[Full-disclosure] [SECURITY] [DSA 2403-2] php5 security update

2012-02-07 Thread Thijs Kinkhorst
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - Debian Security Advisory DSA-2403-2 secur...@debian.org http://www.debian.org/security/ Thijs Kinkhorst February 06, 2012

[Full-disclosure] CVE-2012-0803: Apache CXF does not validate UsernameToken policies correctly

2012-02-07 Thread Colm O hEigeartaigh
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 CVE-2012-0803: Apache CXF does not validate UsernameToken policies correctly Severity: Important Vendor: The Apache Software Foundation Versions Affected: Apache CXF 2.4.5 and 2.5.1 Description: CXF does not validate a WS-Security UsernameToken re

[Full-disclosure] SQL Injection Vulnerability in Batavi 1.1.2

2012-02-07 Thread Netsparker Advisories
Information Name :  SQL Injection Vulnerability in Batavi Software :  Batavi 1.1.2 and possibly below. Vendor Homepage :  http://www.batavi.org Vulnerability Type :  SQL Injection Severity :  Critical Researcher :  Onur Yılmaz Advisory Reference :  NS-12-003 Description --

[Full-disclosure] Sun Microsystems (Print) - Cross Site Scripting Vulnerability

2012-02-07 Thread resea...@vulnerability-lab.com
Title: == Sun Microsystems (Print) - Cross Site Scripting Vulnerability Date: = 2012-02-01 References: === http://www.vulnerability-lab.com/get_content.php?id=404 VL-ID: = 404 Introduction: = Sun Microsystems, Inc. was a company that sold computers, computer

[Full-disclosure] Electronic Arts - Cross Site Scripting Vulnerability

2012-02-07 Thread resea...@vulnerability-lab.com
Title: == Electronic Arts - Cross Site Scripting Vulnerability Date: = 2012-02-06 References: === http://www.vulnerability-lab.com/get_content.php?id=367 VL-ID: = 367 Introduction: = Electronic Arts, Inc. (EA) (NASDAQ: EA) is a major American developer, mar

Re: [Full-disclosure] Vulnerability-lab.com XSS

2012-02-07 Thread resea...@vulnerability-lab.com
i recomment your desinformation with 2 short links ... article: http://www.vulnerability-lab.com/dev/?p=382 news: http://www.vulnerability-lab.com/news/get_news.php?id=74 ... we will not respond to this crap anymore ... false envy. by ;) -- Website: www.vulnerability-lab.com ; vuln-lab.com or

Re: [Full-disclosure] Exploit Pack - Hacking Microsoft Word and Excel

2012-02-07 Thread Julius Kivimäki
And down goes exploitpack.com 2012/2/6 > This is purely spamming for the reason of trying to get someone to buy > this product. I haven't seen any value added from this account. > > John Cartwright - isn't this in the charter that pure spamming will > cause your name to get removed from the lis

Re: [Full-disclosure] Exploit Pack - Hacking Microsoft Word and Excel

2012-02-07 Thread Samuel Hassine
Please stop spam! Le 06/02/2012 04:25, nore...@exploitpack.com a écrit : > This video shows how to exploit a vulnerability in Microsoft Word and > Excel by using Exploit Pack 2.1.7. Get you own copy of Exploit Pack > from: http://exploitpack.com > > Check it out: http://www.youtube.com/watch?v=4

Re: [Full-disclosure] Exploit Pack - Hacking Microsoft Word and Excel

2012-02-07 Thread Valdis . Kletnieks
On Mon, 06 Feb 2012 05:40:52 MST, ctrun...@christophertruncer.com said: > This is purely spamming for the reason of trying to get someone to buy > this product. I haven't seen any value added from this account. procmail is your friend. pgptztfcXeqJr.pgp Description: PGP signature __

[Full-disclosure] VolksBank Online Banking - Multiple Web Vulnerabilities

2012-02-07 Thread resea...@vulnerability-lab.com
Title: == VolksBank Online Banking - Multiple Web Vulnerabilities Date: = 2012-02-07 References: === http://www.vulnerability-lab.com/get_content.php?id=172 VL-ID: = 172 Introduction: = Die Volksbank AG trifft eine Reihe von Sicherheitsvorkehrungen, die einen

[Full-disclosure] eFronts Community++ v3.6.10 - Cross Site Vulnerability

2012-02-07 Thread resea...@vulnerability-lab.com
Title: == eFronts Community++ v3.6.10 - Cross Site Vulnerability Date: = 2012-02-07 References: === http://www.vulnerability-lab.com/get_content.php?id=423 VL-ID: = 423 Introduction: = Tailored with larger organizations in mind, eFront Community ++ offers so

[Full-disclosure] Facebook Game Store - SQL Injection Vulnerability

2012-02-07 Thread resea...@vulnerability-lab.com
Title: == Facebook Game Store - SQL Injection Vulnerability Date: = 2012-02-04 References: === http://www.vulnerability-lab.com/get_content.php?id=408 VL-ID: = 408 Introduction: = The application is currently included and viewable by all facebook users. The s

[Full-disclosure] Dinama SMS Service - Persistent Web Vulnerability

2012-02-07 Thread resea...@vulnerability-lab.com
Title: == Dinama SMS Service - Persistent Web Vulnerability Date: = 2012-02-05 References: === http://www.vulnerability-lab.com/get_content.php?id=417 VL-ID: = 417 Introduction: = Las soluciones de medios interactivos de DINAMA habilitan la comunicación bidi

[Full-disclosure] Video => Cyberoam Central Console v2.x - File Include Vulnerability

2012-02-07 Thread resea...@vulnerability-lab.com
Title: == Cyberoam Central Console v2.x - File Include Vulnerability Date: = 2012-02-05 References: === Download: http://www.vulnerability-lab.com/resources/videos/411.wmv View: http://www.youtube.com/watch?v=pGJy2XNugy8 VL-ID: = 411 Status: Pub

[Full-disclosure] Video => Google Service Reward #1 - ClickJacking Vulnerability

2012-02-07 Thread resea...@vulnerability-lab.com
Title: == Google Service Reward #1 - ClickJacking Vulnerability Date: = 2012-02-07 References: === Download: http://www.vulnerability-lab.com/resources/videos/416.wmv View: http://www.youtube.com/watch?v=6N0YS9cTRHw VL-ID: = 416 Status: Publishe

[Full-disclosure] HITB2011KUL - Post Memory Corruption Analysis

2012-02-07 Thread resea...@vulnerability-lab.com
Title: == HITB2011KUL - Post Memory Corruption Analysis Date: = 2012-01-26 References: === Download: http://www.vulnerability-lab.com/resources/videos/398.wmv View: http://www.youtube.com/watch?v=kOgarD9KCbg VL-ID: = 398 Status: Published Expl

[Full-disclosure] HITB2011KUL - Mobile Malware Analysis

2012-02-07 Thread resea...@vulnerability-lab.com
Title: == HITB2011KUL - Mobile Malware Analysis Date: = 2012-02-06 References: === Download: http://www.vulnerability-lab.com/resources/videos/424.wmv View: http://www.youtube.com/watch?v=nVAuZ7jf7Sk VL-ID: = 424 Status: Published Exploitation

[Full-disclosure] HITB2011KUL - Chip & PIN - Protocol Analysis EMV POS

2012-02-07 Thread resea...@vulnerability-lab.com
Title: == HITB2011KUL - Chip & PIN - Protocol Analysis EMV POS Date: = 2012-01-26 References: === Download: http://www.vulnerability-lab.com/resources/videos/399.wmv View: http://www.youtube.com/watch?v=5zFlqMFWYhc VL-ID: = 399 Status: Published

[Full-disclosure] HITB2011KUL - Is The Pen Still Mightier Than The Sword

2012-02-07 Thread resea...@vulnerability-lab.com
Title: == HITB2011KUL - Is The Pen Still Mightier Than The Sword Date: = 2012-01-18 References: === Download: http://www.vulnerability-lab.com/resources/videos/385.wmv View: http://www.youtube.com/watch?v=9dsYY_Zl4sk VL-ID: = 385 Status: Publis

Re: [Full-disclosure] Vulnerability-lab.com XSS

2012-02-07 Thread Sanguinarious Rose
His story seemed rather odd and BS to begin with so thanks for cleaning that up for much entertainment and ownage. Excellent day to you good sir. On Mon, Feb 6, 2012 at 5:55 PM, resea...@vulnerability-lab.com wrote: > i recomment your desinformation with 2 short links ... > > article: http://www

Re: [Full-disclosure] Exploit Pack - Hacking Microsoft Word and Excel

2012-02-07 Thread Chuckyz Seed
http://www.sendspace.com/file/f8pexd // insectpro when he rmd the other one, i just uploaded it again :-) and i wilm d so, until this product, is purely a waste of time. :) have a lovely fucking day assfaces! On 7 February 2012 00:12, Julius Kivimäki wrote: > And down goes exploitpack.com > >

[Full-disclosure] [Announcement] ClubHack Magazine Issue 25, Feb 2012 Released

2012-02-07 Thread Abhijeet Patil
Dear All, ClubHack Magazine's Issue-25, Feb 2012 is released. The theme for this issue is Network Exploitation and Security. This issue covers following articles:- 0x00 Tech Gyan - Exploiting Remote System without Being Online 0x01 Tool Gyan - Cain and Abel: The Black Art of ARP Poisoning 0x02 M