How to remediate – Weak DH Key Exchange Supported (PCI DSS) 1. Introduction The Weak DH Key Exchange Supported vulnerability means a service on your network allows connections using an older,...
How to remediate – Vuze Detection 1. Introduction Vuze Detection indicates that a file-sharing service is running on a remote port. This poses a risk as...
How to remediate – Vuze Media Server Detection 1. Introduction Vuze Media Server Detection identifies instances of Vuze Media Server running on a remote port. This server is...
How to remediate – Wake-on-LAN 1. Introduction Wake-on-LAN is a feature that allows a computer to be switched on remotely using network messages. This can...
How to remediate – Websense TRITON Detection 1. Introduction Websense TRITON Detection indicates that a network and data security application is running on your web server. This...
How to remediate – Well-known SSL Certificate Used in Remote Device 1. Introduction The vulnerability, Well-known SSL Certificate Used in Remote Device, means a remote service is using an SSL certificate...
How to remediate – WINS Server Detection 1. Introduction A WINS server is running on the remote network, potentially exposing NetBIOS host information. This service holds a...
How to remediate – Wireless Access Point Detection 1. Introduction The Wireless Access Point Detection vulnerability means Nessus has identified a wireless access point on your network. This...
How to remediate – writesrv Service Detection 1. Introduction writesrv is a service running on your systems that sends messages to users. It reveals information about connected...
How to remediate – WU-FTPD SITE NEWER Command Memory Exhaustion DoS 1. Introduction The WU-FTPD SITE NEWER Command Memory Exhaustion Denial of Service vulnerability affects FTP servers running the WU-FTPD software....