[<prev] [next>] [day] [month] [year] [list]
Message-ID: <C8A41FFE.165AD%muts@offsec.com>
Date: Wed, 01 Sep 2010 15:21:34 +0200
From: muts <muts@...ensive-security.com>
To: <full-disclosure@...ts.grok.org.uk>,
<bugtraq@...urityfocus.com>
Subject: Month of Abysssec Undisclosed Bugs - Day 1
Hi Lists,
The Abysssec Security Team has started its Month of Abysssec undisclosed
bugs (MOAUB).
During this month, Abysssec will release a collection of 0days, web
application vulnerabilities, and detailed binary analysis (and pocs) for
recently released advisories by vendors such as Microsoft, Mozilla, Sun,
Apple, Adobe, HP, Novel, etc.
The exploits, papers and PoCs will be featured on the Exploit-Database
(http://www.exploit-db.com), averaging one 0day and one binary analysis a
day.
Get your hard-hats on, your VM¹s and debugging tools organized it¹s going
to be a an intensive ride.
Posted today - MOAUB Day 1:
http://www.exploit-db.com/adobe-acrobat-newclass-invalid-pointer-vulnerabili
ty/
http://www.exploit-db.com/moaub-1-cpanel-php-restriction-bypass-vulnerabilit
y/
Enjoy,
Abysssec and the Exploit Database Team
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists