72039 | VMware Player 5.x < 5.0.1 VMX Process DoS (VMSA-2014-0001) (Linux) | low |
71534 | SuperMicro Device Uses Default SSL Certificate | medium |
71533 | SuperMicro Device Uses Default SSH Host Key | critical |
71054 | VMware Workstation 9.x < 9.0.3 Multiple Privilege Escalation Vulnerabilities (VMSA-2013-0013 / VMSA-2013-0014) | high |
71053 | VMware Workstation for Linux Installed | info |
71052 | VMware Player 5.x < 5.0.3 Host Privilege Escalation (VMSA-2013-0013) | high |
71051 | VMware Player for Linux Installed | info |
70941 | MIT Kerberos 5 setup_server_realm() Remote DoS | medium |
70544 | SSL Cipher Block Chaining Cipher Suites Supported | info |
70212 | Alcatel OmniSwitch Default Credentials (telnet) | medium |
69928 | ICAP Server Type and Version | info |
69790 | Alcatel-Lucent OmniSwitch Series Agranat-Embweb Management Server Session Cookie Handling Remote Overflow | critical |
69551 | SSL Certificate Chain Contains RSA Keys Less Than 2048 bits | low |
69480 | HP LaserJet PJL Interface Directory Traversal (HPSBPI02575) | high |
69181 | OS Identification : NETCONF Over SSH | info |
68932 | IPMI Cipher Suites Supported | info |
68931 | IPMI Cipher Suite Zero Authentication Bypass | critical |
67231 | IBM GSKit 7.x < 7.0.4.45 / 8.0.14.x < 8.0.14.27 TLS Side-Channel Timing Information Disclosure | low |
66334 | Patch Report | info |
66848 | SSL Null Cipher Suites Supported | medium |
66293 | Unix Operating System on Extended Support | info |
66173 | RDP Screenshot | info |
65821 | SSL RC4 Cipher Suites Supported (Bar Mitzvah) | medium |
65765 | OS Identification : Miscellaneous Methods | info |
65047 | KSplice : Installed Patches | info |
64913 | SSHD libkeyutils Backdoor | critical |
64815 | Oracle Java Runtime Environment (JRE) Detection (Unix) | info |
64688 | APT1-Related SSL Certificate Detected | critical |
64582 | Netstat Connection Information | info |
64298 | Well-Known Ruby on Rails Secret Token Used on Remote Application | medium |
64295 | Patch Management Auditing Satisfied | info |
64294 | Patch Management Windows Auditing Conflicts | high |
63398 | SSL Certificate Chain Contains Illegitimate TURKTRUST Intermediate CA | medium |
62969 | SSL Certificate Signed with the Compromised FortiGate Key | medium |
62694 | Internet Key Exchange (IKE) Aggressive Mode with Pre-Shared Key | medium |
62574 | IBM Tivoli Directory Server TLS NULL Cipher (uncredentialed check) | medium |
62566 | RuggedCom RuggedOS Known Hardcoded SSL RSA Private Key | medium |
62565 | Transport Layer Security (TLS) Protocol CRIME Vulnerability | low |
62564 | TLS Next Protocols Supported | info |
62563 | SSL Compression Methods Supported | info |
61447 | SSL Certificate Signed with the Publicly Known Cyberoam Key | medium |
61490 | EMC AutoStart ftAgent Version Detection | info |
60108 | SSL Certificate Chain Contains Weak RSA Keys | medium |
60016 | Vulnerability in TLS Could Allow Information Disclosure (2655992) (uncredentialed check) | medium |
59917 | IBM AIX TCP Large Send Denial of Service Vulnerability | high |
59657 | Network UPS Tools Detection | info |
58768 | SSL Resume With Different Cipher Issue | info |
58751 | SSL/TLS Protocol Initialization Vector Implementation Information Disclosure Vulnerability (BEAST) | medium |
58604 | OS Identification : NativeLanManager | info |
58076 | OS Identification : LDAP | info |