LAN Daily Report 2025-12-13

Window: 2025-12-12 14:25 — 2025-12-13 14:25
⚠️ SECURITY NOTICE: This report contains sensitive network information
This report includes NSE (Nmap Scripting Engine) scan results that reveal potentially sensitive information about your network infrastructure:
⛔ DO NOT SHARE this report outside your trusted security team or with unauthorized personnel.
Detected sensitive scripts: http-server-header ssh-hostkey http-title ssl-cert
Scans
4
Distinct hosts
3
Open ports (unique)
5

Top Open Ports

PortCount
4432
802
222
1391
1111

Scans

192.0.2.10 (scan id: 166)

Started: 2025-12-13 13:24:31.348856667 +0000 UTC — Finished: 2025-12-13 13:24:43.204412966 +0000 UTC — Type: custom — Open ports: 5
PortProtoStateServiceProduct / VersionNSE Scripts
22 tcp open ssh OpenSSH 2.9p2
vulners: cpe:/a:openbsd:openssh:2.9p2: PACKETSTORM:179290 10.0 https://vulners.com/packetstorm/PACKETSTORM:179290 *EXPLOIT* DF059135-2CF5-5441-8F22-E6EF1DEE5F6E 10.0 https://vulners.com/gitee/DF059135-2CF5-5441-8F22-E6EF1DEE5F6E *EXPLOIT* CVE-2003-0693 10.0 https://vulners.com/cve/CVE-2003-0693 CVE-2002-0640 10.0 https://vulners.com/cve/CVE-2002-0640 CVE-2002-0083 10.0 https://vulners.com/cve/CVE-2002-0083 1EEC8894-D2F7-547C-827C-915BE866875C 10.0 https://vulners.com/githubexploit/1EEC8894-D2F7-547C-827C-915BE866875C *EXPLOIT* PACKETSTORM:173661 9.8 https://vulners.com/packetstorm/PACKETSTORM:173661 *EXPLOIT* F0979183-AE88-53B4-86CF-3AF0523F3807 9.8 https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807 *EXPLOIT* CVE-2023-38408 9.8 https://vulners.com/cve/CVE-2023-38408 CVE-2016-1908 9.8 https://vulners.com/cve/CVE-2016-1908 B8190CDB-3EB9-5631-9828-8064A1575B23 9.8 https://vulners.com/githubexploit/B8190CDB-3EB9-5631-9828-8064A1575B23 *EXPLOIT* 8FC9C5AB-3968-5F3C-825E-E8DB5379A623 9.8 https://vulners.com/githubexploit/8FC9C5AB-3968-5F3C-825E-E8DB5379A623 *EXPLOIT* 8AD01159-548E-546E-AA87-2DE89F3927EC 9.8 https://vulners.com/githubexploit/8AD01159-548E-546E-AA87-2DE89F3927EC *EXPLOIT* 33D623F7-98E0-5F75-80FA-81AA666D1340 9.8 https://vulners.com/githubexploit/33D623F7-98E0-5F75-80FA-81AA666D1340 *EXPLOIT* 2227729D-6700-5C8F-8930-1EEAFD4B9FF0 9.8 https://vulners.com/githubexploit/2227729D-6700-5C8F-8930-1EEAFD4B9FF0 *EXPLOIT* 0221525F-07F5-5790-912D-F4B9E2D1B587 9.8 https://vulners.com/githubexploit/0221525F-07F5-5790-912D-F4B9E2D1B587 *EXPLOIT* F8981437-1287-5B69-93F1-657DFB1DCE59 9.3 https://vulners.com/githubexploit/F8981437-1287-5B69-93F1-657DFB1DCE59 *EXPLOIT* CVE-2006-5051 9.3 https://vulners.com/cve/CVE-2006-5051 CB2926E1-2355-5C82-A42A-D4F72F114F9B 9.3 https://vulners.com/githubexploit/CB2926E1-2355-5C82-A42A-D4F72F114F9B *EXPLOIT* 8DEE261C-33D4-5057-BA46-E4293B705BAE 9.3 https://vulners.com/githubexploit/8DEE261C-33D4-5057-BA46-E4293B705BAE *EXPLOIT* 6FD8F914-B663-533D-8866-23313FD37804 9.3 https://vulners.com/githubexploit/6FD8F914-B663-533D-8866-23313FD37804 *EXPLOIT* CVE-2015-5600 8.5 https://vulners.com/cve/CVE-2015-5600 PACKETSTORM:190587 8.1 https://vulners.com/packetstorm/PACKETSTORM:190587 *EXPLOIT* FB2E9ED1-43D7-585C-A197-0D6628B20134 8.1 https://vulners.com/githubexploit/FB2E9ED1-43D7-585C-A197-0D6628B20134 *EXPLOIT* FA3992CE-9C4C-5350-8134-177126E0BD3F 8.1 https://vulners.com/githubexploit/FA3992CE-9C4C-5350-8134-177126E0BD3F *EXPLOIT* EFD615F0-8F17-5471-AA83-0F491FD497AF 8.1 https://vulners.com/githubexploit/EFD615F0-8F17-5471-AA83-0F491FD497AF *EXPLOIT* EC20B9C2-6857-5848-848A-A9F430D13EEB 8.1 https://vulners.com/githubexploit/EC20B9C2-6857-5848-848A-A9F430D13EEB *EXPLOIT* EB13CBD6-BC93-5F14-A210-AC0B5A1D8572 8.1 https://vulners.com/githubexploit/EB13CBD6-BC93-5F14-A210-AC0B5A1D8572 *EXPLOIT* E543E274-C20A-582A-8F8E-F8E3F381C345 8.1 https://vulners.com/githubexploit/E543E274-C20A-582A-8F8E-F8E3F381C345 *EXPLOIT* E34FCCEC-226E-5A46-9B1C-BCD6EF7D3257 8.1 https://vulners.com/githubexploit/E34FCCEC-226E-5A46-9B1C-BCD6EF7D3257 *EXPLOIT* E24EEC0A-40F7-5BBC-9E4D-7B13522FF915 8.1 https://vulners.com/githubexploit/E24EEC0A-40F7-5BBC-9E4D-7B13522FF915 *EXPLOIT* DC1BB99A-8B57-5EE5-9AC4-3D9D59BFC346 8.1 https://vulners.com/githubexploit/DC1BB99A-8B57-5EE5-9AC4-3D9D59BFC346 *EXPLOIT* DA18D761-BB81-54B6-85CB-CFD73CE33621 8.1 https://vulners.com/githubexploit/DA18D761-BB81-54B6-85CB-CFD73CE33621 *EXPLOIT* D8974199-6B08-5895-9610-919F71468F23 8.1 https://vulners.com/githubexploit/D8974199-6B08-5895-9610-919F71468F23 *EXPLOIT* D52370EF-02EE-507D-9212-2D8EA86CBA94 8.1 https://vulners.com/githubexploit/D52370EF-02EE-507D-9212-2D8EA86CBA94 *EXPLOIT* CVE-2024-6387 8.1 https://vulners.com/cve/CVE-2024-6387 CFEBF7AF-651A-5302-80B8-F8146D5B33A6 8.1 https://vulners.com/githubexploit/CFEBF7AF-651A-5302-80B8-F8146D5B33A6 *EXPLOIT* C6FB6D50-F71D-5870-B671-D6A09A95627F 8.1 https://vulners.com/githubexploit/C6FB6D50-F71D-5870-B671-D6A09A95627F *EXPLOIT* C623D558-C162-5D17-88A5-4799A2BEC001 8.1 https://vulners.com/githubexploit/C623D558-C162-5D17-88A5-4799A2BEC001 *EXPLOIT* C5B2D4A1-8C3B-5FF7-B620-EDE207B027A0 8.1 https://vulners.com/githubexploit/C5B2D4A1-8C3B-5FF7-B620-EDE207B027A0 *EXPLOIT* C185263E-3E67-5550-B9C0-AB9C15351960 8.1 https://vulners.com/githubexploit/C185263E-3E67-5550-B9C0-AB9C15351960 *EXPLOIT* BDA609DA-6936-50DC-A325-19FE2CC68562 8.1 https://vulners.com/githubexploit/BDA609DA-6936-50DC-A325-19FE2CC68562 *EXPLOIT* BA3887BD-F579-53B1-A4A4-FF49E953E1C0 8.1 https://vulners.com/githubexploit/BA3887BD-F579-53B1-A4A4-FF49E953E1C0 *EXPLOIT* B1F444E0-F217-5FC0-B266-EBD48589940F 8.1 https://vulners.com/githubexploit/B1F444E0-F217-5FC0-B266-EBD48589940F *EXPLOIT* 92254168-3B26-54C9-B9BE-B4B7563586B5 8.1 https://vulners.com/githubexploit/92254168-3B26-54C9-B9BE-B4B7563586B5 *EXPLOIT* 91752937-D1C1-5913-A96F-72F8B8AB4280 8.1 https://vulners.com/githubexploit/91752937-D1C1-5913-A96F-72F8B8AB4280 *EXPLOIT* 90104C60-A887-5437-8521-545277685F55 8.1 https://vulners.com/githubexploit/90104C60-A887-5437-8521-545277685F55 *EXPLOIT* 89F96BAB-1624-51B5-B09E-E771D918D1E6 8.1 https://vulners.com/githubexploit/89F96BAB-1624-51B5-B09E-E771D918D1E6 *EXPLOIT* 81F0C05A-8650-5DE8-97E9-0D89F1807E5D 8.1 https://vulners.com/githubexploit/81F0C05A-8650-5DE8-97E9-0D89F1807E5D *EXPLOIT* 7C7167AF-E780-5506-BEFA-02E5362E8E48 8.1 https://vulners.com/githubexploit/7C7167AF-E780-5506-BEFA-02E5362E8E48 *EXPLOIT* 79FE1ED7-EB3D-5978-A12E-AAB1FFECCCAC 8.1 https://vulners.com/githubexploit/79FE1ED7-EB3D-5978-A12E-AAB1FFECCCAC *EXPLOIT* 795762E3-BAB4-54C6-B677-83B0ACC2B163 8.1 https://vulners.com/githubexploit/795762E3-BAB4-54C6-B677-83B0ACC2B163 *EXPLOIT* 774022BB-71DA-57C4-9B8F-E21D667DE4BC 8.1 https://vulners.com/githubexploit/774022BB-71DA-57C4-9B8F-E21D667DE4BC *EXPLOIT* 743E5025-3BB8-5EC4-AC44-2AA679730661 8.1 https://vulners.com/githubexploit/743E5025-3BB8-5EC4-AC44-2AA679730661 *EXPLOIT* 73A19EF9-346D-5B2B-9792-05D9FE3414E2 8.1 https://vulners.com/githubexploit/73A19EF9-346D-5B2B-9792-05D9FE3414E2 *EXPLOIT* 6E81EAE5-2156-5ACB-9046-D792C7FAF698 8.1 https://vulners.com/githubexploit/6E81EAE5-2156-5ACB-9046-D792C7FAF698 *EXPLOIT* 6B78D204-22B0-5D11-8A0C-6313958B473F 8.1 https://vulners.com/githubexploit/6B78D204-22B0-5D11-8A0C-6313958B473F *EXPLOIT* 65650BAD-813A-565D-953D-2E7932B26094 8.1 https://vulners.com/githubexploit/65650BAD-813A-565D-953D-2E7932B26094 *EXPLOIT* 649197A2-0224-5B5C-9C4E-B5791D42A9FB 8.1 https://vulners.com/githubexploit/649197A2-0224-5B5C-9C4E-B5791D42A9FB *EXPLOIT* 61DDEEE4-2146-5E84-9804-B780AA73E33C 8.1 https://vulners.com/githubexploit/61DDEEE4-2146-5E84-9804-B780AA73E33C *EXPLOIT* 608FA50C-AEA1-5A83-8297-A15FC7D32A7C 8.1 https://vulners.com/githubexploit/608FA50C-AEA1-5A83-8297-A15FC7D32A7C *EXPLOIT* 5D2CB1F8-DC04-5545-8BC7-29EE3DA8890E 8.1 https://vulners.com/githubexploit/5D2CB1F8-DC04-5545-8BC7-29EE3DA8890E *EXPLOIT* 5C81C5C1-22D4-55B3-B843-5A9A60AAB6FD 8.1 https://vulners.com/githubexploit/5C81C5C1-22D4-55B3-B843-5A9A60AAB6FD *EXPLOIT* 53BCD84F-BD22-5C9D-95B6-4B83627AB37F 8.1 https://vulners.com/githubexploit/53BCD84F-BD22-5C9D-95B6-4B83627AB37F *EXPLOIT* 4FB01B00-F993-5CAF-BD57-D7E290D10C1F 8.1 https://vulners.com/githubexploit/4FB01B00-F993-5CAF-BD57-D7E290D10C1F *EXPLOIT* 48603E8F-B170-57EE-85B9-67A7D9504891 8.1 https://vulners.com/githubexploit/48603E8F-B170-57EE-85B9-67A7D9504891 *EXPLOIT* 4748B283-C2F6-5924-8241-342F98EEC2EE 8.1 https://vulners.com/githubexploit/4748B283-C2F6-5924-8241-342F98EEC2EE *EXPLOIT* 452ADB71-199C-561E-B949-FCDE6288B925 8.1 https://vulners.com/githubexploit/452ADB71-199C-561E-B949-FCDE6288B925 *EXPLOIT* 331B2B7F-FB25-55DB-B7A4-602E42448DB7 8.1 https://vulners.com/githubexploit/331B2B7F-FB25-55DB-B7A4-602E42448DB7 *EXPLOIT* 1FFDA397-F480-5C74-90F3-060E1FE11B2E 8.1 https://vulners.com/githubexploit/1FFDA397-F480-5C74-90F3-060E1FE11B2E *EXPLOIT* 1FA2B3DD-FC8F-5602-A1C9-2CF3F9536563 8.1 https://vulners.com/githubexploit/1FA2B3DD-FC8F-5602-A1C9-2CF3F9536563 *EXPLOIT* 1F7A6000-9E6D-511C-B0F6-7CADB7200761 8.1 https://vulners.com/githubexploit/1F7A6000-9E6D-511C-B0F6-7CADB7200761 *EXPLOIT* 1CF00BB8-B891-5347-A2DC-2C6A6BFF7C99 8.1 https://vulners.com/githubexploit/1CF00BB8-B891-5347-A2DC-2C6A6BFF7C99 *EXPLOIT* 1AB9F1F4-9798-59A0-9213-1D907E81E7F6 8.1 https://vulners.com/githubexploit/1AB9F1F4-9798-59A0-9213-1D907E81E7F6 *EXPLOIT* 179F72B6-5619-52B5-A040-72F1ECE6CDD8 8.1 https://vulners.com/githubexploit/179F72B6-5619-52B5-A040-72F1ECE6CDD8 *EXPLOIT* 15C36683-070A-5CC1-B21F-5F0BF974D9D3 8.1 https://vulners.com/githubexploit/15C36683-070A-5CC1-B21F-5F0BF974D9D3 *EXPLOIT* 1337DAY-ID-39674 8.1 https://vulners.com/zdt/1337DAY-ID-39674 *EXPLOIT* 11F020AC-F907-5606-8805-0516E06160EE 8.1 https://vulners.com/githubexploit/11F020AC-F907-5606-8805-0516E06160EE *EXPLOIT* 0FC4BE81-312B-51F4-9D9B-66D8B5C093CD 8.1 https://vulners.com/githubexploit/0FC4BE81-312B-51F4-9D9B-66D8B5C093CD *EXPLOIT* 0B165049-2374-5E2A-A27C-008BEA3D13F7 8.1 https://vulners.com/githubexploit/0B165049-2374-5E2A-A27C-008BEA3D13F7 *EXPLOIT* 08144020-2B5F-5EB9-9286-1ABD5477278E 8.1 https://vulners.com/githubexploit/08144020-2B5F-5EB9-9286-1ABD5477278E *EXPLOIT* SSV:78173 7.8 https://vulners.com/seebug/SSV:78173 *EXPLOIT* SSV:69983 7.8 https://vulners.com/seebug/SSV:69983 *EXPLOIT* PACKETSTORM:98796 7.8 https://vulners.com/packetstorm/PACKETSTORM:98796 *EXPLOIT* PACKETSTORM:94556 7.8 https://vulners.com/packetstorm/PACKETSTORM:94556 *EXPLOIT* PACKETSTORM:140070 7.8 https://vulners.com/packetstorm/PACKETSTORM:140070 *EXPLOIT* PACKETSTORM:101052 7.8 https://vulners.com/packetstorm/PACKETSTORM:101052 *EXPLOIT* EXPLOITPACK:71D51B69AA2D3A74753D7A921EE79985 7.8 https://vulners.com/exploitpack/EXPLOITPACK:71D51B69AA2D3A74753D7A921EE79985 *EXPLOIT* EXPLOITPACK:67F6569F63A082199721C069C852BBD7 7.8 https://vulners.com/exploitpack/EXPLOITPACK:67F6569F63A082199721C069C852BBD7 *EXPLOIT* EXPLOITPACK:5BCA798C6BA71FAE29334297EC0B6A09 7.8 https://vulners.com/exploitpack/EXPLOITPACK:5BCA798C6BA71FAE29334297EC0B6A09 *EXPLOIT* EDB-ID:40888 7.8 https://vulners.com/exploitdb/EDB-ID:40888 *EXPLOIT* EDB-ID:24450 7.8 https://vulners.com/exploitdb/EDB-ID:24450 *EXPLOIT* EDB-ID:15215 7.8 https://vulners.com/exploitdb/EDB-ID:15215 *EXPLOIT* CVE-2020-15778 7.8 https://vulners.com/cve/CVE-2020-15778 CVE-2016-6515 7.8 https://vulners.com/cve/CVE-2016-6515 CVE-2016-10012 7.8 https://vulners.com/cve/CVE-2016-10012 CVE-2015-8325 7.8 https://vulners.com/cve/CVE-2015-8325 CVE-2006-4924 7.8 https://vulners.com/cve/CVE-2006-4924 C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3 7.8 https://vulners.com/githubexploit/C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3 *EXPLOIT* 312165E3-7FD9-5769-BDA3-4129BE9114D6 7.8 https://vulners.com/githubexploit/312165E3-7FD9-5769-BDA3-4129BE9114D6 *EXPLOIT* 2E719186-2FED-58A8-A150-762EFBAAA523 7.8 https://vulners.com/gitee/2E719186-2FED-58A8-A150-762EFBAAA523 *EXPLOIT* 23CC97BE-7C95-513B-9E73-298C48D74432 7.8 https://vulners.com/githubexploit/23CC97BE-7C95-513B-9E73-298C48D74432 *EXPLOIT* 1337DAY-ID-26494 7.8 https://vulners.com/zdt/1337DAY-ID-26494 *EXPLOIT* 10213DBE-F683-58BB-B6D3-353173626207 7.8 https://vulners.com/githubexploit/10213DBE-F683-58BB-B6D3-353173626207 *EXPLOIT* CVE-2003-1562 7.6 https://vulners.com/cve/CVE-2003-1562 SSV:92579 7.5 https://vulners.com/seebug/SSV:92579 *EXPLOIT* SSV:61450 7.5 https://vulners.com/seebug/SSV:61450 *EXPLOIT* CVE-2016-10708 7.5 https://vulners.com/cve/CVE-2016-10708 CVE-2016-10009 7.5 https://vulners.com/cve/CVE-2016-10009 CVE-2014-1692 7.5 https://vulners.com/cve/CVE-2014-1692 CVE-2010-4478 7.5 https://vulners.com/cve/CVE-2010-4478 CVE-2007-4752 7.5 https://vulners.com/cve/CVE-2007-4752 CVE-2006-5794 7.5 https://vulners.com/cve/CVE-2006-5794 CVE-2003-0695 7.5 https://vulners.com/cve/CVE-2003-0695 CVE-2003-0682 7.5 https://vulners.com/cve/CVE-2003-0682 CVE-2002-0575 7.5 https://vulners.com/cve/CVE-2002-0575 CVE-2001-1459 7.5 https://vulners.com/cve/CVE-2001-1459 CVE-2001-1380 7.5 https://vulners.com/cve/CVE-2001-1380 CVE-2001-0816 7.5 https://vulners.com/cve/CVE-2001-0816 CF52FA19-B5DB-5D14-B50F-2411851976E2 7.5 https://vulners.com/githubexploit/CF52FA19-B5DB-5D14-B50F-2411851976E2 *EXPLOIT* 1337DAY-ID-26576 7.5 https://vulners.com/zdt/1337DAY-ID-26576 *EXPLOIT* SSV:92582 7.2 https://vulners.com/seebug/SSV:92582 *EXPLOIT* CVE-2001-0872 7.2 https://vulners.com/cve/CVE-2001-0872 CVE-2001-0529 7.2 https://vulners.com/cve/CVE-2001-0529 CVE-2016-10010 7.0 https://vulners.com/cve/CVE-2016-10010 SSV:92580 6.9 https://vulners.com/seebug/SSV:92580 *EXPLOIT* CVE-2015-6564 6.9 https://vulners.com/cve/CVE-2015-6564 1337DAY-ID-26577 6.9 https://vulners.com/zdt/1337DAY-ID-26577 *EXPLOIT* EDB-ID:46516 6.8 https://vulners.com/exploitdb/EDB-ID:46516 *EXPLOIT* EDB-ID:46193 6.8 https://vulners.com/exploitdb/EDB-ID:46193 *EXPLOIT* CVE-2019-6110 6.8 https://vulners.com/cve/CVE-2019-6110 CVE-2019-6109 6.8 https://vulners.com/cve/CVE-2019-6109 1337DAY-ID-32328 6.8 https://vulners.com/zdt/1337DAY-ID-32328 *EXPLOIT* 1337DAY-ID-32009 6.8 https://vulners.com/zdt/1337DAY-ID-32009 *EXPLOIT* D104D2BF-ED22-588B-A9B2-3CCC562FE8C0 6.5 https://vulners.com/githubexploit/D104D2BF-ED22-588B-A9B2-3CCC562FE8C0 *EXPLOIT* CVE-2023-51385 6.5 https://vulners.com/cve/CVE-2023-51385 C07ADB46-24B8-57B7-B375-9C761F4750A2 6.5 https://vulners.com/githubexploit/C07ADB46-24B8-57B7-B375-9C761F4750A2 *EXPLOIT* A88CDD3E-67CC-51CC-97FB-AB0CACB6B08C 6.5 https://vulners.com/githubexploit/A88CDD3E-67CC-51CC-97FB-AB0CACB6B08C *EXPLOIT* 65B15AA1-2A8D-53C1-9499-69EBA3619F1C 6.5 https://vulners.com/githubexploit/65B15AA1-2A8D-53C1-9499-69EBA3619F1C *EXPLOIT* 5325A9D6-132B-590C-BDEF-0CB105252732 6.5 https://vulners.com/gitee/5325A9D6-132B-590C-BDEF-0CB105252732 *EXPLOIT* 530326CF-6AB3-5643-AA16-73DC8CB44742 6.5 https://vulners.com/githubexploit/530326CF-6AB3-5643-AA16-73DC8CB44742 *EXPLOIT* EDB-ID:40858 6.4 https://vulners.com/exploitdb/EDB-ID:40858 *EXPLOIT* EDB-ID:40119 6.4 https://vulners.com/exploitdb/EDB-ID:40119 *EXPLOIT* EDB-ID:39569 6.4 https://vulners.com/exploitdb/EDB-ID:39569 *EXPLOIT* CVE-2016-3115 6.4 https://vulners.com/cve/CVE-2016-3115 CVE-2004-1653 6.4 https://vulners.com/cve/CVE-2004-1653 PACKETSTORM:181223 5.9 https://vulners.com/packetstorm/PACKETSTORM:181223 *EXPLOIT* MSF:AUXILIARY-SCANNER-SSH-SSH_ENUMUSERS- 5.9 https://vulners.com/metasploit/MSF:AUXILIARY-SCANNER-SSH-SSH_ENUMUSERS- *EXPLOIT* EDB-ID:40136 5.9 https://vulners.com/exploitdb/EDB-ID:40136 *EXPLOIT* EDB-ID:40113 5.9 https://vulners.com/exploitdb/EDB-ID:40113 *EXPLOIT* CVE-2023-48795 5.9 https://vulners.com/cve/CVE-2023-48795 CVE-2019-6111 5.9 https://vulners.com/cve/CVE-2019-6111 CVE-2016-6210 5.9 https://vulners.com/cve/CVE-2016-6210 A02ABE85-E4E3-5852-A59D-DF288CB8160A 5.9 https://vulners.com/githubexploit/A02ABE85-E4E3-5852-A59D-DF288CB8160A *EXPLOIT* SSV:61911 5.8 https://vulners.com/seebug/SSV:61911 *EXPLOIT* EXPLOITPACK:98FE96309F9524B8C84C508837551A19 5.8 https://vulners.com/exploitpack/EXPLOITPACK:98FE96309F9524B8C84C508837551A19 *EXPLOIT* EXPLOITPACK:5330EA02EBDE345BFC9D6DDDD97F9E97 5.8 https://vulners.com/exploitpack/EXPLOITPACK:5330EA02EBDE345BFC9D6DDDD97F9E97 *EXPLOIT* CVE-2014-2653 5.8 https://vulners.com/cve/CVE-2014-2653 CVE-2014-2532 5.8 https://vulners.com/cve/CVE-2014-2532 SSV:91041 5.5 https://vulners.com/seebug/SSV:91041 *EXPLOIT* PACKETSTORM:140019 5.5 https://vulners.com/packetstorm/PACKETSTORM:140019 *EXPLOIT* PACKETSTORM:136251 5.5 https://vulners.com/packetstorm/PACKETSTORM:136251 *EXPLOIT* PACKETSTORM:136234 5.5 https://vulners.com/packetstorm/PACKETSTORM:136234 *EXPLOIT* EXPLOITPACK:F92411A645D85F05BDBD274FD222226F 5.5 https://vulners.com/exploitpack/EXPLOITPACK:F92411A645D85F05BDBD274FD222226F *EXPLOIT* EXPLOITPACK:9F2E746846C3C623A27A441281EAD138 5.5 https://vulners.com/exploitpack/EXPLOITPACK:9F2E746846C3C623A27A441281EAD138 *EXPLOIT* EXPLOITPACK:1902C998CBF9154396911926B4C3B330 5.5 https://vulners.com/exploitpack/EXPLOITPACK:1902C998CBF9154396911926B4C3B330 *EXPLOIT* CVE-2016-10011 5.5 https://vulners.com/cve/CVE-2016-10011 1337DAY-ID-25388 5.5 https://vulners.com/zdt/1337DAY-ID-25388 *EXPLOIT* FD18B68B-C0A6-562E-A8C8-781B225F15B0 5.3 https://vulners.com/githubexploit/FD18B68B-C0A6-562E-A8C8-781B225F15B0 *EXPLOIT* EDB-ID:45939 5.3 https://vulners.com/exploitdb/EDB-ID:45939 *EXPLOIT* EDB-ID:45233 5.3 https://vulners.com/exploitdb/EDB-ID:45233 *EXPLOIT* E9EC0911-E2E1-52A7-B2F4-D0065C6A3057 5.3 https://vulners.com/githubexploit/E9EC0911-E2E1-52A7-B2F4-D0065C6A3057 *EXPLOIT* CVE-2018-20685 5.3 https://vulners.com/cve/CVE-2018-20685 CVE-2018-15473 5.3 https://vulners.com/cve/CVE-2018-15473 CVE-2017-15906 5.3 https://vulners.com/cve/CVE-2017-15906 CVE-2016-20012 5.3 https://vulners.com/cve/CVE-2016-20012 CNVD-2018-20962 5.3 https://vulners.com/cnvd/CNVD-2018-20962 CNVD-2018-20960 5.3 https://vulners.com/cnvd/CNVD-2018-20960 A9E6F50E-E7FC-51D0-9C93-A43461469FA2 5.3 https://vulners.com/githubexploit/A9E6F50E-E7FC-51D0-9C93-A43461469FA2 *EXPLOIT* A801235B-9835-5BA8-B8FE-23B7FFCABD66 5.3 https://vulners.com/githubexploit/A801235B-9835-5BA8-B8FE-23B7FFCABD66 *EXPLOIT* 8DD1D813-FD5A-5B26-867A-CE7CAC9FEEDF 5.3 https://vulners.com/gitee/8DD1D813-FD5A-5B26-867A-CE7CAC9FEEDF *EXPLOIT* 4F2FBB06-E601-5EAD-9679-3395D24057DD 5.3 https://vulners.com/githubexploit/4F2FBB06-E601-5EAD-9679-3395D24057DD *EXPLOIT* 486BB6BC-9C26-597F-B865-D0E904FDA984 5.3 https://vulners.com/githubexploit/486BB6BC-9C26-597F-B865-D0E904FDA984 *EXPLOIT* 2385176A-820F-5469-AB09-C340264F2B2F 5.3 https://vulners.com/gitee/2385176A-820F-5469-AB09-C340264F2B2F *EXPLOIT* 1337DAY-ID-31730 5.3 https://vulners.com/zdt/1337DAY-ID-31730 *EXPLOIT* SSV:64479 5.0 https://vulners.com/seebug/SSV:64479 *EXPLOIT* SSV:6192 5.0 https://vulners.com/seebug/SSV:6192 *EXPLOIT* SSV:60656 5.0 https://vulners.com/seebug/SSV:60656 *EXPLOIT* SSV:16847 5.0 https://vulners.com/seebug/SSV:16847 *EXPLOIT* SSH_ENUM 5.0 https://vulners.com/canvas/SSH_ENUM *EXPLOIT* PACKETSTORM:73600 5.0 https://vulners.com/packetstorm/PACKETSTORM:73600 *EXPLOIT* PACKETSTORM:54435 5.0 https://vulners.com/packetstorm/PACKETSTORM:54435 *EXPLOIT* PACKETSTORM:150621 5.0 https://vulners.com/packetstorm/PACKETSTORM:150621 *EXPLOIT* EXPLOITPACK:F957D7E8A0CC1E23C3C649B764E13FB0 5.0 https://vulners.com/exploitpack/EXPLOITPACK:F957D7E8A0CC1E23C3C649B764E13FB0 *EXPLOIT* EXPLOITPACK:EBDBC5685E3276D648B4D14B75563283 5.0 https://vulners.com/exploitpack/EXPLOITPACK:EBDBC5685E3276D648B4D14B75563283 *EXPLOIT* EXPLOITPACK:63CFD85A8DA29BF22328E65C685CBBA3 5.0 https://vulners.com/exploitpack/EXPLOITPACK:63CFD85A8DA29BF22328E65C685CBBA3 *EXPLOIT* EDB-ID:3303 5.0 https://vulners.com/exploitdb/EDB-ID:3303 *EXPLOIT* CVE-2010-5107 5.0 https://vulners.com/cve/CVE-2010-5107 CVE-2008-4109 5.0 https://vulners.com/cve/CVE-2008-4109 CVE-2007-2243 5.0 https://vulners.com/cve/CVE-2007-2243 CVE-2006-5052 5.0 https://vulners.com/cve/CVE-2006-5052 CVE-2003-0190 5.0 https://vulners.com/cve/CVE-2003-0190 CVE-2001-1382 5.0 https://vulners.com/cve/CVE-2001-1382 EXPLOITPACK:802AF3229492E147A5F09C7F2B27C6DF 4.3 https://vulners.com/exploitpack/EXPLOITPACK:802AF3229492E147A5F09C7F2B27C6DF *EXPLOIT* EXPLOITPACK:5652DDAA7FE452E19AC0DC1CD97BA3EF 4.3 https://vulners.com/exploitpack/EXPLOITPACK:5652DDAA7FE452E19AC0DC1CD97BA3EF *EXPLOIT* CVE-2015-5352 4.3 https://vulners.com/cve/CVE-2015-5352 1337DAY-ID-25440 4.3 https://vulners.com/zdt/1337DAY-ID-25440 *EXPLOIT* 1337DAY-ID-25438 4.3 https://vulners.com/zdt/1337DAY-ID-25438 *EXPLOIT* CVE-2010-4755 4.0 https://vulners.com/cve/CVE-2010-4755 CVE-2021-36368 3.7 https://vulners.com/cve/CVE-2021-36368 CVE-2025-61985 3.6 https://vulners.com/cve/CVE-2025-61985 CVE-2025-61984 3.6 https://vulners.com/cve/CVE-2025-61984 B7EACB4F-A5CF-5C5A-809F-E03CCE2AB150 3.6 https://vulners.com/githubexploit/B7EACB4F-A5CF-5C5A-809F-E03CCE2AB150 *EXPLOIT* 4C6E2182-0E99-5626-83F6-1646DD648C57 3.6 https://vulners.com/githubexploit/4C6E2182-0E99-5626-83F6-1646DD648C57 *EXPLOIT* CVE-2012-0814 3.5 https://vulners.com/cve/CVE-2012-0814 CVE-2011-5000 3.5 https://vulners.com/cve/CVE-2011-5000 SSV:92581 2.1 https://vulners.com/seebug/SSV:92581 *EXPLOIT* CVE-2011-4327 2.1 https://vulners.com/cve/CVE-2011-4327 CVE-2015-6563 1.9 https://vulners.com/cve/CVE-2015-6563 CVE-2008-3259 1.2 https://vulners.com/cve/CVE-2008-3259 PACKETSTORM:151227 0.0 https://vulners.com/packetstorm/PACKETSTORM:151227 *EXPLOIT* PACKETSTORM:140261 0.0 https://vulners.com/packetstorm/PACKETSTORM:140261 *EXPLOIT* PACKETSTORM:138006 0.0 https://vulners.com/packetstorm/PACKETSTORM:138006 *EXPLOIT* PACKETSTORM:137942 0.0 https://vulners.com/packetstorm/PACKETSTORM:137942 *EXPLOIT* 1337DAY-ID-8837 0.0 https://vulners.com/zdt/1337DAY-ID-8837 *EXPLOIT* 1337DAY-ID-30937 0.0 https://vulners.com/zdt/1337DAY-ID-30937 *EXPLOIT* 1337DAY-ID-26468 0.0 https://vulners.com/zdt/1337DAY-ID-26468 *EXPLOIT* 1337DAY-ID-25391 0.0 https://vulners.com/zdt/1337DAY-ID-25391 *EXPLOIT* 1337DAY-ID-20301 0.0 https://vulners.com/zdt/1337DAY-ID-20301 *EXPLOIT* 1337DAY-ID-14373 0.0 https://vulners.com/zdt/1337DAY-ID-14373 *EXPLOIT*
80 tcp open http Apache httpd 1.3.20
http-server-header: Apache/1.3.20 (Unix) (Red-Hat/Linux) mod_ssl/2.8.4 OpenSSL/0.9.6b
vulners: cpe:/a:apache:http_server:1.3.20: 3E6BA608-776F-5B1F-9BA5-589CD2A5A351 10.0 https://vulners.com/gitee/3E6BA608-776F-5B1F-9BA5-589CD2A5A351 *EXPLOIT* HTTPD:B060BFAA862DD69F70DB2412EAE10DE9 7.8 https://vulners.com/httpd/HTTPD:B060BFAA862DD69F70DB2412EAE10DE9 CVE-2004-0940 7.8 https://vulners.com/cve/CVE-2004-0940 CVE-2002-2272 7.8 https://vulners.com/cve/CVE-2002-2272 SAINT:CE48F764F3535D6A2E3CBFC45B9F2609 7.5 https://vulners.com/saint/SAINT:CE48F764F3535D6A2E3CBFC45B9F2609 *EXPLOIT* SAINT:B6E89161F5A85A6F227960760297B726 7.5 https://vulners.com/saint/SAINT:B6E89161F5A85A6F227960760297B726 *EXPLOIT* SAINT:66E6068403B214B34CB01EE316C37B76 7.5 https://vulners.com/saint/SAINT:66E6068403B214B34CB01EE316C37B76 *EXPLOIT* SAINT:399EF180849727C5C8C2DB4378F050B0 7.5 https://vulners.com/saint/SAINT:399EF180849727C5C8C2DB4378F050B0 *EXPLOIT* PACKETSTORM:82996 7.5 https://vulners.com/packetstorm/PACKETSTORM:82996 *EXPLOIT* PACKETSTORM:25903 7.5 https://vulners.com/packetstorm/PACKETSTORM:25903 *EXPLOIT* MSF:EXPLOIT-WINDOWS-HTTP-APACHE_CHUNKED- 7.5 https://vulners.com/metasploit/MSF:EXPLOIT-WINDOWS-HTTP-APACHE_CHUNKED- *EXPLOIT* HTTPD:F8A6D0BE32E8353C52553E534ACD54F2 7.5 https://vulners.com/httpd/HTTPD:F8A6D0BE32E8353C52553E534ACD54F2 HTTPD:EA65344DAE2D5CDBD3227D99A03949E9 7.5 https://vulners.com/httpd/HTTPD:EA65344DAE2D5CDBD3227D99A03949E9 HTTPD:D01668C98F25B264C0900574B64E76CC 7.5 https://vulners.com/httpd/HTTPD:D01668C98F25B264C0900574B64E76CC HTTPD:67FAF457E140172987C21E55FCF24788 7.5 https://vulners.com/httpd/HTTPD:67FAF457E140172987C21E55FCF24788 HTTPD:254F7DAB3540D08B5D1CD93AB44C8838 7.5 https://vulners.com/httpd/HTTPD:254F7DAB3540D08B5D1CD93AB44C8838 HTTPD:0576286DB2485FBB76346020044ABE4A 7.5 https://vulners.com/httpd/HTTPD:0576286DB2485FBB76346020044ABE4A EDB-ID:16782 7.5 https://vulners.com/exploitdb/EDB-ID:16782 *EXPLOIT* CVE-2004-1082 7.5 https://vulners.com/cve/CVE-2004-1082 CVE-2003-0993 7.5 https://vulners.com/cve/CVE-2003-0993 CVE-2003-0987 7.5 https://vulners.com/cve/CVE-2003-0987 CVE-2002-2029 7.5 https://vulners.com/cve/CVE-2002-2029 CVE-2002-0843 7.5 https://vulners.com/cve/CVE-2002-0843 CVE-2002-0392 7.5 https://vulners.com/cve/CVE-2002-0392 CVE-2002-0257 7.5 https://vulners.com/cve/CVE-2002-0257 CVE-2002-0061 7.5 https://vulners.com/cve/CVE-2002-0061 APACHECHUNK_WIN32 7.5 https://vulners.com/canvas/APACHECHUNK_WIN32 *EXPLOIT* HTTPD:ECA4B985DC87B99FD1FB4982BECAA26B 7.2 https://vulners.com/httpd/HTTPD:ECA4B985DC87B99FD1FB4982BECAA26B HTTPD:18EAF7F92541BF62857123A840724D27 7.2 https://vulners.com/httpd/HTTPD:18EAF7F92541BF62857123A840724D27 CVE-2003-0542 7.2 https://vulners.com/cve/CVE-2003-0542 CVE-2002-0839 7.2 https://vulners.com/cve/CVE-2002-0839 SSV:19019 6.8 https://vulners.com/seebug/SSV:19019 *EXPLOIT* HTTPD:C7445200CAFE5527BA15F7BB8AF90D9F 6.8 https://vulners.com/httpd/HTTPD:C7445200CAFE5527BA15F7BB8AF90D9F HTTPD:78326E829B3FEC17BA22DA6D97B7E673 6.8 https://vulners.com/httpd/HTTPD:78326E829B3FEC17BA22DA6D97B7E673 CVE-2010-0010 6.8 https://vulners.com/cve/CVE-2010-0010 CVE-2002-0840 6.8 https://vulners.com/cve/CVE-2002-0840 SSV:66957 5.0 https://vulners.com/seebug/SSV:66957 *EXPLOIT* SSV:4148 5.0 https://vulners.com/seebug/SSV:4148 *EXPLOIT* SSV:20993 5.0 https://vulners.com/seebug/SSV:20993 *EXPLOIT* SSV:20979 5.0 https://vulners.com/seebug/SSV:20979 *EXPLOIT* SSV:20969 5.0 