[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"all-banners":3,"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0":106,"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU":113,"vulnerability-14272":119,"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU":143},[4,15,26,33,40,47,54,61,68,73,79,84,90,95,100],{"title":5,"slug":6,"text":7,"link":8,"external":9,"targets":10,"cta":12,"variant":13,"campaign_id":14},"Yearly plan offer (save 2 months) - Homepage","yearly-2months-homepage","Fix your 2026 tooling cost. Save 2 months upfront.","/pricing",true,[11],"/","Check yearly plans","secondary","yearly-2months",{"title":16,"slug":17,"text":18,"link":19,"external":20,"targets":21,"cta":23,"variant":24,"campaign_id":25},"Compliance - Advanced Pentest Reporting","compliance-advanced-pentest-reporting","Prove your compliance. Get built-in validation with audit-ready reports.","https://pentest-tools.com/pricing",false,[22],"/features/advanced-pentest-reporting","Unlock audit-ready reports","primary",null,{"title":27,"slug":28,"text":29,"link":19,"external":20,"targets":30,"cta":32,"variant":24,"campaign_id":25},"Compliance - Integrations","compliance-integrations","Disconnected tools hide compliance breaches. Stay audit-ready 24/7 with the right integrations.",[31],"/features/integrations","Automate your compliance",{"title":34,"slug":35,"text":36,"link":19,"external":20,"targets":37,"cta":39,"variant":24,"campaign_id":25},"Compliance - ML Classifier","compliance-ml-classifier","Put compliance on Auto this year with 50% fewer FPs. Go deeper with the WebNetSec plan.",[38],"/features/machine-learning-classifier","Explore WebNetSec",{"title":41,"slug":42,"text":43,"link":19,"external":20,"targets":44,"cta":46,"variant":24,"campaign_id":25},"Compliance - Pentest Robots","compliance-pentest-robots","Put compliance on Auto with Pentest Robots. Available with any plan.",[45],"/features/pentest-robots","Automate continuous scans",{"title":48,"slug":49,"text":50,"link":19,"external":20,"targets":51,"cta":53,"variant":24,"campaign_id":25},"Compliance - Sniper: Auto-Exploiter","compliance-sniper-auto-exploiter","Get audit-ready proof and put compliance on Auto with our proprietary Sniper: Auto-exploiter. Available with Pentest Suite.",[52],"/exploit-helpers/sniper","Get proof with Pentest Suite",{"title":55,"slug":56,"text":57,"link":19,"external":20,"targets":58,"cta":60,"variant":24,"campaign_id":25},"Compliance - Network Scanner","compliance-network-scanner","Map your attack surface and prove infrastructure compliance with the Network Scanner. Available with any plan.",[59],"/network-vulnerability-scanning/network-security-scanner-online","Upgrade your plan",{"title":62,"slug":63,"text":64,"link":19,"external":20,"targets":65,"cta":67,"variant":24,"campaign_id":25},"Compliance - Website Scanner","compliance-website-scanner","Prove real risk instantly and put compliance on Auto with the Website Scanner. Available with the WebNetSec plan.",[66],"/website-vulnerability-scanning/website-scanner","Unlock AppSec compliance",{"title":69,"slug":70,"text":71,"link":19,"external":20,"targets":72,"cta":23,"variant":24,"campaign_id":25},"Compliance - Advanced Pentest Reporting (A-B test)","compliance-advanced-pentest-reporting-1","Stop piecing together reports manually. Upgrade today to unlock instant proof for audits.",[22],{"title":74,"slug":75,"text":76,"link":19,"external":20,"targets":77,"cta":78,"variant":13,"campaign_id":25},"Compliance - Integrations (A-B test)","compliance-integrations-1","Disconnected tools will fail your next audit. Unlock the integrations needed for compliance.",[31],"Connect your stack",{"title":80,"slug":81,"text":82,"link":19,"external":20,"targets":83,"cta":39,"variant":24,"campaign_id":25},"Compliance - ML Classifier (A-B test)","compliance-ml-classifier-1","Ghost vulnerabilities drain time and chip your compliance. Upgrade to WebNetSec to stay audit-ready with 50% fewer FPs.",[38],{"title":85,"slug":86,"text":87,"link":19,"external":20,"targets":88,"cta":89,"variant":24,"campaign_id":25},"Compliance - Network Scanner (A-B test)","compliance-network-scanner-1","Unmapped assets are compliance landmines - upgrade your plan with complete attack surface visibility.",[59],"Get deep network scans",{"title":91,"slug":92,"text":93,"link":19,"external":20,"targets":94,"cta":46,"variant":24,"campaign_id":25},"Compliance - Pentest Robots (A-B test)","compliance-pentest-robots-1","Don’t leave compliance to chance - deploy Pentest Robots to quickly automate your audit readiness.",[45],{"title":96,"slug":97,"text":98,"link":19,"external":20,"targets":99,"cta":53,"variant":24,"campaign_id":25},"Compliance - Sniper: Auto-Exploiter (A-B test)","compliance-sniper-auto-exploiter-1","Deliver audit-ready proof instantly and stay compliant 24/7/365 - only with Sniper: Auto-Exploiter. Available with Pentest Suite.",[52],{"title":101,"slug":102,"text":103,"link":19,"external":20,"targets":104,"cta":105,"variant":24,"campaign_id":25},"Compliance - Website Scanner (A-B test)","compliance-website-scanner-1","Web vulnerabilities let in devastating compliance fines. Stay audit-ready with deep, proprietary scans. Available with the WebNetSec plan.",[66],"Upgrade to WebNetSec",["Island",107],{"key":108,"params":109,"result":111},"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0",{"props":110},"{}",{"head":112},{},["Island",114],{"key":115,"params":116,"result":117},"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU",{"props":110},{"head":118},{},{"id":120,"detectable_with":121,"vuln_details":128,"vuln_id":140,"name":141,"published":142,"updated":25},14272,{"tool":122,"engine":125},{"id":123,"name":124},1,"Network Scanner",{"id":126,"name":127},3,"OpenVAS",{"id":120,"codename":25,"description":25,"severity":25,"risk_description":129,"public_description":130,"public_recommendation":131,"recommendation":25,"references":132,"cvssv3":25,"epss_score":135,"epss_percentile":136,"cve":137,"in_cisa_catalog":20,"date":139,"software_type":25,"vendor":25,"product":25,"ptt_exploit_capabilities":25},"Accessing as an anonymous user is possible with the following URL: http://www.example.com/exchange/root.asp?acs=anon After this access, the anonymous user can search for valid users in the OWA server and can enumerate all users by accessing the following URL: http://www.example.com/exchange/finduser/details.asp?obj=XXX (where XXX is a string of 65 hexadecimal numbers) Data that can be accessed by an anonymous user may include: usernames, server names, email name accounts, phone numbers, departments, office, management relationships... This information will help an attacker to make social engineering attacks with the knowledge gained. This attack can be easily automated since, even if direct access to search is not possible, you only need the cookie given on the anonymous login access.","It is possible to browse the information of the OWA server by accessing as an anonymous user.","Disable anonymous access to OWA. Follow these steps: 1. In Microsoft Exchange Administrator open the Configuration container. 2. Choose Protocols, and then double-click HTTP (Web) Site Settings 3. Deselect the Allow anonymous users to access the anonymous public folders check box. 4. Select the Folder Shortcuts tab. 5. Remove all folders which are allowed anonymous viewing. 6. Choose OK. 7. Remove the anonymous access from the login web pages.",[133,134],"http://support.microsoft.com/support/exchange/content/whitepapers/owaguide.doc","http://www.securityfocus.com/bid/3301",0.1955,0.9542,[138],"CVE-2001-0660","2001-10-30T00:00:00Z","NETSCAN-OPENVAS-1.3.6.1.4.1.25623.1.0.10781","Outlook Web anonymous access","2018-01-02T00:00:00Z",["Island",144],{"key":145,"params":146,"result":148},"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU",{"props":147},"{\"text-color\":\"gray\"}",{"head":149},{}]