Security
Headlines
HeadlinesLatestCVEs

Headline

AccPack Khanepani 1.0 Insecure Direct Object Reference

AccPack Khanepani version 1.0 suffers from an insecure direct object reference vulnerability.

Packet Storm
#sql#xss#csrf#vulnerability#web#ios#mac#windows#apple#google#ubuntu#linux#debian#cisco#java#php#perl#auth#ruby#firefox

AccPack Khanepani 1.0 Insecure Direct Object Reference

Posted Jul 31, 2024

Authored by indoushka

AccPack Khanepani version 1.0 suffers from an insecure direct object reference vulnerability.

tags | exploit

SHA-256 | 760d2e5184238b42e8f1ba299d632f9a683af578d5af3fd433dd135eb0ceb06b

Download | Favorite | View

AccPack Khanepani 1.0 Insecure Direct Object Reference

=============================================================================================================================================| # Title     : AccPack Khanepani v1.0 IDOR Vulnerability                                                                                   || # Author    : indoushka                                                                                                                   || # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 125.0.1 (64 bits)                                                            || # Vendor    : http://webpay.com.np/#Product                                                                                               |=============================================================================================================================================poc :[+] Dorking İn Google Or Other Search Enggine.[+] Insecure Direct Object Reference : leads to the creation of a new file in the list.[+] use payload : cms/gallery/insert.php[+] http://127.0.0.1/jamiatulamanepalorgnp/cms/gallery/insert.phpGreetings to :============================================================jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * CraCkEr |==========================================================================

File Tags

  • ActiveX (933)
  • Advisory (86,223)
  • Arbitrary (16,842)
  • BBS (2,859)
  • Bypass (1,855)
  • CGI (1,033)
  • Code Execution (7,784)
  • Conference (691)
  • Cracker (844)
  • CSRF (3,384)
  • DoS (25,024)
  • Encryption (2,389)
  • Exploit (53,098)
  • File Inclusion (4,257)
  • File Upload (990)
  • Firewall (822)
  • Info Disclosure (2,885)
  • Intrusion Detection (914)
  • Java (3,141)
  • JavaScript (896)
  • Kernel (7,184)
  • Local (14,788)
  • Magazine (586)
  • Overflow (13,165)
  • Perl (1,435)
  • PHP (5,221)
  • Proof of Concept (2,381)
  • Protocol (3,724)
  • Python (1,631)
  • Remote (31,625)
  • Root (3,633)
  • Rootkit (526)
  • Ruby (631)
  • Scanner (1,657)
  • Security Tool (8,024)
  • Shell (3,273)
  • Shellcode (1,217)
  • Sniffer (902)
  • Spoof (2,275)
  • SQL Injection (16,594)
  • TCP (2,440)
  • Trojan (690)
  • UDP (904)
  • Virus (669)
  • Vulnerability (32,921)
  • Web (9,953)
  • Whitepaper (3,781)
  • x86 (967)
  • XSS (18,239)
  • Other

File Archives

  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • Older

Systems

  • AIX (429)
  • Apple (2,099)
  • BSD (377)
  • CentOS (58)
  • Cisco (1,927)
  • Debian (7,084)
  • Fedora (1,693)
  • FreeBSD (1,246)
  • Gentoo (4,534)
  • HPUX (880)
  • iOS (378)
  • iPhone (108)
  • IRIX (220)
  • Juniper (69)
  • Linux (50,580)
  • Mac OS X (691)
  • Mandriva (3,105)
  • NetBSD (256)
  • OpenBSD (489)
  • RedHat (16,432)
  • Slackware (941)
  • Solaris (1,611)
  • SUSE (1,444)
  • Ubuntu (9,710)
  • UNIX (9,432)
  • UnixWare (187)
  • Windows (6,668)
  • Other

Packet Storm: Latest News

CUPS IPP Attributes LAN Remote Code Execution