Vulnerabilities
$_GET['tab'] is not escaped.
1 MIN READ
Vulnerabilities
$_GET['tab'] is not escaped.
1 MIN READ
Vulnerabilities
When we use word thumb at the begining of $_GET['image'] it's possible to omit preg_match() function.
1 MIN READ
Vulnerabilities
$_GET['tab'] is not escaped.
1 MIN READ
Vulnerabilities
We can read and display any external file using $_REQUEST['code'].
2 MIN READ
Vulnerabilities
$_GET['submenu'] is not escaped.
1 MIN READ
Vulnerabilities
`ShareaholicAdmin
1 MIN READ
Vulnerabilities
Name field in chat.php may be used to send XSS visible inside Webbased Operator Client.
1 MIN READ
Vulnerabilities
Anyone can run user defined function because of _call_userfunc().
1 MIN READ
From 0 to pentesting hero
Not so long ago, to make website's content appear in real time it had to be kind of simulated. For example from the level of JavaScript - by sending a request to the server every few seconds and downloading the latest content.
24-07-2019
4 MIN READ