-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
GENTOO LINUX SECURITY ANNOUNCEMENT 200210-009
- -
PACKAGE : mod_ssl
SUMMARY : cross site scripting
DATE :
Hi!
About the KTH Heimdal remote root exploit I can say it is really serious!
About a week ago a hacker stole over 10'000 passwords from Stockholm University in
Sweden for all students and staff by trapping the stack buffer overflow in kadmind4.
You can imagine what problems this caused and
Introduction.
Contemporary world is practically impossible without systems of electronic digital
signature (EDS).
Every Internet user imperceptibly for himself uses them. It is these methods which
ensure
functionality and efficiency of contemporary banking sector. Despite this fact the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
@stake, Inc.
www.atstake.com
Security Advisory
Advisory Name: Oracle9iAS Web Cache Denial of Service
Release Date: 10-28-2002
Application: Oracle9iAS Web
Hi,
Note: phpBB versions above 2.0.0 are not vulnerable.
Note that there are alot of modified/hacked versions
of phpbb floating around the Net, such as the
phpbbtonuke port for phpnuke. The phpbb port for
phpnuke55 and 56 uses phpbb2.0, and there is no patch
or available port upgrade.
As a
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
GENTOO LINUX SECURITY ANNOUNCEMENT 200210-011
- -
PACKAGE : krb5
SUMMARY : buffer overflow
DATE :
##
#Product: MDaemon SMTP/POP/IMAP server #
#Authors: Alt-N Technologies Ltd [www.mdaemon.com] #
#Vulnerable versions: v.6.0.7 and bellow #
#Vulnerability: buffer overflow #
#Bugexploit by D4rkGr3y
I have managed to reduplicate at least five times the
following scenario with a cisco as5250, with firmwrare
12.2 (11t) release firmware of cisco:
nmap -dinsane -p 1-65535 ip.of.as5350 This causes a
hard lockup, and the device must be powered off in
order to have functionality restored to
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -
GENTOO LINUX SECURITY ANNOUNCEMENT 200210-010
- -
PACKAGE : ypserv
SUMMARY : information leak
DATE :
Privilege Escalation Vulnerability In phpBB 2.0.0
-
Rootsecure.net recently found a privilege escalation vulnerability
in phpBB 2.0.0 which allows any person with a user level account to
escalate their privileges to that of administrator
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 182-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
October 28th, 2002
Products: Mailreader.com v 2.3.31 and below (http://www.mailreader.com)
Date: 28 October 2002
Author: pokleyzz [EMAIL PROTECTED]
Contributors: [EMAIL PROTECTED] [EMAIL PROTECTED]
Description
===
Mailreader.com (http://www.mailreader.com) is web base pop3 email
reader written in perl.
Informations :
°°
Product : dobermann FORUM
version : 0.5
website : http://www.le-dobermann.com
Problem : Include file
PHP Code/location :
°°°
entete.php
enteteacceuil.php
topic/entete.php :
--
?php include $subpath.banniere.php;
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
[EMAIL PROTECTED] [EMAIL PROTECTED]
__
SCO Security Advisory
Subject:Linux: uudecode performs inadequate checks on user-specified
output
14 matches
Mail list logo