Updated 10_26_2014
This commit is contained in:
parent
2dfafcbe5d
commit
72d8ed3f5c
3 changed files with 18 additions and 0 deletions
|
@ -31562,3 +31562,5 @@ id,file,description,date,author,platform,type,port
|
|||
35045,platforms/asp/webapps/35045.txt,"DotNetNuke 5.5.1 'InstallWizard.aspx' Cross Site Scripting Vulnerability",2010-12-03,"Richard Brain",asp,webapps,0
|
||||
35048,platforms/asp/webapps/35048.txt,"Techno Dreams Articles & Papers Package 2.0 'ArticlesTablelist.asp' SQL Injection Vulnerability",2010-12-04,R4dc0re,asp,webapps,0
|
||||
35049,platforms/asp/webapps/35049.txt,"Techno Dreams FAQ Manager Package 1.0 'faqlist.asp' SQL Injection Vulnerability",2010-12-04,R4dc0re,asp,webapps,0
|
||||
35050,platforms/php/webapps/35050.txt,"Alguest 1.1 'start' Parameter SQL Injection Vulnerability",2010-12-06,"Aliaksandr Hartsuyeu",php,webapps,0
|
||||
35051,platforms/windows/remote/35051.txt,"Freefloat FTP Server Directory Traversal Vulnerability",2010-12-06,Pr0T3cT10n,windows,remote,0
|
||||
|
|
Can't render this file because it is too large.
|
9
platforms/php/webapps/35050.txt
Executable file
9
platforms/php/webapps/35050.txt
Executable file
|
@ -0,0 +1,9 @@
|
|||
source: http://www.securityfocus.com/bid/45214/info
|
||||
|
||||
Alguest is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in an SQL query.
|
||||
|
||||
A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database.
|
||||
|
||||
Alguest 1.1c-patched is vulnerable; other versions may also be affected.
|
||||
|
||||
http://www.example.com/alguest/index.php?start='
|
7
platforms/windows/remote/35051.txt
Executable file
7
platforms/windows/remote/35051.txt
Executable file
|
@ -0,0 +1,7 @@
|
|||
source: http://www.securityfocus.com/bid/45218/info
|
||||
|
||||
Freefloat FTP Server is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input.
|
||||
|
||||
Exploiting this issue can allow an attacker to retrieve arbitrary files outside of the FTP server root directory. This may aid in further attacks.
|
||||
|
||||
GET ../../boot.ini
|
Loading…
Add table
Reference in a new issue