Cryptome DVDs are offered by Cryptome. Donate $25 for two DVDs of the Cryptome 12-years collection of 46,000 files from June 1996 to June 2008 (~6.7 GB). Click Paypal or mail check/MO made out to John Young, 251 West 89th Street, New York, NY 10024. The collection includes all files of cryptome.org, jya.com, cartome.org, eyeball-series.org and iraq-kill-maim.org, and 23,000 (updated) pages of counter-intelligence dossiers declassified by the US Army Information and Security Command, dating from 1945 to 1985.The DVDs will be sent anywhere worldwide without extra cost.

Google
 
Web cryptome.org cryptome.info jya.com eyeball-series.org cryptome.cn


12 December 2007

Previous:

gov-pk.htm          + Server Comms Reporting for Research on gov.pk    December 2, 2007
gov-ir.htm          + Server Comms Reporting for Research on gov.ir    November 28, 2007


A sends:

I wanted to make you aware of the following from gov.cn since it is a bit different than the others you already posted. It appears that gov.cn has a much broader IP space than the IR and PK research I saw on your site, so a buddy of mine asked that I send this in to you to have your community review as a comparison to your past posts.  A congrats must go out, too... they have a setup well compared to the others.  Must be some uniformity there.


Server Comms Reporting for Research Effort gov.cn

Table Cell Color Keys
Grey No analysis report generated. Could be due to server being down, not reponding to our request, or not existing.
White Nothing of interest to report
Yellow Notes are provided on findings but nothing significant found.
Pink More information is provided on findings, usually contained with systems having a vulnerability report. More valued information over just notes.
Red Report has been generated with findings for potential vulnerability information.



Domain Name Index
www.0735.gov.cn www.dlpld.gov.cn www.jiaozhou.gov.cn www.qhwq.gov.cn www.tzipo.gov.cn
www.221.gov.cn www.dlzh.gov.cn www.jiexi.gov.cn www.qianguo.gov.cn www.tzkj.gov.cn
www.51a.gov.cn www.dofcom.gov.cn www.jingshan.gov.cn www.qinfeng.gov.cn www.urumqi.gov.cn
www.618.gov.cn www.dongfeng.gov.cn www.jiyuan.gov.cn www.qk.gov.cn www.usjob.gov.cn
www.81890.gov.cn www.dongning.gov.cn www.jlagri.gov.cn www.qtinfo.gov.cn www.wanrong.gov.cn
www.acsi.gov.cn www.dtzc.gov.cn www.jlds.gov.cn www.qzepb.gov.cn www.weda.gov.cn
www.aeoc.gov.cn www.dxad.gov.cn www.jlfiw.gov.cn www.qzipo.gov.cn www.wenzhou.gov.cn
www.africa.gov.cn www.dxic.gov.cn www.jlqx.gov.cn www.qzldbz.gov.cn www.wffc.gov.cn
www.agri.gov.cn www.dyhb.gov.cn www.jlsafety.gov.cn www.qzrs.gov.cn www.wfstc.gov.cn
www.agrihr.gov.cn www.dyrc.gov.cn www.jlscy.gov.cn www.rctj.gov.cn www.wh12366.gov.cn
www.ahfeixi.gov.cn www.dz.gov.cn www.jlthx.gov.cn www.rcx.gov.cn www.whga.gov.cn
www.ahjt.gov.cn www.emc.gov.cn www.jlws.gov.cn www.realestate.gov.cn www.whgajxj.gov.cn
www.ahlj.gov.cn www.envir.gov.cn www.jndz.gov.cn www.rftgd.gov.cn www.whgzw.gov.cn
www.ahpf.gov.cn www.expo2006sy.gov.cn www.jnedu.gov.cn www.rjzl.gov.cn www.whjs.gov.cn
www.ahpress.gov.cn www.faohn.gov.cn www.jnny.gov.cn www.rugao.gov.cn www.whlib.gov.cn
www.ahtm.gov.cn www.fdc.gov.cn www.jscz.gov.cn www.safety.gov.cn www.whrsj.gov.cn
www.ahzcj.gov.cn www.fish.gov.cn www.jsga.gov.cn www.sara.gov.cn www.wj.gov.cn
www.ahzw.gov.cn www.fj.gov.cn www.jsinfo.gov.cn www.sast.gov.cn www.wtolaw.gov.cn
www.altdj.gov.cn www.fjax.gov.cn www.jssports.gov.cn www.sccm.gov.cn www.wuping.gov.cn
www.anhuisafety.gov.cn www.fjinfo.gov.cn www.jswater.gov.cn www.scfda.gov.cn www.wuyishan.gov.cn
www.antifraud.gov.cn www.fjipo.gov.cn www.jszx.gov.cn www.schj.gov.cn www.gov.cn
www.aqfao.gov.cn www.fjjc.gov.cn www.jxciq.gov.cn www.scjc.gov.cn www.wznw.gov.cn
www.aqsc.gov.cn www.fjkjt.gov.cn www.jxdaj.gov.cn www.scmz.gov.cn www.wzta.gov.cn
www.asinfo.gov.cn www.fjlss.gov.cn www.jxdii.gov.cn www.scpop.gov.cn www.wzzw.gov.cn
www.asjy.gov.cn www.fjsafety.gov.cn www.jxf.gov.cn www.scpta.gov.cn www.xags.gov.cn
www.auto.gov.cn www.fjsp.gov.cn www.jxgc.gov.cn www.scqy.gov.cn www.xaonline.gov.cn
www.axjt.gov.cn www.fohb.gov.cn www.jxgrain.gov.cn www.scsme.gov.cn www.xasmw.gov.cn
www.badaling.gov.cn www.forestry.gov.cn www.jxjst.gov.cn www.scxmsp.gov.cn www.xbrc.gov.cn
www.beic.gov.cn www.fsfao.gov.cn www.jxmg.gov.cn www.sdet.gov.cn www.xflyj.gov.cn
www.benic.gov.cn www.fsi.gov.cn www.jxmie.gov.cn www.sdjt.gov.cn www.xfyy.gov.cn
www.bfa.gov.cn www.fsjyzx.gov.cn www.jxsp.gov.cn www.sdns.gov.cn www.xiangcheng.gov.cn
www.bingtuan.gov.cn www.fsxxb.gov.cn www.jxsq.gov.cn www.sdsi.gov.cn www.xiaoshan.gov.cn
www.binzhou.gov.cn www.fujian.gov.cn www.jxwrd.gov.cn www.sdwj.gov.cn www.xilingol.gov.cn
www.bjda.gov.cn www.fzedu.gov.cn www.jxyf.gov.cn www.sdwsqw.gov.cn www.xinganmeng.gov.cn
www.bjdch.gov.cn www.gaoming.gov.cn www.jxzfw.gov.cn www.sdxm.gov.cn www.xingyang.gov.cn
www.bjdj.gov.cn www.gaozhou.gov.cn www.jz.gov.cn www.sei.gov.cn www.xinjiangtour.gov.cn
www.bjdzj.gov.cn www.tyj.gd.gov.cn www.kepz.gov.cn www.serc.gov.cn www.xinyu.gov.cn
www.bjepb.gov.cn www.gdcct.gov.cn www.km.gov.cn www.setd.gov.cn www.xinzheng.gov.cn
www.bjfsh.gov.cn www.gdcx.gov.cn www.kmcgfda.gov.cn www.sh1111.gov.cn www.xjbz.gov.cn
www.bjghw.gov.cn www.gdczt.gov.cn www.medgen.labs.gov.cn www.shad.gov.cn www.xjbzsfj.gov.cn
www.bjgtj.gov.cn www.gddoftec.gov.cn www.laipo.gov.cn www.shanghai.gov.cn www.xjciq.gov.cn
www.bjgx2008.gov.cn www.gdgpo.gov.cn www.landscape.gov.cn www.shangluo.gov.cn www.xjdrc.gov.cn
www.bjhrwm.gov.cn www.gdltax.gov.cn www.lasa.gov.cn www.shantou.gov.cn www.xjedu.gov.cn
www.bjjc.gov.cn www.gdnet110.gov.cn www.laty.gov.cn www.shaoyang.gov.cn www.xjepb.gov.cn
www.bjjgj.gov.cn www.gdwater.gov.cn www.lf.gov.cn www.shdf.gov.cn www.xjfy.gov.cn
www.bjjtgl.gov.cn www.greenhr.gov.cn www.lijiang.gov.cn www.shiyan.gov.cn www.xjhm.gov.cn
www.bjjtw.gov.cn www.gsjt.gov.cn www.linfen.gov.cn www.shuangliao.gov.cn www.xjjt.gov.cn
www.bjjtzf.gov.cn www.gszl.gov.cn www.linqing.gov.cn www.shxc.gov.cn www.xjjz.gov.cn
www.bjlj.gov.cn www.guiyang.gov.cn www.liuzhou.gov.cn www.shyzfw.gov.cn www.xjlt.gov.cn
www.bjmac.gov.cn www.gxdx.gov.cn www.ljta.gov.cn www.shzj.gov.cn www.xjnewqi.gov.cn
www.bjmbc.gov.cn www.gxit.gov.cn www.dps.ln.gov.cn www.siming.gov.cn www.xjnj.gov.cn
www.bjsys.gov.cn www.gxmzt.gov.cn www.lnciq.gov.cn www.sist.gov.cn www.xjsafety.gov.cn
www.bjtax.gov.cn www.gxrs.gov.cn www.lndx.gov.cn www.siyang.gov.cn www.xjsj.gov.cn
www.bjtvet.gov.cn www.gxtj.gov.cn www.lngs.gov.cn www.skxtv.gov.cn www.xjwh.gov.cn
www.bjtzh.gov.cn www.gygov.gov.cn www.lnmz.gov.cn www.sm.gov.cn www.xm.gov.cn
www.bjtzzs.gov.cn www.gzaj.gov.cn www.lnppb.gov.cn www.smedl.gov.cn www.xmedu.gov.cn
www.bjwater.gov.cn www.gzepb.gov.cn www.lnprice.gov.cn www.smehen.gov.cn www.xnsf.gov.cn
www.bjys.gov.cn www.gzgs.gov.cn www.lnsports.gov.cn www.smeqd.gov.cn www.xntv.gov.cn
www.botou.gov.cn www.gzjj.gov.cn www.locpg.gov.cn www.smeshx.gov.cn www.xq.gov.cn
www.boye.gov.cn www.gzkj.gov.cn www.longkou.gov.cn www.smeyn.gov.cn www.xsbn.gov.cn
www.bozhou.gov.cn www.gzpf.gov.cn www.lottery.gov.cn www.snaic.gov.cn www.xtwqb.gov.cn
www.bsw.gov.cn www.gzpi.gov.cn www.loulan.gov.cn www.soa.gov.cn www.xushui.gov.cn
www.caac.gov.cn www.gzrc.gov.cn www.lsjsw.gov.cn www.spic.gov.cn www.xxz.gov.cn
www.caofeidian.gov.cn www.gzsj.gov.cn www.lsjw.gov.cn www.sports.gov.cn www.xzcd.gov.cn
www.cbrc.gov.cn www.gzsjyt.gov.cn www.xjhm.lss.gov.cn www.spp.gov.cn www.xzzx.gov.cn
www.ccc.gov.cn www.gzsmzt.gov.cn www.lsst.gov.cn www.spta.gov.cn www.yangchun.gov.cn
www.ccga.gov.cn www.gzszx.gov.cn www.lyinfo.gov.cn www.srgl.gov.cn www.yangjiang.gov.cn
www.ccgs.gov.cn www.gztongzi.gov.cn www.mas.gov.cn www.ssf.gov.cn www.yangling.gov.cn
www.cchr.gov.cn www.gzwaishi.gov.cn www.meizhou.gov.cn www.ssme.gov.cn www.yangpu.gov.cn
www.ccm.gov.cn www.hailar.gov.cn www.minhou.gov.cn www.stats-sx.gov.cn www.yangzhou.gov.cn
www.ccnt.gov.cn www.harczx.gov.cn www.mirror.gov.cn www.stats.gov.cn www.yantai.gov.cn
www.ccpitzj.gov.cn www.hbagri.gov.cn www.mudanjiang.gov.cn www.stm.gov.cn www.yaodu.gov.cn
www.ccrs.gov.cn www.hbdofcom.gov.cn www.mushroom.gov.cn www.rsj.suzhou.gov.cn www.ybrc.gov.cn
www.cddln.gov.cn www.hbdrc.gov.cn www.mykj.gov.cn www.sxagri.gov.cn www.ybzfcg.gov.cn
www.cdgs.gov.cn www.hbhrc.gov.cn www.nanao.gov.cn www.sxaic.gov.cn www.yczscq.gov.cn
www.cdjg.gov.cn www.hbinnofund.gov.cn www.nantong.gov.cn www.sxch.gov.cn www.yellowriver.gov.cn
www.cdst.gov.cn www.hbipo.gov.cn www.nantou.gov.cn www.sxcredit.gov.cn www.yh.gov.cn
www.cea.gov.cn www.hblr.gov.cn www.nbciq.gov.cn www.sxfx.gov.cn www.yintai.gov.cn
www.realestate.cei.gov.cn www.hbmyjj.gov.cn www.nbfet.gov.cn www.sxfzb.gov.cn www.yixian.gov.cn
www.ffs.cgs.gov.cn www.hbwmw.gov.cn www.nbjt.gov.cn www.sxgaoping.gov.cn www.yjkjj.gov.cn
www.qimg.cgs.gov.cn www.hbzx.gov.cn www.nbmzj.gov.cn www.sxhall.gov.cn www.ylagri.gov.cn
www.xian.cgs.gov.cn www.hddjbaic.gov.cn www.nbsme.gov.cn www.sxit.gov.cn www.ynagri.gov.cn
www.cheminfo.gov.cn www.hdlsj.gov.cn www.nbsti.gov.cn www.sxjz.gov.cn www.ynaic.gov.cn
www.chengbei.gov.cn www.hdwj.gov.cn www.nbzj.gov.cn www.sxmz.gov.cn www.ynbsm.gov.cn
www.chengyang.gov.cn www.hebei.gov.cn www.nc315.gov.cn www.sxnw.gov.cn www.ynciq.gov.cn
www.chibi.gov.cn www.hebi.gov.cn www.ncac.gov.cn www.sxprice.gov.cn www.ynepb.gov.cn
www.chifeng.gov.cn www.heihe.gov.cn www.ncdh.gov.cn www.sxsfjd.gov.cn www.yngb.gov.cn
www.china-language.gov.cn www.henanqx.gov.cn www.ncie.gov.cn www.sxtong.gov.cn www.ynjst.gov.cn
www.chinaenergy.gov.cn www.hengyang.gov.cn www.ncsb.gov.cn www.sxtzb.gov.cn www.ynjy.gov.cn
www.chinafx.gov.cn www.hetz.gov.cn www.nczy.gov.cn www.syipb.gov.cn www.ynlc.gov.cn
www.chinanet.gov.cn www.hfboftec.gov.cn www.neijiang.gov.cn www.syqw.gov.cn www.ynly.gov.cn
www.chinapesticide.gov.cn www.hfsghj.gov.cn www.neis.gov.cn www.syrsw.gov.cn www.ynsafety.gov.cn
www.gscms.chinasafety.gov.cn www.hhhtfcj.gov.cn www.ngsh.gov.cn www.sysc.gov.cn www.yongzhou.gov.cn
www.chinawest.gov.cn www.hiciq.gov.cn www.ninyuan.gov.cn www.rsj.sz.gov.cn www.ytjcy.gov.cn
www1.chinawest.gov.cn www.hicourt.gov.cn www.njfcj.gov.cn www.tzb.sz.gov.cn www.ytrc.gov.cn
www.chrm.gov.cn www.hljcdm.gov.cn www.njgs.gov.cn www.sz12333.gov.cn www.yuli.gov.cn
www.cigem.gov.cn www.hljdx.gov.cn www.nju.gov.cn www.szbqts.gov.cn www.yuncheng.gov.cn
www.cjw.gov.cn www.hljjs.gov.cn www.nmc.gov.cn www.szbts.gov.cn www.yw.gov.cn
www.cla.gov.cn www.hljmj.gov.cn www.nmgfao.gov.cn www.szcourt.gov.cn www.yzcity.gov.cn
www.cmda.gov.cn www.hljwst.gov.cn www.nmgzb.gov.cn www.szda.gov.cn www.yzwjm.gov.cn
www.cnan.gov.cn www.hnciq.gov.cn www.nmldt.gov.cn www.szfb.gov.cn www.zftec.gov.cn
www.cnci.gov.cn www.hncredit.gov.cn www.nmmzt.gov.cn www.szfdc.gov.cn www.zgc-sjs.gov.cn
www.coc.gov.cn www.hndrc.gov.cn www.nmqq.gov.cn www.szftz.gov.cn www.zgcqxs.gov.cn
www.counsellor.gov.cn www.hninfo.gov.cn www.nobelbeijing.gov.cn www.szga.gov.cn www.zglz.gov.cn
www.cpdj.gov.cn www.hnjt.gov.cn www.nsfc.gov.cn www.szjs.gov.cn www.zgwj.gov.cn
www.cpi.gov.cn www.hnjy.gov.cn www.nstl.gov.cn www.szlib.gov.cn www.zgyn.gov.cn
www.cpm.gov.cn www.hnleader.gov.cn www.ntagri.gov.cn www.szpb.gov.cn www.zgyzedz.gov.cn
www.cppcc.gov.cn www.hnly.gov.cn www.ntpta.gov.cn www.szplan.gov.cn www.zh315.gov.cn
www.cqaudit.gov.cn www.hnmtdz.gov.cn www.ntrc.gov.cn www.szrkjs.gov.cn www.zhciq.gov.cn
www.cqciq.gov.cn www.hnt.gov.cn www.nx.gov.cn www.szsf.gov.cn www.zhcxy.gov.cn
www.cqcrtv.gov.cn www.hntj.gov.cn www.nxaudit.gov.cn www.szsgsj.gov.cn www.zhijiang.gov.cn
www.cqda.gov.cn www.hnwqb.gov.cn www.nxcd.gov.cn www.szsmb.gov.cn www.zhoukou.gov.cn
www.cqjgdj.gov.cn www.hnyr.gov.cn www.nxciq.gov.cn www.szum.gov.cn www.zhuzhou.gov.cn
www.cqjt.gov.cn www.hrbgaj.gov.cn www.nxdofcom.gov.cn www.szzj.gov.cn www.zjdpc.gov.cn
www.cqlottery.gov.cn www.hrbgzw.gov.cn www.nxgtt.gov.cn www.szzx.gov.cn www.zjet.gov.cn
www.cqmj.gov.cn www.hslib.gov.cn www.nxpta.gov.cn www.tahe.gov.cn www.zjj.gov.cn
www.cqrk.gov.cn www.hsq.gov.cn www.nxrkw.gov.cn www.tax861-college.gov.cn www.zjjcy.gov.cn
www.cqtj.gov.cn www.huaibei.gov.cn www.nxws.gov.cn www.tcm.gov.cn www.zjjsw.gov.cn
www.cqybq.gov.cn www.huainan.gov.cn www.nxyz.gov.cn www.tdbdx.gov.cn www.zjkjt.gov.cn
www.csh.gov.cn www.huaiyin.gov.cn www.nxzj.gov.cn www.tianjin.gov.cn www.zjpat.gov.cn
www.ctei.gov.cn www.huantai.gov.cn www.nynews.gov.cn www.tianshui.gov.cn www.zjsjt.gov.cn
www.ctlzw.gov.cn www.hubei.gov.cn www.pgkx.gov.cn www.tibet.gov.cn www.zjskw.gov.cn
www.customs.gov.cn www.hubeiwater.gov.cn www.pingyin.gov.cn www.tipp.gov.cn www.zjsllkh.gov.cn
www.cxs.gov.cn www.huizhou.gov.cn www.pksq.gov.cn www.tjftz.gov.cn www.zjtax.gov.cn
www.czrs.gov.cn www.hunan.gov.cn www.pndc.gov.cn www.tjhb.gov.cn www.zjwh.gov.cn
www.daan.gov.cn www.hunangrain.gov.cn www.psx.gov.cn www.tjhg.gov.cn www.zjwst.gov.cn
www.dandong.gov.cn www.huoqiu.gov.cn www.qagri.gov.cn www.tjjt.gov.cn www.zqrcw.gov.cn
www.dctq.gov.cn www.hydroinfo.gov.cn www.qdaic.gov.cn www.tjsf.gov.cn www.zshuangpu.gov.cn
www.dezhou.gov.cn www.hzsj.gov.cn www.qdsf.gov.cn www.tjwcb.gov.cn www.zsqw.gov.cn
www.dfxj.gov.cn www.info.gov.cn www.qglz.gov.cn www.tjztb.gov.cn www.zycg.gov.cn
www.dhl.gov.cn www.infobase.gov.cn www.qhdta.gov.cn www.town.gov.cn
www.dhly.gov.cn www.ivdc.gov.cn www.qhlr.gov.cn www.tpbjc.gov.cn
www.gzw.dl.gov.cn www.jgjy.gov.cn www.qhly.gov.cn www.tstc.gov.cn
www.dlhitech.gov.cn www.jiangxi.gov.cn www.qhrs.gov.cn www.tzgh.gov.cn



Domain Name IP ADDRESS Information Identified
www.0735.gov.cn 61.187.248.20
SERVER IP: 61.187.248.20
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.221.gov.cn 210.75.208.172
SERVER IP: 210.75.208.172
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.51a.gov.cn 61.145.114.225
SERVER IP: 61.145.114.225
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.618.gov.cn 218.85.73.129
SERVER IP: 218.85.73.129
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.81890.gov.cn 218.75.85.194
SERVER IP: 218.75.85.194
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache Coyote/1.0

www.acsi.gov.cn 203.207.195.116
SERVER IP: 203.207.195.116
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.aeoc.gov.cn 222.128.59.129
SERVER IP: 222.128.59.129
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.africa.gov.cn 210.51.167.183
SERVER IP: 210.51.167.183
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.agri.gov.cn 202.127.45.50
SERVER IP: 202.127.45.50
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.agrihr.gov.cn 202.127.42.163
SERVER IP: 202.127.42.163
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.ahfeixi.gov.cn 61.129.45.92
SERVER IP: 61.129.45.92
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.59 (Unix) PHP/4.3.5

SERVER IP: 61.129.45.92
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Script Injection attack The remote host is running a version of PHP which is older than 5.0.3 or 4.3.10. The remote version of this software is vulnerable to various security issues which may, under certain circumstances, allow attackers to execute arbitrary code on the remote host, provided that they can pass arbitrary data to some functions or bypass safe_mode. CVSS Base Score : 6 AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to PHP 5.0.3 or 4.3.10
CVE : CVE-2004-1018, CVE-2004-1019, CVE-2004-1020, CVE-2004-1063, CVE-2004-1064, CVE-2004-1065
BID : 11964, 11981, 11992, 12045


SERVER IP: 61.129.45.92
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher.
CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525
BID : 12963, 12962, 13143, 13163, 13164


SERVER IP: 61.129.45.92
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 61.129.45.92
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.ahjt.gov.cn 61.132.137.203
SERVER IP: 61.132.137.203
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.33 (Unix)

www.ahlj.gov.cn 218.22.228.145
SERVER IP: 218.22.228.145
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.ahpf.gov.cn 220.178.18.72
SERVER IP: 220.178.18.72
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.ahpress.gov.cn 61.132.135.253
SERVER IP: 61.132.135.253
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.ahtm.gov.cn 220.178.98.48
SERVER IP: 220.178.98.48
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.ahzcj.gov.cn 61.132.133.25
SERVER IP: 61.132.133.25
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.ahzw.gov.cn 220.195.162.222
SERVER IP: 220.195.162.222
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.altdj.gov.cn 61.128.109.193
SERVER IP: 61.128.109.193
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.anhuisafety.gov.cn 61.132.139.76
SERVER IP: 61.132.139.76
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache-Coyote/1.1

www.antifraud.gov.cn 211.88.12.154
SERVER IP: 211.88.12.154
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Oracle-Application-Server-10g/10.1.3.0.0 Oracle-HTTP-Server

SERVER IP: 211.88.12.154
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
The remote host is running the Oracle Application Server 10g version 10.1.3.0.0 Oracle-HTTP-Server

www.aqfao.gov.cn 218.22.128.74
SERVER IP: 218.22.128.74
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.aqsc.gov.cn 202.127.45.191
SERVER IP: 202.127.45.191
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.asinfo.gov.cn 59.44.157.147
SERVER IP: 59.44.157.147
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.asjy.gov.cn 218.25.214.223
SERVER IP: 218.25.214.223
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache Coyote/1.0

www.badaling.gov.cn 218.244.137.71
SERVER IP: 218.244.137.71
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.beic.gov.cn 202.127.160.110
SERVER IP: 202.127.160.110
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.26 (Unix)

www.benic.gov.cn 211.153.32.1
SERVER IP: 211.153.32.1
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.54 (Unix)

www.bingtuan.gov.cn 222.82.219.133
SERVER IP: 222.82.219.133
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.binzhou.gov.cn 60.215.8.13
SERVER IP: 60.215.8.13
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_Server/6.0.2.19 Apache/2.0.47 (Unix)

www.bjda.gov.cn 210.75.218.5
SERVER IP: 210.75.218.5
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.bjdch.gov.cn 202.108.143.22
SERVER IP: 202.108.143.22
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.2.3 (Unix)

www.bjdj.gov.cn 210.73.64.123
SERVER IP: 210.73.64.123
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.bjdzj.gov.cn 210.73.64.75
SERVER IP: 210.73.64.75
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.bjepb.gov.cn 210.73.64.55
SERVER IP: 210.73.64.55
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.bjghw.gov.cn 210.73.64.72
SERVER IP: 210.73.64.72
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.bjgtj.gov.cn 210.73.64.99
SERVER IP: 210.73.64.99
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache-Coyote/1.1

www.bjgx2008.gov.cn 202.106.114.116
SERVER IP: 202.106.114.116
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.2.3 (Unix) DAV/2 mod_ssl/2.2.3 OpenSSL/0.9.8d PHP/5.1.6 mod_apreq2-20051231/2.5.7 mod_perl/2.0.2 Perl/v5.8.7

SERVER IP: 202.106.114.116
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 202.106.114.116
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


SERVER IP: 202.106.114.116
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php
CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756
BID : 23359, 24089, 24259, 24261


SERVER IP: 202.106.114.116
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher
CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806
BID : 25498


SERVER IP: 202.106.114.116
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


SERVER IP: 202.106.114.116
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


www.bjhrwm.gov.cn 210.75.211.10
SERVER IP: 210.75.211.10
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.bjjc.gov.cn 219.141.234.230
SERVER IP: 219.141.234.230
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: WebSphere Application Server/5.1

www.bjjgj.gov.cn 210.73.64.102
SERVER IP: 210.73.64.102
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.bjjtgl.gov.cn 210.73.64.22
SERVER IP: 210.73.64.22
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.bjjtw.gov.cn 210.75.211.147
SERVER IP: 210.75.211.147
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: WebLogic Server 8.1 SP3 Tue Jun 29 23:11:19 PDT 2004 404973

SERVER IP: 210.75.211.147
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
The remote host is running the WebLogic web server. There is a flaw in it which allows an attacker to gain the NetBIOS host name of the remote host. Solution : NONE
BID : 7257


SERVER IP: 210.75.211.147
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
Synopsis : The remote host may give an attacker information useful for future attacks The remote host is running BEA Weblogic. This version of Weblogic is vulnerable to an information disclosure vulnerability. Specifically, failed logins yield information regarding authentication scheme, validity of userID, etc. CVSS Base Score : 2 AV:R/AC:L/Au:NR/C:P/I:N/A:N/B:N Solution : Upgrade to WebLogic 8.1.0 SP4 or newer
CVE : CVE-2005-1380
BID : 13400, 12548


SERVER IP: 210.75.211.147
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of BEA WebLogic Server or WebLogic Express that is prone to multiple vulnerabilities. These flaws could lead to buffer overflows, denial of service, unauthorized access, cross-site scripting attacks, and information disclosure. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to WebLogic 8.1.0 SP5 or newer See also : http://dev2dev.bea.com/advisoriesnotifications
CVE : CVE-2005-1380, CVE-2005-1742, CVE-2005-1743, CVE-2005-1744, CVE-2005-1745, CVE-2005-1746, CVE-2005-1747, CVE-2005-1748, CVE-2005-1749
BID : 12548, 13400, 13717, 13793, 13794, 14632, 14657


SERVER IP: 210.75.211.147
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a flaw which allows attackers to retrieve sensitive files The remote host is running a version of BEA WebLogic Server or WebLogic Express that is prone to a flaw in the way that it handles anonymous RMI connections. An attacker, exploiting this flaw, would be able to retrieve sensitive configuration files anonymously. Such information would undoubtedly aid the attacker in more sophisticated attacks. CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N Solution : Upgrade to WebLogic 8.1.0 SP6 or newer See also : http://dev2dev.bea.com/advisoriesnotifications
CVE : CVE-2003-1290
BID : 16215


www.bjjtzf.gov.cn 210.75.211.147
SERVER IP: 210.75.211.147
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: WebLogic Server 8.1 SP3 Tue Jun 29 23:11:19 PDT 2004 404973

SERVER IP: 210.75.211.147
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
The remote host is running the WebLogic web server. There is a flaw in it which allows an attacker to gain the NetBIOS host name of the remote host. Solution : NONE
BID : 7257


SERVER IP: 210.75.211.147
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
Synopsis : The remote host may give an attacker information useful for future attacks The remote host is running BEA Weblogic. This version of Weblogic is vulnerable to an information disclosure vulnerability. Specifically, failed logins yield information regarding authentication scheme, validity of userID, etc. CVSS Base Score : 2 AV:R/AC:L/Au:NR/C:P/I:N/A:N/B:N Solution : Upgrade to WebLogic 8.1.0 SP4 or newer
CVE : CVE-2005-1380
BID : 13400, 12548


SERVER IP: 210.75.211.147
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of BEA WebLogic Server or WebLogic Express that is prone to multiple vulnerabilities. These flaws could lead to buffer overflows, denial of service, unauthorized access, cross-site scripting attacks, and information disclosure. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to WebLogic 8.1.0 SP5 or newer See also : http://dev2dev.bea.com/advisoriesnotifications
CVE : CVE-2005-1380, CVE-2005-1742, CVE-2005-1743, CVE-2005-1744, CVE-2005-1745, CVE-2005-1746, CVE-2005-1747, CVE-2005-1748, CVE-2005-1749
BID : 12548, 13400, 13717, 13793, 13794, 14632, 14657


SERVER IP: 210.75.211.147
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a flaw which allows attackers to retrieve sensitive files The remote host is running a version of BEA WebLogic Server or WebLogic Express that is prone to a flaw in the way that it handles anonymous RMI connections. An attacker, exploiting this flaw, would be able to retrieve sensitive configuration files anonymously. Such information would undoubtedly aid the attacker in more sophisticated attacks. CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N Solution : Upgrade to WebLogic 8.1.0 SP6 or newer See also : http://dev2dev.bea.com/advisoriesnotifications
CVE : CVE-2003-1290
BID : 16215


www.bjlj.gov.cn 210.73.64.43
SERVER IP: 210.73.64.43
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.bjmac.gov.cn 210.73.71.108
SERVER IP: 210.73.71.108
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache-Coyote/1.1

www.bjmbc.gov.cn 210.73.72.68
SERVER IP: 210.73.72.68
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache-Coyote/1.1

www.bjsys.gov.cn 222.35.25.230
SERVER IP: 222.35.25.230
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.bjtax.gov.cn 202.106.82.204
SERVER IP: 202.106.82.204
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/5.0

SERVER IP: 202.106.82.204
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
The remote host is running the WebLogic web server. There is a flaw in it which allows an attacker to gain the NetBIOS host name of the remote host. Solution : NONE
BID : 7257


SERVER IP: 202.106.82.204
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
The remote host is running a Microsoft IIS webserver

SERVER IP: 202.106.82.204
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running BEA Weblogic. Multiple undisclosed vulnerabilities have been reported in every versions of WebLogic up to and including 8.1.0 SP2. An attacker may exploit these issues to get unauthorized access or to gather information about the remote host. BEA Weblogic 8.1 Service Pack 3 addresses these vulnerabilities. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to WebLogic 8.1.0 SP3 or newer See also : http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/index.jsp
CVE : CVE-2004-2320
BID : 9506, 11168


SERVER IP: 202.106.82.204
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
Synopsis : The remote host may give an attacker information useful for future attacks The remote host is running BEA Weblogic. This version of Weblogic is vulnerable to an information disclosure vulnerability. Specifically, failed logins yield information regarding authentication scheme, validity of userID, etc. CVSS Base Score : 2 AV:R/AC:L/Au:NR/C:P/I:N/A:N/B:N Solution : Upgrade to WebLogic 8.1.0 SP4 or newer
CVE : CVE-2005-1380
BID : 13400, 12548


SERVER IP: 202.106.82.204
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of BEA WebLogic Server or WebLogic Express that is prone to multiple vulnerabilities. These flaws could lead to buffer overflows, denial of service, unauthorized access, cross-site scripting attacks, and information disclosure. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to WebLogic 8.1.0 SP5 or newer See also : http://dev2dev.bea.com/advisoriesnotifications
CVE : CVE-2005-1380, CVE-2005-1742, CVE-2005-1743, CVE-2005-1744, CVE-2005-1745, CVE-2005-1746, CVE-2005-1747, CVE-2005-1748, CVE-2005-1749
BID : 12548, 13400, 13717, 13793, 13794, 14632, 14657


SERVER IP: 202.106.82.204
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a flaw which allows attackers to retrieve sensitive files The remote host is running a version of BEA WebLogic Server or WebLogic Express that is prone to a flaw in the way that it handles anonymous RMI connections. An attacker, exploiting this flaw, would be able to retrieve sensitive configuration files anonymously. Such information would undoubtedly aid the attacker in more sophisticated attacks. CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N Solution : Upgrade to WebLogic 8.1.0 SP6 or newer See also : http://dev2dev.bea.com/advisoriesnotifications
CVE : CVE-2003-1290
BID : 16215


SERVER IP: 202.106.82.204
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of BEA WebLogic Server which is vulnerable to eleven (11) distinct vulnerabilities. An attacker, exploiting these flaws, would be able to impact Availability, Confidentiality and Integrity. CVSS Base Score : 10.0 CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C Solution : Apply the relevant patches from BEA. See also : http://www.beasys.com/products/weblogic/index.html
BID : 17982


www.bjtvet.gov.cn 211.153.22.241
SERVER IP: 211.153.22.241
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.bjtzh.gov.cn 218.246.87.8
SERVER IP: 218.246.87.8
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.bjtzzs.gov.cn 218.107.216.61
SERVER IP: 218.107.216.61
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.bjwater.gov.cn 210.73.64.54
SERVER IP: 210.73.64.54
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

www.bjys.gov.cn 61.50.187.54
SERVER IP: 61.50.187.54
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache-Coyote/1.1

www.botou.gov.cn 202.99.176.28
SERVER IP: 202.99.176.28
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.boye.gov.cn 218.246.21.12
SERVER IP: 218.246.21.12
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.52 (Win32) PHP/4.3.10

SERVER IP: 218.246.21.12
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher.
CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525
BID : 12963, 12962, 13143, 13163, 13164


SERVER IP: 218.246.21.12
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 218.246.21.12
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.bozhou.gov.cn 218.23.173.118
SERVER IP: 218.23.173.118
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.bsw.gov.cn 210.76.97.117
SERVER IP: 210.76.97.117
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.59 (Unix) mod_jk/1.2.21

www.caac.gov.cn 218.247.19.3
SERVER IP: 218.247.19.3
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.caofeidian.gov.cn 60.2.49.77
SERVER IP: 60.2.49.77
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.ccc.gov.cn 219.153.125.225
SERVER IP: 219.153.125.225
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.ccga.gov.cn 61.138.176.67
SERVER IP: 61.138.176.67
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache-Coyote/1.1

www.ccgs.gov.cn 218.62.29.139
SERVER IP: 218.62.29.139
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.2.4 (Win32) DAV/2 mod_ssl/2.2.4 OpenSSL/0.9.8e mod_autoindex_color mod_python/3.3.1 Python/2.4.4 PHP/5.2.3 mod_jk/1.2.23 SVN/1.4.5

SERVER IP: 218.62.29.139
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher
CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806
BID : 25498


SERVER IP: 218.62.29.139
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


SERVER IP: 218.62.29.139
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


www.cchr.gov.cn 218.91.253.71
SERVER IP: 218.91.253.71
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.ccm.gov.cn 124.254.63.218
SERVER IP: 124.254.63.218
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.2.0 (Unix) PHP/5.1.6

SERVER IP: 124.254.63.218
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 124.254.63.218
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


SERVER IP: 124.254.63.218
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php
CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756
BID : 23359, 24089, 24259, 24261


SERVER IP: 124.254.63.218
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher
CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806
BID : 25498


SERVER IP: 124.254.63.218
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


www.ccnt.gov.cn 202.96.62.67
SERVER IP: 202.96.62.67
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.ccpitzj.gov.cn 59.60.147.228
SERVER IP: 59.60.147.228
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

SERVER IP: 59.60.147.228
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Script Injection attack The remote host is running a version of PHP which is older than 5.0.3 or 4.3.10. The remote version of this software is vulnerable to various security issues which may, under certain circumstances, allow attackers to execute arbitrary code on the remote host, provided that they can pass arbitrary data to some functions or bypass safe_mode. CVSS Base Score : 6 AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to PHP 5.0.3 or 4.3.10
CVE : CVE-2004-1018, CVE-2004-1019, CVE-2004-1020, CVE-2004-1063, CVE-2004-1064, CVE-2004-1065
BID : 11964, 11981, 11992, 12045


SERVER IP: 59.60.147.228
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher.
CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525
BID : 12963, 12962, 13143, 13163, 13164


SERVER IP: 59.60.147.228
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 59.60.147.228
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.ccrs.gov.cn 218.62.35.76
SERVER IP: 218.62.35.76
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.29 (Unix) PHP/4.3.4

SERVER IP: 218.62.35.76
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Script Injection attack The remote host is running a version of PHP which is older than 5.0.3 or 4.3.10. The remote version of this software is vulnerable to various security issues which may, under certain circumstances, allow attackers to execute arbitrary code on the remote host, provided that they can pass arbitrary data to some functions or bypass safe_mode. CVSS Base Score : 6 AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to PHP 5.0.3 or 4.3.10
CVE : CVE-2004-1018, CVE-2004-1019, CVE-2004-1020, CVE-2004-1063, CVE-2004-1064, CVE-2004-1065
BID : 11964, 11981, 11992, 12045


SERVER IP: 218.62.35.76
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher.
CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525
BID : 12963, 12962, 13143, 13163, 13164


SERVER IP: 218.62.35.76
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 218.62.35.76
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.cddln.gov.cn 203.207.195.81
SERVER IP: 203.207.195.81
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.59 (Unix) PHP/4.4.4

SERVER IP: 203.207.195.81
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 203.207.195.81
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.cdgs.gov.cn 221.237.177.3
SERVER IP: 221.237.177.3
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.cdjg.gov.cn 61.139.76.40
SERVER IP: 61.139.76.40
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.cdst.gov.cn 61.157.78.34
SERVER IP: 61.157.78.34
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.cea.gov.cn 210.72.96.25
SERVER IP: 210.72.96.25
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.realestate.cei.gov.cn 203.207.226.100
SERVER IP: 203.207.226.100
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.ffs.cgs.gov.cn 219.142.81.18
SERVER IP: 219.142.81.18
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.qimg.cgs.gov.cn 219.142.81.14
SERVER IP: 219.142.81.14
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.xian.cgs.gov.cn 219.144.130.60
SERVER IP: 219.144.130.60
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.54 (Win32)

www.cheminfo.gov.cn 168.160.250.68
SERVER IP: 168.160.250.68
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.chengbei.gov.cn 125.72.92.28
SERVER IP: 125.72.92.28
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.chengyang.gov.cn 221.215.126.130
SERVER IP: 221.215.126.130
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

SERVER IP: 221.215.126.130
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Script Injection attack The remote host is running a version of PHP which is older than 5.0.3 or 4.3.10. The remote version of this software is vulnerable to various security issues which may, under certain circumstances, allow attackers to execute arbitrary code on the remote host, provided that they can pass arbitrary data to some functions or bypass safe_mode. CVSS Base Score : 6 AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to PHP 5.0.3 or 4.3.10
CVE : CVE-2004-1018, CVE-2004-1019, CVE-2004-1020, CVE-2004-1063, CVE-2004-1064, CVE-2004-1065
BID : 11964, 11981, 11992, 12045


SERVER IP: 221.215.126.130
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher.
CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525
BID : 12963, 12962, 13143, 13163, 13164


SERVER IP: 221.215.126.130
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 221.215.126.130
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.chibi.gov.cn 219.138.167.137
SERVER IP: 219.138.167.137
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.china-language.gov.cn 124.207.106.19
SERVER IP: 124.207.106.19
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.chinaenergy.gov.cn 203.207.195.50
SERVER IP: 203.207.195.50
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.27 (Win32) PHP/4.3.3

SERVER IP: 203.207.195.50
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Script Injection attack The remote host is running a version of PHP which is older than 5.0.3 or 4.3.10. The remote version of this software is vulnerable to various security issues which may, under certain circumstances, allow attackers to execute arbitrary code on the remote host, provided that they can pass arbitrary data to some functions or bypass safe_mode. CVSS Base Score : 6 AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to PHP 5.0.3 or 4.3.10
CVE : CVE-2004-1018, CVE-2004-1019, CVE-2004-1020, CVE-2004-1063, CVE-2004-1064, CVE-2004-1065
BID : 11964, 11981, 11992, 12045


SERVER IP: 203.207.195.50
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher.
CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525
BID : 12963, 12962, 13143, 13163, 13164


SERVER IP: 203.207.195.50
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 203.207.195.50
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.chinafx.gov.cn 221.229.247.211
SERVER IP: 221.229.247.211
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.chinanet.gov.cn 203.86.73.228
SERVER IP: 203.86.73.228
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.chinapesticide.gov.cn 202.127.42.126
SERVER IP: 202.127.42.126
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.gscms.chinasafety.gov.cn 221.7.38.199
SERVER IP: 221.7.38.199
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.chinawest.gov.cn 203.207.120.249
SERVER IP: 203.207.120.249
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www1.chinawest.gov.cn 203.207.120.249
SERVER IP: 203.207.120.249
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.chrm.gov.cn 202.106.181.132
SERVER IP: 202.106.181.132
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.cigem.gov.cn 219.142.70.132
SERVER IP: 219.142.70.132
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.cjw.gov.cn 202.103.33.62
SERVER IP: 202.103.33.62
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.cla.gov.cn 210.22.13.42
SERVER IP: 210.22.13.42
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.cmda.gov.cn 218.246.34.107
SERVER IP: 218.246.34.107
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.cnan.gov.cn 211.147.16.22
SERVER IP: 211.147.16.22
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.2.0 (Unix) PHP/5.1.1

www.cnci.gov.cn 220.112.40.86
SERVER IP: 220.112.40.86
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.coc.gov.cn 219.142.101.117
SERVER IP: 219.142.101.117
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.counsellor.gov.cn 218.249.86.180
SERVER IP: 218.249.86.180
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

www.cpi.gov.cn 159.226.218.1
SERVER IP: 159.226.218.1
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: OSU/3.0alpha3

www.cpm.gov.cn 61.159.228.161
SERVER IP: 61.159.228.161
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.cppcc.gov.cn 202.106.161.2
SERVER IP: 202.106.161.2
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.48 (Unix)

www.cqaudit.gov.cn 218.70.229.121
SERVER IP: 218.70.229.121
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.cqciq.gov.cn 219.153.22.53
SERVER IP: 219.153.22.53
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.cqcrtv.gov.cn 123.100.2.120
SERVER IP: 123.100.2.120
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: WebLogic Server 8.1 SP2 Fri Dec 5 15:01:51 PST 2003 316284

SERVER IP: 123.100.2.120
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
The remote host is running the WebLogic web server. There is a flaw in it which allows an attacker to gain the NetBIOS host name of the remote host. Solution : NONE
BID : 7257


SERVER IP: 123.100.2.120
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running BEA Weblogic. Multiple undisclosed vulnerabilities have been reported in every versions of WebLogic up to and including 8.1.0 SP2. An attacker may exploit these issues to get unauthorized access or to gather information about the remote host. BEA Weblogic 8.1 Service Pack 3 addresses these vulnerabilities. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to WebLogic 8.1.0 SP3 or newer See also : http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/index.jsp
CVE : CVE-2004-2320
BID : 9506, 11168


SERVER IP: 123.100.2.120
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
Synopsis : The remote host may give an attacker information useful for future attacks The remote host is running BEA Weblogic. This version of Weblogic is vulnerable to an information disclosure vulnerability. Specifically, failed logins yield information regarding authentication scheme, validity of userID, etc. CVSS Base Score : 2 AV:R/AC:L/Au:NR/C:P/I:N/A:N/B:N Solution : Upgrade to WebLogic 8.1.0 SP4 or newer
CVE : CVE-2005-1380
BID : 13400, 12548


SERVER IP: 123.100.2.120
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of BEA WebLogic Server or WebLogic Express that is prone to multiple vulnerabilities. These flaws could lead to buffer overflows, denial of service, unauthorized access, cross-site scripting attacks, and information disclosure. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to WebLogic 8.1.0 SP5 or newer See also : http://dev2dev.bea.com/advisoriesnotifications
CVE : CVE-2005-1380, CVE-2005-1742, CVE-2005-1743, CVE-2005-1744, CVE-2005-1745, CVE-2005-1746, CVE-2005-1747, CVE-2005-1748, CVE-2005-1749
BID : 12548, 13400, 13717, 13793, 13794, 14632, 14657


SERVER IP: 123.100.2.120
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a flaw which allows attackers to retrieve sensitive files The remote host is running a version of BEA WebLogic Server or WebLogic Express that is prone to a flaw in the way that it handles anonymous RMI connections. An attacker, exploiting this flaw, would be able to retrieve sensitive configuration files anonymously. Such information would undoubtedly aid the attacker in more sophisticated attacks. CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N Solution : Upgrade to WebLogic 8.1.0 SP6 or newer See also : http://dev2dev.bea.com/advisoriesnotifications
CVE : CVE-2003-1290
BID : 16215


SERVER IP: 123.100.2.120
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of BEA WebLogic Server which is vulnerable to eleven (11) distinct vulnerabilities. An attacker, exploiting these flaws, would be able to impact Availability, Confidentiality and Integrity. CVSS Base Score : 10.0 CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C Solution : Apply the relevant patches from BEA. See also : http://www.beasys.com/products/weblogic/index.html
BID : 17982


www.cqda.gov.cn 202.98.57.18
SERVER IP: 202.98.57.18
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Enhydra-MultiServer/3.1

www.cqjgdj.gov.cn 219.153.2.20
SERVER IP: 219.153.2.20
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.cqjt.gov.cn 61.242.253.212
SERVER IP: 61.242.253.212
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.cqlottery.gov.cn 61.129.33.140
SERVER IP: 61.129.33.140
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.cqmj.gov.cn 61.186.169.169
SERVER IP: 61.186.169.169
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.cqrk.gov.cn 219.153.37.30
SERVER IP: 219.153.37.30
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.cqtj.gov.cn 222.177.15.8
SERVER IP: 222.177.15.8
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.csh.gov.cn 202.103.114.7
SERVER IP: 202.103.114.7
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.ctei.gov.cn 210.51.7.120
SERVER IP: 210.51.7.120
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.customs.gov.cn 202.127.48.35
SERVER IP: 202.127.48.35
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

www.cxs.gov.cn 220.165.143.54
SERVER IP: 220.165.143.54
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.czrs.gov.cn 61.132.90.156
SERVER IP: 61.132.90.156
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.daan.gov.cn 60.28.246.92
SERVER IP: 60.28.246.92
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.dandong.gov.cn 59.45.63.187
SERVER IP: 59.45.63.187
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Lotus-Domino

www.dctq.gov.cn 218.244.152.30
SERVER IP: 218.244.152.30
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.dezhou.gov.cn 222.133.32.2
SERVER IP: 222.133.32.2
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.dfxj.gov.cn 61.129.89.144
SERVER IP: 61.129.89.144
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.dhl.gov.cn 61.166.100.2
SERVER IP: 61.166.100.2
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.dhly.gov.cn 59.60.59.34
SERVER IP: 59.60.59.34
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.gzw.dl.gov.cn 202.142.21.213
SERVER IP: 202.142.21.213
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

SERVER IP: 202.142.21.213
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 202.142.21.213
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.dlhitech.gov.cn 61.232.165.131
SERVER IP: 61.232.165.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache-Coyote/1.1

www.dlpld.gov.cn 218.25.162.55
SERVER IP: 218.25.162.55
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Resin/2.1.17

www.dlzh.gov.cn 218.25.162.75
SERVER IP: 218.25.162.75
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Resin/2.1.17

www.dongfeng.gov.cn 218.62.56.114
SERVER IP: 218.62.56.114
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.dongning.gov.cn 221.206.179.23
SERVER IP: 221.206.179.23
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.dtzc.gov.cn 168.160.200.6
SERVER IP: 168.160.200.6
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.dxad.gov.cn 218.246.95.219
SERVER IP: 218.246.95.219
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.dxic.gov.cn 218.246.95.232
SERVER IP: 218.246.95.232
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.dyhb.gov.cn 218.6.146.98
SERVER IP: 218.6.146.98
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.dyrc.gov.cn 61.153.35.181
SERVER IP: 61.153.35.181
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.dz.gov.cn 222.133.32.2
SERVER IP: 222.133.32.2
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.emc.gov.cn 202.106.190.8
SERVER IP: 202.106.190.8
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.envir.gov.cn 202.96.215.249
SERVER IP: 202.96.215.249
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.expo2006sy.gov.cn 218.25.42.212
SERVER IP: 218.25.42.212
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.fdc.gov.cn 218.86.36.207
SERVER IP: 218.86.36.207
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.fish.gov.cn 122.200.64.41
SERVER IP: 122.200.64.41
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.fj.gov.cn 218.85.73.162
SERVER IP: 218.85.73.162
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.2.4 (Unix)

www.fjax.gov.cn 222.76.216.105
SERVER IP: 222.76.216.105
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.fjinfo.gov.cn 59.56.176.110
SERVER IP: 59.56.176.110
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.fjipo.gov.cn 218.104.235.58
SERVER IP: 218.104.235.58
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.fjjc.gov.cn 218.66.59.238
SERVER IP: 218.66.59.238
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.fjkjt.gov.cn 59.56.176.110
SERVER IP: 59.56.176.110
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.fjlss.gov.cn 222.77.185.196
SERVER IP: 222.77.185.196
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.fjsp.gov.cn 218.66.59.58
SERVER IP: 218.66.59.58
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.fohb.gov.cn 58.49.59.191
SERVER IP: 58.49.59.191
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.forestry.gov.cn 202.99.63.178
SERVER IP: 202.99.63.178
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.fsfao.gov.cn 202.105.12.250
SERVER IP: 202.105.12.250
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.fsi.gov.cn 219.238.178.39
SERVER IP: 219.238.178.39
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.fsjyzx.gov.cn 61.145.71.155
SERVER IP: 61.145.71.155
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/5.0

www.fsxxb.gov.cn 219.130.221.37
SERVER IP: 219.130.221.37
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.2.4 (Win32)

www.fujian.gov.cn 218.85.73.162
SERVER IP: 218.85.73.162
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.2.4 (Unix)

www.fzedu.gov.cn 211.143.182.168
SERVER IP: 211.143.182.168
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.gaoming.gov.cn 61.145.75.122
SERVER IP: 61.145.75.122
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.gaozhou.gov.cn 218.30.96.106
SERVER IP: 218.30.96.106
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.tyj.gd.gov.cn 210.76.65.113
SERVER IP: 210.76.65.113
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.gdcct.gov.cn 121.33.248.22
SERVER IP: 121.33.248.22
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.2.2 (Unix) DAV/2 mod_jk/1.2.23

www.gdcx.gov.cn 58.62.172.126
SERVER IP: 58.62.172.126
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.gddoftec.gov.cn 211.155.27.140
SERVER IP: 211.155.27.140
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/5.0

www.gdltax.gov.cn 61.140.99.120
SERVER IP: 61.140.99.120
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

www.gdnet110.gov.cn 210.76.65.131
SERVER IP: 210.76.65.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

www.gdwater.gov.cn 58.248.46.23
SERVER IP: 58.248.46.23
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache-Coyote/1.1

www.greenhr.gov.cn 202.99.63.184
SERVER IP: 202.99.63.184
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.gsjt.gov.cn 61.178.108.25
SERVER IP: 61.178.108.25
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.gszl.gov.cn 61.178.20.212
SERVER IP: 61.178.20.212
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.53 (Unix) PHP/4.3.9 mod_jk2/2.0.4

SERVER IP: 61.178.20.212
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Script Injection attack The remote host is running a version of PHP which is older than 5.0.3 or 4.3.10. The remote version of this software is vulnerable to various security issues which may, under certain circumstances, allow attackers to execute arbitrary code on the remote host, provided that they can pass arbitrary data to some functions or bypass safe_mode. CVSS Base Score : 6 AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to PHP 5.0.3 or 4.3.10
CVE : CVE-2004-1018, CVE-2004-1019, CVE-2004-1020, CVE-2004-1063, CVE-2004-1064, CVE-2004-1065
BID : 11964, 11981, 11992, 12045


SERVER IP: 61.178.20.212
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher.
CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525
BID : 12963, 12962, 13143, 13163, 13164


SERVER IP: 61.178.20.212
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 61.178.20.212
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.guiyang.gov.cn 211.156.140.164
SERVER IP: 211.156.140.164
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.gxdx.gov.cn 219.159.82.129
SERVER IP: 219.159.82.129
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.gxit.gov.cn 211.97.71.109
SERVER IP: 211.97.71.109
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.gxmzt.gov.cn 219.159.69.131
SERVER IP: 219.159.69.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.53 (Win32) PHP/4.3.10

SERVER IP: 219.159.69.131
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher.
CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525
BID : 12963, 12962, 13143, 13163, 13164


SERVER IP: 219.159.69.131
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 219.159.69.131
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.gxrs.gov.cn 219.159.68.91
SERVER IP: 219.159.68.91
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.gxtj.gov.cn 210.72.34.8
SERVER IP: 210.72.34.8
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.gygov.gov.cn 219.141.18.13
SERVER IP: 219.141.18.13
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

www.gzaj.gov.cn 220.197.208.170
SERVER IP: 220.197.208.170
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.gzepb.gov.cn 210.72.1.33
SERVER IP: 210.72.1.33
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.gzgs.gov.cn 222.85.128.176
SERVER IP: 222.85.128.176
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.59 (Unix) PHP/4.4.4

SERVER IP: 222.85.128.176
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 222.85.128.176
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.gzjj.gov.cn 59.60.21.229
SERVER IP: 59.60.21.229
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.gzkj.gov.cn 210.72.3.203
SERVER IP: 210.72.3.203
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.54 (Unix) mod_jk/1.2.13

www.gzpf.gov.cn 59.41.8.142
SERVER IP: 59.41.8.142
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.54 (Debian GNU/Linux) PHP/4.3.10-9

SERVER IP: 59.41.8.142
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher.
CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525
BID : 12963, 12962, 13143, 13163, 13164


SERVER IP: 59.41.8.142
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 59.41.8.142
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.gzpi.gov.cn 59.41.8.110
SERVER IP: 59.41.8.110
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.gzrc.gov.cn 61.145.164.239
SERVER IP: 61.145.164.239
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.gzsj.gov.cn 219.151.1.37
SERVER IP: 219.151.1.37
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.gzsjyt.gov.cn 221.13.4.88
SERVER IP: 221.13.4.88
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

SERVER IP: 221.13.4.88
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Script Injection attack The remote host is running a version of PHP which is older than 5.0.3 or 4.3.10. The remote version of this software is vulnerable to various security issues which may, under certain circumstances, allow attackers to execute arbitrary code on the remote host, provided that they can pass arbitrary data to some functions or bypass safe_mode. CVSS Base Score : 6 AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to PHP 5.0.3 or 4.3.10
CVE : CVE-2004-1018, CVE-2004-1019, CVE-2004-1020, CVE-2004-1063, CVE-2004-1064, CVE-2004-1065
BID : 11964, 11981, 11992, 12045


SERVER IP: 221.13.4.88
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher.
CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525
BID : 12963, 12962, 13143, 13163, 13164


SERVER IP: 221.13.4.88
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 221.13.4.88
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.gzsmzt.gov.cn 222.191.251.6
SERVER IP: 222.191.251.6
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.33 (Unix) mod_throttle/3.1.2

SERVER IP: 222.191.251.6
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 222.191.251.6
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.gzszx.gov.cn 61.139.126.37
SERVER IP: 61.139.126.37
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.gztongzi.gov.cn 202.98.223.70
SERVER IP: 202.98.223.70
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.gzwaishi.gov.cn 210.72.1.10
SERVER IP: 210.72.1.10
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: squid/2.5.STABLE5

www.hailar.gov.cn 60.31.214.153
SERVER IP: 60.31.214.153
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.harczx.gov.cn 218.2.20.138
SERVER IP: 218.2.20.138
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.hbagri.gov.cn 58.49.103.227
SERVER IP: 58.49.103.227
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.hbdofcom.gov.cn 219.140.77.58
SERVER IP: 219.140.77.58
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache-Coyote/1.1

www.hbdrc.gov.cn 121.28.129.67
SERVER IP: 121.28.129.67
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache-Coyote/1.1

www.hbhrc.gov.cn 60.29.62.20
SERVER IP: 60.29.62.20
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.55 (Unix) PHP/5.0.5

SERVER IP: 60.29.62.20
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host may give an attacker information useful for future attacks The remote host is running a version of PHP which is older than 5.0.6. This version has a flaw wherein remote attackers can reenable the 'register_globals' parameter. In addition, a remote attacker may be able to overwrite the 'GLOBAL' variable. This may lead to another, more serious, exploitation. CVSS Base Score : 9.3 CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C Solution : Upgrade to PHP 5.0.6 or later See also : http://www.php.net/release_4_4_1.php
CVE : CVE-2006-0395, CVE-2005-2713, CVE-2005-2714, CVE-2005-3319, CVE-2005-3353, CVE-2005-3389, CVE-2005-3706, CVE-2005-3712, CVE-2005-4217, CVE-2005-4504, CVE-2006-0383, CVE-2006-0384, CVE-2006-0386, CVE-2006-0387, CVE-2006-0388, CVE-2006-0389, CVE-2006-0391, CVE-2006-3016, CVE-2006-3018, CVE-2005-3883, CVE-2006-3017, CVE-2005-3390, CVE-2005-3392, CVE-2005-3391
BID : 15571, 16907, 17843, 15249, 15411, 15413, 15250


SERVER IP: 60.29.62.20
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 60.29.62.20
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


SERVER IP: 60.29.62.20
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php
CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756
BID : 23359, 24089, 24259, 24261


SERVER IP: 60.29.62.20
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher
CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806
BID : 25498


SERVER IP: 60.29.62.20
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


www.hbinnofund.gov.cn 210.51.174.105
SERVER IP: 210.51.174.105
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.hbipo.gov.cn 59.39.59.59
SERVER IP: 59.39.59.59
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.hblr.gov.cn 220.202.12.150
SERVER IP: 220.202.12.150
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.hbmyjj.gov.cn 61.55.138.196
SERVER IP: 61.55.138.196
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.hbwmw.gov.cn 202.103.41.60
SERVER IP: 202.103.41.60
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.33 (Unix) PHP/4.1.2

SERVER IP: 202.103.41.60
PORT/PROTOCOL: 80/tcp
TYPE: INFO
The remote web server is running a version of PHP which is older than 4.2.2. This version has a bug in its mail() function which does not properly sanitize user input. As a result, users can forge email to make it look like it is coming from a different source that the server. Solution : Upgrade to PHP 4.2.2
CVE : CVE-2002-0986, CVE-2002-0985
BID : 5562


SERVER IP: 202.103.41.60
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
The remote host is running a version of PHP which is older than 4.3.2. This version contains various flaws that may allow an attacker who has the ability to execute PHP scripts in safe_mode on this host to execute arbitrary commands with the privileges of the HTTP daemon Solution : Upgrade to PHP 4.3.2
CVE : CVE-2003-0166
BID : 7256, 7259, 7187, 7197, 7198, 7199, 7210


SERVER IP: 202.103.41.60
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Script Injection attack The remote host is running a version of PHP which is older than 5.0.3 or 4.3.10. The remote version of this software is vulnerable to various security issues which may, under certain circumstances, allow attackers to execute arbitrary code on the remote host, provided that they can pass arbitrary data to some functions or bypass safe_mode. CVSS Base Score : 6 AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to PHP 5.0.3 or 4.3.10
CVE : CVE-2004-1018, CVE-2004-1019, CVE-2004-1020, CVE-2004-1063, CVE-2004-1064, CVE-2004-1065
BID : 11964, 11981, 11992, 12045


SERVER IP: 202.103.41.60
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher.
CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525
BID : 12963, 12962, 13143, 13163, 13164


SERVER IP: 202.103.41.60
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 202.103.41.60
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.hbzx.gov.cn 202.103.25.20
SERVER IP: 202.103.25.20
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

www.hddjbaic.gov.cn 219.235.241.176
SERVER IP: 219.235.241.176
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache-Coyote/1.1

www.hdlsj.gov.cn 218.30.96.26
SERVER IP: 218.30.96.26
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.hdwj.gov.cn 218.244.130.219
SERVER IP: 218.244.130.219
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

www.hebei.gov.cn 124.239.194.1
SERVER IP: 124.239.194.1
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache-Coyote/1.1

www.hebi.gov.cn 202.102.234.198
SERVER IP: 202.102.234.198
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.heihe.gov.cn 221.208.80.72
SERVER IP: 221.208.80.72
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.henanqx.gov.cn 218.28.7.252
SERVER IP: 218.28.7.252
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache-Coyote/1.1

www.hengyang.gov.cn 59.51.9.101
SERVER IP: 59.51.9.101
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

www.hetz.gov.cn 61.135.203.10
SERVER IP: 61.135.203.10
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Resin/2.1.17

www.hfboftec.gov.cn 61.133.142.59
SERVER IP: 61.133.142.59
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Resin/2.1.10

www.hfsghj.gov.cn 61.133.142.32
SERVER IP: 61.133.142.32
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.hiciq.gov.cn 202.100.210.251
SERVER IP: 202.100.210.251
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.hicourt.gov.cn 218.77.128.138
SERVER IP: 218.77.128.138
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.hljcdm.gov.cn 210.76.36.128
SERVER IP: 210.76.36.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.hljdx.gov.cn 61.167.250.2
SERVER IP: 61.167.250.2
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.hljjs.gov.cn 218.10.65.247
SERVER IP: 218.10.65.247
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.hljmj.gov.cn 221.208.194.103
SERVER IP: 221.208.194.103
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.hljwst.gov.cn 221.212.125.14
SERVER IP: 221.212.125.14
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache-Coyote/1.1

www.hnciq.gov.cn 222.240.198.20
SERVER IP: 222.240.198.20
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.54 (Unix) mod_ssl/2.0.54 OpenSSL/0.9.7e DAV/2 PHP/5.2.0 mod_perl/2.0.1 Perl/v5.8.7

SERVER IP: 222.240.198.20
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 222.240.198.20
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 222.240.198.20
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


SERVER IP: 222.240.198.20
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php
CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756
BID : 23359, 24089, 24259, 24261


SERVER IP: 222.240.198.20
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher
CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806
BID : 25498


SERVER IP: 222.240.198.20
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


SERVER IP: 222.240.198.20
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


www.hncredit.gov.cn 222.240.162.174
SERVER IP: 222.240.162.174
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.hndrc.gov.cn 222.143.24.198
SERVER IP: 222.143.24.198
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.2.3 (Red Hat)

www.hninfo.gov.cn 61.187.87.37
SERVER IP: 61.187.87.37
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.hnjt.gov.cn 222.240.223.194
SERVER IP: 222.240.223.194
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.hnjy.gov.cn 218.77.186.138
SERVER IP: 218.77.186.138
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.hnleader.gov.cn 202.103.67.176
SERVER IP: 202.103.67.176
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.hnly.gov.cn 218.28.141.173
SERVER IP: 218.28.141.173
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.55 (Win32) mod_jk2/2.0.4

www.hnmtdz.gov.cn 125.46.104.166
SERVER IP: 125.46.104.166
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.hnt.gov.cn 61.187.88.247
SERVER IP: 61.187.88.247
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.hntj.gov.cn 222.240.156.30
SERVER IP: 222.240.156.30
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.hnwqb.gov.cn 220.181.45.116
SERVER IP: 220.181.45.116
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.hnyr.gov.cn 218.28.13.90
SERVER IP: 218.28.13.90
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: WebLogic Server 8.1 SP3 Tue Jun 29 23:11:19 PDT 2004 404973

SERVER IP: 218.28.13.90
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
The remote host is running the WebLogic web server. There is a flaw in it which allows an attacker to gain the NetBIOS host name of the remote host. Solution : NONE
BID : 7257


SERVER IP: 218.28.13.90
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
Synopsis : The remote host may give an attacker information useful for future attacks The remote host is running BEA Weblogic. This version of Weblogic is vulnerable to an information disclosure vulnerability. Specifically, failed logins yield information regarding authentication scheme, validity of userID, etc. CVSS Base Score : 2 AV:R/AC:L/Au:NR/C:P/I:N/A:N/B:N Solution : Upgrade to WebLogic 8.1.0 SP4 or newer
CVE : CVE-2005-1380
BID : 13400, 12548


SERVER IP: 218.28.13.90
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of BEA WebLogic Server or WebLogic Express that is prone to multiple vulnerabilities. These flaws could lead to buffer overflows, denial of service, unauthorized access, cross-site scripting attacks, and information disclosure. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to WebLogic 8.1.0 SP5 or newer See also : http://dev2dev.bea.com/advisoriesnotifications
CVE : CVE-2005-1380, CVE-2005-1742, CVE-2005-1743, CVE-2005-1744, CVE-2005-1745, CVE-2005-1746, CVE-2005-1747, CVE-2005-1748, CVE-2005-1749
BID : 12548, 13400, 13717, 13793, 13794, 14632, 14657


SERVER IP: 218.28.13.90
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a flaw which allows attackers to retrieve sensitive files The remote host is running a version of BEA WebLogic Server or WebLogic Express that is prone to a flaw in the way that it handles anonymous RMI connections. An attacker, exploiting this flaw, would be able to retrieve sensitive configuration files anonymously. Such information would undoubtedly aid the attacker in more sophisticated attacks. CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N Solution : Upgrade to WebLogic 8.1.0 SP6 or newer See also : http://dev2dev.bea.com/advisoriesnotifications
CVE : CVE-2003-1290
BID : 16215


www.hrbgaj.gov.cn 61.158.105.69
SERVER IP: 61.158.105.69
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.46 (Red Hat)

SERVER IP: 61.158.105.69
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Script Injection attack The remote host is running a version of PHP which is older than 5.0.3 or 4.3.10. The remote version of this software is vulnerable to various security issues which may, under certain circumstances, allow attackers to execute arbitrary code on the remote host, provided that they can pass arbitrary data to some functions or bypass safe_mode. CVSS Base Score : 6 AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to PHP 5.0.3 or 4.3.10
CVE : CVE-2004-1018, CVE-2004-1019, CVE-2004-1020, CVE-2004-1063, CVE-2004-1064, CVE-2004-1065
BID : 11964, 11981, 11992, 12045


SERVER IP: 61.158.105.69
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher.
CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525
BID : 12963, 12962, 13143, 13163, 13164


SERVER IP: 61.158.105.69
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 61.158.105.69
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.hrbgzw.gov.cn 221.208.168.54
SERVER IP: 221.208.168.54
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.hslib.gov.cn 61.184.107.113
SERVER IP: 61.184.107.113
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.hsq.gov.cn 218.22.219.100
SERVER IP: 218.22.219.100
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.huaibei.gov.cn 218.22.238.59
SERVER IP: 218.22.238.59
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Hodesoft Corp. PHP/4.3.4

SERVER IP: 218.22.238.59
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Script Injection attack The remote host is running a version of PHP which is older than 5.0.3 or 4.3.10. The remote version of this software is vulnerable to various security issues which may, under certain circumstances, allow attackers to execute arbitrary code on the remote host, provided that they can pass arbitrary data to some functions or bypass safe_mode. CVSS Base Score : 6 AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to PHP 5.0.3 or 4.3.10
CVE : CVE-2004-1018, CVE-2004-1019, CVE-2004-1020, CVE-2004-1063, CVE-2004-1064, CVE-2004-1065
BID : 11964, 11981, 11992, 12045


SERVER IP: 218.22.238.59
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher.
CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525
BID : 12963, 12962, 13143, 13163, 13164


SERVER IP: 218.22.238.59
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 218.22.238.59
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.huainan.gov.cn 220.248.236.34
SERVER IP: 220.248.236.34
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache-Coyote/1.1

www.huaiyin.gov.cn 218.57.143.198
SERVER IP: 218.57.143.198
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.huantai.gov.cn 60.210.98.43
SERVER IP: 60.210.98.43
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.hubei.gov.cn 219.140.171.55
SERVER IP: 219.140.171.55
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.hubeiwater.gov.cn 219.140.162.172
SERVER IP: 219.140.162.172
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.huizhou.gov.cn 59.33.252.229
SERVER IP: 59.33.252.229
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache-Coyote/1.1

www.hunan.gov.cn 202.103.114.9
SERVER IP: 202.103.114.9
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.hunangrain.gov.cn 202.103.114.10
SERVER IP: 202.103.114.10
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.huoqiu.gov.cn 220.178.18.20
SERVER IP: 220.178.18.20
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.hydroinfo.gov.cn 219.142.62.9
SERVER IP: 219.142.62.9
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.hzsj.gov.cn 218.108.116.12
SERVER IP: 218.108.116.12
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.info.gov.cn 221.6.180.105
SERVER IP: 221.6.180.105
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.infobase.gov.cn 218.57.8.16
SERVER IP: 218.57.8.16
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.ivdc.gov.cn 222.35.47.70
SERVER IP: 222.35.47.70
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.jgjy.gov.cn 218.92.11.3
SERVER IP: 218.92.11.3
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.jiangxi.gov.cn 218.87.20.8
SERVER IP: 218.87.20.8
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.jiaozhou.gov.cn 218.58.54.13
SERVER IP: 218.58.54.13
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.jiexi.gov.cn 61.143.153.234
SERVER IP: 61.143.153.234
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache-Coyote/1.1

www.jingshan.gov.cn 219.138.120.147
SERVER IP: 219.138.120.147
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.jiyuan.gov.cn 222.140.112.26
SERVER IP: 222.140.112.26
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.jlagri.gov.cn 61.138.179.12
SERVER IP: 61.138.179.12
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.jlds.gov.cn 202.111.165.224
SERVER IP: 202.111.165.224
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache-Coyote/1.1

www.jlfiw.gov.cn 218.62.27.52
SERVER IP: 218.62.27.52
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache-Coyote/1.1

www.jlqx.gov.cn 218.62.26.196
SERVER IP: 218.62.26.196
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: mod_tamper_detect 1.0.2 Apache/2.0.54 (Unix) DAV/2

www.jlsafety.gov.cn 221.8.56.235
SERVER IP: 221.8.56.235
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.jlscy.gov.cn 218.62.65.194
SERVER IP: 218.62.65.194
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.jlthx.gov.cn 218.27.180.111
SERVER IP: 218.27.180.111
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.jlws.gov.cn 202.111.165.247
SERVER IP: 202.111.165.247
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache-Coyote/1.1

www.jndz.gov.cn 61.132.59.46
SERVER IP: 61.132.59.46
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache-Coyote/1.1

www.jscz.gov.cn 218.94.38.179
SERVER IP: 218.94.38.179
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.59 (Unix) DAV/2 PHP/4.4.4

SERVER IP: 218.94.38.179
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 218.94.38.179
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.jsga.gov.cn 218.94.123.23
SERVER IP: 218.94.123.23
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.2.4 (Win32) mod_jk/1.2.25

www.jsinfo.gov.cn 210.73.128.41
SERVER IP: 210.73.128.41
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.jswater.gov.cn 218.94.6.91
SERVER IP: 218.94.6.91
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.jszx.gov.cn 218.94.0.9
SERVER IP: 218.94.0.9
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_jk2/2.0.0 mod_ssl/2.8.12 OpenSSL/0.9.6b DAV/1.0.3 PHP/4.1.2 mod_perl/1.26

www.jxciq.gov.cn 218.65.86.7
SERVER IP: 218.65.86.7
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.jxdaj.gov.cn 218.87.32.249
SERVER IP: 218.87.32.249
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.jxdii.gov.cn 218.87.32.235
SERVER IP: 218.87.32.235
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.jxf.gov.cn 218.65.89.131
SERVER IP: 218.65.89.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

SERVER IP: 218.65.89.131
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 218.65.89.131
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.jxgc.gov.cn 202.101.234.201
SERVER IP: 202.101.234.201
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.jxgrain.gov.cn 218.87.20.10
SERVER IP: 218.87.20.10
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.jxjst.gov.cn 59.52.254.108
SERVER IP: 59.52.254.108
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.33 (Win32) PHP/4.3.11

www.jxmg.gov.cn 60.195.250.153
SERVER IP: 60.195.250.153
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.jxmie.gov.cn 218.64.59.106
SERVER IP: 218.64.59.106
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.jxsp.gov.cn 202.108.124.170
SERVER IP: 202.108.124.170
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.jxsq.gov.cn 59.53.50.168
SERVER IP: 59.53.50.168
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.jxwrd.gov.cn 218.204.130.109
SERVER IP: 218.204.130.109
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache-Coyote/1.1

www.jxyf.gov.cn 61.180.25.58
SERVER IP: 61.180.25.58
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.jxzfw.gov.cn 220.175.8.6
SERVER IP: 220.175.8.6
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.jz.gov.cn 60.21.221.46
SERVER IP: 60.21.221.46
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.55 (Win32) PHP/4.4.4

www.kepz.gov.cn 221.224.22.196
SERVER IP: 221.224.22.196
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.km.gov.cn 222.221.252.217
SERVER IP: 222.221.252.217
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.kmcgfda.gov.cn 117.25.130.140
SERVER IP: 117.25.130.140
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.medgen.labs.gov.cn 61.139.126.18
SERVER IP: 61.139.126.18
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.laipo.gov.cn 211.155.23.248
SERVER IP: 211.155.23.248
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.52 (Red Hat)

www.landscape.gov.cn 61.152.93.61
SERVER IP: 61.152.93.61
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.lasa.gov.cn 221.13.64.228
SERVER IP: 221.13.64.228
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.33 (Win32) mod_gzip/1.3.26.1a PHP/4.3.10

SERVER IP: 221.13.64.228
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher.
CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525
BID : 12963, 12962, 13143, 13163, 13164


SERVER IP: 221.13.64.228
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 221.13.64.228
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.laty.gov.cn 220.180.15.76
SERVER IP: 220.180.15.76
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.lf.gov.cn 60.10.19.136
SERVER IP: 60.10.19.136
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.lijiang.gov.cn 61.166.7.153
SERVER IP: 61.166.7.153
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/5.0

www.linfen.gov.cn 60.28.239.26
SERVER IP: 60.28.239.26
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.linqing.gov.cn 219.146.220.188
SERVER IP: 219.146.220.188
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.40 (Red Hat Linux)

SERVER IP: 219.146.220.188
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
The remote host is running a version of PHP which is older than 4.3.2. This version contains various flaws that may allow an attacker who has the ability to execute PHP scripts in safe_mode on this host to execute arbitrary commands with the privileges of the HTTP daemon Solution : Upgrade to PHP 4.3.2
CVE : CVE-2003-0166
BID : 7256, 7259, 7187, 7197, 7198, 7199, 7210


SERVER IP: 219.146.220.188
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Script Injection attack The remote host is running a version of PHP which is older than 5.0.3 or 4.3.10. The remote version of this software is vulnerable to various security issues which may, under certain circumstances, allow attackers to execute arbitrary code on the remote host, provided that they can pass arbitrary data to some functions or bypass safe_mode. CVSS Base Score : 6 AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to PHP 5.0.3 or 4.3.10
CVE : CVE-2004-1018, CVE-2004-1019, CVE-2004-1020, CVE-2004-1063, CVE-2004-1064, CVE-2004-1065
BID : 11964, 11981, 11992, 12045


SERVER IP: 219.146.220.188
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher.
CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525
BID : 12963, 12962, 13143, 13163, 13164


SERVER IP: 219.146.220.188
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 219.146.220.188
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.liuzhou.gov.cn 61.29.234.65
SERVER IP: 61.29.234.65
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.45 (RedFlag Linux)

www.ljta.gov.cn 218.63.168.234
SERVER IP: 218.63.168.234
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.dps.ln.gov.cn 218.25.11.160
SERVER IP: 218.25.11.160
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IIS/6.2.2 (Win64) mod_ssl/6.2.2 OpenSSL/0.9.8b PHP/5.1.4

SERVER IP: 218.25.11.160
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 218.25.11.160
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 218.25.11.160
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


SERVER IP: 218.25.11.160
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php
CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756
BID : 23359, 24089, 24259, 24261


SERVER IP: 218.25.11.160
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher
CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806
BID : 25498


SERVER IP: 218.25.11.160
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


SERVER IP: 218.25.11.160
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


www.lnciq.gov.cn 218.25.158.48
SERVER IP: 218.25.158.48
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.lndx.gov.cn 218.244.136.42
SERVER IP: 218.244.136.42
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.lngs.gov.cn 220.201.7.243
SERVER IP: 220.201.7.243
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.lnmz.gov.cn 218.25.65.140
SERVER IP: 218.25.65.140
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.lnppb.gov.cn 218.25.39.188
SERVER IP: 218.25.39.188
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.lnprice.gov.cn 202.96.65.188
SERVER IP: 202.96.65.188
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache-Coyote/1.1

www.lnsports.gov.cn 60.19.24.12
SERVER IP: 60.19.24.12
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

SERVER IP: 60.19.24.12
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 60.19.24.12
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.locpg.gov.cn 60.195.251.237
SERVER IP: 60.195.251.237
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.lottery.gov.cn 210.51.178.135
SERVER IP: 210.51.178.135
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.loulan.gov.cn 218.31.132.251
SERVER IP: 218.31.132.251
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.lsjsw.gov.cn 61.132.55.198
SERVER IP: 61.132.55.198
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.lsjw.gov.cn 202.107.248.203
SERVER IP: 202.107.248.203
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.xjhm.lss.gov.cn 218.84.139.66
SERVER IP: 218.84.139.66
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.lsst.gov.cn 218.88.187.212
SERVER IP: 218.88.187.212
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.2.3 (Debian) PHP/5.2.0-8+etch7

SERVER IP: 218.88.187.212
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 218.88.187.212
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


SERVER IP: 218.88.187.212
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php
CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756
BID : 23359, 24089, 24259, 24261


SERVER IP: 218.88.187.212
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher
CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806
BID : 25498


SERVER IP: 218.88.187.212
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


www.lyinfo.gov.cn 211.152.50.182
SERVER IP: 211.152.50.182
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.mas.gov.cn 61.191.178.20
SERVER IP: 61.191.178.20
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.meizhou.gov.cn 219.132.136.68
SERVER IP: 219.132.136.68
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.59 (Win32) PHP/4.4.7

www.minhou.gov.cn 218.5.8.249
SERVER IP: 218.5.8.249
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.mirror.gov.cn 202.110.236.131
SERVER IP: 202.110.236.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.mudanjiang.gov.cn 221.206.121.21
SERVER IP: 221.206.121.21
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: JRun Web Server

www.mushroom.gov.cn 60.190.121.9
SERVER IP: 60.190.121.9
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.2.3 (APMServ) mod_ssl/2.2.3 OpenSSL/0.9.8d PHP/5.2.0

SERVER IP: 60.190.121.9
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 60.190.121.9
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


SERVER IP: 60.190.121.9
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php
CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756
BID : 23359, 24089, 24259, 24261


SERVER IP: 60.190.121.9
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher
CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806
BID : 25498


SERVER IP: 60.190.121.9
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


SERVER IP: 60.190.121.9
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


www.mykj.gov.cn 219.234.94.135
SERVER IP: 219.234.94.135
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.nanao.gov.cn 61.141.22.86
SERVER IP: 61.141.22.86
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.nantong.gov.cn 58.221.238.200
SERVER IP: 58.221.238.200
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.nantou.gov.cn 61.152.160.60
SERVER IP: 61.152.160.60
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

SERVER IP: 61.152.160.60
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 61.152.160.60
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.nbciq.gov.cn 220.189.220.187
SERVER IP: 220.189.220.187
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.59 (Win32) Resin/3.0.3

SERVER IP: 220.189.220.187
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote web server is prone to a directory traversal attack. The remote host is running Resin, an application server. The installation of Resin on the remote host allows an unauthenticated remote attacker to gain access to the web-inf directories, or any known subdirectories, on the affected Windows host, which may lead to a loss of confidentiality. CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N Solution : Upgrade to Resin / Resin Pro 3.1.1 or later. See also : http://www.rapid7.com/advisories/R7-0029.jsp
CVE : CVE-2007-2441, CVE-2007-2440
BID : 23985


www.nbfet.gov.cn 220.191.169.25
SERVER IP: 220.191.169.25
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

SERVER IP: 220.191.169.25
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP which is older than 5.0.5. This version has a number of bugs which allow attackers to execute or retrieve arbitrary files outside of the web root directory. An attacker, exploiting these flaws, would only need to send a malformed HTTP request to the vulnerable system. Successful exploitation would result in the loss of Confidential data or a tarnishing of system Integrity. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 5.0.5 or later
BID : 15119


SERVER IP: 220.191.169.25
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host may give an attacker information useful for future attacks The remote host is running a version of PHP which is older than 5.0.6. This version has a flaw wherein remote attackers can reenable the 'register_globals' parameter. In addition, a remote attacker may be able to overwrite the 'GLOBAL' variable. This may lead to another, more serious, exploitation. CVSS Base Score : 9.3 CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C Solution : Upgrade to PHP 5.0.6 or later See also : http://www.php.net/release_4_4_1.php
CVE : CVE-2006-0395, CVE-2005-2713, CVE-2005-2714, CVE-2005-3319, CVE-2005-3353, CVE-2005-3389, CVE-2005-3706, CVE-2005-3712, CVE-2005-4217, CVE-2005-4504, CVE-2006-0383, CVE-2006-0384, CVE-2006-0386, CVE-2006-0387, CVE-2006-0388, CVE-2006-0389, CVE-2006-0391, CVE-2006-3016, CVE-2006-3018, CVE-2005-3883, CVE-2006-3017, CVE-2005-3390, CVE-2005-3392, CVE-2005-3391
BID : 15571, 16907, 17843, 15249, 15411, 15413, 15250


SERVER IP: 220.191.169.25
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 220.191.169.25
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


SERVER IP: 220.191.169.25
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php
CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756
BID : 23359, 24089, 24259, 24261


SERVER IP: 220.191.169.25
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher
CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806
BID : 25498


SERVER IP: 220.191.169.25
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


www.nbjt.gov.cn 60.190.2.151
SERVER IP: 60.190.2.151
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

www.nbmzj.gov.cn 60.190.2.41
SERVER IP: 60.190.2.41
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.nbsme.gov.cn 218.75.85.2
SERVER IP: 218.75.85.2
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: LightTPD/1.4.18-1 (Win32)

www.nbsti.gov.cn 202.107.211.83
SERVER IP: 202.107.211.83
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.nbzj.gov.cn 221.136.70.250
SERVER IP: 221.136.70.250
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.nc315.gov.cn 218.85.133.12
SERVER IP: 218.85.133.12
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.ncac.gov.cn 219.239.41.20
SERVER IP: 219.239.41.20
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache-Coyote/1.1

www.ncdh.gov.cn 218.64.65.98
SERVER IP: 218.64.65.98
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache Coyote/1.0

www.ncie.gov.cn 218.249.32.162
SERVER IP: 218.249.32.162
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.ncsb.gov.cn 218.57.13.73
SERVER IP: 218.57.13.73
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.nczy.gov.cn 221.130.191.248
SERVER IP: 221.130.191.248
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.neijiang.gov.cn 61.139.47.248
SERVER IP: 61.139.47.248
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.neis.gov.cn 210.72.96.51
SERVER IP: 210.72.96.51
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache-Coyote/1.1

www.ngsh.gov.cn 61.133.200.40
SERVER IP: 61.133.200.40
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.ninyuan.gov.cn 222.243.209.140
SERVER IP: 222.243.209.140
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.2.4 (Win32) PHP/5.2.0

SERVER IP: 222.243.209.140
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 222.243.209.140
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


SERVER IP: 222.243.209.140
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php
CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756
BID : 23359, 24089, 24259, 24261


SERVER IP: 222.243.209.140
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher
CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806
BID : 25498


SERVER IP: 222.243.209.140
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


www.njfcj.gov.cn 122.96.148.115
SERVER IP: 122.96.148.115
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.njgs.gov.cn 61.155.233.52
SERVER IP: 61.155.233.52
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.nju.gov.cn 218.94.61.112
SERVER IP: 218.94.61.112
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.nmc.gov.cn 211.147.16.18
SERVER IP: 211.147.16.18
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.2.2 (Unix) PHP/5.1.4

SERVER IP: 211.147.16.18
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 211.147.16.18
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


SERVER IP: 211.147.16.18
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php
CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756
BID : 23359, 24089, 24259, 24261


SERVER IP: 211.147.16.18
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher
CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806
BID : 25498


SERVER IP: 211.147.16.18
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


www.nmgfao.gov.cn 60.31.197.50
SERVER IP: 60.31.197.50
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.nmgzb.gov.cn 60.31.197.50
SERVER IP: 60.31.197.50
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.nmldt.gov.cn 61.240.185.230
SERVER IP: 61.240.185.230
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

www.nmmzt.gov.cn 61.138.98.204
SERVER IP: 61.138.98.204
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.nmqq.gov.cn 60.31.197.50
SERVER IP: 60.31.197.50
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.nobelbeijing.gov.cn 210.73.64.171
SERVER IP: 210.73.64.171
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/5.0

www.nsfc.gov.cn 159.226.2.11
SERVER IP: 159.226.2.11
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.40 (Red Hat Linux)

www.nstl.gov.cn 168.160.1.111
SERVER IP: 168.160.1.111
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: WebLogic WebLogic Server 6.1 SP3 06/19/2002 22:25:39 #190835

SERVER IP: 168.160.1.111
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a flaw which allows for the bypassing of Authentication The remote web server is an unpatched version of WebLogic. This version has an internal management servlet which does not properly check the user credentials and can be accessed from the outside, allowing an attacker to change the passwords of the users or even to upload or download any file on the remote server. CVSS Base Score : 5 AV:R/AC:L/Au:NR/C:P/I:P/A:N/B:N Solution : apply SP2 rolling patch 3 on WebLogic 6.0, service pack 4 on WebLogic 6.1 and SP2 on WebLogic 7.0 See also : http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA03-28.jsp
CVE : CVE-2003-1095
BID : 7122, 7124, 7131, 7130


SERVER IP: 168.160.1.111
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
The remote host is running the WebLogic web server. There is a flaw in it which allows an attacker to gain the NetBIOS host name of the remote host. Solution : NONE
BID : 7257


SERVER IP: 168.160.1.111
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running BEA Weblogic. Multiple undisclosed vulnerabilities have been reported in every versions of WebLogic up to and including 8.1.0 SP2. An attacker may exploit these issues to get unauthorized access or to gather information about the remote host. BEA Weblogic 8.1 Service Pack 3 addresses these vulnerabilities. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to WebLogic 8.1.0 SP3 or newer See also : http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/index.jsp
CVE : CVE-2004-2320
BID : 9506, 11168


SERVER IP: 168.160.1.111
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
Synopsis : The remote host may give an attacker information useful for future attacks The remote host is running BEA Weblogic. This version of Weblogic is vulnerable to an information disclosure vulnerability. Specifically, failed logins yield information regarding authentication scheme, validity of userID, etc. CVSS Base Score : 2 AV:R/AC:L/Au:NR/C:P/I:N/A:N/B:N Solution : Upgrade to WebLogic 8.1.0 SP4 or newer
CVE : CVE-2005-1380
BID : 13400, 12548


SERVER IP: 168.160.1.111
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of BEA WebLogic Server or WebLogic Express that is prone to multiple vulnerabilities. These flaws could lead to buffer overflows, denial of service, unauthorized access, cross-site scripting attacks, and information disclosure. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to WebLogic 8.1.0 SP5 or newer See also : http://dev2dev.bea.com/advisoriesnotifications
CVE : CVE-2005-1380, CVE-2005-1742, CVE-2005-1743, CVE-2005-1744, CVE-2005-1745, CVE-2005-1746, CVE-2005-1747, CVE-2005-1748, CVE-2005-1749
BID : 12548, 13400, 13717, 13793, 13794, 14632, 14657


SERVER IP: 168.160.1.111
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a flaw which allows attackers to retrieve sensitive files The remote host is running a version of BEA WebLogic Server or WebLogic Express that is prone to a flaw in the way that it handles anonymous RMI connections. An attacker, exploiting this flaw, would be able to retrieve sensitive configuration files anonymously. Such information would undoubtedly aid the attacker in more sophisticated attacks. CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N Solution : Upgrade to WebLogic 8.1.0 SP6 or newer See also : http://dev2dev.bea.com/advisoriesnotifications
CVE : CVE-2003-1290
BID : 16215


SERVER IP: 168.160.1.111
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of BEA WebLogic Server which is vulnerable to eleven (11) distinct vulnerabilities. An attacker, exploiting these flaws, would be able to impact Availability, Confidentiality and Integrity. CVSS Base Score : 10.0 CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C Solution : Apply the relevant patches from BEA. See also : http://www.beasys.com/products/weblogic/index.html
BID : 17982


www.ntagri.gov.cn 218.91.209.179
SERVER IP: 218.91.209.179
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.53 (Win32) PHP/4.3.10

SERVER IP: 218.91.209.179
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher.
CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525
BID : 12963, 12962, 13143, 13163, 13164


SERVER IP: 218.91.209.179
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 218.91.209.179
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.ntpta.gov.cn 58.221.249.245
SERVER IP: 58.221.249.245
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.ntrc.gov.cn 58.221.239.239
SERVER IP: 58.221.239.239
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.nx.gov.cn 222.75.160.123
SERVER IP: 222.75.160.123
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache-Coyote/1.1

www.nxaudit.gov.cn 202.100.98.20
SERVER IP: 202.100.98.20
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.47 (Unix) DAV/2 mod_jk2/2.0.4 mod_perl/1.99_19 Perl/v5.8.0

www.nxcd.gov.cn 218.95.217.165
SERVER IP: 218.95.217.165
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.nxciq.gov.cn 221.199.13.67
SERVER IP: 221.199.13.67
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.nxdofcom.gov.cn 222.75.166.68
SERVER IP: 222.75.166.68
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.nxgtt.gov.cn 61.133.207.99
SERVER IP: 61.133.207.99
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.27 (Win32) PHP/4.3.3

SERVER IP: 61.133.207.99
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Script Injection attack The remote host is running a version of PHP which is older than 5.0.3 or 4.3.10. The remote version of this software is vulnerable to various security issues which may, under certain circumstances, allow attackers to execute arbitrary code on the remote host, provided that they can pass arbitrary data to some functions or bypass safe_mode. CVSS Base Score : 6 AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to PHP 5.0.3 or 4.3.10
CVE : CVE-2004-1018, CVE-2004-1019, CVE-2004-1020, CVE-2004-1063, CVE-2004-1064, CVE-2004-1065
BID : 11964, 11981, 11992, 12045


SERVER IP: 61.133.207.99
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher.
CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525
BID : 12963, 12962, 13143, 13163, 13164


SERVER IP: 61.133.207.99
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 61.133.207.99
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.nxpta.gov.cn 220.113.15.103
SERVER IP: 220.113.15.103
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

www.nxrkw.gov.cn 222.75.161.100
SERVER IP: 222.75.161.100
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.nxws.gov.cn 221.199.13.163
SERVER IP: 221.199.13.163
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.nxyz.gov.cn 218.95.217.151
SERVER IP: 218.95.217.151
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.nxzj.gov.cn 222.75.163.243
SERVER IP: 222.75.163.243
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.59 (Win32) mod_jk/1.2.15

www.nynews.gov.cn 61.163.231.73
SERVER IP: 61.163.231.73
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.pgkx.gov.cn 218.246.85.2
SERVER IP: 218.246.85.2
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.pingyin.gov.cn 218.57.139.53
SERVER IP: 218.57.139.53
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.pksq.gov.cn 222.190.122.84
SERVER IP: 222.190.122.84
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.pndc.gov.cn 210.51.168.171
SERVER IP: 210.51.168.171
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.psx.gov.cn 61.152.94.254
SERVER IP: 61.152.94.254
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.qagri.gov.cn 61.189.166.2
SERVER IP: 61.189.166.2
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.qdaic.gov.cn 218.58.76.11
SERVER IP: 218.58.76.11
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: WebLogic Server 8.1 SP2 Fri Dec 5 15:01:51 PST 2003 316284

SERVER IP: 218.58.76.11
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
The remote host is running the WebLogic web server. There is a flaw in it which allows an attacker to gain the NetBIOS host name of the remote host. Solution : NONE
BID : 7257


SERVER IP: 218.58.76.11
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running BEA Weblogic. Multiple undisclosed vulnerabilities have been reported in every versions of WebLogic up to and including 8.1.0 SP2. An attacker may exploit these issues to get unauthorized access or to gather information about the remote host. BEA Weblogic 8.1 Service Pack 3 addresses these vulnerabilities. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to WebLogic 8.1.0 SP3 or newer See also : http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/index.jsp
CVE : CVE-2004-2320
BID : 9506, 11168


SERVER IP: 218.58.76.11
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
Synopsis : The remote host may give an attacker information useful for future attacks The remote host is running BEA Weblogic. This version of Weblogic is vulnerable to an information disclosure vulnerability. Specifically, failed logins yield information regarding authentication scheme, validity of userID, etc. CVSS Base Score : 2 AV:R/AC:L/Au:NR/C:P/I:N/A:N/B:N Solution : Upgrade to WebLogic 8.1.0 SP4 or newer
CVE : CVE-2005-1380
BID : 13400, 12548


SERVER IP: 218.58.76.11
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of BEA WebLogic Server or WebLogic Express that is prone to multiple vulnerabilities. These flaws could lead to buffer overflows, denial of service, unauthorized access, cross-site scripting attacks, and information disclosure. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to WebLogic 8.1.0 SP5 or newer See also : http://dev2dev.bea.com/advisoriesnotifications
CVE : CVE-2005-1380, CVE-2005-1742, CVE-2005-1743, CVE-2005-1744, CVE-2005-1745, CVE-2005-1746, CVE-2005-1747, CVE-2005-1748, CVE-2005-1749
BID : 12548, 13400, 13717, 13793, 13794, 14632, 14657


SERVER IP: 218.58.76.11
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a flaw which allows attackers to retrieve sensitive files The remote host is running a version of BEA WebLogic Server or WebLogic Express that is prone to a flaw in the way that it handles anonymous RMI connections. An attacker, exploiting this flaw, would be able to retrieve sensitive configuration files anonymously. Such information would undoubtedly aid the attacker in more sophisticated attacks. CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N Solution : Upgrade to WebLogic 8.1.0 SP6 or newer See also : http://dev2dev.bea.com/advisoriesnotifications
CVE : CVE-2003-1290
BID : 16215


SERVER IP: 218.58.76.11
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of BEA WebLogic Server which is vulnerable to eleven (11) distinct vulnerabilities. An attacker, exploiting these flaws, would be able to impact Availability, Confidentiality and Integrity. CVSS Base Score : 10.0 CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C Solution : Apply the relevant patches from BEA. See also : http://www.beasys.com/products/weblogic/index.html
BID : 17982


www.qdsf.gov.cn 218.58.68.229
SERVER IP: 218.58.68.229
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.50 (Unix)

www.qglz.gov.cn 61.154.119.18
SERVER IP: 61.154.119.18
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.qhdta.gov.cn 210.51.165.170
SERVER IP: 210.51.165.170
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.qhlr.gov.cn 221.207.12.131
SERVER IP: 221.207.12.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.qhly.gov.cn 221.207.13.236
SERVER IP: 221.207.13.236
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.26 (Win32) tomcat/1.0

www.qhrs.gov.cn 125.72.24.37
SERVER IP: 125.72.24.37
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.qhwq.gov.cn 221.238.248.3
SERVER IP: 221.238.248.3
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.49 (Win32)

www.qianguo.gov.cn 58.245.254.166
SERVER IP: 58.245.254.166
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.qinfeng.gov.cn 61.185.238.220
SERVER IP: 61.185.238.220
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.qk.gov.cn 219.140.178.210
SERVER IP: 219.140.178.210
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.qtinfo.gov.cn 61.153.223.5
SERVER IP: 61.153.223.5
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.qzepb.gov.cn 222.77.0.124
SERVER IP: 222.77.0.124
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.61 (Win32) mod_jk2/2.0.4

www.qzipo.gov.cn 61.131.46.150
SERVER IP: 61.131.46.150
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.qzldbz.gov.cn 222.79.247.170
SERVER IP: 222.79.247.170
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.qzrs.gov.cn 202.109.213.44
SERVER IP: 202.109.213.44
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Resin/2.1.9

www.rctj.gov.cn 211.92.62.2
SERVER IP: 211.92.62.2
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.rcx.gov.cn 218.26.221.196
SERVER IP: 218.26.221.196
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.realestate.gov.cn 219.142.101.72
SERVER IP: 219.142.101.72
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.rftgd.gov.cn 219.137.213.151
SERVER IP: 219.137.213.151
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

www.rjzl.gov.cn 222.35.3.38
SERVER IP: 222.35.3.38
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.rugao.gov.cn 218.91.206.119
SERVER IP: 218.91.206.119
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.safety.gov.cn 202.106.75.11
SERVER IP: 202.106.75.11
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/5.0

www.sara.gov.cn 220.194.20.37
SERVER IP: 220.194.20.37
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache-Coyote/1.1

www.sast.gov.cn 218.242.181.125
SERVER IP: 218.242.181.125
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: LOVE/1_0

www.sccm.gov.cn 221.236.20.21
SERVER IP: 221.236.20.21
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.scfda.gov.cn 61.157.78.11
SERVER IP: 61.157.78.11
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache-Coyote/1.1

www.schj.gov.cn 221.237.160.226
SERVER IP: 221.237.160.226
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.50 (Win32) PHP/4.3.11

SERVER IP: 221.237.160.226
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 221.237.160.226
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.scjc.gov.cn 61.157.78.27
SERVER IP: 61.157.78.27
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache Coyote/1.0

www.scmz.gov.cn 221.237.160.199
SERVER IP: 221.237.160.199
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.scpop.gov.cn 61.157.76.150
SERVER IP: 61.157.76.150
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.scpta.gov.cn 125.71.28.51
SERVER IP: 125.71.28.51
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.scqy.gov.cn 61.185.224.31
SERVER IP: 61.185.224.31
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.scsme.gov.cn 222.211.73.51
SERVER IP: 222.211.73.51
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.scxmsp.gov.cn 218.104.217.171
SERVER IP: 218.104.217.171
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.sdet.gov.cn 61.142.131.14
SERVER IP: 61.142.131.14
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.sdjt.gov.cn 218.57.139.178
SERVER IP: 218.57.139.178
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache-Oil/1.1

www.sdns.gov.cn 61.156.8.200
SERVER IP: 61.156.8.200
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.sdsi.gov.cn 219.146.56.19
SERVER IP: 219.146.56.19
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

SERVER IP: 219.146.56.19
PORT/PROTOCOL: 80/tcp
TYPE: INFO
The remote web server is running a version of PHP which is older than 4.2.2. This version has a bug in its mail() function which does not properly sanitize user input. As a result, users can forge email to make it look like it is coming from a different source that the server. Solution : Upgrade to PHP 4.2.2
CVE : CVE-2002-0986, CVE-2002-0985
BID : 5562


SERVER IP: 219.146.56.19
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
The remote host is running a version of PHP which is older than 4.3.2. This version contains various flaws that may allow an attacker who has the ability to execute PHP scripts in safe_mode on this host to execute arbitrary commands with the privileges of the HTTP daemon Solution : Upgrade to PHP 4.3.2
CVE : CVE-2003-0166
BID : 7256, 7259, 7187, 7197, 7198, 7199, 7210


SERVER IP: 219.146.56.19
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
The remote host is running a Microsoft IIS webserver

SERVER IP: 219.146.56.19
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Script Injection attack The remote host is running a version of PHP which is older than 5.0.3 or 4.3.10. The remote version of this software is vulnerable to various security issues which may, under certain circumstances, allow attackers to execute arbitrary code on the remote host, provided that they can pass arbitrary data to some functions or bypass safe_mode. CVSS Base Score : 6 AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to PHP 5.0.3 or 4.3.10
CVE : CVE-2004-1018, CVE-2004-1019, CVE-2004-1020, CVE-2004-1063, CVE-2004-1064, CVE-2004-1065
BID : 11964, 11981, 11992, 12045


SERVER IP: 219.146.56.19
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher.
CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525
BID : 12963, 12962, 13143, 13163, 13164


SERVER IP: 219.146.56.19
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 219.146.56.19
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.sdwj.gov.cn 218.57.128.245
SERVER IP: 218.57.128.245
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.sdwsqw.gov.cn 61.142.131.6
SERVER IP: 61.142.131.6
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.2.4 (Unix) PHP/5.2.2

SERVER IP: 61.142.131.6
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php
CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756
BID : 23359, 24089, 24259, 24261


SERVER IP: 61.142.131.6
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher
CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806
BID : 25498


SERVER IP: 61.142.131.6
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


www.sdxm.gov.cn 218.57.142.166
SERVER IP: 218.57.142.166
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.59 (Unix)

www.sei.gov.cn 61.185.238.221
SERVER IP: 61.185.238.221
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.serc.gov.cn 211.160.24.194
SERVER IP: 211.160.24.194
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

www.setd.gov.cn 218.84.65.210
SERVER IP: 218.84.65.210
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.28 Apache/1.3.28 (Unix)

www.sh1111.gov.cn 218.242.146.58
SERVER IP: 218.242.146.58
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.shad.gov.cn 61.152.187.169
SERVER IP: 61.152.187.169
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_Server/6.0.2.11 Apache/2.0.47 (Win32)

www.shanghai.gov.cn 61.129.65.58
SERVER IP: 61.129.65.58
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.shantou.gov.cn 61.141.22.93
SERVER IP: 61.141.22.93
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.shaoyang.gov.cn 218.76.215.232
SERVER IP: 218.76.215.232
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.shdf.gov.cn 210.82.57.1
SERVER IP: 210.82.57.1
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache-Coyote/1.1

www.shiyan.gov.cn 202.103.53.163
SERVER IP: 202.103.53.163
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.shuangliao.gov.cn 125.32.157.252
SERVER IP: 125.32.157.252
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.shxc.gov.cn 218.25.48.190
SERVER IP: 218.25.48.190
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.shyzfw.gov.cn 125.76.229.28
SERVER IP: 125.76.229.28
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.shzj.gov.cn 211.144.102.199
SERVER IP: 211.144.102.199
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.59 (Win32)

www.siming.gov.cn 218.5.65.145
SERVER IP: 218.5.65.145
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.59 (Win32) mod_jk2/2.0.4

www.sist.gov.cn 203.91.45.201
SERVER IP: 203.91.45.201
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.siyang.gov.cn 218.93.196.22
SERVER IP: 218.93.196.22
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.skxtv.gov.cn 124.89.118.236
SERVER IP: 124.89.118.236
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.sm.gov.cn 220.162.230.42
SERVER IP: 220.162.230.42
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.smedl.gov.cn 218.61.7.72
SERVER IP: 218.61.7.72
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.smehen.gov.cn 222.143.25.114
SERVER IP: 222.143.25.114
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.smeqd.gov.cn 60.209.78.8
SERVER IP: 60.209.78.8
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.smeshx.gov.cn 125.76.229.4
SERVER IP: 125.76.229.4
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.smeyn.gov.cn 220.164.79.2
SERVER IP: 220.164.79.2
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.snaic.gov.cn 219.144.222.26
SERVER IP: 219.144.222.26
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

www.soa.gov.cn 202.99.63.158
SERVER IP: 202.99.63.158
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache Coyote/1.0

www.spic.gov.cn 61.185.238.220
SERVER IP: 61.185.238.220
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.spp.gov.cn 219.141.231.58
SERVER IP: 219.141.231.58
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.49 (Win32) mod_jk/1.2.0

www.spta.gov.cn 202.109.110.80
SERVER IP: 202.109.110.80
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache-Coyote/1.1

www.srgl.gov.cn 222.35.3.30
SERVER IP: 222.35.3.30
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.ssf.gov.cn 203.207.195.91
SERVER IP: 203.207.195.91
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.ssme.gov.cn 211.144.107.180
SERVER IP: 211.144.107.180
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.53 (Win32)

www.stats-sx.gov.cn 210.72.57.31
SERVER IP: 210.72.57.31
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.stats.gov.cn 219.235.129.45
SERVER IP: 219.235.129.45
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.48 (Win32) mod_jk/1.2.4

www.stm.gov.cn 202.101.108.137
SERVER IP: 202.101.108.137
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.rsj.suzhou.gov.cn 221.224.13.50
SERVER IP: 221.224.13.50
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

www.sxagri.gov.cn 202.99.223.146
SERVER IP: 202.99.223.146
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.sxaic.gov.cn 218.26.1.109
SERVER IP: 218.26.1.109
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.sxch.gov.cn 202.99.219.244
SERVER IP: 202.99.219.244
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.sxcredit.gov.cn 61.185.238.246
SERVER IP: 61.185.238.246
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.sxfx.gov.cn 61.185.55.155
SERVER IP: 61.185.55.155
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.sxfzb.gov.cn 221.204.249.223
SERVER IP: 221.204.249.223
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.sxgaoping.gov.cn 203.207.98.226
SERVER IP: 203.207.98.226
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.sxhall.gov.cn 61.185.214.36
SERVER IP: 61.185.214.36
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.sxit.gov.cn 61.185.238.206
SERVER IP: 61.185.238.206
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.sxjz.gov.cn 60.223.255.11
SERVER IP: 60.223.255.11
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.2.3 (Win32)

www.sxmz.gov.cn 202.99.219.186
SERVER IP: 202.99.219.186
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.sxnw.gov.cn 218.26.168.90
SERVER IP: 218.26.168.90
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.sxprice.gov.cn 218.26.178.33
SERVER IP: 218.26.178.33
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.sxsfjd.gov.cn 202.99.219.244
SERVER IP: 202.99.219.244
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.sxtong.gov.cn 218.30.21.204
SERVER IP: 218.30.21.204
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.sxtzb.gov.cn 74.200.203.242
SERVER IP: 74.200.203.242
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 PHP/4.4.6 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a

SERVER IP: 74.200.203.242
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 74.200.203.242
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 74.200.203.242
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


SERVER IP: 74.200.203.242
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.syipb.gov.cn 218.61.146.14
SERVER IP: 218.61.146.14
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.syqw.gov.cn 218.244.129.66
SERVER IP: 218.244.129.66
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.syrsw.gov.cn 218.25.25.18
SERVER IP: 218.25.25.18
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: WebSphere Application Server/4.0

SERVER IP: 218.25.25.18
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
Synopsis : The remote host is vulnerable to a flaw which allows attackers to retrieve sensitive files or data The remote WebSphere webserver is vulnerable to an information leak. That is, user information is sometimes stored under the profile of the 'default' user. Unintended users may gain access to this information and use the information to elevate privileges on the remote machine. It is also possible that the default user account may disclose information regarding other users. CVSS Base Score : 2 AV:R/AC:L/Au:NR/C:P/I:N/A:N/B:N Solution : Upgrade to the most recent version of WebSphere
BID : 11816


www.sysc.gov.cn 218.61.146.27
SERVER IP: 218.61.146.27
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.rsj.sz.gov.cn 61.144.227.15
SERVER IP: 61.144.227.15
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_Server/6.0 Apache/2.0.47 (Unix)

www.sz12333.gov.cn 61.144.226.49
SERVER IP: 61.144.226.49
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.szbqts.gov.cn 61.144.227.15
SERVER IP: 61.144.227.15
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_Server/6.0 Apache/2.0.47 (Unix)

www.szbts.gov.cn 61.144.227.15
SERVER IP: 61.144.227.15
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_Server/6.0 Apache/2.0.47 (Unix)

www.szcourt.gov.cn 61.144.226.172
SERVER IP: 61.144.226.172
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.2.0 (Unix) PHP/5.1.2

SERVER IP: 61.144.226.172
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 61.144.226.172
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


SERVER IP: 61.144.226.172
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php
CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756
BID : 23359, 24089, 24259, 24261


SERVER IP: 61.144.226.172
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher
CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806
BID : 25498


SERVER IP: 61.144.226.172
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


www.szfdc.gov.cn 61.144.226.82
SERVER IP: 61.144.226.82
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.52 (Win32)

www.szftz.gov.cn 203.91.45.33
SERVER IP: 203.91.45.33
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.szga.gov.cn 202.104.129.181
SERVER IP: 202.104.129.181
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.szjs.gov.cn 61.144.226.2
SERVER IP: 61.144.226.2
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

www.szlib.gov.cn 58.60.2.145
SERVER IP: 58.60.2.145
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.2.4 (Unix) mod_jk/1.2.23

www.szpb.gov.cn 203.175.145.17
SERVER IP: 203.175.145.17
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.szplan.gov.cn 61.144.226.41
SERVER IP: 61.144.226.41
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.55 (Win32) mod_ssl/2.0.55 OpenSSL/0.9.8a

SERVER IP: 61.144.226.41
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 61.144.226.41
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.szrkjs.gov.cn 61.144.227.15
SERVER IP: 61.144.227.15
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_Server/6.0 Apache/2.0.47 (Unix)

www.szsf.gov.cn 61.144.227.15
SERVER IP: 61.144.227.15
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_Server/6.0 Apache/2.0.47 (Unix)

www.szsgsj.gov.cn 221.224.13.226
SERVER IP: 221.224.13.226
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: WebLogic WebLogic Server 7.0 SP1 Mon Sep 9 22:46:58 PDT 2002 206753

SERVER IP: 221.224.13.226
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a flaw which allows for the bypassing of Authentication The remote web server is an unpatched version of WebLogic. This version has an internal management servlet which does not properly check the user credentials and can be accessed from the outside, allowing an attacker to change the passwords of the users or even to upload or download any file on the remote server. CVSS Base Score : 5 AV:R/AC:L/Au:NR/C:P/I:P/A:N/B:N Solution : apply SP2 rolling patch 3 on WebLogic 6.0, service pack 4 on WebLogic 6.1 and SP2 on WebLogic 7.0 See also : http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA03-28.jsp
CVE : CVE-2003-1095
BID : 7122, 7124, 7131, 7130


SERVER IP: 221.224.13.226
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
The remote host is running the WebLogic web server. There is a flaw in it which allows an attacker to gain the NetBIOS host name of the remote host. Solution : NONE
BID : 7257


SERVER IP: 221.224.13.226
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running BEA Weblogic. Multiple undisclosed vulnerabilities have been reported in every versions of WebLogic up to and including 8.1.0 SP2. An attacker may exploit these issues to get unauthorized access or to gather information about the remote host. BEA Weblogic 8.1 Service Pack 3 addresses these vulnerabilities. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to WebLogic 8.1.0 SP3 or newer See also : http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/index.jsp
CVE : CVE-2004-2320
BID : 9506, 11168


SERVER IP: 221.224.13.226
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
Synopsis : The remote host may give an attacker information useful for future attacks The remote host is running BEA Weblogic. This version of Weblogic is vulnerable to an information disclosure vulnerability. Specifically, failed logins yield information regarding authentication scheme, validity of userID, etc. CVSS Base Score : 2 AV:R/AC:L/Au:NR/C:P/I:N/A:N/B:N Solution : Upgrade to WebLogic 8.1.0 SP4 or newer
CVE : CVE-2005-1380
BID : 13400, 12548


SERVER IP: 221.224.13.226
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of BEA WebLogic Server or WebLogic Express that is prone to multiple vulnerabilities. These flaws could lead to buffer overflows, denial of service, unauthorized access, cross-site scripting attacks, and information disclosure. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to WebLogic 8.1.0 SP5 or newer See also : http://dev2dev.bea.com/advisoriesnotifications
CVE : CVE-2005-1380, CVE-2005-1742, CVE-2005-1743, CVE-2005-1744, CVE-2005-1745, CVE-2005-1746, CVE-2005-1747, CVE-2005-1748, CVE-2005-1749
BID : 12548, 13400, 13717, 13793, 13794, 14632, 14657


SERVER IP: 221.224.13.226
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a flaw which allows attackers to retrieve sensitive files The remote host is running a version of BEA WebLogic Server or WebLogic Express that is prone to a flaw in the way that it handles anonymous RMI connections. An attacker, exploiting this flaw, would be able to retrieve sensitive configuration files anonymously. Such information would undoubtedly aid the attacker in more sophisticated attacks. CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N Solution : Upgrade to WebLogic 8.1.0 SP6 or newer See also : http://dev2dev.bea.com/advisoriesnotifications
CVE : CVE-2003-1290
BID : 16215


SERVER IP: 221.224.13.226
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of BEA WebLogic Server which is vulnerable to eleven (11) distinct vulnerabilities. An attacker, exploiting these flaws, would be able to impact Availability, Confidentiality and Integrity. CVSS Base Score : 10.0 CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C Solution : Apply the relevant patches from BEA. See also : http://www.beasys.com/products/weblogic/index.html
BID : 17982


www.szsmb.gov.cn 211.159.67.168
SERVER IP: 211.159.67.168
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.szum.gov.cn 218.17.225.250
SERVER IP: 218.17.225.250
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.szzj.gov.cn 220.191.227.59
SERVER IP: 220.191.227.59
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.szzx.gov.cn 61.144.227.15
SERVER IP: 61.144.227.15
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_Server/6.0 Apache/2.0.47 (Unix)

www.tahe.gov.cn 218.84.207.84
SERVER IP: 218.84.207.84
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.tcm.gov.cn 218.244.136.98
SERVER IP: 218.244.136.98
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.tdbdx.gov.cn 211.167.41.129
SERVER IP: 211.167.41.129
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

SERVER IP: 211.167.41.129
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 211.167.41.129
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.tianjin.gov.cn 61.136.9.36
SERVER IP: 61.136.9.36
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.tianshui.gov.cn 61.134.65.201
SERVER IP: 61.134.65.201
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.tibet.gov.cn 220.182.51.20
SERVER IP: 220.182.51.20
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache-Coyote/1.1

www.tipp.gov.cn 202.99.67.55
SERVER IP: 202.99.67.55
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache-Coyote/1.1

www.tjftz.gov.cn 60.29.110.10
SERVER IP: 60.29.110.10
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.26.2 Apache/1.3.26 (Unix)

www.tjhb.gov.cn 221.129.21.152
SERVER IP: 221.129.21.152
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.tjhg.gov.cn 218.69.103.35
SERVER IP: 218.69.103.35
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.tjjt.gov.cn 218.67.246.249
SERVER IP: 218.67.246.249
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.tjsf.gov.cn 211.148.164.227
SERVER IP: 211.148.164.227
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.49 (Win32) PHP/4.3.4

SERVER IP: 211.148.164.227
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Script Injection attack The remote host is running a version of PHP which is older than 5.0.3 or 4.3.10. The remote version of this software is vulnerable to various security issues which may, under certain circumstances, allow attackers to execute arbitrary code on the remote host, provided that they can pass arbitrary data to some functions or bypass safe_mode. CVSS Base Score : 6 AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to PHP 5.0.3 or 4.3.10
CVE : CVE-2004-1018, CVE-2004-1019, CVE-2004-1020, CVE-2004-1063, CVE-2004-1064, CVE-2004-1065
BID : 11964, 11981, 11992, 12045


SERVER IP: 211.148.164.227
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher.
CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525
BID : 12963, 12962, 13143, 13163, 13164


SERVER IP: 211.148.164.227
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 211.148.164.227
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.tjwcb.gov.cn 218.69.100.138
SERVER IP: 218.69.100.138
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.tjztb.gov.cn 60.29.103.80
SERVER IP: 60.29.103.80
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.town.gov.cn 60.19.24.10
SERVER IP: 60.19.24.10
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.54 (Unix) PHP/4.4.0

SERVER IP: 60.19.24.10
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 60.19.24.10
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.tpbjc.gov.cn 211.157.100.131
SERVER IP: 211.157.100.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.tstc.gov.cn 218.69.114.17
SERVER IP: 218.69.114.17
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.54 (Win32) mod_jk2/2.0.4

www.tzgh.gov.cn 218.75.5.198
SERVER IP: 218.75.5.198
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.59 (Win32) PHP/5.0.3

SERVER IP: 218.75.5.198
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher.
CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525
BID : 12963, 12962, 13143, 13163, 13164


SERVER IP: 218.75.5.198
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP which is older than 5.0.5. This version has a number of bugs which allow attackers to execute or retrieve arbitrary files outside of the web root directory. An attacker, exploiting these flaws, would only need to send a malformed HTTP request to the vulnerable system. Successful exploitation would result in the loss of Confidential data or a tarnishing of system Integrity. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 5.0.5 or later
BID : 15119


SERVER IP: 218.75.5.198
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host may give an attacker information useful for future attacks The remote host is running a version of PHP which is older than 5.0.6. This version has a flaw wherein remote attackers can reenable the 'register_globals' parameter. In addition, a remote attacker may be able to overwrite the 'GLOBAL' variable. This may lead to another, more serious, exploitation. CVSS Base Score : 9.3 CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C Solution : Upgrade to PHP 5.0.6 or later See also : http://www.php.net/release_4_4_1.php
CVE : CVE-2006-0395, CVE-2005-2713, CVE-2005-2714, CVE-2005-3319, CVE-2005-3353, CVE-2005-3389, CVE-2005-3706, CVE-2005-3712, CVE-2005-4217, CVE-2005-4504, CVE-2006-0383, CVE-2006-0384, CVE-2006-0386, CVE-2006-0387, CVE-2006-0388, CVE-2006-0389, CVE-2006-0391, CVE-2006-3016, CVE-2006-3018, CVE-2005-3883, CVE-2006-3017, CVE-2005-3390, CVE-2005-3392, CVE-2005-3391
BID : 15571, 16907, 17843, 15249, 15411, 15413, 15250


SERVER IP: 218.75.5.198
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 218.75.5.198
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


SERVER IP: 218.75.5.198
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php
CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756
BID : 23359, 24089, 24259, 24261


SERVER IP: 218.75.5.198
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher
CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806
BID : 25498


SERVER IP: 218.75.5.198
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


www.tzipo.gov.cn 60.191.134.252
SERVER IP: 60.191.134.252
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

SERVER IP: 60.191.134.252
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Script Injection attack The remote host is running a version of PHP which is older than 5.0.3 or 4.3.10. The remote version of this software is vulnerable to various security issues which may, under certain circumstances, allow attackers to execute arbitrary code on the remote host, provided that they can pass arbitrary data to some functions or bypass safe_mode. CVSS Base Score : 6 AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to PHP 5.0.3 or 4.3.10
CVE : CVE-2004-1018, CVE-2004-1019, CVE-2004-1020, CVE-2004-1063, CVE-2004-1064, CVE-2004-1065
BID : 11964, 11981, 11992, 12045


SERVER IP: 60.191.134.252
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher.
CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525
BID : 12963, 12962, 13143, 13163, 13164


SERVER IP: 60.191.134.252
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 60.191.134.252
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.tzkj.gov.cn 60.191.134.252
SERVER IP: 60.191.134.252
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.urumqi.gov.cn 220.171.28.206
SERVER IP: 220.171.28.206
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

www.usjob.gov.cn 125.64.94.69
SERVER IP: 125.64.94.69
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.wanrong.gov.cn 61.129.251.105
SERVER IP: 61.129.251.105
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.weda.gov.cn 61.191.136.2
SERVER IP: 61.191.136.2
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.wenzhou.gov.cn 220.191.204.203
SERVER IP: 220.191.204.203
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.2.6 (Unix)

www.wffc.gov.cn 60.210.254.162
SERVER IP: 60.210.254.162
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.3 (Unix)

www.wfstc.gov.cn 210.51.187.92
SERVER IP: 210.51.187.92
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

www.wh12366.gov.cn 219.140.196.6
SERVER IP: 219.140.196.6
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: WebLogic Server 8.1 SP3 Tue Jun 29 23:11:19 PDT 2004 404973

SERVER IP: 219.140.196.6
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
The remote host is running the WebLogic web server. There is a flaw in it which allows an attacker to gain the NetBIOS host name of the remote host. Solution : NONE
BID : 7257


SERVER IP: 219.140.196.6
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
Synopsis : The remote host may give an attacker information useful for future attacks The remote host is running BEA Weblogic. This version of Weblogic is vulnerable to an information disclosure vulnerability. Specifically, failed logins yield information regarding authentication scheme, validity of userID, etc. CVSS Base Score : 2 AV:R/AC:L/Au:NR/C:P/I:N/A:N/B:N Solution : Upgrade to WebLogic 8.1.0 SP4 or newer
CVE : CVE-2005-1380
BID : 13400, 12548


SERVER IP: 219.140.196.6
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of BEA WebLogic Server or WebLogic Express that is prone to multiple vulnerabilities. These flaws could lead to buffer overflows, denial of service, unauthorized access, cross-site scripting attacks, and information disclosure. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to WebLogic 8.1.0 SP5 or newer See also : http://dev2dev.bea.com/advisoriesnotifications
CVE : CVE-2005-1380, CVE-2005-1742, CVE-2005-1743, CVE-2005-1744, CVE-2005-1745, CVE-2005-1746, CVE-2005-1747, CVE-2005-1748, CVE-2005-1749
BID : 12548, 13400, 13717, 13793, 13794, 14632, 14657


SERVER IP: 219.140.196.6
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a flaw which allows attackers to retrieve sensitive files The remote host is running a version of BEA WebLogic Server or WebLogic Express that is prone to a flaw in the way that it handles anonymous RMI connections. An attacker, exploiting this flaw, would be able to retrieve sensitive configuration files anonymously. Such information would undoubtedly aid the attacker in more sophisticated attacks. CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N Solution : Upgrade to WebLogic 8.1.0 SP6 or newer See also : http://dev2dev.bea.com/advisoriesnotifications
CVE : CVE-2003-1290
BID : 16215


www.whgajxj.gov.cn 221.2.154.7
SERVER IP: 221.2.154.7
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

SERVER IP: 221.2.154.7
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher
CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806
BID : 25498


SERVER IP: 221.2.154.7
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


www.whjs.gov.cn 59.175.235.8
SERVER IP: 59.175.235.8
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.whlib.gov.cn 219.140.69.40
SERVER IP: 219.140.69.40
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.whrsj.gov.cn 61.183.11.99
SERVER IP: 61.183.11.99
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.wj.gov.cn 218.93.116.250
SERVER IP: 218.93.116.250
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.wtolaw.gov.cn 122.224.146.45
SERVER IP: 122.224.146.45
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.wuping.gov.cn 211.143.188.178
SERVER IP: 211.143.188.178
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.wuyishan.gov.cn 222.78.246.252
SERVER IP: 222.78.246.252
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache-Coyote/1.1

www.gov.cn 216.66.26.154
SERVER IP: 216.66.26.154
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

www.wznw.gov.cn 60.190.81.82
SERVER IP: 60.190.81.82
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache Tomcat/4.0.4 (HTTP/1.1 Connector)

SERVER IP: 60.190.81.82
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
Synopsis : The remote web server can be coerced into disclosing source code Tomcat 4.0.4 and 4.1.10 (probably all other earlier versions as well) are vulnerable to a source code exposure by using the default servlet org.apache.catalina.servlets.DefaultServlet CVSS Base Score : 2 AV:R/AC:L/Au:NR/C:P/I:N/A:N/B:N Solution : Upgrade to the latest release of the branch you are running (at least 4.0.5 or 4.1.12) See also : http://jakarta.apache.org/builds/jakarta-tomcat-4.0/release
CVE : CVE-2002-1148
BID : 5786


SERVER IP: 60.190.81.82
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host may give an attacker information useful for future attacks Apache Tomcat (prior to 3.3.1a) is prone to a directory listing and file disclosure vulnerability. An attacker may exploit this bug to get the listing of directories otherwise protected by an index.html file, or even to get the source code of the remote .jsp scripts. CVSS Base Score : 4 AV:R/AC:L/Au:NR/C:P/I:N/A:N/B:C Solution : Upgrade to Tomcat 4.1.18
CVE : CVE-2003-0044, CVE-2003-0042
BID : 6720, 6721


SERVER IP: 60.190.81.82
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack It may be possible the freeze or crash the remote Tomcat web server by making it read MS/DOS devices files through its servlet engine (ie: /examples/servlet/AUX). CVSS Base Score : 5 AV:R/AC:L/Au:NR/C:N/I:N/A:C/B:A Solution : Upgrade to Tomcat 4.1.10
CVE : CVE-2003-0045

www.wzta.gov.cn 60.191.70.230
SERVER IP: 60.191.70.230
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.wzzw.gov.cn 218.244.152.28
SERVER IP: 218.244.152.28
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.xags.gov.cn 219.144.196.94
SERVER IP: 219.144.196.94
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.58 (Win32) mod_jk/1.2.4

www.xaonline.gov.cn 61.185.242.202
SERVER IP: 61.185.242.202
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.xasmw.gov.cn 61.185.242.201
SERVER IP: 61.185.242.201
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.xbrc.gov.cn 202.100.84.130
SERVER IP: 202.100.84.130
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.xflyj.gov.cn 58.51.95.236
SERVER IP: 58.51.95.236
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.xfyy.gov.cn 219.138.45.241
SERVER IP: 219.138.45.241
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.xiangcheng.gov.cn 61.158.230.143
SERVER IP: 61.158.230.143
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

SERVER IP: 61.158.230.143
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 61.158.230.143
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.xiaoshan.gov.cn 202.101.162.75
SERVER IP: 202.101.162.75
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.28 Apache/1.3.28 (Unix)

www.xilingol.gov.cn 60.31.215.242
SERVER IP: 60.31.215.242
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.2.4 (Unix) DAV/2 mod_jk/1.2.22

www.xinganmeng.gov.cn 58.18.7.202
SERVER IP: 58.18.7.202
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.xingyang.gov.cn 61.135.129.107
SERVER IP: 61.135.129.107
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.xinjiangtour.gov.cn 222.82.229.2
SERVER IP: 222.82.229.2
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.xinyu.gov.cn 218.87.99.48
SERVER IP: 218.87.99.48
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.54 (Unix) PHP/4.4.0

SERVER IP: 218.87.99.48
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 218.87.99.48
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.xinzheng.gov.cn 222.137.252.25
SERVER IP: 222.137.252.25
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache-Coyote/1.1

www.xjbz.gov.cn 218.31.132.251
SERVER IP: 218.31.132.251
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.xjbzsfj.gov.cn 218.31.132.251
SERVER IP: 218.31.132.251
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.xjciq.gov.cn 61.152.94.254
SERVER IP: 61.152.94.254
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.xjdrc.gov.cn 203.207.200.88
SERVER IP: 203.207.200.88
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache Coyote/1.0

www.xjedu.gov.cn 220.171.88.71
SERVER IP: 220.171.88.71
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.xjepb.gov.cn 218.30.97.82
SERVER IP: 218.30.97.82
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.xjfy.gov.cn 61.128.123.101
SERVER IP: 61.128.123.101
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.xjhm.gov.cn 218.31.113.246
SERVER IP: 218.31.113.246
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.xjjz.gov.cn 61.128.109.193
SERVER IP: 61.128.109.193
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.xjlt.gov.cn 218.84.209.2
SERVER IP: 218.84.209.2
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.xjnewqi.gov.cn 222.82.217.84
SERVER IP: 222.82.217.84
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

www.xjnj.gov.cn 219.232.237.37
SERVER IP: 219.232.237.37
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.xjsafety.gov.cn 61.128.101.131
SERVER IP: 61.128.101.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.xjsj.gov.cn 222.82.214.166
SERVER IP: 222.82.214.166
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.xjwh.gov.cn 159.226.134.15
SERVER IP: 159.226.134.15
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.xm.gov.cn 202.101.105.173
SERVER IP: 202.101.105.173
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.xmedu.gov.cn 218.5.84.21
SERVER IP: 218.5.84.21
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.52 (CentOS) mod_perl/1.99_16 Perl/v5.8.5 DAV/2 mod_auth_kerb/5.0-rc4 mod_auth_pgsql/2.0.1 PHP/5.1.6 mod_python/3.1.3 Python/2.3.4 mod_ssl/2.0.52 OpenSSL/0.9.7a SVN/1.1.4

SERVER IP: 218.5.84.21
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 218.5.84.21
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 218.5.84.21
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 218.5.84.21
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


SERVER IP: 218.5.84.21
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php
CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756
BID : 23359, 24089, 24259, 24261


SERVER IP: 218.5.84.21
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher
CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806
BID : 25498


SERVER IP: 218.5.84.21
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


SERVER IP: 218.5.84.21
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


www.xnsf.gov.cn 220.179.115.76
SERVER IP: 220.179.115.76
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.xntv.gov.cn 220.167.224.85
SERVER IP: 220.167.224.85
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.xq.gov.cn 61.181.80.2
SERVER IP: 61.181.80.2
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.xsbn.gov.cn 218.63.244.138
SERVER IP: 218.63.244.138
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.xtwqb.gov.cn 218.75.241.186
SERVER IP: 218.75.241.186
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Resin/2.1.13

www.xushui.gov.cn 221.194.46.67
SERVER IP: 221.194.46.67
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.xxz.gov.cn 218.76.65.35
SERVER IP: 218.76.65.35
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.2.3 (Win32) PHP/5.1.4

SERVER IP: 218.76.65.35
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 218.76.65.35
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


SERVER IP: 218.76.65.35
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php
CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756
BID : 23359, 24089, 24259, 24261


SERVER IP: 218.76.65.35
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher
CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806
BID : 25498


SERVER IP: 218.76.65.35
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


www.xzcd.gov.cn 218.30.96.147
SERVER IP: 218.30.96.147
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.xzzx.gov.cn 221.229.242.227
SERVER IP: 221.229.242.227
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.yangchun.gov.cn 219.129.188.115
SERVER IP: 219.129.188.115
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.yangjiang.gov.cn 202.104.212.42
SERVER IP: 202.104.212.42
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.yangling.gov.cn 61.150.65.252
SERVER IP: 61.150.65.252
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.26 (Win32) tomcat/1.0

www.yangpu.gov.cn 202.100.210.107
SERVER IP: 202.100.210.107
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.2.3 (Unix) PHP/5.1.6 mod_jk/1.2.18 mod_ssl/2.2.3 OpenSSL/0.9.8d

www.yangzhou.gov.cn 61.177.180.12
SERVER IP: 61.177.180.12
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.2.6 (Unix) DAV/2 PHP/5.2.4

SERVER IP: 61.177.180.12
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


www.yantai.gov.cn 61.156.14.60
SERVER IP: 61.156.14.60
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: TongWeb Application Server/3.5 ( JSP 1.2, Servlet 2.3 )

www.yaodu.gov.cn 60.28.239.26
SERVER IP: 60.28.239.26
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.ybrc.gov.cn 61.188.201.23
SERVER IP: 61.188.201.23
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.ybzfcg.gov.cn 202.111.175.205
SERVER IP: 202.111.175.205
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Resin/2.1.6

www.yczscq.gov.cn 218.30.96.32
SERVER IP: 218.30.96.32
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.yellowriver.gov.cn 218.28.41.8
SERVER IP: 218.28.41.8
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.yh.gov.cn 61.175.219.229
SERVER IP: 61.175.219.229
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.yintai.gov.cn 61.134.55.246
SERVER IP: 61.134.55.246
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.2.4 (FreeBSD) mod_ssl/2.2.4 OpenSSL/0.9.7e-p1 DAV/2 PHP/5.2.3 with Suhosin-Patch

SERVER IP: 61.134.55.246
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 61.134.55.246
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher
CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806
BID : 25498


SERVER IP: 61.134.55.246
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


SERVER IP: 61.134.55.246
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


www.yixian.gov.cn 218.23.149.22
SERVER IP: 218.23.149.22
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.yjkjj.gov.cn 210.75.48.103
SERVER IP: 210.75.48.103
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.ylagri.gov.cn 61.150.65.252
SERVER IP: 61.150.65.252
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.26 (Win32) tomcat/1.0

www.ynagri.gov.cn 220.197.227.26
SERVER IP: 220.197.227.26
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.ynaic.gov.cn 202.98.187.117
SERVER IP: 202.98.187.117
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.ynbsm.gov.cn 116.52.13.123
SERVER IP: 116.52.13.123
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.ynciq.gov.cn 220.163.86.189
SERVER IP: 220.163.86.189
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.ynepb.gov.cn 211.92.151.134
222.221.6.250
SERVER IP: 211.92.151.134
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

SERVER IP: 222.221.6.250
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.yngb.gov.cn 218.5.77.110
SERVER IP: 218.5.77.110
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.ynjst.gov.cn 220.163.6.180
SERVER IP: 220.163.6.180
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: WebSphere Application Server/5.0

SERVER IP: 220.163.6.180
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
Synopsis : The remote host is vulnerable to a flaw which allows attackers to retrieve sensitive files or data The remote WebSphere webserver is vulnerable to an information leak. That is, user information is sometimes stored under the profile of the 'default' user. Unintended users may gain access to this information and use the information to elevate privileges on the remote machine. It is also possible that the default user account may disclose information regarding other users. CVSS Base Score : 2 AV:R/AC:L/Au:NR/C:P/I:N/A:N/B:N Solution : Upgrade to the most recent version of WebSphere
BID : 11816


SERVER IP: 220.163.6.180
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
Synopsis : The remote host is vulnerable to a flaw which allows attackers to retrieve sensitive files or data The remote WebSphere webserver is vulnerable to an information leak. That is, there is a flaw in the JSP engine which would allow a remote attacker to view the source code of any of the webserver scripts. An attacker, exploiting this flaw, would only need to be able to send HTTP requests to the webserver. CVSS Base Score : 2 AV:R/AC:L/Au:NR/C:P/I:N/A:N/B:N Solution : Upgrade to the most recent version of WebSphere
BID : 12537, 12538


SERVER IP: 220.163.6.180
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a flaw which allows attackers to retrieve sensitive files The remote WebSphere webserver is vulnerable to an information leak. That is, there is a flaw in the way that WebSphere determines the web root directory based on the HTTP 'Host' tag. An application server which has it's root web directory defined in the Web Servers root directory may be coerced into disclosing the source of .JSP files. JSP source code often contains information which is useful for further, more sophisticated, attacks. Further, this version of Websphere is vulnerable to a remote Cross-Site-Scripting (XSS) attack. An attacker, exploiting this flaw, would typically need to coerce a user into browsing to a malicious URI. Successful exploitation would result in the theft of Confidential materials (such as authentication Cookies). CVSS Base Score : 4 AV:R/AC:L/Au:NR/C:P/I:N/A:N/B:C Solution : Upgrade to the most recent version of WebSphere
CVE : CVE-2005-1112
BID : 13160, 13853, 13349


SERVER IP: 220.163.6.180
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to a flaw which allows attackers to retrieve sensitive files or data The remote WebSphere webserver is vulnerable to an information leak. That is, there is a flaw in the way that WebSphere processes filtered requests which end with a '/'. For instance, if the file test.jsp required authentication, an attacker could simply request test.jsp/ and retrieve the page. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to the most recent version of WebSphere
CVE : CVE-2006-2342
BID : 17900


www.ynjy.gov.cn 222.56.47.54
SERVER IP: 222.56.47.54
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache Coyote/1.0

www.ynly.gov.cn 220.166.64.198
SERVER IP: 220.166.64.198
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.ynsafety.gov.cn 61.159.228.46
SERVER IP: 61.159.228.46
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache-Coyote/1.1

www.yongzhou.gov.cn 222.243.203.230
SERVER IP: 222.243.203.230
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.ytjcy.gov.cn 218.75.229.204
SERVER IP: 218.75.229.204
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.ytrc.gov.cn 61.156.14.79
SERVER IP: 61.156.14.79
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.yuli.gov.cn 218.84.205.229
SERVER IP: 218.84.205.229
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.yuncheng.gov.cn 202.99.213.149
SERVER IP: 202.99.213.149
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.yw.gov.cn 220.191.229.7
SERVER IP: 220.191.229.7
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.52 (Red Hat)

www.yzcity.gov.cn 222.243.209.140
SERVER IP: 222.243.209.140
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.2.4 (Win32) PHP/5.2.0

SERVER IP: 222.243.209.140
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 222.243.209.140
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


SERVER IP: 222.243.209.140
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php
CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756
BID : 23359, 24089, 24259, 24261


SERVER IP: 222.243.209.140
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher
CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806
BID : 25498


SERVER IP: 222.243.209.140
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


www.yzwjm.gov.cn 61.177.180.7
SERVER IP: 61.177.180.7
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.zftec.gov.cn 218.108.45.99
SERVER IP: 218.108.45.99
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) Resin/2.1.17

www.zgc-sjs.gov.cn 61.49.1.73
SERVER IP: 61.49.1.73
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.2.3 (Win32) DAV/2 mod_ssl/2.2.3 OpenSSL/0.9.8d mod_autoindex_color PHP/5.2.0

SERVER IP: 61.49.1.73
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 61.49.1.73
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


SERVER IP: 61.49.1.73
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php
CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756
BID : 23359, 24089, 24259, 24261


SERVER IP: 61.49.1.73
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher
CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806
BID : 25498


SERVER IP: 61.49.1.73
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


SERVER IP: 61.49.1.73
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


www.zgcqxs.gov.cn 219.153.9.250
SERVER IP: 219.153.9.250
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.zglz.gov.cn 210.76.63.186
SERVER IP: 210.76.63.186
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.zgwj.gov.cn 58.211.71.34
SERVER IP: 58.211.71.34
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.zgyn.gov.cn 218.31.66.83
SERVER IP: 218.31.66.83
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

www.zgyzedz.gov.cn 221.130.192.7
SERVER IP: 221.130.192.7
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.zh315.gov.cn 61.143.38.166
SERVER IP: 61.143.38.166
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

www.zhciq.gov.cn 218.13.180.69
SERVER IP: 218.13.180.69
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.28 Apache/1.3.28 (Win32)

www.zhcxy.gov.cn 202.105.183.226
SERVER IP: 202.105.183.226
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.zhijiang.gov.cn 202.103.41.60
SERVER IP: 202.103.41.60
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.33 (Unix) PHP/4.1.2

SERVER IP: 202.103.41.60
PORT/PROTOCOL: 80/tcp
TYPE: INFO
The remote web server is running a version of PHP which is older than 4.2.2. This version has a bug in its mail() function which does not properly sanitize user input. As a result, users can forge email to make it look like it is coming from a different source that the server. Solution : Upgrade to PHP 4.2.2
CVE : CVE-2002-0986, CVE-2002-0985
BID : 5562


SERVER IP: 202.103.41.60
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
The remote host is running a version of PHP which is older than 4.3.2. This version contains various flaws that may allow an attacker who has the ability to execute PHP scripts in safe_mode on this host to execute arbitrary commands with the privileges of the HTTP daemon Solution : Upgrade to PHP 4.3.2
CVE : CVE-2003-0166
BID : 7256, 7259, 7187, 7197, 7198, 7199, 7210


SERVER IP: 202.103.41.60
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Script Injection attack The remote host is running a version of PHP which is older than 5.0.3 or 4.3.10. The remote version of this software is vulnerable to various security issues which may, under certain circumstances, allow attackers to execute arbitrary code on the remote host, provided that they can pass arbitrary data to some functions or bypass safe_mode. CVSS Base Score : 6 AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to PHP 5.0.3 or 4.3.10
CVE : CVE-2004-1018, CVE-2004-1019, CVE-2004-1020, CVE-2004-1063, CVE-2004-1064, CVE-2004-1065
BID : 11964, 11981, 11992, 12045


SERVER IP: 202.103.41.60
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher.
CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525
BID : 12963, 12962, 13143, 13163, 13164


SERVER IP: 202.103.41.60
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 202.103.41.60
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.zhoukou.gov.cn 61.163.238.20
SERVER IP: 61.163.238.20
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.zhuzhou.gov.cn 218.244.130.211
SERVER IP: 218.244.130.211
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.zjdpc.gov.cn 218.108.28.14
SERVER IP: 218.108.28.14
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.zjet.gov.cn 202.96.140.50
SERVER IP: 202.96.140.50
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/4.0
- The remote host is running a Microsoft IIS webserver

www.zjj.gov.cn 220.168.198.248
SERVER IP: 220.168.198.248
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.zjjcy.gov.cn 218.75.74.218
SERVER IP: 218.75.74.218
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.zjjsw.gov.cn 218.108.29.42
SERVER IP: 218.108.29.42
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/5.0

www.zjkjt.gov.cn 202.107.204.34
SERVER IP: 202.107.204.34
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.51 (Unix)

www.zjpat.gov.cn 202.107.204.209
SERVER IP: 202.107.204.209
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Resin/2.1.12

www.zjsjt.gov.cn 220.191.243.226
SERVER IP: 220.191.243.226
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.34 (Win32)

www.zjskw.gov.cn 60.191.49.103
SERVER IP: 60.191.49.103
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.zjsllkh.gov.cn 210.25.0.100
SERVER IP: 210.25.0.100
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.zjwh.gov.cn 218.108.238.136
SERVER IP: 218.108.238.136
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.54 (Unix) PHP/5.0.4

SERVER IP: 218.108.238.136
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP which is older than 5.0.5. This version has a number of bugs which allow attackers to execute or retrieve arbitrary files outside of the web root directory. An attacker, exploiting these flaws, would only need to send a malformed HTTP request to the vulnerable system. Successful exploitation would result in the loss of Confidential data or a tarnishing of system Integrity. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 5.0.5 or later
BID : 15119


SERVER IP: 218.108.238.136
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host may give an attacker information useful for future attacks The remote host is running a version of PHP which is older than 5.0.6. This version has a flaw wherein remote attackers can reenable the 'register_globals' parameter. In addition, a remote attacker may be able to overwrite the 'GLOBAL' variable. This may lead to another, more serious, exploitation. CVSS Base Score : 9.3 CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C Solution : Upgrade to PHP 5.0.6 or later See also : http://www.php.net/release_4_4_1.php
CVE : CVE-2006-0395, CVE-2005-2713, CVE-2005-2714, CVE-2005-3319, CVE-2005-3353, CVE-2005-3389, CVE-2005-3706, CVE-2005-3712, CVE-2005-4217, CVE-2005-4504, CVE-2006-0383, CVE-2006-0384, CVE-2006-0386, CVE-2006-0387, CVE-2006-0388, CVE-2006-0389, CVE-2006-0391, CVE-2006-3016, CVE-2006-3018, CVE-2005-3883, CVE-2006-3017, CVE-2005-3390, CVE-2005-3392, CVE-2005-3391
BID : 15571, 16907, 17843, 15249, 15411, 15413, 15250


SERVER IP: 218.108.238.136
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 218.108.238.136
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


SERVER IP: 218.108.238.136
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php
CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756
BID : 23359, 24089, 24259, 24261


SERVER IP: 218.108.238.136
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher
CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806
BID : 25498


SERVER IP: 218.108.238.136
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


www.zqrcw.gov.cn 61.145.126.35
SERVER IP: 61.145.126.35
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.zshuangpu.gov.cn 61.142.80.100
SERVER IP: 61.142.80.100
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.zsqw.gov.cn 61.142.80.232
61.142.80.248
SERVER IP: 61.142.80.232
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

SERVER IP: 61.142.80.248
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.zycg.gov.cn 61.135.227.116
SERVER IP: 61.135.227.116
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver



IP Address Associated Domain Names
58.18.7.202
www.xinganmeng.gov.cn           
58.49.59.191
www.fohb.gov.cn           
58.49.103.227
www.hbagri.gov.cn           
58.51.95.236
www.xflyj.gov.cn           
58.60.2.145
www.szlib.gov.cn           
58.62.172.126
www.gdcx.gov.cn           
58.211.71.34
www.zgwj.gov.cn           
58.221.238.200
www.nantong.gov.cn           
58.221.239.239
www.ntrc.gov.cn           
58.221.249.245
www.ntpta.gov.cn           
58.245.254.166
www.qianguo.gov.cn           
58.248.46.23
www.gdwater.gov.cn           
59.33.252.229
www.huizhou.gov.cn           
59.39.59.59
www.hbipo.gov.cn           
59.41.8.110
www.gzpi.gov.cn           
59.41.8.142
www.gzpf.gov.cn           
59.44.157.147
www.asinfo.gov.cn           
59.45.63.187
www.dandong.gov.cn           
59.51.9.101
www.hengyang.gov.cn           
59.52.254.108
www.jxjst.gov.cn           
59.53.50.168
www.jxsq.gov.cn           
59.56.176.110
www.fjinfo.gov.cn    www.fjkjt.gov.cn        
59.60.21.229
www.gzjj.gov.cn           
59.60.59.34
www.dhly.gov.cn           
59.60.147.228
www.ccpitzj.gov.cn           
59.175.235.8
www.whjs.gov.cn           
60.2.49.77
www.caofeidian.gov.cn           
60.10.19.136
www.lf.gov.cn           
60.19.24.10
www.town.gov.cn           
60.19.24.12
www.lnsports.gov.cn           
60.21.221.46
www.jz.gov.cn           
60.28.239.26
www.linfen.gov.cn    www.yaodu.gov.cn        
60.28.246.92
www.daan.gov.cn           
60.29.62.20
www.hbhrc.gov.cn           
60.29.103.80
www.tjztb.gov.cn           
60.29.110.10
www.tjftz.gov.cn           
60.31.197.50
www.nmgfao.gov.cn    www.nmgzb.gov.cn    www.nmqq.gov.cn     
60.31.214.153
www.hailar.gov.cn           
60.31.215.242
www.xilingol.gov.cn           
60.190.2.41
www.nbmzj.gov.cn           
60.190.2.151
www.nbjt.gov.cn           
60.190.81.82
www.wznw.gov.cn           
60.190.121.9
www.mushroom.gov.cn           
60.191.49.103
www.zjskw.gov.cn           
60.191.70.230
www.wzta.gov.cn           
60.191.134.252
www.tzipo.gov.cn    www.tzkj.gov.cn        
60.195.250.153
www.jxmg.gov.cn           
60.195.251.237
www.locpg.gov.cn           
60.209.78.8
www.smeqd.gov.cn           
60.210.98.43
www.huantai.gov.cn           
60.210.254.162
www.wffc.gov.cn           
60.215.8.13
www.binzhou.gov.cn           
60.223.255.11
www.sxjz.gov.cn           
61.29.234.65
www.liuzhou.gov.cn           
61.49.1.73
www.zgc-sjs.gov.cn           
61.50.187.54
www.bjys.gov.cn           
61.55.138.196
www.hbmyjj.gov.cn           
61.128.101.131
www.xjsafety.gov.cn           
61.128.109.193
www.altdj.gov.cn    www.xjjz.gov.cn        
61.128.123.101
www.xjfy.gov.cn           
61.129.33.140
www.cqlottery.gov.cn           
61.129.45.92
www.ahfeixi.gov.cn           
61.129.65.58
www.shanghai.gov.cn           
61.129.89.144
www.dfxj.gov.cn           
61.129.251.105
www.wanrong.gov.cn           
61.131.46.150
www.qzipo.gov.cn           
61.132.55.198
www.lsjsw.gov.cn           
61.132.59.46
www.jndz.gov.cn           
61.132.90.156
www.czrs.gov.cn           
61.132.133.25
www.ahzcj.gov.cn           
61.132.135.253
www.ahpress.gov.cn           
61.132.137.203
www.ahjt.gov.cn           
61.132.139.76
www.anhuisafety.gov.cn           
61.133.142.32
www.hfsghj.gov.cn           
61.133.142.59
www.hfboftec.gov.cn           
61.133.200.40
www.ngsh.gov.cn           
61.133.207.99
www.nxgtt.gov.cn           
61.134.55.246
www.yintai.gov.cn           
61.134.65.201
www.tianshui.gov.cn           
61.135.129.107
www.xingyang.gov.cn           
61.135.203.10
www.hetz.gov.cn           
61.135.227.116
www.zycg.gov.cn           
61.136.9.36
www.tianjin.gov.cn           
61.138.98.204
www.nmmzt.gov.cn           
61.138.176.67
www.ccga.gov.cn           
61.138.179.12
www.jlagri.gov.cn           
61.139.47.248
www.neijiang.gov.cn           
61.139.76.40
www.cdjg.gov.cn           
61.139.126.18
www.medgen.labs.gov.cn           
61.139.126.37
www.gzszx.gov.cn           
61.140.99.120
www.gdltax.gov.cn           
61.141.22.86
www.nanao.gov.cn           
61.141.22.93
www.shantou.gov.cn           
61.142.80.100
www.zshuangpu.gov.cn           
61.142.80.232
www.zsqw.gov.cn           
61.142.80.248
www.zsqw.gov.cn           
61.142.131.6
www.sdwsqw.gov.cn           
61.142.131.14
www.sdet.gov.cn           
61.143.38.166
www.zh315.gov.cn           
61.143.153.234
www.jiexi.gov.cn           
61.144.226.2
www.szjs.gov.cn           
61.144.226.41
www.szplan.gov.cn           
61.144.226.49
www.sz12333.gov.cn           
61.144.226.82
www.szfdc.gov.cn           
61.144.226.172
www.szcourt.gov.cn           
61.144.227.15
www.rsj.sz.gov.cn    www.szbts.gov.cn    www.szsf.gov.cn     
www.szbqts.gov.cn    www.szrkjs.gov.cn    www.szzx.gov.cn     
61.145.71.155
www.fsjyzx.gov.cn           
61.145.75.122
www.gaoming.gov.cn           
61.145.114.225
www.51a.gov.cn           
61.145.126.35
www.zqrcw.gov.cn           
61.145.164.239
www.gzrc.gov.cn           
61.150.65.252
www.yangling.gov.cn    www.ylagri.gov.cn        
61.152.93.61
www.landscape.gov.cn           
61.152.94.254
www.psx.gov.cn    www.xjciq.gov.cn        
61.152.160.60
www.nantou.gov.cn           
61.152.187.169
www.shad.gov.cn           
61.153.35.181
www.dyrc.gov.cn           
61.153.223.5
www.qtinfo.gov.cn           
61.154.119.18
www.qglz.gov.cn           
61.155.233.52
www.njgs.gov.cn           
61.156.8.200
www.sdns.gov.cn           
61.156.14.60
www.yantai.gov.cn           
61.156.14.79
www.ytrc.gov.cn           
61.157.76.150
www.scpop.gov.cn           
61.157.78.11
www.scfda.gov.cn           
61.157.78.27
www.scjc.gov.cn           
61.157.78.34
www.cdst.gov.cn           
61.158.105.69
www.hrbgaj.gov.cn           
61.158.230.143
www.xiangcheng.gov.cn           
61.159.228.46
www.ynsafety.gov.cn           
61.159.228.161
www.cpm.gov.cn           
61.163.231.73
www.nynews.gov.cn           
61.163.238.20
www.zhoukou.gov.cn           
61.166.7.153
www.lijiang.gov.cn           
61.166.100.2
www.dhl.gov.cn           
61.167.250.2
www.hljdx.gov.cn           
61.175.219.229
www.yh.gov.cn           
61.177.180.7
www.yzwjm.gov.cn           
61.177.180.12
www.yangzhou.gov.cn           
61.178.20.212
www.gszl.gov.cn           
61.178.108.25
www.gsjt.gov.cn           
61.180.25.58
www.jxyf.gov.cn           
61.181.80.2
www.xq.gov.cn           
61.183.11.99
www.whrsj.gov.cn           
61.184.107.113
www.hslib.gov.cn           
61.185.55.155
www.sxfx.gov.cn           
61.185.214.36
www.sxhall.gov.cn           
61.185.224.31
www.scqy.gov.cn           
61.185.238.206
www.sxit.gov.cn           
61.185.238.220
www.qinfeng.gov.cn    www.spic.gov.cn        
61.185.238.221
www.sei.gov.cn           
61.185.238.246
www.sxcredit.gov.cn           
61.185.242.201
www.xasmw.gov.cn           
61.185.242.202
www.xaonline.gov.cn           
61.186.169.169
www.cqmj.gov.cn           
61.187.87.37
www.hninfo.gov.cn           
61.187.88.247
www.hnt.gov.cn           
61.187.248.20
www.0735.gov.cn           
61.188.201.23
www.ybrc.gov.cn           
61.189.166.2
www.qagri.gov.cn           
61.191.136.2
www.weda.gov.cn           
61.191.178.20
www.mas.gov.cn           
61.232.165.131
www.dlhitech.gov.cn           
61.240.185.230
www.nmldt.gov.cn           
61.242.253.212
www.cqjt.gov.cn           
74.200.203.242
www.sxtzb.gov.cn           
116.52.13.123
www.ynbsm.gov.cn           
117.25.130.140
www.kmcgfda.gov.cn           
121.28.129.67
www.hbdrc.gov.cn           
121.33.248.22
www.gdcct.gov.cn           
122.96.148.115
www.njfcj.gov.cn           
122.200.64.41
www.fish.gov.cn           
122.224.146.45
www.wtolaw.gov.cn           
123.100.2.120
www.cqcrtv.gov.cn           
124.89.118.236
www.skxtv.gov.cn           
124.207.106.19
www.china-language.gov.cn           
124.239.194.1
www.hebei.gov.cn           
124.254.63.218
www.ccm.gov.cn           
125.32.157.252
www.shuangliao.gov.cn           
125.46.104.166
www.hnmtdz.gov.cn           
125.64.94.69
www.usjob.gov.cn           
125.71.28.51
www.scpta.gov.cn           
125.72.24.37
www.qhrs.gov.cn           
125.72.92.28
www.chengbei.gov.cn           
125.76.229.4
www.smeshx.gov.cn           
125.76.229.28
www.shyzfw.gov.cn           
159.226.2.11
www.nsfc.gov.cn           
159.226.134.15
www.xjwh.gov.cn           
159.226.218.1
www.cpi.gov.cn           
168.160.1.111
www.nstl.gov.cn           
168.160.200.6
www.dtzc.gov.cn           
168.160.250.68
www.cheminfo.gov.cn           
202.96.62.67
www.ccnt.gov.cn           
202.96.65.188
www.lnprice.gov.cn           
202.96.140.50
www.zjet.gov.cn           
202.96.215.249
www.envir.gov.cn           
202.98.57.18
www.cqda.gov.cn           
202.98.187.117
www.ynaic.gov.cn           
202.98.223.70
www.gztongzi.gov.cn           
202.99.63.158
www.soa.gov.cn           
202.99.63.178
www.forestry.gov.cn           
202.99.63.184
www.greenhr.gov.cn           
202.99.67.55
www.tipp.gov.cn           
202.99.176.28
www.botou.gov.cn           
202.99.213.149
www.yuncheng.gov.cn           
202.99.219.186
www.sxmz.gov.cn           
202.99.219.244
www.sxch.gov.cn    www.sxsfjd.gov.cn        
202.99.223.146
www.sxagri.gov.cn           
202.100.84.130
www.xbrc.gov.cn           
202.100.98.20
www.nxaudit.gov.cn           
202.100.210.107
www.yangpu.gov.cn           
202.100.210.251
www.hiciq.gov.cn           
202.101.105.173
www.xm.gov.cn           
202.101.108.137
www.stm.gov.cn           
202.101.162.75
www.xiaoshan.gov.cn           
202.101.234.201
www.jxgc.gov.cn           
202.102.234.198
www.hebi.gov.cn           
202.103.25.20
www.hbzx.gov.cn           
202.103.33.62
www.cjw.gov.cn           
202.103.41.60
www.hbwmw.gov.cn    www.zhijiang.gov.cn        
202.103.53.163
www.shiyan.gov.cn           
202.103.67.176
www.hnleader.gov.cn           
202.103.114.7
www.csh.gov.cn           
202.103.114.9
www.hunan.gov.cn           
202.103.114.10
www.hunangrain.gov.cn           
202.104.129.181
www.szga.gov.cn           
202.104.212.42
www.yangjiang.gov.cn           
202.105.12.250
www.fsfao.gov.cn           
202.105.183.226
www.zhcxy.gov.cn           
202.106.75.11
www.safety.gov.cn           
202.106.82.204
www.bjtax.gov.cn           
202.106.114.116
www.bjgx2008.gov.cn           
202.106.161.2
www.cppcc.gov.cn           
202.106.181.132
www.chrm.gov.cn           
202.106.190.8
www.emc.gov.cn           
202.107.204.34
www.zjkjt.gov.cn           
202.107.204.209
www.zjpat.gov.cn           
202.107.211.83
www.nbsti.gov.cn           
202.107.248.203
www.lsjw.gov.cn           
202.108.124.170
www.jxsp.gov.cn           
202.108.143.22
www.bjdch.gov.cn           
202.109.110.80
www.spta.gov.cn           
202.109.213.44
www.qzrs.gov.cn           
202.110.236.131
www.mirror.gov.cn           
202.111.165.224
www.jlds.gov.cn           
202.111.165.247
www.jlws.gov.cn           
202.111.175.205
www.ybzfcg.gov.cn           
202.127.42.126
www.chinapesticide.gov.cn           
202.127.42.163
www.agrihr.gov.cn           
202.127.45.50
www.agri.gov.cn           
202.127.45.191
www.aqsc.gov.cn           
202.127.48.35
www.customs.gov.cn           
202.127.160.110
www.beic.gov.cn           
202.142.21.213
www.gzw.dl.gov.cn           
203.86.73.228
www.chinanet.gov.cn           
203.91.45.33
www.szftz.gov.cn           
203.91.45.201
www.sist.gov.cn           
203.175.145.17
www.szpb.gov.cn           
203.207.98.226
www.sxgaoping.gov.cn           
203.207.120.249
www.chinawest.gov.cn    www1.chinawest.gov.cn        
203.207.195.50
www.chinaenergy.gov.cn           
203.207.195.81
www.cddln.gov.cn           
203.207.195.91
www.ssf.gov.cn           
203.207.195.116
www.acsi.gov.cn           
203.207.200.88
www.xjdrc.gov.cn           
203.207.226.100
www.realestate.cei.gov.cn           
210.22.13.42
www.cla.gov.cn           
210.25..100
www.zjsllkh.gov.cn           
210.51.7.120
www.ctei.gov.cn           
210.51.165.170
www.qhdta.gov.cn           
210.51.167.183
www.africa.gov.cn           
210.51.168.171
www.pndc.gov.cn           
210.51.174.105
www.hbinnofund.gov.cn           
210.51.178.135
www.lottery.gov.cn           
210.51.187.92
www.wfstc.gov.cn           
210.72.1.10
www.gzwaishi.gov.cn           
210.72.1.33
www.gzepb.gov.cn           
210.72.3.203
www.gzkj.gov.cn           
210.72.34.8
www.gxtj.gov.cn           
210.72.57.31
www.stats-sx.gov.cn           
210.72.96.25
www.cea.gov.cn           
210.72.96.51
www.neis.gov.cn           
210.73.64.22
www.bjjtgl.gov.cn           
210.73.64.43
www.bjlj.gov.cn           
210.73.64.54
www.bjwater.gov.cn           
210.73.64.55
www.bjepb.gov.cn           
210.73.64.72
www.bjghw.gov.cn           
210.73.64.75
www.bjdzj.gov.cn           
210.73.64.99
www.bjgtj.gov.cn           
210.73.64.102
www.bjjgj.gov.cn           
210.73.64.123
www.bjdj.gov.cn           
210.73.64.171
www.nobelbeijing.gov.cn           
210.73.71.108
www.bjmac.gov.cn           
210.73.72.68
www.bjmbc.gov.cn           
210.73.128.41
www.jsinfo.gov.cn           
210.75.48.103
www.yjkjj.gov.cn           
210.75.208.172
www.221.gov.cn           
210.75.211.10
www.bjhrwm.gov.cn           
210.75.211.147
www.bjjtw.gov.cn    www.bjjtzf.gov.cn        
210.75.218.5
www.bjda.gov.cn           
210.76.36.128
www.hljcdm.gov.cn           
210.76.63.186
www.zglz.gov.cn           
210.76.65.113
www.tyj.gd.gov.cn           
210.76.65.131
www.gdnet110.gov.cn           
210.76.97.117
www.bsw.gov.cn           
210.82.57.1
www.shdf.gov.cn           
211.88.12.154
www.antifraud.gov.cn           
211.92.62.2
www.rctj.gov.cn           
211.92.151.134
www.ynepb.gov.cn           
211.97.71.109
www.gxit.gov.cn           
211.143.182.168
www.fzedu.gov.cn           
211.143.188.178
www.wuping.gov.cn           
211.144.102.199
www.shzj.gov.cn           
211.144.107.180
www.ssme.gov.cn           
211.147.16.18
www.nmc.gov.cn           
211.147.16.22
www.cnan.gov.cn           
211.148.164.227
www.tjsf.gov.cn           
211.152.50.182
www.lyinfo.gov.cn           
211.153.22.241
www.bjtvet.gov.cn           
211.153.32.1
www.benic.gov.cn           
211.155.23.248
www.laipo.gov.cn           
211.155.27.140
www.gddoftec.gov.cn           
211.156.140.164
www.guiyang.gov.cn           
211.157.100.131
www.tpbjc.gov.cn           
211.159.67.168
www.szsmb.gov.cn           
211.160.24.194
www.serc.gov.cn           
211.167.41.129
www.tdbdx.gov.cn           
216.66.26.154
www.gov.cn           
218.2.20.138
www.harczx.gov.cn           
218.5.8.249
www.minhou.gov.cn           
218.5.65.145
www.siming.gov.cn           
218.5.77.110
www.yngb.gov.cn           
218.5.84.21
www.xmedu.gov.cn           
218.6.146.98
www.dyhb.gov.cn           
218.10.65.247
www.hljjs.gov.cn           
218.13.180.69
www.zhciq.gov.cn           
218.17.225.250
www.szum.gov.cn           
218.22.128.74
www.aqfao.gov.cn           
218.22.219.100
www.hsq.gov.cn           
218.22.228.145
www.ahlj.gov.cn           
218.22.238.59
www.huaibei.gov.cn           
218.23.149.22
www.yixian.gov.cn           
218.23.173.118
www.bozhou.gov.cn           
218.25.11.160
www.dps.ln.gov.cn           
218.25.25.18
www.syrsw.gov.cn           
218.25.39.188
www.lnppb.gov.cn           
218.25.42.212
www.expo2006sy.gov.cn           
218.25.48.190
www.shxc.gov.cn           
218.25.65.140
www.lnmz.gov.cn           
218.25.158.48
www.lnciq.gov.cn           
218.25.162.55
www.dlpld.gov.cn           
218.25.162.75
www.dlzh.gov.cn           
218.25.214.223
www.asjy.gov.cn           
218.26.1.109
www.sxaic.gov.cn           
218.26.168.90
www.sxnw.gov.cn           
218.26.178.33
www.sxprice.gov.cn           
218.26.221.196
www.rcx.gov.cn           
218.27.180.111
www.jlthx.gov.cn           
218.28.7.252
www.henanqx.gov.cn           
218.28.13.90
www.hnyr.gov.cn           
218.28.41.8
www.yellowriver.gov.cn           
218.28.141.173
www.hnly.gov.cn           
218.30.21.204
www.sxtong.gov.cn           
218.30.96.26
www.hdlsj.gov.cn           
218.30.96.32
www.yczscq.gov.cn           
218.30.96.106
www.gaozhou.gov.cn           
218.30.96.147
www.xzcd.gov.cn           
218.30.97.82
www.xjepb.gov.cn           
218.31.66.83
www.zgyn.gov.cn           
218.31.113.246
www.xjhm.gov.cn           
218.31.132.251
www.loulan.gov.cn    www.xjbz.gov.cn    www.xjbzsfj.gov.cn     
218.57.8.16
www.infobase.gov.cn           
218.57.13.73
www.ncsb.gov.cn           
218.57.128.245
www.sdwj.gov.cn           
218.57.139.53
www.pingyin.gov.cn           
218.57.139.178
www.sdjt.gov.cn           
218.57.142.166
www.sdxm.gov.cn           
218.57.143.198
www.huaiyin.gov.cn           
218.58.54.13
www.jiaozhou.gov.cn           
218.58.68.229
www.qdsf.gov.cn           
218.58.76.11
www.qdaic.gov.cn           
218.61.7.72
www.smedl.gov.cn           
218.61.146.14
www.syipb.gov.cn           
218.61.146.27
www.sysc.gov.cn           
218.62.26.196
www.jlqx.gov.cn           
218.62.27.52
www.jlfiw.gov.cn           
218.62.29.139
www.ccgs.gov.cn           
218.62.35.76
www.ccrs.gov.cn           
218.62.56.114
www.dongfeng.gov.cn           
218.62.65.194
www.jlscy.gov.cn           
218.63.168.234
www.ljta.gov.cn           
218.63.244.138
www.xsbn.gov.cn           
218.64.59.106
www.jxmie.gov.cn           
218.64.65.98
www.ncdh.gov.cn           
218.65.86.7
www.jxciq.gov.cn           
218.65.89.131
www.jxf.gov.cn           
218.66.59.58
www.fjsp.gov.cn           
218.66.59.238
www.fjjc.gov.cn           
218.67.246.249
www.tjjt.gov.cn           
218.69.100.138
www.tjwcb.gov.cn           
218.69.103.35
www.tjhg.gov.cn           
218.69.114.17
www.tstc.gov.cn           
218.70.229.121
www.cqaudit.gov.cn           
218.75.5.198
www.tzgh.gov.cn           
218.75.74.218
www.zjjcy.gov.cn           
218.75.85.2
www.nbsme.gov.cn           
218.75.85.194
www.81890.gov.cn           
218.75.229.204
www.ytjcy.gov.cn           
218.75.241.186
www.xtwqb.gov.cn           
218.76.65.35
www.xxz.gov.cn           
218.76.215.232
www.shaoyang.gov.cn           
218.77.128.138
www.hicourt.gov.cn           
218.77.186.138
www.hnjy.gov.cn           
218.84.65.210
www.setd.gov.cn           
218.84.139.66
www.xjhm.lss.gov.cn           
218.84.205.229
www.yuli.gov.cn           
218.84.207.84
www.tahe.gov.cn           
218.84.209.2
www.xjlt.gov.cn           
218.85.73.129
www.618.gov.cn           
218.85.73.162
www.fj.gov.cn    www.fujian.gov.cn        
218.85.133.12
www.nc315.gov.cn           
218.86.36.207
www.fdc.gov.cn           
218.87.20.8
www.jiangxi.gov.cn           
218.87.20.10
www.jxgrain.gov.cn           
218.87.32.235
www.jxdii.gov.cn           
218.87.32.249
www.jxdaj.gov.cn           
218.87.99.48
www.xinyu.gov.cn           
218.88.187.212
www.lsst.gov.cn           
218.91.206.119
www.rugao.gov.cn           
218.91.209.179
www.ntagri.gov.cn           
218.91.253.71
www.cchr.gov.cn           
218.92.11.3
www.jgjy.gov.cn           
218.93.116.250
www.wj.gov.cn           
218.93.196.22
www.siyang.gov.cn           
218.94..9
www.jszx.gov.cn           
218.94.6.91
www.jswater.gov.cn           
218.94.38.179
www.jscz.gov.cn           
218.94.61.112
www.nju.gov.cn           
218.94.123.23
www.jsga.gov.cn           
218.95.217.151
www.nxyz.gov.cn           
218.95.217.165
www.nxcd.gov.cn           
218.104.217.171
www.scxmsp.gov.cn           
218.104.235.58
www.fjipo.gov.cn           
218.107.216.61
www.bjtzzs.gov.cn           
218.108.28.14
www.zjdpc.gov.cn           
218.108.29.42
www.zjjsw.gov.cn           
218.108.45.99
www.zftec.gov.cn           
218.108.116.12
www.hzsj.gov.cn           
218.108.238.136
www.zjwh.gov.cn           
218.204.130.109
www.jxwrd.gov.cn           
218.242.146.58
www.sh1111.gov.cn           
218.242.181.125
www.sast.gov.cn           
218.244.129.66
www.syqw.gov.cn           
218.244.130.211
www.zhuzhou.gov.cn           
218.244.130.219
www.hdwj.gov.cn           
218.244.136.42
www.lndx.gov.cn           
218.244.136.98
www.tcm.gov.cn           
218.244.137.71
www.badaling.gov.cn           
218.244.152.28
www.wzzw.gov.cn           
218.244.152.30
www.dctq.gov.cn           
218.246.21.12
www.boye.gov.cn           
218.246.34.107
www.cmda.gov.cn           
218.246.85.2
www.pgkx.gov.cn           
218.246.87.8
www.bjtzh.gov.cn           
218.246.95.219
www.dxad.gov.cn           
218.246.95.232
www.dxic.gov.cn           
218.247.19.3
www.caac.gov.cn           
218.249.32.162
www.ncie.gov.cn           
218.249.86.180
www.counsellor.gov.cn           
219.129.188.115
www.yangchun.gov.cn           
219.130.221.37
www.fsxxb.gov.cn           
219.132.136.68
www.meizhou.gov.cn           
219.137.213.151
www.rftgd.gov.cn           
219.138.45.241
www.xfyy.gov.cn           
219.138.120.147
www.jingshan.gov.cn           
219.138.167.137
www.chibi.gov.cn           
219.140.69.40
www.whlib.gov.cn           
219.140.77.58
www.hbdofcom.gov.cn           
219.140.162.172
www.hubeiwater.gov.cn           
219.140.171.55
www.hubei.gov.cn           
219.140.178.210
www.qk.gov.cn           
219.140.196.6
www.wh12366.gov.cn           
219.141.18.13
www.gygov.gov.cn           
219.141.231.58
www.spp.gov.cn           
219.141.234.230
www.bjjc.gov.cn           
219.142.62.9
www.hydroinfo.gov.cn           
219.142.70.132
www.cigem.gov.cn           
219.142.81.14
www.qimg.cgs.gov.cn           
219.142.81.18
www.ffs.cgs.gov.cn           
219.142.101.72
www.realestate.gov.cn           
219.142.101.117
www.coc.gov.cn           
219.144.130.60
www.xian.cgs.gov.cn           
219.144.196.94
www.xags.gov.cn           
219.144.222.26
www.snaic.gov.cn           
219.146.56.19
www.sdsi.gov.cn           
219.146.220.188
www.linqing.gov.cn           
219.151.1.37
www.gzsj.gov.cn           
219.153.2.20
www.cqjgdj.gov.cn           
219.153.9.250
www.zgcqxs.gov.cn           
219.153.22.53
www.cqciq.gov.cn           
219.153.37.30
www.cqrk.gov.cn           
219.153.125.225
www.ccc.gov.cn           
219.159.68.91
www.gxrs.gov.cn           
219.159.69.131
www.gxmzt.gov.cn           
219.159.82.129
www.gxdx.gov.cn           
219.232.237.37
www.xjnj.gov.cn           
219.234.94.135
www.mykj.gov.cn           
219.235.129.45
www.stats.gov.cn           
219.235.241.176
www.hddjbaic.gov.cn           
219.238.178.39
www.fsi.gov.cn           
219.239.41.20
www.ncac.gov.cn           
220.112.40.86
www.cnci.gov.cn           
220.113.15.103
www.nxpta.gov.cn           
220.162.230.42
www.sm.gov.cn           
220.163.6.180
www.ynjst.gov.cn           
220.163.86.189
www.ynciq.gov.cn           
220.164.79.2
www.smeyn.gov.cn           
220.165.143.54
www.cxs.gov.cn           
220.166.64.198
www.ynly.gov.cn           
220.167.224.85
www.xntv.gov.cn           
220.168.198.248
www.zjj.gov.cn           
220.171.28.206
www.urumqi.gov.cn           
220.171.88.71
www.xjedu.gov.cn           
220.175.8.6
www.jxzfw.gov.cn           
220.178.18.20
www.huoqiu.gov.cn           
220.178.18.72
www.ahpf.gov.cn           
220.178.98.48
www.ahtm.gov.cn           
220.179.115.76
www.xnsf.gov.cn           
220.180.15.76
www.laty.gov.cn           
220.181.45.116
www.hnwqb.gov.cn           
220.182.51.20
www.tibet.gov.cn           
220.189.220.187
www.nbciq.gov.cn           
220.191.169.25
www.nbfet.gov.cn           
220.191.204.203
www.wenzhou.gov.cn           
220.191.227.59
www.szzj.gov.cn           
220.191.229.7
www.yw.gov.cn           
220.191.243.226
www.zjsjt.gov.cn           
220.194.20.37
www.sara.gov.cn           
220.195.162.222
www.ahzw.gov.cn           
220.197.208.170
www.gzaj.gov.cn           
220.197.227.26
www.ynagri.gov.cn           
220.201.7.243
www.lngs.gov.cn           
220.202.12.150
www.hblr.gov.cn           
220.248.236.34
www.huainan.gov.cn           
221.2.154.7
www.whgajxj.gov.cn           
221.6.180.105
www.info.gov.cn           
221.7.38.199
www.gscms.chinasafety.gov.cn           
221.8.56.235
www.jlsafety.gov.cn           
221.13.4.88
www.gzsjyt.gov.cn           
221.13.64.228
www.lasa.gov.cn           
221.129.21.152
www.tjhb.gov.cn           
221.130.191.248
www.nczy.gov.cn           
221.130.192.7
www.zgyzedz.gov.cn           
221.136.70.250
www.nbzj.gov.cn           
221.194.46.67
www.xushui.gov.cn           
221.199.13.67
www.nxciq.gov.cn           
221.199.13.163
www.nxws.gov.cn           
221.204.249.223
www.sxfzb.gov.cn           
221.206.121.21
www.mudanjiang.gov.cn           
221.206.179.23
www.dongning.gov.cn           
221.207.12.131
www.qhlr.gov.cn           
221.207.13.236
www.qhly.gov.cn           
221.208.80.72
www.heihe.gov.cn           
221.208.168.54
www.hrbgzw.gov.cn           
221.208.194.103
www.hljmj.gov.cn           
221.212.125.14
www.hljwst.gov.cn           
221.215.126.130
www.chengyang.gov.cn           
221.224.13.50
www.rsj.suzhou.gov.cn           
221.224.13.226
www.szsgsj.gov.cn           
221.224.22.196
www.kepz.gov.cn           
221.229.242.227
www.xzzx.gov.cn           
221.229.247.211
www.chinafx.gov.cn           
221.236.20.21
www.sccm.gov.cn           
221.237.160.199
www.scmz.gov.cn           
221.237.160.226
www.schj.gov.cn           
221.237.177.3
www.cdgs.gov.cn           
221.238.248.3
www.qhwq.gov.cn           
222.35.3.30
www.srgl.gov.cn           
222.35.3.38
www.rjzl.gov.cn           
222.35.25.230
www.bjsys.gov.cn           
222.35.47.70
www.ivdc.gov.cn           
222.56.47.54
www.ynjy.gov.cn           
222.75.160.123
www.nx.gov.cn           
222.75.161.100
www.nxrkw.gov.cn           
222.75.163.243
www.nxzj.gov.cn           
222.75.166.68
www.nxdofcom.gov.cn           
222.76.216.105
www.fjax.gov.cn           
222.77..124
www.qzepb.gov.cn           
222.77.185.196
www.fjlss.gov.cn           
222.78.246.252
www.wuyishan.gov.cn           
222.79.247.170
www.qzldbz.gov.cn           
222.82.214.166
www.xjsj.gov.cn           
222.82.217.84
www.xjnewqi.gov.cn           
222.82.219.133
www.bingtuan.gov.cn           
222.82.229.2
www.xinjiangtour.gov.cn           
222.85.128.176
www.gzgs.gov.cn           
222.128.59.129
www.aeoc.gov.cn           
222.133.32.2
www.dezhou.gov.cn    www.dz.gov.cn        
222.137.252.25
www.xinzheng.gov.cn           
222.140.112.26
www.jiyuan.gov.cn           
222.143.24.198
www.hndrc.gov.cn           
222.143.25.114
www.smehen.gov.cn           
222.177.15.8
www.cqtj.gov.cn           
222.190.122.84
www.pksq.gov.cn           
222.191.251.6
www.gzsmzt.gov.cn           
222.211.73.51
www.scsme.gov.cn           
222.221.6.250
www.ynepb.gov.cn           
222.221.252.217
www.km.gov.cn           
222.240.156.30
www.hntj.gov.cn           
222.240.162.174
www.hncredit.gov.cn           
222.240.198.20
www.hnciq.gov.cn           
222.240.223.194
www.hnjt.gov.cn           
222.243.203.230
www.yongzhou.gov.cn           
222.243.209.140
www.ninyuan.gov.cn    www.yzcity.gov.cn