[Full-disclosure] [SECURITY] [DSA 1237-1] New Linux 2.4.27 packages fix several vulnerabilities

2006-12-18 Thread Dann Frazier
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 1237-1[EMAIL PROTECTED] http://www.debian.org/security/ Dann Frazier December 17th, 2006

[Full-disclosure] 0-day hackers are vista-ready

2006-12-18 Thread Crew-X Security
hai fun begins DEC-18-2006 ;) ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Who call talk about the heuristic tech of norton?

2006-12-18 Thread caojunsccd
Especially in checking office files? caojunsccd 2006-12-18 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] [OOT] Thesis for master degree

2006-12-18 Thread Valdis . Kletnieks
On Sat, 16 Dec 2006 17:55:50 GMT, Aaron Gray said: > > >- Disassembling Vista Security > > This is illegal. So not a very good idea for the thesis. This of course is *very* dependent on what country you are in. In the US, the most important law involved would probably be the DMCA, which *does* h

Re: [Full-disclosure] 0-day hackers are vista-ready

2006-12-18 Thread afed
God hates Vista! Thank god for 0-day! Vista apologists and enablers will burn in hell. GOD will smite them. On 12/17/06, Crew-X Security <[EMAIL PROTECTED]> wrote: > hai > > fun begins DEC-18-2006 > > ;) > > ___ > Full-Disclosure - We believe in it. >

[Full-disclosure] Secunia Research: MailEnable POP Service "PASS" Command Buffer Overflow

2006-12-18 Thread Secunia Research
== Secunia Research 18/12/2006 - MailEnable POP Service "PASS" Command Buffer Overflow - == Table of Contents Affected Software...

[Full-disclosure] RateMe <= all versions => ( main.inc.php ) Remote File Include Vulnerability

2006-12-18 Thread saudi arabia
++ ;;ii,,::+     ::  ;;tt;;::+

Re: [Full-disclosure] [OOT] Thesis for master degree

2006-12-18 Thread Tim
> Hello everyone, sorry for wasting your bandwidth You couldn't be any worse than than the kiddies... > I'm currently trying to find an interesting topic in computer networking > security for my master degree thesis, I've read a lot of jurnal that related > with computer networking and security.

[Full-disclosure] SQL Injection - Vulnerable Brazilian Website ( AJAX / Web 2.0 )

2006-12-18 Thread Fabio Neves Sarmento [ Gmail ]
Hello folks!! This is the website. ( SQL Injection vulnerability ) Website deloped using web 2.0 concept, very very same as Google tools http://www.misgood.com USER: ' or 1=1 -- PASS: ' or 1=1 -- get logged! now you will see the first ID in the system. Have fun. - Quik ___

[Full-disclosure] [ GLSA 200612-18 ] ClamAV: Denial of Service

2006-12-18 Thread Sune Kloppenborg Jeppesen
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200612-18 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - -

[Full-disclosure] emergent security properties

2006-12-18 Thread Nguyen Pham
Hi list, An emergent behavior or property can appear when a number of simple entities operate in an environment, forming more complex behaviors as a collective. The property itself is often unpredictable and unprecedented, and is not a property of any such single entity: it is irreducible. In re

Re: [Full-disclosure] emergent security properties

2006-12-18 Thread Tim
> In real world, we can have many examples of these properties such as the > shape of a flock of birds or shoal of fish. The problem is that I can hardly > find out some real examples in the field of network security in terms of > sub-networks, firewalls, servers, applications, etc. with their > co

Re: [Full-disclosure] SinFP OS fingerprinting online demo

2006-12-18 Thread Simon Smith
So where's the source code for this? On 12/14/06 4:17 AM, "crazy frog crazy frog" <[EMAIL PROTECTED]> wrote: > works fine for me :) > > > On 12/14/06, Simon Smith <[EMAIL PROTECTED]> wrote: >> Doesn't seem to work man ;P >> >> >> On 12/13/06 10:08 AM, "[EMAIL PROTECTED]" <[EMAIL PROTECTED]>

Re: [Full-disclosure] SinFP OS fingerprinting online demo

2006-12-18 Thread GomoR
On Mon, Dec 18, 2006 at 04:07:13PM -0500, Simon Smith wrote: > So where's the source code for this? Well, the source code is where you can find it, by just typing sinfp into Google search field: http://sourceforge.net/projects/sinfp/ Anyway, I'm sorry to not have mentionned it earlier. -- ^

[Full-disclosure] Security contact at McAfee

2006-12-18 Thread Sebastian Wolfgarten
Hi, apologies for this rather dumb question: Does anyknow know a security contact at McAfee? I was unable to find one on their website...is it as simple as [EMAIL PROTECTED] Thanks. Best regards, Sebastian Wolfgarten ___ Full-Disclosure - We believe

[Full-disclosure] Security contact at McAfee (follow-up)

2006-12-18 Thread Sebastian Wolfgarten
Hi, thanks for all the private responses I received so far. For the FD archives: The security contacts at McAfee are available at <[EMAIL PROTECTED]> and <[EMAIL PROTECTED]> respectively. Sorry for the noise and good night! Best regards, Sebastian _

Re: [Full-disclosure] Security contact at McAfee

2006-12-18 Thread xyberpix
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi Sebastian, Try these: Tracy Ross - McAfee Enterprise Security: Phone: 408-346-5965 Email: [EMAIL PROTECTED] Erica Coleman - McAfee Enterprise Security: Phone: 408-346-5624 Email: [EMAIL PROTECTED] xyberpix On 18 Dec 2006, a

[Full-disclosure] Web Backdoor Compilation

2006-12-18 Thread David Kierznowski
I have collected some WEB backdoors in the past to exploit vulnerable file upload facilities etc. and have packaged them up. I think a library like this may be useful in a variety of situations. Interested parties can find version 1 of the package here: http://michaeldaw.org/projects/web-backdoor-

[Full-disclosure] [ MDKSA-2006:232 ] - Updated proftpd packages fix mod_ctrls vulnerability

2006-12-18 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDKSA-2006:232 http://www.mandriva.com/security/ ___

[Full-disclosure] [ MDKSA-2006:233 ] - Updated dbus packages fix vulnerability

2006-12-18 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDKSA-2006:233 http://www.mandriva.com/security/ ___

[Full-disclosure] HITBSecConf2007 - Dubai - Call for Papers now open!

2006-12-18 Thread Praburaajan
The call for papers for the upcoming Hack in The Box Security Conference 2007 - Dubai is now open. HITBSecConf2007 - Dubai will take place at The Sheraton Creek hotel and will run from the 2nd till the 5th of April 2007. Keynote speakers for the conference will be Mikko Hypponen (Chief Research

Re: [Full-disclosure] Backdooring Image Files - security notice

2006-12-18 Thread HASEGAWA Yosuke
Hi. On 12/15/06, pdp (architect) <[EMAIL PROTECTED]> wrote: > I will be brief. There is a rather lame/concerning technique, most of > you know about, that allows JavaScript to be executed upon visiting an > image file. This issue is not due to some browser error, although > clearly IE has some iss