-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Symantec Professional Services
www.symantec.com
Security Advisory
Advisory ID : SYMSA-2006-001
Advisory Name: Buffer overflow in Microsoft Office 2000, Office XP
Fortinet Security Advisory: FSA-2006-08
Microsoft Excel Column Index Improper Memory Access
Advisory Date : March 14, 2006
Reported Date : January 24, 2006
Vendor : Microsoft
Affected Products : Microsoft Excel 2003 Chinese Version
Fortinet Security Advisory: FSA-2006-09
Microsoft Excel Formula Size Stack Overflow
Advisory Date : March 14, 2006
Reported Date : January 24, 2006
Vendor : Microsoft
Affected Products : Microsoft Excel 2003 Chinese Version
retard said:
>as you see line 19 raises suspision of the possibility of rming 0777
>dirs i've tried it on on my personal server with no sucess, if someone
>knows of a way let me know.
According to the PHP manual, rmdir only works on empty directories.
Did you try to remove an empty directory?
-
Peter Winter-Smith of NGSSoftware has discovered a high risk vulnerability
in Microsoft Excel which may allow an remote attacker to execute arbitrary
code on a user's system via the Internet Explorer Excel plugin.
This issue has been resolved in the Microsoft bulletin MS06-012, which may
be downl
ZDI-06-004: Microsoft Excel File Format Parsing Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-06-004.html
March 14, 2006
-- CVE ID:
CVE-2006-0028
-- Affected Vendor:
Microsoft
-- Affected Products:
Office 2000
Office XP
Office 2003
-- TippingPoint(TM) IPS Customer Protection:
Ti
New eVuln Advisory:
CyBoards PHP Lite SQL Injection Vulnerability
http://evuln.com/vulns/91/summary.html
Summary
eVuln ID: EV0091
CVE: CVE-2006-1134
Software: CyBoards PHP Lite
Sowtware's Web Site:
http://www.gold-sonata.com/index.phtml?content=script/forums&me
Hello Bugtraq,
I've recently stumbled upon an interesting behaviour of some Linux kernels
that may be exploited by a remote attacker to abuse the ID field of IP
packets, effectively bypassing the zero IP ID in DF packets countermeasure
implemented since 2.4.8 (IIRC).
This is the correct behaviour
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 1001-1[EMAIL PROTECTED]
http://www.debian.org/security/ Moritz Muehlenhoff
March 14th, 2006
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 1000-1[EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
March 14th, 2006
DMA[2006-0313a] - 'Apple OSX Mail.app RFC1740 Real Name Buffer Overflow'
Author: Kevin Finisterre
Vendor: http://www.apple.com/macosx/
Product: 'Mac OSX 10.4.5 with Security Update 2006-001'
References:
http://www.digitalmunition.com/DMA[2006-0313a].txt
http://rfc.net/rfc1740.html
http://cve.mit
Drupal security advisory DRUPAL-SA-2006-004
Advisory ID:DRUPAL-SA-2006-004
Project:Drupal core
Date:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 998-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
March 14th, 2006
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 999-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
March 14th, 2006
Drupal security advisory DRUPAL-SA-2006-002
Advisory ID:DRUPAL-SA-2006-002
Project:Drupal core
Date:
Drupal security advisory DRUPAL-SA-2006-003
Advisory ID:DRUPAL-SA-2006-003
Project:Drupal core
Date:
Drupal security advisory DRUPAL-SA-2006-001
Advisory ID:DRUPAL-SA-2006-001
Project:Drupal core
Date:
17 matches
Mail list logo