diff --git a/exploits/aix/local/9306.txt b/exploits/aix/local/9306.sh old mode 100644 new mode 100755 similarity index 100% rename from exploits/aix/local/9306.txt rename to exploits/aix/local/9306.sh diff --git a/exploits/asp/webapps/4239.txt b/exploits/asp/webapps/4239.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/asp/webapps/4239.txt rename to exploits/asp/webapps/4239.py diff --git a/exploits/hardware/dos/15380.txt b/exploits/hardware/dos/15380.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/hardware/dos/15380.txt rename to exploits/hardware/dos/15380.py diff --git a/exploits/hardware/dos/8125.py b/exploits/hardware/dos/8125.py index ed2fbb9e6..f6e74c184 100755 --- a/exploits/hardware/dos/8125.py +++ b/exploits/hardware/dos/8125.py @@ -1,4 +1,4 @@ -#! /usr/bin/env python +#!/usr/bin/env python # # Copyright (c) 2009 Mobile Security Lab www.mseclab.com # diff --git a/exploits/hardware/remote/35917.txt b/exploits/hardware/remote/35917.sh old mode 100644 new mode 100755 similarity index 100% rename from exploits/hardware/remote/35917.txt rename to exploits/hardware/remote/35917.sh diff --git a/exploits/hardware/remote/37066.py b/exploits/hardware/remote/37066.py index e62f72967..72e4a3dc4 100755 --- a/exploits/hardware/remote/37066.py +++ b/exploits/hardware/remote/37066.py @@ -1,4 +1,4 @@ -#! /usr/bin/env python +#!/usr/bin/env python ''' # Exploit Title: Phoenix Contact ILC 150 ETH PLC Remote Control script # Date: 2015-05-19 diff --git a/exploits/hardware/remote/40735.txt b/exploits/hardware/remote/40735.sh old mode 100644 new mode 100755 similarity index 100% rename from exploits/hardware/remote/40735.txt rename to exploits/hardware/remote/40735.sh diff --git a/exploits/hardware/remote/40736.txt b/exploits/hardware/remote/40736.sh old mode 100644 new mode 100755 similarity index 100% rename from exploits/hardware/remote/40736.txt rename to exploits/hardware/remote/40736.sh diff --git a/exploits/hardware/webapps/29131.rb b/exploits/hardware/webapps/29131.rb index 38d86010c..9acea92e8 100755 --- a/exploits/hardware/webapps/29131.rb +++ b/exploits/hardware/webapps/29131.rb @@ -1,4 +1,4 @@ -#! /usr/bin/env ruby +#!/usr/bin/env ruby # ARRIS DG860A NVRAM Backup 'Compressor/Decompressor', it really does xor? # Gleaned from sc_mix executable in firmware dump. # diff --git a/exploits/hardware/webapps/37424.py b/exploits/hardware/webapps/37424.py index 65a89cf75..c569a98b1 100755 --- a/exploits/hardware/webapps/37424.py +++ b/exploits/hardware/webapps/37424.py @@ -1,4 +1,4 @@ -#! /usr/bin/python +#!/usr/bin/python # Exploit Title: Huawei Home Gateway password disclosure # Date: June 27, 2015 diff --git a/exploits/hardware/webapps/37425.py b/exploits/hardware/webapps/37425.py index dd28ad8fc..8550bcaf3 100755 --- a/exploits/hardware/webapps/37425.py +++ b/exploits/hardware/webapps/37425.py @@ -1,4 +1,4 @@ -#! /usr/bin/python +#!/usr/bin/python # Exploit Title: Huawei Home Gateway password change vulnerability # Date: June 27, 2015 diff --git a/exploits/hardware/webapps/38514.py b/exploits/hardware/webapps/38514.py index 4d44cf87c..49fb0d2d9 100755 --- a/exploits/hardware/webapps/38514.py +++ b/exploits/hardware/webapps/38514.py @@ -1,4 +1,4 @@ -#! /usr/bin/env python +#!/usr/bin/env python ''' # Exploit Title: Beckhoff CX9020 CPU Module Web Exploit (RCE) # Date: 2015-10-22 diff --git a/exploits/hardware/webapps/45918.py b/exploits/hardware/webapps/45918.py index 170f21793..acb93cd2c 100755 --- a/exploits/hardware/webapps/45918.py +++ b/exploits/hardware/webapps/45918.py @@ -1,4 +1,4 @@ -#! /usr/bin/env python +#!/usr/bin/env python ''' Copyright 2018 Photubias(c) # Exploit Title: Schneider Session Calculation - CVE-2017-6026 diff --git a/exploits/hardware/webapps/47380.py b/exploits/hardware/webapps/47380.py index 5e9f8dc7a..07f3a3fee 100755 --- a/exploits/hardware/webapps/47380.py +++ b/exploits/hardware/webapps/47380.py @@ -1,4 +1,4 @@ -#! /usr/bin/env python +#!/usr/bin/env python ''' # Exploit Title: eWON v13.0 Authentication Bypass # Date: 2018-10-12 diff --git a/exploits/ios/dos/37660.txt b/exploits/ios/dos/37660.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/ios/dos/37660.txt rename to exploits/ios/dos/37660.py diff --git a/exploits/jsp/webapps/42402.rb b/exploits/jsp/webapps/42402.rb index fe7f25fef..9ba15c56e 100755 --- a/exploits/jsp/webapps/42402.rb +++ b/exploits/jsp/webapps/42402.rb @@ -1,4 +1,4 @@ -#! /usr/bin/env ruby +#!/usr/bin/env ruby =begin Exploit Title: Advantech SUSIAccess RecoveryMgmt File Upload diff --git a/exploits/linux/dos/8982.txt b/exploits/linux/dos/8982.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/linux/dos/8982.txt rename to exploits/linux/dos/8982.py diff --git a/exploits/linux/local/19565.sh b/exploits/linux/local/19565.sh index 307f3947a..7a8a4b9b8 100755 --- a/exploits/linux/local/19565.sh +++ b/exploits/linux/local/19565.sh @@ -1,10 +1,10 @@ -#! /bin/sh +#!/bin/sh #source: https://www.securityfocus.com/bid/738/info # #cdwtools is a package of utilities for cd-writing. The linux version of these utilities, which ships with S.u.S.E linux 6.1 and 6.2, is vulnerable to several local root #compromises. It is known that there are a number of ways to exploit these packages, including buffer overflows and /tmp symlink attacks. # #--- cdda2x.sh --- -#! /bin/sh +#!/bin/sh # # Shell script for Linux x86 cdda2cdr exploit # Brock Tellier btellier@usa.net diff --git a/exploits/linux/local/40360.txt b/exploits/linux/local/40360.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/linux/local/40360.txt rename to exploits/linux/local/40360.py diff --git a/exploits/linux/remote/34900.py b/exploits/linux/remote/34900.py index 37efee604..f9bf22d42 100755 --- a/exploits/linux/remote/34900.py +++ b/exploits/linux/remote/34900.py @@ -1,4 +1,4 @@ -#! /usr/bin/env python +#!/usr/bin/env python from socket import * from threading import Thread import thread, time, httplib, urllib, sys diff --git a/exploits/linux/remote/42060.py b/exploits/linux/remote/42060.py index 3ae218226..7338918aa 100755 --- a/exploits/linux/remote/42060.py +++ b/exploits/linux/remote/42060.py @@ -1,4 +1,4 @@ -#! /usr/bin/env python +#!/usr/bin/env python # Title : ETERNALRED # Date: 05/24/2017 # Exploit Author: steelo diff --git a/exploits/multiple/dos/11106.bat b/exploits/multiple/dos/11106.sh old mode 100644 new mode 100755 similarity index 100% rename from exploits/multiple/dos/11106.bat rename to exploits/multiple/dos/11106.sh diff --git a/exploits/multiple/dos/14185.py b/exploits/multiple/dos/14185.py index 93910b2ea..31e4dd89e 100755 --- a/exploits/multiple/dos/14185.py +++ b/exploits/multiple/dos/14185.py @@ -1,4 +1,4 @@ -#! /usr/bin/env python +#!/usr/bin/env python # Exploit title: isc-dhcpd DoS # Date: 03/07/2010 # Author: sid diff --git a/exploits/multiple/dos/19098.txt b/exploits/multiple/dos/19098.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/multiple/dos/19098.txt rename to exploits/multiple/dos/19098.py diff --git a/exploits/multiple/dos/37766.py b/exploits/multiple/dos/37766.py index bc02961ea..8246864c8 100755 --- a/exploits/multiple/dos/37766.py +++ b/exploits/multiple/dos/37766.py @@ -1,4 +1,4 @@ -#! /usr/bin/python2 +#!/usr/bin/python2 import socket import sys diff --git a/exploits/multiple/dos/9987.txt b/exploits/multiple/dos/9987.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/multiple/dos/9987.txt rename to exploits/multiple/dos/9987.py diff --git a/exploits/multiple/remote/44552.py b/exploits/multiple/remote/44552.sh similarity index 99% rename from exploits/multiple/remote/44552.py rename to exploits/multiple/remote/44552.sh index ebed07d68..e4d1d5039 100755 --- a/exploits/multiple/remote/44552.py +++ b/exploits/multiple/remote/44552.sh @@ -1,4 +1,4 @@ -#! /bin/bash/env python3 +#!/bin/bash/env python3 # # ____ _ _ _ # / ___| ___ _ __(_) __ _| | __ _| |_ ___ _ __ diff --git a/exploits/multiple/webapps/35220.txt b/exploits/multiple/webapps/35220.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/multiple/webapps/35220.txt rename to exploits/multiple/webapps/35220.py diff --git a/exploits/osx/local/38360.txt b/exploits/osx/local/38360.sh old mode 100644 new mode 100755 similarity index 100% rename from exploits/osx/local/38360.txt rename to exploits/osx/local/38360.sh diff --git a/exploits/osx/local/8266.txt b/exploits/osx/local/8266.sh old mode 100644 new mode 100755 similarity index 100% rename from exploits/osx/local/8266.txt rename to exploits/osx/local/8266.sh diff --git a/exploits/php/dos/10242.txt b/exploits/php/dos/10242.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/dos/10242.txt rename to exploits/php/dos/10242.py diff --git a/exploits/php/dos/10243.txt b/exploits/php/dos/10243.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/dos/10243.txt rename to exploits/php/dos/10243.py diff --git a/exploits/php/dos/18305.py b/exploits/php/dos/18305.py index 9479873e3..2c70aa51b 100755 --- a/exploits/php/dos/18305.py +++ b/exploits/php/dos/18305.py @@ -1,4 +1,4 @@ -#! /usr/bin/env python +#!/usr/bin/env python """ This script was written by Christian Mehlmauer diff --git a/exploits/php/remote/34160.txt b/exploits/php/remote/34160.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/remote/34160.txt rename to exploits/php/remote/34160.py diff --git a/exploits/php/webapps/12523.txt b/exploits/php/webapps/12523.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/12523.txt rename to exploits/php/webapps/12523.py diff --git a/exploits/php/webapps/12796.txt b/exploits/php/webapps/12796.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/12796.txt rename to exploits/php/webapps/12796.py diff --git a/exploits/php/webapps/15110.txt b/exploits/php/webapps/15110.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/15110.txt rename to exploits/php/webapps/15110.py diff --git a/exploits/php/webapps/15718.txt b/exploits/php/webapps/15718.pl old mode 100644 new mode 100755 similarity index 99% rename from exploits/php/webapps/15718.txt rename to exploits/php/webapps/15718.pl index dbc8fa1ea..e67f72bcd --- a/exploits/php/webapps/15718.txt +++ b/exploits/php/webapps/15718.pl @@ -1,4 +1,4 @@ -#!usr/bin/perl +#!/usr/bin/perl #|------------------------------------------------------------------------------------------------------------------ #| -Info: # diff --git a/exploits/php/webapps/17556.txt b/exploits/php/webapps/17556.py old mode 100644 new mode 100755 similarity index 98% rename from exploits/php/webapps/17556.txt rename to exploits/php/webapps/17556.py index 2dcda449a..8b257f567 --- a/exploits/php/webapps/17556.txt +++ b/exploits/php/webapps/17556.py @@ -1,4 +1,4 @@ -#! /usr/bin/perl -w +#!/usr/bin/perl -w # Joomla Component JE Story Submit Local File Inclusion Vulnerability # Author : v3n0m diff --git a/exploits/php/webapps/17927.txt b/exploits/php/webapps/17927.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/17927.txt rename to exploits/php/webapps/17927.py diff --git a/exploits/php/webapps/20578.pl b/exploits/php/webapps/20578.py similarity index 100% rename from exploits/php/webapps/20578.pl rename to exploits/php/webapps/20578.py diff --git a/exploits/php/webapps/2175.txt b/exploits/php/webapps/2175.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/2175.txt rename to exploits/php/webapps/2175.py diff --git a/exploits/php/webapps/2343.txt b/exploits/php/webapps/2343.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/2343.txt rename to exploits/php/webapps/2343.py diff --git a/exploits/php/webapps/2373.txt b/exploits/php/webapps/2373.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/2373.txt rename to exploits/php/webapps/2373.py diff --git a/exploits/php/webapps/24959.txt b/exploits/php/webapps/24959.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/24959.txt rename to exploits/php/webapps/24959.py diff --git a/exploits/php/webapps/2522.txt b/exploits/php/webapps/2522.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/2522.txt rename to exploits/php/webapps/2522.py diff --git a/exploits/php/webapps/2533.txt b/exploits/php/webapps/2533.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/2533.txt rename to exploits/php/webapps/2533.py diff --git a/exploits/php/webapps/2605.txt b/exploits/php/webapps/2605.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/2605.txt rename to exploits/php/webapps/2605.py diff --git a/exploits/php/webapps/2606.txt b/exploits/php/webapps/2606.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/2606.txt rename to exploits/php/webapps/2606.py diff --git a/exploits/php/webapps/26521.txt b/exploits/php/webapps/26521.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/26521.txt rename to exploits/php/webapps/26521.py diff --git a/exploits/php/webapps/2681.txt b/exploits/php/webapps/2681.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/2681.txt rename to exploits/php/webapps/2681.py diff --git a/exploits/php/webapps/2751.txt b/exploits/php/webapps/2751.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/2751.txt rename to exploits/php/webapps/2751.py diff --git a/exploits/php/webapps/2818.txt b/exploits/php/webapps/2818.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/2818.txt rename to exploits/php/webapps/2818.py diff --git a/exploits/php/webapps/2884.txt b/exploits/php/webapps/2884.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/2884.txt rename to exploits/php/webapps/2884.py diff --git a/exploits/php/webapps/2896.txt b/exploits/php/webapps/2896.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/2896.txt rename to exploits/php/webapps/2896.py diff --git a/exploits/php/webapps/2905.txt b/exploits/php/webapps/2905.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/2905.txt rename to exploits/php/webapps/2905.py diff --git a/exploits/php/webapps/2984.txt b/exploits/php/webapps/2984.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/2984.txt rename to exploits/php/webapps/2984.py diff --git a/exploits/php/webapps/34681.txt b/exploits/php/webapps/34681.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/34681.txt rename to exploits/php/webapps/34681.py diff --git a/exploits/php/webapps/35543.txt b/exploits/php/webapps/35543.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/35543.txt rename to exploits/php/webapps/35543.py diff --git a/exploits/php/webapps/3614.txt b/exploits/php/webapps/3614.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/3614.txt rename to exploits/php/webapps/3614.py diff --git a/exploits/php/webapps/3670.txt b/exploits/php/webapps/3670.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/3670.txt rename to exploits/php/webapps/3670.py diff --git a/exploits/php/webapps/3681.txt b/exploits/php/webapps/3681.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/3681.txt rename to exploits/php/webapps/3681.py diff --git a/exploits/php/webapps/3778.txt b/exploits/php/webapps/3778.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/3778.txt rename to exploits/php/webapps/3778.py diff --git a/exploits/php/webapps/3833.pl b/exploits/php/webapps/3833.php old mode 100755 new mode 100644 similarity index 100% rename from exploits/php/webapps/3833.pl rename to exploits/php/webapps/3833.php diff --git a/exploits/php/webapps/4030.php b/exploits/php/webapps/4030.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/4030.php rename to exploits/php/webapps/4030.py diff --git a/exploits/php/webapps/40969.pl b/exploits/php/webapps/40969.py similarity index 100% rename from exploits/php/webapps/40969.pl rename to exploits/php/webapps/40969.py diff --git a/exploits/php/webapps/4113.pl b/exploits/php/webapps/4113.pl index b6f91bfc9..35bf9b52e 100755 --- a/exploits/php/webapps/4113.pl +++ b/exploits/php/webapps/4113.pl @@ -1,4 +1,4 @@ -#! /usr/bin/env perl +#!/usr/bin/env perl # Wordpress 2.2 and Wordpress MU <= 1.2.2 Arbitrary File Upload PoC # diff --git a/exploits/php/webapps/4169.txt b/exploits/php/webapps/4169.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/4169.txt rename to exploits/php/webapps/4169.py diff --git a/exploits/php/webapps/430.txt b/exploits/php/webapps/430.php similarity index 100% rename from exploits/php/webapps/430.txt rename to exploits/php/webapps/430.php diff --git a/exploits/php/webapps/4341.txt b/exploits/php/webapps/4341.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/4341.txt rename to exploits/php/webapps/4341.py diff --git a/exploits/php/webapps/47438.txt b/exploits/php/webapps/47438.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/47438.txt rename to exploits/php/webapps/47438.py diff --git a/exploits/php/webapps/4809.txt b/exploits/php/webapps/4809.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/4809.txt rename to exploits/php/webapps/4809.py diff --git a/exploits/php/webapps/48198.txt b/exploits/php/webapps/48198.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/48198.txt rename to exploits/php/webapps/48198.py diff --git a/exploits/php/webapps/4957.txt b/exploits/php/webapps/4957.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/4957.txt rename to exploits/php/webapps/4957.py diff --git a/exploits/php/webapps/5042.txt b/exploits/php/webapps/5042.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/5042.txt rename to exploits/php/webapps/5042.py diff --git a/exploits/php/webapps/5130.txt b/exploits/php/webapps/5130.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/5130.txt rename to exploits/php/webapps/5130.py diff --git a/exploits/php/webapps/5149.txt b/exploits/php/webapps/5149.rb old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/5149.txt rename to exploits/php/webapps/5149.rb diff --git a/exploits/php/webapps/5333.txt b/exploits/php/webapps/5333.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/5333.txt rename to exploits/php/webapps/5333.py diff --git a/exploits/php/webapps/5677.txt b/exploits/php/webapps/5677.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/5677.txt rename to exploits/php/webapps/5677.py diff --git a/exploits/php/webapps/5758.txt b/exploits/php/webapps/5758.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/5758.txt rename to exploits/php/webapps/5758.py diff --git a/exploits/php/webapps/5865.txt b/exploits/php/webapps/5865.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/5865.txt rename to exploits/php/webapps/5865.py diff --git a/exploits/php/webapps/5996.txt b/exploits/php/webapps/5996.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/5996.txt rename to exploits/php/webapps/5996.py diff --git a/exploits/php/webapps/6416.txt b/exploits/php/webapps/6416.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/6416.txt rename to exploits/php/webapps/6416.py diff --git a/exploits/php/webapps/6419.txt b/exploits/php/webapps/6419.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/6419.txt rename to exploits/php/webapps/6419.py diff --git a/exploits/php/webapps/6523.php b/exploits/php/webapps/6523.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/6523.php rename to exploits/php/webapps/6523.py diff --git a/exploits/php/webapps/6567.pl b/exploits/php/webapps/6567.pl index 5ff521e89..518c76b74 100755 --- a/exploits/php/webapps/6567.pl +++ b/exploits/php/webapps/6567.pl @@ -1,4 +1,4 @@ -#! /usr/bin/perl +#!/usr/bin/perl # -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- # Libra PHP File Manager <= 1.18 / Local File Inclusion Vulnerability diff --git a/exploits/php/webapps/6670.txt b/exploits/php/webapps/6670.py old mode 100644 new mode 100755 similarity index 99% rename from exploits/php/webapps/6670.txt rename to exploits/php/webapps/6670.py index 6ac406a00..6b92b12ca --- a/exploits/php/webapps/6670.txt +++ b/exploits/php/webapps/6670.py @@ -1,4 +1,4 @@ -#! /usr/bin/perl +#!/usr/bin/perl # -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- # FOSS Gallery Admin Version <= 1.0 / Remote Arbitrary Upload Vulnerability diff --git a/exploits/php/webapps/6687.pl b/exploits/php/webapps/6687.pl index 5df35dc5b..ce1bdb72d 100755 --- a/exploits/php/webapps/6687.pl +++ b/exploits/php/webapps/6687.pl @@ -1,4 +1,4 @@ -#! /usr/bin/perl +#!/usr/bin/perl # -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= # Yerba SACphp <= 6.3 / Local File Inclusion Exploit # -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= diff --git a/exploits/php/webapps/7114.txt b/exploits/php/webapps/7114.