littlestack.blogspot.com
Gutes' little stack: Hack.Lu 08
http://littlestack.blogspot.com/2008/11/hacklu-08.html
Stacks were made to support men, be careful you don't stand on a paper one! November 3, 2008. Finally got home from the old continent. I've been presenting a work I've working on the last months. First of all I must say the organization of Hack.Lu. Was great. It's a small single-track conference where most of the people are from France, Germany, Belgium and of course, Luxembourg! As for the talks, there were quite several I liked, I will only mention two:. The guys from RedTeam Pentesting GmbH. I recentl...
arrivalsec.wordpress.com
Advisories | Arrival Security
https://arrivalsec.wordpress.com/advisories
Web App Security, Programing and Open Source. Full Disclosure Policy (RFPolicy) v2.0 / / /. This policy is not set in stone–in fact, it is encouraged that all parties regularly communicate with each during the process, adjusting as situations arise. 8212;—————————————————————–. IGoogle Ajax Feeds XSS. Deja una respuesta Cancelar respuesta. Introduce aquí tu comentario. Introduce tus datos o haz clic en un icono para iniciar sesión:. La dirección no se hará pública). 0verl0ad in the Net. El lado del mal.
mobile-access.org
Teilnehmende Projektpartner im Mobile ACcess Projekt — Mobile ACcess
http://www.mobile-access.org/partner.html
Nur im aktuellen Bereich. Uuml;ber das Projekt. Uuml;ber das Projekt. Teilnehmende Projektpartner im Mobile ACcess Projekt. Das Mobile ACcess Projekt wird in einer engen Kooperation zwischen zwei Lehrstühlen der RWTH Aachen und Wirtschaftsunternehmen im Raum Aachen vorangetrieben. Die Projektpartner bringen ihre jeweiligen Kompetenzen ein und werden nachfolgend aufgeführt. Lehrstuhl für Informatik 4, RWTH Aachen. Http:/ www.comsys.rwth-aachen.de/. Lehrstuhl für Informatik 8, RWTH Aachen. Das Fraunhofer I...
offensivethinking.org
Links
http://www.offensivethinking.org/links.html
My other blog about life with a brain tumor. Cryptojedi.org (Peter Schwabe, Michael Naehrig). Polycephaly.org (Ruben Niederhagen). Damogran.de (Lutz Wolf). Website built with nanoc.
patrickhof.de
Links
http://www.patrickhof.de/links.html
My other blog about life with a brain tumor. Cryptojedi.org (Peter Schwabe, Michael Naehrig). Polycephaly.org (Ruben Niederhagen). Damogran.de (Lutz Wolf). Website built with nanoc.
packetstormsecurity.com
File Upload Files ≈ Packet Storm
https://packetstormsecurity.com/files/tags/file_upload
The original cloud security. Showing 1 - 25 of 688. Barracuda Web App Firewall/Load Balancer Post Auth Remote Root Exploit (2). Posted Jul 26, 2016. Authored by Russell Sanford. Tiki Wiki 15.1 Unauthenticated File Upload. Posted Jul 12, 2016. Authored by Mehmet Ince. GNU Wget Arbitrary File Upload / Potential Remote Code Execution. Posted Jul 6, 2016. Authored by Dawid Golunski. GNU Wget versions prior to 1.18 suffer from an arbitrary file upload vulnerability that may allow for remote code execution.
metagraphic.de
Kunden | metagraphic | Kreativnetzwerk | Grafikdesign | Illustration | Photokunst
http://www.metagraphic.de/WP/kunden
phpcaptcha.org
Securimage PHP Captcha | Archive | Uncategorized
https://www.phpcaptcha.org/category/uncategorized
Audible Codes with Flash. Securimage 3.6.4 Released. Written on March 3rd, 2016 by drew. Securimage 3.6.4 has been released to address an XSS vulnerability in example form.ajax.php (an example included with Securimage) which could allow an attacker to inject arbitrary Javascript code via a crafted URL. Users directed to the malicious URL could have cookies or other sensitive information exposed, or have more dangerous Javascript code executed. Thanks to RedTeam. For discovering the flaw. The SoX (Swiss A...
phpcaptcha.org
Securimage PHP Captcha | Author Archives
https://www.phpcaptcha.org/author/admin
Audible Codes with Flash. Securimage 3.6.4 Released. Written on March 3rd, 2016 by drew. Securimage 3.6.4 has been released to address an XSS vulnerability in example form.ajax.php (an example included with Securimage) which could allow an attacker to inject arbitrary Javascript code via a crafted URL. Users directed to the malicious URL could have cookies or other sensitive information exposed, or have more dangerous Javascript code executed. Thanks to RedTeam. For discovering the flaw. Add a config....