<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Updated Web App Scanning Plugins from Tenable</title>
        <link>https://www.tenable.com/plugins/feeds?sort=updated&amp;type=was</link>
        <description>Get the latest plugin updates from Tenable</description>
        <lastBuildDate>Tue, 17 Mar 2026 09:38:48 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>Tenable Plugins</generator>
        <image>
            <title>Updated Web App Scanning Plugins from Tenable</title>
            <url>https://www.tenable.com/themes/custom/tenable/img/favicons/apple-touch-icon.png</url>
            <link>https://www.tenable.com/plugins/feeds?sort=updated&amp;type=was</link>
        </image>
        <copyright>Copyright 2026 Tenable, Inc. All rights reserved.</copyright>
        <atom:link href="https://www.tenable.com/plugins/feeds?sort=updated&amp;type=was" rel="self" type="application/rss+xml"/>
        <item>
            <title><![CDATA[HTTP Request Smuggling]]></title>
            <link>https://www.tenable.com/plugins/was/114223</link>
            <guid>https://www.tenable.com/plugins/was/114223</guid>
            <pubDate>Tue, 10 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114223 with High Severity</p>
      <h3>Synopsis</h3>
      <span>HTTP Request Smuggling<br /></span>
      <h3>Description</h3>
      <span>Modern web applications are often deployed with a chain of HTTP servers which ensure the transmission of the HTTP traffic from users to the service. Typical deployments include the usage of a front-end server, usually a load balancer or a reverse proxy, which will then transmit the requests to one or more back-end servers.<br /></span><span><br /></span><span>HTTP request smuggling occurs when the front-end server and the back-end server show discrepancies in the way they process HTTP requests `content-length` and `transfer-encoding` headers. A remote and unauthenticated attacker can leverage this class of vulnerability to bypass access controls or gain access to sensitive data, or to compromise offer users traffic without interaction.<br /></span>
      <h3>Solution</h3>
      <span>If possible, only use HTTP/2 protocol and ensure that HTTP downgrading is disabled. Ensure that the parsing of HTTP requests is consistent on the whole HTTP transmission chain and that all the intermediate software used are up-to-date.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114223">https://www.tenable.com/plugins/was/114223</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Kentico CMS 9.x < 10.0.52 / 11.0.x < 11.0.48 / 12.0.x < 12.0.15 Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/98997</link>
            <guid>https://www.tenable.com/plugins/was/98997</guid>
            <pubDate>Thu, 05 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98997 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Kentico CMS 9.x < 10.0.52 / 11.0.x < 11.0.48 / 12.0.x < 12.0.15 Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>Kentico CMS is a common ASP.NET Content Management System (CMS) used for building websites and online stores.<br /></span><span><br /></span><span>Kentico CMS versions 9 to 10.0.51, 11.0.0 to 11.0.47 and 12.0.0 to 12.0.14 perform unsafe .NET Objects deserialization through the /CMSPages/Staging/SyncServer.asmx/ProcessSynchronizationTaskData URI, allowing unauthenticated attackers to do remote code execution on the target application.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade at least to version 12.0.15 for versions 12.0.x, version 11.0.48 for versions 11.0.x and version 10.0.52 for versions 10.0.x and 9.x. An immediate workaround is to set X.509 authentication on the Staging service authentication, as described by the vendor.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98997">https://www.tenable.com/plugins/was/98997</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Kentico CMS < 9.0.51 Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/98996</link>
            <guid>https://www.tenable.com/plugins/was/98996</guid>
            <pubDate>Thu, 05 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98996 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Kentico CMS < 9.0.51 Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>Kentico CMS is a common ASP.NET Content Management System (CMS) used for building websites and online stores.<br /></span><span><br /></span><span>Kentico CMS versions before 9.0.51 allow remote attackers to inject arbitrary javascript or HTML content via the CMSBodyClass cookie variable.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade at least to patched version 9.0.51.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98996">https://www.tenable.com/plugins/was/98996</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Kentico CMS 8.2.x < 8.2.41 Open Redirect]]></title>
            <link>https://www.tenable.com/plugins/was/98995</link>
            <guid>https://www.tenable.com/plugins/was/98995</guid>
            <pubDate>Thu, 05 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98995 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Kentico CMS 8.2.x < 8.2.41 Open Redirect<br /></span>
      <h3>Description</h3>
      <span>Kentico CMS is a common ASP.NET Content Management System (CMS) used for building websites and online stores.<br /></span><span><br /></span><span>Kentico CMS versions 8.2.x before 8.2.41 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the link parameter.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade at least to patched version 8.2.41.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98995">https://www.tenable.com/plugins/was/98995</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Kentico CMS < 9.0.51 / 10.x < 10.0.48 Access Control Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/98994</link>
            <guid>https://www.tenable.com/plugins/was/98994</guid>
            <pubDate>Thu, 05 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98994 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Kentico CMS < 9.0.51 / 10.x < 10.0.48 Access Control Bypass<br /></span>
      <h3>Description</h3>
      <span>Kentico CMS is a common ASP.NET Content Management System (CMS) used for building websites and online stores.<br /></span><span><br /></span><span>Kentico CMS versions before 9.0.51 and 10.0 before 10.0.48 allows remote attackers to gain Global Administrator access by visiting CMSInstall/install.aspx and then browsing the CMS Administration Dashboard.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to patched versions 9.0.51 or 10.0.48. An immediate fix is to restrict access to the /CMSInstall/install.aspx page in the web.config file.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98994">https://www.tenable.com/plugins/was/98994</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SQL Injection]]></title>
            <link>https://www.tenable.com/plugins/was/98115</link>
            <guid>https://www.tenable.com/plugins/was/98115</guid>
            <pubDate>Thu, 05 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98115 with High Severity</p>
      <h3>Synopsis</h3>
      <span>SQL Injection<br /></span>
      <h3>Description</h3>
      <span>Due to the requirement for dynamic content of today's web applications, many rely on a database backend to store data that will be called upon and processed by the web application (or other programs). Web applications retrieve data from the database by using Structured Query Language (SQL) queries.<br /></span><span><br /></span><span>To meet demands of many developers, database servers (such as MSSQL, MySQL, Oracle etc.) have additional built-in functionality that can allow extensive control of the database and interaction with the host operating system itself.<br /></span><span><br /></span><span>An SQL injection occurs when a value originating from the client's request is used within a SQL query without prior sanitisation. This could allow cyber-criminals to execute arbitrary SQL code and steal data or use the additional functionality of the database server to take control of more server components.<br /></span><span><br /></span><span>The successful exploitation of a SQL injection can be devastating to an organisation and is one of the most commonly exploited web application vulnerabilities.<br /></span><span><br /></span><span>This injection was detected as scanner was able to cause the server to respond to the request with a database related error.<br /></span>
      <h3>Solution</h3>
      <span>The only proven method to prevent against SQL injection attacks while still maintaining full application functionality is to use parameterized queries (also known as prepared statements). When utilising this method of querying the database, any value supplied by the client will be handled as a string value rather than part of the SQL query.<br /></span><span>Additionally, when utilising parameterized queries, the database engine will automatically check to make sure the string being used matches that of the column. For example, the database engine will check that the user supplied input is an integer if the database column is configured to contain integers.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98115">https://www.tenable.com/plugins/was/98115</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Third-Party Service Secret Disclosure]]></title>
            <link>https://www.tenable.com/plugins/was/115062</link>
            <guid>https://www.tenable.com/plugins/was/115062</guid>
            <pubDate>Thu, 05 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115062 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Third-Party Service Secret Disclosure<br /></span>
      <h3>Description</h3>
      <span>Most of the web applications rely on various public services to provide features to their users. In secure designs, consuming these private or cloud services will require authentication like API and private keys, username and password based credentials and similar sensitive data.<br /></span><span><br /></span><span>Developers sometimes hard code such data in various places of their applications, without realizing that it could become publicly available in client-side JavaScript or, for example, HTML comments. By leveraging these sensitive information, a remote and unauthenticated attacker could gain access to an external AI service used by the web application and the organization.<br /></span>
      <h3>Solution</h3>
      <span>Remove the secret exposure by identifying the root cause of the issue (for example manual data insertion in the code, environment variables being bundled in front-end JavaScript). Rotate the secrets to avoid further reuse in case it has been previously retrieved by a malicious actor.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115062">https://www.tenable.com/plugins/was/115062</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[MCP Server Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114790</link>
            <guid>https://www.tenable.com/plugins/was/114790</guid>
            <pubDate>Thu, 05 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114790 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>MCP Server Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational notice that the scanner was able to detect a Model Context Protocol (MCP) HTTP server (using SSE or Streamable-HTTP transport mode) on the target server.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114790">https://www.tenable.com/plugins/was/114790</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Password Submitted Using GET Method]]></title>
            <link>https://www.tenable.com/plugins/was/98146</link>
            <guid>https://www.tenable.com/plugins/was/98146</guid>
            <pubDate>Tue, 17 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98146 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Password Submitted Using GET Method<br /></span>
      <h3>Description</h3>
      <span>The scanner was able to detect that the application uses the HTTP GET method to transmit a password, the information of a URL can be stored in various places (web server, proxy, ...) and can be transmitted to a third party via the Referer header which also increases the chances of interception by an attacker.<br /></span>
      <h3>Solution</h3>
      <span>For password submission and in general any form that transmits sensitive information, it is necessary to use the HTTP POST method.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98146">https://www.tenable.com/plugins/was/98146</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Ivanti Endpoint Manager Mobile < 12.8.0.0 Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/115128</link>
            <guid>https://www.tenable.com/plugins/was/115128</guid>
            <pubDate>Tue, 17 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115128 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Ivanti Endpoint Manager Mobile < 12.8.0.0 Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>Ivanti Endpoint Manager Mobile (EPMM) versions prior to 12.8.0.0 are affected by a vulnerability allowing an unauthenticated remote attacker to execute arbitrary code on the affected system through a specially crafted request.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Ivanti Endpoint Manager Mobile version 12.8.0.0 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115128">https://www.tenable.com/plugins/was/115128</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Object-Relational Mapping (ORM) Leak]]></title>
            <link>https://www.tenable.com/plugins/was/115010</link>
            <guid>https://www.tenable.com/plugins/was/115010</guid>
            <pubDate>Tue, 17 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115010 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Object-Relational Mapping (ORM) Leak<br /></span>
      <h3>Description</h3>
      <span>An Object-Relational Mapping (ORM) Leak vulnerability occurs when an application does not properly control how user-provided data is passed to the ORM. An attacker can exploit this by manipulating input parameters to query fields that are not intended to be exposed. This can lead to the disclosure of sensitive information from the database, such as user credentials, personal information, or other confidential data. In some cases, it could also allow an attacker to perform unauthorized data modification operations.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that user-controllable input is never directly used to construct ORM queries. Implement a strict whitelist of allowed fields and operators for filtering and searching. Validate and sanitize all input to prevent malicious query modifications.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115010">https://www.tenable.com/plugins/was/115010</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Web Application Firewall Detected]]></title>
            <link>https://www.tenable.com/plugins/was/98008</link>
            <guid>https://www.tenable.com/plugins/was/98008</guid>
            <pubDate>Wed, 11 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98008 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Web Application Firewall Detected<br /></span>
      <h3>Description</h3>
      <span>A Web Application Firewall (WAF) has been detected during the scan. A WAF is designed to help protecting web applications by monitoring and filtering HTTP(S) traffic through a set of rules in order to prevent the most common attacks.<br /></span><span><br /></span><span>The identified WAF may have blocked several requests during the vulnerability assessment or have declined access to some resources of the web application during the scan (blocked URLs have been provided in the plugin attachments).<br /></span><span><br /></span><span>It is recommended to scan the web application by ensuring that the traffic coming from the scanner is allowed by the WAF in order to get the most accurate coverage of the target application vulnerabilities. If needed, the Tenable WAS documentation defines the scanners IP ranges to be allowed in the WAF configuration.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98008">https://www.tenable.com/plugins/was/98008</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[AI Service Secret Disclosure]]></title>
            <link>https://www.tenable.com/plugins/was/115063</link>
            <guid>https://www.tenable.com/plugins/was/115063</guid>
            <pubDate>Wed, 11 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115063 with High Severity</p>
      <h3>Synopsis</h3>
      <span>AI Service Secret Disclosure<br /></span>
      <h3>Description</h3>
      <span>Most of the web applications rely on various public services to provide features to their users. In secure designs, consuming these private or cloud services will require authentication like API and private keys, username and password based credentials and similar sensitive data.<br /></span><span><br /></span><span>Developers sometimes hard code such data in various places of their applications, without realizing that it could become publicly available in client-side JavaScript or, for example, HTML comments. By leveraging these sensitive information, a remote and unauthenticated attacker could gain access to an external AI service used by the web application and the organization.<br /></span>
      <h3>Solution</h3>
      <span>Remove the secret exposure by identifying the root cause of the issue (for example manual data insertion in the code, environment variables being bundled in front-end JavaScript). Rotate the secrets to avoid further reuse in case it has been previously retrieved by a malicious actor.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115063">https://www.tenable.com/plugins/was/115063</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Mura/Masa CMS SQL Injection]]></title>
            <link>https://www.tenable.com/plugins/was/114450</link>
            <guid>https://www.tenable.com/plugins/was/114450</guid>
            <pubDate>Wed, 11 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114450 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Mura/Masa CMS SQL Injection<br /></span>
      <h3>Description</h3>
      <span>Mura and Masa CMS (Open-source fork) suffer from a SQL injection vulnerability on the JSON API. By crafting a specific HTTP request, a remote and unauthenticated attacker can exploit the vulnerability to gain access to the database and perform arbitrary operations.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade Masa CMS to versions 7.2.8, 7.3.13, 7.4.6 or later. Upgrade Mura CMS to latest version and reach out vendor support to confirm vulnerability fix as there is currenty no public information available.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114450">https://www.tenable.com/plugins/was/114450</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Generic Secret Disclosure]]></title>
            <link>https://www.tenable.com/plugins/was/114129</link>
            <guid>https://www.tenable.com/plugins/was/114129</guid>
            <pubDate>Wed, 11 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114129 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Generic Secret Disclosure<br /></span>
      <h3>Description</h3>
      <span>Most of the web applications rely on various public services to provide features to their users. In secure designs, consuming these private services will require authentication like API and private keys, username and password based credentials and similar sensitive data.<br /></span><span><br /></span><span>Developers sometimes hard code such data in various places of their applications, without realizing that it could become publicly available in client-side JavaScript or, for example, HTML comments. By leveraging these sensitive information, a remote and unauthenticated attacker could gain privileged access to critical services used by the web application and the organization or to conduct password spraying attacks.<br /></span>
      <h3>Solution</h3>
      <span>Remove the secret exposure by identifying the root cause of the issue (for example manual data insertion in the code, environment variables being bundled in front-end JavaScript). Rotate the secrets to avoid further reuse in case it has been previously retrieved by a malicious actor.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114129">https://www.tenable.com/plugins/was/114129</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Package Dependencies Detected]]></title>
            <link>https://www.tenable.com/plugins/was/113158</link>
            <guid>https://www.tenable.com/plugins/was/113158</guid>
            <pubDate>Wed, 11 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113158 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Package Dependencies Detected<br /></span>
      <h3>Description</h3>
      <span>Programming languages are often used along with package management tools designed to help developers manages the code dependencies when building their web applications (for example : Composer for PHP, NPM for NodeJS, PIP for Python...). These tools usually work by requesting public code repositories in order to fetch the dependencies and help installing and using specific versions in the project.<br /></span><span><br /></span><span>When package configuration files are exposed, an attacker could use it to infer the software components used in the target application and to try conduct further attacks.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that the package management tool files are not deployed with the application or, at least, is not exposed in a web server directory by setting proper permissions on it. Review the software components used in the application to ensure that they are expected and that they come from trusted distribution sources.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113158">https://www.tenable.com/plugins/was/113158</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[JSON Web Token None Hashing Algorithm]]></title>
            <link>https://www.tenable.com/plugins/was/112703</link>
            <guid>https://www.tenable.com/plugins/was/112703</guid>
            <pubDate>Wed, 11 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112703 with High Severity</p>
      <h3>Synopsis</h3>
      <span>JSON Web Token None Hashing Algorithm<br /></span>
      <h3>Description</h3>
      <span>JSON Web Tokens can be signed to protect against data tampering. By using an asymmetric or a symmetric signing algorithm, the application computes a signature of the token data which will be verified during token decoding to ensure its integrity.<br /></span><span><br /></span><span>JSON Web Tokens can be configured by an application with the 'none' algorithm and an empty signature, leaving the data unsigned and mutable without any verification. In addition, some libraries used to handle JSON Web Tokens may also have a bad implementation of this algorithm, leading to the tokens set with the 'none' algorithm being verified even when they are originally created with a signature.<br /></span><span><br /></span><span>Depending on the token usage, attackers could leverage this vulnerability to forge valid tokens and impersonate other users, or gain further privileges.<br /></span>
      <h3>Solution</h3>
      <span>Applications configured to create JSON Web Tokens with the 'none' algorithm should be updated to use a supported signing algorithm with a strong secret or private key. If an unsigned token has been verified by the application despite having been created with a signature, ensure that the library used to handle JSON Web Tokens does not automatically verify tokens with the 'none' algorithm.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112703">https://www.tenable.com/plugins/was/112703</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[JSON Web Token Detected]]></title>
            <link>https://www.tenable.com/plugins/was/112686</link>
            <guid>https://www.tenable.com/plugins/was/112686</guid>
            <pubDate>Wed, 11 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112686 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>JSON Web Token Detected<br /></span>
      <h3>Description</h3>
      <span>JSON Web Token (JWT) is an open standard (RFC 7519) that defines a data structure for securely transmitting claims between parties as a JSON object. A JSON Web Token can be instantiated as a JSON Web Signature (JWS) or a JSON Web Encryption (JWE) depending on the application security considerations.<br /></span><span><br /></span><span>JSON Web Signature based tokens are the most commonly used in API implementations and are built with three base64 URL encoded parts separated by periods :<br /></span><span><br /></span><span>- JSON Object Signing and Encryption (JOSE) header : describes at least the algorithm used for signing or encryption (alg) and the type (typ) of the content being processed. For JSON Web Tokens, the type will usually be set to 'JWT'.<br /></span><span><br /></span><span>- Payload : JSON object containing the claims to share. Claims can be of three classes : registered (from the specification), public or private and their names must be unique inside the claims set.<br /></span><span><br /></span><span>- Signature : computed by using the specific algorithm in header and a secret or a private key. This ensures the integrity of the JSON Web Token.<br /></span><span><br /></span><span>The scanner detected the presence of a JSON Web Signature based token containing the information provided in the output.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112686">https://www.tenable.com/plugins/was/112686</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Publicly writable directory]]></title>
            <link>https://www.tenable.com/plugins/was/98099</link>
            <guid>https://www.tenable.com/plugins/was/98099</guid>
            <pubDate>Fri, 06 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98099 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Publicly writable directory<br /></span>
      <h3>Description</h3>
      <span>There are various methods in which a file (or files) may be uploaded to a webserver. One method that can be used is the HTTP `PUT` method. The `PUT` method is mainly used during development of applications and allows developers to upload (or put) files on the server within the web root.<br /></span><span><br /></span><span>By nature of the design, the `PUT` method typically does not provide any filtering and therefore allows sever side executable code (PHP, ASP, etc) to be uploaded to the server.<br /></span><span><br /></span><span>Cyber-criminals will search for servers supporting the `PUT` method with the intention of modifying existing pages, or uploading web shells to take control of the server.<br /></span><span><br /></span><span>Scanner has discovered that the affected path allows clients to use the `PUT` method. During this test, scanner has `PUT` a file on the server within the web root and successfully performed a `GET` request to its location and verified the contents.<br /></span>
      <h3>Solution</h3>
      <span>Where possible the HTTP `PUT` method should be globally disabled. This can typically be done with a simple configuration change on the server. The steps to disable the `PUT` method will differ depending on the type of server being used (IIS, Apache, etc.).<br /></span><span>For cases where the `PUT` method is required to meet application functionality, such as REST style web services, strict limitations should be implemented to ensure that only secure (SSL/TLS enabled) and authorised clients are permitted to use the `PUT` method.<br /></span><span>Additionally, the server's file system permissions should also enforce strict limitations.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98099">https://www.tenable.com/plugins/was/98099</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Versa Concerto 11.4.x < 12.1.2 Authentication Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/115121</link>
            <guid>https://www.tenable.com/plugins/was/115121</guid>
            <pubDate>Tue, 03 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115121 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Versa Concerto 11.4.x < 12.1.2 Authentication Bypass<br /></span>
      <h3>Description</h3>
      <span>Versa Concerto version 11.4.x prior to 12.1.2 is affected by an authentication bypass vulnerability. An unauthenticated remote attacker can exploit this vulnerability to gain unauthorized access to the internal Actuator endpoint.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Versa Concerto version 12.1.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115121">https://www.tenable.com/plugins/was/115121</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[PHP Unsupported Version]]></title>
            <link>https://www.tenable.com/plugins/was/98230</link>
            <guid>https://www.tenable.com/plugins/was/98230</guid>
            <pubDate>Wed, 28 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98230 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>PHP Unsupported Version<br /></span>
      <h3>Description</h3>
      <span>The installation of PHP detected on the remote host is no longer supported. Lack of support implies that no new security patches for the product will be released by the vendor. As a result, it is likely to contain security vulnerabilities.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to a supported version of PHP.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98230">https://www.tenable.com/plugins/was/98230</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Cookie Without Secure Flag Detected]]></title>
            <link>https://www.tenable.com/plugins/was/98064</link>
            <guid>https://www.tenable.com/plugins/was/98064</guid>
            <pubDate>Wed, 28 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98064 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>Cookie Without Secure Flag Detected<br /></span>
      <h3>Description</h3>
      <span>When the `secure` flag is set on a cookie, the browser will prevent it from being sent over a clear text channel (HTTP) and only allow it to be sent when an encrypted channel is used (HTTPS).<br /></span><span><br /></span><span>The scanner discovered that a cookie was set by the server without the secure flag being set. Although the initial setting of this cookie was via an HTTPS connection, any HTTP link to the same server will result in the cookie being sent in clear text.<br /></span><span><br /></span><span>Note that if the cookie does not contain sensitive information, the risk of this vulnerability is mitigated.<br /></span>
      <h3>Solution</h3>
      <span>If the cookie contains sensitive information, then the server should ensure that the cookie has the `secure` flag set.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98064">https://www.tenable.com/plugins/was/98064</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Cookie Without HttpOnly Flag Detected]]></title>
            <link>https://www.tenable.com/plugins/was/98063</link>
            <guid>https://www.tenable.com/plugins/was/98063</guid>
            <pubDate>Wed, 28 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98063 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>Cookie Without HttpOnly Flag Detected<br /></span>
      <h3>Description</h3>
      <span>The HttpOnly flag assists in the prevention of client side-scripts (such as JavaScript) from accessing and using the cookie.<br /></span><span><br /></span><span>This can help prevent XSS attacks from targeting the cookies holding the client's session token (setting the HttpOnly flag does not prevent, nor safeguard against XSS vulnerabilities themselves).<br /></span>
      <h3>Solution</h3>
      <span>The initial step to remedy this would be to determine whether any client-side scripts (such as JavaScript) need to access the cookie and if not, set the HttpOnly flag.<br /></span><span>It should be noted that some older browsers are not compatible with the HttpOnly flag; therefore, setting this flag will not protect those clients against this form of attack.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98063">https://www.tenable.com/plugins/was/98063</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Cookie Set For Parent Domain]]></title>
            <link>https://www.tenable.com/plugins/was/98062</link>
            <guid>https://www.tenable.com/plugins/was/98062</guid>
            <pubDate>Wed, 28 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98062 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Cookie Set For Parent Domain<br /></span>
      <h3>Description</h3>
      <span>HTTP by itself is a stateless protocol. Therefore the server is unable to determine which requests are performed by which client, and which clients are authenticated or unauthenticated.<br /></span><span><br /></span><span>The use of HTTP cookies within the headers, allows a web server to identify each individual client and can therefore determine which clients hold valid authentication, from those that do not. These are known as session cookies.<br /></span><span><br /></span><span>When a cookie is set by the server (sent the header of an HTTP response) there are several flags that can be set to configure the properties of the cookie and how it is to be handled by the browser.<br /></span><span><br /></span><span>One of these flags represents the host, or domain. for which the cookie can be used.<br /></span><span><br /></span><span>When the cookie is set for the parent domain, rather than the host, this could indicate that the same cookie could be used to access other hosts within that domain. While there are many legitimate reasons for this, it could also be misconfiguration expanding the possible surface of attacks.<br /></span>
      <h3>Solution</h3>
      <span>The first step to remediation is to identify the context in which the cookie is being set and determine if it is required by the whole domain, or just the specific host being tested.<br /></span><span>If it is only required by the host, then the domain flag should be set as such.<br /></span><span>Depending on the framework being used, the configuration of this flag will be modified in different ways.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98062">https://www.tenable.com/plugins/was/98062</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Cookie Without SameSite Flag Detected]]></title>
            <link>https://www.tenable.com/plugins/was/115540</link>
            <guid>https://www.tenable.com/plugins/was/115540</guid>
            <pubDate>Wed, 28 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115540 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>Cookie Without SameSite Flag Detected<br /></span>
      <h3>Description</h3>
      <span>SameSite is an attribute which can be set on a cookie to instruct the web browser if this cookie can be sent along with cross-site requests to help prevent Cross-Site Request Forgery (CSRF) attacks.<br /></span><span><br /></span><span>The attribute has three possible values :<br /></span><span><br /></span><span> - Strict : the cookie will only be sent in a first-party context, thus preventing cross-site requests initiated from third-party websites to include it.<br /></span><span><br /></span><span> - Lax : the cookie is allowed to be sent in GET cross-site requests initiated by the top-level navigation from third-party websites. For example, following an hypertext link from the external website will make the request include the cookie.<br /></span><span><br /></span><span> - None : the cookie is explicitly set to be sent by the browser in any context.<br /></span><span><br /></span><span>The scanner identified the lack of SameSite attribute on cookies set by the application or a misconfiguration.<br /></span>
      <h3>Solution</h3>
      <span>Web browsers default behavior may differ when processing cookies in a cross-site context, making the final decision to send the cookie in this context unpredictable. The SameSite attribute should be set in every cookie to enforce the expected result by developers. When using the 'None' attribute value, ensure that the cookie is also set with the 'Secure' flag.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115540">https://www.tenable.com/plugins/was/115540</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Zimbra Collaboration 10.0.x < 10.0.18 / 10.1.x < 10.1.13 Local File Inclusion]]></title>
            <link>https://www.tenable.com/plugins/was/115122</link>
            <guid>https://www.tenable.com/plugins/was/115122</guid>
            <pubDate>Wed, 28 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115122 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Zimbra Collaboration 10.0.x < 10.0.18 / 10.1.x < 10.1.13 Local File Inclusion<br /></span>
      <h3>Description</h3>
      <span>Zimbra Collaboration versions prior to 10.0.18 and 10.1.13 are vulnerable to Local File Inclusion (LFI) in the Webmail Classic UI due to improper handling of user-supplied request parameters in the RestFilter servlet. An unauthenticated remote attacker can exploit this vulnerability by crafting requests to the /h/rest endpoint, which can lead to the inclusion of arbitrary files from the WebRoot directory.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Zimbra 10.0.18 or 10.1.13 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115122">https://www.tenable.com/plugins/was/115122</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[PHP 8.5.x < 8.5.1 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/115088</link>
            <guid>https://www.tenable.com/plugins/was/115088</guid>
            <pubDate>Wed, 28 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115088 with High Severity</p>
      <h3>Synopsis</h3>
      <span>PHP 8.5.x < 8.5.1 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the version of PHP installed on the remote host is 8.2.x prior to 8.2.30, 8.3.x prior to 8.3.29, 8.4.x prior to 8.4.16, or 8.5.x prior to 8.5.1. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span> - Information leak of memory in getimagesize. (CVE-2025-14177)<br /></span><span><br /></span><span> - Heap buffer overflow in array_merge(). (CVE-2025-14178)<br /></span><span><br /></span><span> - PDO quoting result null dereference. (CVE-2025-14180)<br /></span><span><br /></span><span> - Unbounded recursion and stack consumption. (CVE-2025-67899) Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to PHP version 8.5.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115088">https://www.tenable.com/plugins/was/115088</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Livewire 3.x < 3.6.4 Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/115113</link>
            <guid>https://www.tenable.com/plugins/was/115113</guid>
            <pubDate>Mon, 19 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115113 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Livewire 3.x < 3.6.4 Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>Livewire is a full-stack framework for Laravel that makes building dynamic interfaces simple, without leaving the comfort of Laravel.<br /></span><span><br /></span><span>A remote code execution vulnerability exists in Livewire versions prior to 3.6.4 due to improper handling of serialized data during the component hydration process. An attacker can exploit this vulnerability by sending a specially crafted request containing malicious serialized data to the server, which is then deserialized and executed, allowing the attacker to execute arbitrary code on the server.<br /></span><span><br /></span><span>Note: Depending on the identified version of Livewire, the plugin indicates that the website is **potentially** vulnerable if it uses version 3.6.3 (vulnerable) or 3.6.4 (patched).<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Livewire version 3.6.4 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115113">https://www.tenable.com/plugins/was/115113</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[XML Injection]]></title>
            <link>https://www.tenable.com/plugins/was/114116</link>
            <guid>https://www.tenable.com/plugins/was/114116</guid>
            <pubDate>Mon, 19 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114116 with High Severity</p>
      <h3>Synopsis</h3>
      <span>XML Injection<br /></span>
      <h3>Description</h3>
      <span>An XML Injection is when an attacker tries to inject an XML documents to the application. If the XML parser fails to contextually validate data, then the test will yield a positive result.<br /></span><span><br /></span><span>This attack may lead to the disclosure of confidential data, denial of service, port scanning from the perspective of the machine where the parser is located, and other system impacts.<br /></span>
      <h3>Solution</h3>
      <span>Since a specific value is used to build the XML document, it is necessary to apply strict filtering. Also, the XML processor should be configured to use a local static DTD and disallow any declared DTD included in the XML document.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114116">https://www.tenable.com/plugins/was/114116</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Cloud Platform Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114200</link>
            <guid>https://www.tenable.com/plugins/was/114200</guid>
            <pubDate>Thu, 15 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114200 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Google Cloud Platform Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational notice that the scanner was able to detect that the target application is using an Google Cloud cloud service.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114200">https://www.tenable.com/plugins/was/114200</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Drupal Unsupported Version]]></title>
            <link>https://www.tenable.com/plugins/was/98228</link>
            <guid>https://www.tenable.com/plugins/was/98228</guid>
            <pubDate>Mon, 05 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98228 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Drupal Unsupported Version<br /></span>
      <h3>Description</h3>
      <span>The installation of Drupal detected on the remote host is no longer supported. Lack of support implies that no new security patches for the product will be released by the vendor. As a result, it is likely to contain security vulnerabilities.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to a supported version of Drupal.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98228">https://www.tenable.com/plugins/was/98228</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[MediaWiki Status Module Information Disclosure]]></title>
            <link>https://www.tenable.com/plugins/was/114064</link>
            <guid>https://www.tenable.com/plugins/was/114064</guid>
            <pubDate>Mon, 05 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114064 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>MediaWiki Status Module Information Disclosure<br /></span>
      <h3>Description</h3>
      <span>The instance of MediaWiki running on the remote host allows access to API URLs associated with the SiteInfo module. The SiteInfo api endpoint reports information about the server components, how the web server is configured and its usage, and it may prove useful to an attacker seeking to attack the server or host.<br /></span>
      <h3>Solution</h3>
      <span>Reconfigure MediaWiki to restrict access to the API SiteInfo endpoint by IP address, or disable the SiteInfo module itself.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114064">https://www.tenable.com/plugins/was/114064</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Disclosed Hong Kong Identity Number]]></title>
            <link>https://www.tenable.com/plugins/was/113943</link>
            <guid>https://www.tenable.com/plugins/was/113943</guid>
            <pubDate>Mon, 05 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113943 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Disclosed Hong Kong Identity Number<br /></span>
      <h3>Description</h3>
      <span>A Hong Kong Identity Number (HKID number) is a personally identifiable number that is allocated during the issuance of a Honk Kong Identity Card. A stolen or leaked HKID number can lead to a compromise, and/or the theft of the affected individuals identity. WAS has discovered an HKID number located within the response of the affected page<br /></span>
      <h3>Solution</h3>
      <span>Initially, examine the Identified HKID number within the response should be checked to ensure its validity, as it is possible that it has been detected on data with no relation to a real HKID number due to the wide variety of data formats present within HTML content. If the response does contain a valid HKID number, then all efforts should be taken to remove or further protect this information. This can be achieved by removing the HKID number altogether, or by masking the number so that only a few digits are present within the response. (eg. _*****123*****_).<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113943">https://www.tenable.com/plugins/was/113943</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Spring Framework < 5.2.20 / 5.3.x < 5.3.18 Remote Code Execution (Spring4Shell)]]></title>
            <link>https://www.tenable.com/plugins/was/113217</link>
            <guid>https://www.tenable.com/plugins/was/113217</guid>
            <pubDate>Mon, 05 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113217 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Spring Framework < 5.2.20 / 5.3.x < 5.3.18 Remote Code Execution (Spring4Shell)<br /></span>
      <h3>Description</h3>
      <span>Spring MVC and Spring WebFlux applications, when packaged as a traditional WAR file, running on JDK version 9 and higher in an Apache Tomcat servlet container and exposing one or more endpoints with DataBinder enabled, suffer from a Remote Code Execution (RCE) vulnerability.<br /></span><span><br /></span><span>By crafting a specific HTTP request, an attacker could leverage the vulnerability to compromise the target by, for example, hosting a web shell on the target application.<br /></span>
      <h3>Solution</h3>
      <span>Depending on the current application version branch, update at least to Spring Framework 5.2.20 or 5.3.18. Due to its dependency to Spring Framework, Spring Boot should also be updated at least to versions 2.5.12 or 2.6.6. The Apache Tomcat team has released versions 10.0.20, 9.0.62, and 8.5.78 all of which close the attack vector on Tomcat's side.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113217">https://www.tenable.com/plugins/was/113217</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Microsoft IIS Unsupported Version]]></title>
            <link>https://www.tenable.com/plugins/was/113029</link>
            <guid>https://www.tenable.com/plugins/was/113029</guid>
            <pubDate>Mon, 05 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113029 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Microsoft IIS Unsupported Version<br /></span>
      <h3>Description</h3>
      <span>The installation of Microsoft Internet Information Services (IIS) detected on the remote host is no longer supported. Lack of support implies that no new security patches for the product will be released by the vendor. As a result, it is likely to contain security vulnerabilities.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to a supported version of Microsoft IIS.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113029">https://www.tenable.com/plugins/was/113029</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Environment Configuration File Detected]]></title>
            <link>https://www.tenable.com/plugins/was/98538</link>
            <guid>https://www.tenable.com/plugins/was/98538</guid>
            <pubDate>Wed, 17 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98538 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Environment Configuration File Detected<br /></span>
      <h3>Description</h3>
      <span>An environment configuration file (.env) has been detected on the web application by the scanner. It may be possible for an attacker to view sensitive information (database login and password or API keys for example) and then conduct further attacks.<br /></span>
      <h3>Solution</h3>
      <span>Remove .env file or restrict access.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98538">https://www.tenable.com/plugins/was/98538</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Database Connection String Disclosure]]></title>
            <link>https://www.tenable.com/plugins/was/114276</link>
            <guid>https://www.tenable.com/plugins/was/114276</guid>
            <pubDate>Wed, 17 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114276 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Database Connection String Disclosure<br /></span>
      <h3>Description</h3>
      <span>Most of the web applications rely on a database to provide features to their users. In secure designs, consuming these private or cloud databases will require authentication like username and password based credentials.<br /></span><span><br /></span><span>Developers sometimes hard code such data in various places of their applications, without realizing that it could become publicly available in client-side JavaScript or, for example, HTML comments. By leveraging these sensitive information, a remote and unauthenticated attacker could gain privileged access to critical services used by the web application and the organization.<br /></span>
      <h3>Solution</h3>
      <span>Remove the database connection string exposure by identifying the root cause of the issue (for example manual data insertion in the code, environment variables being bundled in front-end JavaScript). Rotate the secrets to avoid further reuse in case it has been previously retrieved by a malicious actor.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114276">https://www.tenable.com/plugins/was/114276</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Drupal User Enumeration]]></title>
            <link>https://www.tenable.com/plugins/was/98209</link>
            <guid>https://www.tenable.com/plugins/was/98209</guid>
            <pubDate>Thu, 11 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98209 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Drupal User Enumeration<br /></span>
      <h3>Description</h3>
      <span>In some default Drupal installations there are methods which may allow attackers to enumerate a authors username. This information may then be used in brute-force or dictionary attacks against the login form in order to guess passwords.<br /></span>
      <h3>Solution</h3>
      <span>Block requests to sensitive user information at the server using .htaccess file or WAF for example. You should block or redirect all requests made to '/user/reset/'.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98209">https://www.tenable.com/plugins/was/98209</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[React Server Components 19.0 / 19.1.0 / 19.1.1 / 19.2.0 Remote Code Execution (React2Shell)]]></title>
            <link>https://www.tenable.com/plugins/was/115069</link>
            <guid>https://www.tenable.com/plugins/was/115069</guid>
            <pubDate>Thu, 11 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115069 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>React Server Components 19.0 / 19.1.0 / 19.1.1 / 19.2.0 Remote Code Execution (React2Shell)<br /></span>
      <h3>Description</h3>
      <span>React Server Components react-server-dom-webpack, react-server-dom-parcel, and react-server-dom-turbopack versions 19.0, 19.1.0, 19.1.1, and 19.2.0 are vulnerable to an Unauthenticated Remote Code Execution. An attacker can exploit a flaw in how React decodes payloads sent to React Server Function endpoints through specially crafted requests.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade the React Server Components to 19.0.1 or 19.1.2 or 19.2.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115069">https://www.tenable.com/plugins/was/115069</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Citrix NetScaler Gateway / ADC Memory Disclosure]]></title>
            <link>https://www.tenable.com/plugins/was/114907</link>
            <guid>https://www.tenable.com/plugins/was/114907</guid>
            <pubDate>Thu, 11 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114907 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Citrix NetScaler Gateway / ADC Memory Disclosure<br /></span>
      <h3>Description</h3>
      <span>Citrix NetScaler Gateway / ADC versions 14.1.x < 14.1-43.56, 13.1.x < 13.1-58.32, 13.1.x-FIPS < 13.1-37.235-FIPS and NDcPP, 12.1.x-FIPS < 12.1-55.328-FIPS, 12.1.x and 13.0.x are affected by a memory disclosure vulnerability. This issue could allow a remote and unauthenticated attacker to access sensitive information without authorization.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to version 14.1-43.56, 13.1-58.32, 13.1-37.235-FIPS, 12.1-55.328-FIPS or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114907">https://www.tenable.com/plugins/was/114907</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Basic Authentication Bruteforced]]></title>
            <link>https://www.tenable.com/plugins/was/113067</link>
            <guid>https://www.tenable.com/plugins/was/113067</guid>
            <pubDate>Thu, 11 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113067 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Basic Authentication Bruteforced<br /></span>
      <h3>Description</h3>
      <span>The scanner successfully authenticated on the target web application by using weak credentials in the request basic authentication HTTP header.<br /></span>
      <h3>Solution</h3>
      <span>The application should not be configured with accounts using default or predictable credentials. A complex password policy should be defined and enforced on every account available in the application to prevent attackers from guessing it and have unauthorized access to the application.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113067">https://www.tenable.com/plugins/was/113067</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[AWS Credentials Disclosure (deprecated)]]></title>
            <link>https://www.tenable.com/plugins/was/113164</link>
            <guid>https://www.tenable.com/plugins/was/113164</guid>
            <pubDate>Mon, 08 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113164 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>AWS Credentials Disclosure (deprecated)<br /></span>
      <h3>Description</h3>
      <span>Amazon Web Services (AWS) is a public cloud provider offering different hosting services for their customers. Amazon Web Services can be accessed through programmatic calls to their API by authenticating with access keys, which are a combination of both an access key ID and a secret access key. Temporary security credentials, which rely on an additional security token, can also be issued to grant users access to AWS resources for a short period of time.<br /></span><span><br /></span><span>By using leaked AWS credentials or abusing credentials with misconfigured permissions, an attacker could try to gain access to sensitive information on the AWS account or perform arbitrary modification on the AWS resources.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that the detected AWS credentials are expected to be available to users, and that the permissions are defined according to their purpose and to AWS security best practices.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113164">https://www.tenable.com/plugins/was/113164</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Cloud Service Account Private Key Disclosure (deprecated)]]></title>
            <link>https://www.tenable.com/plugins/was/113150</link>
            <guid>https://www.tenable.com/plugins/was/113150</guid>
            <pubDate>Mon, 08 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113150 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Google Cloud Service Account Private Key Disclosure (deprecated)<br /></span>
      <h3>Description</h3>
      <span>Google Cloud resources access control is managed through the Identify and Access Management (IAM) feature which helps defining the different roles and permissions available to authenticated principals. Principals include Google accounts for end users and service accounts which purpose is to be used by applications and compute workloads.<br /></span><span><br /></span><span>Service accounts rely on RSA key pairs for authentication against Google Cloud APIs and access the resources, which, when exposed, could be used by an attacker to gain access to sensitive information or to perform arbitrary modification on the related cloud resources.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that storage accounts keys are not stored with the application (for its own usage or because it was included in the deployment chain) and are not publicly available. If possible, force the keys to be frequently rotated with an expiry time and ensure that leaked keys are revoked and reset.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113150">https://www.tenable.com/plugins/was/113150</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Cross-Site Request Forgery]]></title>
            <link>https://www.tenable.com/plugins/was/98112</link>
            <guid>https://www.tenable.com/plugins/was/98112</guid>
            <pubDate>Thu, 04 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98112 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Cross-Site Request Forgery<br /></span>
      <h3>Description</h3>
      <span>Cross Site Request Forgery (CSRF) occurs when an authenticated user is tricked into clicking on a link which would automatically submit a request without the user's consent.<br /></span><span><br /></span><span>This can be made possible when the request does not include an anti-CSRF token, generated each time the request is visited and passed when the request is submitted, and which can be used by the web application backend to verify that the request originates from a legitimate user.<br /></span><span><br /></span><span>Exploiting requests vulnerable to Cross-Site Request Forgery requires different factors:<br /></span><span><br /></span><span>- The request must perform a sensitive action.<br /></span><span><br /></span><span>- The victim must have an active session.<br /></span><span><br /></span><span>- The attacker must make the victim click on a link to send the request without their consent.<br /></span><span><br /></span><span>Scanner detected a request, available only to authenticated users, where all parameters within are known or predictable. The request may therefore be vulnerable to CSRF attacks.<br /></span><span><br /></span><span>Manual verification may be required to check whether the submission will then perform a sensitive action, such as reset a password, modify user profiles, post content on a forum, etc.<br /></span>
      <h3>Solution</h3>
      <span>Update the application by adding support of anti-CSRF tokens in any sensitive form available in an authenticated session.<br /></span><span>Most web frameworks provide either built-in solutions or have plugins that can be used to easily add these tokens to any form. Check the references for possible solutions provided for the most known frameworks.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98112">https://www.tenable.com/plugins/was/98112</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[User Enumeration]]></title>
            <link>https://www.tenable.com/plugins/was/114947</link>
            <guid>https://www.tenable.com/plugins/was/114947</guid>
            <pubDate>Mon, 24 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114947 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>User Enumeration<br /></span>
      <h3>Description</h3>
      <span>The scanner has detected a potential user enumeration vulnerability in the web application. This vulnerability allows an attacker to determine valid usernames by observing the application's responses.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that user enumeration vulnerabilities are mitigated by implementing proper authentication mechanisms and generic error messages, rate limiting, and other techniques to prevent attackers from determining valid usernames.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114947">https://www.tenable.com/plugins/was/114947</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Microsoft Access Database Detected]]></title>
            <link>https://www.tenable.com/plugins/was/113448</link>
            <guid>https://www.tenable.com/plugins/was/113448</guid>
            <pubDate>Mon, 24 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113448 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Microsoft Access Database Detected<br /></span>
      <h3>Description</h3>
      <span>A Microsoft Access Database file has been detected on the target host. This may expose privileged information or configurations to a malicious actor.<br /></span>
      <h3>Solution</h3>
      <span>Restrict access to the Microsoft Access database file or remove it.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113448">https://www.tenable.com/plugins/was/113448</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache 2.4.10 < 2.4.44 Source Code Disclosure]]></title>
            <link>https://www.tenable.com/plugins/was/113058</link>
            <guid>https://www.tenable.com/plugins/was/113058</guid>
            <pubDate>Mon, 24 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113058 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Apache 2.4.10 < 2.4.44 Source Code Disclosure<br /></span>
      <h3>Description</h3>
      <span>Due to a lack of control over an Apache error when using php-cgi and ModSecurity, it is possible for an attacker to obtain the source code of requested page in the error response via a specially crafted request containing the Content-Length header with an incorrect value.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache version 2.4.45 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113058">https://www.tenable.com/plugins/was/113058</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Fortinet FortiWeb Authentication Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/115040</link>
            <guid>https://www.tenable.com/plugins/was/115040</guid>
            <pubDate>Mon, 17 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115040 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Fortinet FortiWeb Authentication Bypass<br /></span>
      <h3>Description</h3>
      <span>Fortinet FortiWeb versions 7.0.x < 7.0.12, 7.2.x < 7.2.12, 7.4.x < 7.4.10, 7.6.x < 7.6.5, 8.0.x < 8.0.2 suffer from an authentication bypass vulnerability. By crafting a specific request, a remote and unauthenticated attacker can create a new user account and compromise the affected system.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to FortiWeb version 7.0.12, 7.2.12, 7.4.10, 7.6.5, 8.0.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115040">https://www.tenable.com/plugins/was/115040</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Lucee Unset Credentials]]></title>
            <link>https://www.tenable.com/plugins/was/115029</link>
            <guid>https://www.tenable.com/plugins/was/115029</guid>
            <pubDate>Mon, 17 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115029 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Lucee Unset Credentials<br /></span>
      <h3>Description</h3>
      <span>Lucee web application server may be configured with no credentials. If an attacker setup the default accounts, they could gain unauthorized access to the application and perform arbitrary actions on it.<br /></span>
      <h3>Solution</h3>
      <span>The application should not be configured with accounts using default or predictable credentials. A complex password policy should be defined and enforced on every account available in the application to prevent attackers from guessing it and have unauthorized access to the application.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115029">https://www.tenable.com/plugins/was/115029</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Lucee Administration Panel Login Form Detected]]></title>
            <link>https://www.tenable.com/plugins/was/115027</link>
            <guid>https://www.tenable.com/plugins/was/115027</guid>
            <pubDate>Mon, 17 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115027 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Lucee Administration Panel Login Form Detected<br /></span>
      <h3>Description</h3>
      <span>Lucee Administration Panel has been detected on the target web application.<br /></span><span><br /></span><span>This may present an attacker with an exploit vector which could be leveraged using other techniques, such as a Brute-Force or Dictionary Attack, allowing an attacker to gain access to administrative functionality.<br /></span>
      <h3>Solution</h3>
      <span>Restrict access to administrative functionality using a .htaccess file, limiting access to known IP Addresses.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115027">https://www.tenable.com/plugins/was/115027</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[External Backend API Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114128</link>
            <guid>https://www.tenable.com/plugins/was/114128</guid>
            <pubDate>Mon, 17 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114128 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>External Backend API Detected<br /></span>
      <h3>Description</h3>
      <span>Modern web applications often rely on a third party service as a backend when they are built with a micro-service architecture or using a third party SaaS service. In such deployments, it is recommended to perform additional scans directly against these backend hosts (with the consent and approval of their respective owners and hosting companies) to ensure a wide coverage of the web applications services in use.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114128">https://www.tenable.com/plugins/was/114128</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Symfony Secret Fragments Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/112685</link>
            <guid>https://www.tenable.com/plugins/was/112685</guid>
            <pubDate>Mon, 17 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112685 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Symfony Secret Fragments Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>The Symfony framework or Symfony based projects uses a secret that is used for its cryptographic operations such as the creation of cookies or anti-CSRF tokens.<br /></span><span><br /></span><span>A feature (not enabled by default) allows to execute arbitrary PHP code via a GET parameter.<br /></span><span><br /></span><span>If this secret is exposed, through a vulnerability or due to the use of a weak/default secret, then an attacker will be able to abuse this feature to forge a URL with arbitrary PHP code, allowing remote code execution on the machine.<br /></span>
      <h3>Solution</h3>
      <span>It is necessary to make sure that the APP_SECRET variable of your Symfony project has no default value, that it is random and sufficiently robust.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112685">https://www.tenable.com/plugins/was/112685</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Drupal 8.0.x < 10.3.13 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114607</link>
            <guid>https://www.tenable.com/plugins/was/114607</guid>
            <pubDate>Thu, 13 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114607 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Drupal 8.0.x < 10.3.13 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected Drupal application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - Drupal core doesn't sufficiently filter error messages under certain circumstances, leading to a reflected Cross Site Scripting vulnerability (XSS).<br /></span><span><br /></span><span> - Bulk operations allow authorized users to modify several nodes at once from the Content page (/admin/content). A site builder can also add bulk operations to other pages using Views.<br /></span><span><br /></span><span> - Drupal core contains a potential PHP Object Injection vulnerability that (if combined with another exploit) could lead to Arbitrary File Inclusion. Techniques exist to escalate this attack to Remote Code Execution. It is not directly exploitable.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Drupal version 10.3.13 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114607">https://www.tenable.com/plugins/was/114607</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Drupal 10.4.x < 10.4.3 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114606</link>
            <guid>https://www.tenable.com/plugins/was/114606</guid>
            <pubDate>Thu, 13 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114606 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Drupal 10.4.x < 10.4.3 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected Drupal application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - Drupal core doesn't sufficiently filter error messages under certain circumstances, leading to a reflected Cross Site Scripting vulnerability (XSS).<br /></span><span><br /></span><span> - Bulk operations allow authorized users to modify several nodes at once from the Content page (/admin/content). A site builder can also add bulk operations to other pages using Views.<br /></span><span><br /></span><span> - Drupal core contains a potential PHP Object Injection vulnerability that (if combined with another exploit) could lead to Arbitrary File Inclusion. Techniques exist to escalate this attack to Remote Code Execution. It is not directly exploitable.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Drupal version 10.4.3 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114606">https://www.tenable.com/plugins/was/114606</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Drupal 11.0.x < 11.0.12 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114605</link>
            <guid>https://www.tenable.com/plugins/was/114605</guid>
            <pubDate>Thu, 13 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114605 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Drupal 11.0.x < 11.0.12 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected Drupal application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - Drupal core doesn't sufficiently filter error messages under certain circumstances, leading to a reflected Cross Site Scripting vulnerability (XSS).<br /></span><span><br /></span><span> - Bulk operations allow authorized users to modify several nodes at once from the Content page (/admin/content). A site builder can also add bulk operations to other pages using Views.<br /></span><span><br /></span><span> - Drupal core contains a potential PHP Object Injection vulnerability that (if combined with another exploit) could lead to Arbitrary File Inclusion. Techniques exist to escalate this attack to Remote Code Execution. It is not directly exploitable.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Drupal version 11.0.12 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114605">https://www.tenable.com/plugins/was/114605</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Drupal 11.1.x < 11.1.3 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114604</link>
            <guid>https://www.tenable.com/plugins/was/114604</guid>
            <pubDate>Thu, 13 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114604 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Drupal 11.1.x < 11.1.3 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected Drupal application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - Drupal core doesn't sufficiently filter error messages under certain circumstances, leading to a reflected Cross Site Scripting vulnerability (XSS).<br /></span><span><br /></span><span> - Bulk operations allow authorized users to modify several nodes at once from the Content page (/admin/content). A site builder can also add bulk operations to other pages using Views.<br /></span><span><br /></span><span> - Drupal core contains a potential PHP Object Injection vulnerability that (if combined with another exploit) could lead to Arbitrary File Inclusion. Techniques exist to escalate this attack to Remote Code Execution. It is not directly exploitable.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Drupal version 11.1.3 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114604">https://www.tenable.com/plugins/was/114604</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Request URL Override]]></title>
            <link>https://www.tenable.com/plugins/was/114262</link>
            <guid>https://www.tenable.com/plugins/was/114262</guid>
            <pubDate>Mon, 10 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114262 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Request URL Override<br /></span>
      <h3>Description</h3>
      <span>Web application components can sometimes rely on request HTTP headers like 'X-Original-URL' or 'X-Rewrite-URL' to override the original path of this request. Attackers can leverage this vulnerability to conduct further attacks in order to bypass restrictions or conduct cache poisonning attacks.<br /></span>
      <h3>Solution</h3>
      <span>If the application uses a known vulnerable component, update it to a fixed version or later. Otherwise, review the application logic to ensure that HTTP headers like 'X-Original-URL' or 'X-Rewrite-URL' are not trusted and used in its routing logic<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114262">https://www.tenable.com/plugins/was/114262</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Cross-Site Request Forgery Token Validation Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/113900</link>
            <guid>https://www.tenable.com/plugins/was/113900</guid>
            <pubDate>Mon, 10 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113900 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Cross-Site Request Forgery Token Validation Bypass<br /></span>
      <h3>Description</h3>
      <span>Cross-Site Request Forgery (CSRF) vulnerabilities remediation usually rely on the usage of CSRF tokens which are sensitive and unpredictable values shared between the web application sever and the clients. When performing sensitive or privileged actions (like submitting some forms for example), CSRF tokens are sent in the HTTP client request and validated by the server. Some web applications may fail to properly validate the CSRF tokens, leaving them still vulnerable to Cross-Site Request Forgery (CSRF) attacks.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that the CSRF tokens used by the web application are properly validated and that the CSRF tokens value cannot be predicted. Most web frameworks provide either built-in solutions or have plugins that can be used to easily add these tokens to any form. Check the references for possible solutions provided for the most known frameworks.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113900">https://www.tenable.com/plugins/was/113900</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[.DS_Store File Detected]]></title>
            <link>https://www.tenable.com/plugins/was/98646</link>
            <guid>https://www.tenable.com/plugins/was/98646</guid>
            <pubDate>Tue, 04 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98646 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>.DS_Store File Detected<br /></span>
      <h3>Description</h3>
      <span>The web server on the remote host allows read access to a OSX .DS_Store file. This potential flaw can be used to access content from the web server that might otherwise be private.<br /></span>
      <h3>Solution</h3>
      <span>Remove the .DS_Store file.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98646">https://www.tenable.com/plugins/was/98646</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Error Message]]></title>
            <link>https://www.tenable.com/plugins/was/98611</link>
            <guid>https://www.tenable.com/plugins/was/98611</guid>
            <pubDate>Tue, 04 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98611 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Error Message<br /></span>
      <h3>Description</h3>
      <span>An error or warning message has been found on the remote web server. It may be possible for an attacker to view sensitive information and conduct further attacks.<br /></span>
      <h3>Solution</h3>
      <span>Disable all notice, warning and error displaying. Configure the application to log such messages in a file.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98611">https://www.tenable.com/plugins/was/98611</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Scan Information]]></title>
            <link>https://www.tenable.com/plugins/was/98000</link>
            <guid>https://www.tenable.com/plugins/was/98000</guid>
            <pubDate>Tue, 04 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98000 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Scan Information<br /></span>
      <h3>Description</h3>
      <span>Provides scan information and statistics of plugins run.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98000">https://www.tenable.com/plugins/was/98000</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Custom HTTP Header Detected]]></title>
            <link>https://www.tenable.com/plugins/was/115006</link>
            <guid>https://www.tenable.com/plugins/was/115006</guid>
            <pubDate>Tue, 04 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115006 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Custom HTTP Header Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational notice that the scanner was able to detect custom HTTP headers in the target application's responses.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115006">https://www.tenable.com/plugins/was/115006</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Bootstrap 4.x <= 4.6.2 Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/114899</link>
            <guid>https://www.tenable.com/plugins/was/114899</guid>
            <pubDate>Tue, 04 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114899 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Bootstrap 4.x <= 4.6.2 Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, Bootstrap is 4.x prior 4.6.2 . Therefore, it may be affected by a Cross-Site Scripting (XSS) vulnerability within the Carousel component.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Bootstrap version 5.0 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114899">https://www.tenable.com/plugins/was/114899</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Subdomain Takeover]]></title>
            <link>https://www.tenable.com/plugins/was/114146</link>
            <guid>https://www.tenable.com/plugins/was/114146</guid>
            <pubDate>Tue, 21 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114146 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Subdomain Takeover<br /></span>
      <h3>Description</h3>
      <span>Deploying web applications often require developers or system administrators to configure DNS records to target a third party service. Most common scenarios include to either configure a canonical name record (CNAME) or to declare specific name server records (NS) to delegate a specific DNS zone management.<br /></span><span><br /></span><span>A subdomain takeover vulnerability exists when an attacker can gain control over a subdomain or even an entire zone of the target domain depending on the configuration. By exploiting this vulnerability, the attacker can then provide content which could looks legit to any customer or user of the target domain name and conduct further attacks.<br /></span><span><br /></span><span>The plugin currently supports the following services: - Agile CRM - Aha! - Anima - AnnounceKit - Atlassian BitBucket - AWS S3 Bucket - CampaignMonitor - Canny - Clever Cloud - Digital Ocean - Frontify - Gemfury - Getresponse - Ghost - GitHub Pages - Hatena Blog - Help Juice - Help Scout - Helprace - JetBrains - LaunchRock - Meteor - Ngrok - Pantheon - Pingdom - Proposify - Readme.io - Readthedocs - Shopify - Short.io - Smartjobboard - Strikingly - Surge - SurveySparrow - Uberflip - Uptimerobot - WordPress - Wix - Worksites - Zendesk<br /></span>
      <h3>Solution</h3>
      <span>As a first step, remove the DNS record from your DNS zone. Review the web application provisioning process to ensure that DNS records are created only when the target service is up and running as expected. When deprovisioning a service, first remove the DNS record before deactivating the service on the third party service.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114146">https://www.tenable.com/plugins/was/114146</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[HTTP to HTTPS Redirect Not Enabled]]></title>
            <link>https://www.tenable.com/plugins/was/112544</link>
            <guid>https://www.tenable.com/plugins/was/112544</guid>
            <pubDate>Tue, 21 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112544 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>HTTP to HTTPS Redirect Not Enabled<br /></span>
      <h3>Description</h3>
      <span>HTTPS is enabled on the website however HTTP requests are not redirected to HTTPS. Communications are not encrypted if users doesn't explicitly access to HTTPS version of the website.<br /></span><span><br /></span><span>Note: This plugin does not handle customs ports, and therefore only performs checks when a scan is run on standard ports (80/443).<br /></span>
      <h3>Solution</h3>
      <span>Enable HTTP to HTTPS redirect for all requests. Besides redirects if HTTP Strict Transport Security (HSTS) is not implemented it's highly recommended to enable it.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112544">https://www.tenable.com/plugins/was/112544</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Netdisco Unauthenticated Access]]></title>
            <link>https://www.tenable.com/plugins/was/115002</link>
            <guid>https://www.tenable.com/plugins/was/115002</guid>
            <pubDate>Tue, 07 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 115002 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Netdisco Unauthenticated Access<br /></span>
      <h3>Description</h3>
      <span>Netdisco is a web-based network management tool. When accessible without authentication, an attacker can gain unauthorized access to the Netdisco interface, potentially leading to information disclosure or further exploitation of the system.<br /></span>
      <h3>Solution</h3>
      <span>Authentication should be enforced to prevent unauthorized access to the Netdisco interface.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/115002">https://www.tenable.com/plugins/was/115002</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Microsoft SharePoint Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/114923</link>
            <guid>https://www.tenable.com/plugins/was/114923</guid>
            <pubDate>Tue, 07 Oct 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114923 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Microsoft SharePoint Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>Microsoft SharePoint Server Subscription Edition < 16.0.18526.20508 or 2016 < 16.0.5513.1001 or 2019 < 16.0.10417.20037 is affected by a vulnerability that allows an unauthenticated attacker to execute arbitrary code through insecure deserialization.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Microsoft Server Subscription Edition build 16.0.18526.20508 or SharePoint Server 2016 build 16.0.5513.1001 or 2019 build 16.0.10417.20037 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114923">https://www.tenable.com/plugins/was/114923</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Joomla! User Registration Form Detected]]></title>
            <link>https://www.tenable.com/plugins/was/98205</link>
            <guid>https://www.tenable.com/plugins/was/98205</guid>
            <pubDate>Fri, 26 Sep 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98205 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Joomla! User Registration Form Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational plugin to inform the user that the scanner has detected a publicly accessible Joomla User Registration Form on the target application.<br /></span><span><br /></span><span>This may present an attacker with an exploit vector which could be leveraged using other techniques, such as a Brute-Force or Dictionary Attack<br /></span>
      <h3>Solution</h3>
      <span>Restrict access to Registration Forms using a .htaccess file, limiting access to known IP Addresses.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98205">https://www.tenable.com/plugins/was/98205</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WordPress User Registration Form Detected]]></title>
            <link>https://www.tenable.com/plugins/was/98202</link>
            <guid>https://www.tenable.com/plugins/was/98202</guid>
            <pubDate>Fri, 26 Sep 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98202 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress User Registration Form Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational plugin to inform the user that the scanner has detected a publicly accessible WordPress User Registration Form on the target application.<br /></span><span><br /></span><span>This may present an attacker with an exploit vector which could be leveraged using other techniques, such as a Brute-Force or Dictionary Attack<br /></span>
      <h3>Solution</h3>
      <span>Restrict access to Registration Forms using a .htaccess file, limiting access to known IP Addresses.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98202">https://www.tenable.com/plugins/was/98202</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Drupal User Registration Form Detected]]></title>
            <link>https://www.tenable.com/plugins/was/98201</link>
            <guid>https://www.tenable.com/plugins/was/98201</guid>
            <pubDate>Fri, 26 Sep 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98201 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Drupal User Registration Form Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational plugin to inform the user that the scanner has detected a publicly accessible Drupal User Registration Form on the target application.<br /></span><span><br /></span><span>This may present an attacker with an exploit vector which could be leveraged using other techniques, such as a Brute-Force or Dictionary Attack<br /></span>
      <h3>Solution</h3>
      <span>Restrict access using a .htaccess file, limiting access to known IP Addresses.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98201">https://www.tenable.com/plugins/was/98201</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Mixed Resource Detection]]></title>
            <link>https://www.tenable.com/plugins/was/98091</link>
            <guid>https://www.tenable.com/plugins/was/98091</guid>
            <pubDate>Fri, 19 Sep 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98091 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Mixed Resource Detection<br /></span>
      <h3>Description</h3>
      <span>Scanner discovered that the affected site is utilising both HTTP and HTTPS. While the HTML code is served over HTTPS, the server is also serving resources over an unencrypted channel, which can lead to the compromise of data, while providing a false sense of security to the user.<br /></span>
      <h3>Solution</h3>
      <span>All pages and/or resources on the affected site should be secured equally, utilising the latest and most secure encryption protocols. These include SSL version 3.0 and TLS version 1.2.<br /></span><span>While TLS 1.2 is the latest and the most preferred protocol, not all browsers will support this encryption method. Therefore, the more common SSL is included. Older protocols such as SSL version 2, and weak ciphers (< 128 bit) should also be disabled.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98091">https://www.tenable.com/plugins/was/98091</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Cross-Site WebSocket Hijacking]]></title>
            <link>https://www.tenable.com/plugins/was/114502</link>
            <guid>https://www.tenable.com/plugins/was/114502</guid>
            <pubDate>Fri, 19 Sep 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114502 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Cross-Site WebSocket Hijacking<br /></span>
      <h3>Description</h3>
      <span>HTML5 WebSockets allow developers to create bi-directionnal communication channels between clients (usually web browsers) and servers. To initialize the communication, the WebSocket protocol requires a handshake performed with the HTTP protocol to ugprade the communication. When a web application only leverage on the client cookies to authenticate its users, a remote and unauthenticated could initiate a WebSocket handhsake from a malicious page to force the victim to authenticate against the target, therefore gaining access to the WebSocket traffic exchanged between the victim user and the target web application.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that the WebSocket handshake is protected against CSRF attacks, by implementing an anti-CSRF protection mechanism and validating that the request 'Origin' is properly validated.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114502">https://www.tenable.com/plugins/was/114502</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Insecure Redirect Chain]]></title>
            <link>https://www.tenable.com/plugins/was/113219</link>
            <guid>https://www.tenable.com/plugins/was/113219</guid>
            <pubDate>Fri, 12 Sep 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113219 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Insecure Redirect Chain<br /></span>
      <h3>Description</h3>
      <span>The scanner encountered one or more insecure redirects during the application crawl which means the redirection chain is not fully done with HTTPS. During an insecure redirection anyone could establish a man-in-the-middle attack against the remote host.<br /></span>
      <h3>Solution</h3>
      <span>It is necessary to perform redirects only to HTTPS sites. It is also recommended to add HTTP Strict Transport Security (HSTS) on the final URL.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113219">https://www.tenable.com/plugins/was/113219</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Source Code Passive Disclosure]]></title>
            <link>https://www.tenable.com/plugins/was/98779</link>
            <guid>https://www.tenable.com/plugins/was/98779</guid>
            <pubDate>Wed, 03 Sep 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98779 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Source Code Passive Disclosure<br /></span>
      <h3>Description</h3>
      <span>Scanner has detected server-side source code within the server's response.<br /></span><span><br /></span><span>A modern web application will be reliant on several different programming languages. These languages can be broken up in two flavours. These are client-side languages (such as those that run in the browser -- like JavaScript) and server-side languages (which are executed by the server -- like ASP, PHP, JSP, etc.) to form the dynamic pages (client-side code) that are then sent to the client.<br /></span><span><br /></span><span>Because all server side code should be executed by the server, it should never be seen by the client, however in some scenarios it is possible that the server has a misconfiguration or the server side code has syntax errors, and therefore is not executed by the server but is instead sent to the client. As the server-side source code often contains sensitive information, such as database connection strings or details into the application workflow, this can be extremely risky.<br /></span><span><br /></span><span>Cyber-criminals will attempt to discover pages that either accidentally or forcefully allow the server-side source code to be disclosed, to assist in discovering further vulnerabilities or sensitive information.<br /></span>
      <h3>Solution</h3>
      <span>It is important that the server does not deliver server side code to the client, and the server misconfiguration or server code should be changed to prevent this.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98779">https://www.tenable.com/plugins/was/98779</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Response Splitting]]></title>
            <link>https://www.tenable.com/plugins/was/98101</link>
            <guid>https://www.tenable.com/plugins/was/98101</guid>
            <pubDate>Wed, 03 Sep 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98101 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Response Splitting<br /></span>
      <h3>Description</h3>
      <span>HTTP response splitting occurs when untrusted data is inserted into the response headers without any sanitisation.<br /></span><span><br /></span><span>If successful, this allows cyber-criminals to essentially split the HTTP response in two.<br /></span><span><br /></span><span>This is abused by cyber-criminals injecting CR (Carriage Return -- `/r`) and LF (Line Feed -- `\n`) characters which will then form the split. If the CR or LF characters are not processed by the server then it cannot be exploited.<br /></span><span><br /></span><span>Along with these characters, cyber-criminals can then construct their own arbitrary response headers and body which would then form the second response. The second response is entirely under their control, allowing for a number of other attacks.<br /></span>
      <h3>Solution</h3>
      <span>It is recommended that untrusted data is never used to form the contents of the response header.<br /></span><span>Where any untrusted source is required to be used in the response headers, it is important to ensure that any hazardous characters (`/r`, `/n` and potentially others) are sanitised prior to being used.<br /></span><span>This is especially important when setting cookie values, redirecting, etc..<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98101">https://www.tenable.com/plugins/was/98101</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unvalidated Redirection]]></title>
            <link>https://www.tenable.com/plugins/was/98054</link>
            <guid>https://www.tenable.com/plugins/was/98054</guid>
            <pubDate>Wed, 03 Sep 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98054 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Unvalidated Redirection<br /></span>
      <h3>Description</h3>
      <span>Web applications occasionally use parameter values to store the address of the page to which the client will be redirected -- for example: `yoursite.com/page.asp?redirect=www.yoursite.com/404.asp`<br /></span><span><br /></span><span>An unvalidated redirect occurs when the client is able to modify the affected parameter value in the request and thus control the location of the redirection. For example, the following URL `yoursite.com/page.asp?redirect=www.anothersite.com` will redirect to `www.anothersite.com`.<br /></span><span><br /></span><span>There are several ways a redirection can occur:<br /></span><span><br /></span><span>1) A response with a 3xx status code will tell the browser to redirect to the URL in the "Location" header<br /></span><span><br /></span><span>2) A response with a "Refresh" header tells the browser to reload the page after a set interval (which can be 0). The header can take an arbitrary URL parameter to load<br /></span><span><br /></span><span>3) The HTML <meta> tag can take a "http-equiv" attribute which can be used instead of an HTTP response header. Using this, a "Refresh" can be simulated<br /></span><span><br /></span><span>4) Javascript is used to redirect the browser to an arbitrary URL<br /></span><span><br /></span><span>Cyber-criminals will abuse these vulnerabilities in social engineering attacks to get users to unknowingly visit malicious web sites.<br /></span><span><br /></span><span>The scanner has discovered that the server does not validate the parameter value prior to redirecting the client to the injected value.<br /></span>
      <h3>Solution</h3>
      <span>The application should ensure that the supplied value for a redirect is permitted. This can be achieved by performing whitelisting on the parameter value.<br /></span><span>The whitelist should contain a list of pages or sites that the application is permitted to redirect users to. If the supplied value does not match any value in the whitelist then the server should redirect to a standard error page.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98054">https://www.tenable.com/plugins/was/98054</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[GraphQL Query Length Not Limited]]></title>
            <link>https://www.tenable.com/plugins/was/114867</link>
            <guid>https://www.tenable.com/plugins/was/114867</guid>
            <pubDate>Wed, 03 Sep 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114867 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>GraphQL Query Length Not Limited<br /></span>
      <h3>Description</h3>
      <span>GraphQL is an open-source query and manipulation language for APIs. When a GraphQL API does not enforce limits on query length or complexity, attackers can submit extremely large and complex queries that consume excessive server resources, potentially causing denial of service conditions.<br /></span>
      <h3>Solution</h3>
      <span>Implement query length limitations, depth restrictions, and complexity analysis on all GraphQL endpoints to prevent resource exhaustion attacks.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114867">https://www.tenable.com/plugins/was/114867</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Content Security Policy Missing 'Report-To']]></title>
            <link>https://www.tenable.com/plugins/was/114796</link>
            <guid>https://www.tenable.com/plugins/was/114796</guid>
            <pubDate>Wed, 03 Sep 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114796 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>Content Security Policy Missing 'Report-To'<br /></span>
      <h3>Description</h3>
      <span>Content Security Policy (CSP) is a web security standard that helps to mitigate attacks like cross-site scripting (XSS), clickjacking or mixed content issues. CSP provides mechanisms to websites to restrict content that browsers will be allowed to load.<br /></span><span><br /></span><span>The 'report-to' directive allows websites to specify a reporting endpoint where browsers can send CSP violation reports. This helps administrators monitor policy violations and fine-tune their security policies.<br /></span><span><br /></span><span>While a Content Security Policy has been detected on this host, it is missing the 'report-to' directive, which means potential violations won't be reported automatically. This reduces visibility into security events that could help identify and remediate issues.<br /></span>
      <h3>Solution</h3>
      <span>Add the 'report-to' directive to your existing Content Security Policy header.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114796">https://www.tenable.com/plugins/was/114796</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[PHP Development Server < 7.4.22 Source Disclosure]]></title>
            <link>https://www.tenable.com/plugins/was/114232</link>
            <guid>https://www.tenable.com/plugins/was/114232</guid>
            <pubDate>Wed, 03 Sep 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114232 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>PHP Development Server < 7.4.22 Source Disclosure<br /></span>
      <h3>Description</h3>
      <span>In PHP versions pior to 7.4.22, when the integrated web server is used, an attacker can with a specially forged request, obtain the source code due to an improper handling of multiple requests in quick succession, leading to the server treating requested files as static files instead of executing scripts.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to PHP version 7.4.22 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114232">https://www.tenable.com/plugins/was/114232</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[OPcache UI Detected]]></title>
            <link>https://www.tenable.com/plugins/was/113059</link>
            <guid>https://www.tenable.com/plugins/was/113059</guid>
            <pubDate>Wed, 03 Sep 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113059 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>OPcache UI Detected<br /></span>
      <h3>Description</h3>
      <span>A PHP OPcache information page has been detected, potentially including server statistics, settings and cached files, software versions and providing real-time updates for the information. This information may then assist in the compromise of the web application.<br /></span>
      <h3>Solution</h3>
      <span>Remove the affected file(s).<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113059">https://www.tenable.com/plugins/was/113059</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Authentication Check Pattern Found in Unauthenticated Browser]]></title>
            <link>https://www.tenable.com/plugins/was/114247</link>
            <guid>https://www.tenable.com/plugins/was/114247</guid>
            <pubDate>Fri, 29 Aug 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114247 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Authentication Check Pattern Found in Unauthenticated Browser<br /></span>
      <h3>Description</h3>
      <span>This is an informational notice that the scanner was able to find the authentication check pattern using an unauthenticated browser. This indicates that the scanner cannot validate if authentication was successful.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114247">https://www.tenable.com/plugins/was/114247</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Moodle 4.3.x < 4.3.10 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114699</link>
            <guid>https://www.tenable.com/plugins/was/114699</guid>
            <pubDate>Thu, 31 Jul 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114699 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Moodle 4.3.x < 4.3.10 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Moodle install hosted on the remote host is prior to 4.1.16 or 4.3.x prior to 4.3.10 or 4.4.x prior to 4.4.6 or 4.5.x prior to 4.5.2. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span>- An SQL injection risk was identified in the module list filter within course search.<br /></span><span><br /></span><span>- Additional checks were required to ensure trusttext is applied (when enabled) to glossary entries being restored.<br /></span><span><br /></span><span>- Insufficient capability checks made it possible to disable badges a user does not have permission to access.<br /></span><span><br /></span><span>- The upstream RequireJS library was upgraded, which included a security fix.<br /></span><span><br /></span><span>- The question bank filter required additional sanitizing to prevent a reflected XSS risk.<br /></span><span><br /></span><span>- Description information displayed in the site administration live log required additional sanitizing to prevent a stored XSS risk.<br /></span><span><br /></span><span>- The drag-and-drop onto image (ddimageortext) question type required additional sanitizing to prevent a stored XSS risk.<br /></span><span><br /></span><span>- Tags not expected to be visible to a user could still be discovered by them via the tag search page or in the tags block.<br /></span><span><br /></span><span>- Separate Groups mode restrictions were not factored into permission checks before allowing viewing or deletion of responses in Feedback activities.<br /></span><span><br /></span><span>- Insufficient sanitizing in the TeX notation filter resulted in an arbitrary file read risk on sites where pdfTeX is available (such as those with TeX Live installed).<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Moodle version 4.3.10 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114699">https://www.tenable.com/plugins/was/114699</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[OpenAPI Permissive Input Validation]]></title>
            <link>https://www.tenable.com/plugins/was/113258</link>
            <guid>https://www.tenable.com/plugins/was/113258</guid>
            <pubDate>Mon, 28 Jul 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113258 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>OpenAPI Permissive Input Validation<br /></span>
      <h3>Description</h3>
      <span>OpenAPI specification is an API description format for REST APIs. An OpenAPI file is written in YAML or JSON and describes all the API properties like the available endpoints with the related operations or the authentication methods.<br /></span><span><br /></span><span>The `Schema` object allows the definition of input and output data types which can be objects or primitives and arrays. When some data types properties are missing on objects specified in the definition file, the API implementation could potentially allow malicious input formats, leaving it open to multiple vulnerabilities like Denial of Service (DoS) or Remote Code Execution (RCE).<br /></span><span><br /></span><span>The scanner analyzed an OpenAPI definition file and detected the lack of properties on some data types.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that the missing properties are declared in the OpenAPI definition file according to the file specification and that the API backend enforces the validation of these properties on the inputs.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113258">https://www.tenable.com/plugins/was/113258</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Bootstrap Unsupported Version]]></title>
            <link>https://www.tenable.com/plugins/was/114902</link>
            <guid>https://www.tenable.com/plugins/was/114902</guid>
            <pubDate>Thu, 24 Jul 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114902 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Bootstrap Unsupported Version<br /></span>
      <h3>Description</h3>
      <span>The installation of Boostrap detected on the remote host is no longer supported. Lack of support implies that no new security patches for the product will be released by the vendor. As a result, it is likely to contain security vulnerabilities.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to a supported version of Bootstrap.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114902">https://www.tenable.com/plugins/was/114902</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Bootstrap 3.2.x <= 3.4.1 Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/114901</link>
            <guid>https://www.tenable.com/plugins/was/114901</guid>
            <pubDate>Thu, 24 Jul 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114901 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Bootstrap 3.2.x <= 3.4.1 Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, Bootstrap is 3.2.x prior 3.4.1 . Therefore, it may be affected by a Cross-Site Scripting (XSS) vulnerability within the Carousel component.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Bootstrap version 5.0 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114901">https://www.tenable.com/plugins/was/114901</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Bootstrap < 4.0.0 Multiples Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/114900</link>
            <guid>https://www.tenable.com/plugins/was/114900</guid>
            <pubDate>Thu, 24 Jul 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114900 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Bootstrap < 4.0.0 Multiples Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, Bootstrap is prior to 4.0.0. Therefore, it may be affected by Multiples Cross-Site Scripting (XSS) vulnerability :<br /></span><span><br /></span><span>- A Cross-Site Scripting (XSS) vulnerability has been identified within the Bootstrap 3 Button component.<br /></span><span><br /></span><span>- A Cross-Site Scripting (XSS) vulnerability has been identified within the Bootstrap 3 Popover component and Bootstrap 3 Tooltip component, which allows unsanitized HTML to be used.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Bootstrap version 4.0 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114900">https://www.tenable.com/plugins/was/114900</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Blind XPath Injection (differential analysis)]]></title>
            <link>https://www.tenable.com/plugins/was/113310</link>
            <guid>https://www.tenable.com/plugins/was/113310</guid>
            <pubDate>Thu, 24 Jul 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113310 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Blind XPath Injection (differential analysis)<br /></span>
      <h3>Description</h3>
      <span>XML Path Language (XPath) queries are used by web applications for selecting nodes from XML documents. Once selected, the value of these nodes can then be used by the application.<br /></span><span><br /></span><span>A simple example for the use of XML documents is to store user information. As part of the authentication process, the application will perform an XPath query to confirm the login credentials and retrieve that user's information to use in the following request.<br /></span><span><br /></span><span>XPath injection occurs where untrusted data is used to build XPath queries.<br /></span><span><br /></span><span>Cyber-criminals may abuse this injection vulnerability to bypass authentication, query other user's information, or, if the XML document contains privileged user credentials, allow the cyber-criminal to escalate their privileges.<br /></span><span><br /></span><span>Scanner injected special XPath query characters into the page and based on the responses from the server, has determined that the page is vulnerable to XPath injection.<br /></span><span><br /></span><span>This injection was detected as scanner was able to inject specific XPath queries, that if vulnerable, result in the responses for each injection being different. This is known as a blind XPath injection vulnerability.<br /></span>
      <h3>Solution</h3>
      <span>The preferred way to protect against XPath injection is to utilise parameterized (also known as prepared) XPath queries. When utilising this method of querying the XML document any value supplied by the client will be handled as a string rather than part of the XPath query.<br /></span><span>An alternative to parameterized queries it to use precompiled XPath queries. Precompiled XPath queries are not generated dynamically and will therefor never process user supplied input as XPath.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113310">https://www.tenable.com/plugins/was/113310</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Well-Known URIs Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114029</link>
            <guid>https://www.tenable.com/plugins/was/114029</guid>
            <pubDate>Fri, 18 Jul 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114029 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Well-Known URIs Detected<br /></span>
      <h3>Description</h3>
      <span>Well-known URIs are used to store site-wide metadata and to make it available for some web-based protocols which require the discovery of a policy or retrieve specific information about a given host. These URIs use the `/.well-known` path prefix and are standardized to avoid collisions.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114029">https://www.tenable.com/plugins/was/114029</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[DOM-based Cross-Site Scripting (XSS)]]></title>
            <link>https://www.tenable.com/plugins/was/98109</link>
            <guid>https://www.tenable.com/plugins/was/98109</guid>
            <pubDate>Thu, 10 Jul 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98109 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>DOM-based Cross-Site Scripting (XSS)<br /></span>
      <h3>Description</h3>
      <span>Client-side scripts are used extensively by modern web applications. They perform from simple functions (such as the formatting of text) up to full manipulation of client-side data and Operating System interaction.<br /></span><span><br /></span><span>Unlike traditional Cross-Site Scripting (XSS), where the client is able to inject scripts into a request and have the server return the script to the client, DOM XSS does not require that a request be sent to the server and may be abused entirely within the loaded page.<br /></span><span><br /></span><span>This occurs when elements of the DOM (known as the sources) are able to be manipulated to contain untrusted data, which the client-side scripts (known as the sinks) use or execute an unsafe way.<br /></span><span><br /></span><span>Scanner has discovered that by inserting an HTML element into the page's DOM inputs (sources), it was possible to then have the HTML element rendered as part of the page by the sink.<br /></span>
      <h3>Solution</h3>
      <span>Client-side document rewriting, redirection, or other sensitive action, using untrusted data, should be avoided wherever possible, as these may not be inspected by server side filtering.<br /></span><span>To remedy DOM XSS vulnerabilities where these sensitive document actions must be used, it is essential to:<br /></span><span>1. Ensure any untrusted data is treated as text, as opposed to being interpreted as code or mark-up within the page. 2. Escape untrusted data prior to being used within the page. Escaping methods will vary depending on where the untrusted data is being used. (See references for details.) 3. Use `document.createElement`, `element.setAttribute`, `element.appendChild`, etc. to build dynamic interfaces as opposed to HTML rendering methods such as `document.write`, `document.writeIn`, `element.innerHTML`, or `element.outerHTML `etc.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98109">https://www.tenable.com/plugins/was/98109</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[MCP Server SSE DNS Rebinding]]></title>
            <link>https://www.tenable.com/plugins/was/114885</link>
            <guid>https://www.tenable.com/plugins/was/114885</guid>
            <pubDate>Thu, 03 Jul 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114885 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>MCP Server SSE DNS Rebinding<br /></span>
      <h3>Description</h3>
      <span>ModelContextProtocol (MCP) servers using SSE (Server-Sent Events) transport mode are prone to DNS rebinding attacks when they do not enforce strict verification of both the 'Origin' and 'Host' headers. This vulnerability allows an attacker to bypass same-origin policies, potentially leading to unauthorized access to sensitive data or actions on behalf of the user in the context of the vulnerable MCP server.<br /></span><span><br /></span><span>This detection is included in the AI and LLM category.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that the MCP server enforces both the 'Origin' and the 'Host' header validation to prevent DNS rebinding attacks. This can be achieved by implementing strict validation rules for incoming requests, ensuring that the 'Host' header matches the expected domain and that the 'Origin' header is from a trusted source.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114885">https://www.tenable.com/plugins/was/114885</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SimpleHelp Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114655</link>
            <guid>https://www.tenable.com/plugins/was/114655</guid>
            <pubDate>Thu, 03 Jul 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114655 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>SimpleHelp Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational notice that the scanner was able to detect a SimpleHelp instance on the target server.<br /></span><span><br /></span><span>Note that this detection is included in the Remote Access Tools category.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114655">https://www.tenable.com/plugins/was/114655</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[BackupBuddy Plugin for WordPress < 8.7.5 Arbitrary File Read]]></title>
            <link>https://www.tenable.com/plugins/was/113369</link>
            <guid>https://www.tenable.com/plugins/was/113369</guid>
            <pubDate>Thu, 03 Jul 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113369 with High Severity</p>
      <h3>Synopsis</h3>
      <span>BackupBuddy Plugin for WordPress < 8.7.5 Arbitrary File Read<br /></span>
      <h3>Description</h3>
      <span>The WordPress BackupBuddy Plugin installed on the remote host is affected by an arbitrary file read vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to BackupBuddy Plugin for WordPress 8.7.5 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113369">https://www.tenable.com/plugins/was/113369</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Server-Side Request Forgery]]></title>
            <link>https://www.tenable.com/plugins/was/112439</link>
            <guid>https://www.tenable.com/plugins/was/112439</guid>
            <pubDate>Thu, 03 Jul 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112439 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Server-Side Request Forgery<br /></span>
      <h3>Description</h3>
      <span>Web applications often rely on network requests to query external resources and retrieve data in order to process it.<br /></span><span><br /></span><span>A Server-Side Request Forgery (SSRF) vulnerability exists when an attacker is able to control these outbound requests and send it to a resource he owns, to the localhost itself, or to a private host in the target application internal network.<br /></span><span><br /></span><span>By injecting a specific request and using various protocols (like HTTPS or Gopher for example), the attacker can leverage this vulnerability to try gaining access to sensitive data, performing unauthorized modifications or getting remote code execution in the target environment.<br /></span><span><br /></span><span>Depending on the web application configuration, the vulnerability may be of three types:<br /></span><span><br /></span><span> - Blind : the application executes the malicious request but does not return any response to the attacker. The exploitation is difficult as the attacker has to only rely on his own knowledge of the target to conduct his attack.<br /></span><span><br /></span><span> - Half-blind : the malicious request is executed and the response is partially returned to the the attacker. For example, the application may return different error messages related to the status of the outbound request. The exploitation remains difficult, however the attacker can gather information to help conducting his attack further.<br /></span><span><br /></span><span> - Non-blind : The application returns the full content of the response to the malicious request. The exploitation is easier and generally makes the impact of this vulnerability more critical.<br /></span><span><br /></span><span>The scanner has been able to detect a Server-Side Request Forgery vulnerability by injecting a crafted request in the target application which performed an external request and returned a partial or full response.<br /></span>
      <h3>Solution</h3>
      <span>The mitigation mainly depends on the application purpose and design but it is generally recommended to apply the defense in depth principle and enforce controls at both application and network layers.<br /></span><span>In the application, inputs are processed by a parser which can be abused in various cases. It is recommended to avoid allowing the user to send full URLs to the application and to validate hostnames or IP addresses against a whitelist, if applicable, prior performing the request. Otherwise, using a blacklist is a solution to prevent requests to the localhost and all the assets of the internal infrastructure. As applications sometimes use a library such as libcurl for performing the requests, ensure that the component is up-to-date to avoid exploitation of a security vulnerability in the parser itself.<br /></span><span>At the network layer, an approach is to implement network segregation to control and limit traffic between the hosts of the infrastructure and use security services like firewalls or web proxies to enforce the network restrictions.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112439">https://www.tenable.com/plugins/was/112439</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Flowise Chatflow Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114313</link>
            <guid>https://www.tenable.com/plugins/was/114313</guid>
            <pubDate>Thu, 26 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114313 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Flowise Chatflow Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational plugin to inform the user that the scanner has detected the use of a Flowise Chatflow. This detection is included in the AI and LLM category.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114313">https://www.tenable.com/plugins/was/114313</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Microsoft Exchange Autodiscover V2 User Enumeration]]></title>
            <link>https://www.tenable.com/plugins/was/114590</link>
            <guid>https://www.tenable.com/plugins/was/114590</guid>
            <pubDate>Tue, 24 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114590 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Microsoft Exchange Autodiscover V2 User Enumeration<br /></span>
      <h3>Description</h3>
      <span>On-Premise installation of Microsoft Exchange is prone to a user enumeration through the ActiveSync protocol using the AutodiscoverV2 endpoint.<br /></span>
      <h3>Solution</h3>
      <span>If the Autodiscover feature is not required for external access, restrict access to internal networks only via network filtering or IIS rules, or disable ActiveSync if not required.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114590">https://www.tenable.com/plugins/was/114590</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Microsoft Exchange Server Autodiscover Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/113057</link>
            <guid>https://www.tenable.com/plugins/was/113057</guid>
            <pubDate>Tue, 24 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113057 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Microsoft Exchange Server Autodiscover Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>Microsoft Exchange Server versions 2019 before cumulative update 11, 2016 before cumulative update 22 and 2013 before cumulative update 23 are affected by a cross-site scripting vulnerability through the `autodiscover/autodiscover.json` endpoint. By crafting a specific URL, an attacker could target any Exchange user and try conducting phishing attacks or performing arbitrary modification on the target application.<br /></span>
      <h3>Solution</h3>
      <span>Apply cumulative update 11 for Exchange Server 2019, cumulative update 22 for Exchange Server 2016 and cumulative update 23 for Exchange Server 2013 as described on Microsoft website.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113057">https://www.tenable.com/plugins/was/113057</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[MCP Server Unauthenticated Access]]></title>
            <link>https://www.tenable.com/plugins/was/114791</link>
            <guid>https://www.tenable.com/plugins/was/114791</guid>
            <pubDate>Wed, 18 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114791 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>MCP Server Unauthenticated Access<br /></span>
      <h3>Description</h3>
      <span>This is an informational notice that the scanner was able to detect a Model Context Protocol (MCP) server available without authentication on the target server. When available, the plugin provides the list of tools, prompts and resources in the attachments.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that the unauthenticated access avability to this MCP server is expected and does not expose sensitive information.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114791">https://www.tenable.com/plugins/was/114791</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Backup File]]></title>
            <link>https://www.tenable.com/plugins/was/98074</link>
            <guid>https://www.tenable.com/plugins/was/98074</guid>
            <pubDate>Tue, 17 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98074 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Backup File<br /></span>
      <h3>Description</h3>
      <span>A common practice when administering web applications is to create a copy/backup of a particular file or directory prior to making any modification to the file. Another common practice is to add an extension or change the name of the original file to signify that it is a backup (examples include `.bak`, `.orig`, `.backup`, etc.).<br /></span><span><br /></span><span>During the initial recon stages of an attack, cyber-criminals will attempt to locate backup files by adding common extensions onto files already discovered on the webserver. By analysing the response headers from the server they are able to determine if the backup file exists. These backup files can then assist in the compromise of the web application.<br /></span><span><br /></span><span>By utilising the same method, the scanner was able to discover a possible backup file.<br /></span>
      <h3>Solution</h3>
      <span>Do not keep obsolete versions of files under the virtual web server root. If the detected file(s) contained sensitive information like credentials or private api keys, ensure that they have been rotated and are no longer active.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98074">https://www.tenable.com/plugins/was/98074</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Spring Boot Actuator Detected]]></title>
            <link>https://www.tenable.com/plugins/was/113195</link>
            <guid>https://www.tenable.com/plugins/was/113195</guid>
            <pubDate>Tue, 17 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113195 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Spring Boot Actuator Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational notice that the scanner was able to detect an accessible Spring Actuator. Actuator endpoints let you monitor and interact with your application. Spring Boot includes a number of built-in endpoints and lets you add your own. For example, the 'health' endpoint provides basic application health information.<br /></span>
      <h3>Solution</h3>
      <span>Disable unnecessary endpoints and do not make sensitive endpoints externally accessible, limiting access to known IP Addresses.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113195">https://www.tenable.com/plugins/was/113195</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 9.0.0.M1 < 9.0.10 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/112290</link>
            <guid>https://www.tenable.com/plugins/was/112290</guid>
            <pubDate>Tue, 17 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112290 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Tomcat 9.0.0.M1 < 9.0.10 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is 9.0.x prior to 9.0.10. It is, therefore, affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A flaw exists in WebSocket client because host name verification is missing<br /></span><span><br /></span><span> - A flaw exists in NIO/NIO2 connectors due to a mishandling of close that can lead to reuse of user sessions<br /></span><span><br /></span><span> - A flaw exists in CORS filter due to insecure defaults<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 9.0.10 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112290">https://www.tenable.com/plugins/was/112290</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Citrix Netscaler 14.1.x < 14.1-25.53 Information Disclosure]]></title>
            <link>https://www.tenable.com/plugins/was/114784</link>
            <guid>https://www.tenable.com/plugins/was/114784</guid>
            <pubDate>Fri, 06 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114784 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Citrix Netscaler 14.1.x < 14.1-25.53 Information Disclosure<br /></span>
      <h3>Description</h3>
      <span>Citrix Netscaler version 14.1.x prior to 14.1-25.53 is affected by an information disclosure vulnerability. An unauthenticated remote attacker can exploit this vulnerability to gain access to sensitive information, including the Citrix Netscaler management console and SDX SVM.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Citrix Netscaler version 14.1-25.53 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114784">https://www.tenable.com/plugins/was/114784</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Advanced Custom Fields Pro for WordPress 6.0.x < 6.1.6 Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/113908</link>
            <guid>https://www.tenable.com/plugins/was/113908</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113908 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Advanced Custom Fields Pro for WordPress 6.0.x < 6.1.6 Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>The WordPress Advanced Custom Fields Pro Plugin installed on the remote host is affected by a Cross-Site Scripting.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Advanced Custom Fields Pro for WordPress 6.1.6 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113908">https://www.tenable.com/plugins/was/113908</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Advanced Custom Fields for WordPress 6.0.x < 6.1.6 Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/113906</link>
            <guid>https://www.tenable.com/plugins/was/113906</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113906 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Advanced Custom Fields for WordPress 6.0.x < 6.1.6 Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>The WordPress Advanced Custom Fields Plugin installed on the remote host is affected by a Cross-Site Scripting.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Advanced Custom Fields for WordPress 6.1.6 or latest<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113906">https://www.tenable.com/plugins/was/113906</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[GraphQL Interface Detected]]></title>
            <link>https://www.tenable.com/plugins/was/112907</link>
            <guid>https://www.tenable.com/plugins/was/112907</guid>
            <pubDate>Wed, 04 Jun 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112907 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>GraphQL Interface Detected<br /></span>
      <h3>Description</h3>
      <span>GraphQL is an open-source query and manipulation language for APIs and a server-side runtime built to handle these queries on the application dataset. Some web applications provide a friendly user interface to help developers building GraphQL queries and get the results.<br /></span><span><br /></span><span>The scanner detected the presence of one or more GraphQL interfaces.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112907">https://www.tenable.com/plugins/was/112907</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[FortiOS 7.0.x < 7.0.13 / 7.2.x < 7.2.6 / 7.4.x < 7.4.2 Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/114795</link>
            <guid>https://www.tenable.com/plugins/was/114795</guid>
            <pubDate>Tue, 27 May 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114795 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>FortiOS 7.0.x < 7.0.13 / 7.2.x < 7.2.6 / 7.4.x < 7.4.2 Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>FortiOS version 6.0.x prior to 6.0.16 or 6.2.x prior to 6.2.15 or 6.4.x prior to 6.4.14 or 7.0.x prior to 7.0.13 or 7.2.x prior to 7.2.6 or 7.4.x prior to 7.4.2 and FortiProxy version 7.0.x prior to 7.0.14 or 7.2.x prior to 7.2.8 or 7.4.x prior to 7.4.2 are affected by a vulnerability allowing allows a remote attacker to execute arbitrary code or command through a specially crafted request.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to FortiOS 6.0.17, 6.2.15, 6.4.14, 7.0.13, 7.2.6, 7.4.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114795">https://www.tenable.com/plugins/was/114795</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Form-based File Upload]]></title>
            <link>https://www.tenable.com/plugins/was/98080</link>
            <guid>https://www.tenable.com/plugins/was/98080</guid>
            <pubDate>Thu, 22 May 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98080 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Form-based File Upload<br /></span>
      <h3>Description</h3>
      <span>The design of many web applications require that users be able to upload files that will either be stored or processed by the receiving web server.<br /></span><span><br /></span><span>Scanner has flagged this not as a vulnerability, but as a prompt for the penetration tester to conduct further manual testing on the file upload function.<br /></span><span><br /></span><span>An insecure form-based file upload could allow a cyber-criminal a means to abuse and successfully exploit the server directly, and/or any third party that may later access the file. This can occur through uploading a file containing server side-code (such as PHP) that is then executed when requested by the client.<br /></span>
      <h3>Solution</h3>
      <span>The identified page should at a minimum:<br /></span><span>1. Whitelist permitted file types and block all others. This should be conducted on the MIME type of the file rather than its extension. 2. As the file is uploaded, and prior to being handled (written to the disk) by the server, the filename should be stripped of all control, special, or Unicode characters. 3. Ensure that the upload is conducted via the HTTP `POST` method rather than `GET` or `PUT`. 4. Ensure that the file is written to a directory that does not hold any execute permission and that all files within that directory inherit the same permissions. 5. Scan (if possible) with an up-to-date virus scanner before being stored. 6. Ensure that the application handles files as per the host operating system. For example, the length of the file name is appropriate, there is adequate space to store the file, protection against overwriting other files etc.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98080">https://www.tenable.com/plugins/was/98080</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Flask Weak Secret Key]]></title>
            <link>https://www.tenable.com/plugins/was/114434</link>
            <guid>https://www.tenable.com/plugins/was/114434</guid>
            <pubDate>Thu, 22 May 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114434 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Flask Weak Secret Key<br /></span>
      <h3>Description</h3>
      <span>Flask applications use an application key to encrypt and sign various data, including session cookies and other sensitive information.<br /></span><span><br /></span><span>When a weak or easily guessable application key is used, it compromises the security of the entire application. Attackers can potentially decrypt sensitive data, forge valid session cookies, or even execute remote code in some scenarios.<br /></span>
      <h3>Solution</h3>
      <span>The secret key used to sign the cookies in the application must be stronger (long and random) to prevent it from being retrieved with a bruteforce attack.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114434">https://www.tenable.com/plugins/was/114434</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Web Cache Poisoning Denial of Service]]></title>
            <link>https://www.tenable.com/plugins/was/114006</link>
            <guid>https://www.tenable.com/plugins/was/114006</guid>
            <pubDate>Thu, 22 May 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114006 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Web Cache Poisoning Denial of Service<br /></span>
      <h3>Description</h3>
      <span>A caching system has been detected on the application and is vulnerable to web cache poisoning. By manipulating specific unkeyed inputs (headers or cookies that are not included when generating the cache key) it was possible to force the caching system to cache a response that contains user-controlled input. If a response is cached in a shared web cache, such as those commonly found in proxy servers, then all users of that cache will continue to receive the malicious content until the cache entry is purged. In this case, the affected resource will be unreachable, which, depending on the resource, can cause a DoS (Denial Of Service).<br /></span><span><br /></span><span>Note that the scanner performs a safe check that does not affect website visitors but only the scanner itself.<br /></span>
      <h3>Solution</h3>
      <span>Disable caching for the affected input or pages. If both the affected input and caching behavior are required, configure the cache to ensure that the input is included in the cache key.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114006">https://www.tenable.com/plugins/was/114006</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Missing 'Content-Type' Header]]></title>
            <link>https://www.tenable.com/plugins/was/98648</link>
            <guid>https://www.tenable.com/plugins/was/98648</guid>
            <pubDate>Fri, 16 May 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98648 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>Missing 'Content-Type' Header<br /></span>
      <h3>Description</h3>
      <span>The Content-Type header allows clients to find an appropriate way to render data, omission of this header can facilitate MIME sniffing attacks.<br /></span>
      <h3>Solution</h3>
      <span>Configure your web server to include an 'Content-Type' header with a correct Content-Type defined therein.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98648">https://www.tenable.com/plugins/was/98648</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Host Header Injection]]></title>
            <link>https://www.tenable.com/plugins/was/98623</link>
            <guid>https://www.tenable.com/plugins/was/98623</guid>
            <pubDate>Fri, 16 May 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98623 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Host Header Injection<br /></span>
      <h3>Description</h3>
      <span>When creating URI for links in web applications, developers often resort to the HTTP Host header available in HTTP request sent by client side. A remote attacker can exploit this by sending a fake header with a domain name under his control allowing him to poison web-cache or password reset emails for example.<br /></span>
      <h3>Solution</h3>
      <span>Web application should not trust Host and X-Forwarded-Host and should use a secure SERVER_NAME instead of these headers.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98623">https://www.tenable.com/plugins/was/98623</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Missing HTTP Strict Transport Security Policy]]></title>
            <link>https://www.tenable.com/plugins/was/98056</link>
            <guid>https://www.tenable.com/plugins/was/98056</guid>
            <pubDate>Fri, 16 May 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98056 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Missing HTTP Strict Transport Security Policy<br /></span>
      <h3>Description</h3>
      <span>The HTTP protocol by itself is clear text, meaning that any data that is transmitted via HTTP can be captured and the contents viewed. To keep data private and prevent it from being intercepted, HTTP is often tunnelled through either Secure Sockets Layer (SSL) or Transport Layer Security (TLS). When either of these encryption standards are used, it is referred to as HTTPS.<br /></span><span><br /></span><span>HTTP Strict Transport Security (HSTS) is an optional response header that can be configured on the server to instruct the browser to only communicate via HTTPS. This will be enforced by the browser even if the user requests a HTTP resource on the same server.<br /></span><span><br /></span><span>Cyber-criminals will often attempt to compromise sensitive information passed from the client to the server using HTTP. This can be conducted via various Man-in-The-Middle (MiTM) attacks or through network packet captures.<br /></span><span><br /></span><span>Scanner discovered that the affected application is using HTTPS however does not use the HSTS header.<br /></span>
      <h3>Solution</h3>
      <span>Depending on the framework being used the implementation methods will vary, however it is advised that the `Strict-Transport-Security` header be configured on the server.<br /></span><span>One of the options for this header is `max-age`, which is a representation (in milliseconds) determining the time in which the client's browser will adhere to the header policy.<br /></span><span>Depending on the environment and the application this time period could be from as low as minutes to as long as days.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98056">https://www.tenable.com/plugins/was/98056</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SOAP API Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114166</link>
            <guid>https://www.tenable.com/plugins/was/114166</guid>
            <pubDate>Fri, 16 May 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114166 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>SOAP API Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational notice that the scanner was able to detect a SOAP API.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114166">https://www.tenable.com/plugins/was/114166</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Web Services Description Language (WSDL) File Detected]]></title>
            <link>https://www.tenable.com/plugins/was/113973</link>
            <guid>https://www.tenable.com/plugins/was/113973</guid>
            <pubDate>Fri, 16 May 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113973 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Web Services Description Language (WSDL) File Detected<br /></span>
      <h3>Description</h3>
      <span>A Web Services Description Language (WSDL) file has been detected on this url.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113973">https://www.tenable.com/plugins/was/113973</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Bitbucket Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/113373</link>
            <guid>https://www.tenable.com/plugins/was/113373</guid>
            <pubDate>Fri, 16 May 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113373 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Bitbucket Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>The Atlassian Bitbucket application running on the remote host is affected by a critical command injection vulnerability. A remote attacker with unauthenticated to a public Bitbucket repository, or authenticated access to a private repository can send a malicious HTTP request leading to arbitrary code execution.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to version 7.6.17, 7.17.10, 7.21.4, 8.0.3, 8.1.3, 8.2.2, 8.3.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113373">https://www.tenable.com/plugins/was/113373</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Username Disclosure]]></title>
