├── README.md ├── exploitoncli.php └── update ├── cxsecurity.txt ├── exploit4arab.txt ├── exploitdb.txt ├── iedb.txt ├── packetstorm.txt └── siph0n.txt /README.md: -------------------------------------------------------------------------------- 1 | ![images](https://uploaddeimagens.com.br/images/000/949/583/original/eoc.png) 2 | ExploitOnCLI BETA 3 | =============== 4 | 5 | Trying to be the best tool to search for exploits in the terminal. 6 | 7 | ExploitOnCLI or "EOC" is a tool written in PHP for Linux, designed to search for exploits in multiple exploit databases (no online search will be performed, but yes in a local file), the databases are: 8 | * Exploit-DB 9 | * PacketStormSecurity 10 | * IEDB 11 | * Siph0n 12 | * CXSecurity 13 | * Exploit4Arab 14 | 15 | The displayed results are filtered, so an "overlay" of databases can happen, depending on what(string) is being searched. 16 | 17 | 18 | In this version we have the following options: 19 | 20 | Simple Search: root@root ~ # php eoc.php --search/-s 21 | EX: root@root ~ # php eoc.php --search/-s RobotCPA 22 | 23 | simple update: root@root ~ # php eoc.php --update 24 | 25 | Update a specific database: root@root ~ # php eoc.php --update="DBS" 26 | EX: root@root ~ # php eoc.php --update=iedb 27 | EX2: root@root ~ # php eoc.php --update=iedb,packetstorm 28 | 29 | For help: root@root ~ # php eoc.php --help/-h 30 | 31 | For 'about': root@root ~ # php eoc.php --about/-a 32 | 33 | Option to download the results to the local folder: root@root ~ # php eoc.php --down/-d 34 | 35 | 36 | screenshots; 37 | ![images](https://uploaddeimagens.com.br/images/000/949/578/original/ss.png) 38 | -------------------------------------------------------------------------------- /exploitoncli.php: -------------------------------------------------------------------------------- 1 | array("NetSecL Linux", "Dragora Linux", "ArchBSD", "Ubunto Linux", "Android", "Debian Linux"), 194 | "LNG" => array("en-US", "pt-BR", "cs-CZ", "pt_PT", "ru-RU", "en-IN") 195 | ); 196 | $UA[2] = array("Firefox", "Mobile", "Opera", "Safari", "GoogleBot", "Galaxy", 197 | "SO" => array("5.1.2600", "6.0", "6.1.7601", "6.2", "6.3", "6.4"), 198 | "LNG" => array("en-US", "pt-BR", "cs-CZ", "pt_PT", "ru-RU", "en-IN") 199 | ); 200 | 201 | // Monstando o UserAgent 202 | if(rand(1,2)==1){ 203 | $USA = $UA[1][rand(0,5)]."./".rand(0,5).".".rand(0,5)." (".$UA[1]["SO"][rand(0,5)]."; ".$UA[1]["LNG"][rand(0,5)].";)"; 204 | }else{ 205 | $USA = "Mozilla/5.0 (Windows NT ".$UA[2]["SO"][rand(0,5)]."; ".$UA[2]["LNG"][rand(0,5)].") (KHTML, like Gecko) ".$UA[2][rand(0,5)]."/".rand(5,15).".".rand(10,25); 206 | } 207 | 208 | return $USA; 209 | 210 | } 211 | 212 | #################################################################### 213 | ## DATABASE UPDATE 214 | function siph0n(){ 215 | echo "\n\033[0;30m------------------------------------------------------------------------------------------------------------------------------------------------------------------------\033[0;37m\n\n \033[0;31mSIPH0N\n \033[0;30m--------------\033[0;37m\n"; 216 | $dados = array('webapps'); 217 | 218 | 219 | if(!file_exists("update".dirsep."siph0n.txt")){ 220 | echo "\n\033[0;37m Raw file not found, downloading from repository.. "; 221 | $x = getsource("https://raw.githubusercontent.com/r00tmars/ExploitOnCLI/master/update/siph0n.txt"); 222 | file_put_contents("update/siph0n.txt", $x['s']); 223 | echo "DONE!\n"; 224 | } 225 | 226 | 227 | foreach($dados as $id => $name){ // array of types 228 | echo "\n \033[0;31m$name\033[0;37m - PAGE : "; 229 | 230 | $np=1; 231 | while($np<=1000){ 232 | echo "\033[0;30m".$np."\033[0;37m"; 233 | 234 | $x = getsource("http://siph0n.in/{$name}.php?page=$np"); 235 | 236 | http_error: 237 | if($x["i"] != 200 or $x["i"] == 0){ 238 | echo "\033[0;31mRetrying...\033[0;30m[".$x["i"]."]\033[0;37m "; 239 | $x = getsource("http://siph0n.in/{$name}.php?page=$np"); 240 | goto http_error; 241 | } 242 | 243 | preg_match_all('/(.*?)<\/table>/s', $x["s"], $source); 244 | if(!isset($source[0][0])){ 245 | echo "\n [ERROR]:: An unexpected error happened\n"; 246 | break; 247 | } 248 | $sourc = explode("", $source[0][0]); 249 | unset($sourc[0]); 250 | unset($sourc[count($sourc)]); 251 | 252 | if(empty($sourc)){ break; } 253 | 254 | foreach($sourc as $code){ 255 | preg_match_all('##', $code, $date); 256 | preg_match_all('#(.*?)#i', $code, $urlEname); 257 | if(empty($urlEname[0])){ 258 | preg_match_all('#(.*?)#i', $code, $urlEname); 259 | } 260 | $x = explode('=', $urlEname[1][0]); 261 | $save[] = '"siph0n","'.$name.'","'.$date[1][0].'","'.$x[1].'","'.html_entity_decode(trim($urlEname[2][0])).'","http://siph0n.in/'.$urlEname[1][0].'"'; 262 | } 263 | 264 | foreach($save as $bla => $info){ 265 | $file = "update".dirsep."siph0n.txt"; 266 | $inf = explode("?", $info); 267 | 268 | if(!preg_match("#".$inf[0]."#si", @file_get_contents($file))){ 269 | file_put_contents($file, $info.PHP_EOL, FILE_APPEND); 270 | }else{ 271 | echo PHP_EOL; 272 | break(2); 273 | } 274 | 275 | } 276 | $save = null; 277 | echo ", "; 278 | $np++; 279 | } 280 | } 281 | } 282 | 283 | function iedb(){ 284 | echo "\n\033[0;30m------------------------------------------------------------------------------------------------------------------------------------------------------------------------\033[0;37m\n\n \033[0;31mIEDB\n \033[0;30m--------------\033[0;37m\n"; 285 | $dados = array(0 => 'remotes', 286 | 1 => 'locals', 287 | 2 => 'webapps', 288 | 3 => 'dos', 289 | 4 => 'shellcodes'); 290 | 291 | if(!file_exists("update".dirsep."iedb.txt")){ 292 | echo "\n\033[0;37m Raw file not found, downloading from repository.. "; 293 | $x = getsource("https://raw.githubusercontent.com/r00tmars/ExploitOnCLI/master/update/iedb.txt"); 294 | file_put_contents("update/iedb.txt", $x['s']); 295 | echo "DONE!\n"; 296 | } 297 | 298 | foreach($dados as $id => $name){ 299 | echo "\n \033[0;31m$name\033[0;37m - PAGE : "; 300 | 301 | $np=1; 302 | while($np<=500){ 303 | echo "\033[0;30m".$np."\033[0;37m"; 304 | 305 | $x = getsource("http://iedb.ir/{$name}.html?page=$np"); 306 | 307 | http_error: 308 | if($x["i"] != 200 or $x["i"] == 0){ 309 | echo "\033[0;31mRetrying...\033[0;30m[".$x["i"]."]\033[0;37m "; 310 | $x = getsource("http://iedb.ir/{$name}.html?page=$np"); 311 | goto http_error; 312 | } 313 | 314 | preg_match_all('/(.*?)<\/tr>/s', $x["s"], $a); 315 | 316 | if(empty($a[0])){ break; } 317 | 318 | foreach($a[0] as $code){ 319 | preg_match_all('##', $code, $date); 320 | preg_match_all('#(.*?)#i', $code, $urlEname); 321 | if(empty($urlEname[0])){ 322 | preg_match_all('#(.*?)#i', $code, $urlEname); 323 | } 324 | $id = explode("exploits-", $urlEname[1][0]); 325 | $id = explode('.html', $id[1]); 326 | $save[] = '"iedb","'.$name.'","'.$date[1][0].'","'.$id[0].'","'.html_entity_decode(trim($urlEname[2][0])).'","http://iedb.ir/'.$urlEname[1][0].'"'; 327 | } 328 | 329 | foreach($save as $bla => $info){ 330 | $file = "update".dirsep."iedb.txt"; 331 | 332 | if(!preg_match("#".$info."#si", @file_get_contents($file))){ 333 | file_put_contents($file, $info.PHP_EOL, FILE_APPEND); 334 | }else{ 335 | echo PHP_EOL; 336 | break(2); 337 | } 338 | 339 | 340 | } 341 | $save = null; 342 | echo ", "; 343 | $np++; 344 | } 345 | } 346 | } 347 | 348 | function exploitdb(){ 349 | echo "\n\033[0;30m------------------------------------------------------------------------------------------------------------------------------------------------------------------------\033[0;37m\n\n \033[0;31mEXPLOIT-DB\n \033[0;30m--------------\033[0;37m\n"; 350 | $types = array('/remote/' => 'remotes', 351 | '/webapps/' => 'webapps', 352 | '/local/' => 'locals', 353 | '/dos/' => 'dos', 354 | '/shellcode/' => 'shellcodes'); 355 | 356 | echo "\n \033[0;31mALL TYPES\033[0;37m - PAGE : \033[0;30mALL\033[0;37m\n \033[0;31m*\033[0;37m This operation may take a little longer than normal \033[0;31m*\033[0;37m\n"; 357 | 358 | 359 | $x = getsource("https://raw.githubusercontent.com/offensive-security/exploit-database/master/files.csv"); 360 | 361 | http_error: 362 | if($x["i"] != 200 or $x["i"] == 0){ 363 | echo "\033[0;31mRetrying...\033[0;30m[".$x["i"]."]\033[0;37m "; 364 | $x = getsource("https://raw.githubusercontent.com/offensive-security/exploit-database/master/files.csv"); 365 | goto http_error; 366 | } 367 | 368 | if(count(explode(PHP_EOL, $x['s'])) >= count(explode(PHP_EOL, @file_get_contents("update".dirsep."exploit-db.txt"))) or 369 | !file_exists("update".dirsep."exploit-db.txt")){ // iniciando as operações caso o arquivo não existe ou o atual no repo. no github seja "maior" 370 | 371 | @unlink("update".dirsep."exploitdb.txt"); // Apagando o arquivo velho 372 | 373 | $file = explode(PHP_EOL, $x['s']); 374 | $x = null; 375 | foreach($file as $f){ 376 | preg_match_all('#(.*?),(.*?),"(.*?)",(.*?),.*,.*,.*,.*#', $f, $data); // retirando as infos de cada linha 377 | 378 | foreach($types as $who => $why){ // procurando pelo "tipo", seja WebApps, Local, DoS/PoC, Remote, etc.. 379 | if(@preg_match("#$who#i", $data[2][0])){ 380 | $type = $why; 381 | } 382 | } 383 | if(empty($type)){ $type = ""; } 384 | 385 | if(empty($data[4][0])){ $data[4][0] = "UNAVAILABLE"; } 386 | 387 | $line = @'"exploit-db","'.$type.'","'.$data[4][0].'","'.$data[1][0].'","'.html_entity_decode(trim($data[3][0])).'","https://www.exploit-db.com/exploits/'.$data[1][0].'/"'; 388 | 389 | if(!empty($data[3][0])){ 390 | file_put_contents("update".dirsep."exploitdb.txt", $line.PHP_EOL, FILE_APPEND); 391 | } 392 | } 393 | 394 | 395 | } 396 | 397 | $x = ""; 398 | } 399 | 400 | function cxsecurity(){ 401 | echo "\n\033[0;30m------------------------------------------------------------------------------------------------------------------------------------------------------------------------\033[0;37m\n\n \033[0;31mCXSECURITY\n \033[0;30m--------------\033[0;37m\n"; 402 | $np=1; 403 | $date_break = "2500-05-16"; //gambiarra 404 | $sheit = true; 405 | 406 | if(!file_exists("update".dirsep."cxsecurity.txt")){ 407 | echo "\n\033[0;37m Raw file not found, downloading from repository.. "; 408 | $x = getsource("https://raw.githubusercontent.com/r00tmars/ExploitOnCLI/master/update/cxsecurity.txt"); 409 | file_put_contents("update/cxsecurity.txt", $x['s']); 410 | echo "DONE!\n"; 411 | } 412 | 413 | echo "\n \033[0;31mALL\033[0;37m - PAGE : "; 414 | while($np<=10000){ 415 | if($sheit==false){ break; } 416 | echo $np; 417 | 418 | $x = getsource("https://cxsecurity.com/wlb/$np"); 419 | 420 | http_error: 421 | if($x["i"] != 200 or $x["i"] == 0){ 422 | echo "\033[0;31mRetrying...\033[0;30m[".$x["i"]."]\033[0;37m "; 423 | $x = getsource("https://cxsecurity.com/wlb/$np"); 424 | goto http_error; 425 | } 426 | 427 | preg_match_all("/
(.*?)
(.*?)
(.+)<\/TABLE>/s", $x["s"], $source); // A 428 | $xpl = explode("Topic & Details", $source[0][0]); // MAIS 429 | $xpl = explode('
', $xpl[1]); // PURA 430 | $xpl = explode('
', $xpl[0]); // GAMBIARRA 431 | unset($xpl[0]); // BRASILEIRA 432 | 433 | foreach($xpl as $id => $code){ 434 | preg_match_all("/(.*?)<\/font>/i", $code, $date); 435 | preg_match_all('#
(.*?)
#', $code, $urlEname); 436 | preg_match_all('#(.*?)#', $code, $type); 437 | 438 | $dados[$date[1][0]] = array('url' => $urlEname[1], 439 | 'name' => $urlEname[2], 440 | 'type' => $type[1]); 441 | } 442 | 443 | foreach($dados as $date => $linkEname){ 444 | $a = count($linkEname["url"])-1; 445 | $nps = 0; 446 | while($nps<= $a){ 447 | if($date <= $date_break){ 448 | $sheit = true; 449 | 450 | if(!isset($linkEname["type"][$nps])){ 451 | $linkEname["type"][$nps] = "Unknown"; 452 | } 453 | $x = explode('WLB-', $linkEname["url"][$nps]); 454 | 455 | $file = "update".dirsep."cxsecurity.txt"; 456 | $info = '"cxsecurity","'.$linkEname["type"][$nps].'","'.$date.'","'.$x[1].'","'.html_entity_decode(trim($linkEname["name"][$nps])).'","'.$linkEname["url"][$nps].'"'; 457 | 458 | if(!preg_match("#".$info."#si", @file_get_contents($file))){ 459 | file_put_contents($file, $info.PHP_EOL, FILE_APPEND); 460 | }else{ 461 | echo PHP_EOL; 462 | break(3); 463 | } 464 | 465 | 466 | }else{ 467 | $sheit = false; 468 | break; 469 | } 470 | $nps++; 471 | if($sheit==false){ break; } 472 | } 473 | $date_break = $date; 474 | if($sheit==false){ break; } 475 | } 476 | 477 | $x = array(); // MAIS 478 | $dados = array(); // UMA 479 | $xpl = array(); // GAMBIARRA 480 | $linkEname = array(); // TIPICAMENTE 481 | $date = array(); // BRASILEIRA 482 | echo ", "; 483 | $np++; 484 | } 485 | } 486 | 487 | function packetstorm(){ 488 | echo "\n\033[0;30m------------------------------------------------------------------------------------------------------------------------------------------------------------------------\033[0;37m\n\n \033[0;31mPACKETSTORM\n \033[0;30m--------------\033[0;37m\n"; 489 | 490 | if(!file_exists("update".dirsep."packetstorm.txt")){ 491 | echo "\n\033[0;37m Raw file not found, downloading from repository.. "; 492 | $x = getsource("https://raw.githubusercontent.com/r00tmars/ExploitOnCLI/master/update/packetstorm.txt"); 493 | file_put_contents("update/packetstorm.txt", $x['s']); 494 | echo "DONE!\n"; 495 | } 496 | 497 | echo "\n \033[0;31mALL TYPES\033[0;37m - PAGE : "; 498 | $np=1; 499 | 500 | $types = array('local' => 'local', 501 | 'remote' => 'remote', 502 | 'denial of service' => 'dos', 503 | 'web' => 'webapps', 504 | 'shellcode' => 'shellcodes'); 505 | 506 | while($np<=10000){ 507 | echo "\033[0;30m".$np."\033[0;37m"; 508 | 509 | $x = getsource("https://packetstormsecurity.com/files/tags/exploit/page$np/"); 510 | 511 | http_error: 512 | if($x["i"] != 200 or $x["i"] == 0){ 513 | echo "\033[0;31mRetrying...\033[0;30m[".$x["i"]."]\033[0;37m "; 514 | $x = getsource("https://packetstormsecurity.com/files/tags/exploit/page$np/"); 515 | goto http_error; 516 | } 517 | 518 | if(preg_match("/

No Results Found<\/h1>/si", $x['s'])){ break; } 519 | if(preg_match("/

You Have Reached Nothingness<\/h2>/si", $x['s'])){ break; } 520 | 521 | preg_match_all("/
(.*?)<\/dl>/si", $x['s'], $code); 522 | $code = explode("/si", $c)){ // Se encontrar é porque é um exploit 531 | preg_match_all("#
(.*?)#si", $c, $title); // [1][0] 533 | preg_match_all("#/download/(.*?)/#si", $link[1][0], $id); // [1][0] 534 | preg_match_all("#Posted #si", $c, $t1pe); // [1][0] 536 | 537 | if(preg_match("#Security Advisory#si", html_entity_decode($title[1][0]))){ 538 | break; 539 | } 540 | 541 | $type=""; 542 | foreach($t1pe[1] as $sheit => $find){ 543 | foreach($types as $tF => $tP){ 544 | if(preg_match("/{$tF}/si", $find)){ 545 | $type = $tP; 546 | break; 547 | } 548 | } 549 | } 550 | if(empty($type)){ 551 | $type = "Unknown"; 552 | } 553 | 554 | 555 | $file = "update".dirsep."packetstorm.txt"; 556 | $info = '"packetstorm","'.$type.'","'.$date[1][0].'","'.$id[1][0].'","'.html_entity_decode($title[1][0]).'","https://packetstormsecurity.com'.$link[1][0].'"'; 557 | 558 | if(!preg_match("#".$info."#si", @file_get_contents($file))){ 559 | file_put_contents($file, $info.PHP_EOL, FILE_APPEND); 560 | }else{ 561 | echo PHP_EOL; 562 | break(2); 563 | } 564 | 565 | 566 | 567 | } 568 | } 569 | echo ", "; 570 | $np++; 571 | } 572 | } 573 | 574 | function exploit4arab(){ 575 | $types = array('webapps', 576 | 'rl_exploits'); 577 | 578 | echo "\n\033[0;30m------------------------------------------------------------------------------------------------------------------------------------------------------------------------\033[0;37m\n\n \033[0;31mEXPLOIT4ARAB\n \033[0;30m--------------\033[0;37m\n"; 579 | 580 | if(!file_exists("update".dirsep."exploit4arab.txt")){ 581 | echo "\n\033[0;37m Raw file not found, downloading from repository.. "; 582 | $x = getsource("https://raw.githubusercontent.com/r00tmars/ExploitOnCLI/master/update/exploit4arab.txt"); 583 | file_put_contents("update/exploit4arab.txt", $x['s']); 584 | echo "DONE!\n"; 585 | } 586 | 587 | foreach($types as $typ){ 588 | $np=1; 589 | echo "\n \033[0;31m{$typ}\033[0;37m - PAGE : "; 590 | $type = $typ; 591 | 592 | $x = getsource("http://www.exploit4arab.org/$typ/$np"); 593 | preg_match_all("#(.*?)

#si", $x["s"], $nm); 594 | if(empty($nm[1][0])){ $nm[1][0] = 10000; } 595 | 596 | while($np<=$nm[1][0]){ 597 | echo "\033[0;30m".$np."\033[0;37m"; 598 | 599 | $x = getsource("http://www.exploit4arab.org/$typ/$np"); 600 | 601 | preg_match_all("#(.*?)#si", $x["s"], $code); 602 | 603 | http_error: 604 | if($x["i"] != 200 or $x["i"] == 0){ 605 | echo "\033[0;31mRetrying...\033[0;30m[".$x["i"]."]\033[0;37m "; 606 | $x = getsource("http://www.exploit4arab.org/$typ/$np"); 607 | goto http_error; 608 | } 609 | 610 | foreach($code[1] as $c){ 611 | $d = explode("", $c); 612 | $date = trim(str_replace("#si", $c, $d); 614 | 615 | 616 | $file = "update".dirsep."exploit4arab.txt"; 617 | $info = '"exploit4arab","'.$type.'","'.$date.'","'.$d[1][0].'","'.html_entity_decode($d[2][0]).'","http://www.exploit4arab.org/exploits/'.$d[1][0].'"'; 618 | 619 | if(!preg_match("#".$info."#si", @file_get_contents($file))){ 620 | file_put_contents($file, $info.PHP_EOL, FILE_APPEND); 621 | }else{ 622 | echo PHP_EOL; 623 | break(3); 624 | } 625 | 626 | } 627 | echo ", "; 628 | $np++; 629 | } 630 | } 631 | } 632 | 633 | #################################################################### 634 | ## OUTRAS FUNÇÕES 635 | function downcode($dados){ // para download do código XPL 636 | $path = "files".dirsep.$dados[1][0].dirsep.strtolower($dados[2][0]).dirsep.$dados[4][0].".txt"; 637 | 638 | if(file_exists($path)){ // Caso o arquivo já exista 639 | goto break_is_shit; 640 | } 641 | 642 | $xpl = getsource($dados[6][0]); 643 | 644 | if($dados[1][0] == "iedb"){ // OK 645 | preg_match_all('/pre>(.+)<\/pre/s', $xpl["s"], $code); 646 | $code = html_entity_decode($code[1][0]); 647 | } 648 | 649 | if($dados[1][0] == "exploit-db"){ // OK 650 | $code = getsource("https://www.exploit-db.com/download/".$dados[4][0]); 651 | } 652 | 653 | if($dados[1][0] == "siph0n"){ // OK 654 | preg_match_all('/pre>(.+)<\/pre/s', $xpl["s"], $code); 655 | $code = html_entity_decode($code[1][0]); 656 | if(preg_match("#[email protected]', "[email protected]", $code); 659 | } 660 | } 661 | 662 | if($dados[1][0] == "cxsecurity"){ // OK 663 | preg_match_all("/(.*?)<\/samp>/si", $xpl["s"], $code); 664 | $code = htmlspecialchars_decode($code[1][0]); 665 | $code = str_replace("'", "'", $code); 666 | $code = str_replace("
", "", $code); 667 | } 668 | 669 | if($dados[1][0] == "exploit4arab"){ // OK 670 | preg_match_all("#
", "", $d[0])); 613 | preg_match_all("#.*
(.*?)
#si", $xpl['s'], $f); 671 | $code = str_replace("
", "",$f[1][0]); 672 | $code = html_entity_decode($code); 673 | } 674 | 675 | if($dados[1][0] == "packetstorm"){ // OK 676 | $code = html_entity_decode($xpl['s']); 677 | } 678 | 679 | if(!file_exists("files".dirsep.$dados[1][0])){ // DATABASE 680 | mkdir("files".dirsep.$dados[1][0]); 681 | } 682 | if(!file_exists("files".dirsep.$dados[1][0].dirsep.strtolower($dados[2][0]))){ // TYPE 683 | mkdir("files".dirsep.$dados[1][0].dirsep.strtolower($dados[2][0])); 684 | } 685 | 686 | file_put_contents($path, $code); 687 | break_is_shit: 688 | } 689 | 690 | function update($opt){ // atualizando BETA 691 | echo " \033[0;31mSTARTING UPDATE\033[0;37m\n"; 692 | 693 | if(preg_match("/,/si", trim($opt['update']))){ $sDB = explode(",", $opt["update"]); }else{ $sDB[]= $opt["update"]; } 694 | 695 | foreach($sDB as $id => $whatDB){ 696 | if(preg_match("/iedb/si", $whatDB) or empty($whatDB)) { echo iedb(); } 697 | if(preg_match("/siph0n/si", $whatDB) or empty($whatDB)) { echo siph0n(); } 698 | if(preg_match("/exploit-db/si", $whatDB) or empty($whatDB)) { echo exploitdb(); }else 699 | if(preg_match("/exploitdb/si", $whatDB) or empty($whatDB)) { echo exploitdb(); } 700 | if(preg_match("/packetstorm/si", $whatDB) or empty($whatDB)) { echo packetstorm(); } 701 | if(preg_match("/exploit4arab/si", $whatDB) or empty($whatDB)){ echo exploit4arab(); } 702 | if(preg_match("/cxsecurity/si", $whatDB) or empty($whatDB)) { echo cxsecurity(); } 703 | } 704 | 705 | echo "\n\n\033[0;31m DONE\n\n"; 706 | } 707 | 708 | function dados(){ // BETA 709 | $file = array(); 710 | $iterator = new DirectoryIterator("update"); 711 | 712 | foreach($iterator as $entry){ 713 | $var = $entry->getFilename(); 714 | 715 | $file[] = @file_get_contents("update".dirsep.$var); 716 | } 717 | 718 | 719 | foreach($file as $id => $dados_brutos){ 720 | $shit = @explode(PHP_EOL, $dados_brutos); 721 | if(count($shit)>5){ 722 | foreach($shit as $s){ 723 | preg_match_all('/"(.*?)","(.*?)","(.*?)","(.*?)","(.*?)","(.*?)"/i', $s, $d); 724 | if($s!=null){ 725 | $file[$d[5][0]] = $s; 726 | } 727 | } 728 | } 729 | } 730 | $files = null; 731 | $shit = null; 732 | 733 | $file = array_unique($file); 734 | 735 | return $file; 736 | } 737 | 738 | #################################################################### 739 | ## VALHALLA 740 | echo banner(); 741 | $down = FALSE; 742 | if(isset($opt["help"]) or isset($opt["h"])){ echo help(); } // HELP 743 | if(isset($opt["about"]) or isset($opt["a"])){ echo about(); } // ABOUT 744 | if(isset($opt["update"])){ echo update($opt); } // UPDATE 745 | if(isset($opt["s"])){ $opt["search"] = $opt["s"]; } // FIND 746 | if(isset($opt["down"]) or isset($opt["d"])){ $down = TRUE; } // ABOUT 747 | 748 | 749 | 750 | if(empty($opt["search"])){ // Se não tiver nada para pesquisar, DIE MOTHERFUCKER 751 | die(); 752 | } 753 | 754 | 755 | // INFOS 756 | echo " SEARCH TERM: \033[00;31m{$opt["search"]}\n\033[0;37m DB's: ALL\n DOWN SOURCES: "; 757 | if($down == TRUE){ echo "\033[0;31mYES\033[0;37m\n"; }else{ echo "NOT\n"; } 758 | 759 | // PEGANDO OS DADOS DOS ARQUIVOS 760 | $file = dados(); 761 | 762 | // MAIS UMA PARTE DAS INFOS 763 | echo " EXPLOITS LOADED: \033[0;31m".number_format(count($file),0,",",".")."\033[0;37m\n\n"; 764 | 765 | 766 | // GAMBIARRA PARA CABER NA TELA 767 | $pnt = ""; 768 | $nm = 31; 769 | if(strlen(getcwd())>=30){ $pnt = ".."; $nm = 29; } 770 | 771 | 772 | echo "\033[0;30m------------------------------------------------------------------------------------------------------------------------------------------------------------------------\033[0;37m 773 | TITLE \033[0;30m|\033[0;37m PATH ( ".@substr(getcwd(), 0, $nm).$pnt." )".@str_repeat(" ", $nm-strlen(getcwd()))."\033[0;30m|\033[0;37m ID \033[0;30m|\033[0;37m DATABASE 774 | \033[0;30m------------------------------------------------------------------------------------------------------------------------------------------------------------------------\033[0;37m"; 775 | 776 | 777 | $id=0; 778 | foreach($file as $trash => $f){ // FOREACH COM CADA LINHA DOS DBS 779 | preg_match_all('/"(.*?)","(.*?)","(.*?)","(.*?)","(.*?)","(.*?)"/i', $f, $dados); 780 | 781 | 782 | if(@preg_match("/".strtolower($opt["search"])."/si", strtolower($dados[5][0]))){ // Caso encontre.. 783 | $pnt = ""; 784 | $nm = 95; 785 | 786 | if(strlen($dados[5][0])>=92){ // Caso o titulo tenha mais que 92 caracteres.. 787 | $pnt = ".."; 788 | $nm = 93; 789 | } 790 | 791 | 792 | // Arrumando o TITULO 793 | $title = preg_replace("/{$opt["search"]}/si", "\033[0;31m".strtoupper($opt["search"])."\033[0;37m", 794 | @substr($dados[5][0], 0, $nm).$pnt.@str_repeat(" ", $nm-strlen($dados[5][0]))); 795 | 796 | echo " ".$title." \033[0;30m|\033[0;37m "; 797 | 798 | if($down == TRUE){ // caso a opção de download for selecionado 799 | downcode($dados); 800 | } 801 | 802 | 803 | $path = "files".dirsep.$dados[1][0].dirsep.strtolower($dados[2][0]).dirsep.$dados[4][0].".txt"; 804 | if(!file_exists($path)){ // Se o arquivo não existe, exibe o link 805 | if(preg_match("/exploit4arab/si", $dados[1][0])){ $path = "exploit4arab.org/".strtolower($dados[2][0])."/".$dados[4][0]; } 806 | if(preg_match("/packetstorm/si", $dados[1][0])){ $path = "packetstormsecurity.com/files/".$dados[4][0]."/"; } 807 | if(preg_match("/cxsecurity/si", $dados[1][0])){ $path = "cxsecurity.com/issue/WLB-".$dados[4][0]; } 808 | if(preg_match("/exploit-db/si", $dados[1][0])){ $path = "exploit-db.com/exploits/".$dados[4][0]."/"; } 809 | if(preg_match("/iedb/si", $dados[1][0])){ $path = "iedb.ir/exploits-".$dados[4][0].".html"; } 810 | if(preg_match("/siph0n/si", $dados[1][0])){ $path = "siph0n.in/exploits.php?id=".$dados[4][0]; } 811 | } 812 | 813 | echo $path.@str_repeat(" ", 39-strlen($path))." \033[0;30m|\033[0;37m "; // PATH 814 | echo $dados[4][0].@str_repeat(" ", 10-strlen($dados[4][0]))." \033[0;30m|\033[0;37m " ; // ID 815 | echo strtoupper($dados[1][0]).PHP_EOL; // DATABASE 816 | 817 | $id++; 818 | } 819 | } 820 | 821 | 822 | echo "\033[0;30m------------------------------------------------------------------------------------------------------------------------------------------------------------------------\033[0;37m 823 | \033[0;31m{$id}\033[0;37m EXPLOITS FOUND 824 | \033[0;30m------------------------------------------------------------------------------------------------------------------------------------------------------------------------\033[0;37m\n\n"; 825 | 826 | 827 | 828 | 829 | 830 | 831 | # END OF THE WORLD 832 | -------------------------------------------------------------------------------- /update/siph0n.txt: -------------------------------------------------------------------------------- 1 | "siph0n","webapps","2017-05-17","4979","0Day IPB Forum v4.1.4.1 XSS+CSRF+FPD+Malicious Fil","http://siph0n.in/exploits.php?id=4979" 2 | "siph0n","webapps","2016-12-27","4954","PHPGedView XSS","http://siph0n.in/exploits.php?id=4954" 3 | "siph0n","webapps","2016-11-14","4946","AKP Meda Design Admin Panel XSS","http://siph0n.in/exploits.php?id=4946" 4 | "siph0n","webapps","2016-11-14","4945","JMS Support Online XSS","http://siph0n.in/exploits.php?id=4945" 5 | "siph0n","webapps","2016-08-25","4916","Lepton CMS v2.2.2 - RCE","http://siph0n.in/exploits.php?id=4916" 6 | "siph0n","webapps","2016-08-25","4915","Lepton CMS v2.2.0 - RCE","http://siph0n.in/exploits.php?id=4915" 7 | "siph0n","webapps","2016-08-22","4902","Navis WebAccess - SQL Injection","http://siph0n.in/exploits.php?id=4902" 8 | "siph0n","webapps","2016-08-22","4901","HackForums FAG 2.0 - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4901" 9 | "siph0n","webapps","2016-06-24","4789","OPAC KpwinSQL - SQL Injection","http://siph0n.in/exploits.php?id=4789" 10 | "siph0n","webapps","2016-06-23","4787","YOURL's - Vulnerable.","http://siph0n.in/exploits.php?id=4787" 11 | "siph0n","webapps","2016-05-31","4741","Rein Technologies Admin Bypass","http://siph0n.in/exploits.php?id=4741" 12 | "siph0n","webapps","2016-05-25","4731","BransonSite Admin Panel Bypass","http://siph0n.in/exploits.php?id=4731" 13 | "siph0n","webapps","2016-05-14","4701","000Webhost DNS Hijacking by @CrazedSec","http://siph0n.in/exploits.php?id=4701" 14 | "siph0n","webapps","2016-05-12","4695","Desire2Learn LMS XSS","http://siph0n.in/exploits.php?id=4695" 15 | "siph0n","webapps","2016-05-09","4689","Apache Solr Vulnerability Notes","http://siph0n.in/exploits.php?id=4689" 16 | "siph0n","webapps","2016-04-29","4675","i-Tech Nepal Radio CMS - SQL Injection","http://siph0n.in/exploits.php?id=4675" 17 | "siph0n","webapps","2016-04-29","4674","3A International - SQL Injection","http://siph0n.in/exploits.php?id=4674" 18 | "siph0n","webapps","2016-04-29","4673","PHPBack v1.3.0 - SQL Injection","http://siph0n.in/exploits.php?id=4673" 19 | "siph0n","webapps","2016-04-29","4672","Powered by Zarafe CMS - SQL Injection","http://siph0n.in/exploits.php?id=4672" 20 | "siph0n","webapps","2016-04-29","4671","WebNet CMS - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4671" 21 | "siph0n","webapps","2016-04-29","4670","Website by: WebDetail - SQL Injection","http://siph0n.in/exploits.php?id=4670" 22 | "siph0n","webapps","2016-04-29","4669","Powered by ham3d - SQL Injection","http://siph0n.in/exploits.php?id=4669" 23 | "siph0n","webapps","2016-04-29","4668","OpenCart 2.2.0.0 - Remote Code Execution","http://siph0n.in/exploits.php?id=4668" 24 | "siph0n","webapps","2016-04-29","4667","WDS CMS - SQL Injection","http://siph0n.in/exploits.php?id=4667" 25 | "siph0n","webapps","2016-04-29","4666","Eight Webcom CMS 2016Q2 - SQL Injection","http://siph0n.in/exploits.php?id=4666" 26 | "siph0n","webapps","2016-04-29","4665","QuickSilver HQ VoHo Concept4E CMS 1.0 - SQL Injection","http://siph0n.in/exploits.php?id=4665" 27 | "siph0n","webapps","2016-04-29","4664","AccelSite Content Manager 1.0 - SQL Injection","http://siph0n.in/exploits.php?id=4664" 28 | "siph0n","webapps","2016-04-23","4661","PerchCMS Arbitary file upload Vulnerability","http://siph0n.in/exploits.php?id=4661" 29 | "siph0n","webapps","2016-04-12","4648","X7Chat Install vulnerabilities.","http://siph0n.in/exploits.php?id=4648" 30 | "siph0n","webapps","2016-04-09","4645","Defacing MediaCloud sites in under 60 seconds.","http://siph0n.in/exploits.php?id=4645" 31 | "siph0n","webapps","2016-04-07","4630","UAEPD Shopping Script - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4630" 32 | "siph0n","webapps","2016-04-07","4629","WebDetail - Admin Bypass","http://siph0n.in/exploits.php?id=4629" 33 | "siph0n","webapps","2016-04-07","4628","Smart Vision - Multiple Vulnerabilites","http://siph0n.in/exploits.php?id=4628" 34 | "siph0n","webapps","2016-04-07","4627","Hamayeshnegar - SQL Injection","http://siph0n.in/exploits.php?id=4627" 35 | "siph0n","webapps","2016-04-06","4625","MeshCMS 3.6 - Remote Code Execution","http://siph0n.in/exploits.php?id=4625" 36 | "siph0n","webapps","2016-04-06","4623","Cacti 0.8.8g - SQL Injection","http://siph0n.in/exploits.php?id=4623" 37 | "siph0n","webapps","2016-04-06","4622","Techsoft Web Solutions CMS 2016Q2 - SQL Injection","http://siph0n.in/exploits.php?id=4622" 38 | "siph0n","webapps","2016-04-06","4621","Edunext Technologies - SQL Injection","http://siph0n.in/exploits.php?id=4621" 39 | "siph0n","webapps","2016-04-06","4620","Hi Technology & Services CMS - SQL Injection","http://siph0n.in/exploits.php?id=4620" 40 | "siph0n","webapps","2016-04-06","4619","Datascan Information Technology - SQL Injection","http://siph0n.in/exploits.php?id=4619" 41 | "siph0n","webapps","2016-04-06","4618","Axil CMS 0.1 - Authentication Bypass","http://siph0n.in/exploits.php?id=4618" 42 | "siph0n","webapps","2016-04-06","4617","Patron Info System - SQL Injection","http://siph0n.in/exploits.php?id=4617" 43 | "siph0n","webapps","2016-04-06","4616","Cades 2016Q1 - SQL Injection","http://siph0n.in/exploits.php?id=4616" 44 | "siph0n","webapps","2016-04-06","4615","Dorsa Web CMS - SQL Injection","http://siph0n.in/exploits.php?id=4615" 45 | "siph0n","webapps","2016-04-06","4614","Easy Hosting Control Panel - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4614" 46 | "siph0n","webapps","2016-04-06","4613","CubeCart 6.0.10 - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4613" 47 | "siph0n","webapps","2016-03-24","4589","WAP Music CMS - SQL Injection","http://siph0n.in/exploits.php?id=4589" 48 | "siph0n","webapps","2016-03-24","4588","SM Soft Tech CMS - SQL Injection","http://siph0n.in/exploits.php?id=4588" 49 | "siph0n","webapps","2016-03-24","4585","Top Business Advertising - SQL Injection","http://siph0n.in/exploits.php?id=4585" 50 | "siph0n","webapps","2016-03-24","4584","Multiple CCTV-DVR Vendors - Remote Code Execution","http://siph0n.in/exploits.php?id=4584" 51 | "siph0n","webapps","2016-03-24","4583","Disc Organization System - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4583" 52 | "siph0n","webapps","2016-03-24","4582","YKQK CMS - SQL Injection","http://siph0n.in/exploits.php?id=4582" 53 | "siph0n","webapps","2016-03-21","4576","WebsiteBaker CMS 2.8.3-SP5 - SQL Injection","http://siph0n.in/exploits.php?id=4576" 54 | "siph0n","webapps","2016-03-21","4575","ZenPhoto 1.4.11 - Remote File Inclusion","http://siph0n.in/exploits.php?id=4575" 55 | "siph0n","webapps","2016-03-21","4574","ChitaSoft - SQL Injection","http://siph0n.in/exploits.php?id=4574" 56 | "siph0n","webapps","2016-03-21","4573","Elevel It CMS - SQL Injection","http://siph0n.in/exploits.php?id=4573" 57 | "siph0n","webapps","2016-03-21","4572","Hi Technology & Services - SQL Injection","http://siph0n.in/exploits.php?id=4572" 58 | "siph0n","webapps","2016-03-21","4571","Gazisoft Haber Script V5 - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4571" 59 | "siph0n","webapps","2016-03-21","4570","BURSAAJANS Company CMS - SQL Injection","http://siph0n.in/exploits.php?id=4570" 60 | "siph0n","webapps","2016-03-21","4569","iReadyWeb 1.x.x CMS - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4569" 61 | "siph0n","webapps","2016-03-19","4568","File getting Sql injection vulnerability","http://siph0n.in/exploits.php?id=4568" 62 | "siph0n","webapps","2016-03-08","4554","Ukraine Catalog Script - SQL Injection","http://siph0n.in/exploits.php?id=4554" 63 | "siph0n","webapps","2016-03-08","4553","ATutor LMS <= 2.2.1 install_modules.php - Remote Code Execution","http://siph0n.in/exploits.php?id=4553" 64 | "siph0n","webapps","2016-03-01","4543","WebSPELL 4.2.4 - CSRF / SQL Injection","http://siph0n.in/exploits.php?id=4543" 65 | "siph0n","webapps","2016-03-01","4542","Russian Hospitals CMS - SQL Injection","http://siph0n.in/exploits.php?id=4542" 66 | "siph0n","webapps","2016-03-01","4541","Chuangluo Script - SQL Injection","http://siph0n.in/exploits.php?id=4541" 67 | "siph0n","webapps","2016-03-01","4540","WeBid 1.1.2p2 - SQL Injection","http://siph0n.in/exploits.php?id=4540" 68 | "siph0n","webapps","2016-02-22","4503","BlaB! - Configuration Deletion","http://siph0n.in/exploits.php?id=4503" 69 | "siph0n","webapps","2016-02-18","4496","WebDevTown E-commerce Vulnerabilities","http://siph0n.in/exploits.php?id=4496" 70 | "siph0n","webapps","2016-02-18","4494","Gold MOVIES 1.0.2 - SQL Injection","http://siph0n.in/exploits.php?id=4494" 71 | "siph0n","webapps","2016-02-18","4493","Redaxo CMS - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4493" 72 | "siph0n","webapps","2016-02-18","4492","phpMyBackupPro 2.5 - CSRF / RCE","http://siph0n.in/exploits.php?id=4492" 73 | "siph0n","webapps","2016-02-16","4483","Digimedia Cross-Site Scripting","http://siph0n.in/exploits.php?id=4483" 74 | "siph0n","webapps","2016-02-15","4482","Yeager CMS 1.2.1 - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4482" 75 | "siph0n","webapps","2016-02-15","4481","Scomm CMS - SQL Injection","http://siph0n.in/exploits.php?id=4481" 76 | "siph0n","webapps","2016-02-15","4480","Exponent 2.3.7 - PHP Code Execution","http://siph0n.in/exploits.php?id=4480" 77 | "siph0n","webapps","2016-02-15","4479","SMEweb 1.5f - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4479" 78 | "siph0n","webapps","2016-02-09","4458","WebInfopedia Local File Disclosure","http://siph0n.in/exploits.php?id=4458" 79 | "siph0n","webapps","2016-02-08","4453","Zoom Web Media - Default Admin","http://siph0n.in/exploits.php?id=4453" 80 | "siph0n","webapps","2016-02-08","4452","RED Vision Technology - SQL Injection","http://siph0n.in/exploits.php?id=4452" 81 | "siph0n","webapps","2016-02-08","4451","Design by TNDG - SQL Injection","http://siph0n.in/exploits.php?id=4451" 82 | "siph0n","webapps","2016-02-08","4450","Designed by LEBANG.com - SQL Injection","http://siph0n.in/exploits.php?id=4450" 83 | "siph0n","webapps","2016-02-05","4441","Timeclock - Default Admin","http://siph0n.in/exploits.php?id=4441" 84 | "siph0n","webapps","2016-02-04","4434","Symphony CMS 2.6.3 - SQL Injection","http://siph0n.in/exploits.php?id=4434" 85 | "siph0n","webapps","2016-02-04","4433","UliCMS <= v9.81 - SQL Injection","http://siph0n.in/exploits.php?id=4433" 86 | "siph0n","webapps","2016-02-04","4430","Mezzanine 4.1.0 - Arbitrary File Upload","http://siph0n.in/exploits.php?id=4430" 87 | "siph0n","webapps","2016-02-01","4418","New Era Company CMS - SQL Injection","http://siph0n.in/exploits.php?id=4418" 88 | "siph0n","webapps","2016-02-01","4417","Designed by Alkawebs - SQL Injection","http://siph0n.in/exploits.php?id=4417" 89 | "siph0n","webapps","2016-02-01","4416","PicsEngine 2 Beta - SQL Injection","http://siph0n.in/exploits.php?id=4416" 90 | "siph0n","webapps","2016-02-01","4415","Design by GTUT - SQL Injection","http://siph0n.in/exploits.php?id=4415" 91 | "siph0n","webapps","2016-02-01","4414","Kleefa v1.7 (IR) - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4414" 92 | "siph0n","webapps","2016-02-01","4413","Powered By SOLUTIONS - SQL Injection","http://siph0n.in/exploits.php?id=4413" 93 | "siph0n","webapps","2016-02-01","4412","Virtual Freer - SQL Injection","http://siph0n.in/exploits.php?id=4412" 94 | "siph0n","webapps","2016-02-01","4411","PHP File Manager 0.9.8 - Remote Code Execution","http://siph0n.in/exploits.php?id=4411" 95 | "siph0n","webapps","2016-01-26","4407","Design by THADV - SQL Injection","http://siph0n.in/exploits.php?id=4407" 96 | "siph0n","webapps","2016-01-26","4406","Avesta Group CMS - SQL Injection","http://siph0n.in/exploits.php?id=4406" 97 | "siph0n","webapps","2016-01-26","4405","Design by Nature Design - SQL Injection","http://siph0n.in/exploits.php?id=4405" 98 | "siph0n","webapps","2016-01-26","4404","Golestan System of Iran - Login Bypass","http://siph0n.in/exploits.php?id=4404" 99 | "siph0n","webapps","2016-01-26","4403","East Technologies Web Design - SQL Injection","http://siph0n.in/exploits.php?id=4403" 100 | "siph0n","webapps","2016-01-26","4402","Design N Host - SQL Injection","http://siph0n.in/exploits.php?id=4402" 101 | "siph0n","webapps","2016-01-26","4401","PHP TimeClock 1.04 - Blind SQL Injection","http://siph0n.in/exploits.php?id=4401" 102 | "siph0n","webapps","2016-01-26","4400","Aqua Soft - SQL Injection","http://siph0n.in/exploits.php?id=4400" 103 | "siph0n","webapps","2016-01-26","4399","Imagine Web Design - SQL Injection","http://siph0n.in/exploits.php?id=4399" 104 | "siph0n","webapps","2016-01-26","4398","GRR <= 3.0.0-RC1 - Remote Code Execution","http://siph0n.in/exploits.php?id=4398" 105 | "siph0n","webapps","2016-01-26","4397","Design by Qsite - SQL Injection","http://siph0n.in/exploits.php?id=4397" 106 | "siph0n","webapps","2016-01-26","4396","Ha-Media - SQL Injection","http://siph0n.in/exploits.php?id=4396" 107 | "siph0n","webapps","2016-01-26","4395","Advanced Electron Forum v1.0.9 - RFI/CSRF","http://siph0n.in/exploits.php?id=4395" 108 | "siph0n","webapps","2016-01-26","4394","mcart.xls Bitrix Module - SQL Injection","http://siph0n.in/exploits.php?id=4394" 109 | "siph0n","webapps","2016-01-26","4393","Powered by BIC online - SQL Injection","http://siph0n.in/exploits.php?id=4393" 110 | "siph0n","webapps","2016-01-14","4378","Dream Gallery v1.0 - SQL Injection","http://siph0n.in/exploits.php?id=4378" 111 | "siph0n","webapps","2016-01-14","4377","OpenBravo Hibernate - SQL Injection","http://siph0n.in/exploits.php?id=4377" 112 | "siph0n","webapps","2016-01-14","4376","Designed By GN - SQL Injection","http://siph0n.in/exploits.php?id=4376" 113 | "siph0n","webapps","2016-01-07","4362","Simple PHP