Sha256: 8942cd15fc91f91950737e18e6aa4d3fa6c46b6bbed804f1023916a351356ca4
Contents?: true
Size: 1.95 KB
Versions: 32
Compression:
Stored size: 1.95 KB
Contents
<NeXposeSimpleXML version="1.0"> <generated>20111128T142609232</generated> <devices> <device address="1.1.1.1"> <fingerprint certainty="0.80"> <description>Linux 2.6.9-89.ELsmp</description> <vendor>Linux</vendor> <family>Linux</family> <product>Linux</product> <version>0.0.0</version> <device-class></device-class> <architecture>i686</architecture> </fingerprint> <vulnerabilities> </vulnerabilities> <services> <service name="NTP" port="000" protocol="udp"> <fingerprint certainty="0.20"> <description>NTP 4.2</description> <vendor></vendor> <family>NTP</family> <product>NTP</product> <version>4.2</version> </fingerprint> <vulnerabilities> <vulnerability id="ntpd-crypto" resultCode="VV"> <id type="cve">CVE-2009-1252</id> <id type="bid">35017</id> <id type="secunia">35137</id> <id type="secunia">35138</id> <id type="secunia">35166</id> <id type="secunia">35169</id> <id type="secunia">35243</id> <id type="secunia">35253</id> <id type="secunia">35308</id> <id type="secunia">35336</id> <id type="secunia">35388</id> <id type="secunia">35416</id> <id type="secunia">35630</id> <id type="secunia">37470</id> <id type="secunia">37471</id> <id type="url">http://bugs.ntp.org/1151</id> <id type="url">http://www.kb.cert.org/vuls/id/853097</id> <id type="url">https://lists.ntp.org/pipermail/announce/2009-May/000062.html</id> </vulnerability> <vulnerability id="ntp-clock-radio, he cannot afford, wah wah wee wah" resultCode="VE"> </vulnerability> </vulnerabilities> </service> </services> </device> </devices> </NeXposeSimpleXML>
Version data entries
32 entries across 32 versions & 1 rubygems