dont think rose == thejester
why would he expose himself?
2013/1/9 John Bambenek bambenek.info...@gmail.com
I wasted 2 minutes of my life glancing at that and I won't get it back.
Lame.
But if the Jester approves, that's something.
On 1/8/13 4:19 AM, Sanguinarious Rose wrote:
I rather
Correct I'm not, read near the end.
On Wed, Jan 9, 2013 at 7:31 AM, doc mombasa doc.momb...@gmail.com wrote:
dont think rose == thejester
why would he expose himself?
2013/1/9 John Bambenek bambenek.info...@gmail.com
I wasted 2 minutes of my life glancing at that and I won't get it back.
if you do not know already, google wallet shares the following
information with potentially untrustworthy third parties. the
information below that you have entrusted to google may be shared
below as follows.
full name
date of birth
social security number
current address
phone number
this data
http://gaurangkp.wordpress.com/2013/01/09/nokia-https-mitm/
Conclusion
From the tests that were preformed, it is evident that Nokia is
performing Man In The Middle Attack for sensitive HTTPS traffic
originated from their phone and hence they do have access to clear text
information which could
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Warning: Gratuitous project self promotion to follow.
Hello all,
yesterday I released the latest in a series of capture the flag
exercises as part of the LAMP Security project, hosted at
SourceForge.net. This exercise was run at the Philadelphia
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Prime LAN Management Solution Command Execution Vulnerability
Advisory ID: cisco-sa-20130109-lms
Revision 1.0
For Public Release 2013 January 9 16:00 UTC (GMT)
+-
Summary
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco Unified IP Phone Local Kernel System Call Input Validation
Vulnerability
Advisory ID: cisco-sa-20130109-uipphone
Revision 1.0
For Public Release 2013 January 9 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:002
http://www.mandriva.com/security/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2013:003
http://www.mandriva.com/security/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Debian Security Advisory DSA-2603-1 secur...@debian.org
http://www.debian.org/security/Moritz Muehlenhoff
January 09, 2013
View online: http://drupal.org/node/1884332
* Advisory ID: DRUPAL-SA-CONTRIB-2013-001
* Project: Search API [1] (third-party module)
* Version: 7.x
* Date: 2013-January-09
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site Scripting
View online: http://drupal.org/node/1884360
* Advisory ID: DRUPAL-SA-CONTRIB-2013-002
* Project: Payment [1] (third-party module)
* Version: 7.x
* Date: 2013-January-09
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Access bypass
Hello list!
I want to warn you about multiple vulnerabilities in TinyBrowser for
TinyMCE. These are new vulnerabilities in addition to my 2009 and 2011
advisories about Arbitrary File Upload and Code Execution vulnerabilities in
TinyBrowser. It concerns as TinyBrowser, as all web applications
13 matches
Mail list logo