Re: [Full-disclosure] PWDumpX v1.4

2008-01-08 Thread Markus Jansson
How about a nice GUI? Or atleast some kind of GUI? I dont know what OS are you using, but I stopped using MS-DOS about 15 years ago. Im sure there are folks out there who just lve command line crap, mostly Linux users I suppose, they obiously are still missing what even Windows 3.11 had. But

Re: [Full-disclosure] PWDumpX v1.4

2008-01-08 Thread Tonnerre Lombard
Salut, On Tue, 8 Jan 2008 04:21:33 +0200 Markus Jansson [EMAIL PROTECTED] wrote: How about a nice GUI? Or atleast some kind of GUI? I dont know what OS are you using, but I stopped using MS-DOS about 15 years ago. Im sure there are folks out there who just lve command line crap, mostly

Re: [Full-disclosure] PWDumpX v1.4

2008-01-08 Thread reepex
he is a 'point and click' hacker .. do not confuse him On Jan 8, 2008 3:00 AM, Tonnerre Lombard [EMAIL PROTECTED] wrote: Salut, On Tue, 8 Jan 2008 04:21:33 +0200 Markus Jansson [EMAIL PROTECTED] wrote: How about a nice GUI? Or atleast some kind of GUI? I dont know what OS are you

Re: [Full-disclosure] PWDumpX v1.4

2008-01-08 Thread North, Quinn
CLI 4 LIFE!!1!1 --=Q=--   -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of offset Sent: Tuesday, January 08, 2008 11:00 AM To: full-disclosure@lists.grok.org.uk Subject: Re: [Full-disclosure] PWDumpX v1.4 On Tue, Jan 08, 2008 at 04:21:33AM +0200, Markus

[Full-disclosure] [SECURITY] [DSA 1455-1] New libarchive1 packages fix several problems

2008-01-08 Thread Steve Kemp
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-1455-1 [EMAIL PROTECTED] http://www.debian.org/security/ Steve Kemp January 08, 2008

[Full-disclosure] ERRATA: [ GLSA 200709-07 ] Eggdrop: Buffer overflow

2008-01-08 Thread Robert Buchholz
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory [ERRATA UPDATE]        GLSA 200709-07:02 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -                                             http://security.gentoo.org/ - - - - -

[Full-disclosure] [ GLSA 200801-01 ] unp: Arbitrary command execution

2008-01-08 Thread Robert Buchholz
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200801-01 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - -

[Full-disclosure] Gateway WebLaunch ActiveX Control Insecure Method

2008-01-08 Thread elazar
The DoWebLaunch() method of the Gateway WebLauncher ActiveX control allows for the execution or arbitrary application on a system, additionally this method is vulnerable to a buffer overflow in the 2nd and 4th parameters. Both weblaunch.ocx and weblaunch2.ocx allow the execution of arbitrary

Re: [Full-disclosure] PWDumpX v1.4

2008-01-08 Thread Mario D
Seriously? Windows/X11 are like training wheels - you only use them until you are big enough to get along with them. Not trying to be elitist, but if you aren't comfortable with a CLI then maybe you should be in a different field. - phunt --- Markus Jansson [EMAIL PROTECTED] wrote: How

Re: [Full-disclosure] PWDumpX v1.4

2008-01-08 Thread Valdis . Kletnieks
On Tue, 08 Jan 2008 18:40:48 PST, Mario D said: Seriously? Windows/X11 are like training wheels - you only use them until you are big enough to get along with them. Not trying to be elitist, but if you aren't comfortable with a CLI then maybe you should be in a different field. Amen,

Re: [Full-disclosure] scada/plc gear

2008-01-08 Thread b9u4ea
Looks like a fantastic and robust little tool :) That is certainly some rather odd behaviour... The fact that the other ports remained makes it likely an application (modbus) problem. Was it an ethernet to rs232 converter? (I obviously didn't look up the part number). Did you happen to

[Full-disclosure] [USN-562-1] opal vulnerability

2008-01-08 Thread Kees Cook
=== Ubuntu Security Notice USN-562-1 January 08, 2008 opal vulnerability CVE-2007-4924 === A security issue affects the following Ubuntu releases: Ubuntu 6.06 LTS Ubuntu

[Full-disclosure] [USN-563-1] CUPS vulnerabilities

2008-01-08 Thread Kees Cook
=== Ubuntu Security Notice USN-563-1 January 09, 2008 cupsys vulnerabilities CVE-2007-5849, CVE-2007-6358 === A security issue affects the following Ubuntu releases: Ubuntu

[Full-disclosure] [USN-561-1] pwlib vulnerability

2008-01-08 Thread Kees Cook
=== Ubuntu Security Notice USN-561-1 January 08, 2008 pwlib vulnerability CVE-2007-4897 === A security issue affects the following Ubuntu releases: Ubuntu 6.06 LTS Ubuntu

[Full-disclosure] [ MDVSA-2008:003 ] - Updated clamav packages fix multiple vulnerabilities

2008-01-08 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2008:003 http://www.mandriva.com/security/

[Full-disclosure] [ MDVSA-2008:004 ] - Updated postgresql packages fix denial of service and privilege escalation issues

2008-01-08 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2008:004 http://www.mandriva.com/security/

Re: [Full-disclosure] PWDumpX v1.4

2008-01-08 Thread Tonnerre Lombard
Salut, On Tue, 8 Jan 2008 03:30:13 -0600 reepex [EMAIL PROTECTED] wrote: he is a 'point and click' hacker .. do not confuse him Oh, oh, I'm sorry, I keep forgetting that Point'n'Hack interfaces are the future. Tonnerre -- SyGroup GmbH Tonnerre Lombard