Narendra Bhati

11 exploits Active since Dec 2014
CVE-2014-8773 EXPLOITDB WRITEUP
MODX Revolution <2.2.15 - CSRF Bypass
MODX Revolution 2.x before 2.2.15 allows remote attackers to bypass the cross-site request forgery (CSRF) protection mechanism by (1) omitting the CSRF token or via a (2) long string in the CSRF token parameter.
CVE-2014-8774 EXPLOITDB WRITEUP
MODX Revolution <2.2.15 - XSS
Cross-site scripting (XSS) vulnerability in manager/index.php in MODX Revolution 2.x before 2.2.15 allows remote attackers to inject arbitrary web script or HTML via the context_key parameter.
CVE-2015-6568 EXPLOITDB HIGH ruby WORKING POC
Wolfcms Wolf Cms < 0.8.3 - Improper Input Validation
Wolf CMS before 0.8.3.1 allows unrestricted file rename and PHP Code Execution because admin/plugin/file_manager/browse/ (aka the filemanager) does not prevent a change of a file extension to ".php" after originally using the parameter "filename" for uploading a JPEG image. Exploitation requires a registered user who has access to upload functionality.
CVSS 8.8
CVE-2015-6567 EXPLOITDB HIGH text WRITEUP
Wolfcms Wolf Cms < 0.8.3 - Improper Input Validation
Wolf CMS before 0.8.3.1 allows unrestricted file upload and PHP Code Execution because admin/plugin/file_manager/browse/ (aka the filemanager) does not validate the parameter "filename" properly. Exploitation requires a registered user who has access to upload functionality.
CVSS 8.8
CVE-2016-4807 EXPLOITDB MEDIUM text WRITEUP
Web2py < 2.14.5 - XSS
Web2py versions 2.14.5 and below was affected by Reflected XSS vulnerability, which allows an attacker to perform an XSS attack on logged in user (admin).
CVSS 4.8
CVE-2016-4806 EXPLOITDB HIGH text WRITEUP
Web2py < 2.14.5 - Information Disclosure
Web2py versions 2.14.5 and below was affected by Local File Inclusion vulnerability, which allows a malicious intended user to read/access web server sensitive files.
CVSS 7.5
CVE-2016-4808 EXPLOITDB HIGH text WRITEUP
Web2py < 2.14.5 - CSRF
Web2py versions 2.14.5 and below was affected by CSRF (Cross Site Request Forgery) vulnerability, which allows an attacker to trick a logged in user to perform some unwanted actions i.e An attacker can trick an victim to disable the installed application just by sending a URL to victim.
CVSS 8.8
CVE-2015-6568 EXPLOITDB HIGH text WRITEUP
Wolfcms Wolf Cms < 0.8.3 - Improper Input Validation
Wolf CMS before 0.8.3.1 allows unrestricted file rename and PHP Code Execution because admin/plugin/file_manager/browse/ (aka the filemanager) does not prevent a change of a file extension to ".php" after originally using the parameter "filename" for uploading a JPEG image. Exploitation requires a registered user who has access to upload functionality.
CVSS 8.8
CVE-2015-1400 EXPLOITDB text WRITEUP
NPDS Revolution 13 - SQL Injection
SQL injection vulnerability in search.php in NPDS Revolution 13 allows remote attackers to execute arbitrary SQL commands via the query parameter.
CVE-2014-8775 EXPLOITDB text WRITEUP
MODX Revolution <2.2.15 - Info Disclosure
MODX Revolution 2.x before 2.2.15 does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.
CVE-2015-6567 EXPLOITDB HIGH ruby WORKING POC
Wolfcms Wolf Cms < 0.8.3 - Improper Input Validation
Wolf CMS before 0.8.3.1 allows unrestricted file upload and PHP Code Execution because admin/plugin/file_manager/browse/ (aka the filemanager) does not validate the parameter "filename" properly. Exploitation requires a registered user who has access to upload functionality.
CVSS 8.8