diff --git a/files.csv b/files.csv index ee6da66c8..29150152c 100755 --- a/files.csv +++ b/files.csv @@ -35535,3 +35535,7 @@ id,file,description,date,author,platform,type,port 39292,platforms/multiple/remote/39292.pl,"Granding MA300 Traffic Sniffing MitM Fingerprint PIN Disclosure",2014-08-26,"Eric Sesterhenn",multiple,remote,0 39293,platforms/multiple/remote/39293.pl,"Granding MA300 Weak Pin Encryption Brute-force Weakness",2014-08-26,"Eric Sesterhenn",multiple,remote,0 39294,platforms/php/webapps/39294.txt,"Joomla! Spider Video Player Extension 'theme' Parameter SQL Injection Vulnerability",2014-08-26,"Claudio Viviani",php,webapps,0 +39295,platforms/multiple/remote/39295.js,"Mozilla Firefox <= 9.0.1 and Thunderbird <= 3.1.20 Information Disclosure Vulnerability",2014-09-02,"Michal Zalewski",multiple,remote,0 +39296,platforms/php/webapps/39296.txt,"WordPress Urban City Theme 'download.php' Arbitrary File Download Vulnerabilitiy",2014-09-08,"Ashiyane Digital Security Team",php,webapps,0 +39297,platforms/php/webapps/39297.txt,"WordPress Authentic Theme 'download.php' Arbitrary File Download Vulnerabilitiy",2014-09-08,"Ashiyane Digital Security Team",php,webapps,0 +39298,platforms/php/webapps/39298.txt,"WordPress Epic Theme 'download.php' Arbitrary File Download Vulnerabilitiy",2014-09-08,"Ashiyane Digital Security Team",php,webapps,0 diff --git a/platforms/multiple/remote/39295.js b/platforms/multiple/remote/39295.js new file mode 100755 index 000000000..780305a64 --- /dev/null +++ b/platforms/multiple/remote/39295.js @@ -0,0 +1,140 @@ +source: http://www.securityfocus.com/bid/69525/info + +Mozilla Firefox and Thunderbird are prone to an information-disclosure vulnerability. + +Attackers can exploit this issue to disclose sensitive information that may aid in further attacks. + +This issue is fixed in: + +Firefox 32 +Firefox ESR 31.1 +Thunderbird 31.1 + + + +
+ +