Mail Index
- Re: Diebold Global Election Management System (GEMS) Backdoor Account Allows Authenticated Users to Modify Votes
- RE: Diebold Global Election Management System (GEMS) Backdoor Acc ount Allows Authenticated Users to Modify Votes
- Re: Promiscuous email printing in Canon imageRunner
- Multiple vulnerabilities in w-agora forum
- [SECURITY] [DSA 555-1] New frenet6 packages fix potential information leak
- TSL-2004-0050 - multi
- From: Trustix Security Advisor
- Multiple Vulnerabilities in Silent Storm Portal
- Unicornscan 0.4.2
- Samba Security Announcement -- Potential Arbitrary File Access
- From: Gerald (Jerry) Carter
- RE: Diebold Global Election Management System (GEMS) Backdoor Account Allows Authenticated Users to Modify Votes
- Re: cdrecord local root exploit
- Re: Diebold Global Election Management System (GEMS) Backdoor Account Allows Authenticated Users to Modify Votes
- RE: Diebold Global Election Management System (GEMS) Backdoor Acc ount Allows Authenticated Users to Modify Votes
- Re: directory traversal in ParaChat Server 5.5
- Re:[4] Corsaire Security Advisory - Multiple vendor MIME RFC2047 encoding issue
- RE: Diebold Global Election Management System (GEMS) Backdoor
- iDEFENSE Security Advisory 09.29.04 - Macromedia JRun 4 mod_jrun Apache Module Buffer Overflow Vulnerability
- From: customer service mailbox
- Re: Diebold Global Election Management System (GEMS) Backdoor Account Allows Authenticated Users to Modify Votes
- Re: New whitepaper "The Phishing Guide"
- From: Aleksandar Milivojevic
- iDEFENSE Security Advisory 09.30.04 - Samba Arbitrary File Access Vulnerability
- From: customer service mailbox
- RE: Diebold Global Election Management System (GEMS) Backdoor
- RE: Promiscuous email printing in Canon imageRunner
- [SECURITY] [DSA 553-1] New getmail packages fix root compromise
- CFMX vulnerability
- Re: Diebold Global Election Management System (GEMS) Backdoor Acc ount Allows Authenticated Users to Modify Votes
- TSLSA-2004-0051 - samba
- From: Trustix Security Advisor
- Multiple Vulnerabilities in AJ-Fork
- SQL Injection vulnerability in bBlog 0.7.3
- EEYE: RealPlayer pnen3260.dll Heap Overflow
- Broadcast buffer-overflow in Vypress Messenger 3.5.1
- Re: Possible GDI Exploit Vector
- Re: cdrdao local root exploit
- Re: cdrecord local root exploit
- MDKSA-2004:104 - Updated samba packages fix vulnerability
- From: Mandrake Linux Security Team
- Oracle 9i Union Flaw
- [ GLSA 200410-01 ] sharutils: Buffer overflows in shar.c and unshar.c
- Re: Promiscuous email printing in Canon imageRunner
- Re: Oracle 9i Union Flaw
- Re: cdrecord local root exploit
- dbPowerAmp Buffer Overflow And Dos Vulnerabilities
- On Polymorphic Evasion
- From: Phantasmal Phantasmagoria
- Security advisory - Xerces-C++ 2.5.0: Attribute blowup
- From: Amit Klein (AKsecurity)
- [FLSA-2004:1733] Updated squirrelmail resolves security vulnerabilities
- In-game format string in Judge Dredd vs. Death 1.01
- Re:2. Code execution in Icecast 2.0.1(exploit with shellcode)
- Re: cdrecord local root exploit
- Re: Oracle 9i Union Flaw
- [SECURITY] [DSA 556-1] New netkit-telnet packages fix invalid free
- Buffer Overflow in Spider game
- [LoWNOISE] IPSWITCH WhatsUp Gold 8.03 Remote fr33 exploit
- [SECURITY] [DSA 557-1] New rp-pppoe packages fix potential root compromise
- [FLSA-2004:1372] Updated sysstat packages fix security vulnerabilities
- [FLSA-2004:1325] Updated mod_python packages fix security vulnerability
- FreeBSD Security Advisory FreeBSD-SA-04:15.syscons
- From: FreeBSD Security Advisories
- Full path disclosure in PHP Links
- [FLSA-2004:1324] Updated libxml2 resolves security vulnerability
- [ GLSA 200410-02 ] Netpbm: Multiple temporary file issues
- Re: Buffer Overflow in Spider game
- Patch available for critical IBM DB2 Universal Database flaws
- From: NGSSoftware Insight Security Research
- SUSE Security Announcement: samba (SUSE-SA:2004:035)
- [security bulletin]SSRT4826 rev.0 Mozilla Application Suite for HP Tru64 UNIX Multiple Potential Security Vulnerabilities
- Re: EEYE: RealPlayer pnen3260.dll Heap Overflow
- Antivirus, Trojan, Spy ware scanner, Nested file manual scan bypass bug
- Test your windows OS
- Re: Full path disclosure in PHP Links
- [MAXPATROL Security Advisories] Cross site scripting in Invision Power Board
- ERRATA: Potential Arbitrary File Access (CAN-2004-0815)
- From: Gerald (Jerry) Carter
- Re: Buffer Overflow in Spider game
- Re: Full path disclosure in PHP Links - more
- Full path disclosure and sql injection on CubeCart 2.0.1
- [Maxpatrol Security Advisory] Multiple vulnerabilities in DCP-Portal
- GDI+ JPEG exploit
- Patch available for multiple high risk vulnerabilities in RealPlayer
- From: NGSSoftware Insight Security Research
- SUSE Security Announcement: mozilla (SUSE-SA:2004:036)
- Multiple vulnerabilities in BlackBoard
- Re: [Full-Disclosure] iDEFENSE Security Advisory 10.05.04b: Symantec Norton AntiVirus Reserved Device Name Handling Vulnerability
- [SECURITY] [DSA 559-1] New net-acct packages fix insecure temporary file creation
- [ GLSA 200410-04 ] PHP: Memory disclosure and arbitrary location file upload
- CodeCon 2005 Call for Papers
- Directory traversal in Tridcomm 1.3
- Latest Apple Sec update
- [GoSecure Advisory] Neoteris IVE Vulnerability
- MDKSA-2004:105 - Updated xine-lib packages fix multiple vulnerabilities
- From: Mandrake Linux Security Team
- [SECURITY] [DSA 558-1] New libapache-mod-dav packages fix potential denial of service
- Re: Multiple vulnerabilities in BlackBoard
- Patch available for high risk flaws in the AtHoc Toolbar
- From: NGSSoftware Insight Security Research
- [Gosecure Adivsory] Neoteris IVE Vulnerability
- New Microsoft Security Response Center PGP Key [pgp]
- From: Microsoft Security Response Center
- Re: Buffer Overflow in Spider game
- [HV-HIGH] MS Word multiple exceptions, at least one exploitable
- HTTP Response Splitting Vulnerability in Wordpress 1.2
- [SECURITY] [DSA 600-1] New samba packages fix arbitrary file access
- [SECURITY] [DSA 560-1] New lesstif packages fix several vulnerabilities
- [ GLSA 200410-05 ] Cyrus-SASL: Buffer overflow and SASL_PATH vulnerabilities
- Server crash in Flash Messaging 5.2.0g
- ASP.NET cannonicalization issue
- TSLSA-2004-0053 - cyrus-sasl
- From: Trustix Security Advisor
- MDKSA-2004:106 - Updated cyrus-sasl packages fix local vulnerability
- From: Mandrake Linux Security Team
- Limited \secure\ buffer-overflow in some old Monolith games
- [ GLSA 200410-06 ] CUPS: Leakage of sensitive information
- [MAxpatrol Security Advisory] Multiple vulnerabilities in GoSmart Message Board
- [SECURITY] [DSA 562-1] New mysql packages fix several vulnerabilities
- [SECURITY] [DSA 458-3] New python2.2 packages really fix buffer overflow and restore functionality
- Multiple vulnerabilities in ZanfiCmsLite
- Micronet wireless broadband router SP916BM admin password reset when power off
- MonkeyShell: using XML-RPC for access to a remote shell
- FW: problem in voip environment
- From: Walton, John Michael (John)
- Microsoft cabarc directory traversal
- Insecure Default Service DACL's in Windows 2003
- Regression in IE: Accessing remote/local content in IE (GM#009-IE)
- Microsoft Internet Explorer Install Engine Control Buffer Overflow
- From: NGSSoftware Insight Security Research
- [SECURITY] [DSA 563-2] New cyrus-sasl packages really fix arbitrary code execution
- UnixWare 7.1.3up UnixWare 7.1.4 : CUPS before 1.1.21 allows remote attackers to cause a denial of service
- From: please_reply_to_security
- UnixWare 7.1.4 : Multiple Vulnerabilities in libpng
- From: please_reply_to_security
- CORE-2004-0802: IIS NNTP Service XPAT Command Vulnerabilities
- From: CORE Security Technologies Advisories
- RE: Insecure Default Service DACL's in Windows 2003
- Re: Regression in IE: Accessing remote/local content in IE (GM#009-IE)
- Microsoft IIS 5.x/6.0 WebDAV (XML parser) attribute blowup DoS
- From: Amit Klein (AKsecurity)
- Reverse Engineering the First Pocket PC Trojan
- [SECURITY] [DSA 563-1] New cyrus-sasl packages fix arbitrary code execution
- MS October Security bulletins
- [hackgen-2004-#002] - Remote file inclusion bug in ocPortal 1.0.3.
- [SECURITY] [DSA 564-1] New mpg123 packages fix arbitrary code exceution
- XXS in fusetalk forum
- XXS in SCT email client
- [HV-HIGH] RIM Blackberry buffer overflow, DoS, data loss
- [FLSA-2004:2102] Updated samba packages fix security vulnerability
- BindView Advisory: Memory Leak and DoS in NT4 RPC server
- ACROS Security: Poisoning Cached HTTPS Documents in Internet Explorer
- [SECURITY] [DSA 565-1] New sox packages fix buffer overflow
- IT Underground Talks
- [ GLSA 200410-10 ] gettext: Insecure temporary file handling
- EEYE: Windows Shell ZIP File Decompression DUNZIP32.DLL Buffer Overflow Vulnerability
- Adobe acrobat / Adobe Reader 6 can read local files
- EEYE: Windows VDM #UD Local Privilege Escalation
- [ GLSA 200410-11 ] tiff: Buffer overflows in image decoding
- [ GLSA 200410-09 ] LessTif: Integer and stack overflows in libXpm
- MSN Gaming Heartbeat Component Buffer Overflow
- From: NGSSoftware Insight Security Research
- Format String Vulnerability in Valve's CS-Source
- Buffer Overflow In Microsoft Excel
- SetWindowLong Shatter Attacks
- [CLA-2004:872] Conectiva Security Announcement - cups
- [ GLSA 200410-12 ] WordPress: HTTP response splitting and XSS vulnerabilities
- [FLSA-2004:1888] Updated mod_ssl package fixes Apache security vulnerabilities
- [CLA-2004:873] Conectiva Security Announcement - samba
- [FLSA-2004:1833] Updated lha resolves security vulnerabilities
- [SECURITY] [DSA 563-3] New cyrus-sasl packages fix arbitrary code execution on sparc and arm
- [SECURITY] [DSA 566-1] New CUPS packages fix information leak
- [HV-MED] UPDATE: RIM Blackberry DoS, data loss
- Buffer-overflow in ShixxNOTE 6.net
- [FLSA-2004:1737] Updated httpd packages fix a mod_proxy security vulnerability
- CESA-2004-006: libtiff
- 3COM Wireless router (3CRADSL72) information disclosure
- New Remote Microsoft JPEG DoS Vulnerability + Other Potential Security Vulnerabilitys in asycpict.dll 1.0 Advisory
- ACROS Security: Unsanitized Session ID Cookie Allows Modifying Server Response
- ACROS Security: HTML Injection in JRun Management Console
- ACROS Security: Session Fixation in JRun Management Console
- UPDATE: Format String Vulnerability in Valve's CS-Source
- [OpenPKG-SA-2004.043] OpenPKG Security Advisory (tiff)
- Re: Adobe acrobat / Adobe Reader 6 can read local files
- [ GLSA 200410-10 ] gettext: Insecure temporary file handling
- [ GLSA 200410-13 ] BNC: Input validation flaw
- [FLSA-2004:2102] Updated samba packages fix security vulnerability [updated]
- [OpenPKG-SA-2004.044] OpenPKG Security Advisory (modssl)
- a path disclosure and a posibility file inclusion and vulneability in thepeak file upload v1.3
- From: keitel andres ortega
- TSLSA-2004-0054 - multi
- From: Trustix Security Advisor
- Writing Trojans that bypass Windows XP Service Pack 2 Firewall
- Re: EEYE: Windows Shell ZIP File Decompression DUNZIP32.DLL Buffer Overflow Vulnerability
- Re: Insecure Default Service DACL's in Windows 2003
- From: Jean-Baptiste Marchand
- Microsoft Windows NetDDE Service Buffer Overflow
- From: NGSSoftware Insight Security Research
- Multiple Cross Site Scripting Vulnerabilities in FuseTalk
- Re: Format String Vulnerability in Valve's CS-Source
- ProFTPD 1.2.x remote users enumeration bug
- Norton AntiVirus 2004 Script Blocking Failure (Includes PoC and rant)
- Directory traversal in Yak! 2.1.2
- Eudora 6.2.0.7 attachment spoof
- Clientexec Billing Software
- Re: [VulnWatch] CORE-2004-0802: IIS NNTP Service XPAT Command Vulnerabilities
- [SECURITY] [DSA 567-1] New libtiff packages fix remote code execution
- More details on BID 11408 (3com 3cradsl72 wireless router)
- [IE 6 SP2] Possible URL Spoofing
- RE: Writing Trojans that bypass Windows XP Service Pack 2 Firewall
- Re: Adobe acrobat / Adobe Reader 6 can read local files
- From: Shannon Eric Peevey
- Re: New Remote Microsoft JPEG DoS Vulnerability + Other Potential Security Vulnerabilitys in asycpict.dll 1.0 Advisory
- Multiple Vulnerabilities in CoolPHP
- Re: New Remote Microsoft JPEG DoS Vulnerability + Other Potential Security Vulnerabilitys in asycpict.dll 1.0 Advisory
- Re: Format String Vulnerability in Valve's CS-Source
- Re: 3COM Wireless router (3CRADSL72) information disclosure
- ms04-031 pre-auth ??
- Web browsers - a mini-farce
- IISShield and ASP.NET canonicalization
- cPanel hardlink backup issue
- cPanel hardlink chown issue
- cPanel symlink chmod issue
- Multiple vulnerabilities in Sage Saleslogix
- iDEFENSE Security Advisory 10.18.04: Multiple Vendor Anti-Virus Software Detection Evasion Vulnerability
- From: customer service mailbox
- Re: [IE 6 SP2] Possible URL Spoofing
- From: http-equiv@xxxxxxxxxx
- Re: Directory traversal in Yak! 2.1.2
- Re: EEYE: Windows VDM #UD Local Privilege Escalation
- Re: Norton AntiVirus 2004 Script Blocking Failure (Includes PoC and rant)
- [SECURITY] [DSA 569-1] New netkit-telnet-ssl packages fix denial of service
- IBM Lotus Notes/Domino fails to encode Square Brackets ( [ ] ) in computed field/text, allowing XSS
- [FLSA-2004:2072] Updated CUPS packages fix security vulnerability
- [FLSA-2004:1237] Updated gaim package resolves security issues
- [Powie's PSCRIPT Forum] Multiple SQL-Injection Vulnerabilities
- [SECURITY] [DSA 568-1] New cyrus-sasl-mit packages fix arbitrary code execution
- [SECURITY] [DSA 556-2] New netkit-telnet packages really fix denial of service
- Re: IBM Lotus Notes/Domino fails to encode Square Brackets ( [ ] ) in computed field/text, allowing XSS
- ProFTPD 1.2.x remote users enumeration bug - correction
- [ GLSA 200410-15 ] Squid: Remote DoS vulnerability
- Re: Writing Trojans that bypass Windows XP Service Pack 2 Firewall
- Mutiple AntiVirus Reserved Device Name Handling Vulnerability
- apexec.pl is still vulnerable against Directory Traversal.
