· 6 years ago · Feb 24, 2020, 11:50 PM
1<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
2<html>
3<head>
4<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
5<style>
6body {
7 background-color: #FFFFFF;
8 margin: 0px;
9 font: small Verdana, sans-serif;
10 font-size: 12px;
11 color: #1A1A1A;
12}
13
14div.content {
15 width: 98%;
16 align: center;
17 margin-left: auto;
18 margin-right: auto;
19}
20
21tr.table_head {
22 background-color: #d5d5d5;
23}
24
25.diff {
26 white-space: pre;
27 font-family: monospace;
28}
29
30.diff.at {
31 color: #9932CC;
32}
33
34.diff.plus {
35 color: #006400;
36}
37
38.diff.minus {
39 color: #B22222;
40}
41
42div.footer {
43 text-align: center;
44}
45
46div.note, div.override {
47 padding:4px;
48 margin:3px;
49 margin-bottom:0px;
50 margin-top:0px;
51 border: 1px solid #CCCCCC;
52 border-top: 0px;
53 background-color: #ffff90;
54}
55
56.result_head {
57 padding:4px;
58 margin:3px;
59 margin-bottom:0px;
60 color: #FFFFFF;
61 border: 1px solid #CCCCCC;
62 border-bottom: 0px;
63 background:#d5d5d5;
64}
65
66.result_head.low {
67 background:#539dcb
68}
69
70.result_head.medium {
71 background:#f99f31
72}
73
74.result_head.high {
75 background:#cb1d17
76}
77
78.result_section {
79 padding:4px;
80 margin:3px;
81 margin-bottom:0px;
82 margin-top:0px;
83 border: 1px solid #CCCCCC;
84 border-top: 0px;
85}
86
87.location_float {
88 float: right;
89 text-align:right;
90}
91
92.delta_float {
93 float: left;
94 font-size: 24px;
95 border: 2px;
96 padding-left: 2px;
97 padding-right: 8px;
98 margin:0px;
99}
100
101.full_width {
102 width: 100%;
103}
104
105pre {
106 white-space: pre-wrap;
107 word-wrap: break-word;
108}
109 </style>
110<title>Scan Report</title>
111</head>
112<body><div class="content">
113<h1>Summary</h1>
114<p>
115 This document reports on the results of an automatic security scan.
116 The report first summarises the results found. Then, for each host,
117 the report describes every issue found. Please consider the
118 advice given in each description, in order to rectify the issue.
119 </p>
120<p>
121 Vendor security updates are not trusted.
122 </p>
123<p>
124 Overrides are on. When a result has an override, this report uses the threat of the override.
125 </p>
126<p>
127 Information on overrides is included in the report.
128 </p>
129<p>
130 Notes are included in the report.
131 </p>
132<p>
133 This report might not show details of all issues that were found.
134
135 Issues with the threat level "High" are not shown.
136
137 Issues with the threat level "Medium" are not shown.
138
139 Issues with the threat level "Low" are not shown.
140
141 Issues with the threat level "Log" are not shown.
142
143 Issues with the threat level "Debug" are not shown.
144
145 Issues with the threat level "False Positive" are not shown.
146 Only results with a minimum QoD of 70 are shown. </p>
147<p>This report contains all 59 results selected by the filtering described above. Before filtering there were 84 results.</p>
148<p>All dates are displayed using the timezone "Coordinated Universal Time", which is abbreviated "UTC".</p>
149<table>
150<tr>
151<td>Scan started:</td>
152<td></td>
153</tr>
154<tr>
155<td>Scan ended:</td>
156<td></td>
157</tr>
158<tr>
159<td>Task:</td>
160<td>NetworkEvaluation</td>
161</tr>
162</table>
163<h2>Host Summary</h2>
164<table width="100%">
165<tr class="table_head">
166<td>Host</td>
167<td>Start</td>
168<td>End</td>
169<td>High</td>
170<td>Medium</td>
171<td>Low</td>
172<td>Log</td>
173<td>False Positive</td>
174</tr>
175<tr>
176<td><a href="#10.0.0.12">10.0.0.12</a></td>
177<td> NaN, NaN:NaN:NaN</td>
178<td>(not finished)</td>
179<td>0</td>
180<td>0</td>
181<td>0</td>
182<td>0</td>
183<td>0</td>
184</tr>
185<tr>
186<td><a href="#10.10.10.9">10.10.10.9</a></td>
187<td> NaN, NaN:NaN:NaN</td>
188<td>(not finished)</td>
189<td>0</td>
190<td>2</td>
191<td>1</td>
192<td>16</td>
193<td>0</td>
194</tr>
195<tr>
196<td><a href="#10.10.10.16">10.10.10.16 (www.moviescope.com)</a></td>
197<td> NaN, NaN:NaN:NaN</td>
198<td>(not finished)</td>
199<td>0</td>
200<td>3</td>
201<td>1</td>
202<td>36</td>
203<td>0</td>
204</tr>
205<tr>
206<td>Total: 3</td>
207<td></td>
208<td></td>
209<td>0</td>
210<td>5</td>
211<td>2</td>
212<td>52</td>
213<td>0</td>
214</tr>
215</table>
216<h1>Results per Host</h1>
217<h2 id="10.0.0.12">Host 10.0.0.12</h2>
218<table>
219<tr>
220<td>Scanning of this host started at:</td>
221<td> NaN NaN:NaN:NaN NaN UTC</td>
222</tr>
223<tr>
224<td>Number of results:</td>
225<td>0</td>
226</tr>
227</table>
228<h3>Port Summary for Host 10.0.0.12</h3>
229<table width="100%"><tr class="table_head">
230<td>Service (Port)</td>
231<td>Threat Level</td>
232</tr></table>
233<h3>Security Issues for Host 10.0.0.12</h3>
234<h2 id="10.10.10.9">Host 10.10.10.9</h2>
235<table>
236<tr>
237<td>Scanning of this host started at:</td>
238<td> NaN NaN:NaN:NaN NaN UTC</td>
239</tr>
240<tr>
241<td>Number of results:</td>
242<td>19</td>
243</tr>
244</table>
245<h3>Port Summary for Host 10.10.10.9</h3>
246<table width="100%">
247<tr class="table_head">
248<td>Service (Port)</td>
249<td>Threat Level</td>
250</tr>
251<tr>
252<td>general/tcp</td>
253<td>Low</td>
254</tr>
255<tr>
256<td>80/tcp</td>
257<td>Medium</td>
258</tr>
259<tr>
260<td>general/icmp</td>
261<td>Log</td>
262</tr>
263<tr>
264<td>general/CPE-T</td>
265<td>Log</td>
266</tr>
267</table>
268<h3>Security Issues for Host 10.10.10.9</h3>
269<div class="result_head medium">
270<div class="location_float">80/tcp</div>
271<b>Medium</b>
272 (CVSS: 5.0)
273 <div class="full_width">
274 NVT:
275 ownCloud/Nextcloud Unprotected Data Directory
276 (OID: 1.3.6.1.4.1.25623.1.0.111107)
277 </div>
278</div>
279<div class="result_section">
280 Product detection result:
281 cpe:/a:owncloud:owncloud:10.0.4
282 by
283 ownCloud Detection
284 (OID: 1.3.6.1.4.1.25623.1.0.103564)
285 </div>
286<div class="result_section">
287<b>Summary</b><p>The host is installed with ownCloud/Nextcloud and
288 is exposing an unprotected data directory.</p>
289</div>
290<div class="result_section">
291<b>Vulnerability Detection Result</b><pre>The following files could be accessed:
292
293http://10.10.10.9/owncloud/data/owncloud.log</pre>
294</div>
295<div class="result_section">
296<b>Impact</b><p>Successful exploitation will allow an
297 unauthenticated attacker to enumerate existing user files within the
298 data directory and gain access to sensitive data stored within it.</p>
299</div>
300<div class="result_section">
301<b>Solution</b><p><b>Solution type: </b>Workaround</p>
302<p>Protect the ownCloud/Nextcloud data directory via
303 .htaccess or move the data directory out of the webservers web root. See the reference
304 for more info.</p>
305</div>
306<div class="result_section">
307<b>Affected Software/OS</b><p>All ownCloud/Nextcloud versions.</p>
308</div>
309<div class="result_section">
310<b>Vulnerability Insight</b><p>The flaw exists due to a missing protection
311 of the data directory.</p>
312</div>
313<div class="result_section">
314<b>Vulnerability Detection Method</b><p>Try to access common existing files to
315 check if the protection of the data directory is not working.</p>
316<p>
317 Details:
318 ownCloud/Nextcloud Unprotected Data Directory
319 (OID: 1.3.6.1.4.1.25623.1.0.111107)
320 </p>
321<p>
322 Version used: $Revision: 12175 $</p>
323</div>
324<div class="result_section">
325<b>Product Detection Result</b><p><table>
326<tr>
327<td>Product:</td>
328<td>cpe:/a:owncloud:owncloud:10.0.4</td>
329</tr>
330<tr>
331<td>Method:</td>
332<td>ownCloud Detection
333 (OID: 1.3.6.1.4.1.25623.1.0.103564)
334 </td>
335</tr>
336</table></p>
337</div>
338<div class="result_section">
339<b>References</b><br><p><table><tr valign="top">
340<td>Other:</td>
341<td>https://doc.owncloud.org/server/latest/admin_manual/configuration_server/harden_server.html#place-data-directory-outside-of-the-web-root</td>
342</tr></table></p>
343</div>
344<div class="result_head medium">
345<div class="location_float">80/tcp</div>
346<b>Medium</b>
347 (CVSS: 4.8)
348 <div class="full_width">
349 NVT:
350 Cleartext Transmission of Sensitive Information via HTTP
351 (OID: 1.3.6.1.4.1.25623.1.0.108440)
352 </div>
353</div>
354<div class="result_section">
355<b>Summary</b><p>The host / application transmits sensitive information (username, passwords) in
356 cleartext via HTTP.</p>
357</div>
358<div class="result_section">
359<b>Vulnerability Detection Result</b><pre>The following input fields where identified (URL:input name):
360
361http://10.10.10.9/owncloud/index.php/login:password</pre>
362</div>
363<div class="result_section">
364<b>Impact</b><p>An attacker could use this situation to compromise or eavesdrop on the
365 HTTP communication between the client and the server using a man-in-the-middle attack to get access to
366 sensitive data like usernames or passwords.</p>
367</div>
368<div class="result_section">
369<b>Solution</b><p><b>Solution type: </b>Workaround</p>
370<p>Enforce the transmission of sensitive data via an encrypted SSL/TLS connection.
371 Additionally make sure the host / application is redirecting all users to the secured SSL/TLS connection before
372 allowing to input sensitive data into the mentioned functions.</p>
373</div>
374<div class="result_section">
375<b>Affected Software/OS</b><p>Hosts / applications which doesn't enforce the transmission of sensitive data via an
376 encrypted SSL/TLS connection.</p>
377</div>
378<div class="result_section">
379<b>Vulnerability Detection Method</b><p>Evaluate previous collected information and check if the host / application is not
380 enforcing the transmission of sensitive data via an encrypted SSL/TLS connection.</p>
381<p> The script is currently checking the following:</p>
382<p> - HTTP Basic Authentication (Basic Auth)</p>
383<p> - HTTP Forms (e.g. Login) with input field of type 'password'</p>
384<p>
385 Details:
386 Cleartext Transmission of Sensitive Information via HTTP
387 (OID: 1.3.6.1.4.1.25623.1.0.108440)
388 </p>
389<p>
390 Version used: $Revision: 10726 $</p>
391</div>
392<div class="result_section">
393<b>References</b><br><p><table>
394<tr valign="top">
395<td>Other:</td>
396<td>https://www.owasp.org/index.php/Top_10_2013-A2-Broken_Authentication_and_Session_Management</td>
397</tr>
398<tr valign="top">
399<td></td>
400<td>https://www.owasp.org/index.php/Top_10_2013-A6-Sensitive_Data_Exposure</td>
401</tr>
402<tr valign="top">
403<td></td>
404<td>https://cwe.mitre.org/data/definitions/319.html</td>
405</tr>
406</table></p>
407</div>
408<div class="result_head low">
409<div class="location_float">general/tcp</div>
410<b>Low</b>
411 (CVSS: 2.6)
412 <div class="full_width">
413 NVT:
414 TCP timestamps
415 (OID: 1.3.6.1.4.1.25623.1.0.80091)
416 </div>
417</div>
418<div class="result_section">
419<b>Summary</b><p>The remote host implements TCP timestamps and therefore allows to compute
420 the uptime.</p>
421</div>
422<div class="result_section">
423<b>Vulnerability Detection Result</b><pre>It was detected that the host implements RFC1323.
424
425The following timestamps were retrieved with a delay of 1 seconds in-between:
426Packet 1: 3376734056
427Packet 2: 3376735160</pre>
428</div>
429<div class="result_section">
430<b>Impact</b><p>A side effect of this feature is that the uptime of the remote
431 host can sometimes be computed.</p>
432</div>
433<div class="result_section">
434<b>Solution</b><p><b>Solution type: </b>Mitigation</p>
435<p>To disable TCP timestamps on linux add the line 'net.ipv4.tcp_timestamps = 0' to
436 /etc/sysctl.conf. Execute 'sysctl -p' to apply the settings at runtime.</p>
437<p> To disable TCP timestamps on Windows execute 'netsh int tcp set global timestamps=disabled'</p>
438<p> Starting with Windows Server 2008 and Vista, the timestamp can not be completely disabled.</p>
439<p> The default behavior of the TCP/IP stack on this Systems is to not use the
440 Timestamp options when initiating TCP connections, but use them if the TCP peer
441 that is initiating communication includes them in their synchronize (SYN) segment.</p>
442<p> See the references for more information.</p>
443</div>
444<div class="result_section">
445<b>Affected Software/OS</b><p>TCP/IPv4 implementations that implement RFC1323.</p>
446</div>
447<div class="result_section">
448<b>Vulnerability Insight</b><p>The remote host implements TCP timestamps, as defined by RFC1323.</p>
449</div>
450<div class="result_section">
451<b>Vulnerability Detection Method</b><p>Special IP packets are forged and sent with a little delay in between to the
452 target IP. The responses are searched for a timestamps. If found, the timestamps are reported.</p>
453<p>
454 Details:
455 TCP timestamps
456 (OID: 1.3.6.1.4.1.25623.1.0.80091)
457 </p>
458<p>
459 Version used: $Revision: 14310 $</p>
460</div>
461<div class="result_section">
462<b>References</b><br><p><table>
463<tr valign="top">
464<td>Other:</td>
465<td>http://www.ietf.org/rfc/rfc1323.txt</td>
466</tr>
467<tr valign="top">
468<td></td>
469<td>http://www.microsoft.com/en-us/download/details.aspx?id=9152</td>
470</tr>
471</table></p>
472</div>
473<div class="result_head ">
474<div class="location_float">80/tcp</div>
475<b>Log</b>
476 (CVSS: 0.0)
477 <div class="full_width">
478 NVT:
479 Services
480 (OID: 1.3.6.1.4.1.25623.1.0.10330)
481 </div>
482</div>
483<div class="result_section">
484<b>Summary</b><p>This routine attempts to guess which service is running on the
485 remote ports. For instance, it searches for a web server which could listen on another port than
486 80 or 443 and makes this information available for other check routines.</p>
487</div>
488<div class="result_section">
489<b>Vulnerability Detection Result</b><pre>A web server is running on this port</pre>
490</div>
491<div class="result_section">
492<b>Log Method</b><p>
493 Details:
494 Services
495 (OID: 1.3.6.1.4.1.25623.1.0.10330)
496 </p>
497<p>
498 Version used: 2019-07-08T14:12:44+0000</p>
499</div>
500<div class="result_head ">
501<div class="location_float">80/tcp</div>
502<b>Log</b>
503 (CVSS: 0.0)
504 <div class="full_width">
505 NVT:
506 Apache Web Server Detection
507 (OID: 1.3.6.1.4.1.25623.1.0.900498)
508 </div>
509</div>
510<div class="result_section">
511<b>Summary</b><p>Detects the installed version of Apache Web Server.</p>
512<p> The script detects the version of Apache HTTP Server on remote host and sets the KB.</p>
513</div>
514<div class="result_section">
515<b>Vulnerability Detection Result</b><pre>Detected Apache
516
517Version: 2.4.18
518Location: 80/tcp
519CPE: cpe:/a:apache:http_server:2.4.18
520
521Concluded from version/product identification result:
522Server: Apache/2.4.18</pre>
523</div>
524<div class="result_section">
525<b>Log Method</b><p>
526 Details:
527 Apache Web Server Detection
528 (OID: 1.3.6.1.4.1.25623.1.0.900498)
529 </p>
530<p>
531 Version used: 2020-02-03T13:52:45+0000</p>
532</div>
533<div class="result_head ">
534<div class="location_float">80/tcp</div>
535<b>Log</b>
536 (CVSS: 0.0)
537 <div class="full_width">
538 NVT:
539 HTTP Security Headers Detection
540 (OID: 1.3.6.1.4.1.25623.1.0.112081)
541 </div>
542</div>
543<div class="result_section">
544<b>Summary</b><p>All known security headers are being checked on the host. On completion a report
545 will hand back whether a specific security header has been implemented (including its value) or is missing on the target.</p>
546</div>
547<div class="result_section">
548<b>Vulnerability Detection Result</b><pre>Missing Headers
549---------------------------------
550Content-Security-Policy
551Referrer-Policy
552X-Content-Type-Options
553X-Frame-Options
554X-Permitted-Cross-Domain-Policies
555X-XSS-Protection</pre>
556</div>
557<div class="result_section">
558<b>Log Method</b><p>
559 Details:
560 HTTP Security Headers Detection
561 (OID: 1.3.6.1.4.1.25623.1.0.112081)
562 </p>
563<p>
564 Version used: 2020-02-17T08:26:38+0000</p>
565</div>
566<div class="result_section">
567<b>References</b><br><p><table>
568<tr valign="top">
569<td>Other:</td>
570<td>https://www.owasp.org/index.php/OWASP_Secure_Headers_Project</td>
571</tr>
572<tr valign="top">
573<td></td>
574<td>https://www.owasp.org/index.php/OWASP_Secure_Headers_Project#tab=Headers</td>
575</tr>
576<tr valign="top">
577<td></td>
578<td>https://securityheaders.io/</td>
579</tr>
580</table></p>
581</div>
582<div class="result_head ">
583<div class="location_float">80/tcp</div>
584<b>Log</b>
585 (CVSS: 0.0)
586 <div class="full_width">
587 NVT:
588 HTTP Server type and version
589 (OID: 1.3.6.1.4.1.25623.1.0.10107)
590 </div>
591</div>
592<div class="result_section">
593<b>Summary</b><p>This script detects and reports the HTTP Server's banner
594 which might provide the type and version of it.</p>
595</div>
596<div class="result_section">
597<b>Vulnerability Detection Result</b><pre>The remote HTTP Server banner is:
598
599Server: Apache/2.4.18 (Ubuntu)</pre>
600</div>
601<div class="result_section">
602<b>Log Method</b><p>
603 Details:
604 HTTP Server type and version
605 (OID: 1.3.6.1.4.1.25623.1.0.10107)
606 </p>
607<p>
608 Version used: 2020-02-06T14:44:42+0000</p>
609</div>
610<div class="result_head ">
611<div class="location_float">general/tcp</div>
612<b>Log</b>
613 (CVSS: 0.0)
614 <div class="full_width">
615 NVT:
616 OS Detection Consolidation and Reporting
617 (OID: 1.3.6.1.4.1.25623.1.0.105937)
618 </div>
619</div>
620<div class="result_section">
621<b>Summary</b><p>This script consolidates the OS information detected by several NVTs and tries to find the best matching OS.</p>
622<p> Furthermore it reports all previously collected information leading to this best matching OS. It also reports possible additional information
623 which might help to improve the OS detection.</p>
624<p> If any of this information is wrong or could be improved please consider to report these to the referenced community portal.</p>
625</div>
626<div class="result_section">
627<b>Vulnerability Detection Result</b><pre>Best matching OS:
628
629OS: Ubuntu
630CPE: cpe:/o:canonical:ubuntu_linux
631Found by NVT: 1.3.6.1.4.1.25623.1.0.111067 (HTTP OS Identification)
632Concluded from HTTP Server banner on port 80/tcp: Server: Apache/2.4.18 (Ubuntu)
633Setting key "Host/runs_unixoide" based on this information
634
635Other OS detections (in order of reliability):
636
637OS: Ubuntu
638CPE: cpe:/o:canonical:ubuntu_linux
639Found by NVT: 1.3.6.1.4.1.25623.1.0.111067 (HTTP OS Identification)
640Concluded from HTTP Server default page on port 80/tcp: <title>Apache2 Ubuntu Default Page</pre>
641</div>
642<div class="result_section">
643<b>Log Method</b><p>
644 Details:
645 OS Detection Consolidation and Reporting
646 (OID: 1.3.6.1.4.1.25623.1.0.105937)
647 </p>
648<p>
649 Version used: 2020-02-21T03:27:16+0000</p>
650</div>
651<div class="result_section">
652<b>References</b><br><p><table><tr valign="top">
653<td>Other:</td>
654<td>https://community.greenbone.net/c/vulnerability-tests</td>
655</tr></table></p>
656</div>
657<div class="result_head ">
658<div class="location_float">80/tcp</div>
659<b>Log</b>
660 (CVSS: 0.0)
661 <div class="full_width">
662 NVT:
663 ownCloud Detection
664 (OID: 1.3.6.1.4.1.25623.1.0.103564)
665 </div>
666</div>
667<div class="result_section">
668<b>Summary</b><p>Detection of ownCloud.</p>
669<p> The script sends a connection request to the server and attempts to
670 extract the version number from the reply.</p>
671</div>
672<div class="result_section">
673<b>Vulnerability Detection Result</b><pre>Detected ownCloud
674
675Version: 10.0.4
676Location: /owncloud
677CPE: cpe:/a:owncloud:owncloud:10.0.4
678
679Concluded from version/product identification result:
680version":"10.0.4.4","versionstring":"10.0.4"
681
682Concluded from version/product identification location:
683http://10.10.10.9/owncloud/status.php</pre>
684</div>
685<div class="result_section">
686<b>Log Method</b><p>
687 Details:
688 ownCloud Detection
689 (OID: 1.3.6.1.4.1.25623.1.0.103564)
690 </p>
691<p>
692 Version used: 2019-11-08T10:10:55+0000</p>
693</div>
694<div class="result_head ">
695<div class="location_float">80/tcp</div>
696<b>Log</b>
697 (CVSS: 0.0)
698 <div class="full_width">
699 NVT:
700 jQuery Detection
701 (OID: 1.3.6.1.4.1.25623.1.0.141622)
702 </div>
703</div>
704<div class="result_section">
705<b>Summary</b><p>Detection of jQuery.</p>
706<p> The script sends a connection request to the server and attempts to detect jQuery and to extract its version.</p>
707</div>
708<div class="result_section">
709<b>Vulnerability Detection Result</b><pre>Detected jQuery
710
711Version: unknown
712Location: Externally hosted
713CPE: cpe:/a:jquery:jquery
714
715Concluded from version/product identification result:
716src="//ajax.googleapis.com/ajax/libs/jquery/1.10.1/jquery.min.js embedded into URL /owncloud/core/vendor/blueimp-md5
717
718Extra information:
719The jQuery library is hosted on a different server. Because of this it is not possible to gather the version by a direct file access. Please manually inspect the version which gets included on this web page.</pre>
720</div>
721<div class="result_section">
722<b>Log Method</b><p>
723 Details:
724 jQuery Detection
725 (OID: 1.3.6.1.4.1.25623.1.0.141622)
726 </p>
727<p>
728 Version used: 2019-11-08T10:10:55+0000</p>
729</div>
730<div class="result_section">
731<b>References</b><br><p><table><tr valign="top">
732<td>Other:</td>
733<td>https://jquery.com/</td>
734</tr></table></p>
735</div>
736<div class="result_head ">
737<div class="location_float">80/tcp</div>
738<b>Log</b>
739 (CVSS: 0.0)
740 <div class="full_width">
741 NVT:
742 jQuery Detection
743 (OID: 1.3.6.1.4.1.25623.1.0.141622)
744 </div>
745</div>
746<div class="result_section">
747<b>Summary</b><p>Detection of jQuery.</p>
748<p> The script sends a connection request to the server and attempts to detect jQuery and to extract its version.</p>
749</div>
750<div class="result_section">
751<b>Vulnerability Detection Result</b><pre>Detected jQuery
752
753Version: 1.9.0
754Location: /owncloud/core/vendor/jcrop/js
755CPE: cpe:/a:jquery:jquery:1.9.0
756
757Concluded from version/product identification result:
758jQuery v1.9.0
759
760Concluded from version/product identification location:
761http://10.10.10.9/owncloud/core/vendor/jcrop/js/jquery.min.js</pre>
762</div>
763<div class="result_section">
764<b>Log Method</b><p>
765 Details:
766 jQuery Detection
767 (OID: 1.3.6.1.4.1.25623.1.0.141622)
768 </p>
769<p>
770 Version used: 2019-11-08T10:10:55+0000</p>
771</div>
772<div class="result_section">
773<b>References</b><br><p><table><tr valign="top">
774<td>Other:</td>
775<td>https://jquery.com/</td>
776</tr></table></p>
777</div>
778<div class="result_head ">
779<div class="location_float">80/tcp</div>
780<b>Log</b>
781 (CVSS: 0.0)
782 <div class="full_width">
783 NVT:
784 HTTP Server Banner Enumeration
785 (OID: 1.3.6.1.4.1.25623.1.0.108708)
786 </div>
787</div>
788<div class="result_section">
789<b>Summary</b><p>This script tries to detect / enumerate different HTTP server banner (e.g. from a
790 frontend, backend or proxy server) by sending various different HTTP requests (valid and invalid ones).</p>
791</div>
792<div class="result_section">
793<b>Vulnerability Detection Result</b><pre>It was possible to enumerate the following HTTP server banner(s):
794
795Server banner | Enumeration technique
796----------------------------------------------------------------------------
797Server: Apache/2.4.18 (Ubuntu) | Valid HTTP 0.9 GET request to '/index.html'</pre>
798</div>
799<div class="result_section">
800<b>Log Method</b><p>
801 Details:
802 HTTP Server Banner Enumeration
803 (OID: 1.3.6.1.4.1.25623.1.0.108708)
804 </p>
805<p>
806 Version used: 2020-02-19T08:26:24+0000</p>
807</div>
808<div class="result_head ">
809<div class="location_float">general/icmp</div>
810<b>Log</b>
811 (CVSS: 0.0)
812 <div class="full_width">
813 NVT:
814 ICMP Timestamp Detection
815 (OID: 1.3.6.1.4.1.25623.1.0.103190)
816 </div>
817</div>
818<div class="result_section">
819<b>Summary</b><p>The remote host responded to an ICMP timestamp request.
820 The Timestamp Reply is an ICMP message which replies to a Timestamp message. It consists
821 of the originating timestamp sent by the sender of the Timestamp as well as a receive
822 timestamp and a transmit timestamp. This information could theoretically be used to
823 exploit weak time-based random number generators in other services.</p>
824</div>
825<div class="result_section">
826<b>Vulnerability Detection Result</b><p>
827 Vulnerability was detected according to the Vulnerability Detection Method.
828 </p>
829</div>
830<div class="result_section">
831<b>Log Method</b><p>
832 Details:
833 ICMP Timestamp Detection
834 (OID: 1.3.6.1.4.1.25623.1.0.103190)
835 </p>
836<p>
837 Version used: $Revision: 10411 $</p>
838</div>
839<div class="result_section">
840<b>References</b><br><p><table>
841<tr valign="top">
842<td>CVE:</td>
843<td>CVE-1999-0524</td>
844</tr>
845<tr valign="top">
846<td>CERT:</td>
847<td>CB-K15/1514, CB-K14/0632, DFN-CERT-2014-0658</td>
848</tr>
849<tr valign="top">
850<td>Other:</td>
851<td>http://www.ietf.org/rfc/rfc0792.txt</td>
852</tr>
853</table></p>
854</div>
855<div class="result_head ">
856<div class="location_float">80/tcp</div>
857<b>Log</b>
858 (CVSS: 0.0)
859 <div class="full_width">
860 NVT:
861 CGI Scanning Consolidation
862 (OID: 1.3.6.1.4.1.25623.1.0.111038)
863 </div>
864</div>
865<div class="result_section">
866<b>Summary</b><p>The script consolidates various information for CGI scanning.</p>
867<p> This information is based on the following scripts / settings:</p>
868<p> - HTTP-Version Detection (OID: 1.3.6.1.4.1.25623.1.0.100034)</p>
869<p> - No 404 check (OID: 1.3.6.1.4.1.25623.1.0.10386)</p>
870<p> - Web mirroring / webmirror.nasl (OID: 1.3.6.1.4.1.25623.1.0.10662)</p>
871<p> - Directory Scanner / DDI_Directory_Scanner.nasl (OID: 1.3.6.1.4.1.25623.1.0.11032)</p>
872<p> - The configured 'cgi_path' within the 'Scanner Preferences' of the scan config in use</p>
873<p> - The configured 'Enable CGI scanning', 'Enable generic web application scanning' and
874 'Add historic /scripts and /cgi-bin to directories for CGI scanning' within the
875 'Global variable settings' of the scan config in use</p>
876<p> If you think any of this information is wrong please report it to the referenced community portal.</p>
877</div>
878<div class="result_section">
879<b>Vulnerability Detection Result</b><pre>The Hostname/IP "10.10.10.9" was used to access the remote host.
880
881Generic web application scanning is disabled for this host via the "Enable generic web application scanning" option within the "Global variable settings" of the scan config in use.
882
883Requests to this service are done via HTTP/1.1.
884
885This service seems to be able to host PHP scripts.
886
887This service seems to be NOT able to host ASP scripts.
888
889The User-Agent "Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" was used to access the remote host.
890
891Historic /scripts and /cgi-bin are not added to the directories used for CGI scanning. You can enable this again with the "Add historic /scripts and /cgi-bin to directories for CGI scanning" option within the "Global variable settings" of the scan config in use.
892
893A possible recursion was detected during CGI scanning:
894
895The service is using a relative URL in one or more HTML references where e.g. /file1.html contains <a href="subdir/file2.html"> and a subsequent request for subdir/file2.html is linking to subdir/file2.html. This would resolves to subdir/subdir/file2.html causing a recursion. To work around this counter-measures have been enabled but the service should be fixed as well to not use such problematic links. Below an excerpt of URLs is shown to help identify those issues.
896
897Syntax : URL (HTML link)
898
899http://10.10.10.9/owncloud/core/ (templates/)
900http://10.10.10.9/owncloud/core/?D=A (templates/)
901http://10.10.10.9/owncloud/core/vendor/bootstrap/ (dist/)
902http://10.10.10.9/owncloud/core/vendor/bootstrap/ (fonts/)
903http://10.10.10.9/owncloud/core/vendor/bootstrap/ (js/)
904
905The following directories require authentication and are tested by the script "HTTP Brute Force Logins with default Credentials (OID: 1.3.6.1.4.1.25623.1.0.108041)":
906
907http://10.10.10.9/owncloud/remote.php/dav
908
909The following directories were used for CGI scanning:
910
911http://10.10.10.9/
912http://10.10.10.9/owncloud
913http://10.10.10.9/owncloud/core
914http://10.10.10.9/owncloud/core/Command
915http://10.10.10.9/owncloud/core/Controller
916http://10.10.10.9/owncloud/core/Middleware
917http://10.10.10.9/owncloud/core/Migrations
918http://10.10.10.9/owncloud/core/ajax
919http://10.10.10.9/owncloud/core/doc
920http://10.10.10.9/owncloud/core/fonts
921http://10.10.10.9/owncloud/core/l10n
922http://10.10.10.9/owncloud/core/search
923http://10.10.10.9/owncloud/core/skeleton
924http://10.10.10.9/owncloud/core/vendor
925http://10.10.10.9/owncloud/core/vendor/backbone
926http://10.10.10.9/owncloud/core/vendor/base64
927http://10.10.10.9/owncloud/core/vendor/blueimp-md5
928http://10.10.10.9/owncloud/core/vendor/blueimp-md5/test
929http://10.10.10.9/owncloud/core/vendor/bootstrap
930http://10.10.10.9/owncloud/core/vendor/bootstrap/grunt
931http://10.10.10.9/owncloud/core/vendor/bootstrap/less
932http://10.10.10.9/owncloud/core/vendor/bootstrap/nuget
933http://10.10.10.9/owncloud/core/vendor/bowser
934http://10.10.10.9/owncloud/core/vendor/bowser/src
935http://10.10.10.9/owncloud/core/vendor/browser-update
936http://10.10.10.9/owncloud/core/vendor/clipboard
937http://10.10.10.9/owncloud/core/vendor/clipboard/dist
938http://10.10.10.9/owncloud/core/vendor/davclient.js
939http://10.10.10.9/owncloud/core/vendor/davclient.js/lib
940http://10.10.10.9/owncloud/core/vendor/es6-promise
941http://10.10.10.9/owncloud/core/vendor/es6-promise/config
942http://10.10.10.9/owncloud/core/vendor/es6-promise/dist
943http://10.10.10.9/owncloud/core/vendor/es6-promise/lib
944http://10.10.10.9/owncloud/core/vendor/es6-promise/lib/es6-promise
945http://10.10.10.9/owncloud/core/vendor/es6-promise/server
946http://10.10.10.9/owncloud/core/vendor/handlebars
947http://10.10.10.9/owncloud/core/vendor/handlebars/lib
948http://10.10.10.9/owncloud/core/vendor/handlebars/lib/handlebars
949http://10.10.10.9/owncloud/core/vendor/jcrop
950http://10.10.10.9/owncloud/core/vendor/jcrop/demos
951http://10.10.10.9/owncloud/core/vendor/jcrop/demos/demo_files
952http://10.10.10.9/owncloud/core/vendor/jsTimezoneDetect
953http://10.10.10.9/owncloud/core/vendor/moment
954http://10.10.10.9/owncloud/core/vendor/moment/locale
955http://10.10.10.9/owncloud/core/vendor/moment/min
956http://10.10.10.9/owncloud/core/vendor/moment/src
957http://10.10.10.9/owncloud/core/vendor/moment/templates
958http://10.10.10.9/owncloud/core/vendor/select2
959http://10.10.10.9/owncloud/core/vendor/showdown
960http://10.10.10.9/owncloud/core/vendor/snapjs
961http://10.10.10.9/owncloud/core/vendor/snapjs/dist
962http://10.10.10.9/owncloud/core/vendor/snapjs/dist/2.0.0-rc1
963http://10.10.10.9/owncloud/core/vendor/snapjs/dist/latest
964http://10.10.10.9/owncloud/core/vendor/snapjs/scripts
965http://10.10.10.9/owncloud/core/vendor/strengthify
966http://10.10.10.9/owncloud/core/vendor/underscore
967http://10.10.10.9/owncloud/core/vendor/zxcvbn
968
969While this is not, in and of itself, a bug, you should manually inspect these directories to ensure that they are in compliance with company security standards
970
971The following directories were excluded from CGI scanning because the "Regex pattern to exclude directories from CGI scanning" setting of the NVT "Global variable settings" (OID: 1.3.6.1.4.1.25623.1.0.12288) for this scan was: "/(index\.php|image|img|css|js$|js/|javascript|style|theme|icon|jquery|graphic|grafik|picture|bilder|thumbnail|media/|skins?/)"
972
973http://10.10.10.9/icons
974http://10.10.10.9/owncloud/apps/files_versions/css
975http://10.10.10.9/owncloud/apps/files_videoplayer/css
976http://10.10.10.9/owncloud/apps/files_videoplayer/js
977http://10.10.10.9/owncloud/apps/firstrunwizard/css
978http://10.10.10.9/owncloud/apps/firstrunwizard/js
979http://10.10.10.9/owncloud/core/css
980http://10.10.10.9/owncloud/core/img
981http://10.10.10.9/owncloud/core/js
982http://10.10.10.9/owncloud/core/js/files
983http://10.10.10.9/owncloud/core/search/js
984http://10.10.10.9/owncloud/core/vendor/blueimp-md5/css
985http://10.10.10.9/owncloud/core/vendor/blueimp-md5/js
986http://10.10.10.9/owncloud/core/vendor/bootstrap/js
987http://10.10.10.9/owncloud/core/vendor/jcrop/js
988http://10.10.10.9/owncloud/core/vendor/jquery
989http://10.10.10.9/owncloud/core/vendor/jquery-migrate
990http://10.10.10.9/owncloud/core/vendor/jquery-ui
991http://10.10.10.9/owncloud/core/vendor/jquery-ui/themes
992http://10.10.10.9/owncloud/core/vendor/jquery-ui/themes/base
993http://10.10.10.9/owncloud/core/vendor/jquery-ui/ui
994http://10.10.10.9/owncloud/core/vendor/jquery/dist
995http://10.10.10.9/owncloud/index.php
996http://10.10.10.9/owncloud/index.php/core/js
997
998Directory index found at:
999
1000http://10.10.10.9/owncloud/core/
1001http://10.10.10.9/owncloud/core/vendor/backbone/
1002http://10.10.10.9/owncloud/core/vendor/base64/
1003http://10.10.10.9/owncloud/core/vendor/bootstrap/
1004http://10.10.10.9/owncloud/core/vendor/bowser/
1005http://10.10.10.9/owncloud/core/vendor/bowser/src/
1006http://10.10.10.9/owncloud/core/vendor/clipboard/dist/
1007http://10.10.10.9/owncloud/core/vendor/davclient.js/lib/
1008http://10.10.10.9/owncloud/core/vendor/es6-promise/config/
1009http://10.10.10.9/owncloud/core/vendor/es6-promise/dist/
1010http://10.10.10.9/owncloud/core/vendor/es6-promise/lib/
1011http://10.10.10.9/owncloud/core/vendor/es6-promise/server/
1012http://10.10.10.9/owncloud/core/vendor/handlebars/
1013http://10.10.10.9/owncloud/core/vendor/handlebars/lib/handlebars/
1014http://10.10.10.9/owncloud/core/vendor/jquery-migrate/
1015http://10.10.10.9/owncloud/core/vendor/jquery-ui/
1016http://10.10.10.9/owncloud/core/vendor/jquery/
1017http://10.10.10.9/owncloud/core/vendor/jsTimezoneDetect/
1018http://10.10.10.9/owncloud/core/vendor/moment/
1019http://10.10.10.9/owncloud/core/vendor/moment/locale/
1020http://10.10.10.9/owncloud/core/vendor/moment/min/
1021http://10.10.10.9/owncloud/core/vendor/moment/templates/
1022http://10.10.10.9/owncloud/core/vendor/select2/
1023http://10.10.10.9/owncloud/core/vendor/showdown/
1024http://10.10.10.9/owncloud/core/vendor/snapjs/
1025http://10.10.10.9/owncloud/core/vendor/snapjs/dist/
1026http://10.10.10.9/owncloud/core/vendor/snapjs/dist/latest/
1027http://10.10.10.9/owncloud/core/vendor/strengthify/
1028http://10.10.10.9/owncloud/core/vendor/underscore/
1029http://10.10.10.9/owncloud/core/vendor/zxcvbn/
1030
1031The "Number of pages to mirror" setting (Current: 200) of the NVT "Web mirroring" (OID: 1.3.6.1.4.1.25623.1.0.10662) was reached. Raising this limit allows to mirror this host more thoroughly but might increase the scanning time.
