Re: Watch your Downloads: the risk of the "auto-download" feature on Microsoft Edge and Google Chrome

Posted by Stefan Kanthak on Oct 05

“Haifei Li” <haifei-non-reply () outlook com> wrote:

Of course somebody wrote and talked about this already:
<http://blog.acrossecurity.com/2012/02/downloads-folder-binary-planting.html>
<http://blog.acrossecurity.com/2012/04/adobe-reader-x-1012-msiexecexe-planting.html>
<http://blog.acrossecurity.com/2010/09/binary-planting-goes-exe.html>
<…

Re: WinRAR SFX v5.21 – Remote Code Execution Vulnerability

Posted by Stefan Kanthak on Oct 05

“Gynvael Coldwind” <gynvael () coldwind pl> wrote:

Amen!

That’s why giving unsuspecting users *.EXE to install a software package
or to unpack an archive and thus training them to run almost anything
they get their hands on is a BLOODY STUPID idea in the first place.

ALWAYS use the platforms native package or archive formats to distribute
your software or files!

Right again.

stay tuned
Stefan

Re: Watch your Downloads: the risk of the "auto-download" feature on Microsoft Edge and Google Chrome

Posted by Lee on Oct 05

Haifei Li, changing the default behavior to open a window asking the
user where to save the file would change nothing. A “normal user”
would just click the “save” button to save the file in the default
folder. I also don’t think it should be the browser’s responsibility
to look for potential malicious DLLs in that directory. This “normal
user” may not even use the browser to execute this executable file…

u-design wordpress theme DOM XSS

Posted by Kenan Gms on Oct 05

u-desing is a wordpress theme prone to DOM XSS vulnerability.

Vendor url:
http://themeforest.net/item/udesign-responsive-wordpress-theme/253220

versions between 2.7.9 – (Updated: 08.05.2015) and 2.3.0 – (Updated:
04.02.2014 – there are 40 of them) are vulnerable to DOM XSS which can be
exploited by adding #<svg onload=alert(1)> to the end of the url.

Vendor already patched the vulnerability on higher versions, but there are
still a…

DDos Attack To Drop The Internet

Posted by Jeffrey Roberts on Oct 05

If you were to have a botnet which were to flood random DNS queries
for domains that did not exist to the list of DNS servers hosted on
http://public-dns.tk/nameservers-all.txt then the root dns servers and
the tld dns servers would be overwhelmed without any way to filter the
packets, if they were to filter the packets of the DNS servers, they
themselves would be turning off DNS, hence they can not do that… If
the botnet only hits the DNS…

Blind SQL Injection in admin panel PHP-Fusion <= v7.02.07

Posted by Manuel Garcia Cardenas on Oct 05

=============================================
MGC ALERT 2015-002
– Original release date: September 18, 2015
– Last revised: October 05, 2015
– Discovered by: Manuel García Cárdenas
– Severity: 7,1/10 (CVSS Base Score)
=============================================

I. VULNERABILITY
————————-
Blind SQL Injection in admin panel PHP-Fusion <= v7.02.07

II. BACKGROUND
————————-
PHP-Fusion is a lightweight open…

CVE-2015-7322

The Secure Meeting (Pulse Collaboration) in Pulse Connect Secure (formerly Juniper Junos Pulse) before 7.1R22.1, 7.4, 8.0 before 8.0R11, and 8.1 before 8.1R3 provides different messages for attempts to join a meeting depending on the status of the meeting, which allows remote attackers to enumerate valid meeting ids via a series of requests.