How to remediate – Hunt CCTV DVR.cfg Direct Request Information Disclosure 1. Introduction The Hunt CCTV DVR.cfg Direct Request Information Disclosure vulnerability allows an attacker to retrieve a device’s configuration file,...
How to remediate – Hydra: HTTP 1. Introduction Hydra: HTTP is a vulnerability where attackers can attempt to determine HTTP passwords through brute force attacks. This...
How to remediate – IBM Aspera Faspex Web Detection 1. Introduction IBM Aspera Faspex is a centralized file transfer web application detected on your systems. It allows users to...
How to remediate – IBM BigFix Web Reports Detection 1. Introduction IBM BigFix Web Reports Detection identifies an infrastructure management application running on a remote web server. This application...
How to remediate – IBM Cognos Analytics Web Interface Detection 1. Introduction The web interface for IBM Cognos Analytics was detected on the remote host. This vulnerability indicates the presence...
How to remediate – HyperText Transfer Protocol (HTTP) Redirect Information 1. Introduction The HyperText Transfer Protocol (HTTP) Redirect Information vulnerability refers to a web server redirecting requests to its root...
How to remediate – IBM Data Risk Manager Web Detection 1. Introduction The web interface for IBM Data Risk Manager Web Detection has been detected on a remote host. This...
How to remediate – IBM DataPower Gateway Detection 1. Introduction IBM DataPower Gateway Detection identifies instances of IBM DataPower Gateway running on a network. This gateway manages security,...
How to remediate – IBM DB2 Content Manager eClient Detection 1. Introduction IBM DB2 Content Manager eClient Detection identifies instances of IBM DB2 Content Manager eClient, a web-based content management...
How to remediate – IBM Domino Web Administrator Multiple Vulnerabilities 1. Introduction IBM Domino Web Administrator is affected by multiple vulnerabilities, allowing authenticated users to perform actions they should not...