|
A Cryptome DVD is offered by Cryptome. Donate $25 for a DVD of the Cryptome 11-years archives of 41,000 files from June 1996 to June 2007 (~4.4 GB). Click Paypal or mail check/MO made out to John Young, 251 West 89th Street, New York, NY 10024. Archives include all files of cryptome.org, jya.com, cartome.org, eyeball-series.org and iraq-kill-maim.org. Cryptome offers with the Cryptome DVD an INSCOM DVD of about 18,000 pages of counter-intelligence dossiers declassified by the US Army Information and Security Command, dating from 1945 to 1985. No additional contribution required -- $25 for both. The DVDs will be sent anywhere worldwide without extra cost. |
28 November 2007
See also report on Pakistan government: http://cryptome.org/gov-pk.htm
A sends:
Combining web spider technology with a passive vulnerability analysis engine, and a little bit of smarts for automated analysis on all the data gathered (small piece of a much bigger puzzle), pieces can start being put together for a much more powerful process.
The attached file represents a small dot of the information available on the web and what you can do to compile data to be used in a defensive/offensive manner. This is much more than an Iranian gov thing, this is a global issue for everyone using OSINT.
| Table Cell Color Keys | |
| Grey | No analysis report generated. Could be due to server being down, not reponding to our request, or not existing. |
| White | Nothing of interest to report |
| Yellow | Notes are provided on findings but nothing significant found. |
| Pink | More information is provided on findings, usually contained with systems having a vulnerability report. More valued information over just notes. |
| Red | Report has been generated with findings for potential vulnerability information. |
| Domain Name | IP ADDRESS | Information Identified |
| www.abhar.gov.ir | 67.15.191.32 |
SERVER IP: 67.15.191.32 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: SERVER IP: 67.15.191.32 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 SERVER IP: 67.15.191.32 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756 BID : 23359, 24089, 24259, 24261 SERVER IP: 67.15.191.32 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806 BID : 25498 SERVER IP: 67.15.191.32 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
| ad.gov.ir | 72.55.164.16 |
SERVER IP: 72.55.164.16 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 PHP/4.4.7 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.8b SERVER IP: 72.55.164.16 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 72.55.164.16 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
| www.ad.gov.ir | 72.55.164.16 |
SERVER IP: 72.55.164.16 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 PHP/4.4.7 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.8b SERVER IP: 72.55.164.16 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 72.55.164.16 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
| www.ahar.gov.ir | 38.117.64.140 |
SERVER IP: 38.117.64.140 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.aiiri.gov.ir | 78.154.42.227 |
SERVER IP: 78.154.42.227 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.ajabshir.gov.ir | 38.117.64.120 |
SERVER IP: 38.117.64.120 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.anbarabad.gov.ir | 205.209.112.170 |
SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) PHP/4.4.7 mod_ssl/2.8.28 OpenSSL/0.9.7a FrontPage/5.0.2.2635 SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
| anzali.gov.ir | 89.144.128.30 |
SERVER IP: 89.144.128.30 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.arak.gov.ir | 217.218.254.35 |
SERVER IP: 217.218.254.35 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.55 (Ubuntu) PHP/5.1.2 mod_ssl/2.0.55 OpenSSL/0.9.8a SERVER IP: 217.218.254.35 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 217.218.254.35 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 217.218.254.35 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 SERVER IP: 217.218.254.35 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756 BID : 23359, 24089, 24259, 24261 SERVER IP: 217.218.254.35 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806 BID : 25498 SERVER IP: 217.218.254.35 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 SERVER IP: 217.218.254.35 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
| www.ardabil.gov.ir | 217.219.154.133 |
SERVER IP: 217.219.154.133 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.ashayer-ks.gov.ir | 91.121.44.111 |
SERVER IP: 91.121.44.111 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.atf.gov.ir | 64.246.32.70 |
SERVER IP: 64.246.32.70 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: SERVER IP: 64.246.32.70 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 SERVER IP: 64.246.32.70 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756 BID : 23359, 24089, 24259, 24261 SERVER IP: 64.246.32.70 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806 BID : 25498 SERVER IP: 64.246.32.70 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
| www.azarmaskan.gov.ir | 217.218.60.28 |
SERVER IP: 217.218.60.28 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.azarshahr.gov.ir | 38.117.64.140 |
SERVER IP: 38.117.64.140 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.baft.gov.ir | 205.209.112.170 |
SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) PHP/4.4.7 mod_ssl/2.8.28 OpenSSL/0.9.7a FrontPage/5.0.2.2635 SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
| www.bam.gov.ir | 205.209.112.170 |
SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) PHP/4.4.7 mod_ssl/2.8.28 OpenSSL/0.9.7a FrontPage/5.0.2.2635 SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
| www.bardsir.gov.ir | 205.209.112.170 |
SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) PHP/4.4.7 mod_ssl/2.8.28 OpenSSL/0.9.7a FrontPage/5.0.2.2635 SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
| www.bhrc.gov.ir | 217.218.4.108 |
SERVER IP: 217.218.4.108 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 |
| www.bijar.gov.ir | 217.219.223.3 |
SERVER IP: 217.219.223.3 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.bilasavar.gov.ir | 217.219.154.133 |
SERVER IP: 217.219.154.133 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.binalood-ntoir.gov.ir | 88.208.205.126 |
SERVER IP: 88.208.205.126 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.bostanabad.gov.ir | 38.117.64.140 |
SERVER IP: 38.117.64.140 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.causar.gov.ir | 38.117.64.170 |
SERVER IP: 38.117.64.170 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.cbi.gov.ir | 82.205.152.140 |
SERVER IP: 82.205.152.140 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.chaharmahal-oefa.gov.ir | 38.117.64.41 |
SERVER IP: 38.117.64.41 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.charoimagh.gov.ir | 38.117.64.140 |
SERVER IP: 38.117.64.140 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.cinema.gov.ir | 217.218.141.132 |
SERVER IP: 217.218.141.132 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.cobi.gov.ir | 64.128.97.104 |
SERVER IP: 64.128.97.104 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.damavand.gov.ir | 38.117.87.1 |
SERVER IP: 38.117.87.1 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 |
| www.dehaghan.gov.ir | 72.55.164.168 |
SERVER IP: 72.55.164.168 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.2.4 (Fedora) SERVER IP: 72.55.164.168 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 72.55.164.168 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 SERVER IP: 72.55.164.168 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756 BID : 23359, 24089, 24259, 24261 SERVER IP: 72.55.164.168 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806 BID : 25498 SERVER IP: 72.55.164.168 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
| www.divandareh.gov.ir | 217.219.223.3 |
SERVER IP: 217.219.223.3 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.dre-mfa.gov.ir | 194.225.241.12 |
SERVER IP: 194.225.241.12 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.53 (Fedora) |
| ea.gov.ir | 72.232.205.50 |
SERVER IP: 72.232.205.50 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a SERVER IP: 72.232.205.50 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 72.232.205.50 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 72.232.205.50 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
| www.ea-cooperative.gov.ir | 38.117.87.1 |
SERVER IP: 38.117.87.1 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| ea-edu.gov.ir | 66.45.230.100 |
SERVER IP: 66.45.230.100 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.ea.gov.ir | 72.232.205.50 |
SERVER IP: 72.232.205.50 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a SERVER IP: 72.232.205.50 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 72.232.205.50 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 72.232.205.50 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
| www.eafo.gov.ir | 209.172.34.60 |
SERVER IP: 209.172.34.60 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
| www.easabt.gov.ir | 216.81.76.192 |
SERVER IP: 216.81.76.192 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.ecommerce.gov.ir | 217.218.60.27 |
SERVER IP: 217.218.60.27 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.ehealth.gov.ir | 81.91.154.100 |
SERVER IP: 81.91.154.100 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache-Coyote/1.1 |
| www.eocr.gov.ir | 72.29.73.107 |
SERVER IP: 72.29.73.107 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: WebServerX SERVER IP: 72.29.73.107 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 72.29.73.107 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
| www.farhang-miyaneh.gov.ir | 38.117.64.135 |
SERVER IP: 38.117.64.135 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.farhang.gov.ir | 216.55.142.171 |
SERVER IP: 216.55.142.171 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.farsculture.gov.ir | 80.191.114.3 |
SERVER IP: 80.191.114.3 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.2.3 mod_ssl/2.2.3 |
| www.fcc.gov.ir | 207.176.216.60 |
SERVER IP: 207.176.216.60 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 |
| www.firoozkooh.gov.ir | 38.117.87.1 |
SERVER IP: 38.117.87.1 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 |
| www.germi.gov.ir | 217.219.154.133 |
SERVER IP: 217.219.154.133 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.ghorveh.gov.ir | 217.219.223.3 |
SERVER IP: 217.219.223.3 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.gilanmaskan.gov.ir | 62.193.13.24 |
SERVER IP: 62.193.13.24 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.golestan-mefa.gov.ir | 38.117.64.41 |
SERVER IP: 38.117.64.41 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.golpaygan.gov.ir | 72.55.164.168 |
SERVER IP: 72.55.164.168 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.2.4 (Fedora) SERVER IP: 72.55.164.168 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 72.55.164.168 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 SERVER IP: 72.55.164.168 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756 BID : 23359, 24089, 24259, 24261 SERVER IP: 72.55.164.168 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806 BID : 25498 SERVER IP: 72.55.164.168 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
| www.heris.gov.ir | 38.117.64.140 |
SERVER IP: 38.117.64.140 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.him.gov.ir | 208.116.49.50 |
SERVER IP: 208.116.49.50 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a PHP-CGI/0.1b SERVER IP: 208.116.49.50 PORT/PROTOCOL: 80/tcp TYPE: REPORT The remote Apache server is running mod_frontpage. Versions older than 1.6.1 are vulnerable to a buffer overflow which may allow an attacker to gain root access on this host. *** Note that it is not possible to remotely determine the version of mod_frontpage which is running, so this may be a false positive Solution : Disable this module or upgrade to mod_frontpage 1.6.2 CVE : CVE-2002-0427 BID : 4251 SERVER IP: 208.116.49.50 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 208.116.49.50 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 208.116.49.50 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
| icm.gov.ir | 209.167.109.15 |
SERVER IP: 209.167.109.15 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.icm.gov.ir | 209.167.109.15 |
SERVER IP: 209.167.109.15 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| ict.gov.ir | 217.218.60.61 |
SERVER IP: 217.218.60.61 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| wsis.ict.gov.ir | 80.191.21.30 |
SERVER IP: 80.191.21.30 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
| www.ict.gov.ir | 217.218.60.61 |
SERVER IP: 217.218.60.61 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.ijrood.gov.ir | 67.15.191.32 |
SERVER IP: 67.15.191.32 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: SERVER IP: 67.15.191.32 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 SERVER IP: 67.15.191.32 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756 BID : 23359, 24089, 24259, 24261 SERVER IP: 67.15.191.32 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806 BID : 25498 SERVER IP: 67.15.191.32 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
| ioptc.gov.ir | 72.232.164.32 |
SERVER IP: 72.232.164.32 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
| irica.gov.ir | 207.176.216.50 |
SERVER IP: 207.176.216.50 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.isc.gov.ir | 62.60.154.3 |
SERVER IP: 62.60.154.3 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.iscu.gov.ir | 72.55.164.168 |
SERVER IP: 72.55.164.168 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.2.4 (Fedora) SERVER IP: 72.55.164.168 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 72.55.164.168 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 SERVER IP: 72.55.164.168 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756 BID : 23359, 24089, 24259, 24261 SERVER IP: 72.55.164.168 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806 BID : 25498 SERVER IP: 72.55.164.168 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
| www.isf-mefa.gov.ir | 72.29.73.107 |
SERVER IP: 72.29.73.107 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: WebServerX SERVER IP: 72.29.73.107 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 72.29.73.107 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
| www.isfahanfarhang.gov.ir | 64.92.166.218 |
SERVER IP: 64.92.166.218 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.islamshahr.gov.ir | 38.117.87.1 |
SERVER IP: 38.117.87.1 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.jiroft.gov.ir | 205.209.112.170 |
SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) PHP/4.4.7 mod_ssl/2.8.28 OpenSSL/0.9.7a FrontPage/5.0.2.2635 SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
| www.jolfa.gov.ir | 38.117.64.140 |
SERVER IP: 38.117.64.140 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.kahnooj.gov.ir | 205.209.112.170 |
SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) PHP/4.4.7 mod_ssl/2.8.28 OpenSSL/0.9.7a FrontPage/5.0.2.2635 SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
| www.kaleibar.gov.ir | 38.117.64.140 |
SERVER IP: 38.117.64.140 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.kamyaran.gov.ir | 217.219.223.3 |
SERVER IP: 217.219.223.3 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.karafarini.gov.ir | 77.237.164.228 |
SERVER IP: 77.237.164.228 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.2.2 (Win32) DAV/2 mod_ssl/2.2.2 OpenSSL/0.9.8b mod_autoindex_color PHP/5.1.4 SERVER IP: 77.237.164.228 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 77.237.164.228 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 77.237.164.228 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 SERVER IP: 77.237.164.228 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756 BID : 23359, 24089, 24259, 24261 SERVER IP: 77.237.164.228 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806 BID : 25498 SERVER IP: 77.237.164.228 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 SERVER IP: 77.237.164.228 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
| www.karaj.gov.ir | 38.117.87.1 |
SERVER IP: 38.117.87.1 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 |
| www.kb-oefa.gov.ir | 38.117.64.110 |
SERVER IP: 38.117.64.110 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.kd-bordermarket.gov.ir | 217.219.223.3 |
