===
Ubuntu Security Notice USN-512-1 September 15, 2007
quagga vulnerability
CVE-2007-4826
===
A security issue affects the following Ubuntu releases:
Ubuntu 6.06 LTS
Ubuntu 6.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
scott wrote:
> This site seems to have a lot of registered users.But I only see
> posts by this one guy.Really stealing news from other sites and
> posting them there.
>
> Let's call this guy out.He claims to be an MCSE privately,but I
> seriously doub
The U.S and China have been at cyber war for a long time. All you
need to do is look at your logs and see how much junk originates from 221/8
which is Beijing. 202/8 shows the same lame attempts to brute force home
routers, access points and the like. I see it on a daily basis where I work
Great overview, Todd!
I've just wanted to mention that MS downplayed the vulnerabilities I've
found in Vista's Sidebar gadgets.
In my blog post
(http://aviv.raffon.net/2007/08/16/VistaGadgetsGoneWild.aspx), I've
demonstrated a scenario where a worm can be propagated by exploiting the
vulnerability
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200709-06
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200709-05
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -
lostzero wrote:
> You're looking at it from the wrong view. The 20 terabytes didn't happen
> overnight. Without a starting time frame you have no idea how many "years"
> it has been happening. Not to mention they have workstations and servers
> all over the world. Which means no 1 agency or ind
In a startling development, "hackthegov" otherwise known as "n3td3v" to the
security community has perhaps managed to pull off some political point
scoring between Symantec's Securityfocus editorial staff and the United
States government.
"hackthegov" on an unmoderated information security mailing
On 9/11/07, Michael Myers <[EMAIL PROTECTED]> wrote:
> Pwnpress is available at:
> http://www.info-pull.com/code/pwnpress.rb
Directory listing protection really impressive.
So... effective. (^-^)
--
Guasconi Vincent
Student.
___
Full-Disclosure - We b
wgaht someone actually coding something useful and cute EH KF? EH? nigger.
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
> You're suffering from a logical falicy, I worked in that arena (albeit
> it a different agency) in incident response for quite some time
Nice to know. I hope my government can either install ispell or send
some of you guys to Clueful University.
> of workstations and servers on a regular basis
You're looking at it from the wrong view. The 20 terabytes didn't happen
overnight. Without a starting time frame you have no idea how many "years"
it has been happening. Not to mention they have workstations and servers
all over the world. Which means no 1 agency or individual looks at all the
On Fri, 14 Sep 2007 01:41:40 -, jf said:
> You're suffering from a logical falicy, I worked in that arena (albeit it
> a different agency) in incident response for quite some time, while I find
> the number somewhat high, it's not unreasonable, if you broke into $lots
> of workstations and ser
:. GOODFELLAS Security Research TEAM .:
:. http://goodfellas.shellcode.com.ar .:
FileFind class from MFC Library cause heap overflow.
===
Internal ID: VULWKU200706142
introduction
The GOODFELLAS security research team has found a bug
:. GOODFELLAS Security Research TEAM .:
:. http://goodfellas.shellcode.com.ar .:
ActiveX hpqutil!ListFiles hpqutil.dll - Remote heap overflow.
=
Internal ID: VULWAR200706041
introduction
GOODFELLAS security research team h
Our secrets were stolen by China. I was on one of the network teams that
had to prove it. The NSA was also looking to put together a team to hack
them back, but I was gone before they actually got it put together.
___
Full-Disclosure - We believe in it.
rPath Security Advisory: 2007-0182-1
Published: 2007-09-14
Products: rPath Linux 1
Rating: Severe
Exposure Level Classification:
Remote System User Deterministic Denial of Service
Updated Versions:
httpd=/[EMAIL PROTECTED]:devel//1-devel/2.0.61-0.1-1
mod_ssl=/[EMAIL PROTECTED]:devel//1-
rPath Security Advisory: 2007-0183-1
Published: 2007-09-14
Products: rPath Linux 1
Rating: Severe
Exposure Level Classification:
Remote System User Deterministic Unauthorized Access
Updated Versions:
lighttpd=/[EMAIL PROTECTED]:devel//1/1.4.18-0.1-1
References:
http://cve.mitre.org/cgi
On 9/14/07, Richard Cranium <[EMAIL PROTECTED]> wrote:
>
> You know... the earth tilts...
>
> Richard Cranium
>
Ya right! If the earth tilted, everything would slide off the table...
pinball machines would complain incessantly, levels would be useless, and on
and on.
you lose!
try again.
___
Full disclosure: all the fun of irc with the lag of smtp.
Geoff
Sent from my BlackBerry wireless handheld.
-Original Message-
From: "Richard Golodner" <[EMAIL PROTECTED]>
Date: Thu, 13 Sep 2007 12:55:22
To:
Subject: Re: [Full-disclosure] Another 0day to sell.
Full Disclos
Man, try another way to get money. Right? Nobody here will pay you to
your fake things. Looser!
2007/9/14, Juergen Marester <[EMAIL PROTECTED]>:
> Haha, sure video is fake i took it from Internet, I guess you are clever !!
>
> You want me i give you my exploit without any proof you will pay me
> (
> Securityfocus caved into pressure by "hackthegov" better known in the
The whole "we been attacked" thing is just a ploy so the government (take
your pick) to justify their never ending desire to exercise more control
over the internet. China was last because well.. they don't need an excuse.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 14-Sep-07, at 2:01 AM, Richard Cranium wrote:
>
> You know... the earth tilts...
>
> Richard Cranium
>
Pfft. Everyone knows it's flat. You've been playing with too much
octarine!
- ---
Tremaine Lea
Network Security Consultant
Intrepid ACL
"P
On 9/13/07, Paul Schmehl <[EMAIL PROTECTED]> wrote:
> --On September 14, 2007 10:07:20 AM +1200 Nick FitzGerald
> <[EMAIL PROTECTED]> wrote:
>
> > [EMAIL PROTECTED] wrote:
> >
> >> > "posted on 11-9-2007 @ 01:09 PM".
> >>
> >> European style, day-month-year.
> >
> > Since when did "European" mean "
Haha, sure video is fake i took it from Internet, I guess you are clever !!
You want me i give you my exploit without any proof you will pay me
(brazilian have a good notority about that !) and moreover you want buy
some remote code execution on IE for 500$ :)
Are you surprised ?
Have a nic
Haha, sure video is fake !
You want my IE code without paying anything, and also you propose 500$ for a
remote code on IE :)
For sure I gave you a fuqin video i found on the Web.
Oh damn, are you surprised ?
Juergen
___
Full-Disclosure - We believe i
26 matches
Mail list logo