Title: ====== Opial CMS v2.0 - Multiple Web Vulnerabilities Date: ===== 2012-04-27 References: =========== http://www.vulnerability-lab.com/get_content.php?id=522 VL-ID: ===== 522 Introduction: ============= Opial lets you create audio mp3/ram/rm/avi/mpg/wav/ai f or any other format audio/video downloads website, in 10 seconds you will be able to install opial on your webserver. Opial is perfect for small website to business network website.With opial you can show top 10 albums, top 10 artist, featured songs, new 10 searches, new 10 songs sent , genres with covers, add multiple songs, report dead audio links, update advertisements from admin panel, search by artist/album/song, edit email template from admin panel, list artist/albums by alphabets. (Copy of the Vendor Homepage: http://www.opial.com ) Abstract: ========= A Vulnerability Laboratory Researcher Team discovered multiple Web Vulnerabilities in Opial v2 Content Management System. Report-Timeline: ================ 2012-04-27: Public or Non-Public Disclosure Status: ======== Published Exploitation-Technique: ======================= Remote Severity: ========= Critical Details: ======== 1.1 A remote SQL Injection vulnerability is detectedin Opial v2 Content Management System. The vulnerability allows an attacker (remote) or local low privileged user account to inject/execute own sql commands on the affected application dbms. Successful exploitation of the vulnerability results in dbms & application compromise. Vulnerable Module(s): [+] /albumdetail.php?albumid= [+] /admin/albumsedit.php?id= [+] /admin/albumscommentdetail.php?albumid= [+] /admin/artistsedit.php?id= [+] /admin/editmusic.php?id= [+] /admin/genresedit.php?id= 1.2 A persistent input validation vulnerabilities are detected in Opial v2 Content Management System. The bugs allow remote attackers to implement/inject malicious script code on the application side (persistent). Successful exploitation of the vulnerability can lead to session hijacking (manager/admin) or stable (persistent) context manipulation. Exploitation requires low user inter action. Vulnerable Module(s): [+] /topsearches.php?genres_parent - inject any html code in the search and then go to top searches [+] /admin/artistsedit.php?id=9 - artist name [+] /admin/albumsedit.php?id=23 - album name [+] /admin/editmusic.php?id=39 - songs name [+] /admin/genresedit.php?id=10 - Genres name 1.3 An arbitrary file upload are detected in Opial v2 Content Management System. The bugs allow remote attackers to upload any files that he wants. The attacker might upload malicious files, such as webshells in php. Vulnerable Module(s): [+] /admin/artistsedit.php?id=9 - artist cover [+] /admin/albumsedit.php?id=23 - album cover [+] /admin/editmusic.php?id=39 - songs cover [+] /admin/genresedit.php?id=10 = Genres cover Risk: ===== 1.1 The security risk of full SQL injection vulnerability is estimated as critical. 1.2 The security risk of the persistent input validation vulnerability is estimated as medium. 1.3 The security risk of the arbitrary file upload vulnerability is estimated as high. Credits: ======== Vulnerability Laboratory [Research Team] - the_storm (storm@vulnerability-lab.com) Disclaimer: =========== The information provided in this advisory is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties, either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability- Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability- Lab. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by Vulnerability-Lab or its suppliers. Copyright © 2012 Vulnerability-Lab
Friday, 27 April 2012
Opial CMS v2.0 - Multiple Web Vulnerabilities
Vulnerability lab Video website
Hello guys,
Today, is the real launch of vulnerability lab video website :). Here u go http://video.vulnerability-lab.com/
I really did a lot effort in it. I hope u like it guys :)
Regards
Today, is the real launch of vulnerability lab video website :). Here u go http://video.vulnerability-lab.com/
I really did a lot effort in it. I hope u like it guys :)
Regards
Tuesday, 24 April 2012
Car Portal CMS v3.0 - Multiple Web Vulnerabilities
Title: ====== Car Portal CMS v3.0 - Multiple Web Vulnerabilities Date: ===== 2012-04-24 References: =========== http://www.vulnerability-lab.com/get_content.php?id=502 VL-ID: ===== 502 Introduction: ============= Car Portal is a php software product for running auto classifieds websites. It provides functionality for the private sellers to sign up, list their car for sale and make changes in their ads online using the private sellers administration space. The product provides special functionality for the dealers to work and manage multiple ads. An affiliate functionality is also included, affiliate partners may sign up and earn commissions on all the sales done through their links. The product comes with a powerful admin panel for the administrators, allowing them not only to manage the cars portal settings, the dealers, affiliates etc. but also providing full control over the website, its structure and content, also statistics, search engines functionality and others. (Copy of the Vendor Homepage: http://www.dream-autos.com/ ) Abstract: ========= The Vulnerability Laboratory Research Team discovered multiple Web Vulnerabilities in the Car Portal v3.0 web application. Report-Timeline: ================ 2012-04-24: Public or Non-Public Disclosure Status: ======== Published Exploitation-Technique: ======================= Remote Severity: ========= Medium Details: ======== 1.1 Multiple persistent input validation vulnerabilities are detected in the car portal v3.0 web application. The bugs allow remote attackers to implement/inject malicious script code on the application side (persistent). Successful exploitation of the vulnerability can lead to session hijacking (manager/admin) or stable (persistent) context manipulation. Exploitation requires low user inter action. Vulnerable Module(s): [+] Post a new vehicle - PWRS & Description field [+] Create News - News title [+] Create a sub user - Name [+] Create new user group - group Name [+] Change profile - Dealer name &First Name & Last Name 1.2 Multiple cross site request forgery vulnerabilities are detected in the car portal v3.0 web application. The bugs allow remote attackers to enforce the user (admin) to change user`s password, Create a user, sub user, or change profile information Successful exploitation of the vulnerability can lead to creating a new admin account or changing user`s password. Vulnerable Module(s): [+] cars/ADMIN/index.php?category=security&action=nouveau [+] USERS/index.php?category=profile&action=edit [+] USERS/index.php?category=home&action=sub_accounts 1.3 Arbitrary file upload allows the attacker to upload files that differs than images. The attacker can upload the file by changing its name from file.php to file.php.php. After the uploading the file .jpg of the file will be truncated and the file will save on the sever as file.php. Successful exploitation can result in malware or malicious web shell upload which results in a system comrpomise at the end. Risk: ===== 1.1 The security risk of the persistent input validation vulnerability is estimated as medium(+). 1.2 The security risk of the cross site request forgery vulnerability is estimated as low. 1.3 The security risk of the arbitrary file upload vulnerability is estimated as medium(+). Credits: ======== Vulnerability Laboratory Research Team - the_storm (the_strom@mail.com) Disclaimer: =========== The information provided in this advisory is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties, either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability- Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability- Lab. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by Vulnerability-Lab or its suppliers. Copyright © 2012 Vulnerability-Lab
Saturday, 21 April 2012
Friday, 13 April 2012
ACC PHP eMail v1.1 - Multiple Web Vulnerabilities
Title: ====== ACC PHP eMail v1.1 - Multiple Web Vulnerabilites Date: ===== 2012-04-13 References: =========== http://www.vulnerability-lab.com/get_content.php?id=505 VL-ID: ===== 505 Introduction: ============= Acc PHP eMail is a email subscription and management script. Manage subscribers them and send newsletters. Acc PHP eMai is easy-to-use newsletter and mailing list manager with powerful personalization and customization features. No domain limit: You can use the script on unlimited number of domains. All-In-One Solution: Mailing List Manager, Email Subscription Manager Intellectual Core: Create your emails in HTML (WYSIWYG editor) Powerful back-end: Easy-to-work administration tool Search & Edit users based on email address Editable preferences for administration e-Mail address syntax checker Users can unsubscribe & subscribe at their will Subscribed conformation letters are emailed & customizable for each mailing list Import email address from another database (Copy of the Vendor Homepage: http://www.accscripts.com/mailinglist/) Abstract: ========= A Vulnerability Laboratory Researcher Team discovered multiple Web Vulnerabilities in Acc PHP eMail v1.1. Report-Timeline: ================ 2012-04-13: Public or Non-Public Disclosure Status: ======== Published Exploitation-Technique: ======================= Remote Severity: ========= Critical Details: ======== 1.1 A remote SQL Injection vulnerability is detected in Acc PHP eMail v1.1. The vulnerability allows an attacker (remote) or local low privileged user account to inject/execute own sql commands on the affected application dbms. Successful exploitation of the vulnerability results in dbms & application compromise. Vulnerable Module(s): [+] index.php?action=email_modify&conf=0&id=57[SQLi] 1.2 A persistent input validation vulnerabilities are detected in Acc PHP eMail v1.1 The bugs allow remote attackers to implement/inject malicious script code on the application side (persistent). Successful exploitation of the vulnerability can lead to session hijacking (manager/admin) or stable (persistent) context manipulation. Exploitation requires low user inter action. Vulnerable Module(s): [+] index.php?action=email_modify&conf=0&id=57 - inject code in the mail box Risk: ===== 1.1 The security risk of the pre auth sql injection vulnerability is estimated as critical. 1.2 The security risk of the persisten input validation vulnerability is estimated as medium. Credits: ======== Vulnerability Research Laboratory - the_storm (the_storm@vulnerability-lab.com) Disclaimer: =========== The information provided in this advisory is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties, either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability- Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability- Lab. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by Vulnerability-Lab or its suppliers. Copyright © 2012 Vulnerability-Lab
Saturday, 7 April 2012
idev Game Site CMS v1.0 - Multiple Web Vulnerabilites
Title: ====== idev Game Site CMS v1.0 - Multiple Web Vulnerabilites Date: ===== 2012-04-08 References: =========== http://www.vulnerability-lab.com/get_content.php?id=494 VL-ID: ===== 494 Introduction: ============= Start your own Flash web game website. Search engine optimized. Embed your Adsense etc code. 5 star AJAX rating system. True full-screen toggle for the players. Unlimited category organization. Quick and easy to add games! This game site is easy enough that inexperienced users will be able to create their game site from start to finish (just install and add content using the visual editor and without knowing any HTML). Yet powerful and customizable enough that experienced webmasters and programmers will appreciate both time saved and streamlined organization features which will make management of their game site easy down the road. (Copy of the Vendor Homepage: http://idevspot.com/idev-gamesite.php ) Abstract: ========= A Vulnerability Laboratory Researcher discovered multiple Web Vulnerabilities in the idev GameSite v1.0 Content Management System. Report-Timeline: ================ 2012-04-08: Public or Non-Public Disclosure Status: ======== Published Exploitation-Technique: ======================= Remote Severity: ========= Critical Details: ======== 1.1 A remote SQL Injection vulnerability is detected on Game Website Script :: idev-GameSite 1.0 The vulnerability allows an attacker (remote) or local low privileged user account to inject/execute own sql commands on the affected application dbms. Successful exploitation of the vulnerability results in dbms & application compromise. Vulnerable Module(s): [+] index.php?page=pages&id= [+] admin/index.php?page=addpage&id= [+] admin/index.php?page=categories&catid= Picture(s): ../1.png ../2.png ../3.png 1.2 A persistent input validation vulnerabilities are detected in Game Website Script :: idev-GameSite 1.0 The bugs allow remote attackers to implement/inject malicious script code on the application side (persistent). Successful exploitation of the vulnerability can lead to session hijacking (manager/admin) or stable (persistent) context manipulation. Exploitation requires low user inter action. Vulnerable Module(s): [+] Create Image - Title/Caption Risk: ===== 1.1 The security risk of the pre auth sql injection vulnerability is estimated as critical. 1.2 The security risk of the persisten input validation vulnerability is estimated as medium. Credits: ======== Vulnerability Research Laboratory - the_storm (the_storm@mail.com) Disclaimer: =========== The information provided in this advisory is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties, either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability- Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability- Lab. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by Vulnerability-Lab or its suppliers. Copyright © 2012 Vulnerability-Lab
Tuesday, 3 April 2012
SmartJobBoard v3.4 b5140 - Multiple Web Vulnerabilites
Title: ====== SmartJobBoard v3.4 b5140 - Multiple Web Vulnerabilites Date: ===== 2012-04-03 References: =========== http://www.vulnerability-lab.com/get_content.php?id=490 VL-ID: ===== 490 Introduction: ============= SmartJobBoard is an advanced software platform for creating professional job board web sites. It includes everything you need for running, customizing and extending your online recruitment service. Whether your job board is niche or general, employer or job seeker oriented, paid or free SmartJobBoard allows you to implement your ideas easily. (Copy of the Vendor Homepage: ) Abstract: ========= A Vulnerability Laboratory Researcher discovered multiple Web Vulnerabilities in SmartJoBboard v3.4 Build 5140. Report-Timeline: ================ 2012-04-03: Public or Non-Public