Lee “cant afford a surname” <curtlee2002 () gmail com> wrote:
Correct so far.
No, the OS is NOT the problem here.
The problem are the morons who build *.EXE to install software (or just
unpack some files) and hand these *.EXE to unsuspecting and unskilled
users, expecting them to actually EXECUTE them.
This really nasty behaviour of almost all developers/companies out
there trained users to execute almost anything they get their…
Given enough bandwidth and a unique idea, anything is possible, it is
true.
You provided a 2MB text list of DNS servers, approximately 200,000 of
them. They sit across most of the v4 IP ranges available (and some IPV6
ones). This means upstream links won’t likely be saturated, and
filtering can likely be done on the server based on heuristics.
If you’re going to ask for 100% random non-existent domains you’re easy
to beat – if(…
This used to be a problem, 10+ years ago, since then there has been a lot of work done to protect larger DNS services
(root servers in particular) against DDoS:
—–Original Message—–
From: Fulldisclosure [mailto:fulldisclosure-bounces () seclists org] On Behalf Of Jeffrey Roberts
Sent: 05 October 2015 16:40
To: fulldisclosure () seclists org…
*Oracle E*–*Business Suite* is a fully integrated, comprehensive suite of
business applications for the enterprise. Following purposes most of
organization uses Oracle E-business.
1. Customer Relationship Management
2. Financial Management
3. Human Capital Management
4. Project Portfolio Management
5. Advanced Procurement
6. Supply Chain Management
7. Service Management
Recently, I was playing around with the Drupal CMS application code. Drupal
is an open source CMS application widely used for blog posting purpose,
Further details, to know more about Drupal
here <https://www.drupal.org/documentation>. Open source application
advantage being, the source code was at my disposal.
While fiddling around with the core Drupal Vendor Package I stumbled upon a
very interesting vulnerability of XSS. Now…
On Mon, Oct 5, 2015 at 8:16 AM, Stefan Kanthak <stefan.kanthak () nexgo de>
wrote:
Perhaps it’s my ignorance talking, but I just don’t see how:
“Run this EXE that might contain bad stuff” is worse than:
“Install this .msi as Admin that might contain bad stuff” or “install this
RPM as root that might contain bad stuff” or “install this .pkg as root
that might contain bad stuff.”
After all my advisories about vulnerabilities in Callisto 821+
(http://seclists.org/fulldisclosure/2011/Aug/1) and recent advisory about
Callisto 821+R3, here is new one. Because vendor ignored in 2011 all my
letters and subsequent my public disclosure of vulnerabilities and new
devices are vulnerable as well, so I disclosed vulnerabilities in Callisto
821+R3 ADSL Router.
These are Cross-Site Request Forgery vulnerabilities….