How to remediate – Web Application Cookies Are Expired 1. Introduction HTTP cookies have an ‘Expires’ attribute set with a past date or time in this vulnerability, meaning they...
How to remediate – Web Accessible Backups 1. Introduction The Web Accessible Backups vulnerability means a web server is making archive files available publicly that may contain...
How to remediate – Weak Session Management Detected 1. Introduction Weak Session Management Detected refers to flaws in how a web application handles user sessions, which are temporary...
How to remediate – WaveMaker Studio Requires No Authentication 1. Introduction WaveMaker Studio requires no authentication, meaning anyone can access and change web applications hosted on it. This is...
How to remediate – WaveMaker Studio Detection 1. Introduction WaveMaker Studio Detection indicates a web development application is hosted on your server. WaveMaker Studio is used for...
How to remediate – WatchGuard FireboxV and XTM Fireware OS Web Detection 1. Introduction The web UI for a WatchGuard FireboxV or XTM running Fireware OS has been detected on a remote...
How to remediate – WAS Target Scanning for PCI 1. Introduction The WAS Target Scanning for PCI vulnerability reports http and https addresses of a scanned system. This means...
How to remediate – WANem result.php pc Parameter Remote Command Execution 1. Introduction The WANem result.php pc Parameter Remote Command Execution vulnerability affects web servers running a vulnerable version of WANem....
How to remediate – Web Application Tests Settings 1. Introduction Web Application Tests Settings relate to the configuration of HTTP audit options used for web application security testing....
How to remediate – WANem index-advanced.php XSS 1. Introduction The WANem index-advanced.php XSS vulnerability is a cross-site scripting flaw in the WANem web application. This allows an...