File: db_server_msgs

package info (click to toggle)
nikto 1%3A2.1.4-2
  • links: PTS, VCS
  • area: non-free
  • in suites: wheezy
  • size: 2,276 kB
  • sloc: perl: 4,328; makefile: 11
file content (270 lines) | stat: -rw-r--r-- 32,323 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
#VERSION,2.005
# $Id: db_server_msgs 632 2011-02-19 02:49:31Z sullo $
#######################################################################
# Source: http://cirt.net
# This file may only be distributed and used with the full Nikto package.
# This file may not be used with any software product without written permission from CIRT, Inc.
# (c) 2007 CIRT, Inc., All Rights Reserved.
#
# NOTE: By sending any database updates to CIRT, Inc., it is assumed that you
# grant CIRT, Inc., the unlimited, non-exclusive right to reuse, modify and relicense the changes.
#######################################################################
# Notes:
# NiktoDB 1.0
#######################################################################
"nikto_id","server","osvdb","message"
"800000","4D_WebSTAR_S\/5\.([0-2]|3\.[0-2])","7794","May be vulnerable to multiple flaws. http://secunia.com/advisories/12063/"
"800001","4D_WebSTAR_S\/5\.([0-2]|3\.[01])","0","May be vulnerable to denial of service threw openssl implementation bug. http://secunia.com/advisories/11181/"
"800002","4D_WebSTAR_S\/5\.([0-3]|4[^.])","16154","May be vulnerable to a buffer overflow in tomcat plugin URL. http://secunia.com/advisories/15278/"
"800003","4D_WebSTAR_S\/5\.3\.1","2542","May be vulnerable to remote exploitable buffer overflow. http://secunia.com/advisories/9723/"
"800004","Abyss\/1\.0\.3","5237","May be vulnerable to directory traversal by using '%5c%2e%2e%5c' type paths."
"800005","ADSM_HTTP\/","0","May be Tivoli server administration. Default account is admin/admin."
"800006","Acme.Serve/v1.7 of 13nov96","0","Java class Acme.Serve.Serve is used as an embedded server for many devices, including APC InfraStruXure Manager. This server string is the default for the servlet. Check for port 9090, which may have a browsable c:\ drive. See: http://www.acme.com/java/software/Acme.Serve.Serve.html"
"800007","AdSubtract","0","Adsubtract.com, a Windows proxy which removes popup ads, can be configure for remote access or localhost only."
"800008","Agranat-EMWeb","0","Most likely a printer."
"800009","alibaba","10","http://alibaba.austria.eu.net/ This server has lots of problems (overflows, etc)"
"800010","Allegro-Software-RomPager","0","Most likely a printer."
"800011","allegro-software","0","Most often a printer or other embedded device"
"800012","american sitebuilder","0","http://www.american.com/product1.html"
"800013","aolserver","0","http://www.aolserver.com/ runs on Dec OSF1"
"800014","Apache Tomcat\/4\.(0\.[1-4]|1\.[0-9][^0-9]|1\.10)","8773","May be vulnerable to JSP source code exposure. CAN-2002-1148."
"800015","Apache Tomcat\/4\.0\.3","5051","Apache Tomcat 4.0.3 Win 2000 server is vulnerable to a DoS attack. Upgrade to a 4.1.3beta or higher."
"800016","apache-ssl-us","0","http://apachessl.c2.net"
"800017","Apache\/.* Ben-SSL\/1\.([0-9][^0-9]|[0-3][0-9]|4[0-6])[^0-9]","0","This version of Apache-SSl is vulnerable to a buffer overflow."
"800018","Apache\/(1\.2\.([2-9].*|1[0-9])|1\.3\.([0-1].*|2[0-4]))","838","Apache 1.x up 1.2.34 are vulnerable to a remote DoS and possible code execution. CAN-2002-0392."
"800019","Apache\/1\.0\.3","0","Probably a Xerox printer"
"800020","Apache\/1\.1\.1","0","May be able view directory contents regardless of index.html"
"800021","Apache\/1\.1\.3","9717","This version has a mod_cookies buffer overflow"
"800022","Apache\/1\.3\.(0.*|1.*|2[0-6])","4552","Apache 1.3 below 1.3.27 are vulnerable to a local buffer overflow which allows attackers to kill any process on the system. CAN-2002-0839."
"800023","Apache\/1\.3\.(0.*|1.*|2[0-8])","2733","Apache 1.3 below 1.3.29 are vulnerable to overflows in mod_rewrite and mod_cgi. CAN-2003-0542."
"800024","Apache\/1\.3\.27","9715","Windows and OS/2 version vulnerable to remote exploit. CAN-2003-0460"
"800025","Apache\/2\.0\.([0-2].*|3.*)","859","Apache 2.0 to 2.0.39 Windows may be vulnerable to arbitrary file retrieval. CAN-2002-0661."
"800026","Apache\/2\.0\.([0-2].*|3[0-8])","838","Apache 2.0 up 2.0.36 are vulnerable to a remote DoS and possible code execution. CAN-2002-0392."
"800027","Apache\/2\.0\.([0-3].*|4.[0-8])","2733","Apache 2.0 to 2.0.48: overflows in mod_alias and mod_rewrite (OSVDB-2733, OSVDB-7611), mod_cgid may send the output of CGI to the incorrect client (OSVDB-15889)."
"800028","Apache\/2\.0\.([0-3].*|4[0-6])","2672","Apache 2.0 up 2.0.46 are vulnerable to multiple remote problems. CAN-2003-0192. CAN-2003-0253. CAN-2003-0254. CERT VU#379828."
"800029","Apache\/2\.0\.([0-3].*|4[0-7])","15889","Apache 2.0 up 2.0.47 are vulnerable to multiple remote problems in mod_rewrite and mod_cgi. CAN-2003-0789. CAN-2003-0542."
"800030","Apache\/2\.0\.([0-4].*|5\.[0-1])","9994","Apache 2.0 to 2.0.51 contain multiple problems: overflow in apr-util (OSVDB-9994), config file variable overflow (OSVDB-9991), indirect lock refresh DoS (OSVDB-9948), SSL input filter DoS (OSVDB-9742), potential infinite loop (OSVDB-9523)."
"800031","Apache\/2\.0\.([0-4].*|5\.[0-2])","10218","Apache 2.0 to 2.0.52 could allow bypassing of authentication via the Satisfy directive. CAN-2004-0811. OSVDB-10218."
"800032","Apache\/2\.0\.([0-4].*|5\.[0-3])","10637","Apache 2.0 to 2.0.53 allows bypassing of an SSLCipherSuite setting. CAN-2004-0885. OSVDB-10637. Also contains a memory exhaustion DoS through MIME folded requests. CAN-2004-0942. OSVDB-11391"
"800033","Apache\/2\.0\.([0-4].*|5\.0)","6472","Apache 2.0 to 2.0.50 contain a buffer overflow in FakeBasicAuth with trusted client certificates. CAN-2004-0488. OSVDB-6472. Also a DoS with certain input data. CAN-2004-0493. OSVDB-7269."
"800034","Apache\/2\.0\.(3[7-9]|4[0-5])","0","Apache versions 2.0.37 through 2.0.45 are vulnerable to a DoS in mod_dav. CAN-2003-0245."
"800035","Apache\/2\.0\.[0-4].*","0","Apache 2.0 to 2.0.49: memory leak in plain-HTTP-on-SSL-port handling (OSVDB-4182), a DoS with short-lived connections on rarely-accessed sockets (OSVDB-4383), and may allow unescaped data into logfiles (OSVDB-4382)."
"800036","Apache\/2\.0\.4[0-5]","0","Apache versions 2.0.40 through 2.0.45 are vulnerable to a DoS in basic authentication. CAN-2003-0189."
"800037","Apache\/2\.0\.43","0","Win9x and ME servers allow arbitrary code execution, DoS and/or arbitrary file retrieval. CAN-2003-0016. CAN-2003-0017."
"800038","Apache\/2\.0\.44","0","Apache 2.0.44 is vulnerable to a DoS when linefeed characters are submitted consecutively. CAN-2003-0132."
"800039","apachejserv\/1\.(0|1\.[0-1])","0","This version of Apache JServ allows files to be retrieved and possibly executed from outside the web root. CAN-2001-0307."
"800040","aserve","0","http://www.phone.net/aws"
"800041","ATPhttpd","0","http://www.redshift.com/~yramin/atp/atphttpd/ V0.4 contains a DoS by sending a GET 3000 chars long (many times). See securityoffice.net. Also see http://bespin.org/~qitest1 for more bugs/patches."
"800042","avenida","0","http://www.avenida.co.uk/"
"800043","Avirt","0","Check www.avirt.com for updates, some versions of the proxies have buffer overflows that allow attackers to run arbitrary commands."
"800044","awhttpd","0","http://pulsar.systes.net/awhttpd/ v2.2 has a local DoS if a user has write access to the HTML directory, see http://sec.angrypacket.com for more info."
"800045","BadBlue\/([0-1].*|2\.[0-9]{1}|2\.1[0-5]{1})","0","BadBlue Web server 2.15 allow remote users to execute commands on the machine. http://www.badblue.com/"
"800046","BadBlue\/(0\..*|1\.([0-6].*|7\.0))","0","BadBlue Web server 1.7.0 and below allows directories to be listed by appending a unicode % to the end of a string. http://www.badblue.com/"
"800047","bkhttp\/0.3","0","BitKeeper may allow anyone to execute arbitrary commands on the remote system. See http://www.securiteam.com/securitynews/5TP0D0K8UQ.html."
"800048","Blazix\/1\.2\.1","0","Can view JSP source by appending a + to the end of the request."
"800049","boa","0","http://www.boa.org/"
"800050","boulevard","0","http://www.resnova.com/boulevard"
"800051","Brickserver Modifications","0","May be vulnerable to %2f type directory listing vulnerabilities if the directory contains an index.shtml but not index.html file."
"800052","capneld","0","This is a web hosting manager. It should not be running unless required, as it allows web server administration."
"800053","cern","0","http://www.w3.org/hypertext/WWW/Daemon"
"800054","ChaiServer","0","HP printer."
"800055","Cherokee\/0\.2\.7","0","This version of Cherokee allows arbitrary files to be retreived remotely. See http://www.securitytracker.com/alerts/2001/Dec/1003074.html"
"800056","cisco ios","0","Cisco Catalyst Switch"
"800057","cisco-CPA","0","Most likely a router/switch web management port"
"800058","cl-http","0","http://www.ai.mit.edu/projects/iiip/doc/cl-http/home-page.html"
"800059","Cobalt","0","Cobalt RaQ system"
"800060","commerce-builder","0","http://www.ifact.com/"
"800061","CompaqHTTPServer","0","Has had a few remote DoS issues. Can also give a lot of system information, especially if anonymous access enabled."
"800062","cosmos","0","http://www.ris.fr/"
"800063","DeleGate\/","0","www.globalintersec.com has found multiple vulnerabilities in the DeleGate proxies and recommends using Squid or another proxy device as the author(s) have not fixed previous versions."
"800064","DeleGate\/7\.7\.[0-1]","0","DeleGate 7.7.1 & 7.7.0 are vulnerable to CSS."
"800065","dwhttpd","0","Probably Sun Microsystem's AnswerBook server. v3.1a4, 4.0.2a7a and 4.1a6 have problems."
"800066","dwhttpd\/4\.(0\.2a7a|1a6)","0","May allow unauthorized users to add administrators or view logs remotely."
"800067","Embedded HTTP Server","0","Likely this is a D-Link SoHo router."
"800068","emwac","0","http://emwac.ed.ac.uk/"
"800069","enterpriseweb","0","http://www.beyond-software.com/products/eweb/eweb.html"
"800070","Eserv\/2\.97","0","Server allows pass protected directories to be retrieved by prepending '/./' to it, ie http://server/./protected/, or directory listings by appending ?"
"800071","Essentia\/2\.1","0","Essentia 2.1 is vulnerable to directory traversal problems with /../ type requests, along with a DoS on long (2000 chars) requests."
"800072","Ews/","0","Probably a printer."
"800073","falcon","0","May allow ../../ file system browsing"
"800074","fnord","0","Win 32 platform"
"800075","Folkweb","0","Win 32 platform"
"800076","frontier","0","http://www.frontiertech.com/products/superweb.htm"
"800077","frontpage","0","http://www.insecure.org/sploits/Microsoft.frontpage.insecurities.html"
"800078","^ghttpd\/1\.[0-4]","0","The Ghttpd server may contain a remote buffer overflow. Upgrade to the latest version."
"800079","glaci","0","Netware web server"
"800080","GoAhead-Webs","0","This may be a Cyclade, http://www.cyclades.com/"
"800081","GoAhead-Webs\/2\.(0.*|1)","0","GoAhead-Webs 2.1 and below is vulnerable to command execution through a buffer overflow. See http://www.securiteam.com for details."
"800082","Gordian Embedded","0","Lantronix device, may give system/networking information freely. Could be an access badge reader/card swipe."
"800083","goserve","0","http://www2.hursley.ibm.com/goserve"
"800084","gosite","0","http://www.gosite.com/"
"800085","GWS\/","0","Could be the Google Web Server. 2.0 seems to be current."
"800086","hellbent java webserver v0.1","0","This version of the server is vulnerable to a path disclosure bug and can allow attackers to view .prefs files under certain circumstances. Upgrade to 0.11 or higher. See http://www.securityfocus.com/archive/82/73778"
"800087","homedoor","0","http://www.opendoor.com/"
"800088","HP-Web-Server","0","HP Printer"
"800089","hyperwave","0","http://www.hyperwave.com/"
"800090","i\/net","0","http://www.inetmi.com/"
"800091","ibm internet connection server","0","http://www.ics.raleigh.ibm.com"
"800092","IBM-HTTP-Server\/1\.0","0","This IBM web server allows file source to be viewed by adding a '/' to the URI, like http://server/index.jsp/"
"800093","icecast/1\.3\.(7|8.*beta[0-2])","0","This version of Icecast may allow an attacker to execute commands on the server with a format string attack."
