How to remediate – Apache Jetspeed Detection 1. Introduction Apache Jetspeed is an enterprise information portal application running on remote hosts. This software provides a web-based platform...
How to remediate – Amazon Web Services EC2 Instance Metadata Enumeration (Unix) 1. Introduction Amazon Web Services EC2 Instance Metadata Enumeration (Unix) allows retrieval of sensitive information about an AWS EC2 instance....
How to remediate – Amazon Web Services EC2 Instance Metadata Enumeration (Windows) 1. Introduction Amazon Web Services EC2 Instance Metadata Enumeration (Windows) refers to the ability to retrieve information about an AWS...
How to remediate – Amazon Web Services Settings 1. Introduction Amazon Web Services Settings refers to misconfigurations in your AWS environment that can allow unauthorized access for security...
How to remediate – Anonymous FTP Writable root Directory 1. Introduction The Anonymous FTP Writable root Directory vulnerability allows unauthorized write access to the root directory of an FTP...
How to remediate – Anonymous SFTP Enabled 1. Introduction The vulnerability “Anonymous SFTP Enabled” means that the SSH service on a server allows users to log in...
How to remediate – Amazon Corretto Java Detection (Linux / Unix) 1. Introduction Amazon Corretto Java is installed on remote Linux/Unix hosts. This indicates a Java runtime environment is present, which...
How to remediate – Amazon Corretto Java Detection (Windows) 1. Introduction Amazon Corretto Java is installed on remote Windows hosts. This indicates a presence of the Java runtime environment,...
How to remediate – Amazon Linux AMI : containerd (ALAS-2020-1455) 1. Introduction The Amazon Linux AMI : containerd vulnerability (ALAS-2020-1455) is a missing security update affecting containerized environments running on...
How to remediate – Amazon Web Services Detected 1. Introduction This notice reports detection of Amazon Web Services cloud service usage. This indicates your application is hosted on...