-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Mandrake Linux Security Update Advisory
Package name: shadow-utils
Advisory
Hi!
Am Wed, Feb 26, 2003 at 04:00:55PM +0100, Jakob Balle schrieb:
==
2) Affected Software
Following have been tested and found vulnerable:
Opera prior to 7.02 on Windows
[...]
Yes, it had been known for a while. Searching for style overflow
scroll in bugzilla brings up a list of bug reports.
So, instead of posting to bugtraq you could have added a note to one of
those bug reports. Then again, posting here might put some pressure on
mozilla developers, who knows?
jux
--[ Summary ]--
From the Microsoft Security Bulletin MS03-006:
A security vulnerability is present in the Windows Me version of Help
and Support Center [...]. An attacker could exploit the vulnerability by
constructing a URL that, when clicked on by the user, would execute code
of the
NGSSoftware Insight Security Research Advisory
Name:ISMAIL v 1.25 v 1.4.3 Remote Buffer Overrun
Systems Affected: WinNT, Win2K, XP
Severity: High Risk
Category: Remote Buffer Overrun
Vendor URL: http://instantservers.com/ismail.html
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 254-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
February 27th, 2003
Hi,
I don't know if someone has discovered this before but Ecartis 1.0.0
(former listar) contains a vulnerability that enables an attacker to reset
passwords of any user defined on the list server, including the list
admins.
After logging on as a non-priviledged user, Ecartis enables the
This looks like http://bugzilla.mozilla.org/show_bug.cgi?id=189118
Tested Jocke's page on Mozilla for MacOS X. Worked fine, no effect.
The top command said Mozilla was using under 2% of my CPU.
Jocke wrote:
html
body
div style=position:absolute;
div style=position:absolute;
In article [EMAIL PROTECTED] you wrote:
[...]
Attached below is a patch RK and I whipped up yesterday, after I
caught wind of this problem sometime in the afternoon.
[...]
Thanks for your efforts. We've reviewed your patch for inclusion into
our OpenPKG zlib package and discovered that
Confirm on 6.0.2800.1106
On my IE is present: SP1, q324929, q810847, q813951
D'Amato Luigi
Admin www.securitywireless.info
- Original Message -
From: Dike [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Tuesday, February 25, 2003 1:50 PM
Subject: RE: Self-Executing HTML: Internet Explorer
Overview
By sending a specially crafted packet to the bf1942-server
remote administration port, an attacker can cause the server
to crash.
After getting some reports, it seems that only servers
running on Windows XP are vulnerable. Can someone
confirm this?
greuff
pgp0.pgp
-BEGIN PGP SIGNED MESSAGE-
__
SGI Security Advisory
Title: Buffer Overrun Vulnerability in /sbin/ps
Number : 20030202-01-I
Date : February 26, 2003
Reference: CVE-1999-0301
-BEGIN PGP SIGNED MESSAGE-
__
SuSE Security Announcement
Package:hypermail
Announcement-ID:SuSE-SA:2003:0012
Date:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
iDEFENSE Security Advisory 02.27.03:
http://www.idefense.com/advisory/02.27.03.txt
TCPDUMP Denial of Service Vulnerability in ISAKMP Packet Parsing
February 27, 2003
I. BACKGROUND
TCPDUMP is a widely used network debugging tool that prints out the
Informations :
°°
Website : http://www.invisionboard.com
--
Version : 1.0.1
Problem : phpinfo()
--
Version : 1.1.1
Problem : File Including
PHP Code/Location :
°°°
v1.0.1 :
phpinfo.php :
--
?php
phpinfo();
?
Hi,
My post entitled MS-Windows ME IE/Outlook/HelpCenter critical vulnerability was
parsed incorrectly by the securityfocus mailing-list manager, giving me a From: adress
[EMAIL PROTECTED].
My contact e-mail is [EMAIL PROTECTED] I am not, in any way, a member of
securityfocus.com.
Thanks,
--
Priv8 Security - www.priv8security.com
priv8mdk90.tar.gz - Mandrake 9.0 local root exploit
Based on Idefense adv.
http://www.idefense.com/advisory/01.21.03.txt
Greets to :
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 255-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
February 27th, 2003
18 matches
Mail list logo