lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 01 Sep 2010 15:21:34 +0200
From: muts <muts@...ensive-security.com>
To: <full-disclosure@...ts.grok.org.uk>,
	<bugtraq@...urityfocus.com>
Subject: Month of Abysssec Undisclosed Bugs - Day 1

Hi Lists, 

The Abysssec Security Team has started its Month of Abysssec undisclosed
bugs (MOAUB). 
During this month, Abysssec will release a collection of 0days,  web
application vulnerabilities, and detailed binary analysis (and pocs) for
recently released advisories by vendors such as Microsoft, Mozilla, Sun,
Apple, Adobe, HP, Novel, etc.
The exploits, papers and PoCs will be featured on the Exploit-Database
(http://www.exploit-db.com), averaging one 0day and one binary analysis a
day. 
Get your hard-hats on, your VM¹s and debugging tools organized ­ it¹s going
to be a an intensive ride.

Posted today - MOAUB Day 1:

http://www.exploit-db.com/adobe-acrobat-newclass-invalid-pointer-vulnerabili
ty/
http://www.exploit-db.com/moaub-1-cpanel-php-restriction-bypass-vulnerabilit
y/

Enjoy, 

Abysssec and the Exploit Database Team


Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