Category: SNMP

Search for a vulnerability:

ID # Risk Test Title
1.3.6.1.4.1.25623.1.0.902935HighSamsung Printer SNMP Hardcoded Community String Authentication Bypass Vulnerability
1.3.6.1.4.1.25623.1.0.805739MediumThomson CableHome Gateway(DWG849) Information Exposure
1.3.6.1.4.1.25623.1.0.141705MediumSamsung Printers Credentials Disclosure Vulnerability
1.3.6.1.4.1.25623.1.0.11490HighD-Link DSL Broadband Modem
1.3.6.1.4.1.25623.1.0.11317HighDiscover HP JetDirect EWS Password via SNMP
1.3.6.1.4.1.25623.1.0.10969LowObtain Cisco type via SNMP
1.3.6.1.4.1.25623.1.0.108542OtherSNMP Login Successful For Authenticated Checks
1.3.6.1.4.1.25623.1.0.108541OtherSNMP Login Failed For Authenticated Checks
1.3.6.1.4.1.25623.1.0.108244OtherGet the MAC Address over SNMP
1.3.6.1.4.1.25623.1.0.10800LowObtain OS type via SNMP
1.3.6.1.4.1.25623.1.0.10688HighSNMP VACM
1.3.6.1.4.1.25623.1.0.10551LowObtain network interfaces list via SNMP
1.3.6.1.4.1.25623.1.0.10550LowObtain processes list via SNMP
1.3.6.1.4.1.25623.1.0.10548MediumEnumerate Lanman shares via SNMP
1.3.6.1.4.1.25623.1.0.10547LowEnumerate Lanman services via SNMP
1.3.6.1.4.1.25623.1.0.10546MediumEnumerate Lanman users via SNMP
1.3.6.1.4.1.25623.1.0.105073MediumNetmaster Wireless Cable Modem Password Disclosure
1.3.6.1.4.1.25623.1.0.105072MediumArris DOCSIS Password Disclosure
1.3.6.1.4.1.25623.1.0.103914OtherCheck default community names of the SNMP Agent
1.3.6.1.4.1.25623.1.0.103416OtherSNMP sysDescr Detection and Reporting
1.3.6.1.4.1.25623.1.0.10265OtherAn SNMP Agent is running
1.3.6.1.4.1.25623.1.0.10264HighReport default community names of the SNMP Agent




© 1998-2024 E-Soft Inc. All rights reserved.