Re: [Full-disclosure] The World's Largest Hacker Database

2013-01-09 Thread doc mombasa
dont think rose == thejester why would he expose himself? 2013/1/9 John Bambenek bambenek.info...@gmail.com I wasted 2 minutes of my life glancing at that and I won't get it back. Lame. But if the Jester approves, that's something. On 1/8/13 4:19 AM, Sanguinarious Rose wrote: I rather

Re: [Full-disclosure] The World's Largest Hacker Database

2013-01-09 Thread Sanguinarious Rose
Correct I'm not, read near the end. On Wed, Jan 9, 2013 at 7:31 AM, doc mombasa doc.momb...@gmail.com wrote: dont think rose == thejester why would he expose himself? 2013/1/9 John Bambenek bambenek.info...@gmail.com I wasted 2 minutes of my life glancing at that and I won't get it back.

[Full-disclosure] Google Wallet personal sensitive information disclosure via third-parties

2013-01-09 Thread warning
if you do not know already, google wallet shares the following information with potentially untrustworthy third parties. the information below that you have entrusted to google may be shared below as follows. full name date of birth social security number current address phone number this data

[Full-disclosure] Nokia’s MITM on HTTPS traffic from their phone

2013-01-09 Thread Gaurang Pandya
http://gaurangkp.wordpress.com/2013/01/09/nokia-https-mitm/ Conclusion From the tests that were preformed, it is evident that Nokia is performing Man In The Middle Attack for sensitive HTTPS traffic originated from their phone and hence they do have access to clear text information which could

[Full-disclosure] LAMPSecurity Capture the Flag

2013-01-09 Thread Justin C. Klein Keane
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Warning: Gratuitous project self promotion to follow. Hello all, yesterday I released the latest in a series of capture the flag exercises as part of the LAMP Security project, hosted at SourceForge.net. This exercise was run at the Philadelphia

[Full-disclosure] Cisco Security Advisory: Cisco Prime LAN Management Solution Command Execution Vulnerability

2013-01-09 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Cisco Prime LAN Management Solution Command Execution Vulnerability Advisory ID: cisco-sa-20130109-lms Revision 1.0 For Public Release 2013 January 9 16:00 UTC (GMT) +- Summary

[Full-disclosure] Cisco Security Advisory: Cisco Unified IP Phone Local Kernel System Call Input Validation Vulnerability

2013-01-09 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Cisco Unified IP Phone Local Kernel System Call Input Validation Vulnerability Advisory ID: cisco-sa-20130109-uipphone Revision 1.0 For Public Release 2013 January 9 16:00 UTC (GMT

[Full-disclosure] [ MDVSA-2013:002 ] firefox

2013-01-09 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2013:002 http://www.mandriva.com/security/

[Full-disclosure] [ MDVSA-2013:003 ] rootcerts

2013-01-09 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2013:003 http://www.mandriva.com/security/

[Full-disclosure] [SECURITY] [DSA 2603-1] emacs23 security update

2013-01-09 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - Debian Security Advisory DSA-2603-1 secur...@debian.org http://www.debian.org/security/Moritz Muehlenhoff January 09, 2013

[Full-disclosure] [Security-news] SA-CONTRIB-2013-001 - Search API - Cross Site Scripting

2013-01-09 Thread security-news
View online: http://drupal.org/node/1884332 * Advisory ID: DRUPAL-SA-CONTRIB-2013-001 * Project: Search API [1] (third-party module) * Version: 7.x * Date: 2013-January-09 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting

[Full-disclosure] [Security-news] SA-CONTRIB-2013-002 - Payment - Access Bypass

2013-01-09 Thread security-news
View online: http://drupal.org/node/1884360 * Advisory ID: DRUPAL-SA-CONTRIB-2013-002 * Project: Payment [1] (third-party module) * Version: 7.x * Date: 2013-January-09 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Access bypass

[Full-disclosure] Multiple vulnerabilities in TinyBrowser

2013-01-09 Thread MustLive
Hello list! I want to warn you about multiple vulnerabilities in TinyBrowser for TinyMCE. These are new vulnerabilities in addition to my 2009 and 2011 advisories about Arbitrary File Upload and Code Execution vulnerabilities in TinyBrowser. It concerns as TinyBrowser, as all web applications