Yeah... thumbs up for *New* users being moderated in FD until approved
by the moderator! :)
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Great PoC Michal,
I tested the orig PoC on Chrome 15, Opera 11.52 and FF 8.1 on Mac OSX
10.6.8 and is reliable.
I'm certainly adding it to the BeEF project.
Cheers
antisnatchor
Michal Zalewski wrote:
Evening,
This party trick is not
Kain, Rebecca (.) bka...@ford.com writes:
http://www.extremetech.com/computing/107427-carrier-iq-which-phones-are-infected-and-how-to-remove-it
and Julian Assange weighs in:
http://www.geek.com/articles/mobile/julian-assange-to-iphone-blackberry-users-youre-screwed-2011121/
It is
===
Indexed blind SQL injection
===
:Author: gamma95 gamma95 [at] gmail and his minions
:Date: December 03, 2011
Time based blind SQL attack suffers from low bit/request ratio. Each request
produces only one valuable bit of information. This
Yea, is interesting, i tested it on Firefox v8 windowsXP platform and
it did not find anything, mind you i use 'private browsing' for *all*
browsing... so i am wondering if that maybe helps keeping my cache
secure... i also noticed that it returned no results, when in fact i
had just been
New book..
Oh my bad, I meant his NEW book wich offers chapter.3 for free
reading... I would love to see the Cascading Stlye Sheets chapter, so
i guess ill be buying it. NoStarch have been long regarded as ebook
publishers who seem to have security in mind, so it would be a worthy
buy..
Cheers.
Hello list!
I want to warn you about Brute Force, Cross-Site Scripting and Full path
disclosure vulnerabilities in Zeema CMS. It's Ukrainian commercial CMS.
-
Affected products:
-
Vulnerable are all versions of Zeema CMS.
--
Details: