.eo.outlook.com, DNS:*.mail.protection.outlook.com, DNS:mail.messaging.microsoft.com, DNS:outlook.com, DNS:*.olc.protection.outlook.com, DNS:*.pamx1.hotmail.com
  2950. Script Info: | Issuer: commonName=GlobalSign Organization Validation CA - SHA256 - G3/organizationName=GlobalSign nv-sa/countryName=BE
  2951. Script Info: | Public Key type: rsa
  2952. Script Info: | Public Key bits: 2048
  2953. Script Info: | Signature Algorithm: sha256WithRSAEncryption
  2954. Script Info: | Not valid before: 2020-02-24T18:33:10
  2955. Script Info: | Not valid after: 2022-02-24T18:33:10
  2956. Script Info: | MD5: 4f90 9eee 29eb abe5 e29a d55e 8c08 c310
  2957. Script Info: |_SHA-1: ea85 9504 40a6 97c1 8482 3304 a7dc 19e5 fcd5 8e6b
  2958. Script Info: |_ssl-date: 2020-03-31T04:38:16+00:00; -1s from scanner time.
  2959. Os Info: Host: LO2GBR01FT012.mail.protection.outlook.com; OS: Windows; CPE: cpe:/o:microsoft:windows
  2960. Script Info: |_clock-skew: -1s
  2961. IP: 192.151.176.0
  2962. Type: SPF
  2963. Is Active: False
  2964. IP: 84.45.34.163
  2965. Type: SPF
  2966. Is Active: True (echo-reply ttl 56)
  2967. IP: 212.50.171.0
  2968. Type: SPF
  2969. Is Active: True (abort ttl 244)
  2970. IP: 135.84.216.0
  2971. Type: SPF
  2972. Is Active: False
  2973. IP: 40.107.0.0
  2974. Type: SPF
  2975. Is Active: False
  2976. IP: 173.245.59.122
  2977. HostName: jake.ns.cloudflare.com Type: NS
  2978. HostName: jake.ns.cloudflare.com Type: PTR
  2979. Country: United States
  2980. Is Active: True (echo-reply ttl 59)
  2981. Port: 53/tcp open domain syn-ack ttl 59 (unknown banner: 20171212)
  2982. Script Info: | dns-nsid:
  2983. Script Info: | NSID: 20m226 (32306d323236)
  2984. Script Info: | id.server: AMS
  2985. Script Info: |_ bind.version: 20171212
  2986. Script Info: | fingerprint-strings:
  2987. Script Info: | DNSVersionBindReqTCP:
  2988. Script Info: | version
  2989. Script Info: | bind
  2990. Script Info: |_ 20171212
  2991. IP: 40.92.0.0
  2992. Type: SPF
  2993. Is Active: False
  2994. IP: 196.216.238.0
  2995. Type: SPF
  2996. Is Active: False
  2997. IP: 80.169.89.109
  2998. Type: SPF
  2999. Is Active: False
  3000. IP: 116.50.56.0
  3001. Type: SPF
  3002. Is Active: False
  3003. IP: 208.87.232.0
  3004. Type: SPF
  3005. Is Active: False
  3006. IP: 80.169.89.102
  3007. HostName: www.cityoflondon.gov.uk. Type: A
  3008. Country: United Kingdom
  3009. Is Active: True (syn-ack ttl 53)
  3010. Port: 80/tcp open http syn-ack ttl 53 COL-VMW-M-LB02
  3011. Script Info: | fingerprint-strings:
  3012. Script Info: | FourOhFourRequest:
  3013. Script Info: | HTTP/1.1 301 Moved Permanently
  3014. Script Info: | Location: https:///nice%20ports%2C/Tri%6Eity.txt%2ebak
  3015. Script Info: | Server: COL-VMW-M-LB02
  3016. Script Info: | Cache-Control: no-cache
  3017. Script Info: | Connection: close
  3018. Script Info: | GenericLines:
  3019. Script Info: | HTTP/1.1 301 Moved Permanently
  3020. Script Info: | Location: https://
  3021. Script Info: | Server: COL-VMW-M-LB02
  3022. Script Info: | Cache-Control: no-cache
  3023. Script Info: | Connection: close
  3024. Script Info: | GetRequest, HTTPOptions, RTSPRequest:
  3025. Script Info: | HTTP/1.1 301 Moved Permanently
  3026. Script Info: | Location: https:///
  3027. Script Info: | Server: COL-VMW-M-LB02
  3028. Script Info: | Cache-Control: no-cache
  3029. Script Info: | Connection: close
  3030. Script Info: | SIPOptions:
  3031. Script Info: | HTTP/1.1 301 Moved Permanently
  3032. Script Info: | Location: https://sip:nm
  3033. Script Info: | Server: COL-VMW-M-LB02
  3034. Script Info: | Cache-Control: no-cache
  3035. Script Info: |_ Connection: close
  3036. Script Info: | http-methods:
  3037. Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
  3038. Script Info: |_http-server-header: COL-VMW-M-LB02
  3039. Script Info: |_http-title: Did not follow redirect to https://80.169.89.102/
  3040. Script Info: |_https-redirect: ERROR: Script execution failed (use -d to debug)
  3041. Port: 443/tcp open ssl/http syn-ack ttl 53 Microsoft IIS httpd 7.5
  3042. Script Info: | http-methods:
  3043. Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
  3044. Script Info: |_http-server-header: Microsoft-IIS/7.5
  3045. Script Info: | http-title: Welcome to the City of London Corporation
  3046. Script Info: |_Requested resource was https://80.169.89.102/Pages/default.aspx
  3047. Script Info: | ssl-cert: Subject: commonName=*.cityoflondon.gov.uk/organizationName=City of London Corporation/countryName=GB
  3048. Script Info: | Subject Alternative Name: DNS:*.cityoflondon.gov.uk, DNS:cityoflondon.gov.uk
  3049. Script Info: | Issuer: commonName=Entrust Certification Authority - L1K/organizationName=Entrust, Inc./countryName=US
  3050. Script Info: | Public Key type: rsa
  3051. Script Info: | Public Key bits: 2048
  3052. Script Info: | Signature Algorithm: sha256WithRSAEncryption
  3053. Script Info: | Not valid before: 2019-01-09T10:15:04
  3054. Script Info: | Not valid after: 2021-01-09T10:45:03
  3055. Script Info: | MD5: 4f24 791b 0cf7 72b6 48e0 faac 5dd4 3c66
  3056. Script Info: |_SHA-1: 414c 9a2c e74f b30a 5c45 a40d 2288 a043 93d7 4d99
  3057. Script Info: |_ssl-date: TLS randomness does not represent time
  3058. Os Info: OS: Windows; CPE: cpe:/o:microsoft:windows
  3059. IP: 80.169.89.106
  3060. Type: SPF
  3061. Is Active: True (syn-ack ttl 117)
  3062. Port: 80/tcp open http syn-ack ttl 117 Microsoft IIS httpd 8.5
  3063. Script Info: | http-methods:
  3064. Script Info: | Supported Methods: OPTIONS TRACE GET HEAD POST
  3065. Script Info: |_ Potentially risky methods: TRACE
  3066. Script Info: |_http-server-header: Microsoft-IIS/8.5
  3067. Script Info: |_http-title: 403 - Forbidden: Access is denied.
  3068. Port: 443/tcp open ssl/https? syn-ack ttl 117
  3069. Script Info: |_ssl-date: 2020-03-31T04:47:53+00:00; +3m45s from scanner time.
  3070. Os Info: OS: Windows; CPE: cpe:/o:microsoft:windows
  3071. Script Info: |_clock-skew: 3m44s
  3072. IP: 104.47.0.0
  3073. Type: SPF
  3074. Is Active: False
  3075. IP: 132.174.100.127
  3076. Type: SPF
  3077. Is Active: False
  3078. IP: 216.98.158.0
  3079. Type: SPF
  3080. Is Active: False
  3081. IP: 23.227.38.64
  3082. Type: SPF
  3083. Is Active: True (echo-reply ttl 59)
  3084. Port: 80/tcp open http syn-ack ttl 59 cloudflare
  3085. Script Info: | fingerprint-strings:
  3086. Script Info: | FourOhFourRequest:
  3087. Script Info: | HTTP/1.1 400 Bad Request
  3088. Script Info: | Date: Tue, 31 Mar 2020 04:45:17 GMT
  3089. Script Info: | Content-Type: text/html
  3090. Script Info: | Content-Length: 155
  3091. Script Info: | Connection: close
  3092. Script Info: | Server: cloudflare
  3093. Script Info: | CF-RAY: 57c76b857cf3faa0-AMS
  3094. Script Info: | <html>
  3095. Script Info: | <head><title>400 Bad Request</title></head>
  3096. Script Info: | <body>
  3097. Script Info: | <center><h1>400 Bad Request</h1></center>
  3098. Script Info: | <hr><center>cloudflare</center>
  3099. Script Info: | </body>
  3100. Script Info: | </html>
  3101. Script Info: | GetRequest:
  3102. Script Info: | HTTP/1.1 400 Bad Request
  3103. Script Info: | Date: Tue, 31 Mar 2020 04:45:16 GMT
  3104. Script Info: | Content-Type: text/html
  3105. Script Info: | Content-Length: 155
  3106. Script Info: | Connection: close
  3107. Script Info: | Server: cloudflare
  3108. Script Info: | CF-RAY: 57c76b800fb19ccf-AMS
  3109. Script Info: | <html>
  3110. Script Info: | <head><title>400 Bad Request</title></head>
  3111. Script Info: | <body>
  3112. Script Info: | <center><h1>400 Bad Request</h1></center>
  3113. Script Info: | <hr><center>cloudflare</center>
  3114. Script Info: | </body>
  3115. Script Info: | </html>
  3116. Script Info: | HTTPOptions:
  3117. Script Info: | HTTP/1.1 400 Bad Request
  3118. Script Info: | Date: Tue, 31 Mar 2020 04:45:16 GMT
  3119. Script Info: | Content-Type: text/html
  3120. Script Info: | Content-Length: 155
  3121. Script Info: | Connection: close
  3122. Script Info: | Server: cloudflare
  3123. Script Info: | CF-RAY: 57c76b81791dd8c9-AMS
  3124. Script Info: | <html>
  3125. Script Info: | <head><title>400 Bad Request</title></head>
  3126. Script Info: | <body>
  3127. Script Info: | <center><h1>400 Bad Request</h1></center>
  3128. Script Info: | <hr><center>cloudflare</center>
  3129. Script Info: | </body>
  3130. Script Info: | </html>
  3131. Script Info: | RPCCheck:
  3132. Script Info: | HTTP/1.1 400 Bad Request
  3133. Script Info: | Server: cloudflare
  3134. Script Info: | Date: Tue, 31 Mar 2020 04:45:22 GMT
  3135. Script Info: | Content-Type: text/html
  3136. Script Info: | Content-Length: 155
  3137. Script Info: | Connection: close
  3138. Script Info: | CF-RAY: -
  3139. Script Info: | <html>
  3140. Script Info: | <head><title>400 Bad Request</title></head>
  3141. Script Info: | <body>
  3142. Script Info: | <center><h1>400 Bad Request</h1></center>
  3143. Script Info: | <hr><center>cloudflare</center>
  3144. Script Info: | </body>
  3145. Script Info: | </html>
  3146. Script Info: | RTSPRequest:
  3147. Script Info: | <html>
  3148. Script Info: | <head><title>400 Bad Request</title></head>
  3149. Script Info: | <body>
  3150. Script Info: | <center><h1>400 Bad Request</h1></center>
  3151. Script Info: | <hr><center>cloudflare</center>
  3152. Script Info: | </body>
  3153. Script Info: | </html>
  3154. Script Info: | X11Probe:
  3155. Script Info: | HTTP/1.1 400 Bad Request
  3156. Script Info: | Server: cloudflare
  3157. Script Info: | Date: Tue, 31 Mar 2020 04:45:16 GMT
  3158. Script Info: | Content-Type: text/html
  3159. Script Info: | Content-Length: 155
  3160. Script Info: | Connection: close
  3161. Script Info: | CF-RAY: -
  3162. Script Info: | <html>
  3163. Script Info: | <head><title>400 Bad Request</title></head>
  3164. Script Info: | <body>
  3165. Script Info: | <center><h1>400 Bad Request</h1></center>
  3166. Script Info: | <hr><center>cloudflare</center>
  3167. Script Info: | </body>
  3168. Script Info: |_ </html>
  3169. Script Info: |_http-server-header: cloudflare
  3170. Script Info: |_http-title: Site doesn't have a title (text/plain; charset=UTF-8).
  3171. Port: 443/tcp open ssl/https syn-ack ttl 59 cloudflare
  3172. Script Info: | fingerprint-strings:
  3173. Script Info: | FourOhFourRequest:
  3174. Script Info: | HTTP/1.1 403 Forbidden
  3175. Script Info: | Server: cloudflare
  3176. Script Info: | Date: Tue, 31 Mar 2020 04:45:23 GMT
  3177. Script Info: | Content-Type: text/html
  3178. Script Info: | Content-Length: 151
  3179. Script Info: | Connection: close
  3180. Script Info: | CF-RAY: 57c76bad182bfaac-AMS
  3181. Script Info: | <html>
  3182. Script Info: | <head><title>403 Forbidden</title></head>
  3183. Script Info: | <body>
  3184. Script Info: | <center><h1>403 Forbidden</h1></center>
  3185. Script Info: | <hr><center>cloudflare</center>
  3186. Script Info: | </body>
  3187. Script Info: | </html>
  3188. Script Info: | GetRequest:
  3189. Script Info: | HTTP/1.1 403 Forbidden
  3190. Script Info: | Server: cloudflare
  3191. Script Info: | Date: Tue, 31 Mar 2020 04:45:22 GMT
  3192. Script Info: | Content-Type: text/html
  3193. Script Info: | Content-Length: 151
  3194. Script Info: | Connection: close
  3195. Script Info: | CF-RAY: 57c76ba7af85fa5c-AMS
  3196. Script Info: | <html>
  3197. Script Info: | <head><title>403 Forbidden</title></head>
  3198. Script Info: | <body>
  3199. Script Info: | <center><h1>403 Forbidden</h1></center>
  3200. Script Info: | <hr><center>cloudflare</center>
  3201. Script Info: | </body>
  3202. Script Info: | </html>
  3203. Script Info: | HTTPOptions:
  3204. Script Info: | HTTP/1.1 403 Forbidden
  3205. Script Info: | Server: cloudflare
  3206. Script Info: | Date: Tue, 31 Mar 2020 04:45:22 GMT
  3207. Script Info: | Content-Type: text/html
  3208. Script Info: | Content-Length: 151
  3209. Script Info: | Connection: close
  3210. Script Info: | CF-RAY: 57c76baa6b02d8f5-AMS
  3211. Script Info: | <html>
  3212. Script Info: | <head><title>403 Forbidden</title></head>
  3213. Script Info: | <body>
  3214. Script Info: | <center><h1>403 Forbidden</h1></center>
  3215. Script Info: | <hr><center>cloudflare</center>
  3216. Script Info: | </body>
  3217. Script Info: | </html>
  3218. Script Info: | RPCCheck:
  3219. Script Info: | HTTP/1.1 400 Bad Request
  3220. Script Info: | Server: cloudflare
  3221. Script Info: | Date: Tue, 31 Mar 2020 04:45:29 GMT
  3222. Script Info: | Content-Type: text/html
  3223. Script Info: | Content-Length: 155
  3224. Script Info: | Connection: close
  3225. Script Info: | CF-RAY: -
  3226. Script Info: | <html>
  3227. Script Info: | <head><title>400 Bad Request</title></head>
  3228. Script Info: | <body>
  3229. Script Info: | <center><h1>400 Bad Request</h1></center>
  3230. Script Info: | <hr><center>cloudflare</center>
  3231. Script Info: | </body>
  3232. Script Info: | </html>
  3233. Script Info: | RTSPRequest:
  3234. Script Info: | <html>
  3235. Script Info: | <head><title>400 Bad Request</title></head>
  3236. Script Info: | <body>
  3237. Script Info: | <center><h1>400 Bad Request</h1></center>
  3238. Script Info: | <hr><center>cloudflare</center>
  3239. Script Info: | </body>
  3240. Script Info: | </html>
  3241. Script Info: | tor-versions:
  3242. Script Info: | HTTP/1.1 400 Bad Request
  3243. Script Info: | Server: cloudflare
  3244. Script Info: | Date: Tue, 31 Mar 2020 04:45:23 GMT
  3245. Script Info: | Content-Type: text/html
  3246. Script Info: | Content-Length: 155
  3247. Script Info: | Connection: close
  3248. Script Info: | CF-RAY: -
  3249. Script Info: | <html>
  3250. Script Info: | <head><title>400 Bad Request</title></head>
  3251. Script Info: | <body>
  3252. Script Info: | <center><h1>400 Bad Request</h1></center>
  3253. Script Info: | <hr><center>cloudflare</center>
  3254. Script Info: | </body>
  3255. Script Info: |_ </html>
  3256. Script Info: |_http-server-header: cloudflare
  3257. Script Info: |_http-title: 403 Forbidden
  3258. Script Info: | ssl-cert: Subject: commonName=*.myshopify.com/organizationName=CloudFlare, Inc./stateOrProvinceName=CA/countryName=US
  3259. Script Info: | Subject Alternative Name: DNS:myshopify.com, DNS:*.myshopify.com
  3260. Script Info: | Issuer: commonName=CloudFlare Inc ECC CA-2/organizationName=CloudFlare, Inc./stateOrProvinceName=CA/countryName=US
  3261. Script Info: | Public Key type: ec
  3262. Script Info: | Public Key bits: 256
  3263. Script Info: | Signature Algorithm: ecdsa-with-SHA256
  3264. Script Info: | Not valid before: 2019-05-02T00:00:00
  3265. Script Info: | Not valid after: 2020-05-02T12:00:00
  3266. Script Info: | MD5: fe65 4aba cdcd ccaf a90d 23a3 d4f1 32ac
  3267. Script Info: |_SHA-1: 8381 f18f 5e77 f549 a0f0 3adf 21d7 a486 0b73 85ac
  3268. Script Info: |_ssl-date: 2020-03-31T04:45:48+00:00; -2s from scanner time.
  3269. Script Info: | tls-alpn:
  3270. Script Info: | h2
  3271. Script Info: |_ http/1.1
  3272. Script Info: | tls-nextprotoneg:
  3273. Script Info: | h2
  3274. Script Info: |_ http/1.1
  3275. Port: 8080/tcp open http-proxy syn-ack ttl 59 cloudflare
  3276. Script Info: | fingerprint-strings:
  3277. Script Info: | FourOhFourRequest:
  3278. Script Info: | HTTP/1.1 400 Bad Request
  3279. Script Info: | Date: Tue, 31 Mar 2020 04:45:16 GMT
  3280. Script Info: | Content-Type: text/html
  3281. Script Info: | Content-Length: 155
  3282. Script Info: | Connection: close
  3283. Script Info: | Server: cloudflare
  3284. Script Info: | CF-RAY: 57c76b841bb9fa54-AMS
  3285. Script Info: | <html>
  3286. Script Info: | <head><title>400 Bad Request</title></head>
  3287. Script Info: | <body>
  3288. Script Info: | <center><h1>400 Bad Request</h1></center>
  3289. Script Info: | <hr><center>cloudflare</center>
  3290. Script Info: | </body>
  3291. Script Info: | </html>
  3292. Script Info: | GetRequest:
  3293. Script Info: | HTTP/1.1 400 Bad Request
  3294. Script Info: | Date: Tue, 31 Mar 2020 04:45:16 GMT
  3295. Script Info: | Content-Type: text/html
  3296. Script Info: | Content-Length: 155
  3297. Script Info: | Connection: close
  3298. Script Info: | Server: cloudflare
  3299. Script Info: | CF-RAY: 57c76b800d5a9d36-AMS
  3300. Script Info: | <html>
  3301. Script Info: | <head><title>400 Bad Request</title></head>
  3302. Script Info: | <body>
  3303. Script Info: | <center><h1>400 Bad Request</h1></center>
  3304. Script Info: | <hr><center>cloudflare</center>
  3305. Script Info: | </body>
  3306. Script Info: | </html>
  3307. Script Info: | HTTPOptions:
  3308. Script Info: | HTTP/1.1 400 Bad Request
  3309. Script Info: | Date: Tue, 31 Mar 2020 04:45:16 GMT
  3310. Script Info: | Content-Type: text/html
  3311. Script Info: | Content-Length: 155
  3312. Script Info: | Connection: close
  3313. Script Info: | Server: cloudflare
  3314. Script Info: | CF-RAY: 57c76b816a842b38-AMS
  3315. Script Info: | <html>
  3316. Script Info: | <head><title>400 Bad Request</title></head>
  3317. Script Info: | <body>
  3318. Script Info: | <center><h1>400 Bad Request</h1></center>
  3319. Script Info: | <hr><center>cloudflare</center>
  3320. Script Info: | </body>
  3321. Script Info: | </html>
  3322. Script Info: | RTSPRequest:
  3323. Script Info: | <html>
  3324. Script Info: | <head><title>400 Bad Request</title></head>
  3325. Script Info: | <body>
  3326. Script Info: | <center><h1>400 Bad Request</h1></center>
  3327. Script Info: | <hr><center>cloudflare</center>
  3328. Script Info: | </body>
  3329. Script Info: | </html>
  3330. Script Info: | Socks4, Socks5:
  3331. Script Info: | HTTP/1.1 400 Bad Request
  3332. Script Info: | Server: cloudflare
  3333. Script Info: | Date: Tue, 31 Mar 2020 04:45:17 GMT
  3334. Script Info: | Content-Type: text/html
  3335. Script Info: | Content-Length: 155
  3336. Script Info: | Connection: close
  3337. Script Info: | CF-RAY: -
  3338. Script Info: | <html>
  3339. Script Info: | <head><title>400 Bad Request</title></head>
  3340. Script Info: | <body>
  3341. Script Info: | <center><h1>400 Bad Request</h1></center>
  3342. Script Info: | <hr><center>cloudflare</center>
  3343. Script Info: | </body>
  3344. Script Info: |_ </html>
  3345. Script Info: |_http-server-header: cloudflare
  3346. Script Info: |_http-title: Site doesn't have a title (text/plain; charset=UTF-8).
  3347. Port: 8443/tcp open ssl/https-alt syn-ack ttl 59 cloudflare
  3348. Script Info: | fingerprint-strings:
  3349. Script Info: | DNSVersionBindReqTCP, RPCCheck:
  3350. Script Info: | HTTP/1.1 400 Bad Request
  3351. Script Info: | Server: cloudflare
  3352. Script Info: | Date: Tue, 31 Mar 2020 04:45:29 GMT
  3353. Script Info: | Content-Type: text/html
  3354. Script Info: | Content-Length: 155
  3355. Script Info: | Connection: close
  3356. Script Info: | CF-RAY: -
  3357. Script Info: | <html>
  3358. Script Info: | <head><title>400 Bad Request</title></head>
  3359. Script Info: | <body>
  3360. Script Info: | <center><h1>400 Bad Request</h1></center>
  3361. Script Info: | <hr><center>cloudflare</center>
  3362. Script Info: | </body>
  3363. Script Info: | </html>
  3364. Script Info: | FourOhFourRequest:
  3365. Script Info: | HTTP/1.1 403 Forbidden
  3366. Script Info: | Server: cloudflare
  3367. Script Info: | Date: Tue, 31 Mar 2020 04:45:23 GMT
  3368. Script Info: | Content-Type: text/html
  3369. Script Info: | Content-Length: 151
  3370. Script Info: | Connection: close
  3371. Script Info: | CF-RAY: 57c76bad0db9d92d-AMS
  3372. Script Info: | <html>
  3373. Script Info: | <head><title>403 Forbidden</title></head>
  3374. Script Info: | <body>
  3375. Script Info: | <center><h1>403 Forbidden</h1></center>
  3376. Script Info: | <hr><center>cloudflare</center>
  3377. Script Info: | </body>
  3378. Script Info: | </html>
  3379. Script Info: | GetRequest:
  3380. Script Info: | HTTP/1.1 403 Forbidden
  3381. Script Info: | Server: cloudflare
  3382. Script Info: | Date: Tue, 31 Mar 2020 04:45:22 GMT
  3383. Script Info: | Content-Type: text/html
  3384. Script Info: | Content-Length: 151
  3385. Script Info: | Connection: close
  3386. Script Info: | CF-RAY: 57c76ba7af2d727b-AMS
  3387. Script Info: | <html>
  3388. Script Info: | <head><title>403 Forbidden</title></head>
  3389. Script Info: | <body>
  3390. Script Info: | <center><h1>403 Forbidden</h1></center>
  3391. Script Info: | <hr><center>cloudflare</center>
  3392. Script Info: | </body>
  3393. Script Info: | </html>
  3394. Script Info: | HTTPOptions:
  3395. Script Info: | HTTP/1.1 403 Forbidden
  3396. Script Info: | Server: cloudflare
  3397. Script Info: | Date: Tue, 31 Mar 2020 04:45:22 GMT
  3398. Script Info: | Content-Type: text/html
  3399. Script Info: | Content-Length: 151
  3400. Script Info: | Connection: close
  3401. Script Info: | CF-RAY: 57c76baa68cafa40-AMS
  3402. Script Info: | <html>
  3403. Script Info: | <head><title>403 Forbidden</title></head>
  3404. Script Info: | <body>
  3405. Script Info: | <center><h1>403 Forbidden</h1></center>
  3406. Script Info: | <hr><center>cloudflare</center>
  3407. Script Info: | </body>
  3408. Script Info: | </html>
  3409. Script Info: | RTSPRequest:
  3410. Script Info: | <html>
  3411. Script Info: | <head><title>400 Bad Request</title></head>
  3412. Script Info: | <body>
  3413. Script Info: | <center><h1>400 Bad Request</h1></center>
  3414. Script Info: | <hr><center>cloudflare</center>
  3415. Script Info: | </body>
  3416. Script Info: |_ </html>
  3417. Script Info: |_http-server-header: cloudflare
  3418. Script Info: |_http-title: 403 Forbidden
  3419. Script Info: | ssl-cert: Subject: commonName=*.myshopify.com/organizationName=CloudFlare, Inc./stateOrProvinceName=CA/countryName=US
  3420. Script Info: | Subject Alternative Name: DNS:myshopify.com, DNS:*.myshopify.com
  3421. Script Info: | Issuer: commonName=CloudFlare Inc ECC CA-2/organizationName=CloudFlare, Inc./stateOrProvinceName=CA/countryName=US
  3422. Script Info: | Public Key type: ec
  3423. Script Info: | Public Key bits: 256
  3424. Script Info: | Signature Algorithm: ecdsa-with-SHA256
  3425. Script Info: | Not valid before: 2019-05-02T00:00:00
  3426. Script Info: | Not valid after: 2020-05-02T12:00:00
  3427. Script Info: | MD5: fe65 4aba cdcd ccaf a90d 23a3 d4f1 32ac
  3428. Script Info: |_SHA-1: 8381 f18f 5e77 f549 a0f0 3adf 21d7 a486 0b73 85ac
  3429. Script Info: |_ssl-date: 2020-03-31T04:45:48+00:00; -2s from scanner time.
  3430. Script Info: | tls-alpn:
  3431. Script Info: | h2
  3432. Script Info: |_ http/1.1
  3433. Script Info: | tls-nextprotoneg:
  3434. Script Info: | h2
  3435. Script Info: |_ http/1.1
  3436. IP: 80.169.89.96
  3437. HostName: www1.cityoflondon.gov.uk. Type: A
  3438. Country: United Kingdom
  3439. Is Active: False
  3440. IP: 104.47.20.36
  3441. HostName: cityoflondon-gov-uk.mail.protection.outlook.com Type: MX
  3442. HostName: mail-cwlgbr010036.inbound.protection.outlook.com Type: PTR
  3443. Country: United Kingdom
  3444. Is Active: True (syn-ack ttl 112)
  3445. Port: 25/tcp open smtp syn-ack ttl 112 Microsoft Exchange smtpd
  3446. Script Info: | smtp-commands: CWLGBR01FT007.mail.protection.outlook.com Hello [45.131.5.15], SIZE 157286400, PIPELINING, DSN, ENHANCEDSTATUSCODES, STARTTLS, 8BITMIME, BINARYMIME, CHUNKING, SMTPUTF8,
  3447. Script Info: |_ This server supports the following commands: HELO EHLO STARTTLS RCPT DATA RSET MAIL QUIT HELP AUTH BDAT
  3448. Script Info: | ssl-cert: Subject: commonName=mail.protection.outlook.com/organizationName=Microsoft Corporation/stateOrProvinceName=Washington/countryName=US
  3449. Script Info: | Subject Alternative Name: DNS:mail.protection.outlook.com, DNS:*.mail.eo.outlook.com, DNS:*.mail.protection.outlook.com, DNS:mail.messaging.microsoft.com, DNS:outlook.com, DNS:*.olc.protection.outlook.com, DNS:*.pamx1.hotmail.com
  3450. Script Info: | Issuer: commonName=GlobalSign Organization Validation CA - SHA256 - G3/organizationName=GlobalSign nv-sa/countryName=BE
  3451. Script Info: | Public Key type: rsa
  3452. Script Info: | Public Key bits: 2048
  3453. Script Info: | Signature Algorithm: sha256WithRSAEncryption
  3454. Script Info: | Not valid before: 2020-02-24T18:33:10
  3455. Script Info: | Not valid after: 2022-02-24T18:33:10
  3456. Script Info: | MD5: 4f90 9eee 29eb abe5 e29a d55e 8c08 c310
  3457. Script Info: |_SHA-1: ea85 9504 40a6 97c1 8482 3304 a7dc 19e5 fcd5 8e6b
  3458. Script Info: |_ssl-date: 2020-03-31T04:46:05+00:00; -1s from scanner time.
  3459. Os Info: Host: CWLGBR01FT007.mail.protection.outlook.com; OS: Windows; CPE: cpe:/o:microsoft:windows
  3460. Script Info: |_clock-skew: -1s
  3461.  
  3462. --------------End Summary --------------
  3463. -----------------------------------------
  3464. ##############################################################################################################################
  3465. [+] searching (sub)domains for cityoflondon.gov.uk using built-in wordlist
  3466. [+] using maximum random delay of 10 millisecond(s) between requests
  3467.  
  3468. cn.cityoflondon.gov.uk
  3469. IP address #1: 80.169.89.102
  3470.  
  3471. demo.cityoflondon.gov.uk
  3472. IP address #1: 80.169.89.101
  3473.  
  3474. email.cityoflondon.gov.uk
  3475. IP address #1: 91.206.118.10
  3476.  
  3477. m.cityoflondon.gov.uk
  3478. IP address #1: 80.169.89.82
  3479.  
  3480. mobile.cityoflondon.gov.uk
  3481. IP address #1: 80.169.89.102
  3482.  
  3483. news.cityoflondon.gov.uk
  3484. IP address #1: 18.203.123.9
  3485. IP address #2: 52.50.147.113
  3486. IP address #3: 52.31.6.52
  3487.  
  3488. remote.cityoflondon.gov.uk
  3489. IP address #1: 52.59.241.213
  3490.  
  3491. shop.cityoflondon.gov.uk
  3492. IP address #1: 23.227.38.32
  3493.  
  3494. staging.cityoflondon.gov.uk
  3495. IPv6 address #1: 2606:4700:10::6816:ea6
  3496. IPv6 address #2: 2606:4700:10::6816:fa6
  3497.  
  3498. staging.cityoflondon.gov.uk
  3499. IP address #1: 104.22.14.166
  3500. IP address #2: 104.22.15.166
  3501.  
  3502. vpn.cityoflondon.gov.uk
  3503. IP address #1: 86.54.176.2
  3504.  
  3505. www.cityoflondon.gov.uk
  3506. IP address #1: 80.169.89.102
  3507.  
  3508. www1.cityoflondon.gov.uk
  3509. IP address #1: 80.169.89.96
  3510.  
  3511. www2.cityoflondon.gov.uk
  3512. IP address #1: 80.169.89.98
  3513.  
  3514. [+] 14 (sub)domains and 18 IP address(es) found
  3515. [+] completion time: 956 second(s)
  3516. ###############################################################################################################################
  3517. ----- cityoflondon.gov.uk -----
  3518.  
  3519.  
  3520. Host's addresses:
  3521. __________________
  3522.  
  3523. cityoflondon.gov.uk. 300 IN A 80.169.89.102
  3524.  
  3525.  
  3526. Name Servers:
  3527. ______________
  3528.  
  3529. treasure.ns.cloudflare.com. 86400 IN A 162.159.38.116
  3530. jake.ns.cloudflare.com. 86400 IN A 173.245.59.122
  3531.  
  3532.  
  3533. Mail (MX) Servers:
  3534. ___________________
  3535.  
  3536. cityoflondon-gov-uk.mail.protection.outlook.com. 10 IN A 104.47.21.36
  3537. cityoflondon-gov-uk.mail.protection.outlook.com. 10 IN A 104.47.20.36
  3538.  
  3539.  
  3540.  
  3541. Google Results:
  3542. ________________
  3543.  
  3544. democracy.cityoflondon.gov.uk. 300 IN A 80.169.89.107
  3545. fyi.cityoflondon.gov.uk. 299 IN CNAME (
  3546. fyi.cityoflondon.gov.uk.openobjects.com. 3599 IN CNAME (
  3547. search4.openobjects.com. 3599 IN A 193.34.187.147
  3548.  
  3549.  
  3550. Brute forcing with /usr/share/dnsenum/dns.txt:
  3551. _______________________________________________
  3552.  
  3553. apps.cityoflondon.gov.uk. 300 IN A 80.169.89.106
  3554. ext.cityoflondon.gov.uk. 300 IN A 80.169.89.106
  3555. jobs.cityoflondon.gov.uk. 300 IN A 104.22.15.166
  3556. jobs.cityoflondon.gov.uk. 300 IN A 104.22.14.166
  3557. mail1.cityoflondon.gov.uk. 300 IN A 80.169.89.80
  3558. mail2.cityoflondon.gov.uk. 300 IN A 80.169.89.106
  3559. mobile.cityoflondon.gov.uk. 300 IN A 80.169.89.102
  3560. news.cityoflondon.gov.uk. 300 IN CNAME ssl-client.presspage.com.
  3561. ssl-client.presspage.com. 60 IN A 18.203.123.9
  3562. ssl-client.presspage.com. 60 IN A 52.31.6.52
  3563. ssl-client.presspage.com. 60 IN A 52.50.147.113
  3564. shop.cityoflondon.gov.uk. 260 IN A 23.227.38.32
  3565. vpn.cityoflondon.gov.uk. 300 IN A 86.54.176.2
  3566. www.cityoflondon.gov.uk. 77 IN A 80.169.89.102
  3567. www2.cityoflondon.gov.uk. 300 IN A 80.169.89.98
  3568.  
  3569.  
  3570. Launching Whois Queries:
  3571. _________________________
  3572.  
  3573. whois ip result: 23.227.38.0 -> 23.227.32.0/19
  3574. whois ip result: 86.54.176.0 -> 86.54.176.0/29
  3575. whois ip result: 104.22.14.0 -> 104.16.0.0/12
  3576. whois ip result: 80.169.89.0 -> 80.169.89.0/30
  3577.  
  3578.  
  3579. cityoflondon.gov.uk___________________
  3580.  
  3581. 80.169.89.0/30
  3582. 86.54.176.0/29
  3583. 104.16.0.0/12
  3584. 23.227.32.0/19
  3585. ###############################################################################################################################
  3586. URLCrazy Domain Report
  3587. Domain : www.cityoflondon.gov.uk
  3588. Keyboard : qwerty
  3589. At : 2020-03-31 00:30:34 -0400
  3590.  
  3591. # Please wait. 228 hostnames to process
  3592.  
  3593. Typo Type Typo DNS-A CC-A DNS-MX Extn
  3594. -----------------------------------------------------------------------------------------------------------------------------------------------------------------------
  3595. Character Omission ww.cityoflondon.gov.uk ? gov.uk
  3596. Character Omission www.citoflondon.gov.uk ? gov.uk
  3597. Character Omission www.cityflondon.gov.uk ? gov.uk
  3598. Character Omission www.cityoflndon.gov.uk ? gov.uk
  3599. Character Omission www.cityoflodon.gov.uk ? gov.uk
  3600. Character Omission www.cityoflondn.gov.uk ? gov.uk
  3601. Character Omission www.cityoflondo.gov.uk ? gov.uk
  3602. Character Omission www.cityoflonon.gov.uk ? gov.uk
  3603. Character Omission www.cityofondon.gov.uk ? gov.uk
  3604. Character Omission www.cityolondon.gov.uk ? gov.uk
  3605. Character Omission www.ciyoflondon.gov.uk ? gov.uk
  3606. Character Omission www.ctyoflondon.gov.uk ? gov.uk
  3607. Character Omission www.ityoflondon.gov.uk ? gov.uk
  3608. Character Omission wwwcityoflondon.gov.uk ? gov.uk
  3609. Character Repeat www.ccityoflondon.gov.uk ? gov.uk
  3610. Character Repeat www.ciityoflondon.gov.uk ? gov.uk
  3611. Character Repeat www.cittyoflondon.gov.uk ? gov.uk
  3612. Character Repeat www.cityofflondon.gov.uk ? gov.uk
  3613. Character Repeat www.cityofllondon.gov.uk ? gov.uk
  3614. Character Repeat www.cityoflonddon.gov.uk ? gov.uk
  3615. Character Repeat www.cityoflondonn.gov.uk ? gov.uk
  3616. Character Repeat www.cityoflondoon.gov.uk ? gov.uk
  3617. Character Repeat www.cityoflonndon.gov.uk ? gov.uk
  3618. Character Repeat www.cityofloondon.gov.uk ? gov.uk
  3619. Character Repeat www.cityooflondon.gov.uk ? gov.uk
  3620. Character Repeat www.cityyoflondon.gov.uk ? gov.uk
  3621. Character Repeat wwww.cityoflondon.gov.uk ? gov.uk
  3622. Character Swap ww.wcityoflondon.gov.uk ? gov.uk
  3623. Character Swap www.citoyflondon.gov.uk ? gov.uk
  3624. Character Swap www.cityfolondon.gov.uk ? gov.uk
  3625. Character Swap www.cityoflnodon.gov.uk ? gov.uk
  3626. Character Swap www.cityoflodnon.gov.uk ? gov.uk
  3627. Character Swap www.cityoflondno.gov.uk ? gov.uk
  3628. Character Swap www.cityoflonodn.gov.uk ? gov.uk
  3629. Character Swap www.cityofolndon.gov.uk ? gov.uk
  3630. Character Swap www.cityolfondon.gov.uk ? gov.uk
  3631. Character Swap www.ciytoflondon.gov.uk ? gov.uk
  3632. Character Swap www.ctiyoflondon.gov.uk ? gov.uk
  3633. Character Swap www.ictyoflondon.gov.uk ? gov.uk
  3634. Character Swap wwwc.ityoflondon.gov.uk ? gov.uk
  3635. Character Replacement eww.cityoflondon.gov.uk ? gov.uk
  3636. Character Replacement qww.cityoflondon.gov.uk ? gov.uk
  3637. Character Replacement wew.cityoflondon.gov.uk ? gov.uk
  3638. Character Replacement wqw.cityoflondon.gov.uk ? gov.uk
  3639. Character Replacement wwe.cityoflondon.gov.uk ? gov.uk
  3640. Character Replacement wwq.cityoflondon.gov.uk ? gov.uk
  3641. Character Replacement www.ciryoflondon.gov.uk ? gov.uk
  3642. Character Replacement www.cittoflondon.gov.uk ? gov.uk
  3643. Character Replacement www.cituoflondon.gov.uk ? gov.uk
  3644. Character Replacement www.cityiflondon.gov.uk ? gov.uk
  3645. Character Replacement www.cityodlondon.gov.uk ? gov.uk
  3646. Character Replacement www.cityofkondon.gov.uk ? gov.uk
  3647. Character Replacement www.cityoflindon.gov.uk ? gov.uk
  3648. Character Replacement www.cityoflobdon.gov.uk ? gov.uk
  3649. Character Replacement www.cityoflomdon.gov.uk ? gov.uk
  3650. Character Replacement www.cityoflondin.gov.uk ? gov.uk
  3651. Character Replacement www.cityoflondob.gov.uk ? gov.uk
  3652. Character Replacement www.cityoflondom.gov.uk ? gov.uk
  3653. Character Replacement www.cityoflondpn.gov.uk ? gov.uk
  3654. Character Replacement www.cityoflonfon.gov.uk ? gov.uk
  3655. Character Replacement www.cityoflonson.gov.uk ? gov.uk
  3656. Character Replacement www.cityoflpndon.gov.uk ? gov.uk
  3657. Character Replacement www.cityoglondon.gov.uk ? gov.uk
  3658. Character Replacement www.citypflondon.gov.uk ? gov.uk
  3659. Character Replacement www.ciyyoflondon.gov.uk ? gov.uk
  3660. Character Replacement www.cotyoflondon.gov.uk ? gov.uk
  3661. Character Replacement www.cutyoflondon.gov.uk ? gov.uk
  3662. Character Replacement www.vityoflondon.gov.uk ? gov.uk
  3663. Character Replacement www.xityoflondon.gov.uk ? gov.uk
  3664. Double Character Replacement eew.cityoflondon.gov.uk ? gov.uk
  3665. Double Character Replacement qqw.cityoflondon.gov.uk ? gov.uk
  3666. Double Character Replacement wee.cityoflondon.gov.uk ? gov.uk
  3667. Double Character Replacement wqq.cityoflondon.gov.uk ? gov.uk
  3668. Character Insertion weww.cityoflondon.gov.uk ? gov.uk
  3669. Character Insertion wqww.cityoflondon.gov.uk ? gov.uk
  3670. Character Insertion wwew.cityoflondon.gov.uk ? gov.uk
  3671. Character Insertion wwqw.cityoflondon.gov.uk ? gov.uk
  3672. Character Insertion www.ciotyoflondon.gov.uk ? gov.uk
  3673. Character Insertion www.citryoflondon.gov.uk ? gov.uk
  3674. Character Insertion www.cityofdlondon.gov.uk ? gov.uk
  3675. Character Insertion www.cityofglondon.gov.uk ? gov.uk
  3676. Character Insertion www.cityoflkondon.gov.uk ? gov.uk
  3677. Character Insertion www.cityofloindon.gov.uk ? gov.uk
  3678. Character Insertion www.cityoflonbdon.gov.uk ? gov.uk
  3679. Character Insertion www.cityoflondfon.gov.uk ? gov.uk
  3680. Character Insertion www.cityoflondoin.gov.uk ? gov.uk
  3681. Character Insertion www.cityoflondonb.gov.uk ? gov.uk
  3682. Character Insertion www.cityoflondonm.gov.uk ? gov.uk
  3683. Character Insertion www.cityoflondopn.gov.uk ? gov.uk
  3684. Character Insertion www.cityoflondson.gov.uk ? gov.uk
  3685. Character Insertion www.cityoflonmdon.gov.uk ? gov.uk
  3686. Character Insertion www.cityoflopndon.gov.uk ? gov.uk
  3687. Character Insertion www.cityoiflondon.gov.uk ? gov.uk
  3688. Character Insertion www.cityopflondon.gov.uk ? gov.uk
  3689. Character Insertion www.citytoflondon.gov.uk ? gov.uk
  3690. Character Insertion www.cityuoflondon.gov.uk ? gov.uk
  3691. Character Insertion www.ciutyoflondon.gov.uk ? gov.uk
  3692. Character Insertion www.cvityoflondon.gov.uk ? gov.uk
  3693. Character Insertion www.cxityoflondon.gov.uk ? gov.uk
  3694. Character Insertion wwwe.cityoflondon.gov.uk ? gov.uk
  3695. Character Insertion wwwq.cityoflondon.gov.uk ? gov.uk
  3696. Missing Dot wwwwww.cityoflondon.gov.uk ? gov.uk
  3697. Singular or Pluralise cityoflondon.gov.uk 80.169.89.102 GB,UNITED KINGDOM cityoflondon-gov-uk.mail.protection.outlook.com gov.uk
  3698. Singular or Pluralise cityoflondons.gov.uk ? gov.uk
  3699. Vowel Swap www.catyoflondon.gov.uk ? gov.uk
  3700. Vowel Swap www.cetyoflondon.gov.uk ? gov.uk
  3701. Homophones www.cayetyoflondon.gov.uk ? gov.uk
  3702. Homophones www.ceyetyoflondon.gov.uk ? gov.uk
  3703. Homophones www.cityoflondewn.gov.uk ? gov.uk
  3704. Homophones www.cityoflonduen.gov.uk ? gov.uk
  3705. Homophones www.cityoflowndon.gov.uk ? gov.uk
  3706. Bit Flipping 7ww.cityoflondon.gov.uk ? gov.uk
  3707. Bit Flipping gww.cityoflondon.gov.uk ? gov.uk
  3708. Bit Flipping sww.cityoflondon.gov.uk ? gov.uk
  3709. Bit Flipping uww.cityoflondon.gov.uk ? gov.uk
  3710. Bit Flipping vww.cityoflondon.gov.uk ? gov.uk
  3711. Bit Flipping w7w.cityoflondon.gov.uk ? gov.uk
  3712. Bit Flipping wgw.cityoflondon.gov.uk ? gov.uk
  3713. Bit Flipping wsw.cityoflondon.gov.uk ? gov.uk
  3714. Bit Flipping wuw.cityoflondon.gov.uk ? gov.uk
  3715. Bit Flipping wvw.cityoflondon.gov.uk ? gov.uk
  3716. Bit Flipping ww7.cityoflondon.gov.uk ? gov.uk
  3717. Bit Flipping wwg.cityoflondon.gov.uk ? gov.uk
  3718. Bit Flipping wws.cityoflondon.gov.uk ? gov.uk
  3719. Bit Flipping wwu.cityoflondon.gov.uk ? gov.uk
  3720. Bit Flipping wwv.cityoflondon.gov.uk ? gov.uk
  3721. Bit Flipping www.aityoflondon.gov.uk ? gov.uk
  3722. Bit Flipping www.bityoflondon.gov.uk ? gov.uk
  3723. Bit Flipping www.chtyoflondon.gov.uk ? gov.uk
  3724. Bit Flipping www.ci4yoflondon.gov.uk ? gov.uk
  3725. Bit Flipping www.cidyoflondon.gov.uk ? gov.uk
  3726. Bit Flipping www.cipyoflondon.gov.uk ? gov.uk
  3727. Bit Flipping www.cit9oflondon.gov.uk ? gov.uk
  3728. Bit Flipping www.citioflondon.gov.uk ? gov.uk
  3729. Bit Flipping www.citqoflondon.gov.uk ? gov.uk
  3730. Bit Flipping www.citxoflondon.gov.uk ? gov.uk
  3731. Bit Flipping www.citygflondon.gov.uk ? gov.uk
  3732. Bit Flipping www.citykflondon.gov.uk ? gov.uk
  3733. Bit Flipping www.citymflondon.gov.uk ? gov.uk
  3734. Bit Flipping www.citynflondon.gov.uk ? gov.uk
  3735. Bit Flipping www.cityoblondon.gov.uk ? gov.uk
  3736. Bit Flipping www.cityofdondon.gov.uk ? gov.uk
  3737. Bit Flipping www.cityofhondon.gov.uk ? gov.uk
  3738. Bit Flipping www.cityoflgndon.gov.uk ? gov.uk
  3739. Bit Flipping www.cityoflkndon.gov.uk ? gov.uk
  3740. Bit Flipping www.cityoflmndon.gov.uk ? gov.uk
  3741. Bit Flipping www.cityoflnndon.gov.uk ? gov.uk
  3742. Bit Flipping www.cityoflo.don.gov.uk ? gov.uk
  3743. Bit Flipping www.cityoflofdon.gov.uk ? gov.uk
  3744. Bit Flipping www.cityoflojdon.gov.uk ? gov.uk
  3745. Bit Flipping www.cityofloldon.gov.uk ? gov.uk
  3746. Bit Flipping www.cityoflondgn.gov.uk ? gov.uk
  3747. Bit Flipping www.cityoflondkn.gov.uk ? gov.uk
  3748. Bit Flipping www.cityoflondmn.gov.uk ? gov.uk
  3749. Bit Flipping www.cityoflondnn.gov.uk ? gov.uk
  3750. Bit Flipping www.cityoflondof.gov.uk ? gov.uk
  3751. Bit Flipping www.cityoflondoj.gov.uk ? gov.uk
  3752. Bit Flipping www.cityoflondol.gov.uk ? gov.uk
  3753. Bit Flipping www.cityoflondon.gov.tk ? tk
  3754. Bit Flipping www.cityoflondoo.gov.uk ? gov.uk
  3755. Bit Flipping www.cityofloneon.gov.uk ? gov.uk
  3756. Bit Flipping www.cityoflonlon.gov.uk ? gov.uk
  3757. Bit Flipping www.cityoflonton.gov.uk ? gov.uk
  3758. Bit Flipping www.cityofloodon.gov.uk ? gov.uk
  3759. Bit Flipping www.cityofmondon.gov.uk ? gov.uk
  3760. Bit Flipping www.cityofnondon.gov.uk ? gov.uk
  3761. Bit Flipping www.cityonlondon.gov.uk ? gov.uk
  3762. Bit Flipping www.cityovlondon.gov.uk ? gov.uk
  3763. Bit Flipping www.ciuyoflondon.gov.uk ? gov.uk
  3764. Bit Flipping www.civyoflondon.gov.uk ? gov.uk
  3765. Bit Flipping www.cktyoflondon.gov.uk ? gov.uk
  3766. Bit Flipping www.cmtyoflondon.gov.uk ? gov.uk
  3767. Bit Flipping www.cytyoflondon.gov.uk ? gov.uk
  3768. Bit Flipping www.gityoflondon.gov.uk ? gov.uk
  3769. Bit Flipping www.kityoflondon.gov.uk ? gov.uk
  3770. Bit Flipping www.sityoflondon.gov.uk ? gov.uk
  3771. Bit Flipping wwwncityoflondon.gov.uk ? gov.uk
  3772. Homoglyphs vvvvvv.cityoflondon.gov.uk ? gov.uk
  3773. Homoglyphs vvvvw.cityoflondon.gov.uk ? gov.uk
  3774. Homoglyphs vvwvv.cityoflondon.gov.uk ? gov.uk
  3775. Homoglyphs vvww.cityoflondon.gov.uk ? gov.uk
  3776. Homoglyphs wvvvv.cityoflondon.gov.uk ? gov.uk
  3777. Homoglyphs wvvw.cityoflondon.gov.uk ? gov.uk
  3778. Homoglyphs wwvv.cityoflondon.gov.uk ? gov.uk
  3779. Homoglyphs www.city0fl0nd0n.gov.uk ? gov.uk
  3780. Homoglyphs www.city0fl0ndon.gov.uk ? gov.uk
  3781. Homoglyphs www.city0flond0n.gov.uk ? gov.uk
  3782. Homoglyphs www.city0flondon.gov.uk ? gov.uk
  3783. Homoglyphs www.cityof1ondon.gov.uk ? gov.uk
  3784. Homoglyphs www.cityofl0nd0n.gov.uk ? gov.uk
  3785. Homoglyphs www.cityofl0ndon.gov.uk ? gov.uk
  3786. Homoglyphs www.cityoflonclon.gov.uk ? gov.uk
  3787. Homoglyphs www.cityoflond0n.gov.uk ? gov.uk
  3788. Homoglyphs www.cltyoflondon.gov.uk ? gov.uk
  3789. Wrong TLD cityoflondon.ca 69.172.201.153 US,UNITED STATES mx247.in-mx.com ca
  3790. Wrong TLD cityoflondon.ch ? ch
  3791. Wrong TLD cityoflondon.com 212.124.206.2 GB,UNITED KINGDOM com
  3792. Wrong TLD cityoflondon.de 69.12.74.201 CO,COLOMBIA de
  3793. Wrong TLD cityoflondon.edu ? edu
  3794. Wrong TLD cityoflondon.es 69.172.201.153 US,UNITED STATES mx247.in-mx.net es
  3795. Wrong TLD cityoflondon.fr ? fr
  3796. Wrong TLD cityoflondon.it 185.53.178.7 mail.h-email.net it
  3797. Wrong TLD cityoflondon.jp ? jp
  3798. Wrong TLD cityoflondon.net ? net
  3799. Wrong TLD cityoflondon.nl ? nl
  3800. Wrong TLD cityoflondon.no ? no
  3801. Wrong TLD cityoflondon.org 212.227.53.126 DE,GERMANY mail.cityoflondon.org org
  3802. Wrong TLD cityoflondon.ru ? ru
  3803. Wrong TLD cityoflondon.se ? se
  3804. Wrong TLD cityoflondon.us ? us
  3805. Wrong SLD cityoflondon.ac.uk ? ac.uk
  3806. Wrong SLD cityoflondon.bl.uk ? bl.uk
  3807. Wrong SLD cityoflondon.british-library.uk ? british-library.uk
  3808. Wrong SLD cityoflondon.co.uk 87.117.232.10 GB,UNITED KINGDOM mail.adsonline.co.uk co.uk
  3809. Wrong SLD cityoflondon.icnet.uk ? icnet.uk
  3810. Wrong SLD cityoflondon.jet.uk ? jet.uk
  3811. Wrong SLD cityoflondon.ltd.uk ? ltd.uk
  3812. Wrong SLD cityoflondon.me.uk ? me.uk
  3813. Wrong SLD cityoflondon.mod.uk ? mod.uk
  3814. Wrong SLD cityoflondon.net.uk ? net.uk
  3815. Wrong SLD cityoflondon.nhs.uk ? mail.nhs.uk nhs.uk
  3816. Wrong SLD cityoflondon.nic.uk ? nic.uk
  3817. Wrong SLD cityoflondon.nls.uk ? nls.uk
  3818. Wrong SLD cityoflondon.org.uk 87.117.232.10 GB,UNITED KINGDOM mail.adsonline.co.uk org.uk
  3819. Wrong SLD cityoflondon.parliament.uk ? parliament.uk
  3820. Wrong SLD cityoflondon.plc.uk ? plc.uk
  3821. Wrong SLD cityoflondon.police.uk ? pnn-gw.pnn.police.uk police.uk
  3822. Wrong SLD cityoflondon.sch.uk ? sch.uk
  3823. ###############################################################################################################################
  3824. ------------------------------------------------------------------------------------------------------------------------------
  3825. [x] Error downloading /advanced_search
  3826. [3/25] https://www.cityoflondon.gov.uk/propertysearch/resourcefiles/pdf/epc-4chiswellst.pdf
  3827. [x] Error in PDF metadata Creator
  3828. [4/25] https://www.cityoflondon.gov.uk/propertysearch/resourcefiles/pdf/epc-eastcheap2-4.pdf
  3829. [x] Error in PDF metadata Creator
  3830. [5/25] http://www.cityoflondon.gov.uk/jobs/Documents/Previous_Pension_Rights_form.pdf
  3831. [6/25] https://www.cityoflondon.gov.uk/jobs/Documents/TrainingRoomsLocationMap.pdf
  3832. [7/25] https://www.cityoflondon.gov.uk/propertysearch/resourcefiles/pdf/38CharterhouseStreet.pdf
  3833. [8/25] https://www.cityoflondon.gov.uk/about-our-website/Documents/complaint_form.pdf
  3834. [x] Error downloading https://www.cityoflondon.gov.uk/about-our-website/Documents/complaint_form.pdf
  3835. [9/25] https://www.cityoflondon.gov.uk/training/old/Documents/security-policy.pdf
  3836. [10/25] https://www.cityoflondon.gov.uk/propertysearch/resourcefiles/pdf/38charterhouse-offices-epccert-0660-0831-4750-5509-3006.pdf
  3837. [11/25] https://www.cityoflondon.gov.uk/propertysearch/resourcefiles/pdf/76-78FleetSt.pdf
  3838. [12/25] http://www.cityoflondon.gov.uk/propertysearch/resourcefiles/pdf/38charterhouse-bar-retail-epccert-0983-3039-0211-0200-6705.pdf
  3839. [13/25] https://www.cityoflondon.gov.uk/jobs/Documents/Job-Information-Pack-GS496.pdf
  3840. [x] Error in the parsing process
  3841. [14/25] https://www.cityoflondon.gov.uk/business/licensing/Documents/street-trading-policy.pdf
  3842. [x] Error in the parsing process
  3843. [15/25] https://www.cityoflondon.gov.uk/business/licensing/Documents/hmo-standards-2019.pdf
  3844. [x] Error in the parsing process
  3845. [16/25] https://www.cityoflondon.gov.uk/jobs/Documents/Job-Information-Pack-CLSG143.pdf
  3846. [x] Error in the parsing process
  3847. [17/25] https://www.cityoflondon.gov.uk/jobs/Documents/Job-Information-Pack-TC776.pdf
  3848. [18/25] https://www.cityoflondon.gov.uk/jobs/Documents/Job-Information-Pack-TC750.pdf
  3849. [19/25] https://www.cityoflondon.gov.uk/jobs/Documents/Job-Information-Pack-TC745.pdf
  3850. [x] Error in the parsing process
  3851. [20/25] https://www.cityoflondon.gov.uk/jobs/Documents/Project-Coordintaor-Background-Information.pdf
  3852. [21/25] https://www.cityoflondon.gov.uk/jobs/Documents/Job-Information-Pack-CCS614.pdf
  3853. [22/25] https://www.cityoflondon.gov.uk/jobs/Documents/Job-Information-Pack-TC753.pdf
  3854. [23/25] https://www.cityoflondon.gov.uk/jobs/Documents/Job-Information-Pack-OS477.pdf
  3855. [x] Error in the parsing process
  3856. [24/25] https://www.cityoflondon.gov.uk/jobs/Documents/Job-Information-Pack-LC750.pdf
  3857. [25/25] https://www.cityoflondon.gov.uk/jobs/Documents/Job-Information-Pack-OS482.pdf
  3858. ------------------------------------------------------------------------------------------------------------------------------
  3859.  
  3860. [+] List of users found:
  3861. --------------------------
  3862. DCMS
  3863. PRO117
  3864. laptopuser
  3865. Shelley Bower
  3866. London Metropolitan Archives
  3867. BRE
  3868. readk
  3869. Louise Mankowska
  3870. Sylvia Kelcher;City of London Corporation
  3871.  
  3872. [+] List of software found:
  3873. -----------------------------
  3874. Microsoft Word 9.0
  3875. iText 1.4.8 (by lowagie.com)
  3876. Adobe PDF Library 10.0
  3877. Acrobat PDFMaker 10.0 for Word
  3878. Adobe PDF Library 9.0
  3879. Adobe InDesign CS4 (6.0.4)
  3880. ��Microsoft� Word 2010
  3881. Haru Free PDF Library 2.0.8
  3882. EPCgen
  3883. ��Microsoft� Word for Office 365
  3884. Microsoft� Word for Office 365
  3885. Microsoft Excel
  3886.  
  3887. [+] List of paths and servers found:
  3888. ---------------------------------------
  3889. 'C:\Bala\A_\A_42-4 Application to vary a premises licence.doc'
  3890. 'L:\Alcohol Licensing\Unit\Unit Tested Application Forms\Local Authority Version\A_42-4 Application to vary a premises licence.doc'
  3891. 'F:\AutoRecovery save of A_42-4 Application to vary a premises licence.asd'
  3892. 'L:\Alcohol Licensing\Unit\Live Application Forms\Local Authority Version\A_42-4 Application to vary a premises licence.doc'
  3893. 'L:\Alcohol Licensing\Unit\Live Application Forms\Public version\P_42-4 Application to vary a premises licence.doc'
  3894. 'G:\Licensing\REGULATIONS CONSULTATION\FINAL REGULATIONS\forms\050228 Forms final\premises licences and club certificates\P_Website\P_42-4 Application to vary a premises licence.doc'
  3895. Dot 42 4.dot
  3896.  
  3897. [+] List of e-mails found:
  3898. ----------------------------
  3899. pensions@cityoflondon.gov.uk
  3900. londonagency@fleurets.com.
  3901. londonagency@fleurets.com
  3902. ask.lma@cityoflondon.gov.uk
  3903. Rob.Macnab@knightfrank.com
  3904. Davies@knightfrank.com
  3905. cru@cityoflondon.gov.uk
  3906. ###############################################################################################################################
  3907. aldersgateward.org.uk
  3908. dowgateward.org.uk
  3909. cityofsport.org
  3910. guildhall-art-gallery.org.uk
  3911. towerbridge.org
  3912. towerbridge.eu
  3913. bassishawward.org.uk
  3914. bluebadgelondon.org.uk
  3915. cityacademies.co.uk
  3916. cityoflondonchina.cn
  3917. tomlinsoninquest.org.uk
  3918. towerward.org.uk
  3919. cripplegateward.org.uk
  3920. cityoflondon.gov.uk
  3921. keatshouse.org.uk
  3922. towerbridgeexhibition.org
  3923. visitthecity.co.uk
  3924. cityoflondon.police.uk
  3925. bridgehousegrants.org.uk
  3926. towerbridge.net
  3927. towerbridgeexhibition.info
  3928. ##############################################################################################################################
  3929. [+] www.cityoflondon.gov.uk has no SPF record!
  3930. [*] No DMARC record found. Looking for organizational record
  3931. [*] Found organizational DMARC record:
  3932. [*] v=DMARC1;p=reject;sp=reject;pct=100;rua=mailto:dmarc-rua@dmarc.service.gov.uk
  3933. [-] Organizational subdomain policy explicitly set to reject
  3934. [-] Spoofing not possible for www.cityoflondon.gov.uk
  3935. ###############################################################################################################################
  3936. WARNING: Duplicate port number(s) specified. Are you alert enough to be using Nmap? Have some coffee or Jolt(tm).
  3937. Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-31 00:35 EDT
  3938. Nmap scan report for www.cityoflondon.gov.uk (80.169.89.102)
  3939. Host is up (0.12s latency).
  3940. Not shown: 494 filtered ports
  3941. Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
  3942. PORT STATE SERVICE
  3943. 80/tcp open http
  3944. 443/tcp open https
  3945.  
  3946. Nmap done: 1 IP address (1 host up) scanned in 7.21 seconds
  3947. ###############################################################################################################################
  3948. Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-31 00:35 EDT
  3949. Nmap scan report for www.cityoflondon.gov.uk (80.169.89.102)
  3950. Host is up.
  3951.  
  3952. PORT STATE SERVICE
  3953. 53/udp open|filtered domain
  3954. 67/udp open|filtered dhcps
  3955. 68/udp open|filtered dhcpc
  3956. 69/udp open|filtered tftp
  3957. 88/udp open|filtered kerberos-sec
  3958. 123/udp open|filtered ntp
  3959. 137/udp open|filtered netbios-ns
  3960. 138/udp open|filtered netbios-dgm
  3961. 139/udp open|filtered netbios-ssn
  3962. 161/udp open|filtered snmp
  3963. 162/udp open|filtered snmptrap
  3964. 389/udp open|filtered ldap
  3965. 500/udp open|filtered isakmp
  3966. 520/udp open|filtered route
  3967. 2049/udp open|filtered nfs
  3968.  
