forked from offensive-security/exploitdb
-
Notifications
You must be signed in to change notification settings - Fork 1
Expand file tree
/
Copy path27197.txt
More file actions
executable file
·8 lines (5 loc) · 527 Bytes
/
27197.txt
File metadata and controls
executable file
·8 lines (5 loc) · 527 Bytes
1
2
3
4
5
6
7
8
source: http://www.securityfocus.com/bid/16594/info
ImageVue is prone to multiple vulnerabilities, including unauthorized uploading of files with arbitrary extensions, authentication bypass, information disclosure, and content injection.
Successful exploitation could allow attackers to upload and possibly execute malicious files, gain access to restrict areas of the site, or inject hostile content into the site.
http://www.example.com/dir.php
An XML-document is shown containing all folders and their permissions.