Dear Mister Bitlance Winter,
it seems it's just like my post:
http://www.securityfocus.com/archive/1/391200/2005-02-18/2005-02-24/0
but you give us more details; thanks for that.
Regards,
Jerome Athias
___
Full-Disclosure - We believe in it.
Ch
http://dump.hbx.us/gmail_bug_hack/
smime.p7s
Description: S/MIME cryptographic signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
> Why use Gmail?
> http://www.omnilect.com"; TARGET="_blank">http://www.omnilect.com
> offers 2GB for free (with
> Windows use a HOSTS file to block the banner ad
> servers) or for about $2 a month you can do what you
> like with it (POP3/SMTP etc etc)
>
> Regards
> Steve
>
Want more?
http://un
Hi,
this may interest you...
http://www.blacksheepnetworks.com/security/security/vulndev/2513.html
just my 2 cents
regards
null
Forfait AOL ADSL 5 Méga à 22.90EUR/mois
It seems that it was first posted here:
http://neworder.box.sk/forum.php?did=multSecurity%20and%20Networking&thread=206439
> De: "raza" <[EMAIL PROTECTED]>
> A: "'Vincent Archer'" <[EMAIL PROTECTED]>, "'Ferdinand Klinzer'" <[EMAIL PROTECTED]>
> Objet: RE: [Full-Disclosure] New REmote Wi
Hi,
you could work with this:
--START--
#!/bin/sh
#
# The JPEG vuln is triggered by the 0 or 1 length field with an integer flaw
# The crafted JPEG header makes Windows crash a couple of different ways
# 1) First, it crashes when the image is opened.
# 2) Second, it crashes when hoverin