            <link>https://www.tenable.com/plugins/was/114615</link>
            <guid>https://www.tenable.com/plugins/was/114615</guid>
            <pubDate>Tue, 29 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114615 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>Username Disclosure<br /></span>
      <h3>Description</h3>
      <span>Web Applications can sometimes expose web applications users in various places such as HTML comments, JavaScript code or API requests. By leveraging this information, an attacker can gather information and build further attacks against the target application.<br /></span>
      <h3>Solution</h3>
      <span>Avoid disclosing usernames in your application content.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114615">https://www.tenable.com/plugins/was/114615</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Polyfill Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114357</link>
            <guid>https://www.tenable.com/plugins/was/114357</guid>
            <pubDate>Tue, 29 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114357 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Polyfill Detected<br /></span>
      <h3>Description</h3>
      <span>The `polyfill.js` file is a popular open-source library to ensure old browsers compatibility when evaluating JavaScript code. Starting February 2024, the domain `polyfill.io` and the related GitHub account have been purchased by a malicious threat actor to inject malwares in all web applications relying on, at least, the `cdn.polyfill.io` domain. The `polyfill.js` file cannot be trusted anymore as the malicious code could have been redistributed on other CDNs or locally copied in various plugins.<br /></span>
      <h3>Solution</h3>
      <span>Remove the detected file(s) immediately from the web application if they are embedded in it, and ensure that the script is not loaded from any untrusted external source. Some vendors have already put some mitigations in place to rewrite content using the malicious `polyfill.io` domain or to serve a safe version of the library.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114357">https://www.tenable.com/plugins/was/114357</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Local File Inclusion]]></title>
            <link>https://www.tenable.com/plugins/was/98125</link>
            <guid>https://www.tenable.com/plugins/was/98125</guid>
            <pubDate>Thu, 17 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98125 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Local File Inclusion<br /></span>
      <h3>Description</h3>
      <span>Web applications occasionally use parameter values to store the location of a file which will later be required by the server.<br /></span><span><br /></span><span>An example of this is often seen in error pages, where the actual file path for the error page is stored in a parameter value -- for example `example.com/error.php?page=404.php`.<br /></span><span><br /></span><span>A file inclusion occurs when the parameter value (ie. path to file) can be substituted with the path of another resource on the same server, effectively allowing the displaying of arbitrary, and possibly restricted/sensitive, files.<br /></span><span><br /></span><span>Scanner discovered that it was possible to substitute a parameter value with another resource and have the server return the contents of the resource to the client within the response.<br /></span>
      <h3>Solution</h3>
      <span>It is recommended that untrusted data is never used to form a file location to be included.<br /></span><span>To validate data, the application should ensure that the supplied value for a file is permitted. This can be achieved by performing whitelisting on the parameter value, by matching it against a list of permitted files. If the supplied value does not match any value in the whitelist, then the server should redirect to a standard error page.<br /></span><span>In some scenarios, where dynamic content is being requested, it may not be possible to perform validation against a list of trusted resources, therefore the list must also become dynamic (updated as the files change), or perform filtering to remove extraneous user input (such as semicolons, periods etc.) and only permit `a-z0-9`.<br /></span><span>It is also advised that sensitive files are not stored within the web root and that the user permissions enforced by the directory are correct.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98125">https://www.tenable.com/plugins/was/98125</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Operating System Command Injection]]></title>
            <link>https://www.tenable.com/plugins/was/98123</link>
            <guid>https://www.tenable.com/plugins/was/98123</guid>
            <pubDate>Thu, 17 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98123 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Operating System Command Injection<br /></span>
      <h3>Description</h3>
      <span>OS command injection occurs when user supplied input is used to form a command to be executed by the operating system.<br /></span><span><br /></span><span>Scanner was able to inject specific Operating System commands and have the output from that command contained within the server response. This indicates that input is not being sanitized properly.<br /></span>
      <h3>Solution</h3>
      <span>It is recommended that untrusted data is never used to form a command to be executed by the OS.<br /></span><span>To validate data, the application should ensure that the supplied value contains only the characters that are required to perform the required action.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98123">https://www.tenable.com/plugins/was/98123</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Path Traversal]]></title>
            <link>https://www.tenable.com/plugins/was/98100</link>
            <guid>https://www.tenable.com/plugins/was/98100</guid>
            <pubDate>Thu, 17 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98100 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Path Traversal<br /></span>
      <h3>Description</h3>
      <span>Web applications occasionally use parameter values to store the location of a file which will later be required by the server.<br /></span><span><br /></span><span>An example of this is often seen in error pages, where the actual file path for the error page is stored in a parameter value -- for example `example.com/error.php?page=404.php`.<br /></span><span><br /></span><span>A path traversal occurs when the parameter value (ie. path to file being called by the server) can be substituted with the relative path of another resource which is located outside of the applications working directory. The server then loads the resource and includes its contents in the response to the client.<br /></span><span><br /></span><span>Cyber-criminals will abuse this vulnerability to view files that should otherwise not be accessible.<br /></span><span><br /></span><span>A very common example of this, on *nix servers, is gaining access to the `/etc/passwd` file in order to retrieve a list of server users. This attack would look like: `yoursite.com/error.php?page=../../../../etc/passwd`<br /></span><span><br /></span><span>As path traversal is based on the relative path, the payload must first traverse to the file system's root directory, hence the string of `../../../../`.<br /></span><span><br /></span><span>Scanner discovered that it was possible to substitute a parameter value with a relative path to a common operating system file and have the contents of the file included in the response.<br /></span>
      <h3>Solution</h3>
      <span>It is recommended that untrusted data is never used to form a file location to be included.<br /></span><span>To validate data, the application should ensure that the supplied value for a file is permitted. This can be achieved by performing whitelisting on the parameter value, by matching it against a list of permitted files. If the supplied value does not match any value in the whitelist, then the server should redirect to a standard error page.<br /></span><span>In some scenarios, where dynamic content is being requested, it may not be possible to perform validation against a list of trusted resources, therefore the list must also become dynamic (updated as the files change), or perform filtering to remove extraneous user input (such as semicolons, periods etc.) and only permit `a-z0-9`.<br /></span><span>It is also advised that sensitive files are not stored within the web root and that the user permissions enforced by the directory are correct.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98100">https://www.tenable.com/plugins/was/98100</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Jenkins < 2.442 / < LTS 2.426.3 Arbitrary File Read]]></title>
            <link>https://www.tenable.com/plugins/was/114168</link>
            <guid>https://www.tenable.com/plugins/was/114168</guid>
            <pubDate>Thu, 17 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114168 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Jenkins < 2.442 / < LTS 2.426.3 Arbitrary File Read<br /></span>
      <h3>Description</h3>
      <span>A vulnerability exists in Jenkins < 2.442, < LTS 2.426.3 allowing an unauthenticated attacker to read arbitrary files via a specially crafted request and which in certain cases can lead to a Remote Code Execution.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Jenkins version 2.442, LTS 2.426.3 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114168">https://www.tenable.com/plugins/was/114168</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Server-Side Inclusion Injection]]></title>
            <link>https://www.tenable.com/plugins/was/113634</link>
            <guid>https://www.tenable.com/plugins/was/113634</guid>
            <pubDate>Thu, 17 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113634 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Server-Side Inclusion Injection<br /></span>
      <h3>Description</h3>
      <span>A Server-Side Include Injection vulnerability exists when an application embeds and evaluates unsafe user-controlled server-side include directives.<br /></span><span><br /></span><span>By injecting a specific payload an attacker can leverage this vulnerability to conduct a remote code execution.<br /></span>
      <h3>Solution</h3>
      <span>Developers should avoid embedding user inputs into pages that are processed for SSI directives. If the application still requires this type of inputs, the expression syntax related to the framework being used should be sanitized prior processing it.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113634">https://www.tenable.com/plugins/was/113634</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Rails < 4.2.11.3 / 5.x < 5.0.1 Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/112720</link>
            <guid>https://www.tenable.com/plugins/was/112720</guid>
            <pubDate>Thu, 17 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112720 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Rails < 4.2.11.3 / 5.x < 5.0.1 Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>There is a code injection vulnerability in versions of Rails prior to 4.2.11.3 and 5.x prior to 5.0.1 that would allow an attacker who controlled the "locals" argument of a "render" call to perform a Remote Code Execution.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade Rails to 4.2.11.2, 5.0.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112720">https://www.tenable.com/plugins/was/112720</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Oracle WebLogic 10.3.6.0.0 / 12.1.3.0.0 / 12.2.1.3.0 Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/112706</link>
            <guid>https://www.tenable.com/plugins/was/112706</guid>
            <pubDate>Thu, 17 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112706 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Oracle WebLogic 10.3.6.0.0 / 12.1.3.0.0 / 12.2.1.3.0 Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>A vulnerability in Oracle WebLogic Server 10.3.6.0.0, 12.1.3.0.0 & 12.2.1.3.0 allows an unauthenticated attacker with HTTP access to the service to obtain arbitrary code execution due to an insecure deserialization.<br /></span><span><br /></span><span>Oracle proposes the associated patches on its site to fix the vulnerability.<br /></span>
      <h3>Solution</h3>
      <span>Apply the security patches available on Oracle's website.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112706">https://www.tenable.com/plugins/was/112706</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Oracle WebLogic 10.3.6.0.0 / 12.1.3.0.0 Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/112704</link>
            <guid>https://www.tenable.com/plugins/was/112704</guid>
            <pubDate>Thu, 17 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112704 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Oracle WebLogic 10.3.6.0.0 / 12.1.3.0.0 Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>A vulnerability in Oracle WebLogic Server 10.3.6.0.0 & 12.1.3.0.0 allows an unauthenticated attacker with HTTP access to the service to obtain arbitrary code execution due to an insecure deserialization.<br /></span><span><br /></span><span>Oracle proposes the associated patches on its site to fix the vulnerability.<br /></span>
      <h3>Solution</h3>
      <span>Apply the security patches available on Oracle's website.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112704">https://www.tenable.com/plugins/was/112704</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Oracle WebLogic Server Administration Console Detected]]></title>
            <link>https://www.tenable.com/plugins/was/112545</link>
            <guid>https://www.tenable.com/plugins/was/112545</guid>
            <pubDate>Thu, 17 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112545 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Oracle WebLogic Server Administration Console Detected<br /></span>
      <h3>Description</h3>
      <span>Oracle WebLogic Server administration console has been detected on the target web application. This may present an attacker with an exploit vector which could be leveraged using other techniques, such as a Brute-Force or Dictionary Attack, allowing an attacker to gain access to administrative functionality.<br /></span>
      <h3>Solution</h3>
      <span>Restrict or disable access to administration console.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112545">https://www.tenable.com/plugins/was/112545</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Oracle WebLogic WSAT Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/112524</link>
            <guid>https://www.tenable.com/plugins/was/112524</guid>
            <pubDate>Thu, 17 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112524 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Oracle WebLogic WSAT Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>The remote Oracle WebLogic server is affected by a remote code execution vulnerability in the WSAT endpoint due to unsafe deserialization of XML encoded Java objects. An unauthenticated, remote attacker can exploit this, via a crafted Java object, to execute arbitrary Java code in the context of the WebLogic server.<br /></span>
      <h3>Solution</h3>
      <span>Apply the Oracle Critical Patch Update from October 2017. If the WSAT component is not applied in the WLS cluster, an immediate and temporary workaround is to delete it and restart the WebLogic domain controller service.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112524">https://www.tenable.com/plugins/was/112524</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Langflow < 1.3.0 Unauthenticated Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/114668</link>
            <guid>https://www.tenable.com/plugins/was/114668</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114668 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Langflow < 1.3.0 Unauthenticated Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>Langflow is vulnerable to an attack allowing an unauthenticated attacker to execute arbitrary code via a specially forged request on the '/api/v1/validate/code' endpoint. This detection is included in the AI and LLM category.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Langflow version 1.3.0 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114668">https://www.tenable.com/plugins/was/114668</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WordPress Plugins Detected]]></title>
            <link>https://www.tenable.com/plugins/was/113452</link>
            <guid>https://www.tenable.com/plugins/was/113452</guid>
            <pubDate>Thu, 10 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113452 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress Plugins Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational notice that the scanner was able to detect one or more installed WordPress plugins.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113452">https://www.tenable.com/plugins/was/113452</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Next.js 13.0.x < 13.5.9 Authorization Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/114681</link>
            <guid>https://www.tenable.com/plugins/was/114681</guid>
            <pubDate>Fri, 04 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114681 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Next.js 13.0.x < 13.5.9 Authorization Bypass<br /></span>
      <h3>Description</h3>
      <span>The version of Next.js installed on the remote host is 11.1.4 prior to 12.3.5, 13.0.x prior to 13.5.9, 14.x prior to 14.2.25 or 15.x prior to 15.2.3. It is, therefore, affected by Authorization Bypass if the authorization check occurs in middleware.<br /></span><span><br /></span><span>Note that the scanner has not attempted to exploit this issue but has instead relied only on application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Next.js version 13.5.9 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114681">https://www.tenable.com/plugins/was/114681</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Ollama Multiples Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114575</link>
            <guid>https://www.tenable.com/plugins/was/114575</guid>
            <pubDate>Fri, 04 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114575 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Ollama Multiples Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to the self-reported version in its response header, the version of Ollama hosted on the remote is, affected by a Multiples Vulnerabilities :<br /></span><span><br /></span><span>- File existence disclosure through the api. When calling the CreateModel route with a path parameter that does not exist - A Denial Of Service through a Division By Zero<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Restricting access to Ollama.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114575">https://www.tenable.com/plugins/was/114575</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Disclosed US Social Security Number]]></title>
            <link>https://www.tenable.com/plugins/was/98920</link>
            <guid>https://www.tenable.com/plugins/was/98920</guid>
            <pubDate>Thu, 03 Apr 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98920 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Disclosed US Social Security Number<br /></span>
      <h3>Description</h3>
      <span>The US Social Security Number (SSN) is a personally identifiable number that is issued to its citizens. A stolen or leaked SSN can lead to a compromise, and/or the theft of the affected individuals identity. WAS has discovered an SSN located within the response of the affected page<br /></span>
      <h3>Solution</h3>
      <span>Initially, the SSN within the response should be checked to ensure its validity, as it is possible that the regular expression has matched on a similar number with no relation to a real SSN. If the response does contain a valid SSN, then all efforts should be taken to remove or further protect this information. This can be achieved by removing the SSN altogether, or by masking the number so that only the last few digits are present within the response. (eg. _**********123_).<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98920">https://www.tenable.com/plugins/was/98920</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Docker Compose Configuration Detected]]></title>
            <link>https://www.tenable.com/plugins/was/113168</link>
            <guid>https://www.tenable.com/plugins/was/113168</guid>
            <pubDate>Fri, 28 Mar 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113168 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Docker Compose Configuration Detected<br /></span>
      <h3>Description</h3>
      <span>Docker Compose is a tool designed to help developers defining and running multi-container Docker applications. By defining a configuration file named `docker-compose.yml` in their application project directory, developers can define the different services used by the application with their configurations.<br /></span><span><br /></span><span>By accessing an exposed `docker-compose.yml` file, an attacker could leverage the vulnerability to gain unauthorized access to sensitive information.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that the `docker-compose.yml` file is not deployed with the application or, at least, is not exposed in a web server directory by setting proper permissions on it. If sensitive information like credentials are leaked in the exposed file, they should be revoked and reset on the affected assets.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113168">https://www.tenable.com/plugins/was/113168</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Dockerfile Detected]]></title>
            <link>https://www.tenable.com/plugins/was/113123</link>
            <guid>https://www.tenable.com/plugins/was/113123</guid>
            <pubDate>Fri, 28 Mar 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113123 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Dockerfile Detected<br /></span>
      <h3>Description</h3>
      <span>Docker is one of the most popular platform using virtualization at the operating system level to deliver software in packages called containers. To take advantage of cloud based infrastructures, developers often build their applications on top of the microservices architecture pattern with one or multiple Docker containers, helping them to quickly build and deploy it to various environments.<br /></span><span><br /></span><span>Docker containers are based on a `Dockerfile` file describing the different steps to build the application and containing sometimes hardcoded secrets or other sensitive information. By accessing an exposed `Dockerfile`, an attacker could leverage the vulnerability to gain unauthorized access to one or multiple web application components.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that the `Dockerfile` file is not deployed with the application or, at least, is not exposed in a web server directory by setting proper permissions on it. Note that application secrets should not be directly defined in the `Dockerfile` file and should instead rely on Docker secrets management best practices.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113123">https://www.tenable.com/plugins/was/113123</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SSL/TLS Certificate Common Name Mismatch]]></title>
            <link>https://www.tenable.com/plugins/was/112541</link>
            <guid>https://www.tenable.com/plugins/was/112541</guid>
            <pubDate>Fri, 28 Mar 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112541 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>SSL/TLS Certificate Common Name Mismatch<br /></span>
      <h3>Description</h3>
      <span>The remote server presents a SSL/TLS certificate for which the Common Name and the Subject Alternative Name don't match the server's hostname.<br /></span>
      <h3>Solution</h3>
      <span>Purchase or generate a new SSL/TLS certificate with the right Common Name or Subject Alternative Name to replace the existing one.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112541">https://www.tenable.com/plugins/was/112541</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[External Broken Resources Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114386</link>
            <guid>https://www.tenable.com/plugins/was/114386</guid>
            <pubDate>Mon, 24 Mar 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114386 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>External Broken Resources Detected<br /></span>
      <h3>Description</h3>
      <span>Web applications heavily rely on external resources such as JavaScript files, Cascading Style Sheets (CSS) or images. When an application uses links which targets external resources which do not exist, an attacker could try gaining control over this resource to inject code in the target web application or get application users traffic on their malicious servers.<br /></span>
      <h3>Solution</h3>
      <span>Review broken resources and remove them from the target application. Before referencing external resources in a web application, ensure that the target resource exist and that the behavior is expected.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114386">https://www.tenable.com/plugins/was/114386</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Blind SQL Injection (differential analysis)]]></title>
            <link>https://www.tenable.com/plugins/was/98117</link>
            <guid>https://www.tenable.com/plugins/was/98117</guid>
            <pubDate>Tue, 18 Mar 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98117 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Blind SQL Injection (differential analysis)<br /></span>
      <h3>Description</h3>
      <span>Due to the requirement for dynamic content of today's web applications, many rely on a database backend to store data that will be called upon and processed by the web application (or other programs). Web applications retrieve data from the database by using Structured Query Language (SQL) queries.<br /></span><span><br /></span><span>To meet demands of many developers, database servers (such as MSSQL, MySQL, Oracle etc.) have additional built-in functionality that can allow extensive control of the database and interaction with the host operating system itself.<br /></span><span><br /></span><span>An SQL injection occurs when a value originating from the client's request is used within a SQL query without prior sanitisation. This could allow cyber-criminals to execute arbitrary SQL code and steal data or use the additional functionality of the database server to take control of more server components.<br /></span><span><br /></span><span>The successful exploitation of a SQL injection can be devastating to an organisation and is one of the most commonly exploited web application vulnerabilities.<br /></span><span><br /></span><span>This injection was detected as scanner was able to inject specific SQL queries, that if vulnerable, result in the responses for each injection being different. This is known as a blind SQL injection vulnerability.<br /></span>
      <h3>Solution</h3>
      <span>The only proven method to prevent against SQL injection attacks while still maintaining full application functionality is to use parameterized queries (also known as prepared statements). When utilising this method of querying the database, any value supplied by the client will be handled as a string value rather than part of the SQL query.<br /></span><span>Additionally, when utilising parameterized queries, the database engine will automatically check to make sure the string being used matches that of the column. For example, the database engine will check that the user supplied input is an integer if the database column is configured to contain integers.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98117">https://www.tenable.com/plugins/was/98117</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Docker Public Registry Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114621</link>
            <guid>https://www.tenable.com/plugins/was/114621</guid>
            <pubDate>Tue, 18 Mar 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114621 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Docker Public Registry Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational notice that the scanner was able to detect a public Docker registry instance.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that the public permissions applied on the detected registry are expected.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114621">https://www.tenable.com/plugins/was/114621</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache OFBiz < 18.12.11 Server-Side Request Forgery]]></title>
            <link>https://www.tenable.com/plugins/was/114400</link>
            <guid>https://www.tenable.com/plugins/was/114400</guid>
            <pubDate>Tue, 18 Mar 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114400 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Apache OFBiz < 18.12.11 Server-Side Request Forgery<br /></span>
      <h3>Description</h3>
      <span>Apache OFBiz versions prior to 18.12.11 suffers from a vulnerability allowing an unauthenticated attacker to perform a Server-Side Request Forgery via a specially forged request.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache OFBiz version 18.12.11 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114400">https://www.tenable.com/plugins/was/114400</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Cross-Site Scripting (XSS)]]></title>
            <link>https://www.tenable.com/plugins/was/98104</link>
            <guid>https://www.tenable.com/plugins/was/98104</guid>
            <pubDate>Tue, 11 Mar 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98104 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Cross-Site Scripting (XSS)<br /></span>
      <h3>Description</h3>
      <span>Client-side scripts are used extensively by modern web applications. They perform from simple functions (such as the formatting of text) up to full manipulation of client-side data and Operating System interaction.<br /></span><span><br /></span><span>Cross Site Scripting (XSS) allows clients to inject scripts into a request and have the server return the script to the client in the response. This occurs because the application is taking untrusted data (in this example, from the client) and reusing it without performing any validation or sanitisation.<br /></span><span><br /></span><span>If the injected script is returned immediately this is known as reflected XSS. If the injected script is stored by the server and returned to any client visiting the affected page, then this is known as persistent XSS (also stored XSS).<br /></span><span><br /></span><span>Scanner has discovered that it is possible to insert script content directly into HTML element content.<br /></span>
      <h3>Solution</h3>
      <span>To remedy XSS vulnerabilities, it is important to never use untrusted or unfiltered data within the code of a HTML page.<br /></span><span>Untrusted data can originate not only form the client but potentially a third party or previously uploaded file etc.<br /></span><span>Filtering of untrusted data typically involves converting special characters to their HTML entity encoded counterparts (however, other methods do exist, see references). These special characters include:<br /></span><span>* `&` * `<` * `>` * `'` * `'` * `/`<br /></span><span>An example of HTML entity encoding is converting `<` to `&lt;`.<br /></span><span>Although it is possible to filter untrusted input, there are five locations within an HTML page where untrusted input (even if it has been filtered) should never be placed:<br /></span><span>1. Directly in a script. 2. Inside an HTML comment. 3. In an attribute name. 4. In a tag name. 5. Directly in CSS.<br /></span><span>Each of these locations have their own form of escaping and filtering.<br /></span><span>_Because many browsers attempt to implement XSS protection, any manual verification of this finding should be conducted using multiple different browsers and browser versions._<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98104">https://www.tenable.com/plugins/was/98104</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[CraftCMS < 4.13.2 / 5.x < 5.5.2 Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/114614</link>
            <guid>https://www.tenable.com/plugins/was/114614</guid>
            <pubDate>Tue, 11 Mar 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114614 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>CraftCMS < 4.13.2 / 5.x < 5.5.2 Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>The version of CraftCMS installed on the remote host is vulnerable to a Remote Code Execution (RCE) via a specially forged request when the register_argc_argv php option is enabled.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to CraftCMS version 4.13.2, 5.5.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114614">https://www.tenable.com/plugins/was/114614</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[XML External Entity]]></title>
            <link>https://www.tenable.com/plugins/was/98113</link>
            <guid>https://www.tenable.com/plugins/was/98113</guid>
            <pubDate>Tue, 25 Feb 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98113 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>XML External Entity<br /></span>
      <h3>Description</h3>
      <span>An XML External Entity attack is a type of attack against an application that parses XML input.<br /></span><span><br /></span><span>This attack occurs when XML input containing a reference to an external entity is processed by a weakly configured XML parser.<br /></span><span><br /></span><span>This attack may lead to the disclosure of confidential data, denial of service, port scanning from the perspective of the machine where the parser is located, and other system impacts.<br /></span>
      <h3>Solution</h3>
      <span>Since the whole XML document is communicated from an untrusted client, it's not usually possible to selectively validate or escape tainted data within the system identifier in the DTD.<br /></span><span>Therefore, the XML processor should be configured to use a local static DTD and disallow any declared DTD included in the XML document.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98113">https://www.tenable.com/plugins/was/98113</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[CAPTCHA Detection]]></title>
            <link>https://www.tenable.com/plugins/was/98083</link>
            <guid>https://www.tenable.com/plugins/was/98083</guid>
            <pubDate>Tue, 25 Feb 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98083 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>CAPTCHA Detection<br /></span>
      <h3>Description</h3>
      <span>Detects any known CAPTCHA products being used on a page.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98083">https://www.tenable.com/plugins/was/98083</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[AngularJS Unsupported Version]]></title>
            <link>https://www.tenable.com/plugins/was/113078</link>
            <guid>https://www.tenable.com/plugins/was/113078</guid>
            <pubDate>Mon, 24 Feb 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113078 with High Severity</p>
      <h3>Synopsis</h3>
      <span>AngularJS Unsupported Version<br /></span>
      <h3>Description</h3>
      <span>The installation of AngularJS detected on the remote host is no longer supported. Lack of support implies that no new security patches for the product will be released by the vendor. As a result, it is likely to contain security vulnerabilities.<br /></span>
      <h3>Solution</h3>
      <span>Migrate to a supported version of Angular.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113078">https://www.tenable.com/plugins/was/113078</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Out-of-Date MediaElement.Js Detected]]></title>
            <link>https://www.tenable.com/plugins/was/113034</link>
            <guid>https://www.tenable.com/plugins/was/113034</guid>
            <pubDate>Wed, 12 Feb 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113034 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Out-of-Date MediaElement.Js Detected<br /></span>
      <h3>Description</h3>
      <span>An out-of-date version of MediaElement.Js has been detected. An outdated version could have vulnerabilities or missing security features.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to the latest version of MediaElement.Js.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113034">https://www.tenable.com/plugins/was/113034</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Out-of-Date JQuery UI Detected]]></title>
            <link>https://www.tenable.com/plugins/was/113031</link>
            <guid>https://www.tenable.com/plugins/was/113031</guid>
            <pubDate>Wed, 12 Feb 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113031 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Out-of-Date JQuery UI Detected<br /></span>
      <h3>Description</h3>
      <span>An out-of-date version of JQuery UI has been detected. An outdated version could have vulnerabilities or missing security features.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to the latest version of JQuery UI.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113031">https://www.tenable.com/plugins/was/113031</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[NoSQL Injection Authentication Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/113337</link>
            <guid>https://www.tenable.com/plugins/was/113337</guid>
            <pubDate>Wed, 29 Jan 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113337 with High Severity</p>
      <h3>Synopsis</h3>
      <span>NoSQL Injection Authentication Bypass<br /></span>
      <h3>Description</h3>
      <span>A NoSQL injection occurs when a value originating from the client's request is used within a NoSQL call without prior sanitisation.<br /></span><span><br /></span><span>This can allow cyber-criminals to execute arbitrary NoSQL code and thus steal data, or use the additional functionality of the database server to take control of further server components.<br /></span><span><br /></span><span>Scanner discovered that the affected page and parameter are vulnerable. This injection was detected as scanner was able to discover known error messages within the server's response.<br /></span>
      <h3>Solution</h3>
      <span>The most effective remediation against NoSQL injection attacks is to ensure that NoSQL API calls are not constructed via string concatenation that includes unsanitized data.<br /></span><span>Sanitization is best achieved using existing escaping libraries.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113337">https://www.tenable.com/plugins/was/113337</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[MySQLjs SQL Injection Authentication Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/113162</link>
            <guid>https://www.tenable.com/plugins/was/113162</guid>
            <pubDate>Wed, 29 Jan 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113162 with High Severity</p>
      <h3>Synopsis</h3>
      <span>MySQLjs SQL Injection Authentication Bypass<br /></span>
      <h3>Description</h3>
      <span>An SQL injection occurs when a value originating from the client's request is used within a SQL query without prior sanitisation. Typically, query escape functions or placeholders are known to prevent SQL injections. However, mysqljs/mysql is known to have different escape methods over different value types, and it could eventually cause unexpected behaviors when the attacker passes the parameter with a different value type.<br /></span><span><br /></span><span>This injection was detected as scanner was able to bypass the authentication mechanism and access an authenticated page.<br /></span>
      <h3>Solution</h3>
      <span>Add stringifyObjects option when calling createConnection, or adding a type control before the SQL query is executed.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113162">https://www.tenable.com/plugins/was/113162</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Blind NoSQL Injection (differential analysis)]]></title>
            <link>https://www.tenable.com/plugins/was/98119</link>
            <guid>https://www.tenable.com/plugins/was/98119</guid>
            <pubDate>Mon, 20 Jan 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98119 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Blind NoSQL Injection (differential analysis)<br /></span>
      <h3>Description</h3>
      <span>A NoSQL injection occurs when a value originating from the client's request is used within a NoSQL call without prior sanitisation.<br /></span><span><br /></span><span>This can allow cyber-criminals to execute arbitrary NoSQL code and thus steal data, or use the additional functionality of the database server to take control of further server components.<br /></span><span><br /></span><span>Scanner discovered that the affected page and parameter are vulnerable. This injection was detected as scanner was able to inject specific NoSQL queries that if vulnerable result in the responses for each injection being different. This is known as a blind NoSQL injection vulnerability.<br /></span>
      <h3>Solution</h3>
      <span>The most effective remediation against NoSQL injection attacks is to ensure that NoSQL API calls are not constructed via string concatenation that includes unsanitized data.<br /></span><span>Sanitization is best achieved using existing escaping libraries.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98119">https://www.tenable.com/plugins/was/98119</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Common Administration Interfaces Detection]]></title>
            <link>https://www.tenable.com/plugins/was/98070</link>
            <guid>https://www.tenable.com/plugins/was/98070</guid>
            <pubDate>Fri, 17 Jan 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98070 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Common Administration Interfaces Detection<br /></span>
      <h3>Description</h3>
      <span>Scanner detected a common administration interface.<br /></span>
      <h3>Solution</h3>
      <span>Access to administration interfaces should be restricted to trusted IP addresses only.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98070">https://www.tenable.com/plugins/was/98070</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[LayerSlider Plugin for WordPress 7.9.11 < 7.10.1 SQL Injection]]></title>
            <link>https://www.tenable.com/plugins/was/114258</link>
            <guid>https://www.tenable.com/plugins/was/114258</guid>
            <pubDate>Fri, 17 Jan 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114258 with High Severity</p>
      <h3>Synopsis</h3>
      <span>LayerSlider Plugin for WordPress 7.9.11 < 7.10.1 SQL Injection<br /></span>
      <h3>Description</h3>
      <span>The WordPress LayerSlider Plugin installed on the remote host is affected by an SQL Injection.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to LayerSlider Plugin for WordPress 7.10.1 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114258">https://www.tenable.com/plugins/was/114258</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Missing 'X-XSS-Protection' Header (deprecated)]]></title>
            <link>https://www.tenable.com/plugins/was/112526</link>
            <guid>https://www.tenable.com/plugins/was/112526</guid>
            <pubDate>Fri, 17 Jan 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112526 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Missing 'X-XSS-Protection' Header (deprecated)<br /></span>
      <h3>Description</h3>
      <span>The HTTP 'X-XSS-Protection' response header is a feature of old browsers that allows websites to control their XSS auditors.\n\nThe server is not configured to return a 'X-XSS-Protection' header which means that any pages on this website could be at risk of a Cross-Site Scripting (XSS) attack. This URL is flagged as a specific example.\n\nHowever, this header is deprecated by modern browsers, if legacy browsers support is not needed, it is recommended to use Content-Security-Policy without allowing unsafe-inline scripts instead.<br /></span>
      <h3>Solution</h3>
      <span>Configure your web server to include an 'X-XSS-Protection' header with a value of '1; mode=block' on all pages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112526">https://www.tenable.com/plugins/was/112526</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Common Files Detection]]></title>
            <link>https://www.tenable.com/plugins/was/98071</link>
            <guid>https://www.tenable.com/plugins/was/98071</guid>
            <pubDate>Thu, 09 Jan 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98071 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Common Files Detection<br /></span>
      <h3>Description</h3>
      <span>Scanner has detected common sensitive files on the remote web server.<br /></span><span><br /></span><span>Web applications are often made up of multiple files and directories. It is possible that over time some files may become unreferenced (unused) by the web application and forgotten about by the administrator or developer. Because web applications are built using common frameworks, they contain common files that can be discovered (independent of server).<br /></span><span><br /></span><span>During the initial reconnaissance stages of an attack, cyber-criminals will attempt to locate unreferenced files in the hope that the file will assist in further compromise of the web application. To achieve this, they will make thousands of requests using word lists containing common filenames. The response headers from the server will then indicate if the file exists.<br /></span>
      <h3>Solution</h3>
      <span>If files are unreferenced, then they should be removed from the web root and/or the application directory.<br /></span><span>Preventing access without authentication may also be an option and can stop a client from being able to view the contents of a file; however, it is still likely that the directory structure will be able to be discovered.<br /></span><span>Using obscure file names is implementing 'security through obscurity' and is not a recommended option.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98071">https://www.tenable.com/plugins/was/98071</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Struts < 6.4.0 Unrestricted File Upload (S2-067)]]></title>
            <link>https://www.tenable.com/plugins/was/114549</link>
            <guid>https://www.tenable.com/plugins/was/114549</guid>
            <pubDate>Tue, 07 Jan 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114549 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Struts < 6.4.0 Unrestricted File Upload (S2-067)<br /></span>
      <h3>Description</h3>
      <span>Apache Struts versions prior to 6.4.0 are vulnerable to an upload logic flaw allowing an attacker to manipulate file upload parameters to enable path traversal and under some circumstances this can lead to a remote code execution.<br /></span>
      <h3>Solution</h3>
      <span>Refer to the S2-067 vendor advisory for mitigation options.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114549">https://www.tenable.com/plugins/was/114549</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[DOM-based Cross-Site Scripting (XSS) in attribute context]]></title>
            <link>https://www.tenable.com/plugins/was/98110</link>
            <guid>https://www.tenable.com/plugins/was/98110</guid>
            <pubDate>Mon, 23 Dec 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98110 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>DOM-based Cross-Site Scripting (XSS) in attribute context<br /></span>
      <h3>Description</h3>
      <span>Client-side scripts are used extensively by modern web applications. They perform from simple functions (such as the formatting of text) up to full manipulation of client-side data and Operating System interaction.<br /></span><span><br /></span><span>Unlike traditional Cross-Site Scripting (XSS), where the client is able to inject scripts into a request and have the server return the script to the client, DOM XSS does not require that a request be sent to the server and may be abused entirely within the loaded page.<br /></span><span><br /></span><span>This occurs when elements of the DOM (known as the sources) are able to be manipulated to contain untrusted data, which the client-side scripts (known as the sinks) use or execute an unsafe way.<br /></span><span><br /></span><span>Scanner has discovered that by modifying the affected DOM source, it is possible to insert and execute JavaScript code.<br /></span>
      <h3>Solution</h3>
      <span>Client-side document rewriting, redirection, or other sensitive action, using untrusted data, should be avoided wherever possible, as these may not be inspected by server side filtering.<br /></span><span>To remedy DOM XSS vulnerabilities where these sensitive document actions must be used, it is essential to:<br /></span><span>1. Ensure any untrusted data is treated as text, as opposed to being interpreted as code or mark-up within the page. 2. Escape untrusted data prior to being used within the page. Escaping methods will vary depending on where the untrusted data is being used. (See references for details.) 3. Use `document.createElement`, `element.setAttribute`, `element.appendChild`, etc. to build dynamic interfaces as opposed to HTML rendering methods such as `document.write`, `document.writeIn`, `element.innerHTML`, or `element.outerHTML `etc.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98110">https://www.tenable.com/plugins/was/98110</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Cross-Site Scripting (XSS) in path]]></title>
            <link>https://www.tenable.com/plugins/was/98107</link>
            <guid>https://www.tenable.com/plugins/was/98107</guid>
            <pubDate>Mon, 23 Dec 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98107 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Cross-Site Scripting (XSS) in path<br /></span>
      <h3>Description</h3>
      <span>Client-side scripts are used extensively by modern web applications. They perform from simple functions (such as the formatting of text) up to full manipulation of client-side data and Operating System interaction.<br /></span><span><br /></span><span>Cross Site Scripting (XSS) allows clients to inject scripts into a request and have the server return the script to the client in the response. This occurs because the application is taking untrusted data (in this example, from the client) and reusing it without performing any validation or sanitisation.<br /></span><span><br /></span><span>If the injected script is returned immediately this is known as reflected XSS. If the injected script is stored by the server and returned to any client visiting the affected page, then this is known as persistent XSS (also stored XSS).<br /></span><span><br /></span><span>Scanner has discovered that it is possible to insert script content directly into the requested PATH and have it returned in the server's response. For example `HTTP://yoursite.com/INJECTION_HERE/`, where `INJECTION_HERE` represents the location where the scanner payload was injected.<br /></span>
      <h3>Solution</h3>
      <span>To remedy XSS vulnerabilities, it is important to never use untrusted or unfiltered data within the code of a HTML page.<br /></span><span>Untrusted data can originate not only form the client but potentially a third party or previously uploaded file etc.<br /></span><span>Filtering of untrusted data typically involves converting special characters to their HTML entity encoded counterparts (however, other methods do exist, see references). These special characters include:<br /></span><span>* `&` * `<` * `>` * `'` * `'` * `/`<br /></span><span>An example of HTML entity encoding is converting `<` to `&lt;`.<br /></span><span>Although it is possible to filter untrusted input, there are five locations within an HTML page where untrusted input (even if it has been filtered) should never be placed:<br /></span><span>1. Directly in a script. 2. Inside an HTML comment. 3. In an attribute name. 4. In a tag name. 5. Directly in CSS.<br /></span><span>Each of these locations have their own form of escaping and filtering.<br /></span><span>_Because many browsers attempt to implement XSS protection, any manual verification of this finding should be conducted using multiple different browsers and browser versions._<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98107">https://www.tenable.com/plugins/was/98107</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Struts 2.1.6 < 2.3.34 / 2.5 < 2.5.13 Remote Code Execution (S2-052)]]></title>
            <link>https://www.tenable.com/plugins/was/112763</link>
            <guid>https://www.tenable.com/plugins/was/112763</guid>
            <pubDate>Thu, 19 Dec 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112763 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Struts 2.1.6 < 2.3.34 / 2.5 < 2.5.13 Remote Code Execution (S2-052)<br /></span>
      <h3>Description</h3>
      <span>The REST Plugin in Apache Struts 2.1.6 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type filtering, which can lead to Remote Code Execution when deserializing XML payloads.<br /></span>
      <h3>Solution</h3>
      <span>Refer to the S2-052 vendor advisory for mitigation options.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112763">https://www.tenable.com/plugins/was/112763</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Struts 2 < 2.3.33 Remote Code Execution (S2-048)]]></title>
            <link>https://www.tenable.com/plugins/was/112762</link>
            <guid>https://www.tenable.com/plugins/was/112762</guid>
            <pubDate>Thu, 19 Dec 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112762 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Struts 2 < 2.3.33 Remote Code Execution (S2-048)<br /></span>
      <h3>Description</h3>
      <span>The Struts 1 plugin in Apache Struts 2 < 2.3.33 might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage class.<br /></span>
      <h3>Solution</h3>
      <span>Refer to the S2-048 vendor advisory for mitigation options.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112762">https://www.tenable.com/plugins/was/112762</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Struts 2 Demo Application Detected]]></title>
            <link>https://www.tenable.com/plugins/was/112760</link>
            <guid>https://www.tenable.com/plugins/was/112760</guid>
            <pubDate>Thu, 19 Dec 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112760 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Struts 2 Demo Application Detected<br /></span>
      <h3>Description</h3>
      <span>The scanner has detected a publicly accessible Apache Struts 2 default demo application.<br /></span><span><br /></span><span>Known and unknown vulnerabilities could be more easily exploited via this kind of application.<br /></span>
      <h3>Solution</h3>
      <span>Delete the demo application or restrict access using a .htaccess file, limiting access to known IP Addresses.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112760">https://www.tenable.com/plugins/was/112760</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Struts 2 < 2.3.29 DevMode Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/112742</link>
            <guid>https://www.tenable.com/plugins/was/112742</guid>
            <pubDate>Thu, 19 Dec 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112742 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Struts 2 < 2.3.29 DevMode Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>Apache Struts 2 installed on the remote host is configured to operate in development mode (DevMode) and is in a version less than or equal to 2.3.29. While this environment can help speed up development of web applications, it is possible to abuse this mode to run arbitrary commands on the server.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Struts 2 2.3.29 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112742">https://www.tenable.com/plugins/was/112742</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Struts 2.x < 2.3.15.1 Remote Code Execution (S2-016)]]></title>
            <link>https://www.tenable.com/plugins/was/112741</link>
            <guid>https://www.tenable.com/plugins/was/112741</guid>
            <pubDate>Thu, 19 Dec 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112741 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Struts 2.x < 2.3.15.1 Remote Code Execution (S2-016)<br /></span>
      <h3>Description</h3>
      <span>Apache Struts 2.x to 2.3.15 allows remote attackers to execute arbitrary OGNL expressions via a parameter with a crafted 'action:', 'redirect:', or 'redirectAction:' prefix.<br /></span><span><br /></span><span>This mechanism was intended to help with attaching navigational information to buttons within forms.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Struts 2 2.3.15.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112741">https://www.tenable.com/plugins/was/112741</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Struts 2.0.4 < 2.3.35 / 2.5.x < 2.5.17 Remote Code Execution (S2-057)]]></title>
            <link>https://www.tenable.com/plugins/was/112727</link>
            <guid>https://www.tenable.com/plugins/was/112727</guid>
            <pubDate>Thu, 19 Dec 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112727 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Struts 2.0.4 < 2.3.35 / 2.5.x < 2.5.17 Remote Code Execution (S2-057)<br /></span>
      <h3>Description</h3>
      <span>Apache Struts versions 2 2.0.4 to 2.3.34 and 2.5.x to 2.5.16 suffer from possible Remote Code Execution when alwaysSelectFullNamespace is true (either by user or a plugin like Convention Plugin) and then :<br /></span><span><br /></span><span>- results are used with no namespace and in same time<br /></span><span><br /></span><span>- its upper package have no or wildcard namespace<br /></span><span><br /></span><span>Or similar to results, same possibility when using url tag which doesn't have value and action set and in same time, its upper package have no or wildcard namespace.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Struts 2 2.3.35, 2.5.17 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112727">https://www.tenable.com/plugins/was/112727</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Struts 2.3.5 < 2.3.32 / 2.5.x < 2.5.10.1 Remote Code Execution (S2-045 / S2-046)]]></title>
            <link>https://www.tenable.com/plugins/was/112726</link>
            <guid>https://www.tenable.com/plugins/was/112726</guid>
            <pubDate>Thu, 19 Dec 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112726 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Struts 2.3.5 < 2.3.32 / 2.5.x < 2.5.10.1 Remote Code Execution (S2-045 / S2-046)<br /></span>
      <h3>Description</h3>
      <span>The Jakarta Multipart parser in Apache Struts 2 2.3.5 to 2.3.31 and 2.5.x to 2.5.10 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Struts 2 2.3.32, 2.5.10.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112726">https://www.tenable.com/plugins/was/112726</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Client-Side Prototype Pollution]]></title>
            <link>https://www.tenable.com/plugins/was/112719</link>
            <guid>https://www.tenable.com/plugins/was/112719</guid>
            <pubDate>Thu, 19 Dec 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112719 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Client-Side Prototype Pollution<br /></span>
      <h3>Description</h3>
      <span>Prototype-based programming languages rely on the process of defining objects used as prototypes to be then extended or cloned in order to create new objects. Once instantiated, these objects will inherit from the properties and methods of their prototype.<br /></span><span><br /></span><span>JavaScript is one of the most common prototype-based language in modern web applications, on both server-side and client-side components. Nearly all the JavaScript objects are instances of Object, making them inherit from the properties and methods of the Object prototype.<br /></span><span><br /></span><span>A client-side prototype pollution vulnerability exists when an attacker is able to modify the properties of the Object prototype in the context of the web browser, exposing the application users to further issues like Cross-Site Scripting or Denial of Service attacks.<br /></span>
      <h3>Solution</h3>
      <span>The inputs should be properly sanitized to prevent the Object prototype from being modified when trying to leverage on the properties like prototype or constructor during some operations (like merging or cloning objects). JavaScript objects can also be explicitly instantiated without a prototype by using the Object.create(null) constructor. Finally, prefer using a Map object as a key and value storage as it will not contain the Objects prototype keys, thus preventing the pollution to occur.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112719">https://www.tenable.com/plugins/was/112719</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[CyberPanel < 2.3.8 Remote Command Execution]]></title>
            <link>https://www.tenable.com/plugins/was/114469</link>
            <guid>https://www.tenable.com/plugins/was/114469</guid>
            <pubDate>Tue, 10 Dec 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114469 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>CyberPanel < 2.3.8 Remote Command Execution<br /></span>
      <h3>Description</h3>
      <span>CyberPanel version prior to 2.3.8 are affected by a vulnerability allowing an unauthenticated attacker to execute commands on the remote machine via a specially forged request.<br /></span>
      <h3>Solution</h3>
      <span>Update to CyberPanel version 2.3.8 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114469">https://www.tenable.com/plugins/was/114469</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Private IP Address Disclosure]]></title>
            <link>https://www.tenable.com/plugins/was/98077</link>
            <guid>https://www.tenable.com/plugins/was/98077</guid>
            <pubDate>Tue, 03 Dec 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98077 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Private IP Address Disclosure<br /></span>
      <h3>Description</h3>
      <span>Private, or non-routable, IP addresses are generally used within a home or company network and are typically unknown to anyone outside of that network.<br /></span><span><br /></span><span>Cyber-criminals will attempt to identify the private IP address range being used by their victim, to aid in collecting further information that could then lead to a possible compromise.<br /></span><span><br /></span><span>Scanner discovered that the affected page returned a RFC 1918 compliant private IP address and therefore could be revealing sensitive information.<br /></span><span><br /></span><span>This finding typically requires manual verification to ensure the context is correct, as any private IP address within the HTML body will trigger it.<br /></span>
      <h3>Solution</h3>
      <span>Identifying the context in which the affected page displays a Private IP address is necessary.<br /></span><span>If the page is publicly accessible and displays the Private IP of the affected server (or supporting infrastructure), then measures should be put in place to ensure that the IP address is removed from any response.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98077">https://www.tenable.com/plugins/was/98077</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Insecure Cross-Domain Policy (allow-http-request-headers-from)]]></title>
            <link>https://www.tenable.com/plugins/was/98068</link>
            <guid>https://www.tenable.com/plugins/was/98068</guid>
            <pubDate>Tue, 26 Nov 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98068 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>Insecure Cross-Domain Policy (allow-http-request-headers-from)<br /></span>
      <h3>Description</h3>
      <span>The browser security model normally prevents web content from one domain from accessing data from another domain. This is commonly known as the "same origin policy".<br /></span><span><br /></span><span>URL policy files grant cross-domain permissions for reading data. They permit operations that are not permitted by default. The URL policy file for Silverlight is located, by default, in the root directory of the target server, with the name `crossdomain.xml` (for example, at `www.example.com/crossdomain.xml`).<br /></span><span><br /></span><span>When a domain is specified in `crossdomain.xml`, the site declares that it is willing to allow the operators of any servers in that domain to obtain any document on the server where the policy file resides.<br /></span><span><br /></span><span>The `crossdomain.xml` file deployed on this website opens the server to all domains (use of a single asterisk "*" as a pure wildcard is supported).<br /></span>
      <h3>Solution</h3>
      <span>Carefully evaluate which sites will be allowed to make cross-domain calls.<br /></span><span>Consider network topology and any authentication mechanisms that will be affected by the configuration or implementation of the cross-domain policy.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98068">https://www.tenable.com/plugins/was/98068</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Insecure Cross-Domain Policy (allow-access-from)]]></title>
            <link>https://www.tenable.com/plugins/was/98067</link>
            <guid>https://www.tenable.com/plugins/was/98067</guid>
            <pubDate>Tue, 26 Nov 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98067 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>Insecure Cross-Domain Policy (allow-access-from)<br /></span>
      <h3>Description</h3>
      <span>The browser security model normally prevents web content from one domain from accessing data from another domain. This is commonly known as the "same origin policy".<br /></span><span><br /></span><span>URL policy files grant cross-domain permissions for reading data. They permit operations that are not permitted by default. The URL policy file for Silverlight is located, by default, in the root directory of the target server, with the name `crossdomain.xml` (for example, at `www.example.com/crossdomain.xml`).<br /></span><span><br /></span><span>When a domain is specified in `crossdomain.xml`, the site declares that it is willing to allow the operators of any servers in that domain to obtain any document on the server where the policy file resides.<br /></span><span><br /></span><span>The `crossdomain.xml` file deployed on this website opens the server to all domains (use of a single asterisk "*" as a pure wildcard is supported).<br /></span>
      <h3>Solution</h3>
      <span>Carefully evaluate which sites will be allowed to make cross-domain calls.<br /></span><span>Consider network topology and any authentication mechanisms that will be affected by the configuration or implementation of the cross-domain policy.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98067">https://www.tenable.com/plugins/was/98067</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Virtual Hosts Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114503</link>
            <guid>https://www.tenable.com/plugins/was/114503</guid>
            <pubDate>Tue, 26 Nov 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114503 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Virtual Hosts Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational plugin to inform the user that the scanner detected the presence of one or multiple virtual hosts on the target server.<br /></span>
      <h3>Solution</h3>
      <span>Review all the detected virtual hosts to ensure they are expected to be externally reachable.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114503">https://www.tenable.com/plugins/was/114503</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Symfony < 5.4.46 / 6.x < 6.4.14 / 7.x < 7.1.7 Improper Input Handling]]></title>
            <link>https://www.tenable.com/plugins/was/114497</link>
            <guid>https://www.tenable.com/plugins/was/114497</guid>
            <pubDate>Wed, 20 Nov 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114497 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Symfony < 5.4.46 / 6.x < 6.4.14 / 7.x < 7.1.7 Improper Input Handling<br /></span>
      <h3>Description</h3>
      <span>Symfony versions prior to 5.4.46 or 6.x prior to 6.4.14 or 7.x prior to 7.1.7 is vulnerable when the register_argc_argv php directive is set to 'on' and users call any URL with a special crafted query string, they are able to change the environment or debug mode used by the kernel when handling the request.<br /></span><span><br /></span><span>Note that since the vulnerable Symfony component is embedded in Laravel, the plugin is likely to detect a vulnerable Laravel instance.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Symfony version 5.4.46 or 6.4.14 or 7.1.7 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114497">https://www.tenable.com/plugins/was/114497</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Node-config Configuration File Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114143</link>
            <guid>https://www.tenable.com/plugins/was/114143</guid>
            <pubDate>Wed, 20 Nov 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114143 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Node-config Configuration File Detected<br /></span>
      <h3>Description</h3>
      <span>Node-config is a Node.js module providing hierarchical configurations to help with web applications deployments. By defining one or more configuration files in their application project 'config' directory or in a custom location, developers can define various configuration variables to be used in the different application environments.<br /></span><span><br /></span><span>By accessing an exposed configuration file, an attacker could leverage the vulnerability to gain unauthorized access to sensitive information.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that the file(s) found are not deployed with the application or, at least, is not exposed in a web server directory by setting proper permissions on it. If sensitive information like credentials are leaked in the exposed file, they should be revoked and reset on the affected assets.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114143">https://www.tenable.com/plugins/was/114143</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[GraphQL Cross-Site Request Forgery]]></title>
            <link>https://www.tenable.com/plugins/was/112920</link>
            <guid>https://www.tenable.com/plugins/was/112920</guid>
            <pubDate>Thu, 14 Nov 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112920 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>GraphQL Cross-Site Request Forgery<br /></span>
      <h3>Description</h3>
      <span>GraphQL is an open-source query and manipulation language for APIs and a server-side runtime built to handle these queries on the application dataset. GraphQL servers often allow other `Content-Type` header values than `application/json`, and GET based requests for both queries and mutations. By leveraging this, an attacker could achieve a Cross-Site Request Forgery (CSRF) attack and make an authenticated user perform arbitrary actions on the target GraphQL endpoint.<br /></span>
      <h3>Solution</h3>
      <span>The application should be updated to provide at least anti-CSRF tokens management on GraphQL endpoints and set the `SameSite` attribute to `Lax` on authentication cookies. Avoid using GET method in requests performing changing operations on the target application.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112920">https://www.tenable.com/plugins/was/112920</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[ASP.NET DEBUG Method Enabled]]></title>
            <link>https://www.tenable.com/plugins/was/112353</link>
            <guid>https://www.tenable.com/plugins/was/112353</guid>
            <pubDate>Thu, 14 Nov 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112353 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>ASP.NET DEBUG Method Enabled<br /></span>
      <h3>Description</h3>
      <span>It is possible to send debug statements to the remote ASP scripts via the http DEBUG method. A remote, unauthenticated attacker may leverage this to alter the runtime of the remote scripts.<br /></span>
      <h3>Solution</h3>
      <span>Make sure that DEBUG statements are disabled or only usable by authenticated users.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112353">https://www.tenable.com/plugins/was/112353</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Path Relative Stylesheet Import]]></title>
            <link>https://www.tenable.com/plugins/was/114466</link>
            <guid>https://www.tenable.com/plugins/was/114466</guid>
            <pubDate>Fri, 08 Nov 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114466 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Path Relative Stylesheet Import<br /></span>
      <h3>Description</h3>
      <span>A Path Relative Style Sheet Import occurs when the application imports a style sheet via a relative URL and uses user input in the file name. This vulnerability mainly affects older browsers such as Internet Explorer and allows an attacker to exploit the way the browser handles stylesheet imports in order to perform CSS Injection.<br /></span>
      <h3>Solution</h3>
      <span>It is preferable not to use path-related URLs in stylesheet imports, and also to use the 'X-Content-Type-Options: nosnif' and 'X-Frame-Options: deny' headers.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114466">https://www.tenable.com/plugins/was/114466</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[HTML Comments Detected]]></title>
            <link>https://www.tenable.com/plugins/was/113897</link>
            <guid>https://www.tenable.com/plugins/was/113897</guid>
            <pubDate>Fri, 08 Nov 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113897 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>HTML Comments Detected<br /></span>
      <h3>Description</h3>
      <span>HTML comments are often used by developers to include information related to the application inline, which are ignored by a clients browser during rendering. These comments may include sensitive information such as SQL queries, credentials or internal IP for example.<br /></span>
      <h3>Solution</h3>
      <span>Review the HTML comments identified on the page for any information leakage, and remove any sensitive information identified.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113897">https://www.tenable.com/plugins/was/113897</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SonarQube Public Projects Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114468</link>
            <guid>https://www.tenable.com/plugins/was/114468</guid>
            <pubDate>Tue, 05 Nov 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114468 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>SonarQube Public Projects Detected<br /></span>
      <h3>Description</h3>
      <span>A SonarQube Public Projects response have been detected on the target web application. These response may contain sensitive information which could assist an attack to conduct further attacks.<br /></span>
      <h3>Solution</h3>
      <span>Restrict access to the public projects endpoint or remove it.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114468">https://www.tenable.com/plugins/was/114468</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WooCommerce Payments Plugin for WordPress 4.8.x < 4.8.2 Authentication Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/114040</link>
            <guid>https://www.tenable.com/plugins/was/114040</guid>
            <pubDate>Mon, 21 Oct 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114040 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>WooCommerce Payments Plugin for WordPress 4.8.x < 4.8.2 Authentication Bypass<br /></span>
      <h3>Description</h3>
      <span>The WooCommerce Payments Plugin installed on the remote host is affected by an authentication bypass vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to WooCommerce Payments Plugin for WordPress 4.8.2 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114040">https://www.tenable.com/plugins/was/114040</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WooCommerce Payments Plugin for WordPress 4.9.x < 4.9.1 Authentication Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/114039</link>
            <guid>https://www.tenable.com/plugins/was/114039</guid>
            <pubDate>Mon, 21 Oct 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114039 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>WooCommerce Payments Plugin for WordPress 4.9.x < 4.9.1 Authentication Bypass<br /></span>
      <h3>Description</h3>
      <span>The WooCommerce Payments Plugin installed on the remote host is affected by an authentication bypass vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to WooCommerce Payments Plugin for WordPress 4.9.1 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114039">https://www.tenable.com/plugins/was/114039</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WooCommerce Payments Plugin for WordPress 5.0.x < 5.0.4 Authentication Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/114038</link>
            <guid>https://www.tenable.com/plugins/was/114038</guid>
            <pubDate>Mon, 21 Oct 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114038 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>WooCommerce Payments Plugin for WordPress 5.0.x < 5.0.4 Authentication Bypass<br /></span>
      <h3>Description</h3>
      <span>The WooCommerce Payments Plugin installed on the remote host is affected by an authentication bypass vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to WooCommerce Payments Plugin for WordPress 5.0.4 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114038">https://www.tenable.com/plugins/was/114038</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WooCommerce Payments Plugin for WordPress 5.1.x < 5.1.3 Authentication Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/114037</link>
            <guid>https://www.tenable.com/plugins/was/114037</guid>
            <pubDate>Mon, 21 Oct 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114037 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>WooCommerce Payments Plugin for WordPress 5.1.x < 5.1.3 Authentication Bypass<br /></span>
      <h3>Description</h3>
      <span>The WooCommerce Payments Plugin installed on the remote host is affected by an authentication bypass vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to WooCommerce Payments Plugin for WordPress 5.1.3 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114037">https://www.tenable.com/plugins/was/114037</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WooCommerce Payments Plugin for WordPress 5.2.x < 5.2.2 Authentication Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/114036</link>
            <guid>https://www.tenable.com/plugins/was/114036</guid>
            <pubDate>Mon, 21 Oct 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114036 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>WooCommerce Payments Plugin for WordPress 5.2.x < 5.2.2 Authentication Bypass<br /></span>
      <h3>Description</h3>
      <span>The WooCommerce Payments Plugin installed on the remote host is affected by an authentication bypass vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to WooCommerce Payments Plugin for WordPress 5.2.2 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114036">https://www.tenable.com/plugins/was/114036</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WooCommerce Payments Plugin for WordPress 5.3.x < 5.3.1 Authentication Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/114035</link>
            <guid>https://www.tenable.com/plugins/was/114035</guid>
            <pubDate>Mon, 21 Oct 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114035 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>WooCommerce Payments Plugin for WordPress 5.3.x < 5.3.1 Authentication Bypass<br /></span>
      <h3>Description</h3>
      <span>The WooCommerce Payments Plugin installed on the remote host is affected by an authentication bypass vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to WooCommerce Payments Plugin for WordPress 5.3.1 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114035">https://www.tenable.com/plugins/was/114035</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WooCommerce Payments Plugin for WordPress 5.4.x < 5.4.1 Authentication Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/114034</link>
            <guid>https://www.tenable.com/plugins/was/114034</guid>
            <pubDate>Mon, 21 Oct 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114034 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>WooCommerce Payments Plugin for WordPress 5.4.x < 5.4.1 Authentication Bypass<br /></span>
      <h3>Description</h3>
      <span>The WooCommerce Payments Plugin installed on the remote host is affected by an authentication bypass vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to WooCommerce Payments Plugin for WordPress 5.4.1 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114034">https://www.tenable.com/plugins/was/114034</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WooCommerce Payments Plugin for WordPress 5.5.x < 5.5.2 Authentication Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/114033</link>
            <guid>https://www.tenable.com/plugins/was/114033</guid>
            <pubDate>Mon, 21 Oct 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114033 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>WooCommerce Payments Plugin for WordPress 5.5.x < 5.5.2 Authentication Bypass<br /></span>
      <h3>Description</h3>
      <span>The WooCommerce Payments Plugin installed on the remote host is affected by an authentication bypass vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to WooCommerce Payments Plugin for WordPress 5.5.2 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114033">https://www.tenable.com/plugins/was/114033</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WooCommerce Payments Plugin for WordPress 6.2.x < 6.2.2 Authentication Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/114032</link>
            <guid>https://www.tenable.com/plugins/was/114032</guid>
            <pubDate>Mon, 21 Oct 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114032 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>WooCommerce Payments Plugin for WordPress 6.2.x < 6.2.2 Authentication Bypass<br /></span>
      <h3>Description</h3>
      <span>The WooCommerce Payments Plugin installed on the remote host is affected by an authentication bypass vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to WooCommerce Payments Plugin for WordPress 6.2.2 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114032">https://www.tenable.com/plugins/was/114032</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WooCommerce Payments Plugin for WordPress 6.3.x < 6.3.2 Authentication Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/114031</link>
            <guid>https://www.tenable.com/plugins/was/114031</guid>
            <pubDate>Mon, 21 Oct 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114031 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>WooCommerce Payments Plugin for WordPress 6.3.x < 6.3.2 Authentication Bypass<br /></span>
      <h3>Description</h3>
      <span>The WooCommerce Payments Plugin installed on the remote host is affected by an authentication bypass vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to WooCommerce Payments Plugin for WordPress 6.3.2 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114031">https://www.tenable.com/plugins/was/114031</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WooCommerce Payments Plugin for WordPress 5.6.x < 5.6.2 Authentication Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/113838</link>
            <guid>https://www.tenable.com/plugins/was/113838</guid>
            <pubDate>Mon, 21 Oct 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113838 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>WooCommerce Payments Plugin for WordPress 5.6.x < 5.6.2 Authentication Bypass<br /></span>
      <h3>Description</h3>
      <span>The WooCommerce Payments Plugin installed on the remote host is affected by an authentication bypass vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to WooCommerce Payments Plugin for WordPress 5.6.2 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113838">https://www.tenable.com/plugins/was/113838</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Express.js Cookie-Session Weak Secret Key]]></title>
            <link>https://www.tenable.com/plugins/was/114439</link>
            <guid>https://www.tenable.com/plugins/was/114439</guid>
            <pubDate>Thu, 03 Oct 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114439 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Express.js Cookie-Session Weak Secret Key<br /></span>
      <h3>Description</h3>
      <span>Express.js applications with Cookie-Session use an application key to encrypt and sign various data, including session cookies and other sensitive information. This key is typically stored in an environment variable and is used for multiple security-critical operations.<br /></span><span><br /></span><span>When a weak or easily guessable application key is used, it compromises the security of the entire application. Attackers can potentially decrypt sensitive data, forge valid session cookies, or even execute remote code in some scenarios.<br /></span>
      <h3>Solution</h3>
      <span>The secret key used to sign the cookies in the application must be stronger (long and random) to prevent it from being retrieved with a bruteforce attack.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114439">https://www.tenable.com/plugins/was/114439</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Performance Telemetry]]></title>
            <link>https://www.tenable.com/plugins/was/113393</link>
            <guid>https://www.tenable.com/plugins/was/113393</guid>
            <pubDate>Thu, 03 Oct 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113393 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Performance Telemetry<br /></span>
      <h3>Description</h3>
      <span>This finding provides information to assist in scan performance tuning.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113393">https://www.tenable.com/plugins/was/113393</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Full Path Disclosure]]></title>
            <link>https://www.tenable.com/plugins/was/112550</link>
            <guid>https://www.tenable.com/plugins/was/112550</guid>
            <pubDate>Thu, 03 Oct 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112550 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Full Path Disclosure<br /></span>
      <h3>Description</h3>
      <span>The remote web server contains an application which is affected by a path disclosure issue. It may be possible for an attacker to view full path names and conduct further attacks.<br /></span>
      <h3>Solution</h3>
      <span>Disable all notice, warning and error displaying.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112550">https://www.tenable.com/plugins/was/112550</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unrestricted File Upload]]></title>
            <link>https://www.tenable.com/plugins/was/114283</link>
            <guid>https://www.tenable.com/plugins/was/114283</guid>
            <pubDate>Thu, 26 Sep 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114283 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Unrestricted File Upload<br /></span>
      <h3>Description</h3>
      <span>Unrestricted file upload vulnerability occurs when the application suffers from a lack of validation of files being uploaded to its filesystem. When an attacker is able to upload files not matching the application expectations in terms of names, type, content or size, it could lead to various issues such as arbitrary files overwrite, denial of service or even remote code execution.<br /></span><span><br /></span><span>Note that this plugin requires the 'File Upload' assessment option enabled in the scan configuration.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that all controls apply on the file being uploaded :  - Implement an allowlist of the accepted file extensions and ensure that it cannot be bypassed.  - Ensure that the permissions applied on the uploaded file are set to the strict minimum and prevents execution.  - Ensure that the filename does not contain any substring that could be used by the function writing the file as a directory traversal pattern.  - Rename the uploaded files to avoid overwriting local system files.  - Ensure that the file size is acceptable and not too big, to avoid service disruption due to disk space consumption or overbilling when using cloud services.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114283">https://www.tenable.com/plugins/was/114283</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Ivanti EPM RecordGoodApp SQL Injection]]></title>
            <link>https://www.tenable.com/plugins/was/114433</link>
            <guid>https://www.tenable.com/plugins/was/114433</guid>
            <pubDate>Tue, 24 Sep 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114433 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Ivanti EPM RecordGoodApp SQL Injection<br /></span>
      <h3>Description</h3>
      <span>Ivanti Endpoint Manager (EPM) versions 2022 SU5 and below suffer from a SQL Injection vulnerability. By exploiting this vulnerability, a remote and unauthenticated attacker can achieve Remote Code Execution (RCE) on the affected system.<br /></span>
      <h3>Solution</h3>
      <span>Apply the security hotfix provided by Ivanti for version 2022 SU5 or upgrade to latest version which already includes the fix.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114433">https://www.tenable.com/plugins/was/114433</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Nginx < 1.2.9 ngx_http_proxy_module.c Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/98951</link>
            <guid>https://www.tenable.com/plugins/was/98951</guid>
            <pubDate>Fri, 06 Sep 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98951 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Nginx < 1.2.9 ngx_http_proxy_module.c Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its Server response header, the installed version of nginx is greater than or equal to 1.1.4 and prior to 1.2.9, or greater than or equal to 1.3.0 and prior to 1.4.1. It is, therefore, affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A stack-based buffer overflow in 'ngx_http_parse.c' may allow a remote attacker to execute arbitrary code or trigger a denial of service condition via a specially crafted HTTP request. This vulnerability only affects versions greater than or equal to 1.3.9 and less than 1.4.1. (CVE-2013-2028)<br /></span><span><br /></span><span> - A memory disclosure vulnerability in 'ngx_http_parse.c' affects servers that use 'proxy_pass' to untrusted upstream servers. This issue can be triggered by a remote attacker via a specially crafted HTTP request. Failed attempts may result in a denial of service condition. (CVE-2013-2070)<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to nginx 1.2.9 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98951">https://www.tenable.com/plugins/was/98951</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Nginx < 1.4.1 ngx_http_proxy_module.c Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/98950</link>
            <guid>https://www.tenable.com/plugins/was/98950</guid>
            <pubDate>Fri, 06 Sep 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98950 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Nginx < 1.4.1 ngx_http_proxy_module.c Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its Server response header, the installed version of nginx is greater than or equal to 1.1.4 and prior to 1.2.9, or greater than or equal to 1.3.0 and prior to 1.4.1. It is, therefore, affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A stack-based buffer overflow in 'ngx_http_parse.c' may allow a remote attacker to execute arbitrary code or trigger a denial of service condition via a specially crafted HTTP request. This vulnerability only affects versions greater than or equal to 1.3.9 and less than 1.4.1. (CVE-2013-2028)<br /></span><span><br /></span><span> - A memory disclosure vulnerability in 'ngx_http_parse.c' affects servers that use 'proxy_pass' to untrusted upstream servers. This issue can be triggered by a remote attacker via a specially crafted HTTP request. Failed attempts may result in a denial of service condition. (CVE-2013-2070)<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to nginx 1.4.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98950">https://www.tenable.com/plugins/was/98950</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Confluence 8.6.x < 8.9.1 Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/114379</link>
            <guid>https://www.tenable.com/plugins/was/114379</guid>
            <pubDate>Fri, 06 Sep 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114379 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Confluence 8.6.x < 8.9.1 Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Atlassian Confluence application running on the remote host is prior to 7.19.22, 7.20.x prior to 8.5.9 or 8.6.x prior to 8.9.1. It is, therefore, affected by a stored Cross-Site Scripting (XSS) vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Confluence version 8.9.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114379">https://www.tenable.com/plugins/was/114379</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Confluence 7.20.x < 8.5.9 Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/114378</link>
            <guid>https://www.tenable.com/plugins/was/114378</guid>
            <pubDate>Fri, 06 Sep 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114378 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Confluence 7.20.x < 8.5.9 Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Atlassian Confluence application running on the remote host is prior to 7.19.22, 7.20.x prior to 8.5.9 or 8.6.x prior to 8.9.1. It is, therefore, affected by a stored Cross-Site Scripting (XSS) vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Confluence version 8.5.9 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114378">https://www.tenable.com/plugins/was/114378</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Confluence < 7.19.22 Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/114377</link>
            <guid>https://www.tenable.com/plugins/was/114377</guid>
            <pubDate>Fri, 06 Sep 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114377 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Confluence < 7.19.22 Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Atlassian Confluence application running on the remote host is prior to 7.19.22, 7.20.x prior to 8.5.9 or 8.6.x prior to 8.9.1. It is, therefore, affected by a stored Cross-Site Scripting (XSS) vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Confluence version 7.19.22 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114377">https://www.tenable.com/plugins/was/114377</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Joomla! 3.x < 3.10.16 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114375</link>
            <guid>https://www.tenable.com/plugins/was/114375</guid>
            <pubDate>Fri, 06 Sep 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114375 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Joomla! 3.x < 3.10.16 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the instance of Joomla! running on the remote web server is 3.x prior to 3.10.16, 4.x prior to 4.4.6 or 5.x prior to 5.1.2. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span> - Inadequate input validation leads to XSS vulnerabilities in the accessiblemedia field. (CVE-2024-21729)<br /></span><span><br /></span><span> - The fancyselect list field layout does not correctly escape inputs, leading to a self-XSS vector. (CVE-2024-21730)<br /></span><span><br /></span><span> - Improper handling of input could lead to an XSS vector in the StringHelper::truncate method. (CVE-2024-21731)<br /></span><span><br /></span><span> - The wrapper extensions do not correctly validate inputs, leading to XSS vectors. (CVE-2024-26279)<br /></span><span><br /></span><span> - The Custom Fields component not correctly filter inputs, leading to a XSS vector. (CVE-2024-26278)<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Joomla! version 3.10.16 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114375">https://www.tenable.com/plugins/was/114375</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Joomla! 4.x < 4.4.6 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114374</link>
            <guid>https://www.tenable.com/plugins/was/114374</guid>
            <pubDate>Fri, 06 Sep 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114374 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Joomla! 4.x < 4.4.6 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the instance of Joomla! running on the remote web server is 3.x prior to 3.10.16, 4.x prior to 4.4.6 or 5.x prior to 5.1.2. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span> - Inadequate input validation leads to XSS vulnerabilities in the accessiblemedia field. (CVE-2024-21729)<br /></span><span><br /></span><span> - The fancyselect list field layout does not correctly escape inputs, leading to a self-XSS vector. (CVE-2024-21730)<br /></span><span><br /></span><span> - Improper handling of input could lead to an XSS vector in the StringHelper::truncate method. (CVE-2024-21731)<br /></span><span><br /></span><span> - The wrapper extensions do not correctly validate inputs, leading to XSS vectors. (CVE-2024-26279)<br /></span><span><br /></span><span> - The Custom Fields component not correctly filter inputs, leading to a XSS vector. (CVE-2024-26278)<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Joomla! version 4.4.6 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114374">https://www.tenable.com/plugins/was/114374</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Joomla! 5.x < 5.1.2 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114373</link>
            <guid>https://www.tenable.com/plugins/was/114373</guid>
            <pubDate>Fri, 06 Sep 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114373 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Joomla! 5.x < 5.1.2 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the instance of Joomla! running on the remote web server is 3.x prior to 3.10.16, 4.x prior to 4.4.6 or 5.x prior to 5.1.2. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span> - Inadequate input validation leads to XSS vulnerabilities in the accessiblemedia field. (CVE-2024-21729)<br /></span><span><br /></span><span> - The fancyselect list field layout does not correctly escape inputs, leading to a self-XSS vector. (CVE-2024-21730)<br /></span><span><br /></span><span> - Improper handling of input could lead to an XSS vector in the StringHelper::truncate method. (CVE-2024-21731)<br /></span><span><br /></span><span> - The wrapper extensions do not correctly validate inputs, leading to XSS vectors. (CVE-2024-26279)<br /></span><span><br /></span><span> - The Custom Fields component not correctly filter inputs, leading to a XSS vector. (CVE-2024-26278)<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Joomla! version 5.1.2 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114373">https://www.tenable.com/plugins/was/114373</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Confluence 8.6.x < 8.8.1 Path Traversal]]></title>
            <link>https://www.tenable.com/plugins/was/114240</link>
            <guid>https://www.tenable.com/plugins/was/114240</guid>
            <pubDate>Fri, 06 Sep 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114240 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Confluence 8.6.x < 8.8.1 Path Traversal<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Atlassian Confluence application running on the remote host is prior to 7.19.20, 7.20.x prior to 8.5.7 or 8.6.x prior to 8.8.1 It is, therefore, affected by a path traversal vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Confluence version 8.8.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114240">https://www.tenable.com/plugins/was/114240</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Confluence 7.20.x < 8.5.7 Path Traversal]]></title>
            <link>https://www.tenable.com/plugins/was/114239</link>
            <guid>https://www.tenable.com/plugins/was/114239</guid>
            <pubDate>Fri, 06 Sep 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114239 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Confluence 7.20.x < 8.5.7 Path Traversal<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Atlassian Confluence application running on the remote host is prior to 7.19.20, 7.20.x prior to 8.5.7 or 8.6.x prior to 8.8.1 It is, therefore, affected by a path traversal vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Confluence version 8.5.7 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114239">https://www.tenable.com/plugins/was/114239</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Confluence < 7.19.20 Path Traversal]]></title>
            <link>https://www.tenable.com/plugins/was/114238</link>
            <guid>https://www.tenable.com/plugins/was/114238</guid>
            <pubDate>Fri, 06 Sep 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114238 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Confluence < 7.19.20 Path Traversal<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Atlassian Confluence application running on the remote host is prior to 7.19.20, 7.20.x prior to 8.5.7 or 8.6.x prior to 8.8.1 It is, therefore, affected by a path traversal vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Confluence version 7.19.20 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114238">https://www.tenable.com/plugins/was/114238</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Confluence 7.20.x < 8.5.5 Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/114222</link>
            <guid>https://www.tenable.com/plugins/was/114222</guid>
            <pubDate>Fri, 06 Sep 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114222 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Confluence 7.20.x < 8.5.5 Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Atlassian Confluence application running on the remote host is prior to 7.19.18, 7.20.x prior to 8.5.5 or 8.7.x prior to 8.7.2. It is, therefore, affected by a stored Cross-Site Scripting (XSS) vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Confluence version 8.5.5 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114222">https://www.tenable.com/plugins/was/114222</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Confluence 8.7.x < 8.7.2 Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/114221</link>
            <guid>https://www.tenable.com/plugins/was/114221</guid>
            <pubDate>Fri, 06 Sep 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114221 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Confluence 8.7.x < 8.7.2 Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Atlassian Confluence application running on the remote host is prior to 7.19.18, 7.20.x prior to 8.5.5 or 8.7.x prior to 8.7.2. It is, therefore, affected by a stored Cross-Site Scripting (XSS) vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Confluence version 8.7.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114221">https://www.tenable.com/plugins/was/114221</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Confluence < 7.19.18 Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/114220</link>
            <guid>https://www.tenable.com/plugins/was/114220</guid>
            <pubDate>Fri, 06 Sep 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114220 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Confluence < 7.19.18 Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Atlassian Confluence application running on the remote host is prior to 7.19.18, 7.20.x prior to 8.5.5 or 8.7.x prior to 8.7.2. It is, therefore, affected by a stored Cross-Site Scripting (XSS) vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Confluence version 7.19.18 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114220">https://www.tenable.com/plugins/was/114220</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Nginx 1.23.x < 1.23.2 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/113421</link>
            <guid>https://www.tenable.com/plugins/was/113421</guid>
            <pubDate>Fri, 06 Sep 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113421 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Nginx 1.23.x < 1.23.2 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its Server response header, the installed version of nginx is prior to 1.22.1 or 1.23.x prior to 1.23.2. It is, therefore, affected by two security issues which might allow an attacker to cause a worker process crash or worker process memory disclosure by using a specially crafted mp4 file.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to nginx version 1.23.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113421">https://www.tenable.com/plugins/was/113421</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Nginx < 1.22.1 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/113420</link>
            <guid>https://www.tenable.com/plugins/was/113420</guid>
            <pubDate>Fri, 06 Sep 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113420 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Nginx < 1.22.1 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its Server response header, the installed version of nginx is prior to 1.22.1 or 1.23.x prior to 1.23.2. It is, therefore, affected by two security issues which might allow an attacker to cause a worker process crash or worker process memory disclosure by using a specially crafted mp4 file.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to nginx version 1.22.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113420">https://www.tenable.com/plugins/was/113420</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[XPath Injection]]></title>
            <link>https://www.tenable.com/plugins/was/98114</link>
            <guid>https://www.tenable.com/plugins/was/98114</guid>
            <pubDate>Mon, 12 Aug 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98114 with High Severity</p>
      <h3>Synopsis</h3>
      <span>XPath Injection<br /></span>
      <h3>Description</h3>
      <span>XML Path Language (XPath) queries are used by web applications for selecting nodes from XML documents. Once selected, the value of these nodes can then be used by the application.<br /></span><span><br /></span><span>A simple example for the use of XML documents is to store user information. As part of the authentication process, the application will perform an XPath query to confirm the login credentials and retrieve that user's information to use in the following request.<br /></span><span><br /></span><span>XPath injection occurs where untrusted data is used to build XPath queries.<br /></span><span><br /></span><span>Cyber-criminals may abuse this injection vulnerability to bypass authentication, query other user's information, or, if the XML document contains privileged user credentials, allow the cyber-criminal to escalate their privileges.<br /></span><span><br /></span><span>Scanner injected special XPath query characters into the page and based on the responses from the server, has determined that the page is vulnerable to XPath injection.<br /></span>
      <h3>Solution</h3>
      <span>The preferred way to protect against XPath injection is to utilise parameterized (also known as prepared) XPath queries. When utilising this method of querying the XML document any value supplied by the client will be handled as a string rather than part of the XPath query.<br /></span><span>An alternative to parameterized queries it to use precompiled XPath queries. Precompiled XPath queries are not generated dynamically and will therefor never process user supplied input as XPath.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98114">https://www.tenable.com/plugins/was/98114</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Directory Listing]]></title>
            <link>https://www.tenable.com/plugins/was/98084</link>
            <guid>https://www.tenable.com/plugins/was/98084</guid>
            <pubDate>Mon, 12 Aug 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98084 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Directory Listing<br /></span>
      <h3>Description</h3>
      <span>Web servers permitting directory listing are typically used for sharing files.<br /></span><span><br /></span><span>Directory listing allows the client to view a simple list of all the files and folders hosted on the web server. The client is then able to traverse each directory and download the files.<br /></span><span><br /></span><span>Cyber-criminals will utilise the presence of directory listing to discover sensitive files, download protected content, or even just learn how the web application is strurctured.<br /></span><span><br /></span><span>Scanner discovered that the affected page permits directory listing.<br /></span>
      <h3>Solution</h3>
      <span>Unless the web server is being utilised to share static and non-sensitive files, enabling directory listing is considered a poor security practice<br /></span><span>This can typically be done with a simple configuration change on the server. The steps to disable the directory listing will differ depending on the type of server being used (IIS, Apache, etc.). If directory listing is required, and permitted, then steps should be taken to ensure that the risk of such a configuration is reduced.<br /></span><span>These can include:<br /></span><span>1. Requiring authentication to access affected pages. 2. Adding the affected path to the `robots.txt` file to prevent the directory contents being searchable via search engines. 3. Ensuring that sensitive files are not stored within the web or document root. 4. Removing any files that are not required for the application to function.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98084">https://www.tenable.com/plugins/was/98084</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Out-of-Date Backbone JS Framework Detected]]></title>
            <link>https://www.tenable.com/plugins/was/113037</link>
            <guid>https://www.tenable.com/plugins/was/113037</guid>
            <pubDate>Tue, 06 Aug 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113037 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Out-of-Date Backbone JS Framework Detected<br /></span>
      <h3>Description</h3>
      <span>An out-of-date version of Backbone JS Framework has been detected. An outdated version could have vulnerabilities or missing security features.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to the latest version of Backbone JS Framework.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113037">https://www.tenable.com/plugins/was/113037</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Out-of-Date Underscore.js Detected]]></title>
            <link>https://www.tenable.com/plugins/was/113033</link>
            <guid>https://www.tenable.com/plugins/was/113033</guid>
            <pubDate>Tue, 06 Aug 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113033 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Out-of-Date Underscore.js Detected<br /></span>
      <h3>Description</h3>
      <span>An out-of-date version of Underscore.js has been detected. An outdated version could have vulnerabilities or missing security features.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to the latest version of Underscore.js.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113033">https://www.tenable.com/plugins/was/113033</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Out-of-Date Modernizr Detected]]></title>
            <link>https://www.tenable.com/plugins/was/113032</link>
            <guid>https://www.tenable.com/plugins/was/113032</guid>
            <pubDate>Tue, 06 Aug 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113032 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Out-of-Date Modernizr Detected<br /></span>
      <h3>Description</h3>
      <span>An out-of-date version of Modernizr has been detected. An outdated version could have vulnerabilities or missing security features.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to the latest version of Modernizr.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113032">https://www.tenable.com/plugins/was/113032</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Out-of-Date Bootstrap Detected]]></title>
            <link>https://www.tenable.com/plugins/was/113030</link>
            <guid>https://www.tenable.com/plugins/was/113030</guid>
            <pubDate>Tue, 06 Aug 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113030 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Out-of-Date Bootstrap Detected<br /></span>
      <h3>Description</h3>
      <span>An out-of-date version of Bootstrap has been detected. An outdated version could have vulnerabilities or missing security features.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to the latest version of Bootstrap.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113030">https://www.tenable.com/plugins/was/113030</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[GeoServer SQL Injection]]></title>
            <link>https://www.tenable.com/plugins/was/113959</link>
            <guid>https://www.tenable.com/plugins/was/113959</guid>
            <pubDate>Thu, 01 Aug 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113959 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>GeoServer SQL Injection<br /></span>
      <h3>Description</h3>
      <span>The GeoServer instance installed on the remote host is affected by a SQL injection vulnerability due to improper sanitization through an OGC Common Query Language query.<br /></span>
      <h3>Solution</h3>
      <span>Apply the appropriate patch according to the vendor advisory or disable the PostGIS Datastore encode functions and enable the PostGIS DataStore preparedStatements setting.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113959">https://www.tenable.com/plugins/was/113959</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Missing 'Content-Type' Charset]]></title>
            <link>https://www.tenable.com/plugins/was/114382</link>
            <guid>https://www.tenable.com/plugins/was/114382</guid>
            <pubDate>Mon, 29 Jul 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114382 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>Missing 'Content-Type' Charset<br /></span>
      <h3>Description</h3>
      <span>The Content-Type header allows clients to find an appropriate way to render data, omission of the charset can lead to various behaviour like a Cross-Site Scripting abusing the browser's auto-detection mechanism.<br /></span>
      <h3>Solution</h3>
      <span>Configure your web server to include an 'Content-Type' header with a charset defined therein.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114382">https://www.tenable.com/plugins/was/114382</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Hugegraph 1.0.0 < 1.3.0 Remote Command Execution]]></title>
            <link>https://www.tenable.com/plugins/was/114381</link>
            <guid>https://www.tenable.com/plugins/was/114381</guid>
            <pubDate>Mon, 29 Jul 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114381 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Hugegraph 1.0.0 < 1.3.0 Remote Command Execution<br /></span>
      <h3>Description</h3>
      <span>Apache Hugegraph versions 1.0.0 prior to 1.3.0 is affected by a vulnerability allowing an unauthenticated attacker to execute remote commands via a specially forged request.<br /></span>
      <h3>Solution</h3>
      <span>Update to Apache Hugegraph version 1.3.0 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114381">https://www.tenable.com/plugins/was/114381</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Web Cache Poisoning]]></title>
            <link>https://www.tenable.com/plugins/was/113338</link>
            <guid>https://www.tenable.com/plugins/was/113338</guid>
            <pubDate>Mon, 29 Jul 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113338 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Web Cache Poisoning<br /></span>
      <h3>Description</h3>
      <span>A caching system has been detected on the application and is vulnerable to web cache poisoning. By manipulating specific unkeyed inputs (headers or cookies that are not included when generating the cache key) it was possible to force the caching system to cache a response that contains user-controlled input. If a response is cached in a shared web cache, such as those commonly found in proxy servers, then all users of that cache will continue to receive the malicious content until the cache entry is purged.<br /></span>
      <h3>Solution</h3>
      <span>Disable caching for the affected input or pages. If both the affected input and caching behavior are required, configure the cache to ensure that the input is included in the cache key.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113338">https://www.tenable.com/plugins/was/113338</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache 2.4.60 Source Code Disclosure]]></title>
            <link>https://www.tenable.com/plugins/was/114363</link>
            <guid>https://www.tenable.com/plugins/was/114363</guid>
            <pubDate>Mon, 22 Jul 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114363 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Apache 2.4.60 Source Code Disclosure<br /></span>
      <h3>Description</h3>
      <span>According to its banner, the version of Apache running on the remote host is 2.4.60. It is, therefore, affected by a source code disclosure with handlers configured via AddType.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache version 2.4.61 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114363">https://www.tenable.com/plugins/was/114363</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache 2.4.x < 2.4.60 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114360</link>
            <guid>https://www.tenable.com/plugins/was/114360</guid>
            <pubDate>Mon, 22 Jul 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114360 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Apache 2.4.x < 2.4.60 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its banner, the version of Apache running on the remote host is 2.4.x prior to 2.4.60. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span> - Serving WebSocket protocol upgrades over a HTTP/2 connection could result in a Null Pointer dereference, leading to a crash of the server process, degrading performance. (CVE-2024-36387)<br /></span><span><br /></span><span> - SSRF in Apache HTTP Server on Windows allows to potentially leak NTML hashes to a malicious server via SSRF and malicious requests or content. (CVE-2024-38472)<br /></span><span><br /></span><span> - Encoding problem in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows request URLs with incorrect encoding to be sent to backend services, potentially bypassing authentication via crafted requests. (CVE-2024-38473)<br /></span><span><br /></span><span> - Substitution encoding issue in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant to only to be executed as CGI. (CVE-2024-38474)<br /></span><span><br /></span><span> - Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to map URLs to filesystem locations that are permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source code disclosure. (CVE-2024-38475)<br /></span><span><br /></span><span> - Vulnerability in core of Apache HTTP Server 2.4.59 and earlier are vulnerably to information disclosure, SSRF or local script execution via backend applications whose response headers are malicious or exploitable. (CVE-2024-38476)<br /></span><span><br /></span><span> - Null pointer dereference in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows an attacker to crash the server via a malicious request. (CVE-2024-38477)<br /></span><span><br /></span><span> - Potential SSRF in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to cause unsafe RewriteRules to unexpectedly setup URL's to be handled by mod_proxy. (CVE-2024-39573)<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache version 2.4.60 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114360">https://www.tenable.com/plugins/was/114360</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Adobe Commerce / Magento XML External Entity Injection (CosmicSting)]]></title>
            <link>https://www.tenable.com/plugins/was/114325</link>
            <guid>https://www.tenable.com/plugins/was/114325</guid>
            <pubDate>Thu, 18 Jul 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114325 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Adobe Commerce / Magento XML External Entity Injection (CosmicSting)<br /></span>
      <h3>Description</h3>
      <span>Adobe Magento Open Source / Commerce versions 2.4.7 < 2.4.7-p1, 2.4.6 < 2.4.6-p6, 2.4.5 < 2.4.5-p8, 2.4.4 < 2.4.4-p9 and earlier suffer from an XML External Entity (XXE) vulnerability. By exploiting this vulnerability and crafting a malicious XML document, a remote and unauthenticated attacker could achieve Remote Code Execution (RCE) on the vulnerable Magento instance.<br /></span>
      <h3>Solution</h3>
      <span>Update Adobe Magento Open Source / Commerce to versions 2.4.4-p9, 2.4.5-p8, 2.4.6-p6, 2.4.7-p1 or later. Adobe Commerce could also be updated to 2.3.7-p4-ext-8, 2.4.0-ext-8, 2.4.1-ext-8, 2.4.2-ext-8, 2.4.3-ext-8 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114325">https://www.tenable.com/plugins/was/114325</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Magento Administration Panel Login Form Bruteforced]]></title>
            <link>https://www.tenable.com/plugins/was/113117</link>
            <guid>https://www.tenable.com/plugins/was/113117</guid>
            <pubDate>Thu, 18 Jul 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113117 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Magento Administration Panel Login Form Bruteforced<br /></span>
      <h3>Description</h3>
      <span>The scanner successfully authenticated on the Magento administration panel by using weak or predictable credentials.<br /></span>
      <h3>Solution</h3>
      <span>The Magento administration panel interface should not be configured with accounts using default or predictable credentials. A complex password policy should be defined and enforced on every account to prevent attackers from guessing it and gain unauthorized access.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113117">https://www.tenable.com/plugins/was/113117</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[JSON Web Token Weak Secret]]></title>
            <link>https://www.tenable.com/plugins/was/112697</link>
            <guid>https://www.tenable.com/plugins/was/112697</guid>
            <pubDate>Mon, 01 Jul 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112697 with High Severity</p>
      <h3>Synopsis</h3>
      <span>JSON Web Token Weak Secret<br /></span>
      <h3>Description</h3>
      <span>JSON Web Tokens can be signed to protect against data tampering. By using an asymmetric or a symmetric signing algorithm, the application computes a signature of the token data which will be verified during token decoding to ensure its integrity. When using a symmetric algorithm, the signature is created from the chosen HMAC function along with a secret key.<br /></span><span><br /></span><span>Using weak keys makes it vulnerable to bruteforce attacks, allowing tokens to be manipulated and signed on behalf of the application. Depending on the token usage, attackers could leverage this vulnerability to forge valid tokens and impersonate other users, or gain further privileges.<br /></span>
      <h3>Solution</h3>
      <span>The secret key used to sign the JSON Web Tokens in the application must be stronger (long and random) to prevent it from being retrieved with a bruteforce attack. Note that the JSON Web Algorithms standard (RFC 7518) defines the minimum key length to be equal to the size (in bits) of the hash function used with the HMAC algorithm.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112697">https://www.tenable.com/plugins/was/112697</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Misconfiguration in LIMIT directive of .htaccess file]]></title>
            <link>https://www.tenable.com/plugins/was/98095</link>
            <guid>https://www.tenable.com/plugins/was/98095</guid>
            <pubDate>Mon, 10 Jun 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98095 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Misconfiguration in LIMIT directive of .htaccess file<br /></span>
      <h3>Description</h3>
      <span>There are a number of HTTP methods that can be used on a webserver (for example `OPTIONS`, `HEAD`, `GET`, `POST`, `PUT`, `DELETE `etc.). Each of these methods perform a different function, and each has an associated level of risk when their use is permitted on the webserver.<br /></span><span><br /></span><span>The `<Limit>` directive within Apache's `.htaccess` file allows administrators to define which of the methods they would like to block. However, as this is a blacklisting approach, it is inevitable that a server administrator may accidentally miss adding certain HTTP methods to be blocked, thus increasing the level of risk to the application and/or server.<br /></span>
      <h3>Solution</h3>
      <span>The preferred configuration is to prevent the use of unauthorised HTTP methods by utilising the `<LimitExcept>` directive.<br /></span><span>This directive uses a whitelisting approach to permit HTTP methods while blocking all others not listed in the directive, and will therefor block any method tampering attempts.<br /></span><span>Most commonly, the only HTTP methods required for most scenarios are `GET` and `POST`. An example of permitting these HTTP methods is: `<LimitExcept POST GET> require valid-user </LimitExcept>`<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98095">https://www.tenable.com/plugins/was/98095</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[HTTP Verb Tampering]]></title>
            <link>https://www.tenable.com/plugins/was/113211</link>
            <guid>https://www.tenable.com/plugins/was/113211</guid>
            <pubDate>Mon, 10 Jun 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113211 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>HTTP Verb Tampering<br /></span>
      <h3>Description</h3>
      <span>HTTP Verb Tampering is an attack that bypasses an authentication or control system that is based on the HTTP Verb. Sometimes, Web Server authentication mechanisms use verb-based authentication with access controls. Such security mechanisms include access control rules for requests with specific HTTP methods. Due to the HTTP specification that includes request methods other than the standard GET and POST requests, a standards compliant web server may respond to these alternative methods in ways not anticipated by developers. So if an application restricts only GET requests it might still be possible to access the page using a POST, PUT, PATCH or other method.<br /></span>
      <h3>Solution</h3>
      <span>Block all HTTP verb instead of using a blocklist of HTTP verbs.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113211">https://www.tenable.com/plugins/was/113211</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Wordpress Administration Panel Login Form Bruteforced]]></title>
            <link>https://www.tenable.com/plugins/was/113136</link>
            <guid>https://www.tenable.com/plugins/was/113136</guid>
            <pubDate>Fri, 31 May 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113136 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Wordpress Administration Panel Login Form Bruteforced<br /></span>
      <h3>Description</h3>
      <span>The scanner successfully authenticated on the Wordpress administration panel by using weak or predictable credentials.<br /></span>
      <h3>Solution</h3>
      <span>The Wordpress administration panel interface should not be configured with accounts using default or predictable credentials. A complex password policy should be defined and enforced on every account to prevent attackers from guessing it and gain unauthorized access.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113136">https://www.tenable.com/plugins/was/113136</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[F5 BIG-IP Next Central Manager SQL Injection]]></title>
            <link>https://www.tenable.com/plugins/was/114281</link>
            <guid>https://www.tenable.com/plugins/was/114281</guid>
            <pubDate>Mon, 27 May 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114281 with High Severity</p>
      <h3>Synopsis</h3>
      <span>F5 BIG-IP Next Central Manager SQL Injection<br /></span>
      <h3>Description</h3>
      <span>F5 BIG-IP Next Central Manager version 20.0.1 < 20.2.0 is affected by a SQL Injection. An unauthenticated, remote attacker can exploit this to bypass authentication or extract information such as user hashes.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to F5 BIG-IP Next Central Manager version 20.2.0 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114281">https://www.tenable.com/plugins/was/114281</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Strapi < 4.8.0 Private Fields Sensitive Information Disclosure]]></title>
            <link>https://www.tenable.com/plugins/was/114108</link>
            <guid>https://www.tenable.com/plugins/was/114108</guid>
            <pubDate>Mon, 27 May 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114108 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Strapi < 4.8.0 Private Fields Sensitive Information Disclosure<br /></span>
      <h3>Description</h3>
      <span>Strapi is a popular open-source headless Content Management System (CMS) written in Node.js. Strapi versions before 4.8.0 suffer from an information disclosure vulnerability through collections private fields. By manipulating public collections query filters, a remote and unauthenticated attacker can infer sensitive information like encrypted password or password reset tokens by analyzing response discrepancies. Upon successful exploitation, the attacker can gain administrative access to the Strapi administration panel.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade Strapi to version 4.8.0 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114108">https://www.tenable.com/plugins/was/114108</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Strapi Cognito Provider Authentication Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/114041</link>
            <guid>https://www.tenable.com/plugins/was/114041</guid>
            <pubDate>Mon, 27 May 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114041 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Strapi Cognito Provider Authentication Bypass<br /></span>
      <h3>Description</h3>
      <span>Strapi is a popular open-source headless CMS built with Node.js. Strapi versions after 3.2.0 and before 4.6.0 suffer from a lack of validation of JWT tokens sent through the AWS Cognito authentication provider during the OAuth flow.<br /></span><span><br /></span><span>By forging a custom JWT token with any signature, a remote and unauthenticated attacker can impersonate any user who use AWS Cognito to authenticate against the target application.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Strapi version 4.6.0 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114041">https://www.tenable.com/plugins/was/114041</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[OpenAPI Import Failed]]></title>
            <link>https://www.tenable.com/plugins/was/112570</link>
            <guid>https://www.tenable.com/plugins/was/112570</guid>
            <pubDate>Mon, 27 May 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112570 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>OpenAPI Import Failed<br /></span>
      <h3>Description</h3>
      <span>OpenAPI file could not be imported and cannot be used during the scan.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112570">https://www.tenable.com/plugins/was/112570</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[OpenAPI Import Success]]></title>
            <link>https://www.tenable.com/plugins/was/112569</link>
            <guid>https://www.tenable.com/plugins/was/112569</guid>
            <pubDate>Mon, 27 May 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112569 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>OpenAPI Import Success<br /></span>
      <h3>Description</h3>
      <span>OpenAPI file was successfully imported and can be used during the scan.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112569">https://www.tenable.com/plugins/was/112569</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Open Proxy]]></title>
            <link>https://www.tenable.com/plugins/was/114237</link>
            <guid>https://www.tenable.com/plugins/was/114237</guid>
            <pubDate>Thu, 16 May 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114237 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Open Proxy<br /></span>
      <h3>Description</h3>
      <span>Web applications often rely on proxy server to route requests to the right web service. An Open Proxy vulnerabilities occurs when a web server is configured to act as forward proxy, allowing anyone to use it to relay web traffic. This setup can may allow an attacker to use the proxy server to make requests to an external or internal server.\n\nThe corse issue arises because the proxy does not authenticate its users, thereby offering no control over who users the server's resources or for what purpose.<br /></span>
      <h3>Solution</h3>
      <span>Modify the proxy server configuration to disallow third-party requests or implement access control.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114237">https://www.tenable.com/plugins/was/114237</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache mod_negotiation Alternative Filename Disclosure]]></title>
            <link>https://www.tenable.com/plugins/was/113165</link>
            <guid>https://www.tenable.com/plugins/was/113165</guid>
            <pubDate>Thu, 16 May 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113165 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Apache mod_negotiation Alternative Filename Disclosure<br /></span>
      <h3>Description</h3>
      <span>Apache web server configured with mod_negotiation and Multiviews enabled may, on receipt of a crafted invalid request with a extension-less filename return a pseudo directory listing of matching resources with known mime types. This feature may be abused by attackers to discover hidden resources on a server without resort to brute-force methods. The scanner has detected files on the server using this technique.<br /></span>
      <h3>Solution</h3>
      <span>If files are not required, then they should be removed from the web root and/or the application directory or restricted by additional access controls. The removal of Multiviews in the Apache config could be used to avoid disclosing the presence of these files using this method but should not be considered a complete solution as it may only hinder an attacker discovering them.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113165">https://www.tenable.com/plugins/was/113165</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Target Information]]></title>
            <link>https://www.tenable.com/plugins/was/98136</link>
            <guid>https://www.tenable.com/plugins/was/98136</guid>
            <pubDate>Fri, 26 Apr 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98136 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Target Information<br /></span>
      <h3>Description</h3>
      <span>Publishes the target information of the starting url as evaluated by the scan.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98136">https://www.tenable.com/plugins/was/98136</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[CrushFTP < 10.7.1 / 11.x < 11.1.0 VFS Sandbox Escape]]></title>
            <link>https://www.tenable.com/plugins/was/114273</link>
            <guid>https://www.tenable.com/plugins/was/114273</guid>
            <pubDate>Wed, 24 Apr 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114273 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>CrushFTP < 10.7.1 / 11.x < 11.1.0 VFS Sandbox Escape<br /></span>
      <h3>Description</h3>
      <span>CrushFTP versions prior to 10.7.1 and 11.x < 11.1.0 are vulnerable to a "VFS Sandbox Escape" allowing a remote attacker with low privileges to read files from the file system outside the sandbox.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to CrushFTP version 10.7.1 or 11.1.0 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114273">https://www.tenable.com/plugins/was/114273</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Permissive HTTP Strict Transport Security Policy Detected]]></title>
            <link>https://www.tenable.com/plugins/was/98715</link>
            <guid>https://www.tenable.com/plugins/was/98715</guid>
            <pubDate>Mon, 22 Apr 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98715 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>Permissive HTTP Strict Transport Security Policy Detected<br /></span>
      <h3>Description</h3>
      <span>HTTP Strict Transport Security (HSTS) is an optional response header that can be configured on the server to instruct the browser to only communicate via HTTPS.<br /></span><span><br /></span><span>The detected HSTS policy doesn't have long max-age value which is a representation (in milliseconds) determining the time in which the client's browser will adhere to the header policy or it doesn't cover subdomains via includeSubDomains directive.<br /></span>
      <h3>Solution</h3>
      <span>The max-age must be set at least to 31536000 seconds (1 year) and includeSubDomains directive must be specified.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98715">https://www.tenable.com/plugins/was/98715</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Permissive Content Security Policy Detected]]></title>
            <link>https://www.tenable.com/plugins/was/112554</link>
            <guid>https://www.tenable.com/plugins/was/112554</guid>
            <pubDate>Mon, 22 Apr 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112554 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>Permissive Content Security Policy Detected<br /></span>
      <h3>Description</h3>
      <span>Content Security Policy (CSP) is a web security standard that helps to mitigate attacks like cross-site scripting (XSS), clickjacking or mixed content issues. CSP provides mechanisms to websites to restrict content that browsers will be allowed to load.<br /></span><span><br /></span><span>One or several permissive directives have been detected. See output for more details.<br /></span>
      <h3>Solution</h3>
      <span>Content Security Policies are designed to have control over where resources on a website can be loaded from. Implementing a policy depends on the application type (web applications, APIs...) and the directives have to be specified according to this.<br /></span><span><br /></span><span>For web applications, The following directive configurations can usually be applied to restrict the policy:<br /></span><span>- 'frame-ancestors' should be set to 'none' to avoid rendering of page in <frame>, <iframe>, <object>, <embed>, or <applet>.<br /></span><span>- 'form-action' should be explicitly set to 'self' to restrict form submission to the origin which the protected page is being served.<br /></span><span>- Any of the 'unsafe-*' directives indicate that the action is considered unsafe and it is better to refactor the code to avoid using HTML event handlers that rely on this.<br /></span><span>- data: https: http: URI in 'default-src', 'object-src', 'base-uri' & 'script-src' allow execution of unsafe scripts and should not be set.<br /></span><span>- * and *.* in 'script-src' and other '-src' directives allows execution of unsafe scripts and should be restricted.<br /></span><span>- 'default-src' should be explicitly set to 'self' or 'none' and individual directives required for each source type set more permissively as required<br /></span><span>- * and *.* in 'default-src' allows various unconfigured parameters to default to a unsafe configuration and then should not be set.<br /></span><span><br /></span><span>For APIs, there should not be any need to load resources like scripts or frames, so specifying a strict policy using default-src 'none' and frame-ancestors 'none' is recommended.<br /></span><span><br /></span><span>If some unsafe directives are required for business continuity in your environment, apply mitigating controls suitable for your environment and work with the vendors of the products for which these directives are required. Note that different CSP versions exist, and that some of the directives may not work depending on the browser versions used when accessing the web application.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112554">https://www.tenable.com/plugins/was/112554</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Deprecated Content Security Policy]]></title>
            <link>https://www.tenable.com/plugins/was/112552</link>
            <guid>https://www.tenable.com/plugins/was/112552</guid>
            <pubDate>Mon, 22 Apr 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112552 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>Deprecated Content Security Policy<br /></span>
      <h3>Description</h3>
      <span>Content Security Policy (CSP) is a web security standard that helps to mitigate attacks like cross-site scripting (XSS), clickjacking or mixed content issues. CSP provides mechanisms to websites to restrict content that browsers will be allowed to load.<br /></span><span><br /></span><span>X-Content-Security-Policy and X-Webkit-CSP HTTP headers are deprecated to implement CSP.<br /></span>
      <h3>Solution</h3>
      <span>Avoid using X-Content-Security-Policy and X-Webkit-CSP HTTP headers and configure Content Security Policy on your website by adding 'Content-Security-Policy' HTTP header or meta tag http-equiv='Content-Security-Policy'.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112552">https://www.tenable.com/plugins/was/112552</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Selenium Authentication Failed]]></title>
            <link>https://www.tenable.com/plugins/was/98142</link>
            <guid>https://www.tenable.com/plugins/was/98142</guid>
            <pubDate>Tue, 09 Apr 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98142 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Selenium Authentication Failed<br /></span>
      <h3>Description</h3>
      <span>This plugin is raised when the scanner has not been able to authenticate against the web application using the Selenium script provided in the scan policy.<br /></span><span><br /></span><span>Check the output of the plugin to get an explanation of the issue encountered by the scan.<br /></span>
      <h3>Solution</h3>
      <span>Edit scan policy and update the Selenium script using the information provided in the plugin output.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98142">https://www.tenable.com/plugins/was/98142</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Selenium Authentication Succeeded]]></title>
            <link>https://www.tenable.com/plugins/was/98141</link>
            <guid>https://www.tenable.com/plugins/was/98141</guid>
            <pubDate>Tue, 09 Apr 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98141 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Selenium Authentication Succeeded<br /></span>
      <h3>Description</h3>
      <span>This is an informational notice that the scanner was able to successfully authenticate against the web application using the Selenium script provided in the scan policy.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98141">https://www.tenable.com/plugins/was/98141</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Cookie Authentication Failed]]></title>
            <link>https://www.tenable.com/plugins/was/98140</link>
            <guid>https://www.tenable.com/plugins/was/98140</guid>
            <pubDate>Tue, 09 Apr 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98140 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Cookie Authentication Failed<br /></span>
      <h3>Description</h3>
      <span>This plugin is raised when the scanner has not been able to authenticate against the web application using the cookies provided in the scan policy.<br /></span><span><br /></span><span>Check the output of the plugin to get an explanation of the issue encountered by the scan.<br /></span>
      <h3>Solution</h3>
      <span>Edit scan policy and update the cookies using the information provided in the plugin output.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98140">https://www.tenable.com/plugins/was/98140</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Cookie Authentication Succeeded]]></title>
            <link>https://www.tenable.com/plugins/was/98139</link>
            <guid>https://www.tenable.com/plugins/was/98139</guid>
            <pubDate>Tue, 09 Apr 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98139 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Cookie Authentication Succeeded<br /></span>
      <h3>Description</h3>
      <span>This is an informational notice that the scanner was able to successfully authenticate against the web application using the cookies provided in the scan policy.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98139">https://www.tenable.com/plugins/was/98139</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Login Form Authentication Succeeded]]></title>
            <link>https://www.tenable.com/plugins/was/98035</link>
            <guid>https://www.tenable.com/plugins/was/98035</guid>
            <pubDate>Tue, 09 Apr 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98035 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Login Form Authentication Succeeded<br /></span>
      <h3>Description</h3>
      <span>This is an informational notice that the scanner was able to successfully authenticate against the web application using the login form credentials provided in the scan policy.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98035">https://www.tenable.com/plugins/was/98035</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Login Form Authentication Failed]]></title>
            <link>https://www.tenable.com/plugins/was/98034</link>
            <guid>https://www.tenable.com/plugins/was/98034</guid>
            <pubDate>Tue, 09 Apr 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98034 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Login Form Authentication Failed<br /></span>
      <h3>Description</h3>
      <span>This plugin is raised when the scanner has not been able to authenticate against the web application using the login form credentials provided in the scan policy.<br /></span><span><br /></span><span>Check the output of the plugin to get an explanation of the issue encountered by the scan.<br /></span>
      <h3>Solution</h3>
      <span>Edit scan policy and update the login form credentials using the information provided in the plugin output.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98034">https://www.tenable.com/plugins/was/98034</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Bearer Token Authentication Failed]]></title>
            <link>https://www.tenable.com/plugins/was/113013</link>
            <guid>https://www.tenable.com/plugins/was/113013</guid>
            <pubDate>Tue, 09 Apr 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113013 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Bearer Token Authentication Failed<br /></span>
      <h3>Description</h3>
      <span>This plugin is raised when the scanner has not been able to authenticate against the web application using the bearer authentication credentials provided in the scan policy.<br /></span><span><br /></span><span>Check the output of the plugin to get an explanation of the issue encountered by the scan.<br /></span>
      <h3>Solution</h3>
      <span>Edit scan policy and update the bearer authentication credentials using the information provided in the plugin output.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113013">https://www.tenable.com/plugins/was/113013</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Bearer Token Authentication Succeeded]]></title>
            <link>https://www.tenable.com/plugins/was/113012</link>
            <guid>https://www.tenable.com/plugins/was/113012</guid>
            <pubDate>Tue, 09 Apr 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113012 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Bearer Token Authentication Succeeded<br /></span>
      <h3>Description</h3>
      <span>This is an informational notice that the scanner was able to successfully authenticate against the web application using the bearer authentication credentials provided in the scan policy.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113012">https://www.tenable.com/plugins/was/113012</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[API Key Authentication Failed]]></title>
            <link>https://www.tenable.com/plugins/was/113011</link>
            <guid>https://www.tenable.com/plugins/was/113011</guid>
            <pubDate>Tue, 09 Apr 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113011 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>API Key Authentication Failed<br /></span>
      <h3>Description</h3>
      <span>This plugin is raised when the scanner has not been able to authenticate against the web application using the API key credentials provided in the scan policy.<br /></span><span><br /></span><span>Check the output of the plugin to get an explanation of the issue encountered by the scan.<br /></span>
      <h3>Solution</h3>
      <span>Edit scan policy and update the API key authentication credentials using the information provided in the plugin output.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113011">https://www.tenable.com/plugins/was/113011</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[API Key Authentication Succeeded]]></title>
            <link>https://www.tenable.com/plugins/was/113010</link>
            <guid>https://www.tenable.com/plugins/was/113010</guid>
            <pubDate>Tue, 09 Apr 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113010 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>API Key Authentication Succeeded<br /></span>
      <h3>Description</h3>
      <span>This is an informational notice that the scanner was able to successfully authenticate against the web application using the API key credentials provided in the scan policy.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113010">https://www.tenable.com/plugins/was/113010</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[HTML/CSS Injection]]></title>
            <link>https://www.tenable.com/plugins/was/114134</link>
            <guid>https://www.tenable.com/plugins/was/114134</guid>
            <pubDate>Wed, 03 Apr 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114134 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>HTML/CSS Injection<br /></span>
      <h3>Description</h3>
      <span>HTML/CSS Injection is an attack that injects arbitrary characters into a web page. When an application does not properly handle user-supplied data, an attacker can supply content to a web application, typically via a parameter value which is then reflected in the page. This attack is typically used as, or in conjunction with, social engineering by transmitting a URL that completely modifies the target page with, for example, a fake authentication test pattern in order to steal the user's identifiers. In some cases, this attack can also lead directly or indirectly to a Cross-Site Scripting.<br /></span>
      <h3>Solution</h3>
      <span>To remedy to HTML/CSS Injection vulnerabilities, it is important to never use untrusted or unfiltered data within the code of a HTML page.<br /></span><span>Untrusted data can originate not only form the client but potentially a third party or previously uploaded file etc.<br /></span><span>Filtering of untrusted data typically involves converting special characters to their HTML entity encoded counterparts (however, other methods do exist, see references). These special characters include:<br /></span><span>* `&` * `<` * `>` * `'` * `'` * `/`<br /></span><span>An example of HTML entity encoding is converting `<` to `&lt;`.<br /></span><span>Although it is possible to filter untrusted input, there are five locations within an HTML page where untrusted input (even if it has been filtered) should never be placed:<br /></span><span>1. Directly in a script. 2. Inside an HTML comment. 3. In an attribute name. 4. In a tag name. 5. Directly in CSS.<br /></span><span>Each of these locations have their own form of escaping and filtering.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114134">https://www.tenable.com/plugins/was/114134</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Magento Administration Panel Login Form Detected]]></title>
            <link>https://www.tenable.com/plugins/was/98642</link>
            <guid>https://www.tenable.com/plugins/was/98642</guid>
            <pubDate>Tue, 02 Apr 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98642 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Magento Administration Panel Login Form Detected<br /></span>
      <h3>Description</h3>
      <span>Magento Administration Panel has been detected on the target web application.<br /></span><span><br /></span><span>This may present an attacker with an exploit vector which could be leveraged using other techniques, such as a Brute-Force or Dictionary Attack, allowing an attacker to gain access to administrative functionality.<br /></span>
      <h3>Solution</h3>
      <span>Restrict access to administrative backend UI functionality<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98642">https://www.tenable.com/plugins/was/98642</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Adobe ColdFusion Improper Access Control]]></title>
            <link>https://www.tenable.com/plugins/was/114043</link>
            <guid>https://www.tenable.com/plugins/was/114043</guid>
            <pubDate>Tue, 02 Apr 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114043 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Adobe ColdFusion Improper Access Control<br /></span>
      <h3>Description</h3>
      <span>Adobe ColdFusion prior to versions 2018 Update 19, 2021 Update 9 and 2023 Update 3, suffer from an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to access the administration CFM and CFC endpoints.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Adobe ColdFusion versions 2018 Update 19, 2021 Update 9, 2023 Update 3 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114043">https://www.tenable.com/plugins/was/114043</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[HTTP Header Information Disclosure]]></title>
            <link>https://www.tenable.com/plugins/was/98618</link>
            <guid>https://www.tenable.com/plugins/was/98618</guid>
            <pubDate>Mon, 25 Mar 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98618 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>HTTP Header Information Disclosure<br /></span>
      <h3>Description</h3>
      <span>The HTTP headers sent by the remote web server disclose information that can aid an attacker, such as the server version and technologies used by the web server.<br /></span>
      <h3>Solution</h3>
      <span>Modify the HTTP headers of the web server to not disclose detailed information about the underlying web server.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98618">https://www.tenable.com/plugins/was/98618</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Missing Referrer Policy]]></title>
            <link>https://www.tenable.com/plugins/was/98527</link>
            <guid>https://www.tenable.com/plugins/was/98527</guid>
            <pubDate>Mon, 25 Mar 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98527 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Missing Referrer Policy<br /></span>
      <h3>Description</h3>
      <span>Referrer Policy provides mechanisms to websites to restrict referrer information (sent in the referer header) that browsers will be allowed to add.<br /></span><span><br /></span><span>No Referrer Policy header or metatag configuration has been detected.<br /></span>
      <h3>Solution</h3>
      <span>Configure Referrer Policy on your website by adding 'Referrer-Policy' HTTP header or meta tag referrer in HTML.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98527">https://www.tenable.com/plugins/was/98527</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Missing Permissions Policy]]></title>
            <link>https://www.tenable.com/plugins/was/98526</link>
            <guid>https://www.tenable.com/plugins/was/98526</guid>
            <pubDate>Mon, 25 Mar 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98526 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Missing Permissions Policy<br /></span>
      <h3>Description</h3>
      <span>Permissions Policy provides mechanisms to websites to restrict the use of browser features in its own frame and in iframes that it embeds.<br /></span>
      <h3>Solution</h3>
      <span>Configure Permissions Policy on your website by adding 'Permissions-Policy' HTTP header.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98526">https://www.tenable.com/plugins/was/98526</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Missing 'X-Frame-Options' Header]]></title>
            <link>https://www.tenable.com/plugins/was/98060</link>
            <guid>https://www.tenable.com/plugins/was/98060</guid>
            <pubDate>Mon, 25 Mar 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98060 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>Missing 'X-Frame-Options' Header<br /></span>
      <h3>Description</h3>
      <span>Clickjacking (User Interface redress attack, UI redress attack, UI redressing) is a malicious technique of tricking a Web user into clicking on something different from what the user perceives they are clicking on, thus potentially revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages.<br /></span><span><br /></span><span>The server didn't return an `X-Frame-Options` header which means that this website could be at risk of a clickjacking attack.<br /></span><span><br /></span><span>The `X-Frame-Options` HTTP response header can be used to indicate whether or not a browser should be allowed to render a page inside a frame or iframe. Sites can use this to avoid clickjacking attacks, by ensuring that their content is not embedded into other sites.<br /></span>
      <h3>Solution</h3>
      <span>Configure your web server to include an `X-Frame-Options` header.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98060">https://www.tenable.com/plugins/was/98060</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Insecure 'Access-Control-Allow-Origin' Header]]></title>
            <link>https://www.tenable.com/plugins/was/98057</link>
            <guid>https://www.tenable.com/plugins/was/98057</guid>
            <pubDate>Mon, 25 Mar 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98057 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>Insecure 'Access-Control-Allow-Origin' Header<br /></span>
      <h3>Description</h3>
      <span>Cross Origin Resource Sharing (CORS) is an HTML5 technology which gives modern web browsers the ability to bypass restrictions implemented by the Same Origin Policy.<br /></span><span><br /></span><span>The Same Origin Policy requires that both the JavaScript and the page are loaded from the same domain in order to allow JavaScript to interact with the page. This in turn prevents malicious JavaScript being executed when loaded from external domains.<br /></span><span><br /></span><span>The CORS policy allows the application to specify exceptions to the protections implemented by the browser, and enables the developer to specify allowlisted domains for which external JavaScript is permitted to execute and interact with the page.<br /></span><span><br /></span><span>The 'Access-Control-Allow-Origin' header is insecure when set to '*' or null, as it allows any domain to perform cross-domain requests and read responses. An attacker could abuse this configuration to retrieve private content from an application which does not use standard authentication mechanisms (for example, an Intranet allowing access from the internal network only).<br /></span>
      <h3>Solution</h3>
      <span>Unless the target application is specifically designed to serve public content to any domain, the 'Access-Control-Allow-Origin' should be configured with an allowlist including only known and trusted domains to perform cross-domain requests if needed, or should be disabled.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98057">https://www.tenable.com/plugins/was/98057</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Serialized Data Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114224</link>
            <guid>https://www.tenable.com/plugins/was/114224</guid>
            <pubDate>Mon, 25 Mar 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114224 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Serialized Data Detected<br /></span>
      <h3>Description</h3>
      <span>Serialization is the process of converting an object to a stream of bytes, in order to store or send it through the network. By opposition, deserialization is the process of reconstructing an object from this stream of bytes.<br /></span><span><br /></span><span>Web applications often use serialized data transmitted from the client which, depending on how it is implemented, can be abused by a malicious actor to conduct his attacks on the target application.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114224">https://www.tenable.com/plugins/was/114224</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Adobe ColdFusion Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/114042</link>
            <guid>https://www.tenable.com/plugins/was/114042</guid>
            <pubDate>Mon, 25 Mar 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114042 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Adobe ColdFusion Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>Adobe ColdFusion prior to versions 2018 Update 19, 2021 Update 9 or 2023 Update 3, suffer from an Insecure Deserialization vulnerability through the `argumentCollection` parameter on `/CFIDE/adminapi/accessmanager.cfc` endpoint. By leveraging this vulnerability, a remote unauthenticated attacker could achieve a remote code execution on the target ColdFusion instance.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Adobe ColdFusion versions 2018 Update 19, 2021 Update 9, 2023 Update 3 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114042">https://www.tenable.com/plugins/was/114042</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Duplicate HTTP Headers Detected]]></title>
            <link>https://www.tenable.com/plugins/was/113333</link>
            <guid>https://www.tenable.com/plugins/was/113333</guid>
            <pubDate>Mon, 25 Mar 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113333 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Duplicate HTTP Headers Detected<br /></span>
      <h3>Description</h3>
      <span>Multiple HTTP headers of the same name have been detected. RFC 7230 states a server must not generate multiple header fields with the same field name unless either the entire field value for that header field is defined as a comma-separated list, or the header field is a well-known exception. Strings split across multiple header instances may have unpredictable results, since other elements such as command and whitespace may be inserted during recombination outside the control of the originating serializer.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that any HTTP header or meta tag http-equiv declarations are named uniquely.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113333">https://www.tenable.com/plugins/was/113333</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Report Only Content Security Policy Detected]]></title>
            <link>https://www.tenable.com/plugins/was/112555</link>
            <guid>https://www.tenable.com/plugins/was/112555</guid>
            <pubDate>Mon, 25 Mar 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112555 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Report Only Content Security Policy Detected<br /></span>
      <h3>Description</h3>
      <span>Content Security Policy (CSP) is a web security standard that helps to mitigate attacks like cross-site scripting (XSS), clickjacking or mixed content issues. CSP provides mechanisms to websites to restrict content that browsers will be allowed to load.<br /></span><span><br /></span><span>CSP has been detected but is configured into to report only mode.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that Content Security Policy is configured in enforcing mode on your website by adding 'Content-Security-Policy' HTTP header or meta tag http-equiv='Content-Security-Policy' and removing the 'Content-Security-Policy-Report-Only' HTTP header or meta tag http-equiv='Content-Security-Policy-Report-Only if not needed<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112555">https://www.tenable.com/plugins/was/112555</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Missing 'Cache-Control' Header]]></title>
            <link>https://www.tenable.com/plugins/was/112553</link>
            <guid>https://www.tenable.com/plugins/was/112553</guid>
            <pubDate>Mon, 25 Mar 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112553 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>Missing 'Cache-Control' Header<br /></span>
      <h3>Description</h3>
      <span>The HTTP 'Cache-Control' header is used to specify directives for caching mechanisms.<br /></span><span><br /></span><span>The server did not return or returned an invalid 'Cache-Control' header which means page containing sensitive information (password, credit card, personal data, social security number, etc) could be stored on client side disk and then be exposed to unauthorised persons. This URL is flagged as a specific example.<br /></span>
      <h3>Solution</h3>
      <span>Configure your web server to include a 'Cache-Control' header with appropriate directives. If page contains sensitive information 'Cache-Control' value should be 'no-store' and 'Pragma' header value should be 'no-cache'.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112553">https://www.tenable.com/plugins/was/112553</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Missing Content Security Policy]]></title>
            <link>https://www.tenable.com/plugins/was/112551</link>
            <guid>https://www.tenable.com/plugins/was/112551</guid>
            <pubDate>Mon, 25 Mar 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112551 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>Missing Content Security Policy<br /></span>
      <h3>Description</h3>
      <span>Content Security Policy (CSP) is a web security standard that helps to mitigate attacks like cross-site scripting (XSS), clickjacking or mixed content issues. CSP provides mechanisms to websites to restrict content that browsers will be allowed to load.<br /></span><span><br /></span><span>No CSP header has been detected on this host. This URL is flagged as a specific example.<br /></span>
      <h3>Solution</h3>
      <span>Configure Content Security Policy on your website by adding 'Content-Security-Policy' HTTP header or meta tag http-equiv='Content-Security-Policy'.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112551">https://www.tenable.com/plugins/was/112551</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[HTTP Strict Transport Security Policy Detected]]></title>
            <link>https://www.tenable.com/plugins/was/112535</link>
            <guid>https://www.tenable.com/plugins/was/112535</guid>
            <pubDate>Mon, 25 Mar 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112535 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>HTTP Strict Transport Security Policy Detected<br /></span>
      <h3>Description</h3>
      <span>HTTP Strict Transport Security (HSTS) is an optional response header that can be configured on the server to instruct the browser to only communicate via HTTPS.<br /></span><span><br /></span><span>The HSTS policy can be defined with the following settings :<br /></span><span><br /></span><span> - max-age: the time, in seconds, that the browser should remember that a site is only to be accessed in HTTPS.<br /></span><span><br /></span><span> - includeSubDomains (optional) : if this attribute is specified, the policy applies to all current site subdomains.<br /></span><span><br /></span><span> - preload (optional) : Google maintains a compiled list of domains which is directly distributed in some browsers to enforce HTTPS without checking for the HSTS HTTP header. As the domain submission process is public, the preload attribute is used as a validation when a domain is submitted for preloading.<br /></span><span><br /></span><span>The scanner detected a HSTS policy on the target application.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112535">https://www.tenable.com/plugins/was/112535</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Missing 'X-Content-Type-Options' Header]]></title>
            <link>https://www.tenable.com/plugins/was/112529</link>
            <guid>https://www.tenable.com/plugins/was/112529</guid>
            <pubDate>Mon, 25 Mar 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112529 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>Missing 'X-Content-Type-Options' Header<br /></span>
      <h3>Description</h3>
      <span>The HTTP 'X-Content-Type-Options' response header prevents the browser from MIME-sniffing a response away from the declared content-type.<br /></span><span><br /></span><span>The server did not return a correct 'X-Content-Type-Options' header, which means that this website could be at risk of a Cross-Site Scripting (XSS) attack.<br /></span>
      <h3>Solution</h3>
      <span>Configure your web server to include an 'X-Content-Type-Options' header with a value of 'nosniff'.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112529">https://www.tenable.com/plugins/was/112529</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Disabled 'X-XSS-Protection' Header (deprecated)]]></title>
            <link>https://www.tenable.com/plugins/was/112527</link>
            <guid>https://www.tenable.com/plugins/was/112527</guid>
            <pubDate>Mon, 25 Mar 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112527 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Disabled 'X-XSS-Protection' Header (deprecated)<br /></span>
      <h3>Description</h3>
      <span>The HTTP 'X-XSS-Protection' response header is a feature of modern browsers that allows websites to control their XSS auditors.<br /></span><span><br /></span><span>The server did not return a correct 'X-XSS-Protection' header, which means that this website could be at risk of a Cross-Site Scripting (XSS) attack.<br /></span><span><br /></span><span>If legacy browsers support is not needed, it is recommended to use Content-Security-Policy without allowing unsafe-inline scripts instead.<br /></span>
      <h3>Solution</h3>
      <span>Configure your web server to include an 'X-XSS-Protection' header with a value of '1; mode=block'.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112527">https://www.tenable.com/plugins/was/112527</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[HTTPS Not Detected]]></title>
            <link>https://www.tenable.com/plugins/was/112543</link>
            <guid>https://www.tenable.com/plugins/was/112543</guid>
            <pubDate>Wed, 13 Mar 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112543 with High Severity</p>
      <h3>Synopsis</h3>
      <span>HTTPS Not Detected<br /></span>
      <h3>Description</h3>
      <span>HTTPS is a protocol that protects the integrity and confidentiality of data between client and server. HTTPS is highly recommended to protect connections to website regardless of its content.<br /></span>
      <h3>Solution</h3>
      <span>Enable HTTPS following best practices.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112543">https://www.tenable.com/plugins/was/112543</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 9.0.0.M1 < 9.0.0.M22 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/112295</link>
            <guid>https://www.tenable.com/plugins/was/112295</guid>
            <pubDate>Wed, 13 Mar 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112295 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Tomcat 9.0.0.M1 < 9.0.0.M22 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is 9.0.0.M1 or later but prior to 9.0.0.M22. It is, therefore, affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A flaw exists in the CORS filter because the HTTP Vary header was not properly added. This allows a remote attacker to conduct client-side and server-side cache poisoning attacks. (CVE-2017-7674)<br /></span><span><br /></span><span> - A flaw exists in the HTTP/2 implementation that bypasses a number of security checks that prevented directory traversal attacks. A remote attacker can exploit this to bypass security constraints. (CVE-2017-7675)<br /></span><span><br /></span><span>Note that the scanner has not attempted to exploit this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 9.0.0.M22 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112295">https://www.tenable.com/plugins/was/112295</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Ultimate Member Plugin for WordPress < 2.0.46 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/98607</link>
            <guid>https://www.tenable.com/plugins/was/98607</guid>
            <pubDate>Wed, 06 Mar 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98607 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Ultimate Member Plugin for WordPress < 2.0.46 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The WordPress Ultimate Member Plugin installed on the remote host is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - An arbitrary file read and delete vulnerability.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability exists due to improper validation of user-supplied input in admin dashboard.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability exists due to improper validation of user-supplied input in user profile.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Ultimate Member Plugin for WordPress 2.0.46 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98607">https://www.tenable.com/plugins/was/98607</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Log4j Remote Code Execution (Log4Shell)]]></title>
            <link>https://www.tenable.com/plugins/was/113075</link>
            <guid>https://www.tenable.com/plugins/was/113075</guid>
            <pubDate>Wed, 06 Mar 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113075 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Log4j Remote Code Execution (Log4Shell)<br /></span>
      <h3>Description</h3>
      <span>Apache Log4j is an open source Java-based logging framework leveraged within numerous Java applications. Apache Log4j versions 2.0-beta9 to 2.15.0 suffer from insufficient protections on message lookup substitutions when dealing with user controlled input. By crafting a malicious string, an attacker could leverage this issue to achieve a remote code execution on the Log4j instance used by the target application.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to version 2.16.0 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113075">https://www.tenable.com/plugins/was/113075</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Allowed HTTP Methods]]></title>
            <link>https://www.tenable.com/plugins/was/98047</link>
            <guid>https://www.tenable.com/plugins/was/98047</guid>
            <pubDate>Tue, 27 Feb 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98047 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Allowed HTTP Methods<br /></span>
      <h3>Description</h3>
      <span>There are a number of HTTP methods that can be used on a webserver (`OPTIONS`, `HEAD`, `GET`, `POST`, `PUT`, `DELETE` etc.). Each of these methods perform a different function and each have an associated level of risk when their use is permitted on the webserver.<br /></span><span><br /></span><span>By sending an HTTP OPTIONS request and a direct HTTP request for each method, the scanner discovered the methods that are allowed by the server.<br /></span>
      <h3>Solution</h3>
      <span>It is recommended that a whitelisting approach be taken to explicitly permit only the HTTP methods required by the application and block all others.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98047">https://www.tenable.com/plugins/was/98047</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[ConnectWise ScreenConnect < 23.9.8 Authentication Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/114214</link>
            <guid>https://www.tenable.com/plugins/was/114214</guid>
            <pubDate>Tue, 27 Feb 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114214 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>ConnectWise ScreenConnect < 23.9.8 Authentication Bypass<br /></span>
      <h3>Description</h3>
      <span>ConnectWise ScreenConnect versions before 23.9.8 suffer from an authentication bypass vulnerability. By leveraging this vulnerability, a remote and unauthenticated user can create a new user account and gain access to the vulnerable instance.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to ConnectWise ScreenConnect 23.9.8 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114214">https://www.tenable.com/plugins/was/114214</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache OFBiz Authentication Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/114145</link>
            <guid>https://www.tenable.com/plugins/was/114145</guid>
            <pubDate>Wed, 21 Feb 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114145 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Apache OFBiz Authentication Bypass<br /></span>
      <h3>Description</h3>
      <span>Apache OFBiz versions before 18.12.11 suffer from an authentication bypass vulnerability. By crafting a specific URL, a remote and unauthenticated attacker can bypass authentication on the target instance.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to the latest Apache OFBiz version.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114145">https://www.tenable.com/plugins/was/114145</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Web Cache Deception]]></title>
            <link>https://www.tenable.com/plugins/was/113580</link>
            <guid>https://www.tenable.com/plugins/was/113580</guid>
            <pubDate>Wed, 21 Feb 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113580 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Web Cache Deception<br /></span>
      <h3>Description</h3>
      <span>A caching system has been detected on the application and is vulnerable to web cache deception. By manipulating the URL it is possible to force the application to cache pages that are only accessible by an authenticated user. Once cached, these pages can be accessed by an unauthenticated user.<br /></span>
      <h3>Solution</h3>
      <span>Perform caching by also checking the Content-Type of the file, not just the URL and extension<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113580">https://www.tenable.com/plugins/was/113580</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Oracle WebLogic 10.3.6.0.0 / 12.1.3.0.0 / 12.2.1.4.0 / 14.1.1.0.0 Authentication Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/112705</link>
            <guid>https://www.tenable.com/plugins/was/112705</guid>
            <pubDate>Wed, 21 Feb 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112705 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Oracle WebLogic 10.3.6.0.0 / 12.1.3.0.0 / 12.2.1.4.0 / 14.1.1.0.0 Authentication Bypass<br /></span>
      <h3>Description</h3>
      <span>Oracle Weblogic versions 10.3.6.0.0, 12.1.3.0.0, 12.2.1.4.0 & 14.1.1.0.0 suffer from a weakness allowing to bypass authentication and to access the management panel due to a bad character management %252e (".") & %252f ("/").<br /></span><span><br /></span><span>In some cases, exploiting this vulnerability can lead to the execution of arbitrary code on the server.<br /></span><span><br /></span><span>Oracle proposes the associated patches on its site to fix the vulnerability.<br /></span>
      <h3>Solution</h3>
      <span>Apply the security patches available on Oracle's website.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112705">https://www.tenable.com/plugins/was/112705</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Ivanti Connect Secure 9.x / 22.x XML External Entity]]></title>
            <link>https://www.tenable.com/plugins/was/114203</link>
            <guid>https://www.tenable.com/plugins/was/114203</guid>
            <pubDate>Mon, 19 Feb 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114203 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Ivanti Connect Secure 9.x / 22.x XML External Entity<br /></span>
      <h3>Description</h3>
      <span>Ivanti Connect Secure 9.x, 22.x suffers from an XML External Entity.<br /></span><span><br /></span><span>By crafting a specific HTTP request, a remote attacker could exploit this vulnerability to access certain restricted resources without authentication.<br /></span>
      <h3>Solution</h3>
      <span>Apply `mitigation.release.20240126.5.xml` hotfix from vendor website.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114203">https://www.tenable.com/plugins/was/114203</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Stripe Payment Plugin for WooCommerce Plugin for WordPress < 3.8.0 SQL Injection]]></title>
            <link>https://www.tenable.com/plugins/was/114164</link>
            <guid>https://www.tenable.com/plugins/was/114164</guid>
            <pubDate>Thu, 15 Feb 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114164 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Stripe Payment Plugin for WooCommerce Plugin for WordPress < 3.8.0 SQL Injection<br /></span>
      <h3>Description</h3>
      <span>The WordPress Stripe Payment Plugin for WooCommerce Plugin installed on the remote host is affected by a SQL Injection via the id parameter.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Stripe Payment Plugin for WooCommerce Plugin for WordPress 3.8.0 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114164">https://www.tenable.com/plugins/was/114164</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Appwrite Server-Side Request Forgery]]></title>
            <link>https://www.tenable.com/plugins/was/114122</link>
            <guid>https://www.tenable.com/plugins/was/114122</guid>
            <pubDate>Thu, 15 Feb 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114122 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Appwrite Server-Side Request Forgery<br /></span>
      <h3>Description</h3>
      <span>The version of Appwrite installed on the remote contain a Server-Side Request Forgery (SSRF) vulnerability via the component '/v1/avatars/faviconhost'. Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>No remediation is currently available for this product. As a workaround, It is recommended to block requests to the vulnerable endpoint until a patch is released.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114122">https://www.tenable.com/plugins/was/114122</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WP Fastest Cache Plugin for WordPress < 1.1.3 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114027</link>
            <guid>https://www.tenable.com/plugins/was/114027</guid>
            <pubDate>Thu, 15 Feb 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114027 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>WP Fastest Cache Plugin for WordPress < 1.1.3 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The WordPress Fastest Cache Plugin installed on the remote host suffers from multiple vulnerabilities:<br /></span><span><br /></span><span>- A nonce validation issue on the wpfc_preload_single_callback function leading to a Cross-Site Request Forgery (CSRF) vulnerability permitting attackers to invoke a cache building action (CVE-2023-1918)<br /></span><span><br /></span><span>- A nonce validation issue on the wpfc_preload_single_callback function leading to a Cross-Site Request Forgery (CSRF) vulnerability permitting attackers to change cache related settings (CVE-2023-1919)<br /></span><span><br /></span><span>- A nonce validation issue on the wpfc_purgecache_varnish_callback function leading to a Cross-Site Request Forgery (CSRF) vulnerability permitting attackers to purge the varnish cache via a forged request (CVE-2023-1920)<br /></span><span><br /></span><span>- A nonce validation issue on the wpfc_start_cdn_integration_ajax_request_callback function leading to a Cross-Site Request Forgery (CSRF) vulnerability permitting attackers to change cdn settings via a forged request (CVE-2023-1921)<br /></span><span><br /></span><span>- A nonce validation issue on the wpfc_pause_cdn_integration_ajax_request_callback function leading to a Cross-Site Request Forgery (CSRF) vulnerability permitting attackers to change cdn settings via a forged request (CVE-2023-1922)<br /></span><span><br /></span><span>- A nonce validation issue on the wpfc_remove_cdn_integration_ajax_request_callback function leading to a Cross-Site Request Forgery (CSRF) vulnerability permitting attackers to change cdn settings via a forged request (CVE-2023-1923)<br /></span><span><br /></span><span>- A nonce validation issue on the wpfc_toolbar_save_settings_callback function leading to a Cross-Site Request Forgery (CSRF) vulnerability permitting attackers to change cache related settings (CVE-2023-1924)<br /></span><span><br /></span><span>- A nonce validation issue on the wpfc_clear_cache_of_allsites_callback function leading to a Cross-Site Request Forgery (CSRF) vulnerability permitting attackers to clear caches (CVE-2023-1925)<br /></span><span><br /></span><span>- A nonce validation issue on the deleteCacheToolbar function leading to a Cross-Site Request Forgery (CSRF) vulnerability permitting attackers to delete caches (CVE-2023-1926)<br /></span><span><br /></span><span>- A nonce validation issue on the deleteCssAndJsCacheToolbar function leading to a Cross-Site Request Forgery (CSRF) vulnerability permitting attackers to delete caches (CVE-2023-1927)<br /></span><span><br /></span><span>- A missing capability check vulnerability on the wpfc_preload_single_callback function permitting attackers with subscriber-level access to initiate cache creation (CVE-2023-1928)<br /></span><span><br /></span><span>- A missing capability check vulnerability on the wpfc_purgecache_varnish_callback function permitting attackers with subscriber-level access to initiate cache creation (CVE-2023-1929)<br /></span><span><br /></span><span>- A missing capability check vulnerability on the wpfc_clear_cache_of_allsites_callback function permitting attackers with subscriber-level access to initiate cache creation (CVE-2023-1930)<br /></span><span><br /></span><span>- A missing capability check vulnerability on the deleteCssAndJsCacheToolbar function permitting attackers with subscriber-level access to initiate cache creation (CVE-2023-1931)<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to WP Fastest Cache Plugin for WordPress 1.1.3 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114027">https://www.tenable.com/plugins/was/114027</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[PHP Object Deserialization]]></title>
            <link>https://www.tenable.com/plugins/was/113237</link>
            <guid>https://www.tenable.com/plugins/was/113237</guid>
            <pubDate>Thu, 08 Feb 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113237 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>PHP Object Deserialization<br /></span>
      <h3>Description</h3>
      <span>Serialization is the process of converting an object to a stream of bytes, in order to store or send it through the network. By opposition, deserialization is the process of reconstructing an object from this stream of bytes.<br /></span><span><br /></span><span>When PHP web applications use the `unserialize()` function to perform user-supplied data deserialization, an attacker could inject a custom serialized PHP object in order to achieve a remote code execution on the system or to generate a Denial of Service attack (DoS).<br /></span>
      <h3>Solution</h3>
      <span>Untrusted data should never be deserialized by the application. If required, a code review should be done to prevent deserialization of arbitrary classes and to harden the whole process.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113237">https://www.tenable.com/plugins/was/113237</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Server-Side Template Injection]]></title>
            <link>https://www.tenable.com/plugins/was/112614</link>
            <guid>https://www.tenable.com/plugins/was/112614</guid>
            <pubDate>Thu, 08 Feb 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112614 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Server-Side Template Injection<br /></span>
      <h3>Description</h3>
      <span>Web applications often rely on template engines to manage the dynamic generation of the HTML pages presented to their users.<br /></span><span><br /></span><span>A Server-Side Template Injection (SSTI) vulnerability exists when an application embeds unsafe user-controlled inputs in its templates and then evaluates it.<br /></span><span><br /></span><span>By injecting a specific payload dependent on the template engine used by the application, an attacker can leverage this vulnerability to gain access to sensitive information or to achieve remote code execution.<br /></span>
      <h3>Solution</h3>
      <span>Developers should avoid using user inputs in server templates to prevent malicious injections. If the application still requires this type of inputs, logic-less template engines should be preferred when possible to decrease the attack surface by removing the logic part of the code from the templates. Finally, another solution is to create sandboxed environments by leveraging language capabilities or docker isolated containers.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112614">https://www.tenable.com/plugins/was/112614</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Drupal Administration Panel Login Form Detected]]></title>
            <link>https://www.tenable.com/plugins/was/98200</link>
            <guid>https://www.tenable.com/plugins/was/98200</guid>
            <pubDate>Fri, 02 Feb 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98200 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Drupal Administration Panel Login Form Detected<br /></span>
      <h3>Description</h3>
      <span>Drupal Administration Panel has been detected on the target web application.<br /></span><span><br /></span><span>This may present an attacker with an exploit vector which could be leveraged using other techniques, such as a Brute-Force or Dictionary Attack, allowing an attacker to gain access to administrative functionality.<br /></span>
      <h3>Solution</h3>
      <span>Restrict access to administrative functionality using a .htaccess file, limiting access to known IP Addresses.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98200">https://www.tenable.com/plugins/was/98200</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Selenium Crawl Failed]]></title>
            <link>https://www.tenable.com/plugins/was/98145</link>
            <guid>https://www.tenable.com/plugins/was/98145</guid>
            <pubDate>Fri, 02 Feb 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98145 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Selenium Crawl Failed<br /></span>
      <h3>Description</h3>
      <span>This plugin is raised when the scanner has not been able to crawl the web application using the Selenium scripts provided in the scan policy.<br /></span><span><br /></span><span>Check the output of the plugin to get an explanation of the issue encountered by the scan.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98145">https://www.tenable.com/plugins/was/98145</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Selenium Crawl Succeeded]]></title>
            <link>https://www.tenable.com/plugins/was/98143</link>
            <guid>https://www.tenable.com/plugins/was/98143</guid>
            <pubDate>Fri, 02 Feb 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98143 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Selenium Crawl Succeeded<br /></span>
      <h3>Description</h3>
      <span>This is an informational notice that the scanner was able to successfully perform the crawling scripts provided in the policy.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98143">https://www.tenable.com/plugins/was/98143</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Backdoor Detection]]></title>
            <link>https://www.tenable.com/plugins/was/98097</link>
            <guid>https://www.tenable.com/plugins/was/98097</guid>
            <pubDate>Fri, 02 Feb 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98097 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Backdoor Detection<br /></span>
      <h3>Description</h3>
      <span>The scanner was able to determine that a possible web backdoor or web shell exists on the remote web server by utilizing the same methods as cyber-criminals. If a server has been previously compromised, there is a high probability that the cyber-criminal has installed a backdoor so that they can easily return to the server if required. One method of achieving this is to place a web backdoor or web shell within the web root of the web server. This will then enable the cyber-criminal to access the server through an HTTP/S session. Although extremely bad practice, it is possible that the web backdoor or web shell has been placed there by an administrator so they can perform administrative activities remotely. During the initial reconnaissance stages of an attack, cyber-criminals will attempt to locate these web backdoors or shells by requesting the names of the most common and well known ones. By analyzing the response, they are able to determine if a web backdoor or web shell exists. These web backdoors or web shells can then provide an easy path for further compromise of the server.<br /></span>
      <h3>Solution</h3>
      <span>If manual confirmation reveals that a web backdoor or web shell does exist on the server, then it should be removed.<br /></span><span>It is also recommended that an incident response investigation be conducted on the server to establish how the web backdoor or web shell came to exist on the server.<br /></span><span>Depending on the environment, investigation into the compromise of any other services or servers should be conducted.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98097">https://www.tenable.com/plugins/was/98097</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[POST SMTP Mailer Plugin for WordPress < 2.8.8 Authorization Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/114157</link>
            <guid>https://www.tenable.com/plugins/was/114157</guid>
            <pubDate>Wed, 24 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114157 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>POST SMTP Mailer Plugin for WordPress < 2.8.8 Authorization Bypass<br /></span>
      <h3>Description</h3>
      <span>The WordPress POST SMTP Mailer Plugin installed on the remote host is affected by an authorization bypass vulnerability via type connect-app API.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to POST SMTP Mailer Plugin for WordPress 2.8.8 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114157">https://www.tenable.com/plugins/was/114157</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Confluence 8.6.x < 8.7.2 Multiple Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/114156</link>
            <guid>https://www.tenable.com/plugins/was/114156</guid>
            <pubDate>Wed, 24 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114156 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Confluence 8.6.x < 8.7.2 Multiple Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Atlassian Confluence application running on the remote host is prior to 7.19.18, 8.x prior to 8.5.5 or 8.6.x prior to 8.7.2. It is, therefore, affected by multiple remote code execution vulnerabilities.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Confluence version 8.7.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114156">https://www.tenable.com/plugins/was/114156</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Confluence 8.x < 8.5.5 Multiple Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/114155</link>
            <guid>https://www.tenable.com/plugins/was/114155</guid>
            <pubDate>Wed, 24 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114155 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Confluence 8.x < 8.5.5 Multiple Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Atlassian Confluence application running on the remote host is prior to 7.19.18, 8.x prior to 8.5.5 or 8.6.x prior to 8.7.2. It is, therefore, affected by multiple remote code execution vulnerabilities.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Confluence version 8.5.5 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114155">https://www.tenable.com/plugins/was/114155</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Confluence < 7.19.18 Multiple Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/114154</link>
            <guid>https://www.tenable.com/plugins/was/114154</guid>
            <pubDate>Wed, 24 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114154 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Confluence < 7.19.18 Multiple Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Atlassian Confluence application running on the remote host is prior to 7.19.18, 8.x prior to 8.5.5 or 8.6.x prior to 8.7.2. It is, therefore, affected by multiple remote code execution vulnerabilities.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Confluence version 7.19.18 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114154">https://www.tenable.com/plugins/was/114154</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Confluence 8.6.x < 8.7.2 Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/114153</link>
            <guid>https://www.tenable.com/plugins/was/114153</guid>
            <pubDate>Wed, 24 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114153 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Confluence 8.6.x < 8.7.2 Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Atlassian Confluence application running on the remote host is 7.13.x prior to 7.19.17, 8.x prior to 8.5.5 or 8.6.x prior to 8.7.2. It is, therefore, affected by a remote code execution vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Confluence version 8.7.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114153">https://www.tenable.com/plugins/was/114153</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Confluence 8.x < 8.5.5 Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/114152</link>
            <guid>https://www.tenable.com/plugins/was/114152</guid>
            <pubDate>Wed, 24 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114152 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Confluence 8.x < 8.5.5 Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Atlassian Confluence application running on the remote host is 7.13.x prior to 7.19.17, 8.x prior to 8.5.5 or 8.6.x prior to 8.7.2. It is, therefore, affected by a remote code execution vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Confluence version 8.5.5 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114152">https://www.tenable.com/plugins/was/114152</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Confluence 7.13.x < 7.19.17 Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/114151</link>
            <guid>https://www.tenable.com/plugins/was/114151</guid>
            <pubDate>Wed, 24 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114151 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Confluence 7.13.x < 7.19.17 Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Atlassian Confluence application running on the remote host is 7.13.x prior to 7.19.17, 8.x prior to 8.5.5 or 8.6.x prior to 8.7.2. It is, therefore, affected by a remote code execution vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Confluence version 7.19.17 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114151">https://www.tenable.com/plugins/was/114151</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Microsoft SharePoint Server 2019 build < 16.0.10399.20005 Elevation of Privilege]]></title>
            <link>https://www.tenable.com/plugins/was/114099</link>
            <guid>https://www.tenable.com/plugins/was/114099</guid>
            <pubDate>Wed, 24 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114099 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Microsoft SharePoint Server 2019 build < 16.0.10399.20005 Elevation of Privilege<br /></span>
      <h3>Description</h3>
      <span>Microsoft SharePoint Server 2019 build < 16.0.10399.20005 is vulnerable to an Elevation of Privilege. An attacker who successfully exploited this vulnerability could gain administrator privileges.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Microsoft SharePoint Server 2019 build 16.0.10399.20005 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114099">https://www.tenable.com/plugins/was/114099</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Pimcore User Enumeration]]></title>
            <link>https://www.tenable.com/plugins/was/114089</link>
            <guid>https://www.tenable.com/plugins/was/114089</guid>
            <pubDate>Wed, 24 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114089 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Pimcore User Enumeration<br /></span>
      <h3>Description</h3>
      <span>Pimcore versions before 10.1.3 suffer from an user enumeration vulnerability through the administration panel lost password feature. By submitting multiple usernames, a remote and unauthenticated attacker can infer the valid administrative accounts on the target Pimcore instance.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Pimcore version 10.1.3 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114089">https://www.tenable.com/plugins/was/114089</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Sitecore Unauthenticated User Enumeration]]></title>
            <link>https://www.tenable.com/plugins/was/113904</link>
            <guid>https://www.tenable.com/plugins/was/113904</guid>
            <pubDate>Wed, 24 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113904 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Sitecore Unauthenticated User Enumeration<br /></span>
      <h3>Description</h3>
      <span>Sitecore CMS version 9.x / 10.x may be vulnerable to user enumeration by unauthenticated users through a specific endpoint.<br /></span>
      <h3>Solution</h3>
      <span>Apply hotfix `SC Hotfix 576689-1` for versions 9.x or 10.x.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113904">https://www.tenable.com/plugins/was/113904</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[DotNetNuke User Enumeration]]></title>
            <link>https://www.tenable.com/plugins/was/113871</link>
            <guid>https://www.tenable.com/plugins/was/113871</guid>
            <pubDate>Wed, 24 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113871 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>DotNetNuke User Enumeration<br /></span>
      <h3>Description</h3>
      <span>In a DotNetNuke CMS installation it may be possible to enumerate user information. These DotNetNuke usernames may then be used in brute-force attacks against the login page to guess password credentials and gain access to perform further attacks. Only the first 5 usernames have been analysed during the test.<br /></span>
      <h3>Solution</h3>
      <span>Configure the site level user privacy settings to disable profile visibility<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113871">https://www.tenable.com/plugins/was/113871</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[GiveWP Plugin for WordPress < 2.24.1 SQL Injection]]></title>
            <link>https://www.tenable.com/plugins/was/113855</link>
            <guid>https://www.tenable.com/plugins/was/113855</guid>
            <pubDate>Wed, 24 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113855 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>GiveWP Plugin for WordPress < 2.24.1 SQL Injection<br /></span>
      <h3>Description</h3>
      <span>The WordPress GiveWP Plugin installed on the remote host is affected by a sql injection vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to GiveWP Plugin for WordPress 2.24.1 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113855">https://www.tenable.com/plugins/was/113855</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Customer Reviews for WooCommerce Plugin for WordPress < 5.17.0 Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/113853</link>
            <guid>https://www.tenable.com/plugins/was/113853</guid>
            <pubDate>Wed, 24 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113853 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Customer Reviews for WooCommerce Plugin for WordPress < 5.17.0 Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>The WordPress Customer Reviews for WooCommerce Plugin installed on the remote host is affected by a cross-site scripting vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Customer Reviews for WooCommerce Plugin for WordPress 5.17.0 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113853">https://www.tenable.com/plugins/was/113853</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Confluence 8.7.x < 8.7.1 Template Injection]]></title>
            <link>https://www.tenable.com/plugins/was/114127</link>
            <guid>https://www.tenable.com/plugins/was/114127</guid>
            <pubDate>Fri, 19 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114127 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Confluence 8.7.x < 8.7.1 Template Injection<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Atlassian Confluence application running on the remote host is 4.x prior to 7.19.17, 8.x prior to 8.4.5, 8.5.x prior to 8.5.4, 8.6.x prior to 8.6.2 or 8.7.x prior to 8.7.1. It is, therefore, affected by a template injection vulnerability which allows an authenticated attacker, including one with anonymous access, to inject unsafe user input into a Confluence page. Using this approach, an attacker is able to achieve RCE on an affected instance.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Confluence version 8.7.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114127">https://www.tenable.com/plugins/was/114127</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Confluence 8.6.x < 8.6.2 Template Injection]]></title>
            <link>https://www.tenable.com/plugins/was/114126</link>
            <guid>https://www.tenable.com/plugins/was/114126</guid>
            <pubDate>Fri, 19 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114126 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Confluence 8.6.x < 8.6.2 Template Injection<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Atlassian Confluence application running on the remote host is 4.x prior to 7.19.17, 8.x prior to 8.4.5, 8.5.x prior to 8.5.4, 8.6.x prior to 8.6.2 or 8.7.x prior to 8.7.1. It is, therefore, affected by a template injection vulnerability which allows an authenticated attacker, including one with anonymous access, to inject unsafe user input into a Confluence page. Using this approach, an attacker is able to achieve RCE on an affected instance.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Confluence version 8.6.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114126">https://www.tenable.com/plugins/was/114126</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Confluence 8.5.x < 8.5.4 Template Injection]]></title>
            <link>https://www.tenable.com/plugins/was/114125</link>
            <guid>https://www.tenable.com/plugins/was/114125</guid>
            <pubDate>Fri, 19 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114125 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Confluence 8.5.x < 8.5.4 Template Injection<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Atlassian Confluence application running on the remote host is 4.x prior to 7.19.17, 8.x prior to 8.4.5, 8.5.x prior to 8.5.4, 8.6.x prior to 8.6.2 or 8.7.x prior to 8.7.1. It is, therefore, affected by a template injection vulnerability which allows an authenticated attacker, including one with anonymous access, to inject unsafe user input into a Confluence page. Using this approach, an attacker is able to achieve RCE on an affected instance.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Confluence version 8.5.4 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114125">https://www.tenable.com/plugins/was/114125</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Confluence 8.x < 8.4.5 Template Injection]]></title>
            <link>https://www.tenable.com/plugins/was/114124</link>
            <guid>https://www.tenable.com/plugins/was/114124</guid>
            <pubDate>Fri, 19 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114124 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Confluence 8.x < 8.4.5 Template Injection<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Atlassian Confluence application running on the remote host is 4.x prior to 7.19.17, 8.x prior to 8.4.5, 8.5.x prior to 8.5.4, 8.6.x prior to 8.6.2 or 8.7.x prior to 8.7.1. It is, therefore, affected by a template injection vulnerability which allows an authenticated attacker, including one with anonymous access, to inject unsafe user input into a Confluence page. Using this approach, an attacker is able to achieve RCE on an affected instance.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Confluence version 8.4.5 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114124">https://www.tenable.com/plugins/was/114124</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Confluence 4.x < 7.19.17 Template Injection]]></title>
            <link>https://www.tenable.com/plugins/was/114123</link>
            <guid>https://www.tenable.com/plugins/was/114123</guid>
            <pubDate>Fri, 19 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114123 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Confluence 4.x < 7.19.17 Template Injection<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Atlassian Confluence application running on the remote host is 4.x prior to 7.19.17, 8.x prior to 8.4.5, 8.5.x prior to 8.5.4, 8.6.x prior to 8.6.2 or 8.7.x prior to 8.7.1. It is, therefore, affected by a template injection vulnerability which allows an authenticated attacker, including one with anonymous access, to inject unsafe user input into a Confluence page. Using this approach, an attacker is able to achieve RCE on an affected instance.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Confluence version 7.19.17 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114123">https://www.tenable.com/plugins/was/114123</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Joomla! 4.0.0 < 4.2.8 Broken Access Control]]></title>
            <link>https://www.tenable.com/plugins/was/113584</link>
            <guid>https://www.tenable.com/plugins/was/113584</guid>
            <pubDate>Fri, 19 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113584 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Joomla! 4.0.0 < 4.2.8 Broken Access Control<br /></span>
      <h3>Description</h3>
      <span>A broken access control allows unauthorized access to webservice endpoints allowing access to sensitive information such as database login information.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Joomla! version 4.2.8 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113584">https://www.tenable.com/plugins/was/113584</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Content Injection]]></title>
            <link>https://www.tenable.com/plugins/was/113212</link>
            <guid>https://www.tenable.com/plugins/was/113212</guid>
            <pubDate>Fri, 19 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113212 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>Content Injection<br /></span>
      <h3>Description</h3>
      <span>Content Injection is an attack that injects arbitrary characters into a web page. When an application does not properly handle user-supplied data, an attacker can supply content to a web application, typically via a parameter value which is then reflected in the page. This attack is typically used as, or in conjunction with, social engineering by transmitting a URL that completely modifies the target page with, for example, a fake authentication test pattern in order to steal the user's identifiers. In some cases, this attack can also lead directly or indirectly to a Cross-Site Scripting or a client-side JSON injection.<br /></span>
      <h3>Solution</h3>
      <span>To remedy to Content Injection vulnerabilities, it is important to never use untrusted or unfiltered data within the code of a HTML page.<br /></span><span>Untrusted data can originate not only form the client but potentially a third party or previously uploaded file etc.<br /></span><span>Filtering of untrusted data typically involves converting special characters to their HTML entity encoded counterparts (however, other methods do exist, see references). These special characters include:<br /></span><span>* `&` * `<` * `>` * `'` * `'` * `/`<br /></span><span>An example of HTML entity encoding is converting `<` to `&lt;`.<br /></span><span>Although it is possible to filter untrusted input, there are five locations within an HTML page where untrusted input (even if it has been filtered) should never be placed:<br /></span><span>1. Directly in a script. 2. Inside an HTML comment. 3. In an attribute name. 4. In a tag name. 5. Directly in CSS.<br /></span><span>Each of these locations have their own form of escaping and filtering.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113212">https://www.tenable.com/plugins/was/113212</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Microsoft SharePoint Server 2013 < 15.0.5311.1000 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/112943</link>
            <guid>https://www.tenable.com/plugins/was/112943</guid>
            <pubDate>Fri, 19 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112943 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Microsoft SharePoint Server 2013 < 15.0.5311.1000 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Microsoft SharePoint application running on the remote host is affected by multiple vulnerabilities.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Microsoft SharePoint Server 2013 build 15.0.5311.1000 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112943">https://www.tenable.com/plugins/was/112943</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Microsoft SharePoint Server 2010 < 14.0.7264.5000 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/112942</link>
            <guid>https://www.tenable.com/plugins/was/112942</guid>
            <pubDate>Fri, 19 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112942 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Microsoft SharePoint Server 2010 < 14.0.7264.5000 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Microsoft SharePoint application running on the remote host is affected by multiple vulnerabilities.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Microsoft SharePoint Server 2010 build 14.0.7264.5000 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112942">https://www.tenable.com/plugins/was/112942</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Microsoft SharePoint Server 2016 < 16.0.5110.1000 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/112941</link>
            <guid>https://www.tenable.com/plugins/was/112941</guid>
            <pubDate>Fri, 19 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112941 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Microsoft SharePoint Server 2016 < 16.0.5110.1000 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Microsoft SharePoint application running on the remote host is affected by multiple vulnerabilities.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Microsoft SharePoint Server 2016 build 16.0.5110.1000 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112941">https://www.tenable.com/plugins/was/112941</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Microsoft SharePoint Server 2019 < 16.0.10370.20001 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/112940</link>
            <guid>https://www.tenable.com/plugins/was/112940</guid>
            <pubDate>Fri, 19 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112940 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Microsoft SharePoint Server 2019 < 16.0.10370.20001 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Microsoft SharePoint application running on the remote host is affected by multiple vulnerabilities.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Microsoft SharePoint Server 2019 build 16.0.10370.20001 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112940">https://www.tenable.com/plugins/was/112940</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Microsoft SharePoint Server 2013 < 15.0.5285.1000 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/112740</link>
            <guid>https://www.tenable.com/plugins/was/112740</guid>
            <pubDate>Fri, 19 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112740 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Microsoft SharePoint Server 2013 < 15.0.5285.1000 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Microsoft SharePoint application running on the remote host is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory.<br /></span><span><br /></span><span> - A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package.<br /></span><span><br /></span><span> - An information disclosure vulnerability exists when Microsoft SharePoint Server fails to properly handle objects in memory.<br /></span><span><br /></span><span> - An information disclosure vulnerability exists when Microsoft SharePoint Server improperly discloses its folder structure when rendering specific web pages.<br /></span><span><br /></span><span> - A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server.<br /></span><span><br /></span><span> - This vulnerability is caused when SharePoint Server does not properly sanitize a specially crafted request to an affected SharePoint server.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Microsoft SharePoint Server 2013 build 15.0.5285.1000 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112740">https://www.tenable.com/plugins/was/112740</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Microsoft SharePoint Server 2016 < 16.0.5071.1000 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/112739</link>
            <guid>https://www.tenable.com/plugins/was/112739</guid>
            <pubDate>Fri, 19 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112739 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Microsoft SharePoint Server 2016 < 16.0.5071.1000 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Microsoft SharePoint application running on the remote host is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory.<br /></span><span><br /></span><span> - A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package.<br /></span><span><br /></span><span> - An information disclosure vulnerability exists when Microsoft SharePoint Server fails to properly handle objects in memory.<br /></span><span><br /></span><span> - An information disclosure vulnerability exists when Microsoft SharePoint Server improperly discloses its folder structure when rendering specific web pages.<br /></span><span><br /></span><span> - A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server.<br /></span><span><br /></span><span> - This vulnerability is caused when SharePoint Server does not properly sanitize a specially crafted request to an affected SharePoint server.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Microsoft SharePoint Server 2016 build 16.0.5071.1000 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112739">https://www.tenable.com/plugins/was/112739</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Microsoft SharePoint Server 2019 < 16.0.10367.20000 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/112738</link>
            <guid>https://www.tenable.com/plugins/was/112738</guid>
            <pubDate>Fri, 19 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112738 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Microsoft SharePoint Server 2019 < 16.0.10367.20000 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Microsoft SharePoint application running on the remote host is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory.<br /></span><span><br /></span><span> - A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package.<br /></span><span><br /></span><span> - An information disclosure vulnerability exists when Microsoft SharePoint Server fails to properly handle objects in memory.<br /></span><span><br /></span><span> - An information disclosure vulnerability exists when Microsoft SharePoint Server improperly discloses its folder structure when rendering specific web pages.<br /></span><span><br /></span><span> - A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server.<br /></span><span><br /></span><span> - This vulnerability is caused when SharePoint Server does not properly sanitize a specially crafted request to an affected SharePoint server.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Microsoft SharePoint Server 2019 build 16.0.10367.20000 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112738">https://www.tenable.com/plugins/was/112738</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Microsoft SharePoint Server 2010 < 14.0.7261.5000 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/112737</link>
            <guid>https://www.tenable.com/plugins/was/112737</guid>
            <pubDate>Fri, 19 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112737 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Microsoft SharePoint Server 2010 < 14.0.7261.5000 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Microsoft SharePoint application running on the remote host is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory.<br /></span><span><br /></span><span> - A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package.<br /></span><span><br /></span><span> - An information disclosure vulnerability exists when Microsoft SharePoint Server fails to properly handle objects in memory.<br /></span><span><br /></span><span> - An information disclosure vulnerability exists when Microsoft SharePoint Server improperly discloses its folder structure when rendering specific web pages.<br /></span><span><br /></span><span> - A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server.<br /></span><span><br /></span><span> - This vulnerability is caused when SharePoint Server does not properly sanitize a specially crafted request to an affected SharePoint server.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Microsoft SharePoint Server 2010 build 14.0.7261.5000 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112737">https://www.tenable.com/plugins/was/112737</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Microsoft SharePoint Server 2016 < 16.0.5083.1000 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/112736</link>
            <guid>https://www.tenable.com/plugins/was/112736</guid>
            <pubDate>Fri, 19 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112736 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Microsoft SharePoint Server 2016 < 16.0.5083.1000 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Microsoft SharePoint application running on the remote host is affected by multiple vulnerabilities.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Microsoft SharePoint Server 2016 build 16.0.5083.1000 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112736">https://www.tenable.com/plugins/was/112736</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Microsoft SharePoint Server 2013 < 15.0.5293.1000 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/112735</link>
            <guid>https://www.tenable.com/plugins/was/112735</guid>
            <pubDate>Fri, 19 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112735 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Microsoft SharePoint Server 2013 < 15.0.5293.1000 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Microsoft SharePoint application running on the remote host is affected by multiple vulnerabilities.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Microsoft SharePoint Server 2013 build 15.0.5293.1000 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112735">https://www.tenable.com/plugins/was/112735</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Microsoft SharePoint Server 2019 < 16.0.10368.20022 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/112734</link>
            <guid>https://www.tenable.com/plugins/was/112734</guid>
            <pubDate>Fri, 19 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112734 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Microsoft SharePoint Server 2019 < 16.0.10368.20022 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Microsoft SharePoint application running on the remote host is affected by multiple vulnerabilities.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Microsoft SharePoint Server 2019 build 16.0.10368.20022 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112734">https://www.tenable.com/plugins/was/112734</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Microsoft SharePoint Server 2010 < 14.0.7262.5000 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/112733</link>
            <guid>https://www.tenable.com/plugins/was/112733</guid>
            <pubDate>Fri, 19 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112733 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Microsoft SharePoint Server 2010 < 14.0.7262.5000 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Microsoft SharePoint application running on the remote host is affected by multiple vulnerabilities.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Microsoft SharePoint Server 2010 build 14.0.7262.5000 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112733">https://www.tenable.com/plugins/was/112733</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Microsoft SharePoint Server 2010 < 14.0.7263.5000 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/112732</link>
            <guid>https://www.tenable.com/plugins/was/112732</guid>
            <pubDate>Fri, 19 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112732 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Microsoft SharePoint Server 2010 < 14.0.7263.5000 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Microsoft SharePoint application running on the remote host is affected by multiple vulnerabilities.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Microsoft SharePoint Server 2010 build 14.0.7263.5000 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112732">https://www.tenable.com/plugins/was/112732</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Microsoft SharePoint Server 2019 < 16.0.10369.20000 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/112731</link>
            <guid>https://www.tenable.com/plugins/was/112731</guid>
            <pubDate>Fri, 19 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112731 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Microsoft SharePoint Server 2019 < 16.0.10369.20000 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Microsoft SharePoint application running on the remote host is affected by multiple vulnerabilities.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Microsoft SharePoint Server 2019 build 16.0.10369.20000 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112731">https://www.tenable.com/plugins/was/112731</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Microsoft SharePoint Server 2016 < 16.0.5095.1000 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/112730</link>
            <guid>https://www.tenable.com/plugins/was/112730</guid>
            <pubDate>Fri, 19 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112730 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Microsoft SharePoint Server 2016 < 16.0.5095.1000 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Microsoft SharePoint application running on the remote host is affected by multiple vulnerabilities.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Microsoft SharePoint Server 2016 build 16.0.5095.1000 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112730">https://www.tenable.com/plugins/was/112730</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Microsoft SharePoint Server 2010 < 14.0.7256.5000 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/112589</link>
            <guid>https://www.tenable.com/plugins/was/112589</guid>
            <pubDate>Fri, 19 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112589 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Microsoft SharePoint Server 2010 < 14.0.7256.5000 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Microsoft SharePoint application running on the remote host is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A spoofing vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server.<br /></span><span><br /></span><span> - An information disclosure vulnerability exists when Microsoft SharePoint Server fails to properly handle objects in memory.<br /></span><span><br /></span><span> - A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Microsoft SharePoint Server 2010 build 14.0.7256.5000 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112589">https://www.tenable.com/plugins/was/112589</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Microsoft SharePoint Server 2019 < 16.0.10364.20001 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/112588</link>
            <guid>https://www.tenable.com/plugins/was/112588</guid>
            <pubDate>Fri, 19 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112588 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Microsoft SharePoint Server 2019 < 16.0.10364.20001 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Microsoft SharePoint application running on the remote host is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A spoofing vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server.<br /></span><span><br /></span><span> - An information disclosure vulnerability exists when Microsoft SharePoint Server fails to properly handle objects in memory.<br /></span><span><br /></span><span> - A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Microsoft SharePoint Server 2019 build 16.0.10364.20001 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112588">https://www.tenable.com/plugins/was/112588</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Microsoft SharePoint Server 2013 < 15.0.5267.1000 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/112587</link>
            <guid>https://www.tenable.com/plugins/was/112587</guid>
            <pubDate>Fri, 19 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112587 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Microsoft SharePoint Server 2013 < 15.0.5267.1000 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Microsoft SharePoint application running on the remote host is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A spoofing vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server.<br /></span><span><br /></span><span> - An information disclosure vulnerability exists when Microsoft SharePoint Server fails to properly handle objects in memory.<br /></span><span><br /></span><span> - A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Microsoft SharePoint Server 2013 build 15.0.5267.1000 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112587">https://www.tenable.com/plugins/was/112587</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Microsoft SharePoint Server 2016 < 16.0.5044.1000 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/112586</link>
            <guid>https://www.tenable.com/plugins/was/112586</guid>
            <pubDate>Fri, 19 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112586 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Microsoft SharePoint Server 2016 < 16.0.5044.1000 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Microsoft SharePoint application running on the remote host is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A spoofing vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server.<br /></span><span><br /></span><span> - An information disclosure vulnerability exists when Microsoft SharePoint Server fails to properly handle objects in memory.<br /></span><span><br /></span><span> - A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Microsoft SharePoint Server 2016 build 16.0.5044.1000 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112586">https://www.tenable.com/plugins/was/112586</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Microsoft SharePoint Server 2010 < 14.0.7260.5000 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/112585</link>
            <guid>https://www.tenable.com/plugins/was/112585</guid>
            <pubDate>Fri, 19 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112585 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Microsoft SharePoint Server 2010 < 14.0.7260.5000 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Microsoft SharePoint application running on the remote host is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server.<br /></span><span><br /></span><span> - A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package.<br /></span><span><br /></span><span> - A remote code execution vulnerability exists in Microsoft SharePoint Server when it fails to properly identify and filter unsafe ASP.<br /></span><span><br /></span><span> - A spoofing vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server.<br /></span><span><br /></span><span> - A tampering vulnerability exists when Microsoft SharePoint Server fails to properly handle profile data.<br /></span><span><br /></span><span> - A remote code execution vulnerability exists in Microsoft SharePoint where APIs aren't properly protected from unsafe data input.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Microsoft SharePoint Server 2010 build 14.0.7260.5000 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112585">https://www.tenable.com/plugins/was/112585</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Microsoft SharePoint Server 2013 < 15.0.5275.1001 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/112584</link>
            <guid>https://www.tenable.com/plugins/was/112584</guid>
            <pubDate>Fri, 19 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112584 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Microsoft SharePoint Server 2013 < 15.0.5275.1001 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Microsoft SharePoint application running on the remote host is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server.<br /></span><span><br /></span><span> - A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package.<br /></span><span><br /></span><span> - A remote code execution vulnerability exists in Microsoft SharePoint Server when it fails to properly identify and filter unsafe ASP.<br /></span><span><br /></span><span> - A spoofing vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server.<br /></span><span><br /></span><span> - A tampering vulnerability exists when Microsoft SharePoint Server fails to properly handle profile data.<br /></span><span><br /></span><span> - A remote code execution vulnerability exists in Microsoft SharePoint where APIs aren't properly protected from unsafe data input.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Microsoft SharePoint Server 2013 build 15.0.5275.1001 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112584">https://www.tenable.com/plugins/was/112584</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Microsoft SharePoint Server 2019 < 16.0.10366.12106 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/112583</link>
            <guid>https://www.tenable.com/plugins/was/112583</guid>
            <pubDate>Fri, 19 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112583 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Microsoft SharePoint Server 2019 < 16.0.10366.12106 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Microsoft SharePoint application running on the remote host is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server.<br /></span><span><br /></span><span> - A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package.<br /></span><span><br /></span><span> - A remote code execution vulnerability exists in Microsoft SharePoint Server when it fails to properly identify and filter unsafe ASP.<br /></span><span><br /></span><span> - A spoofing vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server.<br /></span><span><br /></span><span> - A tampering vulnerability exists when Microsoft SharePoint Server fails to properly handle profile data.<br /></span><span><br /></span><span> - A remote code execution vulnerability exists in Microsoft SharePoint where APIs aren't properly protected from unsafe data input.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Microsoft SharePoint Server 2019 build 16.0.10366.12106 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112583">https://www.tenable.com/plugins/was/112583</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Microsoft SharePoint Server 2016 < 16.0.5056.1001 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/112582</link>
            <guid>https://www.tenable.com/plugins/was/112582</guid>
            <pubDate>Fri, 19 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112582 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Microsoft SharePoint Server 2016 < 16.0.5056.1001 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Microsoft SharePoint application running on the remote host is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server.<br /></span><span><br /></span><span> - A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package.<br /></span><span><br /></span><span> - A remote code execution vulnerability exists in Microsoft SharePoint Server when it fails to properly identify and filter unsafe ASP.<br /></span><span><br /></span><span> - A spoofing vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server.<br /></span><span><br /></span><span> - A tampering vulnerability exists when Microsoft SharePoint Server fails to properly handle profile data.<br /></span><span><br /></span><span> - A remote code execution vulnerability exists in Microsoft SharePoint where APIs aren't properly protected from unsafe data input.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Microsoft SharePoint Server 2016 build 16.0.5056.1001 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112582">https://www.tenable.com/plugins/was/112582</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat Unsupported Version]]></title>
            <link>https://www.tenable.com/plugins/was/98232</link>
            <guid>https://www.tenable.com/plugins/was/98232</guid>
            <pubDate>Thu, 11 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98232 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Tomcat Unsupported Version<br /></span>
      <h3>Description</h3>
      <span>The installation of Apache Tomcat detected on the remote host is no longer supported. Lack of support implies that no new security patches for the product will be released by the vendor. As a result, it is likely to contain security vulnerabilities.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to a supported version of Apache Tomcat.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98232">https://www.tenable.com/plugins/was/98232</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Unsupported Version]]></title>
            <link>https://www.tenable.com/plugins/was/98231</link>
            <guid>https://www.tenable.com/plugins/was/98231</guid>
            <pubDate>Thu, 11 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98231 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Unsupported Version<br /></span>
      <h3>Description</h3>
      <span>The installation of Apache detected on the remote host is no longer supported. Lack of support implies that no new security patches for the product will be released by the vendor. As a result, it is likely to contain security vulnerabilities.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to a supported version of Apache.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98231">https://www.tenable.com/plugins/was/98231</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Joomla! Unsupported Version]]></title>
            <link>https://www.tenable.com/plugins/was/98229</link>
            <guid>https://www.tenable.com/plugins/was/98229</guid>
            <pubDate>Thu, 11 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98229 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Joomla! Unsupported Version<br /></span>
      <h3>Description</h3>
      <span>The installation of Joomla! detected on the remote host is no longer supported. Lack of support implies that no new security patches for the product will be released by the vendor. As a result, it is likely to contain security vulnerabilities.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to a supported version of Joomla!.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98229">https://www.tenable.com/plugins/was/98229</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WordPress Unsupported Version]]></title>
            <link>https://www.tenable.com/plugins/was/98227</link>
            <guid>https://www.tenable.com/plugins/was/98227</guid>
            <pubDate>Thu, 11 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98227 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress Unsupported Version<br /></span>
      <h3>Description</h3>
      <span>The installation of WordPress detected on the remote host is no longer supported. Lack of support implies that no new security patches for the product will be released by the vendor. As a result, it is likely to contain security vulnerabilities.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to a supported version of WordPress.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98227">https://www.tenable.com/plugins/was/98227</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Out-of-Date Knockout JS Detected]]></title>
            <link>https://www.tenable.com/plugins/was/113036</link>
            <guid>https://www.tenable.com/plugins/was/113036</guid>
            <pubDate>Thu, 11 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113036 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Out-of-Date Knockout JS Detected<br /></span>
      <h3>Description</h3>
      <span>An out-of-date version of Knockout JS has been detected. An outdated version could have vulnerabilities or missing security features.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to the latest version of Knockout JS.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113036">https://www.tenable.com/plugins/was/113036</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Out-of-Date Moment JS Framework Detected]]></title>
            <link>https://www.tenable.com/plugins/was/113035</link>
            <guid>https://www.tenable.com/plugins/was/113035</guid>
            <pubDate>Thu, 11 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113035 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Out-of-Date Moment JS Framework Detected<br /></span>
      <h3>Description</h3>
      <span>An out-of-date version of Moment JS Framework has been detected. An outdated version could have vulnerabilities or missing security features.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to the latest version of Moment JS Framework.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113035">https://www.tenable.com/plugins/was/113035</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Out-of-Date Lodash Detected]]></title>
            <link>https://www.tenable.com/plugins/was/113028</link>
            <guid>https://www.tenable.com/plugins/was/113028</guid>
            <pubDate>Thu, 11 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113028 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Out-of-Date Lodash Detected<br /></span>
      <h3>Description</h3>
      <span>An out-of-date version of Lodash has been detected. An outdated version could have vulnerabilities or missing security features.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to the latest version of Lodash.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113028">https://www.tenable.com/plugins/was/113028</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Out-of-Date JQuery Detected]]></title>
            <link>https://www.tenable.com/plugins/was/113027</link>
            <guid>https://www.tenable.com/plugins/was/113027</guid>
            <pubDate>Thu, 11 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113027 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Out-of-Date JQuery Detected<br /></span>
      <h3>Description</h3>
      <span>An out-of-date version of JQuery has been detected. An outdated version could have vulnerabilities or missing security features.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to the latest version of JQuery.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113027">https://www.tenable.com/plugins/was/113027</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Magento Unsupported Version]]></title>
            <link>https://www.tenable.com/plugins/was/112520</link>
            <guid>https://www.tenable.com/plugins/was/112520</guid>
            <pubDate>Thu, 11 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112520 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Magento Unsupported Version<br /></span>
      <h3>Description</h3>
      <span>The installation of Magento detected on the remote host is no longer supported. Lack of support implies that no new security patches for the product will be released by the vendor. As a result, it is likely to contain security vulnerabilities.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to a supported version of Magento.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112520">https://www.tenable.com/plugins/was/112520</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Java Psychic Signatures]]></title>
            <link>https://www.tenable.com/plugins/was/113242</link>
            <guid>https://www.tenable.com/plugins/was/113242</guid>
            <pubDate>Mon, 08 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113242 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Java Psychic Signatures<br /></span>
      <h3>Description</h3>
      <span>Oracle Java SE versions 15, 17 and 18 and Oracle GraalVM Enterprise Edition versions 21.3.1 and 22.0.0.2 do not properly verify Ellipic Curve Digital Signature Algorithm (ECDSA) based signatures. By forcing the `r` and `s` components values of the signature to zero, an attacker could forge a valid signature for any message and public key which would be accepted by the vulnerable library or component version. Attackers could leverage this vulnerability to bypass any security mechanism relying on this algorithm and its Java implementation.<br /></span>
      <h3>Solution</h3>
      <span>Apply Oracle Critical Patch Update from April 2022 on the vulnerable component.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113242">https://www.tenable.com/plugins/was/113242</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[OpenAPI File Detected]]></title>
            <link>https://www.tenable.com/plugins/was/112615</link>
            <guid>https://www.tenable.com/plugins/was/112615</guid>
            <pubDate>Mon, 08 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112615 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>OpenAPI File Detected<br /></span>
      <h3>Description</h3>
      <span>A OpenAPI configuration file has been detected and is available as an attachment below. OpenAPI is a specification that helps with documentation and consumption of REST APIs and may also be used to configure API scanning.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112615">https://www.tenable.com/plugins/was/112615</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Nginx < 1.6.2 SSL Session Reuse]]></title>
            <link>https://www.tenable.com/plugins/was/98960</link>
            <guid>https://www.tenable.com/plugins/was/98960</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98960 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Nginx < 1.6.2 SSL Session Reuse<br /></span>
      <h3>Description</h3>
      <span>According to the self-reported version in the server response header, the version of nginx installed on the remote host is 0.5.6 or higher, 1.6.x prior to 1.6.2, or 1.7.x prior to 1.7.5. It is, therefore, affected by an SSL session or TLS session ticket key handling error. A flaw exists in the file 'event/ngx_event_openssl.c' that could allow a remote attacker to obtain sensitive information or to take control of a session. This issue only affects servers having multiple 'server{}' configurations sharing the same values for 'ssl_session_cache' or 'ssl_session_ticket_key'.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to nginx 1.6.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98960">https://www.tenable.com/plugins/was/98960</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Nginx < 1.7.5 SSL Session Reuse]]></title>
            <link>https://www.tenable.com/plugins/was/98959</link>
            <guid>https://www.tenable.com/plugins/was/98959</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98959 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Nginx < 1.7.5 SSL Session Reuse<br /></span>
      <h3>Description</h3>
      <span>According to the self-reported version in the server response header, the version of nginx installed on the remote host is 0.5.6 or higher, 1.6.x prior to 1.6.2, or 1.7.x prior to 1.7.5. It is, therefore, affected by an SSL session or TLS session ticket key handling error. A flaw exists in the file 'event/ngx_event_openssl.c' that could allow a remote attacker to obtain sensitive information or to take control of a session. This issue only affects servers having multiple 'server{}' configurations sharing the same values for 'ssl_session_cache' or 'ssl_session_ticket_key'.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to nginx 1.7.5 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98959">https://www.tenable.com/plugins/was/98959</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Nginx < 1.6.1 SMTP STARTTLS Command Injection]]></title>
            <link>https://www.tenable.com/plugins/was/98958</link>
            <guid>https://www.tenable.com/plugins/was/98958</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98958 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Nginx < 1.6.1 SMTP STARTTLS Command Injection<br /></span>
      <h3>Description</h3>
      <span>According to the self-reported version in the server response header, the version of nginx installed on the remote host is 1.5.6 or higher, 1.6.x prior to 1.6.1, or 1.7.x prior to 1.7.4. It is, therefore, affected by a command injection vulnerability. A flaw exists in the function 'ngx_mail_smtp_starttls' within the file 'src/mail/ngx_mail_smtp_handler.c' whereby input to the STARTTLS command is not properly sanitized. This could allow a remote attacker in a privileged network position to obtain sensitive information by injecting commands into an SSL session. This issue is exploitable only when nginx is used as an SMTP proxy.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to nginx 1.6.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98958">https://www.tenable.com/plugins/was/98958</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Nginx < 1.7.4 SMTP STARTTLS Command Injection]]></title>
            <link>https://www.tenable.com/plugins/was/98957</link>
            <guid>https://www.tenable.com/plugins/was/98957</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98957 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Nginx < 1.7.4 SMTP STARTTLS Command Injection<br /></span>
      <h3>Description</h3>
      <span>According to the self-reported version in the server response header, the version of nginx installed on the remote host is 1.5.6 or higher, 1.6.x prior to 1.6.1, or 1.7.x prior to 1.7.4. It is, therefore, affected by a command injection vulnerability. A flaw exists in the function 'ngx_mail_smtp_starttls' within the file 'src/mail/ngx_mail_smtp_handler.c' whereby input to the STARTTLS command is not properly sanitized. This could allow a remote attacker in a privileged network position to obtain sensitive information by injecting commands into an SSL session. This issue is exploitable only when nginx is used as an SMTP proxy.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to nginx 1.7.4 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98957">https://www.tenable.com/plugins/was/98957</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Nginx < 1.4.4 ngx_parse_http Security Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/98953</link>
            <guid>https://www.tenable.com/plugins/was/98953</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98953 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Nginx < 1.4.4 ngx_parse_http Security Bypass<br /></span>
      <h3>Description</h3>
      <span>According to the self-reported version in the Server response header, the installed version of nginx is greater than 0.8.41 but prior to 1.4.4 / 1.5.7. It is, therefore, affected by a security bypass vulnerability in 'ngx_http_parse.c' when a file with a space at the end of the URI is requested.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to nginx 1.4.4 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98953">https://www.tenable.com/plugins/was/98953</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Nginx < 1.5.7 ngx_parse_http Security Bypass]]></title>
            <link>https://www.tenable.com/plugins/was/98952</link>
            <guid>https://www.tenable.com/plugins/was/98952</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98952 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Nginx < 1.5.7 ngx_parse_http Security Bypass<br /></span>
      <h3>Description</h3>
      <span>According to the self-reported version in the Server response header, the installed version of nginx is greater than 0.8.41 but prior to 1.4.4 / 1.5.7. It is, therefore, affected by a security bypass vulnerability in 'ngx_http_parse.c' when a file with a space at the end of the URI is requested.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to nginx 1.5.7 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98952">https://www.tenable.com/plugins/was/98952</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Magento API Anonymous Access]]></title>
            <link>https://www.tenable.com/plugins/was/98703</link>
            <guid>https://www.tenable.com/plugins/was/98703</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98703 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Magento API Anonymous Access<br /></span>
      <h3>Description</h3>
      <span>Sensitive Magento 2 API can be accessed by anonymous users. Therefore, confidential merchant information can be exposed like offline products, stock information or store configuration for example.<br /></span>
      <h3>Solution</h3>
      <span>If anonymous API acess is not required, disable in the Magento administration panel.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98703">https://www.tenable.com/plugins/was/98703</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Webmin < 1.730 Read Mail Symlink Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/was/98679</link>
            <guid>https://www.tenable.com/plugins/was/98679</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98679 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Webmin < 1.730 Read Mail Symlink Vulnerability<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Webmin install hosted on the remote host is prior to 1.730. It is, therefore, affected by a vulnerability in the Read Mail module which allows local users to read arbitrary files.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Webmin version 1.730 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98679">https://www.tenable.com/plugins/was/98679</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[JK Status Manager Information Disclosure]]></title>
            <link>https://www.tenable.com/plugins/was/98398</link>
            <guid>https://www.tenable.com/plugins/was/98398</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98398 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>JK Status Manager Information Disclosure<br /></span>
      <h3>Description</h3>
      <span>It is possible to obtain an overview of the remote Apache Tomcat Connectors configuration.<br /></span><span><br /></span><span>By accessing this overview page; a remote, unauthenticated attacker can discover a large amount of information about the remote web server, including :<br /></span><span> - The IP address of the host.<br /></span><span> - The version of the operating system.<br /></span><span> - The web server version.<br /></span><span> - URI Mappings.<br /></span><span> - AJP workers configuration.<br /></span>
      <h3>Solution</h3>
      <span>Disable JK Status Manager or ensure that access is limited to valid users / hosts.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98398">https://www.tenable.com/plugins/was/98398</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[MediaElement.js < 2.11.2 Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/98237</link>
            <guid>https://www.tenable.com/plugins/was/98237</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98237 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>MediaElement.js < 2.11.2 Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, MediaElement.js is prior to 2.11.2. Therefore, it may be affected by a cross-site scripting vulnerability in flashmediaelement.swf allowing remote attackers to inject arbitrary web script or HTML via the file parameter.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to MediaElement.js version 2.11.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98237">https://www.tenable.com/plugins/was/98237</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Common Directories Detection]]></title>
            <link>https://www.tenable.com/plugins/was/98072</link>
            <guid>https://www.tenable.com/plugins/was/98072</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98072 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Common Directories Detection<br /></span>
      <h3>Description</h3>
      <span>Scanner has detected a common directory on the remote web server.<br /></span><span><br /></span><span>Web applications are often made up of multiple files and directories. It is possible that over time some directories may become unreferenced (unused) by the web application and forgotten about by the administrator or developer. Because web applications are built using common frameworks, they contain common directories that can be discovered (independent of server).<br /></span><span><br /></span><span>During the initial reconnaissance stages of an attack, cyber-criminals will attempt to locate unreferenced directories in the hope that the directory will assist in further compromise of the web application. To achieve this, they will make thousands of requests using word lists containing common names. The response headers from the server will then indicate if the directory exists.<br /></span>
      <h3>Solution</h3>
      <span>If directories are unreferenced, then they should be removed from the web root and/or the application directory.<br /></span><span>Preventing access without authentication may also be an option and can stop a client from being able to view the contents of a file; however, it is still likely that the directory structure will be able to be discovered.<br /></span><span>Using obscure directory names is implementing 'security through obscurity' and is not a recommended option.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98072">https://www.tenable.com/plugins/was/98072</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Backup Migration Plugin for WordPress < 1.3.8 Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/114141</link>
            <guid>https://www.tenable.com/plugins/was/114141</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114141 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Backup Migration Plugin for WordPress < 1.3.8 Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>The WordPress Backup Migration Plugin installed on the remote host is affected by a remote code execution vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Backup Migration Plugin for WordPress 1.3.8 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114141">https://www.tenable.com/plugins/was/114141</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[OwnCloud graphapi 0.2.x < 0.2.1 / 0.3.x < 0.3.1 Sensitive Informations Disclosure]]></title>
            <link>https://www.tenable.com/plugins/was/114117</link>
            <guid>https://www.tenable.com/plugins/was/114117</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114117 with High Severity</p>
      <h3>Synopsis</h3>
      <span>OwnCloud graphapi 0.2.x < 0.2.1 / 0.3.x < 0.3.1 Sensitive Informations Disclosure<br /></span>
      <h3>Description</h3>
      <span>An issue was discovered in OwnCloud graphapi plugin 0.2.x < 0.2.1 and 0.3.x < 0.3.1. The graphapi plugin relies on a third-party GetPhpInfo.php library that provides a URL. When this URL is accessed, it reveals the configuration details of the PHP environment (phpinfo). This information includes all the environment variables of the webserver. In containerized deployments, these environment variables may include sensitive data such as the ownCloud admin password, mail server credentials, and license key.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to OwnCloud graphapi 0.2.1 or 0.3.1 or delete the file owncloud/apps/graphapi/vendor/microsoft/microsoft-graph/tests/GetPhpInfo.php<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114117">https://www.tenable.com/plugins/was/114117</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WP EasyCart Plugin for WordPress < 2.0.6 Sensitive Information Disclosure]]></title>
            <link>https://www.tenable.com/plugins/was/114026</link>
            <guid>https://www.tenable.com/plugins/was/114026</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114026 with High Severity</p>
      <h3>Synopsis</h3>
      <span>WP EasyCart Plugin for WordPress < 2.0.6 Sensitive Information Disclosure<br /></span>
      <h3>Description</h3>
      <span>The WordPress WP EasyCart Plugin installed on the remote host is affected by a Sensitive Information Disclosure.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to WP EasyCart Plugin for WordPress 2.0.6 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114026">https://www.tenable.com/plugins/was/114026</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[CA SiteMinder WebAgent Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/113938</link>
            <guid>https://www.tenable.com/plugins/was/113938</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113938 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>CA SiteMinder WebAgent Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>CA SiteMinder is an unified access management platform which provides Single Sign-On features and identity federation for seamless access. CA SiteMinder WebAgent, one of this platform components, suffers from a Cross-Site Scripting (XSS) vulnerability through some `fcc` endpoints. By crafting a specific payload in the URL, a remote and unauthenticated attacker could leverage this vulnerability to inject malicious JavaScript executed in the context of the target victim user browser.<br /></span>
      <h3>Solution</h3>
      <span>Apply the workaround provided by the vendor to escape HTML encoding characters on fcc endpoints.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113938">https://www.tenable.com/plugins/was/113938</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Jira < 3.12.1 Xss In 500 Page]]></title>
            <link>https://www.tenable.com/plugins/was/113823</link>
            <guid>https://www.tenable.com/plugins/was/113823</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113823 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Jira < 3.12.1 Xss In 500 Page<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the instance of Atlassian Jira hosted on the remote web server is prior to 3.12.1. It, therefore, has multiple vulnerabilities:<br /></span><span><br /></span><span>- a Cross-site scripting (XSS) vulnerability which allows remote attackers to inject arbitrary web script or HTML, which is not properly handled when generating error messages (CVE-2007-6617).<br /></span><span><br /></span><span>- A vulnerability which allows remote attackers to delete another user's shared filter via a modified filter ID (CVE-2007-6618).<br /></span><span><br /></span><span>- A flaw in the Setup Wizard does not properly restrict setup attempts after setup is complete, which allows remote attackers to change the default language (CVE-2007-6619).<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Jira version 3.12.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113823">https://www.tenable.com/plugins/was/113823</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Jira 7.x < 7.0.3 Software Tempo Plugin Xml Denial Of Service]]></title>
            <link>https://www.tenable.com/plugins/was/113821</link>
            <guid>https://www.tenable.com/plugins/was/113821</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113821 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Jira 7.x < 7.0.3 Software Tempo Plugin Xml Denial Of Service<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the instance of Atlassian Jira hosted on the remote web server is prior to 6.0.5. It is, therefore, affected by a issue in the TM Software Tempo Plugin which does not properly restrict the capabilities of 3rd party XML parsers, which allows remote authenticated users to cause a denial of service (resource consumption) via unspecified vectors.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Jira version 7.0.3 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113821">https://www.tenable.com/plugins/was/113821</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Jira 6.5.x < 6.5.0.2 Software Tempo Plugin Xml Denial Of Service]]></title>
            <link>https://www.tenable.com/plugins/was/113820</link>
            <guid>https://www.tenable.com/plugins/was/113820</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113820 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Jira 6.5.x < 6.5.0.2 Software Tempo Plugin Xml Denial Of Service<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the instance of Atlassian Jira hosted on the remote web server is prior to 6.0.5. It is, therefore, affected by a issue in the TM Software Tempo Plugin which does not properly restrict the capabilities of 3rd party XML parsers, which allows remote authenticated users to cause a denial of service (resource consumption) via unspecified vectors.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Jira version 6.5.0.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113820">https://www.tenable.com/plugins/was/113820</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Jira < 6.4.3.1 / 6.5.x < 6.5.0.2 / 7.x < 7.0.3 Software Tempo Plugin Xml Denial Of Service]]></title>
            <link>https://www.tenable.com/plugins/was/113819</link>
            <guid>https://www.tenable.com/plugins/was/113819</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113819 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Jira < 6.4.3.1 / 6.5.x < 6.5.0.2 / 7.x < 7.0.3 Software Tempo Plugin Xml Denial Of Service<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the instance of Atlassian Jira hosted on the remote web server is prior to 6.0.5. It is, therefore, affected by a issue in the TM Software Tempo Plugin which does not properly restrict the capabilities of 3rd party XML parsers, which allows remote authenticated users to cause a denial of service (resource consumption) via unspecified vectors.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Jira version 6.4.3.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113819">https://www.tenable.com/plugins/was/113819</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Jira < 3.7.1 Giffy Plugin Arbitrary File Read]]></title>
            <link>https://www.tenable.com/plugins/was/113818</link>
            <guid>https://www.tenable.com/plugins/was/113818</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113818 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Jira < 3.7.1 Giffy Plugin Arbitrary File Read<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the instance of Atlassian Jira hosted on the remote web server is prior to 3.7.1. It is, therefore, affected by a vulnerability in the giffy plugin which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Jira version 3.7.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113818">https://www.tenable.com/plugins/was/113818</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Jira < 6.0.5 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/113817</link>
            <guid>https://www.tenable.com/plugins/was/113817</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113817 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Jira < 6.0.5 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the instance of Atlassian Jira hosted on the remote web server is prior to 6.0.5. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span>- A directory traversal in the Importers Plugin which permits remote attackers to create arbitrary files (CVE-2014-2313).<br /></span><span><br /></span><span>- A Cross-site scripting (XSS) vulnerability in secure/admin/user/views/deleteuserconfirm.jsp in the Admin Panel which allows remote attackers to inject arbitrary web script or HTML via the name parameter to secure/admin/user/DeleteUser!default.jspa (CVE-2013-5319).<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Jira version 6.0.5 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113817">https://www.tenable.com/plugins/was/113817</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Jira < 6.0.4 Directory Traversal In Issue Collector]]></title>
            <link>https://www.tenable.com/plugins/was/113816</link>
            <guid>https://www.tenable.com/plugins/was/113816</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113816 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Jira < 6.0.4 Directory Traversal In Issue Collector<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the instance of Atlassian Jira hosted on the remote web server is prior to 6.0.4. It is, therefore, affected by a directory traversal in the Issue Collector component.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Jira version 6.0.4 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113816">https://www.tenable.com/plugins/was/113816</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Jira < 3.13.1 Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/113715</link>
            <guid>https://www.tenable.com/plugins/was/113715</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113715 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Jira < 3.13.1 Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the instance of Atlassian Jira hosted on the remote web server is prior to 3.13.1. It is, therefore, affected by a Cross-Site Scripting (XSS) vulnerability in the ViewProfile page fullname field.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Jira version 3.13.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113715">https://www.tenable.com/plugins/was/113715</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache 2.4.x < 2.4.55 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/113545</link>
            <guid>https://www.tenable.com/plugins/was/113545</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113545 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Apache 2.4.x < 2.4.55 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its banner, the version of Apache running on the remote host is 2.4.x prior to 2.4.55. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span> - A crafted If: request header can cause a memory read, or write of a single zero byte, in a pool heap memory location beyond the header value sent. This could cause the process to crash. (CVE-2006-20001)<br /></span><span><br /></span><span> - HTTP Request Smuggling vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. (CVE-2022-36760)<br /></span><span><br /></span><span> - A malicious backend can cause the response headers to be truncated early, resulting in some headers being incorporated into the response body. If the later headers have any security purpose, they will not be interpreted by the client. (CVE-2022-26377)<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache version 2.4.55 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113545">https://www.tenable.com/plugins/was/113545</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Slimstat Analytics Plugin for WordPress < 3.9.2 Cross-site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/113504</link>
            <guid>https://www.tenable.com/plugins/was/113504</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113504 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Slimstat Analytics Plugin for WordPress < 3.9.2 Cross-site Scripting<br /></span>
      <h3>Description</h3>
      <span>The WordPress Slimstat Analytics Plugin installed on the remote host is affected by a Cross-site Scripting.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Slimstat Analytics Plugin for WordPress 3.9.2 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113504">https://www.tenable.com/plugins/was/113504</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WordPress < 2.1 Cross-Site Request Forgery]]></title>
            <link>https://www.tenable.com/plugins/was/113503</link>
            <guid>https://www.tenable.com/plugins/was/113503</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113503 with High Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress < 2.1 Cross-Site Request Forgery<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected WordPress application is affected by a Cross-Site Request Forgery.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to WordPress version 2.1 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113503">https://www.tenable.com/plugins/was/113503</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WP Symposium Plugin for WordPress < 15.8 SQL Injection]]></title>
            <link>https://www.tenable.com/plugins/was/113499</link>
            <guid>https://www.tenable.com/plugins/was/113499</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113499 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>WP Symposium Plugin for WordPress < 15.8 SQL Injection<br /></span>
      <h3>Description</h3>
      <span>The WordPress WP Symposium Plugin installed on the remote host is affected by a SQL Injection.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to WP Symposium Plugin for WordPress 15.8 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113499">https://www.tenable.com/plugins/was/113499</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WP e-Commerce Shop Styling Plugin for WordPress < 1.8 Code Injection]]></title>
            <link>https://www.tenable.com/plugins/was/113498</link>
            <guid>https://www.tenable.com/plugins/was/113498</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113498 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>WP e-Commerce Shop Styling Plugin for WordPress < 1.8 Code Injection<br /></span>
      <h3>Description</h3>
      <span>The WordPress WP e-Commerce Shop Styling Plugin installed on the remote host is affected by a Code Injection.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to WP e-Commerce Shop Styling Plugin for WordPress 1.8 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113498">https://www.tenable.com/plugins/was/113498</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Social Invitations Plugin for WordPress < 1.4.4.3 Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/113497</link>
            <guid>https://www.tenable.com/plugins/was/113497</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113497 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Social Invitations Plugin for WordPress < 1.4.4.3 Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>The WordPress Social Invitations Plugin installed on the remote host is affected by a Cross-Site Scripting.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Social Invitations Plugin for WordPress 1.4.4.3 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113497">https://www.tenable.com/plugins/was/113497</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WP RESTful Plugin for WordPress Multiple Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/113496</link>
            <guid>https://www.tenable.com/plugins/was/113496</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113496 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>WP RESTful Plugin for WordPress Multiple Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>The WordPress WP RESTful Plugin installed on the remote host is affected by multiple Cross-Site Scripting.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>The plugin is not patched and is no longer maintained, it must be replaced by an alternative plugin.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113496">https://www.tenable.com/plugins/was/113496</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WP Cron Dashboard Plugin for WordPress < 1.1.6 Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/113495</link>
            <guid>https://www.tenable.com/plugins/was/113495</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113495 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>WP Cron Dashboard Plugin for WordPress < 1.1.6 Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>The WordPress WP Cron Dashboard Plugin installed on the remote host is affected by a Cross-Site Scripting.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to WP Cron Dashboard Plugin for WordPress 1.1.6 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113495">https://www.tenable.com/plugins/was/113495</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WP Ultimate Email Marketer Plugin for WordPress Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/113494</link>
            <guid>https://www.tenable.com/plugins/was/113494</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113494 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>WP Ultimate Email Marketer Plugin for WordPress Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The WordPress WP Ultimate Email Marketer Plugin installed on the remote host is affected by an Improper Access Controls and multiple Cross-Site Scripting.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>The plugin is not patched and is no longer maintained, it must be replaced by an alternative plugin.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113494">https://www.tenable.com/plugins/was/113494</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Cross-RSS Plugin for WordPress Arbitrary Files Read]]></title>
            <link>https://www.tenable.com/plugins/was/113493</link>
            <guid>https://www.tenable.com/plugins/was/113493</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113493 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Cross-RSS Plugin for WordPress Arbitrary Files Read<br /></span>
      <h3>Description</h3>
      <span>The WordPress Cross-RSS Plugin installed on the remote host is affected by an Arbitrary Files Read.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>The plugin is not patched and is no longer maintained, it must be replaced by an alternative plugin.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113493">https://www.tenable.com/plugins/was/113493</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apptha WordPress Video Gallery Plugin for WordPress < 2.8.0 SQL Injection]]></title>
            <link>https://www.tenable.com/plugins/was/113492</link>
            <guid>https://www.tenable.com/plugins/was/113492</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113492 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Apptha WordPress Video Gallery Plugin for WordPress < 2.8.0 SQL Injection<br /></span>
      <h3>Description</h3>
      <span>The WordPress Apptha WordPress Video Gallery Plugin installed on the remote host is affected by a SQL Injection.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apptha WordPress Video Gallery Plugin for WordPress 2.8.0 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113492">https://www.tenable.com/plugins/was/113492</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WP Easy Post Types Plugin for WordPress < 1.4.4 Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/113491</link>
            <guid>https://www.tenable.com/plugins/was/113491</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113491 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>WP Easy Post Types Plugin for WordPress < 1.4.4 Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>The WordPress WP Easy Post Types Plugin installed on the remote host is affected by a Cross-Site Scripting.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to WP Easy Post Types Plugin for WordPress 1.4.4 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113491">https://www.tenable.com/plugins/was/113491</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WordPress Mobile Pack Plugin for WordPress < 2.0.2 Sensitive Information Disclosure]]></title>
            <link>https://www.tenable.com/plugins/was/113490</link>
            <guid>https://www.tenable.com/plugins/was/113490</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113490 with High Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress Mobile Pack Plugin for WordPress < 2.0.2 Sensitive Information Disclosure<br /></span>
      <h3>Description</h3>
      <span>The WordPress WordPress Mobile Pack Plugin installed on the remote host is affected by a Sensitive Information Disclosure.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to WordPress Mobile Pack Plugin for WordPress 2.0.2 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113490">https://www.tenable.com/plugins/was/113490</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WordPress Classifieds Plugin Plugin for WordPress < 3.0 SQL Injection]]></title>
            <link>https://www.tenable.com/plugins/was/113489</link>
            <guid>https://www.tenable.com/plugins/was/113489</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113489 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress Classifieds Plugin Plugin for WordPress < 3.0 SQL Injection<br /></span>
      <h3>Description</h3>
      <span>The WordPress WordPress Classifieds Plugin Plugin installed on the remote host is affected by an SQL Injection.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to WordPress Classifieds Plugin Plugin for WordPress 3.0 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113489">https://www.tenable.com/plugins/was/113489</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Advanced Dewplayer Plugin for WordPress < 1.3 Path Traversal]]></title>
            <link>https://www.tenable.com/plugins/was/113488</link>
            <guid>https://www.tenable.com/plugins/was/113488</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113488 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Advanced Dewplayer Plugin for WordPress < 1.3 Path Traversal<br /></span>
      <h3>Description</h3>
      <span>The WordPress Advanced Dewplayer Plugin installed on the remote host is affected by a Path Traversal.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Advanced Dewplayer Plugin for WordPress 1.3 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113488">https://www.tenable.com/plugins/was/113488</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[All In One WP Security & Firewall Plugin for WordPress < 3.8.3 Multiple SQL Injection]]></title>
            <link>https://www.tenable.com/plugins/was/113479</link>
            <guid>https://www.tenable.com/plugins/was/113479</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113479 with High Severity</p>
      <h3>Synopsis</h3>
      <span>All In One WP Security & Firewall Plugin for WordPress < 3.8.3 Multiple SQL Injection<br /></span>
      <h3>Description</h3>
      <span>The WordPress All In One WP Security & Firewall Plugin installed on the remote host is affected by multiple SQL Injection.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to All In One WP Security & Firewall Plugin for WordPress 3.8.3 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113479">https://www.tenable.com/plugins/was/113479</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[All In One WP Security & Firewall Plugin for WordPress < 3.8.8 SQL Injection]]></title>
            <link>https://www.tenable.com/plugins/was/113478</link>
            <guid>https://www.tenable.com/plugins/was/113478</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113478 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>All In One WP Security & Firewall Plugin for WordPress < 3.8.8 SQL Injection<br /></span>
      <h3>Description</h3>
      <span>The WordPress All In One WP Security & Firewall Plugin installed on the remote host is affected by an SQL Injection.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to All In One WP Security & Firewall Plugin for WordPress 3.8.8 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113478">https://www.tenable.com/plugins/was/113478</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WP-PostViews Plugin for WordPress < 1.63 Cross-Site Request Forgery]]></title>
            <link>https://www.tenable.com/plugins/was/113476</link>
            <guid>https://www.tenable.com/plugins/was/113476</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113476 with High Severity</p>
      <h3>Synopsis</h3>
      <span>WP-PostViews Plugin for WordPress < 1.63 Cross-Site Request Forgery<br /></span>
      <h3>Description</h3>
      <span>The WordPress WP-PostViews Plugin installed on the remote host is affected by a Cross-Site Request Forgery.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to WP-PostViews Plugin for WordPress 1.63 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113476">https://www.tenable.com/plugins/was/113476</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WP eCommerce Plugin for WordPress < 3.8.7.6 SQL Injection]]></title>
            <link>https://www.tenable.com/plugins/was/113475</link>
            <guid>https://www.tenable.com/plugins/was/113475</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113475 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>WP eCommerce Plugin for WordPress < 3.8.7.6 SQL Injection<br /></span>
      <h3>Description</h3>
      <span>The WordPress WP eCommerce Plugin installed on the remote host is affected by a SQL Injection.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to WP eCommerce Plugin for WordPress 3.8.7.6 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113475">https://www.tenable.com/plugins/was/113475</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WP-Print Plugin for WordPress < 2.52 Cross-Site Request Forgery]]></title>
            <link>https://www.tenable.com/plugins/was/113474</link>
            <guid>https://www.tenable.com/plugins/was/113474</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113474 with High Severity</p>
      <h3>Synopsis</h3>
      <span>WP-Print Plugin for WordPress < 2.52 Cross-Site Request Forgery<br /></span>
      <h3>Description</h3>
      <span>The WordPress WP-Print Plugin installed on the remote host is affected by a Cross-Site Request Forgery.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to WP-Print Plugin for WordPress 2.52 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113474">https://www.tenable.com/plugins/was/113474</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WP Photo Album Plus Plugin for WordPress < 6.1.3 Multiple Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/113473</link>
            <guid>https://www.tenable.com/plugins/was/113473</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113473 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>WP Photo Album Plus Plugin for WordPress < 6.1.3 Multiple Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>The WordPress WP Photo Album Plus Plugin installed on the remote host is affected by multiple Cross-Site Scripting.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to WP Photo Album Plus Plugin for WordPress 6.1.3 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113473">https://www.tenable.com/plugins/was/113473</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WP EasyCart Plugin for WordPress < 3.0.9 Unrestricted File Upload]]></title>
            <link>https://www.tenable.com/plugins/was/113472</link>
            <guid>https://www.tenable.com/plugins/was/113472</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113472 with High Severity</p>
      <h3>Synopsis</h3>
      <span>WP EasyCart Plugin for WordPress < 3.0.9 Unrestricted File Upload<br /></span>
      <h3>Description</h3>
      <span>The WordPress WP EasyCart Plugin installed on the remote host is affected by an Unrestricted File Upload.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to WP EasyCart Plugin for WordPress 3.0.9 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113472">https://www.tenable.com/plugins/was/113472</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WP DBManager Plugin for WordPress < 2.7.2 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/113467</link>
            <guid>https://www.tenable.com/plugins/was/113467</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113467 with High Severity</p>
      <h3>Synopsis</h3>
      <span>WP DBManager Plugin for WordPress < 2.7.2 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The WordPress WP DBManager Plugin installed on the remote host is affected by a Code Injection and an OS Command Injection.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to WP DBManager Plugin for WordPress 2.7.2 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113467">https://www.tenable.com/plugins/was/113467</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Yoast SEO Plugin for WordPress 1.7.x < 1.7.4 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/113460</link>
            <guid>https://www.tenable.com/plugins/was/113460</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113460 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Yoast SEO Plugin for WordPress 1.7.x < 1.7.4 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The WordPress Yoast SEO Plugin installed on the remote host is affected by multiple Cross-Site Request Forgery and multiple SQL Injection.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Yoast SEO Plugin for WordPress 1.5.7 or 1.6.4 or 1.7.4 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113460">https://www.tenable.com/plugins/was/113460</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Yoast SEO Plugin for WordPress 1.6.x < 1.6.4 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/113459</link>
            <guid>https://www.tenable.com/plugins/was/113459</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113459 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Yoast SEO Plugin for WordPress 1.6.x < 1.6.4 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The WordPress Yoast SEO Plugin installed on the remote host is affected by multiple Cross-Site Request Forgery and multiple SQL Injection.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Yoast SEO Plugin for WordPress 1.5.7 or 1.6.4 or 1.7.4 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113459">https://www.tenable.com/plugins/was/113459</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Yoast SEO Plugin for WordPress < 1.5.7 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/113458</link>
            <guid>https://www.tenable.com/plugins/was/113458</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113458 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Yoast SEO Plugin for WordPress < 1.5.7 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The WordPress Yoast SEO Plugin installed on the remote host is affected by multiple Cross-Site Request Forgery and multiple SQL Injection.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Yoast SEO Plugin for WordPress 1.5.7 or 1.6.4 or 1.7.4 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113458">https://www.tenable.com/plugins/was/113458</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Microsoft SharePoint Server 2016 < 16.0.5200.1000 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/113090</link>
            <guid>https://www.tenable.com/plugins/was/113090</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113090 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Microsoft SharePoint Server 2016 < 16.0.5200.1000 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Microsoft SharePoint application running on the remote host is affected by multiple vulnerabilities.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Microsoft SharePoint Server 2016 build 16.0.5200.1000 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113090">https://www.tenable.com/plugins/was/113090</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Microsoft SharePoint Server 2013 < 15.0.5371.1000 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/113089</link>
            <guid>https://www.tenable.com/plugins/was/113089</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113089 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Microsoft SharePoint Server 2013 < 15.0.5371.1000 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Microsoft SharePoint application running on the remote host is affected by multiple vulnerabilities.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Microsoft SharePoint Server 2013 build 15.0.5371.1000 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113089">https://www.tenable.com/plugins/was/113089</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Microsoft SharePoint Server 2019 < 16.0.10377.20001 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/113088</link>
            <guid>https://www.tenable.com/plugins/was/113088</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113088 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Microsoft SharePoint Server 2019 < 16.0.10377.20001 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Microsoft SharePoint application running on the remote host is affected by multiple vulnerabilities.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Microsoft SharePoint Server 2019 build 16.0.10377.20001 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113088">https://www.tenable.com/plugins/was/113088</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Microsoft SharePoint Server 2013 < 15.0.5363.1000 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/112928</link>
            <guid>https://www.tenable.com/plugins/was/112928</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112928 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Microsoft SharePoint Server 2013 < 15.0.5363.1000 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Microsoft SharePoint application running on the remote host is affected by multiple vulnerabilities.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Microsoft SharePoint Server 2013 build 15.0.5363.1000 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112928">https://www.tenable.com/plugins/was/112928</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Microsoft SharePoint Server 2016 < 16.0.5188.1000 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/112927</link>
            <guid>https://www.tenable.com/plugins/was/112927</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112927 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Microsoft SharePoint Server 2016 < 16.0.5188.1000 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Microsoft SharePoint application running on the remote host is affected by multiple vulnerabilities.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Microsoft SharePoint Server 2016 build 16.0.5188.1000 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112927">https://www.tenable.com/plugins/was/112927</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Microsoft SharePoint Server 2019 < 16.0.10376.20001 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/112926</link>
            <guid>https://www.tenable.com/plugins/was/112926</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112926 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Microsoft SharePoint Server 2019 < 16.0.10376.20001 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Microsoft SharePoint application running on the remote host is affected by multiple vulnerabilities.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Microsoft SharePoint Server 2019 build 16.0.10376.20001 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112926">https://www.tenable.com/plugins/was/112926</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Resin < 4.0.40 Incorrect Unicode Transformations]]></title>
            <link>https://www.tenable.com/plugins/was/112673</link>
            <guid>https://www.tenable.com/plugins/was/112673</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112673 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Resin < 4.0.40 Incorrect Unicode Transformations<br /></span>
      <h3>Description</h3>
      <span>The version of Resin installed on the remote host perform incorrect Unicode transformations on output to HTTP responses for ISO-8859-1. This allows an attacker to bypass filtering/encoding/validation done prior to the output transformation. Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Resin version 4.0.40 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112673">https://www.tenable.com/plugins/was/112673</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Sitefinity < 10.0.6412.0 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/112501</link>
            <guid>https://www.tenable.com/plugins/was/112501</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112501 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Sitefinity < 10.0.6412.0 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Sitefinity installed on the remote host is prior to 10.0.6412.0. It is, therefore, affected by multiple vulnerabilities in Telerik DialogHandler and RadAsyncUpload :<br /></span><span><br /></span><span> - A cryptographic weakness exists in Telerik.Web.UI that can be exploited to disclose encryption keys<br /></span><span><br /></span><span> - An unrestricted file upload vulnerability exists in Telerik.Web.UI due to weak encryption<br /></span><span><br /></span><span> - An insecure direct object reference vulnerability exists in Telerik.Web.UI due to user input used directly by RadAsyncUpload without validation<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Sitefinity version 10.0.6412.0 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112501">https://www.tenable.com/plugins/was/112501</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[lighttpd < 1.4.35 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/112358</link>
            <guid>https://www.tenable.com/plugins/was/112358</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112358 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>lighttpd < 1.4.35 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its banner, the version of lighttpd running on the remote host is prior to 1.4.35. It is, therefore, affected by the following vulnerabilities :<br /></span><span><br /></span><span> - A SQL injection flaw exists in the 'mod_mysql_vhost' module where user input passed using the hostname is not properly sanitized. A remote attacker can exploit this to inject or manipulate SQL queries, resulting in the manipulation or disclosure of data. (CVE-2014-2323)<br /></span><span><br /></span><span> - A traverse outside of restricted path flaw exists with the 'mod_evhost' and 'mod_simple_vhost' modules where user input passed using the hostname is not properly sanitized. A remote attacker can exploit this to gain access to potentially sensitive data. (CVE-2014-2324)<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to lighttpd version 1.4.35 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112358">https://www.tenable.com/plugins/was/112358</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[lighttpd < 1.4.28 Insecure Temporary File Creation]]></title>
            <link>https://www.tenable.com/plugins/was/112354</link>
            <guid>https://www.tenable.com/plugins/was/112354</guid>
            <pubDate>Wed, 03 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112354 with High Severity</p>
      <h3>Synopsis</h3>
      <span>lighttpd < 1.4.28 Insecure Temporary File Creation<br /></span>
      <h3>Description</h3>
      <span>According to its banner, the version of lighttpd running on the remote host is prior to 1.4.28. Therefore, it may be, affected by the following vulnerability :<br /></span><span><br /></span><span> - The configuration file for the FastCGI PHP support for lighttpd before 1.4.28 on Debian GNU/Linux creates a socket file with a predictable name in /tmp, which allows local users to hijack the PHP control socket and perform unauthorized actions such as forcing the use of a different version of PHP via a symlink attack or a race condition.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to lighttpd version 1.4.28 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112354">https://www.tenable.com/plugins/was/112354</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Joomla! 2.5.x < 3.9.14 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/98936</link>
            <guid>https://www.tenable.com/plugins/was/98936</guid>
            <pubDate>Wed, 06 Dec 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98936 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Joomla! 2.5.x < 3.9.14 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected Joomla! application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A path disclosure exists in versions 3.8.0 to 3.9.13 due to a missing access check in framework files (CVE-2019-19845)<br /></span><span><br /></span><span> - SQL injection vulnerabilities exist in versions 2.5.0 to 3.9.13 due to a lack of validation of configuration parameters (CVE-2019-19846)<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Joomla! version 3.9.14 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98936">https://www.tenable.com/plugins/was/98936</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WordPress User Enumeration]]></title>
            <link>https://www.tenable.com/plugins/was/98203</link>
            <guid>https://www.tenable.com/plugins/was/98203</guid>
            <pubDate>Wed, 06 Dec 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98203 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress User Enumeration<br /></span>
      <h3>Description</h3>
      <span>In default WordPress installation there are several methods to enumerate authors username. These WordPress users can then be used in brute-force attacks against WordPress login page to guess passwords.<br /></span>
      <h3>Solution</h3>
      <span>Block requests to sensitive user information at the server using .htaccess file or WAF for example. You should block or redirect all requests made to '/wp-json/wp/v2/users/' and to 'author' parameter (via GET and POST requests).<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98203">https://www.tenable.com/plugins/was/98203</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Zoho ManageEngine SAML SSO Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/113550</link>
            <guid>https://www.tenable.com/plugins/was/113550</guid>
            <pubDate>Wed, 06 Dec 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113550 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Zoho ManageEngine SAML SSO Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>Multiple Zoho ManageEngine OnPremise products use an outdated Apache Santuario (xmlsec) component which fails to properly validate XML signatures of SAML responses received during the authentication flow. By crafting a specific HTTP request containing a malicious XML payload and sending it to the vulnerable product Assertion Consumer (ACS) URL, an attacker could achieve a remote unauthenticated Remote Code Execution (RCE) on the target instance.<br /></span>
      <h3>Solution</h3>
      <span>Update to a fixed version of the vulnerable product as described in the vendor security advisory.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113550">https://www.tenable.com/plugins/was/113550</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Kibana 7.9.0 < 7.14.1 Path Traversal]]></title>
            <link>https://www.tenable.com/plugins/was/113522</link>
            <guid>https://www.tenable.com/plugins/was/113522</guid>
            <pubDate>Wed, 06 Dec 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113522 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Kibana 7.9.0 < 7.14.1 Path Traversal<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Kibana application running on the remote host is prior to 7.14.1. It is, therefore, affected by : <br /></span><span><br /></span><span>- A code execution vulnerability due to an older version of js-yaml (CVE-2021-22150)<br /></span><span><br /></span><span>- An HTML Injection due to a lack of sanitization of document fields containing html snippets (CVE-2021-22151)<br /></span><span><br /></span><span>- A Path Traversal through .pbf files (CVE-2021-37936)<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Kibana version 7.14.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113522">https://www.tenable.com/plugins/was/113522</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Kibana 7.10.2 < 7.14.1 Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/113521</link>
            <guid>https://www.tenable.com/plugins/was/113521</guid>
            <pubDate>Wed, 06 Dec 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113521 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Kibana 7.10.2 < 7.14.1 Code Execution<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Kibana application running on the remote host is prior to 7.14.1. It is, therefore, affected by : <br /></span><span><br /></span><span>- A code execution vulnerability due to an older version of js-yaml (CVE-2021-22150)<br /></span><span><br /></span><span>- An HTML Injection due to a lack of sanitization of document fields containing html snippets (CVE-2021-22151)<br /></span><span><br /></span><span>- A Path Traversal through .pbf files (CVE-2021-37936)<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Kibana version 7.14.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113521">https://www.tenable.com/plugins/was/113521</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Kibana 7.14.0 HTML Injection]]></title>
            <link>https://www.tenable.com/plugins/was/113520</link>
            <guid>https://www.tenable.com/plugins/was/113520</guid>
            <pubDate>Wed, 06 Dec 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113520 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Kibana 7.14.0 HTML Injection<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Kibana application running on the remote host is prior to 7.14.1. It is, therefore, affected by : <br /></span><span><br /></span><span>- A code execution vulnerability due to an older version of js-yaml (CVE-2021-22150)<br /></span><span><br /></span><span>- An HTML Injection due to a lack of sanitization of document fields containing html snippets (CVE-2021-22151)<br /></span><span><br /></span><span>- A Path Traversal through .pbf files (CVE-2021-37936)<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Kibana version 7.14.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113520">https://www.tenable.com/plugins/was/113520</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Java Object Deserialization]]></title>
            <link>https://www.tenable.com/plugins/was/98780</link>
            <guid>https://www.tenable.com/plugins/was/98780</guid>
            <pubDate>Fri, 01 Dec 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98780 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Java Object Deserialization<br /></span>
      <h3>Description</h3>
      <span>Serialization is the process of converting an object to a stream of bytes, in order to store or send it through the network. By opposition, deserialization is the process of reconstructing an object from this stream of bytes.<br /></span><span><br /></span><span>When an application performs untrusted data deserialization, an attacker could inject a custom serialized Java object to trigger malicious code execution on the system or to generate a Denial of Service attack (DoS).<br /></span><span><br /></span><span>It was determined that the target Java application is vulnerable to this attack as it deserializes an user-supplied object.<br /></span>
      <h3>Solution</h3>
      <span>Untrusted data should never be deserialized by the application. If required, a code review should be done to prevent deserialization of arbitrary classes and to harden the whole process.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98780">https://www.tenable.com/plugins/was/98780</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Credit Card Number Disclosure]]></title>
            <link>https://www.tenable.com/plugins/was/98129</link>
            <guid>https://www.tenable.com/plugins/was/98129</guid>
            <pubDate>Fri, 01 Dec 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98129 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Credit Card Number Disclosure<br /></span>
      <h3>Description</h3>
      <span>Credit card numbers are used in applications where a user is able to purchase goods and/or services.<br /></span><span><br /></span><span>A credit card number is a sensitive piece of information and should be handled as such. Cyber-criminals will use various methods to attempt to compromise credit card information that can then be used for fraudulent purposes.<br /></span><span><br /></span><span>Through the use of regular expressions and CC number format validation using known issuer numbers and luhn check validation, the scanner was able to discover a credit card number located within the affected page.<br /></span>
      <h3>Solution</h3>
      <span>Initially, the credit card number within the response should be checked to ensure its validity, as it is possible that the regular expression has matched on a similar number with no relation to a real credit card.<br /></span><span>If the response does contain a valid credit card number, then all efforts should be taken to remove or further protect this information. This can be achieved by removing the credit card number altogether, or by masking the number so that only the last few digits are present within the response. (eg. _**********123_).<br /></span><span>Additionally, credit card numbers should not be stored by the application, unless the organisation also complies with other security controls as outlined in the Payment Card Industry Data Security Standard (PCI DSS).<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98129">https://www.tenable.com/plugins/was/98129</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Magento Directory Listing]]></title>
            <link>https://www.tenable.com/plugins/was/98986</link>
            <guid>https://www.tenable.com/plugins/was/98986</guid>
            <pubDate>Wed, 22 Nov 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98986 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Magento Directory Listing<br /></span>
      <h3>Description</h3>
      <span>The scanner has detected publicly accessible directory listings on the Magento web application. This may expose sensitive information to an attacker which may allow for further exploitation techniques to be leveraged, possibly leading to sensitive information leakage or a compromise of the target server.<br /></span>
      <h3>Solution</h3>
      <span>Ensure requests to sensitive resources and directories are blocked using .htaccess files or by using a WAF for example.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98986">https://www.tenable.com/plugins/was/98986</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Joomla! Directory Listing]]></title>
            <link>https://www.tenable.com/plugins/was/98214</link>
            <guid>https://www.tenable.com/plugins/was/98214</guid>
            <pubDate>Wed, 22 Nov 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98214 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Joomla! Directory Listing<br /></span>
      <h3>Description</h3>
      <span>The scanner has detected publicly accessible Joomla! directory index on the target web application. This may expose information relating to the web server to an attacker which may allow for further exploitation techniques to be leveraged, possibly leading to a compromise of the target server<br /></span>
      <h3>Solution</h3>
      <span>Block requests to sensitive server information using .htaccess file or WAF for example.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98214">https://www.tenable.com/plugins/was/98214</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Drupal Directory Listing]]></title>
            <link>https://www.tenable.com/plugins/was/98213</link>
            <guid>https://www.tenable.com/plugins/was/98213</guid>
            <pubDate>Wed, 22 Nov 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98213 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Drupal Directory Listing<br /></span>
      <h3>Description</h3>
      <span>The scanner has detected publicly accessible Drupal directory index on the target web application. This may expose information relating to the web server to an attacker which may allow for further exploitation techniques to be leveraged, possibly leading to a compromise of the target server<br /></span>
      <h3>Solution</h3>
      <span>Block requests to sensitive server information using .htaccess file or WAF for example.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98213">https://www.tenable.com/plugins/was/98213</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WordPress Directory Listing]]></title>
            <link>https://www.tenable.com/plugins/was/98212</link>
            <guid>https://www.tenable.com/plugins/was/98212</guid>
            <pubDate>Wed, 22 Nov 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98212 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress Directory Listing<br /></span>
      <h3>Description</h3>
      <span>The scanner has detected publicly accessible WordPress directory listing on the target web application. This may expose information relating to the web server to an attacker which may allow for further exploitation techniques to be leveraged, possibly leading to a compromise of the target server<br /></span>
      <h3>Solution</h3>
      <span>Block requests to sensitive server information using .htaccess file or WAF for example.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98212">https://www.tenable.com/plugins/was/98212</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Source Code Disclosure]]></title>
            <link>https://www.tenable.com/plugins/was/98098</link>
            <guid>https://www.tenable.com/plugins/was/98098</guid>
            <pubDate>Wed, 22 Nov 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98098 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Source Code Disclosure<br /></span>
      <h3>Description</h3>
      <span>Scanner has detected server-side source code within the server's response.<br /></span><span><br /></span><span>A modern web application will be reliant on several different programming languages. These languages can be broken up in two flavours. These are client-side languages (such as those that run in the browser -- like JavaScript) and server-side languages (which are executed by the server -- like ASP, PHP, JSP, etc.) to form the dynamic pages (client-side code) that are then sent to the client.<br /></span><span><br /></span><span>Because all server side code should be executed by the server, it should never be seen by the client, however in some scenarios, using crafted requests it is possible to force the server into displaying the source code of the application without executing it. As the server-side source code often contains sensitive information, such as database connection strings or details into the application workflow, this can be extremely risky.<br /></span><span><br /></span><span>Cyber-criminals will attempt to discover pages that either accidentally or forcefully allow the server-side source code to be disclosed, to assist in discovering further vulnerabilities or sensitive information.<br /></span>
      <h3>Solution</h3>
      <span>It is important that input sanitisation be conducted to prevent application files (ASP, JSP, PHP or config files) from being called. It is also important that the file system permissions are correctly configured and that all unused files are removed from the web root. If this is not an option, then the vulnerable file should be removed from the server.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98098">https://www.tenable.com/plugins/was/98098</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Fetch/XHR Detected]]></title>
            <link>https://www.tenable.com/plugins/was/98772</link>
            <guid>https://www.tenable.com/plugins/was/98772</guid>
            <pubDate>Fri, 17 Nov 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98772 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Fetch/XHR Detected<br /></span>
      <h3>Description</h3>
      <span>The scan detected that the web application makes requests that appear to be using Fetch or XMLHTTPRequests (XHRs) to communicate with a backend API server. Fetchs/XHRs allow retrieval of data from an API without triggering a page reload, making them especially useful for Single Page Applications.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98772">https://www.tenable.com/plugins/was/98772</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[CVS Entries Detected]]></title>
            <link>https://www.tenable.com/plugins/was/98671</link>
            <guid>https://www.tenable.com/plugins/was/98671</guid>
            <pubDate>Fri, 17 Nov 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98671 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>CVS Entries Detected<br /></span>
      <h3>Description</h3>
      <span>The web server on the remote host allows read access to files within a 'CVS' directory exposing files tracked inside. This potential flaw can be used to access content from the web server that might otherwise be private.<br /></span>
      <h3>Solution</h3>
      <span>Restrict access to the CVS directory or remove it.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98671">https://www.tenable.com/plugins/was/98671</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Joomla! User Enumeration]]></title>
            <link>https://www.tenable.com/plugins/was/98208</link>
            <guid>https://www.tenable.com/plugins/was/98208</guid>
            <pubDate>Fri, 17 Nov 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98208 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Joomla! User Enumeration<br /></span>
      <h3>Description</h3>
      <span>In default Joomla! installation there is available methodology to enumerate user information. These Joomla! users may then be used in brute-force attacks against Joomla! login page to guess passwords.<br /></span>
      <h3>Solution</h3>
      <span>Block requests to sensitive user information at the server using .htaccess file or WAF for example. You should block or redirect all requests made to 'index.php?format=feed&type=atom'.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98208">https://www.tenable.com/plugins/was/98208</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[DOM Elements Excluded]]></title>
            <link>https://www.tenable.com/plugins/was/98111</link>
            <guid>https://www.tenable.com/plugins/was/98111</guid>
            <pubDate>Fri, 17 Nov 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98111 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>DOM Elements Excluded<br /></span>
      <h3>Description</h3>
      <span>Some DOM elements matched one or more entries in the DOM Exclusion list and therefore were excluded from interactions.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98111">https://www.tenable.com/plugins/was/98111</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[E-mail Address Disclosure]]></title>
            <link>https://www.tenable.com/plugins/was/98078</link>
            <guid>https://www.tenable.com/plugins/was/98078</guid>
            <pubDate>Fri, 17 Nov 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98078 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>E-mail Address Disclosure<br /></span>
      <h3>Description</h3>
      <span>Email addresses are typically found on "Contact us" pages, however, they can also be found within scripts or code comments of the application. They are used to provide a legitimate means of contacting an organisation.<br /></span><span><br /></span><span>As one of the initial steps in information gathering, cyber-criminals will spider a website and using automated methods collect as many email addresses as possible, that they may then use in a social engineering attack.<br /></span><span><br /></span><span>Using the same automated methods, scanner was able to detect one or more email addresses that were stored within the affected page.<br /></span>
      <h3>Solution</h3>
      <span>E-mail addresses should be presented in such a way that it is hard to process them automatically.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98078">https://www.tenable.com/plugins/was/98078</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Cookies Collected]]></title>
            <link>https://www.tenable.com/plugins/was/98061</link>
            <guid>https://www.tenable.com/plugins/was/98061</guid>
            <pubDate>Fri, 17 Nov 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98061 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Cookies Collected<br /></span>
      <h3>Description</h3>
      <span>The scanner collected the cookies returned by the application during the scan. The list includes the following information for each cookie:<br /></span><span> - Name: name of the cookie<br /></span><span> - Value: value of the cookie<br /></span><span> - Domain: hosts to which the cookie will be sent<br /></span><span> - Path: URL path which must exist in the requested resource before sending the cookie<br /></span><span> - Expires: maximum lifetime of the cookie as an HTTP-date timestamp<br /></span><span> - Max-Age: number of seconds until the cookie expires<br /></span><span> - HttpOnly: cookie is set to be not accessible via JavaScript, XMLHttpRequest and Request APIs<br /></span><span> - Secure: cookie will be sent to the server only when a request is made using HTTPS<br /></span><span> - SameSite: cookie will be sent along with cross-site request according the defined policy<br /></span><span> - URL: first URL discovered which set the cookie in its response<br /></span><span> - Set-Method: method used by the application to set the cookie (Set-Cookie or JavaScript)<br /></span><span> - Audited: cookie will be audited by plugins during the scan<br /></span><span> - Reason Not Audited: reason given for the cookie not being audited during the scan<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98061">https://www.tenable.com/plugins/was/98061</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Technologies Detected]]></title>
            <link>https://www.tenable.com/plugins/was/98059</link>
            <guid>https://www.tenable.com/plugins/was/98059</guid>
            <pubDate>Fri, 17 Nov 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98059 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Technologies Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational plugin to inform the user what technologies the framework has detected on the target application, which can then be examined and checked for known vulnerable software versions<br /></span>
      <h3>Solution</h3>
      <span>Only use components that do not have known vulnerabilities, only use components that when combined to not introduce a security vulnerability, and ensure that a misconfiguration does not cause any vulnerabilities<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98059">https://www.tenable.com/plugins/was/98059</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Network Timeout Encountered]]></title>
            <link>https://www.tenable.com/plugins/was/98019</link>
            <guid>https://www.tenable.com/plugins/was/98019</guid>
            <pubDate>Fri, 17 Nov 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98019 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Network Timeout Encountered<br /></span>
      <h3>Description</h3>
      <span>Provides a report of network timeouts encountered during the scan, showing URLs and the number of timeouts for each URL.<br /></span><span><br /></span><span>Note that assessment will stop on any URLs in timeout state, and timeouts may increase significantly the overall duration of the scan.<br /></span>
      <h3>Solution</h3>
      <span>Check your web application logs and verify that it is functioning as expected and can handle significant amounts of traffic generated by the scanner.<br /></span><span>Additionally, the scan policy may be edited to optimize the performance settings.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98019">https://www.tenable.com/plugins/was/98019</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Web Application Sitemap]]></title>
            <link>https://www.tenable.com/plugins/was/98009</link>
            <guid>https://www.tenable.com/plugins/was/98009</guid>
            <pubDate>Fri, 17 Nov 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98009 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Web Application Sitemap<br /></span>
      <h3>Description</h3>
      <span>Publishes the sitemap of the web application as seen by the scan.<br /></span><span><br /></span><span>The list of all URLs that have been detected during the scan are available as an attachment. For each URL in the sitemap, the following information is provided:<br /></span><span><br /></span><span>- The first time the URL is detected - The logic used to detect the URL. This information may be found by: crawling rendering the page by a specific plugin - The parent URL requested to detect the URL - If the URL has been requested at least once, information about the response - Whether or not the URL has been queued for audit - If the URL has not been queued for audit, the reason why the URL does not need an audit - Whether or not the URL has been effectively audited - If the URL has not been effectively audited, the reason that the scanner was unable to audit the URL<br /></span><span><br /></span><span><br /></span><span>Reasons for not adding a URL to the audit queue are as follows:<br /></span><span><br /></span><span>- not_in_domain: The domain of the URL does not match main target URL - scope_configuration: The URL does not match scope include list scan settings - directory_depth: The number of directories in the URL path exceeds the scan configuration setting - exclude_file_extension: The URL file extension matched one entry of the file extension blacklist setting - exclude_path_patterns: The URL matched one entry of the URL exclusion blacklist setting - redundant_path: The number of URLs to be audited with the same path and query string parameters has been reached - request_redirect_limit: The number of HTTP redirects allowed per scan configuration setting has been reached - queue_full: The number of URLs to audit has been reached<br /></span><span><br /></span><span><br /></span><span>If a scan fails to audit a URL that has been queued for audit, reasons for the failure are as follows:<br /></span><span><br /></span><span>- timeout: The request timed out when trying to retrieve URL contents - filesize_exceeded: URL response exceeded file size limit defined in the scan configuration - scan_timelimit_reached: The URL couldn't be audited before the scan time limit - user_abort: The user stopped the scan before the URL could be audited<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98009">https://www.tenable.com/plugins/was/98009</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[URI Blocked Due to Exclusion Rule]]></title>
            <link>https://www.tenable.com/plugins/was/98007</link>
            <guid>https://www.tenable.com/plugins/was/98007</guid>
            <pubDate>Fri, 17 Nov 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98007 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>URI Blocked Due to Exclusion Rule<br /></span>
      <h3>Description</h3>
      <span>Requests to the URI were blocked due to a matching Exclusion rule.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98007">https://www.tenable.com/plugins/was/98007</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[GraphQL API Detected]]></title>
            <link>https://www.tenable.com/plugins/was/112809</link>
            <guid>https://www.tenable.com/plugins/was/112809</guid>
            <pubDate>Fri, 17 Nov 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112809 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>GraphQL API Detected<br /></span>
      <h3>Description</h3>
      <span>GraphQL is an open-source query and manipulation language for APIs and a server-side runtime built to handle these queries on the application dataset. It is a popular alternative to traditional REST or SOAP APIs, providing flexibility and an optimized data fetching method.<br /></span><span><br /></span><span>The scanner detected the usage of GraphQL on the target application.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112809">https://www.tenable.com/plugins/was/112809</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[phpBB User Enumeration]]></title>
            <link>https://www.tenable.com/plugins/was/112804</link>
            <guid>https://www.tenable.com/plugins/was/112804</guid>
            <pubDate>Fri, 17 Nov 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112804 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>phpBB User Enumeration<br /></span>
      <h3>Description</h3>
      <span>In a default phpBB installation there are unauthenticated methods to enumerate member usernames. These phpBB users can then be used in brute-force attacks against phpBB login page to guess passwords.<br /></span>
      <h3>Solution</h3>
      <span>Disable access to the phpBB Atom feed if not required, and ensure the guest group does not have access to memberlist.php.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112804">https://www.tenable.com/plugins/was/112804</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Session Cookies Detected]]></title>
            <link>https://www.tenable.com/plugins/was/112798</link>
            <guid>https://www.tenable.com/plugins/was/112798</guid>
            <pubDate>Fri, 17 Nov 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112798 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Session Cookies Detected<br /></span>
      <h3>Description</h3>
      <span>The scanner collected the session cookies returned by the application during an authenticated scan. The list includes the following information for each cookie:<br /></span><span> - Name: name of the cookie<br /></span><span> - Value: value of the cookie<br /></span><span> - Domain: hosts to which the cookie will be sent<br /></span><span> - Path: URL path which must exist in the requested resource before sending the cookie<br /></span><span> - HttpOnly: cookie is set to be not accessible via JavaScript, XMLHttpRequest and Request APIs<br /></span><span> - Secure: cookie will be sent to the server only when a request is made using HTTPS<br /></span><span> - SameSite: cookie will be sent along with cross-site request according the defined policy<br /></span><span> - URL: first URL discovered which set the cookie in its response<br /></span><span> - Set-Method: method used by the application to set the cookie (Set-Cookie or JavaScript)<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112798">https://www.tenable.com/plugins/was/112798</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[PHP 5.6.x < 5.6.14 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/98806</link>
            <guid>https://www.tenable.com/plugins/was/98806</guid>
            <pubDate>Wed, 15 Nov 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98806 with High Severity</p>
      <h3>Synopsis</h3>
      <span>PHP 5.6.x < 5.6.14 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its banner, the version of PHP running on the remote web server is 5.6.x prior to 5.6.14. It is, therefore, affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A NULL pointer dereference flaw exists in the phar_get_fp_offset() function in ext/phar/util.c that is triggered when pointing to a non-existent file. An unauthenticated, remote attacker can exploit this to cause a denial of service condition.<br /></span><span><br /></span><span> - An uninitialized pointer flaw exists in the phar_make_dirstream() function in ext/phar/dirstream.c that is triggered when handling a zip entry filename that is a single forward slash. An unauthenticated, remote attacker can exploit this to cause a denial of service condition or to disclose sensitive information.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to PHP version 5.6.14 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98806">https://www.tenable.com/plugins/was/98806</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Confluence 8.6.x < 8.6.1 Improper Authorization]]></title>
            <link>https://www.tenable.com/plugins/was/114105</link>
            <guid>https://www.tenable.com/plugins/was/114105</guid>
            <pubDate>Wed, 15 Nov 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114105 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Confluence 8.6.x < 8.6.1 Improper Authorization<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Atlassian Confluence application running on the remote host is 7.x prior 7.19.6, 8.x prior to 8.3.4, 8.4.x prior to 8.4.4, 8.5.x prior to 8.5.3 or 8.6.x prior to 8.6.1. It is, therefore, affected by an improper authorization vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Confluence version 8.6.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114105">https://www.tenable.com/plugins/was/114105</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Confluence 8.5.x < 8.5.3 Improper Authorization]]></title>
            <link>https://www.tenable.com/plugins/was/114104</link>
            <guid>https://www.tenable.com/plugins/was/114104</guid>
            <pubDate>Wed, 15 Nov 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114104 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Confluence 8.5.x < 8.5.3 Improper Authorization<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Atlassian Confluence application running on the remote host is 7.x prior 7.19.6, 8.x prior to 8.3.4, 8.4.x prior to 8.4.4, 8.5.x prior to 8.5.3 or 8.6.x prior to 8.6.1. It is, therefore, affected by an improper authorization vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Confluence version 8.5.3 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114104">https://www.tenable.com/plugins/was/114104</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Confluence 8.4.x < 8.4.4 Improper Authorization]]></title>
            <link>https://www.tenable.com/plugins/was/114103</link>
            <guid>https://www.tenable.com/plugins/was/114103</guid>
            <pubDate>Wed, 15 Nov 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114103 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Confluence 8.4.x < 8.4.4 Improper Authorization<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Atlassian Confluence application running on the remote host is 7.x prior 7.19.6, 8.x prior to 8.3.4, 8.4.x prior to 8.4.4, 8.5.x prior to 8.5.3 or 8.6.x prior to 8.6.1. It is, therefore, affected by an improper authorization vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Confluence version 8.4.4 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114103">https://www.tenable.com/plugins/was/114103</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Confluence 8.x < 8.3.4 Improper Authorization]]></title>
            <link>https://www.tenable.com/plugins/was/114102</link>
            <guid>https://www.tenable.com/plugins/was/114102</guid>
            <pubDate>Wed, 15 Nov 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114102 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Confluence 8.x < 8.3.4 Improper Authorization<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Atlassian Confluence application running on the remote host is 7.x prior 7.19.6, 8.x prior to 8.3.4, 8.4.x prior to 8.4.4, 8.5.x prior to 8.5.3 or 8.6.x prior to 8.6.1. It is, therefore, affected by an improper authorization vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Confluence version 8.3.4 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114102">https://www.tenable.com/plugins/was/114102</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Confluence 7.x < 7.19.16 Improper Authorization]]></title>
            <link>https://www.tenable.com/plugins/was/114101</link>
            <guid>https://www.tenable.com/plugins/was/114101</guid>
            <pubDate>Wed, 15 Nov 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114101 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Confluence 7.x < 7.19.16 Improper Authorization<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Atlassian Confluence application running on the remote host is 7.x prior 7.19.6, 8.x prior to 8.3.4, 8.4.x prior to 8.4.4, 8.5.x prior to 8.5.3 or 8.6.x prior to 8.6.1. It is, therefore, affected by an improper authorization vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Confluence version 7.19.16 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114101">https://www.tenable.com/plugins/was/114101</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Royal Elementor Addons and Templates Plugin for WordPress < 1.3.79 Arbitrary File Upload]]></title>
            <link>https://www.tenable.com/plugins/was/114092</link>
            <guid>https://www.tenable.com/plugins/was/114092</guid>
            <pubDate>Wed, 15 Nov 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114092 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Royal Elementor Addons and Templates Plugin for WordPress < 1.3.79 Arbitrary File Upload<br /></span>
      <h3>Description</h3>
      <span>The WordPress Royal Elementor Addons and Templates Plugin installed on the remote host is affected by a file upload vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Royal Elementor Addons and Templates Plugin for WordPress 1.3.79 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114092">https://www.tenable.com/plugins/was/114092</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache 2.4.x < 2.4.58 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114090</link>
            <guid>https://www.tenable.com/plugins/was/114090</guid>
            <pubDate>Wed, 15 Nov 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114090 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Apache 2.4.x < 2.4.58 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its banner, the version of Apache running on the remote host is 2.4.x prior to 2.4.58. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span> - Out-of-bounds read vulnerability in mod_macro of Apache HTTP Server. (CVE-2023-31122)<br /></span><span><br /></span><span> - An attacker, opening a HTTP/2 connection with an initial window size of 0, was able to block handling of that connection indefinitely in Apache HTTP Server. This could be used to exhaust worker resources in the server, similar to the well known slow loris attack pattern. (CVE-2023-43622)<br /></span><span><br /></span><span> - A client could send new requests and resets, keeping the connection busy and open and causing the memory footprint to keep on growing. On connection close, all resources were reclaimed, but the process might run out of memory before that. (CVE-2023-45802) Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache version 2.4.58 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114090">https://www.tenable.com/plugins/was/114090</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Simple Membership Plugin For WordPress < 4.3.6 Reflected Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/114055</link>
            <guid>https://www.tenable.com/plugins/was/114055</guid>
            <pubDate>Wed, 15 Nov 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114055 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Simple Membership Plugin For WordPress < 4.3.6 Reflected Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>The WordPress Simple Member Plugin installed on the remote host is affected by a Reflected Cross-Site Scripting (rXSS) vulnerability in the list_type parameter, which may permit unauthenticated attackers to inject arbitrary web scripts by tricking users into clicking on a malicious link.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Simple Membership plugin version 4.3.6 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114055">https://www.tenable.com/plugins/was/114055</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[PHP 8.2.x < 8.2.9 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114007</link>
            <guid>https://www.tenable.com/plugins/was/114007</guid>
            <pubDate>Wed, 15 Nov 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114007 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>PHP 8.2.x < 8.2.9 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the version of PHP installed on the remote host is 8.0.x prior to 8.0.30, or 8.1.x prior to 8.1.22. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span> - A security issue with external entity loading in XML without enabling it. (CVE-2023-3823)<br /></span><span><br /></span><span> - A buffer mismanagement in phar_dir_read(). (CVE-2023-3824)<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to PHP version 8.2.9 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114007">https://www.tenable.com/plugins/was/114007</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[PHP 8.0.x < 8.0.30 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/113988</link>
            <guid>https://www.tenable.com/plugins/was/113988</guid>
            <pubDate>Wed, 15 Nov 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113988 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>PHP 8.0.x < 8.0.30 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the version of PHP installed on the remote host is 8.0.x prior to 8.0.30, or 8.1.x prior to 8.1.22. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span> - A security issue with external entity loading in XML without enabling it. (CVE-2023-3823)<br /></span><span><br /></span><span> - A buffer mismanagement in phar_dir_read(). (CVE-2023-3824)<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to PHP version 8.0.30 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113988">https://www.tenable.com/plugins/was/113988</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[PHP 8.1.x < 8.1.22 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/113987</link>
            <guid>https://www.tenable.com/plugins/was/113987</guid>
            <pubDate>Wed, 15 Nov 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113987 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>PHP 8.1.x < 8.1.22 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the version of PHP installed on the remote host is 8.0.x prior to 8.0.30, or 8.1.x prior to 8.1.22. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span> - A security issue with external entity loading in XML without enabling it. (CVE-2023-3823)<br /></span><span><br /></span><span> - A buffer mismanagement in phar_dir_read(). (CVE-2023-3824)<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to PHP version 8.1.22 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113987">https://www.tenable.com/plugins/was/113987</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Prototype < 1.6.0.2 Cross-Site Ajax Request]]></title>
            <link>https://www.tenable.com/plugins/was/112476</link>
            <guid>https://www.tenable.com/plugins/was/112476</guid>
            <pubDate>Wed, 15 Nov 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112476 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Prototype < 1.6.0.2 Cross-Site Ajax Request<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, Prototype is prior to 1.6.0.2. Therefore, it may be affected by a cross-site ajax request vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Prototype version 1.6.0.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112476">https://www.tenable.com/plugins/was/112476</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Confluence 8.5.x < 8.5.2 Privilege Escalation]]></title>
            <link>https://www.tenable.com/plugins/was/114058</link>
            <guid>https://www.tenable.com/plugins/was/114058</guid>
            <pubDate>Tue, 07 Nov 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114058 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Confluence 8.5.x < 8.5.2 Privilege Escalation<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Atlassian Confluence application running on the remote host is 8.x prior to 8.3.3, 8.4.x prior to 8.4.3 or 8.5.x prior to 8.5.2. It is, therefore, affected by a privilege escalation vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Confluence version 8.5.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114058">https://www.tenable.com/plugins/was/114058</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Confluence 8.4.x < 8.4.3 Privilege Escalation]]></title>
            <link>https://www.tenable.com/plugins/was/114057</link>
            <guid>https://www.tenable.com/plugins/was/114057</guid>
            <pubDate>Tue, 07 Nov 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114057 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Confluence 8.4.x < 8.4.3 Privilege Escalation<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Atlassian Confluence application running on the remote host is 8.x prior to 8.3.3, 8.4.x prior to 8.4.3 or 8.5.x prior to 8.5.2. It is, therefore, affected by a privilege escalation vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Confluence version 8.4.3 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114057">https://www.tenable.com/plugins/was/114057</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Confluence 8.x < 8.3.3 Privilege Escalation]]></title>
            <link>https://www.tenable.com/plugins/was/114056</link>
            <guid>https://www.tenable.com/plugins/was/114056</guid>
            <pubDate>Tue, 07 Nov 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114056 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Confluence 8.x < 8.3.3 Privilege Escalation<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Atlassian Confluence application running on the remote host is 8.x prior to 8.3.3, 8.4.x prior to 8.4.3 or 8.5.x prior to 8.5.2. It is, therefore, affected by a privilege escalation vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Confluence version 8.3.3 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114056">https://www.tenable.com/plugins/was/114056</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Kerberos Authentication Failed]]></title>
            <link>https://www.tenable.com/plugins/was/113225</link>
            <guid>https://www.tenable.com/plugins/was/113225</guid>
            <pubDate>Tue, 07 Nov 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113225 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Kerberos Authentication Failed<br /></span>
      <h3>Description</h3>
      <span>This plugin is raised when the scanner has not been able to authenticate against the web application using the Kerberos authentication credentials provided in the scan policy.<br /></span><span><br /></span><span>Check the output of the plugin to get an explanation of the issue encountered by the scan.<br /></span>
      <h3>Solution</h3>
      <span>Edit scan policy and update the Kerberos authentication credentials using the information provided in the plugin output.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113225">https://www.tenable.com/plugins/was/113225</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Kerberos Authentication Succeeded]]></title>
            <link>https://www.tenable.com/plugins/was/113224</link>
            <guid>https://www.tenable.com/plugins/was/113224</guid>
            <pubDate>Tue, 07 Nov 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113224 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Kerberos Authentication Succeeded<br /></span>
      <h3>Description</h3>
      <span>This is an informational notice that the scanner was able to successfully authenticate against the web application using the Kerberos authentication credentials provided in the scan policy.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113224">https://www.tenable.com/plugins/was/113224</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache 2.4.x < 2.4.3 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/98901</link>
            <guid>https://www.tenable.com/plugins/was/98901</guid>
            <pubDate>Mon, 30 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98901 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Apache 2.4.x < 2.4.3 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its banner, the version of Apache 2.4.x running on the remote host is prior 2.4.3. It is, therefore, affected by the following vulnerabilities :<br /></span><span><br /></span><span> - An input validation error exists related to 'mod_negotiation', 'Multiviews' and untrusted uploads that can allow cross-site scripting attacks. (CVE-2012-2687)<br /></span><span><br /></span><span> - An error exists related to 'mod_proxy_ajp' and 'mod_proxy_http' that can allow connections to remain open. This condition can allow information disclosure when combined with specially crafted requests. (CVE-2012-3502)<br /></span><span><br /></span><span>Note that the scanner did not actually test for these issues, but instead has relied on the version in the server's banner.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache version 2.4.3 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98901">https://www.tenable.com/plugins/was/98901</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[PHP 5.6.x < 5.6.8 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/98831</link>
            <guid>https://www.tenable.com/plugins/was/98831</guid>
            <pubDate>Mon, 30 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98831 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>PHP 5.6.x < 5.6.8 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its banner, the version of PHP 5.6.x running on the remote web server is prior to 5.6.8. It is, therefore, affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - An unspecified use-after-free error exists in the _zend_shared_memdup() function within file ext/opcache/zend_shared_alloc.c that allows an unauthenticated, remote attacker to have an unspecified impact. (CVE-2015-1351)<br /></span><span><br /></span><span> - A NULL pointer dereference flaw exists in the build_tablename() function within file pgsql.c in the PostgreSQL extension due to a failure to validate token extraction for table names. An authenticated, remote attacker can exploit this, via a crafted name, to cause a denial of service condition. (CVE-2015-1352)<br /></span><span><br /></span><span> - An out-of-bounds read error exists in the Phar component due to improper validation of user-supplied input when handling phar parsing during unserialize() function calls. An unauthenticated, remote attacker can exploit this to cause a denial of service condition or the disclosure of memory contents. (CVE-2015-2783)<br /></span><span><br /></span><span> - A memory corruption issue exists in the phar_parse_metadata() function in file ext/phar/phar.c due to improper validation of user-supplied input when parsing a specially crafted TAR archive. An unauthenticated, remote attacker can exploit this to cause a denial of service condition or the execution of arbitrary code. (CVE-2015-3307)<br /></span><span><br /></span><span> - Multiple stack-based buffer overflow conditions exist in the phar_set_inode() function in file phar_internal.h when handling archive files, such as tar, zip, or phar files. An unauthenticated, remote attacker can exploit these to cause a denial of service condition or the execution or arbitrary code. (CVE-2015-3329)<br /></span><span><br /></span><span> - A flaw exists in the Apache2handler SAPI component when handling pipelined HTTP requests that allows an unauthenticated, remote attacker to cause a denial of service condition or the execution of arbitrary code. (CVE-2015-3330)<br /></span><span><br /></span><span> - A flaw exists in multiple functions due to a failure to check for NULL byte (%00) sequences in a path when processing or reading a file. An unauthenticated, remote attacker can exploit this, via specially crafted input to an application calling those functions, to bypass intended restrictions and disclose potentially sensitive information. (CVE-2015-3411, CVE-2015-3412)<br /></span><span><br /></span><span> - A type confusion error exists in multiple functions within file ext/soap/soap.c that is triggered when calling unserialize(). An unauthenticated, remote attacker can exploit this to disclose memory contents, cause a denial of service condition, or execute arbitrary code. (CVE-2015-4599, CVE-2015-4600)<br /></span><span><br /></span><span> - Multiple type confusion errors exist within files ext/soap/php_encoding.c, ext/soap/php_http.c, and ext/soap/soap.c that allow an unauthenticated, remote attacker to cause a denial of service condition or the execution of arbitrary code. (CVE-2015-4601)<br /></span><span><br /></span><span> - A type confusion error exists in the __PHP_Incomplete_Class() function within file ext/standard/incomplete_class.c that allows an unauthenticated, remote attacker to cause a denial of service condition or the execution of arbitrary code. (CVE-2015-4602)<br /></span><span><br /></span><span> - A type confusion error exists in the exception::getTraceAsString() function within file Zend/zend_exceptions.c that allows a remote attacker to execute arbitrary code. (CVE-2015-4603)<br /></span><span><br /></span><span> - A denial of service vulnerability exists due to a flaw in the bundled libmagic library, specifically in the mget() function within file softmagic.c. The function fails to maintain a certain pointer relationship. An unauthenticated, remote attacker can exploit this, via a crafted string, to crash the application. (CVE-2015-4604)<br /></span><span><br /></span><span> - A denial of service vulnerability exists due to a flaw in the bundled libmagic library, specifically in the mcopy() function within file softmagic.c. The function fails to properly handle an offset that exceeds 'bytecnt'. An unauthenticated, remote attacker can exploit this, via a crafted string, to crash the application. (CVE-2015-4605)<br /></span><span><br /></span><span> - A use-after-free error exists in the sqlite3_close() function within file /ext/sqlite3/sqlite3.c when closing database connections. An unauthenticated, remote attacker can exploit this to execute arbitrary code.<br /></span><span><br /></span><span> - A flaw exists in the ZEND_VM_HELPER_EX() function within file /Zend/zend_vm_def.h when handling a __get() function call. An unauthenticated, remote attacker can exploit this to cause a cause a denial of service condition.<br /></span><span><br /></span><span> - A type confusion error exists in the php_stream_url_wrap_http_ex() function within file ext/standard/http_fopen_wrapper.c that allows an unauthenticated, remote attacker to execute arbitrary code.<br /></span><span><br /></span><span> - A use-after-free error exists in the php_curl() function within file ext/curl/interface.c that allows an unauthenticated, remote attacker to execute arbitrary code.<br /></span><span><br /></span><span> - A use-after-free error exists in the SPL component, specifically in the spl_object_storage_get_gc() function within file ext/spl/spl_observer.c. An unauthenticated, remote attacker can exploit this to execute arbitrary code.<br /></span><span><br /></span><span> - A NULL pointer dereference flaw exists within file /ext/ereg/regex/regcomp.c that allows an unauthenticated, remote attacker attacker to cause a denial of service condition.<br /></span><span><br /></span><span>Note that the scanner has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to PHP version 5.6.8 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98831">https://www.tenable.com/plugins/was/98831</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[PHP 5.6.x < 5.6.5 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/98828</link>
            <guid>https://www.tenable.com/plugins/was/98828</guid>
            <pubDate>Mon, 30 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98828 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>PHP 5.6.x < 5.6.5 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its banner, the version of PHP 5.6.x installed on the remote host is prior to 5.6.5. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span> - An out-of-bounds read flaw in file 'cgi_main.c' exists when nmap is used to process an invalid file that begins with a hash character (#) but lacks a newline character. A remote attacker, using a specially crafted PHP file, can exploit this vulnerability to disclose memory contents, cause a denial of service, or possibly execute code. (CVE-2014-9427)<br /></span><span><br /></span><span> - An out-of-bounds read issue exists in the GetCode_() function in 'gd_gif_in.c'. This allows a remote attacker to disclose memory contents. (CVE-2014-9709)<br /></span><span><br /></span><span> - A use-after-free memory error exists in the process_nested_data() function in 'var_unserializer.re' due to improper handling of duplicate numerical keys within the serialized properties of an object. A remote attacker, using a crafted unserialize method call, can exploit this vulnerability to execute arbitrary code. (CVE-2015-0231)<br /></span><span><br /></span><span> - A flaw exists in the exif_process_unicode() function in 'exif.c' that allows freeing an uninitialized pointer. A remote attacker, using specially crafted EXIF data in a JPEG image, can exploit this to cause a denial of service or to execute arbitrary code. (CVE-2015-0232)<br /></span><span><br /></span><span>Note that the scanner has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to PHP version 5.6.5 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98828">https://www.tenable.com/plugins/was/98828</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 8.5.85 < 8.5.94 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114063</link>
            <guid>https://www.tenable.com/plugins/was/114063</guid>
            <pubDate>Mon, 30 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114063 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Tomcat 8.5.85 < 8.5.94 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is 8.5.85 to 8.5.93, 9.0.70 to 9.0.80, 10.1.0-M1 to 10.1.13 or 11.0.0-M1 to 11.0.0-M11. It is, therefore, affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - Tomcat did not correctly parse HTTP trailer headers. A specially crafted, invalid trailer header could cause Tomcat to treat a single request as multiple requests leading to the possibility of request smuggling when behind a reverse proxy. (CVE-2023-45648)<br /></span><span><br /></span><span> - Tomcat's HTTP/2 implementation was vulnerable to the rapid reset attack. The denial of service typically manifested as an OutOfMemoryError. (CVE-2023-44487)<br /></span><span><br /></span><span> - When recycling various internal objects, including the request and the response, prior to re-use by the next request/response, an error could cause Tomcat to skip some parts of the recycling process leading to information leaking from the current request/response to the next. (CVE-2023-42795)<br /></span><span><br /></span><span> - Tomcat's internal fork of a Commons FileUpload included an unreleased, in progress refactoring that exposed a potential denial of service on Windows if a web application opened a stream for an uploaded file but failed to close the stream. The file would never be deleted from disk creating the possibility of an eventual denial of service due to the disk being full. (CVE-2023-42794)<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 8.5.94 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114063">https://www.tenable.com/plugins/was/114063</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 9.0.70 < 9.0.81 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114062</link>
            <guid>https://www.tenable.com/plugins/was/114062</guid>
            <pubDate>Mon, 30 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114062 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Tomcat 9.0.70 < 9.0.81 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is 8.5.85 to 8.5.93, 9.0.70 to 9.0.80, 10.1.0-M1 to 10.1.13 or 11.0.0-M1 to 11.0.0-M11. It is, therefore, affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - Tomcat did not correctly parse HTTP trailer headers. A specially crafted, invalid trailer header could cause Tomcat to treat a single request as multiple requests leading to the possibility of request smuggling when behind a reverse proxy. (CVE-2023-45648)<br /></span><span><br /></span><span> - Tomcat's HTTP/2 implementation was vulnerable to the rapid reset attack. The denial of service typically manifested as an OutOfMemoryError. (CVE-2023-44487)<br /></span><span><br /></span><span> - When recycling various internal objects, including the request and the response, prior to re-use by the next request/response, an error could cause Tomcat to skip some parts of the recycling process leading to information leaking from the current request/response to the next. (CVE-2023-42795)<br /></span><span><br /></span><span> - Tomcat's internal fork of a Commons FileUpload included an unreleased, in progress refactoring that exposed a potential denial of service on Windows if a web application opened a stream for an uploaded file but failed to close the stream. The file would never be deleted from disk creating the possibility of an eventual denial of service due to the disk being full. (CVE-2023-42794)<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 9.0.81 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114062">https://www.tenable.com/plugins/was/114062</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 10.1.0-M1 < 10.1.14 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114061</link>
            <guid>https://www.tenable.com/plugins/was/114061</guid>
            <pubDate>Mon, 30 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114061 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Tomcat 10.1.0-M1 < 10.1.14 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is 8.5.85 to 8.5.93, 9.0.70 to 9.0.80, 10.1.0-M1 to 10.1.13 or 11.0.0-M1 to 11.0.0-M11. It is, therefore, affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - Tomcat did not correctly parse HTTP trailer headers. A specially crafted, invalid trailer header could cause Tomcat to treat a single request as multiple requests leading to the possibility of request smuggling when behind a reverse proxy. (CVE-2023-45648)<br /></span><span><br /></span><span> - Tomcat's HTTP/2 implementation was vulnerable to the rapid reset attack. The denial of service typically manifested as an OutOfMemoryError. (CVE-2023-44487)<br /></span><span><br /></span><span> - When recycling various internal objects, including the request and the response, prior to re-use by the next request/response, an error could cause Tomcat to skip some parts of the recycling process leading to information leaking from the current request/response to the next. (CVE-2023-42795)<br /></span><span><br /></span><span> - Tomcat's internal fork of a Commons FileUpload included an unreleased, in progress refactoring that exposed a potential denial of service on Windows if a web application opened a stream for an uploaded file but failed to close the stream. The file would never be deleted from disk creating the possibility of an eventual denial of service due to the disk being full. (CVE-2023-42794)<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 10.1.14 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114061">https://www.tenable.com/plugins/was/114061</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 11.0.0-M1 < 11.0.0-M12 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114060</link>
            <guid>https://www.tenable.com/plugins/was/114060</guid>
            <pubDate>Mon, 30 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114060 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Tomcat 11.0.0-M1 < 11.0.0-M12 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is 8.5.85 to 8.5.93, 9.0.70 to 9.0.80, 10.1.0-M1 to 10.1.13 or 11.0.0-M1 to 11.0.0-M11. It is, therefore, affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - Tomcat did not correctly parse HTTP trailer headers. A specially crafted, invalid trailer header could cause Tomcat to treat a single request as multiple requests leading to the possibility of request smuggling when behind a reverse proxy. (CVE-2023-45648)<br /></span><span><br /></span><span> - Tomcat's HTTP/2 implementation was vulnerable to the rapid reset attack. The denial of service typically manifested as an OutOfMemoryError. (CVE-2023-44487)<br /></span><span><br /></span><span> - When recycling various internal objects, including the request and the response, prior to re-use by the next request/response, an error could cause Tomcat to skip some parts of the recycling process leading to information leaking from the current request/response to the next. (CVE-2023-42795)<br /></span><span><br /></span><span> - Tomcat's internal fork of a Commons FileUpload included an unreleased, in progress refactoring that exposed a potential denial of service on Windows if a web application opened a stream for an uploaded file but failed to close the stream. The file would never be deleted from disk creating the possibility of an eventual denial of service due to the disk being full. (CVE-2023-42794)<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 11.0.0-M12 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114060">https://www.tenable.com/plugins/was/114060</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Prometheus Sensitive Endpoint Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114012</link>
            <guid>https://www.tenable.com/plugins/was/114012</guid>
            <pubDate>Mon, 30 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114012 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Prometheus Sensitive Endpoint Detected<br /></span>
      <h3>Description</h3>
      <span>Prometheus is an open-source monitoring solution which is designed to record metrics in a dimensional data model to make it available through its own PromQL query language or built-in visualization capabilities. Prometheus offer multiple libraries (named 'Exporters') to help exporting these endpoints and make it available to third-party tools. When publicly exposed, a remote and unauthenticated attacker could leverage the data to understand the target application environment and try conducting further attack.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that the detected sensitive endpoint is not publicly available by requiring authentication or applying IP source filtering.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114012">https://www.tenable.com/plugins/was/114012</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[HandlebarsJS < 4.3.0 Prototype Pollution]]></title>
            <link>https://www.tenable.com/plugins/was/114097</link>
            <guid>https://www.tenable.com/plugins/was/114097</guid>
            <pubDate>Wed, 25 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114097 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>HandlebarsJS < 4.3.0 Prototype Pollution<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, HandlebarsJS on the remote server is prior to 4.3.0. Therefore, it may be affected by a Prototype Pollution vulnerability leading to Remote Code Execution when attackers supply crafted templates which alter a Objects __proto__ and __defineGetter__ properties.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to HandlebarsJS version 4.3.0 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114097">https://www.tenable.com/plugins/was/114097</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[HandlebarsJS 4.x < 4.5.3 Arbitrary Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/114096</link>
            <guid>https://www.tenable.com/plugins/was/114096</guid>
            <pubDate>Wed, 25 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114096 with High Severity</p>
      <h3>Synopsis</h3>
      <span>HandlebarsJS 4.x < 4.5.3 Arbitrary Code Execution<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, HandlebarsJS on the remote server is prior to 3.0.8 or 4.x prior to 4.5.3. Therefore, it may be affected by a arbitrary code execution vulnerability permitting attackers to submit templates that execute aribtrary Javascript either server-side on a server processing Handlebars templates, or in a victims browser.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to HandlebarsJS version 4.5.3 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114096">https://www.tenable.com/plugins/was/114096</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[HandlebarsJS < 3.0.8 Arbitrary Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/114095</link>
            <guid>https://www.tenable.com/plugins/was/114095</guid>
            <pubDate>Wed, 25 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114095 with High Severity</p>
      <h3>Synopsis</h3>
      <span>HandlebarsJS < 3.0.8 Arbitrary Code Execution<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, HandlebarsJS on the remote server is prior to 3.0.8 or 4.x prior to 4.5.3. Therefore, it may be affected by a arbitrary code execution vulnerability permitting attackers to submit templates that execute aribtrary Javascript either server-side on a server processing Handlebars templates, or in a victims browser.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to HandlebarsJS version 3.0.8 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114095">https://www.tenable.com/plugins/was/114095</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[HandlebarsJS 4.x < 4.5.5 Regular Expression Denial Of Service]]></title>
            <link>https://www.tenable.com/plugins/was/114094</link>
            <guid>https://www.tenable.com/plugins/was/114094</guid>
            <pubDate>Wed, 25 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114094 with High Severity</p>
      <h3>Synopsis</h3>
      <span>HandlebarsJS 4.x < 4.5.5 Regular Expression Denial Of Service<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, HandlebarsJS on the remote server is 4.x prior to 4.5.5. Therefore, it may be affected by a Regular Expression Denial Of Service (ReDoS) vulnerability because of eager matching. The Parser may e forced into a endless loop while processing crafted templates, potentially permitting attackers to exhaust system resources.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to HandlebarsJS version 4.5.5 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114094">https://www.tenable.com/plugins/was/114094</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[HandlebarsJS < 4.7.7 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114093</link>
            <guid>https://www.tenable.com/plugins/was/114093</guid>
            <pubDate>Wed, 25 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114093 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>HandlebarsJS < 4.7.7 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, HandlebarsJS on the remote server is prior to version 4.7.7. Therefore, it may be affected by multiple vulnerabilities.<br /></span><span><br /></span><span>- A Prototype Pollution Vulnerability when seleclecting certain compiling options to compile templates originating from untrusted sources (CVE-2021-23383).<br /></span><span><br /></span><span>- A Remote Code Execution vulnerability when seleclecting certain compiling options to compile templates originating from untrusted sources (CVE-2021-23369).<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to HandlebarsJS version 4.7.7 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114093">https://www.tenable.com/plugins/was/114093</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WordPress 6.3.x < 6.3.2 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114088</link>
            <guid>https://www.tenable.com/plugins/was/114088</guid>
            <pubDate>Wed, 25 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114088 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress 6.3.x < 6.3.2 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected WordPress application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A potential disclosure of user email addresses.<br /></span><span><br /></span><span> - An RCE POP Chains vulnerability.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the post link navigation block.<br /></span><span><br /></span><span> - An issue where comments on private posts could be leaked to other users.<br /></span><span><br /></span><span> - A way for logged-in users to execute any shortcode.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the application password screen.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the footnotes block.<br /></span><span><br /></span><span> - A cache poisoning DoS vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to WordPress version 6.3.2 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114088">https://www.tenable.com/plugins/was/114088</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WordPress 6.2.x < 6.2.3 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114087</link>
            <guid>https://www.tenable.com/plugins/was/114087</guid>
            <pubDate>Wed, 25 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114087 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress 6.2.x < 6.2.3 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected WordPress application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A potential disclosure of user email addresses.<br /></span><span><br /></span><span> - An RCE POP Chains vulnerability.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the post link navigation block.<br /></span><span><br /></span><span> - An issue where comments on private posts could be leaked to other users.<br /></span><span><br /></span><span> - A way for logged-in users to execute any shortcode.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the application password screen.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the footnotes block.<br /></span><span><br /></span><span> - A cache poisoning DoS vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to WordPress version 6.2.3 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114087">https://www.tenable.com/plugins/was/114087</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WordPress 6.1.x < 6.1.4 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114086</link>
            <guid>https://www.tenable.com/plugins/was/114086</guid>
            <pubDate>Wed, 25 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114086 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress 6.1.x < 6.1.4 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected WordPress application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A potential disclosure of user email addresses.<br /></span><span><br /></span><span> - An RCE POP Chains vulnerability.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the post link navigation block.<br /></span><span><br /></span><span> - An issue where comments on private posts could be leaked to other users.<br /></span><span><br /></span><span> - A way for logged-in users to execute any shortcode.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the application password screen.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the footnotes block.<br /></span><span><br /></span><span> - A cache poisoning DoS vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to WordPress version 6.1.4 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114086">https://www.tenable.com/plugins/was/114086</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WordPress 6.0.x < 6.0.6 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114085</link>
            <guid>https://www.tenable.com/plugins/was/114085</guid>
            <pubDate>Wed, 25 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114085 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress 6.0.x < 6.0.6 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected WordPress application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A potential disclosure of user email addresses.<br /></span><span><br /></span><span> - An RCE POP Chains vulnerability.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the post link navigation block.<br /></span><span><br /></span><span> - An issue where comments on private posts could be leaked to other users.<br /></span><span><br /></span><span> - A way for logged-in users to execute any shortcode.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the application password screen.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the footnotes block.<br /></span><span><br /></span><span> - A cache poisoning DoS vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to WordPress version 6.0.6 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114085">https://www.tenable.com/plugins/was/114085</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WordPress 5.9.x < 5.9.8 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114084</link>
            <guid>https://www.tenable.com/plugins/was/114084</guid>
            <pubDate>Wed, 25 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114084 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress 5.9.x < 5.9.8 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected WordPress application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A potential disclosure of user email addresses.<br /></span><span><br /></span><span> - An RCE POP Chains vulnerability.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the post link navigation block.<br /></span><span><br /></span><span> - An issue where comments on private posts could be leaked to other users.<br /></span><span><br /></span><span> - A way for logged-in users to execute any shortcode.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the application password screen.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the footnotes block.<br /></span><span><br /></span><span> - A cache poisoning DoS vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to WordPress version 5.9.8 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114084">https://www.tenable.com/plugins/was/114084</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WordPress 5.8.x < 5.8.8 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114083</link>
            <guid>https://www.tenable.com/plugins/was/114083</guid>
            <pubDate>Wed, 25 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114083 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress 5.8.x < 5.8.8 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected WordPress application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A potential disclosure of user email addresses.<br /></span><span><br /></span><span> - An RCE POP Chains vulnerability.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the post link navigation block.<br /></span><span><br /></span><span> - An issue where comments on private posts could be leaked to other users.<br /></span><span><br /></span><span> - A way for logged-in users to execute any shortcode.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the application password screen.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the footnotes block.<br /></span><span><br /></span><span> - A cache poisoning DoS vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to WordPress version 5.8.8 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114083">https://www.tenable.com/plugins/was/114083</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WordPress 5.7.x < 5.7.10 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114082</link>
            <guid>https://www.tenable.com/plugins/was/114082</guid>
            <pubDate>Wed, 25 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114082 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress 5.7.x < 5.7.10 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected WordPress application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A potential disclosure of user email addresses.<br /></span><span><br /></span><span> - An RCE POP Chains vulnerability.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the post link navigation block.<br /></span><span><br /></span><span> - An issue where comments on private posts could be leaked to other users.<br /></span><span><br /></span><span> - A way for logged-in users to execute any shortcode.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the application password screen.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the footnotes block.<br /></span><span><br /></span><span> - A cache poisoning DoS vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to WordPress version 5.7.10 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114082">https://www.tenable.com/plugins/was/114082</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WordPress 5.6.x < 5.6.12 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114081</link>
            <guid>https://www.tenable.com/plugins/was/114081</guid>
            <pubDate>Wed, 25 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114081 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress 5.6.x < 5.6.12 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected WordPress application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A potential disclosure of user email addresses.<br /></span><span><br /></span><span> - An RCE POP Chains vulnerability.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the post link navigation block.<br /></span><span><br /></span><span> - An issue where comments on private posts could be leaked to other users.<br /></span><span><br /></span><span> - A way for logged-in users to execute any shortcode.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the application password screen.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the footnotes block.<br /></span><span><br /></span><span> - A cache poisoning DoS vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to WordPress version 5.6.12 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114081">https://www.tenable.com/plugins/was/114081</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WordPress 5.5.x < 5.5.13 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114080</link>
            <guid>https://www.tenable.com/plugins/was/114080</guid>
            <pubDate>Wed, 25 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114080 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress 5.5.x < 5.5.13 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected WordPress application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A potential disclosure of user email addresses.<br /></span><span><br /></span><span> - An RCE POP Chains vulnerability.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the post link navigation block.<br /></span><span><br /></span><span> - An issue where comments on private posts could be leaked to other users.<br /></span><span><br /></span><span> - A way for logged-in users to execute any shortcode.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the application password screen.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the footnotes block.<br /></span><span><br /></span><span> - A cache poisoning DoS vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to WordPress version 5.5.13 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114080">https://www.tenable.com/plugins/was/114080</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WordPress 5.4.x < 5.4.14 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114079</link>
            <guid>https://www.tenable.com/plugins/was/114079</guid>
            <pubDate>Wed, 25 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114079 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress 5.4.x < 5.4.14 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected WordPress application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A potential disclosure of user email addresses.<br /></span><span><br /></span><span> - An RCE POP Chains vulnerability.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the post link navigation block.<br /></span><span><br /></span><span> - An issue where comments on private posts could be leaked to other users.<br /></span><span><br /></span><span> - A way for logged-in users to execute any shortcode.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the application password screen.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the footnotes block.<br /></span><span><br /></span><span> - A cache poisoning DoS vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to WordPress version 5.4.14 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114079">https://www.tenable.com/plugins/was/114079</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WordPress 5.3.x < 5.3.16 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114078</link>
            <guid>https://www.tenable.com/plugins/was/114078</guid>
            <pubDate>Wed, 25 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114078 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress 5.3.x < 5.3.16 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected WordPress application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A potential disclosure of user email addresses.<br /></span><span><br /></span><span> - An RCE POP Chains vulnerability.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the post link navigation block.<br /></span><span><br /></span><span> - An issue where comments on private posts could be leaked to other users.<br /></span><span><br /></span><span> - A way for logged-in users to execute any shortcode.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the application password screen.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the footnotes block.<br /></span><span><br /></span><span> - A cache poisoning DoS vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to WordPress version 5.3.16 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114078">https://www.tenable.com/plugins/was/114078</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WordPress 5.2.x < 5.2.19 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114077</link>
            <guid>https://www.tenable.com/plugins/was/114077</guid>
            <pubDate>Wed, 25 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114077 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress 5.2.x < 5.2.19 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected WordPress application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A potential disclosure of user email addresses.<br /></span><span><br /></span><span> - An RCE POP Chains vulnerability.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the post link navigation block.<br /></span><span><br /></span><span> - An issue where comments on private posts could be leaked to other users.<br /></span><span><br /></span><span> - A way for logged-in users to execute any shortcode.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the application password screen.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the footnotes block.<br /></span><span><br /></span><span> - A cache poisoning DoS vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to WordPress version 5.2.19 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114077">https://www.tenable.com/plugins/was/114077</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WordPress 5.1.x < 5.1.17 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114076</link>
            <guid>https://www.tenable.com/plugins/was/114076</guid>
            <pubDate>Wed, 25 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114076 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress 5.1.x < 5.1.17 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected WordPress application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A potential disclosure of user email addresses.<br /></span><span><br /></span><span> - An RCE POP Chains vulnerability.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the post link navigation block.<br /></span><span><br /></span><span> - An issue where comments on private posts could be leaked to other users.<br /></span><span><br /></span><span> - A way for logged-in users to execute any shortcode.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the application password screen.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the footnotes block.<br /></span><span><br /></span><span> - A cache poisoning DoS vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to WordPress version 5.1.17 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114076">https://www.tenable.com/plugins/was/114076</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WordPress 5.0.x < 5.0.20 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114075</link>
            <guid>https://www.tenable.com/plugins/was/114075</guid>
            <pubDate>Wed, 25 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114075 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress 5.0.x < 5.0.20 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected WordPress application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A potential disclosure of user email addresses.<br /></span><span><br /></span><span> - An RCE POP Chains vulnerability.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the post link navigation block.<br /></span><span><br /></span><span> - An issue where comments on private posts could be leaked to other users.<br /></span><span><br /></span><span> - A way for logged-in users to execute any shortcode.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the application password screen.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the footnotes block.<br /></span><span><br /></span><span> - A cache poisoning DoS vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to WordPress version 5.0.20 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114075">https://www.tenable.com/plugins/was/114075</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WordPress 4.9.x < 4.9.24 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114074</link>
            <guid>https://www.tenable.com/plugins/was/114074</guid>
            <pubDate>Wed, 25 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114074 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress 4.9.x < 4.9.24 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected WordPress application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A potential disclosure of user email addresses.<br /></span><span><br /></span><span> - An RCE POP Chains vulnerability.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the post link navigation block.<br /></span><span><br /></span><span> - An issue where comments on private posts could be leaked to other users.<br /></span><span><br /></span><span> - A way for logged-in users to execute any shortcode.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the application password screen.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the footnotes block.<br /></span><span><br /></span><span> - A cache poisoning DoS vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to WordPress version 4.9.24 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114074">https://www.tenable.com/plugins/was/114074</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WordPress 4.8.x < 4.8.23 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114073</link>
            <guid>https://www.tenable.com/plugins/was/114073</guid>
            <pubDate>Wed, 25 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114073 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress 4.8.x < 4.8.23 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected WordPress application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A potential disclosure of user email addresses.<br /></span><span><br /></span><span> - An RCE POP Chains vulnerability.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the post link navigation block.<br /></span><span><br /></span><span> - An issue where comments on private posts could be leaked to other users.<br /></span><span><br /></span><span> - A way for logged-in users to execute any shortcode.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the application password screen.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the footnotes block.<br /></span><span><br /></span><span> - A cache poisoning DoS vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to WordPress version 4.8.23 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114073">https://www.tenable.com/plugins/was/114073</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WordPress 4.7.x < 4.7.27 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114072</link>
            <guid>https://www.tenable.com/plugins/was/114072</guid>
            <pubDate>Wed, 25 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114072 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress 4.7.x < 4.7.27 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected WordPress application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A potential disclosure of user email addresses.<br /></span><span><br /></span><span> - An RCE POP Chains vulnerability.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the post link navigation block.<br /></span><span><br /></span><span> - An issue where comments on private posts could be leaked to other users.<br /></span><span><br /></span><span> - A way for logged-in users to execute any shortcode.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the application password screen.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the footnotes block.<br /></span><span><br /></span><span> - A cache poisoning DoS vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to WordPress version 4.7.27 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114072">https://www.tenable.com/plugins/was/114072</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WordPress 4.6.x < 4.6.27 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114071</link>
            <guid>https://www.tenable.com/plugins/was/114071</guid>
            <pubDate>Wed, 25 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114071 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress 4.6.x < 4.6.27 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected WordPress application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A potential disclosure of user email addresses.<br /></span><span><br /></span><span> - An RCE POP Chains vulnerability.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the post link navigation block.<br /></span><span><br /></span><span> - An issue where comments on private posts could be leaked to other users.<br /></span><span><br /></span><span> - A way for logged-in users to execute any shortcode.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the application password screen.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the footnotes block.<br /></span><span><br /></span><span> - A cache poisoning DoS vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to WordPress version 4.6.27 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114071">https://www.tenable.com/plugins/was/114071</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WordPress 4.5.x < 4.5.30 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114070</link>
            <guid>https://www.tenable.com/plugins/was/114070</guid>
            <pubDate>Wed, 25 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114070 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress 4.5.x < 4.5.30 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected WordPress application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A potential disclosure of user email addresses.<br /></span><span><br /></span><span> - An RCE POP Chains vulnerability.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the post link navigation block.<br /></span><span><br /></span><span> - An issue where comments on private posts could be leaked to other users.<br /></span><span><br /></span><span> - A way for logged-in users to execute any shortcode.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the application password screen.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the footnotes block.<br /></span><span><br /></span><span> - A cache poisoning DoS vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to WordPress version 4.5.30 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114070">https://www.tenable.com/plugins/was/114070</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WordPress 4.4.x < 4.4.31 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114069</link>
            <guid>https://www.tenable.com/plugins/was/114069</guid>
            <pubDate>Wed, 25 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114069 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress 4.4.x < 4.4.31 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected WordPress application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A potential disclosure of user email addresses.<br /></span><span><br /></span><span> - An RCE POP Chains vulnerability.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the post link navigation block.<br /></span><span><br /></span><span> - An issue where comments on private posts could be leaked to other users.<br /></span><span><br /></span><span> - A way for logged-in users to execute any shortcode.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the application password screen.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the footnotes block.<br /></span><span><br /></span><span> - A cache poisoning DoS vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to WordPress version 4.4.31 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114069">https://www.tenable.com/plugins/was/114069</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WordPress 4.3.x < 4.3.32 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114068</link>
            <guid>https://www.tenable.com/plugins/was/114068</guid>
            <pubDate>Wed, 25 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114068 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress 4.3.x < 4.3.32 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected WordPress application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A potential disclosure of user email addresses.<br /></span><span><br /></span><span> - An RCE POP Chains vulnerability.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the post link navigation block.<br /></span><span><br /></span><span> - An issue where comments on private posts could be leaked to other users.<br /></span><span><br /></span><span> - A way for logged-in users to execute any shortcode.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the application password screen.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the footnotes block.<br /></span><span><br /></span><span> - A cache poisoning DoS vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to WordPress version 4.3.32 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114068">https://www.tenable.com/plugins/was/114068</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WordPress 4.2.x < 4.2.36 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114067</link>
            <guid>https://www.tenable.com/plugins/was/114067</guid>
            <pubDate>Wed, 25 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114067 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress 4.2.x < 4.2.36 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected WordPress application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A potential disclosure of user email addresses.<br /></span><span><br /></span><span> - An RCE POP Chains vulnerability.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the post link navigation block.<br /></span><span><br /></span><span> - An issue where comments on private posts could be leaked to other users.<br /></span><span><br /></span><span> - A way for logged-in users to execute any shortcode.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the application password screen.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the footnotes block.<br /></span><span><br /></span><span> - A cache poisoning DoS vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to WordPress version 4.2.36 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114067">https://www.tenable.com/plugins/was/114067</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WordPress 4.1.x < 4.1.39 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/114066</link>
            <guid>https://www.tenable.com/plugins/was/114066</guid>
            <pubDate>Wed, 25 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114066 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress 4.1.x < 4.1.39 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected WordPress application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - A potential disclosure of user email addresses.<br /></span><span><br /></span><span> - An RCE POP Chains vulnerability.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the post link navigation block.<br /></span><span><br /></span><span> - An issue where comments on private posts could be leaked to other users.<br /></span><span><br /></span><span> - A way for logged-in users to execute any shortcode.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the application password screen.<br /></span><span><br /></span><span> - A Cross-Site Scripting (XSS) vulnerability in the footnotes block.<br /></span><span><br /></span><span> - A cache poisoning DoS vulnerability.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to WordPress version 4.1.39 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114066">https://www.tenable.com/plugins/was/114066</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Pimcore Administration Panel Login Form Detected]]></title>
            <link>https://www.tenable.com/plugins/was/114065</link>
            <guid>https://www.tenable.com/plugins/was/114065</guid>
            <pubDate>Wed, 25 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114065 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Pimcore Administration Panel Login Form Detected<br /></span>
      <h3>Description</h3>
      <span>Pimcore Administration Panel has been detected on the target web application.<br /></span><span><br /></span><span>This may present an attacker with an exploit vector which could be leveraged using other techniques, such as a Brute-Force or Dictionary Attack, allowing an attacker to gain access to administrative functionality.<br /></span>
      <h3>Solution</h3>
      <span>Restrict access to administrative functionality using a .htaccess file, limiting access to known and trusted IP Addresses.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114065">https://www.tenable.com/plugins/was/114065</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Drupal 8.7.x < 9.5.11 Cache Poisoning]]></title>
            <link>https://www.tenable.com/plugins/was/114049</link>
            <guid>https://www.tenable.com/plugins/was/114049</guid>
            <pubDate>Tue, 17 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114049 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Drupal 8.7.x < 9.5.11 Cache Poisoning<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the instance of Drupal running on the remote web server is 8.7.x prior to 9.5.11, 10.0.x prior to 10.0.11 or 10.1.x prior to 10.1.4. In certain scenarios, Drupal's JSON:API module will output error backtraces. With some configurations, this may cause sensitive information to be cached and made available to anonymous users, leading to privilege escalation.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Drupal version 9.5.11 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114049">https://www.tenable.com/plugins/was/114049</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Drupal 10.0.x < 10.0.11 Cache Poisoning]]></title>
            <link>https://www.tenable.com/plugins/was/114048</link>
            <guid>https://www.tenable.com/plugins/was/114048</guid>
            <pubDate>Tue, 17 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114048 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Drupal 10.0.x < 10.0.11 Cache Poisoning<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the instance of Drupal running on the remote web server is 8.7.x prior to 9.5.11, 10.0.x prior to 10.0.11 or 10.1.x prior to 10.1.4. In certain scenarios, Drupal's JSON:API module will output error backtraces. With some configurations, this may cause sensitive information to be cached and made available to anonymous users, leading to privilege escalation.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Drupal version 10.0.11 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114048">https://www.tenable.com/plugins/was/114048</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Drupal 10.1.x < 10.1.4 Cache Poisoning]]></title>
            <link>https://www.tenable.com/plugins/was/114047</link>
            <guid>https://www.tenable.com/plugins/was/114047</guid>
            <pubDate>Tue, 17 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114047 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Drupal 10.1.x < 10.1.4 Cache Poisoning<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the instance of Drupal running on the remote web server is 8.7.x prior to 9.5.11, 10.0.x prior to 10.0.11 or 10.1.x prior to 10.1.4. In certain scenarios, Drupal's JSON:API module will output error backtraces. With some configurations, this may cause sensitive information to be cached and made available to anonymous users, leading to privilege escalation.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Drupal version 10.1.4 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114047">https://www.tenable.com/plugins/was/114047</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[CraftCMS 4.x < 4.4.15 Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/114030</link>
            <guid>https://www.tenable.com/plugins/was/114030</guid>
            <pubDate>Thu, 05 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114030 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>CraftCMS 4.x < 4.4.15 Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>CraftCMS version 4.x prior to 4.4.15 is vulnerable to a Remote Code Execution (RCE) in the action endpoint.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to CraftCMS version 4.4.15 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114030">https://www.tenable.com/plugins/was/114030</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WP Data Access Plugin for WordPress < 5.3.8 Privilege Escalation]]></title>
            <link>https://www.tenable.com/plugins/was/114024</link>
            <guid>https://www.tenable.com/plugins/was/114024</guid>
            <pubDate>Thu, 05 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114024 with High Severity</p>
      <h3>Synopsis</h3>
      <span>WP Data Access Plugin for WordPress < 5.3.8 Privilege Escalation<br /></span>
      <h3>Description</h3>
      <span>The WordPress WP Data Access Plugin installed on the remote host is affected by a Privilege Escalation vulnerability that makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to modify their user role by supplying the wpda_role parameter during a profile update.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to  WP Data Access Plugin for WordPress 5.3.8 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114024">https://www.tenable.com/plugins/was/114024</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Adobe ColdFusion ComponentFilter Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/was/113903</link>
            <guid>https://www.tenable.com/plugins/was/113903</guid>
            <pubDate>Thu, 05 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113903 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Adobe ColdFusion ComponentFilter Remote Code Execution<br /></span>
      <h3>Description</h3>
      <span>Adobe ColdFusion versions 2021 below Update 6 and 2018 below Update 16 suffer from a deserialization vulnerability through the `JSONUtils.deserializeJSON` method on `_cfclient` requests. By leveraging this vulnerability, a remote unauthenticated attacker could achieve an arbitrary file read and a remote code execution on the target ColdFusion instance.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Adobe ColdFusion versions 2018 Update 16, 2021 Update 6 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113903">https://www.tenable.com/plugins/was/113903</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Adobe ColdFusion 2016 < 2016 Update 17 / 2018 < 2018 Update 11 / 2021 < 2021 Update 1 Cross-Site Scripting]]></title>
            <link>https://www.tenable.com/plugins/was/113116</link>
            <guid>https://www.tenable.com/plugins/was/113116</guid>
            <pubDate>Thu, 05 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113116 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Adobe ColdFusion 2016 < 2016 Update 17 / 2018 < 2018 Update 11 / 2021 < 2021 Update 1 Cross-Site Scripting<br /></span>
      <h3>Description</h3>
      <span>Adobe Coldfusion versions 2016 (update 16 and earlier), 2018 (update 10 and earlier) and 2021.0.0.323925 are affected by a Cross-site Scripting (XSS) vulnerability. An attacker could abuse this vulnerability to execute arbitrary JavaScript code in context of the current user.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Adobe ColdFusion 2016 update 17 / 2018 update 11 / 2021 update 1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113116">https://www.tenable.com/plugins/was/113116</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Adobe ColdFusion 11 < 11 Update 15 / 2016 < 2016 Update 7 / 2018 < 2018 Update 1 Arbitrary File Upload]]></title>
            <link>https://www.tenable.com/plugins/was/113115</link>
            <guid>https://www.tenable.com/plugins/was/113115</guid>
            <pubDate>Thu, 05 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113115 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Adobe ColdFusion 11 < 11 Update 15 / 2016 < 2016 Update 7 / 2018 < 2018 Update 1 Arbitrary File Upload<br /></span>
      <h3>Description</h3>
      <span>The version of Adobe ColdFusion running on the remote host is affected by an arbitrary file upload vulnerability. An unauthenticated attacker could leverage this vulnerability to gain access to the host in the context of the web application user.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Adobe ColdFusion version 11 update 15 / 2016 update 7 / 2018 update 1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113115">https://www.tenable.com/plugins/was/113115</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Jira 8.14.x < 8.15.0 Cookie Without Secure Flag]]></title>
            <link>https://www.tenable.com/plugins/was/112826</link>
            <guid>https://www.tenable.com/plugins/was/112826</guid>
            <pubDate>Thu, 05 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112826 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Jira 8.14.x < 8.15.0 Cookie Without Secure Flag<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the instance of Atlassian Jira hosted on the remote web server is prior to 8.5.12, 8.6.x < 8.13.4 or 8.14.x < 8.15.0. It is, therefore, affected by a missing cookie secure flag vulnerability in jira.editor.user.mode cookie when Jira is configured with https.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Jira version 8.15.0 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112826">https://www.tenable.com/plugins/was/112826</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Jira 8.6.x < 8.13.4 Cookie Without Secure Flag]]></title>
            <link>https://www.tenable.com/plugins/was/112825</link>
            <guid>https://www.tenable.com/plugins/was/112825</guid>
            <pubDate>Thu, 05 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112825 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Jira 8.6.x < 8.13.4 Cookie Without Secure Flag<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the instance of Atlassian Jira hosted on the remote web server is prior to 8.5.12, 8.6.x < 8.13.4 or 8.14.x < 8.15.0. It is, therefore, affected by a missing cookie secure flag vulnerability in jira.editor.user.mode cookie when Jira is configured with https.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Jira version 8.13.4 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112825">https://www.tenable.com/plugins/was/112825</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Jira < 8.5.12 Cookie Without Secure Flag]]></title>
            <link>https://www.tenable.com/plugins/was/112824</link>
            <guid>https://www.tenable.com/plugins/was/112824</guid>
            <pubDate>Thu, 05 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 112824 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Jira < 8.5.12 Cookie Without Secure Flag<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the instance of Atlassian Jira hosted on the remote web server is prior to 8.5.12, 8.6.x < 8.13.4 or 8.14.x < 8.15.0. It is, therefore, affected by a missing cookie secure flag vulnerability in jira.editor.user.mode cookie when Jira is configured with https.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Jira version 8.5.12 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/112824">https://www.tenable.com/plugins/was/112824</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Atlassian Confluence 7.13.15 < 7.13.19 Tomcat Dependancy Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/was/114044</link>
            <guid>https://www.tenable.com/plugins/was/114044</guid>
            <pubDate>Wed, 27 Sep 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 114044 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Atlassian Confluence 7.13.15 < 7.13.19 Tomcat Dependancy Vulnerability<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the Atlassian Confluence application running on the remote host is 7.13.15 prior to 7.13.19, 7.19.7 prior to 7.19.11 or 8.1.1 prior to 8.4.1. It is, therefore, affected by a vulnerability in the bundled Apache Tomcat. If non-default HTTP connector settings are used and maxParameterCount can be reached using query string parameters, attackers may bypass upload limits leading to a Denial of Service (DoS) attack.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Atlassian Confluence version 7.13.19 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/114044">https://www.tenable.com/plugins/was/114044</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Web Toolkit Detected]]></title>
            <link>https://www.tenable.com/plugins/was/113247</link>
            <guid>https://www.tenable.com/plugins/was/113247</guid>
            <pubDate>Tue, 26 Sep 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 113247 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Google Web Toolkit Detected<br /></span>
      <h3>Description</h3>
      <span>This is an informational notice that the scanner was able to detect an application using Google Web Toolkit.<br /></span>
      <h3>Solution</h3>
      <span><br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/113247">https://www.tenable.com/plugins/was/113247</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WordPress 5.3.x < 5.3.1 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/98885</link>
            <guid>https://www.tenable.com/plugins/was/98885</guid>
            <pubDate>Thu, 21 Sep 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98885 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress 5.3.x < 5.3.1 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected WordPress application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - Two cross-site scripting (XSS) vulnerabilities exist due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit these, by convincing a user to click a specially crafted URL, to execute arbitrary script code in a user's browser session.<br /></span><span><br /></span><span> - A remote, authenticated, unprivileged user can make a post sticky via the REST API.<br /></span><span><br /></span><span> - wp_kses_bad_protcol() has been hardened to ensure that it is aware of the named colon attribute.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to WordPress version 5.3.1 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98885">https://www.tenable.com/plugins/was/98885</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WordPress 5.2.x < 5.2.5 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/98799</link>
            <guid>https://www.tenable.com/plugins/was/98799</guid>
            <pubDate>Thu, 21 Sep 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98799 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress 5.2.x < 5.2.5 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected WordPress application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - Two cross-site scripting (XSS) vulnerabilities exist due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit these, by convincing a user to click a specially crafted URL, to execute arbitrary script code in a user's browser session.<br /></span><span><br /></span><span> - A remote, authenticated, unprivileged user can make a post sticky via the REST API.<br /></span><span><br /></span><span> - wp_kses_bad_protcol() has been hardened to ensure that it is aware of the named colon attribute.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to WordPress version 5.2.5 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98799">https://www.tenable.com/plugins/was/98799</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WordPress 5.1.x < 5.1.4 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/98798</link>
            <guid>https://www.tenable.com/plugins/was/98798</guid>
            <pubDate>Thu, 21 Sep 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98798 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress 5.1.x < 5.1.4 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected WordPress application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - Two cross-site scripting (XSS) vulnerabilities exist due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit these, by convincing a user to click a specially crafted URL, to execute arbitrary script code in a user's browser session.<br /></span><span><br /></span><span> - A remote, authenticated, unprivileged user can make a post sticky via the REST API.<br /></span><span><br /></span><span> - wp_kses_bad_protcol() has been hardened to ensure that it is aware of the named colon attribute.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to WordPress version 5.1.4 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98798">https://www.tenable.com/plugins/was/98798</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WordPress 5.0.x < 5.0.8 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/98797</link>
            <guid>https://www.tenable.com/plugins/was/98797</guid>
            <pubDate>Thu, 21 Sep 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98797 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress 5.0.x < 5.0.8 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected WordPress application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - Two cross-site scripting (XSS) vulnerabilities exist due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit these, by convincing a user to click a specially crafted URL, to execute arbitrary script code in a user's browser session.<br /></span><span><br /></span><span> - A remote, authenticated, unprivileged user can make a post sticky via the REST API.<br /></span><span><br /></span><span> - wp_kses_bad_protcol() has been hardened to ensure that it is aware of the named colon attribute.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to WordPress version 5.0.8 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98797">https://www.tenable.com/plugins/was/98797</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WordPress 4.9.x < 4.9.13 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/98796</link>
            <guid>https://www.tenable.com/plugins/was/98796</guid>
            <pubDate>Thu, 21 Sep 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98796 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress 4.9.x < 4.9.13 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected WordPress application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - Two cross-site scripting (XSS) vulnerabilities exist due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit these, by convincing a user to click a specially crafted URL, to execute arbitrary script code in a user's browser session.<br /></span><span><br /></span><span> - A remote, authenticated, unprivileged user can make a post sticky via the REST API.<br /></span><span><br /></span><span> - wp_kses_bad_protcol() has been hardened to ensure that it is aware of the named colon attribute.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to WordPress version 4.9.13 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98796">https://www.tenable.com/plugins/was/98796</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WordPress 4.8.x < 4.8.12 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/98795</link>
            <guid>https://www.tenable.com/plugins/was/98795</guid>
            <pubDate>Thu, 21 Sep 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98795 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress 4.8.x < 4.8.12 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected WordPress application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - Two cross-site scripting (XSS) vulnerabilities exist due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit these, by convincing a user to click a specially crafted URL, to execute arbitrary script code in a user's browser session.<br /></span><span><br /></span><span> - A remote, authenticated, unprivileged user can make a post sticky via the REST API.<br /></span><span><br /></span><span> - wp_kses_bad_protcol() has been hardened to ensure that it is aware of the named colon attribute.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to WordPress version 4.8.12 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98795">https://www.tenable.com/plugins/was/98795</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WordPress 4.7.x < 4.7.16 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/98794</link>
            <guid>https://www.tenable.com/plugins/was/98794</guid>
            <pubDate>Thu, 21 Sep 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98794 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress 4.7.x < 4.7.16 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected WordPress application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - Two cross-site scripting (XSS) vulnerabilities exist due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit these, by convincing a user to click a specially crafted URL, to execute arbitrary script code in a user's browser session.<br /></span><span><br /></span><span> - A remote, authenticated, unprivileged user can make a post sticky via the REST API.<br /></span><span><br /></span><span> - wp_kses_bad_protcol() has been hardened to ensure that it is aware of the named colon attribute.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to WordPress version 4.7.16 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98794">https://www.tenable.com/plugins/was/98794</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WordPress 4.6.x < 4.6.17 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/98793</link>
            <guid>https://www.tenable.com/plugins/was/98793</guid>
            <pubDate>Thu, 21 Sep 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98793 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress 4.6.x < 4.6.17 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected WordPress application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - Two cross-site scripting (XSS) vulnerabilities exist due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit these, by convincing a user to click a specially crafted URL, to execute arbitrary script code in a user's browser session.<br /></span><span><br /></span><span> - A remote, authenticated, unprivileged user can make a post sticky via the REST API.<br /></span><span><br /></span><span> - wp_kses_bad_protcol() has been hardened to ensure that it is aware of the named colon attribute.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to WordPress version 4.6.17 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98793">https://www.tenable.com/plugins/was/98793</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WordPress 4.5.x < 4.5.20 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/98792</link>
            <guid>https://www.tenable.com/plugins/was/98792</guid>
            <pubDate>Thu, 21 Sep 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98792 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress 4.5.x < 4.5.20 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected WordPress application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - Two cross-site scripting (XSS) vulnerabilities exist due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit these, by convincing a user to click a specially crafted URL, to execute arbitrary script code in a user's browser session.<br /></span><span><br /></span><span> - A remote, authenticated, unprivileged user can make a post sticky via the REST API.<br /></span><span><br /></span><span> - wp_kses_bad_protcol() has been hardened to ensure that it is aware of the named colon attribute.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to WordPress version 4.5.20 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98792">https://www.tenable.com/plugins/was/98792</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WordPress 4.4.x < 4.4.21 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/was/98791</link>
            <guid>https://www.tenable.com/plugins/was/98791</guid>
            <pubDate>Thu, 21 Sep 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Web App Scanning Plugin ID 98791 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>WordPress 4.4.x < 4.4.21 Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version number, the detected WordPress application is affected by multiple vulnerabilities :<br /></span><span><br /></span><span> - Two cross-site scripting (XSS) vulnerabilities exist due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit these, by convincing a user to click a specially crafted URL, to execute arbitrary script code in a user's browser session.<br /></span><span><br /></span><span> - A remote, authenticated, unprivileged user can make a post sticky via the REST API.<br /></span><span><br /></span><span> - wp_kses_bad_protcol() has been hardened to ensure that it is aware of the named colon attribute.<br /></span><span><br /></span><span>Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to WordPress version 4.4.21 or latest.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/was/98791">https://www.tenable.com/plugins/was/98791</a></p>
    ]]></description>
        </item>
    </channel>
</rss>