"800094","iis\/4","0","May be able to bypass security settings using 8.3 file names. ESB-98.015."
"800095","Intrusion\/","0","The server may be running Tripwire for web pages. This can allow attackers to gain sensitive information about the web setup."
"800096","Ipswitch-IMail\/7\.11","0","May be vulnerable to a remote command execution overflow, see http://online.securityfocus.com/archive/1/284465"
"800097","Jaguar Server","0","Probably a Sybase web interface"
"800098","jakarta-tomcat-4.0.1","0","Server will reveal path"
"800099","JavaWebServer","0","Probably Sun Microsystem's servlet interface. May have defualt code which is exploitable. Try admin/admin for id/password."
"800100","JetAdmin","0","HP Printer"
"800101","Jeus WebContainer\/([0-3]\.[0-2]\..*)","0","JEUS below 3.2.2 is vulnerable to XSS if a nonexistent url is requested, i.e. [victim site]/[javascript].jsp"
"800102","Jigsaw\/([0-1].*|2\.([0-1].*|2\.0))","0","Jigsaw 2.1.0 or below may be vulnerable to XSS if a nonexistent host name is requested, i.e. nosuchhost.domain.com/<script>..."
"800103","Jigsaw\/2\.2\.1","0","Jigsaw 2.1.1 on Windows may be tricked into revealing the system path by requesting /aux two times."
"800104","JRun\/([0-3]\..*|4\.0)","0","JRun 4.0 and below on IIS is vulnerable to remote buffer overflow with a filename over 4096. http://www.macromedia.com/v1/handlers/index.cfm?ID=23500 and http://www.eeye.com/html/Research/Advisories/index.html"
"800105","JRun\/3\.1","0","JRun 3.1 on Windows NT/2000 is vulnerable to remote buffer overflow in the Host header field that can allow attackers to exploit the system."
"800106","KazaaClient","0","Kazaa may allow sensitve information to be retrieved, http://www.securiteam.com/securitynews/5UP0L2K55W.html"
"800107","LabVIEW\/(5\.[1-9]|6\.[0-1])","0","LabVIEW 5.1.1 to 6.1 is vulnerable to a remote DoS by sending a malformed GET request. This DoS was not attempted."
"800108","Lasso\/3\.6\.5","0","This version of Blueworld WebData engine is vulnerable to DoS by sending a 1600 character long GET request."
"800109","LilHTTP\/2\.1","0","LilHTTP server 2.1 allows password protected resources to be retrieved by prepending '/./' to the url."
"800110","LocalWeb2000\/([0-1]\.*|2\.(0\.*|1\.0))","0","LocalWeb2000 2.1.0 and below allow protected files to be retrieved by prepending the request with /./"
"800111","Lotus-Domino\/([0-3].*|4\.([0-1].*|2\.([0-1].*|3)))","0","This version of Lotus-Domino server has had multiple vulnerabilities. See the bugtraq archives for details."
"800112","Lotus-Domino\/4\.[5-6]","0","This version of Lotus-Domino server is vulnerable to a DoS via the WEb Retriever. CAN-2003-0123."
"800113","Lotus-Domino\/5","0","This version of Lotus-Domino server is vulnerable to a DoS via the WEb Retriever. CAN-2003-0123."
"800114","Lotus-Domino\/5\.0\.9","0","This version of Lotus-Domino server is vulnerable to a DoS via requesting DOS devices"
"800115","Lotus-Domino\/6b.*","0","This version of Lotus-Domino server is vulnerable to a DoS via the WEb Retriever. CAN-2003-0123."
"800116","Lotus-Domino\/Release-([0-3].*|4\.([0-1].*|2\.([0-1].*|3)))","0","This version of Lotus-Domino server has had multiple vulnerabilities. See the bugtraq archives for details."
"800117","Lotus-Domino\/Release-4\.[5-6]","0","This version of Lotus-Domino server is vulnerable to a DoS via the WEb Retriever. CAN-2003-0123."
"800118","Lotus-Domino\/Release-5","0","This version of Lotus-Domino server is vulnerable to a DoS via the WEb Retriever. CAN-2003-0123."
"800119","Lotus-Domino\/Release-5\.0\.9","0","This version of Lotus-Domino server is vulnerable to a DoS via requesting DOS devices"
"800120","Lotus-Domino\/Release-6b*","0","This version of Lotus-Domino server is vulnerable to a DoS via the WEb Retriever. CAN-2003-0123."
"800121","machttp","0","http://www.starnine.com/machttp may let you download log files"
"800122","mathopd","0","http://mathop.diva.nl/"
"800123","MegaTime Chart Server","0","Server returns a .png file for all requests, all results should be validated as false-positives are likely."
"800124","micro-http/","0","Probably a printer (Tektronix?)."
"800125","MiniServ","0","This is the Webmin Unix administrator. It should not be running unless required."
"800126","mod_auth_mysql\/((0\..*)|(1\.[0-9]$))","0","This version allows an SQL insertion attack that could allow attackers to execute arbitrary SQL commands."
"800127","mod_auth_oracle\/0\.(([0-4].*)|(5\.[0-1].*))","0","This version allows an SQL insertion attack that could allow attackers to execute arbitrary SQL commands."
"800128","mod_auth_pgsql_sys\/0\.(([0-8]\..*)|(9\.[0-4].*))","0","This version allows an SQL insertion attack that could allow attackers to execute arbitrary SQL commands."
"800129","mod_auth_pgsql\/0\.(([0-8]\..*)|(9\.[0-5].*))","0","This version allows an SQL insertion attack that could allow attackers to execute arbitrary SQL commands."
"800130","mod_python\/(1.*|2\.([0-6]\..*|7\.[0-6]))","0","mod_python 2.7.6 or older may allow attackers to execute functions remotely."
"800131","mod_security\/1\.7([0-1]|RC.*)","0","mod_security 1.7RC1 to 1.7.1 are vulnerable to a buffer overflow, see http://adsystems.com.pl/adg-mod_security171.txt for details. Upgrade to 1.7.2 or higher."
"800132","mod_ssl\/(1.*|2\.([0-7]\..*|8\.[0-6]))","0","mod_ssl 2.8.7 and lower are vulnerable to a remote buffer overflow which may allow a remote shell (difficult to exploit). CVE-2002-0082, OSVDB-756."
"800133","mod_survey\/[0-3]\.0\.((9|1[0-3])|(14[a-d])|(15\-pre[0-5]))","0","mod_survey is vulnerable to a remote buffer overflow. It should be upgraded to the latest version."
"800134","mofet simple","0","Mofet Simple HTTP Server, often an embedded device like a Nortel MIPCD"
"800135","Monkey\/0\.([0-5].*|6\.[0-2]{1})","0","Monkey server is vulnerable to a remote buffer overflow, it should be upgraded at http://monkeyd.sourceforge.net/get_monkey.php?ver=4"
"800136","MS-MFC-HttpSvr/1.0","0","Server and Surfcontrol software has many remote vulnerabilities: CAN-2002-0705, CAN-2002-0706, CAN-2002-0707, CAN-2002-0708, CAN-2002-0709"
"800137","myCIO","0","The McAfee myCIO server provides antivirus updates to clients. This server has had multiple vulnerabilities in the past."
"800138","Mylo/0\.([0-1]|2\.[0-1])","0","mod_mylo may be vulnerable to a remote buffer overflow. Upgrade to the latest version. BID-8287."
"800139","MyServer 0\.([0-3]\..*|4\.[0-2])","0","MyServer versions lower than 0.5 contain multiple remote vulnerabilities."
"800140","MyWebServer\/(0\.*|1\.0[0-2])","0","MyWebServer versions 1.02 and below are vulnerable to a DoS by requesting a url of approximately 1000 characters."
"800141","ncsa","0","lower than v1.3 have multiple issues"
"800142","neowebscript","0","Apache plugin to allow TCL use"
"800143","netcloak","0","http://www.maxum.com plugin for webstar"
"800144","netpresenz","0","http://www.stairways.com/netpresenz"
"800145","NetWare","0","Novell Netware server. For recent security alerts please see http://support.novell.com/security-alerts/. For general security information read http://www.cis.ohio-state.edu/hypertext/faq/usenet/netware/security/faq.html (probably out of date)"
"800146","nsl","0","http://www.nsl.net/"
"800147","NULLhttpd\/0\.5\.1","0","NULLhttpd may allow a system DoS if a client says it will send an amount of data, then sends one byte less. This will cause the server to hold that data in memory and wait for the last byte."
"800148","OmniHTTPd","0","See http://www.omnicron.ab.ca/httpd/"
"800149","OmniHTTPd\/2\.0\.8","0","This version contains a source disclosure vulnerability (append %20 to request). Upgrade to the latest."
"800150","OmniHTTPd\/2\.0\.9","0","This version contains a remote denial of service if more than 4096 characters are used as the HTTP version in a request. Upgrade to the latest."
