______________________________ Insomnia Security Vulnerability Advisory: ISVA-100216.1 ______________________________ Name: Windows URL Handling Vulnerability Released: 16 February 2010 Vendor Link: http://www.microsoft.com/ Affected Products: Windows 2000, Windows XP, Windows 2003, Windows Vista Original Advisory: http://www.insomniasec.com/ Researcher: Brett Moore, Insomnia Security http://www.insomniasec.com ______________________________ |
# Greetz to all Darkc0de ,AI,ICW, AH Memebers # Shoutz to r45c4l,j4ckh4x0r,silic0n, # # Author: Beenu Arora # # Home : www.BeenuArora.com # # Email : beenudel1986@gmail.com # # Share the c0de! # ############################## # # Exploit: Multiple Stored XSS in XOOPS 2.4.4 Admin Section # # AppSite: www.xoops.org # # Tested Version : 2.4.4 # # Request: POST # # Sample URLs:-http://localhost/xoops/ # ... Read more » |
Virtual Security Research,
LLC. http://www.vsecurity.com/ Security Advisory -=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Advisory Name: Chrome Password Manager Cross Origin Weakness Release Date: 2010-02-15 Application: Google Chrome Web Browser Versions: 4.0.249.78, 3.0.195.38, and likely earlier Severity: Medium/Low Author: Timothy D. Morgan <tmorgan (a) vsecurity . com> Vendor Status: Update Released [2] CVE Candidate: CVE-2010-0556 Reference: ... Read more » |
Information disclosure vulnerability in Drupal's Realname User Reference
Widget contributed module (version 6.x-1.0) Discovered by Martin Barbella <barbella@sas.upenn.edu> Description of Vulnerability: ----------------------------- Drupal is a free software package that allows an individual or a community of users to easily publish, manage and organize a wide variety of content on a website (http://drupal.org/about). The Realname CCK User Reference Widget module adds a new widget to the User Reference CCK field type that uses the Realnames for autocompletion (http://drupal.org/project/ Only the access content permission is needed to access the page which displays the user names and real names for users, used by ... Read more » |
############################## # .___ __ _______ .___ # # __| _/____ _______| | __ ____ \ _ \ __| _/____ # # / __ |\__ \\_ __ \ |/ // ___\/ /_\ \ / __ |/ __ \ # # / /_/ | / __ \| | \/ <\ \___\ \_/ \/ /_/ \ ___/ # # \____ |(______/__| |__|_ \\_____>\_____ /\_____|\____\ # # \/ \/ \/ &nbs ... Read more » |
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1 I expanded on Jon Butler's exploit and was able to inject a Meterpreter payload into the remote process despite the buffer's small size (268 bytes). This was done by overwriting the ret value with part of the Meterpreter payload. - - Explanation of Process: http://paulmakowski.wordpress. - - Vulnerable Program: http://easyftpsvr.googlecode. - - Exploit Download: https://tegosecurity.com/etc/ |
============================== Yaniv Miron aka "Lament" Advisory Feb 24, 2010 ARISg5 (Version 5.0) Cross Site Scripting Vulnerability ============================== ============================== Application name: ARISg5 (arisglobal) Version: 5.0 Class: Input Validation Error Type: Cross Site Scripting (XSS) Remote: Yes Credit: Yaniv Miron aka "Lament" Exploit: http://SERVER_ADDRESS/Aris/ Yaniv Miron aka "Lament". lament@ilhack.org ============================== ================== ... Read more » |
------------------------------
getPlus insufficient domain name validation vulnerability ------------------------------ Yorick Koster, April 2009 ------------------------------ See also ------------------------------ APSB10-08 [2] Security update available for Adobe Download Manager CVE-2010-0189 [3] 02.23.10 [4] Multiple Vendor NOS Microsystems getPlus Downloader Input Validation Vulnerability Aviv Raff On .NET: [5] Skeletons in Adobe's security closet ------------------------------ Tested version ------------------------------ These vulnerabilities were tested on Adobe's version of ... Read more » |
# Title: [SQL injection vulnerability in WebAdministrator Lite CMS]
# Date: [25.02.2010] # Author: [Ariko-Security] # Software Link: [http://jskinternet.pl/] # Version: [Lite] ============ { Ariko-Security - Advisory #5/2/2010 } ============= SQL injection vulnerability in WebAdministrator Lite CMS Vendor's Description of Software: # http://jskinternet.pl/portal/ Dork: # webadministrator lite Application Info: # Name: WebAdministrator Lite CMS # Versions: LITE Vulnerability Info: # Type: SQL injection Vulnerability # Risk: medium Fix: # N/A Time Table: # 25/02/2010 - Vendor notified. # 25/02/2010 - Vendor response "we will not release FIX for LITE, soon new version".... ... Read more » |
Hacktics Research Group Security Advisory
http://www.hacktics.com/#view= By Oren Hafif, Hacktics. 24-Feb-2010 =========== I. Overview =========== During a penetration test performed by Hacktics' experts, certain vulnerabilities were identified in an IBM Websphere Portal Server and Lotus Web Content Management deployment. Further research has identified that the login page of the IBM Lotus Workplace Web Content Management is vulnerable to Reflected Cross Site Scripting attacks. A friendly formatted version of this advisory is available in: http://www.hacktics.com/ =============== II. The Finding =============== An attacker can inject script into a ... Read more » |