Overview

This help file contains descriptions of 103 vulnerabilities. These vulnerabilities are listed by category in the following table. You can also view this list of vulnerabilities by risk level or search for a particular vulnerability in the index.

Internet Scanner Vulnerabilities by Risk Level
Category: Vulnerabilities:
High
Act as System Privilege Inappropriate user with Act as Part of the Operating System privilege
Ascend-kill2 SNMP Ascend Pipeline and MAX denial of service vulnerability
Backup Privilege Inappropriate user with Backup Files and Directories privilege
Cisco CHAP/PPP Vulnerability Cisco CHAP authentication failure allows unauthorized PPP connections
CiscoACL Cisco IOS access control list vulnerable via 'tacacs' keyword
CiscoACL Established Cisco IOS access control list vulnerable via 'established' keyword
CiscoIOS AAA Authenticate Cisco IOS AAA does not properly authenticate users
Create Permanent Object Privilege Inappropriate user with Create Permanent Shared Objects privilege
Debug Privilege Inappropriate user with Debug Programs privilege
Generate Security Audit Privilege Inappropriate user with Generate Security Audits privilege
Load Driver Privilege Inappropriate user with Load and Unload Device Drivers privilege
Manage Security Log Privilege Inappropriate user with Manage Auditing and Security Log privilege
Profile System Privilege Inappropriate user with Profile System Performance privilege
Replace Process Token Privilege Inappropriate user with Replace a Process Level Token privilege
Restore Privilege Inappropriate user with Restore Files and Directories privilege
SOCKS SOCKS v3 daemon misconfigured
SocksV4 SOCKS v4 daemon misconfigured
SocksV5 SOCKS v5 daemon misconfigured
System Environment Privilege Inappropriate user with Modify Firmware Environment Values privilege
Take Ownership Privilege Inappropriate user with Take Ownership of Files or Other Objects privilege
bruteciscoenable Cisco administrative account accessible
ftpproxy FTP proxy penetrated
nbdict NetBIOS dictionary attack
pmapsunset Portmap UNSET procedure requested with spoofed address
rexd Rexd running
rpcpcnfsd RPC pcnfsd service allows remote command execution as root
rpcstatd RPC statd remote file creation and removal
rpcupdate RPC ypupdated daemon allows remote commands execution as root
wwwproxypen HTTP proxy penetrated
Low
3270 mapper 3270 mapper service
Disabled Account Disabled account
Domain Admin Domain Administrators group includes non-default user
Domain Guest Domain Guest group includes non-default user
Dormant Account Dormant account
Forced Logoff Forced logoff not enabled for account with expired time
Guest Exists Guest account name exists
Guest User Guest account includes unallowed user
Increase Quota Privilege Inappropriate user with Increase Quotas privilege
Interactive Guest Logon Windows NT Interactive_Guest_Logon
Local User Windows NT local user on workstation
Locked Account Locked account from bad login attempts
Lockout Duration Lockout duration insufficient
Lockout Window Lockout window insufficient
Logon Hours Not Set Logon hours not set
Network Guest Logon Windows NT network Guest logon
No Logon Windows NT user has never logged on
No User Profile No user profile required
Primary Domain Controller Primary domain controller identified
Sunlink Mapper Sunlink mapper service
Ugidd Check Ugidd daemon can reveal usernames on Linux machines
Workstation not restricted Windows NT workstations not restricted
admind Admind or Sadmind running
alis RPC alis service
bindvrs BIND servers can be remotely queried for their version
bootparam Bootparam enabled
bootpdom Bootparam supplies domain name
database service RPC database service
httpproxy HTTP proxy detected
keyserv RPC keyserv service
llockmgr RPC llockmgr service
lockout Lockout threshold incorrect
nlockmgr RPC nlockmgr service
nsed nsed service
nsemntd nsemntd service
rje mapper rje mapper service
rpc_snmp RPC SNMP service detected running
rquotad rquotad service
rstatd NIS rstat service is running
rstatout Rstat output
ruserout Rusers output
rusersd Rusers running
sched RPC sched service
showfhd showfhd service
sprayd Sprayd service
statmon RPC statmon service
tfsd Tfsd service
x25.inr X25 daemon running
ypbind NIS YPBind service
ypmap NIS maps
yppasswdd Yppasswdd service
ypserv NIS Yellow Pages (YP) service is running
ypxfrd Ypxfrd service
Low
Change System Time Privilege Inappropriate user with Change the System Time privilege
CiscoIOS Cisco IOS can be remotely crashed and rebooted by unauthenticated users
CiscoLand Cisco vulnerable to land attack
Create Pagefile Privilege Inappropriate user with Create a Pagefile privilege
Create Token Name Privilege Inappropriate user with Create a Token Object privilege
Guest in Group Guest account in non-default group
Increase Priority Privilege Inappropriate user with Increase Scheduling Priority privilege
Lock Memory Privilege Inappropriate user with Lock Pages in Memory privilege
PmapUnset Portmap UNSET procedure requested
Profile Single Process Privilege Inappropriate user with Profile Single Process privilege
Remote Shutdown Privilege Inappropriate user with Force Shutdown from a Remote System privilege
RipAppend Routed append vulnerability allows remote file manipulation
YpBindReserved Ypbind is running over a non-reserved port
YpServReserved Ypserv on unreserved Port
guestblankpw Guest user has blank password
guestnopw Guest account has no password
guestuserpw Guest username same as password
rpc32771 RPC bind service on improper port
selsvcvuln Remote file access through selection service
squidprox Squid proxy was penetrated to reach protected hosts
walld Rpc.walld wall daemon running