On 12/14/10 8:35 PM, musnt live wrote:
Original e-mail is from Theo DeRaadt
http://marc.info/?l=openbsd-techm=129236621626462w=2
Then also read Jason Wright's response and clear denial:
http://marc.info/?l=openbsd-techm=129244045916861w=2
--
Michael Scheidell, CTO
o: 561-999-5000
d: 561-948
problem at the family's wireless
carrier, ATT — revealed a little known security flaw with far reaching
implications for everyone on the Internet, not just Facebook users.
--
Michael Scheidell, CTO
Phone: 561-999-5000, x 1259
*| *SECNAP Network Security Corporation
* Certified SNORT
to
be set)
--
Michael Scheidell, CTO
Phone: 561-999-5000, x 1259
*| *SECNAP Network Security Corporation
* Certified SNORT Integrator
* 2008-9 Hot Company Award Winner, World Executive Alliance
* Five-Star Partner Program 2009, VARBusiness
* Best Anti-Spam Product 2008, Network Products
of the Internet in our own way.
Let us feel blessed for the impact we made and the relationships created.
--
Michael Scheidell, CTO
|SECNAP Network Security
Winner 2008 Network Products Guide Hot Companies
FreeBSD SpamAssassin Ports maintainer
into any
production version (or am I wrong?)
Try this on your system:
mysql --html --execute select 'a'
If you get this, then its not patched:
TABLE BORDER=1TRTHa/TH/TRTRTDa/TD/TR/TABLE
If you get this (on 5.1, a little different than 5.0) than its patched:
(note the escaped a)
--
Michael Scheidell
prefer how verizon did it then the bizillion 'lynksys' WEP keys
in the neighborhood.
--
Michael Scheidell, CTO
|SECNAP Network Security
Winner 2008 Network Products Guide Hot Companies
FreeBSD SpamAssassin Ports maintainer
.
(see/'google' for posts in bugtraq and spamassassin users group showing
headers from unrelated domains sending spam through google mail servers..
They ignore the emails to [EMAIL PROTECTED])
--
Michael Scheidell, CTO
|SECNAP Network Security
Winner 2008 Network Products Guide Hot Companies
://heanet.dl.sourceforge.net/sourceforge/libpng/libpng-1.2.27.tar.bz2:
size mismatch: expected 641193, actual 804821
--
Michael Scheidell, CTO
Main: 561-999-5000, Office: 561-939-7259
*| *SECNAP Network Security Corporation
Winner 2008 Technosium hot company award.
www.technosium.com/hotcompanies/ http
BID 19000 says that its retired since its not exploitable?
Seems maybe it is (including maybe www.joomla.org got hacked by same
thing)
http://forum.joomla.org/index.php/topic,203000.msg955330.html#msg955330
--
Michael Scheidell, CTO
Join SECNAP at SecureWorld Detroit 8-9
http
or are there specific
directories that can be hacked?
Is it just yapig.sourceforge.net?
Either case, I should suggest everyone be careful about what you
download from sourceforge till they do a full code audit and post the
results here.
--
Michael Scheidell, CTO
SECNAP Network Security
561-999-5000 x 1131
for their products.
http://www.secnap.com/aboutus.php?pg=4
--
Michael Scheidell, CTO
SECNAP Network Security Corporation
Web based Security and Privacy training:
http://www.secnap.com/training
-
This email has been scanned
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
Sent: Monday, December 18, 2006 12:53 PM
To: bugtraq@securityfocus.com
Subject: Re: Cisco not honoring update promises?
Michael,
This message came to my attention this morning via your
posting to bugtraq.
in the world)
* e-mail: [EMAIL PROTECTED]
Please have your product serial number available and give the URL of
this notice as evidence of your entitlement to a free upgrade. Free
upgrades for non-contract customers must be requested through the TAC.
--
Michael Scheidell, CTO
SECNAP Network Security
-Original Message-
From: lucretias [mailto:[EMAIL PROTECTED]
Sent: Wednesday, December 06, 2006 7:56 AM
To: Michael Scheidell
Subject: RE: Symantec LiveState Agent for Windows
vulnerability - Local Privilege Escalation
I think the issue is the process does not return in it's
-Original Message-
From: ss_team [mailto:[EMAIL PROTECTED]
Sent: Monday, December 04, 2006 11:28 AM
To: bugtraq@securityfocus.com
Subject: Symantec LiveState Agent for Windows vulnerability -
Local Privilege Escalation
hello,
we've found local privilege escalation in
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
Sent: Wednesday, November 22, 2006 4:58 AM
Subject: Big Flaw in Firefox 2: Password Manager Bug Exposes Passwords
Today, Mozilla made public bug #360493, which exposes
Firefox's Password Manager on many public
You probably are who you say you are, and you probably own the accounts
these passwords are from, but could not someone post a bunch of NTLM
hashes and ask the world to crack them for him? Even if he dint' own the
accounts?
So, is this a social engineering test as well?
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
Sent: Thursday, June 08, 2006 5:29 PM
To: bugtraq@securityfocus.com
Subject: Dell Openmanage CD Vulnerability
When you boot up using the Dell PowerEdge Installation and
Server Management Disc (P/N: WG126 Rev.
antivirus product, known as Norton Antivirus 2006,
and its current security suite - which includes both antivirus and
firewall features - did not appear to be vulnerable.
http://www.msnbc.msn.com/id/12990213/
--
Michael Scheidell, CTO
561-999-5000, ext 1131
SECNAP Network Security Corporation
Try:
[EMAIL PROTECTED] and
[EMAIL PROTECTED]
(these are in the US, not sure if they segment responsibility)
--
Michael Scheidell, CTO
561-999-5000, ext 1131
SECNAP Network Security Corporation
Keep up to date with latest information on IT security: Real time
security alerts: http
Just a quick followup and clarification:
-Original Message-
From: Michael Scheidell
Sent: Wednesday, March 15, 2006 8:38 AM
To: bugtraq@securityfocus.com
Subject: WebVulnCrawl searching excluded directories for
hackable web servers
What he is doing is a violation of the RFC's
by Michael Scheidell, SECNAP Network Security vulnerability
research team.
The original problem with Microsoft IE found by George Guninski and
involved insecure default reading of a malformed HTML Email in Outlook and
OE and insecure running of HTML (see
http://www.guninski.com/browsers.html
We need to contact 3com about a potential security problem with one of
their products and wanted to know if they had an official email address
for such communications.
--
Michael Scheidell
SECNAP Network Security, LLC
Sales: 866-SECNAPNET / (1-866-732-6276)
Main: 561-368-9561 / www.secnap.net
More information on radmin can be found at www.radmin.com
This Security Bulletin is Copyright(c) 2002 SECNAP Network Security, LLC,
and can only be copied or forwarded without modification.
--
Michael Scheidell,
SECNAP Network Security, LLC
Sales: 866-SECNAPNET / (1-866-732-6276)
Main: 561-368
24 matches
Mail list logo