Popular search engine optimization plugin, SEO by Yoast fixed a blind SQL injection vulnerability yesterday that could be exploited to take control of affected sites.
Monthly Archives: March 2015
Bugtraq: Cisco Security Advisory: Cisco Intrusion Prevention System MainApp Secure Socket Layer Denial of Service Vulnerability
Cisco Security Advisory: Cisco Intrusion Prevention System MainApp Secure Socket Layer Denial of Service Vulnerability
Bugtraq: Microsoft Office Compatibility Pack tries to execute path without quotes
Microsoft Office Compatibility Pack tries to execute path without quotes
Bugtraq: Cisco Security Advisory: Cisco Secure Access Control System SQL Injection Vulnerability
Cisco Security Advisory: Cisco Secure Access Control System SQL Injection Vulnerability
Bugtraq: SQL Injection in Huge IT Slider WordPress Plugin
SQL Injection in Huge IT Slider WordPress Plugin
Kaspersky Lab Finds For the Fourth Year in a Row that Login Information is Most Targeted by Malicious Email Spam
ElasticSearch Search Groovy Sandbox Bypass
This Metasploit module exploits a remote command execution (RCE) vulnerability in ElasticSearch, exploitable by default on ElasticSearch prior to 1.4.3. The bug is found in the REST API, which does not require authentication, where the search function allows groovy code execution and its sandbox can be bypassed using java.lang.Math.class.forName to reference arbitrary classes. It can be used to execute arbitrary Java code. This Metasploit module has been tested successfully on ElasticSearch 1.4.2 on Ubuntu Server 12.04.
Microsoft Windows Shell File Format LNK Code Execution
This Metasploit module exploits a vulnerability in the MS10-046 patch to abuse (again) the handling of Windows Shortcut files (.LNK) that contain an icon resource pointing to a malicious DLL. This Metasploit module creates the required files to exploit the vulnerability. They must be uploaded to an UNC path accessible by the target. This Metasploit module has been tested successfully on Windows 2003 SP2 with MS10-046 installed and Windows 2008 SP2 (32 bits) with MS14-027 installed.
Microsoft Windows Shell SMB LNK Code Execution
This Metasploit module exploits a vulnerability in the MS10-046 patch to abuse (again) the handling of Windows Shortcut files (.LNK) that contain an icon resource pointing to a malicious DLL. This creates an SMB resource to provide the payload and the trigger, and generates a LNK file which must be sent to the target. This Metasploit module has been tested successfully on Windows 2003 SP2 with MS10-046 installed and Windows 2008 SP2 (32 bits) with MS14-027 installed.
Samsung SNS Provider Application For Android Access Theft
Samsung SNS provider application for Android stores valid session identifiers for social networking sites and will disclose them to other malicious applications.