PeTrO

2 exploits Active since Jan 2007
CVE-2007-1192 EXPLOITDB python WORKING POC
Thomas R. Pasawicz HyperBook Guestbook 1.30 - Info Disclosure
Thomas R. Pasawicz HyperBook Guestbook 1.30 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download an admin password hash via a direct request for data/gbconfiguration.dat.
CVE-2007-0329 EXPLOITDB c WORKING POC
Joonas Viljanen Jv2 Folder Gallery - Path Traversal
download.php in Joonas Viljanen JV2 Folder Gallery allows remote attackers to read sensitive files via a relative pathname in the file parameter, as demonstrated by config/gallerysetup.php. NOTE: this issue might be resultant from a directory traversal vulnerability.