Summary

This document reports on the results of an automatic security scan. The report first summarises the results found. Then, for each host, the report describes every issue found. Please consider the advice given in each description, in order to rectify the issue.

Overrides are on. When a result has an override, this report uses the threat of the override.

Notes are included in the report.

This report might not show details of all issues that were found. It only lists hosts that produced issues. Issues with the threat level "Debug" are not shown.

This report contains all 142 results selected by the filtering described above. Before filtering there were 185 results.

Scan started: 2012-08-16T02:12:20Z
Scan ended: 2012-08-16T03:09:30Z

Host Summary

Host High Medium Low Log False Positive
192.168.56.3 38 24 36 44 0
Total: 1 38 24 36 44 0

Results per Host

Host 192.168.56.3

Scanning of this host started at: 2012-08-16T02:12:21Z
Number of results: 142

Port Summary for Host 192.168.56.3

Service (Port) Threat Level
clm_pts (6200/tcp) High
ftp (21/tcp) High
http (80/tcp) High
microsoft-ds (445/tcp) High
mysql (3306/tcp) High
nfs (2049/udp) High
scientia-ssdb (2121/tcp) High
ssh (22/tcp) High
unknown (8180/tcp) High
x11 (6000/tcp) High
domain (53/udp) Medium
exec (512/tcp) Medium
general/tcp Medium
shell (514/tcp) Medium
smtp (25/tcp) Medium
domain (53/tcp) Low
general/icmp Low
msgsrvr (8787/tcp) Low
sunrpc (111/tcp) Low
sunrpc (111/udp) Low
telnet (23/tcp) Low
tftp (69/udp) Low
vnc (5900/tcp) Low
ajp13 (8009/tcp) Log
distcc (3632/tcp) Log
general/CPE-T Log
general/HOST-T Log
general/SMBClient Log
ircd (6667/tcp) Log
login (513/tcp) Log
netbios-ns (137/udp) Log
netbios-ssn (139/tcp) Log
postgresql (5432/tcp) Log
unknown (6697/tcp) Log

Security Issues for Host 192.168.56.3

clm_pts (6200/tcp)
High (CVSS: 7.5)
NVT: vsftpd Compromised Source Packages Backdoor Vulnerability (OID: 1.3.6.1.4.1.25623.1.0.103185)
Overview:
vsftpd is prone to a backdoor vulnerability.
Attackers can exploit this issue to execute arbitrary commands in the
context of the application. Successful attacks will compromise the
affected application.
The vsftpd 2.3.4 source package is affected.
Solution:
The repaired package can be downloaded from
https://security.appspot.com/vsftpd.html. Please validate the package
with its signature.
References:
http://www.securityfocus.com/bid/48539
http://scarybeastsecurity.blogspot.com/2011/07/alert-vsftpd-download-backdoored.html
https://security.appspot.com/vsftpd.html
http://vsftpd.beasts.org/
References
BID: 48539
ftp (21/tcp)
High (CVSS: 10.0)
NVT: ProFTPD Multiple Remote Vulnerabilities (OID: 1.3.6.1.4.1.25623.1.0.801639)
  Overview: The host is running ProFTPD and is prone to multiple vulnerabilities.
  Vulnerability Insight:
  - An input validation error within the 'mod_site_misc' module can be exploited
    to create and delete directories, create symlinks, and change the time of
    files located outside a writable directory.
  - A logic error within the 'pr_netio_telnet_gets()' function in 'src/netio.c'
    when processing user input containing the Telnet IAC escape sequence can be
    exploited to cause a stack-based buffer overflow by sending specially
    crafted input to the FTP or FTPS service.
  Impact:
  Successful exploitation may allow execution of arbitrary code or cause a
  denial-of-service.
  Impact Level: Application
  Affected Software/OS:
  ProFTPD versions prior to 1.3.3c
  Fix: Upgrade to ProFTPD version 1.3.3c or later,
  For updates refer, http://www.proftpd.org/
  References:
  http://secunia.com/advisories/42052
  http://bugs.proftpd.org/show_bug.cgi?id=3519
  http://bugs.proftpd.org/show_bug.cgi?id=3521
  http://www.zerodayinitiative.com/advisories/ZDI-10-229/ 
References
CVE: CVE-2010-3867, CVE-2010-4221
BID: 44562
ftp (21/tcp)
High (CVSS: 7.5)
NVT: vsftpd Compromised Source Packages Backdoor Vulnerability (OID: 1.3.6.1.4.1.25623.1.0.103185)
Overview:
vsftpd is prone to a backdoor vulnerability.
Attackers can exploit this issue to execute arbitrary commands in the
context of the application. Successful attacks will compromise the
affected application.
The vsftpd 2.3.4 source package is affected.
Solution:
The repaired package can be downloaded from
https://security.appspot.com/vsftpd.html. Please validate the package
with its signature.
References:
http://www.securityfocus.com/bid/48539
http://scarybeastsecurity.blogspot.com/2011/07/alert-vsftpd-download-backdoored.html
https://security.appspot.com/vsftpd.html
http://vsftpd.beasts.org/
References
BID: 48539
ftp (21/tcp)
High (CVSS: 7.5)
NVT: ProFTPD Server SQL Injection Vulnerability (OID: 1.3.6.1.4.1.25623.1.0.900507)
  Overview: This host is running ProFTPD Server and is prone to remote
  SQL Injection vulnerability.
  Vulnerability Insight:
  This flaw occurs because the server performs improper input sanitising,
  - when a %(percent) character is passed in the username, a single quote
    (') gets introduced during variable substitution by mod_sql and this
    eventually allows for an SQL injection during login.
  - when NLS support is enabled, a flaw in variable substition feature in
    mod_sql_mysql and mod_sql_postgres may allow an attacker to bypass
    SQL injection protection mechanisms via invalid, encoded multibyte
    characters.
  Impact:
  Successful exploitation will allow remote attackers to execute arbitrary
  SQL commands, thus gaining access to random user accounts.
  Affected Software/OS:
  ProFTPD Server version 1.3.1 through 1.3.2rc2
  Fix:
  Upgrade to the latest version 1.3.2rc3,
  http://www.proftpd.org/
  References:
  http://www.milw0rm.com/exploits/8037
  http://www.securityfocus.com/archive/1/archive/1/500833/100/0/threaded
  http://www.securityfocus.com/archive/1/archive/1/500851/100/0/threaded
References
CVE: CVE-2009-0542, CVE-2009-0543
BID: 33722
ftp (21/tcp)
High (CVSS: 5.8)
NVT: ProFTPD mod_tls Module NULL Character CA SSL Certificate Validation Security By... (OID: 1.3.6.1.4.1.25623.1.0.100316)
Overview:
ProFTPD is prone to a security-bypass vulnerability because the
application fails to properly validate the domain name in a signed CA
certificate, allowing attackers to substitute malicious SSL
certificates for trusted ones.
Successful exploits allows attackers to perform man-in-the-
middle attacks or impersonate trusted servers, which will aid in
further attacks.
Versions prior to ProFTPD 1.3.2b and 1.3.3 to 1.3.3.rc1 are vulnerable.
Solution:
Updates are available. Please see the references for details.
References:
http://www.securityfocus.com/bid/36804
http://bugs.proftpd.org/show_bug.cgi?id=3275
http://www.proftpd.org
References
CVE: CVE-2009-3639
BID: 36804
http (80/tcp)
High (CVSS: 10.0)
NVT: Apache Multiple Security Vulnerabilities (OID: 1.3.6.1.4.1.25623.1.0.100514)
Overview:
Apache is prone to multiple vulnerabilities.
These issues may lead to information disclosure or other attacks.
Apache versions prior to 2.2.15-dev are affected.
Solution:
These issues have been addressed in Apache 2.2.15-dev. Apache 2.2.15
including fixes will become available in the future as well. Please
see the references for more information.
References:
http://www.securityfocus.com/bid/38494
http://httpd.apache.org/security/vulnerabilities_22.html
http://httpd.apache.org/
https://issues.apache.org/bugzilla/show_bug.cgi?id=48359
http://svn.apache.org/viewvc?view=revision&revision=917870
References
CVE: CVE-2010-0425, CVE-2010-0434, CVE-2010-0408
BID: 38494, 38491
http (80/tcp)
High (CVSS: 10.0)
NVT: PHP version smaller than 5.2.14 (OID: 1.3.6.1.4.1.25623.1.0.110171)
PHP version smaller than 5.2.14 suffers vulnerability.
Solution:
Update PHP to version 5.2.14 or later.
References
CVE: CVE-2007-1581, CVE-2010-0397, CVE-2010-1860, CVE-2010-1862, CVE-2010-1864, CVE-2010-2097, CVE-2010-2100, CVE-2010-2101, CVE-2010-2190, CVE-2010-2191, CVE-2010-2225, CVE-2010-2484, CVE-2010-2531, CVE-2010-3065
BID: 38708, 40948, 41991
http (80/tcp)
High (CVSS: 10.0)
NVT: PHP version smaller than 5.2.7 (OID: 1.3.6.1.4.1.25623.1.0.110172)
PHP version smaller than 5.2.7 suffers vulnerability.
Solution:
Update PHP to version 5.2.7 or later.
References
CVE: CVE-2008-2371, CVE-2008-2665, CVE-2008-2666, CVE-2008-2829, CVE-2008-3658, CVE-2008-3659, CVE-2008-3660, CVE-2008-5557, CVE-2008-5624, CVE-2008-5625, CVE-2008-5658
BID: 29796, 29797, 29829, 30087, 30649, 31612, 32383, 32625, 32688, 32948
http (80/tcp)
High (CVSS: 10.0)
NVT: PHP version smaller than 5.2.11 (OID: 1.3.6.1.4.1.25623.1.0.110176)
PHP version smaller than 5.2.11 suffers vulnerability.
Solution:
Update PHP to version 5.2.11 or later.
References
CVE: CVE-2009-3291, CVE-2009-3292, CVE-2009-3293, CVE-2009-3294, CVE-2009-4018, CVE-2009-5016
BID: 36449, 44889
http (80/tcp)
High (CVSS: 10.0)
NVT: PHP version smaller than 5.3.1 (OID: 1.3.6.1.4.1.25623.1.0.110178)
PHP version smaller than 5.3.1 suffers vulnerability.
Solution:
Update PHP to version 5.3.1 or later.
References
CVE: CVE-2009-3557, CVE-2009-3559, CVE-2009-4017, CVE-2009-4018, CVE-2010-1128
BID: 36554, 36555, 37079, 37138
http (80/tcp)
High (CVSS: 10.0)
NVT: PHP version smaller than 5.2.8 (OID: 1.3.6.1.4.1.25623.1.0.110180)
PHP version smaller than 5.2.8 suffers vulnerability.
Solution:
Update PHP to version 5.2.8 or later.
References
CVE: CVE-2008-5814, CVE-2008-5844
BID: 32673
http (80/tcp)
High (CVSS: 10.0)
NVT: PHP version smaller than 5.3.4 (OID: 1.3.6.1.4.1.25623.1.0.110181)
PHP version smaller than 5.3.4 suffers vulnerability.
Solution:
Update PHP to version 5.3.4 or later.
References
CVE: CVE-2006-7243, CVE-2010-2094, CVE-2010-2950, CVE-2010-3436, CVE-2010-3709, CVE-2010-3710, CVE-2010-3870, CVE-2010-4150, CVE-2010-4156, CVE-2010-4409, CVE-2010-4697, CVE-2010-4698, CVE-2010-4699, CVE-2010-4700, CVE-2011-0753, CVE-2011-0754, CVE-2011-0755
BID: 40173, 43926, 44605, 44718, 44723, 44951, 44980, 45119, 45335, 45338, 45339, 45952, 45954, 46056, 46168
http (80/tcp)
High (CVSS: 10.0)
NVT: PHP version smaller than 5.3.3 (OID: 1.3.6.1.4.1.25623.1.0.110182)
PHP version smaller than 5.3.3 suffers vulnerability.
Solution:
Update PHP to version 5.3.3 or later.
References
CVE: CVE-2007-1581, CVE-2010-0397, CVE-2010-1860, CVE-2010-1862, CVE-2010-1864, CVE-2010-1917, CVE-2010-2097, CVE-2010-2100, CVE-2010-2101, CVE-2010-2190, CVE-2010-2191, CVE-2010-2225, CVE-2010-2484, CVE-2010-2531, CVE-2010-3062, CVE-2010-3063, CVE-2010-3064, CVE-2010-3065
BID: 38708, 40461, 40948, 41991
http (80/tcp)
High (CVSS: 10.0)
NVT: PHP version smaller than 5.2.6 (OID: 1.3.6.1.4.1.25623.1.0.110183)
PHP version smaller than 5.2.6 suffers vulnerability.
Solution:
Update PHP to version 5.2.6 or later.
References
CVE: CVE-2007-4850, CVE-2007-6039, CVE-2008-0599, CVE-2008-1384, CVE-2008-2050, CVE-2008-2051
BID: 27413, 28392, 29009
http (80/tcp)
High (CVSS: 10.0)
NVT: PHP version smaller than 5.2.9 (OID: 1.3.6.1.4.1.25623.1.0.110187)
PHP version smaller than 5.2.9 suffers vulnerability.
Solution:
Update PHP to version 5.2.9 or later.
References
CVE: CVE-2008-5498, CVE-2009-1271, CVE-2009-1272
BID: 33002, 33927
http (80/tcp)
High (CVSS: 7.5)
NVT: TikiWiki Versions Prior to 4.2 Multiple Unspecified Vulnerabilities (OID: 1.3.6.1.4.1.25623.1.0.100537)
Product detection result: cpe:/a:tikiwiki:tikiwiki:1.9.5 by TikiWiki Version Detection (OID: 1.3.6.1.4.1.25623.1.0.901001)
Overview:
TikiWiki is prone to multiple unspecified vulnerabilities, including:
- An unspecified SQL-injection vulnerability
- An unspecified authentication-bypass vulnerability
- An unspecified vulnerability
Exploiting these issues could allow an attacker to compromise the
application, access or modify data, exploit latent vulnerabilities in
the underlying database, and gain unauthorized access to the affected
application. Other attacks are also possible.
Versions prior to TikiWiki 4.2 are vulnerable.
Solution:
The vendor has released an advisory and fixes. Please see the
references for details.
References:
http://www.securityfocus.com/bid/38608
http://tikiwiki.svn.sourceforge.net/viewvc/tikiwiki?view=rev&revision=24734
http://tikiwiki.svn.sourceforge.net/viewvc/tikiwiki?view=rev&revision=25046
http://tikiwiki.svn.sourceforge.net/viewvc/tikiwiki?view=rev&revision=25424
http://tikiwiki.svn.sourceforge.net/viewvc/tikiwiki?view=rev&revision=25435
http://info.tikiwiki.org/article86-Tiki-Announces-3-5-and-4-2-Releases
http://info.tikiwiki.org/tiki-index.php?page=homepage
References
CVE: CVE-2010-1135, CVE-2010-1134, CVE-2010-1133, CVE-2010-1136
BID: 38608
http (80/tcp)
High (CVSS: 7.5)
NVT: PHP-CGI-based setups vulnerability when parsing query string parameters from ph... (OID: 1.3.6.1.4.1.25623.1.0.103482)
Overview:
When PHP is used in a CGI-based setup (such as Apache's mod_cgid), the
php-cgi receives a processed query string parameter as command line
arguments which allows command-line switches, such as -s, -d or -c to be
passed to the php-cgi binary, which can be exploited to disclose source
code and obtain arbitrary code execution.
An example of the -s command, allowing an attacker to view the source code
of index.php is below:
http://localhost/index.php?-s
References:
http://www.h-online.com/open/news/item/Critical-open-hole-in-PHP-creates-risks-Update-1567↵
532.html
http://www.kb.cert.org/vuls/id/520827
http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/
https://bugs.php.net/bug.php?id=61910
http://www.php.net/manual/en/security.cgi-bin.php
References
CVE: CVE-2012-1823, CVE-2012-2311, CVE-2012-2336, CVE-2012-2335
BID: 53388
http (80/tcp)
High (CVSS: 5.8)
NVT: http TRACE XSS attack (OID: 1.3.6.1.4.1.25623.1.0.11213)
Synopsis :
Debugging functions are enabled on the remote HTTP server.
Description :
The remote webserver supports the TRACE and/or TRACK methods. TRACE and TRACK
are HTTP methods which are used to debug web server connections.   
It has been shown that servers supporting this method are subject to
cross-site-scripting attacks, dubbed XST for "Cross-Site-Tracing", when
used in conjunction with various weaknesses in browsers. 
An attacker may use this flaw to trick your legitimate web users to give
him their credentials. 
Solution :
Disable these methods.
See also :
http://www.kb.cert.org/vuls/id/867593
Plugin output :
Solution : 
Add the following lines for each virtual host in your configuration file :
    RewriteEngine on
    RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
    RewriteRule .* - [F]
References
CVE: CVE-2004-2320, CVE-2003-1567
BID: 9506, 9561, 11604
http (80/tcp)
High (CVSS: 4.5)
NVT: PHP version smaller than 5.2.5 (OID: 1.3.6.1.4.1.25623.1.0.110179)
PHP version smaller than 5.2.5 suffers vulnerability.
Solution:
Update PHP to version 5.2.5 or later.
References
CVE: CVE-2007-3996, CVE-2007-4782, CVE-2007-4783, CVE-2007-4784, CVE-2007-4825, CVE-2007-4840, CVE-2007-4887, CVE-2007-4889, CVE-2007-5447, CVE-2007-5653, CVE-2007-5898, CVE-2007-5899, CVE-2007-5900, CVE-2008-2107, CVE-2008-2108, CVE-2008-4107
BID: 26403
microsoft-ds (445/tcp)
High (CVSS: 7.5)
NVT: Microsoft Windows SMB/NETBIOS NULL Session Authentication Bypass Vulnerability (OID: 1.3.6.1.4.1.25623.1.0.801991)
  Overview: The host is running SMB/NETBIOS and prone to authentication
  bypass Vulnerability
  Vulnerability Insight:
  The flaw is caused due to an SMB share, allows full access to Guest users.
  If the Guest account is enabled, anyone can access the computer without a
  valid user account or password.
  Impact:
  Successful exploitation could allow attackers to use shares to cause the
  system to crash.
  Impact Level: System
  Affected Software/OS:
  Microsoft Windows 95
  Microsoft Windows 98
  Microsoft Windows NT
  Fix: No solution or patch is available as on 11th October, 2011. Information
  regarding this issue will be updated once the solution details are available.
  For updates refer, http://sourceforge.net/projects/nfs/files/nfs-utils/
  workaround:
  1 Disable null session login.
  2 Remove the share.
  3 Enable passwords on the share.
  References:
  http://xforce.iss.net/xforce/xfdb/2
  http://seclab.cs.ucdavis.edu/projects/testing/vulner/38.html 
References
CVE: CVE-1999-0519
mysql (3306/tcp)
High (CVSS: 8.5)
NVT: MySQL 'sql_parse.cc' Multiple Format String Vulnerabilities (OID: 1.3.6.1.4.1.25623.1.0.800842)
  Overview: The host is running MySQL and is prone to Multiple Format String
  vulnerabilities.
  Vulnerability Insight:
  The flaws are due to error in the 'dispatch_command' function in sql_parse.cc
  in libmysqld/ which can caused via format string specifiers in a database name
  in a 'COM_CREATE_DB' or 'COM_DROP_DB' request.
  Impact:
  Successful exploitation could allow remote authenticated users to cause a Denial
  of Service and possibly have unspecified other attacks.
  Impact Level: Application
  Affected Software/OS:
  MySQL version 4.0.0 to 5.0.83 on all running platform.
  Fix: Upgrade to MySQL version 5.1.36 or later
  http://dev.mysql.com/downloads
  References:
  http://www.osvdb.org/55734
  http://secunia.com/advisories/35767
  http://xforce.iss.net/xforce/xfdb/51614
  http://www.securityfocus.com/archive/1/archive/1/504799/100/0/threaded
References
CVE: CVE-2009-2446
BID: 35609
mysql (3306/tcp)
High (CVSS: 7.5)
NVT: MySQL 5.0.51a Unspecified Remote Code Execution Vulnerability (OID: 1.3.6.1.4.1.25623.1.0.100436)
Overview:
MySQL 5.0.51a is prone to an unspecified remote code-execution
vulnerability.
Very few technical details are currently available.
An attacker can leverage this issue to execute arbitrary code within
the context of the vulnerable application. Failed exploit attempts
will result in a denial-of-service condition.
This issue affects MySQL 5.0.51a; other versions may also be
vulnerable.
References:
http://www.securityfocus.com/bid/37640
http://archives.neohapsis.com/archives/dailydave/2010-q1/0002.html
http://www.mysql.com/
http://intevydis.com/mysql_demo.html
References
CVE: CVE-2009-4484
BID: 37640
mysql (3306/tcp)
High (CVSS: 7.5)
NVT: MySQL Server Buffer Overflow Vulnerability (Linux) (OID: 1.3.6.1.4.1.25623.1.0.901093)
  Overview: The host is running MySQL and is prone to Buffer overflow
  Vulnerability
  Vulnerability Insight:
  The flaw is due to an error in application that allows remote attackers to
  execute arbitrary code via unspecified vectors
  Impact:
  Successful exploitation could allow attackers to execute arbitrary code.
  Impact Level: Application
  Affected Software/OS:
  MySQL Version 5.0.51a On Linux
  Fix: No solution/patch is available as on 31st December, 2009. Information
  regarding this issue will be updated once the solution details are available
  For Updates Refer, http://dev.mysql.com/downloads
  References:
  http://intevydis.com/vd-list.shtml
  http://www.intevydis.com/blog/?p=57
References
CVE: CVE-2009-4484
mysql (3306/tcp)
High (CVSS: 6.8)
NVT: MySQL Denial Of Service and Spoofing Vulnerabilities (OID: 1.3.6.1.4.1.25623.1.0.801064)
  Overview: The host is running MySQL and is prone to Denial Of Service
  and Spoofing Vulnerabilities
  Vulnerability Insight:
  The flaws are due to:
  - mysqld does not properly handle errors during execution of certain SELECT
    statements with subqueries, and does not preserve certain null_value flags
    during execution of statements that use the 'GeomFromWKB()' function.
  - An error in 'vio_verify_callback()' function in 'viosslfactories.c', when
    OpenSSL is used, accepts a value of zero for the depth of X.509 certificates.
  Impact:
  Successful exploitation could allow users to cause a Denial of Service and
  man-in-the-middle attackers to spoof arbitrary SSL-based MySQL servers via
  a crafted certificate.
  Impact Level: Application
  Affected Software/OS:
  MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41 on all running platform.
  Fix: Upgrade to MySQL version 5.0.88 or 5.1.41
  For Updates Refer, http://dev.mysql.com/downloads
  References:
  http://bugs.mysql.com/47780
  http://bugs.mysql.com/47320
  http://marc.info/?l=oss-security&m=125881733826437&w=2
  http://dev.mysql.com/doc/refman/5.0/en/news-5-0-88.html
References
CVE: CVE-2009-4019, CVE-2009-4028
mysql (3306/tcp)
High (CVSS: 6.5)
NVT: MySQL Multiple Vulnerabilities (OID: 1.3.6.1.4.1.25623.1.0.801355)
  Overview: The host is running MySQL and is prone to multiple vulnerabilities.
  Vulnerability Insight:
  The flaws are due to:
  - An error in 'my_net_skip_rest()' function in 'sql/net_serv.cc' when handling
    a large number of packets that exceed the maximum length, which allows remote
    attackers to cause a denial of service (CPU and bandwidth consumption).
  - buffer overflow when handling 'COM_FIELD_LIST' command with a long
    table name, allows remote authenticated users to execute arbitrary code.
  - directory traversal vulnerability when handling a '..' (dot dot) in a
    table name, which allows remote authenticated users to bypass intended
    table grants to read field definitions of arbitrary tables.
  Impact:
  Successful exploitation could allow users to cause a denial of service and
  to execute arbitrary code.
  Impact Level: Application
  Affected Software/OS:
  MySQL 5.0.x before 5.0.91 and 5.1.x before 5.1.47 on all running platform.
  Fix: Upgrade to MySQL version 5.0.91 or 5.1.47,
  For Updates Refer, http://dev.mysql.com/downloads
  References:
  http://securitytracker.com/alerts/2010/May/1024031.html
  http://securitytracker.com/alerts/2010/May/1024033.html
  http://securitytracker.com/alerts/2010/May/1024032.html
  http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html
  http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html 
References
CVE: CVE-2010-1848, CVE-2010-1849, CVE-2010-1850
mysql (3306/tcp)
High (CVSS: 6.4)
NVT: MySQL multiple Vulnerabilities (OID: 1.3.6.1.4.1.25623.1.0.100356)
Overview:
MySQL is prone to a security-bypass vulnerability and to to a local
privilege-escalation vulnerability.
An attacker can exploit the security-bypass issue to bypass certain
security restrictions and obtain sensitive information that may lead
to further attacks.
Local attackers can exploit the local privilege-escalation issue to
gain elevated privileges on the affected computer.
Versions prior to MySQL 5.1.41 are vulnerable.
Solution:
Updates are available. Please see the references for details.
References:
http://www.securityfocus.com/bid/37076
http://www.securityfocus.com/bid/37075
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html
http://www.mysql.com/
References
BID: 37075, 37076
mysql (3306/tcp)
High (CVSS: 6.4)
NVT: Database Open Access Vulnerability (OID: 1.3.6.1.4.1.25623.1.0.902799)
  Overview: The host is running a Database server and is prone to information
  disclosure vulnerability.
  Vulnerability Insight:
  The flaw is caused due to not restricting direct access of databases to the
  remote systems.
  Impact:
  Successful exploitation could allow an attacker to obtain the sensitive
  information of the database.
  Impact Level: Application
  Affected Software/OS:
  MySQL
  IBM DB2
  PostgreSQL
  IBM solidDB
  Oracle Database
  Microsoft SQL Server
  Workaround:
  Restrict Database access to remote systems.
  References:
  https://www.pcisecuritystandards.org/security_standards/index.php?id=pci_dss_v1-2.pdf 
mysql (3306/tcp)
High (CVSS: 6.0)
NVT: MySQL Authenticated Access Restrictions Bypass Vulnerability (Linux) (OID: 1.3.6.1.4.1.25623.1.0.801065)
  Overview: The host is running MySQL and is prone to Access Restrictions Bypass
  Vulnerability
  Vulnerability Insight:
  The flaw is due to an error in 'sql/sql_table.cc', when the data home directory
  contains a symlink to a different filesystem.
  Impact:
  Successful exploitation could allow users to bypass intended access restrictions
  by calling CREATE TABLE with  DATA DIRECTORY or INDEX DIRECTORY argument referring
  to a subdirectory.
  Impact Level: Application
  Affected Software/OS:
  MySQL 5.0.x before 5.0.88, 5.1.x before 5.1.41, 6.0 before 6.0.9-alpha
  Fix: Upgrade to MySQL version 5.0.88 or 5.1.41 or 6.0.9-alpha
  For Updates Refer, http://dev.mysql.com/downloads
  References:
  http://lists.mysql.com/commits/59711
  http://bugs.mysql.com/bug.php?id=39277
  http://marc.info/?l=oss-security&m=125908040022018&w=2
References
CVE: CVE-2008-7247
mysql (3306/tcp)
High
NVT: MySQL 5.x Unspecified Buffer Overflow Vulnerability (OID: 1.3.6.1.4.1.25623.1.0.100271)
Overview:
MySQL is prone to a buffer-overflow vulnerability because if fails to
perform adequate boundary checks on user-supplied data.
An attacker can leverage this issue to execute arbitrary code within
the context of the vulnerable application. Failed exploit attempts
will result in a denial-of-service condition.
This issue affects MySQL 5.x; other versions may also be vulnerable.
References:
http://www.securityfocus.com/bid/36242
http://www.mysql.com/
http://intevydis.com/company.shtml
References
BID: 36242
nfs (2049/udp)
High (CVSS: 10.0)
NVT: NFS export (OID: 1.3.6.1.4.1.25623.1.0.102014)
Here is the export list of 192.168.56.3 : 
/ *
References
CVE: CVE-1999-0554, CVE-1999-0548
scientia-ssdb (2121/tcp)
High (CVSS: 10.0)
NVT: ProFTPD Multiple Remote Vulnerabilities (OID: 1.3.6.1.4.1.25623.1.0.801639)
  Overview: The host is running ProFTPD and is prone to multiple vulnerabilities.
  Vulnerability Insight:
  - An input validation error within the 'mod_site_misc' module can be exploited
    to create and delete directories, create symlinks, and change the time of
    files located outside a writable directory.
  - A logic error within the 'pr_netio_telnet_gets()' function in 'src/netio.c'
    when processing user input containing the Telnet IAC escape sequence can be
    exploited to cause a stack-based buffer overflow by sending specially
    crafted input to the FTP or FTPS service.
  Impact:
  Successful exploitation may allow execution of arbitrary code or cause a
  denial-of-service.
  Impact Level: Application
  Affected Software/OS:
  ProFTPD versions prior to 1.3.3c
  Fix: Upgrade to ProFTPD version 1.3.3c or later,
  For updates refer, http://www.proftpd.org/
  References:
  http://secunia.com/advisories/42052
  http://bugs.proftpd.org/show_bug.cgi?id=3519
  http://bugs.proftpd.org/show_bug.cgi?id=3521
  http://www.zerodayinitiative.com/advisories/ZDI-10-229/ 
References
CVE: CVE-2010-3867, CVE-2010-4221
BID: 44562
scientia-ssdb (2121/tcp)
High (CVSS: 7.5)
NVT: ProFTPD Server SQL Injection Vulnerability (OID: 1.3.6.1.4.1.25623.1.0.900507)
  Overview: This host is running ProFTPD Server and is prone to remote
  SQL Injection vulnerability.
  Vulnerability Insight:
  This flaw occurs because the server performs improper input sanitising,
  - when a %(percent) character is passed in the username, a single quote
    (') gets introduced during variable substitution by mod_sql and this
    eventually allows for an SQL injection during login.
  - when NLS support is enabled, a flaw in variable substition feature in
    mod_sql_mysql and mod_sql_postgres may allow an attacker to bypass
    SQL injection protection mechanisms via invalid, encoded multibyte
    characters.
  Impact:
  Successful exploitation will allow remote attackers to execute arbitrary
  SQL commands, thus gaining access to random user accounts.
  Affected Software/OS:
  ProFTPD Server version 1.3.1 through 1.3.2rc2
  Fix:
  Upgrade to the latest version 1.3.2rc3,
  http://www.proftpd.org/
  References:
  http://www.milw0rm.com/exploits/8037
  http://www.securityfocus.com/archive/1/archive/1/500833/100/0/threaded
  http://www.securityfocus.com/archive/1/archive/1/500851/100/0/threaded
References
CVE: CVE-2009-0542, CVE-2009-0543
BID: 33722
scientia-ssdb (2121/tcp)
High (CVSS: 6.8)
NVT: ProFTPD Long Command Handling Security Vulnerability (OID: 1.3.6.1.4.1.25623.1.0.900133)
  Overview : The host is running ProFTPD Server, which is prone to cross-site 
  request forgery vulnerability.
  Vulnerability Insight :
  The flaw exists due to the application truncating an overly long FTP command,
  and improperly interpreting the remainder string as a new FTP command.
  Impact : This can be exploited to execute arbitrary FTP commands on another
  user's session privileges.
  Impact Level : Application
  Affected Software/OS :
  ProFTPD Project versions 1.2.x on Linux
  ProFTPD Project versions 1.3.x on Linux
 
  Fix : Fixed is available in the SVN repository,
  http://www.proftpd.org/cvs.html
  *****
  NOTE : Ignore this warning, if above mentioned fix is applied already.
  *****
  References :
  http://secunia.com/advisories/31930/
  http://bugs.proftpd.org/show_bug.cgi?id=3115
References
CVE: CVE-2008-4242
BID: 31289
scientia-ssdb (2121/tcp)
High (CVSS: 5.8)
NVT: ProFTPD mod_tls Module NULL Character CA SSL Certificate Validation Security By... (OID: 1.3.6.1.4.1.25623.1.0.100316)
Overview:
ProFTPD is prone to a security-bypass vulnerability because the
application fails to properly validate the domain name in a signed CA
certificate, allowing attackers to substitute malicious SSL
certificates for trusted ones.
Successful exploits allows attackers to perform man-in-the-
middle attacks or impersonate trusted servers, which will aid in
further attacks.
Versions prior to ProFTPD 1.3.2b and 1.3.3 to 1.3.3.rc1 are vulnerable.
Solution:
Updates are available. Please see the references for details.
References:
http://www.securityfocus.com/bid/36804
http://bugs.proftpd.org/show_bug.cgi?id=3275
http://www.proftpd.org
References
CVE: CVE-2009-3639
BID: 36804
ssh (22/tcp)
High (CVSS: 9.0)
NVT: SSH Brute Force Logins with default Credentials (OID: 1.3.6.1.4.1.25623.1.0.103239)
Overview:
It was possible to login into the remote host using default credentials.
Solution:
Change the password as soon as possible.
It was possible to login with the following credentials <User>:<Password>
user:user
unknown (8180/tcp)
High (CVSS: 6.4)
NVT: Apache Tomcat 'Transfer-Encoding' Information Disclosure and Denial Of Service ... (OID: 1.3.6.1.4.1.25623.1.0.100712)
Overview:
Apache Tomcat is prone to multiple remote vulnerabilities including
information-disclosure and denial-of-service issues.
Remote attackers can exploit these issues to cause denial-of-service
conditions or gain access to potentially sensitive information;
information obtained may lead to further attacks.
The following versions are affected:
Tomcat 5.5.0 to 5.5.29 Tomcat 6.0.0 to 6.0.27 Tomcat 7.0.0
Tomcat 3.x, 4.x, and 5.0.x may also be affected.
Solution:
The vendor released updates. Please see the references for more
information.
References:
https://www.securityfocus.com/bid/41544
http://tomcat.apache.org/security-5.html
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/
http://www.securityfocus.com/archive/1/512272
References
CVE: CVE-2010-2227
BID: 41544
unknown (8180/tcp)
High (CVSS: 5.8)
NVT: Apache Tomcat Multiple Vulnerabilities January 2010 (OID: 1.3.6.1.4.1.25623.1.0.100474)
Overview:
Apache Tomcat is prone to a directory-traversal vulnerability and to
an authentication-bypass vulnerability.
Exploiting this issue allows attackers to delete arbitrary files
within the context of the current working directory or gain
unauthorized access to files and directories..
The following versions are affected:
Tomcat 5.5.0 through 5.5.28 
Tomcat 6.0.0 through 6.0.20
Solution:
The vendor has released updates. Please see the references for
details.
References:
http://www.securityfocus.com/bid/37945
http://www.securityfocus.com/bid/37944
http://www.securityfocus.com/bid/37942
http://tomcat.apache.org/
http://svn.apache.org/viewvc?view=revision&revision=892815
http://svn.apache.org/viewvc?view=revision&revision=902650
References
CVE: CVE-2009-2901, CVE-2009-2902, CVE-2009-2693
BID: 37945, 37942, 37944
x11 (6000/tcp)
High (CVSS: 10.0)
NVT: X Server (OID: 1.3.6.1.4.1.25623.1.0.10407)
This X server does *not* allow any client to connect to it
however it is recommended that you filter incoming connections
to this port as attacker may send garbage data and slow down
your X session or even kill the server.
Here is the server version : 11.0
Here is the message we received : Client is not authorized
Solution : filter incoming connections to ports 6000-6009
References
CVE: CVE-1999-0526
domain (53/udp)
Medium (CVSS: 4.3)
NVT: ISC BIND 9 Remote Dynamic Update Message Denial of Service Vulnerability (OID: 1.3.6.1.4.1.25623.1.0.100251)
Overview:
ISC BIND is prone to a remote denial-of-service vulnerability because
the application fails to properly handle specially crafted dynamic
update requests.
Successfully exploiting this issue allows remote attackers to crash
affected DNS servers, denying further service to legitimate users.
Versions prior to BIND 9.4.3-P3, 9.5.1-P3, and 9.6.1-P1 are
vulnerable.
Solution:
The vendor released an advisory and fixes to address this issue.
Please see the references for more information.
References:
http://www.securityfocus.com/bid/35848
https://bugzilla.redhat.com/show_bug.cgi?id=514292
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=538975
http://www.isc.org/products/BIND/
https://www.isc.org/node/474
http://www.kb.cert.org/vuls/id/725188
** It seems that OpenVAS was not able to crash the remote Bind.
According to its version number the remote version of BIND is
anyway vulnerable.
Please check its status right now.
References
CVE: CVE-2009-0696
BID: 35848
exec (512/tcp)
Medium
NVT: Check for rexecd Service (OID: 1.3.6.1.4.1.25623.1.0.100111)
  Overview:
   
   Rexecd Service is running at this Host.
   Rexecd (Remote Process Execution) has the same kind of functionality
   that rsh has : you can execute shell commands on a remote computer.
   The main difference is that rexecd authenticate by reading the
   username and password *unencrypted* from the socket.
  Solution:
   Disable rexec Service.
ftp (21/tcp)
Medium (CVSS: 4.0)
NVT: ProFTPD Denial of Service Vulnerability (OID: 1.3.6.1.4.1.25623.1.0.801640)
  Overview: The host is running ProFTPD and is prone to denial of service
  vulnerability.
  Vulnerability Insight:
  The flaw is caused due to an error in 'pr_data_xfer()' function which allows
  remote authenticated users to cause a denial of service (CPU consumption)
  via an ABOR command during a data transfer.
  Impact:
  Successful exploitation will let the attackers to cause a denial of service.
  Impact Level: Application
  Affected Software/OS:
  ProFTPD versions prior to 1.3.2rc3
  Fix: Upgrade to ProFTPD version 1.3.2rc3 or later,
  For updates refer, http://www.proftpd.org/
  References:
  http://bugs.proftpd.org/show_bug.cgi?id=3131 
References
CVE: CVE-2008-7265
general/tcp
Medium (CVSS: 5.0)
NVT: TCP Sequence Number Approximation Reset Denial of Service Vulnerability (OID: 1.3.6.1.4.1.25623.1.0.902815)
  Overview: The host is running TCP services and is prone to denial of service
  vulnerability.
  Vulnerability Insight:
  The flaw is triggered when spoofed TCP Reset packets are received by the
  targeted TCP stack and will result in loss of availability for the attacked
  TCP services.
  Impact:
  Successful exploitation will allow remote attackers to guess sequence numbers
  and cause a denial of service to persistent TCP connections by repeatedly
  injecting a TCP RST packet.
  Impact Level: System
  Affected Software/OS:
  TCP
  Fix: Please see the referenced advisories for more information on obtaining
  and applying fixes.
  References:
  http://www.osvdb.org/4030
  http://xforce.iss.net/xforce/xfdb/15886
  http://www.us-cert.gov/cas/techalerts/TA04-111A.html
  http://www-01.ibm.com/support/docview.wss?uid=isg1IY55949
  http://www-01.ibm.com/support/docview.wss?uid=isg1IY55950
  http://www-01.ibm.com/support/docview.wss?uid=isg1IY62006
  http://www.microsoft.com/technet/security/Bulletin/MS05-019.mspx
  http://www.microsoft.com/technet/security/bulletin/ms06-064.mspx
  http://www.cisco.com/en/US/products/csa/cisco-sa-20040420-tcp-nonios.html
  http://www.cisco.com/en/US/products/csa/cisco-sa-20040420-tcp-nonios.html 
References
CVE: CVE-2004-0230
BID: 10183
http (80/tcp)
Medium (CVSS: 5.0)
NVT: /doc directory browsable ? (OID: 1.3.6.1.4.1.25623.1.0.10056)
The /doc directory is browsable.
/doc shows the content of the /usr/doc directory and therefore it shows which programs and↵
 - important! - the version of the installed programs.
Solution : Use access restrictions for the /doc directory.
If you use Apache you might use this in your access.conf:
 <Directory /usr/doc>
 AllowOverride None
 order deny,allow
 deny from all
 allow from localhost
 </Directory>
References
CVE: CVE-1999-0678
BID: 318
http (80/tcp)
Medium (CVSS: 5.0)
NVT: awiki Multiple Local File Include Vulnerabilities (OID: 1.3.6.1.4.1.25623.1.0.103210)
Overview:
awiki is prone to multiple local file-include vulnerabilities because
it fails to properly sanitize user-supplied input.
An attacker can exploit this vulnerability to obtain potentially
sensitive information and execute arbitrary local scripts in the
context of the webserver process. This may allow the attacker to
compromise the application and the computer; other attacks are
also possible.
awiki 20100125 is vulnerable; other versions may also be affected.
References:
http://www.securityfocus.com/bid/49187
http://www.kobaonline.com/awiki/
References
BID: 49187
http (80/tcp)
Medium (CVSS: 4.3)
NVT: phpMyAdmin 'error.php' Cross Site Scripting Vulnerability (OID: 1.3.6.1.4.1.25623.1.0.801660)
  Overview: The host is running phpMyAdmin and is prone to Cross-Site Scripting
  Vulnerability.
  Vulnerability Insight:
  The flaw is caused by input validation errors in the 'error.php' script when
  processing crafted BBcode tags containing '@' characters, which could allow
  attackers to inject arbitrary HTML code within the error page and conduct
  phishing attacks.
  Impact:
  Successful exploitation will let the attackers to inject arbitrary HTML code
  within the error page and conduct phishing attacks.
  Impact Level: Application
  Affected Software/OS:
  phpMyAdmin version 3.3.8.1 and prior.
  Fix: No solution or patch is available as on 10th December, 2010. Information
  regarding this issue will be updated once the solution details are available.
  For updates refer, http://www.phpmyadmin.net/home_page/downloads.php
  References:
  http://www.exploit-db.com/exploits/15699/
  http://www.vupen.com/english/advisories/2010/3133 
References
CVE: CVE-2010-4480
http (80/tcp)
Medium (CVSS: 4.3)
NVT: TWiki 'organization' Cross-Site Scripting Vulnerability (OID: 1.3.6.1.4.1.25623.1.0.802391)
  Overview: The host is running TWiki and is prone to cross site scripting
  vulnerability.
  Vulnerability Insight:
  The flaw is caused due to an improper validation of user-supplied input
  to the 'organization' field when registering or editing a user, which allows
  attackers to execute arbitrary HTML and script code in a user's browser
  session in the context of an affected site.
  Impact:
  Successful exploitation will allow remote attackers to insert arbitrary HTML
  and script code, which will be executed in a user's browser session in the
  context of an affected site.
  Impact Level: Application
  Affected Software/OS:
  TWiki version 5.1.1 and prior
  Fix: No solution or patch is available as on 21st March, 2012. Information
  regarding this issue will be updated once the solution details are available.
  For updates refer, http://twiki.org/cgi-bin/view/Codev/DownloadTWiki
  References:
  http://osvdb.org/78664
  http://secunia.com/advisories/47784
  http://xforce.iss.net/xforce/xfdb/72821
  http://www.securitytracker.com/id?1026604
  http://www.securityfocus.com/bid/51731/info
  http://packetstormsecurity.org/files/109246/twiki-xss.txt 
References
CVE: CVE-2012-0979
BID: 51731
http (80/tcp)
Medium (CVSS: 4.3)
NVT: Apache HTTP Server 'httpOnly' Cookie Information Disclosure Vulnerability (OID: 1.3.6.1.4.1.25623.1.0.902830)
  Overview: This host is running Apache HTTP Server and is prone to cookie
  information disclosure vulnerability.
  Vulnerability Insight:
  The flaw is caused due to an error within the default error response for
  status code 400 when no custom ErrorDocument is configured, which can be
  exploited to expose 'httpOnly' cookies.
  Impact:
  Successful exploitation will allow attackers to obtain sensitive information
  that may aid in further attacks.
  Impact Level: Application
  Affected Software/OS:
  Apache HTTP Server versions 2.2.0 through 2.2.21
  Fix: Upgrade to Apache HTTP Server version 2.2.22 or later,
  For updates refer, http://httpd.apache.org/
  References:
  http://osvdb.org/78556
  http://secunia.com/advisories/47779
  http://www.exploit-db.com/exploits/18442
  http://rhn.redhat.com/errata/RHSA-2012-0128.html
  http://httpd.apache.org/security/vulnerabilities_22.html
  http://svn.apache.org/viewvc?view=revision&revision=1235454
  http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00026.html 
References
CVE: CVE-2012-0053
BID: 51706
http (80/tcp)
Medium
NVT: phpinfo.php (OID: 1.3.6.1.4.1.25623.1.0.11229)
The following files are calling the function phpinfo() which
disclose potentially sensitive information to the remote attacker : 
/phpinfo.php
/mutillidae/phpinfo.php
Solution : Delete them or restrict access to them
microsoft-ds (445/tcp)
Medium (CVSS: 2.1)
NVT: Samba 'client/mount.cifs.c' Remote Denial of Service Vulnerability (OID: 1.3.6.1.4.1.25623.1.0.100499)
Overview:
Samba is prone to a remote denial-of-service vulnerability.
A remote attacker can exploit this issue to crash the affected
application, denying service to legitimate users.
Samba 3.4.5 and earlier are vulnerable.
References:
http://www.securityfocus.com/bid/38326
http://git.samba.org/?p=samba.git;a=commit;h=a065c177dfc8f968775593ba00dffafeebb2e054
http://us1.samba.org/samba/
References
CVE: CVE-2010-0547
BID: 38326
mysql (3306/tcp)
Medium (CVSS: 4.6)
NVT: MySQL MyISAM Table Privileges Secuity Bypass Vulnerability (OID: 1.3.6.1.4.1.25623.1.0.100156)
 Overview:
  According to its version number, the remote version of MySQL is
  prone to a security-bypass vulnerability.
  An attacker can exploit this issue to gain access to table files created by
  other users, bypassing certain security restrictions.
  NOTE 1: This issue was also assigned CVE-2008-4097 because
  CVE-2008-2079 was incompletely fixed, allowing symlink attacks.
  NOTE 2: CVE-2008-4098 was assigned because fixes for the vector
  described in CVE-2008-4097 can also be bypassed.
  This issue affects versions prior to MySQL 4 (prior to 4.1.24) and
  MySQL 5 (prior to 5.0.60). 
 Solution:
  Updates are available. Update to newer Version.
 See also:
  http://www.securityfocus.com/bid/29106
References
CVE: CVE-2008-2079, CVE-2008-4097, CVE-2008-4098
BID: 29106
mysql (3306/tcp)
Medium (CVSS: 4.0)
NVT: Oracle MySQL 'TEMPORARY InnoDB' Tables Denial Of Service Vulnerability (OID: 1.3.6.1.4.1.25623.1.0.100763)
Overview:
MySQL is prone to a denial-of-service vulnerability.
An attacker can exploit these issues to crash the database, denying
access to legitimate users.
This issues affect versions prior to MySQL 5.1.49.
Solution:
Updates are available. Please see the references for more information.
References:
https://www.securityfocus.com/bid/42598
http://bugs.mysql.com/bug.php?id=54044
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html
http://www.mysql.com/
References
CVE: CVE-2010-3680
BID: 42598
mysql (3306/tcp)
Medium (CVSS: 4.0)
NVT: Oracle MySQL Prior to 5.1.49 Multiple Denial Of Service Vulnerabilities (OID: 1.3.6.1.4.1.25623.1.0.100785)
Overview:
MySQL is prone to a denial-of-service vulnerability.
An attacker can exploit this issue to crash the database, denying
access to legitimate users.
This issue affects versions prior to MySQL 5.1.49.
Solution:
Updates are available. Please see the references for more information.
References:
https://www.securityfocus.com/bid/42646
https://www.securityfocus.com/bid/42633
https://www.securityfocus.com/bid/42643
https://www.securityfocus.com/bid/42598
https://www.securityfocus.com/bid/42596
https://www.securityfocus.com/bid/42638
https://www.securityfocus.com/bid/42599
https://www.securityfocus.com/bid/42625
http://bugs.mysql.com/bug.php?id=54575
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html
http://www.mysql.com/
References
CVE: CVE-2010-3677
BID: 42646, 42633, 42643, 42598, 42596, 42638, 42599, 42625
mysql (3306/tcp)
Medium (CVSS: 4.0)
NVT: MySQL Empty Bit-String Literal Denial of Service Vulnerability (OID: 1.3.6.1.4.1.25623.1.0.900221)
 Overview : This host is running MySQL, which is prone to Denial of Service
 Vulnerability.
 Vulnerability Insight :
        Issue is due to error while processing an empty bit string literal via
        a specially crafted SQL statement.
        Impact : Successful exploitation by remote attackers could cause denying
        access to legitimate users.
 Impact Level : Application
 Affected Software/OS : 
        MySQL versions prior to 5.0.x - 5.0.66,
                                5.1.x - 5.1.26, and
                                6.0.x - 6.0.5 on all running platform.
 Fix : Update to version 5.0.66 or 5.1.26 or 6.0.6 or later.
 http://dev.mysql.com/downloads/
 References : 
 http://secunia.com/advisories/31769/
 http://bugs.mysql.com/bug.php?id=35658
 http://dev.mysql.com/doc/refman/5.1/en/news-5-1-26.html
References
CVE: CVE-2008-3963
BID: 31081
mysql (3306/tcp)
Medium (CVSS: 3.5)
NVT: MySQL 'ALTER DATABASE' Remote Denial Of Service Vulnerability (OID: 1.3.6.1.4.1.25623.1.0.801380)
  Overview: The host is running MySQL and is prone to Denial Of Service
  vulnerability.
  Vulnerability Insight:
  The flaw is due to an error when processing the 'ALTER DATABASE' statement and
  can be exploited to corrupt the MySQL data directory using the '#mysql50#'
  prefix followed by a '.' or '..'.
  NOTE: Successful exploitation requires 'ALTER' privileges on a database.
  Impact:
  Successful exploitation could allow an attacker to cause a Denial of Service.
  Impact Level: Application
  Affected Software/OS:
  MySQL version priot to 5.1.48 on all running platform.
  Fix: Upgrade to MySQL version 5.1.48
  For Updates Refer, http://dev.mysql.com/downloads
  References:
  http://secunia.com/advisories/40333
  http://bugs.mysql.com/bug.php?id=53804
  http://securitytracker.com/alerts/2010/Jun/1024160.html
  http://dev.mysql.com/doc/refman/5.1/en/news-5-1-48.html 
References
CVE: CVE-2010-2008
BID: 41198
scientia-ssdb (2121/tcp)
Medium (CVSS: 4.0)
NVT: ProFTPD Denial of Service Vulnerability (OID: 1.3.6.1.4.1.25623.1.0.801640)
  Overview: The host is running ProFTPD and is prone to denial of service
  vulnerability.
  Vulnerability Insight:
  The flaw is caused due to an error in 'pr_data_xfer()' function which allows
  remote authenticated users to cause a denial of service (CPU consumption)
  via an ABOR command during a data transfer.
  Impact:
  Successful exploitation will let the attackers to cause a denial of service.
  Impact Level: Application
  Affected Software/OS:
  ProFTPD versions prior to 1.3.2rc3
  Fix: Upgrade to ProFTPD version 1.3.2rc3 or later,
  For updates refer, http://www.proftpd.org/
  References:
  http://bugs.proftpd.org/show_bug.cgi?id=3131 
References
CVE: CVE-2008-7265
shell (514/tcp)
Medium
NVT: Check for rsh Service (OID: 1.3.6.1.4.1.25623.1.0.100080)
  
  Overview:
   rsh Service is running at this Host.
   rsh (remote shell) is a command line computer program which can execute
   shell commands as another user, and on another computer across a computer
   network. 
  Solution:
   Disable rsh and use ssh instead.
smtp (25/tcp)
Medium
NVT: Check if Mailserver answer to VRFY and EXPN requests (OID: 1.3.6.1.4.1.25623.1.0.100072)
 Overview:
  The Mailserver on this host answers to VRFY and/or EXPN requests.
  VRFY and EXPN ask the server for information about an address. They are
  inherently unusable through firewalls, gateways, mail exchangers for part-time
  hosts, etc. OpenVAS suggests that, if you really want to publish this type of
  information, you use a mechanism that legitimate users actually know about,
  such as Finger or HTTP. 
 Solution:
  Disable VRFY and/or EXPN on your Mailserver. 
  For postfix add 'disable_vrfy_command=yes' in 'main.cf'. 
  For Sendmail add the option 'O PrivacyOptions=goaway'.
 See also:
  http://cr.yp.to/smtp/vrfy.html
Details:
'VRFY root' produces the following answer: 252 2.0.0 root 
ssh (22/tcp)
Medium (CVSS: 3.5)
NVT: openssh-server Forced Command Handling Information Disclosure Vulnerability (OID: 1.3.6.1.4.1.25623.1.0.103503)
Overview:
The auth_parse_options function in auth-options.c in sshd in OpenSSH before 5.7
provides debug messages containing authorized_keys command options, which allows
remote authenticated users to obtain potentially sensitive information by
reading these messages, as demonstrated by the shared user account required by
Gitolite. NOTE: this can cross privilege boundaries because a user account may
intentionally have no shell or filesystem access, and therefore may have no
supported way to read an authorized_keys file in its own home directory.
OpenSSH before 5.7 is affected; 
Solution:
Updates are available. Please see the references for more information.
References:
http://www.securityfocus.com/bid/51702
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=657445
http://packages.debian.org/squeeze/openssh-server
https://downloads.avaya.com/css/P8/documents/100161262
References
CVE: CVE-2012-0814
BID: 51702
unknown (8180/tcp)
Medium (CVSS: 5.0)
NVT: Apache Tomcat Multiple Vulnerabilities June-09 (OID: 1.3.6.1.4.1.25623.1.0.800813)
  Overview: This host is running Apache Tomcat Server and is prone to
  multiple vulnerabilities.
  Vulnerability Insight:
  Multiple flows are due to,
  - Error in 'XML parser' used for other web applications, which allows local users to
    read or modify the web.xml, context.xml, or tld files via a crafted application
    that is loaded earlier than the target application.
  - when FORM authentication is used, cause enumerate valid usernames via requests
    to /j_security_check with malformed URL encoding of passwords, related to
    improper error checking in the MemoryRealm, DataSourceRealm, and JDBCRealm
    authentication realms, as demonstrated by a % (percent) value for the
    j_password parameter.
  - when the 'Java AJP connector' and 'mod_jk load balancing' are used, via a
    crafted request with invalid headers, related to temporary blocking of
    connectors that have encountered errors, as demonstrated by an error
    involving a malformed HTTP Host header.
  Impact:
  Successful attempt could lead to remote code execution and attacker can gain
  the full permission on affected file, and can cause denial of service.
  Impact Level: System/Application
  Affected Software/OS:
  Apache Tomcat version 6.0.0 to 6.0.18
  Apache Tomcat version 5.5.0 to 5.5.27
  Apache Tomcat version 4.1.0 to 4.1.39
  Fix: Upgrade to Apache Tomcat version 4.1.40, or 5.5.28, or 6.0.20
  http://archive.apache.org/dist/tomcat/
  References:
  http://tomcat.apache.org/security-6.html
  http://tomcat.apache.org/security-5.html
  http://tomcat.apache.org/security-4.html
  http://www.securitytracker.com/id?1022336
  http://www.vupen.com/english/advisories/2009/1496
  http://svn.apache.org/viewvc?view=rev&revision=781708
References
CVE: CVE-2009-0033, CVE-2009-0580, CVE-2009-0783, CVE-2008-5515
BID: 35193, 35196
unknown (8180/tcp)
Medium (CVSS: 4.3)
NVT: Apache Tomcat RemoteFilterValve Security Bypass Vulnerability (OID: 1.3.6.1.4.1.25623.1.0.800024)
  Overview: Apache Tomcat Server is running on this host and that is prone to
  security bypass vulnerability.
  Vulnerability Insight:
  Flaw in the application is due to the synchronisation problem when checking
  IP addresses. This could allow user from a non permitted IP address to gain
  access to a context that is protected with a valve that extends
  RemoteFilterValve including the standard RemoteAddrValve and RemoteHostValve
  implementations.
  Impact: Successful attempt could lead to remote code execution and attacker
  can gain access to context of the filtered value.
  Impact Level: Application
  Affected Software/OS:
  Apache Tomcat version 4.1.x - 4.1.31, and 5.5.0
  Fix: Upgrade to Apache Tomcat version 4.1.32, or 5.5.1, or later,
  http://archive.apache.org/dist/tomcat/
  References:
  http://tomcat.apache.org/security-4.html
  http://tomcat.apache.org/security-5.html
  https://issues.apache.org/bugzilla/show_bug.cgi?id=25835
References
CVE: CVE-2008-3271
BID: 31698
unknown (8180/tcp)
Medium (CVSS: 2.6)
NVT: Apache Tomcat Authentication Header Realm Name Information Disclosure Vulnerabi... (OID: 1.3.6.1.4.1.25623.1.0.100598)
Overview:
Apache Tomcat is prone to a remote information-disclosure
vulnerability.
Remote attackers can exploit this issue to obtain the host name or IP
address of the Tomcat server. Information harvested may lead to
further attacks.
The following versions are affected:
Tomcat 5.5.0 through 5.5.29 Tomcat 6.0.0 through 6.0.26
Tomcat 3.x, 4.0.x, and 5.0.x may also be affected.
Solution:
Updates are available. Please see the references for more information.
References:
http://www.securityfocus.com/bid/39635
http://tomcat.apache.org/security-5.html
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/
http://svn.apache.org/viewvc?view=revision&revision=936540
http://svn.apache.org/viewvc?view=revision&revision=936541
http://www.securityfocus.com/archive/1/510879
References
CVE: CVE-2010-1157
BID: 39635
unknown (8180/tcp)
Medium (CVSS: 2.6)
NVT: Apache Tomcat Security bypass vulnerability (OID: 1.3.6.1.4.1.25623.1.0.901114)
  Overview: This host is running Apache Tomcat server and is prone to security
  bypass vulnerability.
  Vulnerability Insight:
  The flaw is caused by 'realm name' in the 'WWW-Authenticate' HTTP header for
  'BASIC' and 'DIGEST' authentication that might allow remote attackers to
  discover the server's hostname or IP address by sending a request for a
  resource.
  Impact:
  Remote attackers can exploit this issue to obtain the host name or IP address
  of the Tomcat server. Information harvested may aid in further attacks.
  Impact Level: Application
  Affected Software/OS:
  Apache Tomcat version 5.5.0 to 5.5.29
  Apache Tomcat version 6.0.0 to 6.0.26
  Fix: Upgrade to the latest version of Apache Tomcat 5.5.30 or 6.0.27 or later,
  For updates refer, http://tomcat.apache.org
  References:
  http://tomcat.apache.org/security-5.html
  http://tomcat.apache.org/security-6.html
  http://www.securityfocus.com/archive/1/510879 
References
CVE: CVE-2010-1157
BID: 39635
domain (53/tcp)
Low (CVSS: 5.0)
NVT: Determine which version of BIND name daemon is running (OID: 1.3.6.1.4.1.25623.1.0.10028)
BIND 'NAMED' is an open-source DNS server from ISC.org.
Many proprietary DNS servers are based on BIND source code.
The BIND based NAMED servers (or DNS servers) allow remote users
to query for version and type information.  The query of the CHAOS
TXT record 'version.bind', will typically prompt the server to send
the information back to the querying source.
The remote bind version is : 9.4.2
Solution :
Using the 'version' directive in the 'options' section will block
the 'version.bind' query, but it will not log such attempts.
domain (53/tcp)
Low (CVSS: 0.0)
NVT: DNS Server Detection (OID: 1.3.6.1.4.1.25623.1.0.100069)
 Overview:
  A DNS Server is running at this Host.
  A Name Server translates domain names into IP addresses. This makes it
  possible for a user to access a website by typing in the domain name instead of
  the website's actual IP address.
domain (53/udp)
Low (CVSS: 0.0)
NVT: DNS Server Detection (OID: 1.3.6.1.4.1.25623.1.0.100069)
 Overview:
  A DNS Server is running at this Host.
  A Name Server translates domain names into IP addresses. This makes it
  possible for a user to access a website by typing in the domain name instead of
  the website's actual IP address.
ftp (21/tcp)
Low
NVT: FTP Server type and version (OID: 1.3.6.1.4.1.25623.1.0.10092)
Remote FTP server banner :
220 (vsFTPd 2.3.4) 
general/icmp
Low (CVSS: 0.0)
NVT: Record route (OID: 1.3.6.1.4.1.25623.1.0.12264)
Here is the route recorded between 192.168.56.4 and 192.168.56.3 :
192.168.56.3.
192.168.56.3.
general/tcp
Low
NVT: TCP timestamps (OID: 1.3.6.1.4.1.25623.1.0.80091)
Synopsis :
The remote service implements TCP timestamps.
Description :
The remote host implements TCP timestamps, as defined by RFC1323.
A side effect of this feature is that the uptime of the remote 
host can sometimes be computed.
See also :
http://www.ietf.org/rfc/rfc1323.txt
general/tcp
Low (CVSS: 0.0)
NVT: ProFTPD Server Remote Version Detection (OID: 1.3.6.1.4.1.25623.1.0.900815)
ProFTPD version 1.3.1 was detected on the host
http (80/tcp)
Low (CVSS: 0.0)
NVT: HTTP Server type and version (OID: 1.3.6.1.4.1.25623.1.0.10107)
The remote web server type is :
Apache/2.2.8 (Ubuntu) DAV/2 
Solution : You can set the directive 'ServerTokens Prod' to limit
the information emanating from the server in its response headers.
http (80/tcp)
Low (CVSS: 0.0)
NVT: Directory Scanner (OID: 1.3.6.1.4.1.25623.1.0.11032)
The following directories were discovered:
/cgi-bin, /doc, /test, /icons, /phpMyAdmin
While this is not, in and of itself, a bug, you should manually inspect 
these directories to ensure that they are in compliance with company
security standards
References
Other:
OWASP:OWASP-CM-006
http (80/tcp)
Low (CVSS: 0.0)
NVT: phpMyAdmin Detection (OID: 1.3.6.1.4.1.25623.1.0.900129)
  phpMyAdmin is running at this Host.
  phpMyAdmin is a free software tool written in PHP intended to handle
  the administration of MySQL over the World Wide Web. 
phpMyAdmin was detected on the remote host in the following directory(s):
phpMyAdmin (Ver. unknown) under /phpMyAdmin.
msgsrvr (8787/tcp)
Low (CVSS: 0.0)
NVT: Unknown services banners (OID: 1.3.6.1.4.1.25623.1.0.11154)
An unknown server is running on this port.
If you know what it is, please send this banner to the OpenVAS team:
0x0000:  00 00 00 03 04 08 46 00 00 03 A1 04 08 6F 3A 16    ......F......o:.
0x0010:  44 52 62 3A 3A 44 52 62 43 6F 6E 6E 45 72 72 6F    DRb::DRbConnErro
0x0020:  72 07 3A 07 62 74 5B 17 22 2F 2F 75 73 72 2F 6C    r.:.bt[."//usr/l
0x0030:  69 62 2F 72 75 62 79 2F 31 2E 38 2F 64 72 62 2F    ib/ruby/1.8/drb/
0x0040:  64 72 62 2E 72 62 3A 35 37 33 3A 69 6E 20 60 6C    drb.rb:573:in `l
0x0050:  6F 61 64 27 22 37 2F 75 73 72 2F 6C 69 62 2F 72    oad'"7/usr/lib/r
0x0060:  75 62 79 2F 31 2E 38 2F 64 72 62 2F 64 72 62 2E    uby/1.8/drb/drb.
0x0070:  72 62 3A 36 31 32 3A 69 6E 20 60 72 65 63 76 5F    rb:612:in `recv_
0x0080:  72 65 71 75 65 73 74 27 22 37 2F 75 73 72 2F 6C    request'"7/usr/l
0x0090:  69 62 2F 72 75 62 79 2F 31 2E 38 2F 64 72 62 2F    ib/ruby/1.8/drb/
0x00A0:  64 72 62 2E 72 62 3A 39 31 31 3A 69 6E 20 60 72    drb.rb:911:in `r
0x00B0:  65 63 76 5F 72 65 71 75 65 73 74 27 22 3C 2F 75    ecv_request'"</u
0x00C0:  73 72 2F 6C 69 62 2F 72 75 62 79 2F 31 2E 38 2F    sr/lib/ruby/1.8/
0x00D0:  64 72 62 2F 64 72 62 2E 72 62 3A 31 35 33 30 3A    drb/drb.rb:1530:
0x00E0:  69 6E 20 60 69 6E 69 74 5F 77 69 74 68 5F 63 6C    in `init_with_cl
0x00F0:  69 65 6E 74 27 22 39 2F 75 73 72 2F 6C 69 62 2F    ient'"9/usr/lib/
0x0100:  72 75 62 79 2F 31 2E 38 2F 64 72 62 2F 64 72 62    ruby/1.8/drb/drb
0x0110:  2E 72 62 3A 31 35 34 32 3A 69 6E 20 60 73 65 74    .rb:1542:in `set
0x0120:  75 70 5F 6D 65 73 73 61 67 65 27 22 33 2F 75 73    up_message'"3/us
0x0130:  72 2F 6C 69 62 2F 72 75 62 79 2F 31 2E 38 2F 64    r/lib/ruby/1.8/d
0x0140:  72 62 2F 64 72 62 2E 72 62 3A 31 34 39 34 3A 69    rb/drb.rb:1494:i
0x0150:  6E 20 60 70 65 72 66 6F 72 6D 27 22 35 2F 75 73    n `perform'"5/us
0x0160:  72 2F 6C 69 62 2F 72 75 62 79 2F 31 2E 38 2F 64    r/lib/ruby/1.8/d
0x0170:  72 62 2F 64 72 62 2E 72 62 3A 31 35 38 39 3A 69    rb/drb.rb:1589:i
0x0180:  6E 20 60 6D 61 69 6E 5F 6C 6F 6F 70 27 22 30 2F    n `main_loop'"0/
0x0190:  75 73 72 2F 6C 69 62 2F 72 75 62 79 2F 31 2E 38    usr/lib/ruby/1.8
0x01A0:  2F 64 72 62 2F 64 72 62 2E 72 62 3A 31 35 38 35    /drb/drb.rb:1585
0x01B0:  3A 69 6E 20 60 6C 6F 6F 70 27 22 35 2F 75 73 72    :in `loop'"5/usr
0x01C0:  2F 6C 69 62 2F 72 75 62 79 2F 31 2E 38 2F 64 72    /lib/ruby/1.8/dr
0x01D0:  62 2F 64 72 62 2E 72 62 3A 31 35 38 35 3A 69 6E    b/drb.rb:1585:in
0x01E0:  20 60 6D 61 69 6E 5F 6C 6F 6F 70 27 22 31 2F 75     `main_loop'"1/u
0x01F0:  73 72 2F 6C 69 62 2F 72 75 62 79 2F 31 2E 38 2F    sr/lib/ruby/1.8/
0x0200:  64 72 62 2F 64 72 62 2E 72 62 3A 31 35 38 31 3A    drb/drb.rb:1581:
0x0210:  69 6E 20 60 73 74 61 72 74 27 22 35 2F 75 73 72    in `start'"5/usr
0x0220:  2F 6C 69 62 2F 72 75 62 79 2F 31 2E 38 2F 64 72    /lib/ruby/1.8/dr
0x0230:  62 2F 64 72 62 2E 72 62 3A 31 35 38 31 3A 69 6E    b/drb.rb:1581:in
0x0240:  20 60 6D 61 69 6E 5F 6C 6F 6F 70 27 22 2F 2F 75     `main_loop'"//u
0x0250:  73 72 2F 6C 69 62 2F 72 75 62 79 2F 31 2E 38 2F    sr/lib/ruby/1.8/
0x0260:  64 72 62 2F 64 72 62 2E 72 62 3A 31 34 33 30 3A    drb/drb.rb:1430:
0x0270:  69 6E 20 60 72 75 6E 27 22 31 2F 75 73 72 2F 6C    in `run'"1/usr/l
0x0280:  69 62 2F 72 75 62 79 2F 31 2E 38 2F 64 72 62 2F    ib/ruby/1.8/drb/
0x0290:  64 72 62 2E 72 62 3A 31 34 32 37 3A 69 6E 20 60    drb.rb:1427:in `
0x02A0:  73 74 61 72 74 27 22 2F 2F 75 73 72 2F 6C 69 62    start'"//usr/lib
0x02B0:  2F 72 75 62 79 2F 31 2E 38 2F 64 72 62 2F 64 72    /ruby/1.8/drb/dr
0x02C0:  62 2E 72 62 3A 31 34 32 37 3A 69 6E 20 60 72 75    b.rb:1427:in `ru
0x02D0:  6E 27 22 36 2F 75 73 72 2F 6C 69 62 2F 72 75 62    n'"6/usr/lib/rub
0x02E0:  79 2F 31 2E 38 2F 64 72 62 2F 64 72 62 2E 72 62    y/1.8/drb/drb.rb
0x02F0:  3A 31 33 34 37 3A 69 6E 20 60 69 6E 69 74 69 61    :1347:in `initia
0x0300:  6C 69 7A 65 27 22 2F 2F 75 73 72 2F 6C 69 62 2F    lize'"//usr/lib/
0x0310:  72 75 62 79 2F 31 2E 38 2F 64 72 62 2F 64 72 62    ruby/1.8/drb/drb
0x0320:  2E 72 62 3A 31 36 32 37 3A 69 6E 20 60 6E 65 77    .rb:1627:in `new
0x0330:  27 22 39 2F 75 73 72 2F 6C 69 62 2F 72 75 62 79    '"9/usr/lib/ruby
0x0340:  2F 31 2E 38 2F 64 72 62 2F 64 72 62 2E 72 62 3A    /1.8/drb/drb.rb:
0x0350:  31 36 32 37 3A 69 6E 20 60 73 74 61 72 74 5F 73    1627:in `start_s
0x0360:  65 72 76 69 63 65 27 22 25 2F 75 73 72 2F 73 62    ervice'"%/usr/sb
0x0370:  69 6E 2F 64 72 75 62 79 5F 74 69 6D 65 73 65 72    in/druby_timeser
0x0380:  76 65 72 2E 72 62 3A 31 32 3A 09 6D 65 73 67 22    ver.rb:12:.mesg"
0x0390:  20 74 6F 6F 20 6C 61 72 67 65 20 70 61 63 6B 65     too large packe
0x03A0:  74 20 31 32 31 32 35 30 31 30 37 32                t 1212501072    
scientia-ssdb (2121/tcp)
Low
NVT: FTP Server type and version (OID: 1.3.6.1.4.1.25623.1.0.10092)
Remote FTP server banner :
220 ProFTPD 1.3.1 Server (Debian) [::ffff:192.168.56.3] 
smtp (25/tcp)
Low (CVSS: 7.5)
NVT: SMTP too long line (OID: 1.3.6.1.4.1.25623.1.0.11270)
Some antivirus scanners dies when they process an email with a 
too long string without line breaks.
Such a message was sent. If there is an antivirus on your MTA,
it might have crashed. Please check its status right now, as 
it is not possible to do it remotely
smtp (25/tcp)
Low (CVSS: 7.2)
NVT: SMTP antivirus scanner DoS (OID: 1.3.6.1.4.1.25623.1.0.11036)
The file 42.zip was sent 2 times. If there is an antivirus in your MTA, it might
have crashed. Please check its status right now, as it is
not possible to do so remotely
References
BID: 3027
smtp (25/tcp)
Low
NVT: SMTP Server type and version (OID: 1.3.6.1.4.1.25623.1.0.10263)
Remote SMTP server banner :
220 metasploitable.localdomain ESMTP Postfix (Ubuntu) 
This is probably: Postfix
smtp (25/tcp)
Low (CVSS: 0.0)
NVT: SMTP STARTTLS Detection Detection (OID: 1.3.6.1.4.1.25623.1.0.103118)
Overview:
The remote Mailserver supports the STARTTLS command.
sunrpc (111/tcp)
Low (CVSS: 0.0)
NVT: rpcinfo -p (OID: 1.3.6.1.4.1.25623.1.0.11111)
RPC program #100000 version 2 'portmapper' (portmap sunrpc rpcbind) is running on port 111
sunrpc (111/tcp)
Low (CVSS: 0.0)
NVT: rpcinfo -p (OID: 1.3.6.1.4.1.25623.1.0.11111)
RPC program #100003 version 2 'nfs' (nfsprog) is running on port 2049
RPC program #100003 version 3 'nfs' (nfsprog) is running on port 2049
RPC program #100003 version 4 'nfs' (nfsprog) is running on port 2049
sunrpc (111/tcp)
Low (CVSS: 0.0)
NVT: rpcinfo -p (OID: 1.3.6.1.4.1.25623.1.0.11111)
RPC program #100005 version 1 'mountd' (mount showmount) is running on port 37000
RPC program #100005 version 2 'mountd' (mount showmount) is running on port 37000
RPC program #100005 version 3 'mountd' (mount showmount) is running on port 37000
sunrpc (111/tcp)
Low (CVSS: 0.0)
NVT: rpcinfo -p (OID: 1.3.6.1.4.1.25623.1.0.11111)
RPC program #100021 version 1 'nlockmgr' is running on port 44501
RPC program #100021 version 3 'nlockmgr' is running on port 44501
RPC program #100021 version 4 'nlockmgr' is running on port 44501
sunrpc (111/tcp)
Low (CVSS: 0.0)
NVT: rpcinfo -p (OID: 1.3.6.1.4.1.25623.1.0.11111)
RPC program #100024 version 1 'status' is running on port 57176
sunrpc (111/udp)
Low (CVSS: 0.0)
NVT: rpcinfo -p (OID: 1.3.6.1.4.1.25623.1.0.11111)
RPC program #100000 version 2 'portmapper' (portmap sunrpc rpcbind) is running on port 111
sunrpc (111/udp)
Low (CVSS: 0.0)
NVT: rpcinfo -p (OID: 1.3.6.1.4.1.25623.1.0.11111)
RPC program #100003 version 2 'nfs' (nfsprog) is running on port 2049
RPC program #100003 version 3 'nfs' (nfsprog) is running on port 2049
RPC program #100003 version 4 'nfs' (nfsprog) is running on port 2049
sunrpc (111/udp)
Low (CVSS: 0.0)
NVT: rpcinfo -p (OID: 1.3.6.1.4.1.25623.1.0.11111)
RPC program #100005 version 1 'mountd' (mount showmount) is running on port 33649
RPC program #100005 version 2 'mountd' (mount showmount) is running on port 33649
RPC program #100005 version 3 'mountd' (mount showmount) is running on port 33649
sunrpc (111/udp)
Low (CVSS: 0.0)
NVT: rpcinfo -p (OID: 1.3.6.1.4.1.25623.1.0.11111)
RPC program #100021 version 1 'nlockmgr' is running on port 58930
RPC program #100021 version 3 'nlockmgr' is running on port 58930
RPC program #100021 version 4 'nlockmgr' is running on port 58930
sunrpc (111/udp)
Low (CVSS: 0.0)
NVT: rpcinfo -p (OID: 1.3.6.1.4.1.25623.1.0.11111)
RPC program #100024 version 1 'status' is running on port 48701
telnet (23/tcp)
Low
NVT: Check for Telnet Server (OID: 1.3.6.1.4.1.25623.1.0.100074)
  Overview:
   A telnet Server is running at this host.
   Experts in computer security, such as SANS Institute, and the members of the
   comp.os.linux.security newsgroup recommend that the use of Telnet for remote
   logins should be discontinued under all normal circumstances, for the following
   reasons:
   * Telnet, by default, does not encrypt any data sent over the connection
     (including passwords), and so it is often practical to eavesdrop on the
     communications and use the password later for malicious purposes; anybody who
     has access to a router, switch, hub or gateway located on the network between
     the two hosts where Telnet is being used can intercept the packets passing by
     and obtain login and password information (and whatever else is typed) with any
     of several common utilities like tcpdump and Wireshark.
    
   * Most implementations of Telnet have no authentication that would ensure
     communication is carried out between the two desired hosts and not intercepted
     in the middle.
   * Commonly used Telnet daemons have several vulnerabilities discovered over
     the years.
telnet (23/tcp)
Low
NVT: Detect Server type and version via Telnet (OID: 1.3.6.1.4.1.25623.1.0.10281)
Remote telnet banner :
                _                  _       _ _        _     _      ____   
 _ __ ___   ___| |_ __ _ ___ _ __ | | ___ (_) |_ __ _| |__ | | ___|___ \  
| '_ ` _ \ / _ \ __/ _` / __| '_ \| |/ _ \| | __/ _` | '_ \| |/ _ \ __) | 
| | | | | |  __/ || (_| \__ \ |_) | | (_) | | || (_| | |_) | |  __// __/  
|_| |_| |_|\___|\__\__,_|___/ .__/|_|\___/|_|\__\__,_|_.__/|_|\___|_____| 
                            |_|                                           
 
 
Warning: Never expose this VM to an untrusted network! 
 
Contact: msfdev[at]metasploit.com 
 
Login with msfadmin/msfadmin to get started 
 
 
metasploitable login: 
tftp (69/udp)
Low (CVSS: 0.0)
NVT: TFTP detection (OID: 1.3.6.1.4.1.25623.1.0.80100)
Synopsis :
The remote host has TFTP server running.
Description :
The remote host has TFTP server running. TFTP stands 
for Trivial File Transfer Protocol.
Solution : 
Disable TFTP server if not used.
unknown (8180/tcp)
Low (CVSS: 2.0)
NVT: Fingerprint web server with favicon.ico (OID: 1.3.6.1.4.1.25623.1.0.20108)
Synopsis :
The remote web server contains a graphic image that is prone to
information disclosure. 
Description :
The 'favicon.ico' file found on the remote web server belongs to a
popular webserver.  This may be used to fingerprint the web server. 
Solution: 
Remove the 'favicon.ico' file or create a custom one for your site. 
CVSS Base Score : 2 (AV:R/AC:L/Au:NR/C:P/A:N/I:N/B:N)
Plugin output :
The 'favico.ico' fingerprints this webserver as tomcat (5.5.26).
unknown (8180/tcp)
Low (CVSS: 0.0)
NVT: HTTP Server type and version (OID: 1.3.6.1.4.1.25623.1.0.10107)
The remote web server type is :
Apache-Coyote/1.1 
and the 'ServerTokens' directive is ProductOnly
Apache does not permit to hide the server type.
unknown (8180/tcp)
Low (CVSS: 0.0)
NVT: Web mirroring (OID: 1.3.6.1.4.1.25623.1.0.10662)
The following CGI have been discovered :
Syntax : cginame (arguments [default value])
/servlets-examples/servlet/RequestParamExample (firstname [] lastname [] )
/jsp-examples/jsp2/el/implicit-objects.jsp (foo [bar] )
/jsp-examples/jsp2/el/functions.jsp (foo [JSP+2.0] )
/servlets-examples/servlet/CookieExample (cookiename [] cookievalue [] )
/admin/j_security_check;jsessionid=41E65FC4E316C34D5B282E81652C0C1F (j_username [] j_passw↵
ord [] )
/servlets-examples/servlet/SessionExample;jsessionid=28C2AEF7D90C498A0FBB20AE56133F5C (dat↵
aname [] datavalue [] )
unknown (8180/tcp)
Low (CVSS: 0.0)
NVT: Directory Scanner (OID: 1.3.6.1.4.1.25623.1.0.11032)
The following directories were discovered:
/admin
While this is not, in and of itself, a bug, you should manually inspect 
these directories to ensure that they are in compliance with company
security standards
References
Other:
OWASP:OWASP-CM-006
unknown (8180/tcp)
Low (CVSS: 0.0)
NVT: Apache Tomcat Version Detection (OID: 1.3.6.1.4.1.25623.1.0.800371)
Apache Tomcat version 5.5 was detected on the host
vnc (5900/tcp)
Low (CVSS: 0.0)
NVT: Check for VNC (OID: 1.3.6.1.4.1.25623.1.0.10342)
Synopsis :
The remote host is running a remote display software (VNC)
Description :
The remote server is running VNC, a software which permits a 
console to be displayed remotely.
This allows authenticated users of the remote host to take its 
control remotely.
Solution : 
Make sure the use of this software is done in accordance with your
corporate security policy, filter incoming traffic to this port.
Plugin output :
The version of the VNC protocol is : RFB 003.003
vnc (5900/tcp)
Low
NVT: VNC security types (OID: 1.3.6.1.4.1.25623.1.0.19288)
The remote VNC server chose security type #2 (VNC authentication)
ajp13 (8009/tcp)
Log (CVSS: 0.0)
NVT: Identify unknown services with nmap (OID: 1.3.6.1.4.1.25623.1.0.66286)
nmap thinks ajp13 is running on this port
distcc (3632/tcp)
Log (CVSS: 0.0)
NVT: Identify unknown services with nmap (OID: 1.3.6.1.4.1.25623.1.0.66286)
nmap thinks distccd is running on this port
ftp (21/tcp)
Log (CVSS: 0.0)
NVT: Services (OID: 1.3.6.1.4.1.25623.1.0.10330)
An FTP server is running on this port.
Here is its banner : 
220 (vsFTPd 2.3.4) 
general/CPE-T
Log (CVSS: 0.0)
NVT: CPE Inventory (OID: 1.3.6.1.4.1.25623.1.0.810002)
192.168.56.3|cpe:/a:samba:samba:3.0.20
192.168.56.3|cpe:/a:x.org:x11:11.0
192.168.56.3|cpe:/a:tikiwiki:tikiwiki:1.9.5
192.168.56.3|cpe:/a:apache:tomcat:5.5
192.168.56.3|cpe:/a:postgresql:postgresql
192.168.56.3|cpe:/a:proftpd:proftpd:1.3.1
192.168.56.3|cpe:/a:apache:http_server:2.2.8
192.168.56.3|cpe:/a:php:php:5.2.4
192.168.56.3|cpe:/a:openbsd:openssh:4.7p1
192.168.56.3|cpe:/o:canonical:ubuntu_linux
general/HOST-T
Log (CVSS: 0.0)
NVT: Host Summary (OID: 1.3.6.1.4.1.25623.1.0.810003)
traceroute:192.168.56.4,192.168.56.3
TCP ports:44501,80,3632,5900,8009,8180,8787,6667,445,21,111,2049,22,6000,23,512,513,37000,↵
25,514,1099,6697,2121,3306,139,1524,57176,53,51571,5432
UDP ports:111,68,69,53,137,2049,138
general/SMBClient
Log (CVSS: 0.0)
NVT: SMB Test (OID: 1.3.6.1.4.1.25623.1.0.90011)
The tool "smbclient" is not available for openvasd.
Therefore none of the tests using smbclient are executed.
general/icmp
Log (CVSS: 0.0)
NVT: ICMP Timestamp Detection (OID: 1.3.6.1.4.1.25623.1.0.103190)
Overview:
The remote host responded to an ICMP timestamp request. The Timestamp Reply is
an ICMP message which replies to a Timestamp message. It consists of the
originating timestamp sent by the sender of the Timestamp as well as a receive
timestamp and a transmit timestamp. This information could theoretically be used
to exploit weak time-based random number generators in other services.
See also:
http://www.ietf.org/rfc/rfc0792.txt
References
CVE: CVE-1999-0524
general/tcp
Log (CVSS: 0.0)
NVT: OS fingerprinting (OID: 1.3.6.1.4.1.25623.1.0.102002)
ICMP based OS fingerprint results: (100% confidence)
Linux Kernel
general/tcp
Log (CVSS: 0.0)
NVT: DIRB (NASL wrapper) (OID: 1.3.6.1.4.1.25623.1.0.103079)
DIRB could not be found in your system path.
OpenVAS was unable to execute DIRB and to perform the scan you
requested.
Please make sure that DIRB is installed and is
available in the PATH variable defined for your environment.
general/tcp
Log (CVSS: 0.0)
NVT: Checks for open udp ports (OID: 1.3.6.1.4.1.25623.1.0.103978)
Open UDP ports: 111, 68, 69, 53, 137, 2049, 138
general/tcp
Log (CVSS: 0.0)
NVT: arachni (NASL wrapper) (OID: 1.3.6.1.4.1.25623.1.0.110001)
Arachni could not be found in your system path.
OpenVAS was unable to execute Arachni and to perform the scan you
requested.
Please make sure that Arachni is installed and that arachni is
available in the PATH variable defined for your environment.
general/tcp
Log (CVSS: 0.0)
NVT: Nikto (NASL wrapper) (OID: 1.3.6.1.4.1.25623.1.0.14260)
Nikto could not be found in your system path.
OpenVAS was unable to execute Nikto and to perform the scan you
requested.
Please make sure that Nikto is installed and that nikto.pl or nikto is
available in the PATH variable defined for your environment.
general/tcp
Log (CVSS: 0.0)
NVT: Information about the scan (OID: 1.3.6.1.4.1.25623.1.0.19506)
Information about this scan : 
OpenVAS Scanner version : 5.0.3
NVT feed version : 201208011335
Type of NVT feed : OpenVAS NVT Feed
Scanner IP : 192.168.56.4
Port scanner(s) : nmap 
Port range : T:1-65535,U:2-3,7,9,13,17,19-23,37-38,42,49,53,67-69,80,88,111-113,120,123,13↵
5-139,158,161-162,177,192,199,207,217,363,389,402,407,427,434,443,445,464,497,500,502,512-↵
515,517-518,520,539,559,593,623,626,631,639,643,657,664,682-689,764,767,772-776,780-782,78↵
6,789,800,814,826,829,838,902-903,944,959,965,983,989-990,996-1001,1007-1008,1012-1014,101↵
9-1051,1053-1060,1064-1070,1072,1080-1081,1087-1088,1090,1100-1101,1105,1124,1200,1214,123↵
4,1346,1419,1433-1434,1455,1457,1484-1485,1524,1645-1646,1701,1718-1719,1761,1782,1804,181↵
2-1813,1885-1886,1900-1901,1993,2000,2002,2048-2049,2051,2148,2160-2161,2222-2223,2343,234↵
5,2362,2967,3052,3130,3283,3296,3343,3389,3401,3456-3457,3659,3664,3702-3703,4000,4008,404↵
5,4444,4500,4666,4672,5000-5003,5010,5050,5060,5093,5351,5353,5355,5500,5555,5632,6000-600↵
2,6004,6050,6346-6347,6970-6971,7000,7938,8000-8001,8010,8181,8193,8900,9000-9001,9020,910↵
3,9199-9200,9370,9876-9877,9950,10000,10080,11487,16086,16402,16420,16430,16433,16449,1649↵
8,16503,16545,16548,16573,16674,16680,16697,16700,16708,16711,16739,16766,16779,16786,1681↵
6,16829,16832,16838-16839,16862,16896,16912,16918-16919,16938-16939,16947-16948,16970,1697↵
2,16974,17006,17018,17077,17091,17101,17146,17184-17185,17205,17207,17219,17236-17237,1728↵
2,17302,17321,17331-17332,17338,17359,17417,17423-17424,17455,17459,17468,17487,17490,1749↵
4,17505,17533,17549,17573,17580,17585,17592,17605,17615-17616,17629,17638,17663,17673-1767↵
4,17683,17726,17754,17762,17787,17814,17823-17824,17836,17845,17888,17939,17946,17989,1800↵
4,18081,18113,18134,18156,18228,18234,18250,18255,18258,18319,18331,18360,18373,18449,1848↵
5,18543,18582,18605,18617,18666,18669,18676,18683,18807,18818,18821,18830,18832,18835,1886↵
9,18883,18888,18958,18980,18985,18987,18991,18994,18996,19017,19022,19039,19047,19075,1909↵
6,19120,19130,19140-19141,19154,19161,19165,19181,19193,19197,19222,19227,19273,19283,1929↵
4,19315,19322,19332,19374,19415,19482,19489,19500,19503-19504,19541,19600,19605,19616,1962↵
4-19625,19632,19639,19647,19650,19660,19662-19663,19682-19683,19687,19695,19707,19717-1971↵
9,19722,19728,19789,19792,19933,19935-19936,19956,19995,19998,20003-20004,20019,20031,2008↵
2,20117,20120,20126,20129,20146,20154,20164,20206,20217,20249,20262,20279,20288,20309,2031↵
3,20326,20359-20360,20366,20380,20389,20409,20411,20423-20425,20445,20449,20464-20465,2051↵
8,20522,20525,20540,20560,20665,20678-20679,20710,20717,20742,20752,20762,20791,20817,2084↵
2,20848,20851,20865,20872,20876,20884,20919,21000,21016,21060,21083,21104,21111,21131,2116↵
7,21186,21206-21207,21212,21247,21261,21282,21298,21303,21318,21320,21333,21344,21354,2135↵
8,21360,21364,21366,21383,21405,21454,21468,21476,21514,21524-21525,21556,21566,21568,2157↵
6,21609,21621,21625,21644,21649,21655,21663,21674,21698,21702,21710,21742,21780,21784,2180↵
0,21803,21834,21842,21847,21868,21898,21902,21923,21948,21967,22029,22043,22045,22053,2205↵
5,22105,22109,22123-22124,22341,22692,22695,22739,22799,22846,22914,22986,22996,23040,2317↵
6,23354,23531,23557,23608,23679,23781,23965,23980,24007,24279,24511,24594,24606,24644,2485↵
4,24910,25003,25157,25240,25280,25337,25375,25462,25541,25546,25709,25931,26407,26415,2672↵
0,26872,26966,27015,27195,27444,27473,27482,27707,27892,27899,28122,28369,28465,28493,2854↵
3,28547,28641,28840,28973,29078,29243,29256,29810,29823,29977,30263,30303,30365,30544,3065↵
6,30697,30704,30718,30975,31059,31073,31109,31189,31195,31335,31337,31365,31625,31681,3173↵
1,31891,32345,32385,32528,32768-32780,32798,32815,32818,32931,33030,33249,33281,33354-3335↵
5,33459,33717,33744,33866,33872,34038,34079,34125,34358,34422,34433,34555,34570,34577-3458↵
0,34758,34796,34855,34861-34862,34892,35438,35702,35777,35794,36108,36206,36384,36458,3648↵
9,36669,36778,36893,36945,37144,37212,37393,37444,37602,37761,37783,37813,37843,38037,3806↵
3,38293,38412,38498,38615,39213,39217,39632,39683,39714,39723,39888,40019,40116,40441,4053↵
9,40622,40708,40711,40724,40732,40805,40847,40866,40915,41058,41081,41308,41370,41446,4152↵
4,41638,41702,41774,41896,41967,41971,42056,42172,42313,42431,42434,42508,42557,42577,4262↵
7,42639,43094,43195,43370,43514,43686,43824,43967,44101,44160,44179,44185,44190,44253,4433↵
4,44508,44923,44946,44968,45247,45380,45441,45685,45722,45818,45928,46093,46532,46836,4762↵
4,47765,47772,47808,47915,47981,48078,48189,48255,48455,48489,48761,49152-49163,49165-4918↵
2,49184-49202,49204-49205,49207-49216,49220,49222,49226,49259,49262,49306,49350,49360,4939↵
3,49396,49503,49640,49968,50099,50164,50497,50612,50708,50919,51255,51456,51554,51586,5169↵
0,51717,51905,51972,52144,52225,52503,53006,53037,53571,53589,53838,54094,54114,54281,5432↵
1,54711,54807,54925,55043,55544,55587,56141,57172,57409-57410,57813,57843,57958,57977,5800↵
2,58075,58178,58419,58631,58640,58797,59193,59207,59765,59846,60172,60381,60423,61024,6114↵
2,61319,61322,61370,61412,61481,61550,61685,61961,62154,62287,62575,62677,62699,62958,6342↵
0,63555,64080,64481,64513,64590,64727
Thorough tests : no
Experimental tests : no
Paranoia level : 1
Report Verbosity : 1
Safe checks : no
Max hosts : 30
Max checks : 10
Scan Start Date : 2012/8/16 2:12
Scan duration : 3416 sec
general/tcp
Log (CVSS: 0.0)
NVT: Traceroute (OID: 1.3.6.1.4.1.25623.1.0.51662)
Here is the route from 192.168.56.4 to 192.168.56.3:
192.168.56.4
192.168.56.3
general/tcp
Log (CVSS: 0.0)
NVT: TWiki Version Detection (OID: 1.3.6.1.4.1.25623.1.0.800399)
Detected TWiki version: unknown
Location: /twiki
CPE: 
Concluded from version identification result:
general/tcp
Log
NVT: 3com switch2hub (OID: 1.3.6.1.4.1.25623.1.0.80103)
Fake IP address not specified. Skipping this check. 
general/tcp
Log (CVSS: 0.0)
NVT: Microsoft SMB Signing Disabled (OID: 1.3.6.1.4.1.25623.1.0.802726)
SMB signing is disabled on this host
general/tcp
Log (CVSS: 0.0)
NVT: Checks for open tcp ports (OID: 1.3.6.1.4.1.25623.1.0.900239)
Open TCP ports: 44501, 80, 3632, 5900, 8009, 8180, 8787, 6667, 445, 21, 111, 2049, 22, 600↵
0, 23, 512, 513, 37000, 25, 514, 1099, 6697, 2121, 3306, 139, 1524, 57176, 53, 51571, 5432
general/tcp
Log (CVSS: 0.0)
NVT: Apache Web ServerVersion Detection (OID: 1.3.6.1.4.1.25623.1.0.900498)
Detected Apache version 2.2.8
CPE: cpe:/a:apache:http_server:2.2.8
Concluded from version identification result:
HTTP/1.1 200 OK 
Date: Wed, 15 Aug 2012 06:20:47 GMT 
Server: Apache/2.2.8 (Ubuntu) DAV/2 
X-Powered-By: PHP/5.2.4-2ubuntu5.10 
Content-Length: 891 
Connection: close 
Content-Type: text/html 
 
<html><head><title>Metasploitable2 - Linux</title></head><body>
<pre>
                _                  _       _ _        _     _      ____  
 _ __ ___   ___| |_ __ _ ___ _ __ | | ___ (_) |_ __ _| |__ | | ___|___ \ 
| '_ ` _ \ / _ \ __/ _` / __| '_ \| |/ _ \| | __/ _` | '_ \| |/ _ \ __) |
| | | | | |  __/ || (_| \__ \ |_) | | (_) | | || (_| | |_) | |  __// __/ 
|_| |_| |_|\___|\__\__,_|___/ .__/|_|\___/|_|\__\__,_|_.__/|_|\___|_____|
                            |_|                                          
Warning: Never expose this VM to an untrusted network!
Contact: msfdev[at]metasploit.com
Login with msfadmin/msfadmin to get started
</pre>
<ul>
<li><a href="/twiki/">TWiki</a></li>
<li><a href="/phpMyAdmin/">phpMyAdmin</a></li>
<li><a href="/mutillidae/">Mutillidae</a></li>
<li><a href="/dvwa/">DVWA</a></li>
<li><a href="/dav/">WebDAV</a></li>
</ul>
</body>
</html>
general/tcp
Log (CVSS: 0.0)
NVT: Anonymous FTP Checking (OID: 1.3.6.1.4.1.25623.1.0.900600)
  Overview:
   This FTP Server allows anonymous logins.
   
   A host that provides an FTP service may additionally provide Anonymous FTP
   access as well. Under this arrangement, users do not strictly need an account
   on the host. Instead the user typically enters 'anonymous' or 'ftp' when
   prompted for username. Although users are commonly asked to send their email
   address as their password, little to no verification is actually performed on
   the supplied data. 
 Solution:
   If you do not want to share files, you should disable anonymous logins.
References
CVE: CVE-1999-0497
general/tcp
Log (CVSS: 0.0)
NVT: TikiWiki Version Detection (OID: 1.3.6.1.4.1.25623.1.0.901001)
Detected TikiWiki version: 1.9.5 under /tikiwiki
Location: /tikiwiki
CPE: cpe:/a:tikiwiki:tikiwiki:1.9.5
Concluded from version identification result:
1.9.5
http (80/tcp)
Log (CVSS: 0.0)
NVT: Services (OID: 1.3.6.1.4.1.25623.1.0.10330)
A web server is running on this port
http (80/tcp)
Log (CVSS: 0.0)
NVT: PHP Version Detection (OID: 1.3.6.1.4.1.25623.1.0.800109)
Detected PHP version: 5.2.4
Location: none
CPE: cpe:/a:php:php:5.2.4
Concluded from version identification result:
X-Powered-By: PHP/5.2.4-2ubuntu5.10 
http (80/tcp)
Log (CVSS: 0.0)
NVT: wapiti (NASL wrapper) (OID: 1.3.6.1.4.1.25623.1.0.80110)
wapiti could not be found in your system path.
OpenVAS was unable to execute wapiti and to perform the scan you
requested.
Please make sure that wapiti is installed and that wapiti is
available in the PATH variable defined for your environment.
ircd (6667/tcp)
Log (CVSS: 0.0)
NVT: Identify unknown services with nmap (OID: 1.3.6.1.4.1.25623.1.0.66286)
nmap thinks irc is running on this port
login (513/tcp)
Log (CVSS: 0.0)
NVT: Identify unknown services with nmap (OID: 1.3.6.1.4.1.25623.1.0.66286)
nmap thinks login is running on this port
microsoft-ds (445/tcp)
Log (CVSS: 0.0)
NVT: SMB NativeLanMan (OID: 1.3.6.1.4.1.25623.1.0.102011)
Overview:
It is possible to extract OS, domain and SMB server information
from the Session Setup AndX Response packet which is generated
during NTLM authentication.
Detected SMB workgroup: WORKGROUP
Detected SMB server: Samba 3.0.20-Debian
Detected OS: Unix
microsoft-ds (445/tcp)
Log (CVSS: 0.0)
NVT: SMB log in (OID: 1.3.6.1.4.1.25623.1.0.10394)
It was possible to log into the remote host using the SMB protocol.
microsoft-ds (445/tcp)
Log (CVSS: 0.0)
NVT: SMB on port 445 (OID: 1.3.6.1.4.1.25623.1.0.11011)
A CIFS server is running on this port
mysql (3306/tcp)
Log (CVSS: 0.0)
NVT: MySQL Detection (OID: 1.3.6.1.4.1.25623.1.0.100152)
Detected MySQL version: 5.0.51a-3ubuntu5
Location: none
Concluded from version identification result:
5.0.51a-3ubuntu5     6E7"Eu?w ,ª                ]J9!99Rp]cVg 
mysql (3306/tcp)
Log (CVSS: 0.0)
NVT: Services (OID: 1.3.6.1.4.1.25623.1.0.10330)
An unknown service is running on this port.
It is usually reserved for MySQL
netbios-ns (137/udp)
Log (CVSS: 0.0)
NVT: Using NetBIOS to retrieve information from a Windows host (OID: 1.3.6.1.4.1.25623.1.0.10150)
The following 7 NetBIOS names have been gathered :
 METASPLOITABLE  = This is the computer name registered for workstation services by a WINS↵
 client.
 METASPLOITABLE  = This is the current logged in user registered for this workstation.
 METASPLOITABLE  = Computer name
   __MSBROWSE__ 
 WORKGROUP       = Workgroup / Domain name
 WORKGROUP      
 WORKGROUP       = Workgroup / Domain name (part of the Browser elections)
. This SMB server seems to be a SAMBA server (this is not a security
risk, this is for your information). This can be told because this server 
claims to have a null MAC address
If you do not want to allow everyone to find the NetBios name
of your computer, you should filter incoming traffic to this port.
netbios-ssn (139/tcp)
Log (CVSS: 0.0)
NVT: SMB on port 445 (OID: 1.3.6.1.4.1.25623.1.0.11011)
An SMB server is running on this port
postgresql (5432/tcp)
Log (CVSS: 0.0)
NVT: PostgreSQL Detection (OID: 1.3.6.1.4.1.25623.1.0.100151)
Detected PostgreSQL version: unknown
Location: 5432/tcp
CPE: cpe:/a:postgresql:postgresql
Concluded from version identification result:
R
postgresql (5432/tcp)
Log (CVSS: 0.0)
NVT: Services (OID: 1.3.6.1.4.1.25623.1.0.10330)
An unknown service is running on this port.
It is usually reserved for Postgres
scientia-ssdb (2121/tcp)
Log (CVSS: 0.0)
NVT: Services (OID: 1.3.6.1.4.1.25623.1.0.10330)
An FTP server is running on this port.
Here is its banner : 
220 ProFTPD 1.3.1 Server (Debian) [::ffff:192.168.56.3] 
smtp (25/tcp)
Log (CVSS: 0.0)
NVT: Services (OID: 1.3.6.1.4.1.25623.1.0.10330)
An SMTP server is running on this port
Here is its banner : 
220 metasploitable.localdomain ESMTP Postfix (Ubuntu) 
ssh (22/tcp)
Log (CVSS: 0.0)
NVT: SSH Protocol Versions Supported (OID: 1.3.6.1.4.1.25623.1.0.100259)
The remote SSH Server supports the following SSH Protocol Versions:
1.99
2.0
SSHv2 Fingerprint: 56:56:24:0f:21:1d:de:a7:2b:ae:61:b1:24:3d:e8:f3
ssh (22/tcp)
Log (CVSS: 0.0)
NVT: SSH Server type and version (OID: 1.3.6.1.4.1.25623.1.0.10267)
Detected SSH server version: SSH-2.0-OpenSSH_4.7p1 Debian-8ubuntu1
Remote SSH supported authentication: publickey,password
Remote SSH banner: 
(not available)
CPE: cpe:/a:openbsd:openssh:4.7p1
Concluded from remote connection attempt with credentials:
  Login: OpenVAS
  Password: OpenVAS
ssh (22/tcp)
Log (CVSS: 0.0)
NVT: Services (OID: 1.3.6.1.4.1.25623.1.0.10330)
An ssh server is running on this port
telnet (23/tcp)
Log (CVSS: 0.0)
NVT: Services (OID: 1.3.6.1.4.1.25623.1.0.10330)
A telnet server seems to be running on this port
unknown (6697/tcp)
Log (CVSS: 0.0)
NVT: Identify unknown services with nmap (OID: 1.3.6.1.4.1.25623.1.0.66286)
nmap thinks irc is running on this port
unknown (8180/tcp)
Log (CVSS: 0.0)
NVT: Services (OID: 1.3.6.1.4.1.25623.1.0.10330)
A web server is running on this port
unknown (8180/tcp)
Log (CVSS: 0.0)
NVT: wapiti (NASL wrapper) (OID: 1.3.6.1.4.1.25623.1.0.80110)
wapiti could not be found in your system path.
OpenVAS was unable to execute wapiti and to perform the scan you
requested.
Please make sure that wapiti is installed and that wapiti is
available in the PATH variable defined for your environment.
This file was automatically generated.