![]() Online Piggery Management System 1.0 is vulnerable to Cross Site Scripting (XSS). There is no known workaround for this vulnerability. A fix has been released in versions 5.0.8 and 4.5.18. Feathers socket handler did not catch invalid string conversion errors like `const message = $)`. ![]() This issue affects OTRS Survey module from 7.0.X before 7.0.32, from 8.0.X before 8.0.13 and ((OTRS)) Community Edition Survey module from 6.0.X through 6.0.22.įeathersjs is a framework for creating web APIs and real-time applications with TypeScript or JavaScript. This allows a cross site scripting attack while reading the replies as authenticated agent. ![]() ![]() An improper input validation vulnerability in OTRS Survey modules allows any attacker with a link to a valid and unanswered survey request to inject javascript code in free text answers. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |