diff options
Diffstat (limited to 'report/discovery.csv')
| -rw-r--r-- | report/discovery.csv | 56 |
1 files changed, 28 insertions, 28 deletions
diff --git a/report/discovery.csv b/report/discovery.csv index 77c9638..8810ee1 100644 --- a/report/discovery.csv +++ b/report/discovery.csv @@ -1,28 +1,28 @@ -hostname,ip,vulnerability,exploitable -bwa,10.2.1.8,/phpmyadmin/: phpMyAdmin directory found, -bwa,10.2.1.8,/wordpress/: A Wordpress installation was found., -bwa,10.2.1.8,OSVDB-3233: /icons/README: Apache default file found., -bwa,10.2.1.8,OSVDB-3268: /images/: Directory indexing found., -bwa,10.2.1.8,OSVDB-3268: /images/?pattern=/etc/\*\&sort=name: Directory indexing found., -bwa,10.2.1.8,OSVDB-40478: TikiWiki contains a vulnerability which allows remote attackers to execute arbitrary PHP code., -metasploitable,10.2.1.1,/phpMyAdmin/: phpMyAdmin directory found, -metasploitable,10.2.1.1,OSVDB-12184: /index.php?=PHPB8B5F2A0-3C92-11d3-A3A9-4C7B08C10000: PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings., -metasploitable,10.2.1.1,OSVDB-3092: /phpMyAdmin/: phpMyAdmin is for managing MySQL databases and should be protected or limited to authorized hosts., -metasploitable,10.2.1.1,OSVDB-3092: /phpMyAdmin/changelog.php: phpMyAdmin is for managing MySQL databases and should be protected or limited to authorized hosts., -metasploitable,10.2.1.1,OSVDB-3092: /test/: This might be interesting..., -metasploitable,10.2.1.1,OSVDB-3233: /icons/README: Apache default file found., -metasploitable,10.2.1.1,OSVDB-3233: /phpinfo.php: Contains PHP configuration information, -metasploitable,10.2.1.1,OSVDB-3268: /doc/: Directory indexing found., -metasploitable,10.2.1.1,OSVDB-3268: /icons/: Directory indexing found., -metasploitable,10.2.1.1,OSVDB-3268: /test/: Directory indexing found., -metasploitable,10.2.1.1,OSVDB-48: /doc/: The /doc/ directory is browsable. This may be /usr/doc., -metasploitable,10.2.1.1,OSVDB-877: HTTP TRACE method is active suggesting the host is vulnerable to XST, -tomcat-apache,10.2.1.6,Apache/2.2.16 appears to be outdated (current is at least Apache/2.2.19). Apache 1.3.42 (final release) and 2.0.64 are also current., -tomcat-apache,10.2.1.6,OSVDB-3233: /icons/README: Apache default file found., -tomcat-apache,10.2.1.6,OSVDB-3268: /icons/: Directory indexing found., -ultimatelamp,10.2.1.3,OSVDB-3268: /images/: Directory indexing found., -ultimatelamp,10.2.1.3,OSVDB-3268: /images/?pattern=/etc/\*\&sort=name: Directory indexing found., -ultimatelamp,10.2.1.3,OSVDB-3233: /icons/README: Apache default file found., -ultimatelamp,10.2.1.3,OSVDB-40478: TikiWiki contains a vulnerability which allows remote attackers to execute arbitrary PHP code., -ultimatelamp,10.2.1.3,/wordpress/: A Wordpress installation was found., -ultimatelamp,10.2.1.3,/phpmyadmin/: phpMyAdmin directory found, +hostname,vulnerability,exploitable +bwa,/phpmyadmin/: phpMyAdmin directory found, +bwa,/wordpress/: A Wordpress installation was found., +bwa,OSVDB-3233: /icons/README: Apache default file found., +bwa,OSVDB-3268: /images/: Directory indexing found., +bwa,OSVDB-3268: /images/?pattern=/etc/\*\&sort=name: Directory indexing found., +bwa,OSVDB-40478: TikiWiki contains a vulnerability which allows remote attackers to execute arbitrary PHP code., +metasploitable,/phpMyAdmin/: phpMyAdmin directory found, +metasploitable,OSVDB-12184: /index.php?=PHPB8B5F2A0-3C92-11d3-A3A9-4C7B08C10000: PHP reveals potentially sensitive information via certain HTTP requests that contain specific QUERY strings., +metasploitable,OSVDB-3092: /phpMyAdmin/: phpMyAdmin is for managing MySQL databases and should be protected or limited to authorized hosts., +metasploitable,OSVDB-3092: /phpMyAdmin/changelog.php: phpMyAdmin is for managing MySQL databases and should be protected or limited to authorized hosts., +metasploitable,OSVDB-3092: /test/: This might be interesting..., +metasploitable,OSVDB-3233: /icons/README: Apache default file found., +metasploitable,OSVDB-3233: /phpinfo.php: Contains PHP configuration information, +metasploitable,OSVDB-3268: /doc/: Directory indexing found., +metasploitable,OSVDB-3268: /icons/: Directory indexing found., +metasploitable,OSVDB-3268: /test/: Directory indexing found., +metasploitable,OSVDB-48: /doc/: The /doc/ directory is browsable. This may be /usr/doc., +metasploitable,OSVDB-877: HTTP TRACE method is active suggesting the host is vulnerable to XST, +tomcat-apache,Apache/2.2.16 appears to be outdated (current is at least Apache/2.2.19). Apache 1.3.42 (final release) and 2.0.64 are also current., +tomcat-apache,OSVDB-3233: /icons/README: Apache default file found., +tomcat-apache,OSVDB-3268: /icons/: Directory indexing found., +ultimatelamp,OSVDB-3268: /images/: Directory indexing found., +ultimatelamp,OSVDB-3268: /images/?pattern=/etc/\*\&sort=name: Directory indexing found., +ultimatelamp,OSVDB-3233: /icons/README: Apache default file found., +ultimatelamp,OSVDB-40478: TikiWiki contains a vulnerability which allows remote attackers to execute arbitrary PHP code., +ultimatelamp,/wordpress/: A Wordpress installation was found., +ultimatelamp,/phpmyadmin/: phpMyAdmin directory found, |
