Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Firewalls >> Raptor FW version 6.5 detection


Vulnerability Assessment Details

Raptor FW version 6.5 detection

Vulnerability Assessment Summary
Checks if the remote host is protected by Raptor FW 6.5

Detailed Explanation for this Vulnerability Assessment

By sending an invalid HTTP request to an
webserver behind Raptor firewall, the http
proxy itself will respond.

The server banner of Raptor FW version 6.5
is always 'Simple, Secure Web Server 1.1'

You should avoid giving a possible hacker such
information.

Solution: patch httpd / httpd.exe by hand

Network Security Threat Level: Low

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2000 Holm Diening

Cables, Connectors

Gigamon SFP-501 SFP-T RJ45 SFP copper
$50.0
Gigamon SFP-501 SFP-T RJ45 SFP copper  pictureJH325A I New Factory Sealed HPE 5130 24G PoE+ 4SFP+ 1-Slot HI Switch
$3350.0
JH325A I New Factory Sealed HPE 5130 24G PoE+ 4SFP+ 1-Slot HI Switch pictureGigamon SFP-532 FTLX8571D3BCL-GM 10G 850nm, MM, SR 5-pack
$100.0
Gigamon SFP-532 FTLX8571D3BCL-GM 10G 850nm, MM, SR 5-pack pictureCisco CVR-X2-SFP10G V03 TenGig Converter Module (We buy and sell Cisco)
$139.99
Cisco CVR-X2-SFP10G V03 TenGig Converter Module (We buy and sell Cisco) picture


Discussions

No Discussions have been posted on this vulnerability.