How to remediate – SLP Server Detection (TCP) 1. Introduction The SLP Server Detection (TCP) vulnerability means a server on your network is responding to Service Location Protocol...
How to remediate – SLP Server Detection (UDP) 1. Introduction The SLP Server Detection (UDP) vulnerability means a server on your network is responding to Service Location Protocol...
How to remediate – SMPP Server Detection 1. Introduction The SMPP Server Detection vulnerability indicates a messaging service is listening for connections on your network. This protocol,...
How to remediate – SMTP Authentication Methods 1. Introduction The SMTP Authentication Methods vulnerability means a mail server allows users to log in. While necessary for normal...
How to remediate – SMTP Generic Overflow Detection 1. Introduction The SMTP Generic Overflow Detection vulnerability affects Simple Mail Transfer Protocol servers. It occurs when an SMTP server...
How to remediate – SMTP Host Information in NTLM SSP 1. Introduction 2. Technical Explanation Nessus extracts host information from the NTLM SSP challenge response exchanged during an NTLM handshake...
How to remediate – SMTP Server Connection Check 1. Introduction The SMTP Server Connection Check vulnerability means Nessus successfully connected to a remote Simple Mail Transfer Protocol (SMTP)...
How to remediate – SMTP Server Non-standard Port Detection 1. Introduction The SMTP Server Non-standard Port Detection vulnerability means your Simple Mail Transfer Protocol service is listening on a...
How to remediate – SMTP Service Cleartext Login Permitted 1. Introduction The SMTP Service Cleartext Login Permitted vulnerability means a mail server allows usernames and passwords to be sent...
How to remediate – SMTP Service STARTTLS Command Support 1. Introduction The SMTP Service STARTTLS Command Support vulnerability means a mail service allows traffic encryption using the ‘STARTTLS’ command....