![]() ![]() The manipulation leads to os command injection. This issue affects some unknown processing of the component Network Diagnostic Page. ![]() The manipulation of the argĬVE-2023-3450 - A vulnerability was found in Ruijie RG-BCR860 2.5.13 and classified as critical. This vulnerability affects the function actionExport of the file ?r=recruit/interview/export&interviews=x of the component Interview Management Export. Fedora 37 Update: 37ĬVE-2023-3445 - Cross-site Scripting (XSS) - Stored in GitHub repository spinacms/spina prior to 2.15.1.ĬVE-2023-3449 - A vulnerability has been found in IBOS OA 4.5.5 and classified as critical. Critical SQL Injection Flaws Expose Gentoo Soko to Remote Code Execution ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |