Tag
#php
CLTPHP <=6.0 is vulnerable to Unrestricted Upload of File with Dangerous Type.
CLTPHP <=6.0 is vulnerable to Unrestricted Upload of File with Dangerous Type.
CLTPHP <=6.0 is vulnerable to Directory Traversal.
CLTPHP <=6.0 is vulnerable to Directory Traversal.
CLTPHP <=6.0 is vulnerable to Improper Input Validation via application/admin/controller/Template.php.
CLTPHP <=6.0 is vulnerable to Improper Input Validation via application/admin/controller/Template.php.
CLTPHP <=6.0 is vulnerable to Cross Site Scripting (XSS) via application/home/controller/Changyan.php.
An issue was discovered in Fighting Cock Information System 1.0, which uses default credentials, but does not force nor prompt the administrators to change the credentials.
In 45 percent of engagements, attackers exploited public-facing applications to establish initial access, a significant increase from 15 percent the previous quarter.
A vulnerability was found in UCMS 1.6.0. It has been classified as problematic. This affects an unknown part of the file saddpost.php of the component Column Configuration. The manipulation of the argument strorder leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227481 was assigned to this vulnerability.