On Mon, Sep 8, 2014 at 9:37 AM, Bryan Bickford br...@unhwildhats.com
wrote:
I am starting some wifi research and had questions about the legality of
listening to unencrypted, public wifi data and publishing subsequent
research.
It goes without saying, but I'm going to say it anyways -- you
I. VULNERABILITY
-
CSRF vulnerabilities in CacheGuard-OS v5.7.7
II. BACKGROUND
-
CacheGuard is an All-in-One Web Security Gateway providing firewall,
web antivirus, caching, compression, URL filtering, proxy, high
availability, content
Document Title:
===
Photorange v1.0 iOS - File Include Web Vulnerability
References (Source):
http://www.vulnerability-lab.com/get_content.php?id=1318
Release Date:
=
2014-09-07
Vulnerability Laboratory ID (VL-ID):
Document Title:
===
ChatSecure IM v2.2.4 iOS - Persistent Web Vulnerability
References (Source):
http://www.vulnerability-lab.com/get_content.php?id=1317
Release Date:
=
2014-09-10
Vulnerability Laboratory ID (VL-ID):
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-
VMware Security Advisory
Advisory ID: VMSA-2014-0009
Synopsis:VMware NSX and vCNS product updates address a critical
information disclosure
Hello This is my first post .
Here are the details :
Website : http://www.comguard.net/- (Security Expoerts)
I already sent them 2 emails and i didn't get a reply. The Security bug is
really simple , i was able to get to this link
http://www.comguard.net/include/ which lists all the files
I stumbled on to this while setting up an android vulnerability testing lab.
Title: Rooted SSH/SFTP Daemon Default Login Credentials
Author: Larry W. Cashdollar, @_larry0
OSVDB-ID: 110742
Date: 9/2/2014
Download: https://play.google.com/store/apps/details?id=web.oss.sshsftpDaemon