
XSS attack in Drupal Views Builk Operations module 6.x-1.0 through 6.x-1.10
Overview : Drupal Views Builk Operations (VBO) module 6.x-1.0 through 6.x-1.10 does not properly escape the vocabulary help when the
Overview : Drupal Views Builk Operations (VBO) module 6.x-1.0 through 6.x-1.10 does not properly escape the vocabulary help when the
Overview : New vulnerabilities discovered in MediaWiki Affected Product(s) : MediaWiki before 1.19.4 and 1.20.x before 1.20.3 Vulnerability Details :
Overview : Zikula 1.3.0 build #3168 and probably prior has XSS flaw due to improper sanitization of the ‘themename’ parameter
Overview : ‘External Task is undefined’ & ‘Syntax error’ errors appear on browser console after a Logger report query object
Overview : SuiteCRM Lists Latest Updates of XSS / SSRF Vulnerabilities Affected Product(s) : SuiteCRM 7.11.x and 7.10.x before 7.11.8
Overview : In Joomla! 3.x before 3.9.12, inadequate escaping allowed XSS attacks using the logo parameter of the default templates.
There is a XSS vulnerability in the ticket overview screens. It’s possible to collect various information by having an e-mail
Overview : GitLab EE/CE 8.11 through 12.9.1 allows blocked users to pull/push docker images. References Note: References are provided for the convenience
Overview : cPanel before 84.0.20 allows a demo account to achieve remote code execution via a cpsrvd rsync shell (SEC-544).
Overview : In the 3.1.12 Pro version of the Craft CMS web application, the XSS vulnerability has been discovered in
Overview : Stored XSS vulnerability in expandable textbox form control SECURITY-1498 / CVE-2019-10401 Jenkins form controls include an expandable textbox
Home What Is a WAF Signature? 1.3k Views 7 min. read Learning Center Related Content What Are the Types of
Home What Is a Shadow API? 2.2k Views 7 min. read Learning Center Related Content What Is API Fuzz Testing?
Home What Is a WAF False Negative? 3.2k Views 7 min. read Learning Center Related Content What Is a WAF
Home Does a CDN Cause Security Risks? 1.1k Views 7 min. read Learning Center Related Content What Happens If a
As the cybersecurity landscape evolves rapidly in 2025, safeguarding web applications grows increasingly complex and vital. The rise in zero-day
Home What Is Broken Authentication? 8.6k Views 9 min. read Learning Center Related Content What Is API Injection? What Are
Home What Is a WAF Policy? 8.4k Views 9 min. read Learning Center Related Content What Is a WAF Rule?
Home What Is a WAF Rule? 22.8k Views 9 min. read Learning Center Related Content What Is a WAF? What
Home What Is a WAF Security Rule? 1.8k Views 7 min. read Learning Center Related Content Introduction As cyber threats
Home What Is JWT? 5.1k Views 6 min. read Learning Center Related Content What Is OAuth? What Is API Encryption?
Home What Is API Injection? 4.2k Views 6 min. read Learning Center Related Content How Do APIs Get Hacked? What
Home How Does AI Detect API Threats? 7.4k Views 5 min. read Learning Center Related Content What Is Zero-Trust API
Home How Do APIs Get Hacked? 8.4k Views 7 min. read Learning Center Related Content What Are Common API Threats?