How to remediate – WordPress XML-RPC Interface Detected 1. Introduction WordPress XML-RPC Interface Detected refers to the presence of a publicly accessible interface used for remote management of...
How to remediate – WordPress WPEngine Configuration Detected 1. Introduction WordPress WPEngine Configuration Detected refers to potentially sensitive information exposed within a WordPress installation using WPengine managed hosting....
How to remediate – WordPress User Registration Form Detected 1. Introduction The WordPress User Registration Form Detected vulnerability means a publicly accessible form allowing new user accounts has been...
How to remediate – WordPress User Enumeration 1. Introduction WordPress User Enumeration is a vulnerability where an attacker can discover valid usernames on a WordPress website without...
How to remediate – WordPress ToolsPack Plugin Backdoor 1. Introduction The WordPress ToolsPack Plugin Backdoor is a malicious plugin that allows attackers to execute code on web servers...
How to remediate – XML External Entity 1. Introduction An XML External Entity attack targets applications that process XML input. It happens when a parser handles XML...
How to remediate – Xedus Detection 1. Introduction Xedus Detection indicates a web server is running on a remote host. This means an application capable of...
How to remediate – X-Cart Files Information Disclosure 1. Introduction X-Cart Files Information Disclosure refers to sensitive files within an X-Cart installation being accessible to attackers. This can...
How to remediate – X-Cart Concierge Module Information Disclosure 1. Introduction X-Cart Concierge Module Information Disclosure refers to a vulnerability where sensitive information about an X-Cart installation is exposed...
How to remediate – X2Engine Detection 1. Introduction X2Engine Detection indicates an open source sales customer relationship management application is running on a remote host. This...