Nmap Scan Report - Scanned at Sun Mar 22 03:55:15 2026

Scan Summary

Nmap 7.94SVN was initiated at Sun Mar 22 03:55:15 2026 with these arguments:
/usr/lib/nmap/nmap --privileged -sV --script=vuln -oN scan_results.txt -oX scan_results.xml 192.168.0.101

Verbosity: 0; Debug level 0

Nmap done at Sun Mar 22 04:01:26 2026; 1 IP address (1 host up) scanned in 371.08 seconds

Pre-Scan Script Output

Script Name Output
broadcast-avahi-dos 
  Discovered hosts:
    224.0.0.251
  After NULL UDP avahi packet DoS (CVE-2011-1002).
  Hosts are all up (not vulnerable).

192.168.0.101(online)

Address

Ports

The 977 ports scanned but not shown below are in state: closed

Port State (toggle closed [0] | filtered [0]) Service Reason Product Version Extra info
21 tcp open ftp  syn-ack vsftpd  2.3.4   
vulners 
  vsftpd 2.3.4: 
    	PACKETSTORM:162145	10.0	https://vulners.com/packetstorm/PACKETSTORM:162145	*EXPLOIT*
    	EDB-ID:49757	10.0	https://vulners.com/exploitdb/EDB-ID:49757	*EXPLOIT*
    	E9B0AEBB-5138-50BF-8922-2D87E3C046DD	10.0	https://vulners.com/githubexploit/E9B0AEBB-5138-50BF-8922-2D87E3C046DD	*EXPLOIT*
    	CVE-2011-2523	10.0	https://vulners.com/cve/CVE-2011-2523
    	CNVD-2020-46837	10.0	https://vulners.com/cnvd/CNVD-2020-46837
    	CC3F6C15-182F-53F6-A5CC-812D37F1F047	10.0	https://vulners.com/githubexploit/CC3F6C15-182F-53F6-A5CC-812D37F1F047	*EXPLOIT*
    	A41B5EAD-1A4C-56A6-97C6-1C58A1CF1E3B	10.0	https://vulners.com/githubexploit/A41B5EAD-1A4C-56A6-97C6-1C58A1CF1E3B	*EXPLOIT*
    	817CD8FE-87C4-5FE8-B9B2-8CC64333A3F3	10.0	https://vulners.com/githubexploit/817CD8FE-87C4-5FE8-B9B2-8CC64333A3F3	*EXPLOIT*
    	63A5C9A7-C241-5E83-9EE6-ABAB44BDD270	10.0	https://vulners.com/githubexploit/63A5C9A7-C241-5E83-9EE6-ABAB44BDD270	*EXPLOIT*
    	5F4BCEDE-77DF-5D54-851A-0AE8B76458D9	10.0	https://vulners.com/githubexploit/5F4BCEDE-77DF-5D54-851A-0AE8B76458D9	*EXPLOIT*
    	50580586-73C4-5097-81CA-546D6591DF44	10.0	https://vulners.com/githubexploit/50580586-73C4-5097-81CA-546D6591DF44	*EXPLOIT*
    	1337DAY-ID-36095	9.8	https://vulners.com/zdt/1337DAY-ID-36095	*EXPLOIT* 
ftp-vsftpd-backdoor 
  VULNERABLE:
  vsFTPd version 2.3.4 backdoor
    State: VULNERABLE (Exploitable)
    IDs:  BID:48539  CVE:CVE-2011-2523
      vsFTPd version 2.3.4 backdoor, this was reported on 2011-07-04.
    Disclosure date: 2011-07-03
    Exploit results:
      Shell command: id
      Results: uid=0(root) gid=0(root)
    References:
      https://www.securityfocus.com/bid/48539
      https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/ftp/vsftpd_234_backdoor.rb
      https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2523
      http://scarybeastsecurity.blogspot.com/2011/07/alert-vsftpd-download-backdoored.html
 
22 tcp open ssh  syn-ack OpenSSH  4.7p1 Debian 8ubuntu1  protocol 2.0 
vulners 
  cpe:/a:openbsd:openssh:4.7p1: 
    	DF059135-2CF5-5441-8F22-E6EF1DEE5F6E	10.0	https://vulners.com/gitee/DF059135-2CF5-5441-8F22-E6EF1DEE5F6E	*EXPLOIT*
    	PACKETSTORM:173661	9.8	https://vulners.com/packetstorm/PACKETSTORM:173661	*EXPLOIT*
    	F0979183-AE88-53B4-86CF-3AF0523F3807	9.8	https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807	*EXPLOIT*
    	CVE-2023-38408	9.8	https://vulners.com/cve/CVE-2023-38408
    	CVE-2016-1908	9.8	https://vulners.com/cve/CVE-2016-1908
    	B8190CDB-3EB9-5631-9828-8064A1575B23	9.8	https://vulners.com/githubexploit/B8190CDB-3EB9-5631-9828-8064A1575B23	*EXPLOIT*
    	8FC9C5AB-3968-5F3C-825E-E8DB5379A623	9.8	https://vulners.com/githubexploit/8FC9C5AB-3968-5F3C-825E-E8DB5379A623	*EXPLOIT*
    	8AD01159-548E-546E-AA87-2DE89F3927EC	9.8	https://vulners.com/githubexploit/8AD01159-548E-546E-AA87-2DE89F3927EC	*EXPLOIT*
    	6192C35D-F78B-5C0A-AB8D-9826A79A5320	9.8	https://vulners.com/githubexploit/6192C35D-F78B-5C0A-AB8D-9826A79A5320	*EXPLOIT*
    	2227729D-6700-5C8F-8930-1EEAFD4B9FF0	9.8	https://vulners.com/githubexploit/2227729D-6700-5C8F-8930-1EEAFD4B9FF0	*EXPLOIT*
    	0221525F-07F5-5790-912D-F4B9E2D1B587	9.8	https://vulners.com/githubexploit/0221525F-07F5-5790-912D-F4B9E2D1B587	*EXPLOIT*
    	CVE-2015-5600	8.5	https://vulners.com/cve/CVE-2015-5600
    	BA3887BD-F579-53B1-A4A4-FF49E953E1C0	8.1	https://vulners.com/githubexploit/BA3887BD-F579-53B1-A4A4-FF49E953E1C0	*EXPLOIT*
    	4FB01B00-F993-5CAF-BD57-D7E290D10C1F	8.1	https://vulners.com/githubexploit/4FB01B00-F993-5CAF-BD57-D7E290D10C1F	*EXPLOIT*
    	SSV:78173	7.8	https://vulners.com/seebug/SSV:78173	*EXPLOIT*
    	SSV:69983	7.8	https://vulners.com/seebug/SSV:69983	*EXPLOIT*
    	PACKETSTORM:98796	7.8	https://vulners.com/packetstorm/PACKETSTORM:98796	*EXPLOIT*
    	PACKETSTORM:94556	7.8	https://vulners.com/packetstorm/PACKETSTORM:94556	*EXPLOIT*
    	PACKETSTORM:140070	7.8	https://vulners.com/packetstorm/PACKETSTORM:140070	*EXPLOIT*
    	PACKETSTORM:101052	7.8	https://vulners.com/packetstorm/PACKETSTORM:101052	*EXPLOIT*
    	EXPLOITPACK:71D51B69AA2D3A74753D7A921EE79985	7.8	https://vulners.com/exploitpack/EXPLOITPACK:71D51B69AA2D3A74753D7A921EE79985	*EXPLOIT*
    	EXPLOITPACK:67F6569F63A082199721C069C852BBD7	7.8	https://vulners.com/exploitpack/EXPLOITPACK:67F6569F63A082199721C069C852BBD7	*EXPLOIT*
    	EXPLOITPACK:5BCA798C6BA71FAE29334297EC0B6A09	7.8	https://vulners.com/exploitpack/EXPLOITPACK:5BCA798C6BA71FAE29334297EC0B6A09	*EXPLOIT*
    	EDB-ID:40888	7.8	https://vulners.com/exploitdb/EDB-ID:40888	*EXPLOIT*
    	EDB-ID:24450	7.8	https://vulners.com/exploitdb/EDB-ID:24450	*EXPLOIT*
    	EDB-ID:15215	7.8	https://vulners.com/exploitdb/EDB-ID:15215	*EXPLOIT*
    	CVE-2020-15778	7.8	https://vulners.com/cve/CVE-2020-15778
    	CVE-2016-6515	7.8	https://vulners.com/cve/CVE-2016-6515
    	CVE-2016-10012	7.8	https://vulners.com/cve/CVE-2016-10012
    	CVE-2015-8325	7.8	https://vulners.com/cve/CVE-2015-8325
    	C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3	7.8	https://vulners.com/githubexploit/C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3	*EXPLOIT*
    	C892A90E-C1D1-5A54-BFAA-046266448553	7.8	https://vulners.com/githubexploit/C892A90E-C1D1-5A54-BFAA-046266448553	*EXPLOIT*
    	99C4CA40-30C8-5A34-B3A3-4B5E7A9E16BA	7.8	https://vulners.com/githubexploit/99C4CA40-30C8-5A34-B3A3-4B5E7A9E16BA	*EXPLOIT*
    	991D2CC4-0E09-5745-97A2-4917461BD6EC	7.8	https://vulners.com/githubexploit/991D2CC4-0E09-5745-97A2-4917461BD6EC	*EXPLOIT*
    	4F1BA9CA-CAB4-55F4-A857-3E4C94C93483	7.8	https://vulners.com/githubexploit/4F1BA9CA-CAB4-55F4-A857-3E4C94C93483	*EXPLOIT*
    	312165E3-7FD9-5769-BDA3-4129BE9114D6	7.8	https://vulners.com/githubexploit/312165E3-7FD9-5769-BDA3-4129BE9114D6	*EXPLOIT*
    	2E719186-2FED-58A8-A150-762EFBAAA523	7.8	https://vulners.com/gitee/2E719186-2FED-58A8-A150-762EFBAAA523	*EXPLOIT*
    	23CC97BE-7C95-513B-9E73-298C48D74432	7.8	https://vulners.com/githubexploit/23CC97BE-7C95-513B-9E73-298C48D74432	*EXPLOIT*
    	1337DAY-ID-26494	7.8	https://vulners.com/zdt/1337DAY-ID-26494	*EXPLOIT*
    	10213DBE-F683-58BB-B6D3-353173626207	7.8	https://vulners.com/githubexploit/10213DBE-F683-58BB-B6D3-353173626207	*EXPLOIT*
    	SSV:92579	7.5	https://vulners.com/seebug/SSV:92579	*EXPLOIT*
    	SSV:61450	7.5	https://vulners.com/seebug/SSV:61450	*EXPLOIT*
    	CVE-2016-10708	7.5	https://vulners.com/cve/CVE-2016-10708
    	CVE-2016-10009	7.5	https://vulners.com/cve/CVE-2016-10009
    	CVE-2014-1692	7.5	https://vulners.com/cve/CVE-2014-1692
    	CVE-2010-4478	7.5	https://vulners.com/cve/CVE-2010-4478
    	CF52FA19-B5DB-5D14-B50F-2411851976E2	7.5	https://vulners.com/githubexploit/CF52FA19-B5DB-5D14-B50F-2411851976E2	*EXPLOIT*
    	1337DAY-ID-26576	7.5	https://vulners.com/zdt/1337DAY-ID-26576	*EXPLOIT*
    	SSV:92582	7.2	https://vulners.com/seebug/SSV:92582	*EXPLOIT*
    	CVE-2016-10010	7.0	https://vulners.com/cve/CVE-2016-10010
    	SSV:92580	6.9	https://vulners.com/seebug/SSV:92580	*EXPLOIT*
    	CVE-2015-6564	6.9	https://vulners.com/cve/CVE-2015-6564
    	1337DAY-ID-26577	6.9	https://vulners.com/zdt/1337DAY-ID-26577	*EXPLOIT*
    	EDB-ID:46516	6.8	https://vulners.com/exploitdb/EDB-ID:46516	*EXPLOIT*
    	EDB-ID:46193	6.8	https://vulners.com/exploitdb/EDB-ID:46193	*EXPLOIT*
    	CVE-2019-6110	6.8	https://vulners.com/cve/CVE-2019-6110
    	CVE-2019-6109	6.8	https://vulners.com/cve/CVE-2019-6109
    	1337DAY-ID-32328	6.8	https://vulners.com/zdt/1337DAY-ID-32328	*EXPLOIT*
    	1337DAY-ID-32009	6.8	https://vulners.com/zdt/1337DAY-ID-32009	*EXPLOIT*
    	D104D2BF-ED22-588B-A9B2-3CCC562FE8C0	6.5	https://vulners.com/githubexploit/D104D2BF-ED22-588B-A9B2-3CCC562FE8C0	*EXPLOIT*
    	CVE-2023-51385	6.5	https://vulners.com/cve/CVE-2023-51385
    	CVE-2008-1657	6.5	https://vulners.com/cve/CVE-2008-1657
    	C07ADB46-24B8-57B7-B375-9C761F4750A2	6.5	https://vulners.com/githubexploit/C07ADB46-24B8-57B7-B375-9C761F4750A2	*EXPLOIT*
    	A88CDD3E-67CC-51CC-97FB-AB0CACB6B08C	6.5	https://vulners.com/githubexploit/A88CDD3E-67CC-51CC-97FB-AB0CACB6B08C	*EXPLOIT*
    	65B15AA1-2A8D-53C1-9499-69EBA3619F1C	6.5	https://vulners.com/githubexploit/65B15AA1-2A8D-53C1-9499-69EBA3619F1C	*EXPLOIT*
    	5325A9D6-132B-590C-BDEF-0CB105252732	6.5	https://vulners.com/gitee/5325A9D6-132B-590C-BDEF-0CB105252732	*EXPLOIT*
    	530326CF-6AB3-5643-AA16-73DC8CB44742	6.5	https://vulners.com/githubexploit/530326CF-6AB3-5643-AA16-73DC8CB44742	*EXPLOIT*
    	EDB-ID:40858	6.4	https://vulners.com/exploitdb/EDB-ID:40858	*EXPLOIT*
    	EDB-ID:40119	6.4	https://vulners.com/exploitdb/EDB-ID:40119	*EXPLOIT*
    	EDB-ID:39569	6.4	https://vulners.com/exploitdb/EDB-ID:39569	*EXPLOIT*
    	CVE-2016-3115	6.4	https://vulners.com/cve/CVE-2016-3115
    	PACKETSTORM:181223	5.9	https://vulners.com/packetstorm/PACKETSTORM:181223	*EXPLOIT*
    	MSF:AUXILIARY-SCANNER-SSH-SSH_ENUMUSERS-	5.9	https://vulners.com/metasploit/MSF:AUXILIARY-SCANNER-SSH-SSH_ENUMUSERS-	*EXPLOIT*
    	FD2E0EBA-ED84-5304-8862-84BCDEB2F288	5.9	https://vulners.com/githubexploit/FD2E0EBA-ED84-5304-8862-84BCDEB2F288	*EXPLOIT*
    	EDB-ID:45939	5.9	https://vulners.com/exploitdb/EDB-ID:45939	*EXPLOIT*
    	EDB-ID:45233	5.9	https://vulners.com/exploitdb/EDB-ID:45233	*EXPLOIT*
    	EDB-ID:40136	5.9	https://vulners.com/exploitdb/EDB-ID:40136	*EXPLOIT*
    	EDB-ID:40113	5.9	https://vulners.com/exploitdb/EDB-ID:40113	*EXPLOIT*
    	CVE-2023-48795	5.9	https://vulners.com/cve/CVE-2023-48795
    	CVE-2019-6111	5.9	https://vulners.com/cve/CVE-2019-6111
    	CVE-2018-15473	5.9	https://vulners.com/cve/CVE-2018-15473
    	CVE-2016-6210	5.9	https://vulners.com/cve/CVE-2016-6210
    	A02ABE85-E4E3-5852-A59D-DF288CB8160A	5.9	https://vulners.com/githubexploit/A02ABE85-E4E3-5852-A59D-DF288CB8160A	*EXPLOIT*
    	721F040C-37BC-59E1-9433-01A2EAC2E755	5.9	https://vulners.com/githubexploit/721F040C-37BC-59E1-9433-01A2EAC2E755	*EXPLOIT*
    	SSV:61911	5.8	https://vulners.com/seebug/SSV:61911	*EXPLOIT*
    	EXPLOITPACK:98FE96309F9524B8C84C508837551A19	5.8	https://vulners.com/exploitpack/EXPLOITPACK:98FE96309F9524B8C84C508837551A19	*EXPLOIT*
    	EXPLOITPACK:5330EA02EBDE345BFC9D6DDDD97F9E97	5.8	https://vulners.com/exploitpack/EXPLOITPACK:5330EA02EBDE345BFC9D6DDDD97F9E97	*EXPLOIT*
    	CVE-2014-2653	5.8	https://vulners.com/cve/CVE-2014-2653
    	CVE-2014-2532	5.8	https://vulners.com/cve/CVE-2014-2532
    	SSV:91041	5.5	https://vulners.com/seebug/SSV:91041	*EXPLOIT*
    	PACKETSTORM:140019	5.5	https://vulners.com/packetstorm/PACKETSTORM:140019	*EXPLOIT*
    	PACKETSTORM:136251	5.5	https://vulners.com/packetstorm/PACKETSTORM:136251	*EXPLOIT*
    	PACKETSTORM:136234	5.5	https://vulners.com/packetstorm/PACKETSTORM:136234	*EXPLOIT*
    	EXPLOITPACK:F92411A645D85F05BDBD274FD222226F	5.5	https://vulners.com/exploitpack/EXPLOITPACK:F92411A645D85F05BDBD274FD222226F	*EXPLOIT*
    	EXPLOITPACK:9F2E746846C3C623A27A441281EAD138	5.5	https://vulners.com/exploitpack/EXPLOITPACK:9F2E746846C3C623A27A441281EAD138	*EXPLOIT*
    	EXPLOITPACK:1902C998CBF9154396911926B4C3B330	5.5	https://vulners.com/exploitpack/EXPLOITPACK:1902C998CBF9154396911926B4C3B330	*EXPLOIT*
    	CVE-2016-10011	5.5	https://vulners.com/cve/CVE-2016-10011
    	1337DAY-ID-25388	5.5	https://vulners.com/zdt/1337DAY-ID-25388	*EXPLOIT*
    	FD18B68B-C0A6-562E-A8C8-781B225F15B0	5.3	https://vulners.com/githubexploit/FD18B68B-C0A6-562E-A8C8-781B225F15B0	*EXPLOIT*
    	E9EC0911-E2E1-52A7-B2F4-D0065C6A3057	5.3	https://vulners.com/githubexploit/E9EC0911-E2E1-52A7-B2F4-D0065C6A3057	*EXPLOIT*
    	CVE-2018-20685	5.3	https://vulners.com/cve/CVE-2018-20685
    	CVE-2017-15906	5.3	https://vulners.com/cve/CVE-2017-15906
    	CVE-2016-20012	5.3	https://vulners.com/cve/CVE-2016-20012
    	CNVD-2018-20962	5.3	https://vulners.com/cnvd/CNVD-2018-20962
    	CNVD-2018-20960	5.3	https://vulners.com/cnvd/CNVD-2018-20960
    	A9E6F50E-E7FC-51D0-9C93-A43461469FA2	5.3	https://vulners.com/githubexploit/A9E6F50E-E7FC-51D0-9C93-A43461469FA2	*EXPLOIT*
    	A801235B-9835-5BA8-B8FE-23B7FFCABD66	5.3	https://vulners.com/githubexploit/A801235B-9835-5BA8-B8FE-23B7FFCABD66	*EXPLOIT*
    	8DD1D813-FD5A-5B26-867A-CE7CAC9FEEDF	5.3	https://vulners.com/gitee/8DD1D813-FD5A-5B26-867A-CE7CAC9FEEDF	*EXPLOIT*
    	4F2FBB06-E601-5EAD-9679-3395D24057DD	5.3	https://vulners.com/githubexploit/4F2FBB06-E601-5EAD-9679-3395D24057DD	*EXPLOIT*
    	486BB6BC-9C26-597F-B865-D0E904FDA984	5.3	https://vulners.com/githubexploit/486BB6BC-9C26-597F-B865-D0E904FDA984	*EXPLOIT*
    	2385176A-820F-5469-AB09-C340264F2B2F	5.3	https://vulners.com/gitee/2385176A-820F-5469-AB09-C340264F2B2F	*EXPLOIT*
    	1337DAY-ID-31730	5.3	https://vulners.com/zdt/1337DAY-ID-31730	*EXPLOIT*
    	SSV:60656	5.0	https://vulners.com/seebug/SSV:60656	*EXPLOIT*
    	SSH_ENUM	5.0	https://vulners.com/canvas/SSH_ENUM	*EXPLOIT*
    	PACKETSTORM:150621	5.0	https://vulners.com/packetstorm/PACKETSTORM:150621	*EXPLOIT*
    	EXPLOITPACK:F957D7E8A0CC1E23C3C649B764E13FB0	5.0	https://vulners.com/exploitpack/EXPLOITPACK:F957D7E8A0CC1E23C3C649B764E13FB0	*EXPLOIT*
    	EXPLOITPACK:EBDBC5685E3276D648B4D14B75563283	5.0	https://vulners.com/exploitpack/EXPLOITPACK:EBDBC5685E3276D648B4D14B75563283	*EXPLOIT*
    	CVE-2010-5107	5.0	https://vulners.com/cve/CVE-2010-5107
    	EXPLOITPACK:802AF3229492E147A5F09C7F2B27C6DF	4.3	https://vulners.com/exploitpack/EXPLOITPACK:802AF3229492E147A5F09C7F2B27C6DF	*EXPLOIT*
    	EXPLOITPACK:5652DDAA7FE452E19AC0DC1CD97BA3EF	4.3	https://vulners.com/exploitpack/EXPLOITPACK:5652DDAA7FE452E19AC0DC1CD97BA3EF	*EXPLOIT*
    	CVE-2015-5352	4.3	https://vulners.com/cve/CVE-2015-5352
    	1337DAY-ID-25440	4.3	https://vulners.com/zdt/1337DAY-ID-25440	*EXPLOIT*
    	1337DAY-ID-25438	4.3	https://vulners.com/zdt/1337DAY-ID-25438	*EXPLOIT*
    	CVE-2010-4755	4.0	https://vulners.com/cve/CVE-2010-4755
    	CVE-2021-36368	3.7	https://vulners.com/cve/CVE-2021-36368
    	CVE-2025-61985	3.6	https://vulners.com/cve/CVE-2025-61985
    	CVE-2025-61984	3.6	https://vulners.com/cve/CVE-2025-61984
    	B7EACB4F-A5CF-5C5A-809F-E03CCE2AB150	3.6	https://vulners.com/githubexploit/B7EACB4F-A5CF-5C5A-809F-E03CCE2AB150	*EXPLOIT*
    	4C6E2182-0E99-5626-83F6-1646DD648C57	3.6	https://vulners.com/githubexploit/4C6E2182-0E99-5626-83F6-1646DD648C57	*EXPLOIT*
    	CVE-2012-0814	3.5	https://vulners.com/cve/CVE-2012-0814
    	CVE-2011-5000	3.5	https://vulners.com/cve/CVE-2011-5000
    	SSV:92581	2.1	https://vulners.com/seebug/SSV:92581	*EXPLOIT*
    	CVE-2011-4327	2.1	https://vulners.com/cve/CVE-2011-4327
    	CVE-2015-6563	1.9	https://vulners.com/cve/CVE-2015-6563
    	CVE-2008-3259	1.2	https://vulners.com/cve/CVE-2008-3259
    	PACKETSTORM:151227	0.0	https://vulners.com/packetstorm/PACKETSTORM:151227	*EXPLOIT*
    	PACKETSTORM:140261	0.0	https://vulners.com/packetstorm/PACKETSTORM:140261	*EXPLOIT*
    	PACKETSTORM:138006	0.0	https://vulners.com/packetstorm/PACKETSTORM:138006	*EXPLOIT*
    	PACKETSTORM:137942	0.0	https://vulners.com/packetstorm/PACKETSTORM:137942	*EXPLOIT*
    	1337DAY-ID-30937	0.0	https://vulners.com/zdt/1337DAY-ID-30937	*EXPLOIT*
    	1337DAY-ID-26468	0.0	https://vulners.com/zdt/1337DAY-ID-26468	*EXPLOIT*
    	1337DAY-ID-25391	0.0	https://vulners.com/zdt/1337DAY-ID-25391	*EXPLOIT*
    	1337DAY-ID-20301	0.0	https://vulners.com/zdt/1337DAY-ID-20301	*EXPLOIT*
    	1337DAY-ID-14373	0.0	https://vulners.com/zdt/1337DAY-ID-14373	*EXPLOIT* 
23 tcp open telnet  syn-ack Linux telnetd     
25 tcp open smtp  syn-ack Postfix smtpd     
ssl-dh-params 
  VULNERABLE:
  Anonymous Diffie-Hellman Key Exchange MitM Vulnerability
    State: VULNERABLE
      Transport Layer Security (TLS) services that use anonymous
      Diffie-Hellman key exchange only provide protection against passive
      eavesdropping, and are vulnerable to active man-in-the-middle attacks
      which could completely compromise the confidentiality and integrity
      of any data exchanged over the resulting session.
    Check results:
      ANONYMOUS DH GROUP 1
            Cipher Suite: TLS_DH_anon_WITH_AES_128_CBC_SHA
            Modulus Type: Safe prime
            Modulus Source: postfix builtin
            Modulus Length: 1024
            Generator Length: 8
            Public Key Length: 1024
    References:
      https://www.ietf.org/rfc/rfc2246.txt
  
