<!DOCTYPE html>
<html>

<head>
    <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
    <title>报表</title>
    <link rel="stylesheet" href="reportfiles/css/ns_report.css" />
    <link rel="stylesheet" href="reportfiles/css/ns_report_rsas.css" />
    <link rel="stylesheet" href="reportfiles/js/datepicker/skin/WdatePicker.css" />
    <script src="reportfiles/js/jquery.js"></script>
    <script src="reportfiles/js/common.js"></script>
    <script src="reportfiles/js/datepicker/WdatePicker.js"></script>
</head>

<body>
    <div id="report" class="wrapper_w800">
        <div class="report_tip"></div>
        <div id="head" class="report_title">
            <h1>绿盟科技&#34;远程安全评估系统&#34;安全评估报告</h1>
            <span class="note">&nbsp;</span>
        </div>
        <!--head end,catalog start-->
        <div id="catalog">
            <div class="report_h1">目录</div>
        </div>
        <div id="content">
            <div class="report_h report_h1">1.综述信息</div>
            <div class="report_content">
                <div class="report_h report_h2" id="title00">1.1任务信息</div>
                <div>
                    <table class="report_table plumb">
                        <tbody>
                            <tr class="odd">
                                <th width="120" style="vertical-align:middle">网络风险</th>
                                <td style="padding:6px;"><img align='absmiddle' src='reportfiles/images/b_high.gif'
                                        title='非常危险'></img><span class="level_danger middle" style='color:#A60000'>非常危险（9.0分）</span></td>
                            </tr>
                        </tbody>
                    </table>
                    <table width="100%">
                        <tr>
                            <td width="50%" valign='top'>
                                <table class="report_table plumb">
                                    <tbody>
                                        <tr class="odd">
                                            <th width="120">任务名称</th>
                                            <td>扫描【61.129.105.64-126;124.74.244.128...】</td>
                                        </tr>
                                        <tr class="even">
                                            <th>任务类型</th>
                                            <td>漏洞扫描</td>
                                        </tr>
                                        <tr class="odd">
                                            <th width="120">任务状态</th>
                                            <td>扫描完成</td>
                                        </tr>
                                        <tr class="even">
                                            <th>漏洞扫描模板</th>
                                            <td>自动匹配扫描</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>下达任务用户</th>
                                            <td>nsfocus1</td>
                                        </tr>
                                        <tr class="even">
                                            <th>任务数据来源</th>
                                            <td>本地扫描</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>任务说明</th>
                                            <td></td>
                                        </tr>
                                    </tbody>
                                </table>
                            </td>
                            <td width="20px"></td>
                            <td width="50%" valign='top'>
                                <table class="report_table plumb">
                                    <tbody>
                                        <tr class="odd">
                                            <th width="120px">时间统计</th>
                                            <td>
                                                开始：2018-11-25 15:10:21<br />
                                                结束：2018-11-25 16:07:52</td>
                                        </tr>
                                        <tr class="even">
                                            <th>主机统计</th>
                                            <td>
                                                存活主机：103<br />
                                                成功扫描主机：103<br />
                                                失败扫描主机：0<br />
                                                未扫描主机：0</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>系统版本信息</th>
                                            <td>V6.0R02F03SP13</td>
                                        </tr>
                                    </tbody>
                                </table>
                            </td>
                        </tr>
                    </table>
                </div>
                <div class="report_h report_h2" id="title01">1.2风险分布</div>
                <div>
                    <div class="report_h report_h3">1.2.1主机风险分布</div>
                    <div class="center"><img src="reportfiles/images/ed1010c30f15303a5c9ba267740587c8.png"></img></div>
                    <div class="report_h report_h3">1.2.2详细风险分布</div>
                    <div class="center"><img src="reportfiles/images/3f5447a9c1752bcf1cd9c58c470e0730.png"></img>-</div>
                </div>
                <div class="report_h report_h2" id="title02">1.3资产综述</div>
                <div>
                    <div class="report_h report_h3">1.3.1操作系统</div>
                    <table width="100%">
                        <tr>
                            <td width="50%">
                                <div class="center"><img src="reportfiles/images/925b7a9d974c1d52f935c895901f366f.png"></img></div>
                            </td>
                            <td width="50%">
                                <table class="report_table ">
                                    <thead>
                                        <tr>
                                            <th>操作系统</th>
                                            <th>主机数量</th>
                                            <th>比率</th>
                                        </tr>
                                    </thead>
                                    <tbody>
                                        <tr class="odd">
                                            <td>windows</td>
                                            <td>3</td>
                                            <td>3%</td>
                                        </tr>
                                        <tr class="even">
                                            <td>linux</td>
                                            <td>1</td>
                                            <td>1%</td>
                                        </tr>
                                        <tr class="odd">
                                            <td>others</td>
                                            <td>99</td>
                                            <td>96%</td>
                                        </tr>
                                    </tbody>
                                    <tfoot>
                                        <tr>
                                            <th>合计</th>
                                            <th>103</th>
                                            <th>100%</th>
                                        </tr>
                                    </tfoot>
                                </table>
                            </td>
                        </tr>
                    </table>
                </div>
            </div>
            <div class="report_h report_h1">2.风险类别</div>
            <div class="report_content">
                <div class="report_h report_h2" id="vuln_risk_category">2.1漏洞风险类别</div>
                <div>
                    <div class="report_h report_h3">2.1.1服务</div>
                    <table width="100%">
                        <tr>
                            <td width="50%">
                                <div class="center"><img src="reportfiles/images/775fad73044bfdc04522db203490e57c.png" /></div>
                            </td>
                            <td width="50%">
                                <table class="report_table ">
                                    <thead>
                                        <tr class="second_title">
                                            <th>服务</th>
                                            <th width="40px">高风险</th>
                                            <th width="40px">中风险</th>
                                            <th width="40px">低风险</th>
                                            <th width="40px">总计</th>
                                        </tr>
                                    </thead>
                                    <tbody>
                                        <tr class="even">
                                            <td>WWW</td>
                                            <td>3</td>
                                            <td>33</td>
                                            <td>5</td>
                                            <td>41</td>
                                        </tr>
                                        <tr class="odd">
                                            <td>其他</td>
                                            <td>1</td>
                                            <td>0</td>
                                            <td>3</td>
                                            <td>4</td>
                                        </tr>
                                        <tr class="even">
                                            <td>SMTP</td>
                                            <td>0</td>
                                            <td>0</td>
                                            <td>2</td>
                                            <td>2</td>
                                        </tr>
                                        <tr class="odd">
                                            <td>CGI</td>
                                            <td>0</td>
                                            <td>0</td>
                                            <td>1</td>
                                            <td>1</td>
                                        </tr>
                                        <tr class="even">
                                            <td>DNS</td>
                                            <td>0</td>
                                            <td>0</td>
                                            <td>1</td>
                                            <td>1</td>
                                        </tr>
                                        <tr class="odd">
                                            <td>Kernel</td>
                                            <td>0</td>
                                            <td>0</td>
                                            <td>1</td>
                                            <td>1</td>
                                        </tr>
                                    </tbody>
                                    <tfoot>
                                        <tr class="second_title">
                                            <td>合计</td>
                                            <td width="40px">4</td>
                                            <td width="40px">33</td>
                                            <td width="40px">13</td>
                                            <td width="40px">50</td>
                                        </tr>
                                    </tfoot>
                                </table>
                            </td>
                        </tr>
                    </table>
                    <div class="report_h report_h3">2.1.2应用</div>
                    <table width="100%">
                        <tr>
                            <td width="50%">
                                <div class="center"><img src="reportfiles/images/5acbeba761826aa2b490d6830c9d0d6a.png" /></div>
                            </td>
                            <td width="50%">
                                <table class="report_table ">
                                    <thead>
                                        <tr class="second_title">
                                            <th>应用</th>
                                            <th width="40px">高风险</th>
                                            <th width="40px">中风险</th>
                                            <th width="40px">低风险</th>
                                            <th width="40px">总计</th>
                                        </tr>
                                    </thead>
                                    <tbody>
                                        <tr class="even">
                                            <td>Tomcat</td>
                                            <td>3</td>
                                            <td>31</td>
                                            <td>1</td>
                                            <td>35</td>
                                        </tr>
                                        <tr class="odd">
                                            <td>其他</td>
                                            <td>1</td>
                                            <td>0</td>
                                            <td>9</td>
                                            <td>10</td>
                                        </tr>
                                        <tr class="even">
                                            <td>SSL</td>
                                            <td>0</td>
                                            <td>1</td>
                                            <td>2</td>
                                            <td>3</td>
                                        </tr>
                                        <tr class="odd">
                                            <td>OpenSSL</td>
                                            <td>0</td>
                                            <td>1</td>
                                            <td>0</td>
                                            <td>1</td>
                                        </tr>
                                        <tr class="even">
                                            <td>BIND</td>
                                            <td>0</td>
                                            <td>0</td>
                                            <td>1</td>
                                            <td>1</td>
                                        </tr>
                                    </tbody>
                                    <tfoot>
                                        <tr class="second_title">
                                            <td>合计</td>
                                            <td width="40px">4</td>
                                            <td width="40px">33</td>
                                            <td width="40px">13</td>
                                            <td width="40px">50</td>
                                        </tr>
                                    </tfoot>
                                </table>
                            </td>
                        </tr>
                    </table>
                    <div class="report_h report_h3">2.1.3系统</div>
                    <table width="100%">
                        <tr>
                            <td width="50%">
                                <div class="center"><img src="reportfiles/images/21d5612a2d8232a315c954163779c8ba.png" /></div>
                            </td>
                            <td width="50%">
                                <table class="report_table ">
                                    <thead>
                                        <tr class="second_title">
                                            <th>系统</th>
                                            <th width="40px">高风险</th>
                                            <th width="40px">中风险</th>
                                            <th width="40px">低风险</th>
                                            <th width="40px">总计</th>
                                        </tr>
                                    </thead>
                                    <tbody>
                                        <tr class="even">
                                            <td>系统无关</td>
                                            <td>4</td>
                                            <td>33</td>
                                            <td>13</td>
                                            <td>50</td>
                                        </tr>
                                    </tbody>
                                    <tfoot>
                                        <tr class="second_title">
                                            <td>合计</td>
                                            <td width="40px">4</td>
                                            <td width="40px">33</td>
                                            <td width="40px">13</td>
                                            <td width="40px">50</td>
                                        </tr>
                                    </tfoot>
                                </table>
                            </td>
                        </tr>
                    </table>
                    <div class="report_h report_h3">2.1.4威胁</div>
                    <table width="100%">
                        <tr>
                            <td width="50%">
                                <div class="center"><img src="reportfiles/images/269558e7ff05be4cda4a5f18d6636965.png" /></div>
                            </td>
                            <td width="50%">
                                <table class="report_table ">
                                    <thead>
                                        <tr class="second_title">
                                            <th>威胁</th>
                                            <th width="40px">高风险</th>
                                            <th width="40px">中风险</th>
                                            <th width="40px">低风险</th>
                                            <th width="40px">总计</th>
                                        </tr>
                                    </thead>
                                    <tbody>
                                        <tr class="even">
                                            <td>其他</td>
                                            <td>3</td>
                                            <td>31</td>
                                            <td>1</td>
                                            <td>35</td>
                                        </tr>
                                        <tr class="odd">
                                            <td>远程信息泄露</td>
                                            <td>1</td>
                                            <td>0</td>
                                            <td>10</td>
                                            <td>11</td>
                                        </tr>
                                        <tr class="even">
                                            <td>远程拒绝服务</td>
                                            <td>0</td>
                                            <td>2</td>
                                            <td>1</td>
                                            <td>3</td>
                                        </tr>
                                        <tr class="odd">
                                            <td>不必要的服务</td>
                                            <td>0</td>
                                            <td>0</td>
                                            <td>1</td>
                                            <td>1</td>
                                        </tr>
                                    </tbody>
                                    <tfoot>
                                        <tr class="second_title">
                                            <td>合计</td>
                                            <td width="40px">4</td>
                                            <td width="40px">33</td>
                                            <td width="40px">13</td>
                                            <td width="40px">50</td>
                                        </tr>
                                    </tfoot>
                                </table>
                            </td>
                        </tr>
                    </table>
                    <div class="report_h report_h3">2.1.5时间</div>
                    <table width="100%">
                        <tr>
                            <td width="50%">
                                <div class="center"><img src="reportfiles/images/81324a6aaea664de3028ecea0fef20ce.png" /></div>
                            </td>
                            <td width="50%">
                                <table class="report_table ">
                                    <thead>
                                        <tr class="second_title">
                                            <th>时间</th>
                                            <th width="40px">高风险</th>
                                            <th width="40px">中风险</th>
                                            <th width="40px">低风险</th>
                                            <th width="40px">总计</th>
                                        </tr>
                                    </thead>
                                    <tbody>
                                        <tr class="even">
                                            <td>2016年</td>
                                            <td>1</td>
                                            <td>10</td>
                                            <td>1</td>
                                            <td>12</td>
                                        </tr>
                                        <tr class="odd">
                                            <td>2012年</td>
                                            <td>1</td>
                                            <td>8</td>
                                            <td>1</td>
                                            <td>10</td>
                                        </tr>
                                        <tr class="even">
                                            <td>2015年</td>
                                            <td>1</td>
                                            <td>4</td>
                                            <td>0</td>
                                            <td>5</td>
                                        </tr>
                                        <tr class="odd">
                                            <td>2018年</td>
                                            <td>1</td>
                                            <td>0</td>
                                            <td>0</td>
                                            <td>1</td>
                                        </tr>
                                        <tr class="even">
                                            <td>2014年</td>
                                            <td>0</td>
                                            <td>6</td>
                                            <td>0</td>
                                            <td>6</td>
                                        </tr>
                                        <tr class="odd">
                                            <td>2013年</td>
                                            <td>0</td>
                                            <td>4</td>
                                            <td>0</td>
                                            <td>4</td>
                                        </tr>
                                        <tr class="even">
                                            <td>2017年</td>
                                            <td>0</td>
                                            <td>1</td>
                                            <td>0</td>
                                            <td>1</td>
                                        </tr>
                                        <tr class="odd">
                                            <td>1999年</td>
                                            <td>0</td>
                                            <td>0</td>
                                            <td>8</td>
                                            <td>8</td>
                                        </tr>
                                        <tr class="even">
                                            <td>2001年</td>
                                            <td>0</td>
                                            <td>0</td>
                                            <td>2</td>
                                            <td>2</td>
                                        </tr>
                                        <tr class="odd">
                                            <td>2010年</td>
                                            <td>0</td>
                                            <td>0</td>
                                            <td>1</td>
                                            <td>1</td>
                                        </tr>
                                    </tbody>
                                    <tfoot>
                                        <tr class="second_title">
                                            <td>合计</td>
                                            <td width="40px">4</td>
                                            <td width="40px">33</td>
                                            <td width="40px">13</td>
                                            <td width="40px">50</td>
                                        </tr>
                                    </tfoot>
                                </table>
                            </td>
                        </tr>
                    </table>
                    <div class="report_h report_h3">2.1.6CVE年份</div>
                    <table width="100%">
                        <tr>
                            <td width="50%">
                                <div class="center"><img src="reportfiles/images/3595eaa991878f8d0e9110f5027274e6.png" /></div>
                            </td>
                            <td width="50%">
                                <table class="report_table ">
                                    <thead>
                                        <tr class="second_title">
                                            <th>CVE年份</th>
                                            <th width="40px">高风险</th>
                                            <th width="40px">中风险</th>
                                            <th width="40px">低风险</th>
                                            <th width="40px">总计</th>
                                        </tr>
                                    </thead>
                                    <tbody>
                                        <tr class="even">
                                            <td>CVE-2016</td>
                                            <td>1</td>
                                            <td>10</td>
                                            <td>1</td>
                                            <td>12</td>
                                        </tr>
                                        <tr class="odd">
                                            <td>CVE-2012</td>
                                            <td>1</td>
                                            <td>8</td>
                                            <td>1</td>
                                            <td>10</td>
                                        </tr>
                                        <tr class="even">
                                            <td>CVE-2014</td>
                                            <td>1</td>
                                            <td>7</td>
                                            <td>0</td>
                                            <td>8</td>
                                        </tr>
                                        <tr class="odd">
                                            <td>Others</td>
                                            <td>1</td>
                                            <td>0</td>
                                            <td>5</td>
                                            <td>6</td>
                                        </tr>
                                        <tr class="even">
                                            <td>CVE-2013</td>
                                            <td>0</td>
                                            <td>4</td>
                                            <td>0</td>
                                            <td>4</td>
                                        </tr>
                                        <tr class="odd">
                                            <td>CVE-2015</td>
                                            <td>0</td>
                                            <td>3</td>
                                            <td>0</td>
                                            <td>3</td>
                                        </tr>
                                        <tr class="even">
                                            <td>CVE-2017</td>
                                            <td>0</td>
                                            <td>1</td>
                                            <td>0</td>
                                            <td>1</td>
                                        </tr>
                                        <tr class="odd">
                                            <td>CVE-1999</td>
                                            <td>0</td>
                                            <td>0</td>
                                            <td>6</td>
                                            <td>6</td>
                                        </tr>
                                    </tbody>
                                    <tfoot>
                                        <tr class="second_title">
                                            <td>合计</td>
                                            <td width="40px">4</td>
                                            <td width="40px">33</td>
                                            <td width="40px">13</td>
                                            <td width="40px">50</td>
                                        </tr>
                                    </tfoot>
                                </table>
                            </td>
                        </tr>
                    </table>
                </div>
                <div class="report_h report_h2" id="configs_risk_category">2.2配置风险类别</div>
                <div></div>
            </div>
            <div class="report_h report_h1">3.主机信息</div>
            <div class="report_content">
                <div class="report_h report_h2" id="title00">3.1主机风险等级列表</div>
                <div>
                    <table class="report_table">
                        <thead>
                            <tr class="first_title">
                                <td width="130px" rowspan="2">IP地址</td>
                                <td rowspan="2">主机名</td>
                                <td rowspan="2">操作系统</td>
                                <td colspan="4" width="40px">漏洞风险（个）</td>
                                <th rowspan='2' width="40px" style="white-space:pre-wrap;">主机
                                    风险值</th>
                            </tr>
                            <tr class="second_title">
                                <td width="40px">高</td>
                                <td width="40px">中</td>
                                <td width="40px">低</td>
                                <td width="40px">总计</td>
                            </tr>
                        </thead>
                        <tbody>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_1','3_1_1_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_high.gif' title='非常危险'></img><a
                                        href="host/220.248.39.175.html" target="_blank">220.248.39.175</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">9</span></td>
                                <td>93</td>
                                <td>12</td>
                                <td>114</td>
                                <td><span class="font_bold">8.4</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_2','3_1_2_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_high.gif' title='非常危险'></img><a
                                        href="host/220.248.39.172.html" target="_blank">220.248.39.172</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">9</span></td>
                                <td>93</td>
                                <td>11</td>
                                <td>113</td>
                                <td><span class="font_bold">8.4</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_3','3_1_3_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_high.gif' title='非常危险'></img><a
                                        href="host/220.248.39.135.html" target="_blank">220.248.39.135</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">9</span></td>
                                <td>93</td>
                                <td>11</td>
                                <td>113</td>
                                <td><span class="font_bold">8.4</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_4','3_1_4_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_high.gif' title='非常危险'></img><a
                                        href="host/124.127.243.233.html" target="_blank">124.127.243.233</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">9</span></td>
                                <td>93</td>
                                <td>13</td>
                                <td>115</td>
                                <td><span class="font_bold">8.4</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_5','3_1_5_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_high.gif' title='非常危险'></img><a
                                        href="host/124.74.244.175.html" target="_blank">124.74.244.175</a></td>
                                <td></td>
                                <td>Linux</td>
                                <td><span class="font_high">6</span></td>
                                <td>62</td>
                                <td>9</td>
                                <td>77</td>
                                <td><span class="font_bold">8.4</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_6','3_1_6_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_high.gif' title='非常危险'></img><a
                                        href="host/124.74.244.172.html" target="_blank">124.74.244.172</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">6</span></td>
                                <td>62</td>
                                <td>10</td>
                                <td>78</td>
                                <td><span class="font_bold">8.4</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_7','3_1_7_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_high.gif' title='非常危险'></img><a
                                        href="host/124.74.244.135.html" target="_blank">124.74.244.135</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">6</span></td>
                                <td>62</td>
                                <td>12</td>
                                <td>80</td>
                                <td><span class="font_bold">8.4</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_8','3_1_8_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_high.gif' title='非常危险'></img><a
                                        href="host/61.129.105.66.html" target="_blank">61.129.105.66</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">6</span></td>
                                <td>62</td>
                                <td>7</td>
                                <td>75</td>
                                <td><span class="font_bold">8.4</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_9','3_1_9_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_high.gif' title='非常危险'></img><a
                                        href="host/58.247.108.66.html" target="_blank">58.247.108.66</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">9</span></td>
                                <td>93</td>
                                <td>11</td>
                                <td>113</td>
                                <td><span class="font_bold">8.4</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_10','3_1_10_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_high.gif' title='非常危险'></img><a
                                        href="host/220.248.39.171.html" target="_blank">220.248.39.171</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">2</span></td>
                                <td>0</td>
                                <td>7</td>
                                <td>9</td>
                                <td><span class="font_bold">7.8</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_11','3_1_11_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_high.gif' title='非常危险'></img><a
                                        href="host/220.248.39.136.html" target="_blank">220.248.39.136</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">2</span></td>
                                <td>0</td>
                                <td>7</td>
                                <td>9</td>
                                <td><span class="font_bold">7.8</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_12','3_1_12_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_high.gif' title='非常危险'></img><a
                                        href="host/220.248.39.131.html" target="_blank">220.248.39.131</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">2</span></td>
                                <td>0</td>
                                <td>7</td>
                                <td>9</td>
                                <td><span class="font_bold">7.8</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_13','3_1_13_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_high.gif' title='非常危险'></img><a
                                        href="host/124.127.243.234.html" target="_blank">124.127.243.234</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">2</span></td>
                                <td>0</td>
                                <td>7</td>
                                <td>9</td>
                                <td><span class="font_bold">7.8</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_14','3_1_14_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_high.gif' title='非常危险'></img><a
                                        href="host/124.127.243.231.html" target="_blank">124.127.243.231</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">2</span></td>
                                <td>0</td>
                                <td>7</td>
                                <td>9</td>
                                <td><span class="font_bold">7.8</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_15','3_1_15_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_high.gif' title='非常危险'></img><a
                                        href="host/124.74.244.171.html" target="_blank">124.74.244.171</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">2</span></td>
                                <td>0</td>
                                <td>7</td>
                                <td>9</td>
                                <td><span class="font_bold">7.8</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_16','3_1_16_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_high.gif' title='非常危险'></img><a
                                        href="host/124.74.244.136.html" target="_blank">124.74.244.136</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">2</span></td>
                                <td>0</td>
                                <td>7</td>
                                <td>9</td>
                                <td><span class="font_bold">7.8</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_17','3_1_17_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_high.gif' title='非常危险'></img><a
                                        href="host/124.74.244.131.html" target="_blank">124.74.244.131</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">2</span></td>
                                <td>0</td>
                                <td>7</td>
                                <td>9</td>
                                <td><span class="font_bold">7.8</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_18','3_1_18_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_high.gif' title='非常危险'></img><a
                                        href="host/61.129.105.118.html" target="_blank">61.129.105.118</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">2</span></td>
                                <td>0</td>
                                <td>5</td>
                                <td>7</td>
                                <td><span class="font_bold">7.8</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_19','3_1_19_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_high.gif' title='非常危险'></img><a
                                        href="host/61.129.105.99.html" target="_blank">61.129.105.99</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">1</span></td>
                                <td>0</td>
                                <td>4</td>
                                <td>5</td>
                                <td><span class="font_bold">7.8</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_20','3_1_20_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_high.gif' title='非常危险'></img><a
                                        href="host/58.247.108.99.html" target="_blank">58.247.108.99</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">2</span></td>
                                <td>0</td>
                                <td>7</td>
                                <td>9</td>
                                <td><span class="font_bold">7.8</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_21','3_1_21_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_low.gif' title='比较安全'></img><a
                                        href="host/220.248.39.176.html" target="_blank">220.248.39.176</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>1</td>
                                <td>6</td>
                                <td>7</td>
                                <td><span class="font_bold">4.3</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_22','3_1_22_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_low.gif' title='比较安全'></img><a
                                        href="host/220.248.39.154.html" target="_blank">220.248.39.154</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>1</td>
                                <td>5</td>
                                <td>6</td>
                                <td><span class="font_bold">4.3</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_23','3_1_23_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_low.gif' title='比较安全'></img><a
                                        href="host/220.248.39.134.html" target="_blank">220.248.39.134</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>1</td>
                                <td>5</td>
                                <td>6</td>
                                <td><span class="font_bold">4.3</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_24','3_1_24_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_low.gif' title='比较安全'></img><a
                                        href="host/180.166.223.193.html" target="_blank">180.166.223.193</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>1</td>
                                <td>5</td>
                                <td>6</td>
                                <td><span class="font_bold">4.3</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_25','3_1_25_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_low.gif' title='比较安全'></img><a
                                        href="host/140.207.162.65.html" target="_blank">140.207.162.65</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>1</td>
                                <td>5</td>
                                <td>6</td>
                                <td><span class="font_bold">4.3</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_26','3_1_26_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_low.gif' title='比较安全'></img><a
                                        href="host/140.207.78.1.html" target="_blank">140.207.78.1</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>1</td>
                                <td>5</td>
                                <td>6</td>
                                <td><span class="font_bold">4.3</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_27','3_1_27_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_low.gif' title='比较安全'></img><a
                                        href="host/124.127.243.235.html" target="_blank">124.127.243.235</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>1</td>
                                <td>5</td>
                                <td>6</td>
                                <td><span class="font_bold">4.3</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_28','3_1_28_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_low.gif' title='比较安全'></img><a
                                        href="host/124.127.243.216.html" target="_blank">124.127.243.216</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>2</td>
                                <td>5</td>
                                <td>7</td>
                                <td><span class="font_bold">4.3</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_29','3_1_29_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_low.gif' title='比较安全'></img><a
                                        href="host/124.127.243.200.html" target="_blank">124.127.243.200</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>1</td>
                                <td>5</td>
                                <td>6</td>
                                <td><span class="font_bold">4.3</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_30','3_1_30_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_low.gif' title='比较安全'></img><a
                                        href="host/124.74.244.176.html" target="_blank">124.74.244.176</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>1</td>
                                <td>5</td>
                                <td>6</td>
                                <td><span class="font_bold">4.3</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_31','3_1_31_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_low.gif' title='比较安全'></img><a
                                        href="host/124.74.244.154.html" target="_blank">124.74.244.154</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>1</td>
                                <td>5</td>
                                <td>6</td>
                                <td><span class="font_bold">4.3</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_32','3_1_32_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_low.gif' title='比较安全'></img><a
                                        href="host/124.74.244.134.html" target="_blank">124.74.244.134</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>1</td>
                                <td>5</td>
                                <td>6</td>
                                <td><span class="font_bold">4.3</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_33','3_1_33_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_low.gif' title='比较安全'></img><a
                                        href="host/124.74.244.130.html" target="_blank">124.74.244.130</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>1</td>
                                <td>5</td>
                                <td>6</td>
                                <td><span class="font_bold">4.3</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_34','3_1_34_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_low.gif' title='比较安全'></img><a
                                        href="host/101.230.192.1.html" target="_blank">101.230.192.1</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>1</td>
                                <td>5</td>
                                <td>6</td>
                                <td><span class="font_bold">4.3</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_35','3_1_35_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_low.gif' title='比较安全'></img><a
                                        href="host/61.129.105.124.html" target="_blank">61.129.105.124</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>1</td>
                                <td>5</td>
                                <td>6</td>
                                <td><span class="font_bold">4.3</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_36','3_1_36_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_low.gif' title='比较安全'></img><a
                                        href="host/61.129.105.101.html" target="_blank">61.129.105.101</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>1</td>
                                <td>4</td>
                                <td>5</td>
                                <td><span class="font_bold">4.3</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_37','3_1_37_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_low.gif' title='比较安全'></img><a
                                        href="host/58.247.108.124.html" target="_blank">58.247.108.124</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>1</td>
                                <td>4</td>
                                <td>5</td>
                                <td><span class="font_bold">4.3</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_38','3_1_38_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_low.gif' title='比较安全'></img><a
                                        href="host/220.248.39.177.html" target="_blank">220.248.39.177</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>7</td>
                                <td>7</td>
                                <td><span class="font_bold">3.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_39','3_1_39_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_low.gif' title='比较安全'></img><a
                                        href="host/220.248.39.173.html" target="_blank">220.248.39.173</a></td>
                                <td></td>
                                <td>Solaris</td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>7</td>
                                <td>7</td>
                                <td><span class="font_bold">3.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_40','3_1_40_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_low.gif' title='比较安全'></img><a
                                        href="host/220.248.39.155.html" target="_blank">220.248.39.155</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>7</td>
                                <td>7</td>
                                <td><span class="font_bold">3.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_41','3_1_41_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_low.gif' title='比较安全'></img><a
                                        href="host/220.248.39.145.html" target="_blank">220.248.39.145</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>7</td>
                                <td>7</td>
                                <td><span class="font_bold">3.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_42','3_1_42_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_low.gif' title='比较安全'></img><a
                                        href="host/202.101.28.123.html" target="_blank">202.101.28.123</a></td>
                                <td></td>
                                <td>Windows </td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>9</td>
                                <td>9</td>
                                <td><span class="font_bold">3.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_43','3_1_43_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_low.gif' title='比较安全'></img><a
                                        href="host/180.166.223.195.html" target="_blank">180.166.223.195</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>6</td>
                                <td>6</td>
                                <td><span class="font_bold">3.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_44','3_1_44_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_low.gif' title='比较安全'></img><a
                                        href="host/180.166.223.194.html" target="_blank">180.166.223.194</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>7</td>
                                <td>7</td>
                                <td><span class="font_bold">3.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_45','3_1_45_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_low.gif' title='比较安全'></img><a
                                        href="host/140.207.162.67.html" target="_blank">140.207.162.67</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>7</td>
                                <td>7</td>
                                <td><span class="font_bold">3.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_46','3_1_46_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_low.gif' title='比较安全'></img><a
                                        href="host/140.207.162.66.html" target="_blank">140.207.162.66</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>7</td>
                                <td>7</td>
                                <td><span class="font_bold">3.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_47','3_1_47_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_low.gif' title='比较安全'></img><a
                                        href="host/140.207.78.3.html" target="_blank">140.207.78.3</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>7</td>
                                <td>7</td>
                                <td><span class="font_bold">3.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_48','3_1_48_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_low.gif' title='比较安全'></img><a
                                        href="host/140.207.78.2.html" target="_blank">140.207.78.2</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>7</td>
                                <td>7</td>
                                <td><span class="font_bold">3.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_49','3_1_49_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_low.gif' title='比较安全'></img><a
                                        href="host/124.127.243.201.html" target="_blank">124.127.243.201</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>7</td>
                                <td>7</td>
                                <td><span class="font_bold">3.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_50','3_1_50_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_low.gif' title='比较安全'></img><a
                                        href="host/124.74.244.177.html" target="_blank">124.74.244.177</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>6</td>
                                <td>6</td>
                                <td><span class="font_bold">3.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_51','3_1_51_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_low.gif' title='比较安全'></img><a
                                        href="host/124.74.244.173.html" target="_blank">124.74.244.173</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>7</td>
                                <td>7</td>
                                <td><span class="font_bold">3.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_52','3_1_52_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_low.gif' title='比较安全'></img><a
                                        href="host/124.74.244.155.html" target="_blank">124.74.244.155</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>7</td>
                                <td>7</td>
                                <td><span class="font_bold">3.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_53','3_1_53_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_low.gif' title='比较安全'></img><a
                                        href="host/124.74.244.145.html" target="_blank">124.74.244.145</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>7</td>
                                <td>7</td>
                                <td><span class="font_bold">3.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_54','3_1_54_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_low.gif' title='比较安全'></img><a
                                        href="host/101.230.192.3.html" target="_blank">101.230.192.3</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>6</td>
                                <td>6</td>
                                <td><span class="font_bold">3.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_55','3_1_55_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_low.gif' title='比较安全'></img><a
                                        href="host/58.247.108.97.html" target="_blank">58.247.108.97</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>6</td>
                                <td>6</td>
                                <td><span class="font_bold">3.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_56','3_1_56_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_low.gif' title='比较安全'></img><a
                                        href="host/58.246.139.123.html" target="_blank">58.246.139.123</a></td>
                                <td></td>
                                <td>Windows </td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>9</td>
                                <td>9</td>
                                <td><span class="font_bold">3.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_57','3_1_57_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/220.248.39.189.html" target="_blank">220.248.39.189</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>2</td>
                                <td>2</td>
                                <td><span class="font_bold">1.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_58','3_1_58_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/220.248.39.182.html" target="_blank">220.248.39.182</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>2</td>
                                <td>2</td>
                                <td><span class="font_bold">1.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_59','3_1_59_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/220.248.39.181.html" target="_blank">220.248.39.181</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>1</td>
                                <td>1</td>
                                <td><span class="font_bold">1.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_60','3_1_60_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/220.248.39.179.html" target="_blank">220.248.39.179</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>1</td>
                                <td>1</td>
                                <td><span class="font_bold">1.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_61','3_1_61_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/220.248.39.178.html" target="_blank">220.248.39.178</a></td>
                                <td></td>
                                <td>Windows</td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>1</td>
                                <td>1</td>
                                <td><span class="font_bold">1.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_62','3_1_62_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/220.248.39.143.html" target="_blank">220.248.39.143</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>1</td>
                                <td>1</td>
                                <td><span class="font_bold">1.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_63','3_1_63_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/220.248.39.130.html" target="_blank">220.248.39.130</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>5</td>
                                <td>5</td>
                                <td><span class="font_bold">1.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_64','3_1_64_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/202.101.28.20.html" target="_blank">202.101.28.20</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>1</td>
                                <td>1</td>
                                <td><span class="font_bold">1.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_65','3_1_65_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/124.127.243.226.html" target="_blank">124.127.243.226</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>1</td>
                                <td>1</td>
                                <td><span class="font_bold">1.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_66','3_1_66_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/124.127.243.203.html" target="_blank">124.127.243.203</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>1</td>
                                <td>1</td>
                                <td><span class="font_bold">1.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_67','3_1_67_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/124.74.244.188.html" target="_blank">124.74.244.188</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>1</td>
                                <td>1</td>
                                <td><span class="font_bold">1.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_68','3_1_68_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/124.74.244.182.html" target="_blank">124.74.244.182</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>1</td>
                                <td>1</td>
                                <td><span class="font_bold">1.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_69','3_1_69_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/124.74.244.143.html" target="_blank">124.74.244.143</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>1</td>
                                <td>1</td>
                                <td><span class="font_bold">1.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_70','3_1_70_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/101.230.192.2.html" target="_blank">101.230.192.2</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>5</td>
                                <td>5</td>
                                <td><span class="font_bold">1.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_71','3_1_71_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/61.129.105.94.html" target="_blank">61.129.105.94</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>1</td>
                                <td>1</td>
                                <td><span class="font_bold">1.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_72','3_1_72_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/58.247.108.126.html" target="_blank">58.247.108.126</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>1</td>
                                <td>1</td>
                                <td><span class="font_bold">1.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_73','3_1_73_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/58.247.108.101.html" target="_blank">58.247.108.101</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>5</td>
                                <td>5</td>
                                <td><span class="font_bold">1.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_74','3_1_74_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/58.247.108.94.html" target="_blank">58.247.108.94</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>1</td>
                                <td>1</td>
                                <td><span class="font_bold">1.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_75','3_1_75_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/220.248.39.174.html" target="_blank">220.248.39.174</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>0</td>
                                <td>0</td>
                                <td><span class="font_bold">0.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_76','3_1_76_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/220.248.39.150.html" target="_blank">220.248.39.150</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>0</td>
                                <td>0</td>
                                <td><span class="font_bold">0.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_77','3_1_77_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/220.248.39.144.html" target="_blank">220.248.39.144</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>0</td>
                                <td>0</td>
                                <td><span class="font_bold">0.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_78','3_1_78_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/220.248.39.142.html" target="_blank">220.248.39.142</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>0</td>
                                <td>0</td>
                                <td><span class="font_bold">0.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_79','3_1_79_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/220.248.39.138.html" target="_blank">220.248.39.138</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>0</td>
                                <td>0</td>
                                <td><span class="font_bold">0.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_80','3_1_80_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/220.248.39.137.html" target="_blank">220.248.39.137</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>0</td>
                                <td>0</td>
                                <td><span class="font_bold">0.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_81','3_1_81_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/202.101.28.22.html" target="_blank">202.101.28.22</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>0</td>
                                <td>0</td>
                                <td><span class="font_bold">0.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_82','3_1_82_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/202.101.28.21.html" target="_blank">202.101.28.21</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>0</td>
                                <td>0</td>
                                <td><span class="font_bold">0.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_83','3_1_83_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/124.127.243.237.html" target="_blank">124.127.243.237</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>0</td>
                                <td>0</td>
                                <td><span class="font_bold">0.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_84','3_1_84_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/124.74.244.181.html" target="_blank">124.74.244.181</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>0</td>
                                <td>0</td>
                                <td><span class="font_bold">0.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_85','3_1_85_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/124.74.244.179.html" target="_blank">124.74.244.179</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>0</td>
                                <td>0</td>
                                <td><span class="font_bold">0.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_86','3_1_86_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/124.74.244.178.html" target="_blank">124.74.244.178</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>0</td>
                                <td>0</td>
                                <td><span class="font_bold">0.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_87','3_1_87_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/124.74.244.174.html" target="_blank">124.74.244.174</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>0</td>
                                <td>0</td>
                                <td><span class="font_bold">0.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_88','3_1_88_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/124.74.244.167.html" target="_blank">124.74.244.167</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>0</td>
                                <td>0</td>
                                <td><span class="font_bold">0.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_89','3_1_89_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/124.74.244.150.html" target="_blank">124.74.244.150</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>0</td>
                                <td>0</td>
                                <td><span class="font_bold">0.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_90','3_1_90_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/124.74.244.144.html" target="_blank">124.74.244.144</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>0</td>
                                <td>0</td>
                                <td><span class="font_bold">0.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_91','3_1_91_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/124.74.244.142.html" target="_blank">124.74.244.142</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>0</td>
                                <td>0</td>
                                <td><span class="font_bold">0.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_92','3_1_92_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/124.74.244.141.html" target="_blank">124.74.244.141</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>0</td>
                                <td>0</td>
                                <td><span class="font_bold">0.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_93','3_1_93_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/124.74.244.138.html" target="_blank">124.74.244.138</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>0</td>
                                <td>0</td>
                                <td><span class="font_bold">0.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_94','3_1_94_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/124.74.244.137.html" target="_blank">124.74.244.137</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>0</td>
                                <td>0</td>
                                <td><span class="font_bold">0.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_95','3_1_95_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/61.129.105.121.html" target="_blank">61.129.105.121</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>0</td>
                                <td>0</td>
                                <td><span class="font_bold">0.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_96','3_1_96_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/61.129.105.100.html" target="_blank">61.129.105.100</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>0</td>
                                <td>0</td>
                                <td><span class="font_bold">0.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_97','3_1_97_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/61.129.105.93.html" target="_blank">61.129.105.93</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>0</td>
                                <td>0</td>
                                <td><span class="font_bold">0.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_98','3_1_98_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/58.247.108.100.html" target="_blank">58.247.108.100</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>0</td>
                                <td>0</td>
                                <td><span class="font_bold">0.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_99','3_1_99_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/58.247.108.93.html" target="_blank">58.247.108.93</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>0</td>
                                <td>0</td>
                                <td><span class="font_bold">0.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_100','3_1_100_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/58.247.108.91.html" target="_blank">58.247.108.91</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>0</td>
                                <td>0</td>
                                <td><span class="font_bold">0.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_101','3_1_101_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/27.115.102.222.html" target="_blank">27.115.102.222</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>0</td>
                                <td>0</td>
                                <td><span class="font_bold">0.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="even" onclick="no_toggle('3_1_102','3_1_102_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/27.115.102.221.html" target="_blank">27.115.102.221</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>0</td>
                                <td>0</td>
                                <td><span class="font_bold">0.0</span></td>
                            </tr>

                            <tr style="cursor:pointer;" class="odd" onclick="no_toggle('3_1_103','3_1_103_1')">
                                <td><img align='absmiddle' src='reportfiles/images/d_safe.gif' title='非常安全'></img><a
                                        href="host/27.115.102.220.html" target="_blank">27.115.102.220</a></td>
                                <td></td>
                                <td></td>
                                <td><span class="font_high">0</span></td>
                                <td>0</td>
                                <td>0</td>
                                <td>0</td>
                                <td><span class="font_bold">0.0</span></td>
                            </tr>

                        </tbody>
                        <tfoot>
                            <tr class="second_title">
                                <td colspan="3">合计</td>
                                <td><span class="font_high">90</span></td>
                                <td>731</td>
                                <td>417</td>
                                <td>1238</td>
                                <td>9.0</td>
                            </tr>
                        </tfoot>
                    </table>
                </div>

            </div>

            <div class="report_h report_h1">4.漏洞信息</div>
            <div class="report_content">
                <div class="report_h report_h2" id="title00">4.1漏洞分布</div>
                <div>
                    <div style="text-align:right; vertical-align:middle;">漏洞类别：<img align="absbottom" src="reportfiles/images/vuln_high.gif">高风险[4]&nbsp;&nbsp;<img
                            align="absbottom" src="reportfiles/images/vuln_middle.gif">中危险[33]&nbsp;&nbsp;<img align="absbottom"
                            src="reportfiles/images/vuln_low.gif">低风险[13]&nbsp;&nbsp;</div>
                    <table id="vuln_distribution" class="report_table">
                        <thead>
                            <tr class="second_title">
                                <th style='width:40px'>序号</th>
                                <th>漏洞名称</th>
                                <th style='width:60px'>影响主机个数</th>
                                <th style='width:40px'>影响主机百分比</th>
                                <th style='width:30px'>出现次数</th>
                            </tr>
                        </thead>
                        <tbody>

                            <tr class="odd vuln_high" style="cursor:pointer;" onclick="no_toggle('4_1_1','table_4_1_1')">
                                <td>1</td>
                                <td>
                                    <img id="4_1_1" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_high.gif'></img>
                                    <span style='color:#E42B00'>Apache Tomcat DIGEST身份验证多个安全漏洞(CVE-2012-3439)</span>
                                    <!--<span class="level_danger_high">Apache Tomcat DIGEST身份验证多个安全漏洞(CVE-2012-3439)</span></td>-->
                                </td>
                                <td>9/103</td>
                                <td>9%</td>
                                <td>23</td>
                            </tr>
                            <tr class="more hide odd" id="table_4_1_1">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/124.127.243.233.html" target="_blank">124.127.243.233</a>;&nbsp<a
                                                    href="host/124.74.244.135.html" target="_blank">124.74.244.135</a>;&nbsp<a
                                                    href="host/124.74.244.172.html" target="_blank">124.74.244.172</a>;&nbsp<a
                                                    href="host/124.74.244.175.html" target="_blank">124.74.244.175</a>;&nbsp

                                                <a href="host/220.248.39.135.html" target="_blank">220.248.39.135</a>;&nbsp<a
                                                    href="host/220.248.39.172.html" target="_blank">220.248.39.172</a>;&nbsp<a
                                                    href="host/220.248.39.175.html" target="_blank">220.248.39.175</a>;&nbsp<a
                                                    href="host/58.247.108.66.html" target="_blank">58.247.108.66</a>;&nbsp

                                                <a href="host/61.129.105.66.html" target="_blank">61.129.105.66</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>Apache Tomcat是一个流行的开放源码的JSP应用服务器程序。

                                                Apache Tomcat
                                                7.0.0-7.0.27、6.0.0-6.0.35、5.5.0-5.5.35存在多个安全漏洞，成功利用后可允许攻击者绕过安全限制并执行非法操作。

                                                &lt;*来源：Tilmann Kuhn

                                                链接：http://secunia.com/advisories/51138/
                                                http://www.apache.org/dist/httpd/Announcement2.2.html
                                                *&gt;
                                            </td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>厂商补丁：

                                                Apache Group
                                                ------------
                                                请更新到5.5.36、6.0.36、7.0.30

                                                Announcement2.2：Apache HTTP Server 2.2.23 Released

                                                链接：http://www.apache.org/dist/httpd/Announcement2.2.html</td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>8.0</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>2012-11-17</td>
                                        </tr>

                                        <tr class="odd">
                                            <th>CVE编号</th>
                                            <td><a target="_blank" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3439">CVE-2012-3439</a></a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>BUGTRAQ</th>
                                            <td><a target="_blank" href="http://www.securityfocus.com/bid/56403">56403</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>NSFOCUS</th>
                                            <td><a target="_blank" href="http://www.nsfocus.net/vulndb/21391">21391</a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>CNNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-201211-127">CNNVD-201211-127</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNCVE编号</th>
                                            <td>CNCVE-20123439</td>
                                        </tr>



                                        <tr class="even">
                                            <th>CNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnvd.org.cn/flaw/show/CNVD-2012-6360
">CNVD-2012-6360
                                                </a></td>
                                        </tr>


                                    </table>
                                </td>
                            </tr>
                            <tr class="even vuln_high" style="cursor:pointer;" onclick="no_toggle('4_1_2','table_4_1_2')">
                                <td>2</td>
                                <td>
                                    <img id="4_1_2" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_high.gif'></img>
                                    <span style='color:#E42B00'>Gate Pass Management System SQL Injection【原理扫描】</span>
                                    <!--<span class="level_danger_high">Gate Pass Management System SQL Injection【原理扫描】</span></td>-->
                                </td>
                                <td>11/103</td>
                                <td>11%</td>
                                <td>21</td>
                            </tr>
                            <tr class="more hide even" id="table_4_1_2">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/124.127.243.231.html" target="_blank">124.127.243.231</a>;&nbsp<a
                                                    href="host/124.127.243.234.html" target="_blank">124.127.243.234</a>;&nbsp<a
                                                    href="host/124.74.244.131.html" target="_blank">124.74.244.131</a>;&nbsp<a
                                                    href="host/124.74.244.136.html" target="_blank">124.74.244.136</a>;&nbsp

                                                <a href="host/124.74.244.171.html" target="_blank">124.74.244.171</a>;&nbsp<a
                                                    href="host/220.248.39.131.html" target="_blank">220.248.39.131</a>;&nbsp<a
                                                    href="host/220.248.39.136.html" target="_blank">220.248.39.136</a>;&nbsp<a
                                                    href="host/220.248.39.171.html" target="_blank">220.248.39.171</a>;&nbsp

                                                <a href="host/58.247.108.99.html" target="_blank">58.247.108.99</a>;&nbsp<a
                                                    href="host/61.129.105.118.html" target="_blank">61.129.105.118</a>;&nbsp<a
                                                    href="host/61.129.105.99.html" target="_blank">61.129.105.99</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>2.1版本的Gate Pass Management
                                                System，其中在login-exec.php中，未对login参数进行严格的限制，导致存在sql注入漏洞。</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>修复方案:

                                                目前最新版本已经修复该漏洞，请到官网上更新到最新版本。</td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>7.8</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>2018-11-01</td>
                                        </tr>








                                    </table>
                                </td>
                            </tr>
                            <tr class="odd vuln_high" style="cursor:pointer;" onclick="no_toggle('4_1_3','table_4_1_3')">
                                <td>3</td>
                                <td>
                                    <img id="4_1_3" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_high.gif'></img>
                                    <span style='color:#E42B00'>Apache Tomcat拒绝服务漏洞(CVE-2014-0230)</span>
                                    <!--<span class="level_danger_high">Apache Tomcat拒绝服务漏洞(CVE-2014-0230)</span></td>-->
                                </td>
                                <td>9/103</td>
                                <td>9%</td>
                                <td>23</td>
                            </tr>
                            <tr class="more hide odd" id="table_4_1_3">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/124.127.243.233.html" target="_blank">124.127.243.233</a>;&nbsp<a
                                                    href="host/124.74.244.135.html" target="_blank">124.74.244.135</a>;&nbsp<a
                                                    href="host/124.74.244.172.html" target="_blank">124.74.244.172</a>;&nbsp<a
                                                    href="host/124.74.244.175.html" target="_blank">124.74.244.175</a>;&nbsp

                                                <a href="host/220.248.39.135.html" target="_blank">220.248.39.135</a>;&nbsp<a
                                                    href="host/220.248.39.172.html" target="_blank">220.248.39.172</a>;&nbsp<a
                                                    href="host/220.248.39.175.html" target="_blank">220.248.39.175</a>;&nbsp<a
                                                    href="host/58.247.108.66.html" target="_blank">58.247.108.66</a>;&nbsp

                                                <a href="host/61.129.105.66.html" target="_blank">61.129.105.66</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>Apache Tomcat是一个流行的开源JSP应用服务器程序。

                                                未读完请求体，即将对该请求的响应返回给用户代理后，Tomcat默认会信任剩下的请求体，接着处理连接上的下一个请求。Tomcat对信任的请求体大小没有限制。Tomcat不会关闭连接，处理线程也会保持连接，这可导致有限的拒绝服务。

                                                &lt;*来源：AntBean@secdig
                                                *&gt;
                                            </td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>厂商补丁：

                                                Apache Group
                                                ------------
                                                目前厂商已经发布了升级补丁以修复这个安全问题，请到厂商的主页下载：


                                                [1] http://tomcat.apache.org/security-8.html
                                                [2] http://tomcat.apache.org/security-7.html
                                                [3] http://tomcat.apache.org/security-6.html
                                                [4] http://www.openwall.com/lists/oss-security/2015/04/10/1

                                            </td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>7.8</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>2015-06-07</td>
                                        </tr>

                                        <tr class="odd">
                                            <th>CVE编号</th>
                                            <td><a target="_blank" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0230">CVE-2014-0230</a></a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>BUGTRAQ</th>
                                            <td><a target="_blank" href="http://www.securityfocus.com/bid/74475">74475</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>NSFOCUS</th>
                                            <td><a target="_blank" href="http://www.nsfocus.net/vulndb/29825">29825</a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>CNNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-201505-034">CNNVD-201505-034</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNCVE编号</th>
                                            <td>CNCVE-20140230</td>
                                        </tr>


                                        <tr class="even">
                                            <th>CVSS评分</th>
                                            <td>7.8</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnvd.org.cn/flaw/show/CNVD-2015-02909
">CNVD-2015-02909
                                                </a></td>
                                        </tr>


                                    </table>
                                </td>
                            </tr>
                            <tr class="even vuln_high" style="cursor:pointer;" onclick="no_toggle('4_1_4','table_4_1_4')">
                                <td>4</td>
                                <td>
                                    <img id="4_1_4" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_high.gif'></img>
                                    <span style='color:#E42B00'>Apache Tomcat 安全限制绕过漏洞(CVE-2016-8735)</span>
                                    <!--<span class="level_danger_high">Apache Tomcat 安全限制绕过漏洞(CVE-2016-8735)</span></td>-->
                                </td>
                                <td>9/103</td>
                                <td>9%</td>
                                <td>23</td>
                            </tr>
                            <tr class="more hide even" id="table_4_1_4">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/124.127.243.233.html" target="_blank">124.127.243.233</a>;&nbsp<a
                                                    href="host/124.74.244.135.html" target="_blank">124.74.244.135</a>;&nbsp<a
                                                    href="host/124.74.244.172.html" target="_blank">124.74.244.172</a>;&nbsp<a
                                                    href="host/124.74.244.175.html" target="_blank">124.74.244.175</a>;&nbsp

                                                <a href="host/220.248.39.135.html" target="_blank">220.248.39.135</a>;&nbsp<a
                                                    href="host/220.248.39.172.html" target="_blank">220.248.39.172</a>;&nbsp<a
                                                    href="host/220.248.39.175.html" target="_blank">220.248.39.175</a>;&nbsp<a
                                                    href="host/58.247.108.66.html" target="_blank">58.247.108.66</a>;&nbsp

                                                <a href="host/61.129.105.66.html" target="_blank">61.129.105.66</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>Apache Tomcat是一个流行的开源JSP应用服务器程序。

                                                Apache Tomcat某些版本在JmxRemoteLifecycleListener的实现上存在安全漏洞，可导致远程代码执行。

                                            </td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>厂商补丁:
                                                Apache Group
                                                ------------
                                                目前厂商已经发布了升级补丁以修复这个安全问题，请到厂商的主页下载：

                                                https://tomcat.apache.org/security-6.html
                                                https://tomcat.apache.org/security-7.html
                                                https://tomcat.apache.org/security-8.html
                                                https://tomcat.apache.org/security-9.html

                                                http://svn.apache.org/viewvc?view=revision&amp;revision=1757275

                                            </td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>7.5</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>2017-04-06</td>
                                        </tr>

                                        <tr class="odd">
                                            <th>CVE编号</th>
                                            <td><a target="_blank" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8735">CVE-2016-8735</a></a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>BUGTRAQ</th>
                                            <td><a target="_blank" href="http://www.securityfocus.com/bid/94463">94463</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>NSFOCUS</th>
                                            <td><a target="_blank" href="http://www.nsfocus.net/vulndb/35453">35453</a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>CNNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-201611-609">CNNVD-201611-609</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNCVE编号</th>
                                            <td>CNCVE-20168735</td>
                                        </tr>


                                        <tr class="even">
                                            <th>CVSS评分</th>
                                            <td>7.5</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnvd.org.cn/flaw/show/CNVD-2016-11583">CNVD-2016-11583</a></td>
                                        </tr>


                                    </table>
                                </td>
                            </tr>
                            <tr class="odd vuln_middle" style="cursor:pointer;" onclick="no_toggle('4_1_5','table_4_1_5')">
                                <td>5</td>
                                <td>
                                    <img id="4_1_5" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_middle.gif'></img>
                                    <span style='color:#AF6100'>Apache Tomcat FORM认证器会话固定漏洞(CVE-2013-2067)</span>
                                    <!--<span class="level_danger_high">Apache Tomcat FORM认证器会话固定漏洞(CVE-2013-2067)</span></td>-->
                                </td>
                                <td>9/103</td>
                                <td>9%</td>
                                <td>23</td>
                            </tr>
                            <tr class="more hide odd" id="table_4_1_5">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/124.127.243.233.html" target="_blank">124.127.243.233</a>;&nbsp<a
                                                    href="host/124.74.244.135.html" target="_blank">124.74.244.135</a>;&nbsp<a
                                                    href="host/124.74.244.172.html" target="_blank">124.74.244.172</a>;&nbsp<a
                                                    href="host/124.74.244.175.html" target="_blank">124.74.244.175</a>;&nbsp

                                                <a href="host/220.248.39.135.html" target="_blank">220.248.39.135</a>;&nbsp<a
                                                    href="host/220.248.39.172.html" target="_blank">220.248.39.172</a>;&nbsp<a
                                                    href="host/220.248.39.175.html" target="_blank">220.248.39.175</a>;&nbsp<a
                                                    href="host/58.247.108.66.html" target="_blank">58.247.108.66</a>;&nbsp

                                                <a href="host/61.129.105.66.html" target="_blank">61.129.105.66</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>Apache Tomcat是一个流行的开源JSP应用服务器程序。

                                                Tomcat 7.0.0-7.0.32、Tomcat
                                                6.0.21-6.0.36的FORM身份验证存在安全漏洞，通过重复请求经过身份验证的资源，当受害者在填写登录表单时，攻击者可利用此漏洞注入一个请求，该请求可用受害者的凭证执行。通过更改登录页面之前的会话ID和通过身份验证后的用户ID，可以阻止此漏洞被利用。</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>厂商补丁：
                                                apache
                                                ---------
                                                目前 apache 已经发布 tomcat 最新版本, 请到厂商的官方页面下载最新版本:
                                                链接：http://tomcat.apache.org/</td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>6.8</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>2013-06-01</td>
                                        </tr>

                                        <tr class="odd">
                                            <th>CVE编号</th>
                                            <td><a target="_blank" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2067">CVE-2013-2067</a></a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>BUGTRAQ</th>
                                            <td><a target="_blank" href="http://www.securityfocus.com/bid/59799">59799</a>,<a
                                                    target="_blank" href="http://www.securityfocus.com/bid/64758">64758</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>NSFOCUS</th>
                                            <td><a target="_blank" href="http://www.nsfocus.net/vulndb/23660">23660</a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>CNNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-201305-224">CNNVD-201305-224</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNCVE编号</th>
                                            <td>CNCVE-20132067</td>
                                        </tr>


                                        <tr class="even">
                                            <th>CVSS评分</th>
                                            <td>6.8</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnvd.org.cn/flaw/show/CNVD-2013-05379">CNVD-2013-05379</a></td>
                                        </tr>


                                    </table>
                                </td>
                            </tr>
                            <tr class="even vuln_middle" style="cursor:pointer;" onclick="no_toggle('4_1_6','table_4_1_6')">
                                <td>6</td>
                                <td>
                                    <img id="4_1_6" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_middle.gif'></img>
                                    <span style='color:#AF6100'>Apache Tomcat 安全限制绕过漏洞(CVE-2016-6816)</span>
                                    <!--<span class="level_danger_high">Apache Tomcat 安全限制绕过漏洞(CVE-2016-6816)</span></td>-->
                                </td>
                                <td>9/103</td>
                                <td>9%</td>
                                <td>23</td>
                            </tr>
                            <tr class="more hide even" id="table_4_1_6">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/124.127.243.233.html" target="_blank">124.127.243.233</a>;&nbsp<a
                                                    href="host/124.74.244.135.html" target="_blank">124.74.244.135</a>;&nbsp<a
                                                    href="host/124.74.244.172.html" target="_blank">124.74.244.172</a>;&nbsp<a
                                                    href="host/124.74.244.175.html" target="_blank">124.74.244.175</a>;&nbsp

                                                <a href="host/220.248.39.135.html" target="_blank">220.248.39.135</a>;&nbsp<a
                                                    href="host/220.248.39.172.html" target="_blank">220.248.39.172</a>;&nbsp<a
                                                    href="host/220.248.39.175.html" target="_blank">220.248.39.175</a>;&nbsp<a
                                                    href="host/58.247.108.66.html" target="_blank">58.247.108.66</a>;&nbsp

                                                <a href="host/61.129.105.66.html" target="_blank">61.129.105.66</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>Apache Tomcat是一个流行的开源JSP应用服务器程序。

                                                Apache
                                                Tomcat某些版本解析HTTP请求行的代码允许存在无效的字符，这可使攻击者篡改HTTP响应，对Web缓存投毒，执行XSS攻击或获取敏感信息。

                                            </td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>厂商补丁:
                                                Apache Group
                                                ------------
                                                目前厂商已经发布了升级补丁以修复这个安全问题，请到厂商的主页下载：

                                                https://tomcat.apache.org/security-6.html
                                                https://tomcat.apache.org/security-7.html
                                                https://tomcat.apache.org/security-8.html
                                                https://tomcat.apache.org/security-9.html

                                                http://svn.apache.org/viewvc?view=revision&amp;revision=1757275

                                            </td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>6.8</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>2017-03-20</td>
                                        </tr>

                                        <tr class="odd">
                                            <th>CVE编号</th>
                                            <td><a target="_blank" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6816">CVE-2016-6816</a></a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>BUGTRAQ</th>
                                            <td><a target="_blank" href="http://www.securityfocus.com/bid/94461">94461</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>NSFOCUS</th>
                                            <td><a target="_blank" href="http://www.nsfocus.net/vulndb/35455">35455</a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>CNNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-201611-610">CNNVD-201611-610</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNCVE编号</th>
                                            <td>CNCVE-20166816</td>
                                        </tr>


                                        <tr class="even">
                                            <th>CVSS评分</th>
                                            <td>6.8</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnvd.org.cn/flaw/show/CNVD-2016-11591">CNVD-2016-11591</a></td>
                                        </tr>


                                    </table>
                                </td>
                            </tr>
                            <tr class="odd vuln_middle" style="cursor:pointer;" onclick="no_toggle('4_1_7','table_4_1_7')">
                                <td>7</td>
                                <td>
                                    <img id="4_1_7" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_middle.gif'></img>
                                    <span style='color:#AF6100'>Apache Tomcat session-persistence
                                        远程代码执行漏洞(CVE-2016-0714)</span>
                                    <!--<span class="level_danger_high">Apache Tomcat session-persistence 远程代码执行漏洞(CVE-2016-0714)</span></td>-->
                                </td>
                                <td>9/103</td>
                                <td>9%</td>
                                <td>23</td>
                            </tr>
                            <tr class="more hide odd" id="table_4_1_7">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/124.127.243.233.html" target="_blank">124.127.243.233</a>;&nbsp<a
                                                    href="host/124.74.244.135.html" target="_blank">124.74.244.135</a>;&nbsp<a
                                                    href="host/124.74.244.172.html" target="_blank">124.74.244.172</a>;&nbsp<a
                                                    href="host/124.74.244.175.html" target="_blank">124.74.244.175</a>;&nbsp

                                                <a href="host/220.248.39.135.html" target="_blank">220.248.39.135</a>;&nbsp<a
                                                    href="host/220.248.39.172.html" target="_blank">220.248.39.172</a>;&nbsp<a
                                                    href="host/220.248.39.175.html" target="_blank">220.248.39.175</a>;&nbsp<a
                                                    href="host/58.247.108.66.html" target="_blank">58.247.108.66</a>;&nbsp

                                                <a href="host/61.129.105.66.html" target="_blank">61.129.105.66</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>Apache
                                                Tomcat是美国阿帕奇（Apache）软件基金会下属的Jakarta项目的一款轻量级Web应用服务器，它主要用于开发和调试JSP程序，适用于中小型系统。
                                                Apache
                                                Tomcat的session-persistence实现过程中存在安全漏洞，该漏洞源于程序没有正确处理会话属性。远程攻击者可借助将特制的对象放到会话中的Web应用程序利用该漏洞绕过既定的SecurityManager限制，以提升的权限执行任意代码。以下版本受到影响：Apache
                                                Tomcat 6.0.45之前6.x版本，7.0.68之前7.x版本，8.0.31之前8.x版本，9.0.0.M2之前9.x版本。</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>厂商补丁:
                                                目前厂商已经发布了升级补丁以修复此安全问题，补丁获取链接：
                                                http://tomcat.apache.org/security-7.html</td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>6.5</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>2016-02-24</td>
                                        </tr>

                                        <tr class="odd">
                                            <th>CVE编号</th>
                                            <td><a target="_blank" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0714">CVE-2016-0714</a></a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>BUGTRAQ</th>
                                            <td><a target="_blank" href="http://www.securityfocus.com/bid/83327">83327</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>NSFOCUS</th>
                                            <td><a target="_blank" href="http://www.nsfocus.net/vulndb/32543">32543</a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>CNNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-201602-402">CNNVD-201602-402</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNCVE编号</th>
                                            <td>CNCVE-20160714</td>
                                        </tr>


                                        <tr class="even">
                                            <th>CVSS评分</th>
                                            <td>6.5</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnvd.org.cn/flaw/show/CNVD-2016-01283
">CNVD-2016-01283
                                                </a></td>
                                        </tr>


                                    </table>
                                </td>
                            </tr>
                            <tr class="even vuln_middle" style="cursor:pointer;" onclick="no_toggle('4_1_8','table_4_1_8')">
                                <td>8</td>
                                <td>
                                    <img id="4_1_8" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_middle.gif'></img>
                                    <span style='color:#AF6100'>Apache Tomcat 安全漏洞(CVE-2014-0227)</span>
                                    <!--<span class="level_danger_high">Apache Tomcat 安全漏洞(CVE-2014-0227)</span></td>-->
                                </td>
                                <td>9/103</td>
                                <td>9%</td>
                                <td>23</td>
                            </tr>
                            <tr class="more hide even" id="table_4_1_8">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/124.127.243.233.html" target="_blank">124.127.243.233</a>;&nbsp<a
                                                    href="host/124.74.244.135.html" target="_blank">124.74.244.135</a>;&nbsp<a
                                                    href="host/124.74.244.172.html" target="_blank">124.74.244.172</a>;&nbsp<a
                                                    href="host/124.74.244.175.html" target="_blank">124.74.244.175</a>;&nbsp

                                                <a href="host/220.248.39.135.html" target="_blank">220.248.39.135</a>;&nbsp<a
                                                    href="host/220.248.39.172.html" target="_blank">220.248.39.172</a>;&nbsp<a
                                                    href="host/220.248.39.175.html" target="_blank">220.248.39.175</a>;&nbsp<a
                                                    href="host/58.247.108.66.html" target="_blank">58.247.108.66</a>;&nbsp

                                                <a href="host/61.129.105.66.html" target="_blank">61.129.105.66</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>Apache
                                                Tomcat是美国阿帕奇（Apache）软件基金会下属的Jakarta项目的一款轻量级Web应用服务器，它主要用于开发和调试JSP程序，适用于中小型系统。
                                                Apache
                                                Tomcat中的java/org/apache/coyote/http11/filters/ChunkedInputFilter.java文件存在安全漏洞，该漏洞源于程序出现错误时，没有正确限制读取数据。远程攻击者可通过发送带有畸形编码块的流数据利用该漏洞实施HTTP请求走私攻击，或造成拒绝服务（资源耗尽）。以下版本受到影响：Apache
                                                Tomcat 6.0.42之前的6.x版本，7.0.55之前的7.x版本，8.0.9之前的8.x版本。</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>厂商补丁：

                                                Apache Group
                                                ------------
                                                Apache Group已经为此发布了一个安全公告（CVE-2014-0227）以及相应补丁:
                                                CVE-2014-0227：Fixed in Apache Tomcat 6.0.43
                                                链接：http://tomcat.apache.org/security-6.html

                                                补丁下载：http://svn.apache.org/viewvc?view=rev&amp;rev=1603628</td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>6.4</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>2015-02-15</td>
                                        </tr>

                                        <tr class="odd">
                                            <th>CVE编号</th>
                                            <td><a target="_blank" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0227">CVE-2014-0227</a></a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>BUGTRAQ</th>
                                            <td><a target="_blank" href="http://www.securityfocus.com/bid/72717">72717</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>NSFOCUS</th>
                                            <td><a target="_blank" href="http://www.nsfocus.net/vulndb/30150">30150</a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>CNNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-201502-328">CNNVD-201502-328</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNCVE编号</th>
                                            <td>CNCVE-20140227</td>
                                        </tr>


                                        <tr class="even">
                                            <th>CVSS评分</th>
                                            <td>6.4</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnvd.org.cn/flaw/show/CNVD-2015-01025
">CNVD-2015-01025
                                                </a></td>
                                        </tr>


                                    </table>
                                </td>
                            </tr>
                            <tr class="odd vuln_middle" style="cursor:pointer;" onclick="no_toggle('4_1_9','table_4_1_9')">
                                <td>9</td>
                                <td>
                                    <img id="4_1_9" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_middle.gif'></img>
                                    <span style='color:#AF6100'>Apache Tomcat 输入验证漏洞(CVE-2013-4286)</span>
                                    <!--<span class="level_danger_high">Apache Tomcat 输入验证漏洞(CVE-2013-4286)</span></td>-->
                                </td>
                                <td>9/103</td>
                                <td>9%</td>
                                <td>23</td>
                            </tr>
                            <tr class="more hide odd" id="table_4_1_9">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/124.127.243.233.html" target="_blank">124.127.243.233</a>;&nbsp<a
                                                    href="host/124.74.244.135.html" target="_blank">124.74.244.135</a>;&nbsp<a
                                                    href="host/124.74.244.172.html" target="_blank">124.74.244.172</a>;&nbsp<a
                                                    href="host/124.74.244.175.html" target="_blank">124.74.244.175</a>;&nbsp

                                                <a href="host/220.248.39.135.html" target="_blank">220.248.39.135</a>;&nbsp<a
                                                    href="host/220.248.39.172.html" target="_blank">220.248.39.172</a>;&nbsp<a
                                                    href="host/220.248.39.175.html" target="_blank">220.248.39.175</a>;&nbsp<a
                                                    href="host/58.247.108.66.html" target="_blank">58.247.108.66</a>;&nbsp

                                                <a href="host/61.129.105.66.html" target="_blank">61.129.105.66</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>Tomcat是美国阿帕奇（Apache）软件基金会下属的Jakarta项目的一款轻量级Web应用服务器，它主要用于开发和调试JSP程序，适用于中小型系统。
                                                Apache Tomcat中存在输入验证漏洞，该漏洞源于当使用HTTP或AJP连接器时，程序没有正确处理Content-Length
                                                HTTP请求头信息。远程攻击者可借助多个Content-Length头或使用块编码的Content-Length头利用该漏洞实施跨站脚本攻击，获取请求中的敏感信息。以下版本受到影响：Apache
                                                Tomcat 6.0.37及之前的版本，7.0.47之前的7.x版本，8.0.0-RC3之前的8.x版本。</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>厂商补丁：
                                                apache
                                                ---------
                                                目前 apache 已经发布 tomcat 最新版本, 请到厂商的官方页面下载最新版本:
                                                链接：http://tomcat.apache.org/</td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>5.8</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>2014-02-26</td>
                                        </tr>

                                        <tr class="odd">
                                            <th>CVE编号</th>
                                            <td><a target="_blank" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4286">CVE-2013-4286</a></a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>BUGTRAQ</th>
                                            <td><a target="_blank" href="http://www.securityfocus.com/bid/65773">65773</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>NSFOCUS</th>
                                            <td><a target="_blank" href="http://www.nsfocus.net/vulndb/26098">26098</a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>CNNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-201402-399
">CNNVD-201402-399
                                                </a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNCVE编号</th>
                                            <td>CNCVE-20134286</td>
                                        </tr>


                                        <tr class="even">
                                            <th>CVSS评分</th>
                                            <td>5.8</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnvd.org.cn/flaw/show/CNVD-2014-01278">CNVD-2014-01278</a></td>
                                        </tr>


                                    </table>
                                </td>
                            </tr>
                            <tr class="even vuln_middle" style="cursor:pointer;" onclick="no_toggle('4_1_10','table_4_1_10')">
                                <td>10</td>
                                <td>
                                    <img id="4_1_10" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_middle.gif'></img>
                                    <span style='color:#AF6100'>Apache Tomcat 安全漏洞（CVE-2017-5647）</span>
                                    <!--<span class="level_danger_high">Apache Tomcat 安全漏洞（CVE-2017-5647）</span></td>-->
                                </td>
                                <td>9/103</td>
                                <td>9%</td>
                                <td>23</td>
                            </tr>
                            <tr class="more hide even" id="table_4_1_10">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/124.127.243.233.html" target="_blank">124.127.243.233</a>;&nbsp<a
                                                    href="host/124.74.244.135.html" target="_blank">124.74.244.135</a>;&nbsp<a
                                                    href="host/124.74.244.172.html" target="_blank">124.74.244.172</a>;&nbsp<a
                                                    href="host/124.74.244.175.html" target="_blank">124.74.244.175</a>;&nbsp

                                                <a href="host/220.248.39.135.html" target="_blank">220.248.39.135</a>;&nbsp<a
                                                    href="host/220.248.39.172.html" target="_blank">220.248.39.172</a>;&nbsp<a
                                                    href="host/220.248.39.175.html" target="_blank">220.248.39.175</a>;&nbsp<a
                                                    href="host/58.247.108.66.html" target="_blank">58.247.108.66</a>;&nbsp

                                                <a href="host/61.129.105.66.html" target="_blank">61.129.105.66</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>Apache
                                                Tomcat是美国阿帕奇（Apache）软件基金会下属的Jakarta项目的一款轻量级Web应用服务器，它主要用于开发和调试JSP程序，适用于中小型系统。

                                                Apache
                                                Tomcat中的pipelined请求的处理过程存在安全漏洞。攻击者可利用该漏洞读取其他请求的数据。以下版本受到影响：Apache
                                                Tomcat
                                                9.0.0.M1版本至9.0.0.M18版本，8.5.0版本至8.5.12版本，8.0.0.RC1版本至8.0.42版本，7.0.0版本至7.0.76版本，6.0.0版本至6.0.52版本。</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>厂商补丁：

                                                Apache Group
                                                ------------
                                                目前厂商已经发布了升级补丁以修复这个安全问题，请到厂商的主页下载：


                                                [1] http://tomcat.apache.org/security-9.html
                                                [2] http://tomcat.apache.org/security-8.html
                                                [3] http://tomcat.apache.org/security-7.html
                                                [4] http://tomcat.apache.org/security-6.html
                                            </td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>5.0</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>2017-04-17</td>
                                        </tr>

                                        <tr class="odd">
                                            <th>CVE编号</th>
                                            <td><a target="_blank" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5647">CVE-2017-5647</a></a></td>
                                        </tr>




                                        <tr class="even">
                                            <th>CNNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-201704-862">CNNVD-201704-862</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNCVE编号</th>
                                            <td>CNCVE-20175647 </td>
                                        </tr>


                                        <tr class="even">
                                            <th>CVSS评分</th>
                                            <td>5.0</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnvd.org.cn/flaw/show/CNVD-2017-05037">CNVD-2017-05037</a></td>
                                        </tr>


                                    </table>
                                </td>
                            </tr>
                            <tr class="odd vuln_middle" style="cursor:pointer;" onclick="no_toggle('4_1_11','table_4_1_11')">
                                <td>11</td>
                                <td>
                                    <img id="4_1_11" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_middle.gif'></img>
                                    <span style='color:#AF6100'>Apache Tomcat拒绝服务漏洞(CVE-2012-2733)</span>
                                    <!--<span class="level_danger_high">Apache Tomcat拒绝服务漏洞(CVE-2012-2733)</span></td>-->
                                </td>
                                <td>9/103</td>
                                <td>9%</td>
                                <td>23</td>
                            </tr>
                            <tr class="more hide odd" id="table_4_1_11">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/124.127.243.233.html" target="_blank">124.127.243.233</a>;&nbsp<a
                                                    href="host/124.74.244.135.html" target="_blank">124.74.244.135</a>;&nbsp<a
                                                    href="host/124.74.244.172.html" target="_blank">124.74.244.172</a>;&nbsp<a
                                                    href="host/124.74.244.175.html" target="_blank">124.74.244.175</a>;&nbsp

                                                <a href="host/220.248.39.135.html" target="_blank">220.248.39.135</a>;&nbsp<a
                                                    href="host/220.248.39.172.html" target="_blank">220.248.39.172</a>;&nbsp<a
                                                    href="host/220.248.39.175.html" target="_blank">220.248.39.175</a>;&nbsp<a
                                                    href="host/58.247.108.66.html" target="_blank">58.247.108.66</a>;&nbsp

                                                <a href="host/61.129.105.66.html" target="_blank">61.129.105.66</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>Apache Tomcat是一个流行的开放源码的JSP应用服务器程序。

                                                Apache Tomcat
                                                7.0.0-7.0.27、6.0.0-6.0.35存在拒绝服务漏洞，在解析请求标头时，&#34;parseHeaders()&#34;函数(InternalNioInputBuffer.java)
                                                没有正确验证允许的大小，可被利用触发OutOfMemoryError意外，DIGEST身份验证机制没有正确检查服务器nonces，攻击者可利用此漏洞造成拒绝服务。

                                                &lt;*来源：Josh Spiewak

                                                链接：http://secunia.com/advisories/51138/
                                                http://www.apache.org/dist/httpd/Announcement2.2.html
                                                *&gt;
                                            </td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>厂商补丁：

                                                Apache Group
                                                ------------
                                                请更新到5.5.36、6.0.36、7.0.30

                                                Announcement2.2：Apache HTTP Server 2.2.23 Released

                                                链接：http://www.apache.org/dist/httpd/Announcement2.2.html
                                            </td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>5.0</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>2012-11-16</td>
                                        </tr>

                                        <tr class="odd">
                                            <th>CVE编号</th>
                                            <td><a target="_blank" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2733">CVE-2012-2733</a></a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>BUGTRAQ</th>
                                            <td><a target="_blank" href="http://www.securityfocus.com/bid/56402">56402</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>NSFOCUS</th>
                                            <td><a target="_blank" href="http://www.nsfocus.net/vulndb/21392">21392</a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>CNNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-201211-126">CNNVD-201211-126</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNCVE编号</th>
                                            <td>CNCVE-20122733</td>
                                        </tr>


                                        <tr class="even">
                                            <th>CVSS评分</th>
                                            <td>5.0</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnvd.org.cn/flaw/show/CNVD-2012-6358">CNVD-2012-6358</a></td>
                                        </tr>


                                    </table>
                                </td>
                            </tr>
                            <tr class="even vuln_middle" style="cursor:pointer;" onclick="no_toggle('4_1_12','table_4_1_12')">
                                <td>12</td>
                                <td>
                                    <img id="4_1_12" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_middle.gif'></img>
                                    <span style='color:#AF6100'>Apache Tomcat replay-countermeasure功能安全漏洞</span>
                                    <!--<span class="level_danger_high">Apache Tomcat replay-countermeasure功能安全漏洞</span></td>-->
                                </td>
                                <td>9/103</td>
                                <td>9%</td>
                                <td>23</td>
                            </tr>
                            <tr class="more hide even" id="table_4_1_12">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/124.127.243.233.html" target="_blank">124.127.243.233</a>;&nbsp<a
                                                    href="host/124.74.244.135.html" target="_blank">124.74.244.135</a>;&nbsp<a
                                                    href="host/124.74.244.172.html" target="_blank">124.74.244.172</a>;&nbsp<a
                                                    href="host/124.74.244.175.html" target="_blank">124.74.244.175</a>;&nbsp

                                                <a href="host/220.248.39.135.html" target="_blank">220.248.39.135</a>;&nbsp<a
                                                    href="host/220.248.39.172.html" target="_blank">220.248.39.172</a>;&nbsp<a
                                                    href="host/220.248.39.175.html" target="_blank">220.248.39.175</a>;&nbsp<a
                                                    href="host/58.247.108.66.html" target="_blank">58.247.108.66</a>;&nbsp

                                                <a href="host/61.129.105.66.html" target="_blank">61.129.105.66</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>Apache Tomcat是一款由Apache Foundation维护的免费开放源代码的Java Servlet和JSP服务程序。
                                                Apache Tomcat 5.5.36之前的5.5.x版本、6.0.36之前的6.x版本、7.0.30之前的7.x版本中的HTTP
                                                Digest Access
                                                Authentication实现中的replay-countermeasure功能中存在漏洞，该漏洞源于程序追踪cnonce(又名客户端随机数)值而不是追踪nonce(又名服务器端随机数)和nc(又名随机数计数)值。远程攻击者利用该漏洞通过在网络中嗅探有效的请求，绕过预期的访问限制。</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>目前厂商已经发布了升级补丁以修复此安全问题，补丁获取链接：
                                                http://tomcat.apache.org/security-6.html
                                                http://tomcat.apache.org/security-5.html
                                                http://tomcat.apache.org/security-7.html</td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>5.0</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>2012-11-17</td>
                                        </tr>

                                        <tr class="odd">
                                            <th>CVE编号</th>
                                            <td><a target="_blank" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5885">CVE-2012-5885</a></a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>BUGTRAQ</th>
                                            <td><a target="_blank" href="http://www.securityfocus.com/bid/56403">56403</a></td>
                                        </tr>



                                        <tr class="odd">
                                            <th>CNNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-201211-313">CNNVD-201211-313</a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>CNCVE编号</th>
                                            <td>CNCVE-20125885</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CVSS评分</th>
                                            <td>5.0</td>
                                        </tr>


                                        <tr class="even">
                                            <th>CNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnvd.org.cn/flaw/show/CNVD-2012-6585">CNVD-2012-6585</a></td>
                                        </tr>


                                    </table>
                                </td>
                            </tr>
                            <tr class="odd vuln_middle" style="cursor:pointer;" onclick="no_toggle('4_1_13','table_4_1_13')">
                                <td>13</td>
                                <td>
                                    <img id="4_1_13" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_middle.gif'></img>
                                    <span style='color:#AF6100'>Apache Tomcat HTTP Digest Access Authentication
                                        安全绕过漏洞(CVE-2012-5886)</span>
                                    <!--<span class="level_danger_high">Apache Tomcat HTTP Digest Access Authentication 安全绕过漏洞(CVE-2012-5886)</span></td>-->
                                </td>
                                <td>9/103</td>
                                <td>9%</td>
                                <td>23</td>
                            </tr>
                            <tr class="more hide odd" id="table_4_1_13">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/124.127.243.233.html" target="_blank">124.127.243.233</a>;&nbsp<a
                                                    href="host/124.74.244.135.html" target="_blank">124.74.244.135</a>;&nbsp<a
                                                    href="host/124.74.244.172.html" target="_blank">124.74.244.172</a>;&nbsp<a
                                                    href="host/124.74.244.175.html" target="_blank">124.74.244.175</a>;&nbsp

                                                <a href="host/220.248.39.135.html" target="_blank">220.248.39.135</a>;&nbsp<a
                                                    href="host/220.248.39.172.html" target="_blank">220.248.39.172</a>;&nbsp<a
                                                    href="host/220.248.39.175.html" target="_blank">220.248.39.175</a>;&nbsp<a
                                                    href="host/58.247.108.66.html" target="_blank">58.247.108.66</a>;&nbsp

                                                <a href="host/61.129.105.66.html" target="_blank">61.129.105.66</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>Apache Tomcat是一款由Apache Foundation维护的免费开放源代码的Java Servlet和JSP服务程序。
                                                Apache Tomcat 5.5.36之前的5.5.x版本、6.0.36之前的6.x版本、7.0.30之前的7.x版本中的HTTP
                                                Digest Access
                                                Authentication实现中存在漏洞，该漏洞源于在会话状态中缓存相关身份验证用户的信息。远程攻击者利用该漏洞通过与会话ID相关的向量绕过身份验证。</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>目前厂商已经发布了升级补丁以修复此安全问题，补丁获取链接：
                                                http://tomcat.apache.org/security-6.html
                                                http://tomcat.apache.org/security-5.html
                                                http://tomcat.apache.org/security-7.html</td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>5.0</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>2012-11-17</td>
                                        </tr>

                                        <tr class="odd">
                                            <th>CVE编号</th>
                                            <td><a target="_blank" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5886">CVE-2012-5886</a></a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>BUGTRAQ</th>
                                            <td><a target="_blank" href="http://www.securityfocus.com/bid/56403">56403</a></td>
                                        </tr>



                                        <tr class="odd">
                                            <th>CNNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-201211-314">CNNVD-201211-314</a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>CNCVE编号</th>
                                            <td>CNCVE-20125886</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CVSS评分</th>
                                            <td>5.0</td>
                                        </tr>