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/7114.txt rename to exploits/php/webapps/7114.py diff --git a/exploits/php/webapps/7476.txt b/exploits/php/webapps/7476.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/7476.txt rename to exploits/php/webapps/7476.py diff --git a/exploits/php/webapps/7544.txt b/exploits/php/webapps/7544.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/7544.txt rename to exploits/php/webapps/7544.py diff --git a/exploits/php/webapps/7705.pl b/exploits/php/webapps/7705.php old mode 100755 new mode 100644 similarity index 100% rename from exploits/php/webapps/7705.pl rename to exploits/php/webapps/7705.php diff --git a/exploits/php/webapps/8743.txt b/exploits/php/webapps/8743.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/8743.txt rename to exploits/php/webapps/8743.py diff --git a/exploits/php/webapps/8829.txt b/exploits/php/webapps/8829.pl old mode 100644 new mode 100755 similarity index 99% rename from exploits/php/webapps/8829.txt rename to exploits/php/webapps/8829.pl index 12d186b87..fdb2d9196 --- a/exploits/php/webapps/8829.txt +++ b/exploits/php/webapps/8829.pl @@ -1,4 +1,4 @@ -#!usr/bin/perl +#!/usr/bin/perl #|------------------------------------------------------------------------------------------------------------------ #| -Info: # diff --git a/exploits/php/webapps/8852.txt b/exploits/php/webapps/8852.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/8852.txt rename to exploits/php/webapps/8852.py diff --git a/exploits/php/webapps/8923.txt b/exploits/php/webapps/8923.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/8923.txt rename to exploits/php/webapps/8923.py diff --git a/exploits/php/webapps/9004.txt b/exploits/php/webapps/9004.php similarity index 100% rename from exploits/php/webapps/9004.txt rename to exploits/php/webapps/9004.php diff --git a/exploits/php/webapps/9017.txt b/exploits/php/webapps/9017.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/9017.txt rename to exploits/php/webapps/9017.py diff --git a/exploits/php/webapps/9040.txt b/exploits/php/webapps/9040.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/9040.txt rename to exploits/php/webapps/9040.py diff --git a/exploits/php/webapps/9062.txt b/exploits/php/webapps/9062.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/9062.txt rename to exploits/php/webapps/9062.py diff --git a/exploits/php/webapps/9394.pl b/exploits/php/webapps/9394.rb similarity index 100% rename from exploits/php/webapps/9394.pl rename to exploits/php/webapps/9394.rb diff --git a/exploits/php/webapps/9890.txt b/exploits/php/webapps/9890.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/php/webapps/9890.txt rename to exploits/php/webapps/9890.py diff --git a/exploits/windows/dos/11260.txt b/exploits/windows/dos/11260.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/windows/dos/11260.txt rename to exploits/windows/dos/11260.py diff --git a/exploits/windows/dos/11706.py b/exploits/windows/dos/11706.py index 312ede5d0..09969ad6f 100755 --- a/exploits/windows/dos/11706.py +++ b/exploits/windows/dos/11706.py @@ -1,4 +1,4 @@ -#! /usr/bin/python +#!/usr/bin/python # # ############################################################################# # Media Player classic StatsReader (.stats file) stack buffer Overflow poc diff --git a/exploits/windows/dos/11714.py b/exploits/windows/dos/11714.py index bc7b27de2..c81634d92 100755 --- a/exploits/windows/dos/11714.py +++ b/exploits/windows/dos/11714.py @@ -1,4 +1,4 @@ -#! /usr/bin/python +#!/usr/bin/python # # ############################################################################# # Mackeitone Media Player (.m3u file) stack buffer Overflow diff --git a/exploits/windows/dos/11955.py b/exploits/windows/dos/11955.py index 3d4a7a1ba..c82423d84 100755 --- a/exploits/windows/dos/11955.py +++ b/exploits/windows/dos/11955.py @@ -1,4 +1,4 @@ -#! /usr/bin/python +#!/usr/bin/python # # All to All Audio Convertor files stack overflow poc # ############################################################################# diff --git a/exploits/windows/dos/11966.py b/exploits/windows/dos/11966.py index 6d0b0756e..3f0b16bdf 100755 --- a/exploits/windows/dos/11966.py +++ b/exploits/windows/dos/11966.py @@ -1,4 +1,4 @@ -#! /usr/bin/python +#!/usr/bin/python # # Easy Icon Maker .ico File Reading Crash # Homepage: www.icon-maker.com diff --git a/exploits/windows/dos/12104.py b/exploits/windows/dos/12104.py index 1c334f6ea..a4e2d38ff 100755 --- a/exploits/windows/dos/12104.py +++ b/exploits/windows/dos/12104.py @@ -1,4 +1,4 @@ -#! /usr/bin/python +#!/usr/bin/python # Anyzip (.zip) 0day Poc (SEH) diff --git a/exploits/windows/dos/16203.txt b/exploits/windows/dos/16203.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/windows/dos/16203.txt rename to exploits/windows/dos/16203.py diff --git a/exploits/windows/dos/17642.txt b/exploits/windows/dos/17642.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/windows/dos/17642.txt rename to exploits/windows/dos/17642.py diff --git a/exploits/windows/dos/18200.txt b/exploits/windows/dos/18200.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/windows/dos/18200.txt rename to exploits/windows/dos/18200.py diff --git a/exploits/windows/dos/18637.txt b/exploits/windows/dos/18637.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/windows/dos/18637.txt rename to exploits/windows/dos/18637.py diff --git a/exploits/windows/dos/18654.txt b/exploits/windows/dos/18654.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/windows/dos/18654.txt rename to exploits/windows/dos/18654.py diff --git a/exploits/windows/dos/19772.txt b/exploits/windows/dos/19772.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/windows/dos/19772.txt rename to exploits/windows/dos/19772.py diff --git a/exploits/windows/dos/23279.txt b/exploits/windows/dos/23279.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/windows/dos/23279.txt rename to exploits/windows/dos/23279.py diff --git a/exploits/windows/dos/23280.txt b/exploits/windows/dos/23280.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/windows/dos/23280.txt rename to exploits/windows/dos/23280.py diff --git a/exploits/windows/dos/29613.txt b/exploits/windows/dos/29613.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/windows/dos/29613.txt rename to exploits/windows/dos/29613.py diff --git a/exploits/windows/dos/32481.txt b/exploits/windows/dos/32481.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/windows/dos/32481.txt rename to exploits/windows/dos/32481.py diff --git a/exploits/windows/dos/42002.txt b/exploits/windows/dos/42002.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/windows/dos/42002.txt rename to exploits/windows/dos/42002.py diff --git a/exploits/windows/dos/43185.pl b/exploits/windows/dos/43185.pl index 26b5132bc..79da62ba5 100755 --- a/exploits/windows/dos/43185.pl +++ b/exploits/windows/dos/43185.pl @@ -1,4 +1,4 @@ -#! /usr/bin/perl +#!/usr/bin/perl # Exploit Title: KMPlayer .nsv Denial of Service # Date: 2017-11-22 # Exploit Author: R.Yavari diff --git a/exploits/windows/dos/43186.pl b/exploits/windows/dos/43186.pl index 802dcac0e..d270115ba 100755 --- a/exploits/windows/dos/43186.pl +++ b/exploits/windows/dos/43186.pl @@ -1,4 +1,4 @@ -#! /usr/bin/perl +#!/usr/bin/perl # Exploit Title: Winamp Pro (.wav|.wmv|.au|.asf|.aiff|.aif ) Denial of Service # Date: 2017-11-22 # Exploit Author: R.Yavari diff --git a/exploits/windows/dos/6253.txt b/exploits/windows/dos/6253.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/windows/dos/6253.txt rename to exploits/windows/dos/6253.py diff --git a/exploits/windows/dos/7307.txt b/exploits/windows/dos/7307.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/windows/dos/7307.txt rename to exploits/windows/dos/7307.py diff --git a/exploits/windows/dos/7571.txt b/exploits/windows/dos/7571.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/windows/dos/7571.txt rename to exploits/windows/dos/7571.py diff --git a/exploits/windows/dos/8156.txt b/exploits/windows/dos/8156.rb old mode 100644 new mode 100755 similarity index 100% rename from exploits/windows/dos/8156.txt rename to exploits/windows/dos/8156.rb diff --git a/exploits/windows/dos/8445.pl b/exploits/windows/dos/8445.pl index 8c82ae5f9..f120cbae3 100755 --- a/exploits/windows/dos/8445.pl +++ b/exploits/windows/dos/8445.pl @@ -1,4 +1,4 @@ -#! /usr/bin/perl +#!/usr/bin/perl # # Windows Media Player (.mid file) Integer Overflow PoC # By HuoFu diff --git a/exploits/windows/dos/8465.pl b/exploits/windows/dos/8465.pl index 9c06be8eb..ae4ba21be 100755 --- a/exploits/windows/dos/8465.pl +++ b/exploits/windows/dos/8465.pl @@ -1,4 +1,4 @@ -#! /usr/bin/perl +#!/usr/bin/perl # CAL_quartz_mid_poc.pl # # MircoSoft_Media_player_quartz.dll_mid_remote_Dos POC diff --git a/exploits/windows/dos/8466.pl b/exploits/windows/dos/8466.pl index 814beb904..02cf3fa63 100755 --- a/exploits/windows/dos/8466.pl +++ b/exploits/windows/dos/8466.pl @@ -1,4 +1,4 @@ -#! /usr/bin/perl +#!/usr/bin/perl #CAL_gdiplug_poc.pl # # Mircosoft_gdiplug_png_infinity_loop_D.o.S POC diff --git a/exploits/windows/dos/8467.pl b/exploits/windows/dos/8467.pl index bb1c39613..3f3e4b1b2 100755 --- a/exploits/windows/dos/8467.pl +++ b/exploits/windows/dos/8467.pl @@ -1,4 +1,4 @@ -#! /usr/bin/perl +#!/usr/bin/perl # CAL_2_quartz_wav_poc.pl # # Two_MircoSoft_Media_player_quartz.dll_wav_remote_Dos_vulnerabilities diff --git a/exploits/windows/dos/9114.txt b/exploits/windows/dos/9114.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/windows/dos/9114.txt rename to exploits/windows/dos/9114.py diff --git a/exploits/windows/dos/9169.txt b/exploits/windows/dos/9169.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/windows/dos/9169.txt rename to exploits/windows/dos/9169.py diff --git a/exploits/windows/dos/9382.txt b/exploits/windows/dos/9382.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/windows/dos/9382.txt rename to exploits/windows/dos/9382.py diff --git a/exploits/windows/dos/9620.pl b/exploits/windows/dos/9620.pl index 2662bdbec..914bb706c 100755 --- a/exploits/windows/dos/9620.pl +++ b/exploits/windows/dos/9620.pl @@ -1,4 +1,4 @@ -#! /usr/bin/perl +#!/usr/bin/perl print qq( diff --git a/exploits/windows/local/10010.txt b/exploits/windows/local/10010.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/windows/local/10010.txt rename to exploits/windows/local/10010.py diff --git a/exploits/windows/local/11475.txt b/exploits/windows/local/11475.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/windows/local/11475.txt rename to exploits/windows/local/11475.py diff --git a/exploits/windows/local/29594.txt b/exploits/windows/local/29594.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/windows/local/29594.txt rename to exploits/windows/local/29594.py diff --git a/exploits/windows/local/44564.py b/exploits/windows/local/44564.py index 306770419..68897cb01 100755 --- a/exploits/windows/local/44564.py +++ b/exploits/windows/local/44564.py @@ -1,4 +1,4 @@ -#! /usr/bin/python +#!/usr/bin/python # Exploit Title: Malicious ODF File Creator # Date: 1st May 2018 diff --git a/exploits/windows/local/8189.txt b/exploits/windows/local/8189.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/windows/local/8189.txt rename to exploits/windows/local/8189.py diff --git a/exploits/windows/local/9550.txt b/exploits/windows/local/9550.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/windows/local/9550.txt rename to exploits/windows/local/9550.py diff --git a/exploits/windows/local/9560.txt b/exploits/windows/local/9560.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/windows/local/9560.txt rename to exploits/windows/local/9560.py diff --git a/exploits/windows/local/9579.txt b/exploits/windows/local/9579.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/windows/local/9579.txt rename to exploits/windows/local/9579.py diff --git a/exploits/windows/local/9618.php b/exploits/windows/local/9618.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/windows/local/9618.php rename to exploits/windows/local/9618.py diff --git a/exploits/windows/local/9866.txt b/exploits/windows/local/9866.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/windows/local/9866.txt rename to exploits/windows/local/9866.py diff --git a/exploits/windows/local/9884.txt b/exploits/windows/local/9884.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/windows/local/9884.txt rename to exploits/windows/local/9884.py diff --git a/exploits/windows/remote/16105.txt b/exploits/windows/remote/16105.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/windows/remote/16105.txt rename to exploits/windows/remote/16105.py diff --git a/exploits/windows/remote/17243.txt b/exploits/windows/remote/17243.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/windows/remote/17243.txt rename to exploits/windows/remote/17243.py diff --git a/exploits/windows/remote/2074.pm b/exploits/windows/remote/2074.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/windows/remote/2074.pm rename to exploits/windows/remote/2074.py diff --git a/exploits/windows/remote/2075.pm b/exploits/windows/remote/2075.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/windows/remote/2075.pm rename to exploits/windows/remote/2075.py diff --git a/exploits/windows/remote/2140.pm b/exploits/windows/remote/2140.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/windows/remote/2140.pm rename to exploits/windows/remote/2140.py diff --git a/exploits/windows/remote/3067.txt b/exploits/windows/remote/3067.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/windows/remote/3067.txt rename to exploits/windows/remote/3067.py diff --git a/exploits/windows/remote/32997.pl b/exploits/windows/remote/32997.py similarity index 100% rename from exploits/windows/remote/32997.pl rename to exploits/windows/remote/32997.py diff --git a/exploits/windows/remote/3495.txt b/exploits/windows/remote/3495.py old mode 100644 new mode 100755 similarity index 100% rename from exploits/windows/remote/3495.txt rename to exploits/windows/remote/3495.py diff --git a/exploits/windows_x86/dos/8611.pl b/exploits/windows_x86/dos/8611.pl index a87bd926d..79bb98b82 100755 --- a/exploits/windows_x86/dos/8611.pl +++ b/exploits/windows_x86/dos/8611.pl @@ -1,4 +1,4 @@ -#! /usr/bin/perl +#!/usr/bin/perl # # A client side vulnerability in the product allows remote servers to cause the client to crash by sending it a large banner. # By: Load 99% diff --git a/files_exploits.csv b/files_exploits.csv index 2db473750..79d5d666a 100644 --- a/files_exploits.csv +++ b/files_exploits.csv @@ -772,7 +772,7 @@ id,file,description,date,author,type,platform,port 6244,exploits/windows/dos/6244.js,"Microsoft Visual Studio - 'Msmask32.ocx' ActiveX Remote Buffer Overflow (PoC)",1970-01-01,Symantec,dos,windows, 6251,exploits/windows/dos/6251.txt,"ESET Smart Security 3.0.667.0 - Privilege Escalation (PoC)",1970-01-01,g_,dos,windows, 6252,exploits/multiple/dos/6252.txt,"VideoLAN VLC Media Player 0.8.6i - '.tta' File Parsing Heap Overflow (PoC)",1970-01-01,g_,dos,multiple, -6253,exploits/windows/dos/6253.txt,"EO Video 1.36 - Local Heap Overflow Denial of Service / (PoC)",1970-01-01,j0rgan,dos,windows, +6253,exploits/windows/dos/6253.py,"EO Video 1.36 - Local Heap Overflow Denial of Service / (PoC)",1970-01-01,j0rgan,dos,windows, 6257,exploits/windows/dos/6257.pl,"Ipswitch WS_FTP Home/Professional FTP Client - Remote Format String (PoC)",1970-01-01,securfrog,dos,windows, 6262,exploits/windows/dos/6262.txt,"VMware Workstation 6.5.1 - 'hcmon.sys 6.0.0.45731' Local Denial of Service",1970-01-01,g_,dos,windows, 6293,exploits/multiple/dos/6293.txt,"VideoLAN VLC Media Player 0.8.6i - Mms Protocol Handling Heap Overflow (PoC)",1970-01-01,g_,dos,multiple, @@ -868,7 +868,7 @@ id,file,description,date,author,type,platform,port 7262,exploits/windows/dos/7262.pl,"Microsoft Office - Communicator 'SIP' Remote Denial of Service",1970-01-01,"Praveen Darshanam",dos,windows, 7296,exploits/windows/dos/7296.txt,"Apple iTunes 8.0.2.20/QuickTime 7.5.5 - '.mov' Multiple Off By Overflows (PoC)",1970-01-01,"laurent gaffié",dos,windows, 7297,exploits/windows/dos/7297.py,"Cain & Abel 4.9.23 - '.rdp' Buffer Overflow (PoC)",1970-01-01,Encrypt3d.M!nd,dos,windows, -7307,exploits/windows/dos/7307.txt,"Electronics Workbench - '.ewb' Local Stack Overflow (PoC)",1970-01-01,Zigma,dos,windows, +7307,exploits/windows/dos/7307.py,"Electronics Workbench - '.ewb' Local Stack Overflow (PoC)",1970-01-01,Zigma,dos,windows, 7314,exploits/windows/dos/7314.txt,"Maxum Rumpus 6.0 - Multiple Remote Buffer Overflow Vulnerabilities",1970-01-01,"BLUE MOON",dos,windows, 7330,exploits/multiple/dos/7330.c,"ClamAV < 0.94.2 - JPEG Parsing Recursive Stack Overflow (PoC)",1970-01-01,"ilja van sprundel",dos,multiple, 7358,exploits/windows/dos/7358.html,"Visagesoft eXPert PDF EditorX - 'VSPDFEditorX.ocx' Insecure Method",1970-01-01,"Marco Torti",dos,windows, @@ -886,7 +886,7 @@ id,file,description,date,author,type,platform,port 7555,exploits/multiple/dos/7555.py,"Psi Jabber Client (Windows / Linux) - Remote Denial of Service",1970-01-01,Sha0,dos,multiple, 7556,exploits/windows/dos/7556.php,"PGP Desktop 9.0.6 - 'PGPwded.sys' Local Denial of Service",1970-01-01,Evilcry,dos,windows, 7564,exploits/multiple/dos/7564.pl,"Getleft 1.2 - Remote Buffer Overflow (PoC)",1970-01-01,Koshi,dos,multiple, -7571,exploits/windows/dos/7571.txt,"BulletProof FTP Client 2.63 - Local Heap Overflow (PoC)",1970-01-01,His0k4,dos,windows, +7571,exploits/windows/dos/7571.py,"BulletProof FTP Client 2.63 - Local Heap Overflow (PoC)",1970-01-01,His0k4,dos,windows, 7578,exploits/windows/dos/7578.pl,"SAWStudio 3.9i - '.prf' Local Buffer Overflow (PoC)",1970-01-01,Encrypt3d.M!nd,dos,windows, 7585,exploits/windows/dos/7585.txt,"Microsoft Windows Media Player - '.wav' Remote Crash (PoC)",1970-01-01,"laurent gaffié",dos,windows, 7589,exploits/windows/dos/7589.pl,"BulletProof FTP Client - '.bps' Local Stack Overflow (PoC)",1970-01-01,Stack,dos,windows, @@ -957,7 +957,7 @@ id,file,description,date,author,type,platform,port 8129,exploits/windows/dos/8129.pl,"Novell eDirectory iMonitor - 'Accept-Language' Request Buffer Overflow (PoC)",1970-01-01,"Praveen Darshanam",dos,windows, 8135,exploits/windows/dos/8135.pl,"Media Commands - '.m3u' / '.m3l' / '.TXT' / '.LRC' Local Heap Overflow (PoC)",1970-01-01,Hakxer,dos,windows, 8148,exploits/multiple/dos/8148.pl,"Yaws < 1.80 - Multiple Headers Remote Denial of Service Vulnerabilities",1970-01-01,"Praveen Darshanam",dos,multiple, -8156,exploits/windows/dos/8156.txt,"Easy Web Password 1.2 - Local Heap Memory Consumption (PoC)",1970-01-01,Stack,dos,windows, +8156,exploits/windows/dos/8156.rb,"Easy Web Password 1.2 - Local Heap Memory Consumption (PoC)",1970-01-01,Stack,dos,windows, 8163,exploits/bsd/dos/8163.txt,"Libc - 'libc:fts_*()' Local Denial of Service",1970-01-01,SecurityReason,dos,bsd, 8180,exploits/windows/dos/8180.c,"eZip Wizard 3.0 - Local Stack Buffer Overflow (PoC) (SEH)",1970-01-01,"fl0 fl0w",dos,windows, 8187,exploits/hardware/dos/8187.sh,"Addonics NAS Adapter - (Authenticated) Denial of Service",1970-01-01,h00die,dos,hardware, @@ -1080,7 +1080,7 @@ id,file,description,date,author,type,platform,port 8964,exploits/hardware/dos/8964.txt,"Netgear DG632 Router - Remote Denial of Service",1970-01-01,"Tom Neaves",dos,hardware, 8971,exploits/windows/dos/8971.pl,"Carom3D 5.06 - Unicode Buffer Overrun/Denial of Service",1970-01-01,LiquidWorm,dos,windows, 8976,exploits/multiple/dos/8976.pl,"Multiple HTTP Server - 'slowloris.pl' Low Bandwidth Denial of Service",1970-01-01,RSnake,dos,multiple, -8982,exploits/linux/dos/8982.txt,"Compface 1.5.2 - '.xbm' Local Buffer Overflow (PoC)",1970-01-01,metalhoney,dos,linux, +8982,exploits/linux/dos/8982.py,"Compface 1.5.2 - '.xbm' Local Buffer Overflow (PoC)",1970-01-01,metalhoney,dos,linux, 8991,exploits/multiple/dos/8991.php,"Multiple HTTP Server - Low Bandwidth Denial of Service (2)",1970-01-01,evilrabbi,dos,multiple, 9006,exploits/windows/dos/9006.py,"HP Data Protector 4.00-SP1b43064 - Remote Memory Leak/Denial of Service",1970-01-01,Nibin,dos,windows, 9007,exploits/windows/dos/9007.rb,"HP Data Protector 4.00-SP1b43064 - Remote Memory Leak/Denial of Service (Metasploit)",1970-01-01,Nibin,dos,windows, @@ -1095,7 +1095,7 @@ id,file,description,date,author,type,platform,port 9100,exploits/windows/dos/9100.html,"Microsoft Internet Explorer - 'AddFavorite' Remote Crash (PoC)",1970-01-01,Sberry,dos,windows, 9102,exploits/windows/dos/9102.pl,"PatPlayer 3.9 - '.m3u' Local Heap Overflow (PoC)",1970-01-01,Cyber-Zone,dos,windows, 9113,exploits/windows/dos/9113.txt,"otsAV DJ/TV/Radio - Multiple Local Heap Overflows (PoC)",1970-01-01,Stack,dos,windows, -9114,exploits/windows/dos/9114.txt,"eEye Retina WiFi Security Scanner 1.0 - '.rws Parsing' Buffer Overflow (PoC)",1970-01-01,LiquidWorm,dos,windows, +9114,exploits/windows/dos/9114.py,"eEye Retina WiFi Security Scanner 1.0 - '.rws Parsing' Buffer Overflow (PoC)",1970-01-01,LiquidWorm,dos,windows, 9116,exploits/windows/dos/9116.html,"AwingSoft Web3D Player - 'WindsPly.ocx' Remote Buffer Overflow (PoC)",1970-01-01,shinnai,dos,windows, 9123,exploits/windows/dos/9123.pl,"M3U/M3L to ASX/WPL 1.1 - '.asx' / '.m3u' / '.m3l' Local Buffer Overflow (PoC)",1970-01-01,"ThE g0bL!N",dos,windows, 9124,exploits/windows/dos/9124.pl,"Playlistmaker 1.5 - '.m3u' / '.M3L' / '.TXT' Local Stack Overflow (PoC)",1970-01-01,"ThE g0bL!N",dos,windows, @@ -1111,7 +1111,7 @@ id,file,description,date,author,type,platform,port 9163,exploits/windows/dos/9163.txt,"Microsoft Office Web Components (OWC) Spreadsheet - ActiveX Buffer Overflow (PoC)",1970-01-01,anonymous,dos,windows, 9167,exploits/windows/dos/9167.txt,"Music Tag Editor 1.61 build 212 - Remote Buffer Overflow (PoC)",1970-01-01,LiquidWorm,dos,windows, 9168,exploits/windows/dos/9168.pl,"Zortam MP3 Player 1.50 - '.m3u' Integer Division by Zero",1970-01-01,LiquidWorm,dos,windows, -9169,exploits/windows/dos/9169.txt,"Zortam MP3 Media Studio 9.40 - Multiple Memory Corruption Vulnerabilities",1970-01-01,LiquidWorm,dos,windows, +9169,exploits/windows/dos/9169.py,"Zortam MP3 Media Studio 9.40 - Multiple Memory Corruption Vulnerabilities",1970-01-01,LiquidWorm,dos,windows, 9170,exploits/windows/dos/9170.txt,"Audio Editor Pro 2.91 - Remote Memory Corruption (PoC)",1970-01-01,LiquidWorm,dos,windows, 9173,exploits/windows/dos/9173.pl,"MultiMedia Jukebox 4.0 Build 020124 - '.pst' / '.m3u' Heap Overflow (PoC)",1970-01-01,hack4love,dos,windows, 9175,exploits/multiple/dos/9175.txt,"Sguil/PADS - Remote Server Crash",1970-01-01,Ataraxia,dos,multiple, @@ -1148,7 +1148,7 @@ id,file,description,date,author,type,platform,port 9373,exploits/freebsd/dos/9373.c,"FreeBSD 7.2-RELEASE - SCTP Local Kernel Denial of Service",1970-01-01,"Shaun Colley",dos,freebsd, 9376,exploits/windows/dos/9376.py,"jetAudio 7.5.5 plus vx - '.M3U'/'.ASX'/'.WAX'/'.WVX' Local Crash (PoC)",1970-01-01,Dr_IDE,dos,windows, 9381,exploits/windows/dos/9381.py,"Groovy Media Player 1.2.0 - '.m3u' Local Buffer Overflow (PoC)",1970-01-01,"opt!x hacker",dos,windows, -9382,exploits/windows/dos/9382.txt,"ImTOO MPEG Encoder 3.1.53 - '.cue' / '.m3u' Local Buffer Overflow (PoC)",1970-01-01,"opt!x hacker",dos,windows, +9382,exploits/windows/dos/9382.py,"ImTOO MPEG Encoder 3.1.53 - '.cue' / '.m3u' Local Buffer Overflow (PoC)",1970-01-01,"opt!x hacker",dos,windows, 9392,exploits/windows/dos/9392.pl,"iRehearse - '.m3u' Local Buffer Overflow (PoC)",1970-01-01,"opt!x hacker",dos,windows, 9393,exploits/windows/dos/9393.pl,"FoxPlayer 1.1.0 - '.m3u' Local Buffer Overflow (PoC)",1970-01-01,"opt!x hacker",dos,windows, 9401,exploits/windows/dos/9401.py,"SpiceWorks 3.6 - 'Accept' Overflow Crash",1970-01-01,"David Kennedy (ReL1K)",dos,windows, @@ -1237,7 +1237,7 @@ id,file,description,date,author,type,platform,port 9969,exploits/multiple/dos/9969.txt,"Snort 2.8.5 - IPv6 Denial of Service",1970-01-01,"laurent gaffie",dos,multiple, 9971,exploits/windows/dos/9971.php,"Spider Solitaire - Denial of Service (PoC)",1970-01-01,SirGod,dos,windows, 9980,exploits/hardware/dos/9980.txt,"Websense Email Security - Denial of Service",1970-01-01,"Nikolas Sotiriu",dos,hardware, -9987,exploits/multiple/dos/9987.txt,"ZoIPer 2.22 - Call-Info Remote Denial of Service",1970-01-01,"Tomer Bitton",dos,multiple,5060 +9987,exploits/multiple/dos/9987.py,"ZoIPer 2.22 - Call-Info Remote Denial of Service",1970-01-01,"Tomer Bitton",dos,multiple,5060 9999,exploits/windows/dos/9999.txt,"Cerberus FTP server 3.0.6 - Denial of Service",1970-01-01,"Francis Provencher",dos,windows,21 10004,exploits/multiple/dos/10004.txt,"Dopewars Server 1.5.12 - Denial of Service",1970-01-01,"Doug Prostko",dos,multiple,7902 10005,exploits/windows/dos/10005.py,"Microsoft Windows 7/2008 R2 - Remote Kernel Crash",1970-01-01,"laurent gaffie",dos,windows,445 @@ -1281,8 +1281,8 @@ id,file,description,date,author,type,platform,port 10223,exploits/windows/dos/10223.txt,"TYPSoft FTP Server 1.10 - APPE DELE Denial of Service",1970-01-01,leinakesi,dos,windows,21 10229,exploits/multiple/dos/10229.txt,"Python < 2.5.2 Imageop Module - 'imageop.crop()' Buffer Overflow",1970-01-01,"Chris Evans",dos,multiple, 10237,exploits/hardware/dos/10237.txt,"Allegro RomPager 2.10 - URL Request Denial of Service",1970-01-01,netsec,dos,hardware,80 -10242,exploits/php/dos/10242.txt,"PHP < 5.3.1 - 'MultiPart/form-data' Denial of Service",1970-01-01,Eren,dos,php, -10243,exploits/php/dos/10243.txt,"PHP - MultiPart Form-Data Denial of Service (PoC)",1970-01-01,"Bogdan Calin",dos,php, +10242,exploits/php/dos/10242.py,"PHP < 5.3.1 - 'MultiPart/form-data' Denial of Service",1970-01-01,Eren,dos,php, +10243,exploits/php/dos/10243.py,"PHP - MultiPart Form-Data Denial of Service (PoC)",1970-01-01,"Bogdan Calin",dos,php, 10257,exploits/windows/dos/10257.py,"XM Easy Professional FTP Server 5.8.0 - Denial of Service",1970-01-01,"Mert SARICA",dos,windows,21 10303,exploits/windows/dos/10303.py,"Core FTP Server 1.0 Build 319 - Denial of Service",1970-01-01,"Mert SARICA",dos,windows, 10327,exploits/multiple/dos/10327.txt,"Ghostscript 'CCITTFax' Decoding Filter - Denial of Service",1970-01-01,"Red Hat",dos,multiple, @@ -1337,7 +1337,7 @@ id,file,description,date,author,type,platform,port 11084,exploits/windows/dos/11084.pl,"Real Player - Local Crash (PoC)",1970-01-01,"D3V!L FUCKER",dos,windows, 11095,exploits/windows/dos/11095.txt,"YPOPS! 0.9.7.3 - Buffer Overflow (SEH)",1970-01-01,blake,dos,windows, 11103,exploits/windows/dos/11103.html,"VideoLAN VLC Media Player 0.8.6i - ActiveX Denial of Service (PoC)",1970-01-01,"D3V!L FUCKER & germaya_x",dos,windows, -11106,exploits/multiple/dos/11106.bat,"Nuked KLan 1.7.7 & SP4 - Denial of Service",1970-01-01,"Hamza 'MIzoZ' N",dos,multiple, +11106,exploits/multiple/dos/11106.sh,"Nuked KLan 1.7.7 & SP4 - Denial of Service",1970-01-01,"Hamza 'MIzoZ' N",dos,multiple, 11117,exploits/ios/dos/11117.py,"iOS Udisk FTP Basic Edition - Remote Denial of Service",1970-01-01,mr_me,dos,ios,8080 11125,exploits/hardware/dos/11125.pl,"SwiFTP 1.11 - Overflow (Denial of Service) (PoC)",1970-01-01,"Julien Bedard",dos,hardware,2121 11130,exploits/windows/dos/11130.pl,"Ofilter Player - 'skin.ini' Local Crash (PoC)",1970-01-01,"Rehan Ahmed",dos,windows, @@ -1368,7 +1368,7 @@ id,file,description,date,author,type,platform,port 11247,exploits/windows/dos/11247.txt,"Opera 10.10 - XML Parser Denial of Service (PoC)",1970-01-01,d3b4g,dos,windows, 11248,exploits/windows/dos/11248.pl,"Winamp 5.572 - 'whatsnew.txt' Stack Overflow (PoC)",1970-01-01,Debug,dos,windows, 11254,exploits/windows/dos/11254.pl,"P2GChinchilla HTTP Server 1.1.1 - Denial of Service",1970-01-01,"Zer0 Thunder",dos,windows, -11260,exploits/windows/dos/11260.txt,"AIC Audio Player 1.4.1.587 - Local Crash (PoC)",1970-01-01,b0telh0,dos,windows, +11260,exploits/windows/dos/11260.py,"AIC Audio Player 1.4.1.587 - Local Crash (PoC)",1970-01-01,b0telh0,dos,windows, 11265,exploits/windows/dos/11265.pl,"KOL WaveIOX 1.04 - '.wav' Local Buffer Overflow (PoC)",1970-01-01,cr4wl3r,dos,windows, 11266,exploits/windows/dos/11266.pl,"KOL Wave Player 1.0 - '.wav' Local Buffer Overflow (PoC)",1970-01-01,cr4wl3r,dos,windows, 11273,exploits/ios/dos/11273.py,"iOS Serversman 3.1.5 - HTTP Remote Denial of Service",1970-01-01,mr_me,dos,ios, @@ -1779,7 +1779,7 @@ id,file,description,date,author,type,platform,port 15346,exploits/multiple/dos/15346.c,"Platinum SDK Library - POST UPnP 'sscanf' Buffer Overflow (PoC)",1970-01-01,n00b,dos,multiple, 15356,exploits/windows/dos/15356.pl,"yPlay 2.4.5 - Denial of Service",1970-01-01,"MOHAMED ABDI",dos,windows, 15378,exploits/windows/dos/15378.py,"Sybase Advantage Data Architect - '.SQL' Format Heap Overflow",1970-01-01,d0lc3,dos,windows, -15380,exploits/hardware/dos/15380.txt,"Xerox 4595 - Denial of Service",1970-01-01,chap0,dos,hardware, +15380,exploits/hardware/dos/15380.py,"Xerox 4595 - Denial of Service",1970-01-01,chap0,dos,hardware, 15383,exploits/windows/dos/15383.c,"Rising - 'RSNTGDI.sys' Local Denial of Service",1970-01-01,ze0r,dos,windows, 15384,exploits/windows/dos/15384.c,"AVG Internet Security 9.0.851 - Local Denial of Service",1970-01-01,"Nikita Tarakanov",dos,windows, 15394,exploits/windows/dos/15394.txt,"Maxthon 3.0.18.1000 - CSS Denial of Service",1970-01-01,4n0nym0us,dos,windows, @@ -1901,7 +1901,7 @@ id,file,description,date,author,type,platform,port 16191,exploits/windows/dos/16191.pl,"Novell ZENworks 10/11 - TFTPD Remote Code Execution",1970-01-01,"Francis Provencher",dos,windows, 16192,exploits/linux/dos/16192.pl,"Novell Iprint - LPD Remote Code Execution",1970-01-01,"Francis Provencher",dos,linux, 16254,exploits/windows/dos/16254.txt,"Nitro PDF Reader 1.4.0 - Heap Memory Corruption (PoC)",1970-01-01,LiquidWorm,dos,windows, -16203,exploits/windows/dos/16203.txt,"WinMerge 2.12.4 - Project File Handling Stack Overflow",1970-01-01,LiquidWorm,dos,windows, +16203,exploits/windows/dos/16203.py,"WinMerge 2.12.4 - Project File Handling Stack Overflow",1970-01-01,LiquidWorm,dos,windows, 16216,exploits/linux/dos/16216.txt,"RedHat Linux - Stickiness of /tmp",1970-01-01,"Tavis Ormandy",dos,linux, 16230,exploits/windows/dos/16230.py,"Victory FTP Server 5.0 - Denial of Service",1970-01-01,"C4SS!0 G0M3S",dos,windows, 16234,exploits/netware/dos/16234.rb,"Novell Netware - RPC XNFS xdrDecodeString",1970-01-01,"Francis Provencher",dos,netware, @@ -2007,7 +2007,7 @@ id,file,description,date,author,type,platform,port 17618,exploits/windows/dos/17618.py,"CiscoKits 1.0 - TFTP Server 'Write Command' Denial of Service",1970-01-01,"SecPod Research",dos,windows, 17620,exploits/windows/dos/17620.txt,"threedify designer 5.0.2 - Multiple Vulnerabilities",1970-01-01,"High-Tech Bridge SA",dos,windows, 17638,exploits/windows/dos/17638.py,"LiteServe 2.81 - 'PASV' Denial of Service",1970-01-01,"Craig Freyman",dos,windows, -17642,exploits/windows/dos/17642.txt,"Acoustica Mixcraft 1.00 - Local Crash",1970-01-01,NassRawI,dos,windows, +17642,exploits/windows/dos/17642.py,"Acoustica Mixcraft 1.00 - Local Crash",1970-01-01,NassRawI,dos,windows, 17643,exploits/windows/dos/17643.pl,"Excel - SLYK Format Parsing Buffer Overrun (PoC)",1970-01-01,webDEViL,dos,windows, 17658,exploits/windows/dos/17658.py,"Simple HTTPd 1.42 - Denial of Servive",1970-01-01,G13,dos,windows, 17664,exploits/windows/dos/17664.py,"NSHC Papyrus 2.0 - Heap Overflow",1970-01-01,wh1ant,dos,windows, @@ -2091,7 +2091,7 @@ id,file,description,date,author,type,platform,port 18166,exploits/windows/dos/18166.txt,"Siemens SIMATIC WinCC Flexible (Runtime) - Multiple Vulnerabilities",1970-01-01,"Luigi Auriemma",dos,windows, 18173,exploits/windows/dos/18173.pl,"Bugbear FlatOut 2005 - '.bed' File Buffer Overflow",1970-01-01,Silent_Dream,dos,windows, 18188,exploits/windows/dos/18188.txt,"Hillstone Software HS TFTP Server 1.3.2 - Denial of Service",1970-01-01,"SecPod Research",dos,windows, -18200,exploits/windows/dos/18200.txt,"SopCast 3.4.7 - 'sop://' URI Handling Remote Stack Buffer Overflow (PoC)",1970-01-01,LiquidWorm,dos,windows, +18200,exploits/windows/dos/18200.py,"SopCast 3.4.7 - 'sop://' URI Handling Remote Stack Buffer Overflow (PoC)",1970-01-01,LiquidWorm,dos,windows, 18196,exploits/windows/dos/18196.py,"NJStar Communicator MiniSmtp - Buffer Overflow (ASLR Bypass)",1970-01-01,Zune,dos,windows, 18199,exploits/hardware/dos/18199.pl,"D-Link DNS-320 ShareCenter - Remote Reboot/Shutdown/Reset (Denial of Service)",1970-01-01,rigan,dos,hardware, 18220,exploits/windows/dos/18220.py,"CyberLink (Multiple Products) - File Project Handling Stack Buffer Overflow (PoC)",1970-01-01,modpr0be,dos,windows, @@ -2166,10 +2166,10 @@ id,file,description,date,author,type,platform,port 18630,exploits/android/dos/18630.txt,"Android FTPServer 1.9.0 - Remote Denial of Service",1970-01-01,G13,dos,android, 18633,exploits/windows/dos/18633.txt,"Adobe Photoshop 12.1 - '.tiff' Parsing Use-After-Free",1970-01-01,"Francis Provencher",dos,windows, 18636,exploits/windows/dos/18636.txt,"Oreans Themida 2.1.8.0 - '.TMD' File Handling Buffer Overflow",1970-01-01,LiquidWorm,dos,windows, -18637,exploits/windows/dos/18637.txt,"Oreans WinLicense 2.1.8.0 - XML File Handling Memory Corruption",1970-01-01,LiquidWorm,dos,windows, +18637,exploits/windows/dos/18637.py,"Oreans WinLicense 2.1.8.0 - XML File Handling Memory Corruption",1970-01-01,LiquidWorm,dos,windows, 18641,exploits/windows/dos/18641.txt,"Cisco Linksys WVC200 Wireless-G PTZ Internet Video Camera PlayerPT - ActiveX Control PlayerPT.ocx sprintf Buffer Overflow (PoC)",1970-01-01,rgod,dos,windows, 18643,exploits/windows/dos/18643.py,"Ricoh DC Software DL-10 SR10 FTP Server (SR10.exe) 1.1.0.6 - Remote Buffer Overflow",1970-01-01,"Julien Ahrens",dos,windows, -18654,exploits/windows/dos/18654.txt,"Spotify 0.8.2.610 - search func Memory Exhaustion",1970-01-01,LiquidWorm,dos,windows, +18654,exploits/windows/dos/18654.py,"Spotify 0.8.2.610 - search func Memory Exhaustion",1970-01-01,LiquidWorm,dos,windows, 18661,exploits/windows/dos/18661.txt,"RealPlayer - '.mp4' file handling memory Corruption",1970-01-01,"Senator of Pirates",dos,windows, 18665,exploits/multiple/dos/18665.py,"PHP 5.4.0 Built-in Web Server - Denial of Service (PoC)",1970-01-01,ls,dos,multiple, 18671,exploits/windows/dos/18671.pl,"KnFTPd 1.0.0 - 'FEAT' Denial of Service (PoC)",1970-01-01,"Stefan Schurtz",dos,windows, @@ -2235,7 +2235,7 @@ id,file,description,date,author,type,platform,port 19082,exploits/linux/dos/19082.txt,"AMD K6 Processor - Denial of Service",1970-01-01,Poulot-Cazajous,dos,linux, 19085,exploits/linux/dos/19085.c,"Linux Kernel 2.0/2.1 - Send a SIGIO Signal To Any Process",1970-01-01,"David Luyer",dos,linux, 19089,exploits/windows/dos/19089.txt,"Microsoft Windows OpenType Font - File Format Denial of Service",1970-01-01,Cr4sh,dos,windows, -19098,exploits/multiple/dos/19098.txt,"Apple iTunes 10.6.1.7 - '.m3u' Walking Heap Buffer Overflow (PoC)",1970-01-01,LiquidWorm,dos,multiple, +19098,exploits/multiple/dos/19098.py,"Apple iTunes 10.6.1.7 - '.m3u' Walking Heap Buffer Overflow (PoC)",1970-01-01,LiquidWorm,dos,multiple, 19103,exploits/linux/dos/19103.c,"HP HP-UX 10.34 / Microsoft Windows 95/NT 3.5.1 SP1/NT 3.5.1 SP2/NT 3.5.1 SP3/NT 3.5.1 SP4/NT 4.0/NT 4.0 SP1/NT 4.0 SP2/NT 4.0 SP3 - Denial of Service",1970-01-01,"G P R",dos,linux, 19385,exploits/windows/dos/19385.txt,"IrfanView 4.33 - '.DJVU' Image Processing Heap Overflow",1970-01-01,"Francis Provencher",dos,windows, 19117,exploits/bsd/dos/19117.c,"Linux Kernel 2.0/2.1 (Digital UNIX 4.0 D / FreeBSD 2.2.4 / HP HP-UX 10.20/11.0 / IBM AIX 3.2.5 / NetBSD 1.2 / Solaris 2.5.1) - Smurf Denial of Service",1970-01-01,"T. Freak",dos,bsd, @@ -2357,7 +2357,7 @@ id,file,description,date,author,type,platform,port 19759,exploits/windows/dos/19759.c,"Microsoft Windows Media Services 4.0/4.1 - Handshake Sequence Denial of Service",1970-01-01,"Kit Knox",dos,windows, 19760,exploits/windows/dos/19760.txt,"Pragma Systems InterAccess TelnetD Server 4.0 - Terminal Configuration",1970-01-01,"Ussr Labs",dos,windows, 19766,exploits/hardware/dos/19766.txt,"Nortel Networks Nautica Marlin - Denial of Service",1970-01-01,"Christophe GRENIER",dos,hardware, -19772,exploits/windows/dos/19772.txt,"WaveSurfer 1.8.8p4 - Memory Corruption (PoC)",1970-01-01,"Jean Pascal Pereira",dos,windows, +19772,exploits/windows/dos/19772.py,"WaveSurfer 1.8.8p4 - Memory Corruption (PoC)",1970-01-01,"Jean Pascal Pereira",dos,windows, 19777,exploits/windows/dos/19777.txt,"Microsoft Internet Explorer 9 / SharePoint / Lync - toStaticHTML HTML Sanitizing Bypass (MS12-037/MS12-039/MS12-050)",1970-01-01,"Adi Cohen",dos,windows, 19780,exploits/multiple/dos/19780.txt,"Trend Micro OfficeScan Corporate Edition 3.0/3.5/3.11/3.13 - Denial of Service",1970-01-01,"Jeff Stevens",dos,multiple, 19782,exploits/windows/dos/19782.pl,"HP OpenView OmniBack II 2.55/3.0/3.1 - Denial of Service",1970-01-01,"Jon Hittner",dos,windows, @@ -3018,8 +3018,8 @@ id,file,description,date,author,type,platform,port 23276,exploits/multiple/dos/23276.java,"Sun Java Virtual Machine 1.x - Slash Path Security Model Circumvention",1970-01-01,"Last Stage of Delirium",dos,multiple, 23388,exploits/windows/dos/23388.txt,"Valve Software Half-Life Dedicated Server 3.1/4.1 - Information Disclosure/Denial of Service",1970-01-01,3APA3A,dos,windows, 23389,exploits/openbsd/dos/23389.c,"OpenBSD 3.3/3.4 - 'sysctl' Local Denial of Service",1970-01-01,anonymous,dos,openbsd, -23279,exploits/windows/dos/23279.txt,"DIMIN Viewer 5.4.0 - Crash (PoC)",1970-01-01,"Jean Pascal Pereira",dos,windows, -23280,exploits/windows/dos/23280.txt,"FreeVimager 4.1.0 - Crash (PoC)",1970-01-01,"Jean Pascal Pereira",dos,windows, +23279,exploits/windows/dos/23279.py,"DIMIN Viewer 5.4.0 - Crash (PoC)",1970-01-01,"Jean Pascal Pereira",dos,windows, +23280,exploits/windows/dos/23280.py,"FreeVimager 4.1.0 - Crash (PoC)",1970-01-01,"Jean Pascal Pereira",dos,windows, 23314,exploits/multiple/dos/23314.c,"Serious Sam Engine 1.0.5 - Remote Denial of Service",1970-01-01,"Luigi Auriemma",dos,multiple, 23288,exploits/windows/dos/23288.txt,"IrfanView 4.33 - 'IMXCF.dll' Plugin Code Execution",1970-01-01,beford,dos,windows, 23292,exploits/multiple/dos/23292.java,"Sun Microsystems Java Virtual Machine 1.x - Security Manager Denial of Service",1970-01-01,"Marc Schoenefeld",dos,multiple, @@ -3753,7 +3753,7 @@ id,file,description,date,author,type,platform,port 29558,exploits/windows/dos/29558.c,"Comodo Firewall 2.3.6 - 'CMDMon.SYS' Multiple Denial of Service Vulnerabilities",1970-01-01,"Matousec Transparent security",dos,windows, 29577,exploits/php/dos/29577.php,"PHP 5.2.1 - STR_IReplace Remote Denial of Service",1970-01-01,"Thomas Hruska",dos,php, 29607,exploits/windows/dos/29607.html,"EasyMail Objects 6.x - Connect Method Remote Stack Buffer Overflow",1970-01-01,"Paul Craig",dos,windows, -29613,exploits/windows/dos/29613.txt,"CoolPlayer+ Portable 2.19.4 - Local Buffer Overflow",1970-01-01,"Mike Czumak",dos,windows, +29613,exploits/windows/dos/29613.py,"CoolPlayer+ Portable 2.19.4 - Local Buffer Overflow",1970-01-01,"Mike Czumak",dos,windows, 29616,exploits/osx/dos/29616.xml,"Apple iTunes 7.0.2 - XML Parsing Remote Denial of Service",1970-01-01,poplix,dos,osx, 29617,exploits/windows/dos/29617.pl,"News File Grabber 4.1.0.1 - Subject Line Stack Buffer Overflow (1)",1970-01-01,"Parveen Vashishtha",dos,windows, 29618,exploits/windows/dos/29618.c,"News File Grabber 4.1.0.1 - Subject Line Stack Buffer Overflow (2)",1970-01-01,Marsu,dos,windows, @@ -4098,7 +4098,7 @@ id,file,description,date,author,type,platform,port 32472,exploits/hardware/dos/32472.txt,"Nokia Web Browser for S60 - Infinite Array Sort Denial of Service",1970-01-01,"Luca Carettoni",dos,hardware, 32477,exploits/windows/dos/32477.py,"Microsoft Windows Media Player 11.0.5721.5230 - Memory Corruption (PoC)",1970-01-01,"TUNISIAN CYBER",dos,windows, 32478,exploits/windows/dos/32478.py,"jetVideo 8.1.1 - Basic '.wav' Local Crash (PoC)",1970-01-01,"TUNISIAN CYBER",dos,windows, -32481,exploits/windows/dos/32481.txt,"Light Audio Player 1.0.14 - Memory Corruption (PoC)",1970-01-01,"TUNISIAN CYBER",dos,windows, +32481,exploits/windows/dos/32481.py,"Light Audio Player 1.0.14 - Memory Corruption (PoC)",1970-01-01,"TUNISIAN CYBER",dos,windows, 32482,exploits/windows/dos/32482.py,"GOM Media Player (GOMMP) 2.2.56.5183 - Memory Corruption (PoC)",1970-01-01,"TUNISIAN CYBER",dos,windows, 32483,exploits/windows/dos/32483.py,"GOM Video Converter 1.1.0.60 - '.wav' Memory Corruption (PoC)",1970-01-01,"TUNISIAN CYBER",dos,windows, 32519,exploits/multiple/dos/32519.txt,"Apache CouchDB 1.5.0 - 'uuids' Denial of Service",1970-01-01,"Krusty Hack",dos,multiple, @@ -4611,7 +4611,7 @@ id,file,description,date,author,type,platform,port 37612,exploits/windows/dos/37612.py,"ZOC Terminal Emulator 7 - Quick Connection Crash (PoC)",1970-01-01,"SATHISH ARTHAR",dos,windows, 37639,exploits/multiple/dos/37639.html,"Mozilla Firefox - Remote Denial of Service",1970-01-01,"Jean Pascal Pereira",dos,multiple, 37640,exploits/windows/dos/37640.pl,"Divx Player 6.8.2 - Denial of Service",1970-01-01,Dark-Puzzle,dos,windows, -37660,exploits/ios/dos/37660.txt,"Image Transfer IOS - Remote Crash (PoC)",1970-01-01,"Mohammad Reza Espargham",dos,ios, +37660,exploits/ios/dos/37660.py,"Image Transfer IOS - Remote Crash (PoC)",1970-01-01,"Mohammad Reza Espargham",dos,ios, 37663,exploits/linux/dos/37663.txt,"TcpDump - rpki_rtr_pdu_print Out-of-Bounds Denial of Service",1970-01-01,"Luke Arntson",dos,linux, 37669,exploits/windows/dos/37669.pl,"Counter-Strike 1.6 - 'GameInfo' Query Reflection Denial of Service (PoC)",1970-01-01,"Todor Donev",dos,windows, 37673,exploits/windows/dos/37673.html,"Microsoft Indexing Service - 'ixsso.dll' ActiveX Control Denial of Service",1970-01-01,coolkaveh,dos,windows, @@ -5601,7 +5601,7 @@ id,file,description,date,author,type,platform,port 41991,exploits/linux/dos/41991.py,"SAP SAPCAR 721.510 - Heap Buffer Overflow",1970-01-01,"Core Security",dos,linux, 41993,exploits/multiple/dos/41993.py,"OpenVPN 2.4.0 - Denial of Service",1970-01-01,QuarksLab,dos,multiple,1194 42001,exploits/windows/dos/42001.py,"Halliburton LogView Pro 10.0.1 - Local Buffer Overflow (SEH)",1970-01-01,Muhann4d,dos,windows, -42002,exploits/windows/dos/42002.txt,"Larson VizEx Reader 9.7.5 - Local Buffer Overflow (SEH)",1970-01-01,Muhann4d,dos,windows, +42002,exploits/windows/dos/42002.py,"Larson VizEx Reader 9.7.5 - Local Buffer Overflow (SEH)",1970-01-01,Muhann4d,dos,windows, 42006,exploits/windows/dos/42006.cpp,"Microsoft Windows 7 Kernel - Uninitialized Memory in the Default dacl Descriptor of System Processes Token",1970-01-01,"Google Security Research",dos,windows, 42007,exploits/windows/dos/42007.cpp,"Microsoft Windows 10 Kernel - 'nt!NtTraceControl (EtwpSetProviderTraits)' Pool Memory Disclosure",1970-01-01,"Google Security Research",dos,windows, 42008,exploits/windows/dos/42008.cpp,"Microsoft Windows 7 Kernel - 'win32k!xxxClientLpkDrawTextEx' Stack Memory Disclosure",1970-01-01,"Google Security Research",dos,windows, @@ -7472,7 +7472,7 @@ id,file,description,date,author,type,platform,port 8177,exploits/windows/local/8177.py,"RadASM 2.2.1.5 - '.rap' Local Stack Overflow",1970-01-01,zAx,local,windows, 8178,exploits/windows/local/8178.pl,"Mediacoder 0.6.2.4275 - '.m3u' Universal Stack Overflow",1970-01-01,Stack,local,windows, 8179,exploits/windows/local/8179.rb,"Mediacoder 0.6.2.4275 - Universal Buffer Overflow (SEH)",1970-01-01,Stack,local,windows, -8189,exploits/windows/local/8189.txt,"VUPlayer 2.49 - '.cue' Universal Buffer Overflow",1970-01-01,Stack,local,windows, +8189,exploits/windows/local/8189.py,"VUPlayer 2.49 - '.cue' Universal Buffer Overflow",1970-01-01,Stack,local,windows, 8193,exploits/windows/local/8193.py,"RainbowPlayer 0.91 - Playlist Universal Overwrite (SEH)",1970-01-01,His0k4,local,windows, 8201,exploits/windows/local/8201.pl,"Foxit Reader 3.0 (Build 1301) - PDF Universal Buffer Overflow",1970-01-01,SkD,local,windows, 8214,exploits/windows/local/8214.c,"Rosoft Media Player 4.2.1 (Windows XP SP2/3 French) - Local Buffer Overflow",1970-01-01,SimO-s0fT,local,windows, @@ -7487,7 +7487,7 @@ id,file,description,date,author,type,platform,port 8250,exploits/windows/local/8250.txt,"CloneCD/DVD 'ElbyCDIO.sys' < 6.0.3.2 - Local Privilege Escalation",1970-01-01,"NT Internals",local,windows, 8251,exploits/windows/local/8251.py,"BS.Player 2.34 - '.bsl' Universal Overwrite (SEH)",1970-01-01,His0k4,local,windows, 8261,exploits/freebsd/local/8261.c,"FreeBSD 7.0/7.1 - 'ktimer' Local Privilege Escalation",1970-01-01,mu-b,local,freebsd, -8266,exploits/osx/local/8266.txt,"Apple Mac OSX xnu 1228.x - 'hfs-fcntl' Kernel Privilege Escalation",1970-01-01,mu-b,local,osx, +8266,exploits/osx/local/8266.sh,"Apple Mac OSX xnu 1228.x - 'hfs-fcntl' Kernel Privilege Escalation",1970-01-01,mu-b,local,osx, 8267,exploits/windows/local/8267.py,"Zinf Audio Player 2.2.1 - '.pls' Universal Overwrite (SEH)",1970-01-01,His0k4,local,windows, 8270,exploits/windows/local/8270.pl,"eXeScope 6.50 - Local Buffer Overflow",1970-01-01,Koshi,local,windows, 8274,exploits/windows/local/8274.pl,"POP Peeper 3.4.0.0 - '.eml' Universal Overwrite (SEH)",1970-01-01,Stack,local,windows, @@ -7611,7 +7611,7 @@ id,file,description,date,author,type,platform,port 9301,exploits/windows/local/9301.txt,"Microsoft Windows XP - 'win32k.sys' Local Privilege Escalation",1970-01-01,"NT Internals",local,windows, 9302,exploits/linux/local/9302.py,"Compface 1.1.5 - '.xbm' Local Buffer Overflow",1970-01-01,His0k4,local,linux, 9305,exploits/windows/local/9305.txt,"EPSON Status Monitor 3 - Local Privilege Escalation",1970-01-01,Nine:Situations:Group,local,windows, -9306,exploits/aix/local/9306.txt,"IBM AIX 5.3 - 'libc' MALLOCDEBUG File Overwrite",1970-01-01,Affix,local,aix, +9306,exploits/aix/local/9306.sh,"IBM AIX 5.3 - 'libc' MALLOCDEBUG File Overwrite",1970-01-01,Affix,local,aix, 9321,exploits/windows/local/9321.pl,"Destiny Media Player 1.61 - '.pls' Universal Buffer Overflow (SEH)",1970-01-01,"ThE g0bL!N",local,windows, 9329,exploits/windows/local/9329.pl,"BlazeDVD 5.1 Professional - '.plf' Local Buffer Overflow (SEH)",1970-01-01,hack4love,local,windows, 9343,exploits/windows/local/9343.pl,"Mediacoder 0.6.2.4275 - '.lst' Local Stack Buffer Overflow",1970-01-01,SkuLL-HackeR,local,windows, @@ -7656,14 +7656,14 @@ id,file,description,date,author,type,platform,port 9543,exploits/linux/local/9543.c,"Linux Kernel < 2.6.31-rc7 - 'AF_IRDA' 29-Byte Stack Disclosure (2)",1970-01-01,"Jon Oberheide",local,linux, 9545,exploits/linux/local/9545.c,"Linux Kernel 2.4.x/2.6.x (CentOS 4.8/5.3 / RHEL 4.8/5.3 / SuSE 10 SP2/11 / Ubuntu 8.10) (PPC) - 'sock_sendpage()' Local Privilege Escalation",1970-01-01,"Ramon de C Valle",local,linux, 9548,exploits/windows/local/9548.pl,"Ultimate Player 1.56b - '.m3u' / '.upl' Universal Local Buffer Overflow (SEH)",1970-01-01,hack4love,local,windows, -9550,exploits/windows/local/9550.txt,"Hex Workshop 4.23/5.1/6.0 - '.hex' Universal Local Buffer Overflow (SEH)",1970-01-01,hack4love,local,windows, +9550,exploits/windows/local/9550.py,"Hex Workshop 4.23/5.1/6.0 - '.hex' Universal Local Buffer Overflow (SEH)",1970-01-01,hack4love,local,windows, 9551,exploits/windows/local/9551.py,"Media Jukebox 8 - '.pls' Universal Local Buffer (SEH)",1970-01-01,mr_me,local,windows, -9560,exploits/windows/local/9560.txt,"Soritong MP3 Player 1.0 - '.m3u' / UI.txt Universal Local Buffer Overflow",1970-01-01,hack4love,local,windows, +9560,exploits/windows/local/9560.py,"Soritong MP3 Player 1.0 - '.m3u' / UI.txt Universal Local Buffer Overflow",1970-01-01,hack4love,local,windows, 9567,exploits/windows/local/9567.pl,"Hamster Audio Player 0.3a - 'Associations.cfg' Local Buffer (SEH) (1)",1970-01-01,"ThE g0bL!N",local,windows, 9568,exploits/windows/local/9568.py,"akPlayer 1.9.0 - '.plt' Universal Buffer Overflow (SEH)",1970-01-01,TiGeR-Dz,local,windows, 9574,exploits/linux/local/9574.txt,"Linux Kernel < 2.6.19 (x86/x64) - 'udp_sendmsg' Local Privilege Escalation (2)",1970-01-01,spender,local,linux, 9575,exploits/linux/local/9575.c,"Linux Kernel < 2.6.19 (Debian 4) - 'udp_sendmsg' Local Privilege Escalation (3)",1970-01-01,Andi,local,linux, -9579,exploits/windows/local/9579.txt,"Adobe Acrobat/Reader < 7.1.1/8.1.3/9.1 - Collab getIcon Universal",1970-01-01,kralor,local,windows, +9579,exploits/windows/local/9579.py,"Adobe Acrobat/Reader < 7.1.1/8.1.3/9.1 - Collab getIcon Universal",1970-01-01,kralor,local,windows, 9580,exploits/windows/local/9580.pl,"Hamster Audio Player 0.3a - 'Associations.cfg' Local Buffer (SEH) (2)",1970-01-01,hack4love,local,windows, 9581,exploits/windows/local/9581.pl,"SAP Player 0.9 - '.m3u' Universal Local Buffer Overflow (SEH)",1970-01-01,PLATEN,local,windows, 9589,exploits/windows/local/9589.pl,"OtsTurntables 1.00.027 - '.m3u' / '.ofl' Universal Local Buffer Overflow (SEH)",1970-01-01,hack4love,local,windows, @@ -7671,7 +7671,7 @@ id,file,description,date,author,type,platform,port 9598,exploits/linux/local/9598.txt,"Linux Kernel 2.4/2.6 (Fedora 11) - 'sock_sendpage()' Local Privilege Escalation (2)",1970-01-01,"Ramon de C Valle",local,linux, 9608,exploits/linux/local/9608.c,"GemStone/S 6.3.1 - 'stoned' Local Buffer Overflow",1970-01-01,"Jeremy Brown",local,linux, 9610,exploits/windows/local/9610.py,"Audio Lib Player - '.m3u' Local Buffer Overflow (SEH)",1970-01-01,blake,local,windows, -9618,exploits/windows/local/9618.php,"Millenium MP3 Studio - '.pls' / '.mpf' / '.m3u' Universal Local Buffer Overflow (SEH)",1970-01-01,hack4love,local,windows, +9618,exploits/windows/local/9618.py,"Millenium MP3 Studio - '.pls' / '.mpf' / '.m3u' Universal Local Buffer Overflow (SEH)",1970-01-01,hack4love,local,windows, 9619,exploits/windows/local/9619.pl,"jetAudio 7.1.9.4030 plus - vx(asx/wax/wvx) Universal Local Buffer Overflow (SEH)",1970-01-01,hack4love,local,windows, 9624,exploits/windows/local/9624.py,"KSP 2009R2 - '.m3u' Universal Local Buffer Overflow (SEH)",1970-01-01,hack4love,local,windows, 9627,exploits/linux/local/9627.txt,"Enlightenment - Linux Null PTR Dereference Framework",1970-01-01,spender,local,linux, @@ -7692,9 +7692,9 @@ id,file,description,date,author,type,platform,port 9859,exploits/freebsd/local/9859.c,"FreeBSD 6.4 - 'pipeclose()'/'knlist_cleardel()' Race Condition",1970-01-01,"Przemyslaw Frasunek",local,freebsd, 9860,exploits/freebsd/local/9860.c,"FreeBSD 7.2 - VFS/devfs Race Condition",1970-01-01,"Przemyslaw Frasunek",local,freebsd, 9865,exploits/windows/local/9865.py,"Adobe Acrobat Reader 7 < 9 - U3D Buffer Overflow",1970-01-01,"Felipe Andres Manzano",local,windows, -9866,exploits/windows/local/9866.txt,"Alleycode HTML Editor 2.2.1 - Local Buffer Overflow",1970-01-01,Dr_IDE,local,windows, +9866,exploits/windows/local/9866.py,"Alleycode HTML Editor 2.2.1 - Local Buffer Overflow",1970-01-01,Dr_IDE,local,windows, 9882,exploits/windows/local/9882.txt,"Mozilla Firefox 3.5.3 - Local Download Manager Temp File Creation",1970-01-01,"Jeremy Brown",local,windows, -9884,exploits/windows/local/9884.txt,"GPG2/Kleopatra 2.0.11 - Malformed Certificate",1970-01-01,Dr_IDE,local,windows, +9884,exploits/windows/local/9884.py,"GPG2/Kleopatra 2.0.11 - Malformed Certificate",1970-01-01,Dr_IDE,local,windows, 9894,exploits/windows/local/9894.txt,"Millenium MP3 Studio 2.0 - '.m3u' Local Buffer Overflow",1970-01-01,dellnull,local,windows, 9895,exploits/windows/local/9895.txt,"Millenium MP3 Studio 2.0 - 'mpf' Local Buffer Overflow",1970-01-01,dellnull,local,windows, 9955,exploits/hardware/local/9955.txt,"Overland Guardian OS 5.1.041 - Local Privilege Escalation",1970-01-01,trompele,local,hardware, @@ -7709,7 +7709,7 @@ id,file,description,date,author,type,platform,port 9990,exploits/multiple/local/9990.txt,"Adobe Reader / Acrobat - '.U3D' File Invalid Array Index Overflow",1970-01-01,"Felipe Andres Manzano",local,multiple, 9991,exploits/windows/local/9991.txt,"Alleycode 2.21 - Local Overflow (SEH)",1970-01-01,"Rafael Sousa",local,windows, 10009,exploits/windows/local/10009.txt,"Free Download Manager - '.Torrent' File Parsing Multiple Buffer Overflow Vulnerabilities (Metasploit)",1970-01-01,"Carsten Eiram",local,windows, -10010,exploits/windows/local/10010.txt,"Free WMA MP3 Converter 1.1 - '.wav' Local Buffer Overflow",1970-01-01,KriPpLer,local,windows, +10010,exploits/windows/local/10010.py,"Free WMA MP3 Converter 1.1 - '.wav' Local Buffer Overflow",1970-01-01,KriPpLer,local,windows, 10018,exploits/linux/local/10018.sh,"Linux Kernel 2.6.32 - 'pipe.c' Local Privilege Escalation (4)",1970-01-01,"Earl Chew",local,linux, 10038,exploits/linux/local/10038.txt,"proc File - Descriptors Directory Permissions Bypass",1970-01-01,"Pavel Machek",local,linux, 10039,exploits/windows/local/10039.txt,"GPG4Win GNU - Privacy Assistant",1970-01-01,Dr_IDE,local,windows, @@ -7831,7 +7831,7 @@ id,file,description,date,author,type,platform,port 11408,exploits/windows_x86/local/11408.c,"RadASM - '.rap' file Local Buffer Overflow",1970-01-01,"fl0 fl0w",local,windows_x86, 11413,exploits/windows/local/11413.pl,"CastRipper 2.50.70 - '.asx' Playlist Stack Overflow",1970-01-01,"Jordi Chancel",local,windows, 11465,exploits/windows/local/11465.py,"Ollydbg 2.00 Beta1 - Local Buffer Overflow",1970-01-01,_SuBz3r0_,local,windows, -11475,exploits/windows/local/11475.txt,"OtsTurntables Free 1.00.047 - '.olf' Universal Buffer Overflow",1970-01-01,mr_me,local,windows, +11475,exploits/windows/local/11475.py,"OtsTurntables Free 1.00.047 - '.olf' Universal Buffer Overflow",1970-01-01,mr_me,local,windows, 11491,exploits/multiple/local/11491.rb,"Apple iTunes 9.0.1 - '.pls' Handling Buffer Overflow",1970-01-01,"S2 Crew",local,multiple, 11561,exploits/multiple/local/11561.html,"Mozilla Firefox 3.6 - URL Spoofing",1970-01-01,anonymous,local,multiple, 11573,exploits/windows/local/11573.c,"Mediacoder 0.7.3.4605 - Local Buffer Overflow",1970-01-01,"fl0 fl0w",local,windows, @@ -9545,7 +9545,7 @@ id,file,description,date,author,type,platform,port 29528,exploits/php/local/29528.txt,"PHP 5.2 - FOpen 'Safe_mode' Restriction Bypass",1970-01-01,"Maksymilian Arciemowicz",local,php, 29548,exploits/windows/local/29548.rb,"VideoSpirit Lite 1.77 - Local Buffer Overflow (SEH)",1970-01-01,metacom,local,windows, 29549,exploits/windows/local/29549.pl,"ALLPlayer 5.6.2 - '.m3u' File Local Buffer Overflow (SEH Unicode)",1970-01-01,"Mike Czumak",local,windows, -29594,exploits/windows/local/29594.txt,"Watermark Master 2.2.23 - '.wstyle' Local Buffer Overflow (SEH)",1970-01-01,"Mike Czumak",local,windows, +29594,exploits/windows/local/29594.py,"Watermark Master 2.2.23 - '.wstyle' Local Buffer Overflow (SEH)",1970-01-01,"Mike Czumak",local,windows, 29603,exploits/windows/local/29603.txt,"Comodo Firewall 2.3/2.4 - Flawed Component Control Cryptographic Hash",1970-01-01,"Matousec Transparent security",local,windows, 29630,exploits/windows/local/29630.c,"Microsoft Windows XP/2003 - ReadDirectoryChangesW Information Disclosure",1970-01-01,3APA3A,local,windows, 30192,exploits/windows/local/30192.txt,"Kaspersky Internet Security 6.0 - SSDT Hooks Multiple Local Vulnerabilities",1970-01-01,"Matousec Transparent security",local,windows, @@ -9930,7 +9930,7 @@ id,file,description,date,author,type,platform,port 38349,exploits/windows/local/38349.py,"IconLover 5.42 - Local Buffer Overflow",1970-01-01,cor3sm4sh3r,local,windows, 38353,exploits/linux/local/38353.txt,"Apport 2.19 (Ubuntu 15.04) - Local Privilege Escalation",1970-01-01,halfdog,local,linux, 38357,exploits/linux/local/38357.c,"rpi-update - Insecure Temporary File Handling / Security Bypass",1970-01-01,Technion,local,linux, -38360,exploits/osx/local/38360.txt,"Dropbox < 3.3.x - OSX FinderLoadBundle Privilege Escalation",1970-01-01,cenobyte,local,osx, +38360,exploits/osx/local/38360.sh,"Dropbox < 3.3.x - OSX FinderLoadBundle Privilege Escalation",1970-01-01,cenobyte,local,osx, 38362,exploits/windows/local/38362.py,"MakeSFX.exe 1.44 - Local Stack Buffer Overflow",1970-01-01,hyp3rlinx,local,windows, 38371,exploits/osx/local/38371.py,"Apple Mac OSX 10.9.5/10.10.5 - 'rsh/libmalloc' Local Privilege Escalation",1970-01-01,rebel,local,osx, 38381,exploits/windows/local/38381.py,"WinRar < 5.30 Beta 4 - Settings Import Command Execution",1970-01-01,R-73eN,local,windows, @@ -9997,7 +9997,7 @@ id,file,description,date,author,type,platform,port 40337,exploits/windows_x86-64/local/40337.py,"MySQL 5.5.45 (x64) - Local Credentials Disclosure",1970-01-01,"Yakir Wizman",local,windows_x86-64, 39310,exploits/windows/local/39310.txt,"Microsoft Windows - Sandboxed Mount Reparse Point Creation Mitigation Bypass Redux (MS16-008) (2)",1970-01-01,"Google Security Research",local,windows, 39311,exploits/windows/local/39311.txt,"Microsoft Windows - Sandboxed Mount Reparse Point Creation Mitigation Bypass Redux (MS16-008) (1)",1970-01-01,"Google Security Research",local,windows, -40360,exploits/linux/local/40360.txt,"MySQL / MariaDB / PerconaDB 5.5.51/5.6.32/5.7.14 - Code Execution / Privilege Escalation",1970-01-01,"Dawid Golunski",local,linux,3306 +40360,exploits/linux/local/40360.py,"MySQL / MariaDB / PerconaDB 5.5.51/5.6.32/5.7.14 - Code Execution / Privilege Escalation",1970-01-01,"Dawid Golunski",local,linux,3306 40774,exploits/linux/local/40774.sh,"Nagios 4.2.2 - Local Privilege Escalation",1970-01-01,"Vincent Malguy",local,linux, 39340,exploits/android/local/39340.cpp,"Google Android - 'sensord' Local Privilege Escalation",1970-01-01,s0m3b0dy,local,android, 39417,exploits/windows/local/39417.py,"FTPShell Client 5.24 - 'Create NewFolder' Local Buffer Overflow",1970-01-01,"Arash Khazaei",local,windows, @@ -11862,14 +11862,14 @@ id,file,description,date,author,type,platform,port 2054,exploits/windows/remote/2054.txt,"Microsoft Windows - DHCP Client Broadcast (MS06-036)",1970-01-01,redsand,remote,windows, 2061,exploits/multiple/remote/2061.txt,"Apache Tomcat < 5.5.17 - Remote Directory Listing",1970-01-01,"ScanAlert Security",remote,multiple, 2070,exploits/windows/remote/2070.pl,"SIPfoundry sipXtapi - 'CSeq' Remote Buffer Overflow",1970-01-01,"Jacopo Cervini",remote,windows,5060 -2074,exploits/windows/remote/2074.pm,"eIQnetworks License Manager - Remote Buffer Overflow (Metasploit) (1)",1970-01-01,ri0t,remote,windows,10616 -2075,exploits/windows/remote/2075.pm,"eIQnetworks License Manager - Remote Buffer Overflow (Metasploit) (2)",1970-01-01,ri0t,remote,windows, +2074,exploits/windows/remote/2074.py,"eIQnetworks License Manager - Remote Buffer Overflow (Metasploit) (1)",1970-01-01,ri0t,remote,windows,10616 +2075,exploits/windows/remote/2075.py,"eIQnetworks License Manager - Remote Buffer Overflow (Metasploit) (2)",1970-01-01,ri0t,remote,windows, 2076,exploits/windows/remote/2076.pl,"AIM Triton 1.0.4 - 'SipXtapi' Remote Buffer Overflow",1970-01-01,c0rrupt,remote,windows,5061 2079,exploits/windows/remote/2079.pl,"eIQnetworks ESA - Syslog Server Remote Buffer Overflow",1970-01-01,"Kevin Finisterre",remote,windows,12345 2080,exploits/windows/remote/2080.pl,"eIQnetworks License Manager - Remote Buffer Overflow (multi) (1)",1970-01-01,"Kevin Finisterre",remote,windows,10616 2082,exploits/multiple/remote/2082.html,"Mozilla Firefox 1.5.0.4 - JavaScript Navigator Object Code Execution",1970-01-01,"H D Moore",remote,multiple, 2136,exploits/hardware/remote/2136.txt,"Barracuda Spam Firewall 3.3.03.053 - Remote Code Execution (1)",1970-01-01,"Greg Sinclair",remote,hardware, -2140,exploits/windows/remote/2140.pm,"eIQnetworks License Manager - Remote Buffer Overflow (Metasploit) (3)",1970-01-01,ri0t,remote,windows,10616 +2140,exploits/windows/remote/2140.py,"eIQnetworks License Manager - Remote Buffer Overflow (Metasploit) (3)",1970-01-01,ri0t,remote,windows,10616 2145,exploits/hardware/remote/2145.txt,"Barracuda Spam Firewall 3.3.03.053 - Remote Code Execution (2)",1970-01-01,PATz,remote,hardware, 2162,exploits/windows/remote/2162.pm,"Microsoft Windows - NetpIsRemote() Remote Overflow (MS06-040) (Metasploit)",1970-01-01,"H D Moore",remote,windows,445 2164,exploits/windows/remote/2164.pm,"Microsoft Internet Explorer - 'MDAC' Remote Code Execution (MS06-014) (Metasploit) (2)",1970-01-01,"H D Moore",remote,windows, @@ -11943,7 +11943,7 @@ id,file,description,date,author,type,platform,port 3058,exploits/windows/remote/3058.html,"Rediff Bol Downloader - ActiveX Control Execute Local File",1970-01-01,"Gregory R. Panakkal",remote,windows, 3063,exploits/windows/remote/3063.pl,"Formbankserver 1.9 - 'Name' Directory Traversal",1970-01-01,Bl0od3r,remote,windows, 3064,exploits/multiple/remote/3064.rb,"Apple QuickTime - 'rtsp URL Handler' Remote Stack Buffer Overflow",1970-01-01,MoAB,remote,multiple, -3067,exploits/windows/remote/3067.txt,"QK SMTP 3.01 - 'RCPT TO' Remote Buffer Overflow (2)",1970-01-01,"Jacopo Cervini",remote,windows,25 +3067,exploits/windows/remote/3067.py,"QK SMTP 3.01 - 'RCPT TO' Remote Buffer Overflow (2)",1970-01-01,"Jacopo Cervini",remote,windows,25 3072,exploits/windows/remote/3072.py,"Apple QuickTime (Windows 2000) - 'rtsp URL Handler' Remote Buffer Overflow",1970-01-01,"Winny Thomas",remote,windows, 3077,exploits/osx/remote/3077.rb,"Apple QuickTime 7.1.3 - 'HREFTrack' Cross-Zone Scripting",1970-01-01,MoAB,remote,osx, 3084,exploits/windows/remote/3084.txt,"Adobe Acrobat Reader Plugin 7.0.x - 'acroreader' Cross-Site Scripting",1970-01-01,"Stefano Di Paola",remote,windows, @@ -12005,7 +12005,7 @@ id,file,description,date,author,type,platform,port 3474,exploits/windows/remote/3474.py,"WarFTP 1.65 (Windows 2000 SP4) - 'USER' Remote Buffer Overflow",1970-01-01,"Winny Thomas",remote,windows,21 3482,exploits/windows/remote/3482.pl,"WarFTP 1.65 (Windows 2000 SP4) - 'USER' Remote Buffer Overflow",1970-01-01,"Umesh Wanve",remote,windows,21 3491,exploits/bsd/remote/3491.py,"OpenBSD - ICMPv6 Fragment Remote Execution",1970-01-01,"Core Security",remote,bsd, -3495,exploits/windows/remote/3495.txt,"CA BrightStor ARCserve - 'msgeng.exe' Remote Stack Overflow",1970-01-01,"Winny Thomas",remote,windows,6503 +3495,exploits/windows/remote/3495.py,"CA BrightStor ARCserve - 'msgeng.exe' Remote Stack Overflow",1970-01-01,"Winny Thomas",remote,windows,6503 3531,exploits/windows/remote/3531.py,"Helix Server 11.0.1 (Windows 2000 SP4) - Remote Heap Overflow",1970-01-01,"Winny Thomas",remote,windows,554 3537,exploits/windows/remote/3537.py,"Mercur Messaging 2005 (Windows 2000 SP4) - IMAP 'Subscribe' Remote Overflow",1970-01-01,"Winny Thomas",remote,windows,143 3540,exploits/windows/remote/3540.py,"Mercur Messaging 2005 < SP4 - IMAP Remote (Egghunter)",1970-01-01,muts,remote,windows,143 @@ -13065,7 +13065,7 @@ id,file,description,date,author,type,platform,port 16100,exploits/hardware/remote/16100.txt,"Tandberg E & EX & C Series Endpoints - Default Root Account Credentials",1970-01-01,"Cisco Security",remote,hardware, 16101,exploits/windows/remote/16101.py,"FTPGetter 3.58.0.21 - 'PASV' Remote Buffer Overflow",1970-01-01,modpr0be,remote,windows, 16103,exploits/multiple/remote/16103.txt,"Majordomo2 - 'SMTP/HTTP' Directory Traversal",1970-01-01,"Michael Brooks",remote,multiple, -16105,exploits/windows/remote/16105.txt,"quickshare file share 1.2.1 - Directory Traversal (1)",1970-01-01,modpr0be,remote,windows, +16105,exploits/windows/remote/16105.py,"quickshare file share 1.2.1 - Directory Traversal (1)",1970-01-01,modpr0be,remote,windows, 16137,exploits/multiple/remote/16137.c,"Multiple Vendor Calendar Manager - Remote Code Execution",1970-01-01,"Rodrigo Rubira Branco",remote,multiple, 16145,exploits/windows/remote/16145.pl,"Unreal Tournament - Remote Buffer Overflow (SEH)",1970-01-01,Fulcrum,remote,windows, 16149,exploits/hardware/remote/16149.txt,"Linksys WAP610N - Root Access Security",1970-01-01,"Matteo Ignaccolo",remote,hardware, @@ -13657,7 +13657,7 @@ id,file,description,date,author,type,platform,port 17195,exploits/windows/remote/17195.rb,"Wireshark 1.4.4 - 'packet-dect.c' Remote Stack Buffer Overflow (Metasploit) (2)",1970-01-01,Metasploit,remote,windows, 17199,exploits/unix/remote/17199.rb,"Spreecommerce < 0.50.0 - Arbitrary Command Execution (Metasploit)",1970-01-01,Metasploit,remote,unix, 17219,exploits/windows/remote/17219.rb,"EMC HomeBase Server - Directory Traversal Remote Code Execution (Metasploit)",1970-01-01,Metasploit,remote,windows,18821 -17243,exploits/windows/remote/17243.txt,"SPlayer 3.7 (build 2055) - Remote Buffer Overflow",1970-01-01,xsploitedsec,remote,windows, +17243,exploits/windows/remote/17243.py,"SPlayer 3.7 (build 2055) - Remote Buffer Overflow",1970-01-01,xsploitedsec,remote,windows, 17240,exploits/windows/remote/17240.html,"ICONICS WebHMI - ActiveX Stack Overflow",1970-01-01,"sgb & bls",remote,windows, 17244,exploits/hardware/remote/17244.txt,"ZyWALL USG Appliance - Multiple Vulnerabilities",1970-01-01,"RedTeam Pentesting",remote,hardware, 17252,exploits/windows/remote/17252.rb,"VideoLAN VLC Media Player 1.1.8 - ModPlug ReadS3M Stack Buffer Overflow (Metasploit)",1970-01-01,Metasploit,remote,windows, @@ -16735,7 +16735,7 @@ id,file,description,date,author,type,platform,port 32879,exploits/windows/remote/32879.html,"SAP MaxDB 7.4/7.6 - 'webdbm' Multiple Cross-Site Scripting Vulnerabilities",1970-01-01,"Digital Security Research Group",remote,windows, 32885,exploits/unix/remote/32885.rb,"Unitrends Enterprise Backup 7.3.0 - Root Remote Code Execution (Metasploit)",1970-01-01,"Brandon Perry",remote,unix,443 32998,exploits/multiple/remote/32998.c,"OpenSSL TLS Heartbeat Extension - 'Heartbleed' Information Leak (2) (DTLS Support)",1970-01-01,"Ayman Sagy",remote,multiple, -32997,exploits/windows/remote/32997.pl,"Acunetix 8 build 20120704 - Remote Stack Overflow",1970-01-01,An7i,remote,windows, +32997,exploits/windows/remote/32997.py,"Acunetix 8 build 20120704 - Remote Stack Overflow",1970-01-01,An7i,remote,windows, 32919,exploits/hardware/remote/32919.txt,"SAP Router - Timing Attack Password Disclosure",1970-01-01,"Core Security",remote,hardware, 32920,exploits/multiple/remote/32920.txt,"Apache Geronimo 2.1.x - '/console/portal/Server/Monitoring' Multiple Cross-Site Scripting Vulnerabilities",1970-01-01,DSecRG,remote,multiple, 32921,exploits/multiple/remote/32921.txt,"Apache Geronimo 2.1.x - '/console/portal/' URI Cross-Site Scripting",1970-01-01,DSecRG,remote,multiple, @@ -16984,7 +16984,7 @@ id,file,description,date,author,type,platform,port 34126,exploits/windows/remote/34126.txt,"Microsoft Help and Support Center - '/sysinfo/sysinfomain.htm' Cross-Site Scripting",1970-01-01,"Tavis Ormandy",remote,windows, 34132,exploits/php/remote/34132.txt,"IBM GCM16/32 1.20.0.22575 - Multiple Vulnerabilities",1970-01-01,"Alejandro Alvarez Bravo",remote,php,443 34152,exploits/linux/remote/34152.txt,"CUPS 1.4.2 - Web Interface Information Disclosure",1970-01-01,"Luca Carettoni",remote,linux, -34160,exploits/php/remote/34160.txt,"Omeka 2.2.1 - Remote Code Execution",1970-01-01,LiquidWorm,remote,php,80 +34160,exploits/php/remote/34160.py,"Omeka 2.2.1 - Remote Code Execution",1970-01-01,LiquidWorm,remote,php,80 34363,exploits/multiple/remote/34363.rb,"Mozilla Firefox - toString console.time Privileged JavaScript Injection (Metasploit)",1970-01-01,Metasploit,remote,multiple, 34174,exploits/windows/remote/34174.txt,"Enemy Territory: Quake Wars 1.5.12642.33243 - Remote Buffer Overflow",1970-01-01,"Luigi Auriemma",remote,windows, 34178,exploits/windows/remote/34178.txt,"id Software id Tech 4 Engine - 'idGameLocal::GetGameStateObject()' Remote Code Execution",1970-01-01,"Luigi Auriemma",remote,windows, @@ -17247,7 +17247,7 @@ id,file,description,date,author,type,platform,port 35892,exploits/multiple/remote/35892.txt,"MySQLDriverCS 4.0.1 - SQL Injection",1970-01-01,"Qihan Luo",remote,multiple, 35897,exploits/windows/remote/35897.html,"CygniCon CyViewer - ActiveX Control 'SaveData()' Insecure Method",1970-01-01,"High-Tech Bridge SA",remote,windows, 35898,exploits/multiple/remote/35898.php,"Atlassian JIRA 3.13.5 - File Download Security Bypass",1970-01-01,"Ignacio Garrido",remote,multiple, -35917,exploits/hardware/remote/35917.txt,"D-Link DSL-2740R - Remote DNS Change",1970-01-01,"Todor Donev",remote,hardware, +35917,exploits/hardware/remote/35917.sh,"D-Link DSL-2740R - Remote DNS Change",1970-01-01,"Todor Donev",remote,hardware, 35918,exploits/multiple/remote/35918.c,"IBM DB2 - 'DT_RPATH' Insecure Library Loading Arbitrary Code Execution",1970-01-01,"Tim Brown",remote,multiple, 35919,exploits/bsd/remote/35919.c,"NetBSD 5.1 - 'libc/net' Multiple Stack Buffer Overflows",1970-01-01,"Maksymilian Arciemowicz",remote,bsd, 35921,exploits/windows/remote/35921.html,"iMesh 10.0 - 'IMWebControl.dll' ActiveX Control Buffer Overflow",1970-01-01,KedAns-Dz,remote,windows, @@ -17778,8 +17778,8 @@ id,file,description,date,author,type,platform,port 40721,exploits/windows/remote/40721.html,"Microsoft Internet Explorer 8/9/10/11 / IIS / CScript.exe/WScript.exe VBScript - CRegExp..Execute Use of Uninitialized Memory (MS14-080/MS14-084)",1970-01-01,Skylined,remote,windows, 40758,exploits/windows/remote/40758.rb,"Disk Pulse Enterprise 9.0.34 - 'Login' Remote Buffer Overflow (Metasploit)",1970-01-01,Metasploit,remote,windows, 40734,exploits/hardware/remote/40734.sh,"MOVISTAR BHS_RTA ADSL Router - Remote File Disclosure",1970-01-01,"Todor Donev",remote,hardware, -40735,exploits/hardware/remote/40735.txt,"D-Link DSL-2730U/2750U/2750E ADSL Router - Remote File Disclosure",1970-01-01,"Todor Donev",remote,hardware, -40736,exploits/hardware/remote/40736.txt,"Netgear JNR1010 ADSL Router - (Authenticated) Remote File Disclosure",1970-01-01,"Todor Donev",remote,hardware, +40735,exploits/hardware/remote/40735.sh,"D-Link DSL-2730U/2750U/2750E ADSL Router - Remote File Disclosure",1970-01-01,"Todor Donev",remote,hardware, +40736,exploits/hardware/remote/40736.sh,"Netgear JNR1010 ADSL Router - (Authenticated) Remote File Disclosure",1970-01-01,"Todor Donev",remote,hardware, 40737,exploits/hardware/remote/40737.sh,"Netgear WNR500/WNR612v3/JNR1010/JNR2010 ADSL Router - (Authenticated) Remote File Disclosure",1970-01-01,"Todor Donev",remote,hardware, 40738,exploits/hardware/remote/40738.sh,"PLANET ADSL Router AND-4101 - Remote File Disclosure",1970-01-01,"Todor Donev",remote,hardware, 40740,exploits/linux_mips/remote/40740.rb,"Eir D1000 Wireless Router - WAN Side Remote Command Injection (Metasploit)",1970-01-01,Kenzo,remote,linux_mips,7547 @@ -18141,7 +18141,7 @@ id,file,description,date,author,type,platform,port 44485,exploits/windows/remote/44485.py,"Easy File Sharing Web Server 7.2 - Stack Buffer Overflow",1970-01-01,rebeyond,remote,windows,80 44522,exploits/windows/remote/44522.py,"Easy File Sharing Web Server 7.2 - 'UserID' Remote Buffer Overflow (DEP Bypass)",1970-01-01,"Hashim Jawad",remote,windows, 44524,exploits/hardware/remote/44524.rb,"ASUS infosvr - Authentication Bypass Command Execution (Metasploit)",1970-01-01,Metasploit,remote,hardware,9999 -44552,exploits/multiple/remote/44552.py,"Websphere/JBoss/OpenNMS/Symantec Endpoint Protection Manager - Java Deserialization Remote Code Execution",1970-01-01,"Nikhil Sreekumar",remote,multiple, +44552,exploits/multiple/remote/44552.sh,"Websphere/JBoss/OpenNMS/Symantec Endpoint Protection Manager - Java Deserialization Remote Code Execution",1970-01-01,"Nikhil Sreekumar",remote,multiple, 44553,exploits/multiple/remote/44553.py,"Oracle Weblogic Server 10.3.6.0 / 12.1.3.0 / 12.2.1.2 / 12.2.1.3 - Deserialization Remote Command Execution",1970-01-01,brianwrf,remote,multiple, 44554,exploits/android/remote/44554.py,"Android Bluetooth - 'Blueborne' Information Leak (1)",1970-01-01,"Kert Ojasoo",remote,android, 44555,exploits/android/remote/44555.py,"Android Bluetooth - 'Blueborne' Information Leak (2)",1970-01-01,"Kert Ojasoo",remote,android, @@ -18543,7 +18543,7 @@ id,file,description,date,author,type,platform,port 384,exploits/php/webapps/384.txt,"PHP 4.3.7 - 'php-exec-dir' Patch Command Access Restriction Bypass",1970-01-01,VeNoMouS,webapps,php, 406,exploits/php/webapps/406.pl,"phpMyWebhosting - SQL Injection",1970-01-01,"Noam Rathaus",webapps,php, 407,exploits/cgi/webapps/407.txt,"AWStats 5.0 < 6.3 - 'logfile' File Inclusion / Command Execution",1970-01-01,"Johnathan Bat",webapps,cgi, -430,exploits/php/webapps/430.txt,"TorrentTrader 1.0 RC2 - SQL Injection",1970-01-01,aCiDBiTS,webapps,php, +430,exploits/php/webapps/430.php,"TorrentTrader 1.0 RC2 - SQL Injection",1970-01-01,aCiDBiTS,webapps,php, 436,exploits/php/webapps/436.txt,"PHP-Nuke 7.4 - Privilege Escalation",1970-01-01,mantra,webapps,php, 464,exploits/cgi/webapps/464.txt,"Turbo Seek - Null Byte Error Discloses Files",1970-01-01,durito,webapps,cgi, 465,exploits/php/webapps/465.pl,"PHP-Nuke - SQL Injection Edit/Save Messages",1970-01-01,iko94,webapps,php, @@ -19192,7 +19192,7 @@ id,file,description,date,author,type,platform,port 2172,exploits/php/webapps/2172.txt,"Mambo Component Remository 3.25 - Remote File Inclusion",1970-01-01,camino,webapps,php, 2173,exploits/php/webapps/2173.txt,"MVCnPHP 3.0 - glConf[path_libraries] Remote File Inclusion",1970-01-01,Drago84,webapps,php, 2174,exploits/php/webapps/2174.txt,"Wheatblog 1.1 - 'session.php' Remote File Inclusion",1970-01-01,O.U.T.L.A.W,webapps,php,80 -2175,exploits/php/webapps/2175.txt,"WEBInsta CMS 0.3.1 - 'templates_dir' Remote File Inclusion",1970-01-01,K-159,webapps,php, +2175,exploits/php/webapps/2175.py,"WEBInsta CMS 0.3.1 - 'templates_dir' Remote File Inclusion",1970-01-01,K-159,webapps,php, 2177,exploits/php/webapps/2177.txt,"Joomla! Component Webring 1.0 - Remote File Inclusion",1970-01-01,"Mehmet Ince",webapps,php, 2178,exploits/php/webapps/2178.php,"XMB 1.9.6 Final - 'basename()' Remote Command Execution",1970-01-01,rgod,webapps,php, 2181,exploits/php/webapps/2181.pl,"PHPay 2.02 - 'nu_mail.inc.php?mail()' Remote Injection",1970-01-01,beford,webapps,php,80 @@ -19320,7 +19320,7 @@ id,file,description,date,author,type,platform,port 2340,exploits/php/webapps/2340.txt,"PUMA 1.0 RC 2 - 'config.php' Remote File Inclusion",1970-01-01,"Philipp Niedziela",webapps,php, 2341,exploits/php/webapps/2341.txt,"Open Bulletin Board 1.0.8 - 'ROOT_PATH' File Inclusion",1970-01-01,Eddy_BAck0o,webapps,php, 2342,exploits/php/webapps/2342.txt,"mcGalleryPRO 2006 - 'path_to_folder' Remote File Inclusion",1970-01-01,Solpot,webapps,php, -2343,exploits/php/webapps/2343.txt,"MiniPort@l 0.1.5 Beta - 'skiny' Remote File Inclusion",1970-01-01,Kacper,webapps,php, +2343,exploits/php/webapps/2343.py,"MiniPort@l 0.1.5 Beta - 'skiny' Remote File Inclusion",1970-01-01,Kacper,webapps,php, 2344,exploits/php/webapps/2344.txt,"OPENi-CMS 1.0.1beta - 'config' Remote File Inclusion",1970-01-01,basher13,webapps,php, 2346,exploits/php/webapps/2346.txt,"WTools 0.0.1a - 'INCLUDE_PATH' Remote File Inclusion",1970-01-01,ddoshomo,webapps,php, 2347,exploits/php/webapps/2347.txt,"PhpLinkExchange 1.0 - Include / Cross-Site Scripting",1970-01-01,s3rv3r_hack3r,webapps,php, @@ -19346,7 +19346,7 @@ id,file,description,date,author,type,platform,port 2370,exploits/php/webapps/2370.php,"Limbo CMS 1.0.4.2L - 'com_contact' Remote Code Execution",1970-01-01,rgod,webapps,php, 2371,exploits/asp/webapps/2371.txt,"Haberx 1.02 < 1.1 - 'tr' SQL Injection",1970-01-01,"Fix TR",webapps,asp, 2372,exploits/php/webapps/2372.txt,"BolinOS 4.5.5 - 'gBRootPath' Remote File Inclusion",1970-01-01,"Mehmet Ince",webapps,php, -2373,exploits/php/webapps/2373.txt,"PHP DocWriter 0.3 - 'script' Remote File Inclusion",1970-01-01,Kacper,webapps,php, +2373,exploits/php/webapps/2373.py,"PHP DocWriter 0.3 - 'script' Remote File Inclusion",1970-01-01,Kacper,webapps,php, 2374,exploits/php/webapps/2374.pl,"Site@School 2.4.02 - Arbitrary File Upload",1970-01-01,simo64,webapps,php, 2375,exploits/php/webapps/2375.txt,"Coppermine Photo Gallery 1.2.2b (Nuke Addon) - Remote File Inclusion",1970-01-01,3l3ctric-Cracker,webapps,php, 2376,exploits/php/webapps/2376.pl,"phpQuiz 0.1.2 - SQL Injection / Code Execution",1970-01-01,simo64,webapps,php, @@ -19473,7 +19473,7 @@ id,file,description,date,author,type,platform,port 2519,exploits/php/webapps/2519.txt,"Minichat 6.0 - 'ftag.php' Remote File Inclusion",1970-01-01,Zickox,webapps,php, 2520,exploits/php/webapps/2520.txt,"Softerra PHP Developer Library 1.5.3 - Remote File Inclusion",1970-01-01,MP,webapps,php, 2521,exploits/php/webapps/2521.txt,"Download-Engine 1.4.2 - 'spaw' Remote File Inclusion",1970-01-01,v1per-haCker,webapps,php, -2522,exploits/php/webapps/2522.txt,"phpBB Journals System Mod 1.0.2 RC2 - Remote File Inclusion",1970-01-01,"Nima Salehi",webapps,php, +2522,exploits/php/webapps/2522.py,"phpBB Journals System Mod 1.0.2 RC2 - Remote File Inclusion",1970-01-01,"Nima Salehi",webapps,php, 2525,exploits/php/webapps/2525.pl,"phpBB Insert User Mod 0.1.2 - Remote File Inclusion",1970-01-01,"Nima Salehi",webapps,php, 2526,exploits/php/webapps/2526.txt,"PHPht Topsites - 'common.php' Remote File Inclusion",1970-01-01,"Mehmet Ince",webapps,php, 2527,exploits/php/webapps/2527.c,"Invision Gallery 2.0.7 (Linux) - 'readfile()' / SQL Injection",1970-01-01,ShadOS,webapps,php, @@ -19481,7 +19481,7 @@ id,file,description,date,author,type,platform,port 2529,exploits/php/webapps/2529.txt,"AFGB Guestbook 2.2 - 'Htmls' Remote File Inclusion",1970-01-01,mdx,webapps,php, 2531,exploits/php/webapps/2531.txt,"phpBB Import Tools Mod 0.1.4 - Remote File Inclusion",1970-01-01,boecke,webapps,php, 2532,exploits/php/webapps/2532.txt,"phpBB Ajax Shoutbox 0.0.5 - Remote File Inclusion",1970-01-01,boecke,webapps,php, -2533,exploits/php/webapps/2533.txt,"phpBB SpamBlocker Mod 1.0.2 - Remote File Inclusion",1970-01-01,"Nima Salehi",webapps,php, +2533,exploits/php/webapps/2533.py,"phpBB SpamBlocker Mod 1.0.2 - Remote File Inclusion",1970-01-01,"Nima Salehi",webapps,php, 2534,exploits/php/webapps/2534.pl,"Redaction System 1.0 - 'lang_prefix' Remote File Inclusion",1970-01-01,r0ut3r,webapps,php, 2535,exploits/php/webapps/2535.txt,"PHPMyConferences 8.0.2 - 'menu.inc.php' File Inclusion",1970-01-01,k1tk4t,webapps,php, 2536,exploits/php/webapps/2536.txt,"Open Conference Systems 1.1.4 - 'fullpath' File Inclusion",1970-01-01,k1tk4t,webapps,php, @@ -19541,8 +19541,8 @@ id,file,description,date,author,type,platform,port 2602,exploits/php/webapps/2602.txt,"Power Phlogger 2.0.9 - 'config.inc.php3' File Inclusion",1970-01-01,x_w0x,webapps,php, 2603,exploits/php/webapps/2603.txt,"Lou Portail 1.4.1 - 'admin_module.php' Remote File Inclusion",1970-01-01,MP,webapps,php, 2604,exploits/php/webapps/2604.txt,"WGCC 0.5.6b - 'quiz.php' SQL Injection",1970-01-01,ajann,webapps,php, -2605,exploits/php/webapps/2605.txt,"RSSonate - 'xml2rss.php' Remote File Inclusion",1970-01-01,Kw3[R]Ln,webapps,php, -2606,exploits/php/webapps/2606.txt,"CASTOR 1.1.1 - '/lib/rs.php' Remote File Inclusion",1970-01-01,Kw3[R]Ln,webapps,php, +2605,exploits/php/webapps/2605.py,"RSSonate - 'xml2rss.php' Remote File Inclusion",1970-01-01,Kw3[R]Ln,webapps,php, +2606,exploits/php/webapps/2606.py,"CASTOR 1.1.1 - '/lib/rs.php' Remote File Inclusion",1970-01-01,Kw3[R]Ln,webapps,php, 2607,exploits/php/webapps/2607.txt,"kawf 1.0 - 'main.php' Remote File Inclusion",1970-01-01,o0xxdark0o,webapps,php, 2608,exploits/php/webapps/2608.txt,"Virtual Law Office - 'phpc_root_path' Remote File Inclusion",1970-01-01,"Mehmet Ince",webapps,php, 2609,exploits/php/webapps/2609.txt,"Open Meetings Filing Application - Remote File Inclusion",1970-01-01,"Mehmet Ince",webapps,php, @@ -19596,7 +19596,7 @@ id,file,description,date,author,type,platform,port 2677,exploits/php/webapps/2677.asp,"Netref 4 - 'cat_for_aff.php' Source Code Disclosure",1970-01-01,ajann,webapps,php, 2678,exploits/php/webapps/2678.txt,"Faq Administrator 2.1 - 'faq_reply.php' Remote File Inclusion",1970-01-01,v1per-haCker,webapps,php, 2679,exploits/php/webapps/2679.txt,"PHPMyRing 4.2.1 - 'cherche.php' SQL Injection",1970-01-01,ajann,webapps,php, -2681,exploits/php/webapps/2681.txt,"QnECMS 2.5.6 - 'adminfolderpath' Remote File Inclusion",1970-01-01,K-159,webapps,php, +2681,exploits/php/webapps/2681.py,"QnECMS 2.5.6 - 'adminfolderpath' Remote File Inclusion",1970-01-01,K-159,webapps,php, 2683,exploits/asp/webapps/2683.txt,"Techno Dreams Announcement - 'key' SQL Injection",1970-01-01,ajann,webapps,asp, 2684,exploits/asp/webapps/2684.txt,"Techno Dreams Guestbook 1.0 - 'key' SQL Injection",1970-01-01,ajann,webapps,asp, 2685,exploits/php/webapps/2685.php,"Nitrotech 0.0.3a - Remote Code Execution",1970-01-01,Kacper,webapps,php, @@ -19647,7 +19647,7 @@ id,file,description,date,author,type,platform,port 2747,exploits/php/webapps/2747.txt,"MyAlbum 3.02 - 'language.inc.php' Remote File Inclusion",1970-01-01,"Silahsiz Kuvvetler",webapps,php, 2748,exploits/php/webapps/2748.pl,"PHPManta 1.0.2 - 'view-sourcecode.php' Local File Inclusion",1970-01-01,ajann,webapps,php, 2750,exploits/php/webapps/2750.txt,"EncapsCMS 0.3.6 - '/core/core.php' Remote File Inclusion",1970-01-01,Firewall,webapps,php, -2751,exploits/php/webapps/2751.txt,"BrewBlogger 1.3.1 - 'printLog.php' SQL Injection",1970-01-01,"Craig Heffner",webapps,php, +2751,exploits/php/webapps/2751.py,"BrewBlogger 1.3.1 - 'printLog.php' SQL Injection",1970-01-01,"Craig Heffner",webapps,php, 2752,exploits/php/webapps/2752.txt,"WORK System E-Commerce 3.0.1 - Remote File Inclusion",1970-01-01,SlimTim10,webapps,php, 2754,exploits/asp/webapps/2754.pl,"NuCommunity 1.0 - 'cl_CatListing.asp' SQL Injection",1970-01-01,ajann,webapps,asp, 2755,exploits/asp/webapps/2755.pl,"NuRems 1.0 - 'propertysdetails.asp' SQL Injection",1970-01-01,ajann,webapps,asp, @@ -19693,7 +19693,7 @@ id,file,description,date,author,type,platform,port 2813,exploits/asp/webapps/2813.txt,"ASPNuke 0.80 - 'register.asp' SQL Injection",1970-01-01,ajann,webapps,asp, 2814,exploits/php/webapps/2814.txt,"PHPQuickGallery 1.9 - 'textFile' Remote File Inclusion",1970-01-01,"Al7ejaz Hacker",webapps,php, 2817,exploits/php/webapps/2817.txt,"Photo Cart 3.9 - 'adminprint.php' Remote File Inclusion",1970-01-01,irvian,webapps,php, -2818,exploits/php/webapps/2818.txt,"e-Ark 1.0 - '/src/ark_inc.php' Remote File Inclusion",1970-01-01,DeltahackingTEAM,webapps,php, +2818,exploits/php/webapps/2818.py,"e-Ark 1.0 - '/src/ark_inc.php' Remote File Inclusion",1970-01-01,DeltahackingTEAM,webapps,php, 2819,exploits/php/webapps/2819.txt,"LDU 8.x - avatarselect id SQL Injection",1970-01-01,nukedx,webapps,php, 2820,exploits/php/webapps/2820.txt,"Seditio 1.10 - avatarselect id SQL Injection",1970-01-01,nukedx,webapps,php, 2822,exploits/php/webapps/2822.pl,"ContentNow 1.39 - 'pageid' SQL Injection",1970-01-01,Revenge,webapps,php, @@ -19737,7 +19737,7 @@ id,file,description,date,author,type,platform,port 2881,exploits/asp/webapps/2881.txt,"Ultimate HelpDesk - Cross-Site Scripting / Local File Disclosure",1970-01-01,ajann,webapps,asp, 2882,exploits/php/webapps/2882.txt,"BBS E-Market Professional - Full Path Disclosure / File Inclusion",1970-01-01,y3dips,webapps,php, 2883,exploits/php/webapps/2883.txt,"simple file manager 0.24a - Multiple Vulnerabilities",1970-01-01,flame,webapps,php, -2884,exploits/php/webapps/2884.txt,"awrate.com Message Board 1.0 - 'search.php' Remote File Inclusion",1970-01-01,DeltahackingTEAM,webapps,php, +2884,exploits/php/webapps/2884.py,"awrate.com Message Board 1.0 - 'search.php' Remote File Inclusion",1970-01-01,DeltahackingTEAM,webapps,php, 2885,exploits/php/webapps/2885.txt,"mxBB Module mx_tinies 1.3.0 - Remote File Inclusion",1970-01-01,bd0rk,webapps,php, 2886,exploits/php/webapps/2886.txt,"PHP Upload Center 2.0 - 'activate.php' File Inclusion",1970-01-01,GregStar,webapps,php, 2888,exploits/php/webapps/2888.php,"Envolution 1.1.0 - 'PNSVlang' Remote Code Execution",1970-01-01,Kacper,webapps,php, @@ -19746,14 +19746,14 @@ id,file,description,date,author,type,platform,port 2891,exploits/php/webapps/2891.txt,"CuteNews aj-fork 167f - 'cutepath' Remote File Inclusion",1970-01-01,DeltahackingTEAM,webapps,php, 2894,exploits/php/webapps/2894.txt,"Phorum 3.2.11 - 'common.php' Remote File Inclusion",1970-01-01,Mr-m07,webapps,php, 2895,exploits/php/webapps/2895.pl,"J-OWAMP Web Interface 2.1b - 'link' Remote File Inclusion",1970-01-01,3l3ctric-Cracker,webapps,php, -2896,exploits/php/webapps/2896.txt,"Tucows Client Code Suite (CSS) 1.2.1015 - Remote File Inclusion",1970-01-01,3l3ctric-Cracker,webapps,php, +2896,exploits/php/webapps/2896.py,"Tucows Client Code Suite (CSS) 1.2.1015 - Remote File Inclusion",1970-01-01,3l3ctric-Cracker,webapps,php, 2897,exploits/php/webapps/2897.txt,"CM68 News 12.02.06 - 'addpth' Remote File Inclusion",1970-01-01,"Paul Bakoyiannis",webapps,php, 2898,exploits/php/webapps/2898.txt,"ThinkEdit 1.9.2 - 'render.php' Remote File Inclusion",1970-01-01,r0ut3r,webapps,php, 2899,exploits/php/webapps/2899.txt,"paFileDB 3.5.2/3.5.3 - Remote Authentication Bypass / SQL Injection",1970-01-01,koray,webapps,php, 2902,exploits/php/webapps/2902.pl,"TorrentFlux 2.2 - 'downloaddetails.php' Local File Disclosure",1970-01-01,r0ut3r,webapps,php, 2903,exploits/php/webapps/2903.pl,"TorrentFlux 2.2 - 'maketorrent.php' Remote Command Execution",1970-01-01,r0ut3r,webapps,php, 2904,exploits/php/webapps/2904.txt,"mxBB Module Profile CP 0.91c - Remote File Inclusion",1970-01-01,bd0rk,webapps,php, -2905,exploits/php/webapps/2905.txt,"Gizzar 03162002 - 'index.php' Remote File Inclusion",1970-01-01,DeltahackingTEAM,webapps,php, +2905,exploits/php/webapps/2905.py,"Gizzar 03162002 - 'index.php' Remote File Inclusion",1970-01-01,DeltahackingTEAM,webapps,php, 2906,exploits/php/webapps/2906.pl,"Fantastic News 2.1.4 - 'news.php' SQL Injection",1970-01-01,Bl0od3r,webapps,php, 2907,exploits/asp/webapps/2907.txt,"SpotLight CRM 1.0 - 'login.asp' SQL Injection",1970-01-01,ajann,webapps,asp, 2908,exploits/asp/webapps/2908.txt,"Request For Travel 1.0 - 'product' SQL Injection",1970-01-01,ajann,webapps,asp, @@ -19801,7 +19801,7 @@ id,file,description,date,author,type,platform,port 2981,exploits/php/webapps/2981.php,"open NewsLetter 2.5 - Multiple Vulnerabilities (2)",1970-01-01,BlackHawk,webapps,php, 2982,exploits/php/webapps/2982.txt,"3editor CMS 0.42 - 'index.php' Local File Inclusion",1970-01-01,3l3ctric-Cracker,webapps,php, 2983,exploits/php/webapps/2983.txt,"b2 Blog 0.5 - 'b2verifauth.php' Remote File Inclusion",1970-01-01,mdx,webapps,php, -2984,exploits/php/webapps/2984.txt,"SH-News 0.93 - 'misc.php' Remote File Inclusion",1970-01-01,bd0rk,webapps,php, +2984,exploits/php/webapps/2984.py,"SH-News 0.93 - 'misc.php' Remote File Inclusion",1970-01-01,bd0rk,webapps,php, 2986,exploits/asp/webapps/2986.txt,"Enthrallweb ePhotos 1.0 - 'subLevel2.asp' SQL Injection",1970-01-01,ajann,webapps,asp, 2987,exploits/asp/webapps/2987.txt,"Enthrallweb eHomes 1.0 - Multiple (SQL Injection / Cross-Site Scripting) Vulnerabilities",1970-01-01,ajann,webapps,asp, 2988,exploits/asp/webapps/2988.pl,"Enthrallweb eJobs - 'newsdetail.asp' SQL Injection",1970-01-01,ajann,webapps,asp, @@ -20183,7 +20183,7 @@ id,file,description,date,author,type,platform,port 3611,exploits/php/webapps/3611.txt,"JC URLShrink 1.3.1 - Remote Code Execution",1970-01-01,Dj7xpl,webapps,php, 3612,exploits/php/webapps/3612.pl,"XOOPS Module Repository - 'viewcat.php' SQL Injection",1970-01-01,ajann,webapps,php, 3613,exploits/php/webapps/3613.txt,"phpBB MOD Forum picture and META tags 1.7 - Remote File Inclusion",1970-01-01,bd0rk,webapps,php, -3614,exploits/php/webapps/3614.txt,"JSBoard 2.0.10 - 'login.php?table' Local File Inclusion",1970-01-01,GoLd_M,webapps,php, +3614,exploits/php/webapps/3614.py,"JSBoard 2.0.10 - 'login.php?table' Local File Inclusion",1970-01-01,GoLd_M,webapps,php, 3618,exploits/php/webapps/3618.html,"XOOPS Module Lykos Reviews 1.00 - 'index.php' SQL Injection",1970-01-01,ajann,webapps,php, 3619,exploits/php/webapps/3619.pl,"XOOPS Module Library - 'viewcat.php' SQL Injection",1970-01-01,ajann,webapps,php, 3620,exploits/php/webapps/3620.pl,"XOOPS Module Core - 'viewcat.php' SQL Injection",1970-01-01,ajann,webapps,php, @@ -20219,7 +20219,7 @@ id,file,description,date,author,type,platform,port 3667,exploits/php/webapps/3667.txt,"Sisplet CMS 05.10 - 'site_path' Remote File Inclusion",1970-01-01,kezzap66345,webapps,php, 3668,exploits/php/webapps/3668.txt,"CodeWand phpBrowse - 'site_path' Remote File Inclusion",1970-01-01,kezzap66345,webapps,php, 3669,exploits/php/webapps/3669.txt,"PHP-Generics 1.0.0 Beta - Multiple Remote File Inclusions",1970-01-01,bd0rk,webapps,php, -3670,exploits/php/webapps/3670.txt,"XOOPS Module WF-Links 1.03 - 'cid' SQL Injection",1970-01-01,ajann,webapps,php, +3670,exploits/php/webapps/3670.py,"XOOPS Module WF-Links 1.03 - 'cid' SQL Injection",1970-01-01,ajann,webapps,php, 3671,exploits/php/webapps/3671.php,"phpMyNewsletter 0.8 (beta5) - Multiple Vulnerabilities",1970-01-01,BlackHawk,webapps,php, 3672,exploits/php/webapps/3672.pl,"XOOPS Module Jobs 2.4 - 'cid' SQL Injection",1970-01-01,ajann,webapps,php, 3673,exploits/php/webapps/3673.txt,"WebSPELL 4.01.02 - 'picture.php' File Disclosure",1970-01-01,Trex,webapps,php, @@ -20227,7 +20227,7 @@ id,file,description,date,author,type,platform,port 3677,exploits/php/webapps/3677.txt,"cattaDoc 2.21 - 'download2.php?fn1' Remote File Disclosure",1970-01-01,GoLd_M,webapps,php, 3678,exploits/php/webapps/3678.php,"SmodBIP 1.06 - aktualnosci zoom SQL Injection",1970-01-01,Kacper,webapps,php, 3679,exploits/php/webapps/3679.php,"SmodCMS 2.10 - Slownik ssid SQL Injection",1970-01-01,Kacper,webapps,php, -3681,exploits/php/webapps/3681.txt,"Scorp Book 1.0 - 'smilies.php?config' Remote File Inclusion",1970-01-01,Dj7xpl,webapps,php, +3681,exploits/php/webapps/3681.py,"Scorp Book 1.0 - 'smilies.php?config' Remote File Inclusion",1970-01-01,Dj7xpl,webapps,php, 3683,exploits/php/webapps/3683.pl,"PHP-Nuke Module eBoard 1.0.7 - GLOBALS[name] Local File Inclusion",1970-01-01,bd0rk,webapps,php, 3685,exploits/php/webapps/3685.txt,"MyBlog: PHP and MySQL Blog/CMS software - Remote File Inclusion",1970-01-01,the_Edit0r,webapps,php, 3686,exploits/php/webapps/3686.txt,"WitShare 0.9 - 'index.php?menu' Local File Inclusion",1970-01-01,the_Edit0r,webapps,php, @@ -20295,7 +20295,7 @@ id,file,description,date,author,type,platform,port 3773,exploits/php/webapps/3773.txt,"JChit counter 1.0.0 - 'imgsrv.php?ac' Remote File Disclosure",1970-01-01,Dj7xpl,webapps,php, 3774,exploits/php/webapps/3774.txt,"PHP-Ring Webring System 0.9 - SQL Injection",1970-01-01,Dj7xpl,webapps,php, 3775,exploits/php/webapps/3775.txt,"Maran PHP Forum - 'forum_write.php' Remote Code Execution",1970-01-01,Dj7xpl,webapps,php, -3778,exploits/php/webapps/3778.txt,"WEBInsta FM 0.1.4 - 'login.php' absolute_path Remote File Inclusion",1970-01-01,g00ns,webapps,php, +3778,exploits/php/webapps/3778.py,"WEBInsta FM 0.1.4 - 'login.php' absolute_path Remote File Inclusion",1970-01-01,g00ns,webapps,php, 3780,exploits/php/webapps/3780.pl,"MyBulletinBoard (MyBB) 1.2.5 - 'calendar.php' Blind SQL Injection",1970-01-01,0x86,webapps,php, 3781,exploits/php/webapps/3781.txt,"Joomla! 1.5.0 Beta - 'pcltar.php' Remote File Inclusion",1970-01-01,Omid,webapps,php, 3783,exploits/php/webapps/3783.txt,"Pagode 0.5.8 - 'navigator_ok.php?asolute' Remote File Disclosure",1970-01-01,GoLd_M,webapps,php, @@ -20323,7 +20323,7 @@ id,file,description,date,author,type,platform,port 3828,exploits/php/webapps/3828.txt,"WordPress Plugin myflash 1.00 - 'wppath' Remote File Inclusion",1970-01-01,Crackers_Child,webapps,php, 3831,exploits/asp/webapps/3831.txt,"PStruh-CZ 1.3/1.5 - 'download.asp' File Disclosure",1970-01-01,Dj7xpl,webapps,asp, 3832,exploits/php/webapps/3832.txt,"1024 CMS 0.7 - 'download.php' Remote File Disclosure",1970-01-01,Dj7xpl,webapps,php, -3833,exploits/php/webapps/3833.pl,"mxBB Module FAQ & RULES 2.0.0 - Remote File Inclusion",1970-01-01,bd0rk,webapps,php, +3833,exploits/php/webapps/3833.php,"mxBB Module FAQ & RULES 2.0.0 - Remote File Inclusion",1970-01-01,bd0rk,webapps,php, 3834,exploits/php/webapps/3834.php,"YaPiG 0.95b - Remote Code Execution",1970-01-01,Dj7xpl,webapps,php, 3835,exploits/php/webapps/3835.txt,"PostNuke Module v4bJournal - SQL Injection",1970-01-01,"Ali Abbasi",webapps,php, 3837,exploits/php/webapps/3837.txt,"phpChess Community Edition 2.0 - Multiple Remote File Inclusions",1970-01-01,GoLd_M,webapps,php, @@ -20438,7 +20438,7 @@ id,file,description,date,author,type,platform,port 4025,exploits/php/webapps/4025.php,"Quick.Cart 2.2 - Local/Remote File Inclusion / Remote Code Execution",1970-01-01,Kacper,webapps,php, 4026,exploits/php/webapps/4026.php,"PNPHPBB2 < 1.2 - 'index.php' SQL Injection",1970-01-01,Kacper,webapps,php, 4029,exploits/php/webapps/4029.php,"Sendcard 3.4.1 - Local File Inclusion / Remote Code Execution",1970-01-01,Silentz,webapps,php, -4030,exploits/php/webapps/4030.php,"EQdkp 1.3.2 - 'listmembers.php' SQL Injection",1970-01-01,Silentz,webapps,php, +4030,exploits/php/webapps/4030.py,"EQdkp 1.3.2 - 'listmembers.php' SQL Injection",1970-01-01,Silentz,webapps,php, 4031,exploits/php/webapps/4031.txt,"Madirish Webmail 2.0 - 'addressbook.php' Remote File Inclusion",1970-01-01,BoZKuRTSeRDaR,webapps,php, 4034,exploits/php/webapps/4034.txt,"Kravchuk letter script 1.0 - 'scdir' Remote File Inclusion",1970-01-01,"Mehmet Ince",webapps,php, 4035,exploits/php/webapps/4035.txt,"Comicsense 0.2 - 'index.php?epi' SQL Injection (1)",1970-01-01,s0cratex,webapps,php, @@ -20525,7 +20525,7 @@ id,file,description,date,author,type,platform,port 4164,exploits/php/webapps/4164.txt,"Aigaion 1.3.3 - 'topic topic_id' SQL Injection",1970-01-01,CypherXero,webapps,php, 4166,exploits/php/webapps/4166.txt,"vBulletin Mod RPG Inferno 2.4 - 'inferno.php' SQL Injection",1970-01-01,t0pP8uZz,webapps,php, 4167,exploits/php/webapps/4167.txt,"OpenLD 1.2.2 - 'index.php?id' SQL Injection",1970-01-01,CypherXero,webapps,php, -4169,exploits/php/webapps/4169.txt,"FlashBB 1.1.8 - 'sendmsg.php' Remote File Inclusion",1970-01-01,Kw3[R]Ln,webapps,php, +4169,exploits/php/webapps/4169.py,"FlashBB 1.1.8 - 'sendmsg.php' Remote File Inclusion",1970-01-01,Kw3[R]Ln,webapps,php, 4171,exploits/php/webapps/4171.pl,"Mail Machine 3.989 - Local File Inclusion",1970-01-01,"H4 / XPK",webapps,php, 4173,exploits/php/webapps/4173.txt,"SquirrelMail G/PGP Encryption Plugin 2.0 - Command Execution",1970-01-01,jmp-esp,webapps,php, 4174,exploits/php/webapps/4174.txt,"PsNews 1.1 - 'show.php?newspath' Local File Inclusion",1970-01-01,irk4z,webapps,php, @@ -20561,7 +20561,7 @@ id,file,description,date,author,type,platform,port 40466,exploits/php/webapps/40466.txt,"Advance MLM Script - SQL Injection",1970-01-01,OoN_Boy,webapps,php, 4235,exploits/php/webapps/4235.txt,"Seditio CMS 121 - 'pfs.php' Arbitrary File Upload",1970-01-01,A.D.T,webapps,php, 4238,exploits/php/webapps/4238.txt,"Adult Directory - 'cat_id' SQL Injection",1970-01-01,t0pP8uZz,webapps,php, -4239,exploits/asp/webapps/4239.txt,"SimpleBlog 3.0 - 'comments_get.asp?id' SQL Injection",1970-01-01,g00ns,webapps,asp, +4239,exploits/asp/webapps/4239.py,"SimpleBlog 3.0 - 'comments_get.asp?id' SQL Injection",1970-01-01,g00ns,webapps,asp, 4241,exploits/php/webapps/4241.txt,"PHP123 Top Sites - 'category.php?cat' SQL Injection",1970-01-01,t0pP8uZz,webapps,php, 4242,exploits/php/webapps/4242.php,"LinPHA 1.3.1 - 'new_images.php' Blind SQL Injection",1970-01-01,EgiX,webapps,php, 4246,exploits/php/webapps/4246.txt,"wolioCMS - Authentication Bypass / SQL Injection",1970-01-01,k1tk4t,webapps,php, @@ -20609,7 +20609,7 @@ id,file,description,date,author,type,platform,port 4338,exploits/php/webapps/4338.pl,"ABC estore 3.0 - 'cat_id' Blind SQL Injection",1970-01-01,k1tk4t,webapps,php, 4339,exploits/php/webapps/4339.txt,"PHPNS 1.1 - 'shownews.php?id' SQL Injection",1970-01-01,SmOk3,webapps,php, 4340,exploits/php/webapps/4340.txt,"phpBG 0.9.1 - 'rootdir' Remote File Inclusion",1970-01-01,GoLd_M,webapps,php, -4341,exploits/php/webapps/4341.txt,"Pakupaku CMS 0.4 - Arbitrary File Upload / Local File Inclusion",1970-01-01,GoLd_M,webapps,php, +4341,exploits/php/webapps/4341.py,"Pakupaku CMS 0.4 - Arbitrary File Upload / Local File Inclusion",1970-01-01,GoLd_M,webapps,php, 4342,exploits/php/webapps/4342.txt,"NMDeluxe 2.0.0 - 'id' SQL Injection",1970-01-01,"not sec group",webapps,php, 4343,exploits/cgi/webapps/4343.txt,"Ourspace 2.0.9 - 'uploadmedia.cgi' Arbitrary File Upload",1970-01-01,Don,webapps,cgi, 4346,exploits/php/webapps/4346.pl,"phpBB Links MOD 1.2.2 - SQL Injection",1970-01-01,Don,webapps,php, @@ -20929,7 +20929,7 @@ id,file,description,date,author,type,platform,port 4805,exploits/php/webapps/4805.txt,"NoseRub 0.5.2 - Login SQL Injection",1970-01-01,"Felix Groebert",webapps,php, 4807,exploits/php/webapps/4807.php,"jPORTAL 2.3.1 & UserPatch - 'forum.php' Remote Code Execution",1970-01-01,irk4z,webapps,php, 4808,exploits/php/webapps/4808.txt,"Mihalism Multi Forum Host 3.0.x - Remote File Inclusion",1970-01-01,GoLd_M,webapps,php, -4809,exploits/php/webapps/4809.txt,"CCMS 3.1 Demo - SQL Injection",1970-01-01,Pr0metheuS,webapps,php, +4809,exploits/php/webapps/4809.py,"CCMS 3.1 Demo - SQL Injection",1970-01-01,Pr0metheuS,webapps,php, 4810,exploits/php/webapps/4810.txt,"CMS Made Simple 1.2.2 Module TinyMCE - SQL Injection",1970-01-01,EgiX,webapps,php, 4811,exploits/php/webapps/4811.txt,"kontakt formular 1.4 - Remote File Inclusion",1970-01-01,bd0rk,webapps,php, 4812,exploits/php/webapps/4812.txt,"Mihalism Multi Host 2.0.7 - 'download.php' Remote File Disclosure",1970-01-01,GoLd_M,webapps,php, @@ -21039,7 +21039,7 @@ id,file,description,date,author,type,platform,port 4954,exploits/php/webapps/4954.txt,"IDM-OS 1.0 - 'Filename' File Disclosure",1970-01-01,MhZ91,webapps,php, 4955,exploits/php/webapps/4955.txt,"Lama Software 14.12.2007 - Multiple Remote File Inclusions",1970-01-01,QTRinux,webapps,php, 4956,exploits/php/webapps/4956.txt,"Alstrasoft Forum Pay Per Post Exchange 2.0 - SQL Injection",1970-01-01,t0pP8uZz,webapps,php, -4957,exploits/php/webapps/4957.txt,"MoinMoin 1.5.x - 'MOIND_ID' Cookie Login Bypass",1970-01-01,nonroot,webapps,php, +4957,exploits/php/webapps/4957.py,"MoinMoin 1.5.x - 'MOIND_ID' Cookie Login Bypass",1970-01-01,nonroot,webapps,php, 4958,exploits/php/webapps/4958.txt,"aflog 1.01 - Cross-Site Scripting / SQL Injection",1970-01-01,shinmai,webapps,php, 4960,exploits/php/webapps/4960.txt,"Easysitenetwork Recipe - 'categoryId' SQL Injection",1970-01-01,S@BUN,webapps,php, 4961,exploits/php/webapps/4961.php,"Coppermine Photo Gallery 1.4.10 - SQL Injection",1970-01-01,RST/GHC,webapps,php, @@ -21099,7 +21099,7 @@ id,file,description,date,author,type,platform,port 5039,exploits/php/webapps/5039.txt,"WordPress Plugin Wordspew - SQL Injection",1970-01-01,S@BUN,webapps,php, 5040,exploits/php/webapps/5040.txt,"BookmarkX script 2007 - 'topicid' SQL Injection",1970-01-01,S@BUN,webapps,php, 5041,exploits/php/webapps/5041.txt,"phpShop 0.8.1 - SQL Injection / Filter Bypass",1970-01-01,"the redc0ders",webapps,php, -5042,exploits/php/webapps/5042.txt,"BlogPHP 2 - 'id' Cross-Site Scripting / SQL Injection",1970-01-01,"Khashayar Fereidani",webapps,php, +5042,exploits/php/webapps/5042.py,"BlogPHP 2 - 'id' Cross-Site Scripting / SQL Injection",1970-01-01,"Khashayar Fereidani",webapps,php, 5047,exploits/php/webapps/5047.txt,"Joomla! Component mosDirectory 2.3.2 - 'catid' SQL Injection",1970-01-01,GoLd_M,webapps,php, 5050,exploits/php/webapps/5050.pl,"A-Blog 2.0 - Cross-Site Scripting / SQL Injection",1970-01-01,"Khashayar Fereidani",webapps,php, 5053,exploits/php/webapps/5053.txt,"WordPress Plugin st_newsletter - SQL Injection",1970-01-01,S@BUN,webapps,php, @@ -21159,7 +21159,7 @@ id,file,description,date,author,type,platform,port 5127,exploits/php/webapps/5127.txt,"WordPress Plugin Simple Forum 1.10 < 1.11 - SQL Injection",1970-01-01,S@BUN,webapps,php, 5128,exploits/php/webapps/5128.txt,"Mambo Component Quran 1.1 - 'surano' SQL Injection",1970-01-01,Don,webapps,php, 5129,exploits/php/webapps/5129.txt,"TRUC 0.11.0 - 'download.php' Remote File Disclosure",1970-01-01,GoLd_M,webapps,php, -5130,exploits/php/webapps/5130.txt,"AuraCMS 1.62 - Multiple SQL Injections",1970-01-01,NTOS-Team,webapps,php, +5130,exploits/php/webapps/5130.py,"AuraCMS 1.62 - Multiple SQL Injections",1970-01-01,NTOS-Team,webapps,php, 5131,exploits/php/webapps/5131.pl,"Simple CMS 1.0.3 - 'area' SQL Injection",1970-01-01,JosS,webapps,php, 5132,exploits/php/webapps/5132.txt,"Joomla! Component jooget 2.6.8 - SQL Injection",1970-01-01,S@BUN,webapps,php, 5133,exploits/php/webapps/5133.txt,"Mambo Component Ricette 1.0 - SQL Injection",1970-01-01,S@BUN,webapps,php, @@ -21174,7 +21174,7 @@ id,file,description,date,author,type,platform,port 5146,exploits/php/webapps/5146.txt,"Joomla! Component com_clasifier - 'cat_id' SQL Injection",1970-01-01,S@BUN,webapps,php, 5147,exploits/php/webapps/5147.txt,"PHP-Nuke Module books SQL - 'cid' SQL Injection",1970-01-01,S@BUN,webapps,php, 5148,exploits/php/webapps/5148.txt,"XOOPS Module myTopics - 'articleId' SQL Injection",1970-01-01,S@BUN,webapps,php, -5149,exploits/php/webapps/5149.txt,"sCssBoard (Multiple Versions) - 'pwnpack' Remote s",1970-01-01,Inphex,webapps,php, +5149,exploits/php/webapps/5149.rb,"sCssBoard (Multiple Versions) - 'pwnpack' Remote s",1970-01-01,Inphex,webapps,php, 5154,exploits/php/webapps/5154.txt,"PHP-Nuke Module Sections - 'artid' SQL Injection",1970-01-01,S@BUN,webapps,php, 5155,exploits/php/webapps/5155.txt,"PHP-Nuke