├── README.md
├── exploitoncli.php
└── update
├── cxsecurity.txt
├── exploit4arab.txt
├── exploitdb.txt
├── iedb.txt
├── packetstorm.txt
└── siph0n.txt
/README.md:
--------------------------------------------------------------------------------
1 | 
2 | ExploitOnCLI BETA
3 | ===============
4 |
5 | Trying to be the best tool to search for exploits in the terminal.
6 |
7 | ExploitOnCLI or "EOC" is a tool written in PHP for Linux, designed to search for exploits in multiple exploit databases (no online search will be performed, but yes in a local file), the databases are:
8 | * Exploit-DB
9 | * PacketStormSecurity
10 | * IEDB
11 | * Siph0n
12 | * CXSecurity
13 | * Exploit4Arab
14 |
15 | The displayed results are filtered, so an "overlay" of databases can happen, depending on what(string) is being searched.
16 |
17 |
18 | In this version we have the following options:
19 |
20 | Simple Search: root@root ~ # php eoc.php --search/-s
21 | EX: root@root ~ # php eoc.php --search/-s RobotCPA
22 |
23 | simple update: root@root ~ # php eoc.php --update
24 |
25 | Update a specific database: root@root ~ # php eoc.php --update="DBS"
26 | EX: root@root ~ # php eoc.php --update=iedb
27 | EX2: root@root ~ # php eoc.php --update=iedb,packetstorm
28 |
29 | For help: root@root ~ # php eoc.php --help/-h
30 |
31 | For 'about': root@root ~ # php eoc.php --about/-a
32 |
33 | Option to download the results to the local folder: root@root ~ # php eoc.php --down/-d
34 |
35 |
36 | screenshots;
37 | 
38 |
--------------------------------------------------------------------------------
/exploitoncli.php:
--------------------------------------------------------------------------------
1 | array("NetSecL Linux", "Dragora Linux", "ArchBSD", "Ubunto Linux", "Android", "Debian Linux"),
194 | "LNG" => array("en-US", "pt-BR", "cs-CZ", "pt_PT", "ru-RU", "en-IN")
195 | );
196 | $UA[2] = array("Firefox", "Mobile", "Opera", "Safari", "GoogleBot", "Galaxy",
197 | "SO" => array("5.1.2600", "6.0", "6.1.7601", "6.2", "6.3", "6.4"),
198 | "LNG" => array("en-US", "pt-BR", "cs-CZ", "pt_PT", "ru-RU", "en-IN")
199 | );
200 |
201 | // Monstando o UserAgent
202 | if(rand(1,2)==1){
203 | $USA = $UA[1][rand(0,5)]."./".rand(0,5).".".rand(0,5)." (".$UA[1]["SO"][rand(0,5)]."; ".$UA[1]["LNG"][rand(0,5)].";)";
204 | }else{
205 | $USA = "Mozilla/5.0 (Windows NT ".$UA[2]["SO"][rand(0,5)]."; ".$UA[2]["LNG"][rand(0,5)].") (KHTML, like Gecko) ".$UA[2][rand(0,5)]."/".rand(5,15).".".rand(10,25);
206 | }
207 |
208 | return $USA;
209 |
210 | }
211 |
212 | ####################################################################
213 | ## DATABASE UPDATE
214 | function siph0n(){
215 | echo "\n\033[0;30m------------------------------------------------------------------------------------------------------------------------------------------------------------------------\033[0;37m\n\n \033[0;31mSIPH0N\n \033[0;30m--------------\033[0;37m\n";
216 | $dados = array('webapps');
217 |
218 |
219 | if(!file_exists("update".dirsep."siph0n.txt")){
220 | echo "\n\033[0;37m Raw file not found, downloading from repository.. ";
221 | $x = getsource("https://raw.githubusercontent.com/r00tmars/ExploitOnCLI/master/update/siph0n.txt");
222 | file_put_contents("update/siph0n.txt", $x['s']);
223 | echo "DONE!\n";
224 | }
225 |
226 |
227 | foreach($dados as $id => $name){ // array of types
228 | echo "\n \033[0;31m$name\033[0;37m - PAGE : ";
229 |
230 | $np=1;
231 | while($np<=1000){
232 | echo "\033[0;30m".$np."\033[0;37m";
233 |
234 | $x = getsource("http://siph0n.in/{$name}.php?page=$np");
235 |
236 | http_error:
237 | if($x["i"] != 200 or $x["i"] == 0){
238 | echo "\033[0;31mRetrying...\033[0;30m[".$x["i"]."]\033[0;37m ";
239 | $x = getsource("http://siph0n.in/{$name}.php?page=$np");
240 | goto http_error;
241 | }
242 |
243 | preg_match_all('/
(.*?)<\/table>/s', $x["s"], $source);
244 | if(!isset($source[0][0])){
245 | echo "\n [ERROR]:: An unexpected error happened\n";
246 | break;
247 | }
248 | $sourc = explode("", $source[0][0]);
249 | unset($sourc[0]);
250 | unset($sourc[count($sourc)]);
251 |
252 | if(empty($sourc)){ break; }
253 |
254 | foreach($sourc as $code){
255 | preg_match_all('#(.*?) | #', $code, $date);
256 | preg_match_all('#(.*?)#i', $code, $urlEname);
257 | if(empty($urlEname[0])){
258 | preg_match_all('#(.*?)#i', $code, $urlEname);
259 | }
260 | $x = explode('=', $urlEname[1][0]);
261 | $save[] = '"siph0n","'.$name.'","'.$date[1][0].'","'.$x[1].'","'.html_entity_decode(trim($urlEname[2][0])).'","http://siph0n.in/'.$urlEname[1][0].'"';
262 | }
263 |
264 | foreach($save as $bla => $info){
265 | $file = "update".dirsep."siph0n.txt";
266 | $inf = explode("?", $info);
267 |
268 | if(!preg_match("#".$inf[0]."#si", @file_get_contents($file))){
269 | file_put_contents($file, $info.PHP_EOL, FILE_APPEND);
270 | }else{
271 | echo PHP_EOL;
272 | break(2);
273 | }
274 |
275 | }
276 | $save = null;
277 | echo ", ";
278 | $np++;
279 | }
280 | }
281 | }
282 |
283 | function iedb(){
284 | echo "\n\033[0;30m------------------------------------------------------------------------------------------------------------------------------------------------------------------------\033[0;37m\n\n \033[0;31mIEDB\n \033[0;30m--------------\033[0;37m\n";
285 | $dados = array(0 => 'remotes',
286 | 1 => 'locals',
287 | 2 => 'webapps',
288 | 3 => 'dos',
289 | 4 => 'shellcodes');
290 |
291 | if(!file_exists("update".dirsep."iedb.txt")){
292 | echo "\n\033[0;37m Raw file not found, downloading from repository.. ";
293 | $x = getsource("https://raw.githubusercontent.com/r00tmars/ExploitOnCLI/master/update/iedb.txt");
294 | file_put_contents("update/iedb.txt", $x['s']);
295 | echo "DONE!\n";
296 | }
297 |
298 | foreach($dados as $id => $name){
299 | echo "\n \033[0;31m$name\033[0;37m - PAGE : ";
300 |
301 | $np=1;
302 | while($np<=500){
303 | echo "\033[0;30m".$np."\033[0;37m";
304 |
305 | $x = getsource("http://iedb.ir/{$name}.html?page=$np");
306 |
307 | http_error:
308 | if($x["i"] != 200 or $x["i"] == 0){
309 | echo "\033[0;31mRetrying...\033[0;30m[".$x["i"]."]\033[0;37m ";
310 | $x = getsource("http://iedb.ir/{$name}.html?page=$np");
311 | goto http_error;
312 | }
313 |
314 | preg_match_all('/(.*?)<\/tr>/s', $x["s"], $a);
315 |
316 | if(empty($a[0])){ break; }
317 |
318 | foreach($a[0] as $code){
319 | preg_match_all('#(.*?) | #', $code, $date);
320 | preg_match_all('#(.*?)#i', $code, $urlEname);
321 | if(empty($urlEname[0])){
322 | preg_match_all('#(.*?)#i', $code, $urlEname);
323 | }
324 | $id = explode("exploits-", $urlEname[1][0]);
325 | $id = explode('.html', $id[1]);
326 | $save[] = '"iedb","'.$name.'","'.$date[1][0].'","'.$id[0].'","'.html_entity_decode(trim($urlEname[2][0])).'","http://iedb.ir/'.$urlEname[1][0].'"';
327 | }
328 |
329 | foreach($save as $bla => $info){
330 | $file = "update".dirsep."iedb.txt";
331 |
332 | if(!preg_match("#".$info."#si", @file_get_contents($file))){
333 | file_put_contents($file, $info.PHP_EOL, FILE_APPEND);
334 | }else{
335 | echo PHP_EOL;
336 | break(2);
337 | }
338 |
339 |
340 | }
341 | $save = null;
342 | echo ", ";
343 | $np++;
344 | }
345 | }
346 | }
347 |
348 | function exploitdb(){
349 | echo "\n\033[0;30m------------------------------------------------------------------------------------------------------------------------------------------------------------------------\033[0;37m\n\n \033[0;31mEXPLOIT-DB\n \033[0;30m--------------\033[0;37m\n";
350 | $types = array('/remote/' => 'remotes',
351 | '/webapps/' => 'webapps',
352 | '/local/' => 'locals',
353 | '/dos/' => 'dos',
354 | '/shellcode/' => 'shellcodes');
355 |
356 | echo "\n \033[0;31mALL TYPES\033[0;37m - PAGE : \033[0;30mALL\033[0;37m\n \033[0;31m*\033[0;37m This operation may take a little longer than normal \033[0;31m*\033[0;37m\n";
357 |
358 |
359 | $x = getsource("https://raw.githubusercontent.com/offensive-security/exploit-database/master/files.csv");
360 |
361 | http_error:
362 | if($x["i"] != 200 or $x["i"] == 0){
363 | echo "\033[0;31mRetrying...\033[0;30m[".$x["i"]."]\033[0;37m ";
364 | $x = getsource("https://raw.githubusercontent.com/offensive-security/exploit-database/master/files.csv");
365 | goto http_error;
366 | }
367 |
368 | if(count(explode(PHP_EOL, $x['s'])) >= count(explode(PHP_EOL, @file_get_contents("update".dirsep."exploit-db.txt"))) or
369 | !file_exists("update".dirsep."exploit-db.txt")){ // iniciando as operações caso o arquivo não existe ou o atual no repo. no github seja "maior"
370 |
371 | @unlink("update".dirsep."exploitdb.txt"); // Apagando o arquivo velho
372 |
373 | $file = explode(PHP_EOL, $x['s']);
374 | $x = null;
375 | foreach($file as $f){
376 | preg_match_all('#(.*?),(.*?),"(.*?)",(.*?),.*,.*,.*,.*#', $f, $data); // retirando as infos de cada linha
377 |
378 | foreach($types as $who => $why){ // procurando pelo "tipo", seja WebApps, Local, DoS/PoC, Remote, etc..
379 | if(@preg_match("#$who#i", $data[2][0])){
380 | $type = $why;
381 | }
382 | }
383 | if(empty($type)){ $type = ""; }
384 |
385 | if(empty($data[4][0])){ $data[4][0] = "UNAVAILABLE"; }
386 |
387 | $line = @'"exploit-db","'.$type.'","'.$data[4][0].'","'.$data[1][0].'","'.html_entity_decode(trim($data[3][0])).'","https://www.exploit-db.com/exploits/'.$data[1][0].'/"';
388 |
389 | if(!empty($data[3][0])){
390 | file_put_contents("update".dirsep."exploitdb.txt", $line.PHP_EOL, FILE_APPEND);
391 | }
392 | }
393 |
394 |
395 | }
396 |
397 | $x = "";
398 | }
399 |
400 | function cxsecurity(){
401 | echo "\n\033[0;30m------------------------------------------------------------------------------------------------------------------------------------------------------------------------\033[0;37m\n\n \033[0;31mCXSECURITY\n \033[0;30m--------------\033[0;37m\n";
402 | $np=1;
403 | $date_break = "2500-05-16"; //gambiarra
404 | $sheit = true;
405 |
406 | if(!file_exists("update".dirsep."cxsecurity.txt")){
407 | echo "\n\033[0;37m Raw file not found, downloading from repository.. ";
408 | $x = getsource("https://raw.githubusercontent.com/r00tmars/ExploitOnCLI/master/update/cxsecurity.txt");
409 | file_put_contents("update/cxsecurity.txt", $x['s']);
410 | echo "DONE!\n";
411 | }
412 |
413 | echo "\n \033[0;31mALL\033[0;37m - PAGE : ";
414 | while($np<=10000){
415 | if($sheit==false){ break; }
416 | echo $np;
417 |
418 | $x = getsource("https://cxsecurity.com/wlb/$np");
419 |
420 | http_error:
421 | if($x["i"] != 200 or $x["i"] == 0){
422 | echo "\033[0;31mRetrying...\033[0;30m[".$x["i"]."]\033[0;37m ";
423 | $x = getsource("https://cxsecurity.com/wlb/$np");
424 | goto http_error;
425 | }
426 |
427 | preg_match_all("/(.+)<\/TABLE>/s", $x["s"], $source); // A
428 | $xpl = explode("Topic & Details", $source[0][0]); // MAIS
429 | $xpl = explode('', $xpl[1]); // PURA
430 | $xpl = explode('
', $xpl[0]); // GAMBIARRA
431 | unset($xpl[0]); // BRASILEIRA
432 |
433 | foreach($xpl as $id => $code){
434 | preg_match_all("/(.*?)<\/font>/i", $code, $date);
435 | preg_match_all('##', $code, $urlEname);
436 | preg_match_all('#(.*?)#', $code, $type);
437 |
438 | $dados[$date[1][0]] = array('url' => $urlEname[1],
439 | 'name' => $urlEname[2],
440 | 'type' => $type[1]);
441 | }
442 |
443 | foreach($dados as $date => $linkEname){
444 | $a = count($linkEname["url"])-1;
445 | $nps = 0;
446 | while($nps<= $a){
447 | if($date <= $date_break){
448 | $sheit = true;
449 |
450 | if(!isset($linkEname["type"][$nps])){
451 | $linkEname["type"][$nps] = "Unknown";
452 | }
453 | $x = explode('WLB-', $linkEname["url"][$nps]);
454 |
455 | $file = "update".dirsep."cxsecurity.txt";
456 | $info = '"cxsecurity","'.$linkEname["type"][$nps].'","'.$date.'","'.$x[1].'","'.html_entity_decode(trim($linkEname["name"][$nps])).'","'.$linkEname["url"][$nps].'"';
457 |
458 | if(!preg_match("#".$info."#si", @file_get_contents($file))){
459 | file_put_contents($file, $info.PHP_EOL, FILE_APPEND);
460 | }else{
461 | echo PHP_EOL;
462 | break(3);
463 | }
464 |
465 |
466 | }else{
467 | $sheit = false;
468 | break;
469 | }
470 | $nps++;
471 | if($sheit==false){ break; }
472 | }
473 | $date_break = $date;
474 | if($sheit==false){ break; }
475 | }
476 |
477 | $x = array(); // MAIS
478 | $dados = array(); // UMA
479 | $xpl = array(); // GAMBIARRA
480 | $linkEname = array(); // TIPICAMENTE
481 | $date = array(); // BRASILEIRA
482 | echo ", ";
483 | $np++;
484 | }
485 | }
486 |
487 | function packetstorm(){
488 | echo "\n\033[0;30m------------------------------------------------------------------------------------------------------------------------------------------------------------------------\033[0;37m\n\n \033[0;31mPACKETSTORM\n \033[0;30m--------------\033[0;37m\n";
489 |
490 | if(!file_exists("update".dirsep."packetstorm.txt")){
491 | echo "\n\033[0;37m Raw file not found, downloading from repository.. ";
492 | $x = getsource("https://raw.githubusercontent.com/r00tmars/ExploitOnCLI/master/update/packetstorm.txt");
493 | file_put_contents("update/packetstorm.txt", $x['s']);
494 | echo "DONE!\n";
495 | }
496 |
497 | echo "\n \033[0;31mALL TYPES\033[0;37m - PAGE : ";
498 | $np=1;
499 |
500 | $types = array('local' => 'local',
501 | 'remote' => 'remote',
502 | 'denial of service' => 'dos',
503 | 'web' => 'webapps',
504 | 'shellcode' => 'shellcodes');
505 |
506 | while($np<=10000){
507 | echo "\033[0;30m".$np."\033[0;37m";
508 |
509 | $x = getsource("https://packetstormsecurity.com/files/tags/exploit/page$np/");
510 |
511 | http_error:
512 | if($x["i"] != 200 or $x["i"] == 0){
513 | echo "\033[0;31mRetrying...\033[0;30m[".$x["i"]."]\033[0;37m ";
514 | $x = getsource("https://packetstormsecurity.com/files/tags/exploit/page$np/");
515 | goto http_error;
516 | }
517 |
518 | if(preg_match("/No Results Found<\/h1>/si", $x['s'])){ break; }
519 | if(preg_match("/You Have Reached Nothingness<\/h2>/si", $x['s'])){ break; }
520 |
521 | preg_match_all("/(.*?)<\/dl>/si", $x['s'], $code);
522 | $code = explode("/si", $c)){ // Se encontrar é porque é um exploit
531 | preg_match_all("#- (.*?)#si", $c, $title); // [1][0]
533 | preg_match_all("#/download/(.*?)/#si", $link[1][0], $id); // [1][0]
534 | preg_match_all("#Posted #si", $c, $t1pe); // [1][0]
536 |
537 | if(preg_match("#Security Advisory#si", html_entity_decode($title[1][0]))){
538 | break;
539 | }
540 |
541 | $type="";
542 | foreach($t1pe[1] as $sheit => $find){
543 | foreach($types as $tF => $tP){
544 | if(preg_match("/{$tF}/si", $find)){
545 | $type = $tP;
546 | break;
547 | }
548 | }
549 | }
550 | if(empty($type)){
551 | $type = "Unknown";
552 | }
553 |
554 |
555 | $file = "update".dirsep."packetstorm.txt";
556 | $info = '"packetstorm","'.$type.'","'.$date[1][0].'","'.$id[1][0].'","'.html_entity_decode($title[1][0]).'","https://packetstormsecurity.com'.$link[1][0].'"';
557 |
558 | if(!preg_match("#".$info."#si", @file_get_contents($file))){
559 | file_put_contents($file, $info.PHP_EOL, FILE_APPEND);
560 | }else{
561 | echo PHP_EOL;
562 | break(2);
563 | }
564 |
565 |
566 |
567 | }
568 | }
569 | echo ", ";
570 | $np++;
571 | }
572 | }
573 |
574 | function exploit4arab(){
575 | $types = array('webapps',
576 | 'rl_exploits');
577 |
578 | echo "\n\033[0;30m------------------------------------------------------------------------------------------------------------------------------------------------------------------------\033[0;37m\n\n \033[0;31mEXPLOIT4ARAB\n \033[0;30m--------------\033[0;37m\n";
579 |
580 | if(!file_exists("update".dirsep."exploit4arab.txt")){
581 | echo "\n\033[0;37m Raw file not found, downloading from repository.. ";
582 | $x = getsource("https://raw.githubusercontent.com/r00tmars/ExploitOnCLI/master/update/exploit4arab.txt");
583 | file_put_contents("update/exploit4arab.txt", $x['s']);
584 | echo "DONE!\n";
585 | }
586 |
587 | foreach($types as $typ){
588 | $np=1;
589 | echo "\n \033[0;31m{$typ}\033[0;37m - PAGE : ";
590 | $type = $typ;
591 |
592 | $x = getsource("http://www.exploit4arab.org/$typ/$np");
593 | preg_match_all("#(.*?)
#si", $x["s"], $nm);
594 | if(empty($nm[1][0])){ $nm[1][0] = 10000; }
595 |
596 | while($np<=$nm[1][0]){
597 | echo "\033[0;30m".$np."\033[0;37m";
598 |
599 | $x = getsource("http://www.exploit4arab.org/$typ/$np");
600 |
601 | preg_match_all("#(.*?)
#si", $x["s"], $code);
602 |
603 | http_error:
604 | if($x["i"] != 200 or $x["i"] == 0){
605 | echo "\033[0;31mRetrying...\033[0;30m[".$x["i"]."]\033[0;37m ";
606 | $x = getsource("http://www.exploit4arab.org/$typ/$np");
607 | goto http_error;
608 | }
609 |
610 | foreach($code[1] as $c){
611 | $d = explode("", $c);
612 | $date = trim(str_replace("", "", $d[0]));
613 | preg_match_all("# | .* | #si", $c, $d);
614 |
615 |
616 | $file = "update".dirsep."exploit4arab.txt";
617 | $info = '"exploit4arab","'.$type.'","'.$date.'","'.$d[1][0].'","'.html_entity_decode($d[2][0]).'","http://www.exploit4arab.org/exploits/'.$d[1][0].'"';
618 |
619 | if(!preg_match("#".$info."#si", @file_get_contents($file))){
620 | file_put_contents($file, $info.PHP_EOL, FILE_APPEND);
621 | }else{
622 | echo PHP_EOL;
623 | break(3);
624 | }
625 |
626 | }
627 | echo ", ";
628 | $np++;
629 | }
630 | }
631 | }
632 |
633 | ####################################################################
634 | ## OUTRAS FUNÇÕES
635 | function downcode($dados){ // para download do código XPL
636 | $path = "files".dirsep.$dados[1][0].dirsep.strtolower($dados[2][0]).dirsep.$dados[4][0].".txt";
637 |
638 | if(file_exists($path)){ // Caso o arquivo já exista
639 | goto break_is_shit;
640 | }
641 |
642 | $xpl = getsource($dados[6][0]);
643 |
644 | if($dados[1][0] == "iedb"){ // OK
645 | preg_match_all('/pre>(.+)<\/pre/s', $xpl["s"], $code);
646 | $code = html_entity_decode($code[1][0]);
647 | }
648 |
649 | if($dados[1][0] == "exploit-db"){ // OK
650 | $code = getsource("https://www.exploit-db.com/download/".$dados[4][0]);
651 | }
652 |
653 | if($dados[1][0] == "siph0n"){ // OK
654 | preg_match_all('/pre>(.+)<\/pre/s', $xpl["s"], $code);
655 | $code = html_entity_decode($code[1][0]);
656 | if(preg_match("#[email protected]', "[email protected]", $code);
659 | }
660 | }
661 |
662 | if($dados[1][0] == "cxsecurity"){ // OK
663 | preg_match_all("/(.*?)<\/samp>/si", $xpl["s"], $code);
664 | $code = htmlspecialchars_decode($code[1][0]);
665 | $code = str_replace("'", "'", $code);
666 | $code = str_replace("
", "", $code);
667 | }
668 |
669 | if($dados[1][0] == "exploit4arab"){ // OK
670 | preg_match_all("#
(.*?)
#si", $xpl['s'], $f);
671 | $code = str_replace("
", "",$f[1][0]);
672 | $code = html_entity_decode($code);
673 | }
674 |
675 | if($dados[1][0] == "packetstorm"){ // OK
676 | $code = html_entity_decode($xpl['s']);
677 | }
678 |
679 | if(!file_exists("files".dirsep.$dados[1][0])){ // DATABASE
680 | mkdir("files".dirsep.$dados[1][0]);
681 | }
682 | if(!file_exists("files".dirsep.$dados[1][0].dirsep.strtolower($dados[2][0]))){ // TYPE
683 | mkdir("files".dirsep.$dados[1][0].dirsep.strtolower($dados[2][0]));
684 | }
685 |
686 | file_put_contents($path, $code);
687 | break_is_shit:
688 | }
689 |
690 | function update($opt){ // atualizando BETA
691 | echo " \033[0;31mSTARTING UPDATE\033[0;37m\n";
692 |
693 | if(preg_match("/,/si", trim($opt['update']))){ $sDB = explode(",", $opt["update"]); }else{ $sDB[]= $opt["update"]; }
694 |
695 | foreach($sDB as $id => $whatDB){
696 | if(preg_match("/iedb/si", $whatDB) or empty($whatDB)) { echo iedb(); }
697 | if(preg_match("/siph0n/si", $whatDB) or empty($whatDB)) { echo siph0n(); }
698 | if(preg_match("/exploit-db/si", $whatDB) or empty($whatDB)) { echo exploitdb(); }else
699 | if(preg_match("/exploitdb/si", $whatDB) or empty($whatDB)) { echo exploitdb(); }
700 | if(preg_match("/packetstorm/si", $whatDB) or empty($whatDB)) { echo packetstorm(); }
701 | if(preg_match("/exploit4arab/si", $whatDB) or empty($whatDB)){ echo exploit4arab(); }
702 | if(preg_match("/cxsecurity/si", $whatDB) or empty($whatDB)) { echo cxsecurity(); }
703 | }
704 |
705 | echo "\n\n\033[0;31m DONE\n\n";
706 | }
707 |
708 | function dados(){ // BETA
709 | $file = array();
710 | $iterator = new DirectoryIterator("update");
711 |
712 | foreach($iterator as $entry){
713 | $var = $entry->getFilename();
714 |
715 | $file[] = @file_get_contents("update".dirsep.$var);
716 | }
717 |
718 |
719 | foreach($file as $id => $dados_brutos){
720 | $shit = @explode(PHP_EOL, $dados_brutos);
721 | if(count($shit)>5){
722 | foreach($shit as $s){
723 | preg_match_all('/"(.*?)","(.*?)","(.*?)","(.*?)","(.*?)","(.*?)"/i', $s, $d);
724 | if($s!=null){
725 | $file[$d[5][0]] = $s;
726 | }
727 | }
728 | }
729 | }
730 | $files = null;
731 | $shit = null;
732 |
733 | $file = array_unique($file);
734 |
735 | return $file;
736 | }
737 |
738 | ####################################################################
739 | ## VALHALLA
740 | echo banner();
741 | $down = FALSE;
742 | if(isset($opt["help"]) or isset($opt["h"])){ echo help(); } // HELP
743 | if(isset($opt["about"]) or isset($opt["a"])){ echo about(); } // ABOUT
744 | if(isset($opt["update"])){ echo update($opt); } // UPDATE
745 | if(isset($opt["s"])){ $opt["search"] = $opt["s"]; } // FIND
746 | if(isset($opt["down"]) or isset($opt["d"])){ $down = TRUE; } // ABOUT
747 |
748 |
749 |
750 | if(empty($opt["search"])){ // Se não tiver nada para pesquisar, DIE MOTHERFUCKER
751 | die();
752 | }
753 |
754 |
755 | // INFOS
756 | echo " SEARCH TERM: \033[00;31m{$opt["search"]}\n\033[0;37m DB's: ALL\n DOWN SOURCES: ";
757 | if($down == TRUE){ echo "\033[0;31mYES\033[0;37m\n"; }else{ echo "NOT\n"; }
758 |
759 | // PEGANDO OS DADOS DOS ARQUIVOS
760 | $file = dados();
761 |
762 | // MAIS UMA PARTE DAS INFOS
763 | echo " EXPLOITS LOADED: \033[0;31m".number_format(count($file),0,",",".")."\033[0;37m\n\n";
764 |
765 |
766 | // GAMBIARRA PARA CABER NA TELA
767 | $pnt = "";
768 | $nm = 31;
769 | if(strlen(getcwd())>=30){ $pnt = ".."; $nm = 29; }
770 |
771 |
772 | echo "\033[0;30m------------------------------------------------------------------------------------------------------------------------------------------------------------------------\033[0;37m
773 | TITLE \033[0;30m|\033[0;37m PATH ( ".@substr(getcwd(), 0, $nm).$pnt." )".@str_repeat(" ", $nm-strlen(getcwd()))."\033[0;30m|\033[0;37m ID \033[0;30m|\033[0;37m DATABASE
774 | \033[0;30m------------------------------------------------------------------------------------------------------------------------------------------------------------------------\033[0;37m";
775 |
776 |
777 | $id=0;
778 | foreach($file as $trash => $f){ // FOREACH COM CADA LINHA DOS DBS
779 | preg_match_all('/"(.*?)","(.*?)","(.*?)","(.*?)","(.*?)","(.*?)"/i', $f, $dados);
780 |
781 |
782 | if(@preg_match("/".strtolower($opt["search"])."/si", strtolower($dados[5][0]))){ // Caso encontre..
783 | $pnt = "";
784 | $nm = 95;
785 |
786 | if(strlen($dados[5][0])>=92){ // Caso o titulo tenha mais que 92 caracteres..
787 | $pnt = "..";
788 | $nm = 93;
789 | }
790 |
791 |
792 | // Arrumando o TITULO
793 | $title = preg_replace("/{$opt["search"]}/si", "\033[0;31m".strtoupper($opt["search"])."\033[0;37m",
794 | @substr($dados[5][0], 0, $nm).$pnt.@str_repeat(" ", $nm-strlen($dados[5][0])));
795 |
796 | echo " ".$title." \033[0;30m|\033[0;37m ";
797 |
798 | if($down == TRUE){ // caso a opção de download for selecionado
799 | downcode($dados);
800 | }
801 |
802 |
803 | $path = "files".dirsep.$dados[1][0].dirsep.strtolower($dados[2][0]).dirsep.$dados[4][0].".txt";
804 | if(!file_exists($path)){ // Se o arquivo não existe, exibe o link
805 | if(preg_match("/exploit4arab/si", $dados[1][0])){ $path = "exploit4arab.org/".strtolower($dados[2][0])."/".$dados[4][0]; }
806 | if(preg_match("/packetstorm/si", $dados[1][0])){ $path = "packetstormsecurity.com/files/".$dados[4][0]."/"; }
807 | if(preg_match("/cxsecurity/si", $dados[1][0])){ $path = "cxsecurity.com/issue/WLB-".$dados[4][0]; }
808 | if(preg_match("/exploit-db/si", $dados[1][0])){ $path = "exploit-db.com/exploits/".$dados[4][0]."/"; }
809 | if(preg_match("/iedb/si", $dados[1][0])){ $path = "iedb.ir/exploits-".$dados[4][0].".html"; }
810 | if(preg_match("/siph0n/si", $dados[1][0])){ $path = "siph0n.in/exploits.php?id=".$dados[4][0]; }
811 | }
812 |
813 | echo $path.@str_repeat(" ", 39-strlen($path))." \033[0;30m|\033[0;37m "; // PATH
814 | echo $dados[4][0].@str_repeat(" ", 10-strlen($dados[4][0]))." \033[0;30m|\033[0;37m " ; // ID
815 | echo strtoupper($dados[1][0]).PHP_EOL; // DATABASE
816 |
817 | $id++;
818 | }
819 | }
820 |
821 |
822 | echo "\033[0;30m------------------------------------------------------------------------------------------------------------------------------------------------------------------------\033[0;37m
823 | \033[0;31m{$id}\033[0;37m EXPLOITS FOUND
824 | \033[0;30m------------------------------------------------------------------------------------------------------------------------------------------------------------------------\033[0;37m\n\n";
825 |
826 |
827 |
828 |
829 |
830 |
831 | # END OF THE WORLD
832 |
--------------------------------------------------------------------------------
/update/siph0n.txt:
--------------------------------------------------------------------------------
1 | "siph0n","webapps","2017-05-17","4979","0Day IPB Forum v4.1.4.1 XSS+CSRF+FPD+Malicious Fil","http://siph0n.in/exploits.php?id=4979"
2 | "siph0n","webapps","2016-12-27","4954","PHPGedView XSS","http://siph0n.in/exploits.php?id=4954"
3 | "siph0n","webapps","2016-11-14","4946","AKP Meda Design Admin Panel XSS","http://siph0n.in/exploits.php?id=4946"
4 | "siph0n","webapps","2016-11-14","4945","JMS Support Online XSS","http://siph0n.in/exploits.php?id=4945"
5 | "siph0n","webapps","2016-08-25","4916","Lepton CMS v2.2.2 - RCE","http://siph0n.in/exploits.php?id=4916"
6 | "siph0n","webapps","2016-08-25","4915","Lepton CMS v2.2.0 - RCE","http://siph0n.in/exploits.php?id=4915"
7 | "siph0n","webapps","2016-08-22","4902","Navis WebAccess - SQL Injection","http://siph0n.in/exploits.php?id=4902"
8 | "siph0n","webapps","2016-08-22","4901","HackForums FAG 2.0 - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4901"
9 | "siph0n","webapps","2016-06-24","4789","OPAC KpwinSQL - SQL Injection","http://siph0n.in/exploits.php?id=4789"
10 | "siph0n","webapps","2016-06-23","4787","YOURL's - Vulnerable.","http://siph0n.in/exploits.php?id=4787"
11 | "siph0n","webapps","2016-05-31","4741","Rein Technologies Admin Bypass","http://siph0n.in/exploits.php?id=4741"
12 | "siph0n","webapps","2016-05-25","4731","BransonSite Admin Panel Bypass","http://siph0n.in/exploits.php?id=4731"
13 | "siph0n","webapps","2016-05-14","4701","000Webhost DNS Hijacking by @CrazedSec","http://siph0n.in/exploits.php?id=4701"
14 | "siph0n","webapps","2016-05-12","4695","Desire2Learn LMS XSS","http://siph0n.in/exploits.php?id=4695"
15 | "siph0n","webapps","2016-05-09","4689","Apache Solr Vulnerability Notes","http://siph0n.in/exploits.php?id=4689"
16 | "siph0n","webapps","2016-04-29","4675","i-Tech Nepal Radio CMS - SQL Injection","http://siph0n.in/exploits.php?id=4675"
17 | "siph0n","webapps","2016-04-29","4674","3A International - SQL Injection","http://siph0n.in/exploits.php?id=4674"
18 | "siph0n","webapps","2016-04-29","4673","PHPBack v1.3.0 - SQL Injection","http://siph0n.in/exploits.php?id=4673"
19 | "siph0n","webapps","2016-04-29","4672","Powered by Zarafe CMS - SQL Injection","http://siph0n.in/exploits.php?id=4672"
20 | "siph0n","webapps","2016-04-29","4671","WebNet CMS - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4671"
21 | "siph0n","webapps","2016-04-29","4670","Website by: WebDetail - SQL Injection","http://siph0n.in/exploits.php?id=4670"
22 | "siph0n","webapps","2016-04-29","4669","Powered by ham3d - SQL Injection","http://siph0n.in/exploits.php?id=4669"
23 | "siph0n","webapps","2016-04-29","4668","OpenCart 2.2.0.0 - Remote Code Execution","http://siph0n.in/exploits.php?id=4668"
24 | "siph0n","webapps","2016-04-29","4667","WDS CMS - SQL Injection","http://siph0n.in/exploits.php?id=4667"
25 | "siph0n","webapps","2016-04-29","4666","Eight Webcom CMS 2016Q2 - SQL Injection","http://siph0n.in/exploits.php?id=4666"
26 | "siph0n","webapps","2016-04-29","4665","QuickSilver HQ VoHo Concept4E CMS 1.0 - SQL Injection","http://siph0n.in/exploits.php?id=4665"
27 | "siph0n","webapps","2016-04-29","4664","AccelSite Content Manager 1.0 - SQL Injection","http://siph0n.in/exploits.php?id=4664"
28 | "siph0n","webapps","2016-04-23","4661","PerchCMS Arbitary file upload Vulnerability","http://siph0n.in/exploits.php?id=4661"
29 | "siph0n","webapps","2016-04-12","4648","X7Chat Install vulnerabilities.","http://siph0n.in/exploits.php?id=4648"
