Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Settings >> Dont print on AppSocket & socketAPI printers


Vulnerability Assessment Details

Dont print on AppSocket & socketAPI printers

Vulnerability Assessment Summary
Exclude port 9100 on AppSocket & socketAPI printers from scan

Detailed Explanation for this Vulnerability Assessment

The host seems to be an AppSocket or socketAPI printer.
Scanning it will waste paper. So port 9100 wont be scanned.

Network Security Threat Level: None

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 by Laurent Facq


Warning: mysql_connect(): Too many connections in /home/vscan/public_html/store/select.php on line 4

Warning: mysql_select_db() expects parameter 2 to be resource, boolean given in /home/vscan/public_html/store/select.php on line 5

Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /home/vscan/public_html/store/select.php on line 13

NEW CISCO ORIGINAL SFP-25G-AOC1M Active Optical Cable 10-3236-01
$100.0
NEW CISCO ORIGINAL SFP-25G-AOC1M Active Optical Cable 10-3236-01 picture3Com 3CR17259-91 5500G-EI SFP SS4 24-Port Gigabit Managed L3 Switch
$125.0
3Com 3CR17259-91 5500G-EI SFP SS4 24-Port Gigabit Managed L3 Switch pictureAdTran Netvanta 1224ST 1200504E1 24 port fast Ethernet switch SFP port
$399.99
AdTran Netvanta 1224ST 1200504E1 24 port fast Ethernet switch SFP port pictureCisco DS-SFP-FC8G-SW Bulk Qty 10 Cisco P/N 10-2418-02
$50.0
Cisco DS-SFP-FC8G-SW  Bulk Qty 10  Cisco P/N 10-2418-02 picture


Discussions


Warning: mysql_connect(): Too many connections in /home/vscan/public_html/comments.php on line 3

Warning: mysql_select_db() expects parameter 2 to be resource, boolean given in /home/vscan/public_html/comments.php on line 4

Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /home/vscan/public_html/comments.php on line 16

No Discussions have been posted on this vulnerability.