Mail Index
- Re: Microsoft Internet Explorer - Crash on JavaScript "window()"-calling (05/28/2005)
- TSL-2005-0026 - multi
- From: Trustix Security Advisor
- Spam exploiting MS05-016
- TSL-2005-0025 - binutils
- From: Trustix Security Advisor
- RE: Microsoft Internet Explorer - Crash on adding sites to restri cted zone (05/28/2005)
- Nortel VPN Router Malformed Packet DoS Vulnerability
- Re: Microsoft Internet Explorer - Crash on JavaScript "window()"-calling (05/28/2005)
- Re: [security@suse.de] [XNUXER-SECURITY] Root Privilige Escalation in Sudo version 1.6.8p7 without Password, SuSE 9.3
- [XNUXER-SECURITY] Root Privilige Escalation in Sudo version 1.6.8p7 without Password, SuSE 9.3
- PowerDownload Remote File Inclusion
- SyScAN'05
- From: organiser@xxxxxxxxxx
- [Argeniss] MS05-012 Exploit
- Wide-scale industrial espionage using Trojan horses in Israel
- Re: [XNUXER-SECURITY] Root Privilige Escalation in Sudo version 1.6.8p7 without Password, SuSE 9.3
- multiple vulnerability Calendarix Advanced
- Multiple vulnerabilities in MyBulletinBoard (MyBB) 1.00 RC4
- 504T and now also 604T remote access.
- Re: [security@suse.de] [XNUXER-SECURITY] Root Privilige Escalation in Sudo version 1.6.8p7 without Password, SuSE 9.3
- Re: [security@suse.de] [XNUXER-SECURITY] Root Privilige Escalation in Sudo version 1.6.8p7 without Password, SuSE 9.3
- Re: Citrix security contact
- From: security curmudgeon
- [ GLSA 200506-01 ] Binutils, elfutils: Buffer overflow
- From: Sune Kloppenborg Jeppesen
- A short warning on the X11 Editres protocol
- Reminder: XGrabKeyboard is not a security interface
- [ZH2005-13SA] NEXTWEB (i)Site website management multiple vulnerabilities
- Re: Microsoft Internet Explorer - Crash on adding sites to restricted zone (05/28/2005)
- [SECURITY] [DSA 731-1] New krb4 packages fix arbitrary code execution
- PHP Execution Vulnerability in CuteNews
- [ECHO_ADV_14$2005] Multiple Vulnerabilities in Liberum Help Desk
- Backdoor in Fortinet´s firewall Fortigate
- HP Radia Notify Daemon: Multiple Buffer Overflow Vulnerabilities
- SEC-CONSULT SA20050602-1 :: Arbitrary File Inclusion in phpCMS 1.2.x
- Re: A short warning on the X11 Editres protocol
- SEC-CONSULT SA20050602-2 :: Exhibit Engine Blind SQL Injection
- [security bulletin] SSRT5962 rev.0 HP OpenView Radia mgmt - Remote access and DoS
- RE: Backdoor in Fortinet´s firewall Fortigate
- Re: Backdoor in Fortinet´s firewall Fortigate
- From: Michael J McCafferty
- [SECURITY] [DSA 732-1] New mailutils packages fix several vulnerabilities
- XCon’2005 CALL FOR PAPER
- CastleCops phpBB bbcode Input Validation Disclosure
- [DRUPAL-SA-2005-001] New Drupal release fixes critical security issue
- Re: Backdoor in Fortinet´s firewall Fortigate
- Israeli industrial espionage Trojan horse sample + snort sigs
- [FLSA-2005:152532] Updated kernel packages fix security issues
- Malicious Bundles on Mac OS X
- [ GLSA 200506-04 ] Wordpress: Multiple vulnerabilities
- From: Sune Kloppenborg Jeppesen
- A new whitepaper by Watchfire - HTTP Request Smuggling
- everybuddy <= 0.4.3 insecure temporary file creation
- From: Eric Romang / DATACENTER Luxembourg
- Popper webmail remote code execution vulnerability - advisory fix
- LutelWall <= 0.97 insecure temporary file creation
- GIPTables Firewall <= v1.1 insecure temporary file creation
- Server termination in Raknet 2.33 (before 30 May 2005)
- `tattle` -- automatic reporting of SSH brute-force attacks
- SQL Injection Exploit for Portail PHP < 1.3
- [ GLSA 200506-03 ] Dzip: Directory traversal vulnerability
- [ GLSA 200506-02 ] Mailutils: SQL Injection
- Re: [Full-disclosure] Second-Order Symlink Vulnerabilities
