Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | |||
ID # | Risk | Test Title |
1.3.6.1.4.1.25623.1.0.91984 | Other | LDAPsearch |
1.3.6.1.4.1.25623.1.0.902271 | High | WinTFTP Server Pro Remote Directory Traversal Vulnerability |
1.3.6.1.4.1.25623.1.0.900720 | High | AVG AntiVirus Engine Malware Detection Bypass Vulnerability (Linux) |
1.3.6.1.4.1.25623.1.0.900719 | High | AVG AntiVirus Engine Malware Detection Bypass Vulnerability (Win) |
1.3.6.1.4.1.25623.1.0.900174 | High | Visagesoft eXPert PDF Viewer ActiveX Control File Overwrite Vulnerability |
1.3.6.1.4.1.25623.1.0.802623 | Medium | Distinct TFTP Server Directory Traversal Vulnerability |
1.3.6.1.4.1.25623.1.0.802405 | Medium | Ipswitch TFTP Server Directory Traversal Vulnerability |
1.3.6.1.4.1.25623.1.0.802027 | Medium | Avaya IP Office Manager TFTP Server Directory Traversal Vulnerability |
1.3.6.1.4.1.25623.1.0.801965 | High | CiscoKits TFTP Server Directory Traversal Vulnerability |
1.3.6.1.4.1.25623.1.0.801543 | High | AT TFTP Server Directory Traversal Vulnerability |
1.3.6.1.4.1.25623.1.0.80016 | High | Kiwi CatTools < 3.2.9 Directory Traversal |
1.3.6.1.4.1.25623.1.0.56899 | Medium | RaidenHTTP arbitrary file disclosure |
1.3.6.1.4.1.25623.1.0.56898 | Medium | RaidenHTTP script source disclosure |
1.3.6.1.4.1.25623.1.0.52027 | Medium | CommuniGate Pro Webmail File Disclosure |
1.3.6.1.4.1.25623.1.0.52024 | High | CommuniGate Pro Webmail File Disclosure(2) |
1.3.6.1.4.1.25623.1.0.51909 | Medium | Icecast Directory Traversal Vulnerability |
1.3.6.1.4.1.25623.1.0.51866 | High | MySQL database has a user with no password |
1.3.6.1.4.1.25623.1.0.51790 | High | RaidenHTTP buffer overflow |
1.3.6.1.4.1.25623.1.0.51786 | Medium | BadBlue Connections denial of service |
1.3.6.1.4.1.25623.1.0.51785 | High | BadBlue ext.dll buffer overflow |
1.3.6.1.4.1.25623.1.0.51784 | High | BadBlue administrative access vulnerability |
1.3.6.1.4.1.25623.1.0.51783 | High | BadBlue administrative access vulnerability |
1.3.6.1.4.1.25623.1.0.51677 | Medium | Viking directory traversal |
1.3.6.1.4.1.25623.1.0.50205 | High | PhotoPost Pro Cross Site Scripting/SQL injection |
1.3.6.1.4.1.25623.1.0.50204 | High | ReviewPost Pro Cross Site Scripting/SQL injection |
1.3.6.1.4.1.25623.1.0.50203 | Medium | QwikiWiki Directory Traversal vulnerability |
1.3.6.1.4.1.25623.1.0.200001 | High | Kiwi CatTools < 3.2.9 Directory Traversal |
1.3.6.1.4.1.25623.1.0.18262 | High | TFTP directory traversal |
1.3.6.1.4.1.25623.1.0.17342 | Medium | TFTP file detection (Cisco IOS) |
1.3.6.1.4.1.25623.1.0.16339 | Medium | Mailman private.py Directory Traversal Vulnerability |
1.3.6.1.4.1.25623.1.0.16142 | Medium | IlohaMail Readable Configuration Files |
1.3.6.1.4.1.25623.1.0.16137 | Medium | Simple PHP Blog dir traversal |
1.3.6.1.4.1.25623.1.0.15984 | High | User Mountable NFS shares |
1.3.6.1.4.1.25623.1.0.15394 | High | Samba Remote Arbitrary File Access |
1.3.6.1.4.1.25623.1.0.14800 | Medium | Subversion Module unreadeable path information disclosure |
1.3.6.1.4.1.25623.1.0.14631 | Medium | IlohaMail Arbitrary File Access via Session Variable Vulnerability |
1.3.6.1.4.1.25623.1.0.14630 | Medium | IlohaMail Arbitrary File Access via Language Variable |
1.3.6.1.4.1.25623.1.0.14354 | Medium | Music Daemon File Disclosure |
1.3.6.1.4.1.25623.1.0.14353 | Medium | Music Daemon Denial of Service |
1.3.6.1.4.1.25623.1.0.14241 | Medium | 4D WebStar Symbolic Link Vulnerability |
1.3.6.1.4.1.25623.1.0.14229 | Medium | HTTP Directory Traversal (Windows) |
1.3.6.1.4.1.25623.1.0.13848 | Medium | Subversion Module File Restriction Bypass |
1.3.6.1.4.1.25623.1.0.12639 | Other | MySQL Authentication bypass through a zero-length password |
1.3.6.1.4.1.25623.1.0.12284 | High | Subversion SVN Protocol Parser Remote Integer Overflow |
1.3.6.1.4.1.25623.1.0.12261 | High | Subversion remote Buffer Overflow |
1.3.6.1.4.1.25623.1.0.12260 | High | Subversion Pre-Commit-Hook Vulnerability |
1.3.6.1.4.1.25623.1.0.12259 | Low | Subversion Detection |
1.3.6.1.4.1.25623.1.0.12254 | Medium | IMAP arbitrary file retrieval |
1.3.6.1.4.1.25623.1.0.12246 | High | Firebird DB remote buffer overflow |
1.3.6.1.4.1.25623.1.0.12230 | High | rsync path traversal |
1.3.6.1.4.1.25623.1.0.12105 | Medium | Use LDAP search request to retrieve information from NT Directory Services |
1.3.6.1.4.1.25623.1.0.11988 | High | FSP Suite Directory Traversal Vulnerability |
1.3.6.1.4.1.25623.1.0.11948 | High | Avotus mm File Retrieval attempt |
1.3.6.1.4.1.25623.1.0.11914 | Medium | TheServer clear text password |
1.3.6.1.4.1.25623.1.0.11909 | Medium | Apache2 double slash dir index |
1.3.6.1.4.1.25623.1.0.11716 | High | Misconfigured Gnutella |
1.3.6.1.4.1.25623.1.0.11656 | Medium | Eserv Directory Index |
1.3.6.1.4.1.25623.1.0.11586 | High | FileMakerPro Detection |
1.3.6.1.4.1.25623.1.0.11576 | High | thttpd directory traversal thru Host: |
1.3.6.1.4.1.25623.1.0.11504 | High | MultiTech Proxy Server Default Password |
1.3.6.1.4.1.25623.1.0.11493 | Medium | Sambar Default Accounts |
1.3.6.1.4.1.25623.1.0.11481 | High | mod_auth_any command execution |
1.3.6.1.4.1.25623.1.0.11480 | High | 3com RAS 1500 configuration disclosure |
1.3.6.1.4.1.25623.1.0.11419 | Other | Office files list |
1.3.6.1.4.1.25623.1.0.11386 | High | Lotus Domino 6.0 vulnerabilities |
1.3.6.1.4.1.25623.1.0.11378 | High | MySQL mysqld Privilege Escalation Vulnerability |
1.3.6.1.4.1.25623.1.0.11358 | High | The remote portmapper forwards NFS requests |
1.3.6.1.4.1.25623.1.0.11357 | High | NFS cd .. |
1.3.6.1.4.1.25623.1.0.11356 | High | Mountable NFS shares |
1.3.6.1.4.1.25623.1.0.11353 | High | NFS fsirand |
1.3.6.1.4.1.25623.1.0.11210 | High | Apache < 2.0.44 file reading on Win32 |
1.3.6.1.4.1.25623.1.0.11005 | Medium | LocalWeb2000 remote read |
1.3.6.1.4.1.25623.1.0.10805 | High | Informix traversal |
1.3.6.1.4.1.25623.1.0.10723 | Medium | LDAP allows anonymous binds |
1.3.6.1.4.1.25623.1.0.10722 | Medium | LDAP allows null bases |
1.3.6.1.4.1.25623.1.0.10706 | Medium | McAfee myCIO Directory Traversal |
1.3.6.1.4.1.25623.1.0.10698 | Medium | WebLogic Server /%00/ bug |
1.3.6.1.4.1.25623.1.0.10697 | High | WebLogic Server DoS |
1.3.6.1.4.1.25623.1.0.10691 | High | Netscape Enterprise INDEX request problem |
1.3.6.1.4.1.25623.1.0.10683 | High | iPlanet Certificate Management Traversal |
1.3.6.1.4.1.25623.1.0.10680 | High | Test Microsoft IIS Source Fragment Disclosure |
1.3.6.1.4.1.25623.1.0.105957 | High | DSS TFTP Server Path Traversal Vulnerability |
1.3.6.1.4.1.25623.1.0.10536 | High | Anaconda remote file retrieval |
1.3.6.1.4.1.25623.1.0.10533 | Medium | Web Shopper remote file retrieval |
1.3.6.1.4.1.25623.1.0.10532 | Medium | eXtropia Web Store remote file retrieval |
1.3.6.1.4.1.25623.1.0.10527 | Medium | Boa file retrieval |
1.3.6.1.4.1.25623.1.0.10523 | High | thttpd ssi file retrieval |
1.3.6.1.4.1.25623.1.0.10498 | High | Test HTTP dangerous methods |
1.3.6.1.4.1.25623.1.0.10469 | High | ipop2d reads arbitrary files |
1.3.6.1.4.1.25623.1.0.10454 | High | sawmill password |
1.3.6.1.4.1.25623.1.0.10453 | Medium | sawmill allows the reading of the first line of any file |
1.3.6.1.4.1.25623.1.0.10440 | Medium | Check for Apache Multiple / vulnerability |
1.3.6.1.4.1.25623.1.0.10408 | High | Insecure Napster clone |
1.3.6.1.4.1.25623.1.0.10382 | High | Atrium Mercur Mailserver |
1.3.6.1.4.1.25623.1.0.10355 | Medium | vqServer web traversal vulnerability |
1.3.6.1.4.1.25623.1.0.10351 | High | The ACC router shows configuration without authentication |
1.3.6.1.4.1.25623.1.0.103321 | Medium | YaTFTPSvr TFTP Server Directory Traversal Vulnerability |
1.3.6.1.4.1.25623.1.0.10286 | High | thttpd flaw |
1.3.6.1.4.1.25623.1.0.102014 | High | NFS export |
1.3.6.1.4.1.25623.1.0.10149 | High | NetBeans Java IDE |
1.3.6.1.4.1.25623.1.0.10141 | High | MetaInfo servers |
1.3.6.1.4.1.25623.1.0.10110 | High | iChat |
1.3.6.1.4.1.25623.1.0.10091 | High | FTPGate traversal |
1.3.6.1.4.1.25623.1.0.100899 | Medium | Quick Tftp Server Pro Directory Traversal Vulnerability |
1.3.6.1.4.1.25623.1.0.10063 | High | Eserv traversal |
1.3.6.1.4.1.25623.1.0.10057 | High | Lotus Domino ?open Vulnerability |
1.3.6.1.4.1.25623.1.0.100502 | Medium | VMware Products Directory Traversal Vulnerability |
1.3.6.1.4.1.25623.1.0.100488 | Medium | Samba Symlink Directory Traversal Vulnerability |
1.3.6.1.4.1.25623.1.0.10010 | High | AliBaba path climbing |
1.3.6.1.4.1.25623.1.0.10008 | High | WebSite 1.0 buffer overflow |