📄 db_server_msgs
字号:
"800122","mathopd","http://mathop.diva.nl/""800123","MegaTime Chart Server","Server returns a .png file for all requests, all results should be validated as false-positives are likely.""800124","micro-http/","Probably a printer (Tektronix?).""800125","MiniServ","This is the Webmin Unix administrator. It should not be running unless required.""800126","mod_auth_mysql\/((0\..*)|(1\.[0-9]$))","This version allows an SQL insertion attack that could allow attackers to execute arbitrary SQL commands.""800127","mod_auth_oracle\/0\.(([0-4].*)|(5\.[0-1].*))","This version allows an SQL insertion attack that could allow attackers to execute arbitrary SQL commands.""800128","mod_auth_pgsql_sys\/0\.(([0-8]\..*)|(9\.[0-4].*))","This version allows an SQL insertion attack that could allow attackers to execute arbitrary SQL commands.""800129","mod_auth_pgsql\/0\.(([0-8]\..*)|(9\.[0-5].*))","This version allows an SQL insertion attack that could allow attackers to execute arbitrary SQL commands.""800130","mod_python\/(1.*|2\.([0-6]\..*|7\.[0-6]))","mod_python 2.7.6 or older may allow attackers to execute functions remotely.""800131","mod_security\/1\.7([0-1]|RC.*)","mod_security 1.7RC1 to 1.7.1 are vulnerable to a buffer overflow, see http://adsystems.com.pl/adg-mod_security171.txt for details. Upgrade to 1.7.2 or higher.""800132","mod_ssl\/(1.*|2\.([0-7]\..*|8\.[0-6]))","mod_ssl 2.8.7 and lower are vulnerable to a remote buffer overflow which may allow a remote shell (difficult to exploit). CAN-2002-0082.""800133","mod_survey\/[0-3]\.0\.((9|1[0-3])|(14[a-d])|(15\-pre[0-5]))","mod_survey is vulnerable to a remote buffer overflow. It should be upgraded to the latest version.""800134","mofet simple","Mofet Simple HTTP Server, often an embedded device like a Nortel MIPCD""800135","Monkey\/0\.([0-5].*|6\.[0-2]{1})","Monkey server is vulnerable to a remote buffer overflow, it should be upgraded at http://monkeyd.sourceforge.net/get_monkey.php?ver=4""800136","MS-MFC-HttpSvr/1.0","Server and Surfcontrol software has many remote vulnerabilities: CAN-2002-0705, CAN-2002-0706, CAN-2002-0707, CAN-2002-0708, CAN-2002-0709""800137","myCIO","The McAfee myCIO server provides antivirus updates to clients. This server has had multiple vulnerabilities in the past.""800138","Mylo/0\.([0-1]|2\.[0-1])","mod_mylo may be vulnerable to a remote buffer overflow. Upgrade to the latest version. BID-8287.""800139","MyServer 0\.([0-3]\..*|4\.[0-2])","MyServer versions lower than 0.5 contain multiple remote vulnerabilities.""800140","MyWebServer\/(0\.*|1\.0[0-2])","MyWebServer versions 1.02 and below are vulnerable to a DoS by requesting a url of approximately 1000 characters.""800141","ncsa","lower than v1.3 have multiple issues""800142","neowebscript","Apache plugin to allow TCL use""800143","netcloak","http://www.maxum.com plugin for webstar""800144","netpresenz","http://www.stairways.com/netpresenz""800145","NetWare","Novell Netware server. For recent security alerts please see http://support.novell.com/security-alerts/. For general security information read http://www.cis.ohio-state.edu/hypertext/faq/usenet/netware/security/faq.html (probably out of date)""800146","nsl","http://www.nsl.net/""800147","NULLhttpd\/0\.5\.1","NULLhttpd may allow a system DoS if a client says it will send an amount of data, then sends one byte less. This will cause the server to hold that data in memory and wait for the last byte.""800148","OmniHTTPd","See http://www.omnicron.ab.ca/httpd/""800149","OmniHTTPd\/2\.0\.8","This version contains a source disclosure vulnerability (append %20 to request). Upgrade to the latest.""800150","OmniHTTPd\/2\.0\.9","This version contains a remote denial of service if more than 4096 characters are used as the HTTP version in a request. Upgrade to the