Warning: opendir(/var/www/html/web1/serendipity/plugins/serendipity_event_dpsyntaxhighlighter/sh/3.0.83.2/scripts/): failed to open dir: No such file or directory in /var/www/html/web1/serendipity/plugins/serendipity_event_dpsyntaxhighlighter/serendipity_event_dpsyntaxhighlighter.php on line 26

Warning: Invalid argument supplied for foreach() in /var/www/html/web1/serendipity/plugins/serendipity_event_dpsyntaxhighlighter/serendipity_event_dpsyntaxhighlighter.php on line 170
Skip to content

SSCHADV2011-035 - PHP-SCMS 1.6.8 "lang" parameter XSS vulnerability

Advisory:
PHP-SCMS 1.6.8 "lang" parameter XSS vulnerability
Advisory ID:
SSCHADV2011-035
Author:
Stefan Schurtz
Affected Software:
Successfully tested on PHP-SCMS 1.6.8
Vendor URL:
Vendor Status:
unpatched (no vendor feedback)
======================
Vulnerability Description:
======================
 
PHP-SCMS "lang" parameter is prone to a XSS vulnerability
 
Continue reading "SSCHADV2011-035 - PHP-SCMS 1.6.8 "lang" parameter XSS vulnerability"

INFOSERVE-ADV2011-09 - zFTPServer Suite 6.0.0.52 'rmdir' Directory Traversal

Advisory:
zFTPServer Suite 6.0.0.52 'rmdir' Directory Traversal
Advisory ID:
INFOSERVE-ADV2011-09
Author:
Stefan Schurtz
Contact:
Affected Software:
Successfully tested on zFTPServer Suite 6.0.0.52
Vendor URL:
Vendor Status:
fixed
CVE-ID:
CVE-2011-4717
 
==========================
Vulnerability Description
==========================
 
zFTPServer 'rmdir' is prone to a Directory Traversal, which makes it possible to delete directories in the system
 
Continue reading "INFOSERVE-ADV2011-09 - zFTPServer Suite 6.0.0.52 'rmdir' Directory Traversal"

INFOSERVE-ADV2011-08 - PHP Inventory 1.3.1 Remote (Auth Bypass) SQL Injection Vulnerability

Advisory:
PHP Inventory 1.3.1 Remote (Auth Bypass) SQL Injection Vulnerability
Advisory ID:
INFOSERVE-ADV2011-08
Author:
Stefan Schurtz
Contact:
Affected Software:
Successfully tested on PHP Inventory 1.3.1
Vendor URL:
Vendor Status:
fixed
CVE-ID:
CVE-2009-4595,CVE-2009-4596,CVE-2009-4597
 
======================
Vulnerability Description
======================
 
PHP Inventory is (still) prone to a SQL-Injection (Auth Bypass) vulnerability
 
Continue reading "INFOSERVE-ADV2011-08 - PHP Inventory 1.3.1 Remote (Auth Bypass) SQL Injection Vulnerability"

SSCHADV2011-039 - Meditate Web Content Editor 'username_input' SQL-Injection vulnerability

Advisory:
Meditate Web Content Editor ‘username_input’ SQL-Injection vulnerability
Advisory ID:
SSCHADV2011-039
Author:
Stefan Schurtz
Affected Software:
Successfully tested on Meditate 1.2
Vendor URL:
Vendor Status:
fixed
EDB-ID:
18202
 
======================
Vulnerability Description:
======================
 
Meditate Web Content Editor is prone to a SQL-Injection vulnerability
 
Continue reading "SSCHADV2011-039 - Meditate Web Content Editor 'username_input' SQL-Injection vulnerability"

HAKIN9 IT Security Magazin - 12/2011

Well, here is my next article for the German HAKIN9 IT Security Magazin. This time it’s about Web-Security and it holds three examples (XSS, SQL-Injection and Blind SQL-Injection) about, how to identify and fix vulnerabilites in web applications. Tools used for this one are Netsparker Community Edition from mavitunasecurity, Arachni and sqlmap.
 
And of course not to forget, a big special THANKS to Dr. Philip Walter for his great support!
 
Well, enough of the words, here are the links: HAKIN9 IT Security Magazin – 12/2011 or here
 
Enjoy yourself!

SSCHADV2011-038 - Ariadne 2.7.6 Multiple XSS vulnerabilities

Advisory:
Ariadne 2.7.6 Multiple XSS vulnerabilities
Advisory ID:
SSCHADV2011-038
Author:
Stefan Schurtz
Affected Software:
Successfully tested on Ariadne 2.7.6
Vendor URL:
Vendor Status:
informed
CVE-ID:
CVE-2011-4938 (thx to Henri Salo)
 
======================
Vulnerability Description:
======================
 
Ariadne 2.7.6 is prone to multiple Cross-Site scripting vulnerabilities
 

 

Continue reading "SSCHADV2011-038 - Ariadne 2.7.6 Multiple XSS vulnerabilities"
Imprint | Contact | Privacy Statement

Warning: opendir(/var/www/html/web1/serendipity/plugins/serendipity_event_dpsyntaxhighlighter/sh/3.0.83.2/scripts/): failed to open dir: No such file or directory in /var/www/html/web1/serendipity/plugins/serendipity_event_dpsyntaxhighlighter/serendipity_event_dpsyntaxhighlighter.php on line 26

Warning: Invalid argument supplied for foreach() in /var/www/html/web1/serendipity/plugins/serendipity_event_dpsyntaxhighlighter/serendipity_event_dpsyntaxhighlighter.php on line 170