                                        <tr class="even">
                                            <th>CNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnvd.org.cn/flaw/show/CNVD-2012-6587">CNVD-2012-6587</a></td>
                                        </tr>


                                    </table>
                                </td>
                            </tr>
                            <tr class="even vuln_middle" style="cursor:pointer;" onclick="no_toggle('4_1_14','table_4_1_14')">
                                <td>14</td>
                                <td>
                                    <img id="4_1_14" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_middle.gif'></img>
                                    <span style='color:#AF6100'>Apache Tomcat HTTP Digest Access
                                        Authentication实现安全漏洞(CVE-2012-5887)</span>
                                    <!--<span class="level_danger_high">Apache Tomcat HTTP Digest Access Authentication实现安全漏洞(CVE-2012-5887)</span></td>-->
                                </td>
                                <td>9/103</td>
                                <td>9%</td>
                                <td>23</td>
                            </tr>
                            <tr class="more hide even" id="table_4_1_14">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/124.127.243.233.html" target="_blank">124.127.243.233</a>;&nbsp<a
                                                    href="host/124.74.244.135.html" target="_blank">124.74.244.135</a>;&nbsp<a
                                                    href="host/124.74.244.172.html" target="_blank">124.74.244.172</a>;&nbsp<a
                                                    href="host/124.74.244.175.html" target="_blank">124.74.244.175</a>;&nbsp

                                                <a href="host/220.248.39.135.html" target="_blank">220.248.39.135</a>;&nbsp<a
                                                    href="host/220.248.39.172.html" target="_blank">220.248.39.172</a>;&nbsp<a
                                                    href="host/220.248.39.175.html" target="_blank">220.248.39.175</a>;&nbsp<a
                                                    href="host/58.247.108.66.html" target="_blank">58.247.108.66</a>;&nbsp

                                                <a href="host/61.129.105.66.html" target="_blank">61.129.105.66</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>Apache Tomcat是一款由Apache Foundation维护的免费开放源代码的Java Servlet和JSP服务程序。
                                                Apache Tomcat 5.5.36之前的5.5.x版本、6.0.36之前的6.x版本、7.0.30之前的7.x版本中的HTTP
                                                Digest Access
                                                Authentication实现中存在漏洞，该漏洞源于程序在连带执行凭证检查的同时未对过期的随机数值进行正确的检查。通过在网络中嗅探有效的请求，远程攻击者可利用该漏洞绕过预期的访问限制。</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>厂商补丁：
                                                apache
                                                ---------
                                                目前 apache 已经发布 tomcat 最新版本, 请到厂商的官方页面下载最新版本:
                                                链接：http://tomcat.apache.org/</td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>5.0</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>2012-11-17</td>
                                        </tr>

                                        <tr class="odd">
                                            <th>CVE编号</th>
                                            <td><a target="_blank" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5887">CVE-2012-5887</a></a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>BUGTRAQ</th>
                                            <td><a target="_blank" href="http://www.securityfocus.com/bid/56403">56403</a></td>
                                        </tr>



                                        <tr class="odd">
                                            <th>CNNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-201211-315">CNNVD-201211-315</a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>CNCVE编号</th>
                                            <td>CNCVE-20125887</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CVSS评分</th>
                                            <td>5.0</td>
                                        </tr>


                                        <tr class="even">
                                            <th>CNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnvd.org.cn/flaw/show/CNVD-2012-6589">CNVD-2012-6589</a></td>
                                        </tr>


                                    </table>
                                </td>
                            </tr>
                            <tr class="odd vuln_middle" style="cursor:pointer;" onclick="no_toggle('4_1_15','table_4_1_15')">
                                <td>15</td>
                                <td>
                                    <img id="4_1_15" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_middle.gif'></img>
                                    <span style='color:#AF6100'>Apache Tomcat 块请求远程拒绝服务漏洞（CVE-2014-0075）</span>
                                    <!--<span class="level_danger_high">Apache Tomcat 块请求远程拒绝服务漏洞（CVE-2014-0075）</span></td>-->
                                </td>
                                <td>9/103</td>
                                <td>9%</td>
                                <td>23</td>
                            </tr>
                            <tr class="more hide odd" id="table_4_1_15">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/124.127.243.233.html" target="_blank">124.127.243.233</a>;&nbsp<a
                                                    href="host/124.74.244.135.html" target="_blank">124.74.244.135</a>;&nbsp<a
                                                    href="host/124.74.244.172.html" target="_blank">124.74.244.172</a>;&nbsp<a
                                                    href="host/124.74.244.175.html" target="_blank">124.74.244.175</a>;&nbsp

                                                <a href="host/220.248.39.135.html" target="_blank">220.248.39.135</a>;&nbsp<a
                                                    href="host/220.248.39.172.html" target="_blank">220.248.39.172</a>;&nbsp<a
                                                    href="host/220.248.39.175.html" target="_blank">220.248.39.175</a>;&nbsp<a
                                                    href="host/58.247.108.66.html" target="_blank">58.247.108.66</a>;&nbsp

                                                <a href="host/61.129.105.66.html" target="_blank">61.129.105.66</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>Apache Tomcat是一个流行的开源JSP应用服务器程序。

                                                Apache Tomcat 8.0.0-RC1-8.0.3、7.0.0 - 7.0.52、6.0.0 -
                                                6.0.39版本对畸形块尺寸的请求存在安全漏洞，这可使大量的数据发送到服务器，绕过对请求的各种尺寸限制，导致拒绝服务。


                                                &lt;*来源：Tomcat users mailing list

                                                链接：http://secunia.com/advisories/57879/
                                                *&gt;</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>厂商补丁：

                                                Apache Group
                                                ------------
                                                目前厂商已经发布了升级补丁以修复这个安全问题，请到厂商的主页下载：


                                                [1] http://tomcat.apache.org/security-8.html
                                                [2] http://tomcat.apache.org/security-7.html
                                                [3] http://tomcat.apache.org/security-6.html
                                            </td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>5.0</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>2014-05-31</td>
                                        </tr>

                                        <tr class="odd">
                                            <th>CVE编号</th>
                                            <td><a target="_blank" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0075">CVE-2014-0075</a></a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>BUGTRAQ</th>
                                            <td><a target="_blank" href="http://www.securityfocus.com/bid/67671">67671</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>NSFOCUS</th>
                                            <td><a target="_blank" href="http://www.nsfocus.net/vulndb/26883">26883</a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>CNNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-201405-585
">CNNVD-201405-585
                                                </a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNCVE编号</th>
                                            <td>CNCVE-20140075</td>
                                        </tr>


                                        <tr class="even">
                                            <th>CVSS评分</th>
                                            <td>5.0</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnvd.org.cn/flaw/show/CNVD-2014-03378">CNVD-2014-03378</a></td>
                                        </tr>


                                    </table>
                                </td>
                            </tr>
                            <tr class="even vuln_middle" style="cursor:pointer;" onclick="no_toggle('4_1_16','table_4_1_16')">
                                <td>16</td>
                                <td>
                                    <img id="4_1_16" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_middle.gif'></img>
                                    <span style='color:#AF6100'>Apache Tomcat Slowloris工具拒绝服务漏洞</span>
                                    <!--<span class="level_danger_high">Apache Tomcat Slowloris工具拒绝服务漏洞</span></td>-->
                                </td>
                                <td>9/103</td>
                                <td>9%</td>
                                <td>23</td>
                            </tr>
                            <tr class="more hide even" id="table_4_1_16">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/124.127.243.233.html" target="_blank">124.127.243.233</a>;&nbsp<a
                                                    href="host/124.74.244.135.html" target="_blank">124.74.244.135</a>;&nbsp<a
                                                    href="host/124.74.244.172.html" target="_blank">124.74.244.172</a>;&nbsp<a
                                                    href="host/124.74.244.175.html" target="_blank">124.74.244.175</a>;&nbsp

                                                <a href="host/220.248.39.135.html" target="_blank">220.248.39.135</a>;&nbsp<a
                                                    href="host/220.248.39.172.html" target="_blank">220.248.39.172</a>;&nbsp<a
                                                    href="host/220.248.39.175.html" target="_blank">220.248.39.175</a>;&nbsp<a
                                                    href="host/58.247.108.66.html" target="_blank">58.247.108.66</a>;&nbsp

                                                <a href="host/61.129.105.66.html" target="_blank">61.129.105.66</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>Apache Tomcat是一个流行的开放源码的JSP应用服务器程序。Slowloris是低带宽拒绝服务攻击工具。

                                                Apache Tomcat在实现上存在安全漏洞，远程攻击者可利用Slowloris工具造成拒绝服务攻击。

                                                &lt;*来源：David Jorm

                                                链接：https://bugzilla.redhat.com/show_bug.cgi?id=880011
                                                *&gt;

                                            </td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>厂商补丁：
                                                apache
                                                ---------
                                                目前 apache 已经发布 tomcat 最新版本, 请到厂商的官方页面下载最新版本:
                                                链接：http://tomcat.apache.org/</td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>5.0</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>2012-11-30</td>
                                        </tr>

                                        <tr class="odd">
                                            <th>CVE编号</th>
                                            <td><a target="_blank" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5568">CVE-2012-5568</a></a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>BUGTRAQ</th>
                                            <td><a target="_blank" href="http://www.securityfocus.com/bid/56686">56686</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>NSFOCUS</th>
                                            <td><a target="_blank" href="http://www.nsfocus.net/vulndb/21624">21624</a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>CNNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-201211-538">CNNVD-201211-538</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNCVE编号</th>
                                            <td>CNCVE-20125568</td>
                                        </tr>


                                        <tr class="even">
                                            <th>CVSS评分</th>
                                            <td>5.0</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnvd.org.cn/flaw/show/CNVD-2012-7725">CNVD-2012-7725</a></td>
                                        </tr>


                                    </table>
                                </td>
                            </tr>
                            <tr class="odd vuln_middle" style="cursor:pointer;" onclick="no_toggle('4_1_17','table_4_1_17')">
                                <td>17</td>
                                <td>
                                    <img id="4_1_17" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_middle.gif'></img>
                                    <span style='color:#AF6100'>Apache Tomcat Security Manager绕过漏洞(CVE-2014-7810)</span>
                                    <!--<span class="level_danger_high">Apache Tomcat Security Manager绕过漏洞(CVE-2014-7810)</span></td>-->
                                </td>
                                <td>9/103</td>
                                <td>9%</td>
                                <td>23</td>
                            </tr>
                            <tr class="more hide odd" id="table_4_1_17">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/124.127.243.233.html" target="_blank">124.127.243.233</a>;&nbsp<a
                                                    href="host/124.74.244.135.html" target="_blank">124.74.244.135</a>;&nbsp<a
                                                    href="host/124.74.244.172.html" target="_blank">124.74.244.172</a>;&nbsp<a
                                                    href="host/124.74.244.175.html" target="_blank">124.74.244.175</a>;&nbsp

                                                <a href="host/220.248.39.135.html" target="_blank">220.248.39.135</a>;&nbsp<a
                                                    href="host/220.248.39.172.html" target="_blank">220.248.39.172</a>;&nbsp<a
                                                    href="host/220.248.39.175.html" target="_blank">220.248.39.175</a>;&nbsp<a
                                                    href="host/58.247.108.66.html" target="_blank">58.247.108.66</a>;&nbsp

                                                <a href="host/61.129.105.66.html" target="_blank">61.129.105.66</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>Apache Tomcat是一个流行的开源JSP应用服务器程序。

                                                Apache Tomcat
                                                8.0.0-RC1至8.0.15、7.0.0至7.0.57、6.0.0至6.0.43版本，在特权代码区评估表达式的实现上存在安全限制绕过漏洞，攻击者利用此漏洞可绕过Security
                                                Manager保护机制。

                                                &lt;*来源：Apache Tomcat security team
                                                *&gt;</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>厂商补丁：

                                                Apache Group
                                                ------------
                                                目前厂商已经发布了升级补丁以修复这个安全问题，请到厂商的主页下载：


                                                [1] http://tomcat.apache.org/security-8.html
                                                [2] http://tomcat.apache.org/security-7.html
                                                [3] http://tomcat.apache.org/security-6.html

                                            </td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>5.0</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>2015-06-07</td>
                                        </tr>

                                        <tr class="odd">
                                            <th>CVE编号</th>
                                            <td><a target="_blank" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7810">CVE-2014-7810</a></a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>BUGTRAQ</th>
                                            <td><a target="_blank" href="http://www.securityfocus.com/bid/74665">74665</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>NSFOCUS</th>
                                            <td><a target="_blank" href="http://www.nsfocus.net/vulndb/29948">29948</a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>CNNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-201505-273">CNNVD-201505-273</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNCVE编号</th>
                                            <td>CNCVE-20147810</td>
                                        </tr>


                                        <tr class="even">
                                            <th>CVSS评分</th>
                                            <td>5.0</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnvd.org.cn/flaw/show/CNVD-2015-03233
">CNVD-2015-03233
                                                </a></td>
                                        </tr>


                                    </table>
                                </td>
                            </tr>
                            <tr class="even vuln_middle" style="cursor:pointer;" onclick="no_toggle('4_1_18','table_4_1_18')">
                                <td>18</td>
                                <td>
                                    <img id="4_1_18" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_middle.gif'></img>
                                    <span style='color:#AF6100'>Apache Tomcat 拒绝服务漏洞(CVE-2012-3544)</span>
                                    <!--<span class="level_danger_high">Apache Tomcat 拒绝服务漏洞(CVE-2012-3544)</span></td>-->
                                </td>
                                <td>9/103</td>
                                <td>9%</td>
                                <td>23</td>
                            </tr>
                            <tr class="more hide even" id="table_4_1_18">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/124.127.243.233.html" target="_blank">124.127.243.233</a>;&nbsp<a
                                                    href="host/124.74.244.135.html" target="_blank">124.74.244.135</a>;&nbsp<a
                                                    href="host/124.74.244.172.html" target="_blank">124.74.244.172</a>;&nbsp<a
                                                    href="host/124.74.244.175.html" target="_blank">124.74.244.175</a>;&nbsp

                                                <a href="host/220.248.39.135.html" target="_blank">220.248.39.135</a>;&nbsp<a
                                                    href="host/220.248.39.172.html" target="_blank">220.248.39.172</a>;&nbsp<a
                                                    href="host/220.248.39.175.html" target="_blank">220.248.39.175</a>;&nbsp<a
                                                    href="host/58.247.108.66.html" target="_blank">58.247.108.66</a>;&nbsp

                                                <a href="host/61.129.105.66.html" target="_blank">61.129.105.66</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>Apache Tomcat是一个流行的开放源码的JSP应用服务器程序。

                                                Tomcat 7.0.0-7.0.29、Tomcat
                                                6.0.0-6.0.36用“分块传输编码”处理提交的请求时，忽略了请求所含扩展的大小。客户端通过向服务器发送大量的数据，利用此漏洞可造成拒绝服务。</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>厂商补丁:
                                                Apache Group
                                                ------------
                                                目前厂商已经发布了升级补丁以修复这个安全问题，请到厂商的主页下载。Tomcat 7.0.x用户请升级到 7.0.30或更高版本；Tomcat
                                                6.0.x用户请升级到6.0.37或更高版本；

                                                http://jakarta.apache.org/tomcat/index.html

                                                http://tomcat.apache.org/security-7.html
                                                http://tomcat.apache.org/security-6.html

                                            </td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>5.0</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>2013-06-01</td>
                                        </tr>

                                        <tr class="odd">
                                            <th>CVE编号</th>
                                            <td><a target="_blank" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3544">CVE-2012-3544</a></a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>BUGTRAQ</th>
                                            <td><a target="_blank" href="http://www.securityfocus.com/bid/59797">59797</a>,<a
                                                    target="_blank" href="http://www.securityfocus.com/bid/64758">64758</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>NSFOCUS</th>
                                            <td><a target="_blank" href="http://www.nsfocus.net/vulndb/23658">23658</a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>CNNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-201305-226">CNNVD-201305-226</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNCVE编号</th>
                                            <td>CNCVE-20123544</td>
                                        </tr>


                                        <tr class="even">
                                            <th>CVSS评分</th>
                                            <td>5.0</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnvd.org.cn/flaw/show/CNVD-2013-05377">CNVD-2013-05377</a></td>
                                        </tr>


                                    </table>
                                </td>
                            </tr>
                            <tr class="odd vuln_middle" style="cursor:pointer;" onclick="no_toggle('4_1_19','table_4_1_19')">
                                <td>19</td>
                                <td>
                                    <img id="4_1_19" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_middle.gif'></img>
                                    <span style='color:#AF6100'>Apache Tomcat Mapper组件安全漏洞(CVE-2015-5345)</span>
                                    <!--<span class="level_danger_high">Apache Tomcat Mapper组件安全漏洞(CVE-2015-5345)</span></td>-->
                                </td>
                                <td>9/103</td>
                                <td>9%</td>
                                <td>23</td>
                            </tr>
                            <tr class="more hide odd" id="table_4_1_19">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/124.127.243.233.html" target="_blank">124.127.243.233</a>;&nbsp<a
                                                    href="host/124.74.244.135.html" target="_blank">124.74.244.135</a>;&nbsp<a
                                                    href="host/124.74.244.172.html" target="_blank">124.74.244.172</a>;&nbsp<a
                                                    href="host/124.74.244.175.html" target="_blank">124.74.244.175</a>;&nbsp

                                                <a href="host/220.248.39.135.html" target="_blank">220.248.39.135</a>;&nbsp<a
                                                    href="host/220.248.39.172.html" target="_blank">220.248.39.172</a>;&nbsp<a
                                                    href="host/220.248.39.175.html" target="_blank">220.248.39.175</a>;&nbsp<a
                                                    href="host/58.247.108.66.html" target="_blank">58.247.108.66</a>;&nbsp

                                                <a href="host/61.129.105.66.html" target="_blank">61.129.105.66</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>Apache
                                                Tomcat是美国阿帕奇（Apache）软件基金会下属的Jakarta项目的一款轻量级Web应用服务器，它主要用于开发和调试JSP程序，适用于中小型系统。Mapper是其中的一个封装了请求资源URI与每个相对应的处理wrapper容器的映射关系的组件。
                                                Apache
                                                Tomcat的Mapper组件中存在安全漏洞，该漏洞源于程序实现重定向前没有处理安全约束和过滤器。远程攻击者可借助缺少&#39;/&#39;字符结尾的URL利用该漏洞确定目录的存在。以下版本受到影响：Apache
                                                Tomcat 6.0.45之前6.x版本，7.0.67之前7.x版本，8.0.30之前8.x版本，9.0.0.M2之前9.x版本。</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>厂商补丁:
                                                目前厂商已经发布了升级补丁以修复此安全问题，补丁获取链接：
                                                http://tomcat.apache.org/security-6.html</td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>5.0</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>2016-02-24</td>
                                        </tr>

                                        <tr class="odd">
                                            <th>CVE编号</th>
                                            <td><a target="_blank" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5345">CVE-2015-5345</a></a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>BUGTRAQ</th>
                                            <td><a target="_blank" href="http://www.securityfocus.com/bid/83328">83328</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>NSFOCUS</th>
                                            <td><a target="_blank" href="http://www.nsfocus.net/vulndb/32550">32550</a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>CNNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-201602-397">CNNVD-201602-397</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNCVE编号</th>
                                            <td>CNCVE-20155345</td>
                                        </tr>


                                        <tr class="even">
                                            <th>CVSS评分</th>
                                            <td>5.0</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnvd.org.cn/flaw/show/CNVD-2016-01380
">CNVD-2016-01380
                                                </a></td>
                                        </tr>


                                    </table>
                                </td>
                            </tr>
                            <tr class="even vuln_middle" style="cursor:pointer;" onclick="no_toggle('4_1_20','table_4_1_20')">
                                <td>20</td>
                                <td>
                                    <img id="4_1_20" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_middle.gif'></img>
                                    <span style='color:#AF6100'>Apache Tomcat信息泄露漏洞(CVE-2016-8745)</span>
                                    <!--<span class="level_danger_high">Apache Tomcat信息泄露漏洞(CVE-2016-8745)</span></td>-->
                                </td>
                                <td>9/103</td>
                                <td>9%</td>
                                <td>23</td>
                            </tr>
                            <tr class="more hide even" id="table_4_1_20">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/124.127.243.233.html" target="_blank">124.127.243.233</a>;&nbsp<a
                                                    href="host/124.74.244.135.html" target="_blank">124.74.244.135</a>;&nbsp<a
                                                    href="host/124.74.244.172.html" target="_blank">124.74.244.172</a>;&nbsp<a
                                                    href="host/124.74.244.175.html" target="_blank">124.74.244.175</a>;&nbsp

                                                <a href="host/220.248.39.135.html" target="_blank">220.248.39.135</a>;&nbsp<a
                                                    href="host/220.248.39.172.html" target="_blank">220.248.39.172</a>;&nbsp<a
                                                    href="host/220.248.39.175.html" target="_blank">220.248.39.175</a>;&nbsp<a
                                                    href="host/58.247.108.66.html" target="_blank">58.247.108.66</a>;&nbsp

                                                <a href="host/61.129.105.66.html" target="_blank">61.129.105.66</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>Apache Tomcat是一个流行的开源JSP应用服务器程序。

                                                Apache Tomcat
                                                6.0.16至6.0.48,7.0.0至7.0.73,8.0.0.RC1至8.0.39,8.5.0至8.5.8,9.0.0.M1至9.0.0.M13版本实现上存在信息泄露漏洞，攻击者利用此漏洞可获取敏感信息。

                                            </td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>厂商补丁:
                                                Apache Group
                                                ------------
                                                目前厂商已经发布了升级补丁以修复这个安全问题，请到厂商的主页下载：

                                                https://tomcat.apache.org/security-6.html
                                                https://tomcat.apache.org/security-7.html
                                                https://tomcat.apache.org/security-8.html
                                                https://tomcat.apache.org/security-9.html

                                                http://svn.apache.org/viewvc?view=rev&amp;rev=1771853

                                            </td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>5.0</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>2017-08-10</td>
                                        </tr>

                                        <tr class="odd">
                                            <th>CVE编号</th>
                                            <td><a target="_blank" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8745">CVE-2016-8745</a></a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>BUGTRAQ</th>
                                            <td><a target="_blank" href="http://www.securityfocus.com/bid/94828">94828</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>NSFOCUS</th>
                                            <td><a target="_blank" href="http://www.nsfocus.net/vulndb/35561">35561</a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>CNNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-201612-330">CNNVD-201612-330</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNCVE编号</th>
                                            <td>CNCVE-20168745</td>
                                        </tr>


                                        <tr class="even">
                                            <th>CVSS评分</th>
                                            <td>5.0</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnvd.org.cn/flaw/show/CNVD-2016-12570">CNVD-2016-12570</a></td>
                                        </tr>


                                    </table>
                                </td>
                            </tr>
                            <tr class="odd vuln_middle" style="cursor:pointer;" onclick="no_toggle('4_1_21','table_4_1_21')">
                                <td>21</td>
                                <td>
                                    <img id="4_1_21" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_middle.gif'></img>
                                    <span style='color:#AF6100'>Apache Tomcat Security Manager 安全限制绕过漏洞(CVE-2016-6796)</span>
                                    <!--<span class="level_danger_high">Apache Tomcat Security Manager 安全限制绕过漏洞(CVE-2016-6796)</span></td>-->
                                </td>
                                <td>9/103</td>
                                <td>9%</td>
                                <td>23</td>
                            </tr>
                            <tr class="more hide odd" id="table_4_1_21">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/124.127.243.233.html" target="_blank">124.127.243.233</a>;&nbsp<a
                                                    href="host/124.74.244.135.html" target="_blank">124.74.244.135</a>;&nbsp<a
                                                    href="host/124.74.244.172.html" target="_blank">124.74.244.172</a>;&nbsp<a
                                                    href="host/124.74.244.175.html" target="_blank">124.74.244.175</a>;&nbsp

                                                <a href="host/220.248.39.135.html" target="_blank">220.248.39.135</a>;&nbsp<a
                                                    href="host/220.248.39.172.html" target="_blank">220.248.39.172</a>;&nbsp<a
                                                    href="host/220.248.39.175.html" target="_blank">220.248.39.175</a>;&nbsp<a
                                                    href="host/58.247.108.66.html" target="_blank">58.247.108.66</a>;&nbsp

                                                <a href="host/61.129.105.66.html" target="_blank">61.129.105.66</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>Apache Tomcat是一个流行的开源JSP应用服务器程序。

                                                Apache Tomcat 在实现上存在安全限制绕过漏洞。攻击者利用此漏洞可绕过某些安全限制，执行未授权操作。</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>厂商补丁:
                                                Apache Group
                                                ------------
                                                目前厂商已经发布了升级补丁以修复这个安全问题，请到厂商的主页下载：
                                                https://tomcat.apache.org/security-6.html
                                                https://tomcat.apache.org/security-7.html
                                                https://tomcat.apache.org/security-8.html
                                                https://tomcat.apache.org/security-9.html

                                                http://svn.apache.org/viewvc?view=revision&amp;revision=1758495

                                            </td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>5.0</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>2017-08-10</td>
                                        </tr>

                                        <tr class="odd">
                                            <th>CVE编号</th>
                                            <td><a target="_blank" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6796">CVE-2016-6796</a></a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>BUGTRAQ</th>
                                            <td><a target="_blank" href="http://www.securityfocus.com/bid/93944">93944</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>NSFOCUS</th>
                                            <td><a target="_blank" href="http://www.nsfocus.net/vulndb/35261">35261</a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>CNNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-201610-827">CNNVD-201610-827</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNCVE编号</th>
                                            <td>CNCVE-20166796</td>
                                        </tr>


                                        <tr class="even">
                                            <th>CVSS评分</th>
                                            <td>5.0</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnvd.org.cn/flaw/show/CNVD-2016-10423
">CNVD-2016-10423
                                                </a></td>
                                        </tr>


                                    </table>
                                </td>
                            </tr>
                            <tr class="even vuln_middle" style="cursor:pointer;" onclick="no_toggle('4_1_22','table_4_1_22')">
                                <td>22</td>
                                <td>
                                    <img id="4_1_22" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_middle.gif'></img>
                                    <span style='color:#AF6100'>Apache Tomcat 安全限制绕过漏洞(CVE-2016-6794)</span>
                                    <!--<span class="level_danger_high">Apache Tomcat 安全限制绕过漏洞(CVE-2016-6794)</span></td>-->
                                </td>
                                <td>9/103</td>
                                <td>9%</td>
                                <td>23</td>
                            </tr>
                            <tr class="more hide even" id="table_4_1_22">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/124.127.243.233.html" target="_blank">124.127.243.233</a>;&nbsp<a
                                                    href="host/124.74.244.135.html" target="_blank">124.74.244.135</a>;&nbsp<a
                                                    href="host/124.74.244.172.html" target="_blank">124.74.244.172</a>;&nbsp<a
                                                    href="host/124.74.244.175.html" target="_blank">124.74.244.175</a>;&nbsp

                                                <a href="host/220.248.39.135.html" target="_blank">220.248.39.135</a>;&nbsp<a
                                                    href="host/220.248.39.172.html" target="_blank">220.248.39.172</a>;&nbsp<a
                                                    href="host/220.248.39.175.html" target="_blank">220.248.39.175</a>;&nbsp<a
                                                    href="host/58.247.108.66.html" target="_blank">58.247.108.66</a>;&nbsp

                                                <a href="host/61.129.105.66.html" target="_blank">61.129.105.66</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>Apache Tomcat是一个流行的开源JSP应用服务器程序。

                                                Apache Tomcat 在实现上存在安全限制绕过漏洞。攻击者利用此漏洞可绕过某些安全限制，执行未授权操作。</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>厂商补丁:
                                                Apache Group
                                                ------------
                                                目前厂商已经发布了升级补丁以修复这个安全问题，请到厂商的主页下载：

                                                https://tomcat.apache.org/security-6.html
                                                https://tomcat.apache.org/security-7.html
                                                https://tomcat.apache.org/security-8.html
                                                https://tomcat.apache.org/security-9.html

                                                http://svn.apache.org/viewvc?view=rev&amp;rev=1754728

                                            </td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>5.0</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>2017-08-10</td>
                                        </tr>

                                        <tr class="odd">
                                            <th>CVE编号</th>
                                            <td><a target="_blank" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6794">CVE-2016-6794</a></a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>BUGTRAQ</th>
                                            <td><a target="_blank" href="http://www.securityfocus.com/bid/93943">93943</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>NSFOCUS</th>
                                            <td><a target="_blank" href="http://www.nsfocus.net/vulndb/35260">35260</a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>CNNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-201610-827">CNNVD-201610-827</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNCVE编号</th>
                                            <td>CNCVE-20166794</td>
                                        </tr>


                                        <tr class="even">
                                            <th>CVSS评分</th>
                                            <td>5.0</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnvd.org.cn/flaw/show/CNVD-2016-10422
">CNVD-2016-10422
                                                </a></td>
                                        </tr>


                                    </table>
                                </td>
                            </tr>
                            <tr class="odd vuln_middle" style="cursor:pointer;" onclick="no_toggle('4_1_23','table_4_1_23')">
                                <td>23</td>
                                <td>
                                    <img id="4_1_23" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_middle.gif'></img>
                                    <span style='color:#AF6100'>Apache Tomcat Security Manager 安全限制绕过漏洞(CVE-2016-5018)</span>
                                    <!--<span class="level_danger_high">Apache Tomcat Security Manager 安全限制绕过漏洞(CVE-2016-5018)</span></td>-->
                                </td>
                                <td>9/103</td>
                                <td>9%</td>
                                <td>23</td>
                            </tr>
                            <tr class="more hide odd" id="table_4_1_23">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/124.127.243.233.html" target="_blank">124.127.243.233</a>;&nbsp<a
                                                    href="host/124.74.244.135.html" target="_blank">124.74.244.135</a>;&nbsp<a
                                                    href="host/124.74.244.172.html" target="_blank">124.74.244.172</a>;&nbsp<a
                                                    href="host/124.74.244.175.html" target="_blank">124.74.244.175</a>;&nbsp

                                                <a href="host/220.248.39.135.html" target="_blank">220.248.39.135</a>;&nbsp<a
                                                    href="host/220.248.39.172.html" target="_blank">220.248.39.172</a>;&nbsp<a
                                                    href="host/220.248.39.175.html" target="_blank">220.248.39.175</a>;&nbsp<a
                                                    href="host/58.247.108.66.html" target="_blank">58.247.108.66</a>;&nbsp

                                                <a href="host/61.129.105.66.html" target="_blank">61.129.105.66</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>Apache Tomcat是一个流行的开源JSP应用服务器程序。

                                                Apache Tomcat 在实现上存在安全限制绕过漏洞。攻击者利用此漏洞可绕过某些安全限制，执行未授权操作。</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>厂商补丁:
                                                Apache Group
                                                ------------
                                                目前厂商已经发布了升级补丁以修复这个安全问题，请到厂商的主页下载：

                                                https://tomcat.apache.org/security-6.html
                                                https://tomcat.apache.org/security-7.html
                                                https://tomcat.apache.org/security-8.html
                                                https://tomcat.apache.org/security-9.html

                                                http://svn.apache.org/viewvc?view=rev&amp;rev=1754902

                                            </td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>5.0</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>2017-08-10</td>
                                        </tr>

                                        <tr class="odd">
                                            <th>CVE编号</th>
                                            <td><a target="_blank" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5018">CVE-2016-5018</a></a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>BUGTRAQ</th>
                                            <td><a target="_blank" href="http://www.securityfocus.com/bid/93942">93942</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>NSFOCUS</th>
                                            <td><a target="_blank" href="http://www.nsfocus.net/vulndb/35259">35259</a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>CNNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-201610-827">CNNVD-201610-827</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNCVE编号</th>
                                            <td>CNCVE-20165018</td>
                                        </tr>


                                        <tr class="even">
                                            <th>CVSS评分</th>
                                            <td>5.0</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnvd.org.cn/flaw/show/CNVD-2016-10421
">CNVD-2016-10421
                                                </a></td>
                                        </tr>


                                    </table>
                                </td>
                            </tr>
                            <tr class="even vuln_middle" style="cursor:pointer;" onclick="no_toggle('4_1_24','table_4_1_24')">
                                <td>24</td>
                                <td>
                                    <img id="4_1_24" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_middle.gif'></img>
                                    <span style='color:#AF6100'>Apache Tomcat 安全限制绕过漏洞(CVE-2016-6797)</span>
                                    <!--<span class="level_danger_high">Apache Tomcat 安全限制绕过漏洞(CVE-2016-6797)</span></td>-->
                                </td>
                                <td>9/103</td>
                                <td>9%</td>
                                <td>23</td>
                            </tr>
                            <tr class="more hide even" id="table_4_1_24">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/124.127.243.233.html" target="_blank">124.127.243.233</a>;&nbsp<a
                                                    href="host/124.74.244.135.html" target="_blank">124.74.244.135</a>;&nbsp<a
                                                    href="host/124.74.244.172.html" target="_blank">124.74.244.172</a>;&nbsp<a
                                                    href="host/124.74.244.175.html" target="_blank">124.74.244.175</a>;&nbsp

                                                <a href="host/220.248.39.135.html" target="_blank">220.248.39.135</a>;&nbsp<a
                                                    href="host/220.248.39.172.html" target="_blank">220.248.39.172</a>;&nbsp<a
                                                    href="host/220.248.39.175.html" target="_blank">220.248.39.175</a>;&nbsp<a
                                                    href="host/58.247.108.66.html" target="_blank">58.247.108.66</a>;&nbsp

                                                <a href="host/61.129.105.66.html" target="_blank">61.129.105.66</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>Apache Tomcat是一个流行的开源JSP应用服务器程序。

                                                Apache Tomcat 在实现上存在安全限制绕过漏洞。攻击者利用此漏洞可绕过某些安全限制，执行未授权操作。</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>厂商补丁:
                                                Apache Group
                                                ------------
                                                目前厂商已经发布了升级补丁以修复这个安全问题，请到厂商的主页下载：

                                                https://tomcat.apache.org/security-6.html
                                                https://tomcat.apache.org/security-7.html
                                                https://tomcat.apache.org/security-8.html
                                                https://tomcat.apache.org/security-9.html

                                                http://svn.apache.org/viewvc?view=revision&amp;revision=1757275

                                            </td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>5.0</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>2017-08-10</td>
                                        </tr>

                                        <tr class="odd">
                                            <th>CVE编号</th>
                                            <td><a target="_blank" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6797">CVE-2016-6797</a></a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>BUGTRAQ</th>
                                            <td><a target="_blank" href="http://www.securityfocus.com/bid/93940">93940</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>NSFOCUS</th>
                                            <td><a target="_blank" href="http://www.nsfocus.net/vulndb/35257">35257</a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>CNNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-201610-827">CNNVD-201610-827</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNCVE编号</th>
                                            <td>CNCVE-20166797</td>
                                        </tr>


                                        <tr class="even">
                                            <th>CVSS评分</th>
                                            <td>5.0</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnvd.org.cn/flaw/show/CNVD-2016-10419
">CNVD-2016-10419
                                                </a></td>
                                        </tr>


                                    </table>
                                </td>
                            </tr>
                            <tr class="odd vuln_middle" style="cursor:pointer;" onclick="no_toggle('4_1_25','table_4_1_25')">
                                <td>25</td>
                                <td>
                                    <img id="4_1_25" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_middle.gif'></img>
                                    <span style='color:#AF6100'>Apache Tomcat 跨站请求伪造漏洞</span>
                                    <!--<span class="level_danger_high">Apache Tomcat 跨站请求伪造漏洞</span></td>-->
                                </td>
                                <td>9/103</td>
                                <td>9%</td>
                                <td>23</td>
                            </tr>
                            <tr class="more hide odd" id="table_4_1_25">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/124.127.243.233.html" target="_blank">124.127.243.233</a>;&nbsp<a
                                                    href="host/124.74.244.135.html" target="_blank">124.74.244.135</a>;&nbsp<a
                                                    href="host/124.74.244.172.html" target="_blank">124.74.244.172</a>;&nbsp<a
                                                    href="host/124.74.244.175.html" target="_blank">124.74.244.175</a>;&nbsp

                                                <a href="host/220.248.39.135.html" target="_blank">220.248.39.135</a>;&nbsp<a
                                                    href="host/220.248.39.172.html" target="_blank">220.248.39.172</a>;&nbsp<a
                                                    href="host/220.248.39.175.html" target="_blank">220.248.39.175</a>;&nbsp<a
                                                    href="host/58.247.108.66.html" target="_blank">58.247.108.66</a>;&nbsp

                                                <a href="host/61.129.105.66.html" target="_blank">61.129.105.66</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>Apache Tomcat是一个流行的开放源码的JSP应用服务器程序。

                                                Tomcat
                                                v7.0.31、6.0.35之前版本在实现上存在跨站请求伪造漏洞，远程攻击者可利用此漏洞当前用户权限执行某些操作，访问受影响应用程序。

                                                &lt;*来源：Tomcat Security Team

                                                链接：http://www.securitytracker.com/id/1027834
                                                *&gt;</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>厂商补丁：

                                                Apache Group
                                                ------------
                                                目前厂商已经发布了升级补丁以修复这个安全问题，请到厂商的主页下载更高版本。

                                                参考链接：
                                                http://tomcat.apache.org/security.html
                                                http://tomcat.apache.org/security-7.html
                                                http://tomcat.apache.org/security-6.html</td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>4.3</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>2012-12-19</td>
                                        </tr>

                                        <tr class="odd">
                                            <th>CVE编号</th>
                                            <td><a target="_blank" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4431">CVE-2012-4431</a></a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>BUGTRAQ</th>
                                            <td><a target="_blank" href="http://www.securityfocus.com/bid/56814">56814</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>NSFOCUS</th>
                                            <td><a target="_blank" href="http://www.nsfocus.net/vulndb/21697">21697</a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>CNNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-201212-054">CNNVD-201212-054</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNCVE编号</th>
                                            <td>CNCVE-20124431</td>
                                        </tr>


                                        <tr class="even">
                                            <th>CVSS评分</th>
                                            <td>4.3</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnvd.org.cn/flaw/show/CNVD-2012-7281">CNVD-2012-7281</a></td>
                                        </tr>


                                    </table>
                                </td>
                            </tr>
                            <tr class="even vuln_middle" style="cursor:pointer;" onclick="no_toggle('4_1_26','table_4_1_26')">
                                <td>26</td>
                                <td>
                                    <img id="4_1_26" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_middle.gif'></img>
                                    <span style='color:#AF6100'>Apache Tomcat FORM身份验证安全绕过漏洞</span>
                                    <!--<span class="level_danger_high">Apache Tomcat FORM身份验证安全绕过漏洞</span></td>-->
                                </td>
                                <td>9/103</td>
                                <td>9%</td>
                                <td>23</td>
                            </tr>
                            <tr class="more hide even" id="table_4_1_26">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/124.127.243.233.html" target="_blank">124.127.243.233</a>;&nbsp<a
                                                    href="host/124.74.244.135.html" target="_blank">124.74.244.135</a>;&nbsp<a
                                                    href="host/124.74.244.172.html" target="_blank">124.74.244.172</a>;&nbsp<a
                                                    href="host/124.74.244.175.html" target="_blank">124.74.244.175</a>;&nbsp

                                                <a href="host/220.248.39.135.html" target="_blank">220.248.39.135</a>;&nbsp<a
                                                    href="host/220.248.39.172.html" target="_blank">220.248.39.172</a>;&nbsp<a
                                                    href="host/220.248.39.175.html" target="_blank">220.248.39.175</a>;&nbsp<a
                                                    href="host/58.247.108.66.html" target="_blank">58.247.108.66</a>;&nbsp

                                                <a href="host/61.129.105.66.html" target="_blank">61.129.105.66</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>Apache Tomcat是一个流行的开放源码的JSP应用服务器程序。

                                                Tomcat
                                                v7.0.30、6.0.36之前版本在FORM身份验证的实现上存在安全漏洞。在使用FORM验证时，若其他组件（如Single-Sign-On）在调用FormAuthenticator#authenticate()之前调用了request.setUserPrincipal()，则攻击者可以通过在URL结尾添加&#34;/j_security_check&#34;以绕过FORM验证，

                                                &lt;*来源：Tomcat Security Team

                                                链接：http://seclists.org/fulldisclosure/2012/Dec/73
                                                *&gt;

                                            </td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>厂商补丁：

                                                Apache Group
                                                ------------
                                                目前厂商已经发布了升级补丁以修复这个安全问题，请到厂商的主页下载7.0.30和6.0.36或更高版本。

                                                参考链接：
                                                http://tomcat.apache.org/security.html
                                                http://tomcat.apache.org/security-7.html
                                                http://tomcat.apache.org/security-6.html
                                            </td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>4.3</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>2012-12-19</td>
                                        </tr>

                                        <tr class="odd">
                                            <th>CVE编号</th>
                                            <td><a target="_blank" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3546">CVE-2012-3546</a></a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>BUGTRAQ</th>
                                            <td><a target="_blank" href="http://www.securityfocus.com/bid/56812">56812</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>NSFOCUS</th>
                                            <td><a target="_blank" href="http://www.nsfocus.net/vulndb/21694">21694</a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>CNNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-201212-056">CNNVD-201212-056</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNCVE编号</th>
                                            <td>CNCVE-20123546</td>
                                        </tr>


                                        <tr class="even">
                                            <th>CVSS评分</th>
                                            <td>4.3</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnvd.org.cn/flaw/show/CNVD-2012-7673">CNVD-2012-7673</a></td>
                                        </tr>


                                    </table>
                                </td>
                            </tr>
                            <tr class="odd vuln_middle" style="cursor:pointer;" onclick="no_toggle('4_1_27','table_4_1_27')">
                                <td>27</td>
                                <td>
                                    <img id="4_1_27" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_middle.gif'></img>
                                    <span style='color:#AF6100'>Apache Tomcat 输入验证漏洞(CVE-2013-4322)</span>
                                    <!--<span class="level_danger_high">Apache Tomcat 输入验证漏洞(CVE-2013-4322)</span></td>-->
                                </td>
                                <td>9/103</td>
                                <td>9%</td>
                                <td>23</td>
                            </tr>
                            <tr class="more hide odd" id="table_4_1_27">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/124.127.243.233.html" target="_blank">124.127.243.233</a>;&nbsp<a
                                                    href="host/124.74.244.135.html" target="_blank">124.74.244.135</a>;&nbsp<a
                                                    href="host/124.74.244.172.html" target="_blank">124.74.244.172</a>;&nbsp<a
                                                    href="host/124.74.244.175.html" target="_blank">124.74.244.175</a>;&nbsp

                                                <a href="host/220.248.39.135.html" target="_blank">220.248.39.135</a>;&nbsp<a
                                                    href="host/220.248.39.172.html" target="_blank">220.248.39.172</a>;&nbsp<a
                                                    href="host/220.248.39.175.html" target="_blank">220.248.39.175</a>;&nbsp<a
                                                    href="host/58.247.108.66.html" target="_blank">58.247.108.66</a>;&nbsp

                                                <a href="host/61.129.105.66.html" target="_blank">61.129.105.66</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>Tomcat是美国阿帕奇（Apache）软件基金会下属的Jakarta项目的一款轻量级Web应用服务器，它主要用于开发和调试JSP程序，适用于中小型系统。
                                                Apache
                                                Tomcat中存在输入验证漏洞。当处理分块传输编码时，远程攻击者可借助大量的分块数据或使用畸形的HTTP头利用该漏洞造成拒绝服务。以下版本受到影响：Apache
                                                Tomcat 6.0.37及之前的版本，7.0.47之前的7.x版本，8.0.0-RC3之前的8.x版本。</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>厂商补丁：
                                                apache
                                                ---------
                                                目前 apache 已经发布 tomcat 最新版本, 请到厂商的官方页面下载最新版本:
                                                链接：http://tomcat.apache.org/</td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>4.3</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>2014-02-26</td>
                                        </tr>

                                        <tr class="odd">
                                            <th>CVE编号</th>
                                            <td><a target="_blank" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4322">CVE-2013-4322</a></a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>BUGTRAQ</th>
                                            <td><a target="_blank" href="http://www.securityfocus.com/bid/65767">65767</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>NSFOCUS</th>
                                            <td><a target="_blank" href="http://www.nsfocus.net/vulndb/26100">26100</a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>CNNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-201402-400
">CNNVD-201402-400
                                                </a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNCVE编号</th>
                                            <td>CNCVE-20134322</td>
                                        </tr>


                                        <tr class="even">
                                            <th>CVSS评分</th>
                                            <td>4.3</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnvd.org.cn/flaw/show/CNVD-2014-01343">CNVD-2014-01343</a></td>
                                        </tr>


                                    </table>
                                </td>
                            </tr>
                            <tr class="even vuln_middle" style="cursor:pointer;" onclick="no_toggle('4_1_28','table_4_1_28')">
                                <td>28</td>
                                <td>
                                    <img id="4_1_28" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_middle.gif'></img>
                                    <span style='color:#AF6100'>Apache Tomcat 权限许可和访问控制漏洞(CVE-2014-0119)</span>
                                    <!--<span class="level_danger_high">Apache Tomcat 权限许可和访问控制漏洞(CVE-2014-0119)</span></td>-->
                                </td>
                                <td>9/103</td>
                                <td>9%</td>
                                <td>23</td>
                            </tr>
                            <tr class="more hide even" id="table_4_1_28">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/124.127.243.233.html" target="_blank">124.127.243.233</a>;&nbsp<a
                                                    href="host/124.74.244.135.html" target="_blank">124.74.244.135</a>;&nbsp<a
                                                    href="host/124.74.244.172.html" target="_blank">124.74.244.172</a>;&nbsp<a
                                                    href="host/124.74.244.175.html" target="_blank">124.74.244.175</a>;&nbsp

                                                <a href="host/220.248.39.135.html" target="_blank">220.248.39.135</a>;&nbsp<a
                                                    href="host/220.248.39.172.html" target="_blank">220.248.39.172</a>;&nbsp<a
                                                    href="host/220.248.39.175.html" target="_blank">220.248.39.175</a>;&nbsp<a
                                                    href="host/58.247.108.66.html" target="_blank">58.247.108.66</a>;&nbsp

                                                <a href="host/61.129.105.66.html" target="_blank">61.129.105.66</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>Apache
                                                Tomcat是美国阿帕奇（Apache）软件基金会下属的Jakarta项目的一款轻量级Web应用服务器，它主要用于开发和调试JSP程序，适用于中小型系统。
                                                Apache
                                                Tomcat中存在安全漏洞，该漏洞源于程序没有正确限制类加载器访问使用XSLT样式表的XML解析器。远程攻击者可借助特制的Web应用程序利用该漏洞读取任意文件，或读取不同Web应用程序相关的文件。以下版本受到影响：Apache
                                                Tomcat 6.0.39及之前的版本，7.0.54之前的7.x版本，8.0.6之前的8.x版本。</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>目前厂商已经发布了升级补丁以修复此安全问题，补丁获取链接：
                                                http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.54</td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>4.3</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>2014-05-31</td>
                                        </tr>

                                        <tr class="odd">
                                            <th>CVE编号</th>
                                            <td><a target="_blank" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0119">CVE-2014-0119</a></a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>BUGTRAQ</th>
                                            <td><a target="_blank" href="http://www.securityfocus.com/bid/67669">67669</a></td>
                                        </tr>



                                        <tr class="odd">
                                            <th>CNNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-201405-589
">CNNVD-201405-589
                                                </a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>CNCVE编号</th>
                                            <td>CNCVE-20140119</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CVSS评分</th>
                                            <td>4.3</td>
                                        </tr>


                                        <tr class="even">
                                            <th>CNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnvd.org.cn/flaw/show/CNVD-2014-03375">CNVD-2014-03375</a></td>
                                        </tr>


                                    </table>
                                </td>
                            </tr>
                            <tr class="odd vuln_middle" style="cursor:pointer;" onclick="no_toggle('4_1_29','table_4_1_29')">
                                <td>29</td>
                                <td>
                                    <img id="4_1_29" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_middle.gif'></img>
                                    <span style='color:#AF6100'>Apache Tomcat 权限许可和访问控制漏洞(CVE-2014-0096)</span>
                                    <!--<span class="level_danger_high">Apache Tomcat 权限许可和访问控制漏洞(CVE-2014-0096)</span></td>-->
                                </td>
                                <td>9/103</td>
                                <td>9%</td>
                                <td>23</td>
                            </tr>
                            <tr class="more hide odd" id="table_4_1_29">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/124.127.243.233.html" target="_blank">124.127.243.233</a>;&nbsp<a
                                                    href="host/124.74.244.135.html" target="_blank">124.74.244.135</a>;&nbsp<a
                                                    href="host/124.74.244.172.html" target="_blank">124.74.244.172</a>;&nbsp<a
                                                    href="host/124.74.244.175.html" target="_blank">124.74.244.175</a>;&nbsp

                                                <a href="host/220.248.39.135.html" target="_blank">220.248.39.135</a>;&nbsp<a
                                                    href="host/220.248.39.172.html" target="_blank">220.248.39.172</a>;&nbsp<a
                                                    href="host/220.248.39.175.html" target="_blank">220.248.39.175</a>;&nbsp<a
                                                    href="host/58.247.108.66.html" target="_blank">58.247.108.66</a>;&nbsp

                                                <a href="host/61.129.105.66.html" target="_blank">61.129.105.66</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>Apache
                                                Tomcat是美国阿帕奇（Apache）软件基金会下属的Jakarta项目的一款轻量级Web应用服务器，它主要用于开发和调试JSP程序，适用于中小型系统。
                                                Apache
                                                Tomcat的默认servlet中的java/org/apache/catalina/servlets/DefaultServlet.java文件存在安全漏洞，该漏洞源于程序没有正确限制XSLT样式表。远程攻击者可借助特制的应用程序利用该漏洞绕过安全限制，读取任意文件。以下版本受到影响：Apache
                                                Tomcat 6.0.39及之前的版本，7.0.53之前的7.x版本，8.0.4之前的8.x版本。</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>目前厂商已经发布了升级补丁以修复此安全问题，补丁获取链接：
                                                http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.53</td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>4.3</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>2014-05-31</td>
                                        </tr>

                                        <tr class="odd">
                                            <th>CVE编号</th>
                                            <td><a target="_blank" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0096">CVE-2014-0096</a></a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>BUGTRAQ</th>
                                            <td><a target="_blank" href="http://www.securityfocus.com/bid/67667">67667</a></td>
                                        </tr>



                                        <tr class="odd">
                                            <th>CNNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-201405-587
">CNNVD-201405-587
                                                </a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>CNCVE编号</th>
                                            <td>CNCVE-20140096</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CVSS评分</th>
                                            <td>4.3</td>
                                        </tr>


                                        <tr class="even">
                                            <th>CNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnvd.org.cn/flaw/show/CNVD-2014-03376">CNVD-2014-03376</a></td>
                                        </tr>


                                    </table>
                                </td>
                            </tr>
                            <tr class="even vuln_middle" style="cursor:pointer;" onclick="no_toggle('4_1_30','table_4_1_30')">
                                <td>30</td>
                                <td>
                                    <img id="4_1_30" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_middle.gif'></img>
                                    <span style='color:#AF6100'>Apache Tomcat 整数溢出漏洞(CVE-2014-0099)</span>
                                    <!--<span class="level_danger_high">Apache Tomcat 整数溢出漏洞(CVE-2014-0099)</span></td>-->
                                </td>
                                <td>9/103</td>
                                <td>9%</td>
                                <td>23</td>
                            </tr>
                            <tr class="more hide even" id="table_4_1_30">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/124.127.243.233.html" target="_blank">124.127.243.233</a>;&nbsp<a
                                                    href="host/124.74.244.135.html" target="_blank">124.74.244.135</a>;&nbsp<a
                                                    href="host/124.74.244.172.html" target="_blank">124.74.244.172</a>;&nbsp<a
                                                    href="host/124.74.244.175.html" target="_blank">124.74.244.175</a>;&nbsp

                                                <a href="host/220.248.39.135.html" target="_blank">220.248.39.135</a>;&nbsp<a
                                                    href="host/220.248.39.172.html" target="_blank">220.248.39.172</a>;&nbsp<a
                                                    href="host/220.248.39.175.html" target="_blank">220.248.39.175</a>;&nbsp<a
                                                    href="host/58.247.108.66.html" target="_blank">58.247.108.66</a>;&nbsp

                                                <a href="host/61.129.105.66.html" target="_blank">61.129.105.66</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>Apache
                                                Tomcat是美国阿帕奇（Apache）软件基金会下属的Jakarta项目的一款轻量级Web应用服务器，它主要用于开发和调试JSP程序，适用于中小型系统。
                                                Apache
                                                Tomcat中的java/org/apache/tomcat/util/buf/Ascii.java文件存在整数溢出漏洞。远程攻击者可借助特制的Content-Length
                                                HTTP头利用该漏洞实施HTTP请求走私攻击。以下版本受到影响：Apache Tomcat
                                                6.0.39及之前的版本，7.0.53之前的7.x版本，8.0.4之前的8.x版本。</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>目前厂商已经发布了升级补丁以修复此安全问题，补丁获取链接：
                                                http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.53</td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>4.3</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>2014-05-31</td>
                                        </tr>

                                        <tr class="odd">
                                            <th>CVE编号</th>
                                            <td><a target="_blank" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0099">CVE-2014-0099</a></a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>BUGTRAQ</th>
                                            <td><a target="_blank" href="http://www.securityfocus.com/bid/67668">67668</a></td>
                                        </tr>



                                        <tr class="odd">
                                            <th>CNNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-201405-588
">CNNVD-201405-588
                                                </a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>CNCVE编号</th>
                                            <td>CNCVE-20140099</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CVSS评分</th>
                                            <td>4.3</td>
                                        </tr>


                                        <tr class="even">
                                            <th>CNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnvd.org.cn/flaw/show/CNVD-2014-03429">CNVD-2014-03429</a></td>
                                        </tr>


                                    </table>
                                </td>
                            </tr>
                            <tr class="odd vuln_middle" style="cursor:pointer;" onclick="no_toggle('4_1_31','table_4_1_31')">
                                <td>31</td>
                                <td>
                                    <img id="4_1_31" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_middle.gif'></img>
                                    <span style='color:#AF6100'>Apache Tomcat 输入验证漏洞(CVE-2014-0033)</span>
                                    <!--<span class="level_danger_high">Apache Tomcat 输入验证漏洞(CVE-2014-0033)</span></td>-->
                                </td>
                                <td>9/103</td>
                                <td>9%</td>
                                <td>23</td>
                            </tr>
                            <tr class="more hide odd" id="table_4_1_31">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/124.127.243.233.html" target="_blank">124.127.243.233</a>;&nbsp<a
                                                    href="host/124.74.244.135.html" target="_blank">124.74.244.135</a>;&nbsp<a
                                                    href="host/124.74.244.172.html" target="_blank">124.74.244.172</a>;&nbsp<a
                                                    href="host/124.74.244.175.html" target="_blank">124.74.244.175</a>;&nbsp

                                                <a href="host/220.248.39.135.html" target="_blank">220.248.39.135</a>;&nbsp<a
                                                    href="host/220.248.39.172.html" target="_blank">220.248.39.172</a>;&nbsp<a
                                                    href="host/220.248.39.175.html" target="_blank">220.248.39.175</a>;&nbsp<a
                                                    href="host/58.247.108.66.html" target="_blank">58.247.108.66</a>;&nbsp

                                                <a href="host/61.129.105.66.html" target="_blank">61.129.105.66</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>Apache
                                                Tomcat是美国阿帕奇（Apache）软件基金会下属的Jakarta项目的一款轻量级Web应用服务器，它主要用于开发和调试JSP程序，适用于中小型系统。
                                                Apache Tomcat
                                                6.0.33至6.0.37版本中的org/apache/catalina/connector/CoyoteAdapter.java文件存在输入验证漏洞，该漏洞源于当处理URL中的会话ID时，程序设disableURLRewriting值为true。远程攻击者可借助特制的URL利用该漏洞实施会话固定攻击。</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>目前厂商已经发布了升级补丁以修复此安全问题，补丁获取链接：
                                                http://tomcat.apache.org/security-6.html</td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>4.3</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>2014-02-26</td>
                                        </tr>

                                        <tr class="odd">
                                            <th>CVE编号</th>
                                            <td><a target="_blank" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0033">CVE-2014-0033</a></a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>BUGTRAQ</th>
                                            <td><a target="_blank" href="http://www.securityfocus.com/bid/65769">65769</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>NSFOCUS</th>
                                            <td><a target="_blank" href="http://www.nsfocus.net/vulndb/26106">26106</a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>CNNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-201402-408
">CNNVD-201402-408
                                                </a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNCVE编号</th>
                                            <td>CNCVE-20140033</td>
                                        </tr>


                                        <tr class="even">
                                            <th>CVSS评分</th>
                                            <td>4.3</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnvd.org.cn/flaw/show/CNVD-2014-01280">CNVD-2014-01280</a></td>
                                        </tr>


                                    </table>
                                </td>
                            </tr>
                            <tr class="even vuln_middle" style="cursor:pointer;" onclick="no_toggle('4_1_32','table_4_1_32')">
                                <td>32</td>
                                <td>
                                    <img id="4_1_32" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_middle.gif'></img>
                                    <span style='color:#AF6100'>Apache Tomcat XML外部实体信息泄露漏洞(CVE-2013-4590)</span>
                                    <!--<span class="level_danger_high">Apache Tomcat XML外部实体信息泄露漏洞(CVE-2013-4590)</span></td>-->
                                </td>
                                <td>9/103</td>
                                <td>9%</td>
                                <td>23</td>
                            </tr>
                            <tr class="more hide even" id="table_4_1_32">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/124.127.243.233.html" target="_blank">124.127.243.233</a>;&nbsp<a
                                                    href="host/124.74.244.135.html" target="_blank">124.74.244.135</a>;&nbsp<a
                                                    href="host/124.74.244.172.html" target="_blank">124.74.244.172</a>;&nbsp<a
                                                    href="host/124.74.244.175.html" target="_blank">124.74.244.175</a>;&nbsp

                                                <a href="host/220.248.39.135.html" target="_blank">220.248.39.135</a>;&nbsp<a
                                                    href="host/220.248.39.172.html" target="_blank">220.248.39.172</a>;&nbsp<a
                                                    href="host/220.248.39.175.html" target="_blank">220.248.39.175</a>;&nbsp<a
                                                    href="host/58.247.108.66.html" target="_blank">58.247.108.66</a>;&nbsp

                                                <a href="host/61.129.105.66.html" target="_blank">61.129.105.66</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>Apache Tomcat是一个流行的开源JSP应用服务器程序。

                                                Tomcat 8.0.0-RC1 - 8.0.0-RC5、7.0.0 - 7.0.47、6.0.0 -
                                                6.0.37版本的XML(例如：web.xml, context.xml, *.tld, *.tagx,
                                                *.jspx)文件允许XXE，这可使攻击者获取Tomcat内部敏感信息。

                                                &lt;*来源：Apache Tomcat security team

                                                链接：http://www.securityfocus.com/archive/1/531252
                                                *&gt;</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>厂商补丁：

                                                Apache Group
                                                ------------
                                                目前厂商已经发布了升级补丁以修复这个安全问题，请到厂商的主页下载：

                                                http://jakarta.apache.org/tomcat/index.html

                                                [1] http://tomcat.apache.org/security-8.html
                                                [2] http://tomcat.apache.org/security-7.html
                                                [3] http://tomcat.apache.org/security-6.html</td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>4.3</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>2014-02-26</td>
                                        </tr>

                                        <tr class="odd">
                                            <th>CVE编号</th>
                                            <td><a target="_blank" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4590">CVE-2013-4590</a></a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>BUGTRAQ</th>
                                            <td><a target="_blank" href="http://www.securityfocus.com/bid/65768">65768</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>NSFOCUS</th>
                                            <td><a target="_blank" href="http://www.nsfocus.net/vulndb/26107">26107</a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>CNNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-201402-401
">CNNVD-201402-401
                                                </a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNCVE编号</th>
                                            <td>CNCVE-20134590</td>
                                        </tr>


                                        <tr class="even">
                                            <th>CVSS评分</th>
                                            <td>4.3</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnvd.org.cn/flaw/show/CNVD-2014-01279">CNVD-2014-01279</a></td>
                                        </tr>


                                    </table>
                                </td>
                            </tr>
                            <tr class="odd vuln_middle" style="cursor:pointer;" onclick="no_toggle('4_1_33','table_4_1_33')">
                                <td>33</td>
                                <td>
                                    <img id="4_1_33" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_middle.gif'></img>
                                    <span style='color:#AF6100'>SSL/TLS 服务器瞬时 Diffie-Hellman 公共密钥过弱【原理扫描】</span>
                                    <!--<span class="level_danger_high">SSL/TLS 服务器瞬时 Diffie-Hellman 公共密钥过弱【原理扫描】</span></td>-->
                                </td>
                                <td>17/103</td>
                                <td>17%</td>
                                <td>17</td>
                            </tr>
                            <tr class="more hide odd" id="table_4_1_33">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/101.230.192.1.html" target="_blank">101.230.192.1</a>;&nbsp<a
                                                    href="host/124.127.243.200.html" target="_blank">124.127.243.200</a>;&nbsp<a
                                                    href="host/124.127.243.216.html" target="_blank">124.127.243.216</a>;&nbsp<a
                                                    href="host/124.127.243.235.html" target="_blank">124.127.243.235</a>;&nbsp

                                                <a href="host/124.74.244.130.html" target="_blank">124.74.244.130</a>;&nbsp<a
                                                    href="host/124.74.244.134.html" target="_blank">124.74.244.134</a>;&nbsp<a
                                                    href="host/124.74.244.154.html" target="_blank">124.74.244.154</a>;&nbsp<a
                                                    href="host/124.74.244.176.html" target="_blank">124.74.244.176</a>;&nbsp

                                                <a href="host/140.207.162.65.html" target="_blank">140.207.162.65</a>;&nbsp<a
                                                    href="host/140.207.78.1.html" target="_blank">140.207.78.1</a>;&nbsp<a
                                                    href="host/180.166.223.193.html" target="_blank">180.166.223.193</a>;&nbsp<a
                                                    href="host/220.248.39.134.html" target="_blank">220.248.39.134</a>;&nbsp

                                                <a href="host/220.248.39.154.html" target="_blank">220.248.39.154</a>;&nbsp<a
                                                    href="host/220.248.39.176.html" target="_blank">220.248.39.176</a>;&nbsp<a
                                                    href="host/58.247.108.124.html" target="_blank">58.247.108.124</a>;&nbsp<a
                                                    href="host/61.129.105.101.html" target="_blank">61.129.105.101</a>;&nbsp

                                                <a href="host/61.129.105.124.html" target="_blank">61.129.105.124</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>安全套接层（Secure Sockets
                                                Layer，SSL），一种安全协议，是网景公司（Netscape）在推出Web浏览器首版的同时提出的，目的是为网络通信提供安全及数据完整性。SSL在传输层对网络连接进行加密。传输层安全TLS（Transport
                                                Layer Security），IETF对SSL协议标准化（RFC 2246）后的产物，与SSL 3.0差异很小。

                                                当服务器SSL/TLS的瞬时Diffie-Hellman公共密钥小于等于1024位时，存在可以恢复纯文本信息的风险。

                                                DHE man-in-the-middle protection (Logjam)
                                                --------------------------------------------------------
                                                https://www.openssl.org/blog/blog/2015/05/20/logjam-freak-upcoming-changes/
                                                https://weakdh.org/sysadmin.html
                                                https://en.wikipedia.org/wiki/DiffieE28093Hellman_key_exchange#Security</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>一. http服务器相关配置
                                                1.首先生成大于1024bit(例如2048bit)的dhkey
                                                openssl dhparam -out dhparams.pem 2048

                                                2.然后在对应服务器中配置

                                                Apache2.4.8及以后版本
                                                使用如下配置命令配置（http.conf中或者对应的虚拟主机配置文件中添加）
                                                SSLOpenSSLConfCmd DHParameters &#34;{path to dhparams.pem}&#34;

                                                Apache2.4.7版本
                                                Apache2.2.31版本及以后版本
                                                redhat debian等大多发行版中最新Apache2.2.x
                                                通过把dhparams.pem的内容直接附加到证书文件后

                                                Apache2.4.7之前2.4.x版本
                                                Apache2.2.31之前版本
                                                dhparam默认为1024bit 无法修改

                                                nginx使用如下命令配置（在对应的虚拟主机配置文件nginx.conf中server字段内添加）
                                                ssl_dhparam {path to dhparams.pem}

                                                二.如果服务器配置无法修改，例如Apache2.2.31之前版本，可以禁用DHE系列算法，采用保密性更好的ECDHE系列算法，如果ECDHE不可用可以采用普通的
                                                RSA。


                                                更多解决方案请参考:
                                                https://weakdh.org/sysadmin.html</td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>4.3</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>2015-11-26</td>
                                        </tr>






                                        <tr class="odd">
                                            <th>CVSS评分</th>
                                            <td>4.3</td>
                                        </tr>



                                    </table>
                                </td>
                            </tr>
                            <tr class="even vuln_middle" style="cursor:pointer;" onclick="no_toggle('4_1_34','table_4_1_34')">
                                <td>34</td>
                                <td>
                                    <img id="4_1_34" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_middle.gif'></img>
                                    <span style='color:#AF6100'>OpenSSL &#34;SSL-Death-Alert&#34;
                                        拒绝服务漏洞(CVE-2016-8610)【原理扫描】</span>
                                    <!--<span class="level_danger_high">OpenSSL &#34;SSL-Death-Alert&#34; 拒绝服务漏洞(CVE-2016-8610)【原理扫描】</span></td>-->
                                </td>
                                <td>1/103</td>
                                <td>1%</td>
                                <td>1</td>
                            </tr>
                            <tr class="more hide even" id="table_4_1_34">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/124.127.243.216.html" target="_blank">124.127.243.216</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>OpenSSL是一种开放源码的SSL实现，用来实现网络通信的高强度加密，现在被广泛地用于各种网络应用程序中。

                                                OpenSSL在SSL/TLS协议握手过程的实现中，允许客户端重复发送类型为SSL3_RT_ALERT级别为SSL3_AL_WARNING的内容未定义警告包，且OpenSSL在实现中遇到该未定义警告包时仍选择忽略并继续处理接下来的通信内容（如果有的话）。攻击者可以容易的利用该缺陷在一个消息中发送大量此未定义内容的警告包，使服务或进程陷入无意义的循环，从而导致服务进程占掉100的CPU使用率。

                                                &lt;*来源：openssl
                                                https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=af58be768ebb690f78530f796e92b8ae5c9a4401
                                                *&gt;</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>厂商补丁：

                                                OpenSSL Project
                                                ---------------
                                                OpenSSL Project已经为此发布了新版本修复这个漏洞。

                                                以下版本可以修复此漏洞:
                                                openssl-1.0.2分支的1.0.2i及后续版本
                                                openssl-1.1.0分支的1.1.0a及后续版本

                                                请在下列网页下载新版本：
                                                https://www.openssl.org/source/

                                                另外:
                                                openssl-1.0.1分支官方暂未提供修复版本，无法升级新分支的用户可以参考此补丁(https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=af58be768ebb690f78530f796e92b8ae5c9a4401)修改源码后重新编译

                                                nginx用户:
                                                如果您是使用动态编译ssl模块的方式,需保证nginx链接的是升级后的libssl.so
                                                如果您是使用静态编译ssl模块的方式,需重新编译nginx,--with-openssl参数指向新的openssl源码目录
                                            </td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>4.3</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>2017-11-13</td>
                                        </tr>

                                        <tr class="odd">
                                            <th>CVE编号</th>
                                            <td><a target="_blank" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8610">CVE-2016-8610</a></a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>BUGTRAQ</th>
                                            <td><a target="_blank" href="http://www.securityfocus.com/bid/93841">93841</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>NSFOCUS</th>
                                            <td><a target="_blank" href="http://www.nsfocus.net/vulndb/35283">35283</a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>CNNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-201610-726">CNNVD-201610-726</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNCVE编号</th>
                                            <td>CNCVE-20168610</td>
                                        </tr>


                                        <tr class="even">
                                            <th>CVSS评分</th>
                                            <td>5.0</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnvd.org.cn/flaw/show/CNVD-2016-09982">CNVD-2016-09982</a></td>
                                        </tr>


                                    </table>
                                </td>
                            </tr>
                            <tr class="odd vuln_middle" style="cursor:pointer;" onclick="no_toggle('4_1_35','table_4_1_35')">
                                <td>35</td>
                                <td>
                                    <img id="4_1_35" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_middle.gif'></img>
                                    <span style='color:#AF6100'>Apache Tomcat 信息泄露漏洞(CVE-2016-0762)</span>
                                    <!--<span class="level_danger_high">Apache Tomcat 信息泄露漏洞(CVE-2016-0762)</span></td>-->
                                </td>
                                <td>9/103</td>
                                <td>9%</td>
                                <td>23</td>
                            </tr>
                            <tr class="more hide odd" id="table_4_1_35">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/124.127.243.233.html" target="_blank">124.127.243.233</a>;&nbsp<a
                                                    href="host/124.74.244.135.html" target="_blank">124.74.244.135</a>;&nbsp<a
                                                    href="host/124.74.244.172.html" target="_blank">124.74.244.172</a>;&nbsp<a
                                                    href="host/124.74.244.175.html" target="_blank">124.74.244.175</a>;&nbsp

                                                <a href="host/220.248.39.135.html" target="_blank">220.248.39.135</a>;&nbsp<a
                                                    href="host/220.248.39.172.html" target="_blank">220.248.39.172</a>;&nbsp<a
                                                    href="host/220.248.39.175.html" target="_blank">220.248.39.175</a>;&nbsp<a
                                                    href="host/58.247.108.66.html" target="_blank">58.247.108.66</a>;&nbsp

                                                <a href="host/61.129.105.66.html" target="_blank">61.129.105.66</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>Apache Tomcat是一个流行的开源JSP应用服务器程序。

                                                Apache Tomcat 在实现上存在信息泄露漏洞。攻击者利用此漏洞可获取敏感信息。</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>厂商补丁:
                                                Apache Group
                                                ------------
                                                目前厂商已经发布了升级补丁以修复这个安全问题，请到厂商的主页下载：

                                                https://tomcat.apache.org/security-6.html
                                                https://tomcat.apache.org/security-7.html
                                                https://tomcat.apache.org/security-8.html
                                                https://tomcat.apache.org/security-9.html

                                                http://svn.apache.org/viewvc?view=rev&amp;rev=1758502

                                            </td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>4.3</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>2017-08-10</td>
                                        </tr>

                                        <tr class="odd">
                                            <th>CVE编号</th>
                                            <td><a target="_blank" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0762">CVE-2016-0762</a></a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>BUGTRAQ</th>
                                            <td><a target="_blank" href="http://www.securityfocus.com/bid/93939">93939</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>NSFOCUS</th>
                                            <td><a target="_blank" href="http://www.nsfocus.net/vulndb/35258">35258</a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>CNNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-201610-827">CNNVD-201610-827</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNCVE编号</th>
                                            <td>CNCVE-20160762</td>
                                        </tr>


                                        <tr class="even">
                                            <th>CVSS评分</th>
                                            <td>4.3</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnvd.org.cn/flaw/show/CNVD-2016-10420
">CNVD-2016-10420
                                                </a></td>
                                        </tr>


                                    </table>
                                </td>
                            </tr>
                            <tr class="even vuln_middle" style="cursor:pointer;" onclick="no_toggle('4_1_36','table_4_1_36')">
                                <td>36</td>
                                <td>
                                    <img id="4_1_36" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_middle.gif'></img>
                                    <span style='color:#AF6100'>Apache Tomcat 目录遍历漏洞(CVE-2015-5174)</span>
                                    <!--<span class="level_danger_high">Apache Tomcat 目录遍历漏洞(CVE-2015-5174)</span></td>-->
                                </td>
                                <td>9/103</td>
                                <td>9%</td>
                                <td>23</td>
                            </tr>
                            <tr class="more hide even" id="table_4_1_36">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/124.127.243.233.html" target="_blank">124.127.243.233</a>;&nbsp<a
                                                    href="host/124.74.244.135.html" target="_blank">124.74.244.135</a>;&nbsp<a
                                                    href="host/124.74.244.172.html" target="_blank">124.74.244.172</a>;&nbsp<a
                                                    href="host/124.74.244.175.html" target="_blank">124.74.244.175</a>;&nbsp

                                                <a href="host/220.248.39.135.html" target="_blank">220.248.39.135</a>;&nbsp<a
                                                    href="host/220.248.39.172.html" target="_blank">220.248.39.172</a>;&nbsp<a
                                                    href="host/220.248.39.175.html" target="_blank">220.248.39.175</a>;&nbsp<a
                                                    href="host/58.247.108.66.html" target="_blank">58.247.108.66</a>;&nbsp

                                                <a href="host/61.129.105.66.html" target="_blank">61.129.105.66</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>Apache
                                                Tomcat是美国阿帕奇（Apache）软件基金会下属的Jakarta项目的一款轻量级Web应用服务器，它主要用于开发和调试JSP程序，适用于中小型系统。
                                                Apache
                                                Tomcat的RequestUtil.java文件中存在目录遍历漏洞，该漏洞源于getResource、getResourceAsStream和getResourcePaths函数没有充分过滤路径名中的目录遍历字符&#39;..&#39;。远程攻击者可利用该漏洞绕过既定的SecurityManager限制，列出父目录。以下版本受到影响：Apache
                                                Tomcat 6.0.45之前6.x版本，7.0.65之前7.x版本，8.0.27之前8.x版本。</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>厂商补丁:
                                                目前厂商已经发布了升级补丁以修复此安全问题，补丁获取链接：
                                                http://tomcat.apache.org/security-6.html</td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>4.0</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>2016-02-24</td>
                                        </tr>

                                        <tr class="odd">
                                            <th>CVE编号</th>
                                            <td><a target="_blank" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5174">CVE-2015-5174</a></a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>BUGTRAQ</th>
                                            <td><a target="_blank" href="http://www.securityfocus.com/bid/83329">83329</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>NSFOCUS</th>
                                            <td><a target="_blank" href="http://www.nsfocus.net/vulndb/32552">32552</a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>CNNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-201602-443">CNNVD-201602-443</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNCVE编号</th>
                                            <td>CNCVE-20155174</td>
                                        </tr>


                                        <tr class="even">
                                            <th>CVSS评分</th>
                                            <td>4.0</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnvd.org.cn/flaw/show/CNVD-2016-01326">CNVD-2016-01326</a></td>
                                        </tr>


                                    </table>
                                </td>
                            </tr>
                            <tr class="odd vuln_middle" style="cursor:pointer;" onclick="no_toggle('4_1_37','table_4_1_37')">
                                <td>37</td>
                                <td>
                                    <img id="4_1_37" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_middle.gif'></img>
                                    <span style='color:#AF6100'>Apache Tomcat 安全漏洞(CVE-2016-0706)</span>
                                    <!--<span class="level_danger_high">Apache Tomcat 安全漏洞(CVE-2016-0706)</span></td>-->
                                </td>
                                <td>9/103</td>
                                <td>9%</td>
                                <td>23</td>
                            </tr>
                            <tr class="more hide odd" id="table_4_1_37">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/124.127.243.233.html" target="_blank">124.127.243.233</a>;&nbsp<a
                                                    href="host/124.74.244.135.html" target="_blank">124.74.244.135</a>;&nbsp<a
                                                    href="host/124.74.244.172.html" target="_blank">124.74.244.172</a>;&nbsp<a
                                                    href="host/124.74.244.175.html" target="_blank">124.74.244.175</a>;&nbsp

                                                <a href="host/220.248.39.135.html" target="_blank">220.248.39.135</a>;&nbsp<a
                                                    href="host/220.248.39.172.html" target="_blank">220.248.39.172</a>;&nbsp<a
                                                    href="host/220.248.39.175.html" target="_blank">220.248.39.175</a>;&nbsp<a
                                                    href="host/58.247.108.66.html" target="_blank">58.247.108.66</a>;&nbsp

                                                <a href="host/61.129.105.66.html" target="_blank">61.129.105.66</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>Apache
                                                Tomcat是美国阿帕奇（Apache）软件基金会下属的Jakarta项目的一款轻量级Web应用服务器，它主要用于开发和调试JSP程序，适用于中小型系统。
                                                Apache
                                                Tomcat中存在安全漏洞，该漏洞源于程序没有将org.apache.catalina.manager.StatusManagerServlet放到org/apache/catalina/core/RestrictedServlets.properties列表中。远程攻击者可借助特制的Web应用程序利用该漏洞绕过既定的SecurityManager限制，读取任意HTTP请求，发现会话ID。以下版本受到影响：Apache
                                                Tomcat 6.0.45之前6.x版本，7.0.68之前7.x版本，8.0.31之前8.x版本，9.0.0.M2之前9.x版本。</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>厂商补丁:
                                                目前厂商已经发布了升级补丁以修复此安全问题，补丁获取链接：
                                                http://tomcat.apache.org/security-6.html</td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>4.0</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>2016-02-24</td>
                                        </tr>

                                        <tr class="odd">
                                            <th>CVE编号</th>
                                            <td><a target="_blank" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0706">CVE-2016-0706</a></a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>BUGTRAQ</th>
                                            <td><a target="_blank" href="http://www.securityfocus.com/bid/83324">83324</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>NSFOCUS</th>
                                            <td><a target="_blank" href="http://www.nsfocus.net/vulndb/32542">32542</a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>CNNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-201602-447">CNNVD-201602-447</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNCVE编号</th>
                                            <td>CNCVE-20160706</td>
                                        </tr>


                                        <tr class="even">
                                            <th>CVSS评分</th>
                                            <td>4.0</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnvd.org.cn/flaw/show/CNVD-2016-01284
">CNVD-2016-01284
                                                </a></td>
                                        </tr>


                                    </table>
                                </td>
                            </tr>
                            <tr class="even vuln_low" style="cursor:pointer;" onclick="no_toggle('4_1_38','table_4_1_38')">
                                <td>38</td>
                                <td>
                                    <img id="4_1_38" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_low.gif'></img>
                                    <span style='color:#737373'>SSL/TLS协议信息泄露漏洞(CVE-2016-2183)【原理扫描】</span>
                                    <!--<span class="level_danger_high">SSL/TLS协议信息泄露漏洞(CVE-2016-2183)【原理扫描】</span></td>-->
                                </td>
                                <td>38/103</td>
                                <td>37%</td>
                                <td>40</td>
                            </tr>
                            <tr class="more hide even" id="table_4_1_38">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/101.230.192.3.html" target="_blank">101.230.192.3</a>;&nbsp<a
                                                    href="host/124.127.243.201.html" target="_blank">124.127.243.201</a>;&nbsp<a
                                                    href="host/124.127.243.231.html" target="_blank">124.127.243.231</a>;&nbsp<a
                                                    href="host/124.127.243.233.html" target="_blank">124.127.243.233</a>;&nbsp

                                                <a href="host/124.127.243.234.html" target="_blank">124.127.243.234</a>;&nbsp<a
                                                    href="host/124.74.244.131.html" target="_blank">124.74.244.131</a>;&nbsp<a
                                                    href="host/124.74.244.135.html" target="_blank">124.74.244.135</a>;&nbsp<a
                                                    href="host/124.74.244.136.html" target="_blank">124.74.244.136</a>;&nbsp

                                                <a href="host/124.74.244.145.html" target="_blank">124.74.244.145</a>;&nbsp<a
                                                    href="host/124.74.244.155.html" target="_blank">124.74.244.155</a>;&nbsp<a
                                                    href="host/124.74.244.171.html" target="_blank">124.74.244.171</a>;&nbsp<a
                                                    href="host/124.74.244.172.html" target="_blank">124.74.244.172</a>;&nbsp

                                                <a href="host/124.74.244.173.html" target="_blank">124.74.244.173</a>;&nbsp<a
                                                    href="host/124.74.244.175.html" target="_blank">124.74.244.175</a>;&nbsp<a
                                                    href="host/124.74.244.176.html" target="_blank">124.74.244.176</a>;&nbsp<a
                                                    href="host/124.74.244.177.html" target="_blank">124.74.244.177</a>;&nbsp

                                                <a href="host/140.207.162.66.html" target="_blank">140.207.162.66</a>;&nbsp<a
                                                    href="host/140.207.162.67.html" target="_blank">140.207.162.67</a>;&nbsp<a
                                                    href="host/140.207.78.2.html" target="_blank">140.207.78.2</a>;&nbsp<a
                                                    href="host/140.207.78.3.html" target="_blank">140.207.78.3</a>;&nbsp

                                                <a href="host/180.166.223.194.html" target="_blank">180.166.223.194</a>;&nbsp<a
                                                    href="host/180.166.223.195.html" target="_blank">180.166.223.195</a>;&nbsp<a
                                                    href="host/202.101.28.123.html" target="_blank">202.101.28.123</a>;&nbsp<a
                                                    href="host/220.248.39.131.html" target="_blank">220.248.39.131</a>;&nbsp

                                                <a href="host/220.248.39.135.html" target="_blank">220.248.39.135</a>;&nbsp<a
                                                    href="host/220.248.39.136.html" target="_blank">220.248.39.136</a>;&nbsp<a
                                                    href="host/220.248.39.145.html" target="_blank">220.248.39.145</a>;&nbsp<a
                                                    href="host/220.248.39.155.html" target="_blank">220.248.39.155</a>;&nbsp

                                                <a href="host/220.248.39.171.html" target="_blank">220.248.39.171</a>;&nbsp<a
                                                    href="host/220.248.39.172.html" target="_blank">220.248.39.172</a>;&nbsp<a
                                                    href="host/220.248.39.173.html" target="_blank">220.248.39.173</a>;&nbsp<a
                                                    href="host/220.248.39.175.html" target="_blank">220.248.39.175</a>;&nbsp

                                                <a href="host/220.248.39.176.html" target="_blank">220.248.39.176</a>;&nbsp<a
                                                    href="host/220.248.39.177.html" target="_blank">220.248.39.177</a>;&nbsp<a
                                                    href="host/58.246.139.123.html" target="_blank">58.246.139.123</a>;&nbsp<a
                                                    href="host/58.247.108.66.html" target="_blank">58.247.108.66</a>;&nbsp

                                                <a href="host/58.247.108.97.html" target="_blank">58.247.108.97</a>;&nbsp<a
                                                    href="host/58.247.108.99.html" target="_blank">58.247.108.99</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>TLS是安全传输层协议，用于在两个通信应用程序之间提供保密性和数据完整性。

                                                TLS, SSH, IPSec协商及其他产品中使用的DES及Triple
                                                DES密码存在大约四十亿块的生日界，这可使远程攻击者通过Sweet32攻击，获取纯文本数据。

                                                &lt;*来源：Karthik Bhargavan
                                                Gaetan Leurent

