How to remediate – Allowed HTTP Versions 1. Introduction The vulnerability “Allowed HTTP Versions” refers to web servers supporting older versions of the HTTP protocol, specifically HTTP/1.0...
How to remediate – Alt-N MDaemon Remote Administration Detection 1. Introduction Alt-N MDaemon Remote Administration Detection refers to the presence of the web-based administration interface for Alt-N MDaemon email...
How to remediate – alya.cgi CGI Backdoor Detection 1. Introduction alya.cgi CGI Backdoor Detection identifies a compromised web server containing a malicious CGI script. This indicates an attacker...
How to remediate – Amazon Cognito Detected 1. Introduction Amazon Cognito is a cloud user management service provided by Amazon Web Services (AWS). It allows developers to...
How to remediate – Amazon Cognito Insecure Permissions 1. Introduction Amazon Cognito Insecure Permissions relate to misconfigured access controls within Amazon’s cloud authentication service. This allows unauthenticated users...
How to remediate – Amazon Cognito User Enumeration 1. Introduction Amazon Cognito User Enumeration is a vulnerability affecting Amazon Cognito, a cloud service for user authentication and management....
How to remediate – Amazon S3 Bucket Detected 1. Introduction Amazon S3 buckets are used for storing data in the cloud. If not configured correctly, they can be...
How to remediate – Ansible AWX WebUI Detection 1. Introduction Ansible AWX is an IT automation application running on remote hosts. It allows teams to automate complex tasks...
How to remediate – Ansible Tower WebUI Detection 1. Introduction Ansible Tower is an IT automation application running on a remote host. It allows users to orchestrate and...
How to remediate – AOST Network Video Recorder Detection 1. Introduction The AOST Network Video Recorder Detection vulnerability refers to the presence of a web interface for an AOST...