[Full-disclosure] Is Flame Malware Disclosure

2012-06-13 Thread Григорий Братислава
Hello Full Disclosure!! !! !! Is like warn you about Flame but is you not get hints then is you not understand. Is maybe you reverse is you see. Is thank me in the future ; обман, Спасибо Касперский ??2@YAPAXI@Z proc near var_C= dword ptr -0Ch arg_0= dword ptr 8 pushebp mov ebp, esp

[Full-disclosure] [SE-2012-01] Regarding Oracle's Critical Patch Update for Java SE

2012-06-13 Thread Security Explorations
Dear All, Yesterday, Oracle released its Critical Patch Update for Java SE software [1], which incorporates fixes for 3 of more than 20+ security issues that were reported to the company in Apr 2012 [2]. We would like to inform, that while some of the Proof of Concept codes we developed for the

[Full-disclosure] Full-Disclosure

2012-06-13 Thread Fatherlaptop
I NOW am no longer so much a supporter of bug hunts. Looks more and more like witch hunts. From: Randy It's an iPhone Thang! Was learning cursive necessary? On Jun 13, 2012, at 6:00 AM, full-disclosure-requ...@lists.grok.org.uk wrote:. Today's Topics: 1. Vulnerability in Zombie

[Full-disclosure] CVE-2012-1661 - ESRI ArcMap arbitrary code execution via crafted map file.

2012-06-13 Thread Boston Cyber Defense
Description: Opening a specially crafted mxd file will execute arbitrary code without prompting and without a crash of the application. This is due to a flaw in the programs ability to prompt a user before executing embedded VBA. Mxd files are not filtered by email systems so this allows a remote

[Full-disclosure] A Chat With The NGR Bot

2012-06-13 Thread Adam Behnke
NGR Bot (also known as Dorkbot) was examined to be a user-mode rootkit that could be remotely controlled via Internet-Relay-Chat (IRC) protocol. It was designed with the intention to steal digital identity, perform denial of service, and manipulate the domain name resolution. It spreads via

Re: [Full-disclosure] A Chat With The NGR Bot

2012-06-13 Thread Alex Buie
I love these posts that troll for visits to someone's site. -- Alex Buie Network Coordinator / Server Engineer KWD Services, Inc Media and Hosting Solutions +1(703)445-3391 +1(480)253-9640 +1(703)919-8090 ab...@kwdservices.com ज़रा On Wed, Jun 13, 2012 at 4:28 PM, Adam Behnke

[Full-disclosure] [Security-news] SA-CONTRIB-2012-098 - Janrain Capture - Open Redirect

2012-06-13 Thread security-news
View online: http://drupal.org/node/1632734 * Advisory ID: DRUPAL-SA-CONTRIB-2012-098 * Project: Janrain Capture [1] (third-party module) * Version: 6.x, 7.x * Date: 2012-June-13 * Security risk: Less critical [2] * Exploitable from: Remote * Vulnerability: Open Redirect

[Full-disclosure] [Security-news] SA-CONTRIB-2012-099 - Node Hierarchy - Cross Site Request Forgery (CSRF)

2012-06-13 Thread security-news
View online: http://drupal.org/node/1632900 * Advisory ID: DRUPAL-SA-CONTRIB-2012-099 * Project: Node Hierarchy [1] (third-party module) * Version: 6.x * Date: 2012-June-13 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Request

[Full-disclosure] [Security-news] SA-CONTRIB-2012-100 - SimpleMeta - Cross Site Request Forgery (CSRF)

2012-06-13 Thread security-news
View online: http://drupal.org/node/1632908 * Advisory ID: DRUPAL-SA-CONTRIB-2012-100 * Project: SimpleMeta [1] (third-party module) * Version: 6.x * Date: 2012-June-13 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Request Forgery

[Full-disclosure] [Security-news] SA-CONTRIB-2012-101 - Protected Node - Access Bypass

2012-06-13 Thread security-news
View online: http://drupal.org/node/1632918 * Advisory ID: DRUPAL-SA-CONTRIB-2012-101 * Project: Protected node [1] (third-party module) * Version: 6.x * Date: 2012-June-13 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Access bypass

[Full-disclosure] [Security-news] SA-CONTRIB-2012-102 - Ubercart AJAX Cart - Potential Disclosure of user Session ID

2012-06-13 Thread security-news
View online: http://drupal.org/node/1633048 * Advisory ID: DRUPAL-SA-CONTRIB-2012-102 * Project: Ubercart AJAX Cart [1] (third-party module) * Version: 6.x * Date: 2012-June-13 * Security risk: Less critical [2] * Exploitable from: Remote * Vulnerability: Information Disclosure

[Full-disclosure] [Security-news] SA-CONTRIB-2012-103 - Global Redirect - Open Redirect

2012-06-13 Thread security-news
View online: http://drupal.org/node/1633054 * Advisory ID: DRUPAL-SA-CONTRIB-2012-103 * Project: Global Redirect [1] (third-party module) * Version: 6.x, 7.x * Date: 2012-June-13 * Security risk: Less critical [2] * Exploitable from: Remote * Vulnerability: Open Redirect

[Full-disclosure] VMSA-2012-0011 VMware hosted products and ESXi and ESX patches address security issues

2012-06-13 Thread VMware Security Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 --- VMware Security Advisory Advisory ID: VMSA-2012-0011 Synopsis:VMware hosted products and ESXi and ESX patches address security issues Issue