![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
ID # | Risk | |
1.3.6.1.4.1.25623.1.0.902271 | Hoch | WinTFTP Server Pro Remote Directory Traversal Vulnerability |
1.3.6.1.4.1.25623.1.0.900720 | Hoch | AVG AntiVirus Engine Malware Detection Bypass Vulnerability - Linux |
1.3.6.1.4.1.25623.1.0.900719 | Hoch | AVG AntiVirus Engine Malware Detection Bypass Vulnerability - Windows |
1.3.6.1.4.1.25623.1.0.900685 | Hoch | Samba Format String Vulnerability |
1.3.6.1.4.1.25623.1.0.900174 | Hoch | Visagesoft eXPert PDF Viewer ActiveX Control File Overwrite Vulnerability |
1.3.6.1.4.1.25623.1.0.802623 | Mittel | Distinct TFTP Server <= 3.01 Directory Traversal Vulnerability - Active Check |
1.3.6.1.4.1.25623.1.0.802405 | Hoch | Ipswitch TFTP Server Directory Traversal Vulnerability |
1.3.6.1.4.1.25623.1.0.802027 | Mittel | Avaya IP Office Manager TFTP Server Directory Traversal Vulnerability |
1.3.6.1.4.1.25623.1.0.801965 | Hoch | CiscoKits TFTP Server Directory Traversal Vulnerability |
1.3.6.1.4.1.25623.1.0.801543 | Hoch | AT TFTP Server Directory Traversal Vulnerability |
1.3.6.1.4.1.25623.1.0.80081 | Hoch | Sambar Default Accounts |
1.3.6.1.4.1.25623.1.0.800404 | Hoch | Samba Root File System Access Security Vulnerability |
1.3.6.1.4.1.25623.1.0.80028 | Hoch | User Mountable NFS shares |
1.3.6.1.4.1.25623.1.0.80016 | Hoch | Kiwi CatTools < 3.2.9 Directory Traversal |
1.3.6.1.4.1.25623.1.0.56899 | Mittel | RaidenHTTP arbitrary file disclosure |
1.3.6.1.4.1.25623.1.0.56898 | Mittel | RaidenHTTP script source disclosure |
1.3.6.1.4.1.25623.1.0.52027 | Mittel | CommuniGate Pro Webmail File Disclosure |
1.3.6.1.4.1.25623.1.0.52024 | Hoch | CommuniGate Pro Webmail File Disclosure(2) |
1.3.6.1.4.1.25623.1.0.51909 | Mittel | Icecast Directory Traversal Vulnerability |
1.3.6.1.4.1.25623.1.0.51866 | Hoch | MySQL database has a user with no password |
1.3.6.1.4.1.25623.1.0.51790 | Hoch | RaidenHTTP buffer overflow |
1.3.6.1.4.1.25623.1.0.51786 | Mittel | BadBlue Connections denial of service |
1.3.6.1.4.1.25623.1.0.51785 | Hoch | BadBlue ext.dll buffer overflow |
1.3.6.1.4.1.25623.1.0.51784 | Hoch | BadBlue administrative access vulnerability |
1.3.6.1.4.1.25623.1.0.51783 | Hoch | BadBlue administrative access vulnerability |
1.3.6.1.4.1.25623.1.0.51677 | Mittel | Viking directory traversal |
1.3.6.1.4.1.25623.1.0.50205 | Hoch | PhotoPost Pro Cross Site Scripting/SQL injection |
1.3.6.1.4.1.25623.1.0.50204 | Hoch | ReviewPost Pro Cross Site Scripting/SQL injection |
1.3.6.1.4.1.25623.1.0.50203 | Mittel | QwikiWiki Directory Traversal vulnerability |
1.3.6.1.4.1.25623.1.0.200001 | Hoch | Kiwi CatTools < 3.2.9 Directory Traversal |
1.3.6.1.4.1.25623.1.0.19510 | Hoch | TFTP directory permissions (HP Ignite-UX) |
1.3.6.1.4.1.25623.1.0.19509 | Hoch | TFTP file detection (HP Ignite-UX passwd) |
1.3.6.1.4.1.25623.1.0.19508 | Mittel | TFTP file detection (HP Ignite-UX) |
1.3.6.1.4.1.25623.1.0.19507 | Mittel | TFTP file detection (Cisco CallManager) |
1.3.6.1.4.1.25623.1.0.18262 | Hoch | TFTP Directory Traversal Vulnerabilities - Active Check |
1.3.6.1.4.1.25623.1.0.17342 | Mittel | TFTP file detection (Cisco IOS) |
1.3.6.1.4.1.25623.1.0.17341 | Mittel | TFTP file detection (Cisco IOS CA) |
1.3.6.1.4.1.25623.1.0.16142 | Mittel | IlohaMail Readable Configuration Files |
1.3.6.1.4.1.25623.1.0.16137 | Mittel | Simple PHP Blog dir traversal |
1.3.6.1.4.1.25623.1.0.15984 | Hoch | User Mountable NFS shares |
1.3.6.1.4.1.25623.1.0.15394 | Hoch | Samba Remote Arbitrary File Access |
1.3.6.1.4.1.25623.1.0.14800 | Mittel | Apache Subversion Information Disclosure Vulnerability (Nov 2005) |
1.3.6.1.4.1.25623.1.0.14631 | Mittel | IlohaMail Arbitrary File Access via Session Variable Vulnerability |
1.3.6.1.4.1.25623.1.0.14630 | Mittel | IlohaMail Arbitrary File Access via Language Variable |
1.3.6.1.4.1.25623.1.0.14354 | Mittel | Music Daemon <= 0.0.3 File Disclosure Vulnerability |
1.3.6.1.4.1.25623.1.0.14353 | Mittel | Music Daemon Denial of Service |
1.3.6.1.4.1.25623.1.0.14241 | Mittel | 4D WebStar Symbolic Link Vulnerability |
1.3.6.1.4.1.25623.1.0.14229 | Mittel | thttpd Directory Traversal Vulnerability (CVE-2004-2628) - Windows |
1.3.6.1.4.1.25623.1.0.13848 | Mittel | Subversion < 1.0.6 Module File Restriction Bypass |
1.3.6.1.4.1.25623.1.0.12284 | Hoch | Subversion < 1.0.5 SVN Protocol Parser Remote Integer Overflow |
1.3.6.1.4.1.25623.1.0.12261 | Hoch | Subversion remote Buffer Overflow |
1.3.6.1.4.1.25623.1.0.12260 | Hoch | Subversion Pre-Commit-Hook Vulnerability |
1.3.6.1.4.1.25623.1.0.12259 | Niedrig | Subversion Detection |
1.3.6.1.4.1.25623.1.0.12254 | Mittel | IMAP arbitrary file retrieval |
1.3.6.1.4.1.25623.1.0.12246 | Hoch | Firebird DB remote buffer overflow |
1.3.6.1.4.1.25623.1.0.12230 | Hoch | rsync path traversal |
1.3.6.1.4.1.25623.1.0.12105 | Mittel | Use LDAP search request to retrieve information from NT Directory Services |
1.3.6.1.4.1.25623.1.0.11988 | Hoch | FSP Suite Directory Traversal Vulnerability |
1.3.6.1.4.1.25623.1.0.11948 | Hoch | Avotus CDR mm File Retrieval Attempt |
1.3.6.1.4.1.25623.1.0.11914 | Mittel | TheServer clear text password |
1.3.6.1.4.1.25623.1.0.11909 | Mittel | Apache2 double slash dir index |
1.3.6.1.4.1.25623.1.0.11716 | Hoch | Misconfigured Gnutella |
1.3.6.1.4.1.25623.1.0.11656 | Mittel | Eserv Directory Index |
1.3.6.1.4.1.25623.1.0.11586 | Hoch | FileMakerPro Detection |
1.3.6.1.4.1.25623.1.0.11576 | Hoch | thttpd directory traversal thru Host: |
1.3.6.1.4.1.25623.1.0.11504 | Hoch | MultiTech Proxy Server Default Password |
1.3.6.1.4.1.25623.1.0.11493 | Mittel | Sambar Default Accounts |
1.3.6.1.4.1.25623.1.0.11481 | Hoch | mod_auth_any command execution |
1.3.6.1.4.1.25623.1.0.11480 | Hoch | 3com RAS 1500 configuration disclosure |
1.3.6.1.4.1.25623.1.0.11419 | Sonstige | Office files list |
1.3.6.1.4.1.25623.1.0.11386 | Hoch | Lotus Domino 6.0 vulnerabilities |
1.3.6.1.4.1.25623.1.0.11358 | Hoch | The remote portmapper forwards NFS requests |
1.3.6.1.4.1.25623.1.0.11357 | Hoch | NFS cd .. |
1.3.6.1.4.1.25623.1.0.11356 | Hoch | Mountable NFS shares |
1.3.6.1.4.1.25623.1.0.11353 | Hoch | NFS fsirand |
1.3.6.1.4.1.25623.1.0.11210 | Hoch | Apache < 2.0.44 file reading on Win32 |
1.3.6.1.4.1.25623.1.0.11005 | Hoch | LocalWeb2000 <= 2.1.0 Multiple Vulnerabilities |
1.3.6.1.4.1.25623.1.0.10805 | Hoch | Informix traversal |
1.3.6.1.4.1.25623.1.0.10706 | Mittel | McAfee myCIO Directory Traversal |
1.3.6.1.4.1.25623.1.0.106920 | Hoch | HP Printers Arbitrary Code Execution Vulnerability |
1.3.6.1.4.1.25623.1.0.10691 | Hoch | Netscape Enterprise INDEX request problem |
1.3.6.1.4.1.25623.1.0.10683 | Hoch | iPlanet Certificate Management Traversal |
1.3.6.1.4.1.25623.1.0.10680 | Hoch | Microsoft Internet Information Services (IIS) Source Fragment Disclosure |
1.3.6.1.4.1.25623.1.0.105957 | Hoch | DSS TFTP Server <= 1.0 Path Traversal Vulnerability - Active Check |
1.3.6.1.4.1.25623.1.0.10536 | Hoch | Anaconda remote file retrieval |
1.3.6.1.4.1.25623.1.0.10533 | Mittel | Web Shopper Remote File Retrieval Vulnerability - Active Check |
1.3.6.1.4.1.25623.1.0.10532 | Mittel | eXtropia Web Store Remote File Retrieval Vulnerability - Active Check |
1.3.6.1.4.1.25623.1.0.10527 | Mittel | Boa file retrieval |
1.3.6.1.4.1.25623.1.0.10523 | Hoch | thttpd ssi file retrieval |
1.3.6.1.4.1.25623.1.0.10469 | Hoch | ipop2d reads arbitrary files |
1.3.6.1.4.1.25623.1.0.10454 | Hoch | sawmill password |
1.3.6.1.4.1.25623.1.0.10453 | Mittel | sawmill allows the reading of the first line of any file |
1.3.6.1.4.1.25623.1.0.10408 | Hoch | Insecure Napster clone |
1.3.6.1.4.1.25623.1.0.10382 | Hoch | Atrium Mercur Mailserver |
1.3.6.1.4.1.25623.1.0.10355 | Mittel | vqServer web traversal vulnerability |
1.3.6.1.4.1.25623.1.0.10351 | Hoch | The ACC router shows configuration without authentication |
1.3.6.1.4.1.25623.1.0.103321 | Mittel | YaTFTPSvr TFTP Server Directory Traversal Vulnerability |
1.3.6.1.4.1.25623.1.0.10286 | Hoch | thttpd flaw |
1.3.6.1.4.1.25623.1.0.102014 | Hoch | NFS export |
1.3.6.1.4.1.25623.1.0.10149 | Hoch | NetBeans Java IDE |
1.3.6.1.4.1.25623.1.0.10141 | Hoch | MetaInfo servers |
1.3.6.1.4.1.25623.1.0.10110 | Hoch | iChat |
1.3.6.1.4.1.25623.1.0.10091 | Hoch | FTPGate traversal |
1.3.6.1.4.1.25623.1.0.100899 | Mittel | Quick Tftp Server Pro Directory Traversal Vulnerability - Active Check |
1.3.6.1.4.1.25623.1.0.10063 | Hoch | Eserv traversal |
1.3.6.1.4.1.25623.1.0.10057 | Hoch | Lotus Domino ?open Vulnerability |
1.3.6.1.4.1.25623.1.0.100502 | Mittel | VMware Products Directory Traversal Vulnerability |
1.3.6.1.4.1.25623.1.0.100488 | Mittel | Samba Symlink Directory Traversal Vulnerability |
1.3.6.1.4.1.25623.1.0.10010 | Hoch | AliBaba path climbing |
1.3.6.1.4.1.25623.1.0.10008 | Hoch | WebSite 1.0 buffer overflow |