"800151","open-market-secure-webserver","0","http://www.openmarket.com/products/secureweb.html"
"800152","open-market-webserver","0","http://www.openmarket.com/products/webserver.html"
"800153","Oracle Applications One-Hour Install","0","The Oracle Applications One-Hour Install allows remote users to administer the database. It should not be used unless absolutely required."
"800154","Oracle_Web_Listener","0","The Oracle Web Listener allows remote users to administer the database. It should not be used unless absolutely required."
"800155","os2httpd","0","http://ftp.netcom.com/pub/kf/kfan/overview.html"
"800156","osu","0","http://kcgl1.eng.ohio-state.edu/www/doc/serverinfo.html"
"800157","PHP\/([0-3].*|4\.[0-2].*|4\.3\.[0-2])","0","PHP below 4.3.3 may allow local attackers to safe mode and gain access to unauthorized files. BID-8201."
"800158","PHP\/[0-3]\.","0","Old versions of PHP contain multiple buffer overflows and remote exploit problems. Server should be upgraded to the latest version."
"800159","PHP\/4\.0\.([2-5])","0","PHP 4.1.1 is vulnerable to remote exploits and must be upgraded."
"800160","PHP\/4\.0\.(1|3pl1)","0","PHP 4.0.1 or 4.0.3pl is vulnerable to remote exploits and should be upgraded. See http://archives.neohapsis.com/archives/vulnwatch/2002-q1/0054.html"
"800161","PHP\/4\.0\.(6|7)(RC2)?","0","PHP 4.06 to 4.07RC3 are vulnerable to remote exploits and must be upgraded."
"800162","PHP\/4\.0\.[0-3]","0","This version of PHP contains a buffer overflow in the IMAP module. Upgrade to the latest version."
"800163","PHP\/4\.0\.5","0","This version of PHP allows attackers to override safe mode and obtain the HTTP uid"
"800164","PHP\/4\.1\.1","0","PHP 4.1.1 is vulnerable to remote exploits and must be upgraded."
"800165","PHP\/4\.2\.[0-1]","0","PHP 4.2.0 and 4.2.1 are vulnerable to local and remote DoS attacks to both PHP and to the web server. Some platforms have remove command execution problems as well."
"800166","PHP\/4\.2\.0","0","PHP 4.2.0 is vulnerable to exploit via invalid checking of posix_getpwuid and posix_getpwnam. See http://www.securiteam.com for details."
"800167","phttpd","0","http://www.signum.se/phttpd"
"800168","PI\/7\.[0-4]","0","InfronTech WebTide 7.0 to 7.4 allow directory listings by sending a request like '%3f.jsp'."
"800169","Pi3Web\/2\.0","0","Server may crash after sending very long cgi parameters a few times. See http://www.securityoffice.net/"
"800170","plexus","0","http://www.bsdi.com/server/doc/plexus.html"
"800171","powerweb","0","http://www.compusource.co.za/powerweb"
"800172","process","0","http://www.process.com/"
"800173","PWS","0","Personal Web Server. requesting /....../ might give root drive list."
"800174","pws\/4","0","May be able to bypass security settings using 8.3 file names. ESB-98.015."
"800175","RapidLogic","0","Embedded device"
"800176","Resin\/1","0","Resin web server may allow attackers to read any file on the server by requesting files like '\..\..\file.txt'."
"800177","Resin\/2\.1\.1","0","Resin 2.1.1 is vulnerable to a remote denial of service by defining large variables when requesting non-existent resources."
"800178","roxen","0","http://www.roxen.com/"
"800179","rushhour","0","http://www.maxum.com/RushHour"
"800180","sambar\/(5\.|6\.(0|1|2[^.]))","0","This version of Sambar is vulnerable to XSS attacks, http://secunia.com/advisories/15465/"
"800181","sambar\/(5\.|6\.0[^0-9])","0","This version of Sambar contains multiples flaws, http://secunia.com/advisories/9578/"
"800182","sambar\/5\.1","0","http://www.sambar.com/ version 5.1 is vulnerable to source viewing by adding a +%00 to cgi requests."
"800183","Savant","0","Versions of Savant older than 3.0 can be crashed by requesting 'GET /%%% HTTP/1.0'"
"800184","Savant\/3\.0","0","Savant 3.0 (Windows) is vulnerable to a remote DoS by sending very long CGI parameters multiple times. Upgrade to a version higher than 3.0."
"800185","Savant\/3\.1","0","Savant 3.1 (Windows) is vulnerable to a DoS by sending a GET request containing a URL of approx. 291 characters or more."
