Re: [Full-disclosure] 0-day vulnerability

2010-10-29 Thread w0lfd33m
LMAO!! Regards; w0lf www.maestro-sec.com -- sent from BlackBerry -- -Original Message- From: Cal Leeming [Simplicity Media Ltd] cal.leem...@simplicitymedialtd.co.uk Sender: full-disclosure-boun...@lists.grok.org.uk Date: Fri, 29 Oct 2010 03:23:57 To: Josey

Re: [Full-disclosure] Host Gator exposed: blackhat spammers, sock puppet trolls, harassing critics, google bombing

2010-10-29 Thread Christian Sciberras
Anonymous sourceshow convenient! Don't waste our time, ok? On Fri, Oct 29, 2010 at 4:40 AM, Josey Yelsef hg_expo...@yahoo.com wrote: I first noticed this business years ago when I set up a website for a friend's forum. He was extremely appealed by the deal. After hosting with them

Re: [Full-disclosure] Host Gator exposed: blackhat spammers, sock puppet trolls, harassing critics, google bombing

2010-10-29 Thread PsychoBilly
Ahahahha Very foonny http://twitter.com/hostgator @kyledonovan please stop spamming your affiliate link I noticed them 10 years ago spreading IE4 toolbar malware shit. [[ Josey Yelsef ]] @ [[ 29/10/2010 04:40 ]]-- I first noticed this

[Full-disclosure] Secunia Research: Adobe Shockwave Player pamm Chunk Parsing Vulnerability

2010-10-29 Thread Secunia Research
== Secunia Research 29/10/2010 - Adobe Shockwave Player pamm Chunk Parsing Vulnerability - == Table of Contents Affected

[Full-disclosure] Secunia Research: Adobe Shockwave Player DEMX Chunk Parsing Vulnerability

2010-10-29 Thread Secunia Research
== Secunia Research 29/10/2010 - Adobe Shockwave Player DEMX Chunk Parsing Vulnerability - == Table of Contents Affected

[Full-disclosure] Secunia Research: SonicWALL SSL-VPN End-Point ActiveX Control Buffer Overflow

2010-10-29 Thread Secunia Research
== Secunia Research 29/10/2010 - SonicWALL SSL-VPN End-Point Interrogator/Installer ActiveX Control - - Install3rdPartyComponent() Method Buffer Overflow -

[Full-disclosure] ZDI-10-228: Adobe Shockwave Player Director File SetVertexArray Remote Code Execution Vulnerability

2010-10-29 Thread ZDI Disclosures
ZDI-10-228: Adobe Shockwave Player Director File SetVertexArray Remote Code Execution Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-10-228 October 29, 2010 -- CVE ID: CVE-2010-4090 -- CVSS: 7.5, (AV:N/AC:L/Au:N/C:P/I:P/A:P) -- Affected Vendors: Adobe -- Affected Products:

[Full-disclosure] ZDI-10-227: Adobe Shockwave Player Lnam Chunk String Processing Remote Code Execution Vulnerability

2010-10-29 Thread ZDI Disclosures
ZDI-10-227: Adobe Shockwave Player Lnam Chunk String Processing Remote Code Execution Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-10-227 October 29, 2010 -- CVE ID: CVE-2010-3655 -- CVSS: 9, (AV:N/AC:L/Au:N/C:P/I:P/A:C) -- Affected Vendors: Adobe -- Affected Products:

Re: [Full-disclosure] 0-day vulnerability

2010-10-29 Thread Cal Leeming [Simplicity Media Ltd]
I couldn't agree more. On Fri, Oct 29, 2010 at 6:56 PM, Tyler Borland tborla...@gmail.com wrote: I think it's getting ridiculous. Who cares about bureaucratical terms? I find more and more 'researchers' trying to just be auditors and categorize exploits and try to follow some kind of

[Full-disclosure] H2HC 2010 - Final Speakers List Available

2010-10-29 Thread Rodrigo Rubira Branco (BSDaemon)
Dear All, The final list of speakers is available for H2HC 2010: http://www.h2hc.com.br/en/. It is my pleasure to announce that the final list of speakers is available for H2HC in São Paulo. The list for Cancun will be available soon (http://www.h2hc.com.br/cancun/)! It was a real challenge

Re: [Full-disclosure] 0-day vulnerability

2010-10-29 Thread Marsh Ray
On 10/29/2010 12:56 PM, Tyler Borland wrote: I think it's getting ridiculous. Who cares about bureaucratical terms? I agree that the term 0-day does not have universal agreement on its meaning, so its use can be a sign of having too few sources of information. But still, I think it can be

[Full-disclosure] Evilgrade 2.0 - the update explotation framework is back

2010-10-29 Thread [ISR] - Infobyte Security Research
[ISR] - Infobyte Security Research ISR-evilgrade | www.infobytesec.com Infobyte Security Research is pleased to announce the release of evilgrade 2.0 with a lot of new modules and a bunch of squashed bugs. [-] RELEASE DETAILS BRIEF OVERVIEW Evilgrade is a modular framework that allows the user

Re: [Full-disclosure] Evilgrade 2.0 - the update explotation framework is back

2010-10-29 Thread Jacky Jack
It's now a time for vendors to re-consider their updating scheme. On Fri, Oct 29, 2010 at 6:25 PM, [ISR] - Infobyte Security Research nore...@infobytesec.com wrote: [ISR] - Infobyte Security Research ISR-evilgrade | www.infobytesec.com Infobyte Security Research is pleased to announce the

Re: [Full-disclosure] Evilgrade 2.0 - the update explotation framework is back

2010-10-29 Thread Benji
Actually, that time probably would've been a v1, but I'm fine with it being left as it is. On Fri, Oct 29, 2010 at 9:43 PM, Jacky Jack jacksonsmth...@gmail.comwrote: It's now a time for vendors to re-consider their updating scheme. On Fri, Oct 29, 2010 at 6:25 PM, [ISR] - Infobyte Security

[Full-disclosure] [ MDVSA-2010:214 ] kernel

2010-10-29 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2010:214 http://www.mandriva.com/security/