How to remediate – Polycom SIP Detection 1. Introduction The Polycom SIP Detection vulnerability identifies systems running a VoIP device manufactured by Polycom. This matters because these...
How to remediate – POP2 Cleartext Logins Permitted 1. Introduction The POP2 Cleartext Logins Permitted vulnerability means that usernames and passwords sent to a Post Office Protocol version...
How to remediate – PowerDNS Version Detection 1. Introduction The PowerDNS Version Detection vulnerability allows an attacker to determine the version number running on a remote DNS...
How to remediate – PPTP Detection 1. Introduction PPTP Detection indicates a Point-to-Point Tunneling Protocol server is running on a remote host. PPTP is an older...
How to remediate – Printer Job Language (PJL) Detection 1. Introduction The Printer Job Language (PJL) Detection vulnerability means a system responds to requests using the PJL protocol. This...
How to remediate – Privoxy Detection 1. Introduction Privoxy Detection identifies instances where a web proxy, specifically Privoxy, is running on a remote host. Privoxy acts...
How to remediate – Progress MOVEit Transfer FTP Detection 1. Introduction The Progress MOVEit Transfer FTP Detection indicates that the FTP server component of Progress MOVEit Transfer is present...
How to remediate – PRTG Network Monitor Detection 1. Introduction PRTG Network Monitor Detection indicates a network traffic monitoring application is running on a remote web server. This...
How to remediate – Py2Play Game Engine Detection 1. Introduction Py2Play Game Engine Detection indicates a game server is running on the remote host. This could introduce security...
How to remediate – QMTP Open Relay 1. Introduction A QMTP Open Relay vulnerability means a server running the QMTP/QMQP protocol is allowing email messages to be...