How to remediate – PBLang 4.65 Multiple Vulnerabilities 1. Introduction PBLang 4.65 is a PHP-based bulletin board system vulnerable to multiple security flaws. This affects websites using PBLang...
How to remediate – PBLang login.php lang Parameter Local File Inclusion 1. Introduction PBLang login.php contains a vulnerability allowing Local File Inclusion. This means an attacker could potentially view files on...
How to remediate – PCI DSS compliance 1. Introduction PCI DSS compliance failures mean your systems do not meet security standards for handling cardholder data. This puts...
How to remediate – PCI DSS Compliance – Information Leakage 1. Introduction PCI DSS Compliance – Information Leakage means your systems are showing details that shouldn’t be publicly available, even...
How to remediate – Permissive HTTP Strict Transport Security Policy Detected 1. Introduction HTTP Strict Transport Security (HSTS) is a web server directive that tells browsers to only connect via HTTPS....
How to remediate – PhotoPost < 5.1 Multiple Input Validation Vulnerabilities 1. Introduction PhotoPost versions prior to 5.1 contain multiple input validation vulnerabilities. These flaws allow attackers to manipulate SQL queries...
How to remediate – PhotoPost PHP Pro EXIF Data XSS 1. Introduction PhotoPost PHP Pro EXIF Data XSS is a cross-site scripting vulnerability in the PhotoPost PHP Pro application. This...
How to remediate – PHP Advanced Transfer Manager <= 1.30 Multiple Vulnerabilities 1. Introduction PHP Advanced Transfer Manager version 1.30 and earlier contains cross-site scripting and information disclosure vulnerabilities. This means an...
How to remediate – PHP Debug Bar Enabled 1. Introduction PHP Debug Bar Enabled refers to the presence of the PHP Debug Bar library active on a web...
How to remediate – PHP Error Log Format String Command Injection 1. Introduction The PHP Error Log Format String Command Injection vulnerability allows an attacker to potentially run arbitrary code on...