https://vulners.com/seebug/SSV:20969 *EXPLOIT* SSV:17994 5.0 https://vulners.com/seebug/SSV:17994 *EXPLOIT* SSV:14432 5.0 https://vulners.com/seebug/SSV:14432 *EXPLOIT* PACKETSTORM:85018 5.0 https://vulners.com/packetstorm/PACKETSTORM:85018 *EXPLOIT* PACKETSTORM:82197 5.0 https://vulners.com/packetstorm/PACKETSTORM:82197 *EXPLOIT* PACKETSTORM:181059 5.0 https://vulners.com/packetstorm/PACKETSTORM:181059 *EXPLOIT* PACKETSTORM:105672 5.0 https://vulners.com/packetstorm/PACKETSTORM:105672 *EXPLOIT* PACKETSTORM:105591 5.0 https://vulners.com/packetstorm/PACKETSTORM:105591 *EXPLOIT* MSF:AUXILIARY-SCANNER-HTTP-REWRITE_PROXY_BYPASS- 5.0 https://vulners.com/metasploit/MSF:AUXILIARY-SCANNER-HTTP-REWRITE_PROXY_BYPASS- *EXPLOIT* HTTPD:DBF32B071674D74B63337D8D08506B32 5.0 https://vulners.com/httpd/HTTPD:DBF32B071674D74B63337D8D08506B32 HTTPD:B83EB45B5D3BFFBAB33DB03BE1A7B31A 5.0 https://vulners.com/httpd/HTTPD:B83EB45B5D3BFFBAB33DB03BE1A7B31A HTTPD:B4F754693824188D1AF3B4D0746F122A 5.0 https://vulners.com/httpd/HTTPD:B4F754693824188D1AF3B4D0746F122A HTTPD:8786F0B4BB36F05E8F4D2277F7BB34F8 5.0 https://vulners.com/httpd/HTTPD:8786F0B4BB36F05E8F4D2277F7BB34F8 HTTPD:7B789993A3BDA0E4D014A8671E97D1EA 5.0 https://vulners.com/httpd/HTTPD:7B789993A3BDA0E4D014A8671E97D1EA HTTPD:54C52146ED5486198D6FD4E2168DEFB8 5.0 https://vulners.com/httpd/HTTPD:54C52146ED5486198D6FD4E2168DEFB8 HTTPD:2A8947DD306E11BFC38F0C26F5B33ABC 5.0 https://vulners.com/httpd/HTTPD:2A8947DD306E11BFC38F0C26F5B33ABC HTTPD:251E9EE30116844024950699040C983B 5.0 https://vulners.com/httpd/HTTPD:251E9EE30116844024950699040C983B EXPLOITPACK:460143F0ACAE117DD79BD75EDFDA154B 5.0 https://vulners.com/exploitpack/EXPLOITPACK:460143F0ACAE117DD79BD75EDFDA154B *EXPLOIT* EXPLOITPACK:44DAC602FB30402C58970DFAB1C4AF87 5.0 https://vulners.com/exploitpack/EXPLOITPACK:44DAC602FB30402C58970DFAB1C4AF87 *EXPLOIT* EDB-ID:9887 5.0 https://vulners.com/exploitdb/EDB-ID:9887 *EXPLOIT* EDB-ID:17969 5.0 https://vulners.com/exploitdb/EDB-ID:17969 *EXPLOIT* CVE-2011-3368 5.0 https://vulners.com/cve/CVE-2011-3368 CVE-2007-6750 5.0 https://vulners.com/cve/CVE-2007-6750 CVE-2004-0263 5.0 https://vulners.com/cve/CVE-2004-0263 CVE-2003-0460 5.0 https://vulners.com/cve/CVE-2003-0460 CVE-2003-0083 5.0 https://vulners.com/cve/CVE-2003-0083 CVE-2003-0020 5.0 https://vulners.com/cve/CVE-2003-0020 CVE-2002-2103 5.0 https://vulners.com/cve/CVE-2002-2103 CVE-2001-1556 5.0 https://vulners.com/cve/CVE-2001-1556 CVE-2001-0731 5.0 https://vulners.com/cve/CVE-2001-0731 CVE-2001-0730 5.0 https://vulners.com/cve/CVE-2001-0730 CVE-2001-0729 5.0 https://vulners.com/cve/CVE-2001-0729 SSV:2174 4.7 https://vulners.com/seebug/SSV:2174 *EXPLOIT* HTTPD:B63CF0157386C00B8FF9E943DA8F9A2F 4.7 https://vulners.com/httpd/HTTPD:B63CF0157386C00B8FF9E943DA8F9A2F CVE-2007-3304 4.7 https://vulners.com/cve/CVE-2007-3304 CVE-2002-1658 4.6 https://vulners.com/cve/CVE-2002-1658 SSV:71772 4.3 https://vulners.com/seebug/SSV:71772 *EXPLOIT* SSV:2818 4.3 https://vulners.com/seebug/SSV:2818 *EXPLOIT* SSV:2801 4.3 https://vulners.com/seebug/SSV:2801 *EXPLOIT* SSV:24250 4.3 https://vulners.com/seebug/SSV:24250 *EXPLOIT* PACKETSTORM:61420 4.3 https://vulners.com/packetstorm/PACKETSTORM:61420 *EXPLOIT* PACKETSTORM:102234 4.3 https://vulners.com/packetstorm/PACKETSTORM:102234 *EXPLOIT* HTTPD:BE276450B6181A981775FFC94F438B18 4.3 https://vulners.com/httpd/HTTPD:BE276450B6181A981775FFC94F438B18 HTTPD:99DE1CD158F65B4CFEA650CE55560C45 4.3 https://vulners.com/httpd/HTTPD:99DE1CD158F65B4CFEA650CE55560C45 HTTPD:5BBBCCFAA0C8B536B2CC3DA9DE0736F0 4.3 https://vulners.com/httpd/HTTPD:5BBBCCFAA0C8B536B2CC3DA9DE0736F0 HTTPD:4552C39F6C7671DAFFFFF7180F10B92D 4.3 https://vulners.com/httpd/HTTPD:4552C39F6C7671DAFFFFF7180F10B92D HTTPD:44908D5C4721DCB28E9FB7C9E680D98A 4.3 https://vulners.com/httpd/HTTPD:44908D5C4721DCB28E9FB7C9E680D98A EXPLOITPACK:683C3B1D02827D6B32706DB1D146B2D8 4.3 https://vulners.com/exploitpack/EXPLOITPACK:683C3B1D02827D6B32706DB1D146B2D8 *EXPLOIT* EDB-ID:17393 4.3 https://vulners.com/exploitdb/EDB-ID:17393 *EXPLOIT* CVE-2011-4317 4.3 https://vulners.com/cve/CVE-2011-4317 CVE-2007-6388 4.3 https://vulners.com/cve/CVE-2007-6388 CVE-2007-5000 4.3 https://vulners.com/cve/CVE-2007-5000 CVE-2006-5752 4.3 https://vulners.com/cve/CVE-2006-5752 CVE-2006-3918 4.3 https://vulners.com/cve/CVE-2006-3918 CVE-2005-3352 4.3 https://vulners.com/cve/CVE-2005-3352 CVE-2002-1233 2.6 https://vulners.com/cve/CVE-2002-1233 CVE-2001-1534 2.1 https://vulners.com/cve/CVE-2001-1534 1337DAY-ID-9952 0.0 https://vulners.com/zdt/1337DAY-ID-9952 *EXPLOIT* 1337DAY-ID-16843 0.0 https://vulners.com/zdt/1337DAY-ID-16843 *EXPLOIT* 1337DAY-ID-16323 0.0 https://vulners.com/zdt/1337DAY-ID-16323 *EXPLOIT*
111 tcp open rpcbind 2
rpcinfo: program version port/proto service 100000 2 111/tcp rpcbind 100000 2 111/udp rpcbind 100024 1 32768/tcp status 100024 1 32768/udp status
139 tcp open netbios-ssn Samba smbd
443 tcp open https Apache/1.3.20 (Unix) (Red-Hat/Linux) mod_ssl/2.8.4 OpenSSL/0.9.6b
http-server-header: Apache/1.3.20 (Unix) (Red-Hat/Linux) mod_ssl/2.8.4 OpenSSL/0.9.6b

