This is normal
2013/1/22 Dan Dart dand...@googlemail.com
https://gist.github.com/4596868
Regards
Dan
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia -
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
***
CALL FOR PRESENTATIONS
***
LACSEC 2013
8th Network
what it says on the tin!
speakers:
Chris Sumner (Suggy) - Online Privacy Foundation
presenting:
Predicting Dark Triad Personality Traits from Twitter usage and a
linguistic analysis of Tweets
This study explores the extent to which it is possible to determine
anti-social
#
#
# COMPASS SECURITY ADVISORY http://www.csnc.ch/
#
#
#
# CVE ID : CVE-2013-0805
# CSNC ID: CSNC-2013-001
# Product: iTop
# Vendor: Combodo
# Subject: Cross-site Scripting -
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Multiple Vulnerabilities in Cisco Wireless LAN Controllers
Advisory ID: cisco-sa-20130123-wlc
Revision 1.0
For Public Release 2013 January 23 16:00 UTC (GMT)
- --
Summary
View online: http://drupal.org/node/1896714
* Advisory ID: DRUPAL-SA-CONTRIB-2013-006
* Project: Video [1] (third-party module)
* Version: 7.x
* Date: 2013-January-23
* Security risk: Less critical [2]
* Exploitable from: Remote
* Vulnerability: Arbitrary PHP code execution
View online: http://drupal.org/node/1896720
* Advisory ID: DRUPAL-SA-CONTRIB-2013-007
* Project: User Relationships [1] (third-party module)
* Version: 6.x, 7.x
* Date: 2013-January-23
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site
View online: http://drupal.org/node/1896718
* Advisory ID: DRUPAL-SA-CONTRIB-2013-008
* Project: CurvyCorners [1] (third-party module)
* Version: 6.x, 7.x
* Date: 2013-January-23
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site
View online: http://drupal.org/node/1896752
* Advisory ID: DRUPAL-SA-CONTRIB-2013-009
* Project: Keyboard Shortcut Utility [1] (third-party module)
* Version: 7.x
* Date: 2013-January-23
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Access
http://demo.demolink.biz/index.php?option=com_contentview=articleid=94Itemid=236
Table './demolink_ccdemo/are1s_session' is marked as crashed and should be
repaired SQL=INSERT INTO `are1s_session` (`session_id`, `client_id`,
`time`) VALUES ('526944509a863ca28cd0dd7763eb1e3e', 0, '1358966730')
View online: http://drupal.org/node/1896782
* Advisory ID: DRUPAL-SA-CONTRIB-2013-010
* Project: Search API sorts [1] (third-party module)
* Version: 7.x
* Date: 2013-January-23
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site Scripting
Hello list!
I want to warn you about multiple vulnerabilities in Chocolate WP theme for
WordPress. This is commercial theme for WP.
These are Cross-Site Scripting, Full path disclosure, Abuse of
Functionality, Denial of Service and Arbitrary File Upload vulnerabilities.
In 2011 I wrote about
12 matches
Mail list logo