On Thu, Nov 01, 2012 at 02:12:10PM +0200, Netsparker Advisories wrote:
> Information
>
> Name : XSS, LFI and SQL Injection Vulnerabilities in Achievo
> Software : Achievo 1.4.5 and possibly below.
> Vendor Homepage : http://www.achievo.org
> Vulnerability Type : Cross-Site
Really? I get nothing for that one??? That shit was FUNNY!!! :)
On Nov 1, 2012, at 10:41 AM, bk wrote:
>
> On Nov 1, 2012, at 1:43 AM, Dan Ballance wrote:
>
>> Hi guys,
>>
>> I greatly respect the collective knowledge about security matters on this
>> list. What do you make of this BBC r
=
- Release date: November 1st, 2012
- Discovered by: Enrico Cinquini & Danilo Massa
- Severity: High
=
I. VULNERABILITY
-
Elgg unsecure installation vulnerability.
II. INTRODUCTION
On Nov 1, 2012, at 1:43 AM, Dan Ballance wrote:
> Hi guys,
>
> I greatly respect the collective knowledge about security matters on this
> list. What do you make of this BBC report? Here in the UK we are seeming
> happy to do business with China, but other countries are blocking over
> allege
It looks like an initial research before writing a business plan and looking
for venture capital investment.
I'll think about reserving some funds for :-)
Mikhail Utin, CISSP
--
Message: 10
Date: Thu, 1 Nov 2012 00:37:13 +0530
From: Memory Vandal
Subject: Re: [Full-di
You guys are discussing something different than the original question. The
original question asked for a million username/passwords, not a million
valid email addresses.
Let's say we get across the verification stage and we find these are valid
usernames/passwords at the time and there's no issue
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2012:169
http://www.mandriva.com/security/
_
Hi guys,
I greatly respect the collective knowledge about security matters on this
list. What do you make of this BBC report? Here in the UK we are seeming
happy to do business with China, but other countries are blocking over
alleged security concerns. Do you think these concerns are legitimate o
Not a whole lot it would seem...
http://www.forbes.com/sites/andygreenberg/2012/10/25/facebook-investigating-how-bulgarian-man-bought-1-1-million-users-email-addresses-for-five-dollars/
Ramo
On Thu, Nov 01, 2012 at 12:37:13AM +0530, Memory Vandal wrote:
> You buying or selling?
>
> MemoryVandal
On Mon, Oct 15, 2012 at 09:53:49PM +0200, Alexander Georgiev wrote:
> Now, PLEASE, when you go to their online banking site and run your
> one_script_to_block_them_all.py or whatever, PLEASE, skip my bank
> account, ok?
>
> Alex
What did you say, which account number should be skipped?
signatur
According to http://talkweb.eu/openweb/1819... Five US Dollars
Gonzalo A. Brusella
gonz...@brusella.com.ar
http://www.brusella.com.ar
.. / .- -- / .-.. --- --- -.- .. -. --. / ..-. --- .-. / - . / ...
-.-. .-. --- -.. .. -. --. . .-. ... / -.-. .- - .-.-.- / .. - / ...
. . -- ... / - -
Next to nothing, creating facebook accounts en masse is trivial. It doesn't
even use captchas for registration.
2012/10/31 Georgi Guninski
> We are discussing this question:
>
> How much a million facebook passwords + lusernames would cost?
>
>
> ___
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi everyone,
Whonix ALPHA 0.4.5 is now out.
Whonix (called TorBOX or aos in past) is an anonymous general purpose
operating system based on Virtual Box, Debian GNU/Linux and Tor. By
Whonix design, IP and DNS leaks are impossible. Not even malware w
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-2570-1 secur...@debian.org
http://www.debian.org/security/ Yves-Alexis Perez
October 31, 2012
Information
Name : XSS, LFI and SQL Injection Vulnerabilities in Achievo
Software : Achievo 1.4.5 and possibly below.
Vendor Homepage : http://www.achievo.org
Vulnerability Type : Cross-Site Scripting, Local File Inclusion and SQL
Injection
Severity : Critical
Researcher :
15 matches
Mail list logo