A Cryptome DVD is offered by Cryptome. Donate $25 for a DVD of the Cryptome 11-years archives of 41,000 files from June 1996 to June 2007 (~4.4 GB). Click Paypal or mail check/MO made out to John Young, 251 West 89th Street, New York, NY 10024. Archives include all files of cryptome.org, jya.com, cartome.org, eyeball-series.org and iraq-kill-maim.org. Cryptome offers with the Cryptome DVD an INSCOM DVD of about 18,000 pages of counter-intelligence dossiers declassified by the US Army Information and Security Command, dating from 1945 to 1985. No additional contribution required -- $25 for both. The DVDs will be sent anywhere worldwide without extra cost.


28 November 2007

See also report on Pakistan government: http://cryptome.org/gov-pk.htm


A sends:

Combining web spider technology with a passive vulnerability analysis engine, and a little bit of smarts for automated analysis on all the data gathered (small piece of a much bigger puzzle), pieces can start being put together for a much more powerful process.

The attached file represents a small dot of the information available on the web and what you can do to compile data to be used in a defensive/offensive manner.  This is much more than an Iranian gov thing, this is a global issue for everyone using OSINT.


Server Comms Reporting for Research Effort gov.ir




Table Cell Color Keys
Grey No analysis report generated. Could be due to server being down, not reponding to our request, or not existing.
White Nothing of interest to report
Yellow Notes are provided on findings but nothing significant found.
Pink More information is provided on findings, usually contained with systems having a vulnerability report. More valued information over just notes.
Red Report has been generated with findings for potential vulnerability information.


Domain Name Index
www.abhar.gov.ir www.germi.gov.ir www.kurdistan.gov.ir prd.moc.gov.ir www.research.gov.ir
ad.gov.ir www.ghorveh.gov.ir www.lenjan.gov.ir www.prd.moc.gov.ir www.rey.gov.ir
www.ad.gov.ir www.gilanmaskan.gov.ir www.lor-mefa.gov.ir www.moc.gov.ir www.robatkarim.gov.ir
www.ahar.gov.ir www.golestan-mefa.gov.ir www.mahneshan.gov.ir frbm.mohme.gov.ir arzeshyabi.sabt.gov.ir
www.aiiri.gov.ir www.golpaygan.gov.ir www.malekan.gov.ir gao.mohme.gov.ir novin.sabt.gov.ir
www.ajabshir.gov.ir www.ham-mefa.gov.ir www.manoojan.gov.ir gdfa.mohme.gov.ir www.sabt.gov.ir
www.anbarabad.gov.ir www.heris.gov.ir www.marand.gov.ir hrmo.mohme.gov.ir sabtyazd.gov.ir
anzali.gov.ir www.him.gov.ir www.marivan.gov.ir lao.mohme.gov.ir www.sabtyazd.gov.ir
www.arak.gov.ir icm.gov.ir www.markazi-oefa.gov.ir lawoffice.mohme.gov.ir www.saghez.gov.ir
www.ardabil.gov.ir www.icm.gov.ir www.maskantehran.gov.ir mdar.mohme.gov.ir www.sanandaj.gov.ir
www.ashayer-ks.gov.ir ict.gov.ir www.maztax.gov.ir oldwww.mohme.gov.ir www.sandoghtavon.gov.ir
www.atf.gov.ir wsis.ict.gov.ir mail.mefa.gov.ir piu.mohme.gov.ir www.sarab.gov.ir
www.azarmaskan.gov.ir www.ict.gov.ir www.mefa.gov.ir pmhr.mohme.gov.ir www.sarvabad.gov.ir
www.azarshahr.gov.ir www.ijrood.gov.ir meshkin.gov.ir prmo.mohme.gov.ir www.saveh.gov.ir
www.baft.gov.ir ioptc.gov.ir www.meshkin.gov.ir pro.mohme.gov.ir www.semirom.gov.ir
www.bam.gov.ir irica.gov.ir www.mfa.gov.ir sar.mohme.gov.ir www.semnanmaskan.gov.ir
www.bardsir.gov.ir www.irica.gov.ir www.mhud.gov.ir touse.mohme.gov.ir www.shabestar.gov.ir
www.bhrc.gov.ir www.isc.gov.ir www.mianeh.gov.ir www.mohme.gov.ir www.shahrbabak.gov.ir
www.bijar.gov.ir www.iscu.gov.ir amar.mim.gov.ir www.moj.gov.ir www.shahreza.gov.ir
www.bilasavar.gov.ir www.isf-mefa.gov.ir ardebil.mim.gov.ir www.mpo-fr.gov.ir www.shahriyar.gov.ir
www.binalood-ntoir.gov.ir www.isfahanfarhang.gov.ir chaharmahal.mim.gov.ir www.mpo-hr.gov.ir www.shemiran.gov.ir
www.bostanabad.gov.ir www.islamshahr.gov.ir fars.mim.gov.ir www.msrt.gov.ir www.shohada.gov.ir
www.causar.gov.ir www.jiroft.gov.ir gilan.mim.gov.ir www.naein.gov.ir www.sirjan.gov.ir
www.cbi.gov.ir www.jolfa.gov.ir golestan.mim.gov.ir www.namin.gov.ir www.sk-mim.gov.ir
www.chaharmahal-oefa.gov.ir www.kahnooj.gov.ir hamedan.mim.gov.ir www.nazarabad.gov.ir spokesman.gov.ir
www.charoimagh.gov.ir www.kaleibar.gov.ir hormozgan.mim.gov.ir www.nhlo.gov.ir www.spokesman.gov.ir
www.cinema.gov.ir www.kamyaran.gov.ir ilam.mim.gov.ir nir.gov.ir tabriz.gov.ir
www.cobi.gov.ir www.karafarini.gov.ir intl.mim.gov.ir www.nir.gov.ir www.tabriz.gov.ir
www.damavand.gov.ir www.karaj.gov.ir kermanshah.mim.gov.ir www.ntoir.gov.ir www.tarom.gov.ir
www.dehaghan.gov.ir www.kb-oefa.gov.ir khorasan.mim.gov.ir www.osku.gov.ir www.qaz.tazirat.gov.ir
www.divandareh.gov.ir www.kd-bordermarket.gov.ir khozestan.mim.gov.ir www.ostan-ag.gov.ir www.tazirat.gov.ir
www.dre-mfa.gov.ir www.ker-mefa.gov.ir kurdistan.mim.gov.ir www.ostan-as.gov.ir www.tco.gov.ir
ea.gov.ir www.kerman.gov.ir lorestan.mim.gov.ir www.ostan-kz.gov.ir www.teh-coop.gov.ir
www.ea-cooperative.gov.ir www.kggo.gov.ir markazi.mim.gov.ir www.pakdasht.gov.ir www.tehran.gov.ir
ea-edu.gov.ir www.khalkhal.gov.ir mazandaran.mim.gov.ir parsabad.gov.ir www.tri.gov.ir
www.ea.gov.ir khco.gov.ir mine.mim.gov.ir www.parsabad.gov.ir www.uuhrp.gov.ir
www.eafo.gov.ir www.khco.gov.ir miningstrategy.mim.gov.ir www.qazvin-oefa.gov.ir www.varamin.gov.ir
www.easabt.gov.ir www.khcu.gov.ir prov.mim.gov.ir www.qazvin.gov.ir varzeghan.gov.ir
www.ecommerce.gov.ir www.khodabandeh.gov.ir qazvin.mim.gov.ir www.rafsanjan.gov.ir women.gov.ir
www.ehealth.gov.ir www.khomeinishahr.gov.ir qom.mim.gov.ir rasht.gov.ir www.women.gov.ir
www.eocr.gov.ir www.khoramdareh.gov.ir semnan.mim.gov.ir www.ravar.gov.ir www.yazd-mefa.gov.ir
www.farhang-miyaneh.gov.ir www.komijan.gov.ir sistan.mim.gov.ir razavimet.gov.ir www.zanjan.gov.ir
www.farhang.gov.ir www.kosar.gov.ir sta.mim.gov.ir kashmar.razavimet.gov.ir www.zarand.gov.ir
www.farsculture.gov.ir www.krahbirjand.gov.ir www.mim.gov.ir www.razavimet.gov.ir
www.fcc.gov.ir www.kscu.gov.ir yazd.mim.gov.ir www.rca.gov.ir
www.firoozkooh.gov.ir www.kurdistan-oefa.gov.ir zanjan.mim.gov.ir www.refah.gov.ir



Domain Name IP ADDRESS Information Identified
www.abhar.gov.ir 67.15.191.32
SERVER IP: 67.15.191.32
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server:

SERVER IP: 67.15.191.32
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


SERVER IP: 67.15.191.32
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php
CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756
BID : 23359, 24089, 24259, 24261


SERVER IP: 67.15.191.32
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher
CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806
BID : 25498


SERVER IP: 67.15.191.32
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


ad.gov.ir 72.55.164.16
SERVER IP: 72.55.164.16
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 PHP/4.4.7 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.8b

SERVER IP: 72.55.164.16
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 72.55.164.16
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.ad.gov.ir 72.55.164.16
SERVER IP: 72.55.164.16
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 PHP/4.4.7 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.8b

SERVER IP: 72.55.164.16
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 72.55.164.16
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.ahar.gov.ir 38.117.64.140
SERVER IP: 38.117.64.140
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.aiiri.gov.ir 78.154.42.227
SERVER IP: 78.154.42.227
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.ajabshir.gov.ir 38.117.64.120
SERVER IP: 38.117.64.120
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.anbarabad.gov.ir 205.209.112.170
SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) PHP/4.4.7 mod_ssl/2.8.28 OpenSSL/0.9.7a FrontPage/5.0.2.2635

SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


anzali.gov.ir 89.144.128.30
SERVER IP: 89.144.128.30
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.arak.gov.ir 217.218.254.35
SERVER IP: 217.218.254.35
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.55 (Ubuntu) PHP/5.1.2 mod_ssl/2.0.55 OpenSSL/0.9.8a

SERVER IP: 217.218.254.35
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 217.218.254.35
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 217.218.254.35
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


SERVER IP: 217.218.254.35
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php
CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756
BID : 23359, 24089, 24259, 24261


SERVER IP: 217.218.254.35
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher
CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806
BID : 25498


SERVER IP: 217.218.254.35
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


SERVER IP: 217.218.254.35
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


www.ardabil.gov.ir 217.219.154.133
SERVER IP: 217.219.154.133
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.ashayer-ks.gov.ir 91.121.44.111
SERVER IP: 91.121.44.111
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.atf.gov.ir 64.246.32.70
SERVER IP: 64.246.32.70
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server:

SERVER IP: 64.246.32.70
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


SERVER IP: 64.246.32.70
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php
CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756
BID : 23359, 24089, 24259, 24261


SERVER IP: 64.246.32.70
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher
CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806
BID : 25498


SERVER IP: 64.246.32.70
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


www.azarmaskan.gov.ir 217.218.60.28
SERVER IP: 217.218.60.28
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.azarshahr.gov.ir 38.117.64.140
SERVER IP: 38.117.64.140
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.baft.gov.ir 205.209.112.170
SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) PHP/4.4.7 mod_ssl/2.8.28 OpenSSL/0.9.7a FrontPage/5.0.2.2635

SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.bam.gov.ir 205.209.112.170
SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) PHP/4.4.7 mod_ssl/2.8.28 OpenSSL/0.9.7a FrontPage/5.0.2.2635

SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.bardsir.gov.ir 205.209.112.170
SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) PHP/4.4.7 mod_ssl/2.8.28 OpenSSL/0.9.7a FrontPage/5.0.2.2635

SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.bhrc.gov.ir 217.218.4.108
SERVER IP: 217.218.4.108
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

www.bijar.gov.ir 217.219.223.3
SERVER IP: 217.219.223.3
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.bilasavar.gov.ir 217.219.154.133
SERVER IP: 217.219.154.133
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.binalood-ntoir.gov.ir 88.208.205.126
SERVER IP: 88.208.205.126
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.bostanabad.gov.ir 38.117.64.140
SERVER IP: 38.117.64.140
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.causar.gov.ir 38.117.64.170
SERVER IP: 38.117.64.170
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.cbi.gov.ir 82.205.152.140
SERVER IP: 82.205.152.140
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.chaharmahal-oefa.gov.ir 38.117.64.41
SERVER IP: 38.117.64.41
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.charoimagh.gov.ir 38.117.64.140
SERVER IP: 38.117.64.140
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.cinema.gov.ir 217.218.141.132
SERVER IP: 217.218.141.132
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.cobi.gov.ir 64.128.97.104
SERVER IP: 64.128.97.104
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.damavand.gov.ir 38.117.87.1
SERVER IP: 38.117.87.1
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

www.dehaghan.gov.ir 72.55.164.168
SERVER IP: 72.55.164.168
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.2.4 (Fedora)

SERVER IP: 72.55.164.168
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 72.55.164.168
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


SERVER IP: 72.55.164.168
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php
CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756
BID : 23359, 24089, 24259, 24261


SERVER IP: 72.55.164.168
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher
CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806
BID : 25498


SERVER IP: 72.55.164.168
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


www.divandareh.gov.ir 217.219.223.3
SERVER IP: 217.219.223.3
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.dre-mfa.gov.ir 194.225.241.12
SERVER IP: 194.225.241.12
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.53 (Fedora)

ea.gov.ir 72.232.205.50
SERVER IP: 72.232.205.50
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a

SERVER IP: 72.232.205.50
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 72.232.205.50
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 72.232.205.50
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.ea-cooperative.gov.ir 38.117.87.1
SERVER IP: 38.117.87.1
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

ea-edu.gov.ir 66.45.230.100
SERVER IP: 66.45.230.100
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.ea.gov.ir 72.232.205.50
SERVER IP: 72.232.205.50
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a

