· 6 years ago · Nov 10, 2019, 10:50 AM
1#######################################################################################################################################
2=======================================================================================================================================
3Hostname cbos.gov.sd ISP OVH SAS
4Continent Europe Flag
5FR
6Country France Country Code FR
7Region Unknown Local time 10 Nov 2019 10:12 CET
8City Unknown Postal Code Unknown
9IP Address 91.121.115.139 Latitude 48.858
10 Longitude 2.339
11=======================================================================================================================================
12#######################################################################################################################################
13> cbos.gov.sd
14Server: 185.93.180.131
15Address: 185.93.180.131#53
16
17Non-authoritative answer:
18Name: cbos.gov.sd
19Address: 91.121.115.139
20>
21#######################################################################################################################################
22[+] Target : cbos.gov.sd
23
24[+] IP Address : 91.121.115.139
25
26[+] Headers :
27
28[+] Date : Sun, 10 Nov 2019 09:52:04 GMT
29[+] Content-Type : text/html; charset=utf-8
30[+] Transfer-Encoding : chunked
31[+] Connection : keep-alive
32[+] Vary : Accept-Encoding, Cookie
33[+] X-Drupal-Cache : HIT
34[+] Etag : W/"1573375226-0"
35[+] Content-Security-Policy : default-src 'self' 'unsafe-inline' *.addthis.com; script-src 'self' 'unsafe-inline' 'unsafe-eval' *.jsdelivr.net *.googleapis.com *.gstatic.com *.bootstrapcdn.com *.google-analytics.com *.ckeditor.com *.local *.dotdemos.com *.jwplatform.com *.jwpcdn.com *.jwpsrv.com *.ytimg.com *.youtube.com cbos.gov.sd *.cbos.gov.sd *.dot.jo www.google.com s7.addthis.com m.addthisedge.com m.addthis.com cdnjs.cloudflare.com; object-src 'unsafe-inline'; style-src 'unsafe-inline' *.jsdelivr.net *.googleapis.com *.gstatic.com *.bootstrapcdn.com *.ckeditor.com *.local *.dotdemos.com cbos.gov.sd *.cbos.gov.sd *.dot.jo *.google.com cdnjs.cloudflare.com; img-src 'self' 'unsafe-inline' data: *.jsdelivr.net *.googleapis.com *.gstatic.com *.google-analytics.com *.local *.dotdemos.com jwpltx.com *.jwpltx.com cbos.gov.sd *.cbos.gov.sd *.dot.jo stats.g.doubleclick.net *.ckeditor.com; media-src 'self' 'unsafe-inline' data: *.jsdelivr.net *.googleapis.com *.gstatic.com *.google-analytics.com *.local *.dotdemos.com cbos.gov.sd *.cbos.gov.sd *.dot.jo; frame-src 'self' 'unsafe-inline' *.googleapis.com google.com *.google.com *.gstatic.com *.youtube.com *.local *.dotdemos.com cbos.gov.sd *.gov.sd *.dot.jo *.addthis.com cbos.gov.sd:*; font-src 'self' 'unsafe-inline' *.jsdelivr.net *.googleapis.com *.gstatic.com *.bootstrapcdn.com *.local *.dotdemos.com *.jwpcdn.com *.jwpsrv.com cbos.gov.sd *.cbos.gov.sd *.dot.jo fonts.google.com maxcdn.bootstrapcdn.com; connect-src 'self' 'unsafe-inline' *.googleapis.com google.com *.google.com *.gstatic.com *.youtube.com *.local *.dotdemos.com cbos.gov.sd *.gov.sd *.dot.jo *.addthis.com cbos.gov.sd:*; report-uri /admin/config/system/seckit/csp-report
36[+] X-Content-Security-Policy : default-src 'self' 'unsafe-inline' *.addthis.com; script-src 'self' 'unsafe-inline' 'unsafe-eval' *.jsdelivr.net *.googleapis.com *.gstatic.com *.bootstrapcdn.com *.google-analytics.com *.ckeditor.com *.local *.dotdemos.com *.jwplatform.com *.jwpcdn.com *.jwpsrv.com *.ytimg.com *.youtube.com cbos.gov.sd *.cbos.gov.sd *.dot.jo www.google.com s7.addthis.com m.addthisedge.com m.addthis.com cdnjs.cloudflare.com; object-src 'unsafe-inline'; style-src 'unsafe-inline' *.jsdelivr.net *.googleapis.com *.gstatic.com *.bootstrapcdn.com *.ckeditor.com *.local *.dotdemos.com cbos.gov.sd *.cbos.gov.sd *.dot.jo *.google.com cdnjs.cloudflare.com; img-src 'self' 'unsafe-inline' data: *.jsdelivr.net *.googleapis.com *.gstatic.com *.google-analytics.com *.local *.dotdemos.com jwpltx.com *.jwpltx.com cbos.gov.sd *.cbos.gov.sd *.dot.jo stats.g.doubleclick.net *.ckeditor.com; media-src 'self' 'unsafe-inline' data: *.jsdelivr.net *.googleapis.com *.gstatic.com *.google-analytics.com *.local *.dotdemos.com cbos.gov.sd *.cbos.gov.sd *.dot.jo; frame-src 'self' 'unsafe-inline' *.googleapis.com google.com *.google.com *.gstatic.com *.youtube.com *.local *.dotdemos.com cbos.gov.sd *.gov.sd *.dot.jo *.addthis.com cbos.gov.sd:*; font-src 'self' 'unsafe-inline' *.jsdelivr.net *.googleapis.com *.gstatic.com *.bootstrapcdn.com *.local *.dotdemos.com *.jwpcdn.com *.jwpsrv.com cbos.gov.sd *.cbos.gov.sd *.dot.jo fonts.google.com maxcdn.bootstrapcdn.com; connect-src 'self' 'unsafe-inline' *.googleapis.com google.com *.google.com *.gstatic.com *.youtube.com *.local *.dotdemos.com cbos.gov.sd *.gov.sd *.dot.jo *.addthis.com cbos.gov.sd:*; report-uri /admin/config/system/seckit/csp-report
37[+] X-WebKit-CSP : default-src 'self' 'unsafe-inline' *.addthis.com; script-src 'self' 'unsafe-inline' 'unsafe-eval' *.jsdelivr.net *.googleapis.com *.gstatic.com *.bootstrapcdn.com *.google-analytics.com *.ckeditor.com *.local *.dotdemos.com *.jwplatform.com *.jwpcdn.com *.jwpsrv.com *.ytimg.com *.youtube.com cbos.gov.sd *.cbos.gov.sd *.dot.jo www.google.com s7.addthis.com m.addthisedge.com m.addthis.com cdnjs.cloudflare.com; object-src 'unsafe-inline'; style-src 'unsafe-inline' *.jsdelivr.net *.googleapis.com *.gstatic.com *.bootstrapcdn.com *.ckeditor.com *.local *.dotdemos.com cbos.gov.sd *.cbos.gov.sd *.dot.jo *.google.com cdnjs.cloudflare.com; img-src 'self' 'unsafe-inline' data: *.jsdelivr.net *.googleapis.com *.gstatic.com *.google-analytics.com *.local *.dotdemos.com jwpltx.com *.jwpltx.com cbos.gov.sd *.cbos.gov.sd *.dot.jo stats.g.doubleclick.net *.ckeditor.com; media-src 'self' 'unsafe-inline' data: *.jsdelivr.net *.googleapis.com *.gstatic.com *.google-analytics.com *.local *.dotdemos.com cbos.gov.sd *.cbos.gov.sd *.dot.jo; frame-src 'self' 'unsafe-inline' *.googleapis.com google.com *.google.com *.gstatic.com *.youtube.com *.local *.dotdemos.com cbos.gov.sd *.gov.sd *.dot.jo *.addthis.com cbos.gov.sd:*; font-src 'self' 'unsafe-inline' *.jsdelivr.net *.googleapis.com *.gstatic.com *.bootstrapcdn.com *.local *.dotdemos.com *.jwpcdn.com *.jwpsrv.com cbos.gov.sd *.cbos.gov.sd *.dot.jo fonts.google.com maxcdn.bootstrapcdn.com; connect-src 'self' 'unsafe-inline' *.googleapis.com google.com *.google.com *.gstatic.com *.youtube.com *.local *.dotdemos.com cbos.gov.sd *.gov.sd *.dot.jo *.addthis.com cbos.gov.sd:*; report-uri /admin/config/system/seckit/csp-report
38[+] From-Origin : same
39[+] Content-Language : ar
40[+] X-Frame-Options : SAMEORIGIN, SAMEORIGIN
41[+] Cache-Control : public, max-age=300
42[+] Last-Modified : Sun, 10 Nov 2019 08:40:26 GMT
43[+] Expires : Sun, 19 Nov 1978 05:00:00 GMT
44[+] Strict-Transport-Security : max-age=15552000
45[+] X-Content-Type-Options : nosniff
46[+] X-XSS-Protection : 1; mode=block
47[+] Content-Encoding : gzip
48
49[+] SSL Certificate Information :
50
51[+] commonName : cbos.gov.sd
52[+] countryName : US
53[+] organizationName : Let's Encrypt
54[+] commonName : Let's Encrypt Authority X3
55[+] Version : 3
56[+] Serial Number : 0338432B7F2132ADD1804E5DEF79D609D03F
57[+] Not Before : Aug 31 13:30:14 2019 GMT
58[+] Not After : Nov 29 13:30:14 2019 GMT
59[+] OCSP : ('http://ocsp.int-x3.letsencrypt.org',)
60[+] subject Alt Name : (('DNS', 'cbos.gov.sd'), ('DNS', 'www.cbos.gov.sd'))
61[+] CA Issuers : ('http://cert.int-x3.letsencrypt.org/',)
62
63[+] Whois Lookup :
64
65[+] NIR : None
66[+] ASN Registry : ripencc
67[+] ASN : 16276
68[+] ASN CIDR : 91.121.0.0/16
69[+] ASN Country Code : FR
70[+] ASN Date : 2006-09-20
71[+] ASN Description : OVH, FR
72[+] cidr : 91.121.64.0/18
73[+] name : OVH
74[+] handle : OTC2-RIPE
75[+] range : 91.121.64.0 - 91.121.127.255
76[+] description : OVH SAS
77Dedicated Servers
78http://www.ovh.com
79[+] country : FR
80[+] state : None
81[+] city : None
82[+] address : OVH SAS
832 rue Kellermann
8459100 Roubaix
85France
86[+] postal_code : None
87[+] emails : ['abuse@ovh.net']
88[+] created : 2008-03-10T13:45:33Z
89[+] updated : 2008-03-10T13:45:33Z
90
91[+] Crawling Target...
92
93[+] Looking for robots.txt........[ Found ]
94[+] Extracting robots Links.......[ 68 ]
95[+] Looking for sitemap.xml.......[ Found ]
96[+] Extracting sitemap Links......[ 881 ]
97[+] Extracting CSS Links..........[ 6 ]
98[+] Extracting Javascript Links...[ 11 ]
99[+] Extracting Internal Links.....[ 20 ]
100[+] Extracting External Links.....[ 8 ]
101[+] Extracting Images.............[ 27 ]
102
103[+] Total Links Extracted : 1020
104
105[+] Dumping Links in /opt/FinalRecon/dumps/cbos.gov.sd.dump
106[+] Completed!
107######################################################################################################################################
108[+] Starting At 2019-11-10 04:52:18.081847
109[+] Collecting Information On: https://cbos.gov.sd/
110[#] Status: 200
111--------------------------------------------------
112[+] Xss Protection Detected !
113- Date: Sun, 10 Nov 2019 09:52:18 GMT
114- Content-Type: text/html; charset=utf-8
115- Transfer-Encoding: chunked
116- Connection: keep-alive
117- Vary: Accept-Encoding, Cookie
118- X-Drupal-Cache: HIT
119- Etag: W/"1573375226-0"
120- Content-Security-Policy: default-src 'self' 'unsafe-inline' *.addthis.com; script-src 'self' 'unsafe-inline' 'unsafe-eval' *.jsdelivr.net *.googleapis.com *.gstatic.com *.bootstrapcdn.com *.google-analytics.com *.ckeditor.com *.local *.dotdemos.com *.jwplatform.com *.jwpcdn.com *.jwpsrv.com *.ytimg.com *.youtube.com cbos.gov.sd *.cbos.gov.sd *.dot.jo www.google.com s7.addthis.com m.addthisedge.com m.addthis.com cdnjs.cloudflare.com; object-src 'unsafe-inline'; style-src 'unsafe-inline' *.jsdelivr.net *.googleapis.com *.gstatic.com *.bootstrapcdn.com *.ckeditor.com *.local *.dotdemos.com cbos.gov.sd *.cbos.gov.sd *.dot.jo *.google.com cdnjs.cloudflare.com; img-src 'self' 'unsafe-inline' data: *.jsdelivr.net *.googleapis.com *.gstatic.com *.google-analytics.com *.local *.dotdemos.com jwpltx.com *.jwpltx.com cbos.gov.sd *.cbos.gov.sd *.dot.jo stats.g.doubleclick.net *.ckeditor.com; media-src 'self' 'unsafe-inline' data: *.jsdelivr.net *.googleapis.com *.gstatic.com *.google-analytics.com *.local *.dotdemos.com cbos.gov.sd *.cbos.gov.sd *.dot.jo; frame-src 'self' 'unsafe-inline' *.googleapis.com google.com *.google.com *.gstatic.com *.youtube.com *.local *.dotdemos.com cbos.gov.sd *.gov.sd *.dot.jo *.addthis.com cbos.gov.sd:*; font-src 'self' 'unsafe-inline' *.jsdelivr.net *.googleapis.com *.gstatic.com *.bootstrapcdn.com *.local *.dotdemos.com *.jwpcdn.com *.jwpsrv.com cbos.gov.sd *.cbos.gov.sd *.dot.jo fonts.google.com maxcdn.bootstrapcdn.com; connect-src 'self' 'unsafe-inline' *.googleapis.com google.com *.google.com *.gstatic.com *.youtube.com *.local *.dotdemos.com cbos.gov.sd *.gov.sd *.dot.jo *.addthis.com cbos.gov.sd:*; report-uri /admin/config/system/seckit/csp-report
121- X-Content-Security-Policy: default-src 'self' 'unsafe-inline' *.addthis.com; script-src 'self' 'unsafe-inline' 'unsafe-eval' *.jsdelivr.net *.googleapis.com *.gstatic.com *.bootstrapcdn.com *.google-analytics.com *.ckeditor.com *.local *.dotdemos.com *.jwplatform.com *.jwpcdn.com *.jwpsrv.com *.ytimg.com *.youtube.com cbos.gov.sd *.cbos.gov.sd *.dot.jo www.google.com s7.addthis.com m.addthisedge.com m.addthis.com cdnjs.cloudflare.com; object-src 'unsafe-inline'; style-src 'unsafe-inline' *.jsdelivr.net *.googleapis.com *.gstatic.com *.bootstrapcdn.com *.ckeditor.com *.local *.dotdemos.com cbos.gov.sd *.cbos.gov.sd *.dot.jo *.google.com cdnjs.cloudflare.com; img-src 'self' 'unsafe-inline' data: *.jsdelivr.net *.googleapis.com *.gstatic.com *.google-analytics.com *.local *.dotdemos.com jwpltx.com *.jwpltx.com cbos.gov.sd *.cbos.gov.sd *.dot.jo stats.g.doubleclick.net *.ckeditor.com; media-src 'self' 'unsafe-inline' data: *.jsdelivr.net *.googleapis.com *.gstatic.com *.google-analytics.com *.local *.dotdemos.com cbos.gov.sd *.cbos.gov.sd *.dot.jo; frame-src 'self' 'unsafe-inline' *.googleapis.com google.com *.google.com *.gstatic.com *.youtube.com *.local *.dotdemos.com cbos.gov.sd *.gov.sd *.dot.jo *.addthis.com cbos.gov.sd:*; font-src 'self' 'unsafe-inline' *.jsdelivr.net *.googleapis.com *.gstatic.com *.bootstrapcdn.com *.local *.dotdemos.com *.jwpcdn.com *.jwpsrv.com cbos.gov.sd *.cbos.gov.sd *.dot.jo fonts.google.com maxcdn.bootstrapcdn.com; connect-src 'self' 'unsafe-inline' *.googleapis.com google.com *.google.com *.gstatic.com *.youtube.com *.local *.dotdemos.com cbos.gov.sd *.gov.sd *.dot.jo *.addthis.com cbos.gov.sd:*; report-uri /admin/config/system/seckit/csp-report
122- X-WebKit-CSP: default-src 'self' 'unsafe-inline' *.addthis.com; script-src 'self' 'unsafe-inline' 'unsafe-eval' *.jsdelivr.net *.googleapis.com *.gstatic.com *.bootstrapcdn.com *.google-analytics.com *.ckeditor.com *.local *.dotdemos.com *.jwplatform.com *.jwpcdn.com *.jwpsrv.com *.ytimg.com *.youtube.com cbos.gov.sd *.cbos.gov.sd *.dot.jo www.google.com s7.addthis.com m.addthisedge.com m.addthis.com cdnjs.cloudflare.com; object-src 'unsafe-inline'; style-src 'unsafe-inline' *.jsdelivr.net *.googleapis.com *.gstatic.com *.bootstrapcdn.com *.ckeditor.com *.local *.dotdemos.com cbos.gov.sd *.cbos.gov.sd *.dot.jo *.google.com cdnjs.cloudflare.com; img-src 'self' 'unsafe-inline' data: *.jsdelivr.net *.googleapis.com *.gstatic.com *.google-analytics.com *.local *.dotdemos.com jwpltx.com *.jwpltx.com cbos.gov.sd *.cbos.gov.sd *.dot.jo stats.g.doubleclick.net *.ckeditor.com; media-src 'self' 'unsafe-inline' data: *.jsdelivr.net *.googleapis.com *.gstatic.com *.google-analytics.com *.local *.dotdemos.com cbos.gov.sd *.cbos.gov.sd *.dot.jo; frame-src 'self' 'unsafe-inline' *.googleapis.com google.com *.google.com *.gstatic.com *.youtube.com *.local *.dotdemos.com cbos.gov.sd *.gov.sd *.dot.jo *.addthis.com cbos.gov.sd:*; font-src 'self' 'unsafe-inline' *.jsdelivr.net *.googleapis.com *.gstatic.com *.bootstrapcdn.com *.local *.dotdemos.com *.jwpcdn.com *.jwpsrv.com cbos.gov.sd *.cbos.gov.sd *.dot.jo fonts.google.com maxcdn.bootstrapcdn.com; connect-src 'self' 'unsafe-inline' *.googleapis.com google.com *.google.com *.gstatic.com *.youtube.com *.local *.dotdemos.com cbos.gov.sd *.gov.sd *.dot.jo *.addthis.com cbos.gov.sd:*; report-uri /admin/config/system/seckit/csp-report
123- From-Origin: same
124- Content-Language: ar
125- X-Frame-Options: SAMEORIGIN, SAMEORIGIN
126- Cache-Control: public, max-age=300
127- Last-Modified: Sun, 10 Nov 2019 08:40:26 GMT
128- Expires: Sun, 19 Nov 1978 05:00:00 GMT
129- Strict-Transport-Security: max-age=15552000
130- X-Content-Type-Options: nosniff
131- X-XSS-Protection: 1; mode=block
132- Content-Encoding: gzip
133--------------------------------------------------
134[#] Finding Location..!
135[#] status: success
136[#] country: France
137[#] countryCode: FR
138[#] region: HDF
139[#] regionName: Hauts-de-France
140[#] city: Roubaix
141[#] zip: 59100
142[#] lat: 50.6917
143[#] lon: 3.20014
144[#] timezone: Europe/Paris
145[#] isp: OVH ISP
146[#] org: OVH SAS
147[#] as: AS16276 OVH SAS
148[#] query: 91.121.115.139
149--------------------------------------------------
150[x] Didn't Detect WAF Presence on: https://cbos.gov.sd/
151--------------------------------------------------
152[#] Starting Reverse DNS
153[-] Failed ! Fail
154--------------------------------------------------
155[!] Scanning Open Port
156[#] 22/tcp open ssh
157[#] 80/tcp open http
158[#] 443/tcp open https
159--------------------------------------------------
160[+] Collecting Information Disclosure!
161[#] Detecting sitemap.xml file
162[!] sitemap.xml File Found: https://cbos.gov.sd//sitemap.xml
163[#] Detecting robots.txt file
164[!] robots.txt File Found: https://cbos.gov.sd//robots.txt
165[#] Detecting GNU Mailman
166[-] GNU Mailman App Not Detected!?
167--------------------------------------------------
168[+] Crawling Url Parameter On: https://cbos.gov.sd/
169--------------------------------------------------
170[#] Searching Html Form !
171[+] Html Form Discovered
172[#] action: /
173[#] class: ['simplenews-subscribe']
174[#] id: simplenews-block-form-8
175[#] method: post
176--------------------------------------------------
177[!] Found 1 dom parameter
178[#] https://cbos.gov.sd//#main-content
179--------------------------------------------------
180[!] 49 Internal Dynamic Parameter Discovered
181[+] https://cbos.gov.sd/ar/periodicals-publications?field_publication_type_tid_i18n=46
182[+] https://cbos.gov.sd/ar/periodicals-publications?field_publication_type_tid_i18n=47
183[+] https://cbos.gov.sd/ar/periodicals-publications?field_publication_type_tid_i18n=48
184[+] https://cbos.gov.sd/ar/periodicals-publications?field_publication_type_tid_i18n=49
185[+] https://cbos.gov.sd/ar/periodicals-publications?field_publication_type_tid_i18n=52
186[+] https://cbos.gov.sd/ar/periodicals-publications?field_publication_type_tid_i18n=53
187[+] https://cbos.gov.sd/ar/periodicals-publications?field_publication_type_tid_i18n=57
188[+] https://cbos.gov.sd/ar/periodicals-publications?field_publication_type_tid_i18n=58
189[+] https://cbos.gov.sd/ar/periodicals-publications?field_publication_type_tid_i18n=242
190[+] https://cbos.gov.sd/ar/periodicals-publications?field_publication_type_tid_i18n=55
191[+] https://cbos.gov.sd///ar/node?page=1
192[+] https://cbos.gov.sd///ar/node?page=2
193[+] https://cbos.gov.sd///ar/node?page=1
194[+] https://cbos.gov.sd///ar/node?page=2
195[+] https://cbos.gov.sd///ar/periodicals-publications?field_publication_type_tid_i18n=46
196[+] https://cbos.gov.sd///ar/periodicals-publications?field_publication_type_tid_i18n=46
197[+] https://cbos.gov.sd///ar/periodicals-publications?field_publication_type_tid_i18n=46
198[+] https://cbos.gov.sd///ar/periodicals-publications?field_publication_type_tid_i18n=250
199[+] https://cbos.gov.sd///ar/periodicals-publications?field_publication_type_tid_i18n=250
200[+] https://cbos.gov.sd///ar/periodicals-publications?field_publication_type_tid_i18n=250
201[+] https://cbos.gov.sd///ar/periodicals-publications?field_publication_type_tid_i18n=47
202[+] https://cbos.gov.sd///ar/periodicals-publications?field_publication_type_tid_i18n=47
203[+] https://cbos.gov.sd///ar/periodicals-publications?field_publication_type_tid_i18n=47
204[+] https://cbos.gov.sd///ar/periodicals-publications?field_publication_type_tid_i18n=48
205[+] https://cbos.gov.sd///ar/periodicals-publications?field_publication_type_tid_i18n=48
206[+] https://cbos.gov.sd///ar/periodicals-publications?field_publication_type_tid_i18n=48
207[+] https://cbos.gov.sd///ar/periodicals-publications?field_publication_type_tid_i18n=49
208[+] https://cbos.gov.sd///ar/periodicals-publications?field_publication_type_tid_i18n=49
209[+] https://cbos.gov.sd///ar/periodicals-publications?field_publication_type_tid_i18n=49
210[+] https://cbos.gov.sd///ar/periodicals-publications?field_publication_type_tid_i18n=242
211[+] https://cbos.gov.sd///ar/periodicals-publications?field_publication_type_tid_i18n=242
212[+] https://cbos.gov.sd///ar/periodicals-publications?field_publication_type_tid_i18n=242
213[+] https://cbos.gov.sd///ar/periodicals-publications?field_publication_type_tid_i18n=52
214[+] https://cbos.gov.sd///ar/periodicals-publications?field_publication_type_tid_i18n=52
215[+] https://cbos.gov.sd///ar/periodicals-publications?field_publication_type_tid_i18n=52
216[+] https://cbos.gov.sd///ar/periodicals-publications?field_publication_type_tid_i18n=53
217[+] https://cbos.gov.sd///ar/periodicals-publications?field_publication_type_tid_i18n=53
218[+] https://cbos.gov.sd///ar/periodicals-publications?field_publication_type_tid_i18n=53
219[+] https://cbos.gov.sd///ar/periodicals-publications?field_publication_type_tid_i18n=55
220[+] https://cbos.gov.sd///ar/periodicals-publications?field_publication_type_tid_i18n=55
221[+] https://cbos.gov.sd///ar/periodicals-publications?field_publication_type_tid_i18n=55
222[+] https://cbos.gov.sd///ar/periodicals-publications?field_publication_type_tid_i18n=57
223[+] https://cbos.gov.sd///ar/periodicals-publications?field_publication_type_tid_i18n=57
224[+] https://cbos.gov.sd///ar/periodicals-publications?field_publication_type_tid_i18n=57
225[+] https://cbos.gov.sd///ar/periodicals-publications?field_publication_type_tid_i18n=58
226[+] https://cbos.gov.sd///ar/periodicals-publications?field_publication_type_tid_i18n=58
227[+] https://cbos.gov.sd///ar/periodicals-publications?field_publication_type_tid_i18n=58
228[+] https://cbos.gov.sd/ar/node?mini=2019-10
229[+] https://cbos.gov.sd/ar/node?mini=2019-12
230--------------------------------------------------
231[!] 1 External Dynamic Parameter Discovered
232[#] http://dsbb.imf.org/Pages/GDDS/CtyCtgList.aspx?ctycode=SDN
233--------------------------------------------------
234[!] 133 Internal links Discovered
235[+] https://cbos.gov.sd/sites/all/themes/cbos/favicon.ico
236[+] https://cbos.gov.sd/ar/rss.xml
237[+] https://cbos.gov.sd/sites/default/files/css/css_woIztW8ifWHtEhGfGXbq1ML4NyjErttubWKldKUHDDE.css
238[+] https://cbos.gov.sd/sites/default/files/css/css_Wl_ucOXfpxR3lY1byxN9ORiyu7x4Q4BwTEeqAp0cyQI.css
239[+] https://cbos.gov.sd/sites/default/files/css/css_klDKwUVSRMagnfm6fsQLPrQz6rOHU7TU96oX5wuOSi8.css
240[+] https://cbos.gov.sd////cdn.jsdelivr.net/bootstrap/3.3.5/css/bootstrap.min.css
241[+] https://cbos.gov.sd/sites/default/files/css/css_iFkxMx_n0HkKf0npWyM7IRtKI6Astll129KBdlz-rok.css
242[+] https://cbos.gov.sd///ar
243[+] https://cbos.gov.sd///ar/careers
244[+] https://cbos.gov.sd///ar/forms
245[+] https://cbos.gov.sd///ar/form/%D8%A7%D8%AA%D8%B5%D9%84-%D8%A8%D9%86%D8%A7
246[+] https://cbos.gov.sd///en
247[+] https://cbos.gov.sd///ar
248[+] https://cbos.gov.sd///ar
249[+] https://cbos.gov.sd///ar
250[+] https://cbos.gov.sd///ar
251[+] https://cbos.gov.sd///ar
252[+] https://cbos.gov.sd///ar/about-cbos/%D9%86%D8%A8%D8%B0%D8%A9-%D8%AA%D8%A7%D8%B1%D9%8A%D8%AE%D9%8A%D8%A9-%D8%B9%D9%86-%D8%A8%D9%86%D9%83-%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86-%D8%A7%D9%84%D9%85%D8%B1%D9%83%D8%B2%D9%8A
253[+] https://cbos.gov.sd///ar/content/%D8%A3%D8%BA%D8%B1%D8%A7%D8%B6-%D8%A7%D9%84%D8%A8%D9%86%D9%83-%D8%A7%D9%84%D8%A3%D8%B3%D8%A7%D8%B3%D9%8A%D8%A9
254[+] https://cbos.gov.sd///ar/content/%D8%B7%D8%A8%D9%8A%D8%B9%D8%A9-%D8%A7%D9%84%D9%86%D8%B8%D8%A7%D9%85-%D8%A7%D9%84%D9%85%D8%B5%D8%B1%D9%81%D9%8A
255[+] https://cbos.gov.sd///ar/content/%D8%A7%D9%84%D8%B1%D8%A4%D9%8A%D8%A9-%D9%88%D8%A7%D9%84%D8%B1%D8%B3%D8%A7%D9%84%D8%A9-%D9%88%D8%A7%D9%84%D9%82%D9%8A%D9%85-%D8%A7%D9%84%D8%AC%D9%88%D9%87%D8%B1%D9%8A%D8%A9
256[+] https://cbos.gov.sd///ar/content/%D8%A7%D9%84%D8%AE%D8%B7%D8%A9-%D8%A7%D9%84%D8%A5%D8%B3%D8%AA%D8%B1%D8%A7%D8%AA%D9%8A%D8%AC%D9%8A%D8%A9-%D8%A7%D9%84%D8%AE%D9%85%D8%B3%D9%8A%D8%A9-%D8%A7%D9%84%D8%AB%D8%A7%D9%86%D9%8A%D8%A9-2012-2016
257[+] https://cbos.gov.sd///ar/members
258[+] https://cbos.gov.sd///ar/board-of-directors
259[+] https://cbos.gov.sd///ar/content/%D9%82%D8%A7%D9%86%D9%88%D9%86-%D8%A8%D9%86%D9%83-%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86-%D9%84%D8%B3%D9%86%D8%A9-2002-%D9%85%D8%B9%D8%AF%D9%84%D8%A7-%D8%AD%D8%AA%D9%89-2012
260[+] https://cbos.gov.sd///ar/content/%D9%82%D8%A7%D9%86%D9%88%D9%86-%D8%AA%D9%86%D8%B8%D9%8A%D9%85-%D8%A7%D9%84%D8%B9%D9%85%D9%84-%D8%A7%D9%84%D9%85%D8%B5%D8%B1%D9%81%D9%8A-%D9%84%D9%84%D8%B9%D8%A7%D9%85-2004
261[+] https://cbos.gov.sd///ar/content/%D9%82%D8%A7%D9%86%D9%88%D9%86-%D9%85%D9%83%D8%A7%D9%81%D8%AD%D8%A9-%D8%BA%D8%B3%D9%84-%D8%A7%D9%84%D8%A3%D9%85%D9%88%D8%A7%D9%84-%D9%88%D8%AA%D9%85%D9%88%D9%8A%D9%84-%D8%A7%D9%84%D8%A5%D8%B1%D9%87%D8%A7%D8%A8
262[+] https://cbos.gov.sd///ar/content/%D9%82%D8%A7%D9%86%D9%88%D9%86-%D8%A7%D9%84%D8%A3%D9%85%D9%88%D8%A7%D9%84-%D8%A7%D9%84%D9%85%D8%B1%D9%87%D9%88%D9%86%D8%A9-%D9%84%D9%84%D9%85%D8%B5%D8%A7%D8%B1%D9%81
263[+] https://cbos.gov.sd///ar/content/%D9%82%D8%A7%D9%86%D9%88%D9%86-%D8%AC%D8%B1%D8%A7%D8%A6%D9%85-%D8%A7%D9%84%D9%85%D8%B9%D9%84%D9%88%D9%85%D8%A7%D8%AA%D9%8A%D8%A9-%D9%84%D8%B3%D9%86%D8%A9-2007
264[+] https://cbos.gov.sd///ar/content/%D9%82%D8%A7%D9%86%D9%88%D9%86-%D8%A7%D9%84%D9%85%D8%B9%D8%A7%D9%85%D9%84%D8%A7%D8%AA-%D8%A7%D9%84%D8%A7%D9%84%D9%83%D8%AA%D8%B1%D9%88%D9%86%D9%8A%D8%A9
265[+] https://cbos.gov.sd///ar/content/%D9%82%D8%A7%D9%86%D9%88%D9%86-%D8%B5%D9%86%D8%AF%D9%88%D9%82-%D8%B6%D9%85%D8%A7%D9%86-%D8%A7%D9%84%D9%88%D8%AF%D8%A7%D8%A6%D8%B9-%D8%A7%D9%84%D9%85%D8%B5%D8%B1%D9%81%D9%8A%D8%A9
266[+] https://cbos.gov.sd///ar/content/%D9%82%D8%A7%D9%86%D9%88%D9%86-%D8%AA%D9%86%D8%B8%D9%8A%D9%85-%D8%A7%D9%84%D8%AA%D8%B9%D8%A7%D9%85%D9%84-%D8%A8%D8%A7%D9%84%D9%86%D9%82%D8%AF
267[+] https://cbos.gov.sd///ar/content/%D9%82%D8%A7%D9%86%D9%88%D9%86-%D8%A7%D9%84%D8%A7%D8%B3%D8%AA%D8%B9%D9%84%D8%A7%D9%85-%D9%88%D8%A7%D9%84%D8%AA%D8%B5%D9%86%D9%8A%D9%81-%D8%A7%D9%84%D8%A7%D8%A6%D8%AA%D9%85%D8%A7%D9%86%D9%8A
268[+] https://cbos.gov.sd///ar/content/%D9%82%D9%88%D8%A7%D8%B9%D8%AF-%D8%B9%D9%85%D9%84-%D9%88%D8%AA%D8%B1%D8%AE%D9%8A%D8%B5-%D9%85%D9%83%D8%A7%D8%AA%D8%A8-%D8%AA%D9%85%D8%AB%D9%8A%D9%84-%D8%A7%D9%84%D9%85%D8%B5%D8%A7%D8%B1%D9%81-%D8%A7%D9%84%D8%A3%D8%AC%D9%86%D8%A8%D9%8A%D8%A9
269[+] https://cbos.gov.sd///ar/content/%D9%84%D8%A7%D8%A6%D8%AD%D8%A9-%D8%AA%D9%86%D8%B8%D9%8A%D9%85-%D8%A7%D9%84%D8%AA%D8%B9%D8%A7%D9%85%D9%84-%D8%A8%D8%A7%D9%84%D9%86%D9%82%D8%AF-%D8%A7%D9%84%D8%A7%D8%AC%D9%86%D8%A8%D9%8A
270[+] https://cbos.gov.sd///ar/content/%D9%84%D8%A7%D8%A6%D8%AD%D8%A9-%D8%AA%D9%86%D8%B8%D9%8A%D9%85-%D8%B4%D8%B1%D9%83%D8%A7%D8%AA-%D8%A7%D9%84%D8%B5%D8%B1%D8%A7%D9%81%D8%A9-%D9%84%D8%B3%D9%86%D8%A9-2011%D9%85
271[+] https://cbos.gov.sd///ar/content/%D9%84%D8%A7%D8%A6%D8%AD%D9%80%D9%80%D8%A9-%D8%B4%D9%80%D8%B1%D9%88%D8%B7-%D8%A7%D9%84%D8%AA%D8%B1%D8%AE%D9%8A%D8%B5-%D8%A8%D9%85%D8%B2%D8%A7%D9%88%D9%84%D8%A9-%D8%A7%D9%84%D8%B9%D9%85%D9%84-%D8%A7%D9%84%D9%85%D8%B5%D8%B1%D9%81%D9%8A
272[+] https://cbos.gov.sd///ar/content/%D9%84%D8%A7%D8%A6%D8%AD%D8%A9-%D8%AA%D9%86%D8%B8%D9%8A%D9%85-%D8%B9%D9%85%D9%84-%D9%85%D8%A4%D8%B3%D8%B3%D8%A7%D8%AA-%D8%A7%D9%84%D8%A7%D8%B3%D8%AA%D8%AB%D9%85%D8%A7%D8%B1-%D8%A7%D9%84%D9%85%D8%A7%D9%84%D9%8A
273[+] https://cbos.gov.sd///ar/content/%D9%84%D8%A7%D8%A6%D8%AD%D8%A9-%D8%AA%D9%86%D8%B8%D9%8A%D9%85-%D8%B9%D9%85%D9%84-%D9%85%D8%B5%D8%A7%D8%B1%D9%81-%D8%A7%D9%84%D8%AA%D9%86%D9%85%D9%8A%D8%A9-%D9%88%D8%A7%D9%84%D8%A7%D8%B3%D8%AA%D8%AB%D9%85%D8%A7%D8%B1-%D9%84%D8%B3%D9%86%D8%A9-2011%D9%85
274[+] https://cbos.gov.sd///ar/content/%D9%84%D8%A7%D8%A6%D8%AD%D8%A9-%D8%AA%D9%86%D8%B8%D9%8A%D9%85-%D8%B9%D9%85%D9%84-%D8%A7%D9%84%D9%85%D8%A4%D8%B3%D8%B3%D8%A7%D8%AA-%D8%A7%D9%84%D9%85%D8%A7%D9%84%D9%8A%D8%A9-%D9%84%D9%84%D8%A5%D8%AC%D8%A7%D8%B1%D8%A9
275[+] https://cbos.gov.sd///ar/content/%D9%84%D8%A7%D8%A6%D8%AD%D8%A9-%D8%AA%D9%86%D8%B8%D9%8A%D9%85-%D8%B9%D9%85%D9%84-%D9%85%D8%A4%D8%B3%D8%B3%D8%A7%D8%AA-%D8%A7%D9%84%D8%AA%D9%85%D9%88%D9%8A%D9%84-%D8%A7%D9%84%D8%A3%D8%B5%D8%BA%D8%B1
276[+] https://cbos.gov.sd///ar/content/%D9%84%D8%A7%D8%A6%D8%AD%D8%A9-%D8%AA%D9%86%D8%B8%D9%8A%D9%85-%D8%A3%D8%B9%D9%85%D8%A7%D9%84-%D8%A7%D9%84%D9%85%D8%B5%D8%A7%D8%B1%D9%81-%D8%A8%D8%A7%D9%84%D9%85%D9%86%D8%A7%D8%B7%D9%82-%D8%A7%D9%84%D8%AD%D8%B1%D8%A9-%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86%D9%8A%D8%A9-%D9%84%D8%B3%D9%86%D8%A9-2013
277[+] https://cbos.gov.sd///ar/content/%D9%84%D8%A7%D8%A6%D8%AD%D8%A9-%D8%AA%D9%86%D8%B8%D9%8A%D9%85-%D8%A3%D8%B9%D9%85%D8%A7%D9%84-%D9%86%D8%B8%D9%85-%D8%A7%D9%84%D8%AF%D9%81%D8%B9
278[+] https://cbos.gov.sd///ar/dollar-exchange-rates
279[+] https://cbos.gov.sd///ar/exchange-rates
280[+] https://cbos.gov.sd///ar/banks-and-exchange-prices
281[+] https://cbos.gov.sd///ar/daily-quotation
282[+] https://cbos.gov.sd/ar/content/%D8%B3%D9%8A%D8%A7%D8%B3%D8%A7%D8%AA-%D8%A8%D9%86%D9%83-%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86-%D8%A7%D9%84%D9%85%D8%B1%D9%83%D8%B2%D9%8A-%D9%84%D9%84%D8%B9%D8%A7%D9%85-2019
283[+] https://cbos.gov.sd///ar/content/%D8%B3%D9%8A%D8%A7%D8%B3%D8%A7%D8%AA-%D8%A8%D9%86%D9%83-%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86-%D8%A7%D9%84%D9%85%D8%B1%D9%83%D8%B2%D9%8A-%D9%84%D9%84%D8%B9%D8%A7%D9%85-2018
284[+] https://cbos.gov.sd///ar/content/%D8%B3%D9%8A%D8%A7%D8%B3%D8%A7%D8%AA-%D8%A8%D9%86%D9%83-%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86-%D8%A7%D9%84%D9%85%D8%B1%D9%83%D8%B2%D9%8A-%D9%84%D9%84%D8%B9%D8%A7%D9%85-2017
285[+] https://cbos.gov.sd///ar/content/%D8%B3%D9%8A%D8%A7%D8%B3%D8%A7%D8%AA-%D8%A8%D9%86%D9%83-%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86-%D8%A7%D9%84%D9%85%D8%B1%D9%83%D8%B2%D9%8A-%D9%84%D9%84%D8%B9%D8%A7%D9%85-2016
286[+] https://cbos.gov.sd///ar/content/%D8%B3%D9%8A%D8%A7%D8%B3%D8%A7%D8%AA-%D8%A8%D9%86%D9%83-%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86-%D8%A7%D9%84%D9%85%D8%B1%D9%83%D8%B2%D9%8A-%D9%84%D9%84%D8%B9%D8%A7%D9%85-2015
287[+] https://cbos.gov.sd///ar/content/%D8%B3%D9%8A%D8%A7%D8%B3%D8%A7%D8%AA-%D8%A8%D9%86%D9%83-%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86-%D8%A7%D9%84%D9%85%D8%B1%D9%83%D8%B2%D9%8A-%D9%84%D9%84%D8%B9%D8%A7%D9%85-2014
288[+] https://cbos.gov.sd///ar/content/%D8%B3%D9%8A%D8%A7%D8%B3%D8%A7%D8%AA-%D8%A8%D9%86%D9%83-%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86-%D8%A7%D9%84%D9%85%D8%B1%D9%83%D8%B2%D9%89-%D9%84%D9%84%D8%B9%D8%A7%D9%85-2013
289[+] https://cbos.gov.sd///ar/content/%D8%B3%D9%8A%D8%A7%D8%B3%D8%A7%D8%AA-%D8%A8%D9%86%D9%83-%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86-%D8%A7%D9%84%D9%85%D8%B1%D9%83%D8%B2%D9%8A-%D9%84%D9%84%D8%B9%D8%A7%D9%85-2012%D9%85
290[+] https://cbos.gov.sd///ar/content/%D9%85%D9%86%D8%B4%D9%88%D8%B1-%D8%B3%D9%8A%D8%A7%D8%B3%D8%A7%D8%AA-%D8%A8%D9%86%D9%83-%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86-%D8%A7%D9%84%D9%85%D8%B1%D9%83%D8%B2%D9%8A-%D9%84%D9%84%D8%B9%D8%A7%D9%852012-%D8%AA%D8%B9%D8%AF%D9%8A%D9%84-%D8%B1%D9%82%D9%85-12012
291[+] https://cbos.gov.sd///ar/content/%D8%A7%D9%84%D9%85%D8%B2%D9%8A%D8%AF
292[+] https://cbos.gov.sd///ar/content/%D9%85%D9%86%D8%B4%D9%88%D8%B1%D8%A7%D8%AA-%D9%82%D8%B7%D8%A7%D8%B9-%D8%A7%D9%84%D9%85%D8%A4%D8%B3%D8%B3%D8%A7%D8%AA-%D8%A7%D9%84%D9%85%D8%A7%D9%84%D9%8A%D8%A9-%D9%88%D8%A7%D9%84%D9%86%D8%B8%D9%85
293[+] https://cbos.gov.sd///ar/content/%D9%85%D9%83%D8%A7%D9%81%D8%AD%D8%A9-%D8%BA%D8%B3%D9%84-%D8%A7%D9%84%D8%A3%D9%85%D9%88%D8%A7%D9%84-%D9%88%D8%AA%D9%85%D9%88%D9%8A%D9%84-%D8%A7%D9%84%D8%A5%D8%B1%D9%87%D8%A7%D8%A8
294[+] https://cbos.gov.sd///ar/content/%D9%85%D9%86%D8%B4%D9%88%D8%B1%D8%A7%D8%AA-%D8%A7%D8%AF%D8%A7%D8%B1%D8%A9-%D8%A7%D9%84%D8%B3%D9%8A%D8%A7%D8%B3%D8%A7%D8%AA
295[+] https://cbos.gov.sd///ar/content/%D9%85%D9%84%D8%A7%D8%AD%D9%82-%D8%A5%D8%AF%D8%A7%D8%B1%D8%A9-%D8%A7%D9%84%D8%B3%D9%8A%D8%A7%D8%B3%D8%A7%D8%AA-%D9%82%D8%A8%D9%84-%D8%A7%D9%84%D8%B9%D8%A7%D9%85-2013
296[+] https://cbos.gov.sd///ar/publication-type/%D8%A7%D9%84%D9%86%D8%B4%D8%B1%D8%A9-%D8%A7%D9%84%D8%AF%D9%88%D8%B1%D9%8A%D8%A9-%D9%84%D8%A8%D9%86%D9%83-%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86-%D8%A7%D9%84%D9%85%D8%B1%D9%83%D8%B2%D9%8A
297[+] https://cbos.gov.sd///ar
298[+] https://cbos.gov.sd///ar/exchange-rates
299[+] https://cbos.gov.sd///ar/exchange-rates
300[+] https://cbos.gov.sd///ar/exchange-rates
301[+] https://cbos.gov.sd///ar/exchange-rates
302[+] https://cbos.gov.sd///ar/exchange-rates
303[+] https://cbos.gov.sd///ar/exchange-rates
304[+] https://cbos.gov.sd///ar/exchange-rates
305[+] https://cbos.gov.sd///ar/exchange-rates
306[+] https://cbos.gov.sd///ar/exchange-rates
307[+] https://cbos.gov.sd///ar/exchange-rates
308[+] https://cbos.gov.sd///ar/exchange-rates
309[+] https://cbos.gov.sd///ar/exchange-rates
310[+] https://cbos.gov.sd///ar/exchange-rates
311[+] https://cbos.gov.sd///ar/exchange-rates
312[+] https://cbos.gov.sd///ar/exchange-rates
313[+] https://cbos.gov.sd///ar/exchange-rates
314[+] https://cbos.gov.sd///ar/exchange-rates
315[+] https://cbos.gov.sd///ar/exchange-rates
316[+] https://cbos.gov.sd///ar/national-currencies
317[+] https://cbos.gov.sd///ar/content/%D8%A3%D8%B3%D8%B9%D8%A7%D8%B1-%D8%A7%D9%84%D8%B5%D8%B1%D9%81
318[+] https://cbos.gov.sd///ar/content/%D9%82%D9%88%D8%A7%D9%86%D9%8A%D9%86-%D9%88%D9%84%D9%88%D8%A7%D8%A6%D8%AD
319[+] https://cbos.gov.sd///ar/content/%D9%86%D8%B8%D9%85-%D8%A7%D9%84%D8%AF%D9%81%D8%B9
320[+] https://cbos.gov.sd///ar/commercial-bank-locator
321[+] https://cbos.gov.sd/ar/content/%D9%83%D9%84%D9%85%D8%A9-%D8%AA%D8%B1%D8%AD%D9%8A%D8%A8%D9%8A%D8%A9
322[+] https://cbos.gov.sd/ar/content/%D9%83%D9%84%D9%85%D8%A9-%D8%AA%D8%B1%D8%AD%D9%8A%D8%A8%D9%8A%D8%A9
323[+] https://cbos.gov.sd/ar/content/%D8%AA%D9%88%D8%AB%D9%8A%D9%82-%D8%AA%D8%AC%D8%B1%D8%A8%D8%A9-%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86-%D9%81%D9%8A-%D8%A7%D9%84%D9%85%D8%B5%D8%A7%D8%B1%D9%81-%D9%88%D8%A7%D9%84%D9%85%D8%A4%D8%B3%D8%B3%D8%A7%D8%AA-%D8%A7%D9%84%D9%85%D8%A7%D9%84%D9%8A%D8%A9-%D8%A7%D9%84%D8%A5%D8%B3%D9%84%D8%A7%D9%85%D9%8A%D8%A9
324[+] https://cbos.gov.sd/ar/content/%D8%AA%D9%88%D8%AB%D9%8A%D9%82-%D8%AA%D8%AC%D8%B1%D8%A8%D8%A9-%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86-%D9%81%D9%8A-%D8%A7%D9%84%D9%85%D8%B5%D8%A7%D8%B1%D9%81-%D9%88%D8%A7%D9%84%D9%85%D8%A4%D8%B3%D8%B3%D8%A7%D8%AA-%D8%A7%D9%84%D9%85%D8%A7%D9%84%D9%8A%D8%A9-%D8%A7%D9%84%D8%A5%D8%B3%D9%84%D8%A7%D9%85%D9%8A%D8%A9
325[+] https://cbos.gov.sd/ar/national-currencies
326[+] https://cbos.gov.sd/ar/national-currencies
327[+] https://cbos.gov.sd///ar/news
328[+] https://cbos.gov.sd///ar/news/%D8%AA%D9%82%D8%B1%D9%8A%D8%B1-%D8%AD%D9%88%D9%84-%D8%A7%D9%84%D8%B4%D9%85%D9%88%D9%84-%D8%A7%D9%84%D9%85%D8%A7%D9%84%D9%8A-%D9%81%D9%89-%D8%A7%D9%84%D9%85%D9%86%D8%A7%D8%B7%D9%82-%D8%A7%D9%84%D8%B1%D9%8A%D9%81%D9%8A%D8%A9-%D9%81%D9%89-%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86
329[+] https://cbos.gov.sd///ar/news/%D8%AA%D9%82%D8%B1%D9%8A%D8%B1-%D8%AD%D9%88%D9%84-%D8%A7%D9%84%D8%B4%D9%85%D9%88%D9%84-%D8%A7%D9%84%D9%85%D8%A7%D9%84%D9%8A-%D9%81%D9%89-%D8%A7%D9%84%D9%85%D9%86%D8%A7%D8%B7%D9%82-%D8%A7%D9%84%D8%B1%D9%8A%D9%81%D9%8A%D8%A9-%D9%81%D9%89-%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86
330[+] https://cbos.gov.sd///ar/news/%D8%A7%D9%84%D9%85%D8%B1%D9%83%D8%B2%D9%8A-%D9%8A%D8%B7%D8%B1%D8%AD-%D9%81%D8%A6%D8%A7%D8%AA-%D8%B9%D9%85%D9%84%D8%A9-%D9%86%D9%82%D8%AF%D9%8A%D8%A9-%D8%AC%D8%AF%D9%8A%D8%AF%D8%A9-%D9%85%D9%86-%D9%81%D8%A6%D8%A9-%D8%A7%D9%84%D9%85%D8%A7%D8%A6%D8%A9-%D9%88%D8%A7%D9%84%D9%85%D8%A7%D8%A6%D8%AA%D9%8A-%D8%AC%D9%86%D9%8A%D9%87
331[+] https://cbos.gov.sd///ar/news/%D8%A7%D9%84%D9%85%D8%B1%D9%83%D8%B2%D9%8A-%D9%8A%D8%B7%D8%B1%D8%AD-%D9%81%D8%A6%D8%A7%D8%AA-%D8%B9%D9%85%D9%84%D8%A9-%D9%86%D9%82%D8%AF%D9%8A%D8%A9-%D8%AC%D8%AF%D9%8A%D8%AF%D8%A9-%D9%85%D9%86-%D9%81%D8%A6%D8%A9-%D8%A7%D9%84%D9%85%D8%A7%D8%A6%D8%A9-%D9%88%D8%A7%D9%84%D9%85%D8%A7%D8%A6%D8%AA%D9%8A-%D8%AC%D9%86%D9%8A%D9%87
332[+] https://cbos.gov.sd///ar/content/%D8%A7%D9%84%D9%86%D8%B8%D8%A7%D9%85-%D8%A7%D9%84%D8%B9%D8%A7%D9%85-%D9%84%D9%86%D8%B4%D8%B1-%D8%A7%D9%84%D8%A8%D9%8A%D8%A7%D9%86%D8%A7%D8%AA
333[+] https://cbos.gov.sd///ar/content/%D8%A7%D9%84%D9%86%D8%B8%D8%A7%D9%85-%D8%A7%D9%84%D8%B9%D8%A7%D9%85-%D9%84%D9%86%D8%B4%D8%B1-%D8%A7%D9%84%D8%A8%D9%8A%D8%A7%D9%86%D8%A7%D8%AA
334[+] https://cbos.gov.sd///ar/content/%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86-%D9%88%D8%B5%D9%86%D8%AF%D9%88%D9%82-%D8%A7%D9%84%D9%86%D9%82%D8%AF-%D8%A7%D9%84%D8%AF%D9%88%D9%84%D9%8A
335[+] https://cbos.gov.sd///ar/content/%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86-%D9%88%D8%B5%D9%86%D8%AF%D9%88%D9%82-%D8%A7%D9%84%D9%86%D9%82%D8%AF-%D8%A7%D9%84%D8%AF%D9%88%D9%84%D9%8A
336[+] https://cbos.gov.sd///ar/content/%D8%AE%D8%AF%D9%85%D8%A9-%D8%A7%D9%84%D8%B9%D9%85%D9%84%D8%A7%D8%A1-0
337[+] https://cbos.gov.sd///ar/content/%D8%AE%D8%AF%D9%85%D8%A9-%D8%A7%D9%84%D8%B9%D9%85%D9%84%D8%A7%D8%A1-0
338[+] https://cbos.gov.sd///ar/content/%D9%85%D9%83%D8%A7%D9%81%D8%AD%D8%A9-%D8%BA%D8%B3%D9%84-%D8%A7%D9%84%D8%A3%D9%85%D9%88%D8%A7%D9%84-%D9%88%D8%AA%D9%85%D9%88%D9%8A%D9%84-%D8%A7%D9%84%D8%A5%D8%B1%D9%87%D8%A7%D8%A8-0
339[+] https://cbos.gov.sd///ar/content/%D9%85%D9%83%D8%A7%D9%81%D8%AD%D8%A9-%D8%BA%D8%B3%D9%84-%D8%A7%D9%84%D8%A3%D9%85%D9%88%D8%A7%D9%84-%D9%88%D8%AA%D9%85%D9%88%D9%8A%D9%84-%D8%A7%D9%84%D8%A5%D8%B1%D9%87%D8%A7%D8%A8-0
340[+] https://cbos.gov.sd///ar/content/%D9%88%D8%AD%D8%AF%D8%A9-%D8%A7%D9%84%D8%AA%D9%85%D9%88%D9%8A%D9%84-%D8%A7%D9%84%D8%A7%D8%B5%D8%BA%D8%B1
341[+] https://cbos.gov.sd///ar/content/%D9%88%D8%AD%D8%AF%D8%A9-%D8%A7%D9%84%D8%AA%D9%85%D9%88%D9%8A%D9%84-%D8%A7%D9%84%D8%A7%D8%B5%D8%BA%D8%B1
342[+] https://cbos.gov.sd///ar/content/%D9%85%D8%A4%D8%B4%D8%B1%D8%A7%D8%AA-%D8%A7%D9%82%D8%AA%D8%B5%D8%A7%D8%AF%D9%8A%D8%A9-0
343[+] https://cbos.gov.sd///ar/content/%D9%85%D8%A4%D8%B4%D8%B1%D8%A7%D8%AA-%D8%A7%D9%82%D8%AA%D8%B5%D8%A7%D8%AF%D9%8A%D8%A9-0
344[+] https://cbos.gov.sd///ar/periodicals-publications
345[+] https://cbos.gov.sd///ar/national-currencies
346[+] https://cbos.gov.sd///ar/content/%D9%82%D8%A7%D8%B9%D8%AF%D8%A9-%D8%A7%D9%84%D8%A8%D9%8A%D8%A7%D9%86%D8%A7%D8%AA-%D8%A7%D9%84%D8%A7%D8%AD%D8%B5%D8%A7%D8%A6%D9%8A%D8%A9
347[+] https://cbos.gov.sd/ar/event-created/month/2019-11
348[+] https://cbos.gov.sd///ar/branch-locator
349[+] https://cbos.gov.sd///ar/poll
350[+] https://cbos.gov.sd///ar/node/125/results
351[+] https://cbos.gov.sd//mailto:info@cbos.gov.sd
352[+] https://cbos.gov.sd///ar/content/%D8%A7%D9%84%D9%87%D9%8A%D9%83%D9%84-%D8%A7%D9%84%D8%A5%D8%AF%D8%A7%D8%B1%D9%8A-%D9%88%D8%A7%D9%84%D8%AA%D9%86%D8%B8%D9%8A%D9%85%D9%8A
353[+] https://cbos.gov.sd/ar/node/17257/
354[+] https://cbos.gov.sd///ar/content/%D9%85%D8%AD%D8%A7%D9%81%D8%B8%D9%88-%D8%A8%D9%86%D9%83-%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86-%D8%A7%D9%84%D9%85%D8%B1%D9%83%D8%B2%D9%8A
355[+] https://cbos.gov.sd///ar/content/%D9%84%D8%A7%D8%A6%D8%AD%D8%A9-%D8%AA%D9%86%D8%B8%D9%8A%D9%85-%D8%B9%D9%85%D9%84-%D8%A7%D9%84%D9%85%D8%B1%D8%A7%D8%AC%D8%B9%D8%A9-%D8%A7%D9%84%D8%AF%D8%A7%D8%AE%D9%84%D9%8A%D8%A9-%D8%A8%D8%A8%D9%86%D9%83-%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86-%D8%A7%D9%84%D9%85%D8%B1%D9%83%D8%B2%D9%8A
356[+] https://cbos.gov.sd///ar/image-gallery
357[+] https://cbos.gov.sd/sites/default/files/banking_system_balad.pdf
358[+] https://cbos.gov.sd///ar/content/%D8%A7%D9%84%D8%A8%D9%86%D9%88%D9%83-%D8%A7%D9%84%D8%B9%D8%A7%D9%85%D9%84%D8%A9-%D8%A8%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86
359[+] https://cbos.gov.sd///ar/content/%D8%A7%D9%84%D8%AA%D9%88%D8%B2%D9%8A%D8%B9-%D8%A7%D9%84%D8%AC%D8%BA%D8%B1%D8%A7%D9%81%D9%8A-%D9%84%D9%84%D8%AC%D9%87%D8%A7%D8%B2-%D8%A7%D9%84%D9%85%D8%B5%D8%B1%D9%81%D9%8A
360[+] https://cbos.gov.sd///ar/content/%D8%B4%D8%B1%D9%83%D8%A7%D8%AA-%D8%A7%D9%84%D8%B5%D8%B1%D8%A7%D9%81%D8%A9-%D8%A7%D9%84%D8%B9%D8%A7%D9%85%D9%84%D8%A9-%D8%A8%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86
361[+] https://cbos.gov.sd///ar/content/%D8%A7%D9%84%D9%85%D8%A4%D8%B3%D8%B3%D8%A7%D8%AA-%D8%A7%D9%84%D9%85%D8%A7%D9%84%D9%8A%D8%A9
362[+] https://cbos.gov.sd///ar/content/%D9%88%D9%83%D8%A7%D9%84%D8%A9-%D8%B6%D9%85%D8%A7%D9%86-%D8%A7%D9%84%D8%AA%D9%85%D9%88%D9%8A%D9%84-%D8%A7%D9%84%D8%A7%D8%B5%D8%BA%D8%B1-%D8%AA%D9%8A%D8%B3%D9%8A%D8%B1
363[+] https://cbos.gov.sd///ar/sitemap
364[+] https://cbos.gov.sd///ar/content/%D8%AD%D9%82%D9%88%D9%82-%D8%A7%D9%84%D9%86%D8%B4%D8%B1-%D9%88%D8%AD%D8%AF%D9%88%D8%AF-%D8%A7%D9%84%D9%85%D8%B3%D8%A4%D9%88%D9%84%D9%8A%D8%A9
365[+] https://cbos.gov.sd///ar/content/%D8%B9%D8%B7%D8%A7%D8%A1%D8%A7%D8%AA-%D9%88%D9%85%D9%86%D8%A7%D9%82%D8%B5%D8%A7%D8%AA-%D9%88%D9%85%D8%B4%D8%A7%D8%B1%D9%8A%D8%B9-%D8%AA%D8%B7%D9%88%D9%8A%D8%B1
366[+] https://cbos.gov.sd///ar/content/%D9%85%D9%88%D8%A7%D9%82%D8%B9-%D9%85%D9%87%D9%85%D8%A9
367[+] https://cbos.gov.sd///ar/content/%D8%B9%D9%84%D8%A7%D9%82%D8%A7%D8%AA-%D8%AF%D9%88%D9%84%D9%8A%D8%A9
368--------------------------------------------------
369[!] 8 External links Discovered
370[#] https://maxcdn.bootstrapcdn.com/font-awesome/4.5.0/css/font-awesome.min.css
371[#] http://www.linkedin.com
372[#] http://www.twitter.com
373[#] http://www.facebook.com
374[#] http://www.youtube.com
375[#] http://196.1.210.38
376[#] http://www.imf.org/external/country/SDN/index.htm
377[#] http://dot.jo/en
378--------------------------------------------------
379[#] Mapping Subdomain..