  3969. Nmap done: 1 IP address (1 host up) scanned in 5.23 seconds
  3970. ##############################################################################################################################
  3971. HTTP/1.1 301 Moved Permanently
  3972. Location: https://www.cityoflondon.gov.uk/
  3973. Server: COL-VMW-M-LB02
  3974. Cache-Control: no-cache
  3975. Connection: close
  3976. ###############################################################################################################################
  3977. /about-our-website/Pages/accessibility.aspx
  3978. /about-our-website/Pages/Cookies.aspx
  3979. /about-our-website/Pages/cookies.aspx
  3980. /about-our-website/Pages/legal-notices.aspx
  3981. /about-our-website/Pages/legal-notices.aspx#socialmedia
  3982. /about-our-website/Pages/mobile.aspx
  3983. /about-our-website/Pages/privacy-notice.aspx
  3984. /about-our-website/Pages/social-media.aspx
  3985. /about-our-website/sitemap.aspx
  3986. /about-the-city/about-us/Pages/default.aspx
  3987. /about-the-city/about-us/Pages/how-to-find-us.aspx
  3988. /about-the-city/Pages/default.aspx
  3989. /about-the-city/PublishingImages/about-explore.jpg
  3990. /about-the-city/PublishingImages/pins-on-map.jpg
  3991. /about-the-city/voting-elections/Pages/default.aspx
  3992. /about-the-city/voting-elections/PublishingImages/voting.jpg
  3993. /business/business-rates/Pages/default.aspx
  3994. /business/Pages/default.aspx
  3995. /business/PublishingImages/business-people.jpg
  3996. /business/support-promotion-and-advice/Pages/covid-19-advice-for-businesses.aspx
  3997. /business/support-promotion-and-advice/Pages/support-relief-efforts-COVID-19.aspx
  3998. /business/support-promotion-and-advice/PublishingImages/covid-19-businesses-advice.jpg
  3999. /business/tenders-and-procurement/pages/responsible-procurement.aspx
  4000. /contact-us/Pages/default.aspx
  4001. /events/Pages/default.aspx
  4002. http://email.cityoflondon.gov.uk/linkapp/cmasubs.aspx?LinkID=pageid986790jkkzhq%40f%40f%40n9qh%40z%40f%40n9qh%40f%40f
  4003. http://email.cityoflondon.gov.uk/linkapp/cmasubs.aspx?LinkID=pageid986790jkkzhq@f@f@n9qh@z@f@n9qh@f@f
  4004. http://news.cityoflondon.gov.uk/
  4005. https://careers.cityoflondon.gov.uk/
  4006. https://news.cityoflondon.gov.uk/covid19-city-corporation-encourages-people-to-follow-new-government-instructions-on-parks/
  4007. https://news.cityoflondon.gov.uk/square-mile-businesses-offered-additional-rental-relief/
  4008. https://twitter.com/cityoflondon
  4009. https://www.facebook.com/CityofLondonCorp
  4010. https://www.youtube.com/user/CityofLondonvideos/videos
  4011. http://www.barbican.org.uk/
  4012. http://www.citybridgetrust.org.uk/
  4013. http://www.cityoflondon.police.uk/
  4014. http://www.towerbridge.org.uk/
  4015. http://www.w3.org/1999/xhtml
  4016. /_layouts/col/shop.aspx
  4017. /maps/Pages/geocortex-redirect.aspx
  4018. /maps/Pages/interactive-maps.aspx
  4019. /Pages/default.aspx
  4020. /report-pay-apply/Pages/report-pay-apply.aspx
  4021. /search/Pages/a-to-z.aspx
  4022. /services/health-and-wellbeing/Pages/covid-19.aspx
  4023. /services/health-and-wellbeing/PublishingImages/covid-19-residents.jpg
  4024. /services/Pages/default.aspx
  4025. /services/transport-and-streets/parking/Pages/covid-19-parking-and-driving-in-the-city.aspx
  4026. /services/transport-and-streets/roads-highways-and-pavements/Pages/current-road-closures-works-and-events.aspx
  4027. /services/transport-and-streets/roads-highways-and-pavements/PublishingImages/street-closures-130x86.jpg
  4028. /SiteCollectionImages/icons/icon-calendar.png
  4029. /SiteCollectionImages/icons/icon-eshot.png
  4030. /SiteCollectionImages/icons/icon-streetworks.png
  4031. text/javascript
  4032. /things-to-do/green-spaces/Pages/default.aspx
  4033. /things-to-do/green-spaces/PublishingImages/city-green.jpg
  4034. /things-to-do/Pages/default.aspx
  4035. /things-to-do/visit-the-city/whats-on/Pages/default.aspx
  4036. /things-to-do/visit-the-city/whats-on/PublishingImages/events-bubble.jpg
  4037. -//W3C//DTD XHTML 1.0 Transitional//EN
  4038. ###############################################################################################################################
  4039. http://www.cityoflondon.gov.uk [301 Moved Permanently] Country[UNITED KINGDOM][GB], HTTPServer[COL-VMW-M-LB02], IP[80.169.89.102], RedirectLocation[https://www.cityoflondon.gov.uk/]
  4040. https://www.cityoflondon.gov.uk/ [302 Found] Country[UNITED KINGDOM][GB], HTTPServer[Microsoft-IIS/7.5], IP[80.169.89.102], Microsoft-IIS[7.5], Microsoft-Sharepoint[14.0.0.7239], RedirectLocation[http://www.cityoflondon.gov.uk/Pages/default.aspx], Title[Document Moved], UncommonHeaders[sprequestguid,x-sharepointhealthscore,microsoftsharepointteamservices,x-ms-invokeapp], X-Powered-By[ASP.NET]
  4041. http://www.cityoflondon.gov.uk/Pages/default.aspx [301 Moved Permanently] Country[UNITED KINGDOM][GB], HTTPServer[COL-VMW-M-LB02], IP[80.169.89.102], RedirectLocation[https://www.cityoflondon.gov.uk/Pages/default.aspx]
  4042. https://www.cityoflondon.gov.uk/Pages/default.aspx [200 OK] ASP_NET[2.0.50727], Country[UNITED KINGDOM][GB], HTTPServer[Microsoft-IIS/7.5], IP[80.169.89.102], JQuery[1.6.2], Microsoft-IIS[7.5], Microsoft-Sharepoint[14.0.0.7239], Script[text/javascript], Title[Welcome to the City of London Corporation], UncommonHeaders[sprequestguid,x-sharepointhealthscore,microsoftsharepointteamservices,x-ms-invokeapp], X-Powered-By[ASP.NET], X-UA-Compatible[
  4043. ###############################################################################################################################
  4044.  
  4045. wig - WebApp Information Gatherer
  4046.  
  4047.  
  4048. Scanning https://www.cityoflondon.gov.uk...
  4049. _____________________________________ SITE INFO _____________________________________
  4050. IP Title
  4051. 80.169.89.102 Welcome to the City of London Corporation
  4052.  
  4053. ______________________________________ VERSION ______________________________________
  4054. Name Versions Type
  4055. SharePoint 14.0.0.7239 CMS
  4056. ASP.NET 2.0.50727 Platform
  4057. IIS 7.5 Platform
  4058. Microsoft Windows Server 2008 R2 OS
  4059.  
  4060. ____________________________________ INTERESTING ____________________________________
  4061. URL Note Type
  4062. /_layouts/help.aspx SharePoint Help Page Interesting
  4063.  
  4064. _______________________________________ TOOLS _______________________________________
  4065. Name Link Software
  4066. sparty https://github.com/alias1/sparty SharePoint
  4067. spscan https://github.com/toddsiegel/spscan SharePoint
  4068. Sharepoint URL Brute http://www.bishopfox.com/download/414/ SharePoint
  4069.  
  4070. _____________________________________________________________________________________
  4071. Time: 37.7 sec Urls: 216 Fingerprints: 40401
  4072. ###############################################################################################################################
  4073. Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-31 00:37 EDT
  4074. NSE: Loaded 161 scripts for scanning.
  4075. NSE: Script Pre-scanning.
  4076. Initiating NSE at 00:37
  4077. Completed NSE at 00:37, 0.00s elapsed
  4078. Initiating NSE at 00:37
  4079. Completed NSE at 00:37, 0.00s elapsed
  4080. Initiating Parallel DNS resolution of 1 host. at 00:37
  4081. Completed Parallel DNS resolution of 1 host. at 00:37, 0.02s elapsed
  4082. Initiating SYN Stealth Scan at 00:37
  4083. Scanning www.cityoflondon.gov.uk (80.169.89.102) [1 port]
  4084. Discovered open port 80/tcp on 80.169.89.102
  4085. Completed SYN Stealth Scan at 00:37, 0.16s elapsed (1 total ports)
  4086. Initiating Service scan at 00:37
  4087. Scanning 1 service on www.cityoflondon.gov.uk (80.169.89.102)
  4088. Completed Service scan at 00:39, 127.62s elapsed (1 service on 1 host)
  4089. Initiating OS detection (try #1) against www.cityoflondon.gov.uk (80.169.89.102)
  4090. Retrying OS detection (try #2) against www.cityoflondon.gov.uk (80.169.89.102)
  4091. Initiating Traceroute at 00:39
  4092. Completed Traceroute at 00:39, 0.23s elapsed
  4093. Initiating Parallel DNS resolution of 10 hosts. at 00:39
  4094. Completed Parallel DNS resolution of 10 hosts. at 00:39, 0.16s elapsed
  4095. NSE: Script scanning 80.169.89.102.
  4096. Initiating NSE at 00:39
  4097. Completed NSE at 00:40, 89.72s elapsed
  4098. Initiating NSE at 00:40
  4099. Completed NSE at 00:40, 1.13s elapsed
  4100. Nmap scan report for www.cityoflondon.gov.uk (80.169.89.102)
  4101. Host is up (0.11s latency).
  4102.  
  4103. PORT STATE SERVICE VERSION
  4104. 80/tcp open http COL-VMW-M-LB02
  4105. | fingerprint-strings:
  4106. | FourOhFourRequest:
  4107. | HTTP/1.1 301 Moved Permanently
  4108. | Location: https:///nice%20ports%2C/Tri%6Eity.txt%2ebak
  4109. | Server: COL-VMW-M-LB02
  4110. | Cache-Control: no-cache
  4111. | Connection: close
  4112. | GenericLines:
  4113. | HTTP/1.1 301 Moved Permanently
  4114. | Location: https://
  4115. | Server: COL-VMW-M-LB02
  4116. | Cache-Control: no-cache
  4117. | Connection: close
  4118. | GetRequest, HTTPOptions, RTSPRequest:
  4119. | HTTP/1.1 301 Moved Permanently
  4120. | Location: https:///
  4121. | Server: COL-VMW-M-LB02
  4122. | Cache-Control: no-cache
  4123. | Connection: close
  4124. | SIPOptions:
  4125. | HTTP/1.1 301 Moved Permanently
  4126. | Location: https://sip:nm
  4127. | Server: COL-VMW-M-LB02
  4128. | Cache-Control: no-cache
  4129. |_ Connection: close
  4130. | http-brute:
  4131. |_ Path "/" does not require authentication
  4132. |_http-chrono: Request times for /; avg: 510.15ms; min: 455.02ms; max: 562.86ms
  4133. |_http-csrf: Couldn't find any CSRF vulnerabilities.
  4134. |_http-devframework: Couldn't determine the underlying framework or CMS. Try increasing 'httpspider.maxpagecount' value to spider more pages.
  4135. |_http-dombased-xss: Couldn't find any DOM based XSS.
  4136. |_http-drupal-enum: Nothing found amongst the top 100 resources,use --script-args number=<number|all> for deeper analysis)
  4137. |_http-errors: Couldn't find any error pages.
  4138. |_http-feed: Couldn't find any feeds.
  4139. |_http-fetch: Please enter the complete path of the directory to save data in.
  4140. | http-headers:
  4141. | Location: https://www.cityoflondon.gov.uk/
  4142. | Server: COL-VMW-M-LB02
  4143. | Cache-Control: no-cache
  4144. | Connection: close
  4145. |
  4146. |_ (Request type: GET)
  4147. |_http-jsonp-detection: Couldn't find any JSONP endpoints.
  4148. | http-methods:
  4149. |_ Supported Methods: GET HEAD POST OPTIONS
  4150. |_http-mobileversion-checker: No mobile version detected.
  4151. |_http-passwd: ERROR: Script execution failed (use -d to debug)
  4152. | http-security-headers:
  4153. | Cache_Control:
  4154. |_ Header: Cache-Control: no-cache
  4155. |_http-server-header: COL-VMW-M-LB02
  4156. | http-sitemap-generator:
  4157. | Directory structure:
  4158. | Longest directory structure:
  4159. | Depth: 0
  4160. | Dir: /
  4161. | Total files found (by extension):
  4162. |_
  4163. |_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
  4164. |_http-title: Did not follow redirect to https://www.cityoflondon.gov.uk/
  4165. | http-vhosts:
  4166. |_127 names had status 301
  4167. |_http-wordpress-enum: Nothing found amongst the top 100 resources,use --script-args search-limit=<number|all> for deeper analysis)
  4168. |_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
  4169. | http-xssed:
  4170. |
  4171. | UNFIXED XSS vuln.
  4172. |
  4173. | http://www.cityoflondon.gov.uk/cgi-bin/semaphoreserver.exe?CMD=search.run&amp;SAVEDB=col&amp;SAVEQUERY00=%22<br>%3e%3cscript%3ealert%28'C1c4Tr1Z'%29%3c/script%3e&amp;SAVESTYPE=simple&amp;SAVEORGANISE_CODED=:F9&amp;B2=I1disab<br>ility&amp;PROP00=t%3Di&amp;QUERY01=disability&amp;B2_DESC=Disability&amp;PROP01=P%3DI1%2CS%3Dnone%2CZ%3Don&amp;THES_REC=<br>1222&amp;TBDB=col_taxonomy&amp;HIDECONCEPT=1
  4174. |
  4175. | http://www.cityoflondon.gov.uk/cgi-bin/select.exe
  4176. |
  4177. |_
  4178. |_https-redirect: ERROR: Script execution failed (use -d to debug)
  4179. 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
  4180. SF-Port80-TCP:V=7.80%I=7%D=3/31%Time=5E82C900%P=x86_64-pc-linux-gnu%r(GetR
  4181. SF:equest,7B,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nLocation:\x20htt
  4182. SF:ps:///\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20no-cache\r\nCo
  4183. SF:nnection:\x20close\r\n\r\n")%r(HTTPOptions,7B,"HTTP/1\.1\x20301\x20Move
  4184. SF:d\x20Permanently\r\nLocation:\x20https:///\r\nServer:\x20COL-VMW-M-LB02
  4185. SF:\r\nCache-Control:\x20no-cache\r\nConnection:\x20close\r\n\r\n")%r(RTSP
  4186. SF:Request,7B,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nLocation:\x20ht
  4187. SF:tps:///\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20no-cache\r\nC
  4188. SF:onnection:\x20close\r\n\r\n")%r(FourOhFourRequest,9E,"HTTP/1\.1\x20301\
  4189. SF:x20Moved\x20Permanently\r\nLocation:\x20https:///nice%20ports%2C/Tri%6E
  4190. SF:ity\.txt%2ebak\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20no-cac
  4191. SF:he\r\nConnection:\x20close\r\n\r\n")%r(GenericLines,7A,"HTTP/1\.1\x2030
  4192. SF:1\x20Moved\x20Permanently\r\nLocation:\x20https://\r\nServer:\x20COL-VM
  4193. SF:W-M-LB02\r\nCache-Control:\x20no-cache\r\nConnection:\x20close\r\n\r\n"
  4194. SF:)%r(SIPOptions,80,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nLocation
  4195. SF::\x20https://sip:nm\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20n
  4196. SF:o-cache\r\nConnection:\x20close\r\n\r\n");
  4197. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  4198. Device type: general purpose|firewall|storage-misc
  4199. Running (JUST GUESSING): Linux 2.6.X|3.X (90%), WatchGuard Fireware 11.X (89%), Synology DiskStation Manager 5.X (88%)
  4200. OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3.10 cpe:/o:watchguard:fireware:11.8 cpe:/o:linux:linux_kernel cpe:/a:synology:diskstation_manager:5.1
  4201. Aggressive OS guesses: Linux 2.6.32 (90%), Linux 2.6.39 (90%), Linux 3.10 (89%), Linux 3.4 (89%), WatchGuard Fireware 11.8 (89%), Linux 3.1 - 3.2 (89%), Synology DiskStation Manager 5.1 (88%), Linux 2.6.32 or 3.10 (87%), Linux 2.6.32 - 2.6.39 (85%)
  4202. No exact OS matches for host (test conditions non-ideal).
  4203. Uptime guess: 0.188 days (since Mon Mar 30 20:10:15 2020)
  4204. Network Distance: 12 hops
  4205. TCP Sequence Prediction: Difficulty=262 (Good luck!)
  4206. IP ID Sequence Generation: All zeros
  4207.  
  4208. TRACEROUTE (using port 80/tcp)
  4209. HOP RTT ADDRESS
  4210. 1 105.93 ms 10.203.9.1
  4211. 2 106.02 ms 45.131.5.3
  4212. 3 106.01 ms 109.236.95.226
  4213. 4 106.90 ms 109.236.95.173
  4214. 5 107.47 ms et-0-0-1-pr2.AMS.router.colt.net (80.249.208.236)
  4215. 6 188.37 ms xe0-3-0-sar18.LON.router.colt.net (212.74.68.145)
  4216. 7 112.44 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
  4217. 8 112.41 ms cpeuk_lon002520.ia.colt.net (80.169.196.38)
  4218. 9 112.47 ms 195.110.81.4
  4219. 10 113.39 ms 195.110.81.4
  4220. 11 111.90 ms 195.110.81.4
  4221. 12 116.12 ms 80.169.89.102
  4222.  
  4223. NSE: Script Post-scanning.
  4224. Initiating NSE at 00:40
  4225. Completed NSE at 00:40, 0.00s elapsed
  4226. Initiating NSE at 00:40
  4227. Completed NSE at 00:40, 0.00s elapsed
  4228. Read data files from: /usr/bin/../share/nmap
  4229. ###############################################################################################################################
  4230. ------------------------------------------------------------------------------------------------------------------------
  4231.  
  4232. [ ! ] Starting SCANNER INURLBR 2.1 at [31-03-2020 00:41:22]
  4233. [ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
  4234. It is the end user's responsibility to obey all applicable local, state and federal laws.
  4235. Developers assume no liability and are not responsible for any misuse or damage caused by this program
  4236.  
  4237. [ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.cityoflondon.gov.uk/output/inurlbr-www.cityoflondon.gov.uk ]
  4238. [ INFO ][ DORK ]::[ site:www.cityoflondon.gov.uk ]
  4239. [ INFO ][ SEARCHING ]:: {
  4240. [ INFO ][ ENGINE ]::[ GOOGLE - www.google.co.tz ]
  4241.  
  4242. [ INFO ][ SEARCHING ]::
  4243. -[:::]
  4244. [ INFO ][ ENGINE ]::[ GOOGLE API ]
  4245.  
  4246. [ INFO ][ SEARCHING ]::
  4247. -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
  4248. [ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.com.sv ID: 012873187529719969291:yexdhbzntue ]
  4249.  
  4250. [ INFO ][ SEARCHING ]::
  4251. -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
  4252.  
  4253. [ INFO ][ TOTAL FOUND VALUES ]:: [ 100 ]
  4254.  
  4255.  
  4256. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4257. |_[ + ] [ 0 / 100 ]-[00:41:39] [ - ]
  4258. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/ ]
  4259. |_[ + ] Exploit::
  4260. |_[ + ] Information Server:: HTTP/1.1 302 Redirect, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4261. |_[ + ] More details:: / - / , ISP:
  4262. |_[ + ] Found:: UNIDENTIFIED
  4263.  
  4264. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4265. |_[ + ] [ 1 / 100 ]-[00:41:40] [ - ]
  4266. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/newsplan/ ]
  4267. |_[ + ] Exploit::
  4268. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4269. |_[ + ] More details:: / - / , ISP:
  4270. |_[ + ] Found:: UNIDENTIFIED
  4271.  
  4272. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4273. |_[ + ] [ 2 / 100 ]-[00:41:41] [ - ]
  4274. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/propertysearch/results.aspx ]
  4275. |_[ + ] Exploit::
  4276. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4277. |_[ + ] More details:: / - / , ISP:
  4278. |_[ + ] Found:: UNIDENTIFIED
  4279.  
  4280. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4281. |_[ + ] [ 3 / 100 ]-[00:41:42] [ - ]
  4282. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/barbicansongindex/ ]
  4283. |_[ + ] Exploit::
  4284. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4285. |_[ + ] More details:: / - / , ISP:
  4286. |_[ + ] Found:: UNIDENTIFIED
  4287.  
  4288. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4289. |_[ + ] [ 4 / 100 ]-[00:41:44] [ - ]
  4290. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx ]
  4291. |_[ + ] Exploit::
  4292. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4293. |_[ + ] More details:: / - / , ISP:
  4294. |_[ + ] Found:: UNIDENTIFIED
  4295.  
  4296. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4297. |_[ + ] [ 5 / 100 ]-[00:41:49] [ - ]
  4298. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/Pages/default.aspx ]
  4299. |_[ + ] Exploit::
  4300. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4301. |_[ + ] More details:: / - / , ISP:
  4302. |_[ + ] Found:: UNIDENTIFIED
  4303.  
  4304. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4305. |_[ + ] [ 6 / 100 ]-[00:41:50] [ - ]
  4306. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/_layouts/col/basket.aspx ]
  4307. |_[ + ] Exploit::
  4308. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4309. |_[ + ] More details:: / - / , ISP:
  4310. |_[ + ] Found:: UNIDENTIFIED
  4311.  
  4312. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4313. |_[ + ] [ 7 / 100 ]-[00:41:52] [ - ]
  4314. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/contact-us/Pages/default.aspx ]
  4315. |_[ + ] Exploit::
  4316. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4317. |_[ + ] More details:: / - / , ISP:
  4318. |_[ + ] Found:: UNIDENTIFIED
  4319.  
  4320. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4321. |_[ + ] [ 8 / 100 ]-[00:41:54] [ - ]
  4322. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-our-website/Pages/default.aspx ]
  4323. |_[ + ] Exploit::
  4324. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4325. |_[ + ] More details:: / - / , ISP:
  4326. |_[ + ] Found:: UNIDENTIFIED
  4327.  
  4328. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4329. |_[ + ] [ 9 / 100 ]-[00:41:56] [ - ]
  4330. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/Pages/estate-services.aspx ]
  4331. |_[ + ] Exploit::
  4332. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4333. |_[ + ] More details:: / - / , ISP:
  4334. |_[ + ] Found:: UNIDENTIFIED
  4335.  
  4336. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4337. |_[ + ] [ 10 / 100 ]-[00:41:59] [ - ]
  4338. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/licensing/gambling/Pages/default.aspx ]
  4339. |_[ + ] Exploit::
  4340. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4341. |_[ + ] More details:: / - / , ISP:
  4342. |_[ + ] Found:: UNIDENTIFIED
  4343.  
  4344. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4345. |_[ + ] [ 11 / 100 ]-[00:42:01] [ - ]
  4346. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/Pages/homeowner-leaseholder.aspx ]
  4347. |_[ + ] Exploit::
  4348. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4349. |_[ + ] More details:: / - / , ISP:
  4350. |_[ + ] Found:: UNIDENTIFIED
  4351.  
  4352. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4353. |_[ + ] [ 12 / 100 ]-[00:42:02] [ - ]
  4354. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-our-website/Pages/accessibility.aspx ]
  4355. |_[ + ] Exploit::
  4356. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4357. |_[ + ] More details:: / - / , ISP:
  4358. |_[ + ] Found:: UNIDENTIFIED
  4359.  
  4360. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4361. |_[ + ] [ 13 / 100 ]-[00:42:04] [ - ]
  4362. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/council-tax/Pages/default.aspx ]
  4363. |_[ + ] Exploit::
  4364. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4365. |_[ + ] More details:: / - / , ISP:
  4366. |_[ + ] Found:: UNIDENTIFIED
  4367.  
  4368. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4369. |_[ + ] [ 14 / 100 ]-[00:42:06] [ - ]
  4370. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/licensing/Pages/street-trading.aspx ]
  4371. |_[ + ] Exploit::
  4372. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4373. |_[ + ] More details:: / - / , ISP:
  4374. |_[ + ] Found:: UNIDENTIFIED
  4375.  
  4376. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4377. |_[ + ] [ 15 / 100 ]-[00:42:10] [ - ]
  4378. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/asia-programme/Pages/default.aspx ]
  4379. |_[ + ] Exploit::
  4380. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4381. |_[ + ] More details:: / - / , ISP:
  4382. |_[ + ] Found:: UNIDENTIFIED
  4383.  
  4384. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4385. |_[ + ] [ 16 / 100 ]-[00:42:14] [ - ]
  4386. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/business-rates/Pages/default.aspx ]
  4387. |_[ + ] Exploit::
  4388. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4389. |_[ + ] More details:: / - / , ISP:
  4390. |_[ + ] Found:: UNIDENTIFIED
  4391.  
  4392. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4393. |_[ + ] [ 17 / 100 ]-[00:42:16] [ - ]
  4394. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-our-website/Pages/Cookies.aspx ]
  4395. |_[ + ] Exploit::
  4396. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4397. |_[ + ] More details:: / - / , ISP:
  4398. |_[ + ] Found:: UNIDENTIFIED
  4399.  
  4400. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4401. |_[ + ] [ 18 / 100 ]-[00:42:18] [ - ]
  4402. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/business-rates/Pages/contact.aspx ]
  4403. |_[ + ] Exploit::
  4404. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4405. |_[ + ] More details:: / - / , ISP:
  4406. |_[ + ] Found:: UNIDENTIFIED
  4407.  
  4408. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4409. |_[ + ] [ 19 / 100 ]-[00:42:21] [ - ]
  4410. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/Pages/default.aspx ]
  4411. |_[ + ] Exploit::
  4412. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4413. |_[ + ] More details:: / - / , ISP:
  4414. |_[ + ] Found:: UNIDENTIFIED
  4415.  
  4416. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4417. |_[ + ] [ 20 / 100 ]-[00:42:23] [ - ]
  4418. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?start1=13 ]
  4419. |_[ + ] Exploit::
  4420. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4421. |_[ + ] More details:: / - / , ISP:
  4422. |_[ + ] Found:: UNIDENTIFIED
  4423.  
  4424. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4425. |_[ + ] [ 21 / 100 ]-[00:42:24] [ - ]
  4426. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/business-rates/Pages/payment.aspx ]
  4427. |_[ + ] Exploit::
  4428. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4429. |_[ + ] More details:: / - / , ISP:
  4430. |_[ + ] Found:: UNIDENTIFIED
  4431.  
  4432. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4433. |_[ + ] [ 22 / 100 ]-[00:42:27] [ - ]
  4434. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/environmental-health/Pages/default.aspx ]
  4435. |_[ + ] Exploit::
  4436. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4437. |_[ + ] More details:: / - / , ISP:
  4438. |_[ + ] Found:: UNIDENTIFIED
  4439.  
  4440. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4441. |_[ + ] [ 23 / 100 ]-[00:42:29] [ - ]
  4442. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Today ]
  4443. |_[ + ] Exploit::
  4444. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4445. |_[ + ] More details:: / - / , ISP:
  4446. |_[ + ] Found:: UNIDENTIFIED
  4447.  
  4448. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4449. |_[ + ] [ 24 / 100 ]-[00:42:30] [ - ]
  4450. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/search/Pages/a-to-z.aspx ]
  4451. |_[ + ] Exploit::
  4452. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4453. |_[ + ] More details:: / - / , ISP:
  4454. |_[ + ] Found:: UNIDENTIFIED
  4455.  
  4456. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4457. |_[ + ] [ 25 / 100 ]-[00:42:32] [ - ]
  4458. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-our-website/Pages/mobile.aspx ]
  4459. |_[ + ] Exploit::
  4460. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4461. |_[ + ] More details:: / - / , ISP:
  4462. |_[ + ] Found:: UNIDENTIFIED
  4463.  
  4464. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4465. |_[ + ] [ 26 / 100 ]-[00:42:34] [ - ]
  4466. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/filming/Pages/permissions.aspx ]
  4467. |_[ + ] Exploit::
  4468. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4469. |_[ + ] More details:: / - / , ISP:
  4470. |_[ + ] Found:: UNIDENTIFIED
  4471.  
  4472. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4473. |_[ + ] [ 27 / 100 ]-[00:42:36] [ - ]
  4474. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Aug-2019 ]
  4475. |_[ + ] Exploit::
  4476. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4477. |_[ + ] More details:: / - / , ISP:
  4478. |_[ + ] Found:: UNIDENTIFIED
  4479.  
  4480. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4481. |_[ + ] [ 28 / 100 ]-[00:42:38] [ - ]
  4482. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/asia-programme/india/Pages/publications.aspx ]
  4483. |_[ + ] Exploit::
  4484. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4485. |_[ + ] More details:: / - / , ISP:
  4486. |_[ + ] Found:: UNIDENTIFIED
  4487.  
  4488. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4489. |_[ + ] [ 29 / 100 ]-[00:42:41] [ - ]
  4490. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/Pages/tenancy-visits-programme.aspx ]
  4491. |_[ + ] Exploit::
  4492. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4493. |_[ + ] More details:: / - / , ISP:
  4494. |_[ + ] Found:: UNIDENTIFIED
  4495.  
  4496. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4497. |_[ + ] [ 30 / 100 ]-[00:42:42] [ - ]
  4498. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Dec-2019 ]
  4499. |_[ + ] Exploit::
  4500. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4501. |_[ + ] More details:: / - / , ISP:
  4502. |_[ + ] Found:: UNIDENTIFIED
  4503.  
  4504. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4505. |_[ + ] [ 31 / 100 ]-[00:42:44] [ - ]
  4506. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Jul-2018 ]
  4507. |_[ + ] Exploit::
  4508. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4509. |_[ + ] More details:: / - / , ISP:
  4510. |_[ + ] Found:: UNIDENTIFIED
  4511.  
  4512. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4513. |_[ + ] [ 32 / 100 ]-[00:42:45] [ - ]
  4514. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Jan-2018 ]
  4515. |_[ + ] Exploit::
  4516. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4517. |_[ + ] More details:: / - / , ISP:
  4518. |_[ + ] Found:: UNIDENTIFIED
  4519.  
  4520. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4521. |_[ + ] [ 33 / 100 ]-[00:42:48] [ - ]
  4522. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/Pages/pay-your-rent.aspx ]
  4523. |_[ + ] Exploit::
  4524. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4525. |_[ + ] More details:: / - / , ISP:
  4526. |_[ + ] Found:: UNIDENTIFIED
  4527.  
  4528. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4529. |_[ + ] [ 34 / 100 ]-[00:42:49] [ - ]
  4530. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Jan-2020 ]
  4531. |_[ + ] Exploit::
  4532. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4533. |_[ + ] More details:: / - / , ISP:
  4534. |_[ + ] Found:: UNIDENTIFIED
  4535.  
  4536. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4537. |_[ + ] [ 35 / 100 ]-[00:42:51] [ - ]
  4538. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Mar-2020 ]
  4539. |_[ + ] Exploit::
  4540. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4541. |_[ + ] More details:: / - / , ISP:
  4542. |_[ + ] Found:: UNIDENTIFIED
  4543.  
  4544. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4545. |_[ + ] [ 36 / 100 ]-[00:42:53] [ - ]
  4546. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/Pages/police-authority.aspx ]
  4547. |_[ + ] Exploit::
  4548. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4549. |_[ + ] More details:: / - / , ISP:
  4550. |_[ + ] Found:: UNIDENTIFIED
  4551.  
  4552. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4553. |_[ + ] [ 37 / 100 ]-[00:42:56] [ - ]
  4554. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/children-and-families/Pages/adoption.aspx ]
  4555. |_[ + ] Exploit::
  4556. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4557. |_[ + ] More details:: / - / , ISP:
  4558. |_[ + ] Found:: UNIDENTIFIED
  4559.  
  4560. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4561. |_[ + ] [ 38 / 100 ]-[00:42:57] [ - ]
  4562. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Nov-2017 ]
  4563. |_[ + ] Exploit::
  4564. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4565. |_[ + ] More details:: / - / , ISP:
  4566. |_[ + ] Found:: UNIDENTIFIED
  4567.  
  4568. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4569. |_[ + ] [ 39 / 100 ]-[00:42:59] [ - ]
  4570. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/adult-social-care/Pages/carers.aspx ]
  4571. |_[ + ] Exploit::
  4572. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4573. |_[ + ] More details:: / - / , ISP:
  4574. |_[ + ] Found:: UNIDENTIFIED
  4575.  
  4576. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4577. |_[ + ] [ 40 / 100 ]-[00:43:01] [ - ]
  4578. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/adult-social-care/Pages/dementia.aspx ]
  4579. |_[ + ] Exploit::
  4580. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4581. |_[ + ] More details:: / - / , ISP:
  4582. |_[ + ] Found:: UNIDENTIFIED
  4583.  
  4584. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4585. |_[ + ] [ 41 / 100 ]-[00:43:04] [ - ]
  4586. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/asia-programme/india/Pages/default.aspx ]
  4587. |_[ + ] Exploit::
  4588. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4589. |_[ + ] More details:: / - / , ISP:
  4590. |_[ + ] Found:: UNIDENTIFIED
  4591.  
  4592. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4593. |_[ + ] [ 42 / 100 ]-[00:43:06] [ - ]
  4594. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/wholesale-food-markets/Pages/default.aspx ]
  4595. |_[ + ] Exploit::
  4596. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4597. |_[ + ] More details:: / - / , ISP:
  4598. |_[ + ] Found:: UNIDENTIFIED
  4599.  
  4600. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4601. |_[ + ] [ 43 / 100 ]-[00:43:08] [ - ]
  4602. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/barbican-estate/Pages/resident-involvement.aspx ]
  4603. |_[ + ] Exploit::
  4604. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4605. |_[ + ] More details:: / - / , ISP:
  4606. |_[ + ] Found:: UNIDENTIFIED
  4607.  
  4608. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4609. |_[ + ] [ 44 / 100 ]-[00:43:10] [ - ]
  4610. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/history/Pages/mayoralty.aspx ]
  4611. |_[ + ] Exploit::
  4612. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4613. |_[ + ] More details:: / - / , ISP:
  4614. |_[ + ] Found:: UNIDENTIFIED
  4615.  
  4616. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4617. |_[ + ] [ 45 / 100 ]-[00:43:12] [ - ]
  4618. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/pages/default.aspx?Date=Jan-2019 ]
  4619. |_[ + ] Exploit::
  4620. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4621. |_[ + ] More details:: / - / , ISP:
  4622. |_[ + ] Found:: UNIDENTIFIED
  4623.  
  4624. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4625. |_[ + ] [ 46 / 100 ]-[00:43:16] [ - ]
  4626. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/libraries-and-archives/Pages/default.aspx ]
  4627. |_[ + ] Exploit::
  4628. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4629. |_[ + ] More details:: / - / , ISP:
  4630. |_[ + ] Found:: UNIDENTIFIED
  4631.  
  4632. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4633. |_[ + ] [ 47 / 100 ]-[00:43:21] [ - ]
  4634. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/environment-and-planning/Pages/default.aspx ]
  4635. |_[ + ] Exploit::
  4636. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4637. |_[ + ] More details:: / - / , ISP:
  4638. |_[ + ] Found:: UNIDENTIFIED
  4639.  
  4640. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4641. |_[ + ] [ 48 / 100 ]-[00:43:23] [ - ]
  4642. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/history/Pages/ceremony.aspx ]
  4643. |_[ + ] Exploit::
  4644. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4645. |_[ + ] More details:: / - / , ISP:
  4646. |_[ + ] Found:: UNIDENTIFIED
  4647.  
  4648. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4649. |_[ + ] [ 49 / 100 ]-[00:43:26] [ - ]
  4650. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/things-to-do/Pages/leadenhall-market.aspx ]
  4651. |_[ + ] Exploit::
  4652. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4653. |_[ + ] More details:: / - / , ISP:
  4654. |_[ + ] Found:: UNIDENTIFIED
  4655.  
  4656. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4657. |_[ + ] [ 50 / 100 ]-[00:43:28] [ - ]
  4658. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/eu-and-regulation/Pages/default.aspx ]
  4659. |_[ + ] Exploit::
  4660. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4661. |_[ + ] More details:: / - / , ISP:
  4662. |_[ + ] Found:: UNIDENTIFIED
  4663.  
  4664. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4665. |_[ + ] [ 51 / 100 ]-[00:43:30] [ - ]
  4666. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/licensing/charity-collections/Pages/default.aspx ]
  4667. |_[ + ] Exploit::
  4668. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4669. |_[ + ] More details:: / - / , ISP:
  4670. |_[ + ] Found:: UNIDENTIFIED
  4671.  
  4672. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4673. |_[ + ] [ 52 / 100 ]-[00:43:33] [ - ]
  4674. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/barbican-estate/services/Pages/default.aspx ]
  4675. |_[ + ] Exploit::
  4676. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4677. |_[ + ] More details:: / - / , ISP:
  4678. |_[ + ] Found:: UNIDENTIFIED
  4679.  
  4680. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4681. |_[ + ] [ 53 / 100 ]-[00:43:35] [ - ]
  4682. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/environmental-health/Pages/primary-authority.aspx ]
  4683. |_[ + ] Exploit::
  4684. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4685. |_[ + ] More details:: / - / , ISP:
  4686. |_[ + ] Found:: UNIDENTIFIED
  4687.  
  4688. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4689. |_[ + ] [ 54 / 100 ]-[00:43:37] [ - ]
  4690. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/community-and-living/Pages/hospitals.aspx ]
  4691. |_[ + ] Exploit::
  4692. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4693. |_[ + ] More details:: / - / , ISP:
  4694. |_[ + ] Found:: UNIDENTIFIED
  4695.  
  4696. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4697. |_[ + ] [ 55 / 100 ]-[00:43:41] [ - ]
  4698. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/transport-and-streets/Pages/default.aspx ]
  4699. |_[ + ] Exploit::
  4700. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4701. |_[ + ] More details:: / - / , ISP:
  4702. |_[ + ] Found:: UNIDENTIFIED
  4703.  
  4704. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4705. |_[ + ] [ 56 / 100 ]-[00:43:43] [ - ]
  4706. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/barbican-estate/Pages/baggage-stores.aspx ]
  4707. |_[ + ] Exploit::
  4708. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4709. |_[ + ] More details:: / - / , ISP:
  4710. |_[ + ] Found:: UNIDENTIFIED
  4711.  
  4712. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4713. |_[ + ] [ 57 / 100 ]-[00:43:46] [ - ]
  4714. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/history/Pages/merchandise.aspx ]
  4715. |_[ + ] Exploit::
  4716. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4717. |_[ + ] More details:: / - / , ISP:
  4718. |_[ + ] Found:: UNIDENTIFIED
  4719.  
  4720. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4721. |_[ + ] [ 58 / 100 ]-[00:43:48] [ - ]
  4722. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/education-learning/apprenticeships/Pages/default.aspx ]
  4723. |_[ + ] Exploit::
  4724. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4725. |_[ + ] More details:: / - / , ISP:
  4726. |_[ + ] Found:: UNIDENTIFIED
  4727.  
  4728. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4729. |_[ + ] [ 59 / 100 ]-[00:43:50] [ - ]
  4730. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/things-to-do/keats-house/Pages/Schools.aspx ]
  4731. |_[ + ] Exploit::
  4732. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4733. |_[ + ] More details:: / - / , ISP:
  4734. |_[ + ] Found:: UNIDENTIFIED
  4735.  
  4736. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4737. |_[ + ] [ 60 / 100 ]-[00:43:53] [ - ]
  4738. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/mansion-house/Pages/inside.aspx ]
  4739. |_[ + ] Exploit::
  4740. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4741. |_[ + ] More details:: / - / , ISP:
  4742. |_[ + ] Found:: UNIDENTIFIED
  4743.  
  4744. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4745. |_[ + ] [ 61 / 100 ]-[00:43:54] [ - ]
  4746. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/children-and-families/Pages/Sofia-Simpson.aspx ]
  4747. |_[ + ] Exploit::
  4748. |_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4749. |_[ + ] More details:: / - / , ISP:
  4750. |_[ + ] Found:: UNIDENTIFIED
  4751.  
  4752. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4753. |_[ + ] [ 62 / 100 ]-[00:43:56] [ - ]
  4754. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/adult-social-care/Pages/concessionary-travel.aspx ]
  4755. |_[ + ] Exploit::
  4756. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4757. |_[ + ] More details:: / - / , ISP:
  4758. |_[ + ] Found:: UNIDENTIFIED
  4759.  
  4760. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4761. |_[ + ] [ 63 / 100 ]-[00:43:58] [ - ]
  4762. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/Pages/Housing-Fire-Safety-.aspx ]
  4763. |_[ + ] Exploit::
  4764. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4765. |_[ + ] More details:: / - / , ISP:
  4766. |_[ + ] Found:: UNIDENTIFIED
  4767.  
  4768. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4769. |_[ + ] [ 64 / 100 ]-[00:44:00] [ - ]
  4770. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/mansion-house/Pages/tours.aspx ]
  4771. |_[ + ] Exploit::
  4772. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4773. |_[ + ] More details:: / - / , ISP:
  4774. |_[ + ] Found:: UNIDENTIFIED
  4775.  
  4776. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4777. |_[ + ] [ 65 / 100 ]-[00:44:02] [ - ]
  4778. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/health-and-wellbeing/Pages/mental-wellbeing.aspx ]
  4779. |_[ + ] Exploit::
  4780. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4781. |_[ + ] More details:: / - / , ISP:
  4782. |_[ + ] Found:: UNIDENTIFIED
  4783.  
  4784. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4785. |_[ + ] [ 66 / 100 ]-[00:44:06] [ - ]
  4786. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/community-and-living/Pages/volunteering-opportunities.aspx ]
  4787. |_[ + ] Exploit::
  4788. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4789. |_[ + ] More details:: / - / , ISP:
  4790. |_[ + ] Found:: UNIDENTIFIED
  4791.  
  4792. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4793. |_[ + ] [ 67 / 100 ]-[00:44:08] [ - ]
  4794. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/barbican-estate/services/Pages/buildings-insurance.aspx ]
  4795. |_[ + ] Exploit::
  4796. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4797. |_[ + ] More details:: / - / , ISP:
  4798. |_[ + ] Found:: UNIDENTIFIED
  4799.  
  4800. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4801. |_[ + ] [ 68 / 100 ]-[00:44:10] [ - ]
  4802. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/children-and-families/Pages/Mandheep-Dasi.aspx ]
  4803. |_[ + ] Exploit::
  4804. |_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4805. |_[ + ] More details:: / - / , ISP:
  4806. |_[ + ] Found:: UNIDENTIFIED
  4807.  
  4808. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4809. |_[ + ] [ 69 / 100 ]-[00:44:13] [ - ]
  4810. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/housing-estates/Pages/middlesex-street.aspx ]
  4811. |_[ + ] Exploit::
  4812. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4813. |_[ + ] More details:: / - / , ISP:
  4814. |_[ + ] Found:: UNIDENTIFIED
  4815.  
  4816. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4817. |_[ + ] [ 70 / 100 ]-[00:44:16] [ - ]
  4818. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/tenders-and-procurement/Pages/contract-lists.aspx ]
  4819. |_[ + ] Exploit::
  4820. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4821. |_[ + ] More details:: / - / , ISP:
  4822. |_[ + ] Found:: UNIDENTIFIED
  4823.  
  4824. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4825. |_[ + ] [ 71 / 100 ]-[00:44:18] [ - ]
  4826. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/health-and-wellbeing/Pages/sexual-health.aspx ]
  4827. |_[ + ] Exploit::
  4828. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4829. |_[ + ] More details:: / - / , ISP:
  4830. |_[ + ] Found:: UNIDENTIFIED
  4831.  
  4832. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4833. |_[ + ] [ 72 / 100 ]-[00:44:20] [ - ]
  4834. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/health-and-wellbeing/Pages/covid-19.aspx ]
  4835. |_[ + ] Exploit::
  4836. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4837. |_[ + ] More details:: / - / , ISP:
  4838. |_[ + ] Found:: UNIDENTIFIED
  4839.  
  4840. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4841. |_[ + ] [ 73 / 100 ]-[00:44:21] [ - ]
  4842. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/children-and-families/Pages/Tito-Oshewa.aspx ]
  4843. |_[ + ] Exploit::
  4844. |_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4845. |_[ + ] More details:: / - / , ISP:
  4846. |_[ + ] Found:: UNIDENTIFIED
  4847.  
  4848. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4849. |_[ + ] [ 74 / 100 ]-[00:44:24] [ - ]
  4850. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/housing-estates/Pages/holloway-estate.aspx ]
  4851. |_[ + ] Exploit::
  4852. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4853. |_[ + ] More details:: / - / , ISP:
  4854. |_[ + ] Found:: UNIDENTIFIED
  4855.  
  4856. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4857. |_[ + ] [ 75 / 100 ]-[00:44:27] [ - ]
  4858. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/education-learning/schools/Pages/education-policies.aspx ]
  4859. |_[ + ] Exploit::
  4860. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4861. |_[ + ] More details:: / - / , ISP:
  4862. |_[ + ] Found:: UNIDENTIFIED
  4863.  
  4864. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4865. |_[ + ] [ 76 / 100 ]-[00:44:29] [ - ]
  4866. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/Pages/brexit.aspx ]
  4867. |_[ + ] Exploit::
  4868. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4869. |_[ + ] More details:: / - / , ISP:
  4870. |_[ + ] Found:: UNIDENTIFIED
  4871.  
  4872. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4873. |_[ + ] [ 77 / 100 ]-[00:44:31] [ - ]
  4874. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/voting-elections/Pages/results.aspx ]
  4875. |_[ + ] Exploit::
  4876. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4877. |_[ + ] More details:: / - / , ISP:
  4878. |_[ + ] Found:: UNIDENTIFIED
  4879.  
  4880. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4881. |_[ + ] [ 78 / 100 ]-[00:44:34] [ - ]
  4882. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/adult-social-care/Pages/safeguarding-adults.aspx ]
  4883. |_[ + ] Exploit::
  4884. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4885. |_[ + ] More details:: / - / , ISP:
  4886. |_[ + ] Found:: UNIDENTIFIED
  4887.  
  4888. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4889. |_[ + ] [ 79 / 100 ]-[00:44:36] [ - ]
  4890. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/homelessness/Pages/duty-to-refer.aspx ]
  4891. |_[ + ] Exploit::
  4892. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4893. |_[ + ] More details:: / - / , ISP:
  4894. |_[ + ] Found:: UNIDENTIFIED
  4895.  
  4896. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4897. |_[ + ] [ 80 / 100 ]-[00:44:38] [ - ]
  4898. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/history/Pages/temple-bar.aspx ]
  4899. |_[ + ] Exploit::
  4900. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4901. |_[ + ] More details:: / - / , ISP:
  4902. |_[ + ] Found:: UNIDENTIFIED
  4903.  
  4904. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4905. |_[ + ] [ 81 / 100 ]-[00:44:40] [ - ]
  4906. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/community-work/Pages/default.aspx ]
  4907. |_[ + ] Exploit::
  4908. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4909. |_[ + ] More details:: / - / , ISP:
  4910. |_[ + ] Found:: UNIDENTIFIED
  4911.  
  4912. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4913. |_[ + ] [ 82 / 100 ]-[00:44:44] [ - ]
  4914. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/barbican-estate/Pages/barbican-history-architecture.aspx ]
  4915. |_[ + ] Exploit::
  4916. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4917. |_[ + ] More details:: / - / , ISP:
  4918. |_[ + ] Found:: UNIDENTIFIED
  4919.  
  4920. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4921. |_[ + ] [ 83 / 100 ]-[00:44:46] [ - ]
  4922. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/barbican-estate/Pages/service-charge-schedules.aspx ]
  4923. |_[ + ] Exploit::
  4924. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4925. |_[ + ] More details:: / - / , ISP:
  4926. |_[ + ] Found:: UNIDENTIFIED
  4927.  
  4928. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4929. |_[ + ] [ 84 / 100 ]-[00:44:48] [ - ]
  4930. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/barbican-estate/Pages/barbican-estate-parking.aspx ]
  4931. |_[ + ] Exploit::
  4932. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4933. |_[ + ] More details:: / - / , ISP:
  4934. |_[ + ] Found:: UNIDENTIFIED
  4935.  
  4936. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4937. |_[ + ] [ 85 / 100 ]-[00:44:50] [ - ]
  4938. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/children-and-families/Pages/contact-us.aspx ]
  4939. |_[ + ] Exploit::
  4940. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4941. |_[ + ] More details:: / - / , ISP:
  4942. |_[ + ] Found:: UNIDENTIFIED
  4943.  
  4944. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4945. |_[ + ] [ 86 / 100 ]-[00:44:52] [ - ]
  4946. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/tenders-and-procurement/Pages/useful-links.aspx ]
  4947. |_[ + ] Exploit::
  4948. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4949. |_[ + ] More details:: / - / , ISP:
  4950. |_[ + ] Found:: UNIDENTIFIED
  4951.  
  4952. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4953. |_[ + ] [ 87 / 100 ]-[00:44:55] [ - ]
  4954. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/about-us/Pages/publications.aspx ]
  4955. |_[ + ] Exploit::
  4956. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4957. |_[ + ] More details:: / - / , ISP:
  4958. |_[ + ] Found:: UNIDENTIFIED
  4959.  
  4960. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4961. |_[ + ] [ 88 / 100 ]-[00:44:58] [ - ]
  4962. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/Pages/remembrancers.aspx ]
  4963. |_[ + ] Exploit::
  4964. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4965. |_[ + ] More details:: / - / , ISP:
  4966. |_[ + ] Found:: UNIDENTIFIED
  4967.  
  4968. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4969. |_[ + ] [ 89 / 100 ]-[00:44:59] [ - ]
  4970. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Next Weekend ]
  4971. |_[ + ] Exploit::
  4972. |_[ + ] Information Server:: HTTP/1.1 400 Bad Request, Server: Microsoft-HTTPAPI/2.0 , IP:80.169.89.102:443
  4973. |_[ + ] More details:: / - / , ISP:
  4974. |_[ + ] Found:: UNIDENTIFIED
  4975.  
  4976. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4977. |_[ + ] [ 90 / 100 ]-[00:45:02] [ - ]
  4978. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/port-health/environmental-control/Pages/default.aspx ]
  4979. |_[ + ] Exploit::
  4980. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4981. |_[ + ] More details:: / - / , ISP:
  4982. |_[ + ] Found:: UNIDENTIFIED
  4983.  
  4984. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4985. |_[ + ] [ 91 / 100 ]-[00:45:06] [ - ]
  4986. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/environment-and-planning/planning/Pages/default.aspx ]
  4987. |_[ + ] Exploit::
  4988. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4989. |_[ + ] More details:: / - / , ISP:
  4990. |_[ + ] Found:: UNIDENTIFIED
  4991.  
  4992. _[ - ]::--------------------------------------------------------------------------------------------------------------
  4993. |_[ + ] [ 92 / 100 ]-[00:45:07] [ - ]
  4994. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/things-to-do/keats-house/Pages/default.aspx ]
  4995. |_[ + ] Exploit::
  4996. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  4997. |_[ + ] More details:: / - / , ISP:
  4998. |_[ + ] Found:: UNIDENTIFIED
  4999.  
  5000. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5001. |_[ + ] [ 93 / 100 ]-[00:45:10] [ - ]
  5002. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/wholesale-food-markets/smithfield/Pages/default.aspx ]
  5003. |_[ + ] Exploit::
  5004. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5005. |_[ + ] More details:: / - / , ISP:
  5006. |_[ + ] Found:: UNIDENTIFIED
  5007.  
  5008. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5009. |_[ + ] [ 94 / 100 ]-[00:45:12] [ - ]
  5010. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/asia-programme/india/Pages/mumbai-office.aspx ]
  5011. |_[ + ] Exploit::
  5012. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5013. |_[ + ] More details:: / - / , ISP:
  5014. |_[ + ] Found:: UNIDENTIFIED
  5015.  
  5016. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5017. |_[ + ] [ 95 / 100 ]-[00:45:16] [ - ]
  5018. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/environment-and-planning/sustainability/Pages/default.aspx ]
  5019. |_[ + ] Exploit::
  5020. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5021. |_[ + ] More details:: / - / , ISP:
  5022. |_[ + ] Found:: UNIDENTIFIED
  5023.  
  5024. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5025. |_[ + ] [ 96 / 100 ]-[00:45:19] [ - ]
  5026. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/licensing/gambling/Pages/Temporary-use-notices.aspx ]
  5027. |_[ + ] Exploit::
  5028. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5029. |_[ + ] More details:: / - / , ISP:
  5030. |_[ + ] Found:: UNIDENTIFIED
  5031.  
  5032. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5033. |_[ + ] [ 97 / 100 ]-[00:45:20] [ - ]
  5034. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/jobs/Documents/TrainingRoomsLocationMap.pdf ]
  5035. |_[ + ] Exploit::
  5036. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5037. |_[ + ] More details:: / - / , ISP:
  5038. |_[ + ] Found:: UNIDENTIFIED
  5039.  
  5040. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5041. |_[ + ] [ 98 / 100 ]-[00:45:23] [ - ]
  5042. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/port-health/import-controls/Pages/default.aspx ]
  5043. |_[ + ] Exploit::
  5044. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5045. |_[ + ] More details:: / - / , ISP:
  5046. |_[ + ] Found:: UNIDENTIFIED
  5047.  
  5048. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5049. |_[ + ] [ 99 / 100 ]-[00:45:25] [ - ]
  5050. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/financial-help-benefits/Pages/fraud.aspx ]
  5051. |_[ + ] Exploit::
  5052. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5053. |_[ + ] More details:: / - / , ISP:
  5054. |_[ + ] Found:: UNIDENTIFIED
  5055.  
  5056. [ INFO ] [ Shutting down ]
  5057. [ INFO ] [ End of process INURLBR at [31-03-2020 00:45:25]
  5058. [ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
  5059. [ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.cityoflondon.gov.uk/output/inurlbr-www.cityoflondon.gov.uk ]
  5060. |_________________________________________________________________________________________
  5061.  
  5062. \_________________________________________________________________________________________/
  5063. ###############################################################################################################################
  5064. HTTP/1.1 302 Redirect
  5065. Content-Length: 172
  5066. Content-Type: text/html; charset=UTF-8
  5067. Location: http://www.cityoflondon.gov.uk/Pages/default.aspx
  5068. Server: Microsoft-IIS/7.5
  5069. SPRequestGuid: 6fd454ed-1997-42f7-887e-f0367a7d12c7
  5070. X-SharePointHealthScore: 0
  5071. X-Powered-By: ASP.NET
  5072. MicrosoftSharePointTeamServices: 14.0.0.7239
  5073. X-MS-InvokeApp: 1; RequireReadOnly
  5074. Date: Tue, 31 Mar 2020 04:49:13 GMT
  5075. ###############################################################################################################################
  5076. /about-our-website/Pages/accessibility.aspx
  5077. /about-our-website/Pages/Cookies.aspx
  5078. /about-our-website/Pages/cookies.aspx
  5079. /about-our-website/Pages/legal-notices.aspx
  5080. /about-our-website/Pages/legal-notices.aspx#socialmedia
  5081. /about-our-website/Pages/mobile.aspx
  5082. /about-our-website/Pages/privacy-notice.aspx
  5083. /about-our-website/Pages/social-media.aspx
  5084. /about-our-website/sitemap.aspx
  5085. /about-the-city/about-us/Pages/default.aspx
  5086. /about-the-city/about-us/Pages/how-to-find-us.aspx
  5087. /about-the-city/Pages/default.aspx
  5088. /about-the-city/PublishingImages/about-explore.jpg
  5089. /about-the-city/PublishingImages/pins-on-map.jpg
  5090. /about-the-city/voting-elections/Pages/default.aspx
  5091. /about-the-city/voting-elections/PublishingImages/voting.jpg
  5092. /business/business-rates/Pages/default.aspx
  5093. /business/Pages/default.aspx
  5094. /business/PublishingImages/business-people.jpg
  5095. /business/support-promotion-and-advice/Pages/covid-19-advice-for-businesses.aspx
  5096. /business/support-promotion-and-advice/Pages/support-relief-efforts-COVID-19.aspx
  5097. /business/support-promotion-and-advice/PublishingImages/covid-19-businesses-advice.jpg
  5098. /business/tenders-and-procurement/pages/responsible-procurement.aspx
  5099. /contact-us/Pages/default.aspx
  5100. /events/Pages/default.aspx
  5101. http://email.cityoflondon.gov.uk/linkapp/cmasubs.aspx?LinkID=pageid986790jkkzhq%40f%40f%40n9qh%40z%40f%40n9qh%40f%40f
  5102. http://email.cityoflondon.gov.uk/linkapp/cmasubs.aspx?LinkID=pageid986790jkkzhq@f@f@n9qh@z@f@n9qh@f@f
  5103. http://news.cityoflondon.gov.uk/
  5104. https://careers.cityoflondon.gov.uk/
  5105. https://news.cityoflondon.gov.uk/covid19-city-corporation-encourages-people-to-follow-new-government-instructions-on-parks/
  5106. https://news.cityoflondon.gov.uk/square-mile-businesses-offered-additional-rental-relief/
  5107. https://twitter.com/cityoflondon
  5108. https://www.facebook.com/CityofLondonCorp
  5109. https://www.youtube.com/user/CityofLondonvideos/videos
  5110. http://www.barbican.org.uk/
  5111. http://www.citybridgetrust.org.uk/
  5112. http://www.cityoflondon.police.uk/
  5113. http://www.towerbridge.org.uk/
  5114. http://www.w3.org/1999/xhtml
  5115. /_layouts/col/shop.aspx
  5116. /maps/Pages/geocortex-redirect.aspx
  5117. /maps/Pages/interactive-maps.aspx
  5118. /Pages/default.aspx
  5119. /report-pay-apply/Pages/report-pay-apply.aspx
  5120. /search/Pages/a-to-z.aspx
  5121. /services/health-and-wellbeing/Pages/covid-19.aspx
  5122. /services/health-and-wellbeing/PublishingImages/covid-19-residents.jpg
  5123. /services/Pages/default.aspx
  5124. /services/transport-and-streets/parking/Pages/covid-19-parking-and-driving-in-the-city.aspx
  5125. /services/transport-and-streets/roads-highways-and-pavements/Pages/current-road-closures-works-and-events.aspx
  5126. /services/transport-and-streets/roads-highways-and-pavements/PublishingImages/street-closures-130x86.jpg
  5127. /SiteCollectionImages/icons/icon-calendar.png
  5128. /SiteCollectionImages/icons/icon-eshot.png
  5129. /SiteCollectionImages/icons/icon-streetworks.png
  5130. text/javascript
  5131. /things-to-do/green-spaces/Pages/default.aspx
  5132. /things-to-do/green-spaces/PublishingImages/city-green.jpg
  5133. /things-to-do/Pages/default.aspx
  5134. /things-to-do/visit-the-city/whats-on/Pages/default.aspx
  5135. /things-to-do/visit-the-city/whats-on/PublishingImages/events-bubble.jpg
  5136. -//W3C//DTD XHTML 1.0 Transitional//EN
  5137. ##############################################################################################################################
  5138. https://www.cityoflondon.gov.uk [302 Found] Country[UNITED KINGDOM][GB], HTTPServer[Microsoft-IIS/7.5], IP[80.169.89.102], Microsoft-IIS[7.5], Microsoft-Sharepoint[14.0.0.7239], RedirectLocation[http://www.cityoflondon.gov.uk/Pages/default.aspx], Title[Document Moved], UncommonHeaders[sprequestguid,x-sharepointhealthscore,microsoftsharepointteamservices,x-ms-invokeapp], X-Powered-By[ASP.NET]
  5139. http://www.cityoflondon.gov.uk/Pages/default.aspx [301 Moved Permanently] Country[UNITED KINGDOM][GB], HTTPServer[COL-VMW-M-LB02], IP[80.169.89.102], RedirectLocation[https://www.cityoflondon.gov.uk/Pages/default.aspx]
  5140. https://www.cityoflondon.gov.uk/Pages/default.aspx [200 OK] ASP_NET[2.0.50727], Country[UNITED KINGDOM][GB], HTTPServer[Microsoft-IIS/7.5], IP[80.169.89.102], JQuery[1.6.2], Microsoft-IIS[7.5], Microsoft-Sharepoint[14.0.0.7239], Script[text/javascript], Title[Welcome to the City of London Corporation], UncommonHeaders[sprequestguid,x-sharepointhealthscore,microsoftsharepointteamservices,x-ms-invokeapp], X-Powered-By[ASP.NET], X-UA-Compatible[IE=9]
  5141. ###############################################################################################################################
  5142.  
  5143. wig - WebApp Information Gatherer
  5144.  
  5145.  
  5146. Scanning https://www.cityoflondon.gov.uk...
  5147. _____________________________________ SITE INFO _____________________________________
  5148. IP Title
  5149. 80.169.89.102 Welcome to the City of London Corporation
  5150.  
  5151. ______________________________________ VERSION ______________________________________
  5152. Name Versions Type
  5153. SharePoint 14.0.0.7239 CMS
  5154. ASP.NET 2.0.50727 Platform
  5155. IIS 7.5 Platform
  5156. Microsoft Windows Server 2008 R2 OS
  5157.  
  5158. ____________________________________ INTERESTING ____________________________________
  5159. URL Note Type
  5160. /_layouts/help.aspx SharePoint Help Page Interesting
  5161.  
  5162. _______________________________________ TOOLS _______________________________________
  5163. Name Link Software
  5164. sparty https://github.com/alias1/sparty SharePoint
  5165. spscan https://github.com/toddsiegel/spscan SharePoint
  5166. Sharepoint URL Brute http://www.bishopfox.com/download/414/ SharePoint
  5167.  
  5168. _____________________________________________________________________________________
  5169. Time: 0.9 sec Urls: 216 Fingerprints: 40401
  5170. ###############################################################################################################################
  5171. Microsoft SharePoint 14.0.0.7239
  5172. IIS 7.5
  5173. jQuery 1.6.2
  5174. Microsoft ASP.NET
  5175. Microsoft ASP.NET 2.0.50727
  5176. X-MS-InvokeApp: 1; RequireReadOnly
  5177. ###############################################################################################################################
  5178. Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-31 00:45 EDT
  5179. NSE: Loaded 161 scripts for scanning.
  5180. NSE: Script Pre-scanning.
  5181. Initiating NSE at 00:45
  5182. Completed NSE at 00:45, 0.00s elapsed
  5183. Initiating NSE at 00:45
  5184. Completed NSE at 00:45, 0.00s elapsed
  5185. Initiating Parallel DNS resolution of 1 host. at 00:45
  5186. Completed Parallel DNS resolution of 1 host. at 00:45, 0.02s elapsed
  5187. Initiating SYN Stealth Scan at 00:45
  5188. Scanning www.cityoflondon.gov.uk (80.169.89.102) [1 port]
  5189. Discovered open port 443/tcp on 80.169.89.102
  5190. Completed SYN Stealth Scan at 00:45, 0.15s elapsed (1 total ports)
  5191. Initiating Service scan at 00:45
  5192. Scanning 1 service on www.cityoflondon.gov.uk (80.169.89.102)
  5193. Completed Service scan at 00:46, 12.97s elapsed (1 service on 1 host)
  5194. Initiating OS detection (try #1) against www.cityoflondon.gov.uk (80.169.89.102)
  5195. Retrying OS detection (try #2) against www.cityoflondon.gov.uk (80.169.89.102)
  5196. Initiating Traceroute at 00:46
  5197. Completed Traceroute at 00:46, 0.62s elapsed
  5198. Initiating Parallel DNS resolution of 10 hosts. at 00:46
  5199. Completed Parallel DNS resolution of 10 hosts. at 00:46, 0.11s elapsed
  5200. NSE: Script scanning 80.169.89.102.
  5201. Initiating NSE at 00:46
  5202. Completed NSE at 00:47, 91.00s elapsed
  5203. Initiating NSE at 00:47
  5204. Completed NSE at 00:47, 1.06s elapsed
  5205. Nmap scan report for www.cityoflondon.gov.uk (80.169.89.102)
  5206. Host is up (0.11s latency).
  5207.  
  5208. PORT STATE SERVICE VERSION
  5209. 443/tcp open ssl/http Microsoft IIS httpd 7.5
  5210. | http-brute:
  5211. |_ Path "/" does not require authentication
  5212. |_http-chrono: Request times for /Pages/default.aspx; avg: 2425.09ms; min: 2266.29ms; max: 2592.53ms
  5213. |_http-csrf: Couldn't find any CSRF vulnerabilities.
  5214. |_http-date: Tue, 31 Mar 2020 04:49:53 GMT; +3m43s from local time.
  5215. |_http-devframework: ASP.NET detected. Found related header.
  5216. |_http-dombased-xss: Couldn't find any DOM based XSS.
  5217. |_http-errors: Couldn't find any error pages.
  5218. |_http-feed: Couldn't find any feeds.
  5219. |_http-fetch: Please enter the complete path of the directory to save data in.
  5220. | http-frontpage-login:
  5221. | VULNERABLE:
  5222. | Frontpage extension anonymous login
  5223. | State: VULNERABLE
  5224. | Default installations of older versions of frontpage extensions allow anonymous logins which can lead to server compromise.
  5225. |
  5226. | References:
  5227. |_ http://insecure.org/sploits/Microsoft.frontpage.insecurities.html
  5228. | http-headers:
  5229. | Content-Type: text/html; charset=UTF-8
  5230. | Location: http://www.cityoflondon.gov.uk/Pages/default.aspx
  5231. | Server: Microsoft-IIS/7.5
  5232. | SPRequestGuid: 113736c6-a39f-48e3-b304-fa4caf5c58d5
  5233. | X-SharePointHealthScore: 0
  5234. | X-Powered-By: ASP.NET
  5235. | MicrosoftSharePointTeamServices: 14.0.0.7239
  5236. | X-MS-InvokeApp: 1; RequireReadOnly
  5237. | Date: Tue, 31 Mar 2020 04:50:03 GMT
  5238. | Connection: close
  5239. | Content-Length: 172
  5240. |
  5241. |_ (Request type: GET)
  5242. |_http-jsonp-detection: Couldn't find any JSONP endpoints.
  5243. | http-methods:
  5244. |_ Supported Methods: GET HEAD POST OPTIONS
  5245. |_http-mobileversion-checker: No mobile version detected.
  5246. | http-security-headers:
  5247. | Strict_Transport_Security:
  5248. | HSTS not configured in HTTPS Server
  5249. | Cache_Control:
  5250. | Header: Cache-Control: private
  5251. | Expires:
  5252. |_ Header: Expires: Tue, 31 Mar 2020 04:52:16 GMT
  5253. |_http-server-header: Microsoft-IIS/7.5
  5254. | http-sitemap-generator:
  5255. | Directory structure:
  5256. | Longest directory structure:
  5257. | Depth: 0
  5258. | Dir: /
  5259. | Total files found (by extension):
  5260. |_
  5261. |_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
  5262. |_http-title: Did not follow redirect to http://www.cityoflondon.gov.uk/Pages/default.aspx
  5263. |_http-userdir-enum: Potential Users: root, admin, administrator, webadmin, sysadmin, netadmin, guest, user, web, test
  5264. | http-vhosts:
  5265. |_127 names had status 302
  5266. |_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
  5267. | http-xssed:
  5268. |
  5269. | UNFIXED XSS vuln.
  5270. |
  5271. | http://www.cityoflondon.gov.uk/cgi-bin/semaphoreserver.exe?CMD=search.run&amp;SAVEDB=col&amp;SAVEQUERY00=%22<br>%3e%3cscript%3ealert%28'C1c4Tr1Z'%29%3c/script%3e&amp;SAVESTYPE=simple&amp;SAVEORGANISE_CODED=:F9&amp;B2=I1disab<br>ility&amp;PROP00=t%3Di&amp;QUERY01=disability&amp;B2_DESC=Disability&amp;PROP01=P%3DI1%2CS%3Dnone%2CZ%3Don&amp;THES_REC=<br>1222&amp;TBDB=col_taxonomy&amp;HIDECONCEPT=1
  5272. |
  5273. | http://www.cityoflondon.gov.uk/cgi-bin/select.exe
  5274. |
  5275. |_
  5276. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  5277. Device type: general purpose|firewall|storage-misc
  5278. Running (JUST GUESSING): Linux 2.6.X|3.X (90%), WatchGuard Fireware 11.X (89%), Synology DiskStation Manager 5.X (88%)
  5279. OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3.10 cpe:/o:watchguard:fireware:11.8 cpe:/o:linux:linux_kernel cpe:/a:synology:diskstation_manager:5.1
  5280. Aggressive OS guesses: Linux 2.6.32 (90%), Linux 2.6.32 or 3.10 (89%), Linux 2.6.39 (89%), WatchGuard Fireware 11.8 (89%), Linux 3.1 - 3.2 (89%), Synology DiskStation Manager 5.1 (88%), Linux 3.10 (87%), Linux 3.4 (87%), Linux 2.6.32 - 2.6.39 (85%)
  5281. No exact OS matches for host (test conditions non-ideal).
  5282. Uptime guess: 0.193 days (since Mon Mar 30 20:10:15 2020)
  5283. Network Distance: 12 hops
  5284. TCP Sequence Prediction: Difficulty=256 (Good luck!)
  5285. IP ID Sequence Generation: All zeros
  5286. Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
  5287.  
  5288. TRACEROUTE (using port 443/tcp)
  5289. HOP RTT ADDRESS
  5290. 1 104.58 ms 10.203.9.1
  5291. 2 615.31 ms 45.131.5.2
  5292. 3 104.66 ms 109.236.95.228
  5293. 4 105.98 ms 109.236.95.108
  5294. 5 106.39 ms et-0-0-1-pr2.AMS.router.colt.net (80.249.208.236)
  5295. 6 115.38 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
  5296. 7 115.11 ms xe0-3-0-sar18.LON.router.colt.net (212.74.68.145)
  5297. 8 115.04 ms cpeuk_lon002520.ia.colt.net (80.169.196.38)
  5298. 9 115.41 ms 195.110.81.4
  5299. 10 112.13 ms 195.110.81.4
  5300. 11 113.45 ms 195.110.81.4
  5301. 12 113.52 ms 80.169.89.102
  5302.  
  5303. NSE: Script Post-scanning.
  5304. Initiating NSE at 00:47
  5305. Completed NSE at 00:47, 0.00s elapsed
  5306. Initiating NSE at 00:47
  5307. Completed NSE at 00:47, 0.00s elapsed
  5308. ###############################################################################################################################
  5309. ===============================================================
  5310. Gobuster v3.0.1
  5311. by OJ Reeves (@TheColonial) & Christian Mehlmauer (@_FireFart_)
  5312. ===============================================================
  5313. [+] Url: https://www.cityoflondon.gov.uk
  5314. [+] Threads: 10
  5315. [+] Wordlist: /usr/share/sniper/wordlists/vhosts.txt
  5316. [+] User Agent: gobuster/3.0.1
  5317. [+] Timeout: 10s
  5318. ===============================================================
  5319. 2020/03/31 00:47:39 Starting gobuster
  5320. ===============================================================
  5321. Found: 127.0.0.1.www.cityoflondon.gov.uk (Status: 302) [Size: 183]
  5322. Found: administration.www.cityoflondon.gov.uk (Status: 302) [Size: 188]
  5323. Found: api.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
  5324. Found: ap.www.cityoflondon.gov.uk (Status: 302) [Size: 176]
  5325. Found: apps.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
  5326. Found: apache.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
  5327. Found: adserver.www.cityoflondon.gov.uk (Status: 302) [Size: 182]
  5328. Found: alerts.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
  5329. Found: admin.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
  5330. Found: alpha.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
  5331. Found: app.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
  5332. Found: ads.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
  5333. Found: appserver.www.cityoflondon.gov.uk (Status: 302) [Size: 183]
  5334. Found: aptest.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
  5335. Found: beta.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
  5336. Found: auth.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
  5337. Found: backup.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
  5338. Found: blog.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
  5339. Found: cdn.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
  5340. Found: chat.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
  5341. Found: citrix.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
  5342. Found: cms.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
  5343. Found: corp.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
  5344. Found: crs.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
  5345. Found: cvs.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
  5346. Found: dashboard.www.cityoflondon.gov.uk (Status: 302) [Size: 183]
  5347. Found: database.www.cityoflondon.gov.uk (Status: 302) [Size: 182]
  5348. Found: db.www.cityoflondon.gov.uk (Status: 302) [Size: 176]
  5349. Found: demo.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
  5350. Found: dev.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
  5351. Found: devel.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
  5352. Found: development.www.cityoflondon.gov.uk (Status: 302) [Size: 185]
  5353. Found: devsql.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
  5354. Found: devtest.www.cityoflondon.gov.uk (Status: 302) [Size: 181]
  5355. Found: direct.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
  5356. Found: dhcp.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
  5357. Found: dmz.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
  5358. Found: dns.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
  5359. Found: dns0.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
  5360. Found: dns1.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
  5361. Found: dns2.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
  5362. Found: download.www.cityoflondon.gov.uk (Status: 302) [Size: 182]
  5363. Found: en.www.cityoflondon.gov.uk (Status: 302) [Size: 176]
  5364. Found: erp.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
  5365. Found: eshop.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
  5366. Found: f5.www.cityoflondon.gov.uk (Status: 302) [Size: 176]
  5367. Found: fileserver.www.cityoflondon.gov.uk (Status: 302) [Size: 184]
  5368. Found: exchange.www.cityoflondon.gov.uk (Status: 302) [Size: 182]
  5369. Found: firewall.www.cityoflondon.gov.uk (Status: 302) [Size: 182]
  5370. Found: forum.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
  5371. Found: ftp.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
  5372. Found: ftp0.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
  5373. Found: git.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
  5374. Found: gw.www.cityoflondon.gov.uk (Status: 302) [Size: 176]
  5375. Found: help.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
  5376. Found: helpdesk.www.cityoflondon.gov.uk (Status: 302) [Size: 182]
  5377. Found: host.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
  5378. Found: home.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
  5379. Found: http.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
  5380. Found: id.www.cityoflondon.gov.uk (Status: 302) [Size: 176]
  5381. Found: images.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
  5382. Found: info.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
  5383. Found: internal.www.cityoflondon.gov.uk (Status: 302) [Size: 182]
  5384. Found: internet.www.cityoflondon.gov.uk (Status: 302) [Size: 182]
  5385. Found: intra.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
  5386. Found: intranet.www.cityoflondon.gov.uk (Status: 302) [Size: 182]
  5387. Found: ipv6.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
  5388. Found: lab.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
  5389. Found: ldap.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
  5390. Found: linux.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
  5391. Found: local.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
  5392. Found: localhost.www.cityoflondon.gov.uk (Status: 302) [Size: 183]
  5393. Found: log.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
  5394. Found: m.www.cityoflondon.gov.uk (Status: 302) [Size: 175]
  5395. Found: mail2.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
  5396. Found: mail.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
  5397. Found: mail3.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
  5398. Found: mailgate.www.cityoflondon.gov.uk (Status: 302) [Size: 182]
  5399. Found: main.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
  5400. Found: manage.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
  5401. Found: mgmt.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
  5402. Found: mobile.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
  5403. Found: mirror.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
  5404. Found: monitor.www.cityoflondon.gov.uk (Status: 302) [Size: 181]
  5405. Found: mssql.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
  5406. Found: mta.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
  5407. Found: mx0.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
  5408. Found: mx.www.cityoflondon.gov.uk (Status: 302) [Size: 176]
  5409. Found: mx1.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
  5410. Found: mysql.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
  5411. Found: news.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
  5412. Found: noc.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
  5413. Found: ns.www.cityoflondon.gov.uk (Status: 302) [Size: 176]
  5414. Found: ns0.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
  5415. Found: ns1.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
  5416. Found: ns2.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
  5417. Found: ns3.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
  5418. Found: ntp.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
  5419. Found: old.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
  5420. Found: ops.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
  5421. Found: oracle.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
  5422. Found: owa.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
  5423. Found: pbx.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
  5424. Found: portal.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
  5425. Found: s3.www.cityoflondon.gov.uk (Status: 302) [Size: 176]
  5426. Found: secure.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
  5427. Found: server.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
  5428. Found: sharepoint.www.cityoflondon.gov.uk (Status: 302) [Size: 184]
  5429. Found: shop.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
  5430. Found: sip.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
  5431. Found: ssh.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
  5432. Found: smtp.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
  5433. Found: sql.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
  5434. Found: squid.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
  5435. Found: ssl.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
  5436. Found: stage.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
  5437. Found: stats.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
  5438. Found: staging.www.cityoflondon.gov.uk (Status: 302) [Size: 181]
  5439. Found: status.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
  5440. Found: svn.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
  5441. Found: syslog.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
  5442. Found: test.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
  5443. Found: test1.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
  5444. Found: test2.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
  5445. Found: testing.www.cityoflondon.gov.uk (Status: 302) [Size: 181]
  5446. Found: uat.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
  5447. Found: upload.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
  5448. Found: v1.www.cityoflondon.gov.uk (Status: 302) [Size: 176]
  5449. Found: v2.www.cityoflondon.gov.uk (Status: 302) [Size: 176]
  5450. Found: vm.www.cityoflondon.gov.uk (Status: 302) [Size: 176]
  5451. Found: v3.www.cityoflondon.gov.uk (Status: 302) [Size: 176]
  5452. Found: vnc.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
  5453. Found: voip.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
  5454. Found: vpn.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
  5455. Found: web.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
  5456. Found: web2test.www.cityoflondon.gov.uk (Status: 302) [Size: 182]
  5457. Found: whois.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
  5458. Found: wiki.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
  5459. Found: www2.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
  5460. Found: www.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
  5461. Found: xml.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
  5462. ===============================================================
  5463. 2020/03/31 00:47:42 Finished
  5464. ===============================================================
  5465. ###############################################################################################################################
  5466. Version: 2.0.0-static
  5467. OpenSSL 1.1.1f-dev xx XXX xxxx
  5468.  
  5469. Connected to 80.169.89.102
  5470.  
  5471. Testing SSL server www.cityoflondon.gov.uk on port 443 using SNI name www.cityoflondon.gov.uk
  5472.  
  5473. SSL/TLS Protocols:
  5474. SSLv2 disabled
  5475. SSLv3 disabled
  5476. TLSv1.0 disabled
  5477. TLSv1.1 disabled
  5478. TLSv1.2 enabled
  5479. TLSv1.3 disabled
  5480.  
  5481. TLS Fallback SCSV:
  5482. Server supports TLS Fallback SCSV
  5483.  
  5484. TLS renegotiation:
  5485. Session renegotiation not supported
  5486.  
  5487. TLS Compression:
  5488. Compression disabled
  5489.  
  5490. Heartbleed:
  5491. TLSv1.2 not vulnerable to heartbleed
  5492.  
  5493. Supported Server Cipher(s):
  5494. Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
  5495. Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
  5496. Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
  5497. Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
  5498. Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
  5499. Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
  5500. Accepted TLSv1.2 256 bits AES256-GCM-SHA384
  5501. Accepted TLSv1.2 128 bits AES128-GCM-SHA256
  5502. Accepted TLSv1.2 256 bits AES256-SHA256
  5503. Accepted TLSv1.2 256 bits AES256-SHA
  5504. Accepted TLSv1.2 128 bits AES128-SHA256
  5505. Accepted TLSv1.2 128 bits AES128-SHA
  5506. Accepted TLSv1.2 256 bits CAMELLIA256-SHA
  5507. Accepted TLSv1.2 128 bits CAMELLIA128-SHA
  5508.  
  5509. Server Key Exchange Group(s):
  5510. TLSv1.2 128 bits secp256r1 (NIST P-256)
  5511.  
  5512. Server Signature Algorithm(s):
  5513. TLSv1.2 rsa_pkcs1_sha1
  5514. TLSv1.2 dsa_sha1
  5515. TLSv1.2 ecdsa_sha1
  5516. TLSv1.2 rsa_pkcs1_sha224
  5517. TLSv1.2 dsa_sha224
  5518. TLSv1.2 ecdsa_sha224
  5519. TLSv1.2 rsa_pkcs1_sha256
  5520. TLSv1.2 dsa_sha256
  5521. TLSv1.2 ecdsa_secp256r1_sha256
  5522. TLSv1.2 rsa_pkcs1_sha384
  5523. TLSv1.2 dsa_sha384
  5524. TLSv1.2 ecdsa_secp384r1_sha384
  5525. TLSv1.2 rsa_pkcs1_sha512
  5526. TLSv1.2 dsa_sha512
  5527. TLSv1.2 ecdsa_secp521r1_sha512
  5528.  
  5529. SSL Certificate:
  5530. Signature Algorithm: sha256WithRSAEncryption
  5531. RSA Key Strength: 2048
  5532.  
  5533. Subject: *.cityoflondon.gov.uk
  5534. Altnames: DNS:*.cityoflondon.gov.uk, DNS:cityoflondon.gov.uk
  5535. Issuer: Entrust Certification Authority - L1K
  5536.  
  5537. Not valid before: Jan 9 10:15:04 2019 GMT
  5538. Not valid after: Jan 9 10:45:03 2021 GMT
  5539. ##############################################################################################################################
  5540. ------------------------------------------------------------------------------------------------------------------------
  5541.  
  5542. [ ! ] Starting SCANNER INURLBR 2.1 at [31-03-2020 00:48:36]
  5543. [ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
  5544. It is the end user's responsibility to obey all applicable local, state and federal laws.
  5545. Developers assume no liability and are not responsible for any misuse or damage caused by this program
  5546.  
  5547. [ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.cityoflondon.gov.uk/output/inurlbr-www.cityoflondon.gov.uk ]
  5548. [ INFO ][ DORK ]::[ site:www.cityoflondon.gov.uk ]
  5549. [ INFO ][ SEARCHING ]:: {
  5550. [ INFO ][ ENGINE ]::[ GOOGLE - www.google.ki ]
  5551.  
  5552. [ INFO ][ SEARCHING ]::
  5553. -[:::]
  5554. [ INFO ][ ENGINE ]::[ GOOGLE API ]
  5555.  
  5556. [ INFO ][ SEARCHING ]::
  5557. -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
  5558. [ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.gf ID: 012984904789461885316:oy3-mu17hxk ]
  5559.  
  5560. [ INFO ][ SEARCHING ]::
  5561. -[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
  5562.  
  5563. [ INFO ][ TOTAL FOUND VALUES ]:: [ 100 ]
  5564.  
  5565.  
  5566. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5567. |_[ + ] [ 0 / 100 ]-[00:48:53] [ - ]
  5568. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/ ]
  5569. |_[ + ] Exploit::
  5570. |_[ + ] Information Server:: HTTP/1.1 302 Redirect, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5571. |_[ + ] More details:: / - / , ISP:
  5572. |_[ + ] Found:: UNIDENTIFIED
  5573.  
  5574. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5575. |_[ + ] [ 1 / 100 ]-[00:48:54] [ - ]
  5576. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/newsplan/ ]
  5577. |_[ + ] Exploit::
  5578. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5579. |_[ + ] More details:: / - / , ISP:
  5580. |_[ + ] Found:: UNIDENTIFIED
  5581.  
  5582. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5583. |_[ + ] [ 2 / 100 ]-[00:48:55] [ - ]
  5584. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/propertysearch/results.aspx ]
  5585. |_[ + ] Exploit::
  5586. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5587. |_[ + ] More details:: / - / , ISP:
  5588. |_[ + ] Found:: UNIDENTIFIED
  5589.  
  5590. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5591. |_[ + ] [ 3 / 100 ]-[00:48:57] [ - ]
  5592. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx ]
  5593. |_[ + ] Exploit::
  5594. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5595. |_[ + ] More details:: / - / , ISP:
  5596. |_[ + ] Found:: UNIDENTIFIED
  5597.  
  5598. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5599. |_[ + ] [ 4 / 100 ]-[00:48:58] [ - ]
  5600. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/keatsHouse/default.aspx ]
  5601. |_[ + ] Exploit::
  5602. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5603. |_[ + ] More details:: / - / , ISP:
  5604. |_[ + ] Found:: UNIDENTIFIED
  5605.  
  5606. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5607. |_[ + ] [ 5 / 100 ]-[00:48:59] [ - ]
  5608. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/Pages/default.aspx ]
  5609. |_[ + ] Exploit::
  5610. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5611. |_[ + ] More details:: / - / , ISP:
  5612. |_[ + ] Found:: UNIDENTIFIED
  5613.  
  5614. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5615. |_[ + ] [ 6 / 100 ]-[00:49:00] [ - ]
  5616. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/_layouts/col/basket.aspx ]
  5617. |_[ + ] Exploit::
  5618. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5619. |_[ + ] More details:: / - / , ISP:
  5620. |_[ + ] Found:: UNIDENTIFIED
  5621.  
  5622. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5623. |_[ + ] [ 7 / 100 ]-[00:49:02] [ - ]
  5624. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/contact-us/Pages/default.aspx ]
  5625. |_[ + ] Exploit::
  5626. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5627. |_[ + ] More details:: / - / , ISP:
  5628. |_[ + ] Found:: UNIDENTIFIED
  5629.  
  5630. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5631. |_[ + ] [ 8 / 100 ]-[00:49:03] [ - ]
  5632. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-our-website/Pages/default.aspx ]
  5633. |_[ + ] Exploit::
  5634. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5635. |_[ + ] More details:: / - / , ISP:
  5636. |_[ + ] Found:: UNIDENTIFIED
  5637.  
  5638. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5639. |_[ + ] [ 9 / 100 ]-[00:49:04] [ - ]
  5640. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/licensing/gambling/Pages/default.aspx ]
  5641. |_[ + ] Exploit::
  5642. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5643. |_[ + ] More details:: / - / , ISP:
  5644. |_[ + ] Found:: UNIDENTIFIED
  5645.  
  5646. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5647. |_[ + ] [ 10 / 100 ]-[00:49:05] [ - ]
  5648. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/Pages/homeowner-leaseholder.aspx ]
  5649. |_[ + ] Exploit::
  5650. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5651. |_[ + ] More details:: / - / , ISP:
  5652. |_[ + ] Found:: UNIDENTIFIED
  5653.  
  5654. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5655. |_[ + ] [ 11 / 100 ]-[00:49:06] [ - ]
  5656. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-our-website/Pages/accessibility.aspx ]
  5657. |_[ + ] Exploit::
  5658. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5659. |_[ + ] More details:: / - / , ISP:
  5660. |_[ + ] Found:: UNIDENTIFIED
  5661.  
  5662. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5663. |_[ + ] [ 12 / 100 ]-[00:49:07] [ - ]
  5664. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/council-tax/Pages/default.aspx ]
  5665. |_[ + ] Exploit::
  5666. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5667. |_[ + ] More details:: / - / , ISP:
  5668. |_[ + ] Found:: UNIDENTIFIED
  5669.  
  5670. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5671. |_[ + ] [ 13 / 100 ]-[00:49:08] [ - ]
  5672. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/licensing/Pages/street-trading.aspx ]
  5673. |_[ + ] Exploit::
  5674. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5675. |_[ + ] More details:: / - / , ISP:
  5676. |_[ + ] Found:: UNIDENTIFIED
  5677.  
  5678. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5679. |_[ + ] [ 14 / 100 ]-[00:49:09] [ - ]
  5680. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/asia-programme/Pages/default.aspx ]
  5681. |_[ + ] Exploit::
  5682. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5683. |_[ + ] More details:: / - / , ISP:
  5684. |_[ + ] Found:: UNIDENTIFIED
  5685.  
  5686. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5687. |_[ + ] [ 15 / 100 ]-[00:49:10] [ - ]
  5688. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/business-rates/Pages/default.aspx ]
  5689. |_[ + ] Exploit::
  5690. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5691. |_[ + ] More details:: / - / , ISP:
  5692. |_[ + ] Found:: UNIDENTIFIED
  5693.  
  5694. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5695. |_[ + ] [ 16 / 100 ]-[00:49:12] [ - ]
  5696. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-our-website/Pages/Cookies.aspx ]
  5697. |_[ + ] Exploit::
  5698. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5699. |_[ + ] More details:: / - / , ISP:
  5700. |_[ + ] Found:: UNIDENTIFIED
  5701.  
  5702. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5703. |_[ + ] [ 17 / 100 ]-[00:49:13] [ - ]
  5704. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/Pages/resident-involvement.aspx ]
  5705. |_[ + ] Exploit::
  5706. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5707. |_[ + ] More details:: / - / , ISP:
  5708. |_[ + ] Found:: UNIDENTIFIED
  5709.  
  5710. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5711. |_[ + ] [ 18 / 100 ]-[00:49:15] [ - ]
  5712. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/business-rates/Pages/contact.aspx ]
  5713. |_[ + ] Exploit::
  5714. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5715. |_[ + ] More details:: / - / , ISP:
  5716. |_[ + ] Found:: UNIDENTIFIED
  5717.  
  5718. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5719. |_[ + ] [ 19 / 100 ]-[00:49:16] [ - ]
  5720. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/Pages/default.aspx ]
  5721. |_[ + ] Exploit::
  5722. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5723. |_[ + ] More details:: / - / , ISP:
  5724. |_[ + ] Found:: UNIDENTIFIED
  5725.  
  5726. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5727. |_[ + ] [ 20 / 100 ]-[00:49:18] [ - ]
  5728. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?start1=13 ]
  5729. |_[ + ] Exploit::
  5730. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5731. |_[ + ] More details:: / - / , ISP:
  5732. |_[ + ] Found:: UNIDENTIFIED
  5733.  
  5734. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5735. |_[ + ] [ 21 / 100 ]-[00:49:19] [ - ]
  5736. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/business-rates/Pages/payment.aspx ]
  5737. |_[ + ] Exploit::
  5738. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5739. |_[ + ] More details:: / - / , ISP:
  5740. |_[ + ] Found:: UNIDENTIFIED
  5741.  
  5742. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5743. |_[ + ] [ 22 / 100 ]-[00:49:20] [ - ]
  5744. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/environmental-health/Pages/default.aspx ]
  5745. |_[ + ] Exploit::
  5746. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5747. |_[ + ] More details:: / - / , ISP:
  5748. |_[ + ] Found:: UNIDENTIFIED
  5749.  
  5750. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5751. |_[ + ] [ 23 / 100 ]-[00:49:21] [ - ]
  5752. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Today ]
  5753. |_[ + ] Exploit::
  5754. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5755. |_[ + ] More details:: / - / , ISP:
  5756. |_[ + ] Found:: UNIDENTIFIED
  5757.  
  5758. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5759. |_[ + ] [ 24 / 100 ]-[00:49:22] [ - ]
  5760. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/search/Pages/a-to-z.aspx ]
  5761. |_[ + ] Exploit::
  5762. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5763. |_[ + ] More details:: / - / , ISP:
  5764. |_[ + ] Found:: UNIDENTIFIED
  5765.  
  5766. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5767. |_[ + ] [ 25 / 100 ]-[00:49:23] [ - ]
  5768. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/filming/Pages/permissions.aspx ]
  5769. |_[ + ] Exploit::
  5770. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5771. |_[ + ] More details:: / - / , ISP:
  5772. |_[ + ] Found:: UNIDENTIFIED
  5773.  
  5774. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5775. |_[ + ] [ 26 / 100 ]-[00:49:24] [ - ]
  5776. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Aug-2019 ]
  5777. |_[ + ] Exploit::
  5778. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5779. |_[ + ] More details:: / - / , ISP:
  5780. |_[ + ] Found:: UNIDENTIFIED
  5781.  
  5782. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5783. |_[ + ] [ 27 / 100 ]-[00:49:26] [ - ]
  5784. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/asia-programme/india/Pages/publications.aspx ]
  5785. |_[ + ] Exploit::
  5786. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5787. |_[ + ] More details:: / - / , ISP:
  5788. |_[ + ] Found:: UNIDENTIFIED
  5789.  
  5790. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5791. |_[ + ] [ 28 / 100 ]-[00:49:27] [ - ]
  5792. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/Pages/tenancy-visits-programme.aspx ]
  5793. |_[ + ] Exploit::
  5794. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5795. |_[ + ] More details:: / - / , ISP:
  5796. |_[ + ] Found:: UNIDENTIFIED
  5797.  
  5798. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5799. |_[ + ] [ 29 / 100 ]-[00:49:28] [ - ]
  5800. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Dec-2019 ]
  5801. |_[ + ] Exploit::
  5802. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5803. |_[ + ] More details:: / - / , ISP:
  5804. |_[ + ] Found:: UNIDENTIFIED
  5805.  
  5806. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5807. |_[ + ] [ 30 / 100 ]-[00:49:29] [ - ]
  5808. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Jan-2018 ]
  5809. |_[ + ] Exploit::
  5810. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5811. |_[ + ] More details:: / - / , ISP:
  5812. |_[ + ] Found:: UNIDENTIFIED
  5813.  
  5814. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5815. |_[ + ] [ 31 / 100 ]-[00:49:30] [ - ]
  5816. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/Pages/pay-your-rent.aspx ]
  5817. |_[ + ] Exploit::
  5818. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5819. |_[ + ] More details:: / - / , ISP:
  5820. |_[ + ] Found:: UNIDENTIFIED
  5821.  
  5822. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5823. |_[ + ] [ 32 / 100 ]-[00:49:32] [ - ]
  5824. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Jan-2020 ]
  5825. |_[ + ] Exploit::
  5826. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5827. |_[ + ] More details:: / - / , ISP:
  5828. |_[ + ] Found:: UNIDENTIFIED
  5829.  
  5830. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5831. |_[ + ] [ 33 / 100 ]-[00:49:33] [ - ]
  5832. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Mar-2020 ]
  5833. |_[ + ] Exploit::
  5834. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5835. |_[ + ] More details:: / - / , ISP:
  5836. |_[ + ] Found:: UNIDENTIFIED
  5837.  
  5838. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5839. |_[ + ] [ 34 / 100 ]-[00:49:35] [ - ]
  5840. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/Pages/police-authority.aspx ]
  5841. |_[ + ] Exploit::
  5842. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5843. |_[ + ] More details:: / - / , ISP:
  5844. |_[ + ] Found:: UNIDENTIFIED
  5845.  
  5846. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5847. |_[ + ] [ 35 / 100 ]-[00:49:37] [ - ]
  5848. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/children-and-families/Pages/adoption.aspx ]
  5849. |_[ + ] Exploit::
  5850. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5851. |_[ + ] More details:: / - / , ISP:
  5852. |_[ + ] Found:: UNIDENTIFIED
  5853.  
  5854. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5855. |_[ + ] [ 36 / 100 ]-[00:49:39] [ - ]
  5856. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/adult-social-care/Pages/carers.aspx ]
  5857. |_[ + ] Exploit::
  5858. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5859. |_[ + ] More details:: / - / , ISP:
  5860. |_[ + ] Found:: UNIDENTIFIED
  5861.  
  5862. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5863. |_[ + ] [ 37 / 100 ]-[00:49:41] [ - ]
  5864. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/adult-social-care/Pages/dementia.aspx ]
  5865. |_[ + ] Exploit::
  5866. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5867. |_[ + ] More details:: / - / , ISP:
  5868. |_[ + ] Found:: UNIDENTIFIED
  5869.  
  5870. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5871. |_[ + ] [ 38 / 100 ]-[00:49:43] [ - ]
  5872. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/asia-programme/india/Pages/default.aspx ]
  5873. |_[ + ] Exploit::
  5874. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5875. |_[ + ] More details:: / - / , ISP:
  5876. |_[ + ] Found:: UNIDENTIFIED
  5877.  
  5878. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5879. |_[ + ] [ 39 / 100 ]-[00:49:44] [ - ]
  5880. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/wholesale-food-markets/Pages/default.aspx ]
  5881. |_[ + ] Exploit::
  5882. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5883. |_[ + ] More details:: / - / , ISP:
  5884. |_[ + ] Found:: UNIDENTIFIED
  5885.  
  5886. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5887. |_[ + ] [ 40 / 100 ]-[00:49:46] [ - ]
  5888. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/barbican-estate/Pages/resident-involvement.aspx ]
  5889. |_[ + ] Exploit::
  5890. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5891. |_[ + ] More details:: / - / , ISP:
  5892. |_[ + ] Found:: UNIDENTIFIED
  5893.  
  5894. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5895. |_[ + ] [ 41 / 100 ]-[00:49:48] [ - ]
  5896. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/history/Pages/mayoralty.aspx ]
  5897. |_[ + ] Exploit::
  5898. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5899. |_[ + ] More details:: / - / , ISP:
  5900. |_[ + ] Found:: UNIDENTIFIED
  5901.  
  5902. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5903. |_[ + ] [ 42 / 100 ]-[00:49:49] [ - ]
  5904. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-our-website/Pages/social-media.aspx ]
  5905. |_[ + ] Exploit::
  5906. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5907. |_[ + ] More details:: / - / , ISP:
  5908. |_[ + ] Found:: UNIDENTIFIED
  5909.  
  5910. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5911. |_[ + ] [ 43 / 100 ]-[00:49:51] [ - ]
  5912. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Feb-2020 ]
  5913. |_[ + ] Exploit::
  5914. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5915. |_[ + ] More details:: / - / , ISP:
  5916. |_[ + ] Found:: UNIDENTIFIED
  5917.  
  5918. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5919. |_[ + ] [ 44 / 100 ]-[00:49:52] [ - ]
  5920. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/pages/default.aspx?Date=Jan-2019 ]
  5921. |_[ + ] Exploit::
  5922. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5923. |_[ + ] More details:: / - / , ISP:
  5924. |_[ + ] Found:: UNIDENTIFIED
  5925.  
  5926. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5927. |_[ + ] [ 45 / 100 ]-[00:49:54] [ - ]
  5928. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/history/Pages/ceremonial.aspx ]
  5929. |_[ + ] Exploit::
  5930. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5931. |_[ + ] More details:: / - / , ISP:
  5932. |_[ + ] Found:: UNIDENTIFIED
  5933.  
  5934. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5935. |_[ + ] [ 46 / 100 ]-[00:49:56] [ - ]
  5936. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-our-website/Pages/legal-notices.aspx ]
  5937. |_[ + ] Exploit::
  5938. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5939. |_[ + ] More details:: / - / , ISP:
  5940. |_[ + ] Found:: UNIDENTIFIED
  5941.  
  5942. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5943. |_[ + ] [ 47 / 100 ]-[00:49:59] [ - ]
  5944. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/libraries-and-archives/Pages/default.aspx ]
  5945. |_[ + ] Exploit::
  5946. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5947. |_[ + ] More details:: / - / , ISP:
  5948. |_[ + ] Found:: UNIDENTIFIED
  5949.  
  5950. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5951. |_[ + ] [ 48 / 100 ]-[00:50:00] [ - ]
  5952. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/environment-and-planning/Pages/default.aspx ]
  5953. |_[ + ] Exploit::
  5954. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5955. |_[ + ] More details:: / - / , ISP:
  5956. |_[ + ] Found:: UNIDENTIFIED
  5957.  
  5958. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5959. |_[ + ] [ 49 / 100 ]-[00:50:02] [ - ]
  5960. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/history/Pages/ceremony.aspx ]
  5961. |_[ + ] Exploit::
  5962. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5963. |_[ + ] More details:: / - / , ISP:
  5964. |_[ + ] Found:: UNIDENTIFIED
  5965.  
  5966. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5967. |_[ + ] [ 50 / 100 ]-[00:50:03] [ - ]
  5968. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/things-to-do/Pages/leadenhall-market.aspx ]
  5969. |_[ + ] Exploit::
  5970. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5971. |_[ + ] More details:: / - / , ISP:
  5972. |_[ + ] Found:: UNIDENTIFIED
  5973.  
  5974. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5975. |_[ + ] [ 51 / 100 ]-[00:50:05] [ - ]
  5976. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/eu-and-regulation/Pages/default.aspx ]
  5977. |_[ + ] Exploit::
  5978. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5979. |_[ + ] More details:: / - / , ISP:
  5980. |_[ + ] Found:: UNIDENTIFIED
  5981.  
  5982. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5983. |_[ + ] [ 52 / 100 ]-[00:50:07] [ - ]
  5984. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/licensing/charity-collections/Pages/default.aspx ]
  5985. |_[ + ] Exploit::
  5986. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5987. |_[ + ] More details:: / - / , ISP:
  5988. |_[ + ] Found:: UNIDENTIFIED
  5989.  
  5990. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5991. |_[ + ] [ 53 / 100 ]-[00:50:09] [ - ]
  5992. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/environmental-health/Pages/primary-authority.aspx ]
  5993. |_[ + ] Exploit::
  5994. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  5995. |_[ + ] More details:: / - / , ISP:
  5996. |_[ + ] Found:: UNIDENTIFIED
  5997.  
  5998. _[ - ]::--------------------------------------------------------------------------------------------------------------
  5999. |_[ + ] [ 54 / 100 ]-[00:50:10] [ - ]
  6000. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/community-and-living/Pages/hospitals.aspx ]
  6001. |_[ + ] Exploit::
  6002. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  6003. |_[ + ] More details:: / - / , ISP:
  6004. |_[ + ] Found:: UNIDENTIFIED
  6005.  
  6006. _[ - ]::--------------------------------------------------------------------------------------------------------------
  6007. |_[ + ] [ 55 / 100 ]-[00:50:14] [ - ]
  6008. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/transport-and-streets/Pages/default.aspx ]
  6009. |_[ + ] Exploit::
  6010. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  6011. |_[ + ] More details:: / - / , ISP:
  6012. |_[ + ] Found:: UNIDENTIFIED
  6013.  
  6014. _[ - ]::--------------------------------------------------------------------------------------------------------------
  6015. |_[ + ] [ 56 / 100 ]-[00:50:15] [ - ]
  6016. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/barbican-estate/Pages/baggage-stores.aspx ]
  6017. |_[ + ] Exploit::
  6018. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  6019. |_[ + ] More details:: / - / , ISP:
  6020. |_[ + ] Found:: UNIDENTIFIED
  6021.  
  6022. _[ - ]::--------------------------------------------------------------------------------------------------------------
  6023. |_[ + ] [ 57 / 100 ]-[00:50:18] [ - ]
  6024. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/education-learning/apprenticeships/Pages/default.aspx ]
  6025. |_[ + ] Exploit::
  6026. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  6027. |_[ + ] More details:: / - / , ISP:
  6028. |_[ + ] Found:: UNIDENTIFIED
  6029.  
  6030. _[ - ]::--------------------------------------------------------------------------------------------------------------
  6031. |_[ + ] [ 58 / 100 ]-[00:50:20] [ - ]
  6032. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/things-to-do/keats-house/Pages/Schools.aspx ]
  6033. |_[ + ] Exploit::
  6034. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  6035. |_[ + ] More details:: / - / , ISP:
  6036. |_[ + ] Found:: UNIDENTIFIED
  6037.  
  6038. _[ - ]::--------------------------------------------------------------------------------------------------------------
  6039. |_[ + ] [ 59 / 100 ]-[00:50:22] [ - ]
  6040. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/mansion-house/Pages/inside.aspx ]
  6041. |_[ + ] Exploit::
  6042. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  6043. |_[ + ] More details:: / - / , ISP:
  6044. |_[ + ] Found:: UNIDENTIFIED
  6045.  
  6046. _[ - ]::--------------------------------------------------------------------------------------------------------------
  6047. |_[ + ] [ 60 / 100 ]-[00:50:23] [ - ]
  6048. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/children-and-families/Pages/Sofia-Simpson.aspx ]
  6049. |_[ + ] Exploit::
  6050. |_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  6051. |_[ + ] More details:: / - / , ISP:
  6052. |_[ + ] Found:: UNIDENTIFIED
  6053.  
  6054. _[ - ]::--------------------------------------------------------------------------------------------------------------
  6055. |_[ + ] [ 61 / 100 ]-[00:50:25] [ - ]
  6056. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/adult-social-care/Pages/concessionary-travel.aspx ]
  6057. |_[ + ] Exploit::
  6058. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  6059. |_[ + ] More details:: / - / , ISP:
  6060. |_[ + ] Found:: UNIDENTIFIED
  6061.  
  6062. _[ - ]::--------------------------------------------------------------------------------------------------------------
  6063. |_[ + ] [ 62 / 100 ]-[00:50:27] [ - ]
  6064. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/Pages/Housing-Fire-Safety-.aspx ]
  6065. |_[ + ] Exploit::
  6066. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  6067. |_[ + ] More details:: / - / , ISP:
  6068. |_[ + ] Found:: UNIDENTIFIED
  6069.  
  6070. _[ - ]::--------------------------------------------------------------------------------------------------------------
  6071. |_[ + ] [ 63 / 100 ]-[00:50:28] [ - ]
  6072. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/mansion-house/Pages/tours.aspx ]
  6073. |_[ + ] Exploit::
  6074. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  6075. |_[ + ] More details:: / - / , ISP:
  6076. |_[ + ] Found:: UNIDENTIFIED
  6077.  
  6078. _[ - ]::--------------------------------------------------------------------------------------------------------------
  6079. |_[ + ] [ 64 / 100 ]-[00:50:30] [ - ]
  6080. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/health-and-wellbeing/Pages/mental-wellbeing.aspx ]
  6081. |_[ + ] Exploit::
  6082. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  6083. |_[ + ] More details:: / - / , ISP:
  6084. |_[ + ] Found:: UNIDENTIFIED
  6085.  
  6086. _[ - ]::--------------------------------------------------------------------------------------------------------------
  6087. |_[ + ] [ 65 / 100 ]-[00:50:31] [ - ]
  6088. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/community-and-living/Pages/volunteering-opportunities.aspx ]
  6089. |_[ + ] Exploit::
  6090. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  6091. |_[ + ] More details:: / - / , ISP:
  6092. |_[ + ] Found:: UNIDENTIFIED
  6093.  
  6094. _[ - ]::--------------------------------------------------------------------------------------------------------------
  6095. |_[ + ] [ 66 / 100 ]-[00:50:33] [ - ]
  6096. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/barbican-estate/services/Pages/buildings-insurance.aspx ]
  6097. |_[ + ] Exploit::
  6098. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  6099. |_[ + ] More details:: / - / , ISP:
  6100. |_[ + ] Found:: UNIDENTIFIED
  6101.  
  6102. _[ - ]::--------------------------------------------------------------------------------------------------------------
  6103. |_[ + ] [ 67 / 100 ]-[00:50:36] [ - ]
  6104. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/housing-estates/Pages/middlesex-street.aspx ]
  6105. |_[ + ] Exploit::
  6106. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  6107. |_[ + ] More details:: / - / , ISP:
  6108. |_[ + ] Found:: UNIDENTIFIED
  6109.  
  6110. _[ - ]::--------------------------------------------------------------------------------------------------------------
  6111. |_[ + ] [ 68 / 100 ]-[00:50:37] [ - ]
  6112. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/tenders-and-procurement/Pages/contract-lists.aspx ]
  6113. |_[ + ] Exploit::
  6114. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  6115. |_[ + ] More details:: / - / , ISP:
  6116. |_[ + ] Found:: UNIDENTIFIED
  6117.  
  6118. _[ - ]::--------------------------------------------------------------------------------------------------------------
  6119. |_[ + ] [ 69 / 100 ]-[00:50:38] [ - ]
  6120. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/health-and-wellbeing/Pages/sexual-health.aspx ]
  6121. |_[ + ] Exploit::
  6122. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  6123. |_[ + ] More details:: / - / , ISP:
  6124. |_[ + ] Found:: UNIDENTIFIED
  6125.  
  6126. _[ - ]::--------------------------------------------------------------------------------------------------------------
  6127. |_[ + ] [ 70 / 100 ]-[00:50:40] [ - ]
  6128. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/health-and-wellbeing/Pages/covid-19.aspx ]
  6129. |_[ + ] Exploit::
  6130. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  6131. |_[ + ] More details:: / - / , ISP:
  6132. |_[ + ] Found:: UNIDENTIFIED
  6133.  
  6134. _[ - ]::--------------------------------------------------------------------------------------------------------------
  6135. |_[ + ] [ 71 / 100 ]-[00:50:41] [ - ]
  6136. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/housing-estates/Pages/holloway-estate.aspx ]
  6137. |_[ + ] Exploit::
  6138. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  6139. |_[ + ] More details:: / - / , ISP:
  6140. |_[ + ] Found:: UNIDENTIFIED
  6141.  
  6142. _[ - ]::--------------------------------------------------------------------------------------------------------------
  6143. |_[ + ] [ 72 / 100 ]-[00:50:43] [ - ]
  6144. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/education-learning/schools/Pages/education-policies.aspx ]
  6145. |_[ + ] Exploit::
  6146. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  6147. |_[ + ] More details:: / - / , ISP:
  6148. |_[ + ] Found:: UNIDENTIFIED
  6149.  
  6150. _[ - ]::--------------------------------------------------------------------------------------------------------------
  6151. |_[ + ] [ 73 / 100 ]-[00:50:45] [ - ]
  6152. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/Pages/brexit.aspx ]
  6153. |_[ + ] Exploit::
  6154. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  6155. |_[ + ] More details:: / - / , ISP:
  6156. |_[ + ] Found:: UNIDENTIFIED
  6157.  
  6158. _[ - ]::--------------------------------------------------------------------------------------------------------------
  6159. |_[ + ] [ 74 / 100 ]-[00:50:47] [ - ]
  6160. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/voting-elections/Pages/results.aspx ]
  6161. |_[ + ] Exploit::
  6162. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  6163. |_[ + ] More details:: / - / , ISP:
  6164. |_[ + ] Found:: UNIDENTIFIED
  6165.  
  6166. _[ - ]::--------------------------------------------------------------------------------------------------------------
  6167. |_[ + ] [ 75 / 100 ]-[00:50:50] [ - ]
  6168. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/housing-estates/Pages/dron-house.aspx ]
  6169. |_[ + ] Exploit::
  6170. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  6171. |_[ + ] More details:: / - / , ISP:
  6172. |_[ + ] Found:: UNIDENTIFIED
  6173.  
  6174. _[ - ]::--------------------------------------------------------------------------------------------------------------
  6175. |_[ + ] [ 76 / 100 ]-[00:50:52] [ - ]
  6176. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/adult-social-care/Pages/safeguarding-adults.aspx ]
  6177. |_[ + ] Exploit::
  6178. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  6179. |_[ + ] More details:: / - / , ISP:
  6180. |_[ + ] Found:: UNIDENTIFIED
  6181.  
  6182. _[ - ]::--------------------------------------------------------------------------------------------------------------
  6183. |_[ + ] [ 77 / 100 ]-[00:50:53] [ - ]
  6184. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/homelessness/Pages/duty-to-refer.aspx ]
  6185. |_[ + ] Exploit::
  6186. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  6187. |_[ + ] More details:: / - / , ISP:
  6188. |_[ + ] Found:: UNIDENTIFIED
  6189.  
  6190. _[ - ]::--------------------------------------------------------------------------------------------------------------
  6191. |_[ + ] [ 78 / 100 ]-[00:50:54] [ - ]
  6192. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/history/Pages/temple-bar.aspx ]
  6193. |_[ + ] Exploit::
  6194. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  6195. |_[ + ] More details:: / - / , ISP:
  6196. |_[ + ] Found:: UNIDENTIFIED
  6197.  
  6198. _[ - ]::--------------------------------------------------------------------------------------------------------------
  6199. |_[ + ] [ 79 / 100 ]-[00:50:55] [ - ]
  6200. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=This Month ]
  6201. |_[ + ] Exploit::
  6202. |_[ + ] Information Server:: HTTP/1.1 400 Bad Request, Server: Microsoft-HTTPAPI/2.0 , IP:80.169.89.102:443
  6203. |_[ + ] More details:: / - / , ISP:
  6204. |_[ + ] Found:: UNIDENTIFIED
  6205.  
  6206. _[ - ]::--------------------------------------------------------------------------------------------------------------
  6207. |_[ + ] [ 80 / 100 ]-[00:50:57] [ - ]
  6208. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/things-to-do/keats-house/Pages/default.aspx ]
  6209. |_[ + ] Exploit::
  6210. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  6211. |_[ + ] More details:: / - / , ISP:
  6212. |_[ + ] Found:: UNIDENTIFIED
  6213.  
  6214. _[ - ]::--------------------------------------------------------------------------------------------------------------
  6215. |_[ + ] [ 81 / 100 ]-[00:50:58] [ - ]
  6216. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/barbican-estate/Pages/barbican-history-architecture.aspx ]
  6217. |_[ + ] Exploit::
  6218. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  6219. |_[ + ] More details:: / - / , ISP:
  6220. |_[ + ] Found:: UNIDENTIFIED
  6221.  
  6222. _[ - ]::--------------------------------------------------------------------------------------------------------------
  6223. |_[ + ] [ 82 / 100 ]-[00:50:59] [ - ]
  6224. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/barbican-estate/Pages/service-charge-schedules.aspx ]
  6225. |_[ + ] Exploit::
  6226. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  6227. |_[ + ] More details:: / - / , ISP:
  6228. |_[ + ] Found:: UNIDENTIFIED
  6229.  
  6230. _[ - ]::--------------------------------------------------------------------------------------------------------------
  6231. |_[ + ] [ 83 / 100 ]-[00:51:01] [ - ]
  6232. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/barbican-estate/Pages/barbican-estate-parking.aspx ]
  6233. |_[ + ] Exploit::
  6234. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  6235. |_[ + ] More details:: / - / , ISP:
  6236. |_[ + ] Found:: UNIDENTIFIED
  6237.  
  6238. _[ - ]::--------------------------------------------------------------------------------------------------------------
  6239. |_[ + ] [ 84 / 100 ]-[00:51:02] [ - ]
  6240. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/children-and-families/Pages/contact-us.aspx ]
  6241. |_[ + ] Exploit::
  6242. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  6243. |_[ + ] More details:: / - / , ISP:
  6244. |_[ + ] Found:: UNIDENTIFIED
  6245.  
  6246. _[ - ]::--------------------------------------------------------------------------------------------------------------
  6247. |_[ + ] [ 85 / 100 ]-[00:51:05] [ - ]
  6248. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/wholesale-food-markets/billingsgate/Pages/default.aspx ]
  6249. |_[ + ] Exploit::
  6250. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  6251. |_[ + ] More details:: / - / , ISP:
  6252. |_[ + ] Found:: UNIDENTIFIED
  6253.  
  6254. _[ - ]::--------------------------------------------------------------------------------------------------------------
  6255. |_[ + ] [ 86 / 100 ]-[00:51:07] [ - ]
  6256. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/tenders-and-procurement/Pages/useful-links.aspx ]
  6257. |_[ + ] Exploit::
  6258. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  6259. |_[ + ] More details:: / - / , ISP:
  6260. |_[ + ] Found:: UNIDENTIFIED
  6261.  
  6262. _[ - ]::--------------------------------------------------------------------------------------------------------------
  6263. |_[ + ] [ 87 / 100 ]-[00:51:08] [ - ]
  6264. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/tenders-and-procurement/pages/responsible-procurement.aspx ]
  6265. |_[ + ] Exploit::
  6266. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  6267. |_[ + ] More details:: / - / , ISP:
  6268. |_[ + ] Found:: UNIDENTIFIED
  6269.  
  6270. _[ - ]::--------------------------------------------------------------------------------------------------------------
  6271. |_[ + ] [ 88 / 100 ]-[00:51:11] [ - ]
  6272. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/about-us/Pages/publications.aspx ]
  6273. |_[ + ] Exploit::
  6274. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  6275. |_[ + ] More details:: / - / , ISP:
  6276. |_[ + ] Found:: UNIDENTIFIED
  6277.  
  6278. _[ - ]::--------------------------------------------------------------------------------------------------------------
  6279. |_[ + ] [ 89 / 100 ]-[00:51:11] [ - ]
  6280. |_[ + ] Target:: [ http://www.cityoflondon.gov.uk/jobs/Documents/Previous_Pension_Rights_form.pdf ]
  6281. |_[ + ] Exploit::
  6282. |_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: COL-VMW-M-LB02 , IP:80.169.89.102:80
  6283. |_[ + ] More details:: / - / , ISP:
  6284. |_[ + ] Found:: UNIDENTIFIED
  6285.  
  6286. _[ - ]::--------------------------------------------------------------------------------------------------------------
  6287. |_[ + ] [ 90 / 100 ]-[00:51:14] [ - ]
  6288. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/Pages/remembrancers.aspx ]
  6289. |_[ + ] Exploit::
  6290. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  6291. |_[ + ] More details:: / - / , ISP:
  6292. |_[ + ] Found:: UNIDENTIFIED
  6293.  
  6294. _[ - ]::--------------------------------------------------------------------------------------------------------------
  6295. |_[ + ] [ 91 / 100 ]-[00:51:16] [ - ]
  6296. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/voting-elections/Pages/representation.aspx ]
  6297. |_[ + ] Exploit::
  6298. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  6299. |_[ + ] More details:: / - / , ISP:
  6300. |_[ + ] Found:: UNIDENTIFIED
  6301.  
  6302. _[ - ]::--------------------------------------------------------------------------------------------------------------
  6303. |_[ + ] [ 92 / 100 ]-[00:51:18] [ - ]
  6304. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/port-health/environmental-control/Pages/default.aspx ]
  6305. |_[ + ] Exploit::
  6306. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  6307. |_[ + ] More details:: / - / , ISP:
  6308. |_[ + ] Found:: UNIDENTIFIED
  6309.  
  6310. _[ - ]::--------------------------------------------------------------------------------------------------------------
  6311. |_[ + ] [ 93 / 100 ]-[00:51:19] [ - ]
  6312. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/environment-and-planning/planning/Pages/default.aspx ]
  6313. |_[ + ] Exploit::
  6314. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  6315. |_[ + ] More details:: / - / , ISP:
  6316. |_[ + ] Found:: UNIDENTIFIED
  6317.  
  6318. _[ - ]::--------------------------------------------------------------------------------------------------------------
  6319. |_[ + ] [ 94 / 100 ]-[00:51:21] [ - ]
  6320. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/wholesale-food-markets/smithfield/Pages/default.aspx ]
  6321. |_[ + ] Exploit::
  6322. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  6323. |_[ + ] More details:: / - / , ISP:
  6324. |_[ + ] Found:: UNIDENTIFIED
  6325.  
  6326. _[ - ]::--------------------------------------------------------------------------------------------------------------
  6327. |_[ + ] [ 95 / 100 ]-[00:51:23] [ - ]
  6328. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/asia-programme/india/Pages/mumbai-office.aspx ]
  6329. |_[ + ] Exploit::
  6330. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  6331. |_[ + ] More details:: / - / , ISP:
  6332. |_[ + ] Found:: UNIDENTIFIED
  6333.  
  6334. _[ - ]::--------------------------------------------------------------------------------------------------------------
  6335. |_[ + ] [ 96 / 100 ]-[00:51:27] [ - ]
  6336. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/environment-and-planning/sustainability/Pages/default.aspx ]
  6337. |_[ + ] Exploit::
  6338. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  6339. |_[ + ] More details:: / - / , ISP:
  6340. |_[ + ] Found:: UNIDENTIFIED
  6341.  
  6342. _[ - ]::--------------------------------------------------------------------------------------------------------------
  6343. |_[ + ] [ 97 / 100 ]-[00:51:28] [ - ]
  6344. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/jobs/Documents/TrainingRoomsLocationMap.pdf ]
  6345. |_[ + ] Exploit::
  6346. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  6347. |_[ + ] More details:: / - / , ISP:
  6348. |_[ + ] Found:: UNIDENTIFIED
  6349.  
  6350. _[ - ]::--------------------------------------------------------------------------------------------------------------
  6351. |_[ + ] [ 98 / 100 ]-[00:51:29] [ - ]
  6352. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/port-health/import-controls/Pages/default.aspx ]
  6353. |_[ + ] Exploit::
  6354. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  6355. |_[ + ] More details:: / - / , ISP:
  6356. |_[ + ] Found:: UNIDENTIFIED
  6357.  
  6358. _[ - ]::--------------------------------------------------------------------------------------------------------------
  6359. |_[ + ] [ 99 / 100 ]-[00:51:31] [ - ]
  6360. |_[ + ] Target:: [ https://www.cityoflondon.gov.uk/search/Pages/a-to-z.aspx?Filter=G ]
  6361. |_[ + ] Exploit::
  6362. |_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
  6363. |_[ + ] More details:: / - / , ISP:
  6364. |_[ + ] Found:: UNIDENTIFIED
  6365.  
  6366. [ INFO ] [ Shutting down ]
  6367. [ INFO ] [ End of process INURLBR at [31-03-2020 00:51:31]
  6368. [ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
  6369. [ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.cityoflondon.gov.uk/output/inurlbr-www.cityoflondon.gov.uk ]
  6370. |_________________________________________________________________________________________
  6371.  
  6372. \_________________________________________________________________________________________/
  6373. ################################################################################################################################
  6374. Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-31 00:29 EDT
  6375. Nmap scan report for 80.169.89.102
  6376. Host is up (0.11s latency).
  6377. Not shown: 474 filtered ports
  6378. Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
  6379. PORT STATE SERVICE VERSION
  6380. 80/tcp open http COL-VMW-M-LB02
  6381. | fingerprint-strings:
  6382. | FourOhFourRequest:
  6383. | HTTP/1.1 301 Moved Permanently
  6384. | Location: https:///nice%20ports%2C/Tri%6Eity.txt%2ebak
  6385. | Server: COL-VMW-M-LB02
  6386. | Cache-Control: no-cache
  6387. | Connection: close
  6388. | GenericLines:
  6389. | HTTP/1.1 301 Moved Permanently
  6390. | Location: https://
  6391. | Server: COL-VMW-M-LB02
  6392. | Cache-Control: no-cache
  6393. | Connection: close
  6394. | GetRequest, HTTPOptions, RTSPRequest:
  6395. | HTTP/1.1 301 Moved Permanently
  6396. | Location: https:///
  6397. | Server: COL-VMW-M-LB02
  6398. | Cache-Control: no-cache
  6399. | Connection: close
  6400. | SIPOptions:
  6401. | HTTP/1.1 301 Moved Permanently
  6402. | Location: https://sip:nm
  6403. | Server: COL-VMW-M-LB02
  6404. | Cache-Control: no-cache
  6405. |_ Connection: close
  6406. |_http-server-header: COL-VMW-M-LB02
  6407. |_http-title: Did not follow redirect to https://80.169.89.102/
  6408. |_https-redirect: ERROR: Script execution failed (use -d to debug)
  6409. 443/tcp open ssl/http Microsoft IIS httpd 7.5
  6410. |_http-server-header: Microsoft-IIS/7.5
  6411. | http-title: Welcome to the City of London Corporation
  6412. |_Requested resource was https://80.169.89.102/Pages/default.aspx
  6413. | ssl-cert: Subject: commonName=*.cityoflondon.gov.uk/organizationName=City of London Corporation/countryName=GB
  6414. | Subject Alternative Name: DNS:*.cityoflondon.gov.uk, DNS:cityoflondon.gov.uk
  6415. | Not valid before: 2019-01-09T10:15:04
  6416. |_Not valid after: 2021-01-09T10:45:03
  6417. |_ssl-date: TLS randomness does not represent time
  6418. 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
  6419. SF-Port80-TCP:V=7.80%I=7%D=3/31%Time=5E82C73A%P=x86_64-pc-linux-gnu%r(GetR
  6420. SF:equest,7B,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nLocation:\x20htt
  6421. SF:ps:///\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20no-cache\r\nCo
  6422. SF:nnection:\x20close\r\n\r\n")%r(HTTPOptions,7B,"HTTP/1\.1\x20301\x20Move
  6423. SF:d\x20Permanently\r\nLocation:\x20https:///\r\nServer:\x20COL-VMW-M-LB02
  6424. SF:\r\nCache-Control:\x20no-cache\r\nConnection:\x20close\r\n\r\n")%r(RTSP
  6425. SF:Request,7B,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nLocation:\x20ht
  6426. SF:tps:///\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20no-cache\r\nC
  6427. SF:onnection:\x20close\r\n\r\n")%r(FourOhFourRequest,9E,"HTTP/1\.1\x20301\
  6428. SF:x20Moved\x20Permanently\r\nLocation:\x20https:///nice%20ports%2C/Tri%6E
  6429. SF:ity\.txt%2ebak\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20no-cac
  6430. SF:he\r\nConnection:\x20close\r\n\r\n")%r(GenericLines,7A,"HTTP/1\.1\x2030
  6431. SF:1\x20Moved\x20Permanently\r\nLocation:\x20https://\r\nServer:\x20COL-VM
  6432. SF:W-M-LB02\r\nCache-Control:\x20no-cache\r\nConnection:\x20close\r\n\r\n"
  6433. SF:)%r(SIPOptions,80,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nLocation
  6434. SF::\x20https://sip:nm\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20n
  6435. SF:o-cache\r\nConnection:\x20close\r\n\r\n");
  6436. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  6437. Device type: general purpose|firewall|storage-misc
  6438. Running (JUST GUESSING): Linux 2.6.X|3.X (90%), WatchGuard Fireware 11.X (89%), Synology DiskStation Manager 5.X (88%)
  6439. OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3.10 cpe:/o:watchguard:fireware:11.8 cpe:/o:linux:linux_kernel cpe:/a:synology:diskstation_manager:5.1
  6440. Aggressive OS guesses: Linux 2.6.32 (90%), Linux 2.6.39 (90%), Linux 2.6.32 or 3.10 (89%), Linux 3.10 (89%), Linux 3.4 (89%), WatchGuard Fireware 11.8 (89%), Linux 3.1 - 3.2 (89%), Synology DiskStation Manager 5.1 (88%), Linux 2.6.32 - 2.6.39 (85%)
  6441. No exact OS matches for host (test conditions non-ideal).
  6442. Network Distance: 12 hops
  6443. Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
  6444.  
