Discussions

Stay up-to-date with the latest news from NetSuite. You’ll be in the know about how to connect with peers and take your business to new heights at our virtual, in-person, on demand events, and much more.
Now is the time to ask your NetSuite-savvy friends and colleagues to join the NetSuite Support Community! Refer now! Click here to watch and learn more!
Update your Profile with your Support type to get your Support Type badge.
Expand your NetSuite knowledge by joining our Ask A Guru Live sessions. RSVP on this event now.
Uncover the power of data with the Analytics Hub —your ultimate guide to mastering NetSuite Saved Searches and Reports. Simplify the complex and unlock your organization's true potential. Dive into the Analytics Hub now and soar to new heights!
To help you get the most out of your 2025.2 Release Preview account, review the topics outlined in the 2025.2 Release Preview Guide.
SuiteWorld October 6 - 9, 2025: Agenda Builder is live!

Read on for the latest updates including:
• Agenda Builder launch
• SuiteWorld On Air registration
• New NetSuite Prompt Studio Contest
• And more!

Check out this thread to learn more!
Going to SuiteWorld? Connect with SuiteGurus—Your NetSuite Product Experts!

Don’t miss your chance to meet our SuiteGurus—NetSuite Support professionals and subject matter experts with extensive experience in select product areas, including OneWorld, Advanced & Basic Accounting, Supply Chain Management, Receivables & Payables, CRM, Account Administration, and the SuiteCloud Platform. Full Conference attendees can prebook exclusive 30-minute one-on-one sessions for your product questions.
Spots are limited! Register through your Agenda Builder and find SuiteGuru under Agenda Enhancements.

McAfee Vulnerability 5/2/10-Compaq Web Management Server Detection

edited May 4, 2010 5:08PM in Web Site / E-Commerce 6 comments

Description is:
The remote web server appears to be a Compaq WBEM server. This web server enables attackers to gather sensitive information on the remote host, especially if anonymous access has been enabled. Sensitive information includes: Platform name and version (including service packs), installed hotfixes, Running services, installed Drivers, boot.ini content, registry settings, NetBIOS name, system root directory, administrator full name, CPU type, CPU speed, ROM versions and revisions, memory size, sever recovery settings, and more.
Note: This may be a "false positive" for one of the following reasons:
# We were unable to conclusively test for this vulnerability remotely, but based on this device's fingerprint it is possible that it exists.

Howdy, Stranger!

Log In

To view full details, sign in.

Register

Don't have an account? Click here to get started!

Leaderboard

Community Whiz

Quarter 3 (Jul-Sep 2025)

This Week's Leaders

This Month's Leaders

All Time Leaders