
Incorrect processing of -t option after searchsploit update
Nov 29, 2020 · Initially, it correctly displays the filtered results when searching in the exploit title (searchsploit -t , example searchsploit -t Apache 2.4.7). However, after updating searchsploit -u, the …
Dates on the file files_exploits.csv are wrong - GitHub
All the dates of the published exploits are stacked on "1970-1-1". I reviewed the file from google chrome and here is an example i encountered: 50781,exploits/windows/remote/50781.txt,"Adobe ColdFusion …
Last <port> element in xml file not processed when using ... - GitHub
Dec 15, 2016 · Adding the echo "${software}" >> /tmp/searchsploitout at line 304 just outside of the case/esac catches the last <port> element but also increases the number of searches and those that …
Add multi parameter vulnerable · Issue #113 - GitHub
Jan 19, 2018 · Ah! Ive seen you have opened the first comment, with a link to an example. That to me looks like its looping around, calling searchsploit multiple times, thus making a "OR" search. …
Clarify please? · Issue #24 · offensive-security/exploitdb · GitHub
Nov 16, 2015 · cout << "Example: " << argv [0] << " 192.168.2.100 21" << endl; return (-1); Apparently I don't just type in ./1336.cpp target_ip port, because that doesn't work, as this is my output. Can you …
Wrong command order leads to incorrect JSON Formatting #97
Aug 28, 2017 · While I was trying to parse the search results in the JSON Format, I noticed that there was no comma after the first record but there was still a comma left after the last record (see …
exploitdb/16052.txt at master · offensive-security/exploitdb
Example 1 (file overwrite) ******* <html> <script> targetFile = "C:\Program Files\Oracle\Document Capture\NCSEcw.dll" prototype = "Sub WriteJPG ( ByVal OutputFile As String , ByVal Quality As …
Hello World Example - GitHub
From 363cbde9cce07de73a0e8cdf3a0043a7f3f3731a Mon Sep 17 00:00:00 2001 From: Offensive Security Date: Fri, 5 Feb 2016 05:02:27 +0000 Subject: [PATCH] DB: 2016-02-05
exploitdb/29288.txt at master · offensive-security/exploitdb
An attacker may leverage these issues to have arbitrary script code execute in the browser of an unsuspecting user. This may help the attacker steal cookie-based authentication credentials and …
Mannu joomla SQL Injection exploiter by Team Indishell]]==--
+Example one: +8.8.8.8 && cat /etc/passwd + +Result + +root:$1$27272727:0:0::/:/bin/false +nobody:$1$27272727:65535:65535::/:/bin/false +rogcesadmin:filtered/:100:100::/:/usr/sbin/cli …