Skip to content

Weaknesses

NodeZero's identifies and surfaces many weaknesses that it finds during a pentest. These weaknesses are identified by a Common Vulnerabilities and Exposures (CVE) identifier (e.g. CVE-2021-44228), or a Horizon3.ai weakness identifier (e.g. H3-2022-0001).

This page provides a reference for Horizon3.ai Weaknesses identified by NodeZero. For information on CVEs identified by NodeZero, please reference the official CVE website maintained by MITRE.

Weakness ID                  Name
H3-2020-0001 Remote Desktop Username Disclosure
H3-2020-0002 Anonymous Access to ZooKeeper API
H3-2020-0003 Anonymous Access to Printer using PJL or PS
H3-2020-0004 Zone Transfer Allowed to Any Server
H3-2020-0005 Anonymous FTP Enabled
H3-2020-0006 LDAP Null Bind Allowed
H3-2020-0007 SMB Null Session Allowed
H3-2020-0008 Guest Account Enabled
H3-2020-0009 Weak NFS Export Permissions
H3-2020-0010 NFS UID/GID Manipulation Possible
H3-2020-0012 LLMNR/NBT-NS Poisoning Possible
H3-2020-0014 Weak or Default Credentials
H3-2020-0016 Insecure IPMI Implementation
H3-2020-0017 IPMI Cipher Zero Vulnerability
H3-2020-0018 Fundamentally Insecure Protocols Detected
H3-2020-0021 Unauthenticated Access to the Jenkins Script Console
H3-2020-0022 Insecure Java JMX Configuration
H3-2020-0023 Apache Hadoop YARN ResourceManager Unauthenticated Command Execution
H3-2020-0028 FTP Directory Traversal Vulnerability
H3-2020-0030 Android Debug Bridge (ADB) over TCP Enabled
H3-2021-0001 Public Access to Amazon S3 Bucket
H3-2021-0002 Subdomain Takeover
H3-2021-0003 Unauthenticated Access to Sensitive Kubelet API Endpoints
H3-2021-0004 Kubernetes Privileged Container Exposure
H3-2021-0005 Unauthenticated Kubelet API Remote Code Execution Vulnerability
H3-2021-0006 Unauthenticated Kubernetes API Server Access
H3-2021-0007 Kubernetes Service Account Token Exposure
H3-2021-0008 Unauthenticated Etcd Access
H3-2021-0009 Unauthenticated Docker Registry API Access
H3-2021-0010 Unauthenticated Docker Engine API Access
H3-2021-0011 Kerberos Pre-Authentication Disabled
H3-2021-0012 Weak or Default Credentials - FTP
H3-2021-0013 Weak or Default Credentials - Telnet
H3-2021-0014 Weak or Default Credentials - SSH
H3-2021-0015 Weak or Default Credentials - SNMP
H3-2021-0016 Weak or Default Credentials - Microsoft SQL Server
H3-2021-0017 Weak or Default Credentials - MySQL
H3-2021-0018 Weak or Default Credentials - Postgres
H3-2021-0019 Weak or Default Credentials - Password Spray
H3-2021-0020 Weak or Default Credentials - Cracked Credentials
H3-2021-0021 Weak or Default Credentials - Web Applications
H3-2021-0022 IPV6 DNS Hijacking Possible Using Mitm6
H3-2021-0023 Public Access to Azure Blob Storage Container
H3-2021-0024 Dangling DNS Record
H3-2021-0029 AWS Unrestricted Assume Role Access
H3-2021-0030 SMB Signing Not Required
H3-2021-0031 Public Access to Git Repository
H3-2021-0032 Credential Reuse
H3-2021-0033 mDNS Poisoning Possible
H3-2021-0034 LLMNR Poisoning Possible
H3-2021-0035 NBT-NS Poisoning Possible
H3-2021-0036 Unauthenticated Access to Elasticsearch
H3-2021-0038 Kerberoasting
H3-2021-0039 Unrestricted Sudo Privileges
H3-2021-0040 AWS Instance Metadata Service v1 Exposed
H3-2021-0042 Credential Dumping - Security Account Manager (SAM) Database
H3-2021-0043 Credential Dumping - Local Security Authority (LSA) Secrets
H3-2021-0044 Credential Dumping - Local Security Authority Subsystem Service (LSASS) Memory
H3-2021-0045 Credential Dumping - /etc/shadow File
H3-2021-0046 Credential Dumping - Active Directory Services Database (NTDS)
H3-2022-0002 Azure Multi-Factor Authentication Disabled
H3-2022-0003 Remote Desktop Protocol (RDP) Port Exposed to the Internet
H3-2022-0004 Server Message Block (SMB) Port Exposed to the Internet
H3-2022-0005 Secure Socket Shell (SSH) Port Exposed to the Internet
H3-2022-0006 Database Port Exposed to the Internet
H3-2022-0007 Telnet Port Exposed to the Internet
H3-2022-0008 File Transfer Protocol (FTP) Port Exposed to the Internet
H3-2022-0009 Simple Network Management Protocol (SNMP) Port Exposed to the Internet
H3-2022-0010 Risky Port Exposed to the Internet
H3-2022-0016 Active Directory Certificate Services Misconfiguration Privilege Escalation - Subject Alternative Name
