-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[ITEM #1]
md5: 4650eefd79a2963a6b819757886a391b
sha1: 1d15c6d9890047e725c297976f217bf3f93b7b45
sha256:
6fba8628f72870cf98210a245a4fd0d02ed7883fe8f93e1a4a5969eb765a068e
[ITEM #2]
md5: c260f9a1aa47e8a324534bab47b2dcf1
sha1:
can someone please explain why a bunch of random
hashes are posted everyday in this mailing list?
what is the significance of the random hashes and why
should i read them everday?
--- Month of Random Hashes [EMAIL PROTECTED] wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[ITEM #1]
i think the real question is why didn't the month of random hashes
start on the first day of the month? because by my count it should be
DAY THIRTY today.
Anyway, FAQ is coming soon apparently. We eagerly await it.
On 6/30/07, Leet Sixteen [EMAIL PROTECTED] wrote:
can someone please explain
i didn't understand your poc.
you are copying the value of textarea into the file
input yourself using this code.
document.getElementById(text1).value=document.getElementById(file1).value;
document.getElementById(text1).focus();
so how is it a flaw?
--- carl hardwick [EMAIL PROTECTED] wrote:
PoC here: http://yathong.googlepages.com/FirefoxFocusBug.html
The vulnerability allows the attacker to silently redirect focus of
selected key press events to an otherwise protected file upload form
field. This is possible because of how onKeyDown event is handled,
allowing the focus to be moved
seems up to me as of this moment,
-nik
- Original Message -
From: Aditya K Sood [EMAIL PROTECTED]
To: scott [EMAIL PROTECTED];
full-disclosure@lists.grok.org.uk
Sent: Sunday, July 01, 2007 9:59 PM
Subject: Re: [Full-disclosure] DOS on phrack?
Yup scott
the
hi guys,
ref: http://blogs.zdnet.com/security/?p=334
so are they teasing by making her the impossible challenge at this date? :)
honeypot developers have been trying to battle the same issue of
making the virtual machine emulate guest OS like the it is run in real
hardware since some years now.
On 6/30/07, Michael Silk [EMAIL PROTECTED] wrote:
i think the real question is why didn't the month of random hashes
start on the first day of the month? because by my count it should be
DAY THIRTY today.
More like the month of lazy hashers :-P Oh, and where are the hashes
of hashes of random
Joanna has stated her technical requirements for the challenge and Thom and
group has accepted them, so why not turn this into what it really is... a
bet.
The losing team agrees to pay the other $350,000 - if both groups are really
so confident there shouldn't be any issue.
On 6/30/07, Bipin
This is a proof of concept for Google Authentication
issues posted in the threads...
1.)
http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/064143.html
(Orkut Server Side Management Error by Susam Pal
Vipul Agarwal)
2.)
This doesn't seem like a security flaw to me.
input type=file id=file1 name=file1
onkeydown=restore(); onkeyup=restore() /
label for=file1 id=label1 name=label1/label
br
textarea name=text1 id=text1
onkeydown=doKeyDown()
function doKeyDown()
{
document.getElementById(label1).focus();
}
On Sat, 30 Jun 2007, carl hardwick wrote:
The vulnerability allows the attacker to silently redirect focus of
selected key press events to an otherwise protected file upload form
field. This is possible because of how onKeyDown event is handled,
allowing the focus to be moved between the two.
On Sat, 30 Jun 2007, Joseph Hick wrote:
This doesn't seem like a security flaw to me.
This is somewhat similar to my focus stealing bugs described here:
http://lcamtuf.coredump.cx/focusbug/
...though seems to work on patched Firefox because of a clever use of
label-based aliasing.
Now, the
On 6/30/07, carl hardwick [EMAIL PROTECTED] wrote:
New flaw found in Firefox 2.0.0.4: Firefox file input focus vulnerabilities:
This demo is very simple. when you input some text in the textarea,
the file input element's value will also change to it. I tested it on
Firefox 1.5.0.12 and
On 7/1/07, ascii [EMAIL PROTECTED] wrote:
carl hardwick wrote:
PoC here: http://yathong.googlepages.com/FirefoxFocusBug.html
The vulnerability allows the attacker to silently redirect focus
[...]
many thanks for sharing this : )
it's a pretty serious vulnerability as said by Zalewski
On 6/30/07, Leet Sixteen [EMAIL PROTECTED] wrote:
can someone please explain why a bunch of random
hashes are posted everyday in this mailing list?
what is the significance of the random hashes and why
should i read them everday?
42
--
Guasconi Vincent
Etudiant.
On Saturday 30 June 2007 2:09 am, scott wrote:
It seems that Phrack.org is experiencing a serious DoS.I tried a few
times to connect today to no avail.
why is it that when a website is unavailable, the immediate assumption is that
is being attacked?
regards,
--
Jeff MacDonald,
Zoid
I'm one of the lucky (or possibly crazy) people that managed to get an
iPhone yesterday. If you're curious, I'm very happy with it so far. I'm not
an Apple nut that buys all things Apple, but after years of smartphones
that never seemed quite right, the iPhone really seems to have hit the mark.
18 matches
Mail list logo