How to remediate – Advantech WebAccess/SCADA Network Service Detection 1. Introduction Advantech WebAccess/SCADA Network Service Detection identifies instances of Advantech WebAccess running on a remote host. This SCADA application...
How to remediate – AFP Server Share Enumeration (guest) 1. Introduction The “AFP Server Share Enumeration (guest)” vulnerability allows a guest user to access network shares on a remote...
How to remediate – Airport Administrative Traffic Detection (192/UDP) 1. Introduction Airport Administrative Traffic Detection (192/UDP) is a vulnerability affecting Apple Airport wireless access points. It allows attackers on...
How to remediate – ALCASAR Detection 1. Introduction ALCASAR Detection indicates that an open source network access controller is running on a remote host. ALCASAR manages...
How to remediate – Allied Telesyn Router/Switch Default Password 1. Introduction Allied Telesyn Router/Switch Default Password vulnerability allows remote access to network devices using default credentials. This means an...
How to remediate – amap (NASL wrapper) 1. Introduction This plugin performs application protocol detection for amap (NASL wrapper). It identifies applications running on open ports of...
How to remediate – AMQP Cleartext Authentication 1. Introduction The AMQP Cleartext Authentication vulnerability means that communication with a messaging service uses unencrypted credentials. This allows attackers...
How to remediate – AnalogX Proxy SOCKS4a DNS Hostname Handling Remote Overflow 1. Introduction The AnalogX Proxy SOCKS4a DNS Hostname Handling Remote Overflow vulnerability is a buffer overflow in the remote SOCKS...
How to remediate – Anon Proxy Server Software Detection 1. Introduction Anon Proxy Server is a proxy server software that can act as an HTTP, HTTPS, or Socks proxy,...
How to remediate – Anonymous FTP Enabled 1. Introduction Anonymous FTP allows anyone to connect to a server without needing a username and password. This is a...