Polling System - Multiple Vulerabilities","http://siph0n.in/exploits.php?id=4362" 114 | "siph0n","webapps","2016-01-05","4361","PHPIPAM v1.1.010 - Multiplel Vulnerabilities","http://siph0n.in/exploits.php?id=4361" 115 | "siph0n","webapps","2016-01-05","4360","Easy News Pro v1.5 - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4360" 116 | "siph0n","webapps","2016-01-05","4359","Quick Media Solution - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4359" 117 | "siph0n","webapps","2016-01-04","4353","Aitana Multimedia - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4353" 118 | "siph0n","webapps","2016-01-04","4352","Joomla 1.5.x-3.4.5 - Object Injection","http://siph0n.in/exploits.php?id=4352" 119 | "siph0n","webapps","2016-01-04","4351","Beezfud - Remote Code Execution","http://siph0n.in/exploits.php?id=4351" 120 | "siph0n","webapps","2016-01-04","4350","ScriptWeb2U - SQL Injection","http://siph0n.in/exploits.php?id=4350" 121 | "siph0n","webapps","2016-01-04","4349","Powered by ThaiWeb - SQL Injection","http://siph0n.in/exploits.php?id=4349" 122 | "siph0n","webapps","2016-01-04","4348","Design by Wisdom - SQL Injection","http://siph0n.in/exploits.php?id=4348" 123 | "siph0n","webapps","2016-01-04","4347","Digital Creations - SQL Injection","http://siph0n.in/exploits.php?id=4347" 124 | "siph0n","webapps","2016-01-04","4346","Simple Ads Manager 2.9.4.116 - SQL Injection","http://siph0n.in/exploits.php?id=4346" 125 | "siph0n","webapps","2016-01-04","4345","AllCreations - SQL Injection","http://siph0n.in/exploits.php?id=4345" 126 | "siph0n","webapps","2015-12-30","4336","phpFreeChart 1.7 - CSRF","http://siph0n.in/exploits.php?id=4336" 127 | "siph0n","webapps","2015-12-29","4333","Design by Websieutoc - SQL Injection","http://siph0n.in/exploits.php?id=4333" 128 | "siph0n","webapps","2015-12-29","4332","Magcon CMS - SQL Injection","http://siph0n.in/exploits.php?id=4332" 129 | "siph0n","webapps","2015-12-29","4331","Designed by WDD - SQL Injection","http://siph0n.in/exploits.php?id=4331" 130 | "siph0n","webapps","2015-12-24","4330","Arastta 1.1.5 - SQL Injection","http://siph0n.in/exploits.php?id=4330" 131 | "siph0n","webapps","2015-12-24","4329","Grawlix 1.0.3 - Remote Code Execution","http://siph0n.in/exploits.php?id=4329" 132 | "siph0n","webapps","2015-12-24","4328","CouchCMS 1.4.5 - Remote Code Execution","http://siph0n.in/exploits.php?id=4328" 133 | "siph0n","webapps","2015-12-22","4327","eTicket <= 1.7.3 - File Upload RCE","http://siph0n.in/exploits.php?id=4327" 134 | "siph0n","webapps","2015-12-21","4326","Netfincas - Blind SQL Injection","http://siph0n.in/exploits.php?id=4326" 135 | "siph0n","webapps","2015-12-21","4324","Exam Board v3.0.0 - Blind SQL Injection","http://siph0n.in/exploits.php?id=4324" 136 | "siph0n","webapps","2015-12-21","4323","AContent 1.3 - File Upload","http://siph0n.in/exploits.php?id=4323" 137 | "siph0n","webapps","2015-12-21","4322","Joomla - Object Injection RCE","http://siph0n.in/exploits.php?id=4322" 138 | "siph0n","webapps","2015-12-21","4321","BarodaWeb E-Catalogue - SQL Injection","http://siph0n.in/exploits.php?id=4321" 139 | "siph0n","webapps","2015-12-21","4320","Zencart 1.5.4 - Local File Inclusion","http://siph0n.in/exploits.php?id=4320" 140 | "siph0n","webapps","2015-12-21","4319","Vebka CMS - Shell Upload","http://siph0n.in/exploits.php?id=4319" 141 | "siph0n","webapps","2015-12-21","4318","Pinger - Remote Code Execution","http://siph0n.in/exploits.php?id=4318" 142 | "siph0n","webapps","2015-12-21","4317","gnCMS - Remote PHP Code Execution","http://siph0n.in/exploits.php?id=4317" 143 | "siph0n","webapps","2015-12-21","4316","SIRIUS - SQL Injection","http://siph0n.in/exploits.php?id=4316" 144 | "siph0n","webapps","2015-12-21","4315","Article Script - SQL Injection","http://siph0n.in/exploits.php?id=4315" 145 | "siph0n","webapps","2015-12-21","4314","Tequila File Hosting - Unrestricted File Upload","http://siph0n.in/exploits.php?id=4314" 146 | "siph0n","webapps","2015-12-21","4313","XRace Pro v1.0 - SQL Injection","http://siph0n.in/exploits.php?id=4313" 147 | "siph0n","webapps","2015-12-21","4312","MyBB <= 1.8.2 Reverse Shell Exploit","http://siph0n.in/exploits.php?id=4312" 148 | "siph0n","webapps","2015-12-19","4308","Lanse Host - Default Password Vulnerability","http://siph0n.in/exploits.php?id=4308" 149 | "siph0n","webapps","2015-12-15","4301","Datalife Engine 9.7 - Bindshell Exploit","http://siph0n.in/exploits.php?id=4301" 150 | "siph0n","webapps","2015-12-15","4300","Joomla - Critical Remote Code Execution","http://siph0n.in/exploits.php?id=4300" 151 | "siph0n","webapps","2015-12-15","4299","Powered by Dynamod - SQL Injection","http://siph0n.in/exploits.php?id=4299" 152 | "siph0n","webapps","2015-12-15","4298","phpwcms 1.7.9 - Code Execution","http://siph0n.in/exploits.php?id=4298" 153 | "siph0n","webapps","2015-12-15","4297","4images 1.7.11 - SQL Injection","http://siph0n.in/exploits.php?id=4297" 154 | "siph0n","webapps","2015-12-15","4296","Open Audit - SQL Injection","http://siph0n.in/exploits.php?id=4296" 155 | "siph0n","webapps","2015-12-15","4295","Cacti 0.8.8f - SQL Injection","http://siph0n.in/exploits.php?id=4295" 156 | "siph0n","webapps","2015-12-15","4294","GeekLog 2.1.0 - Command Injection","http://siph0n.in/exploits.php?id=4294" 157 | "siph0n","webapps","2015-12-14","4293","Joomla! com_mydyngallery Auto SQLi exploit","http://siph0n.in/exploits.php?id=4293" 158 | "siph0n","webapps","2015-12-09","4289","PHP Utility Belt - Remote Code Execution","http://siph0n.in/exploits.php?id=4289" 159 | "siph0n","webapps","2015-12-09","4288","Testimonials v1.0 - File Upload","http://siph0n.in/exploits.php?id=4288" 160 | "siph0n","webapps","2015-12-09","4287","SimpleBB 4.2-* - File Upload","http://siph0n.in/exploits.php?id=4287" 161 | "siph0n","webapps","2015-12-09","4286","dotCMS 3.2.4 - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4286" 162 | "siph0n","webapps","2015-12-08","4284","DMarket 1.0 - PHP Code Injection","http://siph0n.in/exploits.php?id=4284" 163 | "siph0n","webapps","2015-12-08","4283","EvolutionScript v5.0 - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4283" 164 | "siph0n","webapps","2015-12-08","4282","DZOIC ClipHouse v11.1 - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4282" 165 | "siph0n","webapps","2015-12-08","4281","GoAutoDial CE 3.3 - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4281" 166 | "siph0n","webapps","2015-12-08","4280","YaBB 2.5-2.6.11 - Cross Site Scripting","http://siph0n.in/exploits.php?id=4280" 167 | "siph0n","webapps","2015-12-08","4279","ASP Dynamika 2.5 - File Upload","http://siph0n.in/exploits.php?id=4279" 168 | "siph0n","webapps","2015-12-08","4278","ChromiumCart v0.8.1 - Arbitrary File Upload","http://siph0n.in/exploits.php?id=4278" 169 | "siph0n","webapps","2015-12-04","4268","BitsnBytes - SQL Injection","http://siph0n.in/exploits.php?id=4268" 170 | "siph0n","webapps","2015-12-02","4265","HumHub - SQL Injection","http://siph0n.in/exploits.php?id=4265" 171 | "siph0n","webapps","2015-11-30","4249","Evatis Script - SQL Injection","http://siph0n.in/exploits.php?id=4249" 172 | "siph0n","webapps","2015-11-30","4248","MyCustomers CMS - SQL Injection","http://siph0n.in/exploits.php?id=4248" 173 | "siph0n","webapps","2015-11-30","4247","Mind Wave Softwares - SQL Injection","http://siph0n.in/exploits.php?id=4247" 174 | "siph0n","webapps","2015-11-30","4246","WEBOne CMS - SQL Injection","http://siph0n.in/exploits.php?id=4246" 175 | "siph0n","webapps","2015-11-26","4243","RXTECH RXAdmin - SQL Injection","http://siph0n.in/exploits.php?id=4243" 176 | "siph0n","webapps","2015-11-26","4242","Neos/Flow - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4242" 177 | "siph0n","webapps","2015-11-26","4241","Dimofinf CMS - Automatic Cookie SQL Injection","http://siph0n.in/exploits.php?id=4241" 178 | "siph0n","webapps","2015-11-26","4240","Adox Solutions CMS - SQL Injection","http://siph0n.in/exploits.php?id=4240" 179 | "siph0n","webapps","2015-11-26","4239","re-compile CMS - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4239" 180 | "siph0n","webapps","2015-11-26","4238","Crabiz - SQL Injection","http://siph0n.in/exploits.php?id=4238" 181 | "siph0n","webapps","2015-11-23","4230","KLEMANNdesign CMS - SQL Injection","http://siph0n.in/exploits.php?id=4230" 182 | "siph0n","webapps","2015-11-23","4229","Traffic CMS v1.4.x - Local File Inclusion","http://siph0n.in/exploits.php?id=4229" 183 | "siph0n","webapps","2015-11-23","4228","Zenario CMS 7.0.7c - Remote Code Execution","http://siph0n.in/exploits.php?id=4228" 184 | "siph0n","webapps","2015-11-23","4227","PHP Address Book 8.2.5.2 - SQL Injection","http://siph0n.in/exploits.php?id=4227" 185 | "siph0n","webapps","2015-11-23","4226","Murgent CMS - SQL Injection","http://siph0n.in/exploits.php?id=4226" 186 | "siph0n","webapps","2015-11-20","4224","Web Colors CMS - SQL Injection","http://siph0n.in/exploits.php?id=4224" 187 | "siph0n","webapps","2015-11-17","4212","Pligg 2.0.2 - Code Execution","http://siph0n.in/exploits.php?id=4212" 188 | "siph0n","webapps","2015-11-17","4207","xCart 5.2.6 - Shell Upload","http://siph0n.in/exploits.php?id=4207" 189 | "siph0n","webapps","2015-11-17","4206","xCart 5.2.6 - Remote Code Execution","http://siph0n.in/exploits.php?id=4206" 190 | "siph0n","webapps","2015-11-13","4202","TheHostingTool 1.2.6 - SQL Injection","http://siph0n.in/exploits.php?id=4202" 191 | "siph0n","webapps","2015-11-13","4201","TheHostingTool 1.2.6 - Remote Code Execution","http://siph0n.in/exploits.php?id=4201" 192 | "siph0n","webapps","2015-11-13","4200","CubeCart 6.0.7 - Remote Code Execution","http://siph0n.in/exploits.php?id=4200" 193 | "siph0n","webapps","2015-11-13","4199","OPSTECH (Open Source Technology) CMS - SQL Injection","http://siph0n.in/exploits.php?id=4199" 194 | "siph0n","webapps","2015-11-13","4198","Barrieweb CMS - SQL Injection","http://siph0n.in/exploits.php?id=4198" 195 | "siph0n","webapps","2015-11-09","4189","Turkish Radyo CMS - SQL Injection","http://siph0n.in/exploits.php?id=4189" 196 | "siph0n","webapps","2015-11-06","4184","ATutor <= 2.2 - PHP Code Injection","http://siph0n.in/exploits.php?id=4184" 197 | "siph0n","webapps","2015-11-06","4183","Piwik <= 2.14.3 - PHP Object Injection","http://siph0n.in/exploits.php?id=4183" 198 | "siph0n","webapps","2015-11-02","4168","Beta Software Solutions Admin Bypass","http://siph0n.in/exploits.php?id=4168" 199 | "siph0n","webapps","2015-11-02","4164","Meridian Solutions - SQL Injection","http://siph0n.in/exploits.php?id=4164" 200 | "siph0n","webapps","2015-11-02","4163","eBay Magento - XXE Injection","http://siph0n.in/exploits.php?id=4163" 201 | "siph0n","webapps","2015-11-02","4162","Pligg CMS 2.0.2 - CSRF / Code Execution","http://siph0n.in/exploits.php?id=4162" 202 | "siph0n","webapps","2015-11-02","4161","MR Technology - Admin Bypass","http://siph0n.in/exploits.php?id=4161" 203 | "siph0n","webapps","2015-10-31","4157","toltech.it web design LFD","http://siph0n.in/exploits.php?id=4157" 204 | "siph0n","webapps","2015-10-30","4140","Oracle E-Business Suite 12.1.3 - XXE Injection","http://siph0n.in/exploits.php?id=4140" 205 | "siph0n","webapps","2015-10-28","4136","Oracle E-Business Suite 12.1.3/4 - SQL Injection","http://siph0n.in/exploits.php?id=4136" 206 | "siph0n","webapps","2015-10-28","4135","Clipbucket 2.8 - Blind SQL Injection","http://siph0n.in/exploits.php?id=4135" 207 | "siph0n","webapps","2015-10-28","4134","ArticleFR - File Read Vulnerability","http://siph0n.in/exploits.php?id=4134" 208 | "siph0n","webapps","2015-10-26","4130","SiteWIX - SQL Injection","http://siph0n.in/exploits.php?id=4130" 209 | "siph0n","webapps","2015-10-26","4129","Indian Embassy Jadon CMS - SQL Injection","http://siph0n.in/exploits.php?id=4129" 210 | "siph0n","webapps","2015-10-26","4128","Hoosk CMS - CSRF","http://siph0n.in/exploits.php?id=4128" 211 | "siph0n","webapps","2015-10-26","4127","Indian Embassy CMS - SQL Injection","http://siph0n.in/exploits.php?id=4127" 212 | "siph0n","webapps","2015-10-21","4124","RealtyScript 4.0.2 - SQL Injection","http://siph0n.in/exploits.php?id=4124" 213 | "siph0n","webapps","2015-10-21","4123","Kaboozu CMS - Shell Upload","http://siph0n.in/exploits.php?id=4123" 214 | "siph0n","webapps","2015-10-19","4119","Thailand Gov Multiple File - SQL Injection","http://siph0n.in/exploits.php?id=4119" 215 | "siph0n","webapps","2015-10-12","4113","Dream CMS 2.3.0 - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4113" 216 | "siph0n","webapps","2015-10-09","4108","Re-Compile CMS - Bypass Admin Login","http://siph0n.in/exploits.php?id=4108" 217 | "siph0n","webapps","2015-10-09","4107","TestLink 1.9.13 - SQL Injection","http://siph0n.in/exploits.php?id=4107" 218 | "siph0n","webapps","2015-10-09","4106","Polish CMS - SQL Injection","http://siph0n.in/exploits.php?id=4106" 219 | "siph0n","webapps","2015-10-06","4101","Subrion CMS 3.3.5 - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4101" 220 | "siph0n","webapps","2015-10-06","4100","PHP-Fusion 7.02.07 - Blind SQL Injection","http://siph0n.in/exploits.php?id=4100" 221 | "siph0n","webapps","2015-10-06","4099","RUOK - SQL Injection","http://siph0n.in/exploits.php?id=4099" 222 | "siph0n","webapps","2015-10-02","4094","XCOMM CMS - SQL Injection","http://siph0n.in/exploits.php?id=4094" 223 | "siph0n","webapps","2015-09-29","4083","ProjeQtor 4.5.2 - Shell Upload","http://siph0n.in/exploits.php?id=4083" 224 | "siph0n","webapps","2015-09-29","4082","VTiger CRM - Authenticated Remote Code Execution","http://siph0n.in/exploits.php?id=4082" 225 | "siph0n","webapps","2015-09-29","4081","X2Engine - Arbitrary File Upload","http://siph0n.in/exploits.php?id=4081" 226 | "siph0n","webapps","2015-09-29","4080","Centreon 2.6.1 - CSRF Add Admin Exploit","http://siph0n.in/exploits.php?id=4080" 227 | "siph0n","webapps","2015-09-29","4079","Centreon 2.6.1 - Command Injection","http://siph0n.in/exploits.php?id=4079" 228 | "siph0n","webapps","2015-09-29","4078","Centreon 2.6.1 - Unrestricted File Upload","http://siph0n.in/exploits.php?id=4078" 229 | "siph0n","webapps","2015-09-24","4073","SMF <= 2.0.10 - Remote Memory Exfiltration","http://siph0n.in/exploits.php?id=4073" 230 | "siph0n","webapps","2015-09-21","4068","iBooking CMS - SQL Injection","http://siph0n.in/exploits.php?id=4068" 231 | "siph0n","webapps","2015-09-21","4067","Farol WebApp - SQL Injection","http://siph0n.in/exploits.php?id=4067" 232 | "siph0n","webapps","2015-09-18","4065","02c cms sqli in panel","http://siph0n.in/exploits.php?id=4065" 233 | "siph0n","webapps","2015-09-18","4062","ManageEngine OpManager - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4062" 234 | "siph0n","webapps","2015-09-18","4061","ZenCart 1.5.4 - Code Execution / Information Disclosure","http://siph0n.in/exploits.php?id=4061" 235 | "siph0n","webapps","2015-09-18","4060","Kirby CMS <= 2.1.0 - CSRF / PHP Code Execution","http://siph0n.in/exploits.php?id=4060" 236 | "siph0n","webapps","2015-09-18","4059","Kirby CMS <= 2.1.0 - Authentication Bypass Via Path Traversal","http://siph0n.in/exploits.php?id=4059" 237 | "siph0n","webapps","2015-09-18","4058","ZeusCart 4.0 - Code Execution","http://siph0n.in/exploits.php?id=4058" 238 | "siph0n","webapps","2015-09-17","4056","Property Castle - SQL Injection","http://siph0n.in/exploits.php?id=4056" 239 | "siph0n","webapps","2015-09-17","4055","bkkwebs - SQL Injection","http://siph0n.in/exploits.php?id=4055" 240 | "siph0n","webapps","2015-09-15","4051","Magento <= 1.9.2 - AutoLoaded File Inclusion","http://siph0n.in/exploits.php?id=4051" 241 | "siph0n","webapps","2015-09-15","4050","Silver Peak VXOA - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4050" 242 | "siph0n","webapps","2015-09-14","4046","O2C CMS - SQL Injection Admin Bypass","http://siph0n.in/exploits.php?id=4046" 243 | "siph0n","webapps","2015-09-08","4040","Returnsoft CMS - SQL Injection","http://siph0n.in/exploits.php?id=4040" 244 | "siph0n","webapps","2015-09-07","4039","Elastix <= 2.4 - PHP Code Injection","http://siph0n.in/exploits.php?id=4039" 245 | "siph0n","webapps","2015-09-03","4032","phpWiki 1.5.4 - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4032" 246 | "siph0n","webapps","2015-09-03","4031","Ganglia Web Frontend - PHP Code Execution","http://siph0n.in/exploits.php?id=4031" 247 | "siph0n","webapps","2015-09-01","4028","IP.Board 4.x - Stored Cross Site Scripting","http://siph0n.in/exploits.php?id=4028" 248 | "siph0n","webapps","2015-09-01","4027","FHFS - FTP/HTTP File Server 2.1.2 - RCE","http://siph0n.in/exploits.php?id=4027" 249 | "siph0n","webapps","2015-09-01","4026","Pluck 4.7.3 - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=4026" 250 | "siph0n","webapps","2015-09-01","4023","MediaOne CMS - SQL Injection","http://siph0n.in/exploits.php?id=4023" 251 | "siph0n","webapps","2015-08-25","4017","Alibaba Clone B2B Marketplace - Shell Upload","http://siph0n.in/exploits.php?id=4017" 252 | "siph0n","webapps","2015-08-25","4016","ResourceSpace CMS 7.3 - SQL Injection","http://siph0n.in/exploits.php?id=4016" 253 | "siph0n","webapps","2015-08-25","4015","SOFTECH Design - SQL Injection","http://siph0n.in/exploits.php?id=4015" 254 | "siph0n","webapps","2015-08-24","4014","Netsweeper 4.0.4 - SQL Injection","http://siph0n.in/exploits.php?id=4014" 255 | "siph0n","webapps","2015-08-24","4013","Netsweeper 2.6.29.8 - SQL Injection","http://siph0n.in/exploits.php?id=4013" 256 | "siph0n","webapps","2015-08-24","4011","Vifi Radio v1 - Arbitrary File Upload via CSRF","http://siph0n.in/exploits.php?id=4011" 257 | "siph0n","webapps","2015-08-21","4008","Pligg CMS - Arbitrary Code Execution","http://siph0n.in/exploits.php?id=4008" 258 | "siph0n","webapps","2015-08-19","3998","Magento CE < 1.9.0.1 - Post Auth RCE","http://siph0n.in/exploits.php?id=3998" 259 | "siph0n","webapps","2015-08-19","3997","Bolt 2.2.4 - Remote Code Execution","http://siph0n.in/exploits.php?id=3997" 260 | "siph0n","webapps","2015-08-19","3996","Webtech Design - Blind SQL Injection","http://siph0n.in/exploits.php?id=3996" 261 | "siph0n","webapps","2015-08-18","3991","vBulletin < 4.2.1 Memcache - Remote Code Execution","http://siph0n.in/exploits.php?id=3991" 262 | "siph0n","webapps","2015-08-13","3985","BizIdea Design CMS 2015Q3 - SQL Injection","http://siph0n.in/exploits.php?id=3985" 263 | "siph0n","webapps","2015-08-13","3984","CodoForum 3.3.1 - SQL Injection","http://siph0n.in/exploits.php?id=3984" 264 | "siph0n","webapps","2015-08-13","3983","BigTree CMS 4.2.3 - SQL Injection","http://siph0n.in/exploits.php?id=3983" 265 | "siph0n","webapps","2015-08-13","3982","PHPfileNavigator 2.3.3 - Privilege Escalation","http://siph0n.in/exploits.php?id=3982" 266 | "siph0n","webapps","2015-08-11","3979","MSCorp CMS - SQL Injection","http://siph0n.in/exploits.php?id=3979" 267 | "siph0n","webapps","2015-08-11","3978","Heaven Soft CMS - SQL Injection","http://siph0n.in/exploits.php?id=3978" 268 | "siph0n","webapps","2015-08-06","3972","NodCMS SQL Injection","http://siph0n.in/exploits.php?id=3972" 269 | "siph0n","webapps","2015-08-05","3971","Rubedo cms stored xss","http://siph0n.in/exploits.php?id=3971" 270 | "siph0n","webapps","2015-08-05","3970","SageFrame CMS 3.0 stored xss","http://siph0n.in/exploits.php?id=3970" 271 | "siph0n","webapps","2015-08-05","3969","PC-AXIS sql injection","http://siph0n.in/exploits.php?id=3969" 272 | "siph0n","webapps","2015-08-05","3966","GTLVote 1.1 - SQL Injection","http://siph0n.in/exploits.php?id=3966" 273 | "siph0n","webapps","2015-08-05","3965","WebStorm Web Design - SQL Injection","http://siph0n.in/exploits.php?id=3965" 274 | "siph0n","webapps","2015-08-05","3964","Ministry Web Designing - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=3964" 275 | "siph0n","webapps","2015-08-05","3963","phpFileManager 0.9.8 - Remote Code Execution","http://siph0n.in/exploits.php?id=3963" 276 | "siph0n","webapps","2015-08-05","3962","Meinestadt24 - SQL Injection","http://siph0n.in/exploits.php?id=3962" 277 | "siph0n","webapps","2015-08-05","3961","Medical Website Design - SQL Injection","http://siph0n.in/exploits.php?id=3961" 278 | "siph0n","webapps","2015-08-05","3960","Websplines CMS - SQL Injection","http://siph0n.in/exploits.php?id=3960" 279 | "siph0n","webapps","2015-08-05","3959","Thailand Gov WNT CMS - SQL Injection","http://siph0n.in/exploits.php?id=3959" 280 | "siph0n","webapps","2015-08-05","3958","Mehta Websolution CMS - SQL Injection","http://siph0n.in/exploits.php?id=3958" 281 | "siph0n","webapps","2015-08-05","3957","Inside Softwares CMS - SQL Injection","http://siph0n.in/exploits.php?id=3957" 282 | "siph0n","webapps","2015-08-05","3956","Rudram Web Technologies CMS - SQL Injection","http://siph0n.in/exploits.php?id=3956" 283 | "siph0n","webapps","2015-08-05","3955","SM Technologies CMS - SQL Injection","http://siph0n.in/exploits.php?id=3955" 284 | "siph0n","webapps","2015-08-05","3954","Newwebmotion CMS - SQL Injection","http://siph0n.in/exploits.php?id=3954" 285 | "siph0n","webapps","2015-08-05","3953","Design Infotech CMS - SQL Injection","http://siph0n.in/exploits.php?id=3953" 286 | "siph0n","webapps","2015-08-05","3952","ThaiWeb CMS 2015Q3 - SQL Injection","http://siph0n.in/exploits.php?id=3952" 287 | "siph0n","webapps","2015-07-29","3949","WAN IT CMS - SQL Injection","http://siph0n.in/exploits.php?id=3949" 288 | "siph0n","webapps","2015-07-29","3948","3KITS CMS - SQL Injection","http://siph0n.in/exploits.php?id=3948" 289 | "siph0n","webapps","2015-07-29","3947","Design Infotech CMS - SQL Injection","http://siph0n.in/exploits.php?id=3947" 290 | "siph0n","webapps","2015-07-20","3937","SM Technologies CMS - SQL Injection","http://siph0n.in/exploits.php?id=3937" 291 | "siph0n","webapps","2015-07-20","3936","Rudram Web Technologies CMS - SQL Injection","http://siph0n.in/exploits.php?id=3936" 292 | "siph0n","webapps","2015-07-20","3935","NewWebMotion CMS - SQL Injection","http://siph0n.in/exploits.php?id=3935" 293 | "siph0n","webapps","2015-07-15","3928","Websplines CMS - SQL Injection","http://siph0n.in/exploits.php?id=3928" 294 | "siph0n","webapps","2015-07-15","3927","Tosbi Technology CMS - SQL Injection","http://siph0n.in/exploits.php?id=3927" 295 | "siph0n","webapps","2015-07-15","3926","Manan Shop CMS - SQL Injection","http://siph0n.in/exploits.php?id=3926" 296 | "siph0n","webapps","2015-07-15","3925","Concept Plays CMS - SQL Injection","http://siph0n.in/exploits.php?id=3925" 297 | "siph0n","webapps","2015-07-15","3924","Aadi Infotech CMS - SQL Injection","http://siph0n.in/exploits.php?id=3924" 298 | "siph0n","webapps","2015-07-15","3923","Thailand Gov WNT CMS - SQL Injection","http://siph0n.in/exploits.php?id=3923" 299 | "siph0n","webapps","2015-07-15","3922","Mehta Websolution CMS - SQL Injection","http://siph0n.in/exploits.php?id=3922" 300 | "siph0n","webapps","2015-07-15","3921","Inside Sofwares CMS - SQL Injection","http://siph0n.in/exploits.php?id=3921" 301 | "siph0n","webapps","2015-07-14","3917","ArticleFR 3.0.6 - CSRF Add Admin Exploit","http://siph0n.in/exploits.php?id=3917" 302 | "siph0n","webapps","2015-07-14","3916","phpSQLiteCMS - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=3916" 303 | "siph0n","webapps","2015-07-14","3915","Joomla J2Store 3.1.6 - SQL Injection","http://siph0n.in/exploits.php?id=3915" 304 | "siph0n","webapps","2015-07-14","3914","Arab Portal 3 - SQL Injection","http://siph0n.in/exploits.php?id=3914" 305 | "siph0n","webapps","2015-07-09","3911","Merethis Centreon 2.5.4 - SQL Injection & RCE","http://siph0n.in/exploits.php?id=3911" 306 | "siph0n","webapps","2015-07-09","3910","GWC CMS 1.0 - SQL Injection","http://siph0n.in/exploits.php?id=3910" 307 | "siph0n","webapps","2015-06-28","3896","GeniXCMS 0.0.3 - SQL Injection","http://siph0n.in/exploits.php?id=3896" 308 | "siph0n","webapps","2015-06-28","3895","BDHOST CMS - SQL Injection","http://siph0n.in/exploits.php?id=3895" 309 | "siph0n","webapps","2015-06-28","3894","Koha 3.20.1 - Multiple SQL Injections","http://siph0n.in/exploits.php?id=3894" 310 | "siph0n","webapps","2015-06-13","3883","Concrete5 <= 5.7.4 (Access.php) - SQL Injection","http://siph0n.in/exploits.php?id=3883" 311 | "siph0n","webapps","2015-06-10","3881","ISPConfig 3.0.5.4p6 - SQL Injection / CSRF","http://siph0n.in/exploits.php?id=3881" 312 | "siph0n","webapps","2015-06-10","3880","AnimaGallery 2.6 - Local File Include","http://siph0n.in/exploits.php?id=3880" 313 | "siph0n","webapps","2015-06-10","3879","TickFa 1.x - SQL Injection","http://siph0n.in/exploits.php?id=3879" 314 | "siph0n","webapps","2015-06-10","3878","Invision Power Board <= 3.4.7 - SQL Injection","http://siph0n.in/exploits.php?id=3878" 315 | "siph0n","webapps","2015-06-10","3877","JSPAdmin 1.1 - SQL Injection","http://siph0n.in/exploits.php?id=3877" 316 | "siph0n","webapps","2015-06-10","3876","Gcon Tech Solutions v1.0 - SQL Injection","http://siph0n.in/exploits.php?id=3876" 317 | "siph0n","webapps","2015-06-03","3870","WordPress < 4.2.2 - Full Path Disclosure","http://siph0n.in/exploits.php?id=3870" 318 | "siph0n","webapps","2015-06-02","3869","Wordpress Full Path Disclosure","http://siph0n.in/exploits.php?id=3869" 319 | "siph0n","webapps","2015-05-26","3861","Gcon Tech Solutions v1.0 - SQL Injection","http://siph0n.in/exploits.php?id=3861" 320 | "siph0n","webapps","2015-05-24","3860","Newsletter 4.3 - SQL Injection","http://siph0n.in/exploits.php?id=3860" 321 | "siph0n","webapps","2015-05-22","3857","Forma LMS 1.3 - PHP Object Injection","http://siph0n.in/exploits.php?id=3857" 322 | "siph0n","webapps","2015-05-22","3856","Clickheat 1.13+ - Unauthenticated RCE","http://siph0n.in/exploits.php?id=3856" 323 | "siph0n","webapps","2015-05-20","3855","phpBugTracker 1.7.5 - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=3855" 324 | "siph0n","webapps","2015-05-20","3854","Milw0rm Clone Script - Time Based SQLi","http://siph0n.in/exploits.php?id=3854" 325 | "siph0n","webapps","2015-05-14","3851","Web India Solutions CMS - SQL Injection","http://siph0n.in/exploits.php?id=3851" 326 | "siph0n","webapps","2015-05-14","3850","Seditio CMS - SQL Injection","http://siph0n.in/exploits.php?id=3850" 327 | "siph0n","webapps","2015-05-10","3842","eFront 3.6.15 - Multiple SQL Injections","http://siph0n.in/exploits.php?id=3842" 328 | "siph0n","webapps","2015-05-10","3841","elFinder 2 - Remote Code Execution","http://siph0n.in/exploits.php?id=3841" 329 | "siph0n","webapps","2015-05-07","3829","Magento 1.9.1.0 - 1.14.1.0 - SQL Injection","http://siph0n.in/exploits.php?id=3829" 330 | "siph0n","webapps","2015-05-07","3828","vPhoto-Album v4.2 iOS - Local File Inclusion","http://siph0n.in/exploits.php?id=3828" 331 | "siph0n","webapps","2015-05-07","3827","Wordpress 4.2.1 XSS / Code Execution","http://siph0n.in/exploits.php?id=3827" 332 | "siph0n","webapps","2015-04-30","3810","Wordpress 4.2 - Cross Site Scripting","http://siph0n.in/exploits.php?id=3810" 333 | "siph0n","webapps","2015-04-30","3809","ProjectSend r561 - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=3809" 334 | "siph0n","webapps","2015-04-24","3797","Avsarsoft Matbaa - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=3797" 335 | "siph0n","webapps","2015-04-24","3796","BOSWEB CMS - SQL Injection","http://siph0n.in/exploits.php?id=3796" 336 | "siph0n","webapps","2015-04-24","3795","Open-Letters - Remote Code Injection","http://siph0n.in/exploits.php?id=3795" 337 | "siph0n","webapps","2015-04-20","3780","Laravel 4.1-5.0 - PHP Object Injection","http://siph0n.in/exploits.php?id=3780" 338 | "siph0n","webapps","2015-04-20","3779","Wolf CMS - Arbitrary File Upload","http://siph0n.in/exploits.php?id=3779" 339 | "siph0n","webapps","2015-04-17","3773","Nodes Studio CMS - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=3773" 340 | "siph0n","webapps","2015-04-14","3768","Traidnt Up v3.0 - SQL Injection","http://siph0n.in/exploits.php?id=3768" 341 | "siph0n","webapps","2015-04-14","3767","Balero CMS v0.7.2 - SQL Injection","http://siph0n.in/exploits.php?id=3767" 342 | "siph0n","webapps","2015-04-14","3765","6kbbs v8.0 - SQL Injection","http://siph0n.in/exploits.php?id=3765" 343 | "siph0n","webapps","2015-03-13","3744","FCKEditor 4.4.7.xx - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=3744" 344 | "siph0n","webapps","2015-03-11","3743","Codoforum 2.5.1 Arbitrary File Download","http://siph0n.in/exploits.php?id=3743" 345 | "siph0n","webapps","2015-03-11","3742","GeniXCMS v0.0.1 - SQL Injection","http://siph0n.in/exploits.php?id=3742" 346 | "siph0n","webapps","2015-03-11","3741","Instant v2.0 - SQL Injection","http://siph0n.in/exploits.php?id=3741" 347 | "siph0n","webapps","2015-03-11","3740","Elastix v2.x - Blind SQL Injection","http://siph0n.in/exploits.php?id=3740" 348 | "siph0n","webapps","2015-03-11","3739","WeBid 1.1.1 - Unrestricted File Upload","http://siph0n.in/exploits.php?id=3739" 349 | "siph0n","webapps","2015-03-11","3738","Webshop Hun v1.062S - SQL Injection","http://siph0n.in/exploits.php?id=3738" 350 | "siph0n","webapps","2015-03-04","3736","vBulletin vBSEO 4.x.x - Remote Code Execution","http://siph0n.in/exploits.php?id=3736" 351 | "siph0n","webapps","2015-03-04","3735","phpMoAdmin - Remote Code Execution","http://siph0n.in/exploits.php?id=3735" 352 | "siph0n","webapps","2015-03-04","3734","NetCat CMS 3.12 - Remote File Inclusion","http://siph0n.in/exploits.php?id=3734" 353 | "siph0n","webapps","2015-02-27","3728","Exploit DB : CVE Fri Feb 27 2015 : 32158 exploits","http://siph0n.in/exploits.php?id=3728" 354 | "siph0n","webapps","2015-02-27","3727","vBulletin vBSSO Single Sign-On 1.4.14 - SQL Inject","http://siph0n.in/exploits.php?id=3727" 355 | "siph0n","webapps","2015-02-27","3726","WordPress Webdorado Spider Event Calendar 1.4.9 -","http://siph0n.in/exploits.php?id=3726" 356 | "siph0n","webapps","2015-02-23","3715","MyBB 1.8.3 Multiple stored XSS","http://siph0n.in/exploits.php?id=3715" 357 | "siph0n","webapps","2015-02-23","3714","phpBugTracker v1.6.0 Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=3714" 358 | "siph0n","webapps","2015-02-23","3713","DLGuard 4.5 SQL Injection","http://siph0n.in/exploits.php?id=3713" 359 | "siph0n","webapps","2015-02-23","3707","Piwigo 2.7.3 - SQL Injection","http://siph0n.in/exploits.php?id=3707" 360 | "siph0n","webapps","2015-02-23","3706","D-Link DSL-2640B - Unauthenticated Remote DNS Chan","http://siph0n.in/exploits.php?id=3706" 361 | "siph0n","webapps","2015-02-22","3704","OpenAuto 1.6.3 Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=3704" 362 | "siph0n","webapps","2015-02-22","3703","OpenClassifieds 1.7.0.3 Chained: Captcha Bypass /","http://siph0n.in/exploits.php?id=3703" 363 | "siph0n","webapps","2015-02-22","3701","Majordomo2 - Directory Traversal (SMTP/HTTP)","http://siph0n.in/exploits.php?id=3701" 364 | "siph0n","webapps","2015-02-22","3700","Pligg 1.1.2 - Blind SQL Injection and XSS Vulnerab","http://siph0n.in/exploits.php?id=3700" 365 | "siph0n","webapps","2015-02-20","3697","WordPress Shopping Cart 3.0.4 - Unrestricted File","http://siph0n.in/exploits.php?id=3697" 366 | "siph0n","webapps","2015-02-18","3694","vBulletin 5.1.3 XSS","http://siph0n.in/exploits.php?id=3694" 367 | "siph0n","webapps","2015-02-18","3693","Pandora FMS v5.1 SP1 SQL Injection","http://siph0n.in/exploits.php?id=3693" 368 | "siph0n","webapps","2015-02-12","3689","Radexscript CMS 2.2.0 SQL Injection","http://siph0n.in/exploits.php?id=3689" 369 | "siph0n","webapps","2015-02-12","3688","u5CMS 3.9.3 Multiple SQL Injection","http://siph0n.in/exploits.php?id=3688" 370 | "siph0n","webapps","2015-02-12","3687","Chamilo LMS 1.9.8 Blind SQL Injection","http://siph0n.in/exploits.php?id=3687" 371 | "siph0n","webapps","2015-02-12","3686","Fork CMS 3.8.5 SQL Injection","http://siph0n.in/exploits.php?id=3686" 372 | "siph0n","webapps","2015-02-04","3680","Pragyan CMS 3.0 SQL Injection","http://siph0n.in/exploits.php?id=3680" 373 | "siph0n","webapps","2015-02-04","3679","My Little Forum 2.3.3 -> 1.7 XSS","http://siph0n.in/exploits.php?id=3679" 374 | "siph0n","webapps","2015-02-03","3678","Sefrengo CMS 1.6.1 SQL Injection","http://siph0n.in/exploits.php?id=3678" 375 | "siph0n","webapps","2015-02-03","3677","ZeroCMS 1.3.3 SQL Injection","http://siph0n.in/exploits.php?id=3677" 376 | "siph0n","webapps","2015-01-31","3675","RestaurantBiller Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=3675" 377 | "siph0n","webapps","2015-01-31","3674","NPDS CMS Revolution-13 SQL Injection","http://siph0n.in/exploits.php?id=3674" 378 | "siph0n","webapps","2015-01-31","3673","FerretCMS v 1.0.4 Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=3673" 379 | "siph0n","webapps","2015-01-31","3672","SmartCMS v.2 Multiple SQL Injection","http://siph0n.in/exploits.php?id=3672" 380 | "siph0n","webapps","2015-01-23","3662","Mangallam CMS SQL Injection","http://siph0n.in/exploits.php?id=3662" 381 | "siph0n","webapps","2015-01-23","3661","ArticleFR CMS 3.0.5 Arbitrary File Upload","http://siph0n.in/exploits.php?id=3661" 382 | "siph0n","webapps","2015-01-23","3660","LizardSquad DDoS Stresser Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=3660" 383 | "siph0n","webapps","2015-01-23","3659","CatBot v0.4.2 SQL Injection","http://siph0n.in/exploits.php?id=3659" 384 | "siph0n","webapps","2015-01-18","3656","Blitz CMS SQL Injection","http://siph0n.in/exploits.php?id=3656" 385 | "siph0n","webapps","2015-01-18","3655","SoftBB 0.1.3 SQL Injection","http://siph0n.in/exploits.php?id=3655" 386 | "siph0n","webapps","2015-01-10","3646","Sefrengo CMS 1.6.0 SQL Injection","http://siph0n.in/exploits.php?id=3646" 387 | "siph0n","webapps","2014-12-22","3640","PHP 5.6.3 unserialize() Execute Arbitrary Code","http://siph0n.in/exploits.php?id=3640" 388 | "siph0n","webapps","2014-12-22","3639","MiniBB 3.1 Blind SQL Injection","http://siph0n.in/exploits.php?id=3639" 389 | "siph0n","webapps","2014-12-22","3638","Piwigo 2.7.2 Cross Site Scripting / SQL Injection","http://siph0n.in/exploits.php?id=3638" 390 | "siph0n","webapps","2014-12-18","3629","vBulletin 4.2.2 ModCP CSRF","http://siph0n.in/exploits.php?id=3629" 391 | "siph0n","webapps","2014-12-18","3628","phpMyAdmin 4.x - 4.2.x DoS","http://siph0n.in/exploits.php?id=3628" 392 | "siph0n","webapps","2014-12-16","3627","MyBB 1.8.x <= 1.8.1 SQL Injection","http://siph0n.in/exploits.php?id=3627" 393 | "siph0n","webapps","2014-12-08","3621","IceHrm <= 7.1 Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=3621" 394 | "siph0n","webapps","2014-12-07","3620","CMS Made Simple (all) Remote Code Execution","http://siph0n.in/exploits.php?id=3620" 395 | "siph0n","webapps","2014-12-07","3619","PBBoard 3.0.1 CMS SQL Injection","http://siph0n.in/exploits.php?id=3619" 396 | "siph0n","webapps","2014-12-01","3614","Wordpress <= 4.0 DoS","http://siph0n.in/exploits.php?id=3614" 397 | "siph0n","webapps","2014-12-01","3613","RobotStats 1.0 (Robot Param) SQL Injection","http://siph0n.in/exploits.php?id=3613" 398 | "siph0n","webapps","2014-12-01","3612","Tuleap <= 7.6-4 PHP Object Injection","http://siph0n.in/exploits.php?id=3612" 399 | "siph0n","webapps","2014-12-01","3611","Apadana CMS SQL Injection","http://siph0n.in/exploits.php?id=3611" 400 | "siph0n","webapps","2014-12-01","3610","Pandora FMS SQLi & RCE","http://siph0n.in/exploits.php?id=3610" 401 | "siph0n","webapps","2014-11-26","3606","MyBB <= 1.8.2 unset_globals() RCE","http://siph0n.in/exploits.php?id=3606" 402 | "siph0n","webapps","2014-11-26","3603","Invision Power Board <= 3.4.7 Remote Pass Change","http://siph0n.in/exploits.php?id=3603" 403 | "siph0n","webapps","2014-11-26","3602","FluxBB 1.5.6 SQL Injection","http://siph0n.in/exploits.php?id=3602" 404 | "siph0n","webapps","2014-11-24","3601","Wordpress <= 3.9.2 XSS","http://siph0n.in/exploits.php?id=3601" 405 | "siph0n","webapps","2014-11-20","3600","Snowfox CMS 1.0 - CSRF Add Admin","http://siph0n.in/exploits.php?id=3600" 406 | "siph0n","webapps","2014-11-20","3599","Subex FMS 7.4 - Unauthenticated SQLi","http://siph0n.in/exploits.php?id=3599" 407 | "siph0n","webapps","2014-11-18","3597","PHP 5.x - Bypass disable_functions (Shellshock)","http://siph0n.in/exploits.php?id=3597" 408 | "siph0n","webapps","2014-11-17","3596","MyBB 1.8.* Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=3596" 409 | "siph0n","webapps","2014-11-17","3595","Joomla HD FLV 2.1.0.1 SQLi","http://siph0n.in/exploits.php?id=3595" 410 | "siph0n","webapps","2014-11-13","3592","Piwigo 2.6.0 SQL Injection","http://siph0n.in/exploits.php?id=3592" 411 | "siph0n","webapps","2014-11-13","3591","FUDForum 3.0.6 Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=3591" 412 | "siph0n","webapps","2014-11-13","3590","ProjectMan100 1.6.1 Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=3590" 413 | "siph0n","webapps","2014-11-11","3588","PHP-Fusion 7.02.07 SQLi","http://siph0n.in/exploits.php?id=3588" 414 | "siph0n","webapps","2014-11-10","3587","IP.Board <= 3.4.7 SQLi","http://siph0n.in/exploits.php?id=3587" 415 | "siph0n","webapps","2014-11-07","3584","select(bf) - *.x Remote SQLi 0day","http://siph0n.in/exploits.php?id=3584" 416 | "siph0n","webapps","2014-11-05","3580","PHPFusion (Search Page) DoS","http://siph0n.in/exploits.php?id=3580" 417 | "siph0n","webapps","2014-11-04","3579","Drupal Core < 7.32 Pre Auth SQLi","http://siph0n.in/exploits.php?id=3579" 418 | "siph0n","webapps","2014-11-02","3567","Drupal Core 7.x SQLi","http://siph0n.in/exploits.php?id=3567" 419 | "siph0n","webapps","2014-11-02","3566","Wordpress InfusionSoft 1.5.10 RFI","http://siph0n.in/exploits.php?id=3566" 420 | "siph0n","webapps","2014-09-09","3552","MyBB 1.6.15 - Full Path Disclosure","http://siph0n.in/exploits.php?id=3552" 421 | "siph0n","webapps","2014-07-21","1348","vBulletin 5.1.2 SQL Injection","http://siph0n.in/exploits.php?id=1348" 422 | "siph0n","webapps","2014-07-20","1346","360websec","http://siph0n.in/exploits.php?id=1346" 423 | "siph0n","webapps","2014-07-10","1326","FireEye Malware Analysis System 6.4.1 - Multiple V","http://siph0n.in/exploits.php?id=1326" 424 | "siph0n","webapps","2014-07-09","1324","Quick.Cart 6.4 & Quick.Cms 5.4 - Cross Site Script","http://siph0n.in/exploits.php?id=1324" 425 | "siph0n","webapps","2014-07-09","1316","Atom CMS Multiple Vulnerabilities SQLi/RFI","http://siph0n.in/exploits.php?id=1316" 426 | "siph0n","webapps","2014-07-09","1315","Lime Survey 2.05+ Build 140618 XSS / SQL Injection","http://siph0n.in/exploits.php?id=1315" 427 | "siph0n","webapps","2014-07-09","1314","Dolibarr CMS 3.5.3 - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=1314" 428 | "siph0n","webapps","2014-07-09","1313","Wordpress Theme PricerrTheme Shell Upload","http://siph0n.in/exploits.php?id=1313" 429 | "siph0n","webapps","2014-07-05","1308","Zermo CRM: Persistent XSS","http://siph0n.in/exploits.php?id=1308" 430 | "siph0n","webapps","2014-06-27","1301","phpBugTracker 1.5.1.1 Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=1301" 431 | "siph0n","webapps","2014-06-18","1181","PHP-Calendar 2.0.6 Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=1181" 432 | "siph0n","webapps","2014-06-10","1141","sqli 0day Epaper / Deccan Chronicle Service","http://siph0n.in/exploits.php?id=1141" 433 | "siph0n","webapps","2014-06-08","1126","E-Office System!","http://siph0n.in/exploits.php?id=1126" 434 | "siph0n","webapps","2014-06-03","1100","Discuz! 7.2 CMS- XSS + File Disclosure","http://siph0n.in/exploits.php?id=1100" 435 | "siph0n","webapps","2014-05-22","1042","Plasma http bot Unathorized account creation","http://siph0n.in/exploits.php?id=1042" 436 | "siph0n","webapps","2014-05-11","949","Tugux 2.1.1 Remote Admin Creation","http://siph0n.in/exploits.php?id=949" 437 | "siph0n","webapps","2014-05-11","948","Crime24 Stealer Panel 1.0 - Multiple Vulnerabilities","http://siph0n.in/exploits.php?id=948" 438 | "siph0n","webapps","2014-05-11","947","Photo Organizer - XSS and SQL Vulnerabilities","http://siph0n.in/exploits.php?id=947" 439 | "siph0n","webapps","2017-05-31","4983","MyBB 1.8x - File Enumeration + Mod->Admin takeover","http://siph0n.in/exploits.php?id=4983" 440 | "siph0n","webapps","2017-05-31","4982","Concrete5 CMS (8.1) - CSRF->Application-Level DoS","http://siph0n.in/exploits.php?id=4982" 441 | "siph0n","webapps","2017-05-31","4981","K-12 Alio Applicant Portal - SQL Injection","http://siph0n.in/exploits.php?id=4981" 442 | "siph0n","webapps","2017-05-17","4979","0Day IPB Forum v4.1.4.1 XSS+CSRF+FPD+Malicious Fil","http://siph0n.in/exploits.php?id=4979" 443 | "siph0n","webapps","2017-05-31","4983","MyBB 1.8x - File Enumeration + Mod->Admin takeover","http://siph0n.in/exploits.php?id=4983" 444 | "siph0n","webapps","2017-05-31","4982","Concrete5 CMS (8.1) - CSRF->Application-Level DoS","http://siph0n.in/exploits.php?id=4982" 445 | --------------------------------------------------------------------------------