How to remediate – Pivotal Web Server Version Detection 1. Introduction The Pivotal Web Server Version Detection vulnerability means the version number of your web server can be easily...
How to remediate – Piwigo Detection 1. Introduction Piwigo Detection identifies instances of the Piwigo photo gallery application running on a web server. Piwigo is an...
How to remediate – Plex Media Server Detection 1. Introduction Plex Media Server Detection identifies instances of Plex Media Server running on a web server. This matters because...
How to remediate – Pligg Detection 1. Introduction Pligg Detection identifies instances of the Pligg content management system running on a web server. Pligg is a...
How to remediate – Plone Detection 1. Introduction Plone Detection identifies instances of the Plone content management system running on a web server. Plone is a...
How to remediate – pod.board 1.1 Multiple Script XSS 1. Introduction The vulnerability, pod.board 1.1 Multiple Script XSS, is a flaw in the Pod.Board CGI suite that allows an...
How to remediate – Postfix Admin Detection 1. Introduction Postfix Admin Detection identifies instances where a web interface for managing Postfix mail servers is running on a...
How to remediate – PostMessage Wildcard Event Listener Detected 1. Introduction PostMessage Wildcard Event Listener Detected refers to a configuration issue in web applications where JavaScript code listens for...
How to remediate – PostMessage Wildcard Target Origin Detected 1. Introduction The PostMessage Wildcard Target Origin Detected vulnerability concerns web applications using JavaScript for cross-origin communication. These applications may...
How to remediate – Post-Scan Rules Application 1. Introduction The Post-Scan Rules Application plugin analyzes scan results and adjusts vulnerabilities based on user defined settings. This is...