"800186","ScriptEase\/0\.95","0","ScriptEase v0.95 is vulnerable to a DoS if a 2000 character file is requested. See http://securityoffice.net/ for more info."
"800187","serverseven","0","Win 32 platform (pascal)"
"800188","SetiQueue\/","0","This is a SETI@Home work-unit queue server, proxy, and web server, http://www.reneris.com/seti/default.asp."
"800189","Simple, Secure Web Server 1.1","0","Probably a Raptor firewall (which may answer to protect the web server from an invalid request)."
"800190","SimpleWebserver\/2\.([0-9]|1\.[0-2])","0","TelCondex SimpleWebserver 2.12.30210 Build 3285 is vulnerable to a buffer overflow if 704 bytes are sent in the referrer header. Upgrade to 2.13 or higher."
"800191","SimpleWebserver\/SimpleWebserver\/([0-1].*|2\.(0.*|[0-9]{1}\..*|(10|11|12)\..*|13\.[0-2].*|13\.310([0-1].*|2[0-7])))","0","TelCondex Simpleserver 2.13.31027 Build 3289 and below allow directory traversal with '/.../' entries."
"800192","SiteScope Administrator","0","The SiteScope Administrator allows SiteScope configuration if not password protected or if a valid account can be found."
"800193","Specialix JETSTREAM","0","Probably a printer."
"800194","spinnaker","0","http://www.telegrafix.com/"
"800195","spry","0","http://wsk.eit.com/"
"800196","Squid\/2\.[0-4]","0","The Squid proxy may be vulnerable to an FTP buffer overflow."
"800197","Squid\/2\.[3-4]\..*(STABLE[1-4]|DEVEL(2|4))","0","The Squid server may be vulnerable to a PUT request DoS. Also may have SNMP/FTP/HTCP vuls if running."
"800198","Statistics Server","0","Statistics Server versions lower than 5.03 are vulnerable to a remote command execution flaw."
"800199","Storage","0","Try to login with 'admin' or 'monitor'"
"800200","StorageTek","0","Try to login with 'admin' or 'monitor'"
"800201","Stronghold","0","May be a Big IP (load balancer) admin interface."
"800202","Sun_WebServer","0","Solaris Management Console (SMC)"
"800203","Teamtrack","0","May allow ../../../ directory listing. See www.wiretrip.net for RFP9904"
"800204","telefinder","0","http://bbs.spiderisland.com/"
"800205","thttpd","0","www.acme.com/software/thttpd. Below v2.03 lets reading of system files by adding // like //etc/passwd. 2.04 has a buffer overflow in 'If-Modified-Since' header."
"800206","thttpd/2.20b","0","Server is vulnerable to cross site scripting in error messages."
"800207","tivo-httpd","0","Tivo server allows Tivo DVRS and comps to download video from the Tivo to a desktop. User ID is 'tivo' and pass is the Media Access Key (MAK)"
"800208","Tivo","0","TiVo Calypso Server allows TiVo DVRs to talk to computers to download music and video via an HTTP web server on port 8101."
"800209","tme_10_netview_vs","0","Tivoli web manager"
"800210","Ultraseek","0","The Ultraseek server has had multiple buffer overflows and cross site scripting vuls. Make sure the latest version is being run."
"800211","viking","0","http://www.robtex.com/viking/"
"800212","VisualRoute","0","VisualRoute web servers allow remote users to perform traceroutes to third parties while remaining anonymous. This should not be run without proper protection."
"800213","vm\:webserver","0","http://www.vm.sterling.com/"
"800214","vqserver","0","version 1.9.9 and below have remote file read vulnerability, http://www.vqsoft.com/"
"800215","w4","0","http://130.89.224.16/"
"800216","web commander","0","http://www.luckman.com/wc/webcom.html"
"800217","web server 4d","0","http://www.mdg.com/"
"800218","Web_Server_4D\/3\.5\.3","0","Vulnerable to a DoS and a directory traversal problem. See http://www.securityoffice.net/"
"800219","Web4All\/1\.2\.8","0","Web Server 4 Everyone may be vulnerable to a remote DoS if 2000 characters are requested."
"800220","Web4Everyone\/1\.2\.8","0","Web Server 4 Everyone may be vulnerable to a remote DoS if 2000 characters are requested."
"800221","webdisk","0","http://www.ararat.com/"
"800222","webforone","0","http://www.resnova.com/webforone"
"800223","WebLogic.*6\.0.*(SP(1.*|2 [^R].*))","0","Weblogic may be vulnerable to multiple remote problems. See http://www.s21sec.com/en/avisos/s21sec-011-en.txt and http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA03-28.jsp."
"800224","WebLogic.*6\.1.*(SP([1-3].*|[^4-9].*))","0","Weblogic may be vulnerable to multiple remote problems. See http://www.s21sec.com/en/avisos/s21sec-011-en.txt and http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA03-28.jsp."
"800225","WebLogic.*7\.0.(\.0\.1)?.*(SP[^2-9])?","0","Weblogic may be vulnerable to multiple remote problems. See http://www.s21sec.com/en/avisos/s21sec-011-en.txt and http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA03-28.jsp."
"800226","Weblogic\/6\.1","0","WebLogic 6.1 SP2 for Win2k may have multiple problems. See http://dev2dev.bea.com/resourcelibrary/advisoriesdetail.jsp?highlight=advisoriesnotifications&path=components/dev2dev/resourcelibrary/advisoriesnotifications/securityadvisoriesbea020303.htm for details."
"800227","webquest","0","http://www.questar.com/"
"800228","webshare","0","http://www.beyond-software.com/products/eweb/webshare/webshare.html"
"800229","websitepro","0","http://website.ora.com/"
"800230","WebSitePro\/2\.[0-4]","0","Versions of WebSitePro lower than 2.5 have multiple buffer overflows. Upgrade to 2.5 or higher. CAN-2000-0623."
"800231","WebSitePro\/3\.1\.11\.0","0","WebSitePro 3.1.11.0 can disclose source code by requesting the 8.3 file name instead of the full file name."
"800232","Websphere\/4\.0\.3","0","This server may have a DoS if large HTTP headers are received. Install PQ62144, http://www-1.ibm.com/support/docview.wss?rs=180&context=SSEQTP&q=PQ62144&uid=swg24001610"
"800233","webstar","0","http://www.starnine.com/webstar may let you download log files"
"800234","WebZerver","0","May be DiscZerver"
"800235","whostmgr","0","This is a web host and system manager. It should not be running unless required, as it allows system/server administration."
"800236","wildcat","0","http://www.santronics.com/"
"800237","Worldgroup\/3\.20","0","WoldGroup 3.20 is vulnerable to a remote root exploit, it should be upgraded."
"800238","Xedia","0","Lucent access points may be vulnerable to a DoS if 4000 characters are requested. See http://www.phenoelit.de/stuff/Lucent_Xedia.txt for info."
"800239","Xeneo\/(2\.\1\.[0-9]|[0-1]\..*)","0","May be able to DoS the server by requesting '%A', see http://www.secunia.com/secunia_security_advisories/ ."
"800240","Xeneo\/(2\.\1\.0\.0|2\.0\.759\.6)","0","May be able to DoS the server by requesting '%', see http://www.idefense.com/advisory/11.04.02b.txt ."
"800241","xerox","0","Probably a printer."
"800242","xitami","0","Open Source Windows server may be vulnerable to a buffer overflow. Check for the latest version from Xitami.com."
"800243","xitami\/(2.[0-4]*|1\.*)","0","This version of Xitami from http://www.imatix.com/html/xitami/ may disclose script source if any error occurs. Upgrade to a newer version."
"800244","zbserver\/","0","May be vulnerale to a DoS (version 'Pro 1.50-r13'), see http://www.securityoffice.net/. http://www.zbserver.com/"
"800245","zeus","0","http://www.zeus.co.uk/ see RFP9905 (wiretrip.net) for more info"
"800246","Zeus\/3\.1","0","Bug allows source of CGI to be viewed. Upgrade to 3.3.5a or higher"
"800247","Zeus\/3\.2","0","Bug allows source of CGI to be viewed. Upgrade to 3.3.5a or higher"
"800248","Zeus\/3\.3","0","Bug allows source of CGI to be viewed. Upgrade to 3.3.5a or higher"
"800249","Zope\/((0|1).*|2\.((0\..*)|(1\..*)|(2\..*)|(3\.[0-2])))","0","Zope servers below 2.3.3 contain multiple remote configuration problems and vulnerabilities. Upgrade to the latest version."
"800250","ZyXEL-RomPager","0","Probably a Netgear SoHo Router (RT-314 or similar), most likely vulnerable to CSS."
"800251","Netscape-Enterprise\/4.","0","Netscape-Enterprise 4.x was made End of Life by Sun in December  2002. http://www.sun.com/software/products/web_srvr/lifecycle.xml"
"800252","CERN\/3","0","CERN 3.0A has not been updated since July, 1996 and likely has a few flaws."
"800253","Agent-ListenServer-HttpSvr\/1\.0","0","McAfee ePolicy Orchestra Agent. This may reveal information about anti-virus and software update schedules."
"800254","HP System Management Homepage\/([0-2]|3\.0\.(0|1\.([0-6]|7[0-2])))",54608","HP System Management Homepage version contains multiple vulnerabilities."