Cryptome DVDs are offered by Cryptome. Donate $25 for two DVDs of the Cryptome 12-years collection of 46,000 files from June 1996 to June 2008 (~6.7 GB). Click Paypal or mail check/MO made out to John Young, 251 West 89th Street, New York, NY 10024. The collection includes all files of cryptome.org, jya.com, cartome.org, eyeball-series.org and iraq-kill-maim.org, and 23,000 (updated) pages of counter-intelligence dossiers declassified by the US Army Information and Security Command, dating from 1945 to 1985.The DVDs will be sent anywhere worldwide without extra cost.

Google
 
Web cryptome.org cryptome.info jya.com eyeball-series.org cryptome.cn


2 December 2007

See also report on Iran government: http://cryptome.info/0001/gov-ir.htm


A sends:

Thought your readers might be interested in PK, too...

Just making people aware of what information can be found, when you open your eyes to it.


Server Comms Reporting for Research Effort gov.pk




Table Cell Color Keys
Grey No analysis report generated. Could be due to server being down, not reponding to our request, or not existing.
White Nothing of interest to report
Yellow Notes are provided on findings but nothing significant found.
Pink More information is provided on findings, usually contained with systems having a vulnerability report. More valued information over just notes.
Red Report has been generated with findings for potential vulnerability information.



Domain Name Index
www.abbottabad.gov.pk www.fdsindh.gov.pk mercantilemarine.gov.pk www.nrb.gov.pk www.punjab-prmp.gov.pk
www.academy.gov.pk www.fgehf.gov.pk met.gov.pk www.nrss.gov.pk bahawalnagar.punjab.gov.pk
www.aepam.gov.pk www.fia.gov.pk www.met.gov.pk www.ntc.gov.pk hemis.punjab.gov.pk
www.afic.gov.pk iso.finance.gov.pk www.mianwalipolice.gov.pk ntp.gov.pk job.punjab.gov.pk
www.agp.gov.pk www.finance.gov.pk www.minfal.gov.pk www.ntrc.gov.pk lrmis.punjab.gov.pk
agpr.gov.pk www.financedeptsindh.gov.pk www.minorities.gov.pk nwfp.gov.pk parb.punjab.gov.pk
agpunjab.gov.pk www.fm101.gov.pk www.mng.gov.pk www.nwfppsc.gov.pk ppmis.punjab.gov.pk
www.agricbal.gov.pk www.foodsindh.gov.pk www.mod.gov.pk www.nwfpwildlifedept.gov.pk tdcp.punjab.gov.pk
www.ajk.gov.pk www.forms.gov.pk www.moe.gov.pk www.oec.gov.pk tender.punjab.gov.pk
www.ajkmdrp.gov.pk www.fpsc.gov.pk www.moeas.gov.pk www.ombudsmanpunjab.gov.pk www.punjab.gov.pk
www.ajkpolice.gov.pk www.fsc.gov.pk www.moenv.gov.pk www.pac-klc.gov.pk www.punjablaws.gov.pk
www.ajp.gov.pk www.gda.gov.pk mofa.gov.pk paccs.gov.pk www.punjabpolice.gov.pk
www.alp.gov.pk www.gefpak.gov.pk www.mofa.gov.pk www.paco.gov.pk www.pwd.gov.pk
amis.gov.pk www.gjtmap.gov.pk www.mohtasib.gov.pk www.pacpnwfp.gov.pk www.pwdsindh.gov.pk
www.amis.gov.pk www.governorpunjab.gov.pk moip.gov.pk paec.gov.pk www.radio.gov.pk
anf.gov.pk www.governorsindh.gov.pk www.moip.gov.pk www.paec.gov.pk www.railways.gov.pk
www.anf.gov.pk www.grbi.gov.pk www.moit.gov.pk www.paf.gov.pk rajanpurpolice.gov.pk
armystaffcollege.gov.pk www.grbipunjab.gov.pk www.moitt.gov.pk pak.gov.pk wasa.rda.gov.pk
www.attockpolice.gov.pk www.gsp.gov.pk www.moka.gov.pk www.pak.gov.pk www.rfdp.gov.pk
bahawalnagarpolice.gov.pk www.gujranwalapolice.gov.pk www.molaw.gov.pk www.pakboi.gov.pk www.rsu-sindh.gov.pk
www.bahawalpur.gov.pk www.gujratpolice.gov.pk www.molm.gov.pk pakistan.gov.pk www.safron.gov.pk
www.bahawalpurpolice.gov.pk gulbergtownlahore.gov.pk www.mopa.gov.pk www.pakistan.gov.pk www.sahiwal.gov.pk
www.balochistanpolice.gov.pk www.gulshantownkarachi.gov.pk www.mops.gov.pk www.pakistanarmy.gov.pk www.sargodhapolice.gov.pk
www.bankingmohtasib.gov.pk www.gwadarport.gov.pk www.mopw.gov.pk www.pakistanseeds.gov.pk www.savings.gov.pk
www.beoe.gov.pk www.hafizabadpolice.gov.pk www.mora.gov.pk www.pakistantourism.gov.pk www.sco.gov.pk
www.bhakkar.gov.pk health.gov.pk most.gov.pk www.pakmission-uk.gov.pk www.scp50.gov.pk
www.bhakkarpolice.gov.pk www.health.gov.pk www.most.gov.pk www.paknavy.gov.pk www.sdssp.gov.pk
www.borsindh.gov.pk www.healthnwfp.gov.pk www.mowp.gov.pk www.pakpattanpolice.gov.pk www.sec.gov.pk
buner.gov.pk beta.hec.gov.pk www.moya.gov.pk www.pakpost.gov.pk www.secp.gov.pk
www.cabinet.gov.pk eprints.hec.gov.pk www.mpnr.gov.pk www.pakwaters.gov.pk www.senate.gov.pk
www.cbfc.gov.pk www.hec.gov.pk mtbfpakistan.gov.pk www.panwfp.gov.pk sessi.gov.pk
e.cbr.gov.pk www.heritage.gov.pk www.mtbfpakistan.gov.pk www.pap.gov.pk www.sessi.gov.pk
www.cbr.gov.pk www.hesco.gov.pk multan.gov.pk www.parc.gov.pk www.sheikhupurapolice.gov.pk
www.cda.gov.pk www.housing.gov.pk www.multan.gov.pk www.pas.gov.pk shippingoffice.gov.pk
www.census.gov.pk www.hyderabadpolice.gov.pk www.multanpolice.gov.pk www.pasc.gov.pk www.shydo.gov.pk
www.cesat.gov.pk www.iap.gov.pk www.muzaffargarhpolice.gov.pk www.pastic.gov.pk www.sialkot.gov.pk
www.chakwal.gov.pk www.ideaspakistan.gov.pk www.na.gov.pk www.pbm.gov.pk www.sindh.gov.pk
www.cii.gov.pk infopak.gov.pk www.nab.gov.pk www.pcb.gov.pk www.sindhagri.gov.pk
www.cmtl.gov.pk www.infopak.gov.pk www.nacp.gov.pk www.pcret.gov.pk www.sindhagrimarketing.gov.pk
commerce.gov.pk interior.gov.pk www.nadra.gov.pk www.pcrwr.gov.pk www.sindhcmit.gov.pk
www.commerce.gov.pk www.interior.gov.pk www.narowalpolice.gov.pk www.pcsir.gov.pk www.sindhcpsd.gov.pk
www.communication.gov.pk www.ipc.gov.pk www.nat-ipm.gov.pk pemra.gov.pk www.sindhedu.gov.pk
www.cpwb.gov.pk ipdf.gov.pk www.navtec.gov.pk www.pemra.gov.pk www.sindhhealth.gov.pk
www.csru.gov.pk www.iphq.gov.pk www.nawabshah.gov.pk www.pesco.gov.pk www.sindhhighcourt.gov.pk
www.culture.gov.pk www.ipo.gov.pk www.ncb.gov.pk www.peshawarhighcourt.gov.pk www.sindhlivestockfishries.gov.pk
www.customhyd.gov.pk www.ispr.gov.pk www.nccwd.gov.pk www.pfcsindh.gov.pk www.sindhpolice.gov.pk
www.cwhr.gov.pk www.itp.gov.pk forum.ncgr.gov.pk www.pha.gov.pk www.sindhttb.gov.pk
www.dgip.gov.pk www.jhangpolice.gov.pk www.ncgr.gov.pk phc.gov.pk www.sports.gov.pk
www.dgkpolice.gov.pk www.jobs.gov.pk www.ncs-nsds.gov.pk www.phc.gov.pk www.spsc.gov.pk
ead.gov.pk www.joinpakarmy.gov.pk ncsw.gov.pk www.pid.gov.pk www.statistics.gov.pk
www.ead.gov.pk www.kana.gov.pk www.ncsw.gov.pk www.pifra.gov.pk www.statpak.gov.pk
www.eadtraining.gov.pk www.karachicity.gov.pk www.ncsw1.gov.pk www.pims.gov.pk sindhi.sukkur.gov.pk
www.ecp.gov.pk www.kashmir.gov.pk ndma.gov.pk www.pitac.gov.pk urdu.sukkur.gov.pk
www.edc.gov.pk www.kasurpolice.gov.pk ndmc.gov.pk pitb.gov.pk www.suparco.gov.pk
www.elections.gov.pk www.kbca.gov.pk www.ndp.gov.pk stp.pitb.gov.pk www.supremecourt.gov.pk
www.enercon.gov.pk www.kcb.gov.pk ndpsindh.gov.pk www.pitb.gov.pk tandoallahyar.gov.pk
www.environment.gov.pk sindhi.khairpur.gov.pk www.neas.gov.pk www.planningcommission.gov.pk www.tco.gov.pk
www.eobi.gov.pk urdu.khairpur.gov.pk www.nescom.gov.pk www.plantprotection.gov.pk www.tcp.gov.pk
www.ep.gov.pk www.khanewalpolice.gov.pk www.nfc.gov.pk www.pmajk.gov.pk tdap.gov.pk
www.epb.gov.pk khushabpolice.gov.pk www.nfdc.gov.pk www.pmdc.gov.pk www.tdap.gov.pk
www.epblhr.gov.pk www.kpf.gov.pk www.ngos.gov.pk www.pmnh.gov.pk www.textile.gov.pk
www.epza.gov.pk www.kpt.gov.pk www.ngosinfo.gov.pk www.pmsectt.gov.pk www.tourism.gov.pk
www.erra.gov.pk www.ktp.gov.pk www.nha.gov.pk www.pmupunjab.gov.pk www.tremu.gov.pk
www.establishment.gov.pk www.lahore.gov.pk www.nhmp.gov.pk www.pmusindh.gov.pk www.ttsinghpolice.gov.pk
www.etax.gov.pk www.lahorepolice.gov.pk www.nhmpdb.gov.pk www.pndpunjab.gov.pk www.urbanunit.gov.pk
www.expopakistan.gov.pk www.larkana.gov.pk www.nibaf.gov.pk www.pof.gov.pk www.vehari.gov.pk
faef.gov.pk www.lcb.gov.pk www.nim.gov.pk www.ppib.gov.pk veharipolice.gov.pk
www.faisalabad.gov.pk www.ldc.gov.pk www.nip.gov.pk www.ppmi.gov.pk www.wapda.gov.pk
www.faisalabadpolice.gov.pk www.lesco.gov.pk www.nla.gov.pk presidentofpakistan.gov.pk www.wcb.gov.pk
fata.gov.pk www.lhc.gov.pk nlauit.gov.pk www.presidentofpakistan.gov.pk www.women.gov.pk
www.fata.gov.pk www.lieda.gov.pk www.nlauit.gov.pk www.privatisation.gov.pk www.wtopunjab.gov.pk
www.fatada.gov.pk www.ljcp.gov.pk nlp.gov.pk www.prsp-cmiphc.gov.pk www.zsd.gov.pk
www.fatimajinnah.gov.pk www.lodhranpolice.gov.pk www.nlp.gov.pk www.psf.gov.pk
fbr.gov.pk www.ltukarachi.gov.pk www.npb.gov.pk www.psic.gov.pk
www.fda.gov.pk www.mbdpolice.gov.pk www.npo.gov.pk www.pta.gov.pk
www.fde.gov.pk www.mca.gov.pk www.nr3c.gov.pk www.ptb.gov.pk



Domain Name IP ADDRESS Information Identified
www.abbottabad.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.academy.gov.pk 67.18.34.220
SERVER IP: 67.18.34.220
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

SERVER IP: 67.18.34.220
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 67.18.34.220
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.aepam.gov.pk 66.252.7.187
SERVER IP: 66.252.7.187
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.afic.gov.pk 64.151.197.190
SERVER IP: 64.151.197.190
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.51 (Fedora)

www.agp.gov.pk 66.252.7.187
SERVER IP: 66.252.7.187
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

agpr.gov.pk 64.38.4.122
SERVER IP: 64.38.4.122
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

agpunjab.gov.pk 203.128.6.132
SERVER IP: 203.128.6.132
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

SERVER IP: 203.128.6.132
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


www.agricbal.gov.pk 202.133.44.6
SERVER IP: 202.133.44.6
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.40 (Red Hat Linux)

www.ajk.gov.pk 203.135.0.17
SERVER IP: 203.135.0.17
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.54 (Unix) DAV/2 PHP/4.3.11

SERVER IP: 203.135.0.17
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 203.135.0.17
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.ajkmdrp.gov.pk 72.9.156.44
SERVER IP: 72.9.156.44
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a PHP-CGI/0.1b

SERVER IP: 72.9.156.44
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 72.9.156.44
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 72.9.156.44
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 72.9.156.44
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


SERVER IP: 72.9.156.44
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.ajkpolice.gov.pk 72.9.144.119
SERVER IP: 72.9.144.119
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.ajp.gov.pk 63.134.249.99
SERVER IP: 63.134.249.99
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.alp.gov.pk 66.252.21.131
SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

amis.gov.pk 66.252.7.187
SERVER IP: 66.252.7.187
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.34 (Unix) PHP/4.4.0

SERVER IP: 66.252.7.187
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 66.252.7.187
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.amis.gov.pk 66.252.7.187
SERVER IP: 66.252.7.187
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.34 (Unix) PHP/4.4.0

SERVER IP: 66.252.7.187
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 66.252.7.187
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


anf.gov.pk 66.252.21.131
SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix)

www.anf.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix)

armystaffcollege.gov.pk 69.80.208.202
SERVER IP: 69.80.208.202
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.attockpolice.gov.pk 66.252.7.187
SERVER IP: 66.252.7.187
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

bahawalnagarpolice.gov.pk 70.87.181.66
SERVER IP: 70.87.181.66
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.bahawalpur.gov.pk 66.197.217.37
SERVER IP: 66.197.217.37
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.8a PHP-CGI/0.1b

SERVER IP: 66.197.217.37
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 66.197.217.37
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.bahawalpurpolice.gov.pk 203.128.6.131
SERVER IP: 203.128.6.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

SERVER IP: 203.128.6.131
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


www.balochistanpolice.gov.pk 213.171.219.2
SERVER IP: 213.171.219.2
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

SERVER IP: 213.171.219.2
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Script Injection attack The remote host is running a version of PHP which is older than 5.0.3 or 4.3.10. The remote version of this software is vulnerable to various security issues which may, under certain circumstances, allow attackers to execute arbitrary code on the remote host, provided that they can pass arbitrary data to some functions or bypass safe_mode. CVSS Base Score : 6 AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to PHP 5.0.3 or 4.3.10
CVE : CVE-2004-1018, CVE-2004-1019, CVE-2004-1020, CVE-2004-1063, CVE-2004-1064, CVE-2004-1065
BID : 11964, 11981, 11992, 12045


SERVER IP: 213.171.219.2
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher.
CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525
BID : 12963, 12962, 13143, 13163, 13164


SERVER IP: 213.171.219.2
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 213.171.219.2
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.bankingmohtasib.gov.pk 66.201.122.45
SERVER IP: 66.201.122.45
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

SERVER IP: 66.201.122.45
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Script Injection attack The remote host is running a version of PHP which is older than 5.0.3 or 4.3.10. The remote version of this software is vulnerable to various security issues which may, under certain circumstances, allow attackers to execute arbitrary code on the remote host, provided that they can pass arbitrary data to some functions or bypass safe_mode. CVSS Base Score : 6 AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to PHP 5.0.3 or 4.3.10
CVE : CVE-2004-1018, CVE-2004-1019, CVE-2004-1020, CVE-2004-1063, CVE-2004-1064, CVE-2004-1065
BID : 11964, 11981, 11992, 12045


SERVER IP: 66.201.122.45
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher.
CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525
BID : 12963, 12962, 13143, 13163, 13164


SERVER IP: 66.201.122.45
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 66.201.122.45
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.beoe.gov.pk 203.135.1.114
SERVER IP: 203.135.1.114
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.bhakkar.gov.pk 203.135.0.17
SERVER IP: 203.135.0.17
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.54 (Unix) DAV/2 PHP/4.3.11

SERVER IP: 203.135.0.17
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 203.135.0.17
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.bhakkarpolice.gov.pk 203.128.6.132
SERVER IP: 203.128.6.132
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.borsindh.gov.pk 66.206.28.16
SERVER IP: 66.206.28.16
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

buner.gov.pk 72.9.144.119
SERVER IP: 72.9.144.119
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.cabinet.gov.pk 66.252.7.187
SERVER IP: 66.252.7.187
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

www.cbfc.gov.pk 203.135.1.114
SERVER IP: 203.135.1.114
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

e.cbr.gov.pk 58.65.168.244
SERVER IP: 58.65.168.244
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.cbr.gov.pk 66.201.122.201
SERVER IP: 66.201.122.201
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

www.cda.gov.pk 63.134.214.91
SERVER IP: 63.134.214.91
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.census.gov.pk 66.252.7.187
SERVER IP: 66.252.7.187
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.cesat.gov.pk 203.135.39.166
SERVER IP: 203.135.39.166
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.40 (Red Hat Linux)

www.chakwal.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.cii.gov.pk 66.252.21.131
SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.cmtl.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

commerce.gov.pk 66.252.21.131
SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.commerce.gov.pk 66.252.7.187
SERVER IP: 66.252.7.187
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.communication.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix)

www.cpwb.gov.pk 203.128.6.132
SERVER IP: 203.128.6.132
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.csru.gov.pk 203.135.1.114
SERVER IP: 203.135.1.114
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.culture.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix)

www.customhyd.gov.pk 203.135.1.114
SERVER IP: 203.135.1.114
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.cwhr.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.34 (Unix) PHP/4.4.0

SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.dgip.gov.pk 66.252.7.187
SERVER IP: 66.252.7.187
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

www.dgkpolice.gov.pk 203.175.64.21
SERVER IP: 203.175.64.21
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

ead.gov.pk 66.252.7.187
SERVER IP: 66.252.7.187
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix)

www.ead.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix)

www.eadtraining.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.ecp.gov.pk 209.71.203.44
SERVER IP: 209.71.203.44
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.edc.gov.pk 69.25.27.170
SERVER IP: 69.25.27.170
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.49 (Unix) PHP/4.3.9