  6445. TRACEROUTE (using port 443/tcp)
  6446. HOP RTT ADDRESS
  6447. 1 104.57 ms 10.203.9.1
  6448. 2 104.74 ms 45.131.5.3
  6449. 3 104.78 ms 109.236.95.224
  6450. 4 106.07 ms 109.236.95.106
  6451. 5 106.39 ms et-0-0-1-pr2.AMS.router.colt.net (80.249.208.236)
  6452. 6 115.80 ms xe0-3-0-sar18.LON.router.colt.net (212.74.68.145)
  6453. 7 115.11 ms xe0-3-0-sar18.LON.router.colt.net (212.74.68.145)
  6454. 8 115.09 ms cpeuk_lon002520.ia.colt.net (80.169.196.38)
  6455. 9 115.87 ms 195.110.81.4
  6456. 10 116.64 ms 195.110.81.4
  6457. 11 113.08 ms 195.110.81.4
  6458. 12 112.98 ms 80.169.89.102
  6459. ###############################################################################################################################
  6460. Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-31 00:32 EDT
  6461. Nmap scan report for 80.169.89.102
  6462. Host is up.
  6463. Not shown: 14 filtered ports
  6464. Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
  6465. PORT STATE SERVICE VERSION
  6466. 53/udp open|filtered domain
  6467. 67/udp open|filtered dhcps
  6468. 68/udp open|filtered dhcpc
  6469. 69/udp open|filtered tftp
  6470. 88/udp open|filtered kerberos-sec
  6471. 123/udp open|filtered ntp
  6472. 137/udp open|filtered netbios-ns
  6473. 138/udp open|filtered netbios-dgm
  6474. 139/udp open|filtered netbios-ssn
  6475. 161/udp open|filtered snmp
  6476. 162/udp open|filtered snmptrap
  6477. 389/udp open|filtered ldap
  6478. 520/udp open|filtered route
  6479. 2049/udp open|filtered nfs
  6480. Too many fingerprints match this host to give specific OS details
  6481.  
  6482. TRACEROUTE (using proto 1/icmp)
  6483. HOP RTT ADDRESS
  6484. 1 108.63 ms 10.203.9.1
  6485. 2 108.66 ms 45.131.5.2
  6486. 3 108.68 ms 109.236.95.228
  6487. 4 108.82 ms 109.236.95.167
  6488. 5 109.44 ms et-0-0-1-pr2.AMS.router.colt.net (80.249.208.236)
  6489. 6 114.00 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
  6490. 7 113.80 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
  6491. 8 113.61 ms cpeuk_lon002520.ia.colt.net (80.169.196.38)
  6492. 9 113.99 ms 195.110.81.4
  6493. 10 ... 30
  6494. ###############################################################################################################################
  6495. Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-31 00:37 EDT
  6496. Nmap scan report for 80.169.89.102
  6497. Host is up.
  6498.  
  6499. PORT STATE SERVICE VERSION
  6500. 67/tcp filtered dhcps
  6501. 67/udp open|filtered dhcps
  6502. |_dhcp-discover: ERROR: Script execution failed (use -d to debug)
  6503. Too many fingerprints match this host to give specific OS details
  6504.  
  6505. TRACEROUTE (using proto 1/icmp)
  6506. HOP RTT ADDRESS
  6507. 1 104.58 ms 10.203.9.1
  6508. 2 104.64 ms 45.131.5.2
  6509. 3 105.60 ms 109.236.95.228
  6510. 4 106.38 ms 109.236.95.167
  6511. 5 106.98 ms et-0-0-1-pr2.AMS.router.colt.net (80.249.208.236)
  6512. 6 116.59 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
  6513. 7 112.26 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
  6514. 8 112.21 ms cpeuk_lon002520.ia.colt.net (80.169.196.38)
  6515. 9 112.30 ms 195.110.81.4
  6516. 10 ... 30
  6517. ##############################################################################################################################
  6518. Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-31 00:39 EDT
  6519. Nmap scan report for 80.169.89.102
  6520. Host is up.
  6521.  
  6522. PORT STATE SERVICE VERSION
  6523. 68/tcp filtered dhcpc
  6524. 68/udp open|filtered dhcpc
  6525. Too many fingerprints match this host to give specific OS details
  6526.  
  6527. TRACEROUTE (using proto 1/icmp)
  6528. HOP RTT ADDRESS
  6529. 1 102.08 ms 10.203.9.1
  6530. 2 102.94 ms 45.131.5.2
  6531. 3 102.95 ms 109.236.95.228
  6532. 4 103.36 ms 109.236.95.167
  6533. 5 103.37 ms et-0-0-1-pr2.AMS.router.colt.net (80.249.208.236)
  6534. 6 112.15 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
  6535. 7 112.05 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
  6536. 8 112.03 ms cpeuk_lon002520.ia.colt.net (80.169.196.38)
  6537. 9 112.32 ms 195.110.81.4
  6538. 10 ... 30
  6539. ################################################################################################################################
  6540. Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-31 00:41 EDT
  6541. Nmap scan report for 80.169.89.102
  6542. Host is up.
  6543.  
  6544. PORT STATE SERVICE VERSION
  6545. 69/tcp filtered tftp
  6546. 69/udp open|filtered tftp
  6547. Too many fingerprints match this host to give specific OS details
  6548.  
  6549. TRACEROUTE (using proto 1/icmp)
  6550. HOP RTT ADDRESS
  6551. 1 100.67 ms 10.203.9.1
  6552. 2 100.85 ms 45.131.5.2
  6553. 3 100.82 ms 109.236.95.228
  6554. 4 101.71 ms 109.236.95.167
  6555. 5 127.31 ms et-0-0-1-pr2.AMS.router.colt.net (80.249.208.236)
  6556. 6 111.72 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
  6557. 7 111.69 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
  6558. 8 111.33 ms cpeuk_lon002520.ia.colt.net (80.169.196.38)
  6559. 9 111.85 ms 195.110.81.4
  6560. 10 ... 30
  6561. ###############################################################################################################################
  6562. http://80.169.89.102 [301 Moved Permanently] Country[UNITED KINGDOM][GB], HTTPServer[COL-VMW-M-LB02], IP[80.169.89.102], RedirectLocation[https://80.169.89.102/]
  6563. https://80.169.89.102/ [302 Found] Country[UNITED KINGDOM][GB], HTTPServer[Microsoft-IIS/7.5], IP[80.169.89.102], Microsoft-IIS[7.5], Microsoft-Sharepoint[14.0.0.7239], RedirectLocation[https://80.169.89.102/Pages/default.aspx], Title[Document Moved], UncommonHeaders[sprequestguid,x-sharepointhealthscore,microsoftsharepointteamservices,x-ms-invokeapp], X-Powered-By[ASP.NET]
  6564. https://80.169.89.102/Pages/default.aspx [200 OK] ASP_NET[2.0.50727], Country[UNITED KINGDOM][GB], HTTPServer[Microsoft-IIS/7.5], IP[80.169.89.102], JQuery[1.6.2], Microsoft-IIS[7.5], Microsoft-Sharepoint[14.0.0.7239], Script[text/javascript], Title[Welcome to the City of London Corporation], UncommonHeaders[sprequestguid,x-sharepointhealthscore,microsoftsharepointteamservices,x-ms-invokeapp], X-Powered-By[ASP.NET], X-UA-Compatible[IE=9]
  6565. ###############################################################################################################################
  6566. HTTP/1.1 301 Moved Permanently
  6567. Location: https://80.169.89.102/
  6568. Server: COL-VMW-M-LB02
  6569. Cache-Control: no-cache
  6570. Connection: close
  6571.  
  6572. HTTP/1.1 301 Moved Permanently
  6573. Location: https://80.169.89.102/
  6574. Server: COL-VMW-M-LB02
  6575. Cache-Control: no-cache
  6576. Connection: close
  6577. ###############################################################################################################################
  6578. IIS 7.5
  6579. jQuery 1.6.2
  6580. Microsoft ASP.NET 2.0.50727
  6581. Microsoft ASP.NET
  6582. Microsoft SharePoint 14.0.0.7239
  6583. X-MS-InvokeApp: 1; RequireRead
  6584. ###############################################################################################################################
  6585. Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-31 00:44 EDT
  6586. Nmap scan report for 80.169.89.102
  6587. Host is up.
  6588.  
  6589. PORT STATE SERVICE VERSION
  6590. 123/tcp filtered ntp
  6591. 123/udp open|filtered ntp
  6592. Too many fingerprints match this host to give specific OS details
  6593.  
  6594. TRACEROUTE (using proto 1/icmp)
  6595. HOP RTT ADDRESS
  6596. 1 101.15 ms 10.203.9.1
  6597. 2 101.34 ms 45.131.5.2
  6598. 3 101.40 ms 109.236.95.228
  6599. 4 102.32 ms 109.236.95.167
  6600. 5 103.12 ms et-0-0-1-pr2.AMS.router.colt.net (80.249.208.236)
  6601. 6 112.00 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
  6602. 7 111.73 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
  6603. 8 111.49 ms cpeuk_lon002520.ia.colt.net (80.169.196.38)
  6604. 9 112.04 ms 195.110.81.4
  6605. 10 ... 30
  6606. ###############################################################################################################################
  6607. https://80.169.89.102/ [302 Found] Country[UNITED KINGDOM][GB], HTTPServer[Microsoft-IIS/7.5], IP[80.169.89.102], Microsoft-IIS[7.5], Microsoft-Sharepoint[14.0.0.7239], RedirectLocation[https://80.169.89.102/Pages/default.aspx], Title[Document Moved], UncommonHeaders[sprequestguid,x-sharepointhealthscore,microsoftsharepointteamservices,x-ms-invokeapp], X-Powered-By[ASP.NET]
  6608. https://80.169.89.102/Pages/default.aspx [200 OK] ASP_NET[2.0.50727], Country[UNITED KINGDOM][GB], HTTPServer[Microsoft-IIS/7.5], IP[80.169.89.102], JQuery[1.6.2], Microsoft-IIS[7.5], Microsoft-Sharepoint[14.0.0.7239], Script[text/javascript], Title[Welcome to the City of London Corporation], UncommonHeaders[sprequestguid,x-sharepointhealthscore,microsoftsharepointteamservices,x-ms-invokeapp], X-Powered-By[ASP.NET], X-UA-Compatible[IE=9]
  6609. ###############################################################################################################################
  6610. jQuery 1.6.2
  6611. IIS 7.5
  6612. Microsoft ASP.NET
  6613. Microsoft SharePoint 14.0.0.7239
  6614. Microsoft ASP.NET 2.0.50727
  6615. X-MS-InvokeApp: 1; RequireReadOnly
  6616. ###############################################################################################################################
  6617. Version: 2.0.0-static
  6618. OpenSSL 1.1.1f-dev xx XXX xxxx
  6619.  
  6620. Connected to 80.169.89.102
  6621.  
  6622. Testing SSL server 80.169.89.102 on port 443 using SNI name 80.169.89.102
  6623.  
  6624. SSL/TLS Protocols:
  6625. SSLv2 disabled
  6626. SSLv3 disabled
  6627. TLSv1.0 disabled
  6628. TLSv1.1 disabled
  6629. TLSv1.2 enabled
  6630. TLSv1.3 disabled
  6631.  
  6632. TLS Fallback SCSV:
  6633. Server supports TLS Fallback SCSV
  6634.  
  6635. TLS renegotiation:
  6636. Session renegotiation not supported
  6637.  
  6638. TLS Compression:
  6639. Compression disabled
  6640.  
  6641. Heartbleed:
  6642. TLSv1.2 not vulnerable to heartbleed
  6643.  
  6644. Supported Server Cipher(s):
  6645. Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
  6646. Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
  6647. Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
  6648. Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
  6649. Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
  6650. Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
  6651. Accepted TLSv1.2 256 bits AES256-GCM-SHA384
  6652. Accepted TLSv1.2 128 bits AES128-GCM-SHA256
  6653. Accepted TLSv1.2 256 bits AES256-SHA256
  6654. Accepted TLSv1.2 256 bits AES256-SHA
  6655. Accepted TLSv1.2 128 bits AES128-SHA256
  6656. Accepted TLSv1.2 128 bits AES128-SHA
  6657. Accepted TLSv1.2 256 bits CAMELLIA256-SHA
  6658. Accepted TLSv1.2 128 bits CAMELLIA128-SHA
  6659.  
  6660. Server Key Exchange Group(s):
  6661. TLSv1.2 128 bits secp256r1 (NIST P-256)
  6662.  
  6663. Server Signature Algorithm(s):
  6664. TLSv1.2 rsa_pkcs1_sha1
  6665. TLSv1.2 dsa_sha1
  6666. TLSv1.2 ecdsa_sha1
  6667. TLSv1.2 rsa_pkcs1_sha224
  6668. TLSv1.2 dsa_sha224
  6669. TLSv1.2 ecdsa_sha224
  6670. TLSv1.2 rsa_pkcs1_sha256
  6671. TLSv1.2 dsa_sha256
  6672. TLSv1.2 ecdsa_secp256r1_sha256
  6673. TLSv1.2 rsa_pkcs1_sha384
  6674. TLSv1.2 dsa_sha384
  6675. TLSv1.2 ecdsa_secp384r1_sha384
  6676. TLSv1.2 rsa_pkcs1_sha512
  6677. TLSv1.2 dsa_sha512
  6678. TLSv1.2 ecdsa_secp521r1_sha512
  6679.  
  6680. SSL Certificate:
  6681. Signature Algorithm: sha256WithRSAEncryption
  6682. RSA Key Strength: 2048
  6683.  
  6684. Subject: *.cityoflondon.gov.uk
  6685. Altnames: DNS:*.cityoflondon.gov.uk, DNS:cityoflondon.gov.uk
  6686. Issuer: Entrust Certification Authority - L1K
  6687.  
  6688. Not valid before: Jan 9 10:15:04 2019 GMT
  6689. Not valid after: Jan 9 10:45:03 2021 GMT
  6690. ###############################################################################################################################
  6691. Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-31 00:53 EDT
  6692. Nmap scan report for 80.169.89.102
  6693. Host is up (0.11s latency).
  6694. Not shown: 65533 filtered ports
  6695. PORT STATE SERVICE VERSION
  6696. 80/tcp open http COL-VMW-M-LB02
  6697. | fingerprint-strings:
  6698. | FourOhFourRequest:
  6699. | HTTP/1.1 301 Moved Permanently
  6700. | Location: https:///nice%20ports%2C/Tri%6Eity.txt%2ebak
  6701. | Server: COL-VMW-M-LB02
  6702. | Cache-Control: no-cache
  6703. | Connection: close
  6704. | GenericLines:
  6705. | HTTP/1.1 301 Moved Permanently
  6706. | Location: https://
  6707. | Server: COL-VMW-M-LB02
  6708. | Cache-Control: no-cache
  6709. | Connection: close
  6710. | GetRequest, HTTPOptions, RTSPRequest:
  6711. | HTTP/1.1 301 Moved Permanently
  6712. | Location: https:///
  6713. | Server: COL-VMW-M-LB02
  6714. | Cache-Control: no-cache
  6715. | Connection: close
  6716. | SIPOptions:
  6717. | HTTP/1.1 301 Moved Permanently
  6718. | Location: https://sip:nm
  6719. | Server: COL-VMW-M-LB02
  6720. | Cache-Control: no-cache
  6721. |_ Connection: close
  6722. |_http-server-header: COL-VMW-M-LB02
  6723. |_http-title: Did not follow redirect to https://80.169.89.102/
  6724. |_https-redirect: ERROR: Script execution failed (use -d to debug)
  6725. 443/tcp open ssl/http Microsoft IIS httpd 7.5
  6726. |_http-server-header: Microsoft-IIS/7.5
  6727. | http-title: Welcome to the City of London Corporation
  6728. |_Requested resource was https://80.169.89.102/Pages/default.aspx
  6729. | ssl-cert: Subject: commonName=*.cityoflondon.gov.uk/organizationName=City of London Corporation/countryName=GB
  6730. | Subject Alternative Name: DNS:*.cityoflondon.gov.uk, DNS:cityoflondon.gov.uk
  6731. | Not valid before: 2019-01-09T10:15:04
  6732. |_Not valid after: 2021-01-09T10:45:03
  6733. |_ssl-date: TLS randomness does not represent time
  6734. 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
  6735. SF-Port80-TCP:V=7.80%I=7%D=3/31%Time=5E82CD4F%P=x86_64-pc-linux-gnu%r(GetR
  6736. SF:equest,7B,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nLocation:\x20htt
  6737. SF:ps:///\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20no-cache\r\nCo
  6738. SF:nnection:\x20close\r\n\r\n")%r(HTTPOptions,7B,"HTTP/1\.1\x20301\x20Move
  6739. SF:d\x20Permanently\r\nLocation:\x20https:///\r\nServer:\x20COL-VMW-M-LB02
  6740. SF:\r\nCache-Control:\x20no-cache\r\nConnection:\x20close\r\n\r\n")%r(RTSP
  6741. SF:Request,7B,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nLocation:\x20ht
  6742. SF:tps:///\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20no-cache\r\nC
  6743. SF:onnection:\x20close\r\n\r\n")%r(FourOhFourRequest,9E,"HTTP/1\.1\x20301\
  6744. SF:x20Moved\x20Permanently\r\nLocation:\x20https:///nice%20ports%2C/Tri%6E
  6745. SF:ity\.txt%2ebak\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20no-cac
  6746. SF:he\r\nConnection:\x20close\r\n\r\n")%r(GenericLines,7A,"HTTP/1\.1\x2030
  6747. SF:1\x20Moved\x20Permanently\r\nLocation:\x20https://\r\nServer:\x20COL-VM
  6748. SF:W-M-LB02\r\nCache-Control:\x20no-cache\r\nConnection:\x20close\r\n\r\n"
  6749. SF:)%r(SIPOptions,80,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nLocation
  6750. SF::\x20https://sip:nm\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20n
  6751. SF:o-cache\r\nConnection:\x20close\r\n\r\n");
  6752. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  6753. Device type: general purpose|firewall|storage-misc
  6754. Running (JUST GUESSING): Linux 2.6.X|3.X (90%), WatchGuard Fireware 11.X (89%), Synology DiskStation Manager 5.X (88%)
  6755. OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3.10 cpe:/o:watchguard:fireware:11.8 cpe:/o:linux:linux_kernel cpe:/a:synology:diskstation_manager:5.1
  6756. Aggressive OS guesses: Linux 2.6.32 (90%), Linux 2.6.39 (90%), Linux 3.10 (89%), Linux 3.4 (89%), WatchGuard Fireware 11.8 (89%), Linux 3.1 - 3.2 (89%), Synology DiskStation Manager 5.1 (88%), Linux 2.6.32 or 3.10 (87%), Linux 2.6.32 - 2.6.39 (85%)
  6757. No exact OS matches for host (test conditions non-ideal).
  6758. Network Distance: 12 hops
  6759. Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
  6760.  
  6761. TRACEROUTE (using port 443/tcp)
  6762. HOP RTT ADDRESS
  6763. 1 103.49 ms 10.203.9.1
  6764. 2 100.74 ms 45.131.5.3
  6765. 3 100.76 ms 109.236.95.228
  6766. 4 100.91 ms 109.236.95.173
  6767. 5 101.74 ms et-0-0-1-pr2.AMS.router.colt.net (80.249.208.236)
  6768. 6 111.04 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
  6769. 7 110.61 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
  6770. 8 110.59 ms cpeuk_lon002520.ia.colt.net (80.169.196.38)
  6771. 9 111.04 ms 195.110.81.4
  6772. 10 111.82 ms 195.110.81.4
  6773. 11 113.00 ms 195.110.81.4
  6774. 12 113.00 ms 80.169.89.102
  6775. ###############################################################################################################################
  6776. Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-31 00:58 EDT
  6777. Nmap scan report for 80.169.89.102
  6778. Host is up.
  6779.  
  6780. PORT STATE SERVICE VERSION
  6781. 53/tcp filtered domain
  6782. 67/tcp filtered dhcps
  6783. 68/tcp filtered dhcpc
  6784. 69/tcp filtered tftp
  6785. 88/tcp filtered kerberos-sec
  6786. 123/tcp filtered ntp
  6787. 137/tcp filtered netbios-ns
  6788. 138/tcp filtered netbios-dgm
  6789. 139/tcp filtered netbios-ssn
  6790. 161/tcp filtered snmp
  6791. 162/tcp filtered snmptrap
  6792. 389/tcp filtered ldap
  6793. 520/tcp filtered efs
  6794. 2049/tcp filtered nfs
  6795. 53/udp open|filtered domain
  6796. 67/udp open|filtered dhcps
  6797. 68/udp open|filtered dhcpc
  6798. 69/udp open|filtered tftp
  6799. 88/udp open|filtered kerberos-sec
  6800. 123/udp open|filtered ntp
  6801. 137/udp open|filtered netbios-ns
  6802. 138/udp open|filtered netbios-dgm
  6803. 139/udp open|filtered netbios-ssn
  6804. 161/udp open|filtered snmp
  6805. 162/udp open|filtered snmptrap
  6806. 389/udp open|filtered ldap
  6807. 520/udp open|filtered route
  6808. 2049/udp open|filtered nfs
  6809. Too many fingerprints match this host to give specific OS details
  6810.  
  6811. TRACEROUTE (using proto 1/icmp)
  6812. HOP RTT ADDRESS
  6813. 1 104.79 ms 10.203.9.1
  6814. 2 104.88 ms 45.131.5.2
  6815. 3 104.86 ms 109.236.95.228
  6816. 4 105.98 ms 109.236.95.167
  6817. 5 106.79 ms et-0-0-1-pr2.AMS.router.colt.net (80.249.208.236)
  6818. 6 118.96 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
  6819. 7 118.92 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
  6820. 8 115.43 ms cpeuk_lon002520.ia.colt.net (80.169.196.38)
  6821. 9 116.07 ms 195.110.81.4
  6822. 10 ... 30
  6823. ###############################################################################################################################
  6824. Hosts
  6825. =====
  6826.  
  6827. address mac name os_name os_flavor os_sp purpose info comments
  6828. ------- --- ---- ------- --------- ----- ------- ---- --------
  6829. 23.100.15.180 Unknown device
  6830. 52.52.234.222 ec2-52-52-234-222.us-west-1.compute.amazonaws.com embedded device
  6831. 80.169.89.102 Linux 2.6.X server
  6832. 91.211.89.189 embedded device
  6833. 93.174.93.84 Linux 3.X server
  6834. 94.140.114.104 Linux 3.X server
  6835. 104.87.36.73 a104-87-36-73.deploy.static.akamaitechnologies.com Unknown device
  6836. 201.148.104.59 hcenter10459.dedicados.cl Unknown device
  6837. 217.148.69.93 217-148-69-93.lacaixa.com Unknown device
  6838. 217.148.69.235 caixabank.com Unknown device
  6839. 217.148.71.93 217-148-71-93.lacaixa.com Unknown device
  6840. 217.148.71.235 caixabank.com Unknown device
  6841. ###############################################################################################################################
  6842. Services
  6843. ========
  6844.  
  6845. host port proto name state info
  6846. ---- ---- ----- ---- ----- ----
  6847. 23.100.15.180 53 tcp domain filtered
  6848. 23.100.15.180 53 udp domain unknown
  6849. 23.100.15.180 67 tcp dhcps filtered
  6850. 23.100.15.180 67 udp dhcps unknown
  6851. 23.100.15.180 68 tcp dhcpc filtered
  6852. 23.100.15.180 68 udp dhcpc unknown
  6853. 23.100.15.180 69 tcp tftp filtered
  6854. 23.100.15.180 69 udp tftp unknown
  6855. 23.100.15.180 88 tcp kerberos-sec filtered
  6856. 23.100.15.180 88 udp kerberos-sec unknown
  6857. 23.100.15.180 123 tcp ntp filtered
  6858. 23.100.15.180 123 udp ntp unknown
  6859. 23.100.15.180 137 tcp netbios-ns filtered
  6860. 23.100.15.180 137 udp netbios-ns unknown
  6861. 23.100.15.180 138 tcp netbios-dgm filtered
  6862. 23.100.15.180 138 udp netbios-dgm unknown
  6863. 23.100.15.180 139 tcp netbios-ssn filtered
  6864. 23.100.15.180 139 udp netbios-ssn unknown
  6865. 23.100.15.180 161 tcp snmp filtered
  6866. 23.100.15.180 161 udp snmp unknown
  6867. 23.100.15.180 162 tcp snmptrap filtered
  6868. 23.100.15.180 162 udp snmptrap unknown
  6869. 23.100.15.180 389 tcp ldap filtered
  6870. 23.100.15.180 389 udp ldap unknown
  6871. 23.100.15.180 520 tcp efs filtered
  6872. 23.100.15.180 520 udp route unknown
  6873. 23.100.15.180 2049 tcp nfs filtered
  6874. 23.100.15.180 2049 udp nfs unknown
  6875. 52.52.234.222 53 tcp domain filtered
  6876. 52.52.234.222 53 udp domain unknown
  6877. 52.52.234.222 67 tcp dhcps filtered
  6878. 52.52.234.222 67 udp dhcps unknown
  6879. 52.52.234.222 68 tcp dhcpc filtered
  6880. 52.52.234.222 68 udp dhcpc unknown
  6881. 52.52.234.222 69 tcp tftp filtered
  6882. 52.52.234.222 69 udp tftp unknown
  6883. 52.52.234.222 80 tcp http open Apache httpd 2.2.34
  6884. 52.52.234.222 88 tcp kerberos-sec filtered
  6885. 52.52.234.222 88 udp kerberos-sec unknown
  6886. 52.52.234.222 123 tcp ntp filtered
  6887. 52.52.234.222 123 udp ntp unknown
  6888. 52.52.234.222 137 tcp netbios-ns filtered
  6889. 52.52.234.222 137 udp netbios-ns unknown
  6890. 52.52.234.222 138 tcp netbios-dgm filtered
  6891. 52.52.234.222 138 udp netbios-dgm unknown
  6892. 52.52.234.222 139 tcp netbios-ssn filtered
  6893. 52.52.234.222 139 udp netbios-ssn unknown
  6894. 52.52.234.222 161 tcp snmp filtered
  6895. 52.52.234.222 161 udp snmp unknown
  6896. 52.52.234.222 162 tcp snmptrap filtered
  6897. 52.52.234.222 162 udp snmptrap unknown
  6898. 52.52.234.222 389 tcp ldap filtered
  6899. 52.52.234.222 389 udp ldap unknown
  6900. 52.52.234.222 443 tcp ssl/http open Apache Tomcat/Coyote JSP engine 1.1
  6901. 52.52.234.222 520 tcp efs filtered
  6902. 52.52.234.222 520 udp route unknown
  6903. 52.52.234.222 2049 tcp nfs filtered
  6904. 52.52.234.222 2049 udp nfs unknown
  6905. 80.169.89.102 53 tcp domain filtered
  6906. 80.169.89.102 53 udp domain unknown
  6907. 80.169.89.102 67 tcp dhcps filtered
  6908. 80.169.89.102 67 udp dhcps unknown
  6909. 80.169.89.102 68 tcp dhcpc filtered
  6910. 80.169.89.102 68 udp dhcpc unknown
  6911. 80.169.89.102 69 tcp tftp filtered
  6912. 80.169.89.102 69 udp tftp unknown
  6913. 80.169.89.102 80 tcp http open COL-VMW-M-LB02
  6914. 80.169.89.102 88 tcp kerberos-sec filtered
  6915. 80.169.89.102 88 udp kerberos-sec unknown
  6916. 80.169.89.102 123 tcp ntp filtered
  6917. 80.169.89.102 123 udp ntp unknown
  6918. 80.169.89.102 137 tcp netbios-ns filtered
  6919. 80.169.89.102 137 udp netbios-ns unknown
  6920. 80.169.89.102 138 tcp netbios-dgm filtered
  6921. 80.169.89.102 138 udp netbios-dgm unknown
  6922. 80.169.89.102 139 tcp netbios-ssn filtered
  6923. 80.169.89.102 139 udp netbios-ssn unknown
  6924. 80.169.89.102 161 tcp snmp filtered
  6925. 80.169.89.102 161 udp snmp unknown
  6926. 80.169.89.102 162 tcp snmptrap filtered
  6927. 80.169.89.102 162 udp snmptrap unknown
  6928. 80.169.89.102 389 tcp ldap filtered
  6929. 80.169.89.102 389 udp ldap unknown
  6930. 80.169.89.102 443 tcp ssl/http open Microsoft IIS httpd 7.5
  6931. 80.169.89.102 520 tcp efs filtered
  6932. 80.169.89.102 520 udp route unknown
  6933. 80.169.89.102 2049 tcp nfs filtered
  6934. 80.169.89.102 2049 udp nfs unknown
  6935. 91.211.89.189 53 tcp domain closed
  6936. 91.211.89.189 53 udp domain closed
  6937. 91.211.89.189 67 tcp dhcps filtered
  6938. 91.211.89.189 67 udp dhcps closed
  6939. 91.211.89.189 68 tcp dhcpc closed
  6940. 91.211.89.189 68 udp dhcpc unknown
  6941. 91.211.89.189 69 tcp tftp closed
  6942. 91.211.89.189 69 udp tftp closed
  6943. 91.211.89.189 88 tcp kerberos-sec filtered
  6944. 91.211.89.189 88 udp kerberos-sec closed
  6945. 91.211.89.189 123 tcp ntp closed
  6946. 91.211.89.189 123 udp ntp closed
  6947. 91.211.89.189 137 tcp netbios-ns closed
  6948. 91.211.89.189 137 udp netbios-ns closed
  6949. 91.211.89.189 138 tcp netbios-dgm closed
  6950. 91.211.89.189 138 udp netbios-dgm unknown
  6951. 91.211.89.189 139 tcp netbios-ssn filtered
  6952. 91.211.89.189 139 udp netbios-ssn unknown
  6953. 91.211.89.189 161 tcp snmp filtered
  6954. 91.211.89.189 161 udp snmp unknown
  6955. 91.211.89.189 162 tcp snmptrap closed
  6956. 91.211.89.189 162 udp snmptrap closed
  6957. 91.211.89.189 389 tcp ldap closed
  6958. 91.211.89.189 389 udp ldap closed
  6959. 91.211.89.189 520 tcp efs filtered
  6960. 91.211.89.189 520 udp route unknown
  6961. 91.211.89.189 2049 tcp nfs closed
  6962. 91.211.89.189 2049 udp nfs closed
  6963. 93.174.93.84 53 tcp domain filtered
  6964. 93.174.93.84 53 udp domain unknown
  6965. 93.174.93.84 67 tcp dhcps filtered
  6966. 93.174.93.84 67 udp dhcps unknown
  6967. 93.174.93.84 68 tcp dhcpc filtered
  6968. 93.174.93.84 68 udp dhcpc unknown
  6969. 93.174.93.84 69 tcp tftp filtered
  6970. 93.174.93.84 69 udp tftp unknown
  6971. 93.174.93.84 80 tcp http open Apache httpd 2.4.6 (CentOS) PHP/5.4.16
  6972. 93.174.93.84 88 tcp kerberos-sec filtered
  6973. 93.174.93.84 88 udp kerberos-sec unknown
  6974. 93.174.93.84 123 tcp ntp filtered
  6975. 93.174.93.84 123 udp ntp filtered
  6976. 93.174.93.84 137 tcp netbios-ns filtered
  6977. 93.174.93.84 137 udp netbios-ns unknown
  6978. 93.174.93.84 138 tcp netbios-dgm filtered
  6979. 93.174.93.84 138 udp netbios-dgm filtered
  6980. 93.174.93.84 139 tcp netbios-ssn filtered
  6981. 93.174.93.84 139 udp netbios-ssn filtered
  6982. 93.174.93.84 161 tcp snmp filtered
  6983. 93.174.93.84 161 udp snmp unknown
  6984. 93.174.93.84 162 tcp snmptrap filtered
  6985. 93.174.93.84 162 udp snmptrap filtered
  6986. 93.174.93.84 389 tcp ldap filtered
  6987. 93.174.93.84 389 udp ldap unknown
  6988. 93.174.93.84 520 tcp efs filtered
  6989. 93.174.93.84 520 udp route unknown
  6990. 93.174.93.84 2049 tcp nfs filtered
  6991. 93.174.93.84 2049 udp nfs unknown
  6992. 93.174.93.84 3030 tcp http-proxy open tinyproxy 1.8.3
  6993. 94.140.114.104 22 tcp ssh open OpenSSH 7.4 protocol 2.0
  6994. 94.140.114.104 53 tcp domain closed
  6995. 94.140.114.104 53 udp domain closed
  6996. 94.140.114.104 67 tcp dhcps closed
  6997. 94.140.114.104 67 udp dhcps unknown
  6998. 94.140.114.104 68 tcp dhcpc closed
  6999. 94.140.114.104 68 udp dhcpc unknown
  7000. 94.140.114.104 69 tcp tftp closed
  7001. 94.140.114.104 69 udp tftp closed
  7002. 94.140.114.104 80 tcp http open nginx 1.16.1
  7003. 94.140.114.104 88 tcp kerberos-sec closed
  7004. 94.140.114.104 88 udp kerberos-sec closed
  7005. 94.140.114.104 111 tcp rpcbind open 2-4 RPC #100000
  7006. 94.140.114.104 123 tcp ntp closed
  7007. 94.140.114.104 123 udp ntp unknown
  7008. 94.140.114.104 135 tcp msrpc filtered
  7009. 94.140.114.104 137 tcp netbios-ns filtered
  7010. 94.140.114.104 137 udp netbios-ns unknown
  7011. 94.140.114.104 138 tcp netbios-dgm filtered
  7012. 94.140.114.104 138 udp netbios-dgm unknown
  7013. 94.140.114.104 139 tcp netbios-ssn closed
  7014. 94.140.114.104 139 udp netbios-ssn closed
  7015. 94.140.114.104 161 tcp snmp closed
  7016. 94.140.114.104 161 udp snmp closed
  7017. 94.140.114.104 162 tcp snmptrap closed
  7018. 94.140.114.104 162 udp snmptrap unknown
  7019. 94.140.114.104 389 tcp ldap closed
  7020. 94.140.114.104 389 udp ldap unknown
  7021. 94.140.114.104 520 tcp efs closed
  7022. 94.140.114.104 520 udp route closed
  7023. 94.140.114.104 2049 tcp nfs closed
  7024. 94.140.114.104 2049 udp nfs unknown
  7025. 104.87.36.73 53 tcp domain filtered
  7026. 104.87.36.73 53 udp domain unknown
  7027. 104.87.36.73 67 tcp dhcps filtered
  7028. 104.87.36.73 67 udp dhcps unknown
  7029. 104.87.36.73 68 tcp dhcpc filtered
  7030. 104.87.36.73 68 udp dhcpc unknown
  7031. 104.87.36.73 69 tcp tftp filtered
  7032. 104.87.36.73 69 udp tftp unknown
  7033. 104.87.36.73 88 tcp kerberos-sec filtered
  7034. 104.87.36.73 88 udp kerberos-sec unknown
  7035. 104.87.36.73 123 tcp ntp filtered
  7036. 104.87.36.73 123 udp ntp unknown
  7037. 104.87.36.73 137 tcp netbios-ns filtered
  7038. 104.87.36.73 137 udp netbios-ns unknown
  7039. 104.87.36.73 138 tcp netbios-dgm filtered
  7040. 104.87.36.73 138 udp netbios-dgm unknown
  7041. 104.87.36.73 139 tcp netbios-ssn filtered
  7042. 104.87.36.73 139 udp netbios-ssn unknown
  7043. 104.87.36.73 161 tcp snmp filtered
  7044. 104.87.36.73 161 udp snmp unknown
  7045. 104.87.36.73 162 tcp snmptrap filtered
  7046. 104.87.36.73 162 udp snmptrap unknown
  7047. 104.87.36.73 389 tcp ldap filtered
  7048. 104.87.36.73 389 udp ldap unknown
  7049. 104.87.36.73 520 tcp efs filtered
  7050. 104.87.36.73 520 udp route unknown
  7051. 104.87.36.73 2049 tcp nfs filtered
  7052. 104.87.36.73 2049 udp nfs unknown
  7053. 201.148.104.59 21 tcp ftp open The firewall on this server is blocking your connection. You need to contact the server owner or hosting provider for further information. Your blocked IP address is: 190.105.229.22 This server's hostname is: hcenter10459.dedicados.cl \x0d\x0a
  7054. 201.148.104.59 53 tcp domain filtered
  7055. 201.148.104.59 53 udp domain unknown
  7056. 201.148.104.59 67 tcp dhcps filtered
  7057. 201.148.104.59 67 udp dhcps unknown
  7058. 201.148.104.59 68 tcp dhcpc filtered
  7059. 201.148.104.59 68 udp dhcpc unknown
  7060. 201.148.104.59 69 tcp tftp filtered
  7061. 201.148.104.59 69 udp tftp unknown
  7062. 201.148.104.59 88 tcp kerberos-sec filtered
  7063. 201.148.104.59 88 udp kerberos-sec unknown
  7064. 201.148.104.59 123 tcp ntp filtered
  7065. 201.148.104.59 123 udp ntp unknown
  7066. 201.148.104.59 137 tcp netbios-ns filtered
  7067. 201.148.104.59 137 udp netbios-ns unknown
  7068. 201.148.104.59 138 tcp netbios-dgm filtered
  7069. 201.148.104.59 138 udp netbios-dgm unknown
  7070. 201.148.104.59 139 tcp netbios-ssn filtered
  7071. 201.148.104.59 139 udp netbios-ssn unknown
  7072. 201.148.104.59 161 tcp snmp filtered
  7073. 201.148.104.59 161 udp snmp unknown
  7074. 201.148.104.59 162 tcp snmptrap filtered
  7075. 201.148.104.59 162 udp snmptrap unknown
  7076. 201.148.104.59 389 tcp ldap filtered
  7077. 201.148.104.59 389 udp ldap unknown
  7078. 201.148.104.59 520 tcp efs filtered
  7079. 201.148.104.59 520 udp route unknown
  7080. 201.148.104.59 2049 tcp nfs filtered
  7081. 201.148.104.59 2049 udp nfs unknown
  7082. 217.148.69.93 53 tcp domain filtered
  7083. 217.148.69.93 53 udp domain unknown
  7084. 217.148.69.93 67 tcp dhcps filtered
  7085. 217.148.69.93 67 udp dhcps unknown
  7086. 217.148.69.93 68 tcp dhcpc filtered
  7087. 217.148.69.93 68 udp dhcpc unknown
  7088. 217.148.69.93 69 tcp tftp filtered
  7089. 217.148.69.93 69 udp tftp unknown
  7090. 217.148.69.93 88 tcp kerberos-sec filtered
  7091. 217.148.69.93 88 udp kerberos-sec unknown
  7092. 217.148.69.93 123 tcp ntp filtered
  7093. 217.148.69.93 123 udp ntp unknown
  7094. 217.148.69.93 137 tcp netbios-ns filtered
  7095. 217.148.69.93 137 udp netbios-ns unknown
  7096. 217.148.69.93 138 tcp netbios-dgm filtered
  7097. 217.148.69.93 138 udp netbios-dgm unknown
  7098. 217.148.69.93 139 tcp netbios-ssn filtered
  7099. 217.148.69.93 139 udp netbios-ssn unknown
  7100. 217.148.69.93 161 tcp snmp filtered
  7101. 217.148.69.93 161 udp snmp unknown
  7102. 217.148.69.93 162 tcp snmptrap filtered
  7103. 217.148.69.93 162 udp snmptrap unknown
  7104. 217.148.69.93 389 tcp ldap filtered
  7105. 217.148.69.93 389 udp ldap unknown
  7106. 217.148.69.93 520 tcp efs filtered
  7107. 217.148.69.93 520 udp route unknown
  7108. 217.148.69.93 2049 tcp nfs filtered
  7109. 217.148.69.93 2049 udp nfs unknown
  7110. 217.148.69.235 53 tcp domain filtered
  7111. 217.148.69.235 53 udp domain unknown
  7112. 217.148.69.235 67 tcp dhcps filtered
  7113. 217.148.69.235 67 udp dhcps unknown
  7114. 217.148.69.235 68 tcp dhcpc filtered
  7115. 217.148.69.235 68 udp dhcpc unknown
  7116. 217.148.69.235 69 tcp tftp filtered
  7117. 217.148.69.235 69 udp tftp unknown
  7118. 217.148.69.235 88 tcp kerberos-sec filtered
  7119. 217.148.69.235 88 udp kerberos-sec unknown
  7120. 217.148.69.235 123 tcp ntp filtered
  7121. 217.148.69.235 123 udp ntp unknown
  7122. 217.148.69.235 137 tcp netbios-ns filtered
  7123. 217.148.69.235 137 udp netbios-ns unknown
  7124. 217.148.69.235 138 tcp netbios-dgm filtered
  7125. 217.148.69.235 138 udp netbios-dgm unknown
  7126. 217.148.69.235 139 tcp netbios-ssn filtered
  7127. 217.148.69.235 139 udp netbios-ssn unknown
  7128. 217.148.69.235 161 tcp snmp filtered
  7129. 217.148.69.235 161 udp snmp unknown
  7130. 217.148.69.235 162 tcp snmptrap filtered
  7131. 217.148.69.235 162 udp snmptrap unknown
  7132. 217.148.69.235 389 tcp ldap filtered
  7133. 217.148.69.235 389 udp ldap unknown
  7134. 217.148.69.235 520 tcp efs filtered
  7135. 217.148.69.235 520 udp route unknown
  7136. 217.148.69.235 2049 tcp nfs filtered
  7137. 217.148.69.235 2049 udp nfs unknown
  7138. 217.148.71.93 53 tcp domain filtered
  7139. 217.148.71.93 53 udp domain unknown
  7140. 217.148.71.93 67 tcp dhcps filtered
  7141. 217.148.71.93 67 udp dhcps unknown
  7142. 217.148.71.93 68 tcp dhcpc filtered
  7143. 217.148.71.93 68 udp dhcpc unknown
  7144. 217.148.71.93 69 tcp tftp filtered
  7145. 217.148.71.93 69 udp tftp unknown
  7146. 217.148.71.93 88 tcp kerberos-sec filtered
  7147. 217.148.71.93 88 udp kerberos-sec unknown
  7148. 217.148.71.93 123 tcp ntp filtered
  7149. 217.148.71.93 123 udp ntp unknown
  7150. 217.148.71.93 137 tcp netbios-ns filtered
  7151. 217.148.71.93 137 udp netbios-ns unknown
  7152. 217.148.71.93 138 tcp netbios-dgm filtered
  7153. 217.148.71.93 138 udp netbios-dgm unknown
  7154. 217.148.71.93 139 tcp netbios-ssn filtered
  7155. 217.148.71.93 139 udp netbios-ssn unknown
  7156. 217.148.71.93 161 tcp snmp filtered
  7157. 217.148.71.93 161 udp snmp unknown
  7158. 217.148.71.93 162 tcp snmptrap filtered
  7159. 217.148.71.93 162 udp snmptrap unknown
  7160. 217.148.71.93 389 tcp ldap filtered
  7161. 217.148.71.93 389 udp ldap unknown
  7162. 217.148.71.93 520 tcp efs filtered
  7163. 217.148.71.93 520 udp route unknown
  7164. 217.148.71.93 2049 tcp nfs filtered
  7165. 217.148.71.93 2049 udp nfs unknown
  7166. 217.148.71.235 53 tcp domain filtered
  7167. 217.148.71.235 53 udp domain unknown
  7168. 217.148.71.235 67 tcp dhcps filtered
  7169. 217.148.71.235 67 udp dhcps unknown
  7170. 217.148.71.235 68 tcp dhcpc filtered
  7171. 217.148.71.235 68 udp dhcpc unknown
  7172. 217.148.71.235 69 tcp tftp filtered
  7173. 217.148.71.235 69 udp tftp unknown
  7174. 217.148.71.235 88 tcp kerberos-sec filtered
  7175. 217.148.71.235 88 udp kerberos-sec unknown
  7176. 217.148.71.235 123 tcp ntp filtered
  7177. 217.148.71.235 123 udp ntp unknown
  7178. 217.148.71.235 137 tcp netbios-ns filtered
  7179. 217.148.71.235 137 udp netbios-ns unknown
  7180. 217.148.71.235 138 tcp netbios-dgm filtered
  7181. 217.148.71.235 138 udp netbios-dgm unknown
  7182. 217.148.71.235 139 tcp netbios-ssn filtered
  7183. 217.148.71.235 139 udp netbios-ssn unknown
  7184. 217.148.71.235 161 tcp snmp filtered
  7185. 217.148.71.235 161 udp snmp unknown
  7186. 217.148.71.235 162 tcp snmptrap filtered
  7187. 217.148.71.235 162 udp snmptrap unknown
  7188. 217.148.71.235 389 tcp ldap filtered
  7189. 217.148.71.235 389 udp ldap unknown
  7190. 217.148.71.235 520 tcp efs filtered
  7191. 217.148.71.235 520 udp route unknown
  7192. 217.148.71.235 2049 tcp nfs filtered
  7193. 217.148.71.235 2049 udp nfs unknown
  7194. ##############################################################################################################################
  7195. Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-31 00:32 EDT
  7196. NSE: Loaded 151 scripts for scanning.
  7197. NSE: Script Pre-scanning.
  7198. Initiating NSE at 00:32
  7199. Completed NSE at 00:32, 0.00s elapsed
  7200. Initiating NSE at 00:32
  7201. Completed NSE at 00:32, 0.00s elapsed
  7202. Initiating NSE at 00:32
  7203. Completed NSE at 00:32, 0.00s elapsed
  7204. Initiating Ping Scan at 00:32
  7205. Scanning 80.169.89.102 [4 ports]
  7206. Completed Ping Scan at 00:32, 0.15s elapsed (1 total hosts)
  7207. Initiating Parallel DNS resolution of 1 host. at 00:32
  7208. Completed Parallel DNS resolution of 1 host. at 00:32, 0.03s elapsed
  7209. Initiating SYN Stealth Scan at 00:32
  7210. Scanning 80.169.89.102 [1000 ports]
  7211. Discovered open port 80/tcp on 80.169.89.102
  7212. Discovered open port 443/tcp on 80.169.89.102
  7213. Completed SYN Stealth Scan at 00:32, 8.41s elapsed (1000 total ports)
  7214. Initiating Service scan at 00:32
  7215. Scanning 2 services on 80.169.89.102
  7216. Completed Service scan at 00:34, 127.59s elapsed (2 services on 1 host)
  7217. Initiating OS detection (try #1) against 80.169.89.102
  7218. Retrying OS detection (try #2) against 80.169.89.102
  7219. Initiating Traceroute at 00:34
  7220. Completed Traceroute at 00:34, 0.59s elapsed
  7221. Initiating Parallel DNS resolution of 9 hosts. at 00:34
  7222. Completed Parallel DNS resolution of 9 hosts. at 00:34, 0.17s elapsed
  7223. NSE: Script scanning 80.169.89.102.
  7224. Initiating NSE at 00:34
  7225. Completed NSE at 00:35, 17.45s elapsed
  7226. Initiating NSE at 00:35
  7227. Completed NSE at 00:35, 1.24s elapsed
  7228. Initiating NSE at 00:35
  7229. Completed NSE at 00:35, 0.00s elapsed
  7230. Nmap scan report for 80.169.89.102
  7231. Host is up (0.11s latency).
  7232. Not shown: 998 filtered ports
  7233. PORT STATE SERVICE VERSION
  7234. 80/tcp open http COL-VMW-M-LB02
  7235. | fingerprint-strings:
  7236. | FourOhFourRequest:
  7237. | HTTP/1.1 301 Moved Permanently
  7238. | Location: https:///nice%20ports%2C/Tri%6Eity.txt%2ebak
  7239. | Server: COL-VMW-M-LB02
  7240. | Cache-Control: no-cache
  7241. | Connection: close
  7242. | GenericLines:
  7243. | HTTP/1.1 301 Moved Permanently
  7244. | Location: https://
  7245. | Server: COL-VMW-M-LB02
  7246. | Cache-Control: no-cache
  7247. | Connection: close
  7248. | GetRequest, HTTPOptions, RTSPRequest:
  7249. | HTTP/1.1 301 Moved Permanently
  7250. | Location: https:///
  7251. | Server: COL-VMW-M-LB02
  7252. | Cache-Control: no-cache
  7253. | Connection: close
  7254. | SIPOptions:
  7255. | HTTP/1.1 301 Moved Permanently
  7256. | Location: https://sip:nm
  7257. | Server: COL-VMW-M-LB02
  7258. | Cache-Control: no-cache
  7259. |_ Connection: close
  7260. | http-methods:
  7261. |_ Supported Methods: GET HEAD POST OPTIONS
  7262. |_http-server-header: COL-VMW-M-LB02
  7263. |_http-title: Did not follow redirect to https://80.169.89.102/
  7264. |_https-redirect: ERROR: Script execution failed (use -d to debug)
  7265. 443/tcp open ssl/http Microsoft IIS httpd 7.5
  7266. | http-methods:
  7267. |_ Supported Methods: GET HEAD POST OPTIONS
  7268. |_http-server-header: Microsoft-IIS/7.5
  7269. | http-title: Welcome to the City of London Corporation
  7270. |_Requested resource was https://80.169.89.102/Pages/default.aspx
  7271. | ssl-cert: Subject: commonName=*.cityoflondon.gov.uk/organizationName=City of London Corporation/countryName=GB
  7272. | Subject Alternative Name: DNS:*.cityoflondon.gov.uk, DNS:cityoflondon.gov.uk
  7273. | Issuer: commonName=Entrust Certification Authority - L1K/organizationName=Entrust, Inc./countryName=US
  7274. | Public Key type: rsa
  7275. | Public Key bits: 2048
  7276. | Signature Algorithm: sha256WithRSAEncryption
  7277. | Not valid before: 2019-01-09T10:15:04
  7278. | Not valid after: 2021-01-09T10:45:03
  7279. | MD5: 4f24 791b 0cf7 72b6 48e0 faac 5dd4 3c66
  7280. |_SHA-1: 414c 9a2c e74f b30a 5c45 a40d 2288 a043 93d7 4d99
  7281. |_ssl-date: TLS randomness does not represent time
  7282. 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
  7283. SF-Port80-TCP:V=7.80%I=7%D=3/31%Time=5E82C7F0%P=x86_64-pc-linux-gnu%r(GetR
  7284. SF:equest,7B,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nLocation:\x20htt
  7285. SF:ps:///\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20no-cache\r\nCo
  7286. SF:nnection:\x20close\r\n\r\n")%r(HTTPOptions,7B,"HTTP/1\.1\x20301\x20Move
  7287. SF:d\x20Permanently\r\nLocation:\x20https:///\r\nServer:\x20COL-VMW-M-LB02
  7288. SF:\r\nCache-Control:\x20no-cache\r\nConnection:\x20close\r\n\r\n")%r(RTSP
  7289. SF:Request,7B,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nLocation:\x20ht
  7290. SF:tps:///\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20no-cache\r\nC
  7291. SF:onnection:\x20close\r\n\r\n")%r(FourOhFourRequest,9E,"HTTP/1\.1\x20301\
  7292. SF:x20Moved\x20Permanently\r\nLocation:\x20https:///nice%20ports%2C/Tri%6E
  7293. SF:ity\.txt%2ebak\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20no-cac
  7294. SF:he\r\nConnection:\x20close\r\n\r\n")%r(GenericLines,7A,"HTTP/1\.1\x2030
  7295. SF:1\x20Moved\x20Permanently\r\nLocation:\x20https://\r\nServer:\x20COL-VM
  7296. SF:W-M-LB02\r\nCache-Control:\x20no-cache\r\nConnection:\x20close\r\n\r\n"
  7297. SF:)%r(SIPOptions,80,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nLocation
  7298. SF::\x20https://sip:nm\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20n
  7299. SF:o-cache\r\nConnection:\x20close\r\n\r\n");
  7300. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  7301. Device type: general purpose|firewall|storage-misc
  7302. Running (JUST GUESSING): Linux 2.6.X|3.X (90%), WatchGuard Fireware 11.X (89%), Synology DiskStation Manager 5.X (88%)
  7303. OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3.10 cpe:/o:watchguard:fireware:11.8 cpe:/o:linux:linux_kernel cpe:/a:synology:diskstation_manager:5.1
  7304. Aggressive OS guesses: Linux 2.6.32 (90%), Linux 2.6.39 (90%), Linux 3.10 (89%), Linux 3.4 (89%), WatchGuard Fireware 11.8 (89%), Linux 3.1 - 3.2 (89%), Synology DiskStation Manager 5.1 (88%), Linux 2.6.32 or 3.10 (87%), Linux 2.6.32 - 2.6.39 (85%)
  7305. No exact OS matches for host (test conditions non-ideal).
  7306. Uptime guess: 0.184 days (since Mon Mar 30 20:10:16 2020)
  7307. Network Distance: 12 hops
  7308. TCP Sequence Prediction: Difficulty=261 (Good luck!)
  7309. IP ID Sequence Generation: All zeros
  7310. Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
  7311.  
  7312. TRACEROUTE (using port 443/tcp)
  7313. HOP RTT ADDRESS
  7314. 1 104.79 ms 10.203.9.1
  7315. 2 577.87 ms 45.131.5.2
  7316. 3 104.87 ms 109.236.95.230
  7317. 4 106.03 ms 109.236.95.106
  7318. 5 106.15 ms et-0-0-1-pr2.AMS.router.colt.net (80.249.208.236)
  7319. 6 115.49 ms 212.74.75.37
  7320. 7 115.46 ms 212.74.75.37
  7321. 8 111.26 ms cpeuk_lon002520.ia.colt.net (80.169.196.38)
  7322. 9 111.76 ms 195.110.81.4
  7323. 10 113.12 ms 195.110.81.4
  7324. 11 115.47 ms 195.110.81.4
  7325. 12 115.31 ms 80.169.89.102
  7326.  
  7327. NSE: Script Post-scanning.
  7328. Initiating NSE at 00:35
  7329. Completed NSE at 00:35, 0.00s elapsed
  7330. Initiating NSE at 00:35
  7331. Completed NSE at 00:35, 0.00s elapsed
  7332. Initiating NSE at 00:35
  7333. Completed NSE at 00:35, 0.00s elapsed
  7334. ###########################################################################################################################
  7335. Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-31 00:29 EDT
  7336. Nmap scan report for cityoflondon.gov.uk (80.169.89.102)
  7337. Host is up (0.11s latency).
  7338. Not shown: 998 filtered ports
  7339. PORT STATE SERVICE VERSION
  7340. 80/tcp open http COL-VMW-M-LB02
  7341. | fingerprint-strings:
  7342. | FourOhFourRequest:
  7343. | HTTP/1.1 301 Moved Permanently
  7344. | Location: https:///nice%20ports%2C/Tri%6Eity.txt%2ebak
  7345. | Server: COL-VMW-M-LB02
  7346. | Cache-Control: no-cache
  7347. | Connection: close
  7348. | GenericLines:
  7349. | HTTP/1.1 301 Moved Permanently
  7350. | Location: https://
  7351. | Server: COL-VMW-M-LB02
  7352. | Cache-Control: no-cache
  7353. | Connection: close
  7354. | GetRequest, HTTPOptions, RTSPRequest:
  7355. | HTTP/1.1 301 Moved Permanently
  7356. | Location: https:///
  7357. | Server: COL-VMW-M-LB02
  7358. | Cache-Control: no-cache
  7359. | Connection: close
  7360. | SIPOptions:
  7361. | HTTP/1.1 301 Moved Permanently
  7362. | Location: https://sip:nm
  7363. | Server: COL-VMW-M-LB02
  7364. | Cache-Control: no-cache
  7365. |_ Connection: close
  7366. |_http-server-header: COL-VMW-M-LB02
  7367. |_https-redirect: ERROR: Script execution failed (use -d to debug)
  7368. 443/tcp open ssl/http Microsoft IIS httpd 7.5
  7369. | http-server-header:
  7370. | COL-VMW-M-LB02
  7371. |_ Microsoft-IIS/7.5
  7372. | vulscan: VulDB - https://vuldb.com:
  7373. | [68404] Microsoft IIS 7.5 Error Message mypage cross site scripting
  7374. | [6924] Microsoft IIS 7.5 Log File Permission information disclosure
  7375. | [5623] Microsoft IIS up to 7.5 File Name Tilde privilege escalation
  7376. | [4234] Microsoft IIS 7.5 FTP Server Telnet IAC Character Heap-based denial of service
  7377. | [4179] Microsoft IIS 7.5 FastCGI Request Header memory corruption
  7378. | [98097] Microsoft IIS 7.0/7.5/8.0/8.5/10 /uncpath/ cross site scripting
  7379. | [6925] Microsoft IIS 7.0/7.5 FTP Command information disclosure
  7380. | [4484] Microsoft Windows Phone 7.5 SMS Service denial of service
  7381. |
  7382. | MITRE CVE - https://cve.mitre.org:
  7383. | [CVE-2012-2532] Microsoft FTP Service 7.0 and 7.5 for Internet Information Services (IIS) processes unspecified commands before TLS is enabled for a session, which allows remote attackers to obtain sensitive information by reading the replies to these commands, aka "FTP Command Injection Vulnerability."
  7384. | [CVE-2012-2531] Microsoft Internet Information Services (IIS) 7.5 uses weak permissions for the Operational log, which allows local users to discover credentials by reading this file, aka "Password Disclosure Vulnerability."
  7385. | [CVE-2010-3972] Heap-based buffer overflow in the TELNET_STREAM_CONTEXT::OnSendData function in ftpsvc.dll in Microsoft FTP Service 7.0 and 7.5 for Internet Information Services (IIS) 7.0, and IIS 7.5, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a crafted FTP command, aka "IIS FTP Service Heap Buffer Overrun Vulnerability." NOTE: some of these details are obtained from third party information.
  7386. | [CVE-2010-2730] Buffer overflow in Microsoft Internet Information Services (IIS) 7.5, when FastCGI is enabled, allows remote attackers to execute arbitrary code via crafted headers in a request, aka "Request Header Buffer Overflow Vulnerability."
  7387. | [CVE-2010-1899] Stack consumption vulnerability in the ASP implementation in Microsoft Internet Information Services (IIS) 5.1, 6.0, 7.0, and 7.5 allows remote attackers to cause a denial of service (daemon outage) via a crafted request, related to asp.dll, aka "IIS Repeated Parameter Request Denial of Service Vulnerability."
  7388. | [CVE-2010-1256] Unspecified vulnerability in Microsoft IIS 6.0, 7.0, and 7.5, when Extended Protection for Authentication is enabled, allows remote authenticated users to execute arbitrary code via unknown vectors related to "token checking" that trigger memory corruption, aka "IIS Authentication Memory Corruption Vulnerability."
  7389. | [CVE-2013-0941] EMC RSA Authentication API before 8.1 SP1, RSA Web Agent before 5.3.5 for Apache Web Server, RSA Web Agent before 5.3.5 for IIS, RSA PAM Agent before 7.0, and RSA Agent before 6.1.4 for Microsoft Windows use an improper encryption algorithm and a weak key for maintaining the stored data of the node secret for the SecurID Authentication API, which allows local users to obtain sensitive information via cryptographic attacks on this data.
  7390. | [CVE-2010-3229] The Secure Channel (aka SChannel) security package in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7, when IIS 7.x is used, does not properly process client certificates during SSL and TLS handshakes, which allows remote attackers to cause a denial of service (LSASS outage and reboot) via a crafted packet, aka "TLSv1 Denial of Service Vulnerability."
  7391. | [CVE-2010-1886] Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 SP2 and R2, and Windows 7 allow local users to gain privileges by leveraging access to a process with NetworkService credentials, as demonstrated by TAPI Server, SQL Server, and IIS processes, and related to the Windows Service Isolation feature. NOTE: the vendor states that privilege escalation from NetworkService to LocalSystem does not cross a "security boundary."
  7392. | [CVE-2009-3555] The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
  7393. | [CVE-2009-2521] Stack consumption vulnerability in the FTP Service in Microsoft Internet Information Services (IIS) 5.0 through 7.0 allows remote authenticated users to cause a denial of service (daemon crash) via a list (ls) -R command containing a wildcard that references a subdirectory, followed by a .. (dot dot), aka "IIS FTP Service DoS Vulnerability."
  7394. | [CVE-2009-1536] ASP.NET in Microsoft .NET Framework 2.0 SP1 and SP2 and 3.5 Gold and SP1, when ASP 2.0 is used in integrated mode on IIS 7.0, does not properly manage request scheduling, which allows remote attackers to cause a denial of service (daemon outage) via a series of crafted HTTP requests, aka "Remote Unauthenticated Denial of Service in ASP.NET Vulnerability."
  7395. | [CVE-2008-1446] Integer overflow in the Internet Printing Protocol (IPP) ISAPI extension in Microsoft Internet Information Services (IIS) 5.0 through 7.0 on Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, and Server 2008 allows remote authenticated users to execute arbitrary code via an HTTP POST request that triggers an outbound IPP connection from a web server to a machine operated by the attacker, aka "Integer Overflow in IPP Service Vulnerability."
  7396. | [CVE-2008-0074] Unspecified vulnerability in Microsoft Internet Information Services (IIS) 5.0 through 7.0 allows local users to gain privileges via unknown vectors related to file change notifications in the TPRoot, NNTPFile\Root, or WWWRoot folders.
  7397. | [CVE-2007-2931] Heap-based buffer overflow in Microsoft MSN Messenger 6.2, 7.0, and 7.5, and Live Messenger 8.0 allows user-assisted remote attackers to execute arbitrary code via unspecified vectors involving video conversation handling in Web Cam and video chat sessions.
  7398. | [CVE-2007-1278] Unspecified vulnerability in the IIS connector in Adobe JRun 4.0 Updater 6, and ColdFusion MX 6.1 and 7.0 Enterprise, when using Microsoft IIS 6, allows remote attackers to cause a denial of service via unspecified vectors, involving the request of a file in the JRun web root.
  7399. | [CVE-2006-5858] Adobe ColdFusion MX 7 through 7.0.2, and JRun 4, when run on Microsoft IIS, allows remote attackers to read arbitrary files, list directories, or read source code via a double URL-encoded NULL byte in a ColdFusion filename, such as a CFM file.
  7400. | [CVE-2006-5028] Directory traversal vulnerability in filemanager/filemanager.php in SWsoft Plesk 7.5 Reload and Plesk 7.6 for Microsoft Windows allows remote attackers to list arbitrary directories via a ../ (dot dot slash) in the file parameter in a chdir action.
  7401. | [CVE-2006-0363] The "Remember my Password" feature in MSN Messenger 7.5 stores passwords in an encrypted format under the HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Creds registry key, which might allow local users to obtain the original passwords via a program that calls CryptUnprotectData, as demonstrated by the "MSN Password Recovery.exe" program. NOTE: it could be argued that local-only password recovery is inherently insecure because the decryption methods and keys must be stored somewhere on the local system, and are thus inherently accessible with varying degrees of effort. Perhaps this issue should not be included in CVE.
  7402. |
  7403. | SecurityFocus - https://www.securityfocus.com/bid/:
  7404. | [55569] Microsoft Windows Phone 7 SSL Certificate 'Common Name' Validation Security Bypass Vulnerability
  7405. | [28820] Microsoft Works 7 'WkImgSrv.dll' ActiveX Control Remote Code Execution Vulnerability
  7406. | [28498] Microsoft Internet Explorer 7 Popup Window Address Bar URI Spoofing Vulnerability
  7407. | [24483] Microsoft Internet Explorer 7 HTTP Authentication International Domain Name Spoofing Weakness
  7408. | [20728] Microsoft Internet Explorer 7 Popup Window Address Bar Spoofing Weakness
  7409. | [18736] Microsoft Internet Explorer 7 Denial of Service Vulnerability
  7410. | [5877] Microsoft SQL Server 7.0/2000 DBCC Buffer Overflow Vulnerability
  7411. | [4108] Microsoft Visual C++ 7/Visual C++.Net Buffer Overflow Protection Weakness
  7412. | [1714] Microsoft Windows Media Player 7 Embedded OCX Control Vulnerability
  7413. | [1444] Microsoft SQL Server 7.0 Stored Procedure Vulnerability
  7414. | [1281] Microsoft SQL Server 7.0 System Administrator Password Disclosure Vulnerability
  7415. | [817] Microsoft SQL Server 7.0 NULL Data DoS Vulnerability
  7416. | [90065] Microsoft Windows Kernel 'Win32k.sys' CVE-2016-0174 Local Privilege Escalation Vulnerability
  7417. | [86059] Microsoft IIS CVE-1999-0561 Remote Security Vulnerability
  7418. | [56440] Microsoft IIS FTP Service CVE-2012-2532 Remote Command Injection Vulnerability
  7419. | [56439] Microsoft IIS CVE-2012-2531 Password Information Disclosure Vulnerability
  7420. | [54276] Microsoft IIS Multiple FTP Command Request Denial of Service Vulnerability
  7421. | [54251] Microsoft IIS File Enumeration Weakness
  7422. | [53906] Microsoft IIS Authentication Bypass and Source Code Disclosure Vulnerabilities
  7423. | [45542] Microsoft IIS FTP Service Remote Buffer Overflow Vulnerability
  7424. | [43140] Microsoft IIS Repeated Parameter Request Denial of Service Vulnerability
  7425. | [43138] Microsoft IIS Request Header Buffer Overflow Vulnerability
  7426. | [41314] Microsoft IIS 5.1 Alternate Data Stream Authentication Bypass Vulnerability
  7427. | [40573] Microsoft IIS Authentication Remote Code Execution Vulnerability
  7428. | [37460] RETIRED: Microsoft IIS Malformed Local Filename Security Bypass Vulnerability
  7429. | [36276] RETIRED: Microsoft IIS FTPd Globbing Functionality Remote Denial of Service Vulnerability
  7430. | [36273] Microsoft IIS FTPd Globbing Functionality Remote Denial of Service Vulnerability
  7431. | [36189] Microsoft IIS FTPd NLST Remote Buffer Overflow Vulnerability
  7432. | [35232] Microsoft IIS 5.0 WebDAV Authentication Bypass Vulnerability
  7433. | [34993] Microsoft IIS Unicode Requests to WebDAV Multiple Authentication Bypass Vulnerabilities
  7434. | [33374] Microsoft IIS HTTP TRACK Method Information Disclosure Vulnerability
  7435. | [27101] Microsoft IIS File Change Notification Local Privilege Escalation Vulnerability
  7436. | [21865] Apache And Microsoft IIS Range Denial of Service Vulnerability
  7437. | [18858] Microsoft IIS ASP Remote Code Execution Vulnerability
  7438. | [14764] Microsoft IIS WebDAV HTTP Request Source Code Disclosure Vulnerability
  7439. | [10706] Microsoft IIS 4 Redirect Remote Buffer Overflow Vulnerability
  7440. | [9660] Microsoft IIS Unspecified Remote Denial Of Service Vulnerability
  7441. | [9313] Microsoft IIS Failure To Log Undocumented TRACK Requests Vulnerability
  7442. | [8244] Microsoft Multiple IIS 6.0 Web Admin Vulnerabilities
  7443. | [8092] Microsoft IIS _VTI_BOT Malicious WebBot Elevated Permissions Vulnerability
  7444. | [8035] Microsoft Windows Media Services NSIISlog.DLL Remote Buffer Overflow Vulnerability
  7445. | [7735] Microsoft IIS WebDAV PROPFIND and SEARCH Method Denial of Service Vulnerability
  7446. | [7734] Microsoft IIS SSINC.DLL Server Side Includes Buffer Overflow Vulnerability
  7447. | [7733] Microsoft IIS ASP Header Denial Of Service Vulnerability
  7448. | [7731] Microsoft IIS Redirection Error Page Cross-Site Scripting Vulnerability
  7449. | [7492] Microsoft IIS User Existence Disclosure Vulnerability
  7450. | [6795] Microsoft IIS False Logging Weakness
  7451. | [6789] Microsoft IIS Malformed HTTP Get Request Denial Of Service Vulnerability
  7452. | [6072] Microsoft IIS Administrative Pages Cross Site Scripting Vulnerabilities
  7453. | [6071] Microsoft IIS Script Source Access File Upload Vulnerability
  7454. | [6070] Microsoft IIS WebDAV Denial Of Service Vulnerability
  7455. | [6069] Microsoft IIS Out Of Process Privilege Escalation Vulnerability
  7456. | [6068] Multiple Microsoft IIS Vulnerabilities
  7457. | [5907] Microsoft IIS Malformed HTTP HOST Header Field Denial Of Service Vulnerability
  7458. | [5900] Microsoft IIS IDC Extension Cross Site Scripting Vulnerability
  7459. | [5213] Microsoft IIS SMTP Service Encapsulated SMTP Address Vulnerability
  7460. | [4855] Microsoft IIS HTR Chunked Encoding Transfer Heap Overflow Vulnerability
  7461. | [4846] Microsoft IIS 5.0 Denial Of Service Vulnerability
  7462. | [4543] Microsoft IIS CodeBrws.ASP File Extension Check Out By One Vulnerability
  7463. | [4525] Microsoft IIS CodeBrws.ASP Source Code Disclosure Vulnerability
  7464. | [4490] Microsoft IIS Chunked Encoding Heap Overflow Variant Vulnerability
  7465. | [4487] Microsoft IIS HTTP Redirect Cross Site Scripting Vulnerability
  7466. | [4486] Microsoft IIS HTTP Error Page Cross Site Scripting Vulnerability
  7467. | [4485] Microsoft IIS Chunked Encoding Transfer Heap Overflow Vulnerability
  7468. | [4483] Microsoft IIS Help File Search Cross Site Scripting Vulnerability
  7469. | [4482] Microsoft IIS FTP Connection Status Request Denial of Service Vulnerability
  7470. | [4479] Microsoft IIS ISAPI Filter Access Violation Denial of Service Vulnerability
  7471. | [4478] Microsoft IIS ASP Server-Side Include Buffer Overflow Vulnerability
  7472. | [4476] Microsoft IIS HTTP Header Field Delimiter Buffer Overflow Vulnerability
  7473. | [4474] Microsoft IIS HTR ISAPI Extension Buffer Overflow Vulnerability
  7474. | [4235] Microsoft IIS Authentication Method Disclosure Vulnerability
  7475. | [4084] Microsoft IIS 5.1 Frontpage Server Extensions File Source Disclosure Vulnerability
  7476. | [4078] Microsoft IIS 5.1 Frontpage Extensions Path Disclosure Information Vulnerability
  7477. | [3667] Microsoft IIS False Content-Length Field DoS Vulnerability
  7478. | [3195] Microsoft IIS MIME Header Denial of Service Vulnerability
  7479. | [3194] Microsoft IIS WebDAV Invalid Request Denial of Service Vulnerability
  7480. | [3193] Microsoft IIS 5.0 In-Process Table Privelege Elevation Vulnerability
  7481. | [3191] Microsoft IIS 4.0 URL Redirection DoS Vulnerability
  7482. | [3190] Microsoft IIS SSI Buffer Overrun Privelege Elevation Vulnerability
  7483. | [2977] Microsoft IIS Device File Remote DoS Vulnerability
  7484. | [2973] Microsoft IIS Device File Local DoS Vulnerability
  7485. | [2909] Microsoft IIS Unicode .asp Source Code Disclosure Vulnerability
  7486. | [2719] Microsoft IIS Various Domain User Account Access Vulnerability
  7487. | [2717] Microsoft IIS FTP Denial of Service Vulnerability
  7488. | [2690] Microsoft IIS WebDAV 'Propfind' Server Restart Vulnerability
  7489. | [2674] Microsoft IIS 5.0 .printer ISAPI Extension Buffer Overflow Vulnerability
  7490. | [2654] Microsoft IIS Long URL Denial of Service Vulnerability
  7491. | [2483] Microsoft IIS WebDAV 'Search' Denial of Service Vulnerability
  7492. | [2453] Microsoft IIS WebDAV Denial of Service Vulnerability
  7493. | [2441] Microsoft Exchange 2000 / IIS 5.0 Multiple Invalid URL Request DoS Vulnerability
  7494. | [2440] Microsoft IIS Multiple Invalid URL Request DoS Vulnerability
  7495. | [2313] Microsoft IIS File Fragment Disclosure Vulnerability
  7496. | [2280] Microsoft IIS 3.0/4.0 Upgrade BDIR.HTR Vulnerability
  7497. | [2218] Microsoft IIS '../..' Denial of Service Vulnerability
  7498. | [2144] Microsoft IIS Front Page Server Extension DoS Vulnerability
  7499. | [2110] Microsoft IIS 4.0 IISADMPWD Proxied Password Attack
  7500. | [2100] Microsoft IIS Far East Edition DBCS File Disclosure Vulnerability
  7501. | [2074] Microsoft IIS Appended Dot Script Source Disclosure Vulnerability
  7502. | [1912] Microsoft IIS Executable File Parsing Vulnerability
  7503. | [1911] Microsoft IIS 4.0 ISAPI Buffer Overflow Vulnerability
  7504. | [1832] Microsoft IIS 4.0/5.0 Session ID Cookie Disclosure Vulnerability
  7505. | [1819] Microsoft IIS 4.0 Pickup Directory DoS Vulnerability
  7506. | [1818] Microsoft IIS 3.0 newdsn.exe File Creation Vulnerability
  7507. | [1814] Microsoft IIS 3.0 %2e ASP Source Disclosure Vulnerability
  7508. | [1811] Microsoft Site Server 2.0 with IIS 4.0 Malicious File Upload Vulnerability
  7509. | [1806] Microsoft IIS and PWS Extended Unicode Directory Traversal Vulnerability
  7510. | [1756] Microsoft IIS 5.0 Indexed Directory Disclosure Vulnerability
  7511. | [1642] Microsoft NT 4.0 and IIS 4.0 Invalid URL Request DoS Vulnerability
  7512. | [1595] Microsoft IIS Cross Site Scripting .shtml Vulnerability
  7513. | [1594] Microsoft FrontPage/IIS Cross Site Scripting shtml.dll Vulnerability
  7514. | [1578] Microsoft IIS 5.0 Translate: f Source Disclosure Vulnerability
  7515. | [1565] Microsoft IIS 4.0/5.0 File Permission Canonicalization Vulnerability
  7516. | [1499] Microsoft IIS Internal IP Address Disclosure Vulnerability
  7517. | [1488] Microsoft IIS 4.0/5.0 Source Fragment Disclosure Vulnerability
  7518. | [1476] Microsoft IIS 3.0 .htr Missing Variable Denial of Service Vulnerability
  7519. | [1193] Microsoft IIS 4.0/5.0 Malformed Filename Request Vulnerability
  7520. | [1191] Microsoft IIS 4.0/5.0 Malformed .htr Request Vulnerability
  7521. | [1190] Microsoft IIS 4.0/5.0 Malformed File Extension DoS Vulnerability
  7522. | [1101] Microsoft IIS 4.0/5.0 Escaped Characters Vulnerability
  7523. | [1081] Microsoft IIS UNC Mapped Virtual Host Vulnerability
  7524. | [1066] Microsoft IIS 4.0 Chunked Transfer Encoding Buffer Overflow Vulnerability
  7525. | [1065] Microsoft IIS UNC Path Disclosure Vulnerability
  7526. | [886] Microsoft IIS Escape Character Parsing Vulnerability
  7527. | [882] Microsoft IIS Virtual Directory Naming Vulnerability
  7528. | [658] Microsoft IIS FTP NO ACCESS Read/Delete File Vulnerability
  7529. | [657] Microsoft IIS 4.0 Domain Resolution Vulnerability
  7530. | [582] Microsoft IIS And PWS 8.3 Directory Name Vulnerability
  7531. | [190] Microsoft VisualInterDev 6.0 - IIS4- Management With No Authentication Vulnerability
  7532. |
  7533. | IBM X-Force - https://exchange.xforce.ibmcloud.com:
  7534. | [78620] Microsoft Windows Phone 7 domain name spoofing
  7535. | [66401] Microsoft Windows kernel-mode driver (win32k.sys) variant 7 privilege escalation
  7536. | [29670] Microsoft Internet Explorer 7 is installed
  7537. | [76716] Microsoft IIS FTP denial of service
  7538. | [76664] Microsoft IIS tilde information disclosure
  7539. | [61513] Microsoft Internet Information Services (IIS) URL authentication bypass
  7540. | [58864] Microsoft Internet Information Services (IIS) authentication code execution
  7541. | [55031] Microsoft Internet Information Services (IIS) filenames security bypass
  7542. | [53034] Microsoft Internet Information Services (IIS) directory listings denial of service
  7543. | [52915] Microsoft Internet Information Services (IIS) FTP buffer overflow
  7544. | [52243] Microsoft IIS With .NET Path Disclosure
  7545. | [52241] Microsoft IIS servervariables_vbscript.asp Information Disclosure
  7546. | [52240] Microsoft IIS Sample Application Physical Path Disclosure
  7547. | [52233] Microsoft IIS With .NET Path Disclosure
  7548. | [50573] Microsoft Internet Information Services (IIS) WebDAV security bypass
  7549. | [45584] Microsoft IIS adsiis.dll ActiveX control denial of service
  7550. | [42899] Microsoft IIS HTTP request smuggling
  7551. | [39235] Microsoft IIS root folders file change notification privilege escalation
  7552. | [39230] Microsoft IIS HTML encoded ASP code execution
  7553. | [34434] Microsoft IIS Hit-highlighting security bypass
  7554. | [34418] Microsoft Internet Information Server (IIS) AUX/.aspx denial of service
  7555. | [32074] Microsoft IIS iissamples directory present
  7556. | [31644] Microsoft IIS Web server access.cnf file detected
  7557. | [31642] Microsoft IIS Web server service.cnf file detected
  7558. | [31638] Microsoft IIS Web server svcacl.cnf file detected
  7559. | [31630] Microsoft Internet Information Services IISAdmin directory detected
  7560. | [27854] Microsoft IIS ASP cache virtual server information disclosure
  7561. | [26796] Microsoft Internet Information Services (IIS) ASP buffer overflow
  7562. | [16872] Microsoft Internet Information Server (IIS) ActivePerl command execution
  7563. | [16656] Microsoft Internet Information Server (IIS) MS04-021 patch is not installed
  7564. | [16578] Microsoft Internet Information Server (IIS) redirect buffer overflow
  7565. | [14077] Microsoft Internet Information Server (IIS) fails to properly log HTTP TRACK requests
  7566. | [13116] Microsoft IIS MS03-018 patch is not installed on the system
  7567. | [13088] Microsoft IIS running RealSecure Server Sensor ISAPI plug-in denial of service
  7568. | [12687] Microsoft IIS Remote Administration Tool allows attacker to reset administrative password
  7569. | [12686] Microsoft IIS Remote Administration Tool could allow an attacker to obtain valid session IDs
  7570. | [12652] Microsoft Windows 2000 and NT 4.0 Server IIS ISAPI nsiislog.dll extension POST request buffer overflow
  7571. | [12100] Microsoft IIS long WebDAV requests containing XML denial of service
  7572. | [12099] Microsoft IIS Response.AddHeader denial of service
  7573. | [12098] Microsoft IIS Server-Side Include (SSI) long file name buffer overflow
  7574. | [12097] Microsoft IIS redirect error cross-site scripting
  7575. | [12092] Microsoft Windows 2000 and NT 4.0 Server IIS ISAPI nsiislog.dll extension buffer overflow
  7576. | [11918] Microsoft IIS authentication mechanism could allow an attacker to determine valid user account names
  7577. | [11537] Microsoft IIS WebDAV service is running on the system
  7578. | [11533] Microsoft IIS WebDAV long request buffer overflow
  7579. | [10590] Microsoft Internet Information Server (IIS) MS02-062 patch
  7580. | [10504] Microsoft IIS script source access could be bypassed to upload .COM files
  7581. | [10503] Microsoft IIS WebDAV memory allocation denial of service
  7582. | [10502] Microsoft IIS out-of-process applications could be used to gain elevated privileges
  7583. | [10501] Microsoft IIS administrative Web pages cross-site scripting
  7584. | [10370] Microsoft IIS HTTP HOST header denial of service
  7585. | [10294] Microsoft IIS .idc extension error message cross-site scripting
  7586. | [10184] Microsoft IIS 5.0 resource utilization denial of service
  7587. | [9791] Microsoft Exchange IIS license exhaustion denial of service
  7588. | [9580] Microsoft IIS SMTP service encapsulated addresses could allow mail relaying
  7589. | [9327] Microsoft IIS ISAPI HTR chunked encoding heap buffer overflow
  7590. | [9123] Microsoft IIS 5.0 Log Files Directory Permission Exposure
  7591. | [8853] Microsoft IIS CodeBrws.asp sample script can be used to view arbitrary file source code
  7592. | [8811] Microsoft IIS MS02-018 patch is not installed on the system
  7593. | [8804] Microsoft IIS redirected URL error cross-site scripting
  7594. | [8803] Microsoft IIS HTTP error page cross-site scripting
  7595. | [8802] Microsoft IIS Help File search cross-site scripting
  7596. | [8801] Microsoft IIS FTP session status request denial of service
  7597. | [8800] Microsoft IIS FrontPage Server Extensions and ASP.NET ISAPI filter error handling denial of service
  7598. | [8799] Microsoft IIS HTR ISAPI ISM.DLL extension buffer overflow
  7599. | [8798] Microsoft IIS SSI safety check buffer overflow
  7600. | [8797] Microsoft IIS ASP HTTP header parsing buffer overflow
  7601. | [8796] Microsoft IIS ASP data transfer heap buffer overflow
  7602. | [8795] Microsoft IIS ASP chunked encoding heap buffer overflow
  7603. | [8388] Microsoft Windows NT Server with IIS 4.0 could allow users to bypass &quot
  7604. | [8385] Microsoft IIS specially-crafted request reveals IP address
  7605. | [8382] Microsoft IIS authentication error messages reveal configuration information
  7606. | [8191] Microsoft IIS 5.1 specially-crafted .cnf file request could reveal file contents
  7607. | [8174] Microsoft IIS 5.1 .cnf file request could reveal sensitive information
  7608. | [8056] Microsoft IIS is running on the system
  7609. | [7919] Microsoft IIS 4.0 and Norton Internet Security 2001 default permissions could allow an attacker to modify log files
  7610. | [7691] Microsoft IIS HTTP GET request with false &quot
  7611. | [7640] Microsoft IIS is present on the system
  7612. | [7613] Microsoft IIS allows attackers to create fake log entries
  7613. | [7566] Microsoft IIS 2.0 and 3.0 upgraded to Microsoft IIS 4.0 fails to remove the ism.dll file
  7614. | [7559] Microsoft Index Server installed with IIS 4.0 could allow a local attacker to obtain physical path information
  7615. | [7558] Microsoft IIS FileSystemObject in showfile.asp could allow remote attackers to read arbitrary files
  7616. | [7202] Microsoft IIS 4.0/5.0 escaped percent found
  7617. | [7201] Microsoft IIS 4.0/5.0 malformed double percent sequence
  7618. | [7199] Microsoft IIS 4.0/5.0 malformed hex sequence
  7619. | [6995] Microsoft IIS %u Unicode wide character encoding detected
  7620. | [6994] Microsoft IIS %u Unicode encoding detected
  7621. | [6985] Microsoft IIS relative path usage in system file process table could allow elevated privileges
  7622. | [6984] Microsoft IIS specially-crafted SSI directives buffer overflow
  7623. | [6983] Microsoft IIS invalid MIME header denial of service
  7624. | [6982] Microsoft IIS WebDAV long invalid request denial of service
  7625. | [6981] Microsoft IIS URL redirection denial of service
  7626. | [6963] Microsoft IIS HTTPS connection could reveal internal IP address
  7627. | [6858] Microsoft IIS cross-site scripting patch denial of service
  7628. | [6800] Microsoft IIS device file request can crash the ASP processor
  7629. | [6742] Microsoft IIS reveals .asp source code with Unicode extensions
  7630. | [6705] Microsoft IIS idq.dll ISAPI extension buffer overflow
  7631. | [6549] Microsoft IIS WebDAV lock method memory leak can cause a denial of service
  7632. | [6545] Microsoft IIS FTP weak domain authentication
  7633. | [6535] Microsoft IIS FTP wildcard processing function denial of service
  7634. | [6534] Microsoft IIS URL decoding error could allow remote code execution
  7635. | [6485] Microsoft IIS 5.0 ISAPI Internet Printing Protocol extension buffer overflow
  7636. | [6205] Microsoft IIS WebDAV denial of service
  7637. | [6171] Microsoft IIS and Exchange malformed URL request denial of service
  7638. | [6029] Microsoft IIS CmdAsp could allow remote attackers to gain privileges
  7639. | [5903] Microsoft IIS 5.0 allows the viewing of files through malformed URL
  7640. | [5823] Microsoft IIS Web form submission denial of service
  7641. | [5729] Microsoft IIS Far East editions file disclosure
  7642. | [5510] Microsoft Internet Information Service (IIS) ISAPI buffer overflow
  7643. | [5470] Microsoft Internet Information Service (IIS) invalid executable filename passing
  7644. | [5441] Microsoft IIS .htw cross-site scripting
  7645. | [5377] Microsoft IIS Unicode translation error allows remote command execution
  7646. | [5335] Microsoft IIS Index Server directory traversal
  7647. | [5202] Microsoft IIS invalid URL allows attackers to crash service
  7648. | [5156] Microsoft IIS Cross-Site Scripting
  7649. | [5106] Microsoft IIS 4.0 discloses internal IP addresses
  7650. | [5104] Microsoft IIS allows remote attackers to obtain source code fragments using +.htr
  7651. | [5071] Microsoft IIS canonicalization error applies incorrect permissions to certain types of files
  7652. | [4960] Microsoft IIS on Win2kPro security button restriction
  7653. | [4951] Microsoft IIS absent directory browser argument
  7654. | [4790] Microsoft IIS \mailroot\pickup directory denial of service
  7655. | [4757] Microsoft IIS server-side includes (SSI) #exec directive
  7656. | [4558] Microsoft IIS is installed on a domain controller
  7657. | [4448] Microsoft IIS ISM.DLL could allow users to read file contents
  7658. | [4430] Microsoft IIS malformed URL extension data denial of service
  7659. | [4392] Microsoft IIS could reveal source code of ASP files in some virtual directories
  7660. | [4302] Microsoft IIS malformed AuthChangUrl request can cause the server to stop servicing requests
  7661. | [4279] Microsoft IIS escape characters denial of service
  7662. | [4204] Microsoft IIS virtual UNC share source read
  7663. | [4183] Microsoft IIS could disclose path of network shares
  7664. | [4117] Microsoft IIS chunked encoding post or put denial of service
  7665. | [3986] Microsoft IIS ASP could be used to gain sensitive information
  7666. | [3892] Microsoft IIS Long URL with excessive forward slashes passed to ASP causes an access violation
  7667. | [3306] Microsoft IIS could allow remote access to servers marked as Restrict Access
  7668. | [3115] Microsoft IIS and SiteServer denial of service caused by malformed HTTP requests
  7669. | [2675] Microsoft IIS 4.0 samples installation on Web server
  7670. | [2673] Microsoft IIS samples installation on Web server
  7671. | [2671] Microsoft IIS Passive FTP patch not applied (asp.dll out of date)
  7672. | [2670] Microsoft IIS Passive FTP patch not applied (wam.dll out of date)
  7673. | [2669] Microsoft IIS Passive FTP patch not applied (w3svc.dll out of date)
  7674. | [2668] Microsoft IIS Passive FTP patch not applied (infocomm.dll out of date)
  7675. | [2662] Microsoft IIS CGI overflow
  7676. | [2412] Microsoft IIS account is member of Domain Users
  7677. | [2381] Microsoft IIS and SiteServer Showcode.asp sample file allows remote file viewing
  7678. | [2302] Microsoft IIS using double-byte code pages could allow remote attackers to retrieve source code
  7679. | [2282] Microsoft IIS bdir.htr allows remote traversal of directory structure
  7680. | [2281] Microsoft IIS buffer overflow in HTR requests can allow remote code execution
  7681. | [2229] Microsoft IIS ExAir sample site denial of service
  7682. | [2185] Microsoft IIS and Site Server sample programs can be used to remotely view files
  7683. | [1823] Microsoft IIS long GET request denial of service
  7684. | [1735] Microsoft IIS with Visual InterDev no authentication
  7685. | [1656] Microsoft IIS 4.0 allows user to avoid HTTP request logging
  7686. | [1654] Microsoft IIS remote FTP buffer overflow
  7687. | [1638] Microsoft IIS crashes processing some GET commands
  7688. | [1530] Microsoft IIS 3.0 newdsn.exe sample application allows remote creation of arbitrary files
  7689. | [1368] Microsoft IIS 4.0 allows file execution in the Web site directory
  7690. | [1273] Microsoft IIS special characters allowed in shell
  7691. | [1272] Microsoft IIS CGI scripts run as system
  7692. | [1271] Microsoft IIS version 2 installed
  7693. | [1270] Microsoft IIS incorrect permissions on restricted item
  7694. | [1269] Microsoft IIS incorrect Web permissions
  7695. | [1268] Microsoft IIS SSI #exec enabled
  7696. | [1216] Microsoft IIS SSL patch not applied
  7697. | [1215] Microsoft IIS Passive FTP patch not applied
  7698. | [1212] Microsoft IIS unauthorized ODBC data access with RDS
  7699. | [1125] Microsoft IIS ASP DATA issue could reveal source code
  7700. | [949] Microsoft IIS server script debugging enabled
  7701. | [948] Microsoft IIS samples installed on Web server
  7702. | [936] Microsoft IIS NTFS insecure permissions
  7703. | [935] Microsoft IIS executable paths
  7704. | [621] Microsoft IIS 3.0 script source revealed by appending 2E to requests
  7705. | [336] Microsoft IIS ASP dot bug
  7706. | [256] Microsoft IIS can be remotely crashed by excessively long client requests
  7707. | [7] Microsoft IIS ASP source visible
  7708. |
  7709. | Exploit-DB - https://www.exploit-db.com:
  7710. | [19033] microsoft iis 6.0 and 7.5 - Multiple Vulnerabilities
  7711. | [17476] Microsoft IIS FTP Server <= 7.0 Stack Exhaustion DoS [MS09-053]
  7712. |
  7713. | OpenVAS (Nessus) - http://www.openvas.org:
  7714. | [902914] Microsoft IIS GET Request Denial of Service Vulnerability
  7715. | [902796] Microsoft IIS IP Address/Internal Network Name Disclosure Vulnerability
  7716. | [902694] Microsoft Windows IIS FTP Service Information Disclosure Vulnerability (2761226)
  7717. | [901120] Microsoft IIS Authentication Remote Code Execution Vulnerability (982666)
  7718. | [900944] Microsoft IIS FTP Server 'ls' Command DOS Vulnerability
  7719. | [900874] Microsoft IIS FTP Service Remote Code Execution Vulnerabilities (975254)
  7720. | [900711] Microsoft IIS WebDAV Remote Authentication Bypass Vulnerability
  7721. | [900567] Microsoft IIS Security Bypass Vulnerability (970483)
  7722. | [802806] Microsoft IIS Default Welcome Page Information Disclosure Vulnerability
  7723. | [801669] Microsoft Windows IIS FTP Server DOS Vulnerability
  7724. | [801520] Microsoft IIS ASP Stack Based Buffer Overflow Vulnerability
  7725. | [100952] Microsoft IIS FTPd NLST stack overflow
  7726. | [11443] Microsoft IIS UNC Mapped Virtual Host Vulnerability
  7727. | [10680] Test Microsoft IIS Source Fragment Disclosure
  7728. | [903041] Microsoft Windows Kernel Privilege Elevation Vulnerability (2724197)
  7729. | [903037] Microsoft JScript and VBScript Engines Remote Code Execution Vulnerability (2706045)
  7730. | [903036] Microsoft Windows Networking Components Remote Code Execution Vulnerabilities (2733594)
  7731. | [903035] Microsoft Windows Kernel-Mode Drivers Privilege Elevation Vulnerability (2731847)
  7732. | [903033] Microsoft Windows Kernel-Mode Drivers Privilege Elevation Vulnerabilities (2718523)
  7733. | [903026] Microsoft Office Remote Code Execution Vulnerabilities (2663830)
  7734. | [903017] Microsoft Office Remote Code Execution Vulnerability (2639185)
  7735. | [903000] Microsoft Expression Design Remote Code Execution Vulnerability (2651018)
  7736. | [902936] Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (2783534)
  7737. | [902934] Microsoft .NET Framework Remote Code Execution Vulnerability (2745030)
  7738. | [902933] Microsoft Windows Shell Remote Code Execution Vulnerabilities (2727528)
  7739. | [902932] Microsoft Internet Explorer Multiple Use-After-Free Vulnerabilities (2761451)
  7740. | [902931] Microsoft Office Remote Code Execution Vulnerabilities - 2720184 (Mac OS X)
  7741. | [902930] Microsoft Office Remote Code Execution Vulnerabilities (2720184)
  7742. | [902923] Microsoft Internet Explorer Multiple Vulnerabilities (2722913)
  7743. | [902922] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerability (2723135)
  7744. | [902921] Microsoft Office Visio/Viewer Remote Code Execution Vulnerability (2733918)
  7745. | [902920] Microsoft Office Remote Code Execution Vulnerability (2731879)
  7746. | [902919] Microsoft SharePoint Privilege Elevation Vulnerabilities (2663841)
  7747. | [902916] Microsoft Windows Kernel Privilege Elevation Vulnerabilities (2711167)
  7748. | [902913] Microsoft Office Remote Code Execution Vulnerabilities-2663830 (Mac OS X)
  7749. | [902912] Microsoft Office Word Remote Code Execution Vulnerability-2680352 (Mac OS X)
  7750. | [902911] Microsoft Office Word Remote Code Execution Vulnerability (2680352)
  7751. | [902910] Microsoft Office Visio Viewer Remote Code Execution Vulnerability (2597981)
  7752. | [902909] Microsoft Windows Service Pack Missing Multiple Vulnerabilities
  7753. | [902908] Microsoft Windows DirectWrite Denial of Service Vulnerability (2665364)
  7754. | [902906] Microsoft Windows DNS Server Denial of Service Vulnerability (2647170)
  7755. | [902900] Microsoft Windows SSL/TLS Information Disclosure Vulnerability (2643584)
  7756. | [902846] Microsoft Windows TLS Protocol Information Disclosure Vulnerability (2655992)
  7757. | [902845] Microsoft Windows Shell Remote Code Execution Vulnerability (2691442)
  7758. | [902842] Microsoft Lync Remote Code Execution Vulnerabilities (2707956)
  7759. | [902841] Microsoft .NET Framework Remote Code Execution Vulnerability (2706726)
  7760. | [902839] Microsoft FrontPage Server Extensions MS-DOS Device Name DoS Vulnerability
  7761. | [902833] Microsoft .NET Framework Remote Code Execution Vulnerability (2693777)
  7762. | [902832] MS Security Update For Microsoft Office, .NET Framework, and Silverlight (2681578)
  7763. | [902829] Microsoft Windows Common Controls Remote Code Execution Vulnerability (2664258)
  7764. | [902828] Microsoft .NET Framework Remote Code Execution Vulnerability (2671605)
  7765. | [902818] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerabilities (2671387)
  7766. | [902817] Microsoft Visual Studio Privilege Elevation Vulnerability (2651019)
  7767. | [902811] Microsoft .NET Framework and Microsoft Silverlight Remote Code Execution Vulnerabilities (2651026)
  7768. | [902807] Microsoft Windows Media Could Allow Remote Code Execution Vulnerabilities (2636391)
  7769. | [902798] Microsoft SMB Signing Enabled and Not Required At Server
  7770. | [902797] Microsoft SMB Signing Information Disclosure Vulnerability
  7771. | [902785] Microsoft AntiXSS Library Information Disclosure Vulnerability (2607664)
  7772. | [902784] Microsoft Windows Object Packager Remote Code Execution Vulnerability (2603381)
  7773. | [902783] Microsoft Windows Kernel Security Feature Bypass Vulnerability (2644615)
  7774. | [902782] MicroSoft Windows Server Service Remote Code Execution Vulnerability (921883)
  7775. | [902766] Microsoft Windows Kernel Privilege Elevation Vulnerability (2633171)
  7776. | [902746] Microsoft Active Accessibility Remote Code Execution Vulnerability (2623699)
  7777. | [902727] Microsoft Office Excel Remote Code Execution Vulnerabilities (2587505)
  7778. | [902708] Microsoft Remote Desktop Protocol Denial of Service Vulnerability (2570222)
  7779. | [902696] Microsoft Internet Explorer Multiple Vulnerabilities (2761465)
  7780. | [902693] Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (2761226)
  7781. | [902692] Microsoft Office Excel ReadAV Arbitrary Code Execution Vulnerability
  7782. | [902689] Microsoft SQL Server Report Manager Cross Site Scripting Vulnerability (2754849)
  7783. | [902688] Microsoft System Center Configuration Manager XSS Vulnerability (2741528)
  7784. | [902687] Microsoft Windows Data Access Components Remote Code Execution Vulnerability (2698365)
  7785. | [902686] Microsoft Internet Explorer Multiple Vulnerabilities (2719177)
  7786. | [902683] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerability (2685939)
  7787. | [902682] Microsoft Internet Explorer Multiple Vulnerabilities (2699988)
  7788. | [902678] Microsoft Silverlight Code Execution Vulnerabilities - 2681578 (Mac OS X)
  7789. | [902677] Microsoft Windows Prtition Manager Privilege Elevation Vulnerability (2690533)
  7790. | [902676] Microsoft Windows TCP/IP Privilege Elevation Vulnerabilities (2688338)
  7791. | [902670] Microsoft Internet Explorer Multiple Vulnerabilities (2675157)
  7792. | [902663] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerabilities (2671387)
  7793. | [902662] MicroSoft SMB Server Trans2 Request Remote Code Execution Vulnerability
  7794. | [902660] Microsoft SMB Transaction Parsing Remote Code Execution Vulnerability
  7795. | [902658] Microsoft RDP Server Private Key Information Disclosure Vulnerability
  7796. | [902649] Microsoft Internet Explorer Multiple Vulnerabilities (2647516)
  7797. | [902642] Microsoft Internet Explorer Multiple Vulnerabilities (2618444)
  7798. | [902626] Microsoft SharePoint SafeHTML Information Disclosure Vulnerabilities (2412048)
  7799. | [902625] Microsoft SharePoint Multiple Privilege Escalation Vulnerabilities (2451858)
  7800. | [902613] Microsoft Internet Explorer Multiple Vulnerabilities (2559049)
  7801. | [902609] Microsoft Windows CSRSS Privilege Escalation Vulnerabilities (2507938)
  7802. | [902598] Microsoft Windows Time Component Remote Code Execution Vulnerability (2618451)
  7803. | [902597] Microsoft Windows Media Remote Code Execution Vulnerability (2648048)
  7804. | [902596] Microsoft Windows OLE Remote Code Execution Vulnerability (2624667)
  7805. | [902588] Microsoft Windows Internet Protocol Validation Remote Code Execution Vulnerability
  7806. | [902581] Microsoft .NET Framework and Silverlight Remote Code Execution Vulnerability (2604930)
  7807. | [902580] Microsoft Host Integration Server Denial of Service Vulnerabilities (2607670)
  7808. | [902567] Microsoft Office Remote Code Execution Vulnerabilites (2587634)
  7809. | [902566] Microsoft Windows WINS Local Privilege Escalation Vulnerability (2571621)
  7810. | [902552] Microsoft .NET Framework Chart Control Information Disclosure Vulnerability (2567943)
  7811. | [902551] Microsoft .NET Framework Information Disclosure Vulnerability (2567951)
  7812. | [902523] Microsoft .NET Framework and Silverlight Remote Code Execution Vulnerability (2514842)
  7813. | [902522] Microsoft .NET Framework Remote Code Execution Vulnerability (2538814)
  7814. | [902518] Microsoft .NET Framework Security Bypass Vulnerability
  7815. | [902516] Microsoft Windows WINS Remote Code Execution Vulnerability (2524426)
  7816. | [902502] Microsoft .NET Framework Remote Code Execution Vulnerability (2484015)
  7817. | [902501] Microsoft JScript and VBScript Scripting Engines Remote Code Execution Vulnerability (2514666)
  7818. | [902496] Microsoft Office IME (Chinese) Privilege Elevation Vulnerability (2652016)
  7819. | [902495] Microsoft Office Remote Code Execution Vulnerability (2590602)
  7820. | [902494] Microsoft Office Excel Remote Code Execution Vulnerability (2640241)
  7821. | [902493] Microsoft Publisher Remote Code Execution Vulnerabilities (2607702)
  7822. | [902492] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2639142)
  7823. | [902487] Microsoft Windows Active Directory LDAPS Authentication Bypass Vulnerability (2630837)
  7824. | [902484] Microsoft Windows TCP/IP Remote Code Execution Vulnerability (2588516)
  7825. | [902464] Microsoft Visio Remote Code Execution Vulnerabilities (2560978)
  7826. | [902463] Microsoft Windows Client/Server Run-time Subsystem Privilege Escalation Vulnerability (2567680)
  7827. | [902455] Microsoft Visio Remote Code Execution Vulnerability (2560847)
  7828. | [902445] Microsoft XML Editor Information Disclosure Vulnerability (2543893)
  7829. | [902443] Microsoft Internet Explorer Multiple Vulnerabilities (2530548)
  7830. | [902440] Microsoft Windows SMB Server Remote Code Execution Vulnerability (2536275)
  7831. | [902430] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2545814)
  7832. | [902425] Microsoft Windows SMB Accessible Shares
  7833. | [902423] Microsoft Office Visio Viewer Remote Code Execution Vulnerabilities (2663510)
  7834. | [902411] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2489283)
  7835. | [902410] Microsoft Office Excel Remote Code Execution Vulnerabilities (2489279)
  7836. | [902403] Microsoft Windows Fraudulent Digital Certificates Spoofing Vulnerability
  7837. | [902395] Microsoft Bluetooth Stack Remote Code Execution Vulnerability (2566220)
  7838. | [902378] Microsoft Office Excel Remote Code Execution Vulnerabilities (2537146)
  7839. | [902377] Microsoft Windows OLE Automation Remote Code Execution Vulnerability (2476490)
  7840. | [902365] Microsoft GDI+ Remote Code Execution Vulnerability (2489979)
  7841. | [902364] Microsoft Office Remote Code Execution Vulnerabilites (2489293)
  7842. | [902351] Microsoft Groove Remote Code Execution Vulnerability (2494047)
  7843. | [902337] Microsoft Windows Kernel Elevation of Privilege Vulnerability (2393802)
  7844. | [902336] Microsoft JScript and VBScript Scripting Engines Information Disclosure Vulnerability (2475792)
  7845. | [902325] Microsoft Internet Explorer 'CSS Import Rule' Use-after-free Vulnerability
  7846. | [902324] Microsoft SharePoint Could Allow Remote Code Execution Vulnerability (2455005)
  7847. | [902319] Microsoft Foundation Classes Could Allow Remote Code Execution Vulnerability (2387149)
  7848. | [902290] Microsoft Windows Active Directory SPN Denial of Service (2478953)
  7849. | [902289] Microsoft Windows LSASS Privilege Escalation Vulnerability (2478960)
  7850. | [902288] Microsoft Kerberos Privilege Escalation Vulnerabilities (2496930)
  7851. | [902287] Microsoft Visio Remote Code Execution Vulnerabilities (2451879)
  7852. | [902285] Microsoft Internet Explorer Information Disclosure Vulnerability (2501696)
  7853. | [902281] Microsoft Windows Data Access Components Remote Code Execution Vulnerabilities (2451910)
  7854. | [902280] Microsoft Windows BranchCache Remote Code Execution Vulnerability (2385678)
  7855. | [902277] Microsoft Windows Netlogon Service Denial of Service Vulnerability (2207559)
  7856. | [902276] Microsoft Windows Task Scheduler Elevation of Privilege Vulnerability (2305420)
  7857. | [902274] Microsoft Publisher Remote Code Execution Vulnerability (2292970)
  7858. | [902269] Microsoft Windows SMB Server NTLM Multiple Vulnerabilities (971468)
  7859. | [902265] Microsoft Office Word Remote Code Execution Vulnerabilities (2293194)
  7860. | [902264] Microsoft Office Excel Remote Code Execution Vulnerabilities (2293211)
  7861. | [902263] Microsoft Windows Media Player Network Sharing Remote Code Execution Vulnerability (2281679)
  7862. | [902262] Microsoft Windows Shell and WordPad COM Validation Vulnerability (2405882)
  7863. | [902256] Microsoft Windows win32k.sys Driver 'CreateDIBPalette()' BOF Vulnerability
  7864. | [902255] Microsoft Visual Studio Insecure Library Loading Vulnerability
  7865. | [902254] Microsoft Office Products Insecure Library Loading Vulnerability
  7866. | [902250] Microsoft Word 2003 'MSO.dll' Null Pointer Dereference Vulnerability
  7867. | [902246] Microsoft Internet Explorer 'toStaticHTML()' Cross Site Scripting Vulnerability
  7868. | [902243] Microsoft Outlook TNEF Remote Code Execution Vulnerability (2315011)
  7869. | [902232] Microsoft Windows TCP/IP Privilege Elevation Vulnerabilities (978886)
  7870. | [902231] Microsoft Windows Tracing Feature Privilege Elevation Vulnerabilities (982799)
  7871. | [902230] Microsoft .NET Common Language Runtime Remote Code Execution Vulnerability (2265906)
  7872. | [902229] Microsoft Window MPEG Layer-3 Remote Code Execution Vulnerability (2115168)
  7873. | [902228] Microsoft Office Word Remote Code Execution Vulnerabilities (2269638)
  7874. | [902227] Microsoft Windows LSASS Denial of Service Vulnerability (975467)
  7875. | [902226] Microsoft Windows Shell Remote Code Execution Vulnerability (2286198)
  7876. | [902217] Microsoft Outlook SMB Attachment Remote Code Execution Vulnerability (978212)
  7877. | [902210] Microsoft IE cross-domain IFRAME gadgets keystrokes steal Vulnerability
  7878. | [902193] Microsoft .NET Framework XML HMAC Truncation Vulnerability (981343)
  7879. | [902192] Microsoft Office COM Validation Remote Code Execution Vulnerability (983235)
  7880. | [902191] Microsoft Internet Explorer Multiple Vulnerabilities (982381)
  7881. | [902183] Microsoft Internet Explorer 'IFRAME' Denial Of Service Vulnerability
  7882. | [902178] Microsoft Visual Basic Remote Code Execution Vulnerability (978213)
  7883. | [902176] Microsoft SharePoint '_layouts/help.aspx' Cross Site Scripting Vulnerability
  7884. | [902166] Microsoft Internet Explorer 'neutering' Mechanism XSS Vulnerability
  7885. | [902159] Microsoft VBScript Scripting Engine Remote Code Execution Vulnerability (980232)
  7886. | [902158] Microsoft Office Publisher Remote Code Execution Vulnerability (981160)
  7887. | [902157] Microsoft 'ISATAP' Component Spoofing Vulnerability (978338)
  7888. | [902156] Microsoft SMB Client Remote Code Execution Vulnerabilities (980232)
  7889. | [902155] Microsoft Internet Explorer Multiple Vulnerabilities (980182)
  7890. | [902151] Microsoft Internet Explorer Denial of Service Vulnerability - Mar10
  7891. | [902133] Microsoft Office Excel Multiple Vulnerabilities (980150)
  7892. | [902117] Microsoft DirectShow Remote Code Execution Vulnerability (977935)
  7893. | [902116] Microsoft Client/Server Run-time Subsystem Privilege Elevation Vulnerability (978037)
  7894. | [902115] Microsoft Kerberos Denial of Service Vulnerability (977290)
  7895. | [902114] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (975416)
  7896. | [902112] Microsoft SMB Client Remote Code Execution Vulnerabilities (978251)
  7897. | [902095] Microsoft Office Excel Remote Code Execution Vulnerability (2269707)
  7898. | [902094] Microsoft Windows Kernel Mode Drivers Privilege Elevation Vulnerabilities (2160329)
  7899. | [902093] Microsoft Windows Kernel Privilege Elevation Vulnerabilities (981852)
  7900. | [902080] Microsoft Help and Support Center Remote Code Execution Vulnerability (2229593)
  7901. | [902069] Microsoft SharePoint Privilege Elevation Vulnerabilities (2028554)
  7902. | [902068] Microsoft Office Excel Remote Code Execution Vulnerabilities (2027452)
  7903. | [902067] Microsoft Windows Kernel Mode Drivers Privilege Escalation Vulnerabilities (979559)
  7904. | [902039] Microsoft Visio Remote Code Execution Vulnerabilities (980094)
  7905. | [902038] Microsoft MPEG Layer-3 Codecs Remote Code Execution Vulnerability (977816)
  7906. | [902033] Microsoft Windows '.ani' file Denial of Service vulnerability
  7907. | [902015] Microsoft Paint Remote Code Execution Vulnerability (978706)
  7908. | [901305] Microsoft Windows IP-HTTPS Component Security Feature Bypass Vulnerability (2765809)
  7909. | [901304] Microsoft Windows File Handling Component Remote Code Execution Vulnerability (2758857)
  7910. | [901301] Microsoft Windows Kerberos Denial of Service Vulnerability (2743555)
  7911. | [901212] Microsoft Windows DirectPlay Remote Code Execution Vulnerability (2770660)
  7912. | [901211] Microsoft Windows Common Controls Remote Code Execution Vulnerability (2720573)
  7913. | [901210] Microsoft Office Privilege Elevation Vulnerability - 2721015 (Mac OS X)
  7914. | [901209] Microsoft Windows Media Center Remote Code Execution Vulnerabilities (2604926)
  7915. | [901208] Microsoft Internet Explorer Multiple Vulnerabilities (2586448)
  7916. | [901205] Microsoft Windows Components Remote Code Execution Vulnerabilities (2570947)
  7917. | [901193] Microsoft Windows Media Remote Code Execution Vulnerabilities (2510030)
  7918. | [901183] Internet Information Services (IIS) FTP Service Remote Code Execution Vulnerability (2489256)
  7919. | [901180] Microsoft Internet Explorer Multiple Vulnerabilities (2482017)
  7920. | [901169] Microsoft Windows Address Book Remote Code Execution Vulnerability (2423089)
  7921. | [901166] Microsoft Office Remote Code Execution Vulnerabilites (2423930)
  7922. | [901164] Microsoft Windows SChannel Denial of Service Vulnerability (2207566)
  7923. | [901163] Microsoft Windows Media Player Remote Code Execution Vulnerability (2378111))
  7924. | [901162] Microsoft Internet Explorer Multiple Vulnerabilities (2360131)
  7925. | [901161] Microsoft ASP.NET Information Disclosure Vulnerability (2418042)
  7926. | [901151] Microsoft Internet Information Services Remote Code Execution Vulnerabilities (2267960)
  7927. | [901150] Microsoft Windows Print Spooler Service Remote Code Execution Vulnerability(2347290)
  7928. | [901140] Microsoft Windows SMB Code Execution and DoS Vulnerabilities (982214)
  7929. | [901139] Microsoft Internet Explorer Multiple Vulnerabilities (2183461)
  7930. | [901119] Microsoft Windows OpenType Compact Font Format Driver Privilege Escalation Vulnerability (980218)
  7931. | [901102] Microsoft Windows Media Services Remote Code Execution Vulnerability (980858)
  7932. | [901097] Microsoft Internet Explorer Multiple Vulnerabilities (978207)
  7933. | [901095] Microsoft Embedded OpenType Font Engine Remote Code Execution Vulnerabilities (972270)
  7934. | [901069] Microsoft Office Project Remote Code Execution Vulnerability (967183)
  7935. | [901065] Microsoft Windows IAS Remote Code Execution Vulnerability (974318)
  7936. | [901064] Microsoft Windows ADFS Remote Code Execution Vulnerability (971726)
  7937. | [901063] Microsoft Windows LSASS Denial of Service Vulnerability (975467)
  7938. | [901048] Microsoft Windows Active Directory Denial of Service Vulnerability (973309)
  7939. | [901041] Microsoft Internet Explorer Multiple Code Execution Vulnerabilities (974455)
  7940. | [901012] Microsoft Windows Media Format Remote Code Execution Vulnerability (973812)
  7941. | [900973] Microsoft Office Word Remote Code Execution Vulnerability (976307)
  7942. | [900965] Microsoft Windows SMB2 Negotiation Protocol Remote Code Execution Vulnerability
  7943. | [900964] Microsoft .NET Common Language Runtime Code Execution Vulnerability (974378)
  7944. | [900963] Microsoft Windows Kernel Privilege Escalation Vulnerability (971486)
  7945. | [900957] Microsoft Windows Patterns & Practices EntLib DOS Vulnerability
  7946. | [900956] Microsoft Windows Patterns & Practices EntLib Version Detection
  7947. | [900929] Microsoft JScript Scripting Engine Remote Code Execution Vulnerability (971961)
  7948. | [900908] Microsoft Windows Message Queuing Privilege Escalation Vulnerability (971032)
  7949. | [900907] Microsoft Windows AVI Media File Parsing Vulnerabilities (971557)
  7950. | [900898] Microsoft Internet Explorer 'XSS Filter' XSS Vulnerabilities - Nov09
  7951. | [900897] Microsoft Internet Explorer PDF Information Disclosure Vulnerability - Nov09
  7952. | [900891] Microsoft Internet Denial Of Service Vulnerability - Nov09
  7953. | [900887] Microsoft Office Excel Multiple Vulnerabilities (972652)
  7954. | [900886] Microsoft Windows Kernel-Mode Drivers Multiple Vulnerabilities (969947)
  7955. | [900881] Microsoft Windows Indexing Service ActiveX Vulnerability (969059)
  7956. | [900880] Microsoft Windows ATL COM Initialization Code Execution Vulnerability (973525)
  7957. | [900879] Microsoft Windows Media Player ASF Heap Overflow Vulnerability (974112)
  7958. | [900878] Microsoft Products GDI Plus Code Execution Vulnerabilities (957488)
  7959. | [900877] Microsoft Windows LSASS Denial of Service Vulnerability (975467)
  7960. | [900876] Microsoft Windows CryptoAPI X.509 Spoofing Vulnerabilities (974571)
  7961. | [900873] Microsoft Windows DNS Devolution Third-Level Domain Name Resolving Weakness (971888)
  7962. | [900863] Microsoft Internet Explorer 'window.print()' DOS Vulnerability
  7963. | [900838] Microsoft Windows TCP/IP Remote Code Execution Vulnerability (967723)
  7964. | [900837] Microsoft DHTML Editing Component ActiveX Remote Code Execution Vulnerability (956844)
  7965. | [900836] Microsoft Internet Explorer Address Bar Spoofing Vulnerability
  7966. | [900826] Microsoft Internet Explorer 'location.hash' DOS Vulnerability
  7967. | [900814] Microsoft Windows WINS Remote Code Execution Vulnerability (969883)
  7968. | [900813] Microsoft Remote Desktop Connection Remote Code Execution Vulnerability (969706)
  7969. | [900809] Microsoft Visual Studio ATL Remote Code Execution Vulnerability (969706)
  7970. | [900808] Microsoft Visual Products Version Detection
  7971. | [900757] Microsoft Windows Media Player '.AVI' File DOS Vulnerability
  7972. | [900741] Microsoft Internet Explorer Information Disclosure Vulnerability Feb10
  7973. | [900740] Microsoft Windows Kernel Could Allow Elevation of Privilege (977165)
  7974. | [900690] Microsoft Virtual PC/Server Privilege Escalation Vulnerability (969856)
  7975. | [900689] Microsoft Embedded OpenType Font Engine Remote Code Execution Vulnerabilities (961371))
  7976. | [900670] Microsoft Office Excel Remote Code Execution Vulnerabilities (969462)
  7977. | [900589] Microsoft ISA Server Privilege Escalation Vulnerability (970953)
  7978. | [900588] Microsoft DirectShow Remote Code Execution Vulnerability (961373)
  7979. | [900568] Microsoft Windows Search Script Execution Vulnerability (963093)
  7980. | [900566] Microsoft Active Directory LDAP Remote Code Execution Vulnerability (969805)
  7981. | [900476] Microsoft Excel Remote Code Execution Vulnerabilities (968557)
  7982. | [900465] Microsoft Windows DNS Memory Corruption Vulnerability - Mar09
  7983. | [900461] Microsoft MSN Live Messneger Denial of Service Vulnerability
  7984. | [900445] Microsoft Autorun Arbitrary Code Execution Vulnerability (08-038)
  7985. | [900404] Microsoft Windows RTCP Unspecified Remote DoS Vulnerability
  7986. | [900400] Microsoft Internet Explorer Unicode String DoS Vulnerability
  7987. | [900391] Microsoft Office Publisher Remote Code Execution Vulnerability (969516)
  7988. | [900366] Microsoft Internet Explorer Web Script Execution Vulnerabilites
  7989. | [900365] Microsoft Office Word Remote Code Execution Vulnerabilities (969514)
  7990. | [900337] Microsoft Internet Explorer Denial of Service Vulnerability - Apr09
  7991. | [900336] Microsoft Windows Media Player MID File Integer Overflow Vulnerability
  7992. | [900328] Microsoft Internet Explorer Remote Code Execution Vulnerability (963027)
  7993. | [900314] Microsoft XML Core Service Information Disclosure Vulnerability
  7994. | [900303] Microsoft Internet Explorer HTML Form Value DoS Vulnerability
  7995. | [900299] Microsoft Report Viewer Information Disclosure Vulnerability (2578230)
  7996. | [900297] Microsoft Windows Kernel Denial of Service Vulnerability (2556532)
  7997. | [900296] Microsoft Windows TCP/IP Stack Denial of Service Vulnerability (2563894)
  7998. | [900295] Microsoft Windows DNS Server Remote Code Execution Vulnerability (2562485)
  7999. | [900294] Microsoft Data Access Components Remote Code Execution Vulnerabilities (2560656)
  8000. | [900288] Microsoft Distributed File System Remote Code Execution Vulnerabilities (2535512)
  8001. | [900287] Microsoft SMB Client Remote Code Execution Vulnerabilities (2536276)
  8002. | [900285] Microsoft Foundation Class (MFC) Library Remote Code Execution Vulnerability (2500212)
  8003. | [900282] Microsoft DNS Resolution Remote Code Execution Vulnerability (2509553)
  8004. | [900281] Microsoft IE Developer Tools WMITools and Windows Messenger ActiveX Control Vulnerability (2508272)
  8005. | [900280] Microsoft Windows SMB Server Remote Code Execution Vulnerability (2508429)
  8006. | [900279] Microsoft SMB Client Remote Code Execution Vulnerabilities (2511455)
  8007. | [900278] Microsoft Internet Explorer Multiple Vulnerabilities (2497640)
  8008. | [900273] Microsoft Remote Desktop Client Remote Code Execution Vulnerability (2508062)
  8009. | [900267] Microsoft Media Decompression Remote Code Execution Vulnerability (2447961)
  8010. | [900266] Microsoft Windows Movie Maker Could Allow Remote Code Execution Vulnerability (2424434)
  8011. | [900263] Microsoft Windows OpenType Compact Font Format Driver Privilege Escalation Vulnerability (2296199)
  8012. | [900262] Microsoft Internet Explorer Multiple Vulnerabilities (2416400)
  8013. | [900261] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2293386)
  8014. | [900248] Microsoft Windows Movie Maker Could Allow Remote Code Execution Vulnerability (981997)
  8015. | [900246] Microsoft Media Decompression Remote Code Execution Vulnerability (979902)
  8016. | [900245] Microsoft Data Analyzer and IE Developer Tools ActiveX Control Vulnerability (980195)
  8017. | [900241] Microsoft Outlook Express and Windows Mail Remote Code Execution Vulnerability (978542)
  8018. | [900240] Microsoft Exchange and Windows SMTP Service Denial of Service Vulnerability (981832)
  8019. | [900237] Microsoft Windows Authentication Verification Remote Code Execution Vulnerability (981210)
  8020. | [900236] Microsoft Windows Kernel Could Allow Elevation of Privilege (979683)
  8021. | [900235] Microsoft Windows Media Player Could Allow Remote Code Execution (979402)
  8022. | [900232] Microsoft Windows Movie Maker Could Allow Remote Code Execution Vulnerability (975561)
  8023. | [900230] Microsoft Windows SMB Server Multiple Vulnerabilities (971468)
  8024. | [900229] Microsoft Data Analyzer ActiveX Control Vulnerability (978262)
  8025. | [900228] Microsoft Office (MSO) Remote Code Execution Vulnerability (978214)
  8026. | [900227] Microsoft Windows Shell Handler Could Allow Remote Code Execution Vulnerability (975713)
  8027. | [900223] Microsoft Ancillary Function Driver Elevation of Privilege Vulnerability (956803)
  8028. | [900192] Microsoft Internet Explorer Information Disclosure Vulnerability
  8029. | [900187] Microsoft Internet Explorer Argument Injection Vulnerability
  8030. | [900178] Microsoft Windows 'UnhookWindowsHookEx' Local DoS Vulnerability
  8031. | [900173] Microsoft Windows Media Player Version Detection
  8032. | [900172] Microsoft Windows Media Player 'MIDI' or 'DAT' File DoS Vulnerability
  8033. | [900170] Microsoft iExplorer '&NBSP
  8034. | [900131] Microsoft Internet Explorer Denial of Service Vulnerability
  8035. | [900125] Microsoft SQL Server 2000 sqlvdir.dll ActiveX Buffer Overflow Vulnerability
  8036. | [900120] Microsoft Organization Chart Remote Code Execution Vulnerability
  8037. | [900108] Microsoft Windows NSlookup.exe Remote Code Execution Vulnerability
  8038. | [900097] Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution
  8039. | [900095] Microsoft ISA Server and Forefront Threat Management Gateway DoS Vulnerability (961759)
  8040. | [900093] Microsoft DirectShow Remote Code Execution Vulnerability (961373)
  8041. | [900080] Vulnerabilities in Microsoft Office Visio Could Allow Remote Code Execution (957634)
  8042. | [900079] Vulnerabilities in Microsoft Exchange Could Allow Remote Code Execution (959239)
  8043. | [900064] Vulnerability in Microsoft Office SharePoint Server Could Cause Elevation of Privilege (957175)
  8044. | [900063] Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution (957173)
  8045. | [900061] Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution (959070)
  8046. | [900058] Microsoft XML Core Services Remote Code Execution Vulnerability (955218)
  8047. | [900048] Microsoft Excel Remote Code Execution Vulnerability (956416)
  8048. | [900047] Microsoft Office nformation Disclosure Vulnerability (957699)
  8049. | [900046] Microsoft Office Remote Code Execution Vulnerabilities (955047)
  8050. | [900033] Microsoft PowerPoint Could Allow Remote Code Execution Vulnerabilities (949785)
  8051. | [900029] Microsoft Office Filters Could Allow Remote Code Execution Vulnerabilities (924090)
  8052. | [900028] Microsoft Excel Could Allow Remote Code Execution Vulnerabilities (954066)
  8053. | [900025] Microsoft Office Version Detection
  8054. | [900006] Microsoft Word Could Allow Remote Code Execution Vulnerability
  8055. | [900004] Microsoft Access Snapshot Viewer ActiveX Control Vulnerability
  8056. | [855384] Solaris Update for snmp/mibiisa 108870-36
  8057. | [855273] Solaris Update for snmp/mibiisa 108869-36
  8058. | [803028] Microsoft Internet Explorer Remote Code Execution Vulnerability (2757760)
  8059. | [803007] Microsoft Windows Minimum Certificate Key Length Spoofing Vulnerability (2661254)
  8060. | [802912] Microsoft Unauthorized Digital Certificates Spoofing Vulnerability (2728973)
  8061. | [802888] Microsoft Windows Media Service Handshake Sequence DoS Vulnerability
  8062. | [802886] Microsoft Sidebar and Gadgets Remote Code Execution Vulnerability (2719662)
  8063. | [802864] Microsoft XML Core Services Remote Code Execution Vulnerability (2719615)
  8064. | [802774] Microsoft VPN ActiveX Control Remote Code Execution Vulnerability (2695962)
  8065. | [802726] Microsoft SMB Signing Disabled
  8066. | [802708] Microsoft Internet Explorer Code Execution and DoS Vulnerabilities
  8067. | [802634] Microsoft Windows Unauthorized Digital Certificates Spoofing Vulnerability (2718704)
  8068. | [802500] Microsoft Windows TrueType Font Parsing Privilege Elevation Vulnerability
  8069. | [802468] Compatibility Issues Affecting Signed Microsoft Binaries (2749655)
  8070. | [802462] Microsoft ActiveSync Null Pointer Dereference Denial Of Service Vulnerability
  8071. | [802426] Microsoft Windows ActiveX Control Multiple Vulnerabilities (2647518)
  8072. | [802383] Microsoft Windows Color Control Panel Privilege Escalation Vulnerability
  8073. | [802379] Microsoft Windows Kernel 'win32k.sys' Memory Corruption Vulnerability
  8074. | [802287] Microsoft Internet Explorer Cache Objects History Information Disclosure Vulnerability
  8075. | [802286] Microsoft Internet Explorer Multiple Information Disclosure Vulnerabilities
  8076. | [802260] Microsoft Windows WINS Remote Code Execution Vulnerability (2524426)
  8077. | [802203] Microsoft Internet Explorer Cookie Hijacking Vulnerability
  8078. | [802202] Microsoft Internet Explorer Cookie Hijacking Vulnerability
  8079. | [802140] Microsoft Explorer HTTPS Sessions Multiple Vulnerabilities (Windows)
  8080. | [802136] Microsoft Windows Insecure Library Loading Vulnerability (2269637)
