Re: [Full-disclosure] end of the interent ?

2006-09-30 Thread Alice Bryson [EMAIL PROTECTED]
well~, that's interesting~~ -- mailto:[EMAIL PROTECTED] 2006/9/30, Peter Dawson [EMAIL PROTECTED]: I had to share this wierd err http://www.google.com/reader/next?go=noitems -- http://peterdawson.typepad.com PeterDawson Home of ThoughtFlickr's This message is printed on Recycled

Re: [Full-disclosure] IM Sniffer release

2006-09-30 Thread Jeb Osama
Hey!! Its probably n3tty again!!--JebNever tired of n3tting From: Ferdinand Klinzer [EMAIL PROTECTED]I also don?t find the software on the site?cheers m8Am 27.09.2006 um 19:12 schrieb joe haldon: Well I looked at the site but didn't see any files to download.Just curious, what is your utility

Re: [Full-disclosure] Could InfoSec be Worse than Death?

2006-09-30 Thread Pavel Kankovsky
On Mon, 25 Sep 2006, Kenneth F. Belva wrote: iTunes, Unbox, Speedpass/Easypass/Paypass. Do these not create cash flows? Could they create cash flows (or even exist) if the security mechanisms (DRM/authentication) were not present? When you mention it... How does clandestine installation of

[Full-disclosure] [SECURITY] [DSA 1186-1] New cscope packages fix arbitrary code execution

2006-09-30 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 1186-1[EMAIL PROTECTED] http://www.debian.org/security/ Moritz Muehlenhoff September 30th, 2006

Re: [Full-disclosure] [WEB SECURITY] Stealing Search Engine Queries with JavaScript

2006-09-30 Thread Chris Hofmann
I've filed https://bugzilla.mozilla.org/show_bug.cgi?id=354861 for tracking the investigation in Firefox. Chris Hofmann Billy Hoffman wrote: SPI Labs has discovered a practical method of using _javascript_ to detect the search queries a user has entered into arbitrary search

[Full-disclosure] rPSA-2006-0175-2 openssl openssl-scripts

2006-09-30 Thread rPath Update Announcements
rPath Security Advisory: 2006-0175-2 Published: 2006-09-28 Updated: 2006-09-29 Resolved issue in patch for CVE-2006-2940 Products: rPath Linux 1 Rating: Major Exposure Level Classification: Remote Deterministic Unauthorized Access Updated Versions: openssl=/[EMAIL

[Full-disclosure] [MU-200609-01] Multiple Pre-Authentication Vulnerabilities in MailEnable SMTP

2006-09-30 Thread noreply
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Multiple Pre-Authentication Vulnerabilities in MailEnable SMTP [MU-200609-01] September 29, 2006 http://labs.musecurity.com/advisories.html Affected Product/Versions: MailEnable Professional 2.0 MailEnable Enterprise 2.0 Product Overview:

[Full-disclosure] setSlice exploited in the wild - massively

2006-09-30 Thread Gadi Evron
Exploit code is available publicly: http://www.milw0rm.com/exploits/2440 SANS diary: http://isc.sans.org/diary.php?storyid=1742 And this is so massively exploited, it makes VML look cute. There's a rootkit, some other malware, and haxdor! (a phishing trojan horse) Thanks to Roger Thompson at

Re: [Full-disclosure] working contact for 3ware.com?

2006-09-30 Thread Tonu Samuel
On Wednesday 20 September 2006 16:51, Niall Smith wrote: Hi Tonu I saw you message posted at http://lists.grok.org.uk/pipermail/full-disclosure/2006-May/046460.html. Responded in private. Tõnu ___ Full-Disclosure - We believe in it. Charter:

Re: [Full-disclosure] [WEB SECURITY] Stealing Search Engine Queries with JavaScript

2006-09-30 Thread Ian
Hi, Possible uses: -HMO's website could check if a visitor has been searching other sites about cancer, cancer treatments, or drug rehab centers. -Advertising networks could gather information about which topics someone is interested based on their search history and use that to echance

[Full-disclosure] [SECURITY] [DSA 1187-1] New migrationtools packages fix denial of service

2006-09-30 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 1187-1[EMAIL PROTECTED] http://www.debian.org/security/ Moritz Muehlenhoff September 30th, 2006

[Full-disclosure] YouTube Persistent Messaging XSS Vulnerability

2006-09-30 Thread Darren Bounds
YouTube Persistent Messaging XSS Vulnerability September 30, 2006 Overview: As I'm sure everyone knows; YouTube is the internet's leading video destination site and one of the fastest-growing websites on the web. It's ranked as the 10th most popular website on Alexa, far outpacing even MySpace's

[Full-disclosure] YouTube Persistent Messaging XSS Vulnerability *UPDATED*

2006-09-30 Thread Darren Bounds
YouTube Persistent Messaging XSS Vulnerability September 30, 2006 Overview: As I'm sure everyone knows; YouTube is the internet's leading video destination site and one of the fastest-growing websites on the web. It's ranked as the 10th most popular website on Alexa, far outpacing even MySpace's

[Full-disclosure] Security Rss Feeds

2006-09-30 Thread crazy frog crazy frog
Hi, Please share various security related rss feeds you read daily. Thanks, -CF ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Security Rss Feeds

2006-09-30 Thread Paul Schmehl
--On September 30, 2006 10:21:51 PM +0530 crazy frog crazy frog [EMAIL PROTECTED] wrote: Hi, Please share various security related rss feeds you read daily. http://sunbeltblog.blogspot.com/ http://www.schneier.com/blog/ http://blogs.technet.com/antimalware/default.aspx

[Full-disclosure] cpanel exploit

2006-09-30 Thread cp haquer
It was pretty easy to figure out how the exploit worked once you saw their first attempt at fixing it.--- /usr/local/cpanel/bin/mysqladmin 2006-08-29 16:54:07.0 -0500+++ httpupdate.cpanel.net/cpanelsync/EDGE/bin/mysqladmin 2006-09-23 23:51:20.0 -0500@@ -5,9 +5,14 @@# This code is

Re: [Full-disclosure] Security Rss Feeds

2006-09-30 Thread Peter Dawson
Add two more to that list http://portal.spidynamics.com/blogs/msutton/rss.aspx http://ha.ckers.org/blog/feed/ Paul, thanks for the new add's to me reader :)- On 9/30/06, Paul Schmehl [EMAIL PROTECTED] wrote: --On September 30, 2006 10:21:51 PM +0530 crazy frog crazy frog [EMAIL PROTECTED]

Re: [Full-disclosure] end of the interent ?

2006-09-30 Thread Joe Feise
Peter Dawson wrote on 09/29/06 13:10: I had to share this wierd err http://www.google.com/reader/next?go=noitems There are a bunch more of these kinds of pages. The first one I encountered, ca. 1998, was on opaldata.com (now defunct):

Re: [Full-disclosure] Stealing Search Engine Queries with JavaScript

2006-09-30 Thread マグロ原子
Doesn't work in Opera (9.02) or maybe I'm doing something wrong. Nyoro~n ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Security Rss Feeds

2006-09-30 Thread Tyop?
http://portal.spidynamics.com/blogs/msutton/rss.aspx http://ha.ckers.org/blog/feed/ http://sunbeltblog.blogspot.com/ http://www.schneier.com/blog/ http://blogs.technet.com/antimalware/default.aspx http://www.f-secure.com/weblog/ http://taosecurity.blogspot.com/

[Full-disclosure] Microsoft Internet Information Services UTF-7 XSS Vulnerability [MS06-053]

2006-09-30 Thread Eiji James Yoshida
+ Title: ~~~ Microsoft Internet Information Services UTF-7 XSS Vulnerability [http://www.geocities.jp/ptrs_sec/advisory09e.html] + Date: ~~~ 1 October 2006 + Author: ~~~ Eiji James Yoshida [EMAIL PROTECTED] + Risk: