Re: [Full-disclosure] Apple iOS v6.1 (10B143) - Code Lock Bypass Vulnerability #2

2013-02-19 Thread Vulnerability Lab
Hey Kirils Solovjovs, the secound issue is different to the once reported some days ago to heise online. The heise online issue (reported by another person) for example allows with pressed button (only) to handle some of the functions like calls, voicemail, contacts like you see in the video. The

[Full-disclosure] Foswiki Security: Alert CVE-2013-1666 - Remote Code Execution Vulnerability in MAKETEXT macro.

2013-02-19 Thread George Clark
---+ Security Alert: Code injection vulnerability in MAKETEXT macro This advisory alerts you of a potential security issue with your Foswiki installation. A vulnerability has been reported against the core Perl module CPAN:Locale::Maketext [1], which Foswiki uses to provide translations when {User

[Full-disclosure] Paper - Hiding Data in Hard-drive Service Areas

2013-02-19 Thread Ariel Berkman
Hi, We've recently released a paper discussing the ability to hide data in hard-drive service areas. The paper is available for download at: http://www.recover.co.il/SA-cover/SA-cover.pdf The introduction section is pasted below: In this paper we will demonstrate how spinning hard-drives’ servic

[Full-disclosure] TWiki Security Alert CVE-2013-1751: MAKETEXT Variable Has Another Shell Command Execution Issue

2013-02-19 Thread Peter Thoeny
The %MAKETEXT{}% TWiki variable allows arbitrary shell command execution using tilde (~) characters. Only TWiki server with localization enabled are affected. This issue is a followup to SecurityAlert-CVE-2012-6329 of last December. TWiki ( http://twiki.org ) is an Open Source Enterprise Wik

[Full-disclosure] LACSEC 2013: 8th Network Security Event for Latin America and the Caribbean (CFP)

2013-02-19 Thread Fernando Gont
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 *** CALL FOR PRESENTATIONS *** LACSEC 2013 8th Network Sec