• Pentest Report - ECSA
  • Document Details
    • Version History
    • Contact
  • Executive Summary
    • Target Systems
    • Timeline
  • Comprehensive Technical Report
    • Vulnerability Assessment
    • Challenges
      • [Challenge 1:] Network Scanning & Service Enumeration
      • [Challenge 2:] Microsoft Server Service Relative Path Stack Corruption
        • Risk Information
        • References
      • [Challenge 3:] Bash Remote Code Execution
        • Risk Information
        • References
      • [Challenge 4:] Weak Port Hardening
      • [Challenge 5:] freeSSHd SFTP Authentication Bypass vulnerability
        • Risk Information
        • References
      • [Challenge 6:] SQL Injection & XSS Attack
      • [Challenge 7:] Wordpress Plugin - Cross-Site Request Forgery (CSRF)
        • References
      • [Challenge 8:] SMB Psexec Vulnerability
        • Risk Information
        • References
      • [Challenge 9:] SQL Injection Vulnerability
        • Risk Information
        • References
      • [Challenge 10:] MySQL Password Bypass Vulnerability
        • Risk Information
        • References
      • [Challenge 11:] Joomla Media Manager File Upload Vulnerability
        • Risk Information
        • References
Powered by GitBook

References

References

  • http://www.securityfocus.com/bid/72620

  • http://packetstormsecurity.com/files/130104/Photo-Gallery-1.2.5-Shell-Upload.html

  • http://packetstormsecurity.com/files/130384/WordPress-Photo-Gallery-1.2.5-Unrestricted-File-Upload.html

  • CWE-352

results matching ""

    No results matching ""