How to remediate – Apple Filing Protocol Server Detection 1. Introduction Apple Filing Protocol Server Detection indicates an Apple file sharing service is listening on a network port. This...
How to remediate – amap (NASL wrapper) 1. Introduction This plugin performs application protocol detection for amap (NASL wrapper). It identifies applications running on open ports of...
How to remediate – AnalogX Proxy SOCKS4a DNS Hostname Handling Remote Overflow 1. Introduction The AnalogX Proxy SOCKS4a DNS Hostname Handling Remote Overflow vulnerability is a buffer overflow in the remote SOCKS...
How to remediate – Anon Proxy Server Software Detection 1. Introduction Anon Proxy Server is a proxy server software that can act as an HTTP, HTTPS, or Socks proxy,...
How to remediate – Anonymous FTP Enabled 1. Introduction Anonymous FTP allows anyone to connect to a server without needing a username and password. This is a...
How to remediate – Anonymous Key Exchanges Supported (PCI DSS) 1. Introduction Anonymous Key Exchanges Supported refers to a vulnerability where a service allows unauthenticated SSL/TLS key exchanges. This means...
How to remediate – Anonymous NNTP Authentication Enabled 1. Introduction The vulnerability “Anonymous NNTP Authentication Enabled” allows anyone to connect to your NNTP server without a password. This...
How to remediate – AMQP Cleartext Authentication 1. Introduction The AMQP Cleartext Authentication vulnerability means that communication with a messaging service uses unencrypted credentials. This allows attackers...
How to remediate – Anonymous SMTP Authentication Enabled 1. Introduction Anonymous SMTP Authentication Enabled allows anyone to send emails through your mail server without a username and password....
How to remediate – Allied Telesyn Router/Switch Default Password 1. Introduction Allied Telesyn Router/Switch Default Password vulnerability allows remote access to network devices using default credentials. This means an...