i2 Pros & Cons

This information is sourced from wpvulnerabilities.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Vulnerabilities

  • Input validation vulnerability in i2 Pros & Cons 1.3.1

    Open

    The i2 Pros & Cons program is vulnerable to a type of security threat called ""stored Cross-Site Scripting."" This means that in some versions of the program

    Read More