A vulnerability, which was classified as problematic, was found in Auth0 auth0-lock up to 11.30.0. Affected is an unknown functionality of the component Sign In. Upgrading to version 11.30.1 eliminates this vulnerability. The upgrade is hosted for download at github.com. Applying a patch is able to eliminate this problem. The bugfix is ready for download at github.com. The best possible mitigation is suggested to be upgrading to the latest version.
Auth0 auth0-lock up to 11.30.0 Sign In cross site scripting
- Virtual Patching
- June 11, 2021
- 5:05 am
CVE-2024-20418 : CISCO IOS XE CONTROLLER WEB-BASED MANAGEMENT INTERFACE COMMAND INJECTION
Description A vulnerability in the web-based management interface of Cisco Unified Industrial Wireless Software for Cisco Ultra-Reliable Wireless Backhaul (URWB)
CVE-2024-20536 : CISCO DATA CENTER NETWORK MANAGER 12.1.2E/12.1.2P/12.1.3B WEB-BASED MANAGEMENT INTERFACE/REST API ENDPOINT SQL INJECTION
Description A vulnerability in a REST API endpoint and web-based management interface of Cisco Nexus Dashboard Fabric Controller (NDFC) could
CVE-2024-50340 : SYMFONY INJECTION
Description symfony/runtime is a module for the Symphony PHP framework which enables decoupling PHP applications from global state. When the