Network Vulnerability Assessment Report |
| |
Sorted by host names |
| |||||||||
|
Id | Name |
10015 | AltaVista Intranet Search |
10988 | Netware NDS Object Enumeration |
11868 | SMB Registry : permissions of the SNMP key |
10965 | SSH 3 AllowedAuthentication |
11254 | Unpassworded friday account |
11413 | Unchecked Buffer in ntdll.dll (Q815021) |
10680 | Test Microsoft IIS Source Fragment Disclosure |
11151 | Webserver 4D Cleartext Passwords |
10022 | Axent Raptor's DoS |
10889 | NIDS evasion |
10079 | Anonymous FTP enabled |
10893 | Obtains the lists of users aliases |
11682 | Philboard database access |
11135 | Bugbear worm |
11994 | AUREATE detection |
11393 | ColdFusion Path Disclosure |
11176 | Tomcat 4.x JSP Source Exposure |
10730 | Raptor FW version 6.5 detection |
11017 | directory.php |
11249 | Unpassworded jack account |
10576 | Check for dangerous IIS default files |
11042 | Apache Tomcat DOS Device Name XSS |
11759 | Cajun p13x DoS |
11242 | Unpassworded demos account |
11977 | Invision Power Board Calendar SQL Injection Vulnerability |
11131 | Sambar web server DOS |
11266 | Unpassworded jill account |
10544 | format string attack against statd |
10309 | Passwordless Wingate installed |
11961 | Psychoblogger SQL Injection |
10662 | Web mirroring |
10556 | Broker FTP files listing |
10966 | IMAP4buffer overflow in the BODY command |
11517 | Leafnode denials of service |
10411 | klogind overflow |
10064 | Excite for WebServers |
11080 | poprelayd & sendmail authentication problem |
11645 | wsmp3d command execution |
11979 | HotNews code injection |
10876 | Delta UPS Daemon Detection |
11975 | quickstore traversal (2) |
10131 | jj cgi |
10010 | AliBaba path climbing |
11313 | MCMS : Buffer overflow in Profile Service |
10733 | InterScan VirusWall Remote Configuration Vulnerability |
11595 | Windows Media Player Skin Download Overflow |
11914 | TheServer clear text password |
10762 | RTSP Server type and version |
10140 | MediaHouse Statistic Server Buffer Overflow |
11670 | GeekLog SQL vulns |
11699 | URLScan Detection |
11454 | SMB log in with W32/Deloder passwords |
11980 | Compaq Web SSI DoS |
11261 | Default password (D13HH[) for root |
11171 | HTTP unfinished line denial |
10765 | SQLQHit Directory Structure Disclosure |
11900 | Opera web browser HREF overflow |
10293 | vftpd buffer overflow |
11288 | CSCdu15622 |
11776 | Carello detection |
11240 | Unpassworded guest account |
11516 | AutomatedShops WebC.cgi buffer overflows |
10414 | WinLogon.exe DoS |
10820 | F5 Device Default Support Password |
10368 | Dansie Shopping Cart backdoor |
11327 | Nortel Baystack switch password test |
10026 | BFTelnet DoS |
11163 | msmmask.exe |
11236 | PHP-Nuke is installed on the remote host |
10793 | Cobalt Web Administration Server Detection |
11197 | Etherleak |
11073 | readmsg.php detection |
11406 | Buffer overflow in BSD in.lpd |
11345 | SimpleBBS users disclosure |
11341 | SSH1 SSH Daemon Logging Failure |
10720 | sdbsearch.cgi |
12022 | Multiple phpShop Vulnerabilities |
11260 | Default password (wank) for wank |
10674 | Microsoft's SQL UDP Info Query |
10060 | Dumpenv |
11367 | Discard port open |
11407 | proftpd 1.2.0rc2 format string vuln |
10195 | Usable remote proxy |
11544 | MonkeyWeb POST with too much data |
10818 | Alchemy Eye HTTP Command Execution |
11694 | P-Synch multiple issues |
10183 | pnserver crash |
11068 | iPlanet chunked encoding |
10995 | Sun JavaServer Default Admin Password |
11848 | Portable SSH OpenSSH < 3.7.1p2 |
11267 | OpenSSL password interception |
11409 | ePolicy orchestrator format string |
10565 | Serv-U Directory traversal |
11753 | SquirrelMail's Multiple Flaws |
10578 | Oops buffer overflow |
11853 | Apache < 2.0.48 |
11636 | ttCMS code injection |
10827 | SysV /bin/login buffer overflow (telnet) |
11466 | NiteServer FTP directory traversal |
11619 | Eserv Memory Leaks |
10870 | Login configurations |
11092 | Apache 2.0.39 Win32 directory traversal |
10190 | ProFTPd buffer overflow |
11023 | lpd, dvips and remote command execution |
10472 | SSH Kerberos issue |
10284 | TFS SMTP 3.2 MAIL FROM overflow |
10959 | ServletExec 4.1 ISAPI File Reading |
10741 | SiteScope Web Administration Server Detection |
11592 | 12Planet Chat Server Path Disclosure |
10315 | WINS UDP flood denial |
10502 | Axis Camera Default Password |
10651 | cfinger's version |
10956 | Codebrws.asp Source Disclosure Vulnerability |
11696 | IRCXPro Clear Text Passwords |
11845 | Overnet P2P check |
10090 | FTP site exec |
10265 | An SNMP Agent is running |
10603 | Winsock Mutex vulnerability |
10848 | Oracle 9iAS Dynamic Monitoring Services |
10099 | guestbook.pl |
10791 | Ultraseek Web Server Detect |
11786 | VP-ASP SQL Injection |
10871 | DB2 DOS |
10023 | Bypass Axis Storpoint CD authentication |
11835 | Microsoft RPC Interface Buffer Overrun (KB824146) |
11274 | WihPhoto file reading |
10179 | pimp |
11223 | Oracle 9iAS access to SOAP documentation |
11793 | Apache < 1.3.28 |
10288 | Trin00 Detect |
11022 | eDonkey detection |
10464 | proftpd 1.2.0preN check |
11843 | lsh overflow |
11605 | IkonBoard arbitrary command execution |
10832 | Kcms Profile Server |
10494 | Netauth |
10116 | IIS buffer overflow |
11059 | Trend Micro OfficeScan Denial of service |
11425 | ICQ is installed |
11381 | CSCdw33027 |
11174 | HTTP negative Content-Length DoS |
10982 | CSCdt93866 |
11143 | Exchange 2000 Exhaust CPU Resources (Q320436) |
10216 | fam service |
10541 | KW whois |
10274 | SyGate Backdoor |
10324 | XTramail MTA 'HELO' denial |
10831 | PHP Rocket Add-in File Traversal |
11580 | UDP packets with source port of 53 bypass firewall rules |
11285 | CSCdy26428 |
10618 | Pi3Web tstisap.dll overflow |
11983 | KpyM Windows Telnet Server Overflow |
11357 | NFS cd .. |
10873 | GroupWise Web Interface 'HTMLVER' hole |
10270 | Stacheldraht Detect |
11992 | Vulnerability in Microsoft ISA Server 2000 H.323 Filter(816458) |
11191 | WM_TIMER Message Handler Privilege Elevation (Q328310) |
11125 | mldonkey www |
11726 | CSNews.cgi vulnerability |
10917 | SMB Scope |
10577 | Check for bdir.htr files |
11094 | WS FTP overflows |
10141 | MetaInfo servers |
10788 | Solaris finger disclosure |
10564 | IIS phonebook |
10977 | CSCds07326 |
10102 | HotSync Manager Denial of Service attack |
11501 | Justice guestbook |
10034 | RedHat 6.0 cachemgr.cgi |
10710 | Checkpoint SecuRemote information leakage |
10175 | Detect presence of PGPNet server and its version |
10082 | FTPd tells if a user exists |
10322 | Xitami Web Server buffer overflow |
11611 | counter.php file overwrite |
11899 | nibindd is running |
10395 | SMB shares enumeration |
10527 | Boa file retrieval |
11217 | Microsoft's SQL Version Query |
10375 | Ken! DoS |
11123 | radmin detection |
10511 | /perl directory browsable ? |
10998 | Shiva LanRover Blank Password |
11146 | Microsoft RDP flaws could allow sniffing and DOS(Q324380) |
10273 | Detect SWAT server port |
11142 | IIS XSS via error |
11546 | Xeneo web server %A DoS |
11424 | WebDAV enabled |
11887 | Buffer Overflow in Windows Troubleshooter ActiveX Control (826232) |
11723 | PDGSoft Shopping cart vulnerability |
10751 | Kazaa / Morpheus Client Detection |
10964 | Windows Debugger flaw can Lead to Elevated Privileges (Q320206) |
10398 | SMB get domain SID |
10038 | Cfinger's search.**@host feature |
10463 | vpopmail input validation bug |
11263 | Default password (lrkr0x) for gamez |
11847 | WinMX P2P check |
10656 | Resin traversal |
10193 | Usable remote proxy on any port |
11371 | BSD ftpd Single Byte Buffer Overflow |
11530 | WinAMP3 buffer overflow |
11380 | CSCdz39284, CSCdz41124 |
11366 | Trusting domains bad verification |
11379 | CSCdx92043 |
12023 | CISCO IOS H.323 Protocol Implementation Flaws |
10143 | MSQL CGI overflow |
11531 | PHPay Information Disclosure |
11606 | WebLogic Server hostname disclosure |
11310 | myphpPageTool code injection |
10405 | shtml.exe reveals full path |
10510 | EFTP carriage return DoS |
10092 | FTP Server type and version |
10620 | EXPN overflow |
10253 | Cobalt siteUserMod cgi |
11613 | CP syslog overflow |
10458 | The messenger service is running |
10475 | Buffer overflow in WebSitePro webfind.exe |
11523 | Samba trans2open buffer overflow |
11113 | Samba Buffer Overflow |
11378 | MySQL mysqld Privilege Escalation Vulnerability |
10011 | get32.exe vulnerability |
10535 | php log |
11054 | fakeidentd overflow |
10137 | MDaemon DoS |
11586 | FileMakerPro Detection |
12012 | CYDOOR detection |
11150 | Tomcat servlet engine MD/DOS device names denial of service |
10235 | statd service |
10732 | IIS 5.0 WebDav Memory Leakage |
11484 | apcupsd overflows |
11556 | CISCO Secure ACS Management Interface Login Overflow |
11180 | DB4Web TCP relay |
11365 | Auction Deluxe XSS |
10968 | ping.asp |
10507 | Sun's Java Web Server remote command execution |
11911 | 'Les Visiteurs' script injection |
10838 | FastCGI Echo.exe Cross Site Scripting |
10119 | NT IIS Malformed HTTP Request Header DoS Vulnerability |
11963 | Detect SIP Compatible Hosts |
11432 | Yahoo!Messenger is installed |
11494 | l2tpd DoS |
10573 | IIS 5.0 Sample App reveals physical path of web root |
10188 | printenv |
10616 | webspirs.cgi |
11364 | Sendmail Forward File Privilege Escalation Vulnerability |
10623 | Savant original form CGI access |
11376 | qpopper Qvsnprintf buffer overflow |
11566 | .rhosts in FTP root |
11917 | Bugzilla SQL flaws |
10911 | Local users information : automatically disabled accounts |
11084 | Infinite HTTP request |
10924 | csSearch.cgi |
11412 | IIS : WebDAV Overflow (MS03-007) |
11283 | CSCdp58462 |
11873 | PayPal Store Front code injection |
10688 | SNMP VACM |
11585 | Sambar Transmits Passwords in PlainText |
10740 | SiteScope Web Managegment Server Detect |
10735 | Generic flood |
12013 | DOWNLOADWARE detection |
10261 | Sendmail mailing to programs |
11030 | Apache chunked encoding |
11807 | php < 4.3.3 |
10109 | SCO i2odialogd buffer overrun |
11728 | ddicgi.exe vulnerability |
10550 | Obtain processes list via SNMP |
11076 | Oracle webcache admin interface DoS |
10126 | in.fingerd pipe |
11781 | iXmail arbitrary file upload |
10370 | IIS dangerous sample files |
11955 | sgdynamo_xss |
10278 | Sendmail 8.6.9 ident |
11946 | Ebola 0.1.4 buffer overflow |
11909 | Apache2 double slash dir index |
10938 | Apache Remote Command Execution via .bat files |
10468 | Netscape Administration Server admin password |
10266 | UDP null size going to SNMP DoS |
10391 | mstream handler Detect |
10430 | SMB Registry : permissions of keys that can lead to admin |
11950 | RemotelyAnywhere Cross Site Scripting |
11834 | Source routed packets |
11553 | Bugzilla XSS and insecure temporary filenames |
10903 | Users in the 'System Operator' group |
11928 | Buffer Overrun in Windows Help (825119) |
11311 | shtml.exe overflow |
11812 | ePolicy orchestrator multiple issues |
10062 | Eicon Diehl LAN ISDN modem DoS |
11276 | CuteNews code injection |
10213 | cmsd service |
11850 | php4 multiple flaws |
10390 | mstream agent Detect |
10354 | vqServer administrative port |
11270 | SMTP too long line |
11621 | Snitz Forums Cmd execution |
11852 | Mail relaying (thorough test) |
10773 | MacOS X Finder reveals contents of Apache Web files |
10597 | wwwwais |
10843 | ASP.NET path disclosure |
11016 | xtux server detection |
11464 | ad.cgi |
10341 | Pocsag password |
11587 | XMB SQL Injection |
11316 | Sendmail remote header buffer overflow |
10922 | CVS/Entries |
11012 | ATA-186 password circumvention / recovery |
11200 | Platinum FTP Server |
10065 | EZShopper 3.0 |
10485 | Service Control Manager Named Pipe Impersonation patch |
11167 | Webserver4everyone too long URL |
10122 | imagemap.exe |
10133 | Land |
11960 | My Little Forum XSS Vulnerability |
10776 | Power Up Information Disclosure |
11130 | BrowseGate HTTP headers overflows |
10926 | IE VBScript Handling patch (Q318089) |
10933 | EFTP tells if a given file exists |
10147 | A Nessus Daemon is running |
10939 | MSDTC denial of service by flooding with nul bytes |
11252 | Unpassworded toor account |
10742 | Amanda Index Server version |
11418 | Sun rpc.cmsd overflow |
11205 | War FTP Daemon CWD/MKD Buffer Overflow |
10470 | WebActive world readable log file |
12003 | TIMESINK detection |
10376 | htimage.exe overflow |
10614 | sendtemp.pl |
11446 | DCP-Portal Cross Site Scripting Bugs |
11504 | MultiTech Proxy Server Default Password |
10069 | Finger zero at host feature |
11294 | CSCdw50657 |
11661 | Unpassworded iiprotect administrative interface |
10070 | Finger backdoor |
11258 | Default password (glftpd) for glftpd |
11201 | Nortel/Bay Networks/Xylogics Annex default password |
11922 | Opera Multiple MIME Type File Dropping Weaknesses |
10163 | Novell Border Manager |
11206 | War FTP Daemon Directory Traversal |
11098 | WS_FTP SITE CPWD Buffer Overflow |
11764 | TMax Soft Jeus Cross Site Scripting |
10872 | BadBlue Directory Traversal Vulnerability |
11091 | Windows Network Manager Privilege Elevation (Q326886) |
10654 | Oracle Application Server Overflow |
10974 | CSCdi36962 |
10815 | Web Server Cross Site Scripting |
10935 | IIS ASP ISAPI filter Overflow |
12011 | BETTERINTERNET detection |
10345 | Passwordless Cayman DSL router |
11906 | OSPF detection |
11415 | SquirrelMail's Cross Site Scripting |
11672 | Bandmin XSS |
11741 | lednews XSS |
10378 | LCDproc buffer overflow |
10698 | WebLogic Server /%00/ bug |
10176 | phf |
10289 | Microsoft Media Server 4.1 - DoS |
11488 | IMP SQL injection |
11934 | Xitami malformed header DoS |
11314 | Buffer overflow in Microsoft Telnet |
10217 | keyserv service |
11784 | Abyss httpd overflow |
10696 | ttawebtop |
11093 | EFTP installation directory disclosure |
11336 | Cumulative patches for Excel and Word for Windows |
10269 | SSH Overflow |
10177 | php.cgi |
11831 | Word Macros may run automatically |
11799 | PHP Ashnews code injection |
10159 | News Server type and version |
10044 | Checkpoint FW-1 identification |
11065 | HTTP method overflow |
10731 | HealthD detection |
11214 | Microsoft's SQL Overflows |
11594 | CSCdea77143, CSCdz15393, CSCdt84906 |
10937 | IIS FrontPage ISAPI Denial of Service |
10338 | smad |
10223 | RPC portmapper |
11701 | hpux ftpd REST vulnerability |
10096 | rsh with null username |
10400 | SMB accessible registry |
11067 | Microsoft's SQL Hello Overflow |
10722 | LDAP allows null bases |
10496 | Imail Host: overflow |
10410 | ICEcap default password |
10129 | INN version check |
11069 | HTTP User-Agent overflow |
11683 | Cumulative Patch for Internet Information Services (Q11114) |
11248 | Unpassworded date account |
11377 | smb2www installed |
10667 | IIS 5.0 PROPFIND Vulnerability |
11303 | mod_frontpage installed |
11136 | /bin/login overflow exploitation |
11998 | GATOR detection |
11115 | gallery code injection |
11521 | Abyss httpd crash |
10241 | ypbind service |
11526 | Vignette StoryServer Information Disclosure |
10444 | JRun's viewsource.jsp |
10826 | Unprotected Netware Management Portal |
11714 | Non-Existant Page Physical Path Disclosure Vulnerability |
11006 | RedHat 6.2 inetd |
10707 | McAfee myCIO detection |
11097 | TypSoft FTP STOR/RETR DoS |
10631 | IIS propfind DoS |
10971 | GSR ICMP unreachable |
10171 | Oracle Web Server denial of Service |
10898 | Users information : Never changed password |
10954 | OpenSSH AFS/Kerberos ticket/token passing |
11383 | CSCdz60229, CSCdy87221, CSCdu75477 |
11931 | My_eGallery code execution |
10123 | Imail's imap buffer overflow |
11199 | Multiple vulnerabilities in CUPS |
10920 | RemotelyAnywhere WWW detection |
10941 | IPSEC IKE check |
10695 | IIS .IDA ISAPI filter applied |
11225 | Oracle 9iAS OWA UTIL access |
11044 | ICECast FileSystem disclosure |
11981 | vbulletin calendar SQL Injection Vulnerability |
10984 | CSCdu81936 |
11058 | rusersd output |
11392 | Serv-U path disclosure |
10648 | ftp 'glob' overflow |
11253 | Unpassworded hax0r account |
11707 | Bugbear.B web backdoor |
11593 | SLMail SMTP overflows |
11562 | The ScriptLogic service is running |
10570 | Unify eWave ServletExec 3.0C file upload |
10025 | bb-hist.sh |
11760 | Pod.Board Forum_Details.PHP Cross Site Scripting |
10105 | htdig |
10192 | Proxy accepts CONNECT requests |
10498 | Test HTTP dangerous methods |
11321 | Sendmail 8.8.8 to 8.12.7 Double Pipe Access Validation Vulnerability |
11116 | phpMyAdmin arbitrary files reading |
11725 | counter.exe vulnerability |
11625 | DrWeb Folder Name Overflow |
10272 | SunKill |
12024 | Multiple MetaDot Vulnerabilities |
11300 | Unchecked buffer in Network Share Provider (Q326830) |
10501 | Trinity v3 Detect |
10772 | PHP-Nuke copying files security vulnerability (admin.php) |
10579 | bftpd chown overflow |
11964 | SIP Express Router Missing To in ACK DoS |
11052 | BenHur Firewall active FTP firewall leak |
10306 | whois_raw |
11388 | l2tpd < 0.68 overflow |
11959 | Remote Code Execution in Knowledge Builder |
11966 | Remote Code Execution in PHP Ping |
11369 | irix performance copilot |
12010 | BARGAINBUDDY detection |
10508 | PFTP login check |
10715 | BEA WebLogic Scripts Server scripts Source Disclosure |
10280 | Telnet |
11660 | TextPortal Default Passwords |
10517 | pam_smb / pam_ntdom overflow |
11990 | MDAC Buffer Overflow (832483) |
11349 | Sendmail Group Permissions Vulnerability |
11565 | .forward in FTP root |
11382 | CSCdv85279, CSCdw59394 |
11079 | Snapstream PVS web directory traversal |
11897 | NetInfo daemon |
11107 | viralator |
10112 | icat |
10089 | FTP ServU CWD overflow |
10500 | Shiva Integrator Default Password |
10601 | Basilix includes download |
11502 | ScozBook flaws |
10714 | Default password router Zyxel |
11375 | smb2www remote command execution |
11145 | Certificate Validation Flaw Could Enable Identity Spoofing (Q328145) |
11218 | Tomcat /status information disclosure |
10899 | Users information : User has never logged in |
11159 | MS RPC Services null pointer reference DoS |
10723 | LDAP allows anonymous binds |
10607 | SSH1 CRC-32 compensation attack |
11162 | WebSphere Edge caching proxy denial of service |
11302 | Cumulative patch for Windows Media Player |
10152 | NetBus 2.x |
10980 | CSCdt62732 |
11442 | Samba TNG multiple flaws |
10630 | PHP-Nuke security vulnerability (bb_smilies.php) |
11884 | WinSyslog (DoS) |
10445 | AnalogX denial of service by long CGI name |
11894 | TinyWeb 1.9 |
10925 | Oracle Jserv Executes outside of doc_root |
11490 | D-Link DSL Broadband Modem |
11416 | openwebmail command execution |
10335 | tcp connect() scan |
11237 | php 4.3.0 |
10227 | rstatd service |
10543 | Lotus Domino SMTP overflow |
10900 | Users information : Passwords never expires |
10296 | w3-msql overflow |
11597 | Snitz Forums 2000 Password Reset and XSS |
11996 | BRILLIANT DIGITAL detection |
10383 | bizdb1-search.cgi located |
10098 | guestbook.cgi |
10755 | Microsoft Exchange Public Folders Information Leak |
11522 | Linksys Router default password |
11627 | WebLogic clear-text passwords |
10397 | SMB LanMan Pipe Server browse listing |
10229 | sadmin service |
11474 | NetGear ProSafe VPN Login DoS |
10061 | Echo port open |
10668 | Malformed request to index server |
10169 | OpenLink web config buffer overflow |
11881 | Wollf backdoor detection |
11228 | Unreal Engine flaws |
10431 | SMB Registry : missing winreg |
10684 | yppasswdd overflow |
11650 | MAILsweeper PowerPoint DoS |
11777 | SMB share hosting copyrighted material |
11008 | PHP4 Physical Path Disclosure Vulnerability |
