This report contains all 91 results selected by the filtering described above. Before filtering there were 91 results.

Size: px
Start display at page:

Download "This report contains all 91 results selected by the filtering described above. Before filtering there were 91 results."

Transcription

1 Results: This document reports on the results of the Yarubo vulnerability scan. The report first summarises the results found. Then, for each host, the report describes every issue found. Please consider the advice given in each description, in order to rectify the issue. Vendor security updates are not trusted. Overrides are on. When a result has an override, this report uses the threat of the override. Notes are included in the report. This report might not show details of all issues that were found. It only lists hosts that produced issues. Issues with the threat level "Debug" are not shown. This report contains all 91 results selected by the filtering described above. Before filtering there were 91 results. Scan started: Thu Aug 29 03:00: Scan ended: Thu Aug 29 03:12: Host Summary Host Start End High Medium Low Log False Positive Aug 29, 03:01:02 Aug 29, 03:12: Total: Results per Host Host Scanning of this host started at: T03:01:02Z Number of results: 91 Port Summary for Host Service (Port) general/tcp daap (3689/tcp) http-alt (8080/tcp) mysql (3306/tcp) ntp (123/udp) general/cpe-t general/host-t Threat Level High High Medium Low Low Low Low Log Log netbios-ns (137/udp) Log ssh (22/tcp) Log Security Issues for Host High (CVSS: 10.0) NVT: OpenSSL 'bn_wexpend()' Error Handling Unspecified Vulnerability (OID: )

2 OpenSSL is prone to an unspecified vulnerability in bn_wexpend(). According to its banner, Yarubo has discovered that the remote Webserver is using a version prior to OpenSSL 0.9.8m which is vulnerable. The vendor has released updates. Please see the references for more information. CVE: CVE BID: High (CVSS: 9.3) NVT: PHP version smaller than (OID: ) PHP version smaller than suffers vulnerability. Update PHP to version or later. CVE: CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE BID: 38708, 40461, 40948, High (CVSS: 7.5) NVT: OpenSSL Cryptographic Message Syntax Memory Corruption Vulnerability (OID: ) OpenSSL is prone to a remote memory-corruption vulnerability. According to its banner, Yarubo has discovered that the remote Webserver is using a version prior to OpenSSL 0.9.8o/1.0.0a which is vulnerable An attacker can exploit this issue by supplying specially crafted structures to a vulnerable application that uses the affected library. Successfully exploiting this issue can allow the attacker to execute arbitrary code. Failed exploit attempts will result in a denial-ofservice condition. Versions of OpenSSL 0.9.h through 0.9.8n and OpenSSL 1.0.x prior to 1.0.0a are affected. Note that Cryptographic Message Syntax (CMS) functionality is only enabled by default in OpenSSL versions 1.0.x. Updates are available. Please see the references for more information. CVE: CVE BID: High (CVSS: 7.5) NVT: MacOS X Finder reveals contents of Apache Web directories (OID: ) MacOS X creates a hidden file, '.DS_Store' in each directory that has been viewed with the 'Finder'. This file contains a list of the contents of the directory, giving an attacker information on the structure and contents of your website. Use a <FilesMatch> directive in httpd.conf to forbid retrieval of this file: <FilesMatch '^\.[Dd][Ss]_[Ss]'> Order allow, deny Deny from all </FilesMatch> and restart Apache. CVE: CVE BID: 3316, 3325

3 High (CVSS: 7.5) NVT: PHP version 5.3< (OID: ) PHP version < suffers multiple vulnerabilities such as integer overflow vulnerabilit y, buffer overflow error and several casting errors. Recommendation: Upgrade PHP to or later versions. CVE: CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE BID: 46354, 46365, 46786, High (CVSS: 7.5) NVT: phpinfo.php (OID: ) The following files are calling the function phpinfo() which disclose potentially sensitive information to the remote attacker : /xampp/phpinfo.php Delete them or restrict access to them High (CVSS: 6.8) NVT: PHP version smaller than (OID: ) PHP version smaller than suffers vulnerability. Update PHP to version or later. CVE: CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE BID: 40173, 43926, 44605, 44718, 44723, 44951, 44980, 45119, 45335, 45338, 45339, 45952, 45954, 46056, High (CVSS: 6.5) NVT: phpmyadmin Bookmark Security Bypass Vulnerability (OID: ) phpmyadmin is prone to a security-bypass vulnerability that affects bookmarks. Successfully exploiting this issue allows a remote attacker to bypass certain security restrictions and perform unauthorized actions. Versions prior to phpmyadmin and are vulnerable. Updates are available. Please see the references for details. CVE: CVE BID: High (CVSS: 5.8) NVT: http TRACE XSS attack (OID: ) Debugging functions are enabled on the remote HTTP server. Description : The remote webserver supports the TRACE and/or TRACK methods. TRACE and TRACK are HTTP methods which are used to debug web server connections. It has been shown that servers supporting this method are subject to cross-site-scripting attacks, dubbed XST for Cross-Site-Tracing, when used in conjunction with various weaknesses in browsers.

4 An attacker may use this flaw to trick your legitimate web users to give him their credentials. Disable these methods. Plugin output : Add the following lines for each virtual host in your configuration file : RewriteEngine on RewriteCond %{REQUEST_METHOD} ^(TRACE TRACK) RewriteRule.* - [F] CVE: CVE , CVE BID: 9506, 9561, High (CVSS: 10.0) NVT: OpenSSL 'bn_wexpend()' Error Handling Unspecified Vulnerability (OID: ) OpenSSL is prone to an unspecified vulnerability in bn_wexpend(). According to its banner, Yarubo has discovered that the remote Webserver is using a version prior to OpenSSL 0.9.8m which is vulnerable. The vendor has released updates. Please see the references for more information. CVE: CVE BID: High (CVSS: 9.3) NVT: PHP version smaller than (OID: ) PHP version smaller than suffers vulnerability. Update PHP to version or later. CVE: CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE BID: 38708, 40461, 40948, High (CVSS: 7.5) NVT: OpenSSL Cryptographic Message Syntax Memory Corruption Vulnerability (OID: ) OpenSSL is prone to a remote memory-corruption vulnerability. According to its banner, Yarubo has discovered that the remote Webserver is using a version prior to OpenSSL 0.9.8o/1.0.0a which is vulnerable An attacker can exploit this issue by supplying specially crafted structures to a vulnerable application that uses the affected library. Successfully exploiting this issue can allow the attacker to execute arbitrary code. Failed exploit attempts will result in a denial-ofservice condition. Versions of OpenSSL 0.9.h through 0.9.8n and OpenSSL 1.0.x prior to 1.0.0a are affected. Note that Cryptographic Message Syntax (CMS) functionality is only enabled by default in OpenSSL versions 1.0.x. Updates are available. Please see the references for more information. CVE: CVE BID: 40502

5 High (CVSS: 7.5) NVT: MacOS X Finder reveals contents of Apache Web directories (OID: ) MacOS X creates a hidden file, '.DS_Store' in each directory that has been viewed with the 'Finder'. This file contains a list of the contents of the directory, giving an attacker information on the structure and contents of your website. Use a <FilesMatch> directive in httpd.conf to forbid retrieval of this file: <FilesMatch '^\.[Dd][Ss]_[Ss]'> Order allow, deny Deny from all </FilesMatch> and restart Apache. CVE: CVE BID: 3316, 3325 High (CVSS: 7.5) NVT: PHP version 5.3< (OID: ) PHP version < suffers multiple vulnerabilities such as integer overflow vulnerabilit y, buffer overflow error and several casting errors. Recommendation: Upgrade PHP to or later versions. CVE: CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE BID: 46354, 46365, 46786, High (CVSS: 6.8) NVT: PHP version smaller than (OID: ) PHP version smaller than suffers vulnerability. Update PHP to version or later. CVE: CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE , CVE BID: 40173, 43926, 44605, 44718, 44723, 44951, 44980, 45119, 45335, 45338, 45339, 45952, 45954, 46056, High (CVSS: 6.5) NVT: phpmyadmin Bookmark Security Bypass Vulnerability (OID: ) phpmyadmin is prone to a security-bypass vulnerability that affects bookmarks. Successfully exploiting this issue allows a remote attacker to bypass certain security restrictions and perform unauthorized actions. Versions prior to phpmyadmin and are vulnerable. Updates are available. Please see the references for details. CVE: CVE BID: High (CVSS: 5.8)

6 NVT: http TRACE XSS attack (OID: ) Debugging functions are enabled on the remote HTTP server. Description : The remote webserver supports the TRACE and/or TRACK methods. TRACE and TRACK are HTTP methods which are used to debug web server connections. It has been shown that servers supporting this method are subject to cross-site-scripting attacks, dubbed XST for Cross-Site-Tracing, when used in conjunction with various weaknesses in browsers. An attacker may use this flaw to trick your legitimate web users to give him their credentials. Disable these methods. Plugin output : Add the following lines for each virtual host in your configuration file : RewriteEngine on RewriteCond %{REQUEST_METHOD} ^(TRACE TRACK) RewriteRule.* - [F] CVE: CVE , CVE BID: 9506, 9561, Medium (CVSS: 2.6) NVT: TCP timestamps (OID: ) general/tcp It was detected that the host implements RFC1323. The following timestamps were retrieved with a delay of 1 seconds in-between: Paket 1: Paket 2: Medium (CVSS: 5.0) NVT: OpenSSL 'ssl3_get_record()' Remote Denial of Service Vulnerability (OID: ) OpenSSL is prone to a denial-of-service vulnerability caused by a NULL-pointer dereference. According to its banner, Yarubo has discovered that the remote Webserver is using a version prior to OpenSSL 0.9.8n which is vulnerable. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. OpenSSL versions 0.9.8f through 0.9.8m are vulnerable. Updates are available. Please see the references for more information. CVE: CVE BID: Medium (CVSS: 5.0) NVT: Apache UserDir Sensitive Information Disclosure (OID: ) An information leak occurs on Apache based web servers whenever the UserDir module is enabled. The vulnerability allows an external attacker to enumerate existing accounts by requesting access to their home directory and monitoring the response. 1) Disable this feature by changing 'UserDir public_html' (or whatever) to 'UserDir disabled'. Or 2) Use a RedirectMatch rewrite rule under Apache -- this works even if there is no such entry in the password file, e.g.: RedirectMatch ^/~(.*)$ Or 3) Add into httpd.conf:

7 ErrorDocument ErrorDocument (NOTE: You need to use a FQDN inside the URL for it to work properly). Additional Information: CVE: CVE BID: 3335 NVT: OpenSSL 'dtls1_retrieve_buffered_fragment()' Remote Denial of Service Vulnerabi... (OID: ) OpenSSL is prone to a denial-of-service vulnerability caused by a NULL-pointer dereference. According to its banner, Yarubo has discovered that the remote Webserver is using a version prior to OpenSSL 0.9.8n which is vulnerable. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. OpenSSL versions 0.9.8m and prior are vulnerable. Updates are available. Please see the references for more information. CVE: CVE BID: NVT: phpmyadmin Multiple Cross Site Scripting Vulnerabilities (OID: ) phpmyadmin is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. The following versions are vulnerable: phpmyadmin 2.11.x prior to phpmyadmin 3.x prior to Updates are available. Please see the references for details. CVE: CVE BID: NVT: phpmyadmin Debug Backtrace Cross Site Scripting Vulnerability (OID: ) phpmyadmin is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. Versions prior to phpmyadmin are vulnerable; other versions may also be affected.

8 Vendor updates are available. Please see the references for more information. CVE: CVE BID: NVT: phpmyadmin Database Search Cross Site Scripting Vulnerability (OID: ) phpmyadmin is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. Versions prior to phpmyadmin and are vulnerable. Vendor updates are available. Please see the references for more information. CVE: CVE BID: NVT: phpmyadmin Setup Script Request Cross Site Scripting Vulnerability (OID: ) The host is running phpmyadmin and is prone to Cross-Site Scripting Vulnerability. The flaw is caused by an unspecified input validation error when processing spoofed requests sent to setup script, which could be exploited by attackers to cause arbitrary scripting code to be executed on the user's browser session in the security context of an affected site. Successful exploitation will allow attackers to execute arbitrary web script or HTML in a user's browser session in the context of an affected site. Impact Level: Application phpmyadmin versions 3.x before Upgrade to phpmyadmin version or later, For updates refer to CVE: CVE NVT: phpmyadmin 'error.php' Cross Site Scripting Vulnerability (OID: ) The host is running phpmyadmin and is prone to Cross-Site Scripting Vulnerability. The flaw is caused by input validation errors in the 'error.php' script when

9 processing crafted BBcode tags containing characters, which could allow attackers to inject arbitrary HTML code within the error page and conduct phishing attacks. Successful exploitation will allow attackers to inject arbitrary HTML code within the error page and conduct phishing attacks. Impact Level: Application phpmyadmin version and prior. No solution or patch is available as of 10th December, Information regarding this issue will be updated once the solution details are available. For updates refer to CVE: CVE NVT: phpmyadmin 'db' Parameter Stored Cross Site Scripting Vulnerability (OID: ) The host is running phpmyadmin and is prone to Cross-Site Scripting vulnerability. The flaw is caused by improper validation of user-supplied input passed in the 'db' parameter to 'index.php', which allows attackers to execute arbitrary HTML and script code on the web server. Successful exploitation will allow attackers to plant XSS backdoors and inject arbitrary SQL statements via crafted XSS payloads. Impact Level: Application phpmyadmin versions 3.4.x before beta 3 Upgrade to phpmyadmin version beta 3 or later. For updates refer to NVT: XAMPP Web Server Multiple Cross Site Scripting Vulnerabilities (OID: ) This host is running XAMPP and is prone to multiple cross site scripting vulnerabilities. Multiple flaws are due to improper validation of user-supplied input to the 'text' parameter in 'ming.php' and input appended to the URL in cds.php, that allows attackers to execute arbitrary HTML and script code in a user's browser session in the context of an affected site. Successful exploitation will allow remote attackers to insert arbitrary HTML and script code, which will be executed in a user's browser session in the context of an affected site. Impact Level: Application XAMPP version and prior Upgrade to XAMPP version or later. For updates refer to NVT: phpmyadmin Setup Interface Cross Site Scripting Vulnerability (OID: )

10 The host is running phpmyadmin and is prone to cross-site scripting vulnerability. The flaw is due to improper validation of user-supplied input via the 'Servers-0-verbose' parameter to setup/index.php, which allows attackers to execute arbitrary HTML and script code in a user's browser session in the context of an affected site. Successful exploitation will allow remote attackers to insert arbitrary HTML and script code, which will be executed in a user's browser session in the context of an affected site. Impact Level: Application phpmyadmin versions 3.4.x before Upgrade to phpmyadmin version or later, For updates refer to CVE: CVE BID: NVT: phpmyadmin Setup '$host' Variable Cross Site Scripting Vulnerability (OID: ) The host is running phpmyadmin and is prone to cross site scripting vulnerability. The flaw is due to improper validation of user-supplied input via the '$host' variable within the setup, which allows attackers to execute arbitrary HTML and script code in a user's browser session in the context of an affected site. Successful exploitation will allow remote attackers to insert arbitrary HTML and script code, which will be executed in a user's browser session in the context of an affected site. Impact Level: Application phpmyadmin versions 3.4.x before Upgrade to phpmyadmin version or later, For updates refer to CVE: CVE , CVE BID: NVT: Apache HTTP Server 'httponly' Cookie Information Disclosure Vulnerability (OID: ) This host is running Apache HTTP Server and is prone to cookie information disclosure vulnerability. The flaw is due to an error within the default error response for status code 400 when no custom ErrorDocument is configured, which can be exploited to expose 'httponly' cookies. Successful exploitation will allow attackers to obtain sensitive information that may aid in further attacks. Impact Level: Application Apache HTTP Server versions through Upgrade to Apache HTTP Server version or later,

11 For updates refer to CVE: CVE BID: Medium (CVSS: 2.6) NVT: Apache mod_perl 'Apache::Status' and 'Apache2::Status' Cross Site Scripting Vul... (OID: ) According to its version number, the remote version of the Apache mod_perl module is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. The vendor has released a fix through the SVN repository. CVE: CVE BID: Medium (CVSS: 2.6) NVT: phpmyadmin pmd_pdf.php Cross Site Scripting Vulnerability (OID: ) This host is running phpmyadmin and is prone to cross site scripting vulnerability. Input passed to the 'db' parameter in pmd_pdf.php file is not properly sanitised before returning to the user. Allows execution of arbitrary HTML and script code, and steal cookie-based authentication credentials. Impact Level: System phpmyadmin phpmyadmin versions and prior on all running platform. Upgrade to phpmyadmin or later CVE: CVE BID: Medium (CVSS: 5.0) NVT: OpenSSL 'ssl3_get_record()' Remote Denial of Service Vulnerability (OID: ) OpenSSL is prone to a denial-of-service vulnerability caused by a NULL-pointer dereference. According to its banner, Yarubo has discovered that the remote Webserver is using a version prior to OpenSSL 0.9.8n which is vulnerable. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. OpenSSL versions 0.9.8f through 0.9.8m are vulnerable. Updates are available. Please see the references for more information. CVE: CVE BID: 39013

12 Medium (CVSS: 5.0) NVT: Apache UserDir Sensitive Information Disclosure (OID: ) An information leak occurs on Apache based web servers whenever the UserDir module is enabled. The vulnerability allows an external attacker to enumerate existing accounts by requesting access to their home directory and monitoring the response. 1) Disable this feature by changing 'UserDir public_html' (or whatever) to 'UserDir disabled'. Or 2) Use a RedirectMatch rewrite rule under Apache -- this works even if there is no such entry in the password file, e.g.: RedirectMatch ^/~(.*)$ Or 3) Add into httpd.conf: ErrorDocument ErrorDocument (NOTE: You need to use a FQDN inside the URL for it to work properly). Additional Information: CVE: CVE BID: 3335 NVT: OpenSSL 'dtls1_retrieve_buffered_fragment()' Remote Denial of Service Vulnerabi... (OID: ) OpenSSL is prone to a denial-of-service vulnerability caused by a NULL-pointer dereference. According to its banner, Yarubo has discovered that the remote Webserver is using a version prior to OpenSSL 0.9.8n which is vulnerable. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. OpenSSL versions 0.9.8m and prior are vulnerable. Updates are available. Please see the references for more information. CVE: CVE BID: NVT: phpmyadmin Multiple Cross Site Scripting Vulnerabilities (OID: ) phpmyadmin is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. The following versions are vulnerable: phpmyadmin 2.11.x prior to phpmyadmin 3.x prior to Updates are available. Please see the references for details. CVE: CVE BID: 42584

13 NVT: phpmyadmin Debug Backtrace Cross Site Scripting Vulnerability (OID: ) phpmyadmin is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. Versions prior to phpmyadmin are vulnerable; other versions may also be affected. Vendor updates are available. Please see the references for more information. CVE: CVE BID: NVT: phpmyadmin Database Search Cross Site Scripting Vulnerability (OID: ) phpmyadmin is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. Versions prior to phpmyadmin and are vulnerable. Vendor updates are available. Please see the references for more information. CVE: CVE BID: NVT: phpmyadmin Setup Script Request Cross Site Scripting Vulnerability (OID: ) The host is running phpmyadmin and is prone to Cross-Site Scripting Vulnerability. The flaw is caused by an unspecified input validation error when processing spoofed requests sent to setup script, which could be exploited by attackers to cause arbitrary scripting code to be executed on the user's browser session in the security context of an affected site. Successful exploitation will allow attackers to execute arbitrary web script or HTML in a user's browser session in the context of an affected site. Impact Level: Application phpmyadmin versions 3.x before Upgrade to phpmyadmin version or later,

14 For updates refer to CVE: CVE NVT: phpmyadmin 'error.php' Cross Site Scripting Vulnerability (OID: ) The host is running phpmyadmin and is prone to Cross-Site Scripting Vulnerability. The flaw is caused by input validation errors in the 'error.php' script when processing crafted BBcode tags containing characters, which could allow attackers to inject arbitrary HTML code within the error page and conduct phishing attacks. Successful exploitation will allow attackers to inject arbitrary HTML code within the error page and conduct phishing attacks. Impact Level: Application phpmyadmin version and prior. No solution or patch is available as of 10th December, Information regarding this issue will be updated once the solution details are available. For updates refer to CVE: CVE NVT: phpmyadmin 'db' Parameter Stored Cross Site Scripting Vulnerability (OID: ) The host is running phpmyadmin and is prone to Cross-Site Scripting vulnerability. The flaw is caused by improper validation of user-supplied input passed in the 'db' parameter to 'index.php', which allows attackers to execute arbitrary HTML and script code on the web server. Successful exploitation will allow attackers to plant XSS backdoors and inject arbitrary SQL statements via crafted XSS payloads. Impact Level: Application phpmyadmin versions 3.4.x before beta 3 Upgrade to phpmyadmin version beta 3 or later. For updates refer to NVT: XAMPP Web Server Multiple Cross Site Scripting Vulnerabilities (OID: ) This host is running XAMPP and is prone to multiple cross site scripting vulnerabilities. Multiple flaws are due to improper validation of user-supplied input to the 'text' parameter in 'ming.php' and input appended to the URL in cds.php, that allows attackers to execute arbitrary HTML and script code in a user's browser session in the context of an affected site. Successful exploitation will allow remote attackers to insert arbitrary HTML

15 and script code, which will be executed in a user's browser session in the context of an affected site. Impact Level: Application XAMPP version and prior Upgrade to XAMPP version or later. For updates refer to Medium (CVSS: 2.6) NVT: Apache mod_perl 'Apache::Status' and 'Apache2::Status' Cross Site Scripting Vul... (OID: ) According to its version number, the remote version of the Apache mod_perl module is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. The vendor has released a fix through the SVN repository. CVE: CVE BID: Medium (CVSS: 2.6) NVT: phpmyadmin pmd_pdf.php Cross Site Scripting Vulnerability (OID: ) This host is running phpmyadmin and is prone to cross site scripting vulnerability. Input passed to the 'db' parameter in pmd_pdf.php file is not properly sanitised before returning to the user. Allows execution of arbitrary HTML and script code, and steal cookie-based authentication credentials. Impact Level: System phpmyadmin phpmyadmin versions and prior on all running platform. Upgrade to phpmyadmin or later CVE: CVE BID: Medium (CVSS: 0.0) NVT: SSL Certificate Expiry (OID: ) The SSL certificate of the remote service expired on :10:30 UTC! Low (CVSS: 0.0) NVT: No 404 check (OID: ) daap (3689/tcp) Synopsis : Remote web server does not reply with 404 error code. Description : This web server is [mis]configured in that it does not return '404 Not Found' error codes when a non-existent file is requested, perhaps returning a site map, search page or authentication page

16 instead. Yarubo enabled some counter measures for that, however they might be insufficient. If a great number of security holes are produced for this port, they might not all be accurate Low (CVSS: 0.0) NVT: No 404 check (OID: ) http-alt (8080/tcp) Synopsis : Remote web server does not reply with 404 error code. Description : This web server is [mis]configured in that it does not return '404 Not Found' error codes when a non-existent file is requested, perhaps returning a site map, search page or authentication page instead. Yarubo enabled some counter measures for that, however they might be insufficient. If a great number of security holes are produced for this port, they might not all be accurate Low (CVSS: 0.0) NVT: Identify unknown services with GET (OID: ) mysql (3306/tcp) A MySQL server seems to be running on this port but it rejects connection from the Yarubo scanner. Low (CVSS: 0.0) NVT: NTP read variables (OID: ) ntp (123/udp) A NTP (Network Time Protocol) server is listening on this port. Log NVT: (OID: 0) daap (3689/tcp) Open port. NVT: Services (OID: ) daap (3689/tcp) A web server is running on this port NVT: wapiti (NASL wrapper) (OID: ) daap (3689/tcp) wapiti could not be found in your system path. Yarubo was unable to execute wapiti and to perform the scan you requested. Please make sure that wapiti is installed and that wapiti is available in the PATH variable defined for your environment. NVT: CPE Inventory (OID: ) general/cpe-t cpe:/a:apache:http_server: cpe:/a:php:php: cpe:/a:openbsd:openssh: cpe:/a:phpmyadmin:phpmyadmin: cpe:/a:apache:mod_perl: cpe:/o:apple:mac_os_x NVT: Host Summary (OID: ) general/host-t

17 traceroute: , TCP ports:443,22,8080,3306,3689,80 UDP ports: NVT: OS fingerprinting (OID: ) general/tcp ICMP based OS fingerprint results: (90% confidence) FreeBSD Apple Mac OS X NVT: DIRB (NASL wrapper) (OID: ) general/tcp DIRB could not be found in your system path. Yarubo was unable to execute DIRB and to perform the scan you requested. Please make sure that DIRB is installed and is available in the PATH variable defined for your environment. NVT: Checks for open udp ports (OID: ) general/tcp Open UDP ports: [None found] NVT: arachni (NASL wrapper) (OID: ) general/tcp Arachni could not be found in your system path. Yarubo was unable to execute Arachni and to perform the scan you requested. Please make sure that Arachni is installed and that arachni is available in the PATH variable defined for your environment. NVT: Nikto (NASL wrapper) (OID: ) general/tcp Nikto could not be found in your system path. Yarubo was unable to execute Nikto and to perform the scan you requested. Please make sure that Nikto is installed and that nikto.pl or nikto is available in the PATH variable defined for your environment. NVT: Traceroute (OID: ) general/tcp Here is the route from to : NVT: Checks for open tcp ports (OID: ) general/tcp Open TCP ports: 443, 22, 8080, 3306, 3689, 80 Log NVT: (OID: 0) Open port.

18 NVT: HTTP Server type and version (OID: ) The remote web server type is : Apache/ (Unix) DAV/2 mod_ssl/ OpenSSL/0.9.8l PHP/5.3.1 mod_perl/2.0.4 Perl/v Solution : You can set the directive 'ServerTokens Prod' to limit the information emanating from the server in its response headers. NVT: Services (OID: ) A web server is running on this port NVT: Web mirroring (OID: ) The following CGI have been discovered : Syntax : cginame (arguments [default value]) /phpmyadmin/phpmyadmin.css.php (token [85daf7cf6507a0b0a7b90745ff4c45d3] convcharset [utf- 8] collation_connection [utf8_general_ci] lang [en-utf-8] js_frame [left] nocache [ ] ) /phpmyadmin/server_processlist.php (kill [51] token [986807e535fcb0a05fcc3587d1ab4d0d] con vcharset [utf-8] collation_connection [utf8_general_ci] full [1] lang [en-utf-8] phpmyadmi n [2b5d602ada86c61288ca8a443865c62477d734ab] ) /xampp/biorhythm.php (showcode [1] ) /phpmyadmin/server_collations.php (token [986807e535fcb0a05fcc3587d1ab4d0d] convcharset [u tf-8] collation_connection [utf8_general_ci] lang [en-utf-8] phpmyadmin [2b5d602ada86c6128 8ca8a443865c62477d734ab] ) /xampp/lang.php (en [] de [] pl [] nl [] it [] no [] es [] jp [] zh [] pt_br [] fr [] ) /phpmyadmin/documentation.html (phpmyadmin [b49316dec728e593cb19ac17bf31ab43067e31ba] ) /phpmyadmin/server_databases.php (token [986807e535fcb0a05fcc3587d1ab4d0d] sort_order [des c] convcharset [utf-8] collation_connection [utf8_general_ci] pos [0] sort_by [SCHEMA_NAME ] lang [en-utf-8] phpmyadmin [2b5d602ada86c61288ca8a443865c62477d734ab] dbstats [0] ) /phpmyadmin/server_engines.php (token [986807e535fcb0a05fcc3587d1ab4d0d] engine [InnoDB] c onvcharset [utf-8] collation_connection [utf8_general_ci] lang [en-utf-8] phpmyadmin [2b5d 602ada86c61288ca8a443865c62477d734ab] ) /phpmyadmin/index.php (kill [51] token [85daf7cf6507a0b0a7b90745ff4c45d3] target [server_s ql.php] convcharset [utf-8] collation_connection [utf8_general_ci] lang [en-utf-8] server [1] db [ %40example.com] phpmyadmin [b49316dec728e593cb19ac17bf31ab43067e31ba] ) /xampp/cds.php (interpret [] titel [] showcode [1] jahr [] ) /phpmyadmin/db_create.php (phpmyadmin [2b5d602ada86c61288ca8a443865c62477d734ab] lang [en- utf-8] convcharset [utf-8] collation_connection [utf8_general_ci] token [986807e535fcb0a05 fcc3587d1ab4d0d] reload [1] new_db [] db_collation [] ) /xampp/phonebook.php (showcode [1] phone [] lastname [] firstname [] ) /phpmyadmin/server_sql.php (token [986807e535fcb0a05fcc3587d1ab4d0d] convcharset [utf-8] c ollation_connection [utf8_general_ci] lang [en-utf-8] phpmyadmin [2b5d602ada86c61288ca8a c62477d734ab] ) /phpmyadmin/server_variables.php (token [986807e535fcb0a05fcc3587d1ab4d0d] convcharset [ut f-8] collation_connection [utf8_general_ci] lang [en-utf-8] phpmyadmin [2b5d602ada86c61288 ca8a443865c62477d734ab] ) /phpmyadmin/querywindow.php (token [85daf7cf6507a0b0a7b90745ff4c45d3] convcharset [utf-8] sql_query [] table [] collation_connection [utf8_general_ci] lang [en-utf-8] querydisplay_ tab [sql] db [] phpmyadmin [b49316dec728e593cb19ac17bf31ab43067e31ba] no_js [true] ) /phpmyadmin/server_status.php (token [986807e535fcb0a05fcc3587d1ab4d0d] convcharset [utf-8 ] flush [STATUS] collation_connection [utf8_general_ci] lang [en-utf-8] phpmyadmin [2b5d60 2ada86c61288ca8a443865c62477d734ab] ) /phpmyadmin/navigation.php (token [2e9dceccc31aa3cc40f97c651729a237] convcharset [utf-8] c ollation_connection [utf8_general_ci] lang [en-utf-8] phpmyadmin [3edabf212cfb41ad6f26d bac5a344] ) /phpmyadmin/server_privileges.php (checkprivs [ %40example.com] tablename [] to ken [986807e535fcb0a05fcc3587d1ab4d0d] convcharset [utf-8] hostname [%25] username [] coll ation_connection [utf8_general_ci] dbname [] lang [en-utf-8] initial [] phpmyadmin [2b5d60 2ada86c61288ca8a443865c62477d734ab] showall [1] ) /phpmyadmin/server_export.php (token [986807e535fcb0a05fcc3587d1ab4d0d] goto [db_export.ph p] convcharset [utf-8] collation_connection [utf8_general_ci] lang [en-utf-8] phpmyadmin [ 2b5d602ada86c61288ca8a443865c62477d734ab] selectall [1] ) /xampp/ (action [getpdf] ) /phpmyadmin/main.php (token [2e9dceccc31aa3cc40f97c651729a237] convcharset [utf-8] collati

19 on_connection [utf8_general_ci] lang [en-utf-8] phpmyadmin [3edabf212cfb41ad6f26d bac5a344] ) /phpmyadmin/setup/index.php (check_page_refresh [] token [80ab04c9900a1b916abc9062a2c031f8 ] submit [New server] convcharset [utf-8] collation_connection [utf8_general_ci] lang [en- utf-8] mode [add] page [servers] phpmyadmin [ e2c5d81269f3fe0d3a480f618adc411a] ) /xampp/iart.php (text [ceci+n+est+pas+un+ami+d+apache] showcode [1] img [1] ) /xampp/ming.php (text [ceci n est pas un ami d apache] showcode [1] ) /xampp/phpinfo.php (0 [PHPB8B5F2A0-3C92-11d3-A3A9-4C7B08C10000] 0 [PHPE9568F34-D428-11d2-A AA001ACF42] ) /phpmyadmin/server_import.php (token [986807e535fcb0a05fcc3587d1ab4d0d] convcharset [utf-8 ] collation_connection [utf8_general_ci] lang [en-utf-8] phpmyadmin [2b5d602ada86c61288ca8 a443865c62477d734ab] ) /phpmyadmin/import.php (SQL [Go] token [4bcaf704bf89d02bea9b81f09f2f9c2c] focus_querywindo w [true] goto [server_sql.php] convcharset [utf-8] show_query [1] prev_sql_query [] zero_r ows [Your SQL query has been executed successfully] sql_delimiter [;] collation_connection [utf8_general_ci] is_js_confirmed [0] pos [0] lang [en-utf-8] phpmyadmin [2d935b61aacd656 a23c0f1e6a5dd ceff1] ) /phpmyadmin/setup/ (D [A] token [80ab04c9900a1b916abc9062a2c031f8] formset [features] conv charset [utf-8] collation_connection [utf8_general_ci] lang [] page [form] phpmyadmin [ e2c5d81269f3fe0d3a480f618adc411a] ) PHP script discloses physical path at /xampp/ (/Applications/XAMPP/xamppfiles/htdocs/xampp /index.php) PHP script discloses physical path at /xampp/biorhythm.php (/Applications/XAMPP/xamppfiles /htdocs/xampp/biorhythm.php) Extraneous phpinfo() script found at /xampp/phpinfo.php Directory index found at /xampp/img/ NVT: Directory Scanner (OID: ) The following directories were discovered: /cgi-bin, /demo, /webalizer, /error While this is not, in and of itself, a bug, you should manually inspect these directories to ensure that they are in compliance with company security standards Other: OWASP:OWASP-CM-006 NVT: PHP Version Detection (OID: ) Detected PHP version: Location: tcp/80 CPE: cpe:/a:php:php:5.3.1 Concluded from version identification result: Server: Apache/ (Unix) DAV/2 mod_ssl/ OpenSSL/0.9.8l PHP/5.3.1 mod_perl/2.0.4 Perl/v NVT: wapiti (NASL wrapper) (OID: ) wapiti could not be found in your system path. Yarubo was unable to execute wapiti and to perform the scan you requested. Please make sure that wapiti is installed and that wapiti is available in the PATH variable defined for your environment. NVT: phpmyadmin Detection (OID: Detected phpmyadmin version: Location: /phpmyadmin CPE: cpe:/a:phpmyadmin:phpmyadmin:3.2.4 Concluded from version identification result: 3.2.4

20 (Not protected by Username/Password) NVT: Apache Web ServerVersion Detection (OID: ) Detected Apache Tomcat version: Location: 80/tcp CPE: cpe:/a:apache:http_server: Concluded from version identification result: Server: Apache/ Log NVT: (OID: 0) http-alt (8080/tcp) Open port. NVT: Services (OID: ) http-alt (8080/tcp) A web server is running on this port NVT: wapiti (NASL wrapper) (OID: ) http-alt (8080/tcp) wapiti could not be found in your system path. Yarubo was unable to execute wapiti and to perform the scan you requested. Please make sure that wapiti is installed and that wapiti is available in the PATH variable defined for your environment. Log NVT: (OID: 0) Open port. NVT: HTTP Server type and version (OID: ) The remote web server type is : Apache/ (Unix) DAV/2 mod_ssl/ OpenSSL/0.9.8l PHP/5.3.1 mod_perl/2.0.4 Perl/v Solution : You can set the directive 'ServerTokens Prod' to limit the information emanating from the server in its response headers. NVT: Services (OID: ) A TLSv1 server answered on this port NVT: Services (OID: ) A web server is running on this port through SSL NVT: Directory Scanner (OID: ) The following directories were discovered: /cgi-bin, /demo, /webalizer, /error While this is not, in and of itself, a bug, you should manually inspect

21 these directories to ensure that they are in compliance with company security standards Other: OWASP:OWASP-CM-006 NVT: PHP Version Detection (OID: ) Detected PHP version: Location: tcp/443 CPE: cpe:/a:php:php:5.3.1 Concluded from version identification result: Server: Apache/ (Unix) DAV/2 mod_ssl/ OpenSSL/0.9.8l PHP/5.3.1 mod_perl/2.0.4 Perl/v NVT: wapiti (NASL wrapper) (OID: ) wapiti could not be found in your system path. Yarubo was unable to execute wapiti and to perform the scan you requested. Please make sure that wapiti is installed and that wapiti is available in the PATH variable defined for your environment. NVT: phpmyadmin Detection (OID: Detected phpmyadmin version: Location: /phpmyadmin CPE: cpe:/a:phpmyadmin:phpmyadmin:3.2.4 Concluded from version identification result: (Not protected by Username/Password) NVT: Apache Web ServerVersion Detection (OID: ) Detected Apache Tomcat version: Location: 443/tcp CPE: cpe:/a:apache:http_server: Concluded from version identification result: Server: Apache/ Log NVT: (OID: 0) mysql (3306/tcp) Open port. NVT: MySQL/MariaDB Detection (OID: ) mysql (3306/tcp) Scanner received a ER_HOST_NOT_PRIVILEGED error from the remote MySQL/MariaDB server. Some tests may fail. Allow the scanner to access the remote MySQL server for better result s. NVT: Services (OID: ) mysql (3306/tcp) An unknown service is running on this port. It is usually reserved for MySQL

22 NVT: Using NetBIOS to retrieve information from a Windows host (OID: ) netbios-ns (137/udp) The following 7 NetBIOS names have been gathered : PETERSILIE 111 The remote host has the following MAC address on its adapter : 7c:d1:c3:87:c6:68 If you do not want to allow everyone to find the NetBios name of your computer, you should filter incoming traffic to this port. Log NVT: (OID: 0) ssh (22/tcp) Open port. NVT: SSH Protocol Versions Supported (OID: ) ssh (22/tcp) The remote SSH Server supports the following SSH Protocol Versions: SSHv2 Fingerprint: 68:14:03:04:90:97:be:3d:0f:0b:38:a2:59:d0:5d:ec NVT: SSH Server type and version (OID: ) ssh (22/tcp) Detected SSH server version: SSH-2.0-OpenSSH_5.9 Remote SSH supported authentication: publickey,keyboard-interactive Remote SSH banner: (not available) CPE: cpe:/a:openbsd:openssh:5.9 Concluded from remote connection attempt with credentials: Login: Yarubo Password: Yarubo NVT: Services (OID: ) ssh (22/tcp) An ssh server is running on this port This file was automatically generated.

Vulnerability Scan. January 6, 2015

Vulnerability Scan. January 6, 2015 Vulnerability Scan January 6, 2015 Results of Vulnerability Security Scan The results of your Ethos Info Vulnerability Security Scan are detailed below. The scan ran from Sat Dec 27 07:07:00 2014 UTC until

More information

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST Performed Between Testing start date and end date By SSL247 Limited SSL247 Limited 63, Lisson Street Marylebone London

More information

ncircle PCI Compliance Report for Techno Kitchen Detail Report

ncircle PCI Compliance Report for Techno Kitchen Detail Report ncircle PCI Compliance Report for Techno Kitchen Detail Report Report Summary Scan Start Date 2010-04-30 19:25:42 UTC Scan End Date 2010-04-30 20:22:39 UTC Report Date 2010-04-30 20:22:55 UTC ASPL Version

More information

Cyber Security Scan Report

Cyber Security Scan Report Scan Customer Information Scan Company Information Company: Example Name Company: SRC Security Research & Consulting GmbH Contact: Mr. Example Contact: Holger von Rhein : : Senior Consultant Telephone:

More information

External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION

External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security

More information

Web Application Report

Web Application Report Web Application Report This report includes important security information about your Web Application. Security Report This report was created by IBM Rational AppScan 8.5.0.1 11/14/2012 8:52:13 AM 11/14/2012

More information

Scan Report Executive Summary. Part 2. Component Compliance Summary IP Address : 69.43.165.11

Scan Report Executive Summary. Part 2. Component Compliance Summary IP Address : 69.43.165.11 Scan Report Executive Summary Part 1. Scan Information Scan Customer Company: Date scan was completed: rsync.net ASV Company: Comodo CA Limited 06-02-2015 Scan expiration date: 08-31-2015 Part 2. Component

More information

FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that

More information

AAF boost. AAF boost 2014 report for AAF EXAMPLE ORGANISATION

AAF boost. AAF boost 2014 report for AAF EXAMPLE ORGANISATION 2014 AAF boost 2014 report for AAF EXAMPLE ORGANISATION This report focuses on the following 4 key areas to help boost your connection to the federation: Assurance; Awareness of federation tools; Your

More information

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked. This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out

More information

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top

More information

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange

More information

Penetration Testing Report Client: Business Solutions June 15 th 2015

Penetration Testing Report Client: Business Solutions June 15 th 2015 Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: info@acumen-innovations.com

More information

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development

More information

Topics in Web Application Security BlackHat Seattle, 2003. 2002 by WhiteHat Security, Inc.

Topics in Web Application Security BlackHat Seattle, 2003. 2002 by WhiteHat Security, Inc. Topics in Web Application Security BlackHat Seattle, 2003 Introductions Jeremiah Grossman Founder and CEO, WhiteHat Security Bill Pennington Senior Engineer, WhiteHat Security Agenda Web Server Fingerprinting

More information

Check list for web developers

Check list for web developers Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation

More information

Payment Card Industry (PCI) Executive Report 08/04/2014

Payment Card Industry (PCI) Executive Report 08/04/2014 Payment Card Industry (PCI) Executive Report 08/04/2014 ASV Scan Report Attestation of Scan Compliance Scan Customer Information Approved Scanning Vendor Information Company: A.B. Yazamut Company: Qualys

More information

What is Web Security? Motivation

What is Web Security? Motivation brucker@inf.ethz.ch http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web

More information

Thick Client Application Security

Thick Client Application Security Thick Client Application Security Arindam Mandal (arindam.mandal@paladion.net) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two

More information

Web Application Security

Web Application Security E-SPIN PROFESSIONAL BOOK Vulnerability Management Web Application Security ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. COMBATING THE WEB VULNERABILITY THREAT Editor s Summary

More information

1 Scope of Assessment

1 Scope of Assessment CIT 380 Project Network Security Assessment Due: April 30, 2014 This project is a security assessment of a small group of systems. In this assessment, students will apply security tools and resources learned

More information

noway.toonux.com 09 January 2014

noway.toonux.com 09 January 2014 noway.toonux.com p3.7 10 noway.toonux.com 88.190.52.71 Debian Linux 0 CRITICAL 0 HIGH 5 MEDIUM 2 LOW Running Services Service Service Name Risk General Linux Kernel Medium 22/TCP OpenSSH 5.5p1 Debian 6+squeeze4

More information

Penetration Testing with Kali Linux

Penetration Testing with Kali Linux Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or

More information

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not

More information

Client logo placeholder XXX REPORT. Page 1 of 37

Client logo placeholder XXX REPORT. Page 1 of 37 Client logo placeholder XXX REPORT Page 1 of 37 Report Details Title Xxx Penetration Testing Report Version V1.0 Author Tester(s) Approved by Client Classification Confidential Recipient Name Title Company

More information

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration

More information

Web Vulnerability Assessment Report

Web Vulnerability Assessment Report Web Vulnerability Assessment Report Target Scanned: www.daflavan.com Report Generated: Mon May 5 14:43:24 2014 Identified Vulnerabilities: 39 Threat Level: High Screenshot of www.daflavan.com HomePage

More information

Sitefinity Security and Best Practices

Sitefinity Security and Best Practices Sitefinity Security and Best Practices Table of Contents Overview The Ten Most Critical Web Application Security Risks Injection Cross-Site-Scripting (XSS) Broken Authentication and Session Management

More information

Where every interaction matters.

Where every interaction matters. Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper

More information

Web App Security Audit Services

Web App Security Audit Services locuz.com Professional Services Web App Security Audit Services The unsecured world today Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System

More information

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration

More information

EVALUATING COMMERCIAL WEB APPLICATION SECURITY. By Aaron Parke

EVALUATING COMMERCIAL WEB APPLICATION SECURITY. By Aaron Parke EVALUATING COMMERCIAL WEB APPLICATION SECURITY By Aaron Parke Outline Project background What and why? Targeted sites Testing process Burp s findings Technical talk My findings and thoughts Questions Project

More information

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Detecting Web Application Vulnerabilities Using Open Source Means OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Kostas Papapanagiotou Committee Member OWASP Greek Chapter conpap@owasp.gr

More information

Web Application Vulnerability Testing with Nessus

Web Application Vulnerability Testing with Nessus The OWASP Foundation http://www.owasp.org Web Application Vulnerability Testing with Nessus Rïk A. Jones, CISSP rikjones@computer.org Rïk A. Jones Web developer since 1995 (16+ years) Involved with information

More information

Acunetix Website Audit. 5 November, 2014. Developer Report. Generated by Acunetix WVS Reporter (v8.0 Build 20120808)

Acunetix Website Audit. 5 November, 2014. Developer Report. Generated by Acunetix WVS Reporter (v8.0 Build 20120808) Acunetix Website Audit 5 November, 2014 Developer Report Generated by Acunetix WVS Reporter (v8.0 Build 20120808) Scan of http://filesbi.go.id:80/ Scan details Scan information Starttime 05/11/2014 14:44:06

More information

ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young

ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction

More information

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) anthonylai@owasp.org Open Web Application Security Project http://www.owasp.org

More information

Technical Findings Sample Report

Technical Findings Sample Report Technical Findings Sample Report A B C C o m p a n y S a m p l e S e c u r i t y A s s e s s m e n t 2 5 0 S c i e n t i f i c D r i v e S u i t e 3 0 0 N o r c r o s s G A 3 0 0 9 2 P h o n e N u m b

More information

Last update: February 23, 2004

Last update: February 23, 2004 Last update: February 23, 2004 Web Security Glossary The Web Security Glossary is an alphabetical index of terms and terminology relating to web application security. The purpose of the Glossary is to

More information

Advanced Web Security, Lab

Advanced Web Security, Lab Advanced Web Security, Lab Web Server Security: Attacking and Defending November 13, 2013 Read this earlier than one day before the lab! Note that you will not have any internet access during the lab,

More information

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard Payment Card Industry (PCI) Data Security Standard Technical and Operational Requirements for Approved Scanning Vendors (ASVs) Version 1.1 Release: September 2006 Table of Contents Introduction...1-1 Naming

More information

Apache Partial HTTP Request Denial of Service Vulnerability - Zero Day. SSL Certificate - Subject Common Name Does Not Match Server FQDN

Apache Partial HTTP Request Denial of Service Vulnerability - Zero Day. SSL Certificate - Subject Common Name Does Not Match Server FQDN Vulnerability Scan 06 October 2014 at 16:21 URL : http://www.test.co.uk Summary: 34 vulnerabilities found 0 10 24 72 Cookie Does Not Contain The "HTTPOnly" Attribute Cookie Does Not Contain The "secure"

More information

Learn Ethical Hacking, Become a Pentester

Learn Ethical Hacking, Become a Pentester Learn Ethical Hacking, Become a Pentester Course Syllabus & Certification Program DOCUMENT CLASSIFICATION: PUBLIC Copyrighted Material No part of this publication, in whole or in part, may be reproduced,

More information

OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair dave.wichers@owasp.

OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair dave.wichers@owasp. and Top 10 (2007 Update) Dave Wichers The Foundation Conferences Chair dave.wichers@owasp.org COO, Aspect Security dave.wichers@aspectsecurity.com Copyright 2007 - The Foundation This work is available

More information

FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE

FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security

More information

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011 Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing

More information

Payment Card Industry (PCI) Executive Report 10/27/2015

Payment Card Industry (PCI) Executive Report 10/27/2015 Payment Card Industry (PCI) Executive Report 10/27/2015 ASV Scan Report Attestation of Scan Compliance Scan Customer Information Approved Scanning Vendor Information Company: Rural Computer Consultants

More information

Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure

Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure Vulnerabilities, Weakness and Countermeasures Massimo Cotelli CISSP Secure : Goal of This Talk Security awareness purpose Know the Web Application vulnerabilities Understand the impacts and consequences

More information

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:

More information

Using Nessus In Web Application Vulnerability Assessments

Using Nessus In Web Application Vulnerability Assessments Using Nessus In Web Application Vulnerability Assessments Paul Asadoorian Product Evangelist Tenable Network Security pasadoorian@tenablesecurity.com About Tenable Nessus vulnerability scanner, ProfessionalFeed

More information

1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications

1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications 1. Introduction 2. Web Application 3. Components 4. Common Vulnerabilities 5. Improving security in Web applications 2 What does World Wide Web security mean? Webmasters=> confidence that their site won

More information

Web Application Firewall on SonicWALL SSL VPN

Web Application Firewall on SonicWALL SSL VPN Web Application Firewall on SonicWALL SSL VPN Document Scope This document describes how to configure and use the Web Application Firewall feature in SonicWALL SSL VPN 5.0. This document contains the following

More information

SSA-345442: Multiple Vulnerabilities in WinCC flexible and WinCC V11 (TIA Portal)

SSA-345442: Multiple Vulnerabilities in WinCC flexible and WinCC V11 (TIA Portal) SSA-345442: Multiple Vulnerabilities in WinCC flexible and WinCC V11 (TIA Portal) Publishing Date 2012-01-24 Last Update 2012-01-24 Current Version V1.5 CVSS Overall Score 8.7 Summary: Multiple vulnerabilities

More information

Railo Installation on CentOS Linux 6 Best Practices

Railo Installation on CentOS Linux 6 Best Practices Railo Installation on CentOS Linux 6 Best Practices Purpose: This document is intended for system administrators who want to deploy their Mura CMS, Railo, Tomcat, and JRE stack in a secure but easy to

More information

Hardening Joomla 1. HARDENING PHP. 1.1 Installing Suhosin. 1.2 Disable Remote Includes. 1.3 Disable Unneeded Functions & Classes

Hardening Joomla 1. HARDENING PHP. 1.1 Installing Suhosin. 1.2 Disable Remote Includes. 1.3 Disable Unneeded Functions & Classes 1. HARDENING PHP Hardening Joomla 1.1 Installing Suhosin Suhosin is a PHP Hardening patch which aims to protect the PHP engine and runtime environment from common exploits, such as buffer overflows in

More information

Web Engineering Web Application Security Issues

Web Engineering Web Application Security Issues Security Issues Dec 14 2009 Katharina Siorpaes Copyright 2009 STI - INNSBRUCK www.sti-innsbruck.at It is NOT Network Security It is securing: Custom Code that drives a web application Libraries Backend

More information

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities

More information

Automated Vulnerability Scan Results

Automated Vulnerability Scan Results Automated Vulnerability Scan Results Table of Contents Introduction...2 Executive Summary...3 Possible Vulnerabilities... 7 Host Information... 17 What Next?...20 1 Introduction The 'www.example.com' scan

More information

SECURITY ADVISORY. December 2008 Barracuda Load Balancer admin login Cross-site Scripting

SECURITY ADVISORY. December 2008 Barracuda Load Balancer admin login Cross-site Scripting SECURITY ADVISORY December 2008 Barracuda Load Balancer admin login Cross-site Scripting Discovered in December 2008 by FortConsult s Security Research Team/Jan Skovgren WARNING NOT FOR DISCLOSURE BEFORE

More information

Advanced Administration for Citrix NetScaler 9.0 Platinum Edition

Advanced Administration for Citrix NetScaler 9.0 Platinum Edition Advanced Administration for Citrix NetScaler 9.0 Platinum Edition Course Length: 5 Days Course Code: CNS-300 Course Description This course provides the foundation to manage, configure and monitor advanced

More information

VULNERABILITY ASSESSMENT WHITEPAPER INTRODUCTION, IMPLEMENTATION AND TECHNOLOGY DISCUSSION

VULNERABILITY ASSESSMENT WHITEPAPER INTRODUCTION, IMPLEMENTATION AND TECHNOLOGY DISCUSSION VULNERABILITY ASSESSMENT WHITEPAPER INTRODUCTION, IMPLEMENTATION AND TECHNOLOGY DISCUSSION copyright 2003 securitymetrics Security Vulnerabilities of Computers & Servers Security Risks Change Daily New

More information

Lecture 11 Web Application Security (part 1)

Lecture 11 Web Application Security (part 1) Lecture 11 Web Application Security (part 1) Computer and Network Security 4th of January 2016 Computer Science and Engineering Department CSE Dep, ACS, UPB Lecture 11, Web Application Security (part 1)

More information

Web Application Security

Web Application Security Web Application Security Prof. Sukumar Nandi Indian Institute of Technology Guwahati Agenda Web Application basics Web Network Security Web Host Security Web Application Security Best Practices Questions?

More information

Running a Default Vulnerability Scan SAINTcorporation.com

Running a Default Vulnerability Scan SAINTcorporation.com SAINT Running a Default Vulnerability Scan A Step-by-Step Guide www.saintcorporation.com Examine. Expose. Exploit. Install SAINT Welcome to SAINT! Congratulations on a smart choice by selecting SAINT s

More information

Introduction:... 1 Security in SDLC:... 2 Penetration Testing Methodology: Case Study... 3

Introduction:... 1 Security in SDLC:... 2 Penetration Testing Methodology: Case Study... 3 Table of Contents Introduction:... 1 Security in SDLC:... 2 Penetration Testing Methodology: Case Study... 3 Information Gathering... 3 Vulnerability Testing... 7 OWASP TOP 10 Vulnerabilities:... 8 Injection

More information

(WAPT) Web Application Penetration Testing

(WAPT) Web Application Penetration Testing (WAPT) Web Application Penetration Testing Module 0: Introduction 1. Introduction to the course. 2. How to get most out of the course 3. Resources you will need for the course 4. What is WAPT? Module 1:

More information

Acunetix Web Vulnerability Scanner. Getting Started. By Acunetix Ltd.

Acunetix Web Vulnerability Scanner. Getting Started. By Acunetix Ltd. Acunetix Web Vulnerability Scanner Getting Started V8 By Acunetix Ltd. 1 Starting a Scan The Scan Wizard allows you to quickly set-up an automated scan of your website. An automated scan provides a comprehensive

More information

REDCap General Security Overview

REDCap General Security Overview REDCap General Security Overview Introduction REDCap is a web application for building and managing online surveys and databases, and thus proper security practices must instituted on the network and server(s)

More information

Top 10 Web Application Security Vulnerabilities - with focus on PHP

Top 10 Web Application Security Vulnerabilities - with focus on PHP Top 10 Web Application Security Vulnerabilities - with focus on PHP Louise Berthilson Alberto Escudero Pascual 1 Resources The Top 10 Project by OWASP www.owasp.org/index.php/owasp_top_ten_project

More information

Executive Summary On IronWASP

Executive Summary On IronWASP Executive Summary On IronWASP CYBER SECURITY & PRIVACY FOUNDATION 1 Software Product: IronWASP Description of the Product: IronWASP (Iron Web application Advanced Security testing Platform) is an open

More information

Basic & Advanced Administration for Citrix NetScaler 9.2

Basic & Advanced Administration for Citrix NetScaler 9.2 Basic & Advanced Administration for Citrix NetScaler 9.2 Day One Introducing and deploying Citrix NetScaler Key - Brief Introduction to the NetScaler system Planning a NetScaler deployment Deployment scenarios

More information

Ruby on Rails Secure Coding Recommendations

Ruby on Rails Secure Coding Recommendations Introduction Altius IT s list of Ruby on Rails Secure Coding Recommendations is based upon security best practices. This list may not be complete and Altius IT recommends this list be augmented with additional

More information

Web Application Security Assessment and Vulnerability Mitigation Tests

Web Application Security Assessment and Vulnerability Mitigation Tests White paper BMC Remedy Action Request System 7.6.04 Web Application Security Assessment and Vulnerability Mitigation Tests January 2011 www.bmc.com Contacting BMC Software You can access the BMC Software

More information

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details Sub: Supply, Installation, setup and testing of Tenable Network Security Nessus vulnerability scanner professional version 6 or latest for scanning the LAN, VLAN, VPN and IPs with 3 years License/Subscription

More information

Nessus Report. Report 21/Mar/2012:16:43:56 GMT

Nessus Report. Report 21/Mar/2012:16:43:56 GMT Nessus Report Report 21/Mar/2012:16:43:56 GMT Table Of Contents Vulnerabilities By Plugin...3 33929 (4) - PCI DSS compliance... 4 56208 (5) - PCI DSS compliance : Insecure Communication Has Been Detected...

More information

Running a Default Vulnerability Scan

Running a Default Vulnerability Scan Running a Default Vulnerability Scan A Step-by-Step Guide www.saintcorporation.com Examine. Expose. Exploit. Welcome to SAINT! Congratulations on a smart choice by selecting SAINT s integrated vulnerability

More information

Release Notes for Epilog for Windows Release Notes for Epilog for Windows v1.7/v1.8

Release Notes for Epilog for Windows Release Notes for Epilog for Windows v1.7/v1.8 Release Notes for Epilog for Windows v1.7/v1.8 InterSect Alliance International Pty Ltd Page 1 of 22 About this document This document provides release notes for Snare Enterprise Epilog for Windows release

More information

Ruby on Rails Security. Jonathan Weiss, 30.12.2007 Peritor Wissensmanagement GmbH

Ruby on Rails Security. Jonathan Weiss, 30.12.2007 Peritor Wissensmanagement GmbH Ruby on Rails Security Jonathan Weiss, 30.12.2007 Peritor Wissensmanagement GmbH Who am I? Jonathan Weiss Consultant for Peritor Wissensmanagement GmbH Specialized in Rails, Scaling, and Code Review Active

More information

ASV Scan Report Vulnerability Details PRESTO BIZ

ASV Scan Report Vulnerability Details PRESTO BIZ ASV Scan Report Vulnerability Details PRESTO BIZ Scan Results Executive Summary PCI Compliance: Passing Scan Target: secure.prestomart.com Scan ID: 6060285 Start: 2015-03-14 05:00:01 Finish: 2015-03-14

More information

Attack Vector Detail Report Atlassian

Attack Vector Detail Report Atlassian Attack Vector Detail Report Atlassian Report As Of Tuesday, March 24, 2015 Prepared By Report Description Notes cdavies@atlassian.com The Attack Vector Details report provides details of vulnerability

More information

Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh

Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh Web applications Web security: web basics Myrto Arapinis School of Informatics University of Edinburgh HTTP March 19, 2015 Client Server Database (HTML, JavaScript) (PHP) (SQL) 1 / 24 2 / 24 URLs HTTP

More information

Bug Report. Date: March 19, 2011 Reporter: Chris Jarabek (cjjarabe@ucalgary.ca)

Bug Report. Date: March 19, 2011 Reporter: Chris Jarabek (cjjarabe@ucalgary.ca) Bug Report Date: March 19, 2011 Reporter: Chris Jarabek (cjjarabe@ucalgary.ca) Software: Kimai Version: 0.9.1.1205 Website: http://www.kimai.org Description: Kimai is a web based time-tracking application.

More information

Vulnerability Assessment & Penetration Test Report For

Vulnerability Assessment & Penetration Test Report For Vulnerability Assessment & Penetration Test Report For by Cynergi Solutions Inc. http://www.cynergisolutions.cxm Legal Notice Cynergi Limited All rights reserved 20XX This document contains confidential

More information

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

SECURITY TRENDS & VULNERABILITIES REVIEW 2015 SECURITY TRENDS & VULNERABILITIES REVIEW 2015 Contents 1. Introduction...3 2. Executive summary...4 3. Inputs...6 4. Statistics as of 2014. Comparative study of results obtained in 2013...7 4.1. Overall

More information

Chapter 1 Web Application (In)security 1

Chapter 1 Web Application (In)security 1 Introduction xxiii Chapter 1 Web Application (In)security 1 The Evolution of Web Applications 2 Common Web Application Functions 4 Benefits of Web Applications 5 Web Application Security 6 "This Site Is

More information

Implementation of Web Application Firewall

Implementation of Web Application Firewall Implementation of Web Application Firewall OuTian 1 Introduction Abstract Web 層 應 用 程 式 之 攻 擊 日 趨 嚴 重, 而 國 內 多 數 企 業 仍 不 知 該 如 何 以 資 安 設 備 阻 擋, 仍 在 採 購 傳 統 的 Firewall/IPS,

More information

Payment Card Industry (PCI) Executive Report. Pukka Software

Payment Card Industry (PCI) Executive Report. Pukka Software Payment Card Industry (PCI) Executive Report For Pukka Software Primary Contact: Brian Ghidinelli none Los Gatos, California United States of America 415.462.5603 Payment Card Industry (PCI) Executive

More information

Web Application Guidelines

Web Application Guidelines Web Application Guidelines Web applications have become one of the most important topics in the security field. This is for several reasons: It can be simple for anyone to create working code without security

More information

Vulnerability Assessment and Penetration Testing

Vulnerability Assessment and Penetration Testing Vulnerability Assessment and Penetration Testing Module 1: Vulnerability Assessment & Penetration Testing: Introduction 1.1 Brief Introduction of Linux 1.2 About Vulnerability Assessment and Penetration

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

Online Vulnerability Scanner Quick Start Guide

Online Vulnerability Scanner Quick Start Guide Online Vulnerability Scanner Quick Start Guide Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted.

More information

1. Building Testing Environment

1. Building Testing Environment The Practice of Web Application Penetration Testing 1. Building Testing Environment Intrusion of websites is illegal in many countries, so you cannot take other s web sites as your testing target. First,

More information

Simon Fraser University. Web Security. Dr. Abhijit Sen CMPT 470

Simon Fraser University. Web Security. Dr. Abhijit Sen CMPT 470 Web Security Dr. Abhijit Sen 95% of web apps have Vulnerabilities Cross-site scripting (80 per cent) SQL injection (62 per cent) Parameter tampering (60 per cent) http://www.vnunet.com/vnunet/news/2124247/web-applicationswide-open-hackers

More information

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00 Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak Capture Link Server V1.00 Version 1.0 Eastman Kodak Company, Health Imaging Group Page 1 Table of Contents

More information

ASV Scan Report Attestation of Scan Compliance

ASV Scan Report Attestation of Scan Compliance ASV Scan Report Attestation of Scan Compliance Scan Customer Information Company: David S. Marcus, Ph. D Approved Scanning Vendor Information Company: ComplyGuard Networks Contact: Contact: Support Tel:

More information

Top Ten Web Application Vulnerabilities in J2EE. Vincent Partington and Eelco Klaver Xebia

Top Ten Web Application Vulnerabilities in J2EE. Vincent Partington and Eelco Klaver Xebia Top Ten Web Application Vulnerabilities in J2EE Vincent Partington and Eelco Klaver Xebia Introduction Open Web Application Security Project is an open project aimed at identifying and preventing causes

More information