[Emerging-updates] Live Commit Output

emerging@emergingthreats.net emerging at emergingthreats.net
Mon Dec 14 12:07:01 EST 2009


[***] Results from Oinkmaster started Mon Dec 14 12:07:01 2009 [***]

[+++]          Added rules:          [+++]

 2010476 - ET WEB_SPECIFIC_APPS Joomla com_jshop pid Parameter SELECT FROM SQL Injection Attempt (emerging-web_specific_apps.rules)
 2010477 - ET WEB_SPECIFIC_APPS Joomla com_jshop pid Parameter DELETE FROM SQL Injection Attempt (emerging-web_specific_apps.rules)
 2010478 - ET WEB_SPECIFIC_APPS Joomla com_jshop pid Parameter UNION SELECT SQL Injection Attempt (emerging-web_specific_apps.rules)
 2010479 - ET WEB_SPECIFIC_APPS Joomla com_jshop component pid Parameter INSERT INTO SQL Injection Attempt (emerging-web_specific_apps.rules)
 2010480 - ET WEB_SPECIFIC_APPS Joomla com_jshop component pid Parameter UPDATE SET SQL Injection Attempt (emerging-web_specific_apps.rules)
 2010481 - ET WEB_CLIENT SAP AG SAPgui EAI WebViewer2D ActiveX stack buffer overflow CLSid Access (emerging-web_client.rules)
 2010482 - ET WEB_CLIENT IBM Access Support ActiveX Stack Overflow Function call Attempt (emerging-web_client.rules)
 2010483 - ET WEB_CLIENT IBM Access Support ActiveX stack Overflow Attempt (emerging-web_client.rules)
 2010484 - ET WEB_SPECIFIC_APPS FormMailer formmailer.admin.inc.php BASE_DIR Parameter Remote File Inclusion Attempt (emerging-web_specific_apps.rules)
 2010485 - ET WEB_SPECIFIC_APPS phptraverse mp3_id.php GLOBALS Parameter Remote File Inclusion Attempt (emerging-web_specific_apps.rules)


[+++]      Added non-rule lines:     [+++]

     -> Added to emerging-sid-msg.map (10):
        2010476 || ET WEB_SPECIFIC_APPS Joomla com_jshop pid Parameter SELECT FROM SQL Injection Attempt || url,www.packetstormsecurity.org/0910-exploits/joomlajshop-sql.txt || bugtraq,36808
        2010477 || ET WEB_SPECIFIC_APPS Joomla com_jshop pid Parameter DELETE FROM SQL Injection Attempt || url,www.packetstormsecurity.org/0910-exploits/joomlajshop-sql.txt || bugtraq,36808
        2010478 || ET WEB_SPECIFIC_APPS Joomla com_jshop pid Parameter UNION SELECT SQL Injection Attempt || url,www.packetstormsecurity.org/0910-exploits/joomlajshop-sql.txt || bugtraq,36808
        2010479 || ET WEB_SPECIFIC_APPS Joomla com_jshop component pid Parameter INSERT INTO SQL Injection Attempt || url,www.packetstormsecurity.org/0910-exploits/joomlajshop-sql.txt || bugtraq,36808
        2010480 || ET WEB_SPECIFIC_APPS Joomla com_jshop component pid Parameter UPDATE SET SQL Injection Attempt || url,www.packetstormsecurity.org/0910-exploits/joomlajshop-sql.txt || bugtraq,36808
        2010481 || ET WEB_CLIENT SAP AG SAPgui EAI WebViewer2D ActiveX stack buffer overflow CLSid Access || url,dsecrg.com/pages/vul/show.php?id=143
        2010482 || ET WEB_CLIENT IBM Access Support ActiveX Stack Overflow Function call Attempt || url,www.kb.cert.org/vuls/id/340420 || url,dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/ibmegath_getxmlvalue.rb
        2010483 || ET WEB_CLIENT IBM Access Support ActiveX stack Overflow Attempt || url,www.kb.cert.org/vuls/id/340420 || url,dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/ibmegath_getxmlvalue.rb
        2010484 || ET WEB_SPECIFIC_APPS FormMailer formmailer.admin.inc.php BASE_DIR Parameter Remote File Inclusion Attempt || url,osvdb.org/show/osvdb/55751
        2010485 || ET WEB_SPECIFIC_APPS phptraverse mp3_id.php GLOBALS Parameter Remote File Inclusion Attempt || url,www.packetstormsecurity.nl/0911-exploits/phptraverse-rfi.txt

     -> Added to emerging-sid-msg.map.txt (10):
        2010476 || ET WEB_SPECIFIC_APPS Joomla com_jshop pid Parameter SELECT FROM SQL Injection Attempt || url,www.packetstormsecurity.org/0910-exploits/joomlajshop-sql.txt || bugtraq,36808
        2010477 || ET WEB_SPECIFIC_APPS Joomla com_jshop pid Parameter DELETE FROM SQL Injection Attempt || url,www.packetstormsecurity.org/0910-exploits/joomlajshop-sql.txt || bugtraq,36808
        2010478 || ET WEB_SPECIFIC_APPS Joomla com_jshop pid Parameter UNION SELECT SQL Injection Attempt || url,www.packetstormsecurity.org/0910-exploits/joomlajshop-sql.txt || bugtraq,36808
        2010479 || ET WEB_SPECIFIC_APPS Joomla com_jshop component pid Parameter INSERT INTO SQL Injection Attempt || url,www.packetstormsecurity.org/0910-exploits/joomlajshop-sql.txt || bugtraq,36808
        2010480 || ET WEB_SPECIFIC_APPS Joomla com_jshop component pid Parameter UPDATE SET SQL Injection Attempt || url,www.packetstormsecurity.org/0910-exploits/joomlajshop-sql.txt || bugtraq,36808
        2010481 || ET WEB_CLIENT SAP AG SAPgui EAI WebViewer2D ActiveX stack buffer overflow CLSid Access || url,dsecrg.com/pages/vul/show.php?id=143
        2010482 || ET WEB_CLIENT IBM Access Support ActiveX Stack Overflow Function call Attempt || url,www.kb.cert.org/vuls/id/340420 || url,dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/ibmegath_getxmlvalue.rb
        2010483 || ET WEB_CLIENT IBM Access Support ActiveX stack Overflow Attempt || url,www.kb.cert.org/vuls/id/340420 || url,dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/ibmegath_getxmlvalue.rb
        2010484 || ET WEB_SPECIFIC_APPS FormMailer formmailer.admin.inc.php BASE_DIR Parameter Remote File Inclusion Attempt || url,osvdb.org/show/osvdb/55751
        2010485 || ET WEB_SPECIFIC_APPS phptraverse mp3_id.php GLOBALS Parameter Remote File Inclusion Attempt || url,www.packetstormsecurity.nl/0911-exploits/phptraverse-rfi.txt



More information about the Emerging-updates mailing list