SERVER IP: 69.25.27.170
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Script Injection attack The remote host is running a version of PHP which is older than 5.0.3 or 4.3.10. The remote version of this software is vulnerable to various security issues which may, under certain circumstances, allow attackers to execute arbitrary code on the remote host, provided that they can pass arbitrary data to some functions or bypass safe_mode. CVSS Base Score : 6 AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to PHP 5.0.3 or 4.3.10
CVE : CVE-2004-1018, CVE-2004-1019, CVE-2004-1020, CVE-2004-1063, CVE-2004-1064, CVE-2004-1065
BID : 11964, 11981, 11992, 12045


SERVER IP: 69.25.27.170
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher.
CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525
BID : 12963, 12962, 13143, 13163, 13164


SERVER IP: 69.25.27.170
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 69.25.27.170
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.elections.gov.pk 209.71.203.44
SERVER IP: 209.71.203.44
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.enercon.gov.pk 66.252.21.131
SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.eobi.gov.pk 202.163.115.10
SERVER IP: 202.163.115.10
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.ep.gov.pk 202.165.238.12
SERVER IP: 202.165.238.12
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/5.0

www.epb.gov.pk 72.29.70.239
SERVER IP: 72.29.70.239
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.33 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 PHP/4.3.11 FrontPage/5.0.2.2634a mod_ssl/2.8.22 OpenSSL/0.9.7a

SERVER IP: 72.29.70.239
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 72.29.70.239
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 72.29.70.239
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 72.29.70.239
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


SERVER IP: 72.29.70.239
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.epblhr.gov.pk 203.128.6.132
SERVER IP: 203.128.6.132
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.epza.gov.pk 67.18.119.226
SERVER IP: 67.18.119.226
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.erra.gov.pk 203.175.64.18
SERVER IP: 203.175.64.18
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.establishment.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

www.etax.gov.pk 203.135.1.114
SERVER IP: 203.135.1.114
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/5.0

www.expopakistan.gov.pk 67.15.97.231
SERVER IP: 67.15.97.231
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

faef.gov.pk 203.124.43.12
SERVER IP: 203.124.43.12
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_gzip/1.3.26.1a mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a

SERVER IP: 203.124.43.12
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 203.124.43.12
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 203.124.43.12
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.faisalabad.gov.pk 203.124.43.40
SERVER IP: 203.124.43.40
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.faisalabadpolice.gov.pk 208.106.165.232
SERVER IP: 208.106.165.232
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

fata.gov.pk 74.50.0.40
SERVER IP: 74.50.0.40
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache Webserver

www.fata.gov.pk 74.50.0.40
SERVER IP: 74.50.0.40
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache Webserver

www.fatada.gov.pk 65.98.69.93
SERVER IP: 65.98.69.93
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.fatimajinnah.gov.pk 64.191.87.151
SERVER IP: 64.191.87.151
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 PHP/4.4.7 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a

SERVER IP: 64.191.87.151
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 64.191.87.151
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 64.191.87.151
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


fbr.gov.pk 66.201.122.201
SERVER IP: 66.201.122.201
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

www.fda.gov.pk 203.135.1.114
SERVER IP: 203.135.1.114
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.fde.gov.pk 203.135.1.114
SERVER IP: 203.135.1.114
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/5.0

www.fdsindh.gov.pk 202.163.115.13
SERVER IP: 202.163.115.13
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

SERVER IP: 202.163.115.13
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 202.163.115.13
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.fgehf.gov.pk 66.252.21.131
SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.fia.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

iso.finance.gov.pk 66.38.187.70
SERVER IP: 66.38.187.70
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.finance.gov.pk 66.38.187.70
SERVER IP: 66.38.187.70
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.financedeptsindh.gov.pk 203.135.0.29
SERVER IP: 203.135.0.29
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.2.4 (FreeBSD) mod_ssl/2.2.4 OpenSSL/0.9.7e-p1 DAV/2 PHP/5.2.0 with Suhosin-Patch

SERVER IP: 203.135.0.29
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 203.135.0.29
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 203.135.0.29
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


SERVER IP: 203.135.0.29
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php
CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756
BID : 23359, 24089, 24259, 24261


SERVER IP: 203.135.0.29
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher
CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806
BID : 25498


SERVER IP: 203.135.0.29
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


SERVER IP: 203.135.0.29
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


www.fm101.gov.pk 209.71.203.44
SERVER IP: 209.71.203.44
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.foodsindh.gov.pk 202.163.115.13
SERVER IP: 202.163.115.13
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

www.forms.gov.pk 66.252.21.131
SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix)

www.fpsc.gov.pk 66.252.21.131
SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.fsc.gov.pk 66.252.21.131
SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix)

www.gda.gov.pk 66.197.236.245
SERVER IP: 66.197.236.245
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a PHP-CGI/0.1b

SERVER IP: 66.197.236.245
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 66.197.236.245
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 66.197.236.245
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.gefpak.gov.pk 66.252.21.131
SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.gjtmap.gov.pk 209.200.229.202
SERVER IP: 209.200.229.202
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache Webserver

www.governorpunjab.gov.pk 70.84.169.162
SERVER IP: 70.84.169.162
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

www.governorsindh.gov.pk 66.232.101.177
SERVER IP: 66.232.101.177
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.grbi.gov.pk 64.38.4.122
SERVER IP: 64.38.4.122
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.grbipunjab.gov.pk 74.220.207.60
SERVER IP: 74.220.207.60
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.39 (Unix) mod_fastcgi/2.4.2 mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b

SERVER IP: 74.220.207.60
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 74.220.207.60
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 74.220.207.60
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.gsp.gov.pk 67.18.7.162
SERVER IP: 67.18.7.162
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a PHP-CGI/0.1b

SERVER IP: 67.18.7.162
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 67.18.7.162
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 67.18.7.162
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.gujranwalapolice.gov.pk 208.106.165.231
SERVER IP: 208.106.165.231
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.gujratpolice.gov.pk 63.134.240.86
SERVER IP: 63.134.240.86
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

gulbergtownlahore.gov.pk 64.17.164.213
SERVER IP: 64.17.164.213
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.gulshantownkarachi.gov.pk 66.201.122.143
SERVER IP: 66.201.122.143
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.gwadarport.gov.pk 66.252.21.131
SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.hafizabadpolice.gov.pk 203.128.6.131
SERVER IP: 203.128.6.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

health.gov.pk 66.252.21.131
SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

www.health.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

www.healthnwfp.gov.pk 65.98.69.94
SERVER IP: 65.98.69.94
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

beta.hec.gov.pk 67.18.246.6
SERVER IP: 67.18.246.6
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a PHP-CGI/0.1b

SERVER IP: 67.18.246.6
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 67.18.246.6
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 67.18.246.6
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher
CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806
BID : 25498


SERVER IP: 67.18.246.6
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


SERVER IP: 67.18.246.6
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


eprints.hec.gov.pk 202.83.173.66
SERVER IP: 202.83.173.66
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.2.0 (Fedora)

www.hec.gov.pk 70.84.244.199
SERVER IP: 70.84.244.199
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.heritage.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

www.hesco.gov.pk 203.135.1.114
SERVER IP: 203.135.1.114
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.housing.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix)

www.hyderabadpolice.gov.pk 203.135.1.114
SERVER IP: 203.135.1.114
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.iap.gov.pk 64.191.81.181
SERVER IP: 64.191.81.181
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_jk/1.2.14 mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a PHP-CGI/0.1b

SERVER IP: 64.191.81.181
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 64.191.81.181
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 64.191.81.181
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.ideaspakistan.gov.pk 64.26.63.18
SERVER IP: 64.26.63.18
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.54 (Debian GNU/Linux) FrontPage/5.0.2.2635 mod_ssl/2.0.54 OpenSSL/0.9.7e

SERVER IP: 64.26.63.18
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 64.26.63.18
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


infopak.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.infopak.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

interior.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

www.interior.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

www.ipc.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

ipdf.gov.pk 209.71.203.20
SERVER IP: 209.71.203.20
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.54 (Linux/SUSE)

www.iphq.gov.pk 67.18.7.162
SERVER IP: 67.18.7.162
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a PHP-CGI/0.1b

SERVER IP: 67.18.7.162
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 67.18.7.162
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 67.18.7.162
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.ipo.gov.pk 208.109.87.136
SERVER IP: 208.109.87.136
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.ispr.gov.pk 72.3.142.125
SERVER IP: 72.3.142.125
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.itp.gov.pk 72.9.145.70
SERVER IP: 72.9.145.70
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b

SERVER IP: 72.9.145.70
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 72.9.145.70
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 72.9.145.70
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.jhangpolice.gov.pk 203.135.1.114
SERVER IP: 203.135.1.114
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.jobs.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.joinpakarmy.gov.pk 203.135.0.29
SERVER IP: 203.135.0.29
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.2.4 (FreeBSD) mod_ssl/2.2.4 OpenSSL/0.9.7e-p1 DAV/2 PHP/5.2.0 with Suhosin-Patch

SERVER IP: 203.135.0.29
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 203.135.0.29
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 203.135.0.29
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


SERVER IP: 203.135.0.29
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php
CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756
BID : 23359, 24089, 24259, 24261


SERVER IP: 203.135.0.29
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher
CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806
BID : 25498


SERVER IP: 203.135.0.29
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


SERVER IP: 203.135.0.29
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


www.kana.gov.pk 66.252.21.131
SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix)

www.karachicity.gov.pk 69.80.208.214
SERVER IP: 69.80.208.214
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

www.kashmir.gov.pk 203.135.0.17
SERVER IP: 203.135.0.17
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.54 (Unix) DAV/2 PHP/4.3.11

SERVER IP: 203.135.0.17
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 203.135.0.17
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.kasurpolice.gov.pk 70.87.181.66
SERVER IP: 70.87.181.66
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.kbca.gov.pk 72.9.147.110
SERVER IP: 72.9.147.110
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a PHP-CGI/0.1b

SERVER IP: 72.9.147.110
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 72.9.147.110
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 72.9.147.110
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.kcb.gov.pk 209.172.48.85
SERVER IP: 209.172.48.85
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.50 (Fedora)

sindhi.khairpur.gov.pk 202.5.152.253
SERVER IP: 202.5.152.253
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

urdu.khairpur.gov.pk 202.5.152.253
SERVER IP: 202.5.152.253
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.khanewalpolice.gov.pk 203.128.6.131
SERVER IP: 203.128.6.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

khushabpolice.gov.pk 70.87.181.66
SERVER IP: 70.87.181.66
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.kpf.gov.pk 66.160.180.205
SERVER IP: 66.160.180.205
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.kpt.gov.pk 203.124.43.23
SERVER IP: 203.124.43.23
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.ktp.gov.pk 72.9.145.70
SERVER IP: 72.9.145.70
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b

www.lahore.gov.pk 202.125.140.68
SERVER IP: 202.125.140.68
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.lahorepolice.gov.pk 74.52.179.50
SERVER IP: 74.52.179.50
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

www.lcb.gov.pk 202.59.80.25
SERVER IP: 202.59.80.25
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.ldc.gov.pk 72.9.157.42
SERVER IP: 72.9.157.42
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.lesco.gov.pk 65.254.231.115
SERVER IP: 65.254.231.115
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.lhc.gov.pk 204.3.198.53
SERVER IP: 204.3.198.53
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Rapidsite/Apa/1.3.33 (Unix) FrontPage/5.0.2.2510 mod_ssl/2.8.22 OpenSSL/0.9.8d

SERVER IP: 204.3.198.53
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.lieda.gov.pk 75.126.144.8
SERVER IP: 75.126.144.8
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.ljcp.gov.pk 72.9.156.44
SERVER IP: 72.9.156.44
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a PHP-CGI/0.1b

SERVER IP: 72.9.156.44
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 72.9.156.44
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 72.9.156.44
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.lodhranpolice.gov.pk 203.128.6.131
SERVER IP: 203.128.6.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.ltukarachi.gov.pk 66.232.103.61
SERVER IP: 66.232.103.61
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.mbdpolice.gov.pk 66.197.236.245
SERVER IP: 66.197.236.245
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a PHP-CGI/0.1b

SERVER IP: 66.197.236.245
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 66.197.236.245
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 66.197.236.245
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.mca.gov.pk 209.71.203.44
SERVER IP: 209.71.203.44
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

mercantilemarine.gov.pk 67.59.138.120
SERVER IP: 67.59.138.120
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

met.gov.pk 66.252.21.131
SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

www.met.gov.pk 66.252.21.131
SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

www.mianwalipolice.gov.pk 203.128.6.131
SERVER IP: 203.128.6.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.minfal.gov.pk 66.252.21.131
SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix)

www.minorities.gov.pk 66.252.21.131
SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix)

www.mng.gov.pk 63.134.235.106
SERVER IP: 63.134.235.106
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.mod.gov.pk 66.252.21.131
SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix)

www.moe.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/5.0

www.moeas.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix)

www.moenv.gov.pk 66.252.7.187
SERVER IP: 66.252.7.187
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix)

mofa.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

www.mofa.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.mohtasib.gov.pk 202.83.164.51
SERVER IP: 202.83.164.51
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/5.0

moip.gov.pk 66.252.7.187
SERVER IP: 66.252.7.187
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix)

www.moip.gov.pk 66.252.7.187
SERVER IP: 66.252.7.187
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix)

www.moit.gov.pk 66.252.21.131
SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix)

www.moitt.gov.pk 66.252.21.131
SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix)

www.moka.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix)

www.molaw.gov.pk 66.252.7.187
SERVER IP: 66.252.7.187
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix)

www.molm.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix)

www.mopa.gov.pk 66.252.21.131
SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix)

www.mops.gov.pk 66.252.7.187
SERVER IP: 66.252.7.187
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix)

www.mopw.gov.pk 66.252.21.131
SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/5.0

www.mora.gov.pk 66.252.7.187
SERVER IP: 66.252.7.187
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix)

most.gov.pk 66.252.7.187
SERVER IP: 66.252.7.187
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix)

www.most.gov.pk 66.252.21.131
SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

www.mowp.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix)

www.moya.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix)

www.mpnr.gov.pk 66.252.21.131
SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix)

mtbfpakistan.gov.pk 72.9.144.119
SERVER IP: 72.9.144.119
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.mtbfpakistan.gov.pk 72.9.144.119
SERVER IP: 72.9.144.119
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

multan.gov.pk 66.193.188.132
SERVER IP: 66.193.188.132
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.multan.gov.pk 66.193.188.132
SERVER IP: 66.193.188.132
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.multanpolice.gov.pk 208.106.165.233
SERVER IP: 208.106.165.233
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.muzaffargarhpolice.gov.pk 70.87.181.66
SERVER IP: 70.87.181.66
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.na.gov.pk 66.252.7.187
SERVER IP: 66.252.7.187
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

www.nab.gov.pk 66.252.21.131
SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.nacp.gov.pk 72.52.150.46
SERVER IP: 72.52.150.46
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) PHP/5.1.2 mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a

SERVER IP: 72.52.150.46
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 72.52.150.46
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 72.52.150.46
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 72.52.150.46
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


SERVER IP: 72.52.150.46
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php
CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756
BID : 23359, 24089, 24259, 24261


SERVER IP: 72.52.150.46
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher
CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806
BID : 25498


SERVER IP: 72.52.150.46
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


SERVER IP: 72.52.150.46
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


www.nadra.gov.pk 58.65.166.228
SERVER IP: 58.65.166.228
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.narowalpolice.gov.pk 72.9.148.100
SERVER IP: 72.9.148.100
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.39 (Unix) mod_bwlimited/1.4 mod_auth_passthrough/1.8 mod_log_bytes/1.2 FrontPage/5.0.2.2635 mod_ssl/2.8.30 OpenSSL/0.9.7a

SERVER IP: 72.9.148.100
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 72.9.148.100
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 72.9.148.100
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.nat-ipm.gov.pk 203.124.43.40
SERVER IP: 203.124.43.40
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.navtec.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

www.nawabshah.gov.pk 203.135.1.114
SERVER IP: 203.135.1.114
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.ncb.gov.pk 66.252.7.187
SERVER IP: 66.252.7.187
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.nccwd.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

forum.ncgr.gov.pk 203.135.0.22
SERVER IP: 203.135.0.22
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.ncgr.gov.pk 203.135.0.22
SERVER IP: 203.135.0.22
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.ncs-nsds.gov.pk 203.124.43.40
SERVER IP: 203.124.43.40
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

ncsw.gov.pk 64.38.19.130
SERVER IP: 64.38.19.130
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 PHP/4.4.7 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a

SERVER IP: 64.38.19.130
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 64.38.19.130
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 64.38.19.130
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.ncsw.gov.pk 64.38.19.130
SERVER IP: 64.38.19.130
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 PHP/4.4.7 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a

SERVER IP: 64.38.19.130
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 64.38.19.130
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 64.38.19.130
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.ncsw1.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

ndma.gov.pk 64.38.4.122
SERVER IP: 64.38.4.122
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

ndmc.gov.pk 203.124.43.40
SERVER IP: 203.124.43.40
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.ndp.gov.pk 203.135.1.114
SERVER IP: 203.135.1.114
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/5.0

ndpsindh.gov.pk 67.18.7.162
SERVER IP: 67.18.7.162
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a PHP-CGI/0.1b

SERVER IP: 67.18.7.162
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 67.18.7.162
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 67.18.7.162
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.neas.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.nescom.gov.pk 203.135.39.163
SERVER IP: 203.135.39.163
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.40 (Red Hat Linux)

www.nfc.gov.pk 66.252.21.131
SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.nfdc.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.ngos.gov.pk 72.9.156.44
SERVER IP: 72.9.156.44
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a PHP-CGI/0.1b

SERVER IP: 72.9.156.44
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 72.9.156.44
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 72.9.156.44
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 72.9.156.44
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


SERVER IP: 72.9.156.44
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.ngosinfo.gov.pk 72.9.157.42
SERVER IP: 72.9.157.42
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.nha.gov.pk 209.124.60.43
SERVER IP: 209.124.60.43
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.nhmp.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.34 (Unix) PHP/4.4.0

SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.nhmpdb.gov.pk 66.252.21.131
SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.nibaf.gov.pk 66.252.21.131
SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.nim.gov.pk 202.165.244.10
SERVER IP: 202.165.244.10
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.2.3 (Unix) mod_ssl/2.2.3 OpenSSL/0.9.7a PHP/5.2.0

SERVER IP: 202.165.244.10
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 202.165.244.10
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 202.165.244.10
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 202.165.244.10
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


