How to remediate – Drupal User Registration Form Detected 1. Introduction This plugin detects a publicly accessible Drupal User Registration Form. This presents an attacker with a potential entry...
How to remediate – Drupal Version End of Life Advanced Notification 1. Introduction The installation of Drupal running on the remote host will be no longer supported in November 2023. This...
How to remediate – Duplicate HTTP Headers Detected 1. Introduction Duplicate HTTP Headers Detected is a vulnerability where web servers send multiple headers with the same name in...
How to remediate – Duplicator Plugin for WordPress Installation File Detected 1. Introduction The Duplicator Plugin for WordPress Installation File Detected vulnerability refers to the presence of files associated with the...
How to remediate – e107 submitnews.php XSS 1. Introduction The e107 submitnews.php script is vulnerable to a cross-site scripting (XSS) attack. This means an attacker could inject...
How to remediate – Easy File Sharing Web Server Multiple Remote Vulnerabilities (… 1. Introduction Easy File Sharing Web Server Multiple Remote Vulnerabilities allows a remote attacker to potentially compromise a Windows system...
How to remediate – Eaton Network Shutdown Module view_list.php paneStatusListSort… 1. Introduction The Eaton Network Shutdown Module view_list.php paneStatusListSort… vulnerability allows remote attackers to execute arbitrary PHP code on affected...
How to remediate – Drupal Administration Panel Login Form Bruteforced 1. Introduction The Drupal Administration Panel Login Form Bruteforced vulnerability allows attackers to gain unauthorized access to a Drupal website...
How to remediate – Drupal Plugins Detected 1. Introduction This is an informational notice that the scanner was able to detect one or more installed Drupal plugins....
How to remediate – EMail Security Virtual Appliance learn-msg.cgi Remote Code Exe… 1. Introduction The EMail Security Virtual Appliance learn-msg.cgi script contains a remote code execution vulnerability. This allows an attacker on...