380[!] Found 6 Subdomain
381- cbos.gov.sd
382- ns1.cbos.gov.sd
383- poc.cbos.gov.sd
384- mail.cbos.gov.sd
385- statistics.cbos.gov.sd
386- scefgw.cbos.gov.sd
387--------------------------------------------------
388[!] Done At 2019-11-10 04:52:42.323553
389#######################################################################################################################################
390[i] Scanning Site: https://cbos.gov.sd
391
392
393
394B A S I C I N F O
395====================
396
397
398[+] Site Title: CBOS
399[+] IP address: 91.121.115.139
400[+] Web Server: Could Not Detect
401[+] CMS: Drupal
402[+] Cloudflare: Detected
403[+] Robots File: Found
404
405-------------[ contents ]----------------
406#
407# robots.txt
408#
409# This file is to prevent the crawling and indexing of certain parts
410# of your site by web crawlers and spiders run by sites like Yahoo!
411# and Google. By telling these "robots" where not to go on your site,
412# you save bandwidth and server resources.
413#
414# This file will be ignored unless it is at the root of your host:
415# Used: http://example.com/robots.txt
416# Ignored: http://example.com/site/robots.txt
417#
418# For more information about the robots.txt standard, see:
419# http://www.robotstxt.org/robotstxt.html
420
421User-agent: *
422Crawl-delay: 10
423# CSS, JS, Images
424Allow: /misc/*.css$
425Allow: /misc/*.css?
426Allow: /misc/*.js$
427Allow: /misc/*.js?
428Allow: /misc/*.gif
429Allow: /misc/*.jpg
430Allow: /misc/*.jpeg
431Allow: /misc/*.png
432Allow: /modules/*.css$
433Allow: /modules/*.css?
434Allow: /modules/*.js$
435Allow: /modules/*.js?
436Allow: /modules/*.gif
437Allow: /modules/*.jpg
438Allow: /modules/*.jpeg
439Allow: /modules/*.png
440Allow: /profiles/*.css$
441Allow: /profiles/*.css?
442Allow: /profiles/*.js$
443Allow: /profiles/*.js?
444Allow: /profiles/*.gif
445Allow: /profiles/*.jpg
446Allow: /profiles/*.jpeg
447Allow: /profiles/*.png
448Allow: /themes/*.css$
449Allow: /themes/*.css?
450Allow: /themes/*.js$
451Allow: /themes/*.js?
452Allow: /themes/*.gif
453Allow: /themes/*.jpg
454Allow: /themes/*.jpeg
455Allow: /themes/*.png
456# Directories
457Disallow: /includes/
458Disallow: /misc/
459Disallow: /modules/
460Disallow: /profiles/
461Disallow: /scripts/
462Disallow: /themes/
463# Files
464Disallow: /CHANGELOG.txt
465Disallow: /cron.php
466Disallow: /INSTALL.mysql.txt
467Disallow: /INSTALL.pgsql.txt
468Disallow: /INSTALL.sqlite.txt
469Disallow: /install.php
470Disallow: /INSTALL.txt
471Disallow: /LICENSE.txt
472Disallow: /MAINTAINERS.txt
473Disallow: /update.php
474Disallow: /UPGRADE.txt
475Disallow: /xmlrpc.php
476# Paths (clean URLs)
477Disallow: /admin/
478Disallow: /comment/reply/
479Disallow: /filter/tips/
480Disallow: /node/add/
481Disallow: /search/
482Disallow: /user/register/
483Disallow: /user/password/
484Disallow: /user/login/
485Disallow: /user/logout/
486# Paths (no clean URLs)
487Disallow: /?q=admin/
488Disallow: /?q=comment/reply/
489Disallow: /?q=filter/tips/
490Disallow: /?q=node/add/
491Disallow: /?q=search/
492Disallow: /?q=user/password/
493Disallow: /?q=user/register/
494Disallow: /?q=user/login/
495Disallow: /?q=user/logout/
496
497-----------[end of contents]-------------
498
499
500
501W H O I S L O O K U P
502========================
503
504 error check your api query
505
506
507
508G E O I P L O O K U P
509=========================
510
511[i] IP Address: 91.121.115.139
512[i] Country: France
513[i] State:
514[i] City:
515[i] Latitude: 48.8582
516[i] Longitude: 2.3387000000000002
517
518
519
520
521H T T P H E A D E R S
522=======================
523
524
525[i] HTTP/1.1 200 OK
526[i] Date: Sun, 10 Nov 2019 09:52:25 GMT
527[i] Content-Type: text/html; charset=utf-8
528[i] Connection: close
529[i] Vary: Accept-Encoding
530[i] X-Drupal-Cache: HIT
531[i] Etag: "1573375226-0"
532[i] From-Origin: same
533[i] Content-Language: ar
534[i] X-Frame-Options: SAMEORIGIN
535[i] Cache-Control: public, max-age=300
536[i] Last-Modified: Sun, 10 Nov 2019 08:40:26 GMT
537[i] Expires: Sun, 19 Nov 1978 05:00:00 GMT
538[i] Vary: Cookie
539[i] Strict-Transport-Security: max-age=15552000
540[i] X-Frame-Options: SAMEORIGIN
541[i] X-Content-Type-Options: nosniff
542[i] X-XSS-Protection: 1; mode=block
543
544
545
546
547D N S L O O K U P
548===================
549
550cbos.gov.sd. 3599 IN A 91.121.115.139
551cbos.gov.sd. 3599 IN NS ns1.cbos.gov.sd.
552cbos.gov.sd. 3599 IN SOA ns1.cbos.gov.sd. hostmaster.cbos.gov.sd. 32 900 600 86400 3600
553cbos.gov.sd. 3599 IN MX 10 scefgw.cbos.gov.sd.
554cbos.gov.sd. 3599 IN TXT "v=spf1 a mx -all"
555
556
557
558
559S U B N E T C A L C U L A T I O N
560====================================
561
562Address = 91.121.115.139
563Network = 91.121.115.139 / 32
564Netmask = 255.255.255.255
565Broadcast = not needed on Point-to-Point links
566Wildcard Mask = 0.0.0.0
567Hosts Bits = 0
568Max. Hosts = 1 (2^0 - 0)
569Host Range = { 91.121.115.139 - 91.121.115.139 }
570
571
572
573N M A P P O R T S C A N
574============================
575
576Starting Nmap 7.70 ( https://nmap.org ) at 2019-11-10 09:52 UTC
577Nmap scan report for cbos.gov.sd (91.121.115.139)
578Host is up (0.072s latency).
579rDNS record for 91.121.115.139: cbos.dot.jo
580
581PORT STATE SERVICE
58221/tcp filtered ftp
58322/tcp open ssh
58423/tcp filtered telnet
58580/tcp open http
586110/tcp filtered pop3
587143/tcp filtered imap
588443/tcp open https
5893389/tcp filtered ms-wbt-server
590
591Nmap done: 1 IP address (1 host up) scanned in 1.91 seconds
592
593
594
595S U B - D O M A I N F I N D E R
596==================================
597
598
599[i] Total Subdomains Found : 5
600
601[+] Subdomain: ns1.cbos.gov.sd
602[-] IP: 196.1.210.35
603
604[+] Subdomain: poc.cbos.gov.sd
605[-] IP: 196.1.210.41
606
607[+] Subdomain: mail.cbos.gov.sd
608[-] IP: 196.1.210.37
609
610[+] Subdomain: statistics.cbos.gov.sd
611[-] IP: 89.187.101.84
612
613[+] Subdomain: scefgw.cbos.gov.sd
614[-] IP: 196.1.210.45
615#######################################################################################################################################
616Trying "cbos.gov.sd"
617;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 63965
618;; flags: qr rd ra; QUERY: 1, ANSWER: 5, AUTHORITY: 1, ADDITIONAL: 1
619
620;; QUESTION SECTION:
621;cbos.gov.sd. IN ANY
622
623;; ANSWER SECTION:
624cbos.gov.sd. 3600 IN TXT "v=spf1 a mx -all"
625cbos.gov.sd. 3600 IN MX 10 scefgw.cbos.gov.sd.
626cbos.gov.sd. 3600 IN SOA ns1.cbos.gov.sd. hostmaster.cbos.gov.sd. 32 900 600 86400 3600
627cbos.gov.sd. 3600 IN A 91.121.115.139
628cbos.gov.sd. 3600 IN NS ns1.cbos.gov.sd.
629
630;; AUTHORITY SECTION:
631cbos.gov.sd. 3600 IN NS ns1.cbos.gov.sd.
632
633;; ADDITIONAL SECTION:
634ns1.cbos.gov.sd. 14399 IN A 196.1.210.35
635
636Received 193 bytes from 2001:18c0:121:6900:724f:b8ff:fefd:5b6a#53 in 211 ms
637#######################################################################################################################################
638
639; <<>> DiG 9.11.5-P4-5.1+b1-Debian <<>> +trace cbos.gov.sd any
640;; global options: +cmd
641. 80280 IN NS a.root-servers.net.
642. 80280 IN NS h.root-servers.net.
643. 80280 IN NS i.root-servers.net.
644. 80280 IN NS k.root-servers.net.
645. 80280 IN NS b.root-servers.net.
646. 80280 IN NS m.root-servers.net.
647. 80280 IN NS e.root-servers.net.
648. 80280 IN NS f.root-servers.net.
649. 80280 IN NS j.root-servers.net.
650. 80280 IN NS d.root-servers.net.
651. 80280 IN NS l.root-servers.net.
652. 80280 IN NS c.root-servers.net.
653. 80280 IN NS g.root-servers.net.
654. 80280 IN RRSIG NS 8 0 518400 20191123050000 20191110040000 22545 . CkRKfliDvnzGz4ZaKlrC9iTHeXHKHybQ84CVkSMOUdiZ4H91XMxEj3YP HbHTzt6bjRUEz5FUBML2K7pr+PWM5yHypxunJy2IL0lYCmlCdjhPJnE7 cf/2GEQc5WO0UqZfTvrZysVdxN61/qLGygua6tIxFR7gEv+NNUQAvqYZ EvyrBBoJukhF8AWWrdb3tLHudFgAv7yunmRvA4Jpme3KraN2OyO7pXJf Eo4unRVKwkwmaxoUcXzvmFzpqQ0AgqUU2+jgh3S70cpXerXvyqvelRqp b9DVfmqd5uD1HLCRCpccYs7KLOqBkiFeuafm5gyK3ig+I3z++gRFccyT tMtGtQ==
655;; Received 525 bytes from 185.93.180.131#53(185.93.180.131) in 170 ms
656
657sd. 172800 IN NS sd.cctld.authdns.ripe.net.
658sd. 172800 IN NS pch.sis.sd.
659sd. 172800 IN NS ans1.sis.sd.
660sd. 172800 IN NS ans1.canar.sd.
661sd. 172800 IN NS ans2.canar.sd.
662sd. 172800 IN NS ns-sd.afrinic.net.
663sd. 86400 IN NSEC se. NS RRSIG NSEC
664sd. 86400 IN RRSIG NSEC 8 1 86400 20191123050000 20191110040000 22545 . lXgVcp998ydnKA/RMvHw21OCqAYp3L5nDzq8MzwNItBvRjiOa/D9Yv09 USezjKBiWFCc/daYYw36d4mcAFZwhYGdt5lVMwFyKKm+WvbmUh+ejdUx M08cs+1Z+mVT2qewmI6q9SkpE4AZ1W212cBcqvxLEUGS7DAIrnyFjTpN iH0c8Mpc/dUM5V/Z04d4ho49Y/wPIQkn07kZ6mlYBNRyZOKq0Uv3VrDD trKYTQJxV/x36OoCjy42dYAdQUTaq6rTRBTBwKMGBW8U3c/0xULkg4dV 2sBgz8e8SRyjMIKKNL8dWwujMha3GA7sKpfjRXWFKnzEwnLA0oKfTcgJ JRp/KQ==
665;; Received 683 bytes from 198.41.0.4#53(a.root-servers.net) in 166 ms
666
667cbos.gov.sd. 14400 IN NS ns1.cbos.gov.sd.
668;; Received 74 bytes from 2001:67c:e0::109#53(sd.cctld.authdns.ripe.net) in 105 ms
669
670;; Received 52 bytes from 196.1.210.35#53(ns1.cbos.gov.sd) in 259 ms
671#######################################################################################################################################
672[*] Performing General Enumeration of Domain: cbos.gov.sd
673[-] DNSSEC is not configured for cbos.gov.sd
674[*] SOA ns1.cbos.gov.sd 196.1.210.35
675[*] NS ns1.cbos.gov.sd 196.1.210.35
676[-] Recursion enabled on NS Server 196.1.210.35
677[*] Bind Version for 196.1.210.35 Microsoft DNS 6.1.7601 (1DB15CD4)
678[*] MX scefgw.cbos.gov.sd 196.1.210.45
679[*] A cbos.gov.sd 91.121.115.139
680[*] TXT cbos.gov.sd v=spf1 a mx -all
681[*] Enumerating SRV Records
682[-] No SRV Records Found for cbos.gov.sd
683[+] 0 Records Found
684#######################################################################################################################################
685[*] Processing domain cbos.gov.sd
686[*] Using system resolvers ['185.93.180.131', '194.187.251.67', '38.132.106.139', '192.168.0.1', '2001:18c0:121:6900:724f:b8ff:fefd:5b6a']
687[+] Getting nameservers
688196.1.210.35 - ns1.cbos.gov.sd
689[-] Zone transfer failed
690
691[+] TXT records found
692"v=spf1 a mx -all"
693
694[+] MX records found, added to target list
69510 scefgw.cbos.gov.sd.
696
697[*] Scanning cbos.gov.sd for A records
69891.121.115.139 - cbos.gov.sd
699196.1.210.45 - scefgw.cbos.gov.sd
700172.16.1.158 - intranet.cbos.gov.sd
701196.1.210.38 - library.cbos.gov.sd
702196.1.210.37 - mail.cbos.gov.sd
703196.1.210.35 - ns1.cbos.gov.sd
704196.1.210.48 - sa.cbos.gov.sd
70591.121.115.139 - www.cbos.gov.sd
706#######################################################################################################################################
707 AVAILABLE PLUGINS
708 -----------------
709
710 SessionRenegotiationPlugin
711 CertificateInfoPlugin
712 SessionResumptionPlugin
713 CompressionPlugin
714 EarlyDataPlugin
715 HeartbleedPlugin
716 OpenSslCipherSuitesPlugin
717 RobotPlugin
718 HttpHeadersPlugin
719 OpenSslCcsInjectionPlugin
720 FallbackScsvPlugin
721
722
723
724 CHECKING HOST(S) AVAILABILITY
725 -----------------------------
726
727 91.121.115.139:443 => 91.121.115.139
728
729
730
731
732 SCAN RESULTS FOR 91.121.115.139:443 - 91.121.115.139
733 ----------------------------------------------------
734
735 * Downgrade Attacks:
736 TLS_FALLBACK_SCSV: OK - Supported
737
738 * SSLV2 Cipher Suites:
739 Server rejected all cipher suites.
740
741 * OpenSSL CCS Injection:
742 OK - Not vulnerable to OpenSSL CCS injection
743
744 * ROBOT Attack:
745 OK - Not vulnerable, RSA cipher suites not supported
746
747 * TLSV1_3 Cipher Suites:
748 Server rejected all cipher suites.
749
750 * Session Renegotiation:
751 Client-initiated Renegotiation: OK - Rejected
752 Secure Renegotiation: OK - Supported
753
754 * Deflate Compression:
755 OK - Compression disabled
756
757 * TLS 1.2 Session Resumption Support:
758 With Session IDs: OK - Supported (5 successful, 0 failed, 0 errors, 5 total attempts).
759 With TLS Tickets: OK - Supported
760
761 * OpenSSL Heartbleed:
762 OK - Not vulnerable to Heartbleed
763
764 * Certificate Information:
765 Content
766 SHA1 Fingerprint: f2c47f279f24477cfbb10608bd27ed7c9ec0a50f
767 Common Name: cbos.gov.sd
768 Issuer: Let's Encrypt Authority X3
769 Serial Number: 280481954465832033665625411068334298484799
770 Not Before: 2019-08-31 13:30:14
771 Not After: 2019-11-29 13:30:14
772 Signature Algorithm: sha256
773 Public Key Algorithm: RSA
774 Key Size: 2048
775 Exponent: 65537 (0x10001)
776 DNS Subject Alternative Names: ['cbos.gov.sd', 'www.cbos.gov.sd']
777
778 Trust
779 Hostname Validation: FAILED - Certificate does NOT match 91.121.115.139
780 Android CA Store (9.0.0_r9): OK - Certificate is trusted
781 Apple CA Store (iOS 12, macOS 10.14, watchOS 5, and tvOS 12):OK - Certificate is trusted
782 Java CA Store (jdk-12.0.1): OK - Certificate is trusted
783 Mozilla CA Store (2019-03-14): OK - Certificate is trusted
784 Windows CA Store (2019-05-27): OK - Certificate is trusted
785 Symantec 2018 Deprecation: WARNING: Certificate distrusted by Google and Mozilla on September 2018
786 Received Chain: cbos.gov.sd --> Let's Encrypt Authority X3
787 Verified Chain: cbos.gov.sd --> Let's Encrypt Authority X3 --> DST Root CA X3
788 Received Chain Contains Anchor: OK - Anchor certificate not sent
789 Received Chain Order: OK - Order is valid
790 Verified Chain contains SHA1: OK - No SHA1-signed certificate in the verified certificate chain
791
792 Extensions
793 OCSP Must-Staple: NOT SUPPORTED - Extension not found
794 Certificate Transparency: WARNING - Only 2 SCTs included but Google recommends 3 or more
795
796 OCSP Stapling
797 OCSP Response Status: successful
798 Validation w/ Mozilla Store: OK - Response is trusted
799 Responder Id: C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X3
800 Cert Status: good
801 Cert Serial Number: 0338432B7F2132ADD1804E5DEF79D609D03F
802 This Update: Nov 8 14:00:00 2019 GMT
803 Next Update: Nov 15 14:00:00 2019 GMT
804
805 * TLSV1_1 Cipher Suites:
806 Server rejected all cipher suites.
807
808 * TLSV1 Cipher Suites:
809 Server rejected all cipher suites.
810
811 * SSLV3 Cipher Suites:
812 Server rejected all cipher suites.
813
814 * TLSV1_2 Cipher Suites:
815 Forward Secrecy OK - Supported
816 RC4 OK - Not Supported
817
818 Preferred:
819 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 200 OK
820 Accepted:
821 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 256 bits HTTP 200 OK
822 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 200 OK
823 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 256 bits HTTP 200 OK
824 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 200 OK
825 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 200 OK
826
827
828 SCAN COMPLETED IN 12.24 S
829 -------------------------
830#######################################################################################################################################
831Parsero scan report for cbos.gov.sd
832http://cbos.gov.sd/admin/ 302 Moved Temporarily
833http://cbos.gov.sd/comment/reply/ 302 Moved Temporarily
834http://cbos.gov.sd/user/logout/ 302 Moved Temporarily
835http://cbos.gov.sd/?q=user/register/ 302 Moved Temporarily
836http://cbos.gov.sd/includes/ 302 Moved Temporarily
837http://cbos.gov.sd/MAINTAINERS.txt 302 Moved Temporarily
838http://cbos.gov.sd/INSTALL.sqlite.txt 302 Moved Temporarily
839http://cbos.gov.sd/cron.php 302 Moved Temporarily
840http://cbos.gov.sd/user/password/ 302 Moved Temporarily
841http://cbos.gov.sd/?q=comment/reply/ 302 Moved Temporarily
842http://cbos.gov.sd/search/ 302 Moved Temporarily
843http://cbos.gov.sd/profiles/ 302 Moved Temporarily
844http://cbos.gov.sd/?q=user/password/ 302 Moved Temporarily
845http://cbos.gov.sd/node/add/ 302 Moved Temporarily
846http://cbos.gov.sd/scripts/ 302 Moved Temporarily
847http://cbos.gov.sd/?q=node/add/ 302 Moved Temporarily
848http://cbos.gov.sd/CHANGELOG.txt 302 Moved Temporarily
849http://cbos.gov.sd/INSTALL.txt 302 Moved Temporarily
850http://cbos.gov.sd/themes/ 302 Moved Temporarily
851http://cbos.gov.sd/user/register/ 302 Moved Temporarily
852http://cbos.gov.sd/?q=search/ 302 Moved Temporarily
853http://cbos.gov.sd/misc/ 302 Moved Temporarily
854http://cbos.gov.sd/INSTALL.mysql.txt 302 Moved Temporarily
855http://cbos.gov.sd/user/login/ 302 Moved Temporarily
856http://cbos.gov.sd/?q=user/login/ 302 Moved Temporarily
857http://cbos.gov.sd/LICENSE.txt 302 Moved Temporarily
858http://cbos.gov.sd/?q=filter/tips/ 302 Moved Temporarily
859http://cbos.gov.sd/INSTALL.pgsql.txt 302 Moved Temporarily
860http://cbos.gov.sd/update.php 302 Moved Temporarily
861http://cbos.gov.sd/UPGRADE.txt 302 Moved Temporarily
862http://cbos.gov.sd/xmlrpc.php 302 Moved Temporarily
863http://cbos.gov.sd/install.php 302 Moved Temporarily
864http://cbos.gov.sd/?q=admin/ 302 Moved Temporarily
865http://cbos.gov.sd/modules/ 302 Moved Temporarily
866http://cbos.gov.sd/?q=user/logout/ 302 Moved Temporarily
867http://cbos.gov.sd/filter/tips/ 302 Moved Temporarily
868
869[+] 36 links have been analyzed but any them are available...
870#######################################################################################################################################
871Domains still to check: 1
872 Checking if the hostname cbos.gov.sd. given is in fact a domain...
873
874Analyzing domain: cbos.gov.sd.
875 Checking NameServers using system default resolver...
876 IP: 196.1.210.35 (Sudan)
877 HostName: ns1.cbos.gov.sd Type: NS
878 HostName: ns1.cbos.gov.sd Type: PTR
879
880 Checking MailServers using system default resolver...
881 IP: 196.1.210.45 (Sudan)
882 HostName: scefgw.cbos.gov.sd Type: MX
883 HostName: scefgw.cbos.gov.sd Type: PTR
884
885 Checking the zone transfer for each NS... (if this takes more than 10 seconds, just hit CTRL-C and it will continue. Bug in the libs)
886 No zone transfer found on nameserver 196.1.210.35
887
888 Checking SPF record...
889
890 Checking 192 most common hostnames using system default resolver...
891 IP: 91.121.115.139 (France)
892 HostName: www.cbos.gov.sd. Type: A
893 IP: 196.1.210.37 (Sudan)
894 HostName: mail.cbos.gov.sd. Type: A
895 IP: 196.1.210.35 (Sudan)
896 HostName: ns1.cbos.gov.sd Type: NS
897 HostName: ns1.cbos.gov.sd Type: PTR
898 HostName: ns1.cbos.gov.sd. Type: A
899
900 Checking with nmap the reverse DNS hostnames of every <ip>/24 netblock using system default resolver...
901 Checking netblock 91.121.115.0
902 Checking netblock 196.1.210.0
903
904 Searching for cbos.gov.sd. emails in Google
905 publications@cbos.gov.sd.
906 dot.joinfo@cbos.gov.sd.
907 abdellatif.elnasma@cbos.gov.sd
908 info@cbos.gov.sd&
909 abdelbasit.elmustafa@cbos.gov.sd. - Is this real?
910 info@cbos.gov.sd.
911 elhaseen@cbos.gov.sd.
912
913 Checking 4 active hosts using nmap... (nmap -sn -n -v -PP -PM -PS80,25 -PA -PY -PU53,40125 -PE --reason <ip> -oA <output_directory>/nmap/<ip>.sn)
914 Host 91.121.115.139 is up (reset ttl 64)
915 Host 196.1.210.37 is up (reset ttl 64)
916 Host 196.1.210.35 is up (reset ttl 64)
917 Host 196.1.210.45 is up (reset ttl 64)
918
919 Checking ports on every active host using nmap... (nmap -O --reason --webxml --traceroute -sS -sV -sC -Pn -n -v -F <ip> -oA <output_directory>/nmap/<ip>)
920 Scanning ip 91.121.115.139 (www.cbos.gov.sd.):
921 22/tcp open ssh syn-ack ttl 51 OpenSSH 7.2 (FreeBSD 20160310; protocol 2.0)
922 | vulners:
923 | cpe:/a:openbsd:openssh:7.2:
924 | CVE-2016-8858 7.8 https://vulners.com/cve/CVE-2016-8858
925 | CVE-2018-15919 5.0 https://vulners.com/cve/CVE-2018-15919
926 | CVE-2017-15906 5.0 https://vulners.com/cve/CVE-2017-15906
927 |_ CVE-2016-10708 5.0 https://vulners.com/cve/CVE-2016-10708
928 80/tcp open http syn-ack ttl 51 nginx
929 | http-methods:
930 |_ Supported Methods: GET HEAD POST OPTIONS
931 |_http-title: Did not follow redirect to https://cbos.gov.sd/
932 443/tcp open tcpwrapped syn-ack ttl 51
933 |_http-title: 400 The plain HTTP request was sent to HTTPS port
934 | ssl-cert: Subject: commonName=cbos.gov.sd
935 | Subject Alternative Name: DNS:cbos.gov.sd, DNS:www.cbos.gov.sd
936 | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
937 | Public Key type: rsa
938 | Public Key bits: 2048
939 | Signature Algorithm: sha256WithRSAEncryption
940 | Not valid before: 2019-08-31T13:30:14
941 | Not valid after: 2019-11-29T13:30:14
942 | MD5: f596 a0f9 fd82 d21f 0bd8 a398 e057 b481
943 |_SHA-1: f2c4 7f27 9f24 477c fbb1 0608 bd27 ed7c 9ec0 a50f
944 OS Info: Service Info: OS: FreeBSD; CPE: cpe:/o:freebsd:freebsd
945 Scanning ip 196.1.210.37 (mail.cbos.gov.sd.):
946 443/tcp open ssl/http syn-ack ttl 48 Microsoft IIS httpd 10.0
947 |_http-favicon: Unknown favicon MD5: C167F28F226D6684CEA575F68AA5425A
948 | http-methods:
949 |_ Supported Methods: GET HEAD POST OPTIONS
950 |_http-server-header: Microsoft-IIS/10.0
951 | http-title: Outlook
952 |_Requested resource was https://196.1.210.37/owa/auth/logon.aspx?url=https%3a%2f%2f196.1.210.37%2fowa%2f&reason=0
953 | ssl-cert: Subject: commonName=khambx1.cbos.sd/organizationName=CBOS/stateOrProvinceName=Khartoum/countryName=SD
954 | Subject Alternative Name: DNS:mail.cbos.gov.sd, DNS:khambx1.cbos.sd, DNS:mail.cbos.sd, DNS:AutoDiscover.CBOS.SD, DNS:AutoDiscover.CBOS.GOV.SD, DNS:cbos.sd, DNS:CBOS.GOV.SD, DNS:Autodiscover, DNS:Khambx1, DNS:Khambx1.cbos.gov.sd
955 | Issuer: commonName=CBOS-KHADC01-CA
956 | Public Key type: rsa
957 | Public Key bits: 2048
958 | Signature Algorithm: sha1WithRSAEncryption
959 | Not valid before: 2019-03-21T13:23:16
960 | Not valid after: 2021-03-20T13:23:16
961 | MD5: df72 90f9 cad0 b497 2ec4 a783 fe6c 1b99
962 |_SHA-1: 564d d9ae daa8 0a58 33f6 130b c3f3 f777 d4be 866c
963 |_ssl-date: 2019-11-10T10:26:47+00:00; +3m32s from scanner time.
964 | tls-alpn:
965 | h2
966 |_ http/1.1
967 1723/tcp open pptp? syn-ack ttl 49
968 |_pptp-version: ERROR: Script execution failed (use -d to debug)
969 OS Info: Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
970 |_clock-skew: 3m31s
971 Scanning ip 196.1.210.35 (ns1.cbos.gov.sd.):
972 53/tcp open domain syn-ack ttl 112 Microsoft DNS 6.1.7601 (1DB15CD4) (Windows Server 2008 R2 SP1)
973 | dns-nsid:
974 |_ bind.version: Microsoft DNS 6.1.7601 (1DB15CD4)
975 1723/tcp open pptp? syn-ack ttl 49
976 |_pptp-version: ERROR: Script execution failed (use -d to debug)
977 Device type: general purpose|WAP
978 Running (JUST GUESSING): Linux 2.6.X|2.4.X (91%), Microsoft Windows 2008 (87%)
979 OS Info: Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows_server_2008:r2:sp1
980 Scanning ip 196.1.210.45 (scefgw.cbos.gov.sd (PTR)):
981 1723/tcp open pptp? syn-ack ttl 49
982 |_pptp-version: ERROR: Script execution failed (use -d to debug)
983 Device type: general purpose|storage-misc|broadband router|WAP|phone
984 Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (94%), HP embedded (91%), Asus embedded (88%), Google Android 4.X (87%)
985 WebCrawling domain's web servers... up to 50 max links.
986
987 + URL to crawl: http://www.cbos.gov.sd.
988 + Date: 2019-11-10
989
990 + Crawling URL: http://www.cbos.gov.sd.:
991 + Links:
992 + Crawling http://www.cbos.gov.sd.
993 + Crawling http://www.cbos.gov.sd./www.google.com/jsapi (404 Not Found)
994 + Crawling http://www.cbos.gov.sd./ar
995 + Crawling http://www.cbos.gov.sd./ar/careers
996 + Crawling http://www.cbos.gov.sd./ar/forms
997 + Crawling http://www.cbos.gov.sd./ar/form/%D8%A7%D8%AA%D8%B5%D9%84-%D8%A8%D9%86%D8%A7
998 + Crawling http://www.cbos.gov.sd./en
999 + Crawling http://www.cbos.gov.sd./ar/about-cbos/%D9%86%D8%A8%D8%B0%D8%A9-%D8%AA%D8%A7%D8%B1%D9%8A%D8%AE%D9%8A%D8%A9-%D8%B9%D9%86-%D8%A8%D9%86%D9%83-%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86-%D8%A7%D9%84%D9%85%D8%B1%D9%83%D8%B2%D9%8A
1000 + Crawling http://www.cbos.gov.sd./ar/content/%D8%A3%D8%BA%D8%B1%D8%A7%D8%B6-%D8%A7%D9%84%D8%A8%D9%86%D9%83-%D8%A7%D9%84%D8%A3%D8%B3%D8%A7%D8%B3%D9%8A%D8%A9
1001 + Crawling http://www.cbos.gov.sd./ar/content/%D8%B7%D8%A8%D9%8A%D8%B9%D8%A9-%D8%A7%D9%84%D9%86%D8%B8%D8%A7%D9%85-%D8%A7%D9%84%D9%85%D8%B5%D8%B1%D9%81%D9%8A
1002 + Crawling http://www.cbos.gov.sd./ar/content/%D8%A7%D9%84%D8%B1%D8%A4%D9%8A%D8%A9-%D9%88%D8%A7%D9%84%D8%B1%D8%B3%D8%A7%D9%84%D8%A9-%D9%88%D8%A7%D9%84%D9%82%D9%8A%D9%85-%D8%A7%D9%84%D8%AC%D9%88%D9%87%D8%B1%D9%8A%D8%A9
1003 + Crawling http://www.cbos.gov.sd./ar/content/%D8%A7%D9%84%D8%AE%D8%B7%D8%A9-%D8%A7%D9%84%D8%A5%D8%B3%D8%AA%D8%B1%D8%A7%D8%AA%D9%8A%D8%AC%D9%8A%D8%A9-%D8%A7%D9%84%D8%AE%D9%85%D8%B3%D9%8A%D8%A9-%D8%A7%D9%84%D8%AB%D8%A7%D9%86%D9%8A%D8%A9-2012-2016
1004 + Crawling http://www.cbos.gov.sd./ar/members
1005 + Crawling http://www.cbos.gov.sd./ar/board-of-directors
1006 + Crawling http://www.cbos.gov.sd./ar/content/%D9%82%D8%A7%D9%86%D9%88%D9%86-%D8%A8%D9%86%D9%83-%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86-%D9%84%D8%B3%D9%86%D8%A9-2002-%D9%85%D8%B9%D8%AF%D9%84%D8%A7-%D8%AD%D8%AA%D9%89-2012
1007 + Crawling http://www.cbos.gov.sd./ar/content/%D9%82%D8%A7%D9%86%D9%88%D9%86-%D8%AA%D9%86%D8%B8%D9%8A%D9%85-%D8%A7%D9%84%D8%B9%D9%85%D9%84-%D8%A7%D9%84%D9%85%D8%B5%D8%B1%D9%81%D9%8A-%D9%84%D9%84%D8%B9%D8%A7%D9%85-2004
1008 + Crawling http://www.cbos.gov.sd./ar/content/%D9%82%D8%A7%D9%86%D9%88%D9%86-%D9%85%D9%83%D8%A7%D9%81%D8%AD%D8%A9-%D8%BA%D8%B3%D9%84-%D8%A7%D9%84%D8%A3%D9%85%D9%88%D8%A7%D9%84-%D9%88%D8%AA%D9%85%D9%88%D9%8A%D9%84-%D8%A7%D9%84%D8%A5%D8%B1%D9%87%D8%A7%D8%A8
1009 + Crawling http://www.cbos.gov.sd./ar/content/%D9%82%D8%A7%D9%86%D9%88%D9%86-%D8%A7%D9%84%D8%A3%D9%85%D9%88%D8%A7%D9%84-%D8%A7%D9%84%D9%85%D8%B1%D9%87%D9%88%D9%86%D8%A9-%D9%84%D9%84%D9%85%D8%B5%D8%A7%D8%B1%D9%81
1010 + Crawling http://www.cbos.gov.sd./ar/content/%D9%82%D8%A7%D9%86%D9%88%D9%86-%D8%AC%D8%B1%D8%A7%D8%A6%D9%85-%D8%A7%D9%84%D9%85%D8%B9%D9%84%D9%88%D9%85%D8%A7%D8%AA%D9%8A%D8%A9-%D9%84%D8%B3%D9%86%D8%A9-2007
1011 + Crawling http://www.cbos.gov.sd./ar/content/%D9%82%D8%A7%D9%86%D9%88%D9%86-%D8%A7%D9%84%D9%85%D8%B9%D8%A7%D9%85%D9%84%D8%A7%D8%AA-%D8%A7%D9%84%D8%A7%D9%84%D9%83%D8%AA%D8%B1%D9%88%D9%86%D9%8A%D8%A9
1012 + Crawling http://www.cbos.gov.sd./ar/content/%D9%82%D8%A7%D9%86%D9%88%D9%86-%D8%B5%D9%86%D8%AF%D9%88%D9%82-%D8%B6%D9%85%D8%A7%D9%86-%D8%A7%D9%84%D9%88%D8%AF%D8%A7%D8%A6%D8%B9-%D8%A7%D9%84%D9%85%D8%B5%D8%B1%D9%81%D9%8A%D8%A9
1013 + Crawling http://www.cbos.gov.sd./ar/content/%D9%82%D8%A7%D9%86%D9%88%D9%86-%D8%AA%D9%86%D8%B8%D9%8A%D9%85-%D8%A7%D9%84%D8%AA%D8%B9%D8%A7%D9%85%D9%84-%D8%A8%D8%A7%D9%84%D9%86%D9%82%D8%AF
1014 + Crawling http://www.cbos.gov.sd./ar/content/%D9%82%D8%A7%D9%86%D9%88%D9%86-%D8%A7%D9%84%D8%A7%D8%B3%D8%AA%D8%B9%D9%84%D8%A7%D9%85-%D9%88%D8%A7%D9%84%D8%AA%D8%B5%D9%86%D9%8A%D9%81-%D8%A7%D9%84%D8%A7%D8%A6%D8%AA%D9%85%D8%A7%D9%86%D9%8A
1015 + Crawling http://www.cbos.gov.sd./ar/content/%D9%82%D9%88%D8%A7%D8%B9%D8%AF-%D8%B9%D9%85%D9%84-%D9%88%D8%AA%D8%B1%D8%AE%D9%8A%D8%B5-%D9%85%D9%83%D8%A7%D8%AA%D8%A8-%D8%AA%D9%85%D8%AB%D9%8A%D9%84-%D8%A7%D9%84%D9%85%D8%B5%D8%A7%D8%B1%D9%81-%D8%A7%D9%84%D8%A3%D8%AC%D9%86%D8%A8%D9%8A%D8%A9
1016 + Crawling http://www.cbos.gov.sd./ar/content/%D9%84%D8%A7%D8%A6%D8%AD%D8%A9-%D8%AA%D9%86%D8%B8%D9%8A%D9%85-%D8%A7%D9%84%D8%AA%D8%B9%D8%A7%D9%85%D9%84-%D8%A8%D8%A7%D9%84%D9%86%D9%82%D8%AF-%D8%A7%D9%84%D8%A7%D8%AC%D9%86%D8%A8%D9%8A
1017 + Crawling http://www.cbos.gov.sd./ar/content/%D9%84%D8%A7%D8%A6%D8%AD%D8%A9-%D8%AA%D9%86%D8%B8%D9%8A%D9%85-%D8%B4%D8%B1%D9%83%D8%A7%D8%AA-%D8%A7%D9%84%D8%B5%D8%B1%D8%A7%D9%81%D8%A9-%D9%84%D8%B3%D9%86%D8%A9-2011%D9%85
1018 + Crawling http://www.cbos.gov.sd./ar/content/%D9%84%D8%A7%D8%A6%D8%AD%D9%80%D9%80%D8%A9-%D8%B4%D9%80%D8%B1%D9%88%D8%B7-%D8%A7%D9%84%D8%AA%D8%B1%D8%AE%D9%8A%D8%B5-%D8%A8%D9%85%D8%B2%D8%A7%D9%88%D9%84%D8%A9-%D8%A7%D9%84%D8%B9%D9%85%D9%84-%D8%A7%D9%84%D9%85%D8%B5%D8%B1%D9%81%D9%8A
1019 + Crawling http://www.cbos.gov.sd./ar/content/%D9%84%D8%A7%D8%A6%D8%AD%D8%A9-%D8%AA%D9%86%D8%B8%D9%8A%D9%85-%D8%B9%D9%85%D9%84-%D9%85%D8%A4%D8%B3%D8%B3%D8%A7%D8%AA-%D8%A7%D9%84%D8%A7%D8%B3%D8%AA%D8%AB%D9%85%D8%A7%D8%B1-%D8%A7%D9%84%D9%85%D8%A7%D9%84%D9%8A
1020 + Crawling http://www.cbos.gov.sd./ar/content/%D9%84%D8%A7%D8%A6%D8%AD%D8%A9-%D8%AA%D9%86%D8%B8%D9%8A%D9%85-%D8%B9%D9%85%D9%84-%D9%85%D8%B5%D8%A7%D8%B1%D9%81-%D8%A7%D9%84%D8%AA%D9%86%D9%85%D9%8A%D8%A9-%D9%88%D8%A7%D9%84%D8%A7%D8%B3%D8%AA%D8%AB%D9%85%D8%A7%D8%B1-%D9%84%D8%B3%D9%86%D8%A9-2011%D9%85
1021 + Crawling http://www.cbos.gov.sd./ar/content/%D9%84%D8%A7%D8%A6%D8%AD%D8%A9-%D8%AA%D9%86%D8%B8%D9%8A%D9%85-%D8%B9%D9%85%D9%84-%D8%A7%D9%84%D9%85%D8%A4%D8%B3%D8%B3%D8%A7%D8%AA-%D8%A7%D9%84%D9%85%D8%A7%D9%84%D9%8A%D8%A9-%D9%84%D9%84%D8%A5%D8%AC%D8%A7%D8%B1%D8%A9
1022 + Crawling http://www.cbos.gov.sd./ar/content/%D9%84%D8%A7%D8%A6%D8%AD%D8%A9-%D8%AA%D9%86%D8%B8%D9%8A%D9%85-%D8%B9%D9%85%D9%84-%D9%85%D8%A4%D8%B3%D8%B3%D8%A7%D8%AA-%D8%A7%D9%84%D8%AA%D9%85%D9%88%D9%8A%D9%84-%D8%A7%D9%84%D8%A3%D8%B5%D8%BA%D8%B1
1023 + Crawling http://www.cbos.gov.sd./ar/content/%D9%84%D8%A7%D8%A6%D8%AD%D8%A9-%D8%AA%D9%86%D8%B8%D9%8A%D9%85-%D8%A3%D8%B9%D9%85%D8%A7%D9%84-%D8%A7%D9%84%D9%85%D8%B5%D8%A7%D8%B1%D9%81-%D8%A8%D8%A7%D9%84%D9%85%D9%86%D8%A7%D8%B7%D9%82-%D8%A7%D9%84%D8%AD%D8%B1%D8%A9-%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86%D9%8A%D8%A9-%D9%84%D8%B3%D9%86%D8%A9-2013
1024 + Crawling http://www.cbos.gov.sd./ar/content/%D9%84%D8%A7%D8%A6%D8%AD%D8%A9-%D8%AA%D9%86%D8%B8%D9%8A%D9%85-%D8%A3%D8%B9%D9%85%D8%A7%D9%84-%D9%86%D8%B8%D9%85-%D8%A7%D9%84%D8%AF%D9%81%D8%B9
1025 + Crawling http://www.cbos.gov.sd./ar/dollar-exchange-rates
1026 + Crawling http://www.cbos.gov.sd./ar/exchange-rates
1027 + Crawling http://www.cbos.gov.sd./ar/banks-and-exchange-prices
1028 + Crawling http://www.cbos.gov.sd./ar/daily-quotation
1029 + Crawling http://www.cbos.gov.sd./ar/content/%D8%B3%D9%8A%D8%A7%D8%B3%D8%A7%D8%AA-%D8%A8%D9%86%D9%83-%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86-%D8%A7%D9%84%D9%85%D8%B1%D9%83%D8%B2%D9%8A-%D9%84%D9%84%D8%B9%D8%A7%D9%85-2018
1030 + Crawling http://www.cbos.gov.sd./ar/content/%D8%B3%D9%8A%D8%A7%D8%B3%D8%A7%D8%AA-%D8%A8%D9%86%D9%83-%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86-%D8%A7%D9%84%D9%85%D8%B1%D9%83%D8%B2%D9%8A-%D9%84%D9%84%D8%B9%D8%A7%D9%85-2017
1031 + Crawling http://www.cbos.gov.sd./ar/content/%D8%B3%D9%8A%D8%A7%D8%B3%D8%A7%D8%AA-%D8%A8%D9%86%D9%83-%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86-%D8%A7%D9%84%D9%85%D8%B1%D9%83%D8%B2%D9%8A-%D9%84%D9%84%D8%B9%D8%A7%D9%85-2016
1032 + Crawling http://www.cbos.gov.sd./ar/content/%D8%B3%D9%8A%D8%A7%D8%B3%D8%A7%D8%AA-%D8%A8%D9%86%D9%83-%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86-%D8%A7%D9%84%D9%85%D8%B1%D9%83%D8%B2%D9%8A-%D9%84%D9%84%D8%B9%D8%A7%D9%85-2015
1033 + Crawling http://www.cbos.gov.sd./ar/content/%D8%B3%D9%8A%D8%A7%D8%B3%D8%A7%D8%AA-%D8%A8%D9%86%D9%83-%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86-%D8%A7%D9%84%D9%85%D8%B1%D9%83%D8%B2%D9%8A-%D9%84%D9%84%D8%B9%D8%A7%D9%85-2014
1034 + Crawling http://www.cbos.gov.sd./ar/content/%D8%B3%D9%8A%D8%A7%D8%B3%D8%A7%D8%AA-%D8%A8%D9%86%D9%83-%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86-%D8%A7%D9%84%D9%85%D8%B1%D9%83%D8%B2%D9%89-%D9%84%D9%84%D8%B9%D8%A7%D9%85-2013
1035 + Crawling http://www.cbos.gov.sd./ar/content/%D8%B3%D9%8A%D8%A7%D8%B3%D8%A7%D8%AA-%D8%A8%D9%86%D9%83-%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86-%D8%A7%D9%84%D9%85%D8%B1%D9%83%D8%B2%D9%8A-%D9%84%D9%84%D8%B9%D8%A7%D9%85-2012%D9%85
1036 + Crawling http://www.cbos.gov.sd./ar/content/%D9%85%D9%86%D8%B4%D9%88%D8%B1-%D8%B3%D9%8A%D8%A7%D8%B3%D8%A7%D8%AA-%D8%A8%D9%86%D9%83-%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86-%D8%A7%D9%84%D9%85%D8%B1%D9%83%D8%B2%D9%8A-%D9%84%D9%84%D8%B9%D8%A7%D9%852012-%D8%AA%D8%B9%D8%AF%D9%8A%D9%84-%D8%B1%D9%82%D9%85-12012
1037 + Crawling http://www.cbos.gov.sd./ar/content/%D8%A7%D9%84%D9%85%D8%B2%D9%8A%D8%AF
1038 + Crawling http://www.cbos.gov.sd./ar/content/%D9%85%D9%86%D8%B4%D9%88%D8%B1%D8%A7%D8%AA-%D9%82%D8%B7%D8%A7%D8%B9-%D8%A7%D9%84%D9%85%D8%A4%D8%B3%D8%B3%D8%A7%D8%AA-%D8%A7%D9%84%D9%85%D8%A7%D9%84%D9%8A%D8%A9-%D9%88%D8%A7%D9%84%D9%86%D8%B8%D9%85
1039 + Crawling http://www.cbos.gov.sd./ar/content/%D9%85%D9%83%D8%A7%D9%81%D8%AD%D8%A9-%D8%BA%D8%B3%D9%84-%D8%A7%D9%84%D8%A3%D9%85%D9%88%D8%A7%D9%84-%D9%88%D8%AA%D9%85%D9%88%D9%8A%D9%84-%D8%A7%D9%84%D8%A5%D8%B1%D9%87%D8%A7%D8%A8
1040 + Crawling http://www.cbos.gov.sd./ar/content/%D9%85%D9%86%D8%B4%D9%88%D8%B1%D8%A7%D8%AA-%D8%A7%D8%AF%D8%A7%D8%B1%D8%A9-%D8%A7%D9%84%D8%B3%D9%8A%D8%A7%D8%B3%D8%A7%D8%AA
1041 + Crawling http://www.cbos.gov.sd./ar/content/%D9%85%D9%84%D8%A7%D8%AD%D9%82-%D8%A5%D8%AF%D8%A7%D8%B1%D8%A9-%D8%A7%D9%84%D8%B3%D9%8A%D8%A7%D8%B3%D8%A7%D8%AA-%D9%82%D8%A8%D9%84-%D8%A7%D9%84%D8%B9%D8%A7%D9%85-2013
1042 + Searching for directories...
1043 - Found: http://www.cbos.gov.sd./www.google.com/
1044 - Found: http://www.cbos.gov.sd./ar/
1045 - Found: http://www.cbos.gov.sd./ar/form/
1046 - Found: http://www.cbos.gov.sd./ar/about-cbos/
1047 - Found: http://www.cbos.gov.sd./ar/content/
1048 - Found: http://www.cbos.gov.sd./cdn.jsdelivr.net/
1049 - Found: http://www.cbos.gov.sd./cdn.jsdelivr.net/bootstrap/
1050 - Found: http://www.cbos.gov.sd./cdn.jsdelivr.net/bootstrap/3.3.5/
1051 - Found: http://www.cbos.gov.sd./cdn.jsdelivr.net/bootstrap/3.3.5/css/
1052 - Found: http://www.cbos.gov.sd./cdn.jsdelivr.net/bootstrap/3.3.5/js/
1053 - Found: http://www.cbos.gov.sd./s7.addthis.com/
1054 - Found: http://www.cbos.gov.sd./s7.addthis.com/js/
1055 - Found: http://www.cbos.gov.sd./s7.addthis.com/js/300/
1056 - Found: http://www.cbos.gov.sd./sites/
1057 - Found: http://www.cbos.gov.sd./sites/all/
1058 - Found: http://www.cbos.gov.sd./sites/all/themes/
1059 - Found: http://www.cbos.gov.sd./sites/all/themes/cbos/
1060 - Found: http://www.cbos.gov.sd./sites/all/themes/cbos/images/
1061 - Found: http://www.cbos.gov.sd./sites/default/
1062 - Found: http://www.cbos.gov.sd./sites/default/files/
1063 + Searching open folders...
1064 - http://www.cbos.gov.sd./www.google.com/ (404 Not Found)
1065 - http://www.cbos.gov.sd./ar/ (No Open Folder)
1066 - http://www.cbos.gov.sd./ar/form/ (404 Not Found)
1067 - http://www.cbos.gov.sd./ar/about-cbos/ (No Open Folder)
1068 - http://www.cbos.gov.sd./ar/content/ (404 Not Found)
1069 - http://www.cbos.gov.sd./cdn.jsdelivr.net/ (404 Not Found)
1070 - http://www.cbos.gov.sd./cdn.jsdelivr.net/bootstrap/ (404 Not Found)
1071 - http://www.cbos.gov.sd./cdn.jsdelivr.net/bootstrap/3.3.5/ (404 Not Found)
1072 - http://www.cbos.gov.sd./cdn.jsdelivr.net/bootstrap/3.3.5/css/ (404 Not Found)
1073 - http://www.cbos.gov.sd./cdn.jsdelivr.net/bootstrap/3.3.5/js/ (404 Not Found)
1074 - http://www.cbos.gov.sd./s7.addthis.com/ (404 Not Found)
1075 - http://www.cbos.gov.sd./s7.addthis.com/js/ (404 Not Found)
1076 - http://www.cbos.gov.sd./s7.addthis.com/js/300/ (404 Not Found)
1077 - http://www.cbos.gov.sd./sites/ (403 Forbidden)
1078 - http://www.cbos.gov.sd./sites/all/ (No Open Folder)
1079 - http://www.cbos.gov.sd./sites/all/themes/ (403 Forbidden)
1080 - http://www.cbos.gov.sd./sites/all/themes/cbos/ (403 Forbidden)
1081 - http://www.cbos.gov.sd./sites/all/themes/cbos/images/ (403 Forbidden)
1082 - http://www.cbos.gov.sd./sites/default/ (403 Forbidden)
1083 - http://www.cbos.gov.sd./sites/default/files/ (403 Forbidden)
1084 + Crawl finished successfully.
1085----------------------------------------------------------------------
1086Summary of http://http://www.cbos.gov.sd.
1087----------------------------------------------------------------------
1088+ Links crawled:
1089 - http://www.cbos.gov.sd.
1090 - http://www.cbos.gov.sd./ar
1091 - http://www.cbos.gov.sd./ar/about-cbos/%D9%86%D8%A8%D8%B0%D8%A9-%D8%AA%D8%A7%D8%B1%D9%8A%D8%AE%D9%8A%D8%A9-%D8%B9%D9%86-%D8%A8%D9%86%D9%83-%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86-%D8%A7%D9%84%D9%85%D8%B1%D9%83%D8%B2%D9%8A
1092 - http://www.cbos.gov.sd./ar/banks-and-exchange-prices
1093 - http://www.cbos.gov.sd./ar/board-of-directors
1094 - http://www.cbos.gov.sd./ar/careers
1095 - http://www.cbos.gov.sd./ar/content/%D8%A3%D8%BA%D8%B1%D8%A7%D8%B6-%D8%A7%D9%84%D8%A8%D9%86%D9%83-%D8%A7%D9%84%D8%A3%D8%B3%D8%A7%D8%B3%D9%8A%D8%A9
1096 - http://www.cbos.gov.sd./ar/content/%D8%A7%D9%84%D8%AE%D8%B7%D8%A9-%D8%A7%D9%84%D8%A5%D8%B3%D8%AA%D8%B1%D8%A7%D8%AA%D9%8A%D8%AC%D9%8A%D8%A9-%D8%A7%D9%84%D8%AE%D9%85%D8%B3%D9%8A%D8%A9-%D8%A7%D9%84%D8%AB%D8%A7%D9%86%D9%8A%D8%A9-2012-2016
1097 - http://www.cbos.gov.sd./ar/content/%D8%A7%D9%84%D8%B1%D8%A4%D9%8A%D8%A9-%D9%88%D8%A7%D9%84%D8%B1%D8%B3%D8%A7%D9%84%D8%A9-%D9%88%D8%A7%D9%84%D9%82%D9%8A%D9%85-%D8%A7%D9%84%D8%AC%D9%88%D9%87%D8%B1%D9%8A%D8%A9
1098 - http://www.cbos.gov.sd./ar/content/%D8%A7%D9%84%D9%85%D8%B2%D9%8A%D8%AF
1099 - http://www.cbos.gov.sd./ar/content/%D8%B3%D9%8A%D8%A7%D8%B3%D8%A7%D8%AA-%D8%A8%D9%86%D9%83-%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86-%D8%A7%D9%84%D9%85%D8%B1%D9%83%D8%B2%D9%89-%D9%84%D9%84%D8%B9%D8%A7%D9%85-2013
1100 - http://www.cbos.gov.sd./ar/content/%D8%B3%D9%8A%D8%A7%D8%B3%D8%A7%D8%AA-%D8%A8%D9%86%D9%83-%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86-%D8%A7%D9%84%D9%85%D8%B1%D9%83%D8%B2%D9%8A-%D9%84%D9%84%D8%B9%D8%A7%D9%85-2012%D9%85
1101 - http://www.cbos.gov.sd./ar/content/%D8%B3%D9%8A%D8%A7%D8%B3%D8%A7%D8%AA-%D8%A8%D9%86%D9%83-%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86-%D8%A7%D9%84%D9%85%D8%B1%D9%83%D8%B2%D9%8A-%D9%84%D9%84%D8%B9%D8%A7%D9%85-2014
1102 - http://www.cbos.gov.sd./ar/content/%D8%B3%D9%8A%D8%A7%D8%B3%D8%A7%D8%AA-%D8%A8%D9%86%D9%83-%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86-%D8%A7%D9%84%D9%85%D8%B1%D9%83%D8%B2%D9%8A-%D9%84%D9%84%D8%B9%D8%A7%D9%85-2015
1103 - http://www.cbos.gov.sd./ar/content/%D8%B3%D9%8A%D8%A7%D8%B3%D8%A7%D8%AA-%D8%A8%D9%86%D9%83-%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86-%D8%A7%D9%84%D9%85%D8%B1%D9%83%D8%B2%D9%8A-%D9%84%D9%84%D8%B9%D8%A7%D9%85-2016
1104 - http://www.cbos.gov.sd./ar/content/%D8%B3%D9%8A%D8%A7%D8%B3%D8%A7%D8%AA-%D8%A8%D9%86%D9%83-%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86-%D8%A7%D9%84%D9%85%D8%B1%D9%83%D8%B2%D9%8A-%D9%84%D9%84%D8%B9%D8%A7%D9%85-2017
1105 - http://www.cbos.gov.sd./ar/content/%D8%B3%D9%8A%D8%A7%D8%B3%D8%A7%D8%AA-%D8%A8%D9%86%D9%83-%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86-%D8%A7%D9%84%D9%85%D8%B1%D9%83%D8%B2%D9%8A-%D9%84%D9%84%D8%B9%D8%A7%D9%85-2018
1106 - http://www.cbos.gov.sd./ar/content/%D8%B7%D8%A8%D9%8A%D8%B9%D8%A9-%D8%A7%D9%84%D9%86%D8%B8%D8%A7%D9%85-%D8%A7%D9%84%D9%85%D8%B5%D8%B1%D9%81%D9%8A
1107 - http://www.cbos.gov.sd./ar/content/%D9%82%D8%A7%D9%86%D9%88%D9%86-%D8%A7%D9%84%D8%A3%D9%85%D9%88%D8%A7%D9%84-%D8%A7%D9%84%D9%85%D8%B1%D9%87%D9%88%D9%86%D8%A9-%D9%84%D9%84%D9%85%D8%B5%D8%A7%D8%B1%D9%81
1108 - http://www.cbos.gov.sd./ar/content/%D9%82%D8%A7%D9%86%D9%88%D9%86-%D8%A7%D9%84%D8%A7%D8%B3%D8%AA%D8%B9%D9%84%D8%A7%D9%85-%D9%88%D8%A7%D9%84%D8%AA%D8%B5%D9%86%D9%8A%D9%81-%D8%A7%D9%84%D8%A7%D8%A6%D8%AA%D9%85%D8%A7%D9%86%D9%8A
1109 - http://www.cbos.gov.sd./ar/content/%D9%82%D8%A7%D9%86%D9%88%D9%86-%D8%A7%D9%84%D9%85%D8%B9%D8%A7%D9%85%D9%84%D8%A7%D8%AA-%D8%A7%D9%84%D8%A7%D9%84%D9%83%D8%AA%D8%B1%D9%88%D9%86%D9%8A%D8%A9
1110 - http://www.cbos.gov.sd./ar/content/%D9%82%D8%A7%D9%86%D9%88%D9%86-%D8%A8%D9%86%D9%83-%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86-%D9%84%D8%B3%D9%86%D8%A9-2002-%D9%85%D8%B9%D8%AF%D9%84%D8%A7-%D8%AD%D8%AA%D9%89-2012
1111 - http://www.cbos.gov.sd./ar/content/%D9%82%D8%A7%D9%86%D9%88%D9%86-%D8%AA%D9%86%D8%B8%D9%8A%D9%85-%D8%A7%D9%84%D8%AA%D8%B9%D8%A7%D9%85%D9%84-%D8%A8%D8%A7%D9%84%D9%86%D9%82%D8%AF
1112 - http://www.cbos.gov.sd./ar/content/%D9%82%D8%A7%D9%86%D9%88%D9%86-%D8%AA%D9%86%D8%B8%D9%8A%D9%85-%D8%A7%D9%84%D8%B9%D9%85%D9%84-%D8%A7%D9%84%D9%85%D8%B5%D8%B1%D9%81%D9%8A-%D9%84%D9%84%D8%B9%D8%A7%D9%85-2004
1113 - http://www.cbos.gov.sd./ar/content/%D9%82%D8%A7%D9%86%D9%88%D9%86-%D8%AC%D8%B1%D8%A7%D8%A6%D9%85-%D8%A7%D9%84%D9%85%D8%B9%D9%84%D9%88%D9%85%D8%A7%D8%AA%D9%8A%D8%A9-%D9%84%D8%B3%D9%86%D8%A9-2007
1114 - http://www.cbos.gov.sd./ar/content/%D9%82%D8%A7%D9%86%D9%88%D9%86-%D8%B5%D9%86%D8%AF%D9%88%D9%82-%D8%B6%D9%85%D8%A7%D9%86-%D8%A7%D9%84%D9%88%D8%AF%D8%A7%D8%A6%D8%B9-%D8%A7%D9%84%D9%85%D8%B5%D8%B1%D9%81%D9%8A%D8%A9
1115 - http://www.cbos.gov.sd./ar/content/%D9%82%D8%A7%D9%86%D9%88%D9%86-%D9%85%D9%83%D8%A7%D9%81%D8%AD%D8%A9-%D8%BA%D8%B3%D9%84-%D8%A7%D9%84%D8%A3%D9%85%D9%88%D8%A7%D9%84-%D9%88%D8%AA%D9%85%D9%88%D9%8A%D9%84-%D8%A7%D9%84%D8%A5%D8%B1%D9%87%D8%A7%D8%A8
1116 - http://www.cbos.gov.sd./ar/content/%D9%82%D9%88%D8%A7%D8%B9%D8%AF-%D8%B9%D9%85%D9%84-%D9%88%D8%AA%D8%B1%D8%AE%D9%8A%D8%B5-%D9%85%D9%83%D8%A7%D8%AA%D8%A8-%D8%AA%D9%85%D8%AB%D9%8A%D9%84-%D8%A7%D9%84%D9%85%D8%B5%D8%A7%D8%B1%D9%81-%D8%A7%D9%84%D8%A3%D8%AC%D9%86%D8%A8%D9%8A%D8%A9
1117 - http://www.cbos.gov.sd./ar/content/%D9%84%D8%A7%D8%A6%D8%AD%D8%A9-%D8%AA%D9%86%D8%B8%D9%8A%D9%85-%D8%A3%D8%B9%D9%85%D8%A7%D9%84-%D8%A7%D9%84%D9%85%D8%B5%D8%A7%D8%B1%D9%81-%D8%A8%D8%A7%D9%84%D9%85%D9%86%D8%A7%D8%B7%D9%82-%D8%A7%D9%84%D8%AD%D8%B1%D8%A9-%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86%D9%8A%D8%A9-%D9%84%D8%B3%D9%86%D8%A9-2013
1118 - http://www.cbos.gov.sd./ar/content/%D9%84%D8%A7%D8%A6%D8%AD%D8%A9-%D8%AA%D9%86%D8%B8%D9%8A%D9%85-%D8%A3%D8%B9%D9%85%D8%A7%D9%84-%D9%86%D8%B8%D9%85-%D8%A7%D9%84%D8%AF%D9%81%D8%B9
1119 - http://www.cbos.gov.sd./ar/content/%D9%84%D8%A7%D8%A6%D8%AD%D8%A9-%D8%AA%D9%86%D8%B8%D9%8A%D9%85-%D8%A7%D9%84%D8%AA%D8%B9%D8%A7%D9%85%D9%84-%D8%A8%D8%A7%D9%84%D9%86%D9%82%D8%AF-%D8%A7%D9%84%D8%A7%D8%AC%D9%86%D8%A8%D9%8A
1120 - http://www.cbos.gov.sd./ar/content/%D9%84%D8%A7%D8%A6%D8%AD%D8%A9-%D8%AA%D9%86%D8%B8%D9%8A%D9%85-%D8%B4%D8%B1%D9%83%D8%A7%D8%AA-%D8%A7%D9%84%D8%B5%D8%B1%D8%A7%D9%81%D8%A9-%D9%84%D8%B3%D9%86%D8%A9-2011%D9%85
1121 - http://www.cbos.gov.sd./ar/content/%D9%84%D8%A7%D8%A6%D8%AD%D8%A9-%D8%AA%D9%86%D8%B8%D9%8A%D9%85-%D8%B9%D9%85%D9%84-%D8%A7%D9%84%D9%85%D8%A4%D8%B3%D8%B3%D8%A7%D8%AA-%D8%A7%D9%84%D9%85%D8%A7%D9%84%D9%8A%D8%A9-%D9%84%D9%84%D8%A5%D8%AC%D8%A7%D8%B1%D8%A9
1122 - http://www.cbos.gov.sd./ar/content/%D9%84%D8%A7%D8%A6%D8%AD%D8%A9-%D8%AA%D9%86%D8%B8%D9%8A%D9%85-%D8%B9%D9%85%D9%84-%D9%85%D8%A4%D8%B3%D8%B3%D8%A7%D8%AA-%D8%A7%D9%84%D8%A7%D8%B3%D8%AA%D8%AB%D9%85%D8%A7%D8%B1-%D8%A7%D9%84%D9%85%D8%A7%D9%84%D9%8A
1123 - http://www.cbos.gov.sd./ar/content/%D9%84%D8%A7%D8%A6%D8%AD%D8%A9-%D8%AA%D9%86%D8%B8%D9%8A%D9%85-%D8%B9%D9%85%D9%84-%D9%85%D8%A4%D8%B3%D8%B3%D8%A7%D8%AA-%D8%A7%D9%84%D8%AA%D9%85%D9%88%D9%8A%D9%84-%D8%A7%D9%84%D8%A3%D8%B5%D8%BA%D8%B1
1124 - http://www.cbos.gov.sd./ar/content/%D9%84%D8%A7%D8%A6%D8%AD%D8%A9-%D8%AA%D9%86%D8%B8%D9%8A%D9%85-%D8%B9%D9%85%D9%84-%D9%85%D8%B5%D8%A7%D8%B1%D9%81-%D8%A7%D9%84%D8%AA%D9%86%D9%85%D9%8A%D8%A9-%D9%88%D8%A7%D9%84%D8%A7%D8%B3%D8%AA%D8%AB%D9%85%D8%A7%D8%B1-%D9%84%D8%B3%D9%86%D8%A9-2011%D9%85
1125 - http://www.cbos.gov.sd./ar/content/%D9%84%D8%A7%D8%A6%D8%AD%D9%80%D9%80%D8%A9-%D8%B4%D9%80%D8%B1%D9%88%D8%B7-%D8%A7%D9%84%D8%AA%D8%B1%D8%AE%D9%8A%D8%B5-%D8%A8%D9%85%D8%B2%D8%A7%D9%88%D9%84%D8%A9-%D8%A7%D9%84%D8%B9%D9%85%D9%84-%D8%A7%D9%84%D9%85%D8%B5%D8%B1%D9%81%D9%8A
1126 - http://www.cbos.gov.sd./ar/content/%D9%85%D9%83%D8%A7%D9%81%D8%AD%D8%A9-%D8%BA%D8%B3%D9%84-%D8%A7%D9%84%D8%A3%D9%85%D9%88%D8%A7%D9%84-%D9%88%D8%AA%D9%85%D9%88%D9%8A%D9%84-%D8%A7%D9%84%D8%A5%D8%B1%D9%87%D8%A7%D8%A8
1127 - http://www.cbos.gov.sd./ar/content/%D9%85%D9%84%D8%A7%D8%AD%D9%82-%D8%A5%D8%AF%D8%A7%D8%B1%D8%A9-%D8%A7%D9%84%D8%B3%D9%8A%D8%A7%D8%B3%D8%A7%D8%AA-%D9%82%D8%A8%D9%84-%D8%A7%D9%84%D8%B9%D8%A7%D9%85-2013
1128 - http://www.cbos.gov.sd./ar/content/%D9%85%D9%86%D8%B4%D9%88%D8%B1%D8%A7%D8%AA-%D8%A7%D8%AF%D8%A7%D8%B1%D8%A9-%D8%A7%D9%84%D8%B3%D9%8A%D8%A7%D8%B3%D8%A7%D8%AA
1129 - http://www.cbos.gov.sd./ar/content/%D9%85%D9%86%D8%B4%D9%88%D8%B1%D8%A7%D8%AA-%D9%82%D8%B7%D8%A7%D8%B9-%D8%A7%D9%84%D9%85%D8%A4%D8%B3%D8%B3%D8%A7%D8%AA-%D8%A7%D9%84%D9%85%D8%A7%D9%84%D9%8A%D8%A9-%D9%88%D8%A7%D9%84%D9%86%D8%B8%D9%85
1130 - http://www.cbos.gov.sd./ar/content/%D9%85%D9%86%D8%B4%D9%88%D8%B1-%D8%B3%D9%8A%D8%A7%D8%B3%D8%A7%D8%AA-%D8%A8%D9%86%D9%83-%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86-%D8%A7%D9%84%D9%85%D8%B1%D9%83%D8%B2%D9%8A-%D9%84%D9%84%D8%B9%D8%A7%D9%852012-%D8%AA%D8%B9%D8%AF%D9%8A%D9%84-%D8%B1%D9%82%D9%85-12012
1131 - http://www.cbos.gov.sd./ar/daily-quotation
1132 - http://www.cbos.gov.sd./ar/dollar-exchange-rates
1133 - http://www.cbos.gov.sd./ar/exchange-rates
1134 - http://www.cbos.gov.sd./ar/form/%D8%A7%D8%AA%D8%B5%D9%84-%D8%A8%D9%86%D8%A7
1135 - http://www.cbos.gov.sd./ar/forms
1136 - http://www.cbos.gov.sd./ar/members
1137 - http://www.cbos.gov.sd./en
1138 - http://www.cbos.gov.sd./www.google.com/jsapi (404 Not Found)
1139 Total links crawled: 50
1140
1141+ Links to files found:
1142 - http://www.cbos.gov.sd./cdn.jsdelivr.net/bootstrap/3.3.5/css/bootstrap.min.css
1143 - http://www.cbos.gov.sd./cdn.jsdelivr.net/bootstrap/3.3.5/js/bootstrap.min.js
1144 - http://www.cbos.gov.sd./s7.addthis.com/js/300/addthis_widget.js
1145 - http://www.cbos.gov.sd./sites/all/themes/cbos/images/Logo-inner.png
1146 - http://www.cbos.gov.sd./sites/default/files/Business_of_Financial_investment_institution_Regulation_2004_0.pdf
1147 - http://www.cbos.gov.sd./sites/default/files/Business_rules_and_license_for_foreign_banks_representatives_2003_f.pdf
1148 - http://www.cbos.gov.sd./sites/default/files/Dealing_in_Foreign_Currency_Organization_Act_1999.pdf
1149 - http://www.cbos.gov.sd./sites/default/files/Debosit_Guarantee_Fund_Act_1996_0.pdf
1150 - http://www.cbos.gov.sd./sites/default/files/Informatics_offences_Act_2007_1.pdf
1151 - http://www.cbos.gov.sd./sites/default/files/Sale_of_Property_Mortage_to_Banks_Act_1990_Amendment_2003_0.pdf
1152 - http://www.cbos.gov.sd./sites/default/files/The_Banking_Business_organization_Act_2004_1.pdf
1153 - http://www.cbos.gov.sd./sites/default/files/The_Terms_of_License_to_engage_Banking_activity_Regulation_2004_0.pdf
1154 - http://www.cbos.gov.sd./sites/default/files/cbos_act__2002_amendments_2005_2006_2012.pdf
1155 - http://www.cbos.gov.sd./sites/default/files/cbos_policies_2012.pdf
1156 - http://www.cbos.gov.sd./sites/default/files/cbos_policies_2013.pdf
1157 - http://www.cbos.gov.sd./sites/default/files/cbos_policies_2014.pdf
1158 - http://www.cbos.gov.sd./sites/default/files/cbos_policies_2015.pdf
1159 - http://www.cbos.gov.sd./sites/default/files/cbos_policies_2017_1.pdf
1160 - http://www.cbos.gov.sd./sites/default/files/dlyl_lrqb_lmktby_l_ltzm_lmsrf_bnzm_mkfh_gsl_lmwl_wtmwyl_lrhb_0.pdf
1161 - http://www.cbos.gov.sd./sites/default/files/exchange_businesses_organization_regulation_2011.pdf
1162 - http://www.cbos.gov.sd./sites/default/files/financial_institution_for_hire_business_organization_regulation_2011.pdf
1163 - http://www.cbos.gov.sd./sites/default/files/financial_transfere_co.pdf
1164 - http://www.cbos.gov.sd./sites/default/files/foreign_ar_2014.pdf
1165 - http://www.cbos.gov.sd./sites/default/files/freezone_banking_regulation.pdf
1166 - http://www.cbos.gov.sd./sites/default/files/ijara_companies.pdf
1167 - http://www.cbos.gov.sd./sites/default/files/investment_and_development_banks_organization_regulation_2011.pdf
1168 - http://www.cbos.gov.sd./sites/default/files/microfinance_regulation.pdf
1169 - http://www.cbos.gov.sd./sites/default/files/policies-2018_0.pdf
1170 - http://www.cbos.gov.sd./sites/default/files/ps_business_organization.pdf
1171 - http://www.cbos.gov.sd./sites/default/files/serafat_2014.pdf
1172 - http://www.cbos.gov.sd./sites/default/files/stratigic_palnning_2012-2016.pdf
1173 - http://www.cbos.gov.sd./sites/default/files/tmym_khs_bmkfh_gsl_lmwl_0.pdf
1174 Total links to files: 32
1175
1176+ Externals links found:
1177 - http://196.1.210.38
1178 - http://196.1.210.38/ar/index.html
1179 - http://cbos.gov.sd/ar/content/منع-تصدير-إناث-المواشي
1180 - http://cbos.gov.sd/ar/node/17884/
1181 - http://cbos.gov.sd/ar/node/18240
1182 - http://cbos.gov.sd/ar/node/18414/
1183 - http://cbos.gov.sd/ar/node/18822/
1184 - http://cbos.gov.sd/ar/node/18873/
1185 - http://dot.jo/en
1186 - http://dsbb.imf.org/Pages/GDDS/CtyCtgList.aspx?ctycode=SDN
1187 - http://www.cbos.gov.sd/ar/node/17145/
1188 - http://www.facebook.com
1189 - http://www.imf.org/external/country/SDN/index.htm
1190 - http://www.linkedin.com
1191 - http://www.twitter.com
1192 - http://www.youtube.com
1193 - https://cbos.gov.sd/ar/content/%D8%AA%D9%88%D8%AB%D9%8A%D9%82-%D8%AA%D8%AC%D8%B1%D8%A8%D8%A9-%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86-%D9%81%D9%8A-%D8%A7%D9%84%D9%85%D8%B5%D8%A7%D8%B1%D9%81-%D9%88%D8%A7%D9%84%D9%85%D8%A4%D8%B3%D8%B3%D8%A7%D8%AA-%D8%A7%D9%84%D9%85%D8%A7%D9%84%D9%8A%D8%A9-%D8%A7%D9%84%D8%A5%D8%B3%D9%84%D8%A7%D9%85%D9%8A%D8%A9
1194 - https://cbos.gov.sd/ar/content/%D8%B3%D9%8A%D8%A7%D8%B3%D8%A7%D8%AA-%D8%A8%D9%86%D9%83-%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86-%D8%A7%D9%84%D9%85%D8%B1%D9%83%D8%B2%D9%8A-%D9%84%D9%84%D8%B9%D8%A7%D9%85-2019
1195 - https://cbos.gov.sd/ar/content/%D9%83%D9%84%D9%85%D8%A9-%D8%AA%D8%B1%D8%AD%D9%8A%D8%A8%D9%8A%D8%A9
1196 - https://cbos.gov.sd/ar/event-created/month/2019-11
1197 - https://cbos.gov.sd/ar/national-currencies
1198 - https://cbos.gov.sd/ar/node/17257/
1199 - https://cbos.gov.sd/ar/node/17513
1200 - https://cbos.gov.sd/ar/node/18248/
1201 - https://cbos.gov.sd/ar/node/18249/
1202 - https://cbos.gov.sd/ar/node/18269
1203 - https://cbos.gov.sd/ar/node/18323/
1204 - https://cbos.gov.sd/ar/node/18338/
1205 - https://cbos.gov.sd/ar/node/18433
1206 - https://cbos.gov.sd/ar/node/18434/
1207 - https://cbos.gov.sd/ar/node/18447
1208 - https://cbos.gov.sd/ar/node/18456/
1209 - https://cbos.gov.sd/ar/node/18567/
1210 - https://cbos.gov.sd/ar/node/18589/
1211 - https://cbos.gov.sd/ar/node/18618/
1212 - https://cbos.gov.sd/ar/node/18685/
1213 - https://cbos.gov.sd/ar/node/18701/
1214 - https://cbos.gov.sd/ar/node/18702/
1215 - https://cbos.gov.sd/ar/node/18822/
1216 - https://cbos.gov.sd/ar/node/18823/
1217 - https://cbos.gov.sd/ar/node/18874/
1218 - https://cbos.gov.sd/ar/node/3982
1219 - https://cbos.gov.sd/ar/node?mini=2019-10
1220 - https://cbos.gov.sd/ar/node?mini=2019-12
1221 - https://cbos.gov.sd/ar/periodicals-publications?field_publication_type_tid_i18n=242
1222 - https://cbos.gov.sd/ar/periodicals-publications?field_publication_type_tid_i18n=46
1223 - https://cbos.gov.sd/ar/periodicals-publications?field_publication_type_tid_i18n=47
1224 - https://cbos.gov.sd/ar/periodicals-publications?field_publication_type_tid_i18n=48
1225 - https://cbos.gov.sd/ar/periodicals-publications?field_publication_type_tid_i18n=49
1226 - https://cbos.gov.sd/ar/periodicals-publications?field_publication_type_tid_i18n=52
1227 - https://cbos.gov.sd/ar/periodicals-publications?field_publication_type_tid_i18n=53
1228 - https://cbos.gov.sd/ar/periodicals-publications?field_publication_type_tid_i18n=55
1229 - https://cbos.gov.sd/ar/periodicals-publications?field_publication_type_tid_i18n=57
1230 - https://cbos.gov.sd/ar/periodicals-publications?field_publication_type_tid_i18n=58
1231 - https://cbos.gov.sd/ar/rss.xml
1232 - https://cbos.gov.sd/en/content/welcome-note
1233 - https://cbos.gov.sd/en/event-created/month/2019-11
1234 - https://cbos.gov.sd/en/national-currencies
1235 - https://cbos.gov.sd/en/node/17258/
1236 - https://cbos.gov.sd/en/node?mini=2019-10
1237 - https://cbos.gov.sd/en/node?mini=2019-12
1238 - https://cbos.gov.sd/en/periodicals-publications?field_publication_type_tid_i18n=243
1239 - https://cbos.gov.sd/en/periodicals-publications?field_publication_type_tid_i18n=43
1240 - https://cbos.gov.sd/en/periodicals-publications?field_publication_type_tid_i18n=44
1241 - https://cbos.gov.sd/en/periodicals-publications?field_publication_type_tid_i18n=45
1242 - https://cbos.gov.sd/en/periodicals-publications?field_publication_type_tid_i18n=50
1243 - https://cbos.gov.sd/en/periodicals-publications?field_publication_type_tid_i18n=51
1244 - https://cbos.gov.sd/en/periodicals-publications?field_publication_type_tid_i18n=54
1245 - https://cbos.gov.sd/en/rss.xml
1246 - https://cbos.gov.sd/sites/all/themes/cbos/favicon.ico
1247 - https://cbos.gov.sd/sites/all/themes/cbos/logo.png
1248 - https://cbos.gov.sd/sites/default/files/2niles-mosque.png
1249 - https://cbos.gov.sd/sites/default/files/Ragaba%20Sharia%20form.pdf
1250 - https://cbos.gov.sd/sites/default/files/banking_system_balad.pdf
1251 - https://cbos.gov.sd/sites/default/files/board-of-directors-fin-inst.pdf
1252 - https://cbos.gov.sd/sites/default/files/c22.png
1253 - https://cbos.gov.sd/sites/default/files/cbrs.pdf
1254 - https://cbos.gov.sd/sites/default/files/competence-and-integrity.pdf
1255 - https://cbos.gov.sd/sites/default/files/csp.pdf
1256 - https://cbos.gov.sd/sites/default/files/css/css_Wl_ucOXfpxR3lY1byxN9ORiyu7x4Q4BwTEeqAp0cyQI.css
1257 - https://cbos.gov.sd/sites/default/files/css/css_YCaw11IgCsmDcgzsF7HrJlezs4O8GAByNoVha71k7eU.css
1258 - https://cbos.gov.sd/sites/default/files/css/css_dwBM6uqZW_7CmO6gnEEYA-Pu1hMIppTyQRi8KIpVpqk.css
1259 - https://cbos.gov.sd/sites/default/files/css/css_iFkxMx_n0HkKf0npWyM7IRtKI6Astll129KBdlz-rok.css
1260 - https://cbos.gov.sd/sites/default/files/css/css_klDKwUVSRMagnfm6fsQLPrQz6rOHU7TU96oX5wuOSi8.css
1261 - https://cbos.gov.sd/sites/default/files/css/css_lQaZfjVpwP_oGNqdtWCSpJT1EMqXdMiU84ekLLxQnc4.css
1262 - https://cbos.gov.sd/sites/default/files/css/css_o5m5YfhNvCAmTYElqKpCQG6h1HjE4crK0Lriiytig8I.css
1263 - https://cbos.gov.sd/sites/default/files/css/css_slNk4j4eH-UuiJk-P7MBZDe0p2lnzq9VW-GVxdRb0BA.css
1264 - https://cbos.gov.sd/sites/default/files/css/css_taajhqfPLnrk8xJIGvLOQGA7Zl6fb-GGDTmP8Orx1qU.css
1265 - https://cbos.gov.sd/sites/default/files/css/css_woIztW8ifWHtEhGfGXbq1ML4NyjErttubWKldKUHDDE.css
1266 - https://cbos.gov.sd/sites/default/files/css/css_zNHU_m8zN2Kjp4_ESuVjCzNpMUO0aqCnmnksEx_Mog4.css
1267 - https://cbos.gov.sd/sites/default/files/ebp.pdf
1268 - https://cbos.gov.sd/sites/default/files/employee_movement.pdf
1269 - https://cbos.gov.sd/sites/default/files/epa.pdf
1270 - https://cbos.gov.sd/sites/default/files/gm-and-deputy.pdf
1271 - https://cbos.gov.sd/sites/default/files/home-page-currencies.png
1272 - https://cbos.gov.sd/sites/default/files/home-page_1.jpg
1273 - https://cbos.gov.sd/sites/default/files/hussein_ghoul.png
1274 - https://cbos.gov.sd/sites/default/files/js/js_-jenMcWHoY-_YofME9QdfIdN78Hvtfo2npip2cxdObU.js
1275 - https://cbos.gov.sd/sites/default/files/js/js_3KUbs8rYTeD9gk9OEpVLnupMcaZ1mht2ElUsYFrm3T0.js
1276 - https://cbos.gov.sd/sites/default/files/js/js_9ejxwyMyEpkHVoXVc1gs3xZVJVE5Oe0TGJbK3k5dJKM.js
1277 - https://cbos.gov.sd/sites/default/files/js/js_BPGnE18HbwHZpRtsae-eM7GB2YLyNMMA0-GPLc3ADEg.js
1278 - https://cbos.gov.sd/sites/default/files/js/js_D2Bqn3iGqKAjFG8qglV57ze-OQz04aJyObNbHeOSmzk.js
1279 - https://cbos.gov.sd/sites/default/files/js/js_EebRuRXFlkaf356V0T2K_8cnUVfCKesNTxdvvPSEhCM.js
1280 - https://cbos.gov.sd/sites/default/files/js/js_FklYTMMmtVdJYZvg6BJDuAxX3CzW-pjOZAh7r9FORLI.js
1281 - https://cbos.gov.sd/sites/default/files/js/js_KFrwtzWY4twxQFkCaNBG8sWJUNNqHgkffCUqsXx-Sw4.js
1282 - https://cbos.gov.sd/sites/default/files/js/js_OTdL_00eEtQq3wzsUAHLDYwgtcHpzbgUFYeJRcQf8f8.js
1283 - https://cbos.gov.sd/sites/default/files/js/js_R9UbiVw2xuTUI0GZoaqMDOdX0lrZtgX-ono8RVOUEVc.js
1284 - https://cbos.gov.sd/sites/default/files/js/js_aq53WZw0ZfymFY1XQpFZtezQLjdS8OxGeDX1Pzbc6FY.js
1285 - https://cbos.gov.sd/sites/default/files/js/js_eXFUOl9ybGpESnTNL7j1molYhS-t27UWfCSfm9FnQrQ.js
1286 - https://cbos.gov.sd/sites/default/files/js/js_f56BjsX_NrKmCP2t7OEtI96Xt1mkSObB6HlHtS5Jgn8.js
1287 - https://cbos.gov.sd/sites/default/files/js/js_gcgsv9036mkr2ymZgmKh_Uzh4KwHOaEjY9Qgbjo98rM.js
1288 - https://cbos.gov.sd/sites/default/files/js/js_kCx8WOsmlt7dcBA_Eyhbljz4KWO7SEt1j0u3k3UH9lA.js
1289 - https://cbos.gov.sd/sites/default/files/js/js_lVm4xcskBqr8_r7QA8kctOVtyj9XVMX1pvmUqA1Aa-Q.js
1290 - https://cbos.gov.sd/sites/default/files/js/js_v89jUZ_l2LR8NzEXW2kWQ6me12tC-jCbLw8O3mpuQ2A.js
1291 - https://cbos.gov.sd/sites/default/files/js/js_w49epHPlPg90hxulRkUqWoHL0Vg5Hnjod72-417Shcw.js
1292 - https://cbos.gov.sd/sites/default/files/js/js_xsATYpNzlmbFoo2DE1xdvL0QJY7inN17sct_jYkjzFg.js
1293 - https://cbos.gov.sd/sites/default/files/js/js_xwRiqSpjNmmd4pNG0qD3D_jIC5jUWoPg33TQ0VSamkE.js
1294 - https://cbos.gov.sd/sites/default/files/js/js_y3S6tjWqDLrEk7YexGPudltSL4dAmd8pzYMoZTd6uYM.js
1295 - https://cbos.gov.sd/sites/default/files/js/js_yo9QJ55hHiYOUgCDdekfA51z0MNyY09hHAlJw4Uz1s8.js
1296 - https://cbos.gov.sd/sites/default/files/oeps.pdf
1297 - https://cbos.gov.sd/sites/default/files/styles/current_directors/public/%D9%86%D8%B2%D8%A7%D8%B1%20%D8%AE%D8%A7%D9%84%D8%AF%20%D9%85%D8%AD%D8%AC%D9%88%D8%A8.jpg?itok=HrS98L3E
1298 - https://cbos.gov.sd/sites/default/files/styles/current_directors/public/1.jpg?itok=dUG4vAVp
1299 - https://cbos.gov.sd/sites/default/files/styles/current_directors/public/Elmutasim.jpg?itok=OPnMKY6O
1300 - https://cbos.gov.sd/sites/default/files/styles/current_directors/public/Elmutasim_1.jpg?itok=bukGDbNi
1301 - https://cbos.gov.sd/sites/default/files/styles/current_directors/public/IMG-20190310-WA0009.jpg?itok=ud-hbXFg
1302 - https://cbos.gov.sd/sites/default/files/styles/current_directors/public/Prof-Badreldin.jpg?itok=ouqpzWFm
1303 - https://cbos.gov.sd/sites/default/files/styles/current_directors/public/Prof-Badreldin_0.jpg?itok=tlVjPVrr
1304 - https://cbos.gov.sd/sites/default/files/styles/current_directors/public/hussein_gangool_0_1.jpg?itok=Ct0OjOvB
1305 - https://cbos.gov.sd/sites/default/files/styles/current_directors/public/hussein_gangool_0_2.jpg?itok=DjiLNHX-
1306 - https://cbos.gov.sd/sites/default/files/styles/home_page_slider/public/calenderR_2.png?itok=imGH4Ph7
1307 - https://cbos.gov.sd/sites/default/files/styles/home_page_slider/public/excelancy_e.png?itok=LGergFvp
1308 - https://cbos.gov.sd/sites/default/files/styles/home_page_slider/public/excellancy.png?itok=KV7jb7Ef
1309 - https://cbos.gov.sd/sites/default/files/styles/home_page_slider/public/vission.png?itok=Nw3OFyhe
1310 - https://cbos.gov.sd/sites/default/files/styles/home_page_slider/public/vission03.png?itok=jTFfRaJp
1311 - https://cbos.gov.sd/sites/default/files/styles/home_page_slider/public/vission_e.png?itok=JxGF_NJQ
1312 - https://cbos.gov.sd/sites/default/files/styles/important_subjects/public/1_3.png?itok=A1mi8cdn
1313 - https://cbos.gov.sd/sites/default/files/styles/important_subjects/public/1_4.png?itok=bmAIep21
1314 - https://cbos.gov.sd/sites/default/files/styles/important_subjects/public/2_1.png?itok=k5ZTeqMF
1315 - https://cbos.gov.sd/sites/default/files/styles/important_subjects/public/2_2.png?itok=40ueL4Ig
1316 - https://cbos.gov.sd/sites/default/files/styles/important_subjects/public/3_1.png?itok=2dT8TscC
1317 - https://cbos.gov.sd/sites/default/files/styles/important_subjects/public/3_2.png?itok=k7tGG8Vx
1318 - https://cbos.gov.sd/sites/default/files/styles/important_subjects/public/4_2.png?itok=p81kkz1e
1319 - https://cbos.gov.sd/sites/default/files/styles/important_subjects/public/4_3.png?itok=B6CLy9xy
1320 - https://cbos.gov.sd/sites/default/files/styles/important_subjects/public/5.png?itok=_i7dGbzV
1321 - https://cbos.gov.sd/sites/default/files/styles/important_subjects/public/5_0.png?itok=m05zEJbQ
1322 - https://cbos.gov.sd/sites/default/files/styles/important_subjects/public/6.png?itok=yd8C_S7W
1323 - https://cbos.gov.sd/sites/default/files/styles/important_subjects/public/6_0.png?itok=lJyNBruO
1324 - https://cbos.gov.sd/sites/default/files/styles/medium/public/Old_HQ.jpg?itok=sUKVzNq2
1325 - https://cbos.gov.sd/sites/default/files/styles/news_front_257_x_160/public/100F.jpg?itok=nj4q17_L
1326 - https://cbos.gov.sd/sites/default/files/styles/news_front_257_x_160/public/CBOS%20logo%20Black_6_17_9_0_31.jpg?itok=flxGbgsT
1327 - https://cbos.gov.sd/sites/default/files/styles/news_front_257_x_160/public/CBOS%2520logo%2520Black_6_17_10_1_0.jpg?itok=zffuMXvy
1328 - https://cbos.gov.sd/sites/default/files/styles/periodicals_and_publications/public/CBOS%20logo%20Black_6_17_10_1_1_0_0.jpg?itok=AwYLzB_8
1329 - https://cbos.gov.sd/sites/default/files/styles/periodicals_and_publications/public/MASRAFI01_0.jpg?itok=i-qZ3mB6
1330 - https://cbos.gov.sd/sites/default/files/styles/periodicals_and_publications/public/MASRAFI01_0_0.jpg?itok=gCmVmneq
1331 - https://cbos.gov.sd/sites/default/files/styles/periodicals_and_publications/public/Markazi_CBOS_0.png?itok=DOtVYOPY
1332 - https://cbos.gov.sd/sites/default/files/styles/periodicals_and_publications/public/Markazi_CBOS_0_0.png?itok=xcqWPHfw
1333 - https://cbos.gov.sd/sites/default/files/styles/periodicals_and_publications/public/PIN_0.jpg?itok=Dzbi6p1Z
1334 - https://cbos.gov.sd/sites/default/files/styles/periodicals_and_publications/public/STUDIES_ar_0.jpg?itok=vCztIFcq
1335 - https://cbos.gov.sd/sites/default/files/styles/periodicals_and_publications/public/annua_ar.jpg?itok=ZKzBu-Gs
1336 - https://cbos.gov.sd/sites/default/files/styles/periodicals_and_publications/public/annua_en.jpg?itok=A9ux51sF
1337 - https://cbos.gov.sd/sites/default/files/styles/periodicals_and_publications/public/bulitin%20cover_1.jpg?itok=VniMYHFz
1338 - https://cbos.gov.sd/sites/default/files/styles/periodicals_and_publications/public/bulitin%20cover_1_0.jpg?itok=OEzDA6t0
1339 - https://cbos.gov.sd/sites/default/files/styles/periodicals_and_publications/public/cc4_2.png?itok=pTvuT9-L
1340 - https://cbos.gov.sd/sites/default/files/styles/periodicals_and_publications/public/cc4_2_0.png?itok=weO4fTvS
1341 - https://cbos.gov.sd/sites/default/files/styles/periodicals_and_publications/public/cc4_3.png?itok=SrRVRjUz
1342 - https://cbos.gov.sd/sites/default/files/styles/periodicals_and_publications/public/cc4_4_14.png?itok=1g3yEXrt
1343 - https://cbos.gov.sd/sites/default/files/styles/periodicals_and_publications/public/cc4_4_14_0.png?itok=cdV3Ey5m
1344 - https://cbos.gov.sd/sites/default/files/styles/periodicals_and_publications/public/digest%20cover_1.jpg?itok=rTBRg-Gx
1345 - https://cbos.gov.sd/sites/default/files/styles/periodicals_and_publications/public/digest%20cover_1_0.jpg?itok=GRl5_C03
1346 - https://cbos.gov.sd/sites/default/files/styles/periodicals_and_publications/public/nashra_a_e_0.jpg?itok=pNVn4vxP
1347 - https://cbos.gov.sd/sites/default/files/styles/periodicals_and_publications/public/nashra_a_e_0_0.jpg?itok=jN6Z6pez
1348 - https://cbos.gov.sd/sites/default/files/styles/third_home_content/public/default_images/Icon_90x100_0.png?itok=ktYhawdE
1349 - https://maxcdn.bootstrapcdn.com/font-awesome/4.5.0/css/font-awesome.min.css
1350 - https://www.cbos.gov.sd/node/480
1351 Total external links: 174
1352
1353+ Email addresses found:
1354 Total email address found: 0
1355
1356+ Directories found:
1357 - http://www.cbos.gov.sd./ar/ (No open folder)
1358 - http://www.cbos.gov.sd./ar/about-cbos/ (No open folder)
1359 - http://www.cbos.gov.sd./ar/content/ (404 Not Found)
1360 - http://www.cbos.gov.sd./ar/form/ (404 Not Found)
1361 - http://www.cbos.gov.sd./cdn.jsdelivr.net/ (404 Not Found)
1362 - http://www.cbos.gov.sd./cdn.jsdelivr.net/bootstrap/ (404 Not Found)
1363 - http://www.cbos.gov.sd./cdn.jsdelivr.net/bootstrap/3.3.5/ (404 Not Found)
1364 - http://www.cbos.gov.sd./cdn.jsdelivr.net/bootstrap/3.3.5/css/ (404 Not Found)
1365 - http://www.cbos.gov.sd./cdn.jsdelivr.net/bootstrap/3.3.5/js/ (404 Not Found)
1366 - http://www.cbos.gov.sd./s7.addthis.com/ (404 Not Found)
1367 - http://www.cbos.gov.sd./s7.addthis.com/js/ (404 Not Found)
1368 - http://www.cbos.gov.sd./s7.addthis.com/js/300/ (404 Not Found)
1369 - http://www.cbos.gov.sd./sites/ (403 Forbidden)
1370 - http://www.cbos.gov.sd./sites/all/ (No open folder)
1371 - http://www.cbos.gov.sd./sites/all/themes/ (403 Forbidden)
1372 - http://www.cbos.gov.sd./sites/all/themes/cbos/ (403 Forbidden)
1373 - http://www.cbos.gov.sd./sites/all/themes/cbos/images/ (403 Forbidden)
1374 - http://www.cbos.gov.sd./sites/default/ (403 Forbidden)
1375 - http://www.cbos.gov.sd./sites/default/files/ (403 Forbidden)
1376 - http://www.cbos.gov.sd./www.google.com/ (404 Not Found)
1377 Total directories: 20
1378
1379+ Directory indexing found:
1380 Total directories with indexing: 0
1381
1382----------------------------------------------------------------------
1383
1384
1385 + URL to crawl: https://mail.cbos.gov.sd.
1386 + Date: 2019-11-10
1387
1388 + Crawling URL: https://mail.cbos.gov.sd.:
1389 + Links:
1390 + Crawling https://mail.cbos.gov.sd. ([SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:727))
1391 + Searching for directories...
1392 + Searching open folders...
1393
1394--Finished--
1395Summary information for domain cbos.gov.sd.
1396-----------------------------------------
1397 Domain Specific Information:
1398 Email: publications@cbos.gov.sd.
1399 Email: dot.joinfo@cbos.gov.sd.
1400 Email: abdellatif.elnasma@cbos.gov.sd
1401 Email: info@cbos.gov.sd&
1402 Email: abdelbasit.elmustafa@cbos.gov.sd. - Is this real?
1403 Email: info@cbos.gov.sd.
1404 Email: elhaseen@cbos.gov.sd.
1405
1406 Domain Ips Information:
1407 IP: 91.121.115.139
1408 HostName: www.cbos.gov.sd. Type: A
1409 Country: France
1410 Is Active: True (reset ttl 64)
1411 Port: 22/tcp open ssh syn-ack ttl 51 OpenSSH 7.2 (FreeBSD 20160310; protocol 2.0)
1412 Script Info: | vulners:
1413 Script Info: | cpe:/a:openbsd:openssh:7.2:
1414 Script Info: | CVE-2016-8858 7.8 https://vulners.com/cve/CVE-2016-8858
1415 Script Info: | CVE-2018-15919 5.0 https://vulners.com/cve/CVE-2018-15919
1416 Script Info: | CVE-2017-15906 5.0 https://vulners.com/cve/CVE-2017-15906
1417 Script Info: |_ CVE-2016-10708 5.0 https://vulners.com/cve/CVE-2016-10708
1418 Port: 80/tcp open http syn-ack ttl 51 nginx
1419 Script Info: | http-methods:
1420 Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
1421 Script Info: |_http-title: Did not follow redirect to https://cbos.gov.sd/
1422 Port: 443/tcp open tcpwrapped syn-ack ttl 51
1423 Script Info: |_http-title: 400 The plain HTTP request was sent to HTTPS port
1424 Script Info: | ssl-cert: Subject: commonName=cbos.gov.sd
1425 Script Info: | Subject Alternative Name: DNS:cbos.gov.sd, DNS:www.cbos.gov.sd
1426 Script Info: | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
1427 Script Info: | Public Key type: rsa
1428 Script Info: | Public Key bits: 2048
1429 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1430 Script Info: | Not valid before: 2019-08-31T13:30:14
1431 Script Info: | Not valid after: 2019-11-29T13:30:14
1432 Script Info: | MD5: f596 a0f9 fd82 d21f 0bd8 a398 e057 b481
1433 Script Info: |_SHA-1: f2c4 7f27 9f24 477c fbb1 0608 bd27 ed7c 9ec0 a50f
1434 Os Info: OS: FreeBSD; CPE: cpe:/o:freebsd:freebsd
1435 IP: 196.1.210.37
1436 HostName: mail.cbos.gov.sd. Type: A
1437 Country: Sudan
1438 Is Active: True (reset ttl 64)
1439 Port: 443/tcp open ssl/http syn-ack ttl 48 Microsoft IIS httpd 10.0
1440 Script Info: |_http-favicon: Unknown favicon MD5: C167F28F226D6684CEA575F68AA5425A
1441 Script Info: | http-methods:
1442 Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
1443 Script Info: |_http-server-header: Microsoft-IIS/10.0
1444 Script Info: | http-title: Outlook
1445 Script Info: |_Requested resource was https://196.1.210.37/owa/auth/logon.aspx?url=https%3a%2f%2f196.1.210.37%2fowa%2f&reason=0
1446 Script Info: | ssl-cert: Subject: commonName=khambx1.cbos.sd/organizationName=CBOS/stateOrProvinceName=Khartoum/countryName=SD
1447 Script Info: | Subject Alternative Name: DNS:mail.cbos.gov.sd, DNS:khambx1.cbos.sd, DNS:mail.cbos.sd, DNS:AutoDiscover.CBOS.SD, DNS:AutoDiscover.CBOS.GOV.SD, DNS:cbos.sd, DNS:CBOS.GOV.SD, DNS:Autodiscover, DNS:Khambx1, DNS:Khambx1.cbos.gov.sd
1448 Script Info: | Issuer: commonName=CBOS-KHADC01-CA
1449 Script Info: | Public Key type: rsa
1450 Script Info: | Public Key bits: 2048
1451 Script Info: | Signature Algorithm: sha1WithRSAEncryption
1452 Script Info: | Not valid before: 2019-03-21T13:23:16
1453 Script Info: | Not valid after: 2021-03-20T13:23:16
1454 Script Info: | MD5: df72 90f9 cad0 b497 2ec4 a783 fe6c 1b99
1455 Script Info: |_SHA-1: 564d d9ae daa8 0a58 33f6 130b c3f3 f777 d4be 866c
1456 Script Info: |_ssl-date: 2019-11-10T10:26:47+00:00; +3m32s from scanner time.
1457 Script Info: | tls-alpn:
1458 Script Info: | h2
1459 Script Info: |_ http/1.1
1460 Port: 1723/tcp open pptp? syn-ack ttl 49
1461 Script Info: |_pptp-version: ERROR: Script execution failed (use -d to debug)
1462 Os Info: OS: Windows; CPE: cpe:/o:microsoft:windows
1463 Script Info: |_clock-skew: 3m31s
1464 IP: 196.1.210.35
1465 HostName: ns1.cbos.gov.sd Type: NS
1466 HostName: ns1.cbos.gov.sd Type: PTR
1467 HostName: ns1.cbos.gov.sd. Type: A
1468 Country: Sudan
1469 Is Active: True (reset ttl 64)
1470 Port: 53/tcp open domain syn-ack ttl 112 Microsoft DNS 6.1.7601 (1DB15CD4) (Windows Server 2008 R2 SP1)
1471 Script Info: | dns-nsid:
1472 Script Info: |_ bind.version: Microsoft DNS 6.1.7601 (1DB15CD4)
1473 Port: 1723/tcp open pptp? syn-ack ttl 49
1474 Script Info: |_pptp-version: ERROR: Script execution failed (use -d to debug)
1475 Script Info: Device type: general purpose|WAP
1476 Script Info: Running (JUST GUESSING): Linux 2.6.X|2.4.X (91%), Microsoft Windows 2008 (87%)
1477 Os Info: OS: Windows; CPE: cpe:/o:microsoft:windows_server_2008:r2:sp1
1478 IP: 196.1.210.45
1479 HostName: scefgw.cbos.gov.sd Type: MX
1480 HostName: scefgw.cbos.gov.sd Type: PTR
1481 Country: Sudan
1482 Is Active: True (reset ttl 64)
1483 Port: 1723/tcp open pptp? syn-ack ttl 49
1484 Script Info: |_pptp-version: ERROR: Script execution failed (use -d to debug)
1485 Script Info: Device type: general purpose|storage-misc|broadband router|WAP|phone
1486 Script Info: Running (JUST GUESSING): Linux 3.X|4.X|2.6.X (94%), HP embedded (91%), Asus embedded (88%), Google Android 4.X (87%)
1487
1488--------------End Summary --------------
1489-----------------------------------------
1490#######################################################################################################################################
1491Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-10 05:11 EST
1492Nmap scan report for cbos.gov.sd (91.121.115.139)
1493Host is up (0.10s latency).
1494rDNS record for 91.121.115.139: cbos.dot.jo
1495Not shown: 997 filtered ports
1496PORT STATE SERVICE
149722/tcp open ssh
149880/tcp open http
1499443/tcp open https
1500#######################################################################################################################################
1501Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-10 05:11 EST
1502Nmap scan report for cbos.gov.sd (91.121.115.139)
1503Host is up (0.15s latency).
1504rDNS record for 91.121.115.139: cbos.dot.jo
1505Not shown: 994 filtered ports
1506PORT STATE SERVICE VERSION
150722/tcp open ssh OpenSSH 7.2 (FreeBSD 20160310; protocol 2.0)
150825/tcp closed smtp
150980/tcp open http nginx
1510|_http-title: Did not follow redirect to https://cbos.gov.sd/
1511139/tcp closed netbios-ssn
1512443/tcp open tcpwrapped
1513|_http-title: 400 The plain HTTP request was sent to HTTPS port
1514445/tcp closed microsoft-ds
1515Service Info: OS: FreeBSD; CPE: cpe:/o:freebsd:freebsd
1516#######################################################################################################################################
1517Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-10 05:07 EST
1518Nmap scan report for cbos.dot.jo (91.121.115.139)
1519Host is up (0.13s latency).
1520Not shown: 2 filtered ports
1521PORT STATE SERVICE
152253/udp open|filtered domain
152367/udp open|filtered dhcps
152468/udp open|filtered dhcpc
152569/udp open|filtered tftp
152688/udp open|filtered kerberos-sec
1527123/udp open|filtered ntp
1528139/udp open|filtered netbios-ssn
1529161/udp open|filtered snmp
1530162/udp open|filtered snmptrap
1531389/udp open|filtered ldap
1532500/udp open|filtered isakmp
1533520/udp open|filtered route
15342049/udp open|filtered nfs
1535
1536Nmap done: 1 IP address (1 host up) scanned in 3.03 seconds
1537#######################################################################################################################################
1538# general
1539(gen) banner: SSH-2.0-OpenSSH_7.2 FreeBSD-20160310
1540(gen) software: OpenSSH 7.2 running on FreeBSD (2016-03-10)
1541(gen) compatibility: OpenSSH 7.2+, Dropbear SSH 2013.62+
1542(gen) compression: enabled (zlib@openssh.com)
1543
1544# key exchange algorithms
1545(kex) curve25519-sha256@libssh.org -- [info] available since OpenSSH 6.5, Dropbear SSH 2013.62
1546(kex) ecdh-sha2-nistp256 -- [fail] using weak elliptic curves
1547 `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
1548(kex) ecdh-sha2-nistp384 -- [fail] using weak elliptic curves
1549 `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
1550(kex) ecdh-sha2-nistp521 -- [fail] using weak elliptic curves
1551 `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
1552(kex) diffie-hellman-group-exchange-sha256 -- [warn] using custom size modulus (possibly weak)
1553 `- [info] available since OpenSSH 4.4
1554(kex) diffie-hellman-group14-sha1 -- [warn] using weak hashing algorithm
1555 `- [info] available since OpenSSH 3.9, Dropbear SSH 0.53
1556
1557# host-key algorithms
1558(key) ssh-rsa -- [info] available since OpenSSH 2.5.0, Dropbear SSH 0.28
1559(key) rsa-sha2-512 -- [info] available since OpenSSH 7.2
1560(key) rsa-sha2-256 -- [info] available since OpenSSH 7.2
1561(key) ssh-ed25519 -- [info] available since OpenSSH 6.5
1562
1563# encryption algorithms (ciphers)
1564(enc) aes128-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
1565(enc) aes192-ctr -- [info] available since OpenSSH 3.7
1566(enc) aes256-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
1567(enc) aes128-gcm@openssh.com -- [info] available since OpenSSH 6.2
1568(enc) chacha20-poly1305@openssh.com -- [info] available since OpenSSH 6.5
1569 `- [info] default cipher since OpenSSH 6.9.
1570(enc) aes256-gcm@openssh.com -- [info] available since OpenSSH 6.2
1571
1572# message authentication code algorithms
1573(mac) umac-128-etm@openssh.com -- [info] available since OpenSSH 6.2
1574(mac) hmac-sha2-512-etm@openssh.com -- [info] available since OpenSSH 6.2
1575(mac) hmac-sha2-256-etm@openssh.com -- [info] available since OpenSSH 6.2
1576
1577# algorithm recommendations (for OpenSSH 7.2)
1578(rec) -ecdh-sha2-nistp521 -- kex algorithm to remove
1579(rec) -ecdh-sha2-nistp384 -- kex algorithm to remove
1580(rec) -ecdh-sha2-nistp256 -- kex algorithm to remove
1581(rec) -diffie-hellman-group14-sha1 -- kex algorithm to remove
1582#######################################################################################################################################
1583Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-10 05:07 EST
1584Nmap scan report for cbos.dot.jo (91.121.115.139)
1585Host is up (0.18s latency).
1586
1587PORT STATE SERVICE VERSION
158822/tcp open ssh OpenSSH 7.2 (FreeBSD 20160310; protocol 2.0)
1589|_ssh-auth-methods: ERROR: Script execution failed (use -d to debug)
1590|_ssh-brute: ERROR: Script execution failed (use -d to debug)
1591|_ssh-publickey-acceptance: ERROR: Script execution failed (use -d to debug)
1592|_ssh-run: ERROR: Script execution failed (use -d to debug)
1593| vulners:
1594| cpe:/a:openbsd:openssh:7.2:
1595| CVE-2016-8858 7.8 https://vulners.com/cve/CVE-2016-8858
1596| CVE-2018-15919 5.0 https://vulners.com/cve/CVE-2018-15919
1597| CVE-2017-15906 5.0 https://vulners.com/cve/CVE-2017-15906
1598|_ CVE-2016-10708 5.0 https://vulners.com/cve/CVE-2016-10708
1599| vulscan: VulDB - https://vuldb.com:
1600| [90671] OpenSSH up to 7.2 auth-passwd.c auth_password denial of service
1601| [90405] OpenSSH up to 7.2p2 sshd information disclosure
1602| [90404] OpenSSH up to 7.2p2 sshd information disclosure
1603| [90403] OpenSSH up to 7.2p2 sshd CPU Exhaustion denial of service
1604| [89622] OpenSSH 7.2p2 Authentication Username information disclosure
1605| [81320] OpenSSH up to 7.2p1 X11 Authentication Credential xauth privilege escalation
1606| [130671] gsi-openssh-server 7.9p1 on Fedora /etc/gsissh/sshd_config weak authentication
1607| [130371] OpenSSH 7.9 scp Man-in-the-Middle directory traversal
1608| [130370] OpenSSH 7.9 Man-in-the-Middle spoofing
1609| [130369] OpenSSH 7.9 Encoding progressmeter.c refresh_progress_meter() spoofing
1610| [129007] OpenSSH 7.9 scp Client scp.c Filename privilege escalation
1611| [123343] OpenSSH up to 7.8 GSS2 auth-gss2.c information disclosure
1612| [123011] OpenSSH up to 7.7 auth2-gss.c Request information disclosure
1613| [112267] OpenSSH up to 7.3 sshd kex.c/packet.c NEWKEYS Message denial of service
1614| [108627] OpenSSH up to 7.5 Readonly Mode sftp-server.c process_open unknown vulnerability
1615| [94611] OpenSSH up to 7.3 Access Control privilege escalation
1616| [94610] OpenSSH up to 7.3 Shared Memory Manager privilege escalation
1617| [94608] OpenSSH up to 7.3 Unix-Domain Socket privilege escalation
1618| [94607] OpenSSH up to 7.3 Forwarded Agent Channel privilege escalation
1619| [80656] OpenBSD OpenSSH 7.1 X11 Forwarding privilege escalation
1620| [80330] OpenSSH up to 7.1p1 packet.c ssh_packet_read_poll2 memory corruption
1621|
1622| MITRE CVE - https://cve.mitre.org:
1623| [CVE-2010-4755] The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in SSH_FXP_STAT requests to an sftp daemon, a different vulnerability than CVE-2010-2632.
1624| [CVE-1999-0661] A system is running a version of software that was replaced with a Trojan Horse at one of its distribution points, such as (1) TCP Wrappers 7.6, (2) util-linux 2.9g, (3) wuarchive ftpd (wuftpd) 2.2 and 2.1f, (4) IRC client (ircII) ircII 2.2.9, (5) OpenSSH 3.4p1, or (6) Sendmail 8.12.6.
1625|
1626| SecurityFocus - https://www.securityfocus.com/bid/:
1627| [102780] OpenSSH CVE-2016-10708 Multiple Denial of Service Vulnerabilities
1628| [101552] OpenSSH 'sftp-server.c' Remote Security Bypass Vulnerability
1629| [94977] OpenSSH CVE-2016-10011 Local Information Disclosure Vulnerability
1630| [94975] OpenSSH CVE-2016-10012 Security Bypass Vulnerability
1631| [94972] OpenSSH CVE-2016-10010 Privilege Escalation Vulnerability
1632| [94968] OpenSSH CVE-2016-10009 Remote Code Execution Vulnerability
1633| [93776] OpenSSH 'ssh/kex.c' Denial of Service Vulnerability
1634| [92212] OpenSSH CVE-2016-6515 Denial of Service Vulnerability
1635| [92210] OpenSSH CBC Padding Weak Encryption Security Weakness
1636| [92209] OpenSSH MAC Verification Security Bypass Vulnerability
1637| [91812] OpenSSH CVE-2016-6210 User Enumeration Vulnerability
1638| [90440] OpenSSH CVE-2004-1653 Remote Security Vulnerability
1639| [90340] OpenSSH CVE-2004-2760 Remote Security Vulnerability
1640| [89385] OpenSSH CVE-2005-2666 Local Security Vulnerability
1641| [88655] OpenSSH CVE-2001-1382 Remote Security Vulnerability
1642| [88513] OpenSSH CVE-2000-0999 Remote Security Vulnerability
1643| [88367] OpenSSH CVE-1999-1010 Local Security Vulnerability
1644| [87789] OpenSSH CVE-2003-0682 Remote Security Vulnerability
1645| [86187] OpenSSH 'session.c' Local Security Bypass Vulnerability
1646| [86144] OpenSSH CVE-2007-2768 Remote Security Vulnerability
1647| [84427] OpenSSH CVE-2016-1908 Security Bypass Vulnerability
1648| [84314] OpenSSH CVE-2016-3115 Remote Command Injection Vulnerability
1649| [84185] OpenSSH CVE-2006-4925 Denial-Of-Service Vulnerability
1650| [81293] OpenSSH CVE-2016-1907 Denial of Service Vulnerability
1651| [80698] OpenSSH CVE-2016-0778 Heap Based Buffer Overflow Vulnerability
1652| [80695] OpenSSH CVE-2016-0777 Information Disclosure Vulnerability
1653| [76497] OpenSSH CVE-2015-6565 Local Security Bypass Vulnerability
1654| [76317] OpenSSH PAM Support Multiple Remote Code Execution Vulnerabilities
1655| [75990] OpenSSH Login Handling Security Bypass Weakness
1656| [75525] OpenSSH 'x11_open_helper()' Function Security Bypass Vulnerability
1657| [71420] Portable OpenSSH 'gss-serv-krb5.c' Security Bypass Vulnerability
1658| [68757] OpenSSH Multiple Remote Denial of Service Vulnerabilities
1659| [66459] OpenSSH Certificate Validation Security Bypass Vulnerability
1660| [66355] OpenSSH 'child_set_env()' Function Security Bypass Vulnerability
1661| [65674] OpenSSH 'ssh-keysign.c' Local Information Disclosure Vulnerability
1662| [65230] OpenSSH 'schnorr.c' Remote Memory Corruption Vulnerability
1663| [63605] OpenSSH 'sshd' Process Remote Memory Corruption Vulnerability
1664| [61286] OpenSSH Remote Denial of Service Vulnerability
1665| [58894] GSI-OpenSSH PAM_USER Security Bypass Vulnerability
1666| [58162] OpenSSH CVE-2010-5107 Denial of Service Vulnerability
1667| [54114] OpenSSH 'ssh_gssapi_parse_ename()' Function Denial of Service Vulnerability
1668| [51702] Debian openssh-server Forced Command Handling Information Disclosure Vulnerability
1669| [50416] Linux Kernel 'kdump' and 'mkdumprd' OpenSSH Integration Remote Information Disclosure Vulnerability
1670| [49473] OpenSSH Ciphersuite Specification Information Disclosure Weakness
1671| [48507] OpenSSH 'pam_thread()' Remote Buffer Overflow Vulnerability
1672| [47691] Portable OpenSSH 'ssh-keysign' Local Unauthorized Access Vulnerability
1673| [46155] OpenSSH Legacy Certificate Signing Information Disclosure Vulnerability
1674| [45304] OpenSSH J-PAKE Security Bypass Vulnerability
1675| [36552] Red Hat Enterprise Linux OpenSSH 'ChrootDirectory' Option Local Privilege Escalation Vulnerability
1676| [32319] OpenSSH CBC Mode Information Disclosure Vulnerability
1677| [30794] Red Hat OpenSSH Backdoor Vulnerability
1678| [30339] OpenSSH 'X11UseLocalhost' X11 Forwarding Session Hijacking Vulnerability
1679| [30276] Debian OpenSSH SELinux Privilege Escalation Vulnerability
1680| [28531] OpenSSH ForceCommand Command Execution Weakness
1681| [28444] OpenSSH X Connections Session Hijacking Vulnerability
1682| [26097] OpenSSH LINUX_AUDIT_RECORD_EVENT Remote Log Injection Weakness
1683| [25628] OpenSSH X11 Cookie Local Authentication Bypass Vulnerability
1684| [23601] OpenSSH S/Key Remote Information Disclosure Vulnerability
1685| [20956] OpenSSH Privilege Separation Key Signature Weakness
1686| [20418] OpenSSH-Portable Existing Password Remote Information Disclosure Weakness
1687| [20245] OpenSSH-Portable GSSAPI Authentication Abort Information Disclosure Weakness
1688| [20241] Portable OpenSSH GSSAPI Remote Code Execution Vulnerability
1689| [20216] OpenSSH Duplicated Block Remote Denial of Service Vulnerability
1690| [16892] OpenSSH Remote PAM Denial Of Service Vulnerability
1691| [14963] OpenSSH LoginGraceTime Remote Denial Of Service Vulnerability
1692| [14729] OpenSSH GSSAPI Credential Disclosure Vulnerability
1693| [14727] OpenSSH DynamicForward Inadvertent GatewayPorts Activation Vulnerability
1694| [11781] OpenSSH-portable PAM Authentication Remote Information Disclosure Vulnerability
1695| [9986] RCP, OpenSSH SCP Client File Corruption Vulnerability
1696| [9040] OpenSSH PAM Conversation Memory Scrubbing Weakness
1697| [8677] Multiple Portable OpenSSH PAM Vulnerabilities
1698| [8628] OpenSSH Buffer Mismanagement Vulnerabilities
1699| [7831] OpenSSH Reverse DNS Lookup Access Control Bypass Vulnerability
1700| [7482] OpenSSH Remote Root Authentication Timing Side-Channel Weakness
1701| [7467] OpenSSH-portable Enabled PAM Delay Information Disclosure Vulnerability
1702| [7343] OpenSSH Authentication Execution Path Timing Information Leakage Weakness
1703| [6168] OpenSSH Visible Password Vulnerability
1704| [5374] OpenSSH Trojan Horse Vulnerability
1705| [5093] OpenSSH Challenge-Response Buffer Overflow Vulnerabilities
1706| [4560] OpenSSH Kerberos 4 TGT/AFS Token Buffer Overflow Vulnerability
1707| [4241] OpenSSH Channel Code Off-By-One Vulnerability
1708| [3614] OpenSSH UseLogin Environment Variable Passing Vulnerability
1709| [3560] OpenSSH Kerberos Arbitrary Privilege Elevation Vulnerability
1710| [3369] OpenSSH Key Based Source IP Access Control Bypass Vulnerability
1711| [3345] OpenSSH SFTP Command Restriction Bypassing Vulnerability
1712| [2917] OpenSSH PAM Session Evasion Vulnerability
1713| [2825] OpenSSH Client X11 Forwarding Cookie Removal File Symbolic Link Vulnerability
1714| [2356] OpenSSH Private Key Authentication Check Vulnerability
1715| [1949] OpenSSH Client Unauthorized Remote Forwarding Vulnerability
1716| [1334] OpenSSH UseLogin Vulnerability
1717|
1718| IBM X-Force - https://exchange.xforce.ibmcloud.com:
1719| [83258] GSI-OpenSSH auth-pam.c security bypass
1720| [82781] OpenSSH time limit denial of service
1721| [82231] OpenSSH pam_ssh_agent_auth PAM code execution
1722| [74809] OpenSSH ssh_gssapi_parse_ename denial of service
1723| [72756] Debian openssh-server commands information disclosure
1724| [68339] OpenSSH pam_thread buffer overflow
1725| [67264] OpenSSH ssh-keysign unauthorized access
1726| [65910] OpenSSH remote_glob function denial of service
1727| [65163] OpenSSH certificate information disclosure
1728| [64387] OpenSSH J-PAKE security bypass
1729| [63337] Cisco Unified Videoconferencing OpenSSH weak security
1730| [46620] OpenSSH and multiple SSH Tectia products CBC mode information disclosure
1731| [45202] OpenSSH signal handler denial of service
1732| [44747] RHEL OpenSSH backdoor
1733| [44280] OpenSSH PermitRootLogin information disclosure
1734| [44279] OpenSSH sshd weak security
1735| [44037] OpenSSH sshd SELinux role unauthorized access
1736| [43940] OpenSSH X11 forwarding information disclosure
1737| [41549] OpenSSH ForceCommand directive security bypass
1738| [41438] OpenSSH sshd session hijacking
1739| [40897] OpenSSH known_hosts weak security
1740| [40587] OpenSSH username weak security
1741| [37371] OpenSSH username data manipulation
1742| [37118] RHSA update for OpenSSH privilege separation monitor authentication verification weakness not installed
1743| [37112] RHSA update for OpenSSH signal handler race condition not installed
1744| [37107] RHSA update for OpenSSH identical block denial of service not installed
1745| [36637] OpenSSH X11 cookie privilege escalation
1746| [35167] OpenSSH packet.c newkeys[mode] denial of service
1747| [34490] OpenSSH OPIE information disclosure
1748| [33794] OpenSSH ChallengeResponseAuthentication information disclosure
1749| [32975] Apple Mac OS X OpenSSH denial of service
1750| [32387] RHSA-2006:0738 updates for openssh not installed
1751| [32359] RHSA-2006:0697 updates for openssh not installed
1752| [32230] RHSA-2006:0298 updates for openssh not installed
1753| [32132] RHSA-2006:0044 updates for openssh not installed
1754| [30120] OpenSSH privilege separation monitor authentication verification weakness
1755| [29255] OpenSSH GSSAPI user enumeration
1756| [29254] OpenSSH signal handler race condition
1757| [29158] OpenSSH identical block denial of service
1758| [28147] Apple Mac OS X OpenSSH nonexistent user login denial of service
1759| [25116] OpenSSH OpenPAM denial of service
1760| [24305] OpenSSH SCP shell expansion command execution
1761| [22665] RHSA-2005:106 updates for openssh not installed
1762| [22117] OpenSSH GSSAPI allows elevated privileges
1763| [22115] OpenSSH GatewayPorts security bypass
1764| [20930] OpenSSH sshd.c LoginGraceTime denial of service
1765| [19441] Sun Solaris OpenSSH LDAP (1) client authentication denial of service
1766| [17213] OpenSSH allows port bouncing attacks
1767| [16323] OpenSSH scp file overwrite
1768| [13797] OpenSSH PAM information leak
1769| [13271] OpenSSH could allow an attacker to corrupt the PAM conversion stack
1770| [13264] OpenSSH PAM code could allow an attacker to gain access
1771| [13215] OpenSSH buffer management errors could allow an attacker to execute code
1772| [13214] OpenSSH memory vulnerabilities
1773| [13191] OpenSSH large packet buffer overflow
1774| [12196] OpenSSH could allow an attacker to bypass login restrictions
1775| [11970] OpenSSH could allow an attacker to obtain valid administrative account
1776| [11902] OpenSSH PAM support enabled information leak
1777| [9803] OpenSSH "
1778| [9763] OpenSSH downloaded from the OpenBSD FTP site or OpenBSD FTP mirror sites could contain a Trojan Horse
1779| [9307] OpenSSH is running on the system
1780| [9169] OpenSSH "
1781| [8896] OpenSSH Kerberos 4 TGT/AFS buffer overflow
1782| [8697] FreeBSD libutil in OpenSSH fails to drop privileges prior to using the login class capability database
1783| [8383] OpenSSH off-by-one error in channel code
1784| [7647] OpenSSH UseLogin option arbitrary code execution
1785| [7634] OpenSSH using sftp and restricted keypairs could allow an attacker to bypass restrictions
1786| [7598] OpenSSH with Kerberos allows attacker to gain elevated privileges
1787| [7179] OpenSSH source IP access control bypass
1788| [6757] OpenSSH "
1789| [6676] OpenSSH X11 forwarding symlink attack could allow deletion of arbitrary files
1790| [6084] OpenSSH 2.3.1 allows remote users to bypass authentication
1791| [5517] OpenSSH allows unauthorized access to resources
1792| [4646] OpenSSH UseLogin option allows remote users to execute commands as root
1793|
1794| Exploit-DB - https://www.exploit-db.com:
1795| [21579] OpenSSH 3.x Challenge-Response Buffer Overflow Vulnerabilities (2)
1796| [21578] OpenSSH 3.x Challenge-Response Buffer Overflow Vulnerabilities (1)
1797| [21402] OpenSSH 2.x/3.x Kerberos 4 TGT/AFS Token Buffer Overflow Vulnerability
1798| [21314] OpenSSH 2.x/3.0.1/3.0.2 Channel Code Off-By-One Vulnerability
1799| [20253] OpenSSH 1.2 scp File Create/Overwrite Vulnerability
1800| [17462] FreeBSD OpenSSH 3.5p1 - Remote Root Exploit
1801| [14866] Novell Netware 6.5 - OpenSSH Remote Stack Overflow
1802| [6094] Debian OpenSSH Remote SELinux Privilege Elevation Exploit (auth)
1803| [3303] Portable OpenSSH <= 3.6.1p-PAM / 4.1-SUSE Timing Attack Exploit
1804| [2444] OpenSSH <= 4.3 p1 (Duplicated Block) Remote Denial of Service Exploit
1805| [1572] Dropbear / OpenSSH Server (MAX_UNAUTH_CLIENTS) Denial of Service
1806| [258] glibc-2.2 and openssh-2.3.0p1 exploits glibc => 2.1.9x
1807| [26] OpenSSH/PAM <= 3.6.1p1 Remote Users Ident (gossh.sh)
1808| [25] OpenSSH/PAM <= 3.6.1p1 Remote Users Discovery Tool
1809|
1810| OpenVAS (Nessus) - http://www.openvas.org:
1811| [902488] OpenSSH 'sshd' GSSAPI Credential Disclosure Vulnerability
1812| [900179] OpenSSH CBC Mode Information Disclosure Vulnerability
1813| [881183] CentOS Update for openssh CESA-2012:0884 centos6
1814| [880802] CentOS Update for openssh CESA-2009:1287 centos5 i386
1815| [880746] CentOS Update for openssh CESA-2009:1470 centos5 i386
1816| [870763] RedHat Update for openssh RHSA-2012:0884-04
1817| [870129] RedHat Update for openssh RHSA-2008:0855-01
1818| [861813] Fedora Update for openssh FEDORA-2010-5429
1819| [861319] Fedora Update for openssh FEDORA-2007-395
1820| [861170] Fedora Update for openssh FEDORA-2007-394
1821| [861012] Fedora Update for openssh FEDORA-2007-715
1822| [840345] Ubuntu Update for openssh vulnerability USN-597-1
1823| [840300] Ubuntu Update for openssh update USN-612-5
1824| [840271] Ubuntu Update for openssh vulnerability USN-612-2
1825| [840268] Ubuntu Update for openssh update USN-612-7
1826| [840259] Ubuntu Update for openssh vulnerabilities USN-649-1
1827| [840214] Ubuntu Update for openssh vulnerability USN-566-1
1828| [831074] Mandriva Update for openssh MDVA-2010:162 (openssh)
1829| [830929] Mandriva Update for openssh MDVA-2010:090 (openssh)
1830| [830807] Mandriva Update for openssh MDVA-2010:026 (openssh)
1831| [830603] Mandriva Update for openssh MDVSA-2008:098 (openssh)
1832| [830523] Mandriva Update for openssh MDVSA-2008:078 (openssh)
1833| [830317] Mandriva Update for openssh-askpass-qt MDKA-2007:127 (openssh-askpass-qt)
1834| [830191] Mandriva Update for openssh MDKSA-2007:236 (openssh)
1835| [802407] OpenSSH 'sshd' Challenge Response Authentication Buffer Overflow Vulnerability
1836| [103503] openssh-server Forced Command Handling Information Disclosure Vulnerability
1837| [103247] OpenSSH Ciphersuite Specification Information Disclosure Weakness
1838| [103064] OpenSSH Legacy Certificate Signing Information Disclosure Vulnerability
1839| [100584] OpenSSH X Connections Session Hijacking Vulnerability
1840| [100153] OpenSSH CBC Mode Information Disclosure Vulnerability
1841| [66170] CentOS Security Advisory CESA-2009:1470 (openssh)
1842| [65987] SLES10: Security update for OpenSSH
1843| [65819] SLES10: Security update for OpenSSH
1844| [65514] SLES9: Security update for OpenSSH
1845| [65513] SLES9: Security update for OpenSSH
1846| [65334] SLES9: Security update for OpenSSH
1847| [65248] SLES9: Security update for OpenSSH
1848| [65218] SLES9: Security update for OpenSSH
1849| [65169] SLES9: Security update for openssh,openssh-askpass
1850| [65126] SLES9: Security update for OpenSSH
1851| [65019] SLES9: Security update for OpenSSH
1852| [65015] SLES9: Security update for OpenSSH
1853| [64931] CentOS Security Advisory CESA-2009:1287 (openssh)
1854| [61639] Debian Security Advisory DSA 1638-1 (openssh)
1855| [61030] Debian Security Advisory DSA 1576-2 (openssh)
1856| [61029] Debian Security Advisory DSA 1576-1 (openssh)
1857| [60840] FreeBSD Security Advisory (FreeBSD-SA-08:05.openssh.asc)
1858| [60803] Gentoo Security Advisory GLSA 200804-03 (openssh)
1859| [60667] Slackware Advisory SSA:2008-095-01 openssh
1860| [59014] Slackware Advisory SSA:2007-255-01 openssh
1861| [58741] Gentoo Security Advisory GLSA 200711-02 (openssh)
1862| [57919] Gentoo Security Advisory GLSA 200611-06 (openssh)
1863| [57895] Gentoo Security Advisory GLSA 200609-17 (openssh)
1864| [57585] Debian Security Advisory DSA 1212-1 (openssh (1:3.8.1p1-8.sarge.6))
1865| [57492] Slackware Advisory SSA:2006-272-02 openssh
1866| [57483] Debian Security Advisory DSA 1189-1 (openssh-krb5)
1867| [57476] FreeBSD Security Advisory (FreeBSD-SA-06:22.openssh.asc)
1868| [57470] FreeBSD Ports: openssh
1869| [56352] FreeBSD Security Advisory (FreeBSD-SA-06:09.openssh.asc)
1870| [56330] Gentoo Security Advisory GLSA 200602-11 (OpenSSH)
1871| [56294] Slackware Advisory SSA:2006-045-06 openssh
1872| [53964] Slackware Advisory SSA:2003-266-01 New OpenSSH packages
1873| [53885] Slackware Advisory SSA:2003-259-01 OpenSSH Security Advisory
1874| [53884] Slackware Advisory SSA:2003-260-01 OpenSSH updated again
1875| [53788] Debian Security Advisory DSA 025-1 (openssh)
1876| [52638] FreeBSD Security Advisory (FreeBSD-SA-03:15.openssh.asc)
1877| [52635] FreeBSD Security Advisory (FreeBSD-SA-03:12.openssh.asc)
1878| [11343] OpenSSH Client Unauthorized Remote Forwarding
1879| [10954] OpenSSH AFS/Kerberos ticket/token passing
1880| [10883] OpenSSH Channel Code Off by 1
1881| [10823] OpenSSH UseLogin Environment Variables
1882|
1883| SecurityTracker - https://www.securitytracker.com:
1884| [1028187] OpenSSH pam_ssh_agent_auth Module on Red Hat Enterprise Linux Lets Remote Users Execute Arbitrary Code
1885| [1026593] OpenSSH Lets Remote Authenticated Users Obtain Potentially Sensitive Information
1886| [1025739] OpenSSH on FreeBSD Has Buffer Overflow in pam_thread() That Lets Remote Users Execute Arbitrary Code
1887| [1025482] OpenSSH ssh-keysign Utility Lets Local Users Gain Elevated Privileges
1888| [1025028] OpenSSH Legacy Certificates May Disclose Stack Contents to Remote Users
1889| [1022967] OpenSSH on Red Hat Enterprise Linux Lets Remote Authenticated Users Gain Elevated Privileges
1890| [1021235] OpenSSH CBC Mode Error Handling May Let Certain Remote Users Obtain Plain Text in Certain Cases
1891| [1020891] OpenSSH on Debian Lets Remote Users Prevent Logins
1892| [1020730] OpenSSH for Red Hat Enterprise Linux Packages May Have Been Compromised
1893| [1020537] OpenSSH on HP-UX Lets Local Users Hijack X11 Sessions
1894| [1019733] OpenSSH Unsafe Default Configuration May Let Local Users Execute Arbitrary Commands
1895| [1019707] OpenSSH Lets Local Users Hijack Forwarded X Sessions in Certain Cases
1896| [1017756] Apple OpenSSH Key Generation Process Lets Remote Users Deny Service
1897| [1017183] OpenSSH Privilege Separation Monitor Validation Error May Cause the Monitor to Fail to Properly Control the Unprivileged Process
1898| [1016940] OpenSSH Race Condition in Signal Handler Lets Remote Users Deny Service and May Potentially Permit Code Execution
1899| [1016939] OpenSSH GSSAPI Authentication Abort Error Lets Remote Users Determine Valid Usernames
1900| [1016931] OpenSSH SSH v1 CRC Attack Detection Implementation Lets Remote Users Deny Service
1901| [1016672] OpenSSH on Mac OS X Lets Remote Users Deny Service
1902| [1015706] OpenSSH Interaction With OpenPAM Lets Remote Users Deny Service
1903| [1015540] OpenSSH scp Double Shell Character Expansion During Local-to-Local Copying May Let Local Users Gain Elevated Privileges in Certain Cases
1904| [1014845] OpenSSH May Unexpectedly Activate GatewayPorts and Also May Disclose GSSAPI Credentials in Certain Cases
1905| [1011193] OpenSSH scp Directory Traversal Flaw Lets Remote SSH Servers Overwrite Files in Certain Cases
1906| [1011143] OpenSSH Default Configuration May Be Unsafe When Used With Anonymous SSH Services
1907| [1007791] Portable OpenSSH PAM free() Bug May Let Remote Users Execute Root Code
1908| [1007716] OpenSSH buffer_append_space() and Other Buffer Management Errors May Let Remote Users Execute Arbitrary Code
1909| [1006926] OpenSSH Host Access Restrictions Can Be Bypassed By Remote Users
1910| [1006688] OpenSSH Timing Flaw With Pluggable Authentication Modules Can Disclose Valid User Account Names to Remote Users
1911| [1004818] OpenSSH's Secure Shell (SSH) Implementation Weakness May Disclose User Passwords to Remote Users During Man-in-the-Middle Attacks
1912| [1004616] OpenSSH Integer Overflow and Buffer Overflow May Allow Remote Users to Gain Root Access to the System
1913| [1004391] OpenSSH 'BSD_AUTH' Access Control Bug May Allow Unauthorized Remote Users to Authenticated to the System
1914| [1004115] OpenSSH Buffer Overflow in Kerberos Ticket and AFS Token Processing Lets Local Users Execute Arbitrary Code With Root Level Permissions
1915| [1003758] OpenSSH Off-by-one 'Channels' Bug May Let Authorized Remote Users Execute Arbitrary Code with Root Privileges
1916| [1002895] OpenSSH UseLogin Environment Variable Bug Lets Local Users Execute Commands and Gain Root Access
1917| [1002748] OpenSSH 3.0 Denial of Service Condition May Allow Remote Users to Crash the sshd Daemon and KerberosV Configuration Error May Allow Remote Users to Partially Authenticate When Authentication Should Not Be Permitted
1918| [1002734] OpenSSH's S/Key Implementation Information Disclosure Flaw Provides Remote Users With Information About Valid User Accounts
1919| [1002455] OpenSSH May Fail to Properly Restrict IP Addresses in Certain Configurations
1920| [1002432] OpenSSH's Sftp-server Subsystem Lets Authorized Remote Users with Restricted Keypairs Obtain Additional Access on the Server
1921| [1001683] OpenSSH Allows Authorized Users to Delete Other User Files Named Cookies
1922|
1923| OSVDB - http://www.osvdb.org:
1924| [92034] GSI-OpenSSH auth-pam.c Memory Management Authentication Bypass
1925| [90474] Red Hat / Fedora PAM Module for OpenSSH Incorrect error() Function Calling Local Privilege Escalation
1926| [90007] OpenSSH logingracetime / maxstartup Threshold Connection Saturation Remote DoS
1927| [81500] OpenSSH gss-serv.c ssh_gssapi_parse_ename Function Field Length Value Parsing Remote DoS
1928| [78706] OpenSSH auth-options.c sshd auth_parse_options Function authorized_keys Command Option Debug Message Information Disclosure
1929| [75753] OpenSSH PAM Module Aborted Conversation Local Information Disclosure
1930| [75249] OpenSSH sftp-glob.c remote_glob Function Glob Expression Parsing Remote DoS
1931| [75248] OpenSSH sftp.c process_put Function Glob Expression Parsing Remote DoS
1932| [72183] Portable OpenSSH ssh-keysign ssh-rand-helper Utility File Descriptor Leak Local Information Disclosure
1933| [70873] OpenSSH Legacy Certificates Stack Memory Disclosure
1934| [69658] OpenSSH J-PAKE Public Parameter Validation Shared Secret Authentication Bypass
1935| [67743] Novell NetWare OpenSSH SSHD.NLM Absolute Path Handling Remote Overflow
1936| [59353] OpenSSH sshd Local TCP Redirection Connection Masking Weakness
1937| [58495] OpenSSH sshd ChrootDirectory Feature SetUID Hard Link Local Privilege Escalation
1938| [56921] OpenSSH Unspecified Remote Compromise
1939| [53021] OpenSSH on ftp.openbsd.org Trojaned Distribution
1940| [50036] OpenSSH CBC Mode Chosen Ciphertext 32-bit Chunk Plaintext Context Disclosure
1941| [49386] OpenSSH sshd TCP Connection State Remote Account Enumeration
1942| [48791] OpenSSH on Debian sshd Crafted Username Arbitrary Remote SELinux Role Access
1943| [47635] OpenSSH Packages on Red Hat Enterprise Linux Compromised Distribution
1944| [47227] OpenSSH X11UseLocalhost X11 Forwarding Port Hijacking
1945| [45873] Cisco WebNS SSHield w/ OpenSSH Crafted Large Packet Remote DoS
1946| [43911] OpenSSH ~/.ssh/rc ForceCommand Bypass Arbitrary Command Execution
1947| [43745] OpenSSH X11 Forwarding Local Session Hijacking
1948| [43371] OpenSSH Trusted X11 Cookie Connection Policy Bypass
1949| [39214] OpenSSH linux_audit_record_event Crafted Username Audit Log Injection
1950| [37315] pam_usb OpenSSH Authentication Unspecified Issue
1951| [34850] OpenSSH on Mac OS X Key Generation Remote Connection DoS
1952| [34601] OPIE w/ OpenSSH Account Enumeration
1953| [34600] OpenSSH S/KEY Authentication Account Enumeration
1954| [32721] OpenSSH Username Password Complexity Account Enumeration
1955| [30232] OpenSSH Privilege Separation Monitor Weakness
1956| [29494] OpenSSH packet.c Invalid Protocol Sequence Remote DoS
1957| [29266] OpenSSH GSSAPI Authentication Abort Username Enumeration
1958| [29264] OpenSSH Signal Handler Pre-authentication Race Condition Code Execution
1959| [29152] OpenSSH Identical Block Packet DoS
1960| [27745] Apple Mac OS X OpenSSH Nonexistent Account Login Enumeration DoS
1961| [23797] OpenSSH with OpenPAM Connection Saturation Forked Process Saturation DoS
1962| [22692] OpenSSH scp Command Line Filename Processing Command Injection
1963| [20216] OpenSSH with KerberosV Remote Authentication Bypass
1964| [19142] OpenSSH Multiple X11 Channel Forwarding Leaks
1965| [19141] OpenSSH GSSAPIAuthentication Credential Escalation
1966| [18236] OpenSSH no pty Command Execution Local PAM Restriction Bypass
1967| [16567] OpenSSH Privilege Separation LoginGraceTime DoS
1968| [16039] Solaris 108994 Series Patch OpenSSH LDAP Client Authentication DoS
1969| [9562] OpenSSH Default Configuration Anon SSH Service Port Bounce Weakness
1970| [9550] OpenSSH scp Traversal Arbitrary File Overwrite
1971| [6601] OpenSSH *realloc() Unspecified Memory Errors
1972| [6245] OpenSSH SKEY/BSD_AUTH Challenge-Response Remote Overflow
1973| [6073] OpenSSH on FreeBSD libutil Arbitrary File Read
1974| [6072] OpenSSH PAM Conversation Function Stack Modification
1975| [6071] OpenSSH SSHv1 PAM Challenge-Response Authentication Privilege Escalation
1976| [5536] OpenSSH sftp-server Restricted Keypair Restriction Bypass
1977| [5408] OpenSSH echo simulation Information Disclosure
1978| [5113] OpenSSH NIS YP Netgroups Authentication Bypass
1979| [4536] OpenSSH Portable AIX linker Privilege Escalation
1980| [3938] OpenSSL and OpenSSH /dev/random Check Failure
1981| [3456] OpenSSH buffer_append_space() Heap Corruption
1982| [2557] OpenSSH Multiple Buffer Management Multiple Overflows
1983| [2140] OpenSSH w/ PAM Username Validity Timing Attack
1984| [2112] OpenSSH Reverse DNS Lookup Bypass
1985| [2109] OpenSSH sshd Root Login Timing Side-Channel Weakness
1986| [1853] OpenSSH Symbolic Link 'cookies' File Removal
1987| [839] OpenSSH PAMAuthenticationViaKbdInt Challenge-Response Remote Overflow
1988| [781] OpenSSH Kerberos TGT/AFS Token Passing Remote Overflow
1989| [730] OpenSSH Channel Code Off by One Remote Privilege Escalation
1990| [688] OpenSSH UseLogin Environment Variable Local Command Execution
1991| [642] OpenSSH Multiple Key Type ACL Bypass
1992| [504] OpenSSH SSHv2 Public Key Authentication Bypass
1993| [341] OpenSSH UseLogin Local Privilege Escalation
1994|_
1995Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
1996Aggressive OS guesses: Blue Coat proxy server (SGOS 6.3.2.201) (91%), Apple TV 5.2.1 or 5.3 (91%), Apple iOS 9.0 (Darwin 15.0.0) (90%), Apple iOS 10 (90%), Apple iPhone mobile phone (iOS 4.3.3) (90%), Apple iOS 5.0.1 (90%), Apple iOS 5.0.1 - 5.1.1 (90%), Apple iOS 6.1.3 (90%), Apple iOS 6.0.1 (90%), Apple iOS 6.1.4 (Darwin 13.0.0) (90%)
1997No exact OS matches for host (test conditions non-ideal).
1998Network Distance: 15 hops
1999Service Info: OS: FreeBSD; CPE: cpe:/o:freebsd:freebsd
2000
2001TRACEROUTE (using port 22/tcp)
2002HOP RTT ADDRESS
20031 135.29 ms 10.223.200.1
20042 ...
20053 136.16 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
20064 135.77 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
20075 137.80 ms be3740.ccr21.sto03.atlas.cogentco.com (154.54.60.190)
20086 149.36 ms be2920.rcr21.vno01.atlas.cogentco.com (154.54.39.102)
20097 160.80 ms be2898.ccr21.waw01.atlas.cogentco.com (154.54.39.129)
20108 161.64 ms be2882.rcr21.b016833-0.waw01.atlas.cogentco.com (154.54.59.38)
20119 175.57 ms var-5-a9.pl.eu (54.36.50.94)
201210 178.23 ms fra-fr5-sbb2-nc5.de.eu (54.36.50.116)
201311 182.74 ms be103.rbx-g2-nc5.fr.eu (94.23.122.240)
201412 ...
201513 181.23 ms vl11.rbx1-c2-a72.fr.eu (178.33.100.253)
201614 ...
201715 176.89 ms cbos.dot.jo (91.121.115.139)
2018#######################################################################################################################################
2019USER_FILE => /usr/share/brutex/wordlists/simple-users.txt
2020RHOSTS => 91.121.115.139
2021RHOST => 91.121.115.139
2022[*] 91.121.115.139:22 - SSH - Using malformed packet technique
2023[*] 91.121.115.139:22 - SSH - Starting scan
2024[-] 91.121.115.139:22 - SSH - User 'admin' not found
2025[-] 91.121.115.139:22 - SSH - User 'administrator' not found
2026[-] 91.121.115.139:22 - SSH - User 'anonymous' not found
2027[-] 91.121.115.139:22 - SSH - User 'backup' not found
2028[-] 91.121.115.139:22 - SSH - User 'bee' not found
2029[-] 91.121.115.139:22 - SSH - User 'ftp' not found
2030[-] 91.121.115.139:22 - SSH - User 'guest' not found
2031[-] 91.121.115.139:22 - SSH - User 'GUEST' not found
2032[-] 91.121.115.139:22 - SSH - User 'info' not found
2033[-] 91.121.115.139:22 - SSH - User 'mail' not found
2034[-] 91.121.115.139:22 - SSH - User 'mailadmin' not found
2035[-] 91.121.115.139:22 - SSH - User 'msfadmin' not found
2036[-] 91.121.115.139:22 - SSH - User 'mysql' not found
2037[-] 91.121.115.139:22 - SSH - User 'nobody' not found
2038[-] 91.121.115.139:22 - SSH - User 'oracle' not found
2039[-] 91.121.115.139:22 - SSH - User 'owaspbwa' not found
2040[-] 91.121.115.139:22 - SSH - User 'postfix' not found
2041[-] 91.121.115.139:22 - SSH - User 'postgres' not found
2042[-] 91.121.115.139:22 - SSH - User 'private' not found
2043[-] 91.121.115.139:22 - SSH - User 'proftpd' not found
2044[-] 91.121.115.139:22 - SSH - User 'public' not found
2045[-] 91.121.115.139:22 - SSH - User 'root' not found
2046[-] 91.121.115.139:22 - SSH - User 'superadmin' not found
2047[-] 91.121.115.139:22 - SSH - User 'support' not found
2048[-] 91.121.115.139:22 - SSH - User 'sys' not found
2049[-] 91.121.115.139:22 - SSH - User 'system' not found
2050[-] 91.121.115.139:22 - SSH - User 'systemadmin' not found
2051[-] 91.121.115.139:22 - SSH - User 'systemadministrator' not found
2052[-] 91.121.115.139:22 - SSH - User 'test' not found
2053[-] 91.121.115.139:22 - SSH - User 'tomcat' not found
2054[-] 91.121.115.139:22 - SSH - User 'user' not found
2055[-] 91.121.115.139:22 - SSH - User 'webmaster' not found
2056[-] 91.121.115.139:22 - SSH - User 'www-data' not found
2057[-] 91.121.115.139:22 - SSH - User 'Fortimanager_Access' not found
2058[*] Scanned 1 of 1 hosts (100% complete)
2059[*] Auxiliary module execution completed
2060#######################################################################################################################################
2061/
2062/ar/search-multi
2063//cdn.jsdelivr.net/bootstrap/3.3.5/js/bootstrap.min.js
2064http://dot.jo/en
2065https://cbos.gov.sd/ar/event-created/month/2019-11
2066https://cbos.gov.sd/sites/all/themes/cbos/logo.png
2067https://cbos.gov.sd/sites/default/files/js/js_3KUbs8rYTeD9gk9OEpVLnupMcaZ1mht2ElUsYFrm3T0.js
2068https://cbos.gov.sd/sites/default/files/js/js_9ejxwyMyEpkHVoXVc1gs3xZVJVE5Oe0TGJbK3k5dJKM.js
2069https://cbos.gov.sd/sites/default/files/js/js_EebRuRXFlkaf356V0T2K_8cnUVfCKesNTxdvvPSEhCM.js
2070https://cbos.gov.sd/sites/default/files/js/js_FklYTMMmtVdJYZvg6BJDuAxX3CzW-pjOZAh7r9FORLI.js
2071https://cbos.gov.sd/sites/default/files/js/js_gcgsv9036mkr2ymZgmKh_Uzh4KwHOaEjY9Qgbjo98rM.js
2072https://cbos.gov.sd/sites/default/files/js/js_OTdL_00eEtQq3wzsUAHLDYwgtcHpzbgUFYeJRcQf8f8.js
2073https://cbos.gov.sd/sites/default/files/js/js_R9UbiVw2xuTUI0GZoaqMDOdX0lrZtgX-ono8RVOUEVc.js
2074https://cbos.gov.sd/sites/default/files/js/js_w49epHPlPg90hxulRkUqWoHL0Vg5Hnjod72-417Shcw.js
2075https://cbos.gov.sd/sites/default/files/js/js_xsATYpNzlmbFoo2DE1xdvL0QJY7inN17sct_jYkjzFg.js
2076https://cbos.gov.sd/sites/default/files/js/js_yo9QJ55hHiYOUgCDdekfA51z0MNyY09hHAlJw4Uz1s8.js
2077http://www.w3.org/1999/xhtml
2078http://www.w3.org/1999/xhtml/vocab
2079http://www.w3.org/MarkUp/DTD/xhtml-rdfa-1.dtd
2080text/css
2081-//W3C//DTD XHTML+RDFa 1.0//EN
2082//www.google.com/jsapi
2083#######################################################################################################################################
2084http://91.121.115.139 [302 Found] Country[FRANCE][FR], IP[91.121.115.139], RedirectLocation[https://cbos.gov.sd/], Title[302 Found]
2085https://cbos.gov.sd/ [200 OK] Content-Language[ar], Content-Security-Policy[default-src 'self' 'unsafe-inline' *.addthis.com; script-src 'self' 'unsafe-inline' 'unsafe-eval' *.jsdelivr.net *.googleapis.com *.gstatic.com *.bootstrapcdn.com *.google-analytics.com *.ckeditor.com *.local *.dotdemos.com *.jwplatform.com *.jwpcdn.com *.jwpsrv.com *.ytimg.com *.youtube.com cbos.gov.sd *.cbos.gov.sd *.dot.jo www.google.com s7.addthis.com m.addthisedge.com m.addthis.com cdnjs.cloudflare.com; object-src 'unsafe-inline'; style-src 'unsafe-inline' *.jsdelivr.net *.googleapis.com *.gstatic.com *.bootstrapcdn.com *.ckeditor.com *.local *.dotdemos.com cbos.gov.sd *.cbos.gov.sd *.dot.jo *.google.com cdnjs.cloudflare.com; img-src 'self' 'unsafe-inline' data: *.jsdelivr.net *.googleapis.com *.gstatic.com *.google-analytics.com *.local *.dotdemos.com jwpltx.com *.jwpltx.com cbos.gov.sd *.cbos.gov.sd *.dot.jo stats.g.doubleclick.net *.ckeditor.com; media-src 'self' 'unsafe-inline' data: *.jsdelivr.net *.googleapis.com *.gstatic.com *.google-analytics.com *.local *.dotdemos.com cbos.gov.sd *.cbos.gov.sd *.dot.jo; frame-src 'self' 'unsafe-inline' *.googleapis.com google.com *.google.com *.gstatic.com *.youtube.com *.local *.dotdemos.com cbos.gov.sd *.gov.sd *.dot.jo *.addthis.com cbos.gov.sd:*; font-src 'self' 'unsafe-inline' *.jsdelivr.net *.googleapis.com *.gstatic.com *.bootstrapcdn.com *.local *.dotdemos.com *.jwpcdn.com *.jwpsrv.com cbos.gov.sd *.cbos.gov.sd *.dot.jo fonts.google.com maxcdn.bootstrapcdn.com; connect-src 'self' 'unsafe-inline' *.googleapis.com google.com *.google.com *.gstatic.com *.youtube.com *.local *.dotdemos.com cbos.gov.sd *.gov.sd *.dot.jo *.addthis.com cbos.gov.sd:*; report-uri /admin/config/system/seckit/csp-report], Country[FRANCE][FR], Drupal, Email[info@cbos.gov.sd], IP[91.121.115.139], MetaGenerator[Drupal 7 (http://drupal.org)], Script, Strict-Transport-Security[max-age=15552000], Title[CBOS], UncommonHeaders[x-drupal-cache,content-security-policy,x-content-security-policy,x-webkit-csp,from-origin,x-content-type-options], X-Frame-Options[SAMEORIGIN, SAMEORIGIN], X-XSS-Protection[1; mode=block]
2086#######################################################################################################################################
2087
2088wig - WebApp Information Gatherer
2089
2090
2091Scanning https://cbos.gov.sd...
2092_______________________________ SITE INFO _______________________________
2093IP Title
209491.121.115.139 CBOS
2095
2096________________________________ VERSION ________________________________
2097Name Versions Type
2098Drupal 7. CMS
2099jQuery 1.4.4 JavaScript
2100
2101______________________________ INTERESTING ______________________________
2102URL Note Type
2103/CHANGELOG.txt Drupal CHANGELOG Interesting
2104/install.php Installation file Interesting
2105/robots.txt robots.txt index Interesting
2106/test.php Test file Interesting
2107/test.htm Test file Interesting
2108
2109_________________________________ TOOLS _________________________________
2110Name Link Software
2111droopescan https://github.com/droope/droopescan Drupal
2112CMSmap https://github.com/Dionach/CMSmap Drupal
2113
2114_________________________________________________________________________
2115Time: 60.4 sec Urls: 284 Fingerprints: 40401
2116#######################################################################################################################################
2117Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-10 05:10 EST
2118NSE: Loaded 163 scripts for scanning.
2119NSE: Script Pre-scanning.
2120Initiating NSE at 05:10
2121Completed NSE at 05:10, 0.00s elapsed
2122Initiating NSE at 05:10
2123Completed NSE at 05:10, 0.00s elapsed
2124Initiating Parallel DNS resolution of 1 host. at 05:10
2125Completed Parallel DNS resolution of 1 host. at 05:10, 0.02s elapsed
2126Initiating SYN Stealth Scan at 05:10
2127Scanning cbos.dot.jo (91.121.115.139) [1 port]
2128Discovered open port 80/tcp on 91.121.115.139
2129Completed SYN Stealth Scan at 05:10, 0.22s elapsed (1 total ports)
2130Initiating Service scan at 05:10
2131Scanning 1 service on cbos.dot.jo (91.121.115.139)
2132Completed Service scan at 05:10, 7.09s elapsed (1 service on 1 host)
2133Initiating OS detection (try #1) against cbos.dot.jo (91.121.115.139)
2134Retrying OS detection (try #2) against cbos.dot.jo (91.121.115.139)
2135Initiating Traceroute at 05:10
2136Completed Traceroute at 05:10, 3.15s elapsed
2137Initiating Parallel DNS resolution of 12 hosts. at 05:10
2138Completed Parallel DNS resolution of 12 hosts. at 05:10, 0.31s elapsed
2139NSE: Script scanning 91.121.115.139.
2140Initiating NSE at 05:10
2141Completed NSE at 05:11, 40.69s elapsed
2142Initiating NSE at 05:11
2143Completed NSE at 05:11, 0.72s elapsed
2144Nmap scan report for cbos.dot.jo (91.121.115.139)
2145Host is up (0.18s latency).
2146
2147PORT STATE SERVICE VERSION
214880/tcp open http nginx
2149| http-brute:
2150|_ Path "/" does not require authentication
2151|_http-chrono: Request times for /; avg: 636.32ms; min: 567.11ms; max: 763.41ms
2152|_http-csrf: Couldn't find any CSRF vulnerabilities.
2153|_http-date: Sun, 10 Nov 2019 10:11:00 GMT; -1s from local time.
2154|_http-devframework: Couldn't determine the underlying framework or CMS. Try increasing 'httpspider.maxpagecount' value to spider more pages.
2155|_http-dombased-xss: Couldn't find any DOM based XSS.
2156|_http-drupal-enum: Nothing found amongst the top 100 resources,use --script-args number=<number|all> for deeper analysis)
2157|_http-errors: Couldn't find any error pages.
2158|_http-feed: Couldn't find any feeds.
2159|_http-fetch: Please enter the complete path of the directory to save data in.
2160| http-headers:
2161| Date: Sun, 10 Nov 2019 10:11:07 GMT
2162| Content-Type: text/html
2163| Content-Length: 154
2164| Connection: close
2165| Location: https://cbos.gov.sd/
2166|
2167|_ (Request type: GET)
2168|_http-jsonp-detection: Couldn't find any JSONP endpoints.
2169| http-methods:
2170|_ Supported Methods: GET HEAD POST OPTIONS
2171|_http-mobileversion-checker: No mobile version detected.
2172|_http-passwd: ERROR: Script execution failed (use -d to debug)
2173| http-security-headers:
2174| Strict_Transport_Security:
2175| Header: Strict-Transport-Security: max-age=15552000
2176| X_Frame_Options:
2177| Header: X-Frame-Options: SAMEORIGIN, SAMEORIGIN
2178| Description: The browser must not display this content in any frame from a page of different origin than the content itself.
2179| X_XSS_Protection:
2180| Header: X-XSS-Protection: 1; mode=block
2181| Description: The browser will prevent the rendering of the page when XSS is detected.
2182| X_Content_Type_Options:
2183| Header: X-Content-Type-Options: nosniff
2184| Description: Will prevent the browser from MIME-sniffing a response away from the declared content-type.
2185| Content_Security_Policy:
2186| Header: Content-Security-Policy: default-src 'self' 'unsafe-inline' *.addthis.com; script-src 'self' 'unsafe-inline' 'unsafe-eval' *.jsdelivr.net *.googleapis.com *.gstatic.com *.bootstrapcdn.com *.google-analytics.com *.ckeditor.com *.local *.dotdemos.com *.jwplatform.com *.jwpcdn.com *.jwpsrv.com *.ytimg.com *.youtube.com cbos.gov.sd *.cbos.gov.sd *.dot.jo www.google.com s7.addthis.com m.addthisedge.com m.addthis.com cdnjs.cloudflare.com; object-src 'unsafe-inline'; style-src 'unsafe-inline' *.jsdelivr.net *.googleapis.com *.gstatic.com *.bootstrapcdn.com *.ckeditor.com *.local *.dotdemos.com cbos.gov.sd *.cbos.gov.sd *.dot.jo *.google.com cdnjs.cloudflare.com; img-src 'self' 'unsafe-inline' data: *.jsdelivr.net *.googleapis.com *.gstatic.com *.google-analytics.com *.local *.dotdemos.com jwpltx.com *.jwpltx.com cbos.gov.sd *.cbos.gov.sd *.dot.jo stats.g.doubleclick.net *.ckeditor.com; media-src 'self' 'unsafe-inline' data: *.jsdelivr.net *.googleapis.com *.gstatic.com *.google-analytics.com *.local *.dotdemos.com cbos.gov.sd *.cbos.gov.sd *.dot.jo; frame-src 'self' 'unsafe-inline' *.googleapis.com google.com *.google.com *.gstatic.com *.youtube.com *.local *.dotdemos.com cbos.gov.sd *.gov.sd *.dot.jo *.addthis.com cbos.gov.sd:*; font-src 'self' 'unsafe-inline' *.jsdelivr.net *.googleapis.com *.gstatic.com *.bootstrapcdn.com *.local *.dotdemos.com *.jwpcdn.com *.jwpsrv.com cbos.gov.sd *.cbos.gov.sd *.dot.jo fonts.google.com maxcdn.bootstrapcdn.com; connect-src 'self' 'unsafe-inline' *.googleapis.com google.com *.google.com *.gstatic.com *.youtube.com *.local *.dotdemos.com cbos.gov.sd *.gov.sd *.dot.jo *.addthis.com cbos.gov.sd:*; report-uri /admin/config/system/seckit/csp-report
2187| Description: Define loading policy for all resources type in case of a resource type dedicated directive is not defined (fallback).
