Multiple vulnerabilities allow remote authenticated users to inject arbitrary web script or HTML or bypass security constraint via a susceptible version of WordPress.
Continue reading...
- - -
Source: synology.com
Continue reading...
- - -
Source: synology.com