Hello!
I'll give you additional information concerning advisory HP Release Control
Authenticated XXE Exploit (http://1337day.com/exploit/description/22267).
Three different vulnerabilities were used in this exploit for successful
attack. For my attack it's needed to use only one vulnerability
Hey FD-List,
I’m writing with a slightly unorthodox request. I’m looking for security
researchers that have had a brush with the CFAA (Computer Fraud and Abuse
Act). I’m confident that many of you have faced legal threats at some point
or another in your work and play – and I’d like to hear about
a hollow, decrepit shell of its former self..
... oh the 0ld days,
;)
"We'd appreciate some more ethics." - GOBBLES
- https://www.youtube.com/watch?v=DAJSxOzrD1g
[ GOBBLES Security - still disappointed in 2014 ... ]
regarding the current line up:
https://defcon.org/html/defcon-22/dc
Hi Yorick,
this is interesting, but as far as I know, since iOS 5 CVE-2011-3426 no
longer allows cross-site scripting in Safari:
http://support.apple.com/kb/HT4999
"This issue is addressed by loading attachments in an isolated security
origin with no access to resources on other sites."
While Java
The VIDEO is here! Here's my RVAsec talk on security awareness, how to
make it work, and why it can't work. Lots of fun mind games
throughout! It's based on a lot of our neuro-hacking research.
https://www.youtube.com/watch?v=gz3UHYKTxq0
Sincerely,
-pete.
--
Pete Herzog - Managing Director - p.
Greetings,
We are happy to announce a little web-based tool named CEnigma to
disassemble input hexcode! CEnigma offers some advantages:
- Fast, simple & easy to use: just paste your hexstring, choose
architecture/mode/syntax, then submit to receive back assembly code
- User-friendly: accept inpu
Document Title:
===
TigerCom iFolder+ v1.2 iOS - Multiple Vulnerabilities
References (Source):
http://www.vulnerability-lab.com/get_content.php?id=1284
Release Date:
=
2014-07-30
Vulnerability Laboratory ID (VL-ID):