-BEGIN PGP SIGNED MESSAGE-
Dan,
While I agree with you, it will be interesting to see if this
increases or decreases the number of security-related bug reports on
windows tools / applications / operating systems, I'm not sure I
really agree with the ... who was it... Meta Group?
-BEGIN PGP SIGNED MESSAGE-
=
FreeBSD-SA-01:29 Security Advisory
FreeBSD, Inc.
Topic: rwhod
-BEGIN PGP SIGNED MESSAGE-
=
FreeBSD-SA-01:28 Security Advisory
FreeBSD, Inc.
Topic: timed
-BEGIN PGP SIGNED MESSAGE-
=
FreeBSD-SA-01:23 Security Advisory
FreeBSD, Inc.
Topic: icecast
Hi Fabio,
Thank you for your detailed analysis, although, we certainly would
appreciate the opportunity to review this prior to public posting. We
prefer to minimize misinformation, as it can cause people to make decisions
based on inaccurate information, which is never a good thing.
We're
Using strobe 1.03, I was able to crash Gnome (Ximian) and KDE2 window
managers on Solaris 7 (running patch level 8) and Solaris 8 (running patch
level 5). Ximian has been notified of the issue. I have the core dump if
someone would like to see it as it is too big to send to the list. Both of
the
To reply to all of these messages... Patching FormMail to check the referrer
is NOT ample security. It takes about 30 seconds to write a Perl script to
POST to FormMail.pl with a faked HTTP_REFERRER field.
Probably the only useful solution is to hack the script to use an array of
valid email
-BEGIN PGP SIGNED MESSAGE-
=
FreeBSD-SA-01:27 Security Advisory
FreeBSD, Inc.
Topic: cfengine
Hi,
I have attempted to log in as a print server and could not log in.
I am running NW5.1 SP1a.
I am niot using NDPS and tried all of the print servers with no password. is
there a trick to logging in as a print server?
thanks,
adrian
On 12 Mar 01, at 8:17, Kain wrote:
On Thu, Mar 08,
Here's Martin's response to my question about what Apache versions have that
hole:
--- Forwarded Message
Date: Tue, 13 Mar 2001 09:51:52 +0100
From: Martin Kraemer [EMAIL PROTECTED]
Subject: Re: [ANNOUNCE] Apache 1.3.19 Released
Message-ID: [EMAIL PROTECTED]
On Mon, Mar 12, 2001 at
There is one thing that might be over looked here, or stated where I haven't read.
I have tested the same login via a printer name and no pass. I've had high school
students do this and find out they can write to the print queue directory. Needless
to say they filled up the SYS volume with
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
SecurityFocus.com
http://www.securityfocus.com
Vulnerability Report For Internet Explorer
and Services for Unix 2.0 Telnet Client
Date Published: 13 March 2001
Advisory
Following the announcement yesterday about buffer overflow
vulnerabilities in Icecast, Andreas Hasenack
[EMAIL PROTECTED] identified several more likely buffer
overflow vulnerabilities. Matt Messier [EMAIL PROTECTED] took a
look, and determined that at least some of them are definitely
remotely
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
__
Caldera Systems, Inc. Security Advisory
Subject:several buffer overflows in imap, ipop2d and ipop3d
Advisory number:
14 matches
Mail list logo