A vulnerability was found in Expression Engine up to 6.0.2. It has been declared as critical. Affected by this vulnerability is the function get
of the file Addons/file/mod.file.php. Upgrading to version 6.0.3 eliminates this vulnerability. The upgrade is hosted for download at github.com. Applying a patch is able to eliminate this problem. The bugfix is ready for download at github.com. The best possible mitigation is suggested to be upgrading to the latest version.
Expression Engine up to 6.0.2 Addons/file/mod.file.php get input validation
- Virtual Patching
- August 13, 2021
- 6:05 am
CVE-2024-8523 : LMXCMS UP TO 1.4 SQL COMMAND EXECUTION MODULE ADMIN.PHP FORMATDATA DATA CODE INJECTION
Description A vulnerability was found in lmxcms up to 1.4 and classified as critical. Affected by this issue is the
CVE-2024-25584 : OPEN-XCHANGE OX DOVECOT PRO UP TO 2.3.21 DATA COMMAND DATA AUTHENTICITY
Description Dovecot accepts dot LF DOT LF symbol as end of DATA command. RFC requires that it should always be
CVE-2024-8521 : WAVELOG UP TO 1.8.0 LIVE QSO /QSO INDEX MANUAL CROSS SITE SCRIPTING
Description A vulnerability, which was classified as problematic, was found in Wavelog up to 1.8.0. Affected is the function index