From cbc2c5d09ffa32e9c0852e4e3ea7f4c613b1e339 Mon Sep 17 00:00:00 2001 From: Offensive Security Date: Wed, 14 Jan 2015 08:35:29 +0000 Subject: [PATCH] Update: 2015-01-14 5 new exploits --- files.csv | 5 +++++ platforms/hardware/remote/35762.txt | 11 +++++++++++ platforms/hardware/remote/35763.txt | 14 ++++++++++++++ platforms/hardware/remote/35764.txt | 15 +++++++++++++++ platforms/hardware/remote/35765.txt | 14 ++++++++++++++ platforms/hardware/remote/35766.txt | 11 +++++++++++ 6 files changed, 70 insertions(+) create mode 100755 platforms/hardware/remote/35762.txt create mode 100755 platforms/hardware/remote/35763.txt create mode 100755 platforms/hardware/remote/35764.txt create mode 100755 platforms/hardware/remote/35765.txt create mode 100755 platforms/hardware/remote/35766.txt diff --git a/files.csv b/files.csv index dc46c2a4b..1f45f62d6 100755 --- a/files.csv +++ b/files.csv @@ -32215,3 +32215,8 @@ id,file,description,date,author,platform,type,port 35759,platforms/php/webapps/35759.txt,"eFront 3.6.9 'submitScore.php' Cross Site Scripting Vulnerability",2011-05-16,"John Leitch",php,webapps,0 35760,platforms/php/webapps/35760.txt,"PHP Calendar Basic 2.3 Multiple Cross Site Scripting Vulnerabilities",2011-05-17,"High-Tech Bridge SA",php,webapps,0 35761,platforms/php/webapps/35761.txt,"TWiki <= 5.0.1 'origurl' Parameter Cross Site Scripting Vulnerability",2011-05-18,"Mesut Timur",php,webapps,0 +35762,platforms/hardware/remote/35762.txt,"Cisco Unified Operations Manager <= 8.5 iptm/advancedfind.do extn Parameter XSS",2011-06-18,"Sense of Security",hardware,remote,0 +35763,platforms/hardware/remote/35763.txt,"Cisco Unified Operations Manager <= 8.5 iptm/ddv.do deviceInstanceName Parameter XSS",2011-06-18,"Sense of Security",hardware,remote,0 +35764,platforms/hardware/remote/35764.txt,"Cisco Unified Operations Manager <= 8.5 iptm/eventmon Multiple Parameter XSS",2011-06-18,"Sense of Security",hardware,remote,0 +35765,platforms/hardware/remote/35765.txt,"Cisco Unified Operations Manager <= 8.5 iptm/faultmon/ui/dojo/Main/eventmon_wrapper.jsp Multiple Parameter XSS",2011-06-18,"Sense of Security",hardware,remote,0 +35766,platforms/hardware/remote/35766.txt,"Cisco Unified Operations Manager <= 8.5 iptm/logicalTopo.do Multiple Parameter XSS",2011-06-18,"Sense of Security",hardware,remote,0 diff --git a/platforms/hardware/remote/35762.txt b/platforms/hardware/remote/35762.txt new file mode 100755 index 000000000..787d6c41a --- /dev/null +++ b/platforms/hardware/remote/35762.txt @@ -0,0 +1,11 @@ +source: http://www.securityfocus.com/bid/47901/info + +Cisco Unified Operations Manager is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. + +An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials. Other attacks may also be possible. + +This issue is being tracked by Cisco Bug ID CSCtn61716. + +Cisco Unified Operations Manager versions prior to 8.6 are vulnerable. + +http://www.example.com/iptm/advancedfind.do?extn=73fcb23fbe43447 \ No newline at end of file diff --git a/platforms/hardware/remote/35763.txt b/platforms/hardware/remote/35763.txt new file mode 100755 index 000000000..f03a69655 --- /dev/null +++ b/platforms/hardware/remote/35763.txt @@ -0,0 +1,14 @@ +source: http://www.securityfocus.com/bid/47901/info + +Cisco Unified Operations Manager is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. + +An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials. Other attacks may also be possible. + +This issue is being tracked by Cisco Bug ID CSCtn61716. + +Cisco Unified Operations Manager versions prior to 8.6 are vulnerable. + +http://www.example.com/iptm/ddv.do?deviceInstanceName=f3806"%3balert(1)//9b92b050cf5&deviceC +apability=deviceCap +http://www.example.com/iptm/ddv.do?deviceInstanceName=25099f813ea8c +06d&deviceCapability=deviceCap \ No newline at end of file diff --git a/platforms/hardware/remote/35764.txt b/platforms/hardware/remote/35764.txt new file mode 100755 index 000000000..4dbc8d101 --- /dev/null +++ b/platforms/hardware/remote/35764.txt @@ -0,0 +1,15 @@ +source: http://www.securityfocus.com/bid/47901/info + +Cisco Unified Operations Manager is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. + +An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials. Other attacks may also be possible. + +This issue is being tracked by Cisco Bug ID CSCtn61716. + +Cisco Unified Operations Manager versions prior to 8.6 are vulnerable. + +http://www.example.com/iptm/eventmon?cmd=filterHelperca99b542256870 +d5&viewname=device.filter&operation=getFilter&dojo.preventCache=129851 +8961028 +http://www.example.com/iptm/eventmon?cmd=getDeviceData&group=/3309d +09520eb762c&dojo.preventCache=1298518963370 \ No newline at end of file diff --git a/platforms/hardware/remote/35765.txt b/platforms/hardware/remote/35765.txt new file mode 100755 index 000000000..591c554c9 --- /dev/null +++ b/platforms/hardware/remote/35765.txt @@ -0,0 +1,14 @@ +source: http://www.securityfocus.com/bid/47901/info + +Cisco Unified Operations Manager is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. + +An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials. Other attacks may also be possible. + +This issue is being tracked by Cisco Bug ID CSCtn61716. + +Cisco Unified Operations Manager versions prior to 8.6 are vulnerable. + +http://www.example.com/iptm/faultmon/ui/dojo/Main/eventmon_wrapper.jsp?clusterName=d4f84"%3b +alert(1)//608ddbf972 +http://www.example.com/iptm/faultmon/ui/dojo/Main/eventmon_wrapper.jsp?deviceName=c25e8"%3ba +lert(1)//79877affe89 \ No newline at end of file diff --git a/platforms/hardware/remote/35766.txt b/platforms/hardware/remote/35766.txt new file mode 100755 index 000000000..6b41c9bdd --- /dev/null +++ b/platforms/hardware/remote/35766.txt @@ -0,0 +1,11 @@ +source: http://www.securityfocus.com/bid/47901/info + +Cisco Unified Operations Manager is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. + +An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials. Other attacks may also be possible. + +This issue is being tracked by Cisco Bug ID CSCtn61716. + +http://www.example.com/iptm/logicalTopo.do?clusterName=&ccmName=ed1b1"%3balert(1)//cda6137ae +4c +http://www.example.com/iptm/logicalTopo.do?clusterName=db4c1"%3balert(1)//4031caf63d7 \ No newline at end of file