  Transport Layer Security (TLS) Protocol DHE_EXPORT Ciphers Downgrade MitM (Logjam)
    State: VULNERABLE
    IDs:  BID:74733  CVE:CVE-2015-4000
      The Transport Layer Security (TLS) protocol contains a flaw that is
      triggered when handling Diffie-Hellman key exchanges defined with
      the DHE_EXPORT cipher. This may allow a man-in-the-middle attacker
      to downgrade the security of a TLS session to 512-bit export-grade
      cryptography, which is significantly weaker, allowing the attacker
      to more easily break the encryption and monitor or tamper with
      the encrypted stream.
    Disclosure date: 2015-5-19
    Check results:
      EXPORT-GRADE DH GROUP 1
            Cipher Suite: TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
            Modulus Type: Safe prime
            Modulus Source: Unknown/Custom-generated
            Modulus Length: 512
            Generator Length: 8
            Public Key Length: 512
    References:
      https://weakdh.org
      https://www.securityfocus.com/bid/74733
      https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
  
  Diffie-Hellman Key Exchange Insufficient Group Strength
    State: VULNERABLE
      Transport Layer Security (TLS) services that use Diffie-Hellman groups
      of insufficient strength, especially those using one of a few commonly
      shared groups, may be susceptible to passive eavesdropping attacks.
    Check results:
      WEAK DH GROUP 1
            Cipher Suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA
            Modulus Type: Safe prime
            Modulus Source: postfix builtin
            Modulus Length: 1024
            Generator Length: 8
            Public Key Length: 1024
    References:
      https://weakdh.org
 
smtp-vuln-cve2010-4344 
  The SMTP server is not Exim: NOT VULNERABLE
 
sslv2-drown 
ERROR: Script execution failed (use -d to debug) 
ssl-poodle 
  VULNERABLE:
  SSL POODLE information leak
    State: VULNERABLE
    IDs:  BID:70574  CVE:CVE-2014-3566
          The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other
          products, uses nondeterministic CBC padding, which makes it easier
          for man-in-the-middle attackers to obtain cleartext data via a
          padding-oracle attack, aka the "POODLE" issue.
    Disclosure date: 2014-10-14
    Check results:
      TLS_RSA_WITH_AES_128_CBC_SHA
    References:
      https://www.openssl.org/~bodo/ssl-poodle.pdf
      https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
      https://www.imperialviolet.org/2014/10/14/poodle.html
      https://www.securityfocus.com/bid/70574
 
53 tcp open domain  syn-ack ISC BIND  9.4.2   
vulners 
  cpe:/a:isc:bind:9.4.2: 
    	SSV:2853	10.0	https://vulners.com/seebug/SSV:2853	*EXPLOIT*
    	CVE-2008-0122	10.0	https://vulners.com/cve/CVE-2008-0122
    	CVE-2021-25216	9.8	https://vulners.com/cve/CVE-2021-25216
    	CVE-2020-8616	8.6	https://vulners.com/cve/CVE-2020-8616
    	CVE-2016-1286	8.6	https://vulners.com/cve/CVE-2016-1286
    	CNVD-2020-34454	8.6	https://vulners.com/cnvd/CNVD-2020-34454
    	SSV:60184	8.5	https://vulners.com/seebug/SSV:60184	*EXPLOIT*
    	CVE-2012-1667	8.5	https://vulners.com/cve/CVE-2012-1667
    	SSV:60292	7.8	https://vulners.com/seebug/SSV:60292	*EXPLOIT*
    	PACKETSTORM:180552	7.8	https://vulners.com/packetstorm/PACKETSTORM:180552	*EXPLOIT*
    	PACKETSTORM:180551	7.8	https://vulners.com/packetstorm/PACKETSTORM:180551	*EXPLOIT*
    	PACKETSTORM:138960	7.8	https://vulners.com/packetstorm/PACKETSTORM:138960	*EXPLOIT*
    	PACKETSTORM:132926	7.8	https://vulners.com/packetstorm/PACKETSTORM:132926	*EXPLOIT*
    	MSF:AUXILIARY-DOS-DNS-BIND_TKEY-	7.8	https://vulners.com/metasploit/MSF:AUXILIARY-DOS-DNS-BIND_TKEY-	*EXPLOIT*
    	EXPLOITPACK:BE4F638B632EA0754155A27ECC4B3D3F	7.8	https://vulners.com/exploitpack/EXPLOITPACK:BE4F638B632EA0754155A27ECC4B3D3F	*EXPLOIT*
    	EXPLOITPACK:46DEBFAC850194C04C54F93E0DFF5F4F	7.8	https://vulners.com/exploitpack/EXPLOITPACK:46DEBFAC850194C04C54F93E0DFF5F4F	*EXPLOIT*
    	EXPLOITPACK:09762DB0197BBAAAB6FC79F24F0D2A74	7.8	https://vulners.com/exploitpack/EXPLOITPACK:09762DB0197BBAAAB6FC79F24F0D2A74	*EXPLOIT*
    	EDB-ID:42121	7.8	https://vulners.com/exploitdb/EDB-ID:42121	*EXPLOIT*
    	EDB-ID:40453	7.8	https://vulners.com/exploitdb/EDB-ID:40453	*EXPLOIT*
    	EDB-ID:37723	7.8	https://vulners.com/exploitdb/EDB-ID:37723	*EXPLOIT*
    	EDB-ID:37721	7.8	https://vulners.com/exploitdb/EDB-ID:37721	*EXPLOIT*
    	E183E822-9005-5F4E-B024-D9C4761AE308	7.8	https://vulners.com/githubexploit/E183E822-9005-5F4E-B024-D9C4761AE308	*EXPLOIT*
    	CVE-2017-3141	7.8	https://vulners.com/cve/CVE-2017-3141
    	CVE-2016-2776	7.8	https://vulners.com/cve/CVE-2016-2776
    	CVE-2015-5722	7.8	https://vulners.com/cve/CVE-2015-5722
    	CVE-2015-5477	7.8	https://vulners.com/cve/CVE-2015-5477
    	CVE-2014-8500	7.8	https://vulners.com/cve/CVE-2014-8500
    	CVE-2012-5166	7.8	https://vulners.com/cve/CVE-2012-5166
    	CVE-2012-4244	7.8	https://vulners.com/cve/CVE-2012-4244
    	CVE-2012-3817	7.8	https://vulners.com/cve/CVE-2012-3817
    	CVE-2008-4163	7.8	https://vulners.com/cve/CVE-2008-4163
    	7459D6A0-D6CA-5CD2-A484-5DD984C0E5E4	7.8	https://vulners.com/githubexploit/7459D6A0-D6CA-5CD2-A484-5DD984C0E5E4	*EXPLOIT*
    	673990FE-C5D5-5501-A342-D1AEC9F2A871	7.8	https://vulners.com/githubexploit/673990FE-C5D5-5501-A342-D1AEC9F2A871	*EXPLOIT*
    	1337DAY-ID-25325	7.8	https://vulners.com/zdt/1337DAY-ID-25325	*EXPLOIT*
    	1337DAY-ID-23970	7.8	https://vulners.com/zdt/1337DAY-ID-23970	*EXPLOIT*
    	1337DAY-ID-23960	7.8	https://vulners.com/zdt/1337DAY-ID-23960	*EXPLOIT*
    	1337DAY-ID-23948	7.8	https://vulners.com/zdt/1337DAY-ID-23948	*EXPLOIT*
    	CVE-2010-0382	7.6	https://vulners.com/cve/CVE-2010-0382
    	PACKETSTORM:180550	7.5	https://vulners.com/packetstorm/PACKETSTORM:180550	*EXPLOIT*
    	MSF:AUXILIARY-DOS-DNS-BIND_TSIG_BADTIME-	7.5	https://vulners.com/metasploit/MSF:AUXILIARY-DOS-DNS-BIND_TSIG_BADTIME-	*EXPLOIT*
    	MSF:AUXILIARY-DOS-DNS-BIND_TSIG-	7.5	https://vulners.com/metasploit/MSF:AUXILIARY-DOS-DNS-BIND_TSIG-	*EXPLOIT*
    	FBC03933-7A65-52F3-83F4-4B2253A490B6	7.5	https://vulners.com/githubexploit/FBC03933-7A65-52F3-83F4-4B2253A490B6	*EXPLOIT*
    	CVE-2023-50868	7.5	https://vulners.com/cve/CVE-2023-50868
    	CVE-2023-50387	7.5	https://vulners.com/cve/CVE-2023-50387
    	CVE-2023-4408	7.5	https://vulners.com/cve/CVE-2023-4408
    	CVE-2023-3341	7.5	https://vulners.com/cve/CVE-2023-3341
    	CVE-2021-25215	7.5	https://vulners.com/cve/CVE-2021-25215
    	CVE-2020-8617	7.5	https://vulners.com/cve/CVE-2020-8617
    	CVE-2017-3145	7.5	https://vulners.com/cve/CVE-2017-3145
    	CVE-2017-3143	7.5	https://vulners.com/cve/CVE-2017-3143
    	CVE-2016-9444	7.5	https://vulners.com/cve/CVE-2016-9444
    	CVE-2016-9131	7.5	https://vulners.com/cve/CVE-2016-9131
    	CVE-2016-8864	7.5	https://vulners.com/cve/CVE-2016-8864
    	CVE-2016-2848	7.5	https://vulners.com/cve/CVE-2016-2848
    	CVE-2009-0265	7.5	https://vulners.com/cve/CVE-2009-0265
    	CNVD-2017-12537	7.5	https://vulners.com/cnvd/CNVD-2017-12537
    	9ED8A03D-FE34-5F77-8C66-C03C9615AF07	7.5	https://vulners.com/gitee/9ED8A03D-FE34-5F77-8C66-C03C9615AF07	*EXPLOIT*
    	1337DAY-ID-34485	7.5	https://vulners.com/zdt/1337DAY-ID-34485	*EXPLOIT*
    	EXPLOITPACK:D6DDF5E24DE171DAAD71FD95FC1B67F2	7.2	https://vulners.com/exploitpack/EXPLOITPACK:D6DDF5E24DE171DAAD71FD95FC1B67F2	*EXPLOIT*
    	CVE-2015-8461	7.1	https://vulners.com/cve/CVE-2015-8461
    	CVE-2015-5986	7.1	https://vulners.com/cve/CVE-2015-5986
    	CVE-2015-8705	7.0	https://vulners.com/cve/CVE-2015-8705
    	CVE-2016-1285	6.8	https://vulners.com/cve/CVE-2016-1285
    	CVE-2015-8704	6.8	https://vulners.com/cve/CVE-2015-8704
    	CVE-2009-0025	6.8	https://vulners.com/cve/CVE-2009-0025
    	CVE-2020-8622	6.5	https://vulners.com/cve/CVE-2020-8622
    	CVE-2018-5741	6.5	https://vulners.com/cve/CVE-2018-5741
    	CVE-2016-6170	6.5	https://vulners.com/cve/CVE-2016-6170
    	CVE-2010-3614	6.4	https://vulners.com/cve/CVE-2010-3614
    	CVE-2016-2775	5.9	https://vulners.com/cve/CVE-2016-2775
    	SSV:4636	5.8	https://vulners.com/seebug/SSV:4636	*EXPLOIT*
    	CVE-2022-2795	5.3	https://vulners.com/cve/CVE-2022-2795
    	CVE-2021-25219	5.3	https://vulners.com/cve/CVE-2021-25219
    	CVE-2017-3142	5.3	https://vulners.com/cve/CVE-2017-3142
    	CNVD-2024-16843	5.3	https://vulners.com/cnvd/CNVD-2024-16843
    	SSV:30099	5.0	https://vulners.com/seebug/SSV:30099	*EXPLOIT*
    	SSV:20595	5.0	https://vulners.com/seebug/SSV:20595	*EXPLOIT*
    	PACKETSTORM:157836	5.0	https://vulners.com/packetstorm/PACKETSTORM:157836	*EXPLOIT*
    	CVE-2015-8000	5.0	https://vulners.com/cve/CVE-2015-8000
    	CVE-2012-1033	5.0	https://vulners.com/cve/CVE-2012-1033
    	CVE-2011-4313	5.0	https://vulners.com/cve/CVE-2011-4313
    	CVE-2011-1910	5.0	https://vulners.com/cve/CVE-2011-1910
    	SSV:11919	4.3	https://vulners.com/seebug/SSV:11919	*EXPLOIT*
    	CVE-2010-3762	4.3	https://vulners.com/cve/CVE-2010-3762
    	CVE-2010-0097	4.3	https://vulners.com/cve/CVE-2010-0097
    	CVE-2009-0696	4.3	https://vulners.com/cve/CVE-2009-0696
    	CVE-2010-0290	4.0	https://vulners.com/cve/CVE-2010-0290
    	SSV:14986	2.6	https://vulners.com/seebug/SSV:14986	*EXPLOIT*
    	CVE-2009-4022	2.6	https://vulners.com/cve/CVE-2009-4022
    	PACKETSTORM:142800	0.0	https://vulners.com/packetstorm/PACKETSTORM:142800	*EXPLOIT*
    	1337DAY-ID-27896	0.0	https://vulners.com/zdt/1337DAY-ID-27896	*EXPLOIT* 
80 tcp open http  syn-ack Apache httpd  2.2.8  (Ubuntu) DAV/2 
http-vuln-cve2017-1001000 
ERROR: Script execution failed (use -d to debug) 
http-server-header 
Apache/2.2.8 (Ubuntu) DAV/2 
http-slowloris-check 
  VULNERABLE:
  Slowloris DOS attack
    State: LIKELY VULNERABLE
    IDs:  CVE:CVE-2007-6750
      Slowloris tries to keep many connections to the target web server open and hold
      them open as long as possible.  It accomplishes this by opening connections to
      the target web server and sending a partial request. By doing so, it starves
      the http server's resources causing Denial Of Service.
      
