Document Title:
===
Zenario v7.6 - (Delete) Persistent Cross Site Vulnerability
References (Source):
https://www.vulnerability-lab.com/get_content.php?id=2042
Release Date:
=
2017-03-20
Vulnerability Laboratory ID (VL-ID):
=
Document Title:
===
Zenario v7.6 - Persistent Cross Site Scripting Vulnerability
References (Source):
https://www.vulnerability-lab.com/get_content.php?id=2044
https://github.com/TribalSystems/Zenario/commit/cd60f1c8a179ebb779fe0acc051b93f477129b1a
Release Date
Document Title:
===
Arachni v1.5-0.5.11 - Persistent Cross Site Vulnerability
References (Source):
https://www.vulnerability-lab.com/get_content.php?id=2046
Release Date:
=
2017-03-29
Vulnerability Laboratory ID (VL-ID):
===
Document Title:
===
Super File Explorer 1.0.1 - Arbitrary File Upload Vulnerability
References (Source):
https://www.vulnerability-lab.com/get_content.php?id=2034
Release Date:
=
2017-02-23
Vulnerability Laboratory ID (VL-ID):
=
Document Title:
===
Joomla com_tag v1.7.6 - (tag) SQL Injection Vulnerability
References (Source):
https://www.vulnerability-lab.com/get_content.php?id=2061
IEDB: http://iedb.ir/exploits-7454.html
Release Date:
=
2017-05-02
Vulnerability Laborator
Document Title:
===
Hola VPN v1.34 - Privilege Escalation Vulnerability
References (Source):
https://www.vulnerability-lab.com/get_content.php?id=2062
Release Date:
=
2017-05-03
Vulnerability Laboratory ID (VL-ID):
=
Credits
===
Zhao Liang, Huawei Weiran Labs
Vendor:
===
Blue River Interactive Group
Product:
Mura CMS
Mura CMS is built with one focused purpose in mind - to make it easier and
faster for people to build and maintain even the most ambitious web
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-3843-1 secur...@debian.org
https://www.debian.org/security/ Sebastien Delafond
May 03, 2017
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-3842-1 secur...@debian.org
https://www.debian.org/security/ Sebastien Delafond
May 03, 2017
MODX Revolution 2.0.1-pl - 2.5.6-pl blind SQLi
##
Information
===
Name: MODX Revolution 2.0.1 - 2.5.6 (based on git commit)
Software: MODX CMS
Homepage: https://modx.com
Vulnerability: blind SQL injection
Prerequisites: attack
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03741en_us
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: hpesbhf03741en_us
Version: 1
HPESBHF03
11 matches
Mail list logo