-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 1146-1[EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
August 9th, 2006
Denial Of Service on Chat Magma Latinchat
http://www.latinchat.com
Researcher: Vicente Perez
1.-Overview
Latinchat is one of the most known chat server, and used basically by
latin american people.
2.-Description
This system has a vulnerabily as DoS, taking system offline by a while.
The
I need some contact at Netscape who can put me in touch with the
development/operations team (in particular, the team responsible for
the new security features in 8.1). Any suggestions?
___
Full-Disclosure - We believe in it.
Charter:
===
Ubuntu Security Notice USN-333-1August 09, 2006
libwmf vulnerability
CVE-2006-3376
===
A security issue affects the following Ubuntu releases:
Ubuntu 5.04
Ubuntu 5.10
http://www.gnucitizen.org/blog/xssing-the-lan-4
--
pdp (architect)
http://www.gnucitizen.org
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
On Mon, 7 Aug 2006 10:58:09 -0700 [EMAIL PROTECTED] wrote:
TippingPoint IPS customers have been protected against this
vulnerability since July 26, 2006 by Digital Vaccine protection
filter ID 4544.
Is it just me, or is it a really perverted idea to have a malware pattern
scanner protect
Overflow.pl Security Advisory #6
Clam AntiVirus Win32-UPX Heap Overflow
Vendor: Clam AntiVirus
Affected version: Prior to 0.88.4
Vendor status: Fixed version released (0.88.4)
Author: Damian Put [EMAIL PROTECTED]
URL: http://www.overflow.pl/adv/clamav_upx_heap.txt
Date: 09.08.2006
1.
The query http://www.google.сom/search?q=xscript+xss or
http://www.google.com/search?q=PTHeader+PTValue allows you to discover sites
scanned by XSpider (MaxPatrol). Perhaps other vulnerability scanners leave
their traces at Web servers. Time will show which exactly.
3uBi3u
rPath Security Advisory: 2006-0150-1
Published: 2006-08-09
Products: rPath Linux 1
Rating: Major
Exposure Level Classification:
Local Root Deterministic Privilege Escalation
Updated Versions:
krb5=/[EMAIL PROTECTED]:devel//1/1.4.1-7.2-1
krb5-server=/[EMAIL
Just came across this on news.com regarding MS06-040 and homeland
security's response:
http://news.com.com/2100-7348_3-6103805.html?part=rsstag=6103805subj=news
Overnight, popular hacker toolkits were updated with code that allows
researchers to check for the flaw and exploit it, said Neel
Vulnerability Report
-
Vendor: Microsoft and ArcSoft
Product: PocketPC OS and MMS Composer
Version(s): MMS Composer: 1.5.5.6, 2.0.0.13 (possible others)
Platform: PocketPC (tested on: WinCE 4.2 and WinCE 4.21, possible
others)
Mehta was referring to a proof-of-concept exploit that is available for
Canvas and at least one other tool.
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Matt
Davis
Sent: Wednesday, August 09, 2006 11:10 AM
To: full-disclosure@lists.grok.org.uk
Subject:
Core Impact and Canvas both have exploits out. Metasploit technically has
one, but it hasn't been completed/released yet.
-HD
On Wednesday 09 August 2006 13:10, Matt Davis wrote:
Did I completely miss exploit code being released in the wild for that
vulnerability?
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I'm not sure if overnight is correct - since we released it around
4pm EST into our Partner's program. This is something different from
CANVAS Professional in that it's more a program for large penetration
testing companies, government agencies, and
Thanks. What threw me for a loop was that I consider CANVAS et. al.
to be security tools... not hacker tools. So, I wasn't thinking of
those applications when I read that.
I didn't see any mention of exploit code at the usual places.
On 8/9/06, H D Moore [EMAIL PROTECTED] wrote:
Core Impact
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 1147-1[EMAIL PROTECTED]
http://www.debian.org/security/ Moritz Muehlenhoff
August 9th, 2006
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDKSA-2006:139
http://www.mandriva.com/security/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDKSA-2006:140
http://www.mandriva.com/security/
###
Luigi Auriemma
Application: AlsaPlayer
http://www.alsaplayer.org
Versions: = 0.99.76 and current CVS
Platforms:*nix and others
Bugs: A] buffer-overflow in
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 1148-1[EMAIL PROTECTED]
http://www.debian.org/security/ Moritz Muehlenhoff
August 9th, 2006
Denial Of Service on Chat Magma Latinchat
http://www.latinchat.com
Researcher: Vicente Perez
1.-Overview
Latinchat is one of the most known chat server, and used basically by
latin american people.
2.-Description
This system has a vulnerabily as DoS, taking system offline by a while.
The
###
Luigi Auriemma
Application: OpenMPT (aka MODPlug Tracker)
http://modplug.sourceforge.net
http://www.modplug.com
libmodplug
Hi
I'm setting up a redundant server. Both servers are connected to the
Internet in different data centers. My needs are to have one of the
servers mirroring the another one, with traffic going to one of them,
and, when the active server goes down, traffic should be temporarly
sent to the other
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Yo Sec!
On Wed, 9 Aug 2006, Sec Bas wrote:
I was thinking about doing this with Dynamic
DNS and using rsync to replicate changes.
Dynamic DNS will not provide the response you are looking for. Many
browsers cache DNS for 30 mins or more
(This was sent in reponse to a mass email sent out by Joe - even though me
and him have had nothing to do with each other for a *long*, LONG, time.
---
Joe -
If you check your records, you'll see that I contributed to
On Wed, 09 Aug 2006 13:45:08 CDT, Matt Davis said:
Thanks. What threw me for a loop was that I consider CANVAS et. al.
to be security tools... not hacker tools.
Same thing. Just wear a different color hat when you hit 'enter'.
pgpMnkUdmxJGx.pgp
Description: PGP signature
Hello,
I am wondering if someone can point me in the right direction. We are
currently evaluating our bandwidth policy and are finding the need to
dig deeper in our network traffic to find out what the current bandwidth
is being used for.
We have used different tools in the past, NTOP for
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 1149-1[EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
August 10th, 2006
28 matches
Mail list logo