lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 2 Oct 2012 14:57:01 +0100 From: Benji <me@...ji.com> To: Vulnerability Lab <research@...nerability-lab.com> Cc: full-disclosure@...ts.grok.org.uk Subject: Re: Paypal BugBounty #9 - Persistent Web Vulnerabilities .......................... On Tue, Oct 2, 2012 at 6:40 AM, Vulnerability Lab <research@...nerability-lab.com> wrote: > Title: > ====== > Paypal BugBounty #9 - Persistent Web Vulnerabilities > > > Date: > ===== > 2012-10-02 > > > References: > =========== > http://www.vulnerability-lab.com/get_content.php?id=646 > > > VL-ID: > ===== > 646 > > > Status: > ======== > Published > > > Disclaimer: > =========== > The information provided in this advisory is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties, > either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability- > Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business > profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some > states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation > may not apply. We do not approve or encourage anybody to break any vendor licenses, policies, deface websites, hack into databases > or trade with fraud/stolen material. > > Domains: www.vulnerability-lab.com - www.vuln-lab.com - www.vulnerability-lab.com/register > Contact: admin@...nerability-lab.com - support@...nerability-lab.com - research@...nerability-lab.com > Section: video.vulnerability-lab.com - forum.vulnerability-lab.com - news.vulnerability-lab.com > Social: twitter.com/#!/vuln_lab - facebook.com/VulnerabilityLab - youtube.com/user/vulnerability0lab > Feeds: vulnerability-lab.com/rss/rss.php - vulnerability-lab.com/rss/rss_upcoming.php - vulnerability-lab.com/rss/rss_news.php > > Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. > Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other > media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, sourcecode, videos and > other information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list (feed), > modify, use or edit our material contact (admin@...nerability-lab.com or support@...nerability-lab.com) to get a permission. > > Copyright © 2012 | Vulnerability Laboratory > > > > -- > VULNERABILITY RESEARCH LABORATORY > LABORATORY RESEARCH TEAM > CONTACT: research@...nerability-lab.com > > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists