Tag
#php
The PsyRAT 0.01 malware listens on random high TCP ports 53297, 53211, 532116 and so forth. Connecting to an infected host returns a logon prompt for PASS. However, you can enter anything or nothing at all and execute commands made available by the backdoor.
Daily Habit Tracker version 1.0 suffers from an access control vulnerability.
Daily Habit Tracker version 1.0 suffers from a remote SQL injection vulnerability.
Daily Habit Tracker version 1.0 suffers from a persistent cross site scripting vulnerability.
Employee Management System version 1.0 suffers from additional remote SQL injection vulnerabilities. Original discovery of this finding is attributed to Ozlem Balci in January of 2024.
WordPress Simple Backup plugin versions prior to 2.7.10 suffer from file download and path traversal vulnerabilities.
OpenCart Core version 4.0.2.3 suffers from a remote SQL injection vulnerability.
Online Hotel Booking in PHP version 1.0 suffers from a remote blind SQL injection vulnerability.
The authentication service of the extension does not verify the OpenID Connect authentication state from the user lookup chain. Instead, the authentication service authenticates every valid frontend user from the user lookup chain, where the frontend user field “tx_oidc” is not empty. In scenarios, where either ext:felogin is active or where `$GLOBALS['TYPO3_CONF_VARS'][‘FE’][‘checkFeUserPid’]` is disabled, an attacker can login to OpenID Connect frontend user accounts by providing a valid username and any password.
Gibbon version 26.0.00 suffers from a server-side template injection vulnerability that allows for remote code execution.