                                                链接：https://www.openssl.org/news/secadv/20160922.txt
                                                *&gt;</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>厂商补丁：

                                                OpenSSL Project
                                                ---------------
                                                OpenSSL Project已经为此发布了一个安全公告（20160922）以及相应补丁:
                                                20160922：OpenSSL Security Advisory [22 Sep 2016]
                                                链接：https://www.openssl.org/news/secadv/20160922.txt

                                                请在下列网页下载最新版本：
                                                https://www.openssl.org/source/

                                            </td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>3.0</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>2016-08-31</td>
                                        </tr>

                                        <tr class="odd">
                                            <th>CVE编号</th>
                                            <td><a target="_blank" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183">CVE-2016-2183</a></a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>BUGTRAQ</th>
                                            <td><a target="_blank" href="http://www.securityfocus.com/bid/92630">92630</a>,<a
                                                    target="_blank" href="http://www.securityfocus.com/bid/95568">95568</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>NSFOCUS</th>
                                            <td><a target="_blank" href="http://www.nsfocus.net/vulndb/34880">34880</a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>CNNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-201608-448">CNNVD-201608-448</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNCVE编号</th>
                                            <td>CNCVE-20162183</td>
                                        </tr>


                                        <tr class="even">
                                            <th>CVSS评分</th>
                                            <td>5.0</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnvd.org.cn/flaw/show/CNVD-2016-06765">CNVD-2016-06765</a></td>
                                        </tr>


                                    </table>
                                </td>
                            </tr>
                            <tr class="odd vuln_low" style="cursor:pointer;" onclick="no_toggle('4_1_39','table_4_1_39')">
                                <td>39</td>
                                <td>
                                    <img id="4_1_39" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_low.gif'></img>
                                    <span style='color:#737373'>Apache Tomcat NIO连接器拒绝服务漏洞</span>
                                    <!--<span class="level_danger_high">Apache Tomcat NIO连接器拒绝服务漏洞</span></td>-->
                                </td>
                                <td>9/103</td>
                                <td>9%</td>
                                <td>23</td>
                            </tr>
                            <tr class="more hide odd" id="table_4_1_39">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/124.127.243.233.html" target="_blank">124.127.243.233</a>;&nbsp<a
                                                    href="host/124.74.244.135.html" target="_blank">124.74.244.135</a>;&nbsp<a
                                                    href="host/124.74.244.172.html" target="_blank">124.74.244.172</a>;&nbsp<a
                                                    href="host/124.74.244.175.html" target="_blank">124.74.244.175</a>;&nbsp

                                                <a href="host/220.248.39.135.html" target="_blank">220.248.39.135</a>;&nbsp<a
                                                    href="host/220.248.39.172.html" target="_blank">220.248.39.172</a>;&nbsp<a
                                                    href="host/220.248.39.175.html" target="_blank">220.248.39.175</a>;&nbsp<a
                                                    href="host/58.247.108.66.html" target="_blank">58.247.108.66</a>;&nbsp

                                                <a href="host/61.129.105.66.html" target="_blank">61.129.105.66</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>Apache Tomcat是一个流行的开放源码的JSP应用服务器程序。

                                                Tomcat 7.0.0-7.0.27、Tomcat
                                                6.0.0-6.0.35在使用开启了sendfile和HTTPS的NIO连接器时，若客户端请求较大的静态文件，并在读取响应的过程中切断与服务器的连接，会在服务器端产生死循环，导致拒绝服务。

                                                &lt;*来源：Arun Neelicattu

                                                链接：3C50BE535A.9000600@apache.org%3E&#34;
                                                target=&#34;_blank&#34;&gt;http://mail-archives.apache.org/mod_mbox/tomcat-announce/201212.mbox/%3C50BE535A.9000600@apache.org%3E
                                                https://issues.apache.org/bugzilla/show_bug.cgi?id=52858
                                                *&gt;
                                            </td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>厂商补丁：
                                                apache
                                                ---------
                                                目前 apache 已经发布 tomcat 最新版本, 请到厂商的官方页面下载最新版本:
                                                链接：http://tomcat.apache.org/</td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>2.6</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>2012-12-19</td>
                                        </tr>

                                        <tr class="odd">
                                            <th>CVE编号</th>
                                            <td><a target="_blank" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4534">CVE-2012-4534</a></a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>BUGTRAQ</th>
                                            <td><a target="_blank" href="http://www.securityfocus.com/bid/56813">56813</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>NSFOCUS</th>
                                            <td><a target="_blank" href="http://www.nsfocus.net/vulndb/21695">21695</a></td>
                                        </tr>


                                        <tr class="even">
                                            <th>CNNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-201212-055">CNNVD-201212-055</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNCVE编号</th>
                                            <td>CNCVE-20124534</td>
                                        </tr>


                                        <tr class="even">
                                            <th>CVSS评分</th>
                                            <td>2.6</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnvd.org.cn/flaw/show/CNVD-2012-7282">CNVD-2012-7282</a></td>
                                        </tr>


                                    </table>
                                </td>
                            </tr>
                            <tr class="even vuln_low" style="cursor:pointer;" onclick="no_toggle('4_1_40','table_4_1_40')">
                                <td>40</td>
                                <td>
                                    <img id="4_1_40" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_low.gif'></img>
                                    <span style='color:#737373'>检测到远端DNS服务正在运行中</span>
                                    <!--<span class="level_danger_high">检测到远端DNS服务正在运行中</span></td>-->
                                </td>
                                <td>8/103</td>
                                <td>8%</td>
                                <td>8</td>
                            </tr>
                            <tr class="more hide even" id="table_4_1_40">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/124.127.243.226.html" target="_blank">124.127.243.226</a>;&nbsp<a
                                                    href="host/124.74.244.182.html" target="_blank">124.74.244.182</a>;&nbsp<a
                                                    href="host/124.74.244.188.html" target="_blank">124.74.244.188</a>;&nbsp<a
                                                    href="host/220.248.39.182.html" target="_blank">220.248.39.182</a>;&nbsp

                                                <a href="host/220.248.39.189.html" target="_blank">220.248.39.189</a>;&nbsp<a
                                                    href="host/58.247.108.126.html" target="_blank">58.247.108.126</a>;&nbsp<a
                                                    href="host/58.247.108.94.html" target="_blank">58.247.108.94</a>;&nbsp<a
                                                    href="host/61.129.105.94.html" target="_blank">61.129.105.94</a>;&nbsp

                                            </td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>扫描过程中检测到目标系统上正在运行DNS服务。</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>NSFOCUS建议您使用专用DNS服务，并禁用自己架设的DNS服务。</td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>1.0</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>1999-01-01</td>
                                        </tr>








                                    </table>
                                </td>
                            </tr>
                            <tr class="odd vuln_low" style="cursor:pointer;" onclick="no_toggle('4_1_41','table_4_1_41')">
                                <td>41</td>
                                <td>
                                    <img id="4_1_41" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_low.gif'></img>
                                    <span style='color:#737373'>可通过HTTP获取远端WWW服务信息</span>
                                    <!--<span class="level_danger_high">可通过HTTP获取远端WWW服务信息</span></td>-->
                                </td>
                                <td>61/103</td>
                                <td>59%</td>
                                <td>126</td>
                            </tr>
                            <tr class="more hide odd" id="table_4_1_41">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/101.230.192.1.html" target="_blank">101.230.192.1</a>;&nbsp<a
                                                    href="host/101.230.192.2.html" target="_blank">101.230.192.2</a>;&nbsp<a
                                                    href="host/101.230.192.3.html" target="_blank">101.230.192.3</a>;&nbsp<a
                                                    href="host/124.127.243.200.html" target="_blank">124.127.243.200</a>;&nbsp

                                                <a href="host/124.127.243.201.html" target="_blank">124.127.243.201</a>;&nbsp<a
                                                    href="host/124.127.243.216.html" target="_blank">124.127.243.216</a>;&nbsp<a
                                                    href="host/124.127.243.231.html" target="_blank">124.127.243.231</a>;&nbsp<a
                                                    href="host/124.127.243.233.html" target="_blank">124.127.243.233</a>;&nbsp

                                                <a href="host/124.127.243.234.html" target="_blank">124.127.243.234</a>;&nbsp<a
                                                    href="host/124.127.243.235.html" target="_blank">124.127.243.235</a>;&nbsp<a
                                                    href="host/124.74.244.130.html" target="_blank">124.74.244.130</a>;&nbsp<a
                                                    href="host/124.74.244.131.html" target="_blank">124.74.244.131</a>;&nbsp

                                                <a href="host/124.74.244.134.html" target="_blank">124.74.244.134</a>;&nbsp<a
                                                    href="host/124.74.244.135.html" target="_blank">124.74.244.135</a>;&nbsp<a
                                                    href="host/124.74.244.136.html" target="_blank">124.74.244.136</a>;&nbsp<a
                                                    href="host/124.74.244.143.html" target="_blank">124.74.244.143</a>;&nbsp

                                                <a href="host/124.74.244.145.html" target="_blank">124.74.244.145</a>;&nbsp<a
                                                    href="host/124.74.244.154.html" target="_blank">124.74.244.154</a>;&nbsp<a
                                                    href="host/124.74.244.155.html" target="_blank">124.74.244.155</a>;&nbsp<a
                                                    href="host/124.74.244.171.html" target="_blank">124.74.244.171</a>;&nbsp

                                                <a href="host/124.74.244.172.html" target="_blank">124.74.244.172</a>;&nbsp<a
                                                    href="host/124.74.244.173.html" target="_blank">124.74.244.173</a>;&nbsp<a
                                                    href="host/124.74.244.175.html" target="_blank">124.74.244.175</a>;&nbsp<a
                                                    href="host/124.74.244.176.html" target="_blank">124.74.244.176</a>;&nbsp

                                                <a href="host/124.74.244.177.html" target="_blank">124.74.244.177</a>;&nbsp<a
                                                    href="host/140.207.162.65.html" target="_blank">140.207.162.65</a>;&nbsp<a
                                                    href="host/140.207.162.66.html" target="_blank">140.207.162.66</a>;&nbsp<a
                                                    href="host/140.207.162.67.html" target="_blank">140.207.162.67</a>;&nbsp

                                                <a href="host/140.207.78.1.html" target="_blank">140.207.78.1</a>;&nbsp<a
                                                    href="host/140.207.78.2.html" target="_blank">140.207.78.2</a>;&nbsp<a
                                                    href="host/140.207.78.3.html" target="_blank">140.207.78.3</a>;&nbsp<a
                                                    href="host/180.166.223.193.html" target="_blank">180.166.223.193</a>;&nbsp

                                                <a href="host/180.166.223.194.html" target="_blank">180.166.223.194</a>;&nbsp<a
                                                    href="host/180.166.223.195.html" target="_blank">180.166.223.195</a>;&nbsp<a
                                                    href="host/202.101.28.123.html" target="_blank">202.101.28.123</a>;&nbsp<a
                                                    href="host/220.248.39.130.html" target="_blank">220.248.39.130</a>;&nbsp

                                                <a href="host/220.248.39.131.html" target="_blank">220.248.39.131</a>;&nbsp<a
                                                    href="host/220.248.39.134.html" target="_blank">220.248.39.134</a>;&nbsp<a
                                                    href="host/220.248.39.135.html" target="_blank">220.248.39.135</a>;&nbsp<a
                                                    href="host/220.248.39.136.html" target="_blank">220.248.39.136</a>;&nbsp

                                                <a href="host/220.248.39.143.html" target="_blank">220.248.39.143</a>;&nbsp<a
                                                    href="host/220.248.39.145.html" target="_blank">220.248.39.145</a>;&nbsp<a
                                                    href="host/220.248.39.154.html" target="_blank">220.248.39.154</a>;&nbsp<a
                                                    href="host/220.248.39.155.html" target="_blank">220.248.39.155</a>;&nbsp

                                                <a href="host/220.248.39.171.html" target="_blank">220.248.39.171</a>;&nbsp<a
                                                    href="host/220.248.39.172.html" target="_blank">220.248.39.172</a>;&nbsp<a
                                                    href="host/220.248.39.173.html" target="_blank">220.248.39.173</a>;&nbsp<a
                                                    href="host/220.248.39.175.html" target="_blank">220.248.39.175</a>;&nbsp

                                                <a href="host/220.248.39.176.html" target="_blank">220.248.39.176</a>;&nbsp<a
                                                    href="host/220.248.39.177.html" target="_blank">220.248.39.177</a>;&nbsp<a
                                                    href="host/58.246.139.123.html" target="_blank">58.246.139.123</a>;&nbsp<a
                                                    href="host/58.247.108.101.html" target="_blank">58.247.108.101</a>;&nbsp

                                                <a href="host/58.247.108.124.html" target="_blank">58.247.108.124</a>;&nbsp<a
                                                    href="host/58.247.108.66.html" target="_blank">58.247.108.66</a>;&nbsp<a
                                                    href="host/58.247.108.97.html" target="_blank">58.247.108.97</a>;&nbsp<a
                                                    href="host/58.247.108.99.html" target="_blank">58.247.108.99</a>;&nbsp

                                                <a href="host/61.129.105.101.html" target="_blank">61.129.105.101</a>;&nbsp<a
                                                    href="host/61.129.105.118.html" target="_blank">61.129.105.118</a>;&nbsp<a
                                                    href="host/61.129.105.124.html" target="_blank">61.129.105.124</a>;&nbsp<a
                                                    href="host/61.129.105.66.html" target="_blank">61.129.105.66</a>;&nbsp

                                                <a href="host/61.129.105.99.html" target="_blank">61.129.105.99</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>本插件检测远端HTTP Server信息。这可能使得攻击者了解远程系统类型以便进行下一步的攻击。</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>NSFOCUS建议您采取以下措施以降低威胁：

                                                * 改变您的HTTP服务器的缺省banner。</td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>1.0</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>1999-01-01</td>
                                        </tr>

                                        <tr class="odd">
                                            <th>CVE编号</th>
                                            <td><a target="_blank" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0633">CVE-1999-0633</a></a></td>
                                        </tr>





                                        <tr class="even">
                                            <th>CNCVE编号</th>
                                            <td>CNCVE-19990633</td>
                                        </tr>




                                    </table>
                                </td>
                            </tr>
                            <tr class="even vuln_low" style="cursor:pointer;" onclick="no_toggle('4_1_42','table_4_1_42')">
                                <td>42</td>
                                <td>
                                    <img id="4_1_42" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_low.gif'></img>
                                    <span style='color:#737373'>利用SMTP/VRFY命令可猜测目标主机上的用户名</span>
                                    <!--<span class="level_danger_high">利用SMTP/VRFY命令可猜测目标主机上的用户名</span></td>-->
                                </td>
                                <td>2/103</td>
                                <td>2%</td>
                                <td>2</td>
                            </tr>
                            <tr class="more hide even" id="table_4_1_42">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/202.101.28.123.html" target="_blank">202.101.28.123</a>;&nbsp<a
                                                    href="host/58.246.139.123.html" target="_blank">58.246.139.123</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>VRFY命令是SMTP协议的一部分，但可能被攻击者利用以猜测系统中存在的帐号。此次扫描初步判断目标系统支持VRFY命令，并且可被利用以猜测帐号。建议您手工执行如下命令进行确认:

                                                telnet &lt;target&gt; 25
                                                HELO nonexist
                                                VRFY root</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>请参看相应的安装配置文档，或改用其它可禁用VRFY命令的SMTP Server。
                                            </td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>1.0</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>1999-01-01</td>
                                        </tr>

                                        <tr class="odd">
                                            <th>CVE编号</th>
                                            <td><a target="_blank" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0531">CVE-1999-0531</a></a></td>
                                        </tr>





                                        <tr class="even">
                                            <th>CNCVE编号</th>
                                            <td>CNCVE-19990531</td>
                                        </tr>




                                    </table>
                                </td>
                            </tr>
                            <tr class="odd vuln_low" style="cursor:pointer;" onclick="no_toggle('4_1_43','table_4_1_43')">
                                <td>43</td>
                                <td>
                                    <img id="4_1_43" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_low.gif'></img>
                                    <span style='color:#737373'>远程WEB主机没有正确返回“404”错误页面</span>
                                    <!--<span class="level_danger_high">远程WEB主机没有正确返回“404”错误页面</span></td>-->
                                </td>
                                <td>29/103</td>
                                <td>28%</td>
                                <td>29</td>
                            </tr>
                            <tr class="more hide odd" id="table_4_1_43">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/101.230.192.2.html" target="_blank">101.230.192.2</a>;&nbsp<a
                                                    href="host/101.230.192.3.html" target="_blank">101.230.192.3</a>;&nbsp<a
                                                    href="host/124.127.243.201.html" target="_blank">124.127.243.201</a>;&nbsp<a
                                                    href="host/124.127.243.231.html" target="_blank">124.127.243.231</a>;&nbsp

                                                <a href="host/124.127.243.234.html" target="_blank">124.127.243.234</a>;&nbsp<a
                                                    href="host/124.74.244.131.html" target="_blank">124.74.244.131</a>;&nbsp<a
                                                    href="host/124.74.244.136.html" target="_blank">124.74.244.136</a>;&nbsp<a
                                                    href="host/124.74.244.145.html" target="_blank">124.74.244.145</a>;&nbsp

                                                <a href="host/124.74.244.155.html" target="_blank">124.74.244.155</a>;&nbsp<a
                                                    href="host/124.74.244.171.html" target="_blank">124.74.244.171</a>;&nbsp<a
                                                    href="host/124.74.244.173.html" target="_blank">124.74.244.173</a>;&nbsp<a
                                                    href="host/124.74.244.176.html" target="_blank">124.74.244.176</a>;&nbsp

                                                <a href="host/140.207.162.66.html" target="_blank">140.207.162.66</a>;&nbsp<a
                                                    href="host/140.207.162.67.html" target="_blank">140.207.162.67</a>;&nbsp<a
                                                    href="host/140.207.78.2.html" target="_blank">140.207.78.2</a>;&nbsp<a
                                                    href="host/140.207.78.3.html" target="_blank">140.207.78.3</a>;&nbsp

                                                <a href="host/180.166.223.194.html" target="_blank">180.166.223.194</a>;&nbsp<a
                                                    href="host/180.166.223.195.html" target="_blank">180.166.223.195</a>;&nbsp<a
                                                    href="host/220.248.39.131.html" target="_blank">220.248.39.131</a>;&nbsp<a
                                                    href="host/220.248.39.136.html" target="_blank">220.248.39.136</a>;&nbsp

                                                <a href="host/220.248.39.145.html" target="_blank">220.248.39.145</a>;&nbsp<a
                                                    href="host/220.248.39.155.html" target="_blank">220.248.39.155</a>;&nbsp<a
                                                    href="host/220.248.39.171.html" target="_blank">220.248.39.171</a>;&nbsp<a
                                                    href="host/220.248.39.173.html" target="_blank">220.248.39.173</a>;&nbsp

                                                <a href="host/220.248.39.176.html" target="_blank">220.248.39.176</a>;&nbsp<a
                                                    href="host/58.247.108.97.html" target="_blank">58.247.108.97</a>;&nbsp<a
                                                    href="host/58.247.108.99.html" target="_blank">58.247.108.99</a>;&nbsp<a
                                                    href="host/61.129.105.118.html" target="_blank">61.129.105.118</a>;&nbsp

                                                <a href="host/61.129.105.99.html" target="_blank">61.129.105.99</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>一些web server被故意配置成当请求一个不存在的文件时，不返回标准的“404 Not
                                                Found”错误页面，而是一个站点地图或是其他页面。

                                                这种配置可能导致CGI扫描的误报率增加。因此本插件将返回的错误页面作为这台主机的标准错误页面，这可以有效地减少CGI扫描的误报情况。
                                            </td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>这个漏洞仅仅是对一些页面响应的判断，可以不修复。</td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>1.0</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>2001-01-01</td>
                                        </tr>








                                    </table>
                                </td>
                            </tr>
                            <tr class="even vuln_low" style="cursor:pointer;" onclick="no_toggle('4_1_44','table_4_1_44')">
                                <td>44</td>
                                <td>
                                    <img id="4_1_44" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_low.gif'></img>
                                    <span style='color:#737373'>SMTP服务器版本信息可被获取</span>
                                    <!--<span class="level_danger_high">SMTP服务器版本信息可被获取</span></td>-->
                                </td>
                                <td>2/103</td>
                                <td>2%</td>
                                <td>2</td>
                            </tr>
                            <tr class="more hide even" id="table_4_1_44">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/202.101.28.123.html" target="_blank">202.101.28.123</a>;&nbsp<a
                                                    href="host/58.246.139.123.html" target="_blank">58.246.139.123</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>远程SMTP服务允许远程攻击者获得SMTP的具体信息，如版本号等。这可能泄漏给攻击者一些额外的信息，例如：攻击者可以根据版本号来猜测系统类型以及是否存在安全问题，以便进一步发动攻击。</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>NSFOCUS建议您采取以下措施以降低威胁：

                                                * 修改源代码或者配置文件改变缺省banner信息。</td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>1.0</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>1999-01-01</td>
                                        </tr>

                                        <tr class="odd">
                                            <th>CVE编号</th>
                                            <td><a target="_blank" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0617">CVE-1999-0617</a></a></td>
                                        </tr>





                                        <tr class="even">
                                            <th>CNCVE编号</th>
                                            <td>CNCVE-19990617</td>
                                        </tr>




                                    </table>
                                </td>
                            </tr>
                            <tr class="odd vuln_low" style="cursor:pointer;" onclick="no_toggle('4_1_45','table_4_1_45')">
                                <td>45</td>
                                <td>
                                    <img id="4_1_45" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_low.gif'></img>
                                    <span style='color:#737373'>允许Traceroute探测</span>
                                    <!--<span class="level_danger_high">允许Traceroute探测</span></td>-->
                                </td>
                                <td>8/103</td>
                                <td>8%</td>
                                <td>8</td>
                            </tr>
                            <tr class="more hide odd" id="table_4_1_45">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/220.248.39.175.html" target="_blank">220.248.39.175</a>;&nbsp<a
                                                    href="host/220.248.39.176.html" target="_blank">220.248.39.176</a>;&nbsp<a
                                                    href="host/220.248.39.177.html" target="_blank">220.248.39.177</a>;&nbsp<a
                                                    href="host/220.248.39.178.html" target="_blank">220.248.39.178</a>;&nbsp

                                                <a href="host/220.248.39.179.html" target="_blank">220.248.39.179</a>;&nbsp<a
                                                    href="host/220.248.39.181.html" target="_blank">220.248.39.181</a>;&nbsp<a
                                                    href="host/220.248.39.182.html" target="_blank">220.248.39.182</a>;&nbsp<a
                                                    href="host/220.248.39.189.html" target="_blank">220.248.39.189</a>;&nbsp

                                            </td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>本插件使用Traceroute探测来获取扫描器与远程主机之间的路由信息。攻击者也可以利用这些信息来了解目标网络的网络拓扑。</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>在防火墙中禁用Time Exceeded类型的ICMP包</td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>1.0</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>1999-01-01</td>
                                        </tr>








                                    </table>
                                </td>
                            </tr>
                            <tr class="even vuln_low" style="cursor:pointer;" onclick="no_toggle('4_1_46','table_4_1_46')">
                                <td>46</td>
                                <td>
                                    <img id="4_1_46" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_low.gif'></img>
                                    <span style='color:#737373'>ICMP timestamp请求响应漏洞</span>
                                    <!--<span class="level_danger_high">ICMP timestamp请求响应漏洞</span></td>-->
                                </td>
                                <td>1/103</td>
                                <td>1%</td>
                                <td>1</td>
                            </tr>
                            <tr class="more hide even" id="table_4_1_46">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/202.101.28.20.html" target="_blank">202.101.28.20</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>远程主机会回复ICMP_TIMESTAMP查询并返回它们系统的当前时间。

                                                这可能允许攻击者攻击一些基于时间认证的协议。</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>NSFOCUS建议您采取以下措施以降低威胁：

                                                * 在您的防火墙上过滤外来的ICMP timestamp（类型 13）报文以及外出的ICMP timestamp回复报文。</td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>1.0</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>1997-08-01</td>
                                        </tr>

                                        <tr class="odd">
                                            <th>CVE编号</th>
                                            <td><a target="_blank" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0524">CVE-1999-0524</a></a></td>
                                        </tr>




                                        <tr class="even">
                                            <th>CNNVD编号</th>
                                            <td><a target="_blank" href="http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-199708-003">CNNVD-199708-003</a></td>
                                        </tr>


                                        <tr class="odd">
                                            <th>CNCVE编号</th>
                                            <td>CNCVE-19990524</td>
                                        </tr>




                                    </table>
                                </td>
                            </tr>
                            <tr class="odd vuln_low" style="cursor:pointer;" onclick="no_toggle('4_1_47','table_4_1_47')">
                                <td>47</td>
                                <td>
                                    <img id="4_1_47" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_low.gif'></img>
                                    <span style='color:#737373'>可通过HTTPS获取远端WWW服务信息</span>
                                    <!--<span class="level_danger_high">可通过HTTPS获取远端WWW服务信息</span></td>-->
                                </td>
                                <td>55/103</td>
                                <td>53%</td>
                                <td>63</td>
                            </tr>
                            <tr class="more hide odd" id="table_4_1_47">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/101.230.192.1.html" target="_blank">101.230.192.1</a>;&nbsp<a
                                                    href="host/101.230.192.2.html" target="_blank">101.230.192.2</a>;&nbsp<a
                                                    href="host/101.230.192.3.html" target="_blank">101.230.192.3</a>;&nbsp<a
                                                    href="host/124.127.243.200.html" target="_blank">124.127.243.200</a>;&nbsp

                                                <a href="host/124.127.243.201.html" target="_blank">124.127.243.201</a>;&nbsp<a
                                                    href="host/124.127.243.216.html" target="_blank">124.127.243.216</a>;&nbsp<a
                                                    href="host/124.127.243.231.html" target="_blank">124.127.243.231</a>;&nbsp<a
                                                    href="host/124.127.243.233.html" target="_blank">124.127.243.233</a>;&nbsp

                                                <a href="host/124.127.243.234.html" target="_blank">124.127.243.234</a>;&nbsp<a
                                                    href="host/124.127.243.235.html" target="_blank">124.127.243.235</a>;&nbsp<a
                                                    href="host/124.74.244.130.html" target="_blank">124.74.244.130</a>;&nbsp<a
                                                    href="host/124.74.244.131.html" target="_blank">124.74.244.131</a>;&nbsp

                                                <a href="host/124.74.244.134.html" target="_blank">124.74.244.134</a>;&nbsp<a
                                                    href="host/124.74.244.135.html" target="_blank">124.74.244.135</a>;&nbsp<a
                                                    href="host/124.74.244.136.html" target="_blank">124.74.244.136</a>;&nbsp<a
                                                    href="host/124.74.244.145.html" target="_blank">124.74.244.145</a>;&nbsp

                                                <a href="host/124.74.244.154.html" target="_blank">124.74.244.154</a>;&nbsp<a
                                                    href="host/124.74.244.155.html" target="_blank">124.74.244.155</a>;&nbsp<a
                                                    href="host/124.74.244.171.html" target="_blank">124.74.244.171</a>;&nbsp<a
                                                    href="host/124.74.244.172.html" target="_blank">124.74.244.172</a>;&nbsp

                                                <a href="host/124.74.244.173.html" target="_blank">124.74.244.173</a>;&nbsp<a
                                                    href="host/124.74.244.175.html" target="_blank">124.74.244.175</a>;&nbsp<a
                                                    href="host/124.74.244.177.html" target="_blank">124.74.244.177</a>;&nbsp<a
                                                    href="host/140.207.162.65.html" target="_blank">140.207.162.65</a>;&nbsp

                                                <a href="host/140.207.162.66.html" target="_blank">140.207.162.66</a>;&nbsp<a
                                                    href="host/140.207.162.67.html" target="_blank">140.207.162.67</a>;&nbsp<a
                                                    href="host/140.207.78.1.html" target="_blank">140.207.78.1</a>;&nbsp<a
                                                    href="host/140.207.78.2.html" target="_blank">140.207.78.2</a>;&nbsp

                                                <a href="host/140.207.78.3.html" target="_blank">140.207.78.3</a>;&nbsp<a
                                                    href="host/180.166.223.193.html" target="_blank">180.166.223.193</a>;&nbsp<a
                                                    href="host/180.166.223.194.html" target="_blank">180.166.223.194</a>;&nbsp<a
                                                    href="host/180.166.223.195.html" target="_blank">180.166.223.195</a>;&nbsp

                                                <a href="host/202.101.28.123.html" target="_blank">202.101.28.123</a>;&nbsp<a
                                                    href="host/220.248.39.130.html" target="_blank">220.248.39.130</a>;&nbsp<a
                                                    href="host/220.248.39.131.html" target="_blank">220.248.39.131</a>;&nbsp<a
                                                    href="host/220.248.39.134.html" target="_blank">220.248.39.134</a>;&nbsp

                                                <a href="host/220.248.39.135.html" target="_blank">220.248.39.135</a>;&nbsp<a
                                                    href="host/220.248.39.136.html" target="_blank">220.248.39.136</a>;&nbsp<a
                                                    href="host/220.248.39.145.html" target="_blank">220.248.39.145</a>;&nbsp<a
                                                    href="host/220.248.39.154.html" target="_blank">220.248.39.154</a>;&nbsp

                                                <a href="host/220.248.39.155.html" target="_blank">220.248.39.155</a>;&nbsp<a
                                                    href="host/220.248.39.171.html" target="_blank">220.248.39.171</a>;&nbsp<a
                                                    href="host/220.248.39.172.html" target="_blank">220.248.39.172</a>;&nbsp<a
                                                    href="host/220.248.39.173.html" target="_blank">220.248.39.173</a>;&nbsp

                                                <a href="host/220.248.39.175.html" target="_blank">220.248.39.175</a>;&nbsp<a
                                                    href="host/220.248.39.177.html" target="_blank">220.248.39.177</a>;&nbsp<a
                                                    href="host/58.246.139.123.html" target="_blank">58.246.139.123</a>;&nbsp<a
                                                    href="host/58.247.108.101.html" target="_blank">58.247.108.101</a>;&nbsp

                                                <a href="host/58.247.108.66.html" target="_blank">58.247.108.66</a>;&nbsp<a
                                                    href="host/58.247.108.97.html" target="_blank">58.247.108.97</a>;&nbsp<a
                                                    href="host/58.247.108.99.html" target="_blank">58.247.108.99</a>;&nbsp<a
                                                    href="host/61.129.105.118.html" target="_blank">61.129.105.118</a>;&nbsp

                                                <a href="host/61.129.105.124.html" target="_blank">61.129.105.124</a>;&nbsp<a
                                                    href="host/61.129.105.66.html" target="_blank">61.129.105.66</a>;&nbsp<a
                                                    href="host/61.129.105.99.html" target="_blank">61.129.105.99</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>可通过HTTPS获取远端HTTP服务器信息。这可能使得攻击者了解远程系统类型以便进行下一步的攻击。</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>NSFOCUS建议您采取以下措施以降低威胁：

                                                * 改变您的HTTP服务器的缺省banner。</td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>1.0</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>1999-01-01</td>
                                        </tr>

                                        <tr class="odd">
                                            <th>CVE编号</th>
                                            <td><a target="_blank" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0633">CVE-1999-0633</a></a></td>
                                        </tr>





                                        <tr class="even">
                                            <th>CNCVE编号</th>
                                            <td>CNCVE-19990633</td>
                                        </tr>




                                    </table>
                                </td>
                            </tr>
                            <tr class="even vuln_low" style="cursor:pointer;" onclick="no_toggle('4_1_48','table_4_1_48')">
                                <td>48</td>
                                <td>
                                    <img id="4_1_48" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_low.gif'></img>
                                    <span style='color:#737373'>检测到目标主机加密通信支持的加密算法</span>
                                    <!--<span class="level_danger_high">检测到目标主机加密通信支持的加密算法</span></td>-->
                                </td>
                                <td>55/103</td>
                                <td>53%</td>
                                <td>57</td>
                            </tr>
                            <tr class="more hide even" id="table_4_1_48">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/101.230.192.1.html" target="_blank">101.230.192.1</a>;&nbsp<a
                                                    href="host/101.230.192.3.html" target="_blank">101.230.192.3</a>;&nbsp<a
                                                    href="host/124.127.243.200.html" target="_blank">124.127.243.200</a>;&nbsp<a
                                                    href="host/124.127.243.201.html" target="_blank">124.127.243.201</a>;&nbsp

                                                <a href="host/124.127.243.216.html" target="_blank">124.127.243.216</a>;&nbsp<a
                                                    href="host/124.127.243.231.html" target="_blank">124.127.243.231</a>;&nbsp<a
                                                    href="host/124.127.243.233.html" target="_blank">124.127.243.233</a>;&nbsp<a
                                                    href="host/124.127.243.234.html" target="_blank">124.127.243.234</a>;&nbsp

                                                <a href="host/124.127.243.235.html" target="_blank">124.127.243.235</a>;&nbsp<a
                                                    href="host/124.74.244.130.html" target="_blank">124.74.244.130</a>;&nbsp<a
                                                    href="host/124.74.244.131.html" target="_blank">124.74.244.131</a>;&nbsp<a
                                                    href="host/124.74.244.134.html" target="_blank">124.74.244.134</a>;&nbsp

                                                <a href="host/124.74.244.135.html" target="_blank">124.74.244.135</a>;&nbsp<a
                                                    href="host/124.74.244.136.html" target="_blank">124.74.244.136</a>;&nbsp<a
                                                    href="host/124.74.244.145.html" target="_blank">124.74.244.145</a>;&nbsp<a
                                                    href="host/124.74.244.154.html" target="_blank">124.74.244.154</a>;&nbsp

                                                <a href="host/124.74.244.155.html" target="_blank">124.74.244.155</a>;&nbsp<a
                                                    href="host/124.74.244.171.html" target="_blank">124.74.244.171</a>;&nbsp<a
                                                    href="host/124.74.244.172.html" target="_blank">124.74.244.172</a>;&nbsp<a
                                                    href="host/124.74.244.173.html" target="_blank">124.74.244.173</a>;&nbsp

                                                <a href="host/124.74.244.175.html" target="_blank">124.74.244.175</a>;&nbsp<a
                                                    href="host/124.74.244.176.html" target="_blank">124.74.244.176</a>;&nbsp<a
                                                    href="host/124.74.244.177.html" target="_blank">124.74.244.177</a>;&nbsp<a
                                                    href="host/140.207.162.65.html" target="_blank">140.207.162.65</a>;&nbsp

                                                <a href="host/140.207.162.66.html" target="_blank">140.207.162.66</a>;&nbsp<a
                                                    href="host/140.207.162.67.html" target="_blank">140.207.162.67</a>;&nbsp<a
                                                    href="host/140.207.78.1.html" target="_blank">140.207.78.1</a>;&nbsp<a
                                                    href="host/140.207.78.2.html" target="_blank">140.207.78.2</a>;&nbsp

                                                <a href="host/140.207.78.3.html" target="_blank">140.207.78.3</a>;&nbsp<a
                                                    href="host/180.166.223.193.html" target="_blank">180.166.223.193</a>;&nbsp<a
                                                    href="host/180.166.223.194.html" target="_blank">180.166.223.194</a>;&nbsp<a
                                                    href="host/180.166.223.195.html" target="_blank">180.166.223.195</a>;&nbsp

                                                <a href="host/202.101.28.123.html" target="_blank">202.101.28.123</a>;&nbsp<a
                                                    href="host/220.248.39.130.html" target="_blank">220.248.39.130</a>;&nbsp<a
                                                    href="host/220.248.39.131.html" target="_blank">220.248.39.131</a>;&nbsp<a
                                                    href="host/220.248.39.134.html" target="_blank">220.248.39.134</a>;&nbsp

                                                <a href="host/220.248.39.135.html" target="_blank">220.248.39.135</a>;&nbsp<a
                                                    href="host/220.248.39.136.html" target="_blank">220.248.39.136</a>;&nbsp<a
                                                    href="host/220.248.39.145.html" target="_blank">220.248.39.145</a>;&nbsp<a
                                                    href="host/220.248.39.154.html" target="_blank">220.248.39.154</a>;&nbsp

                                                <a href="host/220.248.39.155.html" target="_blank">220.248.39.155</a>;&nbsp<a
                                                    href="host/220.248.39.171.html" target="_blank">220.248.39.171</a>;&nbsp<a
                                                    href="host/220.248.39.172.html" target="_blank">220.248.39.172</a>;&nbsp<a
                                                    href="host/220.248.39.173.html" target="_blank">220.248.39.173</a>;&nbsp

                                                <a href="host/220.248.39.175.html" target="_blank">220.248.39.175</a>;&nbsp<a
                                                    href="host/220.248.39.176.html" target="_blank">220.248.39.176</a>;&nbsp<a
                                                    href="host/220.248.39.177.html" target="_blank">220.248.39.177</a>;&nbsp<a
                                                    href="host/58.246.139.123.html" target="_blank">58.246.139.123</a>;&nbsp

                                                <a href="host/58.247.108.101.html" target="_blank">58.247.108.101</a>;&nbsp<a
                                                    href="host/58.247.108.124.html" target="_blank">58.247.108.124</a>;&nbsp<a
                                                    href="host/58.247.108.66.html" target="_blank">58.247.108.66</a>;&nbsp<a
                                                    href="host/58.247.108.97.html" target="_blank">58.247.108.97</a>;&nbsp

                                                <a href="host/58.247.108.99.html" target="_blank">58.247.108.99</a>;&nbsp<a
                                                    href="host/61.129.105.101.html" target="_blank">61.129.105.101</a>;&nbsp<a
                                                    href="host/61.129.105.124.html" target="_blank">61.129.105.124</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>该插件连接到目标主机服务，检测到目标服务加密通信使用的SSL加密算法。</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>该漏洞仅仅是一个信息获取的漏洞，可以不做修复。</td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>1.0</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>2001-01-01</td>
                                        </tr>








                                    </table>
                                </td>
                            </tr>
                            <tr class="odd vuln_low" style="cursor:pointer;" onclick="no_toggle('4_1_49','table_4_1_49')">
                                <td>49</td>
                                <td>
                                    <img id="4_1_49" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_low.gif'></img>
                                    <span style='color:#737373'>探测到服务器支持的SSL加密协议【原理扫描】</span>
                                    <!--<span class="level_danger_high">探测到服务器支持的SSL加密协议【原理扫描】</span></td>-->
                                </td>
                                <td>3/103</td>
                                <td>3%</td>
                                <td>3</td>
                            </tr>
                            <tr class="more hide odd" id="table_4_1_49">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/124.127.243.203.html" target="_blank">124.127.243.203</a>;&nbsp<a
                                                    href="host/202.101.28.123.html" target="_blank">202.101.28.123</a>;&nbsp<a
                                                    href="host/58.246.139.123.html" target="_blank">58.246.139.123</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>为了保护敏感数据在传送过程中的安全，全球许多知名企业采用SSL（Security Socket Layer）加密机制。
                                                SSL是Netscape公司所提出的安全保密协议</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>该漏洞仅仅是一个信息获取的漏洞，可以不做修复。</td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>1.0</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>1999-09-01</td>
                                        </tr>








                                    </table>
                                </td>
                            </tr>
                            <tr class="even vuln_low" style="cursor:pointer;" onclick="no_toggle('4_1_50','table_4_1_50')">
                                <td>50</td>
                                <td>
                                    <img id="4_1_50" class="ico plus" src="reportfiles/images/blank.gif">
                                    <img align='absmiddle' src='reportfiles/images/vuln_low.gif'></img>
                                    <span style='color:#737373'>服务器允许SSL会话恢复【原理扫描】</span>
                                    <!--<span class="level_danger_high">服务器允许SSL会话恢复【原理扫描】</span></td>-->
                                </td>
                                <td>55/103</td>
                                <td>53%</td>
                                <td>55</td>
                            </tr>
                            <tr class="more hide even" id="table_4_1_50">
                                <th></th>
                                <td style="padding-left:20px" class="extend" colspan='4'>
                                    <table style="white-space:pre-wrap;" class="report_table" width="100%">
                                        <tr class="odd">
                                            <th width="20%">受影响主机</th>
                                            <td width="80%"><a href="host/101.230.192.1.html" target="_blank">101.230.192.1</a>;&nbsp<a
                                                    href="host/101.230.192.2.html" target="_blank">101.230.192.2</a>;&nbsp<a
                                                    href="host/101.230.192.3.html" target="_blank">101.230.192.3</a>;&nbsp<a
                                                    href="host/124.127.243.200.html" target="_blank">124.127.243.200</a>;&nbsp

                                                <a href="host/124.127.243.201.html" target="_blank">124.127.243.201</a>;&nbsp<a
                                                    href="host/124.127.243.216.html" target="_blank">124.127.243.216</a>;&nbsp<a
                                                    href="host/124.127.243.231.html" target="_blank">124.127.243.231</a>;&nbsp<a
                                                    href="host/124.127.243.233.html" target="_blank">124.127.243.233</a>;&nbsp

                                                <a href="host/124.127.243.234.html" target="_blank">124.127.243.234</a>;&nbsp<a
                                                    href="host/124.127.243.235.html" target="_blank">124.127.243.235</a>;&nbsp<a
                                                    href="host/124.74.244.130.html" target="_blank">124.74.244.130</a>;&nbsp<a
                                                    href="host/124.74.244.131.html" target="_blank">124.74.244.131</a>;&nbsp

                                                <a href="host/124.74.244.134.html" target="_blank">124.74.244.134</a>;&nbsp<a
                                                    href="host/124.74.244.135.html" target="_blank">124.74.244.135</a>;&nbsp<a
                                                    href="host/124.74.244.136.html" target="_blank">124.74.244.136</a>;&nbsp<a
                                                    href="host/124.74.244.145.html" target="_blank">124.74.244.145</a>;&nbsp

                                                <a href="host/124.74.244.154.html" target="_blank">124.74.244.154</a>;&nbsp<a
                                                    href="host/124.74.244.155.html" target="_blank">124.74.244.155</a>;&nbsp<a
                                                    href="host/124.74.244.171.html" target="_blank">124.74.244.171</a>;&nbsp<a
                                                    href="host/124.74.244.172.html" target="_blank">124.74.244.172</a>;&nbsp

                                                <a href="host/124.74.244.173.html" target="_blank">124.74.244.173</a>;&nbsp<a
                                                    href="host/124.74.244.175.html" target="_blank">124.74.244.175</a>;&nbsp<a
                                                    href="host/124.74.244.177.html" target="_blank">124.74.244.177</a>;&nbsp<a
                                                    href="host/140.207.162.65.html" target="_blank">140.207.162.65</a>;&nbsp

                                                <a href="host/140.207.162.66.html" target="_blank">140.207.162.66</a>;&nbsp<a
                                                    href="host/140.207.162.67.html" target="_blank">140.207.162.67</a>;&nbsp<a
                                                    href="host/140.207.78.1.html" target="_blank">140.207.78.1</a>;&nbsp<a
                                                    href="host/140.207.78.2.html" target="_blank">140.207.78.2</a>;&nbsp

                                                <a href="host/140.207.78.3.html" target="_blank">140.207.78.3</a>;&nbsp<a
                                                    href="host/180.166.223.193.html" target="_blank">180.166.223.193</a>;&nbsp<a
                                                    href="host/180.166.223.194.html" target="_blank">180.166.223.194</a>;&nbsp<a
                                                    href="host/202.101.28.123.html" target="_blank">202.101.28.123</a>;&nbsp

                                                <a href="host/220.248.39.130.html" target="_blank">220.248.39.130</a>;&nbsp<a
                                                    href="host/220.248.39.131.html" target="_blank">220.248.39.131</a>;&nbsp<a
                                                    href="host/220.248.39.134.html" target="_blank">220.248.39.134</a>;&nbsp<a
                                                    href="host/220.248.39.135.html" target="_blank">220.248.39.135</a>;&nbsp

                                                <a href="host/220.248.39.136.html" target="_blank">220.248.39.136</a>;&nbsp<a
                                                    href="host/220.248.39.145.html" target="_blank">220.248.39.145</a>;&nbsp<a
                                                    href="host/220.248.39.154.html" target="_blank">220.248.39.154</a>;&nbsp<a
                                                    href="host/220.248.39.155.html" target="_blank">220.248.39.155</a>;&nbsp

                                                <a href="host/220.248.39.171.html" target="_blank">220.248.39.171</a>;&nbsp<a
                                                    href="host/220.248.39.172.html" target="_blank">220.248.39.172</a>;&nbsp<a
                                                    href="host/220.248.39.173.html" target="_blank">220.248.39.173</a>;&nbsp<a
                                                    href="host/220.248.39.175.html" target="_blank">220.248.39.175</a>;&nbsp

                                                <a href="host/220.248.39.177.html" target="_blank">220.248.39.177</a>;&nbsp<a
                                                    href="host/58.246.139.123.html" target="_blank">58.246.139.123</a>;&nbsp<a
                                                    href="host/58.247.108.101.html" target="_blank">58.247.108.101</a>;&nbsp<a
                                                    href="host/58.247.108.124.html" target="_blank">58.247.108.124</a>;&nbsp

                                                <a href="host/58.247.108.66.html" target="_blank">58.247.108.66</a>;&nbsp<a
                                                    href="host/58.247.108.99.html" target="_blank">58.247.108.99</a>;&nbsp<a
                                                    href="host/61.129.105.101.html" target="_blank">61.129.105.101</a>;&nbsp<a
                                                    href="host/61.129.105.118.html" target="_blank">61.129.105.118</a>;&nbsp

                                                <a href="host/61.129.105.124.html" target="_blank">61.129.105.124</a>;&nbsp<a
                                                    href="host/61.129.105.66.html" target="_blank">61.129.105.66</a>;&nbsp<a
                                                    href="host/61.129.105.99.html" target="_blank">61.129.105.99</a>;&nbsp</td>
                                        </tr>


                                        <tr class="even">
                                            <th>详细描述</th>
                                            <td>服务器允许SSL会话恢复</td>
                                        </tr>


                                        <tr class="odd">
                                            <th>解决办法</th>
                                            <td>该漏洞仅仅是对SSL会话恢复的检测，可以不修复。</td>
                                        </tr>

                                        <tr class="even">
                                            <th>威胁分值</th>
                                            <td>1.0</td>
                                        </tr>
                                        <tr class="odd">
                                            <th>危险插件</th>
                                            <td>否</td>
                                        </tr>
                                        <tr class="even">
                                            <th>发现日期</th>
                                            <td>2010-11-01</td>
                                        </tr>








                                    </table>
                                </td>
                            </tr>
                        </tbody>
                        <tfoot>
                            <tr class="first_title">
                                <td colspan="4">合计</td>
                                <td>1238</td>
                            </tr>
                        </tfoot>
                    </table>
                </div>
            </div>
            <div class="report_h report_h1">5.配置信息</div>
            <div class="report_content">
                <div class="report_h report_h2" id="title00">5.1不合规配置信息</div>
                <div>
                </div>
            </div>
            <div class="report_h report_h1">6.脆弱帐号</div>
            <div class="report_content"></div>
            <div class="report_h report_h1">7.参考标准</div>
            <div class="report_content">
                <div class="report_h report_h2" id="title00">7.1单一漏洞风险等级评定标准</div>
                <div>
                    <table class="report_table">
                        <tbody>
                            <tr class="second_title">
                                <td width="80">危险程度</td>
                                <td width="150">危险值区域</td>
                                <td>危险程度说明</td>
                            </tr>
                            <tr class="even">
                                <td><img src="reportfiles/images/vuln_high.gif"> 高</td>
                                <td>7 &lt;= 漏洞风险值 &lt;= 10</td>
                                <td>攻击者可以远程执行任意命令或者代码，或对系统进行远程拒绝服务攻击。</td>
                            </tr>
                            <tr class="odd">
                                <td><img src="reportfiles/images/vuln_middle.gif"> 中</td>
                                <td>4 &lt;= 漏洞风险值 &lt; 7</td>
                                <td>攻击者可以远程创建、修改、删除文件或数据，或对普通服务进行拒绝服务攻击。</td>
                            </tr>
                            <tr class="even">
                                <td><img src="reportfiles/images/vuln_low.gif"> 低</td>
                                <td>0 &lt;= 漏洞风险值 &lt; 4</td>
                                <td>攻击者可以获取某些系统、服务的信息，或读取系统文件和数据。</td>
                            </tr>
                        </tbody>
                    </table>
                    <p>说明：</p>
                    <p>漏洞的风险值兼容CVSS评分标准。</p>
                </div>
                <div class="report_h report_h2" id="title00">7.2单一配置检查项风险等级评定标准</div>
                <div>
                    <table class="report_table">
                        <tbody>
                            <tr class="second_title">
                                <td width="80">危险程度</td>
                                <td width="150">危险值区域</td>
                                <td>危险程度说明</td>
                            </tr>
                            <tr class="even">
                                <td><img src="reportfiles/images/vuln_high.gif"> 高</td>
                                <td>7 &lt;= 检查项风险值 &lt;= 10</td>
                                <td>不当的配置导致攻击者可以通过其他方式获得管理员权限、或者只有管理员权限才能加固的配置。</td>
                            </tr>
                            <tr class="odd">
                                <td><img src="reportfiles/images/vuln_middle.gif"> 中</td>
                                <td>4 &lt;= 检查项风险值 &lt; 7</td>
                                <td>不当的配置导致攻击者可以对主机进行破坏或者收集主机的信息、或者遭受攻击后，重要事件没有记录。</td>
                            </tr>
                            <tr class="even">
                                <td><img src="reportfiles/images/vuln_low.gif"> 低</td>
                                <td>0 &lt;= 检查项风险值 &lt; 4</td>
                                <td>不当地配置对主机安全不会造成太大的影响。</td>
                            </tr>
                        </tbody>
                    </table>
                </div>
                <div class="report_h report_h2" id="title00">7.3主机风险等级评定标准</div>
                <div>
                    <table class="report_table">
                        <tbody>
                            <tr class="second_title">
                                <td width="200px">主机风险等级</td>
                                <td>主机风险值区域</td>
                            </tr>
                            <tr class="even">
                                <td><img src="reportfiles/images/d_high.gif"> 非常危险</td>
                                <td>7.0 &lt;= 主机风险值 &lt;= 10.0</td>
                            </tr>
                            <tr class="odd">
                                <td><img src="reportfiles/images/d_middle.gif"> 比较危险</td>
                                <td>5.0 &lt;= 主机风险值 &lt; 7.0</td>
                            </tr>
                            <tr class="even">
                                <td><img src="reportfiles/images/d_low.gif"> 比较安全</td>
                                <td>2.0 &lt;= 主机风险值 &lt; 5.0</td>
                            </tr>
                            <tr class="odd">
                                <td><img src="reportfiles/images/d_safe.gif"> 非常安全</td>
                                <td>0.0 &lt;= 主机风险值 &lt; 2.0</td>
                            </tr>
                        </tbody>
                    </table>
                    <p>说明：</p>
                    <ol style="list-style:decimal;padding-left:40px;">
                        <li>按照远程安全评估系统的主机风险评估模型计算主机风险值。根据得到的主机风险值参考“主机风险等级评定标准”标识主机风险等等级。</li>
                        <li>将主机风险等级按照风险值的高低进行排序，得到非常危险、比较危险、比较安全、非常安全四种主机风险等级。</li>
                        <li>用户可以根据自己的需要修订主机风险等级中的主机风险值范围。</li>
                    </ol>
                </div>
                <div class="report_h report_h2" id="title00">7.4网络风险等级评定标准</div>
                <div>
                    <table class="report_table">
                        <tbody>
                            <tr class="second_title">
                                <td width="200px">网络风险等级</td>
                                <td>网络风险值区域</td>
                            </tr>
                            <tr class="even">
                                <td><img src="reportfiles/images/d_high.gif"> 非常危险</td>
                                <td>8.0 &lt;= 网络风险值 &lt;= 10.0</td>
                            </tr>
                            <tr class="odd">
                                <td><img src="reportfiles/images/d_middle.gif"> 比较危险</td>
                                <td>5.0 &lt;= 网络风险值 &lt; 8.0</td>
                            </tr>
                            <tr class="even">
                                <td><img src="reportfiles/images/d_low.gif"> 比较安全</td>
                                <td>1.0 &lt;= 网络风险值 &lt; 5.0</td>
                            </tr>
                            <tr class="odd">
                                <td><img src="reportfiles/images/d_safe.gif"> 非常安全</td>
                                <td>0.0 &lt;= 网络风险值 &lt; 1.0</td>
                            </tr>
                        </tbody>
                    </table>
                    <p>说明：</p>
                    <ol style="list-style:decimal;padding-left:40px;">
                        <li>按照远程安全评估系统的网络风险评估模型计算该网络风险值。根据得到的网络风险值参考“网络风险等级评定标准“标识网络风险等等级。</li>
                        <li>将网络风险等级按照风险值的高低进行排序，得到非常危险、比较危险、比较安全、非常安全四种网络风险等级。</li>
                        <li>用户可以根据自己的需要修订网络风险等级中的网络风险值范围。</li>
                    </ol>
                </div>
                <div class="report_h report_h2" id="title00">7.5安全建议</div>
                <div>
                    <p>据市场研究公司 Gartner 研究报告称&#34;实施漏洞管理的企业会避免近 90% 的攻击&#34;。可以看出，及时的漏洞修补可以在一定程度上防止病毒、攻击者的威胁。</p>
                    <p>远程安全评估系统建议对存在漏洞的主机参考附件中提出的解决方案进行漏洞修补、安全增强。</p>
                    <ul style="list-style:circle; padding-left:60px;">
                        <li>建议所有 Windows 系统使用&#34;Windows Update&#34;进行更新。</li>
                        <li>对于大量终端用户而言，可以采用 WSUS 进行自动补丁更新，也可以采用补丁分发系统及时对终端用户进行补丁更新。</li>
                        <li>对于存在弱口令的系统，需在加强使用者安全意识的前提下，督促其修改密码，或者使用策略来强制限制密码长度和复杂性。</li>
                        <li>对于存在弱口令或是空口令的服务，在一些关键服务上，应加强口令强度，同时需使用加密传输方式，对于一些可关闭的服务来说，建议关闭该服务以达到安全目的。</li>
                        <li>对于UNIX系统订阅厂商的安全公告，与厂商技术人员确认后进行漏洞修补、补丁安装、停止服务等。</li>
                        <li>由于其他原因不能及时安装补丁的系统，考虑在网络边界、路由器、防火墙上设置严格的访问控制策略，以保证网络的动态安全。</li>
                        <li>建议网络管理员、系统管理员、安全管理员关注安全信息、安全动态及最新的严重漏洞，攻与防的循环，伴随每个主流操作系统、应用服务的生命周期。</li>
                        <li>建议采用远程安全评估系统定期对网络进行评估，真正做到未雨绸缪。</li>
                    </ul>
                    <p>远程安全评估系统建议对存在不合规检查项的主机参考对应的检查点详情中提出的调整方案和标准值进行修正。</p>
                    <!--
            <ul style="list-style:circle; padding-left:60px;">
              <li>建议......</li>
            </ul>
            -->
                </div>
            </div>
        </div>
        <div class="report_tip"></div>
    </div>
    <!--content end-->
    </div>
</body>

</html>