<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Topics tagged with phpems]]></title><description><![CDATA[A list of topics that have been tagged with phpems]]></description><link>https://board.circlewithadot.net/tags/phpems</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 00:14:29 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/tags/phpems.rss" rel="self" type="application/rss+xml"/><pubDate>Invalid Date</pubDate><ttl>60</ttl><item><title><![CDATA[🚩 SSRF alert: CVE-2026-6573 in PHPEMS 11.0 (MEDIUM, CVSS 5.3) affects &#x2F;app&#x2F;exam&#x2F;controller&#x2F;exams.master.php via uploadfile argument.]]></title><description><![CDATA[ SSRF alert: CVE-2026-6573 in PHPEMS 11.0 (MEDIUM, CVSS 5.3) affects /app/exam/controller/exams.master.php via uploadfile argument. Exploit is public — review exposure! https://radar.offseq.com/threat/cve-2026-6573-server-side-request-forgery-in-phpem-e98897b9 #OffSeq #PHPEMS #SSRF #Vuln]]></description><link>https://board.circlewithadot.net/topic/f609ebc0-b0d5-46b6-8211-fa4c39a2691a/ssrf-alert-cve-2026-6573-in-phpems-11.0-medium-cvss-5.3-affects-app-exam-controller-exams.master.php-via-uploadfile-argument.</link><guid isPermaLink="true">https://board.circlewithadot.net/topic/f609ebc0-b0d5-46b6-8211-fa4c39a2691a/ssrf-alert-cve-2026-6573-in-phpems-11.0-medium-cvss-5.3-affects-app-exam-controller-exams.master.php-via-uploadfile-argument.</guid><dc:creator><![CDATA[offseq@infosec.exchange]]></dc:creator><pubDate>Invalid Date</pubDate></item></channel></rss>