Security
Headlines
HeadlinesLatestCVEs

Tag

#php

Form Tools 3.1.1 Cross Site Scripting

Form Tools version 3.1.1 suffers from a cross site scripting vulnerability.

Packet Storm
#xss#vulnerability#php#auth
GHSA-v6f4-jwv9-682w: class.upload.php allows cross-site scripting attacks via uploaded files

As a simple library, class.upload.php does not perform an in-depth check on uploaded files, allowing a stored XSS vulnerability when the default configuration is used. Developers must be aware of that fact and use extension whitelisting accompanied by forcing the server to always provide content-type based on the file extension. The README has been updated to include these guidelines.

WebCalendar 1.3.0 Cross Site Scripting

WebCalendar version 1.3.0 suffers from reflective and persistent cross site scripting vulnerabilities.

Exploring Imgly SDK Alternatives for Ultimate Flexibility

By Owais Sultan Imgly SDK has been a popular choice for developers seeking reliable image processing and manipulation solutions. However, in… This is a post from HackRead.com Read the original post: Exploring Imgly SDK Alternatives for Ultimate Flexibility

Lot Reservation Management System 1.0 Shell Upload

Lot Reservation Management System version 1.0 suffers from a remote shell upload vulnerability.

Lot Reservation Management System 1.0 File Disclosure

Lot Reservation Management System version 1.0 suffers from a file disclosure vulnerability.

Craft CMS 4.4.14 Remote Code Execution

This Metasploit module exploits an unauthenticated remote code execution vulnerability in Craft CMS versions 4.0.0-RC1 through 4.4.14.

Hospital Management System 4.0 XSS / Shell Upload / SQL Injection

Hospital Management System versions 4.0 and below suffer from cross site scripting, remote shell upload, and remote SQL injection vulnerabilities.

GHSA-557v-xcg6-rm5m: Potential URI resolution path traversal in the AWS SDK for PHP

### Impact Within the scope of requests to S3 object keys and/or prefixes containing a Unix double-dot, a URI path traversal is possible. The issue exists in the`buildEndpoint` method in the `RestSerializer` component of the AWS SDK for PHP v3 prior to 3.288.1. The `buildEndpoint` method relies on the Guzzle Psr7 `UriResolver` utility, which strips dot segments from the request path in accordance with RFC 3986. Under certain conditions, this could lead to an arbitrary object being accessed. Versions of the AWS SDK for PHP v3 before 3.288.1 are affected by this issue. ### Patches Upgrade to the AWS SDK for PHP >= 3.288.1, if you are on version < 3.288.1. ### References RFC 3986 - [https://datatracker.ietf.org/doc/html/rfc3986](https://datatracker.ietf.org/doc/html/rfc3986#section-5.2.4) ### For more information If you have any questions or comments about this advisory, please contact [AWS's Security team](mailto:aws-security@amazon.com).

GHSA-q5q3-qm26-9jwm: Authenticated Blind SSRF in automad/automad

automad up to 1.10.9 is vulnerable to an authenticated blind server-side request forgery in `importUrl` as the `import` function on the `FileController.php` file was not properly validating the value of the `importUrl` argument. This issue may allow attackers to perform a port scan against the local environment or abuse some service.