Tag
#php
PHP Restaurants version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass and a cross site scripting vulnerability. Original discovery of SQL injection in this version is attributed to Nefrit ID in February of 2022.
Mars Stealer version 8.3 suffers from an account takeover vulnerability.
Drupal core sanitizes filenames with dangerous extensions upon upload (reference: SA-CORE-2020-012) and strips leading and trailing dots from filenames to prevent uploading server configuration files (reference: SA-CORE-2019-010). However, the protections for these two vulnerabilities previously did not work correctly together. As a result, if the site were configured to allow the upload of files with an htaccess extension, these files' filenames would not be properly sanitized. This could allow bypassing the protections provided by Drupal core's default .htaccess files and possible remote code execution on Apache web servers. This issue is mitigated by the fact that it requires a field administrator to explicitly configure a file field to allow htaccess as an extension (a restricted permission), or a contributed module or custom code that overrides allowed file uploads.
Online Book Store version 1.0 suffers from a remote SQL injection vulnerability. This is a variant of the original vulnerability discovered in August of 2020 by Moaaz Taha.
CLTPHP <=6.0 is vulnerable to Unrestricted Upload of File with Dangerous Type.
CLTPHP <=6.0 is vulnerable to Unrestricted Upload of File with Dangerous Type.
CLTPHP <=6.0 is vulnerable to Directory Traversal.
CLTPHP <=6.0 is vulnerable to Directory Traversal.
CLTPHP <=6.0 is vulnerable to Improper Input Validation via application/admin/controller/Template.php.
CLTPHP <=6.0 is vulnerable to Improper Input Validation via application/admin/controller/Template.php.