diff --git a/exploits/php/webapps/51352.py b/exploits/hardware/remote/51352.py similarity index 100% rename from exploits/php/webapps/51352.py rename to exploits/hardware/remote/51352.py diff --git a/exploits/php/webapps/51215.txt b/exploits/php/webapps/51215.txt index ced5fcaef..b0146116e 100644 --- a/exploits/php/webapps/51215.txt +++ b/exploits/php/webapps/51215.txt @@ -1,4 +1,4 @@ -# Exploit Title: Art Gallery Management System Project v1.0 - SQL Injection (sqli) Unauthenticated +# Exploit Title: Art Gallery Management System Project v1.0 - SQL Injection (cid) Unauthenticated # Date: 20/01/2023 # Exploit Author: Rahul Patwari # Vendor Homepage: https://phpgurukul.com/ diff --git a/exploits/php/webapps/51216.txt b/exploits/php/webapps/51216.txt index 622447d67..a27ebdd3e 100644 --- a/exploits/php/webapps/51216.txt +++ b/exploits/php/webapps/51216.txt @@ -1,4 +1,4 @@ -# Exploit Title: Art Gallery Management System Project v1.0 - SQL Injection (sqli) authenticated +# Exploit Title: Art Gallery Management System Project v1.0 - SQL Injection (editid) authenticated # Date: 20/01/2023 # Exploit Author: Rahul Patwari # Vendor Homepage: https://phpgurukul.com/ diff --git a/exploits/php/webapps/51272.py b/exploits/php/webapps/51272.py index a0a115246..e01e59944 100755 --- a/exploits/php/webapps/51272.py +++ b/exploits/php/webapps/51272.py @@ -2,9 +2,7 @@ # Date: 31-01-2023 # Exploit Author: Yogesh Verma # Vendor Homepage: https://y0gesh-verma.github.io/ -# Software Link: -https://phpgurukul.com/art-gallery-management-system-using-php-and-mysql/, -https://phpgurukul.com/projects/Art-Gallery-MS-PHP.zip +# Software Link: https://phpgurukul.com/art-gallery-management-system-using-php-and-mysql/, https://phpgurukul.com/projects/Art-Gallery-MS-PHP.zip # Version: 1.0 # Tested on: Windows/Linux # CVE : CVE-2023-23156 diff --git a/exploits/php/webapps/51378.txt b/exploits/php/webapps/51378.txt index b1cea4d3c..b2fa7c8b9 100644 --- a/exploits/php/webapps/51378.txt +++ b/exploits/php/webapps/51378.txt @@ -40,4 +40,5 @@ btnMenuItemID=1&qty=1 SQL Injection use this query ".1 union select 1,2,3,CONCAT_WS(0x203a20,0x557365723a3a3a3a20,USER(),0x3c62723e,0x44617461626173653a3a3a3a3a20,DATABASE(),0x3c62723e,0x56657273696f6e3a3a3a3a20,VERSION())-- -" in "btnMenuItemID" parameter. -4. Check browser you will see user, database and version informations. \ No newline at end of file +4. Check browser you will see user, database and version informations. +5. You could also use sqlmap to dump the whole database by saving the web request from BurpSuite \ No newline at end of file diff --git a/files_exploits.csv b/files_exploits.csv index cc34528f1..d0c5ae0e7 100644 --- a/files_exploits.csv +++ b/files_exploits.csv @@ -3820,6 +3820,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd 35069,exploits/hardware/remote/35069.txt,"pfSense - 'pkg.php?xml' Cross-Site Scripting",2010-11-08,"dave b",remote,hardware,,2010-11-08,2014-10-27,1,CVE-2010-4412;OSVDB-69648,,,,,https://www.securityfocus.com/bid/45272/info 35068,exploits/hardware/remote/35068.txt,"pfSense - 'pkg_edit.php?id' Cross-Site Scripting",2010-11-08,"dave b",remote,hardware,,2010-11-08,2014-10-27,1,CVE-2010-4412;OSVDB-69647,,,,,https://www.securityfocus.com/bid/45272/info 35070,exploits/hardware/remote/35070.txt,"pfSense - 'status_graph.php?if' Cross-Site Scripting",2010-11-08,"dave b",remote,hardware,,2010-11-08,2014-10-27,1,CVE-2010-4412;OSVDB-69649,,,,,https://www.securityfocus.com/bid/45272/info +51352,exploits/hardware/remote/51352.py,"pfsenseCE v2.6.0 - Anti-brute force protection bypass",2023-04-08,FabDotNET,remote,hardware,,2023-04-08,2023-04-28,0,CVE-2023-27100,,,,, 5113,exploits/hardware/remote/5113.txt,"Philips VOIP841 Firmware 1.0.4.800 - Multiple Vulnerabilities",2008-02-14,ikki,remote,hardware,,2008-02-13,2017-01-24,1,OSVDB-42943;CVE-2008-4876;OSVDB-42942;CVE-2008-4875;OSVDB-42939;CVE-2008-4874,,,,, 37066,exploits/hardware/remote/37066.py,"Phoenix Contact ILC 150 ETH PLC - Remote Control Script",2015-05-20,Photubias,remote,hardware,,2015-05-20,2016-12-17,1,CVE-2014-9195;OSVDB-117101,,,,, 8359,exploits/hardware/remote/8359.py,"Pirelli Discus DRG A225 wifi router - WPA2PSK Default Algorithm",2009-04-06,j0rgan,remote,hardware,,2009-04-05,,1,OSVDB-105026,,,,, @@ -14023,10 +14024,10 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd 24451,exploits/php/webapps/24451.txt,"ArrowChat 1.5.61 - Multiple Vulnerabilities",2013-02-05,kallimero,webapps,php,,2013-02-05,2013-02-05,0,OSVDB-89830;OSVDB-89829,,,,, 14050,exploits/php/webapps/14050.txt,"ARSC Really Simple Chat 3.3 - Remote File Inclusion / Cross-Site Scripting",2010-06-25,"Zer0 Thunder",webapps,php,,2010-06-25,2010-11-12,1,OSVDB-65837;OSVDB-65836,,,,http://www.exploit-db.comarsc3.3-pre2.zip, 35816,exploits/php/webapps/35816.txt,"ARSC Really Simple Chat 3.3-rc2 - Cross-Site Scripting / Multiple SQL Injections",2011-06-01,"High-Tech Bridge SA",webapps,php,,2011-06-01,2015-01-18,1,,,,,,https://www.securityfocus.com/bid/48083/info -51272,exploits/php/webapps/51272.py,"Art Gallery Management System Project in PHP v 1.0 - SQL injection",2023-04-06,"Yogesh Verma",webapps,php,,2023-04-06,2023-04-06,0,CVE-2023-23156,,,,, -51214,exploits/php/webapps/51214.txt,"Art Gallery Management System Project v1.0 - Reflected Cross-Site Scripting (XSS)",2023-04-03,"Rahul Patwari",webapps,php,,2023-04-03,2023-04-03,0,CVE-2023-23161,,,,, -51216,exploits/php/webapps/51216.txt,"Art Gallery Management System Project v1.0 - SQL Injection (sqli) authenticated",2023-04-03,"Rahul Patwari",webapps,php,,2023-04-03,2023-04-03,0,CVE-2023-23163,,,,, -51215,exploits/php/webapps/51215.txt,"Art Gallery Management System Project v1.0 - SQL Injection (sqli) Unauthenticated",2023-04-03,"Rahul Patwari",webapps,php,,2023-04-03,2023-04-03,0,CVE-2023-23162,,,,, +51272,exploits/php/webapps/51272.py,"Art Gallery Management System Project in PHP v 1.0 - SQL injection",2023-04-06,"Yogesh Verma",webapps,php,,2023-04-06,2023-04-28,1,CVE-2023-23156,,,,, +51214,exploits/php/webapps/51214.txt,"Art Gallery Management System Project v1.0 - Reflected Cross-Site Scripting (XSS)",2023-04-03,"Rahul Patwari",webapps,php,,2023-04-03,2023-04-28,1,CVE-2023-23161,,,,, +51215,exploits/php/webapps/51215.txt,"Art Gallery Management System Project v1.0 - SQL Injection (cid) Unauthenticated",2023-04-03,"Rahul Patwari",webapps,php,,2023-04-03,2023-04-28,1,CVE-2023-23162,,,,, +51216,exploits/php/webapps/51216.txt,"Art Gallery Management System Project v1.0 - SQL Injection (editid) authenticated",2023-04-03,"Rahul Patwari",webapps,php,,2023-04-03,2023-04-28,1,CVE-2023-23163,,,,, 34560,exploits/php/webapps/34560.html,"ArtGK CMS - Cross-Site Scripting / HTML Injection",2010-09-01,"High-Tech Bridge SA",webapps,php,,2010-09-01,2014-09-08,1,,,,,,https://www.securityfocus.com/bid/42923/info 43206,exploits/php/webapps/43206.txt,"Artica Web Proxy 3.06 - Remote Code Execution",2017-12-01,hyp3rlinx,webapps,php,,2017-12-01,2017-12-01,0,CVE-2017-17055,,,,, 31028,exploits/php/webapps/31028.txt,"Article Dashboard - '/admin/login.php' Multiple SQL Injections",2008-01-15,Xcross87,webapps,php,,2008-01-15,2014-01-19,1,CVE-2008-0286;OSVDB-40273,,,,,https://www.securityfocus.com/bid/27286/info @@ -14437,8 +14438,8 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd 28307,exploits/php/webapps/28307.txt,"Banex PHP MySQL Banner Exchange 2.21 - 'admin.php' Multiple SQL Injections",2006-07-31,SirDarckCat,webapps,php,,2006-07-31,2013-09-15,1,CVE-2006-3963;OSVDB-29090,,,,,https://www.securityfocus.com/bid/19240/info 28308,exploits/php/webapps/28308.txt,"Banex PHP MySQL Banner Exchange 2.21 - 'members.php?cfg_root' Remote File Inclusion",2006-07-31,SirDarckCat,webapps,php,,2006-07-31,2013-09-15,1,CVE-2006-3964;OSVDB-29091,,,,,https://www.securityfocus.com/bid/19240/info 28306,exploits/php/webapps/28306.txt,"Banex PHP MySQL Banner Exchange 2.21 - 'signup.php?site_name' SQL Injection",2006-07-31,SirDarckCat,webapps,php,,2006-07-31,2013-09-15,1,CVE-2006-3963;OSVDB-29089,,,,,https://www.securityfocus.com/bid/19240/info -51378,exploits/php/webapps/51378.txt,"Bang Resto v1.0 - 'Multiple' SQL Injection",2023-04-20,"Rahad Chowdhury",webapps,php,,2023-04-20,2023-04-20,0,CVE-2023-29849,,,,, -51377,exploits/php/webapps/51377.txt,"Bang Resto v1.0 - Stored Cross-Site Scripting (XSS)",2023-04-20,"Rahad Chowdhury",webapps,php,,2023-04-20,2023-04-20,0,CVE-2023-29848,,,,, +51378,exploits/php/webapps/51378.txt,"Bang Resto v1.0 - 'Multiple' SQL Injection",2023-04-20,"Rahad Chowdhury",webapps,php,,2023-04-20,2023-04-28,1,CVE-2023-29849,,,,, +51377,exploits/php/webapps/51377.txt,"Bang Resto v1.0 - Stored Cross-Site Scripting (XSS)",2023-04-20,"Rahad Chowdhury",webapps,php,,2023-04-20,2023-04-28,1,CVE-2023-29848,,,,, 51175,exploits/php/webapps/51175.txt,"Bangresto 1.0 - SQL Injection",2023-03-31,nu11secur1ty,webapps,php,,2023-03-31,2023-03-31,0,,,,,, 41989,exploits/php/webapps/41989.txt,"BanManager WebUI 1.5.8 - PHP Code Injection",2017-05-10,HaHwul,webapps,php,,2017-05-10,2017-05-10,0,,,,,http://www.exploit-db.comBanManager-WebUI-1.5.8.zip, 17107,exploits/php/webapps/17107.txt,"Banner Ad Management Script - SQL Injection",2011-04-03,Egyptian.H4x0rz,webapps,php,,2011-04-03,2011-04-03,1,,,,,, @@ -25528,7 +25529,6 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd 39709,exploits/php/webapps/39709.txt,"pfSense Community Edition 2.2.6 - Multiple Vulnerabilities",2016-04-18,Security-Assessment.com,webapps,php,443,2016-04-18,2016-04-18,0,,,,,http://www.exploit-db.compfSense-LiveCD-2.2.6-RELEASE-i386.iso.gz,http://www.security-assessment.com/files/documents/advisory/pfsenseAdvisory.pdf 39306,exploits/php/webapps/39306.html,"pfSense Firewall 2.2.5 - Config File Cross-Site Request Forgery",2016-01-25,"Aatif Shahdad",webapps,php,443,2016-01-25,2016-04-14,0,OSVDB-132268,,,,http://www.exploit-db.compfsense-RELENG_2_2_5.tar.gz, 39695,exploits/php/webapps/39695.txt,"pfSense Firewall 2.2.6 - Services Cross-Site Request Forgery",2016-04-14,"Aatif Shahdad",webapps,php,443,2016-04-14,2016-04-14,0,,,,,http://www.exploit-db.compfSense-LiveCD-2.2.5-RELEASE-i386.iso.gz, -51352,exploits/php/webapps/51352.py,"pfsenseCE v2.6.0 - Anti-brute force protection bypass",2023-04-08,FabDotNET,webapps,php,,2023-04-08,2023-04-08,0,CVE-2023-27100,,,,, 43090,exploits/php/webapps/43090.txt,"PG All Share Video 1.0 - SQL Injection",2017-10-30,"Ihsan Sencan",webapps,php,,2017-10-30,2017-10-30,0,CVE-2017-15969,,,,, 22373,exploits/php/webapps/22373.txt,"PG Dating Pro CMS 1.0 - Multiple Vulnerabilities",2012-10-31,Vulnerability-Lab,webapps,php,,2012-10-31,2012-10-31,0,OSVDB-86857;OSVDB-86856;OSVDB-86855,,,,,https://www.vulnerability-lab.com/get_content.php?id=736 17531,exploits/php/webapps/17531.txt,"PG eLms Pro vDEC_2007_01 - 'contact_us.php' Multiple POST Cross-Site Scripting Vulnerabilities",2011-07-14,LiquidWorm,webapps,php,,2011-07-14,2011-07-14,0,,,,,,http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5027.php diff --git a/ghdb.xml b/ghdb.xml index bec4f86cb..b87553f3e 100644 --- a/ghdb.xml +++ b/ghdb.xml @@ -53866,6 +53866,21 @@ https://ch.linkedin.com/in/schmidbruno 2023-03-14 Sharique Raza + + 8170 + https://www.exploit-db.com/ghdb/8170 + Files Containing Juicy Info + Re: intitle:"index of" "docker-compose.yml" + # Google Dork: intitle:"index of" "docker-compose.yml" +# Files Containing Juicy Info +# Date:28/04/2023 +# Exploit Author: Mohd S + Re: intitle:"index of" "docker-compose.yml" + https://www.google.com/search?q=Re: intitle:"index of" "docker-compose.yml" + + 2023-04-28 + Mohd S + 31 https://www.exploit-db.com/ghdb/31