![]() ![]() The exploit has been disclosed to the public and may be used. The manipulation of the argument acc_name with the input Johnnie Reyes'"()&%alert(5646) leads to cross site scripting. This issue affects some unknown processing of the file pages_view_client.php. VDB-243138 is the identifier assigned to this vulnerability.Ī vulnerability, which was classified as problematic, has been found in CodeAstro Internet Banking System 1.0. ![]() The manipulation of the argument GWLinkId leads to sql injection. Affected is an unknown function of the file /protocol/iscgwtunnel/uploadiscgwrouteconf.php. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.Ī vulnerability, which was classified as critical, was found in Netentsec NS-ASG Application Security Gateway 6.3. The associated identifier of this vulnerability is VDB-243139. The manipulation with the input Click here leads to cross site scripting. Affected by this vulnerability is an unknown functionality of the component Markdown File Handler. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.Ī vulnerability has been found in vnotex vnote up to 3.17.0 and classified as problematic. The identifier of this vulnerability is VDB-243140. ![]() The manipulation leads to direct request. Affected by this issue is some unknown functionality of the file /cgi-bin/. A vulnerability was found in Viessmann Vitogate 300 up to 2.1.3.0 and classified as problematic. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |