Category Archives: Full Disclosure

Full Disclosure

Capstone disassembly framework 3.0.3 is out!

Posted by Nguyen Anh Quynh on May 09

Greetings,

Version 3.0.3 of Capstone disassembly framework if officially out!

I would like to dedicate this release to Prof. Yoshiyasu Takefuji, my
former advisor, who is turning 60 years old this year 2015!

For those who do not know, Capstone is an open source multi-arch,
multi-platform disassembly engine. Find more about our project at
http://capstone-engine.org

Summary of important changes in v3.0.3:

– Fixed a segfault of X86 engine.
-…

Artnana Webboard version 1.4 XSS (Cross-site Scripting) Web Security Vulnerabilities

Posted by Jing Wang on May 08

*Artnana Webboard version 1.4 XSS (Cross-site Scripting) Web Security
Vulnerabilities*

Exploit Title: Artnana Webboard version 1.4 Multiple XSS Security
Vulnerabilities
Product: Webboard
Vendor: Artnana
Vulnerable Versions: version 1.4
Tested Version: version 1.4
Advisory Publication: May 09, 2015
Latest Update: May 09, 2015
Vulnerability Type: Cross-Site Scripting [CWE-79]
CVE Reference: *
Impact CVSS Severity (version 2.0):
CVSS v2 Base Score:…

MT.VERNON MEDIA Web-Design v1.12 HTML Injection Web Security Vulnerabilities

Posted by Jing Wang on May 08

*MT.VERNON MEDIA Web-Design v1.12 HTML Injection Web Security
Vulnerabilities*

Exploit Title: MT.VERNON MEDIA Web-Design v1.12 “gallery.php?” &category
parameter HTML Injection Security Vulnerabilities
Product: Web-Design v1.12
Vendor: MT.VERNON MEDIA
Vulnerable Versions: v1.12
Tested Version: v1.12
Advisory Publication: May 08, 2015
Latest Update: May 08, 2015
CVE Reference: *
Impact CVSS Severity (version 2.0):
CVSS v2 Base…

MT.VERNON MEDIA Web-Design v1.12 Multiple SQL Injection Web Security Vulnerabilities

Posted by Jing Wang on May 08

*MT.VERNON MEDIA Web-Design v1.12 Multiple SQL Injection Web Security
Vulnerabilities*

Exploit Title: MT.VERNON MEDIA Web-Design v1.12 Multiple SQL Injection
Security Vulnerabilities
Product: Web-Design
Vendor: MT.VERNON MEDIA
Vulnerable Versions: v1.12
Tested Version: v1.12
Advisory Publication: May 08, 2015
Latest Update: May 08, 2015
Vulnerability Type: Improper Neutralization of Special Elements used in an
SQL Command (‘SQL…

MT.VERNON MEDIA Web-Design v1.12 Multiple XSS (Cross-site Scripting) Web Security Vulnerabilities

Posted by Jing Wang on May 08

*MT.VERNON MEDIA Web-Design v1.12 Multiple XSS (Cross-site Scripting) Web
Security Vulnerabilities*

Exploit Title: MT.VERNON MEDIA Web-Design v1.12 Multiple XSS Security
Vulnerabilities
Product: Web-Design
Vendor: MT.VERNON MEDIA
Vulnerable Versions: v1.12
Tested Version: v1.12
Advisory Publication: May 07, 2015
Latest Update: May 07, 2015
Vulnerability Type: Cross-Site Scripting [CWE-79]
CVE Reference: *
Impact CVSS Severity (version 2.0):
CVSS…

Feed2JS v1.7 XSS (Cross-site Scripting) Web Security Vulnerabilities

Posted by Jing Wang on May 08

*Feed2JS v1.7 XSS (Cross-site Scripting) Web Security Vulnerabilities*

Exploit Title: Feed2JS v1.7 magpie_debug.php? &url parameter XSS Security
Vulnerabilities
Product: Feed2JS
Vendor: feed2js.org
Vulnerable Versions: v1.7
Tested Version: v1.7
Advisory Publication: May 09, 2015
Latest Update: May 09, 2015
Vulnerability Type: Cross-Site Scripting [CWE-79]
CVE Reference: *
Impact CVSS Severity (version 2.0):
CVSS v2 Base Score: 4.3 (MEDIUM)…

Re: AMD Bulldozer Linux ASLR weakness: Reducing entropy by 87.5%

Posted by Hector Marco-Gisbert on May 08

Hi,

PaX solution has actually 16 random bits for mmap objects in 32bit systems on
non affected systems. On affected systems the random bits are degraded to 2^13.
Unfortunately, depending on the PaX Kernel configuration sequence, some features
may not be enabled. There are sequences of PaX configuration which does not give
the expected result.

The configuration sequence that results in a miss-configured system is:

1.- Starting from a…

Docker 1.6.1 – Security Advisory [150507]

Posted by Eric Windisch on May 08

Docker Engine version 1.6.1 has been released to address several
vulnerabilities and is immediately available for all supported platforms.
Users are advised to upgrade existing installations of the Docker Engine
and use 1.6.1 for new installations.

It should be noted that each of the vulnerabilities allowing privilege
escalation may only be exploited by a malicious Dockerfile or image. Users
are advised to run their own images and/or images…