Summary
| Detail | |||
|---|---|---|---|
| Vendor | Sun | First view | 1989-07-26 |
| Product | Sunos | Last view | 2015-01-21 |
| Version | 5.10 | Type | |
| Update | |||
| Edition | ix86 | ||
| Language | |||
| Sofware Edition | |||
| Target Software | |||
| Target Hardware | |||
| Other | |||
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
Related : CVE
| Date | Alert | Description | |
|---|---|---|---|
| 1.9 | 2015-01-21 | CVE-2015-0430 | Unspecified vulnerability in Oracle Sun Solaris 10 and 11 allows local users to affect confidentiality via vectors related to RPC Utility. |
| 3.3 | 2015-01-21 | CVE-2015-0429 | Unspecified vulnerability in Oracle Sun Solaris 10 and 11 allows local users to affect integrity and availability via vectors related to RPC Utility. |
| 4.9 | 2015-01-21 | CVE-2015-0428 | Unspecified vulnerability in Oracle Sun Solaris 10 and 11 allows local users to affect availability via unknown vectors related to Resource Control. |
| 2.1 | 2015-01-21 | CVE-2015-0397 | Unspecified vulnerability in Oracle Sun Solaris 11 allows local users to affect availability via unknown vectors related to File System, a different vulnerability than CVE-2014-6570 and CVE-2014-6600. |
| 5 | 2015-01-21 | CVE-2015-0375 | Unspecified vulnerability in Oracle Sun Solaris 10 and 11 allows remote attackers to affect confidentiality via unknown vectors related to Network. |
| 4.9 | 2015-01-21 | CVE-2014-6600 | Unspecified vulnerability in Oracle Sun Solaris 11 allows local users to affect availability via unknown vectors related to File System, a different vulnerability than CVE-2014-6570 and CVE-2015-0397. |
| 5 | 2015-01-21 | CVE-2014-6575 | Unspecified vulnerability in Oracle Sun Solaris 10 and 11 allows remote attackers to affect availability via unknown vectors related to Network, a different vulnerability than CVE-2004-0230. |
| 4.9 | 2015-01-21 | CVE-2014-6570 | Unspecified vulnerability in Oracle Sun Solaris 11 allows local users to affect availability via unknown vectors related to File System, a different vulnerability than CVE-2014-6600 and CVE-2015-0397. |
| 7.2 | 2015-01-21 | CVE-2014-6524 | Unspecified vulnerability in Oracle Solaris 10 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Kernel. |
| 7.2 | 2015-01-21 | CVE-2014-6521 | Unspecified vulnerability in Oracle Solaris 10 allows local users to affect confidentiality, integrity, and availability via vectors related to CDE - Power Management Utility. |
| 6.6 | 2015-01-21 | CVE-2014-6518 | Unspecified vulnerability in Oracle Solaris 10 and 11 allows local users to affect integrity and availability via vectors related to Unix File System (UFS). |
| 7.2 | 2015-01-21 | CVE-2014-6510 | Unspecified vulnerability in Oracle Solaris 11 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Power Management Utility. |
| 4.9 | 2015-01-21 | CVE-2014-6509 | Unspecified vulnerability in Oracle Solaris 10 allows local users to affect availability via unknown vectors related to Kernel. |
| 4.3 | 2015-01-21 | CVE-2014-6481 | Unspecified vulnerability in Oracle Solaris 10 and 11 allows remote attackers to affect confidentiality via vectors related to KSSL. |
| 6.8 | 2014-10-15 | CVE-2014-6529 | Unspecified vulnerability in Oracle Sun Solaris 11 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Hermon HCA PCIe driver. |
| 7.8 | 2014-10-15 | CVE-2014-6508 | Unspecified vulnerability in Oracle Sun Solaris 10 and 11 allows remote attackers to affect availability via vectors related to iSCSI Data Mover (IDM). |
| 2.1 | 2014-10-15 | CVE-2014-6501 | Unspecified vulnerability in Oracle Sun Solaris 11 allows local users to affect confidentiality via vectors related to SSH. |
| 4.9 | 2014-10-15 | CVE-2014-6497 | Unspecified vulnerability in Oracle Sun Solaris 11 allows local users to affect availability via unknown vectors related to Kernel. |
| 5 | 2014-10-15 | CVE-2014-6490 | Unspecified vulnerability in Oracle Sun Solaris 11 allows remote attackers to affect availability via vectors related to SMB server user component. |
| 7.2 | 2014-10-15 | CVE-2014-6473 | Unspecified vulnerability in Oracle Sun Solaris 10 and 11 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Zone Framework. |
| 6.8 | 2014-10-15 | CVE-2014-6470 | Unspecified vulnerability in Oracle Sun Solaris 11 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Archive Utility. |
| 4.4 | 2014-10-15 | CVE-2014-4284 | Unspecified vulnerability in Oracle Sun Solaris 11 allows local users to affect confidentiality, integrity, and availability via vectors related to IPS transfer module, a different vulnerability than CVE-2014-4280. |
| 4.3 | 2014-10-15 | CVE-2014-4283 | Unspecified vulnerability in Oracle Sun Solaris 11 allows remote attackers to affect confidentiality via unknown vectors related to Automated Install Engine, a different vulnerability than CVE-2014-4277. |
| 7.2 | 2014-10-15 | CVE-2014-4282 | Unspecified vulnerability in Oracle Sun Solaris 11 allows local users to affect confidentiality, integrity, and availability via vectors related to Kernel/X86. |
| 4.6 | 2014-10-15 | CVE-2014-4280 | Unspecified vulnerability in Oracle Sun Solaris 11 allows local users to affect confidentiality, integrity, and availability via vectors related to IPS transfer module, a different vulnerability than CVE-2014-4284. |
CWE : Common Weakness Enumeration
| % | id | Name |
|---|---|---|
| 22% (11) | CWE-264 | Permissions, Privileges, and Access Controls |
| 14% (7) | CWE-399 | Resource Management Errors |
| 14% (7) | CWE-189 | Numeric Errors |
| 10% (5) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
| 8% (4) | CWE-16 | Configuration |
| 6% (3) | CWE-120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflo... |
| 4% (2) | CWE-362 | Race Condition |
| 4% (2) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
| 4% (2) | CWE-20 | Improper Input Validation |
| 2% (1) | CWE-255 | Credentials Management |
| 2% (1) | CWE-200 | Information Exposure |
| 2% (1) | CWE-190 | Integer Overflow or Wraparound |
| 2% (1) | CWE-134 | Uncontrolled Format String |
| 2% (1) | CWE-88 | Argument Injection or Modification |
| 2% (1) | CWE-78 | Improper Sanitization of Special Elements used in an OS Command ('O... |
CAPEC : Common Attack Pattern Enumeration & Classification
| id | Name |
|---|---|
| CAPEC-2 | Inducing Account Lockout |
| CAPEC-8 | Buffer Overflow in an API Call |
| CAPEC-9 | Buffer Overflow in Local Command-Line Utilities |
| CAPEC-10 | Buffer Overflow via Environment Variables |
| CAPEC-14 | Client-side Injection-induced Buffer Overflow |
| CAPEC-24 | Filter Failure through Buffer Overflow |
| CAPEC-26 | Leveraging Race Conditions |
| CAPEC-27 | Leveraging Race Conditions via Symbolic Links |
| CAPEC-38 | Leveraging/Manipulating Configuration File Search Paths |
| CAPEC-41 | Using Meta-characters in E-mail Headers to Inject Malicious Payloads |
