Hi All,
There is a new web application vulnerability scanner available. It is called
WebVulScan and it is open source. Here is the link for it if you want to check
it out: http://code.google.com/p/webvulscan/
Regards,
Dermot Blair
SEC Consult Vulnerability Lab Security Advisory < 20120518-0 >
===
title: libwpd WPXContentListener::_closeTableRow() memory
overwrite
product: OpenOffice.org
vulnerable v
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
CALL FOR PAPERS - Hackers 2 Hackers Conference 9th edition
The call for papers for H2HC 9th edition is now open. H2HC is a hacker
conference taking place in Sao Paulo, Brazil, from 18 to 23 October 2012.
[ - Introduction - ]
For the ninth consecuti
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 05/17/2012 09:53 PM, Andres Gomez wrote:
> Hi kurt,
>
> The fact that only local user can modify program files doesn't
> mean there is no security risk, there are a lot of examples but
> look at this:
>
> http://cve.mitre.org/cgi-bin/cvename.cgi?n
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 05/17/2012 03:29 PM, Andres Gomez wrote:
> Planeshift is an online multiplayer role playing game which is
> open source (http://en.wikipedia.org/wiki/PlaneShift_(video_game))
> and "chatbubbles.xml" is a sort of configuration file for chat
> windows
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2475-1 secur...@debian.org
http://www.debian.org/security/ Raphael Geissert
May 17, 2012
Access and Increased Privileges
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Note: the current version of the following document is available here:
https://h20566.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c0494
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c0
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 05/17/2012 08:52 AM, Andres Gomez wrote:
> Name: Stack-based buffer overflow in Planeshift 0.5.9 and earlier
> Software: Planeshift 0.5.9 Software link:
> http://www.planeshift.it/ Vulnerability Type: Buffer overflow
>
> Vulnerability Details:
>