Security
Headlines
HeadlinesLatestCVEs

Headline

WordPress SeatReg 1.54.0 Open Redirection

WordPress SeatReg plugin version 1.54.0 suffers from an open redirection vulnerability.

Packet Storm
#vulnerability#web#windows#google#wordpress#php#auth#firefox
=============================================================================================================================================| # Title     : WordPress SeatReg plugin 1.54.0 open redirection Vulnerability                                                              || # Author    : indoushka                                                                                                                   || # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 128.0.3 (64 bits)                                                            || # Vendor    : https://wordpress.org/plugins/seatreg/                                                                                      |=============================================================================================================================================poc :[+] Dorking İn Google Or Other Search Enggine.[+] An Open Redirection is a vulnerability when a web application or server    uses an unvalidated user-submitted link to redirect the user to a given    website or page.[+] USe Payload : new-registration-name=dedeed&action=seatreg_create_submit&seatreg-admin-nonce=11b1308e8a&*_wp_http_referer=https://evil.com[+] POST /wp-admin/admin-post.php HTTP/1.1Greetings to :============================================================jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * CraCkEr |==========================================================================

Packet Storm: Latest News

Scapy Packet Manipulation Tool 2.6.1