How to remediate – Billquick Websuite Detection 1. Introduction The service for Billquick Websuite is installed on the remote host. This indicates that the Billquick Websuite software,...
How to remediate – Bitdefender GravityZone User Interface Detection 1. Introduction Bitdefender GravityZone User Interface Detection refers to the exposure of the web server used to manage Bitdefender GravityZone,...
How to remediate – Bitweaver wiki/rankings.php style Parameter Traversal Local Fi… 1. Introduction The Bitweaver wiki/rankings.php style Parameter Traversal Local File Inclusion vulnerability allows a remote attacker to view arbitrary files...
How to remediate – BlackBerry Enterprise Service (BES) Management Console Detection 1. Introduction BlackBerry Enterprise Service (BES) Management Console is a web-based interface used to manage BlackBerry messaging services. Its presence...
How to remediate – Blackboard Learn Detection 1. Introduction Blackboard Learn Detection identifies instances of the Blackboard Learn learning management system running on web servers. This is...
How to remediate – Blackboard Learning System <= 8.0 SP6 Unspecified XSS 1. Introduction The Blackboard Learning System, version 8.0 SP6 and earlier, contains a cross-site scripting (XSS) vulnerability. This allows an...
How to remediate – Blind NoSQL Injection (differential analysis) 1. Introduction Blind NoSQL Injection occurs when a client-supplied value is used in a NoSQL query without proper sanitisation, allowing...
How to remediate – Blind SQL Injection (differential analysis) 1. Introduction Blind SQL Injection (differential analysis) is a web security vulnerability that allows attackers to infer information about a...
How to remediate – Blind SQL Injection (timing attack) 1. Introduction Blind SQL Injection (timing attack) is a web security vulnerability that allows an attacker to infer information about...
How to remediate – Blind XPath Injection (differential analysis) 1. Introduction Blind XPath Injection (differential analysis) is a web application vulnerability where attackers can inject malicious XPath queries into...