There is some details for wannabees :)
1. 'Bad' wmf record:
07 00 00 00
length of record (in words)
FC 02
type (CreateBrushIndirect)
08 00 00 00 00 00 00 80
'packed' (good old Win16 days) LOGBRUSH data:
08 00 - 'packed' lpStyle (may be BS_DIBPATTERNPT [6] or BS_DIBPATTERN8X8 [8])
00 00 00
and here he is, n 3 t d 3 v alias "Steve
Bungay" while messing with his latest tech devices at DefCon http://www.bestwall.co.uk/images/roman18.jpg
have a beer.
- Original Message -
From:
n3td3v
v3dt3n
To: Stan Bubrouski
Cc: full-disclosure@lists.grok.org.uk
no, not really.
there are two approaches i know of.
1. the ntfs tools that come with most distros are not fully
supporting the ntfs.
2. the another approach uses some wine code and the original
windows dll's ->
1. may have some licensing issues (maybe not...)
2. is damn slw (honestly, it's
good idea indeed and, since ntfs drivers are available for linux for a long
time now, someone really willing to fix the issue could start there...
- Original Message -
From: "Denis Jedig" <[EMAIL PROTECTED]>
To:
Cc:
Sent: Saturday, August 05, 2006 10:35 AM
Subject: [Full-disclosure]
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200608-11
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200608-10
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -
###
Luigi Auriemma
Application: DConnect Daemon
http://www.dc.ds.pg.gda.pl
Versions: <= 0.7.0 and CVS <= 30 Jul 2006
Platforms:Windows, *nix, *BSD and others
Bugs: A] l
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200608-09
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -
Hello,
word about this vulnerability is out for several weeks (or months). Because of
this I spare you the
advisory and only point you to my little article describing what exactly this
vulnerability is,
that I disclosed to the PHP project 6 months ago:
The rating for this vulnerability should b
a crash does not mean exploitable ... and the chance there is something
to exploit with this are low regarding how it has been sent to the list
(another shit parts of the common shits here), nor the shit discloser
is much than ignorant.
FuLLBLaSTstorm wrote:
P-o-C really works and successfull
P-o-C really works and successfully crashed my explorer.exe :)) . Impatiently waiting for public release of the final exploit.P.S. I think It was not last vulnerability in GDI32.DLL.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.u
Hi,I have found ie crashing when refreshing an iframe containing an xml file with xsl stylesheet (takes a while to crash).I used this html:-
function refresh() {
frames[0].window.location.reload();
setTimeout("refresh();", 20);
}
refresh();<
Hi,
> your email address is interesting, googlemail.com, not gmail.com? are
> you from google?
nah, probably from UK - they've forced people to use that new name due
to some legal 'gmail' dispute.
http://mail.google.com/mail/help/intl/en-GB/googlemail.html
alan
___
13 matches
Mail list logo