SERVER IP: 202.165.244.10
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php
CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756
BID : 23359, 24089, 24259, 24261


SERVER IP: 202.165.244.10
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher
CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806
BID : 25498


SERVER IP: 202.165.244.10
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


SERVER IP: 202.165.244.10
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


www.nip.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix)

www.nla.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

nlauit.gov.pk 58.65.160.239
SERVER IP: 58.65.160.239
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/7.0
- The remote host is running a Microsoft IIS webserver

www.nlauit.gov.pk 58.65.160.239
SERVER IP: 58.65.160.239
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/7.0
- The remote host is running a Microsoft IIS webserver

nlp.gov.pk 69.80.208.238
SERVER IP: 69.80.208.238
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.nlp.gov.pk 69.80.208.238
SERVER IP: 69.80.208.238
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.npb.gov.pk 203.99.60.141
SERVER IP: 203.99.60.141
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.npo.gov.pk 66.252.21.131
SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.nr3c.gov.pk 72.9.152.14
SERVER IP: 72.9.152.14
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.nrb.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

www.nrss.gov.pk 209.124.60.43
SERVER IP: 209.124.60.43
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.ntc.gov.pk 209.71.203.41
SERVER IP: 209.71.203.41
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

ntp.gov.pk 72.9.156.44
SERVER IP: 72.9.156.44
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a PHP-CGI/0.1b

SERVER IP: 72.9.156.44
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 72.9.156.44
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 72.9.156.44
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.ntrc.gov.pk 70.86.88.110
SERVER IP: 70.86.88.110
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

nwfp.gov.pk 65.36.138.94
SERVER IP: 65.36.138.94
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.52 (Red Hat)

SERVER IP: 65.36.138.94
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Script Injection attack The remote host is running a version of PHP which is older than 5.0.3 or 4.3.10. The remote version of this software is vulnerable to various security issues which may, under certain circumstances, allow attackers to execute arbitrary code on the remote host, provided that they can pass arbitrary data to some functions or bypass safe_mode. CVSS Base Score : 6 AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to PHP 5.0.3 or 4.3.10
CVE : CVE-2004-1018, CVE-2004-1019, CVE-2004-1020, CVE-2004-1063, CVE-2004-1064, CVE-2004-1065
BID : 11964, 11981, 11992, 12045


SERVER IP: 65.36.138.94
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher.
CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525
BID : 12963, 12962, 13143, 13163, 13164


SERVER IP: 65.36.138.94
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 65.36.138.94
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.nwfppsc.gov.pk 64.191.81.181
SERVER IP: 64.191.81.181
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_jk/1.2.14 mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a PHP-CGI/0.1b

SERVER IP: 64.191.81.181
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 64.191.81.181
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 64.191.81.181
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.nwfpwildlifedept.gov.pk 72.36.213.90
SERVER IP: 72.36.213.90
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

www.oec.gov.pk 66.152.166.74
SERVER IP: 66.152.166.74
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.ombudsmanpunjab.gov.pk 216.119.98.212
SERVER IP: 216.119.98.212
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.pac-klc.gov.pk 72.18.137.187
SERVER IP: 72.18.137.187
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

paccs.gov.pk 202.163.115.11
SERVER IP: 202.163.115.11
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.paco.gov.pk 67.18.119.226
SERVER IP: 67.18.119.226
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.pacpnwfp.gov.pk 72.36.213.90
SERVER IP: 72.36.213.90
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

paec.gov.pk 66.252.21.131
SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.34 (Unix) PHP/4.4.0

SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.paec.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

www.paf.gov.pk 66.252.7.187
SERVER IP: 66.252.7.187
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

pak.gov.pk 66.252.7.187
SERVER IP: 66.252.7.187
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

www.pak.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.pakboi.gov.pk 72.9.152.14
SERVER IP: 72.9.152.14
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

pakistan.gov.pk 66.252.7.187
SERVER IP: 66.252.7.187
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

www.pakistan.gov.pk 66.252.7.187
SERVER IP: 66.252.7.187
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

www.pakistanarmy.gov.pk 72.3.142.125
SERVER IP: 72.3.142.125
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

www.pakistanseeds.gov.pk 72.9.149.140
SERVER IP: 72.9.149.140
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.pakistantourism.gov.pk 72.9.144.119
SERVER IP: 72.9.144.119
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

www.pakmission-uk.gov.pk 212.227.124.198
SERVER IP: 212.227.124.198
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.paknavy.gov.pk 66.252.7.187
SERVER IP: 66.252.7.187
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

www.pakpattanpolice.gov.pk 208.113.187.98
SERVER IP: 208.113.187.98
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.54 (Unix) PHP/4.4.7 mod_ssl/2.0.54 OpenSSL/0.9.7e mod_fastcgi/2.4.2 DAV/2 SVN/1.4.2

SERVER IP: 208.113.187.98
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 208.113.187.98
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.pakpost.gov.pk 203.128.6.131
SERVER IP: 203.128.6.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.pakwaters.gov.pk 202.38.50.50
SERVER IP: 202.38.50.50
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

www.panwfp.gov.pk 65.175.69.203
SERVER IP: 65.175.69.203
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.39 (Unix) PHP/5.2.4 mod_bwlimited/1.4 mod_auth_passthrough/1.8 mod_log_bytes/1.2 FrontPage/5.0.2.2635 mod_ssl/2.8.30 OpenSSL/0.9.7a

SERVER IP: 65.175.69.203
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 65.175.69.203
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 65.175.69.203
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


SERVER IP: 65.175.69.203
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


www.pap.gov.pk 203.135.58.5
SERVER IP: 203.135.58.5
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.53 (Fedora)

www.parc.gov.pk 66.252.21.131
SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

www.pas.gov.pk 202.163.96.130
SERVER IP: 202.163.96.130
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Netscape-Enterprise/4.1

SERVER IP: 202.163.96.130
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to multiple attack vectors The remote iPlanet webserver (according to it's version number) is vulnerable to a bug wherein a remote user can retrieve sensitive data from memory allocation pools, or cause a denial of service against the server. . IAVA Reference : 2001-a-0007 IAVA Reference : 2002-A-0012 CVSS Base Score : 6 AV:R/AC:L/Au:NR/C:P/I:N/A:C/B:N Solution : Update to iPlanet 4.1 SP7 or newer See also : http://www.atstake.com/research/advisories/2001/a041601-1.txt
CVE : CVE-2001-0327
BID : 6826


www.pasc.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.34 (Unix) PHP/4.4.0

SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.pastic.gov.pk 66.252.21.131
SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.pbm.gov.pk 66.252.21.131
SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.pcb.gov.pk 66.252.21.131
SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

www.pcret.gov.pk 66.252.7.187
SERVER IP: 66.252.7.187
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/5.0

www.pcrwr.gov.pk 66.252.21.131
SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.pcsir.gov.pk 66.252.21.131
SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

pemra.gov.pk 203.135.1.114
SERVER IP: 203.135.1.114
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.pemra.gov.pk 203.135.1.114
SERVER IP: 203.135.1.114
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.pesco.gov.pk 202.38.50.51
SERVER IP: 202.38.50.51
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.peshawarhighcourt.gov.pk 72.36.213.90
SERVER IP: 72.36.213.90
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

www.pfcsindh.gov.pk 202.163.115.13
SERVER IP: 202.163.115.13
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.pha.gov.pk 66.252.7.187
SERVER IP: 66.252.7.187
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

phc.gov.pk 72.51.46.233
SERVER IP: 72.51.46.233
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.52 (Red Hat)

SERVER IP: 72.51.46.233
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher
CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806
BID : 25498


SERVER IP: 72.51.46.233
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


www.phc.gov.pk 72.51.46.233
SERVER IP: 72.51.46.233
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.52 (Red Hat)

SERVER IP: 72.51.46.233
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher
CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806
BID : 25498


SERVER IP: 72.51.46.233
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


www.pid.gov.pk 64.38.44.98
SERVER IP: 64.38.44.98
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.pims.gov.pk 72.9.152.14
SERVER IP: 72.9.152.14
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.pitac.gov.pk 203.128.6.131
SERVER IP: 203.128.6.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

pitb.gov.pk 202.125.140.233
SERVER IP: 202.125.140.233
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

stp.pitb.gov.pk 202.125.140.233
SERVER IP: 202.125.140.233
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.pitb.gov.pk 202.125.140.233
SERVER IP: 202.125.140.233
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.planningcommission.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.plantprotection.gov.pk 72.18.131.195
SERVER IP: 72.18.131.195
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.pmajk.gov.pk 72.9.144.119
SERVER IP: 72.9.144.119
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.pmdc.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.34 (Unix) PHP/4.4.0

SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.pmnh.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.pmsectt.gov.pk 66.252.21.131
SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

www.pmupunjab.gov.pk 67.19.245.84
SERVER IP: 67.19.245.84
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_jk/1.2.14 mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a PHP-CGI/0.1b

www.pmusindh.gov.pk 202.163.115.11
SERVER IP: 202.163.115.11
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.pndpunjab.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.pof.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.ppib.gov.pk 216.32.82.59
SERVER IP: 216.32.82.59
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 PHP/4.4.7 FrontPage/5.0.2.2635.SR1.2

www.ppmi.gov.pk 216.127.82.50
SERVER IP: 216.127.82.50
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.33 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 PHP/4.3.11 FrontPage/5.0.2.2635 mod_ssl/2.8.22 OpenSSL/0.9.7a

SERVER IP: 216.127.82.50
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 216.127.82.50
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 216.127.82.50
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 216.127.82.50
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


