Tag
#php
EnemyBot DDoS botnet is rapidly weaponizing security bugs disclosed in CMS systems like WordPress plug-ins, Android devices, commercial Web servers, and other enterprise applications.
CSRF exploit requires user to open malicious email
This Metasploit module exploits an improper input validation vulnerability in MyBB versions prior to 1.8.30 to execute arbitrary code in the context of the user running the application. The MyBB Admin Control setting page calls the PHP eval function with unsanitized user input. The exploit adds a new setting, injecting the payload in the vulnerable field, and triggers its execution with a second request. Finally, it takes care of cleaning up and removes the setting. Note that authentication is required for this exploit to work and the account must have rights to add or update settings (typically, the myBB administrator role).
Fast Food Ordering System version 1.0 suffers from a persistent cross site scripting vulnerability.
Malware borrows generously from code used by other botnets such as Mirai, Qbot and Zbot.
Schneider Electric C-Bus Automation Controller (5500SHAC) version 1.10 suffers from an authenticated arbitrary command execution vulnerability. An attacker can abuse the Start-up (init) script editor and exploit the script POST parameter to insert malicious Lua script code and execute commands with root privileges that will grant full control of the device.
WordPress User Meta Lite and Pro plugin versions 2.4.3 and below suffer from a path traversal vulnerability.
Ingredient Stock Management System version 1.0 suffers from an account takeover vulnerability.
Ingredient Stock Management System version 1.0 suffers from a remote blind SQL injection vulnerability.
Fast Food Ordering System version 1.0 suffers from a remote SQL injection vulnerability.