EUSecWest CALL FOR PAPERS
AMSTERDAM, Nederland -- The sixth annual EUSecWest applied technical
security conference - where the eminent figures in the international
security industry will get together share best practices and technology
- will be held in downtown Amsterdam at the the Me
===
Ubuntu Security Notice USN-934-1 April 29, 2010
netpbm-free vulnerability
CVE-2009-4274
===
A security issue affects the following Ubuntu releases:
Ubuntu 8.04 LTS
Ubunt
I'm sure I once read about a tool for linux which could execute a binary and
prompt for each particular library or system call to be approved or whitelisted
by various attributes, I have searched everywhere but I can find no trace of
it, I think it was posted to FD, any ideas?
Andy
___
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2010:087
http://www.mandriva.com/security/
Hello Full-Disclosure!
I want to warn you about security vulnerabilities in system CCMS - Clan
Content Management System.
In this advisory I'm continue to inform readers of mailing lists about
vulnerable web applications which are using CaptchaSecurityImages.php. If
you read Bugtraq you can saw t
Hello,
Are you talking about the Midori [1]/Singularity [2] project that
started in 2003? Or is there anything new?
[1] http://en.wikipedia.org/wiki/Midori_(operating_system)
[2] http://en.wikipedia.org/wiki/Singularity_(operating_system)
Regards,
- Nicolas RUFF
But he was a verified paypal buyer, your honor.
lols.
-Travis
On Thu, Apr 29, 2010 at 12:32 PM, Stephen Mullins <
steve.mullins.w...@gmail.com> wrote:
> That might work if you went through some sort of "official" channels
> with a bill of sale and so forth. Claiming that you sold it to "some
> g
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2010:086
http://www.mandriva.com/security/
That might work if you went through some sort of "official" channels
with a bill of sale and so forth. Claiming that you sold it to "some
guy on irc" after a paypal payment cleared your account probably
wouldn't be much of a defense in court.
On Thu, Apr 29, 2010 at 12:05 PM, T Biehn wrote:
> Or
Facebook notes, when viewed with the Facebook iPhone app, can be used to run
a XSS attack. Details here: http://futuristmusings.blogspot.com/
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and
Or you could just auction it off to the 'highest bidder.'
-Travis
On Tue, Apr 27, 2010 at 6:48 PM, J Roger wrote:
> An important lesson from childhood, sharing, could help keep you out of
> jail.
>
> According to the following (dated) Wired article,
> http://www.wired.com/threatlevel/2009/12/st
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
"Successful troll is successful." -anon
Or perhaps successful successful enumeration of infosec professionals
susceptible to Apple 0-day will be successful? Or perhaps someone is
just looking for a date? The inferences are limitless.
Justin C. Klei
On Thu, 29 Apr 2010 09:25:42 CDT, John Jacobs said:
> 1) Do you use Apple products for your Information Security duties, either
> exclusively. or occasionally?
> 2) Have you, at any point in your professional career (professional, being
> the key word, please do not respond with the context being
I'm not the original author of this message, saw it pop-up on Snort-Sigs and as
a graduate student myself I figured I'd give this guy a hand to get more
visibility. I'm not so sure it's a troll. YMMV. -John
Message below, unaltered:
Hello Snort and Emerging Threats communities, this is off-t
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
CVE-2010-1583
Vendor notified and product update released.
Details of this report are also available at
http://www.madirish.net/?article=456
Description of Vulnerability:
- --
The Tirzen Framework (http://www.tirzen.net/t
Microsoft has leaked information once again about "NT becoming pure
microkernel" in a new step to make "harder" exploitation (they
believe). The Redmond based company has revealed it's future plans
for the NT operating system family. As you know, Windows NT is a
Hybrid operating system as oposs
iSEC Partners Security Advisory - 2010-001-twitter https://www.isecpartners.com
Twitter - Insecure session management
Vendor: Twitter
Vendor URL: http://www.twitter.com
Severity: High (allows unauthorized hijacking of accounts)
Author: Chris Palmer
V
On Thu, 29 Apr 2010 10:17:22 +0200, Thierry Zoller said:
> >- Releasing at a conference => Probable court time.
> Under what legislation would that potentially be the case ?
Ask Michael Lynn about that sometime. And Sklylarov ended up in jail for
a while for saying 'Rot-13'.
pgpTuzi8BVO1c.pgp
De
lol seems to be?
you should know better than "seems" since your email is in the gnaa
ascii
From: Andrew A [mailto:glutt...@gmail.com]
Sent: 28. april 2010 16:57
To: Anders Klixbull
Cc: Sandy Vagina; Gary Niger; full-disclosure@lists.grok.org.uk
Subject: Re: [
Hello,
Your missing legislative circumstances in your thoughts :
>- Releasing at a conference => Probable court time.
Under what legislation would that potentially be the case ?
>- Keeping it to yourself => Working under the assumption that your the
>only one that has found that same bug is sti
Rob,
The reason why different options exist is because people have the
freedom of choice, and depending on their way of thinking they do.
Some people want to get paid for their findings through ZDI or
iDefense, others prefer the credits only by publishing advisories
following or not an RFP.
21 matches
Mail list logo