Disclosure Status: ======== Published Affected Products: ================== Exploitation-Technique: ======================= Remote Severity: ========= Medium Details: ======== 1.1 A persistent input validation vulnerabilities are detected in SmartJoBboard ver-3.4 build 5140 The bugs allow remote attackers to implement/inject malicious script code on the application side (persistent). Successful exploitation of the vulnerability can lead to session hijacking (manager/admin) or stable (persistent) context manipulation. Exploitation requires low user inter action. Vulnerable Module(s): [+] Create resume (name of resume, institution, major) are all parameters that are injectible /add-listing/?listing_type_id=Resume [+] Sending a message (Title) /demo/private-messages/send/ [+] Create a screening-questionnaires /screening-questionnaires/new/ [+] Creating a job /add-listing/?listing_type_id=Job 1.2 The bugs allow remote attackers to enforce the user (admin) to change his password,add a page, or create a new user (persistent) Successful exploitation of the vulnerability can lead to creating a new admin account or create a new page. Vulnerable Module(s): [+] /admin/adminpswd/ [+] /admin/user-pages/ [+] /admin/users/ Risk: ===== 1.1 The security risk of the persisten input validation vulnerability is estimated as medium. 1.2 The security risk of the cross site request forgery vulnerability is estimated as low. Credits: ======== Vulnerability Research Laboratory Team - the_storm (the_storm@mail.com) Disclaimer: =========== The information provided in this advisory is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties, either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability- Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability- Lab. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by Vulnerability-Lab or its suppliers. Copyright © 2012 Vulnerability-Lab
Flatnux CMS 2011 08.09.2 - Multiple Web Vulnerabilities
Title: ====== Flatnux CMS 2011 08.09.2 - Multiple Web Vulnerabilities Date: ===== 2012-04-01 References: =========== http://www.vulnerability-lab.com/get_content.php?id=487 VL-ID: ===== 487 Introduction: ============= Flatnux is no database CMS for accessible websites, corporate websites, e-commerce and web management. Flatnux is a CMS without database that may have a database. CMS a program that allows you to easily create and update a website. Flatnux is a cms easy to use that can be used for: accessible portals E-commerce and shopping online web management Multilingual Websites Websites for Mobile Devices Example of e-commerce carried out with flatnux (www.pesto-genovese.it/) Example of management web made ​​with flatnux Example website created with flatnux, with online catalog Example of a web portal interface for mobile devices (Copy of the Vendor Homepage: http://www.flatnux.altervista.org/news.html ) Abstract: ========= A Vulnerability Laboratory Researcher discovered multiple Web Vulnerabilities in Flatnux CMS 2011 08.09.2. Report-Timeline: ================ 2012-04-01: Public or Non-Public Disclosure Status: ======== Published Exploitation-Technique: ======================= Remote Severity: ========= High Details: ======== 1.1 A arbitrary file traversal vulnerability is detected in Flatnux CMS 2011 08.09.2. The vulnerability allows an admin of the cms system to access server file components. Successful exploitation leads to unauthorized execution and access to system files which expands the web server rights of a restricted user. Vulnerable Module(s): [+] controlcenter.php > opt=contents/Files&dir= 1.2 A persistent input validation vulnerabilities are detected in Flatnux CMS 2011 08.09.2. The bugs allow remote attackers to implement/inject malicious script code on the application side (persistent). Successful exploitation of the vulnerability can lead to session hijacking (manager/admin) or stable (persistent) context manipulation. Exploitation requires low user inter action. Vulnerable Module(s): [+] Comment News - Title News > Name of Folders in Gallery 1.3 A cross site request forgery vulnerability is detected in Flatnux CMS 2011 08.09.2. The bugs allow remote attackers with high required user inter action to edit user accounts. Successful exploitation can lead to account access. To exploit the issue the attacker need to create a manipulated copy the edit user mask/form. Inside of the document the remote can implement his own values for the update because of no form or token protection. When admin get now forced to execute the script via link he is executing the new value on the update of the application if his session is not expired. Vulnerable Module(s): [+] xdb_fn_users - Add Account Affected Version(s): [+] flatnux-2011-08.09.2 [+] flatnux-2011-2012-01.03.3 [+] flatnux-2011-minimal-2012-01.03.3 [+] fncommerce-2010-08-09-no-db [+] fncommerce-2010-08-09-no-sample-data [+] fncommerce-2010-08-09-with-sample-data [+] fncommerce-2010-12-17-no-db [+] fncommerce-2010-12-17-no-sample-data [+] fncommerce-2010-12-17-with-sample-data Risk: ===== 1.1 The security risk of the arbitrary file traversal vulnerability is estimated as high(-). 