Malicious users exploiting this vulnerability may be able to read and/or write information to shared directories.
This may also include IPC services and lead to remote code execution.
Severity: high
Fingerprint: 22420ce026fa767de22ea8c33af450e75019e53010bc00ff83008bf2fd7d360a
Found open SMB shares with NT AUTHORITY/ANONYMOUS LOGON Anims80 Films80 Series80 Cloud System Sauvgarde Livres Film IPC$
Severity: high
Fingerprint: 22420ce026fa767de22ea8c3a8c01ab70947e993a072846708f4d96826730dba
Found open SMB shares with NT AUTHORITY/ANONYMOUS LOGON Anims Anims80 Echanges Films Films80 Musics Series Series80 vieuxFilms Cloud Jeux ServerArk System Sauvgarde IPC$
Open service 82.64.2.49:445
2024-12-22 00:59
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 82.64.2.49:445
2024-12-20 00:34
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 82.64.2.49:445
2024-12-18 01:44
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 82.64.2.49:445
2024-12-15 23:49
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 82.64.2.49:445
2024-12-14 00:05
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 82.64.2.49:445
2024-12-12 01:04
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 82.64.2.49:445
2024-12-02 01:32
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 82.64.2.49:445
2024-11-30 00:51
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 82.64.2.49:445
2024-11-28 00:56
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0