| CAPEC-42 | MIME Conversion |
| CAPEC-44 | Overflow Binary Resource File |
| CAPEC-45 | Buffer Overflow via Symbolic Links |
| CAPEC-46 | Overflow Variables and Tags |
| CAPEC-47 | Buffer Overflow via Parameter Expansion |
| CAPEC-58 | Restful Privilege Elevation |
| CAPEC-67 | String Format Overflow in syslog() |
| CAPEC-68 | Subvert Code-signing Facilities |
| CAPEC-82 | Violating Implicit Assumptions Regarding XML Content (aka XML Denial of Servi... |
| CAPEC-88 | OS Command Injection |
| CAPEC-92 | Forced Integer Overflow |
| CAPEC-96 | Block Access to Libraries |
| CAPEC-100 | Overflow Buffers |
| CAPEC-123 | Buffer Attacks |
| CAPEC-128 | Integer Attacks |
Oval Markup Language : Definitions
| OvalID | Name |
|---|---|
| oval:org.mitre.oval:def:6051 | Security vulnerability in the BIND executable |
| oval:org.mitre.oval:def:5833 | Security vulnerability in the BIND executable |
| oval:org.mitre.oval:def:5966 | Security vulnerability in the BIND executable |
| oval:org.mitre.oval:def:5579 | A TCP SYN packet with target host's address as both source and destination ca... |
| oval:org.mitre.oval:def:5931 | The vacation program erroneously passes parameters to sendmail. |
| oval:org.mitre.oval:def:5743 | A TCP SYN packet with target host's address as both source and destination ca... |
| oval:org.mitre.oval:def:6076 | automountd can run user programs as root. |
| oval:org.mitre.oval:def:5571 | ttsession uses weak RPC authentication mechanism |
| oval:org.mitre.oval:def:1880 | CDE dtspcd Daemon Symlink Vulnerability |
| oval:org.mitre.oval:def:3078 | CDE AddSuLog Function Buffer Overflow |
| oval:org.mitre.oval:def:5482 | Buffer overflow vulnerability in the CDE Calendar Manager Service Daemon, rpc... |
| oval:org.mitre.oval:def:1470 | Alternate ps Command Information Disclosure Vulnerability |
| oval:org.mitre.oval:def:555 | Xsun Buffer Overflow via HOME Envvar |
| oval:org.mitre.oval:def:1828 | Buffer Overflow in "in.telnetd"or "telnetd"Process |
| oval:org.mitre.oval:def:7 | Solaris 8 kcms_configure Command-Line Buffer Overflow |
| oval:org.mitre.oval:def:65 | Solaris 7 kcms_configure Command-Line Buffer Overflow |
| oval:org.mitre.oval:def:131 | Heap Overflow in Solaris 7 xlock |
| oval:org.mitre.oval:def:10 | Heap Overflow in Solaris 8 xlock |
| oval:org.mitre.oval:def:56 | Solaris 8 rpc.yppasswdd Buffer Overrun Vulnerability |
| oval:org.mitre.oval:def:102 | Solaris 7 rpc.yppasswdd Buffer Overrun Vulnerability |
| oval:org.mitre.oval:def:2025 | System V login Buffer Overflow |
| oval:org.mitre.oval:def:47 | Solaris 8 whodo Buffer Overflow Vulnerability |
| oval:org.mitre.oval:def:34 | Solaris 7 whodo Buffer Overflow Vulnerability |
| oval:org.mitre.oval:def:1844 | ypbind Daemon Buffer Overflow |
| oval:org.mitre.oval:def:31 | Solaris 8/9 cachefsd Heap Overflow Vulnerability |
SAINT Exploits
| Description | Link |
|---|---|
| SSH password weakness | More info here |
| cachefsd heap overflow | More info here |
| Samba call_trans2open buffer overflow | More info here |
| Solaris loadable kernel module directory traversal | More info here |
| Solaris telnetd authentication bypass | More info here |
| System V login argument array buffer overflow | More info here |
| snmpXdmid buffer overflow | More info here |
Open Source Vulnerability Database (OSVDB)
| id | Description |
|---|---|