1032
1033The following CGIs were discovered:
1034
1035Syntax : cginame (arguments [default value])
1036
1037http://10.10.10.9/owncloud/core/ (C=S;O [A] C=N;O [D] C=M;O [A] C=D;O [A] )
1038http://10.10.10.9/owncloud/core/vendor/ (C=S;O [A] C=N;O [D] C=M;O [A] C=D;O [A] )
1039http://10.10.10.9/owncloud/core/vendor/backbone/ (C=S;O [A] C=N;O [D] C=M;O [A] C=D;O [A] )
1040http://10.10.10.9/owncloud/core/vendor/base64/ (C=S;O [A] C=N;O [D] C=M;O [A] C=D;O [A] )
1041http://10.10.10.9/owncloud/core/vendor/bootstrap/ (C=S;O [A] C=N;O [D] C=M;O [A] C=D;O [A] )
1042http://10.10.10.9/owncloud/core/vendor/bowser/ (C=S;O [A] C=N;O [D] C=M;O [A] C=D;O [A] )
1043http://10.10.10.9/owncloud/core/vendor/bowser/src/ (C=S;O [A] C=N;O [D] C=M;O [A] C=D;O [A] )
1044http://10.10.10.9/owncloud/core/vendor/clipboard/ (C=S;O [A] C=N;O [D] C=M;O [A] C=D;O [A] )
1045http://10.10.10.9/owncloud/core/vendor/clipboard/dist/ (C=S;O [A] C=N;O [D] C=M;O [A] C=D;O [A] )
1046http://10.10.10.9/owncloud/core/vendor/davclient.js/lib/ (C=S;O [A] C=N;O [D] C=M;O [A] C=D;O [A] )
1047http://10.10.10.9/owncloud/core/vendor/es6-promise/ (C=S;O [A] C=N;O [D] C=M;O [A] C=D;O [A] )
1048http://10.10.10.9/owncloud/core/vendor/es6-promise/config/ (C=S;O [A] C=N;O [D] C=M;O [A] C=D;O [A] )
1049http://10.10.10.9/owncloud/core/vendor/es6-promise/dist/ (C=S;O [A] C=N;O [D] C=M;O [A] C=D;O [A] )
1050http://10.10.10.9/owncloud/core/vendor/es6-promise/lib/ (C=S;O [A] C=N;O [D] C=M;O [A] C=D;O [A] )
1051http://10.10.10.9/owncloud/core/vendor/es6-promise/server/ (C=S;O [A] C=N;O [D] C=M;O [A] C=D;O [A] )
1052http://10.10.10.9/owncloud/core/vendor/handlebars/ (C=S;O [A] C=N;O [D] C=M;O [A] C=D;O [A] )
1053http://10.10.10.9/owncloud/core/vendor/handlebars/lib/ (C=S;O [A] C=N;O [D] C=M;O [A] C=D;O [A] )
1054http://10.10.10.9/owncloud/core/vendor/handlebars/lib/handlebars/ (C=S;O [A] C=N;O [D] C=M;O [A] C=D;O [A] )
1055http://10.10.10.9/owncloud/core/vendor/jquery-migrate/ (C=S;O [A] C=N;O [D] C=M;O [A] C=D;O [A] )
1056http://10.10.10.9/owncloud/core/vendor/jquery-ui/ (C=S;O [A] C=N;O [D] C=M;O [A] C=D;O [A] )
1057http://10.10.10.9/owncloud/core/vendor/jquery/ (C=S;O [A] C=N;O [D] C=M;O [A] C=D;O [A] )
1058http://10.10.10.9/owncloud/core/vendor/jsTimezoneDetect/ (C=S;O [A] C=N;O [D] C=M;O [A] C=D;O [A] )
1059http://10.10.10.9/owncloud/core/vendor/moment/ (C=S;O [A] C=N;O [D] C=M;O [A] C=D;O [A] )
1060http://10.10.10.9/owncloud/core/vendor/moment/locale/ (C=S;O [A] C=N;O [D] C=M;O [A] C=D;O [A] )
1061http://10.10.10.9/owncloud/core/vendor/moment/min/ (C=S;O [A] C=N;O [D] C=M;O [A] C=D;O [A] )
1062http://10.10.10.9/owncloud/core/vendor/moment/src/ (C=S;O [A] C=N;O [D] C=M;O [A] C=D;O [A] )
1063http://10.10.10.9/owncloud/core/vendor/moment/templates/ (C=S;O [A] C=N;O [D] C=M;O [A] C=D;O [A] )
1064http://10.10.10.9/owncloud/core/vendor/select2/ (C=S;O [A] C=N;O [D] C=M;O [A] C=D;O [A] )
1065http://10.10.10.9/owncloud/core/vendor/showdown/ (C=S;O [A] C=N;O [D] C=M;O [A] C=D;O [A] )
1066http://10.10.10.9/owncloud/core/vendor/snapjs/ (C=S;O [A] C=N;O [D] C=M;O [A] C=D;O [A] )
1067http://10.10.10.9/owncloud/core/vendor/snapjs/dist/ (C=S;O [A] C=N;O [D] C=M;O [A] C=D;O [A] )
1068http://10.10.10.9/owncloud/core/vendor/snapjs/dist/2.0.0-rc1/ (C=S;O [A] C=N;O [D] C=M;O [A] C=D;O [A] )
1069http://10.10.10.9/owncloud/core/vendor/snapjs/dist/latest/ (C=S;O [A] C=N;O [D] C=M;O [A] C=D;O [A] )
1070http://10.10.10.9/owncloud/core/vendor/strengthify/ (C=S;O [A] C=N;O [D] C=M;O [A] C=D;O [A] )
1071http://10.10.10.9/owncloud/core/vendor/underscore/ (C=S;O [A] C=N;O [D] C=M;O [A] C=D;O [A] )
1072http://10.10.10.9/owncloud/core/vendor/zxcvbn/ (C=S;O [A] C=N;O [D] C=M;O [A] C=D;O [A] )
1073
1074The following cgi scripts were excluded from CGI scanning because of the "Regex pattern to exclude cgi scripts" setting of the NVT "Web mirroring" (OID: 1.3.6.1.4.1.25623.1.0.10662) for this scan was: "\.(js|css)$"
1075
1076Syntax : cginame (arguments [default value])
1077
1078http://10.10.10.9/owncloud/apps/files_versions/css/versions.css (v [f23b49e0391ed08afeebaa748ed4956f] )
1079http://10.10.10.9/owncloud/apps/files_videoplayer/css/style.css (v [f23b49e0391ed08afeebaa748ed4956f] )
1080http://10.10.10.9/owncloud/apps/files_videoplayer/js/viewer.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1081http://10.10.10.9/owncloud/apps/firstrunwizard/css/colorbox.css (v [f23b49e0391ed08afeebaa748ed4956f] )
1082http://10.10.10.9/owncloud/apps/firstrunwizard/css/firstrunwizard.css (v [f23b49e0391ed08afeebaa748ed4956f] )
1083http://10.10.10.9/owncloud/apps/firstrunwizard/js/firstrunwizard.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1084http://10.10.10.9/owncloud/apps/firstrunwizard/js/jquery.colorbox.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1085http://10.10.10.9/owncloud/core/css/apps.css (v [f23b49e0391ed08afeebaa748ed4956f] )
1086http://10.10.10.9/owncloud/core/css/fixes.css (v [f23b49e0391ed08afeebaa748ed4956f] )
1087http://10.10.10.9/owncloud/core/css/fonts.css (v [f23b49e0391ed08afeebaa748ed4956f] )
1088http://10.10.10.9/owncloud/core/css/global.css (v [f23b49e0391ed08afeebaa748ed4956f] )
1089http://10.10.10.9/owncloud/core/css/header.css (v [f23b49e0391ed08afeebaa748ed4956f] )
1090http://10.10.10.9/owncloud/core/css/icons.css (v [f23b49e0391ed08afeebaa748ed4956f] )
1091http://10.10.10.9/owncloud/core/css/inputs.css (v [f23b49e0391ed08afeebaa748ed4956f] )
1092http://10.10.10.9/owncloud/core/css/jquery-ui-fixes.css (v [f23b49e0391ed08afeebaa748ed4956f] )
1093http://10.10.10.9/owncloud/core/css/jquery.ocdialog.css (v [f23b49e0391ed08afeebaa748ed4956f] )
1094http://10.10.10.9/owncloud/core/css/mobile.css (v [f23b49e0391ed08afeebaa748ed4956f] )
1095http://10.10.10.9/owncloud/core/css/multiselect.css (v [f23b49e0391ed08afeebaa748ed4956f] )
1096http://10.10.10.9/owncloud/core/css/share.css (v [f23b49e0391ed08afeebaa748ed4956f] )
1097http://10.10.10.9/owncloud/core/css/styles.css (v [f23b49e0391ed08afeebaa748ed4956f] )
1098http://10.10.10.9/owncloud/core/css/tooltip.css (v [f23b49e0391ed08afeebaa748ed4956f] )
1099http://10.10.10.9/owncloud/core/js/apps.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1100http://10.10.10.9/owncloud/core/js/backgroundjobs.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1101http://10.10.10.9/owncloud/core/js/browser-update.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1102http://10.10.10.9/owncloud/core/js/config.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1103http://10.10.10.9/owncloud/core/js/eventsource.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1104http://10.10.10.9/owncloud/core/js/files/client.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1105http://10.10.10.9/owncloud/core/js/files/fileinfo.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1106http://10.10.10.9/owncloud/core/js/jquery.avatar.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1107http://10.10.10.9/owncloud/core/js/jquery.ocdialog.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1108http://10.10.10.9/owncloud/core/js/js.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1109http://10.10.10.9/owncloud/core/js/l10n.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1110http://10.10.10.9/owncloud/core/js/login.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1111http://10.10.10.9/owncloud/core/js/lostpassword.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1112http://10.10.10.9/owncloud/core/js/mimetype.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1113http://10.10.10.9/owncloud/core/js/mimetypelist.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1114http://10.10.10.9/owncloud/core/js/oc-backbone.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1115http://10.10.10.9/owncloud/core/js/oc-dialogs.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1116http://10.10.10.9/owncloud/core/js/oc-requesttoken.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1117http://10.10.10.9/owncloud/core/js/octemplate.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1118http://10.10.10.9/owncloud/core/js/placeholder.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1119http://10.10.10.9/owncloud/core/js/share.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1120http://10.10.10.9/owncloud/core/js/shareconfigmodel.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1121http://10.10.10.9/owncloud/core/js/sharedialogexpirationview.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1122http://10.10.10.9/owncloud/core/js/sharedialoglinklistview.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1123http://10.10.10.9/owncloud/core/js/sharedialoglinkshareview.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1124http://10.10.10.9/owncloud/core/js/sharedialoglinksocialview.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1125http://10.10.10.9/owncloud/core/js/sharedialogmailview.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1126http://10.10.10.9/owncloud/core/js/sharedialogresharerinfoview.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1127http://10.10.10.9/owncloud/core/js/sharedialogshareelistview.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1128http://10.10.10.9/owncloud/core/js/sharedialogview.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1129http://10.10.10.9/owncloud/core/js/shareitemmodel.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1130http://10.10.10.9/owncloud/core/js/sharemodel.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1131http://10.10.10.9/owncloud/core/js/sharescollection.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1132http://10.10.10.9/owncloud/core/js/visitortimezone.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1133http://10.10.10.9/owncloud/core/search/js/search.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1134http://10.10.10.9/owncloud/core/vendor/backbone/backbone.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1135http://10.10.10.9/owncloud/core/vendor/blueimp-md5/js/md5.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1136http://10.10.10.9/owncloud/core/vendor/bootstrap/js/tooltip.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1137http://10.10.10.9/owncloud/core/vendor/bowser/src/bowser.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1138http://10.10.10.9/owncloud/core/vendor/clipboard/dist/clipboard.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1139http://10.10.10.9/owncloud/core/vendor/davclient.js/lib/client.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1140http://10.10.10.9/owncloud/core/vendor/es6-promise/dist/es6-promise.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1141http://10.10.10.9/owncloud/core/vendor/handlebars/handlebars.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1142http://10.10.10.9/owncloud/core/vendor/jquery-migrate/jquery-migrate.min.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1143http://10.10.10.9/owncloud/core/vendor/jquery-ui/themes/base/jquery-ui.css (v [f23b49e0391ed08afeebaa748ed4956f] )
1144http://10.10.10.9/owncloud/core/vendor/jquery-ui/ui/jquery-ui.custom.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1145http://10.10.10.9/owncloud/core/vendor/jquery/dist/jquery.min.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1146http://10.10.10.9/owncloud/core/vendor/jsTimezoneDetect/jstz.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1147http://10.10.10.9/owncloud/core/vendor/moment/min/moment-with-locales.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1148http://10.10.10.9/owncloud/core/vendor/snapjs/dist/latest/snap.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1149http://10.10.10.9/owncloud/core/vendor/underscore/underscore.js (v [f23b49e0391ed08afeebaa748ed4956f] )
1150http://10.10.10.9/owncloud/index.php/core/js/oc.js (v [f23b49e0391ed08afeebaa748ed4956f] )</pre>
1151</div>
1152<div class="result_section">
1153<b>Log Method</b><p>
1154 Details:
1155 CGI Scanning Consolidation
1156 (OID: 1.3.6.1.4.1.25623.1.0.111038)
1157 </p>
1158<p>
1159 Version used: 2019-09-23T09:25:24+0000</p>
1160</div>
1161<div class="result_section">
1162<b>References</b><br><p><table><tr valign="top">
1163<td>Other:</td>
1164<td>https://community.greenbone.net/c/vulnerability-tests</td>
1165</tr></table></p>
1166</div>
1167<div class="result_head ">
1168<div class="location_float">general/tcp</div>
1169<b>Log</b>
1170 (CVSS: 0.0)
1171 <div class="full_width">
1172 NVT:
1173 Traceroute
1174 (OID: 1.3.6.1.4.1.25623.1.0.51662)
1175 </div>
1176</div>
1177<div class="result_section">
1178<b>Summary</b><p>A traceroute from the scanning server to the target system was
1179 conducted. This traceroute is provided primarily for informational value only. In the vast
1180 majority of cases, it does not represent a vulnerability. However, if the displayed traceroute
1181 contains any private addresses that should not have been publicly visible, then you have an
1182 issue you need to correct.</p>
1183</div>
1184<div class="result_section">
1185<b>Vulnerability Detection Result</b><pre>Here is the route from 10.10.10.11 to 10.10.10.9:
1186
118710.10.10.11
118810.10.10.9</pre>
1189</div>
1190<div class="result_section">
1191<b>Solution</b><p>Block unwanted packets from escaping your network.</p>
1192</div>
1193<div class="result_section">
1194<b>Log Method</b><p>
1195 Details:
1196 Traceroute
1197 (OID: 1.3.6.1.4.1.25623.1.0.51662)
1198 </p>
1199<p>
1200 Version used: 2019-09-09T06:03:58+0000</p>
1201</div>
1202<div class="result_head ">
1203<div class="location_float">80/tcp</div>
1204<b>Log</b>
1205 (CVSS: 0.0)
1206 <div class="full_width">
1207 NVT:
1208 DIRB (NASL wrapper)
1209 (OID: 1.3.6.1.4.1.25623.1.0.103079)
1210 </div>
1211</div>
1212<div class="result_section">
1213<b>Summary</b><p>This script uses DIRB to find directories and files on web
1214 applications via brute forcing. See the preferences section for configuration options.</p>
1215<p> Note: The plugin needs the 'dirb' binary found within the PATH of the user running the scanner and
1216 needs to be executable for this user. The existence of this binary is checked and reported separately
1217 within 'Availability of scanner helper tools' (OID: 1.3.6.1.4.1.25623.1.0.810000).</p>
1218</div>
1219<div class="result_section">
1220<b>Vulnerability Detection Result</b><pre>This are the directories/files found with brute force:
1221
1222http://10.10.10.9:80/</pre>
1223</div>
1224<div class="result_section">
1225<b>Log Method</b><p>
1226 Details:
1227 DIRB (NASL wrapper)
1228 (OID: 1.3.6.1.4.1.25623.1.0.103079)
1229 </p>
1230<p>
1231 Version used: 2019-12-10T12:07:42+0000</p>
1232</div>
1233<div class="result_head ">
1234<div class="location_float">80/tcp</div>
1235<b>Log</b>
1236 (CVSS: 0.0)
1237 <div class="full_width">
1238 NVT:
1239 wapiti (NASL wrapper)
1240 (OID: 1.3.6.1.4.1.25623.1.0.80110)
1241 </div>
1242</div>
1243<div class="result_section">
1244<b>Summary</b><p>This plugin uses wapiti to find
1245 web security issues.</p>
1246<p> Make sure to have wapiti 2.x as wapiti 1.x is not supported.</p>
1247<p> See the preferences section for wapiti options.</p>
1248<p> Note that the scanner is using limited set of wapiti options. Therefore, for more complete web
1249 assessment, you should use standalone wapiti tool for deeper/customized checks.</p>
1250<p> Note: The plugin needs the 'wapiti' binary found within the PATH of the user running the scanner and
1251 needs to be executable for this user. The existence of this binary is checked and reported separately
1252 within 'Availability of scanner helper tools' (OID: 1.3.6.1.4.1.25623.1.0.810000).</p>
1253</div>
1254<div class="result_section">
1255<b>Vulnerability Detection Result</b><pre>The wapiti report filename is empty. That could mean that a wrong version of wapiti is used or tmp dir is not accessible. Make sure to have wapiti 2.x as wapiti 1.x is not supported.
