Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Firewalls >> Raptor FW version 6.5 detection


Vulnerability Assessment Details

Raptor FW version 6.5 detection

Vulnerability Assessment Summary
Checks if the remote host is protected by Raptor FW 6.5

Detailed Explanation for this Vulnerability Assessment

By sending an invalid HTTP request to an
webserver behind Raptor firewall, the http
proxy itself will respond.

The server banner of Raptor FW version 6.5
is always 'Simple, Secure Web Server 1.1'

You should avoid giving a possible hacker such
information.

Solution: patch httpd / httpd.exe by hand

Network Security Threat Level: Low

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2000 Holm Diening

Cables, Connectors

vintage software CD - Knoppix Nov 8 2002 release version 3.1
$3.59
vintage software CD - Knoppix Nov 8 2002 release version 3.1 pictureLinux Knoppix LIVE bootable 32GB USB 3.1/3.0/2.0 disk w/ PERSISTENCE
$20.0
Linux Knoppix LIVE bootable 32GB USB 3.1/3.0/2.0 disk w/ PERSISTENCE pictureKnoppix Linux Bootable OS v8.6 "Original Live Operating System" 32G USB Stick
$19.75
Knoppix Linux Bootable OS v8.6 Knoppix Linux 64-Bit 32 GB 3.0 USB Bootable Operating System Live Flash Drive
$16.95
Knoppix Linux 64-Bit 32 GB 3.0 USB Bootable Operating System Live Flash Drive picture


Discussions

No Discussions have been posted on this vulnerability.