lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CAFMAuHpKOMP0d1pD+kq_gebMJJszPv91Rd1u10h0kid2Fpktgw@mail.gmail.com>
Date: Sun, 27 Nov 2011 02:08:36 +0100
From: doc mombasa <doc.mombasa@...il.com>
To: secn3t@...il.com
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: CodeV discovers 31 vulnerabilitys on 5 OS
	softwares

welcome back ozzy n3td3v :)

2011/11/23 xD 0x41 <secn3t@...il.com>

> t with 250 lines of code and is available at
>
> Oh awesome disclosure there dude.. mad stuff, mad poc... cmion, now
> where is the fucking code then ???
>
>
>
>
> On 24 November 2011 08:59, Javier Bassi <javierbassi@...il.com> wrote:
> > On Wed, Nov 23, 2011 at 8:11 AM, Press - Dognædis <press@...naedis.com>
> wrote:
> >> Dear FullDisclosure,
> >>
> >> CodeV is a static code analysis tool (currently for php only, but soon
> >> to be developed to other languages) developed by Dognaedis
> >>  to offer a tool to integrate in the
> >> development of the life cycle of software in order to detect
> >> vulnerabilities that arise from bad input validations as soon as they
> >> hit the code. The tool has a public demo version that is limited to a
> >> script with 250 lines of code and is available at
> >>
> >>
> >> We analyzed some Open Source software to test our own tool and
> >> discovered 31 new vulnerabilities in 5 different opensource softwares.
> >> Following responsible disclosures of discovered vulnerabilities
> >> throughout CodeV's Open Source Software analysis, we are here reporting
> >> all the vulnerabilities discovered as soon as possible to the community,
> >> offering security not only to our clients but to the entire public. All
> >> the vulnerabilities brought to public previously followed the necessary
> >> disclosure protocol to the responsible teams. The vulnerabilities
> >> discovered can be found in
> >>
> >> Thank you for your time and we hope you enjoy CodeV.
> >
> > I liked the disclaimer in submit-ok.html
> >
> > "DISCLAIMER: Lorem ipsum dolor sit amet, consectetur adipisicing elit,
> > sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut
> > enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi
> > ut aliquip ex ea commodo consequat. Duis aute irure dolor in
> > reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla
> > pariatur. Excepteur sint occaecat cupidatat non proident, sunt in
> > culpa qui officia deserunt mollit anim id est laborum. "
> >
> > _______________________________________________
> > Full-Disclosure - We believe in it.
> > Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> > Hosted and sponsored by Secunia - http://secunia.com/
> >
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