On 2012/08/16, at 12:49, valdis.kletni...@vt.edu wrote:
> On Tue, 14 Aug 2012 14:55:41 +0900, Tonu Samuel said:
>
>> I found that person who is spamming
>> OpenCV list with "Plz visit my e-gaming site at http://."; is PhD
>
> So... did you establish that the person doing the spamming actually *
Thanks Harry and sorry for this, I have removed the creds and edited the code
to accept user input.
pd,
Relax, that is a demo pastebin account and I use this for demonstration/test.
Though I never left it intentionally there and it is my fault.
For your surprise many ppl still hire me :P
>
Thanks Harry and sorry for this, I have removed the creds and edited the code
to accept user input.
pd,
Relax, that is a demo pastebin account and I use this for demonstration/test.
Though I never left it intentionally there and it is my fault.
For your surprise many ppl still hire me :P
>>
On Tue, 14 Aug 2012 14:55:41 +0900, Tonu Samuel said:
> I found that person who is spamming
> OpenCV list with "Plz visit my e-gaming site at http://."; is PhD
So... did you establish that the person doing the spamming actually *is*
that professor, or merely somebody who managed to phish the pro
and this is coming from person who is "has many years experience in
Penetration Testing of many Government Organizations of India and other
global corporate giants.
Who the friggin hell hires such peeps who give away key /userid/pwd eh ?
/pd
On Wed, Aug 15, 2012 at 2:52 PM, Harry Hoffman wr
View online: http://drupal.org/node/1732980
* Advisory ID: DRUPAL-SA-CONTRIB-2012-127
* Project: Custom Publishing Options [1] (third-party module)
* Version: 6.x
* Date: 2012-August-15
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site Sc
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2530-1 secur...@debian.org
http://www.debian.org/security/Florian Weimer
August 15, 2012
View online: http://drupal.org/node/1733056
* Advisory ID: DRUPAL-SA-CONTRIB-2012-128
* Project: Elegant Theme [1] (third-party module)
* Version: 7.x
* Date: 2012-August-15
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site Scripting
---
Probably at the least want to change your pastebin password and api key:
>From Credentials.ps1:
Post_http "http://pastebin.com/api/api_login.php";
"api_dev_key=8e5dbe7c4288c87f41b1e3e2ffce6c25&api_user_name=koshish&api_user_password=nikhilpastebin"
Post_http "http://pastebin.com/api/api_post.php
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Vulnerability Report
Reported: January 3, 2012
Author: Justin C. Klein Keane
Description of Vulnerability:
- -
Drupal (http://drupal.org) is a robust content management system (CMS)
written in PHP and MySQL. The Drupal
View online: http://drupal.org/node/1732946
* Advisory ID: DRUPAL-SA-CONTRIB-2012-126
* Project: HotBlocks [1] (third-party module)
* Version: 6.x
* Date: 2012-August-15
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site Scripting, Multipl
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2012:132
http://www.mandriva.com/security/
_
On Wed, Aug 15, 2012 at 8:10 AM, Dan Rosenberg
wrote:
> This also can't be used by malicious apps, since you need user/group "shell"
> to replace /data/local/tmp with a symbolic link, and normal applications
> cannot be granted this user/group.
You're right: my apologies. I didn't really look at
> I haven't seen a reference to this in the archives, so for the sake of
> completeness here it is:
> http://forum.xda-developers.com/showthread.php?t=1790104
>
> Looks like on a number of devices you can symlink the block device
> that gets mounted on /system to something like /data/local/tmp, and
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS XR Software Route Processor Denial of Service Vulnerability
Advisory ID: cisco-sa-20120530-iosxr
Revision 2.0
For Public Release 2012 August 15 16:00 UTC (GMT)
+-
Su
Hey,
We’ve been recently working on PDF fuzzing, and consequently found
around 60 unique crashes in Adobe Reader (40 of which looked
potentially exploitable), which we reported to Adobe.
Today Adobe has released an update for Adobe Reader Windows and OS X
(no Linux update available yet) with most
Hi!
I hope this is within reasonable limits of self promoting. I keep blog about
local spammers but today bit different fish was captured. I found that person
who is spamming
OpenCV list with "Plz visit my e-gaming site at http://."; is PhD and associate
professor of National University of Scie
Hi List,
Saw this on /r/netsec. It is a tool to use PowerShell for Pen Tests.
http://labofapenetrationtester.blogspot.com/2012/08/introducing-nishang-powereshell-for.html
Looks cool to me could be useful for post exploitation. Thoughts?
Cheers,
/J
Exploit Title: DivX Plus Player plugin 2.2.0.52 Buffer Overflow PoC
Crash:http://img507.imageshack.us/img507/40/divx.png
Class: Boundary Condition Error
Date: 2012-08-14
Author: coolkaveh
coolka...@rocketmail.com
Https://twitter.com/coolkaveh
Vendor Homepage: http://www.divx.com/
Version: 2.2.0.52
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2529-1 secur...@debian.org
http://www.debian.org/security/ Thijs Kinkhorst
August 14, 2012
I haven't seen a reference to this in the archives, so for the sake of
completeness here it is:
http://forum.xda-developers.com/showthread.php?t=1790104
Looks like on a number of devices you can symlink the block device
that gets mounted on /system to something like /data/local/tmp, and
then use d
There is also SuperSU from XDA's Chainfire:
http://forum.xda-developers.com/showthread.php?t=1538053
I think it's closed source, right?
--
Alexander R. Pruss
arpr...@gmail.com
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/f
Hi List,
I have written a tool in PowerShell which helps in usage of PowerShell for post
exploitation activity. The tool, called, Nishang. is a framework and collection
of PowerShell scripts.
Details about it could be found on my blog at
http://labofapenetrationtester.blogspot.com/2012/08/intr
23 matches
Mail list logo