|
Colapse all |
Post message
[RHSA-2003:288-01] Updated XFree86 packages provide security and bug fixes 2003-11-18 bugzilla redhat com Re: Security researchers organization 2003-11-18 http-equiv (at) excite (dot) com [email concealed] (1 malware com) <!-- What I would like to see created is an organization that would promote and protect the interests of security researchers, plain and simple. There is currently no organization that exists solely to guide, help and represent security researchers on a larger scale, yet we can all recognize the [ more ] [ reply ] OpenBSD kernel holes ... 2003-11-18 noir uberhax0r net (1 replies) once again i am honored to present you a generic and robust way to own OpenBSD 2.x-3.x, enjoy ;) it is quite funny to name ring 0 overflow patches as "reliability fixes". who does theo thinks he is fooling ? kiddies in his cult ? you can patch your useless/old openbsd systems by visiting; http:// [ more ] [ reply ] Apple Safari 1.1 (v100) 2003-11-18 Austin Gilbert (austin breakingrobots net) Hi, it appears that Apple's Safari is vulnerable to the old Mozilla/IE cookie theft vulnerability outlined by Marc Slemko http://alive.znep.com/~marcs/security/mozillacookie/ Marc posted a nice demo so that you can verify the vulnerability. http://alive.znep.com/~marcs/security/mozillacookie/demo [ more ] [ reply ] OpenLinux: Linux NFS utils package contains remotely exploitable off-by-one bug 2003-11-17 security sco com To: announce (at) lists.caldera (dot) com [email concealed] bugtraq (at) securityfocus (dot) com [email concealed] full-disclosure (at) lists.netsys (dot) com [email concealed] security-alerts (at) linuxsecurity (dot) com [email concealed] -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ________________________________________________________________________ ______ SCO Security Advisory Subject: OpenLinux: L [ more ] [ reply ] OpenLinux: Sendmail prescan remotely exploitable vulnerability 2003-11-17 security sco com To: announce (at) lists.caldera (dot) com [email concealed] bugtraq (at) securityfocus (dot) com [email concealed] full-disclosure (at) lists.netsys (dot) com [email concealed] security-alerts (at) linuxsecurity (dot) com [email concealed] -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ________________________________________________________________________ ______ SCO Security Advisory Subject: OpenLinux: [ more ] [ reply ] OpenLinux: Webmin/Usermin Session ID Spoofing Vulnerability 2003-11-17 security sco com To: announce (at) lists.caldera (dot) com [email concealed] bugtraq (at) securityfocus (dot) com [email concealed] full-disclosure (at) lists.netsys (dot) com [email concealed] security-alerts (at) linuxsecurity (dot) com [email concealed] -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ________________________________________________________________________ ______ SCO Security Advisory Subject: OpenLinux: [ more ] [ reply ] Security researchers organization 2003-11-17 Thor Larholm (thor pivx com) > From: Russ [mailto:Russ.Cooper (at) rc.on (dot) ca [email concealed]] > (Was: Vulnerability Disclosure Formats (was "Re: Funny article")) > <snip http://tinyurl.com/ve83> > Thor Larholm proposed the idea of a "Union" to me. While I don't like > the concept of union's in this day and age, our field is one that > could benefi [ more ] [ reply ] Re: VMWare GSX Server Authentication Server Buffer Overflow Vulnerability - Update 2003-11-17 VMware (vmware-security-alert vmware com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 VMware has investigated the vulnerability posted to this list on October 31, 2003 by dswofford (at) kpmg (dot) com [email concealed] under the subject, "VMWare GSX Server Authentication Server Buffer Overflow Vulnerability - Update". The original vulnerability report descri [ more ] [ reply ] OpenLinux: Key validity bug in GnuPG 1.2.1 and earlier 2003-11-17 security sco com To: announce (at) lists.caldera (dot) com [email concealed] bugtraq (at) securityfocus (dot) com [email concealed] full-disclosure (at) lists.netsys (dot) com [email concealed] security-alerts (at) linuxsecurity (dot) com [email concealed] To: kirkl (at) sco (dot) com [email concealed] -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ________________________________________________________________________ ______ SCO Security Advisory Su [ more ] [ reply ] PCL-0002: Session Hijacking in "Sqwebmail" 2003-11-18 Vincenzo Ciaglia (puccio pucciolab org) (1 replies) --------------------------- PUCCIOLAB.ORG - ADVISORIES <http://www.pucciolab.org> --------------------------- PCL-0002: Session Hijacking in "Sqwebmail" ------------------------------------------------------------------------ --- PuCCiOLAB.ORG Security Advisories puccio@pucciolab [ more ] [ reply ] Re: PCL-0002: Session Hijacking in "Sqwebmail" 2003-11-17 Christophe Casalegno (christophe casalegno digital-network net) [SECURITY] [DSA 401-1] New hylafax packages fix remote root exploit 2003-11-17 joey infodrom org (Martin Schulze) [SECURITY] [DSA 402-1] New minimalist package fixes remote command execution 2003-11-17 joey infodrom org (Martin Schulze) phpWebFileManager v2.0.0 - Directory traversal 2003-11-16 r00t rsteam ru (1 replies) pServ 2.0.x:beta webserver remote buffer overflow exploit by jsk 2003-11-15 yan feng (jsk ph4nt0m net) /*********************************************************************** ***********pServ 2.0.x beta:webserver remote buffer overflow exploit by jsk *The aim of pServ (pico Server) is to create a portable, small webserver. *i want a sec webserver. so test some webserver. *meet http://www.securi [ more ] [ reply ] [Exploit]: Microsoft FPSE fp30reg.dll Overflow Remote Exploit (MS03-051) 2003-11-14 Adik (netninja hotmail kg) Hello folks, If anyone is interested in an exploit for recently announced FPSE fp30reg.dll overflow bug (MS03-051) by Brett Moore, u can pick it up at http://netninja.to.kg ---- fp30reg.dll overflow ------- C:\fp30reg -={ Frontpage fp30reg.dll Overflow Exploit (MS03-051) ver 0.2 }=- by Adik [ more ] [ reply ] idsearch.com and googleMS.DLL 2003-11-15 trappers (trappers mail15 com) (1 replies) Hi everyone, Here is a peice of information i'd like to share. Sorry of its old or irrelevant but I haven't noticed a mention of this on bugtraq, so am posting my experience with "the arrogant idsearch default homepage". For about two weeks we've been getting complaints from various stand-alo [ more ] [ reply ] UnAce 2.20 Exploitable Stack-Based Overflow (exploit code) 2003-11-15 Li0n7 voila fr UnAce 2.20 Exploitable Stack-Based Overflow -------------------------------------------------------------------- SUMMARY UnAce has been reported to be prone to a buffer overflow vulnerability. The issue presents itself when UnAce handles ace filenames that are of excessive lenght. W [ more ] [ reply ] RE: Vulnerability Disclosure Formats (was "Re: Funny article") 2003-11-15 Russ (Russ Cooper rc on ca) If it was recommended to the public that they report their medical issues along some "guidelines", such as those suggested by Steve, people would be dropping like flies. First, let me give a deep bow to Steve's ongoing and significant efforts in the vulnerability reporting arena. I don't think anyo [ more ] [ reply ] |
|
Privacy Statement |
Hash: SHA1
- ---------------------------------------------------------------------
Red Hat Security Advisory
Synopsis: Updated XFree86 packages provide security and bug fixes
Advisory ID: RHSA-2003:288-01
Issue date: 2003-
[ more ] [ reply ]