------------------------------------------------- Host: 192.168.1.202 Open ports: Service: http (80/tcp) Severity: Low The IIS server appears to have the .IDA ISAPI filter mapped. At least one remote vulnerability has been discovered for the .IDA (indexing service) filter. This is detailed in Microsoft Advisory MS01-033, and gives remote SYSTEM level access to the web server. ------------------------------------------------- Host: 192.168.1.21 Open ports: Service: https (443/tcp) Severity: High The remote host seems to be using a version of OpenSSL which is older than 0.9.6e or 0.9.7-beta3 This version is vulnerable to a buffer overflow which, may allow an attacker to obtain a shell on this host. Service: https (443/tcp) Severity: Low The remote host is using a version of OpenSSL which is older than 0.9.6j or 0.9.7b This version is vulnerable to a timing based attack which may allow an attacker to guess the content of fixed data blocks and may eventually be able to guess the value of the private RSA key of the server. ------------------------------------------------- Host: 192.168.1.22 Open ports: Service: http (80/tcp) Severity: High It might be possible to make the remote IIS server execute arbitrary code by sending it a too long url ending in .htr.