Vulnerability Description => Parameter tampering is a form of Web-based attack in which certain parameters in the Uniform Resource Locater (URL) or Web page form field data entered by a user are changed without that user's authorization. β‘ β‘ β‘ β‘ How to Exploit β‘ β‘ β‘ β‘ 1. Go to Bradβs Deals / VoucheCodes... Continue Reading →
PHP Scripts Mall Online Lottery PHP Readymade Script 1.7.0 has Reflected Cross-site Scripting (XSS) via the err value in a .ico picture upload:[CVE-2019-9605]
Vulnerability Description=> Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications. XSS enables attackers to inject client-side scripts into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same-origin policy. β£ β£ β£ β£ How to... Continue Reading →
PHP Scripts Mall Online Lottery PHP Readymade Script 1.7.0 has Cross-Site Request Forgery (CSRF) for Edit Profile actions:[CVE-2019-9604]
Vulnerability Description=> Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application in which they're currently authenticated. CSRF attacks specifically target state-changing requests, not theft of data, since the attacker has no way to see the response to the forged request. β β β β... Continue Reading →
PHP-Script-Mall Personal Video Collection Script has Stored XSS in edit my Profile:[CVE-2019-9606]
Vulnerability Description => Cross-site scripting is a type of computer security vulnerability typically found in web applications. XSS enables attackers to inject client-side scripts into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same-origin policy. β‘ β‘ β‘ How to Exploit... Continue Reading →
PHP Scripts Mall Medical Store Script 3.0.3 has Path Traversal:[CVE-2019-9607]
Vulnerability Description => The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of... Continue Reading →
PHP Scripts Mall PHP Appointment Booking Script has HTML injection via an edit my profile: [CVE-2019-9066]
Vulnerability Description =>HTML injection is a type of injection issue that occurs when a user is able to control an input point and is able to inject arbitrary HTML code into a vulnerable web page. This vulnerability can have many consequences, like disclosure of a user's session cookies that could be used to impersonate the... Continue Reading →
PHP Scripts Mall Custom T-Shirt Ecommerce Script has Parameter Tampering: [CVE-2019-9065]
Vulnerability Description => Parameter tampering is a form of Web-based attack in which certain parameters in the Uniform Resource Locator (URL) or Web page form field data entered by a user are changed without that user's authorization. Parameter tampering can result in product price manipulation. β β β β How to Exploit: β β β... Continue Reading →
PHP Scripts Mall Auction website script has Parameter Tampering: [CVE-2019-9063]
Vulnerability Description => Parameter tampering is a form of Web-based attack in which certain parameters in the Uniform Resource Locator (URL) or Web page form field data entered by a user are changed without that user's authorization. β β β β How to Exploit: β β β β 1. Go to Auction website script site (http://198.38.86.159/~prasanth/products/auction/)... Continue Reading →
PHP Scripts Mall Online Food Ordering Script has Cross-Site Request Forgery [CSRF] (PHP-Script-Mall):[CVE-2019-9062]
Vulnerability Description =>Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application in which they're currently authenticated. CSRF attacks specifically target state-changing requests, not theft of data since the attacker has no way to see the response to the forged request. How to exploit: Β ... Continue Reading →
IPsploit_v2 the best information gathering tool for Windows: [Made by Aniket]
Best information gathering tool for WindowsIPsploit_v2 is a small tool for penetration testers. Please Disable Denfender and antivirus when download and run the tool IMPORTANT NOTE 20 tool in one Features in IPsploit_v2 => [1] Source Code Tool [2] Nmap Tool [3] Change any text 20 types of hash value [4] Email Details [5] Whois... Continue Reading →
