Full Disclosure: by date

421 messages starting Sep 01 09 and ending Sep 30 09
Date index | Thread index | Author index


Tuesday, 01 September

Vulnerable MSVC++ runtime distributed with OpenOffice.org 3.1.1 for Windows Stefan Kanthak
Secunia Research: OpenOffice.org Word Document Table Parsing Integer Underflow Secunia Research
Secunia Research: OpenOffice.org Word Document Table Parsing Buffer Overflow Secunia Research
Think Drupal was FLOSS and non-profit? Think again. Drupal is under attack
SEC Consult SA-20090901-0 :: File disclosure vulnerability in JSFTemplating, Mojarra Scales and GlassFish Application Server v3 Admin console Johannes Greil
Pwning Opera Unite with Inferno's Eleven Inferno
[BMSA-2009-06] Remote code execution in BKAV eOffice Nam Nguyen
[ MDVSA-2009:197 ] nss security
Re: Think Drupal was FLOSS and non-profit? Think again. BMF
[SECURITY] [DSA 1876-1] New dnsmasq packages fix remote code execution Florian Weimer
Nipper licensing dpcybuck
[USN-827-1] Dnsmasq vulnerabilities Jamie Strandboge
Re: Nipper licensing jlay
[USN-810-2] NSS regression Kees Cook

Wednesday, 02 September

Re: Nipper licensing Alan Buxey
Re: Microsoft Internet Information Server ftpd zeroday Guido Landi
Re: Nipper licensing BMF
Re: Microsoft Internet Information Server ftpd zeroday Vladimir '3APA3A' Dubrovin
Re: Microsoft Internet Information Server ftpd zeroday Guido Landi
Re: Nipper licensing Eric Sesterhenn
Re: Nipper licensing Fizz
Re: Nipper licensing dpcybuck
Re: Nipper licensing Valdis . Kletnieks
Re: Nipper licensing Fizz
Re: Nipper licensing Adriel T. Desautels
Re: Nipper licensing Alan Buxey
[SECURITY] [DSA 1878-1] New devscripts packages fix remote code execution Florian Weimer
Secunia PSI (RC3) - memory corruption condition exploit dev
Re: Secunia PSI (RC3) - memory corruption condition Thomas Kristensen
Re: Secunia PSI (RC3) - memory corruption condition exploit dev

Monday, 07 September

[ GLSA 200909-02 ] libvorbis: User-assisted execution of arbitrary code Alex Legler
Secunia Research: VMWare VMnc Codec Mismatched Dimensions Buffer Overflow Secunia Research
Re: What's with www.modsecurity.org Elazar Broad
IEhrepus 想跟您聊天 IEhrepus
[ GLSA 200909-01 ] Linux-PAM: Privilege escalation Alex Legler
[SECURITY] [DSA 1881-1] New cyrus-imapd packages fix arbitrary code execution Nico Golde
DefCon 17 CTF packet captures online Holt Sorenson
Re: why not a sandbox Elazar Broad
Re: why not a sandbox yersinia
Windows Vista/7 : SMB2.0 NEGOTIATE PROTOCOL REQUEST Remote B.S.O.D. laurent gaffie

Tuesday, 08 September

Re: DefCon 17 CTF packet captures online dreyer
Re: Microsoft Internet Information Server ftpd zeroday Thierry Zoller
[scip_Advisory 4021] IBM Lotus Notes 8.5 RSS Widget Privilege Escalation Marc Ruef
This is n3td3v and Gary McKinnon's lawyer. My client's have asburger syndrome. Central Security District of UK [MI7.5]
On the subject of security researcher n3td3v, Gary McKinnon "Autistic rockstar felon" Central Security District of UK [MI7.5]
[ MDVSA-2009:225 ] qt4 security
[USN-828-1] PAM vulnerability Kees Cook
Web-monitoring software gathers data on kid chats Ivan .
Re: Web-monitoring software gathers data on kid chats dramacrat
Re: Web-monitoring software gathers data on kid chats Rohit Patnaik
Re: Web-monitoring software gathers data on kid chats Rafal M. Los
4f: The File Format Fuzzing Framework Krakow Labs

Wednesday, 09 September

Cisco Security Advisory: TCP State Manipulation Denial of Service Vulnerabilities in Multiple Cisco Products Cisco Systems Product Security Incident Response Team
ZDI-09-062: Microsoft Internet Explorer JScript arguments Invocation Memory Corruption Vulnerability ZDI Disclosures
R. RHEL, RHCS, and Selinux : hype, reality or dream? yersinia
Re: This is n3td3v and Gary McKinnon's lawyer. My client's have asburger syndrome. full-censorship
[ GLSA 200909-03 ] Apache Portable Runtime, APR Utility Library: Execution of arbitrary code Alex Legler
[ GLSA 200909-04 ] Clam AntiVirus: Multiple vulnerabilities Alex Legler
[ GLSA 200909-05 ] Openswan: Denial of Service Alex Legler
[ GLSA 200909-06 ] aMule: Parameter injection Alex Legler
[ GLSA 200909-07 ] TkMan: Insecure temporary file usage Alex Legler
[ GLSA 200909-08 ] C* music player: Insecure temporary file usage Alex Legler
[ GLSA 200909-09 ] Screenie: Insecure temporary file usage Alex Legler
[ GLSA 200909-10 ] LMBench: Insecure temporary file usage Alex Legler
[ GLSA 200909-11 ] GCC-XML: Insecure temporary file usage Alex Legler
[SECURITY] [DSA 1882-1] New xapian-omega packages fix cross-site scripting Nico Golde
TCP/IP Orphaned Connections Vulnerability Fabian Yamaguchi
Re: Windows Vista/7 : SMB2.0 NEGOTIATE PROTOCOL REQUEST Remote B.S.O.D. randomguy
Re: This is n3td3v and Gary McKinnon's lawyer. My client's have asburger syndrome. Valdis . Kletnieks
CORE-2009-0820 - Dnsmasq Heap Overflow and Null-pointer Dereference on TFTP Server CORE Security Technologies Advisories
[ MDVSA-2009:226 ] aria2 security
Re: This is n3td3v and Gary McKinnon's lawyer. My client's have asburger syndrome. mrx
Re: This is n3td3v and Gary McKinnon's lawyer. My client's have asburger syndrome. randomguy
Question about police harassment. Police trying over years to "entrap" me as hacker. TheLearner
Re: Question about police harassment. Police trying over years to "entrap" me as hacker. Jeff MacDonald
Re: Question about police harassment. Police trying over years to "entrap" me as hacker. auto199984
Re: Question about police harassment. Police trying over years to "entrap" me as hacker. David Shaw
Re: Question about police harassment. Police trying over years to "entrap" me as hacker. Nick FitzGerald
Re: Windows Vista/7 : SMB2.0 NEGOTIATE PROTOCOL REQUEST Remote B.S.O.D. James Matthews

Thursday, 10 September

Re: This is n3td3v and Gary McKinnon's lawyer. My client's have asburger syndrome. D-vice
Re: Windows Vista/7 : SMB2.0 NEGOTIATE PROTOCOL REQUEST Remote B.S.O.D. D-vice
[SECURITY] [DSA 1883-1] New nagios2 packages fix several cross-site scriptings Steffen Joeris
Re: Windows Vista/7 : SMB2.0 NEGOTIATE PROTOCOLREQUEST Remote B.S.O.D. mutiny
[ MDVSA-2009:226 ] freeradius security
Re: Windows Vista/7 : SMB2.0 NEGOTIATE PROTOCOL REQUEST Remote B.S.O.D. Mitch Oliver
Plain Text Password Disclosure vulnerability in rediff mail kalyan
[USN-821-1] Firefox and Xulrunner vulnerabilities Jamie Strandboge
Re: Plain Text Password Disclosure vulnerability in rediff mail webDEViL
Re: Question about police harassment. Police trying over years to "entrap" me as hacker. T Biehn
Re: Question about police harassment. Police trying over years to "entrap" me as hacker. mrx
[USN-829-1] Qt vulnerability Jamie Strandboge
Firefox <3.0.14 Multiplatform RCE via pkcs11.addmodule Dan Kaminsky
ZDI-09-063: Apple QuickTime H.264 Nal Unit Length Heap Overflow Vulnerability ZDI Disclosures
ZDI-09-064: Apple QuickTime FlashPix Sector Size Overflow Vulnerability ZDI Disclosures
ZDI-09-065: Mozilla Firefox TreeColumns Dangling Pointer Vulnerability ZDI Disclosures
Re: Plain Text Password Disclosure vulnerability in rediff mail awf awf
Re: Plain Text Password Disclosure vulnerability in rediff mail Dan Kaminsky
Friday the 11th of September 2009 full-censorship
Re: Plain Text Password Disclosure vulnerability in rediff mail dramacrat
[SECURITY] [DSA 1878-2] New devscripts packages fix regressions Florian Weimer

Friday, 11 September

Re: Question about police harassment. Police trying over years to "entrap" me as hacker. mrx
Hack-Mail.net or similar site mamo
Re: Plain Text Password Disclosure vulnerability in rediff mail D-vice
Multiple Smartphones MMS Notification Sender Obfuscation c0rnholio
Multiple Smartphones SMS Sender Obfuscation via WAP Push SI c0rnholio
0xHACK - Oxford Info-Sec Group James Whayman
[ MDVSA-2009:229 ] cyrus-imapd security
Re: Windows Vista/7 : SMB2.0 NEGOTIATE PROTOCOL REQUEST Remote B.S.O.D. laurent gaffie
Re: 0xHACK - Oxford Info-Sec Group Lolek of TK53
Re: 0xHACK - Oxford Info-Sec Group Rohit Patnaik
A closed doors hands-on ITSec meeting Leandro Malaquias
[ MDVSA-2009:230 ] pidgin security
Re: Plain Text Password Disclosure vulnerability in rediff mail Valdis . Kletnieks
[ MDVSA-2009:231 ] htmldoc security
ShmooCon 2010 CFP Bruce Potter
[ MDVSA-2009:228 ] libneon security
[ MDVSA-2009:197-2 ] nss security
[ MDVSA-2009:232 ] libsamplerate security
Re: Plain Text Password Disclosure vulnerability in rediff mail full-censorship
Re: Plain Text Password Disclosure vulnerability in rediff mail Valdis . Kletnieks
Re: Plain Text Password Disclosure vulnerability in rediff mail full-censorship
Re: Plain Text Password Disclosure vulnerability in rediff mail Rohit Patnaik
Re: Plain Text Password Disclosure vulnerability in rediff mail mrx
Re: Plain Text Password Disclosure vulnerability in rediff mail Lincoln Anderson

Saturday, 12 September

nullcon Goa 2010 Call For Papers nullcon nullcon
Re: Hack-Mail.net or similar site TheLearner
Re: 0xHACK - Oxford Info-Sec Group TheLearner
Re: Hack-Mail.net or similar site dramacrat
[ GLSA 200909-12 ] HTMLDOC: User-assisted execution of arbitrary code Alex Legler
[ GLSA 200909-13 ] irssi: Execution of arbitrary code Alex Legler
[ GLSA 200909-14 ] Horde: Multiple vulnerabilities Alex Legler
[ GLSA 200909-15 ] Lynx: Arbitrary command execution Alex Legler
Re: Hack-Mail.net or similar site Andrew Farmer
Internet Explorer 8 Crash @ Sourceforge Jeremy Brown
Re: Internet Explorer 8 Crash @ Sourceforge Jeremy Brown
Re: Internet Explorer 8 Crash @ Sourceforge Jordan Bray
Re: Internet Explorer 8 Crash @ Sourceforge Lane Christiansen
Re: Internet Explorer 8 Crash @ Sourceforge Rohit Patnaik
Re: Internet Explorer 8 Crash @ Sourceforge Rohit Patnaik
Re: Internet Explorer 8 Crash Kema Druma

Sunday, 13 September

Re: Internet Explorer 8 Crash Jeremy Brown
Re: FreeBSD <= 6.1 kqueue() NULL pointer dereference Przemyslaw Frasunek
Re: ShmooCon 2010 CFP Buherátor
[ GLSA 200909-17 ] ZNC: Directory traversal Tobias Heinlein
[ GLSA 200909-16 ] Wireshark: Denial of Service Tobias Heinlein
Re: Windows Vista/7 : SMB2.0 NEGOTIATE PROTOCOL REQUEST Remote B.S.O.D. Randal T. Rioux

Monday, 14 September

Presentation of Message-ID Fingerprinting Tool Marc Ruef
PakBugs.Com Report Catch Them
Re: PakBugs.Com Report TheLearner
Re: PakBugs.Com Report Rohit Patnaik
[SECURITY] [DSA 1883-2] New nagios2 packages fix regression Steffen Joeris
Re: Windows Vista/7 : SMB2.0 NEGOTIATE PROTOCOL REQUEST Remote B.S.O.D. D-vice
Re: Windows Vista/7 : SMB2.0 NEGOTIATE PROTOCOL REQUEST Remote B.S.O.D. Randal T. Rioux
Re: Plain Text Password Disclosure vulnerability in rediff mail D-vice
PakBugs.Com Report full-censorship
[SECURITY] [DSA 1885-1] New xulrunner packages fix several vulnerabilities Moritz Muehlenhoff
[SECURITY] [DSA 1886-1] New iceweasel packages fix several vulnerabilities Moritz Muehlenhoff
Re: Windows Vista/7 : SMB2.0 NEGOTIATE PROTOCOL REQUEST Remote B.S.O.D. r1d1nd1rty
[SECURITY] [DSA 1884-1] New nginx packages fix arbitrary code execution Nico Golde
Distribution of passwords between man and women Tõnu Samuel
[USN-830-1] OpenSSL vulnerability Marc Deslauriers
[USN-831-1] OpenEXR vulnerabilities Marc Deslauriers
Re: Windows Vista/7 : SMB2.0 NEGOTIATE PROTOCOL REQUEST Remote B.S.O.D. Randal T. Rioux
Plain Text Password Disclosure vulnerability in rediff mail full-censorship
Re: Hack-Mail.net or similar site mamo
Re: Hack-Mail.net or similar site maxigas
[ MDVSA-2009:233 ] kernel security
Andrew Aurenheimer aka weev gets tree'd GOBBLES
Re: Andrew Aurenheimer aka weev gets tree'd Andrew A
Re: Andrew Aurenheimer aka weev gets tree'd Valdis' Mustache
Re: Andrew Aurenheimer aka weev gets tree'd GOBBLES
Re: Andrew Aurenheimer aka weev gets tree'd Andrew A
Re: Hack-Mail.net or similar site Augusto Pereyra
Re: Andrew Aurenheimer aka weev gets tree'd Valdis' Mustache
Andrew Auernheimer aka weev gets tree'd GOBBLES
Andrew Aurenheimer aka weev gets tree'd full-censorship

Tuesday, 15 September

Re: PakBugs.Com Report Haris Pilton
Re: Plain Text Password Disclosure vulnerability in rediff mail D-vice
Re: Distribution of passwords between man and women Anıl Kurmuş
Re: Distribution of passwords between man and women Tõnu Samuel
CVE-2009-2958 srujan
CVE-2009-2958 srujan
Re: PakBugs.Com Report Jan G.B.
Re: Andrew Aurenheimer aka weev gets tree'd Valdis . Kletnieks
[ MDVSA-2009:234 ] silc-toolkit security
[ MDVSA-2009:234-1 ] silc-toolkit security
[ MDVSA-2009:235 ] silc-toolkit security
[SECURITY] [DSA 1887-1] New rails packages fix cross-site scripting Steffen Joeris
Re: Hack-Mail.net or similar site maxigas
Re: 3rd party patch for XP for MS09-048? Susan Bradley
Re: 3rd party patch for XP for MS09-048? Susan Bradley
[SECURITY] [DSA 1888-1] New openssl packages deprecate MD2 hash signatures Moritz Muehlenhoff
Re: 3rd party patch for XP for MS09-048? Susan Bradley
ANNOUNCE: RFIDIOt release - v0.z - 16th September, 2009 Adam Laurie
Re: Hack-Mail.net or similar site Zach Riggle
Re: PakBugs.Com Report Lane Christiansen
Re: Andrew Aurenheimer aka weev gets tree'd Andrew A
Re: Andrew Aurenheimer aka weev gets tree'd Ronny Lawson
Re: Andrew Aurenheimer aka weev gets tree'd Valdis . Kletnieks
Re: Andrew Aurenheimer aka weev gets tree'd Ronny Lawson
Re: Andrew Aurenheimer aka weev gets tree'd Ronny Lawson
Exploiting Chrome and Opera's inbuilt ATOM/RSS reader with Script Execution and more Inferno

Wednesday, 16 September

Re: Exploiting Chrome and Opera's inbuilt ATOM/RSS reader with Script Execution and more Michal Zalewski
Re: PakBugs.Com Report Anders Klixbull
Re: PakBugs.Com Report Jan G.B.
Re: Exploiting Chrome and Opera's inbuilt ATOM/RSS reader with Script Execution and more Inferno
Re: 3rd party patch for XP for MS09-048? Jeffrey Walton
Re: 3rd party patch for XP for MS09-048? Jeffrey Walton
Re: 3rd party patch for XP for MS09-048? Eric Kimminau
Re: 3rd party patch for XP for MS09-048? Matt Riddell
Re: 3rd party patch for XP for MS09-048? Eric C. Lukens
3rd party patch for XP for MS09-048? Aras "Russ" Memisyazici
Re: PakBugs.Com Report Catch Them
Re: 3rd party patch for XP for MS09-048? Thor (Hammer of God)
Re: 3rd party patch for XP for MS09-048? Thor (Hammer of God)
PakBugs.Com Report full-censorship
Re: 3rd party patch for XP for MS09-048? Larry Seltzer
Re: 3rd party patch for XP for MS09-048? Thor (Hammer of God)
Re: 3rd party patch for XP for MS09-048? Susan Bradley
Re: 3rd party patch for XP for MS09-048? Tom Grace
Re: 3rd party patch for XP for MS09-048? James Lay
Iret #GP on pre-commit handling failure: the NetBSD case (CVE-2009-2793) Julien TINNES
Re: 3rd party patch for XP for MS09-048? Thor (Hammer of God)
Re: 3rd party patch for XP for MS09-048? Valdis . Kletnieks
Re: 3rd party patch for XP for MS09-048? Susan Bradley
[SECURITY] [DSA 1889-1] New icu packages correct multibyte sequence parsing Moritz Muehlenhoff
[USN-832-1] FreeRADIUS vulnerability Marc Deslauriers
Re: 3rd party patch for XP for MS09-048? Larry Seltzer
Re: Andrew Aurenheimer aka weev gets tree'd GOBBLES
Re: 3rd party patch for XP for MS09-048? Peter Besenbruch
Re: 3rd party patch for XP for MS09-048? Rohit Patnaik
Re: Andrew Aurenheimer aka weev gets tree'd zewbiechan () gmail com
Re: Andrew Auerenheimer aka weev gets tree'd Valdis' Mustache
Re: Andrew Auerenheimer aka weev gets tree'd BMF
Re: Andrew Auerenheimer aka weev gets tree'd zewb
Re: Andrew Auerenheimer aka weev gets tree'd dramacrat

Thursday, 17 September

Re: Andrew Auerenheimer aka weev gets tree'd Anders Klixbull
Quiksoft EasyMail 6.0.3.0 imap connect() ActiveX stack overflow exploit Sebastian Wolfgarten
Quiksoft EasyMail 6 (AddAttachment) Remote Buffer Overflow Exploit bmgsec
Re: 3rd party patch for XP for MS09-048? Susan Bradley
SEC Consult SA-20090917-0 :: RADactive I-Load Multiple Vulnerabilities Stefan Streichsbier
Re: Andrew Aurenheimer aka weev gets tree'd T Biehn
Peiter "Mudge" Zatko petition to be named U.S. Cybersecurity Chief The Sp3ctacle
Re: Andrew Auerenheimer aka weev gets tree'd frank^2
Re: 3rd party patch for XP for MS09-048? Susan Bradley
Peiter "Mudge" Zatko petition to be named U.S. Cybersecurity Chief full-censorship
Re: Peiter "Mudge" Zatko petition to be named U.S. Cybersecurity Chief Randal T. Rioux
SecurityReason: glibc x<=2.10.1 stdio/strfmon.c Multiple vulnerabilities Maksymilian Arciemowicz
Re: 3rd party patch for XP for MS09-048? John Morrison
Re: 3rd party patch for XP for MS09-048? Aras "Russ" Memisyazici
Cross-Site Scripting attacks via redirectors in different browsers MustLive
List Charter John Cartwright
[USN-833-1] KDE-Libs vulnerability Jamie Strandboge
Re: Andrew Auerenheimer aka weev gets tree'd Jubei Trippataka

Friday, 18 September

Advisory 01/2009: Horde_Form_Type_image Arbitrary File Overwrite Vulnerability Stefan Esser
Advisory: Crypto backdoor in Qnap storage devices (CVE-2009-3200) Marc Heuse
Re: Advisory: Crypto backdoor in Qnap storage devices (CVE-2009-3200) Rohit Patnaik
Re: Cross-Site Scripting attacks via redirectors in different browsers darky
[ GLSA 200909-18 ] nginx: Remote execution of arbitrary code Alex Legler
Re: Advisory: Crypto backdoor in Qnap storage devices (CVE-2009-3200) Marc Heuse

Saturday, 19 September

Re: Andrew Auerenheimer aka weev gets tree'd GOBBLES
Re: Andrew Aurenheimer aka weev gets tree'd GOBBLES
[SECURITY] [DSA 1890-1] New wxwidgets packages fix arbitrary code execution Steffen Joeris
n3td3v's Twitter account hacked The Security Community
Re: n3td3v's Twitter account hacked Gichuki John Chuksjonia
No subject full-censorship

Sunday, 20 September

Re: Cross-Site Scripting attacks via redirectors in different browsers Tõnu Samuel
[ MDVSA-2009:236 ] firefox security
Re: [inbox] n3td3v's Twitter account hacked Exibar
[ GLSA 200909-19 ] Dnsmasq: Multiple vulnerabilities Alex Legler

Monday, 21 September

Re: DoS vulnerability in Mozilla Firefox YGN Ethical Hacker Group (http://yehg.net)
DoS vulnerability in Mozilla Firefox MustLive
DEFCON London - September 2009 Meet - Thursday 24th Major Malfunction
[scip_Advisory 4020] Check Point Connectra R62 Login Script Injection Vulnerability Stefan Friedli
[USN-834-1] PostgreSQL vulnerabilities Jamie Strandboge
0xHACK - Wednesday, September 23rd, 2009 James Whayman
[ MDVSA-2009:237 ] openssl security
[ MDVSA-2009:238 ] openssl security
[USN-835-1] neon vulnerabilities Kees Cook
List of security conferences TK
Re: List of security conferences Shawn Merdinger
Re: List of security conferences cr01nk zer0
Re: List of security conferences Packet Storm
Re: List of security conferences Byron Sonne
List of security conferences full-censorship
Chargebacks and credit card frauds Steven Anders
Re: Chargebacks and credit card frauds BMF
Re: Chargebacks and credit card frauds Andrew Haninger

Tuesday, 22 September

Re: Chargebacks and credit card frauds Iadnah
[SECURITY] [DSA 1891-1] New changetrack packages fix arbitrary code execution Steffen Joeris
Re: Chargebacks and credit card frauds mrx
[ MDVSA-2009:239 ] openssl security
[ MDVSA-2009:240 ] apache security
[ MDVSA-2009:241 ] squid security
[ MDVSA-2009:242 ] dovecot security
Dumb question: Is Windows box behind a router safe ? Steven Anders
Re: Chargebacks and credit card frauds Steven Anders
[ MDVSA-2009:242-1 ] dovecot security
Re: Dumb question: Is Windows box behind a router safe ? Kos
Re: Dumb question: Is Windows box behind a router safe ? G. D. Fuego
Re: Dumb question: Is Windows box behind a router safe ? Abhijeet Jain
Re: Dumb question: Is Windows box behind a router safe ? Valdis . Kletnieks
Re: Dumb question: Is Windows box behind a router safe ? john s
Re: Dumb question: Is Windows box behind a router safe ? a.kuriger
Re: Dumb question: Is Windows box behind a router safe ? yersinia
Re: Dumb question: Is Windows box behind a router safe ? Robert Portvliet
Re: Dumb question: Is Windows box behind a router safe ? Brian Anderson
Re: Dumb question: Is Windows box behind a router safe ? Elonym (elone)
Re: Dumb question: Is Windows box behind a router safe ? Rohit Patnaik
Re: Dumb question: Is Windows box behind a router safe ? Rohit Patnaik
Re: Dumb question: Is Windows box behind a router safe ? Chris
Re: Dumb question: Is Windows box behind a router safe ? G. D. Fuego
Re: Chargebacks and credit card frauds T Biehn
Re: Dumb question: Is Windows box behind a router safe ? john s
Call For Papers - Hackers 2 Hackers Conference 6th Edition - Brazil Rodrigo Rubira Branco (BSDaemon)
Executing Code on Linux/x86 with ASLR+GCC4 Protections Lucus Rife
[ MDVSA-2009:243 ] freetype2 security
Re: Dumb question: Is Windows box behind a router safe ? Michael Fritscher
Re: Dumb question: Is Windows box behind a router safe ? Dave
Re: Cross-Site Scripting attacks via redirectors in different browsers MustLive
Re: Dumb question: Is Windows box behind a router safe ? vulcanius
PHP file vulnerable on SMF 1.1.10 bro
Re: PHP file vulnerable on SMF 1.1.10 Elonym (elone)
Re: Dumb question: Is Windows box behind a router safe ? Chris
Re: Dumb question: Is Windows box behind a router safe ? Chris
Re: Dumb question: Is Windows box behind a router safe ? OTB
Re: Dumb question: Is Windows box behind a router safe ? Steven Anders

Wednesday, 23 September

Re: Executing Code on Linux/x86 with ASLR+GCC4Protections Jeremi Gosney
nginx - low risk webdav destination bug Kingcope
Re: PHP file vulnerable on SMF 1.1.10 » Ruben Alves
Re: PHP file vulnerable on SMF 1.1.10 Anastasios Monachos
Re: Dumb question: Is Windows box behind a router safe ? Elonym (elone)
HaXor and Developer training Jared DeMott
Re: Dumb question: Is Windows box behind a router safe ? Camilo Uribe
[USN-836-1] WebKit vulnerabilities Marc Deslauriers
Re: Dumb question: Is Windows box behind a router safe ? Jeff Kell
Re: PHP file vulnerable on SMF 1.1.10 » Ruben Alves
Re: Dumb question: Is Windows box behind a router safe ? john s
Re: Chargebacks and credit card frauds Anıl Kurmuş
Re: Chargebacks and credit card frauds T Biehn
Cisco Security Advisory: Cisco Unified Communications Manager Session Initiation Protocol Denial of Service Vulnerability Cisco Systems Product Security Incident Response Team
Cisco Security Advisory: Cisco IOS Software Object-group Access Control List Bypass Vulnerability Cisco Systems Product Security Incident Response Team
Cisco Security Advisory: Cisco Unified Communications Manager Express Vulnerability Cisco Systems Product Security Incident Response Team
Cisco Security Advisory: Cisco IOS Software H.323 Denial of Service Vulnerability Cisco Systems Product Security Incident Response Team
Cisco Security Advisory: Cisco IOS Software Zone-Based Policy Firewall Vulnerability Cisco Systems Product Security Incident Response Team
Cisco Security Advisory: Cisco IOS Software Network Time Protocol Packet Vulnerability Cisco Systems Product Security Incident Response Team
Cisco Security Advisory: Cisco IOS Software Session Initiation Protocol Denial of Service Vulnerability Cisco Systems Product Security Incident Response Team
Cisco Security Advisory: Cisco IOS Software Internet Key Exchange Resource Exhaustion Vulnerability Cisco Systems Product Security Incident Response Team
Cisco Security Advisory: Cisco IOS Software Crafted Encryption Packet Denial of Service Vulnerability Cisco Systems Product Security Incident Response Team
[ MDVSA-2009:244 ] xfig security
Re: Executing Code on Linux/x86 with ASLR+GCC4Protections Jeremy Brown
Cisco Security Advisory: Cisco IOS Software Authentication Proxy Vulnerability Cisco Systems Product Security Incident Response Team
Cisco Security Advisory: Cisco IOS Software Tunnels Vulnerability Cisco Systems Product Security Incident Response Team
Avast aswMon2.sys kernel memory corruption and Local Privilege Escalation evil fingers
[SECURITY] [DSA 1892-1] New dovecot packages fix arbitrary code execution Steffen Joeris
[SECURITY] [DSA 1893-1] New cyrus-imapd-2.2/kolab-cyrus-imapd packages fix arbitrary code execution Steffen Joeris
Audited by Netcraft... any feedback jk3380
Re: Executing Code on Linux/x86 with ASLR+GCC4Protections Jeremy Brown
Re: Executing Code on Linux/x86 with ASLR+GCC4Protections Jeremi Gosney
ZDI-09-066: Adobe RoboHelp Server Arbitrary File Upload and Execute Vulnerability ZDI Disclosures
[ MDVSA-2009:243-1 ] freetype2 security

Thursday, 24 September

Re: Dumb question: Is Windows box behind a router safe ? Mary Landesman
CFS 09/October 5-6 Updated Speaker/Session List Trish M
[SECURITY] [DSA 1894-1] New newt packages fix arbitrary code execution Steffen Joeris
[USN-837-1] Newt vulnerability Marc Deslauriers
[ MDVSA-2009:245 ] glib2.0 security
PakBugs.com Aftermath. Catch Them
Cross-Site Scripting vulnerability in E107 MustLive
[SECURITY] [DSA 1895-1] New xmltooling packages fix potential code execution Florian Weimer
Cisco ACE XML Gateway <= 6.0 Internal IP disclosure nitrØus
Re: Cisco ACE XML Gateway <= 6.0 Internal IP disclosure Richard Cyrios
Re: Cisco ACE XML Gateway <= 6.0 Internal IP disclosure Jeremy Brown

Friday, 25 September

Attacks via redirectors MustLive
Drupal Bibliography 6.x-1.6 XSS Vuln Black Packeteer
Drupal Bibliography 6.x-1.6 XSS Vuln Black Packeteer
Re: Cisco ACE XML Gateway <= 6.0 Internal IP disclosure Valdis . Kletnieks
Re: Cisco ACE XML Gateway <= 6.0 Internal IPdisclosure Paul Oxman (poxman)
[ GLSA 200909-20 ] cURL: Certificate validation error Alex Legler
[ MDVSA-2009:246 ] php security
[ MDVSA-2009:247 ] php security
[ MDVSA-2009:248 ] php security

Sunday, 27 September

[ MDVSA-2009:249 ] newt security
Windows 7 Launch Party hosted by JTTF and Andrew Auernheimer David Kernell [rubico]
[SECURITY] [DSA 1896-1] New Shibboleth 1.x packages fix potential code execution Florian Weimer

Monday, 28 September

Vulnerabilities in E107 MustLive
[SECURITY] [DSA 1897-1] New horde3 packages fix arbitrary code execution Nico Golde
[USN-838-1] Dovecot vulnerabilities Marc Deslauriers
Full Path Disclosure in most wordpress' plugins [?] Fernando A. Lagos B.
Drupal XML-Sitemap 5.x-1.6 XSS Vulnerability Black Packeteer
For sale - Microsoft Internet Explorer 0day Freddie Vicious
Re: Full Path Disclosure in most wordpress' plugins [?] majinboo
Re: Full Path Disclosure in most wordpress' plugins [?] Fernando A. Lagos B.
Re: Full Path Disclosure in most wordpress' plugins [?] Glafkos Charalambous
Re: Full Path Disclosure in most wordpress' plugins [?] Fernando A. Lagos B.
WinRAR v3.80 - ZIP Filename Spoofing chr1x

Tuesday, 29 September

Cross-Site Scripting vulnerability in eCaptcha MustLive
Re: Full Path Disclosure in most wordpress' plugins [?] Jan G.B.
Re: Full Path Disclosure in most wordpress' plugins [?] Loaden
Re: Full Path Disclosure in most wordpress' plugins [?] Peter Bruderer
Modifying SSH to Capture Login Credentials from Attackers my.hndl
Re: Modifying SSH to Capture Login Credentials from Attackers Kurth Bemis
Re: Modifying SSH to Capture Login Credentials from Attackers Kos
Re: Full Path Disclosure in most wordpress' plugins [?] Glafkos Charalambous
Re: Modifying SSH to Capture Login Credentials from Attackers my.hndl
Re: Modifying SSH to Capture Login Credentials from Attackers Kurth Bemis
Re: Modifying SSH to Capture Login Credentials from Attackers bodik () civ zcu cz
Re: Modifying SSH to Capture Login Credentials from Attackers maxigas
MD5 hash extension attack breaks API authentication of Flickr and other online services Juliano Rizzo
Re: Modifying SSH to Capture Login Credentials from Attackers Gichuki John Chuksjonia
Re: Full Path Disclosure in most wordpress' plugins [?] majinboo
Re: Modifying SSH to Capture Login Credentials from Attackers jfch
Re: Modifying SSH to Capture Login Credentials from Attackers dramacrat

Wednesday, 30 September

gameforge.de gaming platform (validated for: kingsage.gr) authentication bypass (using hashed values) and cross site scripting mestre rigel
Re: Full Path Disclosure in most wordpress' plugins [?] Glafkos Charalambous
Re: DoS vulnerability in Mozilla Firefox MustLive
Re: Modifying SSH to Capture Login Credentials from Attackers Fernando A. Lagos B.
Re: Full Path Disclosure in most wordpress' plugins [?] James Matthews
[ MDVSA-2009:176 ] postgresql security
[ MDVSA-2009:177 ] postgresql security
[ MDVSA-2009:178 ] perl-IO-Socket-SSL security
THOTCON 0x1 - Call For Papers is Open -> October 1, 2009 THOTCON Announce