|
Cryptome DVDs are offered by Cryptome. Donate $25 for two DVDs of the Cryptome 12-years collection of 46,000 files from June 1996 to June 2008 (~6.7 GB). Click Paypal or mail check/MO made out to John Young, 251 West 89th Street, New York, NY 10024. The collection includes all files of cryptome.org, jya.com, cartome.org, eyeball-series.org and iraq-kill-maim.org, and 23,000 (updated) pages of counter-intelligence dossiers declassified by the US Army Information and Security Command, dating from 1945 to 1985.The DVDs will be sent anywhere worldwide without extra cost. |
12 December 2007
Previous:
gov-pk.htm + Server Comms Reporting for Research on gov.pk December 2, 2007 gov-ir.htm + Server Comms Reporting for Research on gov.ir November 28, 2007
A sends:
I wanted to make you aware of the following from gov.cn since it is a bit different than the others you already posted. It appears that gov.cn has a much broader IP space than the IR and PK research I saw on your site, so a buddy of mine asked that I send this in to you to have your community review as a comparison to your past posts. A congrats must go out, too... they have a setup well compared to the others. Must be some uniformity there.
Table Cell Color Keys | |
Grey | No analysis report generated. Could be due to server being down, not reponding to our request, or not existing. |
White | Nothing of interest to report |
Yellow | Notes are provided on findings but nothing significant found. |
Pink | More information is provided on findings, usually contained with systems having a vulnerability report. More valued information over just notes. |
Red | Report has been generated with findings for potential vulnerability information. |
Domain Name | IP ADDRESS | Information Identified |
www.0735.gov.cn | 61.187.248.20 |
SERVER IP: 61.187.248.20 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.221.gov.cn | 210.75.208.172 |
SERVER IP: 210.75.208.172 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.51a.gov.cn | 61.145.114.225 |
SERVER IP: 61.145.114.225 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.618.gov.cn | 218.85.73.129 |
SERVER IP: 218.85.73.129 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.81890.gov.cn | 218.75.85.194 |
SERVER IP: 218.75.85.194 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache Coyote/1.0 |
www.acsi.gov.cn | 203.207.195.116 |
SERVER IP: 203.207.195.116 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.aeoc.gov.cn | 222.128.59.129 |
SERVER IP: 222.128.59.129 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.africa.gov.cn | 210.51.167.183 |
SERVER IP: 210.51.167.183 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.agri.gov.cn | 202.127.45.50 |
SERVER IP: 202.127.45.50 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.agrihr.gov.cn | 202.127.42.163 |
SERVER IP: 202.127.42.163 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.ahfeixi.gov.cn | 61.129.45.92 |
SERVER IP: 61.129.45.92 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.59 (Unix) PHP/4.3.5 SERVER IP: 61.129.45.92 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Script Injection attack The remote host is running a version of PHP which is older than 5.0.3 or 4.3.10. The remote version of this software is vulnerable to various security issues which may, under certain circumstances, allow attackers to execute arbitrary code on the remote host, provided that they can pass arbitrary data to some functions or bypass safe_mode. CVSS Base Score : 6 AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to PHP 5.0.3 or 4.3.10 CVE : CVE-2004-1018, CVE-2004-1019, CVE-2004-1020, CVE-2004-1063, CVE-2004-1064, CVE-2004-1065 BID : 11964, 11981, 11992, 12045 SERVER IP: 61.129.45.92 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher. CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525 BID : 12963, 12962, 13143, 13163, 13164 SERVER IP: 61.129.45.92 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 61.129.45.92 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.ahjt.gov.cn | 61.132.137.203 |
SERVER IP: 61.132.137.203 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.33 (Unix) |
www.ahlj.gov.cn | 218.22.228.145 |
SERVER IP: 218.22.228.145 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.ahpf.gov.cn | 220.178.18.72 |
SERVER IP: 220.178.18.72 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.ahpress.gov.cn | 61.132.135.253 |
SERVER IP: 61.132.135.253 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.ahtm.gov.cn | 220.178.98.48 |
SERVER IP: 220.178.98.48 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.ahzcj.gov.cn | 61.132.133.25 |
SERVER IP: 61.132.133.25 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.ahzw.gov.cn | 220.195.162.222 |
SERVER IP: 220.195.162.222 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.altdj.gov.cn | 61.128.109.193 |
SERVER IP: 61.128.109.193 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.anhuisafety.gov.cn | 61.132.139.76 |
SERVER IP: 61.132.139.76 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache-Coyote/1.1 |
www.antifraud.gov.cn | 211.88.12.154 |
SERVER IP: 211.88.12.154 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Oracle-Application-Server-10g/10.1.3.0.0 Oracle-HTTP-Server SERVER IP: 211.88.12.154 PORT/PROTOCOL: 80/tcp TYPE: NOTE The remote host is running the Oracle Application Server 10g version 10.1.3.0.0 Oracle-HTTP-Server |
www.aqfao.gov.cn | 218.22.128.74 |
SERVER IP: 218.22.128.74 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.aqsc.gov.cn | 202.127.45.191 |
SERVER IP: 202.127.45.191 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.asinfo.gov.cn | 59.44.157.147 |
SERVER IP: 59.44.157.147 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.asjy.gov.cn | 218.25.214.223 |
SERVER IP: 218.25.214.223 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache Coyote/1.0 |
www.badaling.gov.cn | 218.244.137.71 |
SERVER IP: 218.244.137.71 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.beic.gov.cn | 202.127.160.110 |
SERVER IP: 202.127.160.110 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.26 (Unix) |
www.benic.gov.cn | 211.153.32.1 |
SERVER IP: 211.153.32.1 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.54 (Unix) |
www.bingtuan.gov.cn | 222.82.219.133 |
SERVER IP: 222.82.219.133 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.binzhou.gov.cn | 60.215.8.13 |
SERVER IP: 60.215.8.13 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_Server/6.0.2.19 Apache/2.0.47 (Unix) |
www.bjda.gov.cn | 210.75.218.5 |
SERVER IP: 210.75.218.5 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.bjdch.gov.cn | 202.108.143.22 |
SERVER IP: 202.108.143.22 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.2.3 (Unix) |
www.bjdj.gov.cn | 210.73.64.123 |
SERVER IP: 210.73.64.123 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.bjdzj.gov.cn | 210.73.64.75 |
SERVER IP: 210.73.64.75 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.bjepb.gov.cn | 210.73.64.55 |
SERVER IP: 210.73.64.55 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.bjghw.gov.cn | 210.73.64.72 |
SERVER IP: 210.73.64.72 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.bjgtj.gov.cn | 210.73.64.99 |
SERVER IP: 210.73.64.99 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache-Coyote/1.1 |
www.bjgx2008.gov.cn | 202.106.114.116 |
SERVER IP: 202.106.114.116 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.2.3 (Unix) DAV/2 mod_ssl/2.2.3 OpenSSL/0.9.8d PHP/5.1.6 mod_apreq2-20051231/2.5.7 mod_perl/2.0.2 Perl/v5.8.7 SERVER IP: 202.106.114.116 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 202.106.114.116 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 SERVER IP: 202.106.114.116 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756 BID : 23359, 24089, 24259, 24261 SERVER IP: 202.106.114.116 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806 BID : 25498 SERVER IP: 202.106.114.116 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 SERVER IP: 202.106.114.116 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
www.bjhrwm.gov.cn | 210.75.211.10 |
SERVER IP: 210.75.211.10 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.bjjc.gov.cn | 219.141.234.230 |
SERVER IP: 219.141.234.230 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: WebSphere Application Server/5.1 |
www.bjjgj.gov.cn | 210.73.64.102 |
SERVER IP: 210.73.64.102 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.bjjtgl.gov.cn | 210.73.64.22 |
SERVER IP: 210.73.64.22 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.bjjtw.gov.cn | 210.75.211.147 |
SERVER IP: 210.75.211.147 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: WebLogic Server 8.1 SP3 Tue Jun 29 23:11:19 PDT 2004 404973 SERVER IP: 210.75.211.147 PORT/PROTOCOL: 80/tcp TYPE: NOTE The remote host is running the WebLogic web server. There is a flaw in it which allows an attacker to gain the NetBIOS host name of the remote host. Solution : NONE BID : 7257 SERVER IP: 210.75.211.147 PORT/PROTOCOL: 80/tcp TYPE: NOTE Synopsis : The remote host may give an attacker information useful for future attacks The remote host is running BEA Weblogic. This version of Weblogic is vulnerable to an information disclosure vulnerability. Specifically, failed logins yield information regarding authentication scheme, validity of userID, etc. CVSS Base Score : 2 AV:R/AC:L/Au:NR/C:P/I:N/A:N/B:N Solution : Upgrade to WebLogic 8.1.0 SP4 or newer CVE : CVE-2005-1380 BID : 13400, 12548 SERVER IP: 210.75.211.147 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of BEA WebLogic Server or WebLogic Express that is prone to multiple vulnerabilities. These flaws could lead to buffer overflows, denial of service, unauthorized access, cross-site scripting attacks, and information disclosure. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to WebLogic 8.1.0 SP5 or newer See also : http://dev2dev.bea.com/advisoriesnotifications CVE : CVE-2005-1380, CVE-2005-1742, CVE-2005-1743, CVE-2005-1744, CVE-2005-1745, CVE-2005-1746, CVE-2005-1747, CVE-2005-1748, CVE-2005-1749 BID : 12548, 13400, 13717, 13793, 13794, 14632, 14657 SERVER IP: 210.75.211.147 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a flaw which allows attackers to retrieve sensitive files The remote host is running a version of BEA WebLogic Server or WebLogic Express that is prone to a flaw in the way that it handles anonymous RMI connections. An attacker, exploiting this flaw, would be able to retrieve sensitive configuration files anonymously. Such information would undoubtedly aid the attacker in more sophisticated attacks. CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N Solution : Upgrade to WebLogic 8.1.0 SP6 or newer See also : http://dev2dev.bea.com/advisoriesnotifications CVE : CVE-2003-1290 BID : 16215 |
www.bjjtzf.gov.cn | 210.75.211.147 |
SERVER IP: 210.75.211.147 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: WebLogic Server 8.1 SP3 Tue Jun 29 23:11:19 PDT 2004 404973 SERVER IP: 210.75.211.147 PORT/PROTOCOL: 80/tcp TYPE: NOTE The remote host is running the WebLogic web server. There is a flaw in it which allows an attacker to gain the NetBIOS host name of the remote host. Solution : NONE BID : 7257 SERVER IP: 210.75.211.147 PORT/PROTOCOL: 80/tcp TYPE: NOTE Synopsis : The remote host may give an attacker information useful for future attacks The remote host is running BEA Weblogic. This version of Weblogic is vulnerable to an information disclosure vulnerability. Specifically, failed logins yield information regarding authentication scheme, validity of userID, etc. CVSS Base Score : 2 AV:R/AC:L/Au:NR/C:P/I:N/A:N/B:N Solution : Upgrade to WebLogic 8.1.0 SP4 or newer CVE : CVE-2005-1380 BID : 13400, 12548 SERVER IP: 210.75.211.147 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of BEA WebLogic Server or WebLogic Express that is prone to multiple vulnerabilities. These flaws could lead to buffer overflows, denial of service, unauthorized access, cross-site scripting attacks, and information disclosure. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to WebLogic 8.1.0 SP5 or newer See also : http://dev2dev.bea.com/advisoriesnotifications CVE : CVE-2005-1380, CVE-2005-1742, CVE-2005-1743, CVE-2005-1744, CVE-2005-1745, CVE-2005-1746, CVE-2005-1747, CVE-2005-1748, CVE-2005-1749 BID : 12548, 13400, 13717, 13793, 13794, 14632, 14657 SERVER IP: 210.75.211.147 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a flaw which allows attackers to retrieve sensitive files The remote host is running a version of BEA WebLogic Server or WebLogic Express that is prone to a flaw in the way that it handles anonymous RMI connections. An attacker, exploiting this flaw, would be able to retrieve sensitive configuration files anonymously. Such information would undoubtedly aid the attacker in more sophisticated attacks. CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N Solution : Upgrade to WebLogic 8.1.0 SP6 or newer See also : http://dev2dev.bea.com/advisoriesnotifications CVE : CVE-2003-1290 BID : 16215 |
www.bjlj.gov.cn | 210.73.64.43 |
SERVER IP: 210.73.64.43 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.bjmac.gov.cn | 210.73.71.108 |
SERVER IP: 210.73.71.108 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache-Coyote/1.1 |
www.bjmbc.gov.cn | 210.73.72.68 |
SERVER IP: 210.73.72.68 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache-Coyote/1.1 |
www.bjsys.gov.cn | 222.35.25.230 |
SERVER IP: 222.35.25.230 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.bjtax.gov.cn | 202.106.82.204 |
SERVER IP: 202.106.82.204 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/5.0 SERVER IP: 202.106.82.204 PORT/PROTOCOL: 80/tcp TYPE: NOTE The remote host is running the WebLogic web server. There is a flaw in it which allows an attacker to gain the NetBIOS host name of the remote host. Solution : NONE BID : 7257 SERVER IP: 202.106.82.204 PORT/PROTOCOL: 80/tcp TYPE: NOTE The remote host is running a Microsoft IIS webserver SERVER IP: 202.106.82.204 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running BEA Weblogic. Multiple undisclosed vulnerabilities have been reported in every versions of WebLogic up to and including 8.1.0 SP2. An attacker may exploit these issues to get unauthorized access or to gather information about the remote host. BEA Weblogic 8.1 Service Pack 3 addresses these vulnerabilities. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to WebLogic 8.1.0 SP3 or newer See also : http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/index.jsp CVE : CVE-2004-2320 BID : 9506, 11168 SERVER IP: 202.106.82.204 PORT/PROTOCOL: 80/tcp TYPE: NOTE Synopsis : The remote host may give an attacker information useful for future attacks The remote host is running BEA Weblogic. This version of Weblogic is vulnerable to an information disclosure vulnerability. Specifically, failed logins yield information regarding authentication scheme, validity of userID, etc. CVSS Base Score : 2 AV:R/AC:L/Au:NR/C:P/I:N/A:N/B:N Solution : Upgrade to WebLogic 8.1.0 SP4 or newer CVE : CVE-2005-1380 BID : 13400, 12548 SERVER IP: 202.106.82.204 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of BEA WebLogic Server or WebLogic Express that is prone to multiple vulnerabilities. These flaws could lead to buffer overflows, denial of service, unauthorized access, cross-site scripting attacks, and information disclosure. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to WebLogic 8.1.0 SP5 or newer See also : http://dev2dev.bea.com/advisoriesnotifications CVE : CVE-2005-1380, CVE-2005-1742, CVE-2005-1743, CVE-2005-1744, CVE-2005-1745, CVE-2005-1746, CVE-2005-1747, CVE-2005-1748, CVE-2005-1749 BID : 12548, 13400, 13717, 13793, 13794, 14632, 14657 SERVER IP: 202.106.82.204 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a flaw which allows attackers to retrieve sensitive files The remote host is running a version of BEA WebLogic Server or WebLogic Express that is prone to a flaw in the way that it handles anonymous RMI connections. An attacker, exploiting this flaw, would be able to retrieve sensitive configuration files anonymously. Such information would undoubtedly aid the attacker in more sophisticated attacks. CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N Solution : Upgrade to WebLogic 8.1.0 SP6 or newer See also : http://dev2dev.bea.com/advisoriesnotifications CVE : CVE-2003-1290 BID : 16215 SERVER IP: 202.106.82.204 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of BEA WebLogic Server which is vulnerable to eleven (11) distinct vulnerabilities. An attacker, exploiting these flaws, would be able to impact Availability, Confidentiality and Integrity. CVSS Base Score : 10.0 CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C Solution : Apply the relevant patches from BEA. See also : http://www.beasys.com/products/weblogic/index.html BID : 17982 |
www.bjtvet.gov.cn | 211.153.22.241 |
SERVER IP: 211.153.22.241 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.bjtzh.gov.cn | 218.246.87.8 |
SERVER IP: 218.246.87.8 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.bjtzzs.gov.cn | 218.107.216.61 |
SERVER IP: 218.107.216.61 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.bjwater.gov.cn | 210.73.64.54 |
SERVER IP: 210.73.64.54 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 |
www.bjys.gov.cn | 61.50.187.54 |
SERVER IP: 61.50.187.54 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache-Coyote/1.1 |
www.botou.gov.cn | 202.99.176.28 |
SERVER IP: 202.99.176.28 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.boye.gov.cn | 218.246.21.12 |
SERVER IP: 218.246.21.12 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.52 (Win32) PHP/4.3.10 SERVER IP: 218.246.21.12 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher. CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525 BID : 12963, 12962, 13143, 13163, 13164 SERVER IP: 218.246.21.12 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 218.246.21.12 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.bozhou.gov.cn | 218.23.173.118 |
SERVER IP: 218.23.173.118 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.bsw.gov.cn | 210.76.97.117 |
SERVER IP: 210.76.97.117 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.59 (Unix) mod_jk/1.2.21 |
www.caac.gov.cn | 218.247.19.3 |
SERVER IP: 218.247.19.3 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.caofeidian.gov.cn | 60.2.49.77 |
SERVER IP: 60.2.49.77 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.ccc.gov.cn | 219.153.125.225 |
SERVER IP: 219.153.125.225 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.ccga.gov.cn | 61.138.176.67 |
SERVER IP: 61.138.176.67 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache-Coyote/1.1 |
www.ccgs.gov.cn | 218.62.29.139 |
SERVER IP: 218.62.29.139 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.2.4 (Win32) DAV/2 mod_ssl/2.2.4 OpenSSL/0.9.8e mod_autoindex_color mod_python/3.3.1 Python/2.4.4 PHP/5.2.3 mod_jk/1.2.23 SVN/1.4.5 SERVER IP: 218.62.29.139 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806 BID : 25498 SERVER IP: 218.62.29.139 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 SERVER IP: 218.62.29.139 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
www.cchr.gov.cn | 218.91.253.71 |
SERVER IP: 218.91.253.71 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.ccm.gov.cn | 124.254.63.218 |
SERVER IP: 124.254.63.218 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.2.0 (Unix) PHP/5.1.6 SERVER IP: 124.254.63.218 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 124.254.63.218 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 SERVER IP: 124.254.63.218 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756 BID : 23359, 24089, 24259, 24261 SERVER IP: 124.254.63.218 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806 BID : 25498 SERVER IP: 124.254.63.218 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
www.ccnt.gov.cn | 202.96.62.67 |
SERVER IP: 202.96.62.67 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.ccpitzj.gov.cn | 59.60.147.228 |
SERVER IP: 59.60.147.228 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache SERVER IP: 59.60.147.228 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Script Injection attack The remote host is running a version of PHP which is older than 5.0.3 or 4.3.10. The remote version of this software is vulnerable to various security issues which may, under certain circumstances, allow attackers to execute arbitrary code on the remote host, provided that they can pass arbitrary data to some functions or bypass safe_mode. CVSS Base Score : 6 AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to PHP 5.0.3 or 4.3.10 CVE : CVE-2004-1018, CVE-2004-1019, CVE-2004-1020, CVE-2004-1063, CVE-2004-1064, CVE-2004-1065 BID : 11964, 11981, 11992, 12045 SERVER IP: 59.60.147.228 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher. CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525 BID : 12963, 12962, 13143, 13163, 13164 SERVER IP: 59.60.147.228 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 59.60.147.228 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.ccrs.gov.cn | 218.62.35.76 |
SERVER IP: 218.62.35.76 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.29 (Unix) PHP/4.3.4 SERVER IP: 218.62.35.76 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Script Injection attack The remote host is running a version of PHP which is older than 5.0.3 or 4.3.10. The remote version of this software is vulnerable to various security issues which may, under certain circumstances, allow attackers to execute arbitrary code on the remote host, provided that they can pass arbitrary data to some functions or bypass safe_mode. CVSS Base Score : 6 AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to PHP 5.0.3 or 4.3.10 CVE : CVE-2004-1018, CVE-2004-1019, CVE-2004-1020, CVE-2004-1063, CVE-2004-1064, CVE-2004-1065 BID : 11964, 11981, 11992, 12045 SERVER IP: 218.62.35.76 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher. CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525 BID : 12963, 12962, 13143, 13163, 13164 SERVER IP: 218.62.35.76 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 218.62.35.76 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.cddln.gov.cn | 203.207.195.81 |
SERVER IP: 203.207.195.81 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.59 (Unix) PHP/4.4.4 SERVER IP: 203.207.195.81 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 203.207.195.81 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.cdgs.gov.cn | 221.237.177.3 |
SERVER IP: 221.237.177.3 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.cdjg.gov.cn | 61.139.76.40 |
SERVER IP: 61.139.76.40 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.cdst.gov.cn | 61.157.78.34 |
SERVER IP: 61.157.78.34 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.cea.gov.cn | 210.72.96.25 |
SERVER IP: 210.72.96.25 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.realestate.cei.gov.cn | 203.207.226.100 |
SERVER IP: 203.207.226.100 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.ffs.cgs.gov.cn | 219.142.81.18 |
SERVER IP: 219.142.81.18 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.qimg.cgs.gov.cn | 219.142.81.14 |
SERVER IP: 219.142.81.14 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.xian.cgs.gov.cn | 219.144.130.60 |
SERVER IP: 219.144.130.60 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.54 (Win32) |
www.cheminfo.gov.cn | 168.160.250.68 |
SERVER IP: 168.160.250.68 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.chengbei.gov.cn | 125.72.92.28 |
SERVER IP: 125.72.92.28 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.chengyang.gov.cn | 221.215.126.130 |
SERVER IP: 221.215.126.130 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver SERVER IP: 221.215.126.130 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Script Injection attack The remote host is running a version of PHP which is older than 5.0.3 or 4.3.10. The remote version of this software is vulnerable to various security issues which may, under certain circumstances, allow attackers to execute arbitrary code on the remote host, provided that they can pass arbitrary data to some functions or bypass safe_mode. CVSS Base Score : 6 AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to PHP 5.0.3 or 4.3.10 CVE : CVE-2004-1018, CVE-2004-1019, CVE-2004-1020, CVE-2004-1063, CVE-2004-1064, CVE-2004-1065 BID : 11964, 11981, 11992, 12045 SERVER IP: 221.215.126.130 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher. CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525 BID : 12963, 12962, 13143, 13163, 13164 SERVER IP: 221.215.126.130 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 221.215.126.130 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.chibi.gov.cn | 219.138.167.137 |
SERVER IP: 219.138.167.137 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.china-language.gov.cn | 124.207.106.19 |
SERVER IP: 124.207.106.19 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.chinaenergy.gov.cn | 203.207.195.50 |
SERVER IP: 203.207.195.50 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.27 (Win32) PHP/4.3.3 SERVER IP: 203.207.195.50 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Script Injection attack The remote host is running a version of PHP which is older than 5.0.3 or 4.3.10. The remote version of this software is vulnerable to various security issues which may, under certain circumstances, allow attackers to execute arbitrary code on the remote host, provided that they can pass arbitrary data to some functions or bypass safe_mode. CVSS Base Score : 6 AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to PHP 5.0.3 or 4.3.10 CVE : CVE-2004-1018, CVE-2004-1019, CVE-2004-1020, CVE-2004-1063, CVE-2004-1064, CVE-2004-1065 BID : 11964, 11981, 11992, 12045 SERVER IP: 203.207.195.50 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher. CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525 BID : 12963, 12962, 13143, 13163, 13164 SERVER IP: 203.207.195.50 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 203.207.195.50 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.chinafx.gov.cn | 221.229.247.211 |
SERVER IP: 221.229.247.211 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.chinanet.gov.cn | 203.86.73.228 |
SERVER IP: 203.86.73.228 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.chinapesticide.gov.cn | 202.127.42.126 |
SERVER IP: 202.127.42.126 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.gscms.chinasafety.gov.cn | 221.7.38.199 |
SERVER IP: 221.7.38.199 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.chinawest.gov.cn | 203.207.120.249 |
SERVER IP: 203.207.120.249 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www1.chinawest.gov.cn | 203.207.120.249 |
SERVER IP: 203.207.120.249 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.chrm.gov.cn | 202.106.181.132 |
SERVER IP: 202.106.181.132 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.cigem.gov.cn | 219.142.70.132 |
SERVER IP: 219.142.70.132 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.cjw.gov.cn | 202.103.33.62 |
SERVER IP: 202.103.33.62 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.cla.gov.cn | 210.22.13.42 |
SERVER IP: 210.22.13.42 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.cmda.gov.cn | 218.246.34.107 |
SERVER IP: 218.246.34.107 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.cnan.gov.cn | 211.147.16.22 |
SERVER IP: 211.147.16.22 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.2.0 (Unix) PHP/5.1.1 |
www.cnci.gov.cn | 220.112.40.86 |
SERVER IP: 220.112.40.86 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.coc.gov.cn | 219.142.101.117 |
SERVER IP: 219.142.101.117 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.counsellor.gov.cn | 218.249.86.180 |
SERVER IP: 218.249.86.180 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 |
www.cpi.gov.cn | 159.226.218.1 |
SERVER IP: 159.226.218.1 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: OSU/3.0alpha3 |
www.cpm.gov.cn | 61.159.228.161 |
SERVER IP: 61.159.228.161 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.cppcc.gov.cn | 202.106.161.2 |
SERVER IP: 202.106.161.2 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.48 (Unix) |
www.cqaudit.gov.cn | 218.70.229.121 |
SERVER IP: 218.70.229.121 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.cqciq.gov.cn | 219.153.22.53 |
SERVER IP: 219.153.22.53 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.cqcrtv.gov.cn | 123.100.2.120 |
SERVER IP: 123.100.2.120 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: WebLogic Server 8.1 SP2 Fri Dec 5 15:01:51 PST 2003 316284 SERVER IP: 123.100.2.120 PORT/PROTOCOL: 80/tcp TYPE: NOTE The remote host is running the WebLogic web server. There is a flaw in it which allows an attacker to gain the NetBIOS host name of the remote host. Solution : NONE BID : 7257 SERVER IP: 123.100.2.120 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running BEA Weblogic. Multiple undisclosed vulnerabilities have been reported in every versions of WebLogic up to and including 8.1.0 SP2. An attacker may exploit these issues to get unauthorized access or to gather information about the remote host. BEA Weblogic 8.1 Service Pack 3 addresses these vulnerabilities. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to WebLogic 8.1.0 SP3 or newer See also : http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/index.jsp CVE : CVE-2004-2320 BID : 9506, 11168 SERVER IP: 123.100.2.120 PORT/PROTOCOL: 80/tcp TYPE: NOTE Synopsis : The remote host may give an attacker information useful for future attacks The remote host is running BEA Weblogic. This version of Weblogic is vulnerable to an information disclosure vulnerability. Specifically, failed logins yield information regarding authentication scheme, validity of userID, etc. CVSS Base Score : 2 AV:R/AC:L/Au:NR/C:P/I:N/A:N/B:N Solution : Upgrade to WebLogic 8.1.0 SP4 or newer CVE : CVE-2005-1380 BID : 13400, 12548 SERVER IP: 123.100.2.120 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of BEA WebLogic Server or WebLogic Express that is prone to multiple vulnerabilities. These flaws could lead to buffer overflows, denial of service, unauthorized access, cross-site scripting attacks, and information disclosure. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to WebLogic 8.1.0 SP5 or newer See also : http://dev2dev.bea.com/advisoriesnotifications CVE : CVE-2005-1380, CVE-2005-1742, CVE-2005-1743, CVE-2005-1744, CVE-2005-1745, CVE-2005-1746, CVE-2005-1747, CVE-2005-1748, CVE-2005-1749 BID : 12548, 13400, 13717, 13793, 13794, 14632, 14657 SERVER IP: 123.100.2.120 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a flaw which allows attackers to retrieve sensitive files The remote host is running a version of BEA WebLogic Server or WebLogic Express that is prone to a flaw in the way that it handles anonymous RMI connections. An attacker, exploiting this flaw, would be able to retrieve sensitive configuration files anonymously. Such information would undoubtedly aid the attacker in more sophisticated attacks. CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N Solution : Upgrade to WebLogic 8.1.0 SP6 or newer See also : http://dev2dev.bea.com/advisoriesnotifications CVE : CVE-2003-1290 BID : 16215 SERVER IP: 123.100.2.120 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of BEA WebLogic Server which is vulnerable to eleven (11) distinct vulnerabilities. An attacker, exploiting these flaws, would be able to impact Availability, Confidentiality and Integrity. CVSS Base Score : 10.0 CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C Solution : Apply the relevant patches from BEA. See also : http://www.beasys.com/products/weblogic/index.html BID : 17982 |
www.cqda.gov.cn | 202.98.57.18 |
SERVER IP: 202.98.57.18 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Enhydra-MultiServer/3.1 |
www.cqjgdj.gov.cn | 219.153.2.20 |
SERVER IP: 219.153.2.20 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.cqjt.gov.cn | 61.242.253.212 |
SERVER IP: 61.242.253.212 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.cqlottery.gov.cn | 61.129.33.140 |
SERVER IP: 61.129.33.140 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.cqmj.gov.cn | 61.186.169.169 |
SERVER IP: 61.186.169.169 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.cqrk.gov.cn | 219.153.37.30 |
SERVER IP: 219.153.37.30 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.cqtj.gov.cn | 222.177.15.8 |
SERVER IP: 222.177.15.8 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.csh.gov.cn | 202.103.114.7 |
SERVER IP: 202.103.114.7 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.ctei.gov.cn | 210.51.7.120 |
SERVER IP: 210.51.7.120 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.customs.gov.cn | 202.127.48.35 |
SERVER IP: 202.127.48.35 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 |
www.cxs.gov.cn | 220.165.143.54 |
SERVER IP: 220.165.143.54 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.czrs.gov.cn | 61.132.90.156 |
SERVER IP: 61.132.90.156 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.daan.gov.cn | 60.28.246.92 |
SERVER IP: 60.28.246.92 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.dandong.gov.cn | 59.45.63.187 |
SERVER IP: 59.45.63.187 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Lotus-Domino |
www.dctq.gov.cn | 218.244.152.30 |
SERVER IP: 218.244.152.30 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.dezhou.gov.cn | 222.133.32.2 |
SERVER IP: 222.133.32.2 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.dfxj.gov.cn | 61.129.89.144 |
SERVER IP: 61.129.89.144 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.dhl.gov.cn | 61.166.100.2 |
SERVER IP: 61.166.100.2 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.dhly.gov.cn | 59.60.59.34 |
SERVER IP: 59.60.59.34 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.gzw.dl.gov.cn | 202.142.21.213 |
SERVER IP: 202.142.21.213 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver SERVER IP: 202.142.21.213 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 202.142.21.213 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.dlhitech.gov.cn | 61.232.165.131 |
SERVER IP: 61.232.165.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache-Coyote/1.1 |
www.dlpld.gov.cn | 218.25.162.55 |
SERVER IP: 218.25.162.55 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Resin/2.1.17 |
www.dlzh.gov.cn | 218.25.162.75 |
SERVER IP: 218.25.162.75 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Resin/2.1.17 |
www.dongfeng.gov.cn | 218.62.56.114 |
SERVER IP: 218.62.56.114 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.dongning.gov.cn | 221.206.179.23 |
SERVER IP: 221.206.179.23 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.dtzc.gov.cn | 168.160.200.6 |
SERVER IP: 168.160.200.6 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.dxad.gov.cn | 218.246.95.219 |
SERVER IP: 218.246.95.219 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.dxic.gov.cn | 218.246.95.232 |
SERVER IP: 218.246.95.232 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.dyhb.gov.cn | 218.6.146.98 |
SERVER IP: 218.6.146.98 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.dyrc.gov.cn | 61.153.35.181 |
SERVER IP: 61.153.35.181 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.dz.gov.cn | 222.133.32.2 |
SERVER IP: 222.133.32.2 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.emc.gov.cn | 202.106.190.8 |
SERVER IP: 202.106.190.8 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.envir.gov.cn | 202.96.215.249 |
SERVER IP: 202.96.215.249 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.expo2006sy.gov.cn | 218.25.42.212 |
SERVER IP: 218.25.42.212 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.fdc.gov.cn | 218.86.36.207 |
SERVER IP: 218.86.36.207 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.fish.gov.cn | 122.200.64.41 |
SERVER IP: 122.200.64.41 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.fj.gov.cn | 218.85.73.162 |
SERVER IP: 218.85.73.162 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.2.4 (Unix) |
www.fjax.gov.cn | 222.76.216.105 |
SERVER IP: 222.76.216.105 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.fjinfo.gov.cn | 59.56.176.110 |
SERVER IP: 59.56.176.110 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.fjipo.gov.cn | 218.104.235.58 |
SERVER IP: 218.104.235.58 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.fjjc.gov.cn | 218.66.59.238 |
SERVER IP: 218.66.59.238 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.fjkjt.gov.cn | 59.56.176.110 |
SERVER IP: 59.56.176.110 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.fjlss.gov.cn | 222.77.185.196 |
SERVER IP: 222.77.185.196 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.fjsp.gov.cn | 218.66.59.58 |
SERVER IP: 218.66.59.58 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.fohb.gov.cn | 58.49.59.191 |
SERVER IP: 58.49.59.191 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.forestry.gov.cn | 202.99.63.178 |
SERVER IP: 202.99.63.178 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.fsfao.gov.cn | 202.105.12.250 |
SERVER IP: 202.105.12.250 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.fsi.gov.cn | 219.238.178.39 |
SERVER IP: 219.238.178.39 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.fsjyzx.gov.cn | 61.145.71.155 |
SERVER IP: 61.145.71.155 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/5.0 |
www.fsxxb.gov.cn | 219.130.221.37 |
SERVER IP: 219.130.221.37 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.2.4 (Win32) |
www.fujian.gov.cn | 218.85.73.162 |
SERVER IP: 218.85.73.162 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.2.4 (Unix) |
www.fzedu.gov.cn | 211.143.182.168 |
SERVER IP: 211.143.182.168 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.gaoming.gov.cn | 61.145.75.122 |
SERVER IP: 61.145.75.122 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.gaozhou.gov.cn | 218.30.96.106 |
SERVER IP: 218.30.96.106 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.tyj.gd.gov.cn | 210.76.65.113 |
SERVER IP: 210.76.65.113 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.gdcct.gov.cn | 121.33.248.22 |
SERVER IP: 121.33.248.22 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.2.2 (Unix) DAV/2 mod_jk/1.2.23 |
www.gdcx.gov.cn | 58.62.172.126 |
SERVER IP: 58.62.172.126 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.gddoftec.gov.cn | 211.155.27.140 |
SERVER IP: 211.155.27.140 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/5.0 |
www.gdltax.gov.cn | 61.140.99.120 |
SERVER IP: 61.140.99.120 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
www.gdnet110.gov.cn | 210.76.65.131 |
SERVER IP: 210.76.65.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
www.gdwater.gov.cn | 58.248.46.23 |
SERVER IP: 58.248.46.23 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache-Coyote/1.1 |
www.greenhr.gov.cn | 202.99.63.184 |
SERVER IP: 202.99.63.184 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.gsjt.gov.cn | 61.178.108.25 |
SERVER IP: 61.178.108.25 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.gszl.gov.cn | 61.178.20.212 |
SERVER IP: 61.178.20.212 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.53 (Unix) PHP/4.3.9 mod_jk2/2.0.4 SERVER IP: 61.178.20.212 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Script Injection attack The remote host is running a version of PHP which is older than 5.0.3 or 4.3.10. The remote version of this software is vulnerable to various security issues which may, under certain circumstances, allow attackers to execute arbitrary code on the remote host, provided that they can pass arbitrary data to some functions or bypass safe_mode. CVSS Base Score : 6 AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to PHP 5.0.3 or 4.3.10 CVE : CVE-2004-1018, CVE-2004-1019, CVE-2004-1020, CVE-2004-1063, CVE-2004-1064, CVE-2004-1065 BID : 11964, 11981, 11992, 12045 SERVER IP: 61.178.20.212 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher. CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525 BID : 12963, 12962, 13143, 13163, 13164 SERVER IP: 61.178.20.212 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 61.178.20.212 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.guiyang.gov.cn | 211.156.140.164 |
SERVER IP: 211.156.140.164 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.gxdx.gov.cn | 219.159.82.129 |
SERVER IP: 219.159.82.129 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.gxit.gov.cn | 211.97.71.109 |
SERVER IP: 211.97.71.109 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.gxmzt.gov.cn | 219.159.69.131 |
SERVER IP: 219.159.69.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.53 (Win32) PHP/4.3.10 SERVER IP: 219.159.69.131 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher. CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525 BID : 12963, 12962, 13143, 13163, 13164 SERVER IP: 219.159.69.131 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 219.159.69.131 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.gxrs.gov.cn | 219.159.68.91 |
SERVER IP: 219.159.68.91 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.gxtj.gov.cn | 210.72.34.8 |
SERVER IP: 210.72.34.8 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.gygov.gov.cn | 219.141.18.13 |
SERVER IP: 219.141.18.13 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 |
www.gzaj.gov.cn | 220.197.208.170 |
SERVER IP: 220.197.208.170 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.gzepb.gov.cn | 210.72.1.33 |
SERVER IP: 210.72.1.33 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.gzgs.gov.cn | 222.85.128.176 |
SERVER IP: 222.85.128.176 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.59 (Unix) PHP/4.4.4 SERVER IP: 222.85.128.176 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 222.85.128.176 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.gzjj.gov.cn | 59.60.21.229 |
SERVER IP: 59.60.21.229 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.gzkj.gov.cn | 210.72.3.203 |
SERVER IP: 210.72.3.203 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.54 (Unix) mod_jk/1.2.13 |
www.gzpf.gov.cn | 59.41.8.142 |
SERVER IP: 59.41.8.142 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.54 (Debian GNU/Linux) PHP/4.3.10-9 SERVER IP: 59.41.8.142 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher. CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525 BID : 12963, 12962, 13143, 13163, 13164 SERVER IP: 59.41.8.142 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 59.41.8.142 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.gzpi.gov.cn | 59.41.8.110 |
SERVER IP: 59.41.8.110 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.gzrc.gov.cn | 61.145.164.239 |
SERVER IP: 61.145.164.239 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.gzsj.gov.cn | 219.151.1.37 |
SERVER IP: 219.151.1.37 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.gzsjyt.gov.cn | 221.13.4.88 |
SERVER IP: 221.13.4.88 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver SERVER IP: 221.13.4.88 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Script Injection attack The remote host is running a version of PHP which is older than 5.0.3 or 4.3.10. The remote version of this software is vulnerable to various security issues which may, under certain circumstances, allow attackers to execute arbitrary code on the remote host, provided that they can pass arbitrary data to some functions or bypass safe_mode. CVSS Base Score : 6 AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to PHP 5.0.3 or 4.3.10 CVE : CVE-2004-1018, CVE-2004-1019, CVE-2004-1020, CVE-2004-1063, CVE-2004-1064, CVE-2004-1065 BID : 11964, 11981, 11992, 12045 SERVER IP: 221.13.4.88 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher. CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525 BID : 12963, 12962, 13143, 13163, 13164 SERVER IP: 221.13.4.88 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 221.13.4.88 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.gzsmzt.gov.cn | 222.191.251.6 |
SERVER IP: 222.191.251.6 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.33 (Unix) mod_throttle/3.1.2 SERVER IP: 222.191.251.6 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 222.191.251.6 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.gzszx.gov.cn | 61.139.126.37 |
SERVER IP: 61.139.126.37 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.gztongzi.gov.cn | 202.98.223.70 |
SERVER IP: 202.98.223.70 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.gzwaishi.gov.cn | 210.72.1.10 |
SERVER IP: 210.72.1.10 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: squid/2.5.STABLE5 |
www.hailar.gov.cn | 60.31.214.153 |
SERVER IP: 60.31.214.153 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.harczx.gov.cn | 218.2.20.138 |
SERVER IP: 218.2.20.138 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.hbagri.gov.cn | 58.49.103.227 |
SERVER IP: 58.49.103.227 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.hbdofcom.gov.cn | 219.140.77.58 |
SERVER IP: 219.140.77.58 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache-Coyote/1.1 |
www.hbdrc.gov.cn | 121.28.129.67 |
SERVER IP: 121.28.129.67 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache-Coyote/1.1 |
www.hbhrc.gov.cn | 60.29.62.20 |
SERVER IP: 60.29.62.20 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.55 (Unix) PHP/5.0.5 SERVER IP: 60.29.62.20 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host may give an attacker information useful for future attacks The remote host is running a version of PHP which is older than 5.0.6. This version has a flaw wherein remote attackers can reenable the 'register_globals' parameter. In addition, a remote attacker may be able to overwrite the 'GLOBAL' variable. This may lead to another, more serious, exploitation. CVSS Base Score : 9.3 CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C Solution : Upgrade to PHP 5.0.6 or later See also : http://www.php.net/release_4_4_1.php CVE : CVE-2006-0395, CVE-2005-2713, CVE-2005-2714, CVE-2005-3319, CVE-2005-3353, CVE-2005-3389, CVE-2005-3706, CVE-2005-3712, CVE-2005-4217, CVE-2005-4504, CVE-2006-0383, CVE-2006-0384, CVE-2006-0386, CVE-2006-0387, CVE-2006-0388, CVE-2006-0389, CVE-2006-0391, CVE-2006-3016, CVE-2006-3018, CVE-2005-3883, CVE-2006-3017, CVE-2005-3390, CVE-2005-3392, CVE-2005-3391 BID : 15571, 16907, 17843, 15249, 15411, 15413, 15250 SERVER IP: 60.29.62.20 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 60.29.62.20 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 SERVER IP: 60.29.62.20 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756 BID : 23359, 24089, 24259, 24261 SERVER IP: 60.29.62.20 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806 BID : 25498 SERVER IP: 60.29.62.20 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
www.hbinnofund.gov.cn | 210.51.174.105 |
SERVER IP: 210.51.174.105 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.hbipo.gov.cn | 59.39.59.59 |
SERVER IP: 59.39.59.59 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.hblr.gov.cn | 220.202.12.150 |
SERVER IP: 220.202.12.150 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.hbmyjj.gov.cn | 61.55.138.196 |
SERVER IP: 61.55.138.196 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.hbwmw.gov.cn | 202.103.41.60 |
SERVER IP: 202.103.41.60 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.33 (Unix) PHP/4.1.2 SERVER IP: 202.103.41.60 PORT/PROTOCOL: 80/tcp TYPE: INFO The remote web server is running a version of PHP which is older than 4.2.2. This version has a bug in its mail() function which does not properly sanitize user input. As a result, users can forge email to make it look like it is coming from a different source that the server. Solution : Upgrade to PHP 4.2.2 CVE : CVE-2002-0986, CVE-2002-0985 BID : 5562 SERVER IP: 202.103.41.60 PORT/PROTOCOL: 80/tcp TYPE: NOTE The remote host is running a version of PHP which is older than 4.3.2. This version contains various flaws that may allow an attacker who has the ability to execute PHP scripts in safe_mode on this host to execute arbitrary commands with the privileges of the HTTP daemon Solution : Upgrade to PHP 4.3.2 CVE : CVE-2003-0166 BID : 7256, 7259, 7187, 7197, 7198, 7199, 7210 SERVER IP: 202.103.41.60 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Script Injection attack The remote host is running a version of PHP which is older than 5.0.3 or 4.3.10. The remote version of this software is vulnerable to various security issues which may, under certain circumstances, allow attackers to execute arbitrary code on the remote host, provided that they can pass arbitrary data to some functions or bypass safe_mode. CVSS Base Score : 6 AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to PHP 5.0.3 or 4.3.10 CVE : CVE-2004-1018, CVE-2004-1019, CVE-2004-1020, CVE-2004-1063, CVE-2004-1064, CVE-2004-1065 BID : 11964, 11981, 11992, 12045 SERVER IP: 202.103.41.60 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher. CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525 BID : 12963, 12962, 13143, 13163, 13164 SERVER IP: 202.103.41.60 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 202.103.41.60 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.hbzx.gov.cn | 202.103.25.20 |
SERVER IP: 202.103.25.20 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 |
www.hddjbaic.gov.cn | 219.235.241.176 |
SERVER IP: 219.235.241.176 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache-Coyote/1.1 |
www.hdlsj.gov.cn | 218.30.96.26 |
SERVER IP: 218.30.96.26 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.hdwj.gov.cn | 218.244.130.219 |
SERVER IP: 218.244.130.219 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 |
www.hebei.gov.cn | 124.239.194.1 |
SERVER IP: 124.239.194.1 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache-Coyote/1.1 |
www.hebi.gov.cn | 202.102.234.198 |
SERVER IP: 202.102.234.198 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.heihe.gov.cn | 221.208.80.72 |
SERVER IP: 221.208.80.72 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.henanqx.gov.cn | 218.28.7.252 |
SERVER IP: 218.28.7.252 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache-Coyote/1.1 |
www.hengyang.gov.cn | 59.51.9.101 |
SERVER IP: 59.51.9.101 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 |
www.hetz.gov.cn | 61.135.203.10 |
SERVER IP: 61.135.203.10 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Resin/2.1.17 |
www.hfboftec.gov.cn | 61.133.142.59 |
SERVER IP: 61.133.142.59 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Resin/2.1.10 |
www.hfsghj.gov.cn | 61.133.142.32 |
SERVER IP: 61.133.142.32 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.hiciq.gov.cn | 202.100.210.251 |
SERVER IP: 202.100.210.251 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.hicourt.gov.cn | 218.77.128.138 |
SERVER IP: 218.77.128.138 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.hljcdm.gov.cn | 210.76.36.128 |
SERVER IP: 210.76.36.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.hljdx.gov.cn | 61.167.250.2 |
SERVER IP: 61.167.250.2 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.hljjs.gov.cn | 218.10.65.247 |
SERVER IP: 218.10.65.247 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.hljmj.gov.cn | 221.208.194.103 |
SERVER IP: 221.208.194.103 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.hljwst.gov.cn | 221.212.125.14 |
SERVER IP: 221.212.125.14 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache-Coyote/1.1 |
www.hnciq.gov.cn | 222.240.198.20 |
SERVER IP: 222.240.198.20 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.54 (Unix) mod_ssl/2.0.54 OpenSSL/0.9.7e DAV/2 PHP/5.2.0 mod_perl/2.0.1 Perl/v5.8.7 SERVER IP: 222.240.198.20 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 222.240.198.20 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 222.240.198.20 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 SERVER IP: 222.240.198.20 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756 BID : 23359, 24089, 24259, 24261 SERVER IP: 222.240.198.20 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806 BID : 25498 SERVER IP: 222.240.198.20 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 SERVER IP: 222.240.198.20 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
www.hncredit.gov.cn | 222.240.162.174 |
SERVER IP: 222.240.162.174 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.hndrc.gov.cn | 222.143.24.198 |
SERVER IP: 222.143.24.198 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.2.3 (Red Hat) |
www.hninfo.gov.cn | 61.187.87.37 |
SERVER IP: 61.187.87.37 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.hnjt.gov.cn | 222.240.223.194 |
SERVER IP: 222.240.223.194 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.hnjy.gov.cn | 218.77.186.138 |
SERVER IP: 218.77.186.138 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.hnleader.gov.cn | 202.103.67.176 |
SERVER IP: 202.103.67.176 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.hnly.gov.cn | 218.28.141.173 |
SERVER IP: 218.28.141.173 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.55 (Win32) mod_jk2/2.0.4 |
www.hnmtdz.gov.cn | 125.46.104.166 |
SERVER IP: 125.46.104.166 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.hnt.gov.cn | 61.187.88.247 |
SERVER IP: 61.187.88.247 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.hntj.gov.cn | 222.240.156.30 |
SERVER IP: 222.240.156.30 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.hnwqb.gov.cn | 220.181.45.116 |
SERVER IP: 220.181.45.116 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.hnyr.gov.cn | 218.28.13.90 |
SERVER IP: 218.28.13.90 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: WebLogic Server 8.1 SP3 Tue Jun 29 23:11:19 PDT 2004 404973 SERVER IP: 218.28.13.90 PORT/PROTOCOL: 80/tcp TYPE: NOTE The remote host is running the WebLogic web server. There is a flaw in it which allows an attacker to gain the NetBIOS host name of the remote host. Solution : NONE BID : 7257 SERVER IP: 218.28.13.90 PORT/PROTOCOL: 80/tcp TYPE: NOTE Synopsis : The remote host may give an attacker information useful for future attacks The remote host is running BEA Weblogic. This version of Weblogic is vulnerable to an information disclosure vulnerability. Specifically, failed logins yield information regarding authentication scheme, validity of userID, etc. CVSS Base Score : 2 AV:R/AC:L/Au:NR/C:P/I:N/A:N/B:N Solution : Upgrade to WebLogic 8.1.0 SP4 or newer CVE : CVE-2005-1380 BID : 13400, 12548 SERVER IP: 218.28.13.90 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of BEA WebLogic Server or WebLogic Express that is prone to multiple vulnerabilities. These flaws could lead to buffer overflows, denial of service, unauthorized access, cross-site scripting attacks, and information disclosure. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to WebLogic 8.1.0 SP5 or newer See also : http://dev2dev.bea.com/advisoriesnotifications CVE : CVE-2005-1380, CVE-2005-1742, CVE-2005-1743, CVE-2005-1744, CVE-2005-1745, CVE-2005-1746, CVE-2005-1747, CVE-2005-1748, CVE-2005-1749 BID : 12548, 13400, 13717, 13793, 13794, 14632, 14657 SERVER IP: 218.28.13.90 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a flaw which allows attackers to retrieve sensitive files The remote host is running a version of BEA WebLogic Server or WebLogic Express that is prone to a flaw in the way that it handles anonymous RMI connections. An attacker, exploiting this flaw, would be able to retrieve sensitive configuration files anonymously. Such information would undoubtedly aid the attacker in more sophisticated attacks. CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N Solution : Upgrade to WebLogic 8.1.0 SP6 or newer See also : http://dev2dev.bea.com/advisoriesnotifications CVE : CVE-2003-1290 BID : 16215 |
www.hrbgaj.gov.cn | 61.158.105.69 |
SERVER IP: 61.158.105.69 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.46 (Red Hat) SERVER IP: 61.158.105.69 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Script Injection attack The remote host is running a version of PHP which is older than 5.0.3 or 4.3.10. The remote version of this software is vulnerable to various security issues which may, under certain circumstances, allow attackers to execute arbitrary code on the remote host, provided that they can pass arbitrary data to some functions or bypass safe_mode. CVSS Base Score : 6 AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to PHP 5.0.3 or 4.3.10 CVE : CVE-2004-1018, CVE-2004-1019, CVE-2004-1020, CVE-2004-1063, CVE-2004-1064, CVE-2004-1065 BID : 11964, 11981, 11992, 12045 SERVER IP: 61.158.105.69 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher. CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525 BID : 12963, 12962, 13143, 13163, 13164 SERVER IP: 61.158.105.69 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 61.158.105.69 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.hrbgzw.gov.cn | 221.208.168.54 |
SERVER IP: 221.208.168.54 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.hslib.gov.cn | 61.184.107.113 |
SERVER IP: 61.184.107.113 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.hsq.gov.cn | 218.22.219.100 |
SERVER IP: 218.22.219.100 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.huaibei.gov.cn | 218.22.238.59 |
SERVER IP: 218.22.238.59 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Hodesoft Corp. PHP/4.3.4 SERVER IP: 218.22.238.59 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Script Injection attack The remote host is running a version of PHP which is older than 5.0.3 or 4.3.10. The remote version of this software is vulnerable to various security issues which may, under certain circumstances, allow attackers to execute arbitrary code on the remote host, provided that they can pass arbitrary data to some functions or bypass safe_mode. CVSS Base Score : 6 AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to PHP 5.0.3 or 4.3.10 CVE : CVE-2004-1018, CVE-2004-1019, CVE-2004-1020, CVE-2004-1063, CVE-2004-1064, CVE-2004-1065 BID : 11964, 11981, 11992, 12045 SERVER IP: 218.22.238.59 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher. CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525 BID : 12963, 12962, 13143, 13163, 13164 SERVER IP: 218.22.238.59 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 218.22.238.59 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.huainan.gov.cn | 220.248.236.34 |
SERVER IP: 220.248.236.34 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache-Coyote/1.1 |
www.huaiyin.gov.cn | 218.57.143.198 |
SERVER IP: 218.57.143.198 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.huantai.gov.cn | 60.210.98.43 |
SERVER IP: 60.210.98.43 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.hubei.gov.cn | 219.140.171.55 |
SERVER IP: 219.140.171.55 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.hubeiwater.gov.cn | 219.140.162.172 |
SERVER IP: 219.140.162.172 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.huizhou.gov.cn | 59.33.252.229 |
SERVER IP: 59.33.252.229 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache-Coyote/1.1 |
www.hunan.gov.cn | 202.103.114.9 |
SERVER IP: 202.103.114.9 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.hunangrain.gov.cn | 202.103.114.10 |
SERVER IP: 202.103.114.10 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.huoqiu.gov.cn | 220.178.18.20 |
SERVER IP: 220.178.18.20 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.hydroinfo.gov.cn | 219.142.62.9 |
SERVER IP: 219.142.62.9 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.hzsj.gov.cn | 218.108.116.12 |
SERVER IP: 218.108.116.12 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.info.gov.cn | 221.6.180.105 |
SERVER IP: 221.6.180.105 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.infobase.gov.cn | 218.57.8.16 |
SERVER IP: 218.57.8.16 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.ivdc.gov.cn | 222.35.47.70 |
SERVER IP: 222.35.47.70 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.jgjy.gov.cn | 218.92.11.3 |
SERVER IP: 218.92.11.3 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.jiangxi.gov.cn | 218.87.20.8 |
SERVER IP: 218.87.20.8 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.jiaozhou.gov.cn | 218.58.54.13 |
SERVER IP: 218.58.54.13 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.jiexi.gov.cn | 61.143.153.234 |
SERVER IP: 61.143.153.234 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache-Coyote/1.1 |
www.jingshan.gov.cn | 219.138.120.147 |
SERVER IP: 219.138.120.147 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.jiyuan.gov.cn | 222.140.112.26 |
SERVER IP: 222.140.112.26 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.jlagri.gov.cn | 61.138.179.12 |
SERVER IP: 61.138.179.12 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.jlds.gov.cn | 202.111.165.224 |
SERVER IP: 202.111.165.224 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache-Coyote/1.1 |
www.jlfiw.gov.cn | 218.62.27.52 |
SERVER IP: 218.62.27.52 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache-Coyote/1.1 |
www.jlqx.gov.cn | 218.62.26.196 |
SERVER IP: 218.62.26.196 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: mod_tamper_detect 1.0.2 Apache/2.0.54 (Unix) DAV/2 |
www.jlsafety.gov.cn | 221.8.56.235 |
SERVER IP: 221.8.56.235 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.jlscy.gov.cn | 218.62.65.194 |
SERVER IP: 218.62.65.194 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.jlthx.gov.cn | 218.27.180.111 |
SERVER IP: 218.27.180.111 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.jlws.gov.cn | 202.111.165.247 |
SERVER IP: 202.111.165.247 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache-Coyote/1.1 |
www.jndz.gov.cn | 61.132.59.46 |
SERVER IP: 61.132.59.46 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache-Coyote/1.1 |
www.jscz.gov.cn | 218.94.38.179 |
SERVER IP: 218.94.38.179 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.59 (Unix) DAV/2 PHP/4.4.4 SERVER IP: 218.94.38.179 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 218.94.38.179 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.jsga.gov.cn | 218.94.123.23 |
SERVER IP: 218.94.123.23 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.2.4 (Win32) mod_jk/1.2.25 |
www.jsinfo.gov.cn | 210.73.128.41 |
SERVER IP: 210.73.128.41 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.jswater.gov.cn | 218.94.6.91 |
SERVER IP: 218.94.6.91 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.jszx.gov.cn | 218.94.0.9 |
SERVER IP: 218.94.0.9 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.27 (Unix) (Red-Hat/Linux) mod_jk2/2.0.0 mod_ssl/2.8.12 OpenSSL/0.9.6b DAV/1.0.3 PHP/4.1.2 mod_perl/1.26 |
www.jxciq.gov.cn | 218.65.86.7 |
SERVER IP: 218.65.86.7 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.jxdaj.gov.cn | 218.87.32.249 |
SERVER IP: 218.87.32.249 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.jxdii.gov.cn | 218.87.32.235 |
SERVER IP: 218.87.32.235 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.jxf.gov.cn | 218.65.89.131 |
SERVER IP: 218.65.89.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver SERVER IP: 218.65.89.131 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 218.65.89.131 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.jxgc.gov.cn | 202.101.234.201 |
SERVER IP: 202.101.234.201 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.jxgrain.gov.cn | 218.87.20.10 |
SERVER IP: 218.87.20.10 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.jxjst.gov.cn | 59.52.254.108 |
SERVER IP: 59.52.254.108 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.33 (Win32) PHP/4.3.11 |
www.jxmg.gov.cn | 60.195.250.153 |
SERVER IP: 60.195.250.153 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.jxmie.gov.cn | 218.64.59.106 |
SERVER IP: 218.64.59.106 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.jxsp.gov.cn | 202.108.124.170 |
SERVER IP: 202.108.124.170 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.jxsq.gov.cn | 59.53.50.168 |
SERVER IP: 59.53.50.168 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.jxwrd.gov.cn | 218.204.130.109 |
SERVER IP: 218.204.130.109 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache-Coyote/1.1 |
www.jxyf.gov.cn | 61.180.25.58 |
SERVER IP: 61.180.25.58 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.jxzfw.gov.cn | 220.175.8.6 |
SERVER IP: 220.175.8.6 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.jz.gov.cn | 60.21.221.46 |
SERVER IP: 60.21.221.46 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.55 (Win32) PHP/4.4.4 |
www.kepz.gov.cn | 221.224.22.196 |
SERVER IP: 221.224.22.196 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.km.gov.cn | 222.221.252.217 |
SERVER IP: 222.221.252.217 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.kmcgfda.gov.cn | 117.25.130.140 |
SERVER IP: 117.25.130.140 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.medgen.labs.gov.cn | 61.139.126.18 |
SERVER IP: 61.139.126.18 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.laipo.gov.cn | 211.155.23.248 |
SERVER IP: 211.155.23.248 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.52 (Red Hat) |
www.landscape.gov.cn | 61.152.93.61 |
SERVER IP: 61.152.93.61 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.lasa.gov.cn | 221.13.64.228 |
SERVER IP: 221.13.64.228 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.33 (Win32) mod_gzip/1.3.26.1a PHP/4.3.10 SERVER IP: 221.13.64.228 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher. CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525 BID : 12963, 12962, 13143, 13163, 13164 SERVER IP: 221.13.64.228 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 221.13.64.228 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.laty.gov.cn | 220.180.15.76 |
SERVER IP: 220.180.15.76 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.lf.gov.cn | 60.10.19.136 |
SERVER IP: 60.10.19.136 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.lijiang.gov.cn | 61.166.7.153 |
SERVER IP: 61.166.7.153 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/5.0 |
www.linfen.gov.cn | 60.28.239.26 |
SERVER IP: 60.28.239.26 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.linqing.gov.cn | 219.146.220.188 |
SERVER IP: 219.146.220.188 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.40 (Red Hat Linux) SERVER IP: 219.146.220.188 PORT/PROTOCOL: 80/tcp TYPE: NOTE The remote host is running a version of PHP which is older than 4.3.2. This version contains various flaws that may allow an attacker who has the ability to execute PHP scripts in safe_mode on this host to execute arbitrary commands with the privileges of the HTTP daemon Solution : Upgrade to PHP 4.3.2 CVE : CVE-2003-0166 BID : 7256, 7259, 7187, 7197, 7198, 7199, 7210 SERVER IP: 219.146.220.188 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Script Injection attack The remote host is running a version of PHP which is older than 5.0.3 or 4.3.10. The remote version of this software is vulnerable to various security issues which may, under certain circumstances, allow attackers to execute arbitrary code on the remote host, provided that they can pass arbitrary data to some functions or bypass safe_mode. CVSS Base Score : 6 AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to PHP 5.0.3 or 4.3.10 CVE : CVE-2004-1018, CVE-2004-1019, CVE-2004-1020, CVE-2004-1063, CVE-2004-1064, CVE-2004-1065 BID : 11964, 11981, 11992, 12045 SERVER IP: 219.146.220.188 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher. CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525 BID : 12963, 12962, 13143, 13163, 13164 SERVER IP: 219.146.220.188 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 219.146.220.188 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.liuzhou.gov.cn | 61.29.234.65 |
SERVER IP: 61.29.234.65 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.45 (RedFlag Linux) |
www.ljta.gov.cn | 218.63.168.234 |
SERVER IP: 218.63.168.234 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.dps.ln.gov.cn | 218.25.11.160 |
SERVER IP: 218.25.11.160 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IIS/6.2.2 (Win64) mod_ssl/6.2.2 OpenSSL/0.9.8b PHP/5.1.4 SERVER IP: 218.25.11.160 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 218.25.11.160 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 218.25.11.160 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 SERVER IP: 218.25.11.160 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756 BID : 23359, 24089, 24259, 24261 SERVER IP: 218.25.11.160 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806 BID : 25498 SERVER IP: 218.25.11.160 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 SERVER IP: 218.25.11.160 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
www.lnciq.gov.cn | 218.25.158.48 |
SERVER IP: 218.25.158.48 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.lndx.gov.cn | 218.244.136.42 |
SERVER IP: 218.244.136.42 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.lngs.gov.cn | 220.201.7.243 |
SERVER IP: 220.201.7.243 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.lnmz.gov.cn | 218.25.65.140 |
SERVER IP: 218.25.65.140 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.lnppb.gov.cn | 218.25.39.188 |
SERVER IP: 218.25.39.188 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.lnprice.gov.cn | 202.96.65.188 |
SERVER IP: 202.96.65.188 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache-Coyote/1.1 |
www.lnsports.gov.cn | 60.19.24.12 |
SERVER IP: 60.19.24.12 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver SERVER IP: 60.19.24.12 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 60.19.24.12 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.locpg.gov.cn | 60.195.251.237 |
SERVER IP: 60.195.251.237 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.lottery.gov.cn | 210.51.178.135 |
SERVER IP: 210.51.178.135 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.loulan.gov.cn | 218.31.132.251 |
SERVER IP: 218.31.132.251 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.lsjsw.gov.cn | 61.132.55.198 |
SERVER IP: 61.132.55.198 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.lsjw.gov.cn | 202.107.248.203 |
SERVER IP: 202.107.248.203 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.xjhm.lss.gov.cn | 218.84.139.66 |
SERVER IP: 218.84.139.66 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.lsst.gov.cn | 218.88.187.212 |
SERVER IP: 218.88.187.212 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.2.3 (Debian) PHP/5.2.0-8+etch7 SERVER IP: 218.88.187.212 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 218.88.187.212 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 SERVER IP: 218.88.187.212 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756 BID : 23359, 24089, 24259, 24261 SERVER IP: 218.88.187.212 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806 BID : 25498 SERVER IP: 218.88.187.212 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
www.lyinfo.gov.cn | 211.152.50.182 |
SERVER IP: 211.152.50.182 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.mas.gov.cn | 61.191.178.20 |
SERVER IP: 61.191.178.20 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.meizhou.gov.cn | 219.132.136.68 |
SERVER IP: 219.132.136.68 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.59 (Win32) PHP/4.4.7 |
www.minhou.gov.cn | 218.5.8.249 |
SERVER IP: 218.5.8.249 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.mirror.gov.cn | 202.110.236.131 |
SERVER IP: 202.110.236.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.mudanjiang.gov.cn | 221.206.121.21 |
SERVER IP: 221.206.121.21 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: JRun Web Server |
www.mushroom.gov.cn | 60.190.121.9 |
SERVER IP: 60.190.121.9 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.2.3 (APMServ) mod_ssl/2.2.3 OpenSSL/0.9.8d PHP/5.2.0 SERVER IP: 60.190.121.9 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 60.190.121.9 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 SERVER IP: 60.190.121.9 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756 BID : 23359, 24089, 24259, 24261 SERVER IP: 60.190.121.9 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806 BID : 25498 SERVER IP: 60.190.121.9 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 SERVER IP: 60.190.121.9 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
www.mykj.gov.cn | 219.234.94.135 |
SERVER IP: 219.234.94.135 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.nanao.gov.cn | 61.141.22.86 |
SERVER IP: 61.141.22.86 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.nantong.gov.cn | 58.221.238.200 |
SERVER IP: 58.221.238.200 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.nantou.gov.cn | 61.152.160.60 |
SERVER IP: 61.152.160.60 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver SERVER IP: 61.152.160.60 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 61.152.160.60 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.nbciq.gov.cn | 220.189.220.187 |
SERVER IP: 220.189.220.187 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.59 (Win32) Resin/3.0.3 SERVER IP: 220.189.220.187 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote web server is prone to a directory traversal attack. The remote host is running Resin, an application server. The installation of Resin on the remote host allows an unauthenticated remote attacker to gain access to the web-inf directories, or any known subdirectories, on the affected Windows host, which may lead to a loss of confidentiality. CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N Solution : Upgrade to Resin / Resin Pro 3.1.1 or later. See also : http://www.rapid7.com/advisories/R7-0029.jsp CVE : CVE-2007-2441, CVE-2007-2440 BID : 23985 |
www.nbfet.gov.cn | 220.191.169.25 |
SERVER IP: 220.191.169.25 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache SERVER IP: 220.191.169.25 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP which is older than 5.0.5. This version has a number of bugs which allow attackers to execute or retrieve arbitrary files outside of the web root directory. An attacker, exploiting these flaws, would only need to send a malformed HTTP request to the vulnerable system. Successful exploitation would result in the loss of Confidential data or a tarnishing of system Integrity. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 5.0.5 or later BID : 15119 SERVER IP: 220.191.169.25 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host may give an attacker information useful for future attacks The remote host is running a version of PHP which is older than 5.0.6. This version has a flaw wherein remote attackers can reenable the 'register_globals' parameter. In addition, a remote attacker may be able to overwrite the 'GLOBAL' variable. This may lead to another, more serious, exploitation. CVSS Base Score : 9.3 CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C Solution : Upgrade to PHP 5.0.6 or later See also : http://www.php.net/release_4_4_1.php CVE : CVE-2006-0395, CVE-2005-2713, CVE-2005-2714, CVE-2005-3319, CVE-2005-3353, CVE-2005-3389, CVE-2005-3706, CVE-2005-3712, CVE-2005-4217, CVE-2005-4504, CVE-2006-0383, CVE-2006-0384, CVE-2006-0386, CVE-2006-0387, CVE-2006-0388, CVE-2006-0389, CVE-2006-0391, CVE-2006-3016, CVE-2006-3018, CVE-2005-3883, CVE-2006-3017, CVE-2005-3390, CVE-2005-3392, CVE-2005-3391 BID : 15571, 16907, 17843, 15249, 15411, 15413, 15250 SERVER IP: 220.191.169.25 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 220.191.169.25 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 SERVER IP: 220.191.169.25 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756 BID : 23359, 24089, 24259, 24261 SERVER IP: 220.191.169.25 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806 BID : 25498 SERVER IP: 220.191.169.25 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
www.nbjt.gov.cn | 60.190.2.151 |
SERVER IP: 60.190.2.151 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
www.nbmzj.gov.cn | 60.190.2.41 |
SERVER IP: 60.190.2.41 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.nbsme.gov.cn | 218.75.85.2 |
SERVER IP: 218.75.85.2 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: LightTPD/1.4.18-1 (Win32) |
www.nbsti.gov.cn | 202.107.211.83 |
SERVER IP: 202.107.211.83 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.nbzj.gov.cn | 221.136.70.250 |
SERVER IP: 221.136.70.250 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.nc315.gov.cn | 218.85.133.12 |
SERVER IP: 218.85.133.12 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.ncac.gov.cn | 219.239.41.20 |
SERVER IP: 219.239.41.20 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache-Coyote/1.1 |
www.ncdh.gov.cn | 218.64.65.98 |
SERVER IP: 218.64.65.98 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache Coyote/1.0 |
www.ncie.gov.cn | 218.249.32.162 |
SERVER IP: 218.249.32.162 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.ncsb.gov.cn | 218.57.13.73 |
SERVER IP: 218.57.13.73 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.nczy.gov.cn | 221.130.191.248 |
SERVER IP: 221.130.191.248 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.neijiang.gov.cn | 61.139.47.248 |
SERVER IP: 61.139.47.248 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.neis.gov.cn | 210.72.96.51 |
SERVER IP: 210.72.96.51 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache-Coyote/1.1 |
www.ngsh.gov.cn | 61.133.200.40 |
SERVER IP: 61.133.200.40 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.ninyuan.gov.cn | 222.243.209.140 |
SERVER IP: 222.243.209.140 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.2.4 (Win32) PHP/5.2.0 SERVER IP: 222.243.209.140 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 222.243.209.140 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 SERVER IP: 222.243.209.140 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756 BID : 23359, 24089, 24259, 24261 SERVER IP: 222.243.209.140 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806 BID : 25498 SERVER IP: 222.243.209.140 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
www.njfcj.gov.cn | 122.96.148.115 |
SERVER IP: 122.96.148.115 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.njgs.gov.cn | 61.155.233.52 |
SERVER IP: 61.155.233.52 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.nju.gov.cn | 218.94.61.112 |
SERVER IP: 218.94.61.112 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.nmc.gov.cn | 211.147.16.18 |
SERVER IP: 211.147.16.18 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.2.2 (Unix) PHP/5.1.4 SERVER IP: 211.147.16.18 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 211.147.16.18 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 SERVER IP: 211.147.16.18 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756 BID : 23359, 24089, 24259, 24261 SERVER IP: 211.147.16.18 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806 BID : 25498 SERVER IP: 211.147.16.18 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
www.nmgfao.gov.cn | 60.31.197.50 |
SERVER IP: 60.31.197.50 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.nmgzb.gov.cn | 60.31.197.50 |
SERVER IP: 60.31.197.50 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.nmldt.gov.cn | 61.240.185.230 |
SERVER IP: 61.240.185.230 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 |
www.nmmzt.gov.cn | 61.138.98.204 |
SERVER IP: 61.138.98.204 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.nmqq.gov.cn | 60.31.197.50 |
SERVER IP: 60.31.197.50 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.nobelbeijing.gov.cn | 210.73.64.171 |
SERVER IP: 210.73.64.171 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/5.0 |
www.nsfc.gov.cn | 159.226.2.11 |
SERVER IP: 159.226.2.11 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.40 (Red Hat Linux) |
www.nstl.gov.cn | 168.160.1.111 |
SERVER IP: 168.160.1.111 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: WebLogic WebLogic Server 6.1 SP3 06/19/2002 22:25:39 #190835 SERVER IP: 168.160.1.111 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a flaw which allows for the bypassing of Authentication The remote web server is an unpatched version of WebLogic. This version has an internal management servlet which does not properly check the user credentials and can be accessed from the outside, allowing an attacker to change the passwords of the users or even to upload or download any file on the remote server. CVSS Base Score : 5 AV:R/AC:L/Au:NR/C:P/I:P/A:N/B:N Solution : apply SP2 rolling patch 3 on WebLogic 6.0, service pack 4 on WebLogic 6.1 and SP2 on WebLogic 7.0 See also : http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA03-28.jsp CVE : CVE-2003-1095 BID : 7122, 7124, 7131, 7130 SERVER IP: 168.160.1.111 PORT/PROTOCOL: 80/tcp TYPE: NOTE The remote host is running the WebLogic web server. There is a flaw in it which allows an attacker to gain the NetBIOS host name of the remote host. Solution : NONE BID : 7257 SERVER IP: 168.160.1.111 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running BEA Weblogic. Multiple undisclosed vulnerabilities have been reported in every versions of WebLogic up to and including 8.1.0 SP2. An attacker may exploit these issues to get unauthorized access or to gather information about the remote host. BEA Weblogic 8.1 Service Pack 3 addresses these vulnerabilities. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to WebLogic 8.1.0 SP3 or newer See also : http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/index.jsp CVE : CVE-2004-2320 BID : 9506, 11168 SERVER IP: 168.160.1.111 PORT/PROTOCOL: 80/tcp TYPE: NOTE Synopsis : The remote host may give an attacker information useful for future attacks The remote host is running BEA Weblogic. This version of Weblogic is vulnerable to an information disclosure vulnerability. Specifically, failed logins yield information regarding authentication scheme, validity of userID, etc. CVSS Base Score : 2 AV:R/AC:L/Au:NR/C:P/I:N/A:N/B:N Solution : Upgrade to WebLogic 8.1.0 SP4 or newer CVE : CVE-2005-1380 BID : 13400, 12548 SERVER IP: 168.160.1.111 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of BEA WebLogic Server or WebLogic Express that is prone to multiple vulnerabilities. These flaws could lead to buffer overflows, denial of service, unauthorized access, cross-site scripting attacks, and information disclosure. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to WebLogic 8.1.0 SP5 or newer See also : http://dev2dev.bea.com/advisoriesnotifications CVE : CVE-2005-1380, CVE-2005-1742, CVE-2005-1743, CVE-2005-1744, CVE-2005-1745, CVE-2005-1746, CVE-2005-1747, CVE-2005-1748, CVE-2005-1749 BID : 12548, 13400, 13717, 13793, 13794, 14632, 14657 SERVER IP: 168.160.1.111 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a flaw which allows attackers to retrieve sensitive files The remote host is running a version of BEA WebLogic Server or WebLogic Express that is prone to a flaw in the way that it handles anonymous RMI connections. An attacker, exploiting this flaw, would be able to retrieve sensitive configuration files anonymously. Such information would undoubtedly aid the attacker in more sophisticated attacks. CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N Solution : Upgrade to WebLogic 8.1.0 SP6 or newer See also : http://dev2dev.bea.com/advisoriesnotifications CVE : CVE-2003-1290 BID : 16215 SERVER IP: 168.160.1.111 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of BEA WebLogic Server which is vulnerable to eleven (11) distinct vulnerabilities. An attacker, exploiting these flaws, would be able to impact Availability, Confidentiality and Integrity. CVSS Base Score : 10.0 CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C Solution : Apply the relevant patches from BEA. See also : http://www.beasys.com/products/weblogic/index.html BID : 17982 |
www.ntagri.gov.cn | 218.91.209.179 |
SERVER IP: 218.91.209.179 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.53 (Win32) PHP/4.3.10 SERVER IP: 218.91.209.179 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher. CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525 BID : 12963, 12962, 13143, 13163, 13164 SERVER IP: 218.91.209.179 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 218.91.209.179 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.ntpta.gov.cn | 58.221.249.245 |
SERVER IP: 58.221.249.245 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.ntrc.gov.cn | 58.221.239.239 |
SERVER IP: 58.221.239.239 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.nx.gov.cn | 222.75.160.123 |
SERVER IP: 222.75.160.123 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache-Coyote/1.1 |
www.nxaudit.gov.cn | 202.100.98.20 |
SERVER IP: 202.100.98.20 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.47 (Unix) DAV/2 mod_jk2/2.0.4 mod_perl/1.99_19 Perl/v5.8.0 |
www.nxcd.gov.cn | 218.95.217.165 |
SERVER IP: 218.95.217.165 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.nxciq.gov.cn | 221.199.13.67 |
SERVER IP: 221.199.13.67 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.nxdofcom.gov.cn | 222.75.166.68 |
SERVER IP: 222.75.166.68 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.nxgtt.gov.cn | 61.133.207.99 |
SERVER IP: 61.133.207.99 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.27 (Win32) PHP/4.3.3 SERVER IP: 61.133.207.99 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Script Injection attack The remote host is running a version of PHP which is older than 5.0.3 or 4.3.10. The remote version of this software is vulnerable to various security issues which may, under certain circumstances, allow attackers to execute arbitrary code on the remote host, provided that they can pass arbitrary data to some functions or bypass safe_mode. CVSS Base Score : 6 AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to PHP 5.0.3 or 4.3.10 CVE : CVE-2004-1018, CVE-2004-1019, CVE-2004-1020, CVE-2004-1063, CVE-2004-1064, CVE-2004-1065 BID : 11964, 11981, 11992, 12045 SERVER IP: 61.133.207.99 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher. CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525 BID : 12963, 12962, 13143, 13163, 13164 SERVER IP: 61.133.207.99 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 61.133.207.99 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.nxpta.gov.cn | 220.113.15.103 |
SERVER IP: 220.113.15.103 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 |
www.nxrkw.gov.cn | 222.75.161.100 |
SERVER IP: 222.75.161.100 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.nxws.gov.cn | 221.199.13.163 |
SERVER IP: 221.199.13.163 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.nxyz.gov.cn | 218.95.217.151 |
SERVER IP: 218.95.217.151 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.nxzj.gov.cn | 222.75.163.243 |
SERVER IP: 222.75.163.243 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.59 (Win32) mod_jk/1.2.15 |
www.nynews.gov.cn | 61.163.231.73 |
SERVER IP: 61.163.231.73 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.pgkx.gov.cn | 218.246.85.2 |
SERVER IP: 218.246.85.2 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.pingyin.gov.cn | 218.57.139.53 |
SERVER IP: 218.57.139.53 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.pksq.gov.cn | 222.190.122.84 |
SERVER IP: 222.190.122.84 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.pndc.gov.cn | 210.51.168.171 |
SERVER IP: 210.51.168.171 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.psx.gov.cn | 61.152.94.254 |
SERVER IP: 61.152.94.254 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.qagri.gov.cn | 61.189.166.2 |
SERVER IP: 61.189.166.2 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.qdaic.gov.cn | 218.58.76.11 |
SERVER IP: 218.58.76.11 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: WebLogic Server 8.1 SP2 Fri Dec 5 15:01:51 PST 2003 316284 SERVER IP: 218.58.76.11 PORT/PROTOCOL: 80/tcp TYPE: NOTE The remote host is running the WebLogic web server. There is a flaw in it which allows an attacker to gain the NetBIOS host name of the remote host. Solution : NONE BID : 7257 SERVER IP: 218.58.76.11 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running BEA Weblogic. Multiple undisclosed vulnerabilities have been reported in every versions of WebLogic up to and including 8.1.0 SP2. An attacker may exploit these issues to get unauthorized access or to gather information about the remote host. BEA Weblogic 8.1 Service Pack 3 addresses these vulnerabilities. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to WebLogic 8.1.0 SP3 or newer See also : http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/index.jsp CVE : CVE-2004-2320 BID : 9506, 11168 SERVER IP: 218.58.76.11 PORT/PROTOCOL: 80/tcp TYPE: NOTE Synopsis : The remote host may give an attacker information useful for future attacks The remote host is running BEA Weblogic. This version of Weblogic is vulnerable to an information disclosure vulnerability. Specifically, failed logins yield information regarding authentication scheme, validity of userID, etc. CVSS Base Score : 2 AV:R/AC:L/Au:NR/C:P/I:N/A:N/B:N Solution : Upgrade to WebLogic 8.1.0 SP4 or newer CVE : CVE-2005-1380 BID : 13400, 12548 SERVER IP: 218.58.76.11 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of BEA WebLogic Server or WebLogic Express that is prone to multiple vulnerabilities. These flaws could lead to buffer overflows, denial of service, unauthorized access, cross-site scripting attacks, and information disclosure. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to WebLogic 8.1.0 SP5 or newer See also : http://dev2dev.bea.com/advisoriesnotifications CVE : CVE-2005-1380, CVE-2005-1742, CVE-2005-1743, CVE-2005-1744, CVE-2005-1745, CVE-2005-1746, CVE-2005-1747, CVE-2005-1748, CVE-2005-1749 BID : 12548, 13400, 13717, 13793, 13794, 14632, 14657 SERVER IP: 218.58.76.11 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a flaw which allows attackers to retrieve sensitive files The remote host is running a version of BEA WebLogic Server or WebLogic Express that is prone to a flaw in the way that it handles anonymous RMI connections. An attacker, exploiting this flaw, would be able to retrieve sensitive configuration files anonymously. Such information would undoubtedly aid the attacker in more sophisticated attacks. CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N Solution : Upgrade to WebLogic 8.1.0 SP6 or newer See also : http://dev2dev.bea.com/advisoriesnotifications CVE : CVE-2003-1290 BID : 16215 SERVER IP: 218.58.76.11 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of BEA WebLogic Server which is vulnerable to eleven (11) distinct vulnerabilities. An attacker, exploiting these flaws, would be able to impact Availability, Confidentiality and Integrity. CVSS Base Score : 10.0 CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C Solution : Apply the relevant patches from BEA. See also : http://www.beasys.com/products/weblogic/index.html BID : 17982 |
www.qdsf.gov.cn | 218.58.68.229 |
SERVER IP: 218.58.68.229 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.50 (Unix) |
www.qglz.gov.cn | 61.154.119.18 |
SERVER IP: 61.154.119.18 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.qhdta.gov.cn | 210.51.165.170 |
SERVER IP: 210.51.165.170 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.qhlr.gov.cn | 221.207.12.131 |
SERVER IP: 221.207.12.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.qhly.gov.cn | 221.207.13.236 |
SERVER IP: 221.207.13.236 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.26 (Win32) tomcat/1.0 |
www.qhrs.gov.cn | 125.72.24.37 |
SERVER IP: 125.72.24.37 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.qhwq.gov.cn | 221.238.248.3 |
SERVER IP: 221.238.248.3 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.49 (Win32) |
www.qianguo.gov.cn | 58.245.254.166 |
SERVER IP: 58.245.254.166 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.qinfeng.gov.cn | 61.185.238.220 |
SERVER IP: 61.185.238.220 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.qk.gov.cn | 219.140.178.210 |
SERVER IP: 219.140.178.210 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.qtinfo.gov.cn | 61.153.223.5 |
SERVER IP: 61.153.223.5 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.qzepb.gov.cn | 222.77.0.124 |
SERVER IP: 222.77.0.124 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.61 (Win32) mod_jk2/2.0.4 |
www.qzipo.gov.cn | 61.131.46.150 |
SERVER IP: 61.131.46.150 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.qzldbz.gov.cn | 222.79.247.170 |
SERVER IP: 222.79.247.170 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.qzrs.gov.cn | 202.109.213.44 |
SERVER IP: 202.109.213.44 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Resin/2.1.9 |
www.rctj.gov.cn | 211.92.62.2 |
SERVER IP: 211.92.62.2 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.rcx.gov.cn | 218.26.221.196 |
SERVER IP: 218.26.221.196 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.realestate.gov.cn | 219.142.101.72 |
SERVER IP: 219.142.101.72 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.rftgd.gov.cn | 219.137.213.151 |
SERVER IP: 219.137.213.151 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
www.rjzl.gov.cn | 222.35.3.38 |
SERVER IP: 222.35.3.38 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.rugao.gov.cn | 218.91.206.119 |
SERVER IP: 218.91.206.119 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.safety.gov.cn | 202.106.75.11 |
SERVER IP: 202.106.75.11 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/5.0 |
www.sara.gov.cn | 220.194.20.37 |
SERVER IP: 220.194.20.37 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache-Coyote/1.1 |
www.sast.gov.cn | 218.242.181.125 |
SERVER IP: 218.242.181.125 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: LOVE/1_0 |
www.sccm.gov.cn | 221.236.20.21 |
SERVER IP: 221.236.20.21 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.scfda.gov.cn | 61.157.78.11 |
SERVER IP: 61.157.78.11 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache-Coyote/1.1 |
www.schj.gov.cn | 221.237.160.226 |
SERVER IP: 221.237.160.226 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.50 (Win32) PHP/4.3.11 SERVER IP: 221.237.160.226 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 221.237.160.226 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.scjc.gov.cn | 61.157.78.27 |
SERVER IP: 61.157.78.27 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache Coyote/1.0 |
www.scmz.gov.cn | 221.237.160.199 |
SERVER IP: 221.237.160.199 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.scpop.gov.cn | 61.157.76.150 |
SERVER IP: 61.157.76.150 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.scpta.gov.cn | 125.71.28.51 |
SERVER IP: 125.71.28.51 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.scqy.gov.cn | 61.185.224.31 |
SERVER IP: 61.185.224.31 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.scsme.gov.cn | 222.211.73.51 |
SERVER IP: 222.211.73.51 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.scxmsp.gov.cn | 218.104.217.171 |
SERVER IP: 218.104.217.171 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.sdet.gov.cn | 61.142.131.14 |
SERVER IP: 61.142.131.14 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.sdjt.gov.cn | 218.57.139.178 |
SERVER IP: 218.57.139.178 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache-Oil/1.1 |
www.sdns.gov.cn | 61.156.8.200 |
SERVER IP: 61.156.8.200 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.sdsi.gov.cn | 219.146.56.19 |
SERVER IP: 219.146.56.19 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 SERVER IP: 219.146.56.19 PORT/PROTOCOL: 80/tcp TYPE: INFO The remote web server is running a version of PHP which is older than 4.2.2. This version has a bug in its mail() function which does not properly sanitize user input. As a result, users can forge email to make it look like it is coming from a different source that the server. Solution : Upgrade to PHP 4.2.2 CVE : CVE-2002-0986, CVE-2002-0985 BID : 5562 SERVER IP: 219.146.56.19 PORT/PROTOCOL: 80/tcp TYPE: NOTE The remote host is running a version of PHP which is older than 4.3.2. This version contains various flaws that may allow an attacker who has the ability to execute PHP scripts in safe_mode on this host to execute arbitrary commands with the privileges of the HTTP daemon Solution : Upgrade to PHP 4.3.2 CVE : CVE-2003-0166 BID : 7256, 7259, 7187, 7197, 7198, 7199, 7210 SERVER IP: 219.146.56.19 PORT/PROTOCOL: 80/tcp TYPE: NOTE The remote host is running a Microsoft IIS webserver SERVER IP: 219.146.56.19 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Script Injection attack The remote host is running a version of PHP which is older than 5.0.3 or 4.3.10. The remote version of this software is vulnerable to various security issues which may, under certain circumstances, allow attackers to execute arbitrary code on the remote host, provided that they can pass arbitrary data to some functions or bypass safe_mode. CVSS Base Score : 6 AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to PHP 5.0.3 or 4.3.10 CVE : CVE-2004-1018, CVE-2004-1019, CVE-2004-1020, CVE-2004-1063, CVE-2004-1064, CVE-2004-1065 BID : 11964, 11981, 11992, 12045 SERVER IP: 219.146.56.19 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher. CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525 BID : 12963, 12962, 13143, 13163, 13164 SERVER IP: 219.146.56.19 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 219.146.56.19 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.sdwj.gov.cn | 218.57.128.245 |
SERVER IP: 218.57.128.245 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.sdwsqw.gov.cn | 61.142.131.6 |
SERVER IP: 61.142.131.6 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.2.4 (Unix) PHP/5.2.2 SERVER IP: 61.142.131.6 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756 BID : 23359, 24089, 24259, 24261 SERVER IP: 61.142.131.6 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806 BID : 25498 SERVER IP: 61.142.131.6 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
www.sdxm.gov.cn | 218.57.142.166 |
SERVER IP: 218.57.142.166 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.59 (Unix) |
www.sei.gov.cn | 61.185.238.221 |
SERVER IP: 61.185.238.221 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.serc.gov.cn | 211.160.24.194 |
SERVER IP: 211.160.24.194 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
www.setd.gov.cn | 218.84.65.210 |
SERVER IP: 218.84.65.210 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.28 Apache/1.3.28 (Unix) |
www.sh1111.gov.cn | 218.242.146.58 |
SERVER IP: 218.242.146.58 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.shad.gov.cn | 61.152.187.169 |
SERVER IP: 61.152.187.169 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_Server/6.0.2.11 Apache/2.0.47 (Win32) |
www.shanghai.gov.cn | 61.129.65.58 |
SERVER IP: 61.129.65.58 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.shantou.gov.cn | 61.141.22.93 |
SERVER IP: 61.141.22.93 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.shaoyang.gov.cn | 218.76.215.232 |
SERVER IP: 218.76.215.232 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.shdf.gov.cn | 210.82.57.1 |
SERVER IP: 210.82.57.1 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache-Coyote/1.1 |
www.shiyan.gov.cn | 202.103.53.163 |
SERVER IP: 202.103.53.163 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.shuangliao.gov.cn | 125.32.157.252 |
SERVER IP: 125.32.157.252 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.shxc.gov.cn | 218.25.48.190 |
SERVER IP: 218.25.48.190 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.shyzfw.gov.cn | 125.76.229.28 |
SERVER IP: 125.76.229.28 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.shzj.gov.cn | 211.144.102.199 |
SERVER IP: 211.144.102.199 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.59 (Win32) |
www.siming.gov.cn | 218.5.65.145 |
SERVER IP: 218.5.65.145 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.59 (Win32) mod_jk2/2.0.4 |
www.sist.gov.cn | 203.91.45.201 |
SERVER IP: 203.91.45.201 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.siyang.gov.cn | 218.93.196.22 |
SERVER IP: 218.93.196.22 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.skxtv.gov.cn | 124.89.118.236 |
SERVER IP: 124.89.118.236 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.sm.gov.cn | 220.162.230.42 |
SERVER IP: 220.162.230.42 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.smedl.gov.cn | 218.61.7.72 |
SERVER IP: 218.61.7.72 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.smehen.gov.cn | 222.143.25.114 |
SERVER IP: 222.143.25.114 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.smeqd.gov.cn | 60.209.78.8 |
SERVER IP: 60.209.78.8 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.smeshx.gov.cn | 125.76.229.4 |
SERVER IP: 125.76.229.4 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.smeyn.gov.cn | 220.164.79.2 |
SERVER IP: 220.164.79.2 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.snaic.gov.cn | 219.144.222.26 |
SERVER IP: 219.144.222.26 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
www.soa.gov.cn | 202.99.63.158 |
SERVER IP: 202.99.63.158 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache Coyote/1.0 |
www.spic.gov.cn | 61.185.238.220 |
SERVER IP: 61.185.238.220 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.spp.gov.cn | 219.141.231.58 |
SERVER IP: 219.141.231.58 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.49 (Win32) mod_jk/1.2.0 |
www.spta.gov.cn | 202.109.110.80 |
SERVER IP: 202.109.110.80 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache-Coyote/1.1 |
www.srgl.gov.cn | 222.35.3.30 |
SERVER IP: 222.35.3.30 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.ssf.gov.cn | 203.207.195.91 |
SERVER IP: 203.207.195.91 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.ssme.gov.cn | 211.144.107.180 |
SERVER IP: 211.144.107.180 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.53 (Win32) |
www.stats-sx.gov.cn | 210.72.57.31 |
SERVER IP: 210.72.57.31 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.stats.gov.cn | 219.235.129.45 |
SERVER IP: 219.235.129.45 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.48 (Win32) mod_jk/1.2.4 |
www.stm.gov.cn | 202.101.108.137 |
SERVER IP: 202.101.108.137 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.rsj.suzhou.gov.cn | 221.224.13.50 |
SERVER IP: 221.224.13.50 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 |
www.sxagri.gov.cn | 202.99.223.146 |
SERVER IP: 202.99.223.146 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.sxaic.gov.cn | 218.26.1.109 |
SERVER IP: 218.26.1.109 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.sxch.gov.cn | 202.99.219.244 |
SERVER IP: 202.99.219.244 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.sxcredit.gov.cn | 61.185.238.246 |
SERVER IP: 61.185.238.246 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.sxfx.gov.cn | 61.185.55.155 |
SERVER IP: 61.185.55.155 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.sxfzb.gov.cn | 221.204.249.223 |
SERVER IP: 221.204.249.223 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.sxgaoping.gov.cn | 203.207.98.226 |
SERVER IP: 203.207.98.226 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.sxhall.gov.cn | 61.185.214.36 |
SERVER IP: 61.185.214.36 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.sxit.gov.cn | 61.185.238.206 |
SERVER IP: 61.185.238.206 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.sxjz.gov.cn | 60.223.255.11 |
SERVER IP: 60.223.255.11 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.2.3 (Win32) |
www.sxmz.gov.cn | 202.99.219.186 |
SERVER IP: 202.99.219.186 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.sxnw.gov.cn | 218.26.168.90 |
SERVER IP: 218.26.168.90 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.sxprice.gov.cn | 218.26.178.33 |
SERVER IP: 218.26.178.33 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.sxsfjd.gov.cn | 202.99.219.244 |
SERVER IP: 202.99.219.244 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.sxtong.gov.cn | 218.30.21.204 |
SERVER IP: 218.30.21.204 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.sxtzb.gov.cn | 74.200.203.242 |
SERVER IP: 74.200.203.242 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 PHP/4.4.6 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a SERVER IP: 74.200.203.242 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 74.200.203.242 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 74.200.203.242 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 SERVER IP: 74.200.203.242 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
www.syipb.gov.cn | 218.61.146.14 |
SERVER IP: 218.61.146.14 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.syqw.gov.cn | 218.244.129.66 |
SERVER IP: 218.244.129.66 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.syrsw.gov.cn | 218.25.25.18 |
SERVER IP: 218.25.25.18 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: WebSphere Application Server/4.0 SERVER IP: 218.25.25.18 PORT/PROTOCOL: 80/tcp TYPE: NOTE Synopsis : The remote host is vulnerable to a flaw which allows attackers to retrieve sensitive files or data The remote WebSphere webserver is vulnerable to an information leak. That is, user information is sometimes stored under the profile of the 'default' user. Unintended users may gain access to this information and use the information to elevate privileges on the remote machine. It is also possible that the default user account may disclose information regarding other users. CVSS Base Score : 2 AV:R/AC:L/Au:NR/C:P/I:N/A:N/B:N Solution : Upgrade to the most recent version of WebSphere BID : 11816 |
www.sysc.gov.cn | 218.61.146.27 |
SERVER IP: 218.61.146.27 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.rsj.sz.gov.cn | 61.144.227.15 |
SERVER IP: 61.144.227.15 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_Server/6.0 Apache/2.0.47 (Unix) |
www.sz12333.gov.cn | 61.144.226.49 |
SERVER IP: 61.144.226.49 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.szbqts.gov.cn | 61.144.227.15 |
SERVER IP: 61.144.227.15 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_Server/6.0 Apache/2.0.47 (Unix) |
www.szbts.gov.cn | 61.144.227.15 |
SERVER IP: 61.144.227.15 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_Server/6.0 Apache/2.0.47 (Unix) |
www.szcourt.gov.cn | 61.144.226.172 |
SERVER IP: 61.144.226.172 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.2.0 (Unix) PHP/5.1.2 SERVER IP: 61.144.226.172 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 61.144.226.172 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 SERVER IP: 61.144.226.172 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756 BID : 23359, 24089, 24259, 24261 SERVER IP: 61.144.226.172 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806 BID : 25498 SERVER IP: 61.144.226.172 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
www.szfdc.gov.cn | 61.144.226.82 |
SERVER IP: 61.144.226.82 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.52 (Win32) |
www.szftz.gov.cn | 203.91.45.33 |
SERVER IP: 203.91.45.33 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.szga.gov.cn | 202.104.129.181 |
SERVER IP: 202.104.129.181 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.szjs.gov.cn | 61.144.226.2 |
SERVER IP: 61.144.226.2 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 |
www.szlib.gov.cn | 58.60.2.145 |
SERVER IP: 58.60.2.145 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.2.4 (Unix) mod_jk/1.2.23 |
www.szpb.gov.cn | 203.175.145.17 |
SERVER IP: 203.175.145.17 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.szplan.gov.cn | 61.144.226.41 |
SERVER IP: 61.144.226.41 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.55 (Win32) mod_ssl/2.0.55 OpenSSL/0.9.8a SERVER IP: 61.144.226.41 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 61.144.226.41 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
www.szrkjs.gov.cn | 61.144.227.15 |
SERVER IP: 61.144.227.15 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_Server/6.0 Apache/2.0.47 (Unix) |
www.szsf.gov.cn | 61.144.227.15 |
SERVER IP: 61.144.227.15 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_Server/6.0 Apache/2.0.47 (Unix) |
www.szsgsj.gov.cn | 221.224.13.226 |
SERVER IP: 221.224.13.226 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: WebLogic WebLogic Server 7.0 SP1 Mon Sep 9 22:46:58 PDT 2002 206753 SERVER IP: 221.224.13.226 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a flaw which allows for the bypassing of Authentication The remote web server is an unpatched version of WebLogic. This version has an internal management servlet which does not properly check the user credentials and can be accessed from the outside, allowing an attacker to change the passwords of the users or even to upload or download any file on the remote server. CVSS Base Score : 5 AV:R/AC:L/Au:NR/C:P/I:P/A:N/B:N Solution : apply SP2 rolling patch 3 on WebLogic 6.0, service pack 4 on WebLogic 6.1 and SP2 on WebLogic 7.0 See also : http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA03-28.jsp CVE : CVE-2003-1095 BID : 7122, 7124, 7131, 7130 SERVER IP: 221.224.13.226 PORT/PROTOCOL: 80/tcp TYPE: NOTE The remote host is running the WebLogic web server. There is a flaw in it which allows an attacker to gain the NetBIOS host name of the remote host. Solution : NONE BID : 7257 SERVER IP: 221.224.13.226 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running BEA Weblogic. Multiple undisclosed vulnerabilities have been reported in every versions of WebLogic up to and including 8.1.0 SP2. An attacker may exploit these issues to get unauthorized access or to gather information about the remote host. BEA Weblogic 8.1 Service Pack 3 addresses these vulnerabilities. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to WebLogic 8.1.0 SP3 or newer See also : http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/index.jsp CVE : CVE-2004-2320 BID : 9506, 11168 SERVER IP: 221.224.13.226 PORT/PROTOCOL: 80/tcp TYPE: NOTE Synopsis : The remote host may give an attacker information useful for future attacks The remote host is running BEA Weblogic. This version of Weblogic is vulnerable to an information disclosure vulnerability. Specifically, failed logins yield information regarding authentication scheme, validity of userID, etc. CVSS Base Score : 2 AV:R/AC:L/Au:NR/C:P/I:N/A:N/B:N Solution : Upgrade to WebLogic 8.1.0 SP4 or newer CVE : CVE-2005-1380 BID : 13400, 12548 SERVER IP: 221.224.13.226 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of BEA WebLogic Server or WebLogic Express that is prone to multiple vulnerabilities. These flaws could lead to buffer overflows, denial of service, unauthorized access, cross-site scripting attacks, and information disclosure. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to WebLogic 8.1.0 SP5 or newer See also : http://dev2dev.bea.com/advisoriesnotifications CVE : CVE-2005-1380, CVE-2005-1742, CVE-2005-1743, CVE-2005-1744, CVE-2005-1745, CVE-2005-1746, CVE-2005-1747, CVE-2005-1748, CVE-2005-1749 BID : 12548, 13400, 13717, 13793, 13794, 14632, 14657 SERVER IP: 221.224.13.226 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a flaw which allows attackers to retrieve sensitive files The remote host is running a version of BEA WebLogic Server or WebLogic Express that is prone to a flaw in the way that it handles anonymous RMI connections. An attacker, exploiting this flaw, would be able to retrieve sensitive configuration files anonymously. Such information would undoubtedly aid the attacker in more sophisticated attacks. CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N Solution : Upgrade to WebLogic 8.1.0 SP6 or newer See also : http://dev2dev.bea.com/advisoriesnotifications CVE : CVE-2003-1290 BID : 16215 SERVER IP: 221.224.13.226 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of BEA WebLogic Server which is vulnerable to eleven (11) distinct vulnerabilities. An attacker, exploiting these flaws, would be able to impact Availability, Confidentiality and Integrity. CVSS Base Score : 10.0 CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C Solution : Apply the relevant patches from BEA. See also : http://www.beasys.com/products/weblogic/index.html BID : 17982 |
www.szsmb.gov.cn | 211.159.67.168 |
SERVER IP: 211.159.67.168 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.szum.gov.cn | 218.17.225.250 |
SERVER IP: 218.17.225.250 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.szzj.gov.cn | 220.191.227.59 |
SERVER IP: 220.191.227.59 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.szzx.gov.cn | 61.144.227.15 |
SERVER IP: 61.144.227.15 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_Server/6.0 Apache/2.0.47 (Unix) |
www.tahe.gov.cn | 218.84.207.84 |
SERVER IP: 218.84.207.84 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.tcm.gov.cn | 218.244.136.98 |
SERVER IP: 218.244.136.98 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.tdbdx.gov.cn | 211.167.41.129 |
SERVER IP: 211.167.41.129 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver SERVER IP: 211.167.41.129 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 211.167.41.129 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.tianjin.gov.cn | 61.136.9.36 |
SERVER IP: 61.136.9.36 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.tianshui.gov.cn | 61.134.65.201 |
SERVER IP: 61.134.65.201 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.tibet.gov.cn | 220.182.51.20 |
SERVER IP: 220.182.51.20 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache-Coyote/1.1 |
www.tipp.gov.cn | 202.99.67.55 |
SERVER IP: 202.99.67.55 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache-Coyote/1.1 |
www.tjftz.gov.cn | 60.29.110.10 |
SERVER IP: 60.29.110.10 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.26.2 Apache/1.3.26 (Unix) |
www.tjhb.gov.cn | 221.129.21.152 |
SERVER IP: 221.129.21.152 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.tjhg.gov.cn | 218.69.103.35 |
SERVER IP: 218.69.103.35 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.tjjt.gov.cn | 218.67.246.249 |
SERVER IP: 218.67.246.249 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.tjsf.gov.cn | 211.148.164.227 |
SERVER IP: 211.148.164.227 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.49 (Win32) PHP/4.3.4 SERVER IP: 211.148.164.227 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Script Injection attack The remote host is running a version of PHP which is older than 5.0.3 or 4.3.10. The remote version of this software is vulnerable to various security issues which may, under certain circumstances, allow attackers to execute arbitrary code on the remote host, provided that they can pass arbitrary data to some functions or bypass safe_mode. CVSS Base Score : 6 AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to PHP 5.0.3 or 4.3.10 CVE : CVE-2004-1018, CVE-2004-1019, CVE-2004-1020, CVE-2004-1063, CVE-2004-1064, CVE-2004-1065 BID : 11964, 11981, 11992, 12045 SERVER IP: 211.148.164.227 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher. CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525 BID : 12963, 12962, 13143, 13163, 13164 SERVER IP: 211.148.164.227 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 211.148.164.227 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.tjwcb.gov.cn | 218.69.100.138 |
SERVER IP: 218.69.100.138 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.tjztb.gov.cn | 60.29.103.80 |
SERVER IP: 60.29.103.80 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.town.gov.cn | 60.19.24.10 |
SERVER IP: 60.19.24.10 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.54 (Unix) PHP/4.4.0 SERVER IP: 60.19.24.10 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 60.19.24.10 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.tpbjc.gov.cn | 211.157.100.131 |
SERVER IP: 211.157.100.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.tstc.gov.cn | 218.69.114.17 |
SERVER IP: 218.69.114.17 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.54 (Win32) mod_jk2/2.0.4 |
www.tzgh.gov.cn | 218.75.5.198 |
SERVER IP: 218.75.5.198 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.59 (Win32) PHP/5.0.3 SERVER IP: 218.75.5.198 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher. CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525 BID : 12963, 12962, 13143, 13163, 13164 SERVER IP: 218.75.5.198 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP which is older than 5.0.5. This version has a number of bugs which allow attackers to execute or retrieve arbitrary files outside of the web root directory. An attacker, exploiting these flaws, would only need to send a malformed HTTP request to the vulnerable system. Successful exploitation would result in the loss of Confidential data or a tarnishing of system Integrity. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 5.0.5 or later BID : 15119 SERVER IP: 218.75.5.198 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host may give an attacker information useful for future attacks The remote host is running a version of PHP which is older than 5.0.6. This version has a flaw wherein remote attackers can reenable the 'register_globals' parameter. In addition, a remote attacker may be able to overwrite the 'GLOBAL' variable. This may lead to another, more serious, exploitation. CVSS Base Score : 9.3 CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C Solution : Upgrade to PHP 5.0.6 or later See also : http://www.php.net/release_4_4_1.php CVE : CVE-2006-0395, CVE-2005-2713, CVE-2005-2714, CVE-2005-3319, CVE-2005-3353, CVE-2005-3389, CVE-2005-3706, CVE-2005-3712, CVE-2005-4217, CVE-2005-4504, CVE-2006-0383, CVE-2006-0384, CVE-2006-0386, CVE-2006-0387, CVE-2006-0388, CVE-2006-0389, CVE-2006-0391, CVE-2006-3016, CVE-2006-3018, CVE-2005-3883, CVE-2006-3017, CVE-2005-3390, CVE-2005-3392, CVE-2005-3391 BID : 15571, 16907, 17843, 15249, 15411, 15413, 15250 SERVER IP: 218.75.5.198 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 218.75.5.198 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 SERVER IP: 218.75.5.198 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756 BID : 23359, 24089, 24259, 24261 SERVER IP: 218.75.5.198 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806 BID : 25498 SERVER IP: 218.75.5.198 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
www.tzipo.gov.cn | 60.191.134.252 |
SERVER IP: 60.191.134.252 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver SERVER IP: 60.191.134.252 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Script Injection attack The remote host is running a version of PHP which is older than 5.0.3 or 4.3.10. The remote version of this software is vulnerable to various security issues which may, under certain circumstances, allow attackers to execute arbitrary code on the remote host, provided that they can pass arbitrary data to some functions or bypass safe_mode. CVSS Base Score : 6 AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to PHP 5.0.3 or 4.3.10 CVE : CVE-2004-1018, CVE-2004-1019, CVE-2004-1020, CVE-2004-1063, CVE-2004-1064, CVE-2004-1065 BID : 11964, 11981, 11992, 12045 SERVER IP: 60.191.134.252 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher. CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525 BID : 12963, 12962, 13143, 13163, 13164 SERVER IP: 60.191.134.252 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 60.191.134.252 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.tzkj.gov.cn | 60.191.134.252 |
SERVER IP: 60.191.134.252 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.urumqi.gov.cn | 220.171.28.206 |
SERVER IP: 220.171.28.206 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 |
www.usjob.gov.cn | 125.64.94.69 |
SERVER IP: 125.64.94.69 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.wanrong.gov.cn | 61.129.251.105 |
SERVER IP: 61.129.251.105 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.weda.gov.cn | 61.191.136.2 |
SERVER IP: 61.191.136.2 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.wenzhou.gov.cn | 220.191.204.203 |
SERVER IP: 220.191.204.203 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.2.6 (Unix) |
www.wffc.gov.cn | 60.210.254.162 |
SERVER IP: 60.210.254.162 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.3 (Unix) |
www.wfstc.gov.cn | 210.51.187.92 |
SERVER IP: 210.51.187.92 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 |
www.wh12366.gov.cn | 219.140.196.6 |
SERVER IP: 219.140.196.6 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: WebLogic Server 8.1 SP3 Tue Jun 29 23:11:19 PDT 2004 404973 SERVER IP: 219.140.196.6 PORT/PROTOCOL: 80/tcp TYPE: NOTE The remote host is running the WebLogic web server. There is a flaw in it which allows an attacker to gain the NetBIOS host name of the remote host. Solution : NONE BID : 7257 SERVER IP: 219.140.196.6 PORT/PROTOCOL: 80/tcp TYPE: NOTE Synopsis : The remote host may give an attacker information useful for future attacks The remote host is running BEA Weblogic. This version of Weblogic is vulnerable to an information disclosure vulnerability. Specifically, failed logins yield information regarding authentication scheme, validity of userID, etc. CVSS Base Score : 2 AV:R/AC:L/Au:NR/C:P/I:N/A:N/B:N Solution : Upgrade to WebLogic 8.1.0 SP4 or newer CVE : CVE-2005-1380 BID : 13400, 12548 SERVER IP: 219.140.196.6 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of BEA WebLogic Server or WebLogic Express that is prone to multiple vulnerabilities. These flaws could lead to buffer overflows, denial of service, unauthorized access, cross-site scripting attacks, and information disclosure. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to WebLogic 8.1.0 SP5 or newer See also : http://dev2dev.bea.com/advisoriesnotifications CVE : CVE-2005-1380, CVE-2005-1742, CVE-2005-1743, CVE-2005-1744, CVE-2005-1745, CVE-2005-1746, CVE-2005-1747, CVE-2005-1748, CVE-2005-1749 BID : 12548, 13400, 13717, 13793, 13794, 14632, 14657 SERVER IP: 219.140.196.6 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a flaw which allows attackers to retrieve sensitive files The remote host is running a version of BEA WebLogic Server or WebLogic Express that is prone to a flaw in the way that it handles anonymous RMI connections. An attacker, exploiting this flaw, would be able to retrieve sensitive configuration files anonymously. Such information would undoubtedly aid the attacker in more sophisticated attacks. CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N Solution : Upgrade to WebLogic 8.1.0 SP6 or newer See also : http://dev2dev.bea.com/advisoriesnotifications CVE : CVE-2003-1290 BID : 16215 |
www.whgajxj.gov.cn | 221.2.154.7 |
SERVER IP: 221.2.154.7 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver SERVER IP: 221.2.154.7 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806 BID : 25498 SERVER IP: 221.2.154.7 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
www.whjs.gov.cn | 59.175.235.8 |
SERVER IP: 59.175.235.8 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.whlib.gov.cn | 219.140.69.40 |
SERVER IP: 219.140.69.40 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.whrsj.gov.cn | 61.183.11.99 |
SERVER IP: 61.183.11.99 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.wj.gov.cn | 218.93.116.250 |
SERVER IP: 218.93.116.250 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.wtolaw.gov.cn | 122.224.146.45 |
SERVER IP: 122.224.146.45 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.wuping.gov.cn | 211.143.188.178 |
SERVER IP: 211.143.188.178 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.wuyishan.gov.cn | 222.78.246.252 |
SERVER IP: 222.78.246.252 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache-Coyote/1.1 |
www.gov.cn | 216.66.26.154 |
SERVER IP: 216.66.26.154 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
www.wznw.gov.cn | 60.190.81.82 |
SERVER IP: 60.190.81.82 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache Tomcat/4.0.4 (HTTP/1.1 Connector) SERVER IP: 60.190.81.82 PORT/PROTOCOL: 80/tcp TYPE: NOTE Synopsis : The remote web server can be coerced into disclosing source code Tomcat 4.0.4 and 4.1.10 (probably all other earlier versions as well) are vulnerable to a source code exposure by using the default servlet org.apache.catalina.servlets.DefaultServlet CVSS Base Score : 2 AV:R/AC:L/Au:NR/C:P/I:N/A:N/B:N Solution : Upgrade to the latest release of the branch you are running (at least 4.0.5 or 4.1.12) See also : http://jakarta.apache.org/builds/jakarta-tomcat-4.0/release CVE : CVE-2002-1148 BID : 5786 SERVER IP: 60.190.81.82 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host may give an attacker information useful for future attacks Apache Tomcat (prior to 3.3.1a) is prone to a directory listing and file disclosure vulnerability. An attacker may exploit this bug to get the listing of directories otherwise protected by an index.html file, or even to get the source code of the remote .jsp scripts. CVSS Base Score : 4 AV:R/AC:L/Au:NR/C:P/I:N/A:N/B:C Solution : Upgrade to Tomcat 4.1.18 CVE : CVE-2003-0044, CVE-2003-0042 BID : 6720, 6721 SERVER IP: 60.190.81.82 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack It may be possible the freeze or crash the remote Tomcat web server by making it read MS/DOS devices files through its servlet engine (ie: /examples/servlet/AUX). CVSS Base Score : 5 AV:R/AC:L/Au:NR/C:N/I:N/A:C/B:A Solution : Upgrade to Tomcat 4.1.10 CVE : CVE-2003-0045 |
www.wzta.gov.cn | 60.191.70.230 |
SERVER IP: 60.191.70.230 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.wzzw.gov.cn | 218.244.152.28 |
SERVER IP: 218.244.152.28 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.xags.gov.cn | 219.144.196.94 |
SERVER IP: 219.144.196.94 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.58 (Win32) mod_jk/1.2.4 |
www.xaonline.gov.cn | 61.185.242.202 |
SERVER IP: 61.185.242.202 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.xasmw.gov.cn | 61.185.242.201 |
SERVER IP: 61.185.242.201 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.xbrc.gov.cn | 202.100.84.130 |
SERVER IP: 202.100.84.130 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.xflyj.gov.cn | 58.51.95.236 |
SERVER IP: 58.51.95.236 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.xfyy.gov.cn | 219.138.45.241 |
SERVER IP: 219.138.45.241 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.xiangcheng.gov.cn | 61.158.230.143 |
SERVER IP: 61.158.230.143 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver SERVER IP: 61.158.230.143 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 61.158.230.143 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.xiaoshan.gov.cn | 202.101.162.75 |
SERVER IP: 202.101.162.75 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.28 Apache/1.3.28 (Unix) |
www.xilingol.gov.cn | 60.31.215.242 |
SERVER IP: 60.31.215.242 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.2.4 (Unix) DAV/2 mod_jk/1.2.22 |
www.xinganmeng.gov.cn | 58.18.7.202 |
SERVER IP: 58.18.7.202 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.xingyang.gov.cn | 61.135.129.107 |
SERVER IP: 61.135.129.107 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.xinjiangtour.gov.cn | 222.82.229.2 |
SERVER IP: 222.82.229.2 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.xinyu.gov.cn | 218.87.99.48 |
SERVER IP: 218.87.99.48 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.54 (Unix) PHP/4.4.0 SERVER IP: 218.87.99.48 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 218.87.99.48 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.xinzheng.gov.cn | 222.137.252.25 |
SERVER IP: 222.137.252.25 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache-Coyote/1.1 |
www.xjbz.gov.cn | 218.31.132.251 |
SERVER IP: 218.31.132.251 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.xjbzsfj.gov.cn | 218.31.132.251 |
SERVER IP: 218.31.132.251 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.xjciq.gov.cn | 61.152.94.254 |
SERVER IP: 61.152.94.254 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.xjdrc.gov.cn | 203.207.200.88 |
SERVER IP: 203.207.200.88 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache Coyote/1.0 |
www.xjedu.gov.cn | 220.171.88.71 |
SERVER IP: 220.171.88.71 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.xjepb.gov.cn | 218.30.97.82 |
SERVER IP: 218.30.97.82 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.xjfy.gov.cn | 61.128.123.101 |
SERVER IP: 61.128.123.101 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.xjhm.gov.cn | 218.31.113.246 |
SERVER IP: 218.31.113.246 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.xjjz.gov.cn | 61.128.109.193 |
SERVER IP: 61.128.109.193 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.xjlt.gov.cn | 218.84.209.2 |
SERVER IP: 218.84.209.2 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.xjnewqi.gov.cn | 222.82.217.84 |
SERVER IP: 222.82.217.84 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 |
www.xjnj.gov.cn | 219.232.237.37 |
SERVER IP: 219.232.237.37 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.xjsafety.gov.cn | 61.128.101.131 |
SERVER IP: 61.128.101.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.xjsj.gov.cn | 222.82.214.166 |
SERVER IP: 222.82.214.166 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.xjwh.gov.cn | 159.226.134.15 |
