Mail Index
- [ GLSA 200406-22 ] Pavuk: Remote buffer overflow
- MDKSA-2004:065 - Updated apache packages fix buffer overflow vulnerability in mod_proxy
- From: Mandrake Linux Security Team
- MDKSA-2004:063 - Updated libpng packages fix potential remote compromise
- From: Mandrake Linux Security Team
- MDKSA-2004:064 - Updated apache2 packages fix DoS vulnerability
- From: Mandrake Linux Security Team
- rsbac 1.2.3 jail security problems
- Re: Java applet crashing with native assertion
- From: Luciano Miguel Ferreira Rocha
- Re: Java applet crashing with native assertion
- Microsoft technologies. By default, non-HIPAA compliant?
- From: Anything But Microsoft
- Re: Java applet crashing with native assertion
- BHO Trojan follow-up information
- Remote DoS vulnerability in Linux kernel 2.6.x
- linux kernel Sbus PROM driver multiple integer overflows
- RE: Microsoft technologies. By default, non-HIPAA compliant?
- RE: Microsoft technologies. By default, non-HIPAA compliant?
- SUPER SPOOF DELUXE Re: [Full-Disclosure] Microsoft and Security
- From: http-equiv@xxxxxxxxxx
- DSL router Prestige 650HW-31
- FW: [security bulletin] SSRT4758 rev. 0 HP-UX ObAM WebAdmin unauthorized access
- Cisco Security Advisory: Cisco Collaboration Server Vulnerability
- From: Cisco Systems Product Security Incident Response Team
- RE: Microsoft technologies. By default, non-HIPAA compliant?
- Unprevileged user can change quota on Domino
- (IE/SCOB) Switching Software Because of Bugs: Some Facts About Software and Security bugs
- Re: php codes injection in phpMyAdmin version 2.5.7.
- SecurityLab report: The Top 10 Most Critical Vulnerabilities in June 2004
- Re: php codes injection in phpMyAdmin version 2.5.7.
- Re: Microsoft technologies. By default, non-HIPAA compliant?
- DoS against Domino 6.5.1
- FW: [security bulletin] SSRT3552 HP-UX running ARPA transport local Denial of Service (DoS)
- RE: Microsoft technologies. By default, non-HIPAA compliant?
- MD5 hash cracking service
- Re: Microsoft technologies. By default, non-HIPAA compliant?
- [ GLSA 200407-01 ] Esearch: Insecure temp file handling
- Re: Microsoft technologies. By default, non-HIPAA compliant?
- Brightmail leaks other user's spam
- SUSE Security Announcement: kernel (SUSE-SA:2004:020)
- FreeBSD Security Advisory FreeBSD-SA-04:13.linux
- From: FreeBSD Security Advisories
- Multiple Vulnerabilities in Easy Chat Server 1.2
- DLINK 624, script injection vulnerability
- Sanity check in Centre
- Registry fixes for the recent IE vulnerabilities
- Announce: RSBAC v1.2.3 released
- XSS in SCI Photo Chat Server 3.4.9
- [HW-MED] XSS in Netegrity IdentityMinder
- Registry Fix For Variant of Scob
- Public Review of OIS Security Vulnerability Reporting and Response Guidelines
- Re: [Full-Disclosure] Fix for IE ADODB.Stream vulnerability is out
- From: http-equiv@xxxxxxxxxx
- RE: RE: SUPER SPOOF DELUXE Re: [Full-Disclosure] Microsoft and Security
- From: http-equiv@xxxxxxxxxx
- THE INSIDER VULNERABILITY STILL WORKS AFTER TODAY'S PATCH
- Enterasys XSR Security Routers DoS
- RE: [Full-Disclosure] THE VULNERABILITY STILL WORKS AFTER TODAY'S PATCH
- The 3 D's: Demo for the Dullards and Dunces
- From: http-equiv@xxxxxxxxxx
- Cart32 Input Validation Flaw in 'GetLatestBuilds?cart32=' Permits Remote Cross-Site Scripting Attacks
- Re: DLINK 614+ - SOHO routers, system DOS
