|
Cryptome DVDs are offered by Cryptome. Donate $25 for two DVDs of the Cryptome 12-years collection of 46,000 files from June 1996 to June 2008 (~6.7 GB). Click Paypal or mail check/MO made out to John Young, 251 West 89th Street, New York, NY 10024. The collection includes all files of cryptome.org, jya.com, cartome.org, eyeball-series.org and iraq-kill-maim.org, and 23,000 (updated) pages of counter-intelligence dossiers declassified by the US Army Information and Security Command, dating from 1945 to 1985.The DVDs will be sent anywhere worldwide without extra cost. |
2 December 2007
See also report on Iran government: http://cryptome.info/0001/gov-ir.htm
A sends:
Thought your readers might be interested in PK, too...
Just making people aware of what information can be found, when you open your eyes to it.
Table Cell Color Keys | |
Grey | No analysis report generated. Could be due to server being down, not reponding to our request, or not existing. |
White | Nothing of interest to report |
Yellow | Notes are provided on findings but nothing significant found. |
Pink | More information is provided on findings, usually contained with systems having a vulnerability report. More valued information over just notes. |
Red | Report has been generated with findings for potential vulnerability information. |
Domain Name | IP ADDRESS | Information Identified |
www.abbottabad.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.academy.gov.pk | 67.18.34.220 |
SERVER IP: 67.18.34.220 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver SERVER IP: 67.18.34.220 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 67.18.34.220 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.aepam.gov.pk | 66.252.7.187 |
SERVER IP: 66.252.7.187 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.afic.gov.pk | 64.151.197.190 |
SERVER IP: 64.151.197.190 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.51 (Fedora) |
www.agp.gov.pk | 66.252.7.187 |
SERVER IP: 66.252.7.187 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
agpr.gov.pk | 64.38.4.122 |
SERVER IP: 64.38.4.122 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
agpunjab.gov.pk | 203.128.6.132 |
SERVER IP: 203.128.6.132 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver SERVER IP: 203.128.6.132 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
www.agricbal.gov.pk | 202.133.44.6 |
SERVER IP: 202.133.44.6 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.40 (Red Hat Linux) |
www.ajk.gov.pk | 203.135.0.17 |
SERVER IP: 203.135.0.17 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.54 (Unix) DAV/2 PHP/4.3.11 SERVER IP: 203.135.0.17 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 203.135.0.17 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.ajkmdrp.gov.pk | 72.9.156.44 |
SERVER IP: 72.9.156.44 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a PHP-CGI/0.1b SERVER IP: 72.9.156.44 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 72.9.156.44 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 72.9.156.44 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 72.9.156.44 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 SERVER IP: 72.9.156.44 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
www.ajkpolice.gov.pk | 72.9.144.119 |
SERVER IP: 72.9.144.119 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.ajp.gov.pk | 63.134.249.99 |
SERVER IP: 63.134.249.99 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.alp.gov.pk | 66.252.21.131 |
SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
amis.gov.pk | 66.252.7.187 |
SERVER IP: 66.252.7.187 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.34 (Unix) PHP/4.4.0 SERVER IP: 66.252.7.187 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 66.252.7.187 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.amis.gov.pk | 66.252.7.187 |
SERVER IP: 66.252.7.187 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.34 (Unix) PHP/4.4.0 SERVER IP: 66.252.7.187 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 66.252.7.187 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
anf.gov.pk | 66.252.21.131 |
SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix) |
www.anf.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix) |
armystaffcollege.gov.pk | 69.80.208.202 |
SERVER IP: 69.80.208.202 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.attockpolice.gov.pk | 66.252.7.187 |
SERVER IP: 66.252.7.187 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
bahawalnagarpolice.gov.pk | 70.87.181.66 |
SERVER IP: 70.87.181.66 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.bahawalpur.gov.pk | 66.197.217.37 |
SERVER IP: 66.197.217.37 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.8a PHP-CGI/0.1b SERVER IP: 66.197.217.37 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 66.197.217.37 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
www.bahawalpurpolice.gov.pk | 203.128.6.131 |
SERVER IP: 203.128.6.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver SERVER IP: 203.128.6.131 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
www.balochistanpolice.gov.pk | 213.171.219.2 |
SERVER IP: 213.171.219.2 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver SERVER IP: 213.171.219.2 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Script Injection attack The remote host is running a version of PHP which is older than 5.0.3 or 4.3.10. The remote version of this software is vulnerable to various security issues which may, under certain circumstances, allow attackers to execute arbitrary code on the remote host, provided that they can pass arbitrary data to some functions or bypass safe_mode. CVSS Base Score : 6 AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to PHP 5.0.3 or 4.3.10 CVE : CVE-2004-1018, CVE-2004-1019, CVE-2004-1020, CVE-2004-1063, CVE-2004-1064, CVE-2004-1065 BID : 11964, 11981, 11992, 12045 SERVER IP: 213.171.219.2 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher. CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525 BID : 12963, 12962, 13143, 13163, 13164 SERVER IP: 213.171.219.2 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 213.171.219.2 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.bankingmohtasib.gov.pk | 66.201.122.45 |
SERVER IP: 66.201.122.45 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver SERVER IP: 66.201.122.45 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Script Injection attack The remote host is running a version of PHP which is older than 5.0.3 or 4.3.10. The remote version of this software is vulnerable to various security issues which may, under certain circumstances, allow attackers to execute arbitrary code on the remote host, provided that they can pass arbitrary data to some functions or bypass safe_mode. CVSS Base Score : 6 AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to PHP 5.0.3 or 4.3.10 CVE : CVE-2004-1018, CVE-2004-1019, CVE-2004-1020, CVE-2004-1063, CVE-2004-1064, CVE-2004-1065 BID : 11964, 11981, 11992, 12045 SERVER IP: 66.201.122.45 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher. CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525 BID : 12963, 12962, 13143, 13163, 13164 SERVER IP: 66.201.122.45 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 66.201.122.45 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.beoe.gov.pk | 203.135.1.114 |
SERVER IP: 203.135.1.114 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.bhakkar.gov.pk | 203.135.0.17 |
SERVER IP: 203.135.0.17 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.54 (Unix) DAV/2 PHP/4.3.11 SERVER IP: 203.135.0.17 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 203.135.0.17 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.bhakkarpolice.gov.pk | 203.128.6.132 |
SERVER IP: 203.128.6.132 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.borsindh.gov.pk | 66.206.28.16 |
SERVER IP: 66.206.28.16 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 |
buner.gov.pk | 72.9.144.119 |
SERVER IP: 72.9.144.119 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.cabinet.gov.pk | 66.252.7.187 |
SERVER IP: 66.252.7.187 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
www.cbfc.gov.pk | 203.135.1.114 |
SERVER IP: 203.135.1.114 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
e.cbr.gov.pk | 58.65.168.244 |
SERVER IP: 58.65.168.244 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.cbr.gov.pk | 66.201.122.201 |
SERVER IP: 66.201.122.201 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 |
www.cda.gov.pk | 63.134.214.91 |
SERVER IP: 63.134.214.91 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.census.gov.pk | 66.252.7.187 |
SERVER IP: 66.252.7.187 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.cesat.gov.pk | 203.135.39.166 |
SERVER IP: 203.135.39.166 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.40 (Red Hat Linux) |
www.chakwal.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.cii.gov.pk | 66.252.21.131 |
SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.cmtl.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
commerce.gov.pk | 66.252.21.131 |
SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.commerce.gov.pk | 66.252.7.187 |
SERVER IP: 66.252.7.187 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.communication.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix) |
www.cpwb.gov.pk | 203.128.6.132 |
SERVER IP: 203.128.6.132 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.csru.gov.pk | 203.135.1.114 |
SERVER IP: 203.135.1.114 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.culture.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix) |
www.customhyd.gov.pk | 203.135.1.114 |
SERVER IP: 203.135.1.114 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.cwhr.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.34 (Unix) PHP/4.4.0 SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.dgip.gov.pk | 66.252.7.187 |
SERVER IP: 66.252.7.187 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
www.dgkpolice.gov.pk | 203.175.64.21 |
SERVER IP: 203.175.64.21 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
ead.gov.pk | 66.252.7.187 |
SERVER IP: 66.252.7.187 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix) |
www.ead.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix) |
www.eadtraining.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.ecp.gov.pk | 209.71.203.44 |
SERVER IP: 209.71.203.44 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.edc.gov.pk | 69.25.27.170 |
SERVER IP: 69.25.27.170 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.49 (Unix) PHP/4.3.9 SERVER IP: 69.25.27.170 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Script Injection attack The remote host is running a version of PHP which is older than 5.0.3 or 4.3.10. The remote version of this software is vulnerable to various security issues which may, under certain circumstances, allow attackers to execute arbitrary code on the remote host, provided that they can pass arbitrary data to some functions or bypass safe_mode. CVSS Base Score : 6 AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to PHP 5.0.3 or 4.3.10 CVE : CVE-2004-1018, CVE-2004-1019, CVE-2004-1020, CVE-2004-1063, CVE-2004-1064, CVE-2004-1065 BID : 11964, 11981, 11992, 12045 SERVER IP: 69.25.27.170 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher. CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525 BID : 12963, 12962, 13143, 13163, 13164 SERVER IP: 69.25.27.170 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 69.25.27.170 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.elections.gov.pk | 209.71.203.44 |
SERVER IP: 209.71.203.44 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.enercon.gov.pk | 66.252.21.131 |
SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.eobi.gov.pk | 202.163.115.10 |
SERVER IP: 202.163.115.10 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.ep.gov.pk | 202.165.238.12 |
SERVER IP: 202.165.238.12 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/5.0 |
www.epb.gov.pk | 72.29.70.239 |
SERVER IP: 72.29.70.239 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.33 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 PHP/4.3.11 FrontPage/5.0.2.2634a mod_ssl/2.8.22 OpenSSL/0.9.7a SERVER IP: 72.29.70.239 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 72.29.70.239 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 72.29.70.239 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 72.29.70.239 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 SERVER IP: 72.29.70.239 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
www.epblhr.gov.pk | 203.128.6.132 |
SERVER IP: 203.128.6.132 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.epza.gov.pk | 67.18.119.226 |
SERVER IP: 67.18.119.226 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.erra.gov.pk | 203.175.64.18 |
SERVER IP: 203.175.64.18 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.establishment.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
www.etax.gov.pk | 203.135.1.114 |
SERVER IP: 203.135.1.114 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/5.0 |
www.expopakistan.gov.pk | 67.15.97.231 |
SERVER IP: 67.15.97.231 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
faef.gov.pk | 203.124.43.12 |
SERVER IP: 203.124.43.12 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_gzip/1.3.26.1a mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a SERVER IP: 203.124.43.12 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 203.124.43.12 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 203.124.43.12 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
www.faisalabad.gov.pk | 203.124.43.40 |
SERVER IP: 203.124.43.40 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.faisalabadpolice.gov.pk | 208.106.165.232 |
SERVER IP: 208.106.165.232 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
fata.gov.pk | 74.50.0.40 |
SERVER IP: 74.50.0.40 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache Webserver |
www.fata.gov.pk | 74.50.0.40 |
SERVER IP: 74.50.0.40 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache Webserver |
www.fatada.gov.pk | 65.98.69.93 |
SERVER IP: 65.98.69.93 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.fatimajinnah.gov.pk | 64.191.87.151 |
SERVER IP: 64.191.87.151 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 PHP/4.4.7 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a SERVER IP: 64.191.87.151 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 64.191.87.151 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 64.191.87.151 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
fbr.gov.pk | 66.201.122.201 |
SERVER IP: 66.201.122.201 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 |
www.fda.gov.pk | 203.135.1.114 |
SERVER IP: 203.135.1.114 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.fde.gov.pk | 203.135.1.114 |
SERVER IP: 203.135.1.114 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/5.0 |
www.fdsindh.gov.pk | 202.163.115.13 |
SERVER IP: 202.163.115.13 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver SERVER IP: 202.163.115.13 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 202.163.115.13 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.fgehf.gov.pk | 66.252.21.131 |
SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.fia.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
iso.finance.gov.pk | 66.38.187.70 |
SERVER IP: 66.38.187.70 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.finance.gov.pk | 66.38.187.70 |
SERVER IP: 66.38.187.70 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.financedeptsindh.gov.pk | 203.135.0.29 |
SERVER IP: 203.135.0.29 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.2.4 (FreeBSD) mod_ssl/2.2.4 OpenSSL/0.9.7e-p1 DAV/2 PHP/5.2.0 with Suhosin-Patch SERVER IP: 203.135.0.29 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 203.135.0.29 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 203.135.0.29 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 SERVER IP: 203.135.0.29 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756 BID : 23359, 24089, 24259, 24261 SERVER IP: 203.135.0.29 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806 BID : 25498 SERVER IP: 203.135.0.29 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 SERVER IP: 203.135.0.29 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
www.fm101.gov.pk | 209.71.203.44 |
SERVER IP: 209.71.203.44 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.foodsindh.gov.pk | 202.163.115.13 |
SERVER IP: 202.163.115.13 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 |
www.forms.gov.pk | 66.252.21.131 |
SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix) |
www.fpsc.gov.pk | 66.252.21.131 |
SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.fsc.gov.pk | 66.252.21.131 |
SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix) |
www.gda.gov.pk | 66.197.236.245 |
SERVER IP: 66.197.236.245 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a PHP-CGI/0.1b SERVER IP: 66.197.236.245 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 66.197.236.245 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 66.197.236.245 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
www.gefpak.gov.pk | 66.252.21.131 |
SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.gjtmap.gov.pk | 209.200.229.202 |
SERVER IP: 209.200.229.202 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache Webserver |
www.governorpunjab.gov.pk | 70.84.169.162 |
SERVER IP: 70.84.169.162 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
www.governorsindh.gov.pk | 66.232.101.177 |
SERVER IP: 66.232.101.177 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.grbi.gov.pk | 64.38.4.122 |
SERVER IP: 64.38.4.122 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.grbipunjab.gov.pk | 74.220.207.60 |
SERVER IP: 74.220.207.60 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.39 (Unix) mod_fastcgi/2.4.2 mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b SERVER IP: 74.220.207.60 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 74.220.207.60 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 74.220.207.60 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
www.gsp.gov.pk | 67.18.7.162 |
SERVER IP: 67.18.7.162 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a PHP-CGI/0.1b SERVER IP: 67.18.7.162 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 67.18.7.162 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 67.18.7.162 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
www.gujranwalapolice.gov.pk | 208.106.165.231 |
SERVER IP: 208.106.165.231 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.gujratpolice.gov.pk | 63.134.240.86 |
SERVER IP: 63.134.240.86 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
gulbergtownlahore.gov.pk | 64.17.164.213 |
SERVER IP: 64.17.164.213 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.gulshantownkarachi.gov.pk | 66.201.122.143 |
SERVER IP: 66.201.122.143 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.gwadarport.gov.pk | 66.252.21.131 |
SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.hafizabadpolice.gov.pk | 203.128.6.131 |
SERVER IP: 203.128.6.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 |
health.gov.pk | 66.252.21.131 |
SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
www.health.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
www.healthnwfp.gov.pk | 65.98.69.94 |
SERVER IP: 65.98.69.94 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
beta.hec.gov.pk | 67.18.246.6 |
SERVER IP: 67.18.246.6 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a PHP-CGI/0.1b SERVER IP: 67.18.246.6 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 67.18.246.6 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 67.18.246.6 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806 BID : 25498 SERVER IP: 67.18.246.6 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 SERVER IP: 67.18.246.6 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
eprints.hec.gov.pk | 202.83.173.66 |
SERVER IP: 202.83.173.66 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.2.0 (Fedora) |
www.hec.gov.pk | 70.84.244.199 |
SERVER IP: 70.84.244.199 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.heritage.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
www.hesco.gov.pk | 203.135.1.114 |
SERVER IP: 203.135.1.114 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.housing.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix) |
www.hyderabadpolice.gov.pk | 203.135.1.114 |
SERVER IP: 203.135.1.114 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.iap.gov.pk | 64.191.81.181 |
SERVER IP: 64.191.81.181 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_jk/1.2.14 mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a PHP-CGI/0.1b SERVER IP: 64.191.81.181 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 64.191.81.181 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 64.191.81.181 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
www.ideaspakistan.gov.pk | 64.26.63.18 |
SERVER IP: 64.26.63.18 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.54 (Debian GNU/Linux) FrontPage/5.0.2.2635 mod_ssl/2.0.54 OpenSSL/0.9.7e SERVER IP: 64.26.63.18 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 64.26.63.18 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
infopak.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.infopak.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
interior.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
www.interior.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
www.ipc.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
ipdf.gov.pk | 209.71.203.20 |
SERVER IP: 209.71.203.20 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.54 (Linux/SUSE) |
www.iphq.gov.pk | 67.18.7.162 |
SERVER IP: 67.18.7.162 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a PHP-CGI/0.1b SERVER IP: 67.18.7.162 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 67.18.7.162 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 67.18.7.162 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
www.ipo.gov.pk | 208.109.87.136 |
SERVER IP: 208.109.87.136 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.ispr.gov.pk | 72.3.142.125 |
SERVER IP: 72.3.142.125 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.itp.gov.pk | 72.9.145.70 |
SERVER IP: 72.9.145.70 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b SERVER IP: 72.9.145.70 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 72.9.145.70 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 72.9.145.70 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
www.jhangpolice.gov.pk | 203.135.1.114 |
SERVER IP: 203.135.1.114 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.jobs.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.joinpakarmy.gov.pk | 203.135.0.29 |
SERVER IP: 203.135.0.29 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.2.4 (FreeBSD) mod_ssl/2.2.4 OpenSSL/0.9.7e-p1 DAV/2 PHP/5.2.0 with Suhosin-Patch SERVER IP: 203.135.0.29 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 203.135.0.29 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 203.135.0.29 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 SERVER IP: 203.135.0.29 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756 BID : 23359, 24089, 24259, 24261 SERVER IP: 203.135.0.29 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806 BID : 25498 SERVER IP: 203.135.0.29 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 SERVER IP: 203.135.0.29 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
www.kana.gov.pk | 66.252.21.131 |
SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix) |
www.karachicity.gov.pk | 69.80.208.214 |
SERVER IP: 69.80.208.214 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 |
www.kashmir.gov.pk | 203.135.0.17 |
SERVER IP: 203.135.0.17 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.54 (Unix) DAV/2 PHP/4.3.11 SERVER IP: 203.135.0.17 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 203.135.0.17 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.kasurpolice.gov.pk | 70.87.181.66 |
SERVER IP: 70.87.181.66 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.kbca.gov.pk | 72.9.147.110 |
SERVER IP: 72.9.147.110 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a PHP-CGI/0.1b SERVER IP: 72.9.147.110 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 72.9.147.110 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 72.9.147.110 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
www.kcb.gov.pk | 209.172.48.85 |
SERVER IP: 209.172.48.85 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.50 (Fedora) |
sindhi.khairpur.gov.pk | 202.5.152.253 |
SERVER IP: 202.5.152.253 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
urdu.khairpur.gov.pk | 202.5.152.253 |
SERVER IP: 202.5.152.253 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.khanewalpolice.gov.pk | 203.128.6.131 |
SERVER IP: 203.128.6.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
khushabpolice.gov.pk | 70.87.181.66 |
SERVER IP: 70.87.181.66 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.kpf.gov.pk | 66.160.180.205 |
SERVER IP: 66.160.180.205 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.kpt.gov.pk | 203.124.43.23 |
SERVER IP: 203.124.43.23 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.ktp.gov.pk | 72.9.145.70 |
SERVER IP: 72.9.145.70 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b |
www.lahore.gov.pk | 202.125.140.68 |
SERVER IP: 202.125.140.68 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.lahorepolice.gov.pk | 74.52.179.50 |
SERVER IP: 74.52.179.50 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 |
www.lcb.gov.pk | 202.59.80.25 |
SERVER IP: 202.59.80.25 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.ldc.gov.pk | 72.9.157.42 |
SERVER IP: 72.9.157.42 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.lesco.gov.pk | 65.254.231.115 |
SERVER IP: 65.254.231.115 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.lhc.gov.pk | 204.3.198.53 |
SERVER IP: 204.3.198.53 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Rapidsite/Apa/1.3.33 (Unix) FrontPage/5.0.2.2510 mod_ssl/2.8.22 OpenSSL/0.9.8d SERVER IP: 204.3.198.53 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
www.lieda.gov.pk | 75.126.144.8 |
SERVER IP: 75.126.144.8 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.ljcp.gov.pk | 72.9.156.44 |
SERVER IP: 72.9.156.44 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a PHP-CGI/0.1b SERVER IP: 72.9.156.44 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 72.9.156.44 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 72.9.156.44 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
www.lodhranpolice.gov.pk | 203.128.6.131 |
SERVER IP: 203.128.6.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.ltukarachi.gov.pk | 66.232.103.61 |
SERVER IP: 66.232.103.61 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.mbdpolice.gov.pk | 66.197.236.245 |
SERVER IP: 66.197.236.245 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a PHP-CGI/0.1b SERVER IP: 66.197.236.245 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 66.197.236.245 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 66.197.236.245 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
www.mca.gov.pk | 209.71.203.44 |
SERVER IP: 209.71.203.44 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
mercantilemarine.gov.pk | 67.59.138.120 |
SERVER IP: 67.59.138.120 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
met.gov.pk | 66.252.21.131 |
SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
www.met.gov.pk | 66.252.21.131 |
SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
www.mianwalipolice.gov.pk | 203.128.6.131 |
SERVER IP: 203.128.6.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.minfal.gov.pk | 66.252.21.131 |
SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix) |
www.minorities.gov.pk | 66.252.21.131 |
SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix) |
www.mng.gov.pk | 63.134.235.106 |
SERVER IP: 63.134.235.106 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.mod.gov.pk | 66.252.21.131 |
SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix) |
www.moe.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/5.0 |
www.moeas.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix) |
www.moenv.gov.pk | 66.252.7.187 |
SERVER IP: 66.252.7.187 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix) |
mofa.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
www.mofa.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.mohtasib.gov.pk | 202.83.164.51 |
SERVER IP: 202.83.164.51 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/5.0 |
moip.gov.pk | 66.252.7.187 |
SERVER IP: 66.252.7.187 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix) |
www.moip.gov.pk | 66.252.7.187 |
SERVER IP: 66.252.7.187 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix) |
www.moit.gov.pk | 66.252.21.131 |
SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix) |
www.moitt.gov.pk | 66.252.21.131 |
SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix) |
www.moka.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix) |
www.molaw.gov.pk | 66.252.7.187 |
SERVER IP: 66.252.7.187 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix) |
www.molm.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix) |
www.mopa.gov.pk | 66.252.21.131 |
SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix) |
www.mops.gov.pk | 66.252.7.187 |
SERVER IP: 66.252.7.187 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix) |
www.mopw.gov.pk | 66.252.21.131 |
SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/5.0 |
www.mora.gov.pk | 66.252.7.187 |
SERVER IP: 66.252.7.187 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix) |
most.gov.pk | 66.252.7.187 |
SERVER IP: 66.252.7.187 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix) |
www.most.gov.pk | 66.252.21.131 |
SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
www.mowp.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix) |
www.moya.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix) |
www.mpnr.gov.pk | 66.252.21.131 |
SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix) |
mtbfpakistan.gov.pk | 72.9.144.119 |
SERVER IP: 72.9.144.119 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.mtbfpakistan.gov.pk | 72.9.144.119 |
SERVER IP: 72.9.144.119 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
multan.gov.pk | 66.193.188.132 |
SERVER IP: 66.193.188.132 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.multan.gov.pk | 66.193.188.132 |
SERVER IP: 66.193.188.132 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.multanpolice.gov.pk | 208.106.165.233 |
SERVER IP: 208.106.165.233 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.muzaffargarhpolice.gov.pk | 70.87.181.66 |
SERVER IP: 70.87.181.66 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.na.gov.pk | 66.252.7.187 |
SERVER IP: 66.252.7.187 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
www.nab.gov.pk | 66.252.21.131 |
SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.nacp.gov.pk | 72.52.150.46 |
SERVER IP: 72.52.150.46 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) PHP/5.1.2 mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a SERVER IP: 72.52.150.46 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 72.52.150.46 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 72.52.150.46 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 72.52.150.46 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 SERVER IP: 72.52.150.46 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756 BID : 23359, 24089, 24259, 24261 SERVER IP: 72.52.150.46 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806 BID : 25498 SERVER IP: 72.52.150.46 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 SERVER IP: 72.52.150.46 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
www.nadra.gov.pk | 58.65.166.228 |
SERVER IP: 58.65.166.228 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.narowalpolice.gov.pk | 72.9.148.100 |
SERVER IP: 72.9.148.100 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.39 (Unix) mod_bwlimited/1.4 mod_auth_passthrough/1.8 mod_log_bytes/1.2 FrontPage/5.0.2.2635 mod_ssl/2.8.30 OpenSSL/0.9.7a SERVER IP: 72.9.148.100 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 72.9.148.100 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 72.9.148.100 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
www.nat-ipm.gov.pk | 203.124.43.40 |
SERVER IP: 203.124.43.40 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.navtec.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
www.nawabshah.gov.pk | 203.135.1.114 |
SERVER IP: 203.135.1.114 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.ncb.gov.pk | 66.252.7.187 |
SERVER IP: 66.252.7.187 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.nccwd.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
forum.ncgr.gov.pk | 203.135.0.22 |
SERVER IP: 203.135.0.22 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.ncgr.gov.pk | 203.135.0.22 |
SERVER IP: 203.135.0.22 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.ncs-nsds.gov.pk | 203.124.43.40 |
SERVER IP: 203.124.43.40 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
ncsw.gov.pk | 64.38.19.130 |
SERVER IP: 64.38.19.130 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 PHP/4.4.7 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a SERVER IP: 64.38.19.130 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 64.38.19.130 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 64.38.19.130 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
www.ncsw.gov.pk | 64.38.19.130 |
SERVER IP: 64.38.19.130 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 PHP/4.4.7 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a SERVER IP: 64.38.19.130 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 64.38.19.130 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 64.38.19.130 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
www.ncsw1.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
ndma.gov.pk | 64.38.4.122 |
SERVER IP: 64.38.4.122 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
ndmc.gov.pk | 203.124.43.40 |
SERVER IP: 203.124.43.40 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.ndp.gov.pk | 203.135.1.114 |
SERVER IP: 203.135.1.114 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/5.0 |
ndpsindh.gov.pk | 67.18.7.162 |
SERVER IP: 67.18.7.162 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a PHP-CGI/0.1b SERVER IP: 67.18.7.162 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 67.18.7.162 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 67.18.7.162 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
www.neas.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.nescom.gov.pk | 203.135.39.163 |
SERVER IP: 203.135.39.163 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.40 (Red Hat Linux) |
www.nfc.gov.pk | 66.252.21.131 |
SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.nfdc.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.ngos.gov.pk | 72.9.156.44 |
SERVER IP: 72.9.156.44 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a PHP-CGI/0.1b SERVER IP: 72.9.156.44 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 72.9.156.44 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 72.9.156.44 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 72.9.156.44 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 SERVER IP: 72.9.156.44 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
www.ngosinfo.gov.pk | 72.9.157.42 |
SERVER IP: 72.9.157.42 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.nha.gov.pk | 209.124.60.43 |
SERVER IP: 209.124.60.43 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.nhmp.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.34 (Unix) PHP/4.4.0 SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.nhmpdb.gov.pk | 66.252.21.131 |
SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.nibaf.gov.pk | 66.252.21.131 |
SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.nim.gov.pk | 202.165.244.10 |
SERVER IP: 202.165.244.10 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.2.3 (Unix) mod_ssl/2.2.3 OpenSSL/0.9.7a PHP/5.2.0 SERVER IP: 202.165.244.10 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 202.165.244.10 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 202.165.244.10 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 202.165.244.10 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 SERVER IP: 202.165.244.10 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756 BID : 23359, 24089, 24259, 24261 SERVER IP: 202.165.244.10 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806 BID : 25498 SERVER IP: 202.165.244.10 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 SERVER IP: 202.165.244.10 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
www.nip.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix) |
www.nla.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
nlauit.gov.pk | 58.65.160.239 |
SERVER IP: 58.65.160.239 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/7.0 - The remote host is running a Microsoft IIS webserver |
www.nlauit.gov.pk | 58.65.160.239 |
SERVER IP: 58.65.160.239 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/7.0 - The remote host is running a Microsoft IIS webserver |
nlp.gov.pk | 69.80.208.238 |
SERVER IP: 69.80.208.238 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.nlp.gov.pk | 69.80.208.238 |
SERVER IP: 69.80.208.238 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.npb.gov.pk | 203.99.60.141 |
SERVER IP: 203.99.60.141 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.npo.gov.pk | 66.252.21.131 |
SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.nr3c.gov.pk | 72.9.152.14 |
SERVER IP: 72.9.152.14 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.nrb.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
www.nrss.gov.pk | 209.124.60.43 |
SERVER IP: 209.124.60.43 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.ntc.gov.pk | 209.71.203.41 |
SERVER IP: 209.71.203.41 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
ntp.gov.pk | 72.9.156.44 |
SERVER IP: 72.9.156.44 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a PHP-CGI/0.1b SERVER IP: 72.9.156.44 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 72.9.156.44 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 72.9.156.44 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
www.ntrc.gov.pk | 70.86.88.110 |
SERVER IP: 70.86.88.110 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
nwfp.gov.pk | 65.36.138.94 |
SERVER IP: 65.36.138.94 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.52 (Red Hat) SERVER IP: 65.36.138.94 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Script Injection attack The remote host is running a version of PHP which is older than 5.0.3 or 4.3.10. The remote version of this software is vulnerable to various security issues which may, under certain circumstances, allow attackers to execute arbitrary code on the remote host, provided that they can pass arbitrary data to some functions or bypass safe_mode. CVSS Base Score : 6 AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to PHP 5.0.3 or 4.3.10 CVE : CVE-2004-1018, CVE-2004-1019, CVE-2004-1020, CVE-2004-1063, CVE-2004-1064, CVE-2004-1065 BID : 11964, 11981, 11992, 12045 SERVER IP: 65.36.138.94 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher. CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525 BID : 12963, 12962, 13143, 13163, 13164 SERVER IP: 65.36.138.94 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 65.36.138.94 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.nwfppsc.gov.pk | 64.191.81.181 |
SERVER IP: 64.191.81.181 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_jk/1.2.14 mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a PHP-CGI/0.1b SERVER IP: 64.191.81.181 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 64.191.81.181 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 64.191.81.181 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
www.nwfpwildlifedept.gov.pk | 72.36.213.90 |
SERVER IP: 72.36.213.90 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
www.oec.gov.pk | 66.152.166.74 |
SERVER IP: 66.152.166.74 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.ombudsmanpunjab.gov.pk | 216.119.98.212 |
SERVER IP: 216.119.98.212 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.pac-klc.gov.pk | 72.18.137.187 |
SERVER IP: 72.18.137.187 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
paccs.gov.pk | 202.163.115.11 |
SERVER IP: 202.163.115.11 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.paco.gov.pk | 67.18.119.226 |
