Real Name | İsmail Taşdelen |
---|---|
Email address | private |
First Active | 2018-01-20 |
Last Active | 2023-01-09 |
XEROX WorkCentre 7830 Printer suffers from a cross site request forgery vulnerability.
722ddad24a74446b88461671c5e4dc983e78cbc0412958c4505fc5c3cd41415a
Tautulli version 2.1.9 suffers from a cross site request forgery vulnerability.
ac94b956df22aa8c8558ddd90a2fdf5cf62bb61e01c80885ba69218c2afeb31d
The Xerox AltaLink C8035 Printer suffers from a cross site request forgery vulnerability.
cc80db454061f836a81349ef00cb7c6ae547bdd344558ea813987f9e0a0388b3
Whitepaper called Remote File Inclusion / Local File Inclusion Attack and Defense Techniques. This paper focuses on PHP-based attacks.
bfd1ff9336752c7063ef15f00055e1e5c57066f1a49906dcfd48fc5019fc64f8
RISE Ultimate Project Manager version 2.3 suffers from a cross site request forgery vulnerability.
8e60bec4fb2623528699d757707e00f4621033ec0529346aa20c8fd17f4b7140
LavaLite CMS version 5.7 suffers from a persistent cross site scripting vulnerability.
4c3621d3000cbcf29af4bbbba5d7450265f5cfa9560474714778c9d2b6e16f6a
An HTML Injection vulnerability has been discovered on the RICOH SP 4520DN via the /web/entry/en/address/adrsSetUserWizard.cgi entryNameIn or entryDisplayNameIn parameter.
8aa24d5f0536dc8ab8ba5a04208bb67d10be44f374d522d992546b0c6b964e41
An HTML Injection vulnerability has been discovered on the RICOH SP 4510DN via the /web/entry/en/address/adrsSetUserWizard.cgi entryNameIn parameter.
1e92ae0c5278fc1a1ef7d635b6034490e6b56ed89def0c3158b907b154633917
dotCMS version 5.1.1 suffers from an html injection vulnerability.
23b339e94a95b034f9c375f3d926f981beaf280b2ce788ad8d29bc64d346524b
Fat Free CRM version 0.19.0 suffers from an html injection vulnerability.
df06e72549fffc50f5424d1db04c2b934ef5ad16747d4a3c950bb915e38af30f
This is the world's shortest whitepaper showing how to use javascript to record keystrokes and log them.
452b243fcf2a671a92277b9e80e8b47424a356ab202675137a11081010534860
Craft CMS version 3.1.12 Pro suffers from a cross site scripting vulnerability.
1cc20435a609bba50e6a47ce96dd700f61bfd8576d0420513b0275535a30f2ce
Bold CMS version 3.6.4 suffers from a cross site scripting vulnerability.
5c2aba3b458d11d6b77c9b09a4425127749345f1d9840b88adacd6875e918c9d
LANGO Codeigniter Multilingual Script version 1.0 suffers from a cross site scripting vulnerability.
7ef7a20f78b99c0b6409e9aec1213dcdccc6549054e8bf691f98d9c6cc7f0723
Zenar Content Management System version 8.3 suffers from a cross site request forgery vulnerability.
11b891dae78b89a0b0de8d65ae192050226dafd5b589b7fe2566a673e8dea795
User Management version 1.1 suffers from a cross site scripting vulnerability.
bd246ce3935fbc933764bdfa47bdf167d570a9c0f6d1c74bab395687327bafbd
Ekushey Project Manager CRM version 3.1 suffers from a persistent cross site scripting vulnerability.
47399dd8961ff86c3181323260463ac7ee0e4b157354c3902d27e649642eca6e
LANGO Codeigniter Multilingual Script version 1.0 suffers from html injection and cross site scripting vulnerabilities.
1a7f46c5730e7ddc22cc65539b4922093c7ff1375817ea40f8170245c2f61333
WordPress Support Board plugin version 1.2.3 suffers from a persistent cross site scripting vulnerability.
0355f54279601b62651bec189edae733105d73619df22b146e5bf3ab4c7ba055
Library CMS version 2.1.1 suffers from a cross site scripting vulnerability.
cf0dcc3a82dd155f565140d09b1aa184220c25854a672aeddf8695661be0a132
Alchemy CMS version 4.1-Stable suffers from a cross site scripting vulnerability.
02c75a733b1d5c07131c09fb81fb856cc9cdbeb7f603d8b1b850be01f3fc6685
BigTree CMS version 4.2.23 suffers from a cross site scripting vulnerability.
0b939b3b799d07461bceae3354ccb75881312ee58605c704aa212f707a519456
LUYA CMS version 1.0.12 suffers from a cross site scripting vulnerability.
e0dbbcc0f8e92030ee904a1a802d603ea7787096573828d4e6337d25be3e29e0
Coaster CMS version 5.5.0 suffers from a cross site scripting vulnerability.
0849b869bee82b63fddc5c4a779ba641150604c464edc36529ef46abcd7e08b3
In the 5.4.0 version of the Fork CMS software, HTML Injection and Stored XSS vulnerabilities were discovered via the /backend/ajax URI.
5cb7c607b86aefe50fa6e7e6d7039efb7db6f355ea24a548b2a16addbe6abb47