Microsoft-IIS 8.5
tcp/80
Malicious users exploiting this vulnerability may be able to read and/or write information to shared directories.
This may also include IPC services and lead to remote code execution.
Severity: high
Fingerprint: 22420ce026fa767d3962741cc7ef60d18ed5694762419937275a6a541111d127
Found open SMB shares with Guest login C$ D D$ E$ IPC$ TallyPrime Users
Severity: high
Fingerprint: 22420ce026fa767d3962741c71fcc8506cc3ea786407fe73ee042dad68588c4a
Found open SMB shares with Guest login D D$ E$ IPC$ TallyPrime Users
Severity: high
Fingerprint: 22420ce026fa767d3962741c23bfd32f75afa13e817ad4de068ebcbed08c8448
Found open SMB shares with Guest login ADMIN$ C$ D D$ E$ IPC$ TallyPrime Users
Severity: high
Fingerprint: 22420ce026fa767d3962741c23bfd32f75afa13e817ad4de068ebcbe31aa2b08
Found open SMB shares with Guest login ADMIN$ C$ D D$ E$ IPC$ TallyPrime
Open service 122.176.81.28:80
2024-09-11 08:58
HTTP/1.1 200 OK Content-Type: text/html Last-Modified: Tue, 05 Jul 2022 09:49:51 GMT Accept-Ranges: bytes ETag: "285921925490d81:0" Server: Microsoft-IIS/8.5 X-Powered-By: ASP.NET Date: Wed, 11 Sep 2024 08:58:15 GMT Connection: close Content-Length: 701 Page title: IIS Windows Server <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" /> <title>IIS Windows Server</title> <style type="text/css"> <!-- body { color:#000000; background-color:#0072C6; margin:0; } #container { margin-left:auto; margin-right:auto; text-align:center; } a img { border:none; } --> </style> </head> <body> <div id="container"> <a href="http://go.microsoft.com/fwlink/?linkid=66138&clcid=0x409"><img src="iis-85.png" alt="IIS" width="960" height="600" /></a> </div> </body> </html>