Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Firewalls >> Raptor FW version 6.5 detection


Vulnerability Assessment Details

Raptor FW version 6.5 detection

Vulnerability Assessment Summary
Checks if the remote host is protected by Raptor FW 6.5

Detailed Explanation for this Vulnerability Assessment

By sending an invalid HTTP request to an
webserver behind Raptor firewall, the http
proxy itself will respond.

The server banner of Raptor FW version 6.5
is always 'Simple, Secure Web Server 1.1'

You should avoid giving a possible hacker such
information.

Solution: patch httpd / httpd.exe by hand

Network Security Threat Level: Low

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2000 Holm Diening

Cables, Connectors

Lot 10 FTDI USB TO RJ45 1.8m (6Ft) Console Cable for Cisco Juniper Windows 7,8
$89.5
Lot 10 FTDI USB TO RJ45 1.8m (6Ft) Console Cable for Cisco Juniper Windows 7,8 pictureJuniper EX4200 Series 24PoE EX4200-24-Port Switch-No Power Supply
$49.99
Juniper EX4200 Series 24PoE EX4200-24-Port Switch-No Power Supply pictureJuniper Networks EX3200-48PoE Ethernet Switch With No Power Supply
$99.99
Juniper Networks EX3200-48PoE Ethernet Switch With No Power Supply pictureNetpatibles 1m Juniper Networks Compatible 40GBase-CU QSFP+ to QSFP+ Passive DAC
$100.01
Netpatibles 1m Juniper Networks Compatible 40GBase-CU QSFP+ to QSFP+ Passive DAC picture


Discussions

No Discussions have been posted on this vulnerability.