Raw XML excerpt

{"XMLName":{"Space":"","Local":"nmaprun"},"Start":"Sat Dec 13 13:24:31 2025","Hosts":[{"status":{"state":"up"},"addresses":[{"addr":"192.0.2.10","type":"ipv4"}],"hostnames":{"list":null},"ports":{"list":[{"protocol":"tcp","port":22,"state":{"state":"open","reason":"syn-ack"},"service":{"name":"ssh","product":"OpenSSH","version":"2.9p2"},"scripts":[{"id":"vulners","output":"\n  cpe:/a:openbsd:openssh:2.9p2: \n    \tPACKETSTORM:179290\t10.0\thttps://vulners.com/packetstorm/PACKETSTORM:179290\t*EXPLOIT*\n    \tDF059135-2CF5-5441-8F22-E6EF1DEE5F6E\t10.0\thttps://vulners.com/gitee/DF059135-2CF5-5441-8F22-E6EF1DEE5F6E\t*EXPLOIT*\n    \tCVE-2003-0693\t10.0\thttps://vulners.com/cve/CVE-2003-0693\n    \tCVE-2002-0640\t10.0\thttps://vulners.com/cve/CVE-2002-0640\n    \tCVE-2002-0083\t10.0\thttps://vulners.com/cve/CVE-2002-0083\n    \t1EEC8894-D2F7-547C-827C-915BE866875C\t10.0\thttps://vulners.com/githubexploit/1EEC8894-D2F7-547C-827C-915BE866875C\t*EXPLOIT*\n    \tPACKETSTORM:173661\t9.8\tht... (truncated)

192.0.2.10 (scan id: 163)

Started: 2025-12-13 13:13:43.256430016 +0000 UTC — Finished: 2025-12-13 13:13:51.564530724 +0000 UTC — Type: auto — Open ports: 3
PortProtoStateServiceProduct / VersionNSE Scripts
22 tcp open ssh OpenSSH 2.9p2
ssh-hostkey: 1024 00:11:22:33:44:55:00:11:22:33:44:55:7d:8e:9f:00 (RSA1) 1024 00:11:22:33:44:55:00:11:22:33:44:55:3d:2e:1f:00 (DSA) 1024 00:11:22:33:44:55:00:11:22:33:44:55:22:33:44:55 (RSA)
sshv1: Server supports SSHv1
80 tcp open http Apache httpd 1.3.20
http-title: Test Page for the Apache Web Server on Red Hat Linux
http-methods: Potentially risky methods: TRACE
http-server-header: Apache/1.3.20 (Unix) (Red-Hat/Linux) mod_ssl/2.8.4 OpenSSL/0.9.6b
443 tcp open https Apache/1.3.20 (Unix) (Red-Hat/Linux) mod_ssl/2.8.4 OpenSSL/0.9.6b
sslv2: SSLv2 supported ciphers: SSL2_RC4_128_EXPORT40_WITH_MD5 SSL2_RC2_128_CBC_EXPORT40_WITH_MD5 SSL2_RC2_128_CBC_WITH_MD5 SSL2_RC4_64_WITH_MD5 SSL2_RC4_128_WITH_MD5 SSL2_DES_192_EDE3_CBC_WITH_MD5 SSL2_DES_64_CBC_WITH_MD5
http-server-header: Apache/1.3.20 (Unix) (Red-Hat/Linux) mod_ssl/2.8.4 OpenSSL/0.9.6b
http-title: 400 Bad Request
ssl-date: 2025-12-13T18:13:44+00:00; +4h59m53s from scanner time.
ssl-cert: Subject: commonName=example.local/organizationName=ExampleOrg/stateOrProvinceName=ExampleState/countryName=-- Not valid before: 2009-09-26T09:32:06 Not valid after: 2010-09-26T09:32:06
445 tcp closed microsoft-ds
3389 tcp closed ms-wbt-server

Raw XML excerpt

{"XMLName":{"Space":"","Local":"nmaprun"},"Start":"Sat Dec 13 13:13:43 2025","Hosts":[{"status":{"state":"up"},"addresses":[{"addr":"192.0.2.10","type":"ipv4"}],"hostnames":{"list":null},"ports":{"list":[{"protocol":"tcp","port":22,"state":{"state":"open","reason":"syn-ack"},"service":{"name":"ssh","product":"OpenSSH","version":"2.9p2"},"scripts":[{"id":"ssh-hostkey","output":"\n  1024 00:11:22:33:44:55:00:11:22:33:44:55:7d:8e:9f:00 (RSA1)\n  1024 00:11:22:33:44:55:00:11:22:33:44:55:3d:2e:1f:00 (DSA)\n  1024 00:11:22:33:44:55:00:11:22:33:44:55:22:33:44:55 (RSA)"},{"id":"sshv1","output":"Server supports SSHv1"}]},{"protocol":"tcp","port":80,"state":{"state":"open","reason":"syn-ack"},"service":{"name":"http","product":"Apache httpd","version":"1.3.20"},"scripts":[{"id":"http-title","output":"Test Page for the Apache Web Server on Red Hat Linux"},{"id":"http-methods","output":"\n  Potentially risky methods: TRACE"},{"id":"http-server-header","output":"Apache/1.3.20 (Unix)  (Red-Hat/L... (truncated)

192.0.2.20 (scan id: 162)

Started: 2025-12-13 13:13:10.527573734 +0000 UTC — Finished: 2025-12-13 13:13:13.77789308 +0000 UTC — Type: custom — Open ports: 0
PortProtoStateServiceProduct / VersionNSE Scripts
22 tcp filtered ssh
80 tcp filtered http
443 tcp filtered https
445 tcp filtered microsoft-ds
3389 tcp filtered ms-wbt-server

Raw XML excerpt

{"XMLName":{"Space":"","Local":"nmaprun"},"Start":"Sat Dec 13 13:13:10 2025","Hosts":[{"status":{"state":"up"},"addresses":[{"addr":"192.0.2.20","type":"ipv4"}],"hostnames":{"list":null},"ports":{"list":[{"protocol":"tcp","port":22,"state":{"state":"filtered","reason":"no-response"},"service":{"name":"ssh"}},{"protocol":"tcp","port":80,"state":{"state":"filtered","reason":"no-response"},"service":{"name":"http"}},{"protocol":"tcp","port":443,"state":{"state":"filtered","reason":"no-response"},"service":{"name":"https"}},{"protocol":"tcp","port":445,"state":{"state":"filtered","reason":"no-response"},"service":{"name":"microsoft-ds"}},{"protocol":"tcp","port":3389,"state":{"state":"filtered","reason":"no-response"},"service":{"name":"ms-wbt-server"}}]}}]}

192.0.2.1 (MAC: 00:11:22:33:44:55) (scan id: 159)

Started: 2025-12-13 12:49:11.04078522 +0000 UTC — Finished: 2025-12-13 12:49:19.859574639 +0000 UTC — Type: auto — Open ports: 0
PortProtoStateServiceProduct / VersionNSE Scripts
22 tcp filtered ssh
80 tcp filtered http
443 tcp filtered https
445 tcp filtered microsoft-ds
3389 tcp filtered ms-wbt-server

Raw XML excerpt

{"XMLName":{"Space":"","Local":"nmaprun"},"Start":"Sat Dec 13 12:49:11 2025","Hosts":[{"status":{"state":"up"},"addresses":[{"addr":"192.0.2.1","type":"ipv4"}],"hostnames":{"list":null},"ports":{"list":[{"protocol":"tcp","port":22,"state":{"state":"filtered","reason":"no-response"},"service":{"name":"ssh"}},{"protocol":"tcp","port":80,"state":{"state":"filtered","reason":"no-response"},"service":{"name":"http"}},{"protocol":"tcp","port":443,"state":{"state":"filtered","reason":"no-response"},"service":{"name":"https"}},{"protocol":"tcp","port":445,"state":{"state":"filtered","reason":"no-response"},"service":{"name":"microsoft-ds"}},{"protocol":"tcp","port":3389,"state":{"state":"filtered","reason":"no-response"},"service":{"name":"ms-wbt-server"}}]}}]}