Post ContentRead More ...
Continue ReadingMarch 28, 2023
Post ContentRead More ...
Continue ReadingMarch 28, 2023
An high privileged attacker may pass crafted arguments to the validate function of csaf-validator-lib of a locally installed Secvisogram in versions Read More ...
Continue ReadingMarch 27, 2023
The validate JSON endpoint of the Secvisogram csaf-validator-service in versions Read More ...
Continue ReadingMarch 27, 2023
HGiga MailSherlockââ¬â¢s specific function has insufficient filtering for user input. An unauthenticated remote attacker can exploit this vulnerability to inject JavaScript, conducting a re ...
Continue ReadingMarch 27, 2023
HGiga MailSherlock has vulnerability of insufficient access control. An unauthenticated remote user can exploit this vulnerability to access partial content of another userââ¬â¢s mail by ch ...
Continue ReadingMarch 27, 2023
WisdomGarden Tronclass has improper access control when uploading file. An authenticated remote attacker with general user privilege can exploit this vulnerability to access files belonging to other u ...
Continue ReadingMarch 27, 2023
RIFARTEK IOT Wall transportation function has insufficient filtering for user input. An authenticated remote attacker with general user privilege can inject JavaScript to perform reflected XSS (Reflec ...
Continue ReadingMarch 27, 2023
Openfind Mail2000 file uploading function has insufficient filtering for user input. An authenticated remote attacker with general user privilege can exploit this vulnerability to inject JavaScript, c ...
Continue ReadingMarch 27, 2023
github.com/mattermost/mattermost-server is vulnerable to Cross-Site Scripting (XSS) attacks. An attacker is able to send AJAX requests on behalf of the victim through OAuth flow completion endpoints v ...
Continue ReadingMarch 27, 2023
# CVE-2023-23752 Joomla Unauthorized Access Vulnerability (CVE-2...Read More ...
Continue ReadingMarch 25, 2023