How to remediate – National Instruments Lookout Detection 1. Introduction National Instruments Lookout Detection indicates the presence of the National Instruments Lookout application on a remote host. Lookout...
How to remediate – NConf delete_attr.php id Parameter SQL Injection 1. Introduction The NConf delete_attr.php id Parameter SQL Injection vulnerability affects a PHP script on web servers. It occurs when...
How to remediate – Nagios XI / Fusion Detection 1. Introduction Nagios XI and Nagios Fusion are monitoring services detected on a remote host. These applications help businesses track...
How to remediate – Nagios XI 5.7.5 Command Injection 1. Introduction Nagios XI 5.7.5 suffers from a command injection vulnerability in several web application components. This allows an attacker...
How to remediate – NagiosQL Detection 1. Introduction NagiosQL Detection indicates a configuration manager is running on a remote host. NagiosQL is a web application used...
How to remediate – NAI WebShield SMTP GET_CONFIG Information Disclosure 1. Introduction NAI WebShield SMTP is vulnerable to information disclosure via its remote management service. This means an attacker could...
How to remediate – Net Optics Director Default Credentials 1. Introduction The Net Optics Director Default Credentials vulnerability affects web applications protected by default administrative login details. This means...
How to remediate – Net Optics Director Web Detection 1. Introduction Net Optics Director Web Detection indicates a web management interface is accessible on a network packet broker and...
How to remediate – NetApp OnTAP Web Detection 1. Introduction The NetApp OnTAP Web Detection vulnerability means the web interface for NetApp OnTAP storage systems has been found...
How to remediate – NetApp SANtricity Web Services Proxy Detection 1. Introduction The NetApp SANtricity Web Services Proxy Detection identifies instances of the NetApp SANtricity Web Services Proxy application running...