Vulnerability description not...Read More ...
Continue ReadingAugust 12, 2025
The image upload endpoint in the Lichess application did not properly validate the 'rel' parameter, allowing an attacker to inject special characters that broke the expected format of the ge ...
Continue ReadingAugust 12, 2025
Vulnerability description not...Read More ...
Continue ReadingAugust 12, 2025
A stored cross-site scripting (XSS) vulnerability was discovered in the MainWP WordPress plugin. The vulnerability was found in the "Add Contact" > Contact Name field, where u ...
Continue ReadingAugust 12, 2025
A CSRF vulnerability was found in the network feature, where an attacker could change the Network Routing settings by sending a CSRF script to the...Read More ...
Continue ReadingAugust 12, 2025
The SCIM provisioning feature in HackerOne's sandbox program was vulnerable to account takeover. An attacker could create a user with an email they controlled, import existing users, assign the v ...
Continue ReadingAugust 12, 2025
Vulnerability description not...Read More ...
Continue ReadingAugust 12, 2025
The function curl_ws_send() in libcurl contains an infinite loop that can be triggered by a malicious server under specific circumstances. The loop is caused by a condition in the code that is not pro ...
Continue ReadingAugust 12, 2025
Back to Main