Está en la página 1de 2

21/04/2011 Nessus Report Dashboard

Executive Summary: >PRINT

TOP 10 HOSTS with ISSUES PLUGIN IDS ISSUES

192.168.1.85 High Severity problem(s) found 10785 1


21% High
Severity 22194 1
0% Medium 25220 1
Severity
78% Low 26917 1
Severity
19506 1

18502 1

10114 1

50686 1

10150 1

43815 1

11011 1

11936 1

10884 1
# OF 35716 1
PLUGIN IDS SEVERITY SYNOPSIS
ISSUES
MS06-040: Vulnerability in Server Service Could Allow 26920 1
Remote Code Execution (921883) (uncredentialed check)
22194 High 1 35362 1
Arbitrary code can be executed on the remote host due to a
flaw in the 'Server' service.
MS05-027: Vulnerability in SMB Could Allow Remote Code 45590 1
Execution (896422) (uncredentialed check)
18502 High 1 34477 1
Arbitrary code can be executed on the remote host due to a
flaw in the SMB implementation. 22034 1
MS09-001: Microsoft Windows SMB Vulnerabilities Remote
35362 High 1 Code Execution (958687) (uncredentialed check) 10287 1
It is possible to crash the remote host due to a flaw in SMB.
MS08-067: Microsoft Windows Server Service Crafted RPC 20094 1
Request Handling Remote Code Execution (958644)
34477 High 1 (uncredentialed check) 10394 1
Arbitrary code can be executed on the remote host due to a 10397 1
flaw in the 'Server' service.
MS06-035: Vulnerability in Server Service Could Allow
Remote Code Execution (917159) (uncredentialed check)
22034 High 1
Arbitrary code can be executed on the remote host due to a
flaw in the 'Server' service.
Microsoft Windows SMB NativeLanManager Remote
System Information Disclosure
10785 Low 1
It is possible to obtain information about the remote
operating system.
TCP/IP Timestamps Supported
25220 Low 1
The remote service implements TCP timestamps.
Microsoft Windows SMB Registry : Nessus Cannot Access
26917 Low 1 the Windows Registry
Nessus is not able to access the remote Windows Registry.
Nessus Scan Information
19506 Low 1 Information about the Nessus scan.
ICMP Timestamp Request Remote Date Disclosure
10114 Low 1 It is possible to determine the exact time set on the remote
host.
IP Forwarding Enabled
50686 Low 1
The remote has IP forwarding enabled.
Windows NetBIOS / SMB Remote Host Information
10150 Low 1 Disclosure
It is possible to obtain the network name of the remote host.
NetBIOS Multiple IP Address Enumeration
43815 Low 1
The remote host is configured with multiple IP addresses.
Microsoft Windows SMB Service Detection
11011 Low 1
A file / print sharing service is listening on the remote host.
OS Identification
11936 Low 1
It is possible to guess the remote operating system
Network Time Protocol (NTP) Server Detection
10884 Low 1
An NTP server is listening on the remote host.
Ethernet Card Manufacturer Detection
35716 Low 1
The manufacturer can be deduced from the Ethernet OUI.
Microsoft Windows SMB NULL Session Authentication
26920 Low 1 It is possible to log into the remote Windows host with a
NULL session.
Common Platform Enumeration (CPE)
45590 Low 1 It is possible to enumerate CPE names that matched on the
remote system.
Traceroute Information
10287 Low 1
It was possible to obtain traceroute information.
VMware Virtual Machine Detection
20094 Low 1
The remote host seems to be a VMware virtual machine.
Microsoft Windows SMB Log In Possible
10394 Low 1
It is possible to log into the remote host.
localhost:8834/file/xslt/download/?file… 1/2
21/04/2011 Nessus Report Dashboard
10394 Low 1
It is possible to log into the remote host.
Microsoft Windows SMB LanMan Pipe Server Listing
10397 Low 1 Disclosure
It is possible to obtain network information.

192.168.1.85

Scan Time
Start time: Mon Mar 07 08:05:15 2011
End time: Mon Mar 07 08:08:13 2011

Number of vulnerabilities
High 5
Medium 0
Low 18

Remote Host Information


Microsoft Windows XP Service Pack 2
Operating System:
Microsoft Windows XP Service Pack 3
NetBIOS name: HACKER
MAC address: 00:0c:29:41:ea:5c

^BACK

localhost:8834/file/xslt/download/?file… 2/2

También podría gustarte