-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathdefault.nessusrc
3076 lines (3070 loc) · 87.6 KB
/
default.nessusrc
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
# This file was automagically created by nessus
nessusd_host = scan2.elliptix.net
nessusd_user = securescan
paranoia_level = 3
begin(SCANNER_SET)
Ping the remote host = no
TCP Ping the remote host = no
TCP SYN scan = no
FTP bounce scan = no
Nmap tcp connect() scan = no
Nmap = yes
scan for LaBrea tarpitted hosts = no
10796 = yes
10180 = no
10331 = yes
10335 = no
10336 = yes
10841 = yes
11219 = no
end(SCANNER_SET)
begin(SERVER_PREFS)
max_threads = 8
log_whole_attack = yes
cgi_path = /cgi-bin
port_range = 1-65535
optimize_test = yes
language = english
track_iothreads = yes
cookie_logpipe_suptmo = 2
checks_read_timeout = 5
delay_between_tests = 1
plugins_timeout = 160
disable_3001compat = no
save_knowledge_base = yes
kb_restore = no
only_test_hosts_whose_kb_we_dont_have = no
only_test_hosts_whose_kb_we_have = no
kb_dont_replay_scanners = no
kb_dont_replay_info_gathering = no
kb_dont_replay_attacks = no
kb_dont_replay_denials = no
kb_max_age = 864000
host_expansion = ip
ping_hosts = no
reverse_lookup = yes
auto_enable_dependencies = no
save_session = no
save_empty_sessions = no
safe_checks = yes
use_mac_addr = no
detached_scan = no
continuous_scan = no
unscanned_closed = no
diff_scan = no
max_hosts = 30
max_checks = 10
non_simult_ports = 139, 445
plugin_upload = no
plugin_upload_suffixes = .nasl
admin_user = root
end(SERVER_PREFS)
begin(RULES)
end(RULES)
begin(PLUGIN_SET)
Services = yes
SSH Overflow = yes
in.fingerd |command@host bug = yes
Using NetBIOS to retrieve information from a Windows host = yes
SMB log in = yes
SMB accessible registry = yes
SMB Registry : permissions of WinVNC's key = yes
SMB Registry : permissions of winlogon = yes
SMB Registry : permissions of keys that can change common paths = yes
SMB Registry : value of SFCDisable = yes
SSH Kerberos issue = yes
SMB Registry : permissions of Schedule = yes
Solaris finger disclosure = yes
Trin00 for Windows Detect = yes
SMB Registry : permissions of keys that can lead to admin = yes
Trin00 Detect = yes
Traceroute = no
SMB Registry : permissions of the RAS key = yes
TFN Detect = yes
QueSO = yes
TCP Chorusing = yes
SubSeven = yes
MySQL Server version = yes
SMB Registry : is the remote host a PDC/BDC = yes
Stacheldraht Detect = yes
An SNMP Agent is running = yes
Default community names of the SNMP Agent = yes
SNMP VACM = yes
HTTP version spoken = yes
No 404 check = yes
HTTP Server type and version = yes
Zope ZClass permission mapping bug = yes
Zope DocumentTemplate package problem = yes
SSH Server type and version = yes
SSH Insertion Attack = yes
Zope Image updating Method = yes
SMB fully accessible registry = yes
SMB Registry : missing winreg = yes
Obtain OS type via SNMP = yes
Zope DoS = yes
Zeus shows the content of the cgi scripts = yes
Obtain processes list via SNMP = yes
YaBB = yes
wwwboard passwd.txt = yes
wrap = yes
Enumerate Lanman shares via SNMP = yes
Windmail.exe allows any user to execute arbirary comands = yes
Enumerate Lanman services via SNMP = yes
whois_raw = yes
Finger redirection check = yes
webspirs.cgi = yes
WebSpeed remote configuration = yes
WebsitePro buffer overflow = yes
SMB Registry : permissions of HKLM = yes
Obtain network interfaces list via SNMP = yes
WebSite pro reveals the physical file path of web directories = yes
SMB enum services = yes
The messenger service is running = yes
websendmail = yes
Tomcat's snoop servlet gives too much information = yes
TalentSoft Web+ version detection = yes
TalentSoft Web+ Input Validation Bug Vulnerability = yes
The alerter service is running = yes
WebLogic Server /%00/ bug = yes
Enumerate Lanman users via SNMP = yes
SMB Registry : Autologon = yes
webgais = yes
webdriver = yes
Directory listing through WebDAV = yes
IIS : Directory listing through WebDAV = yes
Webcart misconfiguration = yes
Webalizer Cross Site Scripting Vulnerability = yes
SMB Registry : NT4 Service Pack version = yes
RPC Endpoint Mapper can Cause RPC Service to Fail = yes
Default accounts = yes
WebActive world readable log file = yes
RPC portmapper = yes
NFS export = yes
way-board = yes
vqServer web travesal vulnerablity = yes
SSH1 CRC-32 compensation attack = yes
OmniHTTPd visadmin exploit = yes
Shaft Detect = yes
view_source = yes
SMB Registry : Win2k Service Pack version = yes
IrDA access violation patch = yes
ustorekeeper = yes
ypxfrd service = yes
uploader.exe = yes
ypupdated service = yes
Upload cgi = yes
Default password router Zyxel = yes
ttawebtop = yes
Tripwire for Webpages Detection = yes
Malformed request to index server = yes
ASP/ASA source using Microsoft Translate f: bug = yes
yppasswd service = yes
Jakarta Tomcat Path Disclosure = yes
Finger = yes
thttpd ssi file retrieval = yes
ypbind service = yes
thttpd flaw = yes
Textor Webmasters CGI Allows Remote Command Execution = yes
X25 service = yes
test-cgi = yes
Malformed request to domain controller = yes
walld service = yes
technote's main.cgi = yes
SWC Overflow = yes
Tomcat's /admin is world readable = yes
Passwordless Wingate installed = yes
Reading CGI script sources using /cgi-bin-sdb = yes
Redhat Stronghold File System Disclosure = yes
tooltalk service = yes
Interactive Story Directory Traversal Vulnerability = yes
tooltalk format string = yes
Malformed PPTP Packet Stream vulnerability = yes
store.cgi = yes
SQLQHit Directory Stracture Disclosure = yes
tfsd service = yes
sojourn.cgi = yes
SIX Webboard's generate.cgi = yes
sunlink mapper service = yes
Cobalt siteUserMod cgi = yes
Detect Server type and version via Telnet = yes
SimpleServer remote execution = yes
NTLMSSP Privilege Escalation = yes
SSH 3.0.0 = yes
ShopPlus Arbitrary Command Execution = yes
ShowCode possible = yes
statmon service = yes
Shopping Cart Arbitrary Command Execution (Hassan) = yes
statd service = yes
Shells in /cgi-bin = yes
sglMerchant Information Disclosure Vulnerability = yes
Winsock Mutex vulnerability = yes
sendtemp.pl = yes
sprayd service = yes
sdbsearch.cgi = yes
Telnet = yes
Savant original form CGI access = yes
Unpassworded MySQL = yes
snmp service = yes
Directory listing through Sambar's search.dll = yes
Sambar webserver pagecount hole = yes
showfhd service = yes
Incomplete TCP/IP packet vulnerability = yes
Sambar Web Server CGI scripts = yes
FreeBSD 4.1.1 Finger = yes
Roxen Server /%00/ bug = yes
Roxen counter module = yes
EXPN and VRFY commands = yes
WebShield = yes
ROADS' search.pl = yes
selection service = yes
Raptor FW version 6.5 detection = yes
quickstore traversal = yes
sched service = yes
processit = yes
Shiva Integrator Default Password = yes
printenv = yes
sadmin service = yes
Usable remote proxy = yes
DoSable squid proxy server = yes
Power Up Information Disclosure = yes
Cognos Powerplay WE Vulnerability = yes
SMTP Server type and version = yes
Sendmail mailing to programs = yes
Poll It v2.0 cgi = yes
VisualRoute Web Server Detection = yes
rusersd service = yes
Domain account lockout vulnerability = yes
PlusMail vulnerability = yes
rstatd service = yes
php safemode = yes
PHP-Nuke' opendir = yes
PHP-Nuke Gallery Add-on File View = yes
Passwordless Cayman DSL router = yes
PHP-Nuke security vulnerability (bb_smilies.php) = yes
rquotad service = yes
PHP-Nuke copying files security vulnerability (admin.php) = yes
Webserver file request parsing = yes
SMTP Authentication Error = yes
php.cgi = yes
ipop2d reads arbitrary files = yes
News Server type and version = yes
Checkpoint SecuRemote information leakage = yes
rje mapper service = yes
phpMyExplorer dir traversal = yes
php log = yes
LPC and LPC Ports Vulnerabilities patch = yes
SWAT allows the obtention of user names by brute force = yes
rexd service = yes
PHPix directory traversal vulnerability = yes
nsemntd service = yes
Oracle tnslsnr version query = yes
php IMAP overflow = yes
PFTP login check = yes
php file upload = yes
Nortel Networks passwordless router (user level) = yes
PHP3 Physical Path Disclosure Vulnerability = yes
Sendmail mailing to files = yes
phorum's common.cgi = yes
nsed service = yes
Telnet Client NTLM Authentication Vulnerability = yes
phf = yes
nlockmgr service = yes
Detect the presence of Napster = yes
Insecure Napster clone = yes
pfdispaly = yes
Finger dot at host feature = yes
perl interpreter can be launched as a CGI = yes
Extent RBS ISP = yes
Proxy accepts POST requests = yes
WFTP login check = yes
Anonymous FTP enabled = yes
Windows NT ftp 'guest' account = yes
sawmill allows the reading of the first line of any file = yes
sawmill password = yes
perlcal = yes
nfsd service = yes
/perl directory browsable ? = yes
llockmgr service = yes
PCCS-Mysql User/Password Exposure = yes
Malformed RPC Packet patch = yes
pals-cgi = yes
PIX's smtp content filtering = yes
pagelog.cgi = yes
Nortel Networks passwordless router (manager level) = yes
ows-bin = yes
keyserv service = yes
Outlook Web anonymous access = yes
fam service = yes
MacOS X Finder reveals contents of Apache Web directories = yes
Guild FTPd tells if a given file exists = yes
Still Image Service Privilege Escalation patch = yes
MacOS X Finder reveals contents of Apache Web files = yes
etherstatd service = yes
Oracle XSQL Sample Application Vulnerability = yes
OpenSSH < 2.1.1 UseLogin feature = yes
OmniPro httpd 2.08 scripts source full disclosure = yes
Sendmail's from |program = yes
nph-test-cgi = yes
database service = yes
nph-publish.cgi = yes
Standard & Poors detection = yes
Check for dangerous Novell webserver default files = yes
Local Security Policy Corruption = yes
GuildFTPD Directory Traversal = yes
Novell Groupwise WebAcc Information Disclosure = yes
cmsd service = yes
Tests for Nimda Worm infected HTML files = yes
automountd service = yes
news desk = yes
Solaris FTPd tells if a user exists = yes
newdsn.exe check = yes
Sendmail redirection check = yes
Netscape Server ?wp bug = yes
Service Control Manager Named Pipe Impersonation patch = yes
amd service = yes
netscape publishingXpert 2 PSUser problem = yes
alis service = yes
Netscape Server ?PageServices bug = yes
Passwordless HP LaserJet = yes
Netscape FastTrack 'get' = yes
SHOUTcast Server DoS detector vulnerability = yes
FTP site exec = yes
Netscape Enterprise INDEX request problem = yes
3270 mapper service = yes
Netscape Administration Server admin password = yes
Relative IP Identification number change = yes
Relative Shell Path patch = yes
Netauth = yes
Finger backdoor = yes
Novell Web Server NDS Tree Browsing = yes
Sendmail mime overflow = yes
Tektronix /ncl_items.html = yes
Serv-U Directory traversal = yes
Usable remote proxy on any port = yes
MySQL buffer overflow = yes
tektronix's _ncl_items.shtml = yes
Quote of the day = yes
ncbook/book.cgi = yes
Portal of Doom = yes
multihtml cgi = yes
NetBIOS Name Server Protocol Spoofing patch = yes
Cisco password not set = yes
MS Personal WebServer ... = yes
FTP Server type and version = yes
Microsoft's Index server reveals ASP source code = yes
Detect presence of PGPNet server and its version = yes
RDS / MDAC Vulnerability (msadcs.dll) located = yes
Sendmail 8.11 local overflow = yes
ctss.idc check = yes
PC Anywhere = yes
MiniVend Piped command = yes
OpenSSH UseLogin Environment Variables = yes
NT ResetBrowser frame & HostAnnouncement flood patc = yes
mailnews.cgi = yes
FTP real path = yes
mmstdod.cgi = yes
Detect talkd server port and protocol version = yes
Lotus Notes ?OpenServer Information Disclosure = yes
Cisco 675 passwordless router = yes
Checks for listrec.pl = yes
NIS server = yes
KW whois = yes
Sendmail 'decode' flaw = yes
NT IP fragment reassembly patch not applied (jolt2) = yes
Allaire JRun directory browsing vulnerability = yes
FTPd tells if a user exists = yes
Allaire JRun Directory Listing = yes
Detect CIS ports = yes
jj cgi = yes
mstream agent Detect = yes
InterScan VirusWall Remote Configuration Vulnerability = yes
FTP bounce check = yes
infosrch.cgi = yes
Microsoft's SQL UDP Info Query = yes
info2www = yes
SMB Registry : SQL7 Patches = yes
Cayman DSL router one char login = yes
IMP Session Hijacking Bug = yes
Sendmail DEBUG = yes
IIS 5.0 WebDav Memory Leakage = yes
Microsoft's SQL Blank Password = yes
Check for dangerous IIS default files = yes
Linux FTP backdoor = yes
IIS SHTML Cross Site vulnerability = yes
LDAP allows anonymous binds = yes
/scripts directory browsable = yes
Finger zero at host feature = yes
SMB LanMan Pipe Server browse listing = yes
IIS dangerous sample files = yes
LDAP allows null bases = yes
/scripts/repost.asp = yes
Broker FTP files listing = yes
IIS perl.exe problem = yes
Proxy accepts CONNECT requests = yes
Kerberos PingPong attack = yes
Content-Location HTTP Header = yes
IIS .IDA ISAPI filter applied = yes
Axis Camera Default Password = yes
Test Microsoft IIS Source Fragment Disclosure = yes
Check for IIS .cnf file leakage = yes
IIS directory traversal = yes
OpenSSH 2.5.x -> 2.9.x adv.option = yes
IIS Remote Command Execution = yes
icmp timestamp request = yes
Check for bdir.htr files = yes
icmp netmask request = yes
/iisadmpwd/aexp2.htr = yes
Mail relaying = yes
NTMail3 spam feature = yes
SMB shares enumeration = yes
SMB get domain SID = yes
SMB use domain SID to enumerate users = yes
SMB log in as users = yes
SMB Windows9x password verification vulnerability = yes
IIS IDA/IDQ Path Disclosure = yes
Echo port open = yes
/iisadmin is world readable = yes
INN version check = yes
Passwordless Alacatel ADSL Modem = yes
IIS 5 .printer ISAPI filter applied = yes
DNS AXFR = yes
idq.dll directory traversal = yes
DHCP server info gathering = yes
icat = yes
SMB shares access = yes
JRun's viewsource.jsp = yes
DeepThroat = yes
IBM-HTTP-Server View Code = yes
Unprotected PC Anywhere Service = yes
eXtropia Web Store remote file retrieval = yes
Web Shopper remote file retrieval = yes
Daytime = yes
Read any file thanks to ~nobody/ = yes
Chargen = yes
Boa file retrieval = yes
Alcatel ADSL Modem with Firewalling off = yes
ht://Dig's htsearch reveals web server path = yes
cfinger's version = yes
cfingerd format string attack = yes
ht://Dig's htsearch potential exposure/dos = yes
bootparamd service = yes
Htmlscript = yes
htgrep = yes
Buffer Overrun in ITHouse Mail Server v1.04 = yes
htdig = yes
Cfinger's search.**@host feature = yes
hsx directory traversal = yes
Determine which version of BIND name daemon is running = yes
BIND vulnerable to ZXFR bug = yes
HSWeb document path = yes
BIND vulnerable = yes
Home Free search.cgi directory traversal = yes
Useable remote name server = yes
Handler = yes
The ACC router shows configuration without authentication = yes
DoSable Oracle WebCache server = yes
guestbook.pl = yes
BIND vulnerable to overflows = yes
guestbook.cgi = yes
SiteScope Web Managegment Server Detect = yes
OpenSSH < 3.0.1 = yes
glimpse = yes
Exchange Malformed MIME header = yes
ftp.pl shows the listing of any dir = yes
Determine if Bind 9 is running = yes
shtml.exe reveals full path = yes
Microsoft Frontpage exploits = yes
BackOrifice = yes
qpopper euidl problem = yes
Microsoft Frontpage dvwssr.dll backdoor = yes
Microsoft Frontpage 'authors' exploits = yes
3Com Superstack II switch with default password = yes
Formmail Version Information Disclosure = yes
MySQL various flaws = yes
Amanda client version = yes
formmail.pl = yes
Finger cgi = yes
AFS client version = yes
Faxsurvey = yes
EZShopper 3.0 = yes
SMB NativeLanMan = yes
Samba Remote Arbitrary File Creation = yes
Imap buffer overflow = yes
Atrium Mercur Mailserver = yes
Microsoft Exchange Public Folders Information Leak = yes
IIS possible DoS using ExAir's search = yes
IIS possible DoS using ExAir's query = yes
IIS possible DoS using ExAir's advsearch = yes
Excite for WebServers = yes
Unify eWave ServletExec 3.0C file upload = yes
E-Shopping Cart Arbitrary Command Execution (WebDiscount) = yes
Systat = yes
empower cgi path = yes
netstat = yes
Dumpenv = yes
Lotus Domino ?open Vulnerability = yes
OpenSSH 2.3.1 authentication bypass vulnerability = yes
Domino HTTP server exposes the set up of the filesystem = yes
Lotus Domino administration databases = yes
/doc directory browsable ? = yes
/doc/packages directory browsable ? = yes
directory pro web traversal = yes
DCShop exposes sensitive files = yes
dcforum = yes
DBMan CGI server information leakage = yes
Dansie Shopping Cart backdoor = yes
CVSWeb detection = yes
CVSWeb 1.80 gives a shell to cvs commiters = yes
Count.cgi = yes
commerce.cgi = yes
POP3 Server type and version = yes
ColdFusion Vulnerability = yes
CodeRed version X detection = yes
Cisco IOS HTTP Configuration Arbitrary Administrative Access = yes
ICECast Format String = yes
Cisco Catalyst Web Execution = yes
Cobalt RaQ2 cgiwrap = yes
cgiforum = yes
CGIEmail's Cross Site Scripting Vulnerability (cgicso) = yes
CGIEmail's CGICso (Send CSO via CGI) Command Execution Vulnerability = yes
/cgi-bin directory browsable ? = yes
ColdFusion Debug Mode = yes
CERN httpd problem = yes
Campas = yes
calendar_admin.pl = yes
RedHat 6.0 cachemgr.cgi = yes
Cart32 ChangeAdminPassword = yes
BroadVision Physical Path Disclosure Vulnerability = yes
bizdb1-search.cgi located = yes
bigconf = yes
BEA WebLogic Scripts Server scripts Source Disclosure = yes
Sun's Java Web Server remote command execution = yes
bb-hostsvc.sh = yes
bb-hist.sh = yes
Basilix includes download = yes
bypass Axis Storpoint CD authentification = yes
auktion.cgi = yes
ASP source using %2e trick = yes
ASP source using ::$DATA trick = yes
Apache UserDir Sensitive Information Disclosure = yes
Apache::ASP source.asp = yes
Check for Apache Multiple / vulnerability = yes
Apache /server-status accessible = yes
Apache /server-info accessible = yes
Apache Directory Listing = yes
Apache Auth Module SQL Insertion Attack = yes
AN-HTTPd tests CGIs = yes
Anaconda remote file retrieval = yes
anacondaclip = yes
AltaVista Intranet Search = yes
tst.bat = yes
alibaba.pl = yes
AliBaba path climbing = yes
get32.exe = yes
Alchemy Eye HTTP Command Execution = yes
A1Stats = yes
40X HTML Cross Site Scripting vulnerability = yes
Cobalt Web Administration Server Detection = yes
Netscape Messenging Server User List = yes
ipop2d buffer overflow = yes
Mediahouse Statistics Web Server Detect = yes
Identd enabled = yes
INN version check (2) = yes
LinuxConf grants network access = yes
DCE Services Enumeration = yes
Checkpoint FW-1 identification = yes
CheckPoint Firewall-1 Telnet Authentication Detection = yes
Checkpoint SecureRemote detection = yes
F5 Device Default Support Password = yes
rlogin = yes
rsh = yes
LPRng malformed input = yes
rexecd = yes
AppleShare IP Server status query = yes
RTSP Server type and version = yes
Detect the HTTP RPC endpoint mapper = yes
Detect SWAT server port = yes
CheckPoint Firewall-1 Web Authentication Detection = yes
WinSATAN = yes
Kazaa / Morpheus Client Detection = yes
A Nessus Daemon is running = yes
HealthD detection = yes
Microsoft's SQL TCP/IP listener is running = yes
Oracle tnslsnr security = yes
PPTP detection and versioning = yes
MBDMS overflow = yes
Compaq WBEM Server Detection = yes
A CVS pserver is running = yes
SiteScope Web Administration Server Detection = yes
Eserv traversal = yes
WorldClient for MDaemon Server Detection = yes
MySQLs accepts any password = yes
CA Unicenter's File Transfer Service is running = yes
iChat = yes
MetaInfo servers = yes
Unpassworded PostgreSQL = yes
remwatch = yes
PC Anywhere TCP = yes
Check for VNC HTTP = yes
Check for VNC = yes
X Server = yes
McAfee myCIO detection = yes
AOLserver Default Password = yes
mstream handler Detect = yes
GateCrasher = yes
CA Unicenter's Transport Service is running = yes
Oracle Applications One-Hour Install Detect = yes
FTPGate traversal = yes
SyGate Backdoor = yes
Unprotected Netware Management Portal = yes
NetBeans Java IDE = yes
Ultraseek Web Server Detect = yes
Oracle Web Administration Server Detection = yes
vqServer administrative port = yes
NAI Management Agent leaks info = yes
HP LaserJet direct print = yes
Check for Webmin = yes
NetBus 1.x = yes
LCDproc server detection = yes
Amanda Index Server version = yes
CDK Detect = yes
Kuang2 the Virus = yes
NetBus 2.x = yes
GirlFriend = yes
NetSphere = yes
Trinity v3 Detect = yes
Lion worm = yes
TFTP get file = yes
IRIX Objectserver = yes
Linux TFTP get file = yes
Web server traversal = yes
robot(s).txt exists on the Web Server = yes
Buffer overflow in WebSitePro webfind.exe = yes
rwhois format string attack = yes
Sambar /sysadmin directory 2 = yes
Sambar sendmail /session/sendmail = yes
Sambar /cgi-bin/mailit.pl installed ? = yes
rpm_query CGI = yes
Piranha's RH6.2 default password = yes
Resin traversal = yes
Pi3Web tstisap.dll overflow = yes
Oracle XSQL Stylesheet Vulnerability = yes
Master Index directory traversal vulnerability = yes
Lotus Domino SMTP overflow = yes
iPlanet Directory Server traversal = yes
Informix traversal = yes
IIS ISAPI Overflow = yes
Too long URL = yes
IIS buffer overflow = yes
FormHandler.cgi = yes
Cold Fusion Administration Page Overflow = yes
Analogx Web server traversal = yes
SysV /bin/login buffer overflow (telnet) = yes
wu-ftpd mishandles CWD ~{ = yes
wu-ftpd SITE EXEC vulnerability = yes
Pocsag password = yes
proftpd 1.2.0preN check = yes
proftpd exhaustion attack = yes
NSM format strings vulnerability = yes
Multiple WarFTPd DoS = yes
hpux ftpd PASS vulnerability = yes
ftp USER, PASS or HELP overflow = yes
Ftp PASV on connect crashes the FTP server = yes
FTPD glob Heap Corruption = yes
Writeable FTP root = yes
FTP CWD ~root = yes
ftp writeable directories = yes
bftpd format string vulnerability = yes
SysV /bin/login buffer overflow (rlogin) = yes
