Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

395 total results found

Generic / Developer guidance

Cross Site Scripting (DOM Based)

WordPress

Cross Site Scripting (DOM Based)

Joomla

Cross Site Scripting (DOM Based)

Drupal

Cross Site Scripting (DOM Based)

Generic / Developer guidance

Cross Site Scripting (Reflected)

WordPress

Cross Site Scripting (Reflected)

Joomla

Cross Site Scripting (Reflected)

Drupal

Cross Site Scripting (Reflected)

Microsoft IIS webserver

HSTS Missing From HTTPS Server (RFC 6797)

Nginx webserver

HSTS Missing From HTTPS Server (RFC 6797)

Apache webserver

HSTS Missing From HTTPS Server (RFC 6797)

Plesk

HSTS Missing From HTTPS Server (RFC 6797)

WordPress

HSTS Missing From HTTPS Server (RFC 6797)

Joomla

HSTS Missing From HTTPS Server (RFC 6797)

Drupal

HSTS Missing From HTTPS Server (RFC 6797)

Apache webserver

.htaccess Information Leak

Nginx webserver

.htaccess Information Leak

Plesk

.htaccess Information Leak

Linux (Debian/Ubuntu)

ICMP Timestamp Request Remote Date Disc...

Linux (RHEL/CentOS/AlmaLinux)

ICMP Timestamp Request Remote Date Disc...

Remediation Steps

Cross Site Scripting (DOM Based) Generic / Developer guidance

Follow the steps below to remediate this finding on Generic / Developer guidance. DOM-based XSS occurs when JavaScript reads untrusted data (URL fragments, query strings, localStorage) and writes it to the DOM without sanitisation.Remediation steps:Never pass ...

Remediation Steps

Cross Site Scripting (DOM Based) WordPress

Follow the steps below to remediate this finding on WordPress. Audit custom JavaScript files in your theme and plugins for unsafe DOM writes.Use wp_localize_script() to safely pass server-side data to scripts instead of embedding raw data in HTML.Escape values...

Remediation Steps

Cross Site Scripting (DOM Based) Joomla

Follow the steps below to remediate this finding on Joomla. Review template JavaScript files and Joomla component JS for unsafe DOM manipulation.Use JUri to construct URLs safely server-side rather than building them from raw user input in JavaScript.Sanitise ...

Remediation Steps

Cross Site Scripting (DOM Based) Drupal

Follow the steps below to remediate this finding on Drupal. Audit custom module JavaScript files for unsafe DOM writes.Use Drupal.behaviors to attach JS safely.Pass server-side data to JavaScript via drupalSettings (set in PHP with #attached['drupalSettings'])...

Remediation Steps

Cross Site Scripting (Reflected) Generic / Developer guidance

Follow the steps below to remediate this finding on Generic / Developer guidance. Reflected XSS occurs when user-supplied input is echoed back in the HTTP response without proper encoding.Remediation steps:Validate all input against an allowlist of expected ch...

Remediation Steps

Cross Site Scripting (Reflected) WordPress

Follow the steps below to remediate this finding on WordPress. Use WordPress escaping functions before outputting any dynamic data:esc_html() — for HTML contentesc_attr() — for HTML attributesesc_url() — for URLsesc_js() — for inline JavaScriptwp_kses() / wp_k...

Remediation Steps

Cross Site Scripting (Reflected) Joomla

Follow the steps below to remediate this finding on Joomla. Use Joomla's JFilterInput or InputFilter to sanitise input:$input = JFactory::getApplication()->input; $value = $input->get('param', '', 'STRING');For output, use JText::_() for translated strings and...

Remediation Steps

Cross Site Scripting (Reflected) Drupal

Follow the steps below to remediate this finding on Drupal. Use Drupal's input sanitisation and output escaping functions:\Drupal\Component\Utility\Html::escape($string) — HTML context\Drupal\Component\Utility\UrlHelper::filterQueryParameters() — URL contextUs...

Remediation Steps

HSTS Missing From HTTPS Server (RFC 6797) Microsoft IIS webserver

Follow the steps below to remediate this finding on Microsoft IIS webserver. Open IIS Manager.Select your website.Double-click HTTP Response Headers.Click Add in the Actions pane and enter:NAME: Strict-Transport-SecurityVALUE: max-age=31536000; includeSubDomai...

Remediation Steps

HSTS Missing From HTTPS Server (RFC 6797) Nginx webserver

Follow the steps below to remediate this finding on Nginx webserver. In your nginx.conf server block (HTTPS only), add:add_header Strict-Transport-Security "max-age=31536000; includeSubDomains; preload" always;Reload Nginx:sudo systemctl reload nginx

Remediation Steps

HSTS Missing From HTTPS Server (RFC 6797) Apache webserver

Follow the steps below to remediate this finding on Apache webserver. Ensure mod_headers is enabled:sudo a2enmod headersAdd to your HTTPS VirtualHost or apache2.conf:Header always set Strict-Transport-Security "max-age=31536000; includeSubDomains; preload"Relo...

Remediation Steps

HSTS Missing From HTTPS Server (RFC 6797) Plesk

Follow the steps below to remediate this finding on Plesk. Log in to the Plesk control panel.Navigate to Domains > your domain > Apache & nginx Settings.Under "Additional nginx directives", add:add_header Strict-Transport-Security "max-age=31536000; includeSub...

Remediation Steps

HSTS Missing From HTTPS Server (RFC 6797) WordPress

Follow the steps below to remediate this finding on WordPress. Add the following to your theme's functions.php:add_action('send_headers', function() { header('Strict-Transport-Security: max-age=31536000; includeSubDomains; preload'); });Alternatively, if using...

Remediation Steps

HSTS Missing From HTTPS Server (RFC 6797) Joomla

Follow the steps below to remediate this finding on Joomla. Edit the .htaccess file in the Joomla root directory and add:<IfModule mod_headers.c> Header always set Strict-Transport-Security "max-age=31536000; includeSubDomains; preload" </IfModule>Alternativel...

Remediation Steps

HSTS Missing From HTTPS Server (RFC 6797) Drupal

Follow the steps below to remediate this finding on Drupal. Install and enable the Security Kit (SecKit) module:composer require drupal/seckit drush en seckitNavigate to Admin > Configuration > System > Security Kit.Under the "HTTP Strict Transport Security" s...

Remediation Steps

.htaccess Information Leak Apache webserver

Follow the steps below to remediate this finding on Apache webserver. Prevent direct access to .htaccess files by adding the following to your main Apache configuration (apache2.conf or httpd.conf):<Files ".ht*"> Require all denied </Files>This blocks access t...

Remediation Steps

.htaccess Information Leak Nginx webserver

Follow the steps below to remediate this finding on Nginx webserver. Nginx does not use .htaccess files. If .htaccess files exist on the server, deny access in your server block:location ~ /\.ht {deny all;}Reload Nginx:sudo systemctl reload nginx

Remediation Steps

.htaccess Information Leak Plesk

Follow the steps below to remediate this finding on Plesk. Log in to the Plesk control panel.Navigate to Domains > your domain > Apache & nginx Settings.Under "Additional Apache directives", add:<Files ".ht*"> Require all denied </Files>Click Apply.

Remediation Steps

ICMP Timestamp Request Remote Date Disc... Linux (Debian/Ubuntu)

Follow the steps below to remediate this finding on Linux (Debian/Ubuntu). Block ICMP timestamp requests using iptables or nftables.With iptables:sudo iptables -A INPUT -p icmp --icmp-type timestamp-request -j DROP sudo iptables -A OUTPUT -p icmp --icmp-type t...

Remediation Steps

ICMP Timestamp Request Remote Date Disc... Linux (RHEL/CentOS/AlmaLinux)

Follow the steps below to remediate this finding on Linux (RHEL/CentOS/AlmaLinux). Block ICMP timestamp requests using firewalld or iptables.With firewalld:sudo firewall-cmd --permanent --add-rich-rule='rule protocol value="icmp" icmp-type name="timestamp-requ...