SERVER IP: 72.232.205.50
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 72.232.205.50
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 72.232.205.50
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.eafo.gov.ir 209.172.34.60
SERVER IP: 209.172.34.60
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

www.easabt.gov.ir 216.81.76.192
SERVER IP: 216.81.76.192
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.ecommerce.gov.ir 217.218.60.27
SERVER IP: 217.218.60.27
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.ehealth.gov.ir 81.91.154.100
SERVER IP: 81.91.154.100
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache-Coyote/1.1

www.eocr.gov.ir 72.29.73.107
SERVER IP: 72.29.73.107
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: WebServerX

SERVER IP: 72.29.73.107
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 72.29.73.107
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.farhang-miyaneh.gov.ir 38.117.64.135
SERVER IP: 38.117.64.135
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.farhang.gov.ir 216.55.142.171
SERVER IP: 216.55.142.171
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.farsculture.gov.ir 80.191.114.3
SERVER IP: 80.191.114.3
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.2.3 mod_ssl/2.2.3

www.fcc.gov.ir 207.176.216.60
SERVER IP: 207.176.216.60
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

www.firoozkooh.gov.ir 38.117.87.1
SERVER IP: 38.117.87.1
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

www.germi.gov.ir 217.219.154.133
SERVER IP: 217.219.154.133
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.ghorveh.gov.ir 217.219.223.3
SERVER IP: 217.219.223.3
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.gilanmaskan.gov.ir 62.193.13.24
SERVER IP: 62.193.13.24
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.golestan-mefa.gov.ir 38.117.64.41
SERVER IP: 38.117.64.41
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.golpaygan.gov.ir 72.55.164.168
SERVER IP: 72.55.164.168
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.2.4 (Fedora)

SERVER IP: 72.55.164.168
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 72.55.164.168
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


SERVER IP: 72.55.164.168
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php
CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756
BID : 23359, 24089, 24259, 24261


SERVER IP: 72.55.164.168
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher
CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806
BID : 25498


SERVER IP: 72.55.164.168
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


www.heris.gov.ir 38.117.64.140
SERVER IP: 38.117.64.140
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.him.gov.ir 208.116.49.50
SERVER IP: 208.116.49.50
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a PHP-CGI/0.1b

SERVER IP: 208.116.49.50
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
The remote Apache server is running mod_frontpage. Versions older than 1.6.1 are vulnerable to a buffer overflow which may allow an attacker to gain root access on this host. *** Note that it is not possible to remotely determine the version of mod_frontpage which is running, so this may be a false positive Solution : Disable this module or upgrade to mod_frontpage 1.6.2
CVE : CVE-2002-0427
BID : 4251


SERVER IP: 208.116.49.50
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 208.116.49.50
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 208.116.49.50
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


icm.gov.ir 209.167.109.15
SERVER IP: 209.167.109.15
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.icm.gov.ir 209.167.109.15
SERVER IP: 209.167.109.15
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

ict.gov.ir 217.218.60.61
SERVER IP: 217.218.60.61
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

wsis.ict.gov.ir 80.191.21.30
SERVER IP: 80.191.21.30
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.ict.gov.ir 217.218.60.61
SERVER IP: 217.218.60.61
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.ijrood.gov.ir 67.15.191.32
SERVER IP: 67.15.191.32
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server:

SERVER IP: 67.15.191.32
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


SERVER IP: 67.15.191.32
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php
CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756
BID : 23359, 24089, 24259, 24261


SERVER IP: 67.15.191.32
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher
CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806
BID : 25498


SERVER IP: 67.15.191.32
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


ioptc.gov.ir 72.232.164.32
SERVER IP: 72.232.164.32
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

irica.gov.ir 207.176.216.50
SERVER IP: 207.176.216.50
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.isc.gov.ir 62.60.154.3
SERVER IP: 62.60.154.3
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.iscu.gov.ir 72.55.164.168
SERVER IP: 72.55.164.168
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.2.4 (Fedora)

SERVER IP: 72.55.164.168
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 72.55.164.168
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


SERVER IP: 72.55.164.168
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php
CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756
BID : 23359, 24089, 24259, 24261


SERVER IP: 72.55.164.168
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher
CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806
BID : 25498


SERVER IP: 72.55.164.168
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


www.isf-mefa.gov.ir 72.29.73.107
SERVER IP: 72.29.73.107
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: WebServerX

SERVER IP: 72.29.73.107
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 72.29.73.107
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.isfahanfarhang.gov.ir 64.92.166.218
SERVER IP: 64.92.166.218
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.islamshahr.gov.ir 38.117.87.1
SERVER IP: 38.117.87.1
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.jiroft.gov.ir 205.209.112.170
SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) PHP/4.4.7 mod_ssl/2.8.28 OpenSSL/0.9.7a FrontPage/5.0.2.2635

SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.jolfa.gov.ir 38.117.64.140
SERVER IP: 38.117.64.140
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.kahnooj.gov.ir 205.209.112.170
SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) PHP/4.4.7 mod_ssl/2.8.28 OpenSSL/0.9.7a FrontPage/5.0.2.2635

SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.kaleibar.gov.ir 38.117.64.140
SERVER IP: 38.117.64.140
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.kamyaran.gov.ir 217.219.223.3
SERVER IP: 217.219.223.3
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.karafarini.gov.ir 77.237.164.228
SERVER IP: 77.237.164.228
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.2.2 (Win32) DAV/2 mod_ssl/2.2.2 OpenSSL/0.9.8b mod_autoindex_color PHP/5.1.4

SERVER IP: 77.237.164.228
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 77.237.164.228
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 77.237.164.228
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


SERVER IP: 77.237.164.228
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php
CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756
BID : 23359, 24089, 24259, 24261


SERVER IP: 77.237.164.228
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher
CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806
BID : 25498


SERVER IP: 77.237.164.228
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


SERVER IP: 77.237.164.228
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


www.karaj.gov.ir 38.117.87.1
SERVER IP: 38.117.87.1
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

www.kb-oefa.gov.ir 38.117.64.110
SERVER IP: 38.117.64.110
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.kd-bordermarket.gov.ir 217.219.223.3
SERVER IP: 217.219.223.3
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.ker-mefa.gov.ir 38.117.64.101
SERVER IP: 38.117.64.101
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.kerman.gov.ir 205.209.112.170
SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) PHP/4.4.7 mod_ssl/2.8.28 OpenSSL/0.9.7a FrontPage/5.0.2.2635

SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.kggo.gov.ir 205.209.97.226
SERVER IP: 205.209.97.226
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) PHP/4.4.7 mod_ssl/2.8.28 OpenSSL/0.9.7d FrontPage/5.0.2.2635

SERVER IP: 205.209.97.226
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 205.209.97.226
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.khalkhal.gov.ir 217.219.154.133
SERVER IP: 217.219.154.133
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

khco.gov.ir 204.13.154.20
SERVER IP: 204.13.154.20
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.khco.gov.ir 204.13.154.20
SERVER IP: 204.13.154.20
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.khcu.gov.ir 204.13.154.85
SERVER IP: 204.13.154.85
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.khodabandeh.gov.ir 67.15.191.32
SERVER IP: 67.15.191.32
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server:

SERVER IP: 67.15.191.32
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


SERVER IP: 67.15.191.32
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php
CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756
BID : 23359, 24089, 24259, 24261


SERVER IP: 67.15.191.32
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher
CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806
BID : 25498


SERVER IP: 67.15.191.32
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


www.khomeinishahr.gov.ir 72.55.164.168
SERVER IP: 72.55.164.168
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.2.4 (Fedora)

SERVER IP: 72.55.164.168
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 72.55.164.168
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


SERVER IP: 72.55.164.168
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php
CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756
BID : 23359, 24089, 24259, 24261


SERVER IP: 72.55.164.168
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher
CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806
BID : 25498


SERVER IP: 72.55.164.168
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


www.khoramdareh.gov.ir 67.15.191.32
SERVER IP: 67.15.191.32
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server:

SERVER IP: 67.15.191.32
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


SERVER IP: 67.15.191.32
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php
CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756
BID : 23359, 24089, 24259, 24261


SERVER IP: 67.15.191.32
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher
CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806
BID : 25498


SERVER IP: 67.15.191.32
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


www.komijan.gov.ir 70.86.149.218
SERVER IP: 70.86.149.218
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.kosar.gov.ir 217.219.154.133
SERVER IP: 217.219.154.133
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.krahbirjand.gov.ir 38.117.64.60
SERVER IP: 38.117.64.60
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

www.kscu.gov.ir 208.64.230.55
SERVER IP: 208.64.230.55
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

www.kurdistan-oefa.gov.ir 38.117.64.50
SERVER IP: 38.117.64.50
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.kurdistan.gov.ir 217.219.223.3
SERVER IP: 217.219.223.3
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.lenjan.gov.ir 74.53.94.98
85.185.130.6
SERVER IP: 74.53.94.98
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_jk/1.2.14 mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 PHP/4.4.7 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a

SERVER IP: 85.185.130.6
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.lor-mefa.gov.ir 38.117.64.20
SERVER IP: 38.117.64.20
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.mahneshan.gov.ir 67.15.191.32
SERVER IP: 67.15.191.32
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server:

SERVER IP: 67.15.191.32
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


SERVER IP: 67.15.191.32
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php
CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756
BID : 23359, 24089, 24259, 24261


SERVER IP: 67.15.191.32
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher
CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806
BID : 25498


SERVER IP: 67.15.191.32
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


www.malekan.gov.ir 38.117.64.140
SERVER IP: 38.117.64.140
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.manoojan.gov.ir 205.209.112.170
SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) PHP/4.4.7 mod_ssl/2.8.28 OpenSSL/0.9.7a FrontPage/5.0.2.2635

SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.marand.gov.ir 38.117.64.140
SERVER IP: 38.117.64.140
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.marivan.gov.ir 209.172.33.12
SERVER IP: 209.172.33.12
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.54 (Fedora)

www.markazi-oefa.gov.ir 72.36.151.134
SERVER IP: 72.36.151.134
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.maskantehran.gov.ir 194.225.71.9
SERVER IP: 194.225.71.9
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.maztax.gov.ir 38.117.64.120
SERVER IP: 38.117.64.120
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

mail.mefa.gov.ir 207.176.216.101
SERVER IP: 207.176.216.101
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.mefa.gov.ir 62.193.13.24
SERVER IP: 62.193.13.24
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

meshkin.gov.ir 217.219.154.133
SERVER IP: 217.219.154.133
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.meshkin.gov.ir 217.219.154.133
SERVER IP: 217.219.154.133
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.mfa.gov.ir 217.172.99.41
SERVER IP: 217.172.99.41
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.2.0 (Linux/SUSE)

www.mhud.gov.ir 213.207.198.67
SERVER IP: 213.207.198.67
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.mianeh.gov.ir 38.117.64.140
SERVER IP: 38.117.64.140
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

amar.mim.gov.ir 217.11.21.10
SERVER IP: 217.11.21.10
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

ardebil.mim.gov.ir 217.11.21.10
SERVER IP: 217.11.21.10
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

chaharmahal.mim.gov.ir 217.11.21.10
SERVER IP: 217.11.21.10
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

fars.mim.gov.ir 217.11.21.10
SERVER IP: 217.11.21.10
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

gilan.mim.gov.ir 217.11.21.10
SERVER IP: 217.11.21.10
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

golestan.mim.gov.ir 217.11.21.10
SERVER IP: 217.11.21.10
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

hamedan.mim.gov.ir 217.11.21.10
SERVER IP: 217.11.21.10
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

hormozgan.mim.gov.ir 217.11.21.10
SERVER IP: 217.11.21.10
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

ilam.mim.gov.ir 217.11.21.10
SERVER IP: 217.11.21.10
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

intl.mim.gov.ir 217.11.21.10
SERVER IP: 217.11.21.10
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

kermanshah.mim.gov.ir 217.11.21.10
SERVER IP: 217.11.21.10
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

khorasan.mim.gov.ir 217.11.21.10
SERVER IP: 217.11.21.10
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

khozestan.mim.gov.ir 217.11.21.10
SERVER IP: 217.11.21.10
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

kurdistan.mim.gov.ir 217.11.21.10
SERVER IP: 217.11.21.10
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

lorestan.mim.gov.ir 217.11.21.10
SERVER IP: 217.11.21.10
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

markazi.mim.gov.ir 217.11.21.10
SERVER IP: 217.11.21.10
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

mazandaran.mim.gov.ir 217.11.21.10
SERVER IP: 217.11.21.10
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

mine.mim.gov.ir 217.11.21.10
SERVER IP: 217.11.21.10
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

miningstrategy.mim.gov.ir 217.11.21.10
SERVER IP: 217.11.21.10
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

prov.mim.gov.ir 217.11.21.10
SERVER IP: 217.11.21.10
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

qazvin.mim.gov.ir 217.11.21.10
SERVER IP: 217.11.21.10
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

qom.mim.gov.ir 217.11.21.10
SERVER IP: 217.11.21.10
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

semnan.mim.gov.ir 217.11.21.10
SERVER IP: 217.11.21.10
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

sistan.mim.gov.ir 217.11.21.10
SERVER IP: 217.11.21.10
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

sta.mim.gov.ir 217.11.21.10
SERVER IP: 217.11.21.10
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.mim.gov.ir 217.11.21.10
SERVER IP: 217.11.21.10
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

yazd.mim.gov.ir 217.11.21.10
SERVER IP: 217.11.21.10
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

zanjan.mim.gov.ir 217.11.21.10
SERVER IP: 217.11.21.10
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

prd.moc.gov.ir 78.38.192.10
SERVER IP: 78.38.192.10
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.prd.moc.gov.ir 78.38.192.10
SERVER IP: 78.38.192.10
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.moc.gov.ir 78.38.192.10
SERVER IP: 78.38.192.10
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

frbm.mohme.gov.ir 81.91.152.11
SERVER IP: 81.91.152.11
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

SERVER IP: 81.91.152.11
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 81.91.152.11
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


gao.mohme.gov.ir 81.91.152.11
SERVER IP: 81.91.152.11
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

SERVER IP: 81.91.152.11
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 81.91.152.11
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


gdfa.mohme.gov.ir 81.91.152.11
SERVER IP: 81.91.152.11
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

SERVER IP: 81.91.152.11
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 81.91.152.11
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


hrmo.mohme.gov.ir 81.91.152.11
SERVER IP: 81.91.152.11
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

SERVER IP: 81.91.152.11
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 81.91.152.11
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


lao.mohme.gov.ir 81.91.152.11
SERVER IP: 81.91.152.11
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

SERVER IP: 81.91.152.11
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 81.91.152.11
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


lawoffice.mohme.gov.ir 81.91.152.11
SERVER IP: 81.91.152.11
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

mdar.mohme.gov.ir 81.91.152.11
SERVER IP: 81.91.152.11
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

SERVER IP: 81.91.152.11
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 81.91.152.11
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


oldwww.mohme.gov.ir 81.91.152.11
SERVER IP: 81.91.152.11
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

piu.mohme.gov.ir 81.91.152.11
SERVER IP: 81.91.152.11
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

SERVER IP: 81.91.152.11
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 81.91.152.11
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


pmhr.mohme.gov.ir 81.91.152.11
SERVER IP: 81.91.152.11
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

SERVER IP: 81.91.152.11
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 81.91.152.11
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


prmo.mohme.gov.ir 81.91.152.11
SERVER IP: 81.91.152.11
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

SERVER IP: 81.91.152.11
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 81.91.152.11
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


pro.mohme.gov.ir 81.91.152.11
SERVER IP: 81.91.152.11
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

sar.mohme.gov.ir 81.91.152.11
SERVER IP: 81.91.152.11
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

SERVER IP: 81.91.152.11
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 81.91.152.11
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


touse.mohme.gov.ir 81.91.152.11
SERVER IP: 81.91.152.11
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/5.0

www.mohme.gov.ir 81.91.152.11
SERVER IP: 81.91.152.11
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.moj.gov.ir 62.193.12.10
SERVER IP: 62.193.12.10
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.mpo-fr.gov.ir 80.191.113.50
SERVER IP: 80.191.113.50
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.mpo-hr.gov.ir 208.64.230.214
SERVER IP: 208.64.230.214
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 PHP/4.4.8-dev FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a

SERVER IP: 208.64.230.214
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 208.64.230.214
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 208.64.230.214
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.msrt.gov.ir 213.176.75.3
SERVER IP: 213.176.75.3
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.naein.gov.ir 216.40.221.146
SERVER IP: 216.40.221.146
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.namin.gov.ir 217.219.154.133
SERVER IP: 217.219.154.133
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.nazarabad.gov.ir 38.117.87.1
SERVER IP: 38.117.87.1
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.nhlo.gov.ir 85.15.52.97
SERVER IP: 85.15.52.97
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

nir.gov.ir 217.219.154.133
SERVER IP: 217.219.154.133
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.nir.gov.ir 217.219.154.133
SERVER IP: 217.219.154.133
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.ntoir.gov.ir 38.117.64.60
SERVER IP: 38.117.64.60
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.osku.gov.ir 38.117.64.140
SERVER IP: 38.117.64.140
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.ostan-ag.gov.ir 207.176.223.226
SERVER IP: 207.176.223.226
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.ostan-as.gov.ir 217.219.138.13
SERVER IP: 217.219.138.13
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.ostan-kz.gov.ir 62.193.13.24
SERVER IP: 62.193.13.24
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.pakdasht.gov.ir 38.117.87.1
SERVER IP: 38.117.87.1
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

parsabad.gov.ir 217.219.154.133
SERVER IP: 217.219.154.133
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.parsabad.gov.ir 217.219.154.133
SERVER IP: 217.219.154.133
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.qazvin-oefa.gov.ir 38.117.64.71
SERVER IP: 38.117.64.71
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.qazvin.gov.ir 209.167.109.15
SERVER IP: 209.167.109.15
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.rafsanjan.gov.ir 205.209.112.170
SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) PHP/4.4.7 mod_ssl/2.8.28 OpenSSL/0.9.7a FrontPage/5.0.2.2635

SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


rasht.gov.ir 89.144.128.30
SERVER IP: 89.144.128.30
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.ravar.gov.ir 205.209.112.170
SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) PHP/4.4.7 mod_ssl/2.8.28 OpenSSL/0.9.7a FrontPage/5.0.2.2635

SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


razavimet.gov.ir 72.44.74.114
SERVER IP: 72.44.74.114
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

kashmar.razavimet.gov.ir 72.44.74.114
SERVER IP: 72.44.74.114
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.razavimet.gov.ir 72.44.74.114
SERVER IP: 72.44.74.114
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.rca.gov.ir 78.38.192.251
SERVER IP: 78.38.192.251
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.refah.gov.ir 80.191.79.22
SERVER IP: 80.191.79.22
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.46 (Red Hat)

www.research.gov.ir 213.176.47.80
SERVER IP: 213.176.47.80
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.rey.gov.ir 38.117.87.1
SERVER IP: 38.117.87.1
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

www.robatkarim.gov.ir 208.116.49.50
SERVER IP: 208.116.49.50
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a PHP-CGI/0.1b

SERVER IP: 208.116.49.50
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 208.116.49.50
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 208.116.49.50
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


arzeshyabi.sabt.gov.ir 217.66.196.26
SERVER IP: 217.66.196.26
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

novin.sabt.gov.ir 217.66.196.26
SERVER IP: 217.66.196.26
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.sabt.gov.ir 217.66.196.26
SERVER IP: 217.66.196.26
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

sabtyazd.gov.ir 216.40.221.146
SERVER IP: 216.40.221.146
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

www.sabtyazd.gov.ir 216.40.221.146
SERVER IP: 216.40.221.146
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

www.saghez.gov.ir 217.219.223.3
SERVER IP: 217.219.223.3
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.sanandaj.gov.ir 217.219.223.3
SERVER IP: 217.219.223.3
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.sandoghtavon.gov.ir 217.218.60.28
SERVER IP: 217.218.60.28
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.sarab.gov.ir 217.219.131.194
SERVER IP: 217.219.131.194
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

www.sarvabad.gov.ir 217.219.223.3
SERVER IP: 217.219.223.3
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.saveh.gov.ir 72.36.140.90
SERVER IP: 72.36.140.90
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.semirom.gov.ir 72.55.164.168
SERVER IP: 72.55.164.168
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.2.4 (Fedora)

www.semnanmaskan.gov.ir 217.218.247.24
SERVER IP: 217.218.247.24
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.shabestar.gov.ir 38.117.64.140
SERVER IP: 38.117.64.140
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.shahrbabak.gov.ir 205.209.112.170
SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) PHP/4.4.7 mod_ssl/2.8.28 OpenSSL/0.9.7a FrontPage/5.0.2.2635

SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.shahreza.gov.ir 72.232.164.32
SERVER IP: 72.232.164.32
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache

www.shahriyar.gov.ir 38.117.87.1
SERVER IP: 38.117.87.1
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

www.shemiran.gov.ir 38.117.87.1
SERVER IP: 38.117.87.1
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

www.shohada.gov.ir 69.93.59.226
SERVER IP: 69.93.59.226
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.sirjan.gov.ir 205.209.112.170
SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) PHP/4.4.7 mod_ssl/2.8.28 OpenSSL/0.9.7a FrontPage/5.0.2.2635

SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.sk-mim.gov.ir 38.117.64.120
SERVER IP: 38.117.64.120
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

spokesman.gov.ir 78.154.44.234
SERVER IP: 78.154.44.234
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.2.2 (Win32) DAV/2 mod_ssl/2.2.2 OpenSSL/0.9.8b mod_autoindex_color

SERVER IP: 78.154.44.234
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 78.154.44.234
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.spokesman.gov.ir 78.154.44.234
SERVER IP: 78.154.44.234
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.2.2 (Win32) DAV/2 mod_ssl/2.2.2 OpenSSL/0.9.8b mod_autoindex_color

SERVER IP: 78.154.44.234
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 78.154.44.234
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


tabriz.gov.ir 83.98.158.175
SERVER IP: 83.98.158.175
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 PHP/4.4.6 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a

SERVER IP: 83.98.158.175
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 83.98.158.175
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 83.98.158.175
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


SERVER IP: 83.98.158.175
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.tabriz.gov.ir 83.98.158.175
SERVER IP: 83.98.158.175
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 PHP/4.4.6 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a

SERVER IP: 83.98.158.175
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 83.98.158.175
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 83.98.158.175
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


SERVER IP: 83.98.158.175
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.tarom.gov.ir 67.15.191.32
SERVER IP: 67.15.191.32
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server:

SERVER IP: 67.15.191.32
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


SERVER IP: 67.15.191.32
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php
CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756
BID : 23359, 24089, 24259, 24261


SERVER IP: 67.15.191.32
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher
CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806
BID : 25498


SERVER IP: 67.15.191.32
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


www.qaz.tazirat.gov.ir 79.132.212.150
SERVER IP: 79.132.212.150
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.tazirat.gov.ir 79.132.212.150
SERVER IP: 79.132.212.150
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.tco.gov.ir 217.172.101.101
SERVER IP: 217.172.101.101
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/5.0
- The remote host is running a Microsoft IIS webserver

www.tehran.gov.ir 38.117.87.1
SERVER IP: 38.117.87.1
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Microsoft-IIS/6.0

www.tri.gov.ir 207.176.216.108
87.247.176.7
SERVER IP: 207.176.216.108
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

SERVER IP: 87.247.176.7
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

www.uuhrp.gov.ir 208.64.28.242
SERVER IP: 208.64.28.242
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 PHP/4.4.7 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.8b

SERVER IP: 208.64.28.242
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
The remote Apache server is running mod_frontpage. Versions older than 1.6.1 are vulnerable to a buffer overflow which may allow an attacker to gain root access on this host. *** Note that it is not possible to remotely determine the version of mod_frontpage which is running, so this may be a false positive Solution : Disable this module or upgrade to mod_frontpage 1.6.2
CVE : CVE-2002-0427
BID : 4251


SERVER IP: 208.64.28.242
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 208.64.28.242
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.varamin.gov.ir 38.117.87.1
SERVER IP: 38.117.87.1
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

varzeghan.gov.ir 38.117.64.140
SERVER IP: 38.117.64.140
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
- A web server is running on this port : Server: Microsoft-IIS/6.0
- The remote host is running a Microsoft IIS webserver

women.gov.ir 80.191.69.24
SERVER IP: 80.191.69.24
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.51 (Unix) PHP/4.3.8

SERVER IP: 80.191.69.24
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Script Injection attack The remote host is running a version of PHP which is older than 5.0.3 or 4.3.10. The remote version of this software is vulnerable to various security issues which may, under certain circumstances, allow attackers to execute arbitrary code on the remote host, provided that they can pass arbitrary data to some functions or bypass safe_mode. CVSS Base Score : 6 AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to PHP 5.0.3 or 4.3.10
CVE : CVE-2004-1018, CVE-2004-1019, CVE-2004-1020, CVE-2004-1063, CVE-2004-1064, CVE-2004-1065
BID : 11964, 11981, 11992, 12045


SERVER IP: 80.191.69.24
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher.
CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525
BID : 12963, 12962, 13143, 13163, 13164


SERVER IP: 80.191.69.24
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 80.191.69.24
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.women.gov.ir 80.191.69.24
SERVER IP: 80.191.69.24
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/2.0.51 (Unix) PHP/4.3.8

SERVER IP: 80.191.69.24
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Script Injection attack The remote host is running a version of PHP which is older than 5.0.3 or 4.3.10. The remote version of this software is vulnerable to various security issues which may, under certain circumstances, allow attackers to execute arbitrary code on the remote host, provided that they can pass arbitrary data to some functions or bypass safe_mode. CVSS Base Score : 6 AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to PHP 5.0.3 or 4.3.10
CVE : CVE-2004-1018, CVE-2004-1019, CVE-2004-1020, CVE-2004-1063, CVE-2004-1064, CVE-2004-1065
BID : 11964, 11981, 11992, 12045


SERVER IP: 80.191.69.24
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is Missing a critical security patch or upgrade The remote host is running a version of PHP which is older than 4.3.11 or 5.0.4. This version contains a bug which can be triggered when the getimagesize() function processes malicious IFF or JPEG image files. An attacker, exploiting this flaw, would be able to present an image to the function which would cause the function to go into an infinite loop (by processing a negative file size). A successful exploit would result in the loss of system Availability for valid users. There is also a reported flaw in the way that PHP handles data being passed to the Image File Directory (IFD). Reportedly, this leads to a remote Denial of Service (DoS) attack. Other flaws impacting this version of PHP have been reported, albeit, details have not been released. CVSS Base Score : 7 AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N Solution : Upgrade to 4.3.11 or 5.0.4 or higher.
CVE : CVE-2005-1043, CVE-2005-0524, CVE-2005-0525
BID : 12963, 12962, 13143, 13163, 13164


SERVER IP: 80.191.69.24
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 5.2.0. This version is vulnerable to around 180 bugs. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.5, 5.2.1 or newer See also : http://www.php.net/ChangeLog-5.php#5.2.1
CVE : CVE-2007-0905, CVE-2007-0906, CVE-2007-0907, CVE-2007-0908, CVE-2007-0909, CVE-2007-0910, CVE-2007-1376, CVE-2007-1378, CVE-2007-1379, CVE-2007-1380, CVE-2007-1484, CVE-2007-1700, CVE-2007-1701, CVE-2007-1777, CVE-2007-1824, CVE-2007-1825, CVE-2007-1884, CVE-2007-1885, CVE-2007-1887, CVE-2007-1890, CVE-2006-6383
BID : 21508, 22496, 22805, 22806, 22833, 22862, 22990, 23012, 23119, 23120, 23169, 23219, 23233, 23234, 23235, 23236, 23237, 23238


SERVER IP: 80.191.69.24
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


www.yazd-mefa.gov.ir 208.64.230.5
SERVER IP: 208.64.230.5
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 PHP/4.4.8-dev FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.28 OpenSSL/0.9.7a

SERVER IP: 208.64.230.5
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 208.64.230.5
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 208.64.230.5
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055


www.zanjan.gov.ir 67.15.191.32
SERVER IP: 67.15.191.32
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server:

SERVER IP: 67.15.191.32
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running PHP less than 4.4.7 or 5.2.2. This version is vulnerable to a number of remote issues. At least one of these issues is related to a buffer overflow attack. An attacker, exploiting these flaws, would be able to impact Confidentiality, Integrity, and Availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP 4.4.7, 5.2.2 or newer See also : http://www.php.net
CVE : CVE-2007-1864, CVE-2007-2510, CVE-2007-2727, CVE-2007-2748, CVE-2007-1375, CVE-2007-2509, CVE-2007-1484, CVE-2007-0455, CVE-2007-1001
BID : 24034, 22851, 24012, 22990, 22289, 23357, 23813, 23818, 23984


SERVER IP: 67.15.191.32
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.3. Such versions may be affected by several issues, including an integer overflow, 'safe_mode' and 'open_basedir' bypass, and a denial of service vulnerability. CVSS Base Score : 6.8 CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.3 or later. See also : http://www.php.net/releases/5_2_3.php
CVE : CVE-2007-3007, CVE-2007-2872, CVE-2007-1900, CVE-2007-2756
BID : 23359, 24089, 24259, 24261


SERVER IP: 67.15.191.32
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is running a version of PHP prior to 5.2.4. This version of PHP is vulnerable to at least 120 distinct security flaws impacting confidentiality, integrity, and availability. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to version 5.2.4 or higher
CVE : CVE-2007-3378, CVE-2007-2872, CVE-2007-3806
BID : 25498


SERVER IP: 67.15.191.32
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote web server uses a version of PHP that is affected by multiple flaws. According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. CVSS Base Score : 7.5 CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P Solution : Upgrade to PHP version 5.2.5 or later. See also : http://www.php.net/releases/5_2_5.php
CVE : CVE-2007-4887
BID : 26403


www.zarand.gov.ir 205.209.112.170
SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: NOTE
A web server is running on this port : Server: Apache/1.3.37 (Unix) PHP/4.4.7 mod_ssl/2.8.28 OpenSSL/0.9.7a FrontPage/5.0.2.2635

SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: INFO
Synopsis : The remote host is vulnerable to a Denial of Service (DoS) attack The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to cause a denial of service against the remote host. . IAVA Reference : 2004-b-0006 CVSS Base Score : 5.0 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P Solution : Upgrade to version 0.9.6m (0.9.7d) or newer
CVE : CVE-2003-0851, CVE-2004-0079, CVE-2004-0081, CVE-2004-0112
BID : 8970, 9899


SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.6m or 0.9.7d There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.7l, 0.9.8d or newer See also : http://www.openssl.org/news/secadv_20060928.txt
CVE : CVE-2006-2940, CVE-2006-3738, CVE-2006-2937
BID : 20247, 20249, 20248


SERVER IP: 205.209.112.170
PORT/PROTOCOL: 80/tcp
TYPE: REPORT
Synopsis : The remote host is vulnerable to multiple attack vectors The remote host is using a version of OpenSSL which is older than 0.9.7n or 0.9.8f. There are several bug in this version of OpenSSL which may allow an attacker to either execute remote code or cause a Denial of Service (DoS). CVSS Base Score : 7.8 CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C Solution : Upgrade to version 0.9.8f or newer See also : http://www.securityfocus.com/archive/1/20070927162140.GA10706@fugu1.local
CVE : CVE-2007-4995, CVE-2007-5135
BID : 25831, 26055




IP Address Associated Domain Names
38.117.64.20
www.lor-mefa.gov.ir           
38.117.64.41
www.chaharmahal-oefa.gov.ir    www.golestan-mefa.gov.ir        
38.117.64.50
www.kurdistan-oefa.gov.ir           
38.117.64.60
www.krahbirjand.gov.ir    www.ntoir.gov.ir        
38.117.64.71
www.qazvin-oefa.gov.ir           
38.117.64.101
www.ker-mefa.gov.ir           
38.117.64.110
www.kb-oefa.gov.ir           
38.117.64.120
www.ajabshir.gov.ir    www.maztax.gov.ir    www.sk-mim.gov.ir     
38.117.64.135
www.farhang-miyaneh.gov.ir           
38.117.64.140
www.ahar.gov.ir    www.heris.gov.ir    www.marand.gov.ir    varzeghan.gov.ir  
www.azarshahr.gov.ir    www.jolfa.gov.ir    www.mianeh.gov.ir     
www.bostanabad.gov.ir    www.kaleibar.gov.ir    www.osku.gov.ir     
www.charoimagh.gov.ir    www.malekan.gov.ir    www.shabestar.gov.ir     
38.117.64.170
www.causar.gov.ir           
38.117.87.1
www.damavand.gov.ir    www.islamshahr.gov.ir    www.pakdasht.gov.ir    www.shemiran.gov.ir  
www.ea-cooperative.gov.ir    www.karaj.gov.ir    www.rey.gov.ir    www.tehran.gov.ir  
www.firoozkooh.gov.ir    www.nazarabad.gov.ir    www.shahriyar.gov.ir    www.varamin.gov.ir  
62.60.154.3
www.isc.gov.ir           
62.193.12.10
www.moj.gov.ir           
62.193.13.24
www.gilanmaskan.gov.ir    www.mefa.gov.ir    www.ostan-kz.gov.ir     
64.92.166.218
www.isfahanfarhang.gov.ir           
64.128.97.104
www.cobi.gov.ir           
64.246.32.70
www.atf.gov.ir           
66.45.230.100
ea-edu.gov.ir           
67.15.191.32
www.abhar.gov.ir    www.khodabandeh.gov.ir    www.mahneshan.gov.ir    www.zanjan.gov.ir  
www.ijrood.gov.ir    www.khoramdareh.gov.ir    www.tarom.gov.ir     
69.93.59.226
www.shohada.gov.ir           
70.86.149.218
www.komijan.gov.ir           
72.29.73.107
www.eocr.gov.ir    www.isf-mefa.gov.ir        
72.36.140.90
www.saveh.gov.ir           
72.36.151.134
www.markazi-oefa.gov.ir           
72.44.74.114
razavimet.gov.ir    kashmar.razavimet.gov.ir    www.razavimet.gov.ir     
72.55.164.16
ad.gov.ir    www.ad.gov.ir        
72.55.164.168
www.dehaghan.gov.ir    www.iscu.gov.ir    www.semirom.gov.ir     
www.golpaygan.gov.ir    www.khomeinishahr.gov.ir        
72.232.164.32
ioptc.gov.ir    www.shahreza.gov.ir        
72.232.205.50
ea.gov.ir    www.ea.gov.ir        
74.53.94.98
www.lenjan.gov.ir           
77.237.164.228
www.karafarini.gov.ir           
78.38.192.10
prd.moc.gov.ir    www.prd.moc.gov.ir    www.moc.gov.ir     
78.38.192.251
www.rca.gov.ir           
78.154.42.227
www.aiiri.gov.ir           
78.154.44.234
spokesman.gov.ir    www.spokesman.gov.ir        
79.132.212.150
www.qaz.tazirat.gov.ir    www.tazirat.gov.ir        
80.191.21.30
wsis.ict.gov.ir           
80.191.69.24
women.gov.ir    www.women.gov.ir        
80.191.79.22
www.refah.gov.ir           
80.191.113.50
www.mpo-fr.gov.ir           
80.191.114.3
www.farsculture.gov.ir           
81.91.152.11
frbm.mohme.gov.ir    lao.mohme.gov.ir    piu.mohme.gov.ir    sar.mohme.gov.ir  
gao.mohme.gov.ir    lawoffice.mohme.gov.ir    pmhr.mohme.gov.ir    touse.mohme.gov.ir  
gdfa.mohme.gov.ir    mdar.mohme.gov.ir    prmo.mohme.gov.ir    www.mohme.gov.ir  
hrmo.mohme.gov.ir    oldwww.mohme.gov.ir    pro.mohme.gov.ir     
81.91.154.100
www.ehealth.gov.ir           
82.205.152.140
www.cbi.gov.ir           
83.98.158.175
tabriz.gov.ir    www.tabriz.gov.ir        
85.15.52.97
www.nhlo.gov.ir           
85.185.130.6
www.lenjan.gov.ir           
87.247.176.7
www.tri.gov.ir           
88.208.205.126
www.binalood-ntoir.gov.ir           
89.144.128.30
anzali.gov.ir    rasht.gov.ir        
91.121.44.111
www.ashayer-ks.gov.ir           
194.225.71.9
www.maskantehran.gov.ir           
194.225.241.12
www.dre-mfa.gov.ir           
204.13.154.20
khco.gov.ir    www.khco.gov.ir        
204.13.154.85
www.khcu.gov.ir           
205.209.97.226
www.kggo.gov.ir           
205.209.112.170
www.anbarabad.gov.ir    www.jiroft.gov.ir    www.rafsanjan.gov.ir    www.zarand.gov.ir  
www.baft.gov.ir    www.kahnooj.gov.ir    www.ravar.gov.ir     
www.bam.gov.ir    www.kerman.gov.ir    www.shahrbabak.gov.ir     
www.bardsir.gov.ir    www.manoojan.gov.ir    www.sirjan.gov.ir     
207.176.216.50
irica.gov.ir           
207.176.216.60
www.fcc.gov.ir           
207.176.216.101
mail.mefa.gov.ir           
207.176.216.108
www.tri.gov.ir           
207.176.223.226
www.ostan-ag.gov.ir           
208.64.28.242
www.uuhrp.gov.ir           
208.64.230.5
www.yazd-mefa.gov.ir           
208.64.230.55
www.kscu.gov.ir           
208.64.230.214
www.mpo-hr.gov.ir           
208.116.49.50
www.him.gov.ir    www.robatkarim.gov.ir        
209.167.109.15
icm.gov.ir    www.icm.gov.ir    www.qazvin.gov.ir     
209.172.33.12
www.marivan.gov.ir           
209.172.34.60
www.eafo.gov.ir           
213.176.47.80
www.research.gov.ir           
213.176.75.3
www.msrt.gov.ir           
213.207.198.67
www.mhud.gov.ir           
216.40.221.146
www.naein.gov.ir    sabtyazd.gov.ir    www.sabtyazd.gov.ir     
216.55.142.171
www.farhang.gov.ir           
216.81.76.192
www.easabt.gov.ir           
217.11.21.10
amar.mim.gov.ir    hormozgan.mim.gov.ir    lorestan.mim.gov.ir    qom.mim.gov.ir  
ardebil.mim.gov.ir    ilam.mim.gov.ir    markazi.mim.gov.ir    semnan.mim.gov.ir  
chaharmahal.mim.gov.ir    intl.mim.gov.ir    mazandaran.mim.gov.ir    sistan.mim.gov.ir  
fars.mim.gov.ir    kermanshah.mim.gov.ir    mine.mim.gov.ir    sta.mim.gov.ir  
gilan.mim.gov.ir    khorasan.mim.gov.ir    miningstrategy.mim.gov.ir    www.mim.gov.ir  
golestan.mim.gov.ir    khozestan.mim.gov.ir    prov.mim.gov.ir    yazd.mim.gov.ir  
hamedan.mim.gov.ir    kurdistan.mim.gov.ir    qazvin.mim.gov.ir    zanjan.mim.gov.ir  
217.66.196.26
arzeshyabi.sabt.gov.ir    novin.sabt.gov.ir    www.sabt.gov.ir     
217.172.99.41
www.mfa.gov.ir           
217.172.101.101
www.tco.gov.ir           
217.218.4.108
www.bhrc.gov.ir           
217.218.60.27
www.ecommerce.gov.ir           
217.218.60.28
www.azarmaskan.gov.ir    www.sandoghtavon.gov.ir        
217.218.60.61
ict.gov.ir    www.ict.gov.ir        
217.218.141.132
www.cinema.gov.ir           
217.218.247.24
www.semnanmaskan.gov.ir           
217.218.254.35
www.arak.gov.ir           
217.219.131.194
www.sarab.gov.ir           
217.219.138.13
www.ostan-as.gov.ir           
217.219.154.133
www.ardabil.gov.ir    www.khalkhal.gov.ir    www.meshkin.gov.ir    www.nir.gov.ir  
www.bilasavar.gov.ir    www.kosar.gov.ir    www.namin.gov.ir    parsabad.gov.ir  
www.germi.gov.ir    meshkin.gov.ir    nir.gov.ir    www.parsabad.gov.ir  
217.219.223.3
www.bijar.gov.ir    www.kamyaran.gov.ir    www.saghez.gov.ir     
www.divandareh.gov.ir    www.kd-bordermarket.gov.ir    www.sanandaj.gov.ir     
www.ghorveh.gov.ir    www.kurdistan.gov.ir    www.sarvabad.gov.ir