7.5
CVSSv2

CVE-2016-1209

Published: 14/05/2016 Updated: 23/06/2016
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 756
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The Ninja Forms plugin prior to 2.9.42.1 for WordPress allows remote malicious users to conduct PHP object injection attacks via crafted serialized values in a POST request.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

ninjaforms ninja forms

Exploits

## # This module requires Metasploit: wwwmetasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::FileDropper include Msf::Exploit::Remote::HTTP::Wordpress def initialize(info = {}) ...

Github Repositories

Lab vulnérble WP + Ninja forms CVE 2016-1209 (à ne pas mettre en production)

vulnlab Lab vulnérble WP + Ninja forms CVE 2016-1209 (à ne pas mettre en production)

Metasploitable 3 and Snort rules

Please GO THROUGH THE PDF FILE Cybersecurity_base_project_2 Metasploitable 3 and Snort rules Cyber security base – Project 2 Target – Metasploitable 3 Windows Server 2008 & Ubuntu server 14 STEP 1: Run an Nmap Ping sweep scan to look for potential connected devices $ nmap -sP 19216811/24 STEP 2: Identify Target Host – 192168140 STEP 3: Run an nma