Hi.
Another OT threat, so I'll keep it short.
Erik van Straten wrote:
How hard would it be to have the AV software actually check the source
email smtp host, and send an email to [EMAIL PROTECTED] for the *actual*
offending smtp server?
Incredibly hard.
Yep. Mostly because of the fact that these
Hi.
Tobias Weisserth wrote:
What's the quickest way to put an end to something like this if someone
is using your name for a scam like this? I mean, this could happen to
virtually anyone.
I'd try to walk the way up from the original hosting provider to their
uplink, then to the uplink's uplink
Hi all.
I received a mail which is said to be from Paypal.com (has been sent
from an IP that is registered to an ISP in Venezuela), subject is
PAYPAL.COM NEW YEAR OFFER. Attached is a file called paypal.zip that
contains a file paypal.exe (2592 bytes).
Is this yet another variant of a
Hi.
Bernardo Quintero wrote:
Impossible At least 90% of the files on KaZaA are media files
... (non
executable files)
I know there's a lot of bad .exe's on kazaa ... But 45% just can't be
right
Obviously.
I'm no native english speaker, but... the way I understood the original
headline
Hi.
Jonathan A. Zdziarski wrote:
In a lot of cases, this would only be exploitable internally, since many
configurations are set up not to allow access to the unit externally.
What do you mean with externally? WLAN? Internet?
I don't know this particular device, but I know that lots of other
Can anyone confirm if technically identical devices such as the Buffalo
WBR-G54 share this vulnerability?
Original Message
Subject: Linksys WRT54G Denial of Service Vulnerability
Date: 3 Dec 2003 22:35:26 -
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Linksys WRT54G
Hi.
James Foster wrote:
One liner: Our free tool, MessengerScan, is available for free download
at www.foundstone.com http://www.foundstone.com/
Nothing about your tool, but your advertising here sucks. Posting a
short and factual mail would be fine, but this marketing-speech is
really
Hi.
morning_wood wrote:
you perhaps stumble across the issues? Disclosure helps everyone,
Any security disclosure is good, if you dont like it,
I agree. Disclosure is good, but Disclosure should also include a CC
to the developers in order to help them to fix the issues. You can't
expect
Hi all.
Lorenzo Hernandez Garcia-Hierro wrote:
Geeklog Multiple Versions Vulnerabilities
--
PRODUCT: Geeklog
VENDOR: Geeklog
VULNERABLE VERSIONS:
[...]
Is it just me, or did anyone else notice that this vulnerability report
comes through once or twice every day since about the beginning of
Hi.
Seth Woolley wrote:
Disclaimer:
I (Seth) am not a php expert, and I don't run this code, so I haven't
tested the vendor-provided patch yet, although I assume the vendor has.
Be advised.
I tested the patch against the current release version of wordpress
(v0.71). Although I couldn't notice
Hi.
Raj Mathur wrote:
Uh, has anyone bothered asking DMA the reason for the delay? You may
not get any reasonable explanation, but at least give the man a chance
to defend himself before condemning him.
From my point of view this was no attempt to condemn anyone, but was
meant as getting a
Kristian Hermansen wrote:
Dido.. Everytime I send a post I get about 20 bounce backs.
20? How? At least twice that much... even more if there is vacancy time
in many countries.. summer and the like. They did kick a lot of those
out of office-subscribers a few weeks ago, but it did help only
Hi.
Rainer Gerhards wrote:
I wonder if someone else is sharing this experience?
So far I second your feeling. BugTraq is lagging behind a lot, and I
remember that the lag has been less worse some time ago. I'm not sure
about the reason, but it's nothing I'm really happy about. On the other
Hi all.
There is a new release of lsh, which fixes the recently reported
security issue. Below is a quote of the message that Niels Moeller
posted to the lsh-bugs list. The original posting can be found in the
list archive at
http://lists.lysator.liu.se/pipermail/lsh-bugs/2003q3/000127.html
Hi.
Rainer Gerhards wrote:
I think they have underestimated the number
of typos and as such under-powered the machine. A good indication is the
single IP (even though that eventually is a reverse proxy).
