615 messages starting Jan 01 08 and ending Feb 01 08 Date index | Thread index | Author index
Re: [Professional IT Security Providers - Exposed] QuietMove ( D - ) Adam Muntner Re: [Professional IT Security Providers - Exposed] QuietMove ( secreview review: D- ) Adam Muntner Re: [Professional IT Security Providers - Exposed] QuietMove ( D - ) Marcin Wielgoszewski Re: [Professional IT Security Providers - Exposed] QuietMove ( D - ) Adam Muntner Re: [Professional IT Security Providers - Exposed] QuietMove ( D - ) reepex Re: [Professional IT Security Providers - Exposed] QuietMove ( D - ) SilentRunner Re: [Professional IT Security Providers - Exposed] QuietMove ( D - ) reepex Re: [Professional IT Security Providers - Exposed] QuietMove ( D - ) veda Re: [Professional IT Security Providers - Exposed] QuietMove ( D - ) Jeffrey Denton Re: [Professional IT Security Providers - Exposed] QuietMove ( D - ) Marcin Wielgoszewski Re: [Professional IT Security Providers - Exposed] QuietMove ( D - ) Adam Muntner Re: [Professional IT Security Providers - Exposed] QuietMove ( D - ) reepex Re: [Professional IT Security Providers - Exposed] QuietMove ( D - ) reepex Re: [Professional IT Security Providers - Exposed] QuietMove ( D - ) Andre Gironda Re: [Professional IT Security Providers - Exposed] QuietMove ( D - ) reepex
Re: [Professional IT Security Providers - Exposed] QuietMove ( D - ) Martin Zimmermann Corporations and Institutes to target for attack & exploitation gmaggro Re: [Professional IT Security Providers - Exposed] QuietMove ( D - ) SecReview Re: [Professional IT Security Providers - Exposed] QuietMove ( D - ) reepex Re: [Professional IT Security Providers - Exposed] QuietMove ( D - ) reepex Re: [Professional IT Security Providers - Exposed] QuietMove ( D - ) coderman [Professional IT Security Providers - Exposed] QuietMove ( F + ) secreview Re: [Professional IT Security Providers - Exposed] QuietMove ( D - ) Andre Gironda Re: [Professional IT Security Providers - Exposed] QuietMove ( F + ) Andre Gironda Re: here Nikolay Kichukov Secreview re-review of quietmove ( F ---) Adam Muntner Re: Secreview re-review of quietmove ( F ---) Adam Muntner Fwd: Secreview re-review of quietmove ( F ---) Peter Dawson Re: Fwd: Secreview re-review of quietmove ( F ---) Adam Muntner Re: Fwd: Secreview re-review of quietmove ( F ---) Mukul Dharwadkar Re: Secreview re-review of quietmove ( F ---) SecReview Re: [Professional IT Security Providers - Exposed] QuietMove ( D - ) Valdis . Kletnieks Was secreview crap - now OpenVMS!! Randal T. Rioux Re: Fwd: Secreview re-review of quietmove ( F ---) William Lefkovics Re: [Professional IT Security Providers - Exposed] QuietMove ( D - ) reepex Re: Was secreview crap - now OpenVMS!! Valdis . Kletnieks Re: [Professional IT Security Providers - Exposed] QuietMove ( D - ) reepex Re: Was secreview crap - now OpenVMS!! reepex Buffer-overflow and format string in White_Dune 0.29beta791 Luigi Auriemma Multiple vulnerabilities in Georgia SoftWorks SSH2 Server 7.01.0003 Luigi Auriemma Re: Secreview re-review of quietmove ( F ---) Tremaine Lea Re: Secreview re-review of quietmove ( F ---) Nate McFeters Re: Uber Lamer Ass of the Year. Vote! worried security Re: Was secreview crap - now OpenVMS!! Valdis . Kletnieks AST-2008-001: Crash from transfer using BYE with Also header Asterisk Security Team January 4th Chicago 2600 Meeting Information Steven McGrath Critical Vulnerability in [Full-Disclosure] 31415926 XSS Vulnerabilities in Common Shockwave Flash Files rich cannings Re: Secreview re-review of quietmove ( F ---) Lyal Collins Re: Was secreview crap - now OpenVMS!! Line Noise [ MDVSA-2008:1 ] - Updated wireshark packages fix multiple vulnerabilities security Re: Critical Vulnerability in [Full-Disclosure] reepex
Re: Was secreview crap - now OpenVMS!! list spam Re: Critical Vulnerability in [Full-Disclosure] scott Yet another Dialog Spoofing Vulnerability - Firefox Basic Authentication avivra Re: Yet another Dialog Spoofing Vulnerability - Firefox Basic Authentication Michal Zalewski King Kong plays the banjo brutealmighty Re: Yet another Dialog Spoofing Vulnerability - Firefox Basic Authentication avivra Re: Uber Lamer Ass of the Year. Vote! damncon [SECURITY] [DSA 1443-1] New tcpreen packages fix denial of service Moritz Muehlenhoff multiple CAPTCHA automation test bypass digest 3APA3A [SECURITY] [DSA 1444-1] New php5 packages fix several vulnerabilities Moritz Muehlenhoff securityvulns.com russian vulnerabilities digest 3APA3A [SECURITY] [DSA 1445-1] New maradns packages fix denial of service Moritz Muehlenhoff [SECURITY] [DSA 1446-1] New wireshark packages fix denial of service Moritz Muehlenhoff [SECURITY] [DSA 1447-1] New tomcat5.5 packages fix several vulnerabilities Moritz Muehlenhoff
Re: Critical Vulnerability in [Full-Disclosure] reepex http://www.plannetgroup.com/home.html auto113496 rPSA-2008-0001-1 dovecot rPath Update Announcements rPSA-2008-0004-1 tshark wireshark rPath Update Announcements United Built Homes, Pro Step Marketing Partners with Top-Selling Atlantic Beach, NC Real Estate Team Super Star Martin Pelmore, Finish out the Year with a Rejuvenating Getaway to Fort Lauderdale; Harbor Beach Marriott Resort & Spa Offers Holiday Resort Credit Super Star Multiple vulnerabilities in yaSSL 1.7.5 Luigi Auriemma Pre-auth buffer-overflow in mySQL through yaSSL Luigi Auriemma SinFP fingerprinting tool online demo GomoR [Professional IT Security Providers - Exposed] Syrex ( B ) secreview iDefense Security Advisory 12.24.07: Novell ZENworks Endpoint Security Management Local Privilege Escalation Vulnerability iDefense Labs
[ MDVSA-2008:002 ] - Updated squid package fixes remote denial of service security Re: Was secreview crap - now OpenVMS!! sys Re: Was secreview crap - now OpenVMS!! Dude VanWinkle Re: Uber Lamer Ass of the Year. Vote! worried security Re: Uber Lamer Ass of the Year. Vote! Valdis . Kletnieks [SECURITY] [DSA 1449-1] New loop-aes-utils packages fix programming error Steve Kemp [SECURITY] [DSA 1450-1] New util-linux packages fix programming error Steve Kemp [SECURITY] [DSA 1448-1] New eggdrop packages fix execution of arbitrary code Steve Kemp [SECURITY] [DSA 1448-1] New eggdrop packages fix arbitrary code execution Steve Kemp scada/plc gear gmaggro
rPSA-2008-0006-1 libexif rPath Update Announcements rPSA-2008-0007-1 tetex tetex-afm tetex-dvips tetex-fonts tetex-latex tetex-xdvi rPath Update Announcements rPSA-2008-0008-1 cups rPath Update Announcements Re: Was secreview crap - now OpenVMS!! Ishan Oshadi Jayawardene [SECURITY] [DSA 1451-1] New mysql-dfsg-5.0 packages fix several vulnerabilities Moritz Muehlenhoff [SECURITY] [DSA 1452-1] New wzdftpd packages fix denial of service Steve Kemp
Re: scada/plc gear b9u4ea [SECURITY] [DSA 1453-1] New tomcat5 packages fix several vulnerabilities Moritz Muehlenhoff [SECURITY] [DSA 1454-1] New freetype packages fix arbitrary code execution Moritz Muehlenhoff Re: scada/plc gear full disclosure PWDumpX v1.4 - Dumps domain password cache, LSA secrets, password hashes, and password history hashes. Reed Arvin PWDumpX v1.0 and PWDumpX v1.1 updated - bug fixes Reed Arvin iDefense Security Advisory 01.07.08: Motorola netOctopus Agent MSR Write Privilege Escalation Vulnerability iDefense Labs
Re: scada/plc gear gmaggro VMSA-2008-0002 Low severity security update for VirtualCenter and ESX Server 3.0.2, and ESX 3.0.1 VMware Security team VMSA-2008-0001 Moderate OpenPegasus PAM Authentication Buffer Overflow and updated service console packages VMware Security team [USN-560-1] Tomboy vulnerability Jamie Strandboge [USN-560-1] Tomboy vulnerability Jamie Strandboge [ MDVSA-2008:001-1 ] - Updated wireshark packages fix multiple vulnerabilities security Re: PWDumpX v1.4 Markus Jansson Re: PWDumpX v1.4 Tonnerre Lombard Re: PWDumpX v1.4 reepex Re: PWDumpX v1.4 offset Re: PWDumpX v1.4 North, Quinn [SECURITY] [DSA 1455-1] New libarchive1 packages fix several problems Steve Kemp ERRATA: [ GLSA 200709-07 ] Eggdrop: Buffer overflow Robert Buchholz
[ GLSA 200801-01 ] unp: Arbitrary command execution Robert Buchholz Gateway WebLaunch ActiveX Control Insecure Method elazar Re: PWDumpX v1.4 Mario D Re: PWDumpX v1.4 Valdis . Kletnieks Re: scada/plc gear b9u4ea [USN-562-1] opal vulnerability Kees Cook [USN-563-1] CUPS vulnerabilities Kees Cook [USN-561-1] pwlib vulnerability Kees Cook [ MDVSA-2008:003 ] - Updated clamav packages fix multiple vulnerabilities security Re: PWDumpX v1.4 Tonnerre Lombard [ MDVSA-2008:004 ] - Updated postgresql packages fix denial of service and privilege escalation issues security PWDumpX v1.4 Joey Mengele Re: PWDumpX v1.4 bugtraq Re: scada/plc gear gmaggro [USN-564-1] Net-SNMP vulnerability Jamie Strandboge [INFIGO 2008-01-06]: McAfee E-Business Server Remote Preauth Code Execution / DoS infocus Re: Gateway WebLaunch ActiveX Control Insecure Method Elazar Broad [ MDVSA-2008:004 ] - Updated postgresql packages fix denial of service and privilege escalation issues security Pre-auth remote commands execution in SAP MaxDB 7.6.03.07 Luigi Auriemma ASLR Question Ben [ GLSA 200801-02 ] R: Multiple vulnerabilities Pierre-Yves Rofes iDefense Security Advisory 01.09.08: Novell NetWare Client nicm.sys Local Privilege Escalation Vulnerability iDefense Labs [ GLSA 200801-03 ] Claws Mail: Insecure temporary file creation Pierre-Yves Rofes [ GLSA 200801-04 ] OpenAFS: Denial of Service Pierre-Yves Rofes [ GLSA 200801-05 ] Squid: Denial of Service Pierre-Yves Rofes [USN-565-1] Squid vulnerability Kees Cook [ MDVSA-2008:005 ] - Updated libexif packages fix multiple vulnerabilities security [ GLSA 200801-06 ] Xfce: Multiple vulnerabilities Robert Buchholz
