product: AssetsSoSimple
version tested: 0.33
vendor URL: http://assetssosimple.sourceforge.net/
script: supplier_admin.php
field: Supplier
ooo
BugsNotHugs
Shared Vulnerability Disclosure Account
___
Full-Disclosure - We believe in it.
Charter:
vendor: interactivetools.com, inc.,
http://www.interactivetools.com/products/automanager/
product: Auto Manager
version: 2.52
script: admin.cgi
fields: Vehicle, Year, Price, Drive Train, Transmission, Body, Engine,
Description, Color, Miles
***
BugsNotHugs
Shared Vulnerability Disclosure Account
2009/11/19 kaibelf j...@mac.hush.com
List,
It has come to my attention that my client is being impersonated.
Your false statements doesn't revert the truth. He was trolling. The rest is
not of interest.
___
Full-Disclosure - We believe in it.
Hello There,
This is Grace Wu from Foxit Corporation. We had noticed the Foxit Reader
vulnerability posted at http://seclists.org/fulldisclosure/2009/Oct/198. By
working with Alin from Secunia.com, Foxit development team has fixed this crash
issue and provided the below solution today.
On Thu, 19 Nov 2009 00:20:54 GMT, kaibelf said:
n3td3v began to think he was being followed in real life such was
the psychological impact of a good guy being talked about as a bad
guy by Securityfocus.
Doood. *Take* *Your* *Meds*.
Seriously. Get professional help.
If you're a male in
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
snip
With all due respect, can we please not encourage:
kaibelf, Mr Appelbaum, GOBBLES, Jack Bauer, Gary McKinnon etc., etc.
regards mrx
- --
I am not an expert, I have much to learn, I make mistakes.
My words are just opinions which may or may
STOP THAT BULLSHIT!
It's not funny anymore.
kaibelf escreveu:
List,
It has come to my attention that my client is being impersonated.
Securityfocus slandered n3td3v in 2006 causing him to drop out of
university.
n3td3v hasn't been the same health wise since he was targeted by
stopped reading full-disclosure about a year ago, most of the
discussions was about netdev. now resumed my subscription: still a
lot of talks about netdev. I'm glad that our constantly evolving
universe has such islands of stability and predictability. but it's a
pity that these islands populated
I smell a lawsuit coming on for our friend Greenbaum.
ReadWriteWeb has an article up today discussing an incident in which a school
employee lost his job after leaving a comment on the website of the St. Louis
Post-Dispatch newspaper. After the school employee responded to the newspaper's
poll
What Greenbaum did was against the privacy policy of the site:
You seem to be missing the part where the comment was removed (several
times) and re-posted.
From : http://www.stltoday.com/help/privacy-policy
..to protect against misuse or unauthorized use of our web sites
Cheers,
They're ORs, unfortunately. The language is unclear but it seems to be one
of those infernal boilerplate pieces of shit that basically invalidate the
assurances as to privacy.
You could still probably press the suit. Unauthorised use has recently
been defined and redefined, it's an evolving piece
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
No problem regarding the personal post, I have made the same mistake myself.
I also see what you mean regarding the language of the privacy statement.
unauthorised use could be interpreted as any use that has not been given
explicit approval before
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[ SeaMonkey 1.1.8 Remote Array Overrun (Arbitrary code execution) ]
Author: Maksymilian Arciemowicz and sp3x
http://SecurityReason.com
Date:
- - Dis.: 07.05.2009
- - Pub.: 20.11.2009
CVE: CVE-2009-0689
Risk: High
Remote: Yes
Affected Software:
- -
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[ K-Meleon 1.5.3 Remote Array Overrun (Arbitrary code execution) ]
Author: Maksymilian Arciemowicz and sp3x
http://SecurityReason.com
Date:
- - Dis.: 07.05.2009
- - Pub.: 20.11.2009
CVE: CVE-2009-0689
Risk: High
Remote: Yes
Affected Software:
- -
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[ Opera 10.01 Remote Array Overrun (Arbitrary code execution) ]
Author: Maksymilian Arciemowicz and sp3x
http://SecurityReason.com
Date:
- - Dis.: 07.05.2009
- - Pub.: 20.11.2009
CVE: CVE-2009-0689
Risk: High
Remote: Yes
Affected Software:
- -
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[ KDE KDELibs 4.3.3 Remote Array Overrun (Arbitrary code execution) ]
Author: Maksymilian Arciemowicz and sp3x
http://SecurityReason.com
Date:
- - Dis.: 07.05.2009
- - Pub.: 20.11.2009
CVE: CVE-2009-0689
Risk: High
Remote: Yes
Affected Software:
-
Mr. Kurt Greenbaum made a mistake. Privacy violated, because there
are other mechanism's like baninig the IP, email or whatever is
necessary to submit the post. If this fails then you should conntact
the ISP of the spammer based on the IP.
--
netinfinity
Feel free to share your feelings with Greenbaum's boss:
Kevin Mowbray
Phone: 314-340-8970
E-mail: kmowb...@post-dispatch.com
--- mrx m...@propergander.org.uk schrieb am Fr, 20.11.2009:
Von: mrx m...@propergander.org.uk
Betreff: Re: [Full-disclosure] Meet Kurt Greenbaum, Director of Social
Earlier this year, a very well educated FD member posted the psychological
profile of Mr. Wallace. (Found here:
http://seclists.org/fulldisclosure/2009/Jan/415 ) Interesting to view in
retrospect, because I find it depicts him to a T.
This profile is almost like an instruction set for n3td3v's
19 matches
Mail list logo