What happened to him?
--
Razi
On 4/3/08, Morning Wood [EMAIL PROTECTED] wrote:
RIP epic - http://www.hack3r.com
You will be missed, fly on bro.
___
Full-Disclosure - We believe in it.
Charter:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco Security Advisory: Cisco Unified Communications Disaster
Recovery Framework Command Execution Vulnerability
Advisory ID: cisco-sa-20080403-drf
http://www.cisco.com/warp/public/707/cisco-sa-20080403-drf.shtml
Revision 1.0
For Public Release
Digital Armaments March-April Hacking Challenge: 5,000$ Prize - Client
Vulnerabilities and Exploit
Digital Armaments Advisory is 03.15.2008
http://digitalarmaments.com/content/view/46/1/
I. Details
Digital Armaments officially announce the launch of March-April hacking
challenge.
The
Who cares? Just a two-bit 'hacker' (even lied about working at Novell etc)
pulling a RaT, doubt he's even dead. But a man can hope.
On Thu, Apr 3, 2008 at 11:28 AM, Razi Shaban [EMAIL PROTECTED] wrote:
What happened to him?
--
Razi
On 4/3/08, Morning Wood [EMAIL PROTECTED] wrote:
RIP
I heard he accidentally Dead Van Duded himself while cleaning his
shotgun LOLOLOL.
J
On Thu, 03 Apr 2008 13:36:00 -0400 I. D. [EMAIL PROTECTED] wrote:
Who cares? Just a two-bit 'hacker' (even lied about working at
Novell etc)
pulling a RaT, doubt he's even dead. But a man can hope.
On Thu,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Core Security Technologies - CoreLabs Advisory
http://www.coresecurity.com/corelabs/
Orbit Downloader Download failed buffer overflow
*Advisory Information*
Title: Orbit Downloader Download failed buffer overflow
Advisory ID:
On Thu, Apr 3, 2008 at 3:02 PM, Garrett M. Groff [EMAIL PROTECTED] wrote:
Regarding the particular person in question, I'll defer to others who know
him (or her, or they, or whomever) better than I do. Instead, I'll say that,
generally, on lists like FD, there is a minority of out-spoken
iDefense Security Advisory 04.02.08
http://labs.idefense.com/intelligence/vulnerabilities/
Apr 02, 2008
I. BACKGROUND
Borland CaliberRM is an enterprise software requirements management
system. It is part of Borland's distributed development and deployment
solution. For more information about
ZDI-08-017: Apple QuickTime Kodak Encoding Heap Overflow Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-08-017
April 3, 2008
-- CVE ID:
CVE-2008-1020
-- Affected Vendors:
Apple
-- Affected Products:
Apple Quicktime 7.4.1
-- Vulnerability Details:
This vulnerability allows
ZDI-08-019: Apple QuickTime Malformed VR obji Atom Parsing Memory
Corruption Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-08-019
April 3, 2008
-- CVE ID:
CVE-2008-1022
-- Affected Vendors:
Apple
-- Affected Products:
Apple Quicktime 7.4.1
-- TippingPoint(TM) IPS Customer
ZDI-08-016: Apple QuickTime MP4A Atom Parsing Heap Corruption
Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-08-016
April 3, 2008
-- CVE ID:
CVE-2008-1018
-- Affected Vendors:
Apple
-- Affected Products:
Apple Quicktime 7.4.1
-- TippingPoint(TM) IPS Customer Protection:
ZDI-08-014: Apple Quicktime Multiple Opcode Memory Corruption
Vulnerabilities
http://www.zerodayinitiative.com/advisories/ZDI-08-014
April 3, 2008
-- CVE ID:
CVE-2008-1019
-- Affected Vendors:
Apple
-- Affected Products:
Apple Quicktime 7.4.1
-- Vulnerability Details:
This vulnerability
ZDI-08-015: Apple QuickTime Clipping Region Heap Overflow Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-08-015
April 3, 2008
-- CVE ID:
CVE-2008-1017
-- Affected Vendors:
Apple
-- Affected Products:
Apple Quicktime 7.4.1
-- TippingPoint(TM) IPS Customer Protection:
TippingPoint
iDefense Security Advisory 04.03.08
http://labs.idefense.com/intelligence/vulnerabilities/
Apr 03, 2008
I. BACKGROUND
SCO UnixWare is a UNIX operating system that runs on many OEM platforms.
The pkgadd command is used to install packages on the system. More
information about the product is
iDefense Security Advisory 04.02.08
http://labs.idefense.com/intelligence/vulnerabilities/
Apr 02, 2008
I. BACKGROUND
Norton Internet Security 2008 is a system security suite that offers
protection from spyware, viruses, identity theft, spam, and malicious
network traffic. More information can
iDefense Security Advisory 04.02.08
http://labs.idefense.com/intelligence/vulnerabilities/
Apr 02, 2008
I. BACKGROUND
Norton Internet Security 2008 is a system security suite that offers
protection from spyware, viruses, identity theft, spam, and malicious
network traffic. More information can
I think the concerns you're raised about profiteering/marketing on the list
are valid. I hadn't thought of it from that perspective, frankly.
It can be helpful to have a central resource/calendar to be informed about
them. I would subscribe to a specific list for that.
-- Mary
-Original
netdev, I'll begin by confessing that I merely skimmed your email and did
not peruse it. Having said that, the buying and selling of vulnerabilities
is subject to the trading of anything else, be it commidities, products,
services, securities (such as stocks), or other tradeable assets.
What
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
He has no clue what it means to live in a democracy, much less a federation.
Let's let the comedy go on, shall we? Definitely breaks the monotony of
everyday BS.
Garrett M. Groff wrote:
netdev, I'll begin by confessing that I merely skimmed your
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
That is what full-disclosure was created for!?
Due to the massive influx of media attention, it has come to this.
Mary Landesman wrote:
I think the concerns you're raised about profiteering/marketing on the list
are valid. I hadn't thought of it
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
O how I love your posts. They're all over the place, and at the same
time, primitive.
I would normally filter such a troll as you, but you keep me in stitches!!
N3td3v rocks!! Just not in the way he thinks!!
n3td3v wrote:
On Thu, Apr 3, 2008 at
21 matches
Mail list logo