Module EasyContent - 'page_id' SQL Injection",1970-01-01,"Mehmet Ince",webapps,php, 5156,exploits/php/webapps/5156.txt,"RunCMS Module MyAnnonces - 'cid' SQL Injection",1970-01-01,S@BUN,webapps,php, @@ -21303,7 +21303,7 @@ id,file,description,date,author,type,platform,port 5328,exploits/php/webapps/5328.txt,"PHPSpamManager 0.53b - 'body.php' Remote File Disclosure",1970-01-01,GoLd_M,webapps,php, 5329,exploits/php/webapps/5329.txt,"Woltlab Burning Board Addon JGS-Treffen 2.0.2 - SQL Injection",1970-01-01,anonymous,webapps,php, 5331,exploits/php/webapps/5331.pl,"Neat weblog 0.2 - 'articleId' SQL Injection",1970-01-01,"Khashayar Fereidani",webapps,php, -5333,exploits/php/webapps/5333.txt,"EasyNews 40tr - SQL Injection / Cross-Site Scripting / Local File Inclusion",1970-01-01,"Khashayar Fereidani",webapps,php, +5333,exploits/php/webapps/5333.py,"EasyNews 40tr - SQL Injection / Cross-Site Scripting / Local File Inclusion",1970-01-01,"Khashayar Fereidani",webapps,php, 5334,exploits/php/webapps/5334.txt,"FaScript FaPhoto 1.0 - 'show.php' SQL Injection",1970-01-01,"Khashayar Fereidani",webapps,php, 5335,exploits/php/webapps/5335.txt,"Mambo Component Ahsshop 1.51 - 'vara' SQL Injection",1970-01-01,S@BUN,webapps,php, 5336,exploits/php/webapps/5336.pl,"EggBlog 4.0 - SQL Injection",1970-01-01,girex,webapps,php, @@ -21583,7 +21583,7 @@ id,file,description,date,author,type,platform,port 5674,exploits/php/webapps/5674.txt,"RoomPHPlanning 1.5 - Arbitrary Add Admin",1970-01-01,Stack,webapps,php, 5675,exploits/php/webapps/5675.txt,"RoomPHPlanning 1.5 - Multiple SQL Injections",1970-01-01,"Virangar Security",webapps,php, 5676,exploits/php/webapps/5676.txt,"CMS MAXSITE 1.10 - 'category' SQL Injection",1970-01-01,Tesz,webapps,php, -5677,exploits/php/webapps/5677.txt,"RevokeBB 1.0 RC11 - 'Search' SQL Injection",1970-01-01,The:Paradox,webapps,php, +5677,exploits/php/webapps/5677.py,"RevokeBB 1.0 RC11 - 'Search' SQL Injection",1970-01-01,The:Paradox,webapps,php, 5678,exploits/php/webapps/5678.txt,"CKGold Shopping Cart 2.5 - 'category_id' SQL Injection",1970-01-01,Cr@zy_King,webapps,php, 5680,exploits/php/webapps/5680.txt,"OtomiGen.x 2.2 - 'lang' Local File Inclusion",1970-01-01,Saime,webapps,php, 5683,exploits/php/webapps/5683.txt,"PHPhotoalbum 0.5 - Multiple SQL Injections",1970-01-01,cOndemned,webapps,php, @@ -21642,7 +21642,7 @@ id,file,description,date,author,type,platform,port 5755,exploits/php/webapps/5755.pl,"Joomla! Component yvComment 1.16 - Blind SQL Injection",1970-01-01,His0k4,webapps,php, 5756,exploits/php/webapps/5756.txt,"XOOPS Module Uploader 1.1 - 'Filename' File Disclosure",1970-01-01,MEEKAAH,webapps,php, 5757,exploits/php/webapps/5757.txt,"BrowserCRM 5.002.00 - 'clients.php' Remote File Inclusion",1970-01-01,ahmadbady,webapps,php, -5758,exploits/php/webapps/5758.txt,"Galatolo Web Manager 1.0 - Cross-Site Scripting / Local File Inclusion",1970-01-01,StAkeR,webapps,php, +5758,exploits/php/webapps/5758.py,"Galatolo Web Manager 1.0 - Cross-Site Scripting / Local File Inclusion",1970-01-01,StAkeR,webapps,php, 5759,exploits/php/webapps/5759.txt,"Joomla! Component Rapid Recipe 1.6.6/1.6.7 - SQL Injection",1970-01-01,His0k4,webapps,php, 5760,exploits/php/webapps/5760.pl,"Galatolo Web Manager 1.0 - SQL Injection",1970-01-01,Stack,webapps,php, 5761,exploits/php/webapps/5761.pl,"Joomla! Component iJoomla! News Portal 1.0 - 'itemID' SQL Injection",1970-01-01,"ilker Kandemir",webapps,php, @@ -21737,7 +21737,7 @@ id,file,description,date,author,type,platform,port 5862,exploits/php/webapps/5862.txt,"samart-cms 2.0 - 'contentsid' SQL Injection",1970-01-01,dun,webapps,php, 5863,exploits/php/webapps/5863.txt,"CMS-BRD - 'menuclick' SQL Injection",1970-01-01,dun,webapps,php, 5864,exploits/php/webapps/5864.txt,"Orlando CMS 0.6 - Remote File Inclusion",1970-01-01,Ciph3r,webapps,php, -5865,exploits/php/webapps/5865.txt,"CaupoShop Classic 1.3 - 'saArticle[ID]' SQL Injection",1970-01-01,anonymous,webapps,php, +5865,exploits/php/webapps/5865.py,"CaupoShop Classic 1.3 - 'saArticle[ID]' SQL Injection",1970-01-01,anonymous,webapps,php, 5866,exploits/php/webapps/5866.txt,"Lotus Core CMS 1.0.1 - Remote File Inclusion",1970-01-01,Ciph3r,webapps,php, 5867,exploits/php/webapps/5867.txt,"AJ Auction Web 2.0 - 'cate_id' SQL Injection",1970-01-01,"Hussin X",webapps,php, 5868,exploits/php/webapps/5868.txt,"AJ Auction 1.0 - 'id' SQL Injection",1970-01-01,"Hussin X",webapps,php, @@ -21859,7 +21859,7 @@ id,file,description,date,author,type,platform,port 5993,exploits/php/webapps/5993.txt,"Joomla! Component Brightcode Weblinks - 'catid' SQL Injection",1970-01-01,His0k4,webapps,php, 5994,exploits/php/webapps/5994.pl,"Joomla! Component QuickTime VR 0.1 - SQL Injection",1970-01-01,Houssamix,webapps,php, 5995,exploits/php/webapps/5995.pl,"Joomla! Component is 1.0.1 - Multiple SQL Injections",1970-01-01,Houssamix,webapps,php, -5996,exploits/php/webapps/5996.txt,"PHPortal 1.2 - Multiple Remote File Inclusions",1970-01-01,Ciph3r,webapps,php, +5996,exploits/php/webapps/5996.py,"PHPortal 1.2 - Multiple Remote File Inclusions",1970-01-01,Ciph3r,webapps,php, 5997,exploits/php/webapps/5997.pl,"CMS WebBlizzard - 'index.php' Blind SQL Injection",1970-01-01,Bl@ckbe@rD,webapps,php, 5998,exploits/php/webapps/5998.txt,"PHPwebnews 0.2 MySQL Edition - 'id_kat' SQL Injection",1970-01-01,storm,webapps,php, 5999,exploits/php/webapps/5999.txt,"PHPwebnews 0.2 MySQL Edition - 'det' SQL Injection",1970-01-01,"Virangar Security",webapps,php, @@ -22147,9 +22147,9 @@ id,file,description,date,author,type,platform,port 6411,exploits/php/webapps/6411.txt,"AvailScript Photo Album - 'pics.php' Multiple Vulnerabilities",1970-01-01,sl4xUz,webapps,php, 6412,exploits/php/webapps/6412.txt,"AvailScript Classmate Script - 'viewprofile.php' SQL Injection",1970-01-01,Stack,webapps,php, 6413,exploits/php/webapps/6413.txt,"Zanfi CMS lite 1.2 - Multiple Local File Inclusions",1970-01-01,SirGod,webapps,php, -6416,exploits/php/webapps/6416.txt,"Libera CMS 1.12 - 'cookie' SQL Injection",1970-01-01,StAkeR,webapps,php, +6416,exploits/php/webapps/6416.py,"Libera CMS 1.12 - 'cookie' SQL Injection",1970-01-01,StAkeR,webapps,php, 6417,exploits/php/webapps/6417.txt,"AvailScript Jobs Portal Script - 'jid' SQL Injection",1970-01-01,InjEctOr5,webapps,php, -6419,exploits/php/webapps/6419.txt,"Zanfi CMS lite 2.1 / Jaw Portal free - 'FCKeditor' Arbitrary File Upload",1970-01-01,reptil,webapps,php, +6419,exploits/php/webapps/6419.py,"Zanfi CMS lite 2.1 / Jaw Portal free - 'FCKeditor' Arbitrary File Upload",1970-01-01,reptil,webapps,php, 6420,exploits/asp/webapps/6420.txt,"aspwebalbum 3.2 - Multiple Vulnerabilities",1970-01-01,e.wiZz!,webapps,asp, 6421,exploits/php/webapps/6421.php,"WordPress Core 2.6.1 - Admin Takeover (SQL Column Truncation)",1970-01-01,iso^kpsbr,webapps,php, 6422,exploits/php/webapps/6422.txt,"PHPVID 1.1 - Cross-Site Scripting / SQL Injection",1970-01-01,r45c4l,webapps,php, @@ -22230,7 +22230,7 @@ id,file,description,date,author,type,platform,port 6520,exploits/php/webapps/6520.txt,"6rbScript 3.3 - 'section.php' Local File Inclusion",1970-01-01,Stack,webapps,php, 6521,exploits/php/webapps/6521.txt,"Rianxosencabos CMS 0.9 - Insecure Cookie Handling",1970-01-01,Stack,webapps,php, 6522,exploits/php/webapps/6522.txt,"AvailScript Article Script - 'view.php' SQL Injection",1970-01-01,"Hussin X",webapps,php, -6523,exploits/php/webapps/6523.php,"WCMS 1.0b - Arbitrary Add Admin",1970-01-01,"CWH Underground",webapps,php, +6523,exploits/php/webapps/6523.py,"WCMS 1.0b - Arbitrary Add Admin",1970-01-01,"CWH Underground",webapps,php, 6524,exploits/php/webapps/6524.txt,"WSN Links 2.22/2.23 - 'vote.php' SQL Injection",1970-01-01,d3v1l,webapps,php, 6525,exploits/php/webapps/6525.txt,"WSN Links 2.20 - 'comments.php' SQL Injection",1970-01-01,d3v1l,webapps,php, 6526,exploits/php/webapps/6526.txt,"PHP iCalendar 2.24 - Insecure Cookie Handling",1970-01-01,Stack,webapps,php, @@ -22345,7 +22345,7 @@ id,file,description,date,author,type,platform,port 6664,exploits/php/webapps/6664.txt,"Kwalbum 2.0.2 - Arbitrary File Upload",1970-01-01,"CWH Underground",webapps,php, 6667,exploits/php/webapps/6667.txt,"pPIM 1.01 - 'notes.php' Local File Inclusion",1970-01-01,JosS,webapps,php, 6669,exploits/php/webapps/6669.txt,"JMweb - 'src' Local File Inclusion",1970-01-01,SirGod,webapps,php, -6670,exploits/php/webapps/6670.txt,"FOSS Gallery Admin 1.0 - Arbitrary File Upload",1970-01-01,Pepelux,webapps,php, +6670,exploits/php/webapps/6670.py,"FOSS Gallery Admin 1.0 - Arbitrary File Upload",1970-01-01,Pepelux,webapps,php, 6674,exploits/php/webapps/6674.pl,"FOSS Gallery Public 1.0 - Arbitrary File Upload",1970-01-01,JosS,webapps,php, 6675,exploits/php/webapps/6675.pl,"Galerie 3.2 - 'pic' WBB Lite Addon Blind SQL Injection",1970-01-01,J0hn.X3r,webapps,php, 6676,exploits/php/webapps/6676.txt,"OpenNMS < 1.5.96 - Multiple Vulnerabilities",1970-01-01,"BugSec LTD",webapps,php, @@ -22702,7 +22702,7 @@ id,file,description,date,author,type,platform,port 7111,exploits/php/webapps/7111.txt,"ScriptsFeed (SF) Auto Classifieds Software - Arbitrary File Upload",1970-01-01,ZoRLu,webapps,php, 7112,exploits/php/webapps/7112.txt,"ScriptsFeed (SF) Recipes Listing Portal - Arbitrary File Upload",1970-01-01,ZoRLu,webapps,php, 7113,exploits/php/webapps/7113.txt,"BandSite CMS 1.1.4 - Insecure Cookie Handling",1970-01-01,Stack,webapps,php, -7114,exploits/php/webapps/7114.txt,"MemHT Portal 4.0.1 - SQL Injection / Code Execution",1970-01-01,Ams,webapps,php, +7114,exploits/php/webapps/7114.py,"MemHT Portal 4.0.1 - SQL Injection / Code Execution",1970-01-01,Ams,webapps,php, 7116,exploits/php/webapps/7116.txt,"Alstrasoft Web Host Directory 1.2 - Multiple Vulnerabilities",1970-01-01,G4N0K,webapps,php, 7117,exploits/php/webapps/7117.txt,"GS Real Estate Portal US/International Module - Multiple Vulnerabilities",1970-01-01,ZoRLu,webapps,php, 7118,exploits/php/webapps/7118.txt,"TurnkeyForms - Text Link Sales Authentication Bypass",1970-01-01,G4N0K,webapps,php, @@ -22994,7 +22994,7 @@ id,file,description,date,author,type,platform,port 7473,exploits/php/webapps/7473.php,"EZ Publish < 3.9.5/3.10.1/4.0.1 - 'token' Privilege Escalation",1970-01-01,s4avrd0w,webapps,php, 7474,exploits/php/webapps/7474.txt,"FLDS 1.2a - 'lpro.php' SQL Injection",1970-01-01,nuclear,webapps,php, 7475,exploits/php/webapps/7475.txt,"BabbleBoard 1.1.6 - Cross-Site Request Forgery/Cookie Grabber",1970-01-01,SirGod,webapps,php, -7476,exploits/php/webapps/7476.txt,"Mediatheka 4.2 - Blind SQL Injection",1970-01-01,StAkeR,webapps,php, +7476,exploits/php/webapps/7476.py,"Mediatheka 4.2 - Blind SQL Injection",1970-01-01,StAkeR,webapps,php, 7478,exploits/php/webapps/7478.txt,"The Rat CMS Alpha 2 - Authentication Bypass",1970-01-01,x0r,webapps,php, 7479,exploits/php/webapps/7479.txt,"XOOPS Module Amevents - SQL Injection",1970-01-01,nétRoot,webapps,php, 7480,exploits/php/webapps/7480.txt,"CadeNix - SQL Injection",1970-01-01,HaCkeR_EgY,webapps,php, @@ -23049,7 +23049,7 @@ id,file,description,date,author,type,platform,port 7541,exploits/php/webapps/7541.pl,"RSS Simple News - SQL Injection",1970-01-01,Piker,webapps,php, 7542,exploits/php/webapps/7542.txt,"Text Lines Rearrange Script - 'Filename' File Disclosure",1970-01-01,SirGod,webapps,php, 7543,exploits/php/webapps/7543.txt,"WordPress Plugin Page Flip Image Gallery 0.2.2 - Remote File Disclosure",1970-01-01,GoLd_M,webapps,php, -7544,exploits/php/webapps/7544.txt,"Pligg 9.9.5b - Arbitrary File Upload / SQL Injection",1970-01-01,Ams,webapps,php, +7544,exploits/php/webapps/7544.py,"Pligg 9.9.5b - Arbitrary File Upload / SQL Injection",1970-01-01,Ams,webapps,php, 7545,exploits/php/webapps/7545.txt,"yourplace 1.0.2 - Multiple Vulnerabilities / Remote Code Execution",1970-01-01,Osirys,webapps,php, 7546,exploits/php/webapps/7546.txt,"Joomla! Component Volunteer 2.0 - SQL Injection",1970-01-01,boom3rang,webapps,php, 7548,exploits/php/webapps/7548.php,"SolarCMS 0.53.8 - 'Forum' Remote Cookies Disclosure",1970-01-01,StAkeR,webapps,php, @@ -23154,7 +23154,7 @@ id,file,description,date,author,type,platform,port 7700,exploits/php/webapps/7700.php,"CuteNews 1.4.6 - 'ip ban' Authorized Cross-Site Scripting / Command Execution",1970-01-01,StAkeR,webapps,php, 7703,exploits/php/webapps/7703.txt,"PHP-Fusion Mod vArcade 1.8 - 'comment_id' SQL Injection",1970-01-01,"Khashayar Fereidani",webapps,php, 7704,exploits/php/webapps/7704.pl,"Pizzis CMS 1.5.1 - Blind SQL Injection",1970-01-01,darkjoker,webapps,php, -7705,exploits/php/webapps/7705.pl,"XOOPS 2.3.2 - 'mydirname' PHP Remote Code Execution",1970-01-01,StAkeR,webapps,php, +7705,exploits/php/webapps/7705.php,"XOOPS 2.3.2 - 'mydirname' PHP Remote Code Execution",1970-01-01,StAkeR,webapps,php, 7711,exploits/php/webapps/7711.txt,"Fast FAQs System - Authentication Bypass",1970-01-01,x0r,webapps,php, 7716,exploits/php/webapps/7716.pl,"Joomla! Component com_xevidmegahd - SQL Injection",1970-01-01,EcHoLL,webapps,php, 7717,exploits/php/webapps/7717.pl,"Joomla! Component com_jashowcase - 'catid' SQL Injection",1970-01-01,EcHoLL,webapps,php, @@ -23750,7 +23750,7 @@ id,file,description,date,author,type,platform,port 8739,exploits/php/webapps/8739.txt,"Dog Pedigree Online Database 1.0.1b - Insecure Cookie Handling",1970-01-01,YEnH4ckEr,webapps,php, 8740,exploits/php/webapps/8740.pl,"Dog Pedigree Online Database 1.0.1b - Blind SQL Injection",1970-01-01,YEnH4ckEr,webapps,php, 8741,exploits/php/webapps/8741.txt,"DM FileManager 3.9.2 - Authentication Bypass",1970-01-01,snakespc,webapps,php, -8743,exploits/php/webapps/8743.txt,"Joomla! Component Casino 0.3.1 - Multiple SQL Injections s",1970-01-01,ByALBAYX,webapps,php, +8743,exploits/php/webapps/8743.py,"Joomla! Component Casino 0.3.1 - Multiple SQL Injections s",1970-01-01,ByALBAYX,webapps,php, 8744,exploits/php/webapps/8744.txt,"Exjune Officer Message System 1 - Multiple Vulnerabilities",1970-01-01,ByALBAYX,webapps,php, 8745,exploits/php/webapps/8745.txt,"Catviz 0.4.0 beta1 - Local File Inclusion / Cross-Site Scripting",1970-01-01,ByALBAYX,webapps,php, 8746,exploits/php/webapps/8746.txt,"NC GBook 1.0 - Remote Command Injection",1970-01-01,"ThE g0bL!N",webapps,php, @@ -23811,7 +23811,7 @@ id,file,description,date,author,type,platform,port 8825,exploits/php/webapps/8825.txt,"Zen Help Desk 2.1 - Authentication Bypass",1970-01-01,TiGeR-Dz,webapps,php, 8827,exploits/php/webapps/8827.txt,"ecshop 2.6.2 - Multiple Remote Command Execution Vulnerabilities",1970-01-01,Securitylab.ir,webapps,php, 8828,exploits/php/webapps/8828.txt,"Arab Portal 2.2 - Authentication Bypass",1970-01-01,"sniper code",webapps,php, -8829,exploits/php/webapps/8829.txt,"ZeusCart 2.3 - 'maincatid' SQL Injection",1970-01-01,Br0ly,webapps,php, +8829,exploits/php/webapps/8829.pl,"ZeusCart 2.3 - 'maincatid' SQL Injection",1970-01-01,Br0ly,webapps,php, 8830,exploits/php/webapps/8830.txt,"Million Dollar Text Links 1.0 - 'id' SQL Injection",1970-01-01,Qabandi,webapps,php, 8831,exploits/php/webapps/8831.txt,"Traidnt Up 2.0 - Cookie Authentication Bypass",1970-01-01,Qabandi,webapps,php, 8834,exploits/php/webapps/8834.pl,"RadCLASSIFIEDS Gold 2 - 'seller' SQL Injection",1970-01-01,Br0ly,webapps,php, @@ -23827,7 +23827,7 @@ id,file,description,date,author,type,platform,port 8849,exploits/asp/webapps/8849.txt,"R2 NewsLetter Lite/Pro/Stats - 'admin.mdb' Database Disclosure",1970-01-01,TiGeR-Dz,webapps,asp, 8850,exploits/php/webapps/8850.txt,"PAD Site Scripts 3.6 - Arbitrary Database Backup",1970-01-01,TiGeR-Dz,webapps,php, 8851,exploits/php/webapps/8851.txt,"AdaptBB 1.0 - 'forumspath' Remote File Inclusion",1970-01-01,"Mehmet Ince",webapps,php, -8852,exploits/php/webapps/8852.txt,"ASP Football Pool 2.3 - Remote Database Disclosure",1970-01-01,ByALBAYX,webapps,php, +8852,exploits/php/webapps/8852.py,"ASP Football Pool 2.3 - Remote Database Disclosure",1970-01-01,ByALBAYX,webapps,php, 8853,exploits/php/webapps/8853.txt,"Online Grades & Attendance 3.2.6 - Multiple Local File Inclusions",1970-01-01,YEnH4ckEr,webapps,php, 8854,exploits/php/webapps/8854.pl,"Online Grades & Attendance 3.2.6 - Blind SQL Injection",1970-01-01,YEnH4ckEr,webapps,php, 8855,exploits/php/webapps/8855.txt,"Alstrasoft Article Manager Pro - Arbitrary File Upload",1970-01-01,ZoRLu,webapps,php, @@ -23881,7 +23881,7 @@ id,file,description,date,author,type,platform,port 8919,exploits/php/webapps/8919.txt,"Joomla! Component com_realestatemanager 1.0 - Remote File Inclusion",1970-01-01,"Mehmet Ince",webapps,php, 8920,exploits/php/webapps/8920.txt,"Joomla! Component com_vehiclemanager 1.0 - Remote File Inclusion",1970-01-01,"Mehmet Ince",webapps,php, 8921,exploits/php/webapps/8921.sh,"phpMyAdmin - '/scripts/setup.php' PHP Code Injection",1970-01-01,"Adrian _pagvac_ Pastor",webapps,php, -8923,exploits/php/webapps/8923.txt,"LightNEasy sql/no-db 2.2.x - System Configuration Disclosure",1970-01-01,StAkeR,webapps,php, +8923,exploits/php/webapps/8923.py,"LightNEasy sql/no-db 2.2.x - System Configuration Disclosure",1970-01-01,StAkeR,webapps,php, 8924,exploits/php/webapps/8924.txt,"School Data Navigator - 'page' Local/Remote File Inclusion",1970-01-01,Br0ly,webapps,php, 8925,exploits/php/webapps/8925.txt,"Desi Short URL Script - (Authentication Bypass) Insecure Cookie Handling",1970-01-01,N@bilX,webapps,php, 8926,exploits/php/webapps/8926.txt,"mrcgiguy freeticket - Cookie Handling / SQL Injection",1970-01-01,"ThE g0bL!N",webapps,php, @@ -23938,7 +23938,7 @@ id,file,description,date,author,type,platform,port 8999,exploits/php/webapps/8999.txt,"Joomla! Component com_tickets 2.1 - 'id' SQL Injection",1970-01-01,"Chip d3 bi0s",webapps,php, 9000,exploits/php/webapps/9000.txt,"RS-CMS 2.1 - 'key' SQL Injection",1970-01-01,Mr.tro0oqy,webapps,php, 9001,exploits/php/webapps/9001.php,"MyBB 1.4.6 - Remote Code Execution",1970-01-01,The:Paradox,webapps,php, -9004,exploits/php/webapps/9004.txt,"Zen Cart 1.3.8 - Remote Code Execution",1970-01-01,BlackH,webapps,php, +9004,exploits/php/webapps/9004.php,"Zen Cart 1.3.8 - Remote Code Execution",1970-01-01,BlackH,webapps,php, 9005,exploits/php/webapps/9005.py,"Zen Cart 1.3.8 - SQL Execution",1970-01-01,BlackH,webapps,php, 9008,exploits/php/webapps/9008.txt,"phpCollegeExchange 0.1.5c - Local File Inclusion / Remote File Inclusion / Cross-Site Scripting",1970-01-01,CraCkEr,webapps,php, 9009,exploits/php/webapps/9009.txt,"BASE 1.2.4 - (Authentication Bypass) Insecure Cookie Handling",1970-01-01,"Tim Medin",webapps,php, @@ -23948,7 +23948,7 @@ id,file,description,date,author,type,platform,port 9014,exploits/php/webapps/9014.txt,"PHPEcho CMS 2.0-rc3 - 'forum' Cross-Site Scripting Cookie Stealing / Blind SQL Injection",1970-01-01,JosS,webapps,php, 9015,exploits/php/webapps/9015.txt,"LightOpenCMS 0.1 - 'smarty.php?cwd' Local File Inclusion",1970-01-01,JosS,webapps,php, 9016,exploits/php/webapps/9016.txt,"Joomla! Component com_amocourse - 'catid' SQL Injection",1970-01-01,"Chip d3 bi0s",webapps,php, -9017,exploits/php/webapps/9017.txt,"Joomla! Component com_pinboard - 'task' SQL Injection",1970-01-01,Stack,webapps,php, +9017,exploits/php/webapps/9017.py,"Joomla! Component com_pinboard - 'task' SQL Injection",1970-01-01,Stack,webapps,php, 9018,exploits/php/webapps/9018.txt,"MyFusion 6b - settings[locale] Local File Inclusion",1970-01-01,CraCkEr,webapps,php, 9019,exploits/php/webapps/9019.txt,"AlumniServer 1.0.1 - Authentication Bypass",1970-01-01,YEnH4ckEr,webapps,php, 9020,exploits/php/webapps/9020.py,"AlumniServer 1.0.1 - 'resetpwemail' Blind SQL Injection",1970-01-01,YEnH4ckEr,webapps,php, @@ -23965,7 +23965,7 @@ id,file,description,date,author,type,platform,port 9035,exploits/php/webapps/9035.php,"Almnzm - 'COOKIE: customer' SQL Injection",1970-01-01,Qabandi,webapps,php, 9036,exploits/php/webapps/9036.txt,"PHP-Sugar 0.80 - 'index.php?t' Local File Inclusion",1970-01-01,ahmadbady,webapps,php, 9037,exploits/php/webapps/9037.txt,"Clicknet CMS 2.1 - 'side' Arbitrary File Disclosure",1970-01-01,"ThE g0bL!N",webapps,php, -9040,exploits/php/webapps/9040.txt,"Joomla! Component com_bookflip - 'book_id' SQL Injection",1970-01-01,boom3rang,webapps,php, +9040,exploits/php/webapps/9040.py,"Joomla! Component com_bookflip - 'book_id' SQL Injection",1970-01-01,boom3rang,webapps,php, 9041,exploits/php/webapps/9041.txt,"Audio Article Directory - 'file' Remote File Disclosure",1970-01-01,"ThE g0bL!N",webapps,php, 9042,exploits/php/webapps/9042.pl,"NEWSolved 1.1.6 - 'login grabber' Multiple SQL Injections",1970-01-01,jmp-esp,webapps,php, 9043,exploits/php/webapps/9043.txt,"WordPress Plugin DM Albums 1.9.2 - Remote File Inclusion",1970-01-01,Septemb0x,webapps,php, @@ -23982,7 +23982,7 @@ id,file,description,date,author,type,platform,port 9057,exploits/php/webapps/9057.txt,"tsep 0.942.02 - Multiple Vulnerabilities",1970-01-01,eLwaux,webapps,php, 9058,exploits/php/webapps/9058.pl,"PunBB Extension Vote For Us 1.0.1 - Blind SQL Injection",1970-01-01,Dante90,webapps,php, 9059,exploits/php/webapps/9059.html,"Messages Library 2.0 - Arbitrary Administrator Account",1970-01-01,"ThE g0bL!N",webapps,php, -9062,exploits/php/webapps/9062.txt,"Messages Library 2.0 - Arbitrary Delete Message",1970-01-01,Stack,webapps,php, +9062,exploits/php/webapps/9062.py,"Messages Library 2.0 - Arbitrary Delete Message",1970-01-01,Stack,webapps,php, 9063,exploits/php/webapps/9063.txt,"Messages Library 2.0 - Insecure Cookie Handling",1970-01-01,Stack,webapps,php, 9068,exploits/php/webapps/9068.txt,"kervinet forum 1.1 - Multiple Vulnerabilities",1970-01-01,eLwaux,webapps,php, 9069,exploits/php/webapps/9069.txt,"CMS chainuk 1.2 - Multiple Vulnerabilities",1970-01-01,eLwaux,webapps,php, @@ -24165,7 +24165,7 @@ id,file,description,date,author,type,platform,port 9387,exploits/php/webapps/9387.txt,"Banner Exchange Script 1.0 - 'targetid' Blind SQL Injection",1970-01-01,"599eme Man",webapps,php, 9389,exploits/php/webapps/9389.txt,"Logoshows BBS 2.0 - 'forumid' SQL Injection",1970-01-01,Ruzgarin_Oglu,webapps,php, 9390,exploits/php/webapps/9390.txt,"Typing Pal 1.0 - 'idTableProduit' SQL Injection",1970-01-01,Red-D3v1L,webapps,php, -9394,exploits/php/webapps/9394.pl,"Arab Portal 2.2 - Blind Cookie Authentication Bypass",1970-01-01,"Jafer Al Zidjali",webapps,php, +9394,exploits/php/webapps/9394.rb,"Arab Portal 2.2 - Blind Cookie Authentication Bypass",1970-01-01,"Jafer Al Zidjali",webapps,php, 9395,exploits/php/webapps/9395.txt,"PHPCityPortal - Authentication Bypass",1970-01-01,CoBRa_21,webapps,php, 9396,exploits/php/webapps/9396.txt,"Facil Helpdesk - Local File Inclusion / Remote File Inclusion / Cross-Site Scripting",1970-01-01,Moudi,webapps,php, 9397,exploits/php/webapps/9397.txt,"IsolSoft Support Center 2.5 - Local File Inclusion / Remote File Inclusion / Cross-Site Scripting",1970-01-01,Moudi,webapps,php, @@ -24374,7 +24374,7 @@ id,file,description,date,author,type,platform,port 9887,exploits/jsp/webapps/9887.txt,"jetty 6.x < 7.x - Cross-Site Scripting / Information Disclosure / Injection",1970-01-01,"Antonion Parata",webapps,jsp, 9888,exploits/php/webapps/9888.txt,"Joomla! Component Ajax Chat 1.0 - Remote File Inclusion",1970-01-01,kaMtiEz,webapps,php, 9889,exploits/php/webapps/9889.txt,"Joomla! Component Book Library 1.0 - Remote File Inclusion",1970-01-01,kaMtiEz,webapps,php, -9890,exploits/php/webapps/9890.txt,"Joomla! Plugin JD-WordPress 2.0 RC2 - Remote File Inclusion",1970-01-01,"Don Tukulesto",webapps,php, +9890,exploits/php/webapps/9890.py,"Joomla! Plugin JD-WordPress 2.0 RC2 - Remote File Inclusion",1970-01-01,"Don Tukulesto",webapps,php, 9891,exploits/php/webapps/9891.txt,"Joomla! Component Jshop - SQL Injection",1970-01-01,"Don Tukulesto",webapps,php, 9892,exploits/php/webapps/9892.txt,"Joomla! Component Photo Blog alpha 3 < alpha 3a - SQL Injection",1970-01-01,kaMtiEz,webapps,php, 9897,exploits/php/webapps/9897.txt,"Mongoose Web Server 2.8 - Source Disclosure",1970-01-01,Dr_IDE,webapps,php, @@ -25826,7 +25826,7 @@ id,file,description,date,author,type,platform,port 12520,exploits/php/webapps/12520.html,"OCS Inventory NG Server 1.3.1 - 'LOGIN' Remote Authentication Bypass",1970-01-01,"Nicolas DEROUET",webapps,php, 12521,exploits/php/webapps/12521.txt,"Factux - Local File Inclusion",1970-01-01,ALTBTA,webapps,php, 12522,exploits/php/webapps/12522.txt,"WeBProdZ CMS - SQL Injection",1970-01-01,MasterGipy,webapps,php, -12523,exploits/php/webapps/12523.txt,"REZERVI 3.0.2 - Remote Command Execution",1970-01-01,"JosS & eidelweiss",webapps,php, +12523,exploits/php/webapps/12523.py,"REZERVI 3.0.2 - Remote Command Execution",1970-01-01,"JosS & eidelweiss",webapps,php, 12525,exploits/php/webapps/12525.txt,"PHP-Nuke - 'friend.php' Module SQL Injection",1970-01-01,CMD,webapps,php, 12526,exploits/asp/webapps/12526.txt,"ArticleLive (Interspire Website Publisher) - SQL Injection",1970-01-01,Ra3cH,webapps,asp, 12532,exploits/php/webapps/12532.txt,"B2B Classic Trading Script - 'offers.php' SQL Injection",1970-01-01,v3n0m,webapps,php, @@ -26017,7 +26017,7 @@ id,file,description,date,author,type,platform,port 12792,exploits/php/webapps/12792.txt,"MileHigh Creative - SQL Injection / Cross-Site Scripting / HTML Injection",1970-01-01,XroGuE,webapps,php, 12793,exploits/php/webapps/12793.txt,"Cosmos Solutions CMS - SQL Injection",1970-01-01,cyberlog,webapps,php, 12794,exploits/php/webapps/12794.txt,"Cosmos Solutions CMS - 'id=' / 'page=' SQL Injection",1970-01-01,gendenk,webapps,php, -12796,exploits/php/webapps/12796.txt,"Joomla! Component BF Quiz 1.0 - SQL Injection (2)",1970-01-01,"Valentin Hoebel",webapps,php, +12796,exploits/php/webapps/12796.py,"Joomla! Component BF Quiz 1.0 - SQL Injection (2)",1970-01-01,"Valentin Hoebel",webapps,php, 12797,exploits/php/webapps/12797.txt,"Webiz 2004 - Local File Upload",1970-01-01,kannibal615,webapps,php, 12798,exploits/php/webapps/12798.txt,"Webiz - SQL Injection",1970-01-01,kannibal615,webapps,php, 12801,exploits/php/webapps/12801.txt,"osCommerce Online Merchant 2.2 - File Disclosure / Authentication Bypass",1970-01-01,Flyff666,webapps,php, @@ -26716,7 +26716,7 @@ id,file,description,date,author,type,platform,port 15157,exploits/php/webapps/15157.txt,"Joomla! Component JE Guestbook 1.0 - Multiple Vulnerabilities",1970-01-01,"Salvatore Fresta",webapps,php, 15118,exploits/asp/webapps/15118.txt,"gokhun asp stok 1.0 - Multiple Vulnerabilities",1970-01-01,KnocKout,webapps,asp, 15119,exploits/php/webapps/15119.txt,"PEEL Premium 5.71 - SQL Injection",1970-01-01,KnocKout,webapps,php, -15110,exploits/php/webapps/15110.txt,"E-Xoopport Samsara 3.1 (eCal Module) - Blind SQL Injection",1970-01-01,_mRkZ_,webapps,php, +15110,exploits/php/webapps/15110.py,"E-Xoopport Samsara 3.1 (eCal Module) - Blind SQL Injection",1970-01-01,_mRkZ_,webapps,php, 15120,exploits/cfm/webapps/15120.txt,"Blue River Mura CMS - Directory Traversal",1970-01-01,mr_me,webapps,cfm, 15121,exploits/php/webapps/15121.txt,"pbboard 2.1.1 - Multiple Vulnerabilities",1970-01-01,JIKO,webapps,php, 15124,exploits/asp/webapps/15124.txt,"ndCMS - SQL Injection",1970-01-01,Abysssec,webapps,asp, @@ -26996,7 +26996,7 @@ id,file,description,date,author,type,platform,port 15714,exploits/php/webapps/15714.txt,"Joomla! Component JE Auto 1.0 - SQL Injection",1970-01-01,"Salvatore Fresta",webapps,php, 15715,exploits/php/webapps/15715.txt,"CMScout 2.09 - Cross-Site Request Forgery",1970-01-01,"High-Tech Bridge SA",webapps,php, 15720,exploits/php/webapps/15720.txt,"Sulata iSoft - 'stream.php' Local File Disclosure",1970-01-01,Sudden_death,webapps,php, -15718,exploits/php/webapps/15718.txt,"AJ Matrix DNA - SQL Injection",1970-01-01,Br0ly,webapps,php, +15718,exploits/php/webapps/15718.pl,"AJ Matrix DNA - SQL Injection",1970-01-01,Br0ly,webapps,php, 15719,exploits/php/webapps/15719.txt,"Joomla! Component JE Messenger 1.0 - Arbitrary File Upload",1970-01-01,"Salvatore Fresta",webapps,php, 15721,exploits/php/webapps/15721.txt,"Joomla! Component com_billyportfolio 1.1.2 - Blind SQL Injection",1970-01-01,jdc,webapps,php, 15728,exploits/hardware/webapps/15728.txt,"Clear iSpot/Clearspot 2.0.0.0 - Cross-Site Request Forgery",1970-01-01,"Trustwave's SpiderLabs",webapps,hardware, @@ -27553,7 +27553,7 @@ id,file,description,date,author,type,platform,port 17554,exploits/php/webapps/17554.txt,"Mevin Basic PHP Events Lister 2.03 - Cross-Site Request Forgery",1970-01-01,Crazy_Hacker,webapps,php, 17551,exploits/jsp/webapps/17551.txt,"Oracle Sun GlassFish Enterprise Server - Persistent Cross-Site Scripting",1970-01-01,"Sense of Security",webapps,jsp, 17555,exploits/php/webapps/17555.txt,"vBulletin 4.0.x 4.1.3 - 'messagegroupid' SQL Injection",1970-01-01,fb1h2s,webapps,php, -17556,exploits/php/webapps/17556.txt,"Joomla! Component JE Story Submit - Local File Inclusion",1970-01-01,v3n0m,webapps,php, +17556,exploits/php/webapps/17556.py,"Joomla! Component JE Story Submit - Local File Inclusion",1970-01-01,v3n0m,webapps,php, 17560,exploits/php/webapps/17560.txt,"Joomla! Component mod_spo - SQL Injection",1970-01-01,SeguridadBlanca,webapps,php, 17562,exploits/php/webapps/17562.php,"ExtCalendar2 - Cookie Authentication Bypass / Backdoor Upload",1970-01-01,Lagripe-Dz,webapps,php, 17574,exploits/jsp/webapps/17574.php,"CA ARCserve D2D r15 GWT RPC - Multiple Vulnerabilities",1970-01-01,rgod,webapps,jsp, @@ -27738,7 +27738,7 @@ id,file,description,date,author,type,platform,port 17924,exploits/jsp/webapps/17924.pl,"JBoss & JMX Console - Misconfigured Deployment Scanner",1970-01-01,y0ug,webapps,jsp, 17925,exploits/php/webapps/17925.txt,"Concrete5 CMS < 5.4.2.1 - Multiple Vulnerabilities",1970-01-01,"Ryan Dewhurst",webapps,php, 17926,exploits/php/webapps/17926.txt,"Easy Hosting Control Panel - Admin Authentication Bypass",1970-01-01,Jasman,webapps,php, -17927,exploits/php/webapps/17927.txt,"CF Image Hosting Script 1.3.82 - File Disclosure",1970-01-01,bd0rk,webapps,php, +17927,exploits/php/webapps/17927.py,"CF Image Hosting Script 1.3.82 - File Disclosure",1970-01-01,bd0rk,webapps,php, 18033,exploits/php/webapps/18033.txt,"Joomla! Component com_yjcontactus - Local File Inclusion",1970-01-01,MeGo,webapps,php, 17935,exploits/php/webapps/17935.txt,"Tsmim Lessons Library - 'show.php' SQL Injection",1970-01-01,M.Jock3R,webapps,php, 17937,exploits/php/webapps/17937.txt,"URL Shortener Script 1.0 - SQL Injection",1970-01-01,M.Jock3R,webapps,php, @@ -28373,7 +28373,7 @@ id,file,description,date,author,type,platform,port 20574,exploits/php/webapps/20574.txt,"Social Engine 4.2.5 - Multiple Vulnerabilities",1970-01-01,Vulnerability-Lab,webapps,php, 20575,exploits/windows/webapps/20575.txt,"ManageEngine OpStor 7.4 - Multiple Vulnerabilities",1970-01-01,Vulnerability-Lab,webapps,windows, 20576,exploits/php/webapps/20576.txt,"Inferno vBShout 2.5.2 - SQL Injection",1970-01-01,Luit,webapps,php, -20578,exploits/php/webapps/20578.pl,"hastymail2 webmail 1.1 rc2 - Persistent Cross-Site Scripting",1970-01-01,"Shai rod",webapps,php, +20578,exploits/php/webapps/20578.py,"hastymail2 webmail 1.1 rc2 - Persistent Cross-Site Scripting",1970-01-01,"Shai rod",webapps,php, 20579,exploits/php/webapps/20579.py,"T-dah Webmail Client - Multiple Persistent Cross-Site Scripting Vulnerabilities",1970-01-01,"Shai rod",webapps,php, 20580,exploits/php/webapps/20580.txt,"webid 1.0.4 - Multiple Vulnerabilities",1970-01-01,dun,webapps,php, 20586,exploits/php/webapps/20586.txt,"Phorum 3.0.7 - 'admin.php3' Unverified Administrative Password Change",1970-01-01,"Max Vision",webapps,php, @@ -29956,7 +29956,7 @@ id,file,description,date,author,type,platform,port 27436,exploits/php/webapps/27436.txt,"Invision Power Board (IP.Board) 2.0.4 - Search Action Multiple Cross-Site Scripting Vulnerabilities",1970-01-01,Mr.SNAKE,webapps,php, 24953,exploits/php/webapps/24953.txt,"Free Monthly Websites 2.0 - Admin Password Change",1970-01-01,"Yassin Aboukir",webapps,php, 24954,exploits/php/webapps/24954.txt,"Simple HRM System 2.3 - Multiple Vulnerabilities",1970-01-01,Doraemon,webapps,php, -24959,exploits/php/webapps/24959.txt,"CMSLogik 1.2.1 - Multiple Vulnerabilities",1970-01-01,LiquidWorm,webapps,php, +24959,exploits/php/webapps/24959.py,"CMSLogik 1.2.1 - Multiple Vulnerabilities",1970-01-01,LiquidWorm,webapps,php, 24960,exploits/php/webapps/24960.txt,"phpVms Virtual Airline Administration 2.1.934/2.1.935 - SQL Injection",1970-01-01,NoGe,webapps,php, 24964,exploits/windows/webapps/24964.txt,"Oracle WebCenter Sites Satellite Server - HTTP Header Injection",1970-01-01,"SEC Consult",webapps,windows, 24965,exploits/php/webapps/24965.txt,"KrisonAV CMS 3.0.1 - Multiple Vulnerabilities",1970-01-01,"High-Tech Bridge SA",webapps,php, @@ -31059,7 +31059,7 @@ id,file,description,date,author,type,platform,port 26516,exploits/php/webapps/26516.txt,"Ekinboard 1.0.3 - 'profile.php' Cross-Site Scripting",1970-01-01,trueend5,webapps,php, 26829,exploits/php/webapps/26829.txt,"QuickPayPro 3.1 - 'subscribers.tracking.edit.php?subtrackingid' SQL Injection",1970-01-01,r0t,webapps,php, 26830,exploits/php/webapps/26830.txt,"QuickPayPro 3.1 - 'design.php?delete' SQL Injection",1970-01-01,r0t,webapps,php, -26521,exploits/php/webapps/26521.txt,"C.P.Sub 4.5 - Authentication Bypass",1970-01-01,Chako,webapps,php, +26521,exploits/php/webapps/26521.py,"C.P.Sub 4.5 - Authentication Bypass",1970-01-01,Chako,webapps,php, 27437,exploits/php/webapps/27437.txt,"Invision Power Board (IP.Board) 2.0.4 - 'index.php?st' Cross-Site Scripting",1970-01-01,Mr.SNAKE,webapps,php, 26527,exploits/hardware/webapps/26527.txt,"Barracuda SSL VPN 680Vx 2.3.3.193 - Multiple Script Injection Vulnerabilities",1970-01-01,LiquidWorm,webapps,hardware, 26528,exploits/hardware/webapps/26528.txt,"Fortigate Firewalls - Cross-Site Request Forgery",1970-01-01,"Sven Wurth",webapps,hardware, @@ -36375,7 +36375,7 @@ id,file,description,date,author,type,platform,port 34678,exploits/php/webapps/34678.txt,"WebStatCaffe - '/stat/pageviewerschart.php?date' Cross-Site Scripting",1970-01-01,Moudi,webapps,php, 34679,exploits/php/webapps/34679.txt,"WebStatCaffe - '/stat/referer.php?date' Cross-Site Scripting",1970-01-01,Moudi,webapps,php, 34680,exploits/hardware/webapps/34680.txt,"ZTE ZXDSL-931VII - Configuration Dump",1970-01-01,"L0ukanik0-s S0kniaku0l",webapps,hardware, -34681,exploits/php/webapps/34681.txt,"WordPress Plugin Slideshow Gallery 1.4.6 - Arbitrary File Upload",1970-01-01,"Claudio Viviani",webapps,php, +34681,exploits/php/webapps/34681.py,"WordPress Plugin Slideshow Gallery 1.4.6 - Arbitrary File Upload",1970-01-01,"Claudio Viviani",webapps,php, 34682,exploits/ios/webapps/34682.txt,"USB&WiFi Flash Drive 1.3 iOS - Code Execution",1970-01-01,Vulnerability-Lab,webapps,ios,8080 34687,exploits/asp/webapps/34687.txt,"Smart ASP Survey - 'catid' SQL Injection",1970-01-01,Moudi,webapps,asp, 34688,exploits/php/webapps/34688.txt,"Basilic 1.5.13 - 'index.php' Cross-Site Scripting",1970-01-01,PLATEN,webapps,php, @@ -36717,7 +36717,7 @@ id,file,description,date,author,type,platform,port 35221,exploits/php/webapps/35221.txt,"Piwigo 2.6.0 - 'picture.php?rate' SQL Injection",1970-01-01,"Manuel García Cárdenas",webapps,php,80 35218,exploits/php/webapps/35218.txt,"WordPress Plugin SupportEzzy Ticket System 1.2.5 - Persistent Cross-Site Scripting",1970-01-01,"Halil Dalabasmaz",webapps,php,80 35219,exploits/multiple/webapps/35219.txt,"Proticaret E-Commerce Script 3.0 - SQL Injection (1)",1970-01-01,"Onur Alanbel (BGA)",webapps,multiple, -35220,exploits/multiple/webapps/35220.txt,"Joomla! Component com_hdflvplayer < 2.1.0.1 - SQL Injection",1970-01-01,"Claudio Viviani",webapps,multiple, +35220,exploits/multiple/webapps/35220.py,"Joomla! Component com_hdflvplayer < 2.1.0.1 - SQL Injection",1970-01-01,"Claudio Viviani",webapps,multiple, 35222,exploits/jsp/webapps/35222.txt,"F5 BIG-IP 10.1.0 - Directory Traversal",1970-01-01,"Anastasios Monachos",webapps,jsp, 35223,exploits/php/webapps/35223.txt,"Digi Online Examination System 2.0 - Unrestricted Arbitrary File Upload",1970-01-01,"Halil Dalabasmaz",webapps,php,80 35224,exploits/php/webapps/35224.txt,"MyBB 1.8.x - Multiple Vulnerabilities",1970-01-01,smash,webapps,php,80 @@ -36919,7 +36919,7 @@ id,file,description,date,author,type,platform,port 35562,exploits/php/webapps/35562.txt,"WordPress Plugin Placester 0.1 - 'ajax_action' Cross-Site Scripting",1970-01-01,"John Leitch",webapps,php, 35541,exploits/php/webapps/35541.txt,"ResourceSpace 6.4.5976 - Cross-Site Scripting / SQL Injection / Insecure Cookie Handling",1970-01-01,"Adler Freiheit",webapps,php, 35556,exploits/hardware/webapps/35556.txt,"CIK Telecom VoIP Router SVG6000RW - Privilege Escalation / Command Execution",1970-01-01,Chako,webapps,hardware, -35543,exploits/php/webapps/35543.txt,"WordPress Plugin WP Symposium 14.11 - Arbitrary File Upload",1970-01-01,"Claudio Viviani",webapps,php, +35543,exploits/php/webapps/35543.py,"WordPress Plugin WP Symposium 14.11 - Arbitrary File Upload",1970-01-01,"Claudio Viviani",webapps,php, 35547,exploits/php/webapps/35547.txt,"ICJobSite 1.1 - 'pid' SQL Injection",1970-01-01,RoAd_KiLlEr,webapps,php, 35550,exploits/php/webapps/35550.txt,"Collabtive 0.6.5 - Multiple Remote Input Validation Vulnerabilities",1970-01-01,"High-Tech Bridge SA",webapps,php, 35551,exploits/php/webapps/35551.txt,"CMS Papoo 6.0.0 Rev. 4701 - Persistent Cross-Site Scripting",1970-01-01,"Steffen Rösemann",webapps,php,80 @@ -39785,7 +39785,7 @@ id,file,description,date,author,type,platform,port 40966,exploits/php/webapps/40966.txt,"Joomla! Component Blog Calendar - SQL Injection",1970-01-01,X-Cisadane,webapps,php, 40968,exploits/php/webapps/40968.sh,"PHPMailer < 5.2.18 - Remote Code Execution",1970-01-01,"Dawid Golunski",webapps,php, 40970,exploits/php/webapps/40970.php,"PHPMailer < 5.2.18 - Remote Code Execution",1970-01-01,"Dawid Golunski",webapps,php, -40969,exploits/php/webapps/40969.pl,"PHPMailer < 5.2.20 - Remote Code Execution",1970-01-01,"Dawid Golunski",webapps,php, +40969,exploits/php/webapps/40969.py,"PHPMailer < 5.2.20 - Remote Code Execution",1970-01-01,"Dawid Golunski",webapps,php, 40971,exploits/php/webapps/40971.txt,"WordPress Plugin Simply Poll 1.4.1 - SQL Injection",1970-01-01,"TAD GROUP",webapps,php, 40972,exploits/php/webapps/40972.php,"SwiftMailer < 5.4.5-DEV - Remote Code Execution",1970-01-01,"Dawid Golunski",webapps,php, 40973,exploits/php/webapps/40973.txt,"Joomla! Component aWeb Cart Watching System for Virtuemart 2.6.0 - SQL Injection",1970-01-01,qemm,webapps,php, @@ -42835,7 +42835,7 @@ id,file,description,date,author,type,platform,port 47435,exploits/hardware/webapps/47435.txt,"V-SOL GPON/EPON OLT Platform 2.03 - Remote Privilege Escalation",1970-01-01,LiquidWorm,webapps,hardware, 47436,exploits/php/webapps/47436.txt,"WordPress Theme Zoner Real Estate - 4.1.1 Persistent Cross-Site Scripting",1970-01-01,m0ze,webapps,php, 47437,exploits/php/webapps/47437.rb,"vBulletin 5.x - Remote Command Execution (Metasploit)",1970-01-01,r00tpgp,webapps,php, -47438,exploits/php/webapps/47438.txt,"phpIPAM 1.4 - SQL Injection",1970-01-01,"Kevin Kirsche",webapps,php,80 +47438,exploits/php/webapps/47438.py,"phpIPAM 1.4 - SQL Injection",1970-01-01,"Kevin Kirsche",webapps,php,80 47440,exploits/python/webapps/47440.txt,"thesystem 1.0 - Cross-Site Scripting",1970-01-01,"Anıl Baran Yelken",webapps,python, 47441,exploits/python/webapps/47441.txt,"TheSystem 1.0 - Command Injection",1970-01-01,"Sadik Cetin",webapps,python, 47443,exploits/php/webapps/47443.rb,"WordPress Plugin ARforms 3.7.1 - Arbitrary File Deletion",1970-01-01,"Ahmad Almorabea",webapps,php, @@ -43167,7 +43167,7 @@ id,file,description,date,author,type,platform,port 48189,exploits/php/webapps/48189.txt,"YzmCMS 5.5 - 'url' Persistent Cross-Site Scripting",1970-01-01,En_dust,webapps,php, 48190,exploits/php/webapps/48190.txt,"Persian VIP Download Script 1.0 - 'active' SQL Injection",1970-01-01,S3FFR,webapps,php, 48197,exploits/php/webapps/48197.txt,"WordPress Plugin Search Meter 2.13.2 - CSV injection",1970-01-01,"Daniel Monzón",webapps,php, -48198,exploits/php/webapps/48198.txt,"Joomla! 3.9.0 < 3.9.7 - CSV Injection",1970-01-01,i4bdullah,webapps,php, +48198,exploits/php/webapps/48198.py,"Joomla! 3.9.0 < 3.9.7 - CSV Injection",1970-01-01,i4bdullah,webapps,php, 48199,exploits/php/webapps/48199.txt,"PlaySMS 1.4.3 - Template Injection / Remote Code Execution",1970-01-01,"Touhid M.Shaikh",webapps,php, 48200,exploits/php/webapps/48200.txt,"Wing FTP Server - Authenticated CSRF (Delete Admin)",1970-01-01,"Dhiraj Mishra",webapps,php, 48201,exploits/php/webapps/48201.py,"TeamCity Agent XML-RPC 10.0 - Remote Code Execution",1970-01-01,1F98D,webapps,php,