SERVER IP: 67.18.119.226 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.pacpnwfp.gov.pk | 72.36.213.90 |
SERVER IP: 72.36.213.90 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
paec.gov.pk | 66.252.21.131 |
SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.34 (Unix) PHP/4.4.0 SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.paec.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
www.paf.gov.pk | 66.252.7.187 |
SERVER IP: 66.252.7.187 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
pak.gov.pk | 66.252.7.187 |
SERVER IP: 66.252.7.187 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
www.pak.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.pakboi.gov.pk | 72.9.152.14 |
SERVER IP: 72.9.152.14 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
pakistan.gov.pk | 66.252.7.187 |
SERVER IP: 66.252.7.187 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
www.pakistan.gov.pk | 66.252.7.187 |
SERVER IP: 66.252.7.187 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
www.pakistanarmy.gov.pk | 72.3.142.125 |
SERVER IP: 72.3.142.125 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 |
www.pakistanseeds.gov.pk | 72.9.149.140 |
SERVER IP: 72.9.149.140 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.pakistantourism.gov.pk | 72.9.144.119 |
SERVER IP: 72.9.144.119 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 |
www.pakmission-uk.gov.pk | 212.227.124.198 |
SERVER IP: 212.227.124.198 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.paknavy.gov.pk | 66.252.7.187 |
SERVER IP: 66.252.7.187 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
www.pakpattanpolice.gov.pk | 208.113.187.98 |
SERVER IP: 208.113.187.98 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.54 (Unix) PHP/4.4.7 mod_ssl/2.0.54 OpenSSL/0.9.7e mod_fastcgi/2.4.2 DAV/2 SVN/1.4.2 SERVER IP: 208.113.187.98 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 208.113.187.98 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
www.pakpost.gov.pk | 203.128.6.131 |
SERVER IP: 203.128.6.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.pakwaters.gov.pk | 202.38.50.50 |
SERVER IP: 202.38.50.50 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 |
www.panwfp.gov.pk | 65.175.69.203 |
SERVER IP: 65.175.69.203 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.39 (Unix) PHP/5.2.4 mod_bwlimited/1.4 mod_auth_passthrough/1.8 mod_log_bytes/1.2 FrontPage/5.0.2.2635 mod_ssl/2.8.30 OpenSSL/0.9.7a SERVER IP: 65.175.69.203 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 65.175.69.203 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 65.175.69.203 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 SERVER IP: 65.175.69.203 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
www.pap.gov.pk | 203.135.58.5 |
SERVER IP: 203.135.58.5 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.53 (Fedora) |
www.parc.gov.pk | 66.252.21.131 |
SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
www.pas.gov.pk | 202.163.96.130 |
SERVER IP: 202.163.96.130 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Netscape-Enterprise/4.1 SERVER IP: 202.163.96.130 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to multiple attack vectors The remote iPlanet webserver (according to it's version number) is vulnerable to a bug wherein a remote user can retrieve sensitive data from memory allocation pools, or cause a denial of service against the server. . IAVA Reference : 2001-a-0007 IAVA Reference : 2002-A-0012 CVSS Base Score : 6 AV:R/AC:L/Au:NR/C:P/I:N/A:C/B:N Solution : Update to iPlanet 4.1 SP7 or newer See also : http://www.atstake.com/research/advisories/2001/a041601-1.txt CVE : CVE-2001-0327 BID : 6826 |
www.pasc.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.34 (Unix) PHP/4.4.0 SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.pastic.gov.pk | 66.252.21.131 |
SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.pbm.gov.pk | 66.252.21.131 |
SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.pcb.gov.pk | 66.252.21.131 |
SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
www.pcret.gov.pk | 66.252.7.187 |
SERVER IP: 66.252.7.187 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/5.0 |
www.pcrwr.gov.pk | 66.252.21.131 |
SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.pcsir.gov.pk | 66.252.21.131 |
SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
pemra.gov.pk | 203.135.1.114 |
SERVER IP: 203.135.1.114 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.pemra.gov.pk | 203.135.1.114 |
SERVER IP: 203.135.1.114 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.pesco.gov.pk | 202.38.50.51 |
SERVER IP: 202.38.50.51 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.peshawarhighcourt.gov.pk | 72.36.213.90 |
SERVER IP: 72.36.213.90 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
www.pfcsindh.gov.pk | 202.163.115.13 |
SERVER IP: 202.163.115.13 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.pha.gov.pk | 66.252.7.187 |
SERVER IP: 66.252.7.187 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
phc.gov.pk | 72.51.46.233 |
SERVER IP: 72.51.46.233 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.52 (Red Hat) SERVER IP: 72.51.46.233 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806 BID : 25498 SERVER IP: 72.51.46.233 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
www.phc.gov.pk | 72.51.46.233 |
SERVER IP: 72.51.46.233 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.52 (Red Hat) SERVER IP: 72.51.46.233 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806 BID : 25498 SERVER IP: 72.51.46.233 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
www.pid.gov.pk | 64.38.44.98 |
SERVER IP: 64.38.44.98 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.pims.gov.pk | 72.9.152.14 |
SERVER IP: 72.9.152.14 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.pitac.gov.pk | 203.128.6.131 |
SERVER IP: 203.128.6.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
pitb.gov.pk | 202.125.140.233 |
SERVER IP: 202.125.140.233 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
stp.pitb.gov.pk | 202.125.140.233 |
SERVER IP: 202.125.140.233 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.pitb.gov.pk | 202.125.140.233 |
SERVER IP: 202.125.140.233 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.planningcommission.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.plantprotection.gov.pk | 72.18.131.195 |
SERVER IP: 72.18.131.195 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.pmajk.gov.pk | 72.9.144.119 |
SERVER IP: 72.9.144.119 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.pmdc.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.34 (Unix) PHP/4.4.0 SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.pmnh.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.pmsectt.gov.pk | 66.252.21.131 |
SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
www.pmupunjab.gov.pk | 67.19.245.84 |
SERVER IP: 67.19.245.84 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_jk/1.2.14 mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a PHP-CGI/0.1b |
www.pmusindh.gov.pk | 202.163.115.11 |
SERVER IP: 202.163.115.11 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.pndpunjab.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.pof.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.ppib.gov.pk | 216.32.82.59 |
SERVER IP: 216.32.82.59 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 PHP/4.4.7 FrontPage/5.0.2.2635.SR1.2 |
www.ppmi.gov.pk | 216.127.82.50 |
SERVER IP: 216.127.82.50 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.33 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 PHP/4.3.11 FrontPage/5.0.2.2635 mod_ssl/2.8.22 OpenSSL/0.9.7a SERVER IP: 216.127.82.50 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 216.127.82.50 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 216.127.82.50 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 216.127.82.50 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 SERVER IP: 216.127.82.50 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
presidentofpakistan.gov.pk | 72.3.142.125 |
SERVER IP: 72.3.142.125 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.presidentofpakistan.gov.pk | 72.3.142.125 |