rsh on finger output = yes
McAfee myCIO Directory Traversal = yes
ICEcap default password = yes
Unprotected SiteScope Service = yes
BIND buffer overrun = yes
rwhois format string attack (2) = yes
RealServer Memory Content Disclosure = yes
PIX Firewall Manager Directory Traversal = yes
HP LaserJet display hack = yes
wwwwais = yes
yppasswdd overflow = yes
Too long POST command = yes
Teardrop = yes
Too long authorization = yes
wu-ftpd SITE NEWER vulnerability = yes
WebSite 1.0 buffer overflow = yes
stream.c = yes
WebLogic Server DoS = yes
format string attack against statd = yes
webdist.cgi = yes
Winnuke = yes
WFTP RNTO DoS = yes
w3-msql overflow = yes
smad = yes
thttpd 2.04 buffer overflow = yes
Wingate denial of service = yes
spin_client.cgi buffer overrun = yes
snmpXdmid overflow = yes
Sedum DoS = yes
UDP null size going to SNMP DoS = yes
Savant DoS = yes
WFTP 2.41 rc11 multiple DoS = yes
WinLogon.exe DoS = yes
php.cgi buffer overrun = yes
pimp = yes
IIS phonebook = yes
OShare = yes
ActivePerl perlIS.dll Buffer Overflow = yes
XTramil MTA 'HELO' denial = yes
Oracle Web Server denial of Service = yes
vftpd buffer overflow = yes
Oracle Application Server Overflow = yes
TESO in.telnetd buffer overflow = yes
Nortel Contivity DoS = yes
rfpoison = yes
Orange DoS = yes
Netscape Enterprise '../' buffer overflow = yes
ntpd overflow = yes
Netscape Enterprise 'Accept' buffer overflow = yes
wu-ftpd buffer overflow = yes
ProFTPd pre6 buffer overflow = yes
MSQL CGI overflow = yes
Nestea = yes
MediaHouse Statistic Server Buffer Overflow = yes
TFS SMTP 3.2 MAIL FROM overflow = yes
iWS shtml overflow = yes
rfparalyze = yes
Imail Host: overflow = yes
Generic flood = yes
imagemap.exe = yes
GAMSoft TelSrv 1.4/1.5 Overflow = yes
IIS propfind DoS = yes
qpopper buffer overflow = yes
Xtramail pop3 overflow = yes
ProFTPd buffer overflow = yes
IIS 5.0 PROPFIND Vulnerability = yes
NT IIS Malformed HTTP Request Header DoS Vulnerability = yes
Marconi ASX DoS = yes
IIS FrontPage DoS = yes
Linux 2.1.89 - 2.2.17 : 0 length fragment bug = yes
IIS Malformed Extension Data in URL = yes
Delegate overflow = yes
HELO overflow = yes
IIS 'GET ../../' = yes
proftpd mkdir buffer overflow = yes
NT IIS 5.0 Malformed HTTP Printer Request Header Buffer Overflow Vulnerability = yes
Land = yes
ICQ Denial of Service attack = yes
Firewall/1 UDP port 0 DoS = yes
Test HTTP dangerous methods = yes
SunKill = yes
GroupWise buffer overflow = yes
IIS FrontPage DoS II = yes
Bonk = yes
Microsoft Frontpage DoS = yes
SLMail denial of service = yes
htimage.exe overflow = yes
Axent Raptor's DoS = yes
SalesLogix Eviewer WebApp crash = yes
IIS FTP server crash = yes
Eicon Diehl LAN ISDN modem DoS = yes
+ + + ATH0 modem hangup = yes
Domino HTTP Denial = yes
Ascend Kill = yes
CISCO view-source DoS = yes
Livingston Portmaster crash = yes
cisco http DoS = yes
GoodTech ftpd DoS = yes
cisco 675 http DoS = yes
SLMail MTA 'HELO' denial = yes
uw-imap buffer overflow = yes
cgitest.exe buffer overrun = yes
Annex DoS = yes
AnalogX denial of service = yes
AnalogX denial of service by long cgi name = yes
FTP ServU CWD overflow = yes
Alibaba 2.0 buffer overflow = yes
OpenLink web config buffer overflow = yes
pam_smb / pam_ntdom overflow = yes
XMail APOP Overflow = yes
Notes MTA denial = yes
FTP Serv-U 2.5e DoS = yes
RealServer denial of Service = yes
ftpd strtok() stack overflow = yes
EXPN overflow = yes
Hyperbomb = yes
Ftp PASV denial of service = yes
ftp 'glob' overflow = yes
MDaemon crash = yes
Dragon telnet overflow = yes
EFTP carriage return DoS = yes
MDaemon DoS = yes
Wingate POP3 USER overflow = yes
