0dayDealer 0dayDealer wrote:
> Hi List,
>Full functional 0day exploit builder for sale!
>
>This is the one you want. Contact me with the mailbox
> A0dayDealer###hotmail.com.
> Here is some of the exploits: 0day word2003 all languages universal
How can you have a 0-day on a program that's
Ben Bucksch wrote:
> SirDarckCat wrote:
>> JaSiLDBG
>> JavaScript inLine Debugger
>
> Are you selling us the "javascript:" URL as "JaSiLDBG JavaScript inLine
> Debugger"? From all I can tell from your doc, you simply renamed
> "javascript:" to "JaSiLDBG".
Yes, I decided to overlook that. Nothi
On 2/4/07, James Matthews <[EMAIL PROTECTED]> wrote:
> Is it that bad??
the copy paste issue, probably not. the drag and drop, possibly!
remember CVE-2005-0053?
the core issue, i suppose, is that VMWare is sacrificing good security
and isolation for the sake of convenience and opening up holes i
But naturally it happens all the time! That's what i love about computer
security when ever you try to tell someone to do something normal and smart
they do the polar opposite =)
On 2/4/07, Q-Ball <[EMAIL PROTECTED]> wrote:
On 2/2/07, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:
> On Fri, 02 Fe
Is it that bad??
On 2/4/07, coderman <[EMAIL PROTECTED]> wrote:
On 2/3/07, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:
> ...
> Type of Risk: isolation failure, information leakage, infection path
latest VMWare Player [1.0.2 or above] also affected. damn, was hoping
to use this for redistribu
On 2/2/07, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:
> On Fri, 02 Feb 2007 13:40:47 +0530, Raj Mathur said:
> > I believe we have had this discussion before, but I'll iterate my
> > beliefs in favour of allowing direct root access again:
>
> > - Key-based root logins are quite secure. I don't s
Key-based logon is a bad idea in general because afaik, it's not
possible to implement any type of password policy on those keys. This
therefore potentially allows someone with access to those keys, access
to further accounts or resources on remote systems.
The exception to this where the task requ
Lets see um!
On 2/4/07, 0dayDealer 0dayDealer <[EMAIL PROTECTED]> wrote:
Hi List,
Full functional 0day exploit builder for sale!
This is the one you want. Contact me with the mailbox
A0dayDealer###hotmail.com.
Here is some of the exploits: 0day word2003 all languages universal / 0day
wor
On 2/3/07, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:
> ...
> Type of Risk: isolation failure, information leakage, infection path
latest VMWare Player [1.0.2 or above] also affected. damn, was hoping
to use this for redistribution leverage. oh well... :)
you can also try the following in your
Hi List,
Full functional 0day exploit builder for sale!
This is the one you want. Contact me with the mailbox
A0dayDealer###hotmail.com.
Here is some of the exploits: 0day word2003 all languages universal / 0day
word xp/2003 / winrar exploit / pdf exploit etc. When contacting there are
s
Michal Zalewski wrote:
> On Sat, 3 Feb 2007, Michal Zalewski wrote:
>
>
>> xmlhttp.open("GET\thttp://dione.ids.pl/\tHTTP/1.0\n\n";, "x",true);
>>
>
> Funny enough, Paul Szabo was quick to point out that Amit Klein found the
> same vector that I used here for client-side backdoors in May 2
rPath Security Advisory: 2007-0023-1
Published: 2007-02-03
Products: rPath Linux 1
Rating: Major
Exposure Level Classification:
Remote User Deterministic Denial of Service
Updated Versions:
wireshark=/[EMAIL PROTECTED]:devel//1/0.99.5-0.1-1
tshark=/[EMAIL PROTECTED]:devel//1/0.99.5-0.1-
Suggested severity level: Low
Type of Risk: isolation failure, information leakage, infection path
Affected Software: VMware Workstation, version 5.5.3 build 34685 (including
installation of "VMware tools" of the same version on the guest OS).
(Other products by the vendor using the same isol
what are you babbling on about?
On 1/30/07, Jianqiang Xin <[EMAIL PROTECTED]> wrote:
Did anyone see web attack like this? If yes, is the attack generated by
worm, spamware, or virus? Thanks.
It is one packet with too many headers: The headers are as following:
Headers
Host : www.microsoft.c
14 matches
Mail list logo