1256In short: Check the installation of wapiti and the scanner.</pre>
1257</div>
1258<div class="result_section">
1259<b>Log Method</b><p>
1260 Details:
1261 wapiti (NASL wrapper)
1262 (OID: 1.3.6.1.4.1.25623.1.0.80110)
1263 </p>
1264<p>
1265 Version used: $Revision: 13985 $</p>
1266</div>
1267<div class="result_head ">
1268<div class="location_float">80/tcp</div>
1269<b>Log</b>
1270 (CVSS: 0.0)
1271 <div class="full_width">
1272 NVT:
1273 Nikto (NASL wrapper)
1274 (OID: 1.3.6.1.4.1.25623.1.0.14260)
1275 </div>
1276</div>
1277<div class="result_section">
1278<b>Summary</b><p>This plugin uses nikto to find weak CGI scripts and other known issues
1279 regarding web server security. See the preferences section for configuration options.</p>
1280<p> Note: The plugin needs the 'nikto' or 'nikto.pl' binary found within the PATH of the user running the scanner and
1281 needs to be executable for this user. The existence of this binary is checked and reported separately
1282 within 'Availability of scanner helper tools' (OID: 1.3.6.1.4.1.25623.1.0.810000).</p>
1283</div>
1284<div class="result_section">
1285<b>Vulnerability Detection Result</b><pre>Here is the Nikto report:
1286- Nikto v2.1.6
1287---------------------------------------------------------------------------
1288+ Target IP: 10.10.10.9
1289+ Target Hostname: 10.10.10.9
1290+ Target Port: 80
1291+ Start Time: 2020-02-24 22:06:30 (GMT0)
1292---------------------------------------------------------------------------
1293+ Server: Apache/2.4.18 (Ubuntu)
1294+ Server leaks inodes via ETags, header found with file /, fields: 0x2c39 0x563304e626016
1295+ The anti-clickjacking X-Frame-Options header is not present.
1296+ The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
1297+ The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
1298+ No CGI Directories found (use '-C all' to force check all possible dirs)
1299+ Allowed HTTP Methods: GET, HEAD, POST, OPTIONS
1300+ OSVDB-3233: /icons/README: Apache default file found.
1301+ Uncommon header 'x-robots-tag' found, with contents: none
1302+ Uncommon header 'x-permitted-cross-domain-policies' found, with contents: none
1303+ Uncommon header 'x-download-options' found, with contents: noopen
1304+ /owncloud/status.php: ownCloud installation indentified by status.php, see the status.php for the running version and https://owncloud.org/security/advisories/ for security advisories
1305+ /owncloud/data/owncloud.log: Unprotected ownCloud data directory identified
1306+ 7650 requests: 0 error(s) and 11 item(s) reported on remote host
1307+ End Time: 2020-02-24 22:06:50 (GMT0) (20 seconds)
1308---------------------------------------------------------------------------
1309+ 1 host(s) tested</pre>
1310</div>
1311<div class="result_section">
1312<b>Log Method</b><p>
1313 Details:
1314 Nikto (NASL wrapper)
1315 (OID: 1.3.6.1.4.1.25623.1.0.14260)
1316 </p>
1317<p>
1318 Version used: 2019-12-17T11:41:26+0000</p>
1319</div>
1320<div class="result_head ">
1321<div class="location_float">general/CPE-T</div>
1322<b>Log</b>
1323 (CVSS: 0.0)
1324 <div class="full_width">
1325 NVT:
1326 CPE Inventory
1327 (OID: 1.3.6.1.4.1.25623.1.0.810002)
1328 </div>
1329</div>
1330<div class="result_section">
1331<b>Summary</b><p>This routine uses information collected by other routines about
1332 CPE identities of operating systems, services and applications detected during the scan.</p>
1333<p> Note: Some CPEs for specific products might show up twice or more in the output. Background:</p>
1334<p> After a product got renamed or a specific vendor was acquired by another one it might happen that a
1335 product gets a new CPE within the NVD CPE Dictionary but older entries are kept with the older CPE.</p>
1336</div>
1337<div class="result_section">
1338<b>Vulnerability Detection Result</b><pre>10.10.10.9|cpe:/a:apache:http_server:2.4.18
133910.10.10.9|cpe:/a:jquery:jquery
134010.10.10.9|cpe:/a:jquery:jquery:1.9.0
134110.10.10.9|cpe:/a:owncloud:owncloud:10.0.4
134210.10.10.9|cpe:/o:canonical:ubuntu_linux</pre>
1343</div>
1344<div class="result_section">
1345<b>Log Method</b><p>
1346 Details:
1347 CPE Inventory
1348 (OID: 1.3.6.1.4.1.25623.1.0.810002)
1349 </p>
1350<p>
1351 Version used: 2019-10-24T11:29:24+0000</p>
1352</div>
1353<div class="result_section">
1354<b>References</b><br><p><table><tr valign="top">
1355<td>Other:</td>
1356<td>https://nvd.nist.gov/products/cpe</td>
1357</tr></table></p>
1358</div>
1359<h2 id="10.10.10.16">Host 10.10.10.16</h2>
1360<table>
1361<tr>
1362<td>Scanning of this host started at:</td>
1363<td> NaN NaN:NaN:NaN NaN UTC</td>
1364</tr>
1365<tr>
1366<td>Number of results:</td>
1367<td>40</td>
1368</tr>
1369</table>
1370<h3>Port Summary for Host 10.10.10.16</h3>
1371<table width="100%">
1372<tr class="table_head">
1373<td>Service (Port)</td>
1374<td>Threat Level</td>
1375</tr>
1376<tr>
1377<td>1538/tcp</td>
1378<td>Log</td>
1379</tr>
1380<tr>
1381<td>general/tcp</td>
1382<td>Low</td>
1383</tr>
1384<tr>
1385<td>135/tcp</td>
1386<td>Medium</td>
1387</tr>
1388<tr>
1389<td>3389/tcp</td>
1390<td>Log</td>
1391</tr>
1392<tr>
1393<td>1801/tcp</td>
1394<td>Log</td>
1395</tr>
1396<tr>
1397<td>general/SMBClient</td>
1398<td>Log</td>
1399</tr>
1400<tr>
1401<td>1541/tcp</td>
1402<td>Log</td>
1403</tr>
1404<tr>
1405<td>139/tcp</td>
1406<td>Log</td>
1407</tr>
1408<tr>
1409<td>1539/tcp</td>
1410<td>Log</td>
1411</tr>
1412<tr>
1413<td>2103/tcp</td>
1414<td>Log</td>
1415</tr>
1416<tr>
1417<td>445/tcp</td>
1418<td>Log</td>
1419</tr>
1420<tr>
1421<td>21/tcp</td>
1422<td>Medium</td>
1423</tr>
1424<tr>
1425<td>80/tcp</td>
1426<td>Log</td>
1427</tr>
1428<tr>
1429<td>general/CPE-T</td>
1430<td>Log</td>
1431</tr>
1432<tr>
1433<td>2105/tcp</td>
1434<td>Log</td>
1435</tr>
1436<tr>
1437<td>2107/tcp</td>
1438<td>Log</td>
1439</tr>
1440</table>
1441<h3>Security Issues for Host 10.10.10.16</h3>
1442<div class="result_head medium">
1443<div class="location_float">21/tcp</div>
1444<b>Medium</b>
1445 (CVSS: 6.4)
1446 <div class="full_width">
1447 NVT:
1448 Anonymous FTP Login Reporting
1449 (OID: 1.3.6.1.4.1.25623.1.0.900600)
1450 </div>
1451</div>
1452<div class="result_section">
1453<b>Summary</b><p>Reports if the remote FTP Server allows anonymous logins.</p>
1454</div>
1455<div class="result_section">
1456<b>Vulnerability Detection Result</b><pre>It was possible to login to the remote FTP service with the following anonymous account(s):
1457
1458anonymous:anonymous@example.com
1459ftp:anonymous@example.com</pre>
1460</div>
1461<div class="result_section">
1462<b>Impact</b><p>Based on the files accessible via this anonymous FTP login and the permissions
1463 of this account an attacker might be able to:</p>
1464<p> - gain access to sensitive files</p>
1465<p> - upload or delete files.</p>
1466</div>
1467<div class="result_section">
1468<b>Solution</b><p><b>Solution type: </b>Mitigation</p>
1469<p>If you do not want to share files, you should disable anonymous logins.</p>
1470</div>
1471<div class="result_section">
1472<b>Vulnerability Insight</b><p>A host that provides an FTP service may additionally provide Anonymous FTP
1473 access as well. Under this arrangement, users do not strictly need an account on the host. Instead the user
1474 typically enters 'anonymous' or 'ftp' when prompted for username. Although users are commonly asked to send
1475 their email address as their password, little to no verification is actually performed on the supplied data.</p>
1476</div>
1477<div class="result_section">
1478<b>Vulnerability Detection Method</b><p>
1479 Details:
1480 Anonymous FTP Login Reporting
1481 (OID: 1.3.6.1.4.1.25623.1.0.900600)
1482 </p>
1483<p>
1484 Version used: $Revision: 12030 $</p>
1485</div>
1486<div class="result_section">
1487<b>References</b><br><p><table><tr valign="top">
1488<td>Other:</td>
1489<td>https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0497</td>
1490</tr></table></p>
1491</div>
1492<div class="result_head medium">
1493<div class="location_float">135/tcp</div>
1494<b>Medium</b>
1495 (CVSS: 5.0)
1496 <div class="full_width">
1497 NVT:
1498 DCE/RPC and MSRPC Services Enumeration Reporting
1499 (OID: 1.3.6.1.4.1.25623.1.0.10736)
1500 </div>
1501</div>
1502<div class="result_section">
1503<b>Summary</b><p>Distributed Computing Environment / Remote Procedure Calls (DCE/RPC) or MSRPC services running
1504 on the remote host can be enumerated by connecting on port 135 and doing the appropriate queries.</p>
1505</div>
1506<div class="result_section">
1507<b>Vulnerability Detection Result</b><pre>Here is the list of DCE/RPC or MSRPC services running on this host via the TCP protocol:
1508
1509Port: 1536/tcp
1510
1511 UUID: d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1
1512 Endpoint: ncacn_ip_tcp:10.10.10.16[1536]
1513
1514Port: 1537/tcp
1515
1516 UUID: 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1
1517 Endpoint: ncacn_ip_tcp:10.10.10.16[1537]
1518 Annotation: DHCP Client LRPC Endpoint
1519
1520 UUID: 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6, version 1
1521 Endpoint: ncacn_ip_tcp:10.10.10.16[1537]
1522 Annotation: DHCPv6 Client LRPC Endpoint
1523
1524 UUID: f6beaff7-1e19-4fbb-9f8f-b89e2018337c, version 1
1525 Endpoint: ncacn_ip_tcp:10.10.10.16[1537]
1526 Annotation: Event log TCPIP
1527
1528Port: 1538/tcp
1529
1530 UUID: 0d3c7f20-1c8d-4654-a1b3-51563b298bda, version 1
1531 Endpoint: ncacn_ip_tcp:10.10.10.16[1538]
1532 Annotation: UserMgrCli
1533
1534 UUID: 1ff70682-0a51-30e8-076d-740be8cee98b, version 1
1535 Endpoint: ncacn_ip_tcp:10.10.10.16[1538]
1536 Named pipe : atsvc
1537 Win32 service or process : mstask.exe
1538 Description : Scheduler service
1539
1540 UUID: 201ef99a-7fa0-444c-9399-19ba84f12a1a, version 1
1541 Endpoint: ncacn_ip_tcp:10.10.10.16[1538]
1542 Annotation: AppInfo
1543
1544 UUID: 29770a8f-829b-4158-90a2-78cd488501f7, version 1
1545 Endpoint: ncacn_ip_tcp:10.10.10.16[1538]
1546
1547 UUID: 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1
1548 Endpoint: ncacn_ip_tcp:10.10.10.16[1538]
1549 Annotation: Proxy Manager provider server endpoint
1550
1551 UUID: 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2
1552 Endpoint: ncacn_ip_tcp:10.10.10.16[1538]
1553
1554 UUID: 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1
1555 Endpoint: ncacn_ip_tcp:10.10.10.16[1538]
1556
1557 UUID: 3a9ef155-691d-4449-8d05-09ad57031823, version 1
1558 Endpoint: ncacn_ip_tcp:10.10.10.16[1538]
1559
1560 UUID: 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1
1561 Endpoint: ncacn_ip_tcp:10.10.10.16[1538]
1562 Annotation: IP Transition Configuration endpoint
1563
1564 UUID: 58e604e8-9adb-4d2e-a464-3b0683fb1480, version 1
1565 Endpoint: ncacn_ip_tcp:10.10.10.16[1538]
1566 Annotation: AppInfo
1567
1568 UUID: 5f54ce7d-5b79-4175-8584-cb65313a0e98, version 1
1569 Endpoint: ncacn_ip_tcp:10.10.10.16[1538]
1570 Annotation: AppInfo
1571
1572 UUID: 86d35949-83c9-4044-b424-db363231fd0c, version 1
1573 Endpoint: ncacn_ip_tcp:10.10.10.16[1538]
1574
1575 UUID: a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1
1576 Endpoint: ncacn_ip_tcp:10.10.10.16[1538]
1577 Annotation: IKE/Authip API
1578
1579 UUID: b18fbab6-56f8-4702-84e0-41053293a869, version 1
1580 Endpoint: ncacn_ip_tcp:10.10.10.16[1538]
1581 Annotation: UserMgrCli
1582
1583 UUID: c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1
1584 Endpoint: ncacn_ip_tcp:10.10.10.16[1538]
1585 Annotation: Proxy Manager client server endpoint
1586
1587 UUID: c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1
1588 Endpoint: ncacn_ip_tcp:10.10.10.16[1538]
1589 Annotation: Adh APIs
1590
1591 UUID: d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1
1592 Endpoint: ncacn_ip_tcp:10.10.10.16[1538]
1593
1594 UUID: fb9a3757-cff0-4db0-b9fc-bd6c131612fd, version 1
1595 Endpoint: ncacn_ip_tcp:10.10.10.16[1538]
1596 Annotation: AppInfo
1597
1598 UUID: fd7a0523-dc70-43dd-9b2e-9c5ed48225b1, version 1
1599 Endpoint: ncacn_ip_tcp:10.10.10.16[1538]
1600 Annotation: AppInfo
1601
1602Port: 1539/tcp
1603
1604 UUID: 0b6edbfa-4a24-4fc6-8a23-942b1eca65d1, version 1
1605 Endpoint: ncacn_ip_tcp:10.10.10.16[1539]
1606
1607 UUID: 12345678-1234-abcd-ef00-0123456789ab, version 1
1608 Endpoint: ncacn_ip_tcp:10.10.10.16[1539]
1609 Named pipe : spoolss
1610 Win32 service or process : spoolsv.exe
1611 Description : Spooler service
1612
1613 UUID: 4a452661-8290-4b36-8fbe-7f4093a94978, version 1
1614 Endpoint: ncacn_ip_tcp:10.10.10.16[1539]
1615
1616 UUID: 76f03f96-cdfd-44fc-a22c-64950a001209, version 1
1617 Endpoint: ncacn_ip_tcp:10.10.10.16[1539]
1618
1619 UUID: ae33069b-a2a8-46ee-a235-ddfd339be281, version 1
1620 Endpoint: ncacn_ip_tcp:10.10.10.16[1539]
1621
1622Port: 1541/tcp
1623
1624 UUID: 1088a980-eae5-11d0-8d9b-00a02453c337, version 1
1625 Endpoint: ncacn_ip_tcp:10.10.10.16[1541]
1626 Annotation: Message Queuing - QM2QM V1
1627
1628 UUID: 1a9134dd-7b39-45ba-ad88-44d01ca47f28, version 1
1629 Endpoint: ncacn_ip_tcp:10.10.10.16[1541]
1630 Annotation: Message Queuing - RemoteRead V1
1631
1632 UUID: 76d12b80-3467-11d3-91ff-0090272f9ea3, version 1
1633 Endpoint: ncacn_ip_tcp:10.10.10.16[1541]
1634 Annotation: Message Queuing - QMRT V2
1635
1636 UUID: fdb3a030-065f-11d1-bb9b-00a024ea5525, version 1
1637 Endpoint: ncacn_ip_tcp:10.10.10.16[1541]
1638 Annotation: Message Queuing - QMRT V1
1639
1640Port: 1563/tcp
1641
1642 UUID: 12345778-1234-abcd-ef00-0123456789ac, version 1
1643 Endpoint: ncacn_ip_tcp:10.10.10.16[1563]
1644 Named pipe : lsass
1645 Win32 service or process : lsass.exe
1646 Description : SAM access
1647
1648Port: 1571/tcp
1649
1650 UUID: 367abb81-9844-35f1-ad32-98f038001003, version 2
1651 Endpoint: ncacn_ip_tcp:10.10.10.16[1571]
1652
1653Port: 2103/tcp
1654
1655 UUID: 1088a980-eae5-11d0-8d9b-00a02453c337, version 1
1656 Endpoint: ncacn_ip_tcp:10.10.10.16[2103]
1657 Annotation: Message Queuing - QM2QM V1
1658
1659 UUID: 1a9134dd-7b39-45ba-ad88-44d01ca47f28, version 1
1660 Endpoint: ncacn_ip_tcp:10.10.10.16[2103]
1661 Annotation: Message Queuing - RemoteRead V1
1662
1663 UUID: 76d12b80-3467-11d3-91ff-0090272f9ea3, version 1