Dragon FTP overflow = yes
Cassandra NNTP Server DoS = yes
BFTelnet DoS = yes
bftpd chown overflow = yes
Lotus MAIL FROM overflow = yes
AIX ftpd buffer overflow = yes
Tinyproxy heap overflow = yes
uw-imap buffer overflow after logon = yes
netscape imap buffer overflow after logon = yes
Interscan 3.32 SMTP Denial = yes
Imate HELO overflow = yes
vpopmail input validation bug = yes
Netwin's DMail ETRN overflow = yes
Oops buffer overflow = yes
Check for RealServer DoS = yes
CSM Mail server MTA 'HELO' denial = yes
CMail's MAIL FROM overflow = yes
SmartServer pop3 overflow = yes
Chameleon SMTPd overflow = yes
IMAP4rev1 buffer overflow after logon = yes
WindowsNT DNS flood denial = yes
Xitami Web Server buffer overflow = yes
Rover pop3 overflow = yes
SuSE's identd overflow = yes
Netscape Enterprise Server DoS = yes
Buffer overflow in Solaris in.lpd = yes
Microsoft's SQL TCP/IP denial of service = yes
WindowsNT PPTP flood denial = yes
Novell Border Manager = yes
RealServer G2 buffer overrun = yes
Imail's imonitor buffer overflow = yes
UltraSeek 3.1.x Remote DoS = yes
NAI Management Agent overflow = yes
FakeBO buffer overflow = yes
LCDproc buffer overflow = yes
qpopper LIST buffer overflow = yes
Various pop3 overflows = yes
Ken! DoS = yes
Imail's imap buffer overflow = yes
RealServer Ramgen crash (ramcrash) = yes
SLMail:27 denial of service = yes
pnserver crash = yes
Rockliffe's MailSite overflow = yes
WINS UDP flood denial = yes
SCO i2odialogd buffer overrun = yes
klogind overflow = yes
Knox Arkeia buffer overflow = yes
Mercure WebView WebClient = yes
Microsoft Media Server 4.1 - DoS = yes
VirusWall's catinfo overflow = yes
MDaemon Worldclient crash = yes
MDaemon Webconfig crash = yes
NAI PGP Cert Server DoS = yes
Yahoo Messenger Denial of Service attack = yes
iParty = yes
Cisco DoS = yes
Communigate Pro overflow = yes
Gauntlet overflow = yes
HotSync Manager Denial of Service attack = yes
XTramail control denial = yes
libgtop_daemon format string = yes
10747 = yes
10669 = yes
10351 = yes
11109 = yes
11007 = yes
10880 = yes
10441 = yes
10836 = yes
10009 = yes
10760 = yes
10530 = yes
11019 = yes
10818 = yes
10011 = yes
10010 = yes
10012 = yes
10013 = yes
10014 = yes
11027 = yes
10015 = yes
11118 = yes
10462 = yes
10742 = yes
10644 = yes
10536 = yes
10445 = yes
10366 = yes
10489 = yes
10016 = yes
10017 = yes
10277 = yes
10753 = yes
10752 = yes
10938 = yes
11030 = yes
10704 = yes
10678 = yes
10677 = yes
10440 = yes
10480 = yes
10918 = yes
11042 = yes
11041 = yes
11046 = yes
10766 = yes
11092 = yes
11090 = yes
11105 = yes
10018 = yes
10019 = yes
10666 = yes
10844 = yes
10843 = yes
10362 = yes
10363 = yes
11071 = yes
10020 = yes
10638 = yes
10021 = yes
10875 = yes
11096 = yes
11102 = yes
10022 = yes
10502 = yes
10023 = yes
10024 = yes
10872 = yes
11062 = yes
11064 = yes
10601 = yes
11072 = yes
10025 = yes
10460 = yes
10507 = yes
10949 = yes
10715 = yes
11052 = yes
10026 = yes
10579 = yes
10568 = yes
10027 = yes
11051 = yes
10728 = yes
10605 = yes
10886 = yes
10329 = yes
10539 = yes
10028 = yes
10029 = yes
10549 = yes
10828 = yes
10827 = yes
10383 = yes
10927 = yes
10030 = yes
10031 = yes
11082 = yes
10686 = yes
10556 = yes
11130 = yes
10389 = yes
10951 = yes
10034 = yes
10506 = yes
10035 = yes
11114 = yes
10388 = yes
10032 = yes
10033 = yes
10724 = yes
10036 = yes
10037 = yes
10797 = yes
10652 = yes
10038 = yes
10651 = yes
10039 = yes
10779 = yes
10780 = yes
10552 = yes
10040 = yes
10041 = yes
10042 = yes
10043 = yes
10044 = yes
10919 = yes
11011 = yes
10561 = yes
10045 = yes
11014 = yes
11012 = yes
10545 = yes
10046 = yes
10970 = yes
10971 = yes