-
```
There should be a filter that restricts the input method. For instance I am
getting a lot of reports of dom based xss via cookie value, and I don't care
because this isn't exploitable. Some p…
-
```
There should be a filter that restricts the input method. For instance I am
getting a lot of reports of dom based xss via cookie value, and I don't care
because this isn't exploitable. Some p…
-
```
There should be a filter that restricts the input method. For instance I am
getting a lot of reports of dom based xss via cookie value, and I don't care
because this isn't exploitable. Some p…
-
```
There should be a filter that restricts the input method. For instance I am
getting a lot of reports of dom based xss via cookie value, and I don't care
because this isn't exploitable. Some p…
-
```
There should be a filter that restricts the input method. For instance I am
getting a lot of reports of dom based xss via cookie value, and I don't care
because this isn't exploitable. Some p…
-
```
There should be a filter that restricts the input method. For instance I am
getting a lot of reports of dom based xss via cookie value, and I don't care
because this isn't exploitable. Some p…
-
Hello,
There is a vulnerability with jquery < 3.5 with remote code execution.
https://nvd.nist.gov/vuln/detail/CVE-2020-11022
https://nvd.nist.gov/vuln/detail/CVE-2020-11023
This pr should…
-
As identified by our bundle audit job in the CI:
```
Name: bootstrap-sass
Version: 3.4.1
CVE: CVE-2024-6484
GHSA: GHSA-9mvj-f7w8-pvh2
Criticality: Medium
URL: https://github.com/advisories/GHSA…
-
-
```
What steps will reproduce the problem?
1. If a user is logged in, an attacker can send him a link to add-tag.php with
javascript in the tag GET field.
2. When the user goes back to the main page,…