  8081. | [801991] Microsoft Windows SMB/NETBIOS NULL Session Authentication Bypass Vulnerability
  8082. | [801966] Microsoft Windows ActiveX Control Multiple Vulnerabilities (2562937)
  8083. | [801935] Microsoft Silverlight Multiple Memory Leak Vulnerabilities
  8084. | [801934] Microsoft Silverlight Version Detection
  8085. | [801914] Microsoft Windows IPv4 Default Configuration Security Bypass Vulnerability
  8086. | [801876] Microsoft Internet Explorer 'msxml.dll' Information Disclosure Vulnerability
  8087. | [801831] Microsoft Internet Explorer Incorrect GUI Display Vulnerability
  8088. | [801830] Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability
  8089. | [801725] Microsoft Products GDI Plus Remote Code Execution Vulnerabilities (954593)
  8090. | [801721] Microsoft Active Directory Denial of Service Vulnerability (953235)
  8091. | [801719] Microsoft Windows CSRSS CSRFinalizeContext Local Privilege Escalation Vulnerability (930178)
  8092. | [801718] Microsoft Windows Vista Information Disclosure Vulnerability (931213)
  8093. | [801717] Microsoft Windows Vista Teredo Interface Firewall Bypass Vulnerability
  8094. | [801716] Microsoft Outlook Express/Windows Mail MHTML URI Handler Information Disclosure Vulnerability (929123)
  8095. | [801715] Microsoft XML Core Services Remote Code Execution Vulnerability (936227)
  8096. | [801713] Microsoft Outlook Express And Windows Mail NNTP Protocol Heap Buffer Overflow Vulnerability (941202)
  8097. | [801707] Microsoft Internet Explorer mshtml.dll Remote Memory Corruption Vulnerability (942615)
  8098. | [801706] Microsoft Windows TCP/IP Remote Code Execution Vulnerabilities (941644)
  8099. | [801705] Microsoft Windows TCP/IP Denial of Service Vulnerability (946456)
  8100. | [801704] Microsoft Internet Information Services Privilege Elevation Vulnerability (942831)
  8101. | [801702] Microsoft Internet Explorer HTML Rendering Remote Memory Corruption Vulnerability (944533)
  8102. | [801701] Microsoft Windows DNS Client Service Response Spoofing Vulnerability (945553)
  8103. | [801677] Microsoft WMI Administrative Tools ActiveX Control Remote Code Execution Vulnerabilities
  8104. | [801606] Microsoft Internet Explorer 'mshtml.dll' Information Disclosure Vulnerability
  8105. | [801598] Microsoft Windows2k3 Active Directory 'BROWSER ELECTION' Buffer Overflow Vulnerability
  8106. | [801597] Microsoft Office Excel 2003 Invalid Object Type Remote Code Execution Vulnerability
  8107. | [801596] Microsoft Excel 2007 Office Drawing Layer Remote Code Execution Vulnerability
  8108. | [801595] Microsoft Office Excel Axis and Art Object Parsing Remote Code Execution Vulnerabilities
  8109. | [801594] Microsoft PowerPoint 2007 OfficeArt Atom Remote Code Execution Vulnerability
  8110. | [801580] Microsoft Windows Fax Cover Page Editor BOF Vulnerabilities
  8111. | [801527] Microsoft Windows 32-bit Platforms Unspecified vulnerabilities
  8112. | [801491] Microsoft 'hxvz.dll' ActiveX Control Memory Corruption Vulnerability (948881)
  8113. | [801489] Microsoft Office Graphics Filters Remote Code Execution Vulnerabilities (968095)
  8114. | [801488] Microsoft Internet Explorer Data Stream Handling Remote Code Execution Vulnerability (947864)
  8115. | [801487] Microsoft Windows Kernel Usermode Callback Local Privilege Elevation Vulnerability (941693)
  8116. | [801486] Microsoft Windows Speech Components Voice Recognition Command Execution Vulnerability (950760)
  8117. | [801485] Microsoft Pragmatic General Multicast (PGM) Denial of Service Vulnerability (950762)
  8118. | [801484] Microsoft Windows IPsec Policy Processing Information Disclosure Vulnerability (953733)
  8119. | [801483] Microsoft Windows Search Remote Code Execution Vulnerability (959349)
  8120. | [801482] Microsoft Windows ASP.NET Denial of Service Vulnerability(970957)
  8121. | [801481] Microsoft Wireless LAN AutoConfig Service Remote Code Execution Vulnerability (970710)
  8122. | [801480] Microsoft Web Services on Devices API Remote Code Execution Vulnerability (973565)
  8123. | [801479] Microsoft Windows TCP/IP Could Allow Remote Code Execution (974145)
  8124. | [801457] Microsoft Windows Address Book Insecure Library Loading Vulnerability
  8125. | [801456] Microsoft Windows Progman Group Converter Insecure Library Loading Vulnerability
  8126. | [801349] Microsoft Internet Explorer 'IFRAME' Denial Of Service Vulnerability (June-10)
  8127. | [801348] Microsoft Internet Explorer 'IFRAME' Denial Of Service Vulnerability -june 10
  8128. | [801345] Microsoft .NET 'ASP.NET' Cross-Site Scripting vulnerability
  8129. | [801344] Microsoft .NET '__VIEWSTATE' Cross-Site Scripting vulnerability
  8130. | [801342] Microsoft ASP.NET Cross-Site Scripting vulnerability
  8131. | [801333] Microsoft Windows Kernel 'win32k.sys' Multiple DOS Vulnerabilities
  8132. | [801330] Microsoft Internet Explorer Cross Site Data Leakage Vulnerability
  8133. | [801109] Microsoft IE CA SSL Certificate Security Bypass Vulnerability - Oct09
  8134. | [801090] Microsoft Windows Indeo Codec Multiple Vulnerabilities
  8135. | [800968] Microsoft SharePoint Team Services Information Disclosure Vulnerability
  8136. | [800910] Microsoft Internet Explorer Buffer Overflow Vulnerability - Jul09
  8137. | [800902] Microsoft Internet Explorer XSS Vulnerability - July09
  8138. | [800872] Microsoft Internet Explorer 'li' Element DoS Vulnerability - Sep09
  8139. | [800863] Microsoft Internet Explorer XML Document DoS Vulnerability - Aug09
  8140. | [800862] Microsoft Windows Kernel win32k.sys Privilege Escalation Vulnerability
  8141. | [800861] Microsoft Internet Explorer 'findText()' Unicode Parsing DoS Vulnerability
  8142. | [800845] Microsoft Office Web Components ActiveX Control Code Execution Vulnerability
  8143. | [800829] Microsoft Video ActiveX Control 'msvidctl.dll' BOF Vulnerability
  8144. | [800742] Microsoft Internet Explorer Unspecified vulnerability
  8145. | [800700] Microsoft GDIPlus PNG Infinite Loop Vulnerability
  8146. | [800687] Microsoft Windows Server 2003 OpenType Font Engine DoS Vulnerability
  8147. | [800669] Microsoft Internet Explorer Denial Of Service Vulnerability - July09
  8148. | [800577] Microsoft Windows Server 2003 win32k.sys DoS Vulnerability
  8149. | [800505] Microsoft HTML Help Workshop buffer overflow vulnerability
  8150. | [800504] Microsoft Windows XP SP3 denial of service vulnerability
  8151. | [800481] Microsoft SharePoint Cross Site Scripting Vulnerability
  8152. | [800480] Microsoft Windows Media Player '.mpg' Buffer Overflow Vulnerability
  8153. | [800466] Microsoft Windows TLS/SSL Spoofing Vulnerability (977377)
  8154. | [800461] Microsoft Internet Explorer Information Disclosure Vulnerability (980088)
  8155. | [800442] Microsoft Windows GP Trap Handler Privilege Escalation Vulnerability
  8156. | [800429] Microsoft Internet Explorer Remote Code Execution Vulnerability (979352)
  8157. | [800382] Microsoft PowerPoint File Parsing Remote Code Execution Vulnerability (967340)
  8158. | [800347] Microsoft Internet Explorer Clickjacking Vulnerability
  8159. | [800343] Microsoft Word 2007 Sensitive Information Disclosure Vulnerability
  8160. | [800337] Microsoft Internet Explorer NULL Pointer DoS Vulnerability
  8161. | [800332] Microsoft Windows Live Messenger Information Disclosure Vulnerability
  8162. | [800331] Microsoft Windows Live Messenger Client Version Detection
  8163. | [800328] Integer Overflow vulnerability in Microsoft Windows Media Player
  8164. | [800310] Microsoft Windows Media Services nskey.dll ActiveX BOF Vulnerability
  8165. | [800267] Microsoft GDIPlus Library File Integer Overflow Vulnerability
  8166. | [800218] Microsoft Money 'prtstb06.dll' Denial of Service vulnerability
  8167. | [800217] Microsoft Money Version Detection
  8168. | [800209] Microsoft Internet Explorer Version Detection (Win)
  8169. | [800208] Microsoft Internet Explorer Anti-XSS Filter Vulnerabilities
  8170. | [800083] Microsoft Outlook Express Malformed MIME Message DoS Vulnerability
  8171. | [800082] Microsoft SQL Server sp_replwritetovarbin() BOF Vulnerability
  8172. | [800023] Microsoft Windows Image Color Management System Code Execution Vulnerability (952954)
  8173. | [103254] Microsoft SharePoint Server 2007 '_layouts/help.aspx' Cross Site Scripting Vulnerability
  8174. | [102059] Microsoft Windows Vector Markup Language Buffer Overflow (938127)
  8175. | [102055] Microsoft Windows GDI Multiple Vulnerabilities (925902)
  8176. | [102053] Microsoft Windows Vector Markup Language Vulnerabilities (929969)
  8177. | [102015] Microsoft RPC Interface Buffer Overrun (KB824146)
  8178. | [101100] Vulnerabilities in Microsoft ATL Could Allow Remote Code Execution (973908)
  8179. | [101017] Microsoft MS03-018 security check
  8180. | [101016] Microsoft MS03-022 security check
  8181. | [101015] Microsoft MS03-034 security check
  8182. | [101014] Microsoft MS00-078 security check
  8183. | [101012] Microsoft MS03-051 security check
  8184. | [101010] Microsoft Security Bulletin MS05-004
  8185. | [101009] Microsoft Security Bulletin MS06-033
  8186. | [101007] Microsoft dotNET version grabber
  8187. | [101006] Microsoft Security Bulletin MS06-056
  8188. | [101005] Microsoft Security Bulletin MS07-040
  8189. | [101004] Microsoft MS04-017 security check
  8190. | [101003] Microsoft MS00-058 security check
  8191. | [101000] Microsoft MS00-060 security check
  8192. | [100950] Microsoft DNS server internal hostname disclosure detection
  8193. | [100624] Microsoft Windows SMTP Server DNS spoofing vulnerability
  8194. | [100607] Microsoft SMTP Service and Exchange Routing Engine Buffer Overflow Vulnerability
  8195. | [100596] Microsoft Windows SMTP Server MX Record Denial of Service Vulnerability
  8196. | [100283] Microsoft Windows SMB2 '_Smb2ValidateProviderCallback()' Remote Code Execution Vulnerability
  8197. | [100062] Microsoft Remote Desktop Protocol Detection
  8198. | [90024] Windows Vulnerability in Microsoft Jet Database Engine
  8199. | [80007] Microsoft MS00-06 security check
  8200. | [13752] Denial of Service (DoS) in Microsoft SMS Client
  8201. | [11992] Vulnerability in Microsoft ISA Server 2000 H.323 Filter(816458)
  8202. | [11874] IIS Service Pack - 404
  8203. | [11808] Microsoft RPC Interface Buffer Overrun (823980)
  8204. | [11433] Microsoft ISA Server DNS - Denial Of Service (MS03-009)
  8205. | [11217] Microsoft's SQL Version Query
  8206. | [11177] Flaw in Microsoft VM Could Allow Code Execution (810030)
  8207. | [11146] Microsoft RDP flaws could allow sniffing and DOS(Q324380)
  8208. | [11142] IIS XSS via IDC error
  8209. | [11067] Microsoft's SQL Hello Overflow
  8210. | [11003] IIS Possible Compromise
  8211. | [10993] IIS ASP.NET Application Trace Enabled
  8212. | [10991] IIS Global.asa Retrieval
  8213. | [10936] IIS XSS via 404 error
  8214. | [10862] Microsoft's SQL Server Brute Force
  8215. | [10755] Microsoft Exchange Public Folders Information Leak
  8216. | [10732] IIS 5.0 WebDav Memory Leakage
  8217. | [10699] IIS FrontPage DoS II
  8218. | [10695] IIS .IDA ISAPI filter applied
  8219. | [10674] Microsoft's SQL UDP Info Query
  8220. | [10673] Microsoft's SQL Blank Password
  8221. | [10671] IIS Remote Command Execution
  8222. | [10667] IIS 5.0 PROPFIND Vulnerability
  8223. | [10661] IIS 5 .printer ISAPI filter applied
  8224. | [10657] NT IIS 5.0 Malformed HTTP Printer Request Header Buffer Overflow Vulnerability
  8225. | [10585] IIS FrontPage DoS
  8226. | [10576] Check for dangerous IIS default files
  8227. | [10575] Check for IIS .cnf file leakage
  8228. | [10573] IIS 5.0 Sample App reveals physical path of web root
  8229. | [10572] IIS 5.0 Sample App vulnerable to cross-site scripting attack
  8230. | [10537] IIS directory traversal
  8231. | [10492] IIS IDA/IDQ Path Disclosure
  8232. | [10491] ASP/ASA source using Microsoft Translate f: bug
  8233. | [10144] Microsoft SQL TCP/IP listener is running
  8234. |
  8235. | SecurityTracker - https://www.securitytracker.com:
  8236. | [1027751] Microsoft Internet Information Server (IIS) FTP Server Lets Remote Users Obtain Files and Local Users Obtain Passwords
  8237. | [1027223] Microsoft IIS Web Server Discloses Potentially Sensitive Information to Remote Users
  8238. | [1024921] Microsoft IIS FTP Server Lets Remote Users Deny Service
  8239. | [1024496] Microsoft Internet Information Server (IIS) Web Server Stack Overflow in Reading POST Data Lets Remote Users Deny Service
  8240. | [1023387] Microsoft Internet Information Services (IIS) Filename Extension Parsing Configuration Error May Let Users Bypass Security Controls
  8241. | [1022792] Microsoft Internet Information Server (IIS) FTP Server Buffer Overflows Let Remote Authenticated Users Execute Arbitrary Code and Deny Service
  8242. | [1016466] Microsoft Internet Information Server (IIS) Buffer Overflow in Processing ASP Pages Lets Remote Authenticated Users Execute Arbitrary Code
  8243. | [1015376] Microsoft IIS Lets Remote Users Deny Service or Execute Arbitrary Code With Malformed HTTP GET Requests
  8244. | [1015049] Microsoft Internet Explorer Drag-and-Drop Timing May Let Remote Users Install Arbitrary Files
  8245. | [1014777] Microsoft IIS ASP Error Page May Disclose System Information in Certain Cases
  8246. | [1011633] Microsoft IIS WebDAV XML Message Handler Error Lets Remote Users Deny Service
  8247. | [1010692] Microsoft IIS 4.0 Buffer Overflow in Redirect Function Lets Remote Users Execute Arbitrary Code
  8248. | [1010610] Microsoft IIS Web Server May Disclose Private IP Addresses in Certain Cases
  8249. | [1010079] Microsoft IIS ASP Script Cookie Processing Flaw May Disclose Application Information to Remote Users
  8250. | [1008563] Microsoft IIS Fails to Log HTTP TRACK Requests
  8251. | [1007262] Microsoft IIS 6.0 Vulnerabilities Permit Cross-Site Scripting and Password Changing Attacks Against Administrators
  8252. | [1007059] Microsoft Windows Media Services (nsiislog.dll) Extension to Internet Information Server (IIS) Has Another Buffer Overflow That Lets Remote Execute Arbitrary Code
  8253. | [1006867] Microsoft IIS Buffer Overflow Lets Remote Users With Upload Privileges Execute Code - Remote Users Can Also Crash the Service
  8254. | [1006866] Microsoft Windows Media Services (nsiislog.dll) Extension to Internet Information Server (IIS) Lets Remote Execute Arbitrary Code
  8255. | [1006704] Microsoft IIS Authentication Manager Discloses Validity of User Names to Remote Users
  8256. | [1006305] Microsoft IIS Web Server WebDAV Buffer Overflow Lets Remote Users Execute Arbitrary Code
  8257. | [1005505] Microsoft Internet Information Server (IIS) Script Access Control Bug May Let Remote Authenticated Users Upload Unauthorized Executable Files
  8258. | [1005504] Microsoft Internet Information Server (IIS) WebDAV Memory Allocation Flaw Lets Remote Users Crash the Server
  8259. | [1005503] Microsoft Internet Information Server (IIS) Administrative Pages Allow Cross-Site Scripting Attacks
  8260. | [1005502] Microsoft Internet Information Server (IIS) Out-of-Process Access Control Bug Lets Certain Authenticated Users Gain Full Control of the Server
  8261. | [1005083] Microsoft Internet Information Server (IIS) Web Server Fails to Properly Validate Client-side Certificates, Allowing Remote Users to Impersonate Other Users or Certificate Issuers
  8262. | [1004757] Microsoft IIS SMTP Service Encapsulation Bug Lets Remote Users Relay Mail and Send SPAM Via the Service
  8263. | [1004646] ColdFusion MX Buffer Overflow When Used With Microsoft Internet Information Server (IIS) Lets Remote Users Crash the IIS Web Server or Execute Arbitrary Code
  8264. | [1004526] Microsoft Internet Information Server (IIS) Heap Overflow in HTR ISAPI Extension While Processing Chunked Encoded Data Lets Remote Users Execute Arbitrary Code
  8265. | [1004044] Cisco CallManager Affected by Microsoft Internet Information Server (IIS) Bugs
  8266. | [1004032] Microsoft Internet Information Server (IIS) FTP STAT Command Bug Lets Remote Users Crash Both the FTP and the Web Services
  8267. | [1004031] Microsoft Internet Information Server (IIS) URL Length Bug Lets Remote Users Crash the Web Service
  8268. | [1004011] Microsoft Internet Information Server (IIS) Buffer Overflow in ASP Server-Side Include Function May Let Remote Users Execute Arbitrary Code on the Web Server
  8269. | [1004006] Microsoft Internet Information Server (IIS) Off-By-One Heap Overflow in .HTR Processing May Let Remote Users Execute Arbitrary Code on the Server
  8270. | [1003224] Microsoft Internet Information Server (IIS) Version 4 Lets Local Users Modify the Log File Undetected
  8271. | [1002778] Microsoft Internet Information Server (IIS) Lets Remote Users Create Bogus Web Log Entries
  8272. | [1002733] Microsoft IIS 4.0 Configuration Error May Allow Remote Users to Obtain Physical Directory Path Information
  8273. | [1002651] Microsoft Internet Information Server (IIS) May Disclose PHP Scripting Source Code
  8274. | [1002212] Microsoft IIS Web Server Contains Multiple Vulnerabilities That Allow Local Users to Gain System Privileges and Allow Remote Users to Cause the Web Server to Crash
  8275. | [1002161] Microsoft Internet Information Server (IIS) Web Server Discloses Internal IP Addresses or NetBIOS Host Names to Remote Users
  8276. | [1001818] Microsoft Internet Information Server (IIS) Web Server Discloses ASP Source Code When Installed on FAT-based Filesystem
  8277. | [1001576] eEye Digital Security's SecureIIS Application Firewall for Microsoft Web Servers Fails to Filter Certain Web URL Characters, Allowing Remote Users to Bypass the SecureIIS Firewall
  8278. | [1001565] Microsoft IIS Web Server on Windows 2000 Allows Remote Users to Cause the Server to Consume All Available Memory Due to Memory Leak in WebDAV Lock Method
  8279. | [1001530] Microsoft IIS Web Server Allows Remote Users to Execute Commands on the Server Due to CGI Decoding Error
  8280. | [1001483] Microsoft IIS Web Server Lets Remote Users Restart the Web Server with Another Specially Crafted PROPFIND XML Command
  8281. | [1001464] Microsoft Internet Information Server IIS 5.0 for Windows 2000 Lets Remote Users Execute Arbitrary Code on the Server and Gain Control of the Server
  8282. | [1001402] Microsoft IIS Web Server Can Be Effectively Shutdown By Certain Internal-Network Attacks When The Underlying OS Supports User Account Lockouts
  8283. | [1001116] Microsoft Personal Web Server Contains An Old Internet Information Server (IIS) Vulnerability Allowing Unauthorized Directory Listings and Possible Code Execution For Remote Users
  8284. | [1001050] Microsoft IIS 5.0 Web Server Can Be Restarted Remotely By Any User
  8285. | [1028908] Microsoft Active Directory Federation Services Discloses Account Information to Remote Users
  8286. | [1028905] (Microsoft Issues Fix for Exchange Server) Oracle Fusion Middleware Bugs Let Remote Users Deny Service and Access and Modify Data
  8287. | [1028904] (Microsoft Issues Fix for Exchange Server) Oracle PeopleSoft Products Bugs Let Remote Users Partially Access and Modify Data and Partially Deny Service
  8288. | [1028903] Microsoft Windows Unicode Scripts Processor Memory Corruption Error Lets Remote Users Execute Arbitrary Code
  8289. | [1028902] Microsoft Internet Explorer Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks
  8290. | [1028759] (Microsoft Issues Fix for Internet Explorer) Adobe Flash Player Buffer Overflows Let Remote Users Execute Arbitrary Code
  8291. | [1028756] Microsoft .NET Bug Lets Remote Users Execute Arbitrary Code and Bypass Security Restrictions
  8292. | [1028755] Microsoft Silverlight Null Pointer Dereference Lets Remote Users Execute Arbitrary Code
  8293. | [1028754] Microsoft Windows Defender Pathname Bug Lets Local Users Gain Elevated Privileges
  8294. | [1028752] Microsoft DirectShow GIF Image Processing Flaw Lets Remote Users Execute Arbitrary Code
  8295. | [1028751] Microsoft Office TrueType Font Parsing Flaw Lets Remote Users Execute Arbitrary Code
  8296. | [1028750] Microsoft Visual Studio .NET TrueType Font Parsing Flaw Lets Remote Users Execute Arbitrary Code
  8297. | [1028749] Microsoft Lync TrueType Font Parsing Flaw Lets Remote Users Execute Arbitrary Code
  8298. | [1028748] Microsoft Windows GDI+ TrueType Font Parsing Flaw Lets Remote Users Execute Arbitrary Code
  8299. | [1028745] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks
  8300. | [1028651] Microsoft Internet Explorer Multiple Memory Corruption Bugs Let Remote Users Execute Arbitrary Code
  8301. | [1028650] Microsoft Office Buffer Overflow in PNG Image Processing Lets Remote Users Execute Arbitrary Code
  8302. | [1028560] Microsoft Visio Discloses Information to Remote Users
  8303. | [1028558] Microsoft .NET Flaws Let Remote Users Bypass Authentication and Bypass XML File Signature Verification
  8304. | [1028557] Microsoft Malware Protection Engine Flaw Lets Remote Users Execute Arbitrary Code
  8305. | [1028553] Microsoft Word RTF Shape Data Parsing Error Lets Remote Users Execute Arbitrary Code
  8306. | [1028552] Microsoft Publisher Multiple Bugs Let Remote Users Execute Arbitrary Code
  8307. | [1028551] Microsoft Lync Object Access Flaw Lets Remote Users Execute Arbitrary Code
  8308. | [1028550] Microsoft Office Communicator Object Access Flaw Lets Remote Users Execute Arbitrary Code
  8309. | [1028545] Microsoft Internet Explorer Multiple Use-After-Free Bugs Let Remote Users Execute Arbitrary Code
  8310. | [1028514] Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code
  8311. | [1028412] Microsoft SharePoint Server Discloses Files to Remote Authenticated Users
  8312. | [1028411] Microsoft Office Web Apps Input Validation Flaw in Sanitization Component Permits Cross-Site Scripting Attacks
  8313. | [1028410] Microsoft InfoPath Input Validation Flaw in Sanitization Component Permits Cross-Site Scripting Attacks
  8314. | [1028409] Microsoft Groove Server Input Validation Flaw in Sanitization Component Permits Cross-Site Scripting Attacks
  8315. | [1028408] Microsoft SharePoint Input Validation Flaw in HTML Sanitization Component Permits Cross-Site Scripting Attacks
  8316. | [1028405] Microsoft Active Directory LDAP Processing Flaw Lets Remote Users Deny Service
  8317. | [1028404] Microsoft Antimalware Client Path Name Flaw Lets Local Users Gain Elevated Privileges
  8318. | [1028398] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
  8319. | [1028281] Microsoft Office for Mac HTML Loading Bug Lets Remote Users Obtain Potentially Sensitive Information
  8320. | [1028279] Microsoft OneNote Buffer Validation Flaw Lets Remote Users Obtain Potentially Sensitive Information
  8321. | [1028278] Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks
  8322. | [1028276] Microsoft Visio Viewer Tree Object Type Confusion Error Lets Remote Users Execute Arbitrary Code
  8323. | [1028275] Microsoft Internet Explorer Use-After-Free Bugs Let Remote Users Execute Arbitrary Code
  8324. | [1028273] Microsoft Silverlight Memory Pointer Dereference Lets Remote Users Execute Arbitrary Code
  8325. | [1028123] Microsoft .NET Bug Lets Remote Users Execute Arbitrary Code and Bypass Security Restrictions
  8326. | [1028119] Microsoft DirectShow Media Decompression Flaw Lets Remote Users Execute Arbitrary Code
  8327. | [1028117] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Access Information Across Domains
  8328. | [1028116] Microsoft Internet Explorer Vector Markup Language Memory Corruption Error Lets Remote Users Execute Arbitrary Code
  8329. | [1027949] Microsoft .NET Open Data (OData) Protocol Bug Lets Remote Users Deny Service
  8330. | [1027948] Microsoft System Center Configuration Manager Input Validation Flaws Permit Cross-Site Scripting Attacks
  8331. | [1027945] Microsoft .NET Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, and Bypass Security Restrictions
  8332. | [1027943] Microsoft XML Core Services (MSXML) XML Parsing Flaws Let Remote Users Execute Arbitrary Code
  8333. | [1027934] Microsoft Windows Includes Some Invalid TURKTRUST Certificates
  8334. | [1027930] Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code
  8335. | [1027870] Microsoft Internet Explorer Discloses Mouse Location to Remote Users
  8336. | [1027859] Microsoft DirectPlay Heap Overflow Lets Remote Users Execute Arbitrary Code
  8337. | [1027857] Microsoft Exchange Server RSS Feed Bug Lets Remote Users Deny Service
  8338. | [1027852] Microsoft Word RTF Parsing Error Lets Remote Users Execute Arbitrary Code
  8339. | [1027851] Microsoft Internet Explorer Multiple Use-After-Free Bugs Let Remote Users Execute Arbitrary Code
  8340. | [1027753] Microsoft .NET Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, and Bypass Security Restrictions
  8341. | [1027752] Microsoft Excel Buffer Overflow, Memory Corruption, and Use-After-Free Errors Let Remote Users Execute Arbitrary Code
  8342. | [1027749] Microsoft Internet Explorer Multiple Use-After-Free Bugs Let Remote Users Execute Arbitrary Code
  8343. | [1027647] EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords
  8344. | [1027629] Microsoft Office InfoPath HTML Sanitizer Flaw Permits Cross-Site Scripting Attacks
  8345. | [1027628] Microsoft Office Communicator HTML Sanitizer Flaw Permits Cross-Site Scripting Attacks
  8346. | [1027627] Microsoft Lync HTML Sanitizer Flaw Permits Cross-Site Scripting Attacks
  8347. | [1027626] Microsoft SharePoint HTML Sanitizer Flaw Permits Cross-Site Scripting Attacks
  8348. | [1027625] Microsoft Groove Server HTML Sanitizer Flaw Permits Cross-Site Scripting Attacks
  8349. | [1027623] Microsoft SQL Server Input Validation Flaw in Reporting Services Permits Cross-Site Scripting Attacks
  8350. | [1027621] Microsoft Works Heap Corruption Flaw Lets Remote Users Execute Arbitrary Code
  8351. | [1027620] Microsoft Kerberos Null Pointer Dereference Lets Remote Users Deny Service
  8352. | [1027618] Microsoft Word Memory Errors Let Remote Users Execute Arbitrary Code
  8353. | [1027555] Microsoft Internet Explorer Multiple Use-After-Free Bugs Let Remote Users Execute Arbitrary Code
  8354. | [1027538] Microsoft Internet Explorer execCommand Flaw Lets Remote Users Execute Arbitrary Code
  8355. | [1027512] Microsoft System Center Configuration Manager Input Validation Flaw Permits Cross-Site Scripting Attacks
  8356. | [1027511] Microsoft Visual Studio Team Foundation Server Input Validation Flaw Permits Cross-Site Scripting Attacks
  8357. | [1027394] Microsoft Visio Buffer Overflow in Processing DXF Format Files Lets Remote Users Execute Arbitrary Code
  8358. | [1027393] Microsoft Office CGM Graphics File Memory Corruption Error Lets Remote Users Execute Arbitrary Code
  8359. | [1027392] Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code
  8360. | [1027390] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
  8361. | [1027389] Microsoft Visual Basic Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
  8362. | [1027385] Microsoft Visual FoxPro Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
  8363. | [1027384] Microsoft Host Integration Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
  8364. | [1027383] Microsoft Commerce Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
  8365. | [1027381] Microsoft SQL Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
  8366. | [1027380] Microsoft Office Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
  8367. | [1027295] Microsoft SharePoint Server Bugs in Oracle Outside In Libraries Let Remote Users Execute Arbitrary Code
  8368. | [1027294] Microsoft Exchange Server Bugs in Oracle Outside In Libraries Let Remote Users Execute Arbitrary Code
  8369. | [1027234] Microsoft Office for Mac Folder Permission Flaw Lets Local Users Gain Elevated Privileges
  8370. | [1027232] Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting, Information Disclosure, and URL Redirection Attacks
  8371. | [1027229] Microsoft Office DLL Loading Error Lets Remote Users Execute Arbitrary Code
  8372. | [1027228] Microsoft Visual Basic for Applications DLL Loading Error Lets Remote Users Execute Arbitrary Code
  8373. | [1027227] Microsoft Data Access Components (MDAC) ADO Cachesize Buffer Overflow Lets Remote Users Execute Arbitrary Code
  8374. | [1027226] Microsoft Internet Explorer Deleted Object Access Bugs Let Remote Users Execute Arbitrary Code
  8375. | [1027157] Microsoft XML Core Services (MSXML) Object Access Error Lets Remote Users Execute Arbitrary Code
  8376. | [1027151] Microsoft Dynamics AX Input Validation Flaw Permits Cross-Site Scripting Attacks
  8377. | [1027150] Microsoft Lync DLL Loading Error Lets Remote Users Execute Arbitrary Code
  8378. | [1027149] Microsoft .NET Memory Access Bug Lets Remote Users Execute Arbitrary Code
  8379. | [1027147] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information
  8380. | [1027114] Microsoft Windows Includes Some Invalid Certificates
  8381. | [1027048] Microsoft .NET Bugs Let Remote Users Execute Arbitrary Code and Deny Service
  8382. | [1027043] Microsoft Windows Partition Manager Memory Allocation Error Lets Local Users Gain Elevated Privileges
  8383. | [1027042] Microsoft Visio Viewer Memory Corruption Error Lets Remote Users Execute Arbitrary Code
  8384. | [1027041] Microsoft Office Excel File Memory Corruption Errors and Heap Overflows Let Remote Users Execute Arbitrary Code
  8385. | [1027040] Microsoft Silverlight Double Free Memory Error Lets Remote Users Execute Arbitrary Code
  8386. | [1027038] Microsoft GDI+ Bugs Let Remote Users Execute Arbitrary Code
  8387. | [1027036] Microsoft .NET Framework Serialization Bugs Let Remote Users Execute Arbitrary Code
  8388. | [1027035] Microsoft Word RTF Processing Flaw Lets Remote Users Execute Arbitrary Code
  8389. | [1026911] Microsoft Office WPS File Heap Overflow Lets Remote Users Execute Arbitrary Code
  8390. | [1026910] Microsoft Works WPS File Heap Overflow Lets Remote Users Execute Arbitrary Code
  8391. | [1026909] Microsoft Forefront Unified Access Gateway Bugs Let Remote Users Obtain Potentially Sensitive Information and Conduct Browser Redirection Attacks
  8392. | [1026907] Microsoft .NET Parameter Validation Flaw Lets Remote Users Execute Arbitrary Code
  8393. | [1026905] Microsoft BizTalk Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
  8394. | [1026904] Microsoft Visual Basic Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
  8395. | [1026903] Microsoft Visual FoxPro Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
  8396. | [1026902] Microsoft Commerce Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
  8397. | [1026901] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
  8398. | [1026900] Microsoft Office Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
  8399. | [1026899] Microsoft SQL Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
  8400. | [1026794] Microsoft DirectWrite Unicode Character Processing Flaw Lets Remote Users Deny Service
  8401. | [1026792] Microsoft Visual Studio Lets Local Users Gain Elevated Privileges
  8402. | [1026791] Microsoft Expression Design DLL Loading Error Lets Remote Users Execute Arbitrary Code
  8403. | [1026789] Microsoft DNS Server Lets Remote Users Deny Service
  8404. | [1026686] Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting Attacks
  8405. | [1026685] Microsoft Windows Ancillary Function Driver Lets Local Users Gain Elevated Privileges
  8406. | [1026684] Microsoft Visio Viewer Multiple Bugs Let Remote Users Execute Arbitrary Code
  8407. | [1026681] Microsoft Silverlight Bugs Let Remote Users Execute Arbitrary Code
  8408. | [1026680] Microsoft .NET Bugs Let Remote Users Execute Arbitrary Code
  8409. | [1026677] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information
  8410. | [1026499] Microsoft Anti-Cross Site Scripting Library Flaw May Permit Cross-Site Scripting Attacks
  8411. | [1026497] Microsoft Windows ClickOnce Feature Lets Remote Users Execute Arbitrary Code
  8412. | [1026479] Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users
  8413. | [1026469] Microsoft ASP.NET Hash Table Collision Bug Lets Remote Users Deny Service
  8414. | [1026416] Microsoft Office IME (Chinese) Lets Local Users Gain Elevated Privileges
  8415. | [1026414] Microsoft Publisher Multiple Errors Let Remote Users Execute Arbitrary Code
  8416. | [1026413] Microsoft Internet Explorer DLL Loading Error Lets Remote Users Execute Arbitrary Code and HTML Processing Bugs Let Remote Users Obtain Information
  8417. | [1026412] Microsoft Active Directory Memory Access Error Lets Remote Authenticated Users Execute Arbitrary Code
  8418. | [1026411] Microsoft PowerPoint DLL Loading and OfficeArt Object Processing Flaws Let Remote Users Execute Arbitrary Code
  8419. | [1026410] Microsoft Office Excel File Memory Error Lets Remote Users Execute Arbitrary Code
  8420. | [1026409] Microsoft Office Use-After-Free Bug Lets Remote Users Execute Arbitrary Code
  8421. | [1026408] Microsoft Internet Explorer Error in Microsoft Time Component Lets Remote Users Execute Arbitrary Code
  8422. | [1026294] Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication
  8423. | [1026271] Microsoft Windows TrueType Font Parsing Flaw Lets Remote Users Execute Arbitrary Code
  8424. | [1026220] Microsoft Publisher 'Pubconv.dll' Memory Corruption Error Lets Remote Users Execute Arbitrary Code
  8425. | [1026169] Microsoft Forefront Unified Access Gateway Input Validation Flaws Permits Cross-Site Scripting, HTTP Response Splitting, and Denial of Service Attacks
  8426. | [1026168] Microsoft Host Integration Server Bugs Let Remote Users Deny Service
  8427. | [1026167] Microsoft Windows Ancillary Function Driver Lets Local Users Gain Elevated Privileges
  8428. | [1026164] Microsoft Active Accessibility Component DLL Loading Error Lets Remote Users Execute Arbitrary Code
  8429. | [1026162] Microsoft .NET Inheritance Restriction Error Lets Remote Users Execute Arbitrary Code
  8430. | [1026161] Microsoft Silverlight Inheritance Restriction Error Lets Remote Users Execute Arbitrary Code
  8431. | [1026160] Microsoft Internet Explorer Multiple Flaws Let Remote Users Execute Arbitrary Code
  8432. | [1026103] Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions
  8433. | [1026041] Microsoft Windows Components DLL Loading Error Lets Remote Users Execute Arbitrary Code
  8434. | [1026040] Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting and Information Disclosure Attacks
  8435. | [1026039] Microsoft Office DLL Loading Error and Unspecified Bug Lets Remote Users Execute Arbitrary Code
  8436. | [1026038] Microsoft Excel Multiple Bugs Let Remote Users Execute Arbitrary Code
  8437. | [1026037] Microsoft Windows Internet Name Service (WINS) Input Validation Flaw in ECommEndDlg() Lets Local Users Gain Elevated Privileges
  8438. | [1025937] Microsoft Windows DHCPv6 Processing Flaw Lets Remote Denial of Service to RPC Services
  8439. | [1025905] Microsoft .NET Socket Trust Validation Error Lets Remote Users Obtain Information and Redirect Certain Network Traffic
  8440. | [1025903] Microsoft Visual Studio Input Validation Hole Permits Cross-Site Scripting Attacks
  8441. | [1025902] Microsoft ASP.NET Chart Control Remote File Disclosure
  8442. | [1025896] Microsoft Visio Memory Corruption Errors Let Remote Users Execute Arbitrary Code
  8443. | [1025895] Microsoft Data Access Components Insecure Library Loading Lets Remote Users Execute Arbitrary Code
  8444. | [1025894] Microsoft DNS Server Flaws Let Remote Users Execute Arbitrary Code and Deny Service
  8445. | [1025893] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information
  8446. | [1025847] Microsoft Internet Explorer Flaw in Processing EUC-JP Encoded Characters Lets Remote Users Conduct Cross-Site Scripting Attacks
  8447. | [1025763] Microsoft Visio May Load DLLs Unsafely and Remotely Execute Arbitrary Code
  8448. | [1025760] Microsoft Windows Bluetooth Stack Memory Access Error Lets Remote Users Execute Arbitrary Code
  8449. | [1025675] Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code
  8450. | [1025655] Microsoft MHTML Input Validation Hole Permits Cross-Site Scripting Attacks
  8451. | [1025654] Microsoft Internet Explorer Vector Markup Language (VML) Object Access Error Lets Remote Users Execute Arbitrary Code
  8452. | [1025653] Microsoft Active Directory Input Validation Flaw in Certificate Services Web Enrollment Permits Cross-Site Scripting Attacks
  8453. | [1025649] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information
  8454. | [1025648] Microsoft SQL Server XML Editor External Entity Resolution Flaw Lets Remote Users Obtain Potentially Sensitive Information
  8455. | [1025647] Microsoft Visual Studio XML Editor External Entity Resolution Flaw Lets Remote Users Obtain Potentially Sensitive Information
  8456. | [1025646] Microsoft Office InfoPath XML Editor External Entity Resolution Flaw Lets Remote Users Obtain Potentially Sensitive Information
  8457. | [1025644] Microsoft Hyper-V VMBus Packet Validation Flaw Lets Local Users Deny Service
  8458. | [1025643] Microsoft Windows Ancillary Function Driver Lets Local Users Gain Elevated Privileges
  8459. | [1025642] Microsoft Excel Multiple Bugs Let Remote Users Execute Arbitrary Code
  8460. | [1025641] Microsoft .NET JIT Compiler Validation Flaw Lets Remote Users Execute Arbitrary Code
  8461. | [1025639] Microsoft Distributed File System Bugs Let Remote Users Deny Service and Execute Arbitrary Code
  8462. | [1025637] Microsoft Forefront Threat Management Gateway Bounds Validation Flaw in Winsock Provider Lets Remote Users Execute Arbitrary Code
  8463. | [1025636] Microsoft .NET Array Offset Error Lets Remote Users Execute Code
  8464. | [1025635] Microsoft Silverlight Array Offset Error Lets Remote Users Execute Arbitrary Code
  8465. | [1025634] Microsoft Windows OLE Automation Underflow Lets Remote Users Execute Arbitrary Code
  8466. | [1025513] Microsoft PowerPoint Memory Corruption Errors Let Remote Users Execute Arbitrary Code
  8467. | [1025512] Microsoft Windows Internet Name Service Socket Send Exception Handling Bug Lets Remote Users Execute Arbitrary Code
  8468. | [1025360] Microsoft Reader Memory Corruption Errors Let Remote Users Execute Arbitrary Code
  8469. | [1025359] Microsoft MHTML Stack Overflow Lets Remote Users Execute Arbitrary Code
  8470. | [1025347] Microsoft Fax Cover Page Editor Memory Corruption Error Lets Remote Users Execute Arbitrary Code
  8471. | [1025346] Microsoft Foundation Classes May Load DLLs Unsafely and Remotely Execute Arbitrary Code
  8472. | [1025344] Microsoft WordPad Parsing Error Lets Remote Users Execute Arbitrary Code
  8473. | [1025343] Microsoft Office DLL Loading and Graphic Object Processing Flaws Let Remote Users Execute Arbitrary Code
  8474. | [1025340] Microsoft PowerPoint Bugs Let Remote Users Execute Arbitrary Code
  8475. | [1025337] Microsoft Excel Multiple Bugs Let Remote Users Execute Arbitrary Code
  8476. | [1025335] Microsoft GDI+ EMF Image Integer Overflow Lets Remote Users Execute Arbitrary Code
  8477. | [1025334] Microsoft OpenType Compact Font Format (CFF) Driver Stack Overflow Lets Remote Users Execute Arbitrary Code
  8478. | [1025333] Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code
  8479. | [1025331] Microsoft .NET Stack Corruption Error in JIT Compiler Lets Remote Users Execute Arbitrary Code
  8480. | [1025330] Microsoft WMITools and Windows Messenger ActiveX Controls Let Remote Users Execute Arbitrary Code
  8481. | [1025327] Microsoft Internet Explorer Bugs Let Remote Users Obtain Potentially Sensitive Information, Execute Arbitrary Code, and Hijack User Clicks
  8482. | [1025312] Microsoft Windows Kernel Bug in AFD.sys Lets Local Users Deny Service
  8483. | [1025248] Microsoft Windows Includes Some Invalid Comodo Certificates
  8484. | [1025171] Microsoft Groove DLL Loading Error Lets Remote Users Execute Arbitrary Code
  8485. | [1025170] Microsoft DirectShow DLL Loading Error Lets Remote Users Execute Arbitrary Code
  8486. | [1025164] Microsoft Internet Explorer Lets Remote Users Spoof the Address Bar
  8487. | [1025117] Microsoft Malware Protection Engine Registry Processing Error Lets Local Users Gain Elevated Privileges
  8488. | [1025086] Microsoft Active Directory Heap Overflow in Processing BROWSER ELECTION Packets May Let Remote Users Execute Arbitrary Code
  8489. | [1025049] Microsoft Local Security Authority Subsystem Service (LSASS) Lets Local Users Gain Elevated Privileges
  8490. | [1025044] Microsoft JScript and VBScript Disclose Information to Remote Users
  8491. | [1025043] Microsoft Visio Memory Corruption Error in Processing Visio Files Lets Remote Users Execute Arbitrary Code
  8492. | [1025042] Microsoft Active Directory SPN Collosions May Let Remote Authenticated Users Deny Service
  8493. | [1025038] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
  8494. | [1025003] Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks
  8495. | [1024947] Microsoft Data Access Components (MDAC) Memory Corruption Errors in Processing DSN Data and ADO Records Let Remote Users Execute Arbitrary Code
  8496. | [1024940] Microsoft Internet Explorer Use-After-Free in 'mshtml.dll' May Let Remote Users Execute Arbitrary Code
  8497. | [1024925] Microsoft Fax Cover Page Editor Memory Corruption Error Lets Remote Users Execute Arbitrary Code
  8498. | [1024922] Microsoft Internet Explorer Recursive CSS Import Memory Corruption Error Lets Remote Users Execute Arbitrary Code
  8499. | [1024888] Microsoft Exchange Server RPC Processing Flaw Lets Remote Authenticated Users Deny Service
  8500. | [1024887] Microsoft Office Graphics Filters Let Remote Users Execute Arbitrary Code
  8501. | [1024886] Microsoft SharePoint Input Validation Flaw in Processing SOAP Requests Let Remote Users Execute Arbitrary Code
  8502. | [1024885] Microsoft Publisher Bugs Let Remote Users Execute Arbitrary Code
  8503. | [1024884] Microsoft Hyper-V Input Validation Flaw Lets Local Guest Operating System Users Deny Service
  8504. | [1024879] Microsoft Windows Internet Connection Signup Wizard May Load DLLs Unsafely and Remotely Execute Arbitrary Code
  8505. | [1024877] Microsoft Windows May Load DLLs Unsafely and Remotely Execute Arbitrary Code
  8506. | [1024874] Microsoft Windows Task Scheduler Lets Local Users Gain Elevated Privileges
  8507. | [1024872] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Domain Attacks
  8508. | [1024790] Microsoft Outlook Attachment Processing Flaw Lets Remote Users Deny Service
  8509. | [1024707] Microsoft Forefront Unified Access Gateway Input Validation Flaws Permit Cross-Site Scripting and URL Redirection Attacks
  8510. | [1024706] Microsoft PowerPoint Bugs Let Remote Users Execute Arbitrary Code
  8511. | [1024705] Microsoft Office Flaws Let Remote Users Execute Arbitrary Code
  8512. | [1024676] Microsoft Internet Explorer Freed Object Invalid Flag Reference Access Lets Remote Users Execute Arbitrary Code
  8513. | [1024630] Microsoft Internet Explorer 'window.onerror' Callback Lets Remote Users Obtain Information From Other Domains
  8514. | [1024559] Microsoft SharePoint Input Validation Hole in SafeHTML Permits Cross-Site Scripting Attacks
  8515. | [1024558] Microsoft Cluster Service Disk Permission Flaw Lets Local Users Gain Elevated Privileges
  8516. | [1024557] Microsoft Foundation Classes Library Buffer Overflow in Window Title Lets Remote Users Execute Arbitrary Code
  8517. | [1024552] Microsoft Office Excel Has Multiple Flaws That Let Remote Users Execute Arbitrary Code
  8518. | [1024551] Microsoft Office Word Processing Flaws Let Remote Users Execute Arbitrary Code
  8519. | [1024546] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code, Obtain Information, and Conduct Cross-Site Scripting Attacks
  8520. | [1024543] Microsoft .NET Framework JIT Compiler Memory Access Error Lets Remote Users Execute Arbitrary Code
  8521. | [1024459] Microsoft ASP.NET Padding Oracle Attack Lets Remote Users Decrypt Data
  8522. | [1024445] Microsoft Outlook Web Access Authentication Flaw Lets Remote Users Hijack User Sessions
  8523. | [1024443] Microsoft Local Security Authority Subsystem Service (LSASS) Heap Overflow Lets Remote Authenticated Users Execute Arbitrary Code
  8524. | [1024442] Microsoft WordPad Parsing Error in Text Converters Lets Remote Users Execute Arbitrary Code
  8525. | [1024441] Microsoft Windows RPC Memory Allocation Error Lets Remote Users Execute Arbitrary Code
  8526. | [1024440] Microsoft Internet Information Services Bugs Let Remote Users Bypass Authentication, Deny Service, and Execute Arbitrary Code
  8527. | [1024439] Microsoft Outlook Heap Overflow Lets Remote Users Execute Arbitrary Code
  8528. | [1024438] Microsoft Office Unicode Font Parsing in USP10.DLL Lets Remote Users Execute Arbitrary Code
  8529. | [1024312] Microsoft Windows Tracing Feature for Services Lets Local Users Gain Elevated Privileges
  8530. | [1024310] Microsoft Office Excel Flaw Lets Remote Users Execute Arbitrary Code
  8531. | [1024306] Microsoft Silverlight Memory Corruption Errors Let Remote Users Execute Arbitrary Code
  8532. | [1024305] Microsoft .NET Framework Virtual Method Delegate Processing Error Lets Remote Users Execute Arbitrary Code
  8533. | [1024304] Microsoft Cinepak Codec Memory Pointer Error Lets Remote Users Execute Arbitary Code
  8534. | [1024303] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Domain Attacks
  8535. | [1024302] Microsoft MPEG Layer-3 Codecs Stack Overflow Lets Remote Users Execute Arbitary Code
  8536. | [1024301] Microsoft XML Core Services (MSXML) HTTP Response Processing Flaw Lets Remote Users Execute Arbitrary Code
  8537. | [1024298] Microsoft Office Word RTF, Word, and HTML Processing Errors Let Remote Users Execute Arbitrary Code
  8538. | [1024216] Microsoft Windows Shell LNK Shortcut Processing Flaw Lets Users Execute Arbitrary Code
  8539. | [1024189] Microsoft Office Outlook Validation Error in Processing Attachments Lets Remote Users Execute Arbitrary Code
  8540. | [1024188] Microsoft Office Access ActiveX Controls Let Remote Users Execute Arbitrary Code
  8541. | [1024084] Microsoft Help and Support Center URL Escaping Flaw Lets Remote Users Execute Arbitrary Commands
  8542. | [1024080] Microsoft .NET XML Digital Signature Flaw May Let Remote Users Bypass Authentication
  8543. | [1024079] Microsoft Internet Information Services Memory Allocation Error Lets Remote Authenticated Users Execute Arbitrary Code
  8544. | [1024078] Microsoft SharePoint Input Validation Flaw in toStaticHTML API Permits Cross-Site Scripting Attacks
  8545. | [1024077] Microsoft SharePoint Help Page Processing Bug Lets Remote Users Deny Service
  8546. | [1024076] Microsoft Office Excel Has Multiple Flaws That Let Remote Users Execute Arbitrary Code
  8547. | [1024075] Microsoft Office Open XML File Format Converter for Mac Lets Local Users Gain Elevated Privileges
  8548. | [1024073] Microsoft Office COM Object Instantiation Error Lets Remote Users Execute Arbitrary Code
  8549. | [1024070] Microsoft Internet Explorer 8 Developer Tools ActiveX Control Memory Corruption Error Lets Remote Users Execute Arbitrary Code
  8550. | [1024068] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks
  8551. | [1023975] Microsoft Office Memory Corruption Error in VBE6.DLL Lets Remote Users Execute Arbitrary Code
  8552. | [1023974] Microsoft Visual Basic for Applications Memory Corruption Error in VBE6.DLL Lets Remote Users Execute Arbitrary Code
  8553. | [1023972] Microsoft Outlook Express Integer Overflow in Processing POP3/IMAP Responses Lets Remote Users Execute Arbitrary Code
  8554. | [1023938] Microsoft Office Visio Buffer Overflow in Processing DXF Files Lets Remote Users Execute Arbitrary Code
  8555. | [1023932] Microsoft Office SharePoint Input Validation Flaw in 'help.aspx' Permits Cross-Site Scripting Attacks
  8556. | [1023856] Microsoft Visio Index Calculation and Attribute Validation Flaws Let Remote Users Execute Code
  8557. | [1023855] Microsoft Exchange May Disclose Message Fragments to Remote Users
  8558. | [1023854] Microsoft Exchange Error in Parsing MX Records Lets Remote Users Deny Service
  8559. | [1023853] Microsoft Office Publisher TextBox Processing Buffer Overflow Lets Remote Users Execute Arbitrary Code
  8560. | [1023848] Microsoft MPEG Layer-3 Codecs Stack Overflow Lets Remote Users Execute Arbitary Code
  8561. | [1023773] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information
  8562. | [1023720] Microsoft Virtual PC/Server Lets Local Users Gain Elevated Privileges
  8563. | [1023699] Microsoft Internet Explorer Invalid Pointer Reference Lets Remote Users Execute Arbitrary Code
  8564. | [1023698] Microsoft Office Excel Bugs Let Remote Users Execute Arbitrary Code
  8565. | [1023571] Microsoft Windows Protocol Flaw in SSL Renegotiation Lets Remote Users Conduct Man-in-the-Middle Attacks
  8566. | [1023567] Microsoft Hyper-V Instruction Validation Bug Lets Local Users Deny Service
  8567. | [1023566] Microsoft Windows Kerberos Ticket-Granting-Ticket Processing Flaw Lets Remote Authenticated Users Deny Service
  8568. | [1023565] Microsoft Office Buffer Overflow in 'MSO.DLL' Lets Remote Users Execute Arbitrary Code
  8569. | [1023564] Microsoft Paint Integer Overflow Lets Remote Users Execute Arbitrary Code
  8570. | [1023563] Microsoft PowerPoint Buffer Overflows and Memory Errors Let Remote Users Execute Arbitrary Code
  8571. | [1023562] Microsoft DirectShow Heap Overflow Lets Remote Users Execute Arbitrary Code
  8572. | [1023560] Microsoft Internet Explorer Flaw in Microsoft Data Analyzer ActiveX Control Lets Remote Users Execute Arbitrary Code
  8573. | [1023542] Microsoft Internet Explorer Discloses Known Files to Remote Users
  8574. | [1023495] Microsoft Internet Explorer and Windows OS Shell Handler URL Validation Flaw Lets Remote Users Execute Arbitrary Code
  8575. | [1023494] Microsoft Internet Explorer Cross-Site Scripting Filter Can Be Bypassed
  8576. | [1023493] Microsoft Internet Explorer Multiple Memory Access Flaws Let Remote Users Execute Arbitrary Code
  8577. | [1023462] Microsoft Internet Explorer Invalid Pointer Reference Lets Remote Users Execute Arbitrary Code
  8578. | [1023432] Microsoft Embedded OpenType Font Engine Integer Overflow Lets Remote Users Execute Arbitrary Code
  8579. | [1023301] Microsoft Internet Explorer Indeo Codec Bugs Let Remote Users Execute Arbitrary Code
  8580. | [1023297] Microsoft Local Security Authority Subsystem Service Validation Flaw Lets Remote Users Deny Service
  8581. | [1023296] Microsoft Active Directory Federation Services Lets Remote Authenticated Users Execute Arbitrary Code and Spoof Web Sites
  8582. | [1023294] Microsoft Office Word and WordPad Text Converter Memory Errors Let Remote Users Execute Arbitrary Code
  8583. | [1023293] Microsoft Internet Explorer Memory Access Flaws Let Remote Users Execute Arbitrary Code
  8584. | [1023292] Microsoft Office Publisher Memory Allocation Validation Flaw Lets Remote Users Execute Arbitrary Code
  8585. | [1023291] Microsoft Internet Authentication Service Bugs Let Remote Authenticated Users Execute Arbitrary Code or Gain Privileges of the Target User
  8586. | [1023233] Microsoft Internet Explorer Discloses Local Path Names When Printing Local HTML Files to PDF Files
  8587. | [1023226] Microsoft Internet Explorer Invalid Pointer Reference in getElementsByTagName() Method Lets Remote Users Execute Arbitrary Code
  8588. | [1023158] Microsoft Word Memory Corruption Error Lets Remote Users Execute Arbitrary Code
  8589. | [1023157] Microsoft Excel Bugs Let Remote Users Execute Arbitrary Code
  8590. | [1023156] Microsoft Active Directory Stack Memory Consumption Flaw Lets Remote Users Deny Service
  8591. | [1023154] Microsoft License Logging Service Buffer Overflow Lets Remote Users Execute Arbitrary Code
  8592. | [1023153] Microsoft Web Services on Devices API (WSDAPI) Validation Error Lets Remote Users Execute Arbitrary Code
  8593. | [1023013] Microsoft Crypto API NULL Character Flaw in Common Name Field and ASN.1 Integer Overflow Lets Remote Users Spoof Certficiates
  8594. | [1023011] Microsoft Indexing Service ActiveX Control Lets Remote Users Execute Arbitrary Code
  8595. | [1023010] Microsoft Local Security Authority Subsystem Service (LSASS) Integer Underflow Lets Local Users Deny Service
  8596. | [1023009] Microsoft Silverlight Memory Modification Flaw Lets Remote Users Execute Arbitrary Code
  8597. | [1023008] Microsoft .NET Bugs Let Remote Users Execute Arbitrary Code
  8598. | [1023006] Microsoft GDI+ Overflows Let Remote Users Execute Arbitrary Code
  8599. | [1023002] Microsoft Internet Explorer Flaws Let Remote Users Execute Arbitrary Code
  8600. | [1022846] Microsoft Wireless LAN AutoConfig Service Heap Overflow Lets Remote Wireless Users Execute Arbitrary Code
  8601. | [1022843] Microsoft DHTML Editing Component ActiveX Control Lets Remote Users Execute Arbitrary Code
  8602. | [1022842] Microsoft JScript Scripting Engine Memory Corruption Error Lets Remote Users Execute Arbitrary Code
  8603. | [1022716] Microsoft Telnet NTLM Credential Reflection Flaw Lets Remote Users Gain Access
  8604. | [1022715] Microsoft ASP.NET Request Scheduling Flaw Lets Remote Users Deny Service
  8605. | [1022712] Microsoft Active Template Library (ATL) Bugs Let Remote Users Execute Arbitrary Code
  8606. | [1022710] Microsoft Windows Internet Name Service (WINS) Buffer Overflows Let Remote Users Execute Arbitrary Code
  8607. | [1022708] Microsoft Office Web Components Buffer Overflows in ActiveX Control Let Remote Users Execute Arbitrary Code
  8608. | [1022611] Microsoft Internet Explorer Memory Corruption Bugs Let Remote Users Execute Arbitrary Code
  8609. | [1022610] Microsoft Visual Studio Active Template Library Bugs Let Remote Users Execute Arbitrary Code
  8610. | [1022547] Microsoft Internet Security and Acceleration Server OTP Authentication Bug Lets Remote Users Access Resources
  8611. | [1022546] Microsoft Office Publisher Pointer Dereference Bug Lets Remote Users Execute Arbitrary Code
  8612. | [1022545] Microsoft DirectX DirectShow Validation Bugs Let Remote Users Execute Arbitrary Code
  8613. | [1022544] Microsoft Virtual PC/Server Lets Local Users Gain Elevated Privileges Within a Guest Operating System
  8614. | [1022535] Microsoft Office Web Components Bug in Spreadsheet ActiveX Control Lets Remote Users Execute Arbitrary Code
  8615. | [1022514] Microsoft DirectShow Buffer Overflow in ActiveX Control Lets Remote Users Execute Arbitrary Code
  8616. | [1022369] Microsoft PowerPoint Buffer Overflow in Freelance Translator Lets Remote Users Execute Arbitrary Code
  8617. | [1022358] Microsoft Internet Information Services WebDAV Bug Lets Remote Users Bypass Authentication
  8618. | [1022356] Microsoft Word Buffer Overflows Let Remote USers Execute Arbitrary Code
  8619. | [1022355] Microsoft Office Works Document Converter Bug Lets Remote Users Execute Arbitrary Code
  8620. | [1022354] Microsoft Works Document Converter Bug Lets Remote Users Execute Arbitrary Code
  8621. | [1022351] Microsoft Excel Bugs Let Remote Users Execute Arbitrary Code
  8622. | [1022350] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
  8623. | [1022349] Microsoft Active Directory Bugs Let Remote Users Execute Arbitrary Code or Deny Service
  8624. | [1022330] Microsoft Windows Bug in SETDESKWALLPAPER and GETDESKWALLPAPER Calls Let Local Users Deny Service
  8625. | [1022299] Microsoft DirectX Bug in DirectShow QuickTime Parser Lets Remote Users Execute Arbitrary Code
  8626. | [1022240] Microsoft Internet Information Server WebDAV Input Validation Flaw Lets Remote Users Execute Arbitrary Code
  8627. | [1022205] Microsoft PowerPoint Has Multiple Buffer Overflows and Memory Corruption Bugs That Let Remote Users Execute Arbitrary Code
  8628. | [1022047] Microsoft Windows SearchPath Function May Let Remote Users Execute Arbitrary Code
  8629. | [1022046] Microsoft ISA Server Input Validation Flaw in 'cookieauth.dll' Permits Cross-Site Scripting Attacks
  8630. | [1022045] Microsoft ISA Server TCP State Error Lets Remote Users Deny Service
  8631. | [1022044] Microsoft Windows Privilege Separation and Access Control Bugs Let Local Users Gain Elevated Privileges
  8632. | [1022043] Microsoft WordPad and Office Text Converter Bugs Let Remote Users Execute Arbitrary Code
  8633. | [1022042] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
  8634. | [1022040] Microsoft DirectX Bug in Decompressing DirectShow MJPEG Content Lets Remote Users Execute Arbitrary Code
  8635. | [1022039] Microsoft Excel Malformed Object Memory Corruption Bug Lets Remote Users Execute Arbitrary Code
  8636. | [1021967] Microsoft Office PowerPoint Invalid Object Access Bug Lets Remote Users Execute Arbitrary Code
  8637. | [1021880] Microsoft Internet Explorer Unspecified Bug Lets Remote Users Execute Arbitrary Code
  8638. | [1021831] Microsoft DNS Server Bugs Let Remote Users Spoof the DNS Service
  8639. | [1021830] Microsoft DNS Server Registration Validation Flaw Lets Remote Users Conduct Spoofing Attacks
  8640. | [1021829] Microsoft WINS Server Registration Validation Flaw Lets Remote Users Conduct Spoofing Attacks
  8641. | [1021744] Microsoft Excel Invalid Object Access Flaw Lets Remote Users Execute Arbitrary Code
  8642. | [1021702] Microsoft Visio Bugs Let Remote Users Execute Arbitrary Code
  8643. | [1021701] Microsoft Exchange MAPI Command Literal Processing Bug Lets Remote Users Deny Service
  8644. | [1021700] Microsoft Exchange Memory Corruption Error in Decoding TNEF Data Lets Remote Users Execute Arbitrary Code
  8645. | [1021699] Microsoft Internet Explorer Bugs in Handling CSS Sheets and Deleted Objects Lets Remote Users Execute Arbitrary Code
  8646. | [1021629] Microsoft Windows Guidelines for Disabling AutoRun are Ineffective and May Permit Code Execution
  8647. | [1021490] Microsoft SQL Server Heap Overflow Lets Remote Authenticated Users Execute Arbitrary Code
  8648. | [1021381] Microsoft Internet Explorer DHTML Data Binding Invalid Pointer Reference Bug Lets Remote Users Execute Arbitrary Code
  8649. | [1021376] Microsoft WordPad Word 97 Text Converter Memory Corruption Error Lets Remote Users Execute Arbitrary Code
  8650. | [1021371] Microsoft Internet Explorer HTML Processing Bugs Let Remote Users Execute Arbitrary Code
  8651. | [1021370] Microsoft Word Memory Corruption Errors Let Remote Users Execute Arbitrary Code
  8652. | [1021369] Microsoft Visual Basic DataGrid/FlexGrid/Heirarchival FlexGrid/Windows Common/Charts ActiveX Controls Let Remote Users Execute Arbitrary Code
  8653. | [1021368] Microsoft Excel Formula, Object, and Global Array Bugs Let Remote Users Execute Arbitrary Code
  8654. | [1021367] Microsoft Office SharePoint Server Access Control Flaw Lets Remote Users Gain Administrative Access
  8655. | [1021365] Microsoft GDI Buffer Overflows in Processing WMF Files Lets Remote Users Execute Arbitrary Code
  8656. | [1021363] Microsoft SQL Server Memory Overwrite Bug in sp_replwritetovarbin May Let Remote Users Execute Arbitrary Code
  8657. | [1021294] Microsoft Office Communicator VoIP Processing Bugs Let Remote Users Deny Service
  8658. | [1021164] Microsoft XML Core Services (MSXML) Bugs Let Remote Users Obtain Information and Execute Arbitrary Code
  8659. | [1021053] Microsoft Ancillary Function Driver 'afd.sys' Lets Local Users Gain Elevated Privileges
  8660. | [1021052] Microsoft Message Queuing (MSMQ) Heap Overflow Lets Remote Users Execute Arbitrary Code
  8661. | [1021047] Microsoft Internet Explorer Flaws Permit Cross-Domain Scripting Attacks and Let Remote Users Execute Arbitrary Code
  8662. | [1021045] Microsoft Office CDO Protocol Bug Lets Remote Users Execute Arbitrary Scripting Code
  8663. | [1021044] Microsoft Excel Object, Calendar, and Formula Bugs Let Remote Users Execute Arbitrary Code
  8664. | [1021043] Microsoft Host Integration Server RPC Buffer Overflow Lets Remote Users Execute Arbitrary Code
  8665. | [1021042] Microsoft Active Directory LDAP Memory Allocation Error Lets Remote Users Execute Arbitrary Code
  8666. | [1021020] Cisco Unity Bug in Microsoft API Lets Remote Users Deny Service
  8667. | [1021018] Microsoft Digital Image 'PipPPush.DLL' ActiveX Control Lets Remote Users Access Files
  8668. | [1020838] Microsoft GDI+ Integer Overflow in Processing BMP Files Lets Remote Users Execute Arbitrary Code
  8669. | [1020837] Microsoft GDI+ Buffer Overflow in Processing WMF Files Lets Remote Users Execute Arbitrary Code
  8670. | [1020836] Microsoft GDI+ Bug in Processing GIF Image Files Lets Remote Users Execute Arbitrary Code
  8671. | [1020835] Microsoft GDI+ Memory Corruption Error in Processing EMF Image Files Lets Remote Users Execute Arbitrary Code
  8672. | [1020834] Microsoft GDI+ Heap Overflow in Processing Gradient Sizes Lets Remote Users Execute Arbitrary Code
  8673. | [1020833] Microsoft Office OneNote Buffer Overflow Lets Remote Users Execute Arbitrary Code
  8674. | [1020679] Microsoft Outlook Express MTHML Redirect Bug Lets Remote Users Obtain Information
  8675. | [1020678] Microsoft Windows IPSec Policy May Not Be Enforced in Certain Cases
  8676. | [1020677] Microsoft Windows Event System Bugs Let Remote Authenticated Users Execute Arbitrary Code
  8677. | [1020676] Microsoft PowerPoint Memory Errors Let Remote Users Execute Arbitrary Code
  8678. | [1020675] Microsoft Color Management Module Heap Overflow Lets Remote Users Execute Arbitrary Code
  8679. | [1020674] Microsoft Internet Explorer Multiple Bugs Let Remote Users Execute Arbitrary Code
  8680. | [1020673] Microsoft Office Format Filter Bugs Let Remote Users Execute Arbitrary Code
  8681. | [1020672] Microsoft Excel Input Validation Bug in Parsing Records Lets Remote Users Execute Arbitrary Code
  8682. | [1020671] Microsoft Excel Input Validation Bug in Processing Array Index Values Lets Remote Users Execute Arbitrary Code
  8683. | [1020670] Microsoft Excel Input Validation Bug in Processing Index Values Lets Remote Users Execute Arbitrary Code
  8684. | [1020669] Microsoft Excel Credential Caching Bug Lets Local Users Gain Access to Remote Data Sources
  8685. | [1020607] Mac OS X Quick Look Buffer Overflow in Downloading Microsoft Office Files Lets Remote Users Execute Arbitrary Code
  8686. | [1020447] Microsoft Word Memory Corruption Error Lets Remote Users Execute Arbitrary Code
  8687. | [1020446] Microsoft Windows AutoRun Bug May Let Users Execute Arbitrary Code
  8688. | [1020441] Microsoft SQL Server Bugs Let Remote Authenticated Users Obtain Information and Execute Arbitrary Code
  8689. | [1020439] Microsoft Outlook Web Access for Exchange Server Input Validation Bugs Permit Cross-Site Scripting Attacks
  8690. | [1020433] Microsoft Access Snapshot Viewer ActiveX Control Lets Remote Users Download Files to Arbitrary Locations
  8691. | [1020382] Microsoft Internet Explorer Lets Remote Users Conduct Cross-Domain Scripting Attacks
  8692. | [1020232] Microsoft Speech API Lets Remote Users Execute Arbitrary Commands
  8693. | [1020229] Microsoft Active Directory LDAP Validation Bug Lets Remote Users Deny Service
  8694. | [1020228] Microsoft WINS Data Structure Validation Bug Lets Local Users Gain Elevated Privileges
  8695. | [1020226] Microsoft Internet Explorer HTTP Request Header Bug May Let Remote Users Obtain Information in a Different Domain
  8696. | [1020225] Microsoft Internet Explorer Bug in Processing Method Calls Lets Remote Users Execute Arbitrary Code
  8697. | [1020223] Microsoft DirectX SAMI File Validation Bug Lets Remote Users Execute Arbitrary Code
  8698. | [1020222] Microsoft DirectX MJPEG Stream Error Handling Bug Lets Remote Users Execute Arbitrary Code
  8699. | [1020016] Microsoft Malware Protection Engine Lets Remote Users Deny Service
  8700. | [1020015] Microsoft Publisher Bug in Processing Object Header Data Lets Remote Users Execute Arbitrary Code
  8701. | [1020014] Microsoft Word Memory Error in Processing CSS Values Lets Remote Users Execute Arbitrary Code
  8702. | [1020013] Microsoft Word Memory Error in Processing RTF Files Lets Remote Users Execute Arbitrary Code
  8703. | [1020006] Microsoft Windows XP 'i2omgmt.sys' Input Validation Flaw Lets Local Users Gain Elevated Privileges
  8704. | [1019804] Microsoft Visio Lets Remote Users Execute Arbitrary Code
  8705. | [1019801] Microsoft Internet Explorer Data Stream Processing Bug Lets Remote Users Execute Arbitrary Code
  8706. | [1019800] Microsoft Internet Explorer 'hxvz.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code
  8707. | [1019798] Microsoft GDI Buffer Overflow in Processing EMF and WMF Files Lets Remote Users Execute Arbitrary Code
  8708. | [1019797] Microsoft Project Memory Error Lets Remote Users Execute Arbitrary Code
  8709. | [1019738] Microsoft Office S/MIME Processing Lets Remote Users Access Arbitrary URLs
  8710. | [1019736] Microsoft Outlook S/MIME Processing Lets Remote Users Access Arbitrary URLs
  8711. | [1019686] Microsoft Jet Database Buffer Overflow in 'msjet40.dll' Lets Remote Users Execute Arbitrary Code via Word Documents
  8712. | [1019587] Microsoft Excel Input Validation Bug in Processing Conditional Formatting Values Lets Remote Users Execute Arbitrary Code
  8713. | [1019586] Microsoft Excel Input Validation Bug in Processing Rich Text Data Lets Remote Users Execute Arbitrary Code
  8714. | [1019585] Microsoft Excel Formula Parsing Error Lets Remote Users Execute Arbitrary Code
  8715. | [1019584] Microsoft Excel Input Validation Bug in Processing Style Record Data Lets Remote Users Execute Arbitrary Code
  8716. | [1019583] Microsoft Excel Flaw in Importing '.slk' Files Lets Remote Users Execute Arbitrary Code
  8717. | [1019582] Microsoft Excel Input Validation Bug in Processing Data Validation Records Lets Remote Users Execute Arbitrary Code
  8718. | [1019581] Microsoft Office Web Components DataSource Bug Lets Remote Users Execute Arbitrary Code
  8719. | [1019580] Microsoft Office Web Components URL Parsing Bug Lets Remote Users Execute Arbitrary Code
  8720. | [1019579] Microsoft Outlook 'mailto:' URL Validation Flaw Lets Remote Users Execute Arbitrary Code
  8721. | [1019578] Microsoft Office and Excel Memory Corruption Bugs Let Remote Users Execute Arbitrary Code
  8722. | [1019388] Microsoft Works/Microsoft Office Bug in Processing '.wps' Field Length Values Lets Remote Users Execute Arbitrary Code
  8723. | [1019387] Microsoft Works/Microsoft Office Bug in Processing '.wps' Header Index Table Lets Remote Users Execute Arbitrary Code
  8724. | [1019386] Microsoft Works/Microsoft Office Bug in Processing '.wps' File Section Length Headers Lets Remote Users Execute Arbitrary Code
  8725. | [1019385] Microsoft Internet Information Services Error in Processing ASP Page Input Lets Remote Users Execute Arbitrary Code
  8726. | [1019384] Microsoft Internet Information Services File Change Notification Bug Lets Local Users Gain Elevated Privileges
  8727. | [1019381] Microsoft Internet Explorer Argument Validation Flaw in 'dxtmsft.dll' Lets Remote Users Execute Arbitrary Code
  8728. | [1019380] Microsoft Internet Explorer Property Method Processing Bug Lets Remote Users Execute Arbitrary Code
  8729. | [1019379] Microsoft Internet Explorer HTML Layout Rendering Bug Lets Remote Users Execute Arbitrary Code
  8730. | [1019378] Microsoft Internet Explorer Buffer Overflow in Fox Pro ActiveX Control Lets Remote Users Execute Arbitrary Code
  8731. | [1019377] Microsoft Office Publisher Memory Corruption Bug Lets Remote Users Execute Arbitrary Code
  8732. | [1019376] Microsoft Office Publisher Invalid Memory Reference Bug Lets Remote Users Execute Arbitrary Code
  8733. | [1019375] Microsoft Office Object Processing Flaw Lets Remote Users Execute Arbitrary Code
  8734. | [1019374] Microsoft Word Memory Error Lets Remote Users Execute Arbitrary Code
  8735. | [1019258] Microsoft Visual Basic '.dsr' File Buffer Overflow Lets Remote Users Execute Arbitrary Code
  8736. | [1019200] Microsoft Excel File Header Bug Lets Remote Users Execute Arbitrary Code
  8737. | [1019165] Microsoft Windows LSASS Lets Local Users Gain Elevated Privileges
  8738. | [1019078] Microsoft Internet Explorer Object Access Bugs Let Remote Users Execute Arbitrary Code
  8739. | [1019077] Microsoft Message Queuing (MSMQ) Buffer Overflow Lets Remote Users Execute Arbitrary Code
  8740. | [1019073] Microsoft DirectX Bugs in Parsing SAMI, WAV, and AVI Files Let Remote Users Execute Arbitrary Code
  8741. | [1019033] Microsoft Web Proxy Auto-Discovery Name Server Resolution Bug Lets Remote Users Conduct Man-in-the-Middle Attacks
  8742. | [1018976] Microsoft Jet Engine Stack Overflow May Let Remote Users Execute Arbitrary Code
  8743. | [1018942] Microsoft Windows DNS Service Insufficent Entropy Lets Remote Users Spoof the DNS Service
  8744. | [1018903] Microsoft DebugView 'Dbgv.sys' Module Lets Local Users Gain Kernel Level Privileges
  8745. | [1018831] Microsoft Windows ShellExecute() URI Handler Bug Lets Remote Users Execute Arbitrary Commands
  8746. | [1018790] Microsoft Word Bug in Processing Office Files Lets Remote Users Execute Arbitrary Code
  8747. | [1018789] Microsoft SharePoint Input Validation Hole Permits Cross-Site Scripting Attacks
  8748. | [1018788] Microsoft Internet Explorer Bugs Let Remote Users Spoof the Address Bar and Execute Arbitrary Code
  8749. | [1018786] Microsoft Outlook Express Bug in Processing NNTP Responses Lets Remote Users Execute Arbitrary Code
  8750. | [1018727] Microsoft Internet Security and Acceleration Server SOCKS4 Proxy Discloses IP Address Information to Remote Users
  8751. | [1018677] Microsoft Agent ActiveX Control Memory Corruption Error Lets Remote Users Execute Arbitrary Code
  8752. | [1018676] Microsoft Visual Basic VBP File Buffer Overflow Lets Remote Users Execute Arbitrary Code
  8753. | [1018568] Microsoft Vector Markup Language Buffer Overflow Lets Remote Users Execute Arbitrary Code
  8754. | [1018567] Microsoft Virtual PC/Server Heap Overflow Lets Local Users Gain Elevated Privileges
  8755. | [1018563] Microsoft GDI Buffer Overflow Lets Remote Users Execute Arbitrary Code
  8756. | [1018562] Microsoft Internet Explorer CSS and ActiveX Control Bugs Let Remote Users Execute Arbitrary Code
  8757. | [1018561] Microsoft Excel Workspace Index Validation Bug Lets Remote Users Execute Arbitrary Code
  8758. | [1018560] Microsoft OLE Automation Memory Corruption Bug Lets Remote Users Execute Arbitrary Code
  8759. | [1018559] Microsoft Core XML Services Memory Corruption Error Lets Remote Users Execute Arbitrary Code
  8760. | [1018551] Microsoft DirectX Buffer Overflow in FlashPix ActiveX Control Lets Remote Users Execute Arbitrary Code
  8761. | [1018520] Microsoft Visual Database Tools Buffer Overflow in ActiveX Control Lets Remote Users Execute Arbitrary Code
  8762. | [1018420] Microsoft DirectX Heap Overflow in Processing RLE-Compressed Targa Images Lets Remote Users Execute Arbitrary Code
  8763. | [1018353] Microsoft Office Publisher Lets Remote Users Execute Arbitrary Code
  8764. | [1018352] Microsoft Excel Caculation Error and Memory Corruption Error Lets Remote Users Execute Arbitrary Code
  8765. | [1018351] Microsoft Internet Explorer Bug in Firefox URL Protocol Handler Lets Remote Users Execute Arbitrary Commands
  8766. | [1018321] Microsoft Excel Sheet Name Buffer Overflow Lets Remote Users Execute Arbitrary Code
  8767. | [1018251] Microsoft Office Buffer Overflow in MSODataSourceControl ActiveX Control May Let Remote Users Execute Arbitrary Code
  8768. | [1018235] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
  8769. | [1018202] Microsoft GDI+ ICO File Divide By Zero Bug Lets Remote Users Deny Service
  8770. | [1018193] Microsoft Internet Explorer Lets Remote Users Spoof Certain Objects
  8771. | [1018192] Microsoft Internet Explorer Input Validation Hole Permits Cross-Site Scripting Attacks
  8772. | [1018107] Microsoft Office Buffer Overflow in OUACTRL.OCX ActiveX Control Lets Remote Users Execute Arbitrary Code
  8773. | [1018019] Microsoft Internet Explorer Bugs Let Remote Users Modify Files or Execute Arbitrary Code
  8774. | [1018017] Microsoft CAPICOM 'CAPICOM.Certificates' ActiveX Control Lets Remote Users Execute Arbitrary Code
  8775. | [1018016] Microsoft BizTalk Server 'CAPICOM.Certificates' ActiveX Control Lets Remote Users Execute Arbitrary Code
  8776. | [1018015] Microsoft Exchange Base64, iCal, IMAP, and Attachment Processing Bugs Let Remote Users Deny Service or Execute Arbitrary Code
  8777. | [1018014] Microsoft Office Drawing Object Validation Flaw Lets Remote Users Execute Arbitrary Code
  8778. | [1018013] Microsoft Word Array and RTF Processing Bugs Let Remote Users Execute Arbitrary Code
  8779. | [1018012] Microsoft Excel Specially Crafted BIFF Records, Set Font Values, and Filter Records Permit Remote Code Execution
  8780. | [1017969] Microsoft Internet Explorer Digest Authentication Bug Lets Remote Users Conduct HTTP Request Splitting Attacks
  8781. | [1017910] Microsoft Windows DNS Service RPC Stack Overflow Lets Remote Users Execute Arbitrary Code
  8782. | [1017902] Microsoft Word Lets Remote Users Cause Arbitrary Code to Be Executed
  8783. | [1017901] Microsoft Windows Help File Heap Overflow Lets Remote Users Execute Arbitrary Code
  8784. | [1017896] Microsoft Agent URL Parsing Bug Lets Remote Users Execute Arbitrary Code
  8785. | [1017894] Microsoft Content Management Server Permits Cross-Site Scripting Attacks and Lets Remote Users Execute Arbitrary Code
  8786. | [1017827] Microsoft Windows Animated Cursor Bug Lets Remote Users Execute Arbitrary Code
  8787. | [1017752] Adobe JRun IIS Connector Bug Lets Remote Users Deny Service
  8788. | [1017736] Microsoft Windows Explorer OLE Parsing Bug Lets Users Deny Service
  8789. | [1017694] VeriSign Secure Messaging for Microsoft Exchange Stack Overflow in ConfigChk ActiveX Control Lets Remote Users Execute Arbitrary Code
  8790. | [1017653] Microsoft Word Unspecified Vulnerability Lets Remote Users Execute Arbitrary Code
  8791. | [1017643] Microsoft Internet Explorer Multiple COM Objects Let Remote Users Execute Arbitrary Code
  8792. | [1017642] Microsoft Internet Explorer FTP Server Response Memory Corruption Error Lets Remote Users Execute Arbitrary Code
  8793. | [1017641] Microsoft Windows RichEdit OLE Memory Corruption Error Lets Remote Users Execute Arbitrary Code
  8794. | [1017640] Microsoft Office OLE Memory Corruption Error Lets Remote Users Execute Arbitrary Code
  8795. | [1017639] Microsoft Word Macro Security Warning Bug and Drawing Object Memory Corrupution Error Lets Remote Users Execute Arbitrary Code
  8796. | [1017638] Microsoft MFC Memory Corruption Error Lets Remote Users Execute Arbitrary Code
  8797. | [1017637] Microsoft OLE Dialog RTF File Memory Corruption Error Lets Remote Users Execute Arbitrary Code
  8798. | [1017636] Microsoft Windows Defender Integer Overflow in Parsing PDF Files Lets Remote Users Execute Arbitrary Code
  8799. | [1017635] Microsoft HTML Help ActiveX Control Lets Remote Users Execute Arbitrary Code
  8800. | [1017632] Microsoft Step-by-Step Interactive Training Buffer Overflow in Processing Bookmark Links Lets Remote Users Execute Arbitrary Code
  8801. | [1017584] Microsoft Office Excel Buffer Overflow Lets Remote Users Execute Arbitrary Code
  8802. | [1017579] [Duplicate Entry] Microsoft Word Unspecified Vulnerability Lets Remote Users Execute Arbitrary Code
  8803. | [1017564] Microsoft Word Function Processing Bug Lets Remote Users Execute Arbitrary Code
  8804. | [1017530] Microsoft Help Workshop Buffer Overflow in Processing '.CNT' Files Lets Remote Users Execute Arbitrary Code
  8805. | [1017488] Microsoft Outlook '.iCal', '.oss', and SMTP Header Bugs Let Remote Users Execute Arbitrary Code or Deny Service
  8806. | [1017487] Microsoft Excel Buffer Overflows in Processing Various Records and Strings Lets Remote Users Execute Arbitrary Code
  8807. | [1017486] Microsoft Office Brazilian Portuguese Grammar Checker Lets Remote Users Execute Arbitrary Code
  8808. | [1017485] Microsoft Excel Memory Access Error Lets Remote Users Execute Arbitrary Code
  8809. | [1017441] Microsoft Windows Workstation Service Memory Allocation Error in NetrWkstaUserEnum() Lets Remote Users Deny Service
  8810. | [1017397] Microsoft Outlook Recipient ActiveX Control Lets Remote Users Deny Service
  8811. | [1017390] Microsoft Word Unchecked Count Vulnerability Lets Remote Users Execute Arbitrary Code
  8812. | [1017388] Microsoft Project Discloses Database Password to Remote Authenticated Users
  8813. | [1017374] Microsoft Internet Explorer May Disclose Contents of the Temporary Internet Files Folder to Remote Users
  8814. | [1017373] Microsoft Internet Explorer DHTML and Script Error Handling Bugs Let Remote Users Execute Arbitrary Code
  8815. | [1017369] Microsoft Outlook Express Buffer Overflow in Processing Windows Address Book Files Let Remote Users Execute Arbitrary Code
  8816. | [1017358] Microsoft Word Data Structure Processing Bug Lets Remote Users Cause Arbitrary Code to Be Executed
  8817. | [1017339] Microsoft Word String Processing Bug Lets Remote Users Execute Arbitrary Code
  8818. | [1017224] Microsoft Client Service for Netware Buffer Overflows Let Remote Users Execute Arbitrary Code and Crash the System
  8819. | [1017223] Microsoft Internet Explorer Bug in Rending HTML Layout Combinations May Let Remote Users Execute Arbitrary Code
  8820. | [1017222] Microsoft Agent '.ACF' File Memory Corruption Error Lets Remote Users Execute Arbitrary Code
  8821. | [1017168] Microsoft Windows Kernel GDI Data Structure Processing Bug Lets Local Users Gain Elevated Privileges
  8822. | [1017165] Microsoft Internet Explorer 'ieframe.dll' Lets Remote Users Spoof Invalid Certificates
  8823. | [1017157] Microsoft XML Core Services ActiveX Control Lets Remote Users Execute Arbitrary Code
  8824. | [1017142] Microsoft Visual Studio WMI Object Broker ActiveX Control Lets Remote Users Execute Arbitrary Code
  8825. | [1017133] Microsoft NAT Helper 'ipnathlp.dll' Lets Remote Users Deny Service
  8826. | [1017127] Microsoft Data Access Components 'ADODB.Connection' Execute Function Lets Remote Users Execute Arbitrary Code
  8827. | [1017122] Microsoft Internet Explorer Lets Remote Users Partially Spoof Address Bar URLs
  8828. | [1017059] Microsoft PowerPoint Bug Causes PowerPoint to Crash
  8829. | [1017034] Microsoft Office String, Chart Record, and SmartTag Validation Errors Let Remote Users Execute Arbitrary Code
  8830. | [1017033] Microsoft XML Core Services Lets Remote Users Execute Arbitrary Code or Obtain Information
  8831. | [1017032] Microsoft Word String and Mail Merge Record Validation Flaws Let Remote Users Execute Arbitrary Code
  8832. | [1017031] Microsoft Excel DATETIME/COLINFO Record Errors and Lotus 1-2-3 Errors Let Remote Users Execute Arbitrary Code
  8833. | [1017030] Microsoft PowerPoint Errors in Parsing Object Pointers and Data Records Lets Remote Users Execute Arbitrary Code
  8834. | [1016941] Microsoft Windows Shell Integer Overflow Lets Remote Users Execute Arbitrary Code
  8835. | [1016937] Microsoft PowerPoint Memory Corruption Bug Lets Remote Users Execute Arbitrary Code
  8836. | [1016886] [Duplicate] Microsoft PowerPoint Bug Lets Remote Users Execute Arbitrary Code
  8837. | [1016879] Microsoft Internet Explorer VML Buffer Overflow Lets Remote Users Execute Arbitrary Code
  8838. | [1016854] Microsoft Internet Explorer Buffer Overflow in 'daxctle.ocx' ActiveX in KeyFrame Method Control Lets Remote Users Execute Arbitrary Code
  8839. | [1016839] Microsoft Internet Explorer URLMON.DLL Buffer Overflow Lets Remote Users Execute Arbitrary Code
  8840. | [1016827] Microsoft PGM Implementation Buffer Overflow in MSMQ Service Lets Remote Users Execute Arbitrary Code
  8841. | [1016825] Microsoft Publisher Buffer Overflow in Parsing '.pub' Files Lets Remote Users Execute Arbitrary Code
  8842. | [1016787] Microsoft Word Record Validation Vulnerability Lets Remote Users Execute Arbitrary Code
  8843. | [1016764] Microsoft Internet Explorer (IE) Buffer Overflow in 'daxctle.ocx' ActiveX Control Lets Remote Users Execute Arbitrary Code
  8844. | [1016731] Microsoft Internet Explorer URL Buffer Overflow in Processing HTTP 1.1 Protocol with Compression Lets Remote Users Execute Arbitrary Code
  8845. | [1016720] [Duplicate Entry] Microsoft PowerPoint Unknown Bug May Let Remote Users Execute Arbitrary Code
  8846. | [1016663] Microsoft Internet Explorer Bugs Let Remote Users Obtain Information or Execute Arbitrary Code
  8847. | [1016657] Microsoft Office Buffer Overflow in Processing PowerPoint Records Lets Remote Users Execute Arbitrary Code
  8848. | [1016656] Microsoft Visual Basic for Applications Buffer Overflow Lets Remote Users Execute Arbitrary Code
  8849. | [1016655] Microsoft Management Console Input Validation Hole Permits Remote Code Execution
  8850. | [1016654] Microsoft Outlook Express MHTML Parsing Error Lets Remote Users Execute Arbitrary Code
  8851. | [1016506] Microsoft Internet Security and Acceleration Server HTTP File Exentsion Filter Can Be Bypassed By Remote Users
  8852. | [1016504] Microsoft Works Buffer Overflow in Processing Spreadsheet Files May Let Remote Users Execute Arbitrary Code
  8853. | [1016496] Microsoft PowerPoint 'mso.dll' Buffer Overflow May Let Remote Users Execute Arbitrary Code
  8854. | [1016472] Microsoft Excel Errors in Processing Various Malformed Records Let Remote Users Execute Arbitrary Code
  8855. | [1016470] Microsoft Office PNG and GIF File Buffer Error Lets Remote Users Execute Arbitrary Code
  8856. | [1016469] Microsoft Office String Parsing and Property Bugs Let Remote Users Execute Arbitrary Code
  8857. | [1016468] Microsoft DHCP Client Buffer Overflow Lets Remote Users Execute Arbitrary Code
  8858. | [1016453] Microsoft Office LsCreateLine() Function May Let Remote Users Execute Arbitrary Code
  8859. | [1016434] Microsoft HTML Help Heap Overflow in HHCtrl ActiveX Control May Let Remote Users Execute Arbitrary Code
  8860. | [1016430] Microsoft Excel STYLE Record Bug May Let Remote Users Execute Arbitrary Code
  8861. | [1016388] Microsoft Windows Explorer Lets Remote Users Access Information in Other Domains and Execute HTA Applications
  8862. | [1016344] Microsoft Excel 'Shockwave Flash Object' Lets Remote Users Execute Code Automatically
  8863. | [1016339] Microsoft Windows 'hlink.dll' Buffer Overflow in Processing Hyperlinks Lets Remote Users Execute Arbitrary Code
  8864. | [1016316] Microsoft Excel Memory Validation Flaw May Let Remote Users Cause Arbitrary Code to Be Executed
  8865. | [1016292] Microsoft Windows Buffer Overflow in AOL ART Image Rendering Library Lets Remote Users Execute Arbitrary Code
  8866. | [1016291] Microsoft Internet Explorer Multiple Memory and Access Control Errors Let Remote Users Execute Arbitrary Code
  8867. | [1016290] Microsoft Windows Buffer Overflow in TCP/IP Stack Lets Remote Users Execute Arbitrary Code
  8868. | [1016289] Microsoft RPC Mutual Authentication Bug Lets Remote Users Spoof Other Systems
  8869. | [1016287] Microsoft PowerPoint Buffer Overflow in Processing Malformed Records Lets Remote Users Execute Arbitrary Code
  8870. | [1016286] Microsoft Windows 98 Graphics Rendering Engine Buffer Overflow in Processing WMF Images Lets Remote Users Execute Arbitrary Code
  8871. | [1016283] Microsoft JScript Memory Corruption Bug Lets Remote Users Execute Arbitrary Code
  8872. | [1016280] Microsoft Outlook Web Access Input Validation Hole Permits Cross-Site Scripting Attacks
  8873. | [1016196] F-Secure Anti-Virus for Microsoft Exchange Buffer Overflow in Web Console May Let Remote Users Execute Arbitrary Code
  8874. | [1016130] Microsoft Word Lets Remote Users Cause Arbitrary Code to Be Executed
  8875. | [1016048] Microsoft Exchange Error in Processing iCAL/vCAL Properties Lets Remote Users Execute Arbitrary Code
  8876. | [1016047] Microsoft Distributed Transaction Coordinator Bugs Let Remote Users Deny Service
  8877. | [1016005] Microsoft Outlook Express 'mhtml:' Redirect URL Processing Lets Remote Users Bypass Security Domains
  8878. | [1016001] Microsoft Internet Explorer Bug in Processing Nested OBJECT Tags Lets Remote Users Execute Arbitrary Code
  8879. | [1015900] Microsoft Internet Explorer Parsing and State Errors Let Remote Users Execute Arbitrary Code
  8880. | [1015899] Microsoft Internet Explorer Lets Remote Users Spoof the Address Bar URL
  8881. | [1015898] Microsoft Outlook Express Buffer Overflow in Processing Windows Address Books Lets Remote Users Execute Arbitrary Code
  8882. | [1015897] Microsoft Windows Explorer COM Object Bug Lets Remote Users Execute Arbitrary Code
  8883. | [1015896] Microsoft FrontPage Server Extensions Input Validation Holes Permit Cross-Site Scripting Attacks
  8884. | [1015895] Microsoft SharePoint Team Services Input Validation Holes Permit Cross-Site Scripting Attacks
  8885. | [1015894] Microsoft Data Access Components RDS.Dataspace Access Control Bug Lets Remote Users Execute Arbitrary Code
  8886. | [1015892] Microsoft Internet Explorer Popup Window Object Bugs Let Remote Users Execute Scripting Code in Arbitrary Domains
  8887. | [1015855] Microsoft Office Array Index Boundary Error Lets Remote Users Execute Arbitrary Code
  8888. | [1015825] Microsoft ASP.NET Incorrect COM Component Reference Lets Remote Users Deny Service
  8889. | [1015812] Microsoft Internet Explorer createTextRange() Memory Error Lets Remote Users Execute Arbitrary Code
  8890. | [1015800] (Vendor Issues Fix) Microsoft Internet Explorer (IE) Lets Remote Users Cause HTA Files to Be Executed
  8891. | [1015794] (Vendor Issues Fix) Microsoft Internet Explorer 'mshtml.dll' Bug in Processing Multiple Action Handlers Lets Remote Users Deny Service
  8892. | [1015766] Microsoft Office and Excel Buffer Overflows Let Remote Users Execute Arbitrary Code
  8893. | [1015765] Microsoft Windows Services Have Unsafe Default ACLs That Let Remote Authenticated Users Gain Elevated Privileges
  8894. | [1015720] Microsoft Internet Explorer Modal Security Dialog Race Condition May Let Remote Users Install Code or Obtain Information
  8895. | [1015632] Microsoft PowerPoint May Let Users Access Contents of the Temporary Internet Files Folder
  8896. | [1015631] Microsoft Office Korean Input Method Editor Lets Local Users Gain Elevated Privileges
  8897. | [1015630] Microsoft Windows Web Client Buffer Overflow Lets Remote Authenticated Users Execute Arbitrary Code
  8898. | [1015629] Microsoft Windows IGMP Processing Bug Lets Remote Users Deny Service
  8899. | [1015595] Microsoft Windows UPnP/NetBT/SCardSvr/SSDP Services May Be Incorrectly Configured By 3rd Party Applications, Allowing Local Users to Gain Elevated Privileges
  8900. | [1015585] Microsoft HTML Help Workshop Buffer Overflow in Processing .hhp Files Lets Remote User Execute Arbitrary Code
  8901. | [1015559] Microsoft Internet Explorer Shockwave Flash Scripting Bug Lets Remote Users Deny Service
  8902. | [1015489] Microsoft Wireless Network Connection Software May Broadcast Ad-Hoc SSID Information in Certain Cases
  8903. | [1015461] Microsoft Outlook Buffer Overflow in Processing TNEF Messages Lets Remote Users Execute Arbitrary Code
  8904. | [1015460] Microsoft Exchange Buffer Overflow in Processing TNEF Messages Lets Remote Users Execute Arbitrary Code
  8905. | [1015459] Microsoft Windows Embedded Web Fonts Buffer Overflow Lets Remote Users Execute Arbitrary Code
  8906. | [1015453] Microsoft Windows Graphics Rendering Engine WMF File Memory Access Error Lets Remote Users Execute Arbitrary Code
  8907. | [1015416] Microsoft Windows Unspecified WMF Rendering Bug Lets Remote Users Execute Arbitrary Code
  8908. | [1015350] Microsoft Internet Explorer Bug in Using HTTPS Proxies May Disclose Web URLs to Remote Users
  8909. | [1015349] Microsoft Windows Internet Explorer May Let Remote Users Obfuscate the Download Dialog Box
  8910. | [1015348] Microsoft Internet Explorer Bug in Instantiating COM Objects May Let Remote Users Execute Arbitrary Code
  8911. | [1015347] Microsoft Windows 2000 Kernel APC Queue Bug Lets Local Users Gain Elevated Privileges
  8912. | [1015333] Microsoft Excel Unspecified Stack Overflow May Let Remote Users Cause Arbitrary Code to Be Executed
  8913. | [1015251] Microsoft Internet Explorer Bug in Processing Mismatched Document Object Model Objects May Let Remote Users Execute Arbitrary Code
  8914. | [1015233] Microsoft Windows RPC Service May Let Remote Users Deny Service
  8915. | [1015226] Microsoft AntiSpyware Improper CreateProcess() Call Lets Local Users Execute Arbitrary Code
  8916. | [1015168] Microsoft Windows Buffer Overflows in Graphics Rendering Engine Lets Remote Users Execute Arbitrary Code
  8917. | [1015143] F-Secure Anti-Virus for Microsoft Exchange Web Console May Disclose Files to Remote Users
  8918. | [1015101] Microsoft Internet Explorer J2SE Runtime Environment Bug Lets Remote Users Crash the Target User's Browser
  8919. | [1015044] Microsoft Windows Multiple COM Objects Let Remote Users Execute Arbitrary Code
  8920. | [1015043] Microsoft Network Connection Manager Lets Remote Users Deny Service
  8921. | [1015042] Microsoft Windows Plug and Play Buffer Overflow Lets Remote Users Execute Arbitrary Code
  8922. | [1015041] Microsoft Client Service for NetWare Buffer Overflow Lets Remote Users Execute Arbitrary Code
  8923. | [1015040] Microsoft Windows Shell Bugs in Processing '.lnk' Files and in Web View Preview Mode Lets Remote Users Execute Arbitrary Code
  8924. | [1015039] Microsoft Windows Buffer Overflow in Collaboration Data Objects Lets Remote Users Execute Arbitrary Code
  8925. | [1015038] Microsoft Exchange Buffer Overflow in Collaboration Data Objects Lets Remote Users Execute Arbitrary Code
  8926. | [1015037] Microsoft Windows Buffer Overflows in MSDTC and COM+ Let Remote Users Execute Arbitrary Code and Local User Gain Elevated Privileges
  8927. | [1015036] Microsoft Windows FTP Client Input Validation Hole Lets Remote Servers Create/Overwrite Files on the Target User's System
  8928. | [1015034] Microsoft DirectX DirectShow Buffer Overflow Lets Remote Users Execute Arbitrary Code
  8929. | [1014829] Microsoft Windows Firewall User Interface May Not Properly Display Exception Rules
  8930. | [1014809] Microsoft Internet Explorer Unspecified Bug May Permit Remote Code Execution
  8931. | [1014727] Microsoft 'msdds.dll' COM Object Lets Remote Users Execute Arbitrary Code
  8932. | [1014643] Microsoft Internet Explorer COM Object Instantiation Bug May Let Remote Users Execute Arbitrary Code
  8933. | [1014642] Microsoft Windows Kerberos and PKINIT Vulnerabilities Allow Denial of Service, Information Disclosure, and Spoofing
  8934. | [1014641] Microsoft Internet Explorer Web Folder URL Validation Bug Lets Remote Users Execute Scripting Code in an Arbitrary Security Domain
  8935. | [1014640] Microsoft Windows Plug and Play Stack Overflow Lets Remote Users Execute Arbitrary Code
  8936. | [1014639] Microsoft Windows Telephony Service Remote Code Execution or Local Privilege Escalation
  8937. | [1014638] Microsoft Windows Print Spooler Service Buffer Overflow Lets Remote Users Execute Arbitrary Code
  8938. | [1014501] Hosting Controller 'IISActions.asp' Script Lets Remote Authenticated Users Add Domains/Subdomains
  8939. | [1014500] Microsoft Internet Explorer (IE) JPEG Rendering Bugs Let Remote Users Deny Service or Execute Arbitrary Code
  8940. | [1014498] Microsoft Windows Remote Desktop Protocol Bug Lets Remote Users Deny Service
  8941. | [1014458] Microsoft Office Buffer Overflow in Parsing Fonts Lets Remote Users Cause Arbitrary Code to Be Executed
  8942. | [1014457] Microsoft Microsoft Color Management Module Lets Remote Users Execute Arbitrary Code
  8943. | [1014417] Microsoft Windows Named Pipe NULL Session Bugs in svcctl and eventlog RPC Interfaces Disclose Information to Remote Users
  8944. | [1014364] Microsoft Internet Information Server May Allow Remote Users to Conduct HTTP Response Smuggling Attacks
  8945. | [1014356] Microsoft ISA Server May Accept HTTP Authentication Even When SSL Is Required
  8946. | [1014352] Microsoft Front Page May Crash When Editing a Specially Crafted Web Page
  8947. | [1014329] Microsoft Internet Explorer 'javaprxy.dll' COM Object Exception Handling Lets Remote Users Execute Arbitrary Code
  8948. | [1014261] Microsoft Internet Explorer Lets Remote Users Spoof Javascript Dialog Boxes
  8949. | [1014201] Microsoft Internet Explorer Buffer Overflow in Rendering PNG Images Lets Remote Users Execute Arbitrary Code
  8950. | [1014200] Microsoft Outlook Express Buffer Overflow in NNTP Response Parser Lets Remote Users Execute Arbitrary Code
  8951. | [1014199] Microsoft Outlook Web Access Input Validation Hole in IMG Tags Permits Cross-Site Scripting Attacks
  8952. | [1014198] Microsoft Windows Buffer Overflow in Processing Server Message Block Packets Lets Remote Users Execute Arbitrary Code
  8953. | [1014197] Microsoft Agent Lets Remote Users Spoof Security Dialog Box Contents
  8954. | [1014196] Microsoft Windows Buffer Overflow in Web Client Service Lets Remote Authenticated Users Execute Arbitrary Code
  8955. | [1014195] Microsoft HTML Help Input Validation Flaw Lets Remote Users Execute Arbitrary Code
  8956. | [1014194] Microsoft Step-by-Step Interactive Training Bookmark Link File Validation Flaw Lets Remote Users Execute Arbitrary Code
  8957. | [1014193] Microsoft Internet Security and Acceleration Server Bugs Let Remote Users Poison the Cache and Establish NetBIOS Connections
  8958. | [1014174] Microsoft Internet Explorer Lets Remote Users Obfuscate Scripting Code
  8959. | [1014113] Microsoft ISA Server in SecureNAT Configuration Can Be Crashed By Remote Users
  8960. | [1014050] Computer Associates eTrust Antivirus Integer Overflow in Processing Microsoft OLE Data Lets Remote Users Execute Arbitrary Code
  8961. | [1013996] Microsoft ASP.NET May Disclose System Information to Remote Users in Certain Cases
  8962. | [1013761] Microsoft Windows Explorer 'webvw.dll' Input Validation Error Lets Remote Users Execute Arbitrary Scripting Code
  8963. | [1013724] RSA Authentication Agent for Web for IIS Input Validation Bug Lets Remote Users Conduct Cross-Site Scripting Attacks
  8964. | [1013692] Microsoft Internet Explorer Buffer Overflows in DHTML, URL Parsing, and Content Advisor Let Remote Users Execute Arbitrary Code
  8965. | [1013691] Microsoft Message Queuing Buffer Overflow Lets Remote Users Execute Arbitrary Code
  8966. | [1013689] Microsoft Windows Shell MSHTA Lets Remote Users Code Execute Arbitrary Scripting Code
  8967. | [1013688] Microsoft Windows Kernel and Font Buffer Overflows Let Local Users Deny Service or Obtain System Privileges
  8968. | [1013687] Microsoft Exchange Heap Overlow in Processing Extended SMTP Verb Lets Remote Users Execute Arbitrary Code
  8969. | [1013686] Microsoft Windows TCP, IP, and ICMP Processing Errors Let Remote Users Deny Service and Execute Arbitrary Code
  8970. | [1013684] Microsoft Word Unspecified Buffer Overflow in Processing Documents Lets Remote Users Execute Arbitrary Code
  8971. | [1013669] Microsoft Outlook Web Access 'From' Address Display Lets Remote Users Spoof Origination Addresses
  8972. | [1013668] Microsoft Outlook 'From' Address Display Lets Remote Users Spoof Origination Addresses
  8973. | [1013618] Microsoft Jet Database Buffer Overflow in 'msjet40.dll' Lets Remote Users Execute Arbitrary Code
  8974. | [1013583] Microsoft Outlook Connector for IBM Lotus Domino Lets Users Bypass Password Storage Policy
  8975. | [1013552] Microsoft Windows Remote Desktop 'TSShutdn.exe' Lets Remote Authenticated Users Shutdown the System
  8976. | [1013454] Microsoft Office InfoPath 2003 May Disclose System and Authentication Information to Remote Users
  8977. | [1013284] Microsoft Windows 2000 and XP Group Policy Can Be Bypassed By Microsoft Office Applications and By Flash Drives
  8978. | [1013205] Microsoft Internet Explorer Can Be Crashed With URL Containing Special URL Characters
  8979. | [1013126] Microsoft Internet Explorer CDF Scripting Error Lets Remote Users Execute Scripting Code in Arbitrary Domains
  8980. | [1013125] Microsoft Internet Explorer DHTML Method Heap Overflow Lets Remote Users Execute Arbitrary Code
  8981. | [1013124] Microsoft Internet Explorer URL Encoding Error Lets Remote Users Spoof Arbitrary URLs and Execute Scripting Code in Arbitrary Security Zone
  8982. | [1013120] Microsoft Windows OLE Buffer Overflow Lets Remote Users Execute Arbitrary Code and COM Access Flaw Lets Remote Authenticated Users Gain Elevated Privileges
  8983. | [1013119] Microsoft Windows Hyperlink Object Library Lets Remote Users Execute Arbitrary Code
  8984. | [1013117] Microsoft Windows License Logging Service Lets Remote Users Execute Arbitrary Code
  8985. | [1013115] Microsoft Windows Media Player Buffer Overflow in Processing PNG Files Lets Remote Users Execute Arbitrary Code
  8986. | [1013114] Microsoft Windows SMB Lets Remote Users Execute Arbitrary Code
  8987. | [1013112] Microsoft Windows XP Named Pipe Validation Error Lets Remote Users Obtain Information
  8988. | [1013111] Microsoft SharePoint Services Redirection Query Input Validation Hole Lets Remote Users Conduct Cross-Site Scripting Attacks
  8989. | [1013110] Microsoft Office XP Buffer Overflow in Processing URLs Lets Remote Users Execute Arbitrary Code
  8990. | [1013086] Microsoft Outlook Web Access 'owalogon.asp' Lets Remote Users Redirect Login Requests
  8991. | [1012891] Microsoft IE Windows XP SP2 File Download Security Can Be Bypassed With Dynamic IFRAME Tag
  8992. | [1012836] Microsoft HTML Help Active Control Cross-Domain Error Lets Remote Users Execute Arbitrary Commands
  8993. | [1012835] Microsoft Cursor and Icon Validation Error Lets Remote Users Execute Arbitrary Code
  8994. | [1012684] Microsoft Windows LoadImage API Buffer Overflow Lets Remote Users Execute Arbitrary Code
  8995. | [1012683] Microsoft Windows ANI File Parsing Errors Let Remote Users Deny Service
  8996. | [1012682] Microsoft Windows Help System Buffer Overflows in Processing Phrase Compressed Help Files Lets Remote Users Execute Arbitrary Code
  8997. | [1012626] Microsoft Windows Media Player setItemInfo Lets Remote Users Execute Arbitrary Code
  8998. | [1012584] Microsoft IE dhtmled.ocx Lets Remote Users Execute Cross-Domain Scripting Attacks
  8999. | [1012518] Microsoft HyperTerminal Buffer Overflow Lets Remote Users Execute Arbitrary Code
  9000. | [1012517] Microsoft WINS Buffer Overflow in Name Value Lets Remote Users Execute Arbitrary Code
  9001. | [1012515] Microsoft Windows NT 4.0 Buffer Overflows in the Logging and Processing of DHCP Packets May Let Remote Users Execute Arbitrary Code
  9002. | [1012514] Microsoft WordPad Error in Converting Tables/Fonts Lets Remote Users Execute Arbitrary Code
  9003. | [1012513] Microsoft Windows Kernel Buffer Overflow in Processing Local Procedure Call Messages Lets Local Users Gain System Privileges
  9004. | [1012512] Microsoft LSASS Bug in Validating Identity Tokens Lets Local Users Gain Elevated Privileges
  9005. | [1012458] Microsoft Internet Explorer Lets Remote Users Inject Content into Open Windows
  9006. | [1012444] Microsoft Internet Explorer Input Validation Error in Processing FTP URLs May Let Remote Users Inject Arbitrary FTP Commands
  9007. | [1012435] Microsoft Windows Resource Kit Buffer Overflow and Input Validation Holes in 'w3who.dll' May Permit Remote Code Execution and Cross-Site Scripting Attacks
  9008. | [1012341] Microsoft WINS Memory Overwrite Lets Remote Users Execute Arbitary Code
  9009. | [1012288] Microsoft IE Custom 404 Error Message and execCommand SaveAs Lets Remote Users Bypass XP SP2 Download Warning Mechanisms
  9010. | [1012234] Microsoft Internet Explorer on XP SP2 Has Unspecified Flaws That Let Remote Users Bypass File Download Restrictions
  9011. | [1012155] Microsoft Internet Security and Acceleration Server Reverse DNS Caching Bug Lets Remote Users Spoof Web Sites
  9012. | [1012154] Microsoft Proxy Server Reverse DNS Caching Bug Lets Remote Users Spoof Web Sites
  9013. | [1012138] Microsoft IE Discloses Whether Specified Files Exist to Remote Users
  9014. | [1012057] F-Secure Anti-Virus for Microsoft Exchange Lets Remote Users Bypass Anti-Virus Detection With a ZIP Archive
  9015. | [1012049] (Exploit Code Has Been Released) Microsoft Internet Explorer Buffer Overflow in IFRAME/EMBED Tag Processing Lets Remote Users Execute Arbitrary Code
  9016. | [1011987] Microsoft Internet Explorer Lets Remote Users Spoof the Status Bar Address with a Table Within a Link
  9017. | [1011940] Microsoft Remote Desktop on Windows XP Lets Remote Authenticated Users Restart the System
  9018. | [1011895] Microsoft IE for Mac Multi-Window Browsing Errors Let Remote Users Spoof Sites
  9019. | [1011890] Microsoft Outlook May Display Images in Plaintext Only Mode
  9020. | [1011880] Microsoft Windows XP Error in Explorer in Processing WAV Files Lets Remote Users Deny Service
  9021. | [1011859] Microsoft Internet Explorer on Windows XP Fails to Restrict Drag and Drop Operations When Configured to Disable These Operations
  9022. | [1011851] Microsoft IE AnchorClick Behavior and HTML Help Let Remote Users Execute Arbitrary Code
  9023. | [1011735] Microsoft Internet Explorer May Display the Incorrect URL When Loading a Javascript Homepage
  9024. | [1011706] Microsoft Operating System 'asycpict.dll' Lets Remote Users Crash the System
  9025. | [1011678] Microsoft IE MSN 'heartbeat.ocx' Component Has Unspecified Flaw
  9026. | [1011647] Microsoft Windows Shell Buffer Overflows Let Remote Users Execute Arbitrary Code
  9027. | [1011646] Microsoft Program Group Converter Buffer Overflow Lets Remote Users Execute Arbitrary Code
  9028. | [1011645] Microsoft Various Operating System Flaws Lets Remote Users Execute Code and Local Users Gain Elevated Privileges or Deny Service
  9029. | [1011644] Microsoft IE Plug-in Navigation Flaw Lets Remote Users Spoof URLs in the Addresses Bar
  9030. | [1011643] Microsoft IE Double Byte Parsing Flaw Lets Remote Users Spoof URLs in the Addresses Bar
  9031. | [1011642] Microsoft IE SSL Caching Flaw Lets Remote Users Run Scripting Code in the Context of Arbitrary Secure Sites
  9032. | [1011640] Microsoft IE Buffer Overflow in Install Engine Lets Remote Users Execute Arbitrary Code
  9033. | [1011639] Microsoft IE Buffer Overflow in Processing Cascading Style Sheets Lets Remote Users Execute Arbitrary Code
  9034. | [1011637] Microsoft Windows Buffer Overflow in Processing Compressed Folders Lets Remote Users Execute Arbitrary Code
  9035. | [1011636] Microsoft SMTP Service Buffer Overflow in Processing DNS Responses May Let Remote Users Execute Arbitrary Code
  9036. | [1011635] Microsoft Excel Unspecified Flaw Lets Remote Users Execute Arbitrary Code
  9037. | [1011634] Microsoft NetDDE Buffer Overflow Lets Remote Users Execute Arbitrary Code With System Privileges
  9038. | [1011632] Microsoft NT RPC Runtime Library Buffer Overflow Lets Remote Users Deny Service
  9039. | [1011631] Microsoft NNTP Buffer Overflow Lets Remote Users Execute Arbitrary Code With SYSTEM Privileges
  9040. | [1011626] Microsoft Cabarc Directory Traversal Flaw Lets Remote Users Create/Overwrite Files on the Target System
  9041. | [1011565] Microsoft Word Parsing Flaw May Let Remote Users Execute Arbitrary Code
  9042. | [1011563] Microsoft Internet Explorer Lets Remote Users Access XML Documents
  9043. | [1011559] Microsoft .NET Forms Authentication Can Be Bypassed By Remote Users
  9044. | [1011434] Microsoft SQL Server Can Be Crashed By Remote Users Sending a Specially Crafted Large Buffer
  9045. | [1011332] Microsoft Internet Explorer Bug in Setting Cookies in Certain Domains May Let Remote Users Conduct Session Fixation Attacks
  9046. | [1011253] Microsoft GDI+ Buffer Overflow in Processing JPEG Images Lets Remote Users Execute Arbitrary Code
  9047. | [1011252] Microsoft Works Suite Buffer Overflow in WordPerfect Converter Lets Remote Users Execute Arbitrary Code
  9048. | [1011251] Microsoft Publisher Buffer Overflow in WordPerfect Converter Lets Remote Users Execute Arbitrary Code
  9049. | [1011250] Microsoft FrontPage Buffer Overflow in WordPerfect Converter Lets Remote Users Execute Arbitrary Code
  9050. | [1011249] Microsoft Office Buffer Overflow in WordPerfect Converter Lets Remote Users Execute Arbitrary Code
  9051. | [1011200] F-Secure Anti-Virus for Microsoft Exchange Input Validation Bug in Content Scanner Server Lets Remote Users Deny Service
  9052. | [1011141] HP Systems Insight Manager May Not Let Users Login After Applying a Microsoft Security Patch
  9053. | [1011067] Microsoft Outlook Express May Disclose 'bcc:' Recipient Addresses
  9054. | [1011043] Microsoft Internet Explorer Local File IFRAME Error Response Lets Remote Users Determine if Files or Directories Exist
  9055. | [1010996] Microsoft Windows XP SP2 Local Computer Scripting Restrictions Can Be Bypassed With a Specially Crafted MHT File
  9056. | [1010992] Microsoft Internet Security and Acceleration Server Does Not Block FTP Bounce Attacks
  9057. | [1010959] Microsoft Windows Explorer (in XP SP2) May Fail to Warn Users When Executing Untrusted Files
  9058. | [1010957] Microsoft Internet Explorer Unregistered Protocol State Error Lets Remote Users Spoof Location Bar
  9059. | [1010916] Microsoft Outlook Web Access Input Validation Hole in Redirection Query Permits Cross-Site Scripting Attacks
  9060. | [1010827] Microsoft Internet Explorer Error in 'mshtml.dll' in Processing GIF Files Lets Remote Users Crash the Browser
  9061. | [1010713] Microsoft Systems Management Server (SMS) Client Can Be Crashed By Remote Users
  9062. | [1010694] Microsoft IE Lets Remote Users Spoof Filenames Using CLSIDs
  9063. | [1010693] Microsoft Internet Explorer 'shell:' Protocol Lets Remote Users Execute Arbitrary Scripting Code in the Local Zone
  9064. | [1010690] Microsoft HTML Help Input Validation Error Lets Remote Users Execute Arbitrary Code
  9065. | [1010688] Microsoft Windows Task Scheduler Buffer Overflow Lets Remote Users Execute Arbitrary Code
  9066. | [1010687] Microsoft Windows 2000/NT POSIX Subsystem Buffer Overflow Lets Local Users Gain Elevated Privileges
  9067. | [1010686] Microsoft Utility Manager Permits Local Applications to Run With Elevated Privileges
  9068. | [1010683] Microsoft Internet Explorer Same Name Javascript Bug Lets Remote Users Execute Arbitrary Javascript in the Domain of an Arbitrary Site
  9069. | [1010679] Microsoft Internet Explorer Access Control Flaw in popup.show() Lets Remote Users Execute Mouse-Click Actions
  9070. | [1010673] Microsoft Internet Explorer Can Be Crashed By Remote Users With Large Text Files
  9071. | [1010550] Microsoft MN-500 Wireless Base Station Lets Remote Users Deny Administrative Access
  9072. | [1010491] Microsoft Internet Explorer Crashes When Saving Files With Special Character Strings
  9073. | [1010482] Microsoft Internet Explorer '%2F' URL Parsing Error Lets Remote Users Spoof Sites in the Trusted Zone
  9074. | [1010479] (US-CERT Issues Advisory) Microsoft Internet Explorer Cross-Domain Redirect Hole Lets Remote Users Execute Arbitrary Code
  9075. | [1010427] Microsoft DirectX DirectPlay Input Validation Error Lets Remote Users Crash the Application
  9076. | [1010352] Microsoft Windows 2000 Domains With Eight Characters May Let Remote Users With Expired Passwords Login
  9077. | [1010314] Microsoft Windows IPSec Filtering Can Be Bypassed By Remote Users
  9078. | [1010189] Microsoft Outlook 2003 Scripting Restrictions Can Be Bypassed By Remote Users
  9079. | [1010175] Microsoft Visual Basic Buffer Overflow May Let Local Users Gain Elevated Privileges
  9080. | [1010166] Microsoft Outlook Express Mail Troubleshooting Function May Disclose SMTP Password to Local Users
  9081. | [1010165] Microsoft Internet Explorer Image Map URL Display Error Lets Remote Users Spoof URLs
  9082. | [1010157] Microsoft Internet Explorer showHelp Path Search Lets Remote Users Load Existing Local CHM Files
  9083. | [1010125] Microsoft Outlook 2003 Lets Remote Users Send E-mail to Cause the Recipient's Client to Contact a Remote Server
  9084. | [1010119] Microsoft Help and Support Center HCP URL Validation Error May Let Remote Users Execute Arbitrary Code If User Interactions Occur
  9085. | [1010092] Microsoft Internet Explorer 'file://' URL Processing Flaw Lets Remote Users Damage the Registry
  9086. | [1010009] Microsoft Internet Explorer SSL Icon Error May Let Remote Users Impersonate Secure Web Sites
  9087. | [1009940] Microsoft Windows Explorer Buffer Overflow in Processing SMB Share Names Lets Remote Users Execute Arbitrary Code
  9088. | [1009939] Microsoft Internet Explorer Buffer Overflow in Processing SMB Share Names Lets Remote Users Execute Arbitrary Code
  9089. | [1009778] Microsoft H.323 Buffer Overflow Lets Remote Users Execute Arbitrary Code
  9090. | [1009777] Microsoft SSL Library Input Validation Error Lets Remote Users Crash the Service
  9091. | [1009776] Microsoft Windows Kernel Local Descriptor Table Flaw Lets Local Users Gain Elevated Privileges
  9092. | [1009771] Microsoft Windows Negotiate Security Software Provider (SSP) Buffer Overflow Lets Remote and Local Users Execute Arbitrary Code
  9093. | [1009770] Microsoft Windows Management Interface Provider Lets Local Users Gain Elevated Privileges
  9094. | [1009769] Microsoft Utility Manager Lets Local Users Run Applications With Elevated Privileges
  9095. | [1009768] Microsoft Winlogon Buffer Overflow Lets Certain Remote Users Execute Arbitrary Code
  9096. | [1009767] Microsoft Windows 2000 Domain Controller LDAP Flaw May Let Remote Users Restart the Authentication Service
  9097. | [1009762] Microsoft Windows COM Internet Services and RPC over HTTP Can Be Crashed By Remote Users
  9098. | [1009761] Microsoft Windows COM Object Identifier Creation Flaw May Let Remote Users Cause Applications to Open Network Ports
  9099. | [1009760] Microsoft Virtual DOS Machine (VDM) Lets Local Users Gain Elevated Privileges
  9100. | [1009758] Microsoft Windows RCP Memory Leak Lets Remote Users Deny Service
  9101. | [1009757] Microsoft Jet Database Engine 'msjet40.dll' Buffer Overflow Lets Remote Users Execute Arbitrary Code
  9102. | [1009754] Microsoft ASN.1 Library (msasn1.dll) Double-Free Memory Allocation Error May Let Remote Users Execute Arbitrary Code
  9103. | [1009753] Microsoft SSL Library PCT Buffer Overflow Lets Remote Users Execute Arbitrary Code
  9104. | [1009752] Microsoft Help and Support Center Input Validation Flaw Lets Remote Users Execute Arbitrary Code in the My Computer Zone
  9105. | [1009751] Microsoft LSASS Service Buffer Overflow Lets Remote Users Execute Arbitrary Code With SYSTEM Privileges
  9106. | [1009746] Microsoft Internet Explorer Bitmap Memory Allocation Error Lets Remote Users Cause All Available Memory to Be Consumed
  9107. | [1009743] Microsoft Outlook Express Can Be Crashed By Remote Users With Specially Crafted EML File
  9108. | [1009739] Microsoft Internet Explorer Javascript OLE Object Lets Remote Users Automatically Print Without Authorization
  9109. | [1009690] Microsoft Internet Explorer Security Domain Flaw in Accessing CHM Files Lets Remote Users Execute Arbitrary Code
  9110. | [1009673] Microsoft Windows XP 'mswebdvd.dll' Buffer Overflow Lets Remote Users Deny Service
  9111. | [1009666] Microsoft SharePoint Portal Server Input Validation Holes Permit Cross-Site Scripting Attacks
  9112. | [1009604] Microsoft Internet Explorer Does Not Correctly Display Links With Embedded FORM Data
  9113. | [1009603] Microsoft Outlook Express Does Not Correctly Display Links With Embedded FORM Data
  9114. | [1009546] Microsoft Operating Systems Have Unspecified Flaw That Yields Kernel Level Access to Local Users
  9115. | [1009361] Microsoft Internet Explorer Cookie Path Restrictions Can Be Bypassed By Remote Servers
  9116. | [1009360] Microsoft MSN Messenger May Disclose Known Files to Remote Users
  9117. | [1009359] Microsoft Windows Media Services Can Be Crashed By Remote Users
  9118. | [1009358] Microsoft Office XP 'mailto' URL Parsing Bug Lets Remote Users Execute Arbitrary Code in the Local Computer Domain
  9119. | [1009357] Microsoft Outlook 'mailto' URL Parsing Bug Lets Remote Users Execute Arbitrary Code in the Local Computer Domain
  9120. | [1009243] Microsoft Internet Explorer (IE) May Leak Keystrokes Across Frames
  9121. | [1009181] Microsoft Windows Explorer Heap Overflow in Processing '.emf' Files Permits Code Execution
  9122. | [1009067] Microsoft Internet Explorer Integer Overflow in Processing Bitmap Files Lets Remote Users Execute Arbitrary Code
  9123. | [1009009] Microsoft Virtual PC for Mac Temporary File Flaw Lets Local Users Gain Root Privileges
  9124. | [1009008] Microsoft Windows Internet Naming Service (WINS) Length Validation Flaw Lets Remote Users Deny Service
  9125. | [1009007] Microsoft ASN.1 Library Heap Overflows Let Remote Users Execute Arbitrary Code With SYSTEM Privileges
  9126. | [1008901] Microsoft Internet Explorer Travel Log Input Validation Flaw Lets Remote Users Run Arbitrary Scripting Code in the Local Computer Domain
  9127. | [1008699] Microsoft Windows Buffer Overflow in MDAC Lets Remote Users Execute Arbitrary Code
  9128. | [1008698] Microsoft Internet Security and Acceleration Server H.323 Buffer Overflow Lets Remote Users Execute Arbitrary Code
  9129. | [1008586] Microsoft Office Security Features Can Be Bypassed
  9130. | [1008583] Microsoft Internet Explorer Flaw in Processing '.lnk' Shortcuts Lets Remote Users Execute Arbitrary Code
  9131. | [1008578] Microsoft Internet Explorer showHelp() '\..\' Directory Traversal Flaw Lets Remote Users Execute Files on the Target System
  9132. | [1008558] Microsoft Internet Explorer Trusted Domain Default Settings Facilitate Silent Installation of Executables
  9133. | [1008554] Microsoft IE for Mac May Disclose Sensitive Information in Secure URLs to Remote Sites via HTTP Referer Field
  9134. | [1008510] Openwares.org 'Microsoft IE Security Patch' URL Buffer Overflow Lets Remote Users Execute Arbitrary Code
  9135. | [1008428] Microsoft ASP.NET Web Services XML Parsing Lets Remote Users Consume CPU Resources With SOAP Requests
  9136. | [1008425] Microsoft IE Does Not Properly Display Some URLs
  9137. | [1008324] Microsoft Exchange 2003 With Outlook Web Access and Windows SharePoint Services May Grant Incorrect E-mail Account Access to Remote Authenticated Users
  9138. | [1008293] Microsoft Internet Explorer Invalid ContentType May Disclose Cache Directory Location to Remote Users
  9139. | [1008292] Microsoft Internet Explorer MHT Redirect Flaws Let Remote Users Execute Arbitrary Code
  9140. | [1008245] Microsoft SharePoint May Let Remote Users Access Protected Pages Without Authenticating
  9141. | [1008151] Microsoft Works Macro Name Length Buffer Overflow Lets Remote Users Execute Arbitrary Code
  9142. | [1008150] Microsoft Word Macro Name Length Buffer Overflow Lets Remote Users Execute Arbitrary Code
  9143. | [1008149] Microsoft Excel Macro Security Flaw Lets Remote Users Execute Arbitrary Macro Codes
  9144. | [1008148] Microsoft SharePoint Team Services Buffer Overflow May Let Remote Users Execute Arbitrary Code
  9145. | [1008147] Microsoft FrontPage Server Extensions Buffer Overflow May Let Remote Users Execute Arbitrary Code
  9146. | [1008146] Microsoft Windows Workstation Service (wkssvc.dll) Buffer Overflow Lets Remote Users Execute Arbitrary Code with System Privileges
  9147. | [1008053] Microsoft Internet Explorer IFRAME Refresh Lets Remote HTML Access Local Files
  9148. | [1008000] Microsoft Internet Explorer Lets Remote Users Execute Arbitrary Files in the Local Zone Using a Specially Crafted IFRAME/Location Header
  9149. | [1007937] Microsoft Exchange Server Buffer Overflow in Processing Extended Verb Requests May Let Remote Users Execute Arbitrary Code
  9150. | [1007936] Microsoft Outlook Web Access Input Validation Flaw in 'Compose New Message' Permits Remote Cross-Site Scripting Attacks
  9151. | [1007935] Microsoft ListBox and ComboBox 'user32.dll' Buffer Overflow May Allow Local Users to Gain Elevated Privileges
  9152. | [1007934] Microsoft Help and Support Center HCP Buffer Overflow Lets Remote and Local Users Execute Arbitrary Code With Local Computer Privileges
  9153. | [1007933] Microsoft Windows Messenger Service Buffer Overflow Lets Remote Users Execute Arbitrary Code With Local System Privileges
  9154. | [1007932] Microsoft Windows Troubleshooter ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code
  9155. | [1007931] Microsoft Authenticode Low Memory Flaw May Let Remote Users Execute Arbitrary Code
  9156. | [1007922] Microsoft Windows RPC Multi-threaded Race Condition Lets Remote Users Crash the Service or Execute Arbitrary Code
  9157. | [1007905] Microsoft Windows Server 2003 Shell Folders Can Be Referenced Using Directory Traversal Characters
  9158. | [1007874] Microsoft Windows OS PostThreadMessage() API Permits Local Users to Terminate Processes That Have Message Queues
  9159. | [1007750] Microsoft BizTalk Server Default Directory Permissions May Let Remote Users Deny Service
  9160. | [1007689] Microsoft Internet Explorer Media Sidebar Flaw Lets Remote Users Execute Arbitrary Code on the System
  9161. | [1007687] Microsoft Internet Explorer Various Cross-Domain Flaws Permit Remote Scripting in Arbitrary Domains
  9162. | [1007670] Microsoft Windows Remote Procedure Call (RPC) DCOM Activation Buffer Overflows Let Remote Users Execute Arbitrary Code
  9163. | [1007651] RealSecure Server Sensor Unicode Flaw Lets Remote Users Crash the IIS Web Service
  9164. | [1007618] Microsoft Visual Basic for Applications (VBA) in Multiple Microsoft Products Permits Remote Code Execution
  9165. | [1007617] Microsoft Converter for WordPerfect Has Buffer Overflow That Lets Remote Users Execute Arbitrary Code
  9166. | [1007616] Microsoft Word Document Validation Error Lets Macros Run Without Warning
  9167. | [1007615] Microsoft Windows NetBIOS Name Service May Disclose Memory Contents to Remote Users
  9168. | [1007614] Microsoft Access Snapshot Viewer ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code
  9169. | [1007599] Microsoft Outlook May Fail to Delete Outlook Data From the PST File
  9170. | [1007538] Microsoft Internet Explorer Buffer Overflow in CR549.DLL ActiveX Control Permits Remote Code Execution
  9171. | [1007537] Microsoft Internet Explorer Object Tag Flaw Lets Remote Users Execute Arbitrary Code
  9172. | [1007536] Microsoft Internet Explorer Cache Script Flaw Lets Remote Users Execute Code in the My Computer Zone
  9173. | [1007535] Microsoft MDAC Database Component Lets Remote Users Execute Arbitrary Code
  9174. | [1007507] RSA SecurID Interaction With Microsoft URLScan May Disclose URLScan Configuration to Remote Users
  9175. | [1007493] Microsoft Visual Studio Buffer Overflow in 'mciwndx.ocx' May Let Remote Users Execute Arbitrary Code
  9176. | [1007388] Microsoft WebServer Beta for Pocket PC Yields Administrative Access to Remote Users
  9177. | [1007364] IISShield May Fail to Drop a Specific Malformed HTTP Request
  9178. | [1007306] Microsoft Outlook Express Again Executes Scripting Code in Plain Text E-mail Messages
  9179. | [1007281] Microsoft Windows NT File Management Flaw May Let Remote Users Crash Certain Applications
  9180. | [1007280] Microsoft Data/Desktop Engine Named Pipe and LPC Flaws Let Local Users Execute Arbitrary Code
  9181. | [1007279] Microsoft SQL Server Named Pipe and LPC Flaws Let Local Users Execute Arbitrary Code
  9182. | [1007278] Microsoft DirectX Heap Overflow in Loading MIDI Files Lets Remote Users Execute Arbitrary Code
  9183. | [1007265] Microsoft MDAC ODBC Component May Store Database Passwords in Plaintext in the Registry
  9184. | [1007238] Microsoft Outlook Web Access Can Be Crashed By Remote Authenticated Users With an Outlook 2003 Client
  9185. | [1007214] Microsoft Windows XP Shell Buffer Overflow in Processing Folder Display Attributes Permits Remote Code Execution
  9186. | [1007212] Microsoft Windows Remote Procedure Call (RPC) Service Buffer Overflow in Processing DCOM Requests Allows Remote Code Execution
  9187. | [1007206] Microsoft SMTP Service Can Be Crashed By Remote Users Sending Mail With an Invalid FILETIME Header
  9188. | [1007205] Microsoft Exchange Server Can Be Crashed By Remote Users Sending Mail With an Invalid FILETIME Header
  9189. | [1007190] Microsoft Internet Explorer 'Chromeless' Window May Let Remote Users Spoof Various User Interface Characteristics
  9190. | [1007172] Microsoft Jet Database Engine Buffer Overflow May Let Remote Users Execute Arbitrary Code
  9191. | [1007154] Microsoft SMB Buffer Overflow Lets Remote Authenticated Users Execute Arbitrary Code
  9192. | [1007152] Microsoft Windows 2000 Accessibility Utility Manager Lets Local Users Gain Elevated Privileges
  9193. | [1007133] Microsoft Outlook Web Access (OWA) May Disclose The User's OWA Password to Remote Users
  9194. | [1007126] Microsoft Internet Explorer Can By Crashed By Loading 'C:\aux' URL
  9195. | [1007099] Microsoft Windows 2000 ShellExecute() Buffer Overflow May Let Users Execute Arbitrary Code
  9196. | [1007098] Microsoft Commerce Server Discloses SQL Server Password to Local Users
  9197. | [1007094] Microsoft NetMeeting Directory Traversal Flaw Lets Remote Users Execute Arbitrary Code
  9198. | [1007093] Microsoft Active Directory Stack Overflow in 'Lsaas.exe' Lets Remote Users Crash the Windows 2000 Server
  9199. | [1007072] Microsoft Internet Explorer Buffer Overflow in Processing Scripted 'HR' Tags Lets Remote Users Execute Arbitrary Code
  9200. | [1007057] Microsoft Windows Media Player Access Control Flaw Lets Remote Users View, Modify, and Delete Media Library Metadata
  9201. | [1007022] SurfControl for Microsoft ISA Server Discloses Files to Remote Users
  9202. | [1007008] Microsoft Internet Explorer XML Parsing Error Lets Remote Users Conduct Cross-Site Scripting Attacks
  9203. | [1007007] Microsoft Internet Explorer Custom HTTP Error Pages May Let Remote Users Execute Scripts in the Local Computer Zone
  9204. | [1006959] Microsoft Windows Server 2003 Drivers May Leak Information From Memory Via Ethernet Packets Containing TCP Streams
  9205. | [1006924] Microsoft Internet Explorer Input Validation Flaw in Displaying FTP Site Names Lets Remote Users Execute Arbitrary Scripting Code in Arbitrary Domains
  9206. | [1006918] Microsoft Internet Explorer (IE) Object Tag Buffer Overflow Lets Remote Users Execute Arbitrary Code
  9207. | [1006901] Microsoft UrlScan Default Configuration Displays Identifying Characteristics to Remote Users
  9208. | [1006894] iisCART2000 Upload Authentication Error Lets Remote Users Upload and Execute Arbitrary Scripts
  9209. | [1006844] Microsoft Internet Connection Firewall Fails to Block IP Version 6 Protocol
  9210. | [1006829] iisPROTECT Input Validation Hole Lets Remote Users Execute SQL Stored Procedures
  9211. | [1006815] iisPROTECT Lets Remote Users Access Protected Files Using URL Encoding
  9212. | [1006809] Microsoft Outlook Express Lets Remote Users Silently Install Arbitrary Code Using Audio and Media Files
  9213. | [1006808] Microsoft Outlook Express May Be Affected by W32/Palyh@MM Mass-Mailing Worm
  9214. | [1006807] Microsoft Outlook May Be Affected by W32/Palyh@MM Mass-Mailing Worm
  9215. | [1006803] Microsoft Windows Can Be Crashed By Remote Users via Malformed NetMeeting URLs
  9216. | [1006789] Microsoft ISA Server Input Validation Flaw Lets Remote Users Execute Scripting Code in Arbitrary Security Domains
  9217. | [1006774] Microsoft Internet Explorer May Execute Arbitrary Code in the Wrong Security Domain When Processing Large Numbers of Download Requests
  9218. | [1006771] Microsoft Outlook Express Integer Overflow Lets Remote IMAP Servers Cause the Client to Crash
  9219. | [1006748] Microsoft Outlook Express May Be Affected by W32.Fizzer.A@mm Mass-Mailing Worm
  9220. | [1006747] Microsoft Outlook May Be Affected by W32.Fizzer.A@mm Mass-Mailing Worm
  9221. | [1006728] Microsoft .NET Passport Passwords, Including Hotmail Passwords, Can Be Changed By Remote Users
  9222. | [1006696] Microsoft Internet Explorer Web Folder Access Flaw Lets Remote Users Execute Arbitrary Scripting Code in the My Computer Zone
  9223. | [1006691] Microsoft MN-500 Wireless Base Station Backup Configuration File Discloses Administrator Password
  9224. | [1006686] Microsoft BizTalk Server Buffer Overflow Lets Remote Users Execute Arbitrary Code
  9225. | [1006634] Microsoft Internet Explorer Bugs (URLMON.DLL Buffer Overflow, File Upload Control Bypass, Plug-in URL Input Validation Flaw, CSS Modal Dialog Input Validation Flaw) Let Remote Users Execute Arbitrary Code or Access Local Files
  9226. | [1006608] Microsoft NTLM Authentication Protocol Flaw Lets Malicious SMB Servers Gain Access to Systems
  9227. | [1006599] Microsoft REGEDIT.EXE May Let Local Users Gain Elevated Privileges
  9228. | [1006588] Microsoft Windows OS Kernel Messaging Buffer Overflow Lets Local Users Gain Full Control of the System
  9229. | [1006580] Microsoft Windows 2003 'win2k.sys' Printing Bug Lets Users Crash the System
  9230. | [1006534] Microsoft Proxy Service in Proxy Server 2.0 Has Unspecified Flaw That Lets Remote Users Stop Traffic
  9231. | [1006533] Microsoft Firewall Service in ISA Server Has Unspecified Flaw That Lets Remote Users Stop Traffic
  9232. | [1006532] Microsoft Windows VM Input Validation Flaw in ByteCode Verifier Lets Malicious Java Applets Execute Arbitrary Code
  9233. | [1006447] Microsoft Windows Terminal Services RDP Implementation Does Not Validate Server Identity, Allowing Man-in-the-Middle Attacks
  9234. | [1006361] Microsoft ActiveSync Application Can Be Crashed By Remote Users
  9235. | [1006323] Microsoft Windows Buffer Overflow in Windows Script Engine JScript.DLL Lets Remote Users Execute Arbitrary Code
  9236. | [1006322] Microsoft ISA Server DNS Intrusion Detection Flaw Lets Remote Users Block DNS Inbound Requests
  9237. | [1006286] Microsoft Windows 2000/XP PostMessage() API Flaw May Let Local Users Grab Passwords from Local Dialog Boxes
  9238. | [1006280] Protegrity Secure.Data for Microsoft SQL Server 2000 Contains Buffer Oveflows That Let Remote Users Execute Arbitrary Code
  9239. | [1006257] Microsoft Internet Explorer Buffer Overflow in Processing '.MHT' Web Archives Lets Remote Users Execute Arbitrary Code
  9240. | [1006179] Microsoft Windows Me Help and Support Center URL Handler Overflow Lets Remote Users Execute Arbitrary Code
  9241. | [1006169] Microsoft Internet Explorer Vulnerable Codebase Object Lets Remote Users Execute Arbitrary Code
  9242. | [1006148] Microsoft Outlook Express Security Domain Flaw Lets Remote Users Silently Install and Execute Arbitrary Code
  9243. | [1006121] Microsoft Windows 'riched20.DLL' Buffer Overflow May Let Remote Users Crash Applications
  9244. | [1006046] Microsoft Internet Explorer showHelp() Domain Security Flaw Lets Remote Users Execute Commands
  9245. | [1006045] Microsoft Windows XP Redirector Buffer Overflow May Let Local Users Gain System Level Privileges
  9246. | [1006036] Microsoft Internet Explorer May Let Remote Users Read or Write Files Via the dragDrop() Method
  9247. | [1006023] ColdFusion MX Configuration Error When Used With IIS and NT Authentication May Grant Unauthorized Access to Remote Authenticated Users
  9248. | [1005986] Microsoft Windows Terminal Server MSGINA.DLL Flaw Lets Remote Authenticated Users Reboot the Server
  9249. | [1005966] Microsoft Outlook May Fail to Encrypt User E-mail, Disclosing the Contents to Remote Users
  9250. | [1005964] Microsoft Locator Service Buffer Overflow Lets Remote Users Execute Arbitrary Code with System Level Privileges
  9251. | [1005859] Microsoft Windows File Protection Mechanism Weakness in Trusting Code-Signing Certificate Chains Lets Arbitrary Remote Users Sign Code That Will Be Trusted By Windows
  9252. | [1005858] Microsoft Windows File Protection Weakness May Let Local Users Replace Code With Previous Vulnerable Versions Without Detection
  9253. | [1005857] Microsoft Internet Explorer Bug in Loading Multimedia Files May Let Remote Users Execute Arbitrary Scripting Code in Other Domains
  9254. | [1005833] Microsoft Windows XP Shell Buffer Overflow in Processing Audio Files Allows Remote Users to Execute Arbitrary Code
  9255. | [1005799] Microsoft Windows OS Bug in Processing WM_TIMER Messages May Let Local Users Gain Elevated Privileges
  9256. | [1005796] Microsoft SMB Signing Flaw May Let Remote Users With Access to an SMB Session Gain Control of a Network Client
  9257. | [1005761] Microsoft Windows XP Wireless LAN Support May Disclose Access Point Information to Remote Users
  9258. | [1005757] Microsoft Outlook Bug in Processing Malformed E-mail Headers Lets Remote Users Crash the Client
  9259. | [1005747] Microsoft Internet Explorer showModalDialog() Input Validation Flaw Lets Remote Users Execute Arbitary Scripting Code in Any Security Zone
  9260. | [1005699] Microsoft Internet Explorer (IE) Java Class Loader Security Flaw Lets Remote Users Bypass Java Security Restrictions
  9261. | [1005698] Microsoft Java Virtual Machine (VM) Class Loader Security Flaw Lets Remote Users Bypass Java Security Restrictions
  9262. | [1005674] Microsoft Internet Explorer Buffer Overflow in Processing PNG Images Allows Denial of Service Attacks
  9263. | [1005672] Microsoft Internet Explorer MDAC Component Buffer Overflow Allows Remote Users to Execute Arbitrary Code
  9264. | [1005671] Microsoft Data Access Components (MDAC) Buffer Overflow Allows Remote Users to Execute Arbitrary Code
  9265. | [1005627] IISPop EMail Server Can Be Crashed By Remote Users
  9266. | [1005489] Microsoft Outlook Express May Fail to Delete E-mail Messages from Local Storage
  9267. | [1005466] Microsoft Internet Explorer Cached Object Flaw Lets Remote Users Execute Arbitrary Programs on the Target User's Computer
  9268. | [1005455] Microsoft Windows Remote Procedure Call (RPC) Service Null Pointer Dereference Allows Remote Users to Crash the Service
  9269. | [1005454] Microsoft Windows Media Player for Solaris Uses Unsafe Default Permissions
  9270. | [1005436] Microsoft Data Engine/Desktop Engine (MSDE) Bugs Let Remote Authenticated Users Create/Delete/Execute Web Tasks With SQL Server Agent Privileges
  9271. | [1005435] Microsoft SQL Server Bugs Let Remote Authenticated Users Create/Delete/Execute Web Tasks With SQL Server Agent Privileges
  9272. | [1005416] Microsoft Internet Explorer Flaw in WebBrowser Control Document Property Lets Remote Users Run Code in the My Computer Security Zone
  9273. | [1005405] Microsoft Outlook Express Buffer Overflow in Parsing S/MIME Messages Lets Remote Users Execute Arbitrary Code
  9274. | [1005395] Microsoft Content Management Server Input Validation Bug in 'ManualLogin.asp' Allows Cross-Site Scripting Attacks
  9275. | [1005377] Microsoft MSN Hotmail/Passport Login Page May Permit Cookie Stealing Via Cross-Site Scripting Attacks
  9276. | [1005343] Microsoft Windows Help System Bug in Processing Compiled HTML Help Files Lets Remote Users Execute Arbitrary Commands in the Local Computer Security Zone
  9277. | [1005339] Microsoft Services for Unix Interix SDK Bugs May Allow Denial of Service Conditions or May Execute Arbitrary Code
  9278. | [1005338] Microsoft Data/Desktop Engine (MSDE) Buffer Overflow Lets Remote Users Execute Arbitrary Code
  9279. | [1005337] Microsoft SQL Server Buffer Overflow Lets Remote Users Execute Arbitrary Code
  9280. | [1005336] Microsoft Windows Operating System Compressed Folders Allow Arbitrary Files to Be Created
  9281. | [1005335] Microsoft Windows Operating System Compressed Folders Allow Arbitrary Code to Be Executed
  9282. | [1005332] Microsoft Windows Help System Buffer Overflow in 'hhctrl.ocx' Lets Remote Users Execute Arbitrary Code
  9283. | [1005296] Microsoft PPTP Service Buffer Overflow May Let Remote Users Execute Arbitrary Code
  9284. | [1005287] Microsoft FrontPage Server Extensions SmartHTML Interpreter Bugs May Let Remote Users Execute Arbitrary Code with System Privileges
  9285. | [1005256] (Vendor Issues Fix) Microsoft Windows XP Remote Desktop Implementation Bug Lets Remote Users Crash the Operating System
  9286. | [1005254] Microsoft NT, 2000, and XP Operating Systems May Execute a 16-bit Application Even When The File Has No Execute Permissions
  9287. | [1005246] Microsoft Remote Desktop Protocol (RDP) Design Flaw May Disclose Information About the Unencrypted Data to Remote Users and May Let Data Be Modified During Transmission
  9288. | [1005243] Microsoft NetMeeting Remote Desktop Sharing Screen Saver Access Control Flaw Lets Physically Local Users Hijack Remote Sessions
  9289. | [1005242] Microsoft Windows XP Remote Desktop Can Be Crashed By Remote Users Sending a Modified RDP Packet
  9290. | [1005223] (Microsoft Responds) Microsoft Word Document Processing File Include Bug May Let Remote Users Obtain Files From a Target User's System
  9291. | [1005207] Microsoft Outlook Express Can Be Crashed By Remote Users Sending HTML Mail With Long Links Embedded
  9292. | [1005203] Microsoft Internet Explorer Frame Domain Security Bug Lets Remote Users Execute Arbitrary Code in the Local Computer Zone Via Frame URLs
  9293. | [1005200] Microsoft Internet Explorer Implementation Bugs in Java Native Methods May Let Remote Users Execute Arbitrary Code Via Malicious Applets
  9294. | [1005182] Microsoft Internet Explorer URL Decoding Inconsistency May Result in a Web Page Loading in the Incorrect Security Domain
  9295. | [1005177] Microsoft Visual FoxPro Filename Processing Bug Lets Remote Users Create HTML That Will Cause Arbitrary Code to Be Executed When the HTML is Loaded
  9296. | [1005150] Microsoft Windows Operating System Certificate Enrollment ActiveX Control Allows Remote Users to Delete Certificates on a Target User's System
  9297. | [1005128] Microsoft Internet Explorer XML Script Element Redirect Bug Lets Remote Users View XML Files on the Target User's Computer
  9298. | [1005127] Microsoft Visual Studio .NET Web Projects May Disclose the Web Directory Structure to Remote Users
  9299. | [1005123] Microsoft Internet Explorer Buffer Overflow in Unspecified Text Formatting ActiveX Control Lets Remote Users Execute Arbitrary Code
  9300. | [1005120] Microsoft Terminal Services Advanced Client (TSAC) ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code
  9301. | [1005119] Microsoft Operating System SMB Protocol Implementation in the Network
  9302. | [1005112] Microsoft File Transfer Manager ActiveX Control Buffer Overflow May Let Remote Users Execute Arbitrary Code
  9303. | [1005108] Microsoft Windows Media Player Allows Malicious Windows Media Download (.wmd) Files to Silently Create Files in a Known Location and Execute Them
  9304. | [1005075] Microsoft Internet Explorer XMLDSO Java Class Lets Remote HTML Code Access Local Files
  9305. | [1005071] Microsoft DirectX Files Viewer ActiveX Control Has Buffer Overflow That Allows Remote Users to Execute Arbitrary Code
  9306. | [1005070] Microsoft Internet Explorer (IE) Browser Error Message Processing Allows Remote Users to Execute Arbitrary Code on Certain Windows 98 Platforms
  9307. | [1005068] Microsoft NTFS Filesystem in Windows NT and Windows 2000 Has Auditing Hole That Lets Local Users Access Files Without the File Access Being Audited
  9308. | [1005067] Microsoft Desktop Engine (MSDE) Extended Stored Procedures May Let Local Users Execute Commands With Database Administrator Privileges
  9309. | [1005066] Microsoft SQL Server Extended Stored Procedures May Let Local Users Execute Commands With Database Administrator Privileges
  9310. | [1005065] Microsoft Network Connection Manager Could Give a Local User System Level Privileges
  9311. | [1005063] Microsoft Windows XP Help and Support Center Hole Lets Remote Users Create URLs That, When Loaded, Will Delete Arbitrary Files on Your System
  9312. | [1004986] Microsoft Content Management Server Buffer Overflow in Authentication Function May Allow Remote Users to Execute Arbitrary Code With System Level Privileges
  9313. | [1004983] Microsoft Visual C++ Flaw in calloc() and Similar Functions May Result in Buffer Overflows in Applications That Use the Compiler or Runtime Library
  9314. | [1004965] Microsoft Internet Explorer SSL Implementation Flaw in Following Certificate Chains Allows Remote Users to Conduct Man-in-the-Middle Attacks to Obtain Unencrypted Data from the Browser
  9315. | [1004927] Microsoft Terminal Services Can Be Crashed By Remote Users Conducting a TCP SYN Scan in Certain Situations
  9316. | [1004917] Microsoft SQL Server MDAC Function Buffer Overflow May Let Remote Users Execute Arbitrary Code to Gain Full Control Over the Database
  9317. | [1004877] Microsoft Internet Explorer (IE) Web Browser JavaScript 'Same Origin Policy' Flaw Allows Remote Users to Create Malicious JavaScript to Retrieve Web Data from a Victim's Internal Network
  9318. | [1004862] Microsoft Outlook Express Flaw in Parsing XML Using Internet Explorer Allows a Remote User to Silently Deliver and Install an Executable on a Target User's Computer
  9319. | [1004831] Microsoft Data Engine (MSDE) Buffer Overflow in Database Consistency Checker May Let Remote Authenticated Users Execute Arbitrary Code with the Privileges of the Database Service
  9320. | [1004830] Microsoft SQL Server Buffer Overflow in Database Consistency Checker May Let Remote Authenticated Users Execute Arbitrary Code with the Privileges of the Database Service
  9321. | [1004829] Microsoft SQL Server Resolution Service Buffer Overflows Let Remote Users Execute Arbitrary Code with the Privileges of the SQL Service
  9322. | [1004828] Microsoft Exchange Server Buffer Overflow in Processing SMTP EHLO Command Lets Remote Users Execute Arbitrary Code on the Server with System Level Privileges
  9323. | [1004827] Microsoft Metadirectory Services Authentication Flaw May Let Remote Users Modify Data and Obtain Elevated Privileges on the System
  9324. | [1004805] Microsoft Outlook Express (and Possibly Outlook) Has File Attachment Name Bugs That Let Remote Users Send Malicious Mail to Bypass Attachment Type Filters and Modify the Apparent File Name and File Size
  9325. | [1004761] Microsoft Foundation Classes (MFC) Information Server Application Programming Interface (ISAPI) 'mfc42.dll' Contains Buffer Overflows That Can Crash the System or Possibly Allow for the Remote Execution of Arbitrary Code
  9326. | [1004746] Microsoft Internet Explorer Flaw in OBJECT Domain Security Enforcement Lets Remote Users Execute Code in Arbitrary Domains
  9327. | [1004744] Microsoft SQL Server Install Process May Disclose Sensitive Passwords to Local Users
  9328. | [1004739] Microsoft SQL Server Desktop Engine (MSDE) Buffer Overflow and Access Control Bug May Let Remote Authorized Users Execute Code with Elevated Privileges, Possibly Including Local System Privileges
  9329. | [1004738] Microsoft SQL Server Buffer Overflow and Access Control Bug May Let Remote Authorized Users Execute Code with Elevated Privileges, Possibly Including Local System Privileges
  9330. | [1004637] Microsoft Commerce Server Buffer Overflows and Other Flaws Let Remote Users Execute Arbitrary Code with LocalSystem Privileges
  9331. | [1004618] Microsoft Internet Explorer Can Be Crashed By Malicious AVI Object in HTML
  9332. | [1004595] Microsoft Word Documents May Execute Remotely Supplied Macro Code Under Certain Conditions
  9333. | [1004594] Microsoft Excel Spreadsheet May Execute Remotely Supplied Macro Code Within Malicious Documents
  9334. | [1004587] Microsoft SQL Server 2000 Buffer Overflow in OpenDataSource() Function May Let Remote Users Gain SYSTEM Privileges on the Server
  9335. | [1004569] Microsoft Visual Studio .NET Korean Language Version Contains Nimda Virus
  9336. | [1004544] Microsoft SQL Server Buffer Overflow in 'pwdencrypt()' Function May Let Remote Authorized Users Execute Arbitrary Code
  9337. | [1004542] Lumigent Log Explorer Buffer Overflow May Let Remote Users Crash the Microsoft SQL Server Service or Execute Arbitrary Code on the System
  9338. | [1004541] Compaq Insight Manager May Include a Vulnerable Default Configuration of Microsoft MSDE/SQL Server That Allows Remote Users to Execute Commands on the System
  9339. | [1004529] Microsoft Remote Access Service (RAS) Phonebook Buffer Overflow May Let Local Users Execute Arbitrary Code with Local System Privileges
  9340. | [1004528] Microsoft SQLXML Component of Microsoft SQL Server 2000 Contains an Input Validation Flaw in an XML SQL Tag That Allows Cross-Site Scripting Attacks
  9341. | [1004527] Microsoft SQLXML Component of Microsoft SQL Server 2000 Contains a Buffer Overflow That Lets Remote Users Take Full Control of the System
  9342. | [1004518] Microsoft Proxy Server Buffer Overflow in Processing Gopher Protocol Responses Allows Remote Users to Execute Code on the Server to Gain Full Control of the Server
  9343. | [1004517] Microsoft Internet Security and Acceleration Server (ISA) Buffer Overflow in Processing Gopher Protocol Responses Allows Remote Users to Execute Code on the Server to Gain Full Control of the Server
  9344. | [1004486] Microsoft ASP.NET Buffer Overflow in Processing Cookies in StateServer Mode May Let Remote Users Crash the Service or Execute Arbitrary Code on the Server
  9345. | [1004479] Microsoft Internet Explorer May Execute Remotely Supplied Scripting in the My Computer Zone if FTP Folder Viewing is Enabled
  9346. | [1004464] Microsoft Internet Explorer Buffer Overflow in Processing Gopher Protocol Responses Allows Remote Users to Execute Code on the Victim's Computer
  9347. | [1004441] Microsoft Windows Help System Buffer Overflows in 'htctrl.ocx' ActiveX Control May Let Remote Users Execute Arbitrary Code on a Target User's Computer By Sending Malicious HTML
  9348. | [1004436] Microsoft Internet Explorer Allows HTML-Delivered Compiled Help Files to Be Automatically Executed on the Target User's Computer
  9349. | [1004407] Microsoft Exchange 2000 Flaw in Processing a Certain Malformed SMTP Command Allows Remote Users to Deny Service to the Server
  9350. | [1004372] Microsoft Excel Spreadsheet XML Stylesheet ActiveX Object Flaw Lets Remote Users Create Malicious Excel Spreadsheets That May Execute Arbitrary Code When Opened With the XML Stylesheet Option
  9351. | [1004369] Microsoft Active Directory May Have Bug That Allows Remote Users to Crash the Directory
  9352. | [1004361] Microsoft Date Engine (MSDE) Default Configuration Leaves Blank Password for System Administrator Account
  9353. | [1004360] Opty-Way Enterprise Glassworks Management Application Installs Microsoft Data Engine Insecurely, Allowing Remote Users to Execute Commands on the System
  9354. | [1004357] Microsoft Windows Debugging Facility for Windows NT4 and 2000 Has Authentication Hole That Lets Local Users Execute Arbitrary Code with SYSTEM Privileges
  9355. | [1004304] Microsoft Internet Explorer (IE) New Content-Disposition Bugs May Let Remote Users Execute Arbitrary Code on the Victim's Computer
  9356. | [1004300] Microsoft Internet Explorer (IE) Zone Spoofing Hole Lets Remote Users Create HTML That, When Loaded, May Run in a Less-Secure IE Security Zone
  9357. | [1004290] Microsoft Internet Explorer Bugs in 'BGSOUND' and 'IFRAME' Tags Let Remote Users Create HTML That Will Cause Denial of Service Conditions or Will Access Special DOS Devices
  9358. | [1004251] Microsoft Exchange Instant Messenger ActiveX Control Has 'ResDLL' Parameter Buffer Overflow That Lets Remote Users Execute Arbitrary Code
  9359. | [1004250] Microsoft MSN Messenger Includes an ActiveX Control That Has 'ResDLL' Parameter Buffer Overflow That Lets Remote Users Execute Arbitrary Code
  9360. | [1004249] Microsoft MSN Chat Control ActiveX Control Has 'ResDLL' Parameter Buffer Overflow That Lets Remote Users Execute Arbitrary Code
  9361. | [1004236] L.Y.S.I.A.S. Lidik Web Server for Microsoft Windows Systems Lets Remote Users View Files Located Anywhere on the Partition
  9362. | [1004229] Microsoft Office 'Word Mail Merge' Feature Allows Remote Users to Cause Arbitrary Programs to Be Executed on the Target User's Computer
  9363. | [1004226] Microsoft MSN Messenger Instant Messaging Client Malformed Header Processing Flaw Lets Remote Users Crash the Client
  9364. | [1004197] Microsoft Internet Explorer Can Be Crashed By Incorrectly Sized XBM Graphics Files
  9365. | [1004157] Microsoft Outlook Weak Security Enforcement When Editing Messages with Microsoft Word Lets Remote Users Send Malicious Code to Outlook Recipients That Will Be Executed When Forwarded or Replied To
  9366. | [1004146] Microsoft Internet Explorer Browser Can Be Crashed By Remote HTML Containing Malicious Image Tags That Cause Infinite Processing Loops
  9367. | [1004130] Microsoft MSN Messenger Instant Messaging Client Discloses Buddy List to Local Users
  9368. | [1004121] Microsoft Internet Explorer Web Browser Can Be Crashed By Remote Users With OLE OBJECT Element Dependency Loops
  9369. | [1004109] Microsoft Distributed Transaction Coordinator Can Be Crashed By Remote Users Sending Malformed Packets
  9370. | [1004090] Microsoft Back Office Web Administration Authentication Mechanism Can Be Bypassed By Remote Users
  9371. | [1004083] Microsoft Windows 2000 'microsoft-ds' Service Flaw Allows Remote Users to Create Denial of Service Conditions By Sending Malformed Packets
  9372. | [1004079] Microsoft Internet Explorer (IE) 'dialogArguments' Flaw Lets Remote Users Conduct Cross-Site Scripting Attacks Against IE Users
  9373. | [1004051] Microsoft Outlook Express for Mac OS Has Buffer Overflow in Processing the 'file://' URL That Allows Remote Users to Cause Arbitrary Code to Be Executed
  9374. | [1004050] Microsoft Office for Mac OS Has Buffer Overflow in Processing the 'file://' URL That Allows Remote Users to Cause Arbitrary Code to Be Executed
  9375. | [1004049] Microsoft Internet Explorer for Mac OS Has Buffer Overflow in Processing the 'file://' URL That Allows Remote Users to Cause Arbitrary Code to Be Executed
  9376. | [1004048] Microsoft Word Object Creation Flaw Lets Remote Users Create ActiveX That Will Consume Memory on the Victim's Computer
  9377. | [1004022] Microsoft Windows 2000 Group Policy Object Enforcement Can Be Circumvented if User License Limits are Exceeded
  9378. | [1004014] Microsoft Internet Information Server ASP HTTP Header Processing Buffer Overflow Lets Remote Users Execute Arbitrary Code on the Server
  9379. | [1004008] Microsoft Internet Information Server Comes With Code That Allows Remote Users to Conduct Cross-Site Scripting Attacks
  9380. | [1004005] Microsoft Internet Information Server Buffer Overflow in Chunked Encoding Mechanism Lets Remote Users Run Arbitrary Code on the Server
  9381. | [1004002] Microsoft Office Web Components Let Remote Users Determine if Specified Files Exist on Another User's Host
  9382. | [1004001] Microsoft Office Web Components Let Remote Users Gain Full Read and Write Control Over Another User's Clipboard, Even if Clipboard Access Via Scripts is Disabled
  9383. | [1004000] Microsoft Office Web Components Let Remote Users Write Code to Run in the Victim's Local Security Domain and Access Local or Remote Files
  9384. | [1003999] Microsoft Office Web Components in Office XP Lets Remote Users Cause Malicious Scripting to Be Executed By Another User's Browser Even If Scripting is Disabled
  9385. | [1003975] Microsoft Windows NT, 2000, and XP Kernel Buffer Overflow in Processing Multiple UNC Provider (MUP) Requests May Let Local Users Obtain System Level Privileges
  9386. | [1003949] Microsoft Windows 2000 DCOM Implementation Flaw May Disclose Memory Contents to Remote Users
  9387. | [1003948] Microsoft Internet Explorer Cascading Style Sheets (CSS) Invalid Attribute Bug Lets Remote Users Read Portions of Files on the Victim's Computer
  9388. | [1003932] Microsoft Office XP Active Content Bug Lets Remote Users Cause Code to Be Executed on an Office User's Computer
  9389. | [1003922] Microsoft Outlook Web Access With SecurID Authentication May Allow Remote Users to Avoid the SecurID Authentication in Certain Cases
  9390. | [1003915] Microsoft Internet Explorer Browser Security Zone Flaw Lets Remote Users Cause Cookie-based Scripts to Be Executed on Another User's Browser in the Incorrect Security Domain
  9391. | [1003907] Microsoft Internet Explorer Discloses The Existence of and Details of Local Files to Remote Users
  9392. | [1003871] Microsoft .NET Unspecified Vulnerabilities May Allow a Remote User to Cause Arbitrary Code to Be Executed on Another User's Systems
  9393. | [1003856] Microsoft Internet Explorer Can Be Crashed By Malicious 'location.replace' Javascript
  9394. | [1003839] Microsoft Internet Explorer (IE) 6 Lets Remote Users Cause Files to Be Downloaded and Executed Without the Knowledge or Consent of the Victim
  9395. | [1003816] Microsoft Windows 2000 Automatic Log Off Policy Fails to Expire Sessions in Progress
  9396. | [1003800] A Multitude of Microsoft SQL Server Extended Stored Procedures Have Buffer Overflows That Allow Remote Users to Crash the Database Server or Execute Arbitrary Code on the Server to Gain Full Control of the System
  9397. | [1003764] Microsoft Windows Operating System Shell URL Handler Bug Lets Remote Users Create HTML That Could Cause Arbitrary Code to Be Executed on Another User's System in Certain Situations
  9398. | [1003756] Microsoft Internet Information Server 4.0 .HTR Web Application Lets Users Change Their Passwords When the NT Security Policy is Configured to Prohibit Password Changing
  9399. | [1003744] Microsoft SQL Server 'xp_dirtree' Buffer Overflow Lets Users Crash the Database Service
  9400. | [1003730] Microsoft Java Virtual Machine in Internet Explorer Lets Remote Malicious Applets Redirect Web Proxy Connections
  9401. | [1003688] Microsoft Exchange Server 2000 Command Processing Bug Lets Remote Users Cause the SMTP Service to Crash
  9402. | [1003687] Microsoft Windows 2000 and Windows XP SMTP Service Command Processing Bug Lets Remote Users Cause the SMTP Service to Crash
  9403. | [1003686] Microsoft Windows SMTP Service Lets Remote Users Send or Relay Unauthorized Mail (including SPAM) Via the Server
  9404. | [1003685] Microsoft Exchange Server Lets Remote Users Send or Relay Unauthorized Mail (including SPAM) Via the Server
  9405. | [1003634] Microsoft XML Core Services in SQL Server 2000 Lets Remote Scripts Access and Send Local Files
  9406. | [1003633] Microsoft XML Core Services in Microsoft Windows XP Operating System Lets Remote Scripts Access and Send Local Files
  9407. | [1003630] Microsoft Internet Explorer Has Another Frame Domain Security Bug That Lets Remote Users View Files or Other Personal Information from a Victim's Computer By Using Malicious VBScripts
  9408. | [1003629] Microsoft Commerce Server 2000 AuthFilter Buffer Overflow Lets Remote Users Execute Arbitrary Code on the Server With LocalSystem Privileges to Gain Full Control of the Server
  9409. | [1003611] Gator Plugin for Microsoft Internet Explorer Lets Remote Users Install Arbitrary Software on the User's Host
  9410. | [1003605] Microsoft SQL Server Buffer Overflow Lets Remote Users Crash the Server and May Allow Remote Code to Be Executed on the Database Server
  9411. | [1003597] Microsoft Outlook Web Access Discloses 'Include' Archive Files in the 'lib' Directory to Remote Users
  9412. | [1003591] Microsoft Windows Terminal Services May Cause the System's Screen Saver Lockout Mechanism to Fail in Certain Situations
  9413. | [1003582] Microsoft Internet Security Acceleration Server Can Be Affected By Remote Users Conducting a LAND Flood Attack
  9414. | [1003556] Microsoft Visual C++ Compiler Buffer Security Mode Does Not Eliminate Buffer Overflows in Compiled Applications
  9415. | [1003546] Microsoft Outlook E-mail Client May Display Potentially Malicious File Attachments Illegally Embedded Within Mail Headers
  9416. | [1003540] Microsoft Internet Explorer Browser MIME Flaw Causes 'text/plain' Pages to Be Displayed as HTML and Any Embedded Scripting to Be Executed By the Browser
  9417. | [1003538] NetWin CWMail Web-Mail Server Buffer Overflow Lets Remote Users Execute Arbitrary Code on the System With the Privileges of the IIS Web Server
  9418. | [1003519] Microsoft Internet Explorer (IE) HTML Directive Buffer Overflow Lets Remote Users Cause Arbitrary Code to Be Executed on Another User's Computer
  9419. | [1003517] Microsoft Internet Explorer (IE) 'Content-Type' Processing Hole Lets Remote Users Open Applications on Another User's Computer
  9420. | [1003516] Microsoft Internet Explorer (IE) Web Browser Has New Frame Domain Verification Bug That Lets Remote Users Obtain Files from Another User's Local File System
  9421. | [1003472] Microsoft Telnet Server for Windows 2000 and for Interix Has a Buffer Overflow That May Let Remote Users Execute Code on the Server with System Level Privileges
  9422. | [1003469] Microsoft Exchange 2000 Server Allows Remote Users to View and Possibly Modify Registry Settings
  9423. | [1003462] Microsoft Internet Explorer Web Browser Allows Cross-site Scripting Attacks Via Non-HTTP Servers
  9424. | [1003458] Microsoft Office v. X for Mac OS X Can Be Crashed By Remote Users Sending Malformed Product Identification Packets
  9425. | [1003446] Microsoft Internet Information Server Can Be Stopped By Local Users Removing Virtual Directories in a Shared Hosting Environment
  9426. | [1003434] Microsoft ASP.NET Web Application Framework Allows Cross Site Scritping Attacks and Discloses Path Information to Remote Users
  9427. | [1003420] Microsoft Site Server Commerce Edition Discloses Potentially Sensitive Administration Information and Source Code to Remote Users With Valid Accounts and Discloses User Passwords from the LDAP Directory to Anonymous Remote Users
  9428. | [1003419] Microsoft Site Server Commerce Edition Lets Remote Users With Valid NT Accounts Upload and Then Execute ASP Scripts on the Server or Consume Disk Space on the Server
  9429. | [1003415] Microsoft Distributed Transaction Coordinator (MSDTC) Service Can Be Crashed By Remote Users
  9430. | [1003402] Microsoft Windows NT 4.0 and Windows 2000 Domain Controllers May Give Elevated Privileges to Remote Users Who Are Valid Administrators on Other Trusted Domains
  9431. | [1003369] PGPfire Personal Firewall for Microsoft Windows Discloses Identifying Information to Remote Users
  9432. | [1003326] Microsoft Internet Explorer for Macintosh OS Executes Remotely Supplied Commands in AppleScripts
  9433. | [1003310] Microsoft Windows NT/2000 Authentication Lockout Bug May Record Successful Logins as Failed Login Attempts in Certain Situations
  9434. | [1003308] Microsoft Windows XP Manifest Processing Bug Lets Local Users Corrupt the System and Cause the Boot Process to Fail
  9435. | [1003257] Microsoft Windows XP Upgrade Effectively Removes Patches from Internet Explorer (IE) During Upgrade, Leaving Users Exposed to IE Vulnerabilities
  9436. | [1003239] Python Language Implementation on Microsoft Windows Allows a Remote Server to Access Files on a Web Surfing User's PC
  9437. | [1003228] Microsoft Windows Media Player Discloses Unique ID to Remote Users in the Default Configuration, Allowing Web Sites to Track Users
  9438. | [1003221] Microsoft Internet Explorer (IE) Default Configuration Allows HTML-based Scripts to Access Your Windows Clipboard Contents
  9439. | [1003215] Microsoft Internet Explorer Popup Object Tag Flaw Lets Remote Users Execute Programs on the Browser's Host
  9440. | [1003201] Microsoft Windows 95 Backup Utility Has Buffer Overflow That Could Cause Denial of Service Conditions
  9441. | [1003135] Microsoft Internet Explorer Can Be Crashed By Remote Users With Javascript That Calls an Endless Loop of Modeless Dialogs
  9442. | [1003121] Microsoft Windows XP Task Manager Will Not Kill Certain Processes
  9443. | [1003109] Microsoft Internet Explorer (IE) May Allow Malicious Javascript to Poll a User's System for Known Files
  9444. | [1003084] Microsoft Internet Explorer GetObject() Active Scripting Bug Lets Remote Code Access Files on the PC
  9445. | [1003050] Microsoft Internet Explorer Web Browser Can Be Crashed By Malicious Image Source Tag Javascript Supplied By Remote Users
  9446. | [1003049] Microsoft Internet Explorer (IE) Text Form Processing Flaw May Cause IE to Crash
  9447. | [1003043] PGP Plug-in For Microsoft Outlook May Fail to Encrypt E-mail in Certain Situations
  9448. | [1003042] Microsoft Internet Explorer Web Browser SSL Security Flaw Lets Remote Users Conduct Man-in-the-Middle Attacks to Access Sensitive Information
  9449. | [1003041] Microsoft Windows XP Remote Desktop Client May Disclose Recently Used Account Names to Remote Users
  9450. | [1003040] Microsoft Excel Password Protection Flaw Lets Local Users Obtain Contents of Password-Protect Cells
  9451. | [1003033] Microsoft C Runtime Format String Flaw Lets Remote Users Crash the Microsoft SQL Server Service
  9452. | [1003032] Microsoft SQL Server Buffer Overflow Lets Remote Users Execute Arbitrary Code in the Security Context of the SQL Server
  9453. | [1003028] Microsoft Windows Universal Plug and Play Component Buffer Overflow Gives Remote Users System Level Access to Windows XP and 98/ME Hosts
  9454. | [1003024] Microsoft Internet Explorer (IE) Web Browser 'document.open()' Scripting Flaw Lets Remote Users Steal Cookies, Read Local Files, and Spoof Web Sites
  9455. | [1003003] Microsoft Windows XP Hot Key Function Lets Physically Local Users Execute Administrator Hot Key Functions in Certain Situations
  9456. | [1002986] Microsoft Internet Explorer Version 6 Lets Remote Scripts Access and Send Local Files
  9457. | [1002979] Microsoft Windows Explorer Discloses Stored FTP Passwords to Local Users
  9458. | [1002973] Microsoft Internet Explorer (IE 6) Browser May Automatically and Silently Execute Arbitrary Code from a Remote Web Site When the User Views a Web Page or HTML-based E-mail
  9459. | [1002957] Microsoft Internet Information Server Can Be Crashed By Remote Users With HTTP Requests Containing Invalid Content-Length Values
  9460. | [1002942] Microsoft Internet Explorer May Execute Javascript Contained Within an 'About:' URL in an Unauthorized Security Domain When the URL Contains an Extraneous '%' Character
  9461. | [1002926] Microsoft Windows Operating System File Locking Design May Allow Local Users to Block Group Policy Scripts
  9462. | [1002922] Microsoft Windows 2000 Internet Key Exchange (IKE) Service Can Be Crashed By Remote Users
  9463. | [1002919] Microsoft Internet Explorer Browser Can Be Crashed By Certain Image Tags
  9464. | [1002915] Microsoft Outlook Web Access for Exchange May Execute Remotely Supplied Scripts When a Recipient Views a Malicious E-mail Message
  9465. | [1002885] Microsoft Internet Explorer Can Be Crashed By Malicious Javascript Causing a Stack Overflow in setTimeout() Function
  9466. | [1002823] Microsoft Internet Explorer Fails to Enforce Cookie Prompting Preferences for Local Security Zone
  9467. | [1002820] Microsoft Internet Explorer Allows Malicious Web Pages to Spoof Downloadable File Types And Execute Code on the User's Computer When Opened Directly from the Browser
  9468. | [1002819] Microsoft Internet Explorer ActiveX Flaw Permits Remote Malicious HTML Code Containing an 'htmlfile' or 'htmlfile_FullWindowEmbed' Object to Access Local Files and Potentially Execute Commands
  9469. | [1002802] Microsoft Help and Support Center Software (helpctr.exe) Has Buffer Overflow That May Allow a Remote User to Cause Arbitrary Code to Be Executed on a User's PC
  9470. | [1002773] Titan Application Firewall for IIS Web Server Fails to Decode URLs, Letting Remote Users Bypass URL-based Firewall Restrictions
  9471. | [1002772] Microsoft Internet Explorer Cookie Disclosure Fix Discloses Patch Information to Remote Users
  9472. | [1002754] Terminal Services on Microsoft Windows 2000 and XP Allow Remote Users to Log Bogus IP Addresses Instead of the User's Genuine Address
  9473. | [1002731] Microsoft Windows 2000 RunAs Service May Disclose Authentication Credentials to Local Users
  9474. | [1002730] Microsoft Windows 2000 RunAs Utility May Disclose Sensitive Information to Local Users
  9475. | [1002729] Microsoft Windows 2000 RunAs Service Allows Local Users to Disable the Service
  9476. | [1002728] Microsoft SQL Server May Disclose Database Passwords When Creating Data Transformation Service (DTS) Packages
  9477. | [1002702] Microsoft Passport May Disclose Wallet Contents, Including Credit Card and Contact Information, to Remote Users
  9478. | [1002693] Microsoft Internet Security and Acceleration Server UDP Fragmentation Processing Can Cause 100% of CPU Resources to Be Consumed
  9479. | [1002601] Microsoft Windows Me Universal Plug and Play (UPnP) Ssdpsrv.exe Server Component Can Be Crashed by Remote Users
  9480. | [1002595] Microsoft Internet Explorer Has Fixed Security Zone for about: URLs and Has Shared Cookie Flaw That Diminishes Cross-Site Scripting Protections
  9481. | [1002594] Microsoft Internet Explorer for Mac OS X is Configured to Automatically Execute Downloaded Files
  9482. | [1002581] Microsoft Terminal Servers Can Be Crashed By Remote Users Sending Certain Remote Desktop Protocol (RDP) Packets
  9483. | [1002560] Internet Explorer Sends Potentially Sensitive Web Browser Contents to Microsoft via the Network When an Error Occurs
  9484. | [1002559] Microsoft Office XP Sends Potentially Sensitive Information to Microsoft Via the Network When an Error Occurs
  9485. | [1002526] Microsoft Internet Explorer (IE) Web Browser Has Multiple URL-related Flaws That May Allow for Remote Code Execution, Remote HTTP Request Generation, and Application of Incorrect Security Restrictions
  9486. | [1002519] TYPSoft FTP Server for Microsoft Windows Can Be Crashed by Remote Users
  9487. | [1002487] Microsoft PowerPoint Macro Security Features Can Be Bypassed by Malformed PowerPoint Documents
  9488. | [1002486] Microsoft Excel Macro Security Features Can Be Bypassed by Malformed Excel Documents
  9489. | [1002456] Microsoft Outlook Web Access Directory Validation Flaw Lets Remote Users Consume CPU Resources by Requesting Mail from Nested Folders
  9490. | [1002421] Microsoft Index Server Sample File Discloses File Information to Remote Users
  9491. | [1002418] Counterpane's Password Safe Password Encryption Utility for Microsoft Windows May Disclose Passwords to Local Users in Certain Situations
  9492. | [1002413] Microsoft Outlook Express Will Execute Active Scripting in Plain Text E-mail Messages, Circumventing Some Scripting Controls
  9493. | [1002394] Microsoft Windows NT Remote Procedure Call (RPC) Services Can Be Crashed With Malformed Packets
  9494. | [1002385] Norton Anti-Virus For Microsoft Exchange Discloses User Path Information to Remote Users
  9495. | [1002356] Microsoft Outlook 2000 Animated Assistant Prevents the Screen Saver from Activating, Allowing Physically Local Users to Access the System
  9496. | [1002331] Internet Security Systems RealSecure Intrusion Detection Misses '%u' Encoded Attacks Against Microsoft Web Servers
  9497. | [1002330] Cisco Catalyst 6000 Intrusion Detection System Module Fails to Detect '%u' Encoding Obfuscation Attacks Against Microsoft Web Servers
  9498. | [1002329] Dragon Sensor Intrusion Detection System Does Not Detect Certain Attacks Against Microsoft Web Servers
  9499. | [1002327] Snort Network Intrusion Detection System Will Not Detect '%u' URL Encoding Attacks Against Microsoft Web Servers
  9500. | [1002326] Cisco Secure Intrusion Detection System (NetRanger) Fails to Detect Certain Attacks Against Microsoft Web Servers
  9501. | [1002317] Microsoft DNS Server Software Susceptible to DNS Cache Poisoning in Default Configuration, Allowing Remote Users to Inject False DNS Records in Certain Situations
  9502. | [1002269] Microsoft Outlook Web Access with SSL Can Be Crashed by Remote Users
  9503. | [1002206] Microsoft Internet Security and Acceleration (ISA) Server 2000 Can Be Disrupted By Remote Users Due to Memory Leaks and Also Allows Cross-Site Scripting Attacks
  9504. | [1002201] Microsoft Windows TCP/IP Stack Vulnerable to a Certain Man-in-the-Middle Denial of Service Attack
  9505. | [1002197] Microsoft Windows NNTP Network News Service Has a Memory Leak That Allows Remote Users to Cause the Server to Crash
  9506. | [1002124] Microsoft Windows 98 Operating System Can Be Crashed When Running a Web Server or Other Servers And the AUX Device is Accessed By the Program
  9507. | [1002106] Microsoft Windows 2000 and Windows NT 4.0 RPC Input Validation Failure Lets Remote Users Destabilize the Operating System
  9508. | [1002105] Microsoft SQL Database Server RPC Input Validation Failure Lets Remote Users Crash the Database Service
  9509. | [1002104] Microsoft Exchange Server RPC Input Validation Failure Lets Remote Users Crash the Exchange Service
  9510. | [1002099] Microsoft Windows 2000 Telnet Service Can Be Crashed By Remote Users
  9511. | [1002098] Windows Terminal Services in Microsoft Windows 2000 and NT 4.0 Can Be Crashed By Remote Users Due to a Memory Leak
  9512. | [1002075] Microsoft Services for Unix Memory Leak in Telnet and NFS Services Allows Remote Users to Crash the Operating System
  9513. | [1002028] Microsoft Exchange LDAP Service Can Be Crashed By Remote Users
  9514. | [1001993] Microsoft Windows 2000, Linux 2.4, NetBSD, FreeBSD, and OpenBSD May Let Remote Users Affect TCP Performance
  9515. | [1001992] Microsoft Windows NT Lets Remote Users Cause Increased Packet Overhead and Increased CPU Resource Consumption
  9516. | [1001984] Microsoft Outlook Allows Rogue HTML to Execute Arbitrary Commands on the User's Host
  9517. | [1001931] Microsoft Windows 2000 SMTP Service May Allow Unauthorized Remote Users to Relay E-mail via the Service
  9518. | [1001923] Microsoft's Internet Information Server's ASP Processor Can Be Crashed by Remote Users in Certain Situations
  9519. | [1001832] Microsoft Windows 2000 LDAP Server Lets Remote Users Gain Administrator Access to the Domain Controller When Configured to Support LDAP over SSL
  9520. | [1001819] Microsoft NetMeeting Can Be Crashed By Remote Users
  9521. | [1001816] Microsoft Visual Studio RAD Support Component of FrontPage Lets Remote Users Execute Arbitrary Code on the FrontPage Server
  9522. | [1001815] Microsoft Word May Execute Macros in Malformed Word Documents Without Warning Even if Macros are Disabled
  9523. | [1001775] Microsoft Index Server Lets Remote Users Execute Arbitrary Code With System Level Privileges, Giving Remote Users Full Control of the Operating System
  9524. | [1001734] Microsoft SQL Server May Let Remote Authenticated Users Take Full Control of the Database Server and the Underlying Operating System
  9525. | [1001701] Microsoft Windows 2000 Telnet Server Allows Local Users to Gain System-Level Privileges and Lets Remote Users Crash the Server
  9526. | [1001699] Microsoft Internet Explorer Web Browser May Allow Remote Users to Read Some Text Files on the Browser's Hard Drive
  9527. | [1001696] Microsoft Exchange Server's Outlook Web Access (OWA) Lets Remote Users Execute Arbitrary Code on the OWA User's Web Browser
  9528. | [1001687] Microsoft Outlook Express May Allow A Remote User to Obtain E-mail Destined for a Different User
  9529. | [1001661] Microsoft Hotmail May Allow a Worm to Send Mail to Other Destinations Listed in a Remote User's Inbox
  9530. | [1001605] Microsoft Windows 2000 Allows Local Users to Elevate Privileges
  9531. | [1001603] Microsoft Windows Media Player May Allow Remote Users to Execute Code Contained in Internet Shortcuts and View Files on the Media Player's Host
  9532. | [1001587] Microsoft Word for Windows and for Mac May Run Macros Linked By RTF Documents Without Warning
  9533. | [1001572] Apache Web Server on Microsoft Windows Platforms Allows Remote Users to Crash the Web Server
  9534. | [1001562] Microsoft Internet Explorer Allows Remote Web Sites to Cause a Different Web URL Address to Be Displayed in the Browser's Address Bar, Allowing Rogue Web Sites to Spoof the Browser and Masquerade as Different Web Sites
  9535. | [1001561] Microsoft Internet Explorer Web Browser Fails To Validate Digital Certificates in Some Configurations, Allowing Rogue Secure Web Sites to Spoof the Browser and Masquerade as a Different Secure Web Site
  9536. | [1001538] Older Version of Microsoft Internet Explorer Web Browser Can Be Crashed By Remote Users
  9537. | [1001537] Microsoft's Internet Information Server's FTP Services May Give Remote Users Information About User Account Names on the Server's Domain and Trusted Domains
  9538. | [1001535] Microsoft's Internet Information Server's FTP Services Can Be Crashed By Remote Users
  9539. | [1001513] Microsoft Windows 2000 Indexing Service Allows Remote Users to View Include Programming Files
  9540. | [1001512] Microsoft Index Server for NT Can Be Crashed By Local Users, Allows Local Users to Execute Arbitrary Code With System Level Privileges, and Lets Remote Users View Certain Include Files
  9541. | [1001501] Microsoft Windows 2000 Domain Controllers Can Be Effectively Halted By Remote Users
  9542. | [1001467] Microsoft Windows Media Player ASX Processing Vulnerability Lets Remote Users Execute Arbitrary Code on the Player's Host System
  9543. | [1001445] Microsoft Internet Security and Acceleration Server May Allow Remote Users to Execute Arbitrary Code on the Firewall
  9544. | [1001424] Microsoft Internet Explorer Can Consume All Memory Due to Malicious HTML Code
  9545. | [1001380] Microsoft Internet Explorer and Outlook Express May Execute Arbitrary Code Without User Authorization or Intervention
  9546. | [1001360] Microsoft Windows Operating System DLL May Allow Malicious Remote Scripts to Run Code on the User's Host Without the User's Intervention
  9547. | [1001344] Microsoft Internet Explorer May Not Display File Extensions in Certain Cases
  9548. | [1001330] Microsoft ActiveSync Software for Portable Computing Devices Allows Portable Devices to Access Files on a Locked Server
  9549. | [1001319] Microsoft Internet Security and Acceleration Server Can Be Crashed By Remote Users
  9550. | [1001311] Netscape's SmartDownload Can Automatically Execute Arbitrary Code Without User Intervention or Knowledge for Both Netscape and Microsoft Browsers
  9551. | [1001255] Microsoft's Ping.exe Allows Local Users to Cause Certain Applications to Crash
  9552. | [1001240] Microsoft FTP Client for Windows 2000 Still Vulnerable to Executing Arbitrary Code in Limited Situations
  9553. | [1001221] E-Mail Clients that use Microsoft Internet Explorer to Process HTML May Disguise Executable Attachments as Data Files
  9554. | [1001219] Microsoft's Internet Security and Acceleration Server Performance Can Be Significantly Affected By Remote Users Under Certain Configurations
  9555. | [1001216] Microsoft Internet Explorer Can Be Made to Execute Arbitrary Files on the User's Computer
  9556. | [1001211] TrendMicro's ScanMail E-Mail Virus Scanner for Microsoft Exchange Discloses Administrative System Usernames and Passwords
  9557. | [1001210] Microsoft Internet Explorer Allows Malicious Web Pages to Retrieve Files from the User's Computer
  9558. | [1001209] Microsoft Telnet Can Be Crashed Locally, Causing Other Applications Including Outlook Express To Crash
  9559. | [1001197] Microsoft Internet Explorer May Automatically Execute Certain E-mail Attachments
  9560. | [1001187] Microsoft Internet Explorer Is Vulnerable to Malicious Web Pages That May Obtain the User's Exchange E-mail Messages and May Access Restricted Web Server Directory Listings
  9561. | [1001186] Microsoft Windows Me Operating System and Windows 98 with the Plus! 98 Package Disclose Data Compression Passwords
  9562. | [1001172] Microsoft Visual Studio Could Allow Users to Crash the Debugger or to Execute Code on the Server
  9563. | [1001163] Microsoft's Dr. Watson Diagnostic Utility May Reveal Passwords and Other Sensitive Information
  9564. | [1001147] Microsoft Outlook Express Crashes When Reading Certain E-mail Messages
  9565. | [1001142] Microsoft Internet Explorer Does Not Check for Revoked Digital Certificates (Two Fraudlent Certificates Are Known to Exist)
  9566. | [1001139] SurfControl for Microsoft Proxy Server May Fail to Block Sites
  9567. | [1001123] Microsoft's FTP Server May Allow Remote Users to Deny Service on the Server
  9568. | [1001110] A Microsoft German-Language Hotfix for Windows NT 4 Incorrectly Displays Some Security Events as Other Security Events
  9569. | [1001088] Microsoft Internet Explorer with Services for Unix 2.0 Can Create Malicious Files on the User's Host
  9570. |
  9571. | OSVDB - http://www.osvdb.org:
  9572. | [91195] Microsoft Windows 7 Unspecified ASLR Protection Mechanism Bypass
  9573. | [91194] Microsoft Windows 7 Kernel Unspecified Local Privilege Escalation (pwn2own)
  9574. | [91193] Microsoft Windows 7 Unspecified ASLR / DEP Protection Mechanism Bypass (pwn2own)
  9575. | [85619] Microsoft Windows Phone 7 X.509 Certificate Subject's Common Name (CN) Field Domain Name Validation Multiple Protocol SSL Server MitM Spoofing Weakness
  9576. | [67783] Microsoft Windows SDK for Windows 7 / .NET Framework 4 GraphEdit Path Subversion Arbitrary DLL Injection Code Execution
  9577. | [87555] Adobe ColdFusion for Microsoft IIS Unspecified DoS
  9578. | [87262] Microsoft IIS FTP Command Injection Information Disclosure
  9579. | [87261] Microsoft IIS Log File Permission Weakness Local Password Disclosure
  9580. | [86899] Microsoft IIS 302 Red