- AOL AIM Instant Messenger Buddy Icon "ateimg32.dll" DoS
- SQL Injection Exploit for WordPress <= 1.5.1.1
- Denial of Service vulnerability in GoodTech SMTP Server for Windows NT/2000/XP version 5.14
- Re: SQL Injection Exploit for WordPress <= 1.5.1.1
- [AppSecInc Advisory WEBSP05-V0098] Remote Buffer overflow in WebSphere Application Server Administrative Console
- Kaspersky AntiVirus "klif.sys" Privilege Escalation Vulnerability
- Contact Request - Comcast
- Re: AOL AIM Instant Messenger Buddy Icon "ateimg32.dll" DoS
- Second-Order Symlink Vulnerabilities
- [USN-137-1] Linux kernel vulnerabilities
- MDKSA-2005:096 - Updated openssl packages fix vulnerabilities
- From: Mandriva Security Team
- 2 SQL injection in Loki download manager v2.0
- [ GLSA 200506-05 ] SilverCity: Insecure file permissions
- From: Sune Kloppenborg Jeppesen
- tftp 2000 1.0.0.1
- From: Josh Zlatin-Amishav
- leafnode security announcement leafnode-SA-2005-02 (CAN-2005-1911)
- SUSE Security Announcement: several kernel security problems (SUSE-SA:2005:029)
- [ Suresec Advisories ] - Mac OS X 10.4 - launchd local root vulnerability
- From: [ Suresec Advisories ]
- Invision Community Blog Vulnerabilities
- From: GulfTech Security Research
- FreeBSD Security Advisory FreeBSD-SA-05:11.gzip
- From: FreeBSD Security Advisories
- FreeBSD Security Advisory FreeBSD-SA-05:12.bind9
- From: FreeBSD Security Advisories
- remote command execution in 'tattle'
- xmysqladmin insecure temporary file creation
- Re: `tattle` -- automatic reporting of SSH brute-force attacks
- Invision Gallery Vulnerabilities
- From: GulfTech Security Research
- Re: `tattle` -- automatic reporting of SSH brute-force attacks
- drone armies C&C report - May/2005
- FreeBSD Security Advisory FreeBSD-SA-05:10.tcpdump
- From: FreeBSD Security Advisories
- Arbitrary code execution in eping plugin
- MDKSA-2005:098 - Updated wget packages fix vulnerabilities
- From: Mandriva Security Team
- "Meanwhile, on the other side of the web server" - a new write-up by Amit Klein
- From: Amit Klein (AKsecurity)
- [ GLSA 200506-06 ] libextractor: Multiple overflow vulnerabilities
- [USN-138-1] gedit vulnerability
- IpSwitch IMAP Server LOGON stack overflow
- Re:[ Suresec Advisories ] - Mac OS X 10.4 - launchd local root vulnerability
- [Full-disclosure] [USN-139-1] Gaim vulnerability
- osCommere HTTP Response Splitting
- From: GulfTech Security Research
- Voice VLAN Access/Abuse Possible on Cisco voice-enabled, 802.1x-secured Interfaces
- Webhints v1.03 Remote Command Execution
- Multiple vulnerabilities in Pico Server (pServ) v3.3
- Re: Arbitrary code execution in eping plugin
- [ GLSA 200506-10 ] LutelWall: Insecure temporary file creation
- [ GLSA 200506-09 ] gedit: Format string vulnerability
- [ GLSA 200506-07 ] Ettercap: Format string vulnerability
- [ GLSA 200506-08 ] GNU shtool, ocaml-mysql: Insecure temporary file creation
- Re: Arbitrary code execution in eping plugin
- Re: Arbitrary code execution in eping plugin
- File Upload Manager Sploits
- singapore v0.9.11 cross site scripting and path disclosure
- [ GLSA 200506-11 ] Gaim: Denial of Service vulnerabilities
- [OpenPKG-SA-2005.008] OpenPKG Security Advisory (bzip2)
- Security contact of airport Rome, Italy
- From: Michael Schwartzkopff
- Re: Arbitrary code execution in eping plugin
- [OpenPKG-SA-2005.007] OpenPKG Security Advisory (cvs)
- Re: Sql injection in jPortal version 2.3.1 (module banner)
- [OpenPKG-SA-2005.009] OpenPKG Security Advisory (gzip)
- reconsidering physical security: pod slurping
- TSL-2005-0028 - multi
- From: Trustix Security Advisor
- Re: osCommere HTTP Response Splitting
- From: Amit Klein (AKsecurity)
