Network Vulnerability Assessment Report |
| |
Sorted by host names |
| |||||||||
|
Host | Holes | Warnings | Open ports | State |
20.0.0.1 | 0 | 3 | 2 | Finished |
Service | Severity | Description |
unknown (515/tcp) | Port is open | |
www (80/tcp) | Port is open | |
general/tcp | Nessus was not able to reliably identify the remote operating system. It might be: Netilla Service Platform 4.0 The fingerprint differs from these known signatures on 5 points. If you know what operating system this host is running, please send this signature to os-signatures@nessus.org : :1:1:0:64:0:64:1:0:64:1:0:64:1:>64:64:0:1:1:1:1:1:1:1:0:64:4344:MSTNW:0:1:1 | |
general/tcp | The remote host does not discard TCP SYN packets which have the FIN flag set. Depending on the kind of firewall you are using, an attacker may use this flaw to bypass its rules. See also : http://archives.neohapsis.com/archives/bugtraq/2002-10/0266.html http://www.kb.cert.org/vuls/id/464113 Solution : Contact your vendor for a patch Risk factor : Medium BID : 7487 | |
general/udp | For your information, here is the traceroute to 20.0.0.1 : 20.0.0.2 20.0.0.1 |