diff --git a/files.csv b/files.csv index e14d3a03a..65c3dd292 100755 --- a/files.csv +++ b/files.csv @@ -31562,3 +31562,5 @@ id,file,description,date,author,platform,type,port 35045,platforms/asp/webapps/35045.txt,"DotNetNuke 5.5.1 'InstallWizard.aspx' Cross Site Scripting Vulnerability",2010-12-03,"Richard Brain",asp,webapps,0 35048,platforms/asp/webapps/35048.txt,"Techno Dreams Articles & Papers Package 2.0 'ArticlesTablelist.asp' SQL Injection Vulnerability",2010-12-04,R4dc0re,asp,webapps,0 35049,platforms/asp/webapps/35049.txt,"Techno Dreams FAQ Manager Package 1.0 'faqlist.asp' SQL Injection Vulnerability",2010-12-04,R4dc0re,asp,webapps,0 +35050,platforms/php/webapps/35050.txt,"Alguest 1.1 'start' Parameter SQL Injection Vulnerability",2010-12-06,"Aliaksandr Hartsuyeu",php,webapps,0 +35051,platforms/windows/remote/35051.txt,"Freefloat FTP Server Directory Traversal Vulnerability",2010-12-06,Pr0T3cT10n,windows,remote,0 diff --git a/platforms/php/webapps/35050.txt b/platforms/php/webapps/35050.txt new file mode 100755 index 000000000..f99a4ba94 --- /dev/null +++ b/platforms/php/webapps/35050.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/45214/info + +Alguest is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in an SQL query. + +A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database. + +Alguest 1.1c-patched is vulnerable; other versions may also be affected. + +http://www.example.com/alguest/index.php?start=' \ No newline at end of file diff --git a/platforms/windows/remote/35051.txt b/platforms/windows/remote/35051.txt new file mode 100755 index 000000000..97fc07b88 --- /dev/null +++ b/platforms/windows/remote/35051.txt @@ -0,0 +1,7 @@ +source: http://www.securityfocus.com/bid/45218/info + +Freefloat FTP Server is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input. + +Exploiting this issue can allow an attacker to retrieve arbitrary files outside of the FTP server root directory. This may aid in further attacks. + +GET ../../boot.ini \ No newline at end of file