- [OpenPKG-SA-2005.010] OpenPKG Security Advisory (openpkg)
- Bluetooth SIG Denial of Service vulnerability
- [ GLSA 200506-12 ] MediaWiki: Cross-site scripting vulnerability
- From: Sune Kloppenborg Jeppesen
- NDSS '06 -- Call for Papers
- Re: Arbitrary code execution in eping plugin
- Re:[ Suresec Advisories ] - Mac OS X 10.4 - launchd local root
- Local privilege escalation using runasp V3.5.1
- iDEFENSE Security Advisory 06.14.05: Multiple Vendor Telnet Client Information Disclosure Vulnerability
- URL-Encoding Problem in Finjan SurfinGate
- iDEFENSE Security Advisory 06.14.05: Microsoft Windows Interactive Training Buffer Overflow Vulnerability
- iDEFENSE Security Advisory 06.14.05: Microsoft Outlook Express NNTP Response Parsing Buffer Overflow Vulnerability
- Anti-Virus Malformed ZIP Archives flaws [UPDATE]
- [NGSEC] AntiPharming v1.00 FREE
- Re: Security contact of airport Rome, Italy
- From: Michael Schwartzkopff
- Remote Exploit for Web_store.cgi
- MDKSA-2005:100 - Updated rsh packages fix vulnerability
- From: Mandriva Security Team
- Re: Security contact of airport Rome, Italy
- MDKSA-2005:099 - Updated gaim packages fix more vulnerabilities
- From: Mandriva Security Team
- FusionBB Multiple Vulnerabilities
- From: GulfTech Security Research
- Re: Bluetooth SIG Denial of Service vulnerability
- Bluetooth dot dot attacks (update)
- UPDATE: [ GLSA 200505-06 ] TCPDump: Decoding routines Denial of Service vulnerability
- Re: Arbitrary code execution in eping plugin
- From: Christoph 'knurd' Jeschke
- High Risk Vulnerability in HTML Help (ITSS Parser)
- From: NGSSoftware Insight Security Research
- Re: File Upload Manager Sploits
- Re: File Upload Manager Sploits
- Vulnerability: McGallery v 1.1 files reading on disk
- Vulnerability: McGallery v 1.1 Mysql DB including
- Vulnerability: Bitrix Php inclusion
- Vulnerability: Bitrix Web Server Paths
- Re: Arbitrary code execution in eping plugin
- Microsoft's June Security Bulletin
- Multiple paFileDB Vulnerabilities
- From: GulfTech Security Research
- is this new? vuln info @ Adobe
- Re: Sql injection in jPortal version 2.3.1 (module banner)
- [USN-140-1] Gaim vulnerability
- Mambo 4.5.2.2 SQL Injection in UPDATE statement
- DMA[2005-0614a] - 'Global Hauri ViRobot Server cookie overflow'
- MADSHEEP-05SA (security advisory): WebHints <= v1.03 Remote Command Execution Vulnerability
- From: Emanuele \"MadSheep\" Gentili
- Re: [NGSEC] AntiPharming v1.00 FREE
- eEye Advisory - EEYEB-20050316 - HTML Help File Parsing Buffer Overflow
- Re: is this new? vuln info @ Adobe
- Re: [NGSEC] AntiPharming v1.00 FREE
- MDKSA-2005:101 - Updated tcpdump packages fix vulnerability
- From: Mandriva Security Team
- MDKSA-2005:102 - Updated gedit packages fix format string vulnerability
- From: Mandriva Security Team
- Re: Local privilege escalation using runasp V3.5.1
- M4DR007-06SA (security advisory): Multiple vulnerabilities in UPB 1.9.6 GOLD
- [SM-ANNOUNCE] Patch fixes SquirrelMail cross site scripting vulnerabilities [CAN-2005-1769]
- SquirrelMail "vendor" notification feeler
- Adobe Reader 7: XML External Entity (XXE) Attack
- e107 v0.617 several new and old vulnerabilities
- Passwords Decrypter for UPB <= 1.9.6
- [ GLSA 200506-13 ] webapp-config: Insecure temporary file handling
- From: Sune Kloppenborg Jeppesen
- JBOSS 3.2.2-3.2.7 / 4.0.2 installation path disclosure / config disclosure / version fingerprinting
- Source Code Disclosure in Yaws Webserver <1.56
- Re: Adobe Reader 7: XML External Entity (XXE) Attack
- Black Hat Briefings Announcements
- Advisory 01/2005: Fileupload/download vulnerability in Trac
- Sudo version 1.6.8p9 now available, fixes security issue.
- Another tcpdump BGP infinite loop vulnerability (CAN-2005-1267)
- Re: M4DR007-06SA (security advisory): Multiple vulnerabilities in UPB 1.9.6 GOLD
- [ GLSA 200506-14 ] Sun and Blackdown Java: Applet privilege escalation
- From: Sune Kloppenborg Jeppesen
- [ECHO_ADV_18$2005] Multiple SQL INJECTION in Ublog Reload 1.0.5
- Cisco VPN Concentrator Groupname Enumeration Vulnerability
- paFaq Multiple Vulnerabilities
- From: GulfTech Security Research
- [ GLSA 200506-16 ] cpio: Directory traversal vulnerability
- [ GLSA 200506-15 ] PeerCast: Format string vulnerability
- Novell GroupWise Plain Text Password Vulnerability.
- [Hat-Squad] i-Gallery directory traversal
- From: Hat-Squad Security Team
- Re: Anti-Virus Malformed ZIP Archives flaws [UPDATE]
- RE: osCommere HTTP Response Splitting (Solution)
- Anti-Fraud Method?
- Google Exploit Queries Thread
- Page Hijack: The 302 Exploit, Redirects and Google
- Re: [Full-disclosure] Google Exploit Queries Thread
- [ GLSA 200506-17 ] SpamAssassin 3, Vipul's Razor: Denial of Service vulnerability
- From: Sune Kloppenborg Jeppesen
- [USN-142-1] sudo vulnerability
- [USN-141-1] tcpdump vulnerability
- Security Contact for Lyris
- MercuryBoard 1.1.4 SQL Injection
- [ GLSA 200506-19 ] SquirrelMail: Several XSS vulnerabilities
- From: Sune Kloppenborg Jeppesen
- [ECHO_ADV_19$2005] Multiple SQL INJECTION in DUWARE Products
- SUSE Security Announcement: SUN Java security problems (SUSE-SA:2005:032)
- iDEFENSE Security Advisory 06.22.05: Multiple Vendor Cacti Multiple SQL Injection Vulnerabilities
- iDEFENSE Security Advisory 06.22.05: Multiple Vendor Cacti config_settings.php Remote Code Execution Vulnerability
- iDEFENSE Security Advisory 06.22.05: Multiple Vendor Cacti Remote File Inclusion Vulnerability
- Tmobile users site shows other accounts email
- From: Greg Merideth (Forward Technology)
- Re: JBOSS 3.2.2-3.2.7 / 4.0.2 installation path disclosure / config disclosure / version fingerprinting
- Undocumented account vulnerability in Enterasys Vertical Horizon switches
- [ GLSA 200506-20 ] Cacti: Several vulnerabilities
- From: Sune Kloppenborg Jeppesen
- MDKSA-2005:103 - Updated sudo packages fix race condition vulnerability
- From: Mandriva Security Team
- Portcullis Security Advisory 05-013 - VoIP - Asterisk Stack Overflow
- [ GLSA 200506-21 ] Trac: File upload vulnerability
- From: Sune Kloppenborg Jeppesen
- iDEFENSE Security Advisory 06.22.05: IpSwitch WhatsUp Professional 2005 (SP1) SQL Injection Vulnerability
- [ GLSA 200506-22 ] sudo: Arbitrary command execution
- From: Sune Kloppenborg Jeppesen
- [ GLSA 200506-18 ] Tor: Information disclosure
- Local Root exploit (Fedora Core 4)
- From: Florian Strankowski (fs)
- New release of the Auditor Security Collection available at http://www.remote-exploit.org
- Weaknesses in WLAN Session Containment
- Remote Command Execution Exploit for Cacti <= 0.8.6d
- [ECHO_ADV_20$2005] Full path disclosure JAF CMS
- Buffer overflow vulnerability in VERITAS Software Backup Exec Web Administration Console (BEWAC)
- From: NGSSoftware Insight Security Research
- Vulnerability Statements
- long sendmail timeouts let attacker prevent milter quiesce
- [OpenPKG-SA-2005.012] OpenPKG Security Advisory (sudo)
- Re: Local Root exploit (Fedora Core 4)
- Windows SMB Client Transaction Response Handling PoC
- eEye Advisory - EEYEB-200505 - RealPlayer AVI Processing Overflow
- [OpenPKG-SA-2005.011] OpenPKG Security Advisory (shtool)
- iDEFENSE Security Advisory 06.23.05: Veritas Backup Exec Agent CONNECT_CLIENT_AUTH Buffer Overflow Vulnerability
- iDEFENSE Security Advisory 06.23.05: Veritas Backup Exec Agent Error Status Remote DoS Vulnerability
- Veritas Backup Exec Remote Agent NDMLSRVR.DLL DoS Vulnerability: Veritas Backup Exec Remote Agent NDMLSRVR.DLL DoS Vulnerability
- iDEFENSE Security Advisory 06.23.05: Veritas Backup Exec Server Remote Registry Access Vulnerability
- Re: Security Contact for Lyris
- iDEFENSE Security Advisory 06.23.05: RealNetworks RealPlayer RealText Parsing Heap Overflow Vulnerability
- Solaris 10 /usr/sbin/traceroute vulnerabilities
- From: Przemyslaw Frasunek
- Re: [Full-disclosure] Solaris 10 /usr/sbin/traceroute vulnerabilities
- From: Przemyslaw Frasunek
- Re: Firefox Crash??
- [ECHO_ADV_21$2005] MUltiple Vulnarable In ActiveBuyAndSell
- SUSE Security Announcement: sudo (SUSE-SA:2005:036)
- PHP nuke XSS vulnerability
- TSLSA-2005-0030 - multi
- From: Trustix Security Advisor
- Infopop UBB Threads Multiple Vulnerabilities
- From: GulfTech Security Research
- Re: [Full-disclosure] Solaris 10 /usr/sbin/traceroute vulnerabilities
- From: Przemyslaw Frasunek
- Re: Solaris 10 /usr/sbin/traceroute vulnerabilities
- From: David T. Moraski II
- Re: Solaris 10 /usr/sbin/traceroute vulnerabilities
- MDKSA-2005:104 - Updated squid packages fix vulnerability
- From: Mandriva Security Team
- MDKSA-2005:105 - Updated dbus packages fix vulnerability
- From: Mandriva Security Team
- Phishing - feature or flaw
- From: Secure Science Corporation Bugtraq
- Re: Bluetooth SIG Denial of Service vulnerability
- Re: [NGSEC] AntiPharming v1.00 FREE
- From: Ansgar -59cobalt- Wiechers
- Re: PHP nuke XSS vulnerability
- SUSE Security Announcement: RealPlayer remote buffer overflow (SUSE-SA:2005:037)
- Denial of Service Vulnerability in True North Software, Inc. IA eMailServer Corporate Edition Version: 5.2.2. Build: 1051.
