DB: 2023-04-29

9 changes to exploits/shellcodes/ghdb

pfsenseCE v2.6.0 - Anti-brute force protection bypass
Art Gallery Management System Project in PHP v 1.0 - SQL injection
Art Gallery Management System Project v1.0 - Reflected Cross-Site Scripting (XSS)
Art Gallery Management System Project v1.0 - SQL Injection (sqli) authenticated
Art Gallery Management System Project v1.0 - SQL Injection (sqli) Unauthenticated
Art Gallery Management System Project in PHP v 1.0 - SQL injection
Art Gallery Management System Project v1.0 - Reflected Cross-Site Scripting (XSS)
Art Gallery Management System Project v1.0 - SQL Injection (cid) Unauthenticated
Art Gallery Management System Project v1.0 - SQL Injection (editid) authenticated
Bang Resto v1.0 - 'Multiple' SQL Injection
Bang Resto v1.0 - Stored Cross-Site Scripting (XSS)
Bang Resto v1.0 - 'Multiple' SQL Injection
Bang Resto v1.0 - Stored Cross-Site Scripting (XSS)

pfsenseCE v2.6.0 - Anti-brute force protection bypass
This commit is contained in:
Exploit-DB 2023-04-29 00:16:28 +00:00
parent 1015b02d68
commit 91a0e53b65
7 changed files with 27 additions and 13 deletions

View file

@ -1,4 +1,4 @@
# Exploit Title: Art Gallery Management System Project v1.0 - SQL Injection (sqli) Unauthenticated
# Exploit Title: Art Gallery Management System Project v1.0 - SQL Injection (cid) Unauthenticated
# Date: 20/01/2023
# Exploit Author: Rahul Patwari
# Vendor Homepage: https://phpgurukul.com/

View file

@ -1,4 +1,4 @@
# Exploit Title: Art Gallery Management System Project v1.0 - SQL Injection (sqli) authenticated
# Exploit Title: Art Gallery Management System Project v1.0 - SQL Injection (editid) authenticated
# Date: 20/01/2023
# Exploit Author: Rahul Patwari
# Vendor Homepage: https://phpgurukul.com/

View file

@ -2,9 +2,7 @@
# Date: 31-01-2023
# Exploit Author: Yogesh Verma
# Vendor Homepage: https://y0gesh-verma.github.io/
# Software Link:
https://phpgurukul.com/art-gallery-management-system-using-php-and-mysql/,
https://phpgurukul.com/projects/Art-Gallery-MS-PHP.zip
# Software Link: https://phpgurukul.com/art-gallery-management-system-using-php-and-mysql/, https://phpgurukul.com/projects/Art-Gallery-MS-PHP.zip
# Version: 1.0
# Tested on: Windows/Linux
# CVE : CVE-2023-23156

View file

@ -40,4 +40,5 @@ btnMenuItemID=1&qty=1
SQL Injection use this query ".1 union select
1,2,3,CONCAT_WS(0x203a20,0x557365723a3a3a3a20,USER(),0x3c62723e,0x44617461626173653a3a3a3a3a20,DATABASE(),0x3c62723e,0x56657273696f6e3a3a3a3a20,VERSION())--
-" in "btnMenuItemID" parameter.
4. Check browser you will see user, database and version informations.
4. Check browser you will see user, database and version informations.
5. You could also use sqlmap to dump the whole database by saving the web request from BurpSuite

View file

@ -3820,6 +3820,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
35069,exploits/hardware/remote/35069.txt,"pfSense - 'pkg.php?xml' Cross-Site Scripting",2010-11-08,"dave b",remote,hardware,,2010-11-08,2014-10-27,1,CVE-2010-4412;OSVDB-69648,,,,,https://www.securityfocus.com/bid/45272/info
35068,exploits/hardware/remote/35068.txt,"pfSense - 'pkg_edit.php?id' Cross-Site Scripting",2010-11-08,"dave b",remote,hardware,,2010-11-08,2014-10-27,1,CVE-2010-4412;OSVDB-69647,,,,,https://www.securityfocus.com/bid/45272/info
35070,exploits/hardware/remote/35070.txt,"pfSense - 'status_graph.php?if' Cross-Site Scripting",2010-11-08,"dave b",remote,hardware,,2010-11-08,2014-10-27,1,CVE-2010-4412;OSVDB-69649,,,,,https://www.securityfocus.com/bid/45272/info
51352,exploits/hardware/remote/51352.py,"pfsenseCE v2.6.0 - Anti-brute force protection bypass",2023-04-08,FabDotNET,remote,hardware,,2023-04-08,2023-04-28,0,CVE-2023-27100,,,,,
5113,exploits/hardware/remote/5113.txt,"Philips VOIP841 Firmware 1.0.4.800 - Multiple Vulnerabilities",2008-02-14,ikki,remote,hardware,,2008-02-13,2017-01-24,1,OSVDB-42943;CVE-2008-4876;OSVDB-42942;CVE-2008-4875;OSVDB-42939;CVE-2008-4874,,,,,
37066,exploits/hardware/remote/37066.py,"Phoenix Contact ILC 150 ETH PLC - Remote Control Script",2015-05-20,Photubias,remote,hardware,,2015-05-20,2016-12-17,1,CVE-2014-9195;OSVDB-117101,,,,,
8359,exploits/hardware/remote/8359.py,"Pirelli Discus DRG A225 wifi router - WPA2PSK Default Algorithm",2009-04-06,j0rgan,remote,hardware,,2009-04-05,,1,OSVDB-105026,,,,,
@ -14023,10 +14024,10 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
24451,exploits/php/webapps/24451.txt,"ArrowChat 1.5.61 - Multiple Vulnerabilities",2013-02-05,kallimero,webapps,php,,2013-02-05,2013-02-05,0,OSVDB-89830;OSVDB-89829,,,,,
14050,exploits/php/webapps/14050.txt,"ARSC Really Simple Chat 3.3 - Remote File Inclusion / Cross-Site Scripting",2010-06-25,"Zer0 Thunder",webapps,php,,2010-06-25,2010-11-12,1,OSVDB-65837;OSVDB-65836,,,,http://www.exploit-db.comarsc3.3-pre2.zip,
35816,exploits/php/webapps/35816.txt,"ARSC Really Simple Chat 3.3-rc2 - Cross-Site Scripting / Multiple SQL Injections",2011-06-01,"High-Tech Bridge SA",webapps,php,,2011-06-01,2015-01-18,1,,,,,,https://www.securityfocus.com/bid/48083/info
51272,exploits/php/webapps/51272.py,"Art Gallery Management System Project in PHP v 1.0 - SQL injection",2023-04-06,"Yogesh Verma",webapps,php,,2023-04-06,2023-04-06,0,CVE-2023-23156,,,,,
51214,exploits/php/webapps/51214.txt,"Art Gallery Management System Project v1.0 - Reflected Cross-Site Scripting (XSS)",2023-04-03,"Rahul Patwari",webapps,php,,2023-04-03,2023-04-03,0,CVE-2023-23161,,,,,
51216,exploits/php/webapps/51216.txt,"Art Gallery Management System Project v1.0 - SQL Injection (sqli) authenticated",2023-04-03,"Rahul Patwari",webapps,php,,2023-04-03,2023-04-03,0,CVE-2023-23163,,,,,
51215,exploits/php/webapps/51215.txt,"Art Gallery Management System Project v1.0 - SQL Injection (sqli) Unauthenticated",2023-04-03,"Rahul Patwari",webapps,php,,2023-04-03,2023-04-03,0,CVE-2023-23162,,,,,
51272,exploits/php/webapps/51272.py,"Art Gallery Management System Project in PHP v 1.0 - SQL injection",2023-04-06,"Yogesh Verma",webapps,php,,2023-04-06,2023-04-28,1,CVE-2023-23156,,,,,
51214,exploits/php/webapps/51214.txt,"Art Gallery Management System Project v1.0 - Reflected Cross-Site Scripting (XSS)",2023-04-03,"Rahul Patwari",webapps,php,,2023-04-03,2023-04-28,1,CVE-2023-23161,,,,,
51215,exploits/php/webapps/51215.txt,"Art Gallery Management System Project v1.0 - SQL Injection (cid) Unauthenticated",2023-04-03,"Rahul Patwari",webapps,php,,2023-04-03,2023-04-28,1,CVE-2023-23162,,,,,
51216,exploits/php/webapps/51216.txt,"Art Gallery Management System Project v1.0 - SQL Injection (editid) authenticated",2023-04-03,"Rahul Patwari",webapps,php,,2023-04-03,2023-04-28,1,CVE-2023-23163,,,,,
34560,exploits/php/webapps/34560.html,"ArtGK CMS - Cross-Site Scripting / HTML Injection",2010-09-01,"High-Tech Bridge SA",webapps,php,,2010-09-01,2014-09-08,1,,,,,,https://www.securityfocus.com/bid/42923/info
43206,exploits/php/webapps/43206.txt,"Artica Web Proxy 3.06 - Remote Code Execution",2017-12-01,hyp3rlinx,webapps,php,,2017-12-01,2017-12-01,0,CVE-2017-17055,,,,,
31028,exploits/php/webapps/31028.txt,"Article Dashboard - '/admin/login.php' Multiple SQL Injections",2008-01-15,Xcross87,webapps,php,,2008-01-15,2014-01-19,1,CVE-2008-0286;OSVDB-40273,,,,,https://www.securityfocus.com/bid/27286/info
@ -14437,8 +14438,8 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
28307,exploits/php/webapps/28307.txt,"Banex PHP MySQL Banner Exchange 2.21 - 'admin.php' Multiple SQL Injections",2006-07-31,SirDarckCat,webapps,php,,2006-07-31,2013-09-15,1,CVE-2006-3963;OSVDB-29090,,,,,https://www.securityfocus.com/bid/19240/info
28308,exploits/php/webapps/28308.txt,"Banex PHP MySQL Banner Exchange 2.21 - 'members.php?cfg_root' Remote File Inclusion",2006-07-31,SirDarckCat,webapps,php,,2006-07-31,2013-09-15,1,CVE-2006-3964;OSVDB-29091,,,,,https://www.securityfocus.com/bid/19240/info
28306,exploits/php/webapps/28306.txt,"Banex PHP MySQL Banner Exchange 2.21 - 'signup.php?site_name' SQL Injection",2006-07-31,SirDarckCat,webapps,php,,2006-07-31,2013-09-15,1,CVE-2006-3963;OSVDB-29089,,,,,https://www.securityfocus.com/bid/19240/info
51378,exploits/php/webapps/51378.txt,"Bang Resto v1.0 - 'Multiple' SQL Injection",2023-04-20,"Rahad Chowdhury",webapps,php,,2023-04-20,2023-04-20,0,CVE-2023-29849,,,,,
51377,exploits/php/webapps/51377.txt,"Bang Resto v1.0 - Stored Cross-Site Scripting (XSS)",2023-04-20,"Rahad Chowdhury",webapps,php,,2023-04-20,2023-04-20,0,CVE-2023-29848,,,,,
51378,exploits/php/webapps/51378.txt,"Bang Resto v1.0 - 'Multiple' SQL Injection",2023-04-20,"Rahad Chowdhury",webapps,php,,2023-04-20,2023-04-28,1,CVE-2023-29849,,,,,
51377,exploits/php/webapps/51377.txt,"Bang Resto v1.0 - Stored Cross-Site Scripting (XSS)",2023-04-20,"Rahad Chowdhury",webapps,php,,2023-04-20,2023-04-28,1,CVE-2023-29848,,,,,
51175,exploits/php/webapps/51175.txt,"Bangresto 1.0 - SQL Injection",2023-03-31,nu11secur1ty,webapps,php,,2023-03-31,2023-03-31,0,,,,,,
41989,exploits/php/webapps/41989.txt,"BanManager WebUI 1.5.8 - PHP Code Injection",2017-05-10,HaHwul,webapps,php,,2017-05-10,2017-05-10,0,,,,,http://www.exploit-db.comBanManager-WebUI-1.5.8.zip,
17107,exploits/php/webapps/17107.txt,"Banner Ad Management Script - SQL Injection",2011-04-03,Egyptian.H4x0rz,webapps,php,,2011-04-03,2011-04-03,1,,,,,,
@ -25528,7 +25529,6 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd
39709,exploits/php/webapps/39709.txt,"pfSense Community Edition 2.2.6 - Multiple Vulnerabilities",2016-04-18,Security-Assessment.com,webapps,php,443,2016-04-18,2016-04-18,0,,,,,http://www.exploit-db.compfSense-LiveCD-2.2.6-RELEASE-i386.iso.gz,http://www.security-assessment.com/files/documents/advisory/pfsenseAdvisory.pdf
39306,exploits/php/webapps/39306.html,"pfSense Firewall 2.2.5 - Config File Cross-Site Request Forgery",2016-01-25,"Aatif Shahdad",webapps,php,443,2016-01-25,2016-04-14,0,OSVDB-132268,,,,http://www.exploit-db.compfsense-RELENG_2_2_5.tar.gz,
39695,exploits/php/webapps/39695.txt,"pfSense Firewall 2.2.6 - Services Cross-Site Request Forgery",2016-04-14,"Aatif Shahdad",webapps,php,443,2016-04-14,2016-04-14,0,,,,,http://www.exploit-db.compfSense-LiveCD-2.2.5-RELEASE-i386.iso.gz,
51352,exploits/php/webapps/51352.py,"pfsenseCE v2.6.0 - Anti-brute force protection bypass",2023-04-08,FabDotNET,webapps,php,,2023-04-08,2023-04-08,0,CVE-2023-27100,,,,,
43090,exploits/php/webapps/43090.txt,"PG All Share Video 1.0 - SQL Injection",2017-10-30,"Ihsan Sencan",webapps,php,,2017-10-30,2017-10-30,0,CVE-2017-15969,,,,,
22373,exploits/php/webapps/22373.txt,"PG Dating Pro CMS 1.0 - Multiple Vulnerabilities",2012-10-31,Vulnerability-Lab,webapps,php,,2012-10-31,2012-10-31,0,OSVDB-86857;OSVDB-86856;OSVDB-86855,,,,,https://www.vulnerability-lab.com/get_content.php?id=736
17531,exploits/php/webapps/17531.txt,"PG eLms Pro vDEC_2007_01 - 'contact_us.php' Multiple POST Cross-Site Scripting Vulnerabilities",2011-07-14,LiquidWorm,webapps,php,,2011-07-14,2011-07-14,0,,,,,,http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5027.php

Can't render this file because it is too large.

View file

@ -53866,6 +53866,21 @@ https://ch.linkedin.com/in/schmidbruno
<date>2023-03-14</date>
<author>Sharique Raza</author>
</entry>
<entry>
<id>8170</id>
<link>https://www.exploit-db.com/ghdb/8170</link>
<category>Files Containing Juicy Info</category>
<shortDescription>Re: intitle:&quot;index of&quot; &quot;docker-compose.yml&quot;</shortDescription>
<textualDescription># Google Dork: intitle:&quot;index of&quot; &quot;docker-compose.yml&quot;
# Files Containing Juicy Info
# Date:28/04/2023
# Exploit Author: Mohd S</textualDescription>
<query>Re: intitle:&quot;index of&quot; &quot;docker-compose.yml&quot;</query>
<querystring>https://www.google.com/search?q=Re: intitle:&quot;index of&quot; &quot;docker-compose.yml&quot;</querystring>
<edb></edb>
<date>2023-04-28</date>
<author>Mohd S</author>
</entry>
<entry>
<id>31</id>
<link>https://www.exploit-db.com/ghdb/31</link>