How to remediate – Apple Profile Manager Detection 1. Introduction Apple Profile Manager Detection identifies instances where Apple Profile Manager is present on a system. This matters because...
How to remediate – Windows Enumerate Accounts 1. Introduction Windows Enumerate Accounts allows an attacker to list user accounts on a Windows system. This can help them...
How to remediate – WinComLPD LPD Monitoring Server Default Credentials 1. Introduction The WinComLPD LPD Monitoring Server Default Credentials vulnerability means the remote service uses easily guessed usernames and passwords...
How to remediate – vsftpd Detection 1. Introduction vsftpd Detection identifies an FTP server listening on a remote port. This indicates the presence of vsftpd, a...
How to remediate – VMware vCenter REST API Data Collection 1. Introduction The VMware vCenter REST API Data Collection vulnerability allows unrestricted data collection from a VMware vCenter instance via...
How to remediate – VMware SOAP API Settings 1. Introduction The VMware SOAP API Settings vulnerability concerns the configuration of credentials used for checks performed via the VMware...
How to remediate – VMware Fusion Version Detection (Mac OS X) 1. Introduction VMware Fusion Version Detection identifies instances of VMware Fusion installed on Mac OS X systems. This software allows...
How to remediate – VMware Carbon Black Cloud Endpoint Standard Inactive 1. Introduction VMware Carbon Black Cloud Endpoint Standard Inactive means a security solution is installed on your systems but isn’t...
How to remediate – Unpassworded ‘root’ Account 1. Introduction The vulnerability ‘Unpassworded root Account’ means a system administrator account, named ‘root’, has no password set. This allows...
How to remediate – Unpassworded ‘lp’ Account 1. Introduction The ‘lp’ account vulnerability means an account on a remote host has no password set. This allows attackers...