Jump to content

honey5

Registered Users

Change your profile picture
  • Posts

    700
  • Joined

  • Last visited

Reputation

592 Excellent
  1. shhhhhhhhhhhhhhhh she's watching it laying again 20 zillion orphans need rehoming honey x
  2. the posts you make in the bear garden dont go towards your post count and you need to have made 5 before you are allowed images honey x
  3. must be fascinating for the kids Jo dont you go loosing Earl mind you
  4. Mozilla has released another point update for its flagship Firefox browser to provide fixes for at least 12 documented security vulnerabilities. Some of the flaws put millions of Web surfers at risk of remote code execution attacks. The Firefox 3.0.2 update addresses two issues rated by Mozilla to be “critical,” meaning that the documented vulnerability can be used to run attacker code and install software, requiring no user interaction beyond normal browsing. MFSA-2008-40 - Mozilla developer Paul Nickerson reported a variant of a click-hijacking vulnerability discovered in Internet Explorer by Liu Die Yu. The vulnerability allowed an attacker to move the content window while the mouse was being clicked, causing an item to be dragged rather than clicked-on. This issue could potentially be used to force a user to download a file or perform other drag-and-drop actions. MFSA-2008-41 - Mozilla security researcher moz_bug_r_a4 reported a series of vulnerabilities by which page content can pollute XPCNativeWrappers and have arbitrary code run with chrome privileges. One variant reported by moz_bug_r_a4 only affected Firefox 2. Mozilla developer Olli Pettay reported that XSLT can create documents which do not have script handling objects. moz_bug_r_a4 also reported that document.loadBindingDocument() returns a document that does not have a script handling object. These issues could also be used by an attacker to run arbitrary script with chrome privileges. MFSA-2008-42 - Mozilla developers identified and fixed several stability bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these crashes showed evidence of memory corruption under certain circumstances and we presume that with enough effort at least some of these could be exploited to run arbitrary code. Drew Yao of Apple Product Security reported two crashes in Mozilla image rendering code. This vulnerability only affected Firefox 3. David Maciejak also reported a crash in graphics rendering which only affected Firefox 3. MFSA-2008-43 - Microsoft developer Dave Reed reported that certain BOM characters are stripped from JavaScript code before it is executed. This can lead to code, which would otherwise be treated as part of a quoted string, to be executed. The issue could potentially be used by an attacker to bypass or evade script filters and perform an XSS attack. Security researcher Gareth Heyes reported an issue with the HTML parser in which the parser ignored certain low surrogate characters if they were HTML-escaped. This issue could potentially be used to bypass naive script filtering and used in an XSS attack. This issue only affected Firefox 2. MFSA-2008-44 - Mozilla developer Boris Zbarsky reported that the resource: protocol allowed directory traversal on Linux when using URL-encoded slashes. Mozilla developer Georgi Guninski reported that the restrictions imposed on local HTML files could be bypassed using the resource: protocol. The vulnerability allowed an attacker to read information about the system and prompt the victim to save the information in a file. The open-source group also released patches for multiple vulnerabilities affecting Firefox 2 but strongly recommends that users upgrade to Firefox 3.
  5. of course i do sorry, not sure whether im comming or going at the min, thanks, ill go squeeze my head right now honey x
  6. there should be a designated social worker assigned to meet the needs, as well as the appropriate nursing team, they therefore will deal with all matters concerning the said person and take the pressure from the family wishing them all the best honey x
  7. would it be 14 days from the AoS going in?, ive had no word from the courts as yet to say that it has been relocated to a local court thanks for your help 42man x honey x zazen.warrior will take a look now thankyou x
  8. letter recieved this morning from cohens Dear **************** We refer to your recent letter in which you have made a request for information under the Civil Procedure Rules. We have been in contact with our solicitors, Howard Cohen & Co who have advised that we are not obliged to provide this information, and would advise that the Particulars of Claim detailed in the County Court Claim Form should be sufficient to allow you to respond accordingly. Please respond to the claim form with either an appropriate defence or an admission and offer of repayment. Failure to do so will result in a judgement being entered without reference to you. If you are in any doubt as to your position in this matter please seek your own legal advice. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ honey x
  9. http://www.consumeractiongroup.co.uk/forum/formal-solutions-bankruptcy-administration/154615-advice-needed-please-bankrupcy-3.html#post1729300 #47 in this post might be of interest Tills take care speak soon xxx honey x
  10. aw bless of course you will get all of the help and support that you need here, try not to fret too much (easy to say i know) Simple answer is they cant take what you havent got youre going down the right route asking for CCA to see if the debt is enforceable Try posting in the relevant forums and i promise you someone will guide you every step of the way Good luck to you both and here's to a happy stress free ending honeyx
  11. im not sure but would you not be able to sign a % of your property over to your kind relative now, prior to any instigation from other outside agencies? honey x
  12. according to moorcroft i took a card out on the 30th feb 2009:eek: wonder why i havent heard from them in 6 months honey x
×
×
  • Create New...