From 36d3a5ce9d33a5d05c4ced9d180d3aa1266b6cfe Mon Sep 17 00:00:00 2001 From: Offensive Security Date: Sat, 3 May 2014 04:36:17 +0000 Subject: [PATCH] Updated 05_03_2014 --- files.csv | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/files.csv b/files.csv index a603efc68..9b6d82c69 100755 --- a/files.csv +++ b/files.csv @@ -15751,7 +15751,7 @@ id,file,description,date,author,platform,type,port 18172,platforms/hardware/remote/18172.rb,"CTEK SkyRouter 4200 and 4300 Command Execution",2011-11-30,metasploit,hardware,remote,0 18173,platforms/windows/dos/18173.pl,"Bugbear FlatOut 2005 Malformed .bed file Buffer Overflow Vulnerability",2011-11-30,Silent_Dream,windows,dos,0 18174,platforms/windows/local/18174.py,"GOM Player 2.1.33.5071 ASX File Unicode Stack Buffer Overflow Exploit",2011-11-30,"Debasish Mandal",windows,local,0 -18176,platforms/windows/local/18176.py,"MS11-080 Afd.sys Privilege Escalation Exploit",2011-11-30,ryujin,windows,local,0 +18176,platforms/windows/local/18176.py,"Windows Afd.sys - Privilege Escalation Exploit (MS11-080)",2011-11-30,ryujin,windows,local,0 18177,platforms/php/webapps/18177.txt,"WikkaWiki <= 1.3.2 - Multiple Security Vulnerabilities",2011-11-30,EgiX,php,webapps,0 18178,platforms/windows/local/18178.rb,"CCMPlayer 1.5 Stack based Buffer Overflow SEH Exploit (.m3u)",2011-11-30,Rh0,windows,local,0 18179,platforms/jsp/remote/18179.html,"IBM Lotus Domino Server Controller Authentication Bypass Vulnerability",2011-11-30,"Alexey Sintsov",jsp,remote,0 @@ -22073,7 +22073,7 @@ id,file,description,date,author,platform,type,port 24944,platforms/windows/remote/24944.py,"FreeFloat FTP 1.0 - DEP Bypass with ROP",2013-04-10,negux,windows,remote,0 24945,platforms/hardware/remote/24945.rb,"Linksys WRT54GL apply.cgi Command Execution",2013-04-10,metasploit,hardware,remote,0 24946,platforms/multiple/remote/24946.rb,"Adobe ColdFusion APSB13-03 Remote Exploit",2013-04-10,metasploit,multiple,remote,0 -24947,platforms/linux/remote/24947.txt,"MongoDB nativeHelper.apply Remote Code Execution",2013-04-08,agixid,linux,remote,0 +24947,platforms/linux/remote/24947.txt,"MongoDB 2.2.3 nativeHelper.apply - Remote Code Execution",2013-04-08,agixid,linux,remote,0 24950,platforms/windows/remote/24950.pl,"KNet Web Server 1.04b - Stack Corruption BoF",2013-04-12,Wireghoul,windows,remote,0 24951,platforms/linux/dos/24951.pl,"ircd-hybrid 8.0.5 - Denial of Service",2013-04-12,kingcope,linux,dos,0 24952,platforms/windows/dos/24952.py,"AT-TFTP Server 2.0 - Stack Based Buffer Overflow DoS",2013-04-12,xis_one,windows,dos,69 @@ -29872,5 +29872,5 @@ id,file,description,date,author,platform,type,port 33132,platforms/php/webapps/33132.txt,"Softbiz Dating Script 1.0 'cat_products.php' SQL Injection Vulnerability",2009-07-30,MizoZ,php,webapps,0 33133,platforms/multiple/dos/33133.txt,"Adobe Flash Player <= 10.0.22 and AIR URI Parsing Heap Buffer Overflow Vulnerability",2009-07-30,iDefense,multiple,dos,0 33134,platforms/linux/dos/33134.txt,"Adobe Flash Player <= 10.0.22 and AIR - 'intf_count' Integer Overflow Vulnerability",2009-07-30,"Roee Hay",linux,dos,0 -33136,platforms/hardware/webapps/33136.txt,"Fritz!Box - Remote command Execution Exploit",2014-05-01,0x4148,hardware,webapps,0 +33136,platforms/hardware/webapps/33136.txt,"Fritz!Box - Remote Command Execution Exploit",2014-05-01,0x4148,hardware,webapps,0 33138,platforms/hardware/webapps/33138.txt,"NETGEAR DGN2200 1.0.0.29_1.7.29_HotS - Stored XSS Vulnerability",2014-05-01,"Dolev Farhi",hardware,webapps,0