Network Vulnerability Assessment Report
15.04.2004
Sorted by host names

Session name: x-micro-xwl-11gragStart Time:15.04.2004 16:23:58
Finish Time:15.04.2004 17:12:36
Elapsed:0 day(s) 00:48:38
Total records generated:6
high severity:0
low severity:5
informational:1


Summary of scanned hosts

HostHolesWarningsOpen portsState
20.0.0.1051Finished


20.0.0.1

ServiceSeverityDescription
www (80/tcp)
Info
Port is open
www (80/tcp)
Low
A web server is running on this port
general/icmp
Low

The remote host answers to an ICMP timestamp request. This allows an attacker
to know the date which is set on your machine.

This may help him to defeat all your time based authentication protocols.

Solution : filter out the ICMP timestamp requests (13), and the outgoing ICMP
timestamp replies (14).

Risk factor : Low
CVE : CAN-1999-0524
www (80/tcp)
Low
This web server was fingerprinted as: Embedded HTTP Server 2.05b3 [FIREBOX SOHO 6tc]
which is not consistent with the displayed banner: Embedded HTTP Server 1.5.1

If you think that Nessus was wrong, please send this signature
to www-signatures@nessus.org :
xxx:200:501:VER:VER:VER:400:VER:xxx:200:400:400:200:400:400:400:200:404:501:501:501:501:501:501:+++:FIXME:Embedded HTTP Server 1.5.1

www (80/tcp)
Low
The remote web server type is :

Embedded HTTP Server 1.5.1


Solution : We recommend that you configure (if possible) your web server to return
a bogus Server header in order to not leak information.

general/udp
Low
For your information, here is the traceroute to 20.0.0.1 :
20.0.0.2
20.0.0.1