[Full-disclosure] [CVE-2014-0072] Apache Cordova File-Transfer insecure defaults

2014-03-05 Thread Ian Clelland
CVE-2014-0072: Apache Cordova File-Transfer insecure defaults Severity: Important Vendor: The Apache Software Foundation Versions Affected: Cordova File-Transfer iOS plugin from Cordova versions 2.4.0 to 2.9.0 Cordova File-Transfer iOS standalone plugin (org.apache.cordova.file-transfer)

[Full-disclosure] [CVE-2014-0073] Apache Cordova In-App-Browser privilege escalation

2014-03-05 Thread Ian Clelland
CVE-2014-0073: Apache Cordova In-App-Browser privilege escalation Severity: Important Vendor:The Apache Software Foundation Versions Affected:Cordova In-App-Browser iOS plugin from Cordova versions 2.6.0 to 2.9.0Cordova In-App-Browser iOS standalone plugin (org.apache.cordova.inappbrowser)

[Full-disclosure] CVE-2014-1599 - 39 Type-1 XSS in SFR ADSL/Fiber Box

2014-03-05 Thread alejandr0.w3b.p0wn3r
CVE-2014-1599 39 Type-1 XSS in SFR ADSL/Fiber Box. SFR is the french Vodafone (estimated DSL user base of 5.2 Million). * affected product: SFR BOX NB6-MAIN-R3.3.4 * vulnerabilities: /network/dns 5 non-filtered Type-1 XSS /network/dhcp 6 non-filtered Type-1 XSS /network/nat

[Full-disclosure] Google's (YouTube) Arbitrary File Upload Vulnerability Report with PoC

2014-03-05 Thread Nicholas Lemonias.
_ .___ _ / _ \ | |/ _/ / /_\ \| |\_ \ /|\ |/\ \|__ /___/___ / \/\/ Corporation Google's YouTube Arbitrary File Upload Vulnerability Report Author: Mr

[Full-disclosure] Capstone disassembly framework 2.1 released!

2014-03-05 Thread Nguyen Anh Quynh
Greetings, We are excited to announce Capstone 2.1! The source code all the software packages are available at http://capstone-engine.org. Capstone users are strongly recommended to upgrade to this version, which brings many important changes: - Update all 5 arches with new instructions bug

[Full-disclosure] Cisco Security Advisory: Multiple Vulnerabilities in Cisco Wireless LAN Controllers

2014-03-05 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Multiple Vulnerabilities in Cisco Wireless LAN Controllers Advisory ID: cisco-sa-20140305-wlc Revision 1.0 For Public Release 2014 March 5 16:00 UTC (GMT) Summary === The Cisco Wireless LAN Controller (WLC) product family is affected

[Full-disclosure] Cisco Security Advisory: Cisco Small Business Router Password Disclosure Vulnerability

2014-03-05 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Cisco Security Advisory: Cisco Small Business Router Password Disclosure Vulnerability Advisory ID: cisco-sa-20140305-rpd Revision 1.0 For Public Release 2014 March 5 16:00 UTC (GMT

[Full-disclosure] Tool Release: nsdtool - netgear switch discovery

2014-03-05 Thread Curesec Research Team
Hi List, we are happy to publish a tool written some months ago to discover netgear switches using python. Abstract nsdtool is a toolset of scripts used to detect netgear switches in local networks. The tool contains some extra features like bruteforce and setting a new password. Netgear has

[Full-disclosure] [CVE-2014-0683]Router Cisco RV110W - RV215W - CVR100W - Bypass Login Page - Admin Password Disclosure

2014-03-05 Thread Gustavo Speranza
Title: == Router CISCO RV110W - RV215W - CVR100W - Bypass Login Page Date: = 05/03/2014 CVE Number: CVE-2014-0683 Cisco Security Advisory: === http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140305-rpd Status: Reported

[Full-disclosure] [Security-news] SA-CONTRIB-2014-029 - Mime Mail - Access Bypass

2014-03-05 Thread security-news
View online: https://drupal.org/node/2211419 * Advisory ID: DRUPAL-SA-CONTRIB-2014-029 * Project: Mime Mail [1] (third-party module) * Version: 6.x, 7.x * Date: 2014-March-05 * Security risk: Less critical [2] * Exploitable from: Remote * Vulnerability: Access bypass

[Full-disclosure] [Security-news] SA-CONTRIB-2014-028 - Masquerade - Access bypass

2014-03-05 Thread security-news
View online: https://drupal.org/node/2211401 * Advisory ID: DRUPAL-SA-CONTRIB-2014-028 * Project: Masquerade [1] (third-party module) * Version: 6.x, 7.x * Date: 2014-March-05 * Security risk: Highly critical [2] * Exploitable from: Remote * Vulnerability: Access bypass

[Full-disclosure] [Security-news] SA-CONTRIB-2014-027 - NewsFlash Theme - XSS

2014-03-05 Thread security-news
View online: https://drupal.org/node/2211381 * Advisory ID: DRUPAL-SA-CONTRIB-2014-027 * Project: NewsFlash [1] (third-party theme) * Version: 6.x, 7.x * Date: 2014-March-05 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site

Re: [Full-disclosure] [OT] pls ignore

2014-03-05 Thread Gaurang Pandya
Again pls ignore (or keep guessing) md5: 87d31c01239f672d9ca815899808df41 md5: abcfeb5b23eac9a3b036ed69c57ec0ca sha1: c0ecd66dfd07185dc4368d4fe668001d1536fe87 sha1: 5ff68f0617adcfb6b4ed2390c9afb59977909287 Gaurang. From: Gaurang Pandya gaub...@yahoo.com To: