* Michael Ward:
but others are working
The delegation of phishtank.com has been changed to a typosquatter
around 2007-03-25 17:16:30 UTC (or perhaps earlier). The original
delegation has been restored in the meantime, but the change was
active long enough to appear in Verisign's zone file
Libero.it, one of the most important italian ISP (www.libero.it) is
affected from a XSS vulnerability.
The vulnerability can be found in the Community section of Libero
portal, and the affected functionality is add nick (
http://digiland.libero.it/profilo.phtml?nick=).
The implementation of this
Hi, i have been a victim of the Xbox live accounts being stolen.The way he
stole my account wasnt that he hacked it, but he gained my trust so i gave
him my info. He gave me his as well, but then he changed it quickly so i
coundt get in. I was just sitting around, i was talking to him on aim
Larry Seltzer wrote:
Phishtank.com resolves to 127.0.0.1, has someone taken it offline?
No, I'm still getting to the site. I don't suppose mcafee.com,
symantec.com and a lot of other security domains also resolve to
127.0.0.1 for you, do they?
I've seen phishtank.com disappear the same way
Here is my current update on the situation.
http://www.digitalmunition.com/StolenUpdate.html
-KF
On Mar 25, 2007, at 3:52 PM, David Vernaci wrote:
Hi, i have been a victim of the Xbox live accounts being stolen.The
way he
stole my account wasnt that he hacked it, but he gained my trust
Hello Full Disclosure,
John Harrison has cut off communication with me after breaking contract on
rainbowcrack-online (specifically neglecting to pay out, and to keep
financial records.) Other than that every source page there is copyrighted
me, and I've communicated my request to take down my
Hi
The famous rootkit.com website is prone to redirection looping
attacks.The domain context can be manipulated.
The full analysis with concept has been explained.You can look
at the desired issue.
http://zeroknock.blogspot.com/2007/03/rootlitcom-prone-to-redirection-and.html
I live in Canada, this guy is in the UK.
Thanks for the advice guys, I'll probably follow up with a DMCA takedown on
lunarpages.
On 3/26/07, wilder_jeff Wilder [EMAIL PROTECTED] wrote:
Where do you live?
-Jeff Wilder
CISSP,CCE,C/EH
-BEGIN GEEK CODE BLOCK-
Version: 3.1
Here is my current update on the situation.
http://www.digitalmunition.com/StolenUpdate.html
It would seem to me that MS / Bungie could simply cross reference
the pretexed accounts to the IP address logged in from, following the
reporting
of a compromised account. If it is a rather small
===
Ubuntu Security Notice USN-441-1 March 26, 2007
squid vulnerability
CVE-2007-1560
===
A security issue affects the following Ubuntu releases:
Ubuntu 6.10
This
===
Ubuntu Security Notice USN-442-1 March 26, 2007
evolution vulnerability
CVE-2007-1002
===
A security issue affects the following Ubuntu releases:
Ubuntu 6.06 LTS
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200703-24
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - -
On Mon, 2007-03-26 at 10:41 -0400, T Biehn wrote:
Hello Full Disclosure,
John Harrison has cut off communication with me after breaking
lot of cry removed.
Regards,
Travis Biehn
Where is disclosure? Courts are for this matter.
Is this a bar brawl!
On 3/26/07, Tõnu Samuel [EMAIL PROTECTED] wrote:
On Mon, 2007-03-26 at 10:41 -0400, T Biehn wrote:
Hello Full Disclosure,
John Harrison has cut off communication with me after breaking
lot of cry removed.
Regards,
Travis Biehn
Where is disclosure? Courts are for
Title: SignKorea's ActiveX Buffer Overflow Vulnerability
Version: SKCommAX ActiveX Control Module 7,2,0,2
SKCommAX ActiveX Control Module(3280) 6,6,0,1
Discoverer: PARK, GYU TAE ([EMAIL PROTECTED])
Advisory No.: NRVA07-01
Critical: High critical
Impact: Gain remote user's privilege
March 27th, 2007 -- Metasploit is pleased to announce the immediate,
free availability of the Metasploit Framework version 3.0 from
http://framework.metasploit.com/.
The Metasploit Framework (Metasploit) is a development platform for
creating security tools and exploits. Version 3.0 contains 177
16 matches
Mail list logo