-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
- -
Debian Security Advisory DSA-3332-1 secur...@debian.org
https://www.debian.org/security/ Thijs Kinkhorst
August 11, 2015
Overview
===
WiFi Pineapples are a penetration testing tool used in offensive
wireless activities. These devices run on a modified OpenWRT (based on
netBSD) operating system. They include a web-based management
interface.
It has been discovered they have predictable anti-CSRF tokens ba
[+] Credits: John Page aka hyp3rlinx
[+] Website: hyp3rlinx.altervista.org
[+] Source: http://hyp3rlinx.altervista.org/advisories/AS-PHPIPAM0812.txt
Vendor:
phpipam.net
Product:
==
phpipam-1.1.010
Vulnerability Type:
=
[+] Credits: John Page aka hyp3rlinx
[+] Website: hyp3rlinx.altervista.org
[+] Source:
http://hyp3rlinx.altervista.org/advisories/AS-PHPFILENAVIGATOR0812a.txt
Vendor:
pfn.sourceforge.net
Product:
===
PHPfileNavigator v2.3.3
[+] Credits: John Page aka hyp3rlinx
[+] Website: hyp3rlinx.altervista.org
[+] Source: http://hyp3rlinx.altervista.org/advisories/AS-PHPIPAM0812.txt
Vendor:
phpipam.net
Product:
==
phpipam-1.1.010
Vulnerability Type:
=
Blue Frost Security GmbH
https://www.bluefrostsecurity.de/ research(at)bluefrostsecurity.de
BFS-SA-2015-001 12-August-2015
Vendor: Micros
[+] Credits: John Page aka hyp3rlinx
[+] Website: hyp3rlinx.altervista.org
[+] Source:
http://hyp3rlinx.altervista.org/advisories/AS-PHPFILENAVIGATOR0812c.txt
Vendor:
pfn.sourceforge.net
Product:
===
PHPfileNavigator v2.3.3
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA--1 secur...@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
August 12, 2015
Document Title:
===
bizidea Design CMS 2015Q3 - SQL Injection Vulnerability
References (Source):
http://www.vulnerability-lab.com/get_content.php?id=1571
Release Date:
=
2015-08-12
Vulnerability Laboratory ID (VL-ID):
==
PRECURSOR
There will be debate about if this is a vulnerability. It affects a
majority of user PCs -- including all Enterprise editions of Windows,
there is no way to disable it, and allows direct code execution into
secure boot sequences. I believe it is worth discussing.
SCOPE
Microsoft docu
##
# This module requires Metabuffer: http://metabuffer.com/download
# Current source: https://github.com/rapid7/metabuffer-framework
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
#Rank definition:
http://dev.metabuffer.com/redmine/projects/framework/wiki/Exploit_Ranking
#M
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-3334-1 secur...@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
August 12, 2015
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Onapsis Security Advisory 2015-011: SAP Mobile Platform DataVault
Predictable encryption passwordsfor Configuration Values
1. Impact on Business
- -
By exploiting this vulnerability an attacker with access to a vulnerable
mobile
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Onapsis Security Advisory 2015-012: SAP Mobile Platform DataVault
Predictable Encryption Password for Secure Storage
1. Impact on Business
- -
By exploiting this vulnerability an attacker with access to a vulnerable
mobile devic
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Onapsis Security Advisory 2015-010: SAP Mobile Platform DataVault
Keystream Recovery
1. Impact on Business
- -
By exploiting this vulnerability an attacker with access to a vulnerable
mobile device would be able to decrypt crede
15 matches
Mail list logo