[Emerging-updates] Live Commit Output

emerging@emergingthreats.net emerging at emergingthreats.net
Mon Dec 28 09:17:31 EST 2009


[***] Results from Oinkmaster started Mon Dec 28 09:17:31 2009 [***]

[+++]          Added rules:          [+++]

  210560 - ET WEB_CLIENT Microsoft Whale Intelligent App Gateway ActiveX Buffer Overflow Function call-1 (emerging-web_client.rules)


[///]     Modified active rules:     [///]

 2010555 - ET WEB_SPECIFIC_APPS Joomla com_joaktree Component treeId Parameter SELECT FROM SQL Injection Attempt (emerging-web_specific_apps.rules)
 2010556 - ET WEB_SPECIFIC_APPS Joomla com_joaktree Component treeId Parameter DELETE FROM SQL Injection Attempt (emerging-web_specific_apps.rules)
 2010557 - ET WEB_SPECIFIC_APPS Joomla com_joaktree Component treeId Parameter UNION SELECT SQL Injection Attempt (emerging-web_specific_apps.rules)
 2010558 - ET WEB_SPECIFIC_APPS Joomla com_joaktree Component treeId Parameter INSERT INTO SQL Injection Attempt (emerging-web_specific_apps.rules)
 2010559 - ET WEB_SPECIFIC_APPS Joomla com_joaktree Component treeId Parameter UPDATE SET SQL Injection Attempt (emerging-web_specific_apps.rules)
 2010561 - ET WEB_CLIENT Microsoft Whale Intelligent App Gateway ActiveX Buffer Overflow Function call-2 (emerging-web_client.rules)
 2010562 - ET WEB_CLIENT Microsoft Whale Intelligent Application Gateway ActiveX Buffer Overflow-1 (emerging-web_client.rules)
 2010563 - ET WEB_CLIENT Microsoft Whale Intelligent Application Gateway ActiveX Buffer Overflow-2 (emerging-web_client.rules)
 2010564 - ET WEB_SPECIFIC_APPS Sisplet CMS komentar.php site_path Parameter Remote File Inclusion Attempt (emerging-web_specific_apps.rules)


[---]         Removed rules:         [---]

21010560 - ET WEB_CLIENT Microsoft Whale Intelligent App Gateway ActiveX Buffer Overflow Function call-1 (emerging-web_client.rules)


[+++]      Added non-rule lines:     [+++]

     -> Added to emerging-sid-msg.map (10):
        210560 || ET WEB_CLIENT Microsoft Whale Intelligent App Gateway ActiveX Buffer Overflow Function call-1 || url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_CLIENT/WEB_MS_Whale || url,doc.emergingthreats.net/210560 || url,www.kb.cert.org/vuls/id/789121 || url,dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/mswhale_checkforupdates.rb
        2010555 || ET WEB_SPECIFIC_APPS Joomla com_joaktree Component treeId Parameter SELECT FROM SQL Injection Attempt || url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SPECIFIC_APPS/WEB_Joomla || url,doc.emergingthreats.net/2010555 || url,secunia.com/advisories/37535/ || bugtraq,37178
        2010556 || ET WEB_SPECIFIC_APPS Joomla com_joaktree Component treeId Parameter DELETE FROM SQL Injection Attempt || url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SPECIFIC_APPS/WEB_Joomla || url,doc.emergingthreats.net/2010556 || url,secunia.com/advisories/37535/ || bugtraq,37178
        2010557 || ET WEB_SPECIFIC_APPS Joomla com_joaktree Component treeId Parameter UNION SELECT SQL Injection Attempt || url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SPECIFIC_APPS/WEB_Joomla || url,doc.emergingthreats.net/2010557 || url,secunia.com/advisories/37535/ || bugtraq,37178
        2010558 || ET WEB_SPECIFIC_APPS Joomla com_joaktree Component treeId Parameter INSERT INTO SQL Injection Attempt || url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SPECIFIC_APPS/WEB_Joomla || url,doc.emergingthreats.net/2010558 || url,secunia.com/advisories/37535/ || bugtraq,37178
        2010559 || ET WEB_SPECIFIC_APPS Joomla com_joaktree Component treeId Parameter UPDATE SET SQL Injection Attempt || url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SPECIFIC_APPS/WEB_Joomla || url,doc.emergingthreats.net/2010559 || url,secunia.com/advisories/37535/ || bugtraq,37178
        2010561 || ET WEB_CLIENT Microsoft Whale Intelligent App Gateway ActiveX Buffer Overflow Function call-2 || url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_CLIENT/WEB_MS_Whale || url,doc.emergingthreats.net/2010561 || url,www.kb.cert.org/vuls/id/789121 || url,dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/mswhale_checkforupdates.rb
        2010562 || ET WEB_CLIENT Microsoft Whale Intelligent Application Gateway ActiveX Buffer Overflow-1 || url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_CLIENT/WEB_MS_Whale || url,doc.emergingthreats.net/2010562 || url,www.kb.cert.org/vuls/id/789121 || url,dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/mswhale_checkforupdates.rb
        2010563 || ET WEB_CLIENT Microsoft Whale Intelligent Application Gateway ActiveX Buffer Overflow-2 || url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_CLIENT/WEB_MS_Whale || url,doc.emergingthreats.net/2010563 || url,www.kb.cert.org/vuls/id/789121 || url,dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/mswhale_checkforupdates.rb
        2010564 || ET WEB_SPECIFIC_APPS Sisplet CMS komentar.php site_path Parameter Remote File Inclusion Attempt || url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SPECIFIC_APPS/WEB_Sisplet || url,doc.emergingthreats.net/2010564 || bugtraq,23334

