· 6 years ago · Mar 31, 2020, 05:24 AM
1##################################################################################################################################
2=================================================================================================================================
3Hostname www.cityoflondon.gov.uk ISP COLT Technology Services Group Limited
4Continent Europe Flag
5GB
6Country United Kingdom Country Code GB
7Region England Local time 31 Mar 2020 04:55 BST
8City London Postal Code EC2V
9IP Address 80.169.89.102 Latitude 51.516
10 Longitude -0.093
11================================================================================================================================
12################################################################################################################################
13Target:https://www.cityoflondon.gov.uk/
14IP:80.169.89.102
15################################################################################################################################
16> set type=A
17> www.cityoflondon.gov.uk
18Server: 10.101.0.243
19Address: 10.101.0.243#53
20
21Non-authoritative answer:
22Name: www.cityoflondon.gov.uk
23Address: 80.169.89.102
24> set type=NS
25> www.cityoflondon.gov.uk
26Server: 10.101.0.243
27Address: 10.101.0.243#53
28
29Non-authoritative answer:
30*** Can't find www.cityoflondon.gov.uk: No answer
31
32Authoritative answers can be found from:
33cityoflondon.gov.uk
34 origin = jake.ns.cloudflare.com
35 mail addr = dns.cloudflare.com
36 serial = 2033627693
37 refresh = 10000
38 retry = 2400
39 expire = 604800
40 minimum = 3600
41> set type=MX
42> www.cityoflondon.gov.uk
43Server: 10.101.0.243
44Address: 10.101.0.243#53
45
46Non-authoritative answer:
47*** Can't find www.cityoflondon.gov.uk: No answer
48
49Authoritative answers can be found from:
50cityoflondon.gov.uk
51 origin = jake.ns.cloudflare.com
52 mail addr = dns.cloudflare.com
53 serial = 2033627693
54 refresh = 10000
55 retry = 2400
56 expire = 604800
57 minimum = 3600
58>
59################################################################################################################################
60Domain:
61 cityoflondon.gov.uk
62
63Registered For:
64 City of London Corporation
65
66Domain Owner:
67 City of London Corporation
68
69Registered By:
70 Colt Technology Services
71
72Servers:
73 jake.ns.cloudflare.com
74 treasure.ns.cloudflare.com
75
76Registrant Contact:
77 City of London Corporation
78
79Registrant Address:
80 PO Box 270
81 Guildhall
82 London
83 EC2P 2EJ
84 United Kingdom
85 +447596 279 077 (Phone)
86 carl.walker@cityoflondon.gov.uk
87
88Renewal date:
89 Wednesday 18th May 2022
90
91Entry updated:
92 Tuesday 18th February 2020
93
94Entry created:
95 Wednesday 17th September 2003
96################################################################################################################################
97Trying "cityoflondon.gov.uk"
98;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 6277
99;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 4
100
101;; QUESTION SECTION:
102;cityoflondon.gov.uk. IN ANY
103
104;; ANSWER SECTION:
105cityoflondon.gov.uk. 3789 IN HINFO "RFC8482" ""
106cityoflondon.gov.uk. 28630 IN NS treasure.ns.cloudflare.com.
107cityoflondon.gov.uk. 28630 IN NS jake.ns.cloudflare.com.
108
109;; ADDITIONAL SECTION:
110treasure.ns.cloudflare.com. 32543 IN A 162.159.38.116
111jake.ns.cloudflare.com. 18813 IN A 173.245.59.122
112treasure.ns.cloudflare.com. 32543 IN AAAA 2606:4700:50::a29f:2674
113jake.ns.cloudflare.com. 18813 IN AAAA 2606:4700:58::adf5:3b7a
114
115Received 205 bytes from 2001:18c0:121:6900:724f:b8ff:fefd:5b6a#53 in 447 ms
116################################################################################################################################
117; <<>> DiG 9.11.16-2-Debian <<>> +trace cityoflondon.gov.uk
118;; global options: +cmd
119. 86400 IN NS a.root-servers.net.
120. 86400 IN NS b.root-servers.net.
121. 86400 IN NS c.root-servers.net.
122. 86400 IN NS d.root-servers.net.
123. 86400 IN NS e.root-servers.net.
124. 86400 IN NS f.root-servers.net.
125. 86400 IN NS g.root-servers.net.
126. 86400 IN NS h.root-servers.net.
127. 86400 IN NS i.root-servers.net.
128. 86400 IN NS j.root-servers.net.
129. 86400 IN NS k.root-servers.net.
130. 86400 IN NS l.root-servers.net.
131. 86400 IN NS m.root-servers.net.
132. 86400 IN RRSIG NS 8 0 518400 20200412170000 20200330160000 33853 . 0CZ/She0YSzr3cBeCWPkQ4fbgGTZ3XW7AZViR+vXPMIQnwGCfutTgISI 8DeQlatHn+5KmyHYAC17bzQ8jU21//7ZXEP6WDVewK8NblE1/8yCciN+ jd/J5wHY3MqWFa8CL7MyGjE+LsUu4M69XJ7tZ1WbBOqoyJVOJy2ckXv4 Ffd5Lzm7BgigN85BqdaEUZdOh80nQ/u0ic3DvWj8+cUchhmksRbO/w3M p5GEkeEvFp5rq1deCSPfZ86Ym2lqF+YYH9wvuegqja0X4JGzFH+PdWQn ED1dN6ZvPxRuIbyqx4Mcu7H8zkLSFFSBdJNJMD/ERv3TPd2yI+wRL4Qg WaTYtA==
133;; Received 525 bytes from 10.101.0.243#53(10.101.0.243) in 106 ms
134
135uk. 172800 IN NS nsa.nic.uk.
136uk. 172800 IN NS dns1.nic.uk.
137uk. 172800 IN NS nsb.nic.uk.
138uk. 172800 IN NS nsd.nic.uk.
139uk. 172800 IN NS dns2.nic.uk.
140uk. 172800 IN NS dns3.nic.uk.
141uk. 172800 IN NS dns4.nic.uk.
142uk. 172800 IN NS nsc.nic.uk.
143uk. 86400 IN DS 43876 8 2 A107ED2AC1BD14D924173BC7E827A1153582072394F9272BA37E2353 BC659603
144uk. 86400 IN RRSIG DS 8 1 86400 20200412170000 20200330160000 33853 . cE3IH5poLc6c9AWBgeKLcp47sDjY4AR2e04YU0foLiMwrFJGTWEYLgec KgFakc1/0RdG9yI+8HHUqOuYgXQvSjhq+We9Qp6o8qqE9XigPtQ3Oq9D O8ILwmITPEK0MWJqzrPeGinMuc5a8MJeHK/v6QnioVV9ofciV9c/wyU8 VKSSSUk8XA3VXPBPkSt9CIkYpLuDyJTlpIotPzYvN4oyQgEUg52La3WS LbZksabQ6wqHfZjFq6xHtZXrZpctSthv1yo13HT4PSmIjv4Xt3i8hh1K eA7sSYjqBrDCD8dFntH//OS7qoElq/3F2ewSHykrF9r06PX1b07jVJdI ASs9sA==
145;; Received 831 bytes from 192.33.4.12#53(c.root-servers.net) in 112 ms
146
147gov.uk. 172800 IN NS ns0.ja.net.
148gov.uk. 172800 IN NS ns1.surfnet.nl.
149gov.uk. 172800 IN NS ns2.ja.net.
150gov.uk. 172800 IN NS ns3.ja.net.
151gov.uk. 172800 IN NS ns4.ja.net.
152gov.uk. 172800 IN NS auth00.ns.de.uu.net.
153gov.uk. 172800 IN NS auth50.ns.de.uu.net.
154gov.uk. 300 IN DS 17539 8 2 2F0A0A65DB9E930F5B2C0425F67DF66416C076124652A281D9A8FFA7 73828F57
155gov.uk. 300 IN RRSIG DS 8 2 300 20200413041808 20200330034320 43056 uk. EtYXeEqkxLinKQ1b9mQE+mv6iwTi4zOY4y1hJhMNkN29jjMWKB6x71d2 k6ZfTtTlT4ARmbRYv+qfzpmfdBGmNvzLwO9RAXh0dbjkh2EZp7Qtpdrh WFd3CQSh+q94YPhs+VxUMjQm5eSKDuSKPClrOgxMJTXosztmkF4Z3oyG fr0=
156;; Received 415 bytes from 2a01:618:404::1#53(dns3.nic.uk) in 89 ms
157
158cityoflondon.gov.uk. 86400 IN NS jake.ns.cloudflare.com.
159cityoflondon.gov.uk. 86400 IN NS treasure.ns.cloudflare.com.
160P64J5KUTD6UCANBTQOO2AA0I5H5AUPKR.gov.uk. 14400 IN NSEC3 1 0 10 - P6BLR4VP0JD859HHF4L0MH54AIED54LM NS
161P64J5KUTD6UCANBTQOO2AA0I5H5AUPKR.gov.uk. 14400 IN RRSIG NSEC3 8 3 14400 20200429124823 20200330124823 41286 gov.uk. JcYAMryiyrQpKzeTN0lxxfCneu2feOCsP3/P/8RWB06jPEsFUfjfFiUE s1XRud0TQ90oMkOQktksMa97SoJ7W3scZ7RA0qphfCnG/0Mh9dcz0IsJ yygzDsPI08YOGc3zzzLcvUPwdA/em/dJHu412eXE2MO7MqCUzIvQyqKO Ohk=
162;; Received 347 bytes from 192.76.144.14#53(auth00.ns.de.uu.net) in 116 ms
163
164cityoflondon.gov.uk. 300 IN A 80.169.89.102
165;; Received 64 bytes from 173.245.59.122#53(jake.ns.cloudflare.com) in 107 ms
166################################################################################################################################
167[i] Scanning Site: https://www.cityoflondon.gov.uk
168
169
170
171B A S I C I N F O
172====================
173
174
175[+] Site Title: Welcome to the City of London Corporation
176[+] IP address: 80.169.89.102
177[+] Web Server: Microsoft-IIS/7.5
178[+] CMS: Could Not Detect
179[+] Cloudflare: Not Detected
180[+] Robots File: Could NOT Find robots.txt!
181
182
183
184
185W H O I S L O O K U P
186========================
187
188
189Domain:
190 cityoflondon.gov.uk
191
192Registered For:
193 City of London Corporation
194
195Domain Owner:
196 City of London Corporation
197
198Registered By:
199 Colt Technology Services
200
201Servers:
202 jake.ns.cloudflare.com
203 treasure.ns.cloudflare.com
204
205Registrant Contact:
206 City of London Corporation
207
208Registrant Address:
209 PO Box 270
210 Guildhall
211 London
212 EC2P 2EJ
213 United Kingdom
214 +447596 279 077 (Phone)
215 carl.walker@cityoflondon.gov.uk
216
217Renewal date:
218 Wednesday 18th May 2022
219
220Entry updated:
221 Tuesday 18th February 2020
222
223Entry created:
224 Wednesday 17th September 2003
225
226
227
228
229
230G E O I P L O O K U P
231=========================
232
233[i] IP Address: 80.169.89.102
234[i] Country: United Kingdom
235[i] State: England
236[i] City: London
237[i] Latitude: 51.5132
238[i] Longitude: -0.0961
239
240
241
242
243H T T P H E A D E R S
244=======================
245
246
247[i] HTTP/1.1 302 Redirect
248[i] Content-Type: text/html; charset=UTF-8
249[i] Location: http://www.cityoflondon.gov.uk/Pages/default.aspx
250[i] Server: Microsoft-IIS/7.5
251[i] SPRequestGuid: 02486b7c-70b0-425d-98de-2551efdf842c
252[i] X-SharePointHealthScore: 0
253[i] X-Powered-By: ASP.NET
254[i] MicrosoftSharePointTeamServices: 14.0.0.7239
255[i] X-MS-InvokeApp: 1; RequireReadOnly
256[i] Date: Tue, 31 Mar 2020 04:12:16 GMT
257[i] Connection: close
258[i] Content-Length: 172
259[i] HTTP/1.1 301 Moved Permanently
260[i] Location: https://www.cityoflondon.gov.uk/Pages/default.aspx
261[i] Server: COL-VMW-M-LB02
262[i] Cache-Control: no-cache
263[i] Connection: close
264[i] HTTP/1.1 200 OK
265[i] Cache-Control: private
266[i] Content-Type: text/html; charset=utf-8
267[i] Expires: Tue, 31 Mar 2020 04:21:08 GMT
268[i] Vary: *
269[i] Server: Microsoft-IIS/7.5
270[i] SPRequestGuid: 377e7433-aca1-409f-97ec-c413b79efbd9
271[i] X-SharePointHealthScore: 0
272[i] X-AspNet-Version: 2.0.50727
273[i] X-Powered-By: ASP.NET
274[i] MicrosoftSharePointTeamServices: 14.0.0.7239
275[i] X-MS-InvokeApp: 1; RequireReadOnly
276[i] Date: Tue, 31 Mar 2020 04:12:16 GMT
277[i] Connection: close
278[i] Content-Length: 32781
279
280
281
282
283D N S L O O K U P
284===================
285
286cityoflondon.gov.uk. 3788 IN HINFO "RFC8482" ""
287
288
289
290
291S U B N E T C A L C U L A T I O N
292====================================
293
294Address = 80.169.89.102
295Network = 80.169.89.102 / 32
296Netmask = 255.255.255.255
297Broadcast = not needed on Point-to-Point links
298Wildcard Mask = 0.0.0.0
299Hosts Bits = 0
300Max. Hosts = 1 (2^0 - 0)
301Host Range = { 80.169.89.102 - 80.169.89.102 }
302
303
304
305N M A P P O R T S C A N
306============================
307
308Starting Nmap 7.70 ( https://nmap.org ) at 2020-03-31 04:08 UTC
309Nmap scan report for cityoflondon.gov.uk (80.169.89.102)
310Host is up (0.078s latency).
311
312PORT STATE SERVICE
31321/tcp filtered ftp
31422/tcp filtered ssh
31580/tcp open http
316443/tcp open https
317
318Nmap done: 1 IP address (1 host up) scanned in 2.08 seconds
319
320
321
322S U B - D O M A I N F I N D E R
323==================================
324
325
326[i] Total Subdomains Found : 30
327
328[+] Subdomain: mail1.cityoflondon.gov.uk
329[-] IP: 80.169.89.80
330
331[+] Subdomain: www1.cityoflondon.gov.uk
332[-] IP: 80.169.89.96
333
334[+] Subdomain: www.planning2.cityoflondon.gov.uk
335[-] IP: 195.171.176.91
336
337[+] Subdomain: www.mapping2.cityoflondon.gov.uk
338[-] IP: 195.171.176.90
339
340[+] Subdomain: mail2.cityoflondon.gov.uk
341[-] IP: 80.169.89.106
342
343[+] Subdomain: fypsd.cityoflondon.gov.uk
344[-] IP: 80.169.89.101
345
346[+] Subdomain: housingselfservice.cityoflondon.gov.uk
347[-] IP: 195.20.223.214
348
349[+] Subdomain: wwwstage.cityoflondon.gov.uk
350[-] IP: 80.169.89.82
351
352[+] Subdomain: mobile.cityoflondon.gov.uk
353[-] IP: 80.169.89.102
354
355[+] Subdomain: fdonline.cityoflondon.gov.uk
356[-] IP: 80.169.89.106
357
358[+] Subdomain: learningzone.cityoflondon.gov.uk
359[-] IP: 31.25.189.168
360
361[+] Subdomain: librarycatalogue.cityoflondon.gov.uk
362[-] IP: 217.169.37.149
363
364[+] Subdomain: elearning.cityoflondon.gov.uk
365[-] IP: 146.177.9.125
366
367[+] Subdomain: www.mapping.cityoflondon.gov.uk
368[-] IP: 195.171.176.88
369
370[+] Subdomain: biztalk.cityoflondon.gov.uk
371[-] IP: 80.169.89.97
372
373[+] Subdomain: email.cityoflondon.gov.uk
374[-] IP: 91.206.118.10
375
376[+] Subdomain: www.guildhall.cityoflondon.gov.uk
377[-] IP: 176.32.230.9
378
379[+] Subdomain: pcn.cityoflondon.gov.uk
380[-] IP: 212.50.171.54
381
382[+] Subdomain: ldfconsultation.cityoflondon.gov.uk
383[-] IP: 195.12.22.232
384
385[+] Subdomain: shop.cityoflondon.gov.uk
386[-] IP: 23.227.38.32
387
388[+] Subdomain: jobs.cityoflondon.gov.uk
389[-] IP: 195.20.223.210
390
391[+] Subdomain: revenues.cityoflondon.gov.uk
392[-] IP: 195.20.223.210
393
394[+] Subdomain: hyms.cityoflondon.gov.uk
395[-] IP: 195.171.176.87
396
397[+] Subdomain: careers.cityoflondon.gov.uk
398[-] IP: 77.104.134.194
399
400[+] Subdomain: citybenefits.cityoflondon.gov.uk
401[-] IP: 134.213.36.31
402
403[+] Subdomain: consult.cityoflondon.gov.uk
404[-] IP: 31.25.189.114
405
406[+] Subdomain: www.consult.cityoflondon.gov.uk
407[-] IP: 31.25.189.114
408
409[+] Subdomain: www.cityoflondon.gov.uk
410[-] IP: 80.169.89.102
411
412[+] Subdomain: democracy.cityoflondon.gov.uk
413[-] IP: 80.169.89.107
414
415[+] Subdomain: www.guildhallartgallery.cityoflondon.gov.uk
416[-] IP: 80.169.89.101
417################################################################################################################################
418[*] Users found: 45
419---------------------
420Abiola Ashiru - Estate Manager - City of London Corporation
421Amadou Balde - CRM Database Officer - City of London
422Andrew J. Cross - Managing Director - Zuzumi
423Andrew McMurtrie - Councillor - City of London Corporation
424Andrews Bryony - APFM - City of London Corporation
425Anthonia Ifeanyi-Okoro - Project Manager - City of London
426Ben Grainger - Chief Operating Officer - Metfriendly
427Clarke Cover - Engineer - City of London
428Damian Nussbaum - Director - City of London Corporation
429David Roalfe - Security - City of London
430Deborah Jones - animal health inspector - City of London
431Deborah Ley MRICS - Estate Manager - Royal Mail Group
432Edward Jones - Researcher - City of London Corporation
433Frederick Bergann - Fiber Technician - Vicario AS
434Geoff Parnell - Head of Transformation - Octavia
435Giles Radford - Highways Manager - City of London
436Ian Hughes - Traffic Manager - City of London
437Jamel Morris - Sole trader - eBay
438James Lee - Advisory Board Member - Thrive - UnLtd
439Jasmine Cumbers - Animal Welfare Officer - City of London
440Jeremy Young - Countryside Ranger - City of London
441Jon White - Group Building Control Officer - City of London
442Kenneth Page - Interpretation Officer - City of London
443Kerrigan Abbott - Asset Manager - City of London
444Lizzie Jupp - Event Manager - The Clink Charity
445Lucy McDonald - Head of Regional Marketing - Arriva Group
446Mark Pundsack - Assistant District Surveyor - City of London
447Mark Sherlock MBIFM - Superintendent - City of London
448Mehzebin Adam - Museum Curator - British Red Cross
449Michelle Cavanagh - PA - City of London
450Mick Bagnall - Film Officer - City of London Corporation
451Muhibur Rahman - Post Room Supervisor - City of London
452Nirupa Gardner - Ms - CIty Of London
453Paul Jeal - Senior Supervisor - City of London
454Prem Goyal OBE JP - Non Executive Director - rise inc
455Richard Gentry - Local Authority Manager - City of London
456Rory McMullan - Press Officer - London road safety council
457Ruth Shilston - Associate - RWDI
458Sammy Neillis - Personal Assistant - City of London
459Serafino Manca - Head Of Marketing Operations - Koine
460Sufina Ahmad - Director - The John Ellerman Foundation
461Tom Noble - Group Manager - City of London Corporation
462Vince Dignam FCILT - Chairman Of The Board - BITA
463martin goodwin - housing options officer - City of London
464paula walton - Secretary - City of London
465 Searching 400 results.
466 Searching 500 results.
467[*] Searching Linkedin.
468
469[*] Links found: 1
470---------------------
471https://www.linkedin.com/in/nick-bensted-smith-7021535/
472
473
474[*] IPs found: 52
475-------------------
47623.227.38.32
47731.25.189.114
47831.25.189.168
47934.243.0.23
48052.18.141.94
48152.56.67.36
48277.104.134.194
48380.169.89.80
48480.169.89.82
48580.169.89.91
48680.169.89.96
48780.169.89.97
48880.169.89.101
48980.169.89.102
49080.169.89.106
49180.169.89.107
49285.92.209.141
49386.54.118.84
49491.206.118.10
495104.22.14.166
496104.22.15.166
497134.213.36.31
498141.211.243.19
499146.177.9.125
500176.32.230.9
501193.34.187.148
502195.12.22.232
503195.20.223.210
504195.20.223.213
505195.20.223.214
506195.171.176.87
507195.171.176.88
508195.171.176.90
509195.171.176.91
510195.171.176.93
511212.50.171.54
512217.169.37.149
513217.174.252.152
514
515[*] Emails found: 309
516----------------------
517adam.green@cityoflondon.gov.uk
518adam.reeve@cityoflondon.gov.uk
519adrian.dressekie@cityoflondon.gov.uk
520adultsduty@cityoflondon.gov.uk
521afsana.rahman@cityoflondon.gov.uk
522alan.lilly@cityoflondon.gov.uk
523alexander.barr@cityoflondon.gov.uk
524amanda.owens@cityoflondon.gov.uk
525amicus.unions@cityoflondon.gov.uk
526andrea.merciar@cityoflondon.gov.uk
527andrew.bellingham@cityoflondon.gov.uk
528andrew.cammarano@cityoflondon.gov.uk
529andrew.harvey@cityoflondon.gov.uk
530andrew.king@cityoflondon.gov.uk
531andrew.lenihan@cityoflondon.gov.uk
532andrew.tregidgo@cityoflondon.gov.uk
533andrew.woods@cityoflondon.gov.uk
534andy.waker@cityoflondon.gov.uk
535angela.starling@cityoflondon.gov.uk
536angela.thomas@cityoflondon.gov.uk
537angela.turnbull@cityoflondon.gov.uk
538anthony.riley@cityoflondon.gov.uk
539ask.lma@cityoflondon.gov.uk
540babzzyandrea.merciar@cityoflondon.gov.uk
541bankarea@cityoflondon.gov.uk
542barbicanlib@cityoflondon.gov.uk
543barbicanmusic@cityoflondon.gov.uk
544barrie.ellis@cityoflondon.gov.uk
545beech.street@cityoflondon.gov.uk
546bella.longman@cityoflondon.gov.uk
547ben.kennedy@cityoflondon.gov.uk
548ben.manku@cityoflondon.gov.uk
549ben.mossop@cityoflondon.gov.uk
550benjamin.mossop@cityoflondon.gov.uk
551beverly.campbell@cityoflondon.gov.uk
552blanca.daniel@cityoflondon.gov.uk
553bradley.viljoen@cityoflondon.gov.uk
554brian.henderson@cityoflondon.gov.uk
555bryn.aldridge@cityoflondon.gov.uk
556burnham.beeches@cityoflondon.gov.uk
557carl.bernhardt@cityoflondon.gov.uk
558carla-maria.heath@cityoflondon.gov.uk
559carly.cheeseman@cityoflondon.gov.uk
560carly.harris@cityoflondon.gov.uk
561carol.boswarthack@cityoflondon.gov.uk
562caroline.pyke@cityoflondon.gov.uk
563carolyn.piper@cityoflondon.gov.uk
564carolynn.holmes@cityoflondon.gov.uk
565carroll.stanbury@cityoflondon.gov.uk
566catherine.hughes@cityoflondon.gov.uk
567catherine.mcguinness@cityoflondon.gov.uk
568cathy.lawson@cityoflondon.gov.uk
569charlie.turpie@cityoflondon.gov.uk
570charlotte.factor@cityoflondon.gov.uk
571charlotte.hopkins@cityoflondon.gov.uk
572che.christie@cityoflondon.gov.uk
573cheryl.mcgee@cityoflondon.gov.uk
574china@cityoflondon.gov.uk
575chris.anderson@cityoflondon.gov.uk
576chris.barlow@cityoflondon.gov.uk
577chris.fcips@cityoflondon.gov.uk
578chris.hartwell@cityoflondon.gov.uk
579chris.punter@cityoflondon.gov.uk
580chris.smith2@cityoflondon.gov.uk
581christine.beaumont@cityoflondon.gov.uk
582christine.connolly@cityoflondon.gov.uk
583christine.josef@cityoflondon.gov.uk
584christopher.bell@cityoflondon.gov.uk
585cirla.peall@cityoflondon.gov.uk
586citybridgetrust@cityoflondon.gov.uk
587claire.dumontier-marriage@cityoflondon.gov.uk
588claire.scott@cityoflondon.gov.uk
589colin.bull@cityoflondon.gov.uk
590colpolicemuseum@cityoflondon.gov.uk
591cru@cityoflondon.gov.uk
592dafydd.jones@cityoflondon.gov.uk
593dagley@cityoflondon.gov.uk
594dan.tomkins@cityoflondon.gov.uk
595dave.davis@cityoflondon.gov.uk
596david.bentley@cityoflondon.gov.uk
597david.buckley@cityoflondon.gov.uk
598david.kemp@cityoflondon.gov.uk
599david.laird@cityoflondon.gov.uk
600david.mackintosh@cityoflondon.gov.uk
601david.mckay@cityoflondon.gov.uk
602david.pack@cityoflondon.gov.uk
603david.renshaw@cityoflondon.gov.uk
604david.summers@cityoflondon.gov.uk
605deanobrowno@cityoflondon.gov.uk
606deborah.cluett@cityoflondon.gov.uk
607derek.meddings@cityoflondon.gov.uk
608diane.marcou@cityoflondon.gov.uk
609douglas.wilkinson@cityoflondon.gov.uk
610dulcie.felton@cityoflondon.gov.uk
611education@cityoflondon.gov.uk
612edward.chaning-cotter@cityoflondon.gov.uk
613elizabeth.rogula@cityoflondon.gov.uk
614emma.martin@cityoflondon.gov.uk
615emma.marwood@cityoflondon.gov.uk
616emmanuel.ojugo@cityoflondon.gov.uk
617gary.flint@cityoflondon.gov.uk
618gary.marshall@cityoflondon.gov.uk
619gavin.felgate@cityoflondon.gov.uk
620gavin.simpson@cityoflondon.gov.uk
621george.abrahams@cityoflondon.gov.uk
622gill@cityoflondon.gov.uk
623gillian.maxwell@cityoflondon.gov.uk
624grace.stilgoe@cityoflondon.gov.uk
625graham.bell@cityoflondon.gov.uk
626greg.nott@cityoflondon.gov.uk
627gregory.moore@cityoflondon.gov.uk
628guildhall.events@cityoflondon.gov.uk
629guildhall.library@cityoflondon.gov.uk
630harper.ozkulac@cityoflondon.gov.uk
631harry.king@cityoflondon.gov.uk
632hayley.hajduczek@cityoflondon.gov.uk
633heinrich.storm@cityoflondon.gov.uk
634helen.armstrong@cityoflondon.gov.uk
635iain.mudge@cityoflondon.gov.uk
636iain.stanton@cityoflondon.gov.uk
637ian.hughes@cityoflondon.gov.uk
638ian.partington@cityoflondon.gov.uk
639information.officer@cityoflondon.gov.uk
640isabelle.almeida@cityoflondon.gov.uk
641jack.dixon@cityoflondon.gov.uk
642jacqueline.cover@cityoflondon.gov.uk
643jacqueline.watson@cityoflondon.gov.uk
644james.barber@cityoflondon.gov.uk
645james.gardiner@cityoflondon.gov.uk
646jamie.bottono@cityoflondon.gov.uk
647jan.horton@cityoflondon.gov.uk
648jane.doe@cityoflondon.gov.uk
649janet.fortune@cityoflondon.gov.uk
650janet.laban@cityoflondon.gov.uk
651janet.pearman@cityoflondon.gov.uk
652jeremy.dagley@cityoflondon.gov.uk
653jeremy.mullins@cityoflondon.gov.uk
654jeremy.tuck@cityoflondon.gov.uk
655jerry.buncombe@cityoflondon.gov.uk
656jim.graham@cityoflondon.gov.uk
657joan.westley@cityoflondon.gov.uk
658joanna.burnaby-atkins@cityoflondon.gov.uk
659john.ambrose@cityoflondon.gov.uk
660john.barker@cityoflondon.gov.uk
661john.bennett@cityoflondon.gov.uk
662john.davies@cityoflondon.gov.uk
663john.lake@cityoflondon.gov.uk
664jonathan.meares@cityoflondon.gov.uk
665kajal.maisuria@cityoflondon.gov.uk
666karyn.ramsay@cityoflondon.gov.uk
667katherine.bowen@cityoflondon.gov.uk
668katie.bishop@cityoflondon.gov.uk
669kayleigh.rippe@cityoflondon.gov.uk
670kelly.montague@cityoflondon.gov.uk
671kelly.stokes@cityoflondon.gov.uk
672kevin.mulcahy@cityoflondon.gov.uk
673kimberley.hall@cityoflondon.gov.uk
674kirsty.leitch@cityoflondon.gov.uk
675kk@cityoflondon.gov.uk
676lado@cityoflondon.gov.uk
677laurence.ward@cityoflondon.gov.uk
678lee.jones@cityoflondon.gov.uk
679leigh.sherkin@cityoflondon.gov.uk
680leila.ben-hassel@cityoflondon.gov.uk
681leshay.jardine@cityoflondon.gov.uk
682libby.grant@cityoflondon.gov.uk
683libsupportservices@cityoflondon.gov.uk
684licensing@cityoflondon.gov.uk
685linda.antonioni@cityoflondon.gov.uk
686linda.burgess@cityoflondon.gov.uk
687lisa.russell@cityoflondon.gov.uk
688liz.yamada@cityoflondon.gov.uk
689lorraine.brook@cityoflondon.gov.uk
690louise.stirna@cityoflondon.gov.uk
691lucie.martin@cityoflondon.gov.uk
692lucy.sandford@cityoflondon.gov.uk
693lydia.blackley@cityoflondon.gov.uk
694malcolm.key@cityoflondon.gov.uk
695margaret.jackson@cityoflondon.gov.uk
696marika.ludmann@cityoflondon.gov.uk
697mark.anthony@cityoflondon.gov.uk
698mark.mojsak@cityoflondon.gov.uk
699mark.pundsack@cityoflondon.gov.uk
700marketsprogramme@cityoflondon.gov.uk
701martin.hall@cityoflondon.gov.uk
702martin.howe@cityoflondon.gov.uk
703martin.till@cityoflondon.gov.uk
704matthew.green@cityoflondon.gov.uk
705matthew.payne@cityoflondon.gov.uk
706michael.bennett@cityoflondon.gov.uk
707michelle.ilbert@cityoflondon.gov.uk
708michelle.vancayseele@cityoflondon.gov.uk
709mick.bagnall@cityoflondon.gov.uk
710mick.collins@cityoflondon.gov.uk
711mike.braude@cityoflondon.gov.uk
712murdo.macmillan@cityoflondon.gov.uk
713murray.craig@cityoflondon.gov.uk
714nasrin.khan@cityoflondon.gov.uk
715nathalie.rebillon-lopez@cityoflondon.gov.uk
716neil.edkins@cityoflondon.gov.uk
717nestor.alfonzosantamaria@cityoflondon.gov.uk
718nicholas.anstee@cityoflondon.gov.uk
719nick.pouyioukkas@cityoflondon.gov.uk
720nicola.avery@cityoflondon.gov.uk
721nigel.challis@cityoflondon.gov.uk
722nigel.francis@cityoflondon.gov.uk
723officer@cityoflondon.gov.uk
724oluremi.ogunde@cityoflondon.gov.uk
725pam.rampasard@cityoflondon.gov.uk
726paola.galley@cityoflondon.gov.uk
727patricia.jones@cityoflondon.gov.uk
728paul.crudgington@cityoflondon.gov.uk
729paul.hutson@cityoflondon.gov.uk
730paul.maskell@cityoflondon.gov.uk
731paul.taylor@cityoflondon.gov.uk
732paula.jackson@cityoflondon.gov.uk
733paula.walton@cityoflondon.gov.uk
734pauline.halliday@cityoflondon.gov.uk
735peter.brett@cityoflondon.gov.uk
736peter.davenport@cityoflondon.gov.uk
737peter.henson@cityoflondon.gov.uk
738peter.shadbolt@cityoflondon.gov.uk
739petra.sprowson@cityoflondon.gov.uk
740philip.jordan@cityoflondon.gov.uk
741pixel-1585627870370944-web-@cityoflondon.gov.uk
742porthealth.denton@cityoflondon.gov.uk
743porthealth@cityoflondon.gov.uk
744pro@cityoflondon.gov.uk
745publicprotection@cityoflondon.gov.uk
746rachel.sambells@cityoflondon.gov.uk
747raymond.sibson@cityoflondon.gov.uk
748rdr@cityoflondon.gov.uk
749rex.egesi@cityoflondon.gov.uk
750richard.anshuh@cityoflondon.gov.uk
751richard.chamberlain@cityoflondon.gov.uk
752richard.gentry@cityoflondon.gov.uk
753robert.butcher@cityoflondon.gov.uk
754robert.michell@cityoflondon.gov.uk
755robert.quest@cityoflondon.gov.uk
756robert.renwick@cityoflondon.gov.uk
757roger.adams@cityoflondon.gov.uk
758rory.pereira@cityoflondon.gov.uk
759rosalina.banfield@cityoflondon.gov.uk
760rosemarie.garcia@cityoflondon.gov.uk
761ruth.calderwood@cityoflondon.gov.uk
762ruth.duston@cityoflondon.gov.uk
763ryan.clark@cityoflondon.gov.uk
764safercity@cityoflondon.gov.uk
765sailesh.shah@cityoflondon.gov.uk
766sandra.davidson@cityoflondon.gov.uk
767sanjay.odedra@cityoflondon.gov.uk
768sara.pink@cityoflondon.gov.uk
769sarah.leigh@cityoflondon.gov.uk
770scott.mcelwaine@cityoflondon.gov.uk
771seamus.mckenna@cityoflondon.gov.uk
772sharon.brosnan@cityoflondon.gov.uk
773sheila.huntley@cityoflondon.gov.uk
774sheila.kingsland@cityoflondon.gov.uk
775shoelane@cityoflondon.gov.uk
776sid.brewer@cityoflondon.gov.uk
777siobhan.marshall@cityoflondon.gov.uk
778sonia.solicari@cityoflondon.gov.uk
779sophie.jordan@cityoflondon.gov.uk
780sophie.lillington@cityoflondon.gov.uk
781soraya.john-baptiste@cityoflondon.gov.uk
782steve.blake@cityoflondon.gov.uk
783steve.higgon@cityoflondon.gov.uk
784steve.kelly@cityoflondon.gov.uk
785steve.presland@cityoflondon.gov.uk
786steven.bender@cityoflondon.gov.uk
787steven.skurr@cityoflondon.gov.uk
788stuart.morrison@cityoflondon.gov.uk
789stuart.smith@cityoflondon.gov.uk
790sukhjit.gill@cityoflondon.gov.uk
791susan.pearson@cityoflondon.gov.uk
792suzanne.wilding@cityoflondon.gov.uk
793tak.chung@cityoflondon.gov.uk
794tania.mauro@cityoflondon.gov.uk
795terence.short@cityoflondon.gov.uk
796terry.coulthrust@cityoflondon.gov.uk
797terry.patten@cityoflondon.gov.uk
798terry.rowhan@cityoflondon.gov.uk
799terry.sore@cityoflondon.gov.uk
800thecitycentre@cityoflondon.gov.uk
801tina.garwood@cityoflondon.gov.uk
802tom.hoffman@cityoflondon.gov.uk
803tom.hughes@cityoflondon.gov.uk
804tony.halmos@cityoflondon.gov.uk
805tracy.williams@cityoflondon.gov.uk
806val.lawrence@cityoflondon.gov.uk
807verity.creamer@cityoflondon.gov.uk
808vicki.wells@cityoflondon.gov.uk
809vikki.edwards@cityoflondon.gov.uk
810vince.dignam@cityoflondon.gov.uk
811wayne.garrigan@cityoflondon.gov.uk
812wells@cityoflondon.gov.uk
813wendy.mead@cityoflondon.gov.uk
814wootton@cityoflondon.gov.uk
815zoe.nation@cityoflondon.gov.uk
816
817[*] Hosts found: 345
818---------------------
819biztalk.cityoflondon.gov.uk:80.169.89.97
820biztalk.cityoflondon.gov.uk:80.169.89.97
821capitacloud.cityoflondon.gov.uk:
822capitacloud2.cityoflondon.gov.uk:
823capitacloud2.cityoflondon.gov.uk:
824capitacloud3.cityoflondon.gov.uk:
825capitacloud3.cityoflondon.gov.uk:
826careers.cityoflondon.gov.uk:77.104.134.194
827careers.cityoflondon.gov.uk:77.104.134.194
828careers.cityoflondon.gov.uk:77.104.134.194
829careers.cityoflondon.gov.uk:77.104.134.194
830careers.cityoflondon.gov.uk:77.104.134.194
831careers.cityoflondon.gov.uk:77.104.134.194
832cisco.cityoflondon.gov.uk:
833citybenefits.cityoflondon.gov.uk:134.213.36.31
834citybenefits.cityoflondon.gov.uk:134.213.36.31
835citybenefits.cityoflondon.gov.uk:134.213.36.31
836cityoflondon.gov.uk:80.169.89.102
837cityoflondon.gov.uk:80.169.89.102
838cityoflondon.gov.uk:80.169.89.102
839cityoflondon.gov.uk:80.169.89.102
840cityoflondon.gov.uk/about-the-city/history/pages/how-to-apply.aspx:
841cityoflondon.gov.uk/corporation/:
842cityoflondon.gov.uk/corporation/homepage.htm:
843cityoflondon.gov.uk/corporation/leisure_heritage/:
844cityoflondon.gov.uk/media_centre/files/future_stock_exchanges.htm:
845cityoflondon.gov.uk/nr/:
846cityoflondon.gov.uk/nr/rdonlyres/08a4077b-:
847cityoflondon.gov.uk/nr/rdonlyres/35263589-5a42-:
848cityoflondon.gov.uk/nr/rdonlyres/c9c2a52b-:
849cityoflondon.gov.uk/pages/default.aspx:
850cityoflondon.gov.uk/search/results.aspx:
851cityoflondon.gov.uk/services/transport-and-streets/parking/pages/car-parks.aspx:
852cityoflondon.gov.uk/stct:
853collage-researcher.cityoflondon.gov.uk:35.176.130.30, 3.11.208.146
854collage-researcher.cityoflondon.gov.uk:35.176.130.30, 3.11.208.146
855collage.cityoflondon.gov.uk:35.176.130.30, 3.11.208.146
856collage.cityoflondon.gov.uk:3.11.208.146, 35.176.130.30
857collage.cityoflondon.gov.uk:35.176.130.30, 3.11.208.146
858collage.cityoflondon.gov.uk:3.11.208.146, 35.176.130.30
859collage.cityoflondon.gov.uk:35.176.130.30, 3.11.208.146
860collage.cityoflondon.gov.uk:35.176.130.30, 3.11.208.146
861collage.cityoflondon.gov.uk:3.11.208.146, 35.176.130.30
862collage.cityoflondon.gov.uk:35.176.130.30, 3.11.208.146
863collage.cityoflondon.gov.uk:3.11.208.146, 35.176.130.30
864collage.cityoflondon.gov.uk:35.176.130.30, 3.11.208.146
865consult.cityoflondon.gov.uk:31.25.189.114
866consult.cityoflondon.gov.uk:31.25.189.114
867consult.cityoflondon.gov.uk:31.25.189.114
868consult.cityoflondon.gov.uk:31.25.189.114
869consult.cityoflondon.gov.uk:31.25.189.114
870contracts.cityoflondon.gov.uk:188.95.135.70
871contracts.cityoflondon.gov.uk:188.95.135.70
872cwi.cityoflondon.gov.uk:
873cwi.cityoflondon.gov.uk:
874cwi.cityoflondon.gov.uk:
875cwidr.cityoflondon.gov.uk:
876democracy.cityoflondon.gov.uk:80.169.89.107
877democracy.cityoflondon.gov.uk:80.169.89.107
878democracy.cityoflondon.gov.uk:80.169.89.107
879democracy.cityoflondon.gov.uk:80.169.89.107
880democracy.cityoflondon.gov.uk:80.169.89.107
881democracy.cityoflondon.gov.uk:80.169.89.107
882democracy.cityoflondon.gov.uk:80.169.89.107
883democracy.cityoflondon.gov.uk:80.169.89.107
884democracy.cityoflondon.gov.uk:80.169.89.107
885dwp-cis.cityoflondon.gov.uk:
886edge.cityoflondon.gov.uk:
887eemocracy.cityoflondon.gov.uk:
888elearning.cityoflondon.gov.uk:146.177.9.125
889elearning.cityoflondon.gov.uk:146.177.9.125
890elearning.cityoflondon.gov.uk:146.177.9.125
891elearning.cityoflondon.gov.uk:146.177.9.125
892email.cityoflondon.gov.uk:91.206.118.10
893email.cityoflondon.gov.uk:91.206.118.10
894email.cityoflondon.gov.uk:91.206.118.10
895email.cityoflondon.gov.uk:91.206.118.10
896email.cityoflondon.gov.uk:91.206.118.10
897email.cityoflondon.gov.uk:91.206.118.10
898emocracy.cityoflondon.gov.uk:
899ext.cityoflondon.gov.uk:80.169.89.106
900ext.cityoflondon.gov.uk:80.169.89.106
901eyp.cityoflondon.gov.uk:193.34.187.146
902fdonline.cityoflondon.gov.uk:80.169.89.106
903fdonline.cityoflondon.gov.uk:80.169.89.106
904fdonline.cityoflondon.gov.uk:80.169.89.106
905femocracy.cityoflondon.gov.uk:
906fyi.cityoflondon.gov.uk:193.34.187.147
907fyi.cityoflondon.gov.uk:193.34.187.147
908fyi.cityoflondon.gov.uk:193.34.187.147
909fyi.cityoflondon.gov.uk:193.34.187.147
910fyi.cityoflondon.gov.uk:193.34.187.147
911fypsd.cityoflondon.gov.uk:80.169.89.101
912fypsd.cityoflondon.gov.uk:80.169.89.101
913fypsd.cityoflondon.gov.uk:80.169.89.101
914fypsd.cityoflondon.gov.uk:80.169.89.101
915guildhall.cityoflondon.gov.uk:
916guildhall.cityoflondon.gov.uk:
917guildhall.cityoflondon.gov.uk:
918guildhall.cityoflondon.gov.uk:
919guildhallartgallery.cityoflondon.gov.uk:
920guildhallartgallery.cityoflondon.gov.uk:
921highwaysreporting.cityoflondon.gov.uk:89.145.127.203
922highwaysreporting.cityoflondon.gov.uk:89.145.127.203
923highwaysreporting.cityoflondon.gov.uk:89.145.127.203
924highwaysreporting.cityoflondon.gov.uk:89.145.127.203
925highwaysreporting.cityoflondon.gov.uk:89.145.127.203
926host13.cityoflondon.gov.uk:
927housingselfservice.cityoflondon.gov.uk:195.20.223.214
928housingselfservice.cityoflondon.gov.uk:195.20.223.214
929hybrid.cityoflondon.gov.uk:195.20.223.210, 195.20.223.245
930hybrid.cityoflondon.gov.uk:195.20.223.245, 195.20.223.210
931hyms.cityoflondon.gov.uk:195.171.176.92
932hyms.cityoflondon.gov.uk:195.171.176.92
933hyms.cityoflondon.gov.uk:195.171.176.92
934intranet.cityoflondon.gov.uk:
935jobs.cityoflondon.gov.uk:104.22.15.166, 104.22.14.166
936jobs.cityoflondon.gov.uk:104.22.14.166, 104.22.15.166
937jobs.cityoflondon.gov.uk:104.22.14.166, 104.22.15.166
938jobs.cityoflondon.gov.uk:104.22.15.166, 104.22.14.166
939jobs.cityoflondon.gov.uk:104.22.15.166, 104.22.14.166
940jobs.cityoflondon.gov.uk:104.22.14.166, 104.22.15.166
941keatshouse.cityoflondon.gov.uk:
942keatshouse.cityoflondon.gov.uk:
943keatshouse.cityoflondon.gov.uk:
944ldfconsultation.cityoflondon.gov.uk:195.12.22.232
945ldfconsultation.cityoflondon.gov.uk:195.12.22.232
946learningzone.cityoflondon.gov.uk:31.25.189.168
947learningzone.cityoflondon.gov.uk:31.25.189.168
948learningzone.cityoflondon.gov.uk:31.25.189.168
949learningzone.cityoflondon.gov.uk:31.25.189.168
950learningzone.cityoflondon.gov.uk:31.25.189.168
951librarycatalogue.cityoflondon.gov.uk:217.169.37.149
952librarycatalogue.cityoflondon.gov.uk:217.169.37.149
953librarycatalogue.cityoflondon.gov.uk:217.169.37.149
954librarycatalogue.cityoflondon.gov.uk:217.169.37.149
955lovethesquaremile.cityoflondon.gov.uk:51.140.85.106
956lovethesquaremile.cityoflondon.gov.uk:51.140.85.106
957lovethesquaremile.cityoflondon.gov.uk:51.140.85.106
958lovethesquaremile.cityoflondon.gov.uk:51.140.85.106
959lovethesquaremile.cityoflondon.gov.uk:51.140.85.106
960lovethesquaremile.cityoflondon.gov.uk:51.140.85.106
961mail.consult.cityoflondon.gov.uk:
962mail1.cityoflondon.gov.uk:80.169.89.80
963mail1.cityoflondon.gov.uk:80.169.89.80
964mail2.cityoflondon.gov.uk:80.169.89.106
965mail2.cityoflondon.gov.uk:80.169.89.106
966mapping.cityoflondon.gov.uk:195.171.176.88
967mapping.cityoflondon.gov.uk:195.171.176.88
968mapping.cityoflondon.gov.uk:195.171.176.88
969mapping.cityoflondon.gov.uk:195.171.176.88
970mobile.cityoflondon.gov.uk:80.169.89.102
971mobile.cityoflondon.gov.uk:80.169.89.102
972mobile.cityoflondon.gov.uk:80.169.89.102
973mobile01.cityoflondon.gov.uk:195.20.223.213
974mobile01.cityoflondon.gov.uk:195.20.223.213
975news.cityoflondon.gov.uk:52.50.147.113, 52.31.6.52, 18.203.123.9
976news.cityoflondon.gov.uk:18.203.123.9, 52.31.6.52, 52.50.147.113
977news.cityoflondon.gov.uk:52.50.147.113, 18.203.123.9, 52.31.6.52
978news.cityoflondon.gov.uk:18.203.123.9, 52.31.6.52, 52.50.147.113
979news.cityoflondon.gov.uk:52.50.147.113, 52.31.6.52, 18.203.123.9
980news.cityoflondon.gov.uk:52.50.147.113, 18.203.123.9, 52.31.6.52
981news.cityoflondon.gov.uk:52.31.6.52, 52.50.147.113, 18.203.123.9
982onlinecatalogue.cityoflondon.gov.uk:104.22.15.166, 104.22.14.166
983onlinecatalogue.cityoflondon.gov.uk:104.22.14.166, 104.22.15.166
984onlinecatalogue.cityoflondon.gov.uk:104.22.15.166, 104.22.14.166
985pcn.cityoflondon.gov.uk:104.22.15.166, 104.22.14.166
986pcn.cityoflondon.gov.uk:104.22.14.166, 104.22.15.166
987pcn.cityoflondon.gov.uk:104.22.15.166, 104.22.14.166
988pcn.cityoflondon.gov.uk:104.22.14.166, 104.22.15.166
989pcn.cityoflondon.gov.uk:104.22.15.166, 104.22.14.166
990pcn.cityoflondon.gov.uk:104.22.14.166, 104.22.15.166
991pcn.cityoflondon.gov.uk:104.22.15.166, 104.22.14.166
992pcn.cityoflondon.gov.uk:104.22.14.166, 104.22.15.166
993pcn.cityoflondon.gov.uk:104.22.15.166, 104.22.14.166
994planning2.cityoflondon.gov.uk:
995planning2.cityoflondon.gov.uk:
996planninguat.cityoflondon.gov.uk:
997production.cityoflondon.gov.uk:104.22.15.166, 104.22.14.166
998remote.cityoflondon.gov.uk:52.59.241.213
999remote.cityoflondon.gov.uk:52.59.241.213
1000remote.cityoflondon.gov.uk:52.59.241.213
1001remote.cityoflondon.gov.uk:52.59.241.213
1002remotedr.cityoflondon.gov.uk:
1003revenues.cityoflondon.gov.uk:104.22.14.166, 104.22.15.166
1004revenues.cityoflondon.gov.uk:104.22.14.166, 104.22.15.166
1005revenues.cityoflondon.gov.uk:104.22.15.166, 104.22.14.166
1006revenues.cityoflondon.gov.uk:104.22.14.166, 104.22.15.166
1007semocracy.cityoflondon.gov.uk:
1008shop.cityoflondon.gov.uk:23.227.38.32
1009shop.cityoflondon.gov.uk:23.227.38.32
1010shop.cityoflondon.gov.uk:23.227.38.32
1011shop.cityoflondon.gov.uk:23.227.38.32
1012sip.cityoflondon.gov.uk:52.113.64.147
1013sip.cityoflondon.gov.uk:52.113.64.147
1014sni.cloudflaressl.com:104.22.62.243, 104.22.63.243
1015sp2.cityoflondon.gov.uk:
1016sp2.cityoflondon.gov.uk:
1017sts.cityoflondon.gov.uk:80.169.89.84, 80.169.89.100
1018sts.cityoflondon.gov.uk:80.169.89.100, 80.169.89.84
1019tokenbookslma.cityoflondon.gov.uk:
1020townclerk.cityoflondon.gov.uk:
1021u00careers.cityoflondon.gov.uk:
1022u00email.cityoflondon.gov.uk:
1023u00news.cityoflondon.gov.uk:
1024u00www.cityoflondon.gov.uk:
1025wholesalemarkets.cityoflondon.gov.uk:134.213.214.65
1026wholesalemarkets.cityoflondon.gov.uk:134.213.214.65
1027wholesalemarkets.cityoflondon.gov.uk:134.213.214.65
1028wholesalemarkets.cityoflondon.gov.uk:134.213.214.65
1029ws1.cityoflondon.gov.uk:
1030www.careers.cityoflondon.gov.uk:
1031www.careers.cityoflondon.gov.uk:
1032www.cityoflondon.gov.uk:80.169.89.102
1033www.cityoflondon.gov.uk:80.169.89.102
1034www.cityoflondon.gov.uk:80.169.89.102
1035www.cityoflondon.gov.uk:80.169.89.102
1036www.cityoflondon.gov.uk:80.169.89.102
1037www.cityoflondon.gov.uk:80.169.89.102
1038www.cityoflondon.gov.uk:80.169.89.102
1039www.cityoflondon.gov.uk:80.169.89.102
1040www.cityoflondon.gov.uk:80.169.89.102
1041www.cityoflondon.gov.uk:80.169.89.102
1042www.cityoflondon.gov.uk:80.169.89.102
1043www.cityoflondon.gov.uk:80.169.89.102
1044www.cityoflondon.gov.uk:80.169.89.102
1045www.collage.cityoflondon.gov.uk:
1046www.collage.cityoflondon.gov.uk:
1047www.consult.cityoflondon.gov.uk:31.25.189.114
1048www.consult.cityoflondon.gov.uk:31.25.189.114
1049www.consult.cityoflondon.gov.uk:31.25.189.114
1050www.democracy.cityoflondon.gov.uk:
1051www.elearning.cityoflondon.gov.uk:
1052www.fyi.cityoflondon.gov.uk:193.34.187.147
1053www.fyi.cityoflondon.gov.uk:193.34.187.147
1054www.fyi.cityoflondon.gov.uk:193.34.187.147
1055www.fyi.cityoflondon.gov.uk:193.34.187.147
1056www.fyi.cityoflondon.gov.uk:193.34.187.147
1057www.fyi.cityoflondon.gov.uk:193.34.187.147
1058www.guildhall.cityoflondon.gov.uk:176.32.230.9
1059www.guildhall.cityoflondon.gov.uk:176.32.230.9
1060www.guildhall.cityoflondon.gov.uk:176.32.230.9
1061www.guildhall.cityoflondon.gov.uk:176.32.230.9
1062www.guildhall.cityoflondon.gov.uk:176.32.230.9
1063www.guildhall.cityoflondon.gov.uk:176.32.230.9
1064www.guildhall.cityoflondon.gov.uk:176.32.230.9
1065www.guildhall.cityoflondon.gov.uk:176.32.230.9
1066www.guildhallartgallery.cityoflondon.gov.uk:80.169.89.101
1067www.guildhallartgallery.cityoflondon.gov.uk:80.169.89.101
1068www.guildhallartgallery.cityoflondon.gov.uk:80.169.89.101
1069www.guildhallartgallery.cityoflondon.gov.uk:80.169.89.101
1070www.housingselfservice.cityoflondon.gov.uk:
1071www.keatshouse.cityoflondon.gov.uk:
1072www.keatshouse.cityoflondon.gov.uk:
1073www.keatshouse.cityoflondon.gov.uk:
1074www.keatshouse.cityoflondon.gov.uk:
1075www.learningzone.cityoflondon.gov.uk:
1076www.learningzone.cityoflondon.gov.uk:
1077www.learningzone.cityoflondon.gov.uk:
1078www.learningzone.cityoflondon.gov.uk:
1079www.learningzone.cityoflondon.gov.uk:
1080www.mapping.cityoflondon.gov.uk:195.171.176.88
1081www.mapping.cityoflondon.gov.uk:195.171.176.88
1082www.mapping.cityoflondon.gov.uk:195.171.176.88
1083www.mapping.cityoflondon.gov.uk:195.171.176.88
1084www.mapping.cityoflondon.gov.uk:195.171.176.88
1085www.mapping.cityoflondon.gov.uk:195.171.176.88
1086www.mapping.cityoflondon.gov.uk:195.171.176.88
1087www.mapping2.cityoflondon.gov.uk:195.171.176.90
1088www.mapping2.cityoflondon.gov.uk:195.171.176.90
1089www.mapping2.cityoflondon.gov.uk:195.171.176.90
1090www.mapping2.cityoflondon.gov.uk:195.171.176.90
1091www.mapping2.cityoflondon.gov.uk:195.171.176.90
1092www.planning.cityoflondon.gov.uk:85.92.209.141
1093www.planning.cityoflondon.gov.uk:85.92.209.141
1094www.planning.cityoflondon.gov.uk:85.92.209.141
1095www.planning.cityoflondon.gov.uk:85.92.209.141
1096www.planning2.cityoflondon.gov.uk:195.171.176.91
1097www.planning2.cityoflondon.gov.uk:195.171.176.91
1098www.planning2.cityoflondon.gov.uk:195.171.176.91
1099www.planning2.cityoflondon.gov.uk:195.171.176.91
1100www.planning2.cityoflondon.gov.uk:195.171.176.91
1101www.planning2.cityoflondon.gov.uk:195.171.176.91
1102www.remote.cityoflondon.gov.uk:
1103www.remote.cityoflondon.gov.uk:
1104www.tokenbookslma.cityoflondon.gov.uk:141.211.54.243
1105www.tokenbookslma.cityoflondon.gov.uk:141.211.54.243
1106www.tokenbookslma.cityoflondon.gov.uk:141.211.54.243
1107www1.cityoflondon.gov.uk:80.169.89.96
1108www1.cityoflondon.gov.uk:80.169.89.96
1109www1.cityoflondon.gov.uk:80.169.89.96
1110www1.cityoflondon.gov.uk:80.169.89.96
1111www1.cityoflondon.gov.uk:80.169.89.96
1112www2.cityoflondon.gov.uk:80.169.89.98
1113wwwstage.cityoflondon.gov.uk:104.22.14.166, 104.22.15.166
1114wwwstage.cityoflondon.gov.uk:104.22.14.166, 104.22.15.166
1115wwwstage.cityoflondon.gov.uk:104.22.15.166, 104.22.14.166
1116wwwstage.cityoflondon.gov.uk:104.22.14.166, 104.22.15.166
1117xemocracy.cityoflondon.gov.uk:
1118
1119[*] Trello URLs found: 18
1120--------------------
1121https://trello.com/b/0vrqonpj/sgammaxis-pipeline
1122https://trello.com/b/1x85hecb/blog
1123https://trello.com/b/4hbytqj9/golondoninfo
1124https://trello.com/b/faxhwzze/uk-acts-of-parliament
1125https://trello.com/b/kmzaxwqy/space-time-mobile-self-storage
1126https://trello.com/b/ktkni9yj/admin-team
1127https://trello.com/b/lebr3heu/uk-acts-of-parliament
1128https://trello.com/b/o00atmzs/dc-quests
1129https://trello.com/b/pgi2qqb4/uk-medical-qualification-course
1130https://trello.com/b/pgsrsaoy/bonnie
1131https://trello.com/b/stn2unnu/uk-gala-dinners
1132https://trello.com/b/vbodrljf/greater-london-authority
1133https://trello.com/b/ykbjj7r5/united-kingdom-business-registrations
1134https://trello.com/c/glbmw15b/8-london-metropolitan-archives
1135https://trello.com/c/hpc4lmfp/12-london-metropolitan-archives
1136https://trello.com/c/p6ouwi3m/96-capital-city-of-london-england-united-kingdom-1807
1137https://trello.com/c/wti5v4cm/211-concert-in-the-trees-friday-18th
1138https://trello.com/c/xjyg0uca/22-add-save-for-later-function-to-website
1139################################################################################################################################
1140 AVAILABLE PLUGINS
1141 -----------------
1142
1143 HttpHeadersPlugin
1144 CertificateInfoPlugin
1145 HeartbleedPlugin
1146 RobotPlugin
1147 EarlyDataPlugin
1148 OpenSslCipherSuitesPlugin
1149 OpenSslCcsInjectionPlugin
1150 SessionResumptionPlugin
1151 SessionRenegotiationPlugin
1152 CompressionPlugin
1153 FallbackScsvPlugin
1154
1155
1156
1157 CHECKING HOST(S) AVAILABILITY
1158 -----------------------------
1159
1160 80.169.89.102:443 => 80.169.89.102
1161
1162
1163
1164
1165 SCAN RESULTS FOR 80.169.89.102:443 - 80.169.89.102
1166 --------------------------------------------------
1167
1168 * Downgrade Attacks:
1169 TLS_FALLBACK_SCSV: OK - Supported
1170
1171 * SSLV2 Cipher Suites:
1172 Server rejected all cipher suites.
1173
1174 * Deflate Compression:
1175 OK - Compression disabled
1176
1177 * TLSV1_3 Cipher Suites:
1178 Server rejected all cipher suites.
1179
1180 * Certificate Information:
1181 Content
1182 SHA1 Fingerprint: 414c9a2ce74fb30a5c45a40d2288a04393d74d99
1183 Common Name: *.cityoflondon.gov.uk
1184 Issuer: Entrust Certification Authority - L1K
1185 Serial Number: 42593082139691491010162019823312957291
1186 Not Before: 2019-01-09 10:15:04
1187 Not After: 2021-01-09 10:45:03
1188 Signature Algorithm: sha256
1189 Public Key Algorithm: RSA
1190 Key Size: 2048
1191 Exponent: 65537 (0x10001)
1192 DNS Subject Alternative Names: ['*.cityoflondon.gov.uk', 'cityoflondon.gov.uk']
1193
1194 Trust
1195 Hostname Validation: FAILED - Certificate does NOT match 80.169.89.102
1196 Android CA Store (9.0.0_r9): OK - Certificate is trusted
1197 Apple CA Store (iOS 12, macOS 10.14, watchOS 5, and tvOS 12):OK - Certificate is trusted
1198 Java CA Store (jdk-12.0.1): OK - Certificate is trusted
1199 Mozilla CA Store (2019-03-14): OK - Certificate is trusted
1200 Windows CA Store (2019-05-27): OK - Certificate is trusted
1201 Symantec 2018 Deprecation: WARNING: Certificate distrusted by Google and Mozilla on September 2018
1202 Received Chain: *.cityoflondon.gov.uk --> Entrust Certification Authority - L1K --> Entrust Root Certification Authority - G2
1203 Verified Chain: *.cityoflondon.gov.uk --> Entrust Certification Authority - L1K --> Entrust Root Certification Authority - G2
1204 Received Chain Contains Anchor: WARNING - Received certificate chain contains the anchor certificate
1205 Received Chain Order: OK - Order is valid
1206 Verified Chain contains SHA1: OK - No SHA1-signed certificate in the verified certificate chain
1207
1208 Extensions
1209 OCSP Must-Staple: NOT SUPPORTED - Extension not found
1210 Certificate Transparency: OK - 4 SCTs included
1211
1212 OCSP Stapling
1213 NOT SUPPORTED - Server did not send back an OCSP response
1214
1215 * TLSV1_1 Cipher Suites:
1216 Server rejected all cipher suites.
1217
1218 * OpenSSL CCS Injection:
1219 OK - Not vulnerable to OpenSSL CCS injection
1220
1221 * OpenSSL Heartbleed:
1222 OK - Not vulnerable to Heartbleed
1223
1224 * TLSV1 Cipher Suites:
1225 Server rejected all cipher suites.
1226
1227 * TLS 1.2 Session Resumption Support:
1228 With Session IDs: OK - Supported (5 successful, 0 failed, 0 errors, 5 total attempts).
1229 With TLS Tickets: NOT SUPPORTED - TLS ticket not assigned.
1230
1231 * Session Renegotiation:
1232 Client-initiated Renegotiation: VULNERABLE - Server honors client-initiated renegotiations
1233 Secure Renegotiation: OK - Supported
1234
1235 * TLSV1_2 Cipher Suites:
1236 Forward Secrecy OK - Supported
1237 RC4 OK - Not Supported
1238
1239 Preferred:
1240 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 302 Redirect - https://80.169.89.102/Pages/default.aspx
1241 Accepted:
1242 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 302 Redirect - https://80.169.89.102/Pages/default.aspx
1243 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 302 Redirect - https://80.169.89.102/Pages/default.aspx
1244 TLS_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 302 Redirect - https://80.169.89.102/Pages/default.aspx
1245 TLS_RSA_WITH_AES_256_CBC_SHA256 256 bits HTTP 302 Redirect - https://80.169.89.102/Pages/default.aspx
1246 TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 302 Redirect - https://80.169.89.102/Pages/default.aspx
1247 TLS_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 302 Redirect - https://80.169.89.102/Pages/default.aspx
1248 TLS_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 302 Redirect - https://80.169.89.102/Pages/default.aspx
1249 TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 302 Redirect - https://80.169.89.102/Pages/default.aspx
1250 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 302 Redirect - https://80.169.89.102/Pages/default.aspx
1251 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 256 bits HTTP 302 Redirect - https://80.169.89.102/Pages/default.aspx
1252 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 302 Redirect - https://80.169.89.102/Pages/default.aspx
1253 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 302 Redirect - https://80.169.89.102/Pages/default.aspx
1254 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 302 Redirect - https://80.169.89.102/Pages/default.aspx
1255 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 302 Redirect - https://80.169.89.102/Pages/default.aspx
1256
1257 * SSLV3 Cipher Suites:
1258 Server rejected all cipher suites.
1259
1260 * ROBOT Attack:
1261 OK - Not vulnerable
1262
1263
1264 SCAN COMPLETED IN 24.98 S
1265 -------------------------
1266################################################################################################################################
1267[+] Target : https://www.cityoflondon.gov.uk
1268
1269[+] IP Address : 80.169.89.102
1270
1271[+] Headers :
1272
1273[+] Cache-Control : private
1274[+] Content-Type : text/html; charset=utf-8
1275[+] Content-Encoding : gzip
1276[+] Expires : Tue, 31 Mar 2020 04:21:08 GMT
1277[+] Vary : Accept-Encoding
1278[+] Server : Microsoft-IIS/7.5
1279[+] SPRequestGuid : 377e7433-aca1-409f-97ec-c413b79efbd9
1280[+] X-SharePointHealthScore : 0
1281[+] X-AspNet-Version : 2.0.50727
1282[+] X-Powered-By : ASP.NET
1283[+] MicrosoftSharePointTeamServices : 14.0.0.7239
1284[+] X-MS-InvokeApp : 1; RequireReadOnly
1285[+] Date : Tue, 31 Mar 2020 04:19:00 GMT
1286[+] Content-Length : 8648
1287
1288[!] SSL Certificate Information :
1289
1290[+] countryName : GB
1291[+] localityName : London
1292[+] organizationName : City of London Corporation
1293[+] commonName : *.cityoflondon.gov.uk
1294[+] countryName : US
1295[+] organizationName : Entrust, Inc.
1296[+] organizationalUnitName : (c) 2012 Entrust, Inc. - for authorized use only
1297[+] commonName : Entrust Certification Authority - L1K
1298[+] version : 3
1299[+] serialNumber : 200B2115536F6E220000000050EBEF6B
1300[+] notBefore : Jan 9 10:15:04 2019 GMT
1301[+] notAfter : Jan 9 10:45:03 2021 GMT
1302[+] OCSP : http://ocsp.entrust.net
1303[+] caIssuers : http://aia.entrust.net/l1k-chain256.cer
1304[+] crlDistributionPoints : http://crl.entrust.net/level1k.crl
1305
1306[!] Whois Lookup :
1307
1308[+] asn_registry : ripencc
1309[+] asn : 8220
1310[+] asn_cidr : 80.169.0.0/16
1311[+] asn_country_code : GB
1312[+] asn_date : 2003-03-28
1313[+] query : 80.169.89.102
1314[+] cidr : 80.169.89.96/28
1315[+] name : NET-GB-AGILISYS-LTD
1316[+] handle : DR6199-RIPE
1317[+] range : 80.169.89.96 - 80.169.89.111
1318[+] description : AGILISYS LTD
1319[+] country : GB
1320[+] address : AGILISYS UNIT 13 VOLT AVENUE LONDON NW106PN United Kingdom
1321[+] created : 2015-02-19T14:42:23Z
1322[+] updated : 2015-02-19T14:42:23Z
1323[+] cidr : 80.169.0.0/16
1324[+] range : 80.169.0.0/16
1325[+] description : COLT
1326[+] emails : ['abuse@colt.net']
1327[+] created : 2003-04-01T12:11:15Z
1328[+] updated : 2012-02-10T14:30:48Z
1329
1330[!] Starting DNS Enumeration...
1331
1332[+] cityoflondon.gov.uk. 1799 IN SOA jake.ns.cloudflare.com. dns.cloudflare.com. 2033627693 10000 2400 604800 3600
1333[+] cityoflondon.gov.uk. 299 IN MX 1 cityoflondon-gov-uk.mail.protection.outlook.com.
1334[+] cityoflondon.gov.uk. 3788 IN HINFO 075246433834383200
1335[+] cityoflondon.gov.uk. 21599 IN NS jake.ns.cloudflare.com.
1336[+] cityoflondon.gov.uk. 299 IN A 80.169.89.102
1337[+] cityoflondon.gov.uk. 119 IN TXT "v=spf1 ip4:23.227.38.64/32 include:sp2.cityoflondon.gov.uk include:spf.protection.outlook.com include:mailcontrol.com include:servers.mcsv.net include:customers.clickdimensions.com -all"
1338[+] cityoflondon.gov.uk. 119 IN TXT "MS=ms45080239"
1339[+] cityoflondon.gov.uk. 119 IN TXT "v=msv1t=0F2DCBB1-D8B0-4698-9721-6B2B48AA12AD"
1340[+] cityoflondon.gov.uk. 21599 IN NS treasure.ns.cloudflare.com.
1341[+] cityoflondon.gov.uk. 119 IN TXT "Z6qxeDy0jOHWN2UQVDa4jnTnX9tNBG4nZ3TSEegiBUyI1p353x11ce/W4sgbxFySXXUlc2QmY8itoEXnTR0kKw=="
1342[+] _dmarc.cityoflondon.gov.uk. 3599 IN TXT "v=DMARC1;p=reject;sp=reject;pct=100;rua=mailto:dmarc-rua@dmarc.service.gov.uk"
1343
1344[!] Starting Sub-Domain Enumeration...
1345
1346[!] Requesting BuffOver
1347[!] Requesting ThreadCrowd
1348[!] Requesting crt.sh
1349[!] Requesting AnubisDB
1350[!] Requesting ThreatMiner
1351
1352[+] Results :
1353
1354[+] shop.cityoflondon.gov.uk
1355[+] cs-cityoflondon.delib.net
1356[+] 31.25.189.114
1357[+] email.cityoflondon.gov.uk
1358[+] hybrid.cityoflondon.gov.uk
1359[+] 195.20.223.214
1360[+] sts.cityoflondon.gov.uk
1361[+] 91.206.118.10
1362[+] *.Mapping.CityofLondon.gov.uk
1363[+] remotedr.cityoflondon.gov.uk
1364[+] www.housingselfservice.cityoflondon.gov.uk
1365[+] 77.104.134.194
1366[+] www.cityoflondon.gov.uk
1367[+] www.consult.cityoflondon.gov.uk
1368[+] 195.171.176.88
1369[+] www1.cityoflondon.gov.uk
1370[+] highwaysreporting.cityoflondon.gov.uk
1371[+] www.elearning.cityoflondon.gov.uk
1372[+] fyi.cityoflondon.gov.uk
1373[+] cwidr.cityoflondon.gov.uk
1374[+] mail1.cityoflondon.gov.uk
1375[+] Mapping.CityofLondon.gov.uk
1376[+] Hyms.cityoflondon.gov.uk
1377[+] lovethesquaremile.cityoflondon.gov.uk
1378[+] democracy.cityoflondon.gov.uk
1379[+] collage.cityoflondon.gov.uk
1380[+] dwp-cis.cityoflondon.gov.uk
1381[+] www.fyi.cityoflondon.gov.uk
1382[+] www.planninguat.cityoflondon.gov.uk
1383[+] learningzone.cityoflondon.gov.uk
1384[+] www.learningzone.cityoflondon.gov.uk
1385[+] keatshouse.cityoflondon.gov.uk
1386[+] 80.169.89.96
1387[+] Mobile01.cityoflondon.gov.uk
1388[+] sipdir.online.lync.com
1389[+] sip.cityoflondon.gov.uk
1390[+] jobs.cityoflondon.gov.uk
1391[+] Mobile01.Cityoflondon.gov.uk
1392[+] mail.consult.cityoflondon.gov.uk
1393[+] elearning.cityoflondon.gov.uk
1394[+] onlinecatalogue.cityoflondon.gov.uk
1395[+] 195.171.176.87
1396[+] remote.cityoflondon.gov.uk
1397[+] www.remote.cityoflondon.gov.uk
1398[+] capitacloud.cityoflondon.gov.uk
1399[+] www.planning2.cityoflondon.gov.uk
1400[+] 104.22.14.166
1401[+] 23.227.38.32
1402[+] townclerk.cityoflondon.gov.uk
1403[+] 104.22.15.166
1404[+] 195.171.176.90
1405[+] citybenefits.cityoflondon.gov.uk
1406[+] mobile.cityoflondon.gov.uk
1407[+] www.collage.cityoflondon.gov.uk
1408[+] www.careers.cityoflondon.gov.uk
1409[+] mobile01.cityoflondon.gov.uk
1410[+] biztalk.cityoflondon.gov.uk
1411[+] www.mapping2.cityoflondon.gov.uk
1412[+] capitacloud2.cityoflondon.gov.uk
1413[+] fypsd.cityoflondon.gov.uk
1414[+] cityoflondon.beyondtrustcloud.com
1415[+] news.cityoflondon.gov.uk
1416[+] wwwstage.cityoflondon.gov.uk
1417[+] cwi.cityoflondon.gov.uk
1418[+] lma.ibase.media
1419[+] 176.32.230.9
1420[+] 146.177.9.125
1421[+] 217.169.37.149
1422[+] www.mapping.cityoflondon.gov.uk
1423[+] www.guildhallartgallery.cityoflondon.gov.uk
1424[+] collage-researcher.cityoflondon.gov.uk
1425[+] ldfconsultation.cityoflondon.gov.uk
1426[+] www.guildhall.cityoflondon.gov.uk
1427[+] CityBenefits.cityoflondon.gov.uk
1428[+] housingselfservice.cityoflondon.gov.uk
1429[+] 195.12.22.232
1430[+] mail2.cityoflondon.gov.uk
1431[+] www.planning.cityoflondon.gov.uk
1432[+] 80.169.89.97
1433[+] 134.213.36.31
1434[+] *.cityoflondon.gov.uk
1435[+] planninguat.cityoflondon.gov.uk
1436[+] 80.169.89.106
1437[+] contracts.cityoflondon.gov.uk
1438[+] edge.cityoflondon.gov.uk
1439[+] 80.169.89.102
1440[+] ext.cityoflondon.gov.uk
1441[+] consult.cityoflondon.gov.uk
1442[+] revenues.cityoflondon.gov.uk
1443[+] 80.169.89.80
1444[+] pcn.cityoflondon.gov.uk
1445[+] 31.25.189.168
1446[+] planning2.cityoflondon.gov.uk
1447[+] 195.20.223.213
1448[+] fdonline.cityoflondon.gov.uk
1449[+] www.keatshouse.cityoflondon.gov.uk
1450[+] librarycatalogue.cityoflondon.gov.uk
1451[+] 80.169.89.107
1452[+] hyms.cityoflondon.gov.uk
1453[+] 195.171.176.91
1454[+] www.tokenbookslma.cityoflondon.gov.uk
1455[+] mapping.cityoflondon.gov.uk
1456[+] eyp.cityoflondon.gov.uk
1457[+] careers.cityoflondon.gov.uk
1458[+] 80.169.89.101
1459[+] wholesalemarkets.cityoflondon.gov.uk
1460
1461[+] Total Found : 106
1462
1463[+] Port : 33434
1464[+] Timeout : 1.0
1465
1466[!] Starting UDP Traceroute...
1467
1468HOPS IP HOST
1469
14701 10.203.9.1 _gateway
14712 45.131.5.3 Unknown
14723 109.236.95.226 Unknown
14734 109.236.95.108 Unknown
14745 80.249.208.236 et-0-0-1-pr2.AMS.router.colt.net
14756 212.74.75.37 Unknown
14767 212.74.75.37 Unknown
14778 80.169.196.38 cpeuk_lon002520.ia.colt.net
14789 195.110.81.4 Unknown
147910 * * *
148011 * * *
148112 * * *
148213 * * *
148314 * * *
148415 * * *
148516 * * *
148617 * * *
148718 * * *
148819 * * *
148920 * * *
149021 * * *
149122 * * *
149223 * * *
149324 * * *
149425 * * *
149526 * * *
149627 * * *
149728 * * *
149829 * * *
149930 * * *
1500
1501[!] Starting Port Scan...
1502
1503[+] Testing Top 1000 Ports...
1504
1505
1506[!] Starting Crawler...
1507
1508[+] Looking for robots.txt........[ Not Found ]
1509[+] Looking for sitemap.xml.......[ Found ]
1510[+] Extracting sitemap Links......[ 2664 ]
1511[+] Extracting CSS Links..........[ 2 ]
1512[+] Extracting Javascript Links...[ 2 ]
1513[+] Extracting Internal Links.....[ 6 ]
1514[+] Extracting External Links.....[ 3 ]
1515[+] Extracting Images.............[ 13 ]
1516[+] Crawling Sitemaps.............[ 0 ]
1517[+] Crawling Javascripts..........[ 0 ]
1518
1519[+] Total Unique Links Extracted : 2690
1520
1521[!] Starting Directory Search...
1522
1523[+] Threads : 50
1524[+] Timeout : 10.0
1525[+] Wordlist : wordlists/dirb_common.txt
1526[+] Allow Redirects : False
1527[+] SSL Verification : True
1528[+] DNS Servers : 1.1.1.1
1529
1530[+] 302 | https://www.cityoflondon.gov.uk/
1531[+] 301 | https://www.cityoflondon.gov.uk/_layouts
1532[+] 301 | https://www.cityoflondon.gov.uk/_vti_bin
1533[+] 200 | https://www.cityoflondon.gov.uk/_vti_bin/_vti_adm/admin.dll
1534[+] 200 | https://www.cityoflondon.gov.uk/_vti_bin/_vti_aut/author.dll
1535[+] 200 | https://www.cityoflondon.gov.uk/_vti_bin/shtml.dll
1536[+] 301 | https://www.cityoflondon.gov.uk/_vti_pvt
1537[+] 301 | https://www.cityoflondon.gov.uk/apply
1538[+] 301 | https://www.cityoflondon.gov.uk/asia
1539[+] 403 | https://www.cityoflondon.gov.uk/aspnet_client
1540[+] 301 | https://www.cityoflondon.gov.uk/basket
1541[+] 302 | https://www.cityoflondon.gov.uk/business
1542[+] 302 | https://www.cityoflondon.gov.uk/Business
1543[+] 301 | https://www.cityoflondon.gov.uk/ccs
1544[+] 301 | https://www.cityoflondon.gov.uk/china
1545[+] 301 | https://www.cityoflondon.gov.uk/contact
1546[+] 301 | https://www.cityoflondon.gov.uk/Contact
1547[+] 302 | https://www.cityoflondon.gov.uk/contact-us
1548[+] 302 | https://www.cityoflondon.gov.uk/documents
1549[+] 301 | https://www.cityoflondon.gov.uk/education
1550[+] 301 | https://www.cityoflondon.gov.uk/Education
1551[+] 301 | https://www.cityoflondon.gov.uk/emailtemplates
1552[+] 301 | https://www.cityoflondon.gov.uk/error
1553[+] 302 | https://www.cityoflondon.gov.uk/events
1554[+] 302 | https://www.cityoflondon.gov.uk/Events
1555[+] 301 | https://www.cityoflondon.gov.uk/extranet
1556[+] 301 | https://www.cityoflondon.gov.uk/Extranet
1557[+] 301 | https://www.cityoflondon.gov.uk/feedback
1558[+] 301 | https://www.cityoflondon.gov.uk/finance
1559[+] 301 | https://www.cityoflondon.gov.uk/ftp
1560[+] 302 | https://www.cityoflondon.gov.uk/jobs
1561[+] 301 | https://www.cityoflondon.gov.uk/libraries
1562[+] 301 | https://www.cityoflondon.gov.uk/licensing
1563[+] 301 | https://www.cityoflondon.gov.uk/mailinglist
1564[+] 302 | https://www.cityoflondon.gov.uk/maps
1565[+] 301 | https://www.cityoflondon.gov.uk/markets
1566[+] 302 | https://www.cityoflondon.gov.uk/newsroom
1567[+] 301 | https://www.cityoflondon.gov.uk/order
1568[+] 302 | https://www.cityoflondon.gov.uk/pages
1569[+] 302 | https://www.cityoflondon.gov.uk/Pages
1570[+] 301 | https://www.cityoflondon.gov.uk/power
1571[+] 301 | https://www.cityoflondon.gov.uk/privacy
1572[+] 301 | https://www.cityoflondon.gov.uk/Privacy
1573[+] 301 | https://www.cityoflondon.gov.uk/procurement
1574[+] 301 | https://www.cityoflondon.gov.uk/publications
1575[+] 301 | https://www.cityoflondon.gov.uk/Publications
1576[+] 302 | https://www.cityoflondon.gov.uk/reports%20list
1577[+] 301 | https://www.cityoflondon.gov.uk/research
1578[+] 301 | https://www.cityoflondon.gov.uk/Research
1579[+] 301 | https://www.cityoflondon.gov.uk/resource
1580[+] 302 | https://www.cityoflondon.gov.uk/reusablecontent
1581[+] 302 | https://www.cityoflondon.gov.uk/search
1582[+] 302 | https://www.cityoflondon.gov.uk/Search
1583[+] 302 | https://www.cityoflondon.gov.uk/services
1584[+] 302 | https://www.cityoflondon.gov.uk/Services
1585[+] 301 | https://www.cityoflondon.gov.uk/shop
1586[+] 301 | https://www.cityoflondon.gov.uk/shop_closed
1587[+] 301 | https://www.cityoflondon.gov.uk/shop_content
1588[+] 301 | https://www.cityoflondon.gov.uk/shopadmin
1589[+] 301 | https://www.cityoflondon.gov.uk/shopper
1590[+] 301 | https://www.cityoflondon.gov.uk/shopping
1591[+] 301 | https://www.cityoflondon.gov.uk/shopping_cart
1592[+] 301 | https://www.cityoflondon.gov.uk/shoppingcart
1593[+] 301 | https://www.cityoflondon.gov.uk/shopping-lists
1594[+] 301 | https://www.cityoflondon.gov.uk/shops
1595[+] 301 | https://www.cityoflondon.gov.uk/shops_buyaction
1596[+] 301 | https://www.cityoflondon.gov.uk/shopstat
1597[+] 301 | https://www.cityoflondon.gov.uk/shopsys
1598[+] 200 | https://www.cityoflondon.gov.uk/sitemap.xml
1599[+] 301 | https://www.cityoflondon.gov.uk/social
1600[+] 301 | https://www.cityoflondon.gov.uk/sport
1601[+] 301 | https://www.cityoflondon.gov.uk/thankyou
1602[+] 302 | https://www.cityoflondon.gov.uk/training
1603[+] 301 | https://www.cityoflondon.gov.uk/transport
1604[+] 301 | https://www.cityoflondon.gov.uk/wifi
1605[+] 302 | https://www.cityoflondon.gov.uk/workflowtasks
1606
1607[+] Directories Found : 76
1608[+] Directories Skipped : 4538
1609[+] Total Requests : 4614
1610
1611[+] Completed in 0:03:30.605832
1612################################################################################################################################
1613*] Processing domain cityoflondon.gov.uk
1614[*] Using system resolvers ['10.101.0.243', '192.168.0.1', '2001:18c0:121:6900:724f:b8ff:fefd:5b6a']
1615[+] Getting nameservers
1616173.245.59.122 - jake.ns.cloudflare.com
1617162.159.38.116 - treasure.ns.cloudflare.com
1618[-] Zone transfer failed
1619
1620[+] TXT records found
1621"MS=ms45080239"
1622"v=msv1t=0F2DCBB1-D8B0-4698-9721-6B2B48AA12AD"
1623"v=spf1 ip4:23.227.38.64/32 include:sp2.cityoflondon.gov.uk include:spf.protection.outlook.com include:mailcontrol.com include:servers.mcsv.net include:customers.clickdimensions.com -all"
1624"Z6qxeDy0jOHWN2UQVDa4jnTnX9tNBG4nZ3TSEegiBUyI1p353x11ce/W4sgbxFySXXUlc2QmY8itoEXnTR0kKw=="
1625
1626[+] DMARC records found
1627"v=DMARC1;p=reject;sp=reject;pct=100;rua=mailto:dmarc-rua@dmarc.service.gov.uk"
1628
1629[+] MX records found, added to target list
16301 cityoflondon-gov-uk.mail.protection.outlook.com.
