How to remediate – Xerver Double Slash Authentication Bypass 1. Introduction The Xerver Double Slash Authentication Bypass vulnerability allows unauthenticated access to protected web directories on affected servers. This...
How to remediate – Zebra ZTC Printer Web Interface Detection 1. Introduction The Zebra ZTC Printer Web Interface Detection indicates that a web interface for a Zebra printer is accessible...
How to remediate – Zebra ZTC Printer Web Interface Default Admin Password 1. Introduction The Zebra ZTC Printer Web Interface Default Admin Password vulnerability means a printer’s web management page has a...
How to remediate – Yuzo Related Posts Plugin for WordPress Cross-Site Scripting 1. Introduction The Yuzo Related Posts Plugin for WordPress Cross-Site Scripting (XSS) vulnerability allows an attacker to inject malicious scripts...
How to remediate – YaPiG <= 0.9.5b Multiple Vulnerabilities 1. Introduction YaPiG versions up to and including 0.9.5b are vulnerable to multiple security issues, specifically code injection and cross-site...
How to remediate – Zimbra Collaboration Server aspell.php dictionary Parameter XSS 1. Introduction The Zimbra Collaboration Server aspell.php dictionary Parameter XSS vulnerability is a cross-site scripting flaw in the spell check...
How to remediate – Zenphoto Detection 1. Introduction Zenphoto Detection identifies instances of the Zenphoto photo gallery system running on web servers. Zenphoto is a PHP-based...
How to remediate – Atlassian Bamboo Detection 1. Introduction The remote web server is running a continuous integration server, specifically Atlassian Bamboo. This means an attacker could...
How to remediate – Atlassian Bitbucket Detection 1. Introduction Bitbucket is a version control repository tool running on your network. This means source code and project history...
How to remediate – Atlassian Bitbucket Pipelines Configuration Detected 1. Introduction Atlassian Bitbucket Pipelines Configuration Detected refers to the presence of a `bitbucket-pipelines.yml` file exposed via the web server....