Security
Headlines
HeadlinesLatestCVEs

Tag

#php

CVE-2020-36541: csalgadow / DEMOKRATIAN_votaciones - b56c48b

A vulnerability was found in Demokratian. It has been rated as critical. Affected by this issue is some unknown functionality of the file basicos_php/genera_select.php. The manipulation of the argument id_provincia with the input -1%20union%20all%20select%201,2,3,4,database() leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue.

CVE
#sql#vulnerability#web#php
CVE-2020-36540

A vulnerability, which was classified as critical, was found in Neetai Tech. Affected is an unknown function of the file /product.php. The manipulation leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

CVE-2022-31279: Laravel 9.1.8 POP chain3 · Issue #3 · 1nhann/vulns

Laravel 9.1.8, when processing attacker-controlled data for deserialization, allows Remote Code Execution (RCE) via an unserialized pop chain in __destruct in Illuminate\Broadcasting\PendingBroadcast.php and __call in Faker\Generator.php.

CVE-2022-1991: Fast Food Ordering System 1.0 Cross-Site Scripting - CYBERTHOTH - Medium

A vulnerability classified as problematic has been found in Fast Food Ordering System 1.0. Affected is the file Master.php of the Master List. The manipulation of the argument Description with the input foo "><img src="" onerror="alert(document.cookie)"> leads to cross site scripting. It is possible to launch the attack remotely but it requires authentication. Exploit details have been disclosed to the public.

CVE-2022-30927: Simple Task Scheduling System in PHP/OOP Free Source Code

A SQL injection vulnerability exists in Simple Task Scheduling System 1.0 when MySQL is being used as the application database. An attacker can issue SQL commands to the MySQL database through the vulnerable "id" parameter.

CVE-2022-28478: Responsible-Vulnerability-Disclosure/CVE-2022-28478 at main · looCiprian/Responsible-Vulnerability-Disclosure

SeedDMS 6.0.17 and 5.1.24 are vulnerable to Directory Traversal. The "Remove file" functionality inside the "Log files management" menu does not sanitize user input allowing attackers with admin privileges to delete arbitrary files on the remote system.

CVE-2022-28051: Responsible-Vulnerability-Disclosure/README.md at main · looCiprian/Responsible-Vulnerability-Disclosure

The "Add category" functionality inside the "Global Keywords" menu in "SeedDMS" version 6.0.18 and 5.1.25, is prone to stored XSS which allows an attacker to inject malicious javascript code.

CVE-2022-28479: Responsible-Vulnerability-Disclosure/CVE-2022-28479 at main · looCiprian/Responsible-Vulnerability-Disclosure

SeedDMS versions 6.0.18 and 5.1.25 and below are vulnerable to stored XSS. An attacker with admin privileges can inject the payload inside the "Role management" menu and then trigger the payload by loading the "Users management" menu

CVE-2022-31493: Tags · LibreHealth / LibreHealth EHR / LibreHealth EHR Base · GitLab

LibreHealth EHR Base 2.0.0 allows gacl/admin/acl_admin.php acl_id XSS.

CVE-2022-30861: Cross Site Scripting · Issue #24 · fudforum/FUDforum

FUDforum 3.1.2 is vulnerable to Stored XSS via Forum Name field in Forum Manager Feature.