1631
1632[*] Scanning cityoflondon.gov.uk for A records
163380.169.89.102 - cityoflondon.gov.uk
163480.169.89.106 - apps.cityoflondon.gov.uk
163540.101.81.152 - autodiscover.cityoflondon.gov.uk
163640.101.12.72 - autodiscover.cityoflondon.gov.uk
163740.101.12.136 - autodiscover.cityoflondon.gov.uk
163852.97.155.120 - autodiscover.cityoflondon.gov.uk
163952.97.135.120 - autodiscover.cityoflondon.gov.uk
164040.101.18.248 - autodiscover.cityoflondon.gov.uk
164152.97.158.168 - autodiscover.cityoflondon.gov.uk
164240.101.121.24 - autodiscover.cityoflondon.gov.uk
164377.104.134.194 - careers.cityoflondon.gov.uk
164480.169.89.102 - cn.cityoflondon.gov.uk
164580.169.89.101 - demo.cityoflondon.gov.uk
164691.206.118.10 - email.cityoflondon.gov.uk
1647146.177.9.125 - elearning.cityoflondon.gov.uk
1648217.154.230.198 - forms.cityoflondon.gov.uk
1649104.22.14.166 - jobs.cityoflondon.gov.uk
1650104.22.15.166 - jobs.cityoflondon.gov.uk
165152.113.64.150 - lyncdiscover.cityoflondon.gov.uk
165280.169.89.82 - m.cityoflondon.gov.uk
165380.169.89.80 - mail1.cityoflondon.gov.uk
165480.169.89.106 - mail2.cityoflondon.gov.uk
165580.169.89.109 - mail3.cityoflondon.gov.uk
165680.169.89.85 - mail4.cityoflondon.gov.uk
165780.169.89.102 - mobile.cityoflondon.gov.uk
165818.203.123.9 - news.cityoflondon.gov.uk
165952.31.6.52 - news.cityoflondon.gov.uk
166052.50.147.113 - news.cityoflondon.gov.uk
1661104.22.14.166 - payment.cityoflondon.gov.uk
1662104.22.15.166 - payment.cityoflondon.gov.uk
1663104.22.15.166 - press.cityoflondon.gov.uk
1664104.22.14.166 - press.cityoflondon.gov.uk
1665104.22.14.166 - production.cityoflondon.gov.uk
1666104.22.15.166 - production.cityoflondon.gov.uk
166752.59.241.213 - remote.cityoflondon.gov.uk
166823.227.38.32 - shop.cityoflondon.gov.uk
166952.113.64.147 - sip.cityoflondon.gov.uk
1670104.22.15.166 - stage.cityoflondon.gov.uk
1671104.22.14.166 - stage.cityoflondon.gov.uk
1672104.22.14.166 - staging.cityoflondon.gov.uk
1673104.22.15.166 - staging.cityoflondon.gov.uk
167486.54.176.2 - vpn.cityoflondon.gov.uk
167580.169.89.102 - www.cityoflondon.gov.uk
167680.169.89.96 - www1.cityoflondon.gov.uk
167780.169.89.98 - www2.cityoflondon.gov.uk
1678################################################################################################################################
1679[INFO] ------TARGET info------
1680[*] TARGET: :https://www.cityoflondon.gov.uk/
1681[*] TARGET IP: 80.169.89.102
1682[INFO] NO load balancer detected for www.cityoflondon.gov.uk...
1683[*] DNS servers: jake.ns.cloudflare.com.
1684 Microsoft-IIS/7.5 COL-VMW-M-LB02
1685[*] CC: GB
1686[*] Country: United Kingdom
1687[*] RegionCode: ENG
1688[*] RegionName: England
1689[*] City: London
1690[*] ASN: AS8220
1691[*] BGP_PREFIX: 80.169.0.0/16
1692[*] ISP: COLT COLT Technology Services Group Limited, GB
1693[INFO] DNS enumeration:
1694[*] jobs.cityoflondon.gov.uk 104.22.14.166 104.22.15.166
1695[*] m.cityoflondon.gov.uk 80.169.89.82
1696[*] mail2.cityoflondon.gov.uk 80.169.89.106
1697[*] mobile.cityoflondon.gov.uk 80.169.89.102
1698[*] news.cityoflondon.gov.uk ssl-client.presspage.com. 18.203.123.9 52.31.6.52 52.50.147.113
1699[*] vpn.cityoflondon.gov.uk 86.54.176.2
1700[*] www2.cityoflondon.gov.uk 80.169.89.98
1701[INFO] Possible abuse mails are:
1702[*] abuse@cityoflondon.gov.uk
1703[*] abuse@colt.net
1704[*] abuse@www.cityoflondon.gov.uk
1705[INFO] NO PAC (Proxy Auto Configuration) file FOUND
1706[INFO] Starting FUZZing in http://www.cityoflondon.gov.uk/FUzZzZzZzZz...
1707[INFO] Status code Folders
1708[ALERT] Look in the source code. It may contain passwords
1709
1710Accès impossible `file://localhost/opt/URLextractor/:https://www.cityoflondon.gov.uk/'
1711Alerte ! : Impossible d’accéder au document.
1712
1713lynx : accès impossible au fichier de départ
1714
1715Recherche 80.169.89.102
1716Connexion HTTP à 80.169.89.102
1717Envoi de la requête HTTP.
1718Requête HTTP envoyée. Attente de réponse.
1719HTTP/1.1 301 Moved Permanently
1720Transfert de données terminé
1721HTTP/1.1 301 Moved Permanently
1722Utilisation de https://80.169.89.102/
1723Recherche 80.169.89.102
1724Connexion HTTPS à 80.169.89.102
1725
1726lynx : accès impossible au fichier de départ http://80.169.89.102/
1727[INFO] Links found from :https://www.cityoflondon.gov.uk/ http://80.169.89.102/:
1728cut: intervalle de champ incorrecte
1729Saisissez « cut --help » pour plus d'informations.
1730[INFO] Shodan detected the following opened ports on 80.169.89.102:
1731[*] 3
1732[*] 4
1733[*] 443
1734[*] 5
1735[*] 6
1736[*] 8
1737[*] 80
1738[INFO] ------VirusTotal SECTION------
1739[INFO] VirusTotal passive DNS only stores address records. The following domains resolved to the given IP address:
1740[INFO] Latest URLs hosted in this IP address detected by at least one URL scanner or malicious URL dataset:
1741[INFO] Latest files that are not detected by any antivirus solution and were downloaded by VirusTotal from the IP address provided:
1742[INFO] ------Alexa Rank SECTION------
1743[INFO] Percent of Visitors Rank in Country:
1744[INFO] Percent of Search Traffic:
1745[INFO] Percent of Unique Visits:
1746[INFO] Total Sites Linking In:
1747[*] Total Sites
1748[INFO] Useful links related to www.cityoflondon.gov.uk - 80.169.89.102:
1749[*] https://www.virustotal.com/pt/ip-address/80.169.89.102/information/
1750[*] https://www.hybrid-analysis.com/search?host=80.169.89.102
1751[*] https://www.shodan.io/host/80.169.89.102
1752[*] https://www.senderbase.org/lookup/?search_string=80.169.89.102
1753[*] https://www.alienvault.com/open-threat-exchange/ip/80.169.89.102
1754[*] http://pastebin.com/search?q=80.169.89.102
1755[*] http://urlquery.net/search.php?q=80.169.89.102
1756[*] http://www.alexa.com/siteinfo/www.cityoflondon.gov.uk
1757[*] http://www.google.com/safebrowsing/diagnostic?site=www.cityoflondon.gov.uk
1758[*] https://censys.io/ipv4/80.169.89.102
1759[*] https://www.abuseipdb.com/check/80.169.89.102
1760[*] https://urlscan.io/search/#80.169.89.102
1761[*] https://github.com/search?q=80.169.89.102&type=Code
1762[INFO] Useful links related to AS8220 - 80.169.0.0/16:
1763[*] http://www.google.com/safebrowsing/diagnostic?site=AS:8220
1764[*] https://www.senderbase.org/lookup/?search_string=80.169.0.0/16
1765[*] http://bgp.he.net/AS8220
1766[*] https://stat.ripe.net/AS8220
1767[INFO] Date: 31/03/20 | Time: 00:22:47
1768[INFO] Total time: 0 minute(s) and 53 second(s)
1769###############################################################################################################################
1770[*] Performing General Enumeration of Domain:cityoflondon.gov.uk
1771[-] DNSSEC is not configured for cityoflondon.gov.uk
1772[*] SOA jake.ns.cloudflare.com 173.245.59.122
1773[*] NS jake.ns.cloudflare.com 173.245.59.122
1774[*] Bind Version for 173.245.59.122 b'20171212'
1775[*] NS jake.ns.cloudflare.com 2606:4700:58::adf5:3b7a
1776[*] Bind Version for 2606:4700:58::adf5:3b7a b'20171212'
1777[*] NS treasure.ns.cloudflare.com 162.159.38.116
1778[*] Bind Version for 162.159.38.116 b'20171212'
1779[*] NS treasure.ns.cloudflare.com 2606:4700:50::a29f:2674
1780[*] Bind Version for 2606:4700:50::a29f:2674 b'20171212'
1781[*] MX cityoflondon-gov-uk.mail.protection.outlook.com 104.47.21.36
1782[*] MX cityoflondon-gov-uk.mail.protection.outlook.com 104.47.20.36
1783[*] A cityoflondon.gov.uk 80.169.89.102
1784[*] Enumerating SRV Records
1785[*] SRV _sip._tls.cityoflondon.gov.uk sipdir.online.lync.com 52.113.64.147 443 1
1786[*] SRV _sip._tls.cityoflondon.gov.uk sipdir.online.lync.com 2603:1047:0:2::b 443 1
1787[*] SRV _sip._tls.cityoflondon.gov.uk sipdir.online.lync.com 2603:1047:0:1::b 443 1
1788[*] SRV _sip._tls.cityoflondon.gov.uk sipdir.online.lync.com 2603:1047:0:5::b 443 1
1789[*] SRV _sip._tls.cityoflondon.gov.uk sipdir.online.lync.com 2603:1047:0:8::f 443 1
1790[*] SRV _sip._tls.cityoflondon.gov.uk sipdir.online.lync.com 2603:1047:0:9::f 443 1
1791[*] SRV _sipfederationtls._tcp.cityoflondon.gov.uk sipfed.online.lync.com 52.113.64.147 5061 1
1792[*] SRV _sipfederationtls._tcp.cityoflondon.gov.uk sipfed.online.lync.com 2603:1047:0:2::b 5061 1
1793[*] SRV _autodiscover._tcp.cityoflondon.gov.uk autodiscover.outlook.com 40.101.83.24 443 1
1794[*] SRV _autodiscover._tcp.cityoflondon.gov.uk autodiscover.outlook.com 40.101.12.72 443 1
1795[*] SRV _autodiscover._tcp.cityoflondon.gov.uk autodiscover.outlook.com 40.101.12.40 443 1
1796[*] SRV _autodiscover._tcp.cityoflondon.gov.uk autodiscover.outlook.com 40.101.80.200 443 1
1797[*] SRV _autodiscover._tcp.cityoflondon.gov.uk autodiscover.outlook.com 52.97.158.168 443 1
1798[*] SRV _autodiscover._tcp.cityoflondon.gov.uk autodiscover.outlook.com 40.101.121.8 443 1
1799[*] SRV _autodiscover._tcp.cityoflondon.gov.uk autodiscover.outlook.com 40.101.81.152 443 1
1800[*] SRV _autodiscover._tcp.cityoflondon.gov.uk autodiscover.outlook.com 40.101.18.232 443 1
1801[*] SRV _autodiscover._tcp.cityoflondon.gov.uk autodiscover.outlook.com 2603:1026:206:7::8 443 1
1802[*] SRV _autodiscover._tcp.cityoflondon.gov.uk autodiscover.outlook.com 2603:1026:200:8b::8 443 1
1803[*] SRV _autodiscover._tcp.cityoflondon.gov.uk autodiscover.outlook.com 2603:1026:207:15::8 443 1
1804[*] SRV _autodiscover._tcp.cityoflondon.gov.uk autodiscover.outlook.com 2603:1026:206:5::8 443 1
1805[+] 20 Records Found
1806################################################################################################################################
1807[+] Starting At 2020-03-31 00:23:55.291308
1808[+] Collecting Information On: https://www.cityoflondon.gov.uk/
1809[#] Status: 200
1810--------------------------------------------------
1811[#] Web Server Detected: Microsoft-IIS/7.5
1812[#] X-Powered-By: ASP.NET
1813[!] X-Frame-Options Headers not detect! target might be vulnerable Click Jacking
1814- Cache-Control: private
1815- Content-Type: text/html; charset=utf-8
1816- Content-Encoding: gzip
1817- Expires: Tue, 31 Mar 2020 04:33:37 GMT
1818- Vary: Accept-Encoding
1819- Server: Microsoft-IIS/7.5
1820- SPRequestGuid: 7887bf2b-311d-406b-ae80-eed1367d4e26
1821- X-SharePointHealthScore: 0
1822- X-AspNet-Version: 2.0.50727
1823- X-Powered-By: ASP.NET
1824- MicrosoftSharePointTeamServices: 14.0.0.7239
1825- X-MS-InvokeApp: 1; RequireReadOnly
1826- Date: Tue, 31 Mar 2020 04:27:40 GMT
1827- Content-Length: 8648
1828--------------------------------------------------
1829[#] Finding Location..!
1830[#] status: success
1831[#] country: United Kingdom
1832[#] countryCode: GB
1833[#] region: ENG
1834[#] regionName: England
1835[#] city: London
1836[#] zip: EC2V
1837[#] lat: 51.5132
1838[#] lon: -0.0961
1839[#] timezone: Europe/London
1840[#] isp: COLT Technology Services Group Limited
1841[#] org: Agilisys LTD
1842[#] as: AS8220 COLT Technology Services Group Limited
1843[#] query: 80.169.89.102
1844--------------------------------------------------
1845[+] Detected WAF Presence in web application: ASP.NET Generic Web Application Protection
1846--------------------------------------------------
1847[#] Starting Reverse DNS
1848[-] Failed ! Fail
1849--------------------------------------------------
1850[!] Scanning Open Port
1851[#] 4/tcp open unknown
1852[#] 30/tcp open unknown
1853[#] 80/tcp open http
1854[#] 443/tcp open https
1855[#] 481/tcp open dvs
1856[#] 524/tcp open ncp
1857[#] 543/tcp open klogin
1858[#] 667/tcp open disclose
1859[#] 1038/tcp open mtqp
1860[#] 1039/tcp open sbl
1861[#] 1061/tcp open kiosk
1862[#] 1062/tcp open veracity
1863[#] 1074/tcp open warmspotMgmt
1864[#] 1104/tcp open xrl
1865[#] 1132/tcp open kvm-via-ip
1866[#] 1533/tcp open virtual-places
1867[#] 2034/tcp open scoremgr
1868[#] 3300/tcp open ceph
1869[#] 4445/tcp open upnotifyp
1870[#] 5998/tcp open ncd-diag
1871[#] 6565/tcp open unknown
1872[#] 8099/tcp open unknown
1873[#] 8193/tcp open sophos
1874[#] 20221/tcp open unknown
1875[#] 44443/tcp open coldfusion-auth
1876[#] 55600/tcp open unknown
1877--------------------------------------------------
1878[+] Getting SSL Info
1879{'OCSP': ('http://ocsp.entrust.net',),
1880 'caIssuers': ('http://aia.entrust.net/l1k-chain256.cer',),
1881 'crlDistributionPoints': ('http://crl.entrust.net/level1k.crl',),
1882 'issuer': ((('countryName', 'US'),),
1883 (('organizationName', 'Entrust, Inc.'),),
1884 (('organizationalUnitName', 'See www.entrust.net/legal-terms'),),
1885 (('organizationalUnitName',
1886 '(c) 2012 Entrust, Inc. - for authorized use only'),),
1887 (('commonName', 'Entrust Certification Authority - L1K'),)),
1888 'notAfter': 'Jan 9 10:45:03 2021 GMT',
1889 'notBefore': 'Jan 9 10:15:04 2019 GMT',
1890 'serialNumber': '200B2115536F6E220000000050EBEF6B',
1891 'subject': ((('countryName', 'GB'),),
1892 (('localityName', 'London'),),
1893 (('organizationName', 'City of London Corporation'),),
1894 (('commonName', '*.cityoflondon.gov.uk'),)),
1895 'subjectAltName': (('DNS', '*.cityoflondon.gov.uk'),
1896 ('DNS', 'cityoflondon.gov.uk')),
1897 'version': 3}
1898-----BEGIN CERTIFICATE-----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1938-----END CERTIFICATE-----
1939
1940--------------------------------------------------
1941[+] Collecting Information Disclosure!
1942[#] Detecting sitemap.xml file
1943[!] sitemap.xml File Found: https://www.cityoflondon.gov.uk//sitemap.xml
1944[#] Detecting robots.txt file
1945[-] robots.txt file not Found!?
1946[#] Detecting GNU Mailman
1947[-] GNU Mailman App Not Detected!?
1948--------------------------------------------------
1949[+] Crawling Url Parameter On: https://www.cityoflondon.gov.uk/Pages/default.aspx
1950--------------------------------------------------
1951[#] Searching Html Form !
1952[+] Html Form Discovered
1953[#] action: default.aspx
1954[#] class: None
1955[#] id: aspnetForm
1956[#] method: post
1957--------------------------------------------------
1958[!] Found 4 dom parameter
1959[#] https://www.cityoflondon.gov.uk//#maincontent
1960[#] https://www.cityoflondon.gov.uk///about-our-website/Pages/legal-notices.aspx#socialmedia
1961[#] https://www.cityoflondon.gov.uk//#PAGETOP
1962[#] https://www.cityoflondon.gov.uk//#
1963--------------------------------------------------
1964[!] 3 Internal Dynamic Parameter Discovered
1965[+] https://www.cityoflondon.gov.uk///_layouts/CityOfLondon.SharePoint/css/screen.css?v=20171016
1966[+] http://email.cityoflondon.gov.uk/linkapp/cmasubs.aspx?LinkID=pageid986790jkkzhq%40f%40f%40n9qh%40z%40f%40n9qh%40f%40f
1967[+] http://email.cityoflondon.gov.uk/linkapp/cmasubs.aspx?LinkID=pageid986790jkkzhq@f@f@n9qh@z@f@n9qh@f@f
1968--------------------------------------------------
1969[-] No external Dynamic Paramter Found!?
1970--------------------------------------------------
1971[!] 49 Internal links Discovered
1972[+] https://www.cityoflondon.gov.uk///_layouts/CityOfLondon.SharePoint/css/print.css
1973[+] https://www.cityoflondon.gov.uk///_layouts/CityOfLondon.SharePoint/images/favicon.ico
1974[+] https://www.cityoflondon.gov.uk///_layouts/CityOfLondon.SharePoint/css/fixes-ie8.css
1975[+] https://www.cityoflondon.gov.uk///Pages/default.aspx
1976[+] https://www.cityoflondon.gov.uk///report-pay-apply/Pages/report-pay-apply.aspx
1977[+] https://www.cityoflondon.gov.uk///search/Pages/a-to-z.aspx
1978[+] https://www.cityoflondon.gov.uk///_layouts/col/shop.aspx
1979[+] https://www.cityoflondon.gov.uk///events/Pages/default.aspx
1980[+] https://careers.cityoflondon.gov.uk/
1981[+] http://news.cityoflondon.gov.uk/
1982[+] https://www.cityoflondon.gov.uk///contact-us/Pages/default.aspx
1983[+] https://www.cityoflondon.gov.uk///about-the-city/Pages/default.aspx
1984[+] https://www.cityoflondon.gov.uk///services/Pages/default.aspx
1985[+] https://www.cityoflondon.gov.uk///business/Pages/default.aspx
1986[+] https://www.cityoflondon.gov.uk///things-to-do/Pages/default.aspx
1987[+] https://www.cityoflondon.gov.uk///services/health-and-wellbeing/Pages/covid-19.aspx
1988[+] https://www.cityoflondon.gov.uk///business/support-promotion-and-advice/Pages/covid-19-advice-for-businesses.aspx
1989[+] https://www.cityoflondon.gov.uk///services/health-and-wellbeing/Pages/covid-19.aspx
1990[+] https://www.cityoflondon.gov.uk///business/support-promotion-and-advice/Pages/covid-19-advice-for-businesses.aspx
1991[+] https://www.cityoflondon.gov.uk///services/health-and-wellbeing/Pages/covid-19.aspx
1992[+] https://www.cityoflondon.gov.uk///business/support-promotion-and-advice/Pages/support-relief-efforts-COVID-19.aspx
1993[+] https://news.cityoflondon.gov.uk/square-mile-businesses-offered-additional-rental-relief/
1994[+] https://news.cityoflondon.gov.uk/covid19-city-corporation-encourages-people-to-follow-new-government-instructions-on-parks/
1995[+] https://www.cityoflondon.gov.uk///services/transport-and-streets/parking/Pages/covid-19-parking-and-driving-in-the-city.aspx
1996[+] https://www.cityoflondon.gov.uk///business/business-rates/Pages/default.aspx
1997[+] https://www.cityoflondon.gov.uk///maps/Pages/geocortex-redirect.aspx
1998[+] https://www.cityoflondon.gov.uk///services/transport-and-streets/roads-highways-and-pavements/Pages/current-road-closures-works-and-events.aspx
1999[+] https://www.cityoflondon.gov.uk///events/Pages/default.aspx
2000[+] https://www.cityoflondon.gov.uk///about-the-city/about-us/Pages/default.aspx
2001[+] https://www.cityoflondon.gov.uk///about-the-city/voting-elections/Pages/default.aspx
2002[+] https://www.cityoflondon.gov.uk///business/Pages/default.aspx
2003[+] https://www.cityoflondon.gov.uk///things-to-do/visit-the-city/whats-on/Pages/default.aspx
2004[+] https://www.cityoflondon.gov.uk///services/transport-and-streets/roads-highways-and-pavements/Pages/current-road-closures-works-and-events.aspx
2005[+] https://www.cityoflondon.gov.uk///things-to-do/green-spaces/Pages/default.aspx
2006[+] https://www.cityoflondon.gov.uk///about-the-city/about-us/Pages/how-to-find-us.aspx
2007[+] https://www.cityoflondon.gov.uk///Pages/default.aspx
2008[+] https://www.cityoflondon.gov.uk///about-our-website/Pages/mobile.aspx
2009[+] https://www.cityoflondon.gov.uk///report-pay-apply/Pages/report-pay-apply.aspx
2010[+] https://www.cityoflondon.gov.uk///maps/Pages/interactive-maps.aspx
2011[+] https://www.cityoflondon.gov.uk///contact-us/Pages/default.aspx
2012[+] https://www.cityoflondon.gov.uk///about-our-website/Pages/social-media.aspx
2013[+] https://www.cityoflondon.gov.uk///contact-us/Pages/default.aspx
2014[+] https://www.cityoflondon.gov.uk///about-our-website/Pages/accessibility.aspx
2015[+] https://www.cityoflondon.gov.uk///about-our-website/Pages/legal-notices.aspx
2016[+] https://www.cityoflondon.gov.uk///about-our-website/Pages/privacy-notice.aspx
2017[+] https://www.cityoflondon.gov.uk///about-our-website/Pages/Cookies.aspx
2018[+] https://www.cityoflondon.gov.uk///about-our-website/sitemap.aspx
2019[+] https://www.cityoflondon.gov.uk///business/tenders-and-procurement/pages/responsible-procurement.aspx
2020[+] https://www.cityoflondon.gov.uk///about-our-website/Pages/cookies.aspx
2021--------------------------------------------------
2022[!] 3 External links Discovered
2023[#] https://www.facebook.com/CityofLondonCorp
2024[#] https://twitter.com/cityoflondon
2025[#] https://www.youtube.com/user/CityofLondonvideos/videos
2026--------------------------------------------------
2027[#] Mapping Subdomain..
2028[-] No Any Subdomain Found
2029[!] Found 0 Subdomain
2030--------------------------------------------------
2031[!] Done At 2020-03-31 00:24:19.295106
2032#################################################################################################################################
2033traceroute to cityoflondon.gov.uk (80.169.89.102), 30 hops max, 60 byte packets
2034 1 _gateway (10.203.9.1) 102.583 ms 102.590 ms 102.577 ms
2035 2 45.131.5.2 (45.131.5.2) 102.572 ms 102.568 ms 102.580 ms
2036 3 109.236.95.224 (109.236.95.224) 102.555 ms 109.236.95.226 (109.236.95.226) 102.550 ms 109.236.95.230 (109.236.95.230) 102.546 ms
2037 4 109.236.95.173 (109.236.95.173) 103.218 ms 103.212 ms 109.236.95.108 (109.236.95.108) 103.404 ms
2038 5 et-0-0-1-pr2.AMS.router.colt.net (80.249.208.236) 103.829 ms 103.810 ms 104.188 ms
2039 6 xe4-2-1-sar18.LON.router.colt.net (212.74.73.181) 113.402 ms 212.74.75.37 (212.74.75.37) 113.012 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181) 113.525 ms
2040 7 xe0-3-0-sar18.LON.router.colt.net (212.74.68.145) 111.945 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181) 116.700 ms 212.74.75.37 (212.74.75.37) 116.378 ms
2041 8 cpeuk_lon002520.ia.colt.net (80.169.196.38) 116.354 ms 116.319 ms 116.320 ms
2042 9 195.110.81.4 (195.110.81.4) 116.614 ms 112.411 ms 112.165 ms
204310 * * *
2044################################################################################################################################
2045Domains still to check: 1
2046 Checking if the hostname cityoflondon.gov.uk. given is in fact a domain...
2047
2048Analyzing domain: cityoflondon.gov.uk.
2049 Checking NameServers using system default resolver...
2050 IP: 173.245.59.122 (United States)
2051 HostName: jake.ns.cloudflare.com Type: NS
2052 HostName: jake.ns.cloudflare.com Type: PTR
2053 IP: 162.159.38.116 (None)
2054 HostName: treasure.ns.cloudflare.com Type: NS
2055 HostName: treasure.ns.cloudflare.com Type: PTR
2056
2057 Checking MailServers using system default resolver...
2058 IP: 104.47.20.36 (United Kingdom)
2059 HostName: cityoflondon-gov-uk.mail.protection.outlook.com Type: MX
2060 HostName: mail-cwlgbr010036.inbound.protection.outlook.com Type: PTR
2061 IP: 104.47.21.36 (United Kingdom)
2062 HostName: cityoflondon-gov-uk.mail.protection.outlook.com Type: MX
2063 HostName: mail-lo2gbr010036.inbound.protection.outlook.com Type: PTR
2064
2065 Checking the zone transfer for each NS... (if this takes more than 10 seconds, just hit CTRL-C and it will continue. Bug in the libs)
2066 No zone transfer found on nameserver 173.245.59.122
2067 No zone transfer found on nameserver 162.159.38.116
2068
2069 Checking SPF record...
2070 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 23.227.38.64/32, but only the network IP
2071 New IP found: 23.227.38.64
2072
2073 Checking SPF record...
2074 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 212.50.171.0/25, but only the network IP
2075 New IP found: 212.50.171.0
2076 New IP found: 80.169.89.106
2077 New IP found: 80.169.89.109
2078 New IP found: 80.169.89.85
2079 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 205.201.128.0/20, but only the network IP
2080 New IP found: 205.201.128.0
2081 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 198.2.128.0/18, but only the network IP
2082 New IP found: 198.2.128.0
2083 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 148.105.0.0/16, but only the network IP
2084 New IP found: 148.105.0.0
2085 New IP found: 132.174.100.127
2086 New IP found: 89.145.127.252
2087 New IP found: 84.45.34.163
2088
2089 Checking SPF record...
2090 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 40.92.0.0/15, but only the network IP
2091 New IP found: 40.92.0.0
2092 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 40.107.0.0/16, but only the network IP
2093 New IP found: 40.107.0.0
2094 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 52.100.0.0/14, but only the network IP
2095 New IP found: 52.100.0.0
2096 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 104.47.0.0/17, but only the network IP
2097 New IP found: 104.47.0.0
2098 There are no IPv4 addresses in the SPF. Maybe IPv6.
2099 There are no IPv4 addresses in the SPF. Maybe IPv6.
2100
2101 Checking SPF record...
2102 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 85.115.32.0/19, but only the network IP
2103 New IP found: 85.115.32.0
2104 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 86.111.216.0/21, but only the network IP
2105 New IP found: 86.111.216.0
2106 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 116.50.56.0/21, but only the network IP
2107 New IP found: 116.50.56.0
2108 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 208.87.232.0/21, but only the network IP
2109 New IP found: 208.87.232.0
2110 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 196.216.238.0/23, but only the network IP
2111 New IP found: 196.216.238.0
2112 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 192.151.176.0/20, but only the network IP
2113 New IP found: 192.151.176.0
2114
2115 Checking SPF record...
2116 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 205.201.128.0/20, but only the network IP
2117 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 198.2.128.0/18, but only the network IP
2118 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 148.105.8.0/21, but only the network IP
2119 New IP found: 148.105.8.0
2120
2121 Checking SPF record...
2122
2123 Checking SPF record...
2124 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 135.84.216.0/22, but only the network IP
2125 New IP found: 135.84.216.0
2126 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 66.240.227.0/24, but only the network IP
2127 New IP found: 66.240.227.0
2128 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 63.143.59.128/25, but only the network IP
2129 New IP found: 63.143.59.128
2130 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 63.143.57.128/25, but only the network IP
2131 New IP found: 63.143.57.128
2132 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 216.98.158.0/24, but only the network IP
2133 New IP found: 216.98.158.0
2134 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 74.63.212.0/24, but only the network IP
2135 New IP found: 74.63.212.0
2136 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 52.200.59.0/24, but only the network IP
2137 New IP found: 52.200.59.0
2138 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 34.245.210.0/24, but only the network IP
2139 New IP found: 34.245.210.0
2140
2141 Checking SPF record...
2142 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 34.245.210.0/24, but only the network IP
2143
2144 Checking 192 most common hostnames using system default resolver...
2145 IP: 80.169.89.102 (United Kingdom)
2146 HostName: www.cityoflondon.gov.uk. Type: A
2147 IP: 80.169.89.96 (United Kingdom)
2148 HostName: www1.cityoflondon.gov.uk. Type: A
2149 IP: 80.169.89.98 (United Kingdom)
2150 HostName: www2.cityoflondon.gov.uk. Type: A
2151
2152 Checking with nmap the reverse DNS hostnames of every <ip>/24 netblock using system default resolver...
2153 Checking netblock 52.100.0.0
2154 Checking netblock 52.200.59.0
2155 Checking netblock 148.105.0.0
2156 Checking netblock 162.159.38.0
2157 Checking netblock 74.63.212.0
2158 Checking netblock 148.105.8.0
2159 Checking netblock 205.201.128.0
2160 Checking netblock 80.169.89.0
2161 Checking netblock 66.240.227.0
2162 Checking netblock 86.111.216.0
2163 Checking netblock 198.2.128.0
2164 Checking netblock 34.245.210.0
2165 Checking netblock 63.143.59.0
2166 Checking netblock 85.115.32.0
2167 Checking netblock 89.145.127.0
2168 Checking netblock 63.143.57.0
2169 Checking netblock 104.47.21.0
2170 Checking netblock 192.151.176.0
2171 Checking netblock 84.45.34.0
2172 Checking netblock 212.50.171.0
2173 Checking netblock 135.84.216.0
2174 Checking netblock 40.107.0.0
2175 Checking netblock 173.245.59.0
2176 Checking netblock 40.92.0.0
2177 Checking netblock 196.216.238.0
2178 Checking netblock 116.50.56.0
2179 Checking netblock 208.87.232.0
2180 Checking netblock 104.47.0.0
2181 Checking netblock 132.174.100.0
2182 Checking netblock 216.98.158.0
2183 Checking netblock 23.227.38.0
2184 Checking netblock 104.47.20.0
2185
2186 Searching for cityoflondon.gov.uk. emails in Google
2187 thecitycentre@cityoflondon.gov.uk.
2188 Susan.Pearson@cityoflondon.gov.uk&
2189 Wootton@cityoflondon.gov.uk&
2190 kevin.mulcahy@cityoflondon.gov.uk
2191 bankarea@cityoflondon.gov.uk]
2192 artizanlib@cityoflondon.gov.uk.
2193 LADO@cityoflondon.gov.uk
2194 vicki.wells@cityoflondon.gov.uk.
2195 citybridgetrust@cityoflondon.gov.uk
2196 pro@cityoflondon.gov.uk�
2197 roger.gifford@cityoflondon.gov.uk.
2198 kevin.mulcahy@cityoflondon.gov.uk�
2199 Sukhjit.Gill@cityoflondon.gov.uk.
2200 zoe.nation@cityoflondon.gov.uk
2201 Sukhjit.Gill@cityoflondon.gov.uk
2202 zoe.nation@cityoflondon.gov.uk�
2203 joanna.burnaby-atkins@cityoflondon.gov.uk. - Is this real?
2204 Vicki.Wells@cityoflondon.gov.uk]
2205 michael.bennett@cityoflondon.gov.uk:
2206 citybridgetrust@cityoflondon.gov.uk.
2207 barbicanlib@cityoflondon.gov.uk.
2208
2209 Checking 37 active hosts using nmap... (nmap -sn -n -v -PP -PM -PS80,25 -PA -PY -PU53,40125 -PE --reason <ip> -oA <output_directory>/nmap/<ip>.sn)
2210 Host 52.100.0.0 is down
2211 Host 52.200.59.0 is down
2212 Host 148.105.0.0 is down
2213 Host 162.159.38.116 is up (echo-reply ttl 59)
2214 Host 74.63.212.0 is down
2215 Host 148.105.8.0 is down
2216 Host 205.201.128.0 is up (syn-ack ttl 58)
2217 Host 80.169.89.98 is up (syn-ack ttl 117)
2218 Host 66.240.227.0 is down
2219 Host 86.111.216.0 is down
2220 Host 198.2.128.0 is up (reset ttl 58)
2221 Host 34.245.210.0 is down
2222 Host 63.143.59.128 is down
2223 Host 85.115.32.0 is down
2224 Host 80.169.89.85 is down
2225 Host 89.145.127.252 is up (echo-reply ttl 56)
2226 Host 63.143.57.128 is down
2227 Host 104.47.21.36 is up (syn-ack ttl 115)
2228 Host 192.151.176.0 is down
2229 Host 84.45.34.163 is up (echo-reply ttl 56)
2230 Host 212.50.171.0 is up (abort ttl 244)
2231 Host 135.84.216.0 is down
2232 Host 40.107.0.0 is down
2233 Host 173.245.59.122 is up (echo-reply ttl 59)
2234 Host 40.92.0.0 is down
2235 Host 196.216.238.0 is down
2236 Host 80.169.89.109 is down
2237 Host 116.50.56.0 is down
2238 Host 208.87.232.0 is down
2239 Host 80.169.89.102 is up (syn-ack ttl 53)
2240 Host 80.169.89.106 is up (syn-ack ttl 117)
2241 Host 104.47.0.0 is down
2242 Host 132.174.100.127 is down
2243 Host 216.98.158.0 is down
2244 Host 23.227.38.64 is up (echo-reply ttl 59)
2245 Host 80.169.89.96 is down
2246 Host 104.47.20.36 is up (syn-ack ttl 112)
2247
2248 Checking ports on every active host using nmap... (nmap -O --reason --webxml --traceroute -sS -sV -sC -Pn -n -v -F <ip> -oA <output_directory>/nmap/<ip>)
2249 Scanning ip 162.159.38.116 (treasure.ns.cloudflare.com (PTR)):
2250 53/tcp open domain syn-ack ttl 59 (unknown banner: 20171212)
2251 | dns-nsid:
2252 | NSID: 20m391 (32306d333931)
2253 | id.server: AMS
2254 |_ bind.version: 20171212
2255 | fingerprint-strings:
2256 | DNSVersionBindReqTCP:
2257 | version
2258 | bind
2259 |_ 20171212
2260 Scanning ip 205.201.128.0 ():
2261 25/tcp open smtp syn-ack ttl 58 Postfix smtpd
2262 |_smtp-commands: pmta45.mailchimp.prod.atl01.rsglab.com, PIPELINING, SIZE 10240000, ENHANCEDSTATUSCODES, 8BITMIME, SMTPUTF8,
2263 80/tcp open http syn-ack ttl 58 nginx 1.8.1
2264 | http-methods:
2265 |_ Supported Methods: GET HEAD POST OPTIONS
2266 |_http-server-header: nginx/1.8.1
2267 |_http-title: Did not follow redirect to https://mailchimp.com/about/mcsv-static
2268 OS Info: Service Info: Host: pmta45.mailchimp.prod.atl01.rsglab.com
2269 Scanning ip 80.169.89.98 (www2.cityoflondon.gov.uk.):
2270 80/tcp open http syn-ack ttl 117 Microsoft IIS httpd 10.0
2271 | http-methods:
2272 | Supported Methods: OPTIONS TRACE GET HEAD POST
2273 |_ Potentially risky methods: TRACE
2274 |_http-server-header: Microsoft-IIS/10.0
2275 |_http-title: IIS Windows Server
2276 443/tcp open ssl/http syn-ack ttl 117 Microsoft IIS httpd 10.0
2277 | http-methods:
2278 | Supported Methods: OPTIONS TRACE GET HEAD POST
2279 |_ Potentially risky methods: TRACE
2280 |_http-server-header: Microsoft-IIS/10.0
2281 |_http-title: IIS Windows Server
2282 | ssl-cert: Subject: commonName=WMSvc-SHA2-COL-VMW-P-LIM01
2283 | Issuer: commonName=WMSvc-SHA2-COL-VMW-P-LIM01
2284 | Public Key type: rsa
2285 | Public Key bits: 2048
2286 | Signature Algorithm: sha256WithRSAEncryption
2287 | Not valid before: 2020-01-09T15:25:04
2288 | Not valid after: 2030-01-06T15:25:04
2289 | MD5: b2e4 3b70 c10c ffc8 c699 3005 94ab 1fe1
2290 |_SHA-1: 8b35 9e30 d522 59a4 b205 a607 4cfa 5a0e df4f dc13
2291 |_ssl-date: 2020-03-31T04:40:55+00:00; +3m45s from scanner time.
2292 | tls-alpn:
2293 | h2
2294 |_ http/1.1
2295 OS Info: Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
2296 |_clock-skew: 3m44s
2297 Scanning ip 198.2.128.0 ():
2298 80/tcp open http syn-ack ttl 58 nginx 1.6.1
2299 |_http-server-header: nginx/1.6.1
2300 |_http-title: 403 Forbidden
2301 Device type: general purpose|storage-misc|broadband router|router|WAP
2302 Running (JUST GUESSING): Linux 2.6.X|3.X (93%), HP embedded (90%), MikroTik RouterOS 6.X (89%), Ubiquiti AirOS 5.X (89%), Ubiquiti embedded (87%), Ruckus embedded (87%), AVM FritzOS 6.X (87%)
2303 Scanning ip 89.145.127.252 ():
2304 Scanning ip 104.47.21.36 (mail-lo2gbr010036.inbound.protection.outlook.com (PTR)):
2305 25/tcp open smtp syn-ack ttl 115 Microsoft Exchange smtpd
2306 | smtp-commands: LO2GBR01FT005.mail.protection.outlook.com Hello [45.131.5.15], SIZE 157286400, PIPELINING, DSN, ENHANCEDSTATUSCODES, STARTTLS, 8BITMIME, BINARYMIME, CHUNKING, SMTPUTF8,
2307 |_ This server supports the following commands: HELO EHLO STARTTLS RCPT DATA RSET MAIL QUIT HELP AUTH BDAT
2308 | ssl-cert: Subject: commonName=mail.protection.outlook.com/organizationName=Microsoft Corporation/stateOrProvinceName=Washington/countryName=US
2309 | Subject Alternative Name: DNS:mail.protection.outlook.com, DNS:*.mail.eo.outlook.com, DNS:*.mail.protection.outlook.com, DNS:mail.messaging.microsoft.com, DNS:outlook.com, DNS:*.olc.protection.outlook.com, DNS:*.pamx1.hotmail.com
2310 | Issuer: commonName=GlobalSign Organization Validation CA - SHA256 - G3/organizationName=GlobalSign nv-sa/countryName=BE
2311 | Public Key type: rsa
2312 | Public Key bits: 2048
2313 | Signature Algorithm: sha256WithRSAEncryption
2314 | Not valid before: 2020-02-24T18:33:10
2315 | Not valid after: 2022-02-24T18:33:10
2316 | MD5: 4f90 9eee 29eb abe5 e29a d55e 8c08 c310
2317 |_SHA-1: ea85 9504 40a6 97c1 8482 3304 a7dc 19e5 fcd5 8e6b
2318 |_ssl-date: 2020-03-31T04:38:16+00:00; -1s from scanner time.
2319 OS Info: Service Info: Host: LO2GBR01FT012.mail.protection.outlook.com; OS: Windows; CPE: cpe:/o:microsoft:windows
2320 |_clock-skew: -1s
2321 Scanning ip 84.45.34.163 ():
2322 Scanning ip 212.50.171.0 ():
2323 Scanning ip 173.245.59.122 (jake.ns.cloudflare.com (PTR)):
2324 53/tcp open domain syn-ack ttl 59 (unknown banner: 20171212)
2325 | dns-nsid:
2326 | NSID: 20m226 (32306d323236)
2327 | id.server: AMS
2328 |_ bind.version: 20171212
2329 | fingerprint-strings:
2330 | DNSVersionBindReqTCP:
2331 | version
2332 | bind
2333 |_ 20171212
2334 Scanning ip 80.169.89.102 (www.cityoflondon.gov.uk.):
2335 80/tcp open http syn-ack ttl 53 COL-VMW-M-LB02
2336 | fingerprint-strings:
2337 | FourOhFourRequest:
2338 | HTTP/1.1 301 Moved Permanently
2339 | Location: https:///nice%20ports%2C/Tri%6Eity.txt%2ebak
2340 | Server: COL-VMW-M-LB02
2341 | Cache-Control: no-cache
2342 | Connection: close
2343 | GenericLines:
2344 | HTTP/1.1 301 Moved Permanently
2345 | Location: https://
2346 | Server: COL-VMW-M-LB02
2347 | Cache-Control: no-cache
2348 | Connection: close
2349 | GetRequest, HTTPOptions, RTSPRequest:
2350 | HTTP/1.1 301 Moved Permanently
2351 | Location: https:///
2352 | Server: COL-VMW-M-LB02
2353 | Cache-Control: no-cache
2354 | Connection: close
2355 | SIPOptions:
2356 | HTTP/1.1 301 Moved Permanently
2357 | Location: https://sip:nm
2358 | Server: COL-VMW-M-LB02
2359 | Cache-Control: no-cache
2360 |_ Connection: close
2361 | http-methods:
2362 |_ Supported Methods: GET HEAD POST OPTIONS
2363 |_http-server-header: COL-VMW-M-LB02
2364 |_http-title: Did not follow redirect to https://80.169.89.102/
2365 |_https-redirect: ERROR: Script execution failed (use -d to debug)
2366 443/tcp open ssl/http syn-ack ttl 53 Microsoft IIS httpd 7.5
2367 | http-methods:
2368 |_ Supported Methods: GET HEAD POST OPTIONS
2369 |_http-server-header: Microsoft-IIS/7.5
2370 | http-title: Welcome to the City of London Corporation
2371 |_Requested resource was https://80.169.89.102/Pages/default.aspx
2372 | ssl-cert: Subject: commonName=*.cityoflondon.gov.uk/organizationName=City of London Corporation/countryName=GB
2373 | Subject Alternative Name: DNS:*.cityoflondon.gov.uk, DNS:cityoflondon.gov.uk
2374 | Issuer: commonName=Entrust Certification Authority - L1K/organizationName=Entrust, Inc./countryName=US
2375 | Public Key type: rsa
2376 | Public Key bits: 2048
2377 | Signature Algorithm: sha256WithRSAEncryption
2378 | Not valid before: 2019-01-09T10:15:04
2379 | Not valid after: 2021-01-09T10:45:03
2380 | MD5: 4f24 791b 0cf7 72b6 48e0 faac 5dd4 3c66
2381 |_SHA-1: 414c 9a2c e74f b30a 5c45 a40d 2288 a043 93d7 4d99
2382 |_ssl-date: TLS randomness does not represent time
2383 OS Info: Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
2384 Scanning ip 80.169.89.106 ():
2385 80/tcp open http syn-ack ttl 117 Microsoft IIS httpd 8.5
2386 | http-methods:
2387 | Supported Methods: OPTIONS TRACE GET HEAD POST
2388 |_ Potentially risky methods: TRACE
2389 |_http-server-header: Microsoft-IIS/8.5
2390 |_http-title: 403 - Forbidden: Access is denied.
2391 443/tcp open ssl/https? syn-ack ttl 117
2392 |_ssl-date: 2020-03-31T04:47:53+00:00; +3m45s from scanner time.
2393 OS Info: Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
2394 |_clock-skew: 3m44s
2395 Scanning ip 23.227.38.64 ():
2396 80/tcp open http syn-ack ttl 59 cloudflare
2397 | fingerprint-strings:
2398 | FourOhFourRequest:
2399 | HTTP/1.1 400 Bad Request
2400 | Date: Tue, 31 Mar 2020 04:45:17 GMT
2401 | Content-Type: text/html
2402 | Content-Length: 155
2403 | Connection: close
2404 | Server: cloudflare
2405 | CF-RAY: 57c76b857cf3faa0-AMS
2406 | <html>
2407 | <head><title>400 Bad Request</title></head>
2408 | <body>
2409 | <center><h1>400 Bad Request</h1></center>
2410 | <hr><center>cloudflare</center>
2411 | </body>
2412 | </html>
2413 | GetRequest:
2414 | HTTP/1.1 400 Bad Request
2415 | Date: Tue, 31 Mar 2020 04:45:16 GMT
2416 | Content-Type: text/html
2417 | Content-Length: 155
2418 | Connection: close
2419 | Server: cloudflare
2420 | CF-RAY: 57c76b800fb19ccf-AMS
2421 | <html>
2422 | <head><title>400 Bad Request</title></head>
2423 | <body>
2424 | <center><h1>400 Bad Request</h1></center>
2425 | <hr><center>cloudflare</center>
2426 | </body>
2427 | </html>
2428 | HTTPOptions:
2429 | HTTP/1.1 400 Bad Request
2430 | Date: Tue, 31 Mar 2020 04:45:16 GMT
2431 | Content-Type: text/html
2432 | Content-Length: 155
2433 | Connection: close
2434 | Server: cloudflare
2435 | CF-RAY: 57c76b81791dd8c9-AMS
2436 | <html>
2437 | <head><title>400 Bad Request</title></head>
2438 | <body>
2439 | <center><h1>400 Bad Request</h1></center>
2440 | <hr><center>cloudflare</center>
2441 | </body>
2442 | </html>
2443 | RPCCheck:
2444 | HTTP/1.1 400 Bad Request
2445 | Server: cloudflare
2446 | Date: Tue, 31 Mar 2020 04:45:22 GMT
2447 | Content-Type: text/html
2448 | Content-Length: 155
2449 | Connection: close
2450 | CF-RAY: -
2451 | <html>
2452 | <head><title>400 Bad Request</title></head>
2453 | <body>
2454 | <center><h1>400 Bad Request</h1></center>
2455 | <hr><center>cloudflare</center>
2456 | </body>
2457 | </html>
2458 | RTSPRequest:
2459 | <html>
2460 | <head><title>400 Bad Request</title></head>
2461 | <body>
2462 | <center><h1>400 Bad Request</h1></center>
2463 | <hr><center>cloudflare</center>
2464 | </body>
2465 | </html>
2466 | X11Probe:
2467 | HTTP/1.1 400 Bad Request
2468 | Server: cloudflare
2469 | Date: Tue, 31 Mar 2020 04:45:16 GMT
2470 | Content-Type: text/html
2471 | Content-Length: 155
2472 | Connection: close
2473 | CF-RAY: -
2474 | <html>
2475 | <head><title>400 Bad Request</title></head>
2476 | <body>
2477 | <center><h1>400 Bad Request</h1></center>
2478 | <hr><center>cloudflare</center>
2479 | </body>
2480 |_ </html>
2481 |_http-server-header: cloudflare
2482 |_http-title: Site doesn't have a title (text/plain; charset=UTF-8).
2483 443/tcp open ssl/https syn-ack ttl 59 cloudflare
2484 | fingerprint-strings:
2485 | FourOhFourRequest:
2486 | HTTP/1.1 403 Forbidden
2487 | Server: cloudflare
2488 | Date: Tue, 31 Mar 2020 04:45:23 GMT
2489 | Content-Type: text/html
2490 | Content-Length: 151
2491 | Connection: close
2492 | CF-RAY: 57c76bad182bfaac-AMS
2493 | <html>
2494 | <head><title>403 Forbidden</title></head>
2495 | <body>
2496 | <center><h1>403 Forbidden</h1></center>
2497 | <hr><center>cloudflare</center>
2498 | </body>
2499 | </html>
2500 | GetRequest:
2501 | HTTP/1.1 403 Forbidden
2502 | Server: cloudflare
2503 | Date: Tue, 31 Mar 2020 04:45:22 GMT
2504 | Content-Type: text/html
2505 | Content-Length: 151
2506 | Connection: close
2507 | CF-RAY: 57c76ba7af85fa5c-AMS
2508 | <html>
2509 | <head><title>403 Forbidden</title></head>
2510 | <body>
2511 | <center><h1>403 Forbidden</h1></center>
2512 | <hr><center>cloudflare</center>
2513 | </body>
2514 | </html>
2515 | HTTPOptions:
2516 | HTTP/1.1 403 Forbidden
2517 | Server: cloudflare
2518 | Date: Tue, 31 Mar 2020 04:45:22 GMT
2519 | Content-Type: text/html
2520 | Content-Length: 151
2521 | Connection: close
2522 | CF-RAY: 57c76baa6b02d8f5-AMS
2523 | <html>
2524 | <head><title>403 Forbidden</title></head>
2525 | <body>
2526 | <center><h1>403 Forbidden</h1></center>
2527 | <hr><center>cloudflare</center>
2528 | </body>
2529 | </html>
2530 | RPCCheck:
2531 | HTTP/1.1 400 Bad Request
2532 | Server: cloudflare
2533 | Date: Tue, 31 Mar 2020 04:45:29 GMT
2534 | Content-Type: text/html
2535 | Content-Length: 155
2536 | Connection: close
2537 | CF-RAY: -
2538 | <html>
2539 | <head><title>400 Bad Request</title></head>
2540 | <body>
2541 | <center><h1>400 Bad Request</h1></center>
2542 | <hr><center>cloudflare</center>
2543 | </body>
2544 | </html>
2545 | RTSPRequest:
2546 | <html>
2547 | <head><title>400 Bad Request</title></head>
2548 | <body>
2549 | <center><h1>400 Bad Request</h1></center>
2550 | <hr><center>cloudflare</center>
2551 | </body>
2552 | </html>
2553 | tor-versions:
2554 | HTTP/1.1 400 Bad Request
2555 | Server: cloudflare
2556 | Date: Tue, 31 Mar 2020 04:45:23 GMT
2557 | Content-Type: text/html
2558 | Content-Length: 155
2559 | Connection: close
2560 | CF-RAY: -
2561 | <html>
2562 | <head><title>400 Bad Request</title></head>
2563 | <body>
2564 | <center><h1>400 Bad Request</h1></center>
2565 | <hr><center>cloudflare</center>
2566 | </body>
2567 |_ </html>
2568 |_http-server-header: cloudflare
2569 |_http-title: 403 Forbidden
2570 | ssl-cert: Subject: commonName=*.myshopify.com/organizationName=CloudFlare, Inc./stateOrProvinceName=CA/countryName=US
2571 | Subject Alternative Name: DNS:myshopify.com, DNS:*.myshopify.com
2572 | Issuer: commonName=CloudFlare Inc ECC CA-2/organizationName=CloudFlare, Inc./stateOrProvinceName=CA/countryName=US
2573 | Public Key type: ec
2574 | Public Key bits: 256
2575 | Signature Algorithm: ecdsa-with-SHA256
2576 | Not valid before: 2019-05-02T00:00:00
2577 | Not valid after: 2020-05-02T12:00:00
2578 | MD5: fe65 4aba cdcd ccaf a90d 23a3 d4f1 32ac
2579 |_SHA-1: 8381 f18f 5e77 f549 a0f0 3adf 21d7 a486 0b73 85ac
2580 |_ssl-date: 2020-03-31T04:45:48+00:00; -2s from scanner time.
2581 | tls-alpn:
2582 | h2
2583 |_ http/1.1
2584 | tls-nextprotoneg:
2585 | h2
2586 |_ http/1.1
2587 8080/tcp open http-proxy syn-ack ttl 59 cloudflare
2588 | fingerprint-strings:
2589 | FourOhFourRequest:
2590 | HTTP/1.1 400 Bad Request
2591 | Date: Tue, 31 Mar 2020 04:45:16 GMT
2592 | Content-Type: text/html
2593 | Content-Length: 155
2594 | Connection: close
2595 | Server: cloudflare
2596 | CF-RAY: 57c76b841bb9fa54-AMS
2597 | <html>
2598 | <head><title>400 Bad Request</title></head>
2599 | <body>
2600 | <center><h1>400 Bad Request</h1></center>
2601 | <hr><center>cloudflare</center>
2602 | </body>
2603 | </html>
2604 | GetRequest:
2605 | HTTP/1.1 400 Bad Request
2606 | Date: Tue, 31 Mar 2020 04:45:16 GMT
2607 | Content-Type: text/html
2608 | Content-Length: 155
2609 | Connection: close
2610 | Server: cloudflare
2611 | CF-RAY: 57c76b800d5a9d36-AMS
2612 | <html>
2613 | <head><title>400 Bad Request</title></head>
2614 | <body>
2615 | <center><h1>400 Bad Request</h1></center>
2616 | <hr><center>cloudflare</center>
2617 | </body>
2618 | </html>
2619 | HTTPOptions:
2620 | HTTP/1.1 400 Bad Request
2621 | Date: Tue, 31 Mar 2020 04:45:16 GMT
2622 | Content-Type: text/html
2623 | Content-Length: 155
2624 | Connection: close
2625 | Server: cloudflare
2626 | CF-RAY: 57c76b816a842b38-AMS
2627 | <html>
2628 | <head><title>400 Bad Request</title></head>
2629 | <body>
2630 | <center><h1>400 Bad Request</h1></center>
2631 | <hr><center>cloudflare</center>
2632 | </body>
2633 | </html>
2634 | RTSPRequest:
2635 | <html>
2636 | <head><title>400 Bad Request</title></head>
2637 | <body>
2638 | <center><h1>400 Bad Request</h1></center>
2639 | <hr><center>cloudflare</center>
2640 | </body>
2641 | </html>
2642 | Socks4, Socks5:
2643 | HTTP/1.1 400 Bad Request
2644 | Server: cloudflare
2645 | Date: Tue, 31 Mar 2020 04:45:17 GMT
2646 | Content-Type: text/html
2647 | Content-Length: 155
2648 | Connection: close
2649 | CF-RAY: -
2650 | <html>
2651 | <head><title>400 Bad Request</title></head>
2652 | <body>
2653 | <center><h1>400 Bad Request</h1></center>
2654 | <hr><center>cloudflare</center>
2655 | </body>
2656 |_ </html>
2657 |_http-server-header: cloudflare
2658 |_http-title: Site doesn't have a title (text/plain; charset=UTF-8).
2659 8443/tcp open ssl/https-alt syn-ack ttl 59 cloudflare
2660 | fingerprint-strings:
2661 | DNSVersionBindReqTCP, RPCCheck:
2662 | HTTP/1.1 400 Bad Request
2663 | Server: cloudflare
2664 | Date: Tue, 31 Mar 2020 04:45:29 GMT
2665 | Content-Type: text/html
2666 | Content-Length: 155
2667 | Connection: close
2668 | CF-RAY: -
2669 | <html>
2670 | <head><title>400 Bad Request</title></head>
2671 | <body>
2672 | <center><h1>400 Bad Request</h1></center>
2673 | <hr><center>cloudflare</center>
2674 | </body>
2675 | </html>
2676 | FourOhFourRequest:
2677 | HTTP/1.1 403 Forbidden
2678 | Server: cloudflare
2679 | Date: Tue, 31 Mar 2020 04:45:23 GMT
2680 | Content-Type: text/html
2681 | Content-Length: 151
2682 | Connection: close
2683 | CF-RAY: 57c76bad0db9d92d-AMS
2684 | <html>
2685 | <head><title>403 Forbidden</title></head>
2686 | <body>
2687 | <center><h1>403 Forbidden</h1></center>
2688 | <hr><center>cloudflare</center>
2689 | </body>
2690 | </html>
2691 | GetRequest:
2692 | HTTP/1.1 403 Forbidden
2693 | Server: cloudflare
2694 | Date: Tue, 31 Mar 2020 04:45:22 GMT
2695 | Content-Type: text/html
2696 | Content-Length: 151
2697 | Connection: close
2698 | CF-RAY: 57c76ba7af2d727b-AMS
2699 | <html>
2700 | <head><title>403 Forbidden</title></head>
2701 | <body>
2702 | <center><h1>403 Forbidden</h1></center>
2703 | <hr><center>cloudflare</center>
2704 | </body>
2705 | </html>
2706 | HTTPOptions:
2707 | HTTP/1.1 403 Forbidden
2708 | Server: cloudflare
2709 | Date: Tue, 31 Mar 2020 04:45:22 GMT
2710 | Content-Type: text/html
2711 | Content-Length: 151
2712 | Connection: close
2713 | CF-RAY: 57c76baa68cafa40-AMS
2714 | <html>
2715 | <head><title>403 Forbidden</title></head>
2716 | <body>
2717 | <center><h1>403 Forbidden</h1></center>
2718 | <hr><center>cloudflare</center>
2719 | </body>
2720 | </html>
2721 | RTSPRequest:
2722 | <html>
2723 | <head><title>400 Bad Request</title></head>
2724 | <body>
2725 | <center><h1>400 Bad Request</h1></center>
2726 | <hr><center>cloudflare</center>
2727 | </body>
2728 |_ </html>
2729 |_http-server-header: cloudflare
2730 |_http-title: 403 Forbidden
2731 | ssl-cert: Subject: commonName=*.myshopify.com/organizationName=CloudFlare, Inc./stateOrProvinceName=CA/countryName=US
2732 | Subject Alternative Name: DNS:myshopify.com, DNS:*.myshopify.com
2733 | Issuer: commonName=CloudFlare Inc ECC CA-2/organizationName=CloudFlare, Inc./stateOrProvinceName=CA/countryName=US
2734 | Public Key type: ec
2735 | Public Key bits: 256
2736 | Signature Algorithm: ecdsa-with-SHA256
2737 | Not valid before: 2019-05-02T00:00:00
2738 | Not valid after: 2020-05-02T12:00:00
2739 | MD5: fe65 4aba cdcd ccaf a90d 23a3 d4f1 32ac
2740 |_SHA-1: 8381 f18f 5e77 f549 a0f0 3adf 21d7 a486 0b73 85ac
2741 |_ssl-date: 2020-03-31T04:45:48+00:00; -2s from scanner time.
2742 | tls-alpn:
2743 | h2
2744 |_ http/1.1
2745 | tls-nextprotoneg:
2746 | h2
2747 |_ http/1.1
2748 Scanning ip 104.47.20.36 (mail-cwlgbr010036.inbound.protection.outlook.com (PTR)):
2749 25/tcp open smtp syn-ack ttl 112 Microsoft Exchange smtpd
2750 | smtp-commands: CWLGBR01FT007.mail.protection.outlook.com Hello [45.131.5.15], SIZE 157286400, PIPELINING, DSN, ENHANCEDSTATUSCODES, STARTTLS, 8BITMIME, BINARYMIME, CHUNKING, SMTPUTF8,
2751 |_ This server supports the following commands: HELO EHLO STARTTLS RCPT DATA RSET MAIL QUIT HELP AUTH BDAT
2752 | ssl-cert: Subject: commonName=mail.protection.outlook.com/organizationName=Microsoft Corporation/stateOrProvinceName=Washington/countryName=US
2753 | Subject Alternative Name: DNS:mail.protection.outlook.com, DNS:*.mail.eo.outlook.com, DNS:*.mail.protection.outlook.com, DNS:mail.messaging.microsoft.com, DNS:outlook.com, DNS:*.olc.protection.outlook.com, DNS:*.pamx1.hotmail.com
2754 | Issuer: commonName=GlobalSign Organization Validation CA - SHA256 - G3/organizationName=GlobalSign nv-sa/countryName=BE
2755 | Public Key type: rsa
2756 | Public Key bits: 2048
2757 | Signature Algorithm: sha256WithRSAEncryption
2758 | Not valid before: 2020-02-24T18:33:10
2759 | Not valid after: 2022-02-24T18:33:10
2760 | MD5: 4f90 9eee 29eb abe5 e29a d55e 8c08 c310
2761 |_SHA-1: ea85 9504 40a6 97c1 8482 3304 a7dc 19e5 fcd5 8e6b
2762 |_ssl-date: 2020-03-31T04:46:05+00:00; -1s from scanner time.
2763 OS Info: Service Info: Host: CWLGBR01FT007.mail.protection.outlook.com; OS: Windows; CPE: cpe:/o:microsoft:windows
2764 |_clock-skew: -1s
2765 WebCrawling domain's web servers... up to 50 max links.
2766
2767 + URL to crawl: http://www2.cityoflondon.gov.uk.
2768 + Date: 2020-03-31
2769
2770 + Crawling URL: http://www2.cityoflondon.gov.uk.:
2771 + Links:
2772 + Crawling http://www2.cityoflondon.gov.uk. (400 Bad Request)
2773 + Searching for directories...
2774 + Searching open folders...
2775
2776
2777 + URL to crawl: https://www2.cityoflondon.gov.uk.
2778 + Date: 2020-03-31
2779
2780 + Crawling URL: https://www2.cityoflondon.gov.uk.:
2781 + Links:
2782 + Crawling https://www2.cityoflondon.gov.uk. ([SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:727))
2783 + Searching for directories...
2784 + Searching open folders...
2785
2786
2787 + URL to crawl: http://www.cityoflondon.gov.uk.
2788 + Date: 2020-03-31
2789
2790 + Crawling URL: http://www.cityoflondon.gov.uk.:
2791 + Links:
2792 + Crawling http://www.cityoflondon.gov.uk.
2793 + Searching for directories...
2794 + Searching open folders...
2795
2796
2797 + URL to crawl: https://www.cityoflondon.gov.uk.
2798 + Date: 2020-03-31
2799
2800 + Crawling URL: https://www.cityoflondon.gov.uk.:
2801 + Links:
2802 + Crawling https://www.cityoflondon.gov.uk.
2803 + Searching for directories...
2804 + Searching open folders...
2805
2806--Finished--
2807Summary information for domain cityoflondon.gov.uk.
2808-----------------------------------------
2809 Domain Specific Information:
2810 Email: thecitycentre@cityoflondon.gov.uk.
2811 Email: Susan.Pearson@cityoflondon.gov.uk&
2812 Email: Wootton@cityoflondon.gov.uk&
2813 Email: kevin.mulcahy@cityoflondon.gov.uk
2814 Email: bankarea@cityoflondon.gov.uk]
2815 Email: artizanlib@cityoflondon.gov.uk.
2816 Email: LADO@cityoflondon.gov.uk
2817 Email: vicki.wells@cityoflondon.gov.uk.
2818 Email: citybridgetrust@cityoflondon.gov.uk
2819 Email: pro@cityoflondon.gov.uk�
2820 Email: roger.gifford@cityoflondon.gov.uk.
2821 Email: kevin.mulcahy@cityoflondon.gov.uk�
2822 Email: Sukhjit.Gill@cityoflondon.gov.uk.
2823 Email: zoe.nation@cityoflondon.gov.uk
2824 Email: Sukhjit.Gill@cityoflondon.gov.uk
2825 Email: zoe.nation@cityoflondon.gov.uk�
2826 Email: joanna.burnaby-atkins@cityoflondon.gov.uk. - Is this real?
2827 Email: Vicki.Wells@cityoflondon.gov.uk]
2828 Email: michael.bennett@cityoflondon.gov.uk:
2829 Email: citybridgetrust@cityoflondon.gov.uk.
2830 Email: barbicanlib@cityoflondon.gov.uk.
2831
2832 Domain Ips Information:
2833 IP: 52.100.0.0
2834 Type: SPF
2835 Is Active: False
2836 IP: 52.200.59.0
2837 Type: SPF
2838 Is Active: False
2839 IP: 148.105.0.0
2840 Type: SPF
2841 Is Active: False
2842 IP: 162.159.38.116
2843 HostName: treasure.ns.cloudflare.com Type: NS
2844 HostName: treasure.ns.cloudflare.com Type: PTR
2845 Country: None
2846 Is Active: True (echo-reply ttl 59)
2847 Port: 53/tcp open domain syn-ack ttl 59 (unknown banner: 20171212)
2848 Script Info: | dns-nsid:
2849 Script Info: | NSID: 20m391 (32306d333931)
2850 Script Info: | id.server: AMS
2851 Script Info: |_ bind.version: 20171212
2852 Script Info: | fingerprint-strings:
2853 Script Info: | DNSVersionBindReqTCP:
2854 Script Info: | version
2855 Script Info: | bind
2856 Script Info: |_ 20171212
2857 IP: 74.63.212.0
2858 Type: SPF
2859 Is Active: False
2860 IP: 148.105.8.0
2861 Type: SPF
2862 Is Active: False
2863 IP: 205.201.128.0
2864 Type: SPF
2865 Type: SPF
2866 Is Active: True (syn-ack ttl 58)
2867 Port: 25/tcp open smtp syn-ack ttl 58 Postfix smtpd
2868 Script Info: |_smtp-commands: pmta45.mailchimp.prod.atl01.rsglab.com, PIPELINING, SIZE 10240000, ENHANCEDSTATUSCODES, 8BITMIME, SMTPUTF8,
2869 Port: 80/tcp open http syn-ack ttl 58 nginx 1.8.1
2870 Script Info: | http-methods:
2871 Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
2872 Script Info: |_http-server-header: nginx/1.8.1
2873 Script Info: |_http-title: Did not follow redirect to https://mailchimp.com/about/mcsv-static
2874 Os Info: Host: pmta45.mailchimp.prod.atl01.rsglab.com
2875 IP: 80.169.89.98
2876 HostName: www2.cityoflondon.gov.uk. Type: A
2877 Country: United Kingdom
2878 Is Active: True (syn-ack ttl 117)
2879 Port: 80/tcp open http syn-ack ttl 117 Microsoft IIS httpd 10.0
2880 Script Info: | http-methods:
2881 Script Info: | Supported Methods: OPTIONS TRACE GET HEAD POST
2882 Script Info: |_ Potentially risky methods: TRACE
2883 Script Info: |_http-server-header: Microsoft-IIS/10.0
2884 Script Info: |_http-title: IIS Windows Server
2885 Port: 443/tcp open ssl/http syn-ack ttl 117 Microsoft IIS httpd 10.0
2886 Script Info: | http-methods:
2887 Script Info: | Supported Methods: OPTIONS TRACE GET HEAD POST
2888 Script Info: |_ Potentially risky methods: TRACE
2889 Script Info: |_http-server-header: Microsoft-IIS/10.0
2890 Script Info: |_http-title: IIS Windows Server
2891 Script Info: | ssl-cert: Subject: commonName=WMSvc-SHA2-COL-VMW-P-LIM01
2892 Script Info: | Issuer: commonName=WMSvc-SHA2-COL-VMW-P-LIM01
2893 Script Info: | Public Key type: rsa
2894 Script Info: | Public Key bits: 2048
2895 Script Info: | Signature Algorithm: sha256WithRSAEncryption
2896 Script Info: | Not valid before: 2020-01-09T15:25:04
2897 Script Info: | Not valid after: 2030-01-06T15:25:04
2898 Script Info: | MD5: b2e4 3b70 c10c ffc8 c699 3005 94ab 1fe1
2899 Script Info: |_SHA-1: 8b35 9e30 d522 59a4 b205 a607 4cfa 5a0e df4f dc13
2900 Script Info: |_ssl-date: 2020-03-31T04:40:55+00:00; +3m45s from scanner time.
2901 Script Info: | tls-alpn:
2902 Script Info: | h2
2903 Script Info: |_ http/1.1
2904 Os Info: OS: Windows; CPE: cpe:/o:microsoft:windows
2905 Script Info: |_clock-skew: 3m44s
2906 IP: 66.240.227.0
2907 Type: SPF
2908 Is Active: False
2909 IP: 86.111.216.0
2910 Type: SPF
2911 Is Active: False
2912 IP: 198.2.128.0
2913 Type: SPF
2914 Type: SPF
2915 Is Active: True (reset ttl 58)
2916 Port: 80/tcp open http syn-ack ttl 58 nginx 1.6.1
2917 Script Info: |_http-server-header: nginx/1.6.1
2918 Script Info: |_http-title: 403 Forbidden
2919 Script Info: Device type: general purpose|storage-misc|broadband router|router|WAP
2920 Script Info: Running (JUST GUESSING): Linux 2.6.X|3.X (93%), HP embedded (90%), MikroTik RouterOS 6.X (89%), Ubiquiti AirOS 5.X (89%), Ubiquiti embedded (87%), Ruckus embedded (87%), AVM FritzOS 6.X (87%)
2921 IP: 34.245.210.0
2922 Type: SPF
2923 Type: SPF
2924 Is Active: False
2925 IP: 63.143.59.128
2926 Type: SPF
2927 Is Active: False
2928 IP: 85.115.32.0
2929 Type: SPF
2930 Is Active: False
2931 IP: 80.169.89.85
2932 Type: SPF
2933 Is Active: False
2934 IP: 89.145.127.252
2935 Type: SPF
2936 Is Active: True (echo-reply ttl 56)
2937 IP: 63.143.57.128
2938 Type: SPF
2939 Is Active: False
2940 IP: 104.47.21.36
2941 HostName: cityoflondon-gov-uk.mail.protection.outlook.com Type: MX
2942 HostName: mail-lo2gbr010036.inbound.protection.outlook.com Type: PTR
2943 Country: United Kingdom
2944 Is Active: True (syn-ack ttl 115)
2945 Port: 25/tcp open smtp syn-ack ttl 115 Microsoft Exchange smtpd
2946 Script Info: | smtp-commands: LO2GBR01FT005.mail.protection.outlook.com Hello [45.131.5.15], SIZE 157286400, PIPELINING, DSN, ENHANCEDSTATUSCODES, STARTTLS, 8BITMIME, BINARYMIME, CHUNKING, SMTPUTF8,
2947 Script Info: |_ This server supports the following commands: HELO EHLO STARTTLS RCPT DATA RSET MAIL QUIT HELP AUTH BDAT
2948 Script Info: | ssl-cert: Subject: commonName=mail.protection.outlook.com/organizationName=Microsoft Corporation/stateOrProvinceName=Washington/countryName=US
2949 Script Info: | Subject Alternative Name: DNS:mail.protection.outlook.com, DNS:*.mail.eo.outlook.com, DNS:*.mail.protection.outlook.com, DNS:mail.messaging.microsoft.com, DNS:outlook.com, DNS:*.olc.protection.outlook.com, DNS:*.pamx1.hotmail.com
2950 Script Info: | Issuer: commonName=GlobalSign Organization Validation CA - SHA256 - G3/organizationName=GlobalSign nv-sa/countryName=BE
2951 Script Info: | Public Key type: rsa
2952 Script Info: | Public Key bits: 2048
2953 Script Info: | Signature Algorithm: sha256WithRSAEncryption
2954 Script Info: | Not valid before: 2020-02-24T18:33:10
2955 Script Info: | Not valid after: 2022-02-24T18:33:10
2956 Script Info: | MD5: 4f90 9eee 29eb abe5 e29a d55e 8c08 c310
2957 Script Info: |_SHA-1: ea85 9504 40a6 97c1 8482 3304 a7dc 19e5 fcd5 8e6b
2958 Script Info: |_ssl-date: 2020-03-31T04:38:16+00:00; -1s from scanner time.
2959 Os Info: Host: LO2GBR01FT012.mail.protection.outlook.com; OS: Windows; CPE: cpe:/o:microsoft:windows
2960 Script Info: |_clock-skew: -1s
2961 IP: 192.151.176.0
2962 Type: SPF
2963 Is Active: False
2964 IP: 84.45.34.163
2965 Type: SPF
2966 Is Active: True (echo-reply ttl 56)
2967 IP: 212.50.171.0
2968 Type: SPF
2969 Is Active: True (abort ttl 244)
2970 IP: 135.84.216.0
2971 Type: SPF
2972 Is Active: False
2973 IP: 40.107.0.0
2974 Type: SPF
2975 Is Active: False
2976 IP: 173.245.59.122
2977 HostName: jake.ns.cloudflare.com Type: NS
2978 HostName: jake.ns.cloudflare.com Type: PTR
2979 Country: United States
2980 Is Active: True (echo-reply ttl 59)
2981 Port: 53/tcp open domain syn-ack ttl 59 (unknown banner: 20171212)
2982 Script Info: | dns-nsid:
2983 Script Info: | NSID: 20m226 (32306d323236)
2984 Script Info: | id.server: AMS
2985 Script Info: |_ bind.version: 20171212
2986 Script Info: | fingerprint-strings:
2987 Script Info: | DNSVersionBindReqTCP:
2988 Script Info: | version
2989 Script Info: | bind
2990 Script Info: |_ 20171212
2991 IP: 40.92.0.0
2992 Type: SPF
2993 Is Active: False
2994 IP: 196.216.238.0
2995 Type: SPF
2996 Is Active: False
2997 IP: 80.169.89.109
2998 Type: SPF
2999 Is Active: False
3000 IP: 116.50.56.0
3001 Type: SPF
3002 Is Active: False
3003 IP: 208.87.232.0
3004 Type: SPF
3005 Is Active: False
3006 IP: 80.169.89.102
3007 HostName: www.cityoflondon.gov.uk. Type: A
3008 Country: United Kingdom
3009 Is Active: True (syn-ack ttl 53)
3010 Port: 80/tcp open http syn-ack ttl 53 COL-VMW-M-LB02
3011 Script Info: | fingerprint-strings:
3012 Script Info: | FourOhFourRequest:
3013 Script Info: | HTTP/1.1 301 Moved Permanently
3014 Script Info: | Location: https:///nice%20ports%2C/Tri%6Eity.txt%2ebak
3015 Script Info: | Server: COL-VMW-M-LB02
3016 Script Info: | Cache-Control: no-cache
3017 Script Info: | Connection: close
3018 Script Info: | GenericLines:
3019 Script Info: | HTTP/1.1 301 Moved Permanently
3020 Script Info: | Location: https://
3021 Script Info: | Server: COL-VMW-M-LB02
3022 Script Info: | Cache-Control: no-cache
3023 Script Info: | Connection: close
3024 Script Info: | GetRequest, HTTPOptions, RTSPRequest:
3025 Script Info: | HTTP/1.1 301 Moved Permanently
3026 Script Info: | Location: https:///
3027 Script Info: | Server: COL-VMW-M-LB02
3028 Script Info: | Cache-Control: no-cache
3029 Script Info: | Connection: close
3030 Script Info: | SIPOptions:
3031 Script Info: | HTTP/1.1 301 Moved Permanently
3032 Script Info: | Location: https://sip:nm
3033 Script Info: | Server: COL-VMW-M-LB02
3034 Script Info: | Cache-Control: no-cache
3035 Script Info: |_ Connection: close
3036 Script Info: | http-methods:
3037 Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
3038 Script Info: |_http-server-header: COL-VMW-M-LB02
3039 Script Info: |_http-title: Did not follow redirect to https://80.169.89.102/
3040 Script Info: |_https-redirect: ERROR: Script execution failed (use -d to debug)
3041 Port: 443/tcp open ssl/http syn-ack ttl 53 Microsoft IIS httpd 7.5
3042 Script Info: | http-methods:
3043 Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
3044 Script Info: |_http-server-header: Microsoft-IIS/7.5
3045 Script Info: | http-title: Welcome to the City of London Corporation
3046 Script Info: |_Requested resource was https://80.169.89.102/Pages/default.aspx
3047 Script Info: | ssl-cert: Subject: commonName=*.cityoflondon.gov.uk/organizationName=City of London Corporation/countryName=GB
3048 Script Info: | Subject Alternative Name: DNS:*.cityoflondon.gov.uk, DNS:cityoflondon.gov.uk
3049 Script Info: | Issuer: commonName=Entrust Certification Authority - L1K/organizationName=Entrust, Inc./countryName=US
3050 Script Info: | Public Key type: rsa
3051 Script Info: | Public Key bits: 2048
3052 Script Info: | Signature Algorithm: sha256WithRSAEncryption
3053 Script Info: | Not valid before: 2019-01-09T10:15:04
3054 Script Info: | Not valid after: 2021-01-09T10:45:03
3055 Script Info: | MD5: 4f24 791b 0cf7 72b6 48e0 faac 5dd4 3c66
3056 Script Info: |_SHA-1: 414c 9a2c e74f b30a 5c45 a40d 2288 a043 93d7 4d99
3057 Script Info: |_ssl-date: TLS randomness does not represent time
3058 Os Info: OS: Windows; CPE: cpe:/o:microsoft:windows
3059 IP: 80.169.89.106
3060 Type: SPF
3061 Is Active: True (syn-ack ttl 117)
3062 Port: 80/tcp open http syn-ack ttl 117 Microsoft IIS httpd 8.5
3063 Script Info: | http-methods:
3064 Script Info: | Supported Methods: OPTIONS TRACE GET HEAD POST
3065 Script Info: |_ Potentially risky methods: TRACE
3066 Script Info: |_http-server-header: Microsoft-IIS/8.5
3067 Script Info: |_http-title: 403 - Forbidden: Access is denied.
3068 Port: 443/tcp open ssl/https? syn-ack ttl 117
3069 Script Info: |_ssl-date: 2020-03-31T04:47:53+00:00; +3m45s from scanner time.
3070 Os Info: OS: Windows; CPE: cpe:/o:microsoft:windows
3071 Script Info: |_clock-skew: 3m44s
3072 IP: 104.47.0.0
3073 Type: SPF
3074 Is Active: False
3075 IP: 132.174.100.127
3076 Type: SPF
3077 Is Active: False
3078 IP: 216.98.158.0
3079 Type: SPF
3080 Is Active: False
3081 IP: 23.227.38.64
3082 Type: SPF
3083 Is Active: True (echo-reply ttl 59)
3084 Port: 80/tcp open http syn-ack ttl 59 cloudflare
3085 Script Info: | fingerprint-strings:
3086 Script Info: | FourOhFourRequest:
3087 Script Info: | HTTP/1.1 400 Bad Request
3088 Script Info: | Date: Tue, 31 Mar 2020 04:45:17 GMT
3089 Script Info: | Content-Type: text/html
3090 Script Info: | Content-Length: 155
3091 Script Info: | Connection: close
3092 Script Info: | Server: cloudflare
3093 Script Info: | CF-RAY: 57c76b857cf3faa0-AMS
3094 Script Info: | <html>
3095 Script Info: | <head><title>400 Bad Request</title></head>
3096 Script Info: | <body>
3097 Script Info: | <center><h1>400 Bad Request</h1></center>
3098 Script Info: | <hr><center>cloudflare</center>
3099 Script Info: | </body>
3100 Script Info: | </html>
3101 Script Info: | GetRequest:
3102 Script Info: | HTTP/1.1 400 Bad Request
3103 Script Info: | Date: Tue, 31 Mar 2020 04:45:16 GMT
3104 Script Info: | Content-Type: text/html
3105 Script Info: | Content-Length: 155
3106 Script Info: | Connection: close
3107 Script Info: | Server: cloudflare
3108 Script Info: | CF-RAY: 57c76b800fb19ccf-AMS
3109 Script Info: | <html>
3110 Script Info: | <head><title>400 Bad Request</title></head>
3111 Script Info: | <body>
3112 Script Info: | <center><h1>400 Bad Request</h1></center>
3113 Script Info: | <hr><center>cloudflare</center>
3114 Script Info: | </body>
3115 Script Info: | </html>
3116 Script Info: | HTTPOptions:
3117 Script Info: | HTTP/1.1 400 Bad Request
3118 Script Info: | Date: Tue, 31 Mar 2020 04:45:16 GMT
3119 Script Info: | Content-Type: text/html
3120 Script Info: | Content-Length: 155
3121 Script Info: | Connection: close
3122 Script Info: | Server: cloudflare
3123 Script Info: | CF-RAY: 57c76b81791dd8c9-AMS
3124 Script Info: | <html>
3125 Script Info: | <head><title>400 Bad Request</title></head>
3126 Script Info: | <body>
3127 Script Info: | <center><h1>400 Bad Request</h1></center>
3128 Script Info: | <hr><center>cloudflare</center>
3129 Script Info: | </body>
3130 Script Info: | </html>
3131 Script Info: | RPCCheck:
3132 Script Info: | HTTP/1.1 400 Bad Request
3133 Script Info: | Server: cloudflare
3134 Script Info: | Date: Tue, 31 Mar 2020 04:45:22 GMT
3135 Script Info: | Content-Type: text/html
3136 Script Info: | Content-Length: 155
3137 Script Info: | Connection: close
3138 Script Info: | CF-RAY: -
3139 Script Info: | <html>
3140 Script Info: | <head><title>400 Bad Request</title></head>
3141 Script Info: | <body>
3142 Script Info: | <center><h1>400 Bad Request</h1></center>
3143 Script Info: | <hr><center>cloudflare</center>
3144 Script Info: | </body>
3145 Script Info: | </html>
3146 Script Info: | RTSPRequest:
3147 Script Info: | <html>
3148 Script Info: | <head><title>400 Bad Request</title></head>
3149 Script Info: | <body>
3150 Script Info: | <center><h1>400 Bad Request</h1></center>
3151 Script Info: | <hr><center>cloudflare</center>
3152 Script Info: | </body>
3153 Script Info: | </html>
3154 Script Info: | X11Probe:
3155 Script Info: | HTTP/1.1 400 Bad Request
3156 Script Info: | Server: cloudflare
3157 Script Info: | Date: Tue, 31 Mar 2020 04:45:16 GMT
3158 Script Info: | Content-Type: text/html
3159 Script Info: | Content-Length: 155
3160 Script Info: | Connection: close
3161 Script Info: | CF-RAY: -
3162 Script Info: | <html>
3163 Script Info: | <head><title>400 Bad Request</title></head>
3164 Script Info: | <body>
3165 Script Info: | <center><h1>400 Bad Request</h1></center>
3166 Script Info: | <hr><center>cloudflare</center>
3167 Script Info: | </body>
3168 Script Info: |_ </html>
3169 Script Info: |_http-server-header: cloudflare
3170 Script Info: |_http-title: Site doesn't have a title (text/plain; charset=UTF-8).
3171 Port: 443/tcp open ssl/https syn-ack ttl 59 cloudflare
3172 Script Info: | fingerprint-strings:
3173 Script Info: | FourOhFourRequest:
3174 Script Info: | HTTP/1.1 403 Forbidden
3175 Script Info: | Server: cloudflare
3176 Script Info: | Date: Tue, 31 Mar 2020 04:45:23 GMT
3177 Script Info: | Content-Type: text/html
3178 Script Info: | Content-Length: 151
3179 Script Info: | Connection: close
3180 Script Info: | CF-RAY: 57c76bad182bfaac-AMS
3181 Script Info: | <html>
3182 Script Info: | <head><title>403 Forbidden</title></head>
3183 Script Info: | <body>
3184 Script Info: | <center><h1>403 Forbidden</h1></center>
3185 Script Info: | <hr><center>cloudflare</center>
3186 Script Info: | </body>
3187 Script Info: | </html>
3188 Script Info: | GetRequest:
3189 Script Info: | HTTP/1.1 403 Forbidden
3190 Script Info: | Server: cloudflare
3191 Script Info: | Date: Tue, 31 Mar 2020 04:45:22 GMT
3192 Script Info: | Content-Type: text/html
3193 Script Info: | Content-Length: 151
3194 Script Info: | Connection: close
3195 Script Info: | CF-RAY: 57c76ba7af85fa5c-AMS
3196 Script Info: | <html>
3197 Script Info: | <head><title>403 Forbidden</title></head>
3198 Script Info: | <body>
3199 Script Info: | <center><h1>403 Forbidden</h1></center>
3200 Script Info: | <hr><center>cloudflare</center>
3201 Script Info: | </body>
3202 Script Info: | </html>
3203 Script Info: | HTTPOptions:
3204 Script Info: | HTTP/1.1 403 Forbidden
3205 Script Info: | Server: cloudflare
3206 Script Info: | Date: Tue, 31 Mar 2020 04:45:22 GMT
3207 Script Info: | Content-Type: text/html
3208 Script Info: | Content-Length: 151
3209 Script Info: | Connection: close
3210 Script Info: | CF-RAY: 57c76baa6b02d8f5-AMS
3211 Script Info: | <html>
3212 Script Info: | <head><title>403 Forbidden</title></head>
3213 Script Info: | <body>
3214 Script Info: | <center><h1>403 Forbidden</h1></center>
3215 Script Info: | <hr><center>cloudflare</center>
3216 Script Info: | </body>
3217 Script Info: | </html>
3218 Script Info: | RPCCheck:
3219 Script Info: | HTTP/1.1 400 Bad Request
3220 Script Info: | Server: cloudflare
3221 Script Info: | Date: Tue, 31 Mar 2020 04:45:29 GMT
3222 Script Info: | Content-Type: text/html
3223 Script Info: | Content-Length: 155
3224 Script Info: | Connection: close
3225 Script Info: | CF-RAY: -
3226 Script Info: | <html>
3227 Script Info: | <head><title>400 Bad Request</title></head>
3228 Script Info: | <body>
3229 Script Info: | <center><h1>400 Bad Request</h1></center>
3230 Script Info: | <hr><center>cloudflare</center>
3231 Script Info: | </body>
3232 Script Info: | </html>
3233 Script Info: | RTSPRequest:
3234 Script Info: | <html>
3235 Script Info: | <head><title>400 Bad Request</title></head>
3236 Script Info: | <body>
3237 Script Info: | <center><h1>400 Bad Request</h1></center>
3238 Script Info: | <hr><center>cloudflare</center>
3239 Script Info: | </body>
3240 Script Info: | </html>
3241 Script Info: | tor-versions:
3242 Script Info: | HTTP/1.1 400 Bad Request
3243 Script Info: | Server: cloudflare
3244 Script Info: | Date: Tue, 31 Mar 2020 04:45:23 GMT
3245 Script Info: | Content-Type: text/html
3246 Script Info: | Content-Length: 155
3247 Script Info: | Connection: close
3248 Script Info: | CF-RAY: -
3249 Script Info: | <html>
3250 Script Info: | <head><title>400 Bad Request</title></head>
3251 Script Info: | <body>
3252 Script Info: | <center><h1>400 Bad Request</h1></center>
3253 Script Info: | <hr><center>cloudflare</center>
3254 Script Info: | </body>
3255 Script Info: |_ </html>
3256 Script Info: |_http-server-header: cloudflare
3257 Script Info: |_http-title: 403 Forbidden
3258 Script Info: | ssl-cert: Subject: commonName=*.myshopify.com/organizationName=CloudFlare, Inc./stateOrProvinceName=CA/countryName=US
3259 Script Info: | Subject Alternative Name: DNS:myshopify.com, DNS:*.myshopify.com
3260 Script Info: | Issuer: commonName=CloudFlare Inc ECC CA-2/organizationName=CloudFlare, Inc./stateOrProvinceName=CA/countryName=US
3261 Script Info: | Public Key type: ec
3262 Script Info: | Public Key bits: 256
3263 Script Info: | Signature Algorithm: ecdsa-with-SHA256
3264 Script Info: | Not valid before: 2019-05-02T00:00:00
3265 Script Info: | Not valid after: 2020-05-02T12:00:00
3266 Script Info: | MD5: fe65 4aba cdcd ccaf a90d 23a3 d4f1 32ac
3267 Script Info: |_SHA-1: 8381 f18f 5e77 f549 a0f0 3adf 21d7 a486 0b73 85ac
3268 Script Info: |_ssl-date: 2020-03-31T04:45:48+00:00; -2s from scanner time.
3269 Script Info: | tls-alpn:
3270 Script Info: | h2
3271 Script Info: |_ http/1.1
3272 Script Info: | tls-nextprotoneg:
3273 Script Info: | h2
3274 Script Info: |_ http/1.1
3275 Port: 8080/tcp open http-proxy syn-ack ttl 59 cloudflare
3276 Script Info: | fingerprint-strings:
3277 Script Info: | FourOhFourRequest:
3278 Script Info: | HTTP/1.1 400 Bad Request
3279 Script Info: | Date: Tue, 31 Mar 2020 04:45:16 GMT
3280 Script Info: | Content-Type: text/html
3281 Script Info: | Content-Length: 155
3282 Script Info: | Connection: close
3283 Script Info: | Server: cloudflare
3284 Script Info: | CF-RAY: 57c76b841bb9fa54-AMS
3285 Script Info: | <html>
3286 Script Info: | <head><title>400 Bad Request</title></head>
3287 Script Info: | <body>
3288 Script Info: | <center><h1>400 Bad Request</h1></center>
3289 Script Info: | <hr><center>cloudflare</center>
3290 Script Info: | </body>
3291 Script Info: | </html>
3292 Script Info: | GetRequest:
3293 Script Info: | HTTP/1.1 400 Bad Request
3294 Script Info: | Date: Tue, 31 Mar 2020 04:45:16 GMT
3295 Script Info: | Content-Type: text/html
3296 Script Info: | Content-Length: 155
3297 Script Info: | Connection: close
3298 Script Info: | Server: cloudflare
3299 Script Info: | CF-RAY: 57c76b800d5a9d36-AMS
3300 Script Info: | <html>
3301 Script Info: | <head><title>400 Bad Request</title></head>
3302 Script Info: | <body>
3303 Script Info: | <center><h1>400 Bad Request</h1></center>
3304 Script Info: | <hr><center>cloudflare</center>
3305 Script Info: | </body>
3306 Script Info: | </html>
3307 Script Info: | HTTPOptions:
3308 Script Info: | HTTP/1.1 400 Bad Request
3309 Script Info: | Date: Tue, 31 Mar 2020 04:45:16 GMT
3310 Script Info: | Content-Type: text/html
3311 Script Info: | Content-Length: 155
3312 Script Info: | Connection: close
3313 Script Info: | Server: cloudflare
3314 Script Info: | CF-RAY: 57c76b816a842b38-AMS
3315 Script Info: | <html>
3316 Script Info: | <head><title>400 Bad Request</title></head>
3317 Script Info: | <body>
3318 Script Info: | <center><h1>400 Bad Request</h1></center>
3319 Script Info: | <hr><center>cloudflare</center>
3320 Script Info: | </body>
3321 Script Info: | </html>
3322 Script Info: | RTSPRequest:
3323 Script Info: | <html>
3324 Script Info: | <head><title>400 Bad Request</title></head>
3325 Script Info: | <body>
3326 Script Info: | <center><h1>400 Bad Request</h1></center>
3327 Script Info: | <hr><center>cloudflare</center>
3328 Script Info: | </body>
3329 Script Info: | </html>
3330 Script Info: | Socks4, Socks5:
3331 Script Info: | HTTP/1.1 400 Bad Request
3332 Script Info: | Server: cloudflare
3333 Script Info: | Date: Tue, 31 Mar 2020 04:45:17 GMT
3334 Script Info: | Content-Type: text/html
3335 Script Info: | Content-Length: 155
3336 Script Info: | Connection: close
3337 Script Info: | CF-RAY: -
3338 Script Info: | <html>
3339 Script Info: | <head><title>400 Bad Request</title></head>
3340 Script Info: | <body>
3341 Script Info: | <center><h1>400 Bad Request</h1></center>
3342 Script Info: | <hr><center>cloudflare</center>
3343 Script Info: | </body>
3344 Script Info: |_ </html>
3345 Script Info: |_http-server-header: cloudflare
3346 Script Info: |_http-title: Site doesn't have a title (text/plain; charset=UTF-8).
3347 Port: 8443/tcp open ssl/https-alt syn-ack ttl 59 cloudflare
3348 Script Info: | fingerprint-strings:
3349 Script Info: | DNSVersionBindReqTCP, RPCCheck:
3350 Script Info: | HTTP/1.1 400 Bad Request
3351 Script Info: | Server: cloudflare
3352 Script Info: | Date: Tue, 31 Mar 2020 04:45:29 GMT
3353 Script Info: | Content-Type: text/html
3354 Script Info: | Content-Length: 155
3355 Script Info: | Connection: close
3356 Script Info: | CF-RAY: -
3357 Script Info: | <html>
3358 Script Info: | <head><title>400 Bad Request</title></head>
3359 Script Info: | <body>
3360 Script Info: | <center><h1>400 Bad Request</h1></center>
3361 Script Info: | <hr><center>cloudflare</center>
3362 Script Info: | </body>
3363 Script Info: | </html>
3364 Script Info: | FourOhFourRequest:
3365 Script Info: | HTTP/1.1 403 Forbidden
3366 Script Info: | Server: cloudflare
3367 Script Info: | Date: Tue, 31 Mar 2020 04:45:23 GMT
3368 Script Info: | Content-Type: text/html
3369 Script Info: | Content-Length: 151
3370 Script Info: | Connection: close
3371 Script Info: | CF-RAY: 57c76bad0db9d92d-AMS
3372 Script Info: | <html>
3373 Script Info: | <head><title>403 Forbidden</title></head>
3374 Script Info: | <body>
3375 Script Info: | <center><h1>403 Forbidden</h1></center>
3376 Script Info: | <hr><center>cloudflare</center>
3377 Script Info: | </body>
3378 Script Info: | </html>
3379 Script Info: | GetRequest:
3380 Script Info: | HTTP/1.1 403 Forbidden
3381 Script Info: | Server: cloudflare
3382 Script Info: | Date: Tue, 31 Mar 2020 04:45:22 GMT
3383 Script Info: | Content-Type: text/html
3384 Script Info: | Content-Length: 151
3385 Script Info: | Connection: close
3386 Script Info: | CF-RAY: 57c76ba7af2d727b-AMS
3387 Script Info: | <html>
3388 Script Info: | <head><title>403 Forbidden</title></head>
3389 Script Info: | <body>
3390 Script Info: | <center><h1>403 Forbidden</h1></center>
3391 Script Info: | <hr><center>cloudflare</center>
3392 Script Info: | </body>
3393 Script Info: | </html>
3394 Script Info: | HTTPOptions:
3395 Script Info: | HTTP/1.1 403 Forbidden
3396 Script Info: | Server: cloudflare
3397 Script Info: | Date: Tue, 31 Mar 2020 04:45:22 GMT
3398 Script Info: | Content-Type: text/html
3399 Script Info: | Content-Length: 151
3400 Script Info: | Connection: close
3401 Script Info: | CF-RAY: 57c76baa68cafa40-AMS
3402 Script Info: | <html>
3403 Script Info: | <head><title>403 Forbidden</title></head>
3404 Script Info: | <body>
3405 Script Info: | <center><h1>403 Forbidden</h1></center>
3406 Script Info: | <hr><center>cloudflare</center>
3407 Script Info: | </body>
3408 Script Info: | </html>
3409 Script Info: | RTSPRequest:
3410 Script Info: | <html>
3411 Script Info: | <head><title>400 Bad Request</title></head>
3412 Script Info: | <body>
3413 Script Info: | <center><h1>400 Bad Request</h1></center>
3414 Script Info: | <hr><center>cloudflare</center>
3415 Script Info: | </body>
3416 Script Info: |_ </html>
3417 Script Info: |_http-server-header: cloudflare
3418 Script Info: |_http-title: 403 Forbidden
3419 Script Info: | ssl-cert: Subject: commonName=*.myshopify.com/organizationName=CloudFlare, Inc./stateOrProvinceName=CA/countryName=US
3420 Script Info: | Subject Alternative Name: DNS:myshopify.com, DNS:*.myshopify.com
3421 Script Info: | Issuer: commonName=CloudFlare Inc ECC CA-2/organizationName=CloudFlare, Inc./stateOrProvinceName=CA/countryName=US
3422 Script Info: | Public Key type: ec
3423 Script Info: | Public Key bits: 256
3424 Script Info: | Signature Algorithm: ecdsa-with-SHA256
3425 Script Info: | Not valid before: 2019-05-02T00:00:00
3426 Script Info: | Not valid after: 2020-05-02T12:00:00
3427 Script Info: | MD5: fe65 4aba cdcd ccaf a90d 23a3 d4f1 32ac
3428 Script Info: |_SHA-1: 8381 f18f 5e77 f549 a0f0 3adf 21d7 a486 0b73 85ac
3429 Script Info: |_ssl-date: 2020-03-31T04:45:48+00:00; -2s from scanner time.
3430 Script Info: | tls-alpn:
3431 Script Info: | h2
3432 Script Info: |_ http/1.1
3433 Script Info: | tls-nextprotoneg:
3434 Script Info: | h2
3435 Script Info: |_ http/1.1
3436 IP: 80.169.89.96
3437 HostName: www1.cityoflondon.gov.uk. Type: A
3438 Country: United Kingdom
3439 Is Active: False
3440 IP: 104.47.20.36
3441 HostName: cityoflondon-gov-uk.mail.protection.outlook.com Type: MX
3442 HostName: mail-cwlgbr010036.inbound.protection.outlook.com Type: PTR
3443 Country: United Kingdom
3444 Is Active: True (syn-ack ttl 112)
3445 Port: 25/tcp open smtp syn-ack ttl 112 Microsoft Exchange smtpd
3446 Script Info: | smtp-commands: CWLGBR01FT007.mail.protection.outlook.com Hello [45.131.5.15], SIZE 157286400, PIPELINING, DSN, ENHANCEDSTATUSCODES, STARTTLS, 8BITMIME, BINARYMIME, CHUNKING, SMTPUTF8,
3447 Script Info: |_ This server supports the following commands: HELO EHLO STARTTLS RCPT DATA RSET MAIL QUIT HELP AUTH BDAT
3448 Script Info: | ssl-cert: Subject: commonName=mail.protection.outlook.com/organizationName=Microsoft Corporation/stateOrProvinceName=Washington/countryName=US
3449 Script Info: | Subject Alternative Name: DNS:mail.protection.outlook.com, DNS:*.mail.eo.outlook.com, DNS:*.mail.protection.outlook.com, DNS:mail.messaging.microsoft.com, DNS:outlook.com, DNS:*.olc.protection.outlook.com, DNS:*.pamx1.hotmail.com
3450 Script Info: | Issuer: commonName=GlobalSign Organization Validation CA - SHA256 - G3/organizationName=GlobalSign nv-sa/countryName=BE
3451 Script Info: | Public Key type: rsa
3452 Script Info: | Public Key bits: 2048
3453 Script Info: | Signature Algorithm: sha256WithRSAEncryption
3454 Script Info: | Not valid before: 2020-02-24T18:33:10
3455 Script Info: | Not valid after: 2022-02-24T18:33:10
3456 Script Info: | MD5: 4f90 9eee 29eb abe5 e29a d55e 8c08 c310
3457 Script Info: |_SHA-1: ea85 9504 40a6 97c1 8482 3304 a7dc 19e5 fcd5 8e6b
3458 Script Info: |_ssl-date: 2020-03-31T04:46:05+00:00; -1s from scanner time.
3459 Os Info: Host: CWLGBR01FT007.mail.protection.outlook.com; OS: Windows; CPE: cpe:/o:microsoft:windows
3460 Script Info: |_clock-skew: -1s
3461
3462--------------End Summary --------------
3463-----------------------------------------
3464##############################################################################################################################
3465[+] searching (sub)domains for cityoflondon.gov.uk using built-in wordlist
3466[+] using maximum random delay of 10 millisecond(s) between requests
3467
3468cn.cityoflondon.gov.uk
3469IP address #1: 80.169.89.102
3470
3471demo.cityoflondon.gov.uk
3472IP address #1: 80.169.89.101
3473
3474email.cityoflondon.gov.uk
3475IP address #1: 91.206.118.10
3476
3477m.cityoflondon.gov.uk
3478IP address #1: 80.169.89.82
3479
3480mobile.cityoflondon.gov.uk
3481IP address #1: 80.169.89.102
3482
3483news.cityoflondon.gov.uk
3484IP address #1: 18.203.123.9
3485IP address #2: 52.50.147.113
3486IP address #3: 52.31.6.52
3487
3488remote.cityoflondon.gov.uk
3489IP address #1: 52.59.241.213
3490
3491shop.cityoflondon.gov.uk
3492IP address #1: 23.227.38.32
3493
3494staging.cityoflondon.gov.uk
3495IPv6 address #1: 2606:4700:10::6816:ea6
3496IPv6 address #2: 2606:4700:10::6816:fa6
3497
3498staging.cityoflondon.gov.uk
3499IP address #1: 104.22.14.166
3500IP address #2: 104.22.15.166
3501
3502vpn.cityoflondon.gov.uk
3503IP address #1: 86.54.176.2
3504
3505www.cityoflondon.gov.uk
3506IP address #1: 80.169.89.102
3507
3508www1.cityoflondon.gov.uk
3509IP address #1: 80.169.89.96
3510
3511www2.cityoflondon.gov.uk
3512IP address #1: 80.169.89.98
3513
3514[+] 14 (sub)domains and 18 IP address(es) found
3515[+] completion time: 956 second(s)
3516###############################################################################################################################
3517----- cityoflondon.gov.uk -----
3518
3519
3520Host's addresses:
3521__________________
3522
3523cityoflondon.gov.uk. 300 IN A 80.169.89.102
3524
3525
3526Name Servers:
3527______________
3528
3529treasure.ns.cloudflare.com. 86400 IN A 162.159.38.116
3530jake.ns.cloudflare.com. 86400 IN A 173.245.59.122
3531
3532
3533Mail (MX) Servers:
3534___________________
3535
3536cityoflondon-gov-uk.mail.protection.outlook.com. 10 IN A 104.47.21.36
3537cityoflondon-gov-uk.mail.protection.outlook.com. 10 IN A 104.47.20.36
3538
3539
3540
3541Google Results:
3542________________
3543
3544democracy.cityoflondon.gov.uk. 300 IN A 80.169.89.107
3545fyi.cityoflondon.gov.uk. 299 IN CNAME (
3546fyi.cityoflondon.gov.uk.openobjects.com. 3599 IN CNAME (
3547search4.openobjects.com. 3599 IN A 193.34.187.147
3548
3549
3550Brute forcing with /usr/share/dnsenum/dns.txt:
3551_______________________________________________
3552
3553apps.cityoflondon.gov.uk. 300 IN A 80.169.89.106
3554ext.cityoflondon.gov.uk. 300 IN A 80.169.89.106
3555jobs.cityoflondon.gov.uk. 300 IN A 104.22.15.166
3556jobs.cityoflondon.gov.uk. 300 IN A 104.22.14.166
3557mail1.cityoflondon.gov.uk. 300 IN A 80.169.89.80
3558mail2.cityoflondon.gov.uk. 300 IN A 80.169.89.106
3559mobile.cityoflondon.gov.uk. 300 IN A 80.169.89.102
3560news.cityoflondon.gov.uk. 300 IN CNAME ssl-client.presspage.com.
3561ssl-client.presspage.com. 60 IN A 18.203.123.9
3562ssl-client.presspage.com. 60 IN A 52.31.6.52
3563ssl-client.presspage.com. 60 IN A 52.50.147.113
3564shop.cityoflondon.gov.uk. 260 IN A 23.227.38.32
3565vpn.cityoflondon.gov.uk. 300 IN A 86.54.176.2
3566www.cityoflondon.gov.uk. 77 IN A 80.169.89.102
3567www2.cityoflondon.gov.uk. 300 IN A 80.169.89.98
3568
3569
3570Launching Whois Queries:
3571_________________________
3572
3573 whois ip result: 23.227.38.0 -> 23.227.32.0/19
3574 whois ip result: 86.54.176.0 -> 86.54.176.0/29
3575 whois ip result: 104.22.14.0 -> 104.16.0.0/12
3576 whois ip result: 80.169.89.0 -> 80.169.89.0/30
3577
3578
3579cityoflondon.gov.uk___________________
3580
3581 80.169.89.0/30
3582 86.54.176.0/29
3583 104.16.0.0/12
3584 23.227.32.0/19
3585###############################################################################################################################
3586URLCrazy Domain Report
3587Domain : www.cityoflondon.gov.uk
3588Keyboard : qwerty
3589At : 2020-03-31 00:30:34 -0400
3590
3591# Please wait. 228 hostnames to process
3592
3593Typo Type Typo DNS-A CC-A DNS-MX Extn
3594-----------------------------------------------------------------------------------------------------------------------------------------------------------------------
3595Character Omission ww.cityoflondon.gov.uk ? gov.uk
3596Character Omission www.citoflondon.gov.uk ? gov.uk
3597Character Omission www.cityflondon.gov.uk ? gov.uk
3598Character Omission www.cityoflndon.gov.uk ? gov.uk
3599Character Omission www.cityoflodon.gov.uk ? gov.uk
3600Character Omission www.cityoflondn.gov.uk ? gov.uk
3601Character Omission www.cityoflondo.gov.uk ? gov.uk
3602Character Omission www.cityoflonon.gov.uk ? gov.uk
3603Character Omission www.cityofondon.gov.uk ? gov.uk
3604Character Omission www.cityolondon.gov.uk ? gov.uk
3605Character Omission www.ciyoflondon.gov.uk ? gov.uk
3606Character Omission www.ctyoflondon.gov.uk ? gov.uk
3607Character Omission www.ityoflondon.gov.uk ? gov.uk
3608Character Omission wwwcityoflondon.gov.uk ? gov.uk
3609Character Repeat www.ccityoflondon.gov.uk ? gov.uk
3610Character Repeat www.ciityoflondon.gov.uk ? gov.uk
3611Character Repeat www.cittyoflondon.gov.uk ? gov.uk
3612Character Repeat www.cityofflondon.gov.uk ? gov.uk
3613Character Repeat www.cityofllondon.gov.uk ? gov.uk
3614Character Repeat www.cityoflonddon.gov.uk ? gov.uk
3615Character Repeat www.cityoflondonn.gov.uk ? gov.uk
3616Character Repeat www.cityoflondoon.gov.uk ? gov.uk
3617Character Repeat www.cityoflonndon.gov.uk ? gov.uk
3618Character Repeat www.cityofloondon.gov.uk ? gov.uk
3619Character Repeat www.cityooflondon.gov.uk ? gov.uk
3620Character Repeat www.cityyoflondon.gov.uk ? gov.uk
3621Character Repeat wwww.cityoflondon.gov.uk ? gov.uk
3622Character Swap ww.wcityoflondon.gov.uk ? gov.uk
3623Character Swap www.citoyflondon.gov.uk ? gov.uk
3624Character Swap www.cityfolondon.gov.uk ? gov.uk
3625Character Swap www.cityoflnodon.gov.uk ? gov.uk
3626Character Swap www.cityoflodnon.gov.uk ? gov.uk
3627Character Swap www.cityoflondno.gov.uk ? gov.uk
3628Character Swap www.cityoflonodn.gov.uk ? gov.uk
3629Character Swap www.cityofolndon.gov.uk ? gov.uk
3630Character Swap www.cityolfondon.gov.uk ? gov.uk
3631Character Swap www.ciytoflondon.gov.uk ? gov.uk
3632Character Swap www.ctiyoflondon.gov.uk ? gov.uk
3633Character Swap www.ictyoflondon.gov.uk ? gov.uk
3634Character Swap wwwc.ityoflondon.gov.uk ? gov.uk
3635Character Replacement eww.cityoflondon.gov.uk ? gov.uk
3636Character Replacement qww.cityoflondon.gov.uk ? gov.uk
3637Character Replacement wew.cityoflondon.gov.uk ? gov.uk
3638Character Replacement wqw.cityoflondon.gov.uk ? gov.uk
3639Character Replacement wwe.cityoflondon.gov.uk ? gov.uk
3640Character Replacement wwq.cityoflondon.gov.uk ? gov.uk
3641Character Replacement www.ciryoflondon.gov.uk ? gov.uk
3642Character Replacement www.cittoflondon.gov.uk ? gov.uk
3643Character Replacement www.cituoflondon.gov.uk ? gov.uk
3644Character Replacement www.cityiflondon.gov.uk ? gov.uk
3645Character Replacement www.cityodlondon.gov.uk ? gov.uk
3646Character Replacement www.cityofkondon.gov.uk ? gov.uk
3647Character Replacement www.cityoflindon.gov.uk ? gov.uk
3648Character Replacement www.cityoflobdon.gov.uk ? gov.uk
3649Character Replacement www.cityoflomdon.gov.uk ? gov.uk
3650Character Replacement www.cityoflondin.gov.uk ? gov.uk
3651Character Replacement www.cityoflondob.gov.uk ? gov.uk
3652Character Replacement www.cityoflondom.gov.uk ? gov.uk
3653Character Replacement www.cityoflondpn.gov.uk ? gov.uk
3654Character Replacement www.cityoflonfon.gov.uk ? gov.uk
3655Character Replacement www.cityoflonson.gov.uk ? gov.uk
3656Character Replacement www.cityoflpndon.gov.uk ? gov.uk
3657Character Replacement www.cityoglondon.gov.uk ? gov.uk
3658Character Replacement www.citypflondon.gov.uk ? gov.uk
3659Character Replacement www.ciyyoflondon.gov.uk ? gov.uk
3660Character Replacement www.cotyoflondon.gov.uk ? gov.uk
3661Character Replacement www.cutyoflondon.gov.uk ? gov.uk
3662Character Replacement www.vityoflondon.gov.uk ? gov.uk
3663Character Replacement www.xityoflondon.gov.uk ? gov.uk
3664Double Character Replacement eew.cityoflondon.gov.uk ? gov.uk
3665Double Character Replacement qqw.cityoflondon.gov.uk ? gov.uk
3666Double Character Replacement wee.cityoflondon.gov.uk ? gov.uk
3667Double Character Replacement wqq.cityoflondon.gov.uk ? gov.uk
3668Character Insertion weww.cityoflondon.gov.uk ? gov.uk
3669Character Insertion wqww.cityoflondon.gov.uk ? gov.uk
3670Character Insertion wwew.cityoflondon.gov.uk ? gov.uk
3671Character Insertion wwqw.cityoflondon.gov.uk ? gov.uk
3672Character Insertion www.ciotyoflondon.gov.uk ? gov.uk
3673Character Insertion www.citryoflondon.gov.uk ? gov.uk
3674Character Insertion www.cityofdlondon.gov.uk ? gov.uk
3675Character Insertion www.cityofglondon.gov.uk ? gov.uk
3676Character Insertion www.cityoflkondon.gov.uk ? gov.uk
3677Character Insertion www.cityofloindon.gov.uk ? gov.uk
3678Character Insertion www.cityoflonbdon.gov.uk ? gov.uk
3679Character Insertion www.cityoflondfon.gov.uk ? gov.uk
3680Character Insertion www.cityoflondoin.gov.uk ? gov.uk
3681Character Insertion www.cityoflondonb.gov.uk ? gov.uk
3682Character Insertion www.cityoflondonm.gov.uk ? gov.uk
3683Character Insertion www.cityoflondopn.gov.uk ? gov.uk
3684Character Insertion www.cityoflondson.gov.uk ? gov.uk
3685Character Insertion www.cityoflonmdon.gov.uk ? gov.uk
3686Character Insertion www.cityoflopndon.gov.uk ? gov.uk
3687Character Insertion www.cityoiflondon.gov.uk ? gov.uk
3688Character Insertion www.cityopflondon.gov.uk ? gov.uk
3689Character Insertion www.citytoflondon.gov.uk ? gov.uk
3690Character Insertion www.cityuoflondon.gov.uk ? gov.uk
3691Character Insertion www.ciutyoflondon.gov.uk ? gov.uk
3692Character Insertion www.cvityoflondon.gov.uk ? gov.uk
3693Character Insertion www.cxityoflondon.gov.uk ? gov.uk
3694Character Insertion wwwe.cityoflondon.gov.uk ? gov.uk
3695Character Insertion wwwq.cityoflondon.gov.uk ? gov.uk
3696Missing Dot wwwwww.cityoflondon.gov.uk ? gov.uk
3697Singular or Pluralise cityoflondon.gov.uk 80.169.89.102 GB,UNITED KINGDOM cityoflondon-gov-uk.mail.protection.outlook.com gov.uk
3698Singular or Pluralise cityoflondons.gov.uk ? gov.uk
3699Vowel Swap www.catyoflondon.gov.uk ? gov.uk
3700Vowel Swap www.cetyoflondon.gov.uk ? gov.uk
3701Homophones www.cayetyoflondon.gov.uk ? gov.uk
3702Homophones www.ceyetyoflondon.gov.uk ? gov.uk
3703Homophones www.cityoflondewn.gov.uk ? gov.uk
3704Homophones www.cityoflonduen.gov.uk ? gov.uk
3705Homophones www.cityoflowndon.gov.uk ? gov.uk
3706Bit Flipping 7ww.cityoflondon.gov.uk ? gov.uk
3707Bit Flipping gww.cityoflondon.gov.uk ? gov.uk
3708Bit Flipping sww.cityoflondon.gov.uk ? gov.uk
3709Bit Flipping uww.cityoflondon.gov.uk ? gov.uk
3710Bit Flipping vww.cityoflondon.gov.uk ? gov.uk
3711Bit Flipping w7w.cityoflondon.gov.uk ? gov.uk
3712Bit Flipping wgw.cityoflondon.gov.uk ? gov.uk
3713Bit Flipping wsw.cityoflondon.gov.uk ? gov.uk
3714Bit Flipping wuw.cityoflondon.gov.uk ? gov.uk
3715Bit Flipping wvw.cityoflondon.gov.uk ? gov.uk
3716Bit Flipping ww7.cityoflondon.gov.uk ? gov.uk
3717Bit Flipping wwg.cityoflondon.gov.uk ? gov.uk
3718Bit Flipping wws.cityoflondon.gov.uk ? gov.uk
3719Bit Flipping wwu.cityoflondon.gov.uk ? gov.uk
3720Bit Flipping wwv.cityoflondon.gov.uk ? gov.uk
3721Bit Flipping www.aityoflondon.gov.uk ? gov.uk
3722Bit Flipping www.bityoflondon.gov.uk ? gov.uk
3723Bit Flipping www.chtyoflondon.gov.uk ? gov.uk
3724Bit Flipping www.ci4yoflondon.gov.uk ? gov.uk
3725Bit Flipping www.cidyoflondon.gov.uk ? gov.uk
3726Bit Flipping www.cipyoflondon.gov.uk ? gov.uk
3727Bit Flipping www.cit9oflondon.gov.uk ? gov.uk
3728Bit Flipping www.citioflondon.gov.uk ? gov.uk
3729Bit Flipping www.citqoflondon.gov.uk ? gov.uk
3730Bit Flipping www.citxoflondon.gov.uk ? gov.uk
3731Bit Flipping www.citygflondon.gov.uk ? gov.uk
3732Bit Flipping www.citykflondon.gov.uk ? gov.uk
3733Bit Flipping www.citymflondon.gov.uk ? gov.uk
3734Bit Flipping www.citynflondon.gov.uk ? gov.uk
3735Bit Flipping www.cityoblondon.gov.uk ? gov.uk
3736Bit Flipping www.cityofdondon.gov.uk ? gov.uk
3737Bit Flipping www.cityofhondon.gov.uk ? gov.uk
3738Bit Flipping www.cityoflgndon.gov.uk ? gov.uk
3739Bit Flipping www.cityoflkndon.gov.uk ? gov.uk
3740Bit Flipping www.cityoflmndon.gov.uk ? gov.uk
3741Bit Flipping www.cityoflnndon.gov.uk ? gov.uk
3742Bit Flipping www.cityoflo.don.gov.uk ? gov.uk
3743Bit Flipping www.cityoflofdon.gov.uk ? gov.uk
3744Bit Flipping www.cityoflojdon.gov.uk ? gov.uk
3745Bit Flipping www.cityofloldon.gov.uk ? gov.uk
3746Bit Flipping www.cityoflondgn.gov.uk ? gov.uk
3747Bit Flipping www.cityoflondkn.gov.uk ? gov.uk
3748Bit Flipping www.cityoflondmn.gov.uk ? gov.uk
3749Bit Flipping www.cityoflondnn.gov.uk ? gov.uk
3750Bit Flipping www.cityoflondof.gov.uk ? gov.uk
3751Bit Flipping www.cityoflondoj.gov.uk ? gov.uk
3752Bit Flipping www.cityoflondol.gov.uk ? gov.uk
3753Bit Flipping www.cityoflondon.gov.tk ? tk
3754Bit Flipping www.cityoflondoo.gov.uk ? gov.uk
3755Bit Flipping www.cityofloneon.gov.uk ? gov.uk
3756Bit Flipping www.cityoflonlon.gov.uk ? gov.uk
3757Bit Flipping www.cityoflonton.gov.uk ? gov.uk
3758Bit Flipping www.cityofloodon.gov.uk ? gov.uk
3759Bit Flipping www.cityofmondon.gov.uk ? gov.uk
3760Bit Flipping www.cityofnondon.gov.uk ? gov.uk
3761Bit Flipping www.cityonlondon.gov.uk ? gov.uk
3762Bit Flipping www.cityovlondon.gov.uk ? gov.uk
3763Bit Flipping www.ciuyoflondon.gov.uk ? gov.uk
3764Bit Flipping www.civyoflondon.gov.uk ? gov.uk
3765Bit Flipping www.cktyoflondon.gov.uk ? gov.uk
3766Bit Flipping www.cmtyoflondon.gov.uk ? gov.uk
3767Bit Flipping www.cytyoflondon.gov.uk ? gov.uk
3768Bit Flipping www.gityoflondon.gov.uk ? gov.uk
3769Bit Flipping www.kityoflondon.gov.uk ? gov.uk
3770Bit Flipping www.sityoflondon.gov.uk ? gov.uk
3771Bit Flipping wwwncityoflondon.gov.uk ? gov.uk
3772Homoglyphs vvvvvv.cityoflondon.gov.uk ? gov.uk
3773Homoglyphs vvvvw.cityoflondon.gov.uk ? gov.uk
3774Homoglyphs vvwvv.cityoflondon.gov.uk ? gov.uk
3775Homoglyphs vvww.cityoflondon.gov.uk ? gov.uk
3776Homoglyphs wvvvv.cityoflondon.gov.uk ? gov.uk
3777Homoglyphs wvvw.cityoflondon.gov.uk ? gov.uk
3778Homoglyphs wwvv.cityoflondon.gov.uk ? gov.uk
3779Homoglyphs www.city0fl0nd0n.gov.uk ? gov.uk
3780Homoglyphs www.city0fl0ndon.gov.uk ? gov.uk
3781Homoglyphs www.city0flond0n.gov.uk ? gov.uk
3782Homoglyphs www.city0flondon.gov.uk ? gov.uk
3783Homoglyphs www.cityof1ondon.gov.uk ? gov.uk
3784Homoglyphs www.cityofl0nd0n.gov.uk ? gov.uk
3785Homoglyphs www.cityofl0ndon.gov.uk ? gov.uk
3786Homoglyphs www.cityoflonclon.gov.uk ? gov.uk
3787Homoglyphs www.cityoflond0n.gov.uk ? gov.uk
3788Homoglyphs www.cltyoflondon.gov.uk ? gov.uk
3789Wrong TLD cityoflondon.ca 69.172.201.153 US,UNITED STATES mx247.in-mx.com ca
3790Wrong TLD cityoflondon.ch ? ch
3791Wrong TLD cityoflondon.com 212.124.206.2 GB,UNITED KINGDOM com
3792Wrong TLD cityoflondon.de 69.12.74.201 CO,COLOMBIA de
3793Wrong TLD cityoflondon.edu ? edu
3794Wrong TLD cityoflondon.es 69.172.201.153 US,UNITED STATES mx247.in-mx.net es
3795Wrong TLD cityoflondon.fr ? fr
3796Wrong TLD cityoflondon.it 185.53.178.7 mail.h-email.net it
3797Wrong TLD cityoflondon.jp ? jp
3798Wrong TLD cityoflondon.net ? net
3799Wrong TLD cityoflondon.nl ? nl
3800Wrong TLD cityoflondon.no ? no
3801Wrong TLD cityoflondon.org 212.227.53.126 DE,GERMANY mail.cityoflondon.org org
3802Wrong TLD cityoflondon.ru ? ru
3803Wrong TLD cityoflondon.se ? se
3804Wrong TLD cityoflondon.us ? us
3805Wrong SLD cityoflondon.ac.uk ? ac.uk
3806Wrong SLD cityoflondon.bl.uk ? bl.uk
3807Wrong SLD cityoflondon.british-library.uk ? british-library.uk
3808Wrong SLD cityoflondon.co.uk 87.117.232.10 GB,UNITED KINGDOM mail.adsonline.co.uk co.uk
3809Wrong SLD cityoflondon.icnet.uk ? icnet.uk
3810Wrong SLD cityoflondon.jet.uk ? jet.uk
3811Wrong SLD cityoflondon.ltd.uk ? ltd.uk
3812Wrong SLD cityoflondon.me.uk ? me.uk
3813Wrong SLD cityoflondon.mod.uk ? mod.uk
3814Wrong SLD cityoflondon.net.uk ? net.uk
3815Wrong SLD cityoflondon.nhs.uk ? mail.nhs.uk nhs.uk
3816Wrong SLD cityoflondon.nic.uk ? nic.uk
3817Wrong SLD cityoflondon.nls.uk ? nls.uk
3818Wrong SLD cityoflondon.org.uk 87.117.232.10 GB,UNITED KINGDOM mail.adsonline.co.uk org.uk
3819Wrong SLD cityoflondon.parliament.uk ? parliament.uk
3820Wrong SLD cityoflondon.plc.uk ? plc.uk
3821Wrong SLD cityoflondon.police.uk ? pnn-gw.pnn.police.uk police.uk
3822Wrong SLD cityoflondon.sch.uk ? sch.uk
3823###############################################################################################################################
3824------------------------------------------------------------------------------------------------------------------------------
3825 [x] Error downloading /advanced_search
3826[3/25] https://www.cityoflondon.gov.uk/propertysearch/resourcefiles/pdf/epc-4chiswellst.pdf
3827 [x] Error in PDF metadata Creator
3828[4/25] https://www.cityoflondon.gov.uk/propertysearch/resourcefiles/pdf/epc-eastcheap2-4.pdf
3829 [x] Error in PDF metadata Creator
3830[5/25] http://www.cityoflondon.gov.uk/jobs/Documents/Previous_Pension_Rights_form.pdf
3831[6/25] https://www.cityoflondon.gov.uk/jobs/Documents/TrainingRoomsLocationMap.pdf
3832[7/25] https://www.cityoflondon.gov.uk/propertysearch/resourcefiles/pdf/38CharterhouseStreet.pdf
3833[8/25] https://www.cityoflondon.gov.uk/about-our-website/Documents/complaint_form.pdf
3834 [x] Error downloading https://www.cityoflondon.gov.uk/about-our-website/Documents/complaint_form.pdf
3835[9/25] https://www.cityoflondon.gov.uk/training/old/Documents/security-policy.pdf
3836[10/25] https://www.cityoflondon.gov.uk/propertysearch/resourcefiles/pdf/38charterhouse-offices-epccert-0660-0831-4750-5509-3006.pdf
3837[11/25] https://www.cityoflondon.gov.uk/propertysearch/resourcefiles/pdf/76-78FleetSt.pdf
3838[12/25] http://www.cityoflondon.gov.uk/propertysearch/resourcefiles/pdf/38charterhouse-bar-retail-epccert-0983-3039-0211-0200-6705.pdf
3839[13/25] https://www.cityoflondon.gov.uk/jobs/Documents/Job-Information-Pack-GS496.pdf
3840 [x] Error in the parsing process
3841[14/25] https://www.cityoflondon.gov.uk/business/licensing/Documents/street-trading-policy.pdf
3842 [x] Error in the parsing process
3843[15/25] https://www.cityoflondon.gov.uk/business/licensing/Documents/hmo-standards-2019.pdf
3844 [x] Error in the parsing process
3845[16/25] https://www.cityoflondon.gov.uk/jobs/Documents/Job-Information-Pack-CLSG143.pdf
3846 [x] Error in the parsing process
3847[17/25] https://www.cityoflondon.gov.uk/jobs/Documents/Job-Information-Pack-TC776.pdf
3848[18/25] https://www.cityoflondon.gov.uk/jobs/Documents/Job-Information-Pack-TC750.pdf
3849[19/25] https://www.cityoflondon.gov.uk/jobs/Documents/Job-Information-Pack-TC745.pdf
3850 [x] Error in the parsing process
3851[20/25] https://www.cityoflondon.gov.uk/jobs/Documents/Project-Coordintaor-Background-Information.pdf
3852[21/25] https://www.cityoflondon.gov.uk/jobs/Documents/Job-Information-Pack-CCS614.pdf
3853[22/25] https://www.cityoflondon.gov.uk/jobs/Documents/Job-Information-Pack-TC753.pdf
3854[23/25] https://www.cityoflondon.gov.uk/jobs/Documents/Job-Information-Pack-OS477.pdf
3855 [x] Error in the parsing process
3856[24/25] https://www.cityoflondon.gov.uk/jobs/Documents/Job-Information-Pack-LC750.pdf
3857[25/25] https://www.cityoflondon.gov.uk/jobs/Documents/Job-Information-Pack-OS482.pdf
3858------------------------------------------------------------------------------------------------------------------------------
3859
3860[+] List of users found:
3861--------------------------
3862DCMS
3863PRO117
3864laptopuser
3865Shelley Bower
3866London Metropolitan Archives
3867BRE
3868readk
3869Louise Mankowska
3870Sylvia Kelcher;City of London Corporation
3871
3872[+] List of software found:
3873-----------------------------
3874Microsoft Word 9.0
3875iText 1.4.8 (by lowagie.com)
3876Adobe PDF Library 10.0
3877Acrobat PDFMaker 10.0 for Word
3878Adobe PDF Library 9.0
3879Adobe InDesign CS4 (6.0.4)
3880��Microsoft� Word 2010
3881Haru Free PDF Library 2.0.8
3882EPCgen
3883��Microsoft� Word for Office 365
3884Microsoft� Word for Office 365
3885Microsoft Excel
3886
3887[+] List of paths and servers found:
3888---------------------------------------
3889'C:\Bala\A_\A_42-4 Application to vary a premises licence.doc'
3890'L:\Alcohol Licensing\Unit\Unit Tested Application Forms\Local Authority Version\A_42-4 Application to vary a premises licence.doc'
3891'F:\AutoRecovery save of A_42-4 Application to vary a premises licence.asd'
3892'L:\Alcohol Licensing\Unit\Live Application Forms\Local Authority Version\A_42-4 Application to vary a premises licence.doc'
3893'L:\Alcohol Licensing\Unit\Live Application Forms\Public version\P_42-4 Application to vary a premises licence.doc'
3894'G:\Licensing\REGULATIONS CONSULTATION\FINAL REGULATIONS\forms\050228 Forms final\premises licences and club certificates\P_Website\P_42-4 Application to vary a premises licence.doc'
3895 Dot 42 4.dot
3896
3897[+] List of e-mails found:
3898----------------------------
3899pensions@cityoflondon.gov.uk
3900londonagency@fleurets.com.
3901londonagency@fleurets.com
3902ask.lma@cityoflondon.gov.uk
3903Rob.Macnab@knightfrank.com
3904Davies@knightfrank.com
3905cru@cityoflondon.gov.uk
3906###############################################################################################################################
3907aldersgateward.org.uk
3908dowgateward.org.uk
3909cityofsport.org
3910guildhall-art-gallery.org.uk
3911towerbridge.org
3912towerbridge.eu
3913bassishawward.org.uk
3914bluebadgelondon.org.uk
3915cityacademies.co.uk
3916cityoflondonchina.cn
3917tomlinsoninquest.org.uk
3918towerward.org.uk
3919cripplegateward.org.uk
3920cityoflondon.gov.uk
3921keatshouse.org.uk
3922towerbridgeexhibition.org
3923visitthecity.co.uk
3924cityoflondon.police.uk
3925bridgehousegrants.org.uk
3926towerbridge.net
3927towerbridgeexhibition.info
3928##############################################################################################################################
3929[+] www.cityoflondon.gov.uk has no SPF record!
3930[*] No DMARC record found. Looking for organizational record
3931[*] Found organizational DMARC record:
3932[*] v=DMARC1;p=reject;sp=reject;pct=100;rua=mailto:dmarc-rua@dmarc.service.gov.uk
3933[-] Organizational subdomain policy explicitly set to reject
3934[-] Spoofing not possible for www.cityoflondon.gov.uk
3935###############################################################################################################################
3936WARNING: Duplicate port number(s) specified. Are you alert enough to be using Nmap? Have some coffee or Jolt(tm).
3937Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-31 00:35 EDT
3938Nmap scan report for www.cityoflondon.gov.uk (80.169.89.102)
3939Host is up (0.12s latency).
3940Not shown: 494 filtered ports
3941Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
3942PORT STATE SERVICE
394380/tcp open http
3944443/tcp open https
3945
3946Nmap done: 1 IP address (1 host up) scanned in 7.21 seconds
3947###############################################################################################################################
3948Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-31 00:35 EDT
3949Nmap scan report for www.cityoflondon.gov.uk (80.169.89.102)
3950Host is up.
3951
3952PORT STATE SERVICE
395353/udp open|filtered domain
395467/udp open|filtered dhcps
395568/udp open|filtered dhcpc
395669/udp open|filtered tftp
395788/udp open|filtered kerberos-sec
3958123/udp open|filtered ntp
3959137/udp open|filtered netbios-ns
3960138/udp open|filtered netbios-dgm
3961139/udp open|filtered netbios-ssn
3962161/udp open|filtered snmp
3963162/udp open|filtered snmptrap
3964389/udp open|filtered ldap
3965500/udp open|filtered isakmp
3966520/udp open|filtered route
39672049/udp open|filtered nfs
3968
3969Nmap done: 1 IP address (1 host up) scanned in 5.23 seconds
3970##############################################################################################################################
3971HTTP/1.1 301 Moved Permanently
3972Location: https://www.cityoflondon.gov.uk/
3973Server: COL-VMW-M-LB02
3974Cache-Control: no-cache
3975Connection: close
3976###############################################################################################################################
3977/about-our-website/Pages/accessibility.aspx
3978/about-our-website/Pages/Cookies.aspx
3979/about-our-website/Pages/cookies.aspx
3980/about-our-website/Pages/legal-notices.aspx
3981/about-our-website/Pages/legal-notices.aspx#socialmedia
3982/about-our-website/Pages/mobile.aspx
3983/about-our-website/Pages/privacy-notice.aspx
3984/about-our-website/Pages/social-media.aspx
3985/about-our-website/sitemap.aspx
3986/about-the-city/about-us/Pages/default.aspx
3987/about-the-city/about-us/Pages/how-to-find-us.aspx
3988/about-the-city/Pages/default.aspx
3989/about-the-city/PublishingImages/about-explore.jpg
3990/about-the-city/PublishingImages/pins-on-map.jpg
3991/about-the-city/voting-elections/Pages/default.aspx
3992/about-the-city/voting-elections/PublishingImages/voting.jpg
3993/business/business-rates/Pages/default.aspx
3994/business/Pages/default.aspx
3995/business/PublishingImages/business-people.jpg
3996/business/support-promotion-and-advice/Pages/covid-19-advice-for-businesses.aspx
3997/business/support-promotion-and-advice/Pages/support-relief-efforts-COVID-19.aspx
3998/business/support-promotion-and-advice/PublishingImages/covid-19-businesses-advice.jpg
3999/business/tenders-and-procurement/pages/responsible-procurement.aspx
4000/contact-us/Pages/default.aspx
4001/events/Pages/default.aspx
4002http://email.cityoflondon.gov.uk/linkapp/cmasubs.aspx?LinkID=pageid986790jkkzhq%40f%40f%40n9qh%40z%40f%40n9qh%40f%40f
4003http://email.cityoflondon.gov.uk/linkapp/cmasubs.aspx?LinkID=pageid986790jkkzhq@f@f@n9qh@z@f@n9qh@f@f
4004http://news.cityoflondon.gov.uk/
4005https://careers.cityoflondon.gov.uk/
4006https://news.cityoflondon.gov.uk/covid19-city-corporation-encourages-people-to-follow-new-government-instructions-on-parks/
4007https://news.cityoflondon.gov.uk/square-mile-businesses-offered-additional-rental-relief/
4008https://twitter.com/cityoflondon
4009https://www.facebook.com/CityofLondonCorp
4010https://www.youtube.com/user/CityofLondonvideos/videos
4011http://www.barbican.org.uk/
4012http://www.citybridgetrust.org.uk/
4013http://www.cityoflondon.police.uk/
4014http://www.towerbridge.org.uk/
4015http://www.w3.org/1999/xhtml
4016/_layouts/col/shop.aspx
4017/maps/Pages/geocortex-redirect.aspx
4018/maps/Pages/interactive-maps.aspx
4019/Pages/default.aspx
4020/report-pay-apply/Pages/report-pay-apply.aspx
4021/search/Pages/a-to-z.aspx
4022/services/health-and-wellbeing/Pages/covid-19.aspx
4023/services/health-and-wellbeing/PublishingImages/covid-19-residents.jpg
4024/services/Pages/default.aspx
4025/services/transport-and-streets/parking/Pages/covid-19-parking-and-driving-in-the-city.aspx
4026/services/transport-and-streets/roads-highways-and-pavements/Pages/current-road-closures-works-and-events.aspx
4027/services/transport-and-streets/roads-highways-and-pavements/PublishingImages/street-closures-130x86.jpg
4028/SiteCollectionImages/icons/icon-calendar.png
4029/SiteCollectionImages/icons/icon-eshot.png
4030/SiteCollectionImages/icons/icon-streetworks.png
4031text/javascript
4032/things-to-do/green-spaces/Pages/default.aspx
4033/things-to-do/green-spaces/PublishingImages/city-green.jpg
4034/things-to-do/Pages/default.aspx
4035/things-to-do/visit-the-city/whats-on/Pages/default.aspx
4036/things-to-do/visit-the-city/whats-on/PublishingImages/events-bubble.jpg
4037-//W3C//DTD XHTML 1.0 Transitional//EN
4038###############################################################################################################################
4039http://www.cityoflondon.gov.uk [301 Moved Permanently] Country[UNITED KINGDOM][GB], HTTPServer[COL-VMW-M-LB02], IP[80.169.89.102], RedirectLocation[https://www.cityoflondon.gov.uk/]
4040https://www.cityoflondon.gov.uk/ [302 Found] Country[UNITED KINGDOM][GB], HTTPServer[Microsoft-IIS/7.5], IP[80.169.89.102], Microsoft-IIS[7.5], Microsoft-Sharepoint[14.0.0.7239], RedirectLocation[http://www.cityoflondon.gov.uk/Pages/default.aspx], Title[Document Moved], UncommonHeaders[sprequestguid,x-sharepointhealthscore,microsoftsharepointteamservices,x-ms-invokeapp], X-Powered-By[ASP.NET]
4041http://www.cityoflondon.gov.uk/Pages/default.aspx [301 Moved Permanently] Country[UNITED KINGDOM][GB], HTTPServer[COL-VMW-M-LB02], IP[80.169.89.102], RedirectLocation[https://www.cityoflondon.gov.uk/Pages/default.aspx]
4042https://www.cityoflondon.gov.uk/Pages/default.aspx [200 OK] ASP_NET[2.0.50727], Country[UNITED KINGDOM][GB], HTTPServer[Microsoft-IIS/7.5], IP[80.169.89.102], JQuery[1.6.2], Microsoft-IIS[7.5], Microsoft-Sharepoint[14.0.0.7239], Script[text/javascript], Title[Welcome to the City of London Corporation], UncommonHeaders[sprequestguid,x-sharepointhealthscore,microsoftsharepointteamservices,x-ms-invokeapp], X-Powered-By[ASP.NET], X-UA-Compatible[
4043###############################################################################################################################
4044
4045wig - WebApp Information Gatherer
4046
4047
4048Scanning https://www.cityoflondon.gov.uk...
4049_____________________________________ SITE INFO _____________________________________
4050IP Title
405180.169.89.102 Welcome to the City of London Corporation
4052
4053______________________________________ VERSION ______________________________________
4054Name Versions Type
4055SharePoint 14.0.0.7239 CMS
4056ASP.NET 2.0.50727 Platform
4057IIS 7.5 Platform
4058Microsoft Windows Server 2008 R2 OS
4059
4060____________________________________ INTERESTING ____________________________________
4061URL Note Type
4062/_layouts/help.aspx SharePoint Help Page Interesting
4063
4064_______________________________________ TOOLS _______________________________________
4065Name Link Software
4066sparty https://github.com/alias1/sparty SharePoint
4067spscan https://github.com/toddsiegel/spscan SharePoint
4068Sharepoint URL Brute http://www.bishopfox.com/download/414/ SharePoint
4069
4070_____________________________________________________________________________________
4071Time: 37.7 sec Urls: 216 Fingerprints: 40401
4072###############################################################################################################################
4073Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-31 00:37 EDT
4074NSE: Loaded 161 scripts for scanning.
4075NSE: Script Pre-scanning.
4076Initiating NSE at 00:37
4077Completed NSE at 00:37, 0.00s elapsed
4078Initiating NSE at 00:37
4079Completed NSE at 00:37, 0.00s elapsed
4080Initiating Parallel DNS resolution of 1 host. at 00:37
4081Completed Parallel DNS resolution of 1 host. at 00:37, 0.02s elapsed
4082Initiating SYN Stealth Scan at 00:37
4083Scanning www.cityoflondon.gov.uk (80.169.89.102) [1 port]
4084Discovered open port 80/tcp on 80.169.89.102
4085Completed SYN Stealth Scan at 00:37, 0.16s elapsed (1 total ports)
4086Initiating Service scan at 00:37
4087Scanning 1 service on www.cityoflondon.gov.uk (80.169.89.102)
4088Completed Service scan at 00:39, 127.62s elapsed (1 service on 1 host)
4089Initiating OS detection (try #1) against www.cityoflondon.gov.uk (80.169.89.102)
4090Retrying OS detection (try #2) against www.cityoflondon.gov.uk (80.169.89.102)
4091Initiating Traceroute at 00:39
4092Completed Traceroute at 00:39, 0.23s elapsed
4093Initiating Parallel DNS resolution of 10 hosts. at 00:39
4094Completed Parallel DNS resolution of 10 hosts. at 00:39, 0.16s elapsed
4095NSE: Script scanning 80.169.89.102.
4096Initiating NSE at 00:39
4097Completed NSE at 00:40, 89.72s elapsed
4098Initiating NSE at 00:40
4099Completed NSE at 00:40, 1.13s elapsed
4100Nmap scan report for www.cityoflondon.gov.uk (80.169.89.102)
4101Host is up (0.11s latency).
4102
4103PORT STATE SERVICE VERSION
410480/tcp open http COL-VMW-M-LB02
4105| fingerprint-strings:
4106| FourOhFourRequest:
4107| HTTP/1.1 301 Moved Permanently
4108| Location: https:///nice%20ports%2C/Tri%6Eity.txt%2ebak
4109| Server: COL-VMW-M-LB02
4110| Cache-Control: no-cache
4111| Connection: close
4112| GenericLines:
4113| HTTP/1.1 301 Moved Permanently
4114| Location: https://
4115| Server: COL-VMW-M-LB02
4116| Cache-Control: no-cache
4117| Connection: close
4118| GetRequest, HTTPOptions, RTSPRequest:
4119| HTTP/1.1 301 Moved Permanently
4120| Location: https:///
4121| Server: COL-VMW-M-LB02
4122| Cache-Control: no-cache
4123| Connection: close
4124| SIPOptions:
4125| HTTP/1.1 301 Moved Permanently
4126| Location: https://sip:nm
4127| Server: COL-VMW-M-LB02
4128| Cache-Control: no-cache
4129|_ Connection: close
4130| http-brute:
4131|_ Path "/" does not require authentication
4132|_http-chrono: Request times for /; avg: 510.15ms; min: 455.02ms; max: 562.86ms
4133|_http-csrf: Couldn't find any CSRF vulnerabilities.
4134|_http-devframework: Couldn't determine the underlying framework or CMS. Try increasing 'httpspider.maxpagecount' value to spider more pages.
4135|_http-dombased-xss: Couldn't find any DOM based XSS.
4136|_http-drupal-enum: Nothing found amongst the top 100 resources,use --script-args number=<number|all> for deeper analysis)
4137|_http-errors: Couldn't find any error pages.
4138|_http-feed: Couldn't find any feeds.
4139|_http-fetch: Please enter the complete path of the directory to save data in.
4140| http-headers:
4141| Location: https://www.cityoflondon.gov.uk/
4142| Server: COL-VMW-M-LB02
4143| Cache-Control: no-cache
4144| Connection: close
4145|
4146|_ (Request type: GET)
4147|_http-jsonp-detection: Couldn't find any JSONP endpoints.
4148| http-methods:
4149|_ Supported Methods: GET HEAD POST OPTIONS
4150|_http-mobileversion-checker: No mobile version detected.
4151|_http-passwd: ERROR: Script execution failed (use -d to debug)
4152| http-security-headers:
4153| Cache_Control:
4154|_ Header: Cache-Control: no-cache
4155|_http-server-header: COL-VMW-M-LB02
4156| http-sitemap-generator:
4157| Directory structure:
4158| Longest directory structure:
4159| Depth: 0
4160| Dir: /
4161| Total files found (by extension):
4162|_
4163|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
4164|_http-title: Did not follow redirect to https://www.cityoflondon.gov.uk/
4165| http-vhosts:
4166|_127 names had status 301
4167|_http-wordpress-enum: Nothing found amongst the top 100 resources,use --script-args search-limit=<number|all> for deeper analysis)
4168|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
4169| http-xssed:
4170|
4171| UNFIXED XSS vuln.
4172|
4173| http://www.cityoflondon.gov.uk/cgi-bin/semaphoreserver.exe?CMD=search.run&SAVEDB=col&SAVEQUERY00=%22<br>%3e%3cscript%3ealert%28'C1c4Tr1Z'%29%3c/script%3e&SAVESTYPE=simple&SAVEORGANISE_CODED=:F9&B2=I1disab<br>ility&PROP00=t%3Di&QUERY01=disability&B2_DESC=Disability&PROP01=P%3DI1%2CS%3Dnone%2CZ%3Don&THES_REC=<br>1222&TBDB=col_taxonomy&HIDECONCEPT=1
4174|
4175| http://www.cityoflondon.gov.uk/cgi-bin/select.exe
4176|
4177|_
4178|_https-redirect: ERROR: Script execution failed (use -d to debug)
41791 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
4180SF-Port80-TCP:V=7.80%I=7%D=3/31%Time=5E82C900%P=x86_64-pc-linux-gnu%r(GetR
4181SF:equest,7B,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nLocation:\x20htt
4182SF:ps:///\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20no-cache\r\nCo
4183SF:nnection:\x20close\r\n\r\n")%r(HTTPOptions,7B,"HTTP/1\.1\x20301\x20Move
4184SF:d\x20Permanently\r\nLocation:\x20https:///\r\nServer:\x20COL-VMW-M-LB02
4185SF:\r\nCache-Control:\x20no-cache\r\nConnection:\x20close\r\n\r\n")%r(RTSP
4186SF:Request,7B,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nLocation:\x20ht
4187SF:tps:///\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20no-cache\r\nC
4188SF:onnection:\x20close\r\n\r\n")%r(FourOhFourRequest,9E,"HTTP/1\.1\x20301\
4189SF:x20Moved\x20Permanently\r\nLocation:\x20https:///nice%20ports%2C/Tri%6E
4190SF:ity\.txt%2ebak\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20no-cac
4191SF:he\r\nConnection:\x20close\r\n\r\n")%r(GenericLines,7A,"HTTP/1\.1\x2030
4192SF:1\x20Moved\x20Permanently\r\nLocation:\x20https://\r\nServer:\x20COL-VM
4193SF:W-M-LB02\r\nCache-Control:\x20no-cache\r\nConnection:\x20close\r\n\r\n"
4194SF:)%r(SIPOptions,80,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nLocation
4195SF::\x20https://sip:nm\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20n
4196SF:o-cache\r\nConnection:\x20close\r\n\r\n");
4197Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
4198Device type: general purpose|firewall|storage-misc
4199Running (JUST GUESSING): Linux 2.6.X|3.X (90%), WatchGuard Fireware 11.X (89%), Synology DiskStation Manager 5.X (88%)
4200OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3.10 cpe:/o:watchguard:fireware:11.8 cpe:/o:linux:linux_kernel cpe:/a:synology:diskstation_manager:5.1
4201Aggressive OS guesses: Linux 2.6.32 (90%), Linux 2.6.39 (90%), Linux 3.10 (89%), Linux 3.4 (89%), WatchGuard Fireware 11.8 (89%), Linux 3.1 - 3.2 (89%), Synology DiskStation Manager 5.1 (88%), Linux 2.6.32 or 3.10 (87%), Linux 2.6.32 - 2.6.39 (85%)
4202No exact OS matches for host (test conditions non-ideal).
4203Uptime guess: 0.188 days (since Mon Mar 30 20:10:15 2020)
4204Network Distance: 12 hops
4205TCP Sequence Prediction: Difficulty=262 (Good luck!)
4206IP ID Sequence Generation: All zeros
4207
4208TRACEROUTE (using port 80/tcp)
4209HOP RTT ADDRESS
42101 105.93 ms 10.203.9.1
42112 106.02 ms 45.131.5.3
42123 106.01 ms 109.236.95.226
42134 106.90 ms 109.236.95.173
42145 107.47 ms et-0-0-1-pr2.AMS.router.colt.net (80.249.208.236)
42156 188.37 ms xe0-3-0-sar18.LON.router.colt.net (212.74.68.145)
42167 112.44 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
42178 112.41 ms cpeuk_lon002520.ia.colt.net (80.169.196.38)
42189 112.47 ms 195.110.81.4
421910 113.39 ms 195.110.81.4
422011 111.90 ms 195.110.81.4
422112 116.12 ms 80.169.89.102
4222
4223NSE: Script Post-scanning.
4224Initiating NSE at 00:40
4225Completed NSE at 00:40, 0.00s elapsed
4226Initiating NSE at 00:40
4227Completed NSE at 00:40, 0.00s elapsed
4228Read data files from: /usr/bin/../share/nmap
4229###############################################################################################################################
4230------------------------------------------------------------------------------------------------------------------------
4231
4232[ ! ] Starting SCANNER INURLBR 2.1 at [31-03-2020 00:41:22]
4233[ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
4234It is the end user's responsibility to obey all applicable local, state and federal laws.
4235Developers assume no liability and are not responsible for any misuse or damage caused by this program
4236
4237[ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.cityoflondon.gov.uk/output/inurlbr-www.cityoflondon.gov.uk ]
4238[ INFO ][ DORK ]::[ site:www.cityoflondon.gov.uk ]
4239[ INFO ][ SEARCHING ]:: {
4240[ INFO ][ ENGINE ]::[ GOOGLE - www.google.co.tz ]
4241
4242[ INFO ][ SEARCHING ]::
4243-[:::]
4244[ INFO ][ ENGINE ]::[ GOOGLE API ]
4245
4246[ INFO ][ SEARCHING ]::
4247-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
4248[ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.com.sv ID: 012873187529719969291:yexdhbzntue ]
4249
4250[ INFO ][ SEARCHING ]::
4251-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
4252
4253[ INFO ][ TOTAL FOUND VALUES ]:: [ 100 ]
4254
4255
4256 _[ - ]::--------------------------------------------------------------------------------------------------------------
4257|_[ + ] [ 0 / 100 ]-[00:41:39] [ - ]
4258|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/ ]
4259|_[ + ] Exploit::
4260|_[ + ] Information Server:: HTTP/1.1 302 Redirect, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4261|_[ + ] More details:: / - / , ISP:
4262|_[ + ] Found:: UNIDENTIFIED
4263
4264 _[ - ]::--------------------------------------------------------------------------------------------------------------
4265|_[ + ] [ 1 / 100 ]-[00:41:40] [ - ]
4266|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/newsplan/ ]
4267|_[ + ] Exploit::
4268|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4269|_[ + ] More details:: / - / , ISP:
4270|_[ + ] Found:: UNIDENTIFIED
4271
4272 _[ - ]::--------------------------------------------------------------------------------------------------------------
4273|_[ + ] [ 2 / 100 ]-[00:41:41] [ - ]
4274|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/propertysearch/results.aspx ]
4275|_[ + ] Exploit::
4276|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4277|_[ + ] More details:: / - / , ISP:
4278|_[ + ] Found:: UNIDENTIFIED
4279
4280 _[ - ]::--------------------------------------------------------------------------------------------------------------
4281|_[ + ] [ 3 / 100 ]-[00:41:42] [ - ]
4282|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/barbicansongindex/ ]
4283|_[ + ] Exploit::
4284|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4285|_[ + ] More details:: / - / , ISP:
4286|_[ + ] Found:: UNIDENTIFIED
4287
4288 _[ - ]::--------------------------------------------------------------------------------------------------------------
4289|_[ + ] [ 4 / 100 ]-[00:41:44] [ - ]
4290|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx ]
4291|_[ + ] Exploit::
4292|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4293|_[ + ] More details:: / - / , ISP:
4294|_[ + ] Found:: UNIDENTIFIED
4295
4296 _[ - ]::--------------------------------------------------------------------------------------------------------------
4297|_[ + ] [ 5 / 100 ]-[00:41:49] [ - ]
4298|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/Pages/default.aspx ]
4299|_[ + ] Exploit::
4300|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4301|_[ + ] More details:: / - / , ISP:
4302|_[ + ] Found:: UNIDENTIFIED
4303
4304 _[ - ]::--------------------------------------------------------------------------------------------------------------
4305|_[ + ] [ 6 / 100 ]-[00:41:50] [ - ]
4306|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/_layouts/col/basket.aspx ]
4307|_[ + ] Exploit::
4308|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4309|_[ + ] More details:: / - / , ISP:
4310|_[ + ] Found:: UNIDENTIFIED
4311
4312 _[ - ]::--------------------------------------------------------------------------------------------------------------
4313|_[ + ] [ 7 / 100 ]-[00:41:52] [ - ]
4314|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/contact-us/Pages/default.aspx ]
4315|_[ + ] Exploit::
4316|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4317|_[ + ] More details:: / - / , ISP:
4318|_[ + ] Found:: UNIDENTIFIED
4319
4320 _[ - ]::--------------------------------------------------------------------------------------------------------------
4321|_[ + ] [ 8 / 100 ]-[00:41:54] [ - ]
4322|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-our-website/Pages/default.aspx ]
4323|_[ + ] Exploit::
4324|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4325|_[ + ] More details:: / - / , ISP:
4326|_[ + ] Found:: UNIDENTIFIED
4327
4328 _[ - ]::--------------------------------------------------------------------------------------------------------------
4329|_[ + ] [ 9 / 100 ]-[00:41:56] [ - ]
4330|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/Pages/estate-services.aspx ]
4331|_[ + ] Exploit::
4332|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4333|_[ + ] More details:: / - / , ISP:
4334|_[ + ] Found:: UNIDENTIFIED
4335
4336 _[ - ]::--------------------------------------------------------------------------------------------------------------
4337|_[ + ] [ 10 / 100 ]-[00:41:59] [ - ]
4338|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/licensing/gambling/Pages/default.aspx ]
4339|_[ + ] Exploit::
4340|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4341|_[ + ] More details:: / - / , ISP:
4342|_[ + ] Found:: UNIDENTIFIED
4343
4344 _[ - ]::--------------------------------------------------------------------------------------------------------------
4345|_[ + ] [ 11 / 100 ]-[00:42:01] [ - ]
4346|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/Pages/homeowner-leaseholder.aspx ]
4347|_[ + ] Exploit::
4348|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4349|_[ + ] More details:: / - / , ISP:
4350|_[ + ] Found:: UNIDENTIFIED
4351
4352 _[ - ]::--------------------------------------------------------------------------------------------------------------
4353|_[ + ] [ 12 / 100 ]-[00:42:02] [ - ]
4354|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-our-website/Pages/accessibility.aspx ]
4355|_[ + ] Exploit::
4356|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4357|_[ + ] More details:: / - / , ISP:
4358|_[ + ] Found:: UNIDENTIFIED
4359
4360 _[ - ]::--------------------------------------------------------------------------------------------------------------
4361|_[ + ] [ 13 / 100 ]-[00:42:04] [ - ]
4362|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/council-tax/Pages/default.aspx ]
4363|_[ + ] Exploit::
4364|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4365|_[ + ] More details:: / - / , ISP:
4366|_[ + ] Found:: UNIDENTIFIED
4367
4368 _[ - ]::--------------------------------------------------------------------------------------------------------------
4369|_[ + ] [ 14 / 100 ]-[00:42:06] [ - ]
4370|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/licensing/Pages/street-trading.aspx ]
4371|_[ + ] Exploit::
4372|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4373|_[ + ] More details:: / - / , ISP:
4374|_[ + ] Found:: UNIDENTIFIED
4375
4376 _[ - ]::--------------------------------------------------------------------------------------------------------------
4377|_[ + ] [ 15 / 100 ]-[00:42:10] [ - ]
4378|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/asia-programme/Pages/default.aspx ]
4379|_[ + ] Exploit::
4380|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4381|_[ + ] More details:: / - / , ISP:
4382|_[ + ] Found:: UNIDENTIFIED
4383
4384 _[ - ]::--------------------------------------------------------------------------------------------------------------
4385|_[ + ] [ 16 / 100 ]-[00:42:14] [ - ]
4386|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/business-rates/Pages/default.aspx ]
4387|_[ + ] Exploit::
4388|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4389|_[ + ] More details:: / - / , ISP:
4390|_[ + ] Found:: UNIDENTIFIED
4391
4392 _[ - ]::--------------------------------------------------------------------------------------------------------------
4393|_[ + ] [ 17 / 100 ]-[00:42:16] [ - ]
4394|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-our-website/Pages/Cookies.aspx ]
4395|_[ + ] Exploit::
4396|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4397|_[ + ] More details:: / - / , ISP:
4398|_[ + ] Found:: UNIDENTIFIED
4399
4400 _[ - ]::--------------------------------------------------------------------------------------------------------------
4401|_[ + ] [ 18 / 100 ]-[00:42:18] [ - ]
4402|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/business-rates/Pages/contact.aspx ]
4403|_[ + ] Exploit::
4404|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4405|_[ + ] More details:: / - / , ISP:
4406|_[ + ] Found:: UNIDENTIFIED
4407
4408 _[ - ]::--------------------------------------------------------------------------------------------------------------
4409|_[ + ] [ 19 / 100 ]-[00:42:21] [ - ]
4410|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/Pages/default.aspx ]
4411|_[ + ] Exploit::
4412|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4413|_[ + ] More details:: / - / , ISP:
4414|_[ + ] Found:: UNIDENTIFIED
4415
4416 _[ - ]::--------------------------------------------------------------------------------------------------------------
4417|_[ + ] [ 20 / 100 ]-[00:42:23] [ - ]
4418|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?start1=13 ]
4419|_[ + ] Exploit::
4420|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4421|_[ + ] More details:: / - / , ISP:
4422|_[ + ] Found:: UNIDENTIFIED
4423
4424 _[ - ]::--------------------------------------------------------------------------------------------------------------
4425|_[ + ] [ 21 / 100 ]-[00:42:24] [ - ]
4426|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/business-rates/Pages/payment.aspx ]
4427|_[ + ] Exploit::
4428|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4429|_[ + ] More details:: / - / , ISP:
4430|_[ + ] Found:: UNIDENTIFIED
4431
4432 _[ - ]::--------------------------------------------------------------------------------------------------------------
4433|_[ + ] [ 22 / 100 ]-[00:42:27] [ - ]
4434|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/environmental-health/Pages/default.aspx ]
4435|_[ + ] Exploit::
4436|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4437|_[ + ] More details:: / - / , ISP:
4438|_[ + ] Found:: UNIDENTIFIED
4439
4440 _[ - ]::--------------------------------------------------------------------------------------------------------------
4441|_[ + ] [ 23 / 100 ]-[00:42:29] [ - ]
4442|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Today ]
4443|_[ + ] Exploit::
4444|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4445|_[ + ] More details:: / - / , ISP:
4446|_[ + ] Found:: UNIDENTIFIED
4447
4448 _[ - ]::--------------------------------------------------------------------------------------------------------------
4449|_[ + ] [ 24 / 100 ]-[00:42:30] [ - ]
4450|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/search/Pages/a-to-z.aspx ]
4451|_[ + ] Exploit::
4452|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4453|_[ + ] More details:: / - / , ISP:
4454|_[ + ] Found:: UNIDENTIFIED
4455
4456 _[ - ]::--------------------------------------------------------------------------------------------------------------
4457|_[ + ] [ 25 / 100 ]-[00:42:32] [ - ]
4458|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-our-website/Pages/mobile.aspx ]
4459|_[ + ] Exploit::
4460|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4461|_[ + ] More details:: / - / , ISP:
4462|_[ + ] Found:: UNIDENTIFIED
4463
4464 _[ - ]::--------------------------------------------------------------------------------------------------------------
4465|_[ + ] [ 26 / 100 ]-[00:42:34] [ - ]
4466|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/filming/Pages/permissions.aspx ]
4467|_[ + ] Exploit::
4468|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4469|_[ + ] More details:: / - / , ISP:
4470|_[ + ] Found:: UNIDENTIFIED
4471
4472 _[ - ]::--------------------------------------------------------------------------------------------------------------
4473|_[ + ] [ 27 / 100 ]-[00:42:36] [ - ]
4474|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Aug-2019 ]
4475|_[ + ] Exploit::
4476|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4477|_[ + ] More details:: / - / , ISP:
4478|_[ + ] Found:: UNIDENTIFIED
4479
4480 _[ - ]::--------------------------------------------------------------------------------------------------------------
4481|_[ + ] [ 28 / 100 ]-[00:42:38] [ - ]
4482|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/asia-programme/india/Pages/publications.aspx ]
4483|_[ + ] Exploit::
4484|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4485|_[ + ] More details:: / - / , ISP:
4486|_[ + ] Found:: UNIDENTIFIED
4487
4488 _[ - ]::--------------------------------------------------------------------------------------------------------------
4489|_[ + ] [ 29 / 100 ]-[00:42:41] [ - ]
4490|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/Pages/tenancy-visits-programme.aspx ]
4491|_[ + ] Exploit::
4492|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4493|_[ + ] More details:: / - / , ISP:
4494|_[ + ] Found:: UNIDENTIFIED
4495
4496 _[ - ]::--------------------------------------------------------------------------------------------------------------
4497|_[ + ] [ 30 / 100 ]-[00:42:42] [ - ]
4498|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Dec-2019 ]
4499|_[ + ] Exploit::
4500|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4501|_[ + ] More details:: / - / , ISP:
4502|_[ + ] Found:: UNIDENTIFIED
4503
4504 _[ - ]::--------------------------------------------------------------------------------------------------------------
4505|_[ + ] [ 31 / 100 ]-[00:42:44] [ - ]
4506|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Jul-2018 ]
4507|_[ + ] Exploit::
4508|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4509|_[ + ] More details:: / - / , ISP:
4510|_[ + ] Found:: UNIDENTIFIED
4511
4512 _[ - ]::--------------------------------------------------------------------------------------------------------------
4513|_[ + ] [ 32 / 100 ]-[00:42:45] [ - ]
4514|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Jan-2018 ]
4515|_[ + ] Exploit::
4516|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4517|_[ + ] More details:: / - / , ISP:
4518|_[ + ] Found:: UNIDENTIFIED
4519
4520 _[ - ]::--------------------------------------------------------------------------------------------------------------
4521|_[ + ] [ 33 / 100 ]-[00:42:48] [ - ]
4522|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/Pages/pay-your-rent.aspx ]
4523|_[ + ] Exploit::
4524|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4525|_[ + ] More details:: / - / , ISP:
4526|_[ + ] Found:: UNIDENTIFIED
4527
4528 _[ - ]::--------------------------------------------------------------------------------------------------------------
4529|_[ + ] [ 34 / 100 ]-[00:42:49] [ - ]
4530|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Jan-2020 ]
4531|_[ + ] Exploit::
4532|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4533|_[ + ] More details:: / - / , ISP:
4534|_[ + ] Found:: UNIDENTIFIED
4535
4536 _[ - ]::--------------------------------------------------------------------------------------------------------------
4537|_[ + ] [ 35 / 100 ]-[00:42:51] [ - ]
4538|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Mar-2020 ]
4539|_[ + ] Exploit::
4540|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4541|_[ + ] More details:: / - / , ISP:
4542|_[ + ] Found:: UNIDENTIFIED
4543
4544 _[ - ]::--------------------------------------------------------------------------------------------------------------
4545|_[ + ] [ 36 / 100 ]-[00:42:53] [ - ]
4546|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/Pages/police-authority.aspx ]
4547|_[ + ] Exploit::
4548|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4549|_[ + ] More details:: / - / , ISP:
4550|_[ + ] Found:: UNIDENTIFIED
4551
4552 _[ - ]::--------------------------------------------------------------------------------------------------------------
4553|_[ + ] [ 37 / 100 ]-[00:42:56] [ - ]
4554|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/children-and-families/Pages/adoption.aspx ]
4555|_[ + ] Exploit::
4556|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4557|_[ + ] More details:: / - / , ISP:
4558|_[ + ] Found:: UNIDENTIFIED
4559
4560 _[ - ]::--------------------------------------------------------------------------------------------------------------
4561|_[ + ] [ 38 / 100 ]-[00:42:57] [ - ]
4562|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Nov-2017 ]
4563|_[ + ] Exploit::
4564|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4565|_[ + ] More details:: / - / , ISP:
4566|_[ + ] Found:: UNIDENTIFIED
4567
4568 _[ - ]::--------------------------------------------------------------------------------------------------------------
4569|_[ + ] [ 39 / 100 ]-[00:42:59] [ - ]
4570|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/adult-social-care/Pages/carers.aspx ]
4571|_[ + ] Exploit::
4572|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4573|_[ + ] More details:: / - / , ISP:
4574|_[ + ] Found:: UNIDENTIFIED
4575
4576 _[ - ]::--------------------------------------------------------------------------------------------------------------
4577|_[ + ] [ 40 / 100 ]-[00:43:01] [ - ]
4578|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/adult-social-care/Pages/dementia.aspx ]
4579|_[ + ] Exploit::
4580|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4581|_[ + ] More details:: / - / , ISP:
4582|_[ + ] Found:: UNIDENTIFIED
4583
4584 _[ - ]::--------------------------------------------------------------------------------------------------------------
4585|_[ + ] [ 41 / 100 ]-[00:43:04] [ - ]
4586|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/asia-programme/india/Pages/default.aspx ]
4587|_[ + ] Exploit::
4588|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4589|_[ + ] More details:: / - / , ISP:
4590|_[ + ] Found:: UNIDENTIFIED
4591
4592 _[ - ]::--------------------------------------------------------------------------------------------------------------
4593|_[ + ] [ 42 / 100 ]-[00:43:06] [ - ]
4594|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/wholesale-food-markets/Pages/default.aspx ]
4595|_[ + ] Exploit::
4596|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4597|_[ + ] More details:: / - / , ISP:
4598|_[ + ] Found:: UNIDENTIFIED
4599
4600 _[ - ]::--------------------------------------------------------------------------------------------------------------
4601|_[ + ] [ 43 / 100 ]-[00:43:08] [ - ]
4602|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/barbican-estate/Pages/resident-involvement.aspx ]
4603|_[ + ] Exploit::
4604|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4605|_[ + ] More details:: / - / , ISP:
4606|_[ + ] Found:: UNIDENTIFIED
4607
4608 _[ - ]::--------------------------------------------------------------------------------------------------------------
4609|_[ + ] [ 44 / 100 ]-[00:43:10] [ - ]
4610|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/history/Pages/mayoralty.aspx ]
4611|_[ + ] Exploit::
4612|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4613|_[ + ] More details:: / - / , ISP:
4614|_[ + ] Found:: UNIDENTIFIED
4615
4616 _[ - ]::--------------------------------------------------------------------------------------------------------------
4617|_[ + ] [ 45 / 100 ]-[00:43:12] [ - ]
4618|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/pages/default.aspx?Date=Jan-2019 ]
4619|_[ + ] Exploit::
4620|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4621|_[ + ] More details:: / - / , ISP:
4622|_[ + ] Found:: UNIDENTIFIED
4623
4624 _[ - ]::--------------------------------------------------------------------------------------------------------------
4625|_[ + ] [ 46 / 100 ]-[00:43:16] [ - ]
4626|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/libraries-and-archives/Pages/default.aspx ]
4627|_[ + ] Exploit::
4628|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4629|_[ + ] More details:: / - / , ISP:
4630|_[ + ] Found:: UNIDENTIFIED
4631
4632 _[ - ]::--------------------------------------------------------------------------------------------------------------
4633|_[ + ] [ 47 / 100 ]-[00:43:21] [ - ]
4634|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/environment-and-planning/Pages/default.aspx ]
4635|_[ + ] Exploit::
4636|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4637|_[ + ] More details:: / - / , ISP:
4638|_[ + ] Found:: UNIDENTIFIED
4639
4640 _[ - ]::--------------------------------------------------------------------------------------------------------------
4641|_[ + ] [ 48 / 100 ]-[00:43:23] [ - ]
4642|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/history/Pages/ceremony.aspx ]
4643|_[ + ] Exploit::
4644|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4645|_[ + ] More details:: / - / , ISP:
4646|_[ + ] Found:: UNIDENTIFIED
4647
4648 _[ - ]::--------------------------------------------------------------------------------------------------------------
4649|_[ + ] [ 49 / 100 ]-[00:43:26] [ - ]
4650|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/things-to-do/Pages/leadenhall-market.aspx ]
4651|_[ + ] Exploit::
4652|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4653|_[ + ] More details:: / - / , ISP:
4654|_[ + ] Found:: UNIDENTIFIED
4655
4656 _[ - ]::--------------------------------------------------------------------------------------------------------------
4657|_[ + ] [ 50 / 100 ]-[00:43:28] [ - ]
4658|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/eu-and-regulation/Pages/default.aspx ]
4659|_[ + ] Exploit::
4660|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4661|_[ + ] More details:: / - / , ISP:
4662|_[ + ] Found:: UNIDENTIFIED
4663
4664 _[ - ]::--------------------------------------------------------------------------------------------------------------
4665|_[ + ] [ 51 / 100 ]-[00:43:30] [ - ]
4666|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/licensing/charity-collections/Pages/default.aspx ]
4667|_[ + ] Exploit::
4668|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4669|_[ + ] More details:: / - / , ISP:
4670|_[ + ] Found:: UNIDENTIFIED
4671
4672 _[ - ]::--------------------------------------------------------------------------------------------------------------
4673|_[ + ] [ 52 / 100 ]-[00:43:33] [ - ]
4674|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/barbican-estate/services/Pages/default.aspx ]
4675|_[ + ] Exploit::
4676|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4677|_[ + ] More details:: / - / , ISP:
4678|_[ + ] Found:: UNIDENTIFIED
4679
4680 _[ - ]::--------------------------------------------------------------------------------------------------------------
4681|_[ + ] [ 53 / 100 ]-[00:43:35] [ - ]
4682|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/environmental-health/Pages/primary-authority.aspx ]
4683|_[ + ] Exploit::
4684|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4685|_[ + ] More details:: / - / , ISP:
4686|_[ + ] Found:: UNIDENTIFIED
4687
4688 _[ - ]::--------------------------------------------------------------------------------------------------------------
4689|_[ + ] [ 54 / 100 ]-[00:43:37] [ - ]
4690|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/community-and-living/Pages/hospitals.aspx ]
4691|_[ + ] Exploit::
4692|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4693|_[ + ] More details:: / - / , ISP:
4694|_[ + ] Found:: UNIDENTIFIED
4695
4696 _[ - ]::--------------------------------------------------------------------------------------------------------------
4697|_[ + ] [ 55 / 100 ]-[00:43:41] [ - ]
4698|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/transport-and-streets/Pages/default.aspx ]
4699|_[ + ] Exploit::
4700|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4701|_[ + ] More details:: / - / , ISP:
4702|_[ + ] Found:: UNIDENTIFIED
4703
4704 _[ - ]::--------------------------------------------------------------------------------------------------------------
4705|_[ + ] [ 56 / 100 ]-[00:43:43] [ - ]
4706|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/barbican-estate/Pages/baggage-stores.aspx ]
4707|_[ + ] Exploit::
4708|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4709|_[ + ] More details:: / - / , ISP:
4710|_[ + ] Found:: UNIDENTIFIED
4711
4712 _[ - ]::--------------------------------------------------------------------------------------------------------------
4713|_[ + ] [ 57 / 100 ]-[00:43:46] [ - ]
4714|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/history/Pages/merchandise.aspx ]
4715|_[ + ] Exploit::
4716|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4717|_[ + ] More details:: / - / , ISP:
4718|_[ + ] Found:: UNIDENTIFIED
4719
4720 _[ - ]::--------------------------------------------------------------------------------------------------------------
4721|_[ + ] [ 58 / 100 ]-[00:43:48] [ - ]
4722|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/education-learning/apprenticeships/Pages/default.aspx ]
4723|_[ + ] Exploit::
4724|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4725|_[ + ] More details:: / - / , ISP:
4726|_[ + ] Found:: UNIDENTIFIED
4727
4728 _[ - ]::--------------------------------------------------------------------------------------------------------------
4729|_[ + ] [ 59 / 100 ]-[00:43:50] [ - ]
4730|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/things-to-do/keats-house/Pages/Schools.aspx ]
4731|_[ + ] Exploit::
4732|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4733|_[ + ] More details:: / - / , ISP:
4734|_[ + ] Found:: UNIDENTIFIED
4735
4736 _[ - ]::--------------------------------------------------------------------------------------------------------------
4737|_[ + ] [ 60 / 100 ]-[00:43:53] [ - ]
4738|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/mansion-house/Pages/inside.aspx ]
4739|_[ + ] Exploit::
4740|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4741|_[ + ] More details:: / - / , ISP:
4742|_[ + ] Found:: UNIDENTIFIED
4743
4744 _[ - ]::--------------------------------------------------------------------------------------------------------------
4745|_[ + ] [ 61 / 100 ]-[00:43:54] [ - ]
4746|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/children-and-families/Pages/Sofia-Simpson.aspx ]
4747|_[ + ] Exploit::
4748|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4749|_[ + ] More details:: / - / , ISP:
4750|_[ + ] Found:: UNIDENTIFIED
4751
4752 _[ - ]::--------------------------------------------------------------------------------------------------------------
4753|_[ + ] [ 62 / 100 ]-[00:43:56] [ - ]
4754|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/adult-social-care/Pages/concessionary-travel.aspx ]
4755|_[ + ] Exploit::
4756|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4757|_[ + ] More details:: / - / , ISP:
4758|_[ + ] Found:: UNIDENTIFIED
4759
4760 _[ - ]::--------------------------------------------------------------------------------------------------------------
4761|_[ + ] [ 63 / 100 ]-[00:43:58] [ - ]
4762|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/Pages/Housing-Fire-Safety-.aspx ]
4763|_[ + ] Exploit::
4764|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4765|_[ + ] More details:: / - / , ISP:
4766|_[ + ] Found:: UNIDENTIFIED
4767
4768 _[ - ]::--------------------------------------------------------------------------------------------------------------
4769|_[ + ] [ 64 / 100 ]-[00:44:00] [ - ]
4770|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/mansion-house/Pages/tours.aspx ]
4771|_[ + ] Exploit::
4772|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4773|_[ + ] More details:: / - / , ISP:
4774|_[ + ] Found:: UNIDENTIFIED
4775
4776 _[ - ]::--------------------------------------------------------------------------------------------------------------
4777|_[ + ] [ 65 / 100 ]-[00:44:02] [ - ]
4778|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/health-and-wellbeing/Pages/mental-wellbeing.aspx ]
4779|_[ + ] Exploit::
4780|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4781|_[ + ] More details:: / - / , ISP:
4782|_[ + ] Found:: UNIDENTIFIED
4783
4784 _[ - ]::--------------------------------------------------------------------------------------------------------------
4785|_[ + ] [ 66 / 100 ]-[00:44:06] [ - ]
4786|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/community-and-living/Pages/volunteering-opportunities.aspx ]
4787|_[ + ] Exploit::
4788|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4789|_[ + ] More details:: / - / , ISP:
4790|_[ + ] Found:: UNIDENTIFIED
4791
4792 _[ - ]::--------------------------------------------------------------------------------------------------------------
4793|_[ + ] [ 67 / 100 ]-[00:44:08] [ - ]
4794|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/barbican-estate/services/Pages/buildings-insurance.aspx ]
4795|_[ + ] Exploit::
4796|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4797|_[ + ] More details:: / - / , ISP:
4798|_[ + ] Found:: UNIDENTIFIED
4799
4800 _[ - ]::--------------------------------------------------------------------------------------------------------------
4801|_[ + ] [ 68 / 100 ]-[00:44:10] [ - ]
4802|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/children-and-families/Pages/Mandheep-Dasi.aspx ]
4803|_[ + ] Exploit::
4804|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4805|_[ + ] More details:: / - / , ISP:
4806|_[ + ] Found:: UNIDENTIFIED
4807
4808 _[ - ]::--------------------------------------------------------------------------------------------------------------
4809|_[ + ] [ 69 / 100 ]-[00:44:13] [ - ]
4810|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/housing-estates/Pages/middlesex-street.aspx ]
4811|_[ + ] Exploit::
4812|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4813|_[ + ] More details:: / - / , ISP:
4814|_[ + ] Found:: UNIDENTIFIED
4815
4816 _[ - ]::--------------------------------------------------------------------------------------------------------------
4817|_[ + ] [ 70 / 100 ]-[00:44:16] [ - ]
4818|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/tenders-and-procurement/Pages/contract-lists.aspx ]
4819|_[ + ] Exploit::
4820|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4821|_[ + ] More details:: / - / , ISP:
4822|_[ + ] Found:: UNIDENTIFIED
4823
4824 _[ - ]::--------------------------------------------------------------------------------------------------------------
4825|_[ + ] [ 71 / 100 ]-[00:44:18] [ - ]
4826|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/health-and-wellbeing/Pages/sexual-health.aspx ]
4827|_[ + ] Exploit::
4828|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4829|_[ + ] More details:: / - / , ISP:
4830|_[ + ] Found:: UNIDENTIFIED
4831
4832 _[ - ]::--------------------------------------------------------------------------------------------------------------
4833|_[ + ] [ 72 / 100 ]-[00:44:20] [ - ]
4834|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/health-and-wellbeing/Pages/covid-19.aspx ]
4835|_[ + ] Exploit::
4836|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4837|_[ + ] More details:: / - / , ISP:
4838|_[ + ] Found:: UNIDENTIFIED
4839
4840 _[ - ]::--------------------------------------------------------------------------------------------------------------
4841|_[ + ] [ 73 / 100 ]-[00:44:21] [ - ]
4842|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/children-and-families/Pages/Tito-Oshewa.aspx ]
4843|_[ + ] Exploit::
4844|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4845|_[ + ] More details:: / - / , ISP:
4846|_[ + ] Found:: UNIDENTIFIED
4847
4848 _[ - ]::--------------------------------------------------------------------------------------------------------------
4849|_[ + ] [ 74 / 100 ]-[00:44:24] [ - ]
4850|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/housing-estates/Pages/holloway-estate.aspx ]
4851|_[ + ] Exploit::
4852|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4853|_[ + ] More details:: / - / , ISP:
4854|_[ + ] Found:: UNIDENTIFIED
4855
4856 _[ - ]::--------------------------------------------------------------------------------------------------------------
4857|_[ + ] [ 75 / 100 ]-[00:44:27] [ - ]
4858|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/education-learning/schools/Pages/education-policies.aspx ]
4859|_[ + ] Exploit::
4860|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4861|_[ + ] More details:: / - / , ISP:
4862|_[ + ] Found:: UNIDENTIFIED
4863
4864 _[ - ]::--------------------------------------------------------------------------------------------------------------
4865|_[ + ] [ 76 / 100 ]-[00:44:29] [ - ]
4866|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/Pages/brexit.aspx ]
4867|_[ + ] Exploit::
4868|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4869|_[ + ] More details:: / - / , ISP:
4870|_[ + ] Found:: UNIDENTIFIED
4871
4872 _[ - ]::--------------------------------------------------------------------------------------------------------------
4873|_[ + ] [ 77 / 100 ]-[00:44:31] [ - ]
4874|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/voting-elections/Pages/results.aspx ]
4875|_[ + ] Exploit::
4876|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4877|_[ + ] More details:: / - / , ISP:
4878|_[ + ] Found:: UNIDENTIFIED
4879
4880 _[ - ]::--------------------------------------------------------------------------------------------------------------
4881|_[ + ] [ 78 / 100 ]-[00:44:34] [ - ]
4882|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/adult-social-care/Pages/safeguarding-adults.aspx ]
4883|_[ + ] Exploit::
4884|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4885|_[ + ] More details:: / - / , ISP:
4886|_[ + ] Found:: UNIDENTIFIED
4887
4888 _[ - ]::--------------------------------------------------------------------------------------------------------------
4889|_[ + ] [ 79 / 100 ]-[00:44:36] [ - ]
4890|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/homelessness/Pages/duty-to-refer.aspx ]
4891|_[ + ] Exploit::
4892|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4893|_[ + ] More details:: / - / , ISP:
4894|_[ + ] Found:: UNIDENTIFIED
4895
4896 _[ - ]::--------------------------------------------------------------------------------------------------------------
4897|_[ + ] [ 80 / 100 ]-[00:44:38] [ - ]
4898|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/history/Pages/temple-bar.aspx ]
4899|_[ + ] Exploit::
4900|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4901|_[ + ] More details:: / - / , ISP:
4902|_[ + ] Found:: UNIDENTIFIED
4903
4904 _[ - ]::--------------------------------------------------------------------------------------------------------------
4905|_[ + ] [ 81 / 100 ]-[00:44:40] [ - ]
4906|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/community-work/Pages/default.aspx ]
4907|_[ + ] Exploit::
4908|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4909|_[ + ] More details:: / - / , ISP:
4910|_[ + ] Found:: UNIDENTIFIED
4911
4912 _[ - ]::--------------------------------------------------------------------------------------------------------------
4913|_[ + ] [ 82 / 100 ]-[00:44:44] [ - ]
4914|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/barbican-estate/Pages/barbican-history-architecture.aspx ]
4915|_[ + ] Exploit::
4916|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4917|_[ + ] More details:: / - / , ISP:
4918|_[ + ] Found:: UNIDENTIFIED
4919
4920 _[ - ]::--------------------------------------------------------------------------------------------------------------
4921|_[ + ] [ 83 / 100 ]-[00:44:46] [ - ]
4922|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/barbican-estate/Pages/service-charge-schedules.aspx ]
4923|_[ + ] Exploit::
4924|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4925|_[ + ] More details:: / - / , ISP:
4926|_[ + ] Found:: UNIDENTIFIED
4927
4928 _[ - ]::--------------------------------------------------------------------------------------------------------------
4929|_[ + ] [ 84 / 100 ]-[00:44:48] [ - ]
4930|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/barbican-estate/Pages/barbican-estate-parking.aspx ]
4931|_[ + ] Exploit::
4932|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4933|_[ + ] More details:: / - / , ISP:
4934|_[ + ] Found:: UNIDENTIFIED
4935
4936 _[ - ]::--------------------------------------------------------------------------------------------------------------
4937|_[ + ] [ 85 / 100 ]-[00:44:50] [ - ]
4938|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/children-and-families/Pages/contact-us.aspx ]
4939|_[ + ] Exploit::
4940|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4941|_[ + ] More details:: / - / , ISP:
4942|_[ + ] Found:: UNIDENTIFIED
4943
4944 _[ - ]::--------------------------------------------------------------------------------------------------------------
4945|_[ + ] [ 86 / 100 ]-[00:44:52] [ - ]
4946|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/tenders-and-procurement/Pages/useful-links.aspx ]
4947|_[ + ] Exploit::
4948|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4949|_[ + ] More details:: / - / , ISP:
4950|_[ + ] Found:: UNIDENTIFIED
4951
4952 _[ - ]::--------------------------------------------------------------------------------------------------------------
4953|_[ + ] [ 87 / 100 ]-[00:44:55] [ - ]
4954|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/about-us/Pages/publications.aspx ]
4955|_[ + ] Exploit::
4956|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4957|_[ + ] More details:: / - / , ISP:
4958|_[ + ] Found:: UNIDENTIFIED
4959
4960 _[ - ]::--------------------------------------------------------------------------------------------------------------
4961|_[ + ] [ 88 / 100 ]-[00:44:58] [ - ]
4962|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/Pages/remembrancers.aspx ]
4963|_[ + ] Exploit::
4964|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4965|_[ + ] More details:: / - / , ISP:
4966|_[ + ] Found:: UNIDENTIFIED
4967
4968 _[ - ]::--------------------------------------------------------------------------------------------------------------
4969|_[ + ] [ 89 / 100 ]-[00:44:59] [ - ]
4970|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Next Weekend ]
4971|_[ + ] Exploit::
4972|_[ + ] Information Server:: HTTP/1.1 400 Bad Request, Server: Microsoft-HTTPAPI/2.0 , IP:80.169.89.102:443
4973|_[ + ] More details:: / - / , ISP:
4974|_[ + ] Found:: UNIDENTIFIED
4975
4976 _[ - ]::--------------------------------------------------------------------------------------------------------------
4977|_[ + ] [ 90 / 100 ]-[00:45:02] [ - ]
4978|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/port-health/environmental-control/Pages/default.aspx ]
4979|_[ + ] Exploit::
4980|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4981|_[ + ] More details:: / - / , ISP:
4982|_[ + ] Found:: UNIDENTIFIED
4983
4984 _[ - ]::--------------------------------------------------------------------------------------------------------------
4985|_[ + ] [ 91 / 100 ]-[00:45:06] [ - ]
4986|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/environment-and-planning/planning/Pages/default.aspx ]
4987|_[ + ] Exploit::
4988|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4989|_[ + ] More details:: / - / , ISP:
4990|_[ + ] Found:: UNIDENTIFIED
4991
4992 _[ - ]::--------------------------------------------------------------------------------------------------------------
4993|_[ + ] [ 92 / 100 ]-[00:45:07] [ - ]
4994|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/things-to-do/keats-house/Pages/default.aspx ]
4995|_[ + ] Exploit::
4996|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
4997|_[ + ] More details:: / - / , ISP:
4998|_[ + ] Found:: UNIDENTIFIED
4999
5000 _[ - ]::--------------------------------------------------------------------------------------------------------------
5001|_[ + ] [ 93 / 100 ]-[00:45:10] [ - ]
5002|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/wholesale-food-markets/smithfield/Pages/default.aspx ]
5003|_[ + ] Exploit::
5004|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5005|_[ + ] More details:: / - / , ISP:
5006|_[ + ] Found:: UNIDENTIFIED
5007
5008 _[ - ]::--------------------------------------------------------------------------------------------------------------
5009|_[ + ] [ 94 / 100 ]-[00:45:12] [ - ]
5010|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/asia-programme/india/Pages/mumbai-office.aspx ]
5011|_[ + ] Exploit::
5012|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5013|_[ + ] More details:: / - / , ISP:
5014|_[ + ] Found:: UNIDENTIFIED
5015
5016 _[ - ]::--------------------------------------------------------------------------------------------------------------
5017|_[ + ] [ 95 / 100 ]-[00:45:16] [ - ]
5018|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/environment-and-planning/sustainability/Pages/default.aspx ]
5019|_[ + ] Exploit::
5020|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5021|_[ + ] More details:: / - / , ISP:
5022|_[ + ] Found:: UNIDENTIFIED
5023
5024 _[ - ]::--------------------------------------------------------------------------------------------------------------
5025|_[ + ] [ 96 / 100 ]-[00:45:19] [ - ]
5026|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/licensing/gambling/Pages/Temporary-use-notices.aspx ]
5027|_[ + ] Exploit::
5028|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5029|_[ + ] More details:: / - / , ISP:
5030|_[ + ] Found:: UNIDENTIFIED
5031
5032 _[ - ]::--------------------------------------------------------------------------------------------------------------
5033|_[ + ] [ 97 / 100 ]-[00:45:20] [ - ]
5034|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/jobs/Documents/TrainingRoomsLocationMap.pdf ]
5035|_[ + ] Exploit::
5036|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5037|_[ + ] More details:: / - / , ISP:
5038|_[ + ] Found:: UNIDENTIFIED
5039
5040 _[ - ]::--------------------------------------------------------------------------------------------------------------
5041|_[ + ] [ 98 / 100 ]-[00:45:23] [ - ]
5042|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/port-health/import-controls/Pages/default.aspx ]
5043|_[ + ] Exploit::
5044|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5045|_[ + ] More details:: / - / , ISP:
5046|_[ + ] Found:: UNIDENTIFIED
5047
5048 _[ - ]::--------------------------------------------------------------------------------------------------------------
5049|_[ + ] [ 99 / 100 ]-[00:45:25] [ - ]
5050|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/financial-help-benefits/Pages/fraud.aspx ]
5051|_[ + ] Exploit::
5052|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5053|_[ + ] More details:: / - / , ISP:
5054|_[ + ] Found:: UNIDENTIFIED
5055
5056[ INFO ] [ Shutting down ]
5057[ INFO ] [ End of process INURLBR at [31-03-2020 00:45:25]
5058[ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
5059[ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.cityoflondon.gov.uk/output/inurlbr-www.cityoflondon.gov.uk ]
5060|_________________________________________________________________________________________
5061
5062\_________________________________________________________________________________________/
5063###############################################################################################################################
5064HTTP/1.1 302 Redirect
5065Content-Length: 172
5066Content-Type: text/html; charset=UTF-8
5067Location: http://www.cityoflondon.gov.uk/Pages/default.aspx
5068Server: Microsoft-IIS/7.5
5069SPRequestGuid: 6fd454ed-1997-42f7-887e-f0367a7d12c7
5070X-SharePointHealthScore: 0
5071X-Powered-By: ASP.NET
5072MicrosoftSharePointTeamServices: 14.0.0.7239
5073X-MS-InvokeApp: 1; RequireReadOnly
5074Date: Tue, 31 Mar 2020 04:49:13 GMT
5075###############################################################################################################################
5076/about-our-website/Pages/accessibility.aspx
5077/about-our-website/Pages/Cookies.aspx
5078/about-our-website/Pages/cookies.aspx
5079/about-our-website/Pages/legal-notices.aspx
5080/about-our-website/Pages/legal-notices.aspx#socialmedia
5081/about-our-website/Pages/mobile.aspx
5082/about-our-website/Pages/privacy-notice.aspx
5083/about-our-website/Pages/social-media.aspx
5084/about-our-website/sitemap.aspx
5085/about-the-city/about-us/Pages/default.aspx
5086/about-the-city/about-us/Pages/how-to-find-us.aspx
5087/about-the-city/Pages/default.aspx
5088/about-the-city/PublishingImages/about-explore.jpg
5089/about-the-city/PublishingImages/pins-on-map.jpg
5090/about-the-city/voting-elections/Pages/default.aspx
5091/about-the-city/voting-elections/PublishingImages/voting.jpg
5092/business/business-rates/Pages/default.aspx
5093/business/Pages/default.aspx
5094/business/PublishingImages/business-people.jpg
5095/business/support-promotion-and-advice/Pages/covid-19-advice-for-businesses.aspx
5096/business/support-promotion-and-advice/Pages/support-relief-efforts-COVID-19.aspx
5097/business/support-promotion-and-advice/PublishingImages/covid-19-businesses-advice.jpg
5098/business/tenders-and-procurement/pages/responsible-procurement.aspx
5099/contact-us/Pages/default.aspx
5100/events/Pages/default.aspx
5101http://email.cityoflondon.gov.uk/linkapp/cmasubs.aspx?LinkID=pageid986790jkkzhq%40f%40f%40n9qh%40z%40f%40n9qh%40f%40f
5102http://email.cityoflondon.gov.uk/linkapp/cmasubs.aspx?LinkID=pageid986790jkkzhq@f@f@n9qh@z@f@n9qh@f@f
5103http://news.cityoflondon.gov.uk/
5104https://careers.cityoflondon.gov.uk/
5105https://news.cityoflondon.gov.uk/covid19-city-corporation-encourages-people-to-follow-new-government-instructions-on-parks/
5106https://news.cityoflondon.gov.uk/square-mile-businesses-offered-additional-rental-relief/
5107https://twitter.com/cityoflondon
5108https://www.facebook.com/CityofLondonCorp
5109https://www.youtube.com/user/CityofLondonvideos/videos
5110http://www.barbican.org.uk/
5111http://www.citybridgetrust.org.uk/
5112http://www.cityoflondon.police.uk/
5113http://www.towerbridge.org.uk/
5114http://www.w3.org/1999/xhtml
5115/_layouts/col/shop.aspx
5116/maps/Pages/geocortex-redirect.aspx
5117/maps/Pages/interactive-maps.aspx
5118/Pages/default.aspx
5119/report-pay-apply/Pages/report-pay-apply.aspx
5120/search/Pages/a-to-z.aspx
5121/services/health-and-wellbeing/Pages/covid-19.aspx
5122/services/health-and-wellbeing/PublishingImages/covid-19-residents.jpg
5123/services/Pages/default.aspx
5124/services/transport-and-streets/parking/Pages/covid-19-parking-and-driving-in-the-city.aspx
5125/services/transport-and-streets/roads-highways-and-pavements/Pages/current-road-closures-works-and-events.aspx
5126/services/transport-and-streets/roads-highways-and-pavements/PublishingImages/street-closures-130x86.jpg
5127/SiteCollectionImages/icons/icon-calendar.png
5128/SiteCollectionImages/icons/icon-eshot.png
5129/SiteCollectionImages/icons/icon-streetworks.png
5130text/javascript
5131/things-to-do/green-spaces/Pages/default.aspx
5132/things-to-do/green-spaces/PublishingImages/city-green.jpg
5133/things-to-do/Pages/default.aspx
5134/things-to-do/visit-the-city/whats-on/Pages/default.aspx
5135/things-to-do/visit-the-city/whats-on/PublishingImages/events-bubble.jpg
5136-//W3C//DTD XHTML 1.0 Transitional//EN
5137##############################################################################################################################
5138https://www.cityoflondon.gov.uk [302 Found] Country[UNITED KINGDOM][GB], HTTPServer[Microsoft-IIS/7.5], IP[80.169.89.102], Microsoft-IIS[7.5], Microsoft-Sharepoint[14.0.0.7239], RedirectLocation[http://www.cityoflondon.gov.uk/Pages/default.aspx], Title[Document Moved], UncommonHeaders[sprequestguid,x-sharepointhealthscore,microsoftsharepointteamservices,x-ms-invokeapp], X-Powered-By[ASP.NET]
5139http://www.cityoflondon.gov.uk/Pages/default.aspx [301 Moved Permanently] Country[UNITED KINGDOM][GB], HTTPServer[COL-VMW-M-LB02], IP[80.169.89.102], RedirectLocation[https://www.cityoflondon.gov.uk/Pages/default.aspx]
5140https://www.cityoflondon.gov.uk/Pages/default.aspx [200 OK] ASP_NET[2.0.50727], Country[UNITED KINGDOM][GB], HTTPServer[Microsoft-IIS/7.5], IP[80.169.89.102], JQuery[1.6.2], Microsoft-IIS[7.5], Microsoft-Sharepoint[14.0.0.7239], Script[text/javascript], Title[Welcome to the City of London Corporation], UncommonHeaders[sprequestguid,x-sharepointhealthscore,microsoftsharepointteamservices,x-ms-invokeapp], X-Powered-By[ASP.NET], X-UA-Compatible[IE=9]
5141###############################################################################################################################
5142
5143wig - WebApp Information Gatherer
5144
5145
5146Scanning https://www.cityoflondon.gov.uk...
5147_____________________________________ SITE INFO _____________________________________
5148IP Title
514980.169.89.102 Welcome to the City of London Corporation
5150
5151______________________________________ VERSION ______________________________________
5152Name Versions Type
5153SharePoint 14.0.0.7239 CMS
5154ASP.NET 2.0.50727 Platform
5155IIS 7.5 Platform
5156Microsoft Windows Server 2008 R2 OS
5157
5158____________________________________ INTERESTING ____________________________________
5159URL Note Type
5160/_layouts/help.aspx SharePoint Help Page Interesting
5161
5162_______________________________________ TOOLS _______________________________________
5163Name Link Software
5164sparty https://github.com/alias1/sparty SharePoint
5165spscan https://github.com/toddsiegel/spscan SharePoint
5166Sharepoint URL Brute http://www.bishopfox.com/download/414/ SharePoint
5167
5168_____________________________________________________________________________________
5169Time: 0.9 sec Urls: 216 Fingerprints: 40401
5170###############################################################################################################################
5171 Microsoft SharePoint 14.0.0.7239
5172 IIS 7.5
5173 jQuery 1.6.2
5174 Microsoft ASP.NET
5175 Microsoft ASP.NET 2.0.50727
5176 X-MS-InvokeApp: 1; RequireReadOnly
5177###############################################################################################################################
5178Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-31 00:45 EDT
5179NSE: Loaded 161 scripts for scanning.
5180NSE: Script Pre-scanning.
5181Initiating NSE at 00:45
5182Completed NSE at 00:45, 0.00s elapsed
5183Initiating NSE at 00:45
5184Completed NSE at 00:45, 0.00s elapsed
5185Initiating Parallel DNS resolution of 1 host. at 00:45
5186Completed Parallel DNS resolution of 1 host. at 00:45, 0.02s elapsed
5187Initiating SYN Stealth Scan at 00:45
5188Scanning www.cityoflondon.gov.uk (80.169.89.102) [1 port]
5189Discovered open port 443/tcp on 80.169.89.102
5190Completed SYN Stealth Scan at 00:45, 0.15s elapsed (1 total ports)
5191Initiating Service scan at 00:45
5192Scanning 1 service on www.cityoflondon.gov.uk (80.169.89.102)
5193Completed Service scan at 00:46, 12.97s elapsed (1 service on 1 host)
5194Initiating OS detection (try #1) against www.cityoflondon.gov.uk (80.169.89.102)
5195Retrying OS detection (try #2) against www.cityoflondon.gov.uk (80.169.89.102)
5196Initiating Traceroute at 00:46
5197Completed Traceroute at 00:46, 0.62s elapsed
5198Initiating Parallel DNS resolution of 10 hosts. at 00:46
5199Completed Parallel DNS resolution of 10 hosts. at 00:46, 0.11s elapsed
5200NSE: Script scanning 80.169.89.102.
5201Initiating NSE at 00:46
5202Completed NSE at 00:47, 91.00s elapsed
5203Initiating NSE at 00:47
5204Completed NSE at 00:47, 1.06s elapsed
5205Nmap scan report for www.cityoflondon.gov.uk (80.169.89.102)
5206Host is up (0.11s latency).
5207
5208PORT STATE SERVICE VERSION
5209443/tcp open ssl/http Microsoft IIS httpd 7.5
5210| http-brute:
5211|_ Path "/" does not require authentication
5212|_http-chrono: Request times for /Pages/default.aspx; avg: 2425.09ms; min: 2266.29ms; max: 2592.53ms
5213|_http-csrf: Couldn't find any CSRF vulnerabilities.
5214|_http-date: Tue, 31 Mar 2020 04:49:53 GMT; +3m43s from local time.
5215|_http-devframework: ASP.NET detected. Found related header.
5216|_http-dombased-xss: Couldn't find any DOM based XSS.
5217|_http-errors: Couldn't find any error pages.
5218|_http-feed: Couldn't find any feeds.
5219|_http-fetch: Please enter the complete path of the directory to save data in.
5220| http-frontpage-login:
5221| VULNERABLE:
5222| Frontpage extension anonymous login
5223| State: VULNERABLE
5224| Default installations of older versions of frontpage extensions allow anonymous logins which can lead to server compromise.
5225|
5226| References:
5227|_ http://insecure.org/sploits/Microsoft.frontpage.insecurities.html
5228| http-headers:
5229| Content-Type: text/html; charset=UTF-8
5230| Location: http://www.cityoflondon.gov.uk/Pages/default.aspx
5231| Server: Microsoft-IIS/7.5
5232| SPRequestGuid: 113736c6-a39f-48e3-b304-fa4caf5c58d5
5233| X-SharePointHealthScore: 0
5234| X-Powered-By: ASP.NET
5235| MicrosoftSharePointTeamServices: 14.0.0.7239
5236| X-MS-InvokeApp: 1; RequireReadOnly
5237| Date: Tue, 31 Mar 2020 04:50:03 GMT
5238| Connection: close
5239| Content-Length: 172
5240|
5241|_ (Request type: GET)
5242|_http-jsonp-detection: Couldn't find any JSONP endpoints.
5243| http-methods:
5244|_ Supported Methods: GET HEAD POST OPTIONS
5245|_http-mobileversion-checker: No mobile version detected.
5246| http-security-headers:
5247| Strict_Transport_Security:
5248| HSTS not configured in HTTPS Server
5249| Cache_Control:
5250| Header: Cache-Control: private
5251| Expires:
5252|_ Header: Expires: Tue, 31 Mar 2020 04:52:16 GMT
5253|_http-server-header: Microsoft-IIS/7.5
5254| http-sitemap-generator:
5255| Directory structure:
5256| Longest directory structure:
5257| Depth: 0
5258| Dir: /
5259| Total files found (by extension):
5260|_
5261|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
5262|_http-title: Did not follow redirect to http://www.cityoflondon.gov.uk/Pages/default.aspx
5263|_http-userdir-enum: Potential Users: root, admin, administrator, webadmin, sysadmin, netadmin, guest, user, web, test
5264| http-vhosts:
5265|_127 names had status 302
5266|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
5267| http-xssed:
5268|
5269| UNFIXED XSS vuln.
5270|
5271| http://www.cityoflondon.gov.uk/cgi-bin/semaphoreserver.exe?CMD=search.run&SAVEDB=col&SAVEQUERY00=%22<br>%3e%3cscript%3ealert%28'C1c4Tr1Z'%29%3c/script%3e&SAVESTYPE=simple&SAVEORGANISE_CODED=:F9&B2=I1disab<br>ility&PROP00=t%3Di&QUERY01=disability&B2_DESC=Disability&PROP01=P%3DI1%2CS%3Dnone%2CZ%3Don&THES_REC=<br>1222&TBDB=col_taxonomy&HIDECONCEPT=1
5272|
5273| http://www.cityoflondon.gov.uk/cgi-bin/select.exe
5274|
5275|_
5276Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
5277Device type: general purpose|firewall|storage-misc
5278Running (JUST GUESSING): Linux 2.6.X|3.X (90%), WatchGuard Fireware 11.X (89%), Synology DiskStation Manager 5.X (88%)
5279OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3.10 cpe:/o:watchguard:fireware:11.8 cpe:/o:linux:linux_kernel cpe:/a:synology:diskstation_manager:5.1
5280Aggressive OS guesses: Linux 2.6.32 (90%), Linux 2.6.32 or 3.10 (89%), Linux 2.6.39 (89%), WatchGuard Fireware 11.8 (89%), Linux 3.1 - 3.2 (89%), Synology DiskStation Manager 5.1 (88%), Linux 3.10 (87%), Linux 3.4 (87%), Linux 2.6.32 - 2.6.39 (85%)
5281No exact OS matches for host (test conditions non-ideal).
5282Uptime guess: 0.193 days (since Mon Mar 30 20:10:15 2020)
5283Network Distance: 12 hops
5284TCP Sequence Prediction: Difficulty=256 (Good luck!)
5285IP ID Sequence Generation: All zeros
5286Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
5287
5288TRACEROUTE (using port 443/tcp)
5289HOP RTT ADDRESS
52901 104.58 ms 10.203.9.1
52912 615.31 ms 45.131.5.2
52923 104.66 ms 109.236.95.228
52934 105.98 ms 109.236.95.108
52945 106.39 ms et-0-0-1-pr2.AMS.router.colt.net (80.249.208.236)
52956 115.38 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
52967 115.11 ms xe0-3-0-sar18.LON.router.colt.net (212.74.68.145)
52978 115.04 ms cpeuk_lon002520.ia.colt.net (80.169.196.38)
52989 115.41 ms 195.110.81.4
529910 112.13 ms 195.110.81.4
530011 113.45 ms 195.110.81.4
530112 113.52 ms 80.169.89.102
5302
5303NSE: Script Post-scanning.
5304Initiating NSE at 00:47
5305Completed NSE at 00:47, 0.00s elapsed
5306Initiating NSE at 00:47
5307Completed NSE at 00:47, 0.00s elapsed
5308###############################################################################################################################
5309===============================================================
5310Gobuster v3.0.1
5311by OJ Reeves (@TheColonial) & Christian Mehlmauer (@_FireFart_)
5312===============================================================
5313[+] Url: https://www.cityoflondon.gov.uk
5314[+] Threads: 10
5315[+] Wordlist: /usr/share/sniper/wordlists/vhosts.txt
5316[+] User Agent: gobuster/3.0.1
5317[+] Timeout: 10s
5318===============================================================
53192020/03/31 00:47:39 Starting gobuster
5320===============================================================
5321Found: 127.0.0.1.www.cityoflondon.gov.uk (Status: 302) [Size: 183]
5322Found: administration.www.cityoflondon.gov.uk (Status: 302) [Size: 188]
5323Found: api.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
5324Found: ap.www.cityoflondon.gov.uk (Status: 302) [Size: 176]
5325Found: apps.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
5326Found: apache.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
5327Found: adserver.www.cityoflondon.gov.uk (Status: 302) [Size: 182]
5328Found: alerts.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
5329Found: admin.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
5330Found: alpha.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
5331Found: app.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
5332Found: ads.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
5333Found: appserver.www.cityoflondon.gov.uk (Status: 302) [Size: 183]
5334Found: aptest.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
5335Found: beta.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
5336Found: auth.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
5337Found: backup.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
5338Found: blog.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
5339Found: cdn.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
5340Found: chat.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
5341Found: citrix.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
5342Found: cms.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
5343Found: corp.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
5344Found: crs.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
5345Found: cvs.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
5346Found: dashboard.www.cityoflondon.gov.uk (Status: 302) [Size: 183]
5347Found: database.www.cityoflondon.gov.uk (Status: 302) [Size: 182]
5348Found: db.www.cityoflondon.gov.uk (Status: 302) [Size: 176]
5349Found: demo.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
5350Found: dev.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
5351Found: devel.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
5352Found: development.www.cityoflondon.gov.uk (Status: 302) [Size: 185]
5353Found: devsql.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
5354Found: devtest.www.cityoflondon.gov.uk (Status: 302) [Size: 181]
5355Found: direct.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
5356Found: dhcp.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
5357Found: dmz.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
5358Found: dns.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
5359Found: dns0.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
5360Found: dns1.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
5361Found: dns2.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
5362Found: download.www.cityoflondon.gov.uk (Status: 302) [Size: 182]
5363Found: en.www.cityoflondon.gov.uk (Status: 302) [Size: 176]
5364Found: erp.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
5365Found: eshop.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
5366Found: f5.www.cityoflondon.gov.uk (Status: 302) [Size: 176]
5367Found: fileserver.www.cityoflondon.gov.uk (Status: 302) [Size: 184]
5368Found: exchange.www.cityoflondon.gov.uk (Status: 302) [Size: 182]
5369Found: firewall.www.cityoflondon.gov.uk (Status: 302) [Size: 182]
5370Found: forum.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
5371Found: ftp.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
5372Found: ftp0.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
5373Found: git.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
5374Found: gw.www.cityoflondon.gov.uk (Status: 302) [Size: 176]
5375Found: help.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
5376Found: helpdesk.www.cityoflondon.gov.uk (Status: 302) [Size: 182]
5377Found: host.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
5378Found: home.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
5379Found: http.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
5380Found: id.www.cityoflondon.gov.uk (Status: 302) [Size: 176]
5381Found: images.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
5382Found: info.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
5383Found: internal.www.cityoflondon.gov.uk (Status: 302) [Size: 182]
5384Found: internet.www.cityoflondon.gov.uk (Status: 302) [Size: 182]
5385Found: intra.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
5386Found: intranet.www.cityoflondon.gov.uk (Status: 302) [Size: 182]
5387Found: ipv6.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
5388Found: lab.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
5389Found: ldap.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
5390Found: linux.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
5391Found: local.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
5392Found: localhost.www.cityoflondon.gov.uk (Status: 302) [Size: 183]
5393Found: log.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
5394Found: m.www.cityoflondon.gov.uk (Status: 302) [Size: 175]
5395Found: mail2.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
5396Found: mail.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
5397Found: mail3.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
5398Found: mailgate.www.cityoflondon.gov.uk (Status: 302) [Size: 182]
5399Found: main.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
5400Found: manage.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
5401Found: mgmt.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
5402Found: mobile.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
5403Found: mirror.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
5404Found: monitor.www.cityoflondon.gov.uk (Status: 302) [Size: 181]
5405Found: mssql.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
5406Found: mta.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
5407Found: mx0.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
5408Found: mx.www.cityoflondon.gov.uk (Status: 302) [Size: 176]
5409Found: mx1.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
5410Found: mysql.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
5411Found: news.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
5412Found: noc.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
5413Found: ns.www.cityoflondon.gov.uk (Status: 302) [Size: 176]
5414Found: ns0.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
5415Found: ns1.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
5416Found: ns2.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
5417Found: ns3.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
5418Found: ntp.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
5419Found: old.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
5420Found: ops.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
5421Found: oracle.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
5422Found: owa.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
5423Found: pbx.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
5424Found: portal.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
5425Found: s3.www.cityoflondon.gov.uk (Status: 302) [Size: 176]
5426Found: secure.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
5427Found: server.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
5428Found: sharepoint.www.cityoflondon.gov.uk (Status: 302) [Size: 184]
5429Found: shop.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
5430Found: sip.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
5431Found: ssh.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
5432Found: smtp.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
5433Found: sql.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
5434Found: squid.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
5435Found: ssl.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
5436Found: stage.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
5437Found: stats.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
5438Found: staging.www.cityoflondon.gov.uk (Status: 302) [Size: 181]
5439Found: status.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
5440Found: svn.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
5441Found: syslog.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
5442Found: test.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
5443Found: test1.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
5444Found: test2.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
5445Found: testing.www.cityoflondon.gov.uk (Status: 302) [Size: 181]
5446Found: uat.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
5447Found: upload.www.cityoflondon.gov.uk (Status: 302) [Size: 180]
5448Found: v1.www.cityoflondon.gov.uk (Status: 302) [Size: 176]
5449Found: v2.www.cityoflondon.gov.uk (Status: 302) [Size: 176]
5450Found: vm.www.cityoflondon.gov.uk (Status: 302) [Size: 176]
5451Found: v3.www.cityoflondon.gov.uk (Status: 302) [Size: 176]
5452Found: vnc.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
5453Found: voip.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
5454Found: vpn.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
5455Found: web.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
5456Found: web2test.www.cityoflondon.gov.uk (Status: 302) [Size: 182]
5457Found: whois.www.cityoflondon.gov.uk (Status: 302) [Size: 179]
5458Found: wiki.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
5459Found: www2.www.cityoflondon.gov.uk (Status: 302) [Size: 178]
5460Found: www.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
5461Found: xml.www.cityoflondon.gov.uk (Status: 302) [Size: 177]
5462===============================================================
54632020/03/31 00:47:42 Finished
5464===============================================================
5465###############################################################################################################################
5466Version: 2.0.0-static
5467OpenSSL 1.1.1f-dev xx XXX xxxx
5468
5469Connected to 80.169.89.102
5470
5471Testing SSL server www.cityoflondon.gov.uk on port 443 using SNI name www.cityoflondon.gov.uk
5472
5473 SSL/TLS Protocols:
5474SSLv2 disabled
5475SSLv3 disabled
5476TLSv1.0 disabled
5477TLSv1.1 disabled
5478TLSv1.2 enabled
5479TLSv1.3 disabled
5480
5481 TLS Fallback SCSV:
5482Server supports TLS Fallback SCSV
5483
5484 TLS renegotiation:
5485Session renegotiation not supported
5486
5487 TLS Compression:
5488Compression disabled
5489
5490 Heartbleed:
5491TLSv1.2 not vulnerable to heartbleed
5492
5493 Supported Server Cipher(s):
5494Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
5495Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
5496Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
5497Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
5498Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
5499Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
5500Accepted TLSv1.2 256 bits AES256-GCM-SHA384
5501Accepted TLSv1.2 128 bits AES128-GCM-SHA256
5502Accepted TLSv1.2 256 bits AES256-SHA256
5503Accepted TLSv1.2 256 bits AES256-SHA
5504Accepted TLSv1.2 128 bits AES128-SHA256
5505Accepted TLSv1.2 128 bits AES128-SHA
5506Accepted TLSv1.2 256 bits CAMELLIA256-SHA
5507Accepted TLSv1.2 128 bits CAMELLIA128-SHA
5508
5509 Server Key Exchange Group(s):
5510TLSv1.2 128 bits secp256r1 (NIST P-256)
5511
5512 Server Signature Algorithm(s):
5513TLSv1.2 rsa_pkcs1_sha1
5514TLSv1.2 dsa_sha1
5515TLSv1.2 ecdsa_sha1
5516TLSv1.2 rsa_pkcs1_sha224
5517TLSv1.2 dsa_sha224
5518TLSv1.2 ecdsa_sha224
5519TLSv1.2 rsa_pkcs1_sha256
5520TLSv1.2 dsa_sha256
5521TLSv1.2 ecdsa_secp256r1_sha256
5522TLSv1.2 rsa_pkcs1_sha384
5523TLSv1.2 dsa_sha384
5524TLSv1.2 ecdsa_secp384r1_sha384
5525TLSv1.2 rsa_pkcs1_sha512
5526TLSv1.2 dsa_sha512
5527TLSv1.2 ecdsa_secp521r1_sha512
5528
5529 SSL Certificate:
5530Signature Algorithm: sha256WithRSAEncryption
5531RSA Key Strength: 2048
5532
5533Subject: *.cityoflondon.gov.uk
5534Altnames: DNS:*.cityoflondon.gov.uk, DNS:cityoflondon.gov.uk
5535Issuer: Entrust Certification Authority - L1K
5536
5537Not valid before: Jan 9 10:15:04 2019 GMT
5538Not valid after: Jan 9 10:45:03 2021 GMT
5539##############################################################################################################################
5540------------------------------------------------------------------------------------------------------------------------
5541
5542[ ! ] Starting SCANNER INURLBR 2.1 at [31-03-2020 00:48:36]
5543[ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
5544It is the end user's responsibility to obey all applicable local, state and federal laws.
5545Developers assume no liability and are not responsible for any misuse or damage caused by this program
5546
5547[ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.cityoflondon.gov.uk/output/inurlbr-www.cityoflondon.gov.uk ]
5548[ INFO ][ DORK ]::[ site:www.cityoflondon.gov.uk ]
5549[ INFO ][ SEARCHING ]:: {
5550[ INFO ][ ENGINE ]::[ GOOGLE - www.google.ki ]
5551
5552[ INFO ][ SEARCHING ]::
5553-[:::]
5554[ INFO ][ ENGINE ]::[ GOOGLE API ]
5555
5556[ INFO ][ SEARCHING ]::
5557-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
5558[ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.gf ID: 012984904789461885316:oy3-mu17hxk ]
5559
5560[ INFO ][ SEARCHING ]::
5561-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
5562
5563[ INFO ][ TOTAL FOUND VALUES ]:: [ 100 ]
5564
5565
5566 _[ - ]::--------------------------------------------------------------------------------------------------------------
5567|_[ + ] [ 0 / 100 ]-[00:48:53] [ - ]
5568|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/ ]
5569|_[ + ] Exploit::
5570|_[ + ] Information Server:: HTTP/1.1 302 Redirect, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5571|_[ + ] More details:: / - / , ISP:
5572|_[ + ] Found:: UNIDENTIFIED
5573
5574 _[ - ]::--------------------------------------------------------------------------------------------------------------
5575|_[ + ] [ 1 / 100 ]-[00:48:54] [ - ]
5576|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/newsplan/ ]
5577|_[ + ] Exploit::
5578|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5579|_[ + ] More details:: / - / , ISP:
5580|_[ + ] Found:: UNIDENTIFIED
5581
5582 _[ - ]::--------------------------------------------------------------------------------------------------------------
5583|_[ + ] [ 2 / 100 ]-[00:48:55] [ - ]
5584|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/propertysearch/results.aspx ]
5585|_[ + ] Exploit::
5586|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5587|_[ + ] More details:: / - / , ISP:
5588|_[ + ] Found:: UNIDENTIFIED
5589
5590 _[ - ]::--------------------------------------------------------------------------------------------------------------
5591|_[ + ] [ 3 / 100 ]-[00:48:57] [ - ]
5592|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx ]
5593|_[ + ] Exploit::
5594|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5595|_[ + ] More details:: / - / , ISP:
5596|_[ + ] Found:: UNIDENTIFIED
5597
5598 _[ - ]::--------------------------------------------------------------------------------------------------------------
5599|_[ + ] [ 4 / 100 ]-[00:48:58] [ - ]
5600|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/keatsHouse/default.aspx ]
5601|_[ + ] Exploit::
5602|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5603|_[ + ] More details:: / - / , ISP:
5604|_[ + ] Found:: UNIDENTIFIED
5605
5606 _[ - ]::--------------------------------------------------------------------------------------------------------------
5607|_[ + ] [ 5 / 100 ]-[00:48:59] [ - ]
5608|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/Pages/default.aspx ]
5609|_[ + ] Exploit::
5610|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5611|_[ + ] More details:: / - / , ISP:
5612|_[ + ] Found:: UNIDENTIFIED
5613
5614 _[ - ]::--------------------------------------------------------------------------------------------------------------
5615|_[ + ] [ 6 / 100 ]-[00:49:00] [ - ]
5616|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/_layouts/col/basket.aspx ]
5617|_[ + ] Exploit::
5618|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5619|_[ + ] More details:: / - / , ISP:
5620|_[ + ] Found:: UNIDENTIFIED
5621
5622 _[ - ]::--------------------------------------------------------------------------------------------------------------
5623|_[ + ] [ 7 / 100 ]-[00:49:02] [ - ]
5624|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/contact-us/Pages/default.aspx ]
5625|_[ + ] Exploit::
5626|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5627|_[ + ] More details:: / - / , ISP:
5628|_[ + ] Found:: UNIDENTIFIED
5629
5630 _[ - ]::--------------------------------------------------------------------------------------------------------------
5631|_[ + ] [ 8 / 100 ]-[00:49:03] [ - ]
5632|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-our-website/Pages/default.aspx ]
5633|_[ + ] Exploit::
5634|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5635|_[ + ] More details:: / - / , ISP:
5636|_[ + ] Found:: UNIDENTIFIED
5637
5638 _[ - ]::--------------------------------------------------------------------------------------------------------------
5639|_[ + ] [ 9 / 100 ]-[00:49:04] [ - ]
5640|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/licensing/gambling/Pages/default.aspx ]
5641|_[ + ] Exploit::
5642|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5643|_[ + ] More details:: / - / , ISP:
5644|_[ + ] Found:: UNIDENTIFIED
5645
5646 _[ - ]::--------------------------------------------------------------------------------------------------------------
5647|_[ + ] [ 10 / 100 ]-[00:49:05] [ - ]
5648|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/Pages/homeowner-leaseholder.aspx ]
5649|_[ + ] Exploit::
5650|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5651|_[ + ] More details:: / - / , ISP:
5652|_[ + ] Found:: UNIDENTIFIED
5653
5654 _[ - ]::--------------------------------------------------------------------------------------------------------------
5655|_[ + ] [ 11 / 100 ]-[00:49:06] [ - ]
5656|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-our-website/Pages/accessibility.aspx ]
5657|_[ + ] Exploit::
5658|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5659|_[ + ] More details:: / - / , ISP:
5660|_[ + ] Found:: UNIDENTIFIED
5661
5662 _[ - ]::--------------------------------------------------------------------------------------------------------------
5663|_[ + ] [ 12 / 100 ]-[00:49:07] [ - ]
5664|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/council-tax/Pages/default.aspx ]
5665|_[ + ] Exploit::
5666|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5667|_[ + ] More details:: / - / , ISP:
5668|_[ + ] Found:: UNIDENTIFIED
5669
5670 _[ - ]::--------------------------------------------------------------------------------------------------------------
5671|_[ + ] [ 13 / 100 ]-[00:49:08] [ - ]
5672|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/licensing/Pages/street-trading.aspx ]
5673|_[ + ] Exploit::
5674|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5675|_[ + ] More details:: / - / , ISP:
5676|_[ + ] Found:: UNIDENTIFIED
5677
5678 _[ - ]::--------------------------------------------------------------------------------------------------------------
5679|_[ + ] [ 14 / 100 ]-[00:49:09] [ - ]
5680|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/asia-programme/Pages/default.aspx ]
5681|_[ + ] Exploit::
5682|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5683|_[ + ] More details:: / - / , ISP:
5684|_[ + ] Found:: UNIDENTIFIED
5685
5686 _[ - ]::--------------------------------------------------------------------------------------------------------------
5687|_[ + ] [ 15 / 100 ]-[00:49:10] [ - ]
5688|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/business-rates/Pages/default.aspx ]
5689|_[ + ] Exploit::
5690|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5691|_[ + ] More details:: / - / , ISP:
5692|_[ + ] Found:: UNIDENTIFIED
5693
5694 _[ - ]::--------------------------------------------------------------------------------------------------------------
5695|_[ + ] [ 16 / 100 ]-[00:49:12] [ - ]
5696|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-our-website/Pages/Cookies.aspx ]
5697|_[ + ] Exploit::
5698|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5699|_[ + ] More details:: / - / , ISP:
5700|_[ + ] Found:: UNIDENTIFIED
5701
5702 _[ - ]::--------------------------------------------------------------------------------------------------------------
5703|_[ + ] [ 17 / 100 ]-[00:49:13] [ - ]
5704|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/Pages/resident-involvement.aspx ]
5705|_[ + ] Exploit::
5706|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5707|_[ + ] More details:: / - / , ISP:
5708|_[ + ] Found:: UNIDENTIFIED
5709
5710 _[ - ]::--------------------------------------------------------------------------------------------------------------
5711|_[ + ] [ 18 / 100 ]-[00:49:15] [ - ]
5712|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/business-rates/Pages/contact.aspx ]
5713|_[ + ] Exploit::
5714|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5715|_[ + ] More details:: / - / , ISP:
5716|_[ + ] Found:: UNIDENTIFIED
5717
5718 _[ - ]::--------------------------------------------------------------------------------------------------------------
5719|_[ + ] [ 19 / 100 ]-[00:49:16] [ - ]
5720|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/Pages/default.aspx ]
5721|_[ + ] Exploit::
5722|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5723|_[ + ] More details:: / - / , ISP:
5724|_[ + ] Found:: UNIDENTIFIED
5725
5726 _[ - ]::--------------------------------------------------------------------------------------------------------------
5727|_[ + ] [ 20 / 100 ]-[00:49:18] [ - ]
5728|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?start1=13 ]
5729|_[ + ] Exploit::
5730|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5731|_[ + ] More details:: / - / , ISP:
5732|_[ + ] Found:: UNIDENTIFIED
5733
5734 _[ - ]::--------------------------------------------------------------------------------------------------------------
5735|_[ + ] [ 21 / 100 ]-[00:49:19] [ - ]
5736|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/business-rates/Pages/payment.aspx ]
5737|_[ + ] Exploit::
5738|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5739|_[ + ] More details:: / - / , ISP:
5740|_[ + ] Found:: UNIDENTIFIED
5741
5742 _[ - ]::--------------------------------------------------------------------------------------------------------------
5743|_[ + ] [ 22 / 100 ]-[00:49:20] [ - ]
5744|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/environmental-health/Pages/default.aspx ]
5745|_[ + ] Exploit::
5746|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5747|_[ + ] More details:: / - / , ISP:
5748|_[ + ] Found:: UNIDENTIFIED
5749
5750 _[ - ]::--------------------------------------------------------------------------------------------------------------
5751|_[ + ] [ 23 / 100 ]-[00:49:21] [ - ]
5752|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Today ]
5753|_[ + ] Exploit::
5754|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5755|_[ + ] More details:: / - / , ISP:
5756|_[ + ] Found:: UNIDENTIFIED
5757
5758 _[ - ]::--------------------------------------------------------------------------------------------------------------
5759|_[ + ] [ 24 / 100 ]-[00:49:22] [ - ]
5760|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/search/Pages/a-to-z.aspx ]
5761|_[ + ] Exploit::
5762|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5763|_[ + ] More details:: / - / , ISP:
5764|_[ + ] Found:: UNIDENTIFIED
5765
5766 _[ - ]::--------------------------------------------------------------------------------------------------------------
5767|_[ + ] [ 25 / 100 ]-[00:49:23] [ - ]
5768|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/filming/Pages/permissions.aspx ]
5769|_[ + ] Exploit::
5770|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5771|_[ + ] More details:: / - / , ISP:
5772|_[ + ] Found:: UNIDENTIFIED
5773
5774 _[ - ]::--------------------------------------------------------------------------------------------------------------
5775|_[ + ] [ 26 / 100 ]-[00:49:24] [ - ]
5776|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Aug-2019 ]
5777|_[ + ] Exploit::
5778|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5779|_[ + ] More details:: / - / , ISP:
5780|_[ + ] Found:: UNIDENTIFIED
5781
5782 _[ - ]::--------------------------------------------------------------------------------------------------------------
5783|_[ + ] [ 27 / 100 ]-[00:49:26] [ - ]
5784|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/asia-programme/india/Pages/publications.aspx ]
5785|_[ + ] Exploit::
5786|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5787|_[ + ] More details:: / - / , ISP:
5788|_[ + ] Found:: UNIDENTIFIED
5789
5790 _[ - ]::--------------------------------------------------------------------------------------------------------------
5791|_[ + ] [ 28 / 100 ]-[00:49:27] [ - ]
5792|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/Pages/tenancy-visits-programme.aspx ]
5793|_[ + ] Exploit::
5794|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5795|_[ + ] More details:: / - / , ISP:
5796|_[ + ] Found:: UNIDENTIFIED
5797
5798 _[ - ]::--------------------------------------------------------------------------------------------------------------
5799|_[ + ] [ 29 / 100 ]-[00:49:28] [ - ]
5800|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Dec-2019 ]
5801|_[ + ] Exploit::
5802|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5803|_[ + ] More details:: / - / , ISP:
5804|_[ + ] Found:: UNIDENTIFIED
5805
5806 _[ - ]::--------------------------------------------------------------------------------------------------------------
5807|_[ + ] [ 30 / 100 ]-[00:49:29] [ - ]
5808|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Jan-2018 ]
5809|_[ + ] Exploit::
5810|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5811|_[ + ] More details:: / - / , ISP:
5812|_[ + ] Found:: UNIDENTIFIED
5813
5814 _[ - ]::--------------------------------------------------------------------------------------------------------------
5815|_[ + ] [ 31 / 100 ]-[00:49:30] [ - ]
5816|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/Pages/pay-your-rent.aspx ]
5817|_[ + ] Exploit::
5818|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5819|_[ + ] More details:: / - / , ISP:
5820|_[ + ] Found:: UNIDENTIFIED
5821
5822 _[ - ]::--------------------------------------------------------------------------------------------------------------
5823|_[ + ] [ 32 / 100 ]-[00:49:32] [ - ]
5824|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Jan-2020 ]
5825|_[ + ] Exploit::
5826|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5827|_[ + ] More details:: / - / , ISP:
5828|_[ + ] Found:: UNIDENTIFIED
5829
5830 _[ - ]::--------------------------------------------------------------------------------------------------------------
5831|_[ + ] [ 33 / 100 ]-[00:49:33] [ - ]
5832|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Mar-2020 ]
5833|_[ + ] Exploit::
5834|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5835|_[ + ] More details:: / - / , ISP:
5836|_[ + ] Found:: UNIDENTIFIED
5837
5838 _[ - ]::--------------------------------------------------------------------------------------------------------------
5839|_[ + ] [ 34 / 100 ]-[00:49:35] [ - ]
5840|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/Pages/police-authority.aspx ]
5841|_[ + ] Exploit::
5842|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5843|_[ + ] More details:: / - / , ISP:
5844|_[ + ] Found:: UNIDENTIFIED
5845
5846 _[ - ]::--------------------------------------------------------------------------------------------------------------
5847|_[ + ] [ 35 / 100 ]-[00:49:37] [ - ]
5848|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/children-and-families/Pages/adoption.aspx ]
5849|_[ + ] Exploit::
5850|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5851|_[ + ] More details:: / - / , ISP:
5852|_[ + ] Found:: UNIDENTIFIED
5853
5854 _[ - ]::--------------------------------------------------------------------------------------------------------------
5855|_[ + ] [ 36 / 100 ]-[00:49:39] [ - ]
5856|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/adult-social-care/Pages/carers.aspx ]
5857|_[ + ] Exploit::
5858|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5859|_[ + ] More details:: / - / , ISP:
5860|_[ + ] Found:: UNIDENTIFIED
5861
5862 _[ - ]::--------------------------------------------------------------------------------------------------------------
5863|_[ + ] [ 37 / 100 ]-[00:49:41] [ - ]
5864|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/adult-social-care/Pages/dementia.aspx ]
5865|_[ + ] Exploit::
5866|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5867|_[ + ] More details:: / - / , ISP:
5868|_[ + ] Found:: UNIDENTIFIED
5869
5870 _[ - ]::--------------------------------------------------------------------------------------------------------------
5871|_[ + ] [ 38 / 100 ]-[00:49:43] [ - ]
5872|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/asia-programme/india/Pages/default.aspx ]
5873|_[ + ] Exploit::
5874|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5875|_[ + ] More details:: / - / , ISP:
5876|_[ + ] Found:: UNIDENTIFIED
5877
5878 _[ - ]::--------------------------------------------------------------------------------------------------------------
5879|_[ + ] [ 39 / 100 ]-[00:49:44] [ - ]
5880|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/wholesale-food-markets/Pages/default.aspx ]
5881|_[ + ] Exploit::
5882|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5883|_[ + ] More details:: / - / , ISP:
5884|_[ + ] Found:: UNIDENTIFIED
5885
5886 _[ - ]::--------------------------------------------------------------------------------------------------------------
5887|_[ + ] [ 40 / 100 ]-[00:49:46] [ - ]
5888|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/barbican-estate/Pages/resident-involvement.aspx ]
5889|_[ + ] Exploit::
5890|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5891|_[ + ] More details:: / - / , ISP:
5892|_[ + ] Found:: UNIDENTIFIED
5893
5894 _[ - ]::--------------------------------------------------------------------------------------------------------------
5895|_[ + ] [ 41 / 100 ]-[00:49:48] [ - ]
5896|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/history/Pages/mayoralty.aspx ]
5897|_[ + ] Exploit::
5898|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5899|_[ + ] More details:: / - / , ISP:
5900|_[ + ] Found:: UNIDENTIFIED
5901
5902 _[ - ]::--------------------------------------------------------------------------------------------------------------
5903|_[ + ] [ 42 / 100 ]-[00:49:49] [ - ]
5904|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-our-website/Pages/social-media.aspx ]
5905|_[ + ] Exploit::
5906|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5907|_[ + ] More details:: / - / , ISP:
5908|_[ + ] Found:: UNIDENTIFIED
5909
5910 _[ - ]::--------------------------------------------------------------------------------------------------------------
5911|_[ + ] [ 43 / 100 ]-[00:49:51] [ - ]
5912|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=Feb-2020 ]
5913|_[ + ] Exploit::
5914|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5915|_[ + ] More details:: / - / , ISP:
5916|_[ + ] Found:: UNIDENTIFIED
5917
5918 _[ - ]::--------------------------------------------------------------------------------------------------------------
5919|_[ + ] [ 44 / 100 ]-[00:49:52] [ - ]
5920|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/pages/default.aspx?Date=Jan-2019 ]
5921|_[ + ] Exploit::
5922|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5923|_[ + ] More details:: / - / , ISP:
5924|_[ + ] Found:: UNIDENTIFIED
5925
5926 _[ - ]::--------------------------------------------------------------------------------------------------------------
5927|_[ + ] [ 45 / 100 ]-[00:49:54] [ - ]
5928|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/history/Pages/ceremonial.aspx ]
5929|_[ + ] Exploit::
5930|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5931|_[ + ] More details:: / - / , ISP:
5932|_[ + ] Found:: UNIDENTIFIED
5933
5934 _[ - ]::--------------------------------------------------------------------------------------------------------------
5935|_[ + ] [ 46 / 100 ]-[00:49:56] [ - ]
5936|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-our-website/Pages/legal-notices.aspx ]
5937|_[ + ] Exploit::
5938|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5939|_[ + ] More details:: / - / , ISP:
5940|_[ + ] Found:: UNIDENTIFIED
5941
5942 _[ - ]::--------------------------------------------------------------------------------------------------------------
5943|_[ + ] [ 47 / 100 ]-[00:49:59] [ - ]
5944|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/libraries-and-archives/Pages/default.aspx ]
5945|_[ + ] Exploit::
5946|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5947|_[ + ] More details:: / - / , ISP:
5948|_[ + ] Found:: UNIDENTIFIED
5949
5950 _[ - ]::--------------------------------------------------------------------------------------------------------------
5951|_[ + ] [ 48 / 100 ]-[00:50:00] [ - ]
5952|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/environment-and-planning/Pages/default.aspx ]
5953|_[ + ] Exploit::
5954|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5955|_[ + ] More details:: / - / , ISP:
5956|_[ + ] Found:: UNIDENTIFIED
5957
5958 _[ - ]::--------------------------------------------------------------------------------------------------------------
5959|_[ + ] [ 49 / 100 ]-[00:50:02] [ - ]
5960|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/history/Pages/ceremony.aspx ]
5961|_[ + ] Exploit::
5962|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5963|_[ + ] More details:: / - / , ISP:
5964|_[ + ] Found:: UNIDENTIFIED
5965
5966 _[ - ]::--------------------------------------------------------------------------------------------------------------
5967|_[ + ] [ 50 / 100 ]-[00:50:03] [ - ]
5968|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/things-to-do/Pages/leadenhall-market.aspx ]
5969|_[ + ] Exploit::
5970|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5971|_[ + ] More details:: / - / , ISP:
5972|_[ + ] Found:: UNIDENTIFIED
5973
5974 _[ - ]::--------------------------------------------------------------------------------------------------------------
5975|_[ + ] [ 51 / 100 ]-[00:50:05] [ - ]
5976|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/eu-and-regulation/Pages/default.aspx ]
5977|_[ + ] Exploit::
5978|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5979|_[ + ] More details:: / - / , ISP:
5980|_[ + ] Found:: UNIDENTIFIED
5981
5982 _[ - ]::--------------------------------------------------------------------------------------------------------------
5983|_[ + ] [ 52 / 100 ]-[00:50:07] [ - ]
5984|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/licensing/charity-collections/Pages/default.aspx ]
5985|_[ + ] Exploit::
5986|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5987|_[ + ] More details:: / - / , ISP:
5988|_[ + ] Found:: UNIDENTIFIED
5989
5990 _[ - ]::--------------------------------------------------------------------------------------------------------------
5991|_[ + ] [ 53 / 100 ]-[00:50:09] [ - ]
5992|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/environmental-health/Pages/primary-authority.aspx ]
5993|_[ + ] Exploit::
5994|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
5995|_[ + ] More details:: / - / , ISP:
5996|_[ + ] Found:: UNIDENTIFIED
5997
5998 _[ - ]::--------------------------------------------------------------------------------------------------------------
5999|_[ + ] [ 54 / 100 ]-[00:50:10] [ - ]
6000|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/community-and-living/Pages/hospitals.aspx ]
6001|_[ + ] Exploit::
6002|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
6003|_[ + ] More details:: / - / , ISP:
6004|_[ + ] Found:: UNIDENTIFIED
6005
6006 _[ - ]::--------------------------------------------------------------------------------------------------------------
6007|_[ + ] [ 55 / 100 ]-[00:50:14] [ - ]
6008|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/transport-and-streets/Pages/default.aspx ]
6009|_[ + ] Exploit::
6010|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
6011|_[ + ] More details:: / - / , ISP:
6012|_[ + ] Found:: UNIDENTIFIED
6013
6014 _[ - ]::--------------------------------------------------------------------------------------------------------------
6015|_[ + ] [ 56 / 100 ]-[00:50:15] [ - ]
6016|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/barbican-estate/Pages/baggage-stores.aspx ]
6017|_[ + ] Exploit::
6018|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
6019|_[ + ] More details:: / - / , ISP:
6020|_[ + ] Found:: UNIDENTIFIED
6021
6022 _[ - ]::--------------------------------------------------------------------------------------------------------------
6023|_[ + ] [ 57 / 100 ]-[00:50:18] [ - ]
6024|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/education-learning/apprenticeships/Pages/default.aspx ]
6025|_[ + ] Exploit::
6026|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
6027|_[ + ] More details:: / - / , ISP:
6028|_[ + ] Found:: UNIDENTIFIED
6029
6030 _[ - ]::--------------------------------------------------------------------------------------------------------------
6031|_[ + ] [ 58 / 100 ]-[00:50:20] [ - ]
6032|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/things-to-do/keats-house/Pages/Schools.aspx ]
6033|_[ + ] Exploit::
6034|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
6035|_[ + ] More details:: / - / , ISP:
6036|_[ + ] Found:: UNIDENTIFIED
6037
6038 _[ - ]::--------------------------------------------------------------------------------------------------------------
6039|_[ + ] [ 59 / 100 ]-[00:50:22] [ - ]
6040|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/mansion-house/Pages/inside.aspx ]
6041|_[ + ] Exploit::
6042|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
6043|_[ + ] More details:: / - / , ISP:
6044|_[ + ] Found:: UNIDENTIFIED
6045
6046 _[ - ]::--------------------------------------------------------------------------------------------------------------
6047|_[ + ] [ 60 / 100 ]-[00:50:23] [ - ]
6048|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/children-and-families/Pages/Sofia-Simpson.aspx ]
6049|_[ + ] Exploit::
6050|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
6051|_[ + ] More details:: / - / , ISP:
6052|_[ + ] Found:: UNIDENTIFIED
6053
6054 _[ - ]::--------------------------------------------------------------------------------------------------------------
6055|_[ + ] [ 61 / 100 ]-[00:50:25] [ - ]
6056|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/adult-social-care/Pages/concessionary-travel.aspx ]
6057|_[ + ] Exploit::
6058|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
6059|_[ + ] More details:: / - / , ISP:
6060|_[ + ] Found:: UNIDENTIFIED
6061
6062 _[ - ]::--------------------------------------------------------------------------------------------------------------
6063|_[ + ] [ 62 / 100 ]-[00:50:27] [ - ]
6064|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/Pages/Housing-Fire-Safety-.aspx ]
6065|_[ + ] Exploit::
6066|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
6067|_[ + ] More details:: / - / , ISP:
6068|_[ + ] Found:: UNIDENTIFIED
6069
6070 _[ - ]::--------------------------------------------------------------------------------------------------------------
6071|_[ + ] [ 63 / 100 ]-[00:50:28] [ - ]
6072|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/mansion-house/Pages/tours.aspx ]
6073|_[ + ] Exploit::
6074|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
6075|_[ + ] More details:: / - / , ISP:
6076|_[ + ] Found:: UNIDENTIFIED
6077
6078 _[ - ]::--------------------------------------------------------------------------------------------------------------
6079|_[ + ] [ 64 / 100 ]-[00:50:30] [ - ]
6080|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/health-and-wellbeing/Pages/mental-wellbeing.aspx ]
6081|_[ + ] Exploit::
6082|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
6083|_[ + ] More details:: / - / , ISP:
6084|_[ + ] Found:: UNIDENTIFIED
6085
6086 _[ - ]::--------------------------------------------------------------------------------------------------------------
6087|_[ + ] [ 65 / 100 ]-[00:50:31] [ - ]
6088|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/community-and-living/Pages/volunteering-opportunities.aspx ]
6089|_[ + ] Exploit::
6090|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
6091|_[ + ] More details:: / - / , ISP:
6092|_[ + ] Found:: UNIDENTIFIED
6093
6094 _[ - ]::--------------------------------------------------------------------------------------------------------------
6095|_[ + ] [ 66 / 100 ]-[00:50:33] [ - ]
6096|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/barbican-estate/services/Pages/buildings-insurance.aspx ]
6097|_[ + ] Exploit::
6098|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
6099|_[ + ] More details:: / - / , ISP:
6100|_[ + ] Found:: UNIDENTIFIED
6101
6102 _[ - ]::--------------------------------------------------------------------------------------------------------------
6103|_[ + ] [ 67 / 100 ]-[00:50:36] [ - ]
6104|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/housing-estates/Pages/middlesex-street.aspx ]
6105|_[ + ] Exploit::
6106|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
6107|_[ + ] More details:: / - / , ISP:
6108|_[ + ] Found:: UNIDENTIFIED
6109
6110 _[ - ]::--------------------------------------------------------------------------------------------------------------
6111|_[ + ] [ 68 / 100 ]-[00:50:37] [ - ]
6112|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/tenders-and-procurement/Pages/contract-lists.aspx ]
6113|_[ + ] Exploit::
6114|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
6115|_[ + ] More details:: / - / , ISP:
6116|_[ + ] Found:: UNIDENTIFIED
6117
6118 _[ - ]::--------------------------------------------------------------------------------------------------------------
6119|_[ + ] [ 69 / 100 ]-[00:50:38] [ - ]
6120|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/health-and-wellbeing/Pages/sexual-health.aspx ]
6121|_[ + ] Exploit::
6122|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
6123|_[ + ] More details:: / - / , ISP:
6124|_[ + ] Found:: UNIDENTIFIED
6125
6126 _[ - ]::--------------------------------------------------------------------------------------------------------------
6127|_[ + ] [ 70 / 100 ]-[00:50:40] [ - ]
6128|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/health-and-wellbeing/Pages/covid-19.aspx ]
6129|_[ + ] Exploit::
6130|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
6131|_[ + ] More details:: / - / , ISP:
6132|_[ + ] Found:: UNIDENTIFIED
6133
6134 _[ - ]::--------------------------------------------------------------------------------------------------------------
6135|_[ + ] [ 71 / 100 ]-[00:50:41] [ - ]
6136|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/housing-estates/Pages/holloway-estate.aspx ]
6137|_[ + ] Exploit::
6138|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
6139|_[ + ] More details:: / - / , ISP:
6140|_[ + ] Found:: UNIDENTIFIED
6141
6142 _[ - ]::--------------------------------------------------------------------------------------------------------------
6143|_[ + ] [ 72 / 100 ]-[00:50:43] [ - ]
6144|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/education-learning/schools/Pages/education-policies.aspx ]
6145|_[ + ] Exploit::
6146|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
6147|_[ + ] More details:: / - / , ISP:
6148|_[ + ] Found:: UNIDENTIFIED
6149
6150 _[ - ]::--------------------------------------------------------------------------------------------------------------
6151|_[ + ] [ 73 / 100 ]-[00:50:45] [ - ]
6152|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/Pages/brexit.aspx ]
6153|_[ + ] Exploit::
6154|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
6155|_[ + ] More details:: / - / , ISP:
6156|_[ + ] Found:: UNIDENTIFIED
6157
6158 _[ - ]::--------------------------------------------------------------------------------------------------------------
6159|_[ + ] [ 74 / 100 ]-[00:50:47] [ - ]
6160|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/voting-elections/Pages/results.aspx ]
6161|_[ + ] Exploit::
6162|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
6163|_[ + ] More details:: / - / , ISP:
6164|_[ + ] Found:: UNIDENTIFIED
6165
6166 _[ - ]::--------------------------------------------------------------------------------------------------------------
6167|_[ + ] [ 75 / 100 ]-[00:50:50] [ - ]
6168|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/housing-estates/Pages/dron-house.aspx ]
6169|_[ + ] Exploit::
6170|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
6171|_[ + ] More details:: / - / , ISP:
6172|_[ + ] Found:: UNIDENTIFIED
6173
6174 _[ - ]::--------------------------------------------------------------------------------------------------------------
6175|_[ + ] [ 76 / 100 ]-[00:50:52] [ - ]
6176|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/adult-social-care/Pages/safeguarding-adults.aspx ]
6177|_[ + ] Exploit::
6178|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
6179|_[ + ] More details:: / - / , ISP:
6180|_[ + ] Found:: UNIDENTIFIED
6181
6182 _[ - ]::--------------------------------------------------------------------------------------------------------------
6183|_[ + ] [ 77 / 100 ]-[00:50:53] [ - ]
6184|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/housing/homelessness/Pages/duty-to-refer.aspx ]
6185|_[ + ] Exploit::
6186|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
6187|_[ + ] More details:: / - / , ISP:
6188|_[ + ] Found:: UNIDENTIFIED
6189
6190 _[ - ]::--------------------------------------------------------------------------------------------------------------
6191|_[ + ] [ 78 / 100 ]-[00:50:54] [ - ]
6192|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/history/Pages/temple-bar.aspx ]
6193|_[ + ] Exploit::
6194|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
6195|_[ + ] More details:: / - / , ISP:
6196|_[ + ] Found:: UNIDENTIFIED
6197
6198 _[ - ]::--------------------------------------------------------------------------------------------------------------
6199|_[ + ] [ 79 / 100 ]-[00:50:55] [ - ]
6200|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/events/Pages/default.aspx?Date=This Month ]
6201|_[ + ] Exploit::
6202|_[ + ] Information Server:: HTTP/1.1 400 Bad Request, Server: Microsoft-HTTPAPI/2.0 , IP:80.169.89.102:443
6203|_[ + ] More details:: / - / , ISP:
6204|_[ + ] Found:: UNIDENTIFIED
6205
6206 _[ - ]::--------------------------------------------------------------------------------------------------------------
6207|_[ + ] [ 80 / 100 ]-[00:50:57] [ - ]
6208|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/things-to-do/keats-house/Pages/default.aspx ]
6209|_[ + ] Exploit::
6210|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
6211|_[ + ] More details:: / - / , ISP:
6212|_[ + ] Found:: UNIDENTIFIED
6213
6214 _[ - ]::--------------------------------------------------------------------------------------------------------------
6215|_[ + ] [ 81 / 100 ]-[00:50:58] [ - ]
6216|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/barbican-estate/Pages/barbican-history-architecture.aspx ]
6217|_[ + ] Exploit::
6218|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
6219|_[ + ] More details:: / - / , ISP:
6220|_[ + ] Found:: UNIDENTIFIED
6221
6222 _[ - ]::--------------------------------------------------------------------------------------------------------------
6223|_[ + ] [ 82 / 100 ]-[00:50:59] [ - ]
6224|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/barbican-estate/Pages/service-charge-schedules.aspx ]
6225|_[ + ] Exploit::
6226|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
6227|_[ + ] More details:: / - / , ISP:
6228|_[ + ] Found:: UNIDENTIFIED
6229
6230 _[ - ]::--------------------------------------------------------------------------------------------------------------
6231|_[ + ] [ 83 / 100 ]-[00:51:01] [ - ]
6232|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/barbican-estate/Pages/barbican-estate-parking.aspx ]
6233|_[ + ] Exploit::
6234|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
6235|_[ + ] More details:: / - / , ISP:
6236|_[ + ] Found:: UNIDENTIFIED
6237
6238 _[ - ]::--------------------------------------------------------------------------------------------------------------
6239|_[ + ] [ 84 / 100 ]-[00:51:02] [ - ]
6240|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/children-and-families/Pages/contact-us.aspx ]
6241|_[ + ] Exploit::
6242|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
6243|_[ + ] More details:: / - / , ISP:
6244|_[ + ] Found:: UNIDENTIFIED
6245
6246 _[ - ]::--------------------------------------------------------------------------------------------------------------
6247|_[ + ] [ 85 / 100 ]-[00:51:05] [ - ]
6248|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/wholesale-food-markets/billingsgate/Pages/default.aspx ]
6249|_[ + ] Exploit::
6250|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
6251|_[ + ] More details:: / - / , ISP:
6252|_[ + ] Found:: UNIDENTIFIED
6253
6254 _[ - ]::--------------------------------------------------------------------------------------------------------------
6255|_[ + ] [ 86 / 100 ]-[00:51:07] [ - ]
6256|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/tenders-and-procurement/Pages/useful-links.aspx ]
6257|_[ + ] Exploit::
6258|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
6259|_[ + ] More details:: / - / , ISP:
6260|_[ + ] Found:: UNIDENTIFIED
6261
6262 _[ - ]::--------------------------------------------------------------------------------------------------------------
6263|_[ + ] [ 87 / 100 ]-[00:51:08] [ - ]
6264|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/tenders-and-procurement/pages/responsible-procurement.aspx ]
6265|_[ + ] Exploit::
6266|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
6267|_[ + ] More details:: / - / , ISP:
6268|_[ + ] Found:: UNIDENTIFIED
6269
6270 _[ - ]::--------------------------------------------------------------------------------------------------------------
6271|_[ + ] [ 88 / 100 ]-[00:51:11] [ - ]
6272|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/about-us/Pages/publications.aspx ]
6273|_[ + ] Exploit::
6274|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
6275|_[ + ] More details:: / - / , ISP:
6276|_[ + ] Found:: UNIDENTIFIED
6277
6278 _[ - ]::--------------------------------------------------------------------------------------------------------------
6279|_[ + ] [ 89 / 100 ]-[00:51:11] [ - ]
6280|_[ + ] Target:: [ http://www.cityoflondon.gov.uk/jobs/Documents/Previous_Pension_Rights_form.pdf ]
6281|_[ + ] Exploit::
6282|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: COL-VMW-M-LB02 , IP:80.169.89.102:80
6283|_[ + ] More details:: / - / , ISP:
6284|_[ + ] Found:: UNIDENTIFIED
6285
6286 _[ - ]::--------------------------------------------------------------------------------------------------------------
6287|_[ + ] [ 90 / 100 ]-[00:51:14] [ - ]
6288|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/Pages/remembrancers.aspx ]
6289|_[ + ] Exploit::
6290|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
6291|_[ + ] More details:: / - / , ISP:
6292|_[ + ] Found:: UNIDENTIFIED
6293
6294 _[ - ]::--------------------------------------------------------------------------------------------------------------
6295|_[ + ] [ 91 / 100 ]-[00:51:16] [ - ]
6296|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/about-the-city/voting-elections/Pages/representation.aspx ]
6297|_[ + ] Exploit::
6298|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
6299|_[ + ] More details:: / - / , ISP:
6300|_[ + ] Found:: UNIDENTIFIED
6301
6302 _[ - ]::--------------------------------------------------------------------------------------------------------------
6303|_[ + ] [ 92 / 100 ]-[00:51:18] [ - ]
6304|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/port-health/environmental-control/Pages/default.aspx ]
6305|_[ + ] Exploit::
6306|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
6307|_[ + ] More details:: / - / , ISP:
6308|_[ + ] Found:: UNIDENTIFIED
6309
6310 _[ - ]::--------------------------------------------------------------------------------------------------------------
6311|_[ + ] [ 93 / 100 ]-[00:51:19] [ - ]
6312|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/environment-and-planning/planning/Pages/default.aspx ]
6313|_[ + ] Exploit::
6314|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
6315|_[ + ] More details:: / - / , ISP:
6316|_[ + ] Found:: UNIDENTIFIED
6317
6318 _[ - ]::--------------------------------------------------------------------------------------------------------------
6319|_[ + ] [ 94 / 100 ]-[00:51:21] [ - ]
6320|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/wholesale-food-markets/smithfield/Pages/default.aspx ]
6321|_[ + ] Exploit::
6322|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
6323|_[ + ] More details:: / - / , ISP:
6324|_[ + ] Found:: UNIDENTIFIED
6325
6326 _[ - ]::--------------------------------------------------------------------------------------------------------------
6327|_[ + ] [ 95 / 100 ]-[00:51:23] [ - ]
6328|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/business/asia-programme/india/Pages/mumbai-office.aspx ]
6329|_[ + ] Exploit::
6330|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
6331|_[ + ] More details:: / - / , ISP:
6332|_[ + ] Found:: UNIDENTIFIED
6333
6334 _[ - ]::--------------------------------------------------------------------------------------------------------------
6335|_[ + ] [ 96 / 100 ]-[00:51:27] [ - ]
6336|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/environment-and-planning/sustainability/Pages/default.aspx ]
6337|_[ + ] Exploit::
6338|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
6339|_[ + ] More details:: / - / , ISP:
6340|_[ + ] Found:: UNIDENTIFIED
6341
6342 _[ - ]::--------------------------------------------------------------------------------------------------------------
6343|_[ + ] [ 97 / 100 ]-[00:51:28] [ - ]
6344|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/jobs/Documents/TrainingRoomsLocationMap.pdf ]
6345|_[ + ] Exploit::
6346|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
6347|_[ + ] More details:: / - / , ISP:
6348|_[ + ] Found:: UNIDENTIFIED
6349
6350 _[ - ]::--------------------------------------------------------------------------------------------------------------
6351|_[ + ] [ 98 / 100 ]-[00:51:29] [ - ]
6352|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/services/port-health/import-controls/Pages/default.aspx ]
6353|_[ + ] Exploit::
6354|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
6355|_[ + ] More details:: / - / , ISP:
6356|_[ + ] Found:: UNIDENTIFIED
6357
6358 _[ - ]::--------------------------------------------------------------------------------------------------------------
6359|_[ + ] [ 99 / 100 ]-[00:51:31] [ - ]
6360|_[ + ] Target:: [ https://www.cityoflondon.gov.uk/search/Pages/a-to-z.aspx?Filter=G ]
6361|_[ + ] Exploit::
6362|_[ + ] Information Server:: HTTP/1.1 200 OK, Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET, IP:80.169.89.102:443
6363|_[ + ] More details:: / - / , ISP:
6364|_[ + ] Found:: UNIDENTIFIED
6365
6366[ INFO ] [ Shutting down ]
6367[ INFO ] [ End of process INURLBR at [31-03-2020 00:51:31]
6368[ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
6369[ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.cityoflondon.gov.uk/output/inurlbr-www.cityoflondon.gov.uk ]
6370|_________________________________________________________________________________________
6371
6372\_________________________________________________________________________________________/
6373################################################################################################################################
6374Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-31 00:29 EDT
6375Nmap scan report for 80.169.89.102
6376Host is up (0.11s latency).
6377Not shown: 474 filtered ports
6378Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
6379PORT STATE SERVICE VERSION
638080/tcp open http COL-VMW-M-LB02
6381| fingerprint-strings:
6382| FourOhFourRequest:
6383| HTTP/1.1 301 Moved Permanently
6384| Location: https:///nice%20ports%2C/Tri%6Eity.txt%2ebak
6385| Server: COL-VMW-M-LB02
6386| Cache-Control: no-cache
6387| Connection: close
6388| GenericLines:
6389| HTTP/1.1 301 Moved Permanently
6390| Location: https://
6391| Server: COL-VMW-M-LB02
6392| Cache-Control: no-cache
6393| Connection: close
6394| GetRequest, HTTPOptions, RTSPRequest:
6395| HTTP/1.1 301 Moved Permanently
6396| Location: https:///
6397| Server: COL-VMW-M-LB02
6398| Cache-Control: no-cache
6399| Connection: close
6400| SIPOptions:
6401| HTTP/1.1 301 Moved Permanently
6402| Location: https://sip:nm
6403| Server: COL-VMW-M-LB02
6404| Cache-Control: no-cache
6405|_ Connection: close
6406|_http-server-header: COL-VMW-M-LB02
6407|_http-title: Did not follow redirect to https://80.169.89.102/
6408|_https-redirect: ERROR: Script execution failed (use -d to debug)
6409443/tcp open ssl/http Microsoft IIS httpd 7.5
6410|_http-server-header: Microsoft-IIS/7.5
6411| http-title: Welcome to the City of London Corporation
6412|_Requested resource was https://80.169.89.102/Pages/default.aspx
6413| ssl-cert: Subject: commonName=*.cityoflondon.gov.uk/organizationName=City of London Corporation/countryName=GB
6414| Subject Alternative Name: DNS:*.cityoflondon.gov.uk, DNS:cityoflondon.gov.uk
6415| Not valid before: 2019-01-09T10:15:04
6416|_Not valid after: 2021-01-09T10:45:03
6417|_ssl-date: TLS randomness does not represent time
64181 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
6419SF-Port80-TCP:V=7.80%I=7%D=3/31%Time=5E82C73A%P=x86_64-pc-linux-gnu%r(GetR
6420SF:equest,7B,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nLocation:\x20htt
6421SF:ps:///\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20no-cache\r\nCo
6422SF:nnection:\x20close\r\n\r\n")%r(HTTPOptions,7B,"HTTP/1\.1\x20301\x20Move
6423SF:d\x20Permanently\r\nLocation:\x20https:///\r\nServer:\x20COL-VMW-M-LB02
6424SF:\r\nCache-Control:\x20no-cache\r\nConnection:\x20close\r\n\r\n")%r(RTSP
6425SF:Request,7B,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nLocation:\x20ht
6426SF:tps:///\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20no-cache\r\nC
6427SF:onnection:\x20close\r\n\r\n")%r(FourOhFourRequest,9E,"HTTP/1\.1\x20301\
6428SF:x20Moved\x20Permanently\r\nLocation:\x20https:///nice%20ports%2C/Tri%6E
6429SF:ity\.txt%2ebak\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20no-cac
6430SF:he\r\nConnection:\x20close\r\n\r\n")%r(GenericLines,7A,"HTTP/1\.1\x2030
6431SF:1\x20Moved\x20Permanently\r\nLocation:\x20https://\r\nServer:\x20COL-VM
6432SF:W-M-LB02\r\nCache-Control:\x20no-cache\r\nConnection:\x20close\r\n\r\n"
6433SF:)%r(SIPOptions,80,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nLocation
6434SF::\x20https://sip:nm\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20n
6435SF:o-cache\r\nConnection:\x20close\r\n\r\n");
6436Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
6437Device type: general purpose|firewall|storage-misc
6438Running (JUST GUESSING): Linux 2.6.X|3.X (90%), WatchGuard Fireware 11.X (89%), Synology DiskStation Manager 5.X (88%)
6439OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3.10 cpe:/o:watchguard:fireware:11.8 cpe:/o:linux:linux_kernel cpe:/a:synology:diskstation_manager:5.1
6440Aggressive OS guesses: Linux 2.6.32 (90%), Linux 2.6.39 (90%), Linux 2.6.32 or 3.10 (89%), Linux 3.10 (89%), Linux 3.4 (89%), WatchGuard Fireware 11.8 (89%), Linux 3.1 - 3.2 (89%), Synology DiskStation Manager 5.1 (88%), Linux 2.6.32 - 2.6.39 (85%)
6441No exact OS matches for host (test conditions non-ideal).
6442Network Distance: 12 hops
6443Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
6444
6445TRACEROUTE (using port 443/tcp)
6446HOP RTT ADDRESS
64471 104.57 ms 10.203.9.1
64482 104.74 ms 45.131.5.3
64493 104.78 ms 109.236.95.224
64504 106.07 ms 109.236.95.106
64515 106.39 ms et-0-0-1-pr2.AMS.router.colt.net (80.249.208.236)
64526 115.80 ms xe0-3-0-sar18.LON.router.colt.net (212.74.68.145)
64537 115.11 ms xe0-3-0-sar18.LON.router.colt.net (212.74.68.145)
64548 115.09 ms cpeuk_lon002520.ia.colt.net (80.169.196.38)
64559 115.87 ms 195.110.81.4
645610 116.64 ms 195.110.81.4
645711 113.08 ms 195.110.81.4
645812 112.98 ms 80.169.89.102
6459###############################################################################################################################
6460Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-31 00:32 EDT
6461Nmap scan report for 80.169.89.102
6462Host is up.
6463Not shown: 14 filtered ports
6464Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
6465PORT STATE SERVICE VERSION
646653/udp open|filtered domain
646767/udp open|filtered dhcps
646868/udp open|filtered dhcpc
646969/udp open|filtered tftp
647088/udp open|filtered kerberos-sec
6471123/udp open|filtered ntp
6472137/udp open|filtered netbios-ns
6473138/udp open|filtered netbios-dgm
6474139/udp open|filtered netbios-ssn
6475161/udp open|filtered snmp
6476162/udp open|filtered snmptrap
6477389/udp open|filtered ldap
6478520/udp open|filtered route
64792049/udp open|filtered nfs
6480Too many fingerprints match this host to give specific OS details
6481
6482TRACEROUTE (using proto 1/icmp)
6483HOP RTT ADDRESS
64841 108.63 ms 10.203.9.1
64852 108.66 ms 45.131.5.2
64863 108.68 ms 109.236.95.228
64874 108.82 ms 109.236.95.167
64885 109.44 ms et-0-0-1-pr2.AMS.router.colt.net (80.249.208.236)
64896 114.00 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
64907 113.80 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
64918 113.61 ms cpeuk_lon002520.ia.colt.net (80.169.196.38)
64929 113.99 ms 195.110.81.4
649310 ... 30
6494###############################################################################################################################
6495Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-31 00:37 EDT
6496Nmap scan report for 80.169.89.102
6497Host is up.
6498
6499PORT STATE SERVICE VERSION
650067/tcp filtered dhcps
650167/udp open|filtered dhcps
6502|_dhcp-discover: ERROR: Script execution failed (use -d to debug)
6503Too many fingerprints match this host to give specific OS details
6504
6505TRACEROUTE (using proto 1/icmp)
6506HOP RTT ADDRESS
65071 104.58 ms 10.203.9.1
65082 104.64 ms 45.131.5.2
65093 105.60 ms 109.236.95.228
65104 106.38 ms 109.236.95.167
65115 106.98 ms et-0-0-1-pr2.AMS.router.colt.net (80.249.208.236)
65126 116.59 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
65137 112.26 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
65148 112.21 ms cpeuk_lon002520.ia.colt.net (80.169.196.38)
65159 112.30 ms 195.110.81.4
651610 ... 30
6517##############################################################################################################################
6518Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-31 00:39 EDT
6519Nmap scan report for 80.169.89.102
6520Host is up.
6521
6522PORT STATE SERVICE VERSION
652368/tcp filtered dhcpc
652468/udp open|filtered dhcpc
6525Too many fingerprints match this host to give specific OS details
6526
6527TRACEROUTE (using proto 1/icmp)
6528HOP RTT ADDRESS
65291 102.08 ms 10.203.9.1
65302 102.94 ms 45.131.5.2
65313 102.95 ms 109.236.95.228
65324 103.36 ms 109.236.95.167
65335 103.37 ms et-0-0-1-pr2.AMS.router.colt.net (80.249.208.236)
65346 112.15 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
65357 112.05 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
65368 112.03 ms cpeuk_lon002520.ia.colt.net (80.169.196.38)
65379 112.32 ms 195.110.81.4
653810 ... 30
6539################################################################################################################################
6540Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-31 00:41 EDT
6541Nmap scan report for 80.169.89.102
6542Host is up.
6543
6544PORT STATE SERVICE VERSION
654569/tcp filtered tftp
654669/udp open|filtered tftp
6547Too many fingerprints match this host to give specific OS details
6548
6549TRACEROUTE (using proto 1/icmp)
6550HOP RTT ADDRESS
65511 100.67 ms 10.203.9.1
65522 100.85 ms 45.131.5.2
65533 100.82 ms 109.236.95.228
65544 101.71 ms 109.236.95.167
65555 127.31 ms et-0-0-1-pr2.AMS.router.colt.net (80.249.208.236)
65566 111.72 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
65577 111.69 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
65588 111.33 ms cpeuk_lon002520.ia.colt.net (80.169.196.38)
65599 111.85 ms 195.110.81.4
656010 ... 30
6561###############################################################################################################################
6562http://80.169.89.102 [301 Moved Permanently] Country[UNITED KINGDOM][GB], HTTPServer[COL-VMW-M-LB02], IP[80.169.89.102], RedirectLocation[https://80.169.89.102/]
6563https://80.169.89.102/ [302 Found] Country[UNITED KINGDOM][GB], HTTPServer[Microsoft-IIS/7.5], IP[80.169.89.102], Microsoft-IIS[7.5], Microsoft-Sharepoint[14.0.0.7239], RedirectLocation[https://80.169.89.102/Pages/default.aspx], Title[Document Moved], UncommonHeaders[sprequestguid,x-sharepointhealthscore,microsoftsharepointteamservices,x-ms-invokeapp], X-Powered-By[ASP.NET]
6564https://80.169.89.102/Pages/default.aspx [200 OK] ASP_NET[2.0.50727], Country[UNITED KINGDOM][GB], HTTPServer[Microsoft-IIS/7.5], IP[80.169.89.102], JQuery[1.6.2], Microsoft-IIS[7.5], Microsoft-Sharepoint[14.0.0.7239], Script[text/javascript], Title[Welcome to the City of London Corporation], UncommonHeaders[sprequestguid,x-sharepointhealthscore,microsoftsharepointteamservices,x-ms-invokeapp], X-Powered-By[ASP.NET], X-UA-Compatible[IE=9]
6565###############################################################################################################################
6566HTTP/1.1 301 Moved Permanently
6567Location: https://80.169.89.102/
6568Server: COL-VMW-M-LB02
6569Cache-Control: no-cache
6570Connection: close
6571
6572HTTP/1.1 301 Moved Permanently
6573Location: https://80.169.89.102/
6574Server: COL-VMW-M-LB02
6575Cache-Control: no-cache
6576Connection: close
6577###############################################################################################################################
6578 IIS 7.5
6579 jQuery 1.6.2
6580 Microsoft ASP.NET 2.0.50727
6581 Microsoft ASP.NET
6582 Microsoft SharePoint 14.0.0.7239
6583 X-MS-InvokeApp: 1; RequireRead
6584###############################################################################################################################
6585Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-31 00:44 EDT
6586Nmap scan report for 80.169.89.102
6587Host is up.
6588
6589PORT STATE SERVICE VERSION
6590123/tcp filtered ntp
6591123/udp open|filtered ntp
6592Too many fingerprints match this host to give specific OS details
6593
6594TRACEROUTE (using proto 1/icmp)
6595HOP RTT ADDRESS
65961 101.15 ms 10.203.9.1
65972 101.34 ms 45.131.5.2
65983 101.40 ms 109.236.95.228
65994 102.32 ms 109.236.95.167
66005 103.12 ms et-0-0-1-pr2.AMS.router.colt.net (80.249.208.236)
66016 112.00 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
66027 111.73 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
66038 111.49 ms cpeuk_lon002520.ia.colt.net (80.169.196.38)
66049 112.04 ms 195.110.81.4
660510 ... 30
6606###############################################################################################################################
6607https://80.169.89.102/ [302 Found] Country[UNITED KINGDOM][GB], HTTPServer[Microsoft-IIS/7.5], IP[80.169.89.102], Microsoft-IIS[7.5], Microsoft-Sharepoint[14.0.0.7239], RedirectLocation[https://80.169.89.102/Pages/default.aspx], Title[Document Moved], UncommonHeaders[sprequestguid,x-sharepointhealthscore,microsoftsharepointteamservices,x-ms-invokeapp], X-Powered-By[ASP.NET]
6608https://80.169.89.102/Pages/default.aspx [200 OK] ASP_NET[2.0.50727], Country[UNITED KINGDOM][GB], HTTPServer[Microsoft-IIS/7.5], IP[80.169.89.102], JQuery[1.6.2], Microsoft-IIS[7.5], Microsoft-Sharepoint[14.0.0.7239], Script[text/javascript], Title[Welcome to the City of London Corporation], UncommonHeaders[sprequestguid,x-sharepointhealthscore,microsoftsharepointteamservices,x-ms-invokeapp], X-Powered-By[ASP.NET], X-UA-Compatible[IE=9]
6609###############################################################################################################################
6610 jQuery 1.6.2
6611 IIS 7.5
6612 Microsoft ASP.NET
6613 Microsoft SharePoint 14.0.0.7239
6614 Microsoft ASP.NET 2.0.50727
6615 X-MS-InvokeApp: 1; RequireReadOnly
6616###############################################################################################################################
6617Version: 2.0.0-static
6618OpenSSL 1.1.1f-dev xx XXX xxxx
6619
6620Connected to 80.169.89.102
6621
6622Testing SSL server 80.169.89.102 on port 443 using SNI name 80.169.89.102
6623
6624 SSL/TLS Protocols:
6625SSLv2 disabled
6626SSLv3 disabled
6627TLSv1.0 disabled
6628TLSv1.1 disabled
6629TLSv1.2 enabled
6630TLSv1.3 disabled
6631
6632 TLS Fallback SCSV:
6633Server supports TLS Fallback SCSV
6634
6635 TLS renegotiation:
6636Session renegotiation not supported
6637
6638 TLS Compression:
6639Compression disabled
6640
6641 Heartbleed:
6642TLSv1.2 not vulnerable to heartbleed
6643
6644 Supported Server Cipher(s):
6645Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
6646Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
6647Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
6648Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
6649Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
6650Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
6651Accepted TLSv1.2 256 bits AES256-GCM-SHA384
6652Accepted TLSv1.2 128 bits AES128-GCM-SHA256
6653Accepted TLSv1.2 256 bits AES256-SHA256
6654Accepted TLSv1.2 256 bits AES256-SHA
6655Accepted TLSv1.2 128 bits AES128-SHA256
6656Accepted TLSv1.2 128 bits AES128-SHA
6657Accepted TLSv1.2 256 bits CAMELLIA256-SHA
6658Accepted TLSv1.2 128 bits CAMELLIA128-SHA
6659
6660 Server Key Exchange Group(s):
6661TLSv1.2 128 bits secp256r1 (NIST P-256)
6662
6663 Server Signature Algorithm(s):
6664TLSv1.2 rsa_pkcs1_sha1
6665TLSv1.2 dsa_sha1
6666TLSv1.2 ecdsa_sha1
6667TLSv1.2 rsa_pkcs1_sha224
6668TLSv1.2 dsa_sha224
6669TLSv1.2 ecdsa_sha224
6670TLSv1.2 rsa_pkcs1_sha256
6671TLSv1.2 dsa_sha256
6672TLSv1.2 ecdsa_secp256r1_sha256
6673TLSv1.2 rsa_pkcs1_sha384
6674TLSv1.2 dsa_sha384
6675TLSv1.2 ecdsa_secp384r1_sha384
6676TLSv1.2 rsa_pkcs1_sha512
6677TLSv1.2 dsa_sha512
6678TLSv1.2 ecdsa_secp521r1_sha512
6679
6680 SSL Certificate:
6681Signature Algorithm: sha256WithRSAEncryption
6682RSA Key Strength: 2048
6683
6684Subject: *.cityoflondon.gov.uk
6685Altnames: DNS:*.cityoflondon.gov.uk, DNS:cityoflondon.gov.uk
6686Issuer: Entrust Certification Authority - L1K
6687
6688Not valid before: Jan 9 10:15:04 2019 GMT
6689Not valid after: Jan 9 10:45:03 2021 GMT
6690###############################################################################################################################
6691Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-31 00:53 EDT
6692Nmap scan report for 80.169.89.102
6693Host is up (0.11s latency).
6694Not shown: 65533 filtered ports
6695PORT STATE SERVICE VERSION
669680/tcp open http COL-VMW-M-LB02
6697| fingerprint-strings:
6698| FourOhFourRequest:
6699| HTTP/1.1 301 Moved Permanently
6700| Location: https:///nice%20ports%2C/Tri%6Eity.txt%2ebak
6701| Server: COL-VMW-M-LB02
6702| Cache-Control: no-cache
6703| Connection: close
6704| GenericLines:
6705| HTTP/1.1 301 Moved Permanently
6706| Location: https://
6707| Server: COL-VMW-M-LB02
6708| Cache-Control: no-cache
6709| Connection: close
6710| GetRequest, HTTPOptions, RTSPRequest:
6711| HTTP/1.1 301 Moved Permanently
6712| Location: https:///
6713| Server: COL-VMW-M-LB02
6714| Cache-Control: no-cache
6715| Connection: close
6716| SIPOptions:
6717| HTTP/1.1 301 Moved Permanently
6718| Location: https://sip:nm
6719| Server: COL-VMW-M-LB02
6720| Cache-Control: no-cache
6721|_ Connection: close
6722|_http-server-header: COL-VMW-M-LB02
6723|_http-title: Did not follow redirect to https://80.169.89.102/
6724|_https-redirect: ERROR: Script execution failed (use -d to debug)
6725443/tcp open ssl/http Microsoft IIS httpd 7.5
6726|_http-server-header: Microsoft-IIS/7.5
6727| http-title: Welcome to the City of London Corporation
6728|_Requested resource was https://80.169.89.102/Pages/default.aspx
6729| ssl-cert: Subject: commonName=*.cityoflondon.gov.uk/organizationName=City of London Corporation/countryName=GB
6730| Subject Alternative Name: DNS:*.cityoflondon.gov.uk, DNS:cityoflondon.gov.uk
6731| Not valid before: 2019-01-09T10:15:04
6732|_Not valid after: 2021-01-09T10:45:03
6733|_ssl-date: TLS randomness does not represent time
67341 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
6735SF-Port80-TCP:V=7.80%I=7%D=3/31%Time=5E82CD4F%P=x86_64-pc-linux-gnu%r(GetR
6736SF:equest,7B,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nLocation:\x20htt
6737SF:ps:///\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20no-cache\r\nCo
6738SF:nnection:\x20close\r\n\r\n")%r(HTTPOptions,7B,"HTTP/1\.1\x20301\x20Move
6739SF:d\x20Permanently\r\nLocation:\x20https:///\r\nServer:\x20COL-VMW-M-LB02
6740SF:\r\nCache-Control:\x20no-cache\r\nConnection:\x20close\r\n\r\n")%r(RTSP
6741SF:Request,7B,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nLocation:\x20ht
6742SF:tps:///\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20no-cache\r\nC
6743SF:onnection:\x20close\r\n\r\n")%r(FourOhFourRequest,9E,"HTTP/1\.1\x20301\
6744SF:x20Moved\x20Permanently\r\nLocation:\x20https:///nice%20ports%2C/Tri%6E
6745SF:ity\.txt%2ebak\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20no-cac
6746SF:he\r\nConnection:\x20close\r\n\r\n")%r(GenericLines,7A,"HTTP/1\.1\x2030
6747SF:1\x20Moved\x20Permanently\r\nLocation:\x20https://\r\nServer:\x20COL-VM
6748SF:W-M-LB02\r\nCache-Control:\x20no-cache\r\nConnection:\x20close\r\n\r\n"
6749SF:)%r(SIPOptions,80,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nLocation
6750SF::\x20https://sip:nm\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20n
6751SF:o-cache\r\nConnection:\x20close\r\n\r\n");
6752Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
6753Device type: general purpose|firewall|storage-misc
6754Running (JUST GUESSING): Linux 2.6.X|3.X (90%), WatchGuard Fireware 11.X (89%), Synology DiskStation Manager 5.X (88%)
6755OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3.10 cpe:/o:watchguard:fireware:11.8 cpe:/o:linux:linux_kernel cpe:/a:synology:diskstation_manager:5.1
6756Aggressive OS guesses: Linux 2.6.32 (90%), Linux 2.6.39 (90%), Linux 3.10 (89%), Linux 3.4 (89%), WatchGuard Fireware 11.8 (89%), Linux 3.1 - 3.2 (89%), Synology DiskStation Manager 5.1 (88%), Linux 2.6.32 or 3.10 (87%), Linux 2.6.32 - 2.6.39 (85%)
6757No exact OS matches for host (test conditions non-ideal).
6758Network Distance: 12 hops
6759Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
6760
6761TRACEROUTE (using port 443/tcp)
6762HOP RTT ADDRESS
67631 103.49 ms 10.203.9.1
67642 100.74 ms 45.131.5.3
67653 100.76 ms 109.236.95.228
67664 100.91 ms 109.236.95.173
67675 101.74 ms et-0-0-1-pr2.AMS.router.colt.net (80.249.208.236)
67686 111.04 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
67697 110.61 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
67708 110.59 ms cpeuk_lon002520.ia.colt.net (80.169.196.38)
67719 111.04 ms 195.110.81.4
677210 111.82 ms 195.110.81.4
677311 113.00 ms 195.110.81.4
677412 113.00 ms 80.169.89.102
6775###############################################################################################################################
6776Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-31 00:58 EDT
6777Nmap scan report for 80.169.89.102
6778Host is up.
6779
6780PORT STATE SERVICE VERSION
678153/tcp filtered domain
678267/tcp filtered dhcps
678368/tcp filtered dhcpc
678469/tcp filtered tftp
678588/tcp filtered kerberos-sec
6786123/tcp filtered ntp
6787137/tcp filtered netbios-ns
6788138/tcp filtered netbios-dgm
6789139/tcp filtered netbios-ssn
6790161/tcp filtered snmp
6791162/tcp filtered snmptrap
6792389/tcp filtered ldap
6793520/tcp filtered efs
67942049/tcp filtered nfs
679553/udp open|filtered domain
679667/udp open|filtered dhcps
679768/udp open|filtered dhcpc
679869/udp open|filtered tftp
679988/udp open|filtered kerberos-sec
6800123/udp open|filtered ntp
6801137/udp open|filtered netbios-ns
6802138/udp open|filtered netbios-dgm
6803139/udp open|filtered netbios-ssn
6804161/udp open|filtered snmp
6805162/udp open|filtered snmptrap
6806389/udp open|filtered ldap
6807520/udp open|filtered route
68082049/udp open|filtered nfs
6809Too many fingerprints match this host to give specific OS details
6810
6811TRACEROUTE (using proto 1/icmp)
6812HOP RTT ADDRESS
68131 104.79 ms 10.203.9.1
68142 104.88 ms 45.131.5.2
68153 104.86 ms 109.236.95.228
68164 105.98 ms 109.236.95.167
68175 106.79 ms et-0-0-1-pr2.AMS.router.colt.net (80.249.208.236)
68186 118.96 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
68197 118.92 ms xe4-2-1-sar18.LON.router.colt.net (212.74.73.181)
68208 115.43 ms cpeuk_lon002520.ia.colt.net (80.169.196.38)
68219 116.07 ms 195.110.81.4
682210 ... 30
6823###############################################################################################################################
6824Hosts
6825=====
6826
6827address mac name os_name os_flavor os_sp purpose info comments
6828------- --- ---- ------- --------- ----- ------- ---- --------
682923.100.15.180 Unknown device
683052.52.234.222 ec2-52-52-234-222.us-west-1.compute.amazonaws.com embedded device
683180.169.89.102 Linux 2.6.X server
683291.211.89.189 embedded device
683393.174.93.84 Linux 3.X server
683494.140.114.104 Linux 3.X server
6835104.87.36.73 a104-87-36-73.deploy.static.akamaitechnologies.com Unknown device
6836201.148.104.59 hcenter10459.dedicados.cl Unknown device
6837217.148.69.93 217-148-69-93.lacaixa.com Unknown device
6838217.148.69.235 caixabank.com Unknown device
6839217.148.71.93 217-148-71-93.lacaixa.com Unknown device
6840217.148.71.235 caixabank.com Unknown device
6841###############################################################################################################################
6842Services
6843========
6844
6845host port proto name state info
6846---- ---- ----- ---- ----- ----
684723.100.15.180 53 tcp domain filtered
684823.100.15.180 53 udp domain unknown
684923.100.15.180 67 tcp dhcps filtered
685023.100.15.180 67 udp dhcps unknown
685123.100.15.180 68 tcp dhcpc filtered
685223.100.15.180 68 udp dhcpc unknown
685323.100.15.180 69 tcp tftp filtered
685423.100.15.180 69 udp tftp unknown
685523.100.15.180 88 tcp kerberos-sec filtered
685623.100.15.180 88 udp kerberos-sec unknown
685723.100.15.180 123 tcp ntp filtered
685823.100.15.180 123 udp ntp unknown
685923.100.15.180 137 tcp netbios-ns filtered
686023.100.15.180 137 udp netbios-ns unknown
686123.100.15.180 138 tcp netbios-dgm filtered
686223.100.15.180 138 udp netbios-dgm unknown
686323.100.15.180 139 tcp netbios-ssn filtered
686423.100.15.180 139 udp netbios-ssn unknown
686523.100.15.180 161 tcp snmp filtered
686623.100.15.180 161 udp snmp unknown
686723.100.15.180 162 tcp snmptrap filtered
686823.100.15.180 162 udp snmptrap unknown
686923.100.15.180 389 tcp ldap filtered
687023.100.15.180 389 udp ldap unknown
687123.100.15.180 520 tcp efs filtered
687223.100.15.180 520 udp route unknown
687323.100.15.180 2049 tcp nfs filtered
687423.100.15.180 2049 udp nfs unknown
687552.52.234.222 53 tcp domain filtered
687652.52.234.222 53 udp domain unknown
687752.52.234.222 67 tcp dhcps filtered
687852.52.234.222 67 udp dhcps unknown
687952.52.234.222 68 tcp dhcpc filtered
688052.52.234.222 68 udp dhcpc unknown
688152.52.234.222 69 tcp tftp filtered
688252.52.234.222 69 udp tftp unknown
688352.52.234.222 80 tcp http open Apache httpd 2.2.34
688452.52.234.222 88 tcp kerberos-sec filtered
688552.52.234.222 88 udp kerberos-sec unknown
688652.52.234.222 123 tcp ntp filtered
688752.52.234.222 123 udp ntp unknown
688852.52.234.222 137 tcp netbios-ns filtered
688952.52.234.222 137 udp netbios-ns unknown
689052.52.234.222 138 tcp netbios-dgm filtered
689152.52.234.222 138 udp netbios-dgm unknown
689252.52.234.222 139 tcp netbios-ssn filtered
689352.52.234.222 139 udp netbios-ssn unknown
689452.52.234.222 161 tcp snmp filtered
689552.52.234.222 161 udp snmp unknown
689652.52.234.222 162 tcp snmptrap filtered
689752.52.234.222 162 udp snmptrap unknown
689852.52.234.222 389 tcp ldap filtered
689952.52.234.222 389 udp ldap unknown
690052.52.234.222 443 tcp ssl/http open Apache Tomcat/Coyote JSP engine 1.1
690152.52.234.222 520 tcp efs filtered
690252.52.234.222 520 udp route unknown
690352.52.234.222 2049 tcp nfs filtered
690452.52.234.222 2049 udp nfs unknown
690580.169.89.102 53 tcp domain filtered
690680.169.89.102 53 udp domain unknown
690780.169.89.102 67 tcp dhcps filtered
690880.169.89.102 67 udp dhcps unknown
690980.169.89.102 68 tcp dhcpc filtered
691080.169.89.102 68 udp dhcpc unknown
691180.169.89.102 69 tcp tftp filtered
691280.169.89.102 69 udp tftp unknown
691380.169.89.102 80 tcp http open COL-VMW-M-LB02
691480.169.89.102 88 tcp kerberos-sec filtered
691580.169.89.102 88 udp kerberos-sec unknown
691680.169.89.102 123 tcp ntp filtered
691780.169.89.102 123 udp ntp unknown
691880.169.89.102 137 tcp netbios-ns filtered
691980.169.89.102 137 udp netbios-ns unknown
692080.169.89.102 138 tcp netbios-dgm filtered
692180.169.89.102 138 udp netbios-dgm unknown
692280.169.89.102 139 tcp netbios-ssn filtered
692380.169.89.102 139 udp netbios-ssn unknown
692480.169.89.102 161 tcp snmp filtered
692580.169.89.102 161 udp snmp unknown
692680.169.89.102 162 tcp snmptrap filtered
692780.169.89.102 162 udp snmptrap unknown
692880.169.89.102 389 tcp ldap filtered
692980.169.89.102 389 udp ldap unknown
693080.169.89.102 443 tcp ssl/http open Microsoft IIS httpd 7.5
693180.169.89.102 520 tcp efs filtered
693280.169.89.102 520 udp route unknown
693380.169.89.102 2049 tcp nfs filtered
693480.169.89.102 2049 udp nfs unknown
693591.211.89.189 53 tcp domain closed
693691.211.89.189 53 udp domain closed
693791.211.89.189 67 tcp dhcps filtered
693891.211.89.189 67 udp dhcps closed
693991.211.89.189 68 tcp dhcpc closed
694091.211.89.189 68 udp dhcpc unknown
694191.211.89.189 69 tcp tftp closed
694291.211.89.189 69 udp tftp closed
694391.211.89.189 88 tcp kerberos-sec filtered
694491.211.89.189 88 udp kerberos-sec closed
694591.211.89.189 123 tcp ntp closed
694691.211.89.189 123 udp ntp closed
694791.211.89.189 137 tcp netbios-ns closed
694891.211.89.189 137 udp netbios-ns closed
694991.211.89.189 138 tcp netbios-dgm closed
695091.211.89.189 138 udp netbios-dgm unknown
695191.211.89.189 139 tcp netbios-ssn filtered
695291.211.89.189 139 udp netbios-ssn unknown
695391.211.89.189 161 tcp snmp filtered
695491.211.89.189 161 udp snmp unknown
695591.211.89.189 162 tcp snmptrap closed
695691.211.89.189 162 udp snmptrap closed
695791.211.89.189 389 tcp ldap closed
695891.211.89.189 389 udp ldap closed
695991.211.89.189 520 tcp efs filtered
696091.211.89.189 520 udp route unknown
696191.211.89.189 2049 tcp nfs closed
696291.211.89.189 2049 udp nfs closed
696393.174.93.84 53 tcp domain filtered
696493.174.93.84 53 udp domain unknown
696593.174.93.84 67 tcp dhcps filtered
696693.174.93.84 67 udp dhcps unknown
696793.174.93.84 68 tcp dhcpc filtered
696893.174.93.84 68 udp dhcpc unknown
696993.174.93.84 69 tcp tftp filtered
697093.174.93.84 69 udp tftp unknown
697193.174.93.84 80 tcp http open Apache httpd 2.4.6 (CentOS) PHP/5.4.16
697293.174.93.84 88 tcp kerberos-sec filtered
697393.174.93.84 88 udp kerberos-sec unknown
697493.174.93.84 123 tcp ntp filtered
697593.174.93.84 123 udp ntp filtered
697693.174.93.84 137 tcp netbios-ns filtered
697793.174.93.84 137 udp netbios-ns unknown
697893.174.93.84 138 tcp netbios-dgm filtered
697993.174.93.84 138 udp netbios-dgm filtered
698093.174.93.84 139 tcp netbios-ssn filtered
698193.174.93.84 139 udp netbios-ssn filtered
698293.174.93.84 161 tcp snmp filtered
698393.174.93.84 161 udp snmp unknown
698493.174.93.84 162 tcp snmptrap filtered
698593.174.93.84 162 udp snmptrap filtered
698693.174.93.84 389 tcp ldap filtered
698793.174.93.84 389 udp ldap unknown
698893.174.93.84 520 tcp efs filtered
698993.174.93.84 520 udp route unknown
699093.174.93.84 2049 tcp nfs filtered
699193.174.93.84 2049 udp nfs unknown
699293.174.93.84 3030 tcp http-proxy open tinyproxy 1.8.3
699394.140.114.104 22 tcp ssh open OpenSSH 7.4 protocol 2.0
699494.140.114.104 53 tcp domain closed
699594.140.114.104 53 udp domain closed
699694.140.114.104 67 tcp dhcps closed
699794.140.114.104 67 udp dhcps unknown
699894.140.114.104 68 tcp dhcpc closed
699994.140.114.104 68 udp dhcpc unknown
700094.140.114.104 69 tcp tftp closed
700194.140.114.104 69 udp tftp closed
700294.140.114.104 80 tcp http open nginx 1.16.1
700394.140.114.104 88 tcp kerberos-sec closed
700494.140.114.104 88 udp kerberos-sec closed
700594.140.114.104 111 tcp rpcbind open 2-4 RPC #100000
700694.140.114.104 123 tcp ntp closed
700794.140.114.104 123 udp ntp unknown
700894.140.114.104 135 tcp msrpc filtered
700994.140.114.104 137 tcp netbios-ns filtered
701094.140.114.104 137 udp netbios-ns unknown
701194.140.114.104 138 tcp netbios-dgm filtered
701294.140.114.104 138 udp netbios-dgm unknown
701394.140.114.104 139 tcp netbios-ssn closed
701494.140.114.104 139 udp netbios-ssn closed
701594.140.114.104 161 tcp snmp closed
701694.140.114.104 161 udp snmp closed
701794.140.114.104 162 tcp snmptrap closed
701894.140.114.104 162 udp snmptrap unknown
701994.140.114.104 389 tcp ldap closed
702094.140.114.104 389 udp ldap unknown
702194.140.114.104 520 tcp efs closed
702294.140.114.104 520 udp route closed
702394.140.114.104 2049 tcp nfs closed
702494.140.114.104 2049 udp nfs unknown
7025104.87.36.73 53 tcp domain filtered
7026104.87.36.73 53 udp domain unknown
7027104.87.36.73 67 tcp dhcps filtered
7028104.87.36.73 67 udp dhcps unknown
7029104.87.36.73 68 tcp dhcpc filtered
7030104.87.36.73 68 udp dhcpc unknown
7031104.87.36.73 69 tcp tftp filtered
7032104.87.36.73 69 udp tftp unknown
7033104.87.36.73 88 tcp kerberos-sec filtered
7034104.87.36.73 88 udp kerberos-sec unknown
7035104.87.36.73 123 tcp ntp filtered
7036104.87.36.73 123 udp ntp unknown
7037104.87.36.73 137 tcp netbios-ns filtered
7038104.87.36.73 137 udp netbios-ns unknown
7039104.87.36.73 138 tcp netbios-dgm filtered
7040104.87.36.73 138 udp netbios-dgm unknown
7041104.87.36.73 139 tcp netbios-ssn filtered
7042104.87.36.73 139 udp netbios-ssn unknown
7043104.87.36.73 161 tcp snmp filtered
7044104.87.36.73 161 udp snmp unknown
7045104.87.36.73 162 tcp snmptrap filtered
7046104.87.36.73 162 udp snmptrap unknown
7047104.87.36.73 389 tcp ldap filtered
7048104.87.36.73 389 udp ldap unknown
7049104.87.36.73 520 tcp efs filtered
7050104.87.36.73 520 udp route unknown
7051104.87.36.73 2049 tcp nfs filtered
7052104.87.36.73 2049 udp nfs unknown
7053201.148.104.59 21 tcp ftp open The firewall on this server is blocking your connection. You need to contact the server owner or hosting provider for further information. Your blocked IP address is: 190.105.229.22 This server's hostname is: hcenter10459.dedicados.cl \x0d\x0a
7054201.148.104.59 53 tcp domain filtered
7055201.148.104.59 53 udp domain unknown
7056201.148.104.59 67 tcp dhcps filtered
7057201.148.104.59 67 udp dhcps unknown
7058201.148.104.59 68 tcp dhcpc filtered
7059201.148.104.59 68 udp dhcpc unknown
7060201.148.104.59 69 tcp tftp filtered
7061201.148.104.59 69 udp tftp unknown
7062201.148.104.59 88 tcp kerberos-sec filtered
7063201.148.104.59 88 udp kerberos-sec unknown
7064201.148.104.59 123 tcp ntp filtered
7065201.148.104.59 123 udp ntp unknown
7066201.148.104.59 137 tcp netbios-ns filtered
7067201.148.104.59 137 udp netbios-ns unknown
7068201.148.104.59 138 tcp netbios-dgm filtered
7069201.148.104.59 138 udp netbios-dgm unknown
7070201.148.104.59 139 tcp netbios-ssn filtered
7071201.148.104.59 139 udp netbios-ssn unknown
7072201.148.104.59 161 tcp snmp filtered
7073201.148.104.59 161 udp snmp unknown
7074201.148.104.59 162 tcp snmptrap filtered
7075201.148.104.59 162 udp snmptrap unknown
7076201.148.104.59 389 tcp ldap filtered
7077201.148.104.59 389 udp ldap unknown
7078201.148.104.59 520 tcp efs filtered
7079201.148.104.59 520 udp route unknown
7080201.148.104.59 2049 tcp nfs filtered
7081201.148.104.59 2049 udp nfs unknown
7082217.148.69.93 53 tcp domain filtered
7083217.148.69.93 53 udp domain unknown
7084217.148.69.93 67 tcp dhcps filtered
7085217.148.69.93 67 udp dhcps unknown
7086217.148.69.93 68 tcp dhcpc filtered
7087217.148.69.93 68 udp dhcpc unknown
7088217.148.69.93 69 tcp tftp filtered
7089217.148.69.93 69 udp tftp unknown
7090217.148.69.93 88 tcp kerberos-sec filtered
7091217.148.69.93 88 udp kerberos-sec unknown
7092217.148.69.93 123 tcp ntp filtered
7093217.148.69.93 123 udp ntp unknown
7094217.148.69.93 137 tcp netbios-ns filtered
7095217.148.69.93 137 udp netbios-ns unknown
7096217.148.69.93 138 tcp netbios-dgm filtered
7097217.148.69.93 138 udp netbios-dgm unknown
7098217.148.69.93 139 tcp netbios-ssn filtered
7099217.148.69.93 139 udp netbios-ssn unknown
7100217.148.69.93 161 tcp snmp filtered
7101217.148.69.93 161 udp snmp unknown
7102217.148.69.93 162 tcp snmptrap filtered
7103217.148.69.93 162 udp snmptrap unknown
7104217.148.69.93 389 tcp ldap filtered
7105217.148.69.93 389 udp ldap unknown
7106217.148.69.93 520 tcp efs filtered
7107217.148.69.93 520 udp route unknown
7108217.148.69.93 2049 tcp nfs filtered
7109217.148.69.93 2049 udp nfs unknown
7110217.148.69.235 53 tcp domain filtered
7111217.148.69.235 53 udp domain unknown
7112217.148.69.235 67 tcp dhcps filtered
7113217.148.69.235 67 udp dhcps unknown
7114217.148.69.235 68 tcp dhcpc filtered
7115217.148.69.235 68 udp dhcpc unknown
7116217.148.69.235 69 tcp tftp filtered
7117217.148.69.235 69 udp tftp unknown
7118217.148.69.235 88 tcp kerberos-sec filtered
7119217.148.69.235 88 udp kerberos-sec unknown
7120217.148.69.235 123 tcp ntp filtered
7121217.148.69.235 123 udp ntp unknown
7122217.148.69.235 137 tcp netbios-ns filtered
7123217.148.69.235 137 udp netbios-ns unknown
7124217.148.69.235 138 tcp netbios-dgm filtered
7125217.148.69.235 138 udp netbios-dgm unknown
7126217.148.69.235 139 tcp netbios-ssn filtered
7127217.148.69.235 139 udp netbios-ssn unknown
7128217.148.69.235 161 tcp snmp filtered
7129217.148.69.235 161 udp snmp unknown
7130217.148.69.235 162 tcp snmptrap filtered
7131217.148.69.235 162 udp snmptrap unknown
7132217.148.69.235 389 tcp ldap filtered
7133217.148.69.235 389 udp ldap unknown
7134217.148.69.235 520 tcp efs filtered
7135217.148.69.235 520 udp route unknown
7136217.148.69.235 2049 tcp nfs filtered
7137217.148.69.235 2049 udp nfs unknown
7138217.148.71.93 53 tcp domain filtered
7139217.148.71.93 53 udp domain unknown
7140217.148.71.93 67 tcp dhcps filtered
7141217.148.71.93 67 udp dhcps unknown
7142217.148.71.93 68 tcp dhcpc filtered
7143217.148.71.93 68 udp dhcpc unknown
7144217.148.71.93 69 tcp tftp filtered
7145217.148.71.93 69 udp tftp unknown
7146217.148.71.93 88 tcp kerberos-sec filtered
7147217.148.71.93 88 udp kerberos-sec unknown
7148217.148.71.93 123 tcp ntp filtered
7149217.148.71.93 123 udp ntp unknown
7150217.148.71.93 137 tcp netbios-ns filtered
7151217.148.71.93 137 udp netbios-ns unknown
7152217.148.71.93 138 tcp netbios-dgm filtered
7153217.148.71.93 138 udp netbios-dgm unknown
7154217.148.71.93 139 tcp netbios-ssn filtered
7155217.148.71.93 139 udp netbios-ssn unknown
7156217.148.71.93 161 tcp snmp filtered
7157217.148.71.93 161 udp snmp unknown
7158217.148.71.93 162 tcp snmptrap filtered
7159217.148.71.93 162 udp snmptrap unknown
7160217.148.71.93 389 tcp ldap filtered
7161217.148.71.93 389 udp ldap unknown
7162217.148.71.93 520 tcp efs filtered
7163217.148.71.93 520 udp route unknown
7164217.148.71.93 2049 tcp nfs filtered
7165217.148.71.93 2049 udp nfs unknown
7166217.148.71.235 53 tcp domain filtered
7167217.148.71.235 53 udp domain unknown
7168217.148.71.235 67 tcp dhcps filtered
7169217.148.71.235 67 udp dhcps unknown
7170217.148.71.235 68 tcp dhcpc filtered
7171217.148.71.235 68 udp dhcpc unknown
7172217.148.71.235 69 tcp tftp filtered
7173217.148.71.235 69 udp tftp unknown
7174217.148.71.235 88 tcp kerberos-sec filtered
7175217.148.71.235 88 udp kerberos-sec unknown
7176217.148.71.235 123 tcp ntp filtered
7177217.148.71.235 123 udp ntp unknown
7178217.148.71.235 137 tcp netbios-ns filtered
7179217.148.71.235 137 udp netbios-ns unknown
7180217.148.71.235 138 tcp netbios-dgm filtered
7181217.148.71.235 138 udp netbios-dgm unknown
7182217.148.71.235 139 tcp netbios-ssn filtered
7183217.148.71.235 139 udp netbios-ssn unknown
7184217.148.71.235 161 tcp snmp filtered
7185217.148.71.235 161 udp snmp unknown
7186217.148.71.235 162 tcp snmptrap filtered
7187217.148.71.235 162 udp snmptrap unknown
7188217.148.71.235 389 tcp ldap filtered
7189217.148.71.235 389 udp ldap unknown
7190217.148.71.235 520 tcp efs filtered
7191217.148.71.235 520 udp route unknown
7192217.148.71.235 2049 tcp nfs filtered
7193217.148.71.235 2049 udp nfs unknown
7194##############################################################################################################################
7195Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-31 00:32 EDT
7196NSE: Loaded 151 scripts for scanning.
7197NSE: Script Pre-scanning.
7198Initiating NSE at 00:32
7199Completed NSE at 00:32, 0.00s elapsed
7200Initiating NSE at 00:32
7201Completed NSE at 00:32, 0.00s elapsed
7202Initiating NSE at 00:32
7203Completed NSE at 00:32, 0.00s elapsed
7204Initiating Ping Scan at 00:32
7205Scanning 80.169.89.102 [4 ports]
7206Completed Ping Scan at 00:32, 0.15s elapsed (1 total hosts)
7207Initiating Parallel DNS resolution of 1 host. at 00:32
7208Completed Parallel DNS resolution of 1 host. at 00:32, 0.03s elapsed
7209Initiating SYN Stealth Scan at 00:32
7210Scanning 80.169.89.102 [1000 ports]
7211Discovered open port 80/tcp on 80.169.89.102
7212Discovered open port 443/tcp on 80.169.89.102
7213Completed SYN Stealth Scan at 00:32, 8.41s elapsed (1000 total ports)
7214Initiating Service scan at 00:32
7215Scanning 2 services on 80.169.89.102
7216Completed Service scan at 00:34, 127.59s elapsed (2 services on 1 host)
7217Initiating OS detection (try #1) against 80.169.89.102
7218Retrying OS detection (try #2) against 80.169.89.102
7219Initiating Traceroute at 00:34
7220Completed Traceroute at 00:34, 0.59s elapsed
7221Initiating Parallel DNS resolution of 9 hosts. at 00:34
7222Completed Parallel DNS resolution of 9 hosts. at 00:34, 0.17s elapsed
7223NSE: Script scanning 80.169.89.102.
7224Initiating NSE at 00:34
7225Completed NSE at 00:35, 17.45s elapsed
7226Initiating NSE at 00:35
7227Completed NSE at 00:35, 1.24s elapsed
7228Initiating NSE at 00:35
7229Completed NSE at 00:35, 0.00s elapsed
7230Nmap scan report for 80.169.89.102
7231Host is up (0.11s latency).
7232Not shown: 998 filtered ports
7233PORT STATE SERVICE VERSION
723480/tcp open http COL-VMW-M-LB02
7235| fingerprint-strings:
7236| FourOhFourRequest:
7237| HTTP/1.1 301 Moved Permanently
7238| Location: https:///nice%20ports%2C/Tri%6Eity.txt%2ebak
7239| Server: COL-VMW-M-LB02
7240| Cache-Control: no-cache
7241| Connection: close
7242| GenericLines:
7243| HTTP/1.1 301 Moved Permanently
7244| Location: https://
7245| Server: COL-VMW-M-LB02
7246| Cache-Control: no-cache
7247| Connection: close
7248| GetRequest, HTTPOptions, RTSPRequest:
7249| HTTP/1.1 301 Moved Permanently
7250| Location: https:///
7251| Server: COL-VMW-M-LB02
7252| Cache-Control: no-cache
7253| Connection: close
7254| SIPOptions:
7255| HTTP/1.1 301 Moved Permanently
7256| Location: https://sip:nm
7257| Server: COL-VMW-M-LB02
7258| Cache-Control: no-cache
7259|_ Connection: close
7260| http-methods:
7261|_ Supported Methods: GET HEAD POST OPTIONS
7262|_http-server-header: COL-VMW-M-LB02
7263|_http-title: Did not follow redirect to https://80.169.89.102/
7264|_https-redirect: ERROR: Script execution failed (use -d to debug)
7265443/tcp open ssl/http Microsoft IIS httpd 7.5
7266| http-methods:
7267|_ Supported Methods: GET HEAD POST OPTIONS
7268|_http-server-header: Microsoft-IIS/7.5
7269| http-title: Welcome to the City of London Corporation
7270|_Requested resource was https://80.169.89.102/Pages/default.aspx
7271| ssl-cert: Subject: commonName=*.cityoflondon.gov.uk/organizationName=City of London Corporation/countryName=GB
7272| Subject Alternative Name: DNS:*.cityoflondon.gov.uk, DNS:cityoflondon.gov.uk
7273| Issuer: commonName=Entrust Certification Authority - L1K/organizationName=Entrust, Inc./countryName=US
7274| Public Key type: rsa
7275| Public Key bits: 2048
7276| Signature Algorithm: sha256WithRSAEncryption
7277| Not valid before: 2019-01-09T10:15:04
7278| Not valid after: 2021-01-09T10:45:03
7279| MD5: 4f24 791b 0cf7 72b6 48e0 faac 5dd4 3c66
7280|_SHA-1: 414c 9a2c e74f b30a 5c45 a40d 2288 a043 93d7 4d99
7281|_ssl-date: TLS randomness does not represent time
72821 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
7283SF-Port80-TCP:V=7.80%I=7%D=3/31%Time=5E82C7F0%P=x86_64-pc-linux-gnu%r(GetR
7284SF:equest,7B,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nLocation:\x20htt
7285SF:ps:///\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20no-cache\r\nCo
7286SF:nnection:\x20close\r\n\r\n")%r(HTTPOptions,7B,"HTTP/1\.1\x20301\x20Move
7287SF:d\x20Permanently\r\nLocation:\x20https:///\r\nServer:\x20COL-VMW-M-LB02
7288SF:\r\nCache-Control:\x20no-cache\r\nConnection:\x20close\r\n\r\n")%r(RTSP
7289SF:Request,7B,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nLocation:\x20ht
7290SF:tps:///\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20no-cache\r\nC
7291SF:onnection:\x20close\r\n\r\n")%r(FourOhFourRequest,9E,"HTTP/1\.1\x20301\
7292SF:x20Moved\x20Permanently\r\nLocation:\x20https:///nice%20ports%2C/Tri%6E
7293SF:ity\.txt%2ebak\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20no-cac
7294SF:he\r\nConnection:\x20close\r\n\r\n")%r(GenericLines,7A,"HTTP/1\.1\x2030
7295SF:1\x20Moved\x20Permanently\r\nLocation:\x20https://\r\nServer:\x20COL-VM
7296SF:W-M-LB02\r\nCache-Control:\x20no-cache\r\nConnection:\x20close\r\n\r\n"
7297SF:)%r(SIPOptions,80,"HTTP/1\.1\x20301\x20Moved\x20Permanently\r\nLocation
7298SF::\x20https://sip:nm\r\nServer:\x20COL-VMW-M-LB02\r\nCache-Control:\x20n
7299SF:o-cache\r\nConnection:\x20close\r\n\r\n");
7300Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
7301Device type: general purpose|firewall|storage-misc
7302Running (JUST GUESSING): Linux 2.6.X|3.X (90%), WatchGuard Fireware 11.X (89%), Synology DiskStation Manager 5.X (88%)
7303OS CPE: cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:linux:linux_kernel:3.10 cpe:/o:watchguard:fireware:11.8 cpe:/o:linux:linux_kernel cpe:/a:synology:diskstation_manager:5.1
7304Aggressive OS guesses: Linux 2.6.32 (90%), Linux 2.6.39 (90%), Linux 3.10 (89%), Linux 3.4 (89%), WatchGuard Fireware 11.8 (89%), Linux 3.1 - 3.2 (89%), Synology DiskStation Manager 5.1 (88%), Linux 2.6.32 or 3.10 (87%), Linux 2.6.32 - 2.6.39 (85%)
7305No exact OS matches for host (test conditions non-ideal).
7306Uptime guess: 0.184 days (since Mon Mar 30 20:10:16 2020)
7307Network Distance: 12 hops
7308TCP Sequence Prediction: Difficulty=261 (Good luck!)
7309IP ID Sequence Generation: All zeros
7310Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
7311
7312TRACEROUTE (using port 443/tcp)
7313HOP RTT ADDRESS
73141 104.79 ms 10.203.9.1
73152 577.87 ms 45.131.5.2
73163 104.87 ms 109.236.95.230
73174 106.03 ms 109.236.95.106
73185 106.15 ms et-0-0-1-pr2.AMS.router.colt.net (80.249.208.236)
73196 115.49 ms 212.74.75.37
73207 115.46 ms 212.74.75.37
73218 111.26 ms cpeuk_lon002520.ia.colt.net (80.169.196.38)
73229 111.76 ms 195.110.81.4
732310 113.12 ms 195.110.81.4
732411 115.47 ms 195.110.81.4
732512 115.31 ms 80.169.89.102
7326
7327NSE: Script Post-scanning.
7328Initiating NSE at 00:35
7329Completed NSE at 00:35, 0.00s elapsed
7330Initiating NSE at 00:35
7331Completed NSE at 00:35, 0.00s elapsed
7332Initiating NSE at 00:35
7333Completed NSE at 00:35, 0.00s elapsed
7334###########################################################################################################################
7335Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-31 00:29 EDT
7336Nmap scan report for cityoflondon.gov.uk (80.169.89.102)
7337Host is up (0.11s latency).
7338Not shown: 998 filtered ports
7339PORT STATE SERVICE VERSION
734080/tcp open http COL-VMW-M-LB02
7341| fingerprint-strings:
7342| FourOhFourRequest:
7343| HTTP/1.1 301 Moved Permanently
7344| Location: https:///nice%20ports%2C/Tri%6Eity.txt%2ebak
7345| Server: COL-VMW-M-LB02
7346| Cache-Control: no-cache
7347| Connection: close
7348| GenericLines:
7349| HTTP/1.1 301 Moved Permanently
7350| Location: https://
7351| Server: COL-VMW-M-LB02
7352| Cache-Control: no-cache
7353| Connection: close
7354| GetRequest, HTTPOptions, RTSPRequest:
7355| HTTP/1.1 301 Moved Permanently
7356| Location: https:///
7357| Server: COL-VMW-M-LB02
7358| Cache-Control: no-cache
7359| Connection: close
7360| SIPOptions:
7361| HTTP/1.1 301 Moved Permanently
7362| Location: https://sip:nm
7363| Server: COL-VMW-M-LB02
7364| Cache-Control: no-cache
7365|_ Connection: close
7366|_http-server-header: COL-VMW-M-LB02
7367|_https-redirect: ERROR: Script execution failed (use -d to debug)
7368443/tcp open ssl/http Microsoft IIS httpd 7.5
7369| http-server-header:
7370| COL-VMW-M-LB02
7371|_ Microsoft-IIS/7.5
7372| vulscan: VulDB - https://vuldb.com:
7373| [68404] Microsoft IIS 7.5 Error Message mypage cross site scripting
7374| [6924] Microsoft IIS 7.5 Log File Permission information disclosure
7375| [5623] Microsoft IIS up to 7.5 File Name Tilde privilege escalation
7376| [4234] Microsoft IIS 7.5 FTP Server Telnet IAC Character Heap-based denial of service
7377| [4179] Microsoft IIS 7.5 FastCGI Request Header memory corruption
7378| [98097] Microsoft IIS 7.0/7.5/8.0/8.5/10 /uncpath/ cross site scripting
7379| [6925] Microsoft IIS 7.0/7.5 FTP Command information disclosure
7380| [4484] Microsoft Windows Phone 7.5 SMS Service denial of service
7381|
7382| MITRE CVE - https://cve.mitre.org:
7383| [CVE-2012-2532] Microsoft FTP Service 7.0 and 7.5 for Internet Information Services (IIS) processes unspecified commands before TLS is enabled for a session, which allows remote attackers to obtain sensitive information by reading the replies to these commands, aka "FTP Command Injection Vulnerability."
7384| [CVE-2012-2531] Microsoft Internet Information Services (IIS) 7.5 uses weak permissions for the Operational log, which allows local users to discover credentials by reading this file, aka "Password Disclosure Vulnerability."
7385| [CVE-2010-3972] Heap-based buffer overflow in the TELNET_STREAM_CONTEXT::OnSendData function in ftpsvc.dll in Microsoft FTP Service 7.0 and 7.5 for Internet Information Services (IIS) 7.0, and IIS 7.5, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a crafted FTP command, aka "IIS FTP Service Heap Buffer Overrun Vulnerability." NOTE: some of these details are obtained from third party information.
7386| [CVE-2010-2730] Buffer overflow in Microsoft Internet Information Services (IIS) 7.5, when FastCGI is enabled, allows remote attackers to execute arbitrary code via crafted headers in a request, aka "Request Header Buffer Overflow Vulnerability."
7387| [CVE-2010-1899] Stack consumption vulnerability in the ASP implementation in Microsoft Internet Information Services (IIS) 5.1, 6.0, 7.0, and 7.5 allows remote attackers to cause a denial of service (daemon outage) via a crafted request, related to asp.dll, aka "IIS Repeated Parameter Request Denial of Service Vulnerability."
7388| [CVE-2010-1256] Unspecified vulnerability in Microsoft IIS 6.0, 7.0, and 7.5, when Extended Protection for Authentication is enabled, allows remote authenticated users to execute arbitrary code via unknown vectors related to "token checking" that trigger memory corruption, aka "IIS Authentication Memory Corruption Vulnerability."
7389| [CVE-2013-0941] EMC RSA Authentication API before 8.1 SP1, RSA Web Agent before 5.3.5 for Apache Web Server, RSA Web Agent before 5.3.5 for IIS, RSA PAM Agent before 7.0, and RSA Agent before 6.1.4 for Microsoft Windows use an improper encryption algorithm and a weak key for maintaining the stored data of the node secret for the SecurID Authentication API, which allows local users to obtain sensitive information via cryptographic attacks on this data.
7390| [CVE-2010-3229] The Secure Channel (aka SChannel) security package in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7, when IIS 7.x is used, does not properly process client certificates during SSL and TLS handshakes, which allows remote attackers to cause a denial of service (LSASS outage and reboot) via a crafted packet, aka "TLSv1 Denial of Service Vulnerability."
7391| [CVE-2010-1886] Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 SP2 and R2, and Windows 7 allow local users to gain privileges by leveraging access to a process with NetworkService credentials, as demonstrated by TAPI Server, SQL Server, and IIS processes, and related to the Windows Service Isolation feature. NOTE: the vendor states that privilege escalation from NetworkService to LocalSystem does not cross a "security boundary."
7392| [CVE-2009-3555] The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
7393| [CVE-2009-2521] Stack consumption vulnerability in the FTP Service in Microsoft Internet Information Services (IIS) 5.0 through 7.0 allows remote authenticated users to cause a denial of service (daemon crash) via a list (ls) -R command containing a wildcard that references a subdirectory, followed by a .. (dot dot), aka "IIS FTP Service DoS Vulnerability."
7394| [CVE-2009-1536] ASP.NET in Microsoft .NET Framework 2.0 SP1 and SP2 and 3.5 Gold and SP1, when ASP 2.0 is used in integrated mode on IIS 7.0, does not properly manage request scheduling, which allows remote attackers to cause a denial of service (daemon outage) via a series of crafted HTTP requests, aka "Remote Unauthenticated Denial of Service in ASP.NET Vulnerability."
7395| [CVE-2008-1446] Integer overflow in the Internet Printing Protocol (IPP) ISAPI extension in Microsoft Internet Information Services (IIS) 5.0 through 7.0 on Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, and Server 2008 allows remote authenticated users to execute arbitrary code via an HTTP POST request that triggers an outbound IPP connection from a web server to a machine operated by the attacker, aka "Integer Overflow in IPP Service Vulnerability."
7396| [CVE-2008-0074] Unspecified vulnerability in Microsoft Internet Information Services (IIS) 5.0 through 7.0 allows local users to gain privileges via unknown vectors related to file change notifications in the TPRoot, NNTPFile\Root, or WWWRoot folders.
7397| [CVE-2007-2931] Heap-based buffer overflow in Microsoft MSN Messenger 6.2, 7.0, and 7.5, and Live Messenger 8.0 allows user-assisted remote attackers to execute arbitrary code via unspecified vectors involving video conversation handling in Web Cam and video chat sessions.
7398| [CVE-2007-1278] Unspecified vulnerability in the IIS connector in Adobe JRun 4.0 Updater 6, and ColdFusion MX 6.1 and 7.0 Enterprise, when using Microsoft IIS 6, allows remote attackers to cause a denial of service via unspecified vectors, involving the request of a file in the JRun web root.
7399| [CVE-2006-5858] Adobe ColdFusion MX 7 through 7.0.2, and JRun 4, when run on Microsoft IIS, allows remote attackers to read arbitrary files, list directories, or read source code via a double URL-encoded NULL byte in a ColdFusion filename, such as a CFM file.
7400| [CVE-2006-5028] Directory traversal vulnerability in filemanager/filemanager.php in SWsoft Plesk 7.5 Reload and Plesk 7.6 for Microsoft Windows allows remote attackers to list arbitrary directories via a ../ (dot dot slash) in the file parameter in a chdir action.
7401| [CVE-2006-0363] The "Remember my Password" feature in MSN Messenger 7.5 stores passwords in an encrypted format under the HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Creds registry key, which might allow local users to obtain the original passwords via a program that calls CryptUnprotectData, as demonstrated by the "MSN Password Recovery.exe" program. NOTE: it could be argued that local-only password recovery is inherently insecure because the decryption methods and keys must be stored somewhere on the local system, and are thus inherently accessible with varying degrees of effort. Perhaps this issue should not be included in CVE.