30 | "siph0n","webapps","2016-04-09","4645","Defacing MediaCloud sites in under 60 seconds.","http://siph0n.in/exploits.php?id=4645"
31 | "siph0n","webapps","2016-04-07","4630","UAEPD Shopping Script - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4630"
32 | "siph0n","webapps","2016-04-07","4629","WebDetail - Admin Bypass","http://siph0n.in/exploits.php?id=4629"
33 | "siph0n","webapps","2016-04-07","4628","Smart Vision - Multiple Vulnerabilites","http://siph0n.in/exploits.php?id=4628"
34 | "siph0n","webapps","2016-04-07","4627","Hamayeshnegar - SQL Injection","http://siph0n.in/exploits.php?id=4627"
35 | "siph0n","webapps","2016-04-06","4625","MeshCMS 3.6 - Remote Code Execution","http://siph0n.in/exploits.php?id=4625"
36 | "siph0n","webapps","2016-04-06","4623","Cacti 0.8.8g - SQL Injection","http://siph0n.in/exploits.php?id=4623"
37 | "siph0n","webapps","2016-04-06","4622","Techsoft Web Solutions CMS 2016Q2 - SQL Injection","http://siph0n.in/exploits.php?id=4622"
38 | "siph0n","webapps","2016-04-06","4621","Edunext Technologies - SQL Injection","http://siph0n.in/exploits.php?id=4621"
39 | "siph0n","webapps","2016-04-06","4620","Hi Technology & Services CMS - SQL Injection","http://siph0n.in/exploits.php?id=4620"
40 | "siph0n","webapps","2016-04-06","4619","Datascan Information Technology - SQL Injection","http://siph0n.in/exploits.php?id=4619"
41 | "siph0n","webapps","2016-04-06","4618","Axil CMS 0.1 - Authentication Bypass","http://siph0n.in/exploits.php?id=4618"
42 | "siph0n","webapps","2016-04-06","4617","Patron Info System - SQL Injection","http://siph0n.in/exploits.php?id=4617"
43 | "siph0n","webapps","2016-04-06","4616","Cades 2016Q1 - SQL Injection","http://siph0n.in/exploits.php?id=4616"
44 | "siph0n","webapps","2016-04-06","4615","Dorsa Web CMS - SQL Injection","http://siph0n.in/exploits.php?id=4615"
45 | "siph0n","webapps","2016-04-06","4614","Easy Hosting Control Panel - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4614"
46 | "siph0n","webapps","2016-04-06","4613","CubeCart 6.0.10 - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4613"
47 | "siph0n","webapps","2016-03-24","4589","WAP Music CMS - SQL Injection","http://siph0n.in/exploits.php?id=4589"
48 | "siph0n","webapps","2016-03-24","4588","SM Soft Tech CMS - SQL Injection","http://siph0n.in/exploits.php?id=4588"
49 | "siph0n","webapps","2016-03-24","4585","Top Business Advertising - SQL Injection","http://siph0n.in/exploits.php?id=4585"
50 | "siph0n","webapps","2016-03-24","4584","Multiple CCTV-DVR Vendors - Remote Code Execution","http://siph0n.in/exploits.php?id=4584"
51 | "siph0n","webapps","2016-03-24","4583","Disc Organization System - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4583"
52 | "siph0n","webapps","2016-03-24","4582","YKQK CMS - SQL Injection","http://siph0n.in/exploits.php?id=4582"
53 | "siph0n","webapps","2016-03-21","4576","WebsiteBaker CMS 2.8.3-SP5 - SQL Injection","http://siph0n.in/exploits.php?id=4576"
54 | "siph0n","webapps","2016-03-21","4575","ZenPhoto 1.4.11 - Remote File Inclusion","http://siph0n.in/exploits.php?id=4575"
55 | "siph0n","webapps","2016-03-21","4574","ChitaSoft - SQL Injection","http://siph0n.in/exploits.php?id=4574"
56 | "siph0n","webapps","2016-03-21","4573","Elevel It CMS - SQL Injection","http://siph0n.in/exploits.php?id=4573"
57 | "siph0n","webapps","2016-03-21","4572","Hi Technology & Services - SQL Injection","http://siph0n.in/exploits.php?id=4572"
58 | "siph0n","webapps","2016-03-21","4571","Gazisoft Haber Script V5 - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4571"
59 | "siph0n","webapps","2016-03-21","4570","BURSAAJANS Company CMS - SQL Injection","http://siph0n.in/exploits.php?id=4570"
60 | "siph0n","webapps","2016-03-21","4569","iReadyWeb 1.x.x CMS - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4569"
61 | "siph0n","webapps","2016-03-19","4568","File getting Sql injection vulnerability","http://siph0n.in/exploits.php?id=4568"
62 | "siph0n","webapps","2016-03-08","4554","Ukraine Catalog Script - SQL Injection","http://siph0n.in/exploits.php?id=4554"
63 | "siph0n","webapps","2016-03-08","4553","ATutor LMS <= 2.2.1 install_modules.php - Remote Code Execution","http://siph0n.in/exploits.php?id=4553"
64 | "siph0n","webapps","2016-03-01","4543","WebSPELL 4.2.4 - CSRF / SQL Injection","http://siph0n.in/exploits.php?id=4543"
65 | "siph0n","webapps","2016-03-01","4542","Russian Hospitals CMS - SQL Injection","http://siph0n.in/exploits.php?id=4542"
66 | "siph0n","webapps","2016-03-01","4541","Chuangluo Script - SQL Injection","http://siph0n.in/exploits.php?id=4541"
67 | "siph0n","webapps","2016-03-01","4540","WeBid 1.1.2p2 - SQL Injection","http://siph0n.in/exploits.php?id=4540"
68 | "siph0n","webapps","2016-02-22","4503","BlaB! - Configuration Deletion","http://siph0n.in/exploits.php?id=4503"
69 | "siph0n","webapps","2016-02-18","4496","WebDevTown E-commerce Vulnerabilities","http://siph0n.in/exploits.php?id=4496"
70 | "siph0n","webapps","2016-02-18","4494","Gold MOVIES 1.0.2 - SQL Injection","http://siph0n.in/exploits.php?id=4494"
71 | "siph0n","webapps","2016-02-18","4493","Redaxo CMS - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4493"
72 | "siph0n","webapps","2016-02-18","4492","phpMyBackupPro 2.5 - CSRF / RCE","http://siph0n.in/exploits.php?id=4492"
73 | "siph0n","webapps","2016-02-16","4483","Digimedia Cross-Site Scripting","http://siph0n.in/exploits.php?id=4483"
74 | "siph0n","webapps","2016-02-15","4482","Yeager CMS 1.2.1 - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4482"
75 | "siph0n","webapps","2016-02-15","4481","Scomm CMS - SQL Injection","http://siph0n.in/exploits.php?id=4481"
76 | "siph0n","webapps","2016-02-15","4480","Exponent 2.3.7 - PHP Code Execution","http://siph0n.in/exploits.php?id=4480"
77 | "siph0n","webapps","2016-02-15","4479","SMEweb 1.5f - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4479"
78 | "siph0n","webapps","2016-02-09","4458","WebInfopedia Local File Disclosure","http://siph0n.in/exploits.php?id=4458"
79 | "siph0n","webapps","2016-02-08","4453","Zoom Web Media - Default Admin","http://siph0n.in/exploits.php?id=4453"
80 | "siph0n","webapps","2016-02-08","4452","RED Vision Technology - SQL Injection","http://siph0n.in/exploits.php?id=4452"
81 | "siph0n","webapps","2016-02-08","4451","Design by TNDG - SQL Injection","http://siph0n.in/exploits.php?id=4451"
82 | "siph0n","webapps","2016-02-08","4450","Designed by LEBANG.com - SQL Injection","http://siph0n.in/exploits.php?id=4450"
83 | "siph0n","webapps","2016-02-05","4441","Timeclock - Default Admin","http://siph0n.in/exploits.php?id=4441"
84 | "siph0n","webapps","2016-02-04","4434","Symphony CMS 2.6.3 - SQL Injection","http://siph0n.in/exploits.php?id=4434"
85 | "siph0n","webapps","2016-02-04","4433","UliCMS <= v9.81 - SQL Injection","http://siph0n.in/exploits.php?id=4433"
86 | "siph0n","webapps","2016-02-04","4430","Mezzanine 4.1.0 - Arbitrary File Upload","http://siph0n.in/exploits.php?id=4430"
87 | "siph0n","webapps","2016-02-01","4418","New Era Company CMS - SQL Injection","http://siph0n.in/exploits.php?id=4418"
88 | "siph0n","webapps","2016-02-01","4417","Designed by Alkawebs - SQL Injection","http://siph0n.in/exploits.php?id=4417"
89 | "siph0n","webapps","2016-02-01","4416","PicsEngine 2 Beta - SQL Injection","http://siph0n.in/exploits.php?id=4416"
90 | "siph0n","webapps","2016-02-01","4415","Design by GTUT - SQL Injection","http://siph0n.in/exploits.php?id=4415"
91 | "siph0n","webapps","2016-02-01","4414","Kleefa v1.7 (IR) - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4414"
92 | "siph0n","webapps","2016-02-01","4413","Powered By SOLUTIONS - SQL Injection","http://siph0n.in/exploits.php?id=4413"
93 | "siph0n","webapps","2016-02-01","4412","Virtual Freer - SQL Injection","http://siph0n.in/exploits.php?id=4412"
94 | "siph0n","webapps","2016-02-01","4411","PHP File Manager 0.9.8 - Remote Code Execution","http://siph0n.in/exploits.php?id=4411"
95 | "siph0n","webapps","2016-01-26","4407","Design by THADV - SQL Injection","http://siph0n.in/exploits.php?id=4407"
96 | "siph0n","webapps","2016-01-26","4406","Avesta Group CMS - SQL Injection","http://siph0n.in/exploits.php?id=4406"
97 | "siph0n","webapps","2016-01-26","4405","Design by Nature Design - SQL Injection","http://siph0n.in/exploits.php?id=4405"
98 | "siph0n","webapps","2016-01-26","4404","Golestan System of Iran - Login Bypass","http://siph0n.in/exploits.php?id=4404"
99 | "siph0n","webapps","2016-01-26","4403","East Technologies Web Design - SQL Injection","http://siph0n.in/exploits.php?id=4403"
100 | "siph0n","webapps","2016-01-26","4402","Design N Host - SQL Injection","http://siph0n.in/exploits.php?id=4402"
101 | "siph0n","webapps","2016-01-26","4401","PHP TimeClock 1.04 - Blind SQL Injection","http://siph0n.in/exploits.php?id=4401"
102 | "siph0n","webapps","2016-01-26","4400","Aqua Soft - SQL Injection","http://siph0n.in/exploits.php?id=4400"
103 | "siph0n","webapps","2016-01-26","4399","Imagine Web Design - SQL Injection","http://siph0n.in/exploits.php?id=4399"
104 | "siph0n","webapps","2016-01-26","4398","GRR <= 3.0.0-RC1 - Remote Code Execution","http://siph0n.in/exploits.php?id=4398"
105 | "siph0n","webapps","2016-01-26","4397","Design by Qsite - SQL Injection","http://siph0n.in/exploits.php?id=4397"
106 | "siph0n","webapps","2016-01-26","4396","Ha-Media - SQL Injection","http://siph0n.in/exploits.php?id=4396"
107 | "siph0n","webapps","2016-01-26","4395","Advanced Electron Forum v1.0.9 - RFI/CSRF","http://siph0n.in/exploits.php?id=4395"
108 | "siph0n","webapps","2016-01-26","4394","mcart.xls Bitrix Module - SQL Injection","http://siph0n.in/exploits.php?id=4394"
109 | "siph0n","webapps","2016-01-26","4393","Powered by BIC online - SQL Injection","http://siph0n.in/exploits.php?id=4393"
110 | "siph0n","webapps","2016-01-14","4378","Dream Gallery v1.0 - SQL Injection","http://siph0n.in/exploits.php?id=4378"
111 | "siph0n","webapps","2016-01-14","4377","OpenBravo Hibernate - SQL Injection","http://siph0n.in/exploits.php?id=4377"
112 | "siph0n","webapps","2016-01-14","4376","Designed By GN - SQL Injection","http://siph0n.in/exploits.php?id=4376"
113 | "siph0n","webapps","2016-01-07","4362","Simple PHP Polling System - Multiple Vulerabilities","http://siph0n.in/exploits.php?id=4362"
114 | "siph0n","webapps","2016-01-05","4361","PHPIPAM v1.1.010 - Multiplel Vulnerabilities","http://siph0n.in/exploits.php?id=4361"
115 | "siph0n","webapps","2016-01-05","4360","Easy News Pro v1.5 - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4360"
116 | "siph0n","webapps","2016-01-05","4359","Quick Media Solution - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4359"
117 | "siph0n","webapps","2016-01-04","4353","Aitana Multimedia - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4353"
118 | "siph0n","webapps","2016-01-04","4352","Joomla 1.5.x-3.4.5 - Object Injection","http://siph0n.in/exploits.php?id=4352"
119 | "siph0n","webapps","2016-01-04","4351","Beezfud - Remote Code Execution","http://siph0n.in/exploits.php?id=4351"
120 | "siph0n","webapps","2016-01-04","4350","ScriptWeb2U - SQL Injection","http://siph0n.in/exploits.php?id=4350"
121 | "siph0n","webapps","2016-01-04","4349","Powered by ThaiWeb - SQL Injection","http://siph0n.in/exploits.php?id=4349"
122 | "siph0n","webapps","2016-01-04","4348","Design by Wisdom - SQL Injection","http://siph0n.in/exploits.php?id=4348"
123 | "siph0n","webapps","2016-01-04","4347","Digital Creations - SQL Injection","http://siph0n.in/exploits.php?id=4347"
124 | "siph0n","webapps","2016-01-04","4346","Simple Ads Manager 2.9.4.116 - SQL Injection","http://siph0n.in/exploits.php?id=4346"
125 | "siph0n","webapps","2016-01-04","4345","AllCreations - SQL Injection","http://siph0n.in/exploits.php?id=4345"
126 | "siph0n","webapps","2015-12-30","4336","phpFreeChart 1.7 - CSRF","http://siph0n.in/exploits.php?id=4336"
127 | "siph0n","webapps","2015-12-29","4333","Design by Websieutoc - SQL Injection","http://siph0n.in/exploits.php?id=4333"
128 | "siph0n","webapps","2015-12-29","4332","Magcon CMS - SQL Injection","http://siph0n.in/exploits.php?id=4332"
129 | "siph0n","webapps","2015-12-29","4331","Designed by WDD - SQL Injection","http://siph0n.in/exploits.php?id=4331"
130 | "siph0n","webapps","2015-12-24","4330","Arastta 1.1.5 - SQL Injection","http://siph0n.in/exploits.php?id=4330"
131 | "siph0n","webapps","2015-12-24","4329","Grawlix 1.0.3 - Remote Code Execution","http://siph0n.in/exploits.php?id=4329"
132 | "siph0n","webapps","2015-12-24","4328","CouchCMS 1.4.5 - Remote Code Execution","http://siph0n.in/exploits.php?id=4328"
133 | "siph0n","webapps","2015-12-22","4327","eTicket <= 1.7.3 - File Upload RCE","http://siph0n.in/exploits.php?id=4327"
134 | "siph0n","webapps","2015-12-21","4326","Netfincas - Blind SQL Injection","http://siph0n.in/exploits.php?id=4326"
135 | "siph0n","webapps","2015-12-21","4324","Exam Board v3.0.0 - Blind SQL Injection","http://siph0n.in/exploits.php?id=4324"
136 | "siph0n","webapps","2015-12-21","4323","AContent 1.3 - File Upload","http://siph0n.in/exploits.php?id=4323"
137 | "siph0n","webapps","2015-12-21","4322","Joomla - Object Injection RCE","http://siph0n.in/exploits.php?id=4322"
138 | "siph0n","webapps","2015-12-21","4321","BarodaWeb E-Catalogue - SQL Injection","http://siph0n.in/exploits.php?id=4321"
139 | "siph0n","webapps","2015-12-21","4320","Zencart 1.5.4 - Local File Inclusion","http://siph0n.in/exploits.php?id=4320"
140 | "siph0n","webapps","2015-12-21","4319","Vebka CMS - Shell Upload","http://siph0n.in/exploits.php?id=4319"
141 | "siph0n","webapps","2015-12-21","4318","Pinger - Remote Code Execution","http://siph0n.in/exploits.php?id=4318"
142 | "siph0n","webapps","2015-12-21","4317","gnCMS - Remote PHP Code Execution","http://siph0n.in/exploits.php?id=4317"
143 | "siph0n","webapps","2015-12-21","4316","SIRIUS - SQL Injection","http://siph0n.in/exploits.php?id=4316"
144 | "siph0n","webapps","2015-12-21","4315","Article Script - SQL Injection","http://siph0n.in/exploits.php?id=4315"
145 | "siph0n","webapps","2015-12-21","4314","Tequila File Hosting - Unrestricted File Upload","http://siph0n.in/exploits.php?id=4314"
146 | "siph0n","webapps","2015-12-21","4313","XRace Pro v1.0 - SQL Injection","http://siph0n.in/exploits.php?id=4313"
147 | "siph0n","webapps","2015-12-21","4312","MyBB <= 1.8.2 Reverse Shell Exploit","http://siph0n.in/exploits.php?id=4312"
148 | "siph0n","webapps","2015-12-19","4308","Lanse Host - Default Password Vulnerability","http://siph0n.in/exploits.php?id=4308"
149 | "siph0n","webapps","2015-12-15","4301","Datalife Engine 9.7 - Bindshell Exploit","http://siph0n.in/exploits.php?id=4301"
150 | "siph0n","webapps","2015-12-15","4300","Joomla - Critical Remote Code Execution","http://siph0n.in/exploits.php?id=4300"
151 | "siph0n","webapps","2015-12-15","4299","Powered by Dynamod - SQL Injection","http://siph0n.in/exploits.php?id=4299"
152 | "siph0n","webapps","2015-12-15","4298","phpwcms 1.7.9 - Code Execution","http://siph0n.in/exploits.php?id=4298"
153 | "siph0n","webapps","2015-12-15","4297","4images 1.7.11 - SQL Injection","http://siph0n.in/exploits.php?id=4297"
154 | "siph0n","webapps","2015-12-15","4296","Open Audit - SQL Injection","http://siph0n.in/exploits.php?id=4296"
155 | "siph0n","webapps","2015-12-15","4295","Cacti 0.8.8f - SQL Injection","http://siph0n.in/exploits.php?id=4295"
156 | "siph0n","webapps","2015-12-15","4294","GeekLog 2.1.0 - Command Injection","http://siph0n.in/exploits.php?id=4294"
157 | "siph0n","webapps","2015-12-14","4293","Joomla! com_mydyngallery Auto SQLi exploit","http://siph0n.in/exploits.php?id=4293"
158 | "siph0n","webapps","2015-12-09","4289","PHP Utility Belt - Remote Code Execution","http://siph0n.in/exploits.php?id=4289"
159 | "siph0n","webapps","2015-12-09","4288","Testimonials v1.0 - File Upload","http://siph0n.in/exploits.php?id=4288"
160 | "siph0n","webapps","2015-12-09","4287","SimpleBB 4.2-* - File Upload","http://siph0n.in/exploits.php?id=4287"
161 | "siph0n","webapps","2015-12-09","4286","dotCMS 3.2.4 - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4286"
162 | "siph0n","webapps","2015-12-08","4284","DMarket 1.0 - PHP Code Injection","http://siph0n.in/exploits.php?id=4284"
163 | "siph0n","webapps","2015-12-08","4283","EvolutionScript v5.0 - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4283"
164 | "siph0n","webapps","2015-12-08","4282","DZOIC ClipHouse v11.1 - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4282"
165 | "siph0n","webapps","2015-12-08","4281","GoAutoDial CE 3.3 - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4281"
166 | "siph0n","webapps","2015-12-08","4280","YaBB 2.5-2.6.11 - Cross Site Scripting","http://siph0n.in/exploits.php?id=4280"
167 | "siph0n","webapps","2015-12-08","4279","ASP Dynamika 2.5 - File Upload","http://siph0n.in/exploits.php?id=4279"
168 | "siph0n","webapps","2015-12-08","4278","ChromiumCart v0.8.1 - Arbitrary File Upload","http://siph0n.in/exploits.php?id=4278"
169 | "siph0n","webapps","2015-12-04","4268","BitsnBytes - SQL Injection","http://siph0n.in/exploits.php?id=4268"
170 | "siph0n","webapps","2015-12-02","4265","HumHub - SQL Injection","http://siph0n.in/exploits.php?id=4265"
171 | "siph0n","webapps","2015-11-30","4249","Evatis Script - SQL Injection","http://siph0n.in/exploits.php?id=4249"
172 | "siph0n","webapps","2015-11-30","4248","MyCustomers CMS - SQL Injection","http://siph0n.in/exploits.php?id=4248"
173 | "siph0n","webapps","2015-11-30","4247","Mind Wave Softwares - SQL Injection","http://siph0n.in/exploits.php?id=4247"
174 | "siph0n","webapps","2015-11-30","4246","WEBOne CMS - SQL Injection","http://siph0n.in/exploits.php?id=4246"
175 | "siph0n","webapps","2015-11-26","4243","RXTECH RXAdmin - SQL Injection","http://siph0n.in/exploits.php?id=4243"
176 | "siph0n","webapps","2015-11-26","4242","Neos/Flow - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4242"
177 | "siph0n","webapps","2015-11-26","4241","Dimofinf CMS - Automatic Cookie SQL Injection","http://siph0n.in/exploits.php?id=4241"
178 | "siph0n","webapps","2015-11-26","4240","Adox Solutions CMS - SQL Injection","http://siph0n.in/exploits.php?id=4240"
179 | "siph0n","webapps","2015-11-26","4239","re-compile CMS - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4239"
180 | "siph0n","webapps","2015-11-26","4238","Crabiz - SQL Injection","http://siph0n.in/exploits.php?id=4238"
181 | "siph0n","webapps","2015-11-23","4230","KLEMANNdesign CMS - SQL Injection","http://siph0n.in/exploits.php?id=4230"
182 | "siph0n","webapps","2015-11-23","4229","Traffic CMS v1.4.x - Local File Inclusion","http://siph0n.in/exploits.php?id=4229"
183 | "siph0n","webapps","2015-11-23","4228","Zenario CMS 7.0.7c - Remote Code Execution","http://siph0n.in/exploits.php?id=4228"
184 | "siph0n","webapps","2015-11-23","4227","PHP Address Book 8.2.5.2 - SQL Injection","http://siph0n.in/exploits.php?id=4227"
185 | "siph0n","webapps","2015-11-23","4226","Murgent CMS - SQL Injection","http://siph0n.in/exploits.php?id=4226"
186 | "siph0n","webapps","2015-11-20","4224","Web Colors CMS - SQL Injection","http://siph0n.in/exploits.php?id=4224"
187 | "siph0n","webapps","2015-11-17","4212","Pligg 2.0.2 - Code Execution","http://siph0n.in/exploits.php?id=4212"
188 | "siph0n","webapps","2015-11-17","4207","xCart 5.2.6 - Shell Upload","http://siph0n.in/exploits.php?id=4207"
189 | "siph0n","webapps","2015-11-17","4206","xCart 5.2.6 - Remote Code Execution","http://siph0n.in/exploits.php?id=4206"
190 | "siph0n","webapps","2015-11-13","4202","TheHostingTool 1.2.6 - SQL Injection","http://siph0n.in/exploits.php?id=4202"
191 | "siph0n","webapps","2015-11-13","4201","TheHostingTool 1.2.6 - Remote Code Execution","http://siph0n.in/exploits.php?id=4201"
192 | "siph0n","webapps","2015-11-13","4200","CubeCart 6.0.7 - Remote Code Execution","http://siph0n.in/exploits.php?id=4200"
193 | "siph0n","webapps","2015-11-13","4199","OPSTECH (Open Source Technology) CMS - SQL Injection","http://siph0n.in/exploits.php?id=4199"
194 | "siph0n","webapps","2015-11-13","4198","Barrieweb CMS - SQL Injection","http://siph0n.in/exploits.php?id=4198"
195 | "siph0n","webapps","2015-11-09","4189","Turkish Radyo CMS - SQL Injection","http://siph0n.in/exploits.php?id=4189"
196 | "siph0n","webapps","2015-11-06","4184","ATutor <= 2.2 - PHP Code Injection","http://siph0n.in/exploits.php?id=4184"
197 | "siph0n","webapps","2015-11-06","4183","Piwik <= 2.14.3 - PHP Object Injection","http://siph0n.in/exploits.php?id=4183"
198 | "siph0n","webapps","2015-11-02","4168","Beta Software Solutions Admin Bypass","http://siph0n.in/exploits.php?id=4168"
199 | "siph0n","webapps","2015-11-02","4164","Meridian Solutions - SQL Injection","http://siph0n.in/exploits.php?id=4164"
200 | "siph0n","webapps","2015-11-02","4163","eBay Magento - XXE Injection","http://siph0n.in/exploits.php?id=4163"
201 | "siph0n","webapps","2015-11-02","4162","Pligg CMS 2.0.2 - CSRF / Code Execution","http://siph0n.in/exploits.php?id=4162"
202 | "siph0n","webapps","2015-11-02","4161","MR Technology - Admin Bypass","http://siph0n.in/exploits.php?id=4161"
203 | "siph0n","webapps","2015-10-31","4157","toltech.it web design LFD","http://siph0n.in/exploits.php?id=4157"
204 | "siph0n","webapps","2015-10-30","4140","Oracle E-Business Suite 12.1.3 - XXE Injection","http://siph0n.in/exploits.php?id=4140"
205 | "siph0n","webapps","2015-10-28","4136","Oracle E-Business Suite 12.1.3/4 - SQL Injection","http://siph0n.in/exploits.php?id=4136"
206 | "siph0n","webapps","2015-10-28","4135","Clipbucket 2.8 - Blind SQL Injection","http://siph0n.in/exploits.php?id=4135"
207 | "siph0n","webapps","2015-10-28","4134","ArticleFR - File Read Vulnerability","http://siph0n.in/exploits.php?id=4134"
208 | "siph0n","webapps","2015-10-26","4130","SiteWIX - SQL Injection","http://siph0n.in/exploits.php?id=4130"
209 | "siph0n","webapps","2015-10-26","4129","Indian Embassy Jadon CMS - SQL Injection","http://siph0n.in/exploits.php?id=4129"
210 | "siph0n","webapps","2015-10-26","4128","Hoosk CMS - CSRF","http://siph0n.in/exploits.php?id=4128"
211 | "siph0n","webapps","2015-10-26","4127","Indian Embassy CMS - SQL Injection","http://siph0n.in/exploits.php?id=4127"
212 | "siph0n","webapps","2015-10-21","4124","RealtyScript 4.0.2 - SQL Injection","http://siph0n.in/exploits.php?id=4124"
213 | "siph0n","webapps","2015-10-21","4123","Kaboozu CMS - Shell Upload","http://siph0n.in/exploits.php?id=4123"
214 | "siph0n","webapps","2015-10-19","4119","Thailand Gov Multiple File - SQL Injection","http://siph0n.in/exploits.php?id=4119"
215 | "siph0n","webapps","2015-10-12","4113","Dream CMS 2.3.0 - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4113"
216 | "siph0n","webapps","2015-10-09","4108","Re-Compile CMS - Bypass Admin Login","http://siph0n.in/exploits.php?id=4108"
217 | "siph0n","webapps","2015-10-09","4107","TestLink 1.9.13 - SQL Injection","http://siph0n.in/exploits.php?id=4107"
218 | "siph0n","webapps","2015-10-09","4106","Polish CMS - SQL Injection","http://siph0n.in/exploits.php?id=4106"
219 | "siph0n","webapps","2015-10-06","4101","Subrion CMS 3.3.5 - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4101"
220 | "siph0n","webapps","2015-10-06","4100","PHP-Fusion 7.02.07 - Blind SQL Injection","http://siph0n.in/exploits.php?id=4100"
221 | "siph0n","webapps","2015-10-06","4099","RUOK - SQL Injection","http://siph0n.in/exploits.php?id=4099"
222 | "siph0n","webapps","2015-10-02","4094","XCOMM CMS - SQL Injection","http://siph0n.in/exploits.php?id=4094"
223 | "siph0n","webapps","2015-09-29","4083","ProjeQtor 4.5.2 - Shell Upload","http://siph0n.in/exploits.php?id=4083"
224 | "siph0n","webapps","2015-09-29","4082","VTiger CRM - Authenticated Remote Code Execution","http://siph0n.in/exploits.php?id=4082"
225 | "siph0n","webapps","2015-09-29","4081","X2Engine - Arbitrary File Upload","http://siph0n.in/exploits.php?id=4081"
226 | "siph0n","webapps","2015-09-29","4080","Centreon 2.6.1 - CSRF Add Admin Exploit","http://siph0n.in/exploits.php?id=4080"
227 | "siph0n","webapps","2015-09-29","4079","Centreon 2.6.1 - Command Injection","http://siph0n.in/exploits.php?id=4079"
228 | "siph0n","webapps","2015-09-29","4078","Centreon 2.6.1 - Unrestricted File Upload","http://siph0n.in/exploits.php?id=4078"
229 | "siph0n","webapps","2015-09-24","4073","SMF <= 2.0.10 - Remote Memory Exfiltration","http://siph0n.in/exploits.php?id=4073"
230 | "siph0n","webapps","2015-09-21","4068","iBooking CMS - SQL Injection","http://siph0n.in/exploits.php?id=4068"
231 | "siph0n","webapps","2015-09-21","4067","Farol WebApp - SQL Injection","http://siph0n.in/exploits.php?id=4067"
232 | "siph0n","webapps","2015-09-18","4065","02c cms sqli in panel","http://siph0n.in/exploits.php?id=4065"
233 | "siph0n","webapps","2015-09-18","4062","ManageEngine OpManager - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4062"
234 | "siph0n","webapps","2015-09-18","4061","ZenCart 1.5.4 - Code Execution / Information Disclosure","http://siph0n.in/exploits.php?id=4061"
235 | "siph0n","webapps","2015-09-18","4060","Kirby CMS <= 2.1.0 - CSRF / PHP Code Execution","http://siph0n.in/exploits.php?id=4060"
236 | "siph0n","webapps","2015-09-18","4059","Kirby CMS <= 2.1.0 - Authentication Bypass Via Path Traversal","http://siph0n.in/exploits.php?id=4059"
237 | "siph0n","webapps","2015-09-18","4058","ZeusCart 4.0 - Code Execution","http://siph0n.in/exploits.php?id=4058"
238 | "siph0n","webapps","2015-09-17","4056","Property Castle - SQL Injection","http://siph0n.in/exploits.php?id=4056"
239 | "siph0n","webapps","2015-09-17","4055","bkkwebs - SQL Injection","http://siph0n.in/exploits.php?id=4055"
240 | "siph0n","webapps","2015-09-15","4051","Magento <= 1.9.2 - AutoLoaded File Inclusion","http://siph0n.in/exploits.php?id=4051"
241 | "siph0n","webapps","2015-09-15","4050","Silver Peak VXOA - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4050"
242 | "siph0n","webapps","2015-09-14","4046","O2C CMS - SQL Injection Admin Bypass","http://siph0n.in/exploits.php?id=4046"
243 | "siph0n","webapps","2015-09-08","4040","Returnsoft CMS - SQL Injection","http://siph0n.in/exploits.php?id=4040"
244 | "siph0n","webapps","2015-09-07","4039","Elastix <= 2.4 - PHP Code Injection","http://siph0n.in/exploits.php?id=4039"
245 | "siph0n","webapps","2015-09-03","4032","phpWiki 1.5.4 - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4032"
246 | "siph0n","webapps","2015-09-03","4031","Ganglia Web Frontend - PHP Code Execution","http://siph0n.in/exploits.php?id=4031"
247 | "siph0n","webapps","2015-09-01","4028","IP.Board 4.x - Stored Cross Site Scripting","http://siph0n.in/exploits.php?id=4028"
248 | "siph0n","webapps","2015-09-01","4027","FHFS - FTP/HTTP File Server 2.1.2 - RCE","http://siph0n.in/exploits.php?id=4027"
249 | "siph0n","webapps","2015-09-01","4026","Pluck 4.7.3 - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4026"
250 | "siph0n","webapps","2015-09-01","4023","MediaOne CMS - SQL Injection","http://siph0n.in/exploits.php?id=4023"
251 | "siph0n","webapps","2015-08-25","4017","Alibaba Clone B2B Marketplace - Shell Upload","http://siph0n.in/exploits.php?id=4017"
252 | "siph0n","webapps","2015-08-25","4016","ResourceSpace CMS 7.3 - SQL Injection","http://siph0n.in/exploits.php?id=4016"
253 | "siph0n","webapps","2015-08-25","4015","SOFTECH Design - SQL Injection","http://siph0n.in/exploits.php?id=4015"
254 | "siph0n","webapps","2015-08-24","4014","Netsweeper 4.0.4 - SQL Injection","http://siph0n.in/exploits.php?id=4014"
255 | "siph0n","webapps","2015-08-24","4013","Netsweeper 2.6.29.8 - SQL Injection","http://siph0n.in/exploits.php?id=4013"
256 | "siph0n","webapps","2015-08-24","4011","Vifi Radio v1 - Arbitrary File Upload via CSRF","http://siph0n.in/exploits.php?id=4011"
257 | "siph0n","webapps","2015-08-21","4008","Pligg CMS - Arbitrary Code Execution","http://siph0n.in/exploits.php?id=4008"
258 | "siph0n","webapps","2015-08-19","3998","Magento CE < 1.9.0.1 - Post Auth RCE","http://siph0n.in/exploits.php?id=3998"
259 | "siph0n","webapps","2015-08-19","3997","Bolt 2.2.4 - Remote Code Execution","http://siph0n.in/exploits.php?id=3997"
260 | "siph0n","webapps","2015-08-19","3996","Webtech Design - Blind SQL Injection","http://siph0n.in/exploits.php?id=3996"
261 | "siph0n","webapps","2015-08-18","3991","vBulletin < 4.2.1 Memcache - Remote Code Execution","http://siph0n.in/exploits.php?id=3991"
262 | "siph0n","webapps","2015-08-13","3985","BizIdea Design CMS 2015Q3 - SQL Injection","http://siph0n.in/exploits.php?id=3985"
263 | "siph0n","webapps","2015-08-13","3984","CodoForum 3.3.1 - SQL Injection","http://siph0n.in/exploits.php?id=3984"
264 | "siph0n","webapps","2015-08-13","3983","BigTree CMS 4.2.3 - SQL Injection","http://siph0n.in/exploits.php?id=3983"
265 | "siph0n","webapps","2015-08-13","3982","PHPfileNavigator 2.3.3 - Privilege Escalation","http://siph0n.in/exploits.php?id=3982"
266 | "siph0n","webapps","2015-08-11","3979","MSCorp CMS - SQL Injection","http://siph0n.in/exploits.php?id=3979"
267 | "siph0n","webapps","2015-08-11","3978","Heaven Soft CMS - SQL Injection","http://siph0n.in/exploits.php?id=3978"
268 | "siph0n","webapps","2015-08-06","3972","NodCMS SQL Injection","http://siph0n.in/exploits.php?id=3972"
269 | "siph0n","webapps","2015-08-05","3971","Rubedo cms stored xss","http://siph0n.in/exploits.php?id=3971"
270 | "siph0n","webapps","2015-08-05","3970","SageFrame CMS 3.0 stored xss","http://siph0n.in/exploits.php?id=3970"
271 | "siph0n","webapps","2015-08-05","3969","PC-AXIS sql injection","http://siph0n.in/exploits.php?id=3969"
272 | "siph0n","webapps","2015-08-05","3966","GTLVote 1.1 - SQL Injection","http://siph0n.in/exploits.php?id=3966"
273 | "siph0n","webapps","2015-08-05","3965","WebStorm Web Design - SQL Injection","http://siph0n.in/exploits.php?id=3965"
274 | "siph0n","webapps","2015-08-05","3964","Ministry Web Designing - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=3964"
275 | "siph0n","webapps","2015-08-05","3963","phpFileManager 0.9.8 - Remote Code Execution","http://siph0n.in/exploits.php?id=3963"
276 | "siph0n","webapps","2015-08-05","3962","Meinestadt24 - SQL Injection","http://siph0n.in/exploits.php?id=3962"
277 | "siph0n","webapps","2015-08-05","3961","Medical Website Design - SQL Injection","http://siph0n.in/exploits.php?id=3961"
278 | "siph0n","webapps","2015-08-05","3960","Websplines CMS - SQL Injection","http://siph0n.in/exploits.php?id=3960"
279 | "siph0n","webapps","2015-08-05","3959","Thailand Gov WNT CMS - SQL Injection","http://siph0n.in/exploits.php?id=3959"
280 | "siph0n","webapps","2015-08-05","3958","Mehta Websolution CMS - SQL Injection","http://siph0n.in/exploits.php?id=3958"
281 | "siph0n","webapps","2015-08-05","3957","Inside Softwares CMS - SQL Injection","http://siph0n.in/exploits.php?id=3957"
282 | "siph0n","webapps","2015-08-05","3956","Rudram Web Technologies CMS - SQL Injection","http://siph0n.in/exploits.php?id=3956"
283 | "siph0n","webapps","2015-08-05","3955","SM Technologies CMS - SQL Injection","http://siph0n.in/exploits.php?id=3955"
284 | "siph0n","webapps","2015-08-05","3954","Newwebmotion CMS - SQL Injection","http://siph0n.in/exploits.php?id=3954"
285 | "siph0n","webapps","2015-08-05","3953","Design Infotech CMS - SQL Injection","http://siph0n.in/exploits.php?id=3953"
286 | "siph0n","webapps","2015-08-05","3952","ThaiWeb CMS 2015Q3 - SQL Injection","http://siph0n.in/exploits.php?id=3952"
287 | "siph0n","webapps","2015-07-29","3949","WAN IT CMS - SQL Injection","http://siph0n.in/exploits.php?id=3949"
288 | "siph0n","webapps","2015-07-29","3948","3KITS CMS - SQL Injection","http://siph0n.in/exploits.php?id=3948"
289 | "siph0n","webapps","2015-07-29","3947","Design Infotech CMS - SQL Injection","http://siph0n.in/exploits.php?id=3947"
290 | "siph0n","webapps","2015-07-20","3937","SM Technologies CMS - SQL Injection","http://siph0n.in/exploits.php?id=3937"
291 | "siph0n","webapps","2015-07-20","3936","Rudram Web Technologies CMS - SQL Injection","http://siph0n.in/exploits.php?id=3936"
292 | "siph0n","webapps","2015-07-20","3935","NewWebMotion CMS - SQL Injection","http://siph0n.in/exploits.php?id=3935"
293 | "siph0n","webapps","2015-07-15","3928","Websplines CMS - SQL Injection","http://siph0n.in/exploits.php?id=3928"
294 | "siph0n","webapps","2015-07-15","3927","Tosbi Technology CMS - SQL Injection","http://siph0n.in/exploits.php?id=3927"
295 | "siph0n","webapps","2015-07-15","3926","Manan Shop CMS - SQL Injection","http://siph0n.in/exploits.php?id=3926"
296 | "siph0n","webapps","2015-07-15","3925","Concept Plays CMS - SQL Injection","http://siph0n.in/exploits.php?id=3925"
297 | "siph0n","webapps","2015-07-15","3924","Aadi Infotech CMS - SQL Injection","http://siph0n.in/exploits.php?id=3924"
298 | "siph0n","webapps","2015-07-15","3923","Thailand Gov WNT CMS - SQL Injection","http://siph0n.in/exploits.php?id=3923"
299 | "siph0n","webapps","2015-07-15","3922","Mehta Websolution CMS - SQL Injection","http://siph0n.in/exploits.php?id=3922"
300 | "siph0n","webapps","2015-07-15","3921","Inside Sofwares CMS - SQL Injection","http://siph0n.in/exploits.php?id=3921"
301 | "siph0n","webapps","2015-07-14","3917","ArticleFR 3.0.6 - CSRF Add Admin Exploit","http://siph0n.in/exploits.php?id=3917"
302 | "siph0n","webapps","2015-07-14","3916","phpSQLiteCMS - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=3916"
303 | "siph0n","webapps","2015-07-14","3915","Joomla J2Store 3.1.6 - SQL Injection","http://siph0n.in/exploits.php?id=3915"
304 | "siph0n","webapps","2015-07-14","3914","Arab Portal 3 - SQL Injection","http://siph0n.in/exploits.php?id=3914"
305 | "siph0n","webapps","2015-07-09","3911","Merethis Centreon 2.5.4 - SQL Injection & RCE","http://siph0n.in/exploits.php?id=3911"
306 | "siph0n","webapps","2015-07-09","3910","GWC CMS 1.0 - SQL Injection","http://siph0n.in/exploits.php?id=3910"
307 | "siph0n","webapps","2015-06-28","3896","GeniXCMS 0.0.3 - SQL Injection","http://siph0n.in/exploits.php?id=3896"
308 | "siph0n","webapps","2015-06-28","3895","BDHOST CMS - SQL Injection","http://siph0n.in/exploits.php?id=3895"
309 | "siph0n","webapps","2015-06-28","3894","Koha 3.20.1 - Multiple SQL Injections","http://siph0n.in/exploits.php?id=3894"
310 | "siph0n","webapps","2015-06-13","3883","Concrete5 <= 5.7.4 (Access.php) - SQL Injection","http://siph0n.in/exploits.php?id=3883"
311 | "siph0n","webapps","2015-06-10","3881","ISPConfig 3.0.5.4p6 - SQL Injection / CSRF","http://siph0n.in/exploits.php?id=3881"
312 | "siph0n","webapps","2015-06-10","3880","AnimaGallery 2.6 - Local File Include","http://siph0n.in/exploits.php?id=3880"
313 | "siph0n","webapps","2015-06-10","3879","TickFa 1.x - SQL Injection","http://siph0n.in/exploits.php?id=3879"
314 | "siph0n","webapps","2015-06-10","3878","Invision Power Board <= 3.4.7 - SQL Injection","http://siph0n.in/exploits.php?id=3878"
315 | "siph0n","webapps","2015-06-10","3877","JSPAdmin 1.1 - SQL Injection","http://siph0n.in/exploits.php?id=3877"
316 | "siph0n","webapps","2015-06-10","3876","Gcon Tech Solutions v1.0 - SQL Injection","http://siph0n.in/exploits.php?id=3876"
317 | "siph0n","webapps","2015-06-03","3870","WordPress < 4.2.2 - Full Path Disclosure","http://siph0n.in/exploits.php?id=3870"
318 | "siph0n","webapps","2015-06-02","3869","Wordpress Full Path Disclosure","http://siph0n.in/exploits.php?id=3869"
319 | "siph0n","webapps","2015-05-26","3861","Gcon Tech Solutions v1.0 - SQL Injection","http://siph0n.in/exploits.php?id=3861"
320 | "siph0n","webapps","2015-05-24","3860","Newsletter 4.3 - SQL Injection","http://siph0n.in/exploits.php?id=3860"
321 | "siph0n","webapps","2015-05-22","3857","Forma LMS 1.3 - PHP Object Injection","http://siph0n.in/exploits.php?id=3857"
322 | "siph0n","webapps","2015-05-22","3856","Clickheat 1.13+ - Unauthenticated RCE","http://siph0n.in/exploits.php?id=3856"
323 | "siph0n","webapps","2015-05-20","3855","phpBugTracker 1.7.5 - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=3855"
324 | "siph0n","webapps","2015-05-20","3854","Milw0rm Clone Script - Time Based SQLi","http://siph0n.in/exploits.php?id=3854"
325 | "siph0n","webapps","2015-05-14","3851","Web India Solutions CMS - SQL Injection","http://siph0n.in/exploits.php?id=3851"
326 | "siph0n","webapps","2015-05-14","3850","Seditio CMS - SQL Injection","http://siph0n.in/exploits.php?id=3850"
327 | "siph0n","webapps","2015-05-10","3842","eFront 3.6.15 - Multiple SQL Injections","http://siph0n.in/exploits.php?id=3842"
328 | "siph0n","webapps","2015-05-10","3841","elFinder 2 - Remote Code Execution","http://siph0n.in/exploits.php?id=3841"
329 | "siph0n","webapps","2015-05-07","3829","Magento 1.9.1.0 - 1.14.1.0 - SQL Injection","http://siph0n.in/exploits.php?id=3829"
330 | "siph0n","webapps","2015-05-07","3828","vPhoto-Album v4.2 iOS - Local File Inclusion","http://siph0n.in/exploits.php?id=3828"
331 | "siph0n","webapps","2015-05-07","3827","Wordpress 4.2.1 XSS / Code Execution","http://siph0n.in/exploits.php?id=3827"
332 | "siph0n","webapps","2015-04-30","3810","Wordpress 4.2 - Cross Site Scripting","http://siph0n.in/exploits.php?id=3810"
333 | "siph0n","webapps","2015-04-30","3809","ProjectSend r561 - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=3809"
334 | "siph0n","webapps","2015-04-24","3797","Avsarsoft Matbaa - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=3797"
335 | "siph0n","webapps","2015-04-24","3796","BOSWEB CMS - SQL Injection","http://siph0n.in/exploits.php?id=3796"
336 | "siph0n","webapps","2015-04-24","3795","Open-Letters - Remote Code Injection","http://siph0n.in/exploits.php?id=3795"
337 | "siph0n","webapps","2015-04-20","3780","Laravel 4.1-5.0 - PHP Object Injection","http://siph0n.in/exploits.php?id=3780"
338 | "siph0n","webapps","2015-04-20","3779","Wolf CMS - Arbitrary File Upload","http://siph0n.in/exploits.php?id=3779"
339 | "siph0n","webapps","2015-04-17","3773","Nodes Studio CMS - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=3773"
340 | "siph0n","webapps","2015-04-14","3768","Traidnt Up v3.0 - SQL Injection","http://siph0n.in/exploits.php?id=3768"
341 | "siph0n","webapps","2015-04-14","3767","Balero CMS v0.7.2 - SQL Injection","http://siph0n.in/exploits.php?id=3767"
342 | "siph0n","webapps","2015-04-14","3765","6kbbs v8.0 - SQL Injection","http://siph0n.in/exploits.php?id=3765"
343 | "siph0n","webapps","2015-03-13","3744","FCKEditor 4.4.7.xx - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=3744"
344 | "siph0n","webapps","2015-03-11","3743","Codoforum 2.5.1 Arbitrary File Download","http://siph0n.in/exploits.php?id=3743"
345 | "siph0n","webapps","2015-03-11","3742","GeniXCMS v0.0.1 - SQL Injection","http://siph0n.in/exploits.php?id=3742"
346 | "siph0n","webapps","2015-03-11","3741","Instant v2.0 - SQL Injection","http://siph0n.in/exploits.php?id=3741"
347 | "siph0n","webapps","2015-03-11","3740","Elastix v2.x - Blind SQL Injection","http://siph0n.in/exploits.php?id=3740"
348 | "siph0n","webapps","2015-03-11","3739","WeBid 1.1.1 - Unrestricted File Upload","http://siph0n.in/exploits.php?id=3739"
349 | "siph0n","webapps","2015-03-11","3738","Webshop Hun v1.062S - SQL Injection","http://siph0n.in/exploits.php?id=3738"
350 | "siph0n","webapps","2015-03-04","3736","vBulletin vBSEO 4.x.x - Remote Code Execution","http://siph0n.in/exploits.php?id=3736"
351 | "siph0n","webapps","2015-03-04","3735","phpMoAdmin - Remote Code Execution","http://siph0n.in/exploits.php?id=3735"
352 | "siph0n","webapps","2015-03-04","3734","NetCat CMS 3.12 - Remote File Inclusion","http://siph0n.in/exploits.php?id=3734"
353 | "siph0n","webapps","2015-02-27","3728","Exploit DB : CVE Fri Feb 27 2015 : 32158 exploits","http://siph0n.in/exploits.php?id=3728"
354 | "siph0n","webapps","2015-02-27","3727","vBulletin vBSSO Single Sign-On 1.4.14 - SQL Inject","http://siph0n.in/exploits.php?id=3727"
355 | "siph0n","webapps","2015-02-27","3726","WordPress Webdorado Spider Event Calendar 1.4.9 -","http://siph0n.in/exploits.php?id=3726"
356 | "siph0n","webapps","2015-02-23","3715","MyBB 1.8.3 Multiple stored XSS","http://siph0n.in/exploits.php?id=3715"
357 | "siph0n","webapps","2015-02-23","3714","phpBugTracker v1.6.0 Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=3714"
358 | "siph0n","webapps","2015-02-23","3713","DLGuard 4.5 SQL Injection","http://siph0n.in/exploits.php?id=3713"
359 | "siph0n","webapps","2015-02-23","3707","Piwigo 2.7.3 - SQL Injection","http://siph0n.in/exploits.php?id=3707"
360 | "siph0n","webapps","2015-02-23","3706","D-Link DSL-2640B - Unauthenticated Remote DNS Chan","http://siph0n.in/exploits.php?id=3706"
361 | "siph0n","webapps","2015-02-22","3704","OpenAuto 1.6.3 Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=3704"
362 | "siph0n","webapps","2015-02-22","3703","OpenClassifieds 1.7.0.3 Chained: Captcha Bypass /","http://siph0n.in/exploits.php?id=3703"
363 | "siph0n","webapps","2015-02-22","3701","Majordomo2 - Directory Traversal (SMTP/HTTP)","http://siph0n.in/exploits.php?id=3701"
364 | "siph0n","webapps","2015-02-22","3700","Pligg 1.1.2 - Blind SQL Injection and XSS Vulnerab","http://siph0n.in/exploits.php?id=3700"
365 | "siph0n","webapps","2015-02-20","3697","WordPress Shopping Cart 3.0.4 - Unrestricted File","http://siph0n.in/exploits.php?id=3697"
366 | "siph0n","webapps","2015-02-18","3694","vBulletin 5.1.3 XSS","http://siph0n.in/exploits.php?id=3694"
367 | "siph0n","webapps","2015-02-18","3693","Pandora FMS v5.1 SP1 SQL Injection","http://siph0n.in/exploits.php?id=3693"
368 | "siph0n","webapps","2015-02-12","3689","Radexscript CMS 2.2.0 SQL Injection","http://siph0n.in/exploits.php?id=3689"
369 | "siph0n","webapps","2015-02-12","3688","u5CMS 3.9.3 Multiple SQL Injection","http://siph0n.in/exploits.php?id=3688"
370 | "siph0n","webapps","2015-02-12","3687","Chamilo LMS 1.9.8 Blind SQL Injection","http://siph0n.in/exploits.php?id=3687"
371 | "siph0n","webapps","2015-02-12","3686","Fork CMS 3.8.5 SQL Injection","http://siph0n.in/exploits.php?id=3686"
372 | "siph0n","webapps","2015-02-04","3680","Pragyan CMS 3.0 SQL Injection","http://siph0n.in/exploits.php?id=3680"
373 | "siph0n","webapps","2015-02-04","3679","My Little Forum 2.3.3 -> 1.7 XSS","http://siph0n.in/exploits.php?id=3679"
374 | "siph0n","webapps","2015-02-03","3678","Sefrengo CMS 1.6.1 SQL Injection","http://siph0n.in/exploits.php?id=3678"
375 | "siph0n","webapps","2015-02-03","3677","ZeroCMS 1.3.3 SQL Injection","http://siph0n.in/exploits.php?id=3677"
376 | "siph0n","webapps","2015-01-31","3675","RestaurantBiller Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=3675"
377 | "siph0n","webapps","2015-01-31","3674","NPDS CMS Revolution-13 SQL Injection","http://siph0n.in/exploits.php?id=3674"
378 | "siph0n","webapps","2015-01-31","3673","FerretCMS v 1.0.4 Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=3673"
379 | "siph0n","webapps","2015-01-31","3672","SmartCMS v.2 Multiple SQL Injection","http://siph0n.in/exploits.php?id=3672"
380 | "siph0n","webapps","2015-01-23","3662","Mangallam CMS SQL Injection","http://siph0n.in/exploits.php?id=3662"
381 | "siph0n","webapps","2015-01-23","3661","ArticleFR CMS 3.0.5 Arbitrary File Upload","http://siph0n.in/exploits.php?id=3661"
382 | "siph0n","webapps","2015-01-23","3660","LizardSquad DDoS Stresser Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=3660"
383 | "siph0n","webapps","2015-01-23","3659","CatBot v0.4.2 SQL Injection","http://siph0n.in/exploits.php?id=3659"
384 | "siph0n","webapps","2015-01-18","3656","Blitz CMS SQL Injection","http://siph0n.in/exploits.php?id=3656"
385 | "siph0n","webapps","2015-01-18","3655","SoftBB 0.1.3 SQL Injection","http://siph0n.in/exploits.php?id=3655"
386 | "siph0n","webapps","2015-01-10","3646","Sefrengo CMS 1.6.0 SQL Injection","http://siph0n.in/exploits.php?id=3646"
387 | "siph0n","webapps","2014-12-22","3640","PHP 5.6.3 unserialize() Execute Arbitrary Code","http://siph0n.in/exploits.php?id=3640"
388 | "siph0n","webapps","2014-12-22","3639","MiniBB 3.1 Blind SQL Injection","http://siph0n.in/exploits.php?id=3639"
389 | "siph0n","webapps","2014-12-22","3638","Piwigo 2.7.2 Cross Site Scripting / SQL Injection","http://siph0n.in/exploits.php?id=3638"
390 | "siph0n","webapps","2014-12-18","3629","vBulletin 4.2.2 ModCP CSRF","http://siph0n.in/exploits.php?id=3629"
391 | "siph0n","webapps","2014-12-18","3628","phpMyAdmin 4.x - 4.2.x DoS","http://siph0n.in/exploits.php?id=3628"
392 | "siph0n","webapps","2014-12-16","3627","MyBB 1.8.x <= 1.8.1 SQL Injection","http://siph0n.in/exploits.php?id=3627"
393 | "siph0n","webapps","2014-12-08","3621","IceHrm <= 7.1 Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=3621"
394 | "siph0n","webapps","2014-12-07","3620","CMS Made Simple (all) Remote Code Execution","http://siph0n.in/exploits.php?id=3620"
395 | "siph0n","webapps","2014-12-07","3619","PBBoard 3.0.1 CMS SQL Injection","http://siph0n.in/exploits.php?id=3619"
396 | "siph0n","webapps","2014-12-01","3614","Wordpress <= 4.0 DoS","http://siph0n.in/exploits.php?id=3614"
397 | "siph0n","webapps","2014-12-01","3613","RobotStats 1.0 (Robot Param) SQL Injection","http://siph0n.in/exploits.php?id=3613"
398 | "siph0n","webapps","2014-12-01","3612","Tuleap <= 7.6-4 PHP Object Injection","http://siph0n.in/exploits.php?id=3612"
399 | "siph0n","webapps","2014-12-01","3611","Apadana CMS SQL Injection","http://siph0n.in/exploits.php?id=3611"
400 | "siph0n","webapps","2014-12-01","3610","Pandora FMS SQLi & RCE","http://siph0n.in/exploits.php?id=3610"
401 | "siph0n","webapps","2014-11-26","3606","MyBB <= 1.8.2 unset_globals() RCE","http://siph0n.in/exploits.php?id=3606"
402 | "siph0n","webapps","2014-11-26","3603","Invision Power Board <= 3.4.7 Remote Pass Change","http://siph0n.in/exploits.php?id=3603"
403 | "siph0n","webapps","2014-11-26","3602","FluxBB 1.5.6 SQL Injection","http://siph0n.in/exploits.php?id=3602"
404 | "siph0n","webapps","2014-11-24","3601","Wordpress <= 3.9.2 XSS","http://siph0n.in/exploits.php?id=3601"
405 | "siph0n","webapps","2014-11-20","3600","Snowfox CMS 1.0 - CSRF Add Admin","http://siph0n.in/exploits.php?id=3600"
406 | "siph0n","webapps","2014-11-20","3599","Subex FMS 7.4 - Unauthenticated SQLi","http://siph0n.in/exploits.php?id=3599"
407 | "siph0n","webapps","2014-11-18","3597","PHP 5.x - Bypass disable_functions (Shellshock)","http://siph0n.in/exploits.php?id=3597"
408 | "siph0n","webapps","2014-11-17","3596","MyBB 1.8.* Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=3596"
409 | "siph0n","webapps","2014-11-17","3595","Joomla HD FLV 2.1.0.1 SQLi","http://siph0n.in/exploits.php?id=3595"
410 | "siph0n","webapps","2014-11-13","3592","Piwigo 2.6.0 SQL Injection","http://siph0n.in/exploits.php?id=3592"
411 | "siph0n","webapps","2014-11-13","3591","FUDForum 3.0.6 Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=3591"
412 | "siph0n","webapps","2014-11-13","3590","ProjectMan100 1.6.1 Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=3590"
413 | "siph0n","webapps","2014-11-11","3588","PHP-Fusion 7.02.07 SQLi","http://siph0n.in/exploits.php?id=3588"
414 | "siph0n","webapps","2014-11-10","3587","IP.Board <= 3.4.7 SQLi","http://siph0n.in/exploits.php?id=3587"
415 | "siph0n","webapps","2014-11-07","3584","select(bf) - *.x Remote SQLi 0day","http://siph0n.in/exploits.php?id=3584"
416 | "siph0n","webapps","2014-11-05","3580","PHPFusion (Search Page) DoS","http://siph0n.in/exploits.php?id=3580"
417 | "siph0n","webapps","2014-11-04","3579","Drupal Core < 7.32 Pre Auth SQLi","http://siph0n.in/exploits.php?id=3579"
418 | "siph0n","webapps","2014-11-02","3567","Drupal Core 7.x SQLi","http://siph0n.in/exploits.php?id=3567"
419 | "siph0n","webapps","2014-11-02","3566","Wordpress InfusionSoft 1.5.10 RFI","http://siph0n.in/exploits.php?id=3566"
420 | "siph0n","webapps","2014-09-09","3552","MyBB 1.6.15 - Full Path Disclosure","http://siph0n.in/exploits.php?id=3552"
421 | "siph0n","webapps","2014-07-21","1348","vBulletin 5.1.2 SQL Injection","http://siph0n.in/exploits.php?id=1348"
422 | "siph0n","webapps","2014-07-20","1346","360websec","http://siph0n.in/exploits.php?id=1346"
423 | "siph0n","webapps","2014-07-10","1326","FireEye Malware Analysis System 6.4.1 - Multiple V","http://siph0n.in/exploits.php?id=1326"
424 | "siph0n","webapps","2014-07-09","1324","Quick.Cart 6.4 & Quick.Cms 5.4 - Cross Site Script","http://siph0n.in/exploits.php?id=1324"
425 | "siph0n","webapps","2014-07-09","1316","Atom CMS Multiple Vulnerabilities SQLi/RFI","http://siph0n.in/exploits.php?id=1316"
426 | "siph0n","webapps","2014-07-09","1315","Lime Survey 2.05+ Build 140618 XSS / SQL Injection","http://siph0n.in/exploits.php?id=1315"
427 | "siph0n","webapps","2014-07-09","1314","Dolibarr CMS 3.5.3 - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=1314"
428 | "siph0n","webapps","2014-07-09","1313","Wordpress Theme PricerrTheme Shell Upload","http://siph0n.in/exploits.php?id=1313"
429 | "siph0n","webapps","2014-07-05","1308","Zermo CRM: Persistent XSS","http://siph0n.in/exploits.php?id=1308"
430 | "siph0n","webapps","2014-06-27","1301","phpBugTracker 1.5.1.1 Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=1301"
431 | "siph0n","webapps","2014-06-18","1181","PHP-Calendar 2.0.6 Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=1181"
432 | "siph0n","webapps","2014-06-10","1141","sqli 0day Epaper / Deccan Chronicle Service","http://siph0n.in/exploits.php?id=1141"
433 | "siph0n","webapps","2014-06-08","1126","E-Office System!","http://siph0n.in/exploits.php?id=1126"
434 | "siph0n","webapps","2014-06-03","1100","Discuz! 7.2 CMS- XSS + File Disclosure","http://siph0n.in/exploits.php?id=1100"
435 | "siph0n","webapps","2014-05-22","1042","Plasma http bot Unathorized account creation","http://siph0n.in/exploits.php?id=1042"
436 | "siph0n","webapps","2014-05-11","949","Tugux 2.1.1 Remote Admin Creation","http://siph0n.in/exploits.php?id=949"
437 | "siph0n","webapps","2014-05-11","948","Crime24 Stealer Panel 1.0 - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=948"
438 | "siph0n","webapps","2014-05-11","947","Photo Organizer - XSS and SQL Vulnerabilities","http://siph0n.in/exploits.php?id=947"
439 | "siph0n","webapps","2017-05-31","4983","MyBB 1.8x - File Enumeration + Mod->Admin takeover","http://siph0n.in/exploits.php?id=4983"
440 | "siph0n","webapps","2017-05-31","4982","Concrete5 CMS (8.1) - CSRF->Application-Level DoS","http://siph0n.in/exploits.php?id=4982"
441 | "siph0n","webapps","2017-05-31","4981","K-12 Alio Applicant Portal - SQL Injection","http://siph0n.in/exploits.php?id=4981"
442 | "siph0n","webapps","2017-05-17","4979","0Day IPB Forum v4.1.4.1 XSS+CSRF+FPD+Malicious Fil","http://siph0n.in/exploits.php?id=4979"
443 | "siph0n","webapps","2017-05-31","4983","MyBB 1.8x - File Enumeration + Mod->Admin takeover","http://siph0n.in/exploits.php?id=4983"
444 | "siph0n","webapps","2017-05-31","4982","Concrete5 CMS (8.1) - CSRF->Application-Level DoS","http://siph0n.in/exploits.php?id=4982"
445 |
--------------------------------------------------------------------------------