How to remediate – Backdoor Detection 1. Introduction 2. Technical Explanation The vulnerability occurs when an attacker successfully places a web shell or backdoor script within...
How to remediate – Backported Security Patch Detection (WWW) 1. Introduction The vulnerability “Backported Security Patch Detection (WWW)” refers to security patches applied to web servers without an update...
How to remediate – Backup Directory 1. Introduction The Backup Directory vulnerability occurs when web applications leave backup copies of directories accessible on the server. This...
How to remediate – Backup File 1. Introduction A Backup File vulnerability occurs when unnecessary backup files are present on a web server. These backups can...
How to remediate – Backup Files Disclosure 1. Introduction The Backup Files Disclosure vulnerability allows retrieval of file backups from a remote web server. This can lead...
How to remediate – AXIS Web Interface Detection 1. Introduction The AXIS Web Interface Detection vulnerability indicates that the web interface for an AXIS device was detected on...
How to remediate – Azure Blob Storage Detected 1. Introduction Azure Blob Storage is a public cloud storage service offered by Microsoft Azure, allowing users to store and...
How to remediate – Azure CycleCloud Web UI Detection 1. Introduction Azure CycleCloud Web UI Detection identifies instances where the Azure CycleCloud web user interface is accessible on a...
How to remediate – Bandmin 1.4 index.cgi Multiple Parameter XSS 1. Introduction The Bandmin 1.4 index.cgi Multiple Parameter XSS vulnerability allows an attacker to inject malicious scripts into web pages...
How to remediate – Barracuda Web Filter <= 5.0.0.012 Remote Command Execution 1. Introduction The Barracuda Web Filter Remote Command Execution vulnerability (CVE unspecified) allows a remote attacker to execute arbitrary commands...