[FD] Bypassing Content-Disposition: attachment for XSS on Chrome/Safari(IOS 6.x)

2014-07-29 Thread heige
> > > Bypassing Content-Disposition: attachment for XSS on Chrome/Safari(IOS) > > > > by Superhei of KnownSec team (www.knownsec.com) 2013.6.3 > > > > Test Environment > > ipad(ios 6.1.3) > > Chrome(26.0.1410.53) > > > > This code is downloader for attachment which is a HTML file. > > > > >

[FD] Former NSA Chief: Why I'm Worth $1 Million a Month to Wall Street

2014-07-29 Thread Ivan .Heca
Nice coin. Behavioral model predictions sounds like BS Former NSA Director Keith Alexander says his services warrant a fee of up to a million dollars, due to a cyber-surveillance technique he and his partners at his new security firm IronNet Cybersecurity have developed, Foreign Policy reported on

[FD] Vulnerabilities in Facebook and Facebook Messenger for Android [STIC-2014-0529]

2014-07-29 Thread Programa STIC
Security advisory of Programa STIC at FundaciĆ³n Dr. Manuel Sadosky www.fundacionsadosky.org.ar Vulnerabilities in Facebook and Facebook Messenger for Android 1. *Advisory Information* Title: Vulnerabilities in Facebook and Facebook Messenger for Android Advisory ID: STIC-2014

[FD] [Onapsis Security Advisory 2014-026] Missing authorization check in function modules of BW-SYS-DB-DB4

2014-07-29 Thread Onapsis Research Labs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Onapsis Security Advisory 2014-026: Missing authorization check in function modules of BW-SYS-DB-DB4 This advisory can be downloaded in PDF format from http://www.onapsis.com/. By downloading this advisory from the Onapsis Resource Center, you will

[FD] [Onapsis Security Advisory 2014-025] Multiple Cross Site Scripting Vulnerabilities in SAP HANA XS Administration Tool

2014-07-29 Thread Onapsis Research Labs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Onapsis Security Advisory 2014-025: Multiple Cross Site Scripting Vulnerabilities in SAP HANA XS Administration Tool This advisory can be downloaded in PDF format from http://www.onapsis.com/. By downloading this advisory from the Onapsis Resource C

[FD] [Onapsis Security Advisory 2014-024] Hard-coded Username in SAP FI Manager Self-Service

2014-07-29 Thread Onapsis Research Labs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Onapsis Security Advisory 2014-024: Hard-coded Username in SAP FI Manager Self-Service This advisory can be downloaded in PDF format from http://www.onapsis.com/. By downloading this advisory from the Onapsis Resource Center, you will gain access to

[FD] [Onapsis Security Advisory 2014-023] HTTP verb tampering issue in SAP_JTECHS

2014-07-29 Thread Onapsis Research Labs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Onapsis Security Advisory2014-023: HTTP verb tampering issue in SAP_JTECHS This advisory can be downloaded in PDF format from http://www.onapsis.com/. By downloading this advisory from the Onapsis Resource Center, you will gain access to beforehand

[FD] [Onapsis Security Advisory 2014-022] SAP HANA IU5 SDK Authentication Bypass

2014-07-29 Thread Onapsis Research Labs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Onapsis Security Advisory2014-022: SAP HANA IU5 SDK Authentication Bypass This advisory can be downloaded in PDF format from http://www.onapsis.com/. By downloading this advisory from the Onapsis Resource Center, you will gain access to beforehand i

[FD] [Onapsis Security Advisory 2014-021] SAP HANA XS Missing encryption in form-based authentication

2014-07-29 Thread Onapsis Research Labs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Onapsis Security Advisory 2014-021: SAP HANA XS Missing encryption in form-based authentication This advisory can be downloaded in PDF format from http://www.onapsis.com/. By downloading this advisory from the Onapsis Resource Center, you will gain a

[FD] (BNSEC-1263) Barracuda Networks Web Application Firewall v6.1.5 & LoadBalancer v4.2.2 #37 - Filter Bypass & Multiple Vulnerabilities

2014-07-29 Thread Vulnerability Lab
Document Title: === Barracuda Networks Web Application Firewall v6.1.5 & LoadBalancer v4.2.2 #37 - Filter Bypass & Multiple Vulnerabilities References (Source): http://www.vulnerability-lab.com/get_content.php?id=1103 Barracuda Networks Security ID (BNSEC): BNSE

[FD] WiFi HD v7.3.0 iOS - Multiple Web Vulnerabilities

2014-07-29 Thread Vulnerability Lab
Document Title: === WiFi HD v7.3.0 iOS - Multiple Web Vulnerabilities References (Source): http://www.vulnerability-lab.com/get_content.php?id=1283 Release Date: = 2014-07-29 Vulnerability Laboratory ID (VL-ID):

[FD] New fixes in Siemens SIMATIC WinCC SCADA and DESCrypt on FPGA

2014-07-29 Thread SCADA StrangeLove
1. CVE-2014-4682/CVE-2014-4683/CVE-2014-4685 https://twitter.com/scadasl/status/491936404608266240 2. DESCrypt descrypt bruteforcer for ZTEX 1.15y FPGA board https://twitter.com/GiftsUngiven/status/492243408120213505 3. Some responsible but full disclosure of previously fixed SCADA bugs on slid