ERPNext 11.1.47 allows blog?blog_category= Frame Injection.
Overview : ERPNext 11.1.47 allows blog?blog_category= Frame Injection. Affected Product(s) : Affected Software: ERPNext Affected Versions: 11.1.47 Vulnerability Details : CVE ID
Overview : ERPNext 11.1.47 allows blog?blog_category= Frame Injection. Affected Product(s) : Affected Software: ERPNext Affected Versions: 11.1.47 Vulnerability Details : CVE ID
Overview : LogicalDoc before 8.3.3 allows SQL Injection. LogicalDoc populates the list of available documents by querying the database. This
Overview : Multiple SQL injection vulnerabilities in D-Link DSR Routers Affected Product(s) : D-Link DSR-150 (Firmware < v1.08B44) D-Link DSR-150N
Overview : Octeth Oempro 4.7 found a SQL injection. The parameter “CampaignID” in “Campaign.Get” is vulnerable to SQL Injection attacks.
Overview : Pimcore data leakage Flaws through SQL Injection Affected Product(s) : pimcore/pimcore before 6.3.0 Vulnerability Details : CVE ID :
Overview : SuiteCRM 7.10.x versions prior to 7.10.21 and 7.11.x versions prior to 7.11.9 allow SQL Injection. Affected Product(s) :
Overview : Zend Framework before 2.2.10 and 2.3.x before 2.3.5 has Potential SQL injection in PostgreSQL Zend\Db adapter. Affected Product(s)
Overview : Authenticated SQL Injection in interface/forms/eye_mag/js/eye_base.php in OpenEMR through 5.0.2 allows a user to extract arbitrary data from the
Overview : TOPMeeting security issues fixed. Affected Product(s) : TOPMeeting before version 8.8 Vulnerability Details : CVE ID : CVE-2019-13409
Overview : vBulletin 5.5.4 allows SQL Injection via the ajax/api/hook/getHookList or ajax/api/widget/getWidgetList where parameter. Affected Product(s) : vBulletin 5.5.4 Vulnerability
Overview : App\Home\Controller\ZhuantiController.class.php in TuziCMS 2.0.6 has SQL injection via the index.php/Zhuanti/group?id= substring. Affected Product(s) : TuziCMS 2.0.6 Vulnerability Details
SQL, or Structured Query Language is a standard Database language which is used to create, maintain and retrieve the relational
Overview : Cisco Firepower Management Center Remote Code Execution Vulnerability CWE-20 / CVE-2019-12689 A vulnerability in the web-based management interface
Home What Is a WAF Signature? 1.3k Views 7 min. read Learning Center Related Content What Are the Types of
Home What Is a WAF False Negative? 3.2k Views 7 min. read Learning Center Related Content What Is a WAF
APIs are everywhere—powering mobile apps, cloud platforms, and enterprise systems. Safeguarding your APIs is crucial rather than optional. API security
As the cybersecurity landscape evolves rapidly in 2025, safeguarding web applications grows increasingly complex and vital. The rise in zero-day
A CASB can be deployed either on premises or in the cloud. Most of the CASB deployments are SaaS-based. There are
Introduction In the first half of April 2025, cybersecurity threats have escalated in both volume and complexity. From state-sponsored cyber
Home What Is API Fuzz Testing? 4.4k Views 8 min. read Learning Center Related Content What Is API Behavior Analytics?
Home What Is API Encryption? 4.8k Views 8 min. read Learning Center Related Content What Is JWT? How to Secure
Home What Is a WAF False Positive? 6.8k Views 7 min. read Learning Center Related Content What Is WAF Evasion?
Home What Is a WAF Policy? 8.4k Views 9 min. read Learning Center Related Content What Is a WAF Rule?
Home What Is a WAF Rule? 22.8k Views 9 min. read Learning Center Related Content What Is a WAF? What