How to remediate – Serv-U Version Detection 1. Introduction Serv-U Version Detection identifies instances of Serv-U File Server running on a network. This is important because knowing...
How to remediate – Siemens S7 Protocol Support Detection 1. Introduction The Siemens S7 Protocol Support Detection vulnerability means a device is responding to communications using the Siemens S7...
How to remediate – Siemens SCALANCE S612 Firewall Detection 1. Introduction The Siemens SCALANCE S612 Firewall Detection identifies devices running a Siemens SCALANCE S612 Firewall. These firewalls are security...
How to remediate – SightLogix Camera SLP Detection 1. Introduction SightLogix Camera SLP Detection indicates a camera is identifying itself on the network using the Simple Location Protocol...
How to remediate – SIP Username Enumeration 1. Introduction SIP Username Enumeration is a vulnerability where an attacker can discover valid usernames on a Session Initiation Protocol...
How to remediate – Skinny Server Detection 1. Introduction The Skinny Server Detection vulnerability means a remote server is running the Skinny protocol, also known as SCCP....
How to remediate – Skype Detection 1. Introduction Skype Detection identifies instances where the Skype Voice-Over-IP service is running on a network. This matters because Skype’s...
How to remediate – Skype Stack Version Detection 1. Introduction Skype Stack Version Detection refers to a situation where information about the version and timestamp of a remote...
How to remediate – slident / fake identd Detection 1. Introduction The vulnerability “slident / fake identd Detection” concerns a remote ident server returning random tokens instead of real...
How to remediate – SLP Find Attributes 1. Introduction The SLP Find Attributes vulnerability concerns systems running the Service Location Protocol. SLP allows network applications to find...