Vulnerability found on port http (80/tcp)
Information found on port http (80/tcp)
A web server is running on this port
Nessus ID : 10330
Information found on port http (80/tcp)
The remote web server type is :
Apache/2.0.52 (Fedora)
Solution : You can set the directive 'ServerTokens Prod' to limit
the information emanating from the server in its response headers.
Nessus ID : 10107
Information found on port http (80/tcp)
Mailman 2.1.5 was detected on the remote host under the path /mailman.
Mailman is a Python-based mailing list management package from the GNU
Project. See http://www.list.org/ for more information.
Risk factor : None
Nessus ID : 16338
Information found on port ssh (22/tcp)
An ssh server is running on this port
Nessus ID : 10330
Information found on port ssh (22/tcp)
Remote SSH version : SSH-1.99-OpenSSH_3.9p1
Remote SSH supported authentication : publickey,gssapi-with-mic,password
Nessus ID : 10267
Vulnerability found on port https (443/tcp)
Information found on port https (443/tcp)
A SSLv2 server answered on this port
Nessus ID : 10330
Information found on port https (443/tcp)
A web server is running on this port through SSL
Nessus ID : 10330
Information found on port https (443/tcp)
The remote web server type is :
Apache/2.0.52 (Fedora)
Solution : You can set the directive 'ServerTokens Prod' to limit
the information emanating from the server in its response headers.
Nessus ID : 10107
Information found on port https (443/tcp)
Mailman 2.1.5 was detected on the remote host under the path /mailman.
Mailman is a Python-based mailing list management package from the GNU
Project. See http://www.list.org/ for more information.
Risk factor : None
Nessus ID : 16338
Information found on port ipp (631/tcp)
A web server is running on this port
Nessus ID : 10330
Information found on port ipp (631/tcp)
The remote web server type is :
CUPS/1.1
Solution : We recommend that you configure (if possible) your web server to return
a bogus Server header in order to not leak information.
Nessus ID : 10107