How to remediate – HTML Object 1. Introduction The vulnerability is an HTML Object tag detected in web pages. This tag allows embedding multimedia content, but...
How to remediate – HTML/CSS Injection 1. Introduction HTML/CSS Injection is an attack where malicious code is inserted into a web page, altering its content. This...
How to remediate – HTTP CONNECT Proxy Detection 1. Introduction The HTTP CONNECT Proxy Detection vulnerability indicates a web proxy is listening on a remote host, supporting the...
How to remediate – HTTP Cookie ‘secure’ Property Transport Mismatch 1. Introduction The HTTP Cookie ‘secure’ Property Transport Mismatch vulnerability occurs when a web server sends cookies with incorrect ‘secure’...
How to remediate – HTTP Header Information Disclosure 1. Introduction HTTP Header Information Disclosure occurs when a web server reveals unnecessary details about its configuration in HTTP response...
How to remediate – HTTP TRACE / TRACK Methods Allowed 1. Introduction The HTTP TRACE / TRACK Methods Allowed vulnerability means debugging functions are active on a web server. This...
How to remediate – HTTP TRACE Allowed 1. Introduction HTTP TRACE Allowed refers to a vulnerability where the HTTP TRACE method remains enabled on a web server....
How to remediate – HTTP Verb Tampering 1. Introduction HTTP Verb Tampering is an attack where attackers bypass authentication checks by using HTTP verbs other than those...
How to remediate – HTTPS Not Detected 1. Introduction HTTPS Not Detected is a vulnerability where websites do not use HTTPS, leaving data transmitted between users and...
How to remediate – Humans.txt File Detected 1. Introduction A Humans.txt file has been detected on your system. Humans.txt is a text file websites can use to...