SERVER IP: 72.3.142.125 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.privatisation.gov.pk | 63.74.123.31 |
SERVER IP: 63.74.123.31 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/4.0 - The remote host is running a Microsoft IIS webserver |
www.prsp-cmiphc.gov.pk | 203.215.180.61 |
SERVER IP: 203.215.180.61 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.psf.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.34 (Unix) PHP/4.4.0 SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.psic.gov.pk | 74.52.93.50 |
SERVER IP: 74.52.93.50 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.pta.gov.pk | 66.252.21.131 |
SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.34 (Unix) PHP/4.4.0 SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.ptb.gov.pk | 203.124.43.14 |
SERVER IP: 203.124.43.14 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_gzip/1.3.26.1a mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a |
www.punjab-prmp.gov.pk | 71.32.228.165 |
SERVER IP: 71.32.228.165 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
bahawalnagar.punjab.gov.pk | 203.215.180.61 |
SERVER IP: 203.215.180.61 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
hemis.punjab.gov.pk | 203.215.175.104 |
SERVER IP: 203.215.175.104 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
job.punjab.gov.pk | 203.215.180.61 |
SERVER IP: 203.215.180.61 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
lrmis.punjab.gov.pk | 203.215.175.104 |
SERVER IP: 203.215.175.104 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
parb.punjab.gov.pk | 203.215.180.61 |
SERVER IP: 203.215.180.61 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
ppmis.punjab.gov.pk | 203.215.180.61 |
SERVER IP: 203.215.180.61 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
tdcp.punjab.gov.pk | 203.215.180.61 |
SERVER IP: 203.215.180.61 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
tender.punjab.gov.pk | 203.215.180.61 |
SERVER IP: 203.215.180.61 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.punjab.gov.pk | 203.215.175.4 203.215.180.61 |
SERVER IP: 203.215.175.4 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Oracle-Application-Server-10g/10.1.2.0.2 Oracle-HTTP-Server OracleAS-Web-Cache-10g/10.1.2.0.2 (N,ecid=11236727867734,0) SERVER IP: 203.215.175.4 PORT/PROTOCOL: 80/tcp TYPE: NOTE The remote host is running the Oracle Application Server 10g version 10.1.2.0.2 Oracle-HTTP-Server SERVER IP: 203.215.180.61 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 |
www.punjablaws.gov.pk | 203.135.58.5 |
SERVER IP: 203.135.58.5 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.53 (Fedora) |
www.punjabpolice.gov.pk | 208.106.150.125 |
SERVER IP: 208.106.150.125 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.pwd.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.pwdsindh.gov.pk | 208.116.45.98 |
SERVER IP: 208.116.45.98 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
www.radio.gov.pk | 66.252.7.187 |
SERVER IP: 66.252.7.187 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
www.railways.gov.pk | 66.252.7.187 |
SERVER IP: 66.252.7.187 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix) |
rajanpurpolice.gov.pk | 70.87.181.66 |
SERVER IP: 70.87.181.66 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
wasa.rda.gov.pk | 72.55.156.39 |
SERVER IP: 72.55.156.39 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.52 (CentOS) |
www.rfdp.gov.pk | 63.134.240.85 |
SERVER IP: 63.134.240.85 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 |
www.rsu-sindh.gov.pk | 74.50.68.193 |
SERVER IP: 74.50.68.193 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.safron.gov.pk | 66.252.7.187 |
SERVER IP: 66.252.7.187 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix) |
www.sahiwal.gov.pk | 206.51.236.166 |
SERVER IP: 206.51.236.166 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.sargodhapolice.gov.pk | 203.128.6.131 |
SERVER IP: 203.128.6.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver SERVER IP: 203.128.6.131 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
www.savings.gov.pk | 66.252.21.131 |
SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/5.0 |
www.sco.gov.pk | 203.135.1.114 |
SERVER IP: 203.135.1.114 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/5.0 |
www.scp50.gov.pk | 203.135.1.114 |
SERVER IP: 203.135.1.114 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.sdssp.gov.pk | 66.201.122.153 |
SERVER IP: 66.201.122.153 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.sec.gov.pk | 209.51.142.146 |
SERVER IP: 209.51.142.146 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.39 (Unix) mod_bwlimited/1.4 mod_log_bytes/1.2 mod_jk/1.2.25 mod_auth_passthrough/1.8 FrontPage/5.0.2.2635 mod_ssl/2.8.30 OpenSSL/0.9.7a SERVER IP: 209.51.142.146 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 209.51.142.146 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 209.51.142.146 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
www.secp.gov.pk | 209.71.203.34 |
SERVER IP: 209.71.203.34 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.senate.gov.pk | 66.252.7.187 |
SERVER IP: 66.252.7.187 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
sessi.gov.pk | 202.163.115.13 |
SERVER IP: 202.163.115.13 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.sessi.gov.pk | 202.163.115.13 |
SERVER IP: 202.163.115.13 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.sheikhupurapolice.gov.pk | 70.85.227.130 |
SERVER IP: 70.85.227.130 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
shippingoffice.gov.pk | 67.59.138.120 |
SERVER IP: 67.59.138.120 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.shydo.gov.pk | 66.252.7.187 |
SERVER IP: 66.252.7.187 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.34 (Unix) PHP/4.4.0 SERVER IP: 66.252.7.187 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 66.252.7.187 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
www.sialkot.gov.pk | 203.215.180.61 |
SERVER IP: 203.215.180.61 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver SERVER IP: 203.215.180.61 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP which is older than 5.0.5. This version has a number of bugs which allow attackers to execute or retrieve arbitrary files outside of the web root directory. An attacker, exploiting these flaws, would only need to send a malformed HTTP request to the vulnerable system. Successful exploitation would result in the loss of Confidential data or a tarnishing of system Integrity. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 5.0.5 or later BID : 15119 SERVER IP: 203.215.180.61 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host may give an attacker information useful for future attacks The remote host is running a version of PHP which is older than 5.0.6. This version has a flaw wherein remote attackers can reenable the 'register_globals' parameter. In addition, a remote attacker may be able to overwrite the 'GLOBAL' variable. This may lead to another, more serious, exploitation. CVSS Base Score : 9.3 CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C Solution : Upgrade to PHP 5.0.6 or later See also : http://www.php.net/release_4_4_1.php CVE : CVE-2006-0395, CVE-2005-2713, CVE-2005-2714, CVE-2005-3319, CVE-2005-3353, CVE-2005-3389, CVE-2005-3706, CVE-2005-3712, CVE-2005-4217, CVE-2005-4504, CVE-2006-0383, CVE-2006-0384, CVE-2006-0386, CVE-2006-0387, CVE-2006-0388, CVE-2006-0389, CVE-2006-0391, CVE-2006-3016, CVE-2006-3018, CVE-2005-3883, CVE-2006-3017, CVE-2005-3390, CVE-2005-3392, CVE-2005-3391 BID : 15571, 16907, 17843, 15249, 15411, 15413, 15250 SERVER IP: 203.215.180.61 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 203.215.180.61 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 SERVER IP: 203.215.180.61 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756 BID : 23359, 24089, 24259, 24261 SERVER IP: 203.215.180.61 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806 BID : 25498 SERVER IP: 203.215.180.61 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
www.sindh.gov.pk | 66.252.7.187 |
SERVER IP: 66.252.7.187 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.sindhagri.gov.pk | 202.163.115.13 |
SERVER IP: 202.163.115.13 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.sindhagrimarketing.gov.pk | 203.135.0.22 |
SERVER IP: 203.135.0.22 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.sindhcmit.gov.pk | 203.135.1.114 |
SERVER IP: 203.135.1.114 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/5.0 |
www.sindhcpsd.gov.pk | 202.163.115.13 |
SERVER IP: 202.163.115.13 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.sindhedu.gov.pk | 203.135.1.114 |
SERVER IP: 203.135.1.114 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.sindhhealth.gov.pk | 202.163.96.130 |
SERVER IP: 202.163.96.130 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Netscape-Enterprise/4.1 SERVER IP: 202.163.96.130 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to multiple attack vectors The remote iPlanet webserver (according to it's version number) is vulnerable to a bug wherein a remote user can retrieve sensitive data from memory allocation pools, or cause a denial of service against the server. . IAVA Reference : 2001-a-0007 IAVA Reference : 2002-A-0012 CVSS Base Score : 6 AV:R/AC:L/Au:NR/C:P/I:N/A:C/B:N Solution : Update to iPlanet 4.1 SP7 or newer See also : http://www.atstake.com/research/advisories/2001/a041601-1.txt CVE : CVE-2001-0327 BID : 6826 |
www.sindhhighcourt.gov.pk | 67.18.119.226 |
SERVER IP: 67.18.119.226 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver SERVER IP: 67.18.119.226 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806 BID : 25498 SERVER IP: 67.18.119.226 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
www.sindhlivestockfishries.gov.pk | 202.163.115.13 |
SERVER IP: 202.163.115.13 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.sindhpolice.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.sindhttb.gov.pk | 208.109.78.57 68.178.254.209 |
SERVER IP: 208.109.78.57 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver SERVER IP: 68.178.254.209 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 |
www.sports.gov.pk | 66.252.7.187 |
SERVER IP: 66.252.7.187 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
www.spsc.gov.pk | 203.135.0.14 |
SERVER IP: 203.135.0.14 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.52 |
www.statistics.gov.pk | 66.252.21.131 |
SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix) |
www.statpak.gov.pk | 203.135.0.29 |
SERVER IP: 203.135.0.29 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.2.4 (FreeBSD) mod_ssl/2.2.4 OpenSSL/0.9.7e-p1 DAV/2 PHP/5.2.0 with Suhosin-Patch SERVER IP: 203.135.0.29 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 203.135.0.29 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 203.135.0.29 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 SERVER IP: 203.135.0.29 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756 BID : 23359, 24089, 24259, 24261 SERVER IP: 203.135.0.29 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806 BID : 25498 SERVER IP: 203.135.0.29 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 SERVER IP: 203.135.0.29 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
sindhi.sukkur.gov.pk | 202.5.152.253 |
SERVER IP: 202.5.152.253 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
urdu.sukkur.gov.pk | 202.5.152.253 |
SERVER IP: 202.5.152.253 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.suparco.gov.pk | 202.163.115.13 |
SERVER IP: 202.163.115.13 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.supremecourt.gov.pk | 72.51.39.208 |
SERVER IP: 72.51.39.208 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
tandoallahyar.gov.pk | 66.252.21.131 |
SERVER IP: 66.252.21.131 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.tco.gov.pk | 209.172.48.85 |
SERVER IP: 209.172.48.85 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.50 (Fedora) |
www.tcp.gov.pk | 202.163.115.11 |
SERVER IP: 202.163.115.11 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
tdap.gov.pk | 72.29.70.239 |
SERVER IP: 72.29.70.239 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.33 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 PHP/4.3.11 FrontPage/5.0.2.2634a mod_ssl/2.8.22 OpenSSL/0.9.7a SERVER IP: 72.29.70.239 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 72.29.70.239 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 72.29.70.239 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 72.29.70.239 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 SERVER IP: 72.29.70.239 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
www.tdap.gov.pk | 72.29.70.239 |
SERVER IP: 72.29.70.239 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.33 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 PHP/4.3.11 FrontPage/5.0.2.2634a mod_ssl/2.8.22 OpenSSL/0.9.7a SERVER IP: 72.29.70.239 PORT/PROTOCOL: 80/tcp TYPE: REPORT The remote Apache server is running mod_frontpage. Versions older than 1.6.1 are vulnerable to a buffer overflow which may allow an attacker to gain root access on this host. *** Note that it is not possible to remotely determine the version of mod_frontpage which is running, so this may be a false positive Solution : Disable this module or upgrade to mod_frontpage 1.6.2 CVE : CVE-2002-0427 BID : 4251 SERVER IP: 72.29.70.239 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 72.29.70.239 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote webserver could potentially allow remote attackers to manipulate the password database The remote host appears to be running a version of Apache, an open source web server. This version of Apache is vulnerable to a flaw in the 'htpasswd' utilility. This issue is not considered a local flaw, as the program is not run setuid. An attacker, exploiting this flaw, would need to find a vulnerable Apache Web server which was making a call to 'htpasswd' via a CGI script. CVSS Base Score : 5.1 CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P Solution : Upgrade to latest version from apache.org. Organizations may also wish to disable CGI scripts which make system calls (insecure or otherwise). See also : http://www.apache.org BID : 13777, 13778 SERVER IP: 72.29.70.239 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 72.29.70.239 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 72.29.70.239 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 SERVER IP: 72.29.70.239 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
www.textile.gov.pk | 66.252.7.187 |
SERVER IP: 66.252.7.187 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix) |
www.tourism.gov.pk | 74.86.146.128 |
SERVER IP: 74.86.146.128 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/5.0 |
www.tremu.gov.pk | 72.9.152.14 |
SERVER IP: 72.9.152.14 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.ttsinghpolice.gov.pk | 70.87.181.66 |
SERVER IP: 70.87.181.66 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.urbanunit.gov.pk | 203.215.180.61 |
SERVER IP: 203.215.180.61 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.vehari.gov.pk | 203.128.6.132 |
SERVER IP: 203.128.6.132 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 |
veharipolice.gov.pk | 70.47.123.187 |
SERVER IP: 70.47.123.187 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_fastcgi/2.4.2 mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a PHP-CGI/0.1b SERVER IP: 70.47.123.187 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 70.47.123.187 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 70.47.123.187 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
www.wapda.gov.pk | 202.38.50.35 |
SERVER IP: 202.38.50.35 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.wcb.gov.pk | 202.125.140.68 |
SERVER IP: 202.125.140.68 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
www.women.gov.pk | 66.252.7.187 |
SERVER IP: 66.252.7.187 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix) |
www.wtopunjab.gov.pk | 203.215.180.61 |
SERVER IP: 203.215.180.61 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
www.zsd.gov.pk | 203.124.43.40 |
SERVER IP: 203.124.43.40 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |