How to remediate – eclime index.php ref Parameter SQL Injection 1. Introduction The eclime index.php ref Parameter SQL Injection vulnerability allows a remote attacker to manipulate database queries on systems...
How to remediate – eFront Detection 1. Introduction A learning management system is running on the remote host, specifically eFront. This means a web application for...
How to remediate – Ektron CMS400.NET id Parameter XSS 1. Introduction The Ektron CMS400.NET id Parameter XSS vulnerability allows an attacker to inject malicious script into web pages viewed...
How to remediate – Elasticsearch Detection 1. Introduction The Elasticsearch Detection vulnerability identifies systems running a distributed search engine service. This is important as these services...
How to remediate – Elgg Detection 1. Introduction The remote web server is running Elgg Detection, a social networking engine written in PHP. This means an...
How to remediate – ELMAH (Error Logging Modules and Handlers) Remotely Accessible 1. Introduction ELMAH (Error Logging Modules and Handlers) is an error logging application used with ASP.NET web applications. A remotely...
How to remediate – ELMAH Information Disclosure 1. Introduction ELMAH (Error Logging Modules and Handlers) is an application error logging facility. A misconfigured ELMAH installation can allow...
How to remediate – eLouai’s Force Download Script file Parameter File Disclosure 1. Introduction eLouai’s Force Download Script file Parameter File Disclosure is a vulnerability affecting web servers hosting a vulnerable version...
How to remediate – Embedded HP Web Server Detected 1. Introduction An HP embedded web server is running on the remote host. This means a web server provided by...
How to remediate – EMC Cloud Tiering Appliance User Interface Default Credentials 1. Introduction The EMC Cloud Tiering Appliance User Interface Default Credentials vulnerability allows attackers to gain administrative access to affected...