Hi,
accepting syslog messages by a Check Point object has been introduced
with NG FP3, so this effect will not occur with FP1 or FP2.
Best regards,
Matthias
Hines, Eric wrote:
Has anyone tested these vulnerabilities on NG FP1 or are they strictly
related to FP3?
Eric Hines
-Original
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- - -
GENTOO LINUX SECURITY ANNOUNCEMENT 200303-19
- - -
PACKAGE : mutt
SUMMARY : buffer
Hello,
I don't know if anybody pointed it out before...
While playing with IE [6.0] I found out that
it is possible to read local files with a little
help of user...
How it works?
1. IE lets you define style for the INPUT type=file tag
including clipping region what makes possible to
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Synopsis: 3com RAS 1500 Remote vulnerabilities.
Product:3C433279A-US http://www.3com/ras1500
Version:Firmware X2.0.10
URL:http://isec.pl/vulnerabilities/isec-0009-3com-ras.txt
Author: Piotr Chytla [EMAIL PROTECTED]
Date:
I don't know if anybody pointed it out before...
yes i did, see http://msgs.securepoint.com/cgi-bin/get/bugtraq0302/12.html
- Original Message -
From: Adam [ckkl] [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Sunday, March 23, 2003 3:10 AM
Subject: IE - reading local files
Hello,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 266-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
March 17th, 2003
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- - -
GENTOO LINUX SECURITY ANNOUNCEMENT 200303-20
- - -
PACKAGE : openssl
SUMMARY :
-BEGIN PGP SIGNED MESSAGE-
__
SuSE Security Announcement
Package:mutt
Announcement-ID:SuSE-SA:2003:020
Date: Monday, Mar
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 267-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
March 24th, 2003
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- - -
GENTOO LINUX SECURITY ANNOUNCEMENT 200303-21
- - -
PACKAGE : bitchx
SUMMARY : buffer
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
++
| EnGarde Secure Linux Security Advisory March 24, 2003 |
| http://www.engardelinux.org/ ESA-20030324-012
I've been receiving a bunch of emails concerning if the exploit that I sent
to the list (iis_txt.c ) was focus on WebDav Vuln.. Of course Not (was a
totally different one, based on the old *.asp like iistart.asp). If David
Litchfield read the 1st one he prolly cried.
Regarding this I'm sending
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
__
SCO Security Advisory
Subject:UnixWare 7.1.1 Open UNIX 8.0.0 : Several vulnerabilities in
XDR/RPC routines
Advisory number:
Hello everyone,
I would like to make several DEF CON related announcements.
The Call For Papers for speaking at DEF CON ELEVEN (or XI, 0x0B, 1.1,
11) is now on-line and in effect. Continuing last year, we will continue
to pay speakers. We are also continuing to improve speaker quality. It is
-BEGIN PGP SIGNED MESSAGE-
__
SGI Security Advisory
Title: Multiple Vulnerabilities and Enhancements in ftpd
Number : 20030304-01-P
Date : March 24, 2003
Reference: CERT
15 matches
Mail list logo