#
# t2’15 – Call For Papers (Helsinki, Finland) – October 29 – 30, 2015
#
Why spend your valuable conference time in the longest lines you have seen in your life, getting a sun burn or totally
lost in the canals with your rental boat, being deprived of chewing gum or waking up in Nong Palai without any
recollection how you got there? Helsinki offers you the safe and comfortable low-temperature alternative with a chance
of first snow….
SOURCE Conference brings security experts and business professionals
together in an intimate and personal environment to discuss the security
industry’s most…
There is XML Injection vulnerability in multiple Hikvision IP cameras and
DVR. Earlier I wrote about Abuse of Functionality and Brute Force
vulnerabilities in multiple Hikvision IP cameras and DVR
(http://seclists.org/fulldisclosure/2015/Mar/161).
I want to warn you about Cross-Site Scripting vulnerability in IBM Domino.
This is one from many vulnerabilities in Domino, which I’ve found at
03.05.2012. In previous years I wrote about multiple vulnerabilities in
Lotus Domino (http://securityvulns.ru/docs29277.html) and Lotus Notes
Traveler (http://securityvulns.ru/docs30224.html).
During 2012-2013 I informed IBM that have other holes in Domino (as this
XSS), besides…
Part 6 is live! We continue reversing the undocumented Netgear
firmware header by debugging the embedded HTTP server. We identify two
more fields, including an unknown checksum. A disassembly-to-python
reimplementation of the checksum algorithm is provided in this week’s
update to the example code.
Here’s a link: http://shadow-file.blogspot.com/2015/05/abandoned-part-06.html
I forgot to include the link to part 5 in last week’s…