Re: [Full-disclosure] Rather interesting whois for yahoo.com?

2013-01-23 Thread Julius Kivimäki
This is normal 2013/1/22 Dan Dart dand...@googlemail.com https://gist.github.com/4596868 Regards Dan ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia -

[Full-disclosure] LACSEC 2013: 8th Network Security Event for Latin America and the Caribbean (CFP)

2013-01-23 Thread Fernando Gont
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 *** CALL FOR PRESENTATIONS *** LACSEC 2013 8th Network

[Full-disclosure] DC4420 - London DEFCON - January 2013 meet. Tuesday 29th January 2013

2013-01-23 Thread Major Malfunction
what it says on the tin! speakers: Chris Sumner (Suggy) - Online Privacy Foundation presenting: Predicting Dark Triad Personality Traits from Twitter usage and a linguistic analysis of Tweets This study explores the extent to which it is possible to determine anti-social

[Full-disclosure] CVE-2013-0805

2013-01-23 Thread Stephan Rickauer
# # # COMPASS SECURITY ADVISORY http://www.csnc.ch/ # # # # CVE ID : CVE-2013-0805 # CSNC ID: CSNC-2013-001 # Product: iTop # Vendor: Combodo # Subject: Cross-site Scripting -

[Full-disclosure] Cisco Security Advisory: Multiple Vulnerabilities in Cisco Wireless LAN Controllers

2013-01-23 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Multiple Vulnerabilities in Cisco Wireless LAN Controllers Advisory ID: cisco-sa-20130123-wlc Revision 1.0 For Public Release 2013 January 23 16:00 UTC (GMT) - -- Summary

[Full-disclosure] [Security-news] SA-CONTRIB-2013-006 - Video - Arbitrary Code Execution

2013-01-23 Thread security-news
View online: http://drupal.org/node/1896714 * Advisory ID: DRUPAL-SA-CONTRIB-2013-006 * Project: Video [1] (third-party module) * Version: 7.x * Date: 2013-January-23 * Security risk: Less critical [2] * Exploitable from: Remote * Vulnerability: Arbitrary PHP code execution

[Full-disclosure] [Security-news] SA-CONTRIB-2013-007 User Relationships - Cross Site Scripting (XSS)

2013-01-23 Thread security-news
View online: http://drupal.org/node/1896720 * Advisory ID: DRUPAL-SA-CONTRIB-2013-007 * Project: User Relationships [1] (third-party module) * Version: 6.x, 7.x * Date: 2013-January-23 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site

[Full-disclosure] [Security-news] SA-CONTRIB-2013-008 - CurvyCorners - Cross Site Scripting (XSS) - module unsupported

2013-01-23 Thread security-news
View online: http://drupal.org/node/1896718 * Advisory ID: DRUPAL-SA-CONTRIB-2013-008 * Project: CurvyCorners [1] (third-party module) * Version: 6.x, 7.x * Date: 2013-January-23 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site

[Full-disclosure] [Security-news] SA-CONTRIB-2013-009 - Keyboard Shortcut Utility - Access Bypass - module unsupported

2013-01-23 Thread security-news
View online: http://drupal.org/node/1896752 * Advisory ID: DRUPAL-SA-CONTRIB-2013-009 * Project: Keyboard Shortcut Utility [1] (third-party module) * Version: 7.x * Date: 2013-January-23 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Access

[Full-disclosure] sql query displaying on error

2013-01-23 Thread Fayyaz Ali
http://demo.demolink.biz/index.php?option=com_contentview=articleid=94Itemid=236 Table './demolink_ccdemo/are1s_session' is marked as crashed and should be repaired SQL=INSERT INTO `are1s_session` (`session_id`, `client_id`, `time`) VALUES ('526944509a863ca28cd0dd7763eb1e3e', 0, '1358966730')

[Full-disclosure] [Security-news] SA-CONTRIB-2013-010 - Search API sorts - Cross Site Scripting (XSS)

2013-01-23 Thread security-news
View online: http://drupal.org/node/1896782 * Advisory ID: DRUPAL-SA-CONTRIB-2013-010 * Project: Search API sorts [1] (third-party module) * Version: 7.x * Date: 2013-January-23 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting

[Full-disclosure] Multiple vulnerabilities in Chocolate WP theme for WordPress

2013-01-23 Thread MustLive
Hello list! I want to warn you about multiple vulnerabilities in Chocolate WP theme for WordPress. This is commercial theme for WP. These are Cross-Site Scripting, Full path disclosure, Abuse of Functionality, Denial of Service and Arbitrary File Upload vulnerabilities. In 2011 I wrote about