It is not know if this information was collected with scripts or manually via 
Netcraft-type databases.

Example data:
--clip--
www.academy.gov.pk      67.18.34.220
        SERVER IP: 67.18.34.220
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

SERVER IP: 67.18.34.220
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote 
host is running PHP less than 5.2.0. This version is vulnerable to around 180 
bugs. An attacker, exploiting these flaws, would be able to impact 
Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 
CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or 
newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE :....
--clip--

Link:
http://cryptome.org/gov-pk.htm

- Juha-Matti
_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.

Reply via email to