1664 Endpoint: ncacn_ip_tcp:10.10.10.16[2103]
1665 Annotation: Message Queuing - QMRT V2
1666
1667 UUID: fdb3a030-065f-11d1-bb9b-00a024ea5525, version 1
1668 Endpoint: ncacn_ip_tcp:10.10.10.16[2103]
1669 Annotation: Message Queuing - QMRT V1
1670
1671Port: 2105/tcp
1672
1673 UUID: 1088a980-eae5-11d0-8d9b-00a02453c337, version 1
1674 Endpoint: ncacn_ip_tcp:10.10.10.16[2105]
1675 Annotation: Message Queuing - QM2QM V1
1676
1677 UUID: 1a9134dd-7b39-45ba-ad88-44d01ca47f28, version 1
1678 Endpoint: ncacn_ip_tcp:10.10.10.16[2105]
1679 Annotation: Message Queuing - RemoteRead V1
1680
1681 UUID: 76d12b80-3467-11d3-91ff-0090272f9ea3, version 1
1682 Endpoint: ncacn_ip_tcp:10.10.10.16[2105]
1683 Annotation: Message Queuing - QMRT V2
1684
1685 UUID: fdb3a030-065f-11d1-bb9b-00a024ea5525, version 1
1686 Endpoint: ncacn_ip_tcp:10.10.10.16[2105]
1687 Annotation: Message Queuing - QMRT V1
1688
1689Port: 2107/tcp
1690
1691 UUID: 1088a980-eae5-11d0-8d9b-00a02453c337, version 1
1692 Endpoint: ncacn_ip_tcp:10.10.10.16[2107]
1693 Annotation: Message Queuing - QM2QM V1
1694
1695 UUID: 1a9134dd-7b39-45ba-ad88-44d01ca47f28, version 1
1696 Endpoint: ncacn_ip_tcp:10.10.10.16[2107]
1697 Annotation: Message Queuing - RemoteRead V1
1698
1699 UUID: 76d12b80-3467-11d3-91ff-0090272f9ea3, version 1
1700 Endpoint: ncacn_ip_tcp:10.10.10.16[2107]
1701 Annotation: Message Queuing - QMRT V2
1702
1703 UUID: fdb3a030-065f-11d1-bb9b-00a024ea5525, version 1
1704 Endpoint: ncacn_ip_tcp:10.10.10.16[2107]
1705 Annotation: Message Queuing - QMRT V1
1706
1707Note: DCE/RPC or MSRPC services running on this host locally were identified. Reporting this list is not enabled by default due to the possible large size of this list. See the script preferences to enable this reporting.</pre>
1708</div>
1709<div class="result_section">
1710<b>Impact</b><p>An attacker may use this fact to gain more knowledge
1711 about the remote host.</p>
1712</div>
1713<div class="result_section">
1714<b>Solution</b><p><b>Solution type: </b>Mitigation</p>
1715<p>Filter incoming traffic to this ports.</p>
1716</div>
1717<div class="result_section">
1718<b>Vulnerability Detection Method</b><p>
1719 Details:
1720 DCE/RPC and MSRPC Services Enumeration Reporting
1721 (OID: 1.3.6.1.4.1.25623.1.0.10736)
1722 </p>
1723<p>
1724 Version used: $Revision: 6319 $</p>
1725</div>
1726<div class="result_head medium">
1727<div class="location_float">21/tcp</div>
1728<b>Medium</b>
1729 (CVSS: 4.8)
1730 <div class="full_width">
1731 NVT:
1732 FTP Unencrypted Cleartext Login
1733 (OID: 1.3.6.1.4.1.25623.1.0.108528)
1734 </div>
1735</div>
1736<div class="result_section">
1737<b>Summary</b><p>The remote host is running a FTP service that allows cleartext logins over
1738 unencrypted connections.</p>
1739</div>
1740<div class="result_section">
1741<b>Vulnerability Detection Result</b><pre>The remote FTP service accepts logins without a previous sent 'AUTH TLS' command. Response(s):
1742
1743Anonymous sessions: 331 Anonymous access allowed, send identity (e-mail name) as password.
1744Non-anonymous sessions: 331 Password required</pre>
1745</div>
1746<div class="result_section">
1747<b>Impact</b><p>An attacker can uncover login names and passwords by sniffing traffic to the
1748 FTP service.</p>
1749</div>
1750<div class="result_section">
1751<b>Solution</b><p><b>Solution type: </b>Mitigation</p>
1752<p>Enable FTPS or enforce the connection via the 'AUTH TLS' command. Please see
1753 the manual of the FTP service for more information.</p>
1754</div>
1755<div class="result_section">
1756<b>Vulnerability Detection Method</b><p>Tries to login to a non FTPS enabled FTP service without sending a
1757 'AUTH TLS' command first and checks if the service is accepting the login without enforcing the use of
1758 the 'AUTH TLS' command.</p>
1759<p>
1760 Details:
1761 FTP Unencrypted Cleartext Login
1762 (OID: 1.3.6.1.4.1.25623.1.0.108528)
1763 </p>
1764<p>
1765 Version used: $Revision: 13611 $</p>
1766</div>
1767<div class="result_head low">
1768<div class="location_float">general/tcp</div>
1769<b>Low</b>
1770 (CVSS: 2.6)
1771 <div class="full_width">
1772 NVT:
1773 TCP timestamps
1774 (OID: 1.3.6.1.4.1.25623.1.0.80091)
1775 </div>
1776</div>
1777<div class="result_section">
1778<b>Summary</b><p>The remote host implements TCP timestamps and therefore allows to compute
1779 the uptime.</p>
1780</div>
1781<div class="result_section">
1782<b>Vulnerability Detection Result</b><pre>It was detected that the host implements RFC1323.
1783
1784The following timestamps were retrieved with a delay of 1 seconds in-between:
1785Packet 1: 3468601497
1786Packet 2: 3468602574</pre>
1787</div>
1788<div class="result_section">
1789<b>Impact</b><p>A side effect of this feature is that the uptime of the remote
1790 host can sometimes be computed.</p>
1791</div>
1792<div class="result_section">
1793<b>Solution</b><p><b>Solution type: </b>Mitigation</p>
1794<p>To disable TCP timestamps on linux add the line 'net.ipv4.tcp_timestamps = 0' to
1795 /etc/sysctl.conf. Execute 'sysctl -p' to apply the settings at runtime.</p>
1796<p> To disable TCP timestamps on Windows execute 'netsh int tcp set global timestamps=disabled'</p>
1797<p> Starting with Windows Server 2008 and Vista, the timestamp can not be completely disabled.</p>
1798<p> The default behavior of the TCP/IP stack on this Systems is to not use the
1799 Timestamp options when initiating TCP connections, but use them if the TCP peer
1800 that is initiating communication includes them in their synchronize (SYN) segment.</p>
1801<p> See the references for more information.</p>
1802</div>
1803<div class="result_section">
1804<b>Affected Software/OS</b><p>TCP/IPv4 implementations that implement RFC1323.</p>
1805</div>
1806<div class="result_section">
1807<b>Vulnerability Insight</b><p>The remote host implements TCP timestamps, as defined by RFC1323.</p>
1808</div>
1809<div class="result_section">
1810<b>Vulnerability Detection Method</b><p>Special IP packets are forged and sent with a little delay in between to the
1811 target IP. The responses are searched for a timestamps. If found, the timestamps are reported.</p>
1812<p>
1813 Details:
1814 TCP timestamps
1815 (OID: 1.3.6.1.4.1.25623.1.0.80091)
1816 </p>
1817<p>
1818 Version used: $Revision: 14310 $</p>
1819</div>
1820<div class="result_section">
1821<b>References</b><br><p><table>
1822<tr valign="top">
1823<td>Other:</td>
1824<td>http://www.ietf.org/rfc/rfc1323.txt</td>
1825</tr>
1826<tr valign="top">
1827<td></td>
1828<td>http://www.microsoft.com/en-us/download/details.aspx?id=9152</td>
1829</tr>
1830</table></p>
1831</div>
1832<div class="result_head ">
1833<div class="location_float">21/tcp</div>
1834<b>Log</b>
1835 (CVSS: 0.0)
1836 <div class="full_width">
1837 NVT:
1838 Services
1839 (OID: 1.3.6.1.4.1.25623.1.0.10330)
1840 </div>
1841</div>
1842<div class="result_section">
1843<b>Summary</b><p>This routine attempts to guess which service is running on the
1844 remote ports. For instance, it searches for a web server which could listen on another port than
1845 80 or 443 and makes this information available for other check routines.</p>
1846</div>
1847<div class="result_section">
1848<b>Vulnerability Detection Result</b><pre>An FTP server is running on this port.
1849Here is its banner :
1850220 Microsoft FTP Service </pre>
1851</div>
1852<div class="result_section">
1853<b>Log Method</b><p>
1854 Details:
1855 Services
1856 (OID: 1.3.6.1.4.1.25623.1.0.10330)
1857 </p>
1858<p>
1859 Version used: 2019-07-08T14:12:44+0000</p>
1860</div>
1861<div class="result_head ">
1862<div class="location_float">80/tcp</div>
1863<b>Log</b>
1864 (CVSS: 0.0)
1865 <div class="full_width">
1866 NVT:
1867 Services
1868 (OID: 1.3.6.1.4.1.25623.1.0.10330)
1869 </div>
1870</div>
1871<div class="result_section">
1872<b>Summary</b><p>This routine attempts to guess which service is running on the
1873 remote ports. For instance, it searches for a web server which could listen on another port than
1874 80 or 443 and makes this information available for other check routines.</p>
1875</div>
1876<div class="result_section">
1877<b>Vulnerability Detection Result</b><pre>An unknown service is running on this port.
1878It is usually reserved for HTTP</pre>
1879</div>
1880<div class="result_section">
1881<b>Log Method</b><p>
1882 Details:
1883 Services
1884 (OID: 1.3.6.1.4.1.25623.1.0.10330)
1885 </p>
1886<p>
1887 Version used: 2019-07-08T14:12:44+0000</p>
1888</div>
1889<div class="result_head ">
1890<div class="location_float">135/tcp</div>
1891<b>Log</b>
1892 (CVSS: 0.0)
1893 <div class="full_width">
1894 NVT:
1895 DCE/RPC and MSRPC Services Enumeration
1896 (OID: 1.3.6.1.4.1.25623.1.0.108044)
1897 </div>
1898</div>
1899<div class="result_section">
1900<b>Summary</b><p>Distributed Computing Environment / Remote Procedure Calls (DCE/RPC) or MSRPC services running
1901 on the remote host can be enumerated by connecting on port 135 and doing the appropriate queries.</p>
1902<p> The actual reporting takes place in the NVT 'DCE/RPC and MSRPC Services Enumeration Reporting'
1903 (OID: 1.3.6.1.4.1.25623.1.0.10736)</p>
1904</div>
1905<div class="result_section">
1906<b>Vulnerability Detection Result</b><pre>A DCE endpoint resolution service seems to be running on this port.</pre>
1907</div>
1908<div class="result_section">
1909<b>Impact</b><p>An attacker may use this fact to gain more knowledge
1910 about the remote host.</p>
1911</div>
1912<div class="result_section">
1913<b>Solution</b><p><b>Solution type: </b>Mitigation</p>
1914<p>Filter incoming traffic to this port.</p>
1915</div>
1916<div class="result_section">
1917<b>Log Method</b><p>
1918 Details:
1919 DCE/RPC and MSRPC Services Enumeration
1920 (OID: 1.3.6.1.4.1.25623.1.0.108044)
1921 </p>
1922<p>
1923 Version used: $Revision: 11885 $</p>
1924</div>
1925<div class="result_head ">
1926<div class="location_float">445/tcp</div>
1927<b>Log</b>
1928 (CVSS: 0.0)
1929 <div class="full_width">
1930 NVT:
1931 SMB/CIFS Server Detection
1932 (OID: 1.3.6.1.4.1.25623.1.0.11011)
1933 </div>
1934</div>
1935<div class="result_section">
1936<b>Summary</b><p>This script detects whether port 445 and 139 are open and
1937 if they are running a CIFS/SMB server.</p>
1938</div>
1939<div class="result_section">
1940<b>Vulnerability Detection Result</b><pre>A CIFS server is running on this port</pre>
1941</div>
1942<div class="result_section">
1943<b>Log Method</b><p>
1944 Details:
1945 SMB/CIFS Server Detection
1946 (OID: 1.3.6.1.4.1.25623.1.0.11011)
1947 </p>
1948<p>
1949 Version used: $Revision: 13541 $</p>
1950</div>
1951<div class="result_head ">
1952<div class="location_float">139/tcp</div>
1953<b>Log</b>
1954 (CVSS: 0.0)
1955 <div class="full_width">
1956 NVT:
1957 SMB/CIFS Server Detection
1958 (OID: 1.3.6.1.4.1.25623.1.0.11011)
1959 </div>
1960</div>
1961<div class="result_section">
1962<b>Summary</b><p>This script detects whether port 445 and 139 are open and
1963 if they are running a CIFS/SMB server.</p>
1964</div>
1965<div class="result_section">
1966<b>Vulnerability Detection Result</b><pre>A SMB server is running on this port</pre>
1967</div>
1968<div class="result_section">
1969<b>Log Method</b><p>
1970 Details:
1971 SMB/CIFS Server Detection
1972 (OID: 1.3.6.1.4.1.25623.1.0.11011)
1973 </p>
1974<p>
1975 Version used: $Revision: 13541 $</p>
1976</div>
1977<div class="result_head ">
1978<div class="location_float">80/tcp</div>
1979<b>Log</b>
1980 (CVSS: 0.0)
1981 <div class="full_width">
1982 NVT:
1983 Service Detection with 'GET' Request
1984 (OID: 1.3.6.1.4.1.25623.1.0.17975)
1985 </div>
1986</div>
1987<div class="result_section">
1988<b>Summary</b><p>This plugin performs service detection.</p>
1989<p> This plugin is a complement of find_service.nasl. It sends a 'GET' request
1990 to the remaining unknown services and tries to identify them.</p>
1991</div>
1992<div class="result_section">
1993<b>Vulnerability Detection Result</b><pre>A web server is running on this port</pre>
1994</div>
1995<div class="result_section">
1996<b>Log Method</b><p>
1997 Details:
1998 Service Detection with 'GET' Request
1999 (OID: 1.3.6.1.4.1.25623.1.0.17975)
2000 </p>
2001<p>
2002 Version used: 2020-02-20T07:04:10+0000</p>
2003</div>
2004<div class="result_head ">
2005<div class="location_float">21/tcp</div>
2006<b>Log</b>
2007 (CVSS: 0.0)
2008 <div class="full_width">
2009 NVT:
2010 FTP Banner Detection
2011 (OID: 1.3.6.1.4.1.25623.1.0.10092)
2012 </div>
2013</div>
2014<div class="result_section">
2015<b>Summary</b><p>This Plugin detects and reports a FTP Server Banner.</p>
2016</div>
2017<div class="result_section">
2018<b>Vulnerability Detection Result</b><pre>Remote FTP server banner:
2019
2020220 Microsoft FTP Service
2021
2022This is probably:
2023
2024- Microsoft IIS FTP Server
2025
2026Server operating system information collected via "SYST" command:
2027
2028215 Windows_NT
2029
2030Server status information collected via "STAT" command:
2031
2032211-Microsoft FTP Service status:
2033 Logged in user: anonymous
2034 TYPE: ASCII; FORM: NONPRINT; STRUcture: FILE; transfer MODE: STREAM
2035 Data connection: none
2036211 End of status.</pre>
2037</div>
2038<div class="result_section">
2039<b>Log Method</b><p>
2040 Details:
2041 FTP Banner Detection
2042 (OID: 1.3.6.1.4.1.25623.1.0.10092)
2043 </p>
2044<p>
2045 Version used: 2020-02-03T13:52:45+0000</p>
2046</div>
2047<div class="result_head ">
2048<div class="location_float">3389/tcp</div>
2049<b>Log</b>
2050 (CVSS: 0.0)
2051 <div class="full_width">
2052 NVT:
2053 Microsoft Remote Desktop Protocol Detection
2054 (OID: 1.3.6.1.4.1.25623.1.0.100062)
2055 </div>
2056</div>
2057<div class="result_section">
2058<b>Summary</b><p>A service supporting the Microsoft Remote Desktop Protocol (RDP) is running
2059 at this host.</p>
2060<p> Remote Desktop Services, formerly known as Terminal Services, is one of the components of Microsoft Windows
2061 (both server and client versions) that allows a user to access applications and data on a remote computer over
2062 a network.</p>
2063</div>
2064<div class="result_section">
2065<b>Vulnerability Detection Result</b><p>
2066 Vulnerability was detected according to the Vulnerability Detection Method.
2067 </p>
2068</div>
2069<div class="result_section">
2070<b>Log Method</b><p>
2071 Details:
2072 Microsoft Remote Desktop Protocol Detection
2073 (OID: 1.3.6.1.4.1.25623.1.0.100062)
2074 </p>
2075<p>
2076 Version used: 2019-09-14T08:07:03+0000</p>
2077</div>
2078<div class="result_head ">
2079<div class="location_float">3389/tcp</div>
2080<b>Log</b>
2081 (CVSS: 0.0)
2082 <div class="full_width">
2083 NVT:
2084 SSL/TLS: Microsoft Remote Desktop Protocol STARTTLS Detection
2085 (OID: 1.3.6.1.4.1.25623.1.0.140152)
2086 </div>
2087</div>
2088<div class="result_section">
2089<b>Summary</b><p>Checks if the remote Microsoft Remote Desktop Protocol (RDP) service supports the 'PROTOCOL_SSL' flag.</p>
2090</div>
2091<div class="result_section">
2092<b>Vulnerability Detection Result</b><pre>The remote Microsoft Remote Desktop Protocol (RDP) service supports the 'PROTOCOL_SSL' flag.</pre>
2093</div>
2094<div class="result_section">
2095<b>Log Method</b><p>
2096 Details:
2097 SSL/TLS: Microsoft Remote Desktop Protocol STARTTLS Detection
2098 (OID: 1.3.6.1.4.1.25623.1.0.140152)
2099 </p>
2100<p>
2101 Version used: $Revision: 11898 $</p>
2102</div>
2103<div class="result_section">
2104<b>References</b><br><p><table><tr valign="top">
2105<td>Other:</td>
2106<td>https://msdn.microsoft.com/de-de/library/cc240500.aspx</td>
2107</tr></table></p>
2108</div>
2109<div class="result_head ">
2110<div class="location_float">3389/tcp</div>
2111<b>Log</b>
2112 (CVSS: 0.0)
2113 <div class="full_width">
2114 NVT:
2115 SSL/TLS: Collect and Report Certificate Details
2116 (OID: 1.3.6.1.4.1.25623.1.0.103692)
2117 </div>
2118</div>
2119<div class="result_section">
2120<b>Summary</b><p>This script collects and reports the details of all SSL/TLS certificates.</p>
2121<p> This data will be used by other tests to verify server certificates.</p>
2122</div>
2123<div class="result_section">
2124<b>Vulnerability Detection Result</b><pre>The following certificate details of the remote service were collected.
2125
2126Certificate details:
2127subject ...: CN=WIN-ESVU38BTHJS
2128subject alternative names (SAN):
2129None
2130issued by .: CN=WIN-ESVU38BTHJS
2131serial ....: 28AF38F31F942C804A3B8683E64B2286
2132valid from : 2020-01-01 07:13:16 UTC
2133valid until: 2020-07-02 07:13:16 UTC
2134fingerprint (SHA-1): 1CBF7B141412DA9ED428C79DB511001D46844C89
2135fingerprint (SHA-256): B2A8B0EEB0B948455AC84D8592AF5E2515A8F61CFDBB75A3D56A55C083743A06</pre>
2136</div>
2137<div class="result_section">
2138<b>Log Method</b><p>
2139 Details:
2140 SSL/TLS: Collect and Report Certificate Details
2141 (OID: 1.3.6.1.4.1.25623.1.0.103692)
2142 </p>
2143<p>
2144 Version used: 2019-04-04T13:38:03+0000</p>
2145</div>
2146<div class="result_head ">
2147<div class="location_float">general/tcp</div>
2148<b>Log</b>
2149 (CVSS: 0.0)
2150 <div class="full_width">
2151 NVT:
2152 SSL/TLS: Hostname discovery from server certificate
2153 (OID: 1.3.6.1.4.1.25623.1.0.111010)
2154 </div>
2155</div>
2156<div class="result_section">
2157<b>Summary</b><p>It was possible to discover an additional hostname
2158 of this server from its certificate Common or Subject Alt Name.</p>
2159</div>
2160<div class="result_section">
2161<b>Vulnerability Detection Result</b><pre>The following additional but not resolvable hostnames were detected:
2162
2163WIN-ESVU38BTHJS</pre>
2164</div>
2165<div class="result_section">
2166<b>Log Method</b><p>
2167 Details:
2168 SSL/TLS: Hostname discovery from server certificate
2169 (OID: 1.3.6.1.4.1.25623.1.0.111010)
2170 </p>
2171<p>
2172 Version used: $Revision: 13774 $</p>
2173</div>
2174<div class="result_head ">
2175<div class="location_float">general/SMBClient</div>
2176<b>Log</b>
2177 (CVSS: 0.0)
2178 <div class="full_width">
2179 NVT:
2180 SMB Test with 'smbclient'
2181 (OID: 1.3.6.1.4.1.25623.1.0.90011)
2182 </div>
2183</div>
2184<div class="result_section">
2185<b>Summary</b><p>This script reports information about the SMB server of the remote host
2186 collected with the 'smbclient' tool.</p>
2187</div>
2188<div class="result_section">
2189<b>Vulnerability Detection Result</b><pre>Error getting SMB-Data -> SESSION SETUP FAILED: NT_STATUS_ACCESS_DENIED</pre>
2190</div>
2191<div class="result_section">
2192<b>Log Method</b><p>
2193 Details:
2194 SMB Test with 'smbclient'
2195 (OID: 1.3.6.1.4.1.25623.1.0.90011)
2196 </p>
2197<p>
2198 Version used: $Revision: 13274 $</p>
2199</div>
2200<div class="result_head ">
2201<div class="location_float">445/tcp</div>
2202<b>Log</b>
2203 (CVSS: 0.0)
2204 <div class="full_width">
2205 NVT:
2206 SMB Remote Version Detection
2207 (OID: 1.3.6.1.4.1.25623.1.0.807830)
2208 </div>
2209</div>
2210<div class="result_section">
2211<b>Summary</b><p>Detection of Server Message Block(SMB).</p>
2212<p> This script sends SMB Negotiation request and try to get the version from the
2213 response.</p>
2214</div>
2215<div class="result_section">
2216<b>Vulnerability Detection Result</b><pre>SMBv1 and SMBv2 are enabled on remote target</pre>
2217</div>
2218<div class="result_section">
2219<b>Log Method</b><p>
2220 Details:
2221 SMB Remote Version Detection
2222 (OID: 1.3.6.1.4.1.25623.1.0.807830)
2223 </p>
2224<p>
2225 Version used: 2019-05-16T07:13:31+0000</p>
2226</div>
2227<div class="result_head ">
2228<div class="location_float">21/tcp</div>
2229<b>Log</b>
2230 (CVSS: 0.0)
2231 <div class="full_width">
2232 NVT:
2233 Microsoft IIS FTP Server Version Detection
2234 (OID: 1.3.6.1.4.1.25623.1.0.900875)
2235 </div>
2236</div>
2237<div class="result_section">
2238<b>Summary</b><p>Detection of Microsoft IIS FTP Server.</p>
2239<p> The script sends a connection request to the server and attempts to extract the version number from the reply.</p>
2240</div>
2241<div class="result_section">
2242<b>Vulnerability Detection Result</b><pre>Detected Microsoft IIS FTP Server
2243
2244Version: unknown
2245Location: 21/tcp
2246CPE: cpe:/a:microsoft:ftp_service</pre>
2247</div>
2248<div class="result_section">
2249<b>Log Method</b><p>
2250 Details:
2251 Microsoft IIS FTP Server Version Detection
2252 (OID: 1.3.6.1.4.1.25623.1.0.900875)
2253 </p>
2254<p>
2255 Version used: $Revision: 13501 $</p>
2256</div>
2257<div class="result_head ">
2258<div class="location_float">3389/tcp</div>
2259<b>Log</b>
2260 (CVSS: 0.0)
2261 <div class="full_width">
2262 NVT:
2263 SSL/TLS: Report Perfect Forward Secrecy (PFS) Cipher Suites
2264 (OID: 1.3.6.1.4.1.25623.1.0.105018)
2265 </div>
2266</div>
2267<div class="result_section">
2268<b>Summary</b><p>This routine reports all SSL/TLS cipher suites accepted by a service which are supporting Perfect Forward Secrecy (PFS).</p>
2269</div>
2270<div class="result_section">
2271<b>Vulnerability Detection Result</b><pre>Cipher suites supporting Perfect Forward Secrecy (PFS) are accepted by this service via the TLSv1.0 protocol:
2272
2273TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
2274TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
2275
2276Cipher suites supporting Perfect Forward Secrecy (PFS) are accepted by this service via the TLSv1.1 protocol:
2277
2278TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
2279TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
2280
2281Cipher suites supporting Perfect Forward Secrecy (PFS) are accepted by this service via the TLSv1.2 protocol:
2282
2283TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
2284TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384</pre>
2285</div>
2286<div class="result_section">
2287<b>Log Method</b><p>
2288 Details:
2289 SSL/TLS: Report Perfect Forward Secrecy (PFS) Cipher Suites
2290 (OID: 1.3.6.1.4.1.25623.1.0.105018)
2291 </p>
2292<p>
2293 Version used: $Revision: 4771 $</p>
2294</div>
2295<div class="result_head ">
2296<div class="location_float">3389/tcp</div>
2297<b>Log</b>
2298 (CVSS: 0.0)
2299 <div class="full_width">
2300 NVT:
2301 SSL/TLS: Certificate - Self-Signed Certificate Detection
2302 (OID: 1.3.6.1.4.1.25623.1.0.103140)
2303 </div>
2304</div>
2305<div class="result_section">
2306<b>Summary</b><p>The SSL/TLS certificate on this port is self-signed.</p>
2307</div>
2308<div class="result_section">
2309<b>Vulnerability Detection Result</b><pre>The certificate of the remote service is self signed.
2310
2311Certificate details:
2312subject ...: CN=WIN-ESVU38BTHJS
2313subject alternative names (SAN):
2314None
2315issued by .: CN=WIN-ESVU38BTHJS
2316serial ....: 28AF38F31F942C804A3B8683E64B2286
2317valid from : 2020-01-01 07:13:16 UTC
2318valid until: 2020-07-02 07:13:16 UTC
2319fingerprint (SHA-1): 1CBF7B141412DA9ED428C79DB511001D46844C89
2320fingerprint (SHA-256): B2A8B0EEB0B948455AC84D8592AF5E2515A8F61CFDBB75A3D56A55C083743A06</pre>
2321</div>
2322<div class="result_section">
2323<b>Log Method</b><p>
2324 Details:
2325 SSL/TLS: Certificate - Self-Signed Certificate Detection
2326 (OID: 1.3.6.1.4.1.25623.1.0.103140)
2327 </p>
2328<p>
2329 Version used: $Revision: 8981 $</p>
2330</div>
2331<div class="result_section">
2332<b>References</b><br><p><table><tr valign="top">
2333<td>Other:</td>
2334<td>http://en.wikipedia.org/wiki/Self-signed_certificate</td>
2335</tr></table></p>
2336</div>
2337<div class="result_head ">
2338<div class="location_float">21/tcp</div>
2339<b>Log</b>
2340 (CVSS: 0.0)
2341 <div class="full_width">
2342 NVT:
2343 FTP Missing Support For AUTH TLS
2344 (OID: 1.3.6.1.4.1.25623.1.0.108553)
2345 </div>
2346</div>
2347<div class="result_section">
2348<b>Summary</b><p>The remote FTP server does not support the 'AUTH TLS' command.</p>
2349</div>
2350<div class="result_section">
2351<b>Vulnerability Detection Result</b><pre>The remote FTP server does not support the 'AUTH TLS' command.</pre>
2352</div>
2353<div class="result_section">
2354<b>Log Method</b><p>
2355 Details:
2356 FTP Missing Support For AUTH TLS
2357 (OID: 1.3.6.1.4.1.25623.1.0.108553)
2358 </p>
2359<p>
2360 Version used: $Revision: 13863 $</p>
2361</div>
2362<div class="result_head ">
2363<div class="location_float">3389/tcp</div>
2364<b>Log</b>
2365 (CVSS: 0.0)
2366 <div class="full_width">
2367 NVT:
2368 SSL/TLS: Report Supported Cipher Suites
2369 (OID: 1.3.6.1.4.1.25623.1.0.802067)
2370 </div>
2371</div>
2372<div class="result_section">
2373<b>Summary</b><p>This routine reports all SSL/TLS cipher suites accepted by a service.</p>
2374<p> As the NVT 'SSL/TLS: Check Supported Cipher Suites' (OID: 1.3.6.1.4.1.25623.1.0.900234) might run into a
2375 timeout the actual reporting of all accepted cipher suites takes place in this NVT instead. The script preference 'Report timeout'
2376 allows you to configure if such an timeout is reported.</p>
2377</div>
2378<div class="result_section">
2379<b>Vulnerability Detection Result</b><pre>No 'Strong' cipher suites accepted by this service via the TLSv1.0 protocol.
2380
2381'Medium' cipher suites accepted by this service via the TLSv1.0 protocol:
2382
2383TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
2384TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
2385
2386No 'Weak' cipher suites accepted by this service via the TLSv1.0 protocol.
2387
2388No 'Null' cipher suites accepted by this service via the TLSv1.0 protocol.
2389
2390No 'Anonymous' cipher suites accepted by this service via the TLSv1.0 protocol.
2391
2392No 'Strong' cipher suites accepted by this service via the TLSv1.1 protocol.
2393
2394'Medium' cipher suites accepted by this service via the TLSv1.1 protocol:
2395
2396TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
2397TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
2398
2399No 'Weak' cipher suites accepted by this service via the TLSv1.1 protocol.
2400
2401No 'Null' cipher suites accepted by this service via the TLSv1.1 protocol.
2402
2403No 'Anonymous' cipher suites accepted by this service via the TLSv1.1 protocol.
2404
2405No 'Strong' cipher suites accepted by this service via the TLSv1.2 protocol.
2406
2407'Medium' cipher suites accepted by this service via the TLSv1.2 protocol:
2408
2409TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
2410TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
2411
2412No 'Weak' cipher suites accepted by this service via the TLSv1.2 protocol.
2413
2414No 'Null' cipher suites accepted by this service via the TLSv1.2 protocol.
2415
2416No 'Anonymous' cipher suites accepted by this service via the TLSv1.2 protocol.</pre>
2417</div>
2418<div class="result_section">
2419<b>Log Method</b><p>
2420 Details:
2421 SSL/TLS: Report Supported Cipher Suites
2422 (OID: 1.3.6.1.4.1.25623.1.0.802067)
2423 </p>
2424<p>
2425 Version used: $Revision: 11108 $</p>
2426</div>
2427<div class="result_head ">
2428<div class="location_float">general/tcp</div>
2429<b>Log</b>
2430 (CVSS: 0.0)
2431 <div class="full_width">
2432 NVT:
2433 OS Detection Consolidation and Reporting
2434 (OID: 1.3.6.1.4.1.25623.1.0.105937)
2435 </div>
2436</div>
2437<div class="result_section">
2438<b>Summary</b><p>This script consolidates the OS information detected by several NVTs and tries to find the best matching OS.</p>
2439<p> Furthermore it reports all previously collected information leading to this best matching OS. It also reports possible additional information
2440 which might help to improve the OS detection.</p>
2441<p> If any of this information is wrong or could be improved please consider to report these to the referenced community portal.</p>
2442</div>
2443<div class="result_section">
2444<b>Vulnerability Detection Result</b><pre>Best matching OS:
2445
2446OS: Microsoft Windows
2447CPE: cpe:/o:microsoft:windows
2448Found by NVT: 1.3.6.1.4.1.25623.1.0.105355 (FTP OS Identification)
2449Concluded from FTP banner on port 21/tcp: 220 Microsoft FTP Service
2450Setting key "Host/runs_windows" based on this information
2451
2452Other OS detections (in order of reliability):
2453
2454OS: Microsoft Windows
2455CPE: cpe:/o:microsoft:windows
2456Found by NVT: 1.3.6.1.4.1.25623.1.0.100062 (Microsoft Remote Desktop Protocol Detection)
2457Concluded from Microsoft Remote Desktop Protocol on port 3389/tcp: Windows, possible Windows 10 or Server 2016 based on binary response fingerprinting: 030000130ed00000123400021f080002000000
2458
2459OS: Microsoft Windows
2460CPE: cpe:/o:microsoft:windows
2461Found by NVT: 1.3.6.1.4.1.25623.1.0.108044 (DCE/RPC and MSRPC Services Enumeration)
2462Concluded from DCE/RPC and MSRPC Services Enumeration on port 135/tcp</pre>
2463</div>
2464<div class="result_section">
2465<b>Log Method</b><p>
2466 Details:
2467 OS Detection Consolidation and Reporting
2468 (OID: 1.3.6.1.4.1.25623.1.0.105937)
2469 </p>
2470<p>
2471 Version used: 2020-02-21T03:27:16+0000</p>
2472</div>
2473<div class="result_section">
2474<b>References</b><br><p><table><tr valign="top">
2475<td>Other:</td>
2476<td>https://community.greenbone.net/c/vulnerability-tests</td>
2477</tr></table></p>
2478</div>
2479<div class="result_head ">
2480<div class="location_float">80/tcp</div>
2481<b>Log</b>
2482 (CVSS: 0.0)
2483 <div class="full_width">
2484 NVT:
2485 Hidden WWW server name
2486 (OID: 1.3.6.1.4.1.25623.1.0.11239)
2487 </div>
2488</div>
2489<div class="result_section">
2490<b>Summary</b><p>It seems that your web server tries to hide its version
2491 or name, which is a good thing.</p>
2492<p> However, using a special crafted request, the scanner was able to discover it.</p>
2493</div>
2494<div class="result_section">
2495<b>Vulnerability Detection Result</b><pre>It seems that your web server tries to hide its version
2496or name, which is a good thing.
