How to remediate – Server-Side Template Injection 1. Introduction Server-Side Template Injection (SSTI) is a vulnerability where an application embeds user-controlled inputs into server templates without proper...
How to remediate – ServiceNow Widgets Data Exposure 1. Introduction ServiceNow Widgets Data Exposure is a vulnerability affecting custom JavaScript components within ServiceNow portal pages. It occurs when...
How to remediate – Selligent Message Studio Struts Code Execution (CVE-2017-5638) 1. Introduction Selligent Message Studio is affected by a code execution vulnerability, CVE-2017-5638. This allows a remote attacker to run...
How to remediate – Sensitive File Disclosure 1. Introduction Sensitive File Disclosure occurs when a web application makes files available that should be kept private. This can...
How to remediate – Session Cookies Detected 1. Introduction Session Cookies Detected refers to the presence of session cookies returned by an application during a security scan....
How to remediate – Session Fixation 1. Introduction 2. Technical Explanation Session Fixation occurs because the web server doesn’t create a new, random session ID after...
How to remediate – SGDynamo sgdynamo.exe HTNAME XSS 1. Introduction SGDynamo sgdynamo.exe HTNAME XSS is a cross-site scripting vulnerability affecting the CGI application ‘sgdynamo.exe’. This allows an attacker...
How to remediate – ShareFile Storage Zones Controller Web Detection 1. Introduction The ShareFile Storage Zones Controller Web Detection vulnerability means the web interface for Citrix ShareFile is visible on...
How to remediate – Signup Form Detected 1. Introduction A signup form has been detected on a system under assessment. This indicates a potential point for user...
How to remediate – Silex USB Device Server Web Configuration Page Empty Password 1. Introduction The Silex USB Device Server Web Configuration Page Empty Password vulnerability means the web interface used to manage...