Skip to content

Weaknesses

NodeZero's identifies and surfaces many weaknesses that it finds during a pentest. These weaknesses are identified by a Common Vulnerabilities and Exposures (CVE) identifier (e.g. CVE-2021-44228), or a Horizon3.ai weakness identifier (e.g. H3-2022-0001).

This page provides a reference for Horizon3.ai Weaknesses identified by NodeZero. For information on CVEs identified by NodeZero, please reference the official CVE website maintained by MITRE.

Weakness ID                  Name
H3-2020-0002 Anonymous Access to ZooKeeper API
H3-2020-0003 Anonymous Access to Printer using PJL or PS
H3-2020-0004 Zone Transfer Allowed to Any Server
H3-2020-0005 Anonymous FTP Enabled
H3-2020-0007 SMB Null Session Allowed
H3-2020-0008 Guest Account Enabled
H3-2020-0009 Weak NFS Export Permissions
H3-2020-0010 NFS UID/GID Manipulation Possible
H3-2020-0016 Insecure IPMI Implementation
H3-2020-0017 IPMI Cipher Zero Vulnerability
H3-2020-0021 Unauthenticated Access to the Jenkins Script Console
H3-2020-0022 Insecure Java JMX Configuration
H3-2020-0023 Apache Hadoop YARN ResourceManager Unauthenticated Command Execution
H3-2020-0030 Android Debug Bridge (ADB) over TCP Enabled
H3-2021-0001 Public Access to Amazon S3 Bucket
H3-2021-0002 Subdomain Takeover
H3-2021-0003 Unauthenticated Access to Sensitive Kubelet API Endpoints
H3-2021-0004 Kubernetes Privileged Container Exposure
H3-2021-0005 Unauthenticated Kubelet API Remote Code Execution Vulnerability
H3-2021-0006 Unauthenticated Kubernetes API Server Access
H3-2021-0007 Kubernetes Service Account Token Exposure
H3-2021-0008 Unauthenticated Etcd Access
H3-2021-0009 Unauthenticated Docker Registry API Access
H3-2021-0010 Unauthenticated Docker Engine API Access
H3-2021-0011 Kerberos Pre-Authentication Disabled
H3-2021-0012 Weak or Default Credentials - FTP
H3-2021-0013 Weak or Default Credentials - Telnet
H3-2021-0014 Weak or Default Credentials - SSH
H3-2021-0015 Weak or Default Credentials - SNMP
H3-2021-0016 Weak or Default Credentials - Microsoft SQL Server
H3-2021-0017 Weak or Default Credentials - MySQL
H3-2021-0018 Weak or Default Credentials - Postgres
H3-2021-0019 Weak or Default Credentials - Password Spray
H3-2021-0020 Weak or Default Credentials - Cracked Credentials
H3-2021-0021 Weak or Default Credentials - Web Applications
H3-2021-0024 Dangling DNS Record
H3-2021-0029 AWS Unrestricted Assume Role Access
H3-2021-0030 SMB Signing Not Required
H3-2021-0031 Public Access to Git Repository
H3-2021-0032 Credential Reuse
H3-2021-0033 mDNS Poisoning Possible
H3-2021-0034 LLMNR Poisoning Possible
H3-2021-0035 NBT-NS Poisoning Possible
H3-2021-0036 Unauthenticated Access to Elasticsearch
H3-2021-0037 Werkzeug Debug Console Enabled
H3-2021-0038 Kerberoasting
H3-2021-0039 Unrestricted Sudo Privileges
H3-2021-0040 AWS Instance Metadata Service v1 Exposed
H3-2021-0041 Apache Druid Server-Side Request Forgery Vulnerability
H3-2021-0042 Credential Dumping - Security Account Manager (SAM) Database
H3-2021-0043 Credential Dumping - Local Security Authority (LSA) Secrets
H3-2021-0044 Credential Dumping - Local Security Authority Subsystem Service (LSASS) Memory
H3-2021-0045 Credential Dumping - /etc/shadow File
H3-2021-0046 Credential Dumping - Active Directory Services Database (NTDS)
H3-2021-0047 JBoss Application Server HTTP Invoker Remote Code Execution Vulnerability
H3-2022-0001 Web Application Cross Site Scripting Vulnerability
H3-2022-0002 Azure Multi-Factor Authentication Disabled
H3-2022-0003 Remote Desktop Protocol (RDP) Port Exposed to the Internet
H3-2022-0004 Server Message Block (SMB) Port Exposed to the Internet
H3-2022-0005 Secure Socket Shell (SSH) Port Exposed to the Internet
H3-2022-0006 Database Port Exposed to the Internet
H3-2022-0007 Telnet Port Exposed to the Internet
H3-2022-0008 File Transfer Protocol (FTP) Port Exposed to the Internet
H3-2022-0009 Simple Network Management Protocol (SNMP) Port Exposed to the Internet
H3-2022-0010 Risky Port Exposed to the Internet
H3-2022-0012 Unauthenticated Access to Jira Dashboards
H3-2022-0015 Web Application Path Traversal Vulnerability
H3-2022-0016 Active Directory Certificate Services Misconfiguration Privilege Escalation - Subject Alternative Name
H3-2022-0017 Active Directory Certificate Services Misconfiguration Privilege Escalation - Any Purpose or No (aka SubCA) EKU Misconfiguration
H3-2022-0018 Active Directory Certificate Services Misconfigured Enrollment Agent Template
H3-2022-0019 Active Directory Certificate Services Misconfigured Template Requires Enrollment Agent Signature
H3-2022-0020 Active Directory Certificate Services Misconfigured Template Access Controls
H3-2022-0021 Active Directory Certificate Services Domain Escalation via Vulnerable PKI AD Object Access Controls
H3-2022-0022 Active Directory Certificate Services - EDITF_ATTRIBUTESUBJECTALTNAME2 flag set
H3-2022-0023 Active Directory Certificate Services: Vulnerable Certificate Authority Access Control
H3-2022-0024 Active Directory Certificate Services Misconfiguration: NTLM Relay to AD CS HTTP Endpoint
H3-2022-0025 Unauthenticated Access to Kibana
H3-2022-0026 Unauthenticated Access to Kubeflow
H3-2022-0027 Unauthenticated Access to Jupyter
H3-2022-0028 Unauthenticated Access to Apache Solr
H3-2022-0029 Unauthenticated Access to ThoughtWorks GoCD
H3-2022-0030 Unauthenticated Access to Paessler PRTG Network Monitor
H3-2022-0031 Unauthenticated Access to Mongo Express
H3-2022-0032 Unauthenticated Access to Prometheus Alertmanager
H3-2022-0033 Unauthenticated Access to Jenkins People Directory
H3-2022-0034 Anonymous Access to Zoho ManageEngine ADManager Plus Employee Search
H3-2022-0035 Unauthenticated Access to JavaMelody Monitoring Console
H3-2022-0036 Guest Access to Zabbix Dashboards
H3-2022-0037 Laravel Debug Mode Enabled
H3-2022-0038 Ruby on Rails Debug Mode Enabled
H3-2022-0039 Golang pprof Debugging Endpoint Enabled
H3-2022-0040 Symfony Debug Mode Enabled
H3-2022-0041 Symfony Profiler Enabled
H3-2022-0042 Django Debug Mode Enabled
H3-2022-0043 Backup File Exposure
H3-2022-0044 Shell History File Exposure
H3-2022-0045 PHPinfo Page Exposed
H3-2022-0046 Rails Database Configuration File Exposure
H3-2022-0047 Apache Tomcat Example Scripts Exposed
H3-2022-0048 Apache Web Server Configuration File Exposure
H3-2022-0049 IIS web.config File Exposure
H3-2022-0050 PHP-FPM Configuration File Exposure
H3-2022-0051 Symfony Configuration File Exposure
H3-2022-0052 Ansible Configuration File Exposure
H3-2022-0054 CGI Test Script Exposed
H3-2022-0055 phpMyAdmin Setup Page Exposed
H3-2022-0056 Anonymous Deployment Privileges in JFrog Artifactory
H3-2022-0057 jQuery File Upload Widget Exposed
H3-2022-0058 Jolokia Local File Inclusion Misconfiguration
H3-2022-0059 Spring Boot Configuration Properties Actuator Exposed
H3-2022-0060 Spring Boot Env Actuator Exposed
H3-2022-0061 Apache Web Server htpasswd File Exposure
H3-2022-0062 Microsoft FrontPage service.pwd File Exposure
H3-2022-0063 Private Keys Exposed on Web Server
H3-2022-0064 Rails Secret Token Exposure
H3-2022-0065 Unauthenticated Access to Apache Airflow
H3-2022-0066 Git Repo Exposed on a Web Server
H3-2022-0067 Weak or Default Credentials - MongoDB
H3-2022-0068 Airflow Configuration Exposure
H3-2022-0069 Web Directory Listing
H3-2022-0070 Anonymous MongoDB Access
H3-2022-0071 Jenkins Self-Signup Enabled
H3-2022-0072 Apache Airflow Debug Mode Enabled
H3-2022-0073 Microsoft Windows Machine Account NTLM Coercion via Authenticated LSARPC Spoofing
H3-2022-0074 AWS Assume Role Access
H3-2022-0075 Public-Facing Application Exposed with HTTP Basic Authentication
H3-2022-0076 Unauthenticated AWS Cognito Role Has Non-Standard Permissions
H3-2022-0078 Unauthenticated Gitlab User Enumeration
H3-2022-0079 Credential Dumping - AWS Instance Metadata Service v2
H3-2022-0080 WordPress Unauthenticated User Enumeration
H3-2022-0081 Atlassian Jira Unauthenticated User Enumeration via the User Picker Browser
H3-2022-0082 Exposed Kubernetes Version
H3-2022-0083 Anonymous Access to the Kubernetes Dashboard
H3-2022-0084 Credential Reuse - Windows Local Administrator Accounts
H3-2022-0085 Credential Reuse - Shared Windows Local User and Domain User Accounts
H3-2022-0086 Domain User with Local Administrator Privileges
H3-2022-0087 Password Reuse
H3-2022-0088 Public Access to Amazon EC2 AMI
H3-2022-0089 Public Access to Amazon EBS Snapshot
H3-2022-0090 Public Access to Amazon RDS Snapshot
H3-2022-0093 Weak or Default Credentials - Cracked Credentials from Active Directory Services Database (NTDS)
H3-2022-0095 Password Reuse Found in Active Directory Services Database (NTDS)
H3-2023-0002 Flask Authentication Bypass Misconfiguration
H3-2023-0003 Pre-Windows 2000 Computer Set
H3-2023-0008 AWS Multi-Factor Authentication Disabled
H3-2023-0009 Kerberos Unconstrained Delegation
H3-2023-0010 Kerberos Constrained Delegation
H3-2023-0011 Microsoft Windows Machine Account NTLM Coercion via EventLog Remoting Protocol Manipulation
H3-2023-0012 Microsoft Windows Machine Account NTLM Coercion via Print Spooler Protocol Manipulation
H3-2023-0013 Authenticated Microsoft Windows Machine Account NTLM Coercion via File Server Remote VSS Protocol Manipulation
H3-2023-0014 Authenticated Microsoft Windows Machine Account NTLM Coercion via Distributed File System Namespace Management Protocol Manipulation
H3-2023-0015 Authenticated Microsoft Windows Machine Account NTLM Coercion via EventLog Remoting Protocol Manipulation
H3-2023-0016 Authenticated Microsoft Windows Machine Account NTLM Coercion via Print Spooler Protocol Manipulation
H3-2023-0017 Microsoft Windows Machine Account NTLM Coercion via File Server Remote VSS Protocol Manipulation
H3-2023-0018 Microsoft Windows Machine Account NTLM Coercion via Distributed File System Namespace Management Protocol Manipulation
H3-2023-0019 Credential Dumping - Data Protection API (DPAPI) Secrets
H3-2023-0020 PaperCut File Upload Remote Code Execution Vulnerability
H3-2023-0021 Phished Credential
H3-2023-0022 PaperCut Arbitrary File Read and Deletion Vulnerability