Home page logo
/

421 messages starting Sep 01 09 and ending Oct 01 09
Date index | Thread index | Author index

Tuesday, 01 September

Vulnerable MSVC++ runtime distributed with OpenOffice.org 3.1.1 for Windows Stefan Kanthak
Secunia Research: OpenOffice.org Word Document Table Parsing Integer Underflow Secunia Research
Secunia Research: OpenOffice.org Word Document Table Parsing Buffer Overflow Secunia Research
Think Drupal was FLOSS and non-profit? Think again. Drupal is under attack
SEC Consult SA-20090901-0 :: File disclosure vulnerability in JSFTemplating, Mojarra Scales and GlassFish Application Server v3 Admin console Johannes Greil
Pwning Opera Unite with Inferno's Eleven Inferno
[BMSA-2009-06] Remote code execution in BKAV eOffice Nam Nguyen
[ MDVSA-2009:197 ] nss security
Re: Think Drupal was FLOSS and non-profit? Think again. BMF
[SECURITY] [DSA 1876-1] New dnsmasq packages fix remote code execution Florian Weimer
Nipper licensing dpcybuck
[USN-827-1] Dnsmasq vulnerabilities Jamie Strandboge
Re: Nipper licensing jlay

Wednesday, 02 September

[USN-810-2] NSS regression Kees Cook
Re: Nipper licensing Alan Buxey
Re: Microsoft Internet Information Server ftpd zeroday Guido Landi
Re: Nipper licensing BMF
Re: Microsoft Internet Information Server ftpd zeroday Vladimir '3APA3A' Dubrovin
Re: Microsoft Internet Information Server ftpd zeroday Guido Landi
Re: Nipper licensing Eric Sesterhenn
Re: Nipper licensing Fizz
Re: Nipper licensing dpcybuck
Re: Nipper licensing Valdis . Kletnieks
Re: Nipper licensing Fizz
Re: Nipper licensing Adriel T. Desautels
Re: Nipper licensing Alan Buxey
[SECURITY] [DSA 1878-1] New devscripts packages fix remote code execution Florian Weimer
Secunia PSI (RC3) - memory corruption condition exploit dev
Re: Secunia PSI (RC3) - memory corruption condition Thomas Kristensen
Re: Secunia PSI (RC3) - memory corruption condition exploit dev

Monday, 07 September

[ GLSA 200909-02 ] libvorbis: User-assisted execution of arbitrary code Alex Legler
Secunia Research: VMWare VMnc Codec Mismatched Dimensions Buffer Overflow Secunia Research
Re: What's with www.modsecurity.org Elazar Broad
IEhrepus 想跟您聊天 IEhrepus
[ GLSA 200909-01 ] Linux-PAM: Privilege escalation Alex Legler
[SECURITY] [DSA 1881-1] New cyrus-imapd packages fix arbitrary code execution Nico Golde
DefCon 17 CTF packet captures online Holt Sorenson
Re: why not a sandbox Elazar Broad
Re: why not a sandbox yersinia

Tuesday, 08 September

Windows Vista/7 : SMB2.0 NEGOTIATE PROTOCOL REQUEST Remote B.S.O.D. laurent gaffie
Re: DefCon 17 CTF packet captures online dreyer
Re: Microsoft Internet Information Server ftpd zeroday Thierry Zoller
[scip_Advisory 4021] IBM Lotus Notes 8.5 RSS Widget Privilege Escalation Marc Ruef
This is n3td3v and Gary McKinnon's lawyer. My client's have asburger syndrome. Central Security District of UK [MI7.5]
On the subject of security researcher n3td3v, Gary McKinnon "Autistic rockstar felon" Central Security District of UK [MI7.5]
[ MDVSA-2009:225 ] qt4 security
[USN-828-1] PAM vulnerability Kees Cook