1.2 The security risk of the persistent input validation vulnerability is estimated as medium. 1.3 The security risk of the cross site request forgery vulnerability is estimated as low(+). Credits: ======== Vulnerability Laboratory [Research Team] - the_storm (the_storm@vulnerability-lab.com) Disclaimer: =========== The information provided in this advisory is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties, either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability- Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability- Lab. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by Vulnerability-Lab or its suppliers. Copyright © 2012 Vulnerability-Lab
LandShop CMS v0.9.2 - Multiple Web Vulnerabilities
Title: ====== LandShop CMS v0.9.2 - Multiple Web Vulnerabilities Date: ===== 2012-03-31 References: =========== http://vulnerability-lab.com/get_content.php?id=485 VL-ID: ===== 485 Introduction: ============= The SAMEDIA LandShop® is an innovative tool for the marketing, sale or rent of any kind of real estate through the internet. The LandShop® user interface is designed to be flexible, transparent and fast. Instead of an overload of graphics and Flash animations the visitor will see immediately the business core and easily find the objects of his interest. Features include: Start page with 1 special item each of the categories - Houses for Sale - Property for Sale - Businesses for Sale - Houses for Rent - Property for Rent - Businesses for Rent Search capabilities for each of the above by free text or area selection Contact form for obtaining more information Wish list: Properties can be marked to be stored in a personal folder on the server. This can be accessed by the user after registration with a password. The folder contents can be viewed any time, printed or sent to third parties by the user. Wish list can be exported as PDF files to print out (Copy of the Vendor Homepage: http://www.landshop.gr/ ) Abstract: ========= A Vulnerability Laboratory Researcher discovered multiple Web Vulnerabilities in LandShop CMS v0.9.2 Report-Timeline: ================ 2012-03-31: Public or Non-Public Disclosure Status: ======== Published Exploitation-Technique: ======================= Remote Severity: ========= Critical Details: ======== 1.1 A remote SQL Injection vulnerability is detected on LandShops Web Application v0.9.2. The vulnerability allows an attacker (remote) or local low privileged user account to inject/execute own sql commands on the affected application dbms. Successful exploitation of the vulnerability results in dbms & application compromise. Vulnerable Module(s): [+] admin/action/objects.php [OB_ID=106] [+] admin/action/areas.php [AREA_ID=9] [+] admin/action/pdf.php [start=2] 2.1 A persistent input validation vulnerabilities are detected on LandShops Web Application v0.9.2. The bugs allow remote attackers to implement/inject malicious script code on the application side (persistent). Successful exploitation of the vulnerability can lead to session hijacking (manager/admin) or stable (persistent) context manipulation. Exploitation requires low user inter action. Vulnerable Module(s): [+] Create Object - Input/Output Name 2.2 A cross site request forgery vulnerability is detected on LandShops Web Application v0.9.2. The bugs allow remote attackers with high required user inter action to edit user accounts. Successful exploitation can lead to account access. To exploit the issue the attacker need to create a manipulated copy the edit user mask/form. Inside of the document the remote can implement his own values for the update because of no form or token protection. When admin get now forced to execute the script via link he is executing the new value on the update of the application if his session is not expired. Vulnerable Module(s): [+] Edit Users Form Picture(s): ../1.png ../2.png ../3.png ../4.png Risk: ===== 1.1 The security risk of the pre auth sql injection vulnerability is estimated as critical. 2.1 The security risk of the persisten input validation vulnerability is estimated as medium. 2.2 The security risk of the cross site request forgery vulnerability is estimated as low. Credits: ======== Vulnerability Research Laboratory - the_storm (the_storm@vulnerability-lab.com) Disclaimer: =========== The information provided in this advisory is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties, either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability- Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability- Lab. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by Vulnerability-Lab or its suppliers. Copyright © 2012 Vulnerability-Lab
Subscribe to:
Posts (Atom)