check this...
/
Vulnerable Program: JAWS
Version : 0.3 ; it's BETA probably ;)
Url: http://www.jaws.com.mx
The Bug: Multiples vulnerabilities
Rudolf Polzer wrote:
I didn't expect that you will actually write that since today is
nowhere April 1th.
If you now find a DoS in a Brainf*** interpreter by coding an endless
loop in Brainf*** you are the first one on my gmail killfile - until
Mar 31th, 2005. Finding the code for an endless loop
Maarten wrote:
On Saturday 03 July 2004 18:25, J.A. Terranson wrote:
On Sat, 3 Jul 2004, RandallM wrote:
After a number of years, much thought,and long nights I have developed a
systematic method to prevent and thwart exploits on my system!
NEVER REBOOT!
up and
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
Boggles Special:
- --
Boggles has Hangover this morning.
Boggles would like to apologise to world for not Oreilly-ing advisories
earlier.
Boggles has managed to focus half a retina to decode Boggles' Inbox.
Boggles appreciate the fan mail. But
IHC TEAM private work, all the fame become to IHC TEAM and the leetest mr.
[EMAIL PROTECTED]
Well, I am from the IHC Team. Those people that wrote down stupid things
like that are just trying to discredit us. I think everyone here knows
that kind of black hat that are just trying to look
If you do a query on the BUGTRAQ archive you'll see no mention of Gmail and i'm sure that's not because people haven't been atttempting to post about Gmail , but because the moderators think Gmail is beta. I bet once Gmail is launched as a public service, the BUGTRAQ moderators will allow Gmail
Anyone who has not read this appeals court decision should do so now.
http://www.ca1.uscourts.gov/pdf.opinions/03-1383-01A.pdf
The stipulated facts make it clear that the government failed to hire an
expert witness who knows how SMTP, POP3, sendmail, procmail, DNS, MTA,
MUA, HTTP, Web browsers,
Maarten wrote:
On Friday 02 July 2004 23:33, Barry Fitzgerald wrote:
No, I'm not wrong.
The discussion is about who's responsible for support of said software.
There's no obligation through the GNU GPL that support is required if
money changes hands, however the point of the discussion is who's
Bugs, worms and IPO originate from silicon, rather than bad software:
http://molecularexpressions.com/creatures/pages/roach.html
http://molecularexpressions.com/creatures/pages/canoworms.html
http://molecularexpressions.com/creatures/pages/disclaimer.html
joe wrote:
Couple of things.
1. The conversation you are referring to was a conversation about issues
with core base components that necessitated a complete redesign. You kept
bringing up items that were NOT core base components - they were UI
components. IE being one of them. The very fact that
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
OpenPKG Security AdvisoryThe OpenPKG Project
http://www.openpkg.org/security.html http://www.openpkg.org
[EMAIL PROTECTED]
hi,
It also is not a list for the benefit exclusively of people who are
fortunate enough to have simple security problems. The security issues
surrounding the question how do I keep my home computer safe from
attack? are trivial compared to those surrounding the question how do
I keep
I don't think it's garbage. I bring up a valid point here. If you must,filter me out.. don't be lazy.
This brings up the question of guidelines the OIS wish people to follow.
Cheerio
Henrik Persson [EMAIL PROTECTED] wrote:
On Tue, 2004-07-06 at 12:56, System Outage wrote: If you do a query on
On Tue, 2004-07-06 at 11:38, Barry Fitzgerald wrote:
Does it work now?
Haven't tried as I (unfortunately) need IE on that box.
It's always been there to my knowledge, but in the past it's never
actually removed it - just reverted to the prior version.
Which version of Windows are you
On Tue, 2004-07-06 at 09:27, Barry Fitzgerald wrote:
Is it impossible to remove easily and difficult to remove cleanly? Yes...
Heh... I just noticed (by chance) that there is an option in |Control
Panel - Add/Remove Programs - Windows Components| to remove Internet
Explorer (which supposedly
Frank Knobbe wrote:
On Tue, 2004-07-06 at 09:27, Barry Fitzgerald wrote:
Is it impossible to remove easily and difficult to remove cleanly? Yes...
Heh... I just noticed (by chance) that there is an option in |Control
Panel - Add/Remove Programs - Windows Components| to remove Internet
This advisory was of course not written by me, it's a fake.
Bye
Germain Randaxhe aka [EMAIL PROTECTED]
- Original Message -
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Monday, July 05, 2004 9:20 PM
Subject: [Full-Disclosure] ANOTHER 3L33T3 ADVISO AND NOT ON PHP-CASTOR 10.3
BETA
Full
as in "full" means FULL,the very purpose of this list is to allow people
posting their findings without being moderated by people like you.
PS:
do not disrespect M$, keep your advisories private bitches!
Regards
Rodrigo.-
De: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] En nombre
On Tue, July 6, 2004 9:38 am, Barry Fitzgerald said:
Frank Knobbe wrote:
Heh... I just noticed (by chance) that there is an option in |Control
Panel - Add/Remove Programs - Windows Components| to remove Internet
Explorer (which supposedly Adds or removes access to Internet Explorer
from the Start
!--
No reason to set the kill bit?
Take a look at
http://seclists.org/lists/fulldisclosure/2004/Jun/0318.html
And I am quoting you now
You should be able to use this to compromise Windows XP SP2
through Internet Explorer despite the My Computer zone hardening
since the Trusted Sites Zone
Jason,
I definitely agree that the stipluations that both sides agree to were totally
off-base, but my read of the Court's opinion is that this appears to be less a
technical matter than an issue of statutory interpretation by the First Circuit. I've
read over the Summary and the analysis of
Eudora 6.1.2 for Windows was released on 21 June 2004. The release notes
http://www.eudora.com/download/eudora/windows/6.1.2/RelNotes.txt
say:
SECURITY
Fixed case where attachments could be spoofed via base64 encoded
(plain-text, inline) MIME parts.
Not so. Harmless demo below.
Cheers,
Paul
Yes, and the OIS guidelines are thinly
veiled Oh please don't tell the world that we have had this bug for
6 months...we'll look bad methods for being able to quash the full
disclosure model and take the pressure of respond to me, get
it fixed, or thr world is going to know about it off the
ATTENTION,
We have uncovered a phishing scam. This is a perfect example of a
phishing scam. All indicators (that the recipient sees) show a valid and
legitimate e-mail from Wells Fargo. This e-mail tells the user their
account has been frozen due to fraudulent activity and gives them a link
to
Well, I'm personally all for announcing a beta advisory. However, when I'm
all for it is as follows:
Example. Eudora posts a PUBLIC beta on their website. Then fine, announce
the bug anywhere. However, when it's private. It should go the normal bug
ways. To the devs so they can fix it. Fine,
Group Settings
· Listed in directory
· Open membership
· All messages require approval
· All members may post
· Archives for members only
· Email attachments are permitted
how the f00k do you call this secret???
On Tue, 6 Jul 2004 23:26:31 +0100,
Jason,
First off your analogy is flawed. In snail mail final deliver is when it
get to the final address point. If it's a PO box then if delivered even
if you don't come and pick it up, if your in an apartment house then the
mailbox cluster is where the final delivery point is, in rural
--- System Outage [EMAIL PROTECTED] wrote:
Yeah, i've contacted the Yahoo! Security Team over
the past 1/2 years with various issues that they
-did- follow up and patch, but did not once think to
tell me about progress. It was only after I spoke to
a representative of Yahoo! Security and said
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandrakelinux Security Update Advisory
___
Package name: kernel
Advisory ID:
It is a core component of the current Windows UI, this is not the same as
being a core component of Windows. Explorer is simply a UI shell that sits
on the operating system known as Windows. The entire shell is replaceable
and has been for a long time, since at least Win3.1.
Do programs written
30 matches
Mail list logo