summaryrefslogtreecommitdiff
path: root/report/discovery.csv
diff options
context:
space:
mode:
Diffstat (limited to 'report/discovery.csv')
-rw-r--r--report/discovery.csv56
1 files changed, 28 insertions, 28 deletions
diff --git a/report/discovery.csv b/report/discovery.csv
index 77c9638..8810ee1 100644
--- a/report/discovery.csv
+++ b/report/discovery.csv
@@ -1,28 +1,28 @@
-hostname,ip,vulnerability,exploitable
-bwa,10.2.1.8,/phpmyadmin/: phpMyAdmin directory found,
-bwa,10.2.1.8,/wordpress/: A Wordpress installation was found.,
-bwa,10.2.1.8,OSVDB-3233: /icons/README: Apache default file found.,
-bwa,10.2.1.8,OSVDB-3268: /images/: Directory indexing found.,
-bwa,10.2.1.8,OSVDB-3268: /images/?pattern=/etc/\*\&sort=name: Directory indexing found.,
-bwa,10.2.1.8,OSVDB-40478: TikiWiki contains a vulnerability which allows remote attackers to execute arbitrary PHP code.,
-metasploitable,10.2.1.1,/phpMyAdmin/: phpMyAdmin directory found,
-metasploitable,10.2.1.1,OSVDB-12184: /index.php?=PHPB8B5F2A0-3C92-11d3-A3A9-4C7B08C10000: PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings.,
-metasploitable,10.2.1.1,OSVDB-3092: /phpMyAdmin/: phpMyAdmin is for managing MySQL databases and should be protected or limited to authorized hosts.,
-metasploitable,10.2.1.1,OSVDB-3092: /phpMyAdmin/changelog.php: phpMyAdmin is for managing MySQL databases and should be protected or limited to authorized hosts.,
-metasploitable,10.2.1.1,OSVDB-3092: /test/: This might be interesting...,
-metasploitable,10.2.1.1,OSVDB-3233: /icons/README: Apache default file found.,
-metasploitable,10.2.1.1,OSVDB-3233: /phpinfo.php: Contains PHP configuration information,
-metasploitable,10.2.1.1,OSVDB-3268: /doc/: Directory indexing found.,
-metasploitable,10.2.1.1,OSVDB-3268: /icons/: Directory indexing found.,
-metasploitable,10.2.1.1,OSVDB-3268: /test/: Directory indexing found.,
-metasploitable,10.2.1.1,OSVDB-48: /doc/: The /doc/ directory is browsable. This may be /usr/doc.,
-metasploitable,10.2.1.1,OSVDB-877: HTTP TRACE method is active suggesting the host is vulnerable to XST,
-tomcat-apache,10.2.1.6,Apache/2.2.16 appears to be outdated (current is at least Apache/2.2.19). Apache 1.3.42 (final release) and 2.0.64 are also current.,
-tomcat-apache,10.2.1.6,OSVDB-3233: /icons/README: Apache default file found.,
-tomcat-apache,10.2.1.6,OSVDB-3268: /icons/: Directory indexing found.,
-ultimatelamp,10.2.1.3,OSVDB-3268: /images/: Directory indexing found.,
-ultimatelamp,10.2.1.3,OSVDB-3268: /images/?pattern=/etc/\*\&sort=name: Directory indexing found.,
-ultimatelamp,10.2.1.3,OSVDB-3233: /icons/README: Apache default file found.,
-ultimatelamp,10.2.1.3,OSVDB-40478: TikiWiki contains a vulnerability which allows remote attackers to execute arbitrary PHP code.,
-ultimatelamp,10.2.1.3,/wordpress/: A Wordpress installation was found.,
-ultimatelamp,10.2.1.3,/phpmyadmin/: phpMyAdmin directory found,
+hostname,vulnerability,exploitable
+bwa,/phpmyadmin/: phpMyAdmin directory found,
+bwa,/wordpress/: A Wordpress installation was found.,
+bwa,OSVDB-3233: /icons/README: Apache default file found.,
+bwa,OSVDB-3268: /images/: Directory indexing found.,
+bwa,OSVDB-3268: /images/?pattern=/etc/\*\&sort=name: Directory indexing found.,
+bwa,OSVDB-40478: TikiWiki contains a vulnerability which allows remote attackers to execute arbitrary PHP code.,
+metasploitable,/phpMyAdmin/: phpMyAdmin directory found,
+metasploitable,OSVDB-12184: /index.php?=PHPB8B5F2A0-3C92-11d3-A3A9-4C7B08C10000: PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings.,
+metasploitable,OSVDB-3092: /phpMyAdmin/: phpMyAdmin is for managing MySQL databases and should be protected or limited to authorized hosts.,
+metasploitable,OSVDB-3092: /phpMyAdmin/changelog.php: phpMyAdmin is for managing MySQL databases and should be protected or limited to authorized hosts.,
+metasploitable,OSVDB-3092: /test/: This might be interesting...,
+metasploitable,OSVDB-3233: /icons/README: Apache default file found.,
+metasploitable,OSVDB-3233: /phpinfo.php: Contains PHP configuration information,
+metasploitable,OSVDB-3268: /doc/: Directory indexing found.,
+metasploitable,OSVDB-3268: /icons/: Directory indexing found.,
+metasploitable,OSVDB-3268: /test/: Directory indexing found.,
+metasploitable,OSVDB-48: /doc/: The /doc/ directory is browsable. This may be /usr/doc.,
+metasploitable,OSVDB-877: HTTP TRACE method is active suggesting the host is vulnerable to XST,
+tomcat-apache,Apache/2.2.16 appears to be outdated (current is at least Apache/2.2.19). Apache 1.3.42 (final release) and 2.0.64 are also current.,
+tomcat-apache,OSVDB-3233: /icons/README: Apache default file found.,
+tomcat-apache,OSVDB-3268: /icons/: Directory indexing found.,
+ultimatelamp,OSVDB-3268: /images/: Directory indexing found.,
+ultimatelamp,OSVDB-3268: /images/?pattern=/etc/\*\&sort=name: Directory indexing found.,
+ultimatelamp,OSVDB-3233: /icons/README: Apache default file found.,
+ultimatelamp,OSVDB-40478: TikiWiki contains a vulnerability which allows remote attackers to execute arbitrary PHP code.,
+ultimatelamp,/wordpress/: A Wordpress installation was found.,
+ultimatelamp,/phpmyadmin/: phpMyAdmin directory found,