exploit-
intel
Search
Blog
Stats
Labs
Tools
Tools
EIP CLI Search Tool
EIP MCP Server
EIP REST API
API Rate Limits
About
About
About Exploit Intel
About Exploit Forge
Privacy Policy
RSS Feeds
Blog Posts
Recent CVEs
CVEs with Exploits
CISA KEV
Theme
Color Theme
Cyan
Amber
Milw0rm
Light Warm
Paper
Navy
Search
Blog
Statistics
Labs
Tools
EIP CLI Search Tool
EIP MCP Server
EIP REST API
API Rate Limits
About
About Exploit Forge
Privacy
Exploit Database
Researchers
CWE Categories
Vendors
Ecosystems
RSS Feeds
Blog Posts
Recent CVEs
CVEs with Exploits
CISA KEV
Follow:
Theme:
Home
/
Researchers
/
Tim Coen
Tim Coen
29
exploits
Active since Sep 2015
EIP-2026-105472
EXPLOITDB
text
WRITEUP
BigTree CMS 4.2.3 - (Authenticated) SQL Injection
View Code
EIP-2026-105223
EXPLOITDB
text
WRITEUP
Arastta 1.1.5 - SQL Injection
View Code
EIP-2026-105292
EXPLOITDB
text
WRITEUP
ATutor 2.2 - Multiple Cross-Site Scripting Vulnerabilities
View Code
CVE-2015-7309
EXPLOITDB
ruby
WORKING POC
Bolt < 2.2.0 - Injection
The theme editor in Bolt before 2.2.5 does not check the file extension when renaming files, which allows remote authenticated users to execute arbitrary code by renaming a crafted file and then directly accessing it.
View Code
Previous
Page 2 of 2