2497However, using a special crafted request, the scanner was able
2498to determine that is is running :
2499 Microsoft-HTTPAPI/2.0
2500
2501Solution: Fix your configuration.</pre>
2502</div>
2503<div class="result_section">
2504<b>Solution</b><p>Fix your configuration.</p>
2505</div>
2506<div class="result_section">
2507<b>Log Method</b><p>
2508 Details:
2509 Hidden WWW server name
2510 (OID: 1.3.6.1.4.1.25623.1.0.11239)
2511 </p>
2512<p>
2513 Version used: 2019-11-22T13:51:04+0000</p>
2514</div>
2515<div class="result_head ">
2516<div class="location_float">80/tcp</div>
2517<b>Log</b>
2518 (CVSS: 0.0)
2519 <div class="full_width">
2520 NVT:
2521 CGI Scanning Consolidation
2522 (OID: 1.3.6.1.4.1.25623.1.0.111038)
2523 </div>
2524</div>
2525<div class="result_section">
2526<b>Summary</b><p>The script consolidates various information for CGI scanning.</p>
2527<p> This information is based on the following scripts / settings:</p>
2528<p> - HTTP-Version Detection (OID: 1.3.6.1.4.1.25623.1.0.100034)</p>
2529<p> - No 404 check (OID: 1.3.6.1.4.1.25623.1.0.10386)</p>
2530<p> - Web mirroring / webmirror.nasl (OID: 1.3.6.1.4.1.25623.1.0.10662)</p>
2531<p> - Directory Scanner / DDI_Directory_Scanner.nasl (OID: 1.3.6.1.4.1.25623.1.0.11032)</p>
2532<p> - The configured 'cgi_path' within the 'Scanner Preferences' of the scan config in use</p>
2533<p> - The configured 'Enable CGI scanning', 'Enable generic web application scanning' and
2534 'Add historic /scripts and /cgi-bin to directories for CGI scanning' within the
2535 'Global variable settings' of the scan config in use</p>
2536<p> If you think any of this information is wrong please report it to the referenced community portal.</p>
2537</div>
2538<div class="result_section">
2539<b>Vulnerability Detection Result</b><pre>The Hostname/IP "www.moviescope.com" was used to access the remote host.
2540
2541Generic web application scanning is disabled for this host via the "Enable generic web application scanning" option within the "Global variable settings" of the scan config in use.
2542
2543This service seems to be NOT able to host PHP scripts.
2544
2545This service seems to be NOT able to host ASP scripts.
2546
2547The User-Agent "Mozilla/5.0 [en] (X11, U; OpenVAS-VT 9.0.3)" was used to access the remote host.
2548
2549Historic /scripts and /cgi-bin are not added to the directories used for CGI scanning. You can enable this again with the "Add historic /scripts and /cgi-bin to directories for CGI scanning" option within the "Global variable settings" of the scan config in use.
2550
2551The following directories were used for CGI scanning:
2552
2553http://www.moviescope.com/
2554
2555While this is not, in and of itself, a bug, you should manually inspect these directories to ensure that they are in compliance with company security standards</pre>
2556</div>
2557<div class="result_section">
2558<b>Log Method</b><p>
2559 Details:
2560 CGI Scanning Consolidation
2561 (OID: 1.3.6.1.4.1.25623.1.0.111038)
2562 </p>
2563<p>
2564 Version used: 2019-09-23T09:25:24+0000</p>
2565</div>
2566<div class="result_section">
2567<b>References</b><br><p><table><tr valign="top">
2568<td>Other:</td>
2569<td>https://community.greenbone.net/c/vulnerability-tests</td>
2570</tr></table></p>
2571</div>
2572<div class="result_head ">
2573<div class="location_float">3389/tcp</div>
2574<b>Log</b>
2575 (CVSS: 0.0)
2576 <div class="full_width">
2577 NVT:
2578 SSL/TLS: Certificate - Subject Common Name Does Not Match Server FQDN
2579 (OID: 1.3.6.1.4.1.25623.1.0.103141)
2580 </div>
2581</div>
2582<div class="result_section">
2583<b>Summary</b><p>The SSL/TLS certificate contains a common name (CN) that does not match the hostname.</p>
2584</div>
2585<div class="result_section">
2586<b>Vulnerability Detection Result</b><pre>The certificate of the remote service contains a common name (CN) that does not match the hostname "www.moviescope.com".
2587
2588Certificate details:
2589subject ...: CN=WIN-ESVU38BTHJS
2590subject alternative names (SAN):
2591None
2592issued by .: CN=WIN-ESVU38BTHJS
2593serial ....: 28AF38F31F942C804A3B8683E64B2286
2594valid from : 2020-01-01 07:13:16 UTC
2595valid until: 2020-07-02 07:13:16 UTC
2596fingerprint (SHA-1): 1CBF7B141412DA9ED428C79DB511001D46844C89
2597fingerprint (SHA-256): B2A8B0EEB0B948455AC84D8592AF5E2515A8F61CFDBB75A3D56A55C083743A06</pre>
2598</div>
2599<div class="result_section">
2600<b>Log Method</b><p>
2601 Details:
2602 SSL/TLS: Certificate - Subject Common Name Does Not Match Server FQDN
2603 (OID: 1.3.6.1.4.1.25623.1.0.103141)
2604 </p>
2605<p>
2606 Version used: $Revision: 8981 $</p>
2607</div>
2608<div class="result_head ">
2609<div class="location_float">445/tcp</div>
2610<b>Log</b>
2611 (CVSS: 0.0)
2612 <div class="full_width">
2613 NVT:
2614 SMBv1 enabled (Remote Check)
2615 (OID: 1.3.6.1.4.1.25623.1.0.140151)
2616 </div>
2617</div>
2618<div class="result_section">
2619<b>Summary</b><p>The host has enabled SMBv1 for the SMB Server.</p>
2620</div>
2621<div class="result_section">
2622<b>Vulnerability Detection Result</b><pre>SMBv1 is enabled for the SMB Server</pre>
2623</div>
2624<div class="result_section">
2625<b>Log Method</b><p>Checks if SMBv1 is enabled for the SMB Server based on the
2626 information provided by the following VT:</p>
2627<p> - SMB Remote Version Detection (OID: 1.3.6.1.4.1.25623.1.0.807830).</p>
2628<p>
2629 Details:
2630 SMBv1 enabled (Remote Check)
2631 (OID: 1.3.6.1.4.1.25623.1.0.140151)
2632 </p>
2633<p>
2634 Version used: 2019-05-20T06:24:13+0000</p>
2635</div>
2636<div class="result_section">
2637<b>References</b><br><p><table>
2638<tr valign="top">
2639<td>Other:</td>
2640<td>https://www.us-cert.gov/ncas/current-activity/2017/01/16/SMB-Security-Best-Practices</td>
2641</tr>
2642<tr valign="top">
2643<td></td>
2644<td>https://support.microsoft.com/en-us/kb/2696547</td>
2645</tr>
2646<tr valign="top">
2647<td></td>
2648<td>https://support.microsoft.com/en-us/kb/204279</td>
2649</tr>
2650</table></p>
2651</div>
2652<div class="result_head ">
2653<div class="location_float">3389/tcp</div>
2654<b>Log</b>
2655 (CVSS: 0.0)
2656 <div class="full_width">
2657 NVT:
2658 SSL/TLS: Report Non Weak Cipher Suites
2659 (OID: 1.3.6.1.4.1.25623.1.0.103441)
2660 </div>
2661</div>
2662<div class="result_section">
2663<b>Summary</b><p>This routine reports all Non Weak SSL/TLS cipher suites accepted by a service.</p>
2664</div>
2665<div class="result_section">
2666<b>Vulnerability Detection Result</b><pre>'Non Weak' cipher suites accepted by this service via the TLSv1.0 protocol:
2667
2668TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
2669TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
2670
2671'Non Weak' cipher suites accepted by this service via the TLSv1.1 protocol:
2672
2673TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
2674TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
2675
2676'Non Weak' cipher suites accepted by this service via the TLSv1.2 protocol:
2677
2678TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
2679TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384</pre>
2680</div>
2681<div class="result_section">
2682<b>Log Method</b><p>
2683 Details:
2684 SSL/TLS: Report Non Weak Cipher Suites
2685 (OID: 1.3.6.1.4.1.25623.1.0.103441)
2686 </p>
2687<p>
2688 Version used: $Revision: 4736 $</p>
2689</div>
2690<div class="result_head ">
2691<div class="location_float">1801/tcp</div>
2692<b>Log</b>
2693 (CVSS: 0.0)
2694 <div class="full_width">
2695 NVT:
2696 Unknown OS and Service Banner Reporting
2697 (OID: 1.3.6.1.4.1.25623.1.0.108441)
2698 </div>
2699</div>
2700<div class="result_section">
2701<b>Summary</b><p>This NVT consolidates and reports the information collected by
2702 the following NVTs:</p>
2703<p> - Collect banner of unknown services (OID: 1.3.6.1.4.1.25623.1.0.11154)</p>
2704<p> - Service Detection (unknown) with nmap (OID: 1.3.6.1.4.1.25623.1.0.66286)</p>
2705<p> - Service Detection (wrapped) with nmap (OID: 1.3.6.1.4.1.25623.1.0.108525)</p>
2706<p> - OS Detection Consolidation and Reporting (OID: 1.3.6.1.4.1.25623.1.0.105937)</p>
2707<p> If you know any of the information reported here, please send the full output to
2708 the referenced community portal.</p>
2709</div>
2710<div class="result_section">
2711<b>Vulnerability Detection Result</b><pre>Nmap service detection (unknown) result for this port: msmq
2712
2713This is a guess. A confident identification of the service was not possible.
2714
2715Hint: If you're running a recent nmap version try to run nmap with the following command: 'nmap -sV -Pn -p 1801 10.10.10.16' and submit a possible collected fingerprint to the nmap database.</pre>
2716</div>
2717<div class="result_section">
2718<b>Log Method</b><p>
2719 Details:
2720 Unknown OS and Service Banner Reporting
2721 (OID: 1.3.6.1.4.1.25623.1.0.108441)
2722 </p>
2723<p>
2724 Version used: $Revision: 12934 $</p>
2725</div>
2726<div class="result_section">
2727<b>References</b><br><p><table><tr valign="top">
2728<td>Other:</td>
2729<td>https://community.greenbone.net/c/vulnerability-tests</td>
2730</tr></table></p>
2731</div>
2732<div class="result_head ">
2733<div class="location_float">1538/tcp</div>
2734<b>Log</b>
2735 (CVSS: 5.0)
2736 <div class="full_width">
2737 NVT:
2738 DCE/RPC and MSRPC Services Enumeration Reporting
2739 (OID: 1.3.6.1.4.1.25623.1.0.10736)
2740 </div>
2741</div>
2742<div class="result_section">
2743<b>Summary</b><p>Distributed Computing Environment / Remote Procedure Calls (DCE/RPC) or MSRPC services running
2744 on the remote host can be enumerated by connecting on port 135 and doing the appropriate queries.</p>
2745</div>
2746<div class="result_section">
2747<b>Vulnerability Detection Result</b><pre>The following DCE/RPC or MSRPC services are running on this port:
2748
2749 UUID: 0d3c7f20-1c8d-4654-a1b3-51563b298bda, version 1
2750 Endpoint: ncacn_ip_tcp:10.10.10.16[1538]
2751 Annotation: UserMgrCli
2752
2753 UUID: 1ff70682-0a51-30e8-076d-740be8cee98b, version 1
2754 Endpoint: ncacn_ip_tcp:10.10.10.16[1538]
2755 Named pipe : atsvc
2756 Win32 service or process : mstask.exe
2757 Description : Scheduler service
2758
2759 UUID: 201ef99a-7fa0-444c-9399-19ba84f12a1a, version 1
2760 Endpoint: ncacn_ip_tcp:10.10.10.16[1538]
2761 Annotation: AppInfo
2762
2763 UUID: 29770a8f-829b-4158-90a2-78cd488501f7, version 1
2764 Endpoint: ncacn_ip_tcp:10.10.10.16[1538]
2765
2766 UUID: 2e6035b2-e8f1-41a7-a044-656b439c4c34, version 1
2767 Endpoint: ncacn_ip_tcp:10.10.10.16[1538]
2768 Annotation: Proxy Manager provider server endpoint
2769
2770 UUID: 33d84484-3626-47ee-8c6f-e7e98b113be1, version 2
2771 Endpoint: ncacn_ip_tcp:10.10.10.16[1538]
2772
2773 UUID: 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1
2774 Endpoint: ncacn_ip_tcp:10.10.10.16[1538]
2775
2776 UUID: 3a9ef155-691d-4449-8d05-09ad57031823, version 1
2777 Endpoint: ncacn_ip_tcp:10.10.10.16[1538]
2778
2779 UUID: 552d076a-cb29-4e44-8b6a-d15e59e2c0af, version 1
2780 Endpoint: ncacn_ip_tcp:10.10.10.16[1538]
2781 Annotation: IP Transition Configuration endpoint
2782
2783 UUID: 58e604e8-9adb-4d2e-a464-3b0683fb1480, version 1
2784 Endpoint: ncacn_ip_tcp:10.10.10.16[1538]
2785 Annotation: AppInfo
2786
2787 UUID: 5f54ce7d-5b79-4175-8584-cb65313a0e98, version 1
2788 Endpoint: ncacn_ip_tcp:10.10.10.16[1538]
2789 Annotation: AppInfo
2790
2791 UUID: 86d35949-83c9-4044-b424-db363231fd0c, version 1
2792 Endpoint: ncacn_ip_tcp:10.10.10.16[1538]
2793
2794 UUID: a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1
2795 Endpoint: ncacn_ip_tcp:10.10.10.16[1538]
2796 Annotation: IKE/Authip API
2797
2798 UUID: b18fbab6-56f8-4702-84e0-41053293a869, version 1
2799 Endpoint: ncacn_ip_tcp:10.10.10.16[1538]
2800 Annotation: UserMgrCli
2801
2802 UUID: c36be077-e14b-4fe9-8abc-e856ef4f048b, version 1
2803 Endpoint: ncacn_ip_tcp:10.10.10.16[1538]
2804 Annotation: Proxy Manager client server endpoint
2805
2806 UUID: c49a5a70-8a7f-4e70-ba16-1e8f1f193ef1, version 1
2807 Endpoint: ncacn_ip_tcp:10.10.10.16[1538]
2808 Annotation: Adh APIs
2809
2810 UUID: d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1
2811 Endpoint: ncacn_ip_tcp:10.10.10.16[1538]
2812
2813 UUID: fb9a3757-cff0-4db0-b9fc-bd6c131612fd, version 1
2814 Endpoint: ncacn_ip_tcp:10.10.10.16[1538]
2815 Annotation: AppInfo
2816
2817 UUID: fd7a0523-dc70-43dd-9b2e-9c5ed48225b1, version 1
2818 Endpoint: ncacn_ip_tcp:10.10.10.16[1538]
2819 Annotation: AppInfo</pre>
2820</div>
2821<div class="result_section">
2822<b>Impact</b><p>An attacker may use this fact to gain more knowledge
2823 about the remote host.</p>
2824</div>
2825<div class="result_section">
2826<b>Solution</b><p><b>Solution type: </b>Mitigation</p>
2827<p>Filter incoming traffic to this ports.</p>
2828</div>
2829<div class="result_section">
2830<b>Vulnerability Detection Method</b><p>
2831 Details:
2832 DCE/RPC and MSRPC Services Enumeration Reporting
2833 (OID: 1.3.6.1.4.1.25623.1.0.10736)
2834 </p>
2835<p>
2836 Version used: $Revision: 6319 $</p>
2837</div>
2838<div class="result_head ">
2839<div class="location_float">1539/tcp</div>
2840<b>Log</b>
2841 (CVSS: 5.0)
2842 <div class="full_width">
2843 NVT:
2844 DCE/RPC and MSRPC Services Enumeration Reporting
2845 (OID: 1.3.6.1.4.1.25623.1.0.10736)
2846 </div>
2847</div>
2848<div class="result_section">
2849<b>Summary</b><p>Distributed Computing Environment / Remote Procedure Calls (DCE/RPC) or MSRPC services running
2850 on the remote host can be enumerated by connecting on port 135 and doing the appropriate queries.</p>
2851</div>
2852<div class="result_section">
2853<b>Vulnerability Detection Result</b><pre>The following DCE/RPC or MSRPC services are running on this port:
2854
2855 UUID: 0b6edbfa-4a24-4fc6-8a23-942b1eca65d1, version 1
2856 Endpoint: ncacn_ip_tcp:10.10.10.16[1539]
2857
2858 UUID: 12345678-1234-abcd-ef00-0123456789ab, version 1
2859 Endpoint: ncacn_ip_tcp:10.10.10.16[1539]
2860 Named pipe : spoolss
2861 Win32 service or process : spoolsv.exe
2862 Description : Spooler service
2863
2864 UUID: 4a452661-8290-4b36-8fbe-7f4093a94978, version 1
2865 Endpoint: ncacn_ip_tcp:10.10.10.16[1539]
2866
2867 UUID: 76f03f96-cdfd-44fc-a22c-64950a001209, version 1
2868 Endpoint: ncacn_ip_tcp:10.10.10.16[1539]
2869
2870 UUID: ae33069b-a2a8-46ee-a235-ddfd339be281, version 1
2871 Endpoint: ncacn_ip_tcp:10.10.10.16[1539]</pre>
2872</div>
2873<div class="result_section">
2874<b>Impact</b><p>An attacker may use this fact to gain more knowledge
2875 about the remote host.</p>
2876</div>
2877<div class="result_section">
2878<b>Solution</b><p><b>Solution type: </b>Mitigation</p>
2879<p>Filter incoming traffic to this ports.</p>
2880</div>
2881<div class="result_section">
2882<b>Vulnerability Detection Method</b><p>
2883 Details:
2884 DCE/RPC and MSRPC Services Enumeration Reporting
2885 (OID: 1.3.6.1.4.1.25623.1.0.10736)
2886 </p>
2887<p>
2888 Version used: $Revision: 6319 $</p>
2889</div>
2890<div class="result_head ">
2891<div class="location_float">1541/tcp</div>
2892<b>Log</b>
2893 (CVSS: 5.0)
2894 <div class="full_width">
2895 NVT:
2896 DCE/RPC and MSRPC Services Enumeration Reporting
2897 (OID: 1.3.6.1.4.1.25623.1.0.10736)
2898 </div>
2899</div>
2900<div class="result_section">
2901<b>Summary</b><p>Distributed Computing Environment / Remote Procedure Calls (DCE/RPC) or MSRPC services running
2902 on the remote host can be enumerated by connecting on port 135 and doing the appropriate queries.</p>
2903</div>
2904<div class="result_section">
2905<b>Vulnerability Detection Result</b><pre>The following DCE/RPC or MSRPC services are running on this port:
2906
2907 UUID: 1088a980-eae5-11d0-8d9b-00a02453c337, version 1
2908 Endpoint: ncacn_ip_tcp:10.10.10.16[1541]
2909 Annotation: Message Queuing - QM2QM V1
2910
2911 UUID: 1a9134dd-7b39-45ba-ad88-44d01ca47f28, version 1
2912 Endpoint: ncacn_ip_tcp:10.10.10.16[1541]
2913 Annotation: Message Queuing - RemoteRead V1
2914
2915 UUID: 76d12b80-3467-11d3-91ff-0090272f9ea3, version 1
2916 Endpoint: ncacn_ip_tcp:10.10.10.16[1541]
2917 Annotation: Message Queuing - QMRT V2
2918
2919 UUID: fdb3a030-065f-11d1-bb9b-00a024ea5525, version 1
2920 Endpoint: ncacn_ip_tcp:10.10.10.16[1541]
2921 Annotation: Message Queuing - QMRT V1</pre>
2922</div>
2923<div class="result_section">
2924<b>Impact</b><p>An attacker may use this fact to gain more knowledge
2925 about the remote host.</p>
2926</div>
2927<div class="result_section">
2928<b>Solution</b><p><b>Solution type: </b>Mitigation</p>
2929<p>Filter incoming traffic to this ports.</p>
2930</div>
2931<div class="result_section">
2932<b>Vulnerability Detection Method</b><p>
2933 Details:
2934 DCE/RPC and MSRPC Services Enumeration Reporting
2935 (OID: 1.3.6.1.4.1.25623.1.0.10736)
2936 </p>
2937<p>
2938 Version used: $Revision: 6319 $</p>
2939</div>
2940<div class="result_head ">
2941<div class="location_float">2103/tcp</div>
2942<b>Log</b>
2943 (CVSS: 5.0)
2944 <div class="full_width">
2945 NVT:
2946 DCE/RPC and MSRPC Services Enumeration Reporting
2947 (OID: 1.3.6.1.4.1.25623.1.0.10736)
2948 </div>
2949</div>
2950<div class="result_section">
2951<b>Summary</b><p>Distributed Computing Environment / Remote Procedure Calls (DCE/RPC) or MSRPC services running
2952 on the remote host can be enumerated by connecting on port 135 and doing the appropriate queries.</p>
2953</div>
2954<div class="result_section">
2955<b>Vulnerability Detection Result</b><pre>The following DCE/RPC or MSRPC services are running on this port:
2956
2957 UUID: 1088a980-eae5-11d0-8d9b-00a02453c337, version 1
2958 Endpoint: ncacn_ip_tcp:10.10.10.16[2103]
2959 Annotation: Message Queuing - QM2QM V1
2960
2961 UUID: 1a9134dd-7b39-45ba-ad88-44d01ca47f28, version 1
2962 Endpoint: ncacn_ip_tcp:10.10.10.16[2103]
2963 Annotation: Message Queuing - RemoteRead V1
2964
2965 UUID: 76d12b80-3467-11d3-91ff-0090272f9ea3, version 1
2966 Endpoint: ncacn_ip_tcp:10.10.10.16[2103]
2967 Annotation: Message Queuing - QMRT V2
2968
2969 UUID: fdb3a030-065f-11d1-bb9b-00a024ea5525, version 1
2970 Endpoint: ncacn_ip_tcp:10.10.10.16[2103]
2971 Annotation: Message Queuing - QMRT V1</pre>
2972</div>
2973<div class="result_section">
2974<b>Impact</b><p>An attacker may use this fact to gain more knowledge
2975 about the remote host.</p>
2976</div>
2977<div class="result_section">
2978<b>Solution</b><p><b>Solution type: </b>Mitigation</p>
2979<p>Filter incoming traffic to this ports.</p>
2980</div>
2981<div class="result_section">
2982<b>Vulnerability Detection Method</b><p>
2983 Details:
2984 DCE/RPC and MSRPC Services Enumeration Reporting
2985 (OID: 1.3.6.1.4.1.25623.1.0.10736)
2986 </p>
2987<p>
2988 Version used: $Revision: 6319 $</p>
2989</div>
2990<div class="result_head ">
2991<div class="location_float">2105/tcp</div>
2992<b>Log</b>
2993 (CVSS: 5.0)
2994 <div class="full_width">
2995 NVT:
2996 DCE/RPC and MSRPC Services Enumeration Reporting
2997 (OID: 1.3.6.1.4.1.25623.1.0.10736)
2998 </div>
2999</div>
3000<div class="result_section">
3001<b>Summary</b><p>Distributed Computing Environment / Remote Procedure Calls (DCE/RPC) or MSRPC services running
3002 on the remote host can be enumerated by connecting on port 135 and doing the appropriate queries.</p>
3003</div>
3004<div class="result_section">
3005<b>Vulnerability Detection Result</b><pre>The following DCE/RPC or MSRPC services are running on this port:
3006
3007 UUID: 1088a980-eae5-11d0-8d9b-00a02453c337, version 1
3008 Endpoint: ncacn_ip_tcp:10.10.10.16[2105]
3009 Annotation: Message Queuing - QM2QM V1
3010
3011 UUID: 1a9134dd-7b39-45ba-ad88-44d01ca47f28, version 1
3012 Endpoint: ncacn_ip_tcp:10.10.10.16[2105]
3013 Annotation: Message Queuing - RemoteRead V1
3014
3015 UUID: 76d12b80-3467-11d3-91ff-0090272f9ea3, version 1
3016 Endpoint: ncacn_ip_tcp:10.10.10.16[2105]
3017 Annotation: Message Queuing - QMRT V2
3018
3019 UUID: fdb3a030-065f-11d1-bb9b-00a024ea5525, version 1
3020 Endpoint: ncacn_ip_tcp:10.10.10.16[2105]
3021 Annotation: Message Queuing - QMRT V1</pre>
3022</div>
3023<div class="result_section">
3024<b>Impact</b><p>An attacker may use this fact to gain more knowledge
3025 about the remote host.</p>
3026</div>
3027<div class="result_section">
3028<b>Solution</b><p><b>Solution type: </b>Mitigation</p>
3029<p>Filter incoming traffic to this ports.</p>
3030</div>
3031<div class="result_section">
3032<b>Vulnerability Detection Method</b><p>
3033 Details:
3034 DCE/RPC and MSRPC Services Enumeration Reporting
3035 (OID: 1.3.6.1.4.1.25623.1.0.10736)
3036 </p>
3037<p>
3038 Version used: $Revision: 6319 $</p>
3039</div>
3040<div class="result_head ">
3041<div class="location_float">2107/tcp</div>
3042<b>Log</b>
3043 (CVSS: 5.0)
3044 <div class="full_width">
3045 NVT:
3046 DCE/RPC and MSRPC Services Enumeration Reporting
3047 (OID: 1.3.6.1.4.1.25623.1.0.10736)
3048 </div>
3049</div>
3050<div class="result_section">
3051<b>Summary</b><p>Distributed Computing Environment / Remote Procedure Calls (DCE/RPC) or MSRPC services running
3052 on the remote host can be enumerated by connecting on port 135 and doing the appropriate queries.</p>
3053</div>
3054<div class="result_section">
3055<b>Vulnerability Detection Result</b><pre>The following DCE/RPC or MSRPC services are running on this port:
3056
3057 UUID: 1088a980-eae5-11d0-8d9b-00a02453c337, version 1
3058 Endpoint: ncacn_ip_tcp:10.10.10.16[2107]
3059 Annotation: Message Queuing - QM2QM V1
3060
3061 UUID: 1a9134dd-7b39-45ba-ad88-44d01ca47f28, version 1
3062 Endpoint: ncacn_ip_tcp:10.10.10.16[2107]
3063 Annotation: Message Queuing - RemoteRead V1
3064
3065 UUID: 76d12b80-3467-11d3-91ff-0090272f9ea3, version 1
3066 Endpoint: ncacn_ip_tcp:10.10.10.16[2107]
3067 Annotation: Message Queuing - QMRT V2
3068
3069 UUID: fdb3a030-065f-11d1-bb9b-00a024ea5525, version 1
3070 Endpoint: ncacn_ip_tcp:10.10.10.16[2107]
3071 Annotation: Message Queuing - QMRT V1</pre>
3072</div>
3073<div class="result_section">
3074<b>Impact</b><p>An attacker may use this fact to gain more knowledge
3075 about the remote host.</p>
3076</div>
3077<div class="result_section">
3078<b>Solution</b><p><b>Solution type: </b>Mitigation</p>
3079<p>Filter incoming traffic to this ports.</p>
3080</div>
3081<div class="result_section">
3082<b>Vulnerability Detection Method</b><p>
3083 Details:
3084 DCE/RPC and MSRPC Services Enumeration Reporting
3085 (OID: 1.3.6.1.4.1.25623.1.0.10736)
3086 </p>
3087<p>
3088 Version used: $Revision: 6319 $</p>
3089</div>
3090<div class="result_head ">
3091<div class="location_float">3389/tcp</div>
3092<b>Log</b>
3093 (CVSS: 0.0)
3094 <div class="full_width">
3095 NVT:
3096 SSL/TLS: Report Medium Cipher Suites
3097 (OID: 1.3.6.1.4.1.25623.1.0.902816)
3098 </div>
3099</div>
3100<div class="result_section">
3101<b>Summary</b><p>This routine reports all Medium SSL/TLS cipher suites accepted by a service.</p>
3102</div>
3103<div class="result_section">
3104<b>Vulnerability Detection Result</b><pre>'Medium' cipher suites accepted by this service via the TLSv1.0 protocol:
3105
3106TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
3107TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
3108
3109'Medium' cipher suites accepted by this service via the TLSv1.1 protocol:
3110
3111TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
3112TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
3113
3114'Medium' cipher suites accepted by this service via the TLSv1.2 protocol:
3115
3116TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
3117TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384</pre>
3118</div>
3119<div class="result_section">
3120<b>Vulnerability Insight</b><p>Any cipher suite considered to be secure for only the next 10 years is considered as medium</p>
3121</div>
3122<div class="result_section">
3123<b>Log Method</b><p>
3124 Details:
3125 SSL/TLS: Report Medium Cipher Suites
3126 (OID: 1.3.6.1.4.1.25623.1.0.902816)
3127 </p>
3128<p>
3129 Version used: $Revision: 4743 $</p>
3130</div>
3131<div class="result_head ">
3132<div class="location_float">general/tcp</div>
3133<b>Log</b>
3134 (CVSS: 0.0)
3135 <div class="full_width">
3136 NVT:
3137 Traceroute
3138 (OID: 1.3.6.1.4.1.25623.1.0.51662)
3139 </div>
3140</div>
3141<div class="result_section">
3142<b>Summary</b><p>A traceroute from the scanning server to the target system was
3143 conducted. This traceroute is provided primarily for informational value only. In the vast
3144 majority of cases, it does not represent a vulnerability. However, if the displayed traceroute
3145 contains any private addresses that should not have been publicly visible, then you have an
3146 issue you need to correct.</p>
3147</div>
3148<div class="result_section">
3149<b>Vulnerability Detection Result</b><pre>Here is the route from 10.10.10.11 to 10.10.10.16:
3150
315110.10.10.11
315210.10.10.16</pre>
3153</div>
3154<div class="result_section">
3155<b>Solution</b><p>Block unwanted packets from escaping your network.</p>
3156</div>
3157<div class="result_section">
3158<b>Log Method</b><p>
3159 Details:
3160 Traceroute
3161 (OID: 1.3.6.1.4.1.25623.1.0.51662)
3162 </p>
3163<p>
3164 Version used: 2019-09-09T06:03:58+0000</p>
3165</div>
3166<div class="result_head ">
3167<div class="location_float">80/tcp</div>
3168<b>Log</b>
3169 (CVSS: 0.0)
3170 <div class="full_width">
3171 NVT:
3172 DIRB (NASL wrapper)
3173 (OID: 1.3.6.1.4.1.25623.1.0.103079)
3174 </div>
3175</div>
3176<div class="result_section">
3177<b>Summary</b><p>This script uses DIRB to find directories and files on web
3178 applications via brute forcing. See the preferences section for configuration options.</p>
3179<p> Note: The plugin needs the 'dirb' binary found within the PATH of the user running the scanner and
3180 needs to be executable for this user. The existence of this binary is checked and reported separately
3181 within 'Availability of scanner helper tools' (OID: 1.3.6.1.4.1.25623.1.0.810000).</p>
3182</div>
3183<div class="result_section">
3184<b>Vulnerability Detection Result</b><pre>This are the directories/files found with brute force:
3185
3186http://10.10.10.16:80/</pre>
3187</div>
3188<div class="result_section">
3189<b>Log Method</b><p>
3190 Details:
3191 DIRB (NASL wrapper)
3192 (OID: 1.3.6.1.4.1.25623.1.0.103079)
3193 </p>
3194<p>
3195 Version used: 2019-12-10T12:07:42+0000</p>
3196</div>
3197<div class="result_head ">
3198<div class="location_float">80/tcp</div>
3199<b>Log</b>
3200 (CVSS: 0.0)
3201 <div class="full_width">
3202 NVT:
3203 wapiti (NASL wrapper)
3204 (OID: 1.3.6.1.4.1.25623.1.0.80110)
3205 </div>
3206</div>
3207<div class="result_section">
3208<b>Summary</b><p>This plugin uses wapiti to find
3209 web security issues.</p>
3210<p> Make sure to have wapiti 2.x as wapiti 1.x is not supported.</p>
3211<p> See the preferences section for wapiti options.</p>
3212<p> Note that the scanner is using limited set of wapiti options. Therefore, for more complete web
3213 assessment, you should use standalone wapiti tool for deeper/customized checks.</p>
3214<p> Note: The plugin needs the 'wapiti' binary found within the PATH of the user running the scanner and
3215 needs to be executable for this user. The existence of this binary is checked and reported separately
3216 within 'Availability of scanner helper tools' (OID: 1.3.6.1.4.1.25623.1.0.810000).</p>
3217</div>
3218<div class="result_section">
3219<b>Vulnerability Detection Result</b><pre>The wapiti report filename is empty. That could mean that a wrong version of wapiti is used or tmp dir is not accessible. Make sure to have wapiti 2.x as wapiti 1.x is not supported.
3220In short: Check the installation of wapiti and the scanner.</pre>
3221</div>
3222<div class="result_section">
3223<b>Log Method</b><p>
3224 Details:
3225 wapiti (NASL wrapper)
3226 (OID: 1.3.6.1.4.1.25623.1.0.80110)
3227 </p>
3228<p>
3229 Version used: $Revision: 13985 $</p>
3230</div>
3231<div class="result_head ">
3232<div class="location_float">general/CPE-T</div>
3233<b>Log</b>
3234 (CVSS: 0.0)
3235 <div class="full_width">
3236 NVT:
3237 CPE Inventory
3238 (OID: 1.3.6.1.4.1.25623.1.0.810002)
3239 </div>
3240</div>
3241<div class="result_section">
3242<b>Summary</b><p>This routine uses information collected by other routines about
3243 CPE identities of operating systems, services and applications detected during the scan.</p>
3244<p> Note: Some CPEs for specific products might show up twice or more in the output. Background:</p>
3245<p> After a product got renamed or a specific vendor was acquired by another one it might happen that a
3246 product gets a new CPE within the NVD CPE Dictionary but older entries are kept with the older CPE.</p>
3247</div>
3248<div class="result_section">
3249<b>Vulnerability Detection Result</b><pre>10.10.10.16|cpe:/a:microsoft:ftp_service
325010.10.10.16|cpe:/o:microsoft:windows</pre>
3251</div>
3252<div class="result_section">
3253<b>Log Method</b><p>
3254 Details:
3255 CPE Inventory
3256 (OID: 1.3.6.1.4.1.25623.1.0.810002)
3257 </p>
3258<p>
3259 Version used: 2019-10-24T11:29:24+0000</p>
3260</div>
3261<div class="result_section">
3262<b>References</b><br><p><table><tr valign="top">
3263<td>Other:</td>
3264<td>https://nvd.nist.gov/products/cpe</td>
3265</tr></table></p>
3266</div>
3267<div class="footer">
3268 This file was automatically generated.
3269 </div>
3270</div></body>
3271</html>