How to remediate – Commvault Web Console Detection 1. Introduction The Commvault Web Console Detection vulnerability identifies instances of the Commvault web console running on a remote host....
How to remediate – Control iD iDSecure Detection 1. Introduction Control iD iDSecure is an access management application running on remote hosts. It manages user access and authentication,...
How to remediate – Control iD iDSecure Hard-coded JWT Key Authentication Bypass (… 1. Introduction Control iD iDSecure is vulnerable to a hard-coded JWT key authentication bypass, allowing unauthenticated remote attackers to perform...
How to remediate – Cookie Authentication Succeeded 1. Introduction Cookie Authentication Succeeded is an informational notice indicating that the scanner successfully authenticated against a web application using...
How to remediate – CoSoSys Endpoint Protector Detection 1. Introduction CoSoSys Endpoint Protector Detection identifies the presence of a web-based data loss prevention application, CoSoSys Endpoint Protector, on...
How to remediate – Countertack Sentinel User Interface Detection 1. Introduction The Countertack Sentinel User Interface Detection vulnerability affects the web server component used for managing the Countertack Sentinel...
How to remediate – cPanel cpsrvd.pl user Parameter XSS 1. Introduction The cPanel cpsrvd.pl user parameter is vulnerable to a cross-site scripting (XSS) attack. This means an attacker could...
How to remediate – CPG Dragonfly Multiple XSS 1. Introduction The CPG Dragonfly Multiple XSS vulnerability affects PHP applications running on web servers. This allows an attacker to...
How to remediate – CraftCMS Administration Panel Login Form Detected 1. Introduction CraftCMS Administration Panel Login Form Detected indicates that a CraftCMS administration interface is accessible on your web application....
How to remediate – Cross-Site Request Forgery Token Validation Bypass 1. Introduction Cross-Site Request Forgery (CSRF) vulnerabilities allow an attacker to trick a user into performing unwanted actions on a...