Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | |||
ID # | Risk | Test Title |
1.3.6.1.4.1.25623.1.0.808204 | High | Sunny WebBox Hard-Coded Account Vulnerability |
1.3.6.1.4.1.25623.1.0.807609 | High | Rasplex Authentication Bypass Vulnerability |
1.3.6.1.4.1.25623.1.0.807608 | High | OpenELEC Authentication Bypass Vulnerability |
1.3.6.1.4.1.25623.1.0.807525 | High | FingerTec Devices Telnet Default Credentials Vulnerability |
1.3.6.1.4.1.25623.1.0.807072 | High | SerVision HVG Default Credentials Vulnerability |
1.3.6.1.4.1.25623.1.0.806531 | High | OpenNMS Default Credentials and XXE Vulnerabilities |
1.3.6.1.4.1.25623.1.0.806053 | High | ManageEngine OpManager Multiple Vulnerabilities |
1.3.6.1.4.1.25623.1.0.804477 | High | Datum Systems Satellite Modem Multiple Vulnerabilities |
1.3.6.1.4.1.25623.1.0.804475 | High | ZKSoftware WebServer Default Admin Credentials |
1.3.6.1.4.1.25623.1.0.804468 | High | Yealink VoIP Phone SIP-T38G Multiple Vulnerabilities |
1.3.6.1.4.1.25623.1.0.804449 | High | SMB Brute Force Logins With Default Credentials |
1.3.6.1.4.1.25623.1.0.803199 | High | ZyXEL ZyWALL Web Configurator Authentication Bypass Vulnerability |
1.3.6.1.4.1.25623.1.0.803198 | High | VMAX Web Viewer Default Credentials Authentication Bypass Vulnerability |
1.3.6.1.4.1.25623.1.0.803193 | High | Sitecom WLM-3500 Backdoor Accounts Authentication Bypass vulnerability |
1.3.6.1.4.1.25623.1.0.803190 | High | Aastra IP Telephone Hardcoded Telnet Password Security Bypass Vulnerability |
1.3.6.1.4.1.25623.1.0.18415 | Medium | Bay Networks Accelar 1200 Switch found with default password |
1.3.6.1.4.1.25623.1.0.18414 | Medium | Allied Telesyn Router/Switch found with default password |
1.3.6.1.4.1.25623.1.0.18413 | Medium | Allied Telesyn Router/Switch Web interface found with default password |
1.3.6.1.4.1.25623.1.0.17638 | Medium | Avaya P330 Stackable Switch found with default password |
1.3.6.1.4.1.25623.1.0.17575 | High | Unpassworded 'help' account |
1.3.6.1.4.1.25623.1.0.17294 | High | Default password 'forgot' for account 'user' |
1.3.6.1.4.1.25623.1.0.17293 | High | Default password 'debug' for account 'user' |
1.3.6.1.4.1.25623.1.0.17292 | High | Default password 'forgot' for account 'super' |
1.3.6.1.4.1.25623.1.0.17291 | High | Default password 'debug' for account 'super' |
1.3.6.1.4.1.25623.1.0.17290 | High | Default password 'public' for account 'public' |
1.3.6.1.4.1.25623.1.0.17289 | High | Default password 'synnet' for account 'debug' |
1.3.6.1.4.1.25623.1.0.15716 | High | Nortel Web Management Default Username and Password (ro/ro) |
1.3.6.1.4.1.25623.1.0.140133 | High | Default Password `avam@r` for root Account. |
1.3.6.1.4.1.25623.1.0.140110 | High | Default password `WhatsHappeningNow` for `insight` account |
1.3.6.1.4.1.25623.1.0.140093 | High | Blackstratus LOGStorm default MySQL password for user `htr` |
1.3.6.1.4.1.25623.1.0.140089 | High | Default password `htinit` for htinit account |
1.3.6.1.4.1.25623.1.0.140088 | High | Default password `3!acK5tratu5` for root account |
1.3.6.1.4.1.25623.1.0.140055 | High | Default password `bakergiga` for root account |
1.3.6.1.4.1.25623.1.0.140001 | High | NetMan 204 Default SSH Login |
1.3.6.1.4.1.25623.1.0.12641 | High | Default password router Pirelli AGE mB |
1.3.6.1.4.1.25623.1.0.12513 | High | MacOS X Server Default Password |
1.3.6.1.4.1.25623.1.0.12116 | High | Default password 'swift' for account 'swift' |
1.3.6.1.4.1.25623.1.0.12066 | High | APC SmartSlot factory account |
1.3.6.1.4.1.25623.1.0.11864 | High | Default password 'db2as' for account 'db2as' |
1.3.6.1.4.1.25623.1.0.11863 | High | Default password 'ibmdb2' for account 'db2as' |
1.3.6.1.4.1.25623.1.0.11862 | High | Default password 'db2inst' for account 'db2inst1' |
1.3.6.1.4.1.25623.1.0.11861 | High | Default password 'ibmdb2' for account 'db2fenc1' |
1.3.6.1.4.1.25623.1.0.11860 | High | Default password 'db2fenc1' for account 'db2fenc1' |
1.3.6.1.4.1.25623.1.0.11859 | High | Default password 'ibmdb2' for account 'db2inst1' |
1.3.6.1.4.1.25623.1.0.11327 | High | Nortel Baystack switch password test |
1.3.6.1.4.1.25623.1.0.11266 | High | Unpasswordedjill account |
1.3.6.1.4.1.25623.1.0.11265 | High | Default password (satori) for rewt |
1.3.6.1.4.1.25623.1.0.11264 | High | Default password (wh00t!) for root |
1.3.6.1.4.1.25623.1.0.11263 | High | Default password (lrkr0x) for gamez |
1.3.6.1.4.1.25623.1.0.11262 | High | Default password (D13hh[) for root |
1.3.6.1.4.1.25623.1.0.11261 | High | Default password (D13HH[) for root |
1.3.6.1.4.1.25623.1.0.11260 | High | Default password (wank) for wank |
1.3.6.1.4.1.25623.1.0.11259 | High | UnpasswordedStoogR account |
1.3.6.1.4.1.25623.1.0.11258 | High | Default password (glftpd) for glftpd |
1.3.6.1.4.1.25623.1.0.11257 | High | Default password (manager) for system |
1.3.6.1.4.1.25623.1.0.11256 | High | Default password (guest) for guest |
1.3.6.1.4.1.25623.1.0.11255 | High | Default password (root) for root |
1.3.6.1.4.1.25623.1.0.11254 | High | Unpasswordedfriday account |
1.3.6.1.4.1.25623.1.0.11253 | High | Unpasswordedhax0r account |
1.3.6.1.4.1.25623.1.0.11252 | High | Unpasswordedtoor account |
1.3.6.1.4.1.25623.1.0.11251 | High | Unpasswordedtutor account |
1.3.6.1.4.1.25623.1.0.11250 | High | Unpasswordedbackdoor account |
1.3.6.1.4.1.25623.1.0.11249 | High | Unpasswordedjack account |
1.3.6.1.4.1.25623.1.0.11248 | High | Unpasswordeddate account |
1.3.6.1.4.1.25623.1.0.11247 | High | Unpasswordedsync account |
1.3.6.1.4.1.25623.1.0.11246 | High | Unpasswordedlp account |
1.3.6.1.4.1.25623.1.0.11245 | High | Unpasswordedroot account |
1.3.6.1.4.1.25623.1.0.11244 | High | UnpasswordedOutOfBox account |
1.3.6.1.4.1.25623.1.0.11243 | High | Unpassworded4Dgifts account |
1.3.6.1.4.1.25623.1.0.11242 | High | Unpasswordeddemos account |
1.3.6.1.4.1.25623.1.0.11241 | High | UnpasswordedEZsetup account |
1.3.6.1.4.1.25623.1.0.11240 | High | Unpasswordedguest account |
1.3.6.1.4.1.25623.1.0.11208 | High | Netscape Enterprise Default Administrative Password |
1.3.6.1.4.1.25623.1.0.11203 | Medium | Motorola Vanguard with No Password |
1.3.6.1.4.1.25623.1.0.11201 | High | Nortel/Bay Networks/Xylogics Annex default password |
1.3.6.1.4.1.25623.1.0.111104 | High | Janitza Multiple Devices FTP Default Credentials |
1.3.6.1.4.1.25623.1.0.111097 | High | Philips In.Sight Default Webinterface Credentials |
1.3.6.1.4.1.25623.1.0.111096 | High | Philips In.Sight Default Telnet Credentials |
1.3.6.1.4.1.25623.1.0.111092 | High | Brother Multiple Devices Telnet Default Password |
1.3.6.1.4.1.25623.1.0.111072 | High | ComfortableMexicanSofa CMS Engine Admin Default Credentials |
1.3.6.1.4.1.25623.1.0.111066 | High | HomeMatic SSH Default Credentials |
1.3.6.1.4.1.25623.1.0.111064 | High | Kanboard admin default credentials |
1.3.6.1.4.1.25623.1.0.111061 | High | Zebra PrintServer Telnet Default Password |
1.3.6.1.4.1.25623.1.0.111060 | High | Zebra PrintServer Webinterface Default Password |
1.3.6.1.4.1.25623.1.0.111059 | High | Polycom SoundStation/SoundPoint IP Webinterface Default Credentials |
1.3.6.1.4.1.25623.1.0.111058 | High | OpenStage SIP Webinterface Default Password |
1.3.6.1.4.1.25623.1.0.111057 | High | Siemens WinCC MSSQL Default Credentials |
1.3.6.1.4.1.25623.1.0.111054 | High | Silex USB-device Telnet Default Credentials |
1.3.6.1.4.1.25623.1.0.111053 | High | Silex USB-device Webinterface Default Credentials |
1.3.6.1.4.1.25623.1.0.111052 | High | APC Network Management Card Webinterface Default Credentials |
1.3.6.1.4.1.25623.1.0.111051 | High | APC Network Management Card Telnet Default Credentials |
1.3.6.1.4.1.25623.1.0.111044 | High | Dokuwiki default admin credentials on Debian |
1.3.6.1.4.1.25623.1.0.111030 | High | Rockmongo admin default credentials |
1.3.6.1.4.1.25623.1.0.111013 | High | Apache Tomcat Server Administration Unauthorized Access Vulnerability |
1.3.6.1.4.1.25623.1.0.111011 | High | RainLoop Webmail admin default credentials |
1.3.6.1.4.1.25623.1.0.111006 | High | Apache Axis2 axis2-admin default credentials |
1.3.6.1.4.1.25623.1.0.11000 | High | MPEi/X Default Accounts |
1.3.6.1.4.1.25623.1.0.10995 | Medium | Sun JavaServer Default Admin Password |
1.3.6.1.4.1.25623.1.0.10989 | High | Nortel/Bay Networks default password |
1.3.6.1.4.1.25623.1.0.10862 | High | Microsoft's SQL Server Brute Force |
1.3.6.1.4.1.25623.1.0.108043 | High | AVM FRITZ!Box Default Password (FTP) |
1.3.6.1.4.1.25623.1.0.108042 | High | AVM FRITZ!Box Default / no Password (HTTP) |
1.3.6.1.4.1.25623.1.0.108041 | Other | HTTP Brute Force Logins with default Credentials |
1.3.6.1.4.1.25623.1.0.108032 | High | ntopng Default Admin Credentials |
1.3.6.1.4.1.25623.1.0.108025 | High | TeamPass Default Admin Credentials |
1.3.6.1.4.1.25623.1.0.108013 | Other | SSH Brute Force Logins with default Credentials |
1.3.6.1.4.1.25623.1.0.10747 | Medium | 3Com Superstack 3 switch with default password |
1.3.6.1.4.1.25623.1.0.10714 | High | Default password router Zyxel |
1.3.6.1.4.1.25623.1.0.10673 | High | Microsoft's SQL Blank Password |
1.3.6.1.4.1.25623.1.0.106180 | Medium | Zabbix Default Guest Account |
1.3.6.1.4.1.25623.1.0.105856 | High | NUUO Network Video Recorder Default Credentials |
1.3.6.1.4.1.25623.1.0.105791 | High | Riverbed SteelCentral SSH Default Credentials |
1.3.6.1.4.1.25623.1.0.105629 | High | Netgear GS108T Default Password |
1.3.6.1.4.1.25623.1.0.105597 | High | Exagrid SSH Known SSH Private Key |
1.3.6.1.4.1.25623.1.0.105593 | High | Apache Karaf SSH Default Credentials |
1.3.6.1.4.1.25623.1.0.105493 | High | Adcon A840 Telemetry Gateway Default adv Telnet Credential |
1.3.6.1.4.1.25623.1.0.105492 | High | Adcon A840 Telemetry Gateway Default root Telnet Credential |
1.3.6.1.4.1.25623.1.0.105452 | High | SolarWinds Log and Event Manager cmc SSH Default Credentials |
1.3.6.1.4.1.25623.1.0.105431 | High | Panopta OnSight SSH Default Credentials |
1.3.6.1.4.1.25623.1.0.105423 | High | Vmware NSX Web Management Interface Default Credentials |
1.3.6.1.4.1.25623.1.0.105412 | High | Junos Space Web Management Interface Default Credentials |
1.3.6.1.4.1.25623.1.0.105409 | High | Junos Space SSH Default Credentials |
1.3.6.1.4.1.25623.1.0.105354 | High | GSA Default Admin Credentials |
1.3.6.1.4.1.25623.1.0.105345 | High | OpenVPN Access Server SSH Default Credentials |
1.3.6.1.4.1.25623.1.0.10529 | High | Nortel Networks passwordless router (user level) |
1.3.6.1.4.1.25623.1.0.105289 | High | Redis Server Default Password |
1.3.6.1.4.1.25623.1.0.10528 | High | Nortel Networks passwordless router (manager level) |
1.3.6.1.4.1.25623.1.0.105278 | High | Citrix NetScaler SSH Default Credentials |
1.3.6.1.4.1.25623.1.0.105277 | High | Citrix NetScaler Web Management Interface Default Credentials |
1.3.6.1.4.1.25623.1.0.105166 | High | F5 Networks BIG-IQ Webinterface Default Credentials |
1.3.6.1.4.1.25623.1.0.105163 | High | F5 Networks BIG-IP Webinterface Default Credentials |
1.3.6.1.4.1.25623.1.0.105123 | High | Device42 DCIM Appliance Manager Default Credentials |
1.3.6.1.4.1.25623.1.0.105089 | High | OpenMediaVault Default Admin Credentials |
1.3.6.1.4.1.25623.1.0.105060 | High | Mobotix Cameras Default Admin Credentials |
1.3.6.1.4.1.25623.1.0.105055 | High | nas4free Default Admin Credentials |
1.3.6.1.4.1.25623.1.0.105023 | High | CS121 UPS Default Admin Credentials |
1.3.6.1.4.1.25623.1.0.10500 | Medium | Shiva Integrator Default Password |
1.3.6.1.4.1.25623.1.0.103921 | High | Areca Raid Storage Manager Default Admin Credentials |
1.3.6.1.4.1.25623.1.0.103903 | High | ZTE ZXV10 W300 Wireless Router Hardcoded Credentials Security Bypass Vulnerability |
1.3.6.1.4.1.25623.1.0.103901 | High | Netsynt CRD Voice Router Telnet CLI Default Password |
1.3.6.1.4.1.25623.1.0.103898 | High | Audemat FMB80 RDS Encoder Default root Credentials |
1.3.6.1.4.1.25623.1.0.103887 | High | Multiple IP Video/Camera Server Web Interface Default Admin Credentials |
1.3.6.1.4.1.25623.1.0.103861 | High | Grandstream GXP VOIP Phones Default Credentials |
1.3.6.1.4.1.25623.1.0.103860 | High | IPmux-2L TDM Pseudowire Access Gateway Default Credentials |
1.3.6.1.4.1.25623.1.0.103857 | High | Schneider Modicon M340 Default Credentials |
1.3.6.1.4.1.25623.1.0.103843 | High | Blackboard LC3000 Laundry Reader Default Telnet Password |
1.3.6.1.4.1.25623.1.0.103836 | High | IPMI Anonymous Login Enabled |
1.3.6.1.4.1.25623.1.0.103824 | High | IZON IP Cameras Hard-coded Credentials |
1.3.6.1.4.1.25623.1.0.103820 | High | Siedle Door Controller Default Password |
1.3.6.1.4.1.25623.1.0.103819 | High | Teles VoIP Devices Default Password |
1.3.6.1.4.1.25623.1.0.103798 | High | PostgreSQL no password |
1.3.6.1.4.1.25623.1.0.103780 | High | Sharp Printer Default Account Authentication Bypass Vulnerability |
1.3.6.1.4.1.25623.1.0.103772 | High | Sitecom Devices Hard-coded credentials |
1.3.6.1.4.1.25623.1.0.103767 | High | Avocent KVM Default Login |
1.3.6.1.4.1.25623.1.0.103766 | High | Fujitsu KVM Default Login |
1.3.6.1.4.1.25623.1.0.103765 | High | HP IP Console Switch KVM Default Login |
1.3.6.1.4.1.25623.1.0.103764 | High | Dell KVM Default Login |
1.3.6.1.4.1.25623.1.0.103763 | High | IBM GCM16/GCM32 Default Login |
1.3.6.1.4.1.25623.1.0.103754 | High | Seagate NAS Default Login |
1.3.6.1.4.1.25623.1.0.103746 | High | HP D2D/StorOnce Storage Unit Backdoor |
1.3.6.1.4.1.25623.1.0.103737 | High | Grandstream Devices Backdoor in Telnet Protocol |
1.3.6.1.4.1.25623.1.0.103730 | High | Siemens Gigaset sx762 Default Password |
1.3.6.1.4.1.25623.1.0.103723 | High | Siemens Scalance Default Credentials |
1.3.6.1.4.1.25623.1.0.103717 | High | CAREL pCOWeb Default root Password |
1.3.6.1.4.1.25623.1.0.103716 | High | CAREL pCOWeb Default Account Security Bypass Vulnerability |
1.3.6.1.4.1.25623.1.0.103708 | High | Kyocera Printer Default Account Authentication Bypass Vulnerability |
1.3.6.1.4.1.25623.1.0.103695 | High | Tandberg Devices Default Password |
1.3.6.1.4.1.25623.1.0.103690 | High | Dlink DIR Multiple Devices Default Login |
1.3.6.1.4.1.25623.1.0.103684 | High | Aastra OpenCom 1000 Default Login |
1.3.6.1.4.1.25623.1.0.103681 | High | Dell Remote Access Controller Default Login |
1.3.6.1.4.1.25623.1.0.103666 | High | Netgear GS110TP Default Password |
1.3.6.1.4.1.25623.1.0.103649 | High | Xerox Printer Default Account Authentication Bypass Vulnerability |
1.3.6.1.4.1.25623.1.0.103646 | High | Multiple Barracuda Products Security Bypass and Backdoor Unauthorized Access Vulnerabilities |
1.3.6.1.4.1.25623.1.0.103606 | High | Cisco TANDBERG C Series and E/EX Series Default Credentials Authentication Bypass Vulnerability |
1.3.6.1.4.1.25623.1.0.103559 | High | Symantec Messaging Gateway SSH Default Password Security Bypass Vulnerability |
1.3.6.1.4.1.25623.1.0.103552 | High | PostgreSQL weak password |
1.3.6.1.4.1.25623.1.0.103551 | High | MySQL weak password |
1.3.6.1.4.1.25623.1.0.103550 | High | Tomcat Manager Remote Unauthorized Access Vulnerability |
1.3.6.1.4.1.25623.1.0.103499 | High | Rugged Operating System Backdoor Unauthorized Access Vulnerability |
1.3.6.1.4.1.25623.1.0.103498 | High | NEC Enterprise Server Backdoor Unauthorized Access Vulnerability |
1.3.6.1.4.1.25623.1.0.103465 | High | WAGO I/O SYSTEM 758 Series Insecure Credential Vulnerabilities |
1.3.6.1.4.1.25623.1.0.103431 | High | HP StorageWorks Default Accounts and Directory Traversal Vulnerabilities |
1.3.6.1.4.1.25623.1.0.103366 | High | Schneider Electric Quantum Ethernet Module Hardcoded Credentials Authentication Bypass Vulnerability |
1.3.6.1.4.1.25623.1.0.103363 | High | Schneider Electric Quantum Ethernet Module Hardcoded Credentials Authentication Bypass Vulnerability |
1.3.6.1.4.1.25623.1.0.103240 | High | HTTP Brute Force Logins with default Credentials Reporting |
1.3.6.1.4.1.25623.1.0.103239 | High | SSH Brute Force Logins with default Credentials Reporting |
1.3.6.1.4.1.25623.1.0.100792 | High | Firebird Default Credentials |