- [SECURITY] [DSA 527-1] New pavuk packages fix buffer overflow
- [SECURITY] [DSA 526-1] New webmin packages fix multiple vulnerabilities
- [ GLSA 200407-04 ] Pure-FTPd: Potential DoS when maximum connections is reached
- XSS in 12Planet Chat Server 2.9
- [ GLSA 200407-03 ] Apache 2: Remote denial of service attack
- Re: Public Review of OIS Security Vulnerability Reporting and ResponseGuidelines
- unreal ircd ip cloaking subsystem vulnerability
- Fastream NETFile FTP/Web Server Input validation Errors
- MySQL Authentication Bypass
- From: NGSSoftware Insight Security Research
- Re: Java applet crashing with native assertion
- Linux Virtual Server/Secure Context procfs shared permissions flaw
- RE: Microsoft and Security
- Do not adopt OIS standards (Was: Public Review of OIS Security Vulnerability Reporting and Response Guidelines)
- [ GLSA 200407-05 ] XFree86, X.org: XDM ignores requestPort setting
- RE: Registry Fix For Variant of Scob
- RE: Microsoft and Security
- Re: [Dailydave] Re: [Full-Disclosure] Public Review of OIS Security Vulnerability Reporting and Response Guidelines
- Re: [Full-Disclosure] Public Review of OIS Security Vulnerability Reporting and Response Guidelines
- Re: Microsoft and Security
- Re: Public Review of OIS Security Vulnerability Reporting and Response Guidelines
- RE: Registry Fix For Variant of Scob
- BENCHMARK() is not the only way to determine successfull MySQL injection
- RE: Microsoft and Security
- RE: Microsoft technologies. By default, non-HIPAA compliant?
- From: Anything But Microsoft
- RE: Registry Fix For Variant of Scob
- xingtone opens server on desktop using undocumented protocol (probably http)
- From: Burton M. Strauss III
- [OpenPKG-SA-2004.030] OpenPKG Security Advisory (png)
- Re: Microsoft and Security
- Re: [ISN] E-Mail Snooping Ruled Permissible
- Re: Registry Fix For Variant of Scob
- From: http-equiv@xxxxxxxxxx
- RE: Microsoft technologies. By default, non-HIPAA compliant?
- backdoor menu on conexant chipset dsl router (Zoom X3)
- Eudora 6.1.2 attachment spoof
- RE: Microsoft and Security
- Re: [Full-Disclosure] Public Review of OIS Security Vulnerability Reporting and Response Guidelines
- Enterasys XSR Security Router Record Route Denial Of Service Vulnerability (More information)
- Can we prevent IE exploits a priori?
- MDKSA-2004:066 - Updated kernel packages fix multiple vulnerabilities
- From: Mandrake Linux Security Team
- Comersus Cart Improper Request Handling
- Re: (IE/SCOB) Switching Software Because of Bugs: Some Facts About Software and Security bugs
- FW: [security bulletin] SSRT4718 rev.0 HP Tru64 UNIX NTP Integer Overflow
- Comersus Cart Cross-Site Scripting Vulnerability
- Npds BB HTML Injection
- Re: Microsoft and Security
- Scob variant using IIS 6.0 or just upgrades ?
- Suggestion: erase data posted to the Web
- RE: Can we prevent IE exploits a priori?
- Re: Suggestion: erase data posted to the Web
- RE: Suggestion: erase data posted to the Web
- Security contact wanted
- [ GLSA 200407-07 ] Shorewall : Insecure temp file handling
- Re: Public Review of OIS Security Vulnerability Reporting and ResponseGuidelines
- [GLSA 200407-06] libpng: Buffer overflow on row buffers
- From: Sune Kloppenborg Jeppesen
- Re: Suggestion: erase data posted to the Web
- From: Luciano Miguel Ferreira Rocha
- RE: Can we prevent IE exploits a priori?
