not responded to our security report for months.
Workaround is to remove WRITE attribute permission on all Mobile
Partner executable files for non-administrator and non-system
accounts.
6. VENDOR
Huawei Technologies Co.,Ltd
7. CREDIT
Myo Soe, http://yehg.net, YGN Ethical Hacker Group, Myanmar.
8
, YGN Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2012-04-22: Contacted the vendor through email
2012-04-29: Vendor replied and the vulnerability information was sent
2013-01-07: Vulnerability not fixed
2013-01-07: Vulnerability disclosed
10. REFERENCES
Original Advisory URL:
http
, http://yehg.net, YGN Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2012-04-22: Contacted the vendor through email
2012-04-29: Vendor replied and the vulnerability detail was sent
2013-01-05: Vulnerability not fixed
2013-01-05: Vulnerability disclosed
10. REFERENCES
Original Advisory
.
7. VENDOR
Wuxi Elootec Technology Co., Ltd.
8. CREDIT
Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2012-04-22: Contacted the vendor through email
2012-04-29: Vendor replied and the vulnerability detail was sent
2013-01-04: Vulnerability not fixed
5.x only
On Sat, Dec 29, 2012 at 11:02 AM, Sean Jenkins s...@bluehost.com wrote:
Is it known if this exploit affects CubeCart versions 3.x and/or 4.x, or
just 5.0.[0..6]?
Sean Jenkins
Sr. System Administrator
On 12/28/2012 8:13 AM, YGN Ethical Hacker Group wrote:
1. OVERVIEW
CubeCart
. VENDOR
CubeCart Development Team
http://cubecart.com/
8. CREDIT
Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2012-12-22: Vulnerability disclosed
2012-12-24: The vendor replied that the fix would not be implemented.
2013-01-01: Vulnerability disclosed
(review[title] parameter)
/admin.php (report[date][from] parameter)
6. SOLUTION
The vendor has chosen not to fix the issue.
7. VENDOR
CubeCart Development Team
http://cubecart.com/
8. CREDIT
Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2012-12-22
]
-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure
Inc.
http://www.transparent-support.com
8. CREDIT
Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2012-11-17: Vulnerability Reported
2012-12-25: Vulnerability Disclosed
10. REFERENCES
Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5Bopen
///
6. SOLUTION
The vendor has not responded to the report since 2012-11-17.
It is recommended that an alternate software package be used in its place.
7. VENDOR
Transparent Technologies Inc.
http://www.transparent-support.com
8. CREDIT
Aung Khant, http://yehg.net, YGN Ethical Hacker Group
/admin.php (redir parameter)
/admin.php?redir=//yehg.net/%3f (Redirect after login)
6. SOLUTION
Upgrade to the latest CubeCart version - 5.x.
7. VENDOR
CubeCart Development Team
http://cubecart.com/
8. CREDIT
Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.
9. DISCLOSURE
The CubeCart 4.x version family is no longer maintained by the vendor.
Upgrade to the currently supported latest CubeCart version - 5.x.
7. VENDOR
CubeCart Development Team
http://cubecart.com/
8. CREDIT
Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
. SOLUTION
The CubeCart 4.x version family is no longer maintained by the vendor.
Upgrade to the currently supported latest CubeCart version - 5.x.
7. VENDOR
CubeCart Development Team
http://cubecart.com/
8. CREDIT
Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.
9. DISCLOSURE
, YGN Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2012-12-22: CubeCart 4.x in End-of-Support/Maintenance circle
2012-12-24: Vulnerability disclosed
10. REFERENCES
Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5Bcubecart_4.4.6%5D_csrf
CubeCart Home Page: http
://cubecart.com/
8. CREDIT
Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2012-12-22: CubeCart 4.x in End-of-Support/Maintenance circle
2012-12-24: Vulnerability disclosed
10. REFERENCES
Original Advisory URL:
http://yehg.net/lab/pr0js/advisories
The vendor has chosen not to fix the issue.
Workaround is to remove setup directory after installation.
