Act as System Privilege |
Inappropriate user with Act as Part of the Operating System privilege |
Ascend-kill2 SNMP |
Ascend Pipeline and MAX denial of service vulnerability |
Backup Privilege |
Inappropriate user with Backup Files and Directories privilege |
Cisco CHAP/PPP Vulnerability |
Cisco CHAP authentication failure allows unauthorized PPP connections |
CiscoACL |
Cisco IOS access control list vulnerable via 'tacacs' keyword |
CiscoACL Established |
Cisco IOS access control list vulnerable via 'established' keyword |
CiscoIOS AAA Authenticate |
Cisco IOS AAA does not properly authenticate users |
Create Permanent Object Privilege |
Inappropriate user with Create Permanent Shared Objects privilege |
Debug Privilege |
Inappropriate user with Debug Programs privilege |
Generate Security Audit Privilege |
Inappropriate user with Generate Security Audits privilege |
Load Driver Privilege |
Inappropriate user with Load and Unload Device Drivers privilege |
Manage Security Log Privilege |
Inappropriate user with Manage Auditing and Security Log privilege |
Profile System Privilege |
Inappropriate user with Profile System Performance privilege |
Replace Process Token Privilege |
Inappropriate user with Replace a Process Level Token privilege |
Restore Privilege |
Inappropriate user with Restore Files and Directories privilege |
SOCKS |
SOCKS v3 daemon misconfigured |
SocksV4 |
SOCKS v4 daemon misconfigured |
SocksV5 |
SOCKS v5 daemon misconfigured |
System Environment Privilege |
Inappropriate user with Modify Firmware Environment Values privilege |
Take Ownership Privilege |
Inappropriate user with Take Ownership of Files or Other Objects privilege |
bruteciscoenable |
Cisco administrative account accessible |
ftpproxy |
FTP proxy penetrated |
nbdict |
NetBIOS dictionary attack |
pmapsunset |
Portmap UNSET procedure requested with spoofed address |
rexd |
Rexd running |
rpcpcnfsd |
RPC pcnfsd service allows remote command execution as root |
rpcstatd |
RPC statd remote file creation and removal |
rpcupdate |
RPC ypupdated daemon allows remote commands execution as root |
wwwproxypen |
HTTP proxy penetrated |