funsec mailing list archives
Re: Cryptome: Server Comms Reporting for Research Effort gov.pk
From: "Eduardo Tongson" <propolice () gmail com>
Date: Thu, 6 Dec 2007 21:17:08 +0800
Grabs the Server header and runs the values through a vulnerability database. Neat. But those synopses are a bit sensational specially when read by someone who is not familiar with how PHP core vulnerabilities are exploited. On Dec 6, 2007 8:33 PM, George A. Theall <theall () tifaware com> wrote:
On Wed, Dec 05, 2007 at 09:28:31PM -0500, Dude VanWinkle wrote:Looks like Nessus output to me.Close. It's something called Tenable's Passive Vulnerability Scanner, previously known as Nevo. The person using it only needed to visit the web sites in question to generate the results. George -- theall () tifaware com _______________________________________________ Fun and Misc security discussion for OT posts. https://linuxbox.org/cgi-bin/mailman/listinfo/funsec Note: funsec is a public and open mailing list.
_______________________________________________ Fun and Misc security discussion for OT posts. https://linuxbox.org/cgi-bin/mailman/listinfo/funsec Note: funsec is a public and open mailing list.
Current thread:
- Cryptome: Server Comms Reporting for Research Effort gov.pk Juha-Matti Laurio (Dec 05)
- Re: Cryptome: Server Comms Reporting for Research Effort gov.pk Dude VanWinkle (Dec 05)
- Re: Cryptome: Server Comms Reporting for Research Effort gov.pk George A. Theall (Dec 06)
- Re: Cryptome: Server Comms Reporting for Research Effort gov.pk Eduardo Tongson (Dec 06)
- Re: Cryptome: Server Comms Reporting for Research Effort gov.pk George A. Theall (Dec 06)
- Re: Cryptome: Server Comms Reporting for Research Effort gov.pk Dude VanWinkle (Dec 05)