I had no idea they have one. All communication with Xamarin was over email at
he...@xamarin.com.
On 05/20/2015 12:38 AM, Tim wrote:
> Isn't this the public bug tracker?
>
> https://bugzilla.xamarin.com/describecomponents.cgi?product=Android
>
> Though, correct that case id doesn't map to anything
Isn't this the public bug tracker?
https://bugzilla.xamarin.com/describecomponents.cgi?product=Android
Though, correct that case id doesn't map to anything there.
-Tim Strazzere
On Tue, May 19, 2015 at 2:32 PM, ValdikSS wrote:
> They don't have public bugtracker. Case ID is 140518.
>
> On 05
They don't have public bugtracker. Case ID is 140518.
On 05/20/2015 12:29 AM, Tim wrote:
> Thanks for posting this to FD, these didn't even include it in their release
> notes;
>
> http://developer.xamarin.com/releases/android/xamarin.android_5/xamarin.android_5.1/
>
> Was there a bug reported in
Thanks for posting this to FD, these didn't even include it in their
release notes;
http://developer.xamarin.com/releases/android/xamarin.android_5/xamarin.android_5.1/
Was there a bug reported in bugzilla to link back too?
-Tim Strazzere
On Tue, May 19, 2015 at 6:49 AM, ValdikSS wrote:
>
> -
On May 19, 1:32pm, jv...@altsci.com (Javantea) wrote:
-- Subject: [FD] 0-day Denial of Service in IPsec-Tools
| Denial of Service in IPsec-Tools
| Vulnerability Report
| May 19, 2015
|
| Product: IPsec-Tools
| Version: 0.8.2
| Website: http://ipsec-tools.sourceforge.net/
| CVSS Score: 7.8 (AV:
Hello list!
There are vulnerabilities in Hikvision DS-7108HWI-SH.
These are XML Injection, Abuse of Functionality and Brute Force
vulnerabilities. All these vulnerabilities are present in other IP cameras
and DVR of Hikvision.
-
Affected vendors:
-
Denial of Service in IPsec-Tools
Vulnerability Report
May 19, 2015
Product: IPsec-Tools
Version: 0.8.2
Website: http://ipsec-tools.sourceforge.net/
CVSS Score: 7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C)
IPsec-Tools is vulnerable to a 0-day exploit that I made available yesterday.
It is a null dereferenc
Greetings from vishnu (@dH4wk)
1. Vulnerable Product Version
- ZTE AC3633R (MTS Ultra Wifi Modem)
2. Vulnerability Information
(A) Authentication Bypass
Impact: Attacker gains administrative access
Remotely Exploitable: UNKNOWN
Locally Exploitable: YES
(B) Device crash whic
Maybe I missed something, but why is this a vulnerability? This behavior is
directly caused by NTFS. The way information is stored in the MFT and in a
INDEX_ALLOCATION (for large directories) will cause this problem to any
secure delete program.
IIRC, if your file is located in a large directory,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xamarin for Android prior to version 5.1 allows to replace internal DLL files
inside the APK with files on SD card which are not in a secure storage.
Malicious application without any special permissions could drop backdoored DLL
files into
/stor
Clickheat 1.13+ Unauthenticated RCE
---
The Clickheat developers have been informed, but have not responded to my
email. The code has not been updated recently and the project seems to be in an
abandoned state.
I have discovered a vulnerability in Clickheat 1.13
<><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><>
| Exploit Title: Milw0rm Clone Script v1.0 - (time based) SQLi
|
| Date: 05.19.2015
|
| Exploit Daddy: pancaker
==
SQLi in FeedWordPress WordPress plugin
==
vendor: https://wordpress.org/plugins/feedwordpress/
active installs: 70,000+
vulnerable version: 2015.0426
fixed version: 2015.0514
CVE: CVE-2015-40
SEC Consult Vulnerability Lab Security Advisory < 20150519-0 >
===
title: Kernel Stack Buffer Overflow
product: KCodes NetUSB
vulnerable version: see Vulnerable / tested versions
fixed versio
14 matches
Mail list logo