7402|
7403| SecurityFocus - https://www.securityfocus.com/bid/:
7404| [55569] Microsoft Windows Phone 7 SSL Certificate 'Common Name' Validation Security Bypass Vulnerability
7405| [28820] Microsoft Works 7 'WkImgSrv.dll' ActiveX Control Remote Code Execution Vulnerability
7406| [28498] Microsoft Internet Explorer 7 Popup Window Address Bar URI Spoofing Vulnerability
7407| [24483] Microsoft Internet Explorer 7 HTTP Authentication International Domain Name Spoofing Weakness
7408| [20728] Microsoft Internet Explorer 7 Popup Window Address Bar Spoofing Weakness
7409| [18736] Microsoft Internet Explorer 7 Denial of Service Vulnerability
7410| [5877] Microsoft SQL Server 7.0/2000 DBCC Buffer Overflow Vulnerability
7411| [4108] Microsoft Visual C++ 7/Visual C++.Net Buffer Overflow Protection Weakness
7412| [1714] Microsoft Windows Media Player 7 Embedded OCX Control Vulnerability
7413| [1444] Microsoft SQL Server 7.0 Stored Procedure Vulnerability
7414| [1281] Microsoft SQL Server 7.0 System Administrator Password Disclosure Vulnerability
7415| [817] Microsoft SQL Server 7.0 NULL Data DoS Vulnerability
7416| [90065] Microsoft Windows Kernel 'Win32k.sys' CVE-2016-0174 Local Privilege Escalation Vulnerability
7417| [86059] Microsoft IIS CVE-1999-0561 Remote Security Vulnerability
7418| [56440] Microsoft IIS FTP Service CVE-2012-2532 Remote Command Injection Vulnerability
7419| [56439] Microsoft IIS CVE-2012-2531 Password Information Disclosure Vulnerability
7420| [54276] Microsoft IIS Multiple FTP Command Request Denial of Service Vulnerability
7421| [54251] Microsoft IIS File Enumeration Weakness
7422| [53906] Microsoft IIS Authentication Bypass and Source Code Disclosure Vulnerabilities
7423| [45542] Microsoft IIS FTP Service Remote Buffer Overflow Vulnerability
7424| [43140] Microsoft IIS Repeated Parameter Request Denial of Service Vulnerability
7425| [43138] Microsoft IIS Request Header Buffer Overflow Vulnerability
7426| [41314] Microsoft IIS 5.1 Alternate Data Stream Authentication Bypass Vulnerability
7427| [40573] Microsoft IIS Authentication Remote Code Execution Vulnerability
7428| [37460] RETIRED: Microsoft IIS Malformed Local Filename Security Bypass Vulnerability
7429| [36276] RETIRED: Microsoft IIS FTPd Globbing Functionality Remote Denial of Service Vulnerability
7430| [36273] Microsoft IIS FTPd Globbing Functionality Remote Denial of Service Vulnerability
7431| [36189] Microsoft IIS FTPd NLST Remote Buffer Overflow Vulnerability
7432| [35232] Microsoft IIS 5.0 WebDAV Authentication Bypass Vulnerability
7433| [34993] Microsoft IIS Unicode Requests to WebDAV Multiple Authentication Bypass Vulnerabilities
7434| [33374] Microsoft IIS HTTP TRACK Method Information Disclosure Vulnerability
7435| [27101] Microsoft IIS File Change Notification Local Privilege Escalation Vulnerability
7436| [21865] Apache And Microsoft IIS Range Denial of Service Vulnerability
7437| [18858] Microsoft IIS ASP Remote Code Execution Vulnerability
7438| [14764] Microsoft IIS WebDAV HTTP Request Source Code Disclosure Vulnerability
7439| [10706] Microsoft IIS 4 Redirect Remote Buffer Overflow Vulnerability
7440| [9660] Microsoft IIS Unspecified Remote Denial Of Service Vulnerability
7441| [9313] Microsoft IIS Failure To Log Undocumented TRACK Requests Vulnerability
7442| [8244] Microsoft Multiple IIS 6.0 Web Admin Vulnerabilities
7443| [8092] Microsoft IIS _VTI_BOT Malicious WebBot Elevated Permissions Vulnerability
7444| [8035] Microsoft Windows Media Services NSIISlog.DLL Remote Buffer Overflow Vulnerability
7445| [7735] Microsoft IIS WebDAV PROPFIND and SEARCH Method Denial of Service Vulnerability
7446| [7734] Microsoft IIS SSINC.DLL Server Side Includes Buffer Overflow Vulnerability
7447| [7733] Microsoft IIS ASP Header Denial Of Service Vulnerability
7448| [7731] Microsoft IIS Redirection Error Page Cross-Site Scripting Vulnerability
7449| [7492] Microsoft IIS User Existence Disclosure Vulnerability
7450| [6795] Microsoft IIS False Logging Weakness
7451| [6789] Microsoft IIS Malformed HTTP Get Request Denial Of Service Vulnerability
7452| [6072] Microsoft IIS Administrative Pages Cross Site Scripting Vulnerabilities
7453| [6071] Microsoft IIS Script Source Access File Upload Vulnerability
7454| [6070] Microsoft IIS WebDAV Denial Of Service Vulnerability
7455| [6069] Microsoft IIS Out Of Process Privilege Escalation Vulnerability
7456| [6068] Multiple Microsoft IIS Vulnerabilities
7457| [5907] Microsoft IIS Malformed HTTP HOST Header Field Denial Of Service Vulnerability
7458| [5900] Microsoft IIS IDC Extension Cross Site Scripting Vulnerability
7459| [5213] Microsoft IIS SMTP Service Encapsulated SMTP Address Vulnerability
7460| [4855] Microsoft IIS HTR Chunked Encoding Transfer Heap Overflow Vulnerability
7461| [4846] Microsoft IIS 5.0 Denial Of Service Vulnerability
7462| [4543] Microsoft IIS CodeBrws.ASP File Extension Check Out By One Vulnerability
7463| [4525] Microsoft IIS CodeBrws.ASP Source Code Disclosure Vulnerability
7464| [4490] Microsoft IIS Chunked Encoding Heap Overflow Variant Vulnerability
7465| [4487] Microsoft IIS HTTP Redirect Cross Site Scripting Vulnerability
7466| [4486] Microsoft IIS HTTP Error Page Cross Site Scripting Vulnerability
7467| [4485] Microsoft IIS Chunked Encoding Transfer Heap Overflow Vulnerability
7468| [4483] Microsoft IIS Help File Search Cross Site Scripting Vulnerability
7469| [4482] Microsoft IIS FTP Connection Status Request Denial of Service Vulnerability
7470| [4479] Microsoft IIS ISAPI Filter Access Violation Denial of Service Vulnerability
7471| [4478] Microsoft IIS ASP Server-Side Include Buffer Overflow Vulnerability
7472| [4476] Microsoft IIS HTTP Header Field Delimiter Buffer Overflow Vulnerability
7473| [4474] Microsoft IIS HTR ISAPI Extension Buffer Overflow Vulnerability
7474| [4235] Microsoft IIS Authentication Method Disclosure Vulnerability
7475| [4084] Microsoft IIS 5.1 Frontpage Server Extensions File Source Disclosure Vulnerability
7476| [4078] Microsoft IIS 5.1 Frontpage Extensions Path Disclosure Information Vulnerability
7477| [3667] Microsoft IIS False Content-Length Field DoS Vulnerability
7478| [3195] Microsoft IIS MIME Header Denial of Service Vulnerability
7479| [3194] Microsoft IIS WebDAV Invalid Request Denial of Service Vulnerability
7480| [3193] Microsoft IIS 5.0 In-Process Table Privelege Elevation Vulnerability
7481| [3191] Microsoft IIS 4.0 URL Redirection DoS Vulnerability
7482| [3190] Microsoft IIS SSI Buffer Overrun Privelege Elevation Vulnerability
7483| [2977] Microsoft IIS Device File Remote DoS Vulnerability
7484| [2973] Microsoft IIS Device File Local DoS Vulnerability
7485| [2909] Microsoft IIS Unicode .asp Source Code Disclosure Vulnerability
7486| [2719] Microsoft IIS Various Domain User Account Access Vulnerability
7487| [2717] Microsoft IIS FTP Denial of Service Vulnerability
7488| [2690] Microsoft IIS WebDAV 'Propfind' Server Restart Vulnerability
7489| [2674] Microsoft IIS 5.0 .printer ISAPI Extension Buffer Overflow Vulnerability
7490| [2654] Microsoft IIS Long URL Denial of Service Vulnerability
7491| [2483] Microsoft IIS WebDAV 'Search' Denial of Service Vulnerability
7492| [2453] Microsoft IIS WebDAV Denial of Service Vulnerability
7493| [2441] Microsoft Exchange 2000 / IIS 5.0 Multiple Invalid URL Request DoS Vulnerability
7494| [2440] Microsoft IIS Multiple Invalid URL Request DoS Vulnerability
7495| [2313] Microsoft IIS File Fragment Disclosure Vulnerability
7496| [2280] Microsoft IIS 3.0/4.0 Upgrade BDIR.HTR Vulnerability
7497| [2218] Microsoft IIS '../..' Denial of Service Vulnerability
7498| [2144] Microsoft IIS Front Page Server Extension DoS Vulnerability
7499| [2110] Microsoft IIS 4.0 IISADMPWD Proxied Password Attack
7500| [2100] Microsoft IIS Far East Edition DBCS File Disclosure Vulnerability
7501| [2074] Microsoft IIS Appended Dot Script Source Disclosure Vulnerability
7502| [1912] Microsoft IIS Executable File Parsing Vulnerability
7503| [1911] Microsoft IIS 4.0 ISAPI Buffer Overflow Vulnerability
7504| [1832] Microsoft IIS 4.0/5.0 Session ID Cookie Disclosure Vulnerability
7505| [1819] Microsoft IIS 4.0 Pickup Directory DoS Vulnerability
7506| [1818] Microsoft IIS 3.0 newdsn.exe File Creation Vulnerability
7507| [1814] Microsoft IIS 3.0 %2e ASP Source Disclosure Vulnerability
7508| [1811] Microsoft Site Server 2.0 with IIS 4.0 Malicious File Upload Vulnerability
7509| [1806] Microsoft IIS and PWS Extended Unicode Directory Traversal Vulnerability
7510| [1756] Microsoft IIS 5.0 Indexed Directory Disclosure Vulnerability
7511| [1642] Microsoft NT 4.0 and IIS 4.0 Invalid URL Request DoS Vulnerability
7512| [1595] Microsoft IIS Cross Site Scripting .shtml Vulnerability
7513| [1594] Microsoft FrontPage/IIS Cross Site Scripting shtml.dll Vulnerability
7514| [1578] Microsoft IIS 5.0 Translate: f Source Disclosure Vulnerability
7515| [1565] Microsoft IIS 4.0/5.0 File Permission Canonicalization Vulnerability
7516| [1499] Microsoft IIS Internal IP Address Disclosure Vulnerability
7517| [1488] Microsoft IIS 4.0/5.0 Source Fragment Disclosure Vulnerability
7518| [1476] Microsoft IIS 3.0 .htr Missing Variable Denial of Service Vulnerability
7519| [1193] Microsoft IIS 4.0/5.0 Malformed Filename Request Vulnerability
7520| [1191] Microsoft IIS 4.0/5.0 Malformed .htr Request Vulnerability
7521| [1190] Microsoft IIS 4.0/5.0 Malformed File Extension DoS Vulnerability
7522| [1101] Microsoft IIS 4.0/5.0 Escaped Characters Vulnerability
7523| [1081] Microsoft IIS UNC Mapped Virtual Host Vulnerability
7524| [1066] Microsoft IIS 4.0 Chunked Transfer Encoding Buffer Overflow Vulnerability
7525| [1065] Microsoft IIS UNC Path Disclosure Vulnerability
7526| [886] Microsoft IIS Escape Character Parsing Vulnerability
7527| [882] Microsoft IIS Virtual Directory Naming Vulnerability
7528| [658] Microsoft IIS FTP NO ACCESS Read/Delete File Vulnerability
7529| [657] Microsoft IIS 4.0 Domain Resolution Vulnerability
7530| [582] Microsoft IIS And PWS 8.3 Directory Name Vulnerability
7531| [190] Microsoft VisualInterDev 6.0 - IIS4- Management With No Authentication Vulnerability
7532|
7533| IBM X-Force - https://exchange.xforce.ibmcloud.com:
7534| [78620] Microsoft Windows Phone 7 domain name spoofing
7535| [66401] Microsoft Windows kernel-mode driver (win32k.sys) variant 7 privilege escalation
7536| [29670] Microsoft Internet Explorer 7 is installed
7537| [76716] Microsoft IIS FTP denial of service
7538| [76664] Microsoft IIS tilde information disclosure
7539| [61513] Microsoft Internet Information Services (IIS) URL authentication bypass
7540| [58864] Microsoft Internet Information Services (IIS) authentication code execution
7541| [55031] Microsoft Internet Information Services (IIS) filenames security bypass
7542| [53034] Microsoft Internet Information Services (IIS) directory listings denial of service
7543| [52915] Microsoft Internet Information Services (IIS) FTP buffer overflow
7544| [52243] Microsoft IIS With .NET Path Disclosure
7545| [52241] Microsoft IIS servervariables_vbscript.asp Information Disclosure
7546| [52240] Microsoft IIS Sample Application Physical Path Disclosure
7547| [52233] Microsoft IIS With .NET Path Disclosure
7548| [50573] Microsoft Internet Information Services (IIS) WebDAV security bypass
7549| [45584] Microsoft IIS adsiis.dll ActiveX control denial of service
7550| [42899] Microsoft IIS HTTP request smuggling
7551| [39235] Microsoft IIS root folders file change notification privilege escalation
7552| [39230] Microsoft IIS HTML encoded ASP code execution
7553| [34434] Microsoft IIS Hit-highlighting security bypass
7554| [34418] Microsoft Internet Information Server (IIS) AUX/.aspx denial of service
7555| [32074] Microsoft IIS iissamples directory present
7556| [31644] Microsoft IIS Web server access.cnf file detected
7557| [31642] Microsoft IIS Web server service.cnf file detected
7558| [31638] Microsoft IIS Web server svcacl.cnf file detected
7559| [31630] Microsoft Internet Information Services IISAdmin directory detected
7560| [27854] Microsoft IIS ASP cache virtual server information disclosure
7561| [26796] Microsoft Internet Information Services (IIS) ASP buffer overflow
7562| [16872] Microsoft Internet Information Server (IIS) ActivePerl command execution
7563| [16656] Microsoft Internet Information Server (IIS) MS04-021 patch is not installed
7564| [16578] Microsoft Internet Information Server (IIS) redirect buffer overflow
7565| [14077] Microsoft Internet Information Server (IIS) fails to properly log HTTP TRACK requests
7566| [13116] Microsoft IIS MS03-018 patch is not installed on the system
7567| [13088] Microsoft IIS running RealSecure Server Sensor ISAPI plug-in denial of service
7568| [12687] Microsoft IIS Remote Administration Tool allows attacker to reset administrative password
7569| [12686] Microsoft IIS Remote Administration Tool could allow an attacker to obtain valid session IDs
7570| [12652] Microsoft Windows 2000 and NT 4.0 Server IIS ISAPI nsiislog.dll extension POST request buffer overflow
7571| [12100] Microsoft IIS long WebDAV requests containing XML denial of service
7572| [12099] Microsoft IIS Response.AddHeader denial of service
7573| [12098] Microsoft IIS Server-Side Include (SSI) long file name buffer overflow
7574| [12097] Microsoft IIS redirect error cross-site scripting
7575| [12092] Microsoft Windows 2000 and NT 4.0 Server IIS ISAPI nsiislog.dll extension buffer overflow
7576| [11918] Microsoft IIS authentication mechanism could allow an attacker to determine valid user account names
7577| [11537] Microsoft IIS WebDAV service is running on the system
7578| [11533] Microsoft IIS WebDAV long request buffer overflow
7579| [10590] Microsoft Internet Information Server (IIS) MS02-062 patch
7580| [10504] Microsoft IIS script source access could be bypassed to upload .COM files
7581| [10503] Microsoft IIS WebDAV memory allocation denial of service
7582| [10502] Microsoft IIS out-of-process applications could be used to gain elevated privileges
7583| [10501] Microsoft IIS administrative Web pages cross-site scripting
7584| [10370] Microsoft IIS HTTP HOST header denial of service
7585| [10294] Microsoft IIS .idc extension error message cross-site scripting
7586| [10184] Microsoft IIS 5.0 resource utilization denial of service
7587| [9791] Microsoft Exchange IIS license exhaustion denial of service
7588| [9580] Microsoft IIS SMTP service encapsulated addresses could allow mail relaying
7589| [9327] Microsoft IIS ISAPI HTR chunked encoding heap buffer overflow
7590| [9123] Microsoft IIS 5.0 Log Files Directory Permission Exposure
7591| [8853] Microsoft IIS CodeBrws.asp sample script can be used to view arbitrary file source code
7592| [8811] Microsoft IIS MS02-018 patch is not installed on the system
7593| [8804] Microsoft IIS redirected URL error cross-site scripting
7594| [8803] Microsoft IIS HTTP error page cross-site scripting
7595| [8802] Microsoft IIS Help File search cross-site scripting
7596| [8801] Microsoft IIS FTP session status request denial of service
7597| [8800] Microsoft IIS FrontPage Server Extensions and ASP.NET ISAPI filter error handling denial of service
7598| [8799] Microsoft IIS HTR ISAPI ISM.DLL extension buffer overflow
7599| [8798] Microsoft IIS SSI safety check buffer overflow
7600| [8797] Microsoft IIS ASP HTTP header parsing buffer overflow
7601| [8796] Microsoft IIS ASP data transfer heap buffer overflow
7602| [8795] Microsoft IIS ASP chunked encoding heap buffer overflow
7603| [8388] Microsoft Windows NT Server with IIS 4.0 could allow users to bypass "
7604| [8385] Microsoft IIS specially-crafted request reveals IP address
7605| [8382] Microsoft IIS authentication error messages reveal configuration information
7606| [8191] Microsoft IIS 5.1 specially-crafted .cnf file request could reveal file contents
7607| [8174] Microsoft IIS 5.1 .cnf file request could reveal sensitive information
7608| [8056] Microsoft IIS is running on the system
7609| [7919] Microsoft IIS 4.0 and Norton Internet Security 2001 default permissions could allow an attacker to modify log files
7610| [7691] Microsoft IIS HTTP GET request with false "
7611| [7640] Microsoft IIS is present on the system
7612| [7613] Microsoft IIS allows attackers to create fake log entries
7613| [7566] Microsoft IIS 2.0 and 3.0 upgraded to Microsoft IIS 4.0 fails to remove the ism.dll file
7614| [7559] Microsoft Index Server installed with IIS 4.0 could allow a local attacker to obtain physical path information
7615| [7558] Microsoft IIS FileSystemObject in showfile.asp could allow remote attackers to read arbitrary files
7616| [7202] Microsoft IIS 4.0/5.0 escaped percent found
7617| [7201] Microsoft IIS 4.0/5.0 malformed double percent sequence
7618| [7199] Microsoft IIS 4.0/5.0 malformed hex sequence
7619| [6995] Microsoft IIS %u Unicode wide character encoding detected
7620| [6994] Microsoft IIS %u Unicode encoding detected
7621| [6985] Microsoft IIS relative path usage in system file process table could allow elevated privileges
7622| [6984] Microsoft IIS specially-crafted SSI directives buffer overflow
7623| [6983] Microsoft IIS invalid MIME header denial of service
7624| [6982] Microsoft IIS WebDAV long invalid request denial of service
7625| [6981] Microsoft IIS URL redirection denial of service
7626| [6963] Microsoft IIS HTTPS connection could reveal internal IP address
7627| [6858] Microsoft IIS cross-site scripting patch denial of service
7628| [6800] Microsoft IIS device file request can crash the ASP processor
7629| [6742] Microsoft IIS reveals .asp source code with Unicode extensions
7630| [6705] Microsoft IIS idq.dll ISAPI extension buffer overflow
7631| [6549] Microsoft IIS WebDAV lock method memory leak can cause a denial of service
7632| [6545] Microsoft IIS FTP weak domain authentication
7633| [6535] Microsoft IIS FTP wildcard processing function denial of service
7634| [6534] Microsoft IIS URL decoding error could allow remote code execution
7635| [6485] Microsoft IIS 5.0 ISAPI Internet Printing Protocol extension buffer overflow
7636| [6205] Microsoft IIS WebDAV denial of service
7637| [6171] Microsoft IIS and Exchange malformed URL request denial of service
7638| [6029] Microsoft IIS CmdAsp could allow remote attackers to gain privileges
7639| [5903] Microsoft IIS 5.0 allows the viewing of files through malformed URL
7640| [5823] Microsoft IIS Web form submission denial of service
7641| [5729] Microsoft IIS Far East editions file disclosure
7642| [5510] Microsoft Internet Information Service (IIS) ISAPI buffer overflow
7643| [5470] Microsoft Internet Information Service (IIS) invalid executable filename passing
7644| [5441] Microsoft IIS .htw cross-site scripting
7645| [5377] Microsoft IIS Unicode translation error allows remote command execution
7646| [5335] Microsoft IIS Index Server directory traversal
7647| [5202] Microsoft IIS invalid URL allows attackers to crash service
7648| [5156] Microsoft IIS Cross-Site Scripting
7649| [5106] Microsoft IIS 4.0 discloses internal IP addresses
7650| [5104] Microsoft IIS allows remote attackers to obtain source code fragments using +.htr
7651| [5071] Microsoft IIS canonicalization error applies incorrect permissions to certain types of files
7652| [4960] Microsoft IIS on Win2kPro security button restriction
7653| [4951] Microsoft IIS absent directory browser argument
7654| [4790] Microsoft IIS \mailroot\pickup directory denial of service
7655| [4757] Microsoft IIS server-side includes (SSI) #exec directive
7656| [4558] Microsoft IIS is installed on a domain controller
7657| [4448] Microsoft IIS ISM.DLL could allow users to read file contents
7658| [4430] Microsoft IIS malformed URL extension data denial of service
7659| [4392] Microsoft IIS could reveal source code of ASP files in some virtual directories
7660| [4302] Microsoft IIS malformed AuthChangUrl request can cause the server to stop servicing requests
7661| [4279] Microsoft IIS escape characters denial of service
7662| [4204] Microsoft IIS virtual UNC share source read
7663| [4183] Microsoft IIS could disclose path of network shares
7664| [4117] Microsoft IIS chunked encoding post or put denial of service
7665| [3986] Microsoft IIS ASP could be used to gain sensitive information
7666| [3892] Microsoft IIS Long URL with excessive forward slashes passed to ASP causes an access violation
7667| [3306] Microsoft IIS could allow remote access to servers marked as Restrict Access
7668| [3115] Microsoft IIS and SiteServer denial of service caused by malformed HTTP requests
7669| [2675] Microsoft IIS 4.0 samples installation on Web server
7670| [2673] Microsoft IIS samples installation on Web server
7671| [2671] Microsoft IIS Passive FTP patch not applied (asp.dll out of date)
7672| [2670] Microsoft IIS Passive FTP patch not applied (wam.dll out of date)
7673| [2669] Microsoft IIS Passive FTP patch not applied (w3svc.dll out of date)
7674| [2668] Microsoft IIS Passive FTP patch not applied (infocomm.dll out of date)
7675| [2662] Microsoft IIS CGI overflow
7676| [2412] Microsoft IIS account is member of Domain Users
7677| [2381] Microsoft IIS and SiteServer Showcode.asp sample file allows remote file viewing
7678| [2302] Microsoft IIS using double-byte code pages could allow remote attackers to retrieve source code
7679| [2282] Microsoft IIS bdir.htr allows remote traversal of directory structure
7680| [2281] Microsoft IIS buffer overflow in HTR requests can allow remote code execution
7681| [2229] Microsoft IIS ExAir sample site denial of service
7682| [2185] Microsoft IIS and Site Server sample programs can be used to remotely view files
7683| [1823] Microsoft IIS long GET request denial of service
7684| [1735] Microsoft IIS with Visual InterDev no authentication
7685| [1656] Microsoft IIS 4.0 allows user to avoid HTTP request logging
7686| [1654] Microsoft IIS remote FTP buffer overflow
7687| [1638] Microsoft IIS crashes processing some GET commands
7688| [1530] Microsoft IIS 3.0 newdsn.exe sample application allows remote creation of arbitrary files
7689| [1368] Microsoft IIS 4.0 allows file execution in the Web site directory
7690| [1273] Microsoft IIS special characters allowed in shell
7691| [1272] Microsoft IIS CGI scripts run as system
7692| [1271] Microsoft IIS version 2 installed
7693| [1270] Microsoft IIS incorrect permissions on restricted item
7694| [1269] Microsoft IIS incorrect Web permissions
7695| [1268] Microsoft IIS SSI #exec enabled
7696| [1216] Microsoft IIS SSL patch not applied
7697| [1215] Microsoft IIS Passive FTP patch not applied
7698| [1212] Microsoft IIS unauthorized ODBC data access with RDS
7699| [1125] Microsoft IIS ASP DATA issue could reveal source code
7700| [949] Microsoft IIS server script debugging enabled
7701| [948] Microsoft IIS samples installed on Web server
7702| [936] Microsoft IIS NTFS insecure permissions
7703| [935] Microsoft IIS executable paths
7704| [621] Microsoft IIS 3.0 script source revealed by appending 2E to requests
7705| [336] Microsoft IIS ASP dot bug
7706| [256] Microsoft IIS can be remotely crashed by excessively long client requests
7707| [7] Microsoft IIS ASP source visible
7708|
7709| Exploit-DB - https://www.exploit-db.com:
7710| [19033] microsoft iis 6.0 and 7.5 - Multiple Vulnerabilities
7711| [17476] Microsoft IIS FTP Server <= 7.0 Stack Exhaustion DoS [MS09-053]
7712|
7713| OpenVAS (Nessus) - http://www.openvas.org:
7714| [902914] Microsoft IIS GET Request Denial of Service Vulnerability
7715| [902796] Microsoft IIS IP Address/Internal Network Name Disclosure Vulnerability
7716| [902694] Microsoft Windows IIS FTP Service Information Disclosure Vulnerability (2761226)
7717| [901120] Microsoft IIS Authentication Remote Code Execution Vulnerability (982666)
7718| [900944] Microsoft IIS FTP Server 'ls' Command DOS Vulnerability
7719| [900874] Microsoft IIS FTP Service Remote Code Execution Vulnerabilities (975254)
7720| [900711] Microsoft IIS WebDAV Remote Authentication Bypass Vulnerability
7721| [900567] Microsoft IIS Security Bypass Vulnerability (970483)
7722| [802806] Microsoft IIS Default Welcome Page Information Disclosure Vulnerability
7723| [801669] Microsoft Windows IIS FTP Server DOS Vulnerability
7724| [801520] Microsoft IIS ASP Stack Based Buffer Overflow Vulnerability
7725| [100952] Microsoft IIS FTPd NLST stack overflow
7726| [11443] Microsoft IIS UNC Mapped Virtual Host Vulnerability
7727| [10680] Test Microsoft IIS Source Fragment Disclosure
7728| [903041] Microsoft Windows Kernel Privilege Elevation Vulnerability (2724197)
7729| [903037] Microsoft JScript and VBScript Engines Remote Code Execution Vulnerability (2706045)
7730| [903036] Microsoft Windows Networking Components Remote Code Execution Vulnerabilities (2733594)
7731| [903035] Microsoft Windows Kernel-Mode Drivers Privilege Elevation Vulnerability (2731847)
7732| [903033] Microsoft Windows Kernel-Mode Drivers Privilege Elevation Vulnerabilities (2718523)
7733| [903026] Microsoft Office Remote Code Execution Vulnerabilities (2663830)
7734| [903017] Microsoft Office Remote Code Execution Vulnerability (2639185)
7735| [903000] Microsoft Expression Design Remote Code Execution Vulnerability (2651018)
7736| [902936] Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (2783534)
7737| [902934] Microsoft .NET Framework Remote Code Execution Vulnerability (2745030)
7738| [902933] Microsoft Windows Shell Remote Code Execution Vulnerabilities (2727528)
7739| [902932] Microsoft Internet Explorer Multiple Use-After-Free Vulnerabilities (2761451)
7740| [902931] Microsoft Office Remote Code Execution Vulnerabilities - 2720184 (Mac OS X)
7741| [902930] Microsoft Office Remote Code Execution Vulnerabilities (2720184)
7742| [902923] Microsoft Internet Explorer Multiple Vulnerabilities (2722913)
7743| [902922] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerability (2723135)
7744| [902921] Microsoft Office Visio/Viewer Remote Code Execution Vulnerability (2733918)
7745| [902920] Microsoft Office Remote Code Execution Vulnerability (2731879)
7746| [902919] Microsoft SharePoint Privilege Elevation Vulnerabilities (2663841)
7747| [902916] Microsoft Windows Kernel Privilege Elevation Vulnerabilities (2711167)
7748| [902913] Microsoft Office Remote Code Execution Vulnerabilities-2663830 (Mac OS X)
7749| [902912] Microsoft Office Word Remote Code Execution Vulnerability-2680352 (Mac OS X)
7750| [902911] Microsoft Office Word Remote Code Execution Vulnerability (2680352)
7751| [902910] Microsoft Office Visio Viewer Remote Code Execution Vulnerability (2597981)
7752| [902909] Microsoft Windows Service Pack Missing Multiple Vulnerabilities
7753| [902908] Microsoft Windows DirectWrite Denial of Service Vulnerability (2665364)
7754| [902906] Microsoft Windows DNS Server Denial of Service Vulnerability (2647170)
7755| [902900] Microsoft Windows SSL/TLS Information Disclosure Vulnerability (2643584)
7756| [902846] Microsoft Windows TLS Protocol Information Disclosure Vulnerability (2655992)
7757| [902845] Microsoft Windows Shell Remote Code Execution Vulnerability (2691442)
7758| [902842] Microsoft Lync Remote Code Execution Vulnerabilities (2707956)
7759| [902841] Microsoft .NET Framework Remote Code Execution Vulnerability (2706726)
7760| [902839] Microsoft FrontPage Server Extensions MS-DOS Device Name DoS Vulnerability
7761| [902833] Microsoft .NET Framework Remote Code Execution Vulnerability (2693777)
7762| [902832] MS Security Update For Microsoft Office, .NET Framework, and Silverlight (2681578)
7763| [902829] Microsoft Windows Common Controls Remote Code Execution Vulnerability (2664258)
7764| [902828] Microsoft .NET Framework Remote Code Execution Vulnerability (2671605)
7765| [902818] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerabilities (2671387)
7766| [902817] Microsoft Visual Studio Privilege Elevation Vulnerability (2651019)
7767| [902811] Microsoft .NET Framework and Microsoft Silverlight Remote Code Execution Vulnerabilities (2651026)
7768| [902807] Microsoft Windows Media Could Allow Remote Code Execution Vulnerabilities (2636391)
7769| [902798] Microsoft SMB Signing Enabled and Not Required At Server
7770| [902797] Microsoft SMB Signing Information Disclosure Vulnerability
7771| [902785] Microsoft AntiXSS Library Information Disclosure Vulnerability (2607664)
7772| [902784] Microsoft Windows Object Packager Remote Code Execution Vulnerability (2603381)
7773| [902783] Microsoft Windows Kernel Security Feature Bypass Vulnerability (2644615)
7774| [902782] MicroSoft Windows Server Service Remote Code Execution Vulnerability (921883)
7775| [902766] Microsoft Windows Kernel Privilege Elevation Vulnerability (2633171)
7776| [902746] Microsoft Active Accessibility Remote Code Execution Vulnerability (2623699)
7777| [902727] Microsoft Office Excel Remote Code Execution Vulnerabilities (2587505)
7778| [902708] Microsoft Remote Desktop Protocol Denial of Service Vulnerability (2570222)
7779| [902696] Microsoft Internet Explorer Multiple Vulnerabilities (2761465)
7780| [902693] Microsoft Windows Kernel-Mode Drivers Remote Code Execution Vulnerabilities (2761226)
7781| [902692] Microsoft Office Excel ReadAV Arbitrary Code Execution Vulnerability
7782| [902689] Microsoft SQL Server Report Manager Cross Site Scripting Vulnerability (2754849)
7783| [902688] Microsoft System Center Configuration Manager XSS Vulnerability (2741528)
7784| [902687] Microsoft Windows Data Access Components Remote Code Execution Vulnerability (2698365)
7785| [902686] Microsoft Internet Explorer Multiple Vulnerabilities (2719177)
7786| [902683] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerability (2685939)
7787| [902682] Microsoft Internet Explorer Multiple Vulnerabilities (2699988)
7788| [902678] Microsoft Silverlight Code Execution Vulnerabilities - 2681578 (Mac OS X)
7789| [902677] Microsoft Windows Prtition Manager Privilege Elevation Vulnerability (2690533)
7790| [902676] Microsoft Windows TCP/IP Privilege Elevation Vulnerabilities (2688338)
7791| [902670] Microsoft Internet Explorer Multiple Vulnerabilities (2675157)
7792| [902663] Microsoft Remote Desktop Protocol Remote Code Execution Vulnerabilities (2671387)
7793| [902662] MicroSoft SMB Server Trans2 Request Remote Code Execution Vulnerability
7794| [902660] Microsoft SMB Transaction Parsing Remote Code Execution Vulnerability
7795| [902658] Microsoft RDP Server Private Key Information Disclosure Vulnerability
7796| [902649] Microsoft Internet Explorer Multiple Vulnerabilities (2647516)
7797| [902642] Microsoft Internet Explorer Multiple Vulnerabilities (2618444)
7798| [902626] Microsoft SharePoint SafeHTML Information Disclosure Vulnerabilities (2412048)
7799| [902625] Microsoft SharePoint Multiple Privilege Escalation Vulnerabilities (2451858)
7800| [902613] Microsoft Internet Explorer Multiple Vulnerabilities (2559049)
7801| [902609] Microsoft Windows CSRSS Privilege Escalation Vulnerabilities (2507938)
7802| [902598] Microsoft Windows Time Component Remote Code Execution Vulnerability (2618451)
7803| [902597] Microsoft Windows Media Remote Code Execution Vulnerability (2648048)
7804| [902596] Microsoft Windows OLE Remote Code Execution Vulnerability (2624667)
7805| [902588] Microsoft Windows Internet Protocol Validation Remote Code Execution Vulnerability
7806| [902581] Microsoft .NET Framework and Silverlight Remote Code Execution Vulnerability (2604930)
7807| [902580] Microsoft Host Integration Server Denial of Service Vulnerabilities (2607670)
7808| [902567] Microsoft Office Remote Code Execution Vulnerabilites (2587634)
7809| [902566] Microsoft Windows WINS Local Privilege Escalation Vulnerability (2571621)
7810| [902552] Microsoft .NET Framework Chart Control Information Disclosure Vulnerability (2567943)
7811| [902551] Microsoft .NET Framework Information Disclosure Vulnerability (2567951)
7812| [902523] Microsoft .NET Framework and Silverlight Remote Code Execution Vulnerability (2514842)
7813| [902522] Microsoft .NET Framework Remote Code Execution Vulnerability (2538814)
7814| [902518] Microsoft .NET Framework Security Bypass Vulnerability
7815| [902516] Microsoft Windows WINS Remote Code Execution Vulnerability (2524426)
7816| [902502] Microsoft .NET Framework Remote Code Execution Vulnerability (2484015)
7817| [902501] Microsoft JScript and VBScript Scripting Engines Remote Code Execution Vulnerability (2514666)
7818| [902496] Microsoft Office IME (Chinese) Privilege Elevation Vulnerability (2652016)
7819| [902495] Microsoft Office Remote Code Execution Vulnerability (2590602)
7820| [902494] Microsoft Office Excel Remote Code Execution Vulnerability (2640241)
7821| [902493] Microsoft Publisher Remote Code Execution Vulnerabilities (2607702)
7822| [902492] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2639142)
7823| [902487] Microsoft Windows Active Directory LDAPS Authentication Bypass Vulnerability (2630837)
7824| [902484] Microsoft Windows TCP/IP Remote Code Execution Vulnerability (2588516)
7825| [902464] Microsoft Visio Remote Code Execution Vulnerabilities (2560978)
7826| [902463] Microsoft Windows Client/Server Run-time Subsystem Privilege Escalation Vulnerability (2567680)
7827| [902455] Microsoft Visio Remote Code Execution Vulnerability (2560847)
7828| [902445] Microsoft XML Editor Information Disclosure Vulnerability (2543893)
7829| [902443] Microsoft Internet Explorer Multiple Vulnerabilities (2530548)
7830| [902440] Microsoft Windows SMB Server Remote Code Execution Vulnerability (2536275)
7831| [902430] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2545814)
7832| [902425] Microsoft Windows SMB Accessible Shares
7833| [902423] Microsoft Office Visio Viewer Remote Code Execution Vulnerabilities (2663510)
7834| [902411] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2489283)
7835| [902410] Microsoft Office Excel Remote Code Execution Vulnerabilities (2489279)
7836| [902403] Microsoft Windows Fraudulent Digital Certificates Spoofing Vulnerability
7837| [902395] Microsoft Bluetooth Stack Remote Code Execution Vulnerability (2566220)
7838| [902378] Microsoft Office Excel Remote Code Execution Vulnerabilities (2537146)
7839| [902377] Microsoft Windows OLE Automation Remote Code Execution Vulnerability (2476490)
7840| [902365] Microsoft GDI+ Remote Code Execution Vulnerability (2489979)
7841| [902364] Microsoft Office Remote Code Execution Vulnerabilites (2489293)
7842| [902351] Microsoft Groove Remote Code Execution Vulnerability (2494047)
7843| [902337] Microsoft Windows Kernel Elevation of Privilege Vulnerability (2393802)
7844| [902336] Microsoft JScript and VBScript Scripting Engines Information Disclosure Vulnerability (2475792)
7845| [902325] Microsoft Internet Explorer 'CSS Import Rule' Use-after-free Vulnerability
7846| [902324] Microsoft SharePoint Could Allow Remote Code Execution Vulnerability (2455005)
7847| [902319] Microsoft Foundation Classes Could Allow Remote Code Execution Vulnerability (2387149)
7848| [902290] Microsoft Windows Active Directory SPN Denial of Service (2478953)
7849| [902289] Microsoft Windows LSASS Privilege Escalation Vulnerability (2478960)
7850| [902288] Microsoft Kerberos Privilege Escalation Vulnerabilities (2496930)
7851| [902287] Microsoft Visio Remote Code Execution Vulnerabilities (2451879)
7852| [902285] Microsoft Internet Explorer Information Disclosure Vulnerability (2501696)
7853| [902281] Microsoft Windows Data Access Components Remote Code Execution Vulnerabilities (2451910)
7854| [902280] Microsoft Windows BranchCache Remote Code Execution Vulnerability (2385678)
7855| [902277] Microsoft Windows Netlogon Service Denial of Service Vulnerability (2207559)
7856| [902276] Microsoft Windows Task Scheduler Elevation of Privilege Vulnerability (2305420)
7857| [902274] Microsoft Publisher Remote Code Execution Vulnerability (2292970)
7858| [902269] Microsoft Windows SMB Server NTLM Multiple Vulnerabilities (971468)
7859| [902265] Microsoft Office Word Remote Code Execution Vulnerabilities (2293194)
7860| [902264] Microsoft Office Excel Remote Code Execution Vulnerabilities (2293211)
7861| [902263] Microsoft Windows Media Player Network Sharing Remote Code Execution Vulnerability (2281679)
7862| [902262] Microsoft Windows Shell and WordPad COM Validation Vulnerability (2405882)
7863| [902256] Microsoft Windows win32k.sys Driver 'CreateDIBPalette()' BOF Vulnerability
7864| [902255] Microsoft Visual Studio Insecure Library Loading Vulnerability
7865| [902254] Microsoft Office Products Insecure Library Loading Vulnerability
7866| [902250] Microsoft Word 2003 'MSO.dll' Null Pointer Dereference Vulnerability
7867| [902246] Microsoft Internet Explorer 'toStaticHTML()' Cross Site Scripting Vulnerability
7868| [902243] Microsoft Outlook TNEF Remote Code Execution Vulnerability (2315011)
7869| [902232] Microsoft Windows TCP/IP Privilege Elevation Vulnerabilities (978886)
7870| [902231] Microsoft Windows Tracing Feature Privilege Elevation Vulnerabilities (982799)
7871| [902230] Microsoft .NET Common Language Runtime Remote Code Execution Vulnerability (2265906)
7872| [902229] Microsoft Window MPEG Layer-3 Remote Code Execution Vulnerability (2115168)
7873| [902228] Microsoft Office Word Remote Code Execution Vulnerabilities (2269638)
7874| [902227] Microsoft Windows LSASS Denial of Service Vulnerability (975467)
7875| [902226] Microsoft Windows Shell Remote Code Execution Vulnerability (2286198)
7876| [902217] Microsoft Outlook SMB Attachment Remote Code Execution Vulnerability (978212)
7877| [902210] Microsoft IE cross-domain IFRAME gadgets keystrokes steal Vulnerability
7878| [902193] Microsoft .NET Framework XML HMAC Truncation Vulnerability (981343)
7879| [902192] Microsoft Office COM Validation Remote Code Execution Vulnerability (983235)
7880| [902191] Microsoft Internet Explorer Multiple Vulnerabilities (982381)
7881| [902183] Microsoft Internet Explorer 'IFRAME' Denial Of Service Vulnerability
7882| [902178] Microsoft Visual Basic Remote Code Execution Vulnerability (978213)
7883| [902176] Microsoft SharePoint '_layouts/help.aspx' Cross Site Scripting Vulnerability
7884| [902166] Microsoft Internet Explorer 'neutering' Mechanism XSS Vulnerability
7885| [902159] Microsoft VBScript Scripting Engine Remote Code Execution Vulnerability (980232)
7886| [902158] Microsoft Office Publisher Remote Code Execution Vulnerability (981160)
7887| [902157] Microsoft 'ISATAP' Component Spoofing Vulnerability (978338)
7888| [902156] Microsoft SMB Client Remote Code Execution Vulnerabilities (980232)
7889| [902155] Microsoft Internet Explorer Multiple Vulnerabilities (980182)
7890| [902151] Microsoft Internet Explorer Denial of Service Vulnerability - Mar10
7891| [902133] Microsoft Office Excel Multiple Vulnerabilities (980150)
7892| [902117] Microsoft DirectShow Remote Code Execution Vulnerability (977935)
7893| [902116] Microsoft Client/Server Run-time Subsystem Privilege Elevation Vulnerability (978037)
7894| [902115] Microsoft Kerberos Denial of Service Vulnerability (977290)
7895| [902114] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (975416)
7896| [902112] Microsoft SMB Client Remote Code Execution Vulnerabilities (978251)
7897| [902095] Microsoft Office Excel Remote Code Execution Vulnerability (2269707)
7898| [902094] Microsoft Windows Kernel Mode Drivers Privilege Elevation Vulnerabilities (2160329)
7899| [902093] Microsoft Windows Kernel Privilege Elevation Vulnerabilities (981852)
7900| [902080] Microsoft Help and Support Center Remote Code Execution Vulnerability (2229593)
7901| [902069] Microsoft SharePoint Privilege Elevation Vulnerabilities (2028554)
7902| [902068] Microsoft Office Excel Remote Code Execution Vulnerabilities (2027452)
7903| [902067] Microsoft Windows Kernel Mode Drivers Privilege Escalation Vulnerabilities (979559)
7904| [902039] Microsoft Visio Remote Code Execution Vulnerabilities (980094)
7905| [902038] Microsoft MPEG Layer-3 Codecs Remote Code Execution Vulnerability (977816)
7906| [902033] Microsoft Windows '.ani' file Denial of Service vulnerability
7907| [902015] Microsoft Paint Remote Code Execution Vulnerability (978706)
7908| [901305] Microsoft Windows IP-HTTPS Component Security Feature Bypass Vulnerability (2765809)
7909| [901304] Microsoft Windows File Handling Component Remote Code Execution Vulnerability (2758857)
7910| [901301] Microsoft Windows Kerberos Denial of Service Vulnerability (2743555)
7911| [901212] Microsoft Windows DirectPlay Remote Code Execution Vulnerability (2770660)
7912| [901211] Microsoft Windows Common Controls Remote Code Execution Vulnerability (2720573)
7913| [901210] Microsoft Office Privilege Elevation Vulnerability - 2721015 (Mac OS X)
7914| [901209] Microsoft Windows Media Center Remote Code Execution Vulnerabilities (2604926)
7915| [901208] Microsoft Internet Explorer Multiple Vulnerabilities (2586448)
7916| [901205] Microsoft Windows Components Remote Code Execution Vulnerabilities (2570947)
7917| [901193] Microsoft Windows Media Remote Code Execution Vulnerabilities (2510030)
7918| [901183] Internet Information Services (IIS) FTP Service Remote Code Execution Vulnerability (2489256)
7919| [901180] Microsoft Internet Explorer Multiple Vulnerabilities (2482017)
7920| [901169] Microsoft Windows Address Book Remote Code Execution Vulnerability (2423089)
7921| [901166] Microsoft Office Remote Code Execution Vulnerabilites (2423930)
7922| [901164] Microsoft Windows SChannel Denial of Service Vulnerability (2207566)
7923| [901163] Microsoft Windows Media Player Remote Code Execution Vulnerability (2378111))
7924| [901162] Microsoft Internet Explorer Multiple Vulnerabilities (2360131)
7925| [901161] Microsoft ASP.NET Information Disclosure Vulnerability (2418042)
7926| [901151] Microsoft Internet Information Services Remote Code Execution Vulnerabilities (2267960)
7927| [901150] Microsoft Windows Print Spooler Service Remote Code Execution Vulnerability(2347290)
7928| [901140] Microsoft Windows SMB Code Execution and DoS Vulnerabilities (982214)
7929| [901139] Microsoft Internet Explorer Multiple Vulnerabilities (2183461)
7930| [901119] Microsoft Windows OpenType Compact Font Format Driver Privilege Escalation Vulnerability (980218)
7931| [901102] Microsoft Windows Media Services Remote Code Execution Vulnerability (980858)
7932| [901097] Microsoft Internet Explorer Multiple Vulnerabilities (978207)
7933| [901095] Microsoft Embedded OpenType Font Engine Remote Code Execution Vulnerabilities (972270)
7934| [901069] Microsoft Office Project Remote Code Execution Vulnerability (967183)
7935| [901065] Microsoft Windows IAS Remote Code Execution Vulnerability (974318)
7936| [901064] Microsoft Windows ADFS Remote Code Execution Vulnerability (971726)
7937| [901063] Microsoft Windows LSASS Denial of Service Vulnerability (975467)
7938| [901048] Microsoft Windows Active Directory Denial of Service Vulnerability (973309)
7939| [901041] Microsoft Internet Explorer Multiple Code Execution Vulnerabilities (974455)
7940| [901012] Microsoft Windows Media Format Remote Code Execution Vulnerability (973812)
7941| [900973] Microsoft Office Word Remote Code Execution Vulnerability (976307)
7942| [900965] Microsoft Windows SMB2 Negotiation Protocol Remote Code Execution Vulnerability
7943| [900964] Microsoft .NET Common Language Runtime Code Execution Vulnerability (974378)
7944| [900963] Microsoft Windows Kernel Privilege Escalation Vulnerability (971486)
7945| [900957] Microsoft Windows Patterns & Practices EntLib DOS Vulnerability
7946| [900956] Microsoft Windows Patterns & Practices EntLib Version Detection
7947| [900929] Microsoft JScript Scripting Engine Remote Code Execution Vulnerability (971961)
7948| [900908] Microsoft Windows Message Queuing Privilege Escalation Vulnerability (971032)
7949| [900907] Microsoft Windows AVI Media File Parsing Vulnerabilities (971557)
7950| [900898] Microsoft Internet Explorer 'XSS Filter' XSS Vulnerabilities - Nov09
7951| [900897] Microsoft Internet Explorer PDF Information Disclosure Vulnerability - Nov09
7952| [900891] Microsoft Internet Denial Of Service Vulnerability - Nov09
7953| [900887] Microsoft Office Excel Multiple Vulnerabilities (972652)
7954| [900886] Microsoft Windows Kernel-Mode Drivers Multiple Vulnerabilities (969947)
7955| [900881] Microsoft Windows Indexing Service ActiveX Vulnerability (969059)
7956| [900880] Microsoft Windows ATL COM Initialization Code Execution Vulnerability (973525)
7957| [900879] Microsoft Windows Media Player ASF Heap Overflow Vulnerability (974112)
7958| [900878] Microsoft Products GDI Plus Code Execution Vulnerabilities (957488)
7959| [900877] Microsoft Windows LSASS Denial of Service Vulnerability (975467)
7960| [900876] Microsoft Windows CryptoAPI X.509 Spoofing Vulnerabilities (974571)
7961| [900873] Microsoft Windows DNS Devolution Third-Level Domain Name Resolving Weakness (971888)
7962| [900863] Microsoft Internet Explorer 'window.print()' DOS Vulnerability
7963| [900838] Microsoft Windows TCP/IP Remote Code Execution Vulnerability (967723)
7964| [900837] Microsoft DHTML Editing Component ActiveX Remote Code Execution Vulnerability (956844)
7965| [900836] Microsoft Internet Explorer Address Bar Spoofing Vulnerability
7966| [900826] Microsoft Internet Explorer 'location.hash' DOS Vulnerability
7967| [900814] Microsoft Windows WINS Remote Code Execution Vulnerability (969883)
7968| [900813] Microsoft Remote Desktop Connection Remote Code Execution Vulnerability (969706)
7969| [900809] Microsoft Visual Studio ATL Remote Code Execution Vulnerability (969706)
7970| [900808] Microsoft Visual Products Version Detection
7971| [900757] Microsoft Windows Media Player '.AVI' File DOS Vulnerability
7972| [900741] Microsoft Internet Explorer Information Disclosure Vulnerability Feb10
7973| [900740] Microsoft Windows Kernel Could Allow Elevation of Privilege (977165)
7974| [900690] Microsoft Virtual PC/Server Privilege Escalation Vulnerability (969856)
7975| [900689] Microsoft Embedded OpenType Font Engine Remote Code Execution Vulnerabilities (961371))
7976| [900670] Microsoft Office Excel Remote Code Execution Vulnerabilities (969462)
7977| [900589] Microsoft ISA Server Privilege Escalation Vulnerability (970953)
7978| [900588] Microsoft DirectShow Remote Code Execution Vulnerability (961373)
7979| [900568] Microsoft Windows Search Script Execution Vulnerability (963093)
7980| [900566] Microsoft Active Directory LDAP Remote Code Execution Vulnerability (969805)
7981| [900476] Microsoft Excel Remote Code Execution Vulnerabilities (968557)
7982| [900465] Microsoft Windows DNS Memory Corruption Vulnerability - Mar09
7983| [900461] Microsoft MSN Live Messneger Denial of Service Vulnerability
7984| [900445] Microsoft Autorun Arbitrary Code Execution Vulnerability (08-038)
7985| [900404] Microsoft Windows RTCP Unspecified Remote DoS Vulnerability
7986| [900400] Microsoft Internet Explorer Unicode String DoS Vulnerability
7987| [900391] Microsoft Office Publisher Remote Code Execution Vulnerability (969516)
7988| [900366] Microsoft Internet Explorer Web Script Execution Vulnerabilites
7989| [900365] Microsoft Office Word Remote Code Execution Vulnerabilities (969514)
7990| [900337] Microsoft Internet Explorer Denial of Service Vulnerability - Apr09
7991| [900336] Microsoft Windows Media Player MID File Integer Overflow Vulnerability
7992| [900328] Microsoft Internet Explorer Remote Code Execution Vulnerability (963027)
7993| [900314] Microsoft XML Core Service Information Disclosure Vulnerability
7994| [900303] Microsoft Internet Explorer HTML Form Value DoS Vulnerability
7995| [900299] Microsoft Report Viewer Information Disclosure Vulnerability (2578230)
7996| [900297] Microsoft Windows Kernel Denial of Service Vulnerability (2556532)
7997| [900296] Microsoft Windows TCP/IP Stack Denial of Service Vulnerability (2563894)
7998| [900295] Microsoft Windows DNS Server Remote Code Execution Vulnerability (2562485)
7999| [900294] Microsoft Data Access Components Remote Code Execution Vulnerabilities (2560656)
8000| [900288] Microsoft Distributed File System Remote Code Execution Vulnerabilities (2535512)
8001| [900287] Microsoft SMB Client Remote Code Execution Vulnerabilities (2536276)
8002| [900285] Microsoft Foundation Class (MFC) Library Remote Code Execution Vulnerability (2500212)
8003| [900282] Microsoft DNS Resolution Remote Code Execution Vulnerability (2509553)
8004| [900281] Microsoft IE Developer Tools WMITools and Windows Messenger ActiveX Control Vulnerability (2508272)
8005| [900280] Microsoft Windows SMB Server Remote Code Execution Vulnerability (2508429)
8006| [900279] Microsoft SMB Client Remote Code Execution Vulnerabilities (2511455)
8007| [900278] Microsoft Internet Explorer Multiple Vulnerabilities (2497640)
8008| [900273] Microsoft Remote Desktop Client Remote Code Execution Vulnerability (2508062)
8009| [900267] Microsoft Media Decompression Remote Code Execution Vulnerability (2447961)
8010| [900266] Microsoft Windows Movie Maker Could Allow Remote Code Execution Vulnerability (2424434)
8011| [900263] Microsoft Windows OpenType Compact Font Format Driver Privilege Escalation Vulnerability (2296199)
8012| [900262] Microsoft Internet Explorer Multiple Vulnerabilities (2416400)
8013| [900261] Microsoft Office PowerPoint Remote Code Execution Vulnerabilities (2293386)
8014| [900248] Microsoft Windows Movie Maker Could Allow Remote Code Execution Vulnerability (981997)
8015| [900246] Microsoft Media Decompression Remote Code Execution Vulnerability (979902)
8016| [900245] Microsoft Data Analyzer and IE Developer Tools ActiveX Control Vulnerability (980195)
8017| [900241] Microsoft Outlook Express and Windows Mail Remote Code Execution Vulnerability (978542)
8018| [900240] Microsoft Exchange and Windows SMTP Service Denial of Service Vulnerability (981832)
8019| [900237] Microsoft Windows Authentication Verification Remote Code Execution Vulnerability (981210)
8020| [900236] Microsoft Windows Kernel Could Allow Elevation of Privilege (979683)
8021| [900235] Microsoft Windows Media Player Could Allow Remote Code Execution (979402)
8022| [900232] Microsoft Windows Movie Maker Could Allow Remote Code Execution Vulnerability (975561)
8023| [900230] Microsoft Windows SMB Server Multiple Vulnerabilities (971468)
8024| [900229] Microsoft Data Analyzer ActiveX Control Vulnerability (978262)
8025| [900228] Microsoft Office (MSO) Remote Code Execution Vulnerability (978214)
8026| [900227] Microsoft Windows Shell Handler Could Allow Remote Code Execution Vulnerability (975713)
8027| [900223] Microsoft Ancillary Function Driver Elevation of Privilege Vulnerability (956803)
8028| [900192] Microsoft Internet Explorer Information Disclosure Vulnerability
8029| [900187] Microsoft Internet Explorer Argument Injection Vulnerability
8030| [900178] Microsoft Windows 'UnhookWindowsHookEx' Local DoS Vulnerability
8031| [900173] Microsoft Windows Media Player Version Detection
8032| [900172] Microsoft Windows Media Player 'MIDI' or 'DAT' File DoS Vulnerability
8033| [900170] Microsoft iExplorer '&NBSP
8034| [900131] Microsoft Internet Explorer Denial of Service Vulnerability
8035| [900125] Microsoft SQL Server 2000 sqlvdir.dll ActiveX Buffer Overflow Vulnerability
8036| [900120] Microsoft Organization Chart Remote Code Execution Vulnerability
8037| [900108] Microsoft Windows NSlookup.exe Remote Code Execution Vulnerability
8038| [900097] Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution
8039| [900095] Microsoft ISA Server and Forefront Threat Management Gateway DoS Vulnerability (961759)
8040| [900093] Microsoft DirectShow Remote Code Execution Vulnerability (961373)
8041| [900080] Vulnerabilities in Microsoft Office Visio Could Allow Remote Code Execution (957634)
8042| [900079] Vulnerabilities in Microsoft Exchange Could Allow Remote Code Execution (959239)
8043| [900064] Vulnerability in Microsoft Office SharePoint Server Could Cause Elevation of Privilege (957175)
8044| [900063] Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution (957173)
8045| [900061] Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution (959070)
8046| [900058] Microsoft XML Core Services Remote Code Execution Vulnerability (955218)
8047| [900048] Microsoft Excel Remote Code Execution Vulnerability (956416)
8048| [900047] Microsoft Office nformation Disclosure Vulnerability (957699)
8049| [900046] Microsoft Office Remote Code Execution Vulnerabilities (955047)
8050| [900033] Microsoft PowerPoint Could Allow Remote Code Execution Vulnerabilities (949785)
8051| [900029] Microsoft Office Filters Could Allow Remote Code Execution Vulnerabilities (924090)
8052| [900028] Microsoft Excel Could Allow Remote Code Execution Vulnerabilities (954066)
8053| [900025] Microsoft Office Version Detection
8054| [900006] Microsoft Word Could Allow Remote Code Execution Vulnerability
8055| [900004] Microsoft Access Snapshot Viewer ActiveX Control Vulnerability
8056| [855384] Solaris Update for snmp/mibiisa 108870-36
8057| [855273] Solaris Update for snmp/mibiisa 108869-36
8058| [803028] Microsoft Internet Explorer Remote Code Execution Vulnerability (2757760)
8059| [803007] Microsoft Windows Minimum Certificate Key Length Spoofing Vulnerability (2661254)
8060| [802912] Microsoft Unauthorized Digital Certificates Spoofing Vulnerability (2728973)
8061| [802888] Microsoft Windows Media Service Handshake Sequence DoS Vulnerability
8062| [802886] Microsoft Sidebar and Gadgets Remote Code Execution Vulnerability (2719662)
8063| [802864] Microsoft XML Core Services Remote Code Execution Vulnerability (2719615)
8064| [802774] Microsoft VPN ActiveX Control Remote Code Execution Vulnerability (2695962)
8065| [802726] Microsoft SMB Signing Disabled
8066| [802708] Microsoft Internet Explorer Code Execution and DoS Vulnerabilities
8067| [802634] Microsoft Windows Unauthorized Digital Certificates Spoofing Vulnerability (2718704)
8068| [802500] Microsoft Windows TrueType Font Parsing Privilege Elevation Vulnerability
8069| [802468] Compatibility Issues Affecting Signed Microsoft Binaries (2749655)
8070| [802462] Microsoft ActiveSync Null Pointer Dereference Denial Of Service Vulnerability
8071| [802426] Microsoft Windows ActiveX Control Multiple Vulnerabilities (2647518)
8072| [802383] Microsoft Windows Color Control Panel Privilege Escalation Vulnerability
8073| [802379] Microsoft Windows Kernel 'win32k.sys' Memory Corruption Vulnerability
8074| [802287] Microsoft Internet Explorer Cache Objects History Information Disclosure Vulnerability
8075| [802286] Microsoft Internet Explorer Multiple Information Disclosure Vulnerabilities
8076| [802260] Microsoft Windows WINS Remote Code Execution Vulnerability (2524426)
8077| [802203] Microsoft Internet Explorer Cookie Hijacking Vulnerability
8078| [802202] Microsoft Internet Explorer Cookie Hijacking Vulnerability
8079| [802140] Microsoft Explorer HTTPS Sessions Multiple Vulnerabilities (Windows)
8080| [802136] Microsoft Windows Insecure Library Loading Vulnerability (2269637)
8081| [801991] Microsoft Windows SMB/NETBIOS NULL Session Authentication Bypass Vulnerability
8082| [801966] Microsoft Windows ActiveX Control Multiple Vulnerabilities (2562937)
8083| [801935] Microsoft Silverlight Multiple Memory Leak Vulnerabilities
8084| [801934] Microsoft Silverlight Version Detection
8085| [801914] Microsoft Windows IPv4 Default Configuration Security Bypass Vulnerability
8086| [801876] Microsoft Internet Explorer 'msxml.dll' Information Disclosure Vulnerability
8087| [801831] Microsoft Internet Explorer Incorrect GUI Display Vulnerability
8088| [801830] Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability
8089| [801725] Microsoft Products GDI Plus Remote Code Execution Vulnerabilities (954593)
8090| [801721] Microsoft Active Directory Denial of Service Vulnerability (953235)
8091| [801719] Microsoft Windows CSRSS CSRFinalizeContext Local Privilege Escalation Vulnerability (930178)
8092| [801718] Microsoft Windows Vista Information Disclosure Vulnerability (931213)
8093| [801717] Microsoft Windows Vista Teredo Interface Firewall Bypass Vulnerability
8094| [801716] Microsoft Outlook Express/Windows Mail MHTML URI Handler Information Disclosure Vulnerability (929123)
8095| [801715] Microsoft XML Core Services Remote Code Execution Vulnerability (936227)
8096| [801713] Microsoft Outlook Express And Windows Mail NNTP Protocol Heap Buffer Overflow Vulnerability (941202)
8097| [801707] Microsoft Internet Explorer mshtml.dll Remote Memory Corruption Vulnerability (942615)
8098| [801706] Microsoft Windows TCP/IP Remote Code Execution Vulnerabilities (941644)
8099| [801705] Microsoft Windows TCP/IP Denial of Service Vulnerability (946456)
8100| [801704] Microsoft Internet Information Services Privilege Elevation Vulnerability (942831)
8101| [801702] Microsoft Internet Explorer HTML Rendering Remote Memory Corruption Vulnerability (944533)
8102| [801701] Microsoft Windows DNS Client Service Response Spoofing Vulnerability (945553)
8103| [801677] Microsoft WMI Administrative Tools ActiveX Control Remote Code Execution Vulnerabilities
8104| [801606] Microsoft Internet Explorer 'mshtml.dll' Information Disclosure Vulnerability
8105| [801598] Microsoft Windows2k3 Active Directory 'BROWSER ELECTION' Buffer Overflow Vulnerability
8106| [801597] Microsoft Office Excel 2003 Invalid Object Type Remote Code Execution Vulnerability
8107| [801596] Microsoft Excel 2007 Office Drawing Layer Remote Code Execution Vulnerability
8108| [801595] Microsoft Office Excel Axis and Art Object Parsing Remote Code Execution Vulnerabilities
8109| [801594] Microsoft PowerPoint 2007 OfficeArt Atom Remote Code Execution Vulnerability
8110| [801580] Microsoft Windows Fax Cover Page Editor BOF Vulnerabilities
8111| [801527] Microsoft Windows 32-bit Platforms Unspecified vulnerabilities
8112| [801491] Microsoft 'hxvz.dll' ActiveX Control Memory Corruption Vulnerability (948881)
8113| [801489] Microsoft Office Graphics Filters Remote Code Execution Vulnerabilities (968095)
8114| [801488] Microsoft Internet Explorer Data Stream Handling Remote Code Execution Vulnerability (947864)
8115| [801487] Microsoft Windows Kernel Usermode Callback Local Privilege Elevation Vulnerability (941693)
8116| [801486] Microsoft Windows Speech Components Voice Recognition Command Execution Vulnerability (950760)
8117| [801485] Microsoft Pragmatic General Multicast (PGM) Denial of Service Vulnerability (950762)
8118| [801484] Microsoft Windows IPsec Policy Processing Information Disclosure Vulnerability (953733)
8119| [801483] Microsoft Windows Search Remote Code Execution Vulnerability (959349)
8120| [801482] Microsoft Windows ASP.NET Denial of Service Vulnerability(970957)
8121| [801481] Microsoft Wireless LAN AutoConfig Service Remote Code Execution Vulnerability (970710)
8122| [801480] Microsoft Web Services on Devices API Remote Code Execution Vulnerability (973565)
8123| [801479] Microsoft Windows TCP/IP Could Allow Remote Code Execution (974145)
8124| [801457] Microsoft Windows Address Book Insecure Library Loading Vulnerability
8125| [801456] Microsoft Windows Progman Group Converter Insecure Library Loading Vulnerability
8126| [801349] Microsoft Internet Explorer 'IFRAME' Denial Of Service Vulnerability (June-10)
8127| [801348] Microsoft Internet Explorer 'IFRAME' Denial Of Service Vulnerability -june 10
8128| [801345] Microsoft .NET 'ASP.NET' Cross-Site Scripting vulnerability
8129| [801344] Microsoft .NET '__VIEWSTATE' Cross-Site Scripting vulnerability
8130| [801342] Microsoft ASP.NET Cross-Site Scripting vulnerability
8131| [801333] Microsoft Windows Kernel 'win32k.sys' Multiple DOS Vulnerabilities
8132| [801330] Microsoft Internet Explorer Cross Site Data Leakage Vulnerability
8133| [801109] Microsoft IE CA SSL Certificate Security Bypass Vulnerability - Oct09
8134| [801090] Microsoft Windows Indeo Codec Multiple Vulnerabilities
8135| [800968] Microsoft SharePoint Team Services Information Disclosure Vulnerability
8136| [800910] Microsoft Internet Explorer Buffer Overflow Vulnerability - Jul09
8137| [800902] Microsoft Internet Explorer XSS Vulnerability - July09
8138| [800872] Microsoft Internet Explorer 'li' Element DoS Vulnerability - Sep09
8139| [800863] Microsoft Internet Explorer XML Document DoS Vulnerability - Aug09
8140| [800862] Microsoft Windows Kernel win32k.sys Privilege Escalation Vulnerability
8141| [800861] Microsoft Internet Explorer 'findText()' Unicode Parsing DoS Vulnerability
8142| [800845] Microsoft Office Web Components ActiveX Control Code Execution Vulnerability
8143| [800829] Microsoft Video ActiveX Control 'msvidctl.dll' BOF Vulnerability
8144| [800742] Microsoft Internet Explorer Unspecified vulnerability
8145| [800700] Microsoft GDIPlus PNG Infinite Loop Vulnerability
8146| [800687] Microsoft Windows Server 2003 OpenType Font Engine DoS Vulnerability
8147| [800669] Microsoft Internet Explorer Denial Of Service Vulnerability - July09
8148| [800577] Microsoft Windows Server 2003 win32k.sys DoS Vulnerability
8149| [800505] Microsoft HTML Help Workshop buffer overflow vulnerability
8150| [800504] Microsoft Windows XP SP3 denial of service vulnerability
8151| [800481] Microsoft SharePoint Cross Site Scripting Vulnerability
8152| [800480] Microsoft Windows Media Player '.mpg' Buffer Overflow Vulnerability
8153| [800466] Microsoft Windows TLS/SSL Spoofing Vulnerability (977377)
8154| [800461] Microsoft Internet Explorer Information Disclosure Vulnerability (980088)
8155| [800442] Microsoft Windows GP Trap Handler Privilege Escalation Vulnerability
8156| [800429] Microsoft Internet Explorer Remote Code Execution Vulnerability (979352)
8157| [800382] Microsoft PowerPoint File Parsing Remote Code Execution Vulnerability (967340)
8158| [800347] Microsoft Internet Explorer Clickjacking Vulnerability
8159| [800343] Microsoft Word 2007 Sensitive Information Disclosure Vulnerability
8160| [800337] Microsoft Internet Explorer NULL Pointer DoS Vulnerability
8161| [800332] Microsoft Windows Live Messenger Information Disclosure Vulnerability
8162| [800331] Microsoft Windows Live Messenger Client Version Detection
8163| [800328] Integer Overflow vulnerability in Microsoft Windows Media Player
8164| [800310] Microsoft Windows Media Services nskey.dll ActiveX BOF Vulnerability
8165| [800267] Microsoft GDIPlus Library File Integer Overflow Vulnerability
8166| [800218] Microsoft Money 'prtstb06.dll' Denial of Service vulnerability
8167| [800217] Microsoft Money Version Detection
8168| [800209] Microsoft Internet Explorer Version Detection (Win)
8169| [800208] Microsoft Internet Explorer Anti-XSS Filter Vulnerabilities
8170| [800083] Microsoft Outlook Express Malformed MIME Message DoS Vulnerability
8171| [800082] Microsoft SQL Server sp_replwritetovarbin() BOF Vulnerability
8172| [800023] Microsoft Windows Image Color Management System Code Execution Vulnerability (952954)
8173| [103254] Microsoft SharePoint Server 2007 '_layouts/help.aspx' Cross Site Scripting Vulnerability
8174| [102059] Microsoft Windows Vector Markup Language Buffer Overflow (938127)
8175| [102055] Microsoft Windows GDI Multiple Vulnerabilities (925902)
8176| [102053] Microsoft Windows Vector Markup Language Vulnerabilities (929969)
8177| [102015] Microsoft RPC Interface Buffer Overrun (KB824146)
8178| [101100] Vulnerabilities in Microsoft ATL Could Allow Remote Code Execution (973908)
8179| [101017] Microsoft MS03-018 security check
8180| [101016] Microsoft MS03-022 security check
8181| [101015] Microsoft MS03-034 security check
8182| [101014] Microsoft MS00-078 security check
8183| [101012] Microsoft MS03-051 security check
8184| [101010] Microsoft Security Bulletin MS05-004
8185| [101009] Microsoft Security Bulletin MS06-033
8186| [101007] Microsoft dotNET version grabber
8187| [101006] Microsoft Security Bulletin MS06-056
8188| [101005] Microsoft Security Bulletin MS07-040
8189| [101004] Microsoft MS04-017 security check
8190| [101003] Microsoft MS00-058 security check
8191| [101000] Microsoft MS00-060 security check
8192| [100950] Microsoft DNS server internal hostname disclosure detection
8193| [100624] Microsoft Windows SMTP Server DNS spoofing vulnerability
8194| [100607] Microsoft SMTP Service and Exchange Routing Engine Buffer Overflow Vulnerability
8195| [100596] Microsoft Windows SMTP Server MX Record Denial of Service Vulnerability
8196| [100283] Microsoft Windows SMB2 '_Smb2ValidateProviderCallback()' Remote Code Execution Vulnerability
8197| [100062] Microsoft Remote Desktop Protocol Detection
8198| [90024] Windows Vulnerability in Microsoft Jet Database Engine
8199| [80007] Microsoft MS00-06 security check
8200| [13752] Denial of Service (DoS) in Microsoft SMS Client
8201| [11992] Vulnerability in Microsoft ISA Server 2000 H.323 Filter(816458)
8202| [11874] IIS Service Pack - 404
8203| [11808] Microsoft RPC Interface Buffer Overrun (823980)
8204| [11433] Microsoft ISA Server DNS - Denial Of Service (MS03-009)
8205| [11217] Microsoft's SQL Version Query
8206| [11177] Flaw in Microsoft VM Could Allow Code Execution (810030)
8207| [11146] Microsoft RDP flaws could allow sniffing and DOS(Q324380)
8208| [11142] IIS XSS via IDC error
8209| [11067] Microsoft's SQL Hello Overflow
8210| [11003] IIS Possible Compromise
8211| [10993] IIS ASP.NET Application Trace Enabled
8212| [10991] IIS Global.asa Retrieval
8213| [10936] IIS XSS via 404 error
8214| [10862] Microsoft's SQL Server Brute Force
8215| [10755] Microsoft Exchange Public Folders Information Leak
8216| [10732] IIS 5.0 WebDav Memory Leakage
8217| [10699] IIS FrontPage DoS II
8218| [10695] IIS .IDA ISAPI filter applied
8219| [10674] Microsoft's SQL UDP Info Query
8220| [10673] Microsoft's SQL Blank Password
8221| [10671] IIS Remote Command Execution
8222| [10667] IIS 5.0 PROPFIND Vulnerability
8223| [10661] IIS 5 .printer ISAPI filter applied
8224| [10657] NT IIS 5.0 Malformed HTTP Printer Request Header Buffer Overflow Vulnerability
8225| [10585] IIS FrontPage DoS
8226| [10576] Check for dangerous IIS default files
8227| [10575] Check for IIS .cnf file leakage
8228| [10573] IIS 5.0 Sample App reveals physical path of web root
8229| [10572] IIS 5.0 Sample App vulnerable to cross-site scripting attack
8230| [10537] IIS directory traversal
8231| [10492] IIS IDA/IDQ Path Disclosure
8232| [10491] ASP/ASA source using Microsoft Translate f: bug
8233| [10144] Microsoft SQL TCP/IP listener is running
8234|
8235| SecurityTracker - https://www.securitytracker.com:
8236| [1027751] Microsoft Internet Information Server (IIS) FTP Server Lets Remote Users Obtain Files and Local Users Obtain Passwords
8237| [1027223] Microsoft IIS Web Server Discloses Potentially Sensitive Information to Remote Users
8238| [1024921] Microsoft IIS FTP Server Lets Remote Users Deny Service
8239| [1024496] Microsoft Internet Information Server (IIS) Web Server Stack Overflow in Reading POST Data Lets Remote Users Deny Service
8240| [1023387] Microsoft Internet Information Services (IIS) Filename Extension Parsing Configuration Error May Let Users Bypass Security Controls
8241| [1022792] Microsoft Internet Information Server (IIS) FTP Server Buffer Overflows Let Remote Authenticated Users Execute Arbitrary Code and Deny Service
8242| [1016466] Microsoft Internet Information Server (IIS) Buffer Overflow in Processing ASP Pages Lets Remote Authenticated Users Execute Arbitrary Code
8243| [1015376] Microsoft IIS Lets Remote Users Deny Service or Execute Arbitrary Code With Malformed HTTP GET Requests
8244| [1015049] Microsoft Internet Explorer Drag-and-Drop Timing May Let Remote Users Install Arbitrary Files
8245| [1014777] Microsoft IIS ASP Error Page May Disclose System Information in Certain Cases
8246| [1011633] Microsoft IIS WebDAV XML Message Handler Error Lets Remote Users Deny Service
8247| [1010692] Microsoft IIS 4.0 Buffer Overflow in Redirect Function Lets Remote Users Execute Arbitrary Code
8248| [1010610] Microsoft IIS Web Server May Disclose Private IP Addresses in Certain Cases
8249| [1010079] Microsoft IIS ASP Script Cookie Processing Flaw May Disclose Application Information to Remote Users
8250| [1008563] Microsoft IIS Fails to Log HTTP TRACK Requests
8251| [1007262] Microsoft IIS 6.0 Vulnerabilities Permit Cross-Site Scripting and Password Changing Attacks Against Administrators
8252| [1007059] Microsoft Windows Media Services (nsiislog.dll) Extension to Internet Information Server (IIS) Has Another Buffer Overflow That Lets Remote Execute Arbitrary Code
8253| [1006867] Microsoft IIS Buffer Overflow Lets Remote Users With Upload Privileges Execute Code - Remote Users Can Also Crash the Service
8254| [1006866] Microsoft Windows Media Services (nsiislog.dll) Extension to Internet Information Server (IIS) Lets Remote Execute Arbitrary Code
8255| [1006704] Microsoft IIS Authentication Manager Discloses Validity of User Names to Remote Users
8256| [1006305] Microsoft IIS Web Server WebDAV Buffer Overflow Lets Remote Users Execute Arbitrary Code
8257| [1005505] Microsoft Internet Information Server (IIS) Script Access Control Bug May Let Remote Authenticated Users Upload Unauthorized Executable Files
8258| [1005504] Microsoft Internet Information Server (IIS) WebDAV Memory Allocation Flaw Lets Remote Users Crash the Server
8259| [1005503] Microsoft Internet Information Server (IIS) Administrative Pages Allow Cross-Site Scripting Attacks
8260| [1005502] Microsoft Internet Information Server (IIS) Out-of-Process Access Control Bug Lets Certain Authenticated Users Gain Full Control of the Server
8261| [1005083] Microsoft Internet Information Server (IIS) Web Server Fails to Properly Validate Client-side Certificates, Allowing Remote Users to Impersonate Other Users or Certificate Issuers
8262| [1004757] Microsoft IIS SMTP Service Encapsulation Bug Lets Remote Users Relay Mail and Send SPAM Via the Service
8263| [1004646] ColdFusion MX Buffer Overflow When Used With Microsoft Internet Information Server (IIS) Lets Remote Users Crash the IIS Web Server or Execute Arbitrary Code
8264| [1004526] Microsoft Internet Information Server (IIS) Heap Overflow in HTR ISAPI Extension While Processing Chunked Encoded Data Lets Remote Users Execute Arbitrary Code
8265| [1004044] Cisco CallManager Affected by Microsoft Internet Information Server (IIS) Bugs
8266| [1004032] Microsoft Internet Information Server (IIS) FTP STAT Command Bug Lets Remote Users Crash Both the FTP and the Web Services
8267| [1004031] Microsoft Internet Information Server (IIS) URL Length Bug Lets Remote Users Crash the Web Service
8268| [1004011] Microsoft Internet Information Server (IIS) Buffer Overflow in ASP Server-Side Include Function May Let Remote Users Execute Arbitrary Code on the Web Server
8269| [1004006] Microsoft Internet Information Server (IIS) Off-By-One Heap Overflow in .HTR Processing May Let Remote Users Execute Arbitrary Code on the Server
8270| [1003224] Microsoft Internet Information Server (IIS) Version 4 Lets Local Users Modify the Log File Undetected
8271| [1002778] Microsoft Internet Information Server (IIS) Lets Remote Users Create Bogus Web Log Entries
8272| [1002733] Microsoft IIS 4.0 Configuration Error May Allow Remote Users to Obtain Physical Directory Path Information
8273| [1002651] Microsoft Internet Information Server (IIS) May Disclose PHP Scripting Source Code
8274| [1002212] Microsoft IIS Web Server Contains Multiple Vulnerabilities That Allow Local Users to Gain System Privileges and Allow Remote Users to Cause the Web Server to Crash
8275| [1002161] Microsoft Internet Information Server (IIS) Web Server Discloses Internal IP Addresses or NetBIOS Host Names to Remote Users
8276| [1001818] Microsoft Internet Information Server (IIS) Web Server Discloses ASP Source Code When Installed on FAT-based Filesystem
8277| [1001576] eEye Digital Security's SecureIIS Application Firewall for Microsoft Web Servers Fails to Filter Certain Web URL Characters, Allowing Remote Users to Bypass the SecureIIS Firewall
8278| [1001565] Microsoft IIS Web Server on Windows 2000 Allows Remote Users to Cause the Server to Consume All Available Memory Due to Memory Leak in WebDAV Lock Method
8279| [1001530] Microsoft IIS Web Server Allows Remote Users to Execute Commands on the Server Due to CGI Decoding Error
8280| [1001483] Microsoft IIS Web Server Lets Remote Users Restart the Web Server with Another Specially Crafted PROPFIND XML Command
8281| [1001464] Microsoft Internet Information Server IIS 5.0 for Windows 2000 Lets Remote Users Execute Arbitrary Code on the Server and Gain Control of the Server
8282| [1001402] Microsoft IIS Web Server Can Be Effectively Shutdown By Certain Internal-Network Attacks When The Underlying OS Supports User Account Lockouts
8283| [1001116] Microsoft Personal Web Server Contains An Old Internet Information Server (IIS) Vulnerability Allowing Unauthorized Directory Listings and Possible Code Execution For Remote Users
8284| [1001050] Microsoft IIS 5.0 Web Server Can Be Restarted Remotely By Any User
8285| [1028908] Microsoft Active Directory Federation Services Discloses Account Information to Remote Users
8286| [1028905] (Microsoft Issues Fix for Exchange Server) Oracle Fusion Middleware Bugs Let Remote Users Deny Service and Access and Modify Data
8287| [1028904] (Microsoft Issues Fix for Exchange Server) Oracle PeopleSoft Products Bugs Let Remote Users Partially Access and Modify Data and Partially Deny Service
8288| [1028903] Microsoft Windows Unicode Scripts Processor Memory Corruption Error Lets Remote Users Execute Arbitrary Code
8289| [1028902] Microsoft Internet Explorer Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks
8290| [1028759] (Microsoft Issues Fix for Internet Explorer) Adobe Flash Player Buffer Overflows Let Remote Users Execute Arbitrary Code
8291| [1028756] Microsoft .NET Bug Lets Remote Users Execute Arbitrary Code and Bypass Security Restrictions
8292| [1028755] Microsoft Silverlight Null Pointer Dereference Lets Remote Users Execute Arbitrary Code
8293| [1028754] Microsoft Windows Defender Pathname Bug Lets Local Users Gain Elevated Privileges
8294| [1028752] Microsoft DirectShow GIF Image Processing Flaw Lets Remote Users Execute Arbitrary Code
8295| [1028751] Microsoft Office TrueType Font Parsing Flaw Lets Remote Users Execute Arbitrary Code
8296| [1028750] Microsoft Visual Studio .NET TrueType Font Parsing Flaw Lets Remote Users Execute Arbitrary Code
8297| [1028749] Microsoft Lync TrueType Font Parsing Flaw Lets Remote Users Execute Arbitrary Code
8298| [1028748] Microsoft Windows GDI+ TrueType Font Parsing Flaw Lets Remote Users Execute Arbitrary Code
8299| [1028745] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks
8300| [1028651] Microsoft Internet Explorer Multiple Memory Corruption Bugs Let Remote Users Execute Arbitrary Code
8301| [1028650] Microsoft Office Buffer Overflow in PNG Image Processing Lets Remote Users Execute Arbitrary Code
8302| [1028560] Microsoft Visio Discloses Information to Remote Users
8303| [1028558] Microsoft .NET Flaws Let Remote Users Bypass Authentication and Bypass XML File Signature Verification
8304| [1028557] Microsoft Malware Protection Engine Flaw Lets Remote Users Execute Arbitrary Code
8305| [1028553] Microsoft Word RTF Shape Data Parsing Error Lets Remote Users Execute Arbitrary Code
8306| [1028552] Microsoft Publisher Multiple Bugs Let Remote Users Execute Arbitrary Code
8307| [1028551] Microsoft Lync Object Access Flaw Lets Remote Users Execute Arbitrary Code
8308| [1028550] Microsoft Office Communicator Object Access Flaw Lets Remote Users Execute Arbitrary Code
8309| [1028545] Microsoft Internet Explorer Multiple Use-After-Free Bugs Let Remote Users Execute Arbitrary Code
8310| [1028514] Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code
8311| [1028412] Microsoft SharePoint Server Discloses Files to Remote Authenticated Users
8312| [1028411] Microsoft Office Web Apps Input Validation Flaw in Sanitization Component Permits Cross-Site Scripting Attacks
8313| [1028410] Microsoft InfoPath Input Validation Flaw in Sanitization Component Permits Cross-Site Scripting Attacks
8314| [1028409] Microsoft Groove Server Input Validation Flaw in Sanitization Component Permits Cross-Site Scripting Attacks
8315| [1028408] Microsoft SharePoint Input Validation Flaw in HTML Sanitization Component Permits Cross-Site Scripting Attacks
8316| [1028405] Microsoft Active Directory LDAP Processing Flaw Lets Remote Users Deny Service
8317| [1028404] Microsoft Antimalware Client Path Name Flaw Lets Local Users Gain Elevated Privileges
8318| [1028398] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
8319| [1028281] Microsoft Office for Mac HTML Loading Bug Lets Remote Users Obtain Potentially Sensitive Information
8320| [1028279] Microsoft OneNote Buffer Validation Flaw Lets Remote Users Obtain Potentially Sensitive Information
8321| [1028278] Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks
8322| [1028276] Microsoft Visio Viewer Tree Object Type Confusion Error Lets Remote Users Execute Arbitrary Code
8323| [1028275] Microsoft Internet Explorer Use-After-Free Bugs Let Remote Users Execute Arbitrary Code
8324| [1028273] Microsoft Silverlight Memory Pointer Dereference Lets Remote Users Execute Arbitrary Code
8325| [1028123] Microsoft .NET Bug Lets Remote Users Execute Arbitrary Code and Bypass Security Restrictions
8326| [1028119] Microsoft DirectShow Media Decompression Flaw Lets Remote Users Execute Arbitrary Code
8327| [1028117] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Access Information Across Domains
8328| [1028116] Microsoft Internet Explorer Vector Markup Language Memory Corruption Error Lets Remote Users Execute Arbitrary Code
8329| [1027949] Microsoft .NET Open Data (OData) Protocol Bug Lets Remote Users Deny Service
8330| [1027948] Microsoft System Center Configuration Manager Input Validation Flaws Permit Cross-Site Scripting Attacks
8331| [1027945] Microsoft .NET Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, and Bypass Security Restrictions
8332| [1027943] Microsoft XML Core Services (MSXML) XML Parsing Flaws Let Remote Users Execute Arbitrary Code
8333| [1027934] Microsoft Windows Includes Some Invalid TURKTRUST Certificates
8334| [1027930] Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code
8335| [1027870] Microsoft Internet Explorer Discloses Mouse Location to Remote Users
8336| [1027859] Microsoft DirectPlay Heap Overflow Lets Remote Users Execute Arbitrary Code
8337| [1027857] Microsoft Exchange Server RSS Feed Bug Lets Remote Users Deny Service
8338| [1027852] Microsoft Word RTF Parsing Error Lets Remote Users Execute Arbitrary Code
8339| [1027851] Microsoft Internet Explorer Multiple Use-After-Free Bugs Let Remote Users Execute Arbitrary Code
8340| [1027753] Microsoft .NET Flaws Let Remote Users Execute Arbitrary Code, Obtain Potentially Sensitive Information, and Bypass Security Restrictions
8341| [1027752] Microsoft Excel Buffer Overflow, Memory Corruption, and Use-After-Free Errors Let Remote Users Execute Arbitrary Code
8342| [1027749] Microsoft Internet Explorer Multiple Use-After-Free Bugs Let Remote Users Execute Arbitrary Code
8343| [1027647] EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords
8344| [1027629] Microsoft Office InfoPath HTML Sanitizer Flaw Permits Cross-Site Scripting Attacks
8345| [1027628] Microsoft Office Communicator HTML Sanitizer Flaw Permits Cross-Site Scripting Attacks
8346| [1027627] Microsoft Lync HTML Sanitizer Flaw Permits Cross-Site Scripting Attacks
8347| [1027626] Microsoft SharePoint HTML Sanitizer Flaw Permits Cross-Site Scripting Attacks
8348| [1027625] Microsoft Groove Server HTML Sanitizer Flaw Permits Cross-Site Scripting Attacks
8349| [1027623] Microsoft SQL Server Input Validation Flaw in Reporting Services Permits Cross-Site Scripting Attacks
8350| [1027621] Microsoft Works Heap Corruption Flaw Lets Remote Users Execute Arbitrary Code
8351| [1027620] Microsoft Kerberos Null Pointer Dereference Lets Remote Users Deny Service
8352| [1027618] Microsoft Word Memory Errors Let Remote Users Execute Arbitrary Code
8353| [1027555] Microsoft Internet Explorer Multiple Use-After-Free Bugs Let Remote Users Execute Arbitrary Code
8354| [1027538] Microsoft Internet Explorer execCommand Flaw Lets Remote Users Execute Arbitrary Code
8355| [1027512] Microsoft System Center Configuration Manager Input Validation Flaw Permits Cross-Site Scripting Attacks
8356| [1027511] Microsoft Visual Studio Team Foundation Server Input Validation Flaw Permits Cross-Site Scripting Attacks
8357| [1027394] Microsoft Visio Buffer Overflow in Processing DXF Format Files Lets Remote Users Execute Arbitrary Code
8358| [1027393] Microsoft Office CGM Graphics File Memory Corruption Error Lets Remote Users Execute Arbitrary Code
8359| [1027392] Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code
8360| [1027390] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
8361| [1027389] Microsoft Visual Basic Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
8362| [1027385] Microsoft Visual FoxPro Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
8363| [1027384] Microsoft Host Integration Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
8364| [1027383] Microsoft Commerce Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
8365| [1027381] Microsoft SQL Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
8366| [1027380] Microsoft Office Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
8367| [1027295] Microsoft SharePoint Server Bugs in Oracle Outside In Libraries Let Remote Users Execute Arbitrary Code
8368| [1027294] Microsoft Exchange Server Bugs in Oracle Outside In Libraries Let Remote Users Execute Arbitrary Code
8369| [1027234] Microsoft Office for Mac Folder Permission Flaw Lets Local Users Gain Elevated Privileges
8370| [1027232] Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting, Information Disclosure, and URL Redirection Attacks
8371| [1027229] Microsoft Office DLL Loading Error Lets Remote Users Execute Arbitrary Code
8372| [1027228] Microsoft Visual Basic for Applications DLL Loading Error Lets Remote Users Execute Arbitrary Code
8373| [1027227] Microsoft Data Access Components (MDAC) ADO Cachesize Buffer Overflow Lets Remote Users Execute Arbitrary Code
8374| [1027226] Microsoft Internet Explorer Deleted Object Access Bugs Let Remote Users Execute Arbitrary Code
8375| [1027157] Microsoft XML Core Services (MSXML) Object Access Error Lets Remote Users Execute Arbitrary Code
8376| [1027151] Microsoft Dynamics AX Input Validation Flaw Permits Cross-Site Scripting Attacks
8377| [1027150] Microsoft Lync DLL Loading Error Lets Remote Users Execute Arbitrary Code
8378| [1027149] Microsoft .NET Memory Access Bug Lets Remote Users Execute Arbitrary Code
8379| [1027147] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information
8380| [1027114] Microsoft Windows Includes Some Invalid Certificates
8381| [1027048] Microsoft .NET Bugs Let Remote Users Execute Arbitrary Code and Deny Service
8382| [1027043] Microsoft Windows Partition Manager Memory Allocation Error Lets Local Users Gain Elevated Privileges
8383| [1027042] Microsoft Visio Viewer Memory Corruption Error Lets Remote Users Execute Arbitrary Code
8384| [1027041] Microsoft Office Excel File Memory Corruption Errors and Heap Overflows Let Remote Users Execute Arbitrary Code
8385| [1027040] Microsoft Silverlight Double Free Memory Error Lets Remote Users Execute Arbitrary Code
8386| [1027038] Microsoft GDI+ Bugs Let Remote Users Execute Arbitrary Code
8387| [1027036] Microsoft .NET Framework Serialization Bugs Let Remote Users Execute Arbitrary Code
8388| [1027035] Microsoft Word RTF Processing Flaw Lets Remote Users Execute Arbitrary Code
8389| [1026911] Microsoft Office WPS File Heap Overflow Lets Remote Users Execute Arbitrary Code
8390| [1026910] Microsoft Works WPS File Heap Overflow Lets Remote Users Execute Arbitrary Code
8391| [1026909] Microsoft Forefront Unified Access Gateway Bugs Let Remote Users Obtain Potentially Sensitive Information and Conduct Browser Redirection Attacks
8392| [1026907] Microsoft .NET Parameter Validation Flaw Lets Remote Users Execute Arbitrary Code
8393| [1026905] Microsoft BizTalk Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
8394| [1026904] Microsoft Visual Basic Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
8395| [1026903] Microsoft Visual FoxPro Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
8396| [1026902] Microsoft Commerce Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
8397| [1026901] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
8398| [1026900] Microsoft Office Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
8399| [1026899] Microsoft SQL Server Windows Common Controls (MSCOMCTL.OCX) Bug Lets Remote Users Execute Arbitrary Code
8400| [1026794] Microsoft DirectWrite Unicode Character Processing Flaw Lets Remote Users Deny Service
8401| [1026792] Microsoft Visual Studio Lets Local Users Gain Elevated Privileges
8402| [1026791] Microsoft Expression Design DLL Loading Error Lets Remote Users Execute Arbitrary Code
8403| [1026789] Microsoft DNS Server Lets Remote Users Deny Service
8404| [1026686] Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting Attacks
8405| [1026685] Microsoft Windows Ancillary Function Driver Lets Local Users Gain Elevated Privileges
8406| [1026684] Microsoft Visio Viewer Multiple Bugs Let Remote Users Execute Arbitrary Code
8407| [1026681] Microsoft Silverlight Bugs Let Remote Users Execute Arbitrary Code
8408| [1026680] Microsoft .NET Bugs Let Remote Users Execute Arbitrary Code
8409| [1026677] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information
8410| [1026499] Microsoft Anti-Cross Site Scripting Library Flaw May Permit Cross-Site Scripting Attacks
8411| [1026497] Microsoft Windows ClickOnce Feature Lets Remote Users Execute Arbitrary Code
8412| [1026479] Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users
8413| [1026469] Microsoft ASP.NET Hash Table Collision Bug Lets Remote Users Deny Service
8414| [1026416] Microsoft Office IME (Chinese) Lets Local Users Gain Elevated Privileges
8415| [1026414] Microsoft Publisher Multiple Errors Let Remote Users Execute Arbitrary Code
8416| [1026413] Microsoft Internet Explorer DLL Loading Error Lets Remote Users Execute Arbitrary Code and HTML Processing Bugs Let Remote Users Obtain Information
8417| [1026412] Microsoft Active Directory Memory Access Error Lets Remote Authenticated Users Execute Arbitrary Code
8418| [1026411] Microsoft PowerPoint DLL Loading and OfficeArt Object Processing Flaws Let Remote Users Execute Arbitrary Code
8419| [1026410] Microsoft Office Excel File Memory Error Lets Remote Users Execute Arbitrary Code
8420| [1026409] Microsoft Office Use-After-Free Bug Lets Remote Users Execute Arbitrary Code
8421| [1026408] Microsoft Internet Explorer Error in Microsoft Time Component Lets Remote Users Execute Arbitrary Code
8422| [1026294] Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication
8423| [1026271] Microsoft Windows TrueType Font Parsing Flaw Lets Remote Users Execute Arbitrary Code
8424| [1026220] Microsoft Publisher 'Pubconv.dll' Memory Corruption Error Lets Remote Users Execute Arbitrary Code
8425| [1026169] Microsoft Forefront Unified Access Gateway Input Validation Flaws Permits Cross-Site Scripting, HTTP Response Splitting, and Denial of Service Attacks
8426| [1026168] Microsoft Host Integration Server Bugs Let Remote Users Deny Service
8427| [1026167] Microsoft Windows Ancillary Function Driver Lets Local Users Gain Elevated Privileges
8428| [1026164] Microsoft Active Accessibility Component DLL Loading Error Lets Remote Users Execute Arbitrary Code
8429| [1026162] Microsoft .NET Inheritance Restriction Error Lets Remote Users Execute Arbitrary Code
8430| [1026161] Microsoft Silverlight Inheritance Restriction Error Lets Remote Users Execute Arbitrary Code
8431| [1026160] Microsoft Internet Explorer Multiple Flaws Let Remote Users Execute Arbitrary Code
8432| [1026103] Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions
8433| [1026041] Microsoft Windows Components DLL Loading Error Lets Remote Users Execute Arbitrary Code
8434| [1026040] Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting and Information Disclosure Attacks
8435| [1026039] Microsoft Office DLL Loading Error and Unspecified Bug Lets Remote Users Execute Arbitrary Code
8436| [1026038] Microsoft Excel Multiple Bugs Let Remote Users Execute Arbitrary Code
8437| [1026037] Microsoft Windows Internet Name Service (WINS) Input Validation Flaw in ECommEndDlg() Lets Local Users Gain Elevated Privileges
8438| [1025937] Microsoft Windows DHCPv6 Processing Flaw Lets Remote Denial of Service to RPC Services
8439| [1025905] Microsoft .NET Socket Trust Validation Error Lets Remote Users Obtain Information and Redirect Certain Network Traffic
8440| [1025903] Microsoft Visual Studio Input Validation Hole Permits Cross-Site Scripting Attacks
8441| [1025902] Microsoft ASP.NET Chart Control Remote File Disclosure
8442| [1025896] Microsoft Visio Memory Corruption Errors Let Remote Users Execute Arbitrary Code
8443| [1025895] Microsoft Data Access Components Insecure Library Loading Lets Remote Users Execute Arbitrary Code
8444| [1025894] Microsoft DNS Server Flaws Let Remote Users Execute Arbitrary Code and Deny Service
8445| [1025893] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information
8446| [1025847] Microsoft Internet Explorer Flaw in Processing EUC-JP Encoded Characters Lets Remote Users Conduct Cross-Site Scripting Attacks
8447| [1025763] Microsoft Visio May Load DLLs Unsafely and Remotely Execute Arbitrary Code
8448| [1025760] Microsoft Windows Bluetooth Stack Memory Access Error Lets Remote Users Execute Arbitrary Code
8449| [1025675] Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code
8450| [1025655] Microsoft MHTML Input Validation Hole Permits Cross-Site Scripting Attacks
8451| [1025654] Microsoft Internet Explorer Vector Markup Language (VML) Object Access Error Lets Remote Users Execute Arbitrary Code
8452| [1025653] Microsoft Active Directory Input Validation Flaw in Certificate Services Web Enrollment Permits Cross-Site Scripting Attacks
8453| [1025649] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information
8454| [1025648] Microsoft SQL Server XML Editor External Entity Resolution Flaw Lets Remote Users Obtain Potentially Sensitive Information
8455| [1025647] Microsoft Visual Studio XML Editor External Entity Resolution Flaw Lets Remote Users Obtain Potentially Sensitive Information
8456| [1025646] Microsoft Office InfoPath XML Editor External Entity Resolution Flaw Lets Remote Users Obtain Potentially Sensitive Information
8457| [1025644] Microsoft Hyper-V VMBus Packet Validation Flaw Lets Local Users Deny Service
8458| [1025643] Microsoft Windows Ancillary Function Driver Lets Local Users Gain Elevated Privileges
8459| [1025642] Microsoft Excel Multiple Bugs Let Remote Users Execute Arbitrary Code
8460| [1025641] Microsoft .NET JIT Compiler Validation Flaw Lets Remote Users Execute Arbitrary Code
8461| [1025639] Microsoft Distributed File System Bugs Let Remote Users Deny Service and Execute Arbitrary Code
8462| [1025637] Microsoft Forefront Threat Management Gateway Bounds Validation Flaw in Winsock Provider Lets Remote Users Execute Arbitrary Code
8463| [1025636] Microsoft .NET Array Offset Error Lets Remote Users Execute Code
8464| [1025635] Microsoft Silverlight Array Offset Error Lets Remote Users Execute Arbitrary Code
8465| [1025634] Microsoft Windows OLE Automation Underflow Lets Remote Users Execute Arbitrary Code
8466| [1025513] Microsoft PowerPoint Memory Corruption Errors Let Remote Users Execute Arbitrary Code
8467| [1025512] Microsoft Windows Internet Name Service Socket Send Exception Handling Bug Lets Remote Users Execute Arbitrary Code
8468| [1025360] Microsoft Reader Memory Corruption Errors Let Remote Users Execute Arbitrary Code
8469| [1025359] Microsoft MHTML Stack Overflow Lets Remote Users Execute Arbitrary Code
8470| [1025347] Microsoft Fax Cover Page Editor Memory Corruption Error Lets Remote Users Execute Arbitrary Code
8471| [1025346] Microsoft Foundation Classes May Load DLLs Unsafely and Remotely Execute Arbitrary Code
8472| [1025344] Microsoft WordPad Parsing Error Lets Remote Users Execute Arbitrary Code
8473| [1025343] Microsoft Office DLL Loading and Graphic Object Processing Flaws Let Remote Users Execute Arbitrary Code
8474| [1025340] Microsoft PowerPoint Bugs Let Remote Users Execute Arbitrary Code
8475| [1025337] Microsoft Excel Multiple Bugs Let Remote Users Execute Arbitrary Code
8476| [1025335] Microsoft GDI+ EMF Image Integer Overflow Lets Remote Users Execute Arbitrary Code
8477| [1025334] Microsoft OpenType Compact Font Format (CFF) Driver Stack Overflow Lets Remote Users Execute Arbitrary Code
8478| [1025333] Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code
8479| [1025331] Microsoft .NET Stack Corruption Error in JIT Compiler Lets Remote Users Execute Arbitrary Code
8480| [1025330] Microsoft WMITools and Windows Messenger ActiveX Controls Let Remote Users Execute Arbitrary Code
8481| [1025327] Microsoft Internet Explorer Bugs Let Remote Users Obtain Potentially Sensitive Information, Execute Arbitrary Code, and Hijack User Clicks
8482| [1025312] Microsoft Windows Kernel Bug in AFD.sys Lets Local Users Deny Service
8483| [1025248] Microsoft Windows Includes Some Invalid Comodo Certificates
8484| [1025171] Microsoft Groove DLL Loading Error Lets Remote Users Execute Arbitrary Code
8485| [1025170] Microsoft DirectShow DLL Loading Error Lets Remote Users Execute Arbitrary Code
8486| [1025164] Microsoft Internet Explorer Lets Remote Users Spoof the Address Bar
8487| [1025117] Microsoft Malware Protection Engine Registry Processing Error Lets Local Users Gain Elevated Privileges
8488| [1025086] Microsoft Active Directory Heap Overflow in Processing BROWSER ELECTION Packets May Let Remote Users Execute Arbitrary Code
8489| [1025049] Microsoft Local Security Authority Subsystem Service (LSASS) Lets Local Users Gain Elevated Privileges
8490| [1025044] Microsoft JScript and VBScript Disclose Information to Remote Users
8491| [1025043] Microsoft Visio Memory Corruption Error in Processing Visio Files Lets Remote Users Execute Arbitrary Code
8492| [1025042] Microsoft Active Directory SPN Collosions May Let Remote Authenticated Users Deny Service
8493| [1025038] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
8494| [1025003] Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks
8495| [1024947] Microsoft Data Access Components (MDAC) Memory Corruption Errors in Processing DSN Data and ADO Records Let Remote Users Execute Arbitrary Code
8496| [1024940] Microsoft Internet Explorer Use-After-Free in 'mshtml.dll' May Let Remote Users Execute Arbitrary Code
8497| [1024925] Microsoft Fax Cover Page Editor Memory Corruption Error Lets Remote Users Execute Arbitrary Code
8498| [1024922] Microsoft Internet Explorer Recursive CSS Import Memory Corruption Error Lets Remote Users Execute Arbitrary Code
8499| [1024888] Microsoft Exchange Server RPC Processing Flaw Lets Remote Authenticated Users Deny Service
8500| [1024887] Microsoft Office Graphics Filters Let Remote Users Execute Arbitrary Code
8501| [1024886] Microsoft SharePoint Input Validation Flaw in Processing SOAP Requests Let Remote Users Execute Arbitrary Code
8502| [1024885] Microsoft Publisher Bugs Let Remote Users Execute Arbitrary Code
8503| [1024884] Microsoft Hyper-V Input Validation Flaw Lets Local Guest Operating System Users Deny Service
8504| [1024879] Microsoft Windows Internet Connection Signup Wizard May Load DLLs Unsafely and Remotely Execute Arbitrary Code
8505| [1024877] Microsoft Windows May Load DLLs Unsafely and Remotely Execute Arbitrary Code
8506| [1024874] Microsoft Windows Task Scheduler Lets Local Users Gain Elevated Privileges
8507| [1024872] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Domain Attacks
8508| [1024790] Microsoft Outlook Attachment Processing Flaw Lets Remote Users Deny Service
8509| [1024707] Microsoft Forefront Unified Access Gateway Input Validation Flaws Permit Cross-Site Scripting and URL Redirection Attacks
8510| [1024706] Microsoft PowerPoint Bugs Let Remote Users Execute Arbitrary Code
8511| [1024705] Microsoft Office Flaws Let Remote Users Execute Arbitrary Code
8512| [1024676] Microsoft Internet Explorer Freed Object Invalid Flag Reference Access Lets Remote Users Execute Arbitrary Code
8513| [1024630] Microsoft Internet Explorer 'window.onerror' Callback Lets Remote Users Obtain Information From Other Domains
8514| [1024559] Microsoft SharePoint Input Validation Hole in SafeHTML Permits Cross-Site Scripting Attacks
8515| [1024558] Microsoft Cluster Service Disk Permission Flaw Lets Local Users Gain Elevated Privileges
8516| [1024557] Microsoft Foundation Classes Library Buffer Overflow in Window Title Lets Remote Users Execute Arbitrary Code
8517| [1024552] Microsoft Office Excel Has Multiple Flaws That Let Remote Users Execute Arbitrary Code
8518| [1024551] Microsoft Office Word Processing Flaws Let Remote Users Execute Arbitrary Code
8519| [1024546] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code, Obtain Information, and Conduct Cross-Site Scripting Attacks
8520| [1024543] Microsoft .NET Framework JIT Compiler Memory Access Error Lets Remote Users Execute Arbitrary Code
8521| [1024459] Microsoft ASP.NET Padding Oracle Attack Lets Remote Users Decrypt Data
8522| [1024445] Microsoft Outlook Web Access Authentication Flaw Lets Remote Users Hijack User Sessions
8523| [1024443] Microsoft Local Security Authority Subsystem Service (LSASS) Heap Overflow Lets Remote Authenticated Users Execute Arbitrary Code
8524| [1024442] Microsoft WordPad Parsing Error in Text Converters Lets Remote Users Execute Arbitrary Code
8525| [1024441] Microsoft Windows RPC Memory Allocation Error Lets Remote Users Execute Arbitrary Code
8526| [1024440] Microsoft Internet Information Services Bugs Let Remote Users Bypass Authentication, Deny Service, and Execute Arbitrary Code
8527| [1024439] Microsoft Outlook Heap Overflow Lets Remote Users Execute Arbitrary Code
8528| [1024438] Microsoft Office Unicode Font Parsing in USP10.DLL Lets Remote Users Execute Arbitrary Code
8529| [1024312] Microsoft Windows Tracing Feature for Services Lets Local Users Gain Elevated Privileges
8530| [1024310] Microsoft Office Excel Flaw Lets Remote Users Execute Arbitrary Code
8531| [1024306] Microsoft Silverlight Memory Corruption Errors Let Remote Users Execute Arbitrary Code
8532| [1024305] Microsoft .NET Framework Virtual Method Delegate Processing Error Lets Remote Users Execute Arbitrary Code
8533| [1024304] Microsoft Cinepak Codec Memory Pointer Error Lets Remote Users Execute Arbitary Code
8534| [1024303] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Domain Attacks
8535| [1024302] Microsoft MPEG Layer-3 Codecs Stack Overflow Lets Remote Users Execute Arbitary Code
8536| [1024301] Microsoft XML Core Services (MSXML) HTTP Response Processing Flaw Lets Remote Users Execute Arbitrary Code
8537| [1024298] Microsoft Office Word RTF, Word, and HTML Processing Errors Let Remote Users Execute Arbitrary Code
8538| [1024216] Microsoft Windows Shell LNK Shortcut Processing Flaw Lets Users Execute Arbitrary Code
8539| [1024189] Microsoft Office Outlook Validation Error in Processing Attachments Lets Remote Users Execute Arbitrary Code
8540| [1024188] Microsoft Office Access ActiveX Controls Let Remote Users Execute Arbitrary Code
8541| [1024084] Microsoft Help and Support Center URL Escaping Flaw Lets Remote Users Execute Arbitrary Commands
8542| [1024080] Microsoft .NET XML Digital Signature Flaw May Let Remote Users Bypass Authentication
8543| [1024079] Microsoft Internet Information Services Memory Allocation Error Lets Remote Authenticated Users Execute Arbitrary Code
8544| [1024078] Microsoft SharePoint Input Validation Flaw in toStaticHTML API Permits Cross-Site Scripting Attacks
8545| [1024077] Microsoft SharePoint Help Page Processing Bug Lets Remote Users Deny Service
8546| [1024076] Microsoft Office Excel Has Multiple Flaws That Let Remote Users Execute Arbitrary Code
8547| [1024075] Microsoft Office Open XML File Format Converter for Mac Lets Local Users Gain Elevated Privileges
8548| [1024073] Microsoft Office COM Object Instantiation Error Lets Remote Users Execute Arbitrary Code
8549| [1024070] Microsoft Internet Explorer 8 Developer Tools ActiveX Control Memory Corruption Error Lets Remote Users Execute Arbitrary Code
8550| [1024068] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks
8551| [1023975] Microsoft Office Memory Corruption Error in VBE6.DLL Lets Remote Users Execute Arbitrary Code
8552| [1023974] Microsoft Visual Basic for Applications Memory Corruption Error in VBE6.DLL Lets Remote Users Execute Arbitrary Code
8553| [1023972] Microsoft Outlook Express Integer Overflow in Processing POP3/IMAP Responses Lets Remote Users Execute Arbitrary Code
8554| [1023938] Microsoft Office Visio Buffer Overflow in Processing DXF Files Lets Remote Users Execute Arbitrary Code
8555| [1023932] Microsoft Office SharePoint Input Validation Flaw in 'help.aspx' Permits Cross-Site Scripting Attacks
8556| [1023856] Microsoft Visio Index Calculation and Attribute Validation Flaws Let Remote Users Execute Code
8557| [1023855] Microsoft Exchange May Disclose Message Fragments to Remote Users
8558| [1023854] Microsoft Exchange Error in Parsing MX Records Lets Remote Users Deny Service
8559| [1023853] Microsoft Office Publisher TextBox Processing Buffer Overflow Lets Remote Users Execute Arbitrary Code
8560| [1023848] Microsoft MPEG Layer-3 Codecs Stack Overflow Lets Remote Users Execute Arbitary Code
8561| [1023773] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information
8562| [1023720] Microsoft Virtual PC/Server Lets Local Users Gain Elevated Privileges
8563| [1023699] Microsoft Internet Explorer Invalid Pointer Reference Lets Remote Users Execute Arbitrary Code
8564| [1023698] Microsoft Office Excel Bugs Let Remote Users Execute Arbitrary Code
8565| [1023571] Microsoft Windows Protocol Flaw in SSL Renegotiation Lets Remote Users Conduct Man-in-the-Middle Attacks
8566| [1023567] Microsoft Hyper-V Instruction Validation Bug Lets Local Users Deny Service
8567| [1023566] Microsoft Windows Kerberos Ticket-Granting-Ticket Processing Flaw Lets Remote Authenticated Users Deny Service
8568| [1023565] Microsoft Office Buffer Overflow in 'MSO.DLL' Lets Remote Users Execute Arbitrary Code
8569| [1023564] Microsoft Paint Integer Overflow Lets Remote Users Execute Arbitrary Code
8570| [1023563] Microsoft PowerPoint Buffer Overflows and Memory Errors Let Remote Users Execute Arbitrary Code
8571| [1023562] Microsoft DirectShow Heap Overflow Lets Remote Users Execute Arbitrary Code
8572| [1023560] Microsoft Internet Explorer Flaw in Microsoft Data Analyzer ActiveX Control Lets Remote Users Execute Arbitrary Code
8573| [1023542] Microsoft Internet Explorer Discloses Known Files to Remote Users
8574| [1023495] Microsoft Internet Explorer and Windows OS Shell Handler URL Validation Flaw Lets Remote Users Execute Arbitrary Code
8575| [1023494] Microsoft Internet Explorer Cross-Site Scripting Filter Can Be Bypassed
8576| [1023493] Microsoft Internet Explorer Multiple Memory Access Flaws Let Remote Users Execute Arbitrary Code
8577| [1023462] Microsoft Internet Explorer Invalid Pointer Reference Lets Remote Users Execute Arbitrary Code
8578| [1023432] Microsoft Embedded OpenType Font Engine Integer Overflow Lets Remote Users Execute Arbitrary Code
8579| [1023301] Microsoft Internet Explorer Indeo Codec Bugs Let Remote Users Execute Arbitrary Code
8580| [1023297] Microsoft Local Security Authority Subsystem Service Validation Flaw Lets Remote Users Deny Service
8581| [1023296] Microsoft Active Directory Federation Services Lets Remote Authenticated Users Execute Arbitrary Code and Spoof Web Sites
8582| [1023294] Microsoft Office Word and WordPad Text Converter Memory Errors Let Remote Users Execute Arbitrary Code
8583| [1023293] Microsoft Internet Explorer Memory Access Flaws Let Remote Users Execute Arbitrary Code
8584| [1023292] Microsoft Office Publisher Memory Allocation Validation Flaw Lets Remote Users Execute Arbitrary Code
8585| [1023291] Microsoft Internet Authentication Service Bugs Let Remote Authenticated Users Execute Arbitrary Code or Gain Privileges of the Target User
8586| [1023233] Microsoft Internet Explorer Discloses Local Path Names When Printing Local HTML Files to PDF Files
8587| [1023226] Microsoft Internet Explorer Invalid Pointer Reference in getElementsByTagName() Method Lets Remote Users Execute Arbitrary Code
8588| [1023158] Microsoft Word Memory Corruption Error Lets Remote Users Execute Arbitrary Code
8589| [1023157] Microsoft Excel Bugs Let Remote Users Execute Arbitrary Code
8590| [1023156] Microsoft Active Directory Stack Memory Consumption Flaw Lets Remote Users Deny Service
8591| [1023154] Microsoft License Logging Service Buffer Overflow Lets Remote Users Execute Arbitrary Code
8592| [1023153] Microsoft Web Services on Devices API (WSDAPI) Validation Error Lets Remote Users Execute Arbitrary Code
8593| [1023013] Microsoft Crypto API NULL Character Flaw in Common Name Field and ASN.1 Integer Overflow Lets Remote Users Spoof Certficiates
8594| [1023011] Microsoft Indexing Service ActiveX Control Lets Remote Users Execute Arbitrary Code
8595| [1023010] Microsoft Local Security Authority Subsystem Service (LSASS) Integer Underflow Lets Local Users Deny Service
8596| [1023009] Microsoft Silverlight Memory Modification Flaw Lets Remote Users Execute Arbitrary Code
8597| [1023008] Microsoft .NET Bugs Let Remote Users Execute Arbitrary Code
8598| [1023006] Microsoft GDI+ Overflows Let Remote Users Execute Arbitrary Code
8599| [1023002] Microsoft Internet Explorer Flaws Let Remote Users Execute Arbitrary Code
8600| [1022846] Microsoft Wireless LAN AutoConfig Service Heap Overflow Lets Remote Wireless Users Execute Arbitrary Code
8601| [1022843] Microsoft DHTML Editing Component ActiveX Control Lets Remote Users Execute Arbitrary Code
8602| [1022842] Microsoft JScript Scripting Engine Memory Corruption Error Lets Remote Users Execute Arbitrary Code
8603| [1022716] Microsoft Telnet NTLM Credential Reflection Flaw Lets Remote Users Gain Access
8604| [1022715] Microsoft ASP.NET Request Scheduling Flaw Lets Remote Users Deny Service
8605| [1022712] Microsoft Active Template Library (ATL) Bugs Let Remote Users Execute Arbitrary Code
8606| [1022710] Microsoft Windows Internet Name Service (WINS) Buffer Overflows Let Remote Users Execute Arbitrary Code
8607| [1022708] Microsoft Office Web Components Buffer Overflows in ActiveX Control Let Remote Users Execute Arbitrary Code
8608| [1022611] Microsoft Internet Explorer Memory Corruption Bugs Let Remote Users Execute Arbitrary Code
8609| [1022610] Microsoft Visual Studio Active Template Library Bugs Let Remote Users Execute Arbitrary Code
8610| [1022547] Microsoft Internet Security and Acceleration Server OTP Authentication Bug Lets Remote Users Access Resources
8611| [1022546] Microsoft Office Publisher Pointer Dereference Bug Lets Remote Users Execute Arbitrary Code
8612| [1022545] Microsoft DirectX DirectShow Validation Bugs Let Remote Users Execute Arbitrary Code
8613| [1022544] Microsoft Virtual PC/Server Lets Local Users Gain Elevated Privileges Within a Guest Operating System
8614| [1022535] Microsoft Office Web Components Bug in Spreadsheet ActiveX Control Lets Remote Users Execute Arbitrary Code
8615| [1022514] Microsoft DirectShow Buffer Overflow in ActiveX Control Lets Remote Users Execute Arbitrary Code
8616| [1022369] Microsoft PowerPoint Buffer Overflow in Freelance Translator Lets Remote Users Execute Arbitrary Code
8617| [1022358] Microsoft Internet Information Services WebDAV Bug Lets Remote Users Bypass Authentication
8618| [1022356] Microsoft Word Buffer Overflows Let Remote USers Execute Arbitrary Code
8619| [1022355] Microsoft Office Works Document Converter Bug Lets Remote Users Execute Arbitrary Code
8620| [1022354] Microsoft Works Document Converter Bug Lets Remote Users Execute Arbitrary Code
8621| [1022351] Microsoft Excel Bugs Let Remote Users Execute Arbitrary Code
8622| [1022350] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
8623| [1022349] Microsoft Active Directory Bugs Let Remote Users Execute Arbitrary Code or Deny Service
8624| [1022330] Microsoft Windows Bug in SETDESKWALLPAPER and GETDESKWALLPAPER Calls Let Local Users Deny Service
8625| [1022299] Microsoft DirectX Bug in DirectShow QuickTime Parser Lets Remote Users Execute Arbitrary Code
8626| [1022240] Microsoft Internet Information Server WebDAV Input Validation Flaw Lets Remote Users Execute Arbitrary Code
8627| [1022205] Microsoft PowerPoint Has Multiple Buffer Overflows and Memory Corruption Bugs That Let Remote Users Execute Arbitrary Code
8628| [1022047] Microsoft Windows SearchPath Function May Let Remote Users Execute Arbitrary Code
8629| [1022046] Microsoft ISA Server Input Validation Flaw in 'cookieauth.dll' Permits Cross-Site Scripting Attacks
8630| [1022045] Microsoft ISA Server TCP State Error Lets Remote Users Deny Service
8631| [1022044] Microsoft Windows Privilege Separation and Access Control Bugs Let Local Users Gain Elevated Privileges
8632| [1022043] Microsoft WordPad and Office Text Converter Bugs Let Remote Users Execute Arbitrary Code
8633| [1022042] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
8634| [1022040] Microsoft DirectX Bug in Decompressing DirectShow MJPEG Content Lets Remote Users Execute Arbitrary Code
8635| [1022039] Microsoft Excel Malformed Object Memory Corruption Bug Lets Remote Users Execute Arbitrary Code
8636| [1021967] Microsoft Office PowerPoint Invalid Object Access Bug Lets Remote Users Execute Arbitrary Code
8637| [1021880] Microsoft Internet Explorer Unspecified Bug Lets Remote Users Execute Arbitrary Code
8638| [1021831] Microsoft DNS Server Bugs Let Remote Users Spoof the DNS Service
8639| [1021830] Microsoft DNS Server Registration Validation Flaw Lets Remote Users Conduct Spoofing Attacks
8640| [1021829] Microsoft WINS Server Registration Validation Flaw Lets Remote Users Conduct Spoofing Attacks
8641| [1021744] Microsoft Excel Invalid Object Access Flaw Lets Remote Users Execute Arbitrary Code
8642| [1021702] Microsoft Visio Bugs Let Remote Users Execute Arbitrary Code
8643| [1021701] Microsoft Exchange MAPI Command Literal Processing Bug Lets Remote Users Deny Service
8644| [1021700] Microsoft Exchange Memory Corruption Error in Decoding TNEF Data Lets Remote Users Execute Arbitrary Code
8645| [1021699] Microsoft Internet Explorer Bugs in Handling CSS Sheets and Deleted Objects Lets Remote Users Execute Arbitrary Code
8646| [1021629] Microsoft Windows Guidelines for Disabling AutoRun are Ineffective and May Permit Code Execution
8647| [1021490] Microsoft SQL Server Heap Overflow Lets Remote Authenticated Users Execute Arbitrary Code
8648| [1021381] Microsoft Internet Explorer DHTML Data Binding Invalid Pointer Reference Bug Lets Remote Users Execute Arbitrary Code
8649| [1021376] Microsoft WordPad Word 97 Text Converter Memory Corruption Error Lets Remote Users Execute Arbitrary Code
8650| [1021371] Microsoft Internet Explorer HTML Processing Bugs Let Remote Users Execute Arbitrary Code
8651| [1021370] Microsoft Word Memory Corruption Errors Let Remote Users Execute Arbitrary Code
8652| [1021369] Microsoft Visual Basic DataGrid/FlexGrid/Heirarchival FlexGrid/Windows Common/Charts ActiveX Controls Let Remote Users Execute Arbitrary Code
8653| [1021368] Microsoft Excel Formula, Object, and Global Array Bugs Let Remote Users Execute Arbitrary Code
8654| [1021367] Microsoft Office SharePoint Server Access Control Flaw Lets Remote Users Gain Administrative Access
8655| [1021365] Microsoft GDI Buffer Overflows in Processing WMF Files Lets Remote Users Execute Arbitrary Code
8656| [1021363] Microsoft SQL Server Memory Overwrite Bug in sp_replwritetovarbin May Let Remote Users Execute Arbitrary Code
8657| [1021294] Microsoft Office Communicator VoIP Processing Bugs Let Remote Users Deny Service
8658| [1021164] Microsoft XML Core Services (MSXML) Bugs Let Remote Users Obtain Information and Execute Arbitrary Code
8659| [1021053] Microsoft Ancillary Function Driver 'afd.sys' Lets Local Users Gain Elevated Privileges
8660| [1021052] Microsoft Message Queuing (MSMQ) Heap Overflow Lets Remote Users Execute Arbitrary Code
8661| [1021047] Microsoft Internet Explorer Flaws Permit Cross-Domain Scripting Attacks and Let Remote Users Execute Arbitrary Code
8662| [1021045] Microsoft Office CDO Protocol Bug Lets Remote Users Execute Arbitrary Scripting Code
8663| [1021044] Microsoft Excel Object, Calendar, and Formula Bugs Let Remote Users Execute Arbitrary Code
8664| [1021043] Microsoft Host Integration Server RPC Buffer Overflow Lets Remote Users Execute Arbitrary Code
8665| [1021042] Microsoft Active Directory LDAP Memory Allocation Error Lets Remote Users Execute Arbitrary Code
8666| [1021020] Cisco Unity Bug in Microsoft API Lets Remote Users Deny Service
8667| [1021018] Microsoft Digital Image 'PipPPush.DLL' ActiveX Control Lets Remote Users Access Files
8668| [1020838] Microsoft GDI+ Integer Overflow in Processing BMP Files Lets Remote Users Execute Arbitrary Code
8669| [1020837] Microsoft GDI+ Buffer Overflow in Processing WMF Files Lets Remote Users Execute Arbitrary Code
8670| [1020836] Microsoft GDI+ Bug in Processing GIF Image Files Lets Remote Users Execute Arbitrary Code
8671| [1020835] Microsoft GDI+ Memory Corruption Error in Processing EMF Image Files Lets Remote Users Execute Arbitrary Code
8672| [1020834] Microsoft GDI+ Heap Overflow in Processing Gradient Sizes Lets Remote Users Execute Arbitrary Code
8673| [1020833] Microsoft Office OneNote Buffer Overflow Lets Remote Users Execute Arbitrary Code
8674| [1020679] Microsoft Outlook Express MTHML Redirect Bug Lets Remote Users Obtain Information
8675| [1020678] Microsoft Windows IPSec Policy May Not Be Enforced in Certain Cases
8676| [1020677] Microsoft Windows Event System Bugs Let Remote Authenticated Users Execute Arbitrary Code
8677| [1020676] Microsoft PowerPoint Memory Errors Let Remote Users Execute Arbitrary Code
8678| [1020675] Microsoft Color Management Module Heap Overflow Lets Remote Users Execute Arbitrary Code
8679| [1020674] Microsoft Internet Explorer Multiple Bugs Let Remote Users Execute Arbitrary Code
8680| [1020673] Microsoft Office Format Filter Bugs Let Remote Users Execute Arbitrary Code
8681| [1020672] Microsoft Excel Input Validation Bug in Parsing Records Lets Remote Users Execute Arbitrary Code
8682| [1020671] Microsoft Excel Input Validation Bug in Processing Array Index Values Lets Remote Users Execute Arbitrary Code
8683| [1020670] Microsoft Excel Input Validation Bug in Processing Index Values Lets Remote Users Execute Arbitrary Code
8684| [1020669] Microsoft Excel Credential Caching Bug Lets Local Users Gain Access to Remote Data Sources
8685| [1020607] Mac OS X Quick Look Buffer Overflow in Downloading Microsoft Office Files Lets Remote Users Execute Arbitrary Code
8686| [1020447] Microsoft Word Memory Corruption Error Lets Remote Users Execute Arbitrary Code
8687| [1020446] Microsoft Windows AutoRun Bug May Let Users Execute Arbitrary Code
8688| [1020441] Microsoft SQL Server Bugs Let Remote Authenticated Users Obtain Information and Execute Arbitrary Code
8689| [1020439] Microsoft Outlook Web Access for Exchange Server Input Validation Bugs Permit Cross-Site Scripting Attacks
8690| [1020433] Microsoft Access Snapshot Viewer ActiveX Control Lets Remote Users Download Files to Arbitrary Locations
8691| [1020382] Microsoft Internet Explorer Lets Remote Users Conduct Cross-Domain Scripting Attacks
8692| [1020232] Microsoft Speech API Lets Remote Users Execute Arbitrary Commands
8693| [1020229] Microsoft Active Directory LDAP Validation Bug Lets Remote Users Deny Service
8694| [1020228] Microsoft WINS Data Structure Validation Bug Lets Local Users Gain Elevated Privileges
8695| [1020226] Microsoft Internet Explorer HTTP Request Header Bug May Let Remote Users Obtain Information in a Different Domain
8696| [1020225] Microsoft Internet Explorer Bug in Processing Method Calls Lets Remote Users Execute Arbitrary Code
8697| [1020223] Microsoft DirectX SAMI File Validation Bug Lets Remote Users Execute Arbitrary Code
8698| [1020222] Microsoft DirectX MJPEG Stream Error Handling Bug Lets Remote Users Execute Arbitrary Code
8699| [1020016] Microsoft Malware Protection Engine Lets Remote Users Deny Service
8700| [1020015] Microsoft Publisher Bug in Processing Object Header Data Lets Remote Users Execute Arbitrary Code
8701| [1020014] Microsoft Word Memory Error in Processing CSS Values Lets Remote Users Execute Arbitrary Code
8702| [1020013] Microsoft Word Memory Error in Processing RTF Files Lets Remote Users Execute Arbitrary Code
8703| [1020006] Microsoft Windows XP 'i2omgmt.sys' Input Validation Flaw Lets Local Users Gain Elevated Privileges
8704| [1019804] Microsoft Visio Lets Remote Users Execute Arbitrary Code
8705| [1019801] Microsoft Internet Explorer Data Stream Processing Bug Lets Remote Users Execute Arbitrary Code
8706| [1019800] Microsoft Internet Explorer 'hxvz.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code
8707| [1019798] Microsoft GDI Buffer Overflow in Processing EMF and WMF Files Lets Remote Users Execute Arbitrary Code
8708| [1019797] Microsoft Project Memory Error Lets Remote Users Execute Arbitrary Code
8709| [1019738] Microsoft Office S/MIME Processing Lets Remote Users Access Arbitrary URLs
8710| [1019736] Microsoft Outlook S/MIME Processing Lets Remote Users Access Arbitrary URLs
8711| [1019686] Microsoft Jet Database Buffer Overflow in 'msjet40.dll' Lets Remote Users Execute Arbitrary Code via Word Documents
8712| [1019587] Microsoft Excel Input Validation Bug in Processing Conditional Formatting Values Lets Remote Users Execute Arbitrary Code
8713| [1019586] Microsoft Excel Input Validation Bug in Processing Rich Text Data Lets Remote Users Execute Arbitrary Code
8714| [1019585] Microsoft Excel Formula Parsing Error Lets Remote Users Execute Arbitrary Code
8715| [1019584] Microsoft Excel Input Validation Bug in Processing Style Record Data Lets Remote Users Execute Arbitrary Code
8716| [1019583] Microsoft Excel Flaw in Importing '.slk' Files Lets Remote Users Execute Arbitrary Code
8717| [1019582] Microsoft Excel Input Validation Bug in Processing Data Validation Records Lets Remote Users Execute Arbitrary Code
8718| [1019581] Microsoft Office Web Components DataSource Bug Lets Remote Users Execute Arbitrary Code
8719| [1019580] Microsoft Office Web Components URL Parsing Bug Lets Remote Users Execute Arbitrary Code
8720| [1019579] Microsoft Outlook 'mailto:' URL Validation Flaw Lets Remote Users Execute Arbitrary Code
8721| [1019578] Microsoft Office and Excel Memory Corruption Bugs Let Remote Users Execute Arbitrary Code
8722| [1019388] Microsoft Works/Microsoft Office Bug in Processing '.wps' Field Length Values Lets Remote Users Execute Arbitrary Code
8723| [1019387] Microsoft Works/Microsoft Office Bug in Processing '.wps' Header Index Table Lets Remote Users Execute Arbitrary Code
8724| [1019386] Microsoft Works/Microsoft Office Bug in Processing '.wps' File Section Length Headers Lets Remote Users Execute Arbitrary Code
8725| [1019385] Microsoft Internet Information Services Error in Processing ASP Page Input Lets Remote Users Execute Arbitrary Code
8726| [1019384] Microsoft Internet Information Services File Change Notification Bug Lets Local Users Gain Elevated Privileges
8727| [1019381] Microsoft Internet Explorer Argument Validation Flaw in 'dxtmsft.dll' Lets Remote Users Execute Arbitrary Code
8728| [1019380] Microsoft Internet Explorer Property Method Processing Bug Lets Remote Users Execute Arbitrary Code
8729| [1019379] Microsoft Internet Explorer HTML Layout Rendering Bug Lets Remote Users Execute Arbitrary Code
8730| [1019378] Microsoft Internet Explorer Buffer Overflow in Fox Pro ActiveX Control Lets Remote Users Execute Arbitrary Code
8731| [1019377] Microsoft Office Publisher Memory Corruption Bug Lets Remote Users Execute Arbitrary Code
8732| [1019376] Microsoft Office Publisher Invalid Memory Reference Bug Lets Remote Users Execute Arbitrary Code
8733| [1019375] Microsoft Office Object Processing Flaw Lets Remote Users Execute Arbitrary Code
8734| [1019374] Microsoft Word Memory Error Lets Remote Users Execute Arbitrary Code
8735| [1019258] Microsoft Visual Basic '.dsr' File Buffer Overflow Lets Remote Users Execute Arbitrary Code
8736| [1019200] Microsoft Excel File Header Bug Lets Remote Users Execute Arbitrary Code
8737| [1019165] Microsoft Windows LSASS Lets Local Users Gain Elevated Privileges
8738| [1019078] Microsoft Internet Explorer Object Access Bugs Let Remote Users Execute Arbitrary Code
8739| [1019077] Microsoft Message Queuing (MSMQ) Buffer Overflow Lets Remote Users Execute Arbitrary Code
8740| [1019073] Microsoft DirectX Bugs in Parsing SAMI, WAV, and AVI Files Let Remote Users Execute Arbitrary Code
8741| [1019033] Microsoft Web Proxy Auto-Discovery Name Server Resolution Bug Lets Remote Users Conduct Man-in-the-Middle Attacks
8742| [1018976] Microsoft Jet Engine Stack Overflow May Let Remote Users Execute Arbitrary Code
8743| [1018942] Microsoft Windows DNS Service Insufficent Entropy Lets Remote Users Spoof the DNS Service
8744| [1018903] Microsoft DebugView 'Dbgv.sys' Module Lets Local Users Gain Kernel Level Privileges
8745| [1018831] Microsoft Windows ShellExecute() URI Handler Bug Lets Remote Users Execute Arbitrary Commands
8746| [1018790] Microsoft Word Bug in Processing Office Files Lets Remote Users Execute Arbitrary Code
8747| [1018789] Microsoft SharePoint Input Validation Hole Permits Cross-Site Scripting Attacks
8748| [1018788] Microsoft Internet Explorer Bugs Let Remote Users Spoof the Address Bar and Execute Arbitrary Code
8749| [1018786] Microsoft Outlook Express Bug in Processing NNTP Responses Lets Remote Users Execute Arbitrary Code
8750| [1018727] Microsoft Internet Security and Acceleration Server SOCKS4 Proxy Discloses IP Address Information to Remote Users
8751| [1018677] Microsoft Agent ActiveX Control Memory Corruption Error Lets Remote Users Execute Arbitrary Code
8752| [1018676] Microsoft Visual Basic VBP File Buffer Overflow Lets Remote Users Execute Arbitrary Code
8753| [1018568] Microsoft Vector Markup Language Buffer Overflow Lets Remote Users Execute Arbitrary Code
8754| [1018567] Microsoft Virtual PC/Server Heap Overflow Lets Local Users Gain Elevated Privileges
8755| [1018563] Microsoft GDI Buffer Overflow Lets Remote Users Execute Arbitrary Code
8756| [1018562] Microsoft Internet Explorer CSS and ActiveX Control Bugs Let Remote Users Execute Arbitrary Code
8757| [1018561] Microsoft Excel Workspace Index Validation Bug Lets Remote Users Execute Arbitrary Code
8758| [1018560] Microsoft OLE Automation Memory Corruption Bug Lets Remote Users Execute Arbitrary Code
8759| [1018559] Microsoft Core XML Services Memory Corruption Error Lets Remote Users Execute Arbitrary Code
8760| [1018551] Microsoft DirectX Buffer Overflow in FlashPix ActiveX Control Lets Remote Users Execute Arbitrary Code
8761| [1018520] Microsoft Visual Database Tools Buffer Overflow in ActiveX Control Lets Remote Users Execute Arbitrary Code
8762| [1018420] Microsoft DirectX Heap Overflow in Processing RLE-Compressed Targa Images Lets Remote Users Execute Arbitrary Code
8763| [1018353] Microsoft Office Publisher Lets Remote Users Execute Arbitrary Code
8764| [1018352] Microsoft Excel Caculation Error and Memory Corruption Error Lets Remote Users Execute Arbitrary Code
8765| [1018351] Microsoft Internet Explorer Bug in Firefox URL Protocol Handler Lets Remote Users Execute Arbitrary Commands
8766| [1018321] Microsoft Excel Sheet Name Buffer Overflow Lets Remote Users Execute Arbitrary Code
8767| [1018251] Microsoft Office Buffer Overflow in MSODataSourceControl ActiveX Control May Let Remote Users Execute Arbitrary Code
8768| [1018235] Microsoft Internet Explorer Bugs Let Remote Users Execute Arbitrary Code
8769| [1018202] Microsoft GDI+ ICO File Divide By Zero Bug Lets Remote Users Deny Service
8770| [1018193] Microsoft Internet Explorer Lets Remote Users Spoof Certain Objects
8771| [1018192] Microsoft Internet Explorer Input Validation Hole Permits Cross-Site Scripting Attacks
8772| [1018107] Microsoft Office Buffer Overflow in OUACTRL.OCX ActiveX Control Lets Remote Users Execute Arbitrary Code
8773| [1018019] Microsoft Internet Explorer Bugs Let Remote Users Modify Files or Execute Arbitrary Code
8774| [1018017] Microsoft CAPICOM 'CAPICOM.Certificates' ActiveX Control Lets Remote Users Execute Arbitrary Code
8775| [1018016] Microsoft BizTalk Server 'CAPICOM.Certificates' ActiveX Control Lets Remote Users Execute Arbitrary Code
8776| [1018015] Microsoft Exchange Base64, iCal, IMAP, and Attachment Processing Bugs Let Remote Users Deny Service or Execute Arbitrary Code
8777| [1018014] Microsoft Office Drawing Object Validation Flaw Lets Remote Users Execute Arbitrary Code
8778| [1018013] Microsoft Word Array and RTF Processing Bugs Let Remote Users Execute Arbitrary Code
8779| [1018012] Microsoft Excel Specially Crafted BIFF Records, Set Font Values, and Filter Records Permit Remote Code Execution
8780| [1017969] Microsoft Internet Explorer Digest Authentication Bug Lets Remote Users Conduct HTTP Request Splitting Attacks
8781| [1017910] Microsoft Windows DNS Service RPC Stack Overflow Lets Remote Users Execute Arbitrary Code
8782| [1017902] Microsoft Word Lets Remote Users Cause Arbitrary Code to Be Executed
8783| [1017901] Microsoft Windows Help File Heap Overflow Lets Remote Users Execute Arbitrary Code
8784| [1017896] Microsoft Agent URL Parsing Bug Lets Remote Users Execute Arbitrary Code
8785| [1017894] Microsoft Content Management Server Permits Cross-Site Scripting Attacks and Lets Remote Users Execute Arbitrary Code
8786| [1017827] Microsoft Windows Animated Cursor Bug Lets Remote Users Execute Arbitrary Code
8787| [1017752] Adobe JRun IIS Connector Bug Lets Remote Users Deny Service
8788| [1017736] Microsoft Windows Explorer OLE Parsing Bug Lets Users Deny Service
8789| [1017694] VeriSign Secure Messaging for Microsoft Exchange Stack Overflow in ConfigChk ActiveX Control Lets Remote Users Execute Arbitrary Code
8790| [1017653] Microsoft Word Unspecified Vulnerability Lets Remote Users Execute Arbitrary Code
8791| [1017643] Microsoft Internet Explorer Multiple COM Objects Let Remote Users Execute Arbitrary Code
8792| [1017642] Microsoft Internet Explorer FTP Server Response Memory Corruption Error Lets Remote Users Execute Arbitrary Code
8793| [1017641] Microsoft Windows RichEdit OLE Memory Corruption Error Lets Remote Users Execute Arbitrary Code
8794| [1017640] Microsoft Office OLE Memory Corruption Error Lets Remote Users Execute Arbitrary Code
8795| [1017639] Microsoft Word Macro Security Warning Bug and Drawing Object Memory Corrupution Error Lets Remote Users Execute Arbitrary Code
8796| [1017638] Microsoft MFC Memory Corruption Error Lets Remote Users Execute Arbitrary Code
8797| [1017637] Microsoft OLE Dialog RTF File Memory Corruption Error Lets Remote Users Execute Arbitrary Code
8798| [1017636] Microsoft Windows Defender Integer Overflow in Parsing PDF Files Lets Remote Users Execute Arbitrary Code
8799| [1017635] Microsoft HTML Help ActiveX Control Lets Remote Users Execute Arbitrary Code
8800| [1017632] Microsoft Step-by-Step Interactive Training Buffer Overflow in Processing Bookmark Links Lets Remote Users Execute Arbitrary Code
8801| [1017584] Microsoft Office Excel Buffer Overflow Lets Remote Users Execute Arbitrary Code
8802| [1017579] [Duplicate Entry] Microsoft Word Unspecified Vulnerability Lets Remote Users Execute Arbitrary Code
8803| [1017564] Microsoft Word Function Processing Bug Lets Remote Users Execute Arbitrary Code
8804| [1017530] Microsoft Help Workshop Buffer Overflow in Processing '.CNT' Files Lets Remote Users Execute Arbitrary Code
8805| [1017488] Microsoft Outlook '.iCal', '.oss', and SMTP Header Bugs Let Remote Users Execute Arbitrary Code or Deny Service
8806| [1017487] Microsoft Excel Buffer Overflows in Processing Various Records and Strings Lets Remote Users Execute Arbitrary Code
8807| [1017486] Microsoft Office Brazilian Portuguese Grammar Checker Lets Remote Users Execute Arbitrary Code
8808| [1017485] Microsoft Excel Memory Access Error Lets Remote Users Execute Arbitrary Code
8809| [1017441] Microsoft Windows Workstation Service Memory Allocation Error in NetrWkstaUserEnum() Lets Remote Users Deny Service
8810| [1017397] Microsoft Outlook Recipient ActiveX Control Lets Remote Users Deny Service
8811| [1017390] Microsoft Word Unchecked Count Vulnerability Lets Remote Users Execute Arbitrary Code
8812| [1017388] Microsoft Project Discloses Database Password to Remote Authenticated Users
8813| [1017374] Microsoft Internet Explorer May Disclose Contents of the Temporary Internet Files Folder to Remote Users
8814| [1017373] Microsoft Internet Explorer DHTML and Script Error Handling Bugs Let Remote Users Execute Arbitrary Code
8815| [1017369] Microsoft Outlook Express Buffer Overflow in Processing Windows Address Book Files Let Remote Users Execute Arbitrary Code
8816| [1017358] Microsoft Word Data Structure Processing Bug Lets Remote Users Cause Arbitrary Code to Be Executed
8817| [1017339] Microsoft Word String Processing Bug Lets Remote Users Execute Arbitrary Code
8818| [1017224] Microsoft Client Service for Netware Buffer Overflows Let Remote Users Execute Arbitrary Code and Crash the System
8819| [1017223] Microsoft Internet Explorer Bug in Rending HTML Layout Combinations May Let Remote Users Execute Arbitrary Code
8820| [1017222] Microsoft Agent '.ACF' File Memory Corruption Error Lets Remote Users Execute Arbitrary Code
8821| [1017168] Microsoft Windows Kernel GDI Data Structure Processing Bug Lets Local Users Gain Elevated Privileges
8822| [1017165] Microsoft Internet Explorer 'ieframe.dll' Lets Remote Users Spoof Invalid Certificates
8823| [1017157] Microsoft XML Core Services ActiveX Control Lets Remote Users Execute Arbitrary Code
8824| [1017142] Microsoft Visual Studio WMI Object Broker ActiveX Control Lets Remote Users Execute Arbitrary Code
8825| [1017133] Microsoft NAT Helper 'ipnathlp.dll' Lets Remote Users Deny Service
8826| [1017127] Microsoft Data Access Components 'ADODB.Connection' Execute Function Lets Remote Users Execute Arbitrary Code
8827| [1017122] Microsoft Internet Explorer Lets Remote Users Partially Spoof Address Bar URLs
8828| [1017059] Microsoft PowerPoint Bug Causes PowerPoint to Crash
8829| [1017034] Microsoft Office String, Chart Record, and SmartTag Validation Errors Let Remote Users Execute Arbitrary Code
8830| [1017033] Microsoft XML Core Services Lets Remote Users Execute Arbitrary Code or Obtain Information
8831| [1017032] Microsoft Word String and Mail Merge Record Validation Flaws Let Remote Users Execute Arbitrary Code
8832| [1017031] Microsoft Excel DATETIME/COLINFO Record Errors and Lotus 1-2-3 Errors Let Remote Users Execute Arbitrary Code
8833| [1017030] Microsoft PowerPoint Errors in Parsing Object Pointers and Data Records Lets Remote Users Execute Arbitrary Code
8834| [1016941] Microsoft Windows Shell Integer Overflow Lets Remote Users Execute Arbitrary Code
8835| [1016937] Microsoft PowerPoint Memory Corruption Bug Lets Remote Users Execute Arbitrary Code
8836| [1016886] [Duplicate] Microsoft PowerPoint Bug Lets Remote Users Execute Arbitrary Code
8837| [1016879] Microsoft Internet Explorer VML Buffer Overflow Lets Remote Users Execute Arbitrary Code
8838| [1016854] Microsoft Internet Explorer Buffer Overflow in 'daxctle.ocx' ActiveX in KeyFrame Method Control Lets Remote Users Execute Arbitrary Code
8839| [1016839] Microsoft Internet Explorer URLMON.DLL Buffer Overflow Lets Remote Users Execute Arbitrary Code
8840| [1016827] Microsoft PGM Implementation Buffer Overflow in MSMQ Service Lets Remote Users Execute Arbitrary Code
8841| [1016825] Microsoft Publisher Buffer Overflow in Parsing '.pub' Files Lets Remote Users Execute Arbitrary Code
8842| [1016787] Microsoft Word Record Validation Vulnerability Lets Remote Users Execute Arbitrary Code
8843| [1016764] Microsoft Internet Explorer (IE) Buffer Overflow in 'daxctle.ocx' ActiveX Control Lets Remote Users Execute Arbitrary Code
8844| [1016731] Microsoft Internet Explorer URL Buffer Overflow in Processing HTTP 1.1 Protocol with Compression Lets Remote Users Execute Arbitrary Code
8845| [1016720] [Duplicate Entry] Microsoft PowerPoint Unknown Bug May Let Remote Users Execute Arbitrary Code
8846| [1016663] Microsoft Internet Explorer Bugs Let Remote Users Obtain Information or Execute Arbitrary Code
8847| [1016657] Microsoft Office Buffer Overflow in Processing PowerPoint Records Lets Remote Users Execute Arbitrary Code
8848| [1016656] Microsoft Visual Basic for Applications Buffer Overflow Lets Remote Users Execute Arbitrary Code
8849| [1016655] Microsoft Management Console Input Validation Hole Permits Remote Code Execution
8850| [1016654] Microsoft Outlook Express MHTML Parsing Error Lets Remote Users Execute Arbitrary Code
8851| [1016506] Microsoft Internet Security and Acceleration Server HTTP File Exentsion Filter Can Be Bypassed By Remote Users
8852| [1016504] Microsoft Works Buffer Overflow in Processing Spreadsheet Files May Let Remote Users Execute Arbitrary Code
8853| [1016496] Microsoft PowerPoint 'mso.dll' Buffer Overflow May Let Remote Users Execute Arbitrary Code
8854| [1016472] Microsoft Excel Errors in Processing Various Malformed Records Let Remote Users Execute Arbitrary Code
8855| [1016470] Microsoft Office PNG and GIF File Buffer Error Lets Remote Users Execute Arbitrary Code
8856| [1016469] Microsoft Office String Parsing and Property Bugs Let Remote Users Execute Arbitrary Code
8857| [1016468] Microsoft DHCP Client Buffer Overflow Lets Remote Users Execute Arbitrary Code
8858| [1016453] Microsoft Office LsCreateLine() Function May Let Remote Users Execute Arbitrary Code
8859| [1016434] Microsoft HTML Help Heap Overflow in HHCtrl ActiveX Control May Let Remote Users Execute Arbitrary Code
8860| [1016430] Microsoft Excel STYLE Record Bug May Let Remote Users Execute Arbitrary Code
8861| [1016388] Microsoft Windows Explorer Lets Remote Users Access Information in Other Domains and Execute HTA Applications
8862| [1016344] Microsoft Excel 'Shockwave Flash Object' Lets Remote Users Execute Code Automatically
8863| [1016339] Microsoft Windows 'hlink.dll' Buffer Overflow in Processing Hyperlinks Lets Remote Users Execute Arbitrary Code
8864| [1016316] Microsoft Excel Memory Validation Flaw May Let Remote Users Cause Arbitrary Code to Be Executed
8865| [1016292] Microsoft Windows Buffer Overflow in AOL ART Image Rendering Library Lets Remote Users Execute Arbitrary Code
8866| [1016291] Microsoft Internet Explorer Multiple Memory and Access Control Errors Let Remote Users Execute Arbitrary Code
8867| [1016290] Microsoft Windows Buffer Overflow in TCP/IP Stack Lets Remote Users Execute Arbitrary Code
8868| [1016289] Microsoft RPC Mutual Authentication Bug Lets Remote Users Spoof Other Systems
8869| [1016287] Microsoft PowerPoint Buffer Overflow in Processing Malformed Records Lets Remote Users Execute Arbitrary Code
8870| [1016286] Microsoft Windows 98 Graphics Rendering Engine Buffer Overflow in Processing WMF Images Lets Remote Users Execute Arbitrary Code
8871| [1016283] Microsoft JScript Memory Corruption Bug Lets Remote Users Execute Arbitrary Code
8872| [1016280] Microsoft Outlook Web Access Input Validation Hole Permits Cross-Site Scripting Attacks
8873| [1016196] F-Secure Anti-Virus for Microsoft Exchange Buffer Overflow in Web Console May Let Remote Users Execute Arbitrary Code
8874| [1016130] Microsoft Word Lets Remote Users Cause Arbitrary Code to Be Executed
8875| [1016048] Microsoft Exchange Error in Processing iCAL/vCAL Properties Lets Remote Users Execute Arbitrary Code
8876| [1016047] Microsoft Distributed Transaction Coordinator Bugs Let Remote Users Deny Service
8877| [1016005] Microsoft Outlook Express 'mhtml:' Redirect URL Processing Lets Remote Users Bypass Security Domains
8878| [1016001] Microsoft Internet Explorer Bug in Processing Nested OBJECT Tags Lets Remote Users Execute Arbitrary Code
8879| [1015900] Microsoft Internet Explorer Parsing and State Errors Let Remote Users Execute Arbitrary Code
8880| [1015899] Microsoft Internet Explorer Lets Remote Users Spoof the Address Bar URL
8881| [1015898] Microsoft Outlook Express Buffer Overflow in Processing Windows Address Books Lets Remote Users Execute Arbitrary Code
8882| [1015897] Microsoft Windows Explorer COM Object Bug Lets Remote Users Execute Arbitrary Code
8883| [1015896] Microsoft FrontPage Server Extensions Input Validation Holes Permit Cross-Site Scripting Attacks
8884| [1015895] Microsoft SharePoint Team Services Input Validation Holes Permit Cross-Site Scripting Attacks
8885| [1015894] Microsoft Data Access Components RDS.Dataspace Access Control Bug Lets Remote Users Execute Arbitrary Code
8886| [1015892] Microsoft Internet Explorer Popup Window Object Bugs Let Remote Users Execute Scripting Code in Arbitrary Domains
8887| [1015855] Microsoft Office Array Index Boundary Error Lets Remote Users Execute Arbitrary Code
8888| [1015825] Microsoft ASP.NET Incorrect COM Component Reference Lets Remote Users Deny Service
8889| [1015812] Microsoft Internet Explorer createTextRange() Memory Error Lets Remote Users Execute Arbitrary Code
8890| [1015800] (Vendor Issues Fix) Microsoft Internet Explorer (IE) Lets Remote Users Cause HTA Files to Be Executed
8891| [1015794] (Vendor Issues Fix) Microsoft Internet Explorer 'mshtml.dll' Bug in Processing Multiple Action Handlers Lets Remote Users Deny Service
8892| [1015766] Microsoft Office and Excel Buffer Overflows Let Remote Users Execute Arbitrary Code
8893| [1015765] Microsoft Windows Services Have Unsafe Default ACLs That Let Remote Authenticated Users Gain Elevated Privileges
8894| [1015720] Microsoft Internet Explorer Modal Security Dialog Race Condition May Let Remote Users Install Code or Obtain Information
8895| [1015632] Microsoft PowerPoint May Let Users Access Contents of the Temporary Internet Files Folder
8896| [1015631] Microsoft Office Korean Input Method Editor Lets Local Users Gain Elevated Privileges
8897| [1015630] Microsoft Windows Web Client Buffer Overflow Lets Remote Authenticated Users Execute Arbitrary Code
8898| [1015629] Microsoft Windows IGMP Processing Bug Lets Remote Users Deny Service
8899| [1015595] Microsoft Windows UPnP/NetBT/SCardSvr/SSDP Services May Be Incorrectly Configured By 3rd Party Applications, Allowing Local Users to Gain Elevated Privileges
8900| [1015585] Microsoft HTML Help Workshop Buffer Overflow in Processing .hhp Files Lets Remote User Execute Arbitrary Code
8901| [1015559] Microsoft Internet Explorer Shockwave Flash Scripting Bug Lets Remote Users Deny Service
8902| [1015489] Microsoft Wireless Network Connection Software May Broadcast Ad-Hoc SSID Information in Certain Cases
8903| [1015461] Microsoft Outlook Buffer Overflow in Processing TNEF Messages Lets Remote Users Execute Arbitrary Code
8904| [1015460] Microsoft Exchange Buffer Overflow in Processing TNEF Messages Lets Remote Users Execute Arbitrary Code
8905| [1015459] Microsoft Windows Embedded Web Fonts Buffer Overflow Lets Remote Users Execute Arbitrary Code
8906| [1015453] Microsoft Windows Graphics Rendering Engine WMF File Memory Access Error Lets Remote Users Execute Arbitrary Code
8907| [1015416] Microsoft Windows Unspecified WMF Rendering Bug Lets Remote Users Execute Arbitrary Code
8908| [1015350] Microsoft Internet Explorer Bug in Using HTTPS Proxies May Disclose Web URLs to Remote Users
8909| [1015349] Microsoft Windows Internet Explorer May Let Remote Users Obfuscate the Download Dialog Box
8910| [1015348] Microsoft Internet Explorer Bug in Instantiating COM Objects May Let Remote Users Execute Arbitrary Code
8911| [1015347] Microsoft Windows 2000 Kernel APC Queue Bug Lets Local Users Gain Elevated Privileges
8912| [1015333] Microsoft Excel Unspecified Stack Overflow May Let Remote Users Cause Arbitrary Code to Be Executed
8913| [1015251] Microsoft Internet Explorer Bug in Processing Mismatched Document Object Model Objects May Let Remote Users Execute Arbitrary Code
8914| [1015233] Microsoft Windows RPC Service May Let Remote Users Deny Service
8915| [1015226] Microsoft AntiSpyware Improper CreateProcess() Call Lets Local Users Execute Arbitrary Code
8916| [1015168] Microsoft Windows Buffer Overflows in Graphics Rendering Engine Lets Remote Users Execute Arbitrary Code
8917| [1015143] F-Secure Anti-Virus for Microsoft Exchange Web Console May Disclose Files to Remote Users
8918| [1015101] Microsoft Internet Explorer J2SE Runtime Environment Bug Lets Remote Users Crash the Target User's Browser
8919| [1015044] Microsoft Windows Multiple COM Objects Let Remote Users Execute Arbitrary Code
8920| [1015043] Microsoft Network Connection Manager Lets Remote Users Deny Service
8921| [1015042] Microsoft Windows Plug and Play Buffer Overflow Lets Remote Users Execute Arbitrary Code
8922| [1015041] Microsoft Client Service for NetWare Buffer Overflow Lets Remote Users Execute Arbitrary Code
8923| [1015040] Microsoft Windows Shell Bugs in Processing '.lnk' Files and in Web View Preview Mode Lets Remote Users Execute Arbitrary Code
8924| [1015039] Microsoft Windows Buffer Overflow in Collaboration Data Objects Lets Remote Users Execute Arbitrary Code
8925| [1015038] Microsoft Exchange Buffer Overflow in Collaboration Data Objects Lets Remote Users Execute Arbitrary Code
8926| [1015037] Microsoft Windows Buffer Overflows in MSDTC and COM+ Let Remote Users Execute Arbitrary Code and Local User Gain Elevated Privileges
8927| [1015036] Microsoft Windows FTP Client Input Validation Hole Lets Remote Servers Create/Overwrite Files on the Target User's System
8928| [1015034] Microsoft DirectX DirectShow Buffer Overflow Lets Remote Users Execute Arbitrary Code
8929| [1014829] Microsoft Windows Firewall User Interface May Not Properly Display Exception Rules
8930| [1014809] Microsoft Internet Explorer Unspecified Bug May Permit Remote Code Execution
8931| [1014727] Microsoft 'msdds.dll' COM Object Lets Remote Users Execute Arbitrary Code
8932| [1014643] Microsoft Internet Explorer COM Object Instantiation Bug May Let Remote Users Execute Arbitrary Code
8933| [1014642] Microsoft Windows Kerberos and PKINIT Vulnerabilities Allow Denial of Service, Information Disclosure, and Spoofing
8934| [1014641] Microsoft Internet Explorer Web Folder URL Validation Bug Lets Remote Users Execute Scripting Code in an Arbitrary Security Domain
8935| [1014640] Microsoft Windows Plug and Play Stack Overflow Lets Remote Users Execute Arbitrary Code
8936| [1014639] Microsoft Windows Telephony Service Remote Code Execution or Local Privilege Escalation
8937| [1014638] Microsoft Windows Print Spooler Service Buffer Overflow Lets Remote Users Execute Arbitrary Code
8938| [1014501] Hosting Controller 'IISActions.asp' Script Lets Remote Authenticated Users Add Domains/Subdomains
8939| [1014500] Microsoft Internet Explorer (IE) JPEG Rendering Bugs Let Remote Users Deny Service or Execute Arbitrary Code
8940| [1014498] Microsoft Windows Remote Desktop Protocol Bug Lets Remote Users Deny Service
8941| [1014458] Microsoft Office Buffer Overflow in Parsing Fonts Lets Remote Users Cause Arbitrary Code to Be Executed
8942| [1014457] Microsoft Microsoft Color Management Module Lets Remote Users Execute Arbitrary Code
8943| [1014417] Microsoft Windows Named Pipe NULL Session Bugs in svcctl and eventlog RPC Interfaces Disclose Information to Remote Users
8944| [1014364] Microsoft Internet Information Server May Allow Remote Users to Conduct HTTP Response Smuggling Attacks
8945| [1014356] Microsoft ISA Server May Accept HTTP Authentication Even When SSL Is Required
8946| [1014352] Microsoft Front Page May Crash When Editing a Specially Crafted Web Page
8947| [1014329] Microsoft Internet Explorer 'javaprxy.dll' COM Object Exception Handling Lets Remote Users Execute Arbitrary Code
8948| [1014261] Microsoft Internet Explorer Lets Remote Users Spoof Javascript Dialog Boxes
8949| [1014201] Microsoft Internet Explorer Buffer Overflow in Rendering PNG Images Lets Remote Users Execute Arbitrary Code
8950| [1014200] Microsoft Outlook Express Buffer Overflow in NNTP Response Parser Lets Remote Users Execute Arbitrary Code
8951| [1014199] Microsoft Outlook Web Access Input Validation Hole in IMG Tags Permits Cross-Site Scripting Attacks
8952| [1014198] Microsoft Windows Buffer Overflow in Processing Server Message Block Packets Lets Remote Users Execute Arbitrary Code
8953| [1014197] Microsoft Agent Lets Remote Users Spoof Security Dialog Box Contents
8954| [1014196] Microsoft Windows Buffer Overflow in Web Client Service Lets Remote Authenticated Users Execute Arbitrary Code
8955| [1014195] Microsoft HTML Help Input Validation Flaw Lets Remote Users Execute Arbitrary Code
8956| [1014194] Microsoft Step-by-Step Interactive Training Bookmark Link File Validation Flaw Lets Remote Users Execute Arbitrary Code
8957| [1014193] Microsoft Internet Security and Acceleration Server Bugs Let Remote Users Poison the Cache and Establish NetBIOS Connections
8958| [1014174] Microsoft Internet Explorer Lets Remote Users Obfuscate Scripting Code
8959| [1014113] Microsoft ISA Server in SecureNAT Configuration Can Be Crashed By Remote Users
8960| [1014050] Computer Associates eTrust Antivirus Integer Overflow in Processing Microsoft OLE Data Lets Remote Users Execute Arbitrary Code
8961| [1013996] Microsoft ASP.NET May Disclose System Information to Remote Users in Certain Cases
8962| [1013761] Microsoft Windows Explorer 'webvw.dll' Input Validation Error Lets Remote Users Execute Arbitrary Scripting Code
8963| [1013724] RSA Authentication Agent for Web for IIS Input Validation Bug Lets Remote Users Conduct Cross-Site Scripting Attacks
8964| [1013692] Microsoft Internet Explorer Buffer Overflows in DHTML, URL Parsing, and Content Advisor Let Remote Users Execute Arbitrary Code
8965| [1013691] Microsoft Message Queuing Buffer Overflow Lets Remote Users Execute Arbitrary Code
8966| [1013689] Microsoft Windows Shell MSHTA Lets Remote Users Code Execute Arbitrary Scripting Code
8967| [1013688] Microsoft Windows Kernel and Font Buffer Overflows Let Local Users Deny Service or Obtain System Privileges
8968| [1013687] Microsoft Exchange Heap Overlow in Processing Extended SMTP Verb Lets Remote Users Execute Arbitrary Code
8969| [1013686] Microsoft Windows TCP, IP, and ICMP Processing Errors Let Remote Users Deny Service and Execute Arbitrary Code
8970| [1013684] Microsoft Word Unspecified Buffer Overflow in Processing Documents Lets Remote Users Execute Arbitrary Code
8971| [1013669] Microsoft Outlook Web Access 'From' Address Display Lets Remote Users Spoof Origination Addresses
8972| [1013668] Microsoft Outlook 'From' Address Display Lets Remote Users Spoof Origination Addresses
8973| [1013618] Microsoft Jet Database Buffer Overflow in 'msjet40.dll' Lets Remote Users Execute Arbitrary Code
8974| [1013583] Microsoft Outlook Connector for IBM Lotus Domino Lets Users Bypass Password Storage Policy
8975| [1013552] Microsoft Windows Remote Desktop 'TSShutdn.exe' Lets Remote Authenticated Users Shutdown the System
8976| [1013454] Microsoft Office InfoPath 2003 May Disclose System and Authentication Information to Remote Users
8977| [1013284] Microsoft Windows 2000 and XP Group Policy Can Be Bypassed By Microsoft Office Applications and By Flash Drives
8978| [1013205] Microsoft Internet Explorer Can Be Crashed With URL Containing Special URL Characters
8979| [1013126] Microsoft Internet Explorer CDF Scripting Error Lets Remote Users Execute Scripting Code in Arbitrary Domains
8980| [1013125] Microsoft Internet Explorer DHTML Method Heap Overflow Lets Remote Users Execute Arbitrary Code
8981| [1013124] Microsoft Internet Explorer URL Encoding Error Lets Remote Users Spoof Arbitrary URLs and Execute Scripting Code in Arbitrary Security Zone
8982| [1013120] Microsoft Windows OLE Buffer Overflow Lets Remote Users Execute Arbitrary Code and COM Access Flaw Lets Remote Authenticated Users Gain Elevated Privileges
8983| [1013119] Microsoft Windows Hyperlink Object Library Lets Remote Users Execute Arbitrary Code
8984| [1013117] Microsoft Windows License Logging Service Lets Remote Users Execute Arbitrary Code
8985| [1013115] Microsoft Windows Media Player Buffer Overflow in Processing PNG Files Lets Remote Users Execute Arbitrary Code
8986| [1013114] Microsoft Windows SMB Lets Remote Users Execute Arbitrary Code
8987| [1013112] Microsoft Windows XP Named Pipe Validation Error Lets Remote Users Obtain Information
8988| [1013111] Microsoft SharePoint Services Redirection Query Input Validation Hole Lets Remote Users Conduct Cross-Site Scripting Attacks
8989| [1013110] Microsoft Office XP Buffer Overflow in Processing URLs Lets Remote Users Execute Arbitrary Code
8990| [1013086] Microsoft Outlook Web Access 'owalogon.asp' Lets Remote Users Redirect Login Requests
8991| [1012891] Microsoft IE Windows XP SP2 File Download Security Can Be Bypassed With Dynamic IFRAME Tag
8992| [1012836] Microsoft HTML Help Active Control Cross-Domain Error Lets Remote Users Execute Arbitrary Commands
8993| [1012835] Microsoft Cursor and Icon Validation Error Lets Remote Users Execute Arbitrary Code
8994| [1012684] Microsoft Windows LoadImage API Buffer Overflow Lets Remote Users Execute Arbitrary Code
8995| [1012683] Microsoft Windows ANI File Parsing Errors Let Remote Users Deny Service
8996| [1012682] Microsoft Windows Help System Buffer Overflows in Processing Phrase Compressed Help Files Lets Remote Users Execute Arbitrary Code
8997| [1012626] Microsoft Windows Media Player setItemInfo Lets Remote Users Execute Arbitrary Code
8998| [1012584] Microsoft IE dhtmled.ocx Lets Remote Users Execute Cross-Domain Scripting Attacks
8999| [1012518] Microsoft HyperTerminal Buffer Overflow Lets Remote Users Execute Arbitrary Code
9000| [1012517] Microsoft WINS Buffer Overflow in Name Value Lets Remote Users Execute Arbitrary Code
9001| [1012515] Microsoft Windows NT 4.0 Buffer Overflows in the Logging and Processing of DHCP Packets May Let Remote Users Execute Arbitrary Code
9002| [1012514] Microsoft WordPad Error in Converting Tables/Fonts Lets Remote Users Execute Arbitrary Code
9003| [1012513] Microsoft Windows Kernel Buffer Overflow in Processing Local Procedure Call Messages Lets Local Users Gain System Privileges
9004| [1012512] Microsoft LSASS Bug in Validating Identity Tokens Lets Local Users Gain Elevated Privileges
9005| [1012458] Microsoft Internet Explorer Lets Remote Users Inject Content into Open Windows
9006| [1012444] Microsoft Internet Explorer Input Validation Error in Processing FTP URLs May Let Remote Users Inject Arbitrary FTP Commands
9007| [1012435] Microsoft Windows Resource Kit Buffer Overflow and Input Validation Holes in 'w3who.dll' May Permit Remote Code Execution and Cross-Site Scripting Attacks
9008| [1012341] Microsoft WINS Memory Overwrite Lets Remote Users Execute Arbitary Code
9009| [1012288] Microsoft IE Custom 404 Error Message and execCommand SaveAs Lets Remote Users Bypass XP SP2 Download Warning Mechanisms
9010| [1012234] Microsoft Internet Explorer on XP SP2 Has Unspecified Flaws That Let Remote Users Bypass File Download Restrictions
9011| [1012155] Microsoft Internet Security and Acceleration Server Reverse DNS Caching Bug Lets Remote Users Spoof Web Sites
9012| [1012154] Microsoft Proxy Server Reverse DNS Caching Bug Lets Remote Users Spoof Web Sites
9013| [1012138] Microsoft IE Discloses Whether Specified Files Exist to Remote Users
9014| [1012057] F-Secure Anti-Virus for Microsoft Exchange Lets Remote Users Bypass Anti-Virus Detection With a ZIP Archive
9015| [1012049] (Exploit Code Has Been Released) Microsoft Internet Explorer Buffer Overflow in IFRAME/EMBED Tag Processing Lets Remote Users Execute Arbitrary Code
9016| [1011987] Microsoft Internet Explorer Lets Remote Users Spoof the Status Bar Address with a Table Within a Link
9017| [1011940] Microsoft Remote Desktop on Windows XP Lets Remote Authenticated Users Restart the System
9018| [1011895] Microsoft IE for Mac Multi-Window Browsing Errors Let Remote Users Spoof Sites
9019| [1011890] Microsoft Outlook May Display Images in Plaintext Only Mode
9020| [1011880] Microsoft Windows XP Error in Explorer in Processing WAV Files Lets Remote Users Deny Service
9021| [1011859] Microsoft Internet Explorer on Windows XP Fails to Restrict Drag and Drop Operations When Configured to Disable These Operations
9022| [1011851] Microsoft IE AnchorClick Behavior and HTML Help Let Remote Users Execute Arbitrary Code
9023| [1011735] Microsoft Internet Explorer May Display the Incorrect URL When Loading a Javascript Homepage
9024| [1011706] Microsoft Operating System 'asycpict.dll' Lets Remote Users Crash the System
9025| [1011678] Microsoft IE MSN 'heartbeat.ocx' Component Has Unspecified Flaw
9026| [1011647] Microsoft Windows Shell Buffer Overflows Let Remote Users Execute Arbitrary Code
9027| [1011646] Microsoft Program Group Converter Buffer Overflow Lets Remote Users Execute Arbitrary Code
9028| [1011645] Microsoft Various Operating System Flaws Lets Remote Users Execute Code and Local Users Gain Elevated Privileges or Deny Service
9029| [1011644] Microsoft IE Plug-in Navigation Flaw Lets Remote Users Spoof URLs in the Addresses Bar
9030| [1011643] Microsoft IE Double Byte Parsing Flaw Lets Remote Users Spoof URLs in the Addresses Bar
9031| [1011642] Microsoft IE SSL Caching Flaw Lets Remote Users Run Scripting Code in the Context of Arbitrary Secure Sites
9032| [1011640] Microsoft IE Buffer Overflow in Install Engine Lets Remote Users Execute Arbitrary Code
9033| [1011639] Microsoft IE Buffer Overflow in Processing Cascading Style Sheets Lets Remote Users Execute Arbitrary Code
9034| [1011637] Microsoft Windows Buffer Overflow in Processing Compressed Folders Lets Remote Users Execute Arbitrary Code
9035| [1011636] Microsoft SMTP Service Buffer Overflow in Processing DNS Responses May Let Remote Users Execute Arbitrary Code
9036| [1011635] Microsoft Excel Unspecified Flaw Lets Remote Users Execute Arbitrary Code
9037| [1011634] Microsoft NetDDE Buffer Overflow Lets Remote Users Execute Arbitrary Code With System Privileges
9038| [1011632] Microsoft NT RPC Runtime Library Buffer Overflow Lets Remote Users Deny Service
9039| [1011631] Microsoft NNTP Buffer Overflow Lets Remote Users Execute Arbitrary Code With SYSTEM Privileges
9040| [1011626] Microsoft Cabarc Directory Traversal Flaw Lets Remote Users Create/Overwrite Files on the Target System
9041| [1011565] Microsoft Word Parsing Flaw May Let Remote Users Execute Arbitrary Code
9042| [1011563] Microsoft Internet Explorer Lets Remote Users Access XML Documents
9043| [1011559] Microsoft .NET Forms Authentication Can Be Bypassed By Remote Users
9044| [1011434] Microsoft SQL Server Can Be Crashed By Remote Users Sending a Specially Crafted Large Buffer
9045| [1011332] Microsoft Internet Explorer Bug in Setting Cookies in Certain Domains May Let Remote Users Conduct Session Fixation Attacks
9046| [1011253] Microsoft GDI+ Buffer Overflow in Processing JPEG Images Lets Remote Users Execute Arbitrary Code
9047| [1011252] Microsoft Works Suite Buffer Overflow in WordPerfect Converter Lets Remote Users Execute Arbitrary Code
9048| [1011251] Microsoft Publisher Buffer Overflow in WordPerfect Converter Lets Remote Users Execute Arbitrary Code
9049| [1011250] Microsoft FrontPage Buffer Overflow in WordPerfect Converter Lets Remote Users Execute Arbitrary Code
9050| [1011249] Microsoft Office Buffer Overflow in WordPerfect Converter Lets Remote Users Execute Arbitrary Code
9051| [1011200] F-Secure Anti-Virus for Microsoft Exchange Input Validation Bug in Content Scanner Server Lets Remote Users Deny Service
9052| [1011141] HP Systems Insight Manager May Not Let Users Login After Applying a Microsoft Security Patch
9053| [1011067] Microsoft Outlook Express May Disclose 'bcc:' Recipient Addresses
9054| [1011043] Microsoft Internet Explorer Local File IFRAME Error Response Lets Remote Users Determine if Files or Directories Exist
9055| [1010996] Microsoft Windows XP SP2 Local Computer Scripting Restrictions Can Be Bypassed With a Specially Crafted MHT File
9056| [1010992] Microsoft Internet Security and Acceleration Server Does Not Block FTP Bounce Attacks
9057| [1010959] Microsoft Windows Explorer (in XP SP2) May Fail to Warn Users When Executing Untrusted Files
9058| [1010957] Microsoft Internet Explorer Unregistered Protocol State Error Lets Remote Users Spoof Location Bar
9059| [1010916] Microsoft Outlook Web Access Input Validation Hole in Redirection Query Permits Cross-Site Scripting Attacks
9060| [1010827] Microsoft Internet Explorer Error in 'mshtml.dll' in Processing GIF Files Lets Remote Users Crash the Browser
9061| [1010713] Microsoft Systems Management Server (SMS) Client Can Be Crashed By Remote Users
9062| [1010694] Microsoft IE Lets Remote Users Spoof Filenames Using CLSIDs
9063| [1010693] Microsoft Internet Explorer 'shell:' Protocol Lets Remote Users Execute Arbitrary Scripting Code in the Local Zone
9064| [1010690] Microsoft HTML Help Input Validation Error Lets Remote Users Execute Arbitrary Code
9065| [1010688] Microsoft Windows Task Scheduler Buffer Overflow Lets Remote Users Execute Arbitrary Code
9066| [1010687] Microsoft Windows 2000/NT POSIX Subsystem Buffer Overflow Lets Local Users Gain Elevated Privileges
9067| [1010686] Microsoft Utility Manager Permits Local Applications to Run With Elevated Privileges
9068| [1010683] Microsoft Internet Explorer Same Name Javascript Bug Lets Remote Users Execute Arbitrary Javascript in the Domain of an Arbitrary Site
9069| [1010679] Microsoft Internet Explorer Access Control Flaw in popup.show() Lets Remote Users Execute Mouse-Click Actions
9070| [1010673] Microsoft Internet Explorer Can Be Crashed By Remote Users With Large Text Files
9071| [1010550] Microsoft MN-500 Wireless Base Station Lets Remote Users Deny Administrative Access
9072| [1010491] Microsoft Internet Explorer Crashes When Saving Files With Special Character Strings
9073| [1010482] Microsoft Internet Explorer '%2F' URL Parsing Error Lets Remote Users Spoof Sites in the Trusted Zone
9074| [1010479] (US-CERT Issues Advisory) Microsoft Internet Explorer Cross-Domain Redirect Hole Lets Remote Users Execute Arbitrary Code
9075| [1010427] Microsoft DirectX DirectPlay Input Validation Error Lets Remote Users Crash the Application
9076| [1010352] Microsoft Windows 2000 Domains With Eight Characters May Let Remote Users With Expired Passwords Login
9077| [1010314] Microsoft Windows IPSec Filtering Can Be Bypassed By Remote Users
9078| [1010189] Microsoft Outlook 2003 Scripting Restrictions Can Be Bypassed By Remote Users
9079| [1010175] Microsoft Visual Basic Buffer Overflow May Let Local Users Gain Elevated Privileges
9080| [1010166] Microsoft Outlook Express Mail Troubleshooting Function May Disclose SMTP Password to Local Users
9081| [1010165] Microsoft Internet Explorer Image Map URL Display Error Lets Remote Users Spoof URLs
9082| [1010157] Microsoft Internet Explorer showHelp Path Search Lets Remote Users Load Existing Local CHM Files
9083| [1010125] Microsoft Outlook 2003 Lets Remote Users Send E-mail to Cause the Recipient's Client to Contact a Remote Server
9084| [1010119] Microsoft Help and Support Center HCP URL Validation Error May Let Remote Users Execute Arbitrary Code If User Interactions Occur
9085| [1010092] Microsoft Internet Explorer 'file://' URL Processing Flaw Lets Remote Users Damage the Registry
9086| [1010009] Microsoft Internet Explorer SSL Icon Error May Let Remote Users Impersonate Secure Web Sites
9087| [1009940] Microsoft Windows Explorer Buffer Overflow in Processing SMB Share Names Lets Remote Users Execute Arbitrary Code
9088| [1009939] Microsoft Internet Explorer Buffer Overflow in Processing SMB Share Names Lets Remote Users Execute Arbitrary Code
9089| [1009778] Microsoft H.323 Buffer Overflow Lets Remote Users Execute Arbitrary Code
9090| [1009777] Microsoft SSL Library Input Validation Error Lets Remote Users Crash the Service
9091| [1009776] Microsoft Windows Kernel Local Descriptor Table Flaw Lets Local Users Gain Elevated Privileges
9092| [1009771] Microsoft Windows Negotiate Security Software Provider (SSP) Buffer Overflow Lets Remote and Local Users Execute Arbitrary Code
9093| [1009770] Microsoft Windows Management Interface Provider Lets Local Users Gain Elevated Privileges
9094| [1009769] Microsoft Utility Manager Lets Local Users Run Applications With Elevated Privileges
9095| [1009768] Microsoft Winlogon Buffer Overflow Lets Certain Remote Users Execute Arbitrary Code
9096| [1009767] Microsoft Windows 2000 Domain Controller LDAP Flaw May Let Remote Users Restart the Authentication Service
9097| [1009762] Microsoft Windows COM Internet Services and RPC over HTTP Can Be Crashed By Remote Users
9098| [1009761] Microsoft Windows COM Object Identifier Creation Flaw May Let Remote Users Cause Applications to Open Network Ports
9099| [1009760] Microsoft Virtual DOS Machine (VDM) Lets Local Users Gain Elevated Privileges
9100| [1009758] Microsoft Windows RCP Memory Leak Lets Remote Users Deny Service
9101| [1009757] Microsoft Jet Database Engine 'msjet40.dll' Buffer Overflow Lets Remote Users Execute Arbitrary Code
9102| [1009754] Microsoft ASN.1 Library (msasn1.dll) Double-Free Memory Allocation Error May Let Remote Users Execute Arbitrary Code
9103| [1009753] Microsoft SSL Library PCT Buffer Overflow Lets Remote Users Execute Arbitrary Code
9104| [1009752] Microsoft Help and Support Center Input Validation Flaw Lets Remote Users Execute Arbitrary Code in the My Computer Zone
9105| [1009751] Microsoft LSASS Service Buffer Overflow Lets Remote Users Execute Arbitrary Code With SYSTEM Privileges
9106| [1009746] Microsoft Internet Explorer Bitmap Memory Allocation Error Lets Remote Users Cause All Available Memory to Be Consumed
9107| [1009743] Microsoft Outlook Express Can Be Crashed By Remote Users With Specially Crafted EML File
9108| [1009739] Microsoft Internet Explorer Javascript OLE Object Lets Remote Users Automatically Print Without Authorization
9109| [1009690] Microsoft Internet Explorer Security Domain Flaw in Accessing CHM Files Lets Remote Users Execute Arbitrary Code
9110| [1009673] Microsoft Windows XP 'mswebdvd.dll' Buffer Overflow Lets Remote Users Deny Service
9111| [1009666] Microsoft SharePoint Portal Server Input Validation Holes Permit Cross-Site Scripting Attacks
9112| [1009604] Microsoft Internet Explorer Does Not Correctly Display Links With Embedded FORM Data
9113| [1009603] Microsoft Outlook Express Does Not Correctly Display Links With Embedded FORM Data
9114| [1009546] Microsoft Operating Systems Have Unspecified Flaw That Yields Kernel Level Access to Local Users
9115| [1009361] Microsoft Internet Explorer Cookie Path Restrictions Can Be Bypassed By Remote Servers
9116| [1009360] Microsoft MSN Messenger May Disclose Known Files to Remote Users
9117| [1009359] Microsoft Windows Media Services Can Be Crashed By Remote Users
9118| [1009358] Microsoft Office XP 'mailto' URL Parsing Bug Lets Remote Users Execute Arbitrary Code in the Local Computer Domain
9119| [1009357] Microsoft Outlook 'mailto' URL Parsing Bug Lets Remote Users Execute Arbitrary Code in the Local Computer Domain
9120| [1009243] Microsoft Internet Explorer (IE) May Leak Keystrokes Across Frames
9121| [1009181] Microsoft Windows Explorer Heap Overflow in Processing '.emf' Files Permits Code Execution
9122| [1009067] Microsoft Internet Explorer Integer Overflow in Processing Bitmap Files Lets Remote Users Execute Arbitrary Code
9123| [1009009] Microsoft Virtual PC for Mac Temporary File Flaw Lets Local Users Gain Root Privileges
9124| [1009008] Microsoft Windows Internet Naming Service (WINS) Length Validation Flaw Lets Remote Users Deny Service
9125| [1009007] Microsoft ASN.1 Library Heap Overflows Let Remote Users Execute Arbitrary Code With SYSTEM Privileges
9126| [1008901] Microsoft Internet Explorer Travel Log Input Validation Flaw Lets Remote Users Run Arbitrary Scripting Code in the Local Computer Domain
9127| [1008699] Microsoft Windows Buffer Overflow in MDAC Lets Remote Users Execute Arbitrary Code
9128| [1008698] Microsoft Internet Security and Acceleration Server H.323 Buffer Overflow Lets Remote Users Execute Arbitrary Code
9129| [1008586] Microsoft Office Security Features Can Be Bypassed
9130| [1008583] Microsoft Internet Explorer Flaw in Processing '.lnk' Shortcuts Lets Remote Users Execute Arbitrary Code
9131| [1008578] Microsoft Internet Explorer showHelp() '\..\' Directory Traversal Flaw Lets Remote Users Execute Files on the Target System
9132| [1008558] Microsoft Internet Explorer Trusted Domain Default Settings Facilitate Silent Installation of Executables
9133| [1008554] Microsoft IE for Mac May Disclose Sensitive Information in Secure URLs to Remote Sites via HTTP Referer Field
9134| [1008510] Openwares.org 'Microsoft IE Security Patch' URL Buffer Overflow Lets Remote Users Execute Arbitrary Code
9135| [1008428] Microsoft ASP.NET Web Services XML Parsing Lets Remote Users Consume CPU Resources With SOAP Requests
9136| [1008425] Microsoft IE Does Not Properly Display Some URLs
9137| [1008324] Microsoft Exchange 2003 With Outlook Web Access and Windows SharePoint Services May Grant Incorrect E-mail Account Access to Remote Authenticated Users
9138| [1008293] Microsoft Internet Explorer Invalid ContentType May Disclose Cache Directory Location to Remote Users
9139| [1008292] Microsoft Internet Explorer MHT Redirect Flaws Let Remote Users Execute Arbitrary Code
9140| [1008245] Microsoft SharePoint May Let Remote Users Access Protected Pages Without Authenticating
9141| [1008151] Microsoft Works Macro Name Length Buffer Overflow Lets Remote Users Execute Arbitrary Code
9142| [1008150] Microsoft Word Macro Name Length Buffer Overflow Lets Remote Users Execute Arbitrary Code
9143| [1008149] Microsoft Excel Macro Security Flaw Lets Remote Users Execute Arbitrary Macro Codes
9144| [1008148] Microsoft SharePoint Team Services Buffer Overflow May Let Remote Users Execute Arbitrary Code
9145| [1008147] Microsoft FrontPage Server Extensions Buffer Overflow May Let Remote Users Execute Arbitrary Code
9146| [1008146] Microsoft Windows Workstation Service (wkssvc.dll) Buffer Overflow Lets Remote Users Execute Arbitrary Code with System Privileges
9147| [1008053] Microsoft Internet Explorer IFRAME Refresh Lets Remote HTML Access Local Files
9148| [1008000] Microsoft Internet Explorer Lets Remote Users Execute Arbitrary Files in the Local Zone Using a Specially Crafted IFRAME/Location Header
9149| [1007937] Microsoft Exchange Server Buffer Overflow in Processing Extended Verb Requests May Let Remote Users Execute Arbitrary Code
9150| [1007936] Microsoft Outlook Web Access Input Validation Flaw in 'Compose New Message' Permits Remote Cross-Site Scripting Attacks
9151| [1007935] Microsoft ListBox and ComboBox 'user32.dll' Buffer Overflow May Allow Local Users to Gain Elevated Privileges
9152| [1007934] Microsoft Help and Support Center HCP Buffer Overflow Lets Remote and Local Users Execute Arbitrary Code With Local Computer Privileges
9153| [1007933] Microsoft Windows Messenger Service Buffer Overflow Lets Remote Users Execute Arbitrary Code With Local System Privileges
9154| [1007932] Microsoft Windows Troubleshooter ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code
9155| [1007931] Microsoft Authenticode Low Memory Flaw May Let Remote Users Execute Arbitrary Code
9156| [1007922] Microsoft Windows RPC Multi-threaded Race Condition Lets Remote Users Crash the Service or Execute Arbitrary Code
9157| [1007905] Microsoft Windows Server 2003 Shell Folders Can Be Referenced Using Directory Traversal Characters
9158| [1007874] Microsoft Windows OS PostThreadMessage() API Permits Local Users to Terminate Processes That Have Message Queues
9159| [1007750] Microsoft BizTalk Server Default Directory Permissions May Let Remote Users Deny Service
9160| [1007689] Microsoft Internet Explorer Media Sidebar Flaw Lets Remote Users Execute Arbitrary Code on the System
9161| [1007687] Microsoft Internet Explorer Various Cross-Domain Flaws Permit Remote Scripting in Arbitrary Domains
9162| [1007670] Microsoft Windows Remote Procedure Call (RPC) DCOM Activation Buffer Overflows Let Remote Users Execute Arbitrary Code
9163| [1007651] RealSecure Server Sensor Unicode Flaw Lets Remote Users Crash the IIS Web Service
9164| [1007618] Microsoft Visual Basic for Applications (VBA) in Multiple Microsoft Products Permits Remote Code Execution
9165| [1007617] Microsoft Converter for WordPerfect Has Buffer Overflow That Lets Remote Users Execute Arbitrary Code
9166| [1007616] Microsoft Word Document Validation Error Lets Macros Run Without Warning
9167| [1007615] Microsoft Windows NetBIOS Name Service May Disclose Memory Contents to Remote Users
9168| [1007614] Microsoft Access Snapshot Viewer ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code
9169| [1007599] Microsoft Outlook May Fail to Delete Outlook Data From the PST File
9170| [1007538] Microsoft Internet Explorer Buffer Overflow in CR549.DLL ActiveX Control Permits Remote Code Execution
9171| [1007537] Microsoft Internet Explorer Object Tag Flaw Lets Remote Users Execute Arbitrary Code
9172| [1007536] Microsoft Internet Explorer Cache Script Flaw Lets Remote Users Execute Code in the My Computer Zone
9173| [1007535] Microsoft MDAC Database Component Lets Remote Users Execute Arbitrary Code
9174| [1007507] RSA SecurID Interaction With Microsoft URLScan May Disclose URLScan Configuration to Remote Users
9175| [1007493] Microsoft Visual Studio Buffer Overflow in 'mciwndx.ocx' May Let Remote Users Execute Arbitrary Code
9176| [1007388] Microsoft WebServer Beta for Pocket PC Yields Administrative Access to Remote Users
9177| [1007364] IISShield May Fail to Drop a Specific Malformed HTTP Request
9178| [1007306] Microsoft Outlook Express Again Executes Scripting Code in Plain Text E-mail Messages
9179| [1007281] Microsoft Windows NT File Management Flaw May Let Remote Users Crash Certain Applications
9180| [1007280] Microsoft Data/Desktop Engine Named Pipe and LPC Flaws Let Local Users Execute Arbitrary Code
9181| [1007279] Microsoft SQL Server Named Pipe and LPC Flaws Let Local Users Execute Arbitrary Code
9182| [1007278] Microsoft DirectX Heap Overflow in Loading MIDI Files Lets Remote Users Execute Arbitrary Code
9183| [1007265] Microsoft MDAC ODBC Component May Store Database Passwords in Plaintext in the Registry
9184| [1007238] Microsoft Outlook Web Access Can Be Crashed By Remote Authenticated Users With an Outlook 2003 Client
9185| [1007214] Microsoft Windows XP Shell Buffer Overflow in Processing Folder Display Attributes Permits Remote Code Execution
9186| [1007212] Microsoft Windows Remote Procedure Call (RPC) Service Buffer Overflow in Processing DCOM Requests Allows Remote Code Execution
9187| [1007206] Microsoft SMTP Service Can Be Crashed By Remote Users Sending Mail With an Invalid FILETIME Header
9188| [1007205] Microsoft Exchange Server Can Be Crashed By Remote Users Sending Mail With an Invalid FILETIME Header
9189| [1007190] Microsoft Internet Explorer 'Chromeless' Window May Let Remote Users Spoof Various User Interface Characteristics
9190| [1007172] Microsoft Jet Database Engine Buffer Overflow May Let Remote Users Execute Arbitrary Code
9191| [1007154] Microsoft SMB Buffer Overflow Lets Remote Authenticated Users Execute Arbitrary Code
9192| [1007152] Microsoft Windows 2000 Accessibility Utility Manager Lets Local Users Gain Elevated Privileges
9193| [1007133] Microsoft Outlook Web Access (OWA) May Disclose The User's OWA Password to Remote Users
9194| [1007126] Microsoft Internet Explorer Can By Crashed By Loading 'C:\aux' URL
9195| [1007099] Microsoft Windows 2000 ShellExecute() Buffer Overflow May Let Users Execute Arbitrary Code
9196| [1007098] Microsoft Commerce Server Discloses SQL Server Password to Local Users
9197| [1007094] Microsoft NetMeeting Directory Traversal Flaw Lets Remote Users Execute Arbitrary Code
9198| [1007093] Microsoft Active Directory Stack Overflow in 'Lsaas.exe' Lets Remote Users Crash the Windows 2000 Server
9199| [1007072] Microsoft Internet Explorer Buffer Overflow in Processing Scripted 'HR' Tags Lets Remote Users Execute Arbitrary Code
9200| [1007057] Microsoft Windows Media Player Access Control Flaw Lets Remote Users View, Modify, and Delete Media Library Metadata
9201| [1007022] SurfControl for Microsoft ISA Server Discloses Files to Remote Users
9202| [1007008] Microsoft Internet Explorer XML Parsing Error Lets Remote Users Conduct Cross-Site Scripting Attacks
9203| [1007007] Microsoft Internet Explorer Custom HTTP Error Pages May Let Remote Users Execute Scripts in the Local Computer Zone
9204| [1006959] Microsoft Windows Server 2003 Drivers May Leak Information From Memory Via Ethernet Packets Containing TCP Streams
9205| [1006924] Microsoft Internet Explorer Input Validation Flaw in Displaying FTP Site Names Lets Remote Users Execute Arbitrary Scripting Code in Arbitrary Domains
9206| [1006918] Microsoft Internet Explorer (IE) Object Tag Buffer Overflow Lets Remote Users Execute Arbitrary Code
9207| [1006901] Microsoft UrlScan Default Configuration Displays Identifying Characteristics to Remote Users
9208| [1006894] iisCART2000 Upload Authentication Error Lets Remote Users Upload and Execute Arbitrary Scripts
9209| [1006844] Microsoft Internet Connection Firewall Fails to Block IP Version 6 Protocol
9210| [1006829] iisPROTECT Input Validation Hole Lets Remote Users Execute SQL Stored Procedures
9211| [1006815] iisPROTECT Lets Remote Users Access Protected Files Using URL Encoding
9212| [1006809] Microsoft Outlook Express Lets Remote Users Silently Install Arbitrary Code Using Audio and Media Files
9213| [1006808] Microsoft Outlook Express May Be Affected by W32/Palyh@MM Mass-Mailing Worm
9214| [1006807] Microsoft Outlook May Be Affected by W32/Palyh@MM Mass-Mailing Worm
9215| [1006803] Microsoft Windows Can Be Crashed By Remote Users via Malformed NetMeeting URLs
9216| [1006789] Microsoft ISA Server Input Validation Flaw Lets Remote Users Execute Scripting Code in Arbitrary Security Domains
9217| [1006774] Microsoft Internet Explorer May Execute Arbitrary Code in the Wrong Security Domain When Processing Large Numbers of Download Requests
9218| [1006771] Microsoft Outlook Express Integer Overflow Lets Remote IMAP Servers Cause the Client to Crash
9219| [1006748] Microsoft Outlook Express May Be Affected by W32.Fizzer.A@mm Mass-Mailing Worm
9220| [1006747] Microsoft Outlook May Be Affected by W32.Fizzer.A@mm Mass-Mailing Worm
9221| [1006728] Microsoft .NET Passport Passwords, Including Hotmail Passwords, Can Be Changed By Remote Users
9222| [1006696] Microsoft Internet Explorer Web Folder Access Flaw Lets Remote Users Execute Arbitrary Scripting Code in the My Computer Zone
9223| [1006691] Microsoft MN-500 Wireless Base Station Backup Configuration File Discloses Administrator Password
9224| [1006686] Microsoft BizTalk Server Buffer Overflow Lets Remote Users Execute Arbitrary Code
9225| [1006634] Microsoft Internet Explorer Bugs (URLMON.DLL Buffer Overflow, File Upload Control Bypass, Plug-in URL Input Validation Flaw, CSS Modal Dialog Input Validation Flaw) Let Remote Users Execute Arbitrary Code or Access Local Files
9226| [1006608] Microsoft NTLM Authentication Protocol Flaw Lets Malicious SMB Servers Gain Access to Systems
9227| [1006599] Microsoft REGEDIT.EXE May Let Local Users Gain Elevated Privileges
9228| [1006588] Microsoft Windows OS Kernel Messaging Buffer Overflow Lets Local Users Gain Full Control of the System
9229| [1006580] Microsoft Windows 2003 'win2k.sys' Printing Bug Lets Users Crash the System
9230| [1006534] Microsoft Proxy Service in Proxy Server 2.0 Has Unspecified Flaw That Lets Remote Users Stop Traffic
9231| [1006533] Microsoft Firewall Service in ISA Server Has Unspecified Flaw That Lets Remote Users Stop Traffic
9232| [1006532] Microsoft Windows VM Input Validation Flaw in ByteCode Verifier Lets Malicious Java Applets Execute Arbitrary Code
9233| [1006447] Microsoft Windows Terminal Services RDP Implementation Does Not Validate Server Identity, Allowing Man-in-the-Middle Attacks
9234| [1006361] Microsoft ActiveSync Application Can Be Crashed By Remote Users
9235| [1006323] Microsoft Windows Buffer Overflow in Windows Script Engine JScript.DLL Lets Remote Users Execute Arbitrary Code
9236| [1006322] Microsoft ISA Server DNS Intrusion Detection Flaw Lets Remote Users Block DNS Inbound Requests
9237| [1006286] Microsoft Windows 2000/XP PostMessage() API Flaw May Let Local Users Grab Passwords from Local Dialog Boxes
9238| [1006280] Protegrity Secure.Data for Microsoft SQL Server 2000 Contains Buffer Oveflows That Let Remote Users Execute Arbitrary Code
9239| [1006257] Microsoft Internet Explorer Buffer Overflow in Processing '.MHT' Web Archives Lets Remote Users Execute Arbitrary Code
9240| [1006179] Microsoft Windows Me Help and Support Center URL Handler Overflow Lets Remote Users Execute Arbitrary Code
9241| [1006169] Microsoft Internet Explorer Vulnerable Codebase Object Lets Remote Users Execute Arbitrary Code
9242| [1006148] Microsoft Outlook Express Security Domain Flaw Lets Remote Users Silently Install and Execute Arbitrary Code
9243| [1006121] Microsoft Windows 'riched20.DLL' Buffer Overflow May Let Remote Users Crash Applications
9244| [1006046] Microsoft Internet Explorer showHelp() Domain Security Flaw Lets Remote Users Execute Commands
9245| [1006045] Microsoft Windows XP Redirector Buffer Overflow May Let Local Users Gain System Level Privileges
9246| [1006036] Microsoft Internet Explorer May Let Remote Users Read or Write Files Via the dragDrop() Method
9247| [1006023] ColdFusion MX Configuration Error When Used With IIS and NT Authentication May Grant Unauthorized Access to Remote Authenticated Users
9248| [1005986] Microsoft Windows Terminal Server MSGINA.DLL Flaw Lets Remote Authenticated Users Reboot the Server
9249| [1005966] Microsoft Outlook May Fail to Encrypt User E-mail, Disclosing the Contents to Remote Users
9250| [1005964] Microsoft Locator Service Buffer Overflow Lets Remote Users Execute Arbitrary Code with System Level Privileges
9251| [1005859] Microsoft Windows File Protection Mechanism Weakness in Trusting Code-Signing Certificate Chains Lets Arbitrary Remote Users Sign Code That Will Be Trusted By Windows
9252| [1005858] Microsoft Windows File Protection Weakness May Let Local Users Replace Code With Previous Vulnerable Versions Without Detection
9253| [1005857] Microsoft Internet Explorer Bug in Loading Multimedia Files May Let Remote Users Execute Arbitrary Scripting Code in Other Domains
9254| [1005833] Microsoft Windows XP Shell Buffer Overflow in Processing Audio Files Allows Remote Users to Execute Arbitrary Code
9255| [1005799] Microsoft Windows OS Bug in Processing WM_TIMER Messages May Let Local Users Gain Elevated Privileges
9256| [1005796] Microsoft SMB Signing Flaw May Let Remote Users With Access to an SMB Session Gain Control of a Network Client
9257| [1005761] Microsoft Windows XP Wireless LAN Support May Disclose Access Point Information to Remote Users
9258| [1005757] Microsoft Outlook Bug in Processing Malformed E-mail Headers Lets Remote Users Crash the Client
9259| [1005747] Microsoft Internet Explorer showModalDialog() Input Validation Flaw Lets Remote Users Execute Arbitary Scripting Code in Any Security Zone
9260| [1005699] Microsoft Internet Explorer (IE) Java Class Loader Security Flaw Lets Remote Users Bypass Java Security Restrictions
9261| [1005698] Microsoft Java Virtual Machine (VM) Class Loader Security Flaw Lets Remote Users Bypass Java Security Restrictions
9262| [1005674] Microsoft Internet Explorer Buffer Overflow in Processing PNG Images Allows Denial of Service Attacks
9263| [1005672] Microsoft Internet Explorer MDAC Component Buffer Overflow Allows Remote Users to Execute Arbitrary Code
9264| [1005671] Microsoft Data Access Components (MDAC) Buffer Overflow Allows Remote Users to Execute Arbitrary Code
9265| [1005627] IISPop EMail Server Can Be Crashed By Remote Users
9266| [1005489] Microsoft Outlook Express May Fail to Delete E-mail Messages from Local Storage
9267| [1005466] Microsoft Internet Explorer Cached Object Flaw Lets Remote Users Execute Arbitrary Programs on the Target User's Computer
9268| [1005455] Microsoft Windows Remote Procedure Call (RPC) Service Null Pointer Dereference Allows Remote Users to Crash the Service
9269| [1005454] Microsoft Windows Media Player for Solaris Uses Unsafe Default Permissions
9270| [1005436] Microsoft Data Engine/Desktop Engine (MSDE) Bugs Let Remote Authenticated Users Create/Delete/Execute Web Tasks With SQL Server Agent Privileges
9271| [1005435] Microsoft SQL Server Bugs Let Remote Authenticated Users Create/Delete/Execute Web Tasks With SQL Server Agent Privileges
9272| [1005416] Microsoft Internet Explorer Flaw in WebBrowser Control Document Property Lets Remote Users Run Code in the My Computer Security Zone
9273| [1005405] Microsoft Outlook Express Buffer Overflow in Parsing S/MIME Messages Lets Remote Users Execute Arbitrary Code
9274| [1005395] Microsoft Content Management Server Input Validation Bug in 'ManualLogin.asp' Allows Cross-Site Scripting Attacks
9275| [1005377] Microsoft MSN Hotmail/Passport Login Page May Permit Cookie Stealing Via Cross-Site Scripting Attacks
9276| [1005343] Microsoft Windows Help System Bug in Processing Compiled HTML Help Files Lets Remote Users Execute Arbitrary Commands in the Local Computer Security Zone
9277| [1005339] Microsoft Services for Unix Interix SDK Bugs May Allow Denial of Service Conditions or May Execute Arbitrary Code
9278| [1005338] Microsoft Data/Desktop Engine (MSDE) Buffer Overflow Lets Remote Users Execute Arbitrary Code
9279| [1005337] Microsoft SQL Server Buffer Overflow Lets Remote Users Execute Arbitrary Code
9280| [1005336] Microsoft Windows Operating System Compressed Folders Allow Arbitrary Files to Be Created
9281| [1005335] Microsoft Windows Operating System Compressed Folders Allow Arbitrary Code to Be Executed
9282| [1005332] Microsoft Windows Help System Buffer Overflow in 'hhctrl.ocx' Lets Remote Users Execute Arbitrary Code
9283| [1005296] Microsoft PPTP Service Buffer Overflow May Let Remote Users Execute Arbitrary Code
9284| [1005287] Microsoft FrontPage Server Extensions SmartHTML Interpreter Bugs May Let Remote Users Execute Arbitrary Code with System Privileges
9285| [1005256] (Vendor Issues Fix) Microsoft Windows XP Remote Desktop Implementation Bug Lets Remote Users Crash the Operating System
9286| [1005254] Microsoft NT, 2000, and XP Operating Systems May Execute a 16-bit Application Even When The File Has No Execute Permissions
9287| [1005246] Microsoft Remote Desktop Protocol (RDP) Design Flaw May Disclose Information About the Unencrypted Data to Remote Users and May Let Data Be Modified During Transmission
9288| [1005243] Microsoft NetMeeting Remote Desktop Sharing Screen Saver Access Control Flaw Lets Physically Local Users Hijack Remote Sessions
9289| [1005242] Microsoft Windows XP Remote Desktop Can Be Crashed By Remote Users Sending a Modified RDP Packet
9290| [1005223] (Microsoft Responds) Microsoft Word Document Processing File Include Bug May Let Remote Users Obtain Files From a Target User's System
9291| [1005207] Microsoft Outlook Express Can Be Crashed By Remote Users Sending HTML Mail With Long Links Embedded
9292| [1005203] Microsoft Internet Explorer Frame Domain Security Bug Lets Remote Users Execute Arbitrary Code in the Local Computer Zone Via Frame URLs
9293| [1005200] Microsoft Internet Explorer Implementation Bugs in Java Native Methods May Let Remote Users Execute Arbitrary Code Via Malicious Applets
9294| [1005182] Microsoft Internet Explorer URL Decoding Inconsistency May Result in a Web Page Loading in the Incorrect Security Domain
9295| [1005177] Microsoft Visual FoxPro Filename Processing Bug Lets Remote Users Create HTML That Will Cause Arbitrary Code to Be Executed When the HTML is Loaded
9296| [1005150] Microsoft Windows Operating System Certificate Enrollment ActiveX Control Allows Remote Users to Delete Certificates on a Target User's System
9297| [1005128] Microsoft Internet Explorer XML Script Element Redirect Bug Lets Remote Users View XML Files on the Target User's Computer
9298| [1005127] Microsoft Visual Studio .NET Web Projects May Disclose the Web Directory Structure to Remote Users
9299| [1005123] Microsoft Internet Explorer Buffer Overflow in Unspecified Text Formatting ActiveX Control Lets Remote Users Execute Arbitrary Code
9300| [1005120] Microsoft Terminal Services Advanced Client (TSAC) ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code
9301| [1005119] Microsoft Operating System SMB Protocol Implementation in the Network
9302| [1005112] Microsoft File Transfer Manager ActiveX Control Buffer Overflow May Let Remote Users Execute Arbitrary Code
9303| [1005108] Microsoft Windows Media Player Allows Malicious Windows Media Download (.wmd) Files to Silently Create Files in a Known Location and Execute Them
9304| [1005075] Microsoft Internet Explorer XMLDSO Java Class Lets Remote HTML Code Access Local Files
9305| [1005071] Microsoft DirectX Files Viewer ActiveX Control Has Buffer Overflow That Allows Remote Users to Execute Arbitrary Code
9306| [1005070] Microsoft Internet Explorer (IE) Browser Error Message Processing Allows Remote Users to Execute Arbitrary Code on Certain Windows 98 Platforms
9307| [1005068] Microsoft NTFS Filesystem in Windows NT and Windows 2000 Has Auditing Hole That Lets Local Users Access Files Without the File Access Being Audited
9308| [1005067] Microsoft Desktop Engine (MSDE) Extended Stored Procedures May Let Local Users Execute Commands With Database Administrator Privileges
9309| [1005066] Microsoft SQL Server Extended Stored Procedures May Let Local Users Execute Commands With Database Administrator Privileges
9310| [1005065] Microsoft Network Connection Manager Could Give a Local User System Level Privileges
9311| [1005063] Microsoft Windows XP Help and Support Center Hole Lets Remote Users Create URLs That, When Loaded, Will Delete Arbitrary Files on Your System
9312| [1004986] Microsoft Content Management Server Buffer Overflow in Authentication Function May Allow Remote Users to Execute Arbitrary Code With System Level Privileges
9313| [1004983] Microsoft Visual C++ Flaw in calloc() and Similar Functions May Result in Buffer Overflows in Applications That Use the Compiler or Runtime Library
9314| [1004965] Microsoft Internet Explorer SSL Implementation Flaw in Following Certificate Chains Allows Remote Users to Conduct Man-in-the-Middle Attacks to Obtain Unencrypted Data from the Browser
9315| [1004927] Microsoft Terminal Services Can Be Crashed By Remote Users Conducting a TCP SYN Scan in Certain Situations
9316| [1004917] Microsoft SQL Server MDAC Function Buffer Overflow May Let Remote Users Execute Arbitrary Code to Gain Full Control Over the Database
9317| [1004877] Microsoft Internet Explorer (IE) Web Browser JavaScript 'Same Origin Policy' Flaw Allows Remote Users to Create Malicious JavaScript to Retrieve Web Data from a Victim's Internal Network
9318| [1004862] Microsoft Outlook Express Flaw in Parsing XML Using Internet Explorer Allows a Remote User to Silently Deliver and Install an Executable on a Target User's Computer
9319| [1004831] Microsoft Data Engine (MSDE) Buffer Overflow in Database Consistency Checker May Let Remote Authenticated Users Execute Arbitrary Code with the Privileges of the Database Service
9320| [1004830] Microsoft SQL Server Buffer Overflow in Database Consistency Checker May Let Remote Authenticated Users Execute Arbitrary Code with the Privileges of the Database Service
9321| [1004829] Microsoft SQL Server Resolution Service Buffer Overflows Let Remote Users Execute Arbitrary Code with the Privileges of the SQL Service
9322| [1004828] Microsoft Exchange Server Buffer Overflow in Processing SMTP EHLO Command Lets Remote Users Execute Arbitrary Code on the Server with System Level Privileges
9323| [1004827] Microsoft Metadirectory Services Authentication Flaw May Let Remote Users Modify Data and Obtain Elevated Privileges on the System
9324| [1004805] Microsoft Outlook Express (and Possibly Outlook) Has File Attachment Name Bugs That Let Remote Users Send Malicious Mail to Bypass Attachment Type Filters and Modify the Apparent File Name and File Size
9325| [1004761] Microsoft Foundation Classes (MFC) Information Server Application Programming Interface (ISAPI) 'mfc42.dll' Contains Buffer Overflows That Can Crash the System or Possibly Allow for the Remote Execution of Arbitrary Code
9326| [1004746] Microsoft Internet Explorer Flaw in OBJECT Domain Security Enforcement Lets Remote Users Execute Code in Arbitrary Domains
9327| [1004744] Microsoft SQL Server Install Process May Disclose Sensitive Passwords to Local Users
9328| [1004739] Microsoft SQL Server Desktop Engine (MSDE) Buffer Overflow and Access Control Bug May Let Remote Authorized Users Execute Code with Elevated Privileges, Possibly Including Local System Privileges
9329| [1004738] Microsoft SQL Server Buffer Overflow and Access Control Bug May Let Remote Authorized Users Execute Code with Elevated Privileges, Possibly Including Local System Privileges
9330| [1004637] Microsoft Commerce Server Buffer Overflows and Other Flaws Let Remote Users Execute Arbitrary Code with LocalSystem Privileges
9331| [1004618] Microsoft Internet Explorer Can Be Crashed By Malicious AVI Object in HTML
9332| [1004595] Microsoft Word Documents May Execute Remotely Supplied Macro Code Under Certain Conditions
9333| [1004594] Microsoft Excel Spreadsheet May Execute Remotely Supplied Macro Code Within Malicious Documents
9334| [1004587] Microsoft SQL Server 2000 Buffer Overflow in OpenDataSource() Function May Let Remote Users Gain SYSTEM Privileges on the Server
9335| [1004569] Microsoft Visual Studio .NET Korean Language Version Contains Nimda Virus
9336| [1004544] Microsoft SQL Server Buffer Overflow in 'pwdencrypt()' Function May Let Remote Authorized Users Execute Arbitrary Code
9337| [1004542] Lumigent Log Explorer Buffer Overflow May Let Remote Users Crash the Microsoft SQL Server Service or Execute Arbitrary Code on the System
9338| [1004541] Compaq Insight Manager May Include a Vulnerable Default Configuration of Microsoft MSDE/SQL Server That Allows Remote Users to Execute Commands on the System
9339| [1004529] Microsoft Remote Access Service (RAS) Phonebook Buffer Overflow May Let Local Users Execute Arbitrary Code with Local System Privileges
9340| [1004528] Microsoft SQLXML Component of Microsoft SQL Server 2000 Contains an Input Validation Flaw in an XML SQL Tag That Allows Cross-Site Scripting Attacks
9341| [1004527] Microsoft SQLXML Component of Microsoft SQL Server 2000 Contains a Buffer Overflow That Lets Remote Users Take Full Control of the System
9342| [1004518] Microsoft Proxy Server Buffer Overflow in Processing Gopher Protocol Responses Allows Remote Users to Execute Code on the Server to Gain Full Control of the Server
9343| [1004517] Microsoft Internet Security and Acceleration Server (ISA) Buffer Overflow in Processing Gopher Protocol Responses Allows Remote Users to Execute Code on the Server to Gain Full Control of the Server
9344| [1004486] Microsoft ASP.NET Buffer Overflow in Processing Cookies in StateServer Mode May Let Remote Users Crash the Service or Execute Arbitrary Code on the Server
9345| [1004479] Microsoft Internet Explorer May Execute Remotely Supplied Scripting in the My Computer Zone if FTP Folder Viewing is Enabled
9346| [1004464] Microsoft Internet Explorer Buffer Overflow in Processing Gopher Protocol Responses Allows Remote Users to Execute Code on the Victim's Computer
9347| [1004441] Microsoft Windows Help System Buffer Overflows in 'htctrl.ocx' ActiveX Control May Let Remote Users Execute Arbitrary Code on a Target User's Computer By Sending Malicious HTML
9348| [1004436] Microsoft Internet Explorer Allows HTML-Delivered Compiled Help Files to Be Automatically Executed on the Target User's Computer
9349| [1004407] Microsoft Exchange 2000 Flaw in Processing a Certain Malformed SMTP Command Allows Remote Users to Deny Service to the Server
9350| [1004372] Microsoft Excel Spreadsheet XML Stylesheet ActiveX Object Flaw Lets Remote Users Create Malicious Excel Spreadsheets That May Execute Arbitrary Code When Opened With the XML Stylesheet Option
9351| [1004369] Microsoft Active Directory May Have Bug That Allows Remote Users to Crash the Directory
9352| [1004361] Microsoft Date Engine (MSDE) Default Configuration Leaves Blank Password for System Administrator Account
9353| [1004360] Opty-Way Enterprise Glassworks Management Application Installs Microsoft Data Engine Insecurely, Allowing Remote Users to Execute Commands on the System
9354| [1004357] Microsoft Windows Debugging Facility for Windows NT4 and 2000 Has Authentication Hole That Lets Local Users Execute Arbitrary Code with SYSTEM Privileges
9355| [1004304] Microsoft Internet Explorer (IE) New Content-Disposition Bugs May Let Remote Users Execute Arbitrary Code on the Victim's Computer
9356| [1004300] Microsoft Internet Explorer (IE) Zone Spoofing Hole Lets Remote Users Create HTML That, When Loaded, May Run in a Less-Secure IE Security Zone
9357| [1004290] Microsoft Internet Explorer Bugs in 'BGSOUND' and 'IFRAME' Tags Let Remote Users Create HTML That Will Cause Denial of Service Conditions or Will Access Special DOS Devices
9358| [1004251] Microsoft Exchange Instant Messenger ActiveX Control Has 'ResDLL' Parameter Buffer Overflow That Lets Remote Users Execute Arbitrary Code
9359| [1004250] Microsoft MSN Messenger Includes an ActiveX Control That Has 'ResDLL' Parameter Buffer Overflow That Lets Remote Users Execute Arbitrary Code
9360| [1004249] Microsoft MSN Chat Control ActiveX Control Has 'ResDLL' Parameter Buffer Overflow That Lets Remote Users Execute Arbitrary Code
9361| [1004236] L.Y.S.I.A.S. Lidik Web Server for Microsoft Windows Systems Lets Remote Users View Files Located Anywhere on the Partition
9362| [1004229] Microsoft Office 'Word Mail Merge' Feature Allows Remote Users to Cause Arbitrary Programs to Be Executed on the Target User's Computer
9363| [1004226] Microsoft MSN Messenger Instant Messaging Client Malformed Header Processing Flaw Lets Remote Users Crash the Client
9364| [1004197] Microsoft Internet Explorer Can Be Crashed By Incorrectly Sized XBM Graphics Files
9365| [1004157] Microsoft Outlook Weak Security Enforcement When Editing Messages with Microsoft Word Lets Remote Users Send Malicious Code to Outlook Recipients That Will Be Executed When Forwarded or Replied To
9366| [1004146] Microsoft Internet Explorer Browser Can Be Crashed By Remote HTML Containing Malicious Image Tags That Cause Infinite Processing Loops
9367| [1004130] Microsoft MSN Messenger Instant Messaging Client Discloses Buddy List to Local Users
9368| [1004121] Microsoft Internet Explorer Web Browser Can Be Crashed By Remote Users With OLE OBJECT Element Dependency Loops
9369| [1004109] Microsoft Distributed Transaction Coordinator Can Be Crashed By Remote Users Sending Malformed Packets
9370| [1004090] Microsoft Back Office Web Administration Authentication Mechanism Can Be Bypassed By Remote Users
9371| [1004083] Microsoft Windows 2000 'microsoft-ds' Service Flaw Allows Remote Users to Create Denial of Service Conditions By Sending Malformed Packets
9372| [1004079] Microsoft Internet Explorer (IE) 'dialogArguments' Flaw Lets Remote Users Conduct Cross-Site Scripting Attacks Against IE Users
9373| [1004051] Microsoft Outlook Express for Mac OS Has Buffer Overflow in Processing the 'file://' URL That Allows Remote Users to Cause Arbitrary Code to Be Executed
9374| [1004050] Microsoft Office for Mac OS Has Buffer Overflow in Processing the 'file://' URL That Allows Remote Users to Cause Arbitrary Code to Be Executed
9375| [1004049] Microsoft Internet Explorer for Mac OS Has Buffer Overflow in Processing the 'file://' URL That Allows Remote Users to Cause Arbitrary Code to Be Executed
9376| [1004048] Microsoft Word Object Creation Flaw Lets Remote Users Create ActiveX That Will Consume Memory on the Victim's Computer
9377| [1004022] Microsoft Windows 2000 Group Policy Object Enforcement Can Be Circumvented if User License Limits are Exceeded
9378| [1004014] Microsoft Internet Information Server ASP HTTP Header Processing Buffer Overflow Lets Remote Users Execute Arbitrary Code on the Server
9379| [1004008] Microsoft Internet Information Server Comes With Code That Allows Remote Users to Conduct Cross-Site Scripting Attacks
9380| [1004005] Microsoft Internet Information Server Buffer Overflow in Chunked Encoding Mechanism Lets Remote Users Run Arbitrary Code on the Server
9381| [1004002] Microsoft Office Web Components Let Remote Users Determine if Specified Files Exist on Another User's Host
9382| [1004001] Microsoft Office Web Components Let Remote Users Gain Full Read and Write Control Over Another User's Clipboard, Even if Clipboard Access Via Scripts is Disabled
9383| [1004000] Microsoft Office Web Components Let Remote Users Write Code to Run in the Victim's Local Security Domain and Access Local or Remote Files
9384| [1003999] Microsoft Office Web Components in Office XP Lets Remote Users Cause Malicious Scripting to Be Executed By Another User's Browser Even If Scripting is Disabled
9385| [1003975] Microsoft Windows NT, 2000, and XP Kernel Buffer Overflow in Processing Multiple UNC Provider (MUP) Requests May Let Local Users Obtain System Level Privileges
9386| [1003949] Microsoft Windows 2000 DCOM Implementation Flaw May Disclose Memory Contents to Remote Users
9387| [1003948] Microsoft Internet Explorer Cascading Style Sheets (CSS) Invalid Attribute Bug Lets Remote Users Read Portions of Files on the Victim's Computer
9388| [1003932] Microsoft Office XP Active Content Bug Lets Remote Users Cause Code to Be Executed on an Office User's Computer
9389| [1003922] Microsoft Outlook Web Access With SecurID Authentication May Allow Remote Users to Avoid the SecurID Authentication in Certain Cases
9390| [1003915] Microsoft Internet Explorer Browser Security Zone Flaw Lets Remote Users Cause Cookie-based Scripts to Be Executed on Another User's Browser in the Incorrect Security Domain
9391| [1003907] Microsoft Internet Explorer Discloses The Existence of and Details of Local Files to Remote Users
9392| [1003871] Microsoft .NET Unspecified Vulnerabilities May Allow a Remote User to Cause Arbitrary Code to Be Executed on Another User's Systems
9393| [1003856] Microsoft Internet Explorer Can Be Crashed By Malicious 'location.replace' Javascript
9394| [1003839] Microsoft Internet Explorer (IE) 6 Lets Remote Users Cause Files to Be Downloaded and Executed Without the Knowledge or Consent of the Victim
9395| [1003816] Microsoft Windows 2000 Automatic Log Off Policy Fails to Expire Sessions in Progress
9396| [1003800] A Multitude of Microsoft SQL Server Extended Stored Procedures Have Buffer Overflows That Allow Remote Users to Crash the Database Server or Execute Arbitrary Code on the Server to Gain Full Control of the System
9397| [1003764] Microsoft Windows Operating System Shell URL Handler Bug Lets Remote Users Create HTML That Could Cause Arbitrary Code to Be Executed on Another User's System in Certain Situations
9398| [1003756] Microsoft Internet Information Server 4.0 .HTR Web Application Lets Users Change Their Passwords When the NT Security Policy is Configured to Prohibit Password Changing
9399| [1003744] Microsoft SQL Server 'xp_dirtree' Buffer Overflow Lets Users Crash the Database Service
9400| [1003730] Microsoft Java Virtual Machine in Internet Explorer Lets Remote Malicious Applets Redirect Web Proxy Connections
9401| [1003688] Microsoft Exchange Server 2000 Command Processing Bug Lets Remote Users Cause the SMTP Service to Crash
9402| [1003687] Microsoft Windows 2000 and Windows XP SMTP Service Command Processing Bug Lets Remote Users Cause the SMTP Service to Crash
9403| [1003686] Microsoft Windows SMTP Service Lets Remote Users Send or Relay Unauthorized Mail (including SPAM) Via the Server
9404| [1003685] Microsoft Exchange Server Lets Remote Users Send or Relay Unauthorized Mail (including SPAM) Via the Server
9405| [1003634] Microsoft XML Core Services in SQL Server 2000 Lets Remote Scripts Access and Send Local Files
9406| [1003633] Microsoft XML Core Services in Microsoft Windows XP Operating System Lets Remote Scripts Access and Send Local Files
9407| [1003630] Microsoft Internet Explorer Has Another Frame Domain Security Bug That Lets Remote Users View Files or Other Personal Information from a Victim's Computer By Using Malicious VBScripts
9408| [1003629] Microsoft Commerce Server 2000 AuthFilter Buffer Overflow Lets Remote Users Execute Arbitrary Code on the Server With LocalSystem Privileges to Gain Full Control of the Server
9409| [1003611] Gator Plugin for Microsoft Internet Explorer Lets Remote Users Install Arbitrary Software on the User's Host
9410| [1003605] Microsoft SQL Server Buffer Overflow Lets Remote Users Crash the Server and May Allow Remote Code to Be Executed on the Database Server
9411| [1003597] Microsoft Outlook Web Access Discloses 'Include' Archive Files in the 'lib' Directory to Remote Users
9412| [1003591] Microsoft Windows Terminal Services May Cause the System's Screen Saver Lockout Mechanism to Fail in Certain Situations
9413| [1003582] Microsoft Internet Security Acceleration Server Can Be Affected By Remote Users Conducting a LAND Flood Attack
9414| [1003556] Microsoft Visual C++ Compiler Buffer Security Mode Does Not Eliminate Buffer Overflows in Compiled Applications
9415| [1003546] Microsoft Outlook E-mail Client May Display Potentially Malicious File Attachments Illegally Embedded Within Mail Headers
9416| [1003540] Microsoft Internet Explorer Browser MIME Flaw Causes 'text/plain' Pages to Be Displayed as HTML and Any Embedded Scripting to Be Executed By the Browser
9417| [1003538] NetWin CWMail Web-Mail Server Buffer Overflow Lets Remote Users Execute Arbitrary Code on the System With the Privileges of the IIS Web Server
9418| [1003519] Microsoft Internet Explorer (IE) HTML Directive Buffer Overflow Lets Remote Users Cause Arbitrary Code to Be Executed on Another User's Computer
9419| [1003517] Microsoft Internet Explorer (IE) 'Content-Type' Processing Hole Lets Remote Users Open Applications on Another User's Computer
9420| [1003516] Microsoft Internet Explorer (IE) Web Browser Has New Frame Domain Verification Bug That Lets Remote Users Obtain Files from Another User's Local File System
9421| [1003472] Microsoft Telnet Server for Windows 2000 and for Interix Has a Buffer Overflow That May Let Remote Users Execute Code on the Server with System Level Privileges
9422| [1003469] Microsoft Exchange 2000 Server Allows Remote Users to View and Possibly Modify Registry Settings
9423| [1003462] Microsoft Internet Explorer Web Browser Allows Cross-site Scripting Attacks Via Non-HTTP Servers
9424| [1003458] Microsoft Office v. X for Mac OS X Can Be Crashed By Remote Users Sending Malformed Product Identification Packets
9425| [1003446] Microsoft Internet Information Server Can Be Stopped By Local Users Removing Virtual Directories in a Shared Hosting Environment
9426| [1003434] Microsoft ASP.NET Web Application Framework Allows Cross Site Scritping Attacks and Discloses Path Information to Remote Users
9427| [1003420] Microsoft Site Server Commerce Edition Discloses Potentially Sensitive Administration Information and Source Code to Remote Users With Valid Accounts and Discloses User Passwords from the LDAP Directory to Anonymous Remote Users
9428| [1003419] Microsoft Site Server Commerce Edition Lets Remote Users With Valid NT Accounts Upload and Then Execute ASP Scripts on the Server or Consume Disk Space on the Server
9429| [1003415] Microsoft Distributed Transaction Coordinator (MSDTC) Service Can Be Crashed By Remote Users
9430| [1003402] Microsoft Windows NT 4.0 and Windows 2000 Domain Controllers May Give Elevated Privileges to Remote Users Who Are Valid Administrators on Other Trusted Domains
9431| [1003369] PGPfire Personal Firewall for Microsoft Windows Discloses Identifying Information to Remote Users
9432| [1003326] Microsoft Internet Explorer for Macintosh OS Executes Remotely Supplied Commands in AppleScripts
9433| [1003310] Microsoft Windows NT/2000 Authentication Lockout Bug May Record Successful Logins as Failed Login Attempts in Certain Situations
9434| [1003308] Microsoft Windows XP Manifest Processing Bug Lets Local Users Corrupt the System and Cause the Boot Process to Fail
9435| [1003257] Microsoft Windows XP Upgrade Effectively Removes Patches from Internet Explorer (IE) During Upgrade, Leaving Users Exposed to IE Vulnerabilities
9436| [1003239] Python Language Implementation on Microsoft Windows Allows a Remote Server to Access Files on a Web Surfing User's PC
9437| [1003228] Microsoft Windows Media Player Discloses Unique ID to Remote Users in the Default Configuration, Allowing Web Sites to Track Users
9438| [1003221] Microsoft Internet Explorer (IE) Default Configuration Allows HTML-based Scripts to Access Your Windows Clipboard Contents
9439| [1003215] Microsoft Internet Explorer Popup Object Tag Flaw Lets Remote Users Execute Programs on the Browser's Host
9440| [1003201] Microsoft Windows 95 Backup Utility Has Buffer Overflow That Could Cause Denial of Service Conditions
9441| [1003135] Microsoft Internet Explorer Can Be Crashed By Remote Users With Javascript That Calls an Endless Loop of Modeless Dialogs
9442| [1003121] Microsoft Windows XP Task Manager Will Not Kill Certain Processes
9443| [1003109] Microsoft Internet Explorer (IE) May Allow Malicious Javascript to Poll a User's System for Known Files
9444| [1003084] Microsoft Internet Explorer GetObject() Active Scripting Bug Lets Remote Code Access Files on the PC
9445| [1003050] Microsoft Internet Explorer Web Browser Can Be Crashed By Malicious Image Source Tag Javascript Supplied By Remote Users
9446| [1003049] Microsoft Internet Explorer (IE) Text Form Processing Flaw May Cause IE to Crash
9447| [1003043] PGP Plug-in For Microsoft Outlook May Fail to Encrypt E-mail in Certain Situations
9448| [1003042] Microsoft Internet Explorer Web Browser SSL Security Flaw Lets Remote Users Conduct Man-in-the-Middle Attacks to Access Sensitive Information
9449| [1003041] Microsoft Windows XP Remote Desktop Client May Disclose Recently Used Account Names to Remote Users
9450| [1003040] Microsoft Excel Password Protection Flaw Lets Local Users Obtain Contents of Password-Protect Cells
9451| [1003033] Microsoft C Runtime Format String Flaw Lets Remote Users Crash the Microsoft SQL Server Service
9452| [1003032] Microsoft SQL Server Buffer Overflow Lets Remote Users Execute Arbitrary Code in the Security Context of the SQL Server
9453| [1003028] Microsoft Windows Universal Plug and Play Component Buffer Overflow Gives Remote Users System Level Access to Windows XP and 98/ME Hosts
9454| [1003024] Microsoft Internet Explorer (IE) Web Browser 'document.open()' Scripting Flaw Lets Remote Users Steal Cookies, Read Local Files, and Spoof Web Sites
9455| [1003003] Microsoft Windows XP Hot Key Function Lets Physically Local Users Execute Administrator Hot Key Functions in Certain Situations
9456| [1002986] Microsoft Internet Explorer Version 6 Lets Remote Scripts Access and Send Local Files
9457| [1002979] Microsoft Windows Explorer Discloses Stored FTP Passwords to Local Users
9458| [1002973] Microsoft Internet Explorer (IE 6) Browser May Automatically and Silently Execute Arbitrary Code from a Remote Web Site When the User Views a Web Page or HTML-based E-mail
9459| [1002957] Microsoft Internet Information Server Can Be Crashed By Remote Users With HTTP Requests Containing Invalid Content-Length Values
9460| [1002942] Microsoft Internet Explorer May Execute Javascript Contained Within an 'About:' URL in an Unauthorized Security Domain When the URL Contains an Extraneous '%' Character
9461| [1002926] Microsoft Windows Operating System File Locking Design May Allow Local Users to Block Group Policy Scripts
9462| [1002922] Microsoft Windows 2000 Internet Key Exchange (IKE) Service Can Be Crashed By Remote Users
9463| [1002919] Microsoft Internet Explorer Browser Can Be Crashed By Certain Image Tags
9464| [1002915] Microsoft Outlook Web Access for Exchange May Execute Remotely Supplied Scripts When a Recipient Views a Malicious E-mail Message
9465| [1002885] Microsoft Internet Explorer Can Be Crashed By Malicious Javascript Causing a Stack Overflow in setTimeout() Function
9466| [1002823] Microsoft Internet Explorer Fails to Enforce Cookie Prompting Preferences for Local Security Zone
9467| [1002820] Microsoft Internet Explorer Allows Malicious Web Pages to Spoof Downloadable File Types And Execute Code on the User's Computer When Opened Directly from the Browser
9468| [1002819] Microsoft Internet Explorer ActiveX Flaw Permits Remote Malicious HTML Code Containing an 'htmlfile' or 'htmlfile_FullWindowEmbed' Object to Access Local Files and Potentially Execute Commands
9469| [1002802] Microsoft Help and Support Center Software (helpctr.exe) Has Buffer Overflow That May Allow a Remote User to Cause Arbitrary Code to Be Executed on a User's PC
9470| [1002773] Titan Application Firewall for IIS Web Server Fails to Decode URLs, Letting Remote Users Bypass URL-based Firewall Restrictions
9471| [1002772] Microsoft Internet Explorer Cookie Disclosure Fix Discloses Patch Information to Remote Users
9472| [1002754] Terminal Services on Microsoft Windows 2000 and XP Allow Remote Users to Log Bogus IP Addresses Instead of the User's Genuine Address
9473| [1002731] Microsoft Windows 2000 RunAs Service May Disclose Authentication Credentials to Local Users
9474| [1002730] Microsoft Windows 2000 RunAs Utility May Disclose Sensitive Information to Local Users
9475| [1002729] Microsoft Windows 2000 RunAs Service Allows Local Users to Disable the Service
9476| [1002728] Microsoft SQL Server May Disclose Database Passwords When Creating Data Transformation Service (DTS) Packages
9477| [1002702] Microsoft Passport May Disclose Wallet Contents, Including Credit Card and Contact Information, to Remote Users
9478| [1002693] Microsoft Internet Security and Acceleration Server UDP Fragmentation Processing Can Cause 100% of CPU Resources to Be Consumed
9479| [1002601] Microsoft Windows Me Universal Plug and Play (UPnP) Ssdpsrv.exe Server Component Can Be Crashed by Remote Users
9480| [1002595] Microsoft Internet Explorer Has Fixed Security Zone for about: URLs and Has Shared Cookie Flaw That Diminishes Cross-Site Scripting Protections
9481| [1002594] Microsoft Internet Explorer for Mac OS X is Configured to Automatically Execute Downloaded Files
9482| [1002581] Microsoft Terminal Servers Can Be Crashed By Remote Users Sending Certain Remote Desktop Protocol (RDP) Packets
9483| [1002560] Internet Explorer Sends Potentially Sensitive Web Browser Contents to Microsoft via the Network When an Error Occurs
9484| [1002559] Microsoft Office XP Sends Potentially Sensitive Information to Microsoft Via the Network When an Error Occurs
9485| [1002526] Microsoft Internet Explorer (IE) Web Browser Has Multiple URL-related Flaws That May Allow for Remote Code Execution, Remote HTTP Request Generation, and Application of Incorrect Security Restrictions
9486| [1002519] TYPSoft FTP Server for Microsoft Windows Can Be Crashed by Remote Users
9487| [1002487] Microsoft PowerPoint Macro Security Features Can Be Bypassed by Malformed PowerPoint Documents
9488| [1002486] Microsoft Excel Macro Security Features Can Be Bypassed by Malformed Excel Documents
9489| [1002456] Microsoft Outlook Web Access Directory Validation Flaw Lets Remote Users Consume CPU Resources by Requesting Mail from Nested Folders
9490| [1002421] Microsoft Index Server Sample File Discloses File Information to Remote Users
9491| [1002418] Counterpane's Password Safe Password Encryption Utility for Microsoft Windows May Disclose Passwords to Local Users in Certain Situations
9492| [1002413] Microsoft Outlook Express Will Execute Active Scripting in Plain Text E-mail Messages, Circumventing Some Scripting Controls
9493| [1002394] Microsoft Windows NT Remote Procedure Call (RPC) Services Can Be Crashed With Malformed Packets
9494| [1002385] Norton Anti-Virus For Microsoft Exchange Discloses User Path Information to Remote Users
9495| [1002356] Microsoft Outlook 2000 Animated Assistant Prevents the Screen Saver from Activating, Allowing Physically Local Users to Access the System
9496| [1002331] Internet Security Systems RealSecure Intrusion Detection Misses '%u' Encoded Attacks Against Microsoft Web Servers
9497| [1002330] Cisco Catalyst 6000 Intrusion Detection System Module Fails to Detect '%u' Encoding Obfuscation Attacks Against Microsoft Web Servers
9498| [1002329] Dragon Sensor Intrusion Detection System Does Not Detect Certain Attacks Against Microsoft Web Servers
9499| [1002327] Snort Network Intrusion Detection System Will Not Detect '%u' URL Encoding Attacks Against Microsoft Web Servers
9500| [1002326] Cisco Secure Intrusion Detection System (NetRanger) Fails to Detect Certain Attacks Against Microsoft Web Servers
9501| [1002317] Microsoft DNS Server Software Susceptible to DNS Cache Poisoning in Default Configuration, Allowing Remote Users to Inject False DNS Records in Certain Situations
9502| [1002269] Microsoft Outlook Web Access with SSL Can Be Crashed by Remote Users
9503| [1002206] Microsoft Internet Security and Acceleration (ISA) Server 2000 Can Be Disrupted By Remote Users Due to Memory Leaks and Also Allows Cross-Site Scripting Attacks
9504| [1002201] Microsoft Windows TCP/IP Stack Vulnerable to a Certain Man-in-the-Middle Denial of Service Attack
9505| [1002197] Microsoft Windows NNTP Network News Service Has a Memory Leak That Allows Remote Users to Cause the Server to Crash
9506| [1002124] Microsoft Windows 98 Operating System Can Be Crashed When Running a Web Server or Other Servers And the AUX Device is Accessed By the Program
9507| [1002106] Microsoft Windows 2000 and Windows NT 4.0 RPC Input Validation Failure Lets Remote Users Destabilize the Operating System
9508| [1002105] Microsoft SQL Database Server RPC Input Validation Failure Lets Remote Users Crash the Database Service
9509| [1002104] Microsoft Exchange Server RPC Input Validation Failure Lets Remote Users Crash the Exchange Service
9510| [1002099] Microsoft Windows 2000 Telnet Service Can Be Crashed By Remote Users
9511| [1002098] Windows Terminal Services in Microsoft Windows 2000 and NT 4.0 Can Be Crashed By Remote Users Due to a Memory Leak
9512| [1002075] Microsoft Services for Unix Memory Leak in Telnet and NFS Services Allows Remote Users to Crash the Operating System
9513| [1002028] Microsoft Exchange LDAP Service Can Be Crashed By Remote Users
9514| [1001993] Microsoft Windows 2000, Linux 2.4, NetBSD, FreeBSD, and OpenBSD May Let Remote Users Affect TCP Performance
9515| [1001992] Microsoft Windows NT Lets Remote Users Cause Increased Packet Overhead and Increased CPU Resource Consumption
9516| [1001984] Microsoft Outlook Allows Rogue HTML to Execute Arbitrary Commands on the User's Host
9517| [1001931] Microsoft Windows 2000 SMTP Service May Allow Unauthorized Remote Users to Relay E-mail via the Service
9518| [1001923] Microsoft's Internet Information Server's ASP Processor Can Be Crashed by Remote Users in Certain Situations
9519| [1001832] Microsoft Windows 2000 LDAP Server Lets Remote Users Gain Administrator Access to the Domain Controller When Configured to Support LDAP over SSL
9520| [1001819] Microsoft NetMeeting Can Be Crashed By Remote Users
9521| [1001816] Microsoft Visual Studio RAD Support Component of FrontPage Lets Remote Users Execute Arbitrary Code on the FrontPage Server
9522| [1001815] Microsoft Word May Execute Macros in Malformed Word Documents Without Warning Even if Macros are Disabled
9523| [1001775] Microsoft Index Server Lets Remote Users Execute Arbitrary Code With System Level Privileges, Giving Remote Users Full Control of the Operating System
9524| [1001734] Microsoft SQL Server May Let Remote Authenticated Users Take Full Control of the Database Server and the Underlying Operating System
9525| [1001701] Microsoft Windows 2000 Telnet Server Allows Local Users to Gain System-Level Privileges and Lets Remote Users Crash the Server
9526| [1001699] Microsoft Internet Explorer Web Browser May Allow Remote Users to Read Some Text Files on the Browser's Hard Drive
9527| [1001696] Microsoft Exchange Server's Outlook Web Access (OWA) Lets Remote Users Execute Arbitrary Code on the OWA User's Web Browser
9528| [1001687] Microsoft Outlook Express May Allow A Remote User to Obtain E-mail Destined for a Different User
9529| [1001661] Microsoft Hotmail May Allow a Worm to Send Mail to Other Destinations Listed in a Remote User's Inbox
9530| [1001605] Microsoft Windows 2000 Allows Local Users to Elevate Privileges
9531| [1001603] Microsoft Windows Media Player May Allow Remote Users to Execute Code Contained in Internet Shortcuts and View Files on the Media Player's Host
9532| [1001587] Microsoft Word for Windows and for Mac May Run Macros Linked By RTF Documents Without Warning
9533| [1001572] Apache Web Server on Microsoft Windows Platforms Allows Remote Users to Crash the Web Server
9534| [1001562] Microsoft Internet Explorer Allows Remote Web Sites to Cause a Different Web URL Address to Be Displayed in the Browser's Address Bar, Allowing Rogue Web Sites to Spoof the Browser and Masquerade as Different Web Sites
9535| [1001561] Microsoft Internet Explorer Web Browser Fails To Validate Digital Certificates in Some Configurations, Allowing Rogue Secure Web Sites to Spoof the Browser and Masquerade as a Different Secure Web Site
9536| [1001538] Older Version of Microsoft Internet Explorer Web Browser Can Be Crashed By Remote Users
9537| [1001537] Microsoft's Internet Information Server's FTP Services May Give Remote Users Information About User Account Names on the Server's Domain and Trusted Domains
9538| [1001535] Microsoft's Internet Information Server's FTP Services Can Be Crashed By Remote Users
9539| [1001513] Microsoft Windows 2000 Indexing Service Allows Remote Users to View Include Programming Files
9540| [1001512] Microsoft Index Server for NT Can Be Crashed By Local Users, Allows Local Users to Execute Arbitrary Code With System Level Privileges, and Lets Remote Users View Certain Include Files
9541| [1001501] Microsoft Windows 2000 Domain Controllers Can Be Effectively Halted By Remote Users
9542| [1001467] Microsoft Windows Media Player ASX Processing Vulnerability Lets Remote Users Execute Arbitrary Code on the Player's Host System
9543| [1001445] Microsoft Internet Security and Acceleration Server May Allow Remote Users to Execute Arbitrary Code on the Firewall
9544| [1001424] Microsoft Internet Explorer Can Consume All Memory Due to Malicious HTML Code
9545| [1001380] Microsoft Internet Explorer and Outlook Express May Execute Arbitrary Code Without User Authorization or Intervention
9546| [1001360] Microsoft Windows Operating System DLL May Allow Malicious Remote Scripts to Run Code on the User's Host Without the User's Intervention
9547| [1001344] Microsoft Internet Explorer May Not Display File Extensions in Certain Cases
9548| [1001330] Microsoft ActiveSync Software for Portable Computing Devices Allows Portable Devices to Access Files on a Locked Server
9549| [1001319] Microsoft Internet Security and Acceleration Server Can Be Crashed By Remote Users
9550| [1001311] Netscape's SmartDownload Can Automatically Execute Arbitrary Code Without User Intervention or Knowledge for Both Netscape and Microsoft Browsers
9551| [1001255] Microsoft's Ping.exe Allows Local Users to Cause Certain Applications to Crash
9552| [1001240] Microsoft FTP Client for Windows 2000 Still Vulnerable to Executing Arbitrary Code in Limited Situations
9553| [1001221] E-Mail Clients that use Microsoft Internet Explorer to Process HTML May Disguise Executable Attachments as Data Files
9554| [1001219] Microsoft's Internet Security and Acceleration Server Performance Can Be Significantly Affected By Remote Users Under Certain Configurations
9555| [1001216] Microsoft Internet Explorer Can Be Made to Execute Arbitrary Files on the User's Computer
9556| [1001211] TrendMicro's ScanMail E-Mail Virus Scanner for Microsoft Exchange Discloses Administrative System Usernames and Passwords
9557| [1001210] Microsoft Internet Explorer Allows Malicious Web Pages to Retrieve Files from the User's Computer
9558| [1001209] Microsoft Telnet Can Be Crashed Locally, Causing Other Applications Including Outlook Express To Crash
9559| [1001197] Microsoft Internet Explorer May Automatically Execute Certain E-mail Attachments
9560| [1001187] Microsoft Internet Explorer Is Vulnerable to Malicious Web Pages That May Obtain the User's Exchange E-mail Messages and May Access Restricted Web Server Directory Listings
9561| [1001186] Microsoft Windows Me Operating System and Windows 98 with the Plus! 98 Package Disclose Data Compression Passwords
9562| [1001172] Microsoft Visual Studio Could Allow Users to Crash the Debugger or to Execute Code on the Server
9563| [1001163] Microsoft's Dr. Watson Diagnostic Utility May Reveal Passwords and Other Sensitive Information
9564| [1001147] Microsoft Outlook Express Crashes When Reading Certain E-mail Messages
9565| [1001142] Microsoft Internet Explorer Does Not Check for Revoked Digital Certificates (Two Fraudlent Certificates Are Known to Exist)
9566| [1001139] SurfControl for Microsoft Proxy Server May Fail to Block Sites
9567| [1001123] Microsoft's FTP Server May Allow Remote Users to Deny Service on the Server
9568| [1001110] A Microsoft German-Language Hotfix for Windows NT 4 Incorrectly Displays Some Security Events as Other Security Events
9569| [1001088] Microsoft Internet Explorer with Services for Unix 2.0 Can Create Malicious Files on the User's Host
9570|
9571| OSVDB - http://www.osvdb.org:
9572| [91195] Microsoft Windows 7 Unspecified ASLR Protection Mechanism Bypass
9573| [91194] Microsoft Windows 7 Kernel Unspecified Local Privilege Escalation (pwn2own)
9574| [91193] Microsoft Windows 7 Unspecified ASLR / DEP Protection Mechanism Bypass (pwn2own)
9575| [85619] Microsoft Windows Phone 7 X.509 Certificate Subject's Common Name (CN) Field Domain Name Validation Multiple Protocol SSL Server MitM Spoofing Weakness
9576| [67783] Microsoft Windows SDK for Windows 7 / .NET Framework 4 GraphEdit Path Subversion Arbitrary DLL Injection Code Execution
9577| [87555] Adobe ColdFusion for Microsoft IIS Unspecified DoS
9578| [87262] Microsoft IIS FTP Command Injection Information Disclosure
9579| [87261] Microsoft IIS Log File Permission Weakness Local Password Disclosure
9580| [86899] Microsoft IIS 302 Redirect Message Internal IP Address Remote Disclosure
9581| [83771] Microsoft IIS Tilde Character Request Parsing File / Folder Name Information Disclosure
9582| [83454] Microsoft IIS ODBC Tool ctguestb.idc Unauthenticated Remote DSN Initialization
9583| [83386] Microsoft IIS Non-existent IDC File Request Web Root Path Disclosure
9584| [82848] Microsoft IIS $INDEX_ALLOCATION Data Stream Request Authentication Bypass
9585| [76237] Microsoft Forefront Unified Access Gateway IIS NULL Session Cookie Parsing Remote DoS
9586| [71856] Microsoft IIS Status Header Handling Remote Overflow
9587| [70167] Microsoft IIS FTP Server Telnet IAC Character Handling Overflow
9588| [67980] Microsoft IIS Unspecified Remote Directory Authentication Bypass
9589| [67979] Microsoft IIS FastCGI Request Header Handling Remote Overflow
9590| [67978] Microsoft IIS Repeated Parameter Request Unspecified Remote DoS
9591| [66160] Microsoft IIS Basic Authentication NTFS Stream Name Permissions Bypass
9592| [65216] Microsoft IIS Extended Protection for Authentication Memory Corruption
9593| [62229] Microsoft IIS Crafted DNS Response Inverse Lookup Log Corruption XSS
9594| [61432] Microsoft IIS Colon Safe Extension NTFS ADS Filename Syntax Arbitrary Remote File Creation
9595| [61294] Microsoft IIS ASP Crafted semicolon Extension Security Bypass
9596| [61249] Microsoft IIS ctss.idc table Parameter SQL Injection
9597| [59892] Microsoft IIS Malformed Host Header Remote DoS
9598| [59621] Microsoft IIS CodeBrws.asp Off-By-One File Check Bypass Source Disclosure
9599| [59561] Microsoft IIS CodeBrws.asp Encoded Traversal Arbitrary File Source Disclosure
9600| [59360] Microsoft IIS ASP Page Visual Basic Script Malformed Regex Parsing DoS
9601| [57753] Microsoft IIS FTP Server Crafted Recursive Listing Remote DoS
9602| [57589] Microsoft IIS FTP Server NLST Command Remote Overflow
9603| [56474] Microsoft IIS WebDAV Extension URL Decode Crafted HTTP Request Authentication Bypass
9604| [55269] Microsoft IIS Traversal GET Request Remote DoS
9605| [54555] Microsoft IIS WebDAV Unicode URI Request Authentication Bypass
9606| [52924] Microsoft IIS WebDAV PROPFIND Method Forced Directory Listing
9607| [52680] Microsoft IIS httpext.dll WebDav LOCK Method Nonexistent File Request Parsing Memory Exhaustion Remote DoS
9608| [52238] Microsoft IIS IDC Extension XSS
9609| [49899] Microsoft IIS iissext.dll Unspecified ActiveX SetPassword Method Remote Password Manipulation
9610| [49730] Microsoft IIS ActiveX (adsiis.dll) GetObject Method Remote DoS
9611| [49059] Microsoft IIS IPP Service Unspecified Remote Overflow
9612| [45583] Microsoft IIS w/ Visual Interdev Unspecified Authentication Bypass
9613| [43451] Microsoft IIS HTTP Request Smuggling
9614| [41456] Microsoft IIS File Change Handling Local Privilege Escalation
9615| [41445] Microsoft IIS ASP Web Page Input Unspecified Arbitrary Code Execution
9616| [41091] Microsoft IIS webhits.dll Hit-Highlighting Authentication Bypass
9617| [41063] Microsoft IIS ODBC Tool newdsn.exe Remote DSN Creation
9618| [41057] Microsoft IIS w/ .NET MS-DOS Device Request Blacklist Bypass
9619| [35950] Microsoft IIS IUSR_Machine Account Arbitrary Non-EXE Command Execution
9620| [33457] Microsoft IIS Crafted TCP Connection Range Header DoS
9621| [28260] Microsoft IIS FrontPage Server Extensions (FPSE) shtml.exe Path Disclosure
9622| [27152] Microsoft Windows IIS ASP Page Processing Overflow
9623| [27087] Microsoft IIS SMTP Encapsulated SMTP Address Open Relay
9624| [23590] Microsoft IIS Traversal Arbitrary FPSE File Access
9625| [21805] Microsoft IIS Crafted URL Remote DoS
9626| [21537] Microsoft IIS Log File Permission Weakness Remote Modification
9627| [18926] Microsoft IIS SERVER_NAME Variable Spoofing Filter Bypass
9628| [17124] Microsoft IIS Malformed WebDAV Request DoS
9629| [17123] Microsoft IIS Multiple Unspecified Admin Pages XSS
9630| [17122] Microsoft IIS Permission Weakness .COM File Upload
9631| [15749] Microsoft IIS / Site Server code.asp Arbitrary File Access
9632| [15342] Microsoft IIS Persistent FTP Banner Information Disclosure
9633| [14229] Microsoft IIS asp.dll Scripting.FileSystemObject Malformed Program DoS
9634| [13985] Microsoft IIS Malformed HTTP Request Log Entry Spoofing
9635| [13760] Microsoft IIS Malformed URL Request DoS
9636| [13759] Microsoft IIS ISAPI .ASP Parser Script Tag LANGUAGE Argument Overflow
9637| [13634] Microsoft IIS Inetinfo.exe Malformed Long Mail File Name DoS
9638| [13558] Microsoft IIS SSL Request Resource Exhaustion DoS
9639| [13507] Microsoft IIS showfile.asp FileSystemObject Arbitrary File Access
9640| [13479] Microsoft IIS for Far East Parsed Page Source Disclosure
9641| [13473] Microsoft IIS on FAT Partition Local ASP Source Disclosure
9642| [13439] Microsoft IIS HTTP Request Malformed Content-Length Parsing Remote DoS
9643| [13433] Microsoft IIS WebDAV MKCOL Method Location Server Header Internal IP Disclosure
9644| [13432] Microsoft IIS WebDAV WRITE Location Server Header Internal IP Disclosure
9645| [13431] Microsoft IIS WebDAV Malformed PROPFIND Request Internal IP Disclosure
9646| [13430] Microsoft IIS aexp4.htr Password Policy Bypass
9647| [13429] Microsoft IIS aexp3.htr Password Policy Bypass
9648| [13428] Microsoft IIS aexp2b.htr Password Policy Bypass
9649| [13427] Microsoft IIS aexp2.htr Password Policy Bypass
9650| [13426] Microsoft IIS NTLM Authentication Request Parsing Remote Information Disclosure
9651| [13385] Microsoft IIS WebDAV Long PROPFIND/SEARCH Request DoS
9652| [11455] Microsoft IIS / PWS DOS Filename Request Access Bypass
9653| [11452] Microsoft IIS Double Byte Code Arbitrary Source Disclosure
9654| [11277] Microsoft IIS SSL ISAPI Filter Cleartext Information Disclosure
9655| [11257] Microsoft IIS Malformed GET Request DoS
9656| [11157] Microsoft IIS FTP Service PASV Connection Saturation DoS
9657| [11101] Microsoft IIS Multiple Slash ASP Page Request DoS
9658| [9315] Microsoft IIS getdrvs.exe ODBC Sample Information Disclosure
9659| [9314] Microsoft IIS mkilog.exe ODBC Sample Arbitrary Command Execution
9660| [9200] Microsoft IIS Unspecified XSS Variant
9661| [9199] Microsoft IIS shtml.dll XSS
9662| [8098] Microsoft IIS Virtual Directory ASP Source Disclosure
9663| [7807] Microsoft IIS ISAPI Virtual Directory UNC Mapping ASP Source Disclosure
9664| [7737] Microsoft IIS ASP Redirection Function XSS
9665| [7265] Microsoft IIS .ASP Session ID Disclosure and Hijacking
9666| [5851] Microsoft IIS Single Dot Source Code Disclosure
9667| [5736] Microsoft IIS Relative Path System Privilege Escalation
9668| [5693] Microsoft MS00-060 Patch IIS Malformed Request DoS
9669| [5633] Microsoft IIS Invalid WebDAV Request DoS
9670| [5606] Microsoft IIS WebDAV PROPFIND Request DoS
9671| [5584] Microsoft IIS URL Redirection Malformed Length DoS
9672| [5566] Microsoft IIS Form_VBScript.asp XSS
9673| [5316] Microsoft IIS ISAPI HTR Chunked Encoding Overflow
9674| [4864] Microsoft IIS TRACK Logging Failure
9675| [4863] Microsoft IIS Active Server Page Header DoS
9676| [4791] Microsoft IIS Response Object DoS
9677| [4655] Microsoft IIS ssinc.dll Long Filename Overflow
9678| [4535] Microsoft Media Services ISAPI nsiislog.dll POST Overflow
9679| [3512] Microsoft IIS ODBC Tool getdrvrs.exe Remote DSN Creation
9680| [3500] Microsoft IIS fpcount.exe Remote Overflow
9681| [3341] Microsoft IIS Redirect Response XSS
9682| [3339] Microsoft IIS HTTP Error Page XSS
9683| [3338] Microsoft IIS Help File XSS
9684| [3328] Microsoft IIS FTP Status Request DoS
9685| [3326] Microsoft IIS w3svc.dll ISAPI Filter URL Handling Remote DoS
9686| [3325] Microsoft IIS HTR ISAPI Overflow
9687| [3323] Microsoft IIS ISAPI .printer Extension Host Header Overflow
9688| [3320] Microsoft IIS ASP Server-Side Include Buffer Overflow
9689| [3316] Microsoft IIS HTTP Header Field Delimiter Overflow
9690| [3301] Microsoft IIS ASP Chunked Encoding Variant Heap Overflow
9691| [3284] Microsoft IIS Winmsdp.exe Arbitrary File Retrieval
9692| [3231] Microsoft IIS Log Bypass
9693| [2106] Microsoft Media Services ISAPI nsiislog.dll Overflow
9694| [1931] Microsoft IIS MIME Content-Type Header DoS
9695| [1930] Microsoft IIS SSI ssinc.dll Filename Handling Overflow
9696| [1826] Microsoft IIS Domain Guest Account Disclosure
9697| [1824] Microsoft IIS FTP DoS
9698| [1804] Microsoft IIS Long Request Parsing Remote DoS
9699| [1770] Microsoft IIS WebDAV Malformed PROPFIND Request Remote DoS
9700| [1750] Microsoft IIS File Fragment Disclosure
9701| [1543] Microsoft NT/IIS Invalid URL Request DoS
9702| [1504] Microsoft IIS File Permission Canonicalization Bypass
9703| [1465] Microsoft IIS .htr Missing Variable DoS
9704| [1325] Microsoft IIS Malformed Filename Request File Fragment Disclosure
9705| [1322] Microsoft IIS Malformed .htr Request DoS
9706| [1281] Microsoft IIS Escaped Character Saturation Remote DoS
9707| [1261] Microsoft IIS Chunked Transfer Encoding Remote Overflow DoS
9708| [1210] Microsoft IIS WebHits.dll ISAPI Filter Traversal Arbitrary File Access
9709| [1170] Microsoft IIS Escape Character URL Access Bypass
9710| [1083] Microsoft IIS FTP NO ACCESS Read/Delete File
9711| [1082] Microsoft IIS Domain Resolution Access Bypass
9712| [1041] Microsoft IIS Malformed HTTP Request Header DoS
9713| [1020] Microsoft IIS ISAPI GetExtensionVersion() Privilege Escalation
9714| [930] Microsoft IIS Shared ASP Cache Information Disclosure
9715| [929] Microsoft IIS FTP Server NLST Command Overflow
9716| [928] Microsoft IIS Long Request Log Evasion
9717| [815] Microsoft IIS ASP.NET trace.axd Application Tracing Information Disclosure
9718| [814] Microsoft IIS global.asa Remote Information Disclosure
9719| [782] Microsoft IIS / Site Server codebrws.asp Arbitrary File Access
9720| [771] Microsoft IIS Hosting Process (dllhost.exe) Out of Process Application Unspecified Privilege Escalation
9721| [768] Microsoft IIS ASP Chunked Encoding Heap Overflow
9722| [636] Microsoft IIS sqlqhit.asp Sample Script CiScope Parameter Information Disclosure
9723| [630] Microsoft IIS Multiple Malformed Header Field Internal IP Address Disclosure
9724| [568] Microsoft IIS idq.dll IDA/IDQ ISAPI Remote Overflow
9725| [564] Microsoft IIS ISM.dll Fragmented Source Disclosure
9726| [556] Microsoft IIS/PWS Encoded Filename Arbitrary Command Execution
9727| [525] Microsoft IIS Webserver Invalid Filename Request Arbitrary Command Execution
9728| [482] Microsoft IIS FrontPage Server Extensions (FPSE) Malformed Form DoS
9729| [475] Microsoft IIS bdir.htr Arbitrary Directory Listing
9730| [474] Microsoft IIS / Site Server viewcode.asp Arbitrary File Access
9731| [473] Microsoft IIS Multiple .cnf File Information Disclosure
9732| [471] Microsoft IIS ServerVariables_Jscript.asp Path Disclosure
9733| [470] Microsoft IIS Form_JScript.asp XSS
9734| [463] Microsoft IIS Phone Book Service /pbserver/pbserver.dll Remote Overflow
9735| [436] Microsoft IIS Unicode Remote Command Execution
9736| [425] Microsoft IIS WebDAV SEARCH Method Arbitrary Directory Forced Listing
9737| [391] Microsoft IIS IDA/IDQ Document Root Path Disclosure
9738| [390] Microsoft IIS Translate f: Request ASP Source Disclosure
9739| [308] Microsoft IIS Malformed File Extension URL DoS
9740| [285] Microsoft IIS repost.asp File Upload
9741| [284] Microsoft IIS IISADMPWD Virtual Directory Information Enumeration
9742| [283] Microsoft IIS /iissamples Multiple Sample Scripts Installed
9743| [277] Microsoft IIS / PWS %2e Request ASP Source Disclosure
9744| [276] Microsoft IIS ASP::$DATA Stream Request ASP Source Disclosure
9745| [275] Microsoft IIS newdsn.exe Remote Arbitrary File Creation
9746| [274] Microsoft IIS ctss.idc ODBC Sample Arbitrary Command Execution
9747| [273] Microsoft IIS Upgrade ism.dll Local Privilege Escalation
9748| [272] Microsoft IIS MDAC RDS Arbitrary Remote Command Execution
9749| [271] Microsoft IIS WebHits null.htw .asp Source Disclosure
9750| [98] Microsoft IIS perl.exe HTTP Path Disclosure
9751| [97] Microsoft IIS ISM.DLL HTR Request Overflow
9752| [96] Microsoft IIS idq.dll Traversal Arbitrary File Access
9753| [7] Microsoft IIS / Site Server showcode.asp source Parameter Traversal Arbitrary File Access
9754| [4] Microsoft IIS ExAir advsearch.asp Direct Request Remote DoS
9755| [3] Microsoft IIS ExAir query.asp Direct Request Remote DoS
9756| [2] Microsoft IIS ExAir search.asp Direct Request DoS
9757|_
97581 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
9759###############################################################################################################################
9760 Anonymous JTSEC #OpAssange Full Recon #3