2188| Description: Define which scripts the protected resource can execute.
2189| Description: Define from where the protected resource can load plugins.
2190| Description: Define which styles (CSS) the user applies to the protected resource.
2191| Description: Define from where the protected resource can load images.
2192| Description: Define from where the protected resource can load video and audio.
2193| Description: Deprecated and replaced by child-src. Define from where the protected resource can embed frames.
2194| Description: Define from where the protected resource can load fonts.
2195| Description: Define which URIs the protected resource can load using script interfaces.
2196| Description: Specifies a URI to which the user agent sends reports about policy violation.
2197| Cache_Control:
2198| Header: Cache-Control: public, max-age=300
2199| Expires:
2200|_ Header: Expires: Sun, 19 Nov 1978 05:00:00 GMT
2201| http-sitemap-generator:
2202| Directory structure:
2203| Longest directory structure:
2204| Depth: 0
2205| Dir: /
2206| Total files found (by extension):
2207|_
2208|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
2209|_http-title: Did not follow redirect to https://cbos.gov.sd/
2210| http-vhosts:
2211|_127 names had status 302
2212|_http-wordpress-enum: Nothing found amongst the top 100 resources,use --script-args search-limit=<number|all> for deeper analysis)
2213|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
2214|_http-xssed: No previously reported XSS vuln.
2215| vulscan: VulDB - https://vuldb.com:
2216| [133852] Sangfor Sundray WLAN Controller up to 3.7.4.2 Cookie Header nginx_webconsole.php Code Execution
2217| [132132] SoftNAS Cloud 4.2.0/4.2.1 Nginx privilege escalation
2218| [131858] Puppet Discovery up to 1.3.x Nginx Container weak authentication
2219| [130644] Nginx Unit up to 1.7.0 Router Process Request Heap-based memory corruption
2220| [127759] VeryNginx 0.3.3 Web Application Firewall privilege escalation
2221| [126525] nginx up to 1.14.0/1.15.5 ngx_http_mp4_module Loop denial of service
2222| [126524] nginx up to 1.14.0/1.15.5 HTTP2 CPU Exhaustion denial of service
2223| [126523] nginx up to 1.14.0/1.15.5 HTTP2 Memory Consumption denial of service
2224| [119845] Pivotal Operations Manager up to 2.0.13/2.1.5 Nginx privilege escalation
2225| [114368] SuSE Portus 2.3 Nginx Certificate weak authentication
2226| [103517] nginx up to 1.13.2 Range Filter Request Integer Overflow memory corruption
2227| [89849] nginx RFC 3875 Namespace Conflict Environment Variable Open Redirect
2228| [87719] nginx up to 1.11.0 ngx_files.c ngx_chain_to_iovec denial of service
2229| [80760] nginx 0.6.18/1.9.9 DNS CNAME Record Crash denial of service
2230| [80759] nginx 0.6.18/1.9.9 DNS CNAME Record Use-After-Free denial of service
2231| [80758] nginx 0.6.18/1.9.9 DNS UDP Packet Crash denial of service
2232| [67677] nginx up to 1.7.3 SSL weak authentication
2233| [67296] nginx up to 1.7.3 SMTP Proxy ngx_mail_smtp_starttls privilege escalation
2234| [12822] nginx up to 1.5.11 SPDY SPDY Request Heap-based memory corruption
2235| [12824] nginx 1.5.10 on 32-bit SPDY memory corruption
2236| [11237] nginx up to 1.5.6 URI String Bypass privilege escalation
2237| [65364] nginx up to 1.1.13 Default Configuration information disclosure
2238| [8671] nginx up to 1.4 proxy_pass denial of service
2239| [8618] nginx 1.3.9/1.4.0 http/ngx_http_parse.c ngx_http_parse_chunked() memory corruption
2240| [7247] nginx 1.2.6 Proxy Function spoofing
2241| [61434] nginx 1.2.0/1.3.0 on Windows Access Restriction privilege escalation
2242| [5293] nginx up to 1.1.18 ngx_http_mp4_module MP4 File memory corruption
2243| [4843] nginx up to 1.0.13/1.1.16 HTTP Header Response Parser ngx_http_parse.c information disclosure
2244| [59645] nginx up to 0.8.9 Heap-based memory corruption
2245| [53592] nginx 0.8.36 memory corruption
2246| [53590] nginx up to 0.8.9 unknown vulnerability
2247| [51533] nginx 0.7.64 Terminal privilege escalation
2248| [50905] nginx up to 0.8.9 directory traversal
2249| [50903] nginx up to 0.8.10 NULL Pointer Dereference denial of service
2250| [50043] nginx up to 0.8.10 memory corruption
2251|
2252| MITRE CVE - https://cve.mitre.org:
2253| [CVE-2013-2070] http/modules/ngx_http_proxy_module.c in nginx 1.1.4 through 1.2.8 and 1.3.0 through 1.4.0, when proxy_pass is used with untrusted HTTP servers, allows remote attackers to cause a denial of service (crash) and obtain sensitive information from worker process memory via a crafted proxy response, a similar vulnerability to CVE-2013-2028.
2254| [CVE-2013-2028] The ngx_http_parse_chunked function in http/ngx_http_parse.c in nginx 1.3.9 through 1.4.0 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a chunked Transfer-Encoding request with a large chunk size, which triggers an integer signedness error and a stack-based buffer overflow.
2255| [CVE-2012-3380] Directory traversal vulnerability in naxsi-ui/nx_extract.py in the Naxsi module before 0.46-1 for Nginx allows local users to read arbitrary files via unspecified vectors.
2256| [CVE-2012-2089] Buffer overflow in ngx_http_mp4_module.c in the ngx_http_mp4_module module in nginx 1.0.7 through 1.0.14 and 1.1.3 through 1.1.18, when the mp4 directive is used, allows remote attackers to cause a denial of service (memory overwrite) or possibly execute arbitrary code via a crafted MP4 file.
2257| [CVE-2012-1180] Use-after-free vulnerability in nginx before 1.0.14 and 1.1.x before 1.1.17 allows remote HTTP servers to obtain sensitive information from process memory via a crafted backend response, in conjunction with a client request.
2258| [CVE-2011-4963] nginx/Windows 1.3.x before 1.3.1 and 1.2.x before 1.2.1 allows remote attackers to bypass intended access restrictions and access restricted files via (1) a trailing . (dot) or (2) certain "$index_allocation" sequences in a request.
2259| [CVE-2011-4315] Heap-based buffer overflow in compression-pointer processing in core/ngx_resolver.c in nginx before 1.0.10 allows remote resolvers to cause a denial of service (daemon crash) or possibly have unspecified other impact via a long response.
2260| [CVE-2010-2266] nginx 0.8.36 allows remote attackers to cause a denial of service (crash) via certain encoded directory traversal sequences that trigger memory corruption, as demonstrated using the "%c0.%c0." sequence.
2261| [CVE-2010-2263] nginx 0.8 before 0.8.40 and 0.7 before 0.7.66, when running on Windows, allows remote attackers to obtain source code or unparsed content of arbitrary files under the web document root by appending ::$DATA to the URI.
2262| [CVE-2009-4487] nginx 0.7.64 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.
2263| [CVE-2009-3898] Directory traversal vulnerability in src/http/modules/ngx_http_dav_module.c in nginx (aka Engine X) before 0.7.63, and 0.8.x before 0.8.17, allows remote authenticated users to create or overwrite arbitrary files via a .. (dot dot) in the Destination HTTP header for the WebDAV (1) COPY or (2) MOVE method.
2264| [CVE-2009-3896] src/http/ngx_http_parse.c in nginx (aka Engine X) 0.1.0 through 0.4.14, 0.5.x before 0.5.38, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.14 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a long URI.
2265| [CVE-2009-2629] Buffer underflow in src/http/ngx_http_parse.c in nginx 0.1.0 through 0.5.37, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.15 allows remote attackers to execute arbitrary code via crafted HTTP requests.
2266|
2267| SecurityFocus - https://www.securityfocus.com/bid/:
2268| [99534] Nginx CVE-2017-7529 Remote Integer Overflow Vulnerability
2269| [93903] Nginx CVE-2016-1247 Remote Privilege Escalation Vulnerability
2270| [91819] Nginx CVE-2016-1000105 Security Bypass Vulnerability
2271| [90967] nginx CVE-2016-4450 Denial of Service Vulnerability
2272| [82230] nginx Multiple Denial of Service Vulnerabilities
2273| [78928] Nginx CVE-2010-2266 Denial-Of-Service Vulnerability
2274| [70025] nginx CVE-2014-3616 SSL Session Fixation Vulnerability
2275| [69111] nginx SMTP Proxy Remote Command Injection Vulnerability
2276| [67507] nginx SPDY Implementation CVE-2014-0088 Arbitrary Code Execution Vulnerability
2277| [66537] nginx SPDY Implementation Heap Based Buffer Overflow Vulnerability
2278| [63814] nginx CVE-2013-4547 URI Processing Security Bypass Vulnerability
2279| [59824] Nginx CVE-2013-2070 Remote Security Vulnerability
2280| [59699] nginx 'ngx_http_parse.c' Stack Buffer Overflow Vulnerability
2281| [59496] nginx 'ngx_http_close_connection()' Remote Integer Overflow Vulnerability
2282| [59323] nginx NULL-Byte Arbitrary Code Execution Vulnerability
2283| [58105] Nginx 'access.log' Insecure File Permissions Vulnerability
2284| [57139] nginx CVE-2011-4968 Man in The Middle Vulnerability
2285| [55920] nginx CVE-2011-4963 Security Bypass Vulnerability
2286| [54331] Nginx Naxsi Module 'nx_extract.py' Script Remote File Disclosure Vulnerability
2287| [52999] nginx 'ngx_http_mp4_module.c' Buffer Overflow Vulnerability
2288| [52578] nginx 'ngx_cpystrn()' Information Disclosure Vulnerability
2289| [50710] nginx DNS Resolver Remote Heap Buffer Overflow Vulnerability
2290| [40760] nginx Remote Source Code Disclosure and Denial of Service Vulnerabilities
2291| [40434] nginx Space String Remote Source Code Disclosure Vulnerability
2292| [40420] nginx Directory Traversal Vulnerability
2293| [37711] nginx Terminal Escape Sequence in Logs Command Injection Vulnerability
2294| [36839] nginx 'ngx_http_process_request_headers()' Remote Buffer Overflow Vulnerability
2295| [36490] nginx WebDAV Multiple Directory Traversal Vulnerabilities
2296| [36438] nginx Proxy DNS Cache Domain Spoofing Vulnerability
2297| [36384] nginx HTTP Request Remote Buffer Overflow Vulnerability
2298|
2299| IBM X-Force - https://exchange.xforce.ibmcloud.com:
2300| [84623] Phusion Passenger gem for Ruby with nginx configuration insecure permissions
2301| [84172] nginx denial of service
2302| [84048] nginx buffer overflow
2303| [83923] nginx ngx_http_close_connection() integer overflow
2304| [83688] nginx null byte code execution
2305| [83103] Naxsi module for Nginx naxsi_unescape_uri() function security bypass
2306| [82319] nginx access.log information disclosure
2307| [80952] nginx SSL spoofing
2308| [77244] nginx and Microsoft Windows request security bypass
2309| [76778] Naxsi module for Nginx nx_extract.py directory traversal
2310| [74831] nginx ngx_http_mp4_module.c buffer overflow
2311| [74191] nginx ngx_cpystrn() information disclosure
2312| [74045] nginx header response information disclosure
2313| [71355] nginx ngx_resolver_copy() buffer overflow
2314| [59370] nginx characters denial of service
2315| [59369] nginx DATA source code disclosure
2316| [59047] nginx space source code disclosure
2317| [58966] nginx unspecified directory traversal
2318| [54025] nginx ngx_http_parse.c denial of service
2319| [53431] nginx WebDAV component directory traversal
2320| [53328] Nginx CRC-32 cached domain name spoofing
2321| [53250] Nginx ngx_http_parse_complex_uri() function code execution
2322|
2323| Exploit-DB - https://www.exploit-db.com:
2324| [26737] nginx 1.3.9/1.4.0 x86 Brute Force Remote Exploit
2325| [25775] Nginx HTTP Server 1.3.9-1.4.0 Chuncked Encoding Stack Buffer Overflow
2326| [25499] nginx 1.3.9-1.4.0 DoS PoC
2327| [24967] nginx 0.6.x Arbitrary Code Execution NullByte Injection
2328| [14830] nginx 0.6.38 - Heap Corruption Exploit
2329| [13822] Nginx <= 0.7.65 / 0.8.39 (dev) Source Disclosure / Download Vulnerability
2330| [13818] Nginx 0.8.36 Source Disclosure and DoS Vulnerabilities
2331| [12804] nginx [engine x] http server <= 0.6.36 Path Draversal
2332| [9901] nginx 0.7.0-0.7.61, 0.6.0-0.6.38, 0.5.0-0.5.37, 0.4.0-0.4.14 PoC
2333| [9829] nginx 0.7.61 WebDAV directory traversal
2334|
2335| OpenVAS (Nessus) - http://www.openvas.org:
2336| [864418] Fedora Update for nginx FEDORA-2012-3846
2337| [864310] Fedora Update for nginx FEDORA-2012-6238
2338| [864209] Fedora Update for nginx FEDORA-2012-6411
2339| [864204] Fedora Update for nginx FEDORA-2012-6371
2340| [864121] Fedora Update for nginx FEDORA-2012-4006
2341| [864115] Fedora Update for nginx FEDORA-2012-3991
2342| [864065] Fedora Update for nginx FEDORA-2011-16075
2343| [863654] Fedora Update for nginx FEDORA-2011-16110
2344| [861232] Fedora Update for nginx FEDORA-2007-1158
2345| [850180] SuSE Update for nginx openSUSE-SU-2012:0237-1 (nginx)
2346| [831680] Mandriva Update for nginx MDVSA-2012:043 (nginx)
2347| [802045] 64-bit Debian Linux Rootkit with nginx Doing iFrame Injection
2348| [801636] nginx HTTP Request Remote Buffer Overflow Vulnerability
2349| [103470] nginx 'ngx_http_mp4_module.c' Buffer Overflow Vulnerability
2350| [103469] nginx 'ngx_cpystrn()' Information Disclosure Vulnerability
2351| [103344] nginx DNS Resolver Remote Heap Buffer Overflow Vulnerability
2352| [100676] nginx Remote Source Code Disclosure and Denial of Service Vulnerabilities
2353| [100659] nginx Directory Traversal Vulnerability
2354| [100658] nginx Space String Remote Source Code Disclosure Vulnerability
2355| [100441] nginx Terminal Escape Sequence in Logs Command Injection Vulnerability
2356| [100321] nginx 'ngx_http_process_request_headers()' Remote Buffer Overflow Vulnerability
2357| [100277] nginx Proxy DNS Cache Domain Spoofing Vulnerability
2358| [100276] nginx HTTP Request Remote Buffer Overflow Vulnerability
2359| [100275] nginx WebDAV Multiple Directory Traversal Vulnerabilities
2360| [71574] Gentoo Security Advisory GLSA 201206-07 (nginx)
2361| [71308] Gentoo Security Advisory GLSA 201203-22 (nginx)
2362| [71297] FreeBSD Ports: nginx
2363| [71276] FreeBSD Ports: nginx
2364| [71239] Debian Security Advisory DSA 2434-1 (nginx)
2365| [66451] Fedora Core 11 FEDORA-2009-12782 (nginx)
2366| [66450] Fedora Core 10 FEDORA-2009-12775 (nginx)
2367| [66449] Fedora Core 12 FEDORA-2009-12750 (nginx)
2368| [64924] Gentoo Security Advisory GLSA 200909-18 (nginx)
2369| [64912] Fedora Core 10 FEDORA-2009-9652 (nginx)
2370| [64911] Fedora Core 11 FEDORA-2009-9630 (nginx)
2371| [64894] FreeBSD Ports: nginx
2372| [64869] Debian Security Advisory DSA 1884-1 (nginx)
2373|
2374| SecurityTracker - https://www.securitytracker.com:
2375| [1028544] nginx Bug Lets Remote Users Deny Service or Obtain Potentially Sensitive Information
2376| [1028519] nginx Stack Overflow Lets Remote Users Execute Arbitrary Code
2377| [1026924] nginx Buffer Overflow in ngx_http_mp4_module Lets Remote Users Execute Arbitrary Code
2378| [1026827] nginx HTTP Response Processing Lets Remote Users Obtain Portions of Memory Contents
2379|
2380| OSVDB - http://www.osvdb.org:
2381| [94864] cPnginx Plugin for cPanel nginx Configuration Manipulation Arbitrary File Access
2382| [93282] nginx proxy_pass Crafted Upstream Proxied Server Response Handling Worker Process Memory Disclosure
2383| [93037] nginx /http/ngx_http_parse.c Worker Process Crafted Request Handling Remote Overflow
2384| [92796] nginx ngx_http_close_connection Function Crafted r->
2385| [92634] nginx ngx_http_request.h zero_in_uri URL Null Byte Handling Remote Code Execution
2386| [90518] nginx Log Directory Permission Weakness Local Information Disclosure
2387| [88910] nginx Proxy Functionality SSL Certificate Validation MitM Spoofing Weakness
2388| [84339] nginx/Windows Multiple Request Sequence Parsing Arbitrary File Access
2389| [83617] Naxsi Module for Nginx naxsi-ui/ nx_extract.py Traversal Arbitrary File Access
2390| [81339] nginx ngx_http_mp4_module Module Atom MP4 File Handling Remote Overflow
2391| [80124] nginx HTTP Header Response Parsing Freed Memory Information Disclosure
2392| [77184] nginx ngx_resolver.c ngx_resolver_copy() Function DNS Response Parsing Remote Overflow
2393| [65531] nginx on Windows URI ::$DATA Append Arbitrary File Access
2394| [65530] nginx Encoded Traversal Sequence Memory Corruption Remote DoS
2395| [65294] nginx on Windows Encoded Space Request Remote Source Disclosure
2396| [63136] nginx on Windows 8.3 Filename Alias Request Access Rules / Authentication Bypass
2397| [62617] nginx Internal DNS Cache Poisoning Weakness
2398| [61779] nginx HTTP Request Escape Sequence Terminal Command Injection
2399| [59278] nginx src/http/ngx_http_parse.c ngx_http_process_request_headers() Function URL Handling NULL Dereference DoS
2400| [58328] nginx WebDAV Multiple Method Traversal Arbitrary File Write
2401| [58128] nginx ngx_http_parse_complex_uri() Function Underflow
2402| [44447] nginx (engine x) msie_refresh Directive Unspecified XSS
2403| [44446] nginx (engine x) ssl_verify_client Directive HTTP/0.9 Protocol Bypass
2404| [44445] nginx (engine x) ngx_http_realip_module satisfy_any Directive Unspecified Access Bypass
2405| [44444] nginx (engine x) X-Accel-Redirect Header Unspecified Traversal
2406| [44443] nginx (engine x) rtsig Method Signal Queue Overflow
2407| [44442] nginx (engine x) Worker Process Millisecond Timers Unspecified Overflow
2408|_
2409Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2410Aggressive OS guesses: Blue Coat proxy server (SGOS 6.3.2.201) (91%), Apple TV 5.2.1 or 5.3 (91%), Apple iOS 10 (90%), Apple iPhone mobile phone (iOS 4.3.3) (90%), Apple iOS 5.0.1 (90%), Apple iOS 5.0.1 - 5.1.1 (90%), Apple iOS 6.1.3 (90%), Apple iOS 6.1.4 (Darwin 13.0.0) (90%), Apple iOS 9 (Darwin 15.0.0) (90%), Apple Mac OS X 10.7.0 (Lion) - 10.12 (Sierra) or iOS 4.1 - 9.3.3 (Darwin 10.0.0 - 16.4.0) (90%)
2411No exact OS matches for host (test conditions non-ideal).
2412Uptime guess: 5.218 days (since Mon Nov 4 23:58:09 2019)
2413Network Distance: 15 hops
2414TCP Sequence Prediction: Difficulty=263 (Good luck!)
2415IP ID Sequence Generation: Randomized
2416
2417TRACEROUTE (using port 80/tcp)
2418HOP RTT ADDRESS
24191 135.68 ms 10.223.200.1
24202 ...
24213 132.81 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
24224 132.76 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
24235 137.70 ms be3740.ccr21.sto03.atlas.cogentco.com (154.54.60.190)
24246 149.36 ms be2920.rcr21.vno01.atlas.cogentco.com (154.54.39.102)
24257 160.78 ms be2898.ccr21.waw01.atlas.cogentco.com (154.54.39.129)
24268 161.52 ms be2882.rcr21.b016833-0.waw01.atlas.cogentco.com (154.54.59.38)
24279 175.72 ms var-5-a9.pl.eu (54.36.50.94)
242810 178.59 ms fra-fr5-sbb2-nc5.de.eu (54.36.50.116)
242911 179.78 ms be103.rbx-g2-nc5.fr.eu (94.23.122.240)
243012 ...
243113 182.87 ms vl10.rbx1-c2-a72.fr.eu (94.23.122.75)
243214 ...
243315 180.45 ms cbos.dot.jo (91.121.115.139)
2434
2435NSE: Script Post-scanning.
2436Initiating NSE at 05:11
2437Completed NSE at 05:11, 0.00s elapsed
2438Initiating NSE at 05:11
2439Completed NSE at 05:11, 0.00s elapsed
2440#######################################################################################################################################
2441https://91.121.115.139 [200 OK] Content-Language[ar], Content-Security-Policy[default-src 'self' 'unsafe-inline' *.addthis.com; script-src 'self' 'unsafe-inline' 'unsafe-eval' *.jsdelivr.net *.googleapis.com *.gstatic.com *.bootstrapcdn.com *.google-analytics.com *.ckeditor.com *.local *.dotdemos.com *.jwplatform.com *.jwpcdn.com *.jwpsrv.com *.ytimg.com *.youtube.com cbos.gov.sd *.cbos.gov.sd *.dot.jo www.google.com s7.addthis.com m.addthisedge.com m.addthis.com cdnjs.cloudflare.com; object-src 'unsafe-inline'; style-src 'unsafe-inline' *.jsdelivr.net *.googleapis.com *.gstatic.com *.bootstrapcdn.com *.ckeditor.com *.local *.dotdemos.com cbos.gov.sd *.cbos.gov.sd *.dot.jo *.google.com cdnjs.cloudflare.com; img-src 'self' 'unsafe-inline' data: *.jsdelivr.net *.googleapis.com *.gstatic.com *.google-analytics.com *.local *.dotdemos.com jwpltx.com *.jwpltx.com cbos.gov.sd *.cbos.gov.sd *.dot.jo stats.g.doubleclick.net *.ckeditor.com; media-src 'self' 'unsafe-inline' data: *.jsdelivr.net *.googleapis.com *.gstatic.com *.google-analytics.com *.local *.dotdemos.com cbos.gov.sd *.cbos.gov.sd *.dot.jo; frame-src 'self' 'unsafe-inline' *.googleapis.com google.com *.google.com *.gstatic.com *.youtube.com *.local *.dotdemos.com cbos.gov.sd *.gov.sd *.dot.jo *.addthis.com cbos.gov.sd:*; font-src 'self' 'unsafe-inline' *.jsdelivr.net *.googleapis.com *.gstatic.com *.bootstrapcdn.com *.local *.dotdemos.com *.jwpcdn.com *.jwpsrv.com cbos.gov.sd *.cbos.gov.sd *.dot.jo fonts.google.com maxcdn.bootstrapcdn.com; connect-src 'self' 'unsafe-inline' *.googleapis.com google.com *.google.com *.gstatic.com *.youtube.com *.local *.dotdemos.com cbos.gov.sd *.gov.sd *.dot.jo *.addthis.com cbos.gov.sd:*; report-uri /admin/config/system/seckit/csp-report], Country[FRANCE][FR], Drupal, Email[info@cbos.gov.sd], IP[91.121.115.139], MetaGenerator[Drupal 7 (http://drupal.org)], Script, Strict-Transport-Security[max-age=15552000], Title[CBOS], UncommonHeaders[x-drupal-cache,content-security-policy,x-content-security-policy,x-webkit-csp,from-origin,x-content-type-options], X-Frame-Options[SAMEORIGIN, SAMEORIGIN], X-XSS-Protection[1; mode=block]
2442#######################################################################################################################################
2443Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-10 05:12 EST
2444NSE: Loaded 163 scripts for scanning.
2445NSE: Script Pre-scanning.
2446Initiating NSE at 05:12
2447Completed NSE at 05:12, 0.00s elapsed
2448Initiating NSE at 05:12
2449Completed NSE at 05:12, 0.00s elapsed
2450Initiating Parallel DNS resolution of 1 host. at 05:12
2451Completed Parallel DNS resolution of 1 host. at 05:12, 0.02s elapsed
2452Initiating SYN Stealth Scan at 05:12
2453Scanning cbos.dot.jo (91.121.115.139) [1 port]
2454Discovered open port 443/tcp on 91.121.115.139
2455Completed SYN Stealth Scan at 05:12, 0.21s elapsed (1 total ports)
2456Initiating Service scan at 05:12
2457Scanning 1 service on cbos.dot.jo (91.121.115.139)
2458Completed Service scan at 05:12, 2.35s elapsed (1 service on 1 host)
2459Initiating OS detection (try #1) against cbos.dot.jo (91.121.115.139)
2460Retrying OS detection (try #2) against cbos.dot.jo (91.121.115.139)
2461Initiating Traceroute at 05:12
2462Completed Traceroute at 05:12, 3.16s elapsed
2463Initiating Parallel DNS resolution of 12 hosts. at 05:12
2464Completed Parallel DNS resolution of 12 hosts. at 05:12, 0.24s elapsed
2465NSE: Script scanning 91.121.115.139.
2466Initiating NSE at 05:12
2467Completed NSE at 05:15, 122.97s elapsed
2468Initiating NSE at 05:15
2469Completed NSE at 05:15, 0.73s elapsed
2470Nmap scan report for cbos.dot.jo (91.121.115.139)
2471Host is up (0.18s latency).
2472
2473PORT STATE SERVICE VERSION
2474443/tcp open tcpwrapped
2475| http-brute:
2476|_ Path "/" does not require authentication
2477|_http-chrono: Request times for /; avg: 868.00ms; min: 604.76ms; max: 1150.73ms
2478| http-csrf:
2479| Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=cbos.dot.jo
2480| Found the following possible CSRF vulnerabilities:
2481|
2482| Path: http://cbos.dot.jo:443/
2483| Form id: views-exposed-form-search-multi-page
2484| Form action: /ar/search-multi
2485|
2486| Path: http://cbos.dot.jo:443/
2487| Form id: poll-view-voting
2488| Form action: /
2489|
2490| Path: http://cbos.dot.jo:443/
2491| Form id: simplenews-block-form-8
2492| Form action: /
2493|
2494| Path: http://cbos.dot.jo:443/ar/image-gallery
2495| Form id: views-exposed-form-search-multi-page
2496| Form action: /ar/search-multi
2497|
2498| Path: http://cbos.dot.jo:443/ar/image-gallery
2499| Form id: simplenews-block-form-8
2500| Form action: /ar/image-gallery
2501|
2502| Path: http://cbos.dot.jo:443/ar/content/%d9%82%d8%a7%d9%86%d9%88%d9%86-%d8%a8%d9%86%d9%83-%d8%a7%d9%84%d8%b3%d9%88%d8%af%d8%a7%d9%86-%d9%84%d8%b3%d9%86%d8%a9-2002-%d9%85%d8%b9%d8%af%d9%84%d8%a7-%d8%ad%d8%aa%d9%89-2012
2503| Form id: views-exposed-form-search-multi-page
2504| Form action: /ar/search-multi
2505|
2506| Path: http://cbos.dot.jo:443/ar/content/%d9%82%d8%a7%d9%86%d9%88%d9%86-%d8%a8%d9%86%d9%83-%d8%a7%d9%84%d8%b3%d9%88%d8%af%d8%a7%d9%86-%d9%84%d8%b3%d9%86%d8%a9-2002-%d9%85%d8%b9%d8%af%d9%84%d8%a7-%d8%ad%d8%aa%d9%89-2012
2507| Form id: simplenews-block-form-8
2508| Form action: /ar/content/%d9%82%d8%a7%d9%86%d9%88%d9%86-%d8%a8%d9%86%d9%83-%d8%a7%d9%84%d8%b3%d9%88%d8%af%d8%a7%d9%86-%d9%84%d8%b3%d9%86%d8%a9-2002-%d9%85%d8%b9%d8%af%d9%84%d8%a7-%d8%ad%d8%aa%d9%89-2012
2509|
2510| Path: http://cbos.dot.jo:443/ar/poll
2511| Form id: views-exposed-form-search-multi-page
2512| Form action: /ar/search-multi
2513|
2514| Path: http://cbos.dot.jo:443/ar/poll
2515| Form id: simplenews-block-form-8
2516| Form action: /ar/poll
2517|
2518| Path: http://cbos.dot.jo:443/ar/content/%d9%82%d8%a7%d8%b9%d8%af%d8%a9-%d8%a7%d9%84%d8%a8%d9%8a%d8%a7%d9%86%d8%a7%d8%aa-%d8%a7%d9%84%d8%a7%d8%ad%d8%b5%d8%a7%d8%a6%d9%8a%d8%a9
2519| Form id: views-exposed-form-search-multi-page
2520| Form action: /ar/search-multi
2521|
2522| Path: http://cbos.dot.jo:443/ar/content/%d9%82%d8%a7%d8%b9%d8%af%d8%a9-%d8%a7%d9%84%d8%a8%d9%8a%d8%a7%d9%86%d8%a7%d8%aa-%d8%a7%d9%84%d8%a7%d8%ad%d8%b5%d8%a7%d8%a6%d9%8a%d8%a9
2523| Form id: simplenews-block-form-8
2524| Form action: /ar/content/%d9%82%d8%a7%d8%b9%d8%af%d8%a9-%d8%a7%d9%84%d8%a8%d9%8a%d8%a7%d9%86%d8%a7%d8%aa-%d8%a7%d9%84%d8%a7%d8%ad%d8%b5%d8%a7%d8%a6%d9%8a%d8%a9
2525|
2526| Path: http://cbos.dot.jo:443/ar/content/%d9%82%d8%a7%d9%86%d9%88%d9%86-%d8%ac%d8%b1%d8%a7%d8%a6%d9%85-%d8%a7%d9%84%d9%85%d8%b9%d9%84%d9%88%d9%85%d8%a7%d8%aa%d9%8a%d8%a9-%d9%84%d8%b3%d9%86%d8%a9-2007
2527| Form id: views-exposed-form-search-multi-page
2528| Form action: /ar/search-multi
2529|
2530| Path: http://cbos.dot.jo:443/ar/content/%d9%82%d8%a7%d9%86%d9%88%d9%86-%d8%ac%d8%b1%d8%a7%d8%a6%d9%85-%d8%a7%d9%84%d9%85%d8%b9%d9%84%d9%88%d9%85%d8%a7%d8%aa%d9%8a%d8%a9-%d9%84%d8%b3%d9%86%d8%a9-2007
2531| Form id: simplenews-block-form-8
2532| Form action: /ar/content/%d9%82%d8%a7%d9%86%d9%88%d9%86-%d8%ac%d8%b1%d8%a7%d8%a6%d9%85-%d8%a7%d9%84%d9%85%d8%b9%d9%84%d9%88%d9%85%d8%a7%d8%aa%d9%8a%d8%a9-%d9%84%d8%b3%d9%86%d8%a9-2007
2533|
2534| Path: http://cbos.dot.jo:443/ar/content/%d9%84%d8%a7%d8%a6%d8%ad%d8%a9-%d8%aa%d9%86%d8%b8%d9%8a%d9%85-%d8%b4%d8%b1%d9%83%d8%a7%d8%aa-%d8%a7%d9%84%d8%b5%d8%b1%d8%a7%d9%81%d8%a9-%d9%84%d8%b3%d9%86%d8%a9-2011%d9%85
2535| Form id: views-exposed-form-search-multi-page
2536| Form action: /ar/search-multi
2537|
2538| Path: http://cbos.dot.jo:443/ar/content/%d9%84%d8%a7%d8%a6%d8%ad%d8%a9-%d8%aa%d9%86%d8%b8%d9%8a%d9%85-%d8%b4%d8%b1%d9%83%d8%a7%d8%aa-%d8%a7%d9%84%d8%b5%d8%b1%d8%a7%d9%81%d8%a9-%d9%84%d8%b3%d9%86%d8%a9-2011%d9%85
2539| Form id: simplenews-block-form-8
2540| Form action: /ar/content/%d9%84%d8%a7%d8%a6%d8%ad%d8%a9-%d8%aa%d9%86%d8%b8%d9%8a%d9%85-%d8%b4%d8%b1%d9%83%d8%a7%d8%aa-%d8%a7%d9%84%d8%b5%d8%b1%d8%a7%d9%81%d8%a9-%d9%84%d8%b3%d9%86%d8%a9-2011%d9%85
2541|
2542| Path: http://cbos.dot.jo:443/ar/search-multi
2543| Form id: views-exposed-form-search-multi-page
2544| Form action: /ar/search-multi
2545|
2546| Path: http://cbos.dot.jo:443/ar/search-multi
2547| Form id: views-exposed-form-search-multi-page
2548| Form action: /ar/search-multi
2549|
2550| Path: http://cbos.dot.jo:443/ar/search-multi
2551| Form id: simplenews-block-form-8
2552| Form action: /ar/search-multi
2553|
2554| Path: http://cbos.dot.jo:443/ar/sitemap
2555| Form id: views-exposed-form-search-multi-page
2556| Form action: /ar/search-multi
2557|
2558| Path: http://cbos.dot.jo:443/ar/sitemap
2559| Form id: simplenews-block-form-8
2560| Form action: /ar/sitemap
2561|
2562| Path: http://cbos.dot.jo:443/ar/banks-and-exchange-prices
2563| Form id: views-exposed-form-search-multi-page
2564| Form action: /ar/search-multi
2565|
2566| Path: http://cbos.dot.jo:443/ar/banks-and-exchange-prices
2567| Form id: views-exposed-form-banks-and-exchange-prices-page
2568| Form action: /ar/banks-and-exchange-prices
2569|
2570| Path: http://cbos.dot.jo:443/ar/banks-and-exchange-prices
2571| Form id: simplenews-block-form-8
2572| Form action: /ar/banks-and-exchange-prices
2573|
2574| Path: http://cbos.dot.jo:443/ar/content/%d9%84%d8%a7%d8%a6%d8%ad%d8%a9-%d8%aa%d9%86%d8%b8%d9%8a%d9%85-%d8%a3%d8%b9%d9%85%d8%a7%d9%84-%d9%86%d8%b8%d9%85-%d8%a7%d9%84%d8%af%d9%81%d8%b9
2575| Form id: views-exposed-form-search-multi-page
2576| Form action: /ar/search-multi
2577|
2578| Path: http://cbos.dot.jo:443/ar/content/%d9%84%d8%a7%d8%a6%d8%ad%d8%a9-%d8%aa%d9%86%d8%b8%d9%8a%d9%85-%d8%a3%d8%b9%d9%85%d8%a7%d9%84-%d9%86%d8%b8%d9%85-%d8%a7%d9%84%d8%af%d9%81%d8%b9
2579| Form id: simplenews-block-form-8
2580| Form action: /ar/content/%d9%84%d8%a7%d8%a6%d8%ad%d8%a9-%d8%aa%d9%86%d8%b8%d9%8a%d9%85-%d8%a3%d8%b9%d9%85%d8%a7%d9%84-%d9%86%d8%b8%d9%85-%d8%a7%d9%84%d8%af%d9%81%d8%b9
2581|
2582| Path: http://cbos.dot.jo:443/ar/content/%d9%84%d8%a7%d8%a6%d8%ad%d8%a9-%d8%aa%d9%86%d8%b8%d9%8a%d9%85-%d8%b9%d9%85%d9%84-%d9%85%d8%b5%d8%a7%d8%b1%d9%81-%d8%a7%d9%84%d8%aa%d9%86%d9%85%d9%8a%d8%a9-%d9%88%d8%a7%d9%84%d8%a7%d8%b3%d8%aa%d8%ab%d9%85%d8%a7%d8%b1-%d9%84%d8%b3%d9%86%d8%a9-2011%d9%85
2583| Form id: views-exposed-form-search-multi-page
2584| Form action: /ar/search-multi
2585|
2586| Path: http://cbos.dot.jo:443/ar/content/%d9%84%d8%a7%d8%a6%d8%ad%d8%a9-%d8%aa%d9%86%d8%b8%d9%8a%d9%85-%d8%b9%d9%85%d9%84-%d9%85%d8%b5%d8%a7%d8%b1%d9%81-%d8%a7%d9%84%d8%aa%d9%86%d9%85%d9%8a%d8%a9-%d9%88%d8%a7%d9%84%d8%a7%d8%b3%d8%aa%d8%ab%d9%85%d8%a7%d8%b1-%d9%84%d8%b3%d9%86%d8%a9-2011%d9%85
2587| Form id: simplenews-block-form-8
2588| Form action: /ar/content/%d9%84%d8%a7%d8%a6%d8%ad%d8%a9-%d8%aa%d9%86%d8%b8%d9%8a%d9%85-%d8%b9%d9%85%d9%84-%d9%85%d8%b5%d8%a7%d8%b1%d9%81-%d8%a7%d9%84%d8%aa%d9%86%d9%85%d9%8a%d8%a9-%d9%88%d8%a7%d9%84%d8%a7%d8%b3%d8%aa%d8%ab%d9%85%d8%a7%d8%b1-%d9%84%d8%b3%d9%86%d8%a9-2011%d9%85
2589|
2590| Path: http://cbos.dot.jo:443/ar/content/%d9%82%d8%a7%d9%86%d9%88%d9%86-%d8%a7%d9%84%d9%85%d8%b9%d8%a7%d9%85%d9%84%d8%a7%d8%aa-%d8%a7%d9%84%d8%a7%d9%84%d9%83%d8%aa%d8%b1%d9%88%d9%86%d9%8a%d8%a9
2591| Form id: views-exposed-form-search-multi-page
2592| Form action: /ar/search-multi
2593|
2594| Path: http://cbos.dot.jo:443/ar/content/%d9%82%d8%a7%d9%86%d9%88%d9%86-%d8%a7%d9%84%d9%85%d8%b9%d8%a7%d9%85%d9%84%d8%a7%d8%aa-%d8%a7%d9%84%d8%a7%d9%84%d9%83%d8%aa%d8%b1%d9%88%d9%86%d9%8a%d8%a9
2595| Form id: simplenews-block-form-8
2596| Form action: /ar/content/%d9%82%d8%a7%d9%86%d9%88%d9%86-%d8%a7%d9%84%d9%85%d8%b9%d8%a7%d9%85%d9%84%d8%a7%d8%aa-%d8%a7%d9%84%d8%a7%d9%84%d9%83%d8%aa%d8%b1%d9%88%d9%86%d9%8a%d8%a9
2597|
2598| Path: http://cbos.dot.jo:443/ar/content/%d8%a3%d8%b3%d8%b9%d8%a7%d8%b1-%d8%a7%d9%84%d8%b5%d8%b1%d9%81
2599| Form id: views-exposed-form-search-multi-page
2600| Form action: /ar/search-multi
2601|
2602| Path: http://cbos.dot.jo:443/ar/content/%d8%a3%d8%b3%d8%b9%d8%a7%d8%b1-%d8%a7%d9%84%d8%b5%d8%b1%d9%81
2603| Form id: simplenews-block-form-8
2604| Form action: /ar/content/%d8%a3%d8%b3%d8%b9%d8%a7%d8%b1-%d8%a7%d9%84%d8%b5%d8%b1%d9%81
2605|
2606| Path: http://cbos.dot.jo:443/ar/content/%d8%b3%d9%8a%d8%a7%d8%b3%d8%a7%d8%aa-%d8%a8%d9%86%d9%83-%d8%a7%d9%84%d8%b3%d9%88%d8%af%d8%a7%d9%86-%d8%a7%d9%84%d9%85%d8%b1%d9%83%d8%b2%d9%8a-%d9%84%d9%84%d8%b9%d8%a7%d9%85-2014
2607| Form id: views-exposed-form-search-multi-page
2608| Form action: /ar/search-multi
2609|
2610| Path: http://cbos.dot.jo:443/ar/content/%d8%b3%d9%8a%d8%a7%d8%b3%d8%a7%d8%aa-%d8%a8%d9%86%d9%83-%d8%a7%d9%84%d8%b3%d9%88%d8%af%d8%a7%d9%86-%d8%a7%d9%84%d9%85%d8%b1%d9%83%d8%b2%d9%8a-%d9%84%d9%84%d8%b9%d8%a7%d9%85-2014
2611| Form id: simplenews-block-form-8
2612| Form action: /ar/content/%d8%b3%d9%8a%d8%a7%d8%b3%d8%a7%d8%aa-%d8%a8%d9%86%d9%83-%d8%a7%d9%84%d8%b3%d9%88%d8%af%d8%a7%d9%86-%d8%a7%d9%84%d9%85%d8%b1%d9%83%d8%b2%d9%8a-%d9%84%d9%84%d8%b9%d8%a7%d9%85-2014
2613|
2614| Path: http://cbos.dot.jo:443/ar/content/%d8%a7%d9%84%d8%ae%d8%b7%d8%a9-%d8%a7%d9%84%d8%a5%d8%b3%d8%aa%d8%b1%d8%a7%d8%aa%d9%8a%d8%ac%d9%8a%d8%a9-%d8%a7%d9%84%d8%ae%d9%85%d8%b3%d9%8a%d8%a9-%d8%a7%d9%84%d8%ab%d8%a7%d9%86%d9%8a%d8%a9-2012-2016
2615| Form id: views-exposed-form-search-multi-page
2616| Form action: /ar/search-multi
2617|
2618| Path: http://cbos.dot.jo:443/ar/content/%d8%a7%d9%84%d8%ae%d8%b7%d8%a9-%d8%a7%d9%84%d8%a5%d8%b3%d8%aa%d8%b1%d8%a7%d8%aa%d9%8a%d8%ac%d9%8a%d8%a9-%d8%a7%d9%84%d8%ae%d9%85%d8%b3%d9%8a%d8%a9-%d8%a7%d9%84%d8%ab%d8%a7%d9%86%d9%8a%d8%a9-2012-2016
2619| Form id: simplenews-block-form-8
2620| Form action: /ar/content/%d8%a7%d9%84%d8%ae%d8%b7%d8%a9-%d8%a7%d9%84%d8%a5%d8%b3%d8%aa%d8%b1%d8%a7%d8%aa%d9%8a%d8%ac%d9%8a%d8%a9-%d8%a7%d9%84%d8%ae%d9%85%d8%b3%d9%8a%d8%a9-%d8%a7%d9%84%d8%ab%d8%a7%d9%86%d9%8a%d8%a9-2012-2016
2621|
2622| Path: http://cbos.dot.jo:443/ar/content/%d9%85%d8%a4%d8%b4%d8%b1%d8%a7%d8%aa-%d8%a7%d9%82%d8%aa%d8%b5%d8%a7%d8%af%d9%8a%d8%a9-0
2623| Form id: views-exposed-form-search-multi-page
2624| Form action: /ar/search-multi
2625|
2626| Path: http://cbos.dot.jo:443/ar/content/%d9%85%d8%a4%d8%b4%d8%b1%d8%a7%d8%aa-%d8%a7%d9%82%d8%aa%d8%b5%d8%a7%d8%af%d9%8a%d8%a9-0
2627| Form id: simplenews-block-form-8
2628| Form action: /ar/content/%d9%85%d8%a4%d8%b4%d8%b1%d8%a7%d8%aa-%d8%a7%d9%82%d8%aa%d8%b5%d8%a7%d8%af%d9%8a%d8%a9-0
2629|
2630| Path: http://cbos.dot.jo:443/ar/periodicals-publications?field_publication_type_tid_i18n=242
2631| Form id: views-exposed-form-search-multi-page
2632| Form action: /ar/search-multi
2633|
2634| Path: http://cbos.dot.jo:443/ar/periodicals-publications?field_publication_type_tid_i18n=242
2635| Form id: views-exposed-form-periodicals-and-publications-page-1
2636| Form action: /ar/periodicals-publications
2637|
2638| Path: http://cbos.dot.jo:443/ar/periodicals-publications?field_publication_type_tid_i18n=242
2639| Form id: simplenews-block-form-8
2640| Form action: /ar/periodicals-publications?field_publication_type_tid_i18n=242
2641|
2642| Path: http://cbos.dot.jo:443/ar/content/%d8%ae%d8%af%d9%85%d8%a9-%d8%a7%d9%84%d8%b9%d9%85%d9%84%d8%a7%d8%a1-0
2643| Form id: views-exposed-form-search-multi-page
2644| Form action: /ar/search-multi
2645|
2646| Path: http://cbos.dot.jo:443/ar/content/%d8%ae%d8%af%d9%85%d8%a9-%d8%a7%d9%84%d8%b9%d9%85%d9%84%d8%a7%d8%a1-0
2647| Form id: simplenews-block-form-8
2648| Form action: /ar/content/%d8%ae%d8%af%d9%85%d8%a9-%d8%a7%d9%84%d8%b9%d9%85%d9%84%d8%a7%d8%a1-0
2649|
2650| Path: http://cbos.dot.jo:443/ar/news/%d8%a7%d9%84%d9%85%d8%b1%d9%83%d8%b2%d9%8a-%d9%8a%d8%b7%d8%b1%d8%ad-%d9%81%d8%a6%d8%a7%d8%aa-%d8%b9%d9%85%d9%84%d8%a9-%d9%86%d9%82%d8%af%d9%8a%d8%a9-%d8%ac%d8%af%d9%8a%d8%af%d8%a9-%d9%85%d9%86-%d9%81%d8%a6%d8%a9-%d8%a7%d9%84%d9%85%d8%a7%d8%a6%d8%a9-%d9%88%d8%a7%d9%84%d9%85%d8%a7%d8%a6%d8%aa%d9%8a-%d8%ac%d9%86%d9%8a%d9%87
2651| Form id: views-exposed-form-search-multi-page
2652| Form action: /ar/search-multi
2653|
2654| Path: http://cbos.dot.jo:443/ar/news/%d8%a7%d9%84%d9%85%d8%b1%d9%83%d8%b2%d9%8a-%d9%8a%d8%b7%d8%b1%d8%ad-%d9%81%d8%a6%d8%a7%d8%aa-%d8%b9%d9%85%d9%84%d8%a9-%d9%86%d9%82%d8%af%d9%8a%d8%a9-%d8%ac%d8%af%d9%8a%d8%af%d8%a9-%d9%85%d9%86-%d9%81%d8%a6%d8%a9-%d8%a7%d9%84%d9%85%d8%a7%d8%a6%d8%a9-%d9%88%d8%a7%d9%84%d9%85%d8%a7%d8%a6%d8%aa%d9%8a-%d8%ac%d9%86%d9%8a%d9%87
2655| Form id: simplenews-block-form-8
2656|_ Form action: /ar/news/%d8%a7%d9%84%d9%85%d8%b1%d9%83%d8%b2%d9%8a-%d9%8a%d8%b7%d8%b1%d8%ad-%d9%81%d8%a6%d8%a7%d8%aa-%d8%b9%d9%85%d9%84%d8%a9-%d9%86%d9%82%d8%af%d9%8a%d8%a9-%d8%ac%d8%af%d9%8a%d8%af%d8%a9-%d9%85%d9%86-%d9%81%d8%a6%d8%a9-%d8%a7%d9%84%d9%85%d8%a7%d8%a6%d8%a9-%d9%88%d8%a7%d9%84%d9%85%d8%a7%d8%a6%d8%aa%d9%8a-%d8%ac%d9%86%d9%8a%d9%87
2657|_http-date: Sun, 10 Nov 2019 10:13:03 GMT; -1s from local time.
2658|_http-devframework: Drupal detected. Found common traces on /
2659|_http-dombased-xss: Couldn't find any DOM based XSS.
2660|_http-drupal-enum: Nothing found amongst the top 100 resources,use --script-args number=<number|all> for deeper analysis)
2661|_http-errors: Couldn't find any error pages.
2662|_http-feed: Couldn't find any feeds.
2663|_http-fetch: Please enter the complete path of the directory to save data in.
2664| http-grep:
2665| (2) http://cbos.dot.jo:443/:
2666| (1) ip:
2667| + 196.1.210.38
2668| (1) email:
2669| + info@cbos.gov.sd
2670| (1) http://cbos.dot.jo:443/ar/content/%d9%82%d8%a7%d8%b9%d8%af%d8%a9-%d8%a7%d9%84%d8%a8%d9%8a%d8%a7%d9%86%d8%a7%d8%aa-%d8%a7%d9%84%d8%a7%d8%ad%d8%b5%d8%a7%d8%a6%d9%8a%d8%a9:
2671| (1) email:
2672|_ + statistics@cbos.gov.sd
2673| http-headers:
2674| Date: Sun, 10 Nov 2019 10:13:06 GMT
2675| Content-Type: text/html; charset=utf-8
2676| Content-Length: 264
2677| Connection: close
2678|
2679|_ (Request type: GET)
2680|_http-jsonp-detection: Couldn't find any JSONP endpoints.
2681|_http-mobileversion-checker: No mobile version detected.
2682| http-security-headers:
2683| Strict_Transport_Security:
2684|_ HSTS not configured in HTTPS Server
2685| http-sitemap-generator:
2686| Directory structure:
2687| /
2688| Other: 1
2689| /ar/
2690| Other: 5
2691| /ar/about-cbos/
2692| Other: 1
2693| /ar/content/
2694| Other: 13
2695| Longest directory structure:
2696| Depth: 2
2697| Dir: /ar/content/
2698| Total files found (by extension):
2699|_ Other: 20
2700|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
2701|_http-title: 400 The plain HTTP request was sent to HTTPS port
2702| http-vhosts:
2703|_127 names had status 400
2704|_http-wordpress-enum: Nothing found amongst the top 100 resources,use --script-args search-limit=<number|all> for deeper analysis)
2705|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
2706|_http-xssed: No previously reported XSS vuln.
2707Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2708Aggressive OS guesses: Blue Coat proxy server (SGOS 6.3.2.201) (91%), Apple TV 5.2.1 or 5.3 (91%), Apple iOS 9.0 (Darwin 15.0.0) (90%), Apple iOS 10 (90%), Apple iPhone mobile phone (iOS 4.3.3) (90%), Apple iOS 5.0.1 (90%), Apple iOS 5.0.1 - 5.1.1 (90%), Apple iOS 6.1.3 (90%), Apple iOS 6.0.1 (90%), Apple iOS 6.1.4 (Darwin 13.0.0) (90%)
2709No exact OS matches for host (test conditions non-ideal).
2710Uptime guess: 34.827 days (since Sun Oct 6 10:23:38 2019)
2711Network Distance: 15 hops
2712TCP Sequence Prediction: Difficulty=263 (Good luck!)
2713IP ID Sequence Generation: Randomized
2714
2715TRACEROUTE (using port 443/tcp)
2716HOP RTT ADDRESS
27171 135.27 ms 10.223.200.1
27182 ...
27193 135.95 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
27204 135.79 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
27215 141.27 ms be3741.ccr22.sto03.atlas.cogentco.com (154.54.60.194)
27226 153.06 ms be2842.rcr21.vno01.atlas.cogentco.com (130.117.51.161)
27237 160.51 ms be2898.ccr21.waw01.atlas.cogentco.com (154.54.39.129)
27248 160.70 ms be2882.rcr21.b016833-0.waw01.atlas.cogentco.com (154.54.59.38)
27259 174.94 ms var-5-a9.pl.eu (54.36.50.94)
272610 177.75 ms fra-fr5-sbb2-nc5.de.eu (54.36.50.116)
272711 196.90 ms be103.rbx-g2-nc5.fr.eu (94.23.122.240)
272812 ...
272913 180.07 ms vl11.rbx1-c2-a72.fr.eu (178.33.100.253)
273014 ...
273115 179.84 ms cbos.dot.jo (91.121.115.139)
2732
2733NSE: Script Post-scanning.
2734Initiating NSE at 05:15
2735Completed NSE at 05:15, 0.00s elapsed
2736Initiating NSE at 05:15
2737Completed NSE at 05:15, 0.00s elapsed
2738#######################################################################################################################################
2739Version: 1.11.13-static
2740OpenSSL 1.0.2-chacha (1.0.2g-dev)
2741
2742Connected to 91.121.115.139
2743
2744Testing SSL server 91.121.115.139 on port 443 using SNI name 91.121.115.139
2745
2746 TLS Fallback SCSV:
2747Server supports TLS Fallback SCSV
2748
2749 TLS renegotiation:
2750Session renegotiation not supported
2751
2752 TLS Compression:
2753Compression disabled
2754
2755 Heartbleed:
2756TLS 1.2 not vulnerable to heartbleed
2757TLS 1.1 not vulnerable to heartbleed
2758TLS 1.0 not vulnerable to heartbleed
2759
2760 Supported Server Cipher(s):
2761Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
2762Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
2763Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
2764Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
2765
2766 SSL Certificate:
2767Signature Algorithm: sha256WithRSAEncryption
2768RSA Key Strength: 2048
2769
2770Subject: cbos.gov.sd
2771Altnames: DNS:cbos.gov.sd, DNS:www.cbos.gov.sd
2772Issuer: Let's Encrypt Authority X3
2773
2774Not valid before: Aug 31 13:30:14 2019 GMT
2775Not valid after: Nov 29 13:30:14 2019 GMT
2776#######################################################################################################################################
2777-+---------------------------------------------------------------+----------+----------+
2778| App Name | URL to Application | Potential Exploit | Username | Password |
2779+-----------------+--------------------------------------------+---------------------------------------------------------------+----------+----------+
2780| Apache ActiveMQ | https://91.121.115.139:443/admin/index.jsp | ./auxiliary/scanner/http/apache_activemq_source_disclosure.rb | | |
2781+-----------------+--------------------------------------------+---------------------------------------------------------------+----------+----------+
2782#######################################################################################################################################
2783Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-10 05:19 EST
2784NSE: Loaded 47 scripts for scanning.
2785NSE: Script Pre-scanning.
2786Initiating NSE at 05:19
2787Completed NSE at 05:19, 0.00s elapsed
2788Initiating NSE at 05:19
2789Completed NSE at 05:19, 0.00s elapsed
2790Initiating Ping Scan at 05:19
2791Scanning 91.121.115.139 [4 ports]
2792Completed Ping Scan at 05:19, 0.23s elapsed (1 total hosts)
2793Initiating Parallel DNS resolution of 1 host. at 05:19
2794Completed Parallel DNS resolution of 1 host. at 05:19, 0.02s elapsed
2795Initiating SYN Stealth Scan at 05:19
2796Scanning cbos.dot.jo (91.121.115.139) [65535 ports]
2797Discovered open port 80/tcp on 91.121.115.139
2798Discovered open port 443/tcp on 91.121.115.139
2799Discovered open port 22/tcp on 91.121.115.139
2800SYN Stealth Scan Timing: About 9.17% done; ETC: 05:24 (0:05:07 remaining)
2801SYN Stealth Scan Timing: About 28.07% done; ETC: 05:22 (0:02:36 remaining)
2802SYN Stealth Scan Timing: About 52.09% done; ETC: 05:22 (0:01:24 remaining)
2803SYN Stealth Scan Timing: About 79.51% done; ETC: 05:21 (0:00:31 remaining)
2804Completed SYN Stealth Scan at 05:21, 141.42s elapsed (65535 total ports)
2805Initiating Service scan at 05:21
2806Scanning 3 services on cbos.dot.jo (91.121.115.139)
2807Completed Service scan at 05:21, 7.09s elapsed (3 services on 1 host)
2808Initiating OS detection (try #1) against cbos.dot.jo (91.121.115.139)
2809Retrying OS detection (try #2) against cbos.dot.jo (91.121.115.139)
2810Initiating Traceroute at 05:21
2811Completed Traceroute at 05:21, 0.14s elapsed
2812Initiating Parallel DNS resolution of 2 hosts. at 05:21
2813Completed Parallel DNS resolution of 2 hosts. at 05:21, 0.00s elapsed
2814NSE: Script scanning 91.121.115.139.
2815Initiating NSE at 05:21
2816Completed NSE at 05:21, 7.33s elapsed
2817Initiating NSE at 05:21
2818Completed NSE at 05:21, 1.89s elapsed
2819Nmap scan report for cbos.dot.jo (91.121.115.139)
2820Host is up (0.14s latency).
2821Not shown: 65529 filtered ports
2822PORT STATE SERVICE VERSION
282322/tcp open ssh OpenSSH 7.2 (FreeBSD 20160310; protocol 2.0)
2824| vulners:
2825| cpe:/a:openbsd:openssh:7.2:
2826| CVE-2016-8858 7.8 https://vulners.com/cve/CVE-2016-8858
2827| CVE-2018-15919 5.0 https://vulners.com/cve/CVE-2018-15919
2828| CVE-2017-15906 5.0 https://vulners.com/cve/CVE-2017-15906
2829|_ CVE-2016-10708 5.0 https://vulners.com/cve/CVE-2016-10708
2830| vulscan: VulDB - https://vuldb.com:
2831| [90671] OpenSSH up to 7.2 auth-passwd.c auth_password denial of service
2832| [90405] OpenSSH up to 7.2p2 sshd information disclosure
2833| [90404] OpenSSH up to 7.2p2 sshd information disclosure
2834| [90403] OpenSSH up to 7.2p2 sshd CPU Exhaustion denial of service
2835| [89622] OpenSSH 7.2p2 Authentication Username information disclosure
2836| [81320] OpenSSH up to 7.2p1 X11 Authentication Credential xauth privilege escalation
2837| [130671] gsi-openssh-server 7.9p1 on Fedora /etc/gsissh/sshd_config weak authentication
2838| [130371] OpenSSH 7.9 scp Man-in-the-Middle directory traversal
2839| [130370] OpenSSH 7.9 Man-in-the-Middle spoofing
2840| [130369] OpenSSH 7.9 Encoding progressmeter.c refresh_progress_meter() spoofing
2841| [129007] OpenSSH 7.9 scp Client scp.c Filename privilege escalation
2842| [123343] OpenSSH up to 7.8 GSS2 auth-gss2.c information disclosure
2843| [123011] OpenSSH up to 7.7 auth2-gss.c Request information disclosure
2844| [112267] OpenSSH up to 7.3 sshd kex.c/packet.c NEWKEYS Message denial of service
2845| [108627] OpenSSH up to 7.5 Readonly Mode sftp-server.c process_open unknown vulnerability
2846| [94611] OpenSSH up to 7.3 Access Control privilege escalation
2847| [94610] OpenSSH up to 7.3 Shared Memory Manager privilege escalation
2848| [94608] OpenSSH up to 7.3 Unix-Domain Socket privilege escalation
2849| [94607] OpenSSH up to 7.3 Forwarded Agent Channel privilege escalation
2850| [80656] OpenBSD OpenSSH 7.1 X11 Forwarding privilege escalation
2851| [80330] OpenSSH up to 7.1p1 packet.c ssh_packet_read_poll2 memory corruption
2852|
2853| MITRE CVE - https://cve.mitre.org:
2854| [CVE-2010-4755] The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in SSH_FXP_STAT requests to an sftp daemon, a different vulnerability than CVE-2010-2632.
2855| [CVE-1999-0661] A system is running a version of software that was replaced with a Trojan Horse at one of its distribution points, such as (1) TCP Wrappers 7.6, (2) util-linux 2.9g, (3) wuarchive ftpd (wuftpd) 2.2 and 2.1f, (4) IRC client (ircII) ircII 2.2.9, (5) OpenSSH 3.4p1, or (6) Sendmail 8.12.6.
2856|
2857| SecurityFocus - https://www.securityfocus.com/bid/:
2858| [102780] OpenSSH CVE-2016-10708 Multiple Denial of Service Vulnerabilities
2859| [101552] OpenSSH 'sftp-server.c' Remote Security Bypass Vulnerability
2860| [94977] OpenSSH CVE-2016-10011 Local Information Disclosure Vulnerability
2861| [94975] OpenSSH CVE-2016-10012 Security Bypass Vulnerability
2862| [94972] OpenSSH CVE-2016-10010 Privilege Escalation Vulnerability
2863| [94968] OpenSSH CVE-2016-10009 Remote Code Execution Vulnerability
2864| [93776] OpenSSH 'ssh/kex.c' Denial of Service Vulnerability
2865| [92212] OpenSSH CVE-2016-6515 Denial of Service Vulnerability
2866| [92210] OpenSSH CBC Padding Weak Encryption Security Weakness
2867| [92209] OpenSSH MAC Verification Security Bypass Vulnerability
2868| [91812] OpenSSH CVE-2016-6210 User Enumeration Vulnerability
2869| [90440] OpenSSH CVE-2004-1653 Remote Security Vulnerability
2870| [90340] OpenSSH CVE-2004-2760 Remote Security Vulnerability
2871| [89385] OpenSSH CVE-2005-2666 Local Security Vulnerability
2872| [88655] OpenSSH CVE-2001-1382 Remote Security Vulnerability
2873| [88513] OpenSSH CVE-2000-0999 Remote Security Vulnerability
2874| [88367] OpenSSH CVE-1999-1010 Local Security Vulnerability
2875| [87789] OpenSSH CVE-2003-0682 Remote Security Vulnerability
2876| [86187] OpenSSH 'session.c' Local Security Bypass Vulnerability
2877| [86144] OpenSSH CVE-2007-2768 Remote Security Vulnerability
2878| [84427] OpenSSH CVE-2016-1908 Security Bypass Vulnerability
2879| [84314] OpenSSH CVE-2016-3115 Remote Command Injection Vulnerability
2880| [84185] OpenSSH CVE-2006-4925 Denial-Of-Service Vulnerability
2881| [81293] OpenSSH CVE-2016-1907 Denial of Service Vulnerability
2882| [80698] OpenSSH CVE-2016-0778 Heap Based Buffer Overflow Vulnerability
2883| [80695] OpenSSH CVE-2016-0777 Information Disclosure Vulnerability
2884| [76497] OpenSSH CVE-2015-6565 Local Security Bypass Vulnerability
2885| [76317] OpenSSH PAM Support Multiple Remote Code Execution Vulnerabilities
2886| [75990] OpenSSH Login Handling Security Bypass Weakness
2887| [75525] OpenSSH 'x11_open_helper()' Function Security Bypass Vulnerability
2888| [71420] Portable OpenSSH 'gss-serv-krb5.c' Security Bypass Vulnerability
2889| [68757] OpenSSH Multiple Remote Denial of Service Vulnerabilities
2890| [66459] OpenSSH Certificate Validation Security Bypass Vulnerability
2891| [66355] OpenSSH 'child_set_env()' Function Security Bypass Vulnerability
2892| [65674] OpenSSH 'ssh-keysign.c' Local Information Disclosure Vulnerability
2893| [65230] OpenSSH 'schnorr.c' Remote Memory Corruption Vulnerability
2894| [63605] OpenSSH 'sshd' Process Remote Memory Corruption Vulnerability
2895| [61286] OpenSSH Remote Denial of Service Vulnerability
2896| [58894] GSI-OpenSSH PAM_USER Security Bypass Vulnerability
2897| [58162] OpenSSH CVE-2010-5107 Denial of Service Vulnerability
2898| [54114] OpenSSH 'ssh_gssapi_parse_ename()' Function Denial of Service Vulnerability
2899| [51702] Debian openssh-server Forced Command Handling Information Disclosure Vulnerability
2900| [50416] Linux Kernel 'kdump' and 'mkdumprd' OpenSSH Integration Remote Information Disclosure Vulnerability
2901| [49473] OpenSSH Ciphersuite Specification Information Disclosure Weakness
2902| [48507] OpenSSH 'pam_thread()' Remote Buffer Overflow Vulnerability
2903| [47691] Portable OpenSSH 'ssh-keysign' Local Unauthorized Access Vulnerability
2904| [46155] OpenSSH Legacy Certificate Signing Information Disclosure Vulnerability
2905| [45304] OpenSSH J-PAKE Security Bypass Vulnerability
2906| [36552] Red Hat Enterprise Linux OpenSSH 'ChrootDirectory' Option Local Privilege Escalation Vulnerability
2907| [32319] OpenSSH CBC Mode Information Disclosure Vulnerability
2908| [30794] Red Hat OpenSSH Backdoor Vulnerability
2909| [30339] OpenSSH 'X11UseLocalhost' X11 Forwarding Session Hijacking Vulnerability
2910| [30276] Debian OpenSSH SELinux Privilege Escalation Vulnerability
2911| [28531] OpenSSH ForceCommand Command Execution Weakness
2912| [28444] OpenSSH X Connections Session Hijacking Vulnerability
2913| [26097] OpenSSH LINUX_AUDIT_RECORD_EVENT Remote Log Injection Weakness
2914| [25628] OpenSSH X11 Cookie Local Authentication Bypass Vulnerability
2915| [23601] OpenSSH S/Key Remote Information Disclosure Vulnerability
2916| [20956] OpenSSH Privilege Separation Key Signature Weakness
2917| [20418] OpenSSH-Portable Existing Password Remote Information Disclosure Weakness
2918| [20245] OpenSSH-Portable GSSAPI Authentication Abort Information Disclosure Weakness
2919| [20241] Portable OpenSSH GSSAPI Remote Code Execution Vulnerability
2920| [20216] OpenSSH Duplicated Block Remote Denial of Service Vulnerability
2921| [16892] OpenSSH Remote PAM Denial Of Service Vulnerability
2922| [14963] OpenSSH LoginGraceTime Remote Denial Of Service Vulnerability
2923| [14729] OpenSSH GSSAPI Credential Disclosure Vulnerability
2924| [14727] OpenSSH DynamicForward Inadvertent GatewayPorts Activation Vulnerability
2925| [11781] OpenSSH-portable PAM Authentication Remote Information Disclosure Vulnerability
2926| [9986] RCP, OpenSSH SCP Client File Corruption Vulnerability
2927| [9040] OpenSSH PAM Conversation Memory Scrubbing Weakness
2928| [8677] Multiple Portable OpenSSH PAM Vulnerabilities
2929| [8628] OpenSSH Buffer Mismanagement Vulnerabilities
2930| [7831] OpenSSH Reverse DNS Lookup Access Control Bypass Vulnerability
2931| [7482] OpenSSH Remote Root Authentication Timing Side-Channel Weakness
2932| [7467] OpenSSH-portable Enabled PAM Delay Information Disclosure Vulnerability
2933| [7343] OpenSSH Authentication Execution Path Timing Information Leakage Weakness
2934| [6168] OpenSSH Visible Password Vulnerability
2935| [5374] OpenSSH Trojan Horse Vulnerability
2936| [5093] OpenSSH Challenge-Response Buffer Overflow Vulnerabilities
2937| [4560] OpenSSH Kerberos 4 TGT/AFS Token Buffer Overflow Vulnerability
2938| [4241] OpenSSH Channel Code Off-By-One Vulnerability
2939| [3614] OpenSSH UseLogin Environment Variable Passing Vulnerability
2940| [3560] OpenSSH Kerberos Arbitrary Privilege Elevation Vulnerability
2941| [3369] OpenSSH Key Based Source IP Access Control Bypass Vulnerability
2942| [3345] OpenSSH SFTP Command Restriction Bypassing Vulnerability
2943| [2917] OpenSSH PAM Session Evasion Vulnerability
2944| [2825] OpenSSH Client X11 Forwarding Cookie Removal File Symbolic Link Vulnerability
2945| [2356] OpenSSH Private Key Authentication Check Vulnerability
2946| [1949] OpenSSH Client Unauthorized Remote Forwarding Vulnerability
2947| [1334] OpenSSH UseLogin Vulnerability
2948|
2949| IBM X-Force - https://exchange.xforce.ibmcloud.com:
2950| [83258] GSI-OpenSSH auth-pam.c security bypass
2951| [82781] OpenSSH time limit denial of service
2952| [82231] OpenSSH pam_ssh_agent_auth PAM code execution
2953| [74809] OpenSSH ssh_gssapi_parse_ename denial of service
2954| [72756] Debian openssh-server commands information disclosure
2955| [68339] OpenSSH pam_thread buffer overflow
2956| [67264] OpenSSH ssh-keysign unauthorized access
2957| [65910] OpenSSH remote_glob function denial of service
2958| [65163] OpenSSH certificate information disclosure
2959| [64387] OpenSSH J-PAKE security bypass
2960| [63337] Cisco Unified Videoconferencing OpenSSH weak security
2961| [46620] OpenSSH and multiple SSH Tectia products CBC mode information disclosure
2962| [45202] OpenSSH signal handler denial of service
2963| [44747] RHEL OpenSSH backdoor
2964| [44280] OpenSSH PermitRootLogin information disclosure
2965| [44279] OpenSSH sshd weak security
2966| [44037] OpenSSH sshd SELinux role unauthorized access
2967| [43940] OpenSSH X11 forwarding information disclosure
2968| [41549] OpenSSH ForceCommand directive security bypass
2969| [41438] OpenSSH sshd session hijacking
2970| [40897] OpenSSH known_hosts weak security
2971| [40587] OpenSSH username weak security
2972| [37371] OpenSSH username data manipulation
2973| [37118] RHSA update for OpenSSH privilege separation monitor authentication verification weakness not installed
2974| [37112] RHSA update for OpenSSH signal handler race condition not installed
2975| [37107] RHSA update for OpenSSH identical block denial of service not installed
2976| [36637] OpenSSH X11 cookie privilege escalation
2977| [35167] OpenSSH packet.c newkeys[mode] denial of service
2978| [34490] OpenSSH OPIE information disclosure
2979| [33794] OpenSSH ChallengeResponseAuthentication information disclosure
2980| [32975] Apple Mac OS X OpenSSH denial of service
2981| [32387] RHSA-2006:0738 updates for openssh not installed
2982| [32359] RHSA-2006:0697 updates for openssh not installed
2983| [32230] RHSA-2006:0298 updates for openssh not installed
2984| [32132] RHSA-2006:0044 updates for openssh not installed
2985| [30120] OpenSSH privilege separation monitor authentication verification weakness
2986| [29255] OpenSSH GSSAPI user enumeration
2987| [29254] OpenSSH signal handler race condition
2988| [29158] OpenSSH identical block denial of service
2989| [28147] Apple Mac OS X OpenSSH nonexistent user login denial of service
2990| [25116] OpenSSH OpenPAM denial of service
2991| [24305] OpenSSH SCP shell expansion command execution
2992| [22665] RHSA-2005:106 updates for openssh not installed
2993| [22117] OpenSSH GSSAPI allows elevated privileges
2994| [22115] OpenSSH GatewayPorts security bypass
2995| [20930] OpenSSH sshd.c LoginGraceTime denial of service
2996| [19441] Sun Solaris OpenSSH LDAP (1) client authentication denial of service
2997| [17213] OpenSSH allows port bouncing attacks
2998| [16323] OpenSSH scp file overwrite
2999| [13797] OpenSSH PAM information leak
3000| [13271] OpenSSH could allow an attacker to corrupt the PAM conversion stack
3001| [13264] OpenSSH PAM code could allow an attacker to gain access
3002| [13215] OpenSSH buffer management errors could allow an attacker to execute code
3003| [13214] OpenSSH memory vulnerabilities
3004| [13191] OpenSSH large packet buffer overflow
3005| [12196] OpenSSH could allow an attacker to bypass login restrictions
3006| [11970] OpenSSH could allow an attacker to obtain valid administrative account
3007| [11902] OpenSSH PAM support enabled information leak
3008| [9803] OpenSSH "
3009| [9763] OpenSSH downloaded from the OpenBSD FTP site or OpenBSD FTP mirror sites could contain a Trojan Horse
3010| [9307] OpenSSH is running on the system
3011| [9169] OpenSSH "
3012| [8896] OpenSSH Kerberos 4 TGT/AFS buffer overflow
3013| [8697] FreeBSD libutil in OpenSSH fails to drop privileges prior to using the login class capability database
3014| [8383] OpenSSH off-by-one error in channel code
3015| [7647] OpenSSH UseLogin option arbitrary code execution
3016| [7634] OpenSSH using sftp and restricted keypairs could allow an attacker to bypass restrictions
3017| [7598] OpenSSH with Kerberos allows attacker to gain elevated privileges
3018| [7179] OpenSSH source IP access control bypass
3019| [6757] OpenSSH "
3020| [6676] OpenSSH X11 forwarding symlink attack could allow deletion of arbitrary files
3021| [6084] OpenSSH 2.3.1 allows remote users to bypass authentication
3022| [5517] OpenSSH allows unauthorized access to resources
3023| [4646] OpenSSH UseLogin option allows remote users to execute commands as root
3024|
3025| Exploit-DB - https://www.exploit-db.com:
3026| [21579] OpenSSH 3.x Challenge-Response Buffer Overflow Vulnerabilities (2)
3027| [21578] OpenSSH 3.x Challenge-Response Buffer Overflow Vulnerabilities (1)
3028| [21402] OpenSSH 2.x/3.x Kerberos 4 TGT/AFS Token Buffer Overflow Vulnerability
3029| [21314] OpenSSH 2.x/3.0.1/3.0.2 Channel Code Off-By-One Vulnerability
3030| [20253] OpenSSH 1.2 scp File Create/Overwrite Vulnerability
3031| [17462] FreeBSD OpenSSH 3.5p1 - Remote Root Exploit
3032| [14866] Novell Netware 6.5 - OpenSSH Remote Stack Overflow
3033| [6094] Debian OpenSSH Remote SELinux Privilege Elevation Exploit (auth)
3034| [3303] Portable OpenSSH <= 3.6.1p-PAM / 4.1-SUSE Timing Attack Exploit
3035| [2444] OpenSSH <= 4.3 p1 (Duplicated Block) Remote Denial of Service Exploit
3036| [1572] Dropbear / OpenSSH Server (MAX_UNAUTH_CLIENTS) Denial of Service
3037| [258] glibc-2.2 and openssh-2.3.0p1 exploits glibc => 2.1.9x
3038| [26] OpenSSH/PAM <= 3.6.1p1 Remote Users Ident (gossh.sh)
3039| [25] OpenSSH/PAM <= 3.6.1p1 Remote Users Discovery Tool
3040|
3041| OpenVAS (Nessus) - http://www.openvas.org:
3042| [902488] OpenSSH 'sshd' GSSAPI Credential Disclosure Vulnerability
3043| [900179] OpenSSH CBC Mode Information Disclosure Vulnerability
3044| [881183] CentOS Update for openssh CESA-2012:0884 centos6
3045| [880802] CentOS Update for openssh CESA-2009:1287 centos5 i386
3046| [880746] CentOS Update for openssh CESA-2009:1470 centos5 i386
3047| [870763] RedHat Update for openssh RHSA-2012:0884-04
3048| [870129] RedHat Update for openssh RHSA-2008:0855-01
3049| [861813] Fedora Update for openssh FEDORA-2010-5429
3050| [861319] Fedora Update for openssh FEDORA-2007-395
3051| [861170] Fedora Update for openssh FEDORA-2007-394
3052| [861012] Fedora Update for openssh FEDORA-2007-715
3053| [840345] Ubuntu Update for openssh vulnerability USN-597-1
3054| [840300] Ubuntu Update for openssh update USN-612-5
3055| [840271] Ubuntu Update for openssh vulnerability USN-612-2
3056| [840268] Ubuntu Update for openssh update USN-612-7
3057| [840259] Ubuntu Update for openssh vulnerabilities USN-649-1
3058| [840214] Ubuntu Update for openssh vulnerability USN-566-1
3059| [831074] Mandriva Update for openssh MDVA-2010:162 (openssh)
3060| [830929] Mandriva Update for openssh MDVA-2010:090 (openssh)
3061| [830807] Mandriva Update for openssh MDVA-2010:026 (openssh)
3062| [830603] Mandriva Update for openssh MDVSA-2008:098 (openssh)
3063| [830523] Mandriva Update for openssh MDVSA-2008:078 (openssh)
3064| [830317] Mandriva Update for openssh-askpass-qt MDKA-2007:127 (openssh-askpass-qt)
3065| [830191] Mandriva Update for openssh MDKSA-2007:236 (openssh)
3066| [802407] OpenSSH 'sshd' Challenge Response Authentication Buffer Overflow Vulnerability
3067| [103503] openssh-server Forced Command Handling Information Disclosure Vulnerability
3068| [103247] OpenSSH Ciphersuite Specification Information Disclosure Weakness
3069| [103064] OpenSSH Legacy Certificate Signing Information Disclosure Vulnerability
3070| [100584] OpenSSH X Connections Session Hijacking Vulnerability
3071| [100153] OpenSSH CBC Mode Information Disclosure Vulnerability
3072| [66170] CentOS Security Advisory CESA-2009:1470 (openssh)
3073| [65987] SLES10: Security update for OpenSSH
3074| [65819] SLES10: Security update for OpenSSH
3075| [65514] SLES9: Security update for OpenSSH
3076| [65513] SLES9: Security update for OpenSSH
3077| [65334] SLES9: Security update for OpenSSH
3078| [65248] SLES9: Security update for OpenSSH
3079| [65218] SLES9: Security update for OpenSSH
3080| [65169] SLES9: Security update for openssh,openssh-askpass
3081| [65126] SLES9: Security update for OpenSSH
3082| [65019] SLES9: Security update for OpenSSH
3083| [65015] SLES9: Security update for OpenSSH
3084| [64931] CentOS Security Advisory CESA-2009:1287 (openssh)
3085| [61639] Debian Security Advisory DSA 1638-1 (openssh)
3086| [61030] Debian Security Advisory DSA 1576-2 (openssh)
3087| [61029] Debian Security Advisory DSA 1576-1 (openssh)
3088| [60840] FreeBSD Security Advisory (FreeBSD-SA-08:05.openssh.asc)
3089| [60803] Gentoo Security Advisory GLSA 200804-03 (openssh)
3090| [60667] Slackware Advisory SSA:2008-095-01 openssh
3091| [59014] Slackware Advisory SSA:2007-255-01 openssh
3092| [58741] Gentoo Security Advisory GLSA 200711-02 (openssh)
3093| [57919] Gentoo Security Advisory GLSA 200611-06 (openssh)
3094| [57895] Gentoo Security Advisory GLSA 200609-17 (openssh)
3095| [57585] Debian Security Advisory DSA 1212-1 (openssh (1:3.8.1p1-8.sarge.6))
3096| [57492] Slackware Advisory SSA:2006-272-02 openssh
3097| [57483] Debian Security Advisory DSA 1189-1 (openssh-krb5)
3098| [57476] FreeBSD Security Advisory (FreeBSD-SA-06:22.openssh.asc)
3099| [57470] FreeBSD Ports: openssh
3100| [56352] FreeBSD Security Advisory (FreeBSD-SA-06:09.openssh.asc)
3101| [56330] Gentoo Security Advisory GLSA 200602-11 (OpenSSH)
3102| [56294] Slackware Advisory SSA:2006-045-06 openssh
3103| [53964] Slackware Advisory SSA:2003-266-01 New OpenSSH packages
3104| [53885] Slackware Advisory SSA:2003-259-01 OpenSSH Security Advisory
3105| [53884] Slackware Advisory SSA:2003-260-01 OpenSSH updated again
3106| [53788] Debian Security Advisory DSA 025-1 (openssh)
3107| [52638] FreeBSD Security Advisory (FreeBSD-SA-03:15.openssh.asc)
3108| [52635] FreeBSD Security Advisory (FreeBSD-SA-03:12.openssh.asc)
3109| [11343] OpenSSH Client Unauthorized Remote Forwarding
3110| [10954] OpenSSH AFS/Kerberos ticket/token passing
3111| [10883] OpenSSH Channel Code Off by 1
3112| [10823] OpenSSH UseLogin Environment Variables
3113|
3114| SecurityTracker - https://www.securitytracker.com:
3115| [1028187] OpenSSH pam_ssh_agent_auth Module on Red Hat Enterprise Linux Lets Remote Users Execute Arbitrary Code
3116| [1026593] OpenSSH Lets Remote Authenticated Users Obtain Potentially Sensitive Information
3117| [1025739] OpenSSH on FreeBSD Has Buffer Overflow in pam_thread() That Lets Remote Users Execute Arbitrary Code
3118| [1025482] OpenSSH ssh-keysign Utility Lets Local Users Gain Elevated Privileges
3119| [1025028] OpenSSH Legacy Certificates May Disclose Stack Contents to Remote Users
3120| [1022967] OpenSSH on Red Hat Enterprise Linux Lets Remote Authenticated Users Gain Elevated Privileges
3121| [1021235] OpenSSH CBC Mode Error Handling May Let Certain Remote Users Obtain Plain Text in Certain Cases
3122| [1020891] OpenSSH on Debian Lets Remote Users Prevent Logins
3123| [1020730] OpenSSH for Red Hat Enterprise Linux Packages May Have Been Compromised
3124| [1020537] OpenSSH on HP-UX Lets Local Users Hijack X11 Sessions
3125| [1019733] OpenSSH Unsafe Default Configuration May Let Local Users Execute Arbitrary Commands
3126| [1019707] OpenSSH Lets Local Users Hijack Forwarded X Sessions in Certain Cases
3127| [1017756] Apple OpenSSH Key Generation Process Lets Remote Users Deny Service
3128| [1017183] OpenSSH Privilege Separation Monitor Validation Error May Cause the Monitor to Fail to Properly Control the Unprivileged Process
3129| [1016940] OpenSSH Race Condition in Signal Handler Lets Remote Users Deny Service and May Potentially Permit Code Execution
3130| [1016939] OpenSSH GSSAPI Authentication Abort Error Lets Remote Users Determine Valid Usernames
3131| [1016931] OpenSSH SSH v1 CRC Attack Detection Implementation Lets Remote Users Deny Service
3132| [1016672] OpenSSH on Mac OS X Lets Remote Users Deny Service
3133| [1015706] OpenSSH Interaction With OpenPAM Lets Remote Users Deny Service
3134| [1015540] OpenSSH scp Double Shell Character Expansion During Local-to-Local Copying May Let Local Users Gain Elevated Privileges in Certain Cases
3135| [1014845] OpenSSH May Unexpectedly Activate GatewayPorts and Also May Disclose GSSAPI Credentials in Certain Cases
3136| [1011193] OpenSSH scp Directory Traversal Flaw Lets Remote SSH Servers Overwrite Files in Certain Cases
3137| [1011143] OpenSSH Default Configuration May Be Unsafe When Used With Anonymous SSH Services
3138| [1007791] Portable OpenSSH PAM free() Bug May Let Remote Users Execute Root Code
3139| [1007716] OpenSSH buffer_append_space() and Other Buffer Management Errors May Let Remote Users Execute Arbitrary Code
3140| [1006926] OpenSSH Host Access Restrictions Can Be Bypassed By Remote Users
3141| [1006688] OpenSSH Timing Flaw With Pluggable Authentication Modules Can Disclose Valid User Account Names to Remote Users
3142| [1004818] OpenSSH's Secure Shell (SSH) Implementation Weakness May Disclose User Passwords to Remote Users During Man-in-the-Middle Attacks
3143| [1004616] OpenSSH Integer Overflow and Buffer Overflow May Allow Remote Users to Gain Root Access to the System
3144| [1004391] OpenSSH 'BSD_AUTH' Access Control Bug May Allow Unauthorized Remote Users to Authenticated to the System
3145| [1004115] OpenSSH Buffer Overflow in Kerberos Ticket and AFS Token Processing Lets Local Users Execute Arbitrary Code With Root Level Permissions
3146| [1003758] OpenSSH Off-by-one 'Channels' Bug May Let Authorized Remote Users Execute Arbitrary Code with Root Privileges
3147| [1002895] OpenSSH UseLogin Environment Variable Bug Lets Local Users Execute Commands and Gain Root Access
3148| [1002748] OpenSSH 3.0 Denial of Service Condition May Allow Remote Users to Crash the sshd Daemon and KerberosV Configuration Error May Allow Remote Users to Partially Authenticate When Authentication Should Not Be Permitted
3149| [1002734] OpenSSH's S/Key Implementation Information Disclosure Flaw Provides Remote Users With Information About Valid User Accounts
3150| [1002455] OpenSSH May Fail to Properly Restrict IP Addresses in Certain Configurations
3151| [1002432] OpenSSH's Sftp-server Subsystem Lets Authorized Remote Users with Restricted Keypairs Obtain Additional Access on the Server
3152| [1001683] OpenSSH Allows Authorized Users to Delete Other User Files Named Cookies
3153|
3154| OSVDB - http://www.osvdb.org:
3155| [92034] GSI-OpenSSH auth-pam.c Memory Management Authentication Bypass
3156| [90474] Red Hat / Fedora PAM Module for OpenSSH Incorrect error() Function Calling Local Privilege Escalation
3157| [90007] OpenSSH logingracetime / maxstartup Threshold Connection Saturation Remote DoS
3158| [81500] OpenSSH gss-serv.c ssh_gssapi_parse_ename Function Field Length Value Parsing Remote DoS
3159| [78706] OpenSSH auth-options.c sshd auth_parse_options Function authorized_keys Command Option Debug Message Information Disclosure
3160| [75753] OpenSSH PAM Module Aborted Conversation Local Information Disclosure
3161| [75249] OpenSSH sftp-glob.c remote_glob Function Glob Expression Parsing Remote DoS
3162| [75248] OpenSSH sftp.c process_put Function Glob Expression Parsing Remote DoS
3163| [72183] Portable OpenSSH ssh-keysign ssh-rand-helper Utility File Descriptor Leak Local Information Disclosure
3164| [70873] OpenSSH Legacy Certificates Stack Memory Disclosure
3165| [69658] OpenSSH J-PAKE Public Parameter Validation Shared Secret Authentication Bypass
3166| [67743] Novell NetWare OpenSSH SSHD.NLM Absolute Path Handling Remote Overflow
3167| [59353] OpenSSH sshd Local TCP Redirection Connection Masking Weakness
3168| [58495] OpenSSH sshd ChrootDirectory Feature SetUID Hard Link Local Privilege Escalation
3169| [56921] OpenSSH Unspecified Remote Compromise
3170| [53021] OpenSSH on ftp.openbsd.org Trojaned Distribution
3171| [50036] OpenSSH CBC Mode Chosen Ciphertext 32-bit Chunk Plaintext Context Disclosure
3172| [49386] OpenSSH sshd TCP Connection State Remote Account Enumeration
3173| [48791] OpenSSH on Debian sshd Crafted Username Arbitrary Remote SELinux Role Access
3174| [47635] OpenSSH Packages on Red Hat Enterprise Linux Compromised Distribution
3175| [47227] OpenSSH X11UseLocalhost X11 Forwarding Port Hijacking
3176| [45873] Cisco WebNS SSHield w/ OpenSSH Crafted Large Packet Remote DoS
3177| [43911] OpenSSH ~/.ssh/rc ForceCommand Bypass Arbitrary Command Execution
3178| [43745] OpenSSH X11 Forwarding Local Session Hijacking
3179| [43371] OpenSSH Trusted X11 Cookie Connection Policy Bypass
3180| [39214] OpenSSH linux_audit_record_event Crafted Username Audit Log Injection
3181| [37315] pam_usb OpenSSH Authentication Unspecified Issue
3182| [34850] OpenSSH on Mac OS X Key Generation Remote Connection DoS
3183| [34601] OPIE w/ OpenSSH Account Enumeration
3184| [34600] OpenSSH S/KEY Authentication Account Enumeration
3185| [32721] OpenSSH Username Password Complexity Account Enumeration
3186| [30232] OpenSSH Privilege Separation Monitor Weakness
3187| [29494] OpenSSH packet.c Invalid Protocol Sequence Remote DoS
3188| [29266] OpenSSH GSSAPI Authentication Abort Username Enumeration
3189| [29264] OpenSSH Signal Handler Pre-authentication Race Condition Code Execution
3190| [29152] OpenSSH Identical Block Packet DoS
3191| [27745] Apple Mac OS X OpenSSH Nonexistent Account Login Enumeration DoS
3192| [23797] OpenSSH with OpenPAM Connection Saturation Forked Process Saturation DoS
3193| [22692] OpenSSH scp Command Line Filename Processing Command Injection
3194| [20216] OpenSSH with KerberosV Remote Authentication Bypass
3195| [19142] OpenSSH Multiple X11 Channel Forwarding Leaks
3196| [19141] OpenSSH GSSAPIAuthentication Credential Escalation
3197| [18236] OpenSSH no pty Command Execution Local PAM Restriction Bypass
3198| [16567] OpenSSH Privilege Separation LoginGraceTime DoS
3199| [16039] Solaris 108994 Series Patch OpenSSH LDAP Client Authentication DoS
3200| [9562] OpenSSH Default Configuration Anon SSH Service Port Bounce Weakness
3201| [9550] OpenSSH scp Traversal Arbitrary File Overwrite
3202| [6601] OpenSSH *realloc() Unspecified Memory Errors
3203| [6245] OpenSSH SKEY/BSD_AUTH Challenge-Response Remote Overflow
3204| [6073] OpenSSH on FreeBSD libutil Arbitrary File Read
3205| [6072] OpenSSH PAM Conversation Function Stack Modification
3206| [6071] OpenSSH SSHv1 PAM Challenge-Response Authentication Privilege Escalation
3207| [5536] OpenSSH sftp-server Restricted Keypair Restriction Bypass
3208| [5408] OpenSSH echo simulation Information Disclosure
3209| [5113] OpenSSH NIS YP Netgroups Authentication Bypass
3210| [4536] OpenSSH Portable AIX linker Privilege Escalation
3211| [3938] OpenSSL and OpenSSH /dev/random Check Failure
3212| [3456] OpenSSH buffer_append_space() Heap Corruption
3213| [2557] OpenSSH Multiple Buffer Management Multiple Overflows
3214| [2140] OpenSSH w/ PAM Username Validity Timing Attack
3215| [2112] OpenSSH Reverse DNS Lookup Bypass
3216| [2109] OpenSSH sshd Root Login Timing Side-Channel Weakness
3217| [1853] OpenSSH Symbolic Link 'cookies' File Removal
3218| [839] OpenSSH PAMAuthenticationViaKbdInt Challenge-Response Remote Overflow
3219| [781] OpenSSH Kerberos TGT/AFS Token Passing Remote Overflow
3220| [730] OpenSSH Channel Code Off by One Remote Privilege Escalation
3221| [688] OpenSSH UseLogin Environment Variable Local Command Execution
3222| [642] OpenSSH Multiple Key Type ACL Bypass
3223| [504] OpenSSH SSHv2 Public Key Authentication Bypass
3224| [341] OpenSSH UseLogin Local Privilege Escalation
3225|_
322625/tcp closed smtp
322780/tcp open http nginx
3228| vulscan: VulDB - https://vuldb.com:
3229| [133852] Sangfor Sundray WLAN Controller up to 3.7.4.2 Cookie Header nginx_webconsole.php Code Execution
3230| [132132] SoftNAS Cloud 4.2.0/4.2.1 Nginx privilege escalation
3231| [131858] Puppet Discovery up to 1.3.x Nginx Container weak authentication
3232| [130644] Nginx Unit up to 1.7.0 Router Process Request Heap-based memory corruption
3233| [127759] VeryNginx 0.3.3 Web Application Firewall privilege escalation
3234| [126525] nginx up to 1.14.0/1.15.5 ngx_http_mp4_module Loop denial of service
3235| [126524] nginx up to 1.14.0/1.15.5 HTTP2 CPU Exhaustion denial of service
3236| [126523] nginx up to 1.14.0/1.15.5 HTTP2 Memory Consumption denial of service
3237| [119845] Pivotal Operations Manager up to 2.0.13/2.1.5 Nginx privilege escalation
3238| [114368] SuSE Portus 2.3 Nginx Certificate weak authentication
3239| [103517] nginx up to 1.13.2 Range Filter Request Integer Overflow memory corruption
3240| [89849] nginx RFC 3875 Namespace Conflict Environment Variable Open Redirect
3241| [87719] nginx up to 1.11.0 ngx_files.c ngx_chain_to_iovec denial of service
3242| [80760] nginx 0.6.18/1.9.9 DNS CNAME Record Crash denial of service
3243| [80759] nginx 0.6.18/1.9.9 DNS CNAME Record Use-After-Free denial of service
3244| [80758] nginx 0.6.18/1.9.9 DNS UDP Packet Crash denial of service
3245| [67677] nginx up to 1.7.3 SSL weak authentication
3246| [67296] nginx up to 1.7.3 SMTP Proxy ngx_mail_smtp_starttls privilege escalation
3247| [12822] nginx up to 1.5.11 SPDY SPDY Request Heap-based memory corruption
3248| [12824] nginx 1.5.10 on 32-bit SPDY memory corruption
3249| [11237] nginx up to 1.5.6 URI String Bypass privilege escalation
3250| [65364] nginx up to 1.1.13 Default Configuration information disclosure
3251| [8671] nginx up to 1.4 proxy_pass denial of service
3252| [8618] nginx 1.3.9/1.4.0 http/ngx_http_parse.c ngx_http_parse_chunked() memory corruption
3253| [7247] nginx 1.2.6 Proxy Function spoofing
3254| [61434] nginx 1.2.0/1.3.0 on Windows Access Restriction privilege escalation
3255| [5293] nginx up to 1.1.18 ngx_http_mp4_module MP4 File memory corruption
3256| [4843] nginx up to 1.0.13/1.1.16 HTTP Header Response Parser ngx_http_parse.c information disclosure
3257| [59645] nginx up to 0.8.9 Heap-based memory corruption
3258| [53592] nginx 0.8.36 memory corruption
3259| [53590] nginx up to 0.8.9 unknown vulnerability
3260| [51533] nginx 0.7.64 Terminal privilege escalation
3261| [50905] nginx up to 0.8.9 directory traversal
3262| [50903] nginx up to 0.8.10 NULL Pointer Dereference denial of service
3263| [50043] nginx up to 0.8.10 memory corruption
3264|
3265| MITRE CVE - https://cve.mitre.org:
3266| [CVE-2013-2070] http/modules/ngx_http_proxy_module.c in nginx 1.1.4 through 1.2.8 and 1.3.0 through 1.4.0, when proxy_pass is used with untrusted HTTP servers, allows remote attackers to cause a denial of service (crash) and obtain sensitive information from worker process memory via a crafted proxy response, a similar vulnerability to CVE-2013-2028.
3267| [CVE-2013-2028] The ngx_http_parse_chunked function in http/ngx_http_parse.c in nginx 1.3.9 through 1.4.0 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a chunked Transfer-Encoding request with a large chunk size, which triggers an integer signedness error and a stack-based buffer overflow.
3268| [CVE-2012-3380] Directory traversal vulnerability in naxsi-ui/nx_extract.py in the Naxsi module before 0.46-1 for Nginx allows local users to read arbitrary files via unspecified vectors.
3269| [CVE-2012-2089] Buffer overflow in ngx_http_mp4_module.c in the ngx_http_mp4_module module in nginx 1.0.7 through 1.0.14 and 1.1.3 through 1.1.18, when the mp4 directive is used, allows remote attackers to cause a denial of service (memory overwrite) or possibly execute arbitrary code via a crafted MP4 file.
3270| [CVE-2012-1180] Use-after-free vulnerability in nginx before 1.0.14 and 1.1.x before 1.1.17 allows remote HTTP servers to obtain sensitive information from process memory via a crafted backend response, in conjunction with a client request.
3271| [CVE-2011-4963] nginx/Windows 1.3.x before 1.3.1 and 1.2.x before 1.2.1 allows remote attackers to bypass intended access restrictions and access restricted files via (1) a trailing . (dot) or (2) certain "$index_allocation" sequences in a request.
3272| [CVE-2011-4315] Heap-based buffer overflow in compression-pointer processing in core/ngx_resolver.c in nginx before 1.0.10 allows remote resolvers to cause a denial of service (daemon crash) or possibly have unspecified other impact via a long response.
3273| [CVE-2010-2266] nginx 0.8.36 allows remote attackers to cause a denial of service (crash) via certain encoded directory traversal sequences that trigger memory corruption, as demonstrated using the "%c0.%c0." sequence.
3274| [CVE-2010-2263] nginx 0.8 before 0.8.40 and 0.7 before 0.7.66, when running on Windows, allows remote attackers to obtain source code or unparsed content of arbitrary files under the web document root by appending ::$DATA to the URI.
3275| [CVE-2009-4487] nginx 0.7.64 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.
3276| [CVE-2009-3898] Directory traversal vulnerability in src/http/modules/ngx_http_dav_module.c in nginx (aka Engine X) before 0.7.63, and 0.8.x before 0.8.17, allows remote authenticated users to create or overwrite arbitrary files via a .. (dot dot) in the Destination HTTP header for the WebDAV (1) COPY or (2) MOVE method.
3277| [CVE-2009-3896] src/http/ngx_http_parse.c in nginx (aka Engine X) 0.1.0 through 0.4.14, 0.5.x before 0.5.38, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.14 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a long URI.
3278| [CVE-2009-2629] Buffer underflow in src/http/ngx_http_parse.c in nginx 0.1.0 through 0.5.37, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.15 allows remote attackers to execute arbitrary code via crafted HTTP requests.
3279|
3280| SecurityFocus - https://www.securityfocus.com/bid/:
3281| [99534] Nginx CVE-2017-7529 Remote Integer Overflow Vulnerability
3282| [93903] Nginx CVE-2016-1247 Remote Privilege Escalation Vulnerability
3283| [91819] Nginx CVE-2016-1000105 Security Bypass Vulnerability
3284| [90967] nginx CVE-2016-4450 Denial of Service Vulnerability
3285| [82230] nginx Multiple Denial of Service Vulnerabilities
3286| [78928] Nginx CVE-2010-2266 Denial-Of-Service Vulnerability
3287| [70025] nginx CVE-2014-3616 SSL Session Fixation Vulnerability
3288| [69111] nginx SMTP Proxy Remote Command Injection Vulnerability
3289| [67507] nginx SPDY Implementation CVE-2014-0088 Arbitrary Code Execution Vulnerability
3290| [66537] nginx SPDY Implementation Heap Based Buffer Overflow Vulnerability
3291| [63814] nginx CVE-2013-4547 URI Processing Security Bypass Vulnerability
3292| [59824] Nginx CVE-2013-2070 Remote Security Vulnerability
3293| [59699] nginx 'ngx_http_parse.c' Stack Buffer Overflow Vulnerability
3294| [59496] nginx 'ngx_http_close_connection()' Remote Integer Overflow Vulnerability
3295| [59323] nginx NULL-Byte Arbitrary Code Execution Vulnerability
3296| [58105] Nginx 'access.log' Insecure File Permissions Vulnerability
3297| [57139] nginx CVE-2011-4968 Man in The Middle Vulnerability
3298| [55920] nginx CVE-2011-4963 Security Bypass Vulnerability
3299| [54331] Nginx Naxsi Module 'nx_extract.py' Script Remote File Disclosure Vulnerability
3300| [52999] nginx 'ngx_http_mp4_module.c' Buffer Overflow Vulnerability
3301| [52578] nginx 'ngx_cpystrn()' Information Disclosure Vulnerability
3302| [50710] nginx DNS Resolver Remote Heap Buffer Overflow Vulnerability
3303| [40760] nginx Remote Source Code Disclosure and Denial of Service Vulnerabilities
3304| [40434] nginx Space String Remote Source Code Disclosure Vulnerability
3305| [40420] nginx Directory Traversal Vulnerability
3306| [37711] nginx Terminal Escape Sequence in Logs Command Injection Vulnerability
3307| [36839] nginx 'ngx_http_process_request_headers()' Remote Buffer Overflow Vulnerability
3308| [36490] nginx WebDAV Multiple Directory Traversal Vulnerabilities
3309| [36438] nginx Proxy DNS Cache Domain Spoofing Vulnerability
3310| [36384] nginx HTTP Request Remote Buffer Overflow Vulnerability
3311|
3312| IBM X-Force - https://exchange.xforce.ibmcloud.com:
3313| [84623] Phusion Passenger gem for Ruby with nginx configuration insecure permissions
3314| [84172] nginx denial of service
3315| [84048] nginx buffer overflow
3316| [83923] nginx ngx_http_close_connection() integer overflow
3317| [83688] nginx null byte code execution
3318| [83103] Naxsi module for Nginx naxsi_unescape_uri() function security bypass
3319| [82319] nginx access.log information disclosure
3320| [80952] nginx SSL spoofing
3321| [77244] nginx and Microsoft Windows request security bypass
3322| [76778] Naxsi module for Nginx nx_extract.py directory traversal
3323| [74831] nginx ngx_http_mp4_module.c buffer overflow
3324| [74191] nginx ngx_cpystrn() information disclosure
3325| [74045] nginx header response information disclosure
3326| [71355] nginx ngx_resolver_copy() buffer overflow
3327| [59370] nginx characters denial of service
3328| [59369] nginx DATA source code disclosure
3329| [59047] nginx space source code disclosure
3330| [58966] nginx unspecified directory traversal
3331| [54025] nginx ngx_http_parse.c denial of service
3332| [53431] nginx WebDAV component directory traversal
3333| [53328] Nginx CRC-32 cached domain name spoofing
3334| [53250] Nginx ngx_http_parse_complex_uri() function code execution
3335|
3336| Exploit-DB - https://www.exploit-db.com:
3337| [26737] nginx 1.3.9/1.4.0 x86 Brute Force Remote Exploit
3338| [25775] Nginx HTTP Server 1.3.9-1.4.0 Chuncked Encoding Stack Buffer Overflow
3339| [25499] nginx 1.3.9-1.4.0 DoS PoC
3340| [24967] nginx 0.6.x Arbitrary Code Execution NullByte Injection
3341| [14830] nginx 0.6.38 - Heap Corruption Exploit
3342| [13822] Nginx <= 0.7.65 / 0.8.39 (dev) Source Disclosure / Download Vulnerability
3343| [13818] Nginx 0.8.36 Source Disclosure and DoS Vulnerabilities
3344| [12804] nginx [engine x] http server <= 0.6.36 Path Draversal
3345| [9901] nginx 0.7.0-0.7.61, 0.6.0-0.6.38, 0.5.0-0.5.37, 0.4.0-0.4.14 PoC
3346| [9829] nginx 0.7.61 WebDAV directory traversal
3347|
3348| OpenVAS (Nessus) - http://www.openvas.org:
3349| [864418] Fedora Update for nginx FEDORA-2012-3846
3350| [864310] Fedora Update for nginx FEDORA-2012-6238
3351| [864209] Fedora Update for nginx FEDORA-2012-6411
3352| [864204] Fedora Update for nginx FEDORA-2012-6371
3353| [864121] Fedora Update for nginx FEDORA-2012-4006
3354| [864115] Fedora Update for nginx FEDORA-2012-3991
3355| [864065] Fedora Update for nginx FEDORA-2011-16075
3356| [863654] Fedora Update for nginx FEDORA-2011-16110
3357| [861232] Fedora Update for nginx FEDORA-2007-1158
3358| [850180] SuSE Update for nginx openSUSE-SU-2012:0237-1 (nginx)
3359| [831680] Mandriva Update for nginx MDVSA-2012:043 (nginx)
3360| [802045] 64-bit Debian Linux Rootkit with nginx Doing iFrame Injection
3361| [801636] nginx HTTP Request Remote Buffer Overflow Vulnerability
3362| [103470] nginx 'ngx_http_mp4_module.c' Buffer Overflow Vulnerability
3363| [103469] nginx 'ngx_cpystrn()' Information Disclosure Vulnerability
3364| [103344] nginx DNS Resolver Remote Heap Buffer Overflow Vulnerability
3365| [100676] nginx Remote Source Code Disclosure and Denial of Service Vulnerabilities
3366| [100659] nginx Directory Traversal Vulnerability
3367| [100658] nginx Space String Remote Source Code Disclosure Vulnerability
3368| [100441] nginx Terminal Escape Sequence in Logs Command Injection Vulnerability
3369| [100321] nginx 'ngx_http_process_request_headers()' Remote Buffer Overflow Vulnerability
3370| [100277] nginx Proxy DNS Cache Domain Spoofing Vulnerability
3371| [100276] nginx HTTP Request Remote Buffer Overflow Vulnerability
3372| [100275] nginx WebDAV Multiple Directory Traversal Vulnerabilities
3373| [71574] Gentoo Security Advisory GLSA 201206-07 (nginx)
3374| [71308] Gentoo Security Advisory GLSA 201203-22 (nginx)
3375| [71297] FreeBSD Ports: nginx
3376| [71276] FreeBSD Ports: nginx
3377| [71239] Debian Security Advisory DSA 2434-1 (nginx)
3378| [66451] Fedora Core 11 FEDORA-2009-12782 (nginx)
3379| [66450] Fedora Core 10 FEDORA-2009-12775 (nginx)
3380| [66449] Fedora Core 12 FEDORA-2009-12750 (nginx)
3381| [64924] Gentoo Security Advisory GLSA 200909-18 (nginx)
3382| [64912] Fedora Core 10 FEDORA-2009-9652 (nginx)
3383| [64911] Fedora Core 11 FEDORA-2009-9630 (nginx)
3384| [64894] FreeBSD Ports: nginx
3385| [64869] Debian Security Advisory DSA 1884-1 (nginx)
3386|
3387| SecurityTracker - https://www.securitytracker.com:
3388| [1028544] nginx Bug Lets Remote Users Deny Service or Obtain Potentially Sensitive Information
3389| [1028519] nginx Stack Overflow Lets Remote Users Execute Arbitrary Code
3390| [1026924] nginx Buffer Overflow in ngx_http_mp4_module Lets Remote Users Execute Arbitrary Code
3391| [1026827] nginx HTTP Response Processing Lets Remote Users Obtain Portions of Memory Contents
3392|
3393| OSVDB - http://www.osvdb.org:
3394| [94864] cPnginx Plugin for cPanel nginx Configuration Manipulation Arbitrary File Access
3395| [93282] nginx proxy_pass Crafted Upstream Proxied Server Response Handling Worker Process Memory Disclosure
3396| [93037] nginx /http/ngx_http_parse.c Worker Process Crafted Request Handling Remote Overflow
3397| [92796] nginx ngx_http_close_connection Function Crafted r->
3398| [92634] nginx ngx_http_request.h zero_in_uri URL Null Byte Handling Remote Code Execution
3399| [90518] nginx Log Directory Permission Weakness Local Information Disclosure
3400| [88910] nginx Proxy Functionality SSL Certificate Validation MitM Spoofing Weakness
3401| [84339] nginx/Windows Multiple Request Sequence Parsing Arbitrary File Access
3402| [83617] Naxsi Module for Nginx naxsi-ui/ nx_extract.py Traversal Arbitrary File Access
3403| [81339] nginx ngx_http_mp4_module Module Atom MP4 File Handling Remote Overflow
3404| [80124] nginx HTTP Header Response Parsing Freed Memory Information Disclosure
3405| [77184] nginx ngx_resolver.c ngx_resolver_copy() Function DNS Response Parsing Remote Overflow
3406| [65531] nginx on Windows URI ::$DATA Append Arbitrary File Access
3407| [65530] nginx Encoded Traversal Sequence Memory Corruption Remote DoS
3408| [65294] nginx on Windows Encoded Space Request Remote Source Disclosure
3409| [63136] nginx on Windows 8.3 Filename Alias Request Access Rules / Authentication Bypass
3410| [62617] nginx Internal DNS Cache Poisoning Weakness
3411| [61779] nginx HTTP Request Escape Sequence Terminal Command Injection
3412| [59278] nginx src/http/ngx_http_parse.c ngx_http_process_request_headers() Function URL Handling NULL Dereference DoS
3413| [58328] nginx WebDAV Multiple Method Traversal Arbitrary File Write
3414| [58128] nginx ngx_http_parse_complex_uri() Function Underflow
3415| [44447] nginx (engine x) msie_refresh Directive Unspecified XSS
3416| [44446] nginx (engine x) ssl_verify_client Directive HTTP/0.9 Protocol Bypass
3417| [44445] nginx (engine x) ngx_http_realip_module satisfy_any Directive Unspecified Access Bypass
3418| [44444] nginx (engine x) X-Accel-Redirect Header Unspecified Traversal
3419| [44443] nginx (engine x) rtsig Method Signal Queue Overflow
3420| [44442] nginx (engine x) Worker Process Millisecond Timers Unspecified Overflow
3421|_
3422139/tcp closed netbios-ssn
3423443/tcp open ssl/tcpwrapped
3424445/tcp closed microsoft-ds
3425Aggressive OS guesses: Blue Coat proxy server (SGOS 6.3.2.201) (92%), FreeBSD 6.3-RELEASE (92%), Apple iPhone mobile phone (iOS 4.3.3) (89%), Apple OS X 10.10 (Yosemite) (Darwin 14.0.0) (89%), Apple OS X 10.10.2 (Yosemite) - 10.11.1 (El Capitan) or iOS 9 (Darwin 14.1.0 - 15.0.0) (89%), Apple OS X 10.10.5 (Darwin 14.5.0) (89%), Apple OS X 10.9 (Mavericks) (Darwin 13.0.0 - 13.2.0) (89%), Apple Mac OS X 10.7.4 (Lion) (Darwin 11.4.0) or Apple TV (iOS 4.3) (88%), Apple OS X 10.8 (Mountain Lion) - 10.9 (Mavericks) or iOS 5.1.1 - 6.1.5 (Darwin 12.0.0 - 13.4.0) (88%), Asus RT-AC66U router (Linux 2.6) (88%)
3426No exact OS matches for host (test conditions non-ideal).
3427Uptime guess: 34.832 days (since Sun Oct 6 10:23:38 2019)
3428Network Distance: 2 hops
3429TCP Sequence Prediction: Difficulty=255 (Good luck!)
3430IP ID Sequence Generation: Randomized
3431Service Info: OS: FreeBSD; CPE: cpe:/o:freebsd:freebsd
3432
3433TRACEROUTE (using port 25/tcp)
3434HOP RTT ADDRESS
34351 134.59 ms 10.223.200.1
34362 134.59 ms cbos.dot.jo (91.121.115.139)
3437
3438NSE: Script Post-scanning.
3439Initiating NSE at 05:21
3440Completed NSE at 05:21, 0.00s elapsed
3441Initiating NSE at 05:21
3442Completed NSE at 05:21, 0.00s elapsed
3443#######################################################################################################################################
3444Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-10 05:21 EST
3445NSE: Loaded 47 scripts for scanning.
3446NSE: Script Pre-scanning.
3447Initiating NSE at 05:21
3448Completed NSE at 05:21, 0.00s elapsed
3449Initiating NSE at 05:21
3450Completed NSE at 05:21, 0.00s elapsed
3451Initiating Parallel DNS resolution of 1 host. at 05:21
3452Completed Parallel DNS resolution of 1 host. at 05:21, 0.02s elapsed
3453Initiating UDP Scan at 05:21
3454Scanning cbos.dot.jo (91.121.115.139) [15 ports]
3455Completed UDP Scan at 05:22, 3.27s elapsed (15 total ports)
3456Initiating Service scan at 05:22
3457Scanning 13 services on cbos.dot.jo (91.121.115.139)
3458Service scan Timing: About 7.69% done; ETC: 05:43 (0:19:36 remaining)
3459Completed Service scan at 05:23, 102.58s elapsed (13 services on 1 host)
3460Initiating OS detection (try #1) against cbos.dot.jo (91.121.115.139)
3461Retrying OS detection (try #2) against cbos.dot.jo (91.121.115.139)
3462Initiating Traceroute at 05:23
3463Completed Traceroute at 05:23, 7.15s elapsed
3464Initiating Parallel DNS resolution of 1 host. at 05:23
3465Completed Parallel DNS resolution of 1 host. at 05:23, 0.00s elapsed
3466NSE: Script scanning 91.121.115.139.
3467Initiating NSE at 05:23
3468Completed NSE at 05:24, 7.12s elapsed
3469Initiating NSE at 05:24
3470Completed NSE at 05:24, 1.01s elapsed
3471Nmap scan report for cbos.dot.jo (91.121.115.139)
3472Host is up (0.15s latency).
3473
3474PORT STATE SERVICE VERSION
347553/udp open|filtered domain
347667/udp open|filtered dhcps
347768/udp open|filtered dhcpc
347869/udp open|filtered tftp
347988/udp open|filtered kerberos-sec
3480123/udp open|filtered ntp
3481137/udp filtered netbios-ns
3482138/udp filtered netbios-dgm
3483139/udp open|filtered netbios-ssn
3484161/udp open|filtered snmp
3485162/udp open|filtered snmptrap
3486389/udp open|filtered ldap
3487500/udp open|filtered isakmp
3488|_ike-version: ERROR: Script execution failed (use -d to debug)
3489520/udp open|filtered route
34902049/udp open|filtered nfs
3491Too many fingerprints match this host to give specific OS details
3492
3493TRACEROUTE (using port 138/udp)
3494HOP RTT ADDRESS
34951 130.83 ms 10.223.200.1
34962 ... 3
34974 131.09 ms 10.223.200.1
34985 135.38 ms 10.223.200.1
34996 135.34 ms 10.223.200.1
35007 132.65 ms 10.223.200.1
35018 132.63 ms 10.223.200.1
35029 132.62 ms 10.223.200.1
350310 132.61 ms 10.223.200.1
350411 ... 18
350519 132.47 ms 10.223.200.1
350620 130.07 ms 10.223.200.1
350721 ... 28
350829 130.08 ms 10.223.200.1
350930 129.68 ms 10.223.200.1
3510
3511NSE: Script Post-scanning.
3512Initiating NSE at 05:24
3513Completed NSE at 05:24, 0.00s elapsed
3514Initiating NSE at 05:24
3515Completed NSE at 05:24, 0.00s elapsed
3516#######################################################################################################################################
3517
3518Hosts
3519=====
3520
3521address mac name os_name os_flavor os_sp purpose info comments
3522------- --- ---- ------- --------- ----- ------- ---- --------
352391.121.115.139 cbos.dot.jo SGOS 6.X device
3524
3525Services
3526========
3527
3528host port proto name state info
3529---- ---- ----- ---- ----- ----
353091.121.115.139 22 tcp ssh open OpenSSH 7.2 FreeBSD 20160310; protocol 2.0
353191.121.115.139 25 tcp smtp closed
353291.121.115.139 53 udp domain unknown
353391.121.115.139 67 udp dhcps unknown
353491.121.115.139 68 udp dhcpc unknown
353591.121.115.139 69 udp tftp unknown
353691.121.115.139 80 tcp http open nginx
353791.121.115.139 88 udp kerberos-sec unknown
353891.121.115.139 123 udp ntp unknown
353991.121.115.139 137 udp netbios-ns filtered
354091.121.115.139 138 udp netbios-dgm filtered
354191.121.115.139 139 tcp netbios-ssn closed
354291.121.115.139 139 udp netbios-ssn unknown
354391.121.115.139 161 udp snmp unknown
354491.121.115.139 162 udp snmptrap unknown
354591.121.115.139 389 udp ldap unknown
354691.121.115.139 443 tcp ssl/tcpwrapped open
354791.121.115.139 445 tcp microsoft-ds closed
354891.121.115.139 500 udp isakmp unknown
354991.121.115.139 520 udp route unknown
355091.121.115.139 2049 udp nfs unknown
3551#######################################################################################################################################
3552Nmap scan report for cbos.dot.jo (91.121.115.139)
3553Host is up (0.16s latency).
3554Not shown: 994 filtered ports
3555PORT STATE SERVICE VERSION
355622/tcp open ssh OpenSSH 7.2 (FreeBSD 20160310; protocol 2.0)
3557| vulners:
3558| cpe:/a:openbsd:openssh:7.2:
3559| CVE-2016-8858 7.8 https://vulners.com/cve/CVE-2016-8858
3560| CVE-2018-15919 5.0 https://vulners.com/cve/CVE-2018-15919
3561| CVE-2017-15906 5.0 https://vulners.com/cve/CVE-2017-15906
3562|_ CVE-2016-10708 5.0 https://vulners.com/cve/CVE-2016-10708
356325/tcp closed smtp
356480/tcp open http nginx
3565|_http-title: Did not follow redirect to https://cbos.gov.sd/
3566139/tcp closed netbios-ssn
3567443/tcp open tcpwrapped
3568|_http-title: 400 The plain HTTP request was sent to HTTPS port
3569| ssl-cert: Subject: commonName=cbos.gov.sd
3570| Subject Alternative Name: DNS:cbos.gov.sd, DNS:www.cbos.gov.sd
3571| Not valid before: 2019-08-31T13:30:14
3572|_Not valid after: 2019-11-29T13:30:14
3573445/tcp closed microsoft-ds
3574Aggressive OS guesses: Blue Coat proxy server (SGOS 6.3.2.201) (92%), FreeBSD 6.3-RELEASE (92%), Apple iPhone mobile phone (iOS 4.3.3) (89%), Apple OS X 10.10 (Yosemite) (Darwin 14.0.0) (89%), Apple OS X 10.10.2 (Yosemite) - 10.11.1 (El Capitan) or iOS 9 (Darwin 14.1.0 - 15.0.0) (89%), Apple OS X 10.10.5 (Darwin 14.5.0) (89%), Apple OS X 10.9 (Mavericks) (Darwin 13.0.0 - 13.2.0) (89%), Apple Mac OS X 10.7.4 (Lion) (Darwin 11.4.0) or Apple TV (iOS 4.3) (88%), Apple OS X 10.8 (Mountain Lion) - 10.9 (Mavericks) or iOS 5.1.1 - 6.1.5 (Darwin 12.0.0 - 13.4.0) (88%), Asus RT-AC66U router (Linux 2.6) (88%)
3575No exact OS matches for host (test conditions non-ideal).
3576Service Info: OS: FreeBSD; CPE: cpe:/o:freebsd:freebsd
3577#######################################################################################################################################
3578Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-10 05:08 EST
3579Nmap scan report for cbos.dot.jo (91.121.115.139)
3580Host is up (0.14s latency).
3581Not shown: 994 filtered ports
3582PORT STATE SERVICE VERSION
358322/tcp open ssh OpenSSH 7.2 (FreeBSD 20160310; protocol 2.0)
3584| vulners:
3585| cpe:/a:openbsd:openssh:7.2:
3586| CVE-2016-8858 7.8 https://vulners.com/cve/CVE-2016-8858
3587| CVE-2018-15919 5.0 https://vulners.com/cve/CVE-2018-15919
3588| CVE-2017-15906 5.0 https://vulners.com/cve/CVE-2017-15906
3589|_ CVE-2016-10708 5.0 https://vulners.com/cve/CVE-2016-10708
359025/tcp closed smtp
359180/tcp open http nginx
3592|_http-title: Did not follow redirect to https://cbos.gov.sd/
3593139/tcp closed netbios-ssn
3594443/tcp open tcpwrapped
3595|_http-title: 400 The plain HTTP request was sent to HTTPS port
3596| ssl-cert: Subject: commonName=cbos.gov.sd
3597| Subject Alternative Name: DNS:cbos.gov.sd, DNS:www.cbos.gov.sd
3598| Not valid before: 2019-08-31T13:30:14
3599|_Not valid after: 2019-11-29T13:30:14
3600445/tcp closed microsoft-ds
3601Aggressive OS guesses: Blue Coat proxy server (SGOS 6.3.2.201) (92%), Apple iPhone mobile phone (iOS 4.3.3) (90%), Apple OS X 10.10 (Yosemite) (Darwin 14.0.0) (90%), Apple OS X 10.10.2 (Yosemite) - 10.11.1 (El Capitan) or iOS 9 (Darwin 14.1.0 - 15.0.0) (90%), Apple OS X 10.10.5 (Darwin 14.5.0) (90%), Apple OS X 10.9 (Mavericks) (Darwin 13.0.0 - 13.2.0) (90%), Apple Mac OS X 10.7.4 (Lion) (Darwin 11.4.0) or Apple TV (iOS 4.3) (89%), Apple OS X 10.8 (Mountain Lion) - 10.9 (Mavericks) or iOS 5.1.1 - 6.1.5 (Darwin 12.0.0 - 13.4.0) (89%), Apple OS X 10.8 (Mountain Lion) (88%), Apple OS X 10.10 (Yosemite) - 10.11 (El Capitan) (Darwin 14.0.0 - 15.0.0) (88%)
3602No exact OS matches for host (test conditions non-ideal).
3603Network Distance: 2 hops
3604Service Info: OS: FreeBSD; CPE: cpe:/o:freebsd:freebsd
3605
3606TRACEROUTE (using port 139/tcp)
3607HOP RTT ADDRESS
36081 138.13 ms 10.223.200.1
36092 138.13 ms cbos.dot.jo (91.121.115.139)
3610#######################################################################################################################################
3611Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-10 05:14 EST
3612Nmap scan report for cbos.dot.jo (91.121.115.139)
3613Host is up (0.15s latency).
3614Not shown: 994 filtered ports
3615PORT STATE SERVICE
361622/tcp open ssh
361725/tcp closed smtp
361880/tcp open http
3619139/tcp closed netbios-ssn
3620443/tcp open https
3621445/tcp closed microsoft-ds
3622
3623Host script results:
3624| dns-brute:
3625| DNS Brute-force hostnames:
3626| www.dot.jo - 116.203.144.235
3627| ns1.dot.jo - 67.22.132.251
3628| git.dot.jo - 212.83.183.164
3629| ns2.dot.jo - 67.22.132.251
3630| ns3.dot.jo - 96.125.184.251
3631| smtp.dot.jo - 212.118.12.13
3632| local.dot.jo - 82.212.89.64
3633| mail2.dot.jo - 208.77.157.7
3634| mail3.dot.jo - 96.125.181.175
3635|_ *A: 127.0.0.1
3636#######################################################################################################################################
3637Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-10 05:15 EST
3638Nmap scan report for cbos.dot.jo (91.121.115.139)
3639Host is up (0.15s latency).
3640Not shown: 994 filtered ports
3641PORT STATE SERVICE VERSION
364222/tcp open ssh OpenSSH 7.2 (FreeBSD 20160310; protocol 2.0)
3643| vulscan: VulDB - https://vuldb.com:
3644| [90671] OpenSSH up to 7.2 auth-passwd.c auth_password denial of service
3645| [90405] OpenSSH up to 7.2p2 sshd information disclosure
3646| [90404] OpenSSH up to 7.2p2 sshd information disclosure
3647| [90403] OpenSSH up to 7.2p2 sshd CPU Exhaustion denial of service
3648| [89622] OpenSSH 7.2p2 Authentication Username information disclosure
3649| [81320] OpenSSH up to 7.2p1 X11 Authentication Credential xauth privilege escalation
3650| [130671] gsi-openssh-server 7.9p1 on Fedora /etc/gsissh/sshd_config weak authentication
3651| [130371] OpenSSH 7.9 scp Man-in-the-Middle directory traversal
3652| [130370] OpenSSH 7.9 Man-in-the-Middle spoofing
3653| [130369] OpenSSH 7.9 Encoding progressmeter.c refresh_progress_meter() spoofing
3654| [129007] OpenSSH 7.9 scp Client scp.c Filename privilege escalation
3655| [123343] OpenSSH up to 7.8 GSS2 auth-gss2.c information disclosure
3656| [123011] OpenSSH up to 7.7 auth2-gss.c Request information disclosure
3657| [112267] OpenSSH up to 7.3 sshd kex.c/packet.c NEWKEYS Message denial of service
3658| [108627] OpenSSH up to 7.5 Readonly Mode sftp-server.c process_open unknown vulnerability
3659| [94611] OpenSSH up to 7.3 Access Control privilege escalation
3660| [94610] OpenSSH up to 7.3 Shared Memory Manager privilege escalation
3661| [94608] OpenSSH up to 7.3 Unix-Domain Socket privilege escalation
3662| [94607] OpenSSH up to 7.3 Forwarded Agent Channel privilege escalation
3663| [80656] OpenBSD OpenSSH 7.1 X11 Forwarding privilege escalation
3664| [80330] OpenSSH up to 7.1p1 packet.c ssh_packet_read_poll2 memory corruption
3665|
3666| MITRE CVE - https://cve.mitre.org:
3667| [CVE-2010-4755] The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in SSH_FXP_STAT requests to an sftp daemon, a different vulnerability than CVE-2010-2632.
3668| [CVE-1999-0661] A system is running a version of software that was replaced with a Trojan Horse at one of its distribution points, such as (1) TCP Wrappers 7.6, (2) util-linux 2.9g, (3) wuarchive ftpd (wuftpd) 2.2 and 2.1f, (4) IRC client (ircII) ircII 2.2.9, (5) OpenSSH 3.4p1, or (6) Sendmail 8.12.6.
3669|
3670| SecurityFocus - https://www.securityfocus.com/bid/:
3671| [102780] OpenSSH CVE-2016-10708 Multiple Denial of Service Vulnerabilities
3672| [101552] OpenSSH 'sftp-server.c' Remote Security Bypass Vulnerability
3673| [94977] OpenSSH CVE-2016-10011 Local Information Disclosure Vulnerability
3674| [94975] OpenSSH CVE-2016-10012 Security Bypass Vulnerability
3675| [94972] OpenSSH CVE-2016-10010 Privilege Escalation Vulnerability
3676| [94968] OpenSSH CVE-2016-10009 Remote Code Execution Vulnerability
3677| [93776] OpenSSH 'ssh/kex.c' Denial of Service Vulnerability
3678| [92212] OpenSSH CVE-2016-6515 Denial of Service Vulnerability
3679| [92210] OpenSSH CBC Padding Weak Encryption Security Weakness
3680| [92209] OpenSSH MAC Verification Security Bypass Vulnerability
3681| [91812] OpenSSH CVE-2016-6210 User Enumeration Vulnerability
3682| [90440] OpenSSH CVE-2004-1653 Remote Security Vulnerability
3683| [90340] OpenSSH CVE-2004-2760 Remote Security Vulnerability
3684| [89385] OpenSSH CVE-2005-2666 Local Security Vulnerability
3685| [88655] OpenSSH CVE-2001-1382 Remote Security Vulnerability
3686| [88513] OpenSSH CVE-2000-0999 Remote Security Vulnerability
3687| [88367] OpenSSH CVE-1999-1010 Local Security Vulnerability
3688| [87789] OpenSSH CVE-2003-0682 Remote Security Vulnerability
3689| [86187] OpenSSH 'session.c' Local Security Bypass Vulnerability
3690| [86144] OpenSSH CVE-2007-2768 Remote Security Vulnerability
3691| [84427] OpenSSH CVE-2016-1908 Security Bypass Vulnerability
3692| [84314] OpenSSH CVE-2016-3115 Remote Command Injection Vulnerability
3693| [84185] OpenSSH CVE-2006-4925 Denial-Of-Service Vulnerability
3694| [81293] OpenSSH CVE-2016-1907 Denial of Service Vulnerability
3695| [80698] OpenSSH CVE-2016-0778 Heap Based Buffer Overflow Vulnerability
3696| [80695] OpenSSH CVE-2016-0777 Information Disclosure Vulnerability
3697| [76497] OpenSSH CVE-2015-6565 Local Security Bypass Vulnerability
3698| [76317] OpenSSH PAM Support Multiple Remote Code Execution Vulnerabilities
3699| [75990] OpenSSH Login Handling Security Bypass Weakness
3700| [75525] OpenSSH 'x11_open_helper()' Function Security Bypass Vulnerability
3701| [71420] Portable OpenSSH 'gss-serv-krb5.c' Security Bypass Vulnerability
3702| [68757] OpenSSH Multiple Remote Denial of Service Vulnerabilities
3703| [66459] OpenSSH Certificate Validation Security Bypass Vulnerability
3704| [66355] OpenSSH 'child_set_env()' Function Security Bypass Vulnerability
3705| [65674] OpenSSH 'ssh-keysign.c' Local Information Disclosure Vulnerability
3706| [65230] OpenSSH 'schnorr.c' Remote Memory Corruption Vulnerability
3707| [63605] OpenSSH 'sshd' Process Remote Memory Corruption Vulnerability
3708| [61286] OpenSSH Remote Denial of Service Vulnerability
3709| [58894] GSI-OpenSSH PAM_USER Security Bypass Vulnerability
3710| [58162] OpenSSH CVE-2010-5107 Denial of Service Vulnerability
3711| [54114] OpenSSH 'ssh_gssapi_parse_ename()' Function Denial of Service Vulnerability
3712| [51702] Debian openssh-server Forced Command Handling Information Disclosure Vulnerability
3713| [50416] Linux Kernel 'kdump' and 'mkdumprd' OpenSSH Integration Remote Information Disclosure Vulnerability
3714| [49473] OpenSSH Ciphersuite Specification Information Disclosure Weakness
3715| [48507] OpenSSH 'pam_thread()' Remote Buffer Overflow Vulnerability
3716| [47691] Portable OpenSSH 'ssh-keysign' Local Unauthorized Access Vulnerability
3717| [46155] OpenSSH Legacy Certificate Signing Information Disclosure Vulnerability
3718| [45304] OpenSSH J-PAKE Security Bypass Vulnerability
3719| [36552] Red Hat Enterprise Linux OpenSSH 'ChrootDirectory' Option Local Privilege Escalation Vulnerability
3720| [32319] OpenSSH CBC Mode Information Disclosure Vulnerability
3721| [30794] Red Hat OpenSSH Backdoor Vulnerability
3722| [30339] OpenSSH 'X11UseLocalhost' X11 Forwarding Session Hijacking Vulnerability
3723| [30276] Debian OpenSSH SELinux Privilege Escalation Vulnerability
3724| [28531] OpenSSH ForceCommand Command Execution Weakness
3725| [28444] OpenSSH X Connections Session Hijacking Vulnerability
3726| [26097] OpenSSH LINUX_AUDIT_RECORD_EVENT Remote Log Injection Weakness
3727| [25628] OpenSSH X11 Cookie Local Authentication Bypass Vulnerability
3728| [23601] OpenSSH S/Key Remote Information Disclosure Vulnerability
3729| [20956] OpenSSH Privilege Separation Key Signature Weakness
3730| [20418] OpenSSH-Portable Existing Password Remote Information Disclosure Weakness
3731| [20245] OpenSSH-Portable GSSAPI Authentication Abort Information Disclosure Weakness
3732| [20241] Portable OpenSSH GSSAPI Remote Code Execution Vulnerability
3733| [20216] OpenSSH Duplicated Block Remote Denial of Service Vulnerability
3734| [16892] OpenSSH Remote PAM Denial Of Service Vulnerability
3735| [14963] OpenSSH LoginGraceTime Remote Denial Of Service Vulnerability
3736| [14729] OpenSSH GSSAPI Credential Disclosure Vulnerability
3737| [14727] OpenSSH DynamicForward Inadvertent GatewayPorts Activation Vulnerability
3738| [11781] OpenSSH-portable PAM Authentication Remote Information Disclosure Vulnerability
3739| [9986] RCP, OpenSSH SCP Client File Corruption Vulnerability
3740| [9040] OpenSSH PAM Conversation Memory Scrubbing Weakness
3741| [8677] Multiple Portable OpenSSH PAM Vulnerabilities
3742| [8628] OpenSSH Buffer Mismanagement Vulnerabilities
3743| [7831] OpenSSH Reverse DNS Lookup Access Control Bypass Vulnerability
3744| [7482] OpenSSH Remote Root Authentication Timing Side-Channel Weakness
3745| [7467] OpenSSH-portable Enabled PAM Delay Information Disclosure Vulnerability
3746| [7343] OpenSSH Authentication Execution Path Timing Information Leakage Weakness
3747| [6168] OpenSSH Visible Password Vulnerability
3748| [5374] OpenSSH Trojan Horse Vulnerability
3749| [5093] OpenSSH Challenge-Response Buffer Overflow Vulnerabilities
3750| [4560] OpenSSH Kerberos 4 TGT/AFS Token Buffer Overflow Vulnerability
3751| [4241] OpenSSH Channel Code Off-By-One Vulnerability
3752| [3614] OpenSSH UseLogin Environment Variable Passing Vulnerability
3753| [3560] OpenSSH Kerberos Arbitrary Privilege Elevation Vulnerability
3754| [3369] OpenSSH Key Based Source IP Access Control Bypass Vulnerability
3755| [3345] OpenSSH SFTP Command Restriction Bypassing Vulnerability
3756| [2917] OpenSSH PAM Session Evasion Vulnerability
3757| [2825] OpenSSH Client X11 Forwarding Cookie Removal File Symbolic Link Vulnerability
3758| [2356] OpenSSH Private Key Authentication Check Vulnerability
3759| [1949] OpenSSH Client Unauthorized Remote Forwarding Vulnerability
3760| [1334] OpenSSH UseLogin Vulnerability
3761|
3762| IBM X-Force - https://exchange.xforce.ibmcloud.com:
3763| [83258] GSI-OpenSSH auth-pam.c security bypass
3764| [82781] OpenSSH time limit denial of service
3765| [82231] OpenSSH pam_ssh_agent_auth PAM code execution
3766| [74809] OpenSSH ssh_gssapi_parse_ename denial of service
3767| [72756] Debian openssh-server commands information disclosure
3768| [68339] OpenSSH pam_thread buffer overflow
3769| [67264] OpenSSH ssh-keysign unauthorized access
3770| [65910] OpenSSH remote_glob function denial of service
3771| [65163] OpenSSH certificate information disclosure
3772| [64387] OpenSSH J-PAKE security bypass
3773| [63337] Cisco Unified Videoconferencing OpenSSH weak security
3774| [46620] OpenSSH and multiple SSH Tectia products CBC mode information disclosure
3775| [45202] OpenSSH signal handler denial of service
3776| [44747] RHEL OpenSSH backdoor
3777| [44280] OpenSSH PermitRootLogin information disclosure
3778| [44279] OpenSSH sshd weak security
3779| [44037] OpenSSH sshd SELinux role unauthorized access
3780| [43940] OpenSSH X11 forwarding information disclosure
3781| [41549] OpenSSH ForceCommand directive security bypass
3782| [41438] OpenSSH sshd session hijacking
3783| [40897] OpenSSH known_hosts weak security
3784| [40587] OpenSSH username weak security
3785| [37371] OpenSSH username data manipulation
3786| [37118] RHSA update for OpenSSH privilege separation monitor authentication verification weakness not installed
3787| [37112] RHSA update for OpenSSH signal handler race condition not installed
3788| [37107] RHSA update for OpenSSH identical block denial of service not installed
3789| [36637] OpenSSH X11 cookie privilege escalation
3790| [35167] OpenSSH packet.c newkeys[mode] denial of service
3791| [34490] OpenSSH OPIE information disclosure
3792| [33794] OpenSSH ChallengeResponseAuthentication information disclosure
3793| [32975] Apple Mac OS X OpenSSH denial of service
3794| [32387] RHSA-2006:0738 updates for openssh not installed
3795| [32359] RHSA-2006:0697 updates for openssh not installed
3796| [32230] RHSA-2006:0298 updates for openssh not installed
3797| [32132] RHSA-2006:0044 updates for openssh not installed
3798| [30120] OpenSSH privilege separation monitor authentication verification weakness
3799| [29255] OpenSSH GSSAPI user enumeration
3800| [29254] OpenSSH signal handler race condition
3801| [29158] OpenSSH identical block denial of service
3802| [28147] Apple Mac OS X OpenSSH nonexistent user login denial of service
3803| [25116] OpenSSH OpenPAM denial of service
3804| [24305] OpenSSH SCP shell expansion command execution
3805| [22665] RHSA-2005:106 updates for openssh not installed
3806| [22117] OpenSSH GSSAPI allows elevated privileges
3807| [22115] OpenSSH GatewayPorts security bypass
3808| [20930] OpenSSH sshd.c LoginGraceTime denial of service
3809| [19441] Sun Solaris OpenSSH LDAP (1) client authentication denial of service
3810| [17213] OpenSSH allows port bouncing attacks
3811| [16323] OpenSSH scp file overwrite
3812| [13797] OpenSSH PAM information leak
3813| [13271] OpenSSH could allow an attacker to corrupt the PAM conversion stack
3814| [13264] OpenSSH PAM code could allow an attacker to gain access
3815| [13215] OpenSSH buffer management errors could allow an attacker to execute code
3816| [13214] OpenSSH memory vulnerabilities
3817| [13191] OpenSSH large packet buffer overflow
3818| [12196] OpenSSH could allow an attacker to bypass login restrictions
3819| [11970] OpenSSH could allow an attacker to obtain valid administrative account
3820| [11902] OpenSSH PAM support enabled information leak
3821| [9803] OpenSSH "
3822| [9763] OpenSSH downloaded from the OpenBSD FTP site or OpenBSD FTP mirror sites could contain a Trojan Horse
3823| [9307] OpenSSH is running on the system
3824| [9169] OpenSSH "
3825| [8896] OpenSSH Kerberos 4 TGT/AFS buffer overflow
3826| [8697] FreeBSD libutil in OpenSSH fails to drop privileges prior to using the login class capability database
3827| [8383] OpenSSH off-by-one error in channel code
3828| [7647] OpenSSH UseLogin option arbitrary code execution
3829| [7634] OpenSSH using sftp and restricted keypairs could allow an attacker to bypass restrictions
3830| [7598] OpenSSH with Kerberos allows attacker to gain elevated privileges
3831| [7179] OpenSSH source IP access control bypass
3832| [6757] OpenSSH "
3833| [6676] OpenSSH X11 forwarding symlink attack could allow deletion of arbitrary files
3834| [6084] OpenSSH 2.3.1 allows remote users to bypass authentication
3835| [5517] OpenSSH allows unauthorized access to resources
3836| [4646] OpenSSH UseLogin option allows remote users to execute commands as root
3837|
3838| Exploit-DB - https://www.exploit-db.com:
3839| [21579] OpenSSH 3.x Challenge-Response Buffer Overflow Vulnerabilities (2)
3840| [21578] OpenSSH 3.x Challenge-Response Buffer Overflow Vulnerabilities (1)
3841| [21402] OpenSSH 2.x/3.x Kerberos 4 TGT/AFS Token Buffer Overflow Vulnerability
3842| [21314] OpenSSH 2.x/3.0.1/3.0.2 Channel Code Off-By-One Vulnerability
3843| [20253] OpenSSH 1.2 scp File Create/Overwrite Vulnerability
3844| [17462] FreeBSD OpenSSH 3.5p1 - Remote Root Exploit
3845| [14866] Novell Netware 6.5 - OpenSSH Remote Stack Overflow
3846| [6094] Debian OpenSSH Remote SELinux Privilege Elevation Exploit (auth)
3847| [3303] Portable OpenSSH <= 3.6.1p-PAM / 4.1-SUSE Timing Attack Exploit
3848| [2444] OpenSSH <= 4.3 p1 (Duplicated Block) Remote Denial of Service Exploit
3849| [1572] Dropbear / OpenSSH Server (MAX_UNAUTH_CLIENTS) Denial of Service
3850| [258] glibc-2.2 and openssh-2.3.0p1 exploits glibc => 2.1.9x
3851| [26] OpenSSH/PAM <= 3.6.1p1 Remote Users Ident (gossh.sh)
3852| [25] OpenSSH/PAM <= 3.6.1p1 Remote Users Discovery Tool
3853|
3854| OpenVAS (Nessus) - http://www.openvas.org:
3855| [902488] OpenSSH 'sshd' GSSAPI Credential Disclosure Vulnerability
3856| [900179] OpenSSH CBC Mode Information Disclosure Vulnerability
3857| [881183] CentOS Update for openssh CESA-2012:0884 centos6
3858| [880802] CentOS Update for openssh CESA-2009:1287 centos5 i386
3859| [880746] CentOS Update for openssh CESA-2009:1470 centos5 i386
3860| [870763] RedHat Update for openssh RHSA-2012:0884-04
3861| [870129] RedHat Update for openssh RHSA-2008:0855-01
3862| [861813] Fedora Update for openssh FEDORA-2010-5429
3863| [861319] Fedora Update for openssh FEDORA-2007-395
3864| [861170] Fedora Update for openssh FEDORA-2007-394
3865| [861012] Fedora Update for openssh FEDORA-2007-715
3866| [840345] Ubuntu Update for openssh vulnerability USN-597-1
3867| [840300] Ubuntu Update for openssh update USN-612-5
3868| [840271] Ubuntu Update for openssh vulnerability USN-612-2
3869| [840268] Ubuntu Update for openssh update USN-612-7
3870| [840259] Ubuntu Update for openssh vulnerabilities USN-649-1
3871| [840214] Ubuntu Update for openssh vulnerability USN-566-1
3872| [831074] Mandriva Update for openssh MDVA-2010:162 (openssh)
3873| [830929] Mandriva Update for openssh MDVA-2010:090 (openssh)
3874| [830807] Mandriva Update for openssh MDVA-2010:026 (openssh)
3875| [830603] Mandriva Update for openssh MDVSA-2008:098 (openssh)
3876| [830523] Mandriva Update for openssh MDVSA-2008:078 (openssh)
3877| [830317] Mandriva Update for openssh-askpass-qt MDKA-2007:127 (openssh-askpass-qt)
3878| [830191] Mandriva Update for openssh MDKSA-2007:236 (openssh)
3879| [802407] OpenSSH 'sshd' Challenge Response Authentication Buffer Overflow Vulnerability
3880| [103503] openssh-server Forced Command Handling Information Disclosure Vulnerability
3881| [103247] OpenSSH Ciphersuite Specification Information Disclosure Weakness
3882| [103064] OpenSSH Legacy Certificate Signing Information Disclosure Vulnerability
3883| [100584] OpenSSH X Connections Session Hijacking Vulnerability
3884| [100153] OpenSSH CBC Mode Information Disclosure Vulnerability
3885| [66170] CentOS Security Advisory CESA-2009:1470 (openssh)
3886| [65987] SLES10: Security update for OpenSSH
3887| [65819] SLES10: Security update for OpenSSH
3888| [65514] SLES9: Security update for OpenSSH
3889| [65513] SLES9: Security update for OpenSSH
3890| [65334] SLES9: Security update for OpenSSH
3891| [65248] SLES9: Security update for OpenSSH
3892| [65218] SLES9: Security update for OpenSSH
3893| [65169] SLES9: Security update for openssh,openssh-askpass
3894| [65126] SLES9: Security update for OpenSSH
3895| [65019] SLES9: Security update for OpenSSH
3896| [65015] SLES9: Security update for OpenSSH
3897| [64931] CentOS Security Advisory CESA-2009:1287 (openssh)
3898| [61639] Debian Security Advisory DSA 1638-1 (openssh)
3899| [61030] Debian Security Advisory DSA 1576-2 (openssh)
3900| [61029] Debian Security Advisory DSA 1576-1 (openssh)
3901| [60840] FreeBSD Security Advisory (FreeBSD-SA-08:05.openssh.asc)
3902| [60803] Gentoo Security Advisory GLSA 200804-03 (openssh)
3903| [60667] Slackware Advisory SSA:2008-095-01 openssh
3904| [59014] Slackware Advisory SSA:2007-255-01 openssh
3905| [58741] Gentoo Security Advisory GLSA 200711-02 (openssh)
3906| [57919] Gentoo Security Advisory GLSA 200611-06 (openssh)
3907| [57895] Gentoo Security Advisory GLSA 200609-17 (openssh)
3908| [57585] Debian Security Advisory DSA 1212-1 (openssh (1:3.8.1p1-8.sarge.6))
3909| [57492] Slackware Advisory SSA:2006-272-02 openssh
3910| [57483] Debian Security Advisory DSA 1189-1 (openssh-krb5)
3911| [57476] FreeBSD Security Advisory (FreeBSD-SA-06:22.openssh.asc)
3912| [57470] FreeBSD Ports: openssh
3913| [56352] FreeBSD Security Advisory (FreeBSD-SA-06:09.openssh.asc)
3914| [56330] Gentoo Security Advisory GLSA 200602-11 (OpenSSH)
3915| [56294] Slackware Advisory SSA:2006-045-06 openssh
3916| [53964] Slackware Advisory SSA:2003-266-01 New OpenSSH packages
3917| [53885] Slackware Advisory SSA:2003-259-01 OpenSSH Security Advisory
3918| [53884] Slackware Advisory SSA:2003-260-01 OpenSSH updated again
3919| [53788] Debian Security Advisory DSA 025-1 (openssh)
3920| [52638] FreeBSD Security Advisory (FreeBSD-SA-03:15.openssh.asc)
3921| [52635] FreeBSD Security Advisory (FreeBSD-SA-03:12.openssh.asc)
3922| [11343] OpenSSH Client Unauthorized Remote Forwarding
3923| [10954] OpenSSH AFS/Kerberos ticket/token passing
3924| [10883] OpenSSH Channel Code Off by 1
3925| [10823] OpenSSH UseLogin Environment Variables
3926|
3927| SecurityTracker - https://www.securitytracker.com:
3928| [1028187] OpenSSH pam_ssh_agent_auth Module on Red Hat Enterprise Linux Lets Remote Users Execute Arbitrary Code
3929| [1026593] OpenSSH Lets Remote Authenticated Users Obtain Potentially Sensitive Information
3930| [1025739] OpenSSH on FreeBSD Has Buffer Overflow in pam_thread() That Lets Remote Users Execute Arbitrary Code
3931| [1025482] OpenSSH ssh-keysign Utility Lets Local Users Gain Elevated Privileges
3932| [1025028] OpenSSH Legacy Certificates May Disclose Stack Contents to Remote Users
3933| [1022967] OpenSSH on Red Hat Enterprise Linux Lets Remote Authenticated Users Gain Elevated Privileges
3934| [1021235] OpenSSH CBC Mode Error Handling May Let Certain Remote Users Obtain Plain Text in Certain Cases
3935| [1020891] OpenSSH on Debian Lets Remote Users Prevent Logins
3936| [1020730] OpenSSH for Red Hat Enterprise Linux Packages May Have Been Compromised
3937| [1020537] OpenSSH on HP-UX Lets Local Users Hijack X11 Sessions
3938| [1019733] OpenSSH Unsafe Default Configuration May Let Local Users Execute Arbitrary Commands
3939| [1019707] OpenSSH Lets Local Users Hijack Forwarded X Sessions in Certain Cases
3940| [1017756] Apple OpenSSH Key Generation Process Lets Remote Users Deny Service
3941| [1017183] OpenSSH Privilege Separation Monitor Validation Error May Cause the Monitor to Fail to Properly Control the Unprivileged Process
3942| [1016940] OpenSSH Race Condition in Signal Handler Lets Remote Users Deny Service and May Potentially Permit Code Execution
3943| [1016939] OpenSSH GSSAPI Authentication Abort Error Lets Remote Users Determine Valid Usernames
3944| [1016931] OpenSSH SSH v1 CRC Attack Detection Implementation Lets Remote Users Deny Service
3945| [1016672] OpenSSH on Mac OS X Lets Remote Users Deny Service
3946| [1015706] OpenSSH Interaction With OpenPAM Lets Remote Users Deny Service
3947| [1015540] OpenSSH scp Double Shell Character Expansion During Local-to-Local Copying May Let Local Users Gain Elevated Privileges in Certain Cases
3948| [1014845] OpenSSH May Unexpectedly Activate GatewayPorts and Also May Disclose GSSAPI Credentials in Certain Cases
3949| [1011193] OpenSSH scp Directory Traversal Flaw Lets Remote SSH Servers Overwrite Files in Certain Cases
3950| [1011143] OpenSSH Default Configuration May Be Unsafe When Used With Anonymous SSH Services
3951| [1007791] Portable OpenSSH PAM free() Bug May Let Remote Users Execute Root Code
3952| [1007716] OpenSSH buffer_append_space() and Other Buffer Management Errors May Let Remote Users Execute Arbitrary Code
3953| [1006926] OpenSSH Host Access Restrictions Can Be Bypassed By Remote Users
3954| [1006688] OpenSSH Timing Flaw With Pluggable Authentication Modules Can Disclose Valid User Account Names to Remote Users
3955| [1004818] OpenSSH's Secure Shell (SSH) Implementation Weakness May Disclose User Passwords to Remote Users During Man-in-the-Middle Attacks
3956| [1004616] OpenSSH Integer Overflow and Buffer Overflow May Allow Remote Users to Gain Root Access to the System
3957| [1004391] OpenSSH 'BSD_AUTH' Access Control Bug May Allow Unauthorized Remote Users to Authenticated to the System
3958| [1004115] OpenSSH Buffer Overflow in Kerberos Ticket and AFS Token Processing Lets Local Users Execute Arbitrary Code With Root Level Permissions
3959| [1003758] OpenSSH Off-by-one 'Channels' Bug May Let Authorized Remote Users Execute Arbitrary Code with Root Privileges
3960| [1002895] OpenSSH UseLogin Environment Variable Bug Lets Local Users Execute Commands and Gain Root Access
3961| [1002748] OpenSSH 3.0 Denial of Service Condition May Allow Remote Users to Crash the sshd Daemon and KerberosV Configuration Error May Allow Remote Users to Partially Authenticate When Authentication Should Not Be Permitted
3962| [1002734] OpenSSH's S/Key Implementation Information Disclosure Flaw Provides Remote Users With Information About Valid User Accounts
3963| [1002455] OpenSSH May Fail to Properly Restrict IP Addresses in Certain Configurations
3964| [1002432] OpenSSH's Sftp-server Subsystem Lets Authorized Remote Users with Restricted Keypairs Obtain Additional Access on the Server
3965| [1001683] OpenSSH Allows Authorized Users to Delete Other User Files Named Cookies
3966|
3967| OSVDB - http://www.osvdb.org:
3968| [92034] GSI-OpenSSH auth-pam.c Memory Management Authentication Bypass
3969| [90474] Red Hat / Fedora PAM Module for OpenSSH Incorrect error() Function Calling Local Privilege Escalation
3970| [90007] OpenSSH logingracetime / maxstartup Threshold Connection Saturation Remote DoS
3971| [81500] OpenSSH gss-serv.c ssh_gssapi_parse_ename Function Field Length Value Parsing Remote DoS
3972| [78706] OpenSSH auth-options.c sshd auth_parse_options Function authorized_keys Command Option Debug Message Information Disclosure
3973| [75753] OpenSSH PAM Module Aborted Conversation Local Information Disclosure
3974| [75249] OpenSSH sftp-glob.c remote_glob Function Glob Expression Parsing Remote DoS
3975| [75248] OpenSSH sftp.c process_put Function Glob Expression Parsing Remote DoS
3976| [72183] Portable OpenSSH ssh-keysign ssh-rand-helper Utility File Descriptor Leak Local Information Disclosure
3977| [70873] OpenSSH Legacy Certificates Stack Memory Disclosure
3978| [69658] OpenSSH J-PAKE Public Parameter Validation Shared Secret Authentication Bypass
3979| [67743] Novell NetWare OpenSSH SSHD.NLM Absolute Path Handling Remote Overflow
3980| [59353] OpenSSH sshd Local TCP Redirection Connection Masking Weakness
3981| [58495] OpenSSH sshd ChrootDirectory Feature SetUID Hard Link Local Privilege Escalation
3982| [56921] OpenSSH Unspecified Remote Compromise
3983| [53021] OpenSSH on ftp.openbsd.org Trojaned Distribution
3984| [50036] OpenSSH CBC Mode Chosen Ciphertext 32-bit Chunk Plaintext Context Disclosure
3985| [49386] OpenSSH sshd TCP Connection State Remote Account Enumeration
3986| [48791] OpenSSH on Debian sshd Crafted Username Arbitrary Remote SELinux Role Access
3987| [47635] OpenSSH Packages on Red Hat Enterprise Linux Compromised Distribution
3988| [47227] OpenSSH X11UseLocalhost X11 Forwarding Port Hijacking
3989| [45873] Cisco WebNS SSHield w/ OpenSSH Crafted Large Packet Remote DoS
3990| [43911] OpenSSH ~/.ssh/rc ForceCommand Bypass Arbitrary Command Execution
3991| [43745] OpenSSH X11 Forwarding Local Session Hijacking
3992| [43371] OpenSSH Trusted X11 Cookie Connection Policy Bypass
3993| [39214] OpenSSH linux_audit_record_event Crafted Username Audit Log Injection
3994| [37315] pam_usb OpenSSH Authentication Unspecified Issue
3995| [34850] OpenSSH on Mac OS X Key Generation Remote Connection DoS
3996| [34601] OPIE w/ OpenSSH Account Enumeration
3997| [34600] OpenSSH S/KEY Authentication Account Enumeration
3998| [32721] OpenSSH Username Password Complexity Account Enumeration
3999| [30232] OpenSSH Privilege Separation Monitor Weakness
4000| [29494] OpenSSH packet.c Invalid Protocol Sequence Remote DoS
4001| [29266] OpenSSH GSSAPI Authentication Abort Username Enumeration
4002| [29264] OpenSSH Signal Handler Pre-authentication Race Condition Code Execution
4003| [29152] OpenSSH Identical Block Packet DoS
4004| [27745] Apple Mac OS X OpenSSH Nonexistent Account Login Enumeration DoS
4005| [23797] OpenSSH with OpenPAM Connection Saturation Forked Process Saturation DoS
4006| [22692] OpenSSH scp Command Line Filename Processing Command Injection
4007| [20216] OpenSSH with KerberosV Remote Authentication Bypass
4008| [19142] OpenSSH Multiple X11 Channel Forwarding Leaks
4009| [19141] OpenSSH GSSAPIAuthentication Credential Escalation
4010| [18236] OpenSSH no pty Command Execution Local PAM Restriction Bypass
4011| [16567] OpenSSH Privilege Separation LoginGraceTime DoS
4012| [16039] Solaris 108994 Series Patch OpenSSH LDAP Client Authentication DoS
4013| [9562] OpenSSH Default Configuration Anon SSH Service Port Bounce Weakness
4014| [9550] OpenSSH scp Traversal Arbitrary File Overwrite
4015| [6601] OpenSSH *realloc() Unspecified Memory Errors
4016| [6245] OpenSSH SKEY/BSD_AUTH Challenge-Response Remote Overflow
4017| [6073] OpenSSH on FreeBSD libutil Arbitrary File Read
4018| [6072] OpenSSH PAM Conversation Function Stack Modification
4019| [6071] OpenSSH SSHv1 PAM Challenge-Response Authentication Privilege Escalation
4020| [5536] OpenSSH sftp-server Restricted Keypair Restriction Bypass
4021| [5408] OpenSSH echo simulation Information Disclosure
4022| [5113] OpenSSH NIS YP Netgroups Authentication Bypass
4023| [4536] OpenSSH Portable AIX linker Privilege Escalation
4024| [3938] OpenSSL and OpenSSH /dev/random Check Failure
4025| [3456] OpenSSH buffer_append_space() Heap Corruption
4026| [2557] OpenSSH Multiple Buffer Management Multiple Overflows
4027| [2140] OpenSSH w/ PAM Username Validity Timing Attack
4028| [2112] OpenSSH Reverse DNS Lookup Bypass
4029| [2109] OpenSSH sshd Root Login Timing Side-Channel Weakness
4030| [1853] OpenSSH Symbolic Link 'cookies' File Removal
4031| [839] OpenSSH PAMAuthenticationViaKbdInt Challenge-Response Remote Overflow
4032| [781] OpenSSH Kerberos TGT/AFS Token Passing Remote Overflow
4033| [730] OpenSSH Channel Code Off by One Remote Privilege Escalation
4034| [688] OpenSSH UseLogin Environment Variable Local Command Execution
4035| [642] OpenSSH Multiple Key Type ACL Bypass
4036| [504] OpenSSH SSHv2 Public Key Authentication Bypass
4037| [341] OpenSSH UseLogin Local Privilege Escalation
4038|_
403925/tcp closed smtp
404080/tcp open http nginx
4041| vulscan: VulDB - https://vuldb.com:
4042| [133852] Sangfor Sundray WLAN Controller up to 3.7.4.2 Cookie Header nginx_webconsole.php Code Execution
4043| [132132] SoftNAS Cloud 4.2.0/4.2.1 Nginx privilege escalation
4044| [131858] Puppet Discovery up to 1.3.x Nginx Container weak authentication
4045| [130644] Nginx Unit up to 1.7.0 Router Process Request Heap-based memory corruption
4046| [127759] VeryNginx 0.3.3 Web Application Firewall privilege escalation
4047| [126525] nginx up to 1.14.0/1.15.5 ngx_http_mp4_module Loop denial of service
4048| [126524] nginx up to 1.14.0/1.15.5 HTTP2 CPU Exhaustion denial of service
4049| [126523] nginx up to 1.14.0/1.15.5 HTTP2 Memory Consumption denial of service
4050| [119845] Pivotal Operations Manager up to 2.0.13/2.1.5 Nginx privilege escalation
4051| [114368] SuSE Portus 2.3 Nginx Certificate weak authentication
4052| [103517] nginx up to 1.13.2 Range Filter Request Integer Overflow memory corruption
4053| [89849] nginx RFC 3875 Namespace Conflict Environment Variable Open Redirect
4054| [87719] nginx up to 1.11.0 ngx_files.c ngx_chain_to_iovec denial of service
4055| [80760] nginx 0.6.18/1.9.9 DNS CNAME Record Crash denial of service
4056| [80759] nginx 0.6.18/1.9.9 DNS CNAME Record Use-After-Free denial of service
4057| [80758] nginx 0.6.18/1.9.9 DNS UDP Packet Crash denial of service
4058| [67677] nginx up to 1.7.3 SSL weak authentication
4059| [67296] nginx up to 1.7.3 SMTP Proxy ngx_mail_smtp_starttls privilege escalation
4060| [12822] nginx up to 1.5.11 SPDY SPDY Request Heap-based memory corruption
4061| [12824] nginx 1.5.10 on 32-bit SPDY memory corruption
4062| [11237] nginx up to 1.5.6 URI String Bypass privilege escalation
4063| [65364] nginx up to 1.1.13 Default Configuration information disclosure
4064| [8671] nginx up to 1.4 proxy_pass denial of service
4065| [8618] nginx 1.3.9/1.4.0 http/ngx_http_parse.c ngx_http_parse_chunked() memory corruption
4066| [7247] nginx 1.2.6 Proxy Function spoofing
4067| [61434] nginx 1.2.0/1.3.0 on Windows Access Restriction privilege escalation
4068| [5293] nginx up to 1.1.18 ngx_http_mp4_module MP4 File memory corruption
4069| [4843] nginx up to 1.0.13/1.1.16 HTTP Header Response Parser ngx_http_parse.c information disclosure
4070| [59645] nginx up to 0.8.9 Heap-based memory corruption
4071| [53592] nginx 0.8.36 memory corruption
4072| [53590] nginx up to 0.8.9 unknown vulnerability
4073| [51533] nginx 0.7.64 Terminal privilege escalation
4074| [50905] nginx up to 0.8.9 directory traversal
4075| [50903] nginx up to 0.8.10 NULL Pointer Dereference denial of service
4076| [50043] nginx up to 0.8.10 memory corruption
4077|
4078| MITRE CVE - https://cve.mitre.org:
4079| [CVE-2013-2070] http/modules/ngx_http_proxy_module.c in nginx 1.1.4 through 1.2.8 and 1.3.0 through 1.4.0, when proxy_pass is used with untrusted HTTP servers, allows remote attackers to cause a denial of service (crash) and obtain sensitive information from worker process memory via a crafted proxy response, a similar vulnerability to CVE-2013-2028.
4080| [CVE-2013-2028] The ngx_http_parse_chunked function in http/ngx_http_parse.c in nginx 1.3.9 through 1.4.0 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a chunked Transfer-Encoding request with a large chunk size, which triggers an integer signedness error and a stack-based buffer overflow.
4081| [CVE-2012-3380] Directory traversal vulnerability in naxsi-ui/nx_extract.py in the Naxsi module before 0.46-1 for Nginx allows local users to read arbitrary files via unspecified vectors.
4082| [CVE-2012-2089] Buffer overflow in ngx_http_mp4_module.c in the ngx_http_mp4_module module in nginx 1.0.7 through 1.0.14 and 1.1.3 through 1.1.18, when the mp4 directive is used, allows remote attackers to cause a denial of service (memory overwrite) or possibly execute arbitrary code via a crafted MP4 file.
4083| [CVE-2012-1180] Use-after-free vulnerability in nginx before 1.0.14 and 1.1.x before 1.1.17 allows remote HTTP servers to obtain sensitive information from process memory via a crafted backend response, in conjunction with a client request.
4084| [CVE-2011-4963] nginx/Windows 1.3.x before 1.3.1 and 1.2.x before 1.2.1 allows remote attackers to bypass intended access restrictions and access restricted files via (1) a trailing . (dot) or (2) certain "$index_allocation" sequences in a request.
4085| [CVE-2011-4315] Heap-based buffer overflow in compression-pointer processing in core/ngx_resolver.c in nginx before 1.0.10 allows remote resolvers to cause a denial of service (daemon crash) or possibly have unspecified other impact via a long response.
4086| [CVE-2010-2266] nginx 0.8.36 allows remote attackers to cause a denial of service (crash) via certain encoded directory traversal sequences that trigger memory corruption, as demonstrated using the "%c0.%c0." sequence.
4087| [CVE-2010-2263] nginx 0.8 before 0.8.40 and 0.7 before 0.7.66, when running on Windows, allows remote attackers to obtain source code or unparsed content of arbitrary files under the web document root by appending ::$DATA to the URI.
4088| [CVE-2009-4487] nginx 0.7.64 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.
4089| [CVE-2009-3898] Directory traversal vulnerability in src/http/modules/ngx_http_dav_module.c in nginx (aka Engine X) before 0.7.63, and 0.8.x before 0.8.17, allows remote authenticated users to create or overwrite arbitrary files via a .. (dot dot) in the Destination HTTP header for the WebDAV (1) COPY or (2) MOVE method.
4090| [CVE-2009-3896] src/http/ngx_http_parse.c in nginx (aka Engine X) 0.1.0 through 0.4.14, 0.5.x before 0.5.38, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.14 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a long URI.
4091| [CVE-2009-2629] Buffer underflow in src/http/ngx_http_parse.c in nginx 0.1.0 through 0.5.37, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.15 allows remote attackers to execute arbitrary code via crafted HTTP requests.
