[Full-disclosure] [ MDVSA-2013:020 ] wireshark

2013-03-08 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2013:020 http://www.mandriva.com/en/support/security/

[Full-disclosure] Results of a XSLT fuzzing effort

2013-03-08 Thread Nicolas Grégoire
Hi! I published last week a blog post describing the results of the XSLT fuzzing campaign I did in 2012. Now that most of the discovered vulnerabilities are patched, I've chosen to give away a dozen of PoC regarding Adobe Reader, Microsoft MSXML, Firefox, Webkit, ... Even if you are not in XML

[Full-disclosure] [ MDVSA-2013:021 ] java-1.6.0-openjdk

2013-03-08 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2013:021 http://www.mandriva.com/en/support/security/

[Full-disclosure] SEC Consult SA-20130308-0 :: Multiple critical vulnerabilities in GroundWork Monitor Enterprise (part 1)

2013-03-08 Thread SEC Consult Vulnerability Lab
SEC Consult Vulnerability Lab Security Advisory 20130308-0 === title: Multiple critical vulnerabilities (part 1) product: GroundWork Monitor Enterprise vulnerable version: 6.7.0 fixed version

[Full-disclosure] SEC Consult SA-20130308-1 :: Multiple vulnerabilities in GroundWork Monitor Enterprise (part 2)

2013-03-08 Thread SEC Consult Vulnerability Lab
SEC Consult Vulnerability Lab Security Advisory 20130308-1 === title: Multiple high risk vulnerabilities (part 2) product: GroundWork Monitor Enterprise vulnerable version: 6.7.0 fixed version

Re: [Full-disclosure] Results of a XSLT fuzzing effort

2013-03-08 Thread antisnatchor
Nice one Nick, great job eheh :D Cheers antisnatchor Nicolas GrégoireMarch 8, 2013 10:12 AM Hi!I published last week a blog post describing the results of the XSLTfuzzing campaign I did in 2012. Now that most of the discoveredvulnerabilities are patched, I've chosen to give away

Re: [Full-disclosure] Results of a XSLT fuzzing effort

2013-03-08 Thread Simeon
+1 Am 08-Mar-2013 11:12, schrieb Nicolas Grégoire: Hi! I published last week a blog post describing the results of the XSLT fuzzing campaign I did in 2012. Now that most of the discovered vulnerabilities are patched, I've chosen to give away a dozen of PoC regarding Adobe Reader, Microsoft