Common Vulnerabilities and Exposures (CVE) is a critical tool for maintaining software security, providing a standardized way to track and manage vulnerabilities across systems. Organizations should regularly monitor CVE databases, assess the impact of vulnerabilities, and apply patches promptly to reduce the risk of exploitation.
CVE (Common Vulnerabilities and Exposures) is a public database that provides a standardized method for identifying, tracking, and referencing publicly disclosed security vulnerabilities in software and hardware.
Each vulnerability receives a unique identifier called a CVE ID (e.g., CVE-2023-12345), making it easier to reference specific vulnerabilities across different tools and databases.
Total Search Results: 158437
CVE ID | Description | Severity | Published Date | Affected Vendor | Action |
---|---|---|---|---|---|
CVE-2022-0554 | Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2. | Unknown | N/A | vim | |
CVE-2022-0555 | Subiquity Shows Guided Storage Passphrase in Plaintext with Read-all Permissions | Unknown | N/A | Canonical Ltd. | |
CVE-2022-0556 | A local privilege escalation vulnerability caused by incorrect permission assignment in some directories of the Zyxel AP Configurator (ZAC) version 1.1.4, which could allow an attacker to execute arbitrary code as a local administrator. | Unknown | N/A | Zyxel | |
CVE-2022-0557 | OS Command Injection in Packagist microweber/microweber prior to 1.2.11. | Unknown | N/A | microweber | |
CVE-2022-0558 | Cross-site Scripting (XSS) - Stored in Packagist microweber/microweber prior to 1.2.11. | Unknown | N/A | microweber | |
CVE-2022-0559 | Use After Free in GitHub repository radareorg/radare2 prior to 5.6.2. | Unknown | N/A | radareorg | |
CVE-2022-0560 | Open Redirect in Packagist microweber/microweber prior to 1.2.11. | Unknown | N/A | microweber | |
CVE-2022-0561 | Null source pointer passed as an argument to memcpy() function within TIFFFetchStripThing() in tif_dirread.c in libtiff versions from 3.9.0 to 4.3.0 could lead to Denial of Service via crafted TIFF file. For users that compile libtiff from sources, the fix is available with commit eecb0712. | Unknown | N/A | libtiff | |
CVE-2022-0562 | Null source pointer passed as an argument to memcpy() function within TIFFReadDirectory() in tif_dirread.c in libtiff versions from 4.0 to 4.3.0 could lead to Denial of Service via crafted TIFF file. For users that compile libtiff from sources, a fix is available with commit 561599c. | Unknown | N/A | libtiff | |
CVE-2022-0563 | A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an "INPUTRC" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4. | Unknown | N/A | n/a | |
CVE-2022-0564 | A vulnerability in Qlik Sense Enterprise on Windows could allow an remote attacker to enumerate domain user accounts. An attacker could exploit this vulnerability by sending authentication requests to an affected system. A successful exploit could allow the attacker to compare the response time that are returned by the affected system to determine which accounts are valid user accounts. Affected systems are only vulnerable if they have LDAP configured. | Unknown | N/A | Qlik Sense | |
CVE-2022-0565 | Cross-site Scripting in Packagist pimcore/pimcore prior to 10.3.1. | Unknown | N/A | pimcore | |
CVE-2022-0566 | It may be possible for an attacker to craft an email message that causes Thunderbird to perform an out-of-bounds write of one byte when processing the message. This vulnerability affects Thunderbird < 91.6.1. | Unknown | N/A | Mozilla | |
CVE-2022-0567 | A flaw was found in ovn-kubernetes. This flaw allows a system administrator or privileged attacker to create an egress network policy that bypasses existing ingress policies of other pods in a cluster, allowing network traffic to access pods that should not be reachable. This issue results in information disclosure and other attacks on other pods that should not be reachable. | Unknown | N/A | n/a | |
CVE-2022-0569 | Observable Discrepancy in Packagist snipe/snipe-it prior to v5.3.9. | Unknown | N/A | snipe | |
CVE-2022-0570 | Heap-based Buffer Overflow in Homebrew mruby prior to 3.2. | Unknown | N/A | mruby | |
CVE-2022-0571 | Cross-site Scripting (XSS) - Reflected in GitHub repository phoronix-test-suite/phoronix-test-suite prior to 10.8.2. | Unknown | N/A | phoronix-test-suite | |
CVE-2022-0572 | Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. | Unknown | N/A | vim | |
