/SNS_09_01_Evad_Xss_Filter_Msword.pdf
Disclosure:
The vulnerability was disclosed to Oracle in January 2009 and is patched
in October 2010 CPU release.
Credit:
Aditya K Sood of SecNiche Security
Contact:
adi_ks [at] secniche.org
Disclaimer
The information in the advisory is believed to be accurate at the
ill be patched or corrected.
Regards
Aditya K Sood
Hi Tim
You can have a look at the screenshot at below mentioned link
http://www.secniche.org/goog_chr_auth_spoof.jpg
Kind Regards
Aditya
Tim wrote:
> Aditya,
>
>
>> First of all, the dialog spoofing issue still works in Google Chrome and
>> it has not been patched.
>>
>
> I'm not surp
Hi Tim
First of all, the dialog spoofing issue still works in Google Chrome and
it has not been patched. A lot of tests have been
conducted considering different variants spoofing. I missed your paper
previously. I must say its a very good read. A similar issue about
Google URL obfuscation, which
ced in the video
itself)
Kind Regards
Aditya K Sood
http://www.secniche.org
:
http://www.secniche.org/videos/goog_chrome_frame_mem_alloc_tab_crashing.html
Blog Post:
http://zeroknock.blogspot.com/2010/01/google-chrome-3019538-chrome-frame.html
It can have diverse impact with more modularized codes in the future.
All for community purposes.
Kind Regards
Aditya K Sood
http
Hi Berend-Jan
Please find the respective responses
> Repro steps:
> 1) Some website do not sanitize user input correctly, such as the one
> in your example, which allows things like XSS:
> http://www.worksafenb.ca/redirect.asp?V=";'%20src=http://skypher.com/SkyLined/xss.js> http://www.worksafenb.c
cting web application attacks.
Post:
http://zeroknock.blogspot.com/2010/01/link-injection-redirection-attacks.html
Video: http://www.secniche.org/videos/google_chrome_link_inj.html
Browsers need to take care of these issues.
Regards
Aditya K Sood
http://www.secniche.org
Hi
Google docs network was vulnerable to PDF repurposing attacks. The
vulnerability was disclosed to Google with a discretion.
This was done to mitigate the risk . Google had worked over it and
patched it with in a period of 5 days. The Google doc has
been refined now and the integrated support f
Hi
This paper sheds light on the modified approach to trigger web attacks
through JavaScript protocol handler
in the context of browser when a PDF is opened in it. As we have seen,
the kind of security mechanism
implemented by Adobe in order to remove the insecurities that originate
directly from
The observed behavior is explained on below mentioned link
http://zeroknock.blogspot.com/2009/04/google-chrome-alert-single-thread-out.html
This vulnerability persists in newer version of Google Chrome too.
generation of new
attack vectors.
You can download the paper at:
http://www.secniche.org/paper.html
http://www.secniche.org/papers/SNS_09_01_Evad_Xss_Filter_Msword.pdf
Regards
Aditya K Sood
Founder , SecNiche Security
http://www.secniche.org
. Browsers like MOZILLA, Chrome etc are
having well
designed and effective status address bars.
For detail issue : http://www.secniche.org/ie_spoof_myth/
Regards
Aditya K Sood
http://www.secniche.org
tested are: Chrome/1.0.154.43
Disclosure Timeline:
Disclosed: 27 January 2009
Release Date. 28 January 2009
Vendor Response:
Google acknowledges this vulnerability and already working on it.
Credit:
Aditya K Sood
Disclaimer:
The information in the advisory is believed to be accurate at the time
l advisory update of 13 January 2009
Oracle Critical Patch Update:
http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2009.html
Credit:
Oracle Credited Aditya K Sood for discovering this vulnerability
Disclaimer:
The information in the advisory is believed to be accur
severity level of this flaw.The chrome ID of this issue is 5978.
Credit:
Aditya K Sood
Disclaimer:
The information in the advisory is believed to be accurate at the time
of publishing based on currently
available information. Use of the information constitutes acceptance for
use in an AS IS condition
Hi All
The Google chrome new version 0.4.154.25 is also suffering from this
vulnerability.The full POC have been released at milw0rm.
Have a look at it: http://milw0rm.com/exploits/7226
The problem is this most of web servers have anti viruses which
treated it as URL Spoofing virus. Anyways the
Chrome/0.2.149.29
Disclosure Timeline:
Disclosed: 24 November 2008
Release Date. 24 November ,2008
Vendor Response:
Reported to Google.
Credit:
Aditya K Sood
Disclaimer:
The information in the advisory is believed to be accurate at the time
of publishing based
on currently available information. Use
ility affects Google Chrome on Microsoft
Windows
XP SP2 platform.The versions tested are:
Chrome/0.2.149.30
Chrome/0.2.149.29
Disclosure Timeline:
Disclosed: 19 October 2008
Release Date. 21 October ,2008
Vendor Response:
Google acknowledges this vulnerability and "fix" will be release
:*
Disclosed: 25 September 2008
Release Date. September 27 ,2008
*Vendor Response:*
Google acknowledges this vulnerability as security bug
and "fix" will be released soon.
*Credit:*
Aditya K Sood
*10. Disclaimer*
The information in the advisory is believed to be accurate at the time
of publis
this vulnerability affects Opera on Microsoft
Windows XP SP2 platform.The versions tested are:
Opera 9.52
*Disclosure Timeline:*
Disclosed: 28 September 2008
Release Date. 28 September ,2008
*Vendor Response:*
Vulnerability reported to Opera. Bug ID 365663
*Credit:*
Aditya K Sood
*Disclaimer
x
on Microsoft Windows XP SP2 platform.The versions tested are:
Mozilla 3.0.3 - 1.9.0 Branch
*Disclosure Timeline:*
Disclosed: 28 September 2008
Release Date. 28 September ,2008
*Vendor Response:*
Mozilla confirm this vulnerability.
*
Credit:*
Aditya K Sood
*Disclaimer*
The information in
t;fix" will be released soon.
*Credit:*
Aditya K Sood
*Disclaimer*
The information in the advisory is believed to be accurate at the time
of publishing based on
currently available information. Use of the information constitutes
acceptance for use in an
AS IS condition. There is no represe
al Message-----
From: Aditya K Sood [mailto:[EMAIL PROTECTED]
Sent: Wednesday, 17 September 2008 10:41 PM
To: bugtraq@securityfocus.com
Subject: Pidgin IM Client Password Disclosure Vulnerability.
Pidgin IM Client Password Disclosure Vulnerability.
*Version Affected:*
0.7.10 Unicode / Previous vers
Hi Bugtraq
Two point I want to make.
1. The version number in pidgin advisory should be 2.5.1
2. In skype explanation instead of pidgin process skype process should
be there.
I have corrected this on the reference sites.
Just want to let you know.
If any issues please let me know.
Regards
vulnerability and "fix" will be
released in the final version of Internet Explorer 8 later this year.
*Credit:*
Aditya K Sood
*Disclaimer*
The information in the advisory is believed to be accurate at the time
of publishing
based on currently available information. Use of the i
cniche.org/advisory.html
http://evilfingers.com/advisory/index.php
*
Credit:*
Aditya K Sood
*Disclaimer*
The information in the advisory is believed to be accurate at the time
of publishing based on currently
available information. Use of the information constitutes acceptance for
use in an AS IS
cept:
http://evilfingers.com/advisory/miranda_im_mem_pass_disc.pdf
http://secniche/advisory/miranda_vul.pdf
** *
*Links:
*http://secniche.org/advisory.html
http://evilfingers.com/advisory/index.php
*Credit:*
Aditya K Sood
*Disclaimer*
The information in the advisory is believed to be accurate at the time
of
t:
**http://evilfingers.com/advisory/skype_pass_dis_vul.pdf
http://secniche.org/advisory/skype_vul.pdf
Links:
http://secniche.org/advisory.html
http://evilfingers.com/advisory/index.php
*
*Credit:*
Aditya K Sood
*Disclaimer*
The information in the advisory is believed to be accurate at the time
of
Hi all
This is the reverse Engineering layout of Scvhost Internals.
|Category : Reverse Engineering Analysis.
The paper solely relates to the core internals that build up the
Windows XP Svchost. The Svchost internals have not been disseminated
into informative elements yet. I have found only on
pdp (architect) wrote:
http://www.gnucitizen.org/blog/0day-pdf-pwns-windows
I am closing the season with the following HIGH Risk vulnerability:
Adobe Acrobat/Reader PDF documents can be used to compromise your
Windows box. Completely!!! Invisibly and unwillingly!!! All it takes
is to open a PDF
Hi
I have released core research paper on SIP comprising of Payload problems
and Attack vectors.
This research paper lays stress on the potential weaknesses present in
the SIP
which make it vulnerable to stringent attacks. The point of discussion is to
understand the weak spots in the protocol.
Hi
This article deals with the latest third party popup attacks that are
performed by an attacker from the rogue
and vulnerable links of the web sites to circumvent the normal
functioning on the web. The target website
always seems to be the liable web provider from where the popup attacks
are
rity sites like secunia or idefence.
This would certainly save you from public embarrassment.
-d
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Aditya K
Sood
Sent: 17 August 2007 09:07
To: [EMAIL PROTECTED]; bugtraq@securityfocus.com;
[EMAIL PROTECTE
Advisory : Microsoft Internet Explorer Pop up Blocker Bypassing and Dos
Vulnerability
Dated : 15 August 2007
Severity : Critical
Explanation :
The vulnerability persists in the popup blocker functioning to allow
specific websites to execute
popup in the running instance of Internet Explorer.
hi
A specific white paper have been released comprising of
specific application problems related to Bison.
You can look into it.
http://www.secniche.org/papers/Ser_Insec_Bison.pdf
Regards
AKS
http://www.secniche.org
external templates. For more details :
http://www.secniche.org/papers/HackAnnotationsInJWIG.pdf
Links:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3816
http://nvd.nist.gov/cpe.cfm?cvename=CVE-2007-3816
Regards
Aditya K Sood
SecNiche Security
Hi all
The whitepapers regarding Java Web Security Technologies
have been released.
1. JNLP Security Convergence :
http://www.secniche.org/papers/JNLP_Security_Con.pdf
2. Hack Annotations in JWIG :
http://www.secniche.org/papers/HackAnnotationsInJWIG.pdf
Regards
Aditya K
. Avoid visiting untrusted Websites.
2. Script Restriction should be applied.
-
Aditya K Sood
http://www.secniche.org
.
Aditya K Sood aka Zeroknock
http://www.secniche.org
Hi all
The Mlabs have been fully shifted to secniche domain.
You can check it:
http://mlabs.secniche.org
Regards
Aditya K Sood aka Zeroknock
http://www.secniche.org
Hi all
The project CERA is up again.
CERA : Cutting Edge Research Arena. You can
look into it.
http://cera.secniche.org
Regards
Aditya K Sood aka Zeroknock
http://www.secniche.org
42 matches
Mail list logo