[Full-disclosure] How do you make an ugly ass baby?

2009-01-20 Thread Professor Micheal Chatner
Ask Tom Ferris' mom! ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] [ GLSA 200901-13 ] Pidgin: Multiple vulnerabilities

2009-01-20 Thread Pierre-Yves Rofes
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200901-13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - -

Re: [Full-disclosure] Seagate 7200.11 Drives attempted scam

2009-01-20 Thread vulcanius
I can hear n3td3v screaming and crying from here. On Tue, Jan 20, 2009 at 9:00 AM, Razi Shaban wrote: >On Tue, Jan 20, 2009 at 9:09 AM, Razi Shaban >wrote: >> On Mon, Jan 19, 2009 at 1:40 PM, Dave Kleiman > wrote: >>> If you have Seagate 7200.11 Drives you should seriously c

[Full-disclosure] Secunia Research: OpenSG Radiance RGBE Buffer Overflow Vulnerability

2009-01-20 Thread Secunia Research
== Secunia Research 20/01/2009 - OpenSG Radiance RGBE Buffer Overflow Vulnerability - == Table of Contents Affected Software

[Full-disclosure] Secunia Research: EasyHDR Pro Radiance RGBE Buffer Overflow

2009-01-20 Thread Secunia Research
== Secunia Research 20/01/2009 - EasyHDR Pro Radiance RGBE Buffer Overflow - == Table of Contents Affected Software...

[Full-disclosure] Secunia Research: Trend Micro NSC Firewall Configuration Vulnerability

2009-01-20 Thread Secunia Research
== Secunia Research 20/01/2009 - Trend Micro Network Security Component - - Firewall Configuration Vulnerability -

[Full-disclosure] Secunia Research: Trend Micro Network Security Component Vulnerabilities

2009-01-20 Thread Secunia Research
== Secunia Research 20/01/2009 - Trend Micro Network Security Component Vulnerabilities - == Table of Contents Affected Software...

Re: [Full-disclosure] Exploitation of unused IPv6-capabilities

2009-01-20 Thread Florian Weimer
* Sebastian Krahmer: > What do you mean by that? I looked at the glibc resolver, > it might be that if getaddrinfo() does not get proper > ai_family arguments of AF_INET, it will accept records. > So, the application which thinks is using IPv4 DNS resolving > will eventually connect using IPv

[Full-disclosure] Seagate 7200.11 Drives attempted scam

2009-01-20 Thread Razi Shaban
On Tue, Jan 20, 2009 at 9:09 AM, Razi Shaban wrote: > On Mon, Jan 19, 2009 at 1:40 PM, Dave Kleiman wrote: >> If you have Seagate 7200.11 Drives you should seriously consider not using them for any valuable information storage, you might even consider replacing them.

[Full-disclosure] [ANNOUNCE] Apache Jackrabbit 1.5.2 released

2009-01-20 Thread Jukka Zitting
The Apache Jackrabbit community is pleased to announce the release of Apache Jackrabbit version 1.5.2. The release is available for download at: http://jackrabbit.apache.org/downloads.html See the full release notes below for details about this release. Release Notes -- Apache Jackrabbit --

Re: [Full-disclosure] Closure of political threads

2009-01-20 Thread Jan G.B.
2009/1/19 andrew. wallace : > On Mon, Jan 19, 2009 at 7:23 PM, Prototype This wrote: >> Shut the fuck up. It you who trashed this mailing list , > > No it was one abusive person who didn't like me who trashed it! > Repeating a lie doesn't make it true. > Let's get back to business. You made tha

Re: [Full-disclosure] Exploitation of unused IPv6-capabilities

2009-01-20 Thread Sebastian Krahmer
Hi, The papers pointed to by the others are basically straight forward and not really new issues if you know how ARP poisoning works. The thing that makes me wonder and adds some new points is 'As soon as the "victim" has an IPv6 address issued by your radvd it will prefer -entries over A-e

[Full-disclosure] Oracle Containers For Java Directory Traversal (OC4J) Oracle Application Server 10g (10.1.3.1.0) Oracle HTTP Server

2009-01-20 Thread Eduardo Vela
Server Version Info: Oracle-Application-Server-10g/10.1.3.1.0 Oracle-HTTP-Server PoC: http://OC4J/web-app/foobar/%c0%ae%c0%ae/WEB-INF/web.xml Related: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2938 Explaination: The "%c0%ae%c0%ae" is interpreted as: ".." because on Java's side: "%c0%ae