- MOZILLA: execute local file and its fix
- [ GLSA 200407-08 ] Ethereal: Multiple security problems
- CYBSEC - Security Advisory: Denial of Service in IBM WebSphere Edge Server
- Re: Can we prevent IE exploits a priori?
- Norton AntiVirus Denial Of Service Vulnerability [Part: !!!]
- [OpenPKG-SA-2004.031] OpenPKG Security Advisory (dhcpd)
- Re: Microsoft and Security
- Mozilla Security Advisory 2004-07-08
- Re: Can we prevent IE exploits a priori?
- Microsoft Word Email Object Data Vulnerability
- From: James C. Slora, Jr.
- Re: Norton AntiVirus Denial Of Service Vulnerability [Part: !!!]
- Re: Microsoft Word Email Object Data Vulnerability
- From: http-equiv@xxxxxxxxxx
- Re: Suggestion: erase data posted to the Web
- MDKSA-2004:067 - Updated ethereal packages fix multiple vulnerabilities
- From: Mandrake Linux Security Team
- RE: Norton AntiVirus Denial Of Service Vulnerability [Part: !!!]
- RE: Microsoft Word Email Object Data Vulnerability
- Covert Channels allow Cross-Site-Java in Microsoft VM
- current leading bots used in drone armies [June/July 2004]
- [tool] p0f 2.0.4 is out
- Re: Norton AntiVirus Denial Of Service Vulnerability [Part: !!!]
- RE: Norton AntiVirus Denial Of Service Vulnerability [Part: !!!]
- MSOE Javascript Execution Vulnerability
- RE: MSIE Download Window Filename + Filetype Spoofing Vulnerability
- Re: Covert Channels allow Cross-Site-Java in Microsoft VM
- [ GLSA 200407-10 ] rsync: Directory traversal in rsync daemon
- MOZILLA: SHELL can execute remote EXE program
- [BUGZILLA] Multiple vulnerabilities in Bugzilla 2.16.5 and 2.17.7
- Media Preview Script Execution Vulnerability
- Re: HijackClick 3
- From: http-equiv@xxxxxxxxxx
- MSIE Download Window Filename + Filetype Spoofing Vulnerability
- HijackClick 3
- I small poem in JScript
- [ GLSA 200407-09 ] MoinMoin: Group ACL bypass
- Re: Covert Channels allow Cross-Site-Java in Microsoft VM
- Remote crash of Half-Life servers and clients (versions before the 07 July 2004)
- MSIE Similar Method Name Redirection Cross Site/Zone Scripting Vulnerability
- RE: MSIE Download Window Filename + Filetype Spoofing Vulnerability
- Two Vulnerabilities in Mozilla may lead to remote compromise
- RE: MSIE Download Window Filename + Filetype Spoofing Vulnerability
- Moodle XSS Vulnerability
- Re: Two Vulnerabilities in Mozilla may lead to remote compromise
- @stake advisory: WebSTAR (5.3.2 and below) Multiple Vulnerabilities
- Re: Two Vulnerabilities in Mozilla may lead to remote compromise
- RE: Two Vulnerabilities in Mozilla may lead to remote compromise
- RE: Norton AntiVirus Denial Of Service Vulnerability [Part: !!!]
- IE Shell URI Download and Execute, POC
- Microsoft Window Utility Manager Local Elevation of Privileges
- From: Vivek Rathod (Application Security, Inc.)
- phrack #62 has been released
- Re: MSIE Similar Method Name Redirection Cross Site/Zone Scripting Vulnerability
- From: http-equiv@xxxxxxxxxx
- aterm 0.4.2 tty permission weakness
- RE: Re: HijackClick 3
- Re: Two Vulnerabilities in Mozilla may lead to remote compromise
- RE: Two Vulnerabilities in Mozilla may lead to remote compromise
- RE: Norton AntiVirus Denial Of Service Vulnerability [Part: !!!]
- Find the tag continued
- From: James C. Slora, Jr.
