well~, that's interesting~~
--
mailto:[EMAIL PROTECTED]
2006/9/30, Peter Dawson [EMAIL PROTECTED]:
I had to share this wierd err
http://www.google.com/reader/next?go=noitems
--
http://peterdawson.typepad.com
PeterDawson Home of ThoughtFlickr's
This message is printed on Recycled
Hey!! Its probably n3tty again!!--JebNever tired of n3tting
From: Ferdinand Klinzer [EMAIL PROTECTED]I also don?t find the software on the site?cheers m8Am 27.09.2006 um 19:12 schrieb joe haldon: Well I looked at the site but didn't see any files to download.Just
curious, what is your utility
On Mon, 25 Sep 2006, Kenneth F. Belva wrote:
iTunes, Unbox, Speedpass/Easypass/Paypass. Do these not create cash flows?
Could they create cash flows (or even exist) if the security mechanisms
(DRM/authentication) were not present?
When you mention it...
How does clandestine installation of
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 1186-1[EMAIL PROTECTED]
http://www.debian.org/security/ Moritz Muehlenhoff
September 30th, 2006
I've filed https://bugzilla.mozilla.org/show_bug.cgi?id=354861 for
tracking the investigation in Firefox.
Chris Hofmann
Billy Hoffman wrote:
SPI Labs
has discovered a practical method of using _javascript_ to detect the
search queries a user has entered into arbitrary search
rPath Security Advisory: 2006-0175-2
Published: 2006-09-28
Updated:
2006-09-29 Resolved issue in patch for CVE-2006-2940
Products: rPath Linux 1
Rating: Major
Exposure Level Classification:
Remote Deterministic Unauthorized Access
Updated Versions:
openssl=/[EMAIL
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Multiple Pre-Authentication Vulnerabilities in MailEnable SMTP [MU-200609-01]
September 29, 2006
http://labs.musecurity.com/advisories.html
Affected Product/Versions:
MailEnable Professional 2.0
MailEnable Enterprise 2.0
Product Overview:
Exploit code is available publicly:
http://www.milw0rm.com/exploits/2440
SANS diary:
http://isc.sans.org/diary.php?storyid=1742
And this is so massively exploited, it makes VML look cute. There's a
rootkit, some other malware, and haxdor! (a phishing trojan horse)
Thanks to Roger Thompson at
On Wednesday 20 September 2006 16:51, Niall Smith wrote:
Hi Tonu
I saw you message posted at
http://lists.grok.org.uk/pipermail/full-disclosure/2006-May/046460.html.
Responded in private.
Tõnu
___
Full-Disclosure - We believe in it.
Charter:
Hi,
Possible uses:
-HMO's website could check if a visitor has been searching other sites about
cancer, cancer
treatments, or drug rehab centers.
-Advertising networks could gather information about which topics someone is
interested based on
their search history and use that to echance
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 1187-1[EMAIL PROTECTED]
http://www.debian.org/security/ Moritz Muehlenhoff
September 30th, 2006
YouTube Persistent Messaging XSS Vulnerability
September 30, 2006
Overview:
As I'm sure everyone knows; YouTube is the internet's leading video
destination site and one of the fastest-growing websites on the web.
It's ranked as the 10th most popular website on Alexa, far outpacing
even MySpace's
YouTube Persistent Messaging XSS Vulnerability
September 30, 2006
Overview:
As I'm sure everyone knows; YouTube is the internet's leading video
destination site and one of the fastest-growing websites on the web.
It's ranked as the 10th most popular website on Alexa, far outpacing
even MySpace's
Hi,
Please share various security related rss feeds you read daily.
Thanks,
-CF
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
--On September 30, 2006 10:21:51 PM +0530 crazy frog crazy frog
[EMAIL PROTECTED] wrote:
Hi,
Please share various security related rss feeds you read daily.
http://sunbeltblog.blogspot.com/
http://www.schneier.com/blog/
http://blogs.technet.com/antimalware/default.aspx
It was pretty easy to figure out how the exploit worked once you saw their first attempt at fixing it.--- /usr/local/cpanel/bin/mysqladmin 2006-08-29 16:54:07.0 -0500+++
httpupdate.cpanel.net/cpanelsync/EDGE/bin/mysqladmin 2006-09-23 23:51:20.0 -0500@@ -5,9 +5,14 @@# This code is
Add two more to that list
http://portal.spidynamics.com/blogs/msutton/rss.aspx
http://ha.ckers.org/blog/feed/
Paul, thanks for the new add's to me reader :)-
On 9/30/06, Paul Schmehl [EMAIL PROTECTED] wrote:
--On September 30, 2006 10:21:51 PM +0530 crazy frog crazy frog
[EMAIL PROTECTED]
Peter Dawson wrote on 09/29/06 13:10:
I had to share this wierd err
http://www.google.com/reader/next?go=noitems
There are a bunch more of these kinds of pages. The first one I encountered, ca.
1998, was on opaldata.com (now defunct):
Doesn't work in Opera (9.02) or maybe I'm doing something wrong.
Nyoro~n
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
http://portal.spidynamics.com/blogs/msutton/rss.aspx
http://ha.ckers.org/blog/feed/
http://sunbeltblog.blogspot.com/
http://www.schneier.com/blog/
http://blogs.technet.com/antimalware/default.aspx
http://www.f-secure.com/weblog/
http://taosecurity.blogspot.com/
+ Title:
~~~
Microsoft Internet Information Services UTF-7 XSS Vulnerability
[http://www.geocities.jp/ptrs_sec/advisory09e.html]
+ Date:
~~~
1 October 2006
+ Author:
~~~
Eiji James Yoshida [EMAIL PROTECTED]
+ Risk:
21 matches
Mail list logo