Advanced Search
Search Results
395 total results found
Web application vulnerabilities
Strict-Transport-Security Header Not Set
Missing Anti-clickjacking Header
X-Content-Type-Options Header Missing
Absence of Anti-CSRF Tokens
Apache 2.4.x < 2.4.58 Multiple Vulnerabilities
Application Error Disclosure
Big Redirect Detected (Potential Sensitive Information Leak)
Browsable Web Directories
Content Security Policy (CSP) Header Not Set
Cookie with SameSite Attribute None
Cross-Domain JavaScript Source File Inclusion
Cross Site Scripting (DOM Based)
Cross Site Scripting (Reflected)
HSTS Missing From HTTPS Server (RFC 6797)
.htaccess Information Leak
ICMP Timestamp Request Remote Date Disclosure
Information Disclosure - Debug Error Messages
MTA Open Mail Relaying Allowed
NAT-PMP Detection (remote network)
OpenSSH < 9.3 Multiple Vulnerabilities
Microsoft IIS webserver
Nginx webserver
Apache webserver
Microsoft IIS webserver
Nginx webserver
Apache webserver
Microsoft IIS webserver
Nginx webserver
Apache webserver
Plesk
Drupal
WordPress
Joomla
Plesk
WordPress
Joomla
Drupal
Plesk
WordPress
Joomla
Remediation Steps
Follow the steps below to remediate this finding on Microsoft IIS webserver. Start the application named: IIS Manager.Select your websiteOn the right part of the screen, access the option named: HTTP Response Headers.On the top right part of the screen, click ...
Remediation Steps
Follow the steps below to remediate this finding on Nginx webserver. In your nginx.conf file add:add-header Strict-Transport-Security "max-age=31536000; includeSubDomains; preload";
Remediation Steps
Follow the steps below to remediate this finding on Apache webserver. Make sure that the headers module is loaded:sudo a2enmod headersAdd the following code to the apache2.conf file:<IfModule mod_headers.c> Header always set Strict-Transport-Security "m...
Remediation Steps
Follow the steps below to remediate this finding on Microsoft IIS webserver. Start the application named: IIS Manager.Select your websiteOn the right part of the screen, access the option named: HTTP Response Headers.On the top right part of the screen, click ...
Remediation Steps
Follow the steps below to remediate this finding on Nginx webserver. In your nginx.conf file add:add-header X-Frame-Options "SAMEORIGIN";
Remediation Steps
Follow the steps below to remediate this finding on Apache webserver. Make sure that the headers module is loaded:sudo a2enmod headersAdd the following code to the apache2.conf file:<IfModule mod_headers.c> Header always set X-Frame-Options "SAMEORIGIN"...
Remediation Steps
Follow the steps below to remediate this finding on Microsoft IIS webserver. Start the application named: IIS Manager.Select your websiteOn the right part of the screen, access the option named: HTTP Response Headers.On the top right part of the screen, click ...
Remediation Steps
Follow the steps below to remediate this finding on Nginx webserver. In your nginx.conf file add:add-header X-Content-Type-Options "nosniff";
Remediation Steps
Follow the steps below to remediate this finding on Apache webserver. Make sure that the headers module is loaded:sudo a2enmod headersAdd the following code to the apache2.conf file:<IfModule mod_headers.c> Header always set X-Content-Type-Options "nosn...
Remediation Steps
Follow the steps below to remediate this finding on Plesk. Log in to the Plesk control panel.Navigate to Domains > your domain > Apache & nginx Settings.Under "Additional nginx directives", add:add_header Strict-Transport-Security "max-age=31536000; includeSub...
Remediation Steps
Follow the steps below to remediate this finding on Drupal. Install and enable the Security Kit (SecKit) module:composer require drupal/seckit drush en seckitNavigate to Admin > Configuration > System > Security Kit.Under the "HTTP Strict Transport Security" s...
Remediation Steps
Follow the steps below to remediate this finding on WordPress. Add the following to your theme's functions.php file or a custom plugin:add_action('send_headers', function() { header('Strict-Transport-Security: max-age=31536000; includeSubDomains; preload'); })...
Remediation Steps
Follow the steps below to remediate this finding on Joomla. Edit the .htaccess file in the Joomla root directory and add:<IfModule mod_headers.c> Header always set Strict-Transport-Security "max-age=31536000; includeSubDomains; preload" </IfModule>Alternativel...
Remediation Steps
Follow the steps below to remediate this finding on Plesk. Log in to the Plesk control panel.Navigate to Domains > your domain > Apache & nginx Settings.Under "Additional nginx directives", add:add_header X-Frame-Options "SAMEORIGIN" always;Alternatively, unde...
Remediation Steps
Follow the steps below to remediate this finding on WordPress. Add the following to your theme's functions.php file or a custom plugin:add_action('send_headers', function() { header('X-Frame-Options: SAMEORIGIN'); });Alternatively, if using Apache, add to the ...
Remediation Steps
Follow the steps below to remediate this finding on Joomla. Edit the .htaccess file in the Joomla root directory and add:<IfModule mod_headers.c> Header always set X-Frame-Options "SAMEORIGIN" </IfModule>Alternatively, install the SecurityHeaders extension fro...
Remediation Steps
Follow the steps below to remediate this finding on Drupal. Install and enable the Security Kit (SecKit) module:composer require drupal/seckit drush en seckitNavigate to Admin > Configuration > System > Security Kit.Under the "Clickjacking" section, enable X-F...
Remediation Steps
Follow the steps below to remediate this finding on Plesk. Log in to the Plesk control panel.Navigate to Domains > your domain > Apache & nginx Settings.Under "Additional nginx directives", add:add_header X-Content-Type-Options "nosniff" always;Alternatively, ...
Remediation Steps
Follow the steps below to remediate this finding on WordPress. Add the following to your theme's functions.php file or a custom plugin:add_action('send_headers', function() { header('X-Content-Type-Options: nosniff'); });Alternatively, if using Apache, add to ...
Remediation Steps
Follow the steps below to remediate this finding on Joomla. Edit the .htaccess file in the Joomla root directory and add:<IfModule mod_headers.c> Header always set X-Content-Type-Options "nosniff" </IfModule>Alternatively, install the SecurityHeaders extension...