Created
December 30, 2016 05:34
-
-
Save milo2012/fc498afe40e3963ea8fe58222fabba3f to your computer and use it in GitHub Desktop.
uriList-exploits.csv
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| /soap/ | exploits/freebsd/misc/citrix_netscaler_soap_bof | |
|---|---|---|
| /glpi/ | exploits/multi/http/glpi_install_rce | |
| /invoker/JMXInvokerServlet/ | exploits/multi/http/jboss_invoke_deploy | |
| /moodle/ | exploits/multi/http/moodle_cmd_exec | |
| /console/ | exploits/multi/http/werkzeug_debug_rce | |
| /SiteScope/ | exploits/multi/http/hp_sitescope_issuesiebelcmd | |
| /phpwiki/ | exploits/multi/http/phpwiki_ploticus_exec | |
| /cuteflow_v.2.11.2/ | exploits/multi/http/cuteflow_upload_exec | |
| /phpmyadmin/ | exploits/multi/http/phpmyadmin_preg_replace | |
| /blank-struts2/login.action/ | exploits/multi/http/struts_code_exec_parameters | |
| /Zemra/Panel/Zemra/system/command.php/ | exploits/multi/http/zemra_panel_rce | |
| /www/ | exploits/multi/http/webpagetest_upload_exec | |
| /mma.php/ | exploits/multi/http/mma_backdoor_upload | |
| /qdPM/ | exploits/multi/http/qdpm_upload_exec | |
| /phptax/ | exploits/multi/http/phptax_exec | |
| /Auxiliumpetratepro/ | exploits/multi/http/auxilium_upload_exec | |
| /mt/ | exploits/multi/http/movabletype_upgrade_exec | |
| /jenkins/ | exploits/multi/http/jenkins_script_console | |
| /openx/ | exploits/multi/http/openx_backdoor_php | |
| /zpanel/ | exploits/multi/http/zpanel_information_disclosure_rce | |
| /manager/ | exploits/multi/http/tomcat_mgr_upload | |
| /wikka/ | exploits/multi/http/wikka_spam_exec | |
| /zabbix/ | exploits/multi/http/zabbix_script_exec | |
| /SiteScope/ | exploits/multi/http/hp_sitescope_uploadfileshandler | |
| /struts2-blank/example/HelloWorld.action/ | exploits/multi/http/struts_dev_mode | |
| /roller/ | exploits/multi/http/apache_roller_ognl_injection | |
| /sysaid/ | exploits/multi/http/sysaid_auth_file_upload | |
| /AjaXplorer-2.5.5/ | exploits/multi/http/ajaxplorer_checkinstall_exec | |
| /polarbearcms/ | exploits/multi/http/polarcms_upload_exec | |
| /com_extplorer_2.1.0/ | exploits/multi/http/extplorer_upload_exec | |
| /vtigercrm/ | exploits/multi/http/vtiger_soap_upload | |
| /interface/ | exploits/multi/http/mutiny_subnetmask_exec | |
| /gestioip/ | exploits/multi/http/gestioip_exec | |
| /ATutor/ | exploits/multi/http/atutor_sqli | |
| /struts2-blank/example/HelloWorld.action/ | exploits/multi/http/struts_code_exec_classloader | |
| /struts2-blank/example/HelloWorld.action/ | exploits/multi/http/struts_include_params | |
| /admin-console/login.seam/ | exploits/multi/http/jboss_seam_upload_exec | |
| /bf102/ | exploits/multi/http/php_volunteer_upload_exec | |
| /testlink-1.9.3/ | exploits/multi/http/testlink_upload_exec | |
| /jos.php/ | exploits/multi/http/v0pcr3w_exec | |
| /pandora_console/ | exploits/multi/http/pandora_upload_exec | |
| /x7chat2/ | exploits/multi/http/x7chat2_php_exec | |
| /php-utility-belt/ajax.php/ | exploits/multi/http/php_utility_belt_rce | |
| /IDC.php/ | exploits/multi/http/stunshell_exec | |
| /caidao.php/ | exploits/multi/http/caidao_php_backdoor_exec | |
| /IDC.php/ | exploits/multi/http/stunshell_eval | |
| /phpFileManager-0.9.8/index.php/ | exploits/multi/http/phpfilemanager_rce | |
| /appRain-q-0.1.5/ | exploits/multi/http/apprain_upload_exec | |
| /sflog/ | exploits/multi/http/sflog_upload_exec | |
| /mediawiki/ | exploits/multi/http/mediawiki_thumb | |
| /glossword/1.8/ | exploits/multi/http/glossword_upload_exec | |
| /struts2-blank/example/HelloWorld.action/ | exploits/multi/http/struts_default_action_mapper | |
| /log1cms2.0/ | exploits/multi/http/log1cms_ajax_create_folder | |
| /kordil_edms/ | exploits/multi/http/kordil_edms_upload_exec | |
| /mobilecartly/ | exploits/multi/http/mobilecartly_upload_exec | |
| /vtigercrm/ | exploits/multi/http/vtiger_php_exec | |
| /ATutor/ | exploits/linux/http/atutor_filemanager_traversal | |
| /WeBid/ | exploits/linux/http/webid_converter | |
| /railo-context/ | exploits/linux/http/railo_cfml_rfi | |
| /iControl/iControlPortal.cgi/ | exploits/linux/http/f5_icall_cmd | |
| /ping.ccp/ | exploits/linux/http/multi_ncc_ping_exec | |
| /centreon/ | exploits/linux/http/centreon_sqli_exec | |
| /WebCalendar-1.2.4/ | exploits/linux/http/webcalendar_settings_exec | |
| /pandora_console/ | exploits/linux/http/pandora_fms_sqli | |
| /spywall/pbcontrol.php/ | exploits/linux/http/symantec_web_gateway_pbcontrol | |
| /dolibarr/ | exploits/linux/http/dolibarr_cmd_exec | |
| /vcms/ | exploits/linux/http/vcms_upload | |
| /zabbix/ | exploits/linux/http/zabbix_sqli | |
| /nagios3/cgi-bin/history.cgi/ | exploits/unix/webapp/nagios3_history_cgi | |
| /forums/ | exploits/unix/webapp/invision_pboard_unserialize_exec | |
| /seportal/ | exploits/unix/webapp/seportal_sqli_exec | |
| /opensis/ | exploits/unix/webapp/opensis_modname_exec | |
| /kimai/ | exploits/unix/webapp/kimai_sqli | |
| /joomla/ | exploits/unix/webapp/joomla_media_upload_exec | |
| /ProjectSend/ | exploits/unix/webapp/projectsend_upload_exec | |
| /hastymail2/ | exploits/unix/webapp/hastymail_exec | |
| /pp088/ | exploits/unix/webapp/projectpier_upload_exec | |
| /chat/ | exploits/unix/webapp/flashchat_upload_exec | |
| /narcissus-master/ | exploits/unix/webapp/narcissus_backend_exec | |
| /hybridauth/ | exploits/unix/webapp/hybridauth_install_php_exec | |
| /xoda/ | exploits/unix/webapp/xoda_file_upload | |
| /zm/ | exploits/unix/webapp/zoneminder_packagecontrol_exec | |
| /joomla/ | exploits/unix/webapp/joomla_akeeba_unserialize | |
| /index.php/ | exploits/unix/webapp/carberp_backdoor_exec | |
| /simple_e_document_v_1_31/ | exploits/unix/webapp/simple_e_document_upload_exec | |
| /librettoCMS_v.2.2.2/ | exploits/unix/webapp/libretto_upload_exec | |
| /lite/ | exploits/unix/webapp/actualanalyzer_ant_cookie_exec | |
| /zimbraAdmin/ | exploits/unix/webapp/zimbra_lfi | |
| /webtester5/ | exploits/unix/webapp/webtester_exec | |
| /sample/ | exploits/unix/webapp/egallery_upload_exec | |
| /horde/ | exploits/unix/webapp/horde_unserialize_exec | |
| /php-ofc-library/ | exploits/unix/webapp/open_flash_chart_upload_exec | |
| /basilic-1.5.14/ | exploits/unix/webapp/basilic_diff_exec | |
| /openemr/ | exploits/unix/webapp/openemr_sqli_privesc_upload | |
| /sugarcrm/ | exploits/unix/webapp/sugarcrm_unserialize_exec | |
| /tiki/ | exploits/unix/webapp/tikiwiki_unserialize_exec | |
| /php-charts_v1.0/ | exploits/unix/webapp/php_charts_exec | |
| /openemr/ | exploits/unix/webapp/openemr_upload_exec | |
| /GetSimpleCMS/ | exploits/unix/webapp/get_simple_cms_upload_exec | |
| /cgi-bin/mt/ | exploits/unix/webapp/sixapart_movabletype_storable_exec | |
| /do/view/Main/WebHome/ | exploits/unix/http/twiki_debug_plugins | |
| /SiteScope/ | exploits/windows/http/hp_sitescope_dns_tool | |
| /SiteScope/ | exploits/windows/http/hp_sitescope_runomagentcommand | |
| /cms400min/ | exploits/windows/http/ektron_xslt_exec | |
| /vfolder.ghp/ | exploits/windows/http/efs_fmws_userid_bof | |
| /umbraco/ | exploits/windows/http/umbraco_upload_aspx | |
| /ctc/servlet/ | exploits/windows/http/sap_configservlet_exec_noauth | |
| /cgi-bin/function.php?argument=/ | exploits/windows/http/generic_http_dll_injection | |
| /ws/control/ | exploits/windows/http/oracle_endeca_exec | |
| /php/test.php/ | exploits/windows/http/php_apache_request_headers_bof | |
| /autopass/ | exploits/windows/http/hp_autopass_license_traversal | |
| /index.jsp/ | exploits/windows/http/bea_weblogic_post_bof | |
| /imc/ | exploits/windows/http/hp_imc_mibfileupload | |
| /d4d/statusFilter.php/ | exploits/windows/http/sonicwall_scrutinizer_sqli | |
| / | exploits/freebsd/http/watchguard_cmd_exec | |
| / | exploits/multi/http/nibbleblog_file_upload | |
| / | exploits/multi/http/gitlab_shell_exec | |
| / | exploits/multi/http/uptime_file_upload_1 | |
| / | exploits/multi/http/openfire_auth_bypass | |
| / | exploits/multi/http/dexter_casinoloader_exec | |
| / | exploits/multi/http/mantisbt_php_exec | |
| / | exploits/multi/http/sonicwall_gms_upload | |
| / | exploits/multi/http/drupal_drupageddon | |
| / | exploits/multi/http/rails_secret_deserialization | |
| / | exploits/multi/http/jira_hipchat_template | |
| / | exploits/multi/http/cisco_dcnm_upload | |
| / | exploits/multi/http/bolt_file_upload | |
| / | exploits/multi/http/glassfish_deployer | |
| / | exploits/multi/http/phpmoadmin_exec | |
| / | exploits/multi/http/rails_json_yaml_code_exec | |
| / | exploits/multi/http/vtiger_install_rce | |
| / | exploits/multi/http/ispconfig_php_exec | |
| / | exploits/multi/http/vbulletin_unserialize | |
| / | exploits/multi/http/hyperic_hq_script_console | |
| / | exploits/multi/elasticsearch/script_mvel_rce | |
| / | exploits/multi/elasticsearch/search_groovy_script | |
| / | exploits/linux/misc/jenkins_java_deserialize | |
| / | exploits/linux/http/foreman_openstack_satellite_code_exec | |
| / | exploits/linux/http/pandora_fms_exec | |
| / | exploits/linux/http/kloxo_sqli | |
| / | exploits/linux/http/astium_sqli_upload | |
| / | exploits/linux/http/mutiny_frontend_upload | |
| / | exploits/linux/http/alienvault_sqli_exec | |
| / | exploits/linux/http/gitlist_exec | |
| / | exploits/linux/http/f5_icontrol_exec | |
| / | exploits/linux/http/sophos_wpa_iface_exec | |
| / | exploits/linux/http/cfme_manageiq_evm_upload_exec | |
| / | exploits/linux/http/seagate_nas_php_exec_noauth | |
| / | exploits/linux/http/lifesize_uvc_ping_rce | |
| / | exploits/linux/http/symantec_web_gateway_restore | |
| / | exploits/linux/antivirus/escan_password_exec | |
| / | exploits/unix/webapp/graphite_pickle_exec | |
| / | exploits/unix/webapp/arkeia_upload_exec | |
| / | exploits/unix/webapp/foswiki_maketext | |
| / | exploits/unix/webapp/moinmoin_twikidraw | |
| / | exploits/unix/webapp/joomla_comjce_imgmanager | |
| / | exploits/unix/webapp/skybluecanvas_exec | |
| / | exploits/unix/webapp/joomla_contenthistory_sqli_rce | |
| / | exploits/unix/webapp/spip_connect_exec | |
| / | exploits/unix/webapp/instantcms_exec | |
| / | exploits/unix/webapp/clipbucket_upload_exec | |
| / | exploits/unix/webapp/datalife_preview_exec | |
| / | exploits/unix/webapp/maarch_letterbox_file_upload | |
| / | exploits/unix/webapp/freepbx_config_exec | |
| / | exploits/unix/webapp/havalite_upload_exec | |
| / | exploits/unix/webapp/wp_advanced_custom_fields_exec | |
| / | exploits/unix/webapp/zpanel_username_exec | |
| / | exploits/unix/webapp/squash_yaml_exec | |
| / | exploits/unix/webapp/twiki_maketext | |
| / | exploits/unix/webapp/wp_google_document_embedder_exec | |
| / | exploits/unix/webapp/tuleap_unserialize_exec | |
| / | exploits/unix/webapp/zeroshell_exec | |
| / | exploits/unix/ftp/proftpd_modcopy_exec | |
| / | exploits/windows/http/jira_collector_traversal | |
| / | exploits/windows/http/cyclope_ess_sqli | |
| / | exploits/windows/http/avaya_ccr_imageupload_exec | |
| / | exploits/windows/http/netgear_nms_rce | |
| / | exploits/windows/http/oracle_beehive_prepareaudiotoplay | |
| / | exploits/windows/http/sepm_auth_bypass_rce | |
| / | exploits/windows/http/lexmark_markvision_gfd_upload | |
| / | exploits/windows/http/sysax_create_folder | |
| / | exploits/windows/http/novell_mdm_lfi | |
| / | exploits/windows/http/manageengine_connectionid_write | |
| / | exploits/windows/http/solarwinds_fsm_userlogin | |
| / | exploits/windows/http/oracle_beehive_evaluation | |
| / | exploits/windows/http/rejetto_hfs_exec | |
| / | exploits/windows/scada/ge_proficy_cimplicity_gefebt | |
| / | exploits/windows/antivirus/symantec_endpoint_manager_rce |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment