[Emerging-updates] Live Commit Output

emerging@emergingthreats.net emerging at emergingthreats.net
Tue Nov 18 09:30:43 EST 2008


[***] Results from Oinkmaster started Tue Nov 18 09:30:43 2008 [***]

[+++]          Added rules:          [+++]

 2008785 - ET WEB_SPECIFIC Aj Square RSS Reader url SQL Injection (emerging-web_sql_injection.rules)
 2008786 - ET WEB_SPECIFIC PozScripts Classified Auctions id parameter SQL Injection (emerging-web_sql_injection.rules)
 2008787 - ET WEB_SPECIFIC All In One Control Panel poll_id parameter SQL Injection (emerging-web_sql_injection.rules)
 2008788 - ET WEB_SPECIFIC e107 BLOG Engine macgurublog.php uid Parameter SQL Injection (emerging-web_sql_injection.rules)
 2008789 - ET WEB_SPECIFIC DB Software Laboratory VImpX.ocx ActiveX Control Multiple Insecure Methods (emerging-web_sql_injection.rules)
 2008790 - ET WEB_SCPECIFIC DjVu DjVu_ActiveX_MSOffice.dll ActiveX Component Heap Buffer Overflow (emerging-web_sql_injection.rules)
 2008791 - ET WEB_SPECIFIC Visagesoft eXPert PDF Viewer ActiveX Control Arbitrary File Overwrite (emerging-web_sql_injection.rules)
 2008792 - ET EXPLOIT Microsoft DebugDiag CrashHangExt.dll ActiveX Control Remote Denial of Service (emerging-exploit.rules)
 2008793 - ET WEB_SPECIFIC SFS EZ BIZ PRO track.php id Parameter Remote SQL Injection (emerging-web_sql_injection.rules)


[+++]      Added non-rule lines:     [+++]

     -> Added to emerging-sid-msg.map (9):
        2008785 || ET WEB_SPECIFIC Aj Square RSS Reader url SQL Injection || url,milw0rm.com/exploits/6856 || url,secunia.com/advisories/32413/
        2008786 || ET WEB_SPECIFIC PozScripts Classified Auctions id parameter SQL Injection || url,secunia.com/advisories/32373 || url,milw0rm.com/exploits/6839
        2008787 || ET WEB_SPECIFIC All In One Control Panel poll_id parameter SQL Injection || url,secunia.com/advisories/32431 || url,milw0rm.com/exploits/6854
        2008788 || ET WEB_SPECIFIC e107 BLOG Engine macgurublog.php uid Parameter SQL Injection || url,milw0rm.com/exploits/6856 || bugtraq,29344
        2008789 || ET WEB_SPECIFIC DB Software Laboratory VImpX.ocx ActiveX Control Multiple Insecure Methods || url,milw0rm.com/exploits/6828 || bugtraq,31907
        2008790 || ET WEB_SCPECIFIC DjVu DjVu_ActiveX_MSOffice.dll ActiveX Component Heap Buffer Overflow || url,milw0rm.com/exploits/6878 || bugtraq,31987
        2008791 || ET WEB_SPECIFIC Visagesoft eXPert PDF Viewer ActiveX Control Arbitrary File Overwrite || url,milw0rm.com/exploits/6875 || bugtraq,31984
        2008792 || ET EXPLOIT Microsoft DebugDiag CrashHangExt.dll ActiveX Control Remote Denial of Service || bugtraq,31996
        2008793 || ET WEB_SPECIFIC SFS EZ BIZ PRO track.php id Parameter Remote SQL Injection || url,milw0rm.com/exploits/6910 || url,secunia.com/advisories/32552/

     -> Added to emerging-sid-msg.map.txt (9):
        2008785 || ET WEB_SPECIFIC Aj Square RSS Reader url SQL Injection || url,milw0rm.com/exploits/6856 || url,secunia.com/advisories/32413/
        2008786 || ET WEB_SPECIFIC PozScripts Classified Auctions id parameter SQL Injection || url,secunia.com/advisories/32373 || url,milw0rm.com/exploits/6839
        2008787 || ET WEB_SPECIFIC All In One Control Panel poll_id parameter SQL Injection || url,secunia.com/advisories/32431 || url,milw0rm.com/exploits/6854
        2008788 || ET WEB_SPECIFIC e107 BLOG Engine macgurublog.php uid Parameter SQL Injection || url,milw0rm.com/exploits/6856 || bugtraq,29344
        2008789 || ET WEB_SPECIFIC DB Software Laboratory VImpX.ocx ActiveX Control Multiple Insecure Methods || url,milw0rm.com/exploits/6828 || bugtraq,31907
        2008790 || ET WEB_SCPECIFIC DjVu DjVu_ActiveX_MSOffice.dll ActiveX Component Heap Buffer Overflow || url,milw0rm.com/exploits/6878 || bugtraq,31987
        2008791 || ET WEB_SPECIFIC Visagesoft eXPert PDF Viewer ActiveX Control Arbitrary File Overwrite || url,milw0rm.com/exploits/6875 || bugtraq,31984
        2008792 || ET EXPLOIT Microsoft DebugDiag CrashHangExt.dll ActiveX Control Remote Denial of Service || bugtraq,31996
        2008793 || ET WEB_SPECIFIC SFS EZ BIZ PRO track.php id Parameter Remote SQL Injection || url,milw0rm.com/exploits/6910 || url,secunia.com/advisories/32552/



More information about the Emerging-updates mailing list