Updated 06_30_2014
This commit is contained in:
parent
bf1d5f6e68
commit
83e7971bfa
2 changed files with 3 additions and 3 deletions
|
@ -29521,7 +29521,7 @@ id,file,description,date,author,platform,type,port
|
|||
32785,platforms/php/webapps/32785.txt,"Bitrix Site Manager 6/7 Multiple Input Validation Vulnerabilities",2009-02-09,aGGreSSor,php,webapps,0
|
||||
32789,platforms/unix/remote/32789.rb,"Sophos Web Protection Appliance Interface Authenticated Arbitrary Command Execution",2014-04-10,metasploit,unix,remote,443
|
||||
32790,platforms/php/webapps/32790.txt,"XCloner Standalone 3.5 - CSRF Vulnerability",2014-04-10,"High-Tech Bridge SA",php,webapps,80
|
||||
32791,platforms/multiple/remote/32791.c,"Heartbleed OpenSSL - Information Leak Exploit",2014-04-10,prdelka,multiple,remote,443
|
||||
32791,platforms/multiple/remote/32791.c,"Heartbleed OpenSSL - Information Leak Exploit (1)",2014-04-10,prdelka,multiple,remote,443
|
||||
32792,platforms/php/webapps/32792.txt,"Orbit Open Ad Server 1.1.0 - SQL Injection",2014-04-10,"High-Tech Bridge SA",php,webapps,80
|
||||
32793,platforms/windows/local/32793.rb,"MS14-017 Microsoft Word RTF Object Confusion",2014-04-10,metasploit,windows,local,0
|
||||
32794,platforms/php/remote/32794.rb,"Vtiger Install Unauthenticated Remote Command Execution",2014-04-10,metasploit,php,remote,80
|
||||
|
|
Can't render this file because it is too large.
|
|
@ -12,7 +12,7 @@
|
|||
* heartbeat SSL extension. All versions of OpenSSL 1.0.1 to
|
||||
* 1.0.1f are known affected. You must run this against a target
|
||||
* which is linked to a vulnerable OpenSSL library using DTLS/TLS.
|
||||
* This exploit leaks upto 65532 bytes of remote heap each request
|
||||
* This exploit leaks upto 65535 bytes of remote heap each request
|
||||
* and can be run in a loop until the connected peer ends connection.
|
||||
* The data leaked contains 16 bytes of random padding at the end.
|
||||
* The exploit can be used against a connecting client or server,
|
||||
|
@ -619,7 +619,7 @@ int main(int argc, char* argv[]){
|
|||
break;
|
||||
}
|
||||
}
|
||||
if(ihost==0||iport==0||ifile==0||itype==0){
|
||||
if(ihost==0||iport==0||ifile==0||itype==0||type < 0){
|
||||
printf("[ try --help\n");
|
||||
exit(0);
|
||||
}
|
||||
|
|
Loading…
Add table
Reference in a new issue