I agree.
As a side note: could it be possible to DoS name servers by querying
tons of
Hi all.
[EMAIL PROTECTED] wrote:
Recently I received some mails in english language. The writer (who
pretends being [EMAIL PROTECTED], but the header says Sender:
[EMAIL PROTECTED]) generously sends a patch along with his mail which
should be applied in order to fix a security bug... ha ha.
Hi all.
Michael Renzmann wrote:
As there were many people asking me to send them the binary, I decided
to put the file and a copy of the mail on my webserver. To be found at
http://www.otaku42.de/download/dumaru/index.html
Due to a server crash the files were not available for some hours
Hi.
Recently I received some mails in english language. The writer (who
pretends being [EMAIL PROTECTED], but the header says Sender:
[EMAIL PROTECTED]) generously sends a patch along with his mail which
should be applied in order to fix a security bug... ha ha.
Anyone interested in the
Hi.
[EMAIL PROTECTED] wrote:
And the XXS Lamer king strikes again *sigh*
[...]
This message has been sent via an anonymous mail relay at
www.no-id.com.
Surprise, surprise, an anonymous coward again, bashing others. Well, we
didn't have that here for... 3 days? 4? Wow. New record.
I'm not sure if
[EMAIL PROTECTED] wrote:
A 12 year old infant could 'discover' XSS 'holes' in stuff.
I'm just getting tired of seeing wiener's shit 0days on this list.
And I'm getting tired of guys like you complaining about morning wood's
postings. Just ignore them if you don't like them. They say, things like
Hi.
Tim Fletcher wrote:
While this is 2nd hand I have now heard about the same effect on 2
different unrelated machines via friends on quakenet (irc)
Mikeh email from a m8
Mikeh got a bit of a prob
Mikeh with me pc, when i go online, after about a minute i get a
message saying
Mikeh system is
Hi.
Schmehl, Paul L wrote:
Given that scenario, please apply your scintillating logic to the
problem of patching this machine to protect it against threats that were
discovered *after* SP2.
How about setting up a transparent firewall (that is, a Linux bridging
box with firewall patches applied,
Hi.
Harshul Nayak (ealcatraz) wrote:
Has anyone not able to reach CERT site,
seems like it's not accessible. is it because of Blaster worm ? ?
I was able to access cert.org from germany, using two different
providers. No problems with this site at all (just tested it). Maybe a
local problem?
Hi.
[EMAIL PROTECTED] wrote:
kindergarden! i think this is multy national!
Yes, it's an international kindergarden.
Will this bashing ever end?
Bye, Mike
___
Full-Disclosure - We believe in it.
Charter:
Hi.
Larry W. Cashdollar wrote:
I think people who have not published ANYTHING have no right to criticize
those that have. So ask yourself, have I ever contributed to the
security community in anyway? If not, keep quiet until you do.
Well, this seems to get one of those ever built a car? no?
Hi.
Martin wrote:
I have a question. I would like to know, if you can also crash
IE6, when typing the following URL:
ftp*://?
I can confirm that problem. When opening the mentioned URL, IE6
(6.0.2800.1106) reports the following problem signature:
AppName: iexplore.exeAppVer:
Hi.
Benjamin Keller wrote:
I say you go to your local library/Internet cafe, create a hotmail/hushmail
account,
And mail it all to the list and lets see what happens
In addition you might want to use an anonymizing service from the
inet-cafe. Or Peek-A-Booty, or something thelike.
Bye,
Hi.
[EMAIL PROTECTED] wrote:
It's a joke for God's sake, you were supposed to laugh. I'm amazed at the
number of people who took that seriousely.
As allways: You can't ever make the warning, ironic content, don't take
this for serious signs in such postings fat enough - there always will
be
Hi.
iDEFENSE Labs wrote:
[...]
PuTTY is a free implementation of Telnet and SSH for Win32 platforms,
along with an xterm terminal emulator. More information is available at
http://www.chiark.greenend.org.uk/~sgtatham/putty/.
[...]
AFAIK WinSCP2 is a program that relies on the codebase of
29 matches
Mail list logo