Re: scada/plc gear Worthless Email [USN-566-1] OpenSSH vulnerability Kees Cook Tool Release: PortBunny 1.0 Felix 'FX' Lindner List Charter John Cartwright Re: PWDumpX v1.4 (and GUI:s) Markus Jansson [SECURITY] [DSA 1456-1] New fail2ban packages fix denial of service Thijs Kinkhorst [SECURITY] [DSA 1457-1] New dovecot packages fix information disclosure Thijs Kinkhorst Re: PWDumpX v1.4 (and GUI:s) Matthias Arnason Re: PWDumpX v1.4 (and GUI:s) Mattias Fliesberg Re: PWDumpX v1.4 (and GUI:s) Stanislaw Klekot ID-Commerce Security Advisory - SLR-2007-001 consultant gmail Re: PWDumpX v1.4 (and GUI:s) Tonnerre Lombard uCon 2008 call for participation - Recife, Brazil uCon staff BT Home Flub: Pwnin the BT Home Hub (5) - exploiting IGDs remotely via UPnP Adrian P (( PoC)) ID-Commerce Security Advisory - SLR-2007-001 (( PoC)) consultant gmail ID-Commerce Security Advisory - SLR-2007-001 consultant gmail Re: PWDumpX v1.4 (and GUI:s) Valdis . Kletnieks SunOS 5.10 ICMP Remote Kernel Crash Exploit Code kcope Re: PWDumpX v1.4 (and GUI:s) Valdis . Kletnieks They got into the town, the enemies kcope Buffer-overflow in Quicktime Player 7.3.1.70 Luigi Auriemma [ MDVSA-2008:006 ] - Updated exiv2 packages fix vulnerability security Re: SunOS 5.10 ICMP Remote Kernel Crash Exploit Code reepex Re: PWDumpX v1.4 (and GUI:s) Peter Besenbruch Re: SunOS 5.10 ICMP Remote Kernel Crash Exploit Code eliteb0y Re: SunOS 5.10 ICMP Remote Kernel Crash Exploit Code eliteb0y [USN-567-1] Dovecot vulnerability Kees Cook
Re: SunOS 5.10 ICMP Remote Kernel Crash Exploit Code reepex Re: SunOS 5.10 ICMP Remote Kernel Crash Exploit Code reepex Re: SunOS 5.10 ICMP Remote Kernel Crash Exploit Code b9u4ea Re: scada/plc gear b9u4ea Re: SunOS 5.10 ICMP Remote Kernel Crash Exploit Code Joey Mengele re-resting of zzuf results Hanno Böck Re: SunOS 5.10 ICMP Remote Kernel Crash Exploit Code eliteb0y [ MDVSA-2008:007 ] - Updated madwifi-source, wpa_supplicant packages fix vulnerabilities security Re: SunOS 5.10 ICMP Remote Kernel Crash Exploit Code reepex Re: SunOS 5.10 ICMP Remote Kernel Crash Exploit Code eliteb0y SecurityReason - Apache (mod_proxy_ftp) Undefined Charset UTF-7 XSS Vulnerability sp3x SecurityReason - Apache2 CSRF, XSS, Memory Corruption and Denial of Service Vulnerability sp3x PR07-06, PR07-07, PR07-08, PR07-09, PR07-10, PR07-12: Several XSS, Cross-domain Redirection and Frame Injection on Sun Java System Identity Manager ProCheckUp Research Re: PWDumpX v1.4 (and GUI:s) Markus Jansson [SECURITY] [DSA 1458-1] New openafs packages fix denial of service vulnerability Noah Meyerhans Re: Buffer-overflow in Quicktime Player 7.3.1.70 Marcello Barnaba (void) ID-Commerce Security Advisory - SLR-2007-001 rlavertu FWD: PhotoPost vBGallery Important Security Bulletin ad () heapoverflow com Re: FWD: PhotoPost vBGallery Important Security Bulletin trains Re: FWD: PhotoPost vBGallery Important Security Bulletin trains Re: FWD: PhotoPost vBGallery ImportantSecurity Bulletin php0t Re: scada/plc gear gmaggro StreamAudio ChainCast ProxyManager ccpm_0237.dll Buffer Overflow Elazar Broad Re: FWD: PhotoPost vBGallery ImportantSecurity Bulletin trains DoS in Sonic DLA 5.2.0 xerces8 Re: Buffer-overflow in Quicktime Player 7.3.1.70 Luigi Auriemma [ MDVSA-2008:008 ] - Updated kernel packages fix multiple vulnerabilities and bugs security [ MDVSA-2008:009 ] - Updated autofs packages fix insecure hosts configuration security Cross site scripting (XSS) in Moodle 1.8.3 Hanno Böck
[ MDVSA-2008:010 ] - Updated libxml2 packages fix DoS vulnerability security [ MDVSA-2008:011 ] - Updated rsync packages fix restrictions bypass vulnerabilities security Re: SunOS 5.10 ICMP Remote Kernel Crash Exploit Code Joey Mengele Safari 2 Denial of Service S21sec labs [ MDVSA-2008:009-1 ] - Updated autofs packages fix insecure hosts configuration security Re: Buffer-overflow in Quicktime Player 7.3.1.70 void
Javascript scott Hacking The Interwebs pdp (architect) [SECURITY] [DSA 1460-1] New postgresql-8.1 packages fix several vulnerabilities Moritz Muehlenhoff Re: Javascript damncon what is this? crazy frog crazy frog Nipper 0.11.2 Released Ian Ventura-Whiting [SECURITY] [DSA 1462-1] New hplip packages fix privilege escalation Moritz Muehlenhoff [SECURITY] [DSA 1461-1] New libxml2 packages fix denial of service Moritz Muehlenhoff Re: what is this? crazy frog crazy frog [SECURITY] [DSA 1459-1] New gforge packages fix SQL injection Thijs Kinkhorst
Re: what is this? 3APA3A Re: what is this? Nick FitzGerald Re: what is this? crazy frog crazy frog SQID v0.3 - SQL Injection Digger. Metaeye SG Re: what is this? 3APA3A Re: Buffer-overflow in Quicktime Player 7.3.1.70 Luigi Auriemma Re: what is this? Robert McArdle Re: what is this? Robert McArdle Re: Javascript Michael Holstein Re: what is this? crazy frog crazy frog Re: what is this? Robert McArdle Re: Javascript Thomas Pollet Re: what is this? Jose Nazario [SECURITY] [DSA 1463-1] New postgresql-7.4 packages fix several vulnerabilities Moritz Muehlenhoff ZDI-08-001: IBM Tivoli Storage Manager Express Backup Server Heap Overflow Vulnerability zdi-disclosures Re: Your message to Full-Disclosure awaits moderator approval comp.sec.guru Macrovision FlexNet Connect DownloadManager Insecure Methods Elazar Broad Re: Your message to Full-Disclosure awaits moderator approval Valdis . Kletnieks Re: Your message to Full-Disclosure awaits moderator approval comp.sec.guru [USN-568-1] PostgreSQL vulnerabilities Jamie Strandboge Re: what is this? 3APA3A Re: Macrovision FlexNet Connect DownloadManager Insecure Methods Elazar Broad [ MDVSA-2008:012 ] - Updated python packages fix vulnerabilities security [ MDVSA-2008:013 ] - Updated python packages fix vulnerability in imageop module security Re: what is this? Mario Contestabile Re: what is this? Gadi Evron
