http://www.dailytech.com/Google+Offers+Text+Ads+Linked+to+Malware+Site/article13436.htm
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
http://www.heise.de/english/newsticker/news/113353
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
A quick test of OWA 2007 shows that it is not vulnerable...
On Sat, 15 Nov 2008 11:36:26 -0500 Micheal Cottingham
<[EMAIL PROTECTED]> wrote:
>I found and reported this back in 2005/2006. Microsoft told me
>that it
>had been reported previously and tha
On Fri, Nov 14, 2008 at 09:37:46PM +0100, Andres Tarasco wrote:
> I have published a new proof of concept tool, named "Smbrelay3", that is
> able to replay NTLM authentication from several protocols like
> SMB/HTTP/IMAP/..
> http://www.tarasco.org/security/smbrelay/index.html
Great little tool fro
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
What the fuck are you talking about now, n3td3v? There is no
mention of a vulnerability. There is no evolving situation.
Please keep your technically misunderstood blogging to your own
internet site and off of our lists. You probably don't even know
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
What the fuck are you talking about now, n3td3v? There is no
mention of a vulnerability. There is no evolving situation.
Please keep your technically misunderstood blogging to your own
internet site and off of our lists. You probably don't even know
I found and reported this back in 2005/2006. Microsoft told me that it
had been reported previously and that it would be fixed in the next
release, which I'm guessing they meant 2007. I do not know if they
have fixed it in Exchange 2007.
On Sat, Nov 15, 2008 at 5:33 AM, Piergiorgio Venuti
<[EMAIL
Hi all,
also I've found this vulnerability 1 year ago during a pt and work fine
with url obfuscation. I've read that with owa 2007 this vulnerability is
patched but I don't have tried yet.
Best regards,
Piergiorgio
Giuseppe Gottardi ha scritto:
> Davide, let me comfort you...
>
> I found this
Subject:Dynamic Port Scanner [DPS] v1.5 tool release
Homepage: http://www.securebits.org/dps.html
Download: http://www.securebits.org/projects/dps-v1.5.tar.gz
=
Dynamic Port Scanner - A Reliable Spoofed Source
This is and was the situation when writing the entry.
More information and information about the possibly previously unknown
vulnerability related to the Trojan is not available.
Now Symantec analysis says that
-Trojan creates the file /tmp/com.apple.DockSettings
-inserts its contents into ~/Libr
10 matches
Mail list logo