From 3f7869520454d4ce884530a5f206ae9246f35d42 Mon Sep 17 00:00:00 2001 From: Offensive Security Date: Fri, 29 May 2015 05:02:13 +0000 Subject: [PATCH] DB: 2015-05-29 2 new exploits --- files.csv | 2 + platforms/hardware/webapps/37135.txt | 7 +++ platforms/php/webapps/37134.php | 83 ++++++++++++++++++++++++++++ 3 files changed, 92 insertions(+) create mode 100755 platforms/hardware/webapps/37135.txt create mode 100755 platforms/php/webapps/37134.php diff --git a/files.csv b/files.csv index 8fd1577ed..cf6aef787 100755 --- a/files.csv +++ b/files.csv @@ -33513,3 +33513,5 @@ id,file,description,date,author,platform,type,port 37131,platforms/php/webapps/37131.txt,"MySQLDumper 1.24.4 main.php Multiple Function CSRF",2012-04-27,AkaStep,php,webapps,0 37132,platforms/php/webapps/37132.txt,"WordPress Plugin Free Counter 1.1 Stored XSS",2015-05-27,"Panagiotis Vagenas",php,webapps,80 37133,platforms/php/webapps/37133.txt,"MySQLDumper 1.24.4 index.php page Parameter XSS",2012-04-27,AkaStep,php,webapps,0 +37134,platforms/php/webapps/37134.php,"MySQLDumper 1.24.4 'menu.php' Remote PHP Code Execution Vulnerability",2012-04-27,AkaStep,php,webapps,0 +37135,platforms/hardware/webapps/37135.txt,"iGuard Security Access Control Device Firmware 3.6.7427A Cross Site Scripting Vulnerability",2012-05-02,"Usman Saeed",hardware,webapps,0 diff --git a/platforms/hardware/webapps/37135.txt b/platforms/hardware/webapps/37135.txt new file mode 100755 index 000000000..47526d002 --- /dev/null +++ b/platforms/hardware/webapps/37135.txt @@ -0,0 +1,7 @@ +source: http://www.securityfocus.com/bid/53355/info + +iGuard Security Access Control is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input in the embedded web server. + +An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. + +http://www.example.com/>