In order not to affect people rest time, XCon2006 was time to change the following: Open Time: 2006-8-22 To 2006-8-24 XCon2006 the Fifth Information Security Conference will be held in Beijing, China, during August 22-24, 2006. China has long been known as a famous cultural country, while
Yes, shame on you.
If Rob took you to court, you'd be in big fucking trouble.
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Benjamin
Krueger
Sent: 05 July 2006 22:42
To: Slotto Corleone
Cc: full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure]
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 1104-2[EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
July 6th, 2006
For those who didn't read earlier: This isn't a bug, it's a feature.
The URL specified is DESIGNED to redirect, e-mailing Google about it is
simply going to make you look stupid.
Ed
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Javor
Ninov
Sent: 06
my opinion is that full disclosure is not for vendors ..
it's for users. full disclosure is for us to know how to
react on certain threads.
Which is just fine if you are technically competent to understand the
threat, and there is also a valid mitigating strategy you can employ
7EF
Telephone: +44(0)1483-226000 Email:[EMAIL PROTECTED]
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
__ NOD32 1.1646 (20060706
###
Luigi Auriemma
Application: Sparklet
http://sparklet.sourceforge.net
Versions: = 0.9.4try3
Platforms:Windows, *nix, *BSD and more
Bug: format string in client's
###
Luigi Auriemma
Application: Kaillera
http://www.kaillera.com
Versions: = 0.86
Platforms:Windows, Linux and FreeBSD
Bug: buffer-overflow
Exploitation: remote,
###
Luigi Auriemma
Application: AdPlug
http://adplug.sourceforge.net
Versions: = 2.0 and CVS = 04 Jul 2006
Platforms:Windows, DOS, *nix, *BSD and more
Bugs: A] heap
On 7/6/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: You can try so
[EMAIL PROTECTED] , they should answer very fast at this address...
They respond, but I wouldn't go as far to say very fast.
You're better having an inside contact, with a private e-mail address, then you really do get a very
On 7/6/06, Martin O'Neal [EMAIL PROTECTED] wrote:
my opinion is that full disclosure is not for vendors ..
it's for users. full disclosure is for us to know how to
react on certain threads.
Which is just fine if you are technically competent to understand the
threat, and there is also a
== == == TOC == == ==
1. Affected Vendor
2. Affected Product
3. Vulnerability
4. Safety Hazard
5. Disclosure Timeline
6. Vendor Response
7. Patch / Workaround
8. Vulnerability Details
-
== 1. Affected Vendor ==
Object Security
== 2. Affected Products ==
MICO - Mico
Hi to all!
Anyone knowns what is the f*ng security contact for IBM AIX?
--
Zer gutxi balio duen langileen bizitza
signature.asc
Description: Esta parte del mensaje está firmada digitalmente
___
Full-Disclosure - We believe in it.
Charter:
No, but try here:
[EMAIL PROTECTED]
[EMAIL PROTECTED] wrote on
07/06/2006 04:52:44 PM:
Hi to all!
Anyone knowns what is the f*ng security contact for IBM
AIX?
--
Zer gutxi balio duen langileen bizitza
[attachment signature.asc deleted by Bart Lansing/Corp/Kohls]
Quoting Joxean Koret ([EMAIL PROTECTED]):
Anyone knowns what is the security contact for IBM AIX?
[EMAIL PROTECTED]
You can use the following PGP key as well:
pub 1024D/1B14F299 2006-04-24 [expires: 2007-04-24]
Key fingerprint = ED29 18DB E87C 770D 49DC 07AF A1F3 7F26 1B14
On 7/6/06, Edward Pearson wrote:
Yes, shame on you.
If Rob took you to court, you'd be in big fucking trouble.
Wow, feel the hate.
evilrabbi pointed it out, but maybe you didn't catch it...court
records are public...
Benjamin Krueger spoke of, SSN, birthdate, and other personal data,
but
ZDI-06-021: WebEx Downloader Plug-in Code Execution Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-06-021.html
July 6, 2006
-- CVE ID:
CVE-2006-3423
-- Affected Vendor:
WebEx Communications
-- Affected Products:
WebEx Downloader Plug-in (tested on v2.0.0.7)
-- TippingPoint(TM)
Try IBM Serv listed below...
Strengthening AIX Security: A System-Hardening Approach
This paper provides a baseline of AIX security for system administrators and
offers guiding principles to help you begin securing your system.
http://www-03.ibm.com/servers/aix/whitepapers/aix_security.html
Eliah Kagan wrote:
On 7/6/06, Edward Pearson wrote:
Yes, shame on you.
If Rob took you to court, you'd be in big fucking trouble.
Wow, feel the hate.
evilrabbi pointed it out, but maybe you didn't catch it...court
records are public...
Benjamin Krueger spoke of, SSN, birthdate, and other
Several updates to First Microsoft Excel 0-day Vulnerability FAQ document at
http://blogs.securiteam.com/?p=451
has been done.
* Several exploits for this vuln and other Excel issues has been released
recently
* PoC sample file Nanika.xls was posted to Bugtraq on Monday already
(NOTE: Several
On 7/6/06, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
http://www.theregister.co.uk/2005/04/04/fingerprint_merc_chop/
Carjackers swipe biometric Merc, plus owner's finger
honestly, this guy should sue mercedes. this absoutely had to forsee
this possibility and they did not care. something like
21 matches
Mail list logo