    Disclosure date: 2009-09-17
    References:
      https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6750
      http://ha.ckers.org/slowloris/
 
vulners 
  cpe:/a:apache:http_server:2.2.8: 
    	SSV:69341	10.0	https://vulners.com/seebug/SSV:69341	*EXPLOIT*
    	SSV:19282	10.0	https://vulners.com/seebug/SSV:19282	*EXPLOIT*
    	SSV:19236	10.0	https://vulners.com/seebug/SSV:19236	*EXPLOIT*
    	SSV:11999	10.0	https://vulners.com/seebug/SSV:11999	*EXPLOIT*
    	PACKETSTORM:86964	10.0	https://vulners.com/packetstorm/PACKETSTORM:86964	*EXPLOIT*
    	PACKETSTORM:180533	10.0	https://vulners.com/packetstorm/PACKETSTORM:180533	*EXPLOIT*
    	MSF:AUXILIARY-DOS-HTTP-APACHE_MOD_ISAPI-	10.0	https://vulners.com/metasploit/MSF:AUXILIARY-DOS-HTTP-APACHE_MOD_ISAPI-	*EXPLOIT*
    	HTTPD:E74B6F3660D13C4DD05DF3A83EA61631	10.0	https://vulners.com/httpd/HTTPD:E74B6F3660D13C4DD05DF3A83EA61631
    	HTTPD:81180E4E634CDECC9784146016B4A949	10.0	https://vulners.com/httpd/HTTPD:81180E4E634CDECC9784146016B4A949
    	EXPLOITPACK:30ED468EC8BD5B71B2CB93825A852B80	10.0	https://vulners.com/exploitpack/EXPLOITPACK:30ED468EC8BD5B71B2CB93825A852B80	*EXPLOIT*
    	EDB-ID:14288	10.0	https://vulners.com/exploitdb/EDB-ID:14288	*EXPLOIT*
    	EDB-ID:11650	10.0	https://vulners.com/exploitdb/EDB-ID:11650	*EXPLOIT*
    	CVE-2010-0425	10.0	https://vulners.com/cve/CVE-2010-0425
    	3E6BA608-776F-5B1F-9BA5-589CD2A5A351	10.0	https://vulners.com/gitee/3E6BA608-776F-5B1F-9BA5-589CD2A5A351	*EXPLOIT*
    	PACKETSTORM:171631	9.8	https://vulners.com/packetstorm/PACKETSTORM:171631	*EXPLOIT*
    	HTTPD:E69E9574251973D5AF93FA9D04997FC1	9.8	https://vulners.com/httpd/HTTPD:E69E9574251973D5AF93FA9D04997FC1
    	HTTPD:E162D3AE025639FEE2A89D5AF40ABF2F	9.8	https://vulners.com/httpd/HTTPD:E162D3AE025639FEE2A89D5AF40ABF2F
    	HTTPD:C072933AA965A86DA3E2C9172FFC1569	9.8	https://vulners.com/httpd/HTTPD:C072933AA965A86DA3E2C9172FFC1569
    	HTTPD:A1BBCE110E077FFBF4469D4F06DB9293	9.8	https://vulners.com/httpd/HTTPD:A1BBCE110E077FFBF4469D4F06DB9293
    	HTTPD:A09F9CEBE0B7C39EDA0480FEAEF4FE9D	9.8	https://vulners.com/httpd/HTTPD:A09F9CEBE0B7C39EDA0480FEAEF4FE9D
    	HTTPD:9F5406E0F4A0B007A0A4C9C92EF9813B	9.8	https://vulners.com/httpd/HTTPD:9F5406E0F4A0B007A0A4C9C92EF9813B
    	HTTPD:9BCBE3C14201AFC4B0F36F15CB40C0F8	9.8	https://vulners.com/httpd/HTTPD:9BCBE3C14201AFC4B0F36F15CB40C0F8
    	HTTPD:2BE0032A6ABE7CC52906DBAAFE0E448E	9.8	https://vulners.com/httpd/HTTPD:2BE0032A6ABE7CC52906DBAAFE0E448E
    	EDB-ID:51193	9.8	https://vulners.com/exploitdb/EDB-ID:51193	*EXPLOIT*
    	ECC3E825-EE29-59D3-BE28-1B30DB15940E	9.8	https://vulners.com/githubexploit/ECC3E825-EE29-59D3-BE28-1B30DB15940E	*EXPLOIT*
    	D5084D51-C8DF-5CBA-BC26-ACF2E33F8E52	9.8	https://vulners.com/githubexploit/D5084D51-C8DF-5CBA-BC26-ACF2E33F8E52	*EXPLOIT*
    	CVE-2024-38476	9.8	https://vulners.com/cve/CVE-2024-38476
    	CVE-2022-31813	9.8	https://vulners.com/cve/CVE-2022-31813
    	CVE-2022-22720	9.8	https://vulners.com/cve/CVE-2022-22720
    	CVE-2021-44790	9.8	https://vulners.com/cve/CVE-2021-44790
    	CVE-2021-39275	9.8	https://vulners.com/cve/CVE-2021-39275
    	CVE-2018-1312	9.8	https://vulners.com/cve/CVE-2018-1312
    	CVE-2017-7679	9.8	https://vulners.com/cve/CVE-2017-7679
    	CVE-2017-3169	9.8	https://vulners.com/cve/CVE-2017-3169
    	CVE-2017-3167	9.8	https://vulners.com/cve/CVE-2017-3167
    	CNVD-2022-51061	9.8	https://vulners.com/cnvd/CNVD-2022-51061
    	CNVD-2022-03225	9.8	https://vulners.com/cnvd/CNVD-2022-03225
    	CNVD-2021-102386	9.8	https://vulners.com/cnvd/CNVD-2021-102386
    	B6297446-2DDD-52BA-B508-29A748A5D2CC	9.8	https://vulners.com/githubexploit/B6297446-2DDD-52BA-B508-29A748A5D2CC	*EXPLOIT*
    	1337DAY-ID-38427	9.8	https://vulners.com/zdt/1337DAY-ID-38427	*EXPLOIT*
    	0DB60346-03B6-5FEE-93D7-FF5757D225AA	9.8	https://vulners.com/gitee/0DB60346-03B6-5FEE-93D7-FF5757D225AA	*EXPLOIT*
    	HTTPD:509B04B8CC51879DD0A561AC4FDBE0A6	9.1	https://vulners.com/httpd/HTTPD:509B04B8CC51879DD0A561AC4FDBE0A6
    	HTTPD:459EB8D98503A2460C9445C5B224979E	9.1	https://vulners.com/httpd/HTTPD:459EB8D98503A2460C9445C5B224979E
    	HTTPD:2C227652EE0B3B961706AAFCACA3D1E1	9.1	https://vulners.com/httpd/HTTPD:2C227652EE0B3B961706AAFCACA3D1E1
    	FD2EE3A5-BAEA-5845-BA35-E6889992214F	9.1	https://vulners.com/githubexploit/FD2EE3A5-BAEA-5845-BA35-E6889992214F	*EXPLOIT*
    	FBC8A8BE-F00A-5B6D-832E-F99A72E7A3F7	9.1	https://vulners.com/githubexploit/FBC8A8BE-F00A-5B6D-832E-F99A72E7A3F7	*EXPLOIT*
    	E606D7F4-5FA2-5907-B30E-367D6FFECD89	9.1	https://vulners.com/githubexploit/E606D7F4-5FA2-5907-B30E-367D6FFECD89	*EXPLOIT*
    	D8A19443-2A37-5592-8955-F614504AAF45	9.1	https://vulners.com/githubexploit/D8A19443-2A37-5592-8955-F614504AAF45	*EXPLOIT*
    	CVE-2024-40898	9.1	https://vulners.com/cve/CVE-2024-40898
    	CVE-2022-28615	9.1	https://vulners.com/cve/CVE-2022-28615
    	CVE-2022-22721	9.1	https://vulners.com/cve/CVE-2022-22721
    	CVE-2017-9788	9.1	https://vulners.com/cve/CVE-2017-9788
    	CNVD-2022-51060	9.1	https://vulners.com/cnvd/CNVD-2022-51060
    	CNVD-2022-41638	9.1	https://vulners.com/cnvd/CNVD-2022-41638
    	B5E74010-A082-5ECE-AB37-623A5B33FE7D	9.1	https://vulners.com/githubexploit/B5E74010-A082-5ECE-AB37-623A5B33FE7D	*EXPLOIT*
    	HTTPD:1B3D546A8500818AAC5B1359FE11A7E4	9.0	https://vulners.com/httpd/HTTPD:1B3D546A8500818AAC5B1359FE11A7E4
    	FDF3DFA1-ED74-5EE2-BF5C-BA752CA34AE8	9.0	https://vulners.com/githubexploit/FDF3DFA1-ED74-5EE2-BF5C-BA752CA34AE8	*EXPLOIT*
    	CVE-2021-40438	9.0	https://vulners.com/cve/CVE-2021-40438
    	CNVD-2022-03224	9.0	https://vulners.com/cnvd/CNVD-2022-03224
    	AE3EF1CC-A0C3-5CB7-A6EF-4DAAAFA59C8C	9.0	https://vulners.com/githubexploit/AE3EF1CC-A0C3-5CB7-A6EF-4DAAAFA59C8C	*EXPLOIT*
    	9D9B3F4D-6B5C-5377-BE39-F1C432C9E457	9.0	https://vulners.com/githubexploit/9D9B3F4D-6B5C-5377-BE39-F1C432C9E457	*EXPLOIT*
    	8AFB43C5-ABD4-52AD-BB19-24D7884FF2A2	9.0	https://vulners.com/githubexploit/8AFB43C5-ABD4-52AD-BB19-24D7884FF2A2	*EXPLOIT*
    	7F48C6CF-47B2-5AF9-B6FD-1735FB2A95B2	9.0	https://vulners.com/githubexploit/7F48C6CF-47B2-5AF9-B6FD-1735FB2A95B2	*EXPLOIT*
    	36618CA8-9316-59CA-B748-82F15F407C4F	9.0	https://vulners.com/githubexploit/36618CA8-9316-59CA-B748-82F15F407C4F	*EXPLOIT*
    	CVE-2025-58098	8.3	https://vulners.com/cve/CVE-2025-58098
    	CNVD-2021-102387	8.2	https://vulners.com/cnvd/CNVD-2021-102387
    	B0A9E5E8-7CCC-5984-9922-A89F11D6BF38	8.2	https://vulners.com/githubexploit/B0A9E5E8-7CCC-5984-9922-A89F11D6BF38	*EXPLOIT*
    	HTTPD:30E0EE442FF4843665FED4FBCA25406A	8.1	https://vulners.com/httpd/HTTPD:30E0EE442FF4843665FED4FBCA25406A
    	CVE-2016-5387	8.1	https://vulners.com/cve/CVE-2016-5387
    	CNVD-2016-04948	8.1	https://vulners.com/cnvd/CNVD-2016-04948
    	SSV:72403	7.8	https://vulners.com/seebug/SSV:72403	*EXPLOIT*
    	SSV:2820	7.8	https://vulners.com/seebug/SSV:2820	*EXPLOIT*
    	SSV:26043	7.8	https://vulners.com/seebug/SSV:26043	*EXPLOIT*
    	SSV:20899	7.8	https://vulners.com/seebug/SSV:20899	*EXPLOIT*
    	SSV:11569	7.8	https://vulners.com/seebug/SSV:11569	*EXPLOIT*
    	PACKETSTORM:180517	7.8	https://vulners.com/packetstorm/PACKETSTORM:180517	*EXPLOIT*
    	PACKETSTORM:126851	7.8	https://vulners.com/packetstorm/PACKETSTORM:126851	*EXPLOIT*
    	PACKETSTORM:123527	7.8	https://vulners.com/packetstorm/PACKETSTORM:123527	*EXPLOIT*
    	PACKETSTORM:122962	7.8	https://vulners.com/packetstorm/PACKETSTORM:122962	*EXPLOIT*
    	MSF:AUXILIARY-DOS-HTTP-APACHE_RANGE_DOS-	7.8	https://vulners.com/metasploit/MSF:AUXILIARY-DOS-HTTP-APACHE_RANGE_DOS-	*EXPLOIT*
    	HTTPD:556E7FA885F1BEDB6E3D9AAB5665198F	7.8	https://vulners.com/httpd/HTTPD:556E7FA885F1BEDB6E3D9AAB5665198F
    	EXPLOITPACK:186B5FCF5C57B52642E62C06BABC6F83	7.8	https://vulners.com/exploitpack/EXPLOITPACK:186B5FCF5C57B52642E62C06BABC6F83	*EXPLOIT*
    	EDB-ID:18221	7.8	https://vulners.com/exploitdb/EDB-ID:18221	*EXPLOIT*
    	CVE-2011-3192	7.8	https://vulners.com/cve/CVE-2011-3192
    	C76F17FD-A21F-5E67-97D8-51A53B9594C1	7.8	https://vulners.com/githubexploit/C76F17FD-A21F-5E67-97D8-51A53B9594C1	*EXPLOIT*
    	952369B3-F757-55D6-B0C6-9F72C04294A3	7.8	https://vulners.com/githubexploit/952369B3-F757-55D6-B0C6-9F72C04294A3	*EXPLOIT*
    	4F94F3CE-6A41-5E04-A51B-4D22ED6CF210	7.8	https://vulners.com/githubexploit/4F94F3CE-6A41-5E04-A51B-4D22ED6CF210	*EXPLOIT*
    	1337DAY-ID-21170	7.8	https://vulners.com/zdt/1337DAY-ID-21170	*EXPLOIT*
    	SSV:12673	7.5	https://vulners.com/seebug/SSV:12673	*EXPLOIT*
    	SSV:12626	7.5	https://vulners.com/seebug/SSV:12626	*EXPLOIT*
    	PACKETSTORM:181038	7.5	https://vulners.com/packetstorm/PACKETSTORM:181038	*EXPLOIT*
    	MSF:AUXILIARY-SCANNER-HTTP-APACHE_OPTIONSBLEED-	7.5	https://vulners.com/metasploit/MSF:AUXILIARY-SCANNER-HTTP-APACHE_OPTIONSBLEED-	*EXPLOIT*
    	HTTPD:F1CFBC9B54DFAD0499179863D36830BB	7.5	https://vulners.com/httpd/HTTPD:F1CFBC9B54DFAD0499179863D36830BB
    	HTTPD:C317C7138B4A8BBD54A901D6DDDCB837	7.5	https://vulners.com/httpd/HTTPD:C317C7138B4A8BBD54A901D6DDDCB837
    	HTTPD:C1F57FDC580B58497A5EC5B7D3749F2F	7.5	https://vulners.com/httpd/HTTPD:C1F57FDC580B58497A5EC5B7D3749F2F
    	HTTPD:C0856723C0FBF5502E1378536B484C09	7.5	https://vulners.com/httpd/HTTPD:C0856723C0FBF5502E1378536B484C09
    	HTTPD:BEF84406F2FB3CB90F1C555BEFF774E2	7.5	https://vulners.com/httpd/HTTPD:BEF84406F2FB3CB90F1C555BEFF774E2
    	HTTPD:B1B0A31C4AD388CC6C575931414173E2	7.5	https://vulners.com/httpd/HTTPD:B1B0A31C4AD388CC6C575931414173E2
    	HTTPD:7DDAAFDB1FD8B2E7FD36ADABA5DB6DAA	7.5	https://vulners.com/httpd/HTTPD:7DDAAFDB1FD8B2E7FD36ADABA5DB6DAA
    	HTTPD:5E6BCDB2F7C53E4EDCE844709D930AF5	7.5	https://vulners.com/httpd/HTTPD:5E6BCDB2F7C53E4EDCE844709D930AF5
    	HTTPD:5227799CC4172DBFA895A4F581F74C11	7.5	https://vulners.com/httpd/HTTPD:5227799CC4172DBFA895A4F581F74C11
    	EDB-ID:42745	7.5	https://vulners.com/exploitdb/EDB-ID:42745	*EXPLOIT*
    	CVE-2023-31122	7.5	https://vulners.com/cve/CVE-2023-31122
    	CVE-2022-30556	7.5	https://vulners.com/cve/CVE-2022-30556
    	CVE-2022-29404	7.5	https://vulners.com/cve/CVE-2022-29404
    	CVE-2022-22719	7.5	https://vulners.com/cve/CVE-2022-22719
    	CVE-2021-34798	7.5	https://vulners.com/cve/CVE-2021-34798
    	CVE-2018-8011	7.5	https://vulners.com/cve/CVE-2018-8011
    	CVE-2018-1303	7.5	https://vulners.com/cve/CVE-2018-1303
    	CVE-2017-9798	7.5	https://vulners.com/cve/CVE-2017-9798
    	CVE-2017-15710	7.5	https://vulners.com/cve/CVE-2017-15710
    	CVE-2016-8743	7.5	https://vulners.com/cve/CVE-2016-8743
    	CVE-2009-2699	7.5	https://vulners.com/cve/CVE-2009-2699
    	CVE-2009-1955	7.5	https://vulners.com/cve/CVE-2009-1955
    	CVE-2006-20001	7.5	https://vulners.com/cve/CVE-2006-20001
    	CNVD-2025-30836	7.5	https://vulners.com/cnvd/CNVD-2025-30836
    	CNVD-2025-16614	7.5	https://vulners.com/cnvd/CNVD-2025-16614
    	CNVD-2024-20839	7.5	https://vulners.com/cnvd/CNVD-2024-20839
    	CNVD-2023-93320	7.5	https://vulners.com/cnvd/CNVD-2023-93320
    	CNVD-2023-80558	7.5	https://vulners.com/cnvd/CNVD-2023-80558
    	CNVD-2022-53584	7.5	https://vulners.com/cnvd/CNVD-2022-53584
    	CNVD-2022-41639	7.5	https://vulners.com/cnvd/CNVD-2022-41639
    	CNVD-2022-03223	7.5	https://vulners.com/cnvd/CNVD-2022-03223
    	CNVD-2019-41283	7.5	https://vulners.com/cnvd/CNVD-2019-41283
    	CNVD-2017-13906	7.5	https://vulners.com/cnvd/CNVD-2017-13906
    	CNVD-2016-13233	7.5	https://vulners.com/cnvd/CNVD-2016-13233
    	CNVD-2016-13232	7.5	https://vulners.com/cnvd/CNVD-2016-13232
    	CD6A79B3-8167-5CFD-9FCB-6986FDF0BE1A	7.5	https://vulners.com/githubexploit/CD6A79B3-8167-5CFD-9FCB-6986FDF0BE1A	*EXPLOIT*
    	A0F268C8-7319-5637-82F7-8DAF72D14629	7.5	https://vulners.com/githubexploit/A0F268C8-7319-5637-82F7-8DAF72D14629	*EXPLOIT*
    	857E0BF8-9A29-54C5-82EA-8D7C0798CAA6	7.5	https://vulners.com/githubexploit/857E0BF8-9A29-54C5-82EA-8D7C0798CAA6	*EXPLOIT*
    	56EC26AF-7FB6-5CF0-B179-6151B1D53BA5	7.5	https://vulners.com/githubexploit/56EC26AF-7FB6-5CF0-B179-6151B1D53BA5	*EXPLOIT*
    	45D138AD-BEC6-552A-91EA-8816914CA7F4	7.5	https://vulners.com/githubexploit/45D138AD-BEC6-552A-91EA-8816914CA7F4	*EXPLOIT*
    	CVE-2025-49812	7.4	https://vulners.com/cve/CVE-2025-49812
    	CVE-2023-38709	7.3	https://vulners.com/cve/CVE-2023-38709
    	CNVD-2024-36395	7.3	https://vulners.com/cnvd/CNVD-2024-36395
    	SSV:11802	7.1	https://vulners.com/seebug/SSV:11802	*EXPLOIT*
    	SSV:11762	7.1	https://vulners.com/seebug/SSV:11762	*EXPLOIT*
    	HTTPD:B44AEE5F83602723E751B3341D72C01D	7.1	https://vulners.com/httpd/HTTPD:B44AEE5F83602723E751B3341D72C01D
    	HTTPD:4D420BA542C9357A7F064936250DAEFF	7.1	https://vulners.com/httpd/HTTPD:4D420BA542C9357A7F064936250DAEFF
    	CVE-2009-1891	7.1	https://vulners.com/cve/CVE-2009-1891
    	CVE-2009-1890	7.1	https://vulners.com/cve/CVE-2009-1890
    	SSV:60427	6.9	https://vulners.com/seebug/SSV:60427	*EXPLOIT*
    	SSV:60386	6.9	https://vulners.com/seebug/SSV:60386	*EXPLOIT*
