![]() ![]() The identifier VDB-235205 was assigned to this vulnerability. The manipulation leads to cross site scripting. This issue affects some unknown processing of the file page.php. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.Ī vulnerability was found in phpscriptpoint BloodBank 1.1. VDB-235206 is the identifier assigned to this vulnerability. It is possible to launch the attack remotely. The manipulation of the argument country/city/blood_group_id leads to sql injection. Affected is an unknown function of the file /search of the component POST Parameter Handler. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in mAyaNet E-Commerce Software allows SQL Injection.This issue affects E-Commerce Software: before 1.1.Ī vulnerability classified as critical has been found in phpscriptpoint BloodBank 1.1. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. VDB-235958 is the identifier assigned to this vulnerability. The manipulation of the argument index/pickup_id leads to cross site scripting. Affected by this issue is some unknown functionality of the file /index.php. A missing permission check in Jenkins Frugal Testing Plugin 1.1 and earlier allows attackers with Overall/Read permission to connect to Frugal Testing using attacker-specified credentials.Ī cross-site request forgery (CSRF) vulnerability in Jenkins Frugal Testing Plugin 1.1 and earlier allows attackers to connect to Frugal Testing using attacker-specified credentials, and to retrieve test IDs and names from Frugal Testing, if a valid credential corresponds to the attacker-specified username.Ī vulnerability was found in PHP Jabbers Bus Reservation System 1.1 and classified as problematic.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |