-
Hello Exponent Security Team
I would like to inform you that your whole cms in vulnerable to XSS Attack
by using this an attacker can mentain the site access and keep track it also he is able to…
-
The ability to run execve() on files within an application's home directory will be removed in target API > 28.
Here is the issue on Google bug tracker:
https://issuetracker.google.com/issues/128554…
-
Title: Unsecured Vulnerability on GET:/api/v1/primary-transaction
Project: NetBanking API
Description: The unsecured exploit gives an attacker full access to the vulnerable endpoint without credentia…
-
Title: Unsecured Vulnerability on GET:/api/v1/primary-transaction
Project: NetBanking API
Description: The unsecured exploit gives an attacker full access to the vulnerable endpoint without credentia…
-
Title: Unsecured Vulnerability on GET:/api/v1/primary-transaction
Project: NetBanking API
Description: The unsecured exploit gives an attacker full access to the vulnerable endpoint without credentia…
-
Title: Unsecured Vulnerability on GET:/api/v1/primary-transaction
Project: NetBanking API
Description: The unsecured exploit gives an attacker full access to the vulnerable endpoint without credentia…
-
Our security scan says that the API is vulnerable to cross-site scripting. It says when it provides:
http://:8251/api/entities?'"@-->alert(0x0028F5)
to a browser that has the cross-site scriptin…
-
Title: Unsecured Vulnerability on GET:/api/v1/primary-transaction
Project: NetBanking API
Description: The unsecured exploit gives an attacker full access to the vulnerable endpoint without credentia…
-
Title: Unsecured Vulnerability on GET:/api/v1/primary-transaction
Project: NetBanking API
Description: The unsecured exploit gives an attacker full access to the vulnerable endpoint without credentia…
-
Title: Unsecured Vulnerability on GET:/api/v1/primary-transaction
Project: NetBanking API
Description: The unsecured exploit gives an attacker full access to the vulnerable endpoint without credentia…