How to remediate – XoloX Detection 1. Introduction XoloX Detection indicates that a host is running P2P software called XoloX. This presents a risk to businesses...
How to remediate – Wollf Backdoor Detection 1. Introduction The Wollf Backdoor Detection vulnerability indicates a host is running the Wollf program, which can act as a...
How to remediate – Windows Store Application Enumeration 1. Introduction The Windows Store Application Enumeration vulnerability allows an attacker to obtain a list of applications installed on a...
How to remediate – Unprotected ‘admin’ Account 1. Introduction The ‘admin’ account vulnerability refers to an administrative account on a remote host that has no password set....
How to remediate – Unpassworded ‘tutor’ Account 1. Introduction The ‘tutor’ account vulnerability involves an account on a remote host that has no password set. This means...
How to remediate – Unpassworded ‘toor’ Account 1. Introduction The ‘toor’ account vulnerability means a system has an account with no password set. This is a serious...
How to remediate – Unpassworded ‘sync’ Account 1. Introduction The ‘sync’ account vulnerability refers to an account on a remote host that has no password set. This...
How to remediate – UoW imapd AUTHENTICATE Command Remote Overflow 1. Introduction The UoW imapd AUTHENTICATE Command Remote Overflow vulnerability allows an attacker to execute code on a remote IMAP...
How to remediate – Unpassworded ‘mpi’ Account 1. Introduction The vulnerability ‘Unpassworded ‘mpi’ Account’ refers to a default account on a remote system that has no password...
How to remediate – UoW imap Server (uw-imapd) Arbitrary Remote File Access 1. Introduction The UoW imap Server (uw-imapd) Arbitrary Remote File Access vulnerability allows an authenticated user to retrieve and manipulate...