Vulnerabilities
Vulnerable Software
An authenticated user can supply malicious HTML and JavaScript code that will be executed in the client browser.
CVSS Score
5.4
EPSS Score
0.005
Published
2023-01-26
User’s supplied input (usually a CRLF sequence) can be used to split a returning response into two responses.
CVSS Score
6.1
EPSS Score
0.007
Published
2023-01-26
Ability to enumerate the Oracle LDAP attributes for the current user by modifying the query used by the application
CVSS Score
6.1
EPSS Score
0.006
Published
2023-01-26


Contact Us

Shodan ® - All rights reserved