CVE-2022-0573 | JFrog Artifactory before 7.36.1 and 6.23.41, is vulnerable to Insecure Deserialization of untrusted data which can lead to DoS, Privilege Escalation and Remote Code Execution when a specially crafted request is sent by a low privileged authenticated user due to insufficient validation of a user-provided serialized object. | Unknown | N/A | JFrog | |
CVE-2022-0574 | Improper Access Control in GitHub repository publify/publify prior to 9.2.8. | Unknown | N/A | publify | |
CVE-2022-0575 | Cross-site Scripting (XSS) - Stored in Packagist librenms/librenms prior to 22.2.0. | Unknown | N/A | librenms | |
CVE-2022-0576 | Cross-site Scripting (XSS) - Generic in Packagist librenms/librenms prior to 22.1.0. | Unknown | N/A | librenms | |
CVE-2022-0577 | Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository scrapy/scrapy prior to 2.6.1. | Unknown | N/A | scrapy | |
CVE-2022-0578 | Code Injection in GitHub repository publify/publify prior to 9.2.8. | Unknown | N/A | publify | |
CVE-2022-0579 | Missing Authorization in Packagist snipe/snipe-it prior to 5.3.9. | Unknown | N/A | snipe | |
CVE-2022-0580 | Incorrect Authorization in Packagist librenms/librenms prior to 22.2.0. | Unknown | N/A | librenms | |
CVE-2022-0581 | Crash in the CMS protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial of service via packet injection or crafted capture file | Unknown | N/A | Wireshark Foundation | |
CVE-2022-0582 | Unaligned access in the CSN.1 protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial of service via packet injection or crafted capture file | Unknown | N/A | Wireshark Foundation | |
CVE-2022-0583 | Crash in the PVFS protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial of service via packet injection or crafted capture file | Unknown | N/A | Wireshark Foundation | |
CVE-2022-0585 | Large loops in multiple protocol dissectors in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allow denial of service via packet injection or crafted capture file | Unknown | N/A | Wireshark Foundation | |
CVE-2022-0586 | Infinite loop in RTMPT protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial of service via packet injection or crafted capture file | Unknown | N/A | Wireshark Foundation | |
CVE-2022-0587 | Improper Authorization in Packagist librenms/librenms prior to 22.2.0. | Unknown | N/A | librenms | |
CVE-2022-0588 | Missing Authorization in Packagist librenms/librenms prior to 22.2.0. | Unknown | N/A | librenms | |
CVE-2022-0589 | Cross-site Scripting (XSS) - Stored in Packagist librenms/librenms prior to 22.1.0. | Unknown | N/A | librenms | |
CVE-2022-0590 | The BulletProof Security WordPress plugin before 5.8 does not sanitise and escape some of its settings, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed. | Unknown | N/A | Unknown | |
CVE-2022-0591 | The FormCraft WordPress plugin before 3.8.28 does not validate the URL parameter in the formcraft3_get AJAX action, leading to SSRF issues exploitable by unauthenticated users | Unknown | N/A | Unknown | |
CVE-2022-0592 | The MapSVG WordPress plugin before 6.2.20 does not validate and escape a parameter via a REST endpoint before using it in a SQL statement, leading to a SQL Injection exploitable by unauthenticated users. | Unknown | N/A | Unknown | |
CVE-2022-0593 | The Login with phone number WordPress plugin before 1.3.7 includes a file delete.php with no form of authentication or authorization checks placed in the plugin directory, allowing unauthenticated user to remotely delete the plugin files leading to a potential Denial of Service situation. | Unknown | N/A | Unknown | |
CVE-2022-0594 | The Professional Social Sharing Buttons, Icons & Related Posts WordPress plugin before 9.7.6 does not have proper authorisation check in one of the AJAX action, available to unauthenticated (in v < 9.7.5) and author+ (in v9.7.5) users, allowing them to call it and retrieve various information such as the list of active plugins, various version like PHP, cURL, WP etc. | Unknown | N/A | Unknown | |
CVE-2022-0595 | The Drag and Drop Multiple File Upload WordPress plugin before 1.3.6.3 allows SVG files to be uploaded by default via the dnd_codedropz_upload AJAX action, which could lead to Stored Cross-Site Scripting issue | Unknown | N/A | Unknown | |
CVE-2022-0596 | Improper Validation of Specified Quantity in Input in Packagist microweber/microweber prior to 1.2.11. | Unknown | N/A | microweber | |
CVE-2022-0597 | Open Redirect in Packagist microweber/microweber prior to 1.2.11. | Unknown | N/A | microweber | |
CVE-2022-0598 | The Login with phone number WordPress plugin before 1.3.8 does not sanitise and escape plugin settings which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed. | Unknown | N/A | Unknown | |
CVE-2022-0599 | The Mapping Multiple URLs Redirect Same Page WordPress plugin through 5.8 does not sanitize and escape the mmursp_id parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting. | Unknown | N/A | Unknown | |
CVE-2022-0600 | The Conference Scheduler WordPress plugin before 2.4.3 does not sanitize and escape the tab parameter before outputting back in an admin page, leading to a Reflected Cross-Site Scripting. | Unknown | N/A | Unknown | |
CVE-2022-0601 | The Countdown, Coming Soon, Maintenance WordPress plugin before 2.2.9 does not sanitize and escape the post parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting. | Unknown | N/A | Unknown | |
CVE-2022-0602 | Cross-site Scripting (XSS) - DOM in GitHub repository tastyigniter/tastyigniter prior to 3.3.0. | Unknown | N/A | tastyigniter | |
CVE-2022-0603 | Use after free in File Manager in Google Chrome on Chrome OS prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | Unknown | N/A | ||
CVE-2022-0604 | Heap buffer overflow in Tab Groups in Google Chrome prior to 98.0.4758.102 allowed an attacker who convinced a user to install a malicious extension and engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page. | Unknown | N/A | ||
CVE-2022-0605 | Use after free in Webstore API in Google Chrome prior to 98.0.4758.102 allowed an attacker who convinced a user to install a malicious extension and convinced a user to enage in specific user interaction to potentially exploit heap corruption via a crafted HTML page. | Unknown | N/A | ||
CVE-2022-0606 | Use after free in ANGLE in Google Chrome prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | Unknown | N/A | ||
CVE-2022-0607 | Use after free in GPU in Google Chrome prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | Unknown | N/A | ||
CVE-2022-0608 | Integer overflow in Mojo in Google Chrome prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | Unknown | N/A | ||
CVE-2022-0609 | Use after free in Animation in Google Chrome prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | Unknown | N/A | ||
CVE-2022-0610 | Inappropriate implementation in Gamepad API in Google Chrome prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | Unknown | N/A | ||
CVE-2022-0611 | Missing Authorization in Packagist snipe/snipe-it prior to 5.3.11. | Unknown | N/A | snipe | |
CVE-2022-0612 | Cross-site Scripting (XSS) - Stored in Packagist remdex/livehelperchat prior to 3.93v. | Unknown | N/A | livehelperchat | |
CVE-2022-0613 | Authorization Bypass Through User-Controlled Key in NPM urijs prior to 1.19.8. | Unknown | N/A | medialize | |
CVE-2022-0614 | Use of Out-of-range Pointer Offset in Homebrew mruby prior to 3.2. | Unknown | N/A | mruby | |
CVE-2022-0615 | Use-after-free in eset_rtp kernel module used in ESET products for Linux allows potential attacker to trigger denial-of-service condition on the system. | Unknown | N/A | ESET, spol. s r.o. | |
CVE-2022-0616 | The Amelia WordPress plugin before 1.0.47 does not have CSRF check in place when deleting customers, which could allow attackers to make a logged in admin delete arbitrary customers via a CSRF attack | Unknown | N/A | Unknown | |
CVE-2022-0617 | A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2. | Unknown | N/A | n/a | |
CVE-2022-0618 | A program using swift-nio-http2 is vulnerable to a denial of service attack, caused by a network peer sending a specially crafted HTTP/2 frame. This vulnerability is caused by a logical error when parsing a HTTP/2 HEADERS or HTTP/2 PUSH_PROMISE frame where the frame contains padding information without any other data. This logical error caused confusion about the size of the frame, leading to a parsing error. This parsing error immediately crashes the entire process. Sending a HEADERS frame or PUSH_PROMISE frame with HTTP/2 padding information does not require any special permission, so any HTTP/2 connection peer may send such a frame. For clients, this means any server to which they connect may launch this attack. For servers, anyone they allow to connect to them may launch such an attack. The attack is low-effort: it takes very little resources to send an appropriately crafted frame. The impact on availability is high: receiving the frame immediately crashes the server, dropping all in-flight connections and causing the service to need to restart. It is straightforward for an attacker to repeatedly send appropriately crafted frames, so attackers require very few resources to achieve a substantial denial of service. The attack does not have any confidentiality or integrity risks in and of itself: swift-nio-http2 is parsing the frame in memory-safe code, so the crash is safe. However, sudden process crashes can lead to violations of invariants in services, so it is possible that this attack can be used to trigger an error condition that has confidentiality or integrity risks. The risk can be mitigated if untrusted peers can be prevented from communicating with the service. This mitigation is not available to many services. The issue is fixed by rewriting the parsing code to correctly handle the condition. The issue was found by automated fuzzing by oss-fuzz. | Unknown | N/A | Swift Project | |
CVE-2022-0619 | The Database Peek WordPress plugin through 1.2 does not sanitize and escape the match parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting. | Unknown | N/A | Unknown | |
CVE-2022-0620 | The Delete Old Orders WordPress plugin through 0.2 does not sanitize and escape the date parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting. | Unknown | N/A | Unknown | |
CVE-2022-0621 | The dTabs WordPress plugin through 1.4 does not sanitize and escape the tab parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting. | Unknown | N/A | Unknown | |
CVE-2022-0622 | Generation of Error Message Containing Sensitive Information in Packagist snipe/snipe-it prior to 5.3.11. | Unknown | N/A | snipe | |
CVE-2022-0623 | Out-of-bounds Read in Homebrew mruby prior to 3.2. | Unknown | N/A | mruby | |
CVE-2022-0624 | Authorization Bypass Through User-Controlled Key in GitHub repository ionicabizau/parse-path prior to 5.0.0. | Unknown | N/A | ionicabizau | |
CVE-2022-0625 | The Admin Menu Editor WordPress plugin through 1.0.4 does not sanitize and escape a parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting. | Unknown | N/A | Unknown | |
CVE-2022-0626 | The Advanced Admin Search WordPress plugin before 1.1.6 does not sanitize and escape some parameters before outputting them back in an admin page, leading to a Reflected Cross-Site Scripting. | Unknown | N/A | Unknown | |
CVE-2022-0627 | The Amelia WordPress plugin before 1.0.47 does not sanitize and escape the code parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting. | Unknown | N/A | Unknown | |
CVE-2022-0628 | The Mega Menu WordPress plugin before 3.0.8 does not sanitize and escape the _wpnonce parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting. | Unknown | N/A | Unknown | |
CVE-2022-0629 | Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. | Unknown | N/A | vim | |
CVE-2022-0630 | Out-of-bounds Read in Homebrew mruby prior to 3.2. | Unknown | N/A | mruby | |
CVE-2022-0631 | Heap-based Buffer Overflow in Homebrew mruby prior to 3.2. | Unknown | N/A | mruby | |
CVE-2022-0632 | NULL Pointer Dereference in Homebrew mruby prior to 3.2. | Unknown | N/A | mruby | |
CVE-2022-0633 | The UpdraftPlus WordPress plugin Free before 1.22.3 and Premium before 2.22.3 do not properly validate a user has the required privileges to access a backup's nonce identifier, which may allow any users with an account on the site (such as subscriber) to download the most recent site & database backup. | Unknown | N/A | UpdraftPlus | |
CVE-2022-0634 | The ThirstyAffiliates WordPress plugin before 3.10.5 lacks authorization checks in the ta_insert_external_image action, allowing a low-privilege user (with a role as low as Subscriber) to add an image from an external URL to an affiliate link. Further the plugin lacks csrf checks, allowing an attacker to trick a logged in user to perform the action by crafting a special request. | Unknown | N/A | Unknown | |
CVE-2022-0635 | Versions affected: BIND 9.18.0 When a vulnerable version of named receives a series of specific queries, the named process will eventually terminate due to a failed assertion check. | Unknown | N/A | ISC | |
CVE-2022-0636 | A denial of service vulnerability was reported in Lenovo Thin Installer prior to version 1.3.0039 that could trigger a system crash. | Unknown | N/A | Lenovo | |
CVE-2022-0637 | open redirect in pollbot (pollbot.services.mozilla.com) in versions before 1.4.6 | Unknown | N/A | n/a | |
CVE-2022-0638 | Cross-Site Request Forgery (CSRF) in Packagist microweber/microweber prior to 1.2.11. | Unknown | N/A | microweber | |
CVE-2022-0639 | Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.7. | Unknown | N/A | unshiftio | |
CVE-2022-0640 | The Pricing Table Builder WordPress plugin before 1.1.5 does not sanitize and escape the postid parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting. | Unknown | N/A | Unknown | |
CVE-2022-0641 | The Popup Like box WordPress plugin before 3.6.1 does not sanitize and escape the ays_fb_tab parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting. | Unknown | N/A | Unknown | |
CVE-2022-0642 | The JivoChat Live Chat WordPress plugin before 1.3.5.4 does not properly check CSRF tokens on POST requests to the plugins admin page, and does not sanitise some parameters, leading to a stored Cross-Site Scripting vulnerability where an attacker can trick a logged in administrator to inject arbitrary javascript. | Unknown | N/A | Unknown | |
CVE-2022-0643 | The Bank Mellat WordPress plugin through 1.3.7 does not sanitize and escape the orderId parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting. | Unknown | N/A | Unknown | |
CVE-2022-0645 | Open redirect vulnerability via endpoint authorize_and_redirect/?redirect= in GitHub repository posthog/posthog prior to 1.34.1. | Unknown | N/A | posthog | |
CVE-2022-0646 | A flaw use after free in the Linux kernel Management Component Transport Protocol (MCTP) subsystem was found in the way user triggers cancel_work_sync after the unregister_netdev during removing device. A local user could use this flaw to crash the system or escalate their privileges on the system. It is actual from Linux Kernel 5.17-rc1 (when mctp-serial.c introduced) till 5.17-rc5. | Unknown | N/A | n/a | |
CVE-2022-0647 | The Bulk Creator WordPress plugin through 1.0.1 does not sanitize and escape the post_type parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting. | Unknown | N/A | Unknown | |
CVE-2022-0648 | The Team Circle Image Slider With Lightbox WordPress plugin before 1.0.16 does not sanitize and escape the order_pos parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting. | Unknown | N/A | Unknown | |
CVE-2022-0649 | The AdRotate WordPress plugin before 5.8.23 does not escape Group Names, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed | Unknown | N/A | Unknown | |
CVE-2022-0650 | This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link TL-WR940N 3.20.1 Build 200316 Rel.34392n (5553) routers. Authentication is required to exploit this vulnerability. The specific flaw exists within the httpd service, which listens on TCP port 80 by default. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-13993. | Unknown | N/A | TP-Link | |
CVE-2022-0651 | The WP Statistics WordPress plugin is vulnerable to SQL Injection due to insufficient escaping and parameterization of the current_page_type parameter found in the ~/includes/class-wp-statistics-hits.php file which allows attackers without authentication to inject arbitrary SQL queries to obtain sensitive information, in versions up to and including 13.1.5. | Unknown | N/A | WP Statistics | |
CVE-2022-0652 | Confd log files contain local users', including root’s, SHA512crypt password hashes with insecure access permissions. This allows a local attacker to attempt off-line brute-force attacks against these password hashes in Sophos UTM before version 9.710. | Unknown | N/A | Sophos | |
CVE-2022-0653 | The Profile Builder – User Profile & User Registration Forms WordPress plugin is vulnerable to Cross-Site Scripting due to insufficient escaping and sanitization of the site_url parameter found in the ~/assets/misc/fallback-page.php file which allows attackers to inject arbitrary web scripts onto a pages that executes whenever a user clicks on a specially crafted link by an attacker. This affects versions up to and including 3.6.1. | Unknown | N/A | Cozmoslabs | |
CVE-2022-0654 | Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository fgribreau/node-request-retry prior to 7.0.0. | Unknown | N/A | fgribreau | |
CVE-2022-0656 | The Web To Print Shop : uDraw WordPress plugin before 3.3.3 does not validate the url parameter in its udraw_convert_url_to_base64 AJAX action (available to both unauthenticated and authenticated users) before using it in the file_get_contents function and returning its content base64 encoded in the response. As a result, unauthenticated users could read arbitrary files on the web server (such as /etc/passwd, wp-config.php etc) | Unknown | N/A | Unknown | |
CVE-2022-0657 | The 5 Stars Rating Funnel WordPress Plugin | RRatingg WordPress plugin before 1.2.54 does not properly sanitise, validate and escape lead ids before using them in a SQL statement via the rrtngg_delete_leads AJAX action, available to unauthenticated users, leading to an unauthenticated SQL injection issue. There is an attempt to sanitise the input, using sanitize_text_field(), however such function is not intended to prevent SQL injections. | Unknown | N/A | Unknown |
vunerability-insight.com © 2023 - 2025. All Rights Reserved.
Vulnerability Data Repositories v