diff --git a/files.csv b/files.csv index 75be43ae1..fcb33b005 100755 --- a/files.csv +++ b/files.csv @@ -30910,3 +30910,11 @@ id,file,description,date,author,platform,type,port 34314,platforms/solaris/local/34314.sh,"Oracle Solaris Management Console WBEM Insecure Temporary File Creation Vulnerability",2010-07-13,"Frank Stuart",solaris,local,0 34315,platforms/php/webapps/34315.txt,"The Next Generation of Genealogy Sitebuilding 'searchform.php' Cross Site Scripting Vulnerability",2009-12-14,bi0,php,webapps,0 34316,platforms/hardware/remote/34316.txt,"Juniper Networks SA2000 SSL VPN Appliance 'welcome.cgi' Cross Site Scripting Vulnerability",2010-06-09,"Richard Brain",hardware,remote,0 +34317,platforms/php/webapps/34317.txt,"WS Interactive Automne 4.0 '228-recherche.php' Cross Site Scripting Vulnerability",2009-12-13,loneferret,php,webapps,0 +34318,platforms/php/webapps/34318.txt,"Zeecareers 2.0 Cross Site Scripting and Authentication Bypass Vulnerabilities",2009-12-13,bi0,php,webapps,0 +34319,platforms/php/webapps/34319.txt,"Ez Cart 'index.php' Cross Site Scripting Vulnerability",2009-12-14,anti-gov,php,webapps,0 +34320,platforms/php/webapps/34320.txt,"GetSimple CMS 2.01 admin/template/error_checking.php Multiple Parameter XSS",2010-07-15,Leonard,php,webapps,0 +34321,platforms/php/webapps/34321.txt,"Spitfire 1.0.381 Cross Site Scripting and Cross Site Request Forgery Vulnerabilities",2010-07-15,"Nijel the Destroyer",php,webapps,0 +34322,platforms/php/webapps/34322.txt,"phpwcms <= 1.4.5 'phpwcms.php' Cross Site Scripting Vulnerability",2010-07-15,"High-Tech Bridge SA",php,webapps,0 +34323,platforms/php/webapps/34323.html,"DSite CMS 4.81 'modmenu.php' Cross Site Scripting Vulnerability",2010-07-15,"High-Tech Bridge SA",php,webapps,0 +34324,platforms/php/webapps/34324.txt,"FestOS 2.3 'contents' Parameter Cross Site Scripting Vulnerability",2010-07-15,"High-Tech Bridge SA",php,webapps,0 diff --git a/platforms/php/webapps/34317.txt b/platforms/php/webapps/34317.txt new file mode 100755 index 000000000..51d1fbe91 --- /dev/null +++ b/platforms/php/webapps/34317.txt @@ -0,0 +1,10 @@ +source: http://www.securityfocus.com/bid/41686/info + +Automne is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. + +An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. + +Automne version 4.0.0rc2 is vulnerable; other versions may also be affected. + + +http://www.example.com/web/fr/228-recherche.php?q= \ No newline at end of file diff --git a/platforms/php/webapps/34318.txt b/platforms/php/webapps/34318.txt new file mode 100755 index 000000000..f4876d616 --- /dev/null +++ b/platforms/php/webapps/34318.txt @@ -0,0 +1,14 @@ +source: http://www.securityfocus.com/bid/41689/info + + +Zeecareers is prone to a cross-site scripting vulnerability and multiple authentication-bypass vulnerabilities. + +An attacker may leverage the cross-site scripting issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. + +The attacker may leverage the authentication-bypass issues to access information without proper authentication. + +Zeecareers version 2.0 is vulnerable; other versions may also be affected. + +The following example URI is available: + +http://www.example.com/basic_search_result.php?title=[XSS] \ No newline at end of file diff --git a/platforms/php/webapps/34319.txt b/platforms/php/webapps/34319.txt new file mode 100755 index 000000000..066a0b60f --- /dev/null +++ b/platforms/php/webapps/34319.txt @@ -0,0 +1,10 @@ +source: http://www.securityfocus.com/bid/41696/info + +Ez Cart is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. + +An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. + + +The following example URI is available: + +http://www.example.com/ezcart_demo/index.php?action=showcat&cid=1&sid="> \ No newline at end of file diff --git a/platforms/php/webapps/34320.txt b/platforms/php/webapps/34320.txt new file mode 100755 index 000000000..e8194538c --- /dev/null +++ b/platforms/php/webapps/34320.txt @@ -0,0 +1,25 @@ +source: http://www.securityfocus.com/bid/41697/info + +GetSimple CMS is prone to multiple cross-site scripting vulnerabilities, multiple local file-include vulnerabilities, an HTML-injection vulnerability, and a directory-traversal vulnerability. + +Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, to retrieve and possibly execute arbitrary files through the use of directory-traversal strings, to obtain potentially sensitive information, or to execute arbitrary local scripts in the context of the webserver process. + +GetSimple CMS 2.01 is vulnerable; other versions may also be affected. + +http://www.example.com/admin/template/error_checking.php?upd=bak-success&i18n[ER_BAKUP_DELETED]=[XSS] +http://www.example.com/admin/template/error_checking.php?upd=bak-err&i18n[ER_REQ_PROC_FAIL]=[XSS] +http://www.example.com/admin/template/error_checking.php?upd=bak-err&i18n[ERROR]=[XSS] +http://www.example.com/admin/template/error_checking.php?upd=edit-success&ptype=edit&i18n[ER_YOUR_CHANGES]=[XSS] +http://www.example.com/admin/template/error_checking.php?upd=edit-success&ptype=restore&i18n[ER_HASBEEN_REST]=[XSS] +http://www.example.com/admin/template/error_checking.php?upd=edit-success&ptype=delete&i18n[ER_HASBEEN_DEL]=[XSS] +http://www.example.com/admin/template/error_checking.php?upd=edit-success&ptype=delete&i18n[UNDO]=[XSS] +http://www.example.com/admin/template/error_checking.php?upd=edit-index&i18n[ER_CANNOT_INDEX]=[XSS] +http://www.example.com/admin/template/error_checking.php?restored=true&i18n[ER_OLD_RESTORED]=[XSS] +http://www.example.com/admin/template/error_checking.php?upd=pwd-success&i18n[ER_NEW_PWD_SENT]=[XSS] +http://www.example.com/admin/template/error_checking.php?upd=pwd-error&i18n[ER_SENDMAIL_ERR]=[XSS] +http://www.example.com/admin/template/error_checking.php?upd=del-success&i18n[ER_FILE_DEL_SUC]=[XSS] +http://www.example.com/admin/template/error_checking.php?upd=del-error&i18n[ER_PROBLEM_DEL]=[XSS] +http://www.example.com/admin/template/error_checking.php?upd=comp-success&i18n[ER_COMPONENT_SAVE]=[XSS] +http://www.example.com/admin/template/error_checking.php?upd=comp-restored&i18n[ER_COMPONENT_REST]=[XSS] +http://www.example.com/admin/template/error_checking.php?cancel=test&i18n[ER_CANCELLED_FAIL]=[XSS] +http://www.example.com/admin/template/error_checking.php?err=true&msg=[XSS] \ No newline at end of file diff --git a/platforms/php/webapps/34321.txt b/platforms/php/webapps/34321.txt new file mode 100755 index 000000000..ef250fbb6 --- /dev/null +++ b/platforms/php/webapps/34321.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/41701/info + +Spitfire is prone to multiple cross-site scripting vulnerabilities and a cross-site request-forgery vulnerability. + +An attacker may exploit these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, steal cookie-based authentication credentials, perform unauthorized actions, and disclose or modify sensitive information. Other attacks may also be possible. + +Spitfire 1.0.381 is vulnerable; other versions may also be affected. + +http://www.example.com/cont_index.php?cms_id=PAGE_ID&search=1"> \ No newline at end of file diff --git a/platforms/php/webapps/34322.txt b/platforms/php/webapps/34322.txt new file mode 100755 index 000000000..91826a8f9 --- /dev/null +++ b/platforms/php/webapps/34322.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/41720/info + +phpwcms is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. + +An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. + +phpwcms 1.4.5 is vulnerable; other versions may also be affected. + +http:/www.example.com/phpwcms.php?do=modules&module=calendar&calendardate=8-2010%22+onmouseover=alert%2834%29+style=position:absolute;width:100%;height:100%;left:0;top:0;+%22 \ No newline at end of file diff --git a/platforms/php/webapps/34323.html b/platforms/php/webapps/34323.html new file mode 100755 index 000000000..ce1c4039e --- /dev/null +++ b/platforms/php/webapps/34323.html @@ -0,0 +1,18 @@ +source: http://www.securityfocus.com/bid/41724/info + +DSite CMS is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. + +An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. + +DSite CMS 4.81 is vulnerable; prior versions may also be affected. + +
+ diff --git a/platforms/php/webapps/34324.txt b/platforms/php/webapps/34324.txt new file mode 100755 index 000000000..a4d32d35f --- /dev/null +++ b/platforms/php/webapps/34324.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/41725/info + +FestOS is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. + +An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. + +FestOS version 2.3b is vulnerable; other versions may also be affected. + + \ No newline at end of file