BugTraq Mode:
(Page 1264 of 1748)  < Prev  1259 1260 1261 1262 1263 1264 1265 1266 1267 1268 1269  Next >
[SECURITY] [DSA 850-1] New tcpdump packages fix denial of service 2005-10-09
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 850-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
October 9th, 2005

[ more ]  [ reply ]
[SECURITY] [DSA 851-1] New openvpn packages fix denial of service 2005-10-09
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 851-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
October 9th, 2005

[ more ]  [ reply ]
[SECURITY] [DSA 852-1] New up-imapproxy packages fix arbitrary code execution 2005-10-09
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 852-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
October 9th, 2005

[ more ]  [ reply ]
[SECURITY] [DSA 853-1] New ethereal packages fix several vulnerabilities 2005-10-09
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 853-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
October 9th, 2005

[ more ]  [ reply ]
[SECURITY] [DSA 854-1] New tcpdump packages fix denial of service 2005-10-09
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 854-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
October 9th, 2005

[ more ]  [ reply ]
Announcement: The Web Application Firewall Evaluation Criteria v1 2005-10-10
contact webappsec org
The Web Application Firewall Evaluation Criteria project is proud
to announce its first public release.

The goal of the project is to develop a detailed web application
firewall evaluation criteria; a testing methodology that can be
used by any reasonably skilled technician to independently assess

[ more ]  [ reply ]
[SECURITY] [DSA 855-1] New weex packages fix arbitrary code execution 2005-10-10
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 855-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
October 10th, 2005

[ more ]  [ reply ]
[SECURITY] [DSA 856-1] New py2play packages fix arbitrary code execution 2005-10-10
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 856-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
October 10th, 2005

[ more ]  [ reply ]
[SECURITY] [DSA 857-1] New graphviz packages fix insecure temporary file 2005-10-10
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 857-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
October 10th, 2005

[ more ]  [ reply ]
Re: Opinion: Complete failure of Oracle security response and utter neglect of t 2005-10-10
Silent / Saracoth (saracoth hotmail com)
http://en.wikipedia.org/wiki/Ad_hominem
http://en.wikipedia.org/wiki/Style_over_substance_fallacy

All right, I figured that a 14-message long thread would have some kind of
credible defense for Oracle, but nope. All I see are generalizations that
don't apply and logical fallacies (which, if your

[ more ]  [ reply ]
PullThePlug Contest: Call For Papers 2005-10-10
announcements pulltheplug org
Hi,

The PullThePlug Contest is a unique opportunity for individuals in the
information security community to share their knowledge in the form of
interesting and innovative papers and win a prize in the process.

All the papers will be reviewed by our Contest Voting Panel and the best
entries will

[ more ]  [ reply ]
[SECURITYREASON.COM] phpMyAdmin Local file inclusion 2.6.4-pl1 2005-10-10
max jestsuper pl
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[phpMyAdmin Local file inclusion 2.6.4-pl1]

Author: Maksymilian Arciemowicz ( cXIb8O3 ).18
Date: 10.10.2005
from SECURITYREASON.COM

- --- 0.Description ---
phpMyAdmin 2.6.4 is a tool written in PHP intended to
handle the administration of MySQL over t

[ more ]  [ reply ]
[SECURITY] [DSA 858-1] New xloadimage packages fix arbitrary code execution 2005-10-10
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 858-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
October 10th, 2005

[ more ]  [ reply ]
[SECURITY] [DSA 859-1] New xli packages fix arbitrary code execution 2005-10-10
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 859-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
October 10th, 2005

[ more ]  [ reply ]
iDEFENSE Security Advisory 10.10.05: SGI IRIX runpriv Design Error Vulnerability 2005-10-10
iDEFENSE Labs (labs-no-reply idefense com)
SGI IRIX runpriv Design Error Vulnerability

iDEFENSE Security Advisory 10.10.05
www.idefense.com/application/poi/display?id=312&type=vulnerabilities
October 10, 2005

I. BACKGROUND

The runpriv program is a setuid root application that checks to see if a

regular user has been granted privileges t

[ more ]  [ reply ]
iDEFENSE Security Advisory 10.10.05: Kaspersky Anti-Virus Engine CHM File Parser Buffer Overflow Vulnerability 2005-10-10
iDEFENSE Labs (labs-no-reply idefense com)
Kaspersky Anti-Virus Engine CHM File Parser Buffer Overflow
Vulnerability

iDEFENSE Security Advisory 10.10.05
www.idefense.com/application/poi/display?id=318&type=vulnerabilities
October 10, 2005

I. BACKGROUND

Kaspersky Anti-Virus Engine (KAV) is a popular virus scanning engine
for Windows and L

[ more ]  [ reply ]
versatileBulletinBoard V1.0.0 RC2 (possibly prior versions) multiple SQL injection vulnerabilities / login bypass / board takeover 2005-10-10
rgod aliceposta it
versatileBulletinBoard V1.0.0 RC2 (possibly prior versions)
multiple SQL Injection vulnerabilities / login bypass / cross site scripting / information disclosure

software:
site: http://vbb.eniki.de/

if magic_quotes_gpc off...

A)

i)SQL INJECTION / LOGIN BYPASS

you can login as admin typing;

lo

[ more ]  [ reply ]
[SECURITY] [DSA 860-1] New Ruby packages fix safety bypass 2005-10-11
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 860-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
October 11th, 2005

[ more ]  [ reply ]
FreeBSD Security Advisory FreeBSD-SA-05:21.openssl 2005-10-11
FreeBSD Security Advisories (security-advisories freebsd org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

========================================================================
=====
FreeBSD-SA-05:21.openssl Security Advisory
The FreeBSD Project

Topic: Po

[ more ]  [ reply ]
XSS vulnerability in Zeroblog 2005-10-11
alireza hassani (trueend5 yahoo com)
Software: ZeroBlog
Vendor: http://www.sothq.net
Version: 1.2a , 1.1f
Bug: XSS
Exploitation: Remote
---------------------------
Introduction:
Zeroblog: Feature ritch weblog, d-board, live webcam
(option, and requires 3th party software), calendar,
poll system, photogallery, smileys, search engine, 80

[ more ]  [ reply ]
[KDE Security Advisory] KOffice/KWord RTF import buffer overflow 2005-10-11
Dirk Mueller (mueller kde org)
KDE Security Advisory: KWord RTF import buffer overflow
Original Release Date: 2005-10-11
URL: http://www.kde.org/info/security/advisory-20051011-1.txt

0. References

CAN-2005-2971
CESA-2005-005

1. Systems affected:

All KOffice releases starting from KOffice 1.2.0 up to

[ more ]  [ reply ]
Secunia Research: WinRAR Format String and Buffer OverflowVulnerabilities 2005-10-11
Secunia Research (vuln secunia com)
======================================================================

Secunia Research 11/10/2005

- WinRAR Format String and Buffer Overflow Vulnerabilities -

======================================================================
Table of Contents

Affected Software..

[ more ]  [ reply ]
The Malloc Maleficarum 2005-10-11
Phantasmal Phantasmagoria (phantasmal hush ai)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[--------------------------------

The Malloc Maleficarum
Glibc Malloc Exploitation Techniques

by Phantasmal Phantasmagoria
phantasmal (at) hush (dot) ai [email concealed]

[--------------------------------

In late 2001, "Vudo Malloc Tricks" and "Once Upon A free()" defined
the e

[ more ]  [ reply ]
iDEFENSE Security Advisory 10.11.05: Microsoft Distributed Transaction Controller Packet Relay DoS Vulnerability 2005-10-11
iDEFENSE Labs (labs-no-reply idefense com)
Microsoft Distributed Transaction Controller Packet Relay DoS
Vulnerability

iDEFENSE Security Advisory 10.11.05
www.idefense.com/application/poi/display?id=319&type=vulnerabilities
October 11, 2005

I. BACKGROUND

The Distributed Transaction Controller provides a method for disparate
processes to

[ more ]  [ reply ]
iDEFENSE Security Advisory 10.11.05: Microsoft Distributed Transaction Controller TIP DoS Vulnerability 2005-10-11
iDEFENSE Labs (labs-no-reply idefense com)
Microsoft Distributed Transaction Controller TIP DoS Vulnerability

iDEFENSE Security Advisory 10.11.05
www.idefense.com/application/poi/display?id=320&type=vulnerabilities
October 11, 2005

I. BACKGROUND

The Distributed Transaction Controller provides a method for disparate
processes to complete

[ more ]  [ reply ]
[EEYEB20050510] - Microsoft DirectShow Remote Code Vulnerability 2005-10-11
Advisories eeye com
Microsoft DirectShow Remote Code Vulnerability

Release Date:
October 11, 2005

Date Reported:
May 10, 2005

Severity:
High (Code Execution)

Vendor:
Microsoft

Systems Affected:

Windows 98, 98SE, ME
Windows 2000 SP4 - Microsoft DirectX 8.0 - 9.0c
Windows XP SP1 - SP2 - DirectX 9.0 - 9.0c
Windows S

[ more ]  [ reply ]
[EEYEB20050708] Microsoft Distributed Transaction Coordinator Memory Modification Vulnerability 2005-10-11
Advisories eeye com
Microsoft Distributed Transaction Coordinator Memory Modification
Vulnerability

Release Date:
October 11, 2005

Date Reported:
July 8, 2005

Severity:
High (Remote Code Execution)

Vendor:
Microsoft

Systems Affected:
Windows 2000 Server SP0 - SP4
- Vulnerable - Anonymous remotely exploitable

[ more ]  [ reply ]
[EEYEB20050915] - MDT2DD.DLL COM Object Uninitialized Heap Memory Vulnerability 2005-10-11
Advisories eeye com
MDT2DD.DLL COM Object Uninitialized Heap Memory Vulnerability

Release Date:
October 11, 2005

Date Reported:
September 15, 2005

Severity:
High (Code Execution)

Vendor:
Microsoft

Systems Affected:
Internet Explorer 5 SP4
Internet Explorer 5.5 SP2 - Windows ME
Internet Explorer 6 SP1 - All Windows

[ more ]  [ reply ]
[EEYEB20050803] - Windows UMPNPMGR wsprintfW Stack Buffer Overflow Vulnerability 2005-10-11
Advisories eeye com
Windows UMPNPMGR wsprintfW Stack Buffer Overflow Vulnerability

Release Date:
October 11, 2005

Date Reported:
August 3, 2005

Severity:
High (Remote Code Execution with Authentication)
Medium (Privilege Escalation to SYSTEM)

Vendor:
Microsoft

Systems Affected:
Windows NT 4.0
Windows 2000
Windows

[ more ]  [ reply ]
[SECURITY] [DSA 862-1] New Ruby 1.6 packages fix safety bypass 2005-10-11
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 862-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
October 11th, 2005

[ more ]  [ reply ]
(Page 1264 of 1748)  < Prev  1259 1260 1261 1262 1263 1264 1265 1266 1267 1268 1269  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus