CVE-2014-2022 - vbulletin 4.x - SQLi in breadcrumbs via xmlrpc API (post-auth) ============================================================================== Overview -------- date : 10/12/2014 cvss : 7.1 (AV:N/AC:H/Au:S/C:C/I:C/A:C) base cwe : 89 ve
Source: http://seclists.org/fulldisclosure/2016/Jul/51 -------------------------------------------------------------------- User Enumeration using Open SSHD (=Latest version). ------------------------------------------------------------------- Abstra
#!/usr/bin/env python2.7# # [SOF]## [Remote Format String Exploit] Axis Communications MPQT/PACS Server Side Include (SSI) Daemon# Research and development by bashis mcw noemail eu 2016## This format string vulnerability has following characteristic
/* * thrsleep_panic.c * Demonstrate a panic through the __thrsleep system call. * * gcc -g thrsleep_panic.c -o thrsleep_panic */ #ifdef BUG_WRITEUP //--------------------------------------------------- __thrsleep validation is insufficient and can l
/* * unmount_panic.c * Demonstrate a panic through the unmount system call. * * gcc -g unmount_panic.c -o unmount_panic */ #ifdef BUG_WRITEUP //--------------------------------------------------- Unmounting with MNT_DOOMED flag can lead to a kernel
/* * ufs_getdents_panic.c * Demonstrate a panic in UFS through the getdents system call. * * gcc -g ufs_getdents_panic.c -o ufs_getdents_panic */ #ifdef BUG_WRITEUP //--------------------------------------------------- Any user can panic the kernel
/* * tmpfs_mknod_panic.c: * Demonstrate a panic in tmpfs when performing mknod * * gcc -g tmpfs_mknod_panic.c -o tmpfs_mknod_panic */ #ifdef BUG_WRITEUP //--------------------------------------------------- Root can panic kernel with mknod on a tmpf
/* * thrsigdivert_panic.c * Demonstrate a panic through the __thrsigdivert system call. * * gcc -g thrsigdivert_panic.c -o thrsigdivert_panic */ #ifdef BUG_WRITEUP //--------------------------------------------------- __thrsigdivert validation is in
/* * mount_panic.c * Demonstrate a panic through the mount system call. * * gcc -g mount_panic.c -o mount_panic */ #ifdef BUG_WRITEUP //--------------------------------------------------- Tmpfs mount with bad args can lead to a panic Impact: Root us
/* * kevent_panic.c * Demonstrate a panic through the kevent system call. * * gcc -g kevent_panic.c -o kevent_panic */ #ifdef BUG_WRITEUP //--------------------------------------------------- kevent with large ident can lead to a panic Impact: Any l
#!/usr/bin/python #################################################################################### #Author : PentesterDesk #Date : 10-July-2016 #Software: Prestashop CMS #vuln Mod: vtermslidesshow #Greetz to all indian hackers and special thanks