[Full-disclosure] VMSA-2009-0010 VMware Hosted products update libpng and Apache HTTP Server

2009-08-20 Thread VMware Security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - VMware Security Advisory Advisory ID: VMSA-2009-0010 Synopsis: VMware Hosted products update libpng and Apache HTTP Server

[Full-disclosure] [ MDVSA-2009:210 ] gnutls

2009-08-20 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2009:210 http://www.mandriva.com/security/

[Full-disclosure] t2?09 Challenge - Free Tickets Available

2009-08-20 Thread Tomi Tuominen
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, This is a quick note to let you know that t2'09 Challenge will be published 2009-08-29 10:00 EEST at: http://www.t2.fi/ The purpose of the Challenge is to have an opportunity to win a free tickets to t2'09 infosec conference. The rules are simpl

Re: [Full-disclosure] What's up with PacktStorm's website?

2009-08-20 Thread I.M Ariot
It appears they are both on the same network/hosting company.. http://toolbar.netcraft.com/netblock?q=yips-76-74-9-16,76.74.9.16,76.74.9.31 *Use caution:* Category: More info >> ___ Full-Disclosure - We believe in it. Charter: http://lists.gr

[Full-disclosure] [ MDVSA-2009:209 ] java-1.6.0-openjdk

2009-08-20 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2009:209 http://www.mandriva.com/security/

[Full-disclosure] Geeklog <- 1.6.0sr1 - Remote Arbitrary File Upload

2009-08-20 Thread Jaloh Smith
== Geeklog <= v1.6.0sr1 - Remote Arbitrary File Upload Software Site: http://www.geeklog.net Dork: "By Geeklog" "Created this page in" +seconds +powered inurl:public_html =

[Full-disclosure] [USN-817-1] Thunderbird vulnerabilities

2009-08-20 Thread Jamie Strandboge
=== Ubuntu Security Notice USN-817-1August 20, 2009 thunderbird vulnerabilities http://launchpad.net/bugs/416646 === A security issue affects the following Ubuntu releases:

[Full-disclosure] Authentication bypass on Netgear WNR2000

2009-08-20 Thread Jean Trolleur
Dere be an audenticashun bypass vulnerability on de Netgear WNR2000 routa' runnin' firmware 1.2.0.8 dat kin allow fo' an attacka' to change da damn admin passwo'd fo' de web interface widout audenticashun. Dis be due t'a lack uh audenticashun in /cgi-bin/upg_restore.cgi. Dig dis: # wget http://net

[Full-disclosure] [ MDVSA-2009:208 ] libgadu

2009-08-20 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2009:208 http://www.mandriva.com/security/

Re: [Full-disclosure] What's up with PacketStorm's website?

2009-08-20 Thread Juha-Matti Laurio
PacketStorm's main site (76.74.9.19) is hosted by Applied Security, Inc. and Milw0rm (76.74.9.18) too. BTW: the subject line typo PacktStorm fixed... Juha-Matti Iadnah [iad...@uplinklounge.com] kirjoitti: > I can't reach the site either, although I can go to some of the mirrors. > It seems a

Re: [Full-disclosure] What's up with PacktStorm's website?

2009-08-20 Thread Iadnah
I can't reach the site either, although I can go to some of the mirrors. It seems a little odd that this is happening right now, with milw0rm going down earlier this week (and still being down). I wonder if they are related? - Iadnah ___ Full-Disclos

[Full-disclosure] [USN-820-1] Pidgin vulnerability

2009-08-20 Thread Marc Deslauriers
=== Ubuntu Security Notice USN-820-1August 20, 2009 pidgin vulnerability CVE-2009-2694 === A security issue affects the following Ubuntu releases: Ubuntu 8.04 LTS Ubuntu 8.1

[Full-disclosure] Facebook CSRF attack allows personal information theft

2009-08-20 Thread Ronen Z
A vulnerability in the Facebook Application API allows the construction of a malicious Facebook application that collects user's personal information including: Full name, profile picture and friends list. Full name and picture of the friends are also accessible. The information is collected withou

Re: [Full-disclosure] What's up with PacktStorm's website?

2009-08-20 Thread Juha-Matti Laurio
Not accesible here as well. It appears that Milw0rm.com has been down several hours too. Juha-Matti Leandro Malaquias [lm.net.secur...@gmail.com] kirjoitti: > I haven't been able to access packtstorm security website since > yesterday, does anyone know what's going on? > > -- > LM > - > If yo

[Full-disclosure] What's up with PacktStorm's website?

2009-08-20 Thread Leandro Malaquias
I haven't been able to access packtstorm security website since yesterday, does anyone know what's going on? -- LM - If you're not part of the solutions, you're part of the problem. http://sekuritymatters.wordpress.com ___ Full-Disclosure - We believe

[Full-disclosure] Bypassing OWASP ESAPI XSS Protection inside Javascript

2009-08-20 Thread Inferno
Bypassing OWASP ESAPI XSS Protection inside Javascript -- By Inferno (inferno {at} securethoughts {dot} com) Everyone knows the invaluable XSS cheat sheet maintained by "RSnake". It is all about breaking things and features all the scenarios that