How to remediate – 7-Technologies AQUIS Detection 1. Introduction A SCADA application, specifically 7-Technologies AQUIS Detection, is installed on remote Windows hosts. AQUIS is a hydraulic modeling...
How to remediate – .NET NegotiateStream Server Detection 1. Introduction The .NET NegotiateStream Server Detection vulnerability indicates a tunneling service is listening on your system, supporting Microsoft’s .NET...
How to remediate – 3270 Mapper Service Detection 1. Introduction The 3270 Mapper Service Detection identifies a deprecated RPC service running on your systems. This service is no...
How to remediate – 3Com 3CServer/3CDaemon FTP Server Multiple Vulnerabilities (OF… 1. Introduction The 3Com 3CServer/3CDaemon FTP Server Multiple Vulnerabilities (OF… affect remote FTP servers running vulnerable versions of this software....
How to remediate – 3com RAS 1500 / Wyse Winterm Malformed Packet Remote DoS 1. Introduction The 3com RAS 1500 / Wyse Winterm Malformed Packet Remote Denial of Service vulnerability allows a remote attacker...
How to remediate – 3com RAS 1500 Configuration Disclosure 1. Introduction The 3com RAS 1500 Configuration Disclosure vulnerability allows an attacker to access sensitive configuration information from a remote...
How to remediate – 3Com Superstack 3 Switch Multiple Default Accounts 1. Introduction The 3Com Superstack 3 Switch Multiple Default Accounts vulnerability involves switches shipped with default passwords set. This allows...
How to remediate – 3Com Switch Default Admin Credentials 1. Introduction The 3Com Switch Default Admin Credentials vulnerability allows unauthorized access to a 3Com switch due to the use...
How to remediate – 3CX DesktopApp Malware 1. Introduction The 3CX DesktopApp contains malware, potentially allowing an attacker to compromise systems running the application. This affects businesses...
How to remediate – 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0 Mu… 1. Introduction The DHCP server installed on Linux hosts is affected by a buffer overflow vulnerability and a potential Denial...