diff --git a/files.csv b/files.csv index ab860de4a..cf7478ab4 100755 --- a/files.csv +++ b/files.csv @@ -31515,3 +31515,9 @@ id,file,description,date,author,platform,type,port 34998,platforms/linux/remote/34998.txt,"Eclipse <= 3.6.1 Help Server help/index.jsp URI XSS",2010-11-16,"Aung Khant",linux,remote,0 34999,platforms/linux/remote/34999.txt,"Eclipse <= 3.6.1 Help Server help/advanced/content.jsp URI XSS",2010-11-16,"Aung Khant",linux,remote,0 35000,platforms/windows/dos/35000.txt,"SAP Netweaver Enqueue Server - Denial of Service",2014-10-17,"Core Security",windows,dos,3200 +35001,platforms/windows/remote/35001.txt,"SAP NetWeaver 7.0 SQL Monitor Multiple Cross Site Scripting Vulnerabilities",2010-11-17,a.polyakov,windows,remote,0 +35002,platforms/windows/remote/35002.html,"VLC Media Player 1.1.x Calling Convention Remote Buffer Overflow Vulnerability",2010-11-02,shinnai,windows,remote,0 +35003,platforms/multiple/remote/35003.txt,"IBM OmniFind 'command' Parameter Cross Site Scripting Vulnerability",2010-11-09,"Fatih Kilic",multiple,remote,0 +35004,platforms/php/webapps/35004.txt,"CompactCMS 1.4.1 Multiple Cross Site Scripting Vulnerabilities",2010-11-18,"High-Tech Bridge SA",php,webapps,0 +35005,platforms/windows/remote/35005.html,"WebKit Insufficient Entropy Random Number Generator Weakness (1)",2010-11-18,"Amit Klein",windows,remote,0 +35006,platforms/windows/remote/35006.html,"WebKit Insufficient Entropy Random Number Generator Weakness (2)",2010-11-18,"Amit Klein",windows,remote,0 diff --git a/platforms/multiple/remote/35003.txt b/platforms/multiple/remote/35003.txt new file mode 100755 index 000000000..b210d6510 --- /dev/null +++ b/platforms/multiple/remote/35003.txt @@ -0,0 +1,11 @@ +source: http://www.securityfocus.com/bid/44940/info + +IBM OmniFind is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data. + +An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. + +IBM OmniFind versions 8.5 and 9.0 are affected; other versions may also be vulnerable. + +NOTE: This issue was previously covered in BID 44740 (IBM OmniFind Multiple Vulnerabilities) but has been given its own record to better document it. + +http://www.example.com/ESAdmin/collection.do?command= \ No newline at end of file diff --git a/platforms/php/webapps/35004.txt b/platforms/php/webapps/35004.txt new file mode 100755 index 000000000..84cb41f63 --- /dev/null +++ b/platforms/php/webapps/35004.txt @@ -0,0 +1,14 @@ +source: http://www.securityfocus.com/bid/44949/info + +CompactCMS is prone to multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied input. + +Attacker-supplied script code would execute in the context of the affected site, potentially allowing the attacker to steal cookie-based authentication credentials. + +CompactCMS 1.4.1 is vulnerable; other versions may also be affected. + +http://www.example.com/?a="> +
\ No newline at end of file diff --git a/platforms/windows/remote/35001.txt b/platforms/windows/remote/35001.txt new file mode 100755 index 000000000..04ac013d2 --- /dev/null +++ b/platforms/windows/remote/35001.txt @@ -0,0 +1,12 @@ +source: http://www.securityfocus.com/bid/44904/info + + +The SQL Monitor of SAP NetWeaver is prone to multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied input. + +An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. + +http://www.example.com:50100/OpenSQLMonitors/servlet/ConnectionMonitorServlet?view=stmtpool&node=12924950&ds=SAPSR3DB&connid +=com.sap.sql.jdbc.direct.DirectPooledConnection@1ed00a7 + +http://www.example.com:50100/OpenSQLMonitors/servlet/CatalogBufferMonitorServlet?action=btnSHOW_COLUMNS&reqNode=12924950&reqBufferId= +SAPSERVER:dm0:SAPSR3DB&reqTableColumns=BC_RPROF_PROFILE \ No newline at end of file diff --git a/platforms/windows/remote/35002.html b/platforms/windows/remote/35002.html new file mode 100755 index 000000000..1dcf5b466 --- /dev/null +++ b/platforms/windows/remote/35002.html @@ -0,0 +1,94 @@ +source: http://www.securityfocus.com/bid/44909/info + +VLC Media Player is prone to a remote stack-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. + +Attackers could exploit this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely cause denial-of-service conditions. + +Versions prior to VLC Media Player 1.1.5 for Windows are vulnerable. + +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA1 + +======================================================================================================================== +======================================================================================================================== + VLC Multimedia Plug-in and/or Activex 1.1.4 MRL handler remote buffer overflow + + Author: shinnai + mail: shinnai[at]autistici[dot]org + site: http://www.shinnai.altervista.org/ + + This was written for educational purpose. Use it at your own risk. + Author will be not responsible for any damage. + + Note that the activex {9BE31822-FDAD-461B-AD51-BE1D1C159921} is marked as follow: + + RegKey Safe for Script: True + RegKey Safe for Init: True + Implements IObjectSafety: True + IDisp Safe: Safe for untrusted: caller,data + IPersist Safe: Safe for untrusted: caller,data + IPStorage Safe: Safe for untrusted: caller,data + + *** + + Note that the activex {E23FE9C6-778E-49D4-B537-38FCDE4887D8} is marked as follow: + + RegKey Safe for Script: True + RegKey Safe for Init: True + Implements IObjectSafety: True + IDisp Safe: Safe for untrusted: caller,data + IPersist Safe: Safe for untrusted: caller,data + IPStorage Safe: Safe for untrusted: caller,data + + Tested on: + Windows 7 professional full patched against Firefox 3.6.11 + Windows 7 professional full patched against Internet Explorer 8 +======================================================================================================================== +======================================================================================================================== + Plug-in Version: + + + + +======================================================================================================================== +======================================================================================================================== + Activex {9BE31822-FDAD-461B-AD51-BE1D1C159921} version: + + + + + +======================================================================================================================== +======================================================================================================================== + Activex {E23FE9C6-778E-49D4-B537-38FCDE4887D8} version: + + + + + +======================================================================================================================== +======================================================================================================================== + +-----BEGIN PGP SIGNATURE----- +Version: GnuPG v1.4.10 (MingW32) + +iQIcBAEBAgAGBQJMxpYiAAoJELleC2c7YdP1asMQALE8uuLZovZA9S7d2uwRJp3d +SrvQgKggqyQZ1z7ymDOzo74EGwHJVfSs/ix/xvE5lkYqlY31bEbsjHtqGRsKr0I0 +x12GGdW7JTxCiq/Fw2zLpjzE3xNpOwaFs+OR3BWuw1G6e9r1jooqlnN5mSTBEVlp +2y113XK2mo85S5cEYDTTm/YFHqrMF1Jy21eXLRfHs+13E2FPGM8viyCacTf02W8P +4VF2s4vVDC5mreqX/Rlts7roouHCZLJRaoFMyl5xcgv+BqGSOGIe9dLcUz18wwtJ +c8i1+ZGTbYmdfOAL8Kkexy96/lWfeewJBiA8s12qkzrm7xtjdpyt+cJdCelThEQP +/RVHLBmh7n03CzgCHG06DKfPnBtPgQquqFtMrYOsSZPJDNwGQEg1orZgcfpe9yVi +8LWbrKpAe0ay8gCF2o//wdJ6ht8Uuqn1LuXShVgPU1kBrQaNw7k+x6y0Xd0PxW3m +rFQQjsOzlrTbtw7SDCaPxxCwgIBWr4bekmfcIE4xiTBIVKAhT4AbfBG5H4zxTMpv +g5CJ6qifs3Zfb1sgQb6KKT+7j+4zZIcm0AA3L/8DjESYId8WiI/26eDn2/pX8hx0 +p5JxomSSkLHoO/alMUw4mR+4Rz9YhIuPZz7t6DiV21xn+xgBavRdT2Ztc9jA7yP1 +QBQRi/NSST3Gxu5ZaJXx +=2VZk +-----END PGP SIGNATURE----- \ No newline at end of file diff --git a/platforms/windows/remote/35005.html b/platforms/windows/remote/35005.html new file mode 100755 index 000000000..67d75fd9d --- /dev/null +++ b/platforms/windows/remote/35005.html @@ -0,0 +1,143 @@ +source: http://www.securityfocus.com/bid/44952/info + +WebKit is prone to a random-number-generator weakness. + +Attackers can exploit this issue by enticing an unsuspecting user into visiting a malicious webpage. + +Successful attacks will allow attackers to track user sessions and obtain personal information that can aid in further attacks. + +NOTE: This issue was previously covered in BID 44938 (Apple Safari Prior to 5.0.3 and 4.1.3 Multiple Security Vulnerabilities) but has been given its own record to better document it. + + + + +