latest.""800151","open-market-secure-webserver","http://www.openmarket.com/products/secureweb.html""800152","open-market-webserver","http://www.openmarket.com/products/webserver.html""800153","Oracle Applications One-Hour Install","The Oracle Applications One-Hour Install allows remote users to administer the database. It should not be used unless absolutely required.""800154","Oracle_Web_Listener","The Oracle Web Listener allows remote users to administer the database. It should not be used unless absolutely required.""800155","os2httpd","http://ftp.netcom.com/pub/kf/kfan/overview.html""800156","osu","http://kcgl1.eng.ohio-state.edu/www/doc/serverinfo.html""800157","PHP\/([0-3].*|4\.[0-2].*|4\.3\.[0-2])","PHP below 4.3.3 may allow local attackers to safe mode and gain access to unauthorized files. BID-8201.""800158","PHP\/[0-3]\.","Old versions of PHP contain multiple buffer overflows and remote exploit problems. Server should be upgraded to the latest version.""800159","PHP\/4\.0\.([2-5])","PHP 4.1.1 is vulnerable to remote exploits and must be upgraded.""800160","PHP\/4\.0\.(1|3pl1)","PHP 4.0.1 or 4.0.3pl is vulnerable to remote exploits and should be upgraded. See http://archives.neohapsis.com/archives/vulnwatch/2002-q1/0054.html""800161","PHP\/4\.0\.(6|7)(RC2)?","PHP 4.06 to 4.07RC3 are vulnerable to remote exploits and must be upgraded.""800162","PHP\/4\.0\.[0-3]","This version of PHP contains a buffer overflow in the IMAP module. Upgrade to the latest version.""800163","PHP\/4\.0\.5","This version of PHP allows attackers to override safe mode and obtain the HTTP uid""800164","PHP\/4\.1\.1","PHP 4.1.1 is vulnerable to remote exploits and must be upgraded.""800165","PHP\/4\.2\.[0-1]","PHP 4.2.0 and 4.2.1 are vulnerable to local and remote DoS attacks to both PHP and to the web server. Some platforms have remove command execution problems as well.""800166","PHP\/4\.2\.0","PHP 4.2.0 is vulnerable to exploit via invalid checking of posix_getpwuid and posix_getpwnam. See http://www.securiteam.com for details.""800167","phttpd","http://www.signum.se/phttpd""800168","PI\/7\.[0-4]","InfronTech WebTide 7.0 to 7.4 allow directory listings by sending a request like '%3f.jsp'.""800169","Pi3Web\/2\.0","Server may crash after sending very long cgi parameters a few times. See http://www.securityoffice.net/""800170","plexus","http://www.bsdi.com/server/doc/plexus.html""800171","powerweb","http://www.compusource.co.za/powerweb""800172","process","http://www.process.com/""800173","PWS","Personal Web Server. requesting /....../ might give root drive list.""800174","pws\/4","May be able to bypass security settings using 8.3 file names. ESB-98.015.""800175","RapidLogic","Embedded device""800176","Resin\/1","Resin web server may allow attackers to read any file on the server by requesting files like '\..\..\file.txt'.""800177","Resin\/2\.1\.1","Resin 2.1.1 is vulnerable to a remote denial of service by defining large variables when requesting non-existent resources.""800178","roxen","http://www.roxen.com/""800179","rushhour","http://www.maxum.com/RushHour""800180","sambar\/(5\.|6\.(0|1|2[^.]))","This version of Sambar is vulnerable to XSS attacks, http://secunia.com/advisories/15465/""800181","sambar\/(5\.|6\.0[^0-9])","This version of Sambar contains multiples flaws, http://secunia.com/advisories/9578/""800182","sambar\/5\.1","http://www.sambar.com/ version 5.1 is vulnerable to source viewing by adding a +%00 to cgi requests.""800183","Savant","Versions of Savant older than 3.0 can be crashed by requesting 'GET /%%% HTTP/1.0'""800184","Savant\/3\.0","Savant 3.0 (Windows) is vulnerable to a remote DoS by sending very long CGI parameters multiple times. Upgrade to a version higher than 3.0.""800185","Savant\/3\.1","Savant 3.1 (Windows) is vulnerable to a DoS by sending a GET request containing a URL of approx. 291 characters or more.""800186","ScriptEase\/0\.95","ScriptEase v0.95 is vulnerable to a DoS if a 2000 character file is requested. See http://securityoffice.net/ for more info.""800187","serverseven","Win 32 platform (pascal)""800188","SetiQueue\/","This is a SETI@Home work-unit queue server, proxy, and web server, http://www.reneris.com/seti/default.asp.""800189","Simple, Secure Web Server 1.1","Probably a Raptor firewall (which may answer to protect the web server from an invalid request).""800190","SimpleWebserver\/2\.([0-9]|1\.[0-2])","TelCondex SimpleWebserver 2.12.30210 Build 3285 is vulnerable to a buffer overflow if 704 bytes are sent in the referrer header. Upgrade to 2.13 or higher.""800191","SimpleWebserver\/SimpleWebserver\/([0-1].*|2\.(0.*|[0-9]{1}\..*|(10|11|12)\..*|13\.[0-2].*|13\.310([0-1].*|2[0-7])))","TelCondex Simpleserver 2.13.31027 Build 3289 and below allow directory traversal with '/.../' entries.""800192","SiteScope Administrator","The SiteScope Administrator allows SiteScope configuration if not password protected or if a valid account can be found.""800193","Specialix JETSTREAM","Probably a printer.""800194","spinnaker","http://www.telegrafix.com/""800195","spry","http://wsk.eit.com/""800196","Squid\/2\.[0-4]","The Squid proxy may be vulnerable to an FTP buffer overflow.""800197","Squid\/2\.[3-4]\..*(STABLE[1-4]|DEVEL(2|4))","The Squid server may be vulnerable to a PUT request DoS. Also may have SNMP/FTP/HTCP vuls if running.""800198","Statistics Server","Statistics Server versions lower than 5.03 are vulnerable to a remote command execution flaw.""800199","Storage","Try to login with 'admin' or 'monitor'""800200","StorageTek","Try to login with 'admin' or 'monitor'""800201","Stronghold","May be a Big IP (load balancer) admin interface.""800202","Sun_WebServer","Solaris Management Console (SMC)""800203","Teamtrack","May allow ../../../ directory listing. See www.wiretrip.net for RFP9904""800204","telefinder","http://bbs.spiderisland.com/""800205","thttpd","www.acme.com/software/thttpd. Below v2.03 lets reading of system files by adding // like //etc/passwd. 2.04 has a buffer overflow in 'If-Modified-Since' header.""800206","thttpd/2.20b","Server is vulnerable to cross site scripting in error messages.""800207","tivo-httpd","Tivo server allows Tivo DVRS and comps to download video from the Tivo to a desktop. User ID is 'tivo' and pass is the Media Access Key (MAK)""800208","Tivo","TiVo Calypso Server allows TiVo DVRs to talk to computers to download music and video via an HTTP web server on port 8101.""800209","tme_10_netview_vs","Tivoli web manager""800210","Ultraseek","The Ultraseek server has had multiple buffer overflows and cross site scripting vuls. Make sure the latest version is being run.""800211","viking","http://www.robtex.com/viking/""800212","VisualRoute","VisualRoute web servers allow remote users to perform traceroutes to third parties while remaining anonymous. This should not be run without proper protection.""800213","vm\:webserver","http://www.vm.sterling.com/""800214","vqserver","version 1.9.9 and below have remote file read vulnerability, http://www.vqsoft.com/""800215","w4","http://130.89.224.16/""800216","web commander","http://www.luckman.com/wc/webcom.html""800217","web server 4d","http://www.mdg.com/""800218","Web_Server_4D\/3\.5\.3","Vulnerable to a DoS and a directory traversal problem. See http://www.securityoffice.net/""800219","Web4All\/1\.2\.8","Web Server 4 Everyone may be vulnerable to a remote DoS if 2000 characters are requested.""800220","Web4Everyone\/1\.2\.8","Web Server 4 Everyone may be vulnerable to a remote DoS if 2000 characters are requested.""800221","webdisk","http://www.ararat.com/""800222","webforone","http://www.resnova.com/webforone""800223","WebLogic.*6\.0.*(SP(1.*|2 [^R].*))","Weblogic may be vulnerable to multiple remote problems. See http://www.s21sec.com/en/avisos/s21sec-011-en.txt and http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA03-28.jsp.""800224","WebLogic.*6\.1.*(SP([1-3].*|[^4-9].*))","Weblogic may be vulnerable to multiple remote problems. See http://www.s21sec.com/en/avisos/s21sec-011-en.txt and http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA03-28.jsp.""800225","WebLogic.*7\.0.(\.0\.1)?.*(SP[^2-9])?","Weblogic may be vulnerable to multiple remote problems. See http://www.s21sec.com/en/avisos/s21sec-011-en.txt and http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA03-28.jsp.""800226","Weblogic\/6\.1","WebLogic 6.1 SP2 for Win2k may have multiple problems. See http://dev2dev.bea.com/resourcelibrary/advisoriesdetail.jsp?highlight=advisoriesnotifications&path=components/dev2dev/resourcelibrary/advisoriesnotifications/securityadvisoriesbea020303.htm for details.""800227","webquest","http://www.questar.com/""800228","webshare","http://www.beyond-software.com/products/eweb/webshare/webshare.html""800229","websitepro","http://website.ora.com/""800230","WebSitePro\/2\.[0-4]","Versions of WebSitePro lower than 2.5 have multiple buffer overflows. Upgrade to 2.5 or higher. CAN-2000-0623.""800231","WebSitePro\/3\.1\.11\.0","WebSitePro 3.1.11.0 can disclose source code by requesting the 8.3 file name instead of the full file name.""800232","Websphere\/4\.0\.3","This server may have a DoS if large HTTP headers are received. Install PQ62144, http://www-1.ibm.com/support/docview.wss?rs=180&context=SSEQTP&q=PQ62144&uid=swg24001610""800233","webstar","http://www.starnine.com/webstar may let you download log files""800234","WebZerver","May be DiscZerver""800235","whostmgr","This is a web host and system manager. It should not be running unless required, as it allows system/server administration.""800236","wildcat","http://www.santronics.com/""800237","Worldgroup\/3\.20","WoldGroup 3.20 is vulnerable to a remote root exploit, it should be upgraded.""800238","Xedia","Lucent access points may be vulnerable to a DoS if 4000 characters are requested. See http://www.phenoelit.de/stuff/Lucent_Xedia.txt for info.""800239","Xeneo\/(2\.\1\.[0-9]|[0-1]\..*)","May be able to DoS the server by requesting '%A', see http://www.secunia.com/secunia_security_advisories/ .""800240","Xeneo\/(2\.\1\.0\.0|2\.0\.759\.6)","May be able to DoS the server by requesting '%', see http://www.idefense.com/advisory/11.04.02b.txt .""800241","xerox","Probably a printer.""800242","xitami","Open Source Windows server may be vulnerable to a buffer overflow. Check for the latest version from Xitami.com.""800243","xitami\/(2.[0-4]*|1\.*)","This version of Xitami from http://www.imatix.com/html/xitami/ may disclose script source if any error occurs. Upgrade to a newer version.""800244","zbserver\/","May be vulnerale to a DoS (version 'Pro 1.50-r13'), see http://www.securityoffice.net/. http://www.zbserver.com/""800245","zeus","http://www.zeus.co.uk/ see RFP9905 (wiretrip.net) for more info""800246","Zeus\/3\.1","Bug allows source of CGI to be viewed. Upgrade to 3.3.5a or higher""800247","Zeus\/3\.2","Bug allows source of CGI to be viewed. Upgrade to 3.3.5a or higher""800248","Zeus\/3\.3","Bug allows source of CGI to be viewed. Upgrade to 3.3.5a or higher""800249","Zope\/((0|1).*|2\.((0\..*)|(1\..*)|(2\..*)|(3\.[0-2])))","Zope servers below 2.3.3 contain multiple remote configuration problems and vulnerabilities. Upgrade to the latest version.""800250","ZyXEL-RomPager","Probably a Netgear SoHo Router (RT-314 or similar), most likely vulnerable to CSS.""800251","Netscape-Enterprise\/4.","Netscape-Enterprise 4.x was made End of Life by Sun in December 2002. http://www.sun.com/software/products/web_srvr/lifecycle.xml""800252","CERN\/3","CERN 3.0A has not been updated since July, 1996 and likely has a few flaws."
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -