How to remediate – Webmin 1.840 / 1.880 LFI 1. Introduction Webmin 1.840 / 1.880 is affected by a local file inclusion vulnerability. This allows an attacker to read...
How to remediate – Web Application Information Disclosure 1. Introduction Web Application Information Disclosure means a web application is revealing details about its internal file paths when it...
How to remediate – Weblogic Console Login Form Bruteforced 1. Introduction The Weblogic Console Login Form Bruteforced vulnerability occurs when an attacker successfully authenticates to a Weblogic console using...
How to remediate – Web Application Firewall Detection 1. Introduction The Web Application Firewall Detection vulnerability means that a web server is protected by a firewall designed to...
How to remediate – WebGlimpse Detection 1. Introduction WebGlimpse Detection identifies instances of the WebGlimpse web-based site search application running on remote servers. This matters because...
How to remediate – WebDAV Detection 1. Introduction WebDAV Detection identifies systems running with WebDAV enabled. WebDAV allows remote management of web server content by authorized...
How to remediate – WebDAV 1. Introduction WebDAV, or Web Distributed Authoring and Versioning, is a method for managing files on a web server. It...
How to remediate – WebChat XSS 1. Introduction WebChat XSS is a cross-site scripting vulnerability in the remote CGI component of web chat software. An attacker...
How to remediate – WebCam Watchdog sresult.exe XSS 1. Introduction WebCam Watchdog sresult.exe is vulnerable to a cross-site scripting (XSS) attack. This means an attacker could inject malicious...
How to remediate – web.config File Information Disclosure 1. Introduction The web.config File Information Disclosure vulnerability affects applications hosting a web server configuration file. This allows an attacker...