How to remediate – XSLT Injection 1. Introduction An XSLT Injection is when an attacker injects XSLT documents into an application. This attack can lead to...
How to remediate – XPath Injection Authentication Bypass 1. Introduction XPath Injection Authentication Bypass occurs when web applications use untrusted data to build XML Path Language (XPath) queries....
How to remediate – XPath Injection 1. Introduction XPath Injection is a web security vulnerability that allows attackers to interfere with XML Path Language queries used...
How to remediate – XOOPS xoopsConfig[language] Parameter Local File Inclusion (XO… 1. Introduction The XOOPS xoopsConfig[language] Parameter Local File Inclusion vulnerability affects PHP applications using the XOOPS content management system. This...
How to remediate – XOOPS xoopsConfig Parameter Variable Overwrite Local File Incl… 1. Introduction The XOOPS xoopsConfig Parameter Variable Overwrite Local File Inclusion vulnerability affects PHP applications using the XOOPS content management...
How to remediate – XOOPS viewtopic.php Multiple Parameter XSS 1. Introduction The XOOPS viewtopic.php Multiple Parameter XSS vulnerability allows attackers to inject malicious code into web pages viewed by...
How to remediate – XOOPS Glossary Module glossaire-aff.php lettre Parameter XSS 1. Introduction The XOOPS Glossary Module glossaire-aff.php lettre Parameter XSS vulnerability is a cross-site scripting flaw in the XOOPS content...
How to remediate – Xitami testssi.ssi HTTP Header XSS 1. Introduction The Xitami testssi.ssi HTTP Header XSS vulnerability is a cross-site scripting flaw found in a testing script included...
How to remediate – ZEN Load Balancer global.conf Information Disclosure 1. Introduction ZEN Load Balancer global.conf Information Disclosure is a vulnerability where sensitive configuration data can be accessed without permission....