How to remediate – PCI DSS Compliance : Scan Interference 1. Introduction PCI DSS Compliance : Scan Interference means that a network security device is blocking attempts to validate PCI...
How to remediate – Perforce Server Detection 1. Introduction Perforce Server Detection indicates a revision control system service is running on a remote host. Perforce is a...
How to remediate – Pervasive PSQL / Btrieve Server Detection 1. Introduction Pervasive PSQL / Btrieve Server Detection identifies instances of Pervasive PSQL / Btrieve running on a remote host....
How to remediate – Ping the remote host 1. Introduction The vulnerability “Ping the remote host” refers to the ability to determine whether a system is online by...
How to remediate – Pirelli AGE mB Router Default Password (microbusiness) for ‘ad… 1. Introduction The Pirelli AGE mB Router Default Password vulnerability affects microbusiness routers where the default administrator password (‘admin/microbusiness’) remains...
How to remediate – POP3 Cleartext Logins Permitted 1. Introduction The POP3 Cleartext Logins Permitted vulnerability means usernames and passwords sent to a POP3 email server are not...
How to remediate – POP3 Host Information in NTLM SSP 1. Introduction The POP3 Host Information in NTLM SSP vulnerability means Nessus can gather details about a host system during...
How to remediate – Port scanners settings 1. Introduction Port scanners settings relate to the configuration options used by network scanning tools like Nessus. Incorrectly configured port...
How to remediate – Point-of-Sale (POS) OUI Detection 1. Introduction The Point-of-Sale (POS) OUI Detection vulnerability means a device can be identified as a POS system simply by...
How to remediate – PolarSSL Weak Signature Algorithm Negotiation 1. Introduction PolarSSL Weak Signature Algorithm Negotiation affects systems using PolarSSL version 1.3.8. This vulnerability allows attackers to force weaker...