[Full-disclosure] CORE-2007-1212: SILC pkcs_decode buffer overflow

2008-03-25 Thread Core Security Technologies Advisories
Security Technologies advisories team, which is available for download at http://www.coresecurity.com/files/attachments/core_security_advisories.asc. -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

[Full-disclosure] CORE-2008-0123: Leopard Server Remote Path Traversal

2008-03-18 Thread Core Security Technologies Advisories
of this advisory are copyright (c) 2008 Core Security Technologies and (c) 2008 CoreLabs, and may be distributed freely provided that no fee is charged for this distribution and proper credit is given. *GPG/PGP Keys* This advisory has been signed with the GPG key of Core Security Technologies advisories

[Full-disclosure] CORE-2008-0204: Timbuktu Pro Remote Path Traversal and Log Injection

2008-03-11 Thread Core Security Technologies Advisories
, and may be distributed freely provided that no fee is charged for this distribution and proper credit is given. *GPG/PGP Keys* This advisory has been signed with the GPG key of Core Security Technologies advisories team, which is available for download at http://www.coresecurity.com/files/attachments

[Full-disclosure] CORE-2008-0124: Multiple vulnerabilities in Google's Android SDK

2008-03-04 Thread Core Security Technologies Advisories
signed with the GPG key of Core Security Technologies advisories team, which is available for download at http://www.coresecurity.com/files/attachments/core_security_advisories.asc. -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (MingW32) Comment: Using GnuPG with Mozilla - http

[Full-disclosure] CORE-2008-0130: VLC media player chunk context validation error

2008-02-27 Thread Core Security Technologies Advisories
be distributed freely provided that no fee is charged for this distribution and proper credit is given. *GPG/PGP Keys* This advisory has been signed with the GPG key of Core Security Technologies advisories team, which is available for download at http://www.coresecurity.com/files/attachments

[Full-disclosure] CORE-2007-0930 Path Traversal vulnerability in VMware's shared folders implementation

2008-02-25 Thread Core Security Technologies Advisories
is given. *GPG/PGP Keys* This advisory has been signed with the GPG key of Core Security Technologies advisories team, which is available for download at http://www.coresecurity.com/files/attachments/core_security_advisories.asc. -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.7 (MingW32

[Full-disclosure] CORE-2007-0930 Path Traversal vulnerability in VMware's shared folders implementation

2008-02-25 Thread Core Security Technologies Advisories
is given. *GPG/PGP Keys* This advisory has been signed with the GPG key of Core Security Technologies advisories team, which is available for download at http://www.coresecurity.com/files/attachments/core_security_advisories.asc. -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.7 (MingW32

[Full-disclosure] CORE-2008-0122: MPlayer arbitrary pointer dereference

2008-02-04 Thread CORE Security Technologies Advisories
and proper credit is given. *GPG/PGP Keys* This advisory has been signed with the GPG key of Core Security Technologies advisories team, which is available for download at http://www.coresecurity.com/files/attachments/core_security_advisories.asc. -BEGIN PGP SIGNATURE- Version: GnuPG

[Full-disclosure] CORE-2007-1218: MPlayer 1.0rc2 buffer overflow vulnerability

2008-02-04 Thread CORE Security Technologies Advisories
is charged for this distribution and proper credit is given. *GPG/PGP Keys* This advisory has been signed with the GPG key of Core Security Technologies advisories team, which is available for download at http://www.coresecurity.com/files/attachments/core_security_advisories.asc. -BEGIN PGP SIGNATURE

[Full-disclosure] CORE-2007-0821: Lotus Notes buffer overflow in the Lotus WorkSheet file processor

2007-11-27 Thread Core Security Technologies Advisories
of this advisory are copyright (c) 2007 CORE Security Technologies and (c) 2007 CoreLabs, and may be distributed freely provided that no fee is charged for this distribution and proper credit is given. *PGP/GPG KEYS* This advisory has been signed with the GPG key of Core Security Technologies advisories team

[Full-disclosure] CORE-2007-0928: Stack-based buffer overflow vulnerability in OpenBSD’s DHCP server

2007-10-10 Thread Core Security Technologies Advisories
* The contents of this advisory are copyright (c) 2007 CORE Security Technologies and (c) 2007 CoreLabs, and may be distributed freely provided that no fee is charged for this distribution and proper credit is given. *PGP/GPG KEYS* This advisory has been signed with the GPG key of Core Security

[Full-disclosure] CORE-2007-0817: Remote Command execution, HTML and JavaScript injection vulnerabilities in AOL's Instant Messaging software

2007-09-25 Thread Core Security Technologies Advisories
is given. PGP/GPG KEYS This advisory has been signed with the GPG key of Core Security Technologies advisories team, which is available for download at http://www.coresecurity.com/files/attachments/core_security_advisories.asc -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.7 (MingW32) iD8DBQFG

<    1   2