H3-2022-0017 Active Directory Certificate Services Misconfiguration Privilege Escalation - Any Purpose or No (aka SubCA) EKU Misconfiguration
H3-2022-0018 Active Directory Certificate Services Misconfigured Enrollment Agent Template
H3-2022-0019 Active Directory Certificate Services Misconfigured Template Requires Enrollment Agent Signature
H3-2022-0020 Active Directory Certificate Services Misconfigured Template Access Controls
H3-2022-0021 Active Directory Certificate Services Domain Escalation via Vulnerable PKI AD Object Access Controls
H3-2022-0022 Active Directory Certificate Services - EDITF_ATTRIBUTESUBJECTALTNAME2 flag set
H3-2022-0023 Active Directory Certificate Services: Vulnerable Certificate Authority Access Control
H3-2022-0024 Active Directory Certificate Services Misconfiguration: NTLM Relay to AD CS HTTP Endpoint
H3-2022-0033 Unauthenticated Access to Jenkins People Directory
H3-2022-0041 Symfony Profiler Enabled
H3-2022-0067 Weak or Default Credentials - MongoDB
H3-2022-0069 Web Directory Listing
H3-2022-0070 Anonymous MongoDB Access
H3-2022-0074 AWS Assume Role Access
H3-2022-0075 Public-Facing Application Exposed with HTTP Basic Authentication
H3-2022-0076 Unauthenticated AWS Cognito Role
H3-2022-0078 Unauthenticated Gitlab User Enumeration
H3-2022-0079 Credential Dumping - AWS Instance Metadata Service v2
H3-2022-0080 WordPress Unauthenticated User Enumeration
H3-2022-0082 Exposed Kubernetes Version
H3-2022-0084 Credential Reuse - Windows Local Administrator Accounts
H3-2022-0085 Credential Reuse - Shared Windows Local User and Domain User Accounts
H3-2022-0086 Domain User with Local Administrator Privileges
H3-2022-0087 Password Reuse
H3-2022-0088 Public Access to Amazon EC2 AMI
H3-2022-0089 Public Access to Amazon EBS Snapshot
H3-2022-0090 Public Access to Amazon RDS Snapshot
H3-2022-0093 Weak or Default Credentials - Cracked Credentials from Active Directory Services Database (NTDS)
H3-2022-0095 Password Reuse Found in Active Directory Services Database (NTDS)
H3-2023-0001 Apache Superset Authentication Bypass Misconfiguration
H3-2023-0002 Flask Authentication Bypass Misconfiguration
H3-2023-0003 Pre-Windows 2000 Computer Set
H3-2023-0008 AWS Multi-Factor Authentication Disabled
H3-2023-0009 Kerberos Unconstrained Delegation
H3-2023-0010 Kerberos Constrained Delegation
H3-2023-0019 Credential Dumping - Data Protection API (DPAPI) Secrets
H3-2023-0020 PaperCut File Upload Remote Code Execution Vulnerability
H3-2023-0021 Phished Credential
H3-2023-0022 PaperCut Arbitrary File Read and Deletion Vulnerability
H3-2023-0023 Apache Solr Arbitrary File Read Vulnerability
H3-2023-0027 NextGen Mirth Connect Remote Code Execution Vulnerability
H3-2023-0029 Password in Active Directory User Attribute
H3-2023-0030 Active Directory - User Password Not Required
H3-2024-0001 AWS Privilege Escalation - iam:AttachUserPolicy
H3-2024-0002 AWS Privilege Escalation - iam:PutUserPolicy
H3-2024-0003 AWS Privilege Escalation - iam:AttachRolePolicy
H3-2024-0004 AWS Privilege Escalation - iam:PutRolePolicy
H3-2024-0005 AWS Privilege Escalation - iam:CreateAccessKey
H3-2024-0006 AWS Privilege Escalation - iam:CreateLoginProfile
H3-2024-0007 AWS Privilege Escalation - iam:UpdateLoginProfile
H3-2024-0008 AWS Privilege Escalation - iam:UpdateAssumeRolePolicy
H3-2024-0009 AWS Privilege Escalation - iam:CreatePolicyVersion
H3-2024-0010 Microsoft Entra (AzureAD) Connect Credential Dumping
H3-2024-0011 Microsoft Entra (AzureAD) - Over-Privileged Service Principal
H3-2024-0012 Microsoft Entra (AzureAD) - Service Principal Takeover
H3-2024-0016 AWS Privilege Escalation - iam:AttachGroupPolicy
H3-2024-0017 AWS Privilege Escalation - iam:PutGroupPolicy
H3-2024-0018 Redis Unauthenticated Access Vulnerability
H3-2024-0019 Credential Dumping - Office365 Application Memory
H3-2024-0029 Active Directory User has Entra Administrator Role
H3-2024-0030 Traccar Device Image Upload Remote Code Execution Vulnerability
H3-2024-0032 Traccar Self-Signup Enabled
H3-2024-0034 NTLM Authentication Endpoint Exposed to the Internet
H3-2024-0035 AWS Access Key Id Third Party Canary
H3-2024-0036 Improper use of AWS Administrator Access
H3-2024-0037 Azure Cloud Kerberos Trust Abuse
H3-2024-0038 Microsoft Entra (AzureAD) - Entra Group Takeover
H3-2024-0039 Microsoft Graph App Role Privilege Elevation