# Title: [SQL injection vulnerability in Amelia CMS]
# Date: [10.02.2010]
# Author: [Ariko-Security]
# Software Link: [http://www.ameliadesign.eu/]
# Version: [ALL]
# Tested on: [freebsd / ubuntu]


============ { Ariko-Security - Advisory #3/2/2010 } =============

      SQL injection vulnerability in Amelia CMS


Vendor's Description of Software:
# http://www.ameliadesign.eu/index.php?page=1322&lang=eng&cnt=services

Dork:
# N/A

Application Info:
# Name: Amelia CMS
# Versions: ALL

Vulnerability Info:
# Type: SQL injection Vulnerability
# Risk: High

Fix:
# N/A

Time Table
# 10/02/2009 - Vendor notified.


Input passed via the "page" parameter to index.p ... Read more »
Views: 822 | Added by: b1zz4rd | Date: 23 February 2010 | Comments (0)

Same-origin policy for Java

Much like Adobe Flash, Java applets, reportedly supported on about 80% of all desktop systems, follow the basic concept of same-origin checks applied to a runtime context derived from the site the applet is downloaded from. The documentation for Java security model available on the Internet appears to be remarkably poor and spotty, so the information provided in this section is in large part based on empirical testing. According to this research, the following permissions are available to Java applets:

  • The ability to interact with JavaScript on the embedding page through the JSObject API, with no specific same-origin checks. This mechanism is disabled by ... Read more »
Views: 950 | Added by: b1zz4rd | Date: 10 February 2010 | Comments (0)

Part2  
Browser Security Handbook, part 2

Browser Security Handbook, part 2

Table of Contents

Views: 6924 | Added by: b1zz4rd | Date: 10 February 2010 | Comments (0)


     Core Security Technologies - CoreLabs Advisory
          http://www.coresecurity.com/corelabs/

Multiple Vulnerabilities with 8.3 Filename Pseudonyms in Web Servers



1. *Advisory Information*

Title: Multiple Vulnerabilities with 8.3 Filename Pseudonyms in Web Servers
Advisory Id: CORE-2010-0121
Advisory URL:
http://www.coresecurity.com/content/filename-pseudonyms-vulnerabilities
Date published: 2010-02-05
Date of last update: 2010-02-05
Vendors contacted: Cherokee team, Nginx team, Mongoose team
Release mode: User release



2. *Vulnerability Information*

Class: Improper Handling of Exceptional Conditions [CWE-755], Path
traversal [CWE-22 ... Read more »
Views: 9288 | Added by: b1zz4rd | Date: 10 February 2010 | Comments (0)

HTML entity encoding

HTML features a special encoding scheme called HTML entities. The purpose of this scheme is to make it possible to safely render certain reserved HTML characters (e.g., < > &) within documents, as well as to carry high bit characters safely over 7-bit media. The scheme nominally permits three types of notation:

  • One of predefined, named entities, in the format of &<name>; - for example &lt; for <, &gt; for >, &rarr; for , etc,
  • Decimal entities, &#<nn>;, with a number corresponding to the desired Unicode character value - for example &#60; for <, ... Read more »
Views: 930 | Added by: b1zz4rd | Date: 04 February 2010 | Comments (1)

« 1 2 3 4 5 6 7 ... 21 22 »
close