Tag
#php
Improper Input Validation in GitHub repository omeka/omeka-s prior to 4.0.3.
Unrestricted Upload of File with Dangerous Type in GitHub repository omeka/omeka-s prior to 4.0.3.
This Metasploit module exploits an authenticated file upload vulnerability in Subrion CMS versions 4.2.1 and lower. The vulnerability is caused by the .htaccess file not preventing the execution of .pht, .phar, and .xhtml files. Files with these extensions are not included in the .htaccess blacklist, hence these files can be uploaded and executed to achieve remote code execution. In this module, a .phar file with a randomized name is uploaded and executed to receive a Meterpreter session on the target, then deletes itself afterwards.
WordPress EventON Calendar plugin version 4.4 suffers from an insecure direct object reference vulnerability.
WordPress Ninja Forms plugin version 3.6.25 suffers from a cross site scripting vulnerability.
COURIER DEPRIXA version 2.5 suffers from a cross site request forgery vulnerability.
Webedition CMS version 2.9.8.8 suffers from a persistent cross site scripting vulnerability.
Webedition CMS version 2.9.8.8 suffers from a remote code execution vulnerability.
Webutler version 3.2 suffers from a remote shell upload vulnerability.
Cybersecurity researchers have discovered a new bunch of malicious packages on the npm package registry that are designed to exfiltrate sensitive developer information. Software supply chain firm Phylum, which first identified the "test" packages on July 31, 2023, said they "demonstrated increasing functionality and refinement," hours after which they were removed and re-uploaded under different