Here's a (VERY BAD) translation of the bold text in the website:
Italian:
Devo doverosamente ringraziare The Wanderer al quale ho rotto i
cosiddetti per le traduzioni e che ora vede reso inutile il proprio
lavoro. Mi spiace e cercherò di farmi perdonare ma, che diavolo,
talvolta bisogna essere
I'll take a stab at it...
"This bug speaks for itself and I don't have much to add, except that,
given the number of criticisms levied at my English, which as I
pointed out and emphasized before, is less than scholarly (and I
assure you that I would have taken criticisms against the bugs much
bett
>>http://moaxb.blogspot.com/
Why is this site in Italian now?
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
> Asterisk Project Security Advisory - ASA-2007-013
>
>
> +--+
>| Product| Asterisk
> |
>
> |--+--
Topic: Multiple vendors ZOO file decompression infinite
loop DoS
Announced: 2007-05-04
Credits:Jean-Sebastien Guay-Leroux
Products: Multiple (see section III)
Impact: DoS (99% CPU utilisation)
CVE
Maybe if we issued one every minute we could keep the time frame
reasonable
Larry Seltzer
eWEEK.com Security Center Editor
http://security.eweek.com/
http://blogs.eweek.com/cheap_hack/
Contributing Editor, PC Magazine
[EMAIL PROTECTED]
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[
I don't know...that seems like such a conservative time frame. Given
everything I see coming through on SecurityFocus, I'd say it's more like
"50 millenia of PHP Remote File Includes." ;-)
Alex Kirk
> How about "50 years of PHP Remote File Includes"? :)
>
> Shirkdog
> ' or 1=1--
> http://www.shi
How about "50 years of PHP Remote File Includes"? :)
Shirkdog
' or 1=1--
http://www.shirkdog.us
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED] (Felix von Leitner)
CC: full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] Month of ActiveX Bug
Date: Thu, 3 May 2007 20:08:57 -0400 (E
> Why don't you do a month of eweek bugs. We won't limit you at all. Any
> bug counts. Even XSS bugs in open source perl webmail apps. Anything?
If you want xss, then I think we're talking more about the decade of xss than
month :)
- Robert
http://www.cgisecurity.com/
__
On Thursday 03 May 2007 23:19:55 3APA3A wrote:
> Not exactly, read first link carefully:
>
> Tested on D-Link DSL-G624T
> Version: Firmware Version : V3.00B01T01.YA-C.20060616
>
> Discovered by:
>
> Jose Ramon Palanco: jose.palanco(at)eazel(dot).es
Fair enough I stand corrected but it's been ther
On Thursday 03 May 2007 22:13:15 3APA3A wrote:
> This vulnerability for D-Link DSL-G624T was already reported by Jose
> Ramon Palanco. See
>
> http://securityvulns.ru/Odocument816.html
>
> Previously, same problem was reported for D-Link DSL-G604T by Qex
>
> http://securityvulns.ru/Mdocument57
rPath Security Advisory: 2007-0090-1
Published: 2007-05-03
Products: rPath Linux 1
Rating: Minor
Exposure Level Classification:
Indirect User Deterministic Unauthorized Access
Updated Versions:
gimp=/[EMAIL PROTECTED]:devel//1/2.2.8-8.3-1
References:
http://cve.mitre.org/cgi-bin/cvenam
rPath Security Advisory: 2007-0089-1
Published: 2007-05-03
Products: rPath Linux 1
Rating: Major
Exposure Level Classification:
Remote Deterministic Denial of Service
Updated Versions:
net-snmp=/[EMAIL PROTECTED]:devel//1/5.2.1.2-4.3-1
net-snmp-utils=/[EMAIL PROTECTED]:devel//1/5.2.1.2-
rPath Security Advisory: 2007-0088-1
Published: 2007-05-03
Products: rPath Linux 1
Rating: Major
Exposure Level Classification:
Local User Deterministic Weakness
Updated Versions:
xscreensaver=/[EMAIL PROTECTED]:devel//1/4.22-1.2-1
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?n
rPath Security Advisory: 2007-0085-1
Published: 2007-05-03
Products: rPath Linux 1
Rating: Informational
Exposure Level Classification:
Indirect User Non-deterministic Unauthorized Access
Updated Versions:
lftp=/[EMAIL PROTECTED]:devel//1/3.5.10-0.1-1
References:
http://cve.mitre.org/c
15 matches
Mail list logo