Lädt...


🕵️ CVE-2022-47514 | XML-RPC.NET up to 2.4.x POST Request pingback.aspx server-side request forgery


Nachrichtenbereich: 🕵️ Sicherheitslücken
🔗 Quelle: vuldb.com

A vulnerability, which was classified as critical, was found in XML-RPC.NET up to 2.4.x. This affects an unknown part of the file pingback.aspx of the component POST Request Handler. The manipulation leads to server-side request forgery. This vulnerability is uniquely identified as CVE-2022-47514. It is possible to initiate the attack remotely. There is no exploit available. It is recommended to upgrade the affected component. ...

🕵️ WordPress up to 2.2.2 Pingback pingback.extensions.getPingbacks cross-site request forgery


📈 66.37 Punkte
🕵️ Sicherheitslücken

🕵️ MailEnable up to 8.59 XML Document request.aspx Options XML External Entity


📈 34.92 Punkte
🕵️ Sicherheitslücken

🕵️ Adobe Flash Player up to 9.0.16 HTTP XML Request XML.addRequestHeader cross site request forgery


📈 30.18 Punkte
🕵️ Sicherheitslücken

🕵️ Zabbix up to 1.8.20/2.0.12/2.2.4/2.3.1 XML Data XML Request XML External Entity


📈 29.12 Punkte
🕵️ Sicherheitslücken

🕵️ Fortify Software Security Center 17.1/17.2/18.1 XML Data XML Request XML External Entity


📈 29.12 Punkte
🕵️ Sicherheitslücken

🕵️ PrinterOn 4.1.4 XML Data XML Request XML External Entity


📈 29.12 Punkte
🕵️ Sicherheitslücken

🕵️ ReadyDesk 9.1 File Upload chat/sendfile.aspx ASPX File erweiterte Rechte


📈 28.56 Punkte
🕵️ Sicherheitslücken

🕵️ ReadyDesk 9.1 File Upload chat/sendfile.aspx ASPX File erweiterte Rechte


📈 28.56 Punkte
🕵️ Sicherheitslücken

🕵️ BlogEngine.NET up to 3.3.7.0 XML Data pingback.axd XML External Entity


📈 28.42 Punkte
🕵️ Sicherheitslücken

📰 New Pingback Malware Using ICMP Tunneling to Evade C&C Detection


📈 28.42 Punkte
📰 IT Security Nachrichten

📰 New Windows 'Pingback' malware uses ICMP for covert communication


📈 28.42 Punkte
📰 IT Security Nachrichten

📰 Pingback Malware Uses ICMP to Avoid C&C Detection


📈 28.42 Punkte
📰 IT Security Nachrichten

🎥 Job Expectations, Pi Password Thief, Python Masscan, & Pingback - PSW #693


📈 28.42 Punkte
🎥 IT Security Video

🕵️ CVE-2013-4857 | D-Link DIR-865L /router_info.xml XML File xml injection (OSVDB-97757)


📈 26.57 Punkte
🕵️ Sicherheitslücken

🕵️ CVE-2019-14678 | SAS XML Mapper 9.45 XML Data xml external entity reference


📈 26.57 Punkte
🕵️ Sicherheitslücken

🕵️ PHP up to 5.5.34/5.6.20/7.0.5 XML ext/xml/xml.c xml_parse_into_struct second memory corruption


📈 25.44 Punkte
🕵️ Sicherheitslücken

🕵️ Redwood SAP Business Process Automation XML Data XML Document XML External Entity


📈 25.44 Punkte
🕵️ Sicherheitslücken

🕵️ IBM WebSphere DataPower Appliance up to 7.6 XML XML Data XML External Entity


📈 25.44 Punkte
🕵️ Sicherheitslücken

🕵️ LoboEvolution XML Parser XML File XML External Entity


📈 25.44 Punkte
🕵️ Sicherheitslücken

🕵️ Stroom up to 5.4.4 XML Parser XML File XML External Entity


📈 25.44 Punkte
🕵️ Sicherheitslücken

🕵️ UML Designer up to 8.0.0 XML Parser XML File XML External Entity


📈 25.44 Punkte
🕵️ Sicherheitslücken

🕵️ SAP HANA Extended Application Services 1 XML Validation XML Document XML External Entity


📈 25.44 Punkte
🕵️ Sicherheitslücken

🕵️ Axentra Firmware XML Data xml XML External Entity


📈 25.44 Punkte
🕵️ Sicherheitslücken

🕵️ Jeesite 1.2.7 XML Data ActProcessService.java convertToModel() XML File XML External Entity


📈 25.44 Punkte
🕵️ Sicherheitslücken

🕵️ CVE-2019-12273 | OutSystems Platform 10/11 ImageResourceDetail.aspx cross-site request forgery


📈 24.94 Punkte
🕵️ Sicherheitslücken

🕵️ CVE-2019-12273 | OutSystems Platform 10/11 ImageResourceDetail.aspx cross-site request forgery


📈 24.94 Punkte
🕵️ Sicherheitslücken

matomo