exploit-db-mirror/platforms/php/webapps/41399.txt
Offensive Security 4195f70ade DB: 2017-02-21
6 new exploits

EFS Easy Chat Server - Authentication Request Buffer Overflow (SEH)
EFS Easy Chat Server 2.2 - Authentication Request Buffer Overflow (SEH)

EFS Easy Chat Server - Cross-Site Request Forgery (Change Admin Password)
EFS Easy Chat Server 2.2 - Cross-Site Request Forgery (Change Admin Password)

EFS Easy Chat Server - Authentication Request Buffer Overflow (Perl)
EFS Easy Chat Server 2.2 - Authentication Request Buffer Overflow (Perl)

yaws 1.89 - Directory Traversal
Yaws 1.89 - Directory Traversal

Linux/x86 - SELinux Permissive Mode Switcher Shellcode (45 bytes)

Jogjacamp JProfile Gold - (id_news) SQL Injection
Jogjacamp JProfile Gold - 'id_news' Parameter SQL Injection

RSS News AutoPilot Script 1.0.1 / 3.0.3 - Cross-Site Request Forgery
Joomla! Component MaQma Helpdesk 4.2.7 - 'id' Parameter SQL Injection
Joomla! Component PayPal IPN for DOCman 3.1 - 'id' Parameter SQL Injection
Album Lock 4.0 iOS - Directory Traversal
Tenda N3 Wireless N150 Home Router - Authentication Bypass
2017-02-21 05:01:20 +00:00

17 lines
No EOL
702 B
Text
Executable file

# # # # #
# Exploit Title: Joomla! Component MaQma Helpdesk v4.2.7 - SQL Injection
# Google Dork: inurl:index.php?option=com_maqmahelpdesk
# Date: 20.02.2017
# Vendor Homepage: http://componentslab.com/
# Software Buy: https://extensions.joomla.org/extensions/extension/clients-a-communities/help-desk/maqma-helpdesk/
# Demo: http://demo.componentslab.com/index.php/department/software-support
# Version: 4.2.7
# Tested on: Win7 x64, Kali Linux x64
# # # # #
# Exploit Author: Ihsan Sencan
# Author Web: http://ihsan.net
# Author Mail : ihsan[@]ihsan[.]net
# # # # #
# SQL Injection/Exploit :
# http://localhost/[PATH]/index.php?option=com_maqmahelpdesk&task=pdf_kb&id=[SQL]
# # # # #