About 23 results
Open links in new tab
  1. Incorrect processing of -t option after searchsploit update

    Nov 29, 2020 · Initially, it correctly displays the filtered results when searching in the exploit title (searchsploit -t , example searchsploit -t Apache 2.4.7). However, after updating searchsploit -u, the …

  2. Dates on the file files_exploits.csv are wrong - GitHub

    All the dates of the published exploits are stacked on "1970-1-1". I reviewed the file from google chrome and here is an example i encountered: 50781,exploits/windows/remote/50781.txt,"Adobe ColdFusion …

  3. Last <port> element in xml file not processed when using ... - GitHub

    Dec 15, 2016 · Adding the echo "${software}" >> /tmp/searchsploitout at line 304 just outside of the case/esac catches the last <port> element but also increases the number of searches and those that …

  4. Add multi parameter vulnerable · Issue #113 - GitHub

    Jan 19, 2018 · Ah! Ive seen you have opened the first comment, with a link to an example. That to me looks like its looping around, calling searchsploit multiple times, thus making a "OR" search. …

  5. Clarify please? · Issue #24 · offensive-security/exploitdb · GitHub

    Nov 16, 2015 · cout << "Example: " << argv [0] << " 192.168.2.100 21" << endl; return (-1); Apparently I don't just type in ./1336.cpp target_ip port, because that doesn't work, as this is my output. Can you …

  6. Wrong command order leads to incorrect JSON Formatting #97

    Aug 28, 2017 · While I was trying to parse the search results in the JSON Format, I noticed that there was no comma after the first record but there was still a comma left after the last record (see …

  7. exploitdb/16052.txt at master · offensive-security/exploitdb

    Example 1 (file overwrite) ******* <html> <script> targetFile = "C:\Program Files\Oracle\Document Capture\NCSEcw.dll" prototype = "Sub WriteJPG ( ByVal OutputFile As String , ByVal Quality As …

  8. Hello World Example - GitHub

    From 363cbde9cce07de73a0e8cdf3a0043a7f3f3731a Mon Sep 17 00:00:00 2001 From: Offensive Security Date: Fri, 5 Feb 2016 05:02:27 +0000 Subject: [PATCH] DB: 2016-02-05

  9. exploitdb/29288.txt at master · offensive-security/exploitdb

    An attacker may leverage these issues to have arbitrary script code execute in the browser of an unsuspecting user. This may help the attacker steal cookie-based authentication credentials and …

  10. Mannu joomla SQL Injection exploiter by Team Indishell]]==--

    +Example one: +8.8.8.8 && cat /etc/passwd + +Result + +root:$1$27272727:0:0::/:/bin/false +nobody:$1$27272727:65535:65535::/:/bin/false +rogcesadmin:filtered/:100:100::/:/usr/sbin/cli …