- From: Zero_X www.lobnan.de Team
- RE: Writing Trojans that bypass Windows XP Service Pack 2 Firewall
- [ GLSA 200410-14 ] phpMyAdmin: Vulnerability in MIME-based transformation system
- Re: [IE 6 SP2] Possible URL Spoofing
- [CLA-2004:875] Conectiva Security Announcement - gtk+
- [FLSA-2004:1804] Updated kernel resolves security vulnerabilities
- UnixWare 7.1.4 UnixWare 7.1.3 : The error handling in the inflate and inflateBack functions in ZLib compression library allows local users to cause a denial of service
- From: please_reply_to_security
- RE: [IE 6 SP2] Possible URL Spoofing
- Re: New Remote Microsoft JPEG DoS Vulnerability + Other Potential Security Vulnerabilitys in asycpict.dll 1.0 Advisory
- avoiding stackguard
- Multiple AntiVirus Reserved Device Name Handling Vulnerability
- Broadcast crash in Vypress Tonecast 1.3
- Google Script Insertion Exploit
- MDKSA-2004:109 - Updated libtiff packages fix multiple vulnerabilities
- From: Mandrake Linux Security Team
- Buffer-overflow in Age of Sail II 1.04.151
- [EXPL] (MS04-032) Microsoft Windows XP Metafile (.emf) Heap Overflow (PoC)
- RE: How to Break Windows XP SP2 + Internet Explorer 6 SP2
- How to Break Windows XP SP2 + Internet Explorer 6 SP2
- From: http-equiv@xxxxxxxxxx
- [SECURITY] [DSA 571-1] New libpng3 packages fix several vulnerabilities
- [SECURITY] [DSA 570-1] New libpng packages fix several vulnerabilities
- Re: Norton AntiVirus 2004 Script Blocking Failure (Includes PoC and rant)
- MDKSA-2004:108 - Updated cvs packages fix vulnerability
- From: Mandrake Linux Security Team
- mpg123 "getauthfromurl" buffer overflow
- MDKSA-2004:107 - Updated mozilla packages fix vulnerabilities
- From: Mandrake Linux Security Team
- Critical Vulnerability in Altiris Deployment Server architecture
- NSFOCUS SA2004-02 : HP-UX stmkfont Local Privilege Escalation Vulnerability
- From: NSFOCUS Security Team
- CAN-2004-0814: Linux terminal layer races
- SuSE Security Announcement: kernel (SUSE-SA:2004:037)
- [SECURITY] [DSA 573-1] New cupsys packages fix arbitrary code execution
- [SECURITY] [DSA 572-1] New ecartis packages fix unauthorised access to admin interface
- SQL Injection in UBB.threads 3.4.x
- MDKSA-2004:111 - Updated wxGTK2 packages fix vulnerabilities
- From: Mandrake Linux Security Team
- MDKSA-2004:110 - Updated gaim packages fix vulnerabilities
- From: Mandrake Linux Security Team
- Re: IBM Lotus Notes/Domino fails to encode Square Brackets ( [ ] ) in computed field/text, allowing XSS (Risk increased)
- HTTP Response Splitting in Serendipity 0.7-beta4
- Re: Critical Vulnerability in Altiris Deployment Server architecture
- MDKSA-2004:112 - Updated squid packages fix SNMP processing vulnerability
- From: Mandrake Linux Security Team
- MDKSA-2004:114 - Updated gpdf packages fix DoS vulnerability
- From: Mandrake Linux Security Team
- [ GLSA 200410-21 ] Apache 2, mod_ssl: Bypass of SSLCipherSuite directive
- [KDE security advisory] Multiple integer overflows in kpdf
- [HV-LOW] Unsafe WAV header handling can cause DoS on Windows
- [Security Bulletin] SSRT4807 HP-UX stmkfont local unauthorized privileged access
- MDKSA-2004:113 - Updated xpdf packages fix vulnerabilities
- From: Mandrake Linux Security Team
- MDKSA-2004:115 - Updated kdegraphics packages fix DoS vulnerability
- From: Mandrake Linux Security Team
- J2ME security vulnerabilities
- [Fwd: Altiris Carbon Copy Remote Control local SYSTEM exploitation.]
- SuSE Security Announcement: libtiff (SUSE-SA:2004:038)
- MDKSA-2004:116 - Updated cups packages fix DoS vulnerabilities
- From: Mandrake Linux Security Team
- Hack Dot AE
- Re: avoiding stackguard
- iDEFENSE Security Advisory XX.XX.04 - Novell SuSe Linux LibTIFF Heap Overflow Vulnerability
- From: customer service mailbox
- [CLA-2004:877] Conectiva Security Announcement - mozilla
- Is Windows up to snuff for running our world?
- AOL Journals BlogID incrementing discloses account names and e-mail
- Windows DoS in certain pGina configurations
- Norton AntiVirus 2004/2005 Script Blocking Redux
- Re: Full path disclosure and sql injection on CubeCart 2.0.1
- windows 2000 server terminal server denial of service
- Ability FTP Server 2.34 Buffer Overflow Exploit
- dwc_articles possible sql injection
- rssh: pizzacode security alert
- Update: Web browsers - a mini-farce (MSIE gives in)
- Re: Google Script Insertion Exploit
- python does mangleme (with IE bugs!)
- [BUGZILLA] Vulnerabilities in Bugzilla 2.16.6 and 2.18rc2
- STG Security Advisory: [SSA-20041022-08] MoniWiki XSS vulnerability
- Re: Is Windows up to snuff for running our world?
- Some Voters Say Machines Failed, Incorrect Choices Appear on Screens (fwd)
- Re: [Full-Disclosure] python does mangleme (with IE bugs!)
- RE: Update: Web browsers - a mini-farce (MSIE gives in)
- Fake RedHat - Fedora Security Patch / Trojan Source Code & Analysis
- Mozilla Firefox (tested on 0.9.3) html-code crash.
- Re: Update: Web browsers - a mini-farce (MSIE gives in)
- Re: [Full-Disclosure] Update: Web browsers - a mini-farce (MSIE gives in)
- Re: How to Break Windows XP SP2 + Internet Explorer 6 SP2
- [CLA-2004:878] Conectiva Security Announcement - zlib
- Bug in hotmail
- Re: CAN-2004-0814: Linux terminal layer races
- RE: Critical Vulnerability in Altiris Deployment Server architecture
- Two Vulnerabilities in OpenWFE Web Client
- libxml2 remote buffer overflows (not in xml parsing code though)
- SUSE Security Announcement: xpdf, gpdf, kpdf, pdftohtml, cups (SUSE-SA:2004:039)
- libgd integer overflow
- OpenSSL 0.9.7e released (fwd from mark@openssl.org)
- MailCarrier 2.51 SMTP server Buffer Overflow [PoC included]
- [ GLSA 200410-24 ] MIT krb5: Insecure temporary file use in send-pr.sh
- pacsec.jp advisory: Firewire/IEEE 1394 Considered Harmful to Physical Security
- [ GLSA 200410-26 ] socat: Format string vulnerability
- inetutils tftp client, DNS resolving bofs
- Hawking Technologies HAR11A router considered insecure
- pppd out of bounds memory access, possible DOS
- [ GLSA 200410-25 ] Netatalk: Insecure tempfile handling in etc2ps.sh
- [ GLSA 200410-23 ] Gaim: Multiple vulnerabilities
- [ GLSA 200410-22 ] MySQL: Multiple vulnerabilities
- wvtfpd remote root heap overflow
- Re: Some Voters Say Machines Failed, Incorrect Choices Appear on Screens (fwd)
- zgv image viewing heap overflows
- Rendering large binary file as HTML makes Mozilla Firefox stop responding
- Re: Update: Web browsers - a mini-farce (MSIE gives in)
- PTms04-030
- debian dhcpd, old format string bug
- MMDF deliver local root exploit for SCO OpenServer 5.0.7 x86
- From: Ramon de Carvalho Valle
- PuTTY SSH client vulnerability
- [CLA-2004:879] Conectiva Security Announcement - kernel
- Re: Update: Web browsers - a mini-farce (MSIE gives in)
- RE: Update: Web browsers - a mini-farce (MSIE gives in)
- Crashs in Master of Orion III 1.2.5
- [CLA-2004:880] Conectiva Security Announcement - foomatic-filters
- iDEFENSE Security Advisory 10.27.04 - PuTTY SSH2_MSG_DEBUG Buffer Overflow Vulnerability
- From: customer service mailbox
- [ GLSA 200410-29 ] PuTTY: Pre-authentication buffer overflow
- From: Sune Kloppenborg Jeppesen
- High Risk Vulnerability in Quicktime for Windows
- From: NGSSoftware Insight Security Research
- EEYE: RealPlayer Zipped Skin File Buffer Overflow