4092|
4093| SecurityFocus - https://www.securityfocus.com/bid/:
4094| [99534] Nginx CVE-2017-7529 Remote Integer Overflow Vulnerability
4095| [93903] Nginx CVE-2016-1247 Remote Privilege Escalation Vulnerability
4096| [91819] Nginx CVE-2016-1000105 Security Bypass Vulnerability
4097| [90967] nginx CVE-2016-4450 Denial of Service Vulnerability
4098| [82230] nginx Multiple Denial of Service Vulnerabilities
4099| [78928] Nginx CVE-2010-2266 Denial-Of-Service Vulnerability
4100| [70025] nginx CVE-2014-3616 SSL Session Fixation Vulnerability
4101| [69111] nginx SMTP Proxy Remote Command Injection Vulnerability
4102| [67507] nginx SPDY Implementation CVE-2014-0088 Arbitrary Code Execution Vulnerability
4103| [66537] nginx SPDY Implementation Heap Based Buffer Overflow Vulnerability
4104| [63814] nginx CVE-2013-4547 URI Processing Security Bypass Vulnerability
4105| [59824] Nginx CVE-2013-2070 Remote Security Vulnerability
4106| [59699] nginx 'ngx_http_parse.c' Stack Buffer Overflow Vulnerability
4107| [59496] nginx 'ngx_http_close_connection()' Remote Integer Overflow Vulnerability
4108| [59323] nginx NULL-Byte Arbitrary Code Execution Vulnerability
4109| [58105] Nginx 'access.log' Insecure File Permissions Vulnerability
4110| [57139] nginx CVE-2011-4968 Man in The Middle Vulnerability
4111| [55920] nginx CVE-2011-4963 Security Bypass Vulnerability
4112| [54331] Nginx Naxsi Module 'nx_extract.py' Script Remote File Disclosure Vulnerability
4113| [52999] nginx 'ngx_http_mp4_module.c' Buffer Overflow Vulnerability
4114| [52578] nginx 'ngx_cpystrn()' Information Disclosure Vulnerability
4115| [50710] nginx DNS Resolver Remote Heap Buffer Overflow Vulnerability
4116| [40760] nginx Remote Source Code Disclosure and Denial of Service Vulnerabilities
4117| [40434] nginx Space String Remote Source Code Disclosure Vulnerability
4118| [40420] nginx Directory Traversal Vulnerability
4119| [37711] nginx Terminal Escape Sequence in Logs Command Injection Vulnerability
4120| [36839] nginx 'ngx_http_process_request_headers()' Remote Buffer Overflow Vulnerability
4121| [36490] nginx WebDAV Multiple Directory Traversal Vulnerabilities
4122| [36438] nginx Proxy DNS Cache Domain Spoofing Vulnerability
4123| [36384] nginx HTTP Request Remote Buffer Overflow Vulnerability
4124|
4125| IBM X-Force - https://exchange.xforce.ibmcloud.com:
4126| [84623] Phusion Passenger gem for Ruby with nginx configuration insecure permissions
4127| [84172] nginx denial of service
4128| [84048] nginx buffer overflow
4129| [83923] nginx ngx_http_close_connection() integer overflow
4130| [83688] nginx null byte code execution
4131| [83103] Naxsi module for Nginx naxsi_unescape_uri() function security bypass
4132| [82319] nginx access.log information disclosure
4133| [80952] nginx SSL spoofing
4134| [77244] nginx and Microsoft Windows request security bypass
4135| [76778] Naxsi module for Nginx nx_extract.py directory traversal
4136| [74831] nginx ngx_http_mp4_module.c buffer overflow
4137| [74191] nginx ngx_cpystrn() information disclosure
4138| [74045] nginx header response information disclosure
4139| [71355] nginx ngx_resolver_copy() buffer overflow
4140| [59370] nginx characters denial of service
4141| [59369] nginx DATA source code disclosure
4142| [59047] nginx space source code disclosure
4143| [58966] nginx unspecified directory traversal
4144| [54025] nginx ngx_http_parse.c denial of service
4145| [53431] nginx WebDAV component directory traversal
4146| [53328] Nginx CRC-32 cached domain name spoofing
4147| [53250] Nginx ngx_http_parse_complex_uri() function code execution
4148|
4149| Exploit-DB - https://www.exploit-db.com:
4150| [26737] nginx 1.3.9/1.4.0 x86 Brute Force Remote Exploit
4151| [25775] Nginx HTTP Server 1.3.9-1.4.0 Chuncked Encoding Stack Buffer Overflow
4152| [25499] nginx 1.3.9-1.4.0 DoS PoC
4153| [24967] nginx 0.6.x Arbitrary Code Execution NullByte Injection
4154| [14830] nginx 0.6.38 - Heap Corruption Exploit
4155| [13822] Nginx <= 0.7.65 / 0.8.39 (dev) Source Disclosure / Download Vulnerability
4156| [13818] Nginx 0.8.36 Source Disclosure and DoS Vulnerabilities
4157| [12804] nginx [engine x] http server <= 0.6.36 Path Draversal
4158| [9901] nginx 0.7.0-0.7.61, 0.6.0-0.6.38, 0.5.0-0.5.37, 0.4.0-0.4.14 PoC
4159| [9829] nginx 0.7.61 WebDAV directory traversal
4160|
4161| OpenVAS (Nessus) - http://www.openvas.org:
4162| [864418] Fedora Update for nginx FEDORA-2012-3846
4163| [864310] Fedora Update for nginx FEDORA-2012-6238
4164| [864209] Fedora Update for nginx FEDORA-2012-6411
4165| [864204] Fedora Update for nginx FEDORA-2012-6371
4166| [864121] Fedora Update for nginx FEDORA-2012-4006
4167| [864115] Fedora Update for nginx FEDORA-2012-3991
4168| [864065] Fedora Update for nginx FEDORA-2011-16075
4169| [863654] Fedora Update for nginx FEDORA-2011-16110
4170| [861232] Fedora Update for nginx FEDORA-2007-1158
4171| [850180] SuSE Update for nginx openSUSE-SU-2012:0237-1 (nginx)
4172| [831680] Mandriva Update for nginx MDVSA-2012:043 (nginx)
4173| [802045] 64-bit Debian Linux Rootkit with nginx Doing iFrame Injection
4174| [801636] nginx HTTP Request Remote Buffer Overflow Vulnerability
4175| [103470] nginx 'ngx_http_mp4_module.c' Buffer Overflow Vulnerability
4176| [103469] nginx 'ngx_cpystrn()' Information Disclosure Vulnerability
4177| [103344] nginx DNS Resolver Remote Heap Buffer Overflow Vulnerability
4178| [100676] nginx Remote Source Code Disclosure and Denial of Service Vulnerabilities
4179| [100659] nginx Directory Traversal Vulnerability
4180| [100658] nginx Space String Remote Source Code Disclosure Vulnerability
4181| [100441] nginx Terminal Escape Sequence in Logs Command Injection Vulnerability
4182| [100321] nginx 'ngx_http_process_request_headers()' Remote Buffer Overflow Vulnerability
4183| [100277] nginx Proxy DNS Cache Domain Spoofing Vulnerability
4184| [100276] nginx HTTP Request Remote Buffer Overflow Vulnerability
4185| [100275] nginx WebDAV Multiple Directory Traversal Vulnerabilities
4186| [71574] Gentoo Security Advisory GLSA 201206-07 (nginx)
4187| [71308] Gentoo Security Advisory GLSA 201203-22 (nginx)
4188| [71297] FreeBSD Ports: nginx
4189| [71276] FreeBSD Ports: nginx
4190| [71239] Debian Security Advisory DSA 2434-1 (nginx)
4191| [66451] Fedora Core 11 FEDORA-2009-12782 (nginx)
4192| [66450] Fedora Core 10 FEDORA-2009-12775 (nginx)
4193| [66449] Fedora Core 12 FEDORA-2009-12750 (nginx)
4194| [64924] Gentoo Security Advisory GLSA 200909-18 (nginx)
4195| [64912] Fedora Core 10 FEDORA-2009-9652 (nginx)
4196| [64911] Fedora Core 11 FEDORA-2009-9630 (nginx)
4197| [64894] FreeBSD Ports: nginx
4198| [64869] Debian Security Advisory DSA 1884-1 (nginx)
4199|
4200| SecurityTracker - https://www.securitytracker.com:
4201| [1028544] nginx Bug Lets Remote Users Deny Service or Obtain Potentially Sensitive Information
4202| [1028519] nginx Stack Overflow Lets Remote Users Execute Arbitrary Code
4203| [1026924] nginx Buffer Overflow in ngx_http_mp4_module Lets Remote Users Execute Arbitrary Code
4204| [1026827] nginx HTTP Response Processing Lets Remote Users Obtain Portions of Memory Contents
4205|
4206| OSVDB - http://www.osvdb.org:
4207| [94864] cPnginx Plugin for cPanel nginx Configuration Manipulation Arbitrary File Access
4208| [93282] nginx proxy_pass Crafted Upstream Proxied Server Response Handling Worker Process Memory Disclosure
4209| [93037] nginx /http/ngx_http_parse.c Worker Process Crafted Request Handling Remote Overflow
4210| [92796] nginx ngx_http_close_connection Function Crafted r->
4211| [92634] nginx ngx_http_request.h zero_in_uri URL Null Byte Handling Remote Code Execution
4212| [90518] nginx Log Directory Permission Weakness Local Information Disclosure
4213| [88910] nginx Proxy Functionality SSL Certificate Validation MitM Spoofing Weakness
4214| [84339] nginx/Windows Multiple Request Sequence Parsing Arbitrary File Access
4215| [83617] Naxsi Module for Nginx naxsi-ui/ nx_extract.py Traversal Arbitrary File Access
4216| [81339] nginx ngx_http_mp4_module Module Atom MP4 File Handling Remote Overflow
4217| [80124] nginx HTTP Header Response Parsing Freed Memory Information Disclosure
4218| [77184] nginx ngx_resolver.c ngx_resolver_copy() Function DNS Response Parsing Remote Overflow
4219| [65531] nginx on Windows URI ::$DATA Append Arbitrary File Access
4220| [65530] nginx Encoded Traversal Sequence Memory Corruption Remote DoS
4221| [65294] nginx on Windows Encoded Space Request Remote Source Disclosure
4222| [63136] nginx on Windows 8.3 Filename Alias Request Access Rules / Authentication Bypass
4223| [62617] nginx Internal DNS Cache Poisoning Weakness
4224| [61779] nginx HTTP Request Escape Sequence Terminal Command Injection
4225| [59278] nginx src/http/ngx_http_parse.c ngx_http_process_request_headers() Function URL Handling NULL Dereference DoS
4226| [58328] nginx WebDAV Multiple Method Traversal Arbitrary File Write
4227| [58128] nginx ngx_http_parse_complex_uri() Function Underflow
4228| [44447] nginx (engine x) msie_refresh Directive Unspecified XSS
4229| [44446] nginx (engine x) ssl_verify_client Directive HTTP/0.9 Protocol Bypass
4230| [44445] nginx (engine x) ngx_http_realip_module satisfy_any Directive Unspecified Access Bypass
4231| [44444] nginx (engine x) X-Accel-Redirect Header Unspecified Traversal
4232| [44443] nginx (engine x) rtsig Method Signal Queue Overflow
4233| [44442] nginx (engine x) Worker Process Millisecond Timers Unspecified Overflow
4234|_
4235139/tcp closed netbios-ssn
4236443/tcp open ssl/tcpwrapped
4237445/tcp closed microsoft-ds
4238Service Info: OS: FreeBSD; CPE: cpe:/o:freebsd:freebsd
4239#######################################################################################################################################
4240[-] Target: https://cbos.gov.sd (91.121.115.139)
4241[L] X-Frame-Options: Not Enforced
4242[L] Robots.txt Found: https://cbos.gov.sd/robots.txt
4243[I] CMS Detection: Drupal
4244[I] Drupal Version: 7.67
4245[M] EDB-ID: 46452 "Drupal < 8.6.10 / < 8.5.11 - REST Module Remote Code Execution"
4246[M] EDB-ID: 46510 "Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit)"
4247[M] EDB-ID: 44448 "Drupal < 8.3.9 / < 8.4.6 / < 8.5.1 - 'Drupalgeddon2' Remote Code Execution (PoC)"
4248[M] EDB-ID: 44482 "Drupal < 8.3.9 / < 8.4.6 / < 8.5.1 - 'Drupalgeddon2' Remote Code Execution (Metasploit)"
4249[M] EDB-ID: 44449 "Drupal < 7.58 / < 8.3.9 / < 8.4.6 / < 8.5.1 - 'Drupalgeddon2' Remote Code Execution"
4250#######################################################################################################################################
4251[INFO] ------TARGET info------
4252[*] TARGET: https://cbos.gov.sd/
4253[*] TARGET IP: 91.121.115.139
4254[INFO] NO load balancer detected for cbos.gov.sd...
4255[*] DNS servers: ns1.cbos.gov.sd.
4256[*] TARGET server:
4257[*] CC: FR
4258[*] Country: France
4259[*] RegionCode: HDF
4260[*] RegionName: Hauts-de-France
4261[*] City: Roubaix
4262[*] ASN: AS16276
4263[*] BGP_PREFIX: 91.121.0.0/16
4264[*] ISP: OVH OVH SAS, FR
4265[INFO] SSL/HTTPS certificate detected
4266[*] Issuer: issuer=C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X3
4267[*] Subject: subject=CN = cbos.gov.sd
4268[ALERT] Let's Encrypt is commonly used for Phishing
4269[INFO] DNS enumeration:
4270[*] intranet.cbos.gov.sd 172.16.1.158
4271[*] mail.cbos.gov.sd 196.1.210.37
4272[*] ns1.cbos.gov.sd 196.1.210.35
4273[INFO] Possible abuse mails are:
4274[*] abuse@cbos.gov.sd
4275[*] abuse@ovh.net
4276[*] noc@ovh.net
4277[INFO] NO PAC (Proxy Auto Configuration) file FOUND
4278[ALERT] robots.txt file FOUND in http://cbos.gov.sd/robots.txt
4279[INFO] Checking for HTTP status codes recursively from http://cbos.gov.sd/robots.txt
4280[INFO] Status code Folders
4281[*] 200 http://cbos.gov.sd/CHANGELOG.txt
4282[*] 200 http://cbos.gov.sd/INSTALL.mysql.txt
4283[*] 200 http://cbos.gov.sd/INSTALL.pgsql.txt
4284[*] 200 http://cbos.gov.sd/install.php
4285[*] 200 http://cbos.gov.sd/INSTALL.sqlite.txt
4286[*] 200 http://cbos.gov.sd/INSTALL.txt
4287[*] 200 http://cbos.gov.sd/LICENSE.txt
4288[*] 200 http://cbos.gov.sd/MAINTAINERS.txt
4289[*] 200 http://cbos.gov.sd/node/add/
4290[*] 200 http://cbos.gov.sd/?q=filter/tips/
4291[*] 200 http://cbos.gov.sd/?q=node/add/
4292[*] 200 http://cbos.gov.sd/?q=search/
4293[*] 200 http://cbos.gov.sd/?q=user/login/
4294[*] 200 http://cbos.gov.sd/?q=user/password/
4295[*] 200 http://cbos.gov.sd/search/
4296[*] 200 http://cbos.gov.sd/UPGRADE.txt
4297[*] 200 http://cbos.gov.sd/user/login/
4298[*] 200 http://cbos.gov.sd/user/password/
4299[*] 200 http://cbos.gov.sd/xmlrpc.php
4300[INFO] Starting FUZZing in http://cbos.gov.sd/FUzZzZzZzZz...
4301[INFO] Status code Folders
4302[*] 200 http://cbos.gov.sd/news
4303[ALERT] Look in the source code. It may contain passwords
4304[ALERT] Content in http://cbos.gov.sd/ AND http://www.cbos.gov.sd/ is different
4305[INFO] MD5 for http://cbos.gov.sd/ is: 403214dab1dc8abd38496301eff419c1
4306[INFO] MD5 for http://www.cbos.gov.sd/ is: db4427df421078dc62c77c2ccf7d9611
4307[INFO] http://cbos.gov.sd/ redirects to https://cbos.gov.sd/
4308[INFO] http://www.cbos.gov.sd/ redirects to https://cbos.gov.sd/
4309[INFO] Links found from https://cbos.gov.sd/ http://91.121.115.139/:
4310[*] http://196.1.210.38/
4311[*] http://dot.jo/en
4312[*] http://dsbb.imf.org/Pages/GDDS/CtyCtgList.aspx?ctycode=SDN
4313[*] https://cbos.gov.sd/ar
4314[*] https://cbos.gov.sd/ar/about-cbos/نبذة-تاريخية-عن-بنك-السودان-المركزي
4315[*] https://cbos.gov.sd/ar/banks-and-exchange-prices
4316[*] https://cbos.gov.sd/ar/board-of-directors
4317[*] https://cbos.gov.sd/ar/branch-locator
4318[*] https://cbos.gov.sd/ar/careers
4319[*] https://cbos.gov.sd/ar/commercial-bank-locator
4320[*] https://cbos.gov.sd/ar/content/%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86-%D9%88%D8%B5%D9%86%D8%AF%D9%88%D9%82-%D8%A7%D9%84%D9%86%D9%82%D8%AF-%D8%A7%D9%84%D8%AF%D9%88%D9%84%D9%8A
4321[*] https://cbos.gov.sd/ar/content/%D8%A7%D9%84%D9%86%D8%B8%D8%A7%D9%85-%D8%A7%D9%84%D8%B9%D8%A7%D9%85-%D9%84%D9%86%D8%B4%D8%B1-%D8%A7%D9%84%D8%A8%D9%8A%D8%A7%D9%86%D8%A7%D8%AA
4322[*] https://cbos.gov.sd/ar/content/%D8%AE%D8%AF%D9%85%D8%A9-%D8%A7%D9%84%D8%B9%D9%85%D9%84%D8%A7%D8%A1-0
4323[*] https://cbos.gov.sd/ar/content/%D9%85%D8%A4%D8%B4%D8%B1%D8%A7%D8%AA-%D8%A7%D9%82%D8%AA%D8%B5%D8%A7%D8%AF%D9%8A%D8%A9-0
4324[*] https://cbos.gov.sd/ar/content/%D9%85%D9%83%D8%A7%D9%81%D8%AD%D8%A9-%D8%BA%D8%B3%D9%84-%D8%A7%D9%84%D8%A3%D9%85%D9%88%D8%A7%D9%84-%D9%88%D8%AA%D9%85%D9%88%D9%8A%D9%84-%D8%A7%D9%84%D8%A5%D8%B1%D9%87%D8%A7%D8%A8-0
4325[*] https://cbos.gov.sd/ar/content/%D9%88%D8%AD%D8%AF%D8%A9-%D8%A7%D9%84%D8%AA%D9%85%D9%88%D9%8A%D9%84-%D8%A7%D9%84%D8%A7%D8%B5%D8%BA%D8%B1
4326[*] https://cbos.gov.sd/ar/content/أسعار-الصرف
4327[*] https://cbos.gov.sd/ar/content/أغراض-البنك-الأساسية
4328[*] https://cbos.gov.sd/ar/content/البنوك-العاملة-بالسودان
4329[*] https://cbos.gov.sd/ar/content/التوزيع-الجغرافي-للجهاز-المصرفي
4330[*] https://cbos.gov.sd/ar/content/الخطة-الإستراتيجية-الخمسية-الثانية-2012-2016
4331[*] https://cbos.gov.sd/ar/content/الرؤية-والرسالة-والقيم-الجوهرية
4332[*] https://cbos.gov.sd/ar/content/السودان-وصندوق-النقد-الدولي
4333[*] https://cbos.gov.sd/ar/content/المؤسسات-المالية
4334[*] https://cbos.gov.sd/ar/content/المزيد
4335[*] https://cbos.gov.sd/ar/content/النظام-العام-لنشر-البيانات
4336[*] https://cbos.gov.sd/ar/content/الهيكل-الإداري-والتنظيمي
4337[*] https://cbos.gov.sd/ar/content/توثيق-تجربة-السودان-في-المصارف-والمؤسسات-المالية-الإسلامية
4338[*] https://cbos.gov.sd/ar/content/حقوق-النشر-وحدود-المسؤولية
4339[*] https://cbos.gov.sd/ar/content/خدمة-العملاء-0
4340[*] https://cbos.gov.sd/ar/content/سياسات-بنك-السودان-المركزى-للعام-2013
4341[*] https://cbos.gov.sd/ar/content/سياسات-بنك-السودان-المركزي-للعام-2012م
4342[*] https://cbos.gov.sd/ar/content/سياسات-بنك-السودان-المركزي-للعام-2014
4343[*] https://cbos.gov.sd/ar/content/سياسات-بنك-السودان-المركزي-للعام-2015
4344[*] https://cbos.gov.sd/ar/content/سياسات-بنك-السودان-المركزي-للعام-2016
4345[*] https://cbos.gov.sd/ar/content/سياسات-بنك-السودان-المركزي-للعام-2017
4346[*] https://cbos.gov.sd/ar/content/سياسات-بنك-السودان-المركزي-للعام-2018
4347[*] https://cbos.gov.sd/ar/content/سياسات-بنك-السودان-المركزي-للعام-2019
4348[*] https://cbos.gov.sd/ar/content/شركات-الصرافة-العاملة-بالسودان
4349[*] https://cbos.gov.sd/ar/content/طبيعة-النظام-المصرفي
4350[*] https://cbos.gov.sd/ar/content/عطاءات-ومناقصات-ومشاريع-تطوير
4351[*] https://cbos.gov.sd/ar/content/علاقات-دولية
4352[*] https://cbos.gov.sd/ar/content/قاعدة-البيانات-الاحصائية
4353[*] https://cbos.gov.sd/ar/content/قانون-الأموال-المرهونة-للمصارف
4354[*] https://cbos.gov.sd/ar/content/قانون-الاستعلام-والتصنيف-الائتماني
4355[*] https://cbos.gov.sd/ar/content/قانون-المعاملات-الالكترونية
4356[*] https://cbos.gov.sd/ar/content/قانون-بنك-السودان-لسنة-2002-معدلا-حتى-2012
4357[*] https://cbos.gov.sd/ar/content/قانون-تنظيم-التعامل-بالنقد
4358[*] https://cbos.gov.sd/ar/content/قانون-تنظيم-العمل-المصرفي-للعام-2004
4359[*] https://cbos.gov.sd/ar/content/قانون-جرائم-المعلوماتية-لسنة-2007
4360[*] https://cbos.gov.sd/ar/content/قانون-صندوق-ضمان-الودائع-المصرفية
4361[*] https://cbos.gov.sd/ar/content/قانون-مكافحة-غسل-الأموال-وتمويل-الإرهاب
4362[*] https://cbos.gov.sd/ar/content/قواعد-عمل-وترخيص-مكاتب-تمثيل-المصارف-الأجنبية
4363[*] https://cbos.gov.sd/ar/content/قوانين-ولوائح
4364[*] https://cbos.gov.sd/ar/content/كلمة-ترحيبية
4365[*] https://cbos.gov.sd/ar/content/لائحة-تنظيم-أعمال-المصارف-بالمناطق-الحرة-السودانية-لسنة-2013
4366[*] https://cbos.gov.sd/ar/content/لائحة-تنظيم-أعمال-نظم-الدفع
4367[*] https://cbos.gov.sd/ar/content/لائحة-تنظيم-التعامل-بالنقد-الاجنبي
4368[*] https://cbos.gov.sd/ar/content/لائحة-تنظيم-شركات-الصرافة-لسنة-2011م
4369[*] https://cbos.gov.sd/ar/content/لائحة-تنظيم-عمل-المؤسسات-المالية-للإجارة
4370[*] https://cbos.gov.sd/ar/content/لائحة-تنظيم-عمل-المراجعة-الداخلية-ببنك-السودان-المركزي
4371[*] https://cbos.gov.sd/ar/content/لائحة-تنظيم-عمل-مؤسسات-الاستثمار-المالي
4372[*] https://cbos.gov.sd/ar/content/لائحة-تنظيم-عمل-مؤسسات-التمويل-الأصغر
4373[*] https://cbos.gov.sd/ar/content/لائحة-تنظيم-عمل-مصارف-التنمية-والاستثمار-لسنة-2011م
4374[*] https://cbos.gov.sd/ar/content/لائحــة-شـروط-الترخيص-بمزاولة-العمل-المصرفي
4375[*] https://cbos.gov.sd/ar/content/مؤشرات-اقتصادية-0
4376[*] https://cbos.gov.sd/ar/content/محافظو-بنك-السودان-المركزي
4377[*] https://cbos.gov.sd/ar/content/مكافحة-غسل-الأموال-وتمويل-الإرهاب
4378[*] https://cbos.gov.sd/ar/content/مكافحة-غسل-الأموال-وتمويل-الإرهاب-0
4379[*] https://cbos.gov.sd/ar/content/ملاحق-إدارة-السياسات-قبل-العام-2013
4380[*] https://cbos.gov.sd/ar/content/منشورات-ادارة-السياسات
4381[*] https://cbos.gov.sd/ar/content/منشورات-قطاع-المؤسسات-المالية-والنظم
4382[*] https://cbos.gov.sd/ar/content/منشور-سياسات-بنك-السودان-المركزي-للعام2012-تعديل-رقم-12012
4383[*] https://cbos.gov.sd/ar/content/مواقع-مهمة
4384[*] https://cbos.gov.sd/ar/content/نظم-الدفع
4385[*] https://cbos.gov.sd/ar/content/وحدة-التمويل-الاصغر
4386[*] https://cbos.gov.sd/ar/content/وكالة-ضمان-التمويل-الاصغر-تيسير
4387[*] https://cbos.gov.sd/ar/daily-quotation
4388[*] https://cbos.gov.sd/ar/dollar-exchange-rates
4389[*] https://cbos.gov.sd/ar/event-created/month/2019-11
4390[*] https://cbos.gov.sd/ar/exchange-rates
4391[*] https://cbos.gov.sd/ar/forms
4392[*] https://cbos.gov.sd/ar/form/اتصل-بنا
4393[*] https://cbos.gov.sd/ar/image-gallery
4394[*] https://cbos.gov.sd/ar/members
4395[*] https://cbos.gov.sd/ar/national-currencies
4396[*] https://cbos.gov.sd/ar/news
4397[*] https://cbos.gov.sd/ar/news/%D8%A7%D9%84%D9%85%D8%B1%D9%83%D8%B2%D9%8A-%D9%8A%D8%B7%D8%B1%D8%AD-%D9%81%D8%A6%D8%A7%D8%AA-%D8%B9%D9%85%D9%84%D8%A9-%D9%86%D9%82%D8%AF%D9%8A%D8%A9-%D8%AC%D8%AF%D9%8A%D8%AF%D8%A9-%D9%85%D9%86-%D9%81%D8%A6%D8%A9-%D8%A7%D9%84%D9%85%D8%A7%D8%A6%D8%A9-%D9%88%D8%A7%D9%84%D9%85%D8%A7%D8%A6%D8%AA%D9%8A-%D8%AC%D9%86%D9%8A%D9%87
4398[*] https://cbos.gov.sd/ar/news/%D8%AA%D9%82%D8%B1%D9%8A%D8%B1-%D8%AD%D9%88%D9%84-%D8%A7%D9%84%D8%B4%D9%85%D9%88%D9%84-%D8%A7%D9%84%D9%85%D8%A7%D9%84%D9%8A-%D9%81%D9%89-%D8%A7%D9%84%D9%85%D9%86%D8%A7%D8%B7%D9%82-%D8%A7%D9%84%D8%B1%D9%8A%D9%81%D9%8A%D8%A9-%D9%81%D9%89-%D8%A7%D9%84%D8%B3%D9%88%D8%AF%D8%A7%D9%86
4399[*] https://cbos.gov.sd/ar/news/المركزي-يطرح-فئات-عملة-نقدية-جديدة-من-فئة-المائة-والمائتي-جنيه
4400[*] https://cbos.gov.sd/ar/news/تقرير-حول-الشمول-المالي-فى-المناطق-الريفية-فى-السودان
4401[*] https://cbos.gov.sd/ar/node/125/results
4402[*] https://cbos.gov.sd/ar/node/17257/
4403[*] https://cbos.gov.sd/ar/node?mini=2019-10
4404[*] https://cbos.gov.sd/ar/node?mini=2019-12
4405[*] https://cbos.gov.sd/ar/node?page=1
4406[*] https://cbos.gov.sd/ar/node?page=2
4407[*] https://cbos.gov.sd/ar/periodicals-publications
4408[*] https://cbos.gov.sd/ar/periodicals-publications?field_publication_type_tid_i18n=242
4409[*] https://cbos.gov.sd/ar/periodicals-publications?field_publication_type_tid_i18n=250
4410[*] https://cbos.gov.sd/ar/periodicals-publications?field_publication_type_tid_i18n=46
4411[*] https://cbos.gov.sd/ar/periodicals-publications?field_publication_type_tid_i18n=47
4412[*] https://cbos.gov.sd/ar/periodicals-publications?field_publication_type_tid_i18n=48
4413[*] https://cbos.gov.sd/ar/periodicals-publications?field_publication_type_tid_i18n=49
4414[*] https://cbos.gov.sd/ar/periodicals-publications?field_publication_type_tid_i18n=52
4415[*] https://cbos.gov.sd/ar/periodicals-publications?field_publication_type_tid_i18n=53
4416[*] https://cbos.gov.sd/ar/periodicals-publications?field_publication_type_tid_i18n=55
4417[*] https://cbos.gov.sd/ar/periodicals-publications?field_publication_type_tid_i18n=57
4418[*] https://cbos.gov.sd/ar/periodicals-publications?field_publication_type_tid_i18n=58
4419[*] https://cbos.gov.sd/ar/poll
4420[*] https://cbos.gov.sd/ar/publication-type/النشرة-الدورية-لبنك-السودان-المركزي
4421[*] https://cbos.gov.sd/ar/rss.xml
4422[*] https://cbos.gov.sd/ar/sitemap
4423[*] https://cbos.gov.sd/en
4424[*] https://cbos.gov.sd/#main-content
4425[*] https://cbos.gov.sd/sites/default/files/banking_system_balad.pdf
4426[*] http://www.facebook.com/
4427[*] http://www.imf.org/external/country/SDN/index.htm
4428[*] http://www.linkedin.com/
4429[*] http://www.twitter.com/
4430[*] http://www.youtube.com/
4431[INFO] GOOGLE has 2,340,000 results (0.22 seconds) about http://cbos.gov.sd/
4432[INFO] BING shows 91.121.115.139 is shared with 32 hosts/vhosts
4433[INFO] Shodan detected the following opened ports on 91.121.115.139:
4434[*] 2016
4435[*] 22
4436[*] 443
4437[*] 7
4438[*] 80
4439[*] 8858
4440[INFO] ------VirusTotal SECTION------
4441[INFO] VirusTotal passive DNS only stores address records. The following domains resolved to the given IP address:
4442[INFO] Latest URLs hosted in this IP address detected by at least one URL scanner or malicious URL dataset:
4443[INFO] Latest files that are not detected by any antivirus solution and were downloaded by VirusTotal from the IP address provided:
4444[INFO] ------Alexa Rank SECTION------
4445[INFO] Percent of Visitors Rank in Country:
4446[INFO] Percent of Search Traffic:
4447[INFO] Percent of Unique Visits:
4448[INFO] Total Sites Linking In:
4449[*] Total Sites
4450[INFO] Useful links related to cbos.gov.sd - 91.121.115.139:
4451[*] https://www.virustotal.com/pt/ip-address/91.121.115.139/information/
4452[*] https://www.hybrid-analysis.com/search?host=91.121.115.139
4453[*] https://www.shodan.io/host/91.121.115.139
4454[*] https://www.senderbase.org/lookup/?search_string=91.121.115.139
4455[*] https://www.alienvault.com/open-threat-exchange/ip/91.121.115.139
4456[*] http://pastebin.com/search?q=91.121.115.139
4457[*] http://urlquery.net/search.php?q=91.121.115.139
4458[*] http://www.alexa.com/siteinfo/cbos.gov.sd
4459[*] http://www.google.com/safebrowsing/diagnostic?site=cbos.gov.sd
4460[*] https://censys.io/ipv4/91.121.115.139
4461[*] https://www.abuseipdb.com/check/91.121.115.139
4462[*] https://urlscan.io/search/#91.121.115.139
4463[*] https://github.com/search?q=91.121.115.139&type=Code
4464[INFO] Useful links related to AS16276 - 91.121.0.0/16:
4465[*] http://www.google.com/safebrowsing/diagnostic?site=AS:16276
4466[*] https://www.senderbase.org/lookup/?search_string=91.121.0.0/16
4467[*] http://bgp.he.net/AS16276
4468[*] https://stat.ripe.net/AS16276
4469[INFO] Date: 10/11/19 | Time: 04:48:33
4470[INFO] Total time: 3 minute(s) and 58 second(s)
4471#######################################################################################################################################
4472[+] Themes found:
4473 bootstrap https://cbos.gov.sd/sites/all/themes/bootstrap/
4474 https://cbos.gov.sd/sites/all/themes/bootstrap/LICENSE.txt
4475 seven https://cbos.gov.sd/themes/seven/
4476 garland https://cbos.gov.sd/themes/garland/
4477
4478[+] Possible interesting urls found:
4479 Default changelog file - https://cbos.gov.sd/CHANGELOG.txt
4480 Default admin - https://cbos.gov.sd/user/login
4481
4482[+] Possible version(s):
4483 7.67
4484
4485[+] Plugins found:
4486 ctools https://cbos.gov.sd/sites/all/modules/ctools/
4487 https://cbos.gov.sd/sites/all/modules/ctools/CHANGELOG.txt
4488 https://cbos.gov.sd/sites/all/modules/ctools/LICENSE.txt
4489 https://cbos.gov.sd/sites/all/modules/ctools/API.txt
4490 token https://cbos.gov.sd/sites/all/modules/token/
4491 https://cbos.gov.sd/sites/all/modules/token/README.txt
4492 https://cbos.gov.sd/sites/all/modules/token/LICENSE.txt
4493 views https://cbos.gov.sd/sites/all/modules/views/
4494 https://cbos.gov.sd/sites/all/modules/views/README.txt
4495 https://cbos.gov.sd/sites/all/modules/views/LICENSE.txt
4496 pathauto https://cbos.gov.sd/sites/all/modules/pathauto/
4497 https://cbos.gov.sd/sites/all/modules/pathauto/README.txt
4498 https://cbos.gov.sd/sites/all/modules/pathauto/LICENSE.txt
4499 libraries https://cbos.gov.sd/sites/all/modules/libraries/
4500 https://cbos.gov.sd/sites/all/modules/libraries/CHANGELOG.txt
4501 https://cbos.gov.sd/sites/all/modules/libraries/README.txt
4502 https://cbos.gov.sd/sites/all/modules/libraries/LICENSE.txt
4503 entity https://cbos.gov.sd/sites/all/modules/entity/
4504 https://cbos.gov.sd/sites/all/modules/entity/README.txt
4505 https://cbos.gov.sd/sites/all/modules/entity/LICENSE.txt
4506 webform https://cbos.gov.sd/sites/all/modules/webform/
4507 https://cbos.gov.sd/sites/all/modules/webform/README.txt
4508 https://cbos.gov.sd/sites/all/modules/webform/LICENSE.txt
4509 jquery_update https://cbos.gov.sd/sites/all/modules/jquery_update/
4510 https://cbos.gov.sd/sites/all/modules/jquery_update/README.txt
4511 https://cbos.gov.sd/sites/all/modules/jquery_update/LICENSE.txt
4512 admin_menu https://cbos.gov.sd/sites/all/modules/admin_menu/
4513 https://cbos.gov.sd/sites/all/modules/admin_menu/CHANGELOG.txt
4514 https://cbos.gov.sd/sites/all/modules/admin_menu/README.txt
4515 https://cbos.gov.sd/sites/all/modules/admin_menu/LICENSE.txt
4516 date https://cbos.gov.sd/sites/all/modules/date/
4517 https://cbos.gov.sd/sites/all/modules/date/CHANGELOG.txt
4518 https://cbos.gov.sd/sites/all/modules/date/README.txt
4519 https://cbos.gov.sd/sites/all/modules/date/LICENSE.txt
4520 imce https://cbos.gov.sd/sites/all/modules/imce/
4521 https://cbos.gov.sd/sites/all/modules/imce/README.txt
4522 https://cbos.gov.sd/sites/all/modules/imce/LICENSE.txt
4523 google_analytics https://cbos.gov.sd/sites/all/modules/google_analytics/
4524 https://cbos.gov.sd/sites/all/modules/google_analytics/README.txt
4525 https://cbos.gov.sd/sites/all/modules/google_analytics/LICENSE.txt
4526 ckeditor https://cbos.gov.sd/sites/all/modules/ckeditor/
4527 https://cbos.gov.sd/sites/all/modules/ckeditor/CHANGELOG.txt
4528 https://cbos.gov.sd/sites/all/modules/ckeditor/README.txt
4529 https://cbos.gov.sd/sites/all/modules/ckeditor/LICENSE.txt
4530 link https://cbos.gov.sd/sites/all/modules/link/
4531 https://cbos.gov.sd/sites/all/modules/link/README.txt
4532 https://cbos.gov.sd/sites/all/modules/link/LICENSE.txt
4533 field_group https://cbos.gov.sd/sites/all/modules/field_group/
4534 https://cbos.gov.sd/sites/all/modules/field_group/CHANGELOG.txt
4535 https://cbos.gov.sd/sites/all/modules/field_group/README.txt
4536 https://cbos.gov.sd/sites/all/modules/field_group/LICENSE.txt
4537 captcha https://cbos.gov.sd/sites/all/modules/captcha/
4538 https://cbos.gov.sd/sites/all/modules/captcha/README.txt
4539 https://cbos.gov.sd/sites/all/modules/captcha/LICENSE.txt
4540 rules https://cbos.gov.sd/sites/all/modules/rules/
4541 https://cbos.gov.sd/sites/all/modules/rules/README.txt
4542 https://cbos.gov.sd/sites/all/modules/rules/LICENSE.txt
4543 xmlsitemap https://cbos.gov.sd/sites/all/modules/xmlsitemap/
4544 https://cbos.gov.sd/sites/all/modules/xmlsitemap/README.txt
4545 https://cbos.gov.sd/sites/all/modules/xmlsitemap/LICENSE.txt
4546 views_bulk_operations https://cbos.gov.sd/sites/all/modules/views_bulk_operations/
4547 https://cbos.gov.sd/sites/all/modules/views_bulk_operations/README.txt
4548 https://cbos.gov.sd/sites/all/modules/views_bulk_operations/LICENSE.txt
4549 colorbox https://cbos.gov.sd/sites/all/modules/colorbox/
4550 https://cbos.gov.sd/sites/all/modules/colorbox/README.txt
4551 https://cbos.gov.sd/sites/all/modules/colorbox/LICENSE.txt
4552 media https://cbos.gov.sd/sites/all/modules/media/
4553 https://cbos.gov.sd/sites/all/modules/media/README.txt
4554 https://cbos.gov.sd/sites/all/modules/media/LICENSE.txt
4555 views_slideshow https://cbos.gov.sd/sites/all/modules/views_slideshow/
4556 https://cbos.gov.sd/sites/all/modules/views_slideshow/README.txt
4557 https://cbos.gov.sd/sites/all/modules/views_slideshow/LICENSE.txt
4558 devel https://cbos.gov.sd/sites/all/modules/devel/
4559 https://cbos.gov.sd/sites/all/modules/devel/README.txt
4560 https://cbos.gov.sd/sites/all/modules/devel/LICENSE.txt
4561 variable https://cbos.gov.sd/sites/all/modules/variable/
4562 https://cbos.gov.sd/sites/all/modules/variable/README.txt
4563 https://cbos.gov.sd/sites/all/modules/variable/LICENSE.txt
4564 panels https://cbos.gov.sd/sites/all/modules/panels/
4565 https://cbos.gov.sd/sites/all/modules/panels/CHANGELOG.txt
4566 https://cbos.gov.sd/sites/all/modules/panels/README.txt
4567 https://cbos.gov.sd/sites/all/modules/panels/LICENSE.txt
4568 file_entity https://cbos.gov.sd/sites/all/modules/file_entity/
4569 https://cbos.gov.sd/sites/all/modules/file_entity/LICENSE.txt
4570 i18n https://cbos.gov.sd/sites/all/modules/i18n/
4571 https://cbos.gov.sd/sites/all/modules/i18n/README.txt
4572 https://cbos.gov.sd/sites/all/modules/i18n/LICENSE.txt
4573 context https://cbos.gov.sd/sites/all/modules/context/
4574 https://cbos.gov.sd/sites/all/modules/context/README.txt
4575 https://cbos.gov.sd/sites/all/modules/context/LICENSE.txt
4576 https://cbos.gov.sd/sites/all/modules/context/API.txt
4577 field_collection https://cbos.gov.sd/sites/all/modules/field_collection/
4578 https://cbos.gov.sd/sites/all/modules/field_collection/README.txt
4579 https://cbos.gov.sd/sites/all/modules/field_collection/LICENSE.txt
4580 block_class https://cbos.gov.sd/sites/all/modules/block_class/
4581 https://cbos.gov.sd/sites/all/modules/block_class/README.txt
4582 https://cbos.gov.sd/sites/all/modules/block_class/LICENSE.txt
4583 ds https://cbos.gov.sd/sites/all/modules/ds/
4584 https://cbos.gov.sd/sites/all/modules/ds/README.txt
4585 https://cbos.gov.sd/sites/all/modules/ds/LICENSE.txt
4586 menu_attributes https://cbos.gov.sd/sites/all/modules/menu_attributes/
4587 https://cbos.gov.sd/sites/all/modules/menu_attributes/CHANGELOG.txt
4588 https://cbos.gov.sd/sites/all/modules/menu_attributes/LICENSE.txt
4589 superfish https://cbos.gov.sd/sites/all/modules/superfish/
4590 https://cbos.gov.sd/sites/all/modules/superfish/CHANGELOG.txt
4591 https://cbos.gov.sd/sites/all/modules/superfish/README.txt
4592 https://cbos.gov.sd/sites/all/modules/superfish/LICENSE.txt
4593 better_exposed_filters https://cbos.gov.sd/sites/all/modules/better_exposed_filters/
4594 https://cbos.gov.sd/sites/all/modules/better_exposed_filters/README.txt
4595 https://cbos.gov.sd/sites/all/modules/better_exposed_filters/LICENSE.txt
4596 smtp https://cbos.gov.sd/sites/all/modules/smtp/
4597 https://cbos.gov.sd/sites/all/modules/smtp/README.txt
4598 https://cbos.gov.sd/sites/all/modules/smtp/LICENSE.txt
4599 admin_views https://cbos.gov.sd/sites/all/modules/admin_views/
4600 https://cbos.gov.sd/sites/all/modules/admin_views/LICENSE.txt
4601 calendar https://cbos.gov.sd/sites/all/modules/calendar/
4602 https://cbos.gov.sd/sites/all/modules/calendar/CHANGELOG.txt
4603 https://cbos.gov.sd/sites/all/modules/calendar/README.txt
4604 https://cbos.gov.sd/sites/all/modules/calendar/LICENSE.txt
4605 search_api https://cbos.gov.sd/sites/all/modules/search_api/
4606 https://cbos.gov.sd/sites/all/modules/search_api/CHANGELOG.txt
4607 https://cbos.gov.sd/sites/all/modules/search_api/README.txt
4608 https://cbos.gov.sd/sites/all/modules/search_api/LICENSE.txt
4609 site_map https://cbos.gov.sd/sites/all/modules/site_map/
4610 https://cbos.gov.sd/sites/all/modules/site_map/README.txt
4611 https://cbos.gov.sd/sites/all/modules/site_map/LICENSE.txt
4612 linkit https://cbos.gov.sd/sites/all/modules/linkit/
4613 https://cbos.gov.sd/sites/all/modules/linkit/LICENSE.txt
4614 media_youtube https://cbos.gov.sd/sites/all/modules/media_youtube/
4615 https://cbos.gov.sd/sites/all/modules/media_youtube/README.txt
4616 https://cbos.gov.sd/sites/all/modules/media_youtube/LICENSE.txt
4617 plupload https://cbos.gov.sd/sites/all/modules/plupload/
4618 https://cbos.gov.sd/sites/all/modules/plupload/CHANGELOG.txt
4619 https://cbos.gov.sd/sites/all/modules/plupload/README.txt
4620 https://cbos.gov.sd/sites/all/modules/plupload/LICENSE.txt
4621 multiupload_filefield_widget https://cbos.gov.sd/sites/all/modules/multiupload_filefield_widget/
4622 https://cbos.gov.sd/sites/all/modules/multiupload_filefield_widget/README.txt
4623 https://cbos.gov.sd/sites/all/modules/multiupload_filefield_widget/LICENSE.txt
4624 multiupload_imagefield_widget https://cbos.gov.sd/sites/all/modules/multiupload_imagefield_widget/
4625 https://cbos.gov.sd/sites/all/modules/multiupload_imagefield_widget/README.txt
4626 https://cbos.gov.sd/sites/all/modules/multiupload_imagefield_widget/LICENSE.txt
4627 filefield_sources https://cbos.gov.sd/sites/all/modules/filefield_sources/
4628 https://cbos.gov.sd/sites/all/modules/filefield_sources/README.txt
4629 https://cbos.gov.sd/sites/all/modules/filefield_sources/LICENSE.txt
4630 draggableviews https://cbos.gov.sd/sites/all/modules/draggableviews/
4631 https://cbos.gov.sd/sites/all/modules/draggableviews/README.txt
4632 https://cbos.gov.sd/sites/all/modules/draggableviews/LICENSE.txt
4633 simplenews https://cbos.gov.sd/sites/all/modules/simplenews/
4634 https://cbos.gov.sd/sites/all/modules/simplenews/README.txt
4635 https://cbos.gov.sd/sites/all/modules/simplenews/LICENSE.txt
4636 image_url_formatter https://cbos.gov.sd/sites/all/modules/image_url_formatter/
4637 https://cbos.gov.sd/sites/all/modules/image_url_formatter/README.txt
4638 https://cbos.gov.sd/sites/all/modules/image_url_formatter/LICENSE.txt
4639 auto_nodetitle https://cbos.gov.sd/sites/all/modules/auto_nodetitle/
4640 https://cbos.gov.sd/sites/all/modules/auto_nodetitle/README.txt
4641 https://cbos.gov.sd/sites/all/modules/auto_nodetitle/LICENSE.txt
4642 field_formatter_settings https://cbos.gov.sd/sites/all/modules/field_formatter_settings/
4643 https://cbos.gov.sd/sites/all/modules/field_formatter_settings/LICENSE.txt
4644 search_api_db https://cbos.gov.sd/sites/all/modules/search_api_db/
4645 https://cbos.gov.sd/sites/all/modules/search_api_db/CHANGELOG.txt
4646 https://cbos.gov.sd/sites/all/modules/search_api_db/README.txt
4647 https://cbos.gov.sd/sites/all/modules/search_api_db/LICENSE.txt
4648 smart_trim https://cbos.gov.sd/sites/all/modules/smart_trim/
4649 https://cbos.gov.sd/sites/all/modules/smart_trim/README.txt
4650 https://cbos.gov.sd/sites/all/modules/smart_trim/LICENSE.txt
4651 webform_validation https://cbos.gov.sd/sites/all/modules/webform_validation/
4652 https://cbos.gov.sd/sites/all/modules/webform_validation/README.txt
4653 https://cbos.gov.sd/sites/all/modules/webform_validation/LICENSE.txt
4654 multiform https://cbos.gov.sd/sites/all/modules/multiform/
4655 https://cbos.gov.sd/sites/all/modules/multiform/README.txt
4656 https://cbos.gov.sd/sites/all/modules/multiform/LICENSE.txt
4657 i18nviews https://cbos.gov.sd/sites/all/modules/i18nviews/
4658 https://cbos.gov.sd/sites/all/modules/i18nviews/README.txt
4659 https://cbos.gov.sd/sites/all/modules/i18nviews/LICENSE.txt
4660 sharethis https://cbos.gov.sd/sites/all/modules/sharethis/
4661 https://cbos.gov.sd/sites/all/modules/sharethis/LICENSE.txt
4662 seckit https://cbos.gov.sd/sites/all/modules/seckit/
4663 https://cbos.gov.sd/sites/all/modules/seckit/CHANGELOG.txt
4664 https://cbos.gov.sd/sites/all/modules/seckit/LICENSE.txt
4665 stringoverrides https://cbos.gov.sd/sites/all/modules/stringoverrides/
4666 https://cbos.gov.sd/sites/all/modules/stringoverrides/LICENSE.txt
4667 hierarchical_select https://cbos.gov.sd/sites/all/modules/hierarchical_select/
4668 https://cbos.gov.sd/sites/all/modules/hierarchical_select/README.txt
4669 https://cbos.gov.sd/sites/all/modules/hierarchical_select/LICENSE.txt
4670 https://cbos.gov.sd/sites/all/modules/hierarchical_select/API.txt
4671 tb_megamenu https://cbos.gov.sd/sites/all/modules/tb_megamenu/
4672 https://cbos.gov.sd/sites/all/modules/tb_megamenu/LICENSE.txt
4673 multiblock https://cbos.gov.sd/sites/all/modules/multiblock/
4674 https://cbos.gov.sd/sites/all/modules/multiblock/README.txt
4675 https://cbos.gov.sd/sites/all/modules/multiblock/LICENSE.txt
4676 faq https://cbos.gov.sd/sites/all/modules/faq/
4677 https://cbos.gov.sd/sites/all/modules/faq/README.txt
4678 https://cbos.gov.sd/sites/all/modules/faq/LICENSE.txt
4679 path_breadcrumbs https://cbos.gov.sd/sites/all/modules/path_breadcrumbs/
4680 https://cbos.gov.sd/sites/all/modules/path_breadcrumbs/CHANGELOG.txt
4681 https://cbos.gov.sd/sites/all/modules/path_breadcrumbs/README.txt
4682 https://cbos.gov.sd/sites/all/modules/path_breadcrumbs/LICENSE.txt
4683 menu_trail_by_path https://cbos.gov.sd/sites/all/modules/menu_trail_by_path/
4684 https://cbos.gov.sd/sites/all/modules/menu_trail_by_path/LICENSE.txt
4685 fast_404 https://cbos.gov.sd/sites/all/modules/fast_404/
4686 https://cbos.gov.sd/sites/all/modules/fast_404/README.TXT
4687 https://cbos.gov.sd/sites/all/modules/fast_404/LICENSE.txt
4688 emfield https://cbos.gov.sd/sites/all/modules/emfield/
4689 https://cbos.gov.sd/sites/all/modules/emfield/README.txt
4690 https://cbos.gov.sd/sites/all/modules/emfield/LICENSE.txt
4691 charts https://cbos.gov.sd/sites/all/modules/charts/
4692 https://cbos.gov.sd/sites/all/modules/charts/README.txt
4693 https://cbos.gov.sd/sites/all/modules/charts/LICENSE.txt
4694 shs https://cbos.gov.sd/sites/all/modules/shs/
4695 https://cbos.gov.sd/sites/all/modules/shs/README.txt
4696 https://cbos.gov.sd/sites/all/modules/shs/LICENSE.txt
4697 clientside_validation https://cbos.gov.sd/sites/all/modules/clientside_validation/
4698 https://cbos.gov.sd/sites/all/modules/clientside_validation/README.txt
4699 https://cbos.gov.sd/sites/all/modules/clientside_validation/LICENSE.txt
4700 block_titlelink https://cbos.gov.sd/sites/all/modules/block_titlelink/
4701 https://cbos.gov.sd/sites/all/modules/block_titlelink/README.txt
4702 https://cbos.gov.sd/sites/all/modules/block_titlelink/LICENSE.txt
4703 field_collection_views https://cbos.gov.sd/sites/all/modules/field_collection_views/
4704 https://cbos.gov.sd/sites/all/modules/field_collection_views/LICENSE.txt
4705 ds_bootstrap_layouts https://cbos.gov.sd/sites/all/modules/ds_bootstrap_layouts/
4706 https://cbos.gov.sd/sites/all/modules/ds_bootstrap_layouts/README.txt
4707 https://cbos.gov.sd/sites/all/modules/ds_bootstrap_layouts/LICENSE.txt
4708 search_api_page https://cbos.gov.sd/sites/all/modules/search_api_page/
4709 https://cbos.gov.sd/sites/all/modules/search_api_page/CHANGELOG.txt
4710 https://cbos.gov.sd/sites/all/modules/search_api_page/README.txt
4711 https://cbos.gov.sd/sites/all/modules/search_api_page/LICENSE.txt
4712 menu_import https://cbos.gov.sd/sites/all/modules/menu_import/
4713 https://cbos.gov.sd/sites/all/modules/menu_import/README.txt
4714 https://cbos.gov.sd/sites/all/modules/menu_import/LICENSE.txt
4715 search_api_autocomplete https://cbos.gov.sd/sites/all/modules/search_api_autocomplete/
4716 https://cbos.gov.sd/sites/all/modules/search_api_autocomplete/CHANGELOG.txt
4717 https://cbos.gov.sd/sites/all/modules/search_api_autocomplete/README.txt
4718 https://cbos.gov.sd/sites/all/modules/search_api_autocomplete/LICENSE.txt
4719 field_collection_table https://cbos.gov.sd/sites/all/modules/field_collection_table/
4720 https://cbos.gov.sd/sites/all/modules/field_collection_table/LICENSE.txt
4721 views_ticker https://cbos.gov.sd/sites/all/modules/views_ticker/
4722 https://cbos.gov.sd/sites/all/modules/views_ticker/README.txt
4723 https://cbos.gov.sd/sites/all/modules/views_ticker/LICENSE.txt
4724 event_calendar https://cbos.gov.sd/sites/all/modules/event_calendar/
4725 https://cbos.gov.sd/sites/all/modules/event_calendar/README.txt
4726 https://cbos.gov.sd/sites/all/modules/event_calendar/LICENSE.txt
4727 stage_file_proxy https://cbos.gov.sd/sites/all/modules/stage_file_proxy/
4728 https://cbos.gov.sd/sites/all/modules/stage_file_proxy/LICENSE.txt
4729 webform_block https://cbos.gov.sd/sites/all/modules/webform_block/
4730 https://cbos.gov.sd/sites/all/modules/webform_block/LICENSE.txt
4731 delete_all https://cbos.gov.sd/sites/all/modules/delete_all/
4732 https://cbos.gov.sd/sites/all/modules/delete_all/LICENSE.txt
4733 datepicker https://cbos.gov.sd/sites/all/modules/datepicker/
4734 https://cbos.gov.sd/sites/all/modules/datepicker/README.txt
4735 https://cbos.gov.sd/sites/all/modules/datepicker/LICENSE.txt
4736 image https://cbos.gov.sd/modules/image/
4737 profile https://cbos.gov.sd/modules/profile/
4738 php https://cbos.gov.sd/modules/php/
4739######################################################################################################################################
4740 Anonymous JTSEC #OpSudan Full Recon #2