Security
Headlines
HeadlinesLatestCVEs

Tag

#php

CVE-2023-4157: Escape installation title when displaying · omeka/omeka-s@8b72619

Improper Input Validation in GitHub repository omeka/omeka-s prior to 4.0.3.

CVE
#vulnerability#git#php#perl
CVE-2023-4159: Validate asset extensions as well as types · omeka/omeka-s@2a7fb26

Unrestricted Upload of File with Dangerous Type in GitHub repository omeka/omeka-s prior to 4.0.3.

Intelliants Subrion CMS 4.2.1 Remote Code Execution

This Metasploit module exploits an authenticated file upload vulnerability in Subrion CMS versions 4.2.1 and lower. The vulnerability is caused by the .htaccess file not preventing the execution of .pht, .phar, and .xhtml files. Files with these extensions are not included in the .htaccess blacklist, hence these files can be uploaded and executed to achieve remote code execution. In this module, a .phar file with a randomized name is uploaded and executed to receive a Meterpreter session on the target, then deletes itself afterwards.

WordPress EventON Calendar 4.4 Insecure Direct Object Reference

WordPress EventON Calendar plugin version 4.4 suffers from an insecure direct object reference vulnerability.

WordPress Ninja Forms 3.6.25 Cross Site Scripting

WordPress Ninja Forms plugin version 3.6.25 suffers from a cross site scripting vulnerability.

COURIER DEPRIXA 2.5 Cross Site Request Forgery

COURIER DEPRIXA version 2.5 suffers from a cross site request forgery vulnerability.

Webedition CMS 2.9.8.8 Cross Site Scripting

Webedition CMS version 2.9.8.8 suffers from a persistent cross site scripting vulnerability.

Webedition CMS 2.9.8.8 Remote Code Execution

Webedition CMS version 2.9.8.8 suffers from a remote code execution vulnerability.

Webutler 3.2 Shell Upload

Webutler version 3.2 suffers from a remote shell upload vulnerability.

Malicious npm Packages Found Exfiltrating Sensitive Data from Developers

Cybersecurity researchers have discovered a new bunch of malicious packages on the npm package registry that are designed to exfiltrate sensitive developer information. Software supply chain firm Phylum, which first identified the "test" packages on July 31, 2023, said they "demonstrated increasing functionality and refinement," hours after which they were removed and re-uploaded under different