[Full-Disclosure] Microsoft Security, baby steps ?

2004-03-13 Thread morning_wood
Gimme a break.. http://go.microsoft.com/?LinkID=422101 although this could be amusing... http://www.microsoft.com/security/protect/cd/order.asp m.wood ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.htm

RE: [Full-Disclosure] Re: Norton AntiVirus 2002 fails to scan files with ... [2'nd... UPDATED]

2004-03-13 Thread bipin gautam
--- "Aditya, ALD [Aditya Lalit Deshmukh]" <[EMAIL PROTECTED]> wrote: > please, i tested it : it did not work, and the > program did not crash, > > program : nav version 2002 did you tried the Nested File AutoProtect Bypass Vulnerability > > http://www.geocities.com/visitbipin/ mark the fact...

[Full-Disclosure] unsubscription?

2004-03-13 Thread wagner oliveira
How I make for unsubscription?Yahoo! Mail - O melhor e-mail do Brasil. Abra sua conta agora!

Re: [Full-Disclosure] Book of unreleased exploits?

2004-03-13 Thread Alexander Hoogerhuis
"david cohen" <[EMAIL PROTECTED]> writes: > Coworker of mine took a class taught by one of the authors of this book: > > http://www.wiley.com/WileyCDA/WileyTitle/productCd-0764544683.html > > Coworker is telling me this is some sort of compendium of unreleased > exploits. > > [SNIP] > OK, I've

Re: [Full-Disclosure] PHPNuke

2004-03-13 Thread Jelmer
nukes on jboss ? :) http://www.jboss.org/developers/projects/nukes/index - Original Message - From: "Alerta Redsegura" <[EMAIL PROTECTED]> To: "Full-Disclosure" <[EMAIL PROTECTED]> Sent: Saturday, March 13, 2004 12:58 PM Subject: RE: [Full-Disclosure] PHPNuke > >Please tell me "what v

RE: [Full-Disclosure] Book of unreleased exploits?

2004-03-13 Thread Oliver Schneider
> releasing 130 undocumented exploits ? D C M A oops did i say somthing > wrong ? Don't get me wrong, but still the US legislation is not yet valid all over the world! And yes, on this list as well as on many other lists there are not only "americans". This might be true for the sender of the

Re: [Full-Disclosure] Book of unreleased exploits?

2004-03-13 Thread Cael Abal
Aditya, ALD [Aditya Lalit Deshmukh] wrote: Coworker is telling me this is some sort of compendium of unreleased exploits. Figuring that the average exploit would take up about 5 pages of printed text, and the book at 650 pages, that would lead me to infer that it has somehwere around 130 new exploi

RE: [Full-Disclosure] Re: MS Security Response is a bunch of half-witted morons

2004-03-13 Thread Aditya, ALD [Aditya Lalit Deshmukh]
> Your points are well taken and understandable. But if you are supporting > a M$ operating system enough to need to read the SB's, then wouldnt your > IE be up to date to read them? Even if you would just use IE to > read M$'s > site? To sit and scream about web design decisions in this mai

RE: [Full-Disclosure] Re: Norton AntiVirus 2002 fails to scan files with ... [2'nd... UPDATED]

2004-03-13 Thread Aditya, ALD [Aditya Lalit Deshmukh]
please, i tested it : it did not work, and the program did not crash, program : nav version 2002 > -Original Message- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] Behalf Of bipin gautam > Sent: Friday, March 12, 2004 10:34 AM > To: [EMAIL PROTECTED] > Subject: [Full-Disclosure]

RE: [Full-Disclosure] Book of unreleased exploits?

2004-03-13 Thread Aditya, ALD [Aditya Lalit Deshmukh]
> > Coworker is telling me this is some sort of compendium of unreleased > exploits. Figuring that the average exploit would take up about 5 pages > of printed text, and the book at 650 pages, that would lead me to infer > that it has somehwere around 130 new exploits. WTF? What is the point of

RE: [Full-Disclosure] Re: MS Security Response is a bunch of half-witted morons

2004-03-13 Thread Aditya, ALD [Aditya Lalit Deshmukh]
> I agree with Nick. It is ironic and unfortunate that MS would force > users to turn on a potentially unsafe scripting language to read a > security bulletin. > the default secure lockdown includes stopping and blocking all the scripts from executing so i think this is a paradox

Re: [Full-Disclosure] Book of unreleased exploits?

2004-03-13 Thread Dave Aitel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Thanks for your interest in Shellcoders! The book is not simply a listing of new exploits. It does contain new exploits to highlight some of the techniques in the chapters. Specifically, I have a new CDE remote, and Sinan has some kernel exploits in the

[Full-Disclosure] Re: MS Security Response is a bunch of half-witted morons

2004-03-13 Thread Martin Mačok
On Fri, Mar 12, 2004 at 12:13:40PM -0600, Kim Scarborough wrote: > > http://www.microsoft.com/technet/security/bulletin/ms04-009.mspx > > http://www.microsoft.com/technet/security/bulletin/ms04-010.mspx > > > >with a browser that does not have JavaScript enabled... > > It works in Lynx. If yo

Re: [Full-Disclosure] PHPNuke

2004-03-13 Thread jan . muenther
Hello, > Please tell me "what version of PHPnuke is secure ?" i am asking this question > because someone hacked my friend phpnuke 6.5 through SQL injection. And another > question is " Can i use phpnuke 6.5 themes with the new/old version of PHPnuke ? " At the risk of getting flamed mas

RE: [Full-Disclosure] PHPNuke

2004-03-13 Thread Alerta Redsegura
>Please tell me "what version of PHPnuke is secure ?" Is there *any* secure version of PHPnuke? Iñigo Koch Red Segura ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

[Full-Disclosure] PHPNuke

2004-03-13 Thread Farrukh Hussain
Hey, Please tell me "what version of PHPnuke is secure ?" i am asking this question because someone hacked my friend phpnuke 6.5 through SQL injection. And another question is " Can i use phpnuke 6.5 themes with the new/old version of PHPnuke ? " From, Farrukh Hussain. ___

Re: [Full-Disclosure] Re: MS Security Response is a bunch of half-witted morons

2004-03-13 Thread Patrice Neff
Kim Scarborough <[EMAIL PROTECTED]> writes: > I've been playing around with custom stylesheets but I can't seem to > find a way to override that. That's a good idea. It works with the following line: div { display:block !important; } The !important statement is necessary in order to overwrite