Re: [Full-disclosure] Google Groups e-mail disclosure in plain text

2006-04-19 Thread Valdis . Kletnieks
On Wed, 19 Apr 2006 06:11:36 BST, n3td3v said: > If they did something special with their website like Securityfocus > does, then I might be able to bare their illegal footer message spam, "illegal"? Statute or case law citation, please? And that footer is running around nekkid already, no need

[Full-disclosure] ocrshopxtr_freebie.pl

2006-04-19 Thread VeNoMouS
This code bypasses the OCR Shop XTR vvlicense - http://www.vividata.com/be_xtr_overview.html.       - VeNoMouS ocrshopxtr_freebie.pl Description: Binary data ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/ful

Re: [Full-disclosure] Google Groups e-mail disclosure in plain text

2006-04-19 Thread Matthew Murphy
-BEGIN PGP SIGNED MESSAGE- Hash: RIPEMD160 n3td3v wrote: [...] > Furthermore, Secunia are the biggest "scene whore" professional > website in the industry. Uhh, dude... the scene and the industry are essentially two different things. There's no such thing as a "professional scene whore"

Re: [Full-disclosure] Google Groups e-mail disclosure in plain text

2006-04-19 Thread Randal T. Rioux
-BEGIN PGP SIGNED MESSAGE- Hash: RIPEMD160 Rodrigo Barbosa wrote: > On Wed, Apr 19, 2006 at 07:09:11AM +0100, n3td3v wrote: > >>>On 4/19/06, Randal T. Rioux <[EMAIL PROTECTED]> wrote: >>>I don't think the industry needs someone to "verify" an advisory for them. > > > Actually, you are w

Re: [Full-disclosure] Google Groups e-mail disclosure in plain text

2006-04-19 Thread Siegfried
http://secunia.com/secunia_research/ one vulnerability? not even a remote system one? did you do better? and did n3tv3d with his xss advisories and trolls do better? Be respectful because they contribute more than you Le Mer 19 avril 2006 15:01, [EMAIL PROTECTED] a écrit : > So releasing one vulne

RE: [Full-disclosure] Google Groups e-mail disclosure in plain text

2006-04-19 Thread Ron Whitney
> This is my last ever Full-Disclosure post... ...and there was much rejoicing. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] RE: re: Dude! Amigo! [Was: Re: [funsec]

2006-04-19 Thread J. Patterson Wicks
The only person with any sort of "hating" going on is you (not to mention exaggeration, misinformation, fact-twisting and misspelled words). Whatever your issues are, they go far beyond any electronic security policy. You should know that your quote from Einstein continues on to say "The mediocre

[Full-disclosure] Cisco Security Advisory: Cisco IOS XR MPLS Vulnerabilities

2006-04-19 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Cisco Security Advisory: Cisco IOS XR MPLS Vulnerabilities Advisory ID: cisco-sa-20060419-xr http://www.cisco.com/warp/public/707/cisco-sa-20060419-xr.shtml Revision 1.0 For Public Release 2006 April 19 1500 UTC (GMT

[Full-disclosure] Cisco Security Advisory: Multiple Vulnerabilities in the WLSE Appliance

2006-04-19 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Cisco Security Advisory: Multiple Vulnerabilities in the WLSE Appliance Advisory ID: cisco-sa-20060419-wlse http://www.cisco.com/warp/public/707/cisco-sa-20060419-wlse.shtml Revision 1.0 For Public Release 2006 April 19 1500 UTC (GMT

[Full-disclosure] [USN-271-1] Firefox vulnerabilities

2006-04-19 Thread Martin Pitt
=== Ubuntu Security Notice USN-271-1 April 19, 2006 mozilla-firefox, firefox vulnerabilities CVE-2005-4134, CVE-2006-0292, CVE-2006-0296, CVE-2006-0749, CVE-2006-1727, CVE-2006-1728, CVE-2006-1729, CVE-2006-1730, CVE-2006-1731, CVE

Re: [Full-disclosure] Confixx Index.PHP SQL Injection Vulnerability (Exploit - not new vuln)

2006-04-19 Thread defa
sry - i know this isn't a cvs repository here - but the code posted yesterday was written after some 'b33r' an i made it looking a little less drunk this morning. bye defa BOF #!/usr/bin/perl #

RE: [Full-disclosure] Microsoft DNS resolver: deliberately sabotaged hosts-file lookup

2006-04-19 Thread Mario Contestabile
Fyi, Any NT app can bypass the local hosts file using DnsQuery(...,..., DNS_QUERY_NO_HOSTS_FILE, ...); [EMAIL PROTECTED] http://bubbler.net/outlaw/blog -Original Message- From: Joachim Schipper [mailto:[EMAIL PROTECTED] Sent: April 13, 2006 8:13 PM To: full-disclosure@lists.grok.

[Full-disclosure] ASPSitem <= 1.83 Remote SQL Injection Vulnerability

2006-04-19 Thread Mustafa Can Bjorn IPEKCI
--Security Report-- Advisory: ASPSitem <= 1.83 Remote SQL Injection Vulnerability. --- Author: Mustafa Can Bjorn "nukedx a.k.a nuker" IPEKCI --- Date: 19/04/06 19:33 PM --- Contacts:{ ICQ: 10072 MSN/Email: [EMAIL PROTECTED] Web: http://www.nukedx.com } --- Vendor: ASPSitem (http://www.aspsitem.com

Re: [Full-disclosure] Question: Need Suggestions

2006-04-19 Thread Sektek Sektek
Process auditing has been available in Windows since at least NT 4.0. Once you turn it on (via local or group security policy) process creation and terminations are logged in the Security event log. On 4/17/06, y0himba <[EMAIL PROTECTED]> wrote: > Hi. > > I lurk on this list not posting much and

Re: [Full-disclosure] Google Groups e-mail disclosure in plain text

2006-04-19 Thread n3td3v
On 4/19/06, Matthew Murphy <[EMAIL PROTECTED]> wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: RIPEMD160 > > n3td3v wrote: > [...] > > Furthermore, Secunia are the biggest "scene whore" professional > > website in the industry. > > There's no such thing as a "professional scene whore" Until Se

[Full-disclosure] selling ms office bug

2006-04-19 Thread [EMAIL PROTECTED]
auction is up for whitehat industry only, proof required, you open a file, the shellcode runs, included are some explanations and the poc exploit. You are welcome to message me to my email or on the forum for much informations. Arnaud Dovi ___ Full-

Re: [Full-disclosure] selling ms office bug

2006-04-19 Thread [EMAIL PROTECTED]
forgot to mention so the format of the file is popular , in security at least a lot ;> [EMAIL PROTECTED] wrote: auction is up for whitehat industry only, proof required, you open a file, the shellcode runs, included are some explanations and the poc exploit. You are welcome to message me to my

Re: [Full-disclosure] selling ms office bug

2006-04-19 Thread n3td3v
On 4/19/06, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote: > forgot to mention so the format of the file is popular , in security at > least a lot ;> > > [EMAIL PROTECTED] wrote: > > auction is up for whitehat industry only, proof required, you open a > > file, the shellcode runs, included are some e

[Full-disclosure] [Argeniss] Oracle Database 10gR1 Buffer overflow in VERIFY_LOG procedure

2006-04-19 Thread Cesar
Argeniss Security Advisory Name: Oracle Database 10gR1 Buffer overflow in VERIFY_LOG procedure (DB03) Affected Software: Oracle Database Server version 10gR1 Severity: High Remote exploitable: Yes (Authentication to Database Server is needed) Credits: Esteban Martínez Fayó Date: 4/18/2006 A

[Full-disclosure] [123Privacy] Findnot.com IP Address Privacy Breach and Unencrypted Data Vulnerability

2006-04-19 Thread 123 Privacy Advisories
-BEGIN PGP SIGNED MESSAGE- Findnot.com IP Address Privacy Breach and Unencrypted Data Vulnerability Advisory ID:FN15294 Release Date: 2006-04-18 Last Update:2006-04-18 Severity: Critical IMPACT: Unexpected Intermittent IP Address Privacy Breach, Immediate Loss of Anon

[Full-disclosure] [123Privacy] Findnot.com DNS Privacy Breach, DNS Spoofing Exposure, and ISP Monitoring Vulnerability

2006-04-19 Thread 123 Privacy Advisories
-BEGIN PGP SIGNED MESSAGE- Findnot.com DNS Privacy Breach, DNS Spoofing Exposure, and ISP Monitoring Vulnerability Advisory ID:FN15398 Release Date: 2006-04-18 Last Update:2006-04-18 Severity: Critical IMPACT: Website locations visited are viewable by users on

Re: [Full-disclosure] Re: kiddie porn warning [was: Fwd: Re: montspace -- child porn (site still up)]

2006-04-19 Thread Steve Kudlak
This is an example of politicos gone wild. What funtionally happens is that when some hot button issue comes down the pike every politico wants to be seen as having done something about whatever the big scary thing is. In the 1950s and the early 1960s it was Communism and Communist Infilitrat