![]() The manipulation of the argument filter/filter leads to cross site scripting. Affected by this issue is some unknown functionality of the file /search. The associated identifier of this vulnerability is VDB-238059.Ī vulnerability was found in SPA-Cart eCommerce CMS 1.9.0.3. It is possible to initiate the attack remotely. The manipulation of the argument filter leads to sql injection. ![]() This affects an unknown part of the file /search of the component GET Parameter Handler. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.Ī vulnerability classified as critical has been found in SPA-Cart eCommerce CMS 1.9.0.3. The identifier of this vulnerability is VDB-238632. ![]() The exploit has been disclosed to the public and may be used. The exploitability is told to be difficult. The complexity of an attack is rather high. It is possible to launch the attack remotely. The manipulation leads to files or directories accessible. Affected is an unknown function of the file /upload/ueditorConfig?action=config. VDB-239854 is the identifier assigned to this vulnerability.Ī vulnerability was found in Dreamer CMS up to 4.1.3. The exploitation appears to be difficult. The manipulation of the argument contents with the input alert('xss') leads to cross site scripting. This vulnerability affects unknown code of the file install.php of the component Installation Handler. A vulnerability has been found in Pluck CMS 4.7.18 and classified as problematic.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |