How to remediate – BNC Detection 1. Introduction BNC Detection indicates that an IRC bouncer is running on a port within your network. An IRC bouncer...
How to remediate – CA BrightStor HSM Engine Detection (TCP) 1. Introduction CA BrightStor HSM Engine Detection (TCP) identifies a data migration service listening on remote hosts. This service is...
How to remediate – CA BrightStor HSM Engine Detection (UDP) 1. Introduction CA BrightStor HSM Engine Detection (UDP) identifies a data migration service listening on remote hosts. This service is...
How to remediate – Call Of Duty Server Detection 1. Introduction A game server has been detected on the remote host, specifically a Call of Duty game server. This...
How to remediate – Canon PIXMA Printer WLAN Credential Disclosure 1. Introduction The Canon PIXMA Printer WLAN Credential Disclosure vulnerability allows remote attackers to obtain sensitive authentication information from affected...
How to remediate – CCProxy Application Proxy Detection 1. Introduction CCProxy Application Proxy Detection identifies instances where a host is running CCProxy in an open proxy configuration. This...
How to remediate – Centennial IP Transfer Agent Detection 1. Introduction Centennial IP Transfer Agent Detection refers to a network auditing service listening on a remote host. This is...
How to remediate – Chargen UDP Service Remote DoS 1. Introduction The ‘Chargen UDP Service Remote DoS’ vulnerability affects systems running a chargen service, which is an unused protocol...
How to remediate – Cheops NG Agent Detection 1. Introduction The Cheops NG Agent Detection vulnerability indicates that a network management tool, specifically the Cheops NG agent, is...
How to remediate – Cheops-ng Cleartext Authentication Information Disclosure 1. Introduction The Cheops-ng Cleartext Authentication Information Disclosure vulnerability allows unencrypted passwords to be transmitted when connecting to a Cheops-ng...