-BEGIN PGP SIGNED MESSAGE-
__
SuSE Security Announcement
Package:susehelp
Announcement-ID:SuSE-SA:2003:005
Date: Mon Jan
A small amount of light on the Naviant issue:
-Original Message-
From: Shapiro, Bret [mailto:[EMAIL PROTECTED]]
Sent: Monday, January 20, 2003 10:14 AM
To: Richard M. Smith
Cc: Dubner, Derek
Subject: RE: [Full-Disclosure] Navian Call Home
This is part of the registration program that
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 232-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
January 20th, 2003
-
Red Hat, Inc. Red Hat Security Advisory
Synopsis: Updated CVS packages available
Advisory ID: RHSA-2003:012-07
Issue date:2003-01-20
Updated on:2003-01-20
Product: Red
I don't know if this question is applicable to this list, however :
Are they exploitable?
I was looking for a format strings exploit on HP-UX,but couldn't find
any. Maybe because they are not exploitable???If they are,I would
appreaciate very much if anyone could provide some information about
I am going to say yes they are exploitable I have not 100% finished
my exploit for SITE EXEC on HPUX ftpd but I have definately been able to
redirect the flow of execution. So far nothing special has been
required except to remember you are on BigEndian hardware...
-KF
[EMAIL PROTECTED]
On Mon, 20 Jan 2003 [EMAIL PROTECTED] wrote:
Are they exploitable?
I was looking for a format strings exploit on HP-UX,but couldn't find
any. Maybe because they are not exploitable???If they are,I would
appreaciate very much if anyone could provide some information about
that.
I think
__
Do you Yahoo!?
Yahoo! Mail Plus - Powerful. Affordable. Sign up now.
http://mailplus.yahoo.com
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Mandrake Linux Security Update Advisory
Package name: libpng
Advisory ID:
It comes to our attention that certain 'security professionals' abuse their
knowledge of certain vulnerabilities or software - whether through the auditing
of proprietary source trees that ISS does, or by faking GDB output
But perhaps the greatest abuse is generated by the most unethical
Hi,
I just tried to opt-out from a spam email message from some sort
Internet keyword system. When I went to the opt-out page for the
mailing list, I got hit with a drive-by download that asked me to
install an ActiveX control called the Internet Marketing Agency.
There isn't a clue on the
Don't let the net byte you !
why are you opting out of spam?
is there some secret formula or just asking for trouble.
is this just a newbie troll :-)
You've gotta -TRUST- microsoft
and all their software. Special install routines...
Don't you update by windowsupdate website ?
Did you realize
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED] [EMAIL PROTECTED]
__
SCO Security Advisory
Subject:Linux: Multiple Security Vulnerabilities in the Common Unix
Printing
13 matches
Mail list logo