![]() ![]() This issue has been addressed in version 2.0-M4-2402. As such, an attacker gaining administrative access to the alf.io application may be able to persist access by planting an XSS payload. An administrator on the alf.io application is able to upload HTML files that trigger JavaScript payloads. Alf.io is a free and open source event attendance management system.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |