How to remediate – Ekiga SIP Detection 1. Introduction Ekiga is running on the remote host. Ekiga is a voice-over-IP (VoIP) application, meaning it allows users to...
How to remediate – echoServer Detection 1. Introduction echoServer Detection identifies a tunneling service listening on your network. This software allows applications to connect via outbound...
How to remediate – EGP Detection 1. Introduction The EGP Detection vulnerability indicates that a remote IP stack is responding to the Extensible Gateway Protocol (EGP),...
How to remediate – EMC Legato Networker Detection 1. Introduction EMC Legato Networker Detection indicates that backup software is running on a port. This software, used for data...
How to remediate – Emerson Network Power Avocent MergePoint Unity KVM Switch Dete… 1. Introduction The Emerson Network Power Avocent MergePoint Unity KVM switch is vulnerable to information disclosure. This allows an attacker...
How to remediate – emNet TCP/IP Stack – FTP Detection 1. Introduction The emNet TCP/IP stack was detected on the remote host. This stack is a lightweight networking solution often...
How to remediate – emNet TCP/IP Stack – HTTP Detection 1. Introduction The emNet TCP/IP stack was detected on the remote host. This is a networking component often found in...
How to remediate – Enterasys Dragon Enterprise Reporting Detection 1. Introduction Enterasys Dragon Enterprise Reporting Detection indicates that the reporting console for Dragon, a network intrusion detection system by...
How to remediate – Enumerate IPv4 Interfaces via SSH 1. Introduction Nessus was able to enumerate the IPv4 interfaces on the remote host. This means an attacker with SSH...
How to remediate – Enumerate IPv6 Interfaces via SSH 1. Introduction The vulnerability “Enumerate IPv6 Interfaces via SSH” allows an attacker with valid credentials to identify IPv6 interfaces configured...