How to remediate – Securimage example_form.php XSS 1. Introduction The Securimage example_form.php script contains a cross-site scripting vulnerability. This means an attacker could inject malicious code into...
How to remediate – Security.txt File Detected 1. Introduction A Security.txt file has been detected on the target system. This file allows independent security researchers to define...
How to remediate – Security.txt File Not Detected 1. Introduction A Security.txt file has not been detected on your server. This file allows security researchers who find vulnerabilities...
How to remediate – SecurityCenter devform.php message Parameter XSS 1. Introduction SecurityCenter contains a cross-site scripting vulnerability in the ‘devform.php’ script’s message parameter. This means an attacker could inject...
How to remediate – Selenium Authentication Succeeded 1. Introduction Selenium Authentication Succeeded is an informational notice indicating that a security scanner successfully logged into the web application...
How to remediate – Selenium Crawl Failed 1. Introduction Selenium Crawl Failed occurs when a web application scan cannot proceed using the provided Selenium scripts. This means...
How to remediate – Selenium Crawl Succeeded 1. Introduction Selenium Crawl Succeeded indicates that a security scanner successfully executed crawling scripts as defined in your security policy....
How to remediate – Selligent Message Studio Detection 1. Introduction Selligent Message Studio Detection identifies instances of Selligent Message Studio, an email marketing campaign management platform, running on...
How to remediate – Selligent Message Studio Struts Code Execution (CVE-2013-2251) 1. Introduction Selligent Message Studio is affected by a code execution vulnerability, CVE-2013-2251. This allows a remote attacker to run...
How to remediate – Server-Side Inclusion Injection 1. Introduction Server-Side Inclusion Injection is a web security vulnerability that allows an attacker to inject malicious code into a...