![]() Report v0.9.8.6 was discovered to contain a Server-Side Request Forgery (SSRF) vulnerability. The WooCommerce Checkout Field Manager WordPress plugin before 18.0 does not validate files to be uploaded, which could allow unauthenticated attackers to upload arbitrary files such as PHP on the serverĪn issue discovered in Shenzhen Zhiboton Electronics ZBT WE1626 Router v 21.06.18 allows attackers to escalate privileges via WGET command to the Network Diagnosis endpoint.Īn issue discovered in Shenzhen Zhibotong Electronics WBT WE1626 Router v 21.06.18 allows attacker to execute arbitrary commands via serial connection to the UART port. The identifier of this vulnerability is VDB-222268. It is recommended to upgrade the affected component. Upgrading to version 1.0.2 is able to address this issue. The manipulation of the argument lu leads to sql injection. ![]() This vulnerability affects unknown code of the file. The identifier of this vulnerability is VDB-222288.Ī vulnerability has been found in codepeople cp-polls Plugin 1.0.1 and classified as critical. It is recommended to apply a patch to fix this issue. It is possible to launch the attack remotely. The manipulation of the argument lid leads to sql injection. Affected is an unknown function of the file game.php. Please note that some of the information in the bulletin is compiled from external, open-source reports and is not a direct result of CISA analysis.Ī vulnerability was found in iGamingModules flashgames 1.1.0. Patch information is provided when available. This information may include identifying information, values, definitions, and related links.
0 Comments
Leave a Reply. |