lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAJg1kmcib9hkQ-pP14SfytFNAB6sXW9AucBCgrNOK4TixNyrDw@mail.gmail.com>
Date: Wed, 12 Dec 2012 11:05:16 +0530
From: researching vulnerabilties <researchingvulnerabilties@...il.com>
To: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com,
secalert@...urityreason.com, bugs@...uritytracker.com, vuln@...unia.com,
vuln@...urity.nnov.ru, news@...uriteam.com, moderators@...db.org,
submissions@...ketstormsecurity.org, submit@...ecurity.com
Subject: Command Execution Vulnerability on Paypal
For More Details:
http://www.rafayhackingarticles.net/2012/12/wow-paypal-sends-me-5000-for-command.html
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists