0 | title | SecurEnvoy SecurMail 9.1.501 - Multiple Vulnerabilities - Exploit-DB | link | https://www.exploit-db.com/exploits/44285 | snippet | ... HTML pages. Therefore persistent and reflected cross site scripting attacks are possible throughout the application. Some pages fail to ... | date | Mar 13, 2018 | position | 1 |
|
1 | |
2 | |
3 | title | uWSGI < 2.0.17 - Directory Traversal - PHP webapps Exploit | link | https://www.exploit-db.com/exploits/44223 | snippet | Exploit Title: uWSGI PHP Plugin Directory Traversal # Date: 01-03-2018 # Exploit Author: Marios Nicolaides - RUNESEC # Reviewers: Simon ... | date | Mar 2, 2018 | position | 4 |
|
4 | title | CVE-2018-8045 Detail - NVD | link | https://nvd.nist.gov/vuln/detail/CVE-2018-8045 | snippet | In Joomla! 3.5.0 through 3.8.5, the lack of type casting of a variable in a SQL statement leads to a SQL injection vulnerability in the User ... | date | Mar 14, 2018 | position | 5 |
|
5 | |
6 | |
7 | title | Android Security BulletināMarch 2018 | link | https://source.android.com/docs/security/bulletin/2018-03-01 | snippet | 2018-03-01 security patch level vulnerability details. In the sections below, we provide details for each of the security vulnerabilities that ... | date | Mar 1, 2018 | attributes | Missing | html | Show results with:html |
| position | 8 |
|
8 | title | Joomla! 3.8.x < 3.8.6 User Notes List View SQL Injection | TenableĀ® | link | https://www.tenable.com/plugins/was/98489 | snippet | According to its self-reported version number, the detected Joomla! application is affected by an SQL injection vulnerability in the User Notes list view. Note ... | position | 9 |
|
9 | |