Network Vulnerability Assessment Report |
| |
Sorted by host names |
| |||||||||
|
Id | Name |
10951 | cachefsd overflow |
11484 | apcupsd overflows |
11315 | webchat code injection |
10318 | wu-ftpd buffer overflow |
10949 | BEA WebLogic Scripts Server scripts Source Disclosure (2) |
10542 | UltraSeek 3.1.x Remote DoS |
10723 | LDAP allows anonymous binds |
10746 | Compaq WBEM Server Detection |
10411 | klogind overflow |
10600 | ICECast Format String |
11536 | Super Guestbook config disclosure |
10230 | sched service |
11748 | Various dangerous cgi scripts |
10713 | CodeRed version X detection |
10009 | AIX FTPd buffer overflow |
10335 | tcp connect() scan |
11596 | SLMail WebMail overflows |
10699 | IIS FrontPage DoS II |
10568 | bftpd format string vulnerability |
11717 | Lotus Domino SMTP bounce DoS |
11721 | CgiMail.exe vulnerability |
11446 | DCP-Portal Cross Site Scripting Bugs |
10507 | Sun's Java Web Server remote command execution |
10748 | Mediahouse Statistics Web Server Detect |
11191 | WM_TIMER Message Handler Privilege Elevation (Q328310) |
10027 | bigconf |
10320 | Too long URL |
11719 | admin.cgi overflow |
10465 | CVSWeb 1.80 gives a shell to cvs committers |
11601 | MailMaxWeb Path Disclosure |
10719 | MySQL Server version |
10144 | Microsoft SQL TCP/IP listener is running |
10877 | GroupWise Web Interface 'HELP' hole |
11346 | Sendmail 8.7.*/8.8.* local overflow |
10129 | INN version check |
11370 | fpcount.exe overflow |
10740 | SiteScope Web Managegment Server Detect |
10357 | RDS / MDAC Vulnerability (msadcs.dll) located |
11707 | Bugbear.B web backdoor |
11033 | Misc information on News server |
10422 | MDBMS overflow |
11359 | UploadLite cgi |
11301 | Unchecked buffer in MDAC Function |
10528 | Nortel Networks passwordless router (manager level) |
11662 | iiprotect sql injection |
11373 | SunFTP Buffer Overflow |
11751 | Dune Web Server Overflow |
10605 | BIND vulnerable to overflows |
11365 | Auction Deluxe XSS |
11049 | Worldspan gateway DOS |
10196 | qpopper buffer overflow |
11266 | Unpassworded jill account |
11728 | ddicgi.exe vulnerability |
11052 | BenHur Firewall active FTP firewall leak |
11343 | OpenSSH Client Unauthorized Remote Forwarding |
11498 | Alexandria-dev upload spoofing |
11586 | FileMakerPro Detection |
11766 | pmachine cross site scripting |
10982 | CSCdt93866 |
10848 | Oracle 9iAS Dynamic Monitoring Services |
10380 | rsh on finger output |
11631 | Drag And Zip Overflow |
10690 | GoodTech ftpd DoS |
11344 | Domino traversal |
10689 | Netscape Enterprise '../' buffer overflow |
10021 | Identd enabled |
11331 | wu-ftpd PASV format string |
10431 | SMB Registry : missing winreg |
10416 | Sambar /sysadmin directory 2 |
10029 | BIND vulnerable |
11224 | Oracle 9iAS SOAP configuration file retrieval |
11566 | .rhosts in FTP root |
10020 | + + + ATH0 modem hangup |
10959 | ServletExec 4.1 ISAPI File Reading |
10764 | Shopping Cart Arbitrary Command Execution (Hassan) |
10954 | OpenSSH AFS/Kerberos ticket/token passing |
11130 | BrowseGate HTTP headers overflows |
11624 | SHOUTcast Server logfiles XSS |
10617 | Checkpoint SecureRemote detection |
11623 | miniPortail Cookie Admin Access |
11118 | alya.cgi |
11305 | Proxy accepts gopher:// requests |
11134 | QMTP |
11037 | WEB-INF folder accessible |
10956 | Codebrws.asp Source Disclosure Vulnerability |
11167 | Webserver4everyone too long URL |
10189 | proftpd mkdir buffer overflow |
10552 | cgiforum |
11297 | CSCdy38035 |
10968 | ping.asp |
11736 | gnocatan multiple buffer overflows |
10152 | NetBus 2.x |
11014 | Cisco Aironet Telnet DoS |
10350 | Shaft Detect |
10691 | Netscape Enterprise INDEX request problem |
11778 | Web Server hosting copyrighted material |
10260 | HELO overflow |
10393 | spin_client.cgi buffer overrun |
11592 | 12Planet Chat Server Path Disclosure |
11564 | Coppermine Gallery SQL injection |
10996 | JRun Sample Files |
10796 | scan for LaBrea tarpitted hosts |
11685 | mod_gzip running |
10207 | Roxen counter module |
10671 | IIS Remote Command Execution |
10466 | WFTP RNTO DoS |
10281 | Detect Server type and version via Telnet |
11506 | Quicktime player buffer overflow |
10124 | Imail's imonitor buffer overflow |
10069 | Finger zero at host feature |
11724 | WebLogic source code disclosure |
10851 | Oracle 9iAS Java Process Manager |
11173 | Savant cgitest.exe buffer overflow |
10461 | Check for RealServer DoS |
10652 | cfingerd format string attack |
10089 | FTP ServU CWD overflow |
11654 | ShareMailPro Username Identification |
10153 | Netscape Server ?PageServices bug |
10727 | Buffer overflow in Solaris in.lpd |
10434 | NT ResetBrowser frame & HostAnnouncement flood patc |
11070 | PGPMail.pl detection |
11388 | l2tpd < 0.68 overflow |
10330 | Services |
11453 | Kebi Academy Directory Traversal |
11247 | Unpassworded sync account |
10412 | SMB Registry : Autologon |
11249 | Unpassworded jack account |
11438 | Apache Tomcat Directory Listing and File disclosure |
11330 | MS SQL7.0 Service Pack may leave passwords on system |
11417 | MyAbraCadaWeb Cross Site Scripting |
11016 | xtux server detection |
10415 | Sambar sendmail /session/sendmail |
11314 | Buffer overflow in Microsoft Telnet |
11464 | ad.cgi |
10623 | Savant original form CGI access |
10516 | multihtml cgi |
11630 | php-proxima file reading |
11700 | ImageFolio Default Password |
10687 | Too long POST command |
10758 | Check for VNC HTTP |
11284 | typo3 arbitrary file reading |
11447 | Nuked-klan Cross Site Scripting Bugs |
11497 | E-Theni code injection |
10592 | webdriver |
11387 | L2TP detection |
10165 | nph-test-cgi |
10490 | hpux ftpd PASS vulnerability |
10231 | selection service |
11254 | Unpassworded friday account |
11532 | Instaboard SQL injection |
10123 | Imail's imap buffer overflow |
11476 | DCP-Portal Code Injection |
10567 | SMB Registry : permissions of the RAS key |
10228 | rusersd service |
10113 | icmp netmask request |
11093 | EFTP installation directory disclosure |
11767 | SQL injection in phpBB |
11340 | SSH Secure-RPC Weak Encrypted Authentication |
11781 | iXmail arbitrary file upload |
11223 | Oracle 9iAS access to SOAP documentation |
11067 | Microsoft's SQL Hello Overflow |
10254 | SLMail denial of service |
10221 | nsed service |
10462 | Amanda client version |
10743 | Tripwire for Webpages Detection |
10323 | XTramail control denial |
11009 | Lotus Domino Banner Information Disclosure Vulnerability |
11526 | Vignette StoryServer Information Disclosure |
10798 | Unprotected PC Anywhere Service |
11308 | MS SMTP Authorization bypass |
11150 | Tomcat servlet engine MD/DOS device names denial of service |
10268 | SSH Insertion Attack |
10995 | Sun JavaServer Default Admin Password |
11604 | BEA WebLogic Scripts Server scripts Source Disclosure (3) |
10901 | Users in the 'Account Operator' group |
11378 | MySQL mysqld Privilege Escalation Vulnerability |
10937 | IIS FrontPage ISAPI Denial of Service |
10880 | AdMentor Login Flaw |
11451 | textcounter.pl |
11007 | ActiveState Perl directory traversal |
10679 | directory pro web traversal |
11081 | Oracle9iAS too long URL |
11398 | Samba Fragment Reassembly Overflow |
10773 | MacOS X Finder reveals contents of Apache Web files |
10108 | Hyperbomb |
10929 | FTP Windows 98 MS/DOS device names DOS |
10932 | IIS .HTR ISAPI filter applied |
10162 | Notes MTA denial |
11164 | SOCKS4 username overflow |
10609 | empower cgi path |
10300 | webgais |
11178 | Unchecked Buffer in PPTP Implementation Could Enable DOS Attacks (Q329834) |
11147 | Unchecked Buffer in Windows Help(Q323255) |
10363 | ASP source using %2e trick |
11135 | Bugbear worm |
10243 | ypupdated service |
10471 | Guild FTPd tells if a given file exists |
11201 | Nortel/Bay Networks/Xylogics Annex default password |
11642 | Helix RealServer Buffer Overrun |
10065 | EZShopper 3.0 |
10909 | Brute force login (Hydra) |
11309 | Winreg registry key writeable by non-admins |
10543 | Lotus Domino SMTP overflow |
10046 | Cisco DoS |
10876 | Delta UPS Daemon Detection |
10070 | Finger backdoor |
11190 | overflow.cgi detection |
11174 | HTTP negative Content-Length DoS |
11287 | CSCdt56514 |
10344 | Detect the presence of Napster |
10731 | HealthD detection |
11175 | Too long line |
10659 | snmpXdmid overflow |
10706 | McAfee myCIO Directory Traversal |
11328 | Kietu code injection |
11364 | Sendmail Forward File Privilege Escalation Vulnerability |
11034 | SMTP antivirus filter |
11774 | Windows Media Player Library Access |
11035 | AnalogX SimpleServer:WWW DoS |
10492 | IIS IDA/IDQ Path Disclosure |
11182 | DB4Web directory traversal |
11568 | StockMan Shopping Cart Path disclosure |
10063 | Eserv traversal |
10419 | Lotus MAIL FROM overflow |
11242 | Unpassworded demos account |
10218 | llockmgr service |
10312 | WindowsNT DNS flood denial |
11485 | Flaw in RPC Endpoint Mapper (MS03-010) |
11513 | Solaris lpd remote command execution |
10647 | ntpd overflow |
11614 | Novell FTP DoS |
10303 | WebSite pro reveals the physical file path of web directories |
11723 | PDGSoft Shopping cart vulnerability |
10209 | X25 service |
11047 | Jigsaw webserver MS/DOS device DoS |
10075 | FormHandler.cgi |
11429 | Windows Messenger is installed |
10931 | Quake3 Arena 1.29 f/g DOS |
11652 | Mantis Detection |
11622 | mod_ssl wildcard DNS cross site scripting vulnerability |
10769 | Checks for listrec.pl |
10261 | Sendmail mailing to programs |
11562 | The ScriptLogic service is running |
11391 | BSD ftpd setproctitle() format string |
11640 | CesarFTP stores passwords in cleartext |
10042 | Chameleon SMTPd overflow |
10574 | PHPix directory traversal vulnerability |
10306 | whois_raw |
11563 | Oracle LINK overflow |
11771 | WebAdmin detection |
10843 | ASP.NET path disclosure |
11559 | Network Chemistry Wireless Sensor Detection |
10403 | DBMan CGI server information leakage |
10270 | Stacheldraht Detect |
11107 | viralator |
10109 | SCO i2odialogd buffer overrun |
10094 | GirlFriend |
11211 | GameSpy detection |
11581 | album.pl Command Execution |
10893 | Obtains the lists of users aliases |
10234 | sprayd service |
10808 | DoSable Oracle WebCache server |
11181 | WebSphere Host header overflow |
11333 | webwho plus |
10304 | WebSpeed remote configuration |
10205 | rlogin |
10942 | Check for a Citrix server |
10025 | bb-hist.sh |
10637 | Sedum DoS |
10458 | The messenger service is running |
10558 | Exchange Malformed MIME header |
11713 | Desktop Orbiter Remote Reboot |
10454 | sawmill password |
10694 | GuildFTPd Directory Traversal |
11657 | Synchrologic User account information disclosure |
11603 | MacOS X Directory Service DoS |
10343 | MySQLs accepts any password |
10613 | Oracle XSQL Sample Application Vulnerability |
11087 | Sendmail queue manipulation & destruction |
10402 | CVSWeb detection |
10286 | thttpd flaw |
11711 | FTP Voyager Overflow |
10508 | PFTP login check |
11578 | Opera remote heap corruption vulnerability |
11152 | BIND vulnerable to cached RR overflow |
10506 | calendar_admin.pl |
10894 | Obtains the lists of users groups |
10753 | AOLserver Default Password |
11149 | HTTP login page |
11036 | SMTP antivirus scanner DoS |
11710 | FlashFXP Overflow |
10738 | Oracle Web Administration Server Detection |
11745 | Hosting Controller vulnerable ASP pages |
11257 | Default password (manager) for system |
11355 | Buffer overflow in AIX lpd |
10102 | HotSync Manager Denial of Service attack |
10715 | BEA WebLogic Scripts Server scripts Source Disclosure |
11739 | pmachine code injection |
10423 | qpopper euidl problem |
10184 | Various pop3 overflows |
11137 | Apache < 1.3.27 |
11507 | Apache < 2.0.45 |
11337 | mountd overflow |
11611 | counter.php file overwrite |
11747 | TrendMicro Emanager software check |
10776 | Power Up Information Disclosure |
11250 | Unpassworded backdoor account |
11619 | Eserv Memory Leaks |
10132 | Kuang2 the Virus |
10981 | CSCdt65960 |
10832 | Kcms Profile Server |
10206 | Rover pop3 overflow |
11560 | WebServer 4D GET Buffer Overflow |
10815 | Web Server Cross Site Scripting |
10425 | NAI Management Agent overflow |
11299 | MySQL double free() |
11217 | Microsoft's SQL Version Query |
11441 | Mambo Site Server 4.0.10 XSS |
11060 | OpenSSL overflow (generic test) |
10482 | NetBIOS Name Server Protocol Spoofing patch |
10024 | BackOrifice |
11045 | Passwordless Zaurus FTP server |
11218 | Tomcat /status information disclosure |
10515 | Too long authorization |
11694 | P-Synch multiple issues |
10293 | vftpd buffer overflow |
11491 | Sambar default CGI info disclosure |
10381 | Piranha's RH6.2 default password |
11206 | War FTP Daemon Directory Traversal |
10801 | IMP Session Hijacking Bug |
10854 | Oracle 9iAS mod_plsql directory traversal |
10836 | Agora CGI Cross Site Scripting |
11517 | Leafnode Resource Exhaustion |
10519 | Telnet Client NTLM Authentication Vulnerability |
11402 | iPlanet Application Server Detection |
11304 | Unchecked buffer in SQLXML |
10505 | Directory listing through WebDAV |
10840 | Oracle 9iAS mod_plsql Buffer Overflow |
11192 | multiple MySQL flaws |
11558 | Macromedia ColdFusion MX Path Disclosure Vulnerability |
10957 | JServ Cross Site Scripting |
11577 | MDaemon IMAP CREATE overflow |
11746 | AspUpload vulnerability |
11672 | Bandmin XSS |
10965 | SSH 3 AllowedAuthentication |
10135 | LinuxConf grants network access |
11599 | Ocean12 Database Download |
11663 | iiprotect bypass |
10685 | IIS ISAPI Overflow |
11667 | b2 cafelog code injection |
10944 | MUP overlong request kernel overflow Patch (Q311967) |
11163 | msmmask.exe |
10366 | AnalogX denial of service |
11714 | Non-Existant Page Physical Path Disclosure Vulnerability |
10905 | Users in the 'Print Operator' group |
10636 | Orange DoS |
10134 | Linux 2.1.89 - 2.2.3 : 0 length fragment bug |
11017 | directory.php |
10211 | amd service |
11606 | WebLogic Server hostname disclosure |
10194 | Proxy accepts POST requests |
11487 | Advanced Poll info.php |
10594 | Oracle XSQL Stylesheet Vulnerability |
11742 | Magic WinMail Format string |
10361 | SalesLogix Eviewer WebApp crash |
10362 | ASP source using ::$DATA trick |
11023 | lpd, dvips and remote command execution |
11122 | Libwhisker options |
11496 | RealPlayer PNG deflate heap corruption |
10925 | Oracle Jserv Executes outside of doc_root |
11265 | Default password (satori) for rewt |
11091 | Windows Network Manager Privilege Elevation (Q326886) |
10116 | IIS buffer overflow |
11425 | ICQ is installed |
10579 | bftpd chown overflow |
10368 | Dansie Shopping Cart backdoor |
10923 | Squid overflows |
11486 | WebLogic management servlet |
10097 | GroupWise buffer overflow |
10978 | CSCds66191 |
11347 | Sendmail Local Starvation and Overflow |
10589 | iPlanet Directory Server traversal |
10500 | Shiva Integrator Default Password |
11696 | IRCXPro Clear Text Passwords |
11071 | ASP source using %20 trick |
10236 | statmon service |
10510 | EFTP carriage return DoS |
10467 | ftp.pl shows the listing of any dir |
11508 | Xoops XSS |
10164 | nph-publish.cgi |
11428 | Trillian is installed |
10339 | TFTP get file |
10340 | rpm_query CGI |
11288 | CSCdu15622 |
10258 | Sendmail's from piped program |
10980 | CSCdt62732 |
11489 | myguestbk admin access |
10418 | Standard & Poors detection |
11058 | rusersd output |
11552 | mod_ntlm overflow / format string bug |
10973 | CSCdi34061 |
10225 | rje mapper service |
11521 | Abyss httpd crash |
10830 | zml.cgi Directory Traversal |
11111 | rpcinfo -p |
11165 | vpasswd.cgi |
10457 | The alerter service is running |
10347 | ICQ Denial of Service attack |
11264 | Default password (wh00t!) for root |
11692 | WebStores 2000 browse_item_details.asp SQL injection |
10839 | PHP.EXE / Apache Win32 Arbitrary File Reading Vulnerability |
10444 | JRun's viewsource.jsp |
10371 | /iisadmpwd/aexp2.htr |
10969 | Obtain Cisco type via SNMP |
10974 | CSCdi36962 |
10428 | SMB fully accessible registry |
10708 | SSH 3.0.0 |
10288 | Trin00 Detect |
10698 | WebLogic Server /%00/ bug |
10849 | Oracle 9iAS DAD Admin interface |
10481 | Unpassworded MySQL |
10452 | wu-ftpd SITE EXEC vulnerability |
10672 | Unknown CGIs arguments torture |
10593 | phorum's common.cgi |
11240 | Unpassworded guest account |
11286 | Flaw in WinXP Help center could enable file deletion |
10245 | rsh |
10033 | CA Unicenter's Transport Service is running |
11159 | MS RPC Services null pointer reference DoS |
10305 | WFTP login check |
10948 | qpopper options buffer overflow |
10240 | walld service |
10563 | Incomplete TCP/IP packet vulnerability |
11020 | NetCommerce SQL injection |
10757 | Check for Webmin |
11542 | Web Wiz Forums database disclosure |
10922 | CVS/Entries |
11383 | CSCdz60229, CSCdy87221, CSCdu75477 |
10122 | imagemap.exe |
11319 | GTcatalog code injection |
11730 | ndcgi.exe vulnerability |
11569 | StockMan Shopping Cart Command Execution |
10693 | NTLMSSP Privilege Escalation |
11101 | PHPAdsNew code injection |
10653 | Solaris FTPd tells if a user exists |
11610 | testcgi.exe Cross Site Scripting |
11768 | proftpd mod_sql injection |
11041 | Apache Tomcat /servlet Cross Site Scripting |
11185 | vxworks ftpd buffer overflow |
10586 | news desk |
10607 | SSH1 CRC-32 compensation attack |
10235 | statd service |
11779 | FTP server hosting copyrighted material |
10077 | Microsoft Frontpage exploits |
10310 | Wingate denial of service |
10710 | Checkpoint SecuRemote information leakage |
11553 | Bugzilla XSS and insecure temporary filenames |
11493 | Sambar Default Accounts |
11626 | Owl Login bypass |
10255 | SLMail:27 denial of service |
11200 | Platinum FTP Server |
11153 | Identifies unknown services with 'HELP' |
10850 | Oracle 9iAS Globals.jsa access |
11246 | Unpassworded lp account |
11139 | wpoison (nasl version) |
10356 | Microsoft's Index server reveals ASP source code |
10187 | Cognos Powerplay WE Vulnerability |
10442 | NAI PGP Cert Server DoS |
10435 | Imate HELO overflow |
11511 | Kerberos IV cryptographic weaknesses |
10373 | TalentSoft Web+ version detection |
11258 | Default password (glftpd) for glftpd |
10821 | FTPD glob Heap Corruption |
10554 | RealServer Memory Content Disclosure |
10674 | Microsoft's SQL UDP Info Query |
10804 | rwhois format string attack (2) |
10883 | OpenSSH Channel Code Off by 1 |
10663 | DHCP server info gathering |
11488 | IMP SQL injection |
10537 | IIS directory traversal |
10159 | News Server type and version |
10468 | Netscape Administration Server admin password |
11602 | HappyMall Command Execution |
10673 | Microsoft's SQL Blank Password |
10114 | icmp timestamp request |
10351 | The ACC router shows configuration without authentication |
11483 | apcnisd detection |
11251 | Unpassworded tutor account |
11294 | CSCdw50657 |
10612 | commerce.cgi |
10128 | infosrch.cgi |
10051 | A CVS pserver is running |
11555 | AN HTTPd count.pl file truncation |
11187 | 4553 Parasite Mothership Detect |
10627 | ROADS' search.pl |
10217 | keyserv service |
11664 | nsiislog.dll DoS |
10722 | LDAP allows null bases |
10499 | Local Security Policy Corruption |
10426 | SMB Registry : permissions of Schedule |
10933 | EFTP tells if a given file exists |
10517 | pam_smb / pam_ntdom overflow |
10707 | McAfee myCIO detection |
10253 | Cobalt siteUserMod cgi |
10950 | rpc.walld format string |
10191 | ProFTPd pre6 buffer overflow |
11075 | dwhttpd format string |
11361 | Mambo Site Server Cookie Validation |
11086 | Sendmail custom configuration file |
11422 | Unconfigured web server |
11184 | vxworks ftpd buffer overflow Denial of Service |
10355 | vqServer web traversal vulnerability |
10289 | Microsoft Media Server 4.1 - DoS |
10101 | Home Free search.cgi directory traversal |
10349 | sojourn.cgi |
10473 | MiniVend Piped command |
11274 | WihPhoto file reading |
10879 | Shell Command Execution Vulnerability |
10148 | Nestea |
10677 | Apache /server-status accessible |
10319 | wu-ftpd SITE NEWER vulnerability |
10629 | Lotus Domino administration databases |
11500 | Beanwebb's guestbook |
11341 | SSH1 SSH Daemon Logging Failure |
10793 | Cobalt Web Administration Server Detection |
11660 | TextPortal Default Passwords |
11590 | MPC SoftWeb Guestbook database disclosure |
10091 | FTPGate traversal |
11088 | Sendmail debug mode leak |
10083 | FTP CWD ~root |
11021 | irix rpc.passwd overflow |
10910 | Obtains local user information |
11105 | ARCserve hidden share |
10233 | snmp service |
10991 | IIS Global.asa Retrieval |
11210 | Apache < 2.0.44 file reading on Win32 |
10017 | Annex DoS |
11595 | Windows Media Player Skin Download Overflow |
10408 | Insecure Napster clone |
10545 | Cisco Catalyst Web Execution |
10660 | Oracle tnslsnr security |
10795 | Lotus Notes ?OpenServer Information Disclosure |
11510 | BIND 4.x resolver overflow |
10378 | LCDproc buffer overflow |
10173 | perl interpreter can be launched as a CGI |
10397 | SMB LanMan Pipe Server browse listing |
11102 | Awol code injection |
10352 | Netscape Server ?wp bug |
10603 | Winsock Mutex vulnerability |
10781 | Outlook Web anonymous access |
10140 | MediaHouse Statistic Server Buffer Overflow |
10986 | CSCdw19195 |
11472 | viewpage.php arbitrary file reading |
11680 | Webfroot Shoutbox Directory Traversal |
10939 | MSDTC denial of service by flooding with nul bytes |
10112 | icat |
11126 | SOCKS4A hostname overflow |
11582 | TrueGalerie admin access |
10635 | Marconi ASX DoS |
11741 | lednews XSS |
10188 | printenv |
11607 | Apache < 2.0.46 on OS/2 |
11399 | ClearTrust XSS |
10728 | Determine if Bind 9 is running |
11243 | Unpassworded 4Dgifts account |
11613 | CP syslog overflow |
10709 | TESO in.telnetd buffer overflow |
11494 | l2tpd DoS |
10111 | iParty |
10401 | SMB Registry : NT4 Service Pack version |
10873 | GroupWise Web Interface 'HTMLVER' hole |
11318 | BIND 9 overflow |
11241 | Unpassworded EZsetup account |
10633 | Savant DoS |
11177 | Flaw in Microsoft VM Could Allow Code Execution (810030) |
10259 | Sendmail mailing to files |
11002 | DNS Server Detection |
10032 | CA Unicenter's File Transfer Service is running |
10903 | Users in the 'System Operator' group |
10865 | Checks for MS HOTFIX for snmp buffer overruns |
11109 | Achievo code injection |
11000 | MPEi/X Default Accounts |
11701 | hpux ftpd RETR vulnerability |
10831 | PHP Rocket Add-in File Traversal |
11155 | LiteServe URL Decoding DoS |
10037 | CERN httpd problem |
10898 | Users information : Never changed password |
10389 | Cart32 ChangeAdminPassword |
11018 | MS Site Server Information Leak |
10539 | Useable remote name server |
10480 | Apache::ASP source.asp |
10104 | HP LaserJet direct print |
10665 | tektronix's _ncl_items.shtml |
11298 | axis2400 webcams |
11085 | Personal Web Sharing overflow |
11405 | dmisd service |
10535 | php log |
10292 | uw-imap buffer overflow |
11432 | Yahoo!Messenger is installed |
11772 | Generic SMTP overflows |
11519 | mod_jk chunked encoding DoS |
11144 | Flaw in Certificate Enrollment Control (Q323172) |
11283 | CSCdp58462 |
11170 | Alcatel OmniSwitch 7700/7800 switches backdoor |
10257 | SmartServer pop3 overflow |
11029 | Windows RAS overflow (Q318138) |
10414 | WinLogon.exe DoS |
11463 | Bugzilla Multiple Flaws |
11213 | http TRACE XSS attack |
11460 | SMB Registry : Classic Logon Screen |
10512 | YaBB |
10760 | Alcatel ADSL modem with firewalling off |
10324 | XTramail MTA 'HELO' denial |
11726 | CSNews.cgi vulnerability |
10695 | IIS .IDA ISAPI filter applied |
11215 | Flaw in SMB Signing Could Enable Group Policy to be Modified (329170) |
11262 | Default password (D13hh[) for root |
10311 | Wingate POP3 USER overflow |
11411 | Backup CGIs download |
10345 | Passwordless Cayman DSL router |
10696 | ttawebtop |
11220 | Netscape /.perf accessible |
10275 | Systat |
10701 | php safemode |
10126 | in.fingerd pipe |
11495 | tanned format string vulnerability |
10777 | Zope ZClass permission mapping bug |
10881 | SSH protocol versions supported |
10241 | ypbind service |
10608 | OpenSSH 2.3.1 authentication bypass vulnerability |
10059 | Domino HTTP Denial |
11248 | Unpassworded date account |
10858 | SNMP bad length field DoS (2) |
10990 | FTP Service Allows Any Username |
10002 | IIS possible DoS using ExAir's advsearch |
10058 | Domino HTTP server exposes the set up of the filesystem |
10175 | Detect presence of PGPNet server and its version |
10640 | Kerberos PingPong attack |
11490 | D-Link DSL Broadband Modem |
10734 | IrDA access violation patch |
10581 | Cold Fusion Administration Page Overflow |
11140 | UDDI detection |
10396 | SMB shares access |
11594 | CSCdea77143, CSCdz15393, CSCdt84906 |
11648 | BlackMoon FTP user disclosure |
11313 | MCMS : Buffer overflow in Profile Service |
11227 | Oracle 9iAS SOAP Default Configuration Vulnerability |
10053 | DeepThroat |
10045 | Cisco 675 passwordless router |
10390 | mstream agent Detect |
10927 | BlackIce DoS (ping flood) |
11634 | Proxy Web Server Cross Site Scripting |
10478 | Tomcat's snoop servlet gives too much information |
11653 | Mantis Multiple Flaws |
10786 | Samba Remote Arbitrary File Creation |
11353 | NFS fsirand |
11403 | iPlanet Application Server Buffer Overflow |
10569 | Zope Image updating Method |
10846 | SilverStream directory listing |
11499 | Sendmail buffer overflow due to type conversion |
10483 | Unpassworded PostgreSQL |
10271 | stream.c |
11524 | Coppermine Gallery Remote Command Execution |
11327 | Nortel Baystack switch password test |
11525 | WWW fingerprinting |
11477 | DCP-Portal Path Disclosure |
11647 | BLnews code injection |
10212 | automountd service |
10413 | SMB Registry : is the remote host a PDC/BDC |
10095 | glimpse |
10012 | Alibaba 2.0 buffer overflow |
10086 | Ftp PASV on connect crashes the FTP server |
11295 | CSCdx39981 |
11658 | SunONE Application Server source disclosure |
10618 | Pi3Web tstisap.dll overflow |
11617 | Horde and IMP test disclosure |
11322 | MS SQL Installation may leave passwords on system |
10163 | Novell Border Manager |
10308 | cgibin() in the KB |
10716 | OmniPro HTTPd 2.08 scripts source full disclosure |
11384 | Public CVS pserver |
11208 | Netscape Enterprise Default Administrative Password |
10890 | HTTP NIDS evasion |
10062 | Eicon Diehl LAN ISDN modem DoS |
10367 | TalentSoft Web+ Input Validation Bug Vulnerability |
10964 | Windows Debugger flaw can Lead to Elevated Privileges (Q320206) |
10642 | SMB Registry : SQL7 Patches |
11633 | lovgate virus is installed |
10436 | INN version check (2) |
11523 | Samba trans2open buffer overflow |
10580 | netscape imap buffer overflow after logon |
10307 | Trin00 for Windows Detect |
10634 | proftpd exhaustion attack |
11682 | Philboard database access |
10214 | database service |
10717 | SHOUTcast Server DoS detector vulnerability |
10202 | remwatch |
10799 | IBM-HTTP-Server View Code |
11119 | SMB Registry : XP Service Pack version |
10855 | Oracle XSQLServlet XSQLConfig.xml File |
11528 | Flaw in Microsoft VM (816093) |
11461 | Adcycle Password Disclosure |
11032 | Directory Scanner |
11349 | Sendmail Group Permissions Vulnerability |
11040 | HTTP TRACE |
10661 | IIS 5 .printer ISAPI filter applied |
11470 | WebChat XSS |
11765 | scan for UPNP/Tcp hosts |
11059 | Trend Micro OfficeScan Denial of service |
11531 | PHPay Information Disclosure |
11329 | The remote host is infected by a virus |
11255 | Default password (root) for root |
10087 | FTP real path |
10080 | Linux FTP backdoor |
10871 | DB2 DOS |
10099 | guestbook.pl |
11350 | Sendmail ETRN command DOS |
11302 | Cumulative patch for Windows Media Player |
11169 | SSH setsid() vulnerability |
11100 | eXtremail format strings |
10803 | Redhat Stronghold File System Disclosure |
11678 | Super-M Son hServer Directory Traversal |
10239 | tooltalk service |
10149 | NetBeans Java IDE |
11545 | Xeneo Web Server 2.2.9.0 DoS |
11236 | PHP-Nuke is installed on the remote host |
10683 | iPlanet Certificate Management Traversal |
10820 | F5 Device Default Support Password |
10285 | thttpd 2.04 buffer overflow |
10714 | Default password router Zyxel |
10375 | Ken! DoS |
10750 | phpMyExplorer dir traversal |
10534 | FreeBSD 4.1.1 Finger |
10342 | Check for VNC |
11456 | PostgreSQL multiple flaws |
11397 | vpopmail.php command execution |
10171 | Oracle Web Server denial of Service |
11385 | CVS pserver double free() bug |
10611 | pals-cgi |
10809 | Sendmail -bt option |
11128 | redhat Interchange |
11761 | phpMyAdmin multiple flaws |
10370 | IIS dangerous sample files |
11675 | Philboard philboard_admin.ASP Authentication Bypass |
10639 | store.cgi |
11281 | cpanel remote command execution |
11608 | Neoteris IVE XSS |
11520 | HP Instant TopTools DoS |
10936 | IIS XSS via 404 error |
10497 | Microsoft Frontpage DoS |
10549 | BIND vulnerable to ZXFR bug |
10742 | Amanda Index Server version |
10878 | Sun Cobalt Adaptive Firewall Detection |
10526 | IIS : Directory listing through WebDAV |
11770 | myServer DoS |
10222 | nsemntd service |
11755 | CesarFTP multiple overflows |
10729 | Sendmail 8.11 local overflow |
11194 | Unchecked Buffer in XP Shell Could Enable System Compromise (329390) |
11376 | qpopper Qvsnprintf buffer overflow |
10921 | RemotelyAnywhere SSH detection |
10106 | Htmlscript |
10644 | anacondaclip CGI vulnerability |
10136 | MDaemon crash |
10479 | Roxen Server /%00/ bug |
10518 | /doc/packages directory browsable ? |
10273 | Detect SWAT server port |
10309 | Passwordless Wingate installed |
10570 | Unify eWave ServletExec 3.0C file upload |
10897 | Users information : disabled accounts |
10751 | Kazaa / Morpheus Client Detection |
11729 | ion-p.exe vulnerability |
10650 | VirusWall's catinfo overflow |
11054 | fakeidentd overflow |
11148 | Unchecked Buffer in Decompression Functions(Q329048) |
11024 | p-smash DoS (ICMP 9 flood) |
10826 | Unprotected Netware Management Portal |
10669 | A1Stats Traversal |
11698 | SQL injection in XPression Software |
10287 | Traceroute |
11030 | Apache chunked encoding |
10514 | Directory listing through Sambar's search.dll |
11160 | Windows Administrator NULL FTP password |
11268 | OS fingerprint |
11639 | Web-ERP Configuration File Remote Access |
11154 | Unknown services banners |
10737 | Oracle Applications One-Hour Install Detect |
11390 | rsync array overflow |
11609 | mod_survey ENV tags SQL injection |
10664 | perlcal |
11394 | Lotus Domino XSS |
10322 | Xitami Web Server buffer overflow |
11010 | WebSphere Cross Site Scripting |
11145 | Certificate Validation Flaw Could Enable Identity Spoofing (Q328145) |
10926 | IE VBScript Handling patch (Q318089) |
10562 | Master Index directory traversal vulnerability |
10167 | NTMail3 spam feature |
10246 | Sambar Web Server CGI scripts |
11234 | Zope installation path disclose |
10238 | tfsd service |
10493 | SWC Overflow |
10181 | PlusMail vulnerability |
10835 | Unchecked Buffer in XP upnp |
10857 | SNMP bad length field DoS |
10943 | Cumulative Patch for Internet Information Services (Q327696) |
10767 | Tests for Nimda Worm infected HTML files |
10730 | Raptor FW version 6.5 detection |
10736 | DCE Services Enumeration |
10911 | Local users information : automatically disabled accounts |
10960 | ServletExec 4.1 ISAPI Physical Path Disclosure |
11743 | Post-Nuke Multiple XSS |
10963 | Compaq Web Based Management Agent Proxy Vulnerability |
11326 | Cumulative VM update |
11282 | Nuked-Klan function execution |
11474 | NetGear ProSafe VPN Login DoS |
11708 | zentrack files reading |
11377 | smb2www installed |
11013 | Cisco VoIP phones DoS |
11570 | MDaemon DELE DoS |
11209 | Apache < 2.0.44 DOS device name |
10006 | PC Anywhere |
10041 | Cobalt RaQ2 cgiwrap |
10988 | Netware NDS Object Enumeration |
10043 | Chargen |
10648 | ftp 'glob' overflow |
10377 | RealServer denial of Service |
11688 | WF-Chat User Account Disclosure |
11683 | Cumulative Patch for Internet Information Services (Q11114) |
11753 | SquirrelMail's Multiple Flaws |
10430 | SMB Registry : permissions of keys that can lead to admin |
11357 | NFS cd .. |
11534 | Microsoft ISA Server Winsock Proxy DoS (MS03-012) |
11731 | VsSetCookie.exe vulnerability |
11207 | War FTP Daemon USER/PASS Overflow |
10251 | rpc.nisd overflow |
10103 | HP LaserJet display hack |
10018 | Knox Arkeia buffer overflow |
10277 | AnyForm |
11516 | AutomatedShops WebC.cgi buffer overflows |
10096 | rsh with null username |
10588 | Sendmail mime overflow |
11291 | CSCdv66718 |
10023 | Bypass Axis Storpoint CD authentication |
10498 | Test HTTP dangerous methods |
10631 | IIS propfind DoS |
10823 | OpenSSH UseLogin Environment Variables |
10816 | Webalizer Cross Site Scripting Vulnerability |
10213 | cmsd service |
11754 | List of printers is available through CUPS |
10385 | ht://Dig's htsearch reveals web server path |
11440 | Bonsai Mutiple Flaws |
10970 | GSR ACL pub |
11764 | TMax Soft Jeus Cross Site Scripting |
11369 | irix performance copilot |
11629 | Poster version.two privilege escalation |
10791 | Ultraseek Web Server Detect |
10819 | PIX Firewall Manager Directory Traversal |
11019 | Alcatel PABX 4400 detection |
10788 | Solaris finger disclosure |
10443 | Predictable TCP sequence number |
11478 | paFileDB SQL injection |
11433 | Microsoft ISA Server DNS - Denial Of Service (MS03-009) |
11110 | SMB null param count DoS |
10582 | HTTP version spoken |
11183 | HTTP negative Content-Length buffer overflow |
11271 | IMail account hijack |
11273 | Invision PowerBoard code injection |
11444 | PHP Mail Function Header Spoofing Vulnerability |
11579 | FTgate DoS |
10780 | CGIEmail's Cross Site Scripting Vulnerability (cgicso) |
10670 | PHP3 Physical Path Disclosure Vulnerability |
10117 | IIS 'GET ../../' |
11062 | BadBlue invalid GET DoS |
10176 | phf |
11090 | AppSocket DoS |
11437 | osCommerce Cross Site Scripting Bugs |
10398 | SMB get domain SID |
11616 | DBTools DBManager Information Disclosure |
10827 | SysV /bin/login buffer overflow (telnet) |
11669 | p-news Admin Access |
10556 | Broker FTP files listing |
11649 | Blackmoon FTP stores passwords in cleartext |
10989 | Nortel/Bay Networks default password |
11253 | Unpassworded hax0r account |
10733 | InterScan VirusWall Remote Configuration Vulnerability |
10946 | Gnutella servent detection |
10914 | Local users information : Never changed password |
10770 | sglMerchant Information Disclosure Vulnerability |
11621 | Snitz Forums Cmd execution |
10967 | Shambala web server DoS |
11705 | LeapFTP Overflow |
11784 | Abyss httpd overflow |
10074 | Firewall/1 UDP port 0 DoS |
10812 | libgtop_daemon format string |
10329 | BIND iquery overflow |
11673 | Remote PC Access Server Detection |
11267 | OpenSSL password interception |
11466 | NiteServer FTP directory traversal |
10947 | mod_python handle abuse |
10530 | Passwordless Alcatel ADSL Modem |
10391 | mstream handler Detect |
10354 | vqServer administrative port |
11366 | Trusting domains bad verification |
10151 | NetBus 1.x |
11733 | Bugbear.B worm |
11409 | ePolicy orchestrator format string |
11276 | CuteNews code injection |
10424 | NAI Management Agent leaks info |
10657 | NT IIS 5.0 Malformed HTTP Printer Request Header Buffer Overflow Vulnerability |
10924 | csSearch.cgi |
11230 | Stronghold Swish |
10120 | IIS perl.exe problem |
10301 | websendmail |
10658 | Oracle tnslsnr version query |
10076 | formmail.pl |
10019 | Ascend Kill |
11046 | Apache Tomcat TroubleShooter Servlet Installed |
11457 | SMB Registry : Winlogon caches passwords |
10912 | Local users information : Can't change password |
10244 | ypxfrd service |
10833 | dtspcd overflow |
10916 | Local users information : Passwords never expires |
10183 | pnserver crash |
11735 | Mnogosearch overflows |
10882 | SSH protocol version 1 enabled |
10888 | mod_ssl overflow |
10249 | EXPN and VRFY commands |
11156 | IRC daemon identification |
10105 | htdig |
11628 | WebLogic Certificates Spoofing |
10862 | Microsoft's SQL Server Brute Force |
11197 | Etherleak |
10763 | Detect the HTTP RPC endpoint mapper |
11078 | HTTP header overflow |
10847 | SilverStream database structure |
10066 | FakeBO buffer overflow |
10226 | rquotad service |
10005 | NetSphere Backdoor |
10084 | ftp USER, PASS or HELP overflow |
11535 | SheerDNS directory traversal |
11296 | CSCdx54675 |
10622 | PPTP detection and versioning |
10379 | LCDproc server detection |
10223 | RPC portmapper |
10976 | CSCds04747 |
11176 | Tomcat 4.x JSP Source Exposure |
11467 | JWalk server traversal |
11244 | Unpassworded OutOfBox account |
11396 | hp jetdirect vulnerabilities |
11380 | CSCdz39284, CSCdz41124 |
10048 | Communigate Pro overflow |
10348 | ows-bin |
11028 | IIS .HTR overflow |
11245 | Unpassworded root account |
10453 | sawmill allows the reading of the first line of any file |
10067 | Faxsurvey |
10700 | Cisco IOS HTTP Configuration Arbitrary Administrative Access |
10565 | Serv-U Directory traversal |
11655 | D-Link router overflow |
11471 | VChat information disclosure |
11644 | ezPublish Directory Cross Site Scripting |
11158 | Novell NetWare HTTP POST Perl Code Execution Vulnerability |
11449 | ezPublish Cross Site Scripting Bugs |
10772 | PHP-Nuke copying files security vulnerability (admin.php) |
11527 | XMB Cross Site Scripting |
11443 | Microsoft IIS UNC Mapped Virtual Host Vulnerability |
10015 | AltaVista Intranet Search |
11221 | Pages Pro CD directory traversal |
11056 | CSCdy03429 |
11022 | eDonkey detection |
11410 | Notes detection |
11042 | Apache Tomcat DOS Device Name XSS |
11612 | PXE server overflow |
11777 | SMB share hosting copyrighted material |
10133 | Land |
10654 | Oracle Application Server Overflow |
11718 | Lotus /./ database lock |
11260 | Default password (wank) for wank |
11339 | scp File Create/Overwrite |
11704 | icmp leak |
10557 | WebShield |
10859 | SMB get host SID |
10469 | ipop2d reads arbitrary files |
10178 | php.cgi buffer overrun |
11679 | VisNetic and Titan FTP Server traversal |
10501 | Trinity v3 Detect |
10007 | ShowCode possible |
10198 | Quote of the day |
10983 | CSCdu20643 |
11136 | /bin/login overflow exploitation |
11123 | radmin detection |
10186 | Portal of Doom |
10427 | SMB Registry : permissions of HKLM |
11336 | Cumulative patches for Excel and Word for Windows |
10759 | Content-Location HTTP Header |
10886 | BIND vulnerable to DNS storm |
11600 | NetCharts Server Default Password |
11064 | BadBlue invalid null byte vulnerability |
11311 | shtml.exe overflow |
11635 | Java Media Framework (JMF) Vulnerability |
11290 | CSCdu82823 |
10504 | Still Image Service Privilege Escalation patch |
11351 | Sendmail mail.local DOS |
10852 | Oracle 9iAS Jsp Source File Reading |
10050 | CSM Mail server MTA 'HELO' denial |
10675 | CheckPoint Firewall-1 Telnet Authentication Detection |
11338 | Lotus Domino Vulnerabilities |
11426 | Kazaa is installed |
10185 | POP3 Server type and version |
11681 | Zeus Admin Interface XSS |
10762 | RTSP Server type and version |
10829 | scan for UPNP hosts |
10520 | PIX's smtp content filtering |
10071 | Finger cgi |
10561 | cisco 675 http DoS |
10227 | rstatd service |
11543 | mod_access_referer 1.0.2 NULL pointer dereference |
11408 | Apache < 2.0.43 |
10917 | SMB Scope |
11540 | PPTP overflow |
10641 | mailnews.cgi |
10872 | BadBlue Directory Traversal Vulnerability |
11690 | JBoss source disclosure |
10374 | uw-imap buffer overflow after logon |
11074 | OfficeScan configuration file disclosure |
10266 | UDP null size going to SNMP DoS |
10935 | IIS ASP ISAPI filter Overflow |
11231 | Unchecked Buffer in XP Redirector (Q810577) |
10341 | Pocsag password |
11225 | Oracle 9iAS OWA UTIL access |
11776 | Carello detection |
10440 | Check for Apache Multiple / vulnerability |
10913 | Local users information : disabled accounts |
11738 | RADIUS server detection |
10107 | HTTP Server type and version |
10410 | ICEcap default password |
10064 | Excite for WebServers |
11121 | xtel detection |
10296 | w3-msql overflow |
11321 | Sendmail 8.8.8 to 8.12.7 Double Pipe Access Validation Vulnerability |
10417 | Sambar /cgi-bin/mailit.pl installed ? |
10010 | AliBaba path climbing |
11537 | Ocean12 Guestbook XSS |
10399 | SMB use domain SID to enumerate users |
11272 | ISMail overflow |
10632 | Webserver file request parsing |
10031 | bootparamd service |
11703 | WordPress code/sql injection |
11638 | biztalk server flaws |
10591 | pagelog.cgi |
10656 | Resin traversal |
11435 | ActiveSync packet overflow |
11124 | mldonkey telnet |
10610 | way-board |
11580 | UDP packets with source port of 53 bypass firewall rules |
11146 | Microsoft RDP flaws could allow sniffing and DOS(Q324380) |
10585 | IIS FrontPage DoS |
10093 | GateCrasher |
10008 | WebSite 1.0 buffer overflow |
11161 | RDS / MDAC Vulnerability Content-Type overflow |
10681 | Netscape Messenging Server User List |
10250 | Sendmail redirection check |
10137 | MDaemon DoS |
11556 | CISCO Secure ACS Management Interface Login Overflow |
11401 | texi.exe path disclosure |
11232 | Sendmail DNS Map TXT record overflow |
10404 | SMB log in as users |
11368 | Cross-Referencing Linux (lxr) file reading |
10595 | DNS AXFR |
10907 | Guest belongs to a group |
11205 | War FTP Daemon CWD/MKD Buffer Overflow |
11530 | WinAMP3 buffer overflow |
11462 | Bugzilla Detection |
11367 | Discard port open |
11079 | Snapstream PVS web directory traversal |
11434 | IBM Tivoli Relay Overflow |
10180 | Ping the remote host |
11404 | Multiple flaws in the Opera web browser |
10447 | Zope DocumentTemplate package problem |
10054 | Delegate overflow |
10572 | IIS 5.0 Sample App vulnerable to cross-site scripting attack |
11436 | guestbook tr3 password storage |
10278 | Sendmail 8.6.9 ident |
11561 | scriptlogic logging share |
10655 | PHP-Nuke' opendir |
10016 | AN-HTTPd tests CGIs |
11734 | Argosoft DoS |
10814 | Allaire JRun directory browsing vulnerability |
11757 | NGC ActiveFTP Denial of Service |
11565 | .forward in FTP root |
10199 | RealServer Ramgen crash (ramcrash) |
11475 | 3com RAS 1500 DoS |
11120 | xtelw detection |
10326 | Yahoo Messenger Denial of Service attack |
11697 | IRCXPro Default Admin password |
10972 | Multiple SSH vulnerabilities |
10302 | robot(s).txt exists on the Web Server |
10856 | PHP-Nuke sql_debug Information Disclosure |
11198 | BitKeeper remote command execution |
11732 | Webnews.exe vulnerability |
10866 | XML Core Services patch (Q318203) |
10332 | ftp writeable directories |
10155 | Netscape Enterprise Server DoS |
11749 | Vignette StoryServer TCL code injection |
10768 | DoSable squid proxy server |
11637 | MailMax IMAP overflows (2) |
10369 | Microsoft Frontpage dvwssr.dll backdoor |
11229 | phpinfo.php |
11567 | CommunigatePro Hijacking |
11715 | Header overflow against HTTP proxy |
