Overview During security scans, one of the security vulnerabilities that can be found is deprecated SSH cryptographic settings. The SSH protocol (Secure Shell) is a method for securing remote login fr...
Overview One of the security vulnerabilities that security scans can detect is a remote management service accepting unencrypted credentials, such as FTP. That happens when services that use basic aut...
Overview Security scans might identify the NTP monlist feature denial of service vulnerability. The Network Time Protocol (NTP) is used to synchronize the time of a computer client or server to anothe...
Overview One possible security vulnerability reported in security scans is Sudo Heap-based Buffer Overflow Vulnerability (Baron Samedit) (Generic). sudo is a program for Unix-like computer operating s...
Overview A security scan might report the OpenSSH command injection vulnerability (Generic). Solution No solution is available from Linux vendors yet. This issue is marked as Will not fix by Red Hat...
Overview A security scan might report the following issue: EOL/Obsolete Operating System: Red Hat Enterprise Linux 6.x Detected. Solution Support for Red Hat Enterprise Linux 6 ended on November 30,...
Overview A security scan might report Service Stopped Responding. Information The Service Stopped Responding issue might happen with a port that CCI uses to query the AMS Database. It could be busy ...
Overview Security scans might report Red Hat Libxml2 Arbitrary Code Execution Vulnerability. Information The libxml2 library is a development toolbox providing the implementation of various XML stan...
Overview You would like to know how to output operator GTs and sender IDs when a message is rejected in the CDRs. Information CDRs are created only for messages discarded due to Routing Rule or Exte...
Overview You would like to know whether tp_stop and tp_start resets the m3ua connections. You were upgrading the MSC and saw that the m3ua connections were down. You tried to restart the connections o...