Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | |||
ID # | Riesgo | Título de la Prueba |
1.3.6.1.4.1.25623.1.0.804414 | Alto | Quantum DXi Remote 'root' Authentication Bypass Vulnerability |
1.3.6.1.4.1.25623.1.0.80111 | Alto | Check for Backdoor in UnrealIRCd |
1.3.6.1.4.1.25623.1.0.80101 | Alto | SGI Objectserver vuln |
1.3.6.1.4.1.25623.1.0.80069 | Alto | Kerio WebMail v5 multiple flaws |
1.3.6.1.4.1.25623.1.0.80049 | Alto | SysV /bin/login buffer overflow (telnet) |
1.3.6.1.4.1.25623.1.0.80035 | Alto | yppasswdd overflow |
1.3.6.1.4.1.25623.1.0.80034 | Alto | irix rpc.passwd overflow |
1.3.6.1.4.1.25623.1.0.80029 | Alto | rpc.nisd overflow |
1.3.6.1.4.1.25623.1.0.80014 | Alto | apcupsd < 3.8.6 / 3.10.x < 3.10.5 Multiple Vulnerabilities |
1.3.6.1.4.1.25623.1.0.800127 | Alto | Sun Java Web Start Remote Command Execution Vulnerability (Linux) |
1.3.6.1.4.1.25623.1.0.56944 | Medio | Coppermine Local File Include Vulnerability |
1.3.6.1.4.1.25623.1.0.56943 | Medio | Coppermine Multiple File Include Vulnerabilities |
1.3.6.1.4.1.25623.1.0.56919 | Medio | MDaemon IMAP Server Remote Format String Vulnerability |
1.3.6.1.4.1.25623.1.0.56877 | Alto | RunCMS Remote Arbitrary File Upload and Execution |
1.3.6.1.4.1.25623.1.0.55379 | Alto | PeerCast Remote Format String Vulnerability |
1.3.6.1.4.1.25623.1.0.55265 | Medio | Coppermine Photo Gallery < 1.3.4 EXIF Script Insertion |
1.3.6.1.4.1.25623.1.0.52083 | Medio | Coppermine Photo Gallery PHP Code Injection |
1.3.6.1.4.1.25623.1.0.52081 | Alto | Coppermine Photo Gallery Multiple Input Validation Errors |
1.3.6.1.4.1.25623.1.0.52030 | Medio | RunCMS Remote Arbitrary File Upload and Execution |
1.3.6.1.4.1.25623.1.0.51979 | Alto | phpMyAdmin Multiple Remote Vulnerabilities |
1.3.6.1.4.1.25623.1.0.51978 | Alto | phpMyAdmin sql.php command execution |
1.3.6.1.4.1.25623.1.0.51966 | Medio | vBulletin Remote Code Execution(2) |
1.3.6.1.4.1.25623.1.0.51918 | Alto | Icecast XSL Parser Multiple Vulnerabilities |
1.3.6.1.4.1.25623.1.0.51917 | Alto | Icecast HTTP Header Buffer Overflow Vulnerability |
1.3.6.1.4.1.25623.1.0.51916 | Alto | Icecast print_client() Format String Vulnerability |
1.3.6.1.4.1.25623.1.0.51911 | Alto | Icecast/Libshout Remote Buffer Overflow Vulnerability |
1.3.6.1.4.1.25623.1.0.51908 | Alto | Icecast AVLLib Buffer Overflow Vulnerability |
1.3.6.1.4.1.25623.1.0.51890 | Medio | MySQL on win32 locally exploitable buffer overflow |
1.3.6.1.4.1.25623.1.0.51889 | Medio | MySQL mysqlbug/mysqld_multi priviledge escalation |
1.3.6.1.4.1.25623.1.0.51888 | Medio | MySQL Multiple flaws (4) |
1.3.6.1.4.1.25623.1.0.51885 | Medio | MySQL Mysqlhotcopy Insecure Temp File Vulnerability |
1.3.6.1.4.1.25623.1.0.51884 | Alto | MySQL mysql_real_connect() buffer overflow |
1.3.6.1.4.1.25623.1.0.51883 | Medio | MySQL Password Bypass Vulnerability |
1.3.6.1.4.1.25623.1.0.51882 | Medio | MySQL Password Length Buffer Overflow Vulnerability |
1.3.6.1.4.1.25623.1.0.51881 | Alto | MySQL Password Bypass Vulnerability |
1.3.6.1.4.1.25623.1.0.51880 | Medio | MySQL Double Free Heap Corruption Vulnerability |
1.3.6.1.4.1.25623.1.0.51879 | Medio | MySQL Multiple Flaws(2) |
1.3.6.1.4.1.25623.1.0.51878 | Medio | MySQL Multiple Flaws |
1.3.6.1.4.1.25623.1.0.51877 | Alto | MySQL Password Handler Buffer Overflow Vulnerability |
1.3.6.1.4.1.25623.1.0.51876 | Medio | MySQL Bounded Parameter Buffer Overflow |
1.3.6.1.4.1.25623.1.0.51861 | Alto | PostgreSQL Multiple Flaws(2) |
1.3.6.1.4.1.25623.1.0.51860 | Alto | PostgreSQL to_ascii() overflow |
1.3.6.1.4.1.25623.1.0.51859 | Alto | PostgreSQL Multiple Flaws |
1.3.6.1.4.1.25623.1.0.51858 | Medio | PostgreSQL Insecure Temporary File Creation Vulnerability |
1.3.6.1.4.1.25623.1.0.51747 | Alto | VBulletin Misc.PHP Arbitrary PHP Script Code Execution |
1.3.6.1.4.1.25623.1.0.51745 | Alto | Cyrus imapd multiple vulnerabilities |
1.3.6.1.4.1.25623.1.0.51280 | Alto | GPSD remote format string vulnerability |
1.3.6.1.4.1.25623.1.0.50194 | Alto | FlatNuke Data validation errors |
1.3.6.1.4.1.25623.1.0.20096 | Alto | Linksys multiple remote vulnerabilities |
1.3.6.1.4.1.25623.1.0.200050 | Alto | Mercur Mailserver/Messaging version <= 5.0 IMAP Overflow Vulnerability |
1.3.6.1.4.1.25623.1.0.2000201 | Alto | QK SMTP Server 'RCPT TO' buffer overflow vulnerability |
1.3.6.1.4.1.25623.1.0.200012 | Alto | FreeSSHD Key Exchange Buffer Overflow |
1.3.6.1.4.1.25623.1.0.19751 | Alto | Discuz! <= 4.0.0 rc4 Arbitrary File Upload Flaw |
1.3.6.1.4.1.25623.1.0.18627 | Alto | GlobalSCAPE Secure FTP Server User Input Overflow |
1.3.6.1.4.1.25623.1.0.18493 | Alto | TFTPD small overflow |
1.3.6.1.4.1.25623.1.0.18424 | Alto | MiniShare webserver buffer overflow |
1.3.6.1.4.1.25623.1.0.18264 | Alto | TFTPD overflow |
1.3.6.1.4.1.25623.1.0.18212 | Medio | 4D WebStar Tomcat Plugin Remote Buffer Overflow flaw |
1.3.6.1.4.1.25623.1.0.17599 | Alto | Delegate Multiple Overflows |
1.3.6.1.4.1.25623.1.0.17307 | Alto | CA License Service Multiple Vulnerabilities |
1.3.6.1.4.1.25623.1.0.17295 | Medio | poppassd USER overflow |
1.3.6.1.4.1.25623.1.0.17229 | Alto | NNTP password overflow |
1.3.6.1.4.1.25623.1.0.17228 | Alto | NNTP message headers overflow |
1.3.6.1.4.1.25623.1.0.16141 | Alto | CUPS < 1.1.23 Multiple Vulnerabilities |
1.3.6.1.4.1.25623.1.0.16064 | Alto | SHOUTcast Format String Attack |
1.3.6.1.4.1.25623.1.0.15942 | Alto | Citadel/UX Format String Vulnerability |
1.3.6.1.4.1.25623.1.0.15892 | Alto | Yard Radius Remote Buffer Overflow Vulnerability |
1.3.6.1.4.1.25623.1.0.15867 | Alto | Mercury Mail Remote IMAP Stack Buffer Overflow Vulnerability |
1.3.6.1.4.1.25623.1.0.15819 | Alto | Cyrus IMAPD Multiple Remote Vulnerabilities |
1.3.6.1.4.1.25623.1.0.15774 | Alto | CCProxy Logging Function Overflow |
1.3.6.1.4.1.25623.1.0.15771 | Alto | ipswitch IMail Server Delete Command Buffer Overflow |
1.3.6.1.4.1.25623.1.0.15642 | Alto | Format string on HTTP header value |
1.3.6.1.4.1.25623.1.0.15641 | Alto | Format string on HTTP header name |
1.3.6.1.4.1.25623.1.0.15640 | Alto | Format string on URI |
1.3.6.1.4.1.25623.1.0.15622 | Alto | Cherokee remote command execution |
1.3.6.1.4.1.25623.1.0.15621 | Alto | Cherokee directory traversal flaw |
1.3.6.1.4.1.25623.1.0.15617 | Alto | Cherokee auth_pam format string vulnerability |
1.3.6.1.4.1.25623.1.0.15529 | Alto | Open WebMail userstat.pl Arbitrary Command Execution |
1.3.6.1.4.1.25623.1.0.15486 | Alto | DB2 Multiple Vulnerabilities |
1.3.6.1.4.1.25623.1.0.15417 | Medio | PostgreSQL insecure temporary file creation |
1.3.6.1.4.1.25623.1.0.15404 | Alto | Kerio MailServer < 6.0.3 |
1.3.6.1.4.1.25623.1.0.14810 | Alto | Macromedia JRun Multiple Vulnerabilities |
1.3.6.1.4.1.25623.1.0.14641 | Alto | Oracle DBS_SCHEDULER vulnerability |
1.3.6.1.4.1.25623.1.0.14361 | Alto | NSS Library SSLv2 Challenge Overflow |
1.3.6.1.4.1.25623.1.0.14319 | Alto | MySQL buffer overflow |
1.3.6.1.4.1.25623.1.0.14317 | Alto | cfengine CFServD transaction packet buffer overrun vulnerability |
1.3.6.1.4.1.25623.1.0.14316 | Alto | cfengine format string vulnerability |
1.3.6.1.4.1.25623.1.0.14279 | Alto | Kerio MailServer < 6.0.1 |
1.3.6.1.4.1.25623.1.0.14223 | Alto | rsync path sanitation vulnerability |
1.3.6.1.4.1.25623.1.0.141380 | Alto | HP Ink Printers RCE Vulnerabilities (Faxploit) |
1.3.6.1.4.1.25623.1.0.140246 | Alto | SenNet Data Logger Appliances and Electricity Meters Multiple Vulnerabilities |
1.3.6.1.4.1.25623.1.0.140112 | Alto | Fortinet FortiGate ZebOS routing remote shell service enabled (FG-IR-15-020) |
1.3.6.1.4.1.25623.1.0.13856 | Alto | Citadel/UX Username overflow |
1.3.6.1.4.1.25623.1.0.12637 | Alto | Open WebMail vacation.pl Arbitrary Command Execution |
1.3.6.1.4.1.25623.1.0.12294 | Alto | Squid Remote NTLM auth buffer overflow |
1.3.6.1.4.1.25623.1.0.12255 | Bajo | mod_ssl SSL_Util_UUEncode_Binary Overflow |
1.3.6.1.4.1.25623.1.0.12103 | Alto | Courier IMAP remote overflows |
1.3.6.1.4.1.25623.1.0.12099 | Bajo | F-Secure SSH Password Authentication Policy Evasion |
1.3.6.1.4.1.25623.1.0.12067 | Alto | Oracle SOAP denial |
1.3.6.1.4.1.25623.1.0.12047 | Alto | Oracle timezone overflow |
1.3.6.1.4.1.25623.1.0.11971 | Alto | NETObserve Authentication Bypass vulnerability |
1.3.6.1.4.1.25623.1.0.11953 | Alto | cyrus-imsp abook_dbname buffer overflow |
1.3.6.1.4.1.25623.1.0.11946 | Alto | Ebola 0.1.4 buffer overflow |
1.3.6.1.4.1.25623.1.0.11875 | Alto | OpenSSL overflow via invalid certificate passing |
1.3.6.1.4.1.25623.1.0.11827 | Medio | Netware Perl CGI overflow |
1.3.6.1.4.1.25623.1.0.11809 | Alto | mod_mylo overflow |
1.3.6.1.4.1.25623.1.0.11808 | Alto | Microsoft RPC Interface Buffer Overrun (823980) |
1.3.6.1.4.1.25623.1.0.11801 | Alto | Format string on HTTP method name |
1.3.6.1.4.1.25623.1.0.11763 | Alto | Kerio WebMail v5 multiple flaws |
1.3.6.1.4.1.25623.1.0.11755 | Alto | CesarFTP multiple overflows |
1.3.6.1.4.1.25623.1.0.11742 | Alto | Magic WinMail Format string |
1.3.6.1.4.1.25623.1.0.11736 | Alto | gnocatan multiple buffer overflows |
1.3.6.1.4.1.25623.1.0.11715 | Alto | Header overflow against HTTP proxy |
1.3.6.1.4.1.25623.1.0.11651 | Alto | Batalla Naval Overflow |
1.3.6.1.4.1.25623.1.0.11645 | Alto | wsmp3d command execution |
1.3.6.1.4.1.25623.1.0.11642 | Alto | Helix RealServer Buffer Overrun |
1.3.6.1.4.1.25623.1.0.11637 | Alto | MailMax IMAP overflows (2) |
1.3.6.1.4.1.25623.1.0.11598 | Alto | MailMax IMAP overflows |
1.3.6.1.4.1.25623.1.0.11577 | Alto | MDaemon IMAP CREATE overflow |
1.3.6.1.4.1.25623.1.0.11563 | Alto | Oracle LINK overflow |
1.3.6.1.4.1.25623.1.0.11552 | Alto | mod_ntlm overflow / format string bug |
1.3.6.1.4.1.25623.1.0.11544 | Alto | MonkeyWeb POST with too much data |
1.3.6.1.4.1.25623.1.0.11540 | Alto | PPTP overflow |
1.3.6.1.4.1.25623.1.0.11495 | Alto | tanned format string vulnerability |
1.3.6.1.4.1.25623.1.0.11435 | Alto | ActiveSync packet overflow |
1.3.6.1.4.1.25623.1.0.11403 | Alto | iPlanet Application Server Buffer Overflow |
1.3.6.1.4.1.25623.1.0.113766 | Alto | rlogin Passwordless Login |
1.3.6.1.4.1.25623.1.0.11376 | Alto | qpopper Qvsnprintf buffer overflow |
1.3.6.1.4.1.25623.1.0.11343 | Alto | OpenSSH Client Unauthorized Remote Forwarding |
1.3.6.1.4.1.25623.1.0.11342 | Medio | PKCS 1 Version 1.5 Session Key Retrieval |
1.3.6.1.4.1.25623.1.0.11341 | Alto | SSH1 SSH Daemon Logging Failure |
1.3.6.1.4.1.25623.1.0.11340 | Medio | SSH Secure-RPC Weak Encrypted Authentication |
1.3.6.1.4.1.25623.1.0.11339 | Medio | scp File Create/Overwrite |
1.3.6.1.4.1.25623.1.0.11338 | Alto | Lotus Domino Vulnerabilities |
1.3.6.1.4.1.25623.1.0.11313 | Alto | MCMS : Buffer overflow in Profile Service |
1.3.6.1.4.1.25623.1.0.11311 | Alto | shtml.exe overflow |
1.3.6.1.4.1.25623.1.0.113095 | Alto | HP Printers Insufficient DLL Signature Validation |
1.3.6.1.4.1.25623.1.0.113093 | Alto | HP Pagewide and OfficeJet Printers RCE Vulnerability |
1.3.6.1.4.1.25623.1.0.113056 | Alto | HP Printers RCE Vulnerability (CVE-2017-2750) |
1.3.6.1.4.1.25623.1.0.11278 | Alto | Quicktime/Darwin Remote Admin Exploit |
1.3.6.1.4.1.25623.1.0.11235 | Alto | Too long OPTIONS parameter |
1.3.6.1.4.1.25623.1.0.11209 | Alto | Apache < 2.0.44 DOS device name |
1.3.6.1.4.1.25623.1.0.11199 | Alto | Multiple vulnerabilities in CUPS |
1.3.6.1.4.1.25623.1.0.11198 | Alto | BitKeeper remote command execution |
1.3.6.1.4.1.25623.1.0.11196 | Alto | Cyrus IMAP pre-login buffer overflow |
1.3.6.1.4.1.25623.1.0.11195 | Alto | SSH Multiple Vulns |
1.3.6.1.4.1.25623.1.0.11183 | Alto | HTTP negative Content-Length buffer overflow |
1.3.6.1.4.1.25623.1.0.11167 | Medio | Webserver4everyone too long URL |
1.3.6.1.4.1.25623.1.0.11164 | Alto | SOCKS4 username overflow |
1.3.6.1.4.1.25623.1.0.11136 | Alto | /bin/login overflow exploitation |
1.3.6.1.4.1.25623.1.0.11133 | Alto | Generic format string |
1.3.6.1.4.1.25623.1.0.11130 | Medio | BrowseGate HTTP headers overflows |
1.3.6.1.4.1.25623.1.0.11129 | Medio | HTTP 1.1 header overflow |
1.3.6.1.4.1.25623.1.0.11127 | Alto | HTTP 1.0 header overflow |
1.3.6.1.4.1.25623.1.0.11126 | Alto | SOCKS4A hostname overflow |
1.3.6.1.4.1.25623.1.0.11114 | Alto | Canna Overflow |
1.3.6.1.4.1.25623.1.0.11108 | Alto | Omron WorldView Wnn Overflow |
1.3.6.1.4.1.25623.1.0.11096 | Alto | Avirt gateway insecure telnet proxy |
1.3.6.1.4.1.25623.1.0.11082 | Alto | Boozt index.cgi overflow |
1.3.6.1.4.1.25623.1.0.11081 | Alto | Oracle9iAS too long URL |
1.3.6.1.4.1.25623.1.0.11078 | Medio | HTTP header overflow |
1.3.6.1.4.1.25623.1.0.11077 | Alto | HTTP Cookie overflow |
1.3.6.1.4.1.25623.1.0.11075 | Alto | dwhttpd format string |
1.3.6.1.4.1.25623.1.0.11069 | Alto | HTTP User-Agent overflow |
1.3.6.1.4.1.25623.1.0.11061 | Alto | HTTP version number overflow |
1.3.6.1.4.1.25623.1.0.11060 | Alto | OpenSSL overflow (generic test) |
1.3.6.1.4.1.25623.1.0.11030 | Alto | Apache chunked encoding |
1.3.6.1.4.1.25623.1.0.10966 | Alto | IMAP4buffer overflow in the BODY command |
1.3.6.1.4.1.25623.1.0.10965 | Bajo | SSH 3 AllowedAuthentication |
1.3.6.1.4.1.25623.1.0.10954 | Alto | OpenSSH AFS/Kerberos ticket/token passing |
1.3.6.1.4.1.25623.1.0.10928 | Alto | EFTP buffer overflow |
1.3.6.1.4.1.25623.1.0.10923 | Alto | Squid overflows |
1.3.6.1.4.1.25623.1.0.10918 | Alto | Apache-SSL overflow |
1.3.6.1.4.1.25623.1.0.10883 | Alto | OpenSSH Channel Code Off by 1 |
1.3.6.1.4.1.25623.1.0.10879 | Alto | Shell Command Execution Vulnerability |
1.3.6.1.4.1.25623.1.0.108450 | Alto | Android Debug Bridge (ADB) Accessible Without Authentication |
1.3.6.1.4.1.25623.1.0.108446 | Alto | BeanShell Remote Server Mode RCE Vulnerability (HTTP) |
1.3.6.1.4.1.25623.1.0.108445 | Alto | BeanShell Remote Server Mode RCE Vulnerability (Telnet) |
1.3.6.1.4.1.25623.1.0.10823 | Alto | OpenSSH UseLogin Environment Variables |
1.3.6.1.4.1.25623.1.0.10816 | Alto | Webalizer Cross Site Scripting Vulnerability |
1.3.6.1.4.1.25623.1.0.10812 | Alto | libgtop_daemon format string |
1.3.6.1.4.1.25623.1.0.10804 | Alto | rwhois format string attack (2) |
1.3.6.1.4.1.25623.1.0.10802 | Bajo | OpenSSH < 3.0.1 |
1.3.6.1.4.1.25623.1.0.108012 | Alto | Samba MS-RPC Remote Shell Command Execution Vulnerability (Version Check) |
1.3.6.1.4.1.25623.1.0.108011 | Alto | Samba MS-RPC Remote Shell Command Execution Vulnerability (Active Check) |
1.3.6.1.4.1.25623.1.0.108010 | Alto | Distributed Ruby (dRuby/DRb) Multiple Remote Code Execution Vulnerabilities |
1.3.6.1.4.1.25623.1.0.10790 | Alto | rwhois format string attack |
1.3.6.1.4.1.25623.1.0.10771 | Medio | OpenSSH 2.5.x -> 2.9.x adv.option |
1.3.6.1.4.1.25623.1.0.107328 | Alto | Lantronix Devices Authentication Bypass Vulnerability |
1.3.6.1.4.1.25623.1.0.10709 | Alto | TESO in.telnetd buffer overflow |
1.3.6.1.4.1.25623.1.0.10708 | Alto | SSH 3.0.0 |
1.3.6.1.4.1.25623.1.0.10705 | Alto | SimpleServer remote execution |
1.3.6.1.4.1.25623.1.0.10699 | Alto | IIS FrontPage DoS II |
1.3.6.1.4.1.25623.1.0.10659 | Alto | snmpXdmid overflow |
1.3.6.1.4.1.25623.1.0.10657 | Alto | NT IIS 5.0 Malformed HTTP Printer Request Header Buffer Overflow Vulnerability |
1.3.6.1.4.1.25623.1.0.10625 | Alto | IMAP4rev1 buffer overflow after logon |
1.3.6.1.4.1.25623.1.0.10608 | Alto | OpenSSH 2.3.1 authentication bypass vulnerability |
1.3.6.1.4.1.25623.1.0.10580 | Alto | netscape imap buffer overflow after logon |
1.3.6.1.4.1.25623.1.0.10578 | Alto | Oops buffer overflow |
1.3.6.1.4.1.25623.1.0.105398 | Alto | Static SSH Key Used |
1.3.6.1.4.1.25623.1.0.10538 | Alto | iWS shtml overflow |
1.3.6.1.4.1.25623.1.0.105306 | Alto | F5 Enterprise Manager - ConfigSync IP Rsync full file system access vulnerability CVE-2014-2927 |
1.3.6.1.4.1.25623.1.0.10522 | Alto | LPRng malformed input |
1.3.6.1.4.1.25623.1.0.105172 | Alto | Multiple F5 Networks Products - ConfigSync IP Rsync full file system access vulnerability CVE-2014-2927 - Active Check |
1.3.6.1.4.1.25623.1.0.10472 | Alto | SSH Kerberos issue |
1.3.6.1.4.1.25623.1.0.10425 | Alto | NAI Management Agent overflow |
1.3.6.1.4.1.25623.1.0.10423 | Medio | qpopper euidl problem |
1.3.6.1.4.1.25623.1.0.10420 | Alto | Gauntlet overflow |
1.3.6.1.4.1.25623.1.0.103922 | Alto | Loadbalancer.org Enterprise VA 7.5.2 Static SSH Key |
1.3.6.1.4.1.25623.1.0.10380 | Alto | rsh on finger output |
1.3.6.1.4.1.25623.1.0.10374 | Alto | uw-imap buffer overflow after logon |
1.3.6.1.4.1.25623.1.0.103553 | Alto | DistCC Remote Code Execution Vulnerability |
1.3.6.1.4.1.25623.1.0.103549 | Alto | Possible Backdoor: Ingreslock |
1.3.6.1.4.1.25623.1.0.103494 | Alto | Multiple F5 Networks Products - SSH vulnerability CVE-2012-1493 |
1.3.6.1.4.1.25623.1.0.103185 | Alto | vsftpd Compromised Source Packages Backdoor Vulnerability |
1.3.6.1.4.1.25623.1.0.103080 | Alto | Linksys WAP610N Unauthenticated Root Access Security Vulnerability |
1.3.6.1.4.1.25623.1.0.10269 | Alto | SSH Overflow |
1.3.6.1.4.1.25623.1.0.10268 | Alto | SSH Insertion Attack |
1.3.6.1.4.1.25623.1.0.10197 | Medio | qpopper LIST buffer overflow |
1.3.6.1.4.1.25623.1.0.10154 | Medio | Netscape Enterprise 'Accept' buffer overflow |
1.3.6.1.4.1.25623.1.0.10130 | Medio | ipop2d buffer overflow |
1.3.6.1.4.1.25623.1.0.10096 | Alto | rsh with null username |
1.3.6.1.4.1.25623.1.0.100933 | Alto | ProFTPD Backdoor Unauthorized Access Vulnerability |
1.3.6.1.4.1.25623.1.0.10066 | Alto | FakeBO buffer overflow |