SERVER IP: 159.226.134.15 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.xm.gov.cn | 202.101.105.173 |
SERVER IP: 202.101.105.173 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.xmedu.gov.cn | 218.5.84.21 |
SERVER IP: 218.5.84.21 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.52 (CentOS) mod_perl/1.99_16 Perl/v5.8.5 DAV/2 mod_auth_kerb/5.0-rc4 mod_auth_pgsql/2.0.1 PHP/5.1.6 mod_python/3.1.3 Python/2.3.4 mod_ssl/2.0.52 OpenSSL/0.9.7a SVN/1.1.4 SERVER IP: 218.5.84.21 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 218.5.84.21 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 218.5.84.21 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 218.5.84.21 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 SERVER IP: 218.5.84.21 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756 BID : 23359, 24089, 24259, 24261 SERVER IP: 218.5.84.21 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806 BID : 25498 SERVER IP: 218.5.84.21 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 SERVER IP: 218.5.84.21 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
www.xnsf.gov.cn | 220.179.115.76 |
SERVER IP: 220.179.115.76 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.xntv.gov.cn | 220.167.224.85 |
SERVER IP: 220.167.224.85 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.xq.gov.cn | 61.181.80.2 |
SERVER IP: 61.181.80.2 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.xsbn.gov.cn | 218.63.244.138 |
SERVER IP: 218.63.244.138 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.xtwqb.gov.cn | 218.75.241.186 |
SERVER IP: 218.75.241.186 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Resin/2.1.13 |
www.xushui.gov.cn | 221.194.46.67 |
SERVER IP: 221.194.46.67 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.xxz.gov.cn | 218.76.65.35 |
SERVER IP: 218.76.65.35 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.2.3 (Win32) PHP/5.1.4 SERVER IP: 218.76.65.35 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 218.76.65.35 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 SERVER IP: 218.76.65.35 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756 BID : 23359, 24089, 24259, 24261 SERVER IP: 218.76.65.35 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806 BID : 25498 SERVER IP: 218.76.65.35 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
www.xzcd.gov.cn | 218.30.96.147 |
SERVER IP: 218.30.96.147 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.xzzx.gov.cn | 221.229.242.227 |
SERVER IP: 221.229.242.227 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.yangchun.gov.cn | 219.129.188.115 |
SERVER IP: 219.129.188.115 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.yangjiang.gov.cn | 202.104.212.42 |
SERVER IP: 202.104.212.42 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.yangling.gov.cn | 61.150.65.252 |
SERVER IP: 61.150.65.252 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.26 (Win32) tomcat/1.0 |
www.yangpu.gov.cn | 202.100.210.107 |
SERVER IP: 202.100.210.107 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.2.3 (Unix) PHP/5.1.6 mod_jk/1.2.18 mod_ssl/2.2.3 OpenSSL/0.9.8d |
www.yangzhou.gov.cn | 61.177.180.12 |
SERVER IP: 61.177.180.12 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.2.6 (Unix) DAV/2 PHP/5.2.4 SERVER IP: 61.177.180.12 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
www.yantai.gov.cn | 61.156.14.60 |
SERVER IP: 61.156.14.60 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: TongWeb Application Server/3.5 ( JSP 1.2, Servlet 2.3 ) |
www.yaodu.gov.cn | 60.28.239.26 |
SERVER IP: 60.28.239.26 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.ybrc.gov.cn | 61.188.201.23 |
SERVER IP: 61.188.201.23 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.ybzfcg.gov.cn | 202.111.175.205 |
SERVER IP: 202.111.175.205 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Resin/2.1.6 |
www.yczscq.gov.cn | 218.30.96.32 |
SERVER IP: 218.30.96.32 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.yellowriver.gov.cn | 218.28.41.8 |
SERVER IP: 218.28.41.8 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.yh.gov.cn | 61.175.219.229 |
SERVER IP: 61.175.219.229 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.yintai.gov.cn | 61.134.55.246 |
SERVER IP: 61.134.55.246 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.2.4 (FreeBSD) mod_ssl/2.2.4 OpenSSL/0.9.7e-p1 DAV/2 PHP/5.2.3 with Suhosin-Patch SERVER IP: 61.134.55.246 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 61.134.55.246 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806 BID : 25498 SERVER IP: 61.134.55.246 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 SERVER IP: 61.134.55.246 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
www.yixian.gov.cn | 218.23.149.22 |
SERVER IP: 218.23.149.22 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.yjkjj.gov.cn | 210.75.48.103 |
SERVER IP: 210.75.48.103 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.ylagri.gov.cn | 61.150.65.252 |
SERVER IP: 61.150.65.252 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.26 (Win32) tomcat/1.0 |
www.ynagri.gov.cn | 220.197.227.26 |
SERVER IP: 220.197.227.26 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.ynaic.gov.cn | 202.98.187.117 |
SERVER IP: 202.98.187.117 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.ynbsm.gov.cn | 116.52.13.123 |
SERVER IP: 116.52.13.123 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.ynciq.gov.cn | 220.163.86.189 |
SERVER IP: 220.163.86.189 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.ynepb.gov.cn | 211.92.151.134 222.221.6.250 |
SERVER IP: 211.92.151.134 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 SERVER IP: 222.221.6.250 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.yngb.gov.cn | 218.5.77.110 |
SERVER IP: 218.5.77.110 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.ynjst.gov.cn | 220.163.6.180 |
SERVER IP: 220.163.6.180 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: WebSphere Application Server/5.0 SERVER IP: 220.163.6.180 PORT/PROTOCOL: 80/tcp TYPE: NOTE Synopsis : The remote host is vulnerable to a flaw which allows attackers to retrieve sensitive files or data The remote WebSphere webserver is vulnerable to an information leak. That is, user information is sometimes stored under the profile of the 'default' user. Unintended users may gain access to this information and use the information to elevate privileges on the remote machine. It is also possible that the default user account may disclose information regarding other users. CVSS Base Score : 2 AV:R/AC:L/Au:NR/C:P/I:N/A:N/B:N Solution : Upgrade to the most recent version of WebSphere BID : 11816 SERVER IP: 220.163.6.180 PORT/PROTOCOL: 80/tcp TYPE: NOTE Synopsis : The remote host is vulnerable to a flaw which allows attackers to retrieve sensitive files or data The remote WebSphere webserver is vulnerable to an information leak. That is, there is a flaw in the JSP engine which would allow a remote attacker to view the source code of any of the webserver scripts. An attacker, exploiting this flaw, would only need to be able to send HTTP requests to the webserver. CVSS Base Score : 2 AV:R/AC:L/Au:NR/C:P/I:N/A:N/B:N Solution : Upgrade to the most recent version of WebSphere BID : 12537, 12538 SERVER IP: 220.163.6.180 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a flaw which allows attackers to retrieve sensitive files The remote WebSphere webserver is vulnerable to an information leak. That is, there is a flaw in the way that WebSphere determines the web root directory based on the HTTP 'Host' tag. An application server which has it's root web directory defined in the Web Servers root directory may be coerced into disclosing the source of .JSP files. JSP source code often contains information which is useful for further, more sophisticated, attacks. Further, this version of Websphere is vulnerable to a remote Cross-Site-Scripting (XSS) attack. An attacker, exploiting this flaw, would typically need to coerce a user into browsing to a malicious URI. Successful exploitation would result in the theft of Confidential materials (such as authentication Cookies). CVSS Base Score : 4 AV:R/AC:L/Au:NR/C:P/I:N/A:N/B:C Solution : Upgrade to the most recent version of WebSphere CVE : CVE-2005-1112 BID : 13160, 13853, 13349 SERVER IP: 220.163.6.180 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to a flaw which allows attackers to retrieve sensitive files or data The remote WebSphere webserver is vulnerable to an information leak. That is, there is a flaw in the way that WebSphere processes filtered requests which end with a '/'. For instance, if the file test.jsp required authentication, an attacker could simply request test.jsp/ and retrieve the page. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to the most recent version of WebSphere CVE : CVE-2006-2342 BID : 17900 |
www.ynjy.gov.cn | 222.56.47.54 |
SERVER IP: 222.56.47.54 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache Coyote/1.0 |
www.ynly.gov.cn | 220.166.64.198 |
SERVER IP: 220.166.64.198 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.ynsafety.gov.cn | 61.159.228.46 |
SERVER IP: 61.159.228.46 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache-Coyote/1.1 |
www.yongzhou.gov.cn | 222.243.203.230 |
SERVER IP: 222.243.203.230 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.ytjcy.gov.cn | 218.75.229.204 |
SERVER IP: 218.75.229.204 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.ytrc.gov.cn | 61.156.14.79 |
SERVER IP: 61.156.14.79 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.yuli.gov.cn | 218.84.205.229 |
SERVER IP: 218.84.205.229 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.yuncheng.gov.cn | 202.99.213.149 |
SERVER IP: 202.99.213.149 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.yw.gov.cn | 220.191.229.7 |
SERVER IP: 220.191.229.7 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.52 (Red Hat) |
www.yzcity.gov.cn | 222.243.209.140 |
SERVER IP: 222.243.209.140 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.2.4 (Win32) PHP/5.2.0 SERVER IP: 222.243.209.140 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 222.243.209.140 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 SERVER IP: 222.243.209.140 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756 BID : 23359, 24089, 24259, 24261 SERVER IP: 222.243.209.140 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806 BID : 25498 SERVER IP: 222.243.209.140 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
www.yzwjm.gov.cn | 61.177.180.7 |
SERVER IP: 61.177.180.7 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.zftec.gov.cn | 218.108.45.99 |
SERVER IP: 218.108.45.99 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) Resin/2.1.17 |
www.zgc-sjs.gov.cn | 61.49.1.73 |
SERVER IP: 61.49.1.73 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.2.3 (Win32) DAV/2 mod_ssl/2.2.3 OpenSSL/0.9.8d mod_autoindex_color PHP/5.2.0 SERVER IP: 61.49.1.73 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 61.49.1.73 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 SERVER IP: 61.49.1.73 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756 BID : 23359, 24089, 24259, 24261 SERVER IP: 61.49.1.73 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806 BID : 25498 SERVER IP: 61.49.1.73 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 SERVER IP: 61.49.1.73 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
www.zgcqxs.gov.cn | 219.153.9.250 |
SERVER IP: 219.153.9.250 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.zglz.gov.cn | 210.76.63.186 |
SERVER IP: 210.76.63.186 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.zgwj.gov.cn | 58.211.71.34 |
SERVER IP: 58.211.71.34 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.zgyn.gov.cn | 218.31.66.83 |
SERVER IP: 218.31.66.83 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 |
www.zgyzedz.gov.cn | 221.130.192.7 |
SERVER IP: 221.130.192.7 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.zh315.gov.cn | 61.143.38.166 |
SERVER IP: 61.143.38.166 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 |
www.zhciq.gov.cn | 218.13.180.69 |
SERVER IP: 218.13.180.69 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.28 Apache/1.3.28 (Win32) |
www.zhcxy.gov.cn | 202.105.183.226 |
SERVER IP: 202.105.183.226 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.zhijiang.gov.cn | 202.103.41.60 |
SERVER IP: 202.103.41.60 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.33 (Unix) PHP/4.1.2 SERVER IP: 202.103.41.60 PORT/PROTOCOL: 80/tcp TYPE: INFO The remote web server is running a version of PHP which is older than 4.2.2. This version has a bug in its mail() function which does not properly sanitize user input. As a result, users can forge email to make it look like it is coming from a different source that the server. Solution : Upgrade to PHP 4.2.2 CVE : CVE-2002-0986, CVE-2002-0985 BID : 5562 SERVER IP: 202.103.41.60 PORT/PROTOCOL: 80/tcp TYPE: NOTE The remote host is running a version of PHP which is older than 4.3.2. This version contains various flaws that may allow an attacker who has the ability to execute PHP scripts in safe_mode on this host to execute arbitrary commands with the privileges of the HTTP daemon Solution : Upgrade to PHP 4.3.2 CVE : CVE-2003-0166 BID : 7256, 7259, 7187, 7197, 7198, 7199, 7210 SERVER IP: 202.103.41.60 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Script Injection attack The remote host is running a version of PHP which is older than 5.0.3 or 4.3.10. The remote version of this software is vulnerable to various security issues which may, under certain circumstances, allow attackers to execute arbitrary code on the remote host, provided that they can pass arbitrary data to some functions or bypass safe_mode. CVSS Base Score : 6 AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to PHP 5.0.3 or 4.3.10 CVE : CVE-2004-1018, CVE-2004-1019, CVE-2004-1020, CVE-2004-1063, CVE-2004-1064, CVE-2004-1065 BID : 11964, 11981, 11992, 12045 SERVER IP: 202.103.41.60 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher. CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525 BID : 12963, 12962, 13143, 13163, 13164 SERVER IP: 202.103.41.60 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 202.103.41.60 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.zhoukou.gov.cn | 61.163.238.20 |
SERVER IP: 61.163.238.20 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.zhuzhou.gov.cn | 218.244.130.211 |
SERVER IP: 218.244.130.211 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.zjdpc.gov.cn | 218.108.28.14 |
SERVER IP: 218.108.28.14 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.zjet.gov.cn | 202.96.140.50 |
SERVER IP: 202.96.140.50 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/4.0 - The remote host is running a Microsoft IIS webserver |
www.zjj.gov.cn | 220.168.198.248 |
SERVER IP: 220.168.198.248 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.zjjcy.gov.cn | 218.75.74.218 |
SERVER IP: 218.75.74.218 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.zjjsw.gov.cn | 218.108.29.42 |
SERVER IP: 218.108.29.42 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/5.0 |
www.zjkjt.gov.cn | 202.107.204.34 |
SERVER IP: 202.107.204.34 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.51 (Unix) |
www.zjpat.gov.cn | 202.107.204.209 |
SERVER IP: 202.107.204.209 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Resin/2.1.12 |
www.zjsjt.gov.cn | 220.191.243.226 |
SERVER IP: 220.191.243.226 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.34 (Win32) |
www.zjskw.gov.cn | 60.191.49.103 |
SERVER IP: 60.191.49.103 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.zjsllkh.gov.cn | 210.25.0.100 |
SERVER IP: 210.25.0.100 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.zjwh.gov.cn | 218.108.238.136 |
SERVER IP: 218.108.238.136 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.54 (Unix) PHP/5.0.4 SERVER IP: 218.108.238.136 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP which is older than 5.0.5. This version has a number of bugs which allow attackers to execute or retrieve arbitrary files outside of the web root directory. An attacker, exploiting these flaws, would only need to send a malformed HTTP request to the vulnerable system. Successful exploitation would result in the loss of Confidential data or a tarnishing of system Integrity. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 5.0.5 or later BID : 15119 SERVER IP: 218.108.238.136 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host may give an attacker information useful for future attacks The remote host is running a version of PHP which is older than 5.0.6. This version has a flaw wherein remote attackers can reenable the 'register_globals' parameter. In addition, a remote attacker may be able to overwrite the 'GLOBAL' variable. This may lead to another, more serious, exploitation. CVSS Base Score : 9.3 CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C Solution : Upgrade to PHP 5.0.6 or later See also : http://www.php.net/release_4_4_1.php CVE : CVE-2006-0395, CVE-2005-2713, CVE-2005-2714, CVE-2005-3319, CVE-2005-3353, CVE-2005-3389, CVE-2005-3706, CVE-2005-3712, CVE-2005-4217, CVE-2005-4504, CVE-2006-0383, CVE-2006-0384, CVE-2006-0386, CVE-2006-0387, CVE-2006-0388, CVE-2006-0389, CVE-2006-0391, CVE-2006-3016, CVE-2006-3018, CVE-2005-3883, CVE-2006-3017, CVE-2005-3390, CVE-2005-3392, CVE-2005-3391 BID : 15571, 16907, 17843, 15249, 15411, 15413, 15250 SERVER IP: 218.108.238.136 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 218.108.238.136 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 SERVER IP: 218.108.238.136 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756 BID : 23359, 24089, 24259, 24261 SERVER IP: 218.108.238.136 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806 BID : 25498 SERVER IP: 218.108.238.136 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
www.zqrcw.gov.cn | 61.145.126.35 |
SERVER IP: 61.145.126.35 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.zshuangpu.gov.cn | 61.142.80.100 |
SERVER IP: 61.142.80.100 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.zsqw.gov.cn | 61.142.80.232 61.142.80.248 |
SERVER IP: 61.142.80.232 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 SERVER IP: 61.142.80.248 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.zycg.gov.cn | 61.135.227.116 |
SERVER IP: 61.135.227.116 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |