[Full-disclosure] [SECURITY] [DSA 1383-1] New gforge packages fix cross-site scripting

2007-10-05 Thread Thijs Kinkhorst
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 1383-1[EMAIL PROTECTED] http://www.debian.org/security/Thijs Kinkhorst October 4th, 2007

Re: [Full-disclosure] iDefense Security Advisory 10.02.07: Sun Microsystems Solaris FIFO FS Information Disclosure Vulnerability

2007-10-05 Thread Joey Mengele
Dear Amateur Security Studier PAPAPAPAPAPAPA, The context in which the term memory leak is used should clue you in here. When used in this content, 'leaked' clearly means the contents are exposed to userspace. It clearly does not mean memory is allocated and then not freed. By the way, your pos

Re: [Full-disclosure] password hash

2007-10-05 Thread Valdis . Kletnieks
On Thu, 04 Oct 2007 22:22:14 EDT, Brian Toovey said: > Does anyone know what kind of password hash this is? > 'password1' = > &c6;Ub&c3;&ab;&19;a&cf;&86; Hex format would be less likely to be mis-parsed. I'm *guessing* you mean the hash is x'c65562c3 ab1961cf 86' - which is slightly odd, being 72

Re: [Full-disclosure] password hash

2007-10-05 Thread Mark Senior
If you can repeatedly re-hash the same password, that should reveal whether there's a salt involved or not - if it's salted, the algorithm should be picking a new salt every time the hash is generated, and the hash will be different every time for the same password. On 10/5/07, Valdis.Kletnieks wr

Re: [Full-disclosure] password hash

2007-10-05 Thread full-disclosure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Wow Vladis shut the fuck up On Fri, 05 Oct 2007 10:35:36 -0400 [EMAIL PROTECTED] wrote: >On Thu, 04 Oct 2007 22:22:14 EDT, Brian Toovey said: >> Does anyone know what kind of password hash this is? >> 'password1' = >> &c6;Ub&c3;&ab;&19;a&cf;&86; > >He

[Full-disclosure] Core Impact 7.5 Web App pen-testing framework, as good as the hype?

2007-10-05 Thread Kristian Erik Hermansen
Has anyone upgraded to Core Impact 7.5 and utilized the web application pen-testing framework? And if so, do you have any thoughts on it? Good? Bad? Evil? Not worth the hype? Etc? Any other vendors do it better? Have any issues with large sites? What makes it so special? Any input is appr

Re: [Full-disclosure] Core Impact 7.5 Web App pen-testing framework, as good as the hype?

2007-10-05 Thread M . B . Jr .
by the way, you perform pentesting with non-transparent-code... ... legally talking, how the hell those professionals assure 100% trustable results? get outta here... On 10/5/07, Kristian Erik Hermansen <[EMAIL PROTECTED]> wrote: > Has anyone upgraded to Core Impact 7.5 and utilized the web > ap

[Full-disclosure] Format string in The Dawn of Time 1.69s beta4

2007-10-05 Thread Luigi Auriemma
### Luigi Auriemma Application: The Dawn of Time http://www.dawnoftime.org Versions: <= 1.69s beta4 (and 1.69r too) Platforms:*nix and Windows Bug: format string in we

[Full-disclosure] Multiple vulnerabilities in Dropteam 1.3.3

2007-10-05 Thread Luigi Auriemma
### Luigi Auriemma Application: Dropteam http://www.battlefront.com/products/dropteam/news.html Versions: <= 1.3.3 Platforms:Windows, Linux and Mac Bugs: A] format stri

[Full-disclosure] rPSA-2007-0209-1 elinks

2007-10-05 Thread rPath Update Announcements
rPath Security Advisory: 2007-0209-1 Published: 2007-10-05 Products: rPath Linux 1 Rating: Minor Exposure Level Classification: Indirect User Deterministic Information Exposure Updated Versions: elinks=/[EMAIL PROTECTED]:devel//1/0.10.5-3.4-1 rPath Issue Tracking System: https://issues

Re: [Full-disclosure] Core Impact 7.5 Web App pen-testing framework, as good as the hype?

2007-10-05 Thread full-disclosure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 why don't you shut up about computers and security products and try medical research to save your retarded fat friend's life or go attend your brother's funeral or something you faggot On Fri, 05 Oct 2007 14:00:53 -0400 Kristian Erik Hermansen <[EMAIL

Re: [Full-disclosure] Core Impact 7.5 Web App pen-testing framework, as good as the hype?

2007-10-05 Thread full-disclosure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 dunno dude you're the one who types all the asinine shit all the time in such smug fashions... and what picture did you forget the attachment or something? On Fri, 05 Oct 2007 15:29:53 -0400 [EMAIL PROTECTED] wrote: >On Fri, 05 Oct 2007 15:17:02 EDT,

[Full-disclosure] [SECURITY] [DSA 1384-1] New xen-utils packages fix several vulnerabilities

2007-10-05 Thread Steve Kemp
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA 1384-1 [EMAIL PROTECTED] http://www.debian.org/security/ Steve Kemp October 5th, 2007

Re: [Full-disclosure] Core Impact 7.5 Web App pen-testing framework, as good as the hype?

2007-10-05 Thread Valdis . Kletnieks
On Fri, 05 Oct 2007 15:17:02 EDT, [EMAIL PROTECTED] said: > why don't you shut up about computers and security products What's wrong with this picture? pgpOuO3sVKDNn.pgp Description: PGP signature ___ Full-Disclosure - We believe in it. Charter: http:

[Full-disclosure] DidTheyReadit - Results

2007-10-05 Thread Thierry Zoller
Dear All, If somebody likes to do an "analysis" on the data please go ahead, there is not too much spectacular things showing up and I currently have not really the time to make some stats/graphs or stuff. Opened 236 times by 202 readers Here are the things I came across when the hits came in :

Re: [Full-disclosure] Java Applets can connect to other hosts using HTTP 302 redirection

2007-10-05 Thread Kanatoko
Hi Angel Alonso wrote: > The problem could be in the java ( i think java has been updaterecently to > solve some similar problem), That is right. I found that this issue was fixed in the jre1.6.0_03 ( as a side affect, maybe ). >could you send me the "foo.jar >" code to try find out anything