     -> Added to emerging-sid-msg.map.txt (10):
        210560 || ET WEB_CLIENT Microsoft Whale Intelligent App Gateway ActiveX Buffer Overflow Function call-1 || url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_CLIENT/WEB_MS_Whale || url,doc.emergingthreats.net/210560 || url,www.kb.cert.org/vuls/id/789121 || url,dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/mswhale_checkforupdates.rb
        2010555 || ET WEB_SPECIFIC_APPS Joomla com_joaktree Component treeId Parameter SELECT FROM SQL Injection Attempt || url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SPECIFIC_APPS/WEB_Joomla || url,doc.emergingthreats.net/2010555 || url,secunia.com/advisories/37535/ || bugtraq,37178
        2010556 || ET WEB_SPECIFIC_APPS Joomla com_joaktree Component treeId Parameter DELETE FROM SQL Injection Attempt || url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SPECIFIC_APPS/WEB_Joomla || url,doc.emergingthreats.net/2010556 || url,secunia.com/advisories/37535/ || bugtraq,37178
        2010557 || ET WEB_SPECIFIC_APPS Joomla com_joaktree Component treeId Parameter UNION SELECT SQL Injection Attempt || url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SPECIFIC_APPS/WEB_Joomla || url,doc.emergingthreats.net/2010557 || url,secunia.com/advisories/37535/ || bugtraq,37178
        2010558 || ET WEB_SPECIFIC_APPS Joomla com_joaktree Component treeId Parameter INSERT INTO SQL Injection Attempt || url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SPECIFIC_APPS/WEB_Joomla || url,doc.emergingthreats.net/2010558 || url,secunia.com/advisories/37535/ || bugtraq,37178
        2010559 || ET WEB_SPECIFIC_APPS Joomla com_joaktree Component treeId Parameter UPDATE SET SQL Injection Attempt || url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SPECIFIC_APPS/WEB_Joomla || url,doc.emergingthreats.net/2010559 || url,secunia.com/advisories/37535/ || bugtraq,37178
        2010561 || ET WEB_CLIENT Microsoft Whale Intelligent App Gateway ActiveX Buffer Overflow Function call-2 || url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_CLIENT/WEB_MS_Whale || url,doc.emergingthreats.net/2010561 || url,www.kb.cert.org/vuls/id/789121 || url,dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/mswhale_checkforupdates.rb
        2010562 || ET WEB_CLIENT Microsoft Whale Intelligent Application Gateway ActiveX Buffer Overflow-1 || url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_CLIENT/WEB_MS_Whale || url,doc.emergingthreats.net/2010562 || url,www.kb.cert.org/vuls/id/789121 || url,dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/mswhale_checkforupdates.rb
        2010563 || ET WEB_CLIENT Microsoft Whale Intelligent Application Gateway ActiveX Buffer Overflow-2 || url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_CLIENT/WEB_MS_Whale || url,doc.emergingthreats.net/2010563 || url,www.kb.cert.org/vuls/id/789121 || url,dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/mswhale_checkforupdates.rb
        2010564 || ET WEB_SPECIFIC_APPS Sisplet CMS komentar.php site_path Parameter Remote File Inclusion Attempt || url,www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/WEB_SPECIFIC_APPS/WEB_Sisplet || url,doc.emergingthreats.net/2010564 || bugtraq,23334

[---]     Removed non-rule lines:    [---]

     -> Removed from emerging-sid-msg.map (10):
        2010555 || ET WEB_SPECIFIC_APPS Joomla com_joaktree Component treeId Parameter SELECT FROM SQL Injection Attempt || url,secunia.com/advisories/37535/ || bugtraq,37178
        2010556 || ET WEB_SPECIFIC_APPS Joomla com_joaktree Component treeId Parameter DELETE FROM SQL Injection Attempt || url,secunia.com/advisories/37535/ || bugtraq,37178
        2010557 || ET WEB_SPECIFIC_APPS Joomla com_joaktree Component treeId Parameter UNION SELECT SQL Injection Attempt || url,secunia.com/advisories/37535/ || bugtraq,37178
        2010558 || ET WEB_SPECIFIC_APPS Joomla com_joaktree Component treeId Parameter INSERT INTO SQL Injection Attempt || url,secunia.com/advisories/37535/ || bugtraq,37178
        2010559 || ET WEB_SPECIFIC_APPS Joomla com_joaktree Component treeId Parameter UPDATE SET SQL Injection Attempt || url,secunia.com/advisories/37535/ || bugtraq,37178
        2010561 || ET WEB_CLIENT Microsoft Whale Intelligent App Gateway ActiveX Buffer Overflow Function call-2 || url,www.kb.cert.org/vuls/id/789121 || url,dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/mswhale_checkforupdates.rb
        2010562 || ET WEB_CLIENT Microsoft Whale Intelligent Application Gateway ActiveX Buffer Overflow-1 || url,www.kb.cert.org/vuls/id/789121 || url,dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/mswhale_checkforupdates.rb
        2010563 || ET WEB_CLIENT Microsoft Whale Intelligent Application Gateway ActiveX Buffer Overflow-2 || url,www.kb.cert.org/vuls/id/789121 || url,dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/mswhale_checkforupdates.rb
        2010564 || ET WEB_SPECIFIC_APPS Sisplet CMS komentar.php site_path Parameter Remote File Inclusion Attempt || bugtraq,23334
        21010560 || ET WEB_CLIENT Microsoft Whale Intelligent App Gateway ActiveX Buffer Overflow Function call-1 || url,www.kb.cert.org/vuls/id/789121 || url,dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/mswhale_checkforupdates.rb

     -> Removed from emerging-sid-msg.map.txt (10):
        2010555 || ET WEB_SPECIFIC_APPS Joomla com_joaktree Component treeId Parameter SELECT FROM SQL Injection Attempt || url,secunia.com/advisories/37535/ || bugtraq,37178
        2010556 || ET WEB_SPECIFIC_APPS Joomla com_joaktree Component treeId Parameter DELETE FROM SQL Injection Attempt || url,secunia.com/advisories/37535/ || bugtraq,37178
        2010557 || ET WEB_SPECIFIC_APPS Joomla com_joaktree Component treeId Parameter UNION SELECT SQL Injection Attempt || url,secunia.com/advisories/37535/ || bugtraq,37178
        2010558 || ET WEB_SPECIFIC_APPS Joomla com_joaktree Component treeId Parameter INSERT INTO SQL Injection Attempt || url,secunia.com/advisories/37535/ || bugtraq,37178
        2010559 || ET WEB_SPECIFIC_APPS Joomla com_joaktree Component treeId Parameter UPDATE SET SQL Injection Attempt || url,secunia.com/advisories/37535/ || bugtraq,37178
        2010561 || ET WEB_CLIENT Microsoft Whale Intelligent App Gateway ActiveX Buffer Overflow Function call-2 || url,www.kb.cert.org/vuls/id/789121 || url,dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/mswhale_checkforupdates.rb
        2010562 || ET WEB_CLIENT Microsoft Whale Intelligent Application Gateway ActiveX Buffer Overflow-1 || url,www.kb.cert.org/vuls/id/789121 || url,dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/mswhale_checkforupdates.rb
        2010563 || ET WEB_CLIENT Microsoft Whale Intelligent Application Gateway ActiveX Buffer Overflow-2 || url,www.kb.cert.org/vuls/id/789121 || url,dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/mswhale_checkforupdates.rb
        2010564 || ET WEB_SPECIFIC_APPS Sisplet CMS komentar.php site_path Parameter Remote File Inclusion Attempt || bugtraq,23334
        21010560 || ET WEB_CLIENT Microsoft Whale Intelligent App Gateway ActiveX Buffer Overflow Function call-1 || url,www.kb.cert.org/vuls/id/789121 || url,dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/mswhale_checkforupdates.rb



More information about the Emerging-updates mailing list