- Multiple Vulnerabilites in Quake II Server
- RE: Update: Web browsers - a mini-farce (MSIE gives in)
- [security bulletin] SSRT3526 Serviceguard potential increase in privilege
- High Risk Vulnerability in RealPlayer
- From: NGSSoftware Insight Security Research
- Presentation: Bypassing client application protection techniques with notepad
- [SECURITY] [DSA 574-1] New cabextract packages fix unintended directory traversal
- [SECURITY] [DSA 575-1] New catdoc packages fix temporary file vulnerability
- Re: Update: Web browsers - a mini-farce (MSIE gives in)
- Re: zgv image viewing heap overflows
- PHP4 cURL functions bypass open_basedir
- Re: Some Voters Say Machines Failed, Incorrect Choices Appear on Screens (fwd)
- RE: Update: Web browsers - a mini-farce (MSIE gives in)
- [USN-5-1] gettext vulnerabilities
- RE: Update: Web browsers - a mini-farce (MSIE gives in)
- [USN-4-1] Standard C library script vulnerabilities
- [FLSA-2004:2089] Updated mozilla packages fix security vulnerabilities
- Re: Update: Web browsers - a mini-farce (MSIE gives in)
- [USN-9-1] tetex-bin vulnerabilities
- [ GLSA 200410-28 ] rssh: Format string vulnerability
- [USN-7-1] imagemagick vulnerability
- [USN-8-1] gaim vulnerabilities
- New URL spoofing bug in Microsoft Internet Explorer
- [ GLSA 200410-30 ] GPdf, KPDF, KOffice: Vulnerabilities in included xpdf
- Re: debian dhcpd, old format string bug
- Re: Mozilla Firefox (tested on 0.9.3) html-code crash.
- [USN-3-1] GhostScript utility script vulnerabilities
- [USN-6-1] postgresql contributed script vulnerability
- [SECURITY] [DSA 577-1] New postgresql packages fix symlink vulnerability
- Re: Mozilla Firefox (tested on 0.9.3) html-code crash.
- [SECURITY] [DSA 576-1] New Squid packages fix several vulnerabilities
- [ GLSA 200410-31 ] Archive::Zip: Virus detection evasion
- [USN-11-1] libgd2 vulnerabilities
- local buffer overflow in htpasswd for apache 1.3.31 not fixed in .33?
- Re: debian dhcpd, old format string bug
- RE: New URL spoofing bug in Microsoft Internet Explorer
- Re: libgd integer overflow
- RE: libgd integer overflow
- RE: Update: Web browsers - a mini-farce (MSIE gives in)
- Re: Update: Web browsers - a mini-farce (MSIE gives in)
- RE: Update: Web browsers - a mini-farce (MSIE gives in)
- Re: Update: Web browsers - a mini-farce (MSIE gives in)
- Re: New URL spoofing bug in Microsoft Internet Explorer
- Re: Update: Web browsers - a mini-farce (MSIE gives in)
- RE: Update: Web browsers - a mini-farce (MSIE gives in)
- Re: New URL spoofing bug in Microsoft Internet Explorer
- From: Christopher J. Pilkington
- Re: local buffer overflow in htpasswd for apache 1.3.31 not fixed in .33?
- [OpenPKG-SA-2004.046] OpenPKG Security Advisory (postgresql)
- Re: New URL spoofing bug in Microsoft Internet Explorer
- [OpenPKG-SA-2004.047] OpenPKG Security Advisory (apache)
- Re: Update: Web browsers - a mini-farce (MSIE gives in)
- Re: New URL spoofing bug in Microsoft Internet Explorer
- Re: New URL spoofing bug in Microsoft Internet Explorer
- Re: local buffer overflow in htpasswd for apache 1.3.31 not fixed in .33?
- Re: New URL spoofing bug in Microsoft Internet Explorer
- [USN-12-1] ppp Denial of Service
- [OpenPKG-SA-2004.048] OpenPKG Security Advisory (squid)
- RE: New URL spoofing bug in Microsoft Internet Explorer
- Re: New URL spoofing bug in Microsoft Internet Explorer
- From: http-equiv@xxxxxxxxxx
Mail converted by MHonArc 2.6.8