7. VENDOR
CubeCart Development Team
http://cubecart.com/
8. CREDIT
Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2012-03-24: Vulnerability Reported
CubeCart Development Team
http://cubecart.com/
8. CREDIT
Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2012-06-22: CubeCart 4.x in End-of-Support/Maintenance circle
2012-12-24: Vulnerability disclosed
10. REFERENCES
Original Advisory URL:
http
version family is no longer maintained by the vendor.
Upgrade to the currently supported CubeCart version - 5.x.
7. VENDOR
CubeCart Development Team
http:/cart.com/
8. CREDIT
Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2012-02-10: CubeCart 3.0.x in End
Page: http://cubecart.com/
#yehg [2012-12-22]
-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd
___
Full-Disclosure - We
)
/index.php (town parameter)
6. SOLUTION
The CubeCart 3.0.x version family is no longer maintained by the vendor.
Upgrade to the currently supported CubeCart version - 5.x.
7. VENDOR
CubeCart Development Team
http:/cart.com/
8. CREDIT
Aung Khant, http://yehg.net, YGN Ethical Hacker Group
this product and
therefore has no patch or upgrade that mitigates this problem.
It is recommended that an alternate software package be used in its place.
7. VENDOR
Transparent Technologies Inc.
http://www.transparent-support.com
8. CREDIT
Aung Khant, http://yehg.net, YGN Ethical Hacker Group
=http://yehg.net/
6. SOLUTION
We have not been informed of the fix.
We believe this issue should be fixed by the time of releasing our advisory.
7. VENDOR
F5 Networks, Inc.
8. CREDIT
This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.
9
/login?BackURL=//yehg.net
6. SOLUTION
Upgrade to the latest 3.x version.
7. VENDOR
SilverStripe Development Team
http://www.silverstripe.org/
8. CREDIT
This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2012-02-06
This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2012-02-06: notified vendor
2012-10-15: vulnerability disclosed
10. REFERENCES
Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5BSilverStripe_2.4.7%5D_xss
for the option, Enforce IP addresses for
sessions.
7. VENDOR
ocPortal Development Team
http://www.ocportal.com/
8. CREDIT
This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2012-07-29: notified vendor, vendor did
/index.php?page=logintype=miscredirect=http://attacker.in
6. SOLUTION
Upgrade to the latest version.
7. VENDOR
ocPortal Development Team
http://www.ocportal.com/
8. CREDIT
Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2012-03-06: notified vendor
2012
!) %
-6dc3a236402e2--
[/REQUEST]
6. SOLUTION
The Acunity CMS is no longer in active development.
It is recommended to user another CMS in active development and support.
7. VENDOR
The Collective
http://www.thecollective.com.au/
8. CREDIT
Aung Khant, http://yehg.net, YGN Ethical
http://www.thecollective.com.au/
8. CREDIT
Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2012-05-20: vulnerability disclosed
10. REFERENCES
Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5Bacuity_cms2.6%20x_(asp)%5D_path_traversal
http://www.thecollective.com.au/
8. CREDIT
Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2012-05-20: vulnerability disclosed
10. REFERENCES
Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5Bacuity_cms2.6%20x_(asp)%5D_path_traversal
!) %
-6dc3a236402e2--
[/REQUEST]
6. SOLUTION
The Acunity CMS is no longer in active development.
It is recommended to user another CMS in active development and support.
7. VENDOR
The Collective
http://www.thecollective.com.au/
8. CREDIT
Aung Khant, http://yehg.net, YGN Ethical
/
8. CREDIT
This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2012-04-15: vulnerability disclosed
10. REFERENCES
Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5Bfastpath-webchat
Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2011-03-01: notified vendor
2012-04-15: vulnerability disclosed
10. REFERENCES
Original Advisory URL: http://yehg.net/lab/pr0js/advisories/%5Bbeatz_1.x%5D_xss
#yehg [2012-04-15
, http://yehg.net, YGN Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2012-03-05: Open-Realty 2.5.8 in End-of-Support/Maintenance circle
2012-03-05: Vulnerability disclosed
10. REFERENCES
Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5Bopen-realty_2.5.8_2.x%5D_lfi
Open-Realty
://www.datemill.com/
8. CREDIT
Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2011-06-21: notified vendor
2012-03-05: vulnerability disclosed
10. REFERENCES
Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/%5Betano_1.2.x%5D_xss
#yehg [2012-03-05
%22position:fixed;width:1000px;height:1000px;display:block;left:0;top:0%22onmouseover=alert%28%27XSS%27%29;%22x=
6. SOLUTION
Upgade to the latest version of Oxwall.
7. VENDOR
Oxwall Foundation
http://www.oxwall.org/
8. CREDIT
Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.
9. DISCLOSURE
. VENDOR
BoonEx Pty Ltd
http://www.boonex.com/
8. CREDIT
Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2011-06-09: notified vendor
2011-10-24: fixed version, 7.0.8, released
2012-02-20: vulnerability disclosed
10. REFERENCES
Original Advisory URL
=L2N1YmUvaW5kZXgucGhwP2FjdD1sb2dpbg%3D%3D
6. SOLUTION
The CubeCart 3.0.x version family is no longer maintained by the vendor.
7. VENDOR
CubeCart Development Team
http://cubecart.com/
8. CREDIT
Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2012-02-10: CubeCart 3.0.x in End
. VENDOR
CubeCart Development Team
http://cubecart.com/
8. CREDIT
Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2012-02-10: CubeCart 3.0.x in End-of-Support/Maintenance circle
2012-02-10: Vulnerability disclosed
10. REFERENCES
Original Advisory URL
)
6. VENDOR
Vastgota-Data
7. CREDIT
This vulnerability was discovered by Myo Soe, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.
8. DISCLOSURE TIME-LINE
2011-06-19: notified vendor through email
2011-10-17: vendor released fixed version, 2011-10-17
2011-10-25: vulnerability disclosed
9
,
escapeshellcmd($this-Sendmail), escapeshellarg($this-Sender));
395: $sendmail = sprintf(%s -oi -t, escapeshellcmd($this-Sendmail));
7. VENDOR
vTiger Development Team
http://www.vtiger.com/
8. CREDIT
This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group
they acknowledged
the report.
7. VENDOR
vTiger Development Team
http://www.vtiger.com/
8. CREDIT
This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2010-12-08: notified vendor
2011-10-05: no fixed version released yet
Development Team
http://www.vtiger.com/
8. CREDIT
This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2010-12-08: notified vendor
2011-10-04: no fixed version released yet
2011-10-04: vulnerability disclosed
10. REFERENCES
! Developer Team
http://www.joomla.org
9. CREDIT
This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.
10. DISCLOSURE TIME-LINE
2011-07-29: notified vendor
2011-09-26: patched version, 1.7.1-stable, released
2011-09-29: vulnerability disclosed
11
=downloadattachatid=59
7. VENDOR
Electron Inc.
http://www.anelectron.com/
8. CREDIT
This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2010-12-14: notified vendor through email, website contact form submission
2011-05-17
Team
http://www.jcow.net
8. CREDIT
This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2010-06-03: notified vendor
2010-06-03: vendor replied fix would be available within 48hrs
2011-08-24: vendor released fixed versions
Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2010-06-03: notified vendor
2010-06-03: vendor replied fix would be available within 48hrs
2011-08-24: vendor released fixed version, jcow.4.3.1.ce
2011-08-26: vulnerability disclosed
10. REFERENCES
Original
CMS 5.4.1.1 XSS /
/form
6. SOLUTION
Upgrade to 5.4.2 or higher.
7. VENDOR
Concrete CMS Developers
http://www.concrete5.org/
8. CREDIT
This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2011-04-14: vulnerability
. CREDIT
This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2011-08-01: vulnerability reported
2011-08-15: vendor released fixed version
2011-08-18: vulnerability disclosed
10. REFERENCES
Original Advisory URL:
http
This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2011-01-26: notified vendor
2011-08-01: vendor released fix
2011-08-13: vulnerability disclosed
10. REFERENCES
Original Advisory URL:
http://yehg.net/lab/pr0js
. VERSIONS AFFECTED
2.8.1 =
5. SOLUTION
Upgrade to 2.8.2 or higher
6. VENDOR
WebsiteBaker Org e. V.
http://www.websitebaker2.org/
7. CREDIT
This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.
8. DISCLOSURE TIME-LINE
2011-01-26: notified
development.
7. VENDOR
Mambo CMS Development Team
http://mambo-developer.org
8. CREDIT
This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2010-11-31: notified vendor through bug tracker
2011-08-12: no patched version
(javascript:alert(/XSS/)) x=s /
6. SOLUTION
Upgrade to 1.7.10 or higher.
7. VENDOR
Curverider Ltd
http://www.curverider.co.uk/
http://elgg.org/
8. CREDIT
This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2011-06
9. CREDIT
This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.
10. DISCLOSURE TIME-LINE
2011-07-02: notified vendor
2011-07-19: patched version, 1.7.0, released
2011-07-22: vulnerability disclosed
11. REFERENCES
Original Advisory URL:
http
://www.joomla.org
9. CREDIT
This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.
10. DISCLOSURE TIME-LINE
2011-07-02: notified vendor
2011-07-19: patched version, 1.7.0-stable, released
2011-07-22: vulnerability disclosed
11. REFERENCES
Original Advisory URL
===
MyST BlogSite | Multiple Vulnerabilities
===
1. VULNERABILITY DESCRIPTION
-- Issue Title: Arbitrary URL Redirect
Component: MyST BlogSite ClickDirector
Ref: OWASP - Top 10 - 2010 - A10
Ref-Link:
Vulnerabilities via URL Redirector in developer.apple.com
1. VULNERABILITY DESCRIPTION
Arbitrary URL Redirect
==
POC (Browsers: All)
https://developer.apple.com/membercenter/urlRedirect.action?fullURL=http://attacker.in/malware_exists_in_this_page
Issue References:
OWASP
This vulnerability was discovered by Myo Soe, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.
8. REFERENCES
Original Advisory URL:
http://core.yehg.net/lab/pr0js/advisories/smallftpd_103-fix_saturation_dos
SmallFTPD Home Page: http://smallftpd.sourceforge.net/
SmallFTPD Download Stat:
http
Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.
10. DISCLOSURE TIME-LINE
2011-05-26: notified vendor
2011-06-28: vendor released fix
2011-06-28: vulnerability disclosed
11. REFERENCES
Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/joomla/core/[joomla_1.6.3
development.
7. VENDOR
Mambo CMS Development Team
http://mambo-developer.org
8. CREDIT
This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2010-11-31: notified vendor through bug tracker
2011-06-27: no patched version released
Did you really test a code base that is a version of an old Joomla base
No
or did you look at the code, and test old Joomla bugs against it?
No
The XSS results are from purely blackbox scan on Mambo 4.6.5.
Joomla (Joomla! 1.0.0) was released on September 16, 2005. It was a
re-branded
]
-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
, the next target is Cenzic
web site. Let's see how strong the Kung-Fu of Cenzic HailStorm scanner
is.
-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar (Burma)
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd
On Tue, Mar 29
Thanks for all your inputs and discussions.
We believe keeping these information as secret is unethical and irresponsible.
For those who think/criticize we're unethical /illegal,
there is so-called Passive Scanning
Vulnerabilities in *McAfee.com
1. VULNERABILITY DESCRIPTION
- Cross Site Scripting
http://download.mcafee.com/products/webhelp/4/1033/#javascript:top.location.replace('attacker.in')
- Information Disclosure Internal Hostname:
Version 0.4.6 of WhatWeb is now released. Enjoy scanning the web.
.$$$ $. .$$$ $.
$$. .$$$ $$$ .$$. .$$. $$. .$$$. .$$.
$ $$ $$$ $ $$ $$$ $ $$. $ $$ $ $$ $$$ $ $$ $$ $ $$.
$ `$ $$$ $
://code.google.com/p/inspathx/wiki/OPTION_Param_Array
== Added dotnet 1.x ASPX Full Path Disclosure (tilde character
/~.aspx) - Thanks to Ryan Dewhurst
http://code.google.com/p/inspathx/wiki/ASPNET_FULL_PATH_DISCLOSURE_DOTNET1X
-
Best regards,
YGN Ethical Hacker
. VENDOR
php-Nuke Developers
http://phpnuke.org/
8. CREDIT
Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2011-01-01: contacted author through emails
2011-01-25: contacted author through web site contact form
2010-03-23: no replies from author
2010-03-23
/data/definitions/352.html
#yehg [2010-03-23]
keywords: php nuke, php-nuke, phpnuke, 8.0, 8.1, csrf
-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd
is NOT recommended because of long lack of update
and vendor negligence about security reports.
7. VENDOR
PHP-Nuke Developers
http://phpnuke.org/
8. CREDIT
Aung Khant, http://yehg.net, YGN Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2011-01-01: contacted author through emails
2011-01-25
AFFECTED
Joomla! 1.6.0
5. PROOF-OF-CONCEPT/EXPLOIT
http://attacker.in/joomla160/libraries/phpmailer/language/phpmailer.lang-joomla.php
6. SOLUTION
Upgrade to Joomla! 1.6.1 or higher
7. VENDOR
Joomla! Developer Team
http://www.joomla.org
8. CREDIT
Aung Khant, http://yehg.net, YGN Ethical Hacker
, YGN
Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2011-03-10: notified vendor
2011-03-16: vendor released fixed version
2011-03-18: vulnerability disclosed
10. REFERENCES
Original Advisory URL:
http://yehg.net/lab/pr0js/advisories/[xoops_2.5.0]_cross_site_scripting
Vendor Announcement
://bbpress.org/
8. CREDIT
This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2010-12-23: notified vendor
2011-02-24: vendor released fixed version
2011-03-13: vulnerability disclosed
10. REFERENCES
Original Advisory URL:
http
Host-Extract | Host/IP Pattern Extractor
===
category: /pentest/enumeration/www
useful area: blackbox testing
This little ruby script tries to extract all IP/Host patterns in page
response of a given URL and JavaScript/CSS files of that URL.
With it, you can quickly
to Joomla! 1.6.1 or higher
8. VENDOR
Joomla! Developer Team
http://www.joomla.org
9. CREDIT
This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.
10. DISCLOSURE TIME-LINE
2011-01-24: notified vendor
2011-03-08: vendor released fix
2011-03-14
by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2011-01-24: notified vendor
2011-03-08: vendor released fix
2011-03-14: vulnerability disclosed
10. REFERENCES
Vendor Advisory URL:
http://developer.joomla.org/security/news/328-20110201-core-sql-injection
. VENDOR
PHPShop Development Team
http://phpshop.org
8. CREDIT
This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2011-02-25: vulnerability disclosed
10. REFERENCES
Original Advisory URL:
http://yehg.net/lab/pr0js
/index.php?p=/entry/;scriptalert(/XSS/)/script
6. SOLUTION
Upgrade to Vanilla Forums 2.0.17.6 or higher
7. VENDOR
Vanilla Forums Development Team
http://vanillaforums.org/
8. CREDIT
This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.
9
/
8. CREDIT
This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2010-12-24: notified vendor
2011-01-25: vendor released fix
2011-02-01: vulnerability disclosed
10. REFERENCES
Original Advisory URL: http://yehg.net/lab
regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored
. SOLUTION
Upgrade to Vanilla Forums 2.0.17 or higher
7. VENDOR
Vanilla Forums Development Team
http://vanillaforums.org/
8. CREDIT
This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2010-12-14: notified vendor
2011-01
.
For those who manage servers, set php error_display setting as 'on' in
php.ini file.
For those who don't, simple put php_flag error_display off in
.htaccess file of web root directory (unless it is restricted by
php_admin_flag)
-
Best regards,
YGN Ethical Hacker Group
. SOLUTION
For those who're using version phpMyAdmin 3.4.0 beta 2 and lower,
check out the latest commit (git pull).
8. VENDOR
phpMyAdmin (http://www.phpmyadmin.net)
9. CREDIT
This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.
10. DISCLOSURE TIME
, YGN
Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2011-01-03: notified Joomla! Security Strike Team regardless of EOL status
2011-01-06: vulnerability disclosed
2011-01-07: vendor confirmed that they would not release patch
10. VENDOR RESPONSE
While noted, your exploit report does
://yehg.net, YGN
Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2011-01-03: notified Joomla! Security Strike Team regardless of EOL status
2011-01-06: vulnerability disclosed
2011-01-07: vendor confirmed that they would not release patch
10. VENDOR RESPONSE
While noted, your exploit report
.
Disable Full HTML formatting for sites that allow public user registration.
8. VENDOR
Drupal Development Team
http://drupal.org
9. CREDIT
This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.
10. DISCLOSURE TIME-LINE
2010-12-30: notified vendor
Full HTML formatting for sites that allow public user registration.
8. VENDOR
Drupal Development Team
http://drupal.org
9. CREDIT
This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.
10. DISCLOSURE TIME-LINE
2010-12-30: notified vendor
2010-12
On Fri, Jan 14, 2011 at 4:28 AM, Justin Klein Keane jus...@madirish.net wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Drupal security has been aware of this issue for quite some time now.
But basically, as their response indicates, you need admin access to
exploit these issues.
for it.
-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted
6. SOLUTION
Joomla 1.0.x series has been at end of life since 2009-07-22.
Upgrade to Joomla! 1.5.x family (1.5.22 as of 2011-01-05)
7. VENDOR
Joomla! Developer Team
http://www.joomla.org
8. CREDIT
This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group
This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2010-12-31: notified vendor
2011-01-02: vendor released fixed version
2011-01-04: vulnerability disclosed
10. REFERENCES
Original Advisory URL:
http://yehg.net/lab/pr0js
='+or+'a'+'aquick_search=Search+PMsallbox=Check+Allfromfid=0fid=4jumpto=4action=do_stuff
6. SOLUTION
Upgrade to 1.6.1
7. VENDOR
MyBB Development Team
http://www.mybb.com/
8. CREDIT
This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.
9
=Preview
Post
6. SOLUTION
Upgrade to 1.6.1
7. VENDOR
MyBB Development Team
http://www.mybb.com/
8. CREDIT
This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.
9. DISCLOSURE TIME-LINE
2010-12-09: notified vendor
2010-12-15: vendor released fixed
(February 2011) and 3.7 (June 2011).
8. VENDOR
Eclipse Developers Team
http://www.eclipse.org/
9. CREDIT
This vulnerability was discovered by Aung Khant, http://yehg.net, YGN
Ethical Hacker Group, Myanmar.
10. DISCLOSURE TIME-LINE
2010-11-04 : vulnerability discovered
2010-11-05 : notified vendor
This public disclosure has achieved its aim.
Joomla! Team finally patched this hole.
http://developer.joomla.org/security/news/9-security/10-core-security/323-20101101-core-sqli-info-disclosurevulnerabilities.html
Upgrade to the latest Joomla! version (1.5.22 or later).
1. VULNERABILITY
: Notified Joomla! Security Strike Team
2010-11-01 : Vulnerability disclosed
4. VENDOR
Joomla! Developer Team
http://www.joomla.org
http://www.joomla.org/download.html
# YGN Ethical Hacker Group
# http://yehg.net
# 2010-11-1
To clarify, we want excellent guys here to prove/bypass/exploit the
potential issues to enforce developers to fix rather than hiding these
issues. That's what we want to say.
___
Full-Disclosure - We believe in it.
Charter:
Check the update via
svn checkout http://inspathx.googlecode.com/svn/trunk/ inspathx
Info about inspathx
http://inspathx.googlecode.com/
Change Log:
-Added username and server path display in console and log output
that looks like
I, [2010-10-14 02:10:08 pid:#6848] INFO -- : ! Username
://cwe.mitre.org/data/definitions/79.html
-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd
___
Full-Disclosure - We believe in it.
Charter: http
UPDATE
Check it out at
svn checkout http://inspathx.googlecode.com/svn/trunk/ inspathx-read-only
For those who don't know inspathx
https://code.google.com/p/inspathx/
_
WHAT¶
A tool that uses local source tree to make requests to the url and
search for path
://www.pentesterscripting.com/exploitation/bash_web_parameter_fuzzer
-
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd
___
Full
1 - 100 of 157 matches
Mail list logo