DB: 2016-11-13

This commit is contained in:
Offensive Security 2016-11-13 05:01:17 +00:00
parent 8a72733f20
commit 3c006aac19
25 changed files with 28 additions and 28 deletions

View file

@ -36807,4 +36807,4 @@ id,file,description,date,author,platform,type,port
40746,platforms/php/webapps/40746.php,"e107 CMS 2.1.2 - Privilege Escalation",2016-11-09,"Kacper Szurek",php,webapps,0
40749,platforms/php/webapps/40749.txt,"MyBB 1.8.6 - Cross-Site Scripting",2016-11-10,"Curesec Research Team",php,webapps,80
40750,platforms/php/webapps/40750.txt,"4Images 1.7.13 - SQL Injection",2016-11-10,0x4148,php,webapps,0
40751,platforms/php/webapps/40751.txt,"vBulletin 4.2.3 - SQL Injection",2015-08-25,"Manish Tanwar",php,webapps,0
40751,platforms/php/webapps/40751.txt,"vBulletin 4.2.3 - 'ForumRunner' SQL Injection",2015-08-25,"Manish Tanwar",php,webapps,0

Can't render this file because it is too large.

View file

@ -1,4 +1,4 @@
Source: http://www.securityfocus.com/bid/45211/discuss
source: http://www.securityfocus.com/bid/45211/discuss
Real Estate Single is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

View file

@ -1,4 +1,4 @@
Source: http://www.securityfocus.com/bid/45212/discuss
source: http://www.securityfocus.com/bid/45212/discuss
Multi Agent System is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

View file

@ -1,5 +1,5 @@
/*
* Source: http://www.securityfocus.com/bid/43060/info
* source: http://www.securityfocus.com/bid/43060/info
* 18.08.2010, babcia padlina
* FreeBSD 7.0 - 7.2 pseudofs null ptr dereference exploit
*

View file

@ -1,4 +1,4 @@
Source: http://www.securityfocus.com/bid/51086/info
source: http://www.securityfocus.com/bid/51086/info
Websense Triton is prone to a remote command-execution vulnerability.
@ -10,7 +10,7 @@ https://www.example.com/explorer_wse/ws_irpt.exe?&SendFile=echo.pdf%26net user a
###################################################
Source: http://www.securityfocus.com/bid/51088/info
source: http://www.securityfocus.com/bid/51088/info
Websense Triton 'favorites.exe' HTML Injection Vulnerability
@ -37,7 +37,7 @@ https://www.example.com/explorer_wse/favorites.exe?Program=ws_irpt.exe&params=st
###################################################
Source: http://www.securityfocus.com/bid/51085/info
source: http://www.securityfocus.com/bid/51085/info
Websense Triton Report Management Interface Cross Site Scripting Vulnerability

View file

@ -1,4 +1,4 @@
# Source: http://www.securityfocus.com/bid/43084/info
# source: http://www.securityfocus.com/bid/43084/info
#!/bin/sh
# by fuzz. For Anux inc. #

View file

@ -1,4 +1,4 @@
Source: http://www.securityfocus.com/bid/42596/info
source: http://www.securityfocus.com/bid/42596/info
MySQL is prone to a denial-of-service vulnerability.

View file

@ -1,4 +1,4 @@
Source: http://www.securityfocus.com/bid/44987/info
source: http://www.securityfocus.com/bid/44987/info
Wireshark is prone to a buffer-overflow vulnerability.

View file

@ -1,4 +1,4 @@
Source: http://www.securityfocus.com/bid/45634/info
# source: http://www.securityfocus.com/bid/45634/info
#!/usr/bin/env python

View file

@ -1,5 +1,5 @@
/*
Source: http://www.securityfocus.com/bid/46563/info
source: http://www.securityfocus.com/bid/46563/info
GNU glibc is prone to a stack-corruption vulnerability.

View file

@ -1,4 +1,4 @@
Source: http://www.securityfocus.com/bid/52735/info
source: http://www.securityfocus.com/bid/52735/info
Wireshark is prone to a remote denial-of-service vulnerability caused by a NULL-pointer-dereference error.

View file

@ -1,4 +1,4 @@
Source: http://www.securityfocus.com/bid/53652/info
source: http://www.securityfocus.com/bid/53652/info
Wireshark is prone to a denial-of-service vulnerability because it fails to properly allocate memory.

View file

@ -1,4 +1,4 @@
Source: http://www.securityfocus.com/bid/53651/info
source: http://www.securityfocus.com/bid/53651/info
Wireshark is prone to multiple denial-of-service vulnerabilities.

View file

@ -1,4 +1,4 @@
Source: http://www.securityfocus.com/bid/53653/info
source: http://www.securityfocus.com/bid/53653/info
Wireshark is prone to a denial-of-service vulnerability.

View file

@ -1,4 +1,4 @@
Source: http://www.securityfocus.com/bid/55651/info
source: http://www.securityfocus.com/bid/55651/info
Oracle Database is prone to a remote security-bypass vulnerability that affects the authentication protocol.

View file

@ -1,4 +1,4 @@
Source: http://www.securityfocus.com/bid/43507/info
source: http://www.securityfocus.com/bid/43507/info
Tiki Wiki CMS Groupware is prone to a local file-include vulnerability and a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.

View file

@ -1,4 +1,4 @@
Source: http://www.securityfocus.com/bid/46846/info
source: http://www.securityfocus.com/bid/46846/info
Joomla! is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

View file

@ -1,4 +1,4 @@
Source: http://www.securityfocus.com/bid/53463/info
source: http://www.securityfocus.com/bid/53463/info
Galette is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

View file

@ -1,4 +1,4 @@
Source: http://www.securityfocus.com/bid/60823/info
source: http://www.securityfocus.com/bid/60823/info
GLPI is prone to a remote PHP code-execution vulnerability.

View file

@ -1,10 +1,10 @@
Source: http://www.securityfocus.com/bid/47049/info
source: http://www.securityfocus.com/bid/47049/info
<html>
<body onload="document.forms[0].submit()">
<form method="POST" action="http://localhost/feng_community/public/assets/javascript/slimey/save.php">
<input type="hidden" name="filename" value=""><script>alert(0)</script>" />
<input type="hidden" name="slimContent" value="&lt;/textarea&gt;<script>alert(0)</script>" />
<input type="hidden" name="slimContent" value="</textarea><script>alert(0)</script>" />
</form>
</body>
</html>

View file

@ -1,4 +1,4 @@
Source: http://www.securityfocus.com/archive/1/509995
source: http://www.securityfocus.com/archive/1/509995
======================================================================

View file

@ -1,4 +1,4 @@
Source: http://www.securityfocus.com/bid/54919/info
source: http://www.securityfocus.com/bid/54919/info
Solaris 10 Patch 137097-01 is prone to a local privilege-escalation vulnerability.

View file

@ -1,4 +1,4 @@
# Source: http://www.securityfocus.com/bid/39630/info
# source: http://www.securityfocus.com/bid/39630/info
Microsoft Windows is prone to a local privilege-escalation vulnerability.

View file

@ -1,4 +1,4 @@
Source: http://www.securityfocus.com/bid/42269/info
source: http://www.securityfocus.com/bid/42269/info
Microsoft Windows is prone to a local privilege-escalation vulnerability.

View file

@ -1,4 +1,4 @@
Source: http://www.securityfocus.com/bid/46856/info
source: http://www.securityfocus.com/bid/46856/info
Symantec LiveUpdate Administrator is prone to an HTML-injection vulnerability.