On 03/27/13 16:21, Jerry dePriest wrote:
https://www.facebook.com/groups/180686205383827/
It is possbile to avoid spamming the list with Facebook tracts?
___
Full-Disclosure - We believe in it.
Charter:
That would be lovely, we're already taking 12 like that a day, don't bring
it here...
I guess he's trying to call Anonymous for revenge
On Mar 27, 2013 9:57 AM, Bryan Baldwin br...@katofiad.co.nz wrote:
On 03/27/13 16:21, Jerry dePriest wrote:
=
INTERNET SECURITY AUDITORS ALERT 2013-004
- Original release date: March 9th, 2013
- Last revised: March 25th, 2013
- Discovered by: Vicente Aguilera Diaz
- Severity: 4.3/10 (CVSSv2 Base Scored)
- CVE-ID: CVE-2013-2585
I said sorry... what if it was your relative? what if it was the cops fucking
with your family?
that is all...
- Original Message -
From: Bryan Baldwin
To: full-disclosure@lists.grok.org.uk
Sent: Tuesday, March 26, 2013 10:26 PM
Subject: Re: [Full-disclosure] Justice for Molly (cops
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS Software Resource Reservation Protocol Denial of Service
Vulnerability
Advisory ID: cisco-sa-20130327-rsvp
Revision 1.0
For Public Release 2013 March 27 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS Software Zone-Based Policy Firewall Session Initiation
Protocol Inspection Denial of Service Vulnerability
Advisory ID: cisco-sa-20130327-cce
Revision 1.0
For Public Release 2013 March 27 16:00 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS Software IP Service Level Agreement Vulnerability
Advisory ID: cisco-sa-20130327-ipsla
Revision 1.0
For Public Release 2013 March 27 16:00 UTC (GMT)
+-
Summary
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS Software Protocol Translation Vulnerability
Advisory ID: cisco-sa-20130327-pt
Revision 1.0
For Public Release 2013 March 27 16:00 UTC (GMT)
+-
Summary
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS Software Internet Key Exchange Vulnerability
Advisory ID: cisco-sa-20130327-ike
Revision 1.0
For Public Release 2013 March 27 16:00 UTC (GMT)
+-
Summary
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS Software Network Address Translation Vulnerability
Advisory ID: cisco-sa-20130327-nat
Revision 1.0
For Public Release 2013 March 27 10:00 UTC (GMT)
+-
Summary
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Cisco IOS Software Smart Install Denial of Service Vulnerability
Advisory ID: cisco-sa-20130327-smartinstall
Revision 1.0
For Public Release 2013 March 27 16:00 UTC (GMT
Dear all,
This is to announce release of winAUTOPWN version 3.4.
Conceived and released in 2009, WINDOWS AUTOPWN grows strong completing its
4th year.
Visit: http://winautopwn.co.nr
About winAUTOPWN:
winAUTOPWN is a unique exploit framework which aids in auto
Asterisk Project Security Advisory - AST-2013-001
Product Asterisk
Summary Buffer Overflow Exploit Through SIP SDP Header
Nature of Advisory Exploitable Stack Buffer Overflow
Asterisk Project Security Advisory - AST-2013-002
Product Asterisk
Summary Denial of Service in HTTP server
Nature of Advisory Denial of Service
Asterisk Project Security Advisory - AST-2013-003
Product Asterisk
Summary Username disclosure in SIP channel driver
Nature of Advisory Unauthorized data disclosure
View online: http://drupal.org/node/1954588
* Advisory ID: DRUPAL-SA-CONTRIB-2013-036
* Project: Zero Point [1] (third-party module)
* Version: 7.x
* Date: 2013-March-27
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site Scripting
View online: http://drupal.org/node/1954764
* Advisory ID: DRUPAL-SA-CONTRIB-2013-038
* Project: Commons Groups [1] (third-party module)
* Version: 7.x
* Date: 2013-March-27
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Access bypass, Multiple
View online: http://drupal.org/node/1954592
* Advisory ID: DRUPAL-SA-CONTRIB-2013-037
* Project: Rules [1] (third-party module)
* Version: 7.x
* Date: 2013-March-27
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Cross Site Scripting
View online: http://drupal.org/node/1954766
* Advisory ID: DRUPAL-SA-CONTRIB-2013-039
* Project: Commons Wikis [1] (third-party module)
* Version: 7.x
* Date: 2013-March-27
* Security risk: Moderately critical [2]
* Exploitable from: Remote
* Vulnerability: Access bypass, Multiple
I think its simply a case of everyone more or less knew this was possible
and quite easy to pull off, just no one publicly bothered to get around to
doing it till now. Afterall its just a large mass of low hanging fruit
compromised to gather data. I'm more impressed by how they aggragated said
Folks,
It's been a day now since the public disclosure of CVE-2013-2266
(https://kb.isc.org/article/AA-00871):
A flaw in a library used by BIND 9.7, 9.8, and 9.9, when compiled on
Unix and related operating systems, allows an attacker to
deliberately cause excessive memory consumption by the
On 03/28/13 04:31, Jerry dePriest wrote:
I said sorry... what if it was your relative? what if it was the cops
fucking with your family?
There are places for these kinds of conversations, which are not here.
There are and will be seemingly urgent problems that some person
somewhere is going to
22 matches
Mail list logo