GatekeeperBuster
GatekeeperBuster
Recently, our team found a reflected cross-site scripting (XSS) vulnerability The vulnerability logic is present in the file: https://github.com/tsukumijima/TVRemotePlus/blob/master/htdocs/settings.php#L1290  The `echo` directly outputs the parameter `$_POST['state']` without any sanitization....
Recently, our team found a reflected cross-site scripting (XSS) vulnerability The vulnerability logic is present in the file: [https://github.com/havok89/Hoosk/blob/master/install/index.php#L103](url)  The `echo` directly outputs the parameter `$_POST['siteURL']` without any sanitization....
Recently, our team found a reflected cross-site scripting (XSS) vulnerability The vulnerability logic is present in the file: [https://github.com/ivanlanin/kateglo/blob/master/index.php#L121]()  The `echo` directly outputs the parameter `$_GET['phrase']` without any sanitization....
Recently, our team has identified a security vulnerability within the latest version of the project that has led to the occurrence of SQL injection issues, which could potentially result in...
Recently, our team has identified a security vulnerability that has led to SQL injection issues in the latest version of the project, which could result in severe information leakage risks....
Recently, our team found a reflected cross-site scripting (XSS) vulnerability The vulnerability logic is present in the file: https://github.com/domOrielton/minimal-web-notepad/blob/master/modules/protect_form.php#L16  The `print ` directly outputs the parameter `$_GET['note']` without any...
Recently, our team found a reflected cross-site scripting (XSS) vulnerability The vulnerability logic is present in the file: https://github.com/domOrielton/minimal-web-notepad/blob/master/view.php#L27  The `print ` directly outputs the parameter `$_GET['note']` without any...
Recently, our team found a reflected cross-site scripting (XSS) vulnerability The vulnerability logic is present in the file: https://github.com/domOrielton/minimal-web-notepad/blob/master/simple.php#L61  The `print ` directly outputs the parameter `$_GET['note']` without any...
Recently, our team found a reflected cross-site scripting (XSS) vulnerability The vulnerability logic is present in the file: https://github.com/domOrielton/minimal-web-notepad/blob/master/index.php#L81  The `print ` directly outputs the parameter `$_GET['note']` without any...
Recently, our team has identified a security vulnerability that has led to an XML External Entity (XXE) injection issue in the latest version of our project, which could result in...