How to remediate – H2 Database Engine Console Application Detection 1. Introduction The H2 Database Engine Console application is a web interface for managing databases. Detecting it on a remote...
How to remediate – GraphQL Field Suggestions Detected 1. Introduction GraphQL Field Suggestions Detected is a vulnerability in GraphQL servers that allows attackers to discover schema information by...
How to remediate – GraphQL Interface Detected 1. Introduction GraphQL is an open-source query language for APIs, and a runtime environment for fulfilling those queries. The scanner...
How to remediate – GraphQL Introspection Enabled 1. Introduction GraphQL Introspection Enabled allows attackers to query detailed information about a GraphQL API’s schema and capabilities. This can...
How to remediate – Graylog2 Default Credentials 1. Introduction Graylog2 Default Credentials is a vulnerability where Graylog2 installations use known default usernames and passwords. This allows attackers...
How to remediate – Graylog2 Web Interface Detection 1. Introduction The Graylog2 Web Interface Detection vulnerability refers to the discovery of a web interface for Graylog2, a log...
How to remediate – Greenstone Detection 1. Introduction Greenstone Detection identifies instances of the Greenstone digital library software running on remote web servers. This software provides...
How to remediate – GroundWork Monitor Enterprise Default Credentials 1. Introduction GroundWork Monitor Enterprise uses a known set of default credentials, allowing remote attackers to gain unauthorized access. This...
How to remediate – GroundWork Monitor Enterprise Detection 1. Introduction GroundWork Monitor Enterprise is a network and cloud monitoring application used by businesses to track system performance and...
How to remediate – GroundWork Monitor Enterprise Foundation Webapp Admin Arbitrar… 1. Introduction The GroundWork Monitor Enterprise Foundation Webapp Admin interface has an arbitrary file access vulnerability. This allows a remote...