Security
Headlines
HeadlinesLatestCVEs

Tag

#php

Passion Responsive Blogging 1.0 Cross Site Scripting

Passion Responsive Blogging version 1.0 suffers from a cross site scripting vulnerability.

Packet Storm
#xss#vulnerability#mac#windows#google#php#auth#firefox
Online Survey System 1.0 Cross Site Scripting / Remote File Inclusion

Online Survey System version 1.0 suffers from cross site scripting and remote file inclusion vulnerabilities.

Online Birth Certificate System 1.0 Insecure Settings

Online Birth Certificate System version 1.0 suffers from an ignored default credential vulnerability.

Medical Card Generations System 1.0 Insecure Settings

Medical Card Generations System version 1.0 suffers from an ignored default credential vulnerability.

Emergency Ambulance Hiring Portal 1.0 WYSIWYG Code Injection

Emergency Ambulance Hiring Portal version 1.0 suffer from a WYSIWYG code injection vulnerability.

Printable Staff ID Card Creator System 1.0 Insecure Direct Object Reference

Printable Staff ID Card Creator System version 1.0 suffers from an insecure direct object reference vulnerability.

DragonRank, a Chinese-speaking SEO manipulator service provider

Cisco Talos is disclosing a new threat called “DragonRank” that primarily targets countries in Asia and a few in Europe, operating PlugX and BadIIS for search engine optimization (SEO) rank manipulation.

GHSA-f4wh-359g-4pq7: ThinkPHP deserialization vulnerability

A deserialization vulnerability in Thinkphp v6.1.3 to v8.0.4 allows attackers to execute arbitrary code.

GHSA-6j75-5wfj-gh66: Twig has a possible sandbox bypass

### Description Under some circumstances, the sandbox security checks are not run which allows user-contributed templates to bypass the sandbox restrictions. The security issue happens when all these conditions are met: * The sandbox is disabled globally; * The sandbox is enabled via a sandboxed `include()` function which references a template name (like `included.twig`) and not a `Template` or `TemplateWrapper` instance; * The included template has been loaded before the `include()` call but in a non-sandbox context (possible as the sandbox has been globally disabled). ### Resolution The patch ensures that the sandbox security checks are always run at runtime. ### Credits We would like to thank Fabien Potencier for reporting and fixing the issue.