-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
---
VMware Security Advisory
Advisory ID: VMSA-2012-0011
Synopsis:VMware hosted products and ESXi and ESX patches address
security issues
Issue da
View online: http://drupal.org/node/1633054
* Advisory ID: DRUPAL-SA-CONTRIB-2012-103
* Project: Global Redirect [1] (third-party module)
* Version: 6.x, 7.x
* Date: 2012-June-13
* Security risk: Less critical [2]
* Exploitable from: Remote
* Vulnerability: Open Redirect
DE
View online: http://drupal.org/node/1633048
* Advisory ID: DRUPAL-SA-CONTRIB-2012-102
* Project: Ubercart AJAX Cart [1] (third-party module)
* Version: 6.x
* Date: 2012-June-13
* Security risk: Less critical [2]
* Exploitable from: Remote
* Vulnerability: Information Disclosure
View online: http://drupal.org/node/1632918
* Advisory ID: DRUPAL-SA-CONTRIB-2012-101
* Project: Protected node [1] (third-party module)
* Version: 6.x
* Date: 2012-June-13
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Access bypass
DE
View online: http://drupal.org/node/1632908
* Advisory ID: DRUPAL-SA-CONTRIB-2012-100
* Project: SimpleMeta [1] (third-party module)
* Version: 6.x
* Date: 2012-June-13
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site Request Forgery
--
View online: http://drupal.org/node/1632900
* Advisory ID: DRUPAL-SA-CONTRIB-2012-099
* Project: Node Hierarchy [1] (third-party module)
* Version: 6.x
* Date: 2012-June-13
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site Request Forgery
View online: http://drupal.org/node/1632734
* Advisory ID: DRUPAL-SA-CONTRIB-2012-098
* Project: Janrain Capture [1] (third-party module)
* Version: 6.x, 7.x
* Date: 2012-June-13
* Security risk: Less critical [2]
* Exploitable from: Remote
* Vulnerability: Open Redirect
DE
I love these posts that troll for visits to someone's site.
--
Alex Buie
Network Coordinator / Server Engineer
KWD Services, Inc
Media and Hosting Solutions
+1(703)445-3391
+1(480)253-9640
+1(703)919-8090
ab...@kwdservices.com
ज़रा
On Wed, Jun 13, 2012 at 4:28 PM, Adam Behnke wrote:
> NGR Bot (a
NGR Bot (also known as Dorkbot) was examined to be a user-mode rootkit that
could be remotely controlled via Internet-Relay-Chat (IRC) protocol. It was
designed with the intention to steal digital identity, perform denial of
service, and manipulate the domain name resolution.
It spreads via Recycl
Description:
Opening a specially crafted mxd file will execute arbitrary
code without prompting and without a crash of the application.
This is due to a flaw in the programs ability to prompt a user
before executing embedded VBA. Mxd files are not filtered by
email systems so this allows a remote
I NOW am no longer so much a supporter of bug hunts. Looks more and more like
witch hunts.
From: Randy
It's an iPhone Thang!
Was learning cursive necessary?
On Jun 13, 2012, at 6:00 AM, full-disclosure-requ...@lists.grok.org.uk wrote:.
>
>
> Today's Topics:
>
> 1. Vulnerability in Zombie
Dear All,
Yesterday, Oracle released its Critical Patch Update for Java SE
software [1], which incorporates fixes for 3 of more than 20+
security issues that were reported to the company in Apr 2012 [2].
We would like to inform, that while some of the Proof of Concept
codes we developed for the
Hello Full Disclosure!! !! !!
Is like warn you about Flame but is you not get hints then is you not
understand. Is maybe you reverse is you see. Is thank me in the future
; обман, Спасибо Касперский
??2@YAPAXI@Z proc near
var_C= dword ptr -0Ch
arg_0= dword ptr 8
pushebp
mov ebp, esp
sub
13 matches
Mail list logo