Vulnerability description not...Read More ...
Continue ReadingAugust 12, 2025
Vulnerability description not...Read More ...
Continue ReadingAugust 12, 2025
A CSRF vulnerability was found in the network feature, where an attacker could change the Network Routing settings by sending a CSRF script to the...Read More ...
Continue ReadingAugust 12, 2025
The WakaTime OAuth authorization flow was vulnerable to a double-clickjacking attack. The attack allowed an attacker to trick users into unknowingly clicking the "Connect my WakaTime account& ...
Continue ReadingAugust 12, 2025
Vulnerability description not...Read More ...
Continue ReadingAugust 12, 2025
A SQL injection vulnerability was found in the WooCommerce plugin version 9.9.3. The vulnerable parameter was 'coupon_codes' in the '/wp-admin/admin.php?page=wc-reports&tab=orde ...
Continue ReadingAugust 12, 2025
Vulnerability description not...Read More ...
Continue ReadingAugust 12, 2025
The function curl_ws_send() in libcurl contains an infinite loop that can be triggered by a malicious server under specific circumstances. The loop is caused by a condition in the code that is not pro ...
Continue ReadingAugust 12, 2025
Back to Main