- [USN-143-1] Linux amd64 kernel vulnerabilities
- Phishing Solutions (was: Phishing - feature or flaw)
- Nokia Symbian 60 "BLUETOOTH NICKNAME" Remote Restart
- M4DR007-07SA (security advisory): Multiple vulnerabilities in ASP Nuke 0.80
- Re: Local Root exploit (Fedora Core 4)
- [ GLSA 200506-23 ] Clam AntiVirus: Denial of Service vulnerability
- From: Sune Kloppenborg Jeppesen
- Re: Phishing - feature or flaw
- [USN-144-1] dbus vulnerability
- aspnuke is vulnerable to sql injection
- Re: [ECHO_ADV_20$2005] Full path disclosure JAF CMS
- Re: Nokia Symbian 60 "BLUETOOTH NICKNAME" Remote Restart
- Re: Nokia Symbian 60 "BLUETOOTH NICKNAME" Remote Restart
- High Risk Vulnerability in RealPlayer for Windows
- From: NGSSoftware Insight Security Research
- Cross-Site Scripting (CSS) in Hosting Controller All Version and hot fix it hehe ;)
- [Fwd: phpBB 2.0.16 released]
- [USN-145-1] wget vulnerabilities
- Solaris 9/10 ld.so fun
- From: Przemyslaw Frasunek
- Re: [Full-disclosure] Solaris 9/10 ld.so fun
- From: Przemyslaw Frasunek
- Re: [Full-disclosure] Solaris 9/10 ld.so fun
- From: Przemyslaw Frasunek
- Weboot Window Washer Version 6.02.410 Will erase files from your PC
- XSS IN Community forum
- Whitepaper release: Risks of Passive Network Discovery Systems
- Multiple buffer overflows exist in Infradig Systems Inframail Advantage Server Edition 6.0
- Access right escalation / severe permission problems on Raritan Console Servers
- Re: [Full-disclosure] Solaris 9/10 ld.so fun
- Re: Weboot Window Washer Version 6.02.410 Will erase files from your PC
- RE: [Fwd: phpBB 2.0.16 released]
- SQL Injection Exploit for ASPNuke <= 0.80
- MDKSA-2005:106 - Updated spamassassin packages fix DoS vulnerabilities
- From: Mandriva Security Team
- MDKSA-2005:107 - Updated ImageMagick packages fix vulnerabilities
- From: Mandriva Security Team
- RE: [Fwd: phpBB 2.0.16 released]
- Security Advisory - phpBB 2.0.15 PHP-code injection bug
- Cisco Security Advisory: RADIUS Authentication Bypass
- From: Cisco Systems Product Security Incident Response Team
- XOOPS 2.0.11 && Earlier Multiple Vulnerabilities
- From: GulfTech Security Research
- iDEFENSE Security Advisory 06.29.05: Clam AntiVirus ClamAV MS-Expand File Handling DoS Vulnerability
- iDEFENSE Security Advisory 06.29.05: Clam AntiVirus ClamAV Cabinet File Handling DoS Vulnerability
- Auditing Privilged Oracle Passwords - hashattack
- [badroot security] Community link pro web editor: Remote command Execution
- Original imTRBBS(ver1.02) and prior remote command execution
- Re: [Full-disclosure] Solaris 9/10 ld.so fun
- From: Przemyslaw Frasunek
- [ GLSA 200506-24 ] Heimdal: Buffer overflow vulnerabilities
- From: Sune Kloppenborg Jeppesen
- SEC-CONSULT SA-20050629-0
- Windows 2000 SP4 Rollup
- WordPress 1.5.1.2 && Earlier Multiple Vulnerabilities
- From: GulfTech Security Research
- RE: [Full-disclosure] Solaris 9/10 ld.so fun
- Re: Multiple vulnerabilities in Argosoft Mail Server 1.8.7.6
- Oracle Question Slightly OT
- Re: Weboot Window Washer Version 6.02.410 Will erase files from your PC
- [USN-146-1] Ruby vulnerability
- RE: Cisco VPN Concentrator Groupname Enumeration Vulnerability
- From: Dario Ciccarone (dciccaro)
- Re: Oracle Question Slightly OT
- Re: Oracle Question Slightly OT
- Mozilla Multiple Product JavaScript Issue
- From: Kurczaba Associates Advisories
- FreeBSD Security Advisory FreeBSD-SA-05:13.ipfw
- From: FreeBSD Security Advisories
- FreeBSD Security Advisory FreeBSD-SA-05:14.bzip2
- From: FreeBSD Security Advisories
- In-game /ignore crash in Soldier of Fortune II 1.03
- FreeBSD Security Advisory FreeBSD-SA-05:15.tcp
- From: FreeBSD Security Advisories
- Advisory 02/2005: Remote code execution in Serendipity
- Re: Oracle Question Slightly OT
- Re: [Full-disclosure] Solaris 9/10 ld.so fun
Mail converted by MHonArc 2.6.10