The associated identifier of this vulnerability is VDB-250435.Ī vulnerability, which was classified as problematic, has been found in Chanzhaoyu chatgpt-web 2.11.1. The exploit has been disclosed to the public and may be used. The manipulation leads to improper access controls. Affected by this vulnerability is an unknown functionality of the file application/home/controller/TaobaoExport.php of the component Image URL Handler. The identifier VDB-250573 was assigned to this vulnerability.Ī vulnerability classified as critical was found in DeShang DSMall up to 6.1.0. The manipulation of the argument image leads to unrestricted upload. Affected by this vulnerability is an unknown functionality of the file /admin/action/new-father.php. The associated identifier of this vulnerability is VDB-251375.Ī vulnerability has been found in code-projects Fighting Cock Information System 1.0 and classified as critical. The manipulation of the argument url leads to server-side request forgery. This issue affects the function download_network_image of the file /app/Http/Controllers/ImageController.php of the component Search. CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).Ī vulnerability was found in ZhiHuiYun up to 4.4.13 and classified as critical. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Outside In Technology accessible data as well as unauthorized read access to a subset of Oracle Outside In Technology accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Outside In Technology. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Outside In Technology. The supported version that is affected is 8.5.6. Vulnerability in the Oracle Outside In Technology product of Oracle Fusion Middleware (component: Content Access SDK, Image Export SDK, PDF Export SDK, HTML Export SDK). A remote and unauthenticated attacker could introduce crafted image or link URLs that would result in the execution of arbitrary JavaScript in an editing user's browser. TinyMCE versions before 5.10.0 are affected by a cross-site scripting vulnerability.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |