ERPNext 11.1.47 allows blog?blog_category= Frame Injection.
Overview : ERPNext 11.1.47 allows blog?blog_category= Frame Injection. Affected Product(s) : Affected Software: ERPNext Affected Versions: 11.1.47 Vulnerability Details : CVE ID
Overview : ERPNext 11.1.47 allows blog?blog_category= Frame Injection. Affected Product(s) : Affected Software: ERPNext Affected Versions: 11.1.47 Vulnerability Details : CVE ID
Overview : LogicalDoc before 8.3.3 allows SQL Injection. LogicalDoc populates the list of available documents by querying the database. This
Overview : Multiple SQL injection vulnerabilities in D-Link DSR Routers Affected Product(s) : D-Link DSR-150 (Firmware < v1.08B44) D-Link DSR-150N
Overview : Octeth Oempro 4.7 found a SQL injection. The parameter “CampaignID” in “Campaign.Get” is vulnerable to SQL Injection attacks.
Overview : Pimcore data leakage Flaws through SQL Injection Affected Product(s) : pimcore/pimcore before 6.3.0 Vulnerability Details : CVE ID :
Overview : SuiteCRM 7.10.x versions prior to 7.10.21 and 7.11.x versions prior to 7.11.9 allow SQL Injection. Affected Product(s) :
Overview : Zend Framework before 2.2.10 and 2.3.x before 2.3.5 has Potential SQL injection in PostgreSQL Zend\Db adapter. Affected Product(s)
Overview : Authenticated SQL Injection in interface/forms/eye_mag/js/eye_base.php in OpenEMR through 5.0.2 allows a user to extract arbitrary data from the
Overview : TOPMeeting security issues fixed. Affected Product(s) : TOPMeeting before version 8.8 Vulnerability Details : CVE-2019-13409 A SQL injection
Overview : vBulletin 5.5.4 allows SQL Injection via the ajax/api/hook/getHookList or ajax/api/widget/getWidgetList where parameter. Affected Product(s) : vBulletin 5.5.4 Vulnerability
Overview : App\Home\Controller\ZhuantiController.class.php in TuziCMS 2.0.6 has SQL injection via the index.php/Zhuanti/group?id= substring. Affected Product(s) : TuziCMS 2.0.6 Vulnerability Details
SQL, or Structured Query Language is a standard Database language which is used to create, maintain and retrieve the relational
Overview : Cisco Firepower Management Center Remote Code Execution Vulnerability CWE-20 / CVE-2019-12689 A vulnerability in the web-based management interface
Home How Does WAF Integrate with SIEM? 1.1k Views 8 min. read Learning Center Related Content What Is WAF Event
Home What Is Bot Mitigation in WAF? 4.2k Views 7 min. read Learning Center Related Content How Does WAF Block
Home What Is WAF Logging? 5.3k Views 7 min. read Learning Center Related Content What Is a WAF Signature? What
Home What Is an API DoS Attack? 8.9k Views 8 min. read Learning Center Related Content What Is Excessive Data
Home What Is an Advanced WAF Security Policy? 6.2k Views 9 min. read Learning Center Related Content What Is WAF
Home How Does WAF Block XSS Attacks? 9.2k Views 10 min. read Learning Center Related Content How Does WAF Protect
Home What Is a WAF Signature? 13.9k Views 9 min. read Learning Center Related Content What Are the Types of
Home What Is a WAF False Negative? 3.2k Views 7 min. read Learning Center Related Content What Is a WAF
APIs are everywhere—powering mobile apps, cloud platforms, and enterprise systems. Safeguarding your APIs is crucial rather than optional. API security
As the cybersecurity landscape evolves rapidly in 2025, safeguarding web applications grows increasingly complex and vital. The rise in zero-day
A CASB can be deployed either on premises or in the cloud. Most of the CASB deployments are SaaS-based. There are