Security
Headlines
HeadlinesLatestCVEs

Tag

#php

CVE-2022-28454: Limbas

Limbas 4.3.36.1319 is vulnerable to Cross Site Scripting (XSS).

CVE
#sql#xss#web#php#postgres
CVE-2022-27860: Footer Text

Cross-Site Request Forgery (CSRF) leading to Cross-Site Scripting (XSS) in Shea Bunge's Footer Text plugin <= 2.0.3 on WordPress.

Home Clean Service System 1.0 SQL Injection

Home Clean Service System version 1.0 suffers from a remote SQL injection vulnerability.

CVE-2022-28114: Arbitrary file deletion vulnerability · Issue #I4ZRMW · 德尚网络/DSCMS_open - Gitee.com

DSCMS v3.0 was discovered to contain an arbitrary file deletion vulnerability via /controller/Adv.php.

CVE-2022-28102: Cross-Site Scripting (XSS) - Security Issue · Issue #19 · housamz/php-mysql-admin-panel-generator

A cross-site scripting (XSS) vulnerability in PHP MySQL Admin Panel Generator v1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected at /edit-db.php.

WordPress Booking Calendar 9.1 PHP Object Injection / Insecure Deserialization

WordPress Booking Calendar plugin versions 9.1 and below suffer from PHP object injection and insecure deserialization vulnerabilities.

CVE-2022-27336

Seacms v11.6 was discovered to contain a remote code execution (RCE) vulnerability via the component /admin/weixin.php.

CVE-2022-27239: Linux CIFS Utils and Samba - Free Knowledge Base

In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.

CVE-2022-27239: Linux CIFS Utils and Samba - Free Knowledge Base

In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.

CVE-2022-1503

A vulnerability, which was classified as problematic, has been found in GetSimple CMS. Affected by this issue is the file /admin/edit.php of the Content Module. The manipulation of the argument post-content with an input like <script>alert(1)</script> leads to cross site scripting. The attack may be launched remotely but requires authentication. Expoit details have been disclosed within the advisory.