SERVER IP: 216.127.82.50
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


presidentofpakistan.gov.pk 72.3.142.125
SERVER IP: 72.3.142.125
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.presidentofpakistan.gov.pk 72.3.142.125
SERVER IP: 72.3.142.125
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.privatisation.gov.pk 63.74.123.31
SERVER IP: 63.74.123.31
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/4.0
- The remote host is running a Microsoft IIS webserver

www.prsp-cmiphc.gov.pk 203.215.180.61
SERVER IP: 203.215.180.61
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.psf.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.34 (Unix) PHP/4.4.0

SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.psic.gov.pk 74.52.93.50
SERVER IP: 74.52.93.50
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.pta.gov.pk 66.252.21.131
SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.34 (Unix) PHP/4.4.0

SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.ptb.gov.pk 203.124.43.14
SERVER IP: 203.124.43.14
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_gzip/1.3.26.1a mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a

www.punjab-prmp.gov.pk 71.32.228.165
SERVER IP: 71.32.228.165
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

bahawalnagar.punjab.gov.pk 203.215.180.61
SERVER IP: 203.215.180.61
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

hemis.punjab.gov.pk 203.215.175.104
SERVER IP: 203.215.175.104
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

job.punjab.gov.pk 203.215.180.61
SERVER IP: 203.215.180.61
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

lrmis.punjab.gov.pk 203.215.175.104
SERVER IP: 203.215.175.104
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

parb.punjab.gov.pk 203.215.180.61
SERVER IP: 203.215.180.61
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

ppmis.punjab.gov.pk 203.215.180.61
SERVER IP: 203.215.180.61
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

tdcp.punjab.gov.pk 203.215.180.61
SERVER IP: 203.215.180.61
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

tender.punjab.gov.pk 203.215.180.61
SERVER IP: 203.215.180.61
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.punjab.gov.pk 203.215.175.4
203.215.180.61
SERVER IP: 203.215.175.4
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Oracle-Application-Server-10g/10.1.2.0.2 Oracle-HTTP-Server OracleAS-Web-Cache-10g/10.1.2.0.2 (N,ecid=11236727867734,0)

SERVER IP: 203.215.175.4
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
The remote host is running the Oracle Application Server 10g version 10.1.2.0.2 Oracle-HTTP-Server

SERVER IP: 203.215.180.61
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

www.punjablaws.gov.pk 203.135.58.5
SERVER IP: 203.135.58.5
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.53 (Fedora)

www.punjabpolice.gov.pk 208.106.150.125
SERVER IP: 208.106.150.125
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.pwd.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.pwdsindh.gov.pk 208.116.45.98
SERVER IP: 208.116.45.98
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

www.radio.gov.pk 66.252.7.187
SERVER IP: 66.252.7.187
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

www.railways.gov.pk 66.252.7.187
SERVER IP: 66.252.7.187
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix)

rajanpurpolice.gov.pk 70.87.181.66
SERVER IP: 70.87.181.66
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

wasa.rda.gov.pk 72.55.156.39
SERVER IP: 72.55.156.39
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.52 (CentOS)

www.rfdp.gov.pk 63.134.240.85
SERVER IP: 63.134.240.85
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

www.rsu-sindh.gov.pk 74.50.68.193
SERVER IP: 74.50.68.193
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.safron.gov.pk 66.252.7.187
SERVER IP: 66.252.7.187
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix)

www.sahiwal.gov.pk 206.51.236.166
SERVER IP: 206.51.236.166
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.sargodhapolice.gov.pk 203.128.6.131
SERVER IP: 203.128.6.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

SERVER IP: 203.128.6.131
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


www.savings.gov.pk 66.252.21.131
SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/5.0

www.sco.gov.pk 203.135.1.114
SERVER IP: 203.135.1.114
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/5.0

www.scp50.gov.pk 203.135.1.114
SERVER IP: 203.135.1.114
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.sdssp.gov.pk 66.201.122.153
SERVER IP: 66.201.122.153
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.sec.gov.pk 209.51.142.146
SERVER IP: 209.51.142.146
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.39 (Unix) mod_bwlimited/1.4 mod_log_bytes/1.2 mod_jk/1.2.25 mod_auth_passthrough/1.8 FrontPage/5.0.2.2635 mod_ssl/2.8.30 OpenSSL/0.9.7a

SERVER IP: 209.51.142.146
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 209.51.142.146
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 209.51.142.146
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.secp.gov.pk 209.71.203.34
SERVER IP: 209.71.203.34
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.senate.gov.pk 66.252.7.187
SERVER IP: 66.252.7.187
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

sessi.gov.pk 202.163.115.13
SERVER IP: 202.163.115.13
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.sessi.gov.pk 202.163.115.13
SERVER IP: 202.163.115.13
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.sheikhupurapolice.gov.pk 70.85.227.130
SERVER IP: 70.85.227.130
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

shippingoffice.gov.pk 67.59.138.120
SERVER IP: 67.59.138.120
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.shydo.gov.pk 66.252.7.187
SERVER IP: 66.252.7.187
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.34 (Unix) PHP/4.4.0

SERVER IP: 66.252.7.187
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 66.252.7.187
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.sialkot.gov.pk 203.215.180.61
SERVER IP: 203.215.180.61
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

SERVER IP: 203.215.180.61
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP which is older than 5.0.5. This version has a number of bugs which allow attackers to execute or retrieve arbitrary files outside of the web root directory. An attacker, exploiting these flaws, would only need to send a malformed HTTP request to the vulnerable system. Successful exploitation would result in the loss of Confidential data or a tarnishing of system Integrity. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 5.0.5 or later
BID : 15119


SERVER IP: 203.215.180.61
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host may give an attacker information useful for future attacks The remote host is running a version of PHP which is older than 5.0.6. This version has a flaw wherein remote attackers can reenable the 'register_globals' parameter. In addition, a remote attacker may be able to overwrite the 'GLOBAL' variable. This may lead to another, more serious, exploitation. CVSS Base Score : 9.3 CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C Solution : Upgrade to PHP 5.0.6 or later See also : http://www.php.net/release_4_4_1.php
CVE : CVE-2006-0395, CVE-2005-2713, CVE-2005-2714, CVE-2005-3319, CVE-2005-3353, CVE-2005-3389, CVE-2005-3706, CVE-2005-3712, CVE-2005-4217, CVE-2005-4504, CVE-2006-0383, CVE-2006-0384, CVE-2006-0386, CVE-2006-0387, CVE-2006-0388, CVE-2006-0389, CVE-2006-0391, CVE-2006-3016, CVE-2006-3018, CVE-2005-3883, CVE-2006-3017, CVE-2005-3390, CVE-2005-3392, CVE-2005-3391
BID : 15571, 16907, 17843, 15249, 15411, 15413, 15250


SERVER IP: 203.215.180.61
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 203.215.180.61
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


SERVER IP: 203.215.180.61
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php
CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756
BID : 23359, 24089, 24259, 24261


SERVER IP: 203.215.180.61
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher
CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806
BID : 25498


SERVER IP: 203.215.180.61
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


www.sindh.gov.pk 66.252.7.187
SERVER IP: 66.252.7.187
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.sindhagri.gov.pk 202.163.115.13
SERVER IP: 202.163.115.13
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.sindhagrimarketing.gov.pk 203.135.0.22
SERVER IP: 203.135.0.22
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.sindhcmit.gov.pk 203.135.1.114
SERVER IP: 203.135.1.114
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/5.0

www.sindhcpsd.gov.pk 202.163.115.13
SERVER IP: 202.163.115.13
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.sindhedu.gov.pk 203.135.1.114
SERVER IP: 203.135.1.114
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.sindhhealth.gov.pk 202.163.96.130
SERVER IP: 202.163.96.130
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Netscape-Enterprise/4.1

SERVER IP: 202.163.96.130
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to multiple attack vectors The remote iPlanet webserver (according to it's version number) is vulnerable to a bug wherein a remote user can retrieve sensitive data from memory allocation pools, or cause a denial of service against the server. . IAVA Reference : 2001-a-0007 IAVA Reference : 2002-A-0012 CVSS Base Score : 6 AV:R/AC:L/Au:NR/C:P/I:N/A:C/B:N Solution : Update to iPlanet 4.1 SP7 or newer See also : http://www.atstake.com/research/advisories/2001/a041601-1.txt
CVE : CVE-2001-0327
BID : 6826


www.sindhhighcourt.gov.pk 67.18.119.226
SERVER IP: 67.18.119.226
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

SERVER IP: 67.18.119.226
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher
CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806
BID : 25498


SERVER IP: 67.18.119.226
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


www.sindhlivestockfishries.gov.pk 202.163.115.13
SERVER IP: 202.163.115.13
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.sindhpolice.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.sindhttb.gov.pk 208.109.78.57
68.178.254.209
SERVER IP: 208.109.78.57
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

SERVER IP: 68.178.254.209
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

www.sports.gov.pk 66.252.7.187
SERVER IP: 66.252.7.187
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

www.spsc.gov.pk 203.135.0.14
SERVER IP: 203.135.0.14
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.52

www.statistics.gov.pk 66.252.21.131
SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix)

www.statpak.gov.pk 203.135.0.29
SERVER IP: 203.135.0.29
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.2.4 (FreeBSD) mod_ssl/2.2.4 OpenSSL/0.9.7e-p1 DAV/2 PHP/5.2.0 with Suhosin-Patch

SERVER IP: 203.135.0.29
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 203.135.0.29
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 203.135.0.29
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


SERVER IP: 203.135.0.29
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php
CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756
BID : 23359, 24089, 24259, 24261


