pridels-team.blogspot.com
-UNSECURED SYSTEMS-: Open Classifieds version 1.7.0.2 XSS Vuln.
http://pridels-team.blogspot.com/2010/09/open-classifieds-version-1702-xss-vuln.html
Sunday, 12 September 2010. Open Classifieds version 1.7.0.2 XSS Vuln. Vuln discovered by : r0t. Date: 12 September 2010. Affected versions:Open Classifieds version 1.7.0.2. Open Classifieds version 1.7.0. Versions also can be affected. Open Classifieds contains a flaw that allows a remote Cross-Site Scripting attacks.Input passed to the "desc","price","title","place" parameter in "index.php" and "subject" parameter in "contact.htm" isn't properly sanitised before being returned to the user.
pridels-team.blogspot.com
-UNSECURED SYSTEMS-: parmainas
http://pridels-team.blogspot.com/2012/08/parmainas.html
Saturday, 11 August 2012. Subscribe to: Post Comments (Atom). The Cover of Night.
pridels-team.blogspot.com
-UNSECURED SYSTEMS-: XSE shopping cart XSS vuln.
http://pridels-team.blogspot.com/2010/09/xse-shopping-cart-xss-vuln.html
Wednesday, 15 September 2010. XSE shopping cart XSS vuln. Vuln discovered by : r0t. Date: 15 September 2010. Vendor:http:/ www.ecommercesoft.net/. Affected versions:ver.: 1.5.3.0 / 1.5.2.1. Versions also can be affected. XSE shopping cart contains a flaw that allows a remote Cross-Site Scripting attacks.Input passed to the "id" parameter in "default.aspx" and "type" parameter in "SearchResults.aspx" isn't properly sanitised before being returned to the user. Subscribe to: Post Comments (Atom).
pridels-team.blogspot.com
-UNSECURED SYSTEMS-: iBoutique.MALL 1.2 XSS vuln.
http://pridels-team.blogspot.com/2010/09/iboutiquemall-12-xss-vuln.html
Thursday, 9 September 2010. IBoutique.MALL 1.2 XSS vuln. Vuln discovered by : r0t. Date: 09 September 2010. Vendor:http:/ www.netartmedia.net/mall/. Affected versions:iBoutique.MALL 1.2and other. Versions also can be affected. IBoutique.MALL 1.2 contains a flaw that allows a remote Cross-Site Scripting attacks.Input passed to the "tmpl" parameter in "index.php" isn't properly sanitised before being returned to the user. Filter malicious characters and character sequences in a web proxy. The Cover of Night.
pridels-team.blogspot.com
-UNSECURED SYSTEMS-: NetArtMEDIA Real Estate Portal v2.0 XSS vuln. + NetArtMEDIA lfi.
http://pridels-team.blogspot.com/2010/09/netartmedia-real-estate-portal-v20-xss.html
Thursday, 9 September 2010. NetArtMEDIA Real Estate Portal v2.0 XSS vuln. NetArtMEDIA lfi. Vuln discovered by : r0t. Date: 09 September 2010. Vendor:http:/ www.netartmedia.net/realestate/. Affected versions:NetArtMEDIA Real Estate Portal v2.0 and other. Versions also can be affected. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. For successful exploitation you must be logged in. Subscribe to: Post Comments (Atom).
pridels-team.blogspot.com
-UNSECURED SYSTEMS-: Viss Turpinas
http://pridels-team.blogspot.com/2012/02/viss-turpinas.html
Saturday, 4 February 2012. Rakstu latviski jo pashlaik no no ievaonojamibu mekleshanas esmu taalu. Uz doto bridi stradaju lai üelnitu sev un savai gimenei iztikuun man neatliek laika lai nodarbotos ar zinatni. Ja protams atrastos kads investors kursh gribetu savu droshibas kompaniju pacelt debesis,tad varetu mes izmantot savu potencialu. Bet vispar sho lietu galigi nepametu, kadu dienu kaut vai pec 10 gadiem to varu atsakt un uzstadiit jaunus rekordus shaja mazaja nishaa. 3 March 2012 at 17:51.
pridels-team.blogspot.com
-UNSECURED SYSTEMS-: new r0t FAQ edition 0.91 alfa
http://pridels-team.blogspot.com/2010/09/new-r0t-faq-edition-091-alfa.html
Saturday, 11 September 2010. New r0t FAQ edition 0.91 alfa. R0t FAQ edition 0.91 alfa. Im r0t who reports mostly about new SQL/XSS attack vulnerabilities on net. So there is some things that i want to do clear:. 1)You arent correct with you report. 1Every from my vulnerability report is autmaticaly reported to biggest vuln. research. About that of course i have problems with governments,police and other structures who fight vS "hackers" at all , but its my problem ,not yours. 2)Next time report to vendor!