-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 1106-1[EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
July 10th, 2006
Hello,
I have a problem with message delivery via Postfix. I build a network,
using VMware, consisting of three standalone FreeBSD machines.
I named them: FREEBSD1, FREEBSD2 and FREEBSD3.
On each of the machine I installed Postfix 2.2 and configured it.
Now I have a problem: when I am
Justin M. Forbes wrote:
Description:
Previous versions of the kernel package are vulnerable to two denial
of service attacks. The first allows any local user to fill up file
systems by causing core dumps to write to directories to which they
do not have write access permissions.
Bartlomiej Szymanski a écrit :
Hello,
Hi
I have a problem with message delivery via Postfix. I build a network,
using VMware, consisting of three standalone FreeBSD machines.
I named them: FREEBSD1, FREEBSD2 and FREEBSD3.
do you know postfix has also a very good mailing list ?
On each of
On 7/9/06, Erez Metula [EMAIL PROTECTED] wrote:
An example attack scenario could be that an attacker will redirect many
users (by email, posting in the organization portal, etc.) to some blocked
URL and an accompanying script that will steal their authentication cookies.
It sounds like the net
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 1107-1[EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
July 10th, 2006
MIMESweeper For Web 5.X Cross Site Scripting
I. INTRODUCTION
MIMESweeper For Web is a policy-based content security for web applications. It
analyzes web content and blocks pages or files that are prohibited by the
organizational security policy.
For more Information please refer to:
Hello,
I would just like to add some corrections to disclosure below.
On Thu, 6 Jul 2006, tuergeist wrote:
== == == TOC == == ==
1. Affected Vendor
2. Affected Product
3. Vulnerability
4. Safety Hazard
5. Disclosure Timeline
6. Vendor Response
7. Patch / Workaround
8. Vulnerability Details
On 7/10/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
On Mon, 10 Jul 2006 06:21:17 -0500 Bartlomiej Szymanski
[EMAIL PROTECTED] wrote:
Hello,
I have a problem with message delivery via Postfix...
[snip]
Refrain from off-topic discussions on the list.
Please stop this. It isn't helpful.
===
Ubuntu Security Notice USN-312-1 July 10, 2006
gimp vulnerability
CVE-2006-3404
===
A security issue affects the following Ubuntu releases:
Ubuntu 5.04
Ubuntu 5.10
Hi,
I would just give my 2ct
I would just like to add some corrections to disclosure below.
== 1. Affected Vendor ==
Object Security
This information is incorrect. ObjectSecurity is not the vendor of the
MICO ORB. MICO is a free software project licensed under LGPL/GPL
licenses.
Hi Brian,
Please consider those attack scenarios:
1. Stealing user cookie. Since it requires that the client should
already have such a cookie, it requires that the client visit the banned
site first. This situation is minimized to the time window in which the
user is logged in and the site got
Juniper Networks DX Web Administration Persistent System Log XSS Vulnerability
July 10, 2006
Product Overview:
The Juniper Networks (Redline) DX application acceleration platform
delivers a complete data center acceleration solution for web-enabled
and IP-based business applications.
Hi Christoph,
I'm not angry at all and I hope you are neither. Thank you for taking time
and provide us with nice way how to duplicate the issue. Also to give us
time to fix it before full disclosure which has not been used due to
communication/organization issues. Anyway, points taken, we
Hi,
I'm writing in regards to:
GraceNote CDDBControl ActiveX Control
(from CERT and SANS)
Buffer overflow in GraceNote CDDBControl ActiveX Control, as used by
multiple products that use Gracenote CDDB, allows remote attackers to
execute arbitrary code via a long option string.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Dear N3tN00dle,
The more you post, the more convinced I become that you are
complete moron. The one saving grace is that you provide so many
free laughs!!
Talk about delusions of grandeur. LOL.
Given enough rope, you'll eventually hang yourself.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 1108-1[EMAIL PROTECTED]
http://www.debian.org/security/ Moritz Muehlenhoff
Jul 11th, 2006
New CVE
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3431
published recently confirms the information that Microsoft Excel Style handling
vulnerability aka Nanika.xls issue is a separate vulnerability.
This vulnerability mentioned affects only to Simplified Chinese, Traditional
On 7/10/06, Line Noise [EMAIL PROTECTED] wrote:
On 7/10/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
On Mon, 10 Jul 2006 06:21:17 -0500 Bartlomiej Szymanski
[EMAIL PROTECTED] wrote:
Hello,
I have a problem with message delivery via Postfix...
[snip]
Refrain from off-topic discussions
What (I and) the underground call it:
Vhoning
The reason:
(I and) the underground are calling it vhoning, because it sounds like owning.
The breakdown:
v = voice over internet protocol
honing = phoning
>
vhoning = hackersby use of (internet phoning with)voice over internet protocol to
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Tue, 11 Jul 2006 11:10:57 +1000 n3td3v [EMAIL PROTECTED]
wrote:
What (I and) the underground call it:
Eeek! It's the big, bad *WANNABE* underground
n3td1ck..err..n3td00dle.
And another thing; what's this 'underground' and who's in it?
You should
Joel Helgeson
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Hey all!
Just saw this today for the first time...someone actually spoofing IM's
in yahoo chat. Is this a new exploit or did I miss something? Thank
you.
James
___
Full-Disclosure - We believe in it.
Charter:
On 7/11/06, Joel R. Helgeson [EMAIL PROTECTED] wrote:
Joel Helgesoncool; someone followed my advice then.
http://archives.neohapsis.com/archives/fulldisclosure/2006-07/0030.html
-- mic
___
Full-Disclosure - We believe in it.
Charter:
-Original Message-
Hey all!
Just saw this today for the first time...someone actually
spoofing IM's in yahoo chat. Is this a new exploit or did I
miss something? Thank you.
James
Describe the IM a little further.
Receiving garbage in an IM message isn't new, and is commonly
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDKA-2006:119
http://www.mandriva.com/security/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDKSA-2006:120
http://www.mandriva.com/security/
27 matches
Mail list logo