Description
Description
A Scan attack is performed by cyber-assailants in a process of initial information-gathering known as footprinting. Scan attacks are used mostly to identify and enumerate active hosts on a network, and to determine the host operating system and available UDP and TCP network services that are running on the targeted hosts.
A successful Scan attack can result in information disclosure.
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!