Re: [Full-disclosure] Justice for Molly (cops killing civillians)

2013-03-27 Thread Bryan Baldwin
On 03/27/13 16:21, Jerry dePriest wrote: https://www.facebook.com/groups/180686205383827/ It is possbile to avoid spamming the list with Facebook tracts? ___ Full-Disclosure - We believe in it. Charter:

Re: [Full-disclosure] Justice for Molly (cops killing civillians)

2013-03-27 Thread Gregory Boddin
That would be lovely, we're already taking 12 like that a day, don't bring it here... I guess he's trying to call Anonymous for revenge On Mar 27, 2013 9:57 AM, Bryan Baldwin br...@katofiad.co.nz wrote: On 03/27/13 16:21, Jerry dePriest wrote:

[Full-disclosure] [ISecAuditors Security Advisories] Reflected XSS in Atmail WebMail = v7.0.2

2013-03-27 Thread ISecAuditors Security Advisories
= INTERNET SECURITY AUDITORS ALERT 2013-004 - Original release date: March 9th, 2013 - Last revised: March 25th, 2013 - Discovered by: Vicente Aguilera Diaz - Severity: 4.3/10 (CVSSv2 Base Scored) - CVE-ID: CVE-2013-2585

[Full-disclosure] Fw: Justice for Molly (cops killing civillians)

2013-03-27 Thread Jerry dePriest
I said sorry... what if it was your relative? what if it was the cops fucking with your family? that is all... - Original Message - From: Bryan Baldwin To: full-disclosure@lists.grok.org.uk Sent: Tuesday, March 26, 2013 10:26 PM Subject: Re: [Full-disclosure] Justice for Molly (cops

[Full-disclosure] Cisco Security Advisory: Cisco IOS Software Resource Reservation Protocol Denial of Service Vulnerability

2013-03-27 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Cisco IOS Software Resource Reservation Protocol Denial of Service Vulnerability Advisory ID: cisco-sa-20130327-rsvp Revision 1.0 For Public Release 2013 March 27 16:00 UTC (GMT

[Full-disclosure] Cisco Security Advisory: Cisco IOS Software Zone-Based Policy Firewall Session Initiation Protocol Inspection Denial of Service Vulnerability

2013-03-27 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Cisco IOS Software Zone-Based Policy Firewall Session Initiation Protocol Inspection Denial of Service Vulnerability Advisory ID: cisco-sa-20130327-cce Revision 1.0 For Public Release 2013 March 27 16:00 UTC (GMT

[Full-disclosure] Cisco Security Advisory: Cisco IOS Software IP Service Level Agreement Vulnerability

2013-03-27 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Cisco IOS Software IP Service Level Agreement Vulnerability Advisory ID: cisco-sa-20130327-ipsla Revision 1.0 For Public Release 2013 March 27 16:00 UTC (GMT) +- Summary

[Full-disclosure] Cisco Security Advisory: Cisco IOS Software Protocol Translation Vulnerability

2013-03-27 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Cisco IOS Software Protocol Translation Vulnerability Advisory ID: cisco-sa-20130327-pt Revision 1.0 For Public Release 2013 March 27 16:00 UTC (GMT) +- Summary

[Full-disclosure] Cisco Security Advisory: Cisco IOS Software Internet Key Exchange Vulnerability

2013-03-27 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Cisco IOS Software Internet Key Exchange Vulnerability Advisory ID: cisco-sa-20130327-ike Revision 1.0 For Public Release 2013 March 27 16:00 UTC (GMT) +- Summary

[Full-disclosure] Cisco Security Advisory: Cisco IOS Software Network Address Translation Vulnerability

2013-03-27 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Cisco IOS Software Network Address Translation Vulnerability Advisory ID: cisco-sa-20130327-nat Revision 1.0 For Public Release 2013 March 27 10:00 UTC (GMT) +- Summary

[Full-disclosure] Cisco Security Advisory: Cisco IOS Software Smart Install Denial of Service Vulnerability

2013-03-27 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Cisco IOS Software Smart Install Denial of Service Vulnerability Advisory ID: cisco-sa-20130327-smartinstall Revision 1.0 For Public Release 2013 March 27 16:00 UTC (GMT

[Full-disclosure] winAUTOPWN v3.4 Released - Completing 4 years !!

2013-03-27 Thread QUAKER DOOMER
Dear all, This is to announce release of winAUTOPWN version 3.4. Conceived and released in 2009, WINDOWS AUTOPWN grows strong completing its 4th year. Visit: http://winautopwn.co.nr About winAUTOPWN: winAUTOPWN is a unique exploit framework which aids in auto

[Full-disclosure] AST-2013-001: Buffer Overflow Exploit Through SIP SDP Header

2013-03-27 Thread Asterisk Security Team
Asterisk Project Security Advisory - AST-2013-001 Product Asterisk Summary Buffer Overflow Exploit Through SIP SDP Header Nature of Advisory Exploitable Stack Buffer Overflow

[Full-disclosure] AST-2013-002: Denial of Service in HTTP server

2013-03-27 Thread Asterisk Security Team
Asterisk Project Security Advisory - AST-2013-002 Product Asterisk Summary Denial of Service in HTTP server Nature of Advisory Denial of Service

[Full-disclosure] AST-2013-003: Username disclosure in SIP channel driver

2013-03-27 Thread Asterisk Security Team
Asterisk Project Security Advisory - AST-2013-003 Product Asterisk Summary Username disclosure in SIP channel driver Nature of Advisory Unauthorized data disclosure

[Full-disclosure] [Security-news] SA-CONTRIB-2013-036 - Zero Point - Cross Site Scripting (XSS)

2013-03-27 Thread security-news
View online: http://drupal.org/node/1954588 * Advisory ID: DRUPAL-SA-CONTRIB-2013-036 * Project: Zero Point [1] (third-party module) * Version: 7.x * Date: 2013-March-27 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting

[Full-disclosure] [Security-news] SA-CONTRIB-2013-038 - Commons Groups - Access bypass Privilege escalation

2013-03-27 Thread security-news
View online: http://drupal.org/node/1954764 * Advisory ID: DRUPAL-SA-CONTRIB-2013-038 * Project: Commons Groups [1] (third-party module) * Version: 7.x * Date: 2013-March-27 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Access bypass, Multiple

[Full-disclosure] [Security-news] SA-CONTRIB-2013-037 - Rules - Cross Site Scripting (XSS)

2013-03-27 Thread security-news
View online: http://drupal.org/node/1954592 * Advisory ID: DRUPAL-SA-CONTRIB-2013-037 * Project: Rules [1] (third-party module) * Version: 7.x * Date: 2013-March-27 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Cross Site Scripting

[Full-disclosure] [Security-news] SA-CONTRIB-2013-039 - Commons Wikis - Access bypass Privilege escalation

2013-03-27 Thread security-news
View online: http://drupal.org/node/1954766 * Advisory ID: DRUPAL-SA-CONTRIB-2013-039 * Project: Commons Wikis [1] (third-party module) * Version: 7.x * Date: 2013-March-27 * Security risk: Moderately critical [2] * Exploitable from: Remote * Vulnerability: Access bypass, Multiple

Re: [Full-disclosure] Port scanning /0 using insecure embedded devices

2013-03-27 Thread Gage Bystrom
I think its simply a case of everyone more or less knew this was possible and quite easy to pull off, just no one publicly bothered to get around to doing it till now. Afterall its just a large mass of low hanging fruit compromised to gather data. I'm more impressed by how they aggragated said

[Full-disclosure] On the impact of CVE-2013-2266 (BIND9)

2013-03-27 Thread Daniel Franke
Folks, It's been a day now since the public disclosure of CVE-2013-2266 (https://kb.isc.org/article/AA-00871): A flaw in a library used by BIND 9.7, 9.8, and 9.9, when compiled on Unix and related operating systems, allows an attacker to deliberately cause excessive memory consumption by the

Re: [Full-disclosure] Fw: Justice for Molly (cops killing civillians)

2013-03-27 Thread Bryan Baldwin
On 03/28/13 04:31, Jerry dePriest wrote: I said sorry... what if it was your relative? what if it was the cops fucking with your family? There are places for these kinds of conversations, which are not here. There are and will be seemingly urgent problems that some person somewhere is going to