[USN-569-1] libxml2 vulnerability Kees Cook Re: what is this? crazy frog crazy frog Re: what is this? Nick FitzGerald Re: what is this? crazy frog crazy frog Re: what is this? auto71278 SecurityReason - Apache (mod_status) Refresh Header - Open Redirector (XSS) sp3x Load balancer ? Eduardo Tongson Re: Load balancer ? Eduardo Tongson Re: Load balancer ? seb Re: Load balancer ? GomoR Re: what is this? Paul Schmehl MS07-069 DHTML Objects Memory Corruption - has anybody seen it in the wild? Alla Bezroutchko Re: MS07-069 DHTML Objects Memory Corruption - has anybody seen it in the wild? Valdis . Kletnieks Re: what is this? Valdis . Kletnieks Re: Macrovision FlexNet Connect DownloadManager Insecure Methods Elazar Broad Digital Armaments January-February Hacking Challenge: Special 20.000$ Prize - Windows Vulnerabilities and Exploit vulnwatch Re: Hacking The Interwebs Fredrick Diggle Re: what is this? crazy frog crazy frog Re: what is this? worried security Re: Hacking The Interwebs Ed Carp Re: [SPAM] - Re: Load balancer ? - Email found in subject jmacaranas Re: scada/plc gear gmaggro Re: what is this? Gadi Evron eCerti com - Get Certified the e way... Neeraj Agarwal Re: what is this? worried security [FDSA] Multiple Vulnerabilities in Your Computer (all versions) Fredrick Diggle iDefense Security Advisory 01.15.08: TIBCO SmartSockets RTserver Heap Overflow Vulnerability iDefense Labs Re: Hacking The Interwebs reepex iDefense Security Advisory 01.15.08: TIBCO SmartSockets RTServer Multiple Untrusted Pointer Vulnerabilities iDefense Labs Re: eCerti com - Get Certified the e way... Fredrick Diggle iDefense Security Advisory 01.15.08: TIBCO SmartSockets RTserver Multiple Untrusted Pointer Offset Vulnerabilities iDefense Labs iDefense Security Advisory 01.15.08: TIBCO SmartSockets RTServer Multiple Untrusted Loop Bounds Vulnerabilities iDefense Labs Another free MacWorld Platinum Pass? Did they not learn anything? Kurt Grutzmacher Re: scada/plc gear gmaggro IN RESPONSE TO "Norfolkdesign.com theft and deceit" Ronnie - Norfolk Design Re: IN RESPONSE TO "Norfolkdesign.com theft and deceit" Nate McFeters NorfolkDesign.com proven track of excellence Ronnie - Norfolk Design Re: NorfolkDesign.com proven track of excellence Dixon, Wayne iDefense Security Advisory 01.15.08: Apple QuickTime Macintosh Resource Processing Heap Corruption Vulnerability iDefense Labs Re: [FDSA] Multiple Vulnerabilities in Your Computer (all versions) 3APA3A Re: NorfolkDesign.com proven track of excellence Alan J. Wylie Re: IN RESPONSE TO "Norfolkdesign.com theft and deceit" Alan J. Wylie NorfolkDesign.com proven track of excellence Ronnie - Norfolk Design [SECURITY] [DSA 1464-1] New syslog-ng packages fix denial of service Moritz Muehlenhoff Re: NorfolkDesign.com proven track of excellence Thomas Pollet
Re: NorfolkDesign.com proven track of excellence Fredrick Diggle Re: NorfolkDesign.com proven track of excellence Ronnie - Norfolk Design Re: NorfolkDesign.com proven track of excellence Ronnie - Norfolk Design Re: NorfolkDesign.com proven track of excellence Nick FitzGerald Re: NorfolkDesign.com proven track of excellence worried security Re: NorfolkDesign.com proven track of excellence Valdis . Kletnieks Re: NorfolkDesign.com proven track of excellence Ronnie - Norfolk Design Re: NorfolkDesign.com proven track of excellence Nick FitzGerald rPSA-2008-0015-1 cairo rPath Update Announcements rPSA-2008-0016-1 postgresql postgresql-server rPath Update Announcements rPSA-2008-0017-1 libxml2 rPath Update Announcements TPTI-08-01: Apple Quicktime Image File IDSC Atom Memory Corruption Vulnerability DVLabs Re: what is this? Thomas Pollet Re: NorfolkDesign.com proven track of excellence Nate McFeters Re: NorfolkDesign.com proven track of excellence Valdis . Kletnieks Re: NorfolkDesign.com proven track of excellence Nate McFeters Re: NorfolkDesign.com proven track of excellence scott Re: IN RESPONSE TO "Norfolkdesign.com theft and deceit" scott Re: NorfolkDesign.com proven track of excellence worried security Re: NorfolkDesign.com proven track of excellence Nate McFeters Re: what is this? auto71278 Hardware-based full disk encryption Frank Sanders Re: Hardware-based full disk encryption coderman Re: Hardware-based full disk encryption Fredrick Diggle Cisco Security Advisory: Cisco Unified Communications Manager CTL Provider Heap Overflow Cisco Systems Product Security Incident Response Team Re: Hardware-based full disk encryption Elazar Broad Peers static overflow in BitTorrent 6.0 and uTorrent 1.7.5 Luigi Auriemma TPTI-08-02: Cisco Call Manager CTLProvider Heap Overflow Vulnerability DVLabs Re: NorfolkDesign.com proven track of excellence Robert Allinson [ MDVSA-2008:014 ] - Updated apache 1.3.x packages fix multiple vulnerabilities security [ MDVSA-2008:015 ] - Updated apache 2.0.x packages fix multiple vulnerabilities security [USN-570-1] boost vulnerabilities Jamie Strandboge [ MDVSA-2008:016 ] - Updated apache 2.2.x packages fix multiple vulnerabilities security
Re: what is this? reepex Re: what is this? Paul Schmehl Re: what is this? worried security Re: what is this? reepex Re: what is this? damncon Re: what is this? Tremaine Lea Re: what is this? scott Gadi Bashing, enough already.... Richard Golodner Liba Cohn, Cruise Insurance -- What if You Get Sick on the Ship? Tips from Industry Expert Travel Insurance Services william romsay Re: what is this? SilentRunner Re: Hardware-based full disk encryption coderman Skype videomood XSS Miroslav Lučinskij Yahoo! CAPTCHA hacked John Wane Re: Liba Cohn, Cruise Insurance -- What if You Get Sick on the Ship? Tips from Industry Expert Travel Insurance Services guiness . stout Re: Gadi Bashing, enough already.... Epic [SECURITY] [DSA 1465-1] New apt-listchanges packages fix arbitrary code execution Steve Kemp Re: Liba Cohn, Cruise Insurance -- What if You Get Sick on the Ship? Tips from Industry Expert Travel Insurance Services guiness . stout Re: Gadi Bashing, enough already.... Fredrick Diggle [SECURITY] [DSA 1465-2] New apt-listchanges packages fix arbitrary code execution Steve Kemp Re: what is this? reepex Re: Gadi Bashing, enough already.... reepex Re: Gadi Bashing, enough already.... Fredrick Diggle [FDSA] Notepad Highly Critical Cross-Site Scripting (XSS) Vulnerability Fredrick Diggle Re: [FDSA] Notepad Highly Critical Cross-Site Scripting (XSS) Vulnerability Nate McFeters [FDSA] Sort - Critical Format String Vulnerability Fredrick Diggle Re: [FDSA] Notepad Highly Critical Cross-Site Scripting (XSS) Vulnerability T Biehn Re: [FDSA] Notepad Highly Critical Cross-Site Scripting (XSS) Vulnerability M . B . Jr . Re: Hardware-based full disk encryption Bill Stout Re: [FDSA] Notepad Highly Critical Cross-Site Scripting (XSS) Vulnerability str0ke Re: [FDSA] Notepad Highly Critical Cross-Site Scripting (XSS) Vulnerability Sascha Roeske SUSE Security Announcement: Xorg and XFree (SUSE-SA:2008:003) Thomas Biege rPSA-2008-0018-1 mysql mysql-bench mysql-server rPath Update Announcements rPSA-2008-0021-1 kernel rPath Update Announcements [SECURITY] [DSA 1466-1] New xorg-server packages fix several vulnerabilities Moritz Muehlenhoff Re: [FDSA] Notepad Highly Critical Cross-Site Scripting (XSS) Vulnerability Fredrick Diggle Re: Gadi Bashing, enough already.... Rob Thompson Re: [FDSA] Notepad Highly Critical Cross-Site Scripting (XSS) Vulnerability BlackHawk Re: Skype videomood XSS avivra Re: Gadi Bashing, enough already.... Valdis . Kletnieks Re: Gadi Bashing, enough already.... Valdis . Kletnieks Re: [FDSA] Notepad Highly Critical Cross-Site Scripting (XSS) Vulnerability M . B . Jr . iDefense Security Advisory 01.17.08: Multiple Vendor X Server XInput Extension Multiple Memory Corruption Vulnerabilities iDefense Labs iDefense Security Advisory 01.17.08: Multiple Vendor X Server TOG-CUP Extension Information Disclosure Vulnerability iDefense Labs iDefense Security Advisory 01.17.08: Multiple Vendor X Server EVI and MIT-SHM Extensions Integer Overflow Vulnerabilities iDefense Labs Re: what is this? Valdis . Kletnieks iDefense Security Advisory 01.17.08: Multiple Vendor X Server XFree86-Misc Extension Invalid Array Index Vulnerability iDefense Labs Re: what is this? Fredrick Diggle Re: [FDSA] Notepad Highly Critical Cross-Site Scripting (XSS) Vulnerability worried security Re: [FDSA] Notepad Highly CriticalCross-SiteScripting (XSS) Vulnerability Randal T. Rioux Re: what is this? Valdis . Kletnieks IMF 2008 - Call for Papers Oliver Goebel Re: what is this? Valdis . Kletnieks Re: what is this? Paul Schmehl ZDI-08-002: Citrix Presentation Server IMA Service Heap Overflow Vulnerability zdi-disclosures
Re: Liba Cohn, Cruise Insurance -- What if You Get Sick on the Ship? Tips from Industry Expert Travel Insurance Services James Rankin [USN-571-1] X.org vulnerabilities Kees Cook Re: [FDSA] Sort - Critical Format String Vulnerability Tonnerre Lombard [FIXED] Remote Denial of Service for SSH service at Dell DRAC4 (maybe Mocana SSH) Robert Scheck Re: [FDSA] Sort - Critical Format String Vulnerability Joey Mengele Re: [FDSA] Sort - Critical Format String Vulnerability Fredrick Diggle Re: [FDSA] Sort - Critical Format StringVulnerability Larry Seltzer Minute of Silence dxp Re: Minute of Silence Paul Schmehl Re: Minute of Silence Byron Sonne Re: Minute of Silence Joey Mengele Re: Minute of Silence T Biehn Re: Minute of Silence Fredrick Diggle Re: Gadi Bashing, enough already.... auto71278 Re: [FDSA] Sort - Critical Format String Vulnerability reepex Re: what is this? Fredrick Diggle Re: what is this? worried security [USN-572-1] apt-listchanges vulnerability Kees Cook
silentbaker trojan sample J B [USN-571-2] X.org regression Kees Cook [SECURITY] [DSA 1467-1] New mantis packages fix several vulnerabilities Thijs Kinkhorst [SECURITY] [DSA 1466-2] New xorg-server packages fix regression Moritz Muehlenhoff
[ GLSA 200801-07 ] Adobe Flash Player: Multiple vulnerabilities Robert Buchholz [ GLSA 200801-08 ] libcdio: User-assisted execution of arbitrary code Robert Buchholz [ MDVSA-2008:017 ] - Updated MySQL packages fix multiple vulnerabilities security [SECURITY] [DSA 1468-1] New tomcat5.5 packages fix several vulnerabilities Moritz Muehlenhoff [SECURITY] [DSA 1469-1] New flac packages fix arbitrary code execution Moritz Muehlenhoff sqlninja 0.2.2 released A. R. [ GLSA 200801-09 ] X.Org X server and Xfont library: Multiple vulnerabilities Robert Buchholz [SECURITY] [DSA 1470-1] New horde3 packages fix denial of service Moritz Muehlenhoff Fwd: Incident: High traffic social media sites being exploited worried security
[Professional IT Security Providers - Exposed] PlanNetGroup ( F ) secreview AXIGEN 5.0.x AXIMilter Format String Exploit hempel Re: [Professional IT Security Providers - Exposed] PlanNetGroup ( F ) Nate McFeters Call Jacking: Phreaking the BT Home Hub Adrian P old junk Micheal Turner RIAA site hacked. Again Tonu Samuel WifiZoo v1.3 released (minor release) Hernan Ochoa Pass-The-Hash Toolkit v1.2 released. Hernan Ochoa Re: [Professional IT Security Providers - Exposed] PlanNetGroup ( F ) SecReview Re: [Professional IT Security Providers -Exposed] PlanNetGroup ( F ) Jerry dePriest Re: [Professional IT Security Providers -Exposed] PlanNetGroup ( F ) Nate McFeters Re: [Professional IT Security Providers -Exposed] PlanNetGroup ( F ) Jerry dePriest [SECURITY] [DSA 1471-1] New libvorbis packages fix several vulnerabilities Moritz Muehlenhoff Re: [Professional IT Security Providers - Exposed] PlanNetGroup ( F ) Nate McFeters [SECURITY] [DSA 1472-1] New xine-lib packages fix arbitrary code execution Moritz Muehlenhoff Re: [Professional IT Security Providers - Exposed] PlanNetGroup ( F ) J. Oquendo [SECURITY] [DSA 1466-3] New xfree86 packages fix regression Moritz Muehlenhoff Re: [Professional IT Security Providers - Exposed] PlanNetGroup ( F ) Valdis . Kletnieks [SECURITY] [DSA 1473-1] New scponly packages fix arbitrary code execution Florian Weimer
[ MDVSA-2008:018 ] - Updated gFTP packages fix vulnerabilities security Re: [Professional IT Security Providers - Exposed] PlanNetGroup ( F ) Nick FitzGerald Re: [Professional IT Security Providers - Exposed] PlanNetGroup ( F ) damncon Re: [Professional IT Security Providers - Exposed] PlanNetGroup ( F ) Valdis . Kletnieks Re: [Professional IT Security Providers - Exposed] PlanNetGroup ( F ) Nate McFeters Re: [Professional IT Security Providers - Exposed] PlanNetGroup ( F ) Valdis . Kletnieks Re: [Professional IT Security Providers - Exposed] PlanNetGroup ( F ) Harry Hoffman Re: [Professional IT Security Providers - Exposed] PlanNetGroup ( F ) Maxim Re: [Professional IT Security Providers - Exposed] PlanNetGroup ( F ) reepex Re: [Professional IT Security Providers - Exposed] PlanNetGroup ( F ) Nick FitzGerald Re: [Professional IT Security Providers - Exposed] PlanNetGroup ( F ) Nick FitzGerald Re: [Professional IT Security Providers - Exposed] PlanNetGroup ( F ) Valdis . Kletnieks Re: [Professional IT Security Providers - Exposed] PlanNetGroup ( F ) reepex Re: [Professional IT Security Providers -Exposed] PlanNetGroup ( F ) nate . mcfeters Re: [Professional IT Security Providers - Exposed] PlanNetGroup ( F ) reepex Re: [Professional IT Security Providers - Exposed] PlanNetGroup ( F ) Harry Hoffman Re: [Professional IT Security Providers - Exposed] PlanNetGroup ( F ) Harry Hoffman Re: [Professional IT Security Providers - Exposed] PlanNetGroup ( F ) reepex Re: [Professional IT Security Providers -Exposed] PlanNetGroup ( F ) Derek Buelna Re: [Professional IT Security Providers - Exposed] PlanNetGroup ( F ) Pat Re: [Professional IT Security Providers - Exposed] PlanNetGroup ( F ) Nick FitzGerald Re: [Professional IT Security Providers - Exposed] PlanNetGroup ( F ) Paul Melson Re: [Professional IT Security Providers -Exposed] PlanNetGroup ( F ) nate . mcfeters Re: [Professional IT Security Providers - Exposed] PlanNetGroup ( F ) Pat Re: [Professional IT Security Providers - Exposed] PlanNetGroup ( F ) Nick FitzGerald Re: [Professional IT Security Providers - Exposed] PlanNetGroup ( F ) reepex Re: congenital idiots(dont u know who nick fitzgerald is?(now I KNOW why I never post in my real name)) Re: [Professional IT Security Providers - Exposed] PlanNetGroup ( F ) reepex Re: [Professional IT Security Providers - Exposed] PlanNetGroup ( F ) Pat Re: [Professional IT Security Providers - Exposed] PlanNetGroup ( F ) Nate McFeters Re: congenital idiots(dont u know who nick fitzgerald is?(now I KNOW why I never post in my real name)) Re: [Professional IT Security Providers - Exposed] PlanNetGroup ( F ) Nate McFeters [ MDVSA-2008:019 ] - Updated cairo packages fix vulnerability security HP Virtual Rooms WebHPVCInstall Control Multiple Buffer Overflows Elazar Broad Re: [Professional IT Security Providers - Exposed] PlanNetGroup ( F ) Eduardo Tongson Troopers 08 Security Conference, Call for Papers Enno Rey Some hashes for the record Sergio 'shadown' Alvarez Re: old junk reepex Firefox 2.0.0.11 Chrome Privilege Escalation PoC carl hardwick CarolinaCon-2008, March 28th-30th Vic Vandal Re: Skype videomood XSS avivra Apache mod_negotiation Xss and Http Response Splitting Minded Security Research Labs
[ MDVSA-2008:020 ] - Updated xine-lib packages fix remote code execution vulnerabilities security UPDATED VMSA-2008-0001.1 Moderate OpenPegasus PAM Authentication Buffer Overflow and updated service console packages VMware Security team Re: old junk Tonu Samuel PHP 5.2.5 cURL safe_mode bypass Maksymilian Arciemowicz Cisco Security Advisory: Cisco PIX and ASA Time-to-Live Vulnerability Cisco Systems Product Security Incident Response Team Cisco Security Advisory: Default Passwords in the Application Velocity System Cisco Systems Product Security Incident Response Team THIS IS NOT A SCAM: REAL TRUECRYPT FOR MACOS IS HERE! Fabio Pietrosanti (naif) [SECURITY] [DSA 1444-2] New php5 packages fix regression Moritz Muehlenhoff [SECURITY] [DSA 1474-1] New exiv2 packages fix arbitrary code execution Moritz Muehlenhoff [ GLSA 200801-10 ] TikiWiki: Multiple vulnerabilities Raphael Marichez
Directory Traversal Vulnerability in Aconon Mail Arno Töll [ MDVSA-2008:025 ] - Updated x11-server-xgl packages fix multiple vulnerabilities security iPhone remote DoS :( c0ntex [ MDVSA-2008:021 ] - Updated XFree86 packages fix multiple vulnerabilities security [ MDVSA-2008:022 ] - Updated xorg-x11 packages fix multiple vulnerabilities security [ MDVSA-2008:023 ] - Updated x11-server packages fix multiple vulnerabilities security [ MDVSA-2008:024 ] - Updated libxfont packages fix font handling vulnerability security Re: scada/plc gear gmaggro iDefense Security Advisory 01.22.08: IBM Tivoli PMfOSD HTTP Request Method Buffer Overflow Vulnerability iDefense Labs Project Chanology gmaggro iDefense Security Advisory 01.23.08: IBM AIX pioout BSS Buffer Overflow Vulnerability iDefense Labs Re: [Professional IT Security Providers - Exposed] PlanNetGroup ( F ) Dude VanWinkle Re: [Professional IT Security Providers - Exposed] PlanNetGroup ( F ) Valdis . Kletnieks rPSA-2008-0029-1 bind bind-utils rPath Update Announcements rPSA-2008-0030-1 CherryPy rPath Update Announcements Re: [Professional IT Security Providers - Exposed] PlanNetGroup ( F ) Dude VanWinkle Re: [Professional IT Security Providers - Exposed] PlanNetGroup ( F ) Valdis . Kletnieks wfuzz v1.4 - The web bruteforcer Christian Martorella Re: Project Chanology Phillip Partipilo
Re: [Professional IT Security Providers - Exposed] PlanNetGroup ( F ) Rob Michel Re: [Professional IT Security Providers - Exposed] PlanNetGroup ( F ) Valdis . Kletnieks Re: [Professional IT Security Providers - Exposed] PlanNetGroup ( F ) Dude VanWinkle Re: [Professional IT Security Providers - Exposed] PlanNetGroup ( F ) Nate McFeters Re: [Professional IT Security Providers - Exposed] PlanNetGroup ( F ) Dude VanWinkle Re: Bart Richard Cilfone A.k.a. Bart Cilfone ofUbersite, Boredatwork, Uber.fm... SilentRunner Re: [Professional IT Security Providers - Exposed] PlanNetGroup ( F ) Valdis . Kletnieks Re: Peers static overflow in BitTorrent 6.0 and uTorrent 1.7.5 Luigi Auriemma Re: Project Chanology Dude VanWinkle [ MDVSA-2008:026 ] - Updated icu packages fix vulnerabilities security
[ MDVSA-2008:027 ] - Updated pulseaudio packages fix local root vulnerability security Tool availability - browser DOM Checker Michal Zalewski Prominent lack of scientology ubershit on FD? cos Re: Prominent lack of scientology ubershit on FD? worried security Re: Project Chanology worried security Re: Project Chanology over9k Re: Project Chanology worried security Statcounter.com exposed credentials Gianni Amato Re: Project Chanology gmaggro Re: Project Chanology worried security Re: Project Chanology gmaggro Re: Project Chanology gmaggro [SECURITY] [DSA 1475-1] new gforge packages fix cross site scripting Thijs Kinkhorst Re: Project Chanology Dude VanWinkle
Selling codes exploiting 0-days vulnerabilities Gerrit-Jan Nieuwegein phpIP 4.3.2 - Numerous SQL Injection Vulnerablities Charles Hooper Re: Selling codes exploiting 0-days vulnerabilities T Biehn Move Networks Upgrade Manager QMPUpgrade.dll Buffer Overflow Elazar Broad Re: Selling codes exploiting 0-days vulnerabilities Shyaam Re: Selling codes exploiting 0-days vulnerabilities gmaggro [ GLSA 200801-11 ] CherryPy: Directory traversal vulnerability Robert Buchholz [ GLSA 200801-12 ] xine-lib: User-assisted execution of arbitrary code Robert Buchholz [ GLSA 200801-13 ] ngIRCd: Denial of Service Robert Buchholz [ GLSA 200801-14 ] Blam: User-assisted execution of arbitrary code Robert Buchholz [SECURITY] [DSA 1476-1] New pulseaudio packages fix privilege escalation Moritz Muehlenhoff [SECURITY] [DSA 1477-1] New yarssr packages fix arbitrary shell command execution Moritz Muehlenhoff asking about certificate shadow floating asking about certificate shadow floating Re: Welcome to the "Full-Disclosure" mailing list tlords
Patch for the http module from THC-Hydra: error handling the HTTP response codes Juan Galiana Re: Selling codes exploiting 0-days vulnerabilities coderman Re: Selling codes exploiting 0-days vulnerabilities lists Re: asking about certificate Lyal Collins Metasploit Framework v3.1 Released H D Moore Re: Metasploit Framework v3.1 Released Joey Mengele Re: Metasploit Framework v3.1 Released Joey Mengele Re: [MailServer Notification]Content Filtering Notification Joey Mengele 0day LINUX 0day LATEST wejwklekl246 Re: 0day LINUX 0day LATEST Andrew Farmer A friendly request on behalf of Bart Cilfone Donald Republic Re: 0day LINUX 0day LATEST atlas Re: A friendly request on behalf of Bart Cilfone Stack Smasher Re: 0day LINUX 0day LATEST kat Re: asking about certificate wilder_jeff Wilder Re: 0day LINUX 0day LATEST Andrew Dawson Re: Metasploit Framework v3.1 Released worried security Re: Project Chanology worried security CORE-2007-1219: Firebird Remote Memory Corruption Core Security Technologies Advisories Re: Metasploit Framework v3.1 Released Marco Ermini Re: Metasploit Framework v3.1 Released Dude VanWinkle Re: A friendly request on behalf of Bart Cilfone James D. Stallard Nipper update released Ian Ventura-Whiting Re: A friendly request on behalf of Bart Cilfone reepex Uninformed Journal Release Announcement: Volume 9 Uninformed Journal [SECURITY] [DSA 1478-1] New mysql-dfsg-5.0 packages fix several vulnerabilities Moritz Muehlenhoff Re: 0day LINUX 0day LATEST Valdis . Kletnieks Save XP scott Re: Save XP Larry Seltzer Re: Save XP Peter Dawson Re: Save XP Ed Carp Re: Save XP Paul Schmehl Re: Save XP T Biehn
Re: Save XP Valdis . Kletnieks Re: Save XP Larry Seltzer Re: Save XP dxp Re: Save XP T Biehn [ GLSA 200801-15 ] PostgreSQL: Multiple vulnerabilities Raphael Marichez Re: Save XP Vincent Archer Re: Save XP Steward Smith Re: Save XP Tremaine Lea Advisory: Tripwire Enterprise/Server XSS Vulnerability Liquidmatrix Security Digest [SECURITY] [DSA 1479-1] New Linux 2.6.18 packages fix several vulnerabilities dann frazier Re: Save XP Peter Besenbruch Re: Save XP blah Re: Save XP James Matthews [ GLSA 200801-16 ] MaraDNS: CNAME Denial of Service Raphael Marichez [ GLSA 200801-17 ] Netkit FTP Server: Denial of Service Raphael Marichez
Insecure Use of RC4 in LSrunasE and Supercrypt (CVE-2007-6340) Daniel Roethlisberger
Re: Save XP Bill Stout [ MDVSA-2008:028 ] - Updated MySQL packages fix multiple vulnerabilities security Re: Save XP Linval Thompson Re: [ GLSA 200801-17 ] Netkit FTP Server: Denial of Service Jamie Haggett Re: Save XP mgk.mailing Cisco Security Advisory: Cisco Wireless Control System Tomcat mod_jk.so Vulnerability Cisco Systems Product Security Incident Response Team Re: Save XP Dude VanWinkle dude vanwinkle turns against fergdawg, trendmicro worried security Re: Save XP scott [ GLSA 200801-19 ] GOffice: Multiple vulnerabilities Pierre-Yves Rofes [ GLSA 200801-20 ] libxml2: Denial of Service Pierre-Yves Rofes [ GLSA 200801-21 ] Xdg-Utils: Arbitrary command execution Pierre-Yves Rofes [ GLSA 200801-22 ] PeerCast: Buffer overflow Pierre-Yves Rofes MySpace Uploader ActiveX Control Buffer Overflow Elazar Broad [ MDVSA-2008:029 ] - Updated ruby packages fix possible man-in-the-middle attack security [ GLSA 200801-18 ] Kazehakase: Multiple vulnerabilities Pierre-Yves Rofes rPSA-2008-0032-1 xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs rPath Update Announcements Re: dude vanwinkle turns against fergdawg, trendmicro poo Multiple Remote File Inclusion Vulnerabilities in Mindmeld version 1.2.0.10 David Wharton Re: Save XP Tyler Reguly Livelink UTF-7 XSS Vulnerability David Kierznowski undersea cable cut and internet problem! crazy frog crazy frog Re: Save XP Peter Besenbruch Attackers can SkypeFind you avivra Re: Save XP Bill Stout back to high value targets gmaggro Re: back to high value targets Valdis . Kletnieks Re: back to high value targets gmaggro Re: back to high value targets Dude VanWinkle Re: back to high value targets Valdis . Kletnieks Re: back to high value targets gmaggro [USN-573-1] PulseAudio vulnerability Jamie Strandboge Re: back to high value targets coderman Re: back to high value targets coderman
[ MDVSA-2008:030 ] - Updated pcre packages fix vulnerability security Re: A friendly request on behalf of Bart Cilfone Fredrick Diggle Southwest Airlines Ticket Silliness Adam Chesnutt