diff --git a/files.csv b/files.csv index dbb33eef5..09c35de12 100755 --- a/files.csv +++ b/files.csv @@ -19488,7 +19488,7 @@ id,file,description,date,author,platform,type,port 22259,platforms/linux/dos/22259.c,"BitchX 1.0 Malformed RPL_NAMREPLY Denial of Service Vulnerability",2003-01-30,argv,linux,dos,0 22260,platforms/cgi/webapps/22260.c,"cPanel 5.0 Guestbook.cgi Remote Command Execution Vulnerability (1)",2003-02-19,bob,cgi,webapps,0 22261,platforms/cgi/webapps/22261.pl,"cPanel 5.0 Guestbook.cgi Remote Command Execution Vulnerability (2)",2003-02-19,CaMaLeoN,cgi,webapps,0 -22262,platforms/cgi/webapps/22262.pl,"cPanel 5.0 Guestbook.cgi Remote Command Execution Vulnerability (3)",2003-02-19,SPAX,cgi,webapps,0 +22262,platforms/cgi/webapps/22262.pl,"cPanel 5.0 - Guestbook.cgi Remote Command Execution Vulnerability (3)",2003-02-19,SPAX,cgi,webapps,0 22263,platforms/cgi/webapps/22263.pl,"cPanel 5.0 Guestbook.cgi Remote Command Execution Vulnerability (4)",2003-02-19,pokleyzz,cgi,webapps,0 22264,platforms/linux/remote/22264.txt,"OpenSSL 0.9.x CBC Error Information Leakage Weakness",2003-02-19,"Martin Vuagnoux",linux,remote,0 22265,platforms/linux/local/22265.pl,"cPanel 5.0 Openwebmail Local Privileges Escalation Vulnerability",2003-02-19,deadbeat,linux,local,0 @@ -28623,7 +28623,7 @@ id,file,description,date,author,platform,type,port 31850,platforms/asp/webapps/31850.txt,"Campus Bulletin Board 3.4 - post3/Book.asp review Parameter XSS",2008-05-26,Unohope,asp,webapps,0 31851,platforms/asp/webapps/31851.txt,"Campus Bulletin Board 3.4 - post3/view.asp id Parameter SQL Injection",2008-05-26,Unohope,asp,webapps,0 31852,platforms/asp/webapps/31852.txt,"Campus Bulletin Board 3.4 - post3/book.asp review Parameter SQL Injection",2008-05-26,Unohope,asp,webapps,0 -31853,platforms/windows/remote/31853.py,"Symantec Endpoint Protection Manager - Remote Command Execution Exploit",2014-02-23,"Chris Graham",windows,remote,0 +31853,platforms/windows/remote/31853.py,"Symantec Endpoint Protection Manager 11.0, 12.0, 12.1 - Remote Command Execution Exploit",2014-02-23,"Chris Graham",windows,remote,0 31854,platforms/asp/webapps/31854.html,"The Campus Request Repairs System 1.2 - 'sentout.asp' Unauthorized Access Vulnerability",2008-05-26,Unohope,asp,webapps,0 31855,platforms/php/webapps/31855.txt,"Tr Script News 2.1 - 'news.php' Cross-Site Scripting Vulnerability",2008-05-27,ZoRLu,php,webapps,0 31856,platforms/windows/dos/31856.html,"CA Internet Security Suite - 'UmxEventCli.dll' ActiveX Control Arbitrary File Overwrite Vulnerability",2008-05-28,Nine:Situations:Group,windows,dos,0 @@ -30647,3 +30647,7 @@ id,file,description,date,author,platform,type,port 34027,platforms/solaris/dos/34027.txt,"Sun Solaris 10 Nested Directory Tree Local Denial of Service Vulnerability",2010-05-21,"Maksymilian Arciemowicz",solaris,dos,0 34028,platforms/solaris/dos/34028.txt,"Sun Solaris 10 'in.ftpd' Long Command Handling Security Vulnerability",2010-05-21,"Maksymilian Arciemowicz",solaris,dos,0 34029,platforms/php/webapps/34029.txt,"Specialized Data Systems Parent Connect 2010.04.11 Multiple SQL Injection Vulnerabilities",2010-05-21,epixoip,php,webapps,0 +34030,platforms/lin_x86/webapps/34030.txt,"Infoblox 6.8.2.11 - OS Command Injection",2014-07-10,"Nate Kettlewell",lin_x86,webapps,0 +34031,platforms/php/webapps/34031.txt,"gpEasy CMS 1.6.2 'editing_files.php' Cross Site Scripting Vulnerability",2010-05-18,"High-Tech Bridge SA",php,webapps,0 +34032,platforms/php/webapps/34032.txt,"NPDS Revolution 10.02 'admin.php' Cross-Site Request Forgery Vulnerability",2010-05-20,"High-Tech Bridge SA",php,webapps,0 +34033,platforms/hardware/remote/34033.html,"Cisco DPC2100 2.0.2 r1256-060303 Multiple Security Bypass and Cross-Site Request Forgery Vulnerabilities",2010-05-24,"Dan Rosenberg",hardware,remote,0 diff --git a/platforms/cgi/webapps/22262.pl b/platforms/cgi/webapps/22262.pl index f71fea78b..61d0a2b64 100755 --- a/platforms/cgi/webapps/22262.pl +++ b/platforms/cgi/webapps/22262.pl @@ -6,6 +6,8 @@ An attacker may exploit this vulnerability to execute commands in the security c This vulnerability has been reported to affect cPanel version 5, previous versions may also be affected. + + ##################################################### # cpanel-plus.pl exploit # Spawn bash style Shell on Apache CPANEL diff --git a/platforms/hardware/remote/34033.html b/platforms/hardware/remote/34033.html new file mode 100755 index 000000000..689b60538 --- /dev/null +++ b/platforms/hardware/remote/34033.html @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/40346/info + +Cisco DPC2100 (formerly Scientific Atlanta DPC2100) is prone to multiple security-bypass and cross-site request-forgery vulnerabilities. + +Successful exploits may allow attackers to run privileged commands on the affected device, change configuration settings, modify device firmware, cause denial-of-service conditions, or inject arbitrary script code. Other attacks are also possible. + +Firmware versions prior to 2.0.2.r1256-100324as are vulnerable. + +