11706 | Spyke Flaws |
10524 | SMB Windows9x password verification vulnerability |
10210 | alis service |
11104 | Directory Manager's edit_image.php |
10472 | SSH Kerberos issue |
11382 | CSCdv85279, CSCdw59394 |
10626 | MySQL various flaws |
10169 | OpenLink web config buffer overflow |
11625 | DrWeb Folder Name Overflow |
10118 | IIS FTP server crash |
11759 | Cajun p13x DoS |
10150 | Using NetBIOS to retrieve information from a Windows host |
10382 | Atrium Mercur Mailserver |
10606 | HSWeb document path |
11263 | Default password (lrkr0x) for gamez |
11541 | Buffer overrun in NT kernel message handling |
10718 | DCShop exposes sensitive files |
11202 | Enhydra Multiserver Default Password |
10030 | Bonk |
10686 | BroadVision Physical Path Disclosure Vulnerability |
11418 | Sun rpc.cmsd overflow |
11573 | SmallFTP traversal |
10503 | Reading CGI script sources using /cgi-bin-sdb |
10662 | Web mirroring |
10451 | Dragon telnet overflow |
10688 | SNMP VACM |
10406 | IIS Malformed Extension Data in URL |
10711 | Sambar webserver pagecount hole |
10392 | rfparalyze |
10115 | idq.dll directory traversal |
10321 | wwwboard passwd.txt |
10294 | view_source |
11585 | Sambar Transmits Passwords in PlainText |
11204 | Apache Tomcat Default Accounts |
11548 | bttlxeForum SQL injection |
10906 | Users in the 'Replicator' group |
11171 | HTTP unfinished line denail |
11645 | wsmp3d command execution |
11279 | Webmin Session ID Spoofing |
11335 | mibiisa overflow |
10433 | NT IP fragment reassembly patch not applied (jolt2) |
10013 | alibaba.pl |
10844 | ASP.NET Cross Site Scripting |
10317 | wrap |
11345 | SimpleBBS users disclosure |
11352 | Sendmail Parsing Redirection DOS |
11360 | Wordit Logbook |
10495 | htgrep |
11452 | Oracle 9iAS web admin |
11763 | Kerio WebMail interface flaws |
10394 | SMB log in |
11674 | BaSoMail SMTP Command HELO overflow |
10216 | fam service |
10638 | auktion.cgi |
10553 | SMB Registry : permissions of WinVNC's key |
10576 | Check for dangerous IIS default files |
11661 | Unpassworded iiprotect administrative interface |
10269 | SSH Overflow |
10756 | MacOS X Finder reveals contents of Apache Web directories |
10088 | Writeable FTP root |
10449 | SMB Registry : value of SFCDisable |
10488 | FTP Serv-U 2.5e DoS |
10247 | Sendmail DEBUG |
10680 | Test Microsoft IIS Source Fragment Disclosure |
11374 | SunFTP directory traversal |
10732 | IIS 5.0 WebDav Memory Leakage |
11424 | WebDAV enabled |
10147 | A Nessus Daemon is running |
11237 | php 4.3.0 |
10157 | netstat |
10604 | Allaire JRun Directory Listing |
10994 | IPSwitch IMail SMTP Buffer Overflow |
11138 | Citrix published applications |
10464 | proftpd 1.2.0preN check |
11448 | Siteframe Cross Site Scripting Bugs |
10158 | NIS server |
11114 | Canna Overflow |
10220 | nlockmgr service |
10170 | OShare |
11773 | Linksys Gozila CGI denial of service |
10400 | SMB accessible registry |
10977 | CSCds07326 |
11342 | PKCS #1 Version 1.5 Session Key Retrieval |
10724 | Cayman DSL router one char login |
10232 | showfhd service |
11395 | Microsoft Frontpage XSS |
11050 | php 4.2.x malformed POST |
10314 | Winnuke |
10491 | ASP/ASA source using Microsoft Translate f: bug |
10267 | SSH Server type and version |
10078 | Microsoft Frontpage 'authors' exploits |
10755 | Microsoft Exchange Public Folders Information Leak |
10902 | Users in the Admin group |
10511 | /perl directory browsable ? |
10090 | FTP site exec |
10502 | Axis Camera Default Password |
10807 | Jakarta Tomcat Path Disclosure |
10682 | CISCO view-source DoS |
11083 | ibillpm.pl |
10867 | php POST file uploads |
11509 | GTcatalog password disclosure |
10785 | SMB NativeLanMan |
10560 | SuSE's identd overflow |
11003 | IIS Possible Compromise |
10476 | WebsitePro buffer overflow |
11574 | Portable OpenSSH PAM timing attack |
10364 | netscape publishingXpert 2 PSUser problem |
10625 | IMAP4rev1 buffer overflow after logon |
10358 | /iisadmin is world readable |
11001 | MRTG mrtg.cgi File Disclosure |
11458 | SMB Registry : No dial in |
10463 | vpopmail input validation bug |
10712 | quickstore traversal |
11450 | Debian proftpd 1.2.0 runs as root |
11514 | Netgear ProSafe Router password disclosure |
11097 | TypSoft FTP STOR/RETR DoS |
10139 | MDaemon Worldclient crash |
11702 | zentrack code injection |
11492 | Sambar XSS |
10011 | get32.exe vulnerability |
11348 | Sendmail long debug local overflow |
11289 | CSCdu35577 |
11480 | 3com RAS 1500 configuration disclosure |
10521 | Extent RBS ISP |
10409 | SubSeven |
11292 | CSCdv88230, CSCdw22408 |
10800 | Obtain OS type via SNMP |
10892 | Obtains user information |
11641 | BadBlue Remote Administrative Interface Access |
11419 | Office files list |
10039 | /cgi-bin directory browsable ? |
10895 | Users information : automatically disabled accounts |
10034 | RedHat 6.0 cachemgr.cgi |
11473 | EMule DoS |
10787 | tooltalk format string |
10174 | pfdispaly |
11740 | Infinity CGI Exploit Scanner |
11632 | CSCdx17916, CSCdx61997 |
11015 | Xerver web server DOS |
11166 | KF Web Server /%00 bug |
10081 | FTP bounce check |
11782 | iXmail SQL injection |
10744 | VisualRoute Web Server Detection |
10177 | php.cgi |
10441 | AFS client version |
11547 | CSCea42030 |
10154 | Netscape Enterprise 'Accept' buffer overflow |
10193 | Usable remote proxy on any port |
10810 | PHP-Nuke Gallery Add-on File View |
11598 | MailMax IMAP overflows |
10130 | ipop2d buffer overflow |
10182 | Livingston Portmaster crash |
10496 | Imail Host: overflow |
10161 | rlogin -froot |
10766 | Apache UserDir Sensitive Information Disclosure |
10372 | /scripts/repost.asp |
11445 | Basit cms Cross Site Scripting Bugs |
11400 | texi.exe information disclosure |
11131 | Sambar web server DOS |
11465 | args.bat |
11239 | Hidden WWW server name |
11084 | Infinite HTTP request |
11116 | phpMyAdmin arbitrary files reading |
10172 | Passwordless HP LaserJet |
11089 | Webseal denial of service |
10060 | Dumpenv |
10203 | rexecd |
10190 | ProFTPd buffer overflow |
11354 | Buffer overflow in FreeBSD 2.x lpd |
10131 | jj cgi |
11597 | Snitz Forums 2000 Password Reset and XSS |
10838 | FastCGI Echo.exe Cross Site Scripting |
10597 | wwwwais |
11012 | ATA-186 password circumvention / recovery |
10040 | cgitest.exe buffer overrun |
10036 | CDK Detect |
10527 | Boa file retrieval |
10474 | GAMSoft TelSrv 1.4/1.5 Overflow |
10395 | SMB shares enumeration |
10870 | Login configurations |
10533 | Web Shopper remote file retrieval |
11061 | HTTP version number overflow |
10264 | Default community names of the SNMP Agent |
11587 | XMB SQL Injection |
10754 | Cisco password not set |
11406 | Buffer overflow in BSD in.lpd |
10577 | Check for bdir.htr files |
11004 | WhatsUp Gold Default Admin Account |
11076 | Oracle webcache admin interface DoS |
10889 | NIDS evasion |
10224 | rexd service |
10584 | technote's main.cgi |
11699 | URLScan Detection |
11420 | Sun portmap xdrmem_getbytes() overflow |
11689 | Cisco IDS Device Manager Detection |
10697 | WebLogic Server DoS |
11031 | OpenSSH <= 3.3 |
11300 | Unchecked buffer in Network Share Provider (Q326830) |
10192 | Proxy accepts CONNECT requests |
10387 | cisco http DoS |
11651 | Batalla Naval Overflow |
10195 | Usable remote proxy |
10961 | AirConnect Default Password |
10861 | IE 5.01 5.5 6.0 Cumulative patch |
10004 | IIS possible DoS using ExAir's search |
10601 | Basilix includes download |
10280 | Telnet |
11011 | SMB on port 445 |
11375 | smb2www remote command execution |
10789 | Novell Groupwise WebAcc Information Disclosure |
11068 | iPlanet chunked encoding |
10548 | Enumerate Lanman shares via SNMP |
10971 | GSR ICMP unreachable |
10291 | uploader.exe |
11112 | Generic FTP traversal |
10919 | Check open ports |
10283 | TFN Detect |
11769 | Zope Invalid Query Path Disclosure |
10313 | WindowsNT PPTP flood denial |
11151 | Webserver 4D Cleartext Passwords |
10774 | ShopPlus Arbitrary Command Execution |
11636 | ttCMS code injection |
11362 | Simple File Manager Filename Script Injection |
10201 | Relative IP Identification number change |
11168 | Samba Unicode Buffer Overflow |
11618 | Remote host replies to SYN+FIN |
10179 | pimp |
10035 | Campas |
10645 | ustorekeeper |
11550 | OpenBB SQL injection |
11106 | NetTools command execution |
11026 | Access Point detection |
11744 | Post-Nuke SQL injection |
11008 | PHP4 Physical Path Disclosure Vulnerability |
10127 | info2www |
11670 | GeekLog SQL vulns |
11539 | NB1300 router default FTP account |
10953 | Authentication bypassing in Lotus Domino |
10908 | Users in the Domain Admin group |
10204 | rfpoison |
10538 | iWS shtml overflow |
10386 | No 404 check |
11482 | Post-Nuke information disclosure |
11575 | Kerio personal Firewall buffer overflow |
11143 | Exchange 2000 Exhaust CPU Resources (Q320436) |
11280 | Usermin Session ID Spoofing |
10450 | Dragon FTP overflow |
10620 | EXPN overflow |
10985 | CSCdv48261 |
11518 | Checkpoint Firewall open Web adminstration |
11522 | Linksys Router default password |
11546 | Xeneo web server %A DoS |
10853 | Oracle 9iAS mod_plsql cross site scripting |
11676 | Post-Nuke Rating System Denial Of Service |
10783 | PCCS-Mysql User/Password Exposure |
11196 | Cyrus IMAP pre-login buffer overrun |
10284 | TFS SMTP 3.2 MAIL FROM overflow |
10001 | ColdFusion Vulnerability |
11099 | Pi3Web Webserver v2.0 Buffer Overflow |
11668 | Webfroot shoutbox file inclusion |
10938 | Apache Remote Command Execution via .bat files |
10559 | XMail APOP Overflow |
10407 | X Server |
10806 | RPC Endpoint Mapper can Cause RPC Service to Fail |
10705 | SimpleServer remote execution |
11431 | XoloX is installed |
11180 | DB4Web TCP relay |
11722 | cgiWebupdate.exe vulnerability |
10237 | sunlink mapper service |
11750 | Psunami.CGI Command Execution |
10523 | thttpd ssi file retrieval |
10525 | LPC and LPC Ports Vulnerabilities patch |
10536 | Anaconda remote file retrieval |
11783 | Multiple IRC daemons format string attack |
10979 | CSCdt46181 |
10262 | Mail relaying |
10649 | processit |
10784 | ht://Dig's htsearch potential exposure/dos |
11412 | IIS : WebDAV Overflow (MS03-007) |
11423 | Flaw in Windows Script Engine (Q814078) |
10566 | mmstdod.cgi |
10896 | Users information : Can't change password |
11307 | Unchecked buffer in Windows Shell |
10703 | SMTP Authentication Error |
10930 | HTTP Windows 98 MS/DOS device names DOS |
10279 | Teardrop |
11063 | LabView web server DoS |
10837 | FAQManager Arbitrary File Reading Vulnerability |
10456 | SMB enum services |
11379 | CSCdx92043 |
11512 | Kerberos 5 issues |
11504 | MultiTech Proxy Server Default Password |
10376 | htimage.exe overflow |
11643 | OneOrZero SQL injection |
10651 | cfinger's version |
10805 | Informix traversal |
10555 | Domain account lockout vulnerability |
10745 | WorldClient for MDaemon Server Detection |
11725 | counter.exe vulnerability |
10263 | SMTP Server type and version |
11538 | ezPublish config disclosure |
10047 | CMail's MAIL FROM overflow |
11222 | Writesrv |
11737 | NetGear Router Default Password |
10325 | Xtramail pop3 overflow |
10477 | Tomcat's /admin is world readable |
11080 | poprelayd & sendmail authentication problem |
10678 | Apache /server-info accessible |
11261 | Default password (D13HH[) for root |
10544 | format string attack against statd |
11082 | Boozt index.cgi overflow |
10160 | Nortel Contivity DoS |
10752 | Apache Auth Module SQL Insertion Attack |
10229 | sadmin service |
10219 | nfsd service |
11572 | Multiple ICQ Vulnerabilities |
11256 | Default password (guest) for guest |
11479 | paFileDB XSS |
10197 | qpopper LIST buffer overflow |
11324 | phpping code execution |
11317 | Discover HP JetDirect EWS Password via SNMP |
10966 | IMAP4buffer overflow in the BODY command |
10073 | Finger redirection check |
10775 | E-Shopping Cart Arbitrary Command Execution (WebDiscount) |
11427 | LimeWire is installed |
11576 | thttpd directory traversal thru Host: |
10874 | Rich Media E-Commerce Stores Sensitive Information Insecurely |
11756 | CuteFTP multiple flaws |
11066 | SunSolve CD CGI user input validation |
10383 | bizdb1-search.cgi located |
11469 | SimpleChat information disclosure |
11442 | Samba TNG multiple flaws |
11414 | IMAP Banner |
11515 | AutomatedShops WebC.cgi installed |
10578 | Oops buffer overflow |
11043 | iPlanet Search Engine File Viewing |
11039 | mod_ssl off by one |
10532 | eXtropia Web Store remote file retrieval |
11270 | SMTP too long line |
10999 | Linksys Router Default Password |
11454 | SMB log in with W32/Deloder passwords |
10614 | sendtemp.pl |
10513 | php file upload |
10068 | Finger |
10079 | Anonymous FTP enabled |
10616 | webspirs.cgi |
10811 | ActivePerl perlIS.dll Buffer Overflow |
11057 | Raptor Weak ISN |
10429 | SMB Registry : permissions of winlogon |
10997 | JRun directory traversal |
10388 | Cassandra NNTP Server DoS |
11133 | Generic format string |
11371 | BSD ftpd Single Byte Buffer Overflow |
10615 | Malformed PPTP Packet Stream vulnerability |
11386 | Lotus Domino 6.0 vulnerabilities |
11709 | SmartFTP Overflow |
10875 | Avenger's News System Command Execution |
10541 | KW whois |
11646 | Turba Path Disclosure |
10166 | Windows NT ftp 'guest' account |
10721 | ncbook/book.cgi |
11691 | Desktop Orbiter Server Detection |
11077 | HTTP Cookie overflow |
11238 | Anti Nessus defenses |
10531 | SMB Registry : Win2k Service Pack version |
10052 | Daytime |
11051 | BIND9 DoS |
11677 | ST FTP traversal |
10619 | Malformed request to domain controller |
11780 | mailreader.com directory traversal and arbitrary command execution |
10276 | TCP Chorusing |
10692 | ftpd strtok() stack overflow |
10085 | Ftp PASV denial of service |
11684 | rot13sj.cgi |
11141 | Crash SMC AP |
10676 | CheckPoint Firewall-1 Web Authentication Detection |
10668 | Malformed request to index server |
10327 | Zeus shows the content of the cgi scripts |
10168 | Detect talkd server port and protocol version |
10044 | Checkpoint FW-1 identification |
10962 | Cabletron Web View Administrative Access |
10484 | Read any file thanks to ~nobody/ |
11073 | readmsg.php detection |
11752 | Proxomitron DoS |
10975 | CSCdp35794 |
11065 | HTTP method overflow |
10056 | /doc directory browsable ? |
11252 | Unpassworded toor account |
10316 | WinSATAN |
10420 | Gauntlet overflow |
11716 | Misconfigured Gnutella |
11125 | mldonkey www |
11421 | smtpscan |
10904 | Users in the 'Backup Operator' group |
11407 | proftpd 1.2.0rc2 format string vuln |
11005 | LocalWeb2000 remote read |
10038 | Cfinger's search.**@host feature |
11306 | Unchecked buffer in ASP.NET worker process |
11695 | Pi3Web Webserver v2.0 Denial of Service |
10704 | Apache Directory Listing |
10421 | Rockliffe's MailSite overflow |
11393 | ColdFusion Path Disclosure |
11127 | HTTP 1.0 header overflow |
10274 | SyGate Backdoor |
10720 | sdbsearch.cgi |
10735 | Generic flood |
11316 | Sendmail remote header buffer overflow |
11584 | webweaver FTP DoS |
10590 | SWAT allows user names to be obtained by brute force |
11455 | Passwordless frontpage installation |
10346 | Mercur WebView WebClient |
10460 | bb-hostsvc.sh |
10353 | Interscan 3.32 SMTP Denial |
10928 | EFTP buffer overflow |
10437 | NFS export |
10575 | Check for IIS .cnf file leakage |
10248 | Sendmail 'decode' flaw |
10146 | Tektronix /ncl_items.html |
10061 | Echo port open |
10200 | RealServer G2 buffer overrun |
11363 | Gupta SQLBase EXECUTE buffer overflow |
11095 | webcart.cgi |
10564 | IIS phonebook |
10486 | Relative Shell Path patch |
10920 | RemotelyAnywhere WWW detection |
11278 | Quicktime/Darwin Remote Admin Exploit |
10522 | LPRng malformed input |
11193 | akfingerd |
11727 | CWmail.exe vulnerability |
11219 | SYN Scan |
10702 | Zope DoS |
10445 | AnalogX denial of service by long CGI name |
11712 | OpenSSH Reverse DNS Lookup bypass |
11312 | DHCP server overflow / format string bug |
11115 | gallery code injection |
10438 | Netwin's DMail ETRN overflow |
10817 | Interactive Story Directory Traversal Vulnerability |
10098 | guestbook.cgi |
10550 | Obtain processes list via SNMP |
10958 | ServletExec 4.1 / JRun ISAPI DoS |
10630 | PHP-Nuke security vulnerability (bb_smilies.php) |
11142 | IIS XSS via error |
11554 | BadBlue Administrative Actions Vulnerability |
10860 | SMB use host SID to enumerate local users |
11117 | phpPgAdmin arbitrary files reading |
11259 | Unpassworded StoogR account |
11459 | SMB Registry : Do not show the last user name |
11693 | PFTP clear-text passwords |
11415 | SquirrelMail's Cross Site Scripting |
10945 | Opening Group Policy Files (Q318089) |
11416 | openwebmail command execution |
10684 | yppasswdd overflow |
11372 | HP-UX ftpd glob() Expansion STAT Buffer Overflow |
10265 | An SNMP Agent is running |
10489 | AnalogX web server traversal |
11686 | mod_gzip format string attack |
10891 | X Display Manager Control Protocol (XDMCP) |
10026 | BFTelnet DoS |
10315 | WINS UDP flood denial |
10475 | Buffer overflow in WebSitePro webfind.exe |
11557 | ideabox code injection |
10540 | NSM format strings vulnerability |
10299 | webdist.cgi |
11758 | eLDAPo cleartext passwords |
11285 | CSCdy26428 |
10208 | 3270 mapper service |
11310 | myphpPageTool code injection |
11588 | YaBB SE command execution |
11157 | Trojan horses |
10145 | Microsoft's SQL TCP/IP denial of service |
10666 | AppleShare IP Server status query |
10546 | Enumerate Lanman users via SNMP |
11275 | GOsa code injection |
10987 | CSCdw67458 |
10439 | OpenSSH < 2.1.1 UseLogin feature |
10082 | FTPd tells if a user exists |
11593 | SLMail SMTP overflows |
10142 | MS Personal WebServer ... |
11358 | The remote portmapper forwards NFS requests |
11502 | ScozBook flaws |
10993 | IIS ASP.NET Application Trace Enabled |
10003 | IIS possible DoS using ExAir's query |
10138 | MDaemon Webconfig crash |
10298 | Webcart misconfiguration |
11038 | SMTP settings |
10667 | IIS 5.0 PROPFIND Vulnerability |
10739 | Novell Web Server NDS Tree Browsing |
10725 | SIX Webboard's generate.cgi |
10818 | Alchemy Eye HTTP Command Execution |
11481 | mod_auth_any command execution |
11775 | Sambar CGIs path disclosure |
11659 | ArGoSoft Mail Server multiple flaws |
11671 | Ultimate PHP Board admin_ip.php code injection |
11027 | AlienForm CGI script |
11413 | Unchecked Buffer in ntdll.dll (Q815021) |
11650 | MAILsweeper PowerPoint DoS |
10573 | IIS 5.0 Sample App reveals physical path of web root |
10028 | Determine which version of BIND name daemon is running |
10100 | Handler |
10365 | Windmail.exe allows any user to execute arbitrary commands |
10802 | OpenSSH < 3.0.1 |
10057 | Lotus Domino ?open Vulnerability |
10487 | WFTP 2.41 rc11 multiple DoS |
10915 | Local users information : User has never logged on |
10934 | MS FTPd DoS |
11439 | Xoops path disclosure |
10899 | Users information : User has never logged on |
10297 | Web server traversal |
10242 | yppasswd service |
11293 | CSCdx07754, CSCdx24622, CSCdx24632 |
10256 | SLMail MTA 'HELO' denial |
10049 | Count.cgi |
10771 | OpenSSH 2.5.x -> 2.9.x adv.option |
10761 | Detect CIS ports |
10885 | MS SMTP DoS |
10143 | MSQL CGI overflow |
11199 | Multiple vulnerabilities in CUPS |
11226 | Oracle 9iAS default error information disclosure |
11094 | WS FTP overflows |
10547 | Enumerate Lanman services via SNMP |
11501 | Justice guestbook |
11162 | WebSphere Edge caching proxy denial of service |
10252 | Shells in /cgi-bin |
11389 | rsync modules |
11615 | ttforum multiple flaws |
11053 | IMC SMTP EHLO Buffer Overrun |
10359 | ctss.idc check |
10596 | Tinyproxy heap overflow |
10360 | newdsn.exe check |
10384 | IRIX Objectserver |
11627 | WebLogic clear-text passwords |
10509 | Malformed RPC Packet patch |
11228 | Unreal Engine flaws |
11503 | cc_guestbook.pl XSS |
10405 | shtml.exe reveals full path |
10110 | iChat |
10790 | rwhois format string attack |
11381 | CSCdw33027 |
11214 | Microsoft's SQL Overflows |
10485 | Service Control Manager Named Pipe Impersonation patch |
10551 | Obtain network interfaces list via SNMP |
11760 | Pod.Board Forum_Details.PHP Cross Site Scripting |
10455 | Buffer Overrun in ITHouse Mail Server v1.04 |
11356 | Mountable NFS shares |
10828 | SysV /bin/login buffer overflow (rlogin) |
11591 | 12Planet Chat Server ClearText Password |
10125 | Imap buffer overflow |
11665 | Apache < 2.0.46 |
11605 | IkonBoard arbitrary command execution |
10022 | Axent Raptor's DoS |
11113 | Samba Buffer Overflow |
10121 | /scripts directory browsable |
11179 | vBulletin's Calender Command Execution Vulnerability |
11233 | N/X Web Content Management code injection |
11323 | Security issues in the remote version of FlashPlayer |
10282 | test-cgi |
10741 | SiteScope Web Administration Server Detection |
10583 | dcforum |
10940 | Windows Terminal Service Enabled |
11666 | Post-Nuke information disclosure (2) |
10156 | Netscape FastTrack 'get' |
10900 | Users information : Passwords never expires |
11687 | CrobFTP format string |
11303 | mod_frontpage installed |
11129 | HTTP 1.1 header overflow |
11069 | HTTP User-Agent overflow |
11589 | PT News Unauthorized Administrative Access |
11048 | Resin DOS device path disclosure |
10794 | PC Anywhere TCP |
10646 | Lion worm |
11098 | WS_FTP SITE CPWD Buffer Overflow |
10014 | tst.bat CGI vulnerability |
11044 | ICECast FileSystem disclosure |
10459 | Poll It v2.0 cgi |
11188 | X Font Service Buffer Overflow |
10119 | NT IIS Malformed HTTP Request Header DoS Vulnerability |
10747 | 3Com Superstack II switch with default password |
11320 | The remote BIND has dynamic updates enabled |
11108 | Omron WorldView Wnn Overflow |
10055 | Sendmail 8.8.3 and 8.8.4 mime conversion overflow |
10918 | Apache-SSL overflow |
10494 | Netauth |
11334 | popper_mod |
11549 | readfile.tcl |
11072 | Basilix webmail dummy request vulnerability |
11468 | php socket_iovec_alloc() integer overflow |
10884 | NTP read variables |
10941 | IPSEC IKE check |
10092 | FTP Server type and version |
11332 | wu-ftpd glob vulnerability (2) |
10141 | MetaInfo servers |
10765 | SQLQHit Directory Structure Disclosure |
11325 | Word can lead to Script execution on mail reply |
11203 | Motorola Vanguard with No Password |
11092 | Apache 2.0.39 Win32 directory traversal |
10778 | Unprotected SiteScope Service |
11656 | Eserv Directory Index |
10470 | WebActive world readable log file |
11620 | Airport Administrative Port |
10628 | php IMAP overflow |
11096 | Avirt gateway insecure telnet proxy |
10333 | Linux TFTP get file |
10779 | CGIEmail's CGICso (Send CSO via CGI) Command Execution Vulnerability |
11392 | Serv-U path disclosure |
11583 | Microsoft Shlwapi.dll Malformed HTML form tag DoS |
10215 | etherstatd service |
11505 | Ecartis Username Spoofing |
10984 | CSCdu81936 |
10797 | ColdFusion Debug Mode |
10529 | Nortel Networks passwordless router (user level) |
10272 | SunKill |
11430 | WinMX is installed |
10822 | Multiple WarFTPd DoS |
11235 | Too long OPTIONS parameter |
11762 | StoneGate client authentication detection |
11533 | Web Wiz Site News database disclosure |
11195 | SSH Multiple Vulns |
10432 | SMB Registry : permissions of keys that can change common paths |
11277 | clarkconnectd detection |
10998 | Shiva LanRover Blank Password |
11720 | S-HTTP detection |
11006 | RedHat 6.2 inetd |
11212 | Unchecked buffer in Locate Service |
10290 | Upload cgi |
11544 | MonkeyWeb POST with too much data |
10338 | smad |
10602 | hsx directory traversal |
10782 | Formmail Version Information Disclosure |
10072 | Finger dot at host feature |
10295 | OmniHTTPd visadmin exploit |
max_hosts | 16 | |
max_checks | 10 | |
log_whole_attack | yes | |
cgi_path | /cgi-bin | |
port_range | 1-1024 | |
optimize_test | yes | |
language | english | |
checks_read_timeout | 5 | |
non_simult_ports | 139, 445 | |
plugins_timeout | 320 | |
safe_checks | yes | |
auto_enable_dependencies | no | |
use_mac_addr | no | |
save_knowledge_base | yes | |
kb_restore | no | |
only_test_hosts_whose_kb_we_dont_have | no | |
only_test_hosts_whose_kb_we_have | no | |
kb_dont_replay_scanners | no | |
kb_dont_replay_info_gathering | no | |
kb_dont_replay_attacks | no | |
kb_dont_replay_denials | no | |
kb_max_age | 864000 | |
plugin_upload | no | |
plugin_upload_suffixes | .nasl, .inc | |
slice_network_addresses | no | |
ntp_save_sessions | yes | |
ntp_detached_sessions | yes | |
server_info_nessusd_version | 2.0.7 | |
server_info_libnasl_version | 2.0.7 | |
server_info_libnessus_version | 2.0.7 | |
server_info_thread_manager | fork | |
server_info_os | Linux | |
server_info_os_version | 2.4.21-stand1 | |
reverse_lookup | no | |
ntp_keep_communication_alive | yes | |
ntp_opt_show_end | yes | |
save_session | yes | |
detached_scan | no | |
continuous_scan | no |
Host | Holes | Warnings | Open ports | State |
10.10.0.1 | 0 | 2 | 0 | Finished |
Service | Severity | Description |
general/icmp | The remote host answers to an ICMP timestamp request. This allows an attacker to know the date which is set on your machine. This may help him to defeat all your time based authentication protocols. Solution : filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14). Risk factor : Low CVE : CAN-1999-0524 | |
general/tcp | The remote host uses non-random IP IDs, that is, it is possible to predict the next value of the ip_id field of the ip packets sent by this host. An attacker may use this feature to determine if the remote host sent a packet in reply to another request. This may be used for portscanning and other things. Solution : Contact your vendor for a patch Risk factor : Low |