Menu

Search for hundreds of thousands of exploits

"CA eSCC r8/1.0 / eTrust Audit r8/1.5 - Audit Event System Replay Attack"

Author

Exploit author

"Patrick Webster"

Platform

Exploit platform

windows

Release date

Exploit published date

2006-09-21

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
source: https://www.securityfocus.com/bid/20139/info
 
CA eTrust Security Command Center (eSCC) and eTrust Audit are prone to multiple vulnerabilities, including:
 
- an information-disclosure issue
- an arbitrary-file-deletion issue
- a replay issue.
 
These vulnerabilities occur because the software fails to validate user input and because of design errors in the way the software handles user permissions and secure data-transmission protocols.
 
An attacker may exploit these vulnerabilities to access sensitive information, delete arbitrary files with the permissions of the service account, and carry out external replay attacks.

The following command-line example will send a login-failure event:
etsapisend.exe -nod $dstIP -cat "System Access" -opr Logon -sta F -nam NT-Security -loc \\Domain\IIS_Server -usr System -evt 70 -src Security -nid 529 -inf "Logon Failure"
Release Date Title Type Platform Author
2020-12-02 "aSc TimeTables 2021.6.2 - Denial of Service (PoC)" local windows "Ismael Nava"
2020-12-02 "Anuko Time Tracker 1.19.23.5311 - No rate Limit on Password Reset functionality" webapps php "Mufaddal Masalawala"
2020-12-02 "Ksix Zigbee Devices - Playback Protection Bypass (PoC)" remote multiple "Alejandro Vazquez Vazquez"
2020-12-02 "Mitel mitel-cs018 - Call Data Information Disclosure" remote linux "Andrea Intilangelo"
2020-12-02 "Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Edit Profile" webapps multiple "Shahrukh Iqbal Mirza"
2020-12-02 "DotCMS 20.11 - Stored Cross-Site Scripting" webapps multiple "Hardik Solanki"
2020-12-02 "ChurchCRM 4.2.1 - Persistent Cross Site Scripting (XSS)" webapps multiple "Mufaddal Masalawala"
2020-12-02 "ChurchCRM 4.2.0 - CSV/Formula Injection" webapps multiple "Mufaddal Masalawala"
2020-12-02 "NewsLister - Authenticated Persistent Cross-Site Scripting" webapps multiple "Emre Aslan"
2020-12-02 "IDT PC Audio 1.0.6433.0 - 'STacSV' Unquoted Service Path" local windows "Manuel Alvarez"
Release Date Title Type Platform Author
2020-12-02 "aSc TimeTables 2021.6.2 - Denial of Service (PoC)" local windows "Ismael Nava"
2020-12-02 "IDT PC Audio 1.0.6433.0 - 'STacSV' Unquoted Service Path" local windows "Manuel Alvarez"
2020-12-02 "PRTG Network Monitor 20.4.63.1412 - 'maps' Stored XSS" webapps windows "Amin Rawah"
2020-12-02 "Microsoft Windows - Win32k Elevation of Privilege" local windows nu11secur1ty
2020-12-01 "Global Registration Service 1.0.0.3 - 'GREGsvc.exe' Unquoted Service Path" local windows "Emmanuel Lujan"
2020-12-01 "Pearson Vue VTS 2.3.1911 Installer - VUEApplicationWrapper Unquoted Service Path" local windows Jok3r
2020-12-01 "Intel(r) Management and Security Application 5.2 - User Notification Service Unquoted Service Path" local windows "Metin Yunus Kandemir"
2020-12-01 "10-Strike Network Inventory Explorer 8.65 - Buffer Overflow (SEH)" local windows Sectechs
2020-12-01 "EPSON Status Monitor 3 'EPSON_PM_RPCV4_06' - Unquoted Service Path" local windows SamAlucard
2020-11-30 "YATinyWinFTP - Denial of Service (PoC)" remote windows strider
Release Date Title Type Platform Author
2014-12-22 "Lotus Mail Encryption Server 2.1.0.1 (Protector for Mail) - Local File Inclusion / Remote Code Execution (Metasploit)" webapps php "Patrick Webster"
2014-12-19 "Varnish Cache CLI Interface - Remote Code Execution (Metasploit)" remote linux "Patrick Webster"
2011-07-20 "Cyberoam UTM - Multiple Cross-Site Scripting Vulnerabilities" webapps php "Patrick Webster"
2011-06-06 "Squiz Matrix 4 - 'colour_picker.php' Cross-Site Scripting" webapps php "Patrick Webster"
2011-05-02 "LANSA aXes Web Terminal TN5250 - 'axes_default.css' Cross-Site Scripting" webapps java "Patrick Webster"
2009-05-29 "SonicWALL SSL-VPN - 'cgi-bin/welcome/VirtualOffice' Remote Format String" remote hardware "Patrick Webster"
2009-04-02 "Asbru Web Content Management 6.5/6.6.9 - SQL Injection / Cross-Site Scripting" webapps asp "Patrick Webster"
2009-01-08 "PRTG Traffic Grapher 6.2.1 - 'url' Cross-Site Scripting" webapps java "Patrick Webster"
2008-04-07 "Tumbleweed SecureTransport 4.6.1 FileTransfer - ActiveX Buffer Overflow" remote windows "Patrick Webster"
2007-09-03 "CCProxy 6.2 - Telnet Proxy Ping Overflow (Metasploit)" remote windows "Patrick Webster"
2007-04-11 "webMethods Glue 6.5.1 Console - Directory Traversal" remote windows "Patrick Webster"
2006-09-22 "mysource 2.14.8/2.16 - Multiple Vulnerabilities" webapps php "Patrick Webster"
2006-09-22 "Google Mini Search Appliance 4.4.102.M.36 - Information Disclosure" webapps php "Patrick Webster"
2006-09-21 "CA eSCC r8/1.0 / eTrust Audit r8/1.5 - Audit Event System Replay Attack" remote windows "Patrick Webster"
2006-09-21 "CA eSCC r8/1.0 / eTrust Audit r8/1.5 - Web Server Full Path Disclosure" remote windows "Patrick Webster"
2006-09-21 "CA eSCC r8/1.0 / eTrust Audit r8/1.5 - Arbitrary File Manipulation" remote windows "Patrick Webster"
2005-08-09 "Apple Safari 1.3 Web Browser - JavaScript Invalid Address Denial of Service" dos osx "Patrick Webster"
import requests
response = requests.get('http://127.0.0.1:8181?format=json')

For full documentation follow the link above

Cipherscan. Find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.