Vulnerabilities
$_POST[ 'id' ] is not escaped. populate_download_edit_form() is accessible for every registered user.
1 MIN READ
Vulnerabilities
$_POST[ 'id' ] is not escaped. populate_download_edit_form() is accessible for every registered user.
1 MIN READ
Vulnerabilities
parse_str() function is used without second param so variables are set in current scope.
1 MIN READ
Vulnerabilities
If user has at least one not dismissed notice, we have reflected XSS.
2 MIN READ
Vulnerabilities
Every registered user can change every account because `Request
2 MIN READ
Vulnerabilities
$_GET['order'] is not escaped.
1 MIN READ
Vulnerabilities
$item_id inside process_category_order() is not properly escaped. Then it's used in UPDATE statement.
2 MIN READ
Vulnerabilities
$_POST['thumbtext'] and $_POST['linkbutton'] are not escaped inside huge_it_video_gallery_ajax().
1 MIN READ
Vulnerabilities
$_GET['loginerror'] is not escaped.
1 MIN READ
From 0 to pentesting hero
Can you expand the potential attack vector for a larger number of applications?
03-04-2019
3 MIN READ