SERVER IP: 203.135.0.29
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher
CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806
BID : 25498


SERVER IP: 203.135.0.29
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


SERVER IP: 203.135.0.29
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


sindhi.sukkur.gov.pk 202.5.152.253
SERVER IP: 202.5.152.253
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

urdu.sukkur.gov.pk 202.5.152.253
SERVER IP: 202.5.152.253
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.suparco.gov.pk 202.163.115.13
SERVER IP: 202.163.115.13
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.supremecourt.gov.pk 72.51.39.208
SERVER IP: 72.51.39.208
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

tandoallahyar.gov.pk 66.252.21.131
SERVER IP: 66.252.21.131
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.tco.gov.pk 209.172.48.85
SERVER IP: 209.172.48.85
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.50 (Fedora)

www.tcp.gov.pk 202.163.115.11
SERVER IP: 202.163.115.11
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

tdap.gov.pk 72.29.70.239
SERVER IP: 72.29.70.239
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.33 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 PHP/4.3.11 FrontPage/5.0.2.2634a mod_ssl/2.8.22 OpenSSL/0.9.7a

SERVER IP: 72.29.70.239
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 72.29.70.239
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 72.29.70.239
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 72.29.70.239
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


SERVER IP: 72.29.70.239
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.tdap.gov.pk 72.29.70.239
SERVER IP: 72.29.70.239
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.33 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 PHP/4.3.11 FrontPage/5.0.2.2634a mod_ssl/2.8.22 OpenSSL/0.9.7a

SERVER IP: 72.29.70.239
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
The remote Apache server is running mod_frontpage. Versions older than 1.6.1 are vulnerable to a buffer overflow which may allow an attacker to gain root access on this host. *** Note that it is not possible to remotely determine the version of mod_frontpage which is running, so this may be a false positive Solution : Disable this module or upgrade to mod_frontpage 1.6.2
CVE : CVE-2002-0427
BID : 4251


SERVER IP: 72.29.70.239
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 72.29.70.239
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote webserver could potentially allow remote attackers to manipulate the password database The remote host appears to be running a version of Apache, an open source web server. This version of Apache is vulnerable to a flaw in the 'htpasswd' utilility. This issue is not considered a local flaw, as the program is not run setuid. An attacker, exploiting this flaw, would need to find a vulnerable Apache Web server which was making a call to 'htpasswd' via a CGI script. CVSS Base Score : 5.1 CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P Solution : Upgrade to latest version from apache.org. Organizations may also wish to disable CGI scripts which make system calls (insecure or otherwise). See also : http://www.apache.org
BID : 13777, 13778


SERVER IP: 72.29.70.239
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 72.29.70.239
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 72.29.70.239
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


SERVER IP: 72.29.70.239
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.textile.gov.pk 66.252.7.187
SERVER IP: 66.252.7.187
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix)

www.tourism.gov.pk 74.86.146.128
SERVER IP: 74.86.146.128
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/5.0

www.tremu.gov.pk 72.9.152.14
SERVER IP: 72.9.152.14
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.ttsinghpolice.gov.pk 70.87.181.66
SERVER IP: 70.87.181.66
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.urbanunit.gov.pk 203.215.180.61
SERVER IP: 203.215.180.61
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.vehari.gov.pk 203.128.6.132
SERVER IP: 203.128.6.132
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

veharipolice.gov.pk 70.47.123.187
SERVER IP: 70.47.123.187
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_fastcgi/2.4.2 mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a PHP-CGI/0.1b

SERVER IP: 70.47.123.187
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 70.47.123.187
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 70.47.123.187
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.wapda.gov.pk 202.38.50.35
SERVER IP: 202.38.50.35
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.wcb.gov.pk 202.125.140.68
SERVER IP: 202.125.140.68
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.women.gov.pk 66.252.7.187
SERVER IP: 66.252.7.187
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: IBM_HTTP_SERVER/1.3.19 Apache/1.3.20 (Unix)

www.wtopunjab.gov.pk 203.215.180.61
SERVER IP: 203.215.180.61
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.zsd.gov.pk 203.124.43.40
SERVER IP: 203.124.43.40
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver



IP Address Associated Domain Names
58.65.160.239
nlauit.gov.pk    www.nlauit.gov.pk        
58.65.166.228
www.nadra.gov.pk           
58.65.168.244
e.cbr.gov.pk           
63.74.123.31
www.privatisation.gov.pk           
63.134.214.91
www.cda.gov.pk           
63.134.235.106
www.mng.gov.pk           
63.134.240.85
www.rfdp.gov.pk           
63.134.240.86
www.gujratpolice.gov.pk           
63.134.249.99
www.ajp.gov.pk           
64.17.164.213
gulbergtownlahore.gov.pk           
64.26.63.18
www.ideaspakistan.gov.pk           
64.38.4.122
agpr.gov.pk    www.grbi.gov.pk    ndma.gov.pk     
64.38.19.130
ncsw.gov.pk    www.ncsw.gov.pk        
64.38.44.98
www.pid.gov.pk           
64.151.197.190
www.afic.gov.pk           
64.191.81.181
www.iap.gov.pk    www.nwfppsc.gov.pk        
64.191.87.151
www.fatimajinnah.gov.pk           
65.36.138.94
nwfp.gov.pk           
65.98.69.93
www.fatada.gov.pk           
65.98.69.94
www.healthnwfp.gov.pk           
65.175.69.203
www.panwfp.gov.pk           
65.254.231.115
www.lesco.gov.pk           
66.38.187.70
iso.finance.gov.pk    www.finance.gov.pk        
66.152.166.74
www.oec.gov.pk           
66.160.180.205
www.kpf.gov.pk           
66.193.188.132
multan.gov.pk    www.multan.gov.pk        
66.197.217.37
www.bahawalpur.gov.pk           
66.197.236.245
www.gda.gov.pk    www.mbdpolice.gov.pk        
66.201.122.45
www.bankingmohtasib.gov.pk           
66.201.122.143
www.gulshantownkarachi.gov.pk           
66.201.122.153
www.sdssp.gov.pk           
66.201.122.201
www.cbr.gov.pk    fbr.gov.pk        
66.206.28.16
www.borsindh.gov.pk           
66.232.101.177
www.governorsindh.gov.pk           
66.232.103.61
www.ltukarachi.gov.pk           
66.252.7.187
www.aepam.gov.pk    ead.gov.pk    www.ncb.gov.pk    www.railways.gov.pk  
www.agp.gov.pk    www.moenv.gov.pk    www.paf.gov.pk    www.safron.gov.pk  
amis.gov.pk    moip.gov.pk    pak.gov.pk    www.senate.gov.pk  
www.amis.gov.pk    www.moip.gov.pk    pakistan.gov.pk    www.shydo.gov.pk  
www.attockpolice.gov.pk    www.molaw.gov.pk    www.pakistan.gov.pk    www.sindh.gov.pk  
www.cabinet.gov.pk    www.mops.gov.pk    www.paknavy.gov.pk    www.sports.gov.pk  
www.census.gov.pk    www.mora.gov.pk    www.pcret.gov.pk    www.textile.gov.pk  
www.commerce.gov.pk    most.gov.pk    www.pha.gov.pk    www.women.gov.pk  
www.dgip.gov.pk    www.na.gov.pk    www.radio.gov.pk     
66.252.21.131
www.alp.gov.pk    health.gov.pk    www.most.gov.pk    www.pcb.gov.pk  
anf.gov.pk    www.kana.gov.pk    www.mpnr.gov.pk    www.pcrwr.gov.pk  
www.cii.gov.pk    met.gov.pk    www.nab.gov.pk    www.pcsir.gov.pk  
commerce.gov.pk    www.met.gov.pk    www.nfc.gov.pk    www.pmsectt.gov.pk  
www.enercon.gov.pk    www.minfal.gov.pk    www.nhmpdb.gov.pk    www.pta.gov.pk  
www.fgehf.gov.pk    www.minorities.gov.pk    www.nibaf.gov.pk    www.savings.gov.pk  
www.forms.gov.pk    www.mod.gov.pk    www.npo.gov.pk    www.statistics.gov.pk  
www.fpsc.gov.pk    www.moit.gov.pk    paec.gov.pk    tandoallahyar.gov.pk  
www.fsc.gov.pk    www.moitt.gov.pk    www.parc.gov.pk     
www.gefpak.gov.pk    www.mopa.gov.pk    www.pastic.gov.pk     
www.gwadarport.gov.pk    www.mopw.gov.pk    www.pbm.gov.pk     
67.15.97.231
www.expopakistan.gov.pk           
67.18.7.162
www.gsp.gov.pk    www.iphq.gov.pk    ndpsindh.gov.pk     
67.18.34.220
www.academy.gov.pk           
67.18.119.226
www.epza.gov.pk    www.paco.gov.pk    www.sindhhighcourt.gov.pk     
67.18.246.6
beta.hec.gov.pk           
67.19.245.84
www.pmupunjab.gov.pk           
67.59.138.120
mercantilemarine.gov.pk    shippingoffice.gov.pk        
68.178.254.209
www.sindhttb.gov.pk           
69.25.27.170
www.edc.gov.pk           
69.80.208.202
armystaffcollege.gov.pk           
69.80.208.214
www.karachicity.gov.pk           
69.80.208.238
nlp.gov.pk    www.nlp.gov.pk        
70.47.123.187
veharipolice.gov.pk           
70.84.169.162
www.governorpunjab.gov.pk           
70.84.244.199
www.hec.gov.pk           
70.85.227.130
www.sheikhupurapolice.gov.pk           
70.86.88.110
www.ntrc.gov.pk           
70.87.181.66
bahawalnagarpolice.gov.pk    khushabpolice.gov.pk    rajanpurpolice.gov.pk     
www.kasurpolice.gov.pk    www.muzaffargarhpolice.gov.pk    www.ttsinghpolice.gov.pk     
71.32.228.165
www.punjab-prmp.gov.pk           
72.3.142.125
www.ispr.gov.pk    www.pakistanarmy.gov.pk    presidentofpakistan.gov.pk    www.presidentofpakistan.gov.pk  
72.9.144.119
www.ajkpolice.gov.pk    mtbfpakistan.gov.pk    www.pakistantourism.gov.pk     
buner.gov.pk    www.mtbfpakistan.gov.pk    www.pmajk.gov.pk     
72.9.145.70
www.itp.gov.pk    www.ktp.gov.pk        
72.9.147.110
www.kbca.gov.pk           
72.9.148.100
www.narowalpolice.gov.pk           
72.9.149.140
www.pakistanseeds.gov.pk           
72.9.152.14
www.nr3c.gov.pk    www.pakboi.gov.pk    www.pims.gov.pk    www.tremu.gov.pk  
72.9.156.44
www.ajkmdrp.gov.pk    www.ljcp.gov.pk    www.ngos.gov.pk    ntp.gov.pk  
72.9.157.42
www.ldc.gov.pk    www.ngosinfo.gov.pk        
72.18.131.195
www.plantprotection.gov.pk           
72.18.137.187
www.pac-klc.gov.pk           
72.29.70.239
www.epb.gov.pk    tdap.gov.pk    www.tdap.gov.pk     
72.36.213.90
www.nwfpwildlifedept.gov.pk    www.pacpnwfp.gov.pk    www.peshawarhighcourt.gov.pk     
72.51.39.208
www.supremecourt.gov.pk           
72.51.46.233
phc.gov.pk    www.phc.gov.pk        
72.52.150.46
www.nacp.gov.pk           
72.55.156.39
wasa.rda.gov.pk           
74.50..40
fata.gov.pk    www.fata.gov.pk        
74.50.68.193
www.rsu-sindh.gov.pk           
74.52.93.50
www.psic.gov.pk           
74.52.179.50
www.lahorepolice.gov.pk           
74.86.146.128
www.abbottabad.gov.pk    www.housing.gov.pk    www.mowp.gov.pk    www.pasc.gov.pk  
www.anf.gov.pk    infopak.gov.pk    www.moya.gov.pk    www.planningcommission.gov.pk  
www.chakwal.gov.pk    www.infopak.gov.pk    www.navtec.gov.pk    www.pmdc.gov.pk  
www.cmtl.gov.pk    interior.gov.pk    www.nccwd.gov.pk    www.pmnh.gov.pk  
www.communication.gov.pk    www.interior.gov.pk    www.ncsw1.gov.pk    www.pndpunjab.gov.pk  
www.culture.gov.pk    www.ipc.gov.pk    www.neas.gov.pk    www.pof.gov.pk  
www.cwhr.gov.pk    www.jobs.gov.pk    www.nfdc.gov.pk    www.psf.gov.pk  
www.ead.gov.pk    www.moe.gov.pk    www.nhmp.gov.pk    www.pwd.gov.pk  
www.eadtraining.gov.pk    www.moeas.gov.pk    www.nip.gov.pk    www.sindhpolice.gov.pk  
www.establishment.gov.pk    mofa.gov.pk    www.nla.gov.pk    www.tourism.gov.pk  
www.fia.gov.pk    www.mofa.gov.pk    www.nrb.gov.pk     
www.health.gov.pk    www.moka.gov.pk    www.paec.gov.pk     
www.heritage.gov.pk    www.molm.gov.pk    www.pak.gov.pk     
74.220.207.60
www.grbipunjab.gov.pk           
75.126.144.8
www.lieda.gov.pk           
202.5.152.253
sindhi.khairpur.gov.pk    urdu.khairpur.gov.pk    sindhi.sukkur.gov.pk    urdu.sukkur.gov.pk  
202.38.50.35
www.wapda.gov.pk           
202.38.50.50
www.pakwaters.gov.pk           
202.38.50.51
www.pesco.gov.pk           
202.59.80.25
www.lcb.gov.pk           
202.83.164.51
www.mohtasib.gov.pk           
202.83.173.66
eprints.hec.gov.pk           
202.125.140.68
www.lahore.gov.pk    www.wcb.gov.pk        
202.125.140.233
pitb.gov.pk    stp.pitb.gov.pk    www.pitb.gov.pk     
202.133.44.6
www.agricbal.gov.pk           
202.163.96.130
www.pas.gov.pk    www.sindhhealth.gov.pk        
202.163.115.10
www.eobi.gov.pk           
202.163.115.11
paccs.gov.pk    www.pmusindh.gov.pk    www.tcp.gov.pk     
202.163.115.13
www.fdsindh.gov.pk    sessi.gov.pk    www.sindhcpsd.gov.pk     
www.foodsindh.gov.pk    www.sessi.gov.pk    www.sindhlivestockfishries.gov.pk     
www.pfcsindh.gov.pk    www.sindhagri.gov.pk    www.suparco.gov.pk     
202.165.238.12
www.ep.gov.pk           
202.165.244.10
www.nim.gov.pk           
203.99.60.141
www.npb.gov.pk           
203.124.43.12
faef.gov.pk           
203.124.43.14
www.ptb.gov.pk           
203.124.43.23
www.kpt.gov.pk           
203.124.43.40
www.faisalabad.gov.pk    www.ncs-nsds.gov.pk    www.zsd.gov.pk     
www.nat-ipm.gov.pk    ndmc.gov.pk        
203.128.6.131
www.bahawalpurpolice.gov.pk    www.khanewalpolice.gov.pk    www.mianwalipolice.gov.pk    www.pitac.gov.pk  
www.hafizabadpolice.gov.pk    www.lodhranpolice.gov.pk    www.pakpost.gov.pk    www.sargodhapolice.gov.pk  
203.128.6.132
agpunjab.gov.pk    www.cpwb.gov.pk    www.vehari.gov.pk     
www.bhakkarpolice.gov.pk    www.epblhr.gov.pk        
203.135..14
www.spsc.gov.pk           
203.135..17
www.ajk.gov.pk    www.bhakkar.gov.pk    www.kashmir.gov.pk     
203.135..22
forum.ncgr.gov.pk    www.ncgr.gov.pk    www.sindhagrimarketing.gov.pk     
203.135..29
www.financedeptsindh.gov.pk    www.joinpakarmy.gov.pk    www.statpak.gov.pk     
203.135.1.114
www.beoe.gov.pk    www.fda.gov.pk    www.nawabshah.gov.pk    www.scp50.gov.pk  
www.cbfc.gov.pk    www.fde.gov.pk    www.ndp.gov.pk    www.sindhcmit.gov.pk  
www.csru.gov.pk    www.hesco.gov.pk    pemra.gov.pk    www.sindhedu.gov.pk  
www.customhyd.gov.pk    www.hyderabadpolice.gov.pk    www.pemra.gov.pk     
www.etax.gov.pk    www.jhangpolice.gov.pk    www.sco.gov.pk     
203.135.39.163
www.nescom.gov.pk           
203.135.39.166
www.cesat.gov.pk           
203.135.58.5
www.pap.gov.pk    www.punjablaws.gov.pk        
203.175.64.18
www.erra.gov.pk           
203.175.64.21
www.dgkpolice.gov.pk           
203.215.175.4
www.punjab.gov.pk           
203.215.175.104
hemis.punjab.gov.pk    lrmis.punjab.gov.pk        
203.215.180.61
www.prsp-cmiphc.gov.pk    parb.punjab.gov.pk    tender.punjab.gov.pk    www.urbanunit.gov.pk  
bahawalnagar.punjab.gov.pk    ppmis.punjab.gov.pk    www.punjab.gov.pk    www.wtopunjab.gov.pk  
job.punjab.gov.pk    tdcp.punjab.gov.pk    www.sialkot.gov.pk     
204.3.198.53
www.lhc.gov.pk           
206.51.236.166
www.sahiwal.gov.pk           
208.106.150.125
www.punjabpolice.gov.pk           
208.106.165.231
www.gujranwalapolice.gov.pk           
208.106.165.232
www.faisalabadpolice.gov.pk           
208.106.165.233
www.multanpolice.gov.pk           
208.109.78.57
www.sindhttb.gov.pk           
208.109.87.136
www.ipo.gov.pk           
208.113.187.98
www.pakpattanpolice.gov.pk           
208.116.45.98
www.pwdsindh.gov.pk           
209.51.142.146
www.sec.gov.pk           
209.71.203.20
ipdf.gov.pk           
209.71.203.34
www.secp.gov.pk           
209.71.203.41
www.ntc.gov.pk           
209.71.203.44
www.ecp.gov.pk    www.elections.gov.pk    www.fm101.gov.pk    www.mca.gov.pk  
209.124.60.43
www.nha.gov.pk    www.nrss.gov.pk        
209.172.48.85
www.kcb.gov.pk    www.tco.gov.pk        
209.200.229.202
www.gjtmap.gov.pk           
212.227.124.198
www.pakmission-uk.gov.pk           
213.171.219.2
www.balochistanpolice.gov.pk           
216.32.82.59
www.ppib.gov.pk           
216.119.98.212
www.ombudsmanpunjab.gov.pk           
216.127.82.50
www.ppmi.gov.pk