These vulnerabilities allow remote attackers to inject arbitrary web script or HTML, obtain sensitive information, or access intranet resources via a susceptible version of WordPress.
Continue reading...
- - -
Source: synology.com
Continue reading...
- - -
Source: synology.com