How to remediate – RTSP Server Type / Version Detection 1. Introduction An RTSP (Real Time Streaming Protocol) server is listening on a remote port. This means a service capable...
How to remediate – rsync Service Detection 1. Introduction The rsync Service Detection vulnerability means a remote file synchronisation service is accessible over the network. This allows...
How to remediate – rsync STARTTLS Command Support 1. Introduction The rsync STARTTLS Command Support vulnerability means that the remote rsync service allows encryption of data in transit...
How to remediate – SAP Netweaver Application Server (AS) HTTP Server Detection 1. Introduction The SAP Netweaver Application Server (AS) HTTP Server Detection vulnerability means the version number of a remote SAP...
How to remediate – SAP RMI-P4 Protocol Detection 1. Introduction The SAP RMI-P4 Protocol Detection vulnerability identifies systems that support the SAP Remote Management Interface protocol version 4....
How to remediate – SAProuter Detection 1. Introduction SAProuter Detection indicates a SAProuter server is running on the remote host. SAProuter proxies requests between SAP systems...
How to remediate – Scan for UPnP hosts (multicast) 1. Introduction This machine is a UPnP client, meaning it responds to requests made using the Universal Plug and Play...
How to remediate – Scrutinizer NetFlow & sFlow Analyzer Detection 1. Introduction Scrutinizer NetFlow & sFlow Analyzer Detection indicates a network traffic analysis tool is running on a web server....
How to remediate – Seagate Lyve SLP Detection 1. Introduction The Seagate Lyve SLP Detection vulnerability means a host is identifying itself as a storage device using the...
How to remediate – Sendmail RCPT TO Command Arbitrary File Overwrite 1. Introduction The Sendmail RCPT TO Command Arbitrary File Overwrite vulnerability allows an attacker to bypass SMTP authentication and potentially...