Updated 06_30_2014
This commit is contained in:
parent
bf1d5f6e68
commit
83e7971bfa
2 changed files with 3 additions and 3 deletions
|
@ -29521,7 +29521,7 @@ id,file,description,date,author,platform,type,port
|
||||||
32785,platforms/php/webapps/32785.txt,"Bitrix Site Manager 6/7 Multiple Input Validation Vulnerabilities",2009-02-09,aGGreSSor,php,webapps,0
|
32785,platforms/php/webapps/32785.txt,"Bitrix Site Manager 6/7 Multiple Input Validation Vulnerabilities",2009-02-09,aGGreSSor,php,webapps,0
|
||||||
32789,platforms/unix/remote/32789.rb,"Sophos Web Protection Appliance Interface Authenticated Arbitrary Command Execution",2014-04-10,metasploit,unix,remote,443
|
32789,platforms/unix/remote/32789.rb,"Sophos Web Protection Appliance Interface Authenticated Arbitrary Command Execution",2014-04-10,metasploit,unix,remote,443
|
||||||
32790,platforms/php/webapps/32790.txt,"XCloner Standalone 3.5 - CSRF Vulnerability",2014-04-10,"High-Tech Bridge SA",php,webapps,80
|
32790,platforms/php/webapps/32790.txt,"XCloner Standalone 3.5 - CSRF Vulnerability",2014-04-10,"High-Tech Bridge SA",php,webapps,80
|
||||||
32791,platforms/multiple/remote/32791.c,"Heartbleed OpenSSL - Information Leak Exploit",2014-04-10,prdelka,multiple,remote,443
|
32791,platforms/multiple/remote/32791.c,"Heartbleed OpenSSL - Information Leak Exploit (1)",2014-04-10,prdelka,multiple,remote,443
|
||||||
32792,platforms/php/webapps/32792.txt,"Orbit Open Ad Server 1.1.0 - SQL Injection",2014-04-10,"High-Tech Bridge SA",php,webapps,80
|
32792,platforms/php/webapps/32792.txt,"Orbit Open Ad Server 1.1.0 - SQL Injection",2014-04-10,"High-Tech Bridge SA",php,webapps,80
|
||||||
32793,platforms/windows/local/32793.rb,"MS14-017 Microsoft Word RTF Object Confusion",2014-04-10,metasploit,windows,local,0
|
32793,platforms/windows/local/32793.rb,"MS14-017 Microsoft Word RTF Object Confusion",2014-04-10,metasploit,windows,local,0
|
||||||
32794,platforms/php/remote/32794.rb,"Vtiger Install Unauthenticated Remote Command Execution",2014-04-10,metasploit,php,remote,80
|
32794,platforms/php/remote/32794.rb,"Vtiger Install Unauthenticated Remote Command Execution",2014-04-10,metasploit,php,remote,80
|
||||||
|
|
Can't render this file because it is too large.
|
|
@ -12,7 +12,7 @@
|
||||||
* heartbeat SSL extension. All versions of OpenSSL 1.0.1 to
|
* heartbeat SSL extension. All versions of OpenSSL 1.0.1 to
|
||||||
* 1.0.1f are known affected. You must run this against a target
|
* 1.0.1f are known affected. You must run this against a target
|
||||||
* which is linked to a vulnerable OpenSSL library using DTLS/TLS.
|
* which is linked to a vulnerable OpenSSL library using DTLS/TLS.
|
||||||
* This exploit leaks upto 65532 bytes of remote heap each request
|
* This exploit leaks upto 65535 bytes of remote heap each request
|
||||||
* and can be run in a loop until the connected peer ends connection.
|
* and can be run in a loop until the connected peer ends connection.
|
||||||
* The data leaked contains 16 bytes of random padding at the end.
|
* The data leaked contains 16 bytes of random padding at the end.
|
||||||
* The exploit can be used against a connecting client or server,
|
* The exploit can be used against a connecting client or server,
|
||||||
|
@ -619,7 +619,7 @@ int main(int argc, char* argv[]){
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if(ihost==0||iport==0||ifile==0||itype==0){
|
if(ihost==0||iport==0||ifile==0||itype==0||type < 0){
|
||||||
printf("[ try --help\n");
|
printf("[ try --help\n");
|
||||||
exit(0);
|
exit(0);
|
||||||
}
|
}
|
||||||
|
|
Loading…
Add table
Reference in a new issue