How to remediate – WMI Not Available 1. Introduction The vulnerability “WMI Not Available” means that Windows Management Instrumentation queries cannot connect to the remote host using...
How to remediate – Xerox WorkCentre Multi-Page Document Scan/Fax Information Disc… 1. Introduction The Xerox WorkCentre Multi-Page Document Scan/Fax Information Disclosure vulnerability affects remote printers. This issue allows a printer to...
How to remediate – X Font Service Detection 1. Introduction The X Font Service Detection vulnerability indicates an X font service is running on a remote host. This...
How to remediate – WorldMail IMAP Server Traversal Arbitrary Mail Spool Access 1. Introduction The WorldMail IMAP Server Traversal Arbitrary Mail Spool Access vulnerability affects Eudora WorldMail, a mail server for Windows....
How to remediate – Workspace ONE Data Collection 1. Introduction The Workspace ONE Data Collection plugin gathers all data from a Workspace ONE environment. This can create a...
How to remediate – X11 Server Unauthenticated Access 1. Introduction The X11 Server Unauthenticated Access vulnerability means that a remote X11 server is accepting connections without checking who’s...
How to remediate – X Server Unauthenticated Access: Screenshot 1. Introduction The X Server Unauthenticated Access: Screenshot vulnerability means a remote attacker can connect to an X server and...
How to remediate – XM Easy FTP Server USER Command Buffer Overflow 1. Introduction XM Easy FTP Server USER Command Buffer Overflow is a flaw in the XM Easy FTP Server software...
How to remediate – XEROX ColorQube Device Detection 1. Introduction The remote host is a printer, specifically a XEROX ColorQube Device. This means an attacker could potentially gain...
How to remediate – Xen Guest Detection 1. Introduction The Xen Guest Detection vulnerability indicates that a remote host is running as a virtual machine managed by...