Vulnerabilities
$_POST[ 'id' ] is not escaped. populate_download_edit_form() is accessible for every registered user.
1 MIN READ
Vulnerabilities
$_POST[ 'id' ] is not escaped. populate_download_edit_form() is accessible for every registered user.
1 MIN READ
Vulnerabilities
parse_str() function is used without second param so variables are set in current scope.
1 MIN READ
Vulnerabilities
If user has at least one not dismissed notice, we have reflected XSS.
2 MIN READ
Vulnerabilities
Every registered user can change every account because `Request
2 MIN READ
Vulnerabilities
$_GET['order'] is not escaped.
1 MIN READ
Vulnerabilities
$item_id inside process_category_order() is not properly escaped. Then it's used in UPDATE statement.
2 MIN READ
Vulnerabilities
$_POST['thumbtext'] and $_POST['linkbutton'] are not escaped inside huge_it_video_gallery_ajax().
1 MIN READ
Vulnerabilities
$_GET['loginerror'] is not escaped.
1 MIN READ
From 0 to pentesting hero
The functionality of file upload is a key place where we should pay special attention to. If the attacker successfully sends and executes a malicious file, the whole server may be taken over.
12-03-2019
3 MIN READ