Hi,
I recently noticed some spam comments to my blog. Upon looking at the
link they were linking back to it is an aggregation of various people
RSS from their blogs.
Upon examining the domains and their whois info they all appear to be
registered with ProtectFly. Their whois information does not
Hi Martin,
Martin Vuagnoux wrote:
Dear list,
let me present you the public release of a fuzzer presented at 22c3:
Autodafé is a fuzzing framework able to uncover buffer overflows by
using the fuzzing by weighting attacks with markers technique.
http://autodafe.sourceforge.net
You will
Hey,
codeslag wrote:
http://disabilitydatabase.mla.gov.uk/index.asp?startrow=1action=searchKeywords=%3Cimg%20src=%22http://0xdeadface.co.uk/richard.jpg%22/%3E
Hi,
n3td3v wrote:
You missed the point of my post.
I have nothing against F-Secure reporting the bug, I only have
something against F-Secure supplying information on how to use an XSS
vulnerability properly in which to cause the most damage to the
Netscape web site.
F-Secure have not stated
Hello,
Joanna R. wrote:
Hello,
attached 0day kernel 2.6 local root exploit. This is a new genuine
bug, unpatched in 2.6.17.4 - don't get confused by prctl inside - it
is only used to change process status.
Tested on
[EMAIL PROTECTED] ~ $ uname -a
Linux n-box 2.6.16-gentoo-r9 #1 Fri Jun 9
Whomever you are. Get a fscking life!
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Hi,
Nicklas B. Westerlund wrote:
On 22/06/06 12:52 +0200, Dan B wrote:
Whomever you are. Get a fscking life!
I'll second that, it's starting to get annoying.
N.
Indeed very annoying. List admin. Can you block this IP: 71.202.85.37
that will beat this in the short term
Hi,
[EMAIL PROTECTED] DID NOT WRITE:
SPAM ME AT [EMAIL PROTECTED] BY SPOOFING MAIL FROM
full-disclosure@lists.grok.org.uk
SPAM ME AT [EMAIL PROTECTED] BY SPOOFING MAIL FROM
full-disclosure@lists.grok.org.uk
SPAM ME AT [EMAIL PROTECTED] BY SPOOFING MAIL FROM
FYI. Comcast Contacted.
Cheers,
DanBUK.
PS. Although I don't hold my breath on them dealing with it quickly, if
at all...
---BeginMessage---
Hi there,
There is a user of your network, spoofing emails and basically spamming
a mailing list. Originally pretending to be one use, and once I piped up
Hi,
Karol Wiesek wrote:
Just add rule to Your procmail or any other stuff and ignore it.
That's not really my point. Extra traffic generated by each message,
then the MTA's that block based on keywords; I was receiving 2-5 emails
per spoofed email pretending to be me that the MTA's
Hi,
n3td3v wrote:
n3td3v: Sure my comments on FD on 666 were just hear-say, but theres
loads of defacers out there. Morning wood is promoting the new
'zone-h.org http://zone-h.org' website via his Y messenger status
the last two days, I feel sorry for the zone-h crew right now.
Just
[EMAIL PROTECTED] wrote:
I however admit being stumped - given how low this list has sunk of late,
I'm at a loss to recommend a less technically inclined list that still
deals with computers.
I don't know how to comment on that really; not a good start to an
email.. But there are many other
Hi zeus,
Did you even look at the source code for this script. If you had then
you would see that in the case of register_global's being turned on
there is a bigger issue to worry about; Remote/Local File Inclusion -
Server side.
I have just managed to examine the source code on a few
13 matches
Mail list logo