11394 | Lotus Domino XSS |
11104 | Directory Manager's edit_image.php |
10546 | Enumerate Lanman users via SNMP |
10182 | Livingston Portmaster crash |
10014 | tst.bat CGI vulnerability |
12008 | phpdig Code injection Vulnerability |
11770 | myServer DoS |
11999 | RADIATE detection |
10386 | No 404 check |
11896 | DB2 discovery service DOS |
11808 | Microsoft RPC Interface Buffer Overrun (823980) |
10983 | CSCdu20643 |
10254 | SLMail denial of service |
11974 | Jordan Windows Telnet Server Overflow |
11233 | N/X Web Content Management code injection |
10148 | Nestea |
11602 | HappyMall Command Execution |
11557 | ideabox code injection |
11778 | Web Server hosting copyrighted material |
10258 | Sendmail's from piped program |
10979 | CSCdt46181 |
10059 | Domino HTTP Denial |
11918 | Oracle 9iAS PORTAL_DEMO ORG_CHART |
11512 | Kerberos 5 issues |
10701 | php safemode |
11337 | mountd overflow |
11185 | vxworks ftpd buffer overflow |
10046 | Cisco DoS |
11642 | Helix RealServer Buffer Overrun |
10653 | Solaris FTPd tells if a user exists |
10136 | MDaemon crash |
11633 | lovgate virus is installed |
10067 | Faxsurvey |
11844 | Kazaa P2P check |
10512 | YaBB |
10083 | FTP CWD ~root |
11604 | BEA WebLogic Scripts Server scripts Source Disclosure (3) |
11417 | MyAbraCadaWeb Cross Site Scripting |
11293 | CSCdx07754, CSCdx24622, CSCdx24632 |
11932 | BIND vulnerable to negative cache poison bug |
11715 | Header overflow against HTTP proxy |
11646 | Turba Path Disclosure |
10031 | bootparamd service |
10778 | Unprotected SiteScope Service |
11187 | 4553 Parasite Mothership Detect |
11936 | OS Identification, using icmp |
10172 | Passwordless HP LaserJet |
11335 | mibiisa overflow |
10575 | Check for IIS .cnf file leakage |
10220 | nlockmgr service |
10702 | Zope DoS |
11347 | Sendmail Local Starvation and Overflow |
10049 | Count.cgi |
10719 | MySQL Server version |
11387 | L2TP detection |
11506 | Quicktime player buffer overflow |
11679 | VisNetic and Titan FTP Server traversal |
11630 | php-proxima file reading |
10608 | OpenSSH 2.3.1 authentication bypass vulnerability |
10746 | Compaq WBEM Server Detection |
10801 | IMP Session Hijacking Bug |
11334 | popper_mod |
11343 | OpenSSH Client Unauthorized Remote Forwarding |
11460 | SMB Registry : Classic Logon Screen |
11457 | SMB Registry : Winlogon caches passwords |
11747 | TrendMicro Emanager software check |
10297 | Web server traversal |
11423 | Flaw in Windows Script Engine (Q814078) |
11026 | Access Point detection |
11448 | Siteframe Cross Site Scripting Bugs |
11856 | iPlanet unauthorized sensitive data retrieval |
12005 | WEBHANCER detection |
11317 | Discover HP JetDirect EWS Password via SNMP |
10540 | NSM format strings vulnerability |
10135 | LinuxConf grants network access |
10694 | GuildFTPd Directory Traversal |
10267 | SSH Server type and version |
11892 | Citrix redirection bug |
11828 | Exim Heap Overflow |
10396 | SMB shares access |
10638 | auktion.cgi |
11309 | Winreg registry key writeable by non-admins |
11047 | Jigsaw webserver MS/DOS device DoS |
10058 | Domino HTTP server exposes the set up of the filesystem |
11121 | xtel detection |
10185 | POP3 Server type and version |
11386 | Lotus Domino 6.0 vulnerabilities |
10634 | proftpd exhaustion attack |
10610 | way-board |
10373 | TalentSoft Web+ version detection |
10214 | database service |
10716 | OmniPro HTTPd 2.08 scripts source full disclosure |
10670 | PHP3 Physical Path Disclosure Vulnerability |
11755 | CesarFTP multiple overflows |
11558 | Macromedia ColdFusion MX Path Disclosure Vulnerability |
11004 | WhatsUp Gold Default Admin Account |
11492 | Sambar XSS |
11656 | Eserv Directory Index |
11483 | apcnisd detection |
10327 | Zeus shows the content of the cgi scripts |
10516 | multihtml cgi |
10936 | IIS XSS via 404 error |
11257 | Default password (manager) for system |
10537 | IIS directory traversal |
10665 | tektronix's _ncl_items.shtml |
10161 | rlogin -froot |
10407 | X Server |
10566 | mmstdod.cgi |
10228 | rusersd service |
11836 | myphpnuke code injection |
11273 | Invision PowerBoard code injection |
10886 | BIND vulnerable to DNS storm |
11832 | Visual Basic for Application Overflow |
10457 | The alerter service is running |
11903 | ping of death |
11988 | FSP Suite Directory Traversal Vulnerability |
11945 | sxdesign SIPd Status Server Detection |
11148 | Unchecked Buffer in Decompression Functions(Q329048) |
10127 | info2www |
10932 | IIS .HTR ISAPI filter applied |
11537 | Ocean12 Guestbook XSS |
11833 | EZsite Forum Discloses Passwords to Remote Users |
11071 | ASP source using %20 trick |
11255 | Default password (root) for root |
10973 | CSCdi34061 |
10389 | Cart32 ChangeAdminPassword |
10615 | Malformed PPTP Packet Stream vulnerability |
10371 | /iisadmpwd/aexp2.htr |
10490 | hpux ftpd PASS vulnerability |
10809 | Sendmail -bt option |
10558 | Exchange Malformed MIME header |
11265 | Default password (satori) for rewt |
10976 | CSCds04747 |
10180 | Ping the remote host |
10786 | Samba Remote Arbitrary File Creation |
10958 | ServletExec 4.1 / JRun ISAPI DoS |
11689 | Cisco IDS Device Manager Detection |
10366 | AnalogX denial of service |
11829 | RIP poisoning |
10374 | uw-imap buffer overflow after logon |
10237 | sunlink mapper service |
11295 | CSCdx39981 |
10552 | cgiforum |
10074 | Firewall/1 UDP port 0 DoS |
11353 | NFS fsirand |
10121 | /scripts directory browsable |
11882 | AOL Instant Messenger is Installed |
10588 | Sendmail mime overflow |
11027 | AlienForm CGI script |
11467 | JWalk server traversal |
11247 | Unpassworded sync account |
11880 | Fluxay Sensor Detection |
11819 | a tftpd server is running |
10300 | webgais |
10534 | FreeBSD 4.1.1 Finger |
10342 | Check for VNC |
11576 | thttpd directory traversal thru Host: |
11427 | LimeWire is installed |
11993 | Check for a Yahoo Messenger Instance |
11015 | Xerver web server DOS |
10823 | OpenSSH UseLogin Environment Variables |
11479 | paFileDB XSS |
10155 | Netscape Enterprise Server DoS |
10505 | Directory listing through WebDAV |
11792 | Buffer overrun in Windows Shell (821557) |
10276 | TCP Chorusing |
11954 | sgdynamo_path |
11697 | IRCXPro Default Admin password |
10790 | rwhois format string attack |
11445 | Basit cms Cross Site Scripting Bugs |
10963 | Compaq Web Based Management Agent Proxy Vulnerability |
11234 | Zope installation path disclose |
10891 | X Display Manager Control Protocol (XDMCP) |
11496 | RealPlayer PNG deflate heap corruption |
10245 | rsh |
11673 | Remote PC Access Server Detection |
10013 | alibaba.pl |
11811 | wu-ftpd fb_realpath() off-by-one overflow |
11678 | Super-M Son hServer Directory Traversal |
11561 | scriptlogic logging share |
11657 | Synchrologic User account information disclosure |
10961 | AirConnect Default Password |
10590 | SWAT allows user names to be obtained by brute force |
11554 | BadBlue Administrative Actions Vulnerability |
11905 | Checkpoint Firewall-1 UDP denial of service |
10758 | Check for VNC HTTP |
11168 | Samba Unicode Buffer Overflow |
10985 | CSCdv48261 |
10858 | SNMP bad length field DoS (2) |
11250 | Unpassworded backdoor account |
10424 | NAI Management Agent leaks info |
11147 | Unchecked Buffer in Windows Help(Q323255) |
10495 | htgrep |
11333 | webwho plus |
10499 | Local Security Policy Corruption |
11356 | Mountable NFS shares |
11913 | DCN HELLO detection |
10504 | Still Image Service Privilege Escalation patch |
11401 | texi.exe path disclosure |
10908 | Users in the Domain Admin group |
10513 | php file upload |
10888 | mod_ssl overflow |
10863 | SSL ciphers |
10777 | Zope ZClass permission mapping bug |
11399 | ClearTrust XSS |
10975 | CSCdp35794 |
10846 | SilverStream directory listing |
10037 | CERN httpd problem |
10051 | A CVS pserver is running |
11360 | Wordit Logbook |
11277 | clarkconnectd detection |
10304 | WebSpeed remote configuration |
10149 | NetBeans Java IDE |
10492 | IIS IDA/IDQ Path Disclosure |
10774 | ShopPlus Arbitrary Command Execution |
10232 | showfhd service |
10021 | Identd enabled |
11212 | Unchecked buffer in Locate Service |
10200 | RealServer G2 buffer overrun |
10927 | BlackIce DoS (ping flood) |
10836 | Agora CGI Cross Site Scripting |
10128 | infosrch.cgi |
10144 | Microsoft SQL TCP/IP listener is running |
10045 | Cisco 675 passwordless router |
10766 | Apache UserDir Sensitive Information Disclosure |
11671 | Ultimate PHP Board admin_ip.php code injection |
11763 | Kerio WebMail interface flaws |
11487 | Advanced Poll info.php |
10557 | WebShield |
11837 | OpenSSH < 3.7.1 |
11359 | UploadLite cgi |
11029 | Windows RAS overflow (Q318138) |
11825 | Polycom ViaVideo denial of service |
10867 | php POST file uploads |
12025 | Mambo Code injection Vulnerability |
10606 | HSWeb document path |
10709 | TESO in.telnetd buffer overflow |
10948 | qpopper options buffer overflow |
10184 | Various pop3 overflows |
10168 | Detect talkd server port and protocol version |
10915 | Local users information : User has never logged on |
11298 | axis2400 webcams |
10310 | Wingate denial of service |
10138 | MDaemon Webconfig crash |
10268 | SSH Insertion Attack |
11866 | Cafe Wordpress SQL injection |
11620 | Airport Administrative Port |
11669 | p-news Admin Access |
10290 | Upload cgi |
11389 | rsync modules |
10063 | Eserv traversal |
11003 | IIS Possible Compromise |
10451 | Dragon telnet overflow |
11857 | BIND Buffer overflows in the DNS stub resolver library |
10785 | SMB NativeLanMan |
10158 | NIS server |
11153 | Identifies unknown services with 'HELP' |
11943 | rsync heap overflow |
10382 | Atrium Mercur Mailserver |
10332 | ftp writeable directories |
11607 | Apache < 2.0.46 on OS/2 |
10452 | wu-ftpd SITE EXEC vulnerability |
11809 | mod_mylo overflow |
10686 | BroadVision Physical Path Disclosure Vulnerability |
10040 | cgitest.exe buffer overrun |
11370 | fpcount.exe overflow |
10675 | CheckPoint Firewall-1 Telnet Authentication Detection |
11036 | SMTP antivirus scanner DoS |
10244 | ypxfrd service |
10211 | amd service |
11663 | iiprotect bypass |
10807 | Jakarta Tomcat Path Disclosure |
11471 | VChat information disclosure |
11745 | Hosting Controller vulnerable ASP pages |
12004 | VCATCH detection |
11099 | Pi3Web Webserver v2.0 Buffer Overflow |
10727 | Buffer overflow in Solaris in.lpd |
11513 | Solaris lpd remote command execution |
11643 | OneOrZero SQL injection |
10150 | Using NetBIOS to retrieve information from a Windows host |
11478 | paFileDB SQL injection |
11589 | PT News Unauthorized Administrative Access |
10737 | Oracle Applications One-Hour Install Detect |
11987 | Detect FSP Compatible Hosts |
11086 | Sendmail custom configuration file |
10145 | Microsoft's SQL TCP/IP denial of service |
10295 | OmniHTTPd visadmin exploit |
10514 | Directory listing through Sambar's search.dll |
11297 | CSCdy38035 |
10307 | Trin00 for Windows Detect |
10724 | Cayman DSL router one char login |
11456 | PostgreSQL multiple flaws |
10078 | Microsoft Frontpage 'authors' exploits |
11703 | WordPress code/sql injection |
10085 | Ftp PASV denial of service |
10432 | SMB Registry : permissions of keys that can change common paths |
11878 | Buffer Overrun In HTML Converter Could Allow Code Execution (823559) |
10943 | Cumulative Patch for Internet Information Services (Q327696) |
11898 | Obtain /etc/passwd using NetInfo |
11838 | Sendmail prescan() overflow |
11292 | CSCdv88230, CSCdw22408 |
10833 | dtspcd overflow |
10518 | /doc/packages directory browsable ? |
11462 | Bugzilla Detection |
11644 | ezPublish Directory Cross Site Scripting |
11629 | Poster version.two privilege escalation |
11390 | rsync array overflow |
10906 | Users in the 'Replicator' group |
11384 | Public CVS pserver |
10916 | Local users information : Passwords never expires |
10894 | Obtains the lists of users groups |
11050 | php 4.2.x malformed POST |
10769 | Checks for listrec.pl |
10817 | Interactive Story Directory Traversal Vulnerability |
10157 | netstat |
10784 | ht://Dig's htsearch potential exposure/dos |
10036 | CDK Detect |
10866 | XML Core Services patch (Q318203) |
10321 | wwwboard passwd.txt |
11451 | textcounter.pl |
11572 | Multiple ICQ Vulnerabilities |
11542 | Web Wiz Forums database disclosure |
10580 | netscape imap buffer overflow after logon |
10736 | DCE Services Enumeration |
11989 | Exchange Privilege Escalation (832759) |
10167 | NTMail3 spam feature |
10365 | Windmail.exe allows any user to execute arbitrary commands |
11867 | SMB Registry : permissions of the Microsoft Transaction Server key |
10940 | Windows Terminal Service Enabled |
10343 | MySQLs accepts any password |
11082 | Boozt index.cgi overflow |
10481 | Unpassworded MySQL |
10459 | Poll It v2.0 cgi |
10318 | wu-ftpd buffer overflow |
11520 | HP Instant TopTools DoS |
10156 | Netscape FastTrack 'get' |
10094 | GirlFriend |
11830 | NetBIOS Name Service Reply Information Leakage |
11582 | TrueGalerie admin access |
10913 | Local users information : disabled accounts |
11431 | XoloX is installed |
11062 | BadBlue invalid GET DoS |
11773 | Linksys Gozila CGI denial of service |
10071 | Finger cgi |
11716 | Misconfigured Gnutella |
10663 | DHCP server info gathering |
11109 | Achievo code injection |
10999 | Linksys Router Default Password |
10404 | SMB log in as users |
10553 | SMB Registry : permissions of WinVNC's key |
11063 | LabView web server DoS |
10664 | perlcal |
10753 | AOLserver Default Password |
11482 | Post-Nuke information disclosure |
10246 | Sambar Web Server CGI scripts |
11692 | WebStores 2000 browse_item_details.asp SQL injection |
11404 | Multiple flaws in the Opera web browser |
10840 | Oracle 9iAS mod_plsql Buffer Overflow |
10075 | FormHandler.cgi |
11000 | MPEi/X Default Accounts |
11532 | Instaboard SQL injection |
10781 | Outlook Web anonymous access |
10972 | Multiple SSH vulnerabilities |
11397 | vpopmail.php command execution |
10433 | NT IP fragment reassembly patch not applied (jolt2) |
10857 | SNMP bad length field DoS |
11756 | CuteFTP multiple flaws |
11351 | Sendmail mail.local DOS |
10114 | icmp timestamp request |
11372 | HP-UX ftpd glob() Expansion STAT Buffer Overflow |
11331 | wu-ftpd PASV format string |
10427 | SMB Registry : permissions of HKLM |
11953 | cyrus-imsp abook_dbname buffer overflow |
11398 | Samba Fragment Reassembly Overflow |
11574 | Portable OpenSSH PAM timing attack |
11722 | cgiWebupdate.exe vulnerability |
10277 | AnyForm |
11536 | Super Guestbook config disclosure |
11322 | MS SQL Installation may leave passwords on system |
11275 | GOsa code injection |
11324 | phpping code execution |
10595 | DNS AXFR |
12020 | SQL injection in XTreme ASP Photo Gallery |
10478 | Tomcat's snoop servlet gives too much information |
10860 | SMB use host SID to enumerate local users |
11433 | Microsoft ISA Server DNS - Denial Of Service (MS03-009) |
10418 | Standard & Poors detection |
10655 | PHP-Nuke' opendir |
11782 | iXmail SQL injection |
10146 | Tektronix /ncl_items.html |
11190 | overflow.cgi detection |
11230 | Stronghold Swish |
11421 | smtpscan |
10804 | rwhois format string attack (2) |
10239 | tooltalk service |
10805 | Informix traversal |
10359 | ctss.idc check |
11938 | SQL injection in phpBB (2) |
11912 | wu-ftpd ls -W memory exhaustion |
11400 | texi.exe information disclosure |
10750 | phpMyExplorer dir traversal |
10434 | NT ResetBrowser frame & HostAnnouncement flood patc |
11549 | readfile.tcl |
11087 | Sendmail queue manipulation & destruction |
10847 | SilverStream database structure |
10242 | yppasswd service |
11652 | Mantis Detection |
11226 | Oracle 9iAS default error information disclosure |
10033 | CA Unicenter's Transport Service is running |
10627 | ROADS' search.pl |
11849 | ProFTPd ASCII upload overflow |
11282 | Nuked-Klan function execution |
10388 | Cassandra NNTP Server DoS |
10787 | tooltalk format string |
11124 | mldonkey telnet |
11009 | Lotus Domino Banner Information Disclosure Vulnerability |
10279 | Teardrop |
10461 | Check for RealServer DoS |
10844 | ASP.NET Cross Site Scripting |
11984 | INN Control Message overflow |
10522 | LPRng malformed input |
10344 | Detect the presence of Napster |
10752 | Apache Auth Module SQL Insertion Attack |
11891 | LinkSys EtherFast Router Denial of Service Attack |
10704 | Apache Directory Listing |
11344 | Domino traversal |
11227 | Oracle 9iAS SOAP Default Configuration Vulnerability |
10313 | WindowsNT PPTP flood denial |
10291 | uploader.exe |
10969 | Obtain Cisco type via SNMP |
11929 | SAP DB detection |
11573 | SmallFTP traversal |
10355 | vqServer web traversal vulnerability |
10637 | Sedum DoS |
11361 | Mambo Site Server Cookie Validation |
10415 | Sambar sendmail /session/sendmail |
11459 | SMB Registry : Do not show the last user name |
11518 | Checkpoint Firewall open Web adminstration |
11653 | Mantis Multiple Flaws |
10073 | Finger redirection check |
11101 | PHPAdsNew code injection |
11204 | Apache Tomcat Default Accounts |
10449 | SMB Registry : value of SFCDisable |
10810 | PHP-Nuke Gallery Add-on File View |
10312 | WindowsNT DNS flood denial |
11744 | Post-Nuke SQL injection |
11320 | The remote BIND has dynamic updates enabled |
11957 | Aardvark Topsites Multiple Vulnerabilities |
12014 | FREE COMMUNITY detection |
10542 | UltraSeek 3.1.x Remote DoS |
11883 | Gator/GAIN Spyware Installed |
10356 | Microsoft's Index server reveals ASP source code |
10426 | SMB Registry : permissions of Schedule |
11024 | p-smash DoS (ICMP 9 flood) |
11647 | BLnews code injection |
10782 | Formmail Version Information Disclosure |
11581 | album.pl Command Execution |
11090 | AppSocket DoS |
10108 | Hyperbomb |
10107 | HTTP Server type and version |
10166 | Windows NT ftp 'guest' account |
11231 | Unchecked Buffer in XP Redirector (Q810577) |
10041 | Cobalt RaQ2 cgiwrap |
11032 | Directory Scanner |
11476 | DCP-Portal Code Injection |
10525 | LPC and LPC Ports Vulnerabilities patch |
11814 | xfstt possible code execution |
11299 | MySQL double free() |
10711 | Sambar webserver pagecount hole |
11173 | Savant cgitest.exe buffer overflow |
11923 | Frontpage Overflow (MS03-051) |
11735 | Mnogosearch overflows |
10890 | HTTP NIDS evasion |
10104 | HP LaserJet direct print |
10689 | Netscape Enterprise '../' buffer overflow |
11002 | DNS Server Detection |
11788 | Apache < 2.0.47 |
11600 | NetCharts Server Default Password |
11391 | BSD ftpd setproctitle() format string |
11243 | Unpassworded 4Dgifts account |
11704 | icmp leak |
10005 | NetSphere Backdoor |
10706 | McAfee myCIO Directory Traversal |
10202 | remwatch |
10032 | CA Unicenter's File Transfer Service is running |
11757 | NGC ActiveFTP Denial of Service |
10989 | Nortel/Bay Networks default password |
10323 | XTramail control denial |
11019 | Alcatel PABX 4400 detection |
10526 | IIS : Directory listing through WebDAV |
10441 | AFS client version |
10422 | MDBMS overflow |
10981 | CSCdt65960 |
10103 | HP LaserJet display hack |
10775 | E-Shopping Cart Arbitrary Command Execution (WebDiscount) |
10206 | Rover pop3 overflow |
10189 | proftpd mkdir buffer overflow |
11527 | XMB Cross Site Scripting |
11535 | SheerDNS directory traversal |
11768 | proftpd mod_sql injection |
10118 | IIS FTP server crash |
10949 | BEA WebLogic Scripts Server scripts Source Disclosure (2) |
11477 | DCP-Portal Path Disclosure |
11028 | IIS .HTR overflow |
11264 | Default password (wh00t!) for root |
11563 | Oracle LINK overflow |
10357 | RDS / MDAC Vulnerability (msadcs.dll) located |
10466 | WFTP RNTO DoS |
10562 | Master Index directory traversal vulnerability |
10487 | WFTP 2.41 rc11 multiple DoS |
11272 | ISMail overflow |
10962 | Cabletron Web View Administrative Access |
11328 | Kietu code injection |
10412 | SMB Registry : Autologon |
10234 | sprayd service |
12002 | LOP.COM detection |
11498 | Alexandria-dev upload spoofing |
11368 | Cross-Referencing Linux (lxr) file reading |
11995 | BONZI BUDDY detection |
11705 | LeapFTP Overflow |
10697 | WebLogic Server DoS |
10086 | Ftp PASV on connect crashes the FTP server |
11708 | zentrack files reading |
11648 | BlackMoon FTP user disclosure |
10394 | SMB log in |
11211 | GameSpy detection |
10259 | Sendmail mailing to files |
11279 | Webmin Session ID Spoofing |
10822 | Multiple WarFTPd DoS |
10053 | DeepThroat |
11085 | Personal Web Sharing overflow |
10957 | JServ Cross Site Scripting |
10633 | Savant DoS |
10421 | Rockliffe's MailSite overflow |
11444 | PHP Mail Function Header Spoofing Vulnerability |
10048 | Communigate Pro overflow |
10479 | Roxen Server /%00/ bug |
10528 | Nortel Networks passwordless router (manager level) |
10469 | ipop2d reads arbitrary files |
10257 | SmartServer pop3 overflow |
10538 | iWS shtml overflow |
11820 | Postfix Multiple Vulnerabilities |
11801 | Format string on HTTP method name |
11323 | Security issues in the remote version of FlashPlayer |
10895 | Users information : automatically disabled accounts |
11453 | Kebi Academy Directory Traversal |
11754 | List of printers is available through CUPS |
10077 | Microsoft Frontpage exploits |
11222 | Writesrv |
11169 | SSH setsid() vulnerability |
10196 | qpopper buffer overflow |
11196 | Cyrus IMAP pre-login buffer overrun |
11693 | PFTP clear-text passwords |
11598 | MailMax IMAP overflows |
11631 | Drag And Zip Overflow |
10191 | ProFTPd pre6 buffer overflow |
10028 | Determine which version of BIND name daemon is running |
10476 | WebsitePro buffer overflow |
11599 | Ocean12 Database Download |
10286 | thttpd flaw |
10406 | IIS Malformed Extension Data in URL |
10173 | perl interpreter can be launched as a CGI |
11674 | BaSoMail SMTP Command HELO overflow |
10325 | Xtramail pop3 overflow |
10596 | Tinyproxy heap overflow |
11304 | Unchecked buffer in SQLXML |
10600 | ICECast Format String |
11289 | CSCdu35577 |
10072 | Finger dot at host feature |
11198 | BitKeeper remote command execution |
11948 | Avotus mm File Retrieval attempt |
11851 | myServer 0.4.3 Directory Traversal Vulnerability |
11711 | FTP Voyager Overflow |
11290 | CSCdu82823 |
10744 | VisualRoute Web Server Detection |
10381 | Piranha's RH6.2 default password |
11968 | DameWare Mini Remote Control Information Disclosure |
11734 | Argosoft DoS |
11976 | EasyDynamicPages code injection |
10700 | Cisco IOS HTTP Configuration Arbitrary Administrative Access |
11804 | Cumulative Patch for MS SQL Server (815495) |
11985 | Zope Multiple Vulnerabilities |
10402 | CVSWeb detection |
10641 | mailnews.cgi |
11727 | CWmail.exe vulnerability |
10681 | Netscape Messenging Server User List |
11749 | Vignette StoryServer TCL code injection |
10878 | Sun Cobalt Adaptive Firewall Detection |
10408 | Insecure Napster clone |
10997 | JRun directory traversal |
11842 | MySQL password handler overflaw |
10549 | BIND vulnerable to ZXFR bug |
11524 | Coppermine Gallery Remote Command Execution |
11910 | Mercur SMTP server AUTH overflow |
11855 | RemoteNC detection |
11060 | OpenSSL overflow (generic test) |
10377 | RealServer denial of Service |
10671 | IIS Remote Command Execution |
11481 | mod_auth_any command execution |
10358 | /iisadmin is world readable |
11632 | CSCdx17916, CSCdx61997 |
11213 | http TRACE XSS attack |
10905 | Users in the 'Print Operator' group |
10081 | FTP bounce check |
11053 | IMC SMTP EHLO Buffer Overrun |
10205 | rlogin |
10763 | Detect the HTTP RPC endpoint mapper |
11158 | Novell NetWare HTTP POST Perl Code Execution Vulnerability |
11921 | Buffer Overflow in the Workstation Service (828749) |
11144 | Flaw in Certificate Enrollment Control (Q323172) |
12018 | POWER SEARCH detection |
10849 | Oracle 9iAS DAD Admin interface |
10568 | bftpd format string vulnerability |
11215 | Flaw in SMB Signing Could Enable Group Policy to be Modified (329170) |
10851 | Oracle 9iAS Java Process Manager |
11664 | nsiislog.dll DoS |
11472 | viewpage.php arbitrary file reading |
10453 | sawmill allows the reading of the first line of any file |
10380 | rsh on finger output |
11810 | gallery xss |
11262 | Default password (D13hh[) for root |
11717 | Lotus Domino SMTP bounce DoS |
11241 | Unpassworded EZsetup account |
10438 | Netwin's DMail ETRN overflow |
10111 | iParty |
11051 | BIND9 DoS |
10221 | nsed service |
11743 | Post-Nuke Multiple XSS |
11308 | MS SMTP Authorization bypass |
11649 | Blackmoon FTP stores passwords in cleartext |
11064 | BadBlue invalid null byte vulnerability |
11013 | Cisco VoIP phones DoS |
10113 | icmp netmask request |
10301 | websendmail |
10164 | nph-publish.cgi |
11927 | TelCondex Simple Webserver Buffer Overflow |
10178 | php.cgi buffer overrun |
11774 | Windows Media Player Library Access |
11965 | SIP Express Router Register Buffer Overflow |
10403 | DBMan CGI server information leakage |
10918 | Apache-SSL overflow |
11070 | PGPMail.pl detection |
11271 | IMail account hijack |
11284 | typo3 arbitrary file reading |
11207 | War FTP Daemon USER/PASS Overflow |
11232 | Sendmail DNS Map TXT record overflow |
10165 | nph-test-cgi |
10125 | Imap buffer overflow |
10351 | The ACC router shows configuration without authentication |
10582 | HTTP version spoken |
11802 | Flaw in Windows Function may allow DoS (823803) |
11519 | mod_jk chunked encoding DoS |
11942 | VP-ASP shopsearch SQL injection |
10088 | Writeable FTP root |
11493 | Sambar Default Accounts |
10529 | Nortel Networks passwordless router (user level) |
11870 | Microsoft's SQL version less than or equal to 7 |
10536 | Anaconda remote file retrieval |
10585 | IIS FrontPage DoS |
11684 | rot13sj.cgi |
10850 | Oracle 9iAS Globals.jsa access |
10497 | Microsoft Frontpage DoS |
11579 | FTgate DoS |
11940 | CuteNews debug info disclosure |
10503 | Reading CGI script sources using /cgi-bin-sdb |
11458 | SMB Registry : No dial in |
10830 | zml.cgi Directory Traversal |
10194 | Proxy accepts POST requests |
11229 | phpinfo.php |
10991 | IIS Global.asa Retrieval |
11686 | mod_gzip format string attack |
11615 | ttforum multiple flaws |
10249 | EXPN and VRFY commands |
10930 | HTTP Windows 98 MS/DOS device names DOS |
10523 | thttpd ssi file retrieval |
10225 | rje mapper service |
10530 | Passwordless Alcatel ADSL Modem |
11706 | Spyke Flaws |
10880 | AdMentor Login Flaw |
11192 | multiple MySQL flaws |
10658 | Oracle tnslsnr version query |
11056 | CSCdy03429 |
10683 | iPlanet Certificate Management Traversal |
10413 | SMB Registry : is the remote host a PDC/BDC |
10657 | NT IIS 5.0 Malformed HTTP Printer Request Header Buffer Overflow Vulnerability |
12000 | SAHAGENT detection |
10091 | FTPGate traversal |
11758 | eLDAPo cleartext passwords |
11772 | Generic SMTP overflows |
10645 | ustorekeeper |
11635 | Java Media Framework (JMF) Vulnerability |
11603 | MacOS X Directory Service DoS |
11765 | scan for UPNP/Tcp hosts |
10622 | PPTP detection and versioning |
10436 | INN version check (2) |
11209 | Apache < 2.0.44 DOS device name |
10806 | RPC Endpoint Mapper can Cause RPC Service to Fail |
10186 | Portal of Doom |
10208 | 3270 mapper service |
11439 | Xoops path disclosure |
11641 | BadBlue Remote Administrative Interface Access |
11791 | CISCO IOS Interface blocked by IPv4 Packet |
11154 | Unknown services banners |
11822 | RIP detection |
10919 | Check open ports |
10551 | Obtain network interfaces list via SNMP |
10012 | Alibaba 2.0 buffer overflow |
11305 | Proxy accepts gopher:// requests |
11654 | ShareMailPro Username Identification |
10944 | MUP overlong request kernel overflow Patch (Q311967) |
11033 | Misc information on News server |
10934 | MS FTPd DoS |
11610 | testcgi.exe Cross Site Scripting |
10561 | cisco 675 http DoS |
10317 | wrap |
10467 | ftp.pl shows the listing of any dir |
11449 | ezPublish Cross Site Scripting Bugs |
10483 | Unpassworded PostgreSQL |
11739 | pmachine code injection |
11533 | Web Wiz Site News database disclosure |
11680 | Webfroot Shoutbox Directory Traversal |
11106 | NetTools command execution |
11771 | WebAdmin detection |
10798 | Unprotected PC Anywhere Service |
10006 | PC Anywhere |
10816 | Webalizer Cross Site Scripting Vulnerability |
10799 | IBM-HTTP-Server View Code |
11296 | CSCdx54675 |
11179 | vBulletin's Calender Command Execution Vulnerability |
10629 | Lotus Domino administration databases |
10852 | Oracle 9iAS Jsp Source File Reading |
11475 | 3com RAS 1500 DoS |
10650 | VirusWall's catinfo overflow |
10560 | SuSE's identd overflow |
11495 | tanned format string vulnerability |
11040 | HTTP TRACE |
10019 | Ascend Kill |
10703 | SMTP Authentication Error |
11827 | Netware Perl CGI overflow |
11007 | ActiveState Perl directory traversal |
11141 | Crash SMC AP |
10238 | tfsd service |
10477 | Tomcat's /admin is world readable |
11355 | Buffer overflow in AIX lpd |
11888 | Buffer Overrun in Messenger Service (828035) |
10256 | SLMail MTA 'HELO' denial |
11414 | IMAP Banner |
11312 | DHCP server overflow / format string bug |
10154 | Netscape Enterprise 'Accept' buffer overflow |
10743 | Tripwire for Webpages Detection |
11434 | IBM Tivoli Relay Overflow |
11102 | Awol code injection |
10008 | WebSite 1.0 buffer overflow |
11165 | vpasswd.cgi |
10725 | SIX Webboard's generate.cgi |
10201 | Relative IP Identification number change |
11858 | TTL Anomaly detection |
10348 | ows-bin |
10970 | GSR ACL pub |
10456 | SMB enum services |
10728 | Determine if Bind 9 is running |
10379 | LCDproc server detection |
11039 | mod_ssl off by one |
10612 | commerce.cgi |
10821 | FTPD glob Heap Corruption |
10462 | Amanda client version |
11005 | LocalWeb2000 remote read |
11729 | ion-p.exe vulnerability |
11978 | Flash FTP Server Directory Traversal Vulnerability |
10978 | CSCds66191 |
10416 | Sambar /sysadmin directory 2 |
10506 | calendar_admin.pl |
11503 | cc_guestbook.pl XSS |
10009 | AIX FTPd buffer overflow |
11588 | YaBB SE command execution |
11170 | Alcatel OmniSwitch 7700/7800 switches backdoor |
11806 | paFileDB command execution |
11057 | Raptor Weak ISN |
10892 | Obtains user information |
10835 | Unchecked Buffer in XP upnp |
10581 | Cold Fusion Administration Page Overflow |
11181 | WebSphere Host header overflow |
10705 | SimpleServer remote execution |
11112 | Generic FTP traversal |
10574 | PHPix directory traversal vulnerability |
10384 | IRIX Objectserver |
10594 | Oracle XSQL Stylesheet Vulnerability |
11614 | Novell FTP DoS |
11089 | Webseal denial of service |
11821 | Dropbear SSH server format string vulnerability |
11886 | Vulnerability in Authenticode Verification Could Allow Remote Code Execution (823182) |
12026 | phpix remote command execution |
10042 | Chameleon SMTPd overflow |
11794 | WebCalendar file reading |
10592 | webdriver |
12009 | ALEXA detection |
10874 | Rich Media E-Commerce Stores Sensitive Information Insecurely |
10482 | NetBIOS Name Server Protocol Spoofing patch |
10882 | SSH protocol version 1 enabled |
11329 | The remote host is infected by a virus |
11403 | iPlanet Application Server Buffer Overflow |
10215 | etherstatd service |
10993 | IIS ASP.NET Application Trace Enabled |
10921 | RemotelyAnywhere SSH detection |
10768 | DoSable squid proxy server |
11962 | Xoops myheader.php URL Cross Site Scripting Vulnerability |
10423 | qpopper euidl problem |
10187 | Cognos Powerplay WE Vulnerability |
10393 | spin_client.cgi buffer overrun |
11710 | FlashFXP Overflow |
10673 | Microsoft's SQL Blank Password |
10572 | IIS 5.0 Sample App vulnerable to cross-site scripting attack |
10210 | alis service |
11861 | Default password (ibmdb2) for db2fenc1 |
10611 | pals-cgi |
11429 | Windows Messenger is installed |
10007 | ShowCode possible |
10248 | Sendmail 'decode' flaw |
11736 | gnocatan multiple buffer overflows |
10420 | Gauntlet overflow |
10902 | Users in the Admin group |
11877 | myPHPcalendar injection |
11751 | Dune Web Server Overflow |
11346 | Sendmail 8.7.*/8.8.* local overflow |
11805 | e107 database dump |
11540 | PPTP overflow |
11045 | Passwordless Zaurus FTP server |
11818 | The remote host is infected by msblast.exe |
11893 | Gnu Cfserv remote buffer overflow |
10429 | SMB Registry : permissions of winlogon |
10134 | Linux 2.1.89 - 2.2.3 : 0 length fragment bug |
10320 | Too long URL |
11737 | NetGear Router Default Password |
11637 | MailMax IMAP overflows (2) |
11083 | ibillpm.pl |
10652 | cfingerd format string attack |
10362 | ASP source using ::$DATA trick |
11895 | SCO OpenServer multiple vulnerabilities |
10712 | quickstore traversal |
10635 | Marconi ASX DoS |
11555 | AN HTTPd count.pl file truncation |
10811 | ActivePerl perlIS.dll Buffer Overflow |
11489 | myguestbk admin access |
10120 | IIS perl.exe problem |
10454 | sawmill password |
11651 | Batalla Naval Overflow |
10904 | Users in the 'Backup Operator' group |
10489 | AnalogX web server traversal |
11515 | AutomatedShops WebC.cgi installed |
10593 | phorum's common.cgi |
11951 | DNS Server Fingerprint |
11698 | SQL injection in XPression Software |
10302 | robot(s).txt exists on the Web Server |
11020 | NetCommerce SQL injection |
11164 | SOCKS4 username overflow |
11301 | Unchecked buffer in MDAC Function |
10524 | SMB Windows9x password verification vulnerability |
11713 | Desktop Orbiter Remote Reboot |
11970 | CVS pserver CVSROOT passwd file cmd exec |
11688 | WF-Chat User Account Disclosure |
10203 | rexecd |
10721 | ncbook/book.cgi |
11505 | Ecartis Username Spoofing |
10569 | Zope Image updating Method |
10669 | A1Stats Traversal |
11306 | Unchecked buffer in ASP.NET worker process |
10666 | AppleShare IP Server status query |
11395 | Microsoft Frontpage XSS |
11800 | Linux nfs-utils xlog() off-by-one overflow |
11889 | Exchange XEXCH50 Remote Buffer Overflow |
10212 | automountd service |
10910 | Obtains local user information |
11640 | CesarFTP stores passwords in cleartext |
10262 | Mail relaying |
11590 | MPC SoftWeb Guestbook database disclosure |
11742 | Magic WinMail Format string |
10471 | Guild FTPd tells if a given file exists |
10087 | FTP real path |
11721 | CgiMail.exe vulnerability |
10617 | Checkpoint SecureRemote detection |
11110 | SMB null param count DoS |
11081 | Oracle9iAS too long URL |
11074 | OfficeScan configuration file disclosure |
10795 | Lotus Notes ?OpenServer Information Disclosure |
11194 | Unchecked Buffer in XP Shell Could Enable System Compromise (329390) |
10353 | Interscan 3.32 SMTP Denial |
11618 | Remote host replies to SYN+FIN |
11824 | phptonuke directory traversal |
11061 | HTTP version number overflow |
10990 | FTP Service Allows Any Username |
10687 | Too long POST command |
11129 | HTTP 1.1 header overflow |
11666 | Post-Nuke information disclosure (2) |
11907 | BGP detection |
11480 | 3com RAS 1500 configuration disclosure |
10853 | Oracle 9iAS mod_plsql cross site scripting |
11839 | Possible RPC Interface compromise |
10605 | BIND vulnerable to overflows |
11035 | AnalogX SimpleServer:WWW DoS |
11405 | dmisd service |
11244 | Unpassworded OutOfBox account |
11685 | mod_gzip running |
11507 | Apache < 2.0.45 |
10729 | Sendmail 8.11 local overflow |
11118 | alya.cgi |
11281 | cpanel remote command execution |
11117 | phpPgAdmin arbitrary files reading |
10739 | Novell Web Server NDS Tree Browsing |
11890 | Buffer Overrun in Messenger Service (real test) |
11152 | BIND vulnerable to cached RR overflow |
10271 | stream.c |
10347 | ICQ Denial of Service attack |
10057 | Lotus Domino ?open Vulnerability |
10484 | Read any file thanks to ~nobody/ |
11920 | Word and/or Excel may allow arbitrary code to run |
11813 | Linux 2.4 NFSv3 DoS |
12007 | WORLDFLASH detection |
11547 | CSCea42030 |
11638 | biztalk server flaws |
11718 | Lotus /./ database lock |
10771 | OpenSSH 2.5.x -> 2.9.x adv.option |
11077 | HTTP Cookie overflow |
10352 | Netscape Server ?wp bug |
10625 | IMAP4rev1 buffer overflow after logon |
10385 | ht://Dig's htsearch reveals web server path |
10160 | Nortel Contivity DoS |
11500 | Beanwebb's guestbook |
10756 | MacOS X Finder reveals contents of Apache Web directories |
11166 | KF Web Server /%00 bug |
11037 | WEB-INF folder accessible |
11860 | Default password (db2fenc1) for db2fenc1 |
11095 | webcart.cgi |
10734 | IrDA access violation patch |
11982 | phpGedView Code injection Vulnerability |
10442 | NAI PGP Cert Server DoS |
11195 | SSH Multiple Vulns |
11340 | SSH Secure-RPC Weak Encrypted Authentication |
10691 | Netscape Enterprise INDEX request problem |
10425 | NAI Management Agent overflow |
10520 | PIX's smtp content filtering |
11567 | CommunigatePro Hijacking |
10738 | Oracle Web Administration Server Detection |
11550 | OpenBB SQL injection |
11935 | IPSEC IKE detection |
10110 | iChat |
10252 | Shells in /cgi-bin |
11748 | Various dangerous cgi scripts |
11568 | StockMan Shopping Cart Path disclosure |
11210 | Apache < 2.0.44 file reading on Win32 |
11041 | Apache Tomcat /servlet Cross Site Scripting |
11238 | Anti Nessus defenses |
11796 | Forum51/Board51/News51 Users Disclosure |
10693 | NTLMSSP Privilege Escalation |
11930 | Resin /caucho-status accessible |
11874 | IIS Service Pack - 404 |
10699 | IIS FrontPage DoS II |
11569 | StockMan Shopping Cart Command Execution |
11583 | Microsoft Shlwapi.dll Malformed HTML form tag DoS |
10409 | SubSeven |
10018 | Knox Arkeia buffer overflow |
11662 | iiprotect sql injection |
10299 | webdist.cgi |
10488 | FTP Serv-U 2.5e DoS |
11011 | SMB on port 445 |
10142 | MS Personal WebServer ... |
10084 | ftp USER, PASS or HELP overflow |
10174 | pfdispaly |
10555 | Domain account lockout vulnerability |
11787 | SMB Request Handler Buffer Overflow |
12019 | WILDTANGENT detection |
10839 | PHP.EXE / Apache Win32 Arbitrary File Reading Vulnerability |
11465 | args.bat |
10897 | Users information : disabled accounts |
11609 | mod_survey ENV tags SQL injection |
10950 | rpc.walld format string |
11031 | OpenSSH <= 3.3 |
11659 | ArGoSoft Mail Server multiple flaws |
11862 | Default password (db2inst1) for db2inst1 |
10883 | OpenSSH Channel Code Off by 1 |
10035 | Campas |
10236 | statmon service |
11385 | CVS pserver double free() bug |
11864 | Default password (db2as) for db2as |
10563 | Incomplete TCP/IP packet vulnerability |
10480 | Apache::ASP source.asp |
10554 | RealServer Memory Content Disclosure |
10346 | Mercur WebView WebClient |
10602 | hsx directory traversal |
10437 | NFS export |
11105 | ARCserve hidden share |
10515 | Too long authorization |
11541 | Buffer overrun in NT kernel message handling |
10928 | EFTP buffer overflow |
10440 | Check for Apache Multiple / vulnerability |
10861 | IE 5.01 5.5 6.0 Cumulative patch |
10282 | test-cgi |
11865 | SOCKS server detection |
10260 | HELO overflow |
10298 | Webcart misconfiguration |
11750 | Psunami.CGI Command Execution |
10330 | Services |
11286 | Flaw in WinXP Help center could enable file deletion |
11450 | Debian proftpd 1.2.0 runs as root |
10808 | DoSable Oracle WebCache server |
11695 | Pi3Web Webserver v2.0 Denial of Service |
10519 | Telnet Client NTLM Authentication Vulnerability |
10251 | rpc.nisd overflow |
10016 | AN-HTTPd tests CGIs |
11790 | Buffer overrun in RPC Interface (823980) |
11486 | WebLogic management servlet |
11937 | mod_python malformed query |
11601 | MailMaxWeb Path Disclosure |
10052 | Daytime |
11183 | HTTP negative Content-Length buffer overflow |
10333 | Linux TFTP get file |
11514 | Netgear ProSafe Router password disclosure |
10101 | Home Free search.cgi directory traversal |
11473 | EMule DoS |
11933 | Exclude AppSocket & socketAPI printers |
10942 | Check for a Citrix server |
10204 | rfpoison |
10613 | Oracle XSQL Sample Application Vulnerability |
10532 | eXtropia Web Store remote file retrieval |
11577 | MDaemon IMAP CREATE overflow |
10647 | ntpd overflow |
10661 | IIS 5 .printer ISAPI filter applied |
11111 | rpcinfo -p |
11789 | Flaw in message handling through utility mgr |
10713 | CodeRed version X detection |
11956 | Invision Power Top Site List SQL Injection |
11318 | BIND 9 overflow |
10677 | Apache /server-status accessible |
10759 | Private IP address leaked in HTTP headers |
10639 | store.cgi |
10862 | Microsoft's SQL Server Brute Force |
11447 | Nuked-klan Cross Site Scripting Bugs |
12017 | NCASE detection |
11746 | AspUpload vulnerability |
11548 | bttlxeForum SQL injection |
11235 | Too long OPTIONS parameter |
10865 | Checks for MS HOTFIX for snmp buffer overruns |
10875 | Avenger's News System Command Execution |
11926 | NIPrint LPD-LPR Print Server |
10283 | TFN Detect |
10004 | IIS possible DoS using ExAir's search |
11986 | Detect STUN Server |
11658 | SunONE Application Server source disclosure |
10233 | snmp service |
10931 | Quake3 Arena 1.29 f/g DOS |
11373 | SunFTP Buffer Overflow |
11463 | Bugzilla Multiple Flaws |
11046 | Apache Tomcat TroubleShooter Servlet Installed |
11761 | phpMyAdmin multiple flaws |
11712 | OpenSSH Reverse DNS Lookup bypass |
11560 | WebServer 4D GET Buffer Overflow |
11326 | Cumulative VM update |
10224 | rexd service |
11001 | MRTG mrtg.cgi File Disclosure |
11149 | HTTP login page |
11184 | vxworks ftpd buffer overflow Denial of Service |
10460 | bb-hostsvc.sh |
11021 | irix rpc.passwd overflow |
11872 | ODBC tools check |
10076 | formmail.pl |
10946 | Gnutella servent detection |
10417 | Sambar /cgi-bin/mailit.pl installed ? |
10124 | Imail's imonitor buffer overflow |
11348 | Sendmail long debug local overflow |
10240 | walld service |
10960 | ServletExec 4.1 ISAPI Physical Path Disclosure |
10369 | Microsoft Frontpage dvwssr.dll backdoor |
10632 | Webserver file request parsing |
10117 | IIS 'GET ../../' |
11967 | DameWare Mini Remote Control Service Installed |
11048 | Resin DOS device path disclosure |
10029 | BIND vulnerable |
10115 | idq.dll directory traversal |
10132 | Kuang2 the Virus |
11157 | Trojan horses |
11691 | Desktop Orbiter Server Detection |
11552 | mod_ntlm overflow / format string bug |
11408 | Apache < 2.0.43 |
11617 | Horde and IMP test disclosure |
10226 | rquotad service |
11078 | HTTP header overflow |
11139 | wpoison (nasl version) |
10024 | BackOrifice |
10350 | Shaft Detect |
10465 | CVSWeb 1.80 gives a shell to cvs committers |
10020 | + + + ATH0 modem hangup |
11120 | xtelw detection |
10923 | Squid overflows |
10419 | Lotus MAIL FROM overflow |
10493 | SWC Overflow |
11325 | Word can lead to Script execution on mail reply |
11740 | Infinity CGI Exploit Scanner |
11509 | GTcatalog password disclosure |
11291 | CSCdv66718 |
10907 | Guest belongs to a group |
10760 | Alcatel ADSL modem with firewalling off |
11049 | Worldspan gateway DOS |
11628 | WebLogic Certificates Spoofing |
10139 | MDaemon Worldclient crash |
10003 | IIS possible DoS using ExAir's query |
11675 | Philboard philboard_admin.ASP Authentication Bypass |
10783 | PCCS-Mysql User/Password Exposure |
11779 | FTP server hosting copyrighted material |
11287 | CSCdt56514 |
11731 | VsSetCookie.exe vulnerability |
10626 | MySQL various flaws |
11578 | Opera remote heap corruption vulnerability |
11919 | HMAP |
10586 | news desk |
11719 | admin.cgi overflow |
11363 | Gupta SQLBase EXECUTE buffer overflow |
12006 | Web3000 detection |
11798 | RPC DCOM Interface DoS |
10050 | CSM Mail server MTA 'HELO' denial |
10491 | ASP/ASA source using Microsoft Translate f: bug |
10685 | IIS ISAPI Overflow |
11559 | Network Chemistry Wireless Sensor Detection |
11307 | Unchecked buffer in Windows Shell |
11437 | osCommerce Cross Site Scripting Bugs |
11440 | Bonsai Mutiple Flaws |
11709 | SmartFTP Overflow |
11461 | Adcycle Password Disclosure |
10197 | qpopper LIST buffer overflow |
11816 | phpWebSite multiple flaws |
11436 | guestbook tr3 password storage |
11925 | Zebra and Quagga Remote DoS |
11119 | SMB Registry : XP Service Pack version |
10947 | mod_python handle abuse |
10305 | WFTP login check |
10106 | Htmlscript |
10455 | Buffer Overrun in ITHouse Mail Server v1.04 |
11455 | Passwordless frontpage installation |
11846 | shareaza P2P check |
10779 | CGIEmail's CGICso (Send CSO via CGI) Command Execution Vulnerability |
10209 | X25 service |
10649 | processit |
11971 | NETObserve Authentication Bypass vulnerability |
10583 | dcforum |
10056 | /doc directory browsable ? |
10263 | SMTP Server type and version |
11730 | ndcgi.exe vulnerability |
11452 | Oracle 9iAS web admin |
11668 | Webfroot shoutbox file inclusion |
11088 | Sendmail debug mode leak |
10039 | /cgi-bin directory browsable ? |
10644 | anacondaclip CGI vulnerability |
11220 | Netscape /.perf accessible |
10953 | Authentication bypassing in Lotus Domino |
11841 | sadmind command execution |
11138 | Citrix published applications |
10521 | Extent RBS ISP |
11871 | Find if IIS server allows BASIC and/or NTLM authentication |
10068 | Finger |
10311 | Wingate POP3 USER overflow |
10473 | MiniVend Piped command |
11122 | Libwhisker options |
11014 | Cisco Aironet Telnet DoS |
10559 | XMail APOP Overflow |
11342 | PKCS 1 Version 1.5 Session Key Retrieval |
11203 | Motorola Vanguard with No Password |
11499 | Sendmail buffer overflow due to type conversion |
11733 | Bugbear.B worm |
11246 | Unpassworded lp account |
10859 | SMB get host SID |
10230 | sched service |
10435 | Imate HELO overflow |
10509 | Malformed RPC Packet patch |
11997 | DSSAGENT detection |
10450 | Dragon FTP overflow |
10170 | OShare |
10250 | Sendmail redirection check |
12027 | Bagle remover |
10231 | selection service |
10584 | technote's main.cgi |
11623 | miniPortail Cookie Admin Access |
10678 | Apache /server-info accessible |
10339 | TFTP get file |
10292 | uw-imap buffer overflow |
11114 | Canna Overflow |
11939 | foxweb CGI |
11795 | AtomicBoard file reading |
10802 | OpenSSH < 3.0.1 |
11072 | Basilix webmail dummy request vulnerability |
11875 | OpenSSL overflow via invalid certificate passing |
10754 | Cisco password not set |
10987 | CSCdw67458 |
11126 | SOCKS4A hostname overflow |
10609 | empower cgi path |
11497 | E-Theni code injection |
10130 | ipop2d buffer overflow |
10770 | sglMerchant Information Disclosure Vulnerability |
10392 | rfparalyze |
11419 | Office files list |
11443 | Microsoft IIS UNC Mapped Virtual Host Vulnerability |
11915 | Apache < 1.3.29 |
10340 | rpm_query CGI |
10767 | Tests for Nimda Worm infected HTML files |
11319 | GTcatalog code injection |
11958 | osCommerce Malformed Session ID XSS Vulnerability |
11096 | Avirt gateway insecure telnet proxy |
10881 | SSH protocol versions supported |
10486 | Relative Shell Path patch |
10745 | WorldClient for MDaemon Server Detection |
11766 | pmachine cross site scripting |
11584 | webweaver FTP DoS |
10589 | iPlanet Directory Server traversal |
11916 | PostgreSQL to_ascii() overflow |
11944 | Snif File Disclosure |
10314 | Winnuke |
11330 | MS SQL7.0 Service Pack may leave passwords on system |
10679 | directory pro web traversal |
12015 | IPINSIGHT detection |
11859 | Default password (ibmdb2) for db2inst1 |
11702 | zentrack code injection |
11396 | hp jetdirect vulnerabilities |
11564 | Coppermine Gallery SQL injection |
11612 | PXE server overflow |
10929 | FTP Windows 98 MS/DOS device names DOS |
10879 | Shell Command Execution Vulnerability |
11175 | Too long line |
11879 | Compaq Web-based Management Login |
11224 | Oracle 9iAS SOAP configuration file retrieval |
10066 | FakeBO buffer overflow |
10401 | SMB Registry : NT4 Service Pack version |
10151 | NetBus 1.x |
10218 | llockmgr service |
10854 | Oracle 9iAS mod_plsql directory traversal |
10855 | Oracle XSQLServlet XSQLConfig.xml File |
11700 | ImageFolio Default Password |
11182 | DB4Web directory traversal |
11010 | WebSphere Cross Site Scripting |
11973 | BulletScript MailList bsml.pl Information Disclosure |
11428 | Trillian is installed |
10281 | Detect Server type and version via Telnet |
11208 | Netscape Enterprise Default Administrative Password |
12016 | MAPQUEST TOOLBAR detection |
10545 | Cisco Catalyst Web Execution |
11908 | EGP detection |
10387 | cisco http DoS |
10914 | Local users information : Never changed password |
11538 | ezPublish config disclosure |
11469 | SimpleChat information disclosure |
11785 | ProductCart SQL Injection |
10364 | netscape publishingXpert 2 PSUser problem |
10690 | GoodTech ftpd DoS |
10303 | WebSite pro reveals the physical file path of web directories |
11259 | Unpassworded StoogR account |
11350 | Sendmail ETRN command DOS |
10360 | newdsn.exe check |
10986 | CSCdw19195 |
11422 | Unconfigured web server |
12001 | SaveNOW detection |
11608 | Neoteris IVE XSS |
11596 | SLMail WebMail overflows |
11420 | Sun portmap xdrmem_getbytes() overflow |
11161 | RDS / MDAC Vulnerability Content-Type overflow |
10443 | Predictable TCP sequence number |
11193 | akfingerd |
10764 | Shopping Cart Arbitrary Command Execution (Hassan) |
10819 | PIX Firewall Manager Directory Traversal |
11783 | Multiple IRC daemons format string attack |
11762 | StoneGate client authentication detection |
11256 | Default password (guest) for guest |
10349 | sojourn.cgi |
10399 | SMB use domain SID to enumerate users |
11539 | NB1300 router default FTP account |
11972 | miniBB cross site scripting |
10428 | SMB fully accessible registry |
10676 | CheckPoint Firewall-1 Web Authentication Detection |
10828 | SysV /bin/login buffer overflow (rlogin) |
11626 | Owl Login bypass |
11732 | Webnews.exe vulnerability |
10275 | Systat |
11177 | Flaw in Microsoft VM Could Allow Code Execution (810030) |
11508 | Xoops XSS |
11575 | Kerio personal Firewall buffer overflow |
11221 | Pages Pro CD directory traversal |
11720 | S-HTTP detection |
11280 | Usermin Session ID Spoofing |
10361 | SalesLogix Eviewer WebApp crash |
10539 | Useable remote name server |
11018 | MS Site Server Information Leak |
11338 | Lotus Domino Vulnerabilities |
10757 | Check for Webmin |
10199 | RealServer Ramgen crash (ramcrash) |
10604 | Allaire JRun Directory Listing |
11991 | File Disclosure in PHP Manpage |
10181 | PlusMail vulnerability |
10797 | ColdFusion Debug Mode |
11947 | CVS pserver dir create bug |
11128 | redhat Interchange |
10531 | SMB Registry : Win2k Service Pack version |
10967 | Shambala web server DoS |
10093 | GateCrasher |
11941 | Linksys WRT54G DoS |
10198 | Quote of the day |
11202 | Enhydra Multiserver Default Password |
11156 | IRC daemon identification |
11969 | PHPCatalog SQL injection |
10794 | PC Anywhere TCP |
11528 | Flaw in Microsoft VM (816093) |
10996 | JRun Sample Files |
11769 | Zope Invalid Query Path Disclosure |
11491 | Sambar default CGI info disclosure |
11815 | IMP_MIME_Viewer_html class XSS vulnerabilities |
10692 | ftpd strtok() stack overflow |
11251 | Unpassworded tutor account |
10837 | FAQManager Arbitrary File Reading Vulnerability |
10547 | Enumerate Lanman services via SNMP |
11622 | mod_ssl wildcard DNS cross site scripting vulnerability |
10047 | CMail's MAIL FROM overflow |
10264 | Default community names of the SNMP Agent |
10207 | Roxen counter module |
11902 | jolt2 |
11374 | SunFTP directory traversal |
10055 | Sendmail 8.8.3 and 8.8.4 mime conversion overflow |
11949 | Snif Cross Site Scripting |
11140 | UDDI detection |
10628 | php IMAP overflow |
10909 | Brute force login (Hydra) |
11510 | BIND 4.x resolver overflow |
11738 | RADIUS server detection |
11667 | b2 cafelog code injection |
11924 | POST with empty Content-Length |
10812 | libgtop_daemon format string |
11426 | Kazaa is installed |
10814 | Allaire JRun directory browsing vulnerability |
11239 | Hidden WWW server name |
10030 | Bonk |
10885 | MS SMTP DoS |
11066 | SunSolve CD CGI user input validation |
10717 | SHOUTcast Server DoS detector vulnerability |
12021 | Remote Code Execution in ezContents |
11038 | SMTP settings |
11752 | Proxomitron DoS |
10856 | PHP-Nuke sql_debug Information Disclosure |
11178 | Unchecked Buffer in PPTP Implementation Could Enable DOS Attacks (Q329834) |
11362 | Simple File Manager Filename Script Injection |
11043 | iPlanet Search Engine File Viewing |
10326 | Yahoo Messenger Denial of Service attack |
10945 | Opening Group Policy Files (Q318089) |
11780 | mailreader.com directory traversal and arbitrary command execution |
10672 | Unknown CGIs arguments torture |
10447 | Zope DocumentTemplate package problem |
10896 | Users information : Can't change password |
10222 | nsemntd service |
11485 | Flaw in RPC Endpoint Mapper (MS03-010) |
10017 | Annex DoS |
11655 | D-Link router overflow |
10080 | Linux FTP backdoor |
11188 | X Font Service Buffer Overflow |
11468 | php socket_iovec_alloc() integer overflow |
10329 | BIND iquery overflow |
11511 | Kerberos IV cryptographic weaknesses |
10219 | nfsd service |
11624 | SHOUTcast Server logfiles XSS |
11410 | Notes detection |
10533 | Web Shopper remote file retrieval |
11127 | HTTP 1.0 header overflow |
11441 | Mambo Site Server 4.0.10 XSS |
11435 | ActiveSync packet overflow |
11591 | 12Planet Chat Server ClearText Password |
10100 | Handler |
10002 | IIS possible DoS using ExAir's advsearch |
10877 | GroupWise Web Interface 'HELP' hole |
11545 | Xeneo Web Server 2.2.9.0 DoS |
11767 | SQL injection in phpBB |
10095 | glimpse |
11803 | DirectX MIDI Overflow (819696) |
11543 | mod_access_referer 1.0.2 NULL pointer dereference |
10718 | DCShop exposes sensitive files |
10294 | view_source |
10619 | Malformed request to domain controller |
11278 | Quicktime/Darwin Remote Admin Exploit |
10951 | cachefsd overflow |
10548 | Enumerate Lanman shares via SNMP |
10884 | NTP read variables |
11354 | Buffer overflow in FreeBSD 2.x lpd |
10367 | TalentSoft Web+ Input Validation Bug Vulnerability |
11352 | Sendmail Parsing Redirection DOS |
11411 | Backup CGIs download |
11797 | IRCd OperServ Raw Join DoS |
11339 | scp File Create/Overwrite |
11817 | StellarDocs Path Disclosure |
10439 | OpenSSH < 2.1.1 UseLogin feature |
10660 | Oracle tnslsnr security |
10761 | Detect CIS ports |
10372 | /scripts/repost.asp |
10682 | CISCO view-source DoS |
10994 | IPSwitch IMail SMTP Buffer Overflow |
11160 | Windows Administrator NULL FTP password |
10162 | Notes MTA denial |
10803 | Redhat Stronghold File System Disclosure |
10829 | scan for UPNP hosts |
11876 | gallery code injection (2) |
11332 | wu-ftpd glob vulnerability (2) |
10747 | 3Com Superstack II switch with default password |
11245 | Unpassworded root account |
11901 | spank.c |
11676 | Post-Nuke Rating System Denial Of Service |
11854 | FsSniffer Detection |
10646 | Lion worm |
10789 | Novell Groupwise WebAcc Information Disclosure |
11570 | MDaemon DELE DoS |
11863 | Default password (ibmdb2) for db2as |
11358 | The remote portmapper forwards NFS requests |
11133 | Generic format string |
10097 | GroupWise buffer overflow |
11075 | dwhttpd format string |
10319 | wu-ftpd SITE NEWER vulnerability |
10708 | SSH 3.0.0 |
11402 | iPlanet Application Server Detection |
10255 | SLMail:27 denial of service |
10243 | ypupdated service |
11430 | WinMX is installed |
10780 | CGIEmail's Cross Site Scripting Vulnerability (cgicso) |
11155 | LiteServe URL Decoding DoS |
11639 | Web-ERP Configuration File Remote Access |
10316 | WinSATAN |
10043 | Chargen |
11681 | Zeus Admin Interface XSS |
11687 | CrobFTP format string |
10567 | SMB Registry : permissions of the RAS key |
10001 | ColdFusion Vulnerability |
10153 | Netscape Server ?PageServices bug |
10474 | GAMSoft TelSrv 1.4/1.5 Overflow |
11438 | Apache Tomcat Directory Listing and File disclosure |
11665 | Apache < 2.0.46 |
11100 | eXtremail format strings |
10285 | thttpd 2.04 buffer overflow |
11634 | Proxy Web Server Cross Site Scripting |
10591 | pagelog.cgi |
11724 | WebLogic source code disclosure |
10027 | bigconf |
11137 | Apache < 1.3.27 |
10748 | Mediahouse Statistics Web Server Detect |
10642 | SMB Registry : SQL7 Patches |
10800 | Obtain OS type via SNMP |
11315 | webchat code injection |
10640 | Kerberos PingPong attack |
11677 | ST FTP traversal |
10912 | Local users information : Can't change password |
10659 | snmpXdmid overflow |
10901 | Users in the 'Account Operator' group |
10247 | Sendmail DEBUG |
11470 | WebChat XSS |
10363 | ASP source using %2e trick |
10308 | cgibin() in the KB |
11134 | QMTP |
10636 | Orange DoS |
11775 | Sambar CGIs path disclosure |
11534 | Microsoft ISA Server Winsock Proxy DoS (MS03-012) |
11690 | JBoss source disclosure |
10287 | Traceroute |
11952 | FlashPlayer files reading |
10054 | Delegate overflow |
11616 | DBTools DBManager Information Disclosure |
11885 | Buffer Overrun in the ListBox and in the ComboBox (824141) |
11108 | Omron WorldView Wnn Overflow |
max_hosts | 16 | |
max_checks | 10 | |
log_whole_attack | yes | |
cgi_path | /cgi-bin | |
port_range | 1-1024 | |
optimize_test | yes | |
language | english | |
checks_read_timeout | 5 | |
non_simult_ports | 139, 445 | |
plugins_timeout | 320 | |
safe_checks | yes | |
auto_enable_dependencies | yes | |
use_mac_addr | no | |
save_knowledge_base | yes | |
kb_restore | no | |
only_test_hosts_whose_kb_we_dont_have | no | |
only_test_hosts_whose_kb_we_have | no | |
kb_dont_replay_scanners | no | |
kb_dont_replay_info_gathering | no | |
kb_dont_replay_attacks | no | |
kb_dont_replay_denials | no | |
kb_max_age | 864000 | |
plugin_upload | no | |
plugin_upload_suffixes | .nasl, .inc | |
slice_network_addresses | no | |
ntp_save_sessions | yes | |
ntp_detached_sessions | yes | |
server_info_nessusd_version | 2.0.10 | |
server_info_libnasl_version | 2.0.10 | |
server_info_libnessus_version | 2.0.10 | |
server_info_thread_manager | fork | |
server_info_os | Linux | |
server_info_os_version | 2.6.6-via5 | |
reverse_lookup | yes | |
ntp_keep_communication_alive | yes | |
ntp_opt_show_end | yes | |
save_session | yes | |
detached_scan | no | |
continuous_scan | no |
Host | Holes | Warnings | Open ports | State |
20.0.0.1 | 0 | 3 | 2 | Finished |
Service | Severity | Description |
unknown (515/tcp) | Port is open | |
www (80/tcp) | Port is open | |
general/tcp | Nessus was not able to reliably identify the remote operating system. It might be: Netilla Service Platform 4.0 The fingerprint differs from these known signatures on 5 points. If you know what operating system this host is running, please send this signature to os-signatures@nessus.org : :1:1:0:64:0:64:1:0:64:1:0:64:1:>64:64:0:1:1:1:1:1:1:1:0:64:4344:MSTNW:0:1:1 | |
general/tcp | The remote host does not discard TCP SYN packets which have the FIN flag set. Depending on the kind of firewall you are using, an attacker may use this flaw to bypass its rules. See also : http://archives.neohapsis.com/archives/bugtraq/2002-10/0266.html http://www.kb.cert.org/vuls/id/464113 Solution : Contact your vendor for a patch Risk factor : Medium BID : 7487 | |
general/udp | For your information, here is the traceroute to 20.0.0.1 : 20.0.0.2 20.0.0.1 |