SERVER IP: 217.219.223.3 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.ker-mefa.gov.ir | 38.117.64.101 |
SERVER IP: 38.117.64.101 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.kerman.gov.ir | 205.209.112.170 |
SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) PHP/4.4.7 mod_ssl/2.8.28 OpenSSL/0.9.7a FrontPage/5.0.2.2635 SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
| www.kggo.gov.ir | 205.209.97.226 |
SERVER IP: 205.209.97.226 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) PHP/4.4.7 mod_ssl/2.8.28 OpenSSL/0.9.7d FrontPage/5.0.2.2635 SERVER IP: 205.209.97.226 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 205.209.97.226 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
| www.khalkhal.gov.ir | 217.219.154.133 |
SERVER IP: 217.219.154.133 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| khco.gov.ir | 204.13.154.20 |
SERVER IP: 204.13.154.20 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.khco.gov.ir | 204.13.154.20 |
SERVER IP: 204.13.154.20 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.khcu.gov.ir | 204.13.154.85 |
SERVER IP: 204.13.154.85 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.khodabandeh.gov.ir | 67.15.191.32 |
SERVER IP: 67.15.191.32 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: SERVER IP: 67.15.191.32 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 SERVER IP: 67.15.191.32 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756 BID : 23359, 24089, 24259, 24261 SERVER IP: 67.15.191.32 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806 BID : 25498 SERVER IP: 67.15.191.32 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
| www.khomeinishahr.gov.ir | 72.55.164.168 |
SERVER IP: 72.55.164.168 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.2.4 (Fedora) SERVER IP: 72.55.164.168 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 72.55.164.168 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 SERVER IP: 72.55.164.168 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756 BID : 23359, 24089, 24259, 24261 SERVER IP: 72.55.164.168 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806 BID : 25498 SERVER IP: 72.55.164.168 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
| www.khoramdareh.gov.ir | 67.15.191.32 |
SERVER IP: 67.15.191.32 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: SERVER IP: 67.15.191.32 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 SERVER IP: 67.15.191.32 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756 BID : 23359, 24089, 24259, 24261 SERVER IP: 67.15.191.32 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806 BID : 25498 SERVER IP: 67.15.191.32 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
| www.komijan.gov.ir | 70.86.149.218 |
SERVER IP: 70.86.149.218 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.kosar.gov.ir | 217.219.154.133 |
SERVER IP: 217.219.154.133 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.krahbirjand.gov.ir | 38.117.64.60 |
SERVER IP: 38.117.64.60 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 |
| www.kscu.gov.ir | 208.64.230.55 |
SERVER IP: 208.64.230.55 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
| www.kurdistan-oefa.gov.ir | 38.117.64.50 |
SERVER IP: 38.117.64.50 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.kurdistan.gov.ir | 217.219.223.3 |
SERVER IP: 217.219.223.3 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.lenjan.gov.ir | 74.53.94.98 85.185.130.6 |
SERVER IP: 74.53.94.98 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_jk/1.2.14 mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 PHP/4.4.7 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a SERVER IP: 85.185.130.6 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.lor-mefa.gov.ir | 38.117.64.20 |
SERVER IP: 38.117.64.20 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.mahneshan.gov.ir | 67.15.191.32 |
SERVER IP: 67.15.191.32 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: SERVER IP: 67.15.191.32 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 SERVER IP: 67.15.191.32 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756 BID : 23359, 24089, 24259, 24261 SERVER IP: 67.15.191.32 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806 BID : 25498 SERVER IP: 67.15.191.32 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
| www.malekan.gov.ir | 38.117.64.140 |
SERVER IP: 38.117.64.140 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.manoojan.gov.ir | 205.209.112.170 |
SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) PHP/4.4.7 mod_ssl/2.8.28 OpenSSL/0.9.7a FrontPage/5.0.2.2635 SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
| www.marand.gov.ir | 38.117.64.140 |
SERVER IP: 38.117.64.140 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.marivan.gov.ir | 209.172.33.12 |
SERVER IP: 209.172.33.12 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.54 (Fedora) |
| www.markazi-oefa.gov.ir | 72.36.151.134 |
SERVER IP: 72.36.151.134 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.maskantehran.gov.ir | 194.225.71.9 |
SERVER IP: 194.225.71.9 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
| www.maztax.gov.ir | 38.117.64.120 |
SERVER IP: 38.117.64.120 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 |
| mail.mefa.gov.ir | 207.176.216.101 |
SERVER IP: 207.176.216.101 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.mefa.gov.ir | 62.193.13.24 |
SERVER IP: 62.193.13.24 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| meshkin.gov.ir | 217.219.154.133 |
SERVER IP: 217.219.154.133 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.meshkin.gov.ir | 217.219.154.133 |
SERVER IP: 217.219.154.133 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.mfa.gov.ir | 217.172.99.41 |
SERVER IP: 217.172.99.41 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.2.0 (Linux/SUSE) |
| www.mhud.gov.ir | 213.207.198.67 |
SERVER IP: 213.207.198.67 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.mianeh.gov.ir | 38.117.64.140 |
SERVER IP: 38.117.64.140 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| amar.mim.gov.ir | 217.11.21.10 |
SERVER IP: 217.11.21.10 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
| ardebil.mim.gov.ir | 217.11.21.10 |
SERVER IP: 217.11.21.10 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
| chaharmahal.mim.gov.ir | 217.11.21.10 |
SERVER IP: 217.11.21.10 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
| fars.mim.gov.ir | 217.11.21.10 |
SERVER IP: 217.11.21.10 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
| gilan.mim.gov.ir | 217.11.21.10 |
SERVER IP: 217.11.21.10 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
| golestan.mim.gov.ir | 217.11.21.10 |
SERVER IP: 217.11.21.10 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
| hamedan.mim.gov.ir | 217.11.21.10 |
SERVER IP: 217.11.21.10 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
| hormozgan.mim.gov.ir | 217.11.21.10 |
SERVER IP: 217.11.21.10 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
| ilam.mim.gov.ir | 217.11.21.10 |
SERVER IP: 217.11.21.10 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
| intl.mim.gov.ir | 217.11.21.10 |
SERVER IP: 217.11.21.10 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
| kermanshah.mim.gov.ir | 217.11.21.10 |
SERVER IP: 217.11.21.10 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
| khorasan.mim.gov.ir | 217.11.21.10 |
SERVER IP: 217.11.21.10 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
| khozestan.mim.gov.ir | 217.11.21.10 |
SERVER IP: 217.11.21.10 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
| kurdistan.mim.gov.ir | 217.11.21.10 |
SERVER IP: 217.11.21.10 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
| lorestan.mim.gov.ir | 217.11.21.10 |
SERVER IP: 217.11.21.10 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
| markazi.mim.gov.ir | 217.11.21.10 |
SERVER IP: 217.11.21.10 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
| mazandaran.mim.gov.ir | 217.11.21.10 |
SERVER IP: 217.11.21.10 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
| mine.mim.gov.ir | 217.11.21.10 |
SERVER IP: 217.11.21.10 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
| miningstrategy.mim.gov.ir | 217.11.21.10 |
SERVER IP: 217.11.21.10 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
| prov.mim.gov.ir | 217.11.21.10 |
SERVER IP: 217.11.21.10 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
| qazvin.mim.gov.ir | 217.11.21.10 |
SERVER IP: 217.11.21.10 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
| qom.mim.gov.ir | 217.11.21.10 |
SERVER IP: 217.11.21.10 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
| semnan.mim.gov.ir | 217.11.21.10 |
SERVER IP: 217.11.21.10 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
| sistan.mim.gov.ir | 217.11.21.10 |
SERVER IP: 217.11.21.10 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
| sta.mim.gov.ir | 217.11.21.10 |
SERVER IP: 217.11.21.10 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
| www.mim.gov.ir | 217.11.21.10 |
SERVER IP: 217.11.21.10 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
| yazd.mim.gov.ir | 217.11.21.10 |
SERVER IP: 217.11.21.10 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
| zanjan.mim.gov.ir | 217.11.21.10 |
SERVER IP: 217.11.21.10 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
| prd.moc.gov.ir | 78.38.192.10 |
SERVER IP: 78.38.192.10 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.prd.moc.gov.ir | 78.38.192.10 |
SERVER IP: 78.38.192.10 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.moc.gov.ir | 78.38.192.10 |
SERVER IP: 78.38.192.10 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| frbm.mohme.gov.ir | 81.91.152.11 |
SERVER IP: 81.91.152.11 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver SERVER IP: 81.91.152.11 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 81.91.152.11 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
| gao.mohme.gov.ir | 81.91.152.11 |
SERVER IP: 81.91.152.11 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver SERVER IP: 81.91.152.11 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 81.91.152.11 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
| gdfa.mohme.gov.ir | 81.91.152.11 |
SERVER IP: 81.91.152.11 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver SERVER IP: 81.91.152.11 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 81.91.152.11 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
| hrmo.mohme.gov.ir | 81.91.152.11 |
SERVER IP: 81.91.152.11 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver SERVER IP: 81.91.152.11 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 81.91.152.11 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
| lao.mohme.gov.ir | 81.91.152.11 |
SERVER IP: 81.91.152.11 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver SERVER IP: 81.91.152.11 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 81.91.152.11 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
| lawoffice.mohme.gov.ir | 81.91.152.11 |
SERVER IP: 81.91.152.11 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
| mdar.mohme.gov.ir | 81.91.152.11 |
SERVER IP: 81.91.152.11 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver SERVER IP: 81.91.152.11 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 81.91.152.11 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
| oldwww.mohme.gov.ir | 81.91.152.11 |
SERVER IP: 81.91.152.11 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
| piu.mohme.gov.ir | 81.91.152.11 |
SERVER IP: 81.91.152.11 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver SERVER IP: 81.91.152.11 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 81.91.152.11 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
| pmhr.mohme.gov.ir | 81.91.152.11 |
SERVER IP: 81.91.152.11 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver SERVER IP: 81.91.152.11 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 81.91.152.11 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
| prmo.mohme.gov.ir | 81.91.152.11 |
SERVER IP: 81.91.152.11 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver SERVER IP: 81.91.152.11 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 81.91.152.11 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
| pro.mohme.gov.ir | 81.91.152.11 |
SERVER IP: 81.91.152.11 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
| sar.mohme.gov.ir | 81.91.152.11 |
SERVER IP: 81.91.152.11 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver SERVER IP: 81.91.152.11 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 81.91.152.11 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
| touse.mohme.gov.ir | 81.91.152.11 |
SERVER IP: 81.91.152.11 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/5.0 |
| www.mohme.gov.ir | 81.91.152.11 |
SERVER IP: 81.91.152.11 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
| www.moj.gov.ir | 62.193.12.10 |
SERVER IP: 62.193.12.10 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.mpo-fr.gov.ir | 80.191.113.50 |
SERVER IP: 80.191.113.50 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
| www.mpo-hr.gov.ir | 208.64.230.214 |
SERVER IP: 208.64.230.214 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 PHP/4.4.8-dev FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a SERVER IP: 208.64.230.214 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 208.64.230.214 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 208.64.230.214 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
| www.msrt.gov.ir | 213.176.75.3 |
SERVER IP: 213.176.75.3 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.naein.gov.ir | 216.40.221.146 |
SERVER IP: 216.40.221.146 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.namin.gov.ir | 217.219.154.133 |
SERVER IP: 217.219.154.133 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.nazarabad.gov.ir | 38.117.87.1 |
SERVER IP: 38.117.87.1 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.nhlo.gov.ir | 85.15.52.97 |
SERVER IP: 85.15.52.97 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| nir.gov.ir | 217.219.154.133 |
SERVER IP: 217.219.154.133 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.nir.gov.ir | 217.219.154.133 |
SERVER IP: 217.219.154.133 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.ntoir.gov.ir | 38.117.64.60 |
SERVER IP: 38.117.64.60 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.osku.gov.ir | 38.117.64.140 |
SERVER IP: 38.117.64.140 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.ostan-ag.gov.ir | 207.176.223.226 |
SERVER IP: 207.176.223.226 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.ostan-as.gov.ir | 217.219.138.13 |
SERVER IP: 217.219.138.13 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
| www.ostan-kz.gov.ir | 62.193.13.24 |
SERVER IP: 62.193.13.24 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.pakdasht.gov.ir | 38.117.87.1 |
SERVER IP: 38.117.87.1 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| parsabad.gov.ir | 217.219.154.133 |
SERVER IP: 217.219.154.133 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.parsabad.gov.ir | 217.219.154.133 |
SERVER IP: 217.219.154.133 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.qazvin-oefa.gov.ir | 38.117.64.71 |
SERVER IP: 38.117.64.71 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.qazvin.gov.ir | 209.167.109.15 |
SERVER IP: 209.167.109.15 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.rafsanjan.gov.ir | 205.209.112.170 |
SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) PHP/4.4.7 mod_ssl/2.8.28 OpenSSL/0.9.7a FrontPage/5.0.2.2635 SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
| rasht.gov.ir | 89.144.128.30 |
SERVER IP: 89.144.128.30 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.ravar.gov.ir | 205.209.112.170 |
SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) PHP/4.4.7 mod_ssl/2.8.28 OpenSSL/0.9.7a FrontPage/5.0.2.2635 SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
| razavimet.gov.ir | 72.44.74.114 |
SERVER IP: 72.44.74.114 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| kashmar.razavimet.gov.ir | 72.44.74.114 |
SERVER IP: 72.44.74.114 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.razavimet.gov.ir | 72.44.74.114 |
SERVER IP: 72.44.74.114 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.rca.gov.ir | 78.38.192.251 |
SERVER IP: 78.38.192.251 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.refah.gov.ir | 80.191.79.22 |
SERVER IP: 80.191.79.22 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.46 (Red Hat) |
| www.research.gov.ir | 213.176.47.80 |
SERVER IP: 213.176.47.80 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.rey.gov.ir | 38.117.87.1 |
SERVER IP: 38.117.87.1 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 |
| www.robatkarim.gov.ir | 208.116.49.50 |
SERVER IP: 208.116.49.50 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a PHP-CGI/0.1b SERVER IP: 208.116.49.50 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 208.116.49.50 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 208.116.49.50 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
| arzeshyabi.sabt.gov.ir | 217.66.196.26 |
SERVER IP: 217.66.196.26 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| novin.sabt.gov.ir | 217.66.196.26 |
SERVER IP: 217.66.196.26 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.sabt.gov.ir | 217.66.196.26 |
SERVER IP: 217.66.196.26 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 |
| sabtyazd.gov.ir | 216.40.221.146 |
SERVER IP: 216.40.221.146 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 |
| www.sabtyazd.gov.ir | 216.40.221.146 |
SERVER IP: 216.40.221.146 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 |
| www.saghez.gov.ir | 217.219.223.3 |
SERVER IP: 217.219.223.3 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.sanandaj.gov.ir | 217.219.223.3 |
SERVER IP: 217.219.223.3 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.sandoghtavon.gov.ir | 217.218.60.28 |
SERVER IP: 217.218.60.28 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.sarab.gov.ir | 217.219.131.194 |
SERVER IP: 217.219.131.194 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 |
| www.sarvabad.gov.ir | 217.219.223.3 |
SERVER IP: 217.219.223.3 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.saveh.gov.ir | 72.36.140.90 |
SERVER IP: 72.36.140.90 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.semirom.gov.ir | 72.55.164.168 |
SERVER IP: 72.55.164.168 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.2.4 (Fedora) |
| www.semnanmaskan.gov.ir | 217.218.247.24 |
SERVER IP: 217.218.247.24 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.shabestar.gov.ir | 38.117.64.140 |
SERVER IP: 38.117.64.140 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.shahrbabak.gov.ir | 205.209.112.170 |
SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) PHP/4.4.7 mod_ssl/2.8.28 OpenSSL/0.9.7a FrontPage/5.0.2.2635 SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
| www.shahreza.gov.ir | 72.232.164.32 |
SERVER IP: 72.232.164.32 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache |
| www.shahriyar.gov.ir | 38.117.87.1 |
SERVER IP: 38.117.87.1 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 |
| www.shemiran.gov.ir | 38.117.87.1 |
SERVER IP: 38.117.87.1 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 |
| www.shohada.gov.ir | 69.93.59.226 |
SERVER IP: 69.93.59.226 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
| www.sirjan.gov.ir | 205.209.112.170 |
SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) PHP/4.4.7 mod_ssl/2.8.28 OpenSSL/0.9.7a FrontPage/5.0.2.2635 SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
| www.sk-mim.gov.ir | 38.117.64.120 |
SERVER IP: 38.117.64.120 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| spokesman.gov.ir | 78.154.44.234 |
SERVER IP: 78.154.44.234 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.2.2 (Win32) DAV/2 mod_ssl/2.2.2 OpenSSL/0.9.8b mod_autoindex_color SERVER IP: 78.154.44.234 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 78.154.44.234 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
| www.spokesman.gov.ir | 78.154.44.234 |
SERVER IP: 78.154.44.234 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.2.2 (Win32) DAV/2 mod_ssl/2.2.2 OpenSSL/0.9.8b mod_autoindex_color SERVER IP: 78.154.44.234 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 78.154.44.234 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
| tabriz.gov.ir | 83.98.158.175 |
SERVER IP: 83.98.158.175 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 PHP/4.4.6 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a SERVER IP: 83.98.158.175 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 83.98.158.175 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 83.98.158.175 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 SERVER IP: 83.98.158.175 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
| www.tabriz.gov.ir | 83.98.158.175 |
SERVER IP: 83.98.158.175 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 PHP/4.4.6 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a SERVER IP: 83.98.158.175 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 83.98.158.175 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 83.98.158.175 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 SERVER IP: 83.98.158.175 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
| www.tarom.gov.ir | 67.15.191.32 |
SERVER IP: 67.15.191.32 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: SERVER IP: 67.15.191.32 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 SERVER IP: 67.15.191.32 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756 BID : 23359, 24089, 24259, 24261 SERVER IP: 67.15.191.32 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806 BID : 25498 SERVER IP: 67.15.191.32 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
| www.qaz.tazirat.gov.ir | 79.132.212.150 |
SERVER IP: 79.132.212.150 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.tazirat.gov.ir | 79.132.212.150 |
SERVER IP: 79.132.212.150 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.tco.gov.ir | 217.172.101.101 |
SERVER IP: 217.172.101.101 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/5.0 - The remote host is running a Microsoft IIS webserver |
| www.tehran.gov.ir | 38.117.87.1 |
SERVER IP: 38.117.87.1 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Microsoft-IIS/6.0 |
| www.tri.gov.ir | 207.176.216.108 87.247.176.7 |
SERVER IP: 207.176.216.108 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver SERVER IP: 87.247.176.7 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| www.uuhrp.gov.ir | 208.64.28.242 |
SERVER IP: 208.64.28.242 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 PHP/4.4.7 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.8b SERVER IP: 208.64.28.242 PORT/PROTOCOL: 80/tcp TYPE: REPORT The remote Apache server is running mod_frontpage. Versions older than 1.6.1 are vulnerable to a buffer overflow which may allow an attacker to gain root access on this host. *** Note that it is not possible to remotely determine the version of mod_frontpage which is running, so this may be a false positive Solution : Disable this module or upgrade to mod_frontpage 1.6.2 CVE : CVE-2002-0427 BID : 4251 SERVER IP: 208.64.28.242 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 208.64.28.242 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
| www.varamin.gov.ir | 38.117.87.1 |
SERVER IP: 38.117.87.1 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| varzeghan.gov.ir | 38.117.64.140 |
SERVER IP: 38.117.64.140 PORT/PROTOCOL: 80/tcp TYPE: NOTE - A web server is running on this port : Server: Microsoft-IIS/6.0 - The remote host is running a Microsoft IIS webserver |
| women.gov.ir | 80.191.69.24 |
SERVER IP: 80.191.69.24 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.51 (Unix) PHP/4.3.8 SERVER IP: 80.191.69.24 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Script Injection attack The remote host is running a version of PHP which is older than 5.0.3 or 4.3.10. The remote version of this software is vulnerable to various security issues which may, under certain circumstances, allow attackers to execute arbitrary code on the remote host, provided that they can pass arbitrary data to some functions or bypass safe_mode. CVSS Base Score : 6 AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to PHP 5.0.3 or 4.3.10 CVE : CVE-2004-1018, CVE-2004-1019, CVE-2004-1020, CVE-2004-1063, CVE-2004-1064, CVE-2004-1065 BID : 11964, 11981, 11992, 12045 SERVER IP: 80.191.69.24 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher. CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525 BID : 12963, 12962, 13143, 13163, 13164 SERVER IP: 80.191.69.24 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 80.191.69.24 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
| www.women.gov.ir | 80.191.69.24 |
SERVER IP: 80.191.69.24 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/2.0.51 (Unix) PHP/4.3.8 SERVER IP: 80.191.69.24 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Script Injection attack The remote host is running a version of PHP which is older than 5.0.3 or 4.3.10. The remote version of this software is vulnerable to various security issues which may, under certain circumstances, allow attackers to execute arbitrary code on the remote host, provided that they can pass arbitrary data to some functions or bypass safe_mode. CVSS Base Score : 6 AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to PHP 5.0.3 or 4.3.10 CVE : CVE-2004-1018, CVE-2004-1019, CVE-2004-1020, CVE-2004-1063, CVE-2004-1064, CVE-2004-1065 BID : 11964, 11981, 11992, 12045 SERVER IP: 80.191.69.24 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher. CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525 BID : 12963, 12962, 13143, 13163, 13164 SERVER IP: 80.191.69.24 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1 CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383 BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238 SERVER IP: 80.191.69.24 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 |
| www.yazd-mefa.gov.ir | 208.64.230.5 |
SERVER IP: 208.64.230.5 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 PHP/4.4.8-dev FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a SERVER IP: 208.64.230.5 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 208.64.230.5 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 208.64.230.5 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |
| www.zanjan.gov.ir | 67.15.191.32 |
SERVER IP: 67.15.191.32 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: SERVER IP: 67.15.191.32 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001 BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984 SERVER IP: 67.15.191.32 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756 BID : 23359, 24089, 24259, 24261 SERVER IP: 67.15.191.32 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806 BID : 25498 SERVER IP: 67.15.191.32 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php CVE : CVE-2007-4887 BID : 26403 |
| www.zarand.gov.ir | 205.209.112.170 |
SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: NOTE A web server is running on this port : Server: Apache/1.3.37 (Unix) PHP/4.4.7 mod_ssl/2.8.28 OpenSSL/0.9.7a FrontPage/5.0.2.2635 SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: INFO Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112 BID : 8970, 9899 SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937 BID : 20247, 20249, 20248 SERVER IP: 205.209.112.170 PORT/PROTOCOL: 80/tcp TYPE: REPORT Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local CVE : CVE-2007-4995, CVE-2007-5135 BID : 25831, 26055 |