Ratpack up to 1.8.x HTTP Header X-Forwarded-Host request smuggling
A vulnerability has been found in Ratpack up to 1.8.x and classified as problematic. This vulnerability affects some unknown processing
A vulnerability has been found in Ratpack up to 1.8.x and classified as problematic. This vulnerability affects some unknown processing
A vulnerability was found in Adobe RoboHelp Server up to 2019.0.9. It has been declared as critical. This vulnerability affects
A vulnerability was found in IBM Security Verify up to 10.9.66. It has been declared as problematic. Affected by this
A vulnerability was found in Squid Web Proxy up to 4.14/5.0.5 (Firewall Software). It has been rated as problematic. Affected
Home What Is an API Request? 6.3k Views 6 min. read Learning Center Related Content What Is an API Response?
In the wake of recent escalations between India and Pakistan, India’s critical digital infrastructure faced a coordinated and massive cyber
Description Server-Side Request Forgery in URL Mapper in Arctic Security’s Arctic Hub versions 3.0.1764-5.6.1877 allows an unauthenticated remote attacker to
Description IBM Security Directory Integrator 7.2.0 through 7.2.0.13 and 10.0.0 through 10.0.3 could allow a remote authenticated attacker to execute
Description A relative path traversal vulnerability (CWE-23) in FortiWAN version 4.5.7 and below, 4.4 all versions may allow a remote
Description An Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) vulnerability [CWE-78] in FortiManager version
Description A relative path traversal in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute
Description Waitress is a Web Server Gateway Interface server for Python 2 and 3. A remote client may send a
Description A missing authentication for critical function in FortiManager 7.6.0, FortiManager 7.4.0 through 7.4.4, FortiManager 7.2.0 through 7.2.7, FortiManager 7.0.0
Description A Command injection vulnerability in requestLetsEncryptSslWithDnsChallenge in NginxProxyManager 2.11.3 allows an attacker to achieve remote code execution via Add
Description Traefik is a golang, Cloud Native Application Proxy. When a HTTP request is processed by Traefik, certain HTTP headers
Description The Contact Form Plugin by Fluent Forms for Quiz, Survey, and Drag & Drop WP Form Builder plugin for
Description Cross-Site Request Forgery (CSRF) vulnerability in WPMU DEV Hummingbird.This issue affects Hummingbird: from n/a through 3.9.1. References https://patchstack.com/database/vulnerability/hummingbird-performance/wordpress-hummingbird-plugin-3-9-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve For
Description This High severity Reflected XSS and CSRF (Cross-Site Request Forgery) vulnerability was introduced in versions 7.19.0, 7.20.0, 8.0.0, 8.1.0,
Description TruffleHog is a secrets scanning tool. Prior to v3.81.9, this vulnerability allows a malicious actor to craft data in
Description A command injection vulnerability could allow an authenticated user to execute operating system commands as root via a specially
Description Automation Anywhere Automation 360 v21-v32 is vulnerable to Server-Side Request Forgery in a web API component. An attacker with
Description Server-Side Request Forgery (SSRF) vulnerability in Theme-Ruby Foxiz.This issue affects Foxiz: from n/a through 2.3.5. References https://patchstack.com/database/vulnerability/foxiz/wordpress-foxiz-theme-theme-2-3-5-server-side-request-forgery-ssrf-vulnerability?_s_id=cve For More
Description Insecure permissions in 14Finger v1.1 allow attackers to escalate privileges from normal user to Administrator via a crafted POST
Description A high privileged remote attacker can execute arbitrary system commands via GET requests due to improper neutralization of special