How to remediate – PHP error_log File Detected 1. Introduction The PHP error_log File Detected vulnerability involves the unintentional exposure of a web server’s PHP error log file....
How to remediate – PHP Mail Function Header Spoofing 1. Introduction The PHP Mail Function Header Spoofing vulnerability allows a remote web application to forge email data. This means...
How to remediate – PHP mb_send_mail() Function Parameter Security Bypass 1. Introduction The PHP mb_send_mail() Function Parameter Security Bypass affects web servers running vulnerable versions of PHP. This flaw allows...
How to remediate – PHP Topsites counter.php count_log_file Parameter Arbitrary Fi… 1. Introduction The PHP Topsites counter.php count_log_file Parameter Arbitrary File Overwrite vulnerability affects web applications using the ‘counter.php’ CGI script....
How to remediate – Phpauction <= 2.5 Multiple Vulnerabilities 1. Introduction Phpauction versions up to and including 2.5 contain multiple vulnerabilities that could allow an attacker to take control...
How to remediate – phpBB Directories Information Disclosure 1. Introduction phpBB Directories Information Disclosure allows an attacker to view sensitive directories within a phpBB installation. This can reveal...
How to remediate – phpBB2 Plus <= 1.52 Multiple XSS 1. Introduction phpBB2 Plus versions up to 1.52 are vulnerable to multiple cross-site scripting attacks. This means an attacker could...
How to remediate – pfSense Web Interface Detection 1. Introduction The pfSense Web Interface Detection vulnerability means the administrative web interface for a pfSense firewall is accessible from...
How to remediate – Phinx Configuration File Detected 1. Introduction Phinx is an open-source PHP migration tool. A Phinx configuration file detected indicates that a file containing database...
How to remediate – php-Charts Detection 1. Introduction php-Charts Detection identifies a chart creation application hosted on your web server. php-Charts is a PHP tool used...