Ask Tom Ferris' mom!
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200901-13
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -
I can hear n3td3v screaming and crying from here.
On Tue, Jan 20, 2009 at 9:00 AM, Razi Shaban wrote:
>On Tue, Jan 20, 2009 at 9:09 AM, Razi Shaban
>wrote:
>> On Mon, Jan 19, 2009 at 1:40 PM, Dave Kleiman
> wrote:
>>> If you have Seagate 7200.11 Drives you should seriously c
==
Secunia Research 20/01/2009
- OpenSG Radiance RGBE Buffer Overflow Vulnerability -
==
Table of Contents
Affected Software
==
Secunia Research 20/01/2009
- EasyHDR Pro Radiance RGBE Buffer Overflow -
==
Table of Contents
Affected Software...
==
Secunia Research 20/01/2009
- Trend Micro Network Security Component -
- Firewall Configuration Vulnerability -
==
Secunia Research 20/01/2009
- Trend Micro Network Security Component Vulnerabilities -
==
Table of Contents
Affected Software...
* Sebastian Krahmer:
> What do you mean by that? I looked at the glibc resolver,
> it might be that if getaddrinfo() does not get proper
> ai_family arguments of AF_INET, it will accept records.
> So, the application which thinks is using IPv4 DNS resolving
> will eventually connect using IPv
On Tue, Jan 20, 2009 at 9:09 AM, Razi Shaban
wrote:
> On Mon, Jan 19, 2009 at 1:40 PM, Dave Kleiman
wrote:
>> If you have Seagate 7200.11 Drives you should seriously consider
not using them for any valuable information storage, you might even
consider replacing them.
The Apache Jackrabbit community is pleased to announce the release of
Apache Jackrabbit version 1.5.2. The release is available for download
at:
http://jackrabbit.apache.org/downloads.html
See the full release notes below for details about this release.
Release Notes -- Apache Jackrabbit --
2009/1/19 andrew. wallace :
> On Mon, Jan 19, 2009 at 7:23 PM, Prototype This wrote:
>> Shut the fuck up. It you who trashed this mailing list ,
>
> No it was one abusive person who didn't like me who trashed it!
>
Repeating a lie doesn't make it true.
> Let's get back to business.
You made tha
Hi,
The papers pointed to by the others are basically straight
forward and not really new issues if you know how
ARP poisoning works. The thing that makes me wonder
and adds some new points is
'As soon as the "victim" has an IPv6 address issued by your radvd it will
prefer -entries over A-e
Server Version Info: Oracle-Application-Server-10g/10.1.3.1.0 Oracle-HTTP-Server
PoC: http://OC4J/web-app/foobar/%c0%ae%c0%ae/WEB-INF/web.xml
Related: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2938
Explaination: The "%c0%ae%c0%ae" is interpreted as: ".." because on
Java's side: "%c0%ae
13 matches
Mail list logo