Skylined, is there anything that you can't
exploit? ;-)
On a side note, an article quoting Ferris saying
that "Microsoft takes too long to patch stuff so that's why I'm going public"
recently was slashdotted (regarding a vulnerability he found in Internet
Explorer). Now he goes public with
Hi Jerome,
: It is possible to remotely view the source code of web script files
: though a specially crafted WebDAV HTTP request. Only IIS 5.1 seems to be
: vulnerable. The web script file must be on a FAT or a FAT32 volume, web
: scripts located on a NTFS are not vulnerable.
:
: The informa
The n3td3v alias is purely a rants and random bullshit ID.
The fuller picture is out there, somewhere.
On 9/10/05, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:
> n3td3v,
> Just because you joined a board
>
> (http://forum.crime-research.org/profile.php?mode=viewprofile&u=8)
> /str0ke
--
htt
n3td3v,
Its funny how you pick 1 person out of the bunch that complained on the
list.
Your child porn blah is kind of funny since VeNoMouS used to host
Condemned.org, I would hope you know what condemned.org is since your
webpage states you have Extensive on hands hacker scene experience (6+
year
Florian Weimer wrote:
IIRC, those Cisco products that are not vulnerable to the PMTU just don't
implement PMTUD, right?
You can explicitly enable PMTUD if you want ("ip tcp
path-mtu-discovery"). It's recommended to reduce CPU overhead for
processing BGP message (no kidding, apparently it id ma
"My full-disclosure folder"
Venomous, you're full of yourself. By trying to isolate yourself from
"kids" makes you more guilty of being directly involved in the "kid
scene" of the security community. You're already known to be a regular
of such channels as "#hackphreak" and others. Enough said.
Y
Berend-Jan Wever napisał(a):
> The security vulnerability in Mozilla FireFox reported by Tom Ferris is
> exploitable on Windows.
It's also easly exploitable on Linux -- no problems with jumping to arbitrary
address:
(gdb) x/i $eip
0x867926c <_ZN16nsTypedSelection5ClearEP14nsIPresContext+2236>:
>>And how exactly do you propose to "leave out the details and PoC" when the
presence of the bug and the steps taken to fix it can not be concelaed from
public view given that the source code and the entire CVS entries are freely
available for anyone to browse?
You really don't think it woudl slow
Go here also,
http://www.spamhaus.org/
_
Lee Quinton, CISSP.
Key: 0x2F6DF7B4
FP: E841 44EA F7AC E53D 3577 A5EF AA83 65BC 2F6D F7B4
On 9/10/05, Aditya Deshmukh <[EMAIL PROTECTED]> wrote:
One of domains is getting a *very* high number of 419 spams from an addressdelegated to
mul
* Fernando Gont:
> IIRC, those Cisco products that are not vulnerable to the PMTU just don't
> implement PMTUD, right?
You can explicitly enable PMTUD if you want ("ip tcp
path-mtu-discovery"). It's recommended to reduce CPU overhead for
processing BGP message (no kidding, apparently it id make
And how exactly do you propose to "leave out the details and PoC" when the presence of the bug and the steps taken to fix it can not be concelaed from public view given that the source code and the entire CVS entries are freely available for anyone to browse?
Mozilla users are getting the considera
One of domains is getting a *very* high number of 419 spams from an address
delegated to multilinks.com.
Where do I send the spam reports ? I have already send everything to
spamcop.net but that has not stopped anything yet
___
(Just a little heads up, no details or PoC attached)
The security vulnerability in Mozilla FireFox reported by Tom Ferris is exploitable on Windows.
I developed a working exploit that seems to be 100% stable, though I've only tested it on one system.
The exploit will not be released publicly unti
At 04:08 p.m. 05/09/2005, alex wrote:
Russian version (22.08.2005, with some analysis):
http://www.securitylab.ru/contest/239695.php
IIRC, those Cisco products that are not vulnerable to the PMTU just don't
implement PMTUD, right?
___
Full-Disclo
Simple http redirection
http://www.mssx.ws/mhtml_localintranet.html
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Maybe I'm way off base here, (I'm sure you'll let me know) but if you
don't even bother
opening the full-disclosure folder, How did you find something so
offensive in it??
Kinda like I never watch porn but I'm totally offended by the
#$%@&^%$#$@ stuff!
Pretty curious to me.
Well dude(s) and(d
16 matches
Mail list logo