- HtmlHelp - .CHM File Heap Overflow
- Microsoft Windows Task Scheduler '.job' Stack Overflow
- From: NGSSoftware Insight Security Research
- [ GLSA 200407-11 ] wv: Buffer overflow vulnerability
- Advisory 12/2004: PHP strip_tags() bypass vulnerability
- Ref: http://www.securityfocus.com/archive/1/367866, Jul 1 2004 1:19PM, Subj: Brightmail leaks other user's spam
- Unchecked buffer in mstask.dll
- Advisory 11/2004: PHP memory_limit remote vulnerability
- Re: Microsoft Window Utility Manager Local Elevation of Privileges
- RE: [Full-Disclosure] Re: IE Shell URI Download and Execute, POC
- RE: HijackClick 3
- From: http-equiv@xxxxxxxxxx
- TSSA-2004-013 - php
- From: tinysofa Security Team
- PHP BB bug
- [security bulletin] SSRT4741 rev.1 DCE for HP OpenVMS Potential RPC Buffer Overflow Attack VU#259796, VU#568148, VU#326746
- RE: [Full-Disclosure] Re: IE Shell URI Download and Execute, POC
- [HV-MED] DoS in Microsoft SMS Client
- RE: Unchecked buffer in mstask.dll
- MDKSA-2004:070 - Updated freeswan and super-freeswan packages fix certificate chain authentication vulnerability
- From: Mandrake Linux Security Team
- MDKSA-2004:068 - Updated php packages fix multiple vulnerabilities
- From: Mandrake Linux Security Team
- [CLA-2004:846] Conectiva Security Announcement - kernel
- [ GLSA 200407-13 ] PHP: Multiple security vulnerabilities
- RE: Unchecked buffer in mstask.dll
- Re: Security contact wanted
- Re: current leading bots used in drone armies [June/July 2004]
- White Paper: 0x00 vs ASP file upload scripts
- RE: Two Vulnerabilities in Mozilla may lead to remote compromise
- The Impact of RFC Guidelines on DNS Spoofing Attacks
- Trend Micro Officescan for Win2k strange behaviour
- RE: Unchecked buffer in mstask.dll
- Re: aterm 0.4.2 tty permission weakness
- Re: aterm 0.4.2 tty permission weakness
- Re: aterm 0.4.2 tty permission weakness
- Re: [security] aterm 0.4.2 tty permission weakness
- RE: phrack #62 has been released
- MDKSA-2004:069 - Updated ipsec-tools packages fix multiple vulnerabilities
- From: Mandrake Linux Security Team
- Re: Microsoft Window Utility Manager Local Elevation of Privileges
- Re: Unchecked buffer in mstask.dll
- SUSE Security Announcement: php4 (SUSE-SA:2004:021)
- [waraxe-2004-SA#034 - XSS and path full path disclosure in PhpBB 2.0.8]
- RE: [Full-Disclosure] Re: IE Shell URI Download and Execute, POC
- Re: PHP BB bug
- [security bulletin] SSRT4704 rev.0 HP-UX wu-ftpd local unauthorized access
- RE: [Full-Disclosure] Re: IE Shell URI Download and Execute, POC
- Re: PHP BB bug
- From: micheal@xxxxxxxxxxxxxxxxxxxxx
- [waraxe-2004-SA#035 - Multiple security holes in PhpNuke - part 2]
- Re: Re: HijackClick 3
- Re: Microsoft and Security
- RE: MSIE Similar Method Name Redirection Cross Site/Zone Scripting Vulnerability
- RE: RE: HijackClick 3
- [ GLSA 200407-12 ] Linux Kernel: Remote DoS vulnerability with IPTables TCP Handling
- Re: Can we prevent IE exploits a priori?
- RE: Trend Micro Officescan for Win2k strange behaviour
- [OpenPKG-SA-2004.032] OpenPKG Security Advisory (apache)
- Re: Microsoft Window Utility Manager Local Elevation of Privileges
- [tool] webstretch 0.1.6 http inspection proxy
- RE: MSIE Download Window Filename + Filetype Spoofing Vulnerability
- Hotmail Cross Site Scripting Vulnerability
- [CLA-2004:847] Conectiva Security Announcement - php4
- [CLA-2004:848] Conectiva Security Announcement - webmin
- MSIE Overly Trusted Location Variant Method Cache Vulnerability
- Re: Hotmail Cross Site Scripting Vulnerability
- [FMADV] Format String Bug in OllyDbg 1.10
- Re: Mac OS X stores login/Keychain/FileVault passwords on disk
- Medal of Honor remote buffer-overflow
- Re: Moodle XSS Vulnerability
- Web_Store.cgi allows Command Execution
- From: Zero_X www.lobnan.de Team
- utilman.exe exploit
- From: Iván Rodriguez Almuiña
- Re: White Paper: 0x00 vs ASP file upload scripts
- Re: Trend Micro Officescan for Win2k strange behaviour
- Re: Mac OS X stores login/Keychain/FileVault passwords on disk
- [Tool] HardTCP "Hardening TCP/IP" + SOURCE
- Re: MSOE Javascript Execution Vulnerability
- From: Fabricio A. Angeletti
- Re: Mac OS X stores login/Keychain/FileVault passwords on disk
- Re: MSOE Javascript Execution Vulnerability
- Re: Norton AntiVirus Denial Of Service Vulnerability [Part: !!!]
- Re: Hotmail Cross Site Scripting Vulnerability
- What A Drag
- From: http-equiv@xxxxxxxxxx
- Re: [Full-Disclosure] RE: Unchecked buffer in mstask.dll
- RE: Unchecked buffer in mstask.dll
- From: Dmitry Yu. Bolkhovityanov
- RE: [ok] [Full-Disclosure] RE: Unchecked buffer in mstask.dll
- Re: [Full-Disclosure] RE: Unchecked buffer in mstask.dll
- From: Jordan Cole (stilist)
- Re: Mac OS X stores login/Keychain/FileVault passwords on disk
- Re: Microsoft and Security
- RE: [Full-Disclosure] Re: IE Shell URI Download and Execute, POC
- Mozilla Bug Isn't So Bad
- Re: Mac OS X stores login/Keychain/FileVault passwords on disk
- Re: [Full-Disclosure] RE: Unchecked buffer in mstask.dll
- Re: Mac OS X stores login/Keychain/FileVault passwords on disk
- Re: Mozilla Bug Isn't So Bad
- Re: PHP BB bug
- Artmedic kleinanzeigen include vulnerability
- RE: Mac OS X stores login/Keychain/FileVault passwords on disk
- RE: The Impact of RFC Guidelines on DNS Spoofing Attacks
- [SECURITY] [DSA 529-1] New netkit-telnet-ssl package fixes format string vulnerability
- Re: [Full-Disclosure] Re: IE Shell URI Download and Execute, POC
- From: Fabricio A. Angeletti
- new utilman.exe exploit (allinone remote exploitation)
- From: Iván Rodriguez Almuiña
- [waraxe-2004-SA#036 - Multiple security holes in PhpNuke - part 3]
- [SECURITY] [DSA 530-1] New l2tpd packages fix buffer overflow
- [SECURITY] [DSA 528-1] New ethereal packages fix denial of service
- Re: More Webserver / IE Exploits
- OpenServer 5.0.6 OpenServer 5.0.7 : MMDF Various buffer overflows and other security issues
- From: please_reply_to_security
- Inappropriate methods exposed in XML -what's the essence?
- PhpBB HTTP Response Splitting & Cross Site Scripting vulnerabilities
- [ GLSA 200407-14 ] Unreal Tournament 2003/2004: Buffer overflow in 'secure' queries
- [FLSA-2004:1734] Updated mailman resolves security vulnerability
- More Webserver / IE Exploits
- [ GLSA 200407-15 ] Opera: Multiple spoofing vulnerabilities
- From: Sune Kloppenborg Jeppesen
- dos_in_file_share_2.6
- Denial of Service vulnerability in several Lexmark HTTP servers
- [FLSA-2004:1324] Updated libxml2 resolves security vulnerabilities
- Buffer overflow in Whisper FTP Surfer 1.0.7
- Denial of Service in Conceptronic CADSLR1 Router
- From: Administrador de 'Shell Security'
- [SECURITY] [DSA 531-1] New php4 packages fix multiple vulnerabilities
- Re: Denial of Service vulnerability in several Lexmark HTTP servers
- From: Eric Sesterhenn / snakebyte
- mi2g - fud, lies and libel
- Bug@FlashFTPd
- DOS@XitamiHTTPd
- Security Release - Samba 3.0.5 and 2.2.10
- From: Gerald (Jerry) Carter
- Comcast(tm) Email Manager allows arbitrary java and activex code execution
- [OpenPKG-SA-2004.033] OpenPKG Security Advisory (samba)
- [ GLSA 200407-17 ] l2tpd: Buffer overflow
- [OpenPKG-SA-2004.034] OpenPKG Security Advisory (php)
- [CLA-2004:851] Conectiva Security Announcement - samba
- TSSA-2004-014 - samba
- From: tinysofa Security Team
- SWAT PreAuthorization PoC
- @stake advisory: HP dced Remote Command Execution Multiple OSes
- Samba 3.x swat preauthentication buffer overflow
- MDKSA-2004:071 - Updated samba packages fix vulnerability in SWAT, samba-server.
- From: Mandrake Linux Security Team
- Forward:FullDisclosure/IE - Possible Address Spoofing
- [SECURITY] [DSA 533-1] New courier packages fix cross-site scripting vulnerability
- SUSE Security Announcement: samba (SUSE-SA:2004:022)
- [SECURITY] [DSA 534-1] New mailreader packages fix directory traversal vulnerability
- Apache 1.3.x mod_userdir Exploit (wgetusr.c)
- OpenServer 5.0.7 : Mozilla Multiple issues
- From: please_reply_to_security
- mi2g attacks "so-called" security sites
- eSafe: Could this be exploited?
- LNSA-#2004-0015: buffer overflow in samba (Jul, 23 2004)
- [security bulletin] SSRT4773 HP-UX xfs and stmkfont remote unauthorized access
- APC Security Advisory Denial of Service Vulnerability with PowerChuteBusinessEdition
- LNSA-#2004-0016: Multiple problems in Ethereal 0.10.4 (Jul, 23 2004)
- FW: [Full-Disclosure] Progress and Challenges
- eSeSIX Thintune thin client multiple vulnerabilities
- EasyWeb FileManager Directory Traversal
- Re: eSafe: Could this be exploited?
- Re: eSafe: Could this be exploited?
- Re: eSafe: Could this be exploited?
- MS SMS DOS Proof-of-concept code and Snort sig
- Re: DoS against Domino 6.5.1
- Re: Mac OS X stores login/Keychain/FileVault passwords on disk
- Easyins Stadtportal
- TSL-2004-0039 - multi
- From: Trustix Security Advisor
- [ GLSA 200407-19 ] Pavuk: Digest authentication helper buffer overflow
- Linux Netwosix Bugzilla - Bugtracking System
- Re: eSafe: Could this be exploited?
- Mozilla Firefox Certificate Spoofing
- QUESTION
- NucleusCMS 3.01 SQL Injection Vulnerability
- Re: EasyWeb FileManager Directory Traversal
- Re: eSafe: Could this be exploited?
- From: Andreas Constantinides (MegaHz)
- ASPRunner Multiple Vulnerabilities
- CVS woes: .cvspass
- [ GLSA 200407-20 ] Subversion: Vulnerability in mod_authz_svn
- OSX Panther Internet Connect - Local root
- [security bulletin] SSRT4782 rev. 0 HP-UX CIFS Server potential remote root access
- [SECURITY] [DSA 532-2] New libapache-mod-ssl packages fix multiple vulnerabilities
- Re: CVS woes: .cvspass
- Re: QUESTION
- RE: Forward:FullDisclosure/IE - Possible Address Spoofing
- Re: eSafe: Could this be exploited?
- Re: Mozilla Firefox Certificate Spoofing
- IRM 009: RiSearch and RiSearch ProPro are vulnerable to open FTP/HTTP proxy, directory listings and file disclosure vulnerabilities
- Re: CVS woes: .cvspass
- WASC Releases Web Security Threat Classification
- MDKSA-2004:075 - Updated mod_ssl packages fix potential vulnerabilities
- From: Mandrake Linux Security Team
- [CLA-2004:852] Conectiva Security Announcement - kernel
- Re: [Full-Disclosure] Internet Explorer Remote Null Pointer Crash(mshtml.dll)
- MDKSA-2004:073 - Updated XFree86 packages fix issue with xdm opening random sockets
- From: Mandrake Linux Security Team
- AntiBoard <= 0.7.2 XSS/SQL Injection
- [Paper] Small XSS Paper
- UnixWare 7.1.3up : tcpdump several vulnerabilities in tcpdump.
- From: please_reply_to_security
- Re: [Full-Disclosure] Crash IE with 11 bytes ;)
- MDKSA-2004:072 - Updated postgresql packages fix buffer overflow in odbc driver
- From: Mandrake Linux Security Team
- Aladdin response regarding eSafe
- Re: CVS woes: .cvspass
- Re: [ GLSA 200407-20 ] Subversion: Vulnerability in mod_authz_svn
- Pavuk Digest Authentication Buffer Overflow
- From: mattmurphy@xxxxxxxxx
- Re: eSafe: Could this be exploited?
- MDKSA-2004:074 - Updated webmin packages correct remote attacker vulnerabilities
- From: Mandrake Linux Security Team
- ERRATA: [ GLSA 200407-21 ] Samba: Multiple buffer overflows
- [ GLSA 200407-21 ] Samba: Multiple buffer overflows
- OpenServer 5.0.6 OpenServer 5.0.7 : Multiple Vulnerabilities in Sendmail
- From: please_reply_to_security
- Linpha 0.9.4: authentication bypass
- lostBook v1.1 Javascript Execution
- MDKSA-2004:076 - Updated sox packages fix buffer overflows with malicious .wav files
- From: Mandrake Linux Security Team
- DansGuardian Hex Encoding URL Banned Extension Filter Bypass Vulnerability
- File downloads in Opera at known locations
- Jaws 0.4: authentication bypass
- RE: Forward:FullDisclosure/IE - Possible Address Spoofing
- RE: Forward:FullDisclosure/IE - Possible Address Spoofing
- Re: Aladdin response regarding eSafe
- Re: OpenServer 5.0.6 OpenServer 5.0.7 : Multiple Vulnerabilities in Sendmail
- [ GLSA 200407-22 ] phpMyAdmin: Multiple vulnerabilities
- [CLA-2004:854] Conectiva Security Announcement - samba
- MDKSA-2004:077 - Updated wv packages fix vulnerability
- From: Mandrake Linux Security Team
- Re: Aladdin response regarding eSafe
- From: Aleksandar Milivojevic
- Citadel/UX Remote DoS Vulnerability
- Re: File downloads in Opera at known locations
- WpQuiz Gain Admin Rightd Exploit found
- [ GLSA 200407-23 ] SoX: Multiple buffer overflows
- Fwd: New possible scam method : forged websites using XUL (Firefox)
- Re: eSafe: Could this be exploited?
- UnixWare 7.1.3 Open UNIX 8.0.0 : Xsco contains a buffer overflow that could be exploited to gain root privileges.
- From: please_reply_to_security
- OpenServer 5.0.6 OpenServer 5.0.7 : OpenSSL Multiple Vulnerabilities
- From: please_reply_to_security
- OpenServer 5.0.6 OpenServer 5.0.7 : uudecode does not check for symlink or pipe
- From: please_reply_to_security
- [CLA-2004:855] Conectiva Security Announcement - sox
- Fusion News Yet Another Unauthorized Account Addition Vulnerability
Mail converted by MHonArc 2.6.8