How to remediate – CVS Repository Detected 1. Introduction The vulnerability ‘CVS Repository Detected’ refers to publicly accessible CVS repositories on a web server, allowing read access...
How to remediate – CVS/SVN User Disclosure 1. Introduction CVS/SVN User Disclosure refers to the accidental exposure of Concurrent Version System (CVS) and Subversion (SVN) user information...
How to remediate – DCP-Portal Multiple Script XSS 1. Introduction 2. Technical Explanation The vulnerability stems from insufficient input validation in the ‘calendar.php’ script of DCP-Portal. An attacker...
How to remediate – DCP-Portal Multiple Scripts SQL Injection 1. Introduction 2. Technical Explanation Root cause: Lack of input validation in multiple scripts within DCP-Portal. Exploit mechanism: An attacker...
How to remediate – Debian DSA-138-1 : gallery – remote exploit 1. Introduction The remote Debian host is missing a security-related update for gallery, a web-based photo album toolkit. A flaw...
How to remediate – Dell EMC Data Protection Central Web Interface Detected 1. Introduction Dell EMC Data Protection Central Web Interface Detected identifies the presence of a web interface used for managing...
How to remediate – Dell KACE K2000 Web Detection 1. Introduction The Dell KACE K2000 Web Detection vulnerability refers to the presence of a web interface for a network...
How to remediate – Dell OpenManage Server Administrator 8.2 ViewFile Directory Tr… 1. Introduction Dell OpenManage Server Administrator 8.2 contains a directory traversal vulnerability in its ViewFile script. This allows an authenticated...
How to remediate – Dell OpenManage Server Administrator index_main.htm DOM-based XSS 1. Introduction Dell OpenManage Server Administrator has a cross-site scripting vulnerability in the index_main.htm web application. This allows an attacker...
How to remediate – Dell OpenManage Server Administrator Path Traversal (DSA-2020-… 1. Introduction Dell OpenManage Server Administrator (OMSA) is affected by a path traversal vulnerability, allowing unauthenticated remote attackers to gain...