Menu

Search for hundreds of thousands of exploits

"CA eSCC r8/1.0 / eTrust Audit r8/1.5 - Arbitrary File Manipulation"

Author

Exploit author

"Patrick Webster"

Platform

Exploit platform

windows

Release date

Exploit published date

2006-09-21

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
source: https://www.securityfocus.com/bid/20139/info
 
CA eTrust Security Command Center (eSCC) and eTrust Audit are prone to multiple vulnerabilities, including:
 
- an information-disclosure issue
- an arbitrary-file-deletion issue
- a replay issue.
 
These vulnerabilities occur because the software fails to validate user input and because of design errors in the way the software handles user permissions and secure data-transmission protocols.
 
An attacker may exploit these vulnerabilities to access sensitive information, delete arbitrary files with the permissions of the service account, and carry out external replay attacks.

https://www.example.com:8080/etrust/servlet/eSMPAuditServlet?verb=getadhochtml&eSCCAdHocHtmlFile=../../../../../../../boot.ini
Release Date Title Type Platform Author
2020-12-02 "aSc TimeTables 2021.6.2 - Denial of Service (PoC)" local windows "Ismael Nava"
2020-12-02 "Anuko Time Tracker 1.19.23.5311 - No rate Limit on Password Reset functionality" webapps php "Mufaddal Masalawala"
2020-12-02 "Ksix Zigbee Devices - Playback Protection Bypass (PoC)" remote multiple "Alejandro Vazquez Vazquez"
2020-12-02 "Mitel mitel-cs018 - Call Data Information Disclosure" remote linux "Andrea Intilangelo"
2020-12-02 "Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Edit Profile" webapps multiple "Shahrukh Iqbal Mirza"
2020-12-02 "DotCMS 20.11 - Stored Cross-Site Scripting" webapps multiple "Hardik Solanki"
2020-12-02 "ChurchCRM 4.2.1 - Persistent Cross Site Scripting (XSS)" webapps multiple "Mufaddal Masalawala"
2020-12-02 "ChurchCRM 4.2.0 - CSV/Formula Injection" webapps multiple "Mufaddal Masalawala"
2020-12-02 "NewsLister - Authenticated Persistent Cross-Site Scripting" webapps multiple "Emre Aslan"
2020-12-02 "IDT PC Audio 1.0.6433.0 - 'STacSV' Unquoted Service Path" local windows "Manuel Alvarez"
Release Date Title Type Platform Author
2020-12-02 "aSc TimeTables 2021.6.2 - Denial of Service (PoC)" local windows "Ismael Nava"
2020-12-02 "IDT PC Audio 1.0.6433.0 - 'STacSV' Unquoted Service Path" local windows "Manuel Alvarez"
2020-12-02 "PRTG Network Monitor 20.4.63.1412 - 'maps' Stored XSS" webapps windows "Amin Rawah"
2020-12-02 "Microsoft Windows - Win32k Elevation of Privilege" local windows nu11secur1ty
2020-12-01 "Global Registration Service 1.0.0.3 - 'GREGsvc.exe' Unquoted Service Path" local windows "Emmanuel Lujan"
2020-12-01 "Pearson Vue VTS 2.3.1911 Installer - VUEApplicationWrapper Unquoted Service Path" local windows Jok3r
2020-12-01 "Intel(r) Management and Security Application 5.2 - User Notification Service Unquoted Service Path" local windows "Metin Yunus Kandemir"
2020-12-01 "10-Strike Network Inventory Explorer 8.65 - Buffer Overflow (SEH)" local windows Sectechs
2020-12-01 "EPSON Status Monitor 3 'EPSON_PM_RPCV4_06' - Unquoted Service Path" local windows SamAlucard
2020-11-30 "YATinyWinFTP - Denial of Service (PoC)" remote windows strider
Release Date Title Type Platform Author
2014-12-22 "Lotus Mail Encryption Server 2.1.0.1 (Protector for Mail) - Local File Inclusion / Remote Code Execution (Metasploit)" webapps php "Patrick Webster"
2014-12-19 "Varnish Cache CLI Interface - Remote Code Execution (Metasploit)" remote linux "Patrick Webster"
2011-07-20 "Cyberoam UTM - Multiple Cross-Site Scripting Vulnerabilities" webapps php "Patrick Webster"
2011-06-06 "Squiz Matrix 4 - 'colour_picker.php' Cross-Site Scripting" webapps php "Patrick Webster"
2011-05-02 "LANSA aXes Web Terminal TN5250 - 'axes_default.css' Cross-Site Scripting" webapps java "Patrick Webster"
2009-05-29 "SonicWALL SSL-VPN - 'cgi-bin/welcome/VirtualOffice' Remote Format String" remote hardware "Patrick Webster"
2009-04-02 "Asbru Web Content Management 6.5/6.6.9 - SQL Injection / Cross-Site Scripting" webapps asp "Patrick Webster"
2009-01-08 "PRTG Traffic Grapher 6.2.1 - 'url' Cross-Site Scripting" webapps java "Patrick Webster"
2008-04-07 "Tumbleweed SecureTransport 4.6.1 FileTransfer - ActiveX Buffer Overflow" remote windows "Patrick Webster"
2007-09-03 "CCProxy 6.2 - Telnet Proxy Ping Overflow (Metasploit)" remote windows "Patrick Webster"
2007-04-11 "webMethods Glue 6.5.1 Console - Directory Traversal" remote windows "Patrick Webster"
2006-09-22 "mysource 2.14.8/2.16 - Multiple Vulnerabilities" webapps php "Patrick Webster"
2006-09-22 "Google Mini Search Appliance 4.4.102.M.36 - Information Disclosure" webapps php "Patrick Webster"
2006-09-21 "CA eSCC r8/1.0 / eTrust Audit r8/1.5 - Arbitrary File Manipulation" remote windows "Patrick Webster"
2006-09-21 "CA eSCC r8/1.0 / eTrust Audit r8/1.5 - Web Server Full Path Disclosure" remote windows "Patrick Webster"
2006-09-21 "CA eSCC r8/1.0 / eTrust Audit r8/1.5 - Audit Event System Replay Attack" remote windows "Patrick Webster"
2005-08-09 "Apple Safari 1.3 Web Browser - JavaScript Invalid Address Denial of Service" dos osx "Patrick Webster"
import requests
response = requests.get('http://127.0.0.1:8181?format=json')

For full documentation follow the link above

Cipherscan. Find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.