CVE-2023-37292 : HGIGA ISHERLOCK PRIOR 4.5-174/5.5-174 OS COMMAND INJECTION
Description Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) vulnerability in HGiga iSherlock 4.5 (iSherlock-user
Description Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) vulnerability in HGiga iSherlock 4.5 (iSherlock-user
Broken Object Level Authorization is a security vulnerability that allows an attacker to access and manipulate data or functionality that
Account creation is an essential process in web application security, but it is also a target for automated attacks. One
A brute-force attack is a method of guessing a password or other authentication credential by trying multiple combinations until the
Protocol validation is a critical aspect of cybersecurity that involves verifying whether network protocols adhere to industry standards and specifications.
Input validation is the process of verifying the integrity of data that is received by an application or system. This
Audit logging is a critical component of cybersecurity that helps organizations monitor and record events that occur within their systems