Telephely: Radiológiai és Onkoterápiás Klinika
VLAN: VLAN-418
Funkció: Klinikai ellátás
OS: ismeretlen
📄 PDF riport (Semmelweis dizájn)
A következő táblázat tartalmazza az adott IP-hez tartozó összes sérülékenységet, a Nessus által szolgáltatott főbb technikai mezőkkel együtt.
| Severity | Plugin ID | Plugin Name | Version | Family | Published | Modified | VPR | EPSS | CVSSv3 Score | CVSSv3 Vector | CVSSv2 Score | CVSSv2 Vector | CPE | Exploit Available | Patch Pub Date | Vuln Pub Date | CVE | Description | Solution | Output | Port | Protocol | Host |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Low | 10114 | ICMP Timestamp Request Remote Date Disclosure | 2.1 | CVE-1999-0524 | The remote host answers to an ICMP timestamp request. This allows an attacker to know the date that is set on the targeted machine, which may assist an unauthenticated, remote attacker in defeating time-based authentication protocols. Timestamps returned from machines running Windows Vista / 7 / 2008 / 2008 R2 are deliberately incorrect, but usually within 1000 seconds of the actual system time. | Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14). | 0 | icmp | 10.44.100.1 | ||||||||||||||
| None | 10287 | Traceroute Information | Makes a traceroute to the remote host. | n/a | 0 | udp | 10.44.100.1 | ||||||||||||||||
| None | 11219 | Nessus SYN scanner | This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded. | Protect your target with an IP filter. | 53 | tcp | 10.44.100.1 | ||||||||||||||||
| None | 11219 | Nessus SYN scanner | This plugin is a SYN 'half-open' port scanner. It shall be reasonably quick even against a firewalled target. Note that SYN scans are less intrusive than TCP (full connect) scans against broken services, but they might cause problems for less robust firewalls and also leave unclosed connections on the remote target, if the network is loaded. | Protect your target with an IP filter. | 179 | tcp | 10.44.100.1 | ||||||||||||||||
| None | 11936 | OS Identification | Using a combination of remote probes (e.g., TCP/IP, SMB, HTTP, NTP, SNMP, etc.), it is possible to guess the name of the remote operating system in use. It is also possible sometimes to guess the version of the operating system. | n/a | 0 | tcp | 10.44.100.1 | ||||||||||||||||
| None | 12053 | Host Fully Qualified Domain Name (FQDN) Resolution | Nessus was able to resolve the fully qualified domain name (FQDN) of the remote host. | n/a | 0 | tcp | 10.44.100.1 | ||||||||||||||||
| None | 19506 | Nessus Scan Information | This plugin displays, for each tested host, information about the scan itself : - The version of the plugin set. - The type of scanner (Nessus or Nessus Home). - The version of the Nessus Engine. - The port scanner(s) used. - The port range scanned. - The ping round trip time - Whether credentialed or third-party patch management checks are possible. - Whether the display of superseded patches is enabled - The date of the scan. - The duration of the scan. - The number of hosts scanned in parallel. - The number of checks done in parallel. | n/a | 0 | tcp | 10.44.100.1 | ||||||||||||||||
| None | 22964 | Service Detection | Nessus was able to identify the remote service by its banner or by looking at the error message it sends when it receives an HTTP request. | n/a | 179 | tcp | 10.44.100.1 | ||||||||||||||||
| None | 25220 | TCP/IP Timestamps Supported | The remote host implements TCP timestamps, as defined by RFC1323. A side effect of this feature is that the uptime of the remote host can sometimes be computed. | n/a | 0 | tcp | 10.44.100.1 | ||||||||||||||||
| None | 54615 | Device Type | Based on the remote operating system, it is possible to determine what the remote system type is (eg: a printer, router, general-purpose computer, etc). | n/a | 0 | tcp | 10.44.100.1 | ||||||||||||||||
| None | 209654 | OS Fingerprints Detected | Using a combination of remote probes (TCP/IP, SMB, HTTP, NTP, SNMP, etc), it was possible to gather one or more fingerprints from the remote system. While the highest-confidence result was reported in plugin 11936, “OS Identification”, the complete set of fingerprints detected are reported here. | n/a | 0 | tcp | 10.44.100.1 |