Network Vulnerability Assessment Report |
| |
Sorted by host names |
| |||||||||
|
Host | Holes | Warnings | Open ports | State |
192.168.0.90 | 0 | 0 | 1 | Finished |
Service | Severity | Description |
http (80/tcp) | Port is open | |
general/udp | For your information, here is the traceroute from 192.168.0.1 to 192.168.0.90 : 192.168.0.1 192.168.0.90 | |
http (80/tcp) | The following CGI have been discovered : Syntax : cginame (arguments [default value]) /dummy (username [] Password [] Login [Log In] ) /post_login.cgi (data [] ) | |
http (80/tcp) | Synopsis : Remote web server does not reply with 404 error code. Description : This web server is [mis]configured in that it does not return '404 Not Found' error codes when a non-existent file is requested, perhaps returning a site map, search page or authentication page instead. Nessus enabled some counter measures for that, however they might be insufficient. If a great number of security holes are produced for this port, they might not all be accurate Risk factor : None | |
http (80/tcp) | The remote web server type is : Ubicom/1.1 | |
general/tcp | Information about this scan : Nessus version : 2.2.6 Plugin feed version : 200606091215 Type of plugin feed : Registered (7 days delay) Scanner IP : 192.168.0.1 Port scanner(s) : synscan nessus_tcp_scanner Port range : 1-1024 Thorough tests : no Experimental tests : no Paranoia level : 1 Report Verbosity : 1 Safe checks : yes Max hosts : 16 Max checks : 10 Scan Start Date : 2006/6/10 3:27 Scan duration : 463 sec | |
http (80/tcp) | A web server is running on this port |