diff --git a/files.csv b/files.csv index 817302eea..64605e996 100755 --- a/files.csv +++ b/files.csv @@ -31731,7 +31731,7 @@ id,file,description,date,author,platform,type,port 35226,platforms/windows/remote/35226.py,"Avira AntiVir Personal Multiple Code Execution Vulnerabilities (2)",2011-01-14,D.Elser,windows,remote,0 35227,platforms/php/webapps/35227.txt,"Alguest 1.1c-patched 'elimina' Parameter SQL Injection Vulnerability",2011-01-14,"Aliaksandr Hartsuyeu",php,webapps,0 35228,platforms/php/webapps/35228.txt,"CompactCMS 1.4.1 Multiple Cross Site Scripting Vulnerabilities",2011-01-15,NLSecurity,php,webapps,0 -35229,platforms/windows/remote/35229.html,"Internet Explorer < 11 - OLE Automation Array Remote Code Execution",2014-11-13,yuange,windows,remote,0 +35229,platforms/windows/remote/35229.html,"Internet Explorer <= 11 - OLE Automation Array Remote Code Execution (#1)",2014-11-13,yuange,windows,remote,0 35230,platforms/windows/remote/35230.rb,"Internet Explorer < 11 - OLE Automation Array Remote Code Execution (MSF)",2014-11-13,"Wesley Neelen & Rik van Duijn",windows,remote,0 35231,platforms/php/webapps/35231.txt,"Advanced Webhost Billing System 2.9.2 'oid' Parameter SQL Injection Vulnerability",2011-01-16,ShivX,php,webapps,0 35232,platforms/linux/remote/35232.txt,"Pango Font Parsing 'pangoft2-render.c' Heap Corruption Vulnerability",2011-01-18,"Dan Rosenberg",linux,remote,0 @@ -31800,3 +31800,8 @@ id,file,description,date,author,platform,type,port 35305,platforms/php/webapps/35305.txt,"ACollab 't' Parameter SQL Injection Vulnerability",2011-02-01,"AutoSec Tools",php,webapps,0 35306,platforms/php/webapps/35306.txt,"TCExam 11.1.16 'user_password' Parameter Cross Site Scripting Vulnerability",2011-02-02,"AutoSec Tools",php,webapps,0 35307,platforms/php/webapps/35307.py,"All In One Control Panel 1.4.1 'cp_menu_data_file.php' SQL Injection Vulnerability",2011-01-31,"AutoSec Tools",php,webapps,0 +35308,platforms/windows/remote/35308.html,"Internet Explorer OLE Pre-IE11 - Automation Array Remote Code Execution / Powershell VirtualAlloc (MS14-064)",2014-11-20,"GradiusX & b33f",windows,remote,0 +35309,platforms/php/webapps/35309.txt,"Betsy 4.0 'page' Parameter Local File Include Vulnerability",2011-02-02,MizoZ,php,webapps,0 +35310,platforms/asp/webapps/35310.txt,"Web Wiz Forums <= 9.5 Multiple SQL Injection Vulnerabilities",2011-03-23,eXeSoul,asp,webapps,0 +35311,platforms/php/webapps/35311.txt,"Octeth Oempro 3.6.4 SQL Injection and Information Disclosure Vulnerabilities",2011-02-03,"Ignacio Garrido",php,webapps,0 +35312,platforms/php/webapps/35312.txt,"Firebook 'index.html' Cross Site Scripting Vulnerability",2011-02-03,MustLive,php,webapps,0 diff --git a/platforms/asp/webapps/35310.txt b/platforms/asp/webapps/35310.txt new file mode 100755 index 000000000..e4646ec68 --- /dev/null +++ b/platforms/asp/webapps/35310.txt @@ -0,0 +1,8 @@ +source: http://www.securityfocus.com/bid/46131/info + +Web Wiz Forums is prone to multiple SQL-injection vulnerabilities because the application fails to properly sanitize user-supplied input before using it in an SQL query. + +A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database. + +http://www.example.com/default.asp?pid=[SQLi] +http://www.example.com/viewproduct.asp?PID=[SQli] \ No newline at end of file diff --git a/platforms/php/webapps/35309.txt b/platforms/php/webapps/35309.txt new file mode 100755 index 000000000..6c17228e0 --- /dev/null +++ b/platforms/php/webapps/35309.txt @@ -0,0 +1,9 @@ +source: http://www.securityfocus.com/bid/46124/info + +Betsy is prone to a local file-include vulnerability because it fails to properly sanitize user-supplied input. + +An attacker can exploit this vulnerability to obtain potentially sensitive information and to execute arbitrary local scripts in the context of the webserver process. This may allow the attacker to compromise the application and the computer; other attacks are also possible. + +Betsy 4.0 is vulnerable; other versions may also be affected. + +http://www.example.com/ress.php?page=[LFI] \ No newline at end of file diff --git a/platforms/php/webapps/35311.txt b/platforms/php/webapps/35311.txt new file mode 100755 index 000000000..1d671f3d7 --- /dev/null +++ b/platforms/php/webapps/35311.txt @@ -0,0 +1,17 @@ +source: http://www.securityfocus.com/bid/46135/info + +Octeth Oempro is prone to multiple SQL-injection vulnerabilities and an information-disclosure vulnerability. + +Exploiting these issues could allow an attacker to obtain sensitive information, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. + +Octeth Oempro 3.6.4 is vulnerable; other versions may also be affected. + +http://www.example.com/cli_bounce.php + +http://www.example.com/link.php?URL=[ENC URL]&Name=&EncryptedMemberID=[ENCODED +SQLI]&CampaignID=9&CampaignStatisticsID=16&Demo=0&Email=[MAIL] + +http://www.example.com/html_version.php?ECID=[SQL] + +http://www.example.com/archive.php?ArchiveID=[SQL] + diff --git a/platforms/php/webapps/35312.txt b/platforms/php/webapps/35312.txt new file mode 100755 index 000000000..9830ae78c --- /dev/null +++ b/platforms/php/webapps/35312.txt @@ -0,0 +1,7 @@ +source: http://www.securityfocus.com/bid/46143/info + +Firebook is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied input. + +Exploiting these issues will allow an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site and steal cookie-based authentication credentials. + +http://www.example.com/env/index.html?[xss] \ No newline at end of file diff --git a/platforms/windows/remote/35308.html b/platforms/windows/remote/35308.html new file mode 100755 index 000000000..5ae4f560a --- /dev/null +++ b/platforms/windows/remote/35308.html @@ -0,0 +1,230 @@ + + + + +
+ ++|--------------------------------------------------------------------------| +| Title: OLE Automation Array Remote Code Execution => Pre IE11 | +| Original Exploit: yuange - http://www.exploit-db.com/exploits/35229/ | +| Rework: GradiusX (francescomifsud@gmail.com ) & b33f (@FuzzySec) | +| Shellcode: Use the Veil-Framework, powershell/shellcode_inject/virtual | +| Usage: http://www.fuzzysecurity.com/exploits/21.html | +|--------------------------------------------------------------------------| + Very nice black-magic yuange, don't think it went unnoticed that you + have been popping shells since 2009 :D ??????????? +|--------------------------------------------------------------------------| ++ + + + + + + \ No newline at end of file