On Thu, Jan 19, 2012 at 09:21:17AM +0100, valentino.angele...@enel.com wrote:
may ask you what software (and how it works brute force ecc) you used?
John the Ripper, indeed - generating a custom .chr file (which is based
on trigraph frequencies) from a sample of 1 million of pwgen'ed
passwords
---
appRain CMF = 0.1.5 (uploadify.php) Unrestricted File Upload Vulnerability
---
author: Egidio Romano aka EgiX
mail..:
# Exploit Title: Webcalendar 1.2.4 'location' XSS
# Date: 01/11/12
# Author: G13
# Software Link:
https://sourceforge.net/projects/webcalendar/?source=directory
# Version: 1.2.5
# Category: webapps (php)
#
# Vulnerability #
There is no sanitation on the input of the location variable.
Title:
==
Barracuda Spam/Virus WAF 600 - Multiple Web Vulnerabilities
Date:
=
2012-01-19
References:
===
http://www.vulnerability-lab.com/get_content.php?id=28
VL-ID:
=
28
Introduction:
=
Barracuda Networks - Worldwide leader in email and Web security.
The
Hello,
I just wanted to drop everyone a quick note and let you all know that
registration for InfoSec Southwest 2012 is now open. You can register
for the conference using the links to our registration portal provided
on the conference registration page:
Calling all survivors of 2011!
We're back! Hopefully, so are you...
Not only are we back, but we are back in the same old place in London's
lovely West End... The Phoenix.
And this year, to kick off, we have:
Duncan Alderson/webantix of upSploit hoping to start a lively
discussion on the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2012:010
http://www.mandriva.com/security/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201201-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - -