Hello,
I have revised the paper based on the comments, and put the revised version on
the Pomcor site, at
http://www.pomcor.com/whitepapers/file_sharing_security.pdf
(Watch for a revision date of November 10, there was an earlier version.)
The changes include an improvement based on the last
This is not created by me, however, many site are being exploited due to
it, so I thought I'd spread the word:
http://www.milw0rm.com/exploits/7078
###
Joomla Component com_jb2(PostID) SQL-injetion Vulnerability
Address spoofing. Already patched. It's in the news last month.
Just a reminder, XCON'08 is coming in a week - check http://xcon.xfocus.org/
greetz to drewcopley, drorshalev, zwell, liuyuer, lqa21, and, of course
[EMAIL PROTECTED]
--
===
Ubuntu Security Notice USN-669-1 November 11, 2008
gnome-screensaver vulnerabilities
CVE-2007-6389, CVE-2008-0887
===
A security issue affects the following Ubuntu
?php
/*
ooVoo 1.7.1.35 (URL Protocol) remote unicode buffer overflow poc
by Nine:Situations:Group::bruiser
tested against IE8b/xp sp3
9sg site: http://retrogod.altervista.org/
software site: http://www.oovoo.com/
description: ooVoo is a startup video conferencing and instant messaging
Bil,
If the browser displayed the file
and the user takes no precautions, the file should
be in the browser's cache.
Yngve Pettersen of Opera is working on a proposed
browser specification for Context Cache that
would allow cached items to expire/be discarded
immediately upon logging
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-
Debian Security Advisory DSA-1664-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Moritz Muehlenhoff
November 10, 2008