[SECURITY] [DSA-334-1] New xgalaga packages fix buffer overflow

2003-06-30 Thread Matt Zimmerman
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 334-1 [EMAIL PROTECTED] http://www.debian.org/security/ Matt Zimmerman June 28th, 2003

[SECURITY] [DSA-333-1] New acm packages fix integer overflow

2003-06-30 Thread Matt Zimmerman
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 333-1 [EMAIL PROTECTED] http://www.debian.org/security/ Matt Zimmerman June 27th, 2003

[SECURITY] [DSA-335-1] New mantis packages fix insecure file permissions

2003-06-30 Thread Matt Zimmerman
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 335-1 [EMAIL PROTECTED] http://www.debian.org/security/ Matt Zimmerman June 28th, 2003

[SECURITY] [DSA-332-1] New Linux 2.4.17 source code and MIPS kernel images fix several vulnerabilities

2003-06-30 Thread Matt Zimmerman
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 332-1 [EMAIL PROTECTED] http://www.debian.org/security/ Matt Zimmerman June 27th, 2003

[SECURITY] [DSA-331-1] New imagemagick packages fix insecure temporary file creation

2003-06-30 Thread Matt Zimmerman
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 331-1 [EMAIL PROTECTED] http://www.debian.org/security/ Matt Zimmerman June 27th, 2003

Megabook 2.0 -XSS & UA execution

2003-06-30 Thread morning_wood
-- - EXPL-A-2003-011 exploitlabs.com Advisory 011 -- -= MegaBook =- exploitlabs.com June 29, 2003 Vunerability(s):

Aprelium Abyss webserver X1 arbitrary code execution and headerinjection

2003-06-30 Thread Fozzy
--[ Description ]-- Abyss Web Server is a free, closed-source, personal web server for Windows and Linux operating systems. Homepage : http://www.aprelium.com The Hackademy Audit team has found two remote security holes in Abyss Webserver X1, allowing arbitrary code execution and header injection