Wednesday, 09 September

Web-monitoring software gathers data on kid chats Ivan .
Re: Web-monitoring software gathers data on kid chats dramacrat
Re: Web-monitoring software gathers data on kid chats Rohit Patnaik
Re: Web-monitoring software gathers data on kid chats Rafal M. Los
4f: The File Format Fuzzing Framework Krakow Labs
Cisco Security Advisory: TCP State Manipulation Denial of Service Vulnerabilities in Multiple Cisco Products Cisco Systems Product Security Incident Response Team
ZDI-09-062: Microsoft Internet Explorer JScript arguments Invocation Memory Corruption Vulnerability ZDI Disclosures
R. RHEL, RHCS, and Selinux : hype, reality or dream? yersinia
Re: This is n3td3v and Gary McKinnon's lawyer. My client's have asburger syndrome. full-censorship
[ GLSA 200909-03 ] Apache Portable Runtime, APR Utility Library: Execution of arbitrary code Alex Legler
[ GLSA 200909-04 ] Clam AntiVirus: Multiple vulnerabilities Alex Legler
[ GLSA 200909-05 ] Openswan: Denial of Service Alex Legler
[ GLSA 200909-06 ] aMule: Parameter injection Alex Legler
[ GLSA 200909-07 ] TkMan: Insecure temporary file usage Alex Legler
[ GLSA 200909-08 ] C* music player: Insecure temporary file usage Alex Legler
[ GLSA 200909-09 ] Screenie: Insecure temporary file usage Alex Legler
[ GLSA 200909-10 ] LMBench: Insecure temporary file usage Alex Legler
[ GLSA 200909-11 ] GCC-XML: Insecure temporary file usage Alex Legler
[SECURITY] [DSA 1882-1] New xapian-omega packages fix cross-site scripting Nico Golde
TCP/IP Orphaned Connections Vulnerability Fabian Yamaguchi
Re: Windows Vista/7 : SMB2.0 NEGOTIATE PROTOCOL REQUEST Remote B.S.O.D. randomguy
Re: This is n3td3v and Gary McKinnon's lawyer. My client's have asburger syndrome. Valdis . Kletnieks
CORE-2009-0820 - Dnsmasq Heap Overflow and Null-pointer Dereference on TFTP Server CORE Security Technologies Advisories
[ MDVSA-2009:226 ] aria2 security
Re: This is n3td3v and Gary McKinnon's lawyer. My client's have asburger syndrome. mrx
Re: This is n3td3v and Gary McKinnon's lawyer. My client's have asburger syndrome. randomguy

Thursday, 10 September

Question about police harassment. Police trying over years to "entrap" me as hacker. TheLearner
Re: Question about police harassment. Police trying over years to "entrap" me as hacker. Jeff MacDonald
Re: Question about police harassment. Police trying over years to "entrap" me as hacker. auto199984
Re: Question about police harassment. Police trying over years to "entrap" me as hacker. David Shaw
Re: Question about police harassment. Police trying over years to "entrap" me as hacker. Nick FitzGerald
Re: Windows Vista/7 : SMB2.0 NEGOTIATE PROTOCOL REQUEST Remote B.S.O.D. James Matthews
Re: This is n3td3v and Gary McKinnon's lawyer. My client's have asburger syndrome. D-vice
Re: Windows Vista/7 : SMB2.0 NEGOTIATE PROTOCOL REQUEST Remote B.S.O.D. D-vice
[SECURITY] [DSA 1883-1] New nagios2 packages fix several cross-site scriptings Steffen Joeris
Re: Windows Vista/7 : SMB2.0 NEGOTIATE PROTOCOLREQUEST Remote B.S.O.D. mutiny
[ MDVSA-2009:226 ] freeradius security
Re: Windows Vista/7 : SMB2.0 NEGOTIATE PROTOCOL REQUEST Remote B.S.O.D. Mitch Oliver
Plain Text Password Disclosure vulnerability in rediff mail kalyan
[USN-821-1] Firefox and Xulrunner vulnerabilities Jamie Strandboge
Re: Plain Text Password Disclosure vulnerability in rediff mail webDEViL
Re: Question about police harassment. Police trying over years to "entrap" me as hacker. T Biehn
Re: Question about police harassment. Police trying over years to "entrap" me as hacker. mrx
[USN-829-1] Qt vulnerability Jamie Strandboge

Friday, 11 September

Firefox <3.0.14 Multiplatform RCE via pkcs11.addmodule Dan Kaminsky
ZDI-09-063: Apple QuickTime H.264 Nal Unit Length Heap Overflow Vulnerability ZDI Disclosures
ZDI-09-064: Apple QuickTime FlashPix Sector Size Overflow Vulnerability ZDI Disclosures
ZDI-09-065: Mozilla Firefox TreeColumns Dangling Pointer Vulnerability ZDI Disclosures
Re: Plain Text Password Disclosure vulnerability in rediff mail awf awf
Re: Plain Text Password Disclosure vulnerability in rediff mail Dan Kaminsky
Friday the 11th of September 2009 full-censorship
Re: Plain Text Password Disclosure vulnerability in rediff mail dramacrat
[SECURITY] [DSA 1878-2] New devscripts packages fix regressions Florian Weimer
Re: Question about police harassment. Police trying over years to "entrap" me as hacker. mrx
Hack-Mail.net or similar site mamo
Re: Plain Text Password Disclosure vulnerability in rediff mail D-vice
Multiple Smartphones MMS Notification Sender Obfuscation c0rnholio
Multiple Smartphones SMS Sender Obfuscation via WAP Push SI c0rnholio
0xHACK - Oxford Info-Sec Group James Whayman
[ MDVSA-2009:229 ] cyrus-imapd security
Re: Windows Vista/7 : SMB2.0 NEGOTIATE PROTOCOL REQUEST Remote B.S.O.D. laurent gaffie
Re: 0xHACK - Oxford Info-Sec Group Lolek of TK53
Re: 0xHACK - Oxford Info-Sec Group Rohit Patnaik
A closed doors hands-on ITSec meeting Leandro Malaquias
[ MDVSA-2009:230 ] pidgin security
Re: Plain Text Password Disclosure vulnerability in rediff mail Valdis . Kletnieks
[ MDVSA-2009:231 ] htmldoc security
ShmooCon 2010 CFP Bruce Potter
[ MDVSA-2009:228 ] libneon security
[ MDVSA-2009:197-2 ] nss security
[ MDVSA-2009:232 ] libsamplerate security
Re: Plain Text Password Disclosure vulnerability in rediff mail full-censorship
Re: Plain Text Password Disclosure vulnerability in rediff mail Valdis . Kletnieks
Re: Plain Text Password Disclosure vulnerability in rediff mail full-censorship
Re: Plain Text Password Disclosure vulnerability in rediff mail Rohit Patnaik

Saturday, 12 September

Re: Plain Text Password Disclosure vulnerability in rediff mail mrx
Re: Plain Text Password Disclosure vulnerability in rediff mail Lincoln Anderson
nullcon Goa 2010 Call For Papers nullcon nullcon
Re: Hack-Mail.net or similar site TheLearner
Re: 0xHACK - Oxford Info-Sec Group TheLearner
Re: Hack-Mail.net or similar site dramacrat
[ GLSA 200909-12 ] HTMLDOC: User-assisted execution of arbitrary code Alex Legler
[ GLSA 200909-13 ] irssi: Execution of arbitrary code Alex Legler
[ GLSA 200909-14 ] Horde: Multiple vulnerabilities Alex Legler
[ GLSA 200909-15 ] Lynx: Arbitrary command execution Alex Legler
Re: Hack-Mail.net or similar site Andrew Farmer

Sunday, 13 September

Internet Explorer 8 Crash @ Sourceforge Jeremy Brown
Re: Internet Explorer 8 Crash @ Sourceforge Jeremy Brown
Re: Internet Explorer 8 Crash @ Sourceforge Jordan Bray
Re: Internet Explorer 8 Crash @ Sourceforge Lane Christiansen
Re: Internet Explorer 8 Crash @ Sourceforge Rohit Patnaik
Re: Internet Explorer 8 Crash @ Sourceforge Rohit Patnaik
Re: Internet Explorer 8 Crash Kema Druma
Re: Internet Explorer 8 Crash Jeremy Brown
Re: FreeBSD <= 6.1 kqueue() NULL pointer dereference Przemyslaw Frasunek
Re: ShmooCon 2010 CFP Buherátor
[ GLSA 200909-17 ] ZNC: Directory traversal Tobias Heinlein
[ GLSA 200909-16 ] Wireshark: Denial of Service Tobias Heinlein

Monday, 14 September

Re: Windows Vista/7 : SMB2.0 NEGOTIATE PROTOCOL REQUEST Remote B.S.O.D. Randal T. Rioux
Presentation of Message-ID Fingerprinting Tool Marc Ruef
PakBugs.Com Report Catch Them
Re: PakBugs.Com Report TheLearner
Re: PakBugs.Com Report Rohit Patnaik
[SECURITY] [DSA 1883-2] New nagios2 packages fix regression Steffen Joeris
Re: Windows Vista/7 : SMB2.0 NEGOTIATE PROTOCOL REQUEST Remote B.S.O.D. D-vice
Re: Windows Vista/7 : SMB2.0 NEGOTIATE PROTOCOL REQUEST Remote B.S.O.D. Randal T. Rioux
Re: Plain Text Password Disclosure vulnerability in rediff mail D-vice
PakBugs.Com Report full-censorship
[SECURITY] [DSA 1885-1] New xulrunner packages fix several vulnerabilities Moritz Muehlenhoff
[SECURITY] [DSA 1886-1] New iceweasel packages fix several vulnerabilities Moritz Muehlenhoff
Re: Windows Vista/7 : SMB2.0 NEGOTIATE PROTOCOL REQUEST Remote B.S.O.D. r1d1nd1rty
[SECURITY] [DSA 1884-1] New nginx packages fix arbitrary code execution Nico Golde
Distribution of passwords between man and women Tõnu Samuel
[USN-830-1] OpenSSL vulnerability Marc Deslauriers
[USN-831-1] OpenEXR vulnerabilities Marc Deslauriers
Re: Windows Vista/7 : SMB2.0 NEGOTIATE PROTOCOL REQUEST Remote B.S.O.D. Randal T. Rioux
Plain Text Password Disclosure vulnerability in rediff mail full-censorship
Re: Hack-Mail.net or similar site mamo
Re: Hack-Mail.net or similar site maxigas
[ MDVSA-2009:233 ] kernel security

Tuesday, 15 September

Andrew Aurenheimer aka weev gets tree'd GOBBLES
Re: Andrew Aurenheimer aka weev gets tree'd Andrew A
Re: Andrew Aurenheimer aka weev gets tree'd Valdis' Mustache
Re: Andrew Aurenheimer aka weev gets tree'd GOBBLES
Re: Andrew Aurenheimer aka weev gets tree'd Andrew A
Re: Hack-Mail.net or similar site Augusto Pereyra
Re: Andrew Aurenheimer aka weev gets tree'd Valdis' Mustache
Andrew Auernheimer aka weev gets tree'd GOBBLES
Andrew Aurenheimer aka weev gets tree'd full-censorship
Re: PakBugs.Com Report Haris Pilton
Re: Plain Text Password Disclosure vulnerability in rediff mail D-vice
Re: Distribution of passwords between man and women Anıl Kurmuş
Re: Distribution of passwords between man and women Tõnu Samuel
CVE-2009-2958 srujan
CVE-2009-2958 srujan
Re: PakBugs.Com Report Jan G.B.
Re: Andrew Aurenheimer aka weev gets tree'd Valdis . Kletnieks
[ MDVSA-2009:234 ] silc-toolkit security
[ MDVSA-2009:234-1 ] silc-toolkit security
[ MDVSA-2009:235 ] silc-toolkit security
[SECURITY] [DSA 1887-1] New rails packages fix cross-site scripting Steffen Joeris
Re: Hack-Mail.net or similar site maxigas
Re: 3rd party patch for XP for MS09-048? Susan Bradley
Re: 3rd party patch for XP for MS09-048? Susan Bradley
[SECURITY] [DSA 1888-1] New openssl packages deprecate MD2 hash signatures Moritz Muehlenhoff
Re: 3rd party patch for XP for MS09-048? Susan Bradley
ANNOUNCE: RFIDIOt release - v0.z - 16th September, 2009 Adam Laurie

Wednesday, 16 September

Re: Hack-Mail.net or similar site Zach Riggle
Re: PakBugs.Com Report Lane Christiansen
Re: Andrew Aurenheimer aka weev gets tree'd Andrew A
Re: Andrew Aurenheimer aka weev gets tree'd Ronny Lawson
Re: Andrew Aurenheimer aka weev gets tree'd Valdis . Kletnieks
Re: Andrew Aurenheimer aka weev gets tree'd Ronny Lawson
Re: Andrew Aurenheimer aka weev gets tree'd Ronny Lawson
Exploiting Chrome and Opera's inbuilt ATOM/RSS reader with Script Execution and m ore Inferno
Re: Exploiting Chrome and Opera's inbuilt ATOM/RSS reader with Script Execution and more Michal Zalewski
Re: PakBugs.Com Report Anders Klixbull
Re: PakBugs.Com Report Jan G.B.
Re: Exploiting Chrome and Opera's inbuilt ATOM/RSS reader with Script Execution and more Inferno
Re: 3rd party patch for XP for MS09-048? Jeffrey Walton
Re: 3rd party patch for XP for MS09-048? Jeffrey Walton
Re: 3rd party patch for XP for MS09-048? Eric Kimminau
Re: 3rd party patch for XP for MS09-048? Matt Riddell
Re: 3rd party patch for XP for MS09-048? Eric C. Lukens
3rd party patch for XP for MS09-048? Aras \"Russ\" Memisyazici
Re: PakBugs.Com Report Catch Them
Re: 3rd party patch for XP for MS09-048? Thor (Hammer of God)
Re: 3rd party patch for XP for MS09-048? Thor (Hammer of God)
PakBugs.Com Report full-censorship
Re: 3rd party patch for XP for MS09-048? Larry Seltzer
Re: 3rd party patch for XP for MS09-048? Thor (Hammer of God)
Re: 3rd party patch for XP for MS09-048? Susan Bradley
Re: 3rd party patch for XP for MS09-048? Tom Grace
Re: 3rd party patch for XP for MS09-048? James Lay
Iret #GP on pre-commit handling failure: the NetBSD case (CVE-2009-2793) Julien TINNES
Re: 3rd party patch for XP for MS09-048? Thor (Hammer of God)
Re: 3rd party patch for XP for MS09-048? Valdis . Kletnieks
Re: 3rd party patch for XP for MS09-048? Susan Bradley
[SECURITY] [DSA 1889-1] New icu packages correct multibyte sequence parsing Moritz Muehlenhoff
[USN-832-1] FreeRADIUS vulnerability Marc Deslauriers
Re: 3rd party patch for XP for MS09-048? Larry Seltzer
Re: Andrew Aurenheimer aka weev gets tree'd GOBBLES
Re: 3rd party patch for XP for MS09-048? Peter Besenbruch

Thursday, 17 September

Re: 3rd party patch for XP for MS09-048? Rohit Patnaik
Re: Andrew Aurenheimer aka weev gets tree'd zewbiechan () gmail com
Re: Andrew Auerenheimer aka weev gets tree'd Valdis' Mustache
Re: Andrew Auerenheimer aka weev gets tree'd BMF
Re: Andrew Auerenheimer aka weev gets tree'd zewb
Re: Andrew Auerenheimer aka weev gets tree'd dramacrat
Re: Andrew Auerenheimer aka weev gets tree'd Anders Klixbull
Quiksoft EasyMail 6.0.3.0 imap connect() ActiveX stack overflow exploit Sebastian Wolfgarten
Quiksoft EasyMail 6 (AddAttachment) Remote Buffer Overflow Exploit bmgsec
Re: 3rd party patch for XP for MS09-048? Susan Bradley
SEC Consult SA-20090917-0 :: RADactive I-Load Multiple Vulnerabilities Stefan Streichsbier
Re: Andrew Aurenheimer aka weev gets tree'd T Biehn
Peiter "Mudge" Zatko petition to be named U.S. Cybersecurity Chief The Sp3ctacle
Re: Andrew Auerenheimer aka weev gets tree'd frank^2
Re: 3rd party patch for XP for MS09-048? Susan Bradley
Peiter "Mudge" Zatko petition to be named U.S. Cybersecurity Chief full-censorship
Re: Peiter "Mudge" Zatko petition to be named U.S. Cybersecurity Chief Randal T. Rioux
SecurityReason: glibc x<=2.10.1 stdio/strfmon.c Multiple vulnerabilities Maksymilian Arciemowicz
Re: 3rd party patch for XP for MS09-048? John Morrison
Re: 3rd party patch for XP for MS09-048? Aras \"Russ\" Memisyazici
Cross-Site Scripting attacks via redirectors in different browsers MustLive
List Charter John Cartwright

Friday, 18 September

[USN-833-1] KDE-Libs vulnerability Jamie Strandboge
Re: Andrew Auerenheimer aka weev gets tree'd Jubei Trippataka
Advisory 01/2009: Horde_Form_Type_image Arbitrary File Overwrite Vulnerability Stefan Esser
Advisory: Crypto backdoor in Qnap storage devices (CVE-2009-3200) Marc Heuse
Re: Advisory: Crypto backdoor in Qnap storage devices (CVE-2009-3200) Rohit Patnaik
Re: Cross-Site Scripting attacks via redirectors in different browsers darky
[ GLSA 200909-18 ] nginx: Remote execution of arbitrary code Alex Legler
Re: Advisory: Crypto backdoor in Qnap storage devices (CVE-2009-3200) Marc Heuse

Saturday, 19 September

Re: Andrew Auerenheimer aka weev gets tree'd GOBBLES
Re: Andrew Aurenheimer aka weev gets tree'd GOBBLES
[SECURITY] [DSA 1890-1] New wxwidgets packages fix arbitrary code execution Steffen Joeris
n3td3v's Twitter account hacked The Security Community
Re: n3td3v's Twitter account hacked Gichuki John Chuksjonia
No subject full-censorship

Sunday, 20 September

Re: Cross-Site Scripting attacks via redirectors in different browsers Tõnu Samuel
[ MDVSA-2009:236 ] firefox security
Re: [inbox] n3td3v's Twitter account hacked Exibar
[ GLSA 200909-19 ] Dnsmasq: Multiple vulnerabilities Alex Legler

Monday, 21 September

Re: DoS vulnerability in Mozilla Firefox YGN Ethical Hacker Group (http://yehg.net)
DoS vulnerability in Mozilla Firefox MustLive
DEFCON London - September 2009 Meet - Thursday 24th Major Malfunction
[scip_Advisory 4020] Check Point Connectra R62 Login Script Injection Vulnerability Stefan Friedli
[USN-834-1] PostgreSQL vulnerabilities Jamie Strandboge
0xHACK - Wednesday, September 23rd, 2009 James Whayman
[ MDVSA-2009:237 ] openssl security
[ MDVSA-2009:238 ] openssl security
[USN-835-1] neon vulnerabilities Kees Cook
List of security conferences TK
Re: List of security conferences Shawn Merdinger
Re: List of security conferences cr01nk zer0
Re: List of security conferences Packet Storm
Re: List of security conferences Byron Sonne
List of security conferences full-censorship

Tuesday, 22 September

Chargebacks and credit card frauds Steven Anders
Re: Chargebacks and credit card frauds BMF
Re: Chargebacks and credit card frauds Andrew Haninger
Re: Chargebacks and credit card frauds Iadnah
[SECURITY] [DSA 1891-1] New changetrack packages fix arbitrary code execution Steffen Joeris
Re: Chargebacks and credit card frauds mrx
[ MDVSA-2009:239 ] openssl security
[ MDVSA-2009:240 ] apache security
[ MDVSA-2009:241 ] squid security
[ MDVSA-2009:242 ] dovecot security
Dumb question: Is Windows box behind a router safe ? Steven Anders
Re: Chargebacks and credit card frauds Steven Anders
[ MDVSA-2009:242-1 ] dovecot security
Re: Dumb question: Is Windows box behind a router safe ? Kos
Re: Dumb question: Is Windows box behind a router safe ? G. D. Fuego
Re: Dumb question: Is Windows box behind a router safe ? Abhijeet Jain
Re: Dumb question: Is Windows box behind a router safe ? Valdis . Kletnieks
Re: Dumb question: Is Windows box behind a router safe ? john s
Re: Dumb question: Is Windows box behin d a router safe ? a.kuriger
Re: Dumb question: Is Windows box behind a router safe ? yersinia
Re: Dumb question: Is Windows box behind a router safe ? Robert Portvliet
Re: Dumb question: Is Windows box behind a router safe ? Brian Anderson
Re: Dumb question: Is Windows box behind a router safe ? Elonym (elone)
Re: Dumb question: Is Windows box behind a router safe ? Rohit Patnaik
Re: Dumb question: Is Windows box behind a router safe ? Rohit Patnaik
Re: Dumb question: Is Windows box behind a router safe ? Chris
Re: Dumb question: Is Windows box behind a router safe ? G. D. Fuego
Re: Chargebacks and credit card frauds T Biehn
Re: Dumb question: Is Windows box behind a router safe ? john s
Call For Papers - Hackers 2 Hackers Conference 6th Edition - Brazil Rodrigo Rubira Branco (BSDaemon)

Wednesday, 23 September

Executing Code on Linux/x86 with ASLR+GCC4 Protections Lucus Rife
[ MDVSA-2009:243 ] freetype2 security
Re: Dumb question: Is Windows box behind a router safe ? Michael Fritscher
Re: Dumb question: Is Windows box behind a router safe ? Dave
Re: Cross-Site Scripting attacks via redirectors in different browsers MustLive
Re: Dumb question: Is Windows box behind a router safe ? vulcanius
PHP file vulnerable on SMF 1.1.10 bro
Re: PHP file vulnerable on SMF 1.1.10 Elonym (elone)
Re: Dumb question: Is Windows box behind a router safe ? Chris
Re: Dumb question: Is Windows box behind a router safe ? Chris
Re: Dumb question: Is Windows box behind a router safe ? OTB
Re: Dumb question: Is Windows box behind a router safe ? Steven Anders
Re: Executing Code on Linux/x86 with ASLR+GCC4Protections Jeremi Gosney
nginx - low risk webdav destination bug Kingcope
Re: PHP file vulnerable on SMF 1.1.10 » Ruben Alves
Re: PHP file vulnerable on SMF 1.1.10 Anastasios Monachos
Re: Dumb question: Is Windows box behind a router safe ? Elonym (elone)
HaXor and Developer training Jared DeMott
Re: Dumb question: Is Windows box behind a router safe ? Camilo Uribe
[USN-836-1] WebKit vulnerabilities Marc Deslauriers
Re: Dumb question: Is Windows box behind a router safe ? Jeff Kell
Re: PHP file vulnerable on SMF 1.1.10 » Ruben Alves
Re: Dumb question: Is Windows box behind a router safe ? john s
Re: Chargebacks and credit card frauds Anıl Kurmuş
Re: Chargebacks and credit card frauds T Biehn
Cisco Security Advisory: Cisco Unified Communications Manager Session Initiation Protocol Denial of Service Vulnerability Cisco Systems Product Security Incident Response Team
Cisco Security Advisory: Cisco IOS Software Object-group Access Control List Bypass Vulnerability Cisco Systems Product Security Incident Response Team
Cisco Security Advisory: Cisco Unified Communications Manager Express Vulnerability Cisco Systems Product Security Incident Response Team
Cisco Security Advisory: Cisco IOS Software H.323 Denial of Service Vulnerability Cisco Systems Product Security Incident Response Team
Cisco Security Advisory: Cisco IOS Software Zone-Based Policy Firewall Vulnerability Cisco Systems Product Security Incident Response Team
Cisco Security Advisory: Cisco IOS Software Network Time Protocol Packet Vulnerability Cisco Systems Product Security Incident Response Team
Cisco Security Advisory: Cisco IOS Software Session Initiation Protocol Denial of Service Vulnerability Cisco Systems Product Security Incident Response Team
Cisco Security Advisory: Cisco IOS Software Internet Key Exchange Resource Exhaustion Vulnerability Cisco Systems Product Security Incident Response Team
Cisco Security Advisory: Cisco IOS Software Crafted Encryption Packet Denial of Service Vulnerability Cisco Systems Product Security Incident Response Team
[ MDVSA-2009:244 ] xfig security
Re: Executing Code on Linux/x86 with ASLR+GCC4Protections Jeremy Brown
Cisco Security Advisory: Cisco IOS Software Authentication Proxy Vulnerability Cisco Systems Product Security Incident Response Team
Cisco Security Advisory: Cisco IOS Software Tunnels Vulnerability Cisco Systems Product Security Incident Response Team
Avast aswMon2.sys kernel memory corruption and Local Privilege Escalation evil fingers
[SECURITY] [DSA 1892-1] New dovecot packages fix arbitrary code execution Steffen Joeris
[SECURITY] [DSA 1893-1] New cyrus-imapd-2.2/kolab-cyrus-imapd packages fix arbitrary code execution Steffen Joeris
Audited by Netcraft... any feedback jk3380
Re: Executing Code on Linux/x86 with ASLR+GCC4Protections Jeremy Brown
Re: Executing Code on Linux/x86 with ASLR+GCC4Protections Jeremi Gosney
ZDI-09-066: Adobe RoboHelp Server Arbitrary File Upload and Execute Vulnerability ZDI Disclosures

Thursday, 24 September

[ MDVSA-2009:243-1 ] freetype2 security
Re: Dumb question: Is Windows box behind a router safe ? Mary Landesman
CFS 09/October 5-6 Updated Speaker/Session List Trish M
[SECURITY] [DSA 1894-1] New newt packages fix arbitrary code execution Steffen Joeris
[USN-837-1] Newt vulnerability Marc Deslauriers
[ MDVSA-2009:245 ] glib2.0 security
PakBugs.com Aftermath. Catch Them
Cross-Site Scripting vulnerability in E107 MustLive
[SECURITY] [DSA 1895-1] New xmltooling packages fix potential code execution Florian Weimer

Friday, 25 September

Cisco ACE XML Gateway <= 6.0 Internal IP disclosure nitrØus
Re: Cisco ACE XML Gateway <= 6.0 Internal IP disclosure Richard Cyrios
Re: Cisco ACE XML Gateway <= 6.0 Internal IP disclosure Jeremy Brown
Attacks via redirectors MustLive
Drupal Bibliography 6.x-1.6 XSS Vuln Black Packeteer
Drupal Bibliography 6.x-1.6 XSS Vuln Black Packeteer
Re: Cisco ACE XML Gateway <= 6.0 Internal IP disclosure Valdis . Kletnieks
Re: Cisco ACE XML Gateway <= 6.0 Internal IPdisclosure Paul Oxman (poxman)
[ GLSA 200909-20 ] cURL: Certificate validation error Alex Legler
[ MDVSA-2009:246 ] php security
[ MDVSA-2009:247 ] php security
[ MDVSA-2009:248 ] php security

Sunday, 27 September

[ MDVSA-2009:249 ] newt security
Windows 7 Launch Party hosted by JTTF and Andrew Auernheimer David Kernell [rubico]

Monday, 28 September

[SECURITY] [DSA 1896-1] New Shibboleth 1.x packages fix potential code execution Florian Weimer
Vulnerabilities in E107 MustLive
[SECURITY] [DSA 1897-1] New horde3 packages fix arbitrary code execution Nico Golde
[USN-838-1] Dovecot vulnerabilities Marc Deslauriers
Full Path Disclosure in most wordpress' plugins [?] Fernando A. Lagos B.
Drupal XML-Sitemap 5.x-1.6 XSS Vulnerability Black Packeteer
For sale - Microsoft Internet Explorer 0day Freddie Vicious
Re: Full Path Disclosure in most wordpress' plugins [?] majinboo
Re: Full Path Disclosure in most wordpress' plugins [?] Fernando A. Lagos B.
Re: Full Path Disclosure in most wordpress' plugins [?] Glafkos Charalambous
Re: Full Path Disclosure in most wordpress' plugins [?] Fernando A. Lagos B.

Tuesday, 29 September

WinRAR v3.80 - ZIP Filename Spoofing chr1x
Cross-Site Scripting vulnerability in eCaptcha MustLive
Re: Full Path Disclosure in most wordpress' plugins [?] Jan G.B.
Re: Full Path Disclosure in most wordpress' plugins [?] Loaden
Re: Full Path Disclosure in most wordpress' plugins [?] Peter Bruderer
Modifying SSH to Capture Login Credentials from Attackers my.hndl
Re: Modifying SSH to Capture Login Credentials from Attackers Kurth Bemis
Re: Modifying SSH to Capture Login Credentials from Attackers Kos
Re: Full Path Disclosure in most wordpress' plugins [?] Glafkos Charalambous
Re: Modifying SSH to Capture Login Credentials from Attackers my.hndl
Re: Modifying SSH to Capture Login Credentials from Attackers Kurth Bemis
Re: Modifying SSH to Capture Login Credentials from Attackers bodik () civ zcu cz

Wednesday, 30 September

Re: Modifying SSH to Capture Login Credentials from Attackers maxigas
MD5 hash extension attack breaks API authentication of Flickr and other online services Juliano Rizzo
Re: Modifying SSH to Capture Login Credentials from Attackers Gichuki John Chuksjonia
Re: Full Path Disclosure in most wordpress' plugins [?] majinboo
Re: Modifying SSH to Capture Login Credentials from Attackers jfch
Re: Modifying SSH to Capture Login Credentials from Attackers dramacrat
gameforge.de gaming platform (validated for: kingsage.gr) authentication bypass (using hashed values) and cross site scripting mestre rigel
Re: Full Path Disclosure in most wordpress' plugins [?] Glafkos Charalambous
Re: DoS vulnerability in Mozilla Firefox MustLive
Re: Modifying SSH to Capture Login Credentials from Attackers Fernando A. Lagos B.
Re: Full Path Disclosure in most wordpress' plugins [?] James Matthews
[ MDVSA-2009:176 ] postgresql security
[ MDVSA-2009:177 ] postgresql security
[ MDVSA-2009:178 ] perl-IO-Socket-SSL security

Thursday, 01 October

THOTCON 0x1 - Call For Papers is Open -> October 1, 2009 THOTCON Announce
Previous period Next period
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]