ty is estimated as medium.
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Ateeq ur Rehman Khan
(at...@evolution-sec.com) (www.vulnerability-lab.com)
Disclaimer & Information:
=
The information provided in this advisory is provided as it is
tory [Research Team] - Benjamin Kunz Mejri
(b...@vulnerability-lab.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or im
man Khan -
Vulnerability Lab)
2013-11-04: Vendor Notification (Yahoo! Security Team - Bug Bounty Program)
2014-01-09: Vendor Response/Feedback (Yahoo! Security Team - Bug Bounty
Program)
2014-06-22: Vendor Fix/Patch (Yahoo! Developer Team - HackerOne Reward:
1000$)
2014-07-06: Public Di
include web vulnerability in the filename
value is estimated as high.
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=====
The information pro
of the persistent exception-handling web vulnerability is
estimated as high(-).
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Ateeq ur Rehman Khan
(at...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=====
Document Title:
===
Yahoo! Bug Bounty #30 YM - Application-Side Mail Encoding (File Attachment)
Vulnerability
References (Source):
http://www.vulnerability-lab.com/get_content.php?id=1137
Release Date:
=
2014-07-08
Vulnerability Laboratory ID (VL-
sk of the application-side input validation web vulnerability is
estimated as medium.
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
..@evolution-sec.com] (@OhTheITGuy) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including the warrantie
.vulnerability-lab.com)
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including the warranties of merchantability an
e: Advanced >Firmware Updates Page
http://www.barracuda.com/kb?id=50160013m4O
Security Risk:
==
The security risk of the persistent input validation web vulnerabilities and
estimated as medium(+).
Credits & Authors:
==
Vulnerability Laboratory [Research Tea
bility-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties,
either expressed or implied, including the warranties of merchantability and
capability for
put validation web vulnerabilities in
connection with the input filter bypass are estimated as medium.
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
==
The security risk of the client-side cross site scripting web vulnerability is
estimated as medium.
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Ateeq ur Rehman Khan
(at...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Informatio
i
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=====
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including the warranties o
Document Title:
===
Barracuda Networks Web Application Firewall v6.1.5 & LoadBalancer v4.2.2 #37 -
Filter Bypass & Multiple Vulnerabilities
References (Source):
http://www.vulnerability-lab.com/get_content.php?id=1103
Barracuda Networks Security ID (BNSEC): BNSE
ulnerability is estimated
as critical.
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provi
ed as high.
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=====
The information provided in this advisory is provided as it is without
n is estimated as high.
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=====
The information provided in this advisory is provided
Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=====
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
e
jri
(b...@evolution-sec.com) [ad...@vulnerability-lab.com]
[www.vulnerability-lab.com]
Disclaimer & Information:
=========
The information provided in this advisory is provided as it is without
any warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including
stimated as high.
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it i
r & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including the warranties of merchantability and
capability for a particular purpose. Vulnerabil
[LOCAL COMMAND INJECT VULNERABILITY!]">
06.08.14 12:27
Solution - Fix & Patch:
===
The vulnerabilities can be patched by a sec
ities are estimated as medium.
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provide
b.com]
Disclaimer & Information:
=====
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including the warranties of merchantability and
capability for a particular pu
timated as medium.
Credits & Authors:
==
Mazen Gamal - http://www.vulnerability-lab.com/show.php?user=Mazen%20Gamal
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warra
==
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including the warranties of merchantability and
capability for a particular purpose. Vulnerability-Lab or its suppliers
are not
is estimated as high(-).
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it i
E
INCLUDE VULNERABILITY!]%3E.TXT]
Content-Type[application/download]
Date[Sat, 06 Sep 2014 00:13:00 GMT]
Reference(s): Links
http://localhost:9900/
http://localhost:9900/Download/
Solution - Fix & Patch:
===
The vulnerability can be pactehd by a secure parse and enc
laimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including the warranties of merchantability and
capability for a particular purpose. Vulnerability-Lab o
e. Filter and restrict the filename input.
validate the output names in the main item list of the application index.
Security Risk:
==
1.1
The security risk of the local code execution web vulnerability is estimated as
critical.
1.2
The security risk of the local file include web vulne
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all w
ame input fields in the myoracle application.
Encode stored data of user in the dbms when processing to send service
notifications by the mail info@oracle email to prevent persistent injection
attacks.
Security Risk:
==
The security risk of the persistent mail encoding web vulne
ed in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including the warranties of merchantability and
capability for a particular purpose. Vulnerability-Lab or its suppliers
are not liable in any case of damage, including
s by the mail info@oracle email to prevent persistent injection
attacks.
Security Risk:
==
The security risk of the persistent mail encoding web vulnerability in the
myoracle account system web-server is estimated as medium.
Credits & Authors:
==
Vulnerability Laboratory
www.linkedin.com/profile/view?id=305567696)
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including the warranties of merchanta
erability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including the warranties of merchantability and
capability for a parti
y and developer team.
Security Risk:
==
The security risk of the both application-side input validation web
vulnerabilities is estimated as medium.
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.co
imated as medium.
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is
of 3.5.
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
wa
c.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including the warranties of merchantability and
capability for
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability La
Document Title:
===
HTTP Commander AJS v3.1.9 - Client Side Exception Vulnerability
References (Source):
http://www.vulnerability-lab.com/get_content.php?id=1329
Release Date:
=
2014-10-02
Vulnerability Laboratory ID (VL-ID):
==
ity Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied,
========
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including the warranties of merchantability and
capability for a particular purpose. Vulnerability-Lab or its suppliers
are
issue.
Security Risk:
==
The security risk of the persistent input validation vulnerabilities and filter
bypass method are estimated as medium. (CVSS 4.3)
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution
njamin Kunz Mejri
(b...@vulnerability-lab.com)
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including the warranties of mercha
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@vulnerability-lab.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warra
tion-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including the warranties of merchantabil
.
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Ateeq ur Rehman Khan
(at...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
1.3
The security risk of the local command inject web vulnerability in the
devicename value is etimated as medium.
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information
ri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including the warranties
lnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including the warranties of merchantability and
capability for a par
enjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including the war
input
values in the message body context
Filter and restrict context of send mails through the application and the
web-server of the sonicwall gms appliance.
The issue has already been patched by the dell security team in cooperation
with the vulnerability-lab during the year 2014.
Security
enjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including the war
redits & Authors:
==
Vulnerability Laboratory [Research Team] - Katharin S. L. (CH)
(resea...@vulnerability-lab.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty.
Risk:
==
The security risk of the local denial of service vulnerability thats
exploitable through the favorite message app is estimated as low.
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vuln
is advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either expressed
or implied, including the warranties of merchantability and capability for a
particular purpose. Vulnerability-Lab or its suppliers are not liable
in any case of damage, including direct,
Credits & Authors:
==
Jasminder Pal Singh - @singh_jasminder [http://jasminderpalsingh.info]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, ei
lnerability in
the wifi interface is estimated as medium(-). (CVSS 2.5)
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=====
The information provided in thi
Pragma[no-cache]
status[200]
Vary[Accept-Encoding,User-Agent]
Content-Encoding[gzip]
Reference(s):
https://www.bookfresh.com/cindex.php
https://www.bookfresh.com/cindex.php/backbone_api/clients/
https://www.bookfresh.com/cindex.php/backbone_api/clients/find?query=&
er&victim).
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Ateeq ur Rehman Khan
(at...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=====
The information provided in this advisory is provided a
ise because of
attackers are able to access unauthorized server local files.
Credits & Authors:
==
Vulnerability Laboratory [Research Team] -Benjamin Kunz Mejri
(b...@vulnerability-lab.com)
Disclaimer & Information:
=========
The information provided in this advisory is
===
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either expressed
or implied, including the warranties of merchantability and capability for a
particular purpose. Vulnerability-Lab or its suppliers are not liable
a boarding pass application is estimated as high. (CVSS
6.0)
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in thi
Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either expressed
or implied, including the warranties
ww.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either expressed
or implied, including the warranties of merchantability and capability for a
pa
com) [www.vulnerability-lab.com]
Disclaimer & Information:
=========
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either expressed
or implied, including the warranties of merchantability and capab
lity Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either expre
Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either expressed
or implied, including the warranties
e
relateiq web-application is estimated as medium (cvss 3.4)
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in
inkedin.com/in/manideepk]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either expressed
or implied, including the warranties of merchantability and capabilit
ode and parse the vulnerable site_url in the add input field of the
installation module (install.php).
Restrict the input fields and disallow special chars to prevent system specific
command executions.
Security Risk:
==
The security risk of the remote command execution vulnerab
=
Manideep K. - Information Security Researcher
[https://in.linkedin.com/in/manideepk]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either expressed
o
nformation Security Researcher
[https://in.linkedin.com/in/manideepk]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either expressed
or implied, including the warranti
=
X-Cisadane - Stefanus (steevee@gmail.com)
Greetz to: X-Code YogyaFree, Explore Crew, CodeNesia, Bogor Hackers Community,
Tomi Zaoldyeck and Winda Utari
Disclaimer & Information:
=========
The information provided in this advisory is provided as it is without any
warr
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either expressed
or implied, including the warranties of merchantability and capability for a
particular purpose. Vulnerability-Lab or its suppliers are not liable
in any ca
ion provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either
expressed or implied, including the warranties of merchantability and
capability for a particular purpose. Vulnerability-Lab or its suppliers
are not liable in any case of da
isclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either expressed
or implied, including the warranties of merchantability and capability for a
particular purpose. Vulner
servés.
C:\Windows\system32>whoami
whoami
autorite nt\système
C:\Windows\system32>
Security Risk:
==
The security risk of the local privilege escalation vulnerability in the
software is estimated as high. (CVSS 6.4)
Credits & Authors:
==
Hadji Samir s...@hotm
er & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either expressed
or implied, including the warranties of merchantability and capability for a
particular purpose. Vuln
network is estimated as medium. (CVSS 4.9)
Credits & Authors:
==
Paulos Yibelo (paulosyibelo.com)
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warran
ws\system32>whoami
whoami
autorite nt\système
C:\Windows\system32>
Security Risk:
==
The security risk of the local privilege escalation vulnerability in the
software is estimated as high. (CVSS 6.4)
Credits & Authors:
==
Hadji Samir s...@hotmail.fr
Di
...@hotmail.fr
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either expressed
or implied, including the warranties of merchantability and capability for a
particular pu
urity risk of the sql injection web vulnerability in the pimcore content
management system is estimated as high. (CVSS 6.4)
Credits & Authors:
==
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Inf
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all
t.blogspot.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either expressed
or implied, including the warranties of merchantability and capability for a
@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either expressed
or implied, including the warranties of merchantabil
@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either expressed
or implied, including the warranties of merchantabil
ability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties
erability, dos issue
and ddl injection bug in the software are estimated as high. (CVSS 6.0)
Credits & Authors:
==
Hadji Samir s...@hotmail.fr
Disclaimer & Information:
=====
The information provided in this advisory is provided as it is withou
`Invite to collaborate` and `Invite to
heroku` mail context to prevent persistent script code execution, hijacking
attacks or phishing attempts.
Security Risk:
==
The security risk of the persistent mail encoding web vulnerability in the
notification service (api) is estimated as medium. (C
vulnerability in the xml configuration file of the
software is estimated as medium. (CVSS 2.2)
Credits & Authors:
==
Hadji Samir s...@hotmail.fr
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
w.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab disclaims all warranties, either expressed
or implied, including the warranties of merchantability and capability for a
emote sql injection web vulnerability in the
community post file is estimated as critical. (CVSS 8.3)
Credits & Authors:
==
IranGuard Security Team - P0!s0nC0d3
Disclaimer & Information:
=
The information provided in this advisory is provided as i
===
Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri
(b...@evolution-sec.com) [www.vulnerability-lab.com]
Disclaimer & Information:
=
The information provided in this advisory is provided as it is without any
warranty. Vulnerability Lab di
80/Sitefinity/
http://site16408192010623.srv03.sandbox.localhost:8080/Sitefinity/Administration/
http://site16408192010623.srv03.sandbox.localhost:8080/Sitefinity/Services/Content/DocumentLibraryService.svc
http://site16408192010623.srv03.sandbox.localhost:8080/Sitefinity/Services/Content/DocumentLibraryService.svc/000
al of service vulnerability in the xml configuration file of the
software is estimated as medium. (CVSS 2.2)
Credits & Authors:
==
Hadji Samir s...@hotmail.fr
Disclaimer & Information:
=
The information provided in this advisory is provided as it is w
301 - 400 of 896 matches
Mail list logo