010-68421378
sales@cogitosoft.com
1、Please give a brief description of your problem
2、Please fill in the verification code
You submit the question, the system will be audited by our customer service staff for you to propose solutions.

How to view the detailed Acunetix WVS software vulnerability report?

Please refer to the "Recommendations section" for each vulnerability.

This section provides a detailed solution for modifying vulnerabilities.

Host header attack ---- web application should use SERVER_NAME instead of Host header.

It creates a virtual host that captures all requests with unidentified Host headers.

This can also be done in Nginx by specifying SERVER_NAME without wildcarding and using serverName without wildcards in Apache, and opening the UseCanonicalName directive.

You can view more information on how to avoid vulnerabilities through the "Slow HTTP Denial of Service Attack".

With HTML form without CSRF protection, you can see if this form requires CSRF protection and whether you need to implement CSRF policies if necessary.

© Copyright 2000-2023  COGITO SOFTWARE CO.,LTD. All rights reserved