How to remediate – Anonymous Key Exchanges Supported (PCI DSS) 1. Introduction Anonymous Key Exchanges Supported refers to a vulnerability where a service allows unauthenticated SSL/TLS key exchanges. This means...
How to remediate – Anonymous NNTP Authentication Enabled 1. Introduction The vulnerability “Anonymous NNTP Authentication Enabled” allows anyone to connect to your NNTP server without a password. This...
How to remediate – Anonymous SMTP Authentication Enabled 1. Introduction Anonymous SMTP Authentication Enabled allows anyone to send emails through your mail server without a username and password....
How to remediate – Apple AirPort Base Station Authentication Credential Encryptio… 1. Introduction The Apple AirPort Base Station Authentication Credential Encryption vulnerability (CVE-2003-0270) is a design flaw in the administrative protocol...
How to remediate – Apple Filing Protocol Server Detection 1. Introduction Apple Filing Protocol Server Detection indicates an Apple file sharing service is listening on a network port. This...
How to remediate – AppSocket Half-open Connection Remote DoS 1. Introduction The AppSocket Half-open Connection Remote DoS vulnerability affects systems running services that use the AppSocket protocol. This flaw...
How to remediate – ArubaOS Detection 1. Introduction The remote network device is running ArubaOS, which allows attackers to gather information about its model and operating...
How to remediate – ASG-Sentry SNMP Agent Detection 1. Introduction The ASG-Sentry SNMP Agent Detection vulnerability indicates an SNMP agent is listening on a remote host that is...
How to remediate – Asset Attribute: Fully Qualified Domain Name (FQDN) 1. Introduction This report details the vulnerability “Asset Attribute: Fully Qualified Domain Name (FQDN)”. This involves reporting the FQDN for...
How to remediate – Astaro Security Gateway Detection 1. Introduction Astaro Security Gateway is a suite of network, mail and web security tools running on the remote host....