    	SSV:60069	6.9	https://vulners.com/seebug/SSV:60069	*EXPLOIT*
    	HTTPD:D4C114070B5E7C4AA3E92FF94A57C659	6.9	https://vulners.com/httpd/HTTPD:D4C114070B5E7C4AA3E92FF94A57C659
    	CVE-2012-0883	6.9	https://vulners.com/cve/CVE-2012-0883
    	SSV:12447	6.8	https://vulners.com/seebug/SSV:12447	*EXPLOIT*
    	PACKETSTORM:127546	6.8	https://vulners.com/packetstorm/PACKETSTORM:127546	*EXPLOIT*
    	HTTPD:0A13DEC03E87AF57C14487550B086B51	6.8	https://vulners.com/httpd/HTTPD:0A13DEC03E87AF57C14487550B086B51
    	CVE-2014-0226	6.8	https://vulners.com/cve/CVE-2014-0226
    	1337DAY-ID-22451	6.8	https://vulners.com/zdt/1337DAY-ID-22451	*EXPLOIT*
    	SSV:11568	6.4	https://vulners.com/seebug/SSV:11568	*EXPLOIT*
    	HTTPD:AFA6B3F6376C54842BAFBBF24C7F44C4	6.4	https://vulners.com/httpd/HTTPD:AFA6B3F6376C54842BAFBBF24C7F44C4
    	CVE-2009-1956	6.4	https://vulners.com/cve/CVE-2009-1956
    	HTTPD:3E4CF20C0CAD918E98C98926264946F2	6.1	https://vulners.com/httpd/HTTPD:3E4CF20C0CAD918E98C98926264946F2
    	CVE-2016-4975	6.1	https://vulners.com/cve/CVE-2016-4975
    	CNVD-2018-15542	6.1	https://vulners.com/cnvd/CNVD-2018-15542
    	CVE-2018-1302	5.9	https://vulners.com/cve/CVE-2018-1302
    	CVE-2018-1301	5.9	https://vulners.com/cve/CVE-2018-1301
    	CNVD-2018-06536	5.9	https://vulners.com/cnvd/CNVD-2018-06536
    	CNVD-2018-06535	5.9	https://vulners.com/cnvd/CNVD-2018-06535
    	VULNERLAB:967	5.8	https://vulners.com/vulnerlab/VULNERLAB:967	*EXPLOIT*
    	VULNERABLE:967	5.8	https://vulners.com/vulnerlab/VULNERABLE:967	*EXPLOIT*
    	SSV:67231	5.8	https://vulners.com/seebug/SSV:67231	*EXPLOIT*
    	SSV:18637	5.8	https://vulners.com/seebug/SSV:18637	*EXPLOIT*
    	SSV:15088	5.8	https://vulners.com/seebug/SSV:15088	*EXPLOIT*
    	SSV:12600	5.8	https://vulners.com/seebug/SSV:12600	*EXPLOIT*
    	PACKETSTORM:84112	5.8	https://vulners.com/packetstorm/PACKETSTORM:84112	*EXPLOIT*
    	EXPLOITPACK:8B4E7E8DAE5A13C8250C6C33307CD66C	5.8	https://vulners.com/exploitpack/EXPLOITPACK:8B4E7E8DAE5A13C8250C6C33307CD66C	*EXPLOIT*
    	EDB-ID:10579	5.8	https://vulners.com/exploitdb/EDB-ID:10579	*EXPLOIT*
    	CVE-2009-3555	5.8	https://vulners.com/cve/CVE-2009-3555
    	CNVD-2025-30835	5.4	https://vulners.com/cnvd/CNVD-2025-30835
    	HTTPD:BAAB4065D254D64A717E8A5C847C7BCA	5.3	https://vulners.com/httpd/HTTPD:BAAB4065D254D64A717E8A5C847C7BCA
    	HTTPD:8806CE4EFAA6A567C7FAD62778B6A46F	5.3	https://vulners.com/httpd/HTTPD:8806CE4EFAA6A567C7FAD62778B6A46F
    	CVE-2022-37436	5.3	https://vulners.com/cve/CVE-2022-37436
    	CVE-2022-28614	5.3	https://vulners.com/cve/CVE-2022-28614
    	CVE-2022-28330	5.3	https://vulners.com/cve/CVE-2022-28330
    	CNVD-2023-30859	5.3	https://vulners.com/cnvd/CNVD-2023-30859
    	CNVD-2022-53582	5.3	https://vulners.com/cnvd/CNVD-2022-53582
    	CNVD-2022-51059	5.3	https://vulners.com/cnvd/CNVD-2022-51059
    	CNVD-2021-44766	5.3	https://vulners.com/cnvd/CNVD-2021-44766
    	CNVD-2020-46278	5.3	https://vulners.com/cnvd/CNVD-2020-46278
    	SSV:60788	5.1	https://vulners.com/seebug/SSV:60788	*EXPLOIT*
    	HTTPD:96CCBB8B74890DC94A45CD0955D35015	5.1	https://vulners.com/httpd/HTTPD:96CCBB8B74890DC94A45CD0955D35015
    	CVE-2013-1862	5.1	https://vulners.com/cve/CVE-2013-1862
    	SSV:96537	5.0	https://vulners.com/seebug/SSV:96537	*EXPLOIT*
    	SSV:62058	5.0	https://vulners.com/seebug/SSV:62058	*EXPLOIT*
    	SSV:61874	5.0	https://vulners.com/seebug/SSV:61874	*EXPLOIT*
    	SSV:20993	5.0	https://vulners.com/seebug/SSV:20993	*EXPLOIT*
    	SSV:20979	5.0	https://vulners.com/seebug/SSV:20979	*EXPLOIT*
    	SSV:20969	5.0	https://vulners.com/seebug/SSV:20969	*EXPLOIT*
    	SSV:19592	5.0	https://vulners.com/seebug/SSV:19592	*EXPLOIT*
    	SSV:15137	5.0	https://vulners.com/seebug/SSV:15137	*EXPLOIT*
    	SSV:12005	5.0	https://vulners.com/seebug/SSV:12005	*EXPLOIT*
    	PACKETSTORM:181059	5.0	https://vulners.com/packetstorm/PACKETSTORM:181059	*EXPLOIT*
    	PACKETSTORM:105672	5.0	https://vulners.com/packetstorm/PACKETSTORM:105672	*EXPLOIT*
    	PACKETSTORM:105591	5.0	https://vulners.com/packetstorm/PACKETSTORM:105591	*EXPLOIT*
    	MSF:AUXILIARY-SCANNER-HTTP-REWRITE_PROXY_BYPASS-	5.0	https://vulners.com/metasploit/MSF:AUXILIARY-SCANNER-HTTP-REWRITE_PROXY_BYPASS-	*EXPLOIT*
    	HTTPD:FF76CF8F03BE59B7AD0119034B0022DB	5.0	https://vulners.com/httpd/HTTPD:FF76CF8F03BE59B7AD0119034B0022DB
    	HTTPD:DD1BEF13C172D3E8CA5D3F3906101EC9	5.0	https://vulners.com/httpd/HTTPD:DD1BEF13C172D3E8CA5D3F3906101EC9
    	HTTPD:D1C855645E1630AE37C6F642C1D0F213	5.0	https://vulners.com/httpd/HTTPD:D1C855645E1630AE37C6F642C1D0F213
    	HTTPD:85C24937CF85C2E1DBF78F9954817A28	5.0	https://vulners.com/httpd/HTTPD:85C24937CF85C2E1DBF78F9954817A28
    	HTTPD:6D37F924288E2D149DC3C52135232B6E	5.0	https://vulners.com/httpd/HTTPD:6D37F924288E2D149DC3C52135232B6E
    	HTTPD:6CA43FB8E8332E715522C8A6C24EC31E	5.0	https://vulners.com/httpd/HTTPD:6CA43FB8E8332E715522C8A6C24EC31E
    	HTTPD:60BF8A7CCF62E24F92B3DCCA0E53F1F8	5.0	https://vulners.com/httpd/HTTPD:60BF8A7CCF62E24F92B3DCCA0E53F1F8
    	HTTPD:423307886E19F2012B809EEB1E9C6846	5.0	https://vulners.com/httpd/HTTPD:423307886E19F2012B809EEB1E9C6846
    	HTTPD:371AA87DEAE292D8E6ACC01309CA723A	5.0	https://vulners.com/httpd/HTTPD:371AA87DEAE292D8E6ACC01309CA723A
    	HTTPD:2E324CC4C6C61757E316E26EF4DCB945	5.0	https://vulners.com/httpd/HTTPD:2E324CC4C6C61757E316E26EF4DCB945
    	HTTPD:2C06F6E938AADE21D7C59CED65A985E6	5.0	https://vulners.com/httpd/HTTPD:2C06F6E938AADE21D7C59CED65A985E6
    	HTTPD:1DC50F4C723B9143E9713B27031C6043	5.0	https://vulners.com/httpd/HTTPD:1DC50F4C723B9143E9713B27031C6043
    	HTTPD:1069F9C369A2B2B1C4F8A1AC73589169	5.0	https://vulners.com/httpd/HTTPD:1069F9C369A2B2B1C4F8A1AC73589169
    	EXPLOITPACK:C8C256BE0BFF5FE1C0405CB0AA9C075D	5.0	https://vulners.com/exploitpack/EXPLOITPACK:C8C256BE0BFF5FE1C0405CB0AA9C075D	*EXPLOIT*
    	EXPLOITPACK:460143F0ACAE117DD79BD75EDFDA154B	5.0	https://vulners.com/exploitpack/EXPLOITPACK:460143F0ACAE117DD79BD75EDFDA154B	*EXPLOIT*
    	EDB-ID:17969	5.0	https://vulners.com/exploitdb/EDB-ID:17969	*EXPLOIT*
    	CVE-2015-3183	5.0	https://vulners.com/cve/CVE-2015-3183
    	CVE-2015-0228	5.0	https://vulners.com/cve/CVE-2015-0228
    	CVE-2014-0231	5.0	https://vulners.com/cve/CVE-2014-0231
    	CVE-2014-0098	5.0	https://vulners.com/cve/CVE-2014-0098
    	CVE-2013-6438	5.0	https://vulners.com/cve/CVE-2013-6438
    	CVE-2013-5704	5.0	https://vulners.com/cve/CVE-2013-5704
    	CVE-2011-3368	5.0	https://vulners.com/cve/CVE-2011-3368
    	CVE-2010-1623	5.0	https://vulners.com/cve/CVE-2010-1623
    	CVE-2010-1452	5.0	https://vulners.com/cve/CVE-2010-1452
    	CVE-2010-0408	5.0	https://vulners.com/cve/CVE-2010-0408
    	CVE-2009-3720	5.0	https://vulners.com/cve/CVE-2009-3720
    	CVE-2009-3560	5.0	https://vulners.com/cve/CVE-2009-3560
    	CVE-2009-3095	5.0	https://vulners.com/cve/CVE-2009-3095
    	CVE-2008-2364	5.0	https://vulners.com/cve/CVE-2008-2364
    	CVE-2007-6750	5.0	https://vulners.com/cve/CVE-2007-6750
    	CNVD-2015-01691	5.0	https://vulners.com/cnvd/CNVD-2015-01691
    	1337DAY-ID-28573	5.0	https://vulners.com/zdt/1337DAY-ID-28573	*EXPLOIT*
    	SSV:11668	4.9	https://vulners.com/seebug/SSV:11668	*EXPLOIT*
    	SSV:11501	4.9	https://vulners.com/seebug/SSV:11501	*EXPLOIT*
    	HTTPD:05AF7B1B11654BC6892C02003A12DE06	4.9	https://vulners.com/httpd/HTTPD:05AF7B1B11654BC6892C02003A12DE06
    	CVE-2009-1195	4.9	https://vulners.com/cve/CVE-2009-1195
    	SSV:30024	4.6	https://vulners.com/seebug/SSV:30024	*EXPLOIT*
    	HTTPD:FB0DB72A0946D2AA25FA9FA21ADB2CE1	4.6	https://vulners.com/httpd/HTTPD:FB0DB72A0946D2AA25FA9FA21ADB2CE1
    	CVE-2012-0031	4.6	https://vulners.com/cve/CVE-2012-0031
    	1337DAY-ID-27465	4.6	https://vulners.com/zdt/1337DAY-ID-27465	*EXPLOIT*
    	SSV:23169	4.4	https://vulners.com/seebug/SSV:23169	*EXPLOIT*
    	HTTPD:6309ABD03BB1B29C82E941636515010E	4.4	https://vulners.com/httpd/HTTPD:6309ABD03BB1B29C82E941636515010E
    	CVE-2011-3607	4.4	https://vulners.com/cve/CVE-2011-3607
    	1337DAY-ID-27473	4.4	https://vulners.com/zdt/1337DAY-ID-27473	*EXPLOIT*
    	SSV:60905	4.3	https://vulners.com/seebug/SSV:60905	*EXPLOIT*
    	SSV:60657	4.3	https://vulners.com/seebug/SSV:60657	*EXPLOIT*
    	SSV:60653	4.3	https://vulners.com/seebug/SSV:60653	*EXPLOIT*
    	SSV:60345	4.3	https://vulners.com/seebug/SSV:60345	*EXPLOIT*
    	SSV:4786	4.3	https://vulners.com/seebug/SSV:4786	*EXPLOIT*
    	SSV:3804	4.3	https://vulners.com/seebug/SSV:3804	*EXPLOIT*
    	SSV:30094	4.3	https://vulners.com/seebug/SSV:30094	*EXPLOIT*
    	SSV:30056	4.3	https://vulners.com/seebug/SSV:30056	*EXPLOIT*
    	SSV:24250	4.3	https://vulners.com/seebug/SSV:24250	*EXPLOIT*
    	SSV:20555	4.3	https://vulners.com/seebug/SSV:20555	*EXPLOIT*
    	SSV:19320	4.3	https://vulners.com/seebug/SSV:19320	*EXPLOIT*
    	SSV:11558	4.3	https://vulners.com/seebug/SSV:11558	*EXPLOIT*
    	PACKETSTORM:109284	4.3	https://vulners.com/packetstorm/PACKETSTORM:109284	*EXPLOIT*
    	HTTPD:FD1CC7EACBC758C451BA5B8D25FCB6DD	4.3	https://vulners.com/httpd/HTTPD:FD1CC7EACBC758C451BA5B8D25FCB6DD
    	HTTPD:C730B9155CAC64B44A77E253B3135FE5	4.3	https://vulners.com/httpd/HTTPD:C730B9155CAC64B44A77E253B3135FE5
    	HTTPD:B90E2A3B47C473DD04F25ECBDA96D6CE	4.3	https://vulners.com/httpd/HTTPD:B90E2A3B47C473DD04F25ECBDA96D6CE
    	HTTPD:B07D6585013819446B5017BD7E358E6F	4.3	https://vulners.com/httpd/HTTPD:B07D6585013819446B5017BD7E358E6F
    	HTTPD:AC5C28237AB3E52EF4D366EB0CD6D4AF	4.3	https://vulners.com/httpd/HTTPD:AC5C28237AB3E52EF4D366EB0CD6D4AF
    	HTTPD:A49ADFA68FCEB939DA0E2BE13CA74CB9	4.3	https://vulners.com/httpd/HTTPD:A49ADFA68FCEB939DA0E2BE13CA74CB9
    	HTTPD:49F10A242AB057B651259425C3E680F4	4.3	https://vulners.com/httpd/HTTPD:49F10A242AB057B651259425C3E680F4
    	HTTPD:3D474EEBC8F5BC66AE37F523DD259829	4.3	https://vulners.com/httpd/HTTPD:3D474EEBC8F5BC66AE37F523DD259829
    	HTTPD:2A661E9492CCEF999508BD8503884E30	4.3	https://vulners.com/httpd/HTTPD:2A661E9492CCEF999508BD8503884E30
    	HTTPD:1E858A305C3DEA1B5E9A23EE1352B1B3	4.3	https://vulners.com/httpd/HTTPD:1E858A305C3DEA1B5E9A23EE1352B1B3
    	HTTPD:0F6B8D022A5D1C68540812E406264625	4.3	https://vulners.com/httpd/HTTPD:0F6B8D022A5D1C68540812E406264625
    	HTTPD:0D2952537BF45B77447EF90EAD31D8C9	4.3	https://vulners.com/httpd/HTTPD:0D2952537BF45B77447EF90EAD31D8C9
    	EXPLOITPACK:FDCB3D93694E48CD5EE27CE55D6801DE	4.3	https://vulners.com/exploitpack/EXPLOITPACK:FDCB3D93694E48CD5EE27CE55D6801DE	*EXPLOIT*
    	EDB-ID:35738	4.3	https://vulners.com/exploitdb/EDB-ID:35738	*EXPLOIT*
    	CVE-2016-8612	4.3	https://vulners.com/cve/CVE-2016-8612
    	CVE-2014-0118	4.3	https://vulners.com/cve/CVE-2014-0118
    	CVE-2013-1896	4.3	https://vulners.com/cve/CVE-2013-1896
    	CVE-2012-4558	4.3	https://vulners.com/cve/CVE-2012-4558
    	CVE-2012-3499	4.3	https://vulners.com/cve/CVE-2012-3499
    	CVE-2012-0053	4.3	https://vulners.com/cve/CVE-2012-0053
    	CVE-2011-4317	4.3	https://vulners.com/cve/CVE-2011-4317
    	CVE-2011-3639	4.3	https://vulners.com/cve/CVE-2011-3639
    	CVE-2011-0419	4.3	https://vulners.com/cve/CVE-2011-0419
    	CVE-2010-0434	4.3	https://vulners.com/cve/CVE-2010-0434
    	CVE-2009-0023	4.3	https://vulners.com/cve/CVE-2009-0023
    	CVE-2008-2939	4.3	https://vulners.com/cve/CVE-2008-2939
    	CVE-2008-0455	4.3	https://vulners.com/cve/CVE-2008-0455
    	CVE-2007-6420	4.3	https://vulners.com/cve/CVE-2007-6420
    	67D5C133-2D28-56DF-B3FF-FA397606547D	4.3	https://vulners.com/gitee/67D5C133-2D28-56DF-B3FF-FA397606547D	*EXPLOIT*
    	SSV:12628	2.6	https://vulners.com/seebug/SSV:12628	*EXPLOIT*
    	HTTPD:AA860ED739944CC66DCA320985CEC190	2.6	https://vulners.com/httpd/HTTPD:AA860ED739944CC66DCA320985CEC190
    	HTTPD:A79620D4A49D1F0D9BE6A18FD0CA234C	2.6	https://vulners.com/httpd/HTTPD:A79620D4A49D1F0D9BE6A18FD0CA234C
    	CVE-2012-2687	2.6	https://vulners.com/cve/CVE-2012-2687
    	CVE-2009-3094	2.6	https://vulners.com/cve/CVE-2009-3094
    	CVE-2008-0456	2.6	https://vulners.com/cve/CVE-2008-0456
    	SSV:60250	1.2	https://vulners.com/seebug/SSV:60250	*EXPLOIT*
    	CVE-2011-4415	1.2	https://vulners.com/cve/CVE-2011-4415
    	1337DAY-ID-9602	0.0	https://vulners.com/zdt/1337DAY-ID-9602	*EXPLOIT*
    	1337DAY-ID-21346	0.0	https://vulners.com/zdt/1337DAY-ID-21346	*EXPLOIT*
    	1337DAY-ID-17257	0.0	https://vulners.com/zdt/1337DAY-ID-17257	*EXPLOIT*
    	1337DAY-ID-16843	0.0	https://vulners.com/zdt/1337DAY-ID-16843	*EXPLOIT*
    	1337DAY-ID-13268	0.0	https://vulners.com/zdt/1337DAY-ID-13268	*EXPLOIT*
    	1337DAY-ID-11185	0.0	https://vulners.com/zdt/1337DAY-ID-11185	*EXPLOIT* 
http-enum 
  /tikiwiki/: Tikiwiki
  /test/: Test page
  /phpinfo.php: Possible information file
  /phpMyAdmin/: phpMyAdmin
  /doc/: Potentially interesting directory w/ listing on 'apache/2.2.8 (ubuntu) dav/2'
  /icons/: Potentially interesting folder w/ directory listing
  /index/: Potentially interesting folder
 
http-stored-xss 
Couldn't find any stored XSS vulnerabilities. 
http-csrf 
Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=192.168.0.101
  Found the following possible CSRF vulnerabilities: 
    
    Path: http://192.168.0.101:80/dvwa/
    Form id: 
    Form action: login.php
    
    Path: http://192.168.0.101:80/mutillidae/index.php?page=user-info.php
    Form id: id-bad-cred-tr
    Form action: ./index.php?page=user-info.php
    
    Path: http://192.168.0.101:80/mutillidae/?page=view-someones-blog.php
    Form id: id-bad-blog-entry-tr
    Form action: index.php?page=view-someones-blog.php
    
    Path: http://192.168.0.101:80/mutillidae/index.php?page=login.php
    Form id: idloginform
    Form action: index.php?page=login.php
    
    Path: http://192.168.0.101:80/mutillidae/?page=login.php
    Form id: idloginform
    Form action: index.php?page=login.php
    
    Path: http://192.168.0.101:80/mutillidae/?page=text-file-viewer.php
    Form id: id-bad-cred-tr
    Form action: index.php?page=text-file-viewer.php
    
    Path: http://192.168.0.101:80/mutillidae/index.php?page=dns-lookup.php
    Form id: iddnslookupform
    Form action: index.php?page=dns-lookup.php
 
http-trace 
TRACE is enabled 
http-dombased-xss 
Couldn't find any DOM based XSS. 
http-sql-injection 
  Possible sqli for queries:
    http://192.168.0.101:80/mutillidae/?page=credits.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=user-info.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=installation.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=view-someones-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=login.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=credits.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=login.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=text-file-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=captured-data.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=browser-info.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=dns-lookup.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=pen-test-tool-lookup.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=change-log.htm%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=add-to-your-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=capture-data.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=documentation%2Fhow-to-access-Mutillidae-over-Virtual-Box-network.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=text-file-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=show-log.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=php-errors.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=arbitrary-file-inclusion.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=user-poll.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=site-footer-xss-discussion.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=usage-instructions.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=set-background-color.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=home.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=documentation%2Fvulnerabilities.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=source-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=view-someones-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=framing.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=source-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=add-to-your-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=register.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?username=anonymous&page=password-generator.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=user-info.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?do=toggle-hints%27%20OR%20sqlspider&page=home.php
    http://192.168.0.101:80/mutillidae/?page=show-log.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=notes.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?do=toggle-security%27%20OR%20sqlspider&page=home.php
    http://192.168.0.101:80/mutillidae/index.php?page=secret-administrative-pages.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=html5-storage.php%27%20OR%20sqlspider
    http://192.168.0.101:80/dav/?C=N%3BO%3DD%27%20OR%20sqlspider
    http://192.168.0.101:80/dav/?C=S%3BO%3DA%27%20OR%20sqlspider
    http://192.168.0.101:80/dav/?C=M%3BO%3DA%27%20OR%20sqlspider
    http://192.168.0.101:80/dav/?C=D%3BO%3DA%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=credits.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=user-info.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=installation.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=view-someones-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=login.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=credits.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=login.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=text-file-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=documentation%2Fhow-to-access-Mutillidae-over-Virtual-Box-network.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=captured-data.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?forwardurl=http%3A%2F%2Fwww.room362.com%2F&page=redirectandlog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?forwardurl=https%3A%2F%2Faddons.mozilla.org%2Fen-US%2Ffirefox%2Fcollections%2Fjdruin%2Fpr%2F&page=redirectandlog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=browser-info.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?username=anonymous&page=password-generator.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=dns-lookup.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=pen-test-tool-lookup.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?forwardurl=http%3A%2F%2Fwww.pocodoy.com%2Fblog%2F&page=redirectandlog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=add-to-your-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=capture-data.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=text-file-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?forwardurl=http%3A%2F%2Fwww.isd-podcast.com%2F&page=redirectandlog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=show-log.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?forwardurl=http%3A%2F%2Fwww.irongeek.com%2F&page=redirectandlog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=arbitrary-file-inclusion.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=user-poll.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?forwardurl=http%3A%2F%2Fwww.issa-kentuckiana.org%2F&page=redirectandlog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=site-footer-xss-discussion.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?forwardurl=http%3A%2F%2Fwww.owasp.org%2Findex.php%2FLouisville&page=redirectandlog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?forwardurl=http%3A%2F%2Fwww.owasp.org&page=redirectandlog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=set-background-color.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=home.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=documentation%2Fvulnerabilities.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=source-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=view-someones-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=change-log.htm%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=framing.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=add-to-your-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=source-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=register.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=user-info.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?forwardurl=http%3A%2F%2Fwww.php.net%2F&page=redirectandlog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=show-log.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?forwardurl=http%3A%2F%2Fpauldotcom.com%2F&page=redirectandlog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=secret-administrative-pages.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=html5-storage.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=credits.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=user-info.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=installation.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=view-someones-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=login.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=credits.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=login.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=text-file-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=captured-data.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=browser-info.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=dns-lookup.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=pen-test-tool-lookup.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=change-log.htm%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=add-to-your-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=capture-data.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=text-file-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=show-log.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=arbitrary-file-inclusion.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=user-poll.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=site-footer-xss-discussion.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=set-background-color.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=home.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=register.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=source-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=view-someones-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=documentation%2Fhow-to-access-Mutillidae-over-Virtual-Box-network.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=documentation%2Fvulnerabilities.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=add-to-your-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=framing.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=source-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=user-info.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?username=anonymous&page=password-generator.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=show-log.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=html5-storage.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=secret-administrative-pages.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=register.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=credits.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=user-info.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=installation.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=view-someones-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=login.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=credits.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=login.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=text-file-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=captured-data.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=browser-info.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=dns-lookup.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=pen-test-tool-lookup.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=change-log.htm%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=add-to-your-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=capture-data.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=text-file-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=show-log.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=arbitrary-file-inclusion.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=user-poll.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=site-footer-xss-discussion.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=set-background-color.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=home.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=documentation%2Fhow-to-access-Mutillidae-over-Virtual-Box-network.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=source-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=view-someones-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=documentation%2Fvulnerabilities.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=framing.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=add-to-your-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=source-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=register.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=user-info.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?username=anonymous&page=password-generator.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=show-log.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=secret-administrative-pages.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=html5-storage.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=credits.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=user-info.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=installation.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=view-someones-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=login.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=credits.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=login.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=text-file-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=captured-data.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=browser-info.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=dns-lookup.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=pen-test-tool-lookup.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=change-log.htm%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=capture-data.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=text-file-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=show-log.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=arbitrary-file-inclusion.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=user-poll.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=documentation%2Fhow-to-access-Mutillidae-over-Virtual-Box-network.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=set-background-color.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=home.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=documentation%2Fvulnerabilities.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=source-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=view-someones-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=framing.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=source-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=add-to-your-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=secret-administrative-pages.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?username=anonymous&page=password-generator.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=user-info.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=add-to-your-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=register.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=show-log.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=site-footer-xss-discussion.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=html5-storage.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=credits.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=user-info.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=installation.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=view-someones-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=login.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=credits.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=login.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=text-file-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=captured-data.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=browser-info.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=dns-lookup.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=pen-test-tool-lookup.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=change-log.htm%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=capture-data.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=text-file-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=show-log.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=arbitrary-file-inclusion.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=user-poll.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=site-footer-xss-discussion.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=set-background-color.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=home.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=register.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=source-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=view-someones-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=documentation%2Fhow-to-access-Mutillidae-over-Virtual-Box-network.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=documentation%2Fvulnerabilities.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=add-to-your-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=framing.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=source-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=user-info.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=html5-storage.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?username=anonymous&page=password-generator.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=show-log.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=add-to-your-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=secret-administrative-pages.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=register.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=credits.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=user-info.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=installation.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=view-someones-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=login.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=credits.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=login.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=text-file-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=documentation%2Fhow-to-access-Mutillidae-over-Virtual-Box-network.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=captured-data.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?forwardurl=http%3A%2F%2Fwww.room362.com%2F&page=redirectandlog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?forwardurl=https%3A%2F%2Faddons.mozilla.org%2Fen-US%2Ffirefox%2Fcollections%2Fjdruin%2Fpr%2F&page=redirectandlog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=browser-info.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?username=anonymous&page=password-generator.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=dns-lookup.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=pen-test-tool-lookup.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?forwardurl=http%3A%2F%2Fwww.pocodoy.com%2Fblog%2F&page=redirectandlog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=add-to-your-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=capture-data.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=text-file-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?forwardurl=http%3A%2F%2Fwww.isd-podcast.com%2F&page=redirectandlog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=show-log.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?forwardurl=http%3A%2F%2Fwww.irongeek.com%2F&page=redirectandlog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=arbitrary-file-inclusion.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=user-poll.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?forwardurl=http%3A%2F%2Fwww.issa-kentuckiana.org%2F&page=redirectandlog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=site-footer-xss-discussion.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?forwardurl=http%3A%2F%2Fwww.owasp.org%2Findex.php%2FLouisville&page=redirectandlog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?forwardurl=http%3A%2F%2Fwww.owasp.org&page=redirectandlog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=set-background-color.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=home.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=documentation%2Fvulnerabilities.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=source-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=view-someones-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=change-log.htm%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=framing.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=add-to-your-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=source-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=register.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=user-info.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?forwardurl=http%3A%2F%2Fwww.php.net%2F&page=redirectandlog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=show-log.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?forwardurl=http%3A%2F%2Fpauldotcom.com%2F&page=redirectandlog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=secret-administrative-pages.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=html5-storage.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=credits.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=user-info.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=installation.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=view-someones-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=login.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=credits.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=login.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=text-file-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=captured-data.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=browser-info.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=dns-lookup.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=pen-test-tool-lookup.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=change-log.htm%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=capture-data.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=text-file-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=show-log.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=arbitrary-file-inclusion.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=user-poll.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=site-footer-xss-discussion.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=set-background-color.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=home.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=register.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=source-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=view-someones-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=documentation%2Fhow-to-access-Mutillidae-over-Virtual-Box-network.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=documentation%2Fvulnerabilities.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=add-to-your-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=framing.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=source-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=user-info.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=html5-storage.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?username=anonymous&page=password-generator.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=show-log.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=add-to-your-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=secret-administrative-pages.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=register.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=credits.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=user-info.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=installation.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=view-someones-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=login.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=credits.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=login.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=text-file-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=captured-data.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=browser-info.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=dns-lookup.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=pen-test-tool-lookup.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=change-log.htm%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=add-to-your-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=capture-data.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=text-file-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=show-log.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=arbitrary-file-inclusion.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=user-poll.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=site-footer-xss-discussion.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=set-background-color.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=home.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=documentation%2Fhow-to-access-Mutillidae-over-Virtual-Box-network.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=source-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=view-someones-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=documentation%2Fvulnerabilities.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=framing.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=add-to-your-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=source-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=register.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=user-info.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?username=anonymous&page=password-generator.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=show-log.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=secret-administrative-pages.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=html5-storage.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=credits.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=user-info.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=installation.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=view-someones-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=login.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=credits.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=login.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=text-file-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=captured-data.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=browser-info.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=dns-lookup.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=pen-test-tool-lookup.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=change-log.htm%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=add-to-your-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=capture-data.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=text-file-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=show-log.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=arbitrary-file-inclusion.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=user-poll.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=documentation%2Fhow-to-access-Mutillidae-over-Virtual-Box-network.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=site-footer-xss-discussion.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=set-background-color.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=home.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=source-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=view-someones-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=documentation%2Fvulnerabilities.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=framing.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=add-to-your-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=source-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=user-info.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?username=anonymous&page=password-generator.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=show-log.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=html5-storage.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=secret-administrative-pages.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=register.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=credits.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=user-info.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=installation.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=view-someones-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=login.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=credits.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=login.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=text-file-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=captured-data.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=browser-info.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=dns-lookup.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=pen-test-tool-lookup.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=change-log.htm%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=add-to-your-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=capture-data.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=text-file-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=show-log.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=arbitrary-file-inclusion.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=user-poll.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=documentation%2Fhow-to-access-Mutillidae-over-Virtual-Box-network.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=site-footer-xss-discussion.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=set-background-color.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=home.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=documentation%2Fvulnerabilities.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=source-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=view-someones-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=framing.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=source-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=add-to-your-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=register.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?username=anonymous&page=password-generator.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=user-info.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=show-log.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=secret-administrative-pages.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=html5-storage.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=credits.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=user-info.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=installation.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=view-someones-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=login.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=credits.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=login.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=text-file-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=browser-info.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=dns-lookup.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=pen-test-tool-lookup.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=change-log.htm%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=add-to-your-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=capture-data.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=text-file-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=show-log.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=arbitrary-file-inclusion.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=user-poll.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=documentation%2Fhow-to-access-Mutillidae-over-Virtual-Box-network.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=site-footer-xss-discussion.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=set-background-color.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=home.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=documentation%2Fvulnerabilities.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=view-someones-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=framing.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=source-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=add-to-your-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=source-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=user-info.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?username=anonymous&page=password-generator.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=captured-data.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=show-log.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=html5-storage.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=secret-administrative-pages.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=register.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=credits.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?do=toggle-hints%27%20OR%20sqlspider&page=pen-test-tool-lookup.php
    http://192.168.0.101:80/mutillidae/index.php?page=installation.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=view-someones-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=login.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=credits.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?do=toggle-security%27%20OR%20sqlspider&page=pen-test-tool-lookup.php
    http://192.168.0.101:80/mutillidae/?page=login.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=text-file-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=captured-data.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=browser-info.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=dns-lookup.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=pen-test-tool-lookup.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=change-log.htm%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=add-to-your-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=capture-data.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=text-file-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=show-log.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=arbitrary-file-inclusion.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=user-poll.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=site-footer-xss-discussion.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=set-background-color.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=home.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=documentation%2Fhow-to-access-Mutillidae-over-Virtual-Box-network.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=source-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=view-someones-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=documentation%2Fvulnerabilities.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=framing.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=add-to-your-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=source-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=register.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=user-info.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?username=anonymous&page=password-generator.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=show-log.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=user-info.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=secret-administrative-pages.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=html5-storage.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=credits.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=user-info.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=installation.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=view-someones-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=login.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=credits.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=login.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=text-file-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=captured-data.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=browser-info.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=dns-lookup.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=pen-test-tool-lookup.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=change-log.htm%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=capture-data.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=text-file-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=show-log.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=arbitrary-file-inclusion.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=user-poll.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=documentation%2Fhow-to-access-Mutillidae-over-Virtual-Box-network.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?do=toggle-hints%27%20OR%20sqlspider&page=change-log.htm
    http://192.168.0.101:80/mutillidae/index.php?page=set-background-color.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=home.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=documentation%2Fvulnerabilities.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=source-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=view-someones-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=framing.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=source-viewer.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=add-to-your-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?do=toggle-security%27%20OR%20sqlspider&page=change-log.htm
    http://192.168.0.101:80/mutillidae/index.php?page=site-footer-xss-discussion.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=user-info.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?username=anonymous&page=password-generator.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=add-to-your-blog.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/?page=show-log.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=html5-storage.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=secret-administrative-pages.php%27%20OR%20sqlspider
    http://192.168.0.101:80/mutillidae/index.php?page=register.php%27%20OR%20sqlspider
  Possible sqli for forms:
    Form at path: /mutillidae/index.php, form's action: ./index.php?page=user-info.php. Fields that might be vulnerable:
      username
 
111 tcp open rpcbind  syn-ack   RPC #100000 
rpcinfo 
  program version    port/proto  service
  100000  2            111/tcp   rpcbind
  100000  2            111/udp   rpcbind
  100003  2,3,4       2049/tcp   nfs
  100003  2,3,4       2049/udp   nfs
  100005  1,2,3      43743/tcp   mountd
  100005  1,2,3      59729/udp   mountd
  100021  1,3,4      50568/tcp   nlockmgr
  100021  1,3,4      60723/udp   nlockmgr
  100024  1          42871/tcp   status
  100024  1          43545/udp   status
 
139 tcp open netbios-ssn  syn-ack Samba smbd  3.X - 4.X  workgroup: WORKGROUP 
445 tcp open netbios-ssn  syn-ack Samba smbd  3.X - 4.X  workgroup: WORKGROUP 
512 tcp open exec  syn-ack netkit-rsh rexecd     
513 tcp open login  syn-ack      
514 tcp open tcpwrapped  syn-ack      
1099 tcp open java-rmi  syn-ack GNU Classpath grmiregistry     
rmi-vuln-classloader 
  VULNERABLE:
  RMI registry default configuration remote code execution vulnerability
    State: VULNERABLE
      Default configuration of RMI registry allows loading classes from remote URLs which can lead to remote code execution.
      
    References:
      https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/misc/java_rmi_server.rb
 
1524 tcp open bindshell  syn-ack Metasploitable root shell     
2049 tcp open nfs  syn-ack   2-4  RPC #100003 
2121 tcp open ftp  syn-ack ProFTPD  1.3.1   
vulners 
  cpe:/a:proftpd:proftpd:1.3.1: 
    	SAINT:FD1752E124A72FD3A26EEB9B315E8382	10.0	https://vulners.com/saint/SAINT:FD1752E124A72FD3A26EEB9B315E8382	*EXPLOIT*
    	SAINT:950EB68D408A40399926A4CCAD3CC62E	10.0	https://vulners.com/saint/SAINT:950EB68D408A40399926A4CCAD3CC62E	*EXPLOIT*
    	SAINT:63FB77B9136D48259E4F0D4CDA35E957	10.0	https://vulners.com/saint/SAINT:63FB77B9136D48259E4F0D4CDA35E957	*EXPLOIT*
    	SAINT:1B08F4664C428B180EEC9617B41D9A2C	10.0	https://vulners.com/saint/SAINT:1B08F4664C428B180EEC9617B41D9A2C	*EXPLOIT*
    	PROFTPD_MOD_COPY	10.0	https://vulners.com/canvas/PROFTPD_MOD_COPY	*EXPLOIT*
    	PACKETSTORM:162777	10.0	https://vulners.com/packetstorm/PACKETSTORM:162777	*EXPLOIT*
    	PACKETSTORM:132218	10.0	https://vulners.com/packetstorm/PACKETSTORM:132218	*EXPLOIT*
    	PACKETSTORM:131567	10.0	https://vulners.com/packetstorm/PACKETSTORM:131567	*EXPLOIT*
    	PACKETSTORM:131555	10.0	https://vulners.com/packetstorm/PACKETSTORM:131555	*EXPLOIT*
    	PACKETSTORM:131505	10.0	https://vulners.com/packetstorm/PACKETSTORM:131505	*EXPLOIT*
    	MSF:EXPLOIT-UNIX-FTP-PROFTPD_MODCOPY_EXEC-	10.0	https://vulners.com/metasploit/MSF:EXPLOIT-UNIX-FTP-PROFTPD_MODCOPY_EXEC-	*EXPLOIT*
    	EDB-ID:49908	10.0	https://vulners.com/exploitdb/EDB-ID:49908	*EXPLOIT*
    	EDB-ID:37262	10.0	https://vulners.com/exploitdb/EDB-ID:37262	*EXPLOIT*
    	BC7F9971-F233-5C1A-AA5E-DAA7587C7DED	10.0	https://vulners.com/githubexploit/BC7F9971-F233-5C1A-AA5E-DAA7587C7DED	*EXPLOIT*
    	6BF3AE83-7AD0-5378-B7C9-C05B81007195	10.0	https://vulners.com/gitee/6BF3AE83-7AD0-5378-B7C9-C05B81007195	*EXPLOIT*
    	1EEE27D9-DFF4-517B-9EAB-CCDECA6EF254	10.0	https://vulners.com/githubexploit/1EEE27D9-DFF4-517B-9EAB-CCDECA6EF254	*EXPLOIT*
    	1337DAY-ID-36298	10.0	https://vulners.com/zdt/1337DAY-ID-36298	*EXPLOIT*
    	1337DAY-ID-23720	10.0	https://vulners.com/zdt/1337DAY-ID-23720	*EXPLOIT*
    	1337DAY-ID-23544	10.0	https://vulners.com/zdt/1337DAY-ID-23544	*EXPLOIT*
    	0D531276-4E46-5C77-95C9-278B5AD82984	10.0	https://vulners.com/githubexploit/0D531276-4E46-5C77-95C9-278B5AD82984	*EXPLOIT*
    	CVE-2019-12815	9.8	https://vulners.com/cve/CVE-2019-12815
    	739FE495-4675-5A2A-BB93-EEF94AC07632	9.8	https://vulners.com/githubexploit/739FE495-4675-5A2A-BB93-EEF94AC07632	*EXPLOIT*
    	SSV:26016	9.0	https://vulners.com/seebug/SSV:26016	*EXPLOIT*
    	SSV:24282	9.0	https://vulners.com/seebug/SSV:24282	*EXPLOIT*
    	CVE-2011-4130	9.0	https://vulners.com/cve/CVE-2011-4130
    	SSV:96525	7.5	https://vulners.com/seebug/SSV:96525	*EXPLOIT*
    	CVE-2024-48651	7.5	https://vulners.com/cve/CVE-2024-48651
    	CVE-2023-51713	7.5	https://vulners.com/cve/CVE-2023-51713
    	CVE-2021-46854	7.5	https://vulners.com/cve/CVE-2021-46854
    	CVE-2020-9272	7.5	https://vulners.com/cve/CVE-2020-9272
    	CVE-2019-19272	7.5	https://vulners.com/cve/CVE-2019-19272
    	CVE-2019-19271	7.5	https://vulners.com/cve/CVE-2019-19271
    	CVE-2019-19270	7.5	https://vulners.com/cve/CVE-2019-19270
    	CVE-2019-18217	7.5	https://vulners.com/cve/CVE-2019-18217
    	CVE-2016-3125	7.5	https://vulners.com/cve/CVE-2016-3125
    	CNVD-2020-14677	7.5	https://vulners.com/cnvd/CNVD-2020-14677
    	CNVD-2019-44557	7.5	https://vulners.com/cnvd/CNVD-2019-44557
    	SSV:20226	7.1	https://vulners.com/seebug/SSV:20226	*EXPLOIT*
    	PACKETSTORM:95517	7.1	https://vulners.com/packetstorm/PACKETSTORM:95517	*EXPLOIT*
    	CVE-2010-3867	7.1	https://vulners.com/cve/CVE-2010-3867
    	SSV:12447	6.8	https://vulners.com/seebug/SSV:12447	*EXPLOIT*
    	SSV:11950	6.8	https://vulners.com/seebug/SSV:11950	*EXPLOIT*
    	EDB-ID:33128	6.8	https://vulners.com/exploitdb/EDB-ID:33128	*EXPLOIT*
    	CVE-2010-4652	6.8	https://vulners.com/cve/CVE-2010-4652
    	CVE-2009-0543	6.8	https://vulners.com/cve/CVE-2009-0543
    	FD2E0EBA-ED84-5304-8862-84BCDEB2F288	5.9	https://vulners.com/githubexploit/FD2E0EBA-ED84-5304-8862-84BCDEB2F288	*EXPLOIT*
    	CVE-2023-48795	5.9	https://vulners.com/cve/CVE-2023-48795
    	721F040C-37BC-59E1-9433-01A2EAC2E755	5.9	https://vulners.com/githubexploit/721F040C-37BC-59E1-9433-01A2EAC2E755	*EXPLOIT*
    	SSV:12523	5.8	https://vulners.com/seebug/SSV:12523	*EXPLOIT*
    	CVE-2009-3639	5.8	https://vulners.com/cve/CVE-2009-3639
    	CVE-2017-7418	5.5	https://vulners.com/cve/CVE-2017-7418
    	CVE-2011-1137	5.0	https://vulners.com/cve/CVE-2011-1137
    	CVE-2019-19269	4.9	https://vulners.com/cve/CVE-2019-19269
    	CVE-2008-7265	4.0	https://vulners.com/cve/CVE-2008-7265
    	CVE-2012-6095	1.2	https://vulners.com/cve/CVE-2012-6095 
3306 tcp open mysql  syn-ack MySQL  5.0.51a-3ubuntu5   
mysql-vuln-cve2012-2122 
ERROR: Script execution failed (use -d to debug) 
ssl-ccs-injection 
No reply from server (TIMEOUT) 
vulners 
  cpe:/a:mysql:mysql:5.0.51a-3ubuntu5: 
    	SSV:19118	8.5	https://vulners.com/seebug/SSV:19118	*EXPLOIT*
    	CVE-2017-15945	7.8	https://vulners.com/cve/CVE-2017-15945
    	SSV:15006	6.8	https://vulners.com/seebug/SSV:15006	*EXPLOIT*
    	CVE-2009-4028	6.8	https://vulners.com/cve/CVE-2009-4028
    	SSV:15004	6.0	https://vulners.com/seebug/SSV:15004	*EXPLOIT*
    	CVE-2010-1621	5.0	https://vulners.com/cve/CVE-2010-1621
    	CVE-2015-2575	4.9	https://vulners.com/cve/CVE-2015-2575
    	SSV:3280	4.6	https://vulners.com/seebug/SSV:3280	*EXPLOIT*
    	CVE-2008-2079	4.6	https://vulners.com/cve/CVE-2008-2079
    	CVE-2010-3682	4.0	https://vulners.com/cve/CVE-2010-3682
    	CVE-2010-3677	4.0	https://vulners.com/cve/CVE-2010-3677
    	CVE-2009-0819	4.0	https://vulners.com/cve/CVE-2009-0819
    	CVE-2007-5925	4.0	https://vulners.com/cve/CVE-2007-5925
    	CVE-2010-1626	3.6	https://vulners.com/cve/CVE-2010-1626 
5432 tcp open postgresql  syn-ack PostgreSQL DB  8.3.0 - 8.3.7   
ssl-poodle 
  VULNERABLE:
  SSL POODLE information leak
    State: VULNERABLE
    IDs:  BID:70574  CVE:CVE-2014-3566
          The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other
          products, uses nondeterministic CBC padding, which makes it easier
          for man-in-the-middle attackers to obtain cleartext data via a
          padding-oracle attack, aka the "POODLE" issue.
    Disclosure date: 2014-10-14
    Check results:
      TLS_RSA_WITH_AES_128_CBC_SHA
    References:
      https://www.openssl.org/~bodo/ssl-poodle.pdf
      https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
      https://www.imperialviolet.org/2014/10/14/poodle.html
      https://www.securityfocus.com/bid/70574
 
ssl-dh-params 
  VULNERABLE:
  Diffie-Hellman Key Exchange Insufficient Group Strength
    State: VULNERABLE
      Transport Layer Security (TLS) services that use Diffie-Hellman groups
      of insufficient strength, especially those using one of a few commonly
      shared groups, may be susceptible to passive eavesdropping attacks.
    Check results:
      WEAK DH GROUP 1
            Cipher Suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA
            Modulus Type: Safe prime
            Modulus Source: Unknown/Custom-generated
            Modulus Length: 1024
            Generator Length: 8
            Public Key Length: 1024
    References:
      https://weakdh.org
 
ssl-ccs-injection 
  VULNERABLE:
  SSL/TLS MITM vulnerability (CCS Injection)
    State: VULNERABLE
    Risk factor: High
      OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h
      does not properly restrict processing of ChangeCipherSpec messages,
      which allows man-in-the-middle attackers to trigger use of a zero
      length master key in certain OpenSSL-to-OpenSSL communications, and
      consequently hijack sessions or obtain sensitive information, via
      a crafted TLS handshake, aka the "CCS Injection" vulnerability.
          
    References:
      https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224
      http://www.openssl.org/news/secadv_20140605.txt
      http://www.cvedetails.com/cve/2014-0224
 
vulners 
  cpe:/a:postgresql:postgresql:8.3: 
    	SSV:60718	10.0	https://vulners.com/seebug/SSV:60718	*EXPLOIT*
    	CVE-2013-1903	10.0	https://vulners.com/cve/CVE-2013-1903
    	CVE-2013-1902	10.0	https://vulners.com/cve/CVE-2013-1902
    	PACKETSTORM:216218	9.9	https://vulners.com/packetstorm/PACKETSTORM:216218	*EXPLOIT*
    	POSTGRESQL:CVE-2019-10211	9.8	https://vulners.com/postgresql/POSTGRESQL:CVE-2019-10211
    	POSTGRESQL:CVE-2018-16850	9.8	https://vulners.com/postgresql/POSTGRESQL:CVE-2018-16850
    	POSTGRESQL:CVE-2017-7546	9.8	https://vulners.com/postgresql/POSTGRESQL:CVE-2017-7546
    	POSTGRESQL:CVE-2015-3166	9.8	https://vulners.com/postgresql/POSTGRESQL:CVE-2015-3166
    	POSTGRESQL:CVE-2015-0244	9.8	https://vulners.com/postgresql/POSTGRESQL:CVE-2015-0244
    	PACKETSTORM:189316	9.8	https://vulners.com/packetstorm/PACKETSTORM:189316	*EXPLOIT*
    	MSF:EXPLOIT-LINUX-HTTP-BEYONDTRUST_PRA_RS_UNAUTH_RCE-	9.8	https://vulners.com/metasploit/MSF:EXPLOIT-LINUX-HTTP-BEYONDTRUST_PRA_RS_UNAUTH_RCE-	*EXPLOIT*
    	CVE-2019-10211	9.8	https://vulners.com/cve/CVE-2019-10211
    	CVE-2015-3166	9.8	https://vulners.com/cve/CVE-2015-3166
    	CVE-2015-0244	9.8	https://vulners.com/cve/CVE-2015-0244
    	CNVD-2020-02196	9.8	https://vulners.com/cnvd/CNVD-2020-02196
    	CNVD-2017-26577	9.8	https://vulners.com/cnvd/CNVD-2017-26577
    	B675EF91-A407-518F-9D46-5325ACF11AAC	9.8	https://vulners.com/githubexploit/B675EF91-A407-518F-9D46-5325ACF11AAC	*EXPLOIT*
    	1337DAY-ID-39921	9.8	https://vulners.com/zdt/1337DAY-ID-39921	*EXPLOIT*
    	POSTGRESQL:CVE-2016-7048	9.3	https://vulners.com/postgresql/POSTGRESQL:CVE-2016-7048
    	CVE-2016-7048	9.3	https://vulners.com/cve/CVE-2016-7048
    	CNVD-2020-02193	9.3	https://vulners.com/cnvd/CNVD-2020-02193
    	POSTGRESQL:CVE-2018-1115	9.1	https://vulners.com/postgresql/POSTGRESQL:CVE-2018-1115
    	POSTGRESQL:CVE-2016-3065	9.1	https://vulners.com/postgresql/POSTGRESQL:CVE-2016-3065
    	CVE-2018-1115	9.1	https://vulners.com/cve/CVE-2018-1115
    	CNVD-2018-13765	9.1	https://vulners.com/cnvd/CNVD-2018-13765
    	POSTGRESQL:CVE-2019-10164	9.0	https://vulners.com/postgresql/POSTGRESQL:CVE-2019-10164
    	CVE-2019-10164	9.0	https://vulners.com/cve/CVE-2019-10164
    	POSTGRESQL:CVE-2026-2006	8.8	https://vulners.com/postgresql/POSTGRESQL:CVE-2026-2006
    	POSTGRESQL:CVE-2026-2005	8.8	https://vulners.com/postgresql/POSTGRESQL:CVE-2026-2005
    	POSTGRESQL:CVE-2026-2004	8.8	https://vulners.com/postgresql/POSTGRESQL:CVE-2026-2004
    	POSTGRESQL:CVE-2025-8715	8.8	https://vulners.com/postgresql/POSTGRESQL:CVE-2025-8715
    	POSTGRESQL:CVE-2025-8714	8.8	https://vulners.com/postgresql/POSTGRESQL:CVE-2025-8714
    	POSTGRESQL:CVE-2024-7348	8.8	https://vulners.com/postgresql/POSTGRESQL:CVE-2024-7348
    	POSTGRESQL:CVE-2024-10979	8.8	https://vulners.com/postgresql/POSTGRESQL:CVE-2024-10979
    	POSTGRESQL:CVE-2023-5869	8.8	https://vulners.com/postgresql/POSTGRESQL:CVE-2023-5869
    	POSTGRESQL:CVE-2023-39417	8.8	https://vulners.com/postgresql/POSTGRESQL:CVE-2023-39417
    	POSTGRESQL:CVE-2022-1552	8.8	https://vulners.com/postgresql/POSTGRESQL:CVE-2022-1552
    	POSTGRESQL:CVE-2021-32027	8.8	https://vulners.com/postgresql/POSTGRESQL:CVE-2021-32027
    	POSTGRESQL:CVE-2020-25695	8.8	https://vulners.com/postgresql/POSTGRESQL:CVE-2020-25695
    	POSTGRESQL:CVE-2020-14349	8.8	https://vulners.com/postgresql/POSTGRESQL:CVE-2020-14349
    	POSTGRESQL:CVE-2019-10208	8.8	https://vulners.com/postgresql/POSTGRESQL:CVE-2019-10208
    	POSTGRESQL:CVE-2019-10127	8.8	https://vulners.com/postgresql/POSTGRESQL:CVE-2019-10127
    	POSTGRESQL:CVE-2018-1058	8.8	https://vulners.com/postgresql/POSTGRESQL:CVE-2018-1058
    	POSTGRESQL:CVE-2017-7547	8.8	https://vulners.com/postgresql/POSTGRESQL:CVE-2017-7547
    	POSTGRESQL:CVE-2015-0243	8.8	https://vulners.com/postgresql/POSTGRESQL:CVE-2015-0243
    	POSTGRESQL:CVE-2015-0242	8.8	https://vulners.com/postgresql/POSTGRESQL:CVE-2015-0242
    	POSTGRESQL:CVE-2015-0241	8.8	https://vulners.com/postgresql/POSTGRESQL:CVE-2015-0241
    	CVE-2022-1552	8.8	https://vulners.com/cve/CVE-2022-1552
    	CVE-2021-32027	8.8	https://vulners.com/cve/CVE-2021-32027
    	CVE-2020-25695	8.8	https://vulners.com/cve/CVE-2020-25695
    	CVE-2019-10127	8.8	https://vulners.com/cve/CVE-2019-10127
    	CVE-2015-0243	8.8	https://vulners.com/cve/CVE-2015-0243
    	CVE-2015-0242	8.8	https://vulners.com/cve/CVE-2015-0242
    	CVE-2015-0241	8.8	https://vulners.com/cve/CVE-2015-0241
    	CNVD-2017-26578	8.8	https://vulners.com/cnvd/CNVD-2017-26578
    	6585F25A-D705-53D3-ADAC-BC4390959601	8.8	https://vulners.com/githubexploit/6585F25A-D705-53D3-ADAC-BC4390959601	*EXPLOIT*
    	SSV:30015	8.5	https://vulners.com/seebug/SSV:30015	*EXPLOIT*
    	SSV:19652	8.5	https://vulners.com/seebug/SSV:19652	*EXPLOIT*
    	POSTGRESQL:CVE-2018-10915	8.5	https://vulners.com/postgresql/POSTGRESQL:CVE-2018-10915
    	POSTGRESQL:CVE-2013-1900	8.5	https://vulners.com/postgresql/POSTGRESQL:CVE-2013-1900
    	POSTGRESQL:CVE-2010-1169	8.5	https://vulners.com/postgresql/POSTGRESQL:CVE-2010-1169
    	CVE-2010-1447	8.5	https://vulners.com/cve/CVE-2010-1447
    	CVE-2010-1169	8.5	https://vulners.com/cve/CVE-2010-1169
    	CNVD-2020-02199	8.5	https://vulners.com/cnvd/CNVD-2020-02199
    	POSTGRESQL:CVE-2016-5423	8.3	https://vulners.com/postgresql/POSTGRESQL:CVE-2016-5423
    	CVE-2016-5423	8.3	https://vulners.com/cve/CVE-2016-5423
    	POSTGRESQL:CVE-2026-2007	8.2	https://vulners.com/postgresql/POSTGRESQL:CVE-2026-2007
    	POSTGRESQL:CVE-2025-1094	8.1	https://vulners.com/postgresql/POSTGRESQL:CVE-2025-1094
    	POSTGRESQL:CVE-2021-23222	8.1	https://vulners.com/postgresql/POSTGRESQL:CVE-2021-23222
    	POSTGRESQL:CVE-2021-23214	8.1	https://vulners.com/postgresql/POSTGRESQL:CVE-2021-23214
    	POSTGRESQL:CVE-2020-25694	8.1	https://vulners.com/postgresql/POSTGRESQL:CVE-2020-25694
    	POSTGRESQL:CVE-2018-10925	8.1	https://vulners.com/postgresql/POSTGRESQL:CVE-2018-10925
    	POSTGRESQL:CVE-2017-15098	8.1	https://vulners.com/postgresql/POSTGRESQL:CVE-2017-15098
    	D0DF9BE5-0FD0-55AD-8B78-C13D7E73820A	8.1	https://vulners.com/githubexploit/D0DF9BE5-0FD0-55AD-8B78-C13D7E73820A	*EXPLOIT*
    	CVE-2021-23214	8.1	https://vulners.com/cve/CVE-2021-23214
    	CVE-2020-25694	8.1	https://vulners.com/cve/CVE-2020-25694
    	CNVD-2020-63992	8.1	https://vulners.com/cnvd/CNVD-2020-63992
    	CNVD-2020-02195	8.1	https://vulners.com/cnvd/CNVD-2020-02195
    	7B12EAF5-EBAC-5606-A1F6-EDF65F8B168D	8.1	https://vulners.com/githubexploit/7B12EAF5-EBAC-5606-A1F6-EDF65F8B168D	*EXPLOIT*
    	53C2CAF7-EEAD-5529-8250-EACEA16708FA	8.1	https://vulners.com/githubexploit/53C2CAF7-EEAD-5529-8250-EACEA16708FA	*EXPLOIT*
    	45CBB37E-6F66-58F4-ABB7-AD79A4446CD8	8.1	https://vulners.com/githubexploit/45CBB37E-6F66-58F4-ABB7-AD79A4446CD8	*EXPLOIT*
    	1E2D7847-DCA6-5603-988F-CCEEF6558320	8.1	https://vulners.com/githubexploit/1E2D7847-DCA6-5603-988F-CCEEF6558320	*EXPLOIT*
    	POSTGRESQL:CVE-2024-0985	8.0	https://vulners.com/postgresql/POSTGRESQL:CVE-2024-0985
    	POSTGRESQL:CVE-2022-2625	8.0	https://vulners.com/postgresql/POSTGRESQL:CVE-2022-2625
    	CVE-2022-2625	8.0	https://vulners.com/cve/CVE-2022-2625
    	POSTGRESQL:CVE-2019-3466	7.8	https://vulners.com/postgresql/POSTGRESQL:CVE-2019-3466
    	POSTGRESQL:CVE-2019-10128	7.8	https://vulners.com/postgresql/POSTGRESQL:CVE-2019-10128
    	CVE-2019-10128	7.8	https://vulners.com/cve/CVE-2019-10128
    	POSTGRESQL:CVE-2020-25696	7.6	https://vulners.com/postgresql/POSTGRESQL:CVE-2020-25696
    	CVE-2020-25696	7.6	https://vulners.com/cve/CVE-2020-25696
    	POSTGRESQL:CVE-2025-8713	7.5	https://vulners.com/postgresql/POSTGRESQL:CVE-2025-8713
    	POSTGRESQL:CVE-2024-10976	7.5	https://vulners.com/postgresql/POSTGRESQL:CVE-2024-10976
    	POSTGRESQL:CVE-2023-2455	7.5	https://vulners.com/postgresql/POSTGRESQL:CVE-2023-2455
    	POSTGRESQL:CVE-2017-7548	7.5	https://vulners.com/postgresql/POSTGRESQL:CVE-2017-7548
    	POSTGRESQL:CVE-2017-7486	7.5	https://vulners.com/postgresql/POSTGRESQL:CVE-2017-7486
    	POSTGRESQL:CVE-2017-7484	7.5	https://vulners.com/postgresql/POSTGRESQL:CVE-2017-7484
    	POSTGRESQL:CVE-2016-2193	7.5	https://vulners.com/postgresql/POSTGRESQL:CVE-2016-2193
    	POSTGRESQL:CVE-2016-0773	7.5	https://vulners.com/postgresql/POSTGRESQL:CVE-2016-0773
    	POSTGRESQL:CVE-2015-3167	7.5	https://vulners.com/postgresql/POSTGRESQL:CVE-2015-3167
    	CVE-2017-7484	7.5	https://vulners.com/cve/CVE-2017-7484
    	CVE-2016-0773	7.5	https://vulners.com/cve/CVE-2016-0773
    	CVE-2016-0768	7.5	https://vulners.com/cve/CVE-2016-0768
    	CVE-2015-3167	7.5	https://vulners.com/cve/CVE-2015-3167
    	CNVD-2017-26579	7.5	https://vulners.com/cnvd/CNVD-2017-26579
    	CNVD-2017-22338	7.5	https://vulners.com/cnvd/CNVD-2017-22338
    	CNVD-2017-06930	7.5	https://vulners.com/cnvd/CNVD-2017-06930
    	POSTGRESQL:CVE-2020-14350	7.3	https://vulners.com/postgresql/POSTGRESQL:CVE-2020-14350
    	POSTGRESQL:CVE-2020-10733	7.3	https://vulners.com/postgresql/POSTGRESQL:CVE-2020-10733
    	EDB-ID:45184	7.3	https://vulners.com/exploitdb/EDB-ID:45184	*EXPLOIT*
    	CVE-2020-14350	7.3	https://vulners.com/cve/CVE-2020-14350
    	CVE-2020-10733	7.3	https://vulners.com/cve/CVE-2020-10733
    	CVE-2017-14798	7.3	https://vulners.com/cve/CVE-2017-14798
    	POSTGRESQL:CVE-2023-2454	7.2	https://vulners.com/postgresql/POSTGRESQL:CVE-2023-2454
    	POSTGRESQL:CVE-2017-12172	7.2	https://vulners.com/postgresql/POSTGRESQL:CVE-2017-12172
    	CVE-2023-2454	7.2	https://vulners.com/cve/CVE-2023-2454
    	POSTGRESQL:CVE-2016-5424	7.1	https://vulners.com/postgresql/POSTGRESQL:CVE-2016-5424
    	CVE-2020-14349	7.1	https://vulners.com/cve/CVE-2020-14349
    	CVE-2016-5424	7.1	https://vulners.com/cve/CVE-2016-5424
    	CNVD-2020-64266	7.1	https://vulners.com/cnvd/CNVD-2020-64266
    	POSTGRESQL:CVE-2019-10210	7.0	https://vulners.com/postgresql/POSTGRESQL:CVE-2019-10210
    	POSTGRESQL:CVE-2018-1053	7.0	https://vulners.com/postgresql/POSTGRESQL:CVE-2018-1053
    	CVE-2019-10210	7.0	https://vulners.com/cve/CVE-2019-10210
    	PACKETSTORM:148884	6.9	https://vulners.com/packetstorm/PACKETSTORM:148884	*EXPLOIT*
    	EXPLOITPACK:6F8D33BC4F1C65AE0911D23B5E6EB665	6.9	https://vulners.com/exploitpack/EXPLOITPACK:6F8D33BC4F1C65AE0911D23B5E6EB665	*EXPLOIT*
    	1337DAY-ID-30875	6.9	https://vulners.com/zdt/1337DAY-ID-30875	*EXPLOIT*
    	SSV:30152	6.8	https://vulners.com/seebug/SSV:30152	*EXPLOIT*
    	POSTGRESQL:CVE-2013-0255	6.8	https://vulners.com/postgresql/POSTGRESQL:CVE-2013-0255
    	POSTGRESQL:CVE-2012-0868	6.8	https://vulners.com/postgresql/POSTGRESQL:CVE-2012-0868
    	POSTGRESQL:CVE-2009-3231	6.8	https://vulners.com/postgresql/POSTGRESQL:CVE-2009-3231
    	CVE-2013-0255	6.8	https://vulners.com/cve/CVE-2013-0255
    	CVE-2012-0868	6.8	https://vulners.com/cve/CVE-2012-0868
    	CVE-2009-3231	6.8	https://vulners.com/cve/CVE-2009-3231
    	SSV:62083	6.5	https://vulners.com/seebug/SSV:62083	*EXPLOIT*
    	SSV:62016	6.5	https://vulners.com/seebug/SSV:62016	*EXPLOIT*
    	SSV:61543	6.5	https://vulners.com/seebug/SSV:61543	*EXPLOIT*
    	SSV:60720	6.5	https://vulners.com/seebug/SSV:60720	*EXPLOIT*
    	SSV:19018	6.5	https://vulners.com/seebug/SSV:19018	*EXPLOIT*
    	SSV:15153	6.5	https://vulners.com/seebug/SSV:15153	*EXPLOIT*
    	SSV:15097	6.5	https://vulners.com/seebug/SSV:15097	*EXPLOIT*
    	SSV:15095	6.5	https://vulners.com/seebug/SSV:15095	*EXPLOIT*
    	POSTGRESQL:CVE-2021-3677	6.5	https://vulners.com/postgresql/POSTGRESQL:CVE-2021-3677
    	POSTGRESQL:CVE-2021-32029	6.5	https://vulners.com/postgresql/POSTGRESQL:CVE-2021-32029
    	POSTGRESQL:CVE-2021-32028	6.5	https://vulners.com/postgresql/POSTGRESQL:CVE-2021-32028
    	POSTGRESQL:CVE-2020-1720	6.5	https://vulners.com/postgresql/POSTGRESQL:CVE-2020-1720
    	POSTGRESQL:CVE-2019-10129	6.5	https://vulners.com/postgresql/POSTGRESQL:CVE-2019-10129
    	POSTGRESQL:CVE-2018-1052	6.5	https://vulners.com/postgresql/POSTGRESQL:CVE-2018-1052
    	POSTGRESQL:CVE-2017-15099	6.5	https://vulners.com/postgresql/POSTGRESQL:CVE-2017-15099
    	POSTGRESQL:CVE-2014-0065	6.5	https://vulners.com/postgresql/POSTGRESQL:CVE-2014-0065
    	POSTGRESQL:CVE-2014-0064	6.5	https://vulners.com/postgresql/POSTGRESQL:CVE-2014-0064
    	POSTGRESQL:CVE-2014-0063	6.5	https://vulners.com/postgresql/POSTGRESQL:CVE-2014-0063
    	POSTGRESQL:CVE-2014-0061	6.5	https://vulners.com/postgresql/POSTGRESQL:CVE-2014-0061
    	POSTGRESQL:CVE-2013-1899	6.5	https://vulners.com/postgresql/POSTGRESQL:CVE-2013-1899
    	POSTGRESQL:CVE-2012-3489	6.5	https://vulners.com/postgresql/POSTGRESQL:CVE-2012-3489
    	POSTGRESQL:CVE-2012-0866	6.5	https://vulners.com/postgresql/POSTGRESQL:CVE-2012-0866
    	POSTGRESQL:CVE-2010-4015	6.5	https://vulners.com/postgresql/POSTGRESQL:CVE-2010-4015
    	POSTGRESQL:CVE-2009-4136	6.5	https://vulners.com/postgresql/POSTGRESQL:CVE-2009-4136
    	POSTGRESQL:CVE-2009-3230	6.5	https://vulners.com/postgresql/POSTGRESQL:CVE-2009-3230
    	PACKETSTORM:180960	6.5	https://vulners.com/packetstorm/PACKETSTORM:180960	*EXPLOIT*
    	MSF:AUXILIARY-SCANNER-POSTGRES-POSTGRES_DBNAME_FLAG_INJECTION-	6.5	https://vulners.com/metasploit/MSF:AUXILIARY-SCANNER-POSTGRES-POSTGRES_DBNAME_FLAG_INJECTION-	*EXPLOIT*
    	CVE-2021-3677	6.5	https://vulners.com/cve/CVE-2021-3677
    	CVE-2021-32029	6.5	https://vulners.com/cve/CVE-2021-32029
    	CVE-2021-32028	6.5	https://vulners.com/cve/CVE-2021-32028
    	CVE-2014-0065	6.5	https://vulners.com/cve/CVE-2014-0065
    	CVE-2014-0064	6.5	https://vulners.com/cve/CVE-2014-0064
    	CVE-2014-0063	6.5	https://vulners.com/cve/CVE-2014-0063
    	CVE-2014-0061	6.5	https://vulners.com/cve/CVE-2014-0061
    	CVE-2012-3489	6.5	https://vulners.com/cve/CVE-2012-3489
    	CVE-2012-0866	6.5	https://vulners.com/cve/CVE-2012-0866
    	CVE-2010-4015	6.5	https://vulners.com/cve/CVE-2010-4015
    	CVE-2010-0442	6.5	https://vulners.com/cve/CVE-2010-0442
    	POSTGRESQL:CVE-2015-5289	6.4	https://vulners.com/postgresql/POSTGRESQL:CVE-2015-5289
    	POSTGRESQL:CVE-2015-5288	6.4	https://vulners.com/postgresql/POSTGRESQL:CVE-2015-5288
    	CVE-2015-5288	6.4	https://vulners.com/cve/CVE-2015-5288
    	POSTGRESQL:CVE-2010-3433	6.0	https://vulners.com/postgresql/POSTGRESQL:CVE-2010-3433
    	POSTGRESQL:CVE-2010-1170	6.0	https://vulners.com/postgresql/POSTGRESQL:CVE-2010-1170
    	CVE-2010-3433	6.0	https://vulners.com/cve/CVE-2010-3433
    	CVE-2010-1170	6.0	https://vulners.com/cve/CVE-2010-1170
    	POSTGRESQL:CVE-2025-4207	5.9	https://vulners.com/postgresql/POSTGRESQL:CVE-2025-4207
    	POSTGRESQL:CVE-2025-12818	5.9	https://vulners.com/postgresql/POSTGRESQL:CVE-2025-12818
    	POSTGRESQL:CVE-2017-7485	5.9	https://vulners.com/postgresql/POSTGRESQL:CVE-2017-7485
    	CVE-2021-23222	5.9	https://vulners.com/cve/CVE-2021-23222
    	CNVD-2017-06931	5.9	https://vulners.com/cnvd/CNVD-2017-06931
    	SSV:15154	5.8	https://vulners.com/seebug/SSV:15154	*EXPLOIT*
    	SSV:15096	5.8	https://vulners.com/seebug/SSV:15096	*EXPLOIT*
    	POSTGRESQL:CVE-2009-4034	5.8	https://vulners.com/postgresql/POSTGRESQL:CVE-2009-4034
    	SSV:19669	5.5	https://vulners.com/seebug/SSV:19669	*EXPLOIT*
    	POSTGRESQL:CVE-2010-1975	5.5	https://vulners.com/postgresql/POSTGRESQL:CVE-2010-1975
    	CVE-2010-1975	5.5	https://vulners.com/cve/CVE-2010-1975
    	CVE-2023-2455	5.4	https://vulners.com/cve/CVE-2023-2455
    	CVE-2011-2483	5.0	https://vulners.com/cve/CVE-2011-2483
    	SSV:61546	4.9	https://vulners.com/seebug/SSV:61546	*EXPLOIT*
    	SSV:60334	4.9	https://vulners.com/seebug/SSV:60334	*EXPLOIT*
    	POSTGRESQL:CVE-2014-0062	4.9	https://vulners.com/postgresql/POSTGRESQL:CVE-2014-0062
    	POSTGRESQL:CVE-2012-3488	4.9	https://vulners.com/postgresql/POSTGRESQL:CVE-2012-3488
    	CVE-2014-0062	4.9	https://vulners.com/cve/CVE-2014-0062
    	CVE-2012-3488	4.9	https://vulners.com/cve/CVE-2012-3488
    	SSV:61544	4.6	https://vulners.com/seebug/SSV:61544	*EXPLOIT*
    	POSTGRESQL:CVE-2014-0067	4.6	https://vulners.com/postgresql/POSTGRESQL:CVE-2014-0067
    	CVE-2014-0067	4.6	https://vulners.com/cve/CVE-2014-0067
    	POSTGRESQL:CVE-2023-5870	4.4	https://vulners.com/postgresql/POSTGRESQL:CVE-2023-5870
    	POSTGRESQL:CVE-2026-2003	4.3	https://vulners.com/postgresql/POSTGRESQL:CVE-2026-2003
    	POSTGRESQL:CVE-2024-4317	4.3	https://vulners.com/postgresql/POSTGRESQL:CVE-2024-4317
    	POSTGRESQL:CVE-2023-5868	4.3	https://vulners.com/postgresql/POSTGRESQL:CVE-2023-5868
    	POSTGRESQL:CVE-2023-39418	4.3	https://vulners.com/postgresql/POSTGRESQL:CVE-2023-39418
    	POSTGRESQL:CVE-2021-3393	4.3	https://vulners.com/postgresql/POSTGRESQL:CVE-2021-3393
    	POSTGRESQL:CVE-2021-20229	4.3	https://vulners.com/postgresql/POSTGRESQL:CVE-2021-20229
    	POSTGRESQL:CVE-2019-10130	4.3	https://vulners.com/postgresql/POSTGRESQL:CVE-2019-10130
    	POSTGRESQL:CVE-2015-3165	4.3	https://vulners.com/postgresql/POSTGRESQL:CVE-2015-3165
    	POSTGRESQL:CVE-2014-8161	4.3	https://vulners.com/postgresql/POSTGRESQL:CVE-2014-8161
    	POSTGRESQL:CVE-2012-2143	4.3	https://vulners.com/postgresql/POSTGRESQL:CVE-2012-2143
    	POSTGRESQL:CVE-2012-0867	4.3	https://vulners.com/postgresql/POSTGRESQL:CVE-2012-0867
    	CVE-2021-3393	4.3	https://vulners.com/cve/CVE-2021-3393
    	CVE-2021-20229	4.3	https://vulners.com/cve/CVE-2021-20229
    	CVE-2015-3165	4.3	https://vulners.com/cve/CVE-2015-3165
    	CVE-2014-8161	4.3	https://vulners.com/cve/CVE-2014-8161
    	CVE-2012-2143	4.3	https://vulners.com/cve/CVE-2012-2143
    	8B99F26F-7E4B-52DB-AEE3-1D5FC0D160CD	4.3	https://vulners.com/gitee/8B99F26F-7E4B-52DB-AEE3-1D5FC0D160CD	*EXPLOIT*
    	06D0C38D-C4BF-53FB-A3AF-F6F83A71A24A	4.3	https://vulners.com/gitee/06D0C38D-C4BF-53FB-A3AF-F6F83A71A24A	*EXPLOIT*
    	POSTGRESQL:CVE-2024-10978	4.2	https://vulners.com/postgresql/POSTGRESQL:CVE-2024-10978
    	SSV:61547	4.0	https://vulners.com/seebug/SSV:61547	*EXPLOIT*
    	SSV:61545	4.0	https://vulners.com/seebug/SSV:61545	*EXPLOIT*
    	SSV:60719	4.0	https://vulners.com/seebug/SSV:60719	*EXPLOIT*
    	SSV:60335	4.0	https://vulners.com/seebug/SSV:60335	*EXPLOIT*
    	SSV:60186	4.0	https://vulners.com/seebug/SSV:60186	*EXPLOIT*
    	SSV:4928	4.0	https://vulners.com/seebug/SSV:4928	*EXPLOIT*
    	POSTGRESQL:CVE-2014-0066	4.0	https://vulners.com/postgresql/POSTGRESQL:CVE-2014-0066
    	POSTGRESQL:CVE-2014-0060	4.0	https://vulners.com/postgresql/POSTGRESQL:CVE-2014-0060
    	POSTGRESQL:CVE-2013-1901	4.0	https://vulners.com/postgresql/POSTGRESQL:CVE-2013-1901
    	POSTGRESQL:CVE-2012-2655	4.0	https://vulners.com/postgresql/POSTGRESQL:CVE-2012-2655
    	POSTGRESQL:CVE-2009-3229	4.0	https://vulners.com/postgresql/POSTGRESQL:CVE-2009-3229
    	POSTGRESQL:CVE-2009-0922	4.0	https://vulners.com/postgresql/POSTGRESQL:CVE-2009-0922
    	CVE-2014-0066	4.0	https://vulners.com/cve/CVE-2014-0066
    	CVE-2014-0060	4.0	https://vulners.com/cve/CVE-2014-0060
    	CVE-2012-2655	4.0	https://vulners.com/cve/CVE-2012-2655
    	CVE-2009-3229	4.0	https://vulners.com/cve/CVE-2009-3229
    	POSTGRESQL:CVE-2024-10977	3.7	https://vulners.com/postgresql/POSTGRESQL:CVE-2024-10977
    	POSTGRESQL:CVE-2022-41862	3.7	https://vulners.com/postgresql/POSTGRESQL:CVE-2022-41862
    	CVE-2022-41862	3.7	https://vulners.com/cve/CVE-2022-41862
    	SSV:19322	3.5	https://vulners.com/seebug/SSV:19322	*EXPLOIT*
    	POSTGRESQL:CVE-2019-10209	3.5	https://vulners.com/postgresql/POSTGRESQL:CVE-2019-10209
    	PACKETSTORM:127092	3.5	https://vulners.com/packetstorm/PACKETSTORM:127092	*EXPLOIT*
    	CVE-2010-0733	3.5	https://vulners.com/cve/CVE-2010-0733
    	POSTGRESQL:CVE-2025-12817	3.1	https://vulners.com/postgresql/POSTGRESQL:CVE-2025-12817 
5900 tcp open vnc  syn-ack VNC    protocol 3.3 
6000 tcp open X11  syn-ack     access denied 
6667 tcp open irc  syn-ack UnrealIRCd     
irc-unrealircd-backdoor 
Looks like trojaned version of unrealircd. See http://seclists.org/fulldisclosure/2010/Jun/277 
8009 tcp open ajp13  syn-ack Apache Jserv    Protocol v1.3 
8180 tcp open http  syn-ack Apache Tomcat/Coyote JSP engine  1.1   
http-server-header 
Apache-Coyote/1.1 
http-enum 
  /admin/: Possible admin folder
  /admin/index.html: Possible admin folder
  /admin/login.html: Possible admin folder
  /admin/admin.html: Possible admin folder
  /admin/account.html: Possible admin folder
  /admin/admin_login.html: Possible admin folder
  /admin/home.html: Possible admin folder
  /admin/admin-login.html: Possible admin folder
  /admin/adminLogin.html: Possible admin folder
  /admin/controlpanel.html: Possible admin folder
  /admin/cp.html: Possible admin folder
  /admin/index.jsp: Possible admin folder
  /admin/login.jsp: Possible admin folder
  /admin/admin.jsp: Possible admin folder
  /admin/home.jsp: Possible admin folder
  /admin/controlpanel.jsp: Possible admin folder
  /admin/admin-login.jsp: Possible admin folder
  /admin/cp.jsp: Possible admin folder
  /admin/account.jsp: Possible admin folder
  /admin/admin_login.jsp: Possible admin folder
  /admin/adminLogin.jsp: Possible admin folder
  /manager/html/upload: Apache Tomcat (401 Unauthorized)
  /manager/html: Apache Tomcat (401 Unauthorized)
  /admin/view/javascript/fckeditor/editor/filemanager/connectors/test.html: OpenCart/FCKeditor File upload
  /admin/includes/FCKeditor/editor/filemanager/upload/test.html: ASP Simple Blog / FCKeditor File Upload
  /admin/jscript/upload.html: Lizard Cart/Remote File upload
  /webdav/: Potentially interesting folder
 
