exploit-db-mirror/platforms/php/webapps/4670.txt
Offensive Security f1ca42d762 DB: 2016-10-26
1 new exploits

WarFTP 1.65 (Windows 2000 SP4) - (USER) Remote Buffer Overflow
WarFTP 1.65 (Windows 2000 SP4) - (USER) Remote Buffer Overflow (Python)

WarFTP 1.65 - (USER) Remote Buffer Overflow SEH Overflow
WarFTP 1.65 (Windows 2000 SP4) - (USER) Remote Buffer Overflow (Perl)

Apple QuickTime 7.2/7.3 - RTSP Response Remote Overwrite (SEH) (PoC)
Apple QuickTime 7.2/7.3 - RTSP Response Remote Overwrite (SEH)

Apple QuickTime 7.2/7.3 - RTSP Response Universal Exploit (Internet Explorer 7 / Firefox / Opera)
Apple QuickTime 7.2/7.3 (Internet Explorer 7 / Firefox / Opera) - RTSP Response Universal Exploit

PHP-CON 1.3 - (include.php) Remote File Inclusion
PHP-CON 1.3 - 'include.php' Remote File Inclusion

RealPlayer 11 - Malformed AU File Denial of Service
RealPlayer 11 - '.au' Denial of Service

VideoLAN VLC Media Player 0.86 < 0.86d - ActiveX Remote Bad Pointer Initialization (PoC)
VideoLAN VLC Media Player 0.86 < 0.86d - ActiveX Remote Bad Pointer Initialization

Nullsoft Winamp 5.32 - MP4 tags Stack Overflow
Nullsoft Winamp 5.32 - MP4 Tags Stack Overflow

viart cms/shop/helpdesk 3.3.2 - Remote File Inclusion
ViArt CMS/Shop/Helpdesk 3.3.2 - Remote File Inclusion

Samba 3.0.27a - send_mailslot() Remote Buffer Overflow (PoC)
Samba 3.0.27a - send_mailslot() Remote Buffer Overflow
Horde Web-Mail 3.x - (go.php) Remote File Disclosure
CuteNews 1.1.1 - (html.php) Remote Code Execution
Horde Web-Mail 3.x - 'go.php' Remote File Disclosure
CuteNews 1.1.1 - 'html.php' Remote Code Execution

TUTOS 1.3 - (cmd.php) Remote Command Execution
TUTOS 1.3 - 'cmd.php' Remote Command Execution
PHP Webquest 2.6 - (id_actividad) SQL Injection
Move Networks Quantum Streaming Player - Overwrite (SEH)
Gateway Weblaunch - ActiveX Control Insecure Method Exploit
PHP Webquest 2.6 - 'id_actividad' Parameter SQL Injection
Move Networks Quantum Streaming Player - SEH Overflow
Gateway Weblaunch - ActiveX Control Insecure Method
Microsoft FoxServer - (vfp6r.dll 6.0.8862.0) ActiveX Command Execution
Microsoft Rich Textbox Control 6.0 - (SP6) SaveFile() Insecure Method
Microsoft FoxServer - 'vfp6r.dll 6.0.8862.0' ActiveX Command Execution
Microsoft Rich Textbox Control 6.0-SP6 - 'SaveFile()' Insecure Method

McAfee E-Business Server - Remote Unauthenticated Code Execution / Denial of Service (PoC)
McAfee E-Business Server 8.5.2 - Remote Unauthenticated Code Execution / Denial of Service (PoC)

Microsoft Visual InterDev 6.0 - (SP6) .sln File Local Buffer Overflow
Microsoft Visual InterDev 6.0-SP6 - '.sln' Local Buffer Overflow

StreamAudio ChainCast ProxyManager - ccpm_0237.dll Buffer Overflow
StreamAudio ChainCast ProxyManager - 'ccpm_0237.dll' Buffer Overflow

XnView 1.92.1 - Slideshow (FontName) Buffer Overflow
XnView 1.92.1 - (FontName) Slideshow Buffer Overflow

Phaos R4000 Version (file) - Remote File Disclosure
Phaos R4000 Version - 'file' Remote File Disclosure

ASPPortal Free Version (Topic_Id) - SQL Injection
ASPPortal Free Version - 'Topic_Id' SQL Injection

Alibaba Clone Tritanium Version (news_desc.html) - SQL Injection
Alibaba Clone Tritanium Version - 'news_desc.html' SQL Injection

XnView 1.97.4 - MBM File Remote Heap Buffer Overflow
XnView 1.97.4 - '.MBM' File Remote Heap Buffer Overflow

Fortigate OS Version 4.x < 5.0.7 - SSH Backdoor
Fortigate OS 4.x < 5.0.7 - SSH Backdoor

Network Scanner Version 4.0.0.0 - SEH Crash (PoC)
Network Scanner 4.0.0.0 - SEH Crash (PoC)

Ruby on Rails - Dynamic Render File Upload Remote Code Execution
Ruby on Rails - Dynamic Render File Upload / Remote Code Execution

Network Scanner 4.0.0 - SEH Local Buffer Overflow
2016-10-26 05:01:17 +00:00

9 lines
226 B
Text
Executable file

PHP-CON 1.3 - 'include.php' Remote File Inclusion
Script : http://sourceforge.net/project/showfiles.php?group_id=182182
POC :
/PHP_CON/Exchange/include.php?webappcfg[APPPATH]= Evil Code
# milw0rm.com [2007-11-28]