-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2008:164
http://www.mandriva.com/security/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2008:163
http://www.mandriva.com/security/
Use Immunity Debugger and look at the ads section
On Thu, Aug 7, 2008 at 1:22 PM, Dennis Yurichev <[EMAIL PROTECTED]> wrote:
> Hello,
>
> I'm sorry, I wrote my question incorrectly.
>
> I meant, who among software companies would like to know about
> vulnerabilities in their own products and *als
It;s the new facebook friend adder
On Wed, Aug 6, 2008 at 3:11 PM, <[EMAIL PROTECTED]> wrote:
> Not just Rouge apps, it's much more widespread: other colors such
> as magenta, mauve, fuschia, and even the extremes of pink and
> purple can also be impacted.
>
> On Wed, Aug 6, 2008 at 2:56 PM, John
Sure there are many sell it to Macfee :)
On Thu, Aug 7, 2008 at 8:56 AM, <[EMAIL PROTECTED]> wrote:
> On Thu, 07 Aug 2008 17:14:14 +0300, Dennis Yurichev said:
>
> > Are there any well-known vendors who would like to buy 0day exploits
> > for their own products?
>
> Yes, there are. Next ques
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2008:162
http://www.mandriva.com/security/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2008:161
http://www.mandriva.com/security/
Hello,
I'm sorry, I wrote my question incorrectly.
I meant, who among software companies would like to know about
vulnerabilities in their own products and *also* would like to pay
for this?
It's possible to work with them as independent security researcher?
--
My PGP public key: http://yurich
On Thu, 07 Aug 2008 17:14:14 +0300, Dennis Yurichev said:
> Are there any well-known vendors who would like to buy 0day exploits
> for their own products?
Yes, there are. Next question?
pgper4x7wU2j2.pgp
Description: PGP signature
___
Full-Disclo
As you will all know I am one never to post, but I had to bring this to a
discussion point.
I received an e-mail today from the Gallup Journal inviting me to join their
LEET management spam list.
Within this inventation, they had provided me with my username (Ahhh how nice)
and my password (
Hello,
Are there any well-known vendors who would like to buy 0day exploits
for their own products?
--
My PGP public key: http://yurichev.com/dennis.yurichev.asc
pgptYdK7aju9F.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
On Thu, 7 Aug 2008, Juha-Matti Laurio wrote:
> It has the following mechanism according to McAfee:
> http://vil.nai.com/vil/content/v_148955.htm
>
> They use name W32/Koobface.worm and Kaspersky (Kaspersky Labs originally
> discovered this threat) uses name Net-Worm.Win32.Koobface.b.
This is goin
Hi all.
There's a facebook (possibly worm) something malicious sending fake
messages from real users (friends).
The sample also has a remote drop site (verified by someone who shall
remain nameless).
This is possibly zlob, not verified. Thanks Nick Bilogorskiy for his help.
Infection sites se
I am constantly updating on this on my twitter account to avoid
list clutter:
http://twitter.com/gadievron
You can watch the infection live on a web counter from the hosting
provider that the worm points to. This thing is fast-spreading.
Gadi.
On Wed, 6 Aug 2008, Gadi Evron wrote:
>
Not just Rouge apps, it's much more widespread: other colors such
as magenta, mauve, fuschia, and even the extremes of pink and
purple can also be impacted.
On Wed, Aug 6, 2008 at 2:56 PM, John C. A. Bambenek, GCIH, CISSP
<[EMAIL PROTECTED]> wrote:
What's the infection vector? URL Link?
http://www.kaspersky.com/news?id=20757567
7 days of seeding to impact.
Gadi.
On Wed, 6 Aug 2008, Gadi Evron wrote:
> Hi all.
>
> There's a facebook (possibly worm) something malicious sending fake
> messages from real users (friends).
>
> The sample also has a remote drop site (verified
File link
http://web292.webbox443.server-home.org/install.exe
77 kb - packed install.exe
analysis link
http://www.virustotal.com/analisis/4ebbd8e0045798cee6e505f79fe88671
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disc
Rapid7 Advisory R7-0033
Apache HTTP Server mod_proxy_ftp Wildcard Characters Cross-Site Scripting
Discovered: July 25, 2008
Published: August 5, 2008
Revision: 1.1
http://www.rapid7.com/advisories/R7-0033
CVE: CVE-2008-2939
1. Affected system(s):
KNOWN VULNERABLE:
o Apac
Newly emerging techniques of DNS cache poisoning have caused quite a
stir recently, prompting security researchers to speculate on the nature
of the issue, and naturally inducing press stunts by some individuals,
including "accidential" information leaks and hasty exploit releases.
Many other, more
19 matches
Mail list logo