| 78427 | Oracle Solaris Kernel Component Unspecified Local DoS (2012-0098) |
| 78426 | Oracle Solaris ksh93 Shell Component Unspecified Local Information Disclosure |
| 78425 | Oracle Solaris sshd Component Unspecified Remote DoS |
| 78424 | Oracle Solaris TCP/IP Component Unspecified Local Issue |
| 78423 | Oracle Solaris Kernel Component Unspecified Local DoS (2012-0103) |
| 78422 | Oracle Solaris Network Component Unspecified Remote DoS |
| 78421 | Oracle Solaris Kerberos Component Unspecified Local Privilege Escalation |
| 78420 | Oracle Solaris TCP/IP Component Unspecified Remote DoS |
| 76475 | Oracle Solaris iSCSI DataMover(IDM) Component Unspecified Local DoS |
| 76474 | Oracle Solaris Kernel/Performance Counter BackEnd Module (pcbe) Component Uns... |
| 76468 | Oracle Solaris Process File System (procfs) Component Unspecified Local Issue |
| 76467 | Oracle Solaris LDAP Library Component Unspecified Remote Issue |
| 76466 | Oracle Solaris ZFS Component Unspecified Local DoS (2011-2313) |
| 73968 | Oracle Solaris Trusted Extensions Unspecified Local Information Disclosure |
| 73967 | Oracle Solaris LiveUpgrade Unspecified Local Issue |
| 73966 | Oracle Solaris rksh Unspecified Local Issue |
| 73965 | Oracle Solaris Driver/USB Unspecified Local DoS |
| 73964 | Oracle Solaris Zones Unspecified Local DoS |
| 73963 | Oracle Solaris UFS Unspecified Local DoS |
| 73962 | Oracle Solaris Kernel/sockfs Unspecified Local DoS |
| 73961 | Oracle Solaris Kernel/SCTP Unspecified Local DoS |
| 73960 | Oracle Solaris KSSL Unspecified Remote DoS |
| 73959 | Oracle Solaris SSH Unspecified Remote DoS |
| 73958 | Oracle Solaris TCP/IP Unspecified Remote DoS |
| 73957 | Oracle Solaris Installer Unspecified Local Issue |
ExploitDB Exploits
| id | Description |
|---|---|
| 25389 | Multiple Vendor ICMP Message Handling DoS |
| 25388 | Multiple Vendor ICMP Implementation Malformed Path MTU DoS |
| 25387 | Multiple Vendor ICMP Implementation Spoofed Source Quench Packet DoS |
| 24450 | FreeBSD 9.1 ftpd Remote Denial of Service |
| 23765 | Sun Solaris 8/9 Unspecified Passwd Local Root Compromise Vulnerability |
| 21180 | Solaris/SPARC 2.5.1/2.6/7/8 Derived 'login' Buffer Overflow Vulnerability |
| 16137 | Multiple Vendor Calendar Manager Remote Code Execution |
| 15215 | Multiple Vendors libc/glob(3) Resource Exhaustion (+0day remote ftpd-anon) |
| 5227 | Solaris 8/9/10 - fifofs I_PEEK Local Kernel Memory Leak Exploit |
| 1182 | Solaris 2.6/7/8/9 (ld.so.1) Local Root Exploit (sparc) |
| 948 | Multiple OS (Win32/Aix/Cisco) - Crafted ICMP Messages DoS Exploit |
| 716 | Solaris 2.5.1/2.6/7/8 rlogin /bin/login - Buffer Overflow Exploit (SPARC) |
| 715 | Solaris 8/9 passwd circ() Local Root Exploit |
OpenVAS Exploits
| id | Description |
|---|---|
| 2013-09-18 | Name : Debian Security Advisory DSA 2590-1 (wireshark - several vulnerabilities) File : nvt/deb_2590_1.nasl |
| 2012-12-28 | Name : Wireshark GSM RLC MAC dissector Buffer Overflow Vulnerability (Mac OS X) File : nvt/gb_wireshark_gsm_rlcmac_bof_macosx.nasl |
| 2012-12-28 | Name : Wireshark Multiple Vulnerabilities-01 Dec 2012 (Mac OS X) File : nvt/gb_wireshark_mult_vuln01_dec12_macosx.nasl |
| 2012-12-28 | Name : Wireshark Multiple Vulnerabilities-02 Dec 2012 (Mac OS X) File : nvt/gb_wireshark_mult_vuln02_dec12_macosx.nasl |
| 2012-12-18 | Name : Fedora Update for xen FEDORA-2012-19828 File : nvt/gb_fedora_2012_19828_xen_fc16.nasl |
| 2012-12-14 | Name : Fedora Update for xen FEDORA-2012-19717 File : nvt/gb_fedora_2012_19717_xen_fc17.nasl |
| 2012-12-13 | Name : SuSE Update for xen openSUSE-SU-2012:0886-1 (xen) File : nvt/gb_suse_2012_0886_1.nasl |
| 2012-11-23 | Name : Fedora Update for xen FEDORA-2012-18242 File : nvt/gb_fedora_2012_18242_xen_fc17.nasl |
| 2012-11-23 | Name : Fedora Update for xen FEDORA-2012-18249 File : nvt/gb_fedora_2012_18249_xen_fc16.nasl |
| 2012-11-15 | Name : Fedora Update for xen FEDORA-2012-17204 File : nvt/gb_fedora_2012_17204_xen_fc17.nasl |
| 2012-11-15 | Name : Fedora Update for xen FEDORA-2012-17408 File : nvt/gb_fedora_2012_17408_xen_fc16.nasl |
| 2012-09-22 | Name : Fedora Update for xen FEDORA-2012-13434 File : nvt/gb_fedora_2012_13434_xen_fc17.nasl |
| 2012-09-22 | Name : Fedora Update for xen FEDORA-2012-13443 File : nvt/gb_fedora_2012_13443_xen_fc16.nasl |
| 2012-08-30 | Name : FreeBSD Ports: wireshark File : nvt/freebsd_wireshark7.nasl |
| 2012-08-30 | Name : Fedora Update for xen FEDORA-2012-11182 File : nvt/gb_fedora_2012_11182_xen_fc17.nasl |
| 2012-08-30 | Name : Fedora Update for xen FEDORA-2012-11755 File : nvt/gb_fedora_2012_11755_xen_fc17.nasl |
| 2012-08-30 | Name : Fedora Update for wireshark FEDORA-2012-12085 File : nvt/gb_fedora_2012_12085_wireshark_fc16.nasl |
| 2012-08-30 | Name : Fedora Update for wireshark FEDORA-2012-12091 File : nvt/gb_fedora_2012_12091_wireshark_fc17.nasl |
| 2012-08-30 | Name : Fedora Update for xen FEDORA-2012-9386 File : nvt/gb_fedora_2012_9386_xen_fc17.nasl |
| 2012-08-24 | Name : Fedora Update for xen FEDORA-2012-11785 File : nvt/gb_fedora_2012_11785_xen_fc16.nasl |
| 2012-08-21 | Name : Wireshark GSM RLC MAC dissector Buffer Overflow Vulnerability (Windows) File : nvt/gb_wireshark_dissect_gsm_rlcmac_downlink_bof_win.nasl |
| 2012-08-21 | Name : Wireshark Multiple Vulnerabilities(01) - August 2012 (Windows) File : nvt/gb_wireshark_mult_vuln01_aug12_win.nasl |
| 2012-08-21 | Name : Wireshark Multiple Vulnerabilities - August 2012 (Windows) File : nvt/gb_wireshark_mult_vuln_aug12_win.nasl |
| 2012-08-17 | Name : Mandriva Update for wireshark MDVSA-2012:134 (wireshark) File : nvt/gb_mandriva_MDVSA_2012_134.nasl |
| 2012-08-10 | Name : Debian Security Advisory DSA 2501-1 (xen) File : nvt/deb_2501_1.nasl |
Information Assurance Vulnerability Management (IAVM)
| id | Description |
|---|---|
| 2014-A-0107 | Multiple Vulnerabilities in Oracle & Sun Systems Products Suite Severity: Category I - VMSKEY: V0053187 |
| 2014-A-0058 | Multiple Vulnerabilities in Oracle & Sun Systems Product Suite Severity: Category I - VMSKEY: V0049579 |
| 2014-A-0012 | Multiple Vulnerabilities in Oracle & Sun Systems Product Suite Severity: Category I - VMSKEY: V0043396 |
| 2013-A-0195 | Multiple Vulnerabilities in Oracle & Sun Systems Product Suite Severity: Category I - VMSKEY: V0040781 |
| 2013-A-0194 | Multiple Vulnerabilities in Juniper Networks JUNOS Severity: Category I - VMSKEY: V0040788 |
| 2011-B-0026 | HP-UX Remote Code Execution Vulnerability Severity: Category I - VMSKEY: V0026084 |
| 2008-T-0043 | Multiple Sun Solaris snoop Vulnerabilities Severity: Category II - VMSKEY: V0017141 |
| 2008-T-0029 | Sun Solaris Unspecified Remote Denial of Service Vulnerability Severity: Category II - VMSKEY: V0016060 |
| 2008-T-0022 | Sun Solaris TCP Implementation SYN Flood Denial of Service Severity: Category I - VMSKEY: V0016026 |
| 2008-T-0021 | Sun Solaris Print Service Unspecified Remote Code Execution Vulnerability Severity: Category I - VMSKEY: V0016018 |
| 2008-A-0025 | Sun SPARC Enterprise T5120 and T5220 Default Configuration Root Command Execu... Severity: Category I - VMSKEY: V0015977 |
| 2007-B-0006 | Sun Solaris Telnet Remote Authentication Bypass Vulnerability Severity: Category I - VMSKEY: V0013607 |
| 2005-T-0043 | Sun Solaris Management Console HTTP TRACE Information Disclosure Vulnerability Severity: Category II - VMSKEY: V0011706 |
Snort® IPS/IDS
| Date | Description |
|---|---|
| 2014-01-10 | RCPT TO overflow RuleID : 654-community - Type : SERVER-MAIL - Revision : 28 |
| 2014-01-10 | RCPT TO overflow RuleID : 654 - Type : SERVER-MAIL - Revision : 28 |
| 2014-01-10 | portmap snmpXdmi request TCP RuleID : 593-community - Type : PROTOCOL-RPC - Revision : 31 |
| 2014-01-10 | portmap snmpXdmi request TCP RuleID : 593 - Type : PROTOCOL-RPC - Revision : 31 |
| 2014-01-10 | portmap ttdbserv request UDP RuleID : 588-community - Type : PROTOCOL-RPC - Revision : 27 |
| 2014-01-10 | portmap ttdbserv request UDP RuleID : 588 - Type : PROTOCOL-RPC - Revision : 27 |
| 2014-01-10 | portmap selection_svc request UDP RuleID : 586-community - Type : PROTOCOL-RPC - Revision : 18 |
| 2014-01-10 | portmap selection_svc request UDP RuleID : 586 - Type : PROTOCOL-RPC - Revision : 18 |
| 2014-01-10 | portmap pcnfsd request UDP RuleID : 581-community - Type : PROTOCOL-RPC - Revision : 18 |
| 2014-01-10 | portmap pcnfsd request UDP RuleID : 581 - Type : PROTOCOL-RPC - Revision : 18 |
| 2014-01-10 | portmap nisd request UDP RuleID : 580-community - Type : PROTOCOL-RPC - Revision : 21 |
| 2014-01-10 | portmap nisd request UDP RuleID : 580 - Type : PROTOCOL-RPC - Revision : 21 |
| 2014-01-10 | portmap amountd request UDP RuleID : 576-community - Type : PROTOCOL-RPC - Revision : 17 |
| 2014-01-10 | portmap amountd request UDP RuleID : 576 - Type : PROTOCOL-RPC - Revision : 17 |
| 2014-01-10 | DOS ttdbserv Solaris RuleID : 572-community - Type : PROTOCOL-RPC - Revision : 14 |
| 2014-01-10 | DOS ttdbserv Solaris RuleID : 572 - Type : PROTOCOL-RPC - Revision : 14 |
| 2014-01-10 | EXPLOIT ttdbserv Solaris overflow RuleID : 571 - Type : RPC - Revision : 10 |
| 2014-01-10 | EXPLOIT ttdbserv solaris overflow RuleID : 570 - Type : RPC - Revision : 12 |
| 2014-01-10 | snmpXdmi overflow attempt TCP RuleID : 569-community - Type : PROTOCOL-RPC - Revision : 25 |
| 2014-01-10 | snmpXdmi overflow attempt TCP RuleID : 569 - Type : PROTOCOL-RPC - Revision : 25 |
| 2014-01-10 | Source Quench RuleID : 477 - Type : ICMP - Revision : 6 |
| 2014-01-10 | Destination Unreachable Fragmentation Needed and DF bit was set RuleID : 396 - Type : PROTOCOL-ICMP - Revision : 12 |
| 2014-01-10 | IRDP router selection RuleID : 364-community - Type : PROTOCOL-ICMP - Revision : 11 |
| 2014-01-10 | IRDP router selection RuleID : 364 - Type : PROTOCOL-ICMP - Revision : 11 |
| 2014-01-10 | IRDP router advertisement RuleID : 363-community - Type : PROTOCOL-ICMP - Revision : 11 |
Nessus® Vulnerability Scanner
| id | Description |
|---|---|
| 2017-12-01 | Name: The remote host has an account with a default password. File: account_admin_QwestM0dem.nasl - Type: ACT_GATHER_INFO |
| 2017-05-08 | Name: The remote device is missing a vendor-supplied security patch. File: f5_bigip_SOL23440942.nasl - Type: ACT_GATHER_INFO |
| 2017-04-07 | Name: The remote system can be accessed with a default administrator account. File: account_admin_adminIWSS85.nasl - Type: ACT_GATHER_INFO |
| 2017-04-07 | Name: The remote system can be accessed with a default administrator account. File: account_root_adminIWSS85.nasl - Type: ACT_GATHER_INFO |
| 2016-11-10 | Name: The remote system can be accessed with a default administrator account. File: account_admin_Passw0rd.nasl - Type: ACT_GATHER_INFO |
| 2016-10-28 | Name: The remote system can be accessed with a default administrator account. File: account_666666_666666.nasl - Type: ACT_GATHER_INFO |
| 2016-10-28 | Name: The remote system can be accessed with a default administrator account. File: account_888888_888888.nasl - Type: ACT_GATHER_INFO |
| 2016-10-28 | Name: The remote host has an account with no password set. File: account_admin.nasl - Type: ACT_GATHER_INFO |
| 2016-10-28 | Name: The remote system can be accessed with a default administrator account. File: account_admin1_password.nasl - Type: ACT_GATHER_INFO |
| 2016-10-28 | Name: The remote system can be accessed with a default administrator account. File: account_admin_1111.nasl - Type: ACT_GATHER_INFO |
| 2016-10-28 | Name: The remote system can be accessed with a default administrator account. File: account_admin_1111111.nasl - Type: ACT_GATHER_INFO |
| 2016-10-28 | Name: The remote system can be accessed with a default administrator account. File: account_admin_1234.nasl - Type: ACT_GATHER_INFO |
| 2016-10-28 | Name: The remote system can be accessed with a default administrator account. File: account_admin_12345.nasl - Type: ACT_GATHER_INFO |
| 2016-10-28 | Name: The remote system can be accessed with a default administrator account. File: account_admin_123456.nasl - Type: ACT_GATHER_INFO |
| 2016-10-28 | Name: The remote system can be accessed with a default administrator account. File: account_admin_4321.nasl - Type: ACT_GATHER_INFO |
| 2016-10-28 | Name: The remote system can be accessed with a default administrator account. File: account_admin_54321.nasl - Type: ACT_GATHER_INFO |
| 2016-10-28 | Name: The remote system can be accessed with a default administrator account. File: account_admin_7ujMko0admin.nasl - Type: ACT_GATHER_INFO |
| 2016-10-28 | Name: The remote system can be accessed with a default administrator account. File: account_admin_admin1234.nasl - Type: ACT_GATHER_INFO |
| 2016-10-28 | Name: The remote system can be accessed with a default administrator account. File: account_admin_meinsm.nasl - Type: ACT_GATHER_INFO |
| 2016-10-28 | Name: The remote system can be accessed with a default administrator account. File: account_admin_pass.nasl - Type: ACT_GATHER_INFO |
| 2016-10-28 | Name: The remote system can be accessed with a default administrator account. File: account_admin_smcadmin.nasl - Type: ACT_GATHER_INFO |
| 2016-10-28 | Name: The remote system can be accessed with a default administrator account. File: account_administrator_1234.nasl - Type: ACT_GATHER_INFO |
| 2016-10-28 | Name: The remote system can be accessed with a default administrator account. File: account_administrator_meinsm.nasl - Type: ACT_GATHER_INFO |
| 2016-10-28 | Name: The remote host has an account with a default password. File: account_guest_12345.nasl - Type: ACT_GATHER_INFO |
| 2016-10-28 | Name: The remote host has an account with a default password. File: account_mother_fucker.nasl - Type: ACT_GATHER_INFO |
















