76118 | McAfee Firewall Enterprise DoS (SB10052) | high |
74379 | Unsupported ScreenOS Operating System | critical |
74367 | Juniper ScreenOS 5.4 < 5.4.0r28 / 6.2 < 6.2.0r18 / 6.3 < 6.3.0r16 Malformed ICMP Echo Request DoS (JSA10604) | high |
74366 | Juniper ScreenOS 5.4.x < 5.4.0r12 / 6.1.x / 6.2.x < 6.2.0r2 'about.html' Information Disclosure | medium |
74149 | Juniper ScreenOS 6.3 < 6.3.0r17 DoS | high |
74148 | Juniper ScreenOS Device Detection | info |
73962 | ModSecurity < 2.7.6 Chunked Header Filter Bypass | medium |
73834 | McAfee Firewall Enterprise OpenSSL Information Disclosure (SB10071) (Heartbleed) | high |
73831 | McAfee Next Generation Firewall Detection | info |
73830 | McAfee Firewall Enterprise Detection | info |
73527 | Fortinet FortiOS < 4.3.13 / 5.0.3 Multiple XSRF | medium |
73526 | Fortinet FortiOS 5.x < 5.0.3 Security Bypass | medium |
73525 | Fortinet FortiOS 5.x < 5.0.6 XSS | medium |
73522 | Fortinet Device Detection | info |
73515 | Blue Coat ProxySG Heartbeat Information Disclosure (Heartbleed) | high |
73131 | Squid 3.1.x < 3.3.12 / 3.4.4 HTTPS Request Handling DoS | medium |
72816 | Palo Alto Networks PAN-OS Version Detection | info |
72726 | Blue Coat ProxySG Local User Modification Race Condition | high |
71496 | Palo Alto Networks PAN-OS Firewall/Panorama WebUI Default Credentials | high |
71495 | Palo Alto Networks PAN-OS Firewall/Panorama Web UI Detection | info |
70302 | Blue Coat ProxySG Recursive HTTP Pipeline Pre-Fetch Remote DoS | high |
69042 | Squid 3.2.x < 3.2.13 / 3.3.x < 3.3.8 Port Handling DoS | medium |
69041 | Squid 3.x < 3.2.12 / 3.3.x < 3.3.7 idnsALookup HTTP Request DoS | high |
68994 | Blue Coat ProxySG Unspecified XSS | medium |
68993 | Blue Coat ProxySG Core File Information Disclosure | medium |
68992 | Symantec (Blue Coat) ProxySG SGOS Version | info |
67128 | ModSecurity < 2.7.4 forceRequestBodyVariable Action Handling DoS | medium |
67127 | ModSecurity < 2.7.3 XML External Entity (XXE) Data Parsing Arbitrary File Disclosure | high |
67126 | ModSecurity < 2.7.0 Multipart Request Parsing Filter Bypass | medium |
67125 | ModSecurity < 2.5.9 Multipart Request Header Name DoS | high |
67124 | ModSecurity < 2.1.1 POST Data Null Byte Filter Bypass | medium |
67123 | ModSecurity Version | info |
65948 | Privoxy < 3.0.21 Multiple Information Disclosure Vulnerabilities | medium |
65947 | Privoxy Detection | info |
65601 | Squid 3.x < 3.2.9 / 3.3.3 strHdrAcptLangGetItem Malformed Accept-Language Denial of Service | high |
64501 | Squid 2.x / 3.x < 3.1.23 / 3.2.6 / 3.3.0.3 cachemgr.cgi DoS | medium |
63318 | Squid 2.x / 3.x < 3.1.22 / 3.2.4 / 3.3.0.2 cachemgr.cgi DoS | medium |
58409 | Check Point SecuRemote Hostname Information Disclosure | info |
57750 | Squid Unsupported Version Detection | critical |
57641 | Unsupported IPSO Firewall | critical |
57287 | Squid 3.1.x < 3.1.16 / 3.2.x < 3.2.0.13 DNS Replies CName Record Parsing Remote DoS | medium |
56310 | Firewall Rule Enumeration | info |
56215 | Squid 3.x < 3.0.STABLE26 / 3.1.15 / 3.2.0.11 Gopher Buffer Overflow | medium |
50686 | IP Forwarding Enabled | medium |
49693 | Squid < 3.1.8 / 3.2.0.2 NULL Pointer Dereference Denial of Service | medium |
49692 | Squid Proxy Version Detection | info |
48433 | Squid 3.1.6 DNS Reply Denial of Service | medium |
48406 | Misconfigured SOCKS filtering | medium |
45591 | Squid < 3.0.STABLE24 / 2.7.STABLE8 / 2.6.STABLE24 | medium |
44945 | Cisco ASA 5500 Series Adaptive Security Appliance NTLMv1 Authentication Bypass (cisco-sa-20100217-asa) | high |