-- Forwarded message --
From: Andrew Auernheimer glutt...@gmail.com
Date: Mon, 18 Oct 2010 04:51:59 -0400
Subject: Re: ipv6 flaw
To: e...@zdnet.com.au
Cc: Eugene Teo eug...@redhat.com
Dear ZDnet,
This story:
Anyways...
http://images.encyclopediadramatica.com/images/thumb/e/ed/Internet_business.jpg/569px-Internet_business.jpg
[[ Andrew Auernheimer ]] @ [[ 18/10/2010 10:58
]]--
-- Forwarded message --
From: Andrew Auernheimer
Why don't you all STFU and go play with your little IRC bots!
On Mon, Oct 18, 2010 at 11:08 AM, PsychoBilly zpamh...@gmail.com wrote:
Anyways...
http://images.encyclopediadramatica.com/images/thumb/e/ed/Internet_business.jpg/569px-Internet_business.jpg
[[ Andrew Auernheimer ]] @ [[
yes hello
netbook user here
where is my apple product possession status
i was hoping someone here would rage out and reply to that line. i
stuck it in the email to that zdnet faggot for just such a purpose
On 10/18/10, Benji m...@b3nji.com wrote:
Oh Andrew, I do love it when you declare
lol
furious rage detected
On Mon, Oct 18, 2010 at 5:10 AM, Christian Sciberras uuf6...@gmail.comwrote:
Why don't you all STFU and go play with your little IRC bots!
On Mon, Oct 18, 2010 at 11:08 AM, PsychoBilly zpamh...@gmail.com wrote:
Anyways...
Oh Andrew, I do love it when you declare yourself 'one of the worlds most
skilled web application and browser exploit hackers in the world'.
Got your macs back yet or still rockin' an aspire one?
Sent from my BlackBerry® wireless device
-Original Message-
From: Andrew Auernheimer
The GNU C library dynamic linker expands $ORIGIN in setuid library search path
--
Gruezi, This is CVE-2010-3847.
The dynamic linker (or dynamic loader) is responsible for the runtime linking of
dynamically linked
Microsoft Visual Studio makes it possible to develop a binary planting-positive
(i.e., vulnerable) application without you having to write a single line of
code.
Every MFC application seems to be automatically made vulnerable, with those
statically linking MFC libraries actually having the
ZDI-10-214: IBM Rational Quality Manager and Test Lab Manager Backdoor Account
Remote Code Execution Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-10-214
October 18, 2010
-- CVSS:
10, (AV:N/AC:L/Au:N/C:C/I:C/A:C)
-- Affected Vendors:
IBM
-- Affected Products:
IBM Rational
..sensational misinformation defaming both the integrity of my information
security working group...
You mean the integrity of a group named Goatse? Who wanted to introduce a
mechanism called Clench to enterprises?
___
Full-Disclosure - We believe in
On Mon, 18 Oct 2010, Tavis Ormandy wrote:
LD_AUDIT is intended for use with the linker auditing api (see the
rtld-audit manual), and has the usual restrictions for setuid programs
as LD_PRELOAD does.
*facepalm*
rant
The only sensible restriction for LD_* environment variables (as well as
Hello is Dull Disclosure, I am is about to warn you about is
vulnerability in this IPv6 for this Internet.
When is attacker send ICMP request to FF02::1 is cause Denial of Service.
So how is can we now is use this for say attack.
ping -f FF02::1
Solution is to open Comodo Firewall and block is
On 10/18/2010 01:43 PM, Pavel Kankovsky wrote:
The only sensible restriction for LD_* environment variables (as well as
many other env. vars.) when a setuid or setgid program is executed is to
erase all traces of them at the first opportunity.
Those two or three guys who might ever need to
Mr. Auernheimer,
...Notions of criminal activity[1]. Interesting. ZDNet is funded by sheep
dumb enough to swallow retweeted blogcruft on shiny magazine stock. Why don't
you represent yourself in a court if it's so libelous? And also if you do in
fact have a brand you should register a
FYI---
the prosecution has refused to comply with discovery, effectively quietly
droppin the charges. I walk.
On Mon, Oct 18, 2010 at 3:35 PM, king of pain n3pt...@london.com wrote:
Mr. Auernheimer,
...Notions of criminal activity[1]. Interesting. ZDNet is funded by sheep
dumb enough to
ZDI-10-216: IBM Informix Dynamic Server oninit.exe EXPLAIN Remote Code
Execution Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-10-216
October 18, 2010
-- CVSS:
9, (AV:N/AC:L/Au:S/C:C/I:C/A:C)
-- Affected Vendors:
IBM
-- Affected Products:
IBM Informix
-- TippingPoint(TM) IPS
ZDI-10-217: IBM Informix Dynamic Server DBINFO Remote Code Execution
Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-10-217
October 18, 2010
-- CVSS:
9, (AV:N/AC:L/Au:S/C:C/I:C/A:C)
-- Affected Vendors:
IBM
-- Affected Products:
IBM Informix
-- TippingPoint(TM) IPS Customer
ZDI-10-215: IBM Informix Dynamic Server librpc.dll Integer Overflow Remote Code
Execution Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-10-215
October 18, 2010
-- CVSS:
10, (AV:N/AC:L/Au:N/C:C/I:C/A:C)
-- Affected Vendors:
IBM
-- Affected Products:
IBM Informix
--
I keep an eye on you Andrew. You're in my case load.
Just curious, care to go into any more detail on how the government has treated
you? Few really know what it's like to be in a modern day cointelpro subject. I
think people would like to know and you've been prudish on facts, probably out
Dear Riyaz,
The mere mention of fcgi-bin/echo in your first mail is enough for anybody
to derive the PoC. Here's what I found in under a minute:
*/fcgi-bin/echo/scriptaler('xss')/script*
Sorry, that is a different issue: the one you mention was patched by
Oracle a long time ago. (All the
Sure hope those 4chan boys don't take that as a challenge
--
Bob wan kim
Why its impossible to Get What You Want
http://www.youtube.com/watch?v=HAeSgsQtYNE
On Monday, October 18, 2010, king of pain n3pt...@london.com wrote:
I keep an eye on you Andrew. You're in my case load.
Just
21 matches
Mail list logo