
11 changes to exploits/shellcodes/ghdb Snitz Forum v1.0 - Blind SQL Injection Franklin Fueling Systems TS-550 - Exploit and Default Password Tenda N300 F3 12.01.01.48 - Malformed HTTP Request Header Processing MAC 1200R - Directory Traversal Docker based datastores for IBM Instana 241-2 243-0 - No Authentication IBM Aspera Faspex 4.4.1 - YAML deserialization (RCE) ChurchCRM 4.5.1 - Authenticated SQL Injection NotrinosERP 0.7 - Authenticated Blind SQL Injection Rukovoditel 3.3.1 - Remote Code Execution (RCE) Wondershare Dr Fone 12.9.6 - Privilege Escalation
24 lines
No EOL
526 B
Text
24 lines
No EOL
526 B
Text
# Exploit Title: Snitz Forum v1.0 - Blind SQL Injection
|
|
# Date: 13/03/2023
|
|
# Exploit Author: Emiliano Febbi
|
|
# Vendor Homepage: https://forum.snitz.com/
|
|
# Software Link: https://sourceforge.net/projects/sf2k/files/
|
|
# Version: ALL VERSION
|
|
# Tested on: Windows 10
|
|
|
|
[code]
|
|
._ _______.
|
|
*/ ///______I
|
|
) . /_(_)
|
|
/__/ *0day PoC*
|
|
|
|
|
|
http://www.site.com/forum/cal.asp?date=25/03/2023 <= SQLi ???
|
|
|
|
http://www.site.com/forum/log.asp?log_id=3456 <= Blind SQLi #!WORK!#
|
|
|
|
._________.
|
|
*/ ///______I
|
|
) . /_(_)
|
|
/__/*0day PoC End*
|
|
[/code] |