http-dombased-xss 
Couldn't find any DOM based XSS. 
http-stored-xss 
Couldn't find any stored XSS vulnerabilities. 
http-slowloris-check 
  VULNERABLE:
  Slowloris DOS attack
    State: LIKELY VULNERABLE
    IDs:  CVE:CVE-2007-6750
      Slowloris tries to keep many connections to the target web server open and hold
      them open as long as possible.  It accomplishes this by opening connections to
      the target web server and sending a partial request. By doing so, it starves
      the http server's resources causing Denial Of Service.
      
    Disclosure date: 2009-09-17
    References:
      https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6750
      http://ha.ckers.org/slowloris/
 
http-cookie-flags 
  /admin/: 
    JSESSIONID: 
      httponly flag not set
  /admin/index.html: 
    JSESSIONID: 
      httponly flag not set
  /admin/login.html: 
    JSESSIONID: 
      httponly flag not set
  /admin/admin.html: 
    JSESSIONID: 
      httponly flag not set
  /admin/account.html: 
    JSESSIONID: 
      httponly flag not set
  /admin/admin_login.html: 
    JSESSIONID: 
      httponly flag not set
  /admin/home.html: 
    JSESSIONID: 
      httponly flag not set
  /admin/admin-login.html: 
    JSESSIONID: 
      httponly flag not set
  /admin/adminLogin.html: 
    JSESSIONID: 
      httponly flag not set
  /admin/controlpanel.html: 
    JSESSIONID: 
      httponly flag not set
  /admin/cp.html: 
    JSESSIONID: 
      httponly flag not set
  /admin/index.jsp: 
    JSESSIONID: 
      httponly flag not set
  /admin/login.jsp: 
    JSESSIONID: 
      httponly flag not set
  /admin/admin.jsp: 
    JSESSIONID: 
      httponly flag not set
  /admin/home.jsp: 
    JSESSIONID: 
      httponly flag not set
  /admin/controlpanel.jsp: 
    JSESSIONID: 
      httponly flag not set
  /admin/admin-login.jsp: 
    JSESSIONID: 
      httponly flag not set
  /admin/cp.jsp: 
    JSESSIONID: 
      httponly flag not set
  /admin/account.jsp: 
    JSESSIONID: 
      httponly flag not set
  /admin/admin_login.jsp: 
    JSESSIONID: 
      httponly flag not set
  /admin/adminLogin.jsp: 
    JSESSIONID: 
      httponly flag not set
  /admin/view/javascript/fckeditor/editor/filemanager/connectors/test.html: 
    JSESSIONID: 
      httponly flag not set
  /admin/includes/FCKeditor/editor/filemanager/upload/test.html: 
    JSESSIONID: 
      httponly flag not set
  /admin/jscript/upload.html: 
    JSESSIONID: 
      httponly flag not set 
http-csrf 
Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=192.168.0.101
  Found the following possible CSRF vulnerabilities: 
    
    Path: http://192.168.0.101:8180/admin/
    Form id: username
    Form action: j_security_check;jsessionid=1C68621D10B4DFD61F5FCA55FC7436BA
 

Host Script Output

Script Name Output
smb-vuln-ms10-054 
false 
smb-vuln-regsvc-dos 
ERROR: Script execution failed (use -d to debug) 
smb-vuln-ms10-061 
false 

Misc Metrics (click to expand)