-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-
Debian Security Advisory DSA-1726-1 secur...@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
February 25, 2009
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2009:055
http://www.mandriva.com/security/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco Security Advisory: Cisco Unified MeetingPlace Web Conferencing
Authentication Bypass Vulnerability
Advisory ID: cisco-sa-20090225-mtgplace
Revision 1.0
For Public Release 2009 February 25 1600 UTC (GMT
==
Secunia Research 25/02/2009
- ksquirrel-libs Radiance RGBE Buffer Overflows -
==
Table of Contents
Affected Software
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco Security Advisory: Multiple Vulnerabilities in the Cisco ACE
Application Control Engine Module and Cisco ACE 4710 Application
Control Engine
Document ID: 109450
Advisory ID: cisco-sa-20090225-ace
http://www.cisco.com/warp/public/707/cisco-sa
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco Security Advisory: Cisco ACE Application Control Engine Device
Manager and Application Networking Manager Vulnerabilities
Advisory ID: cisco-sa-20090225-anm
http://www.cisco.com/warp/public/707/cisco-sa-20090225-anm.shtml
Revision 1.0
For
==
Secunia Research 25/02/2009
- SHOUTcast DNAS Relay Server Buffer Overflow -
==
Table of Contents
Affected Software.
Digital Security Research Group [DSecRG] Advisory #DSECRG-09-008
--link to original advisory --
http://www.dsecrg.com/pages/vul/show.php?id=81
Application:JOnAS (Java Open Application Server)
Versions Affected: JOnA
Apple Safari 4 Beta feeds: URI NULL Pointer Dereference Denial of
Service Vulnerability
Date:Feb 25 2009
Class:Input Validation Error
Local:Yes
Remote:Yes
Vulnerable Versions:
* Apple Safari 4 (528.16) Public Beta
Note: MacOS X versions not tested.
Description:
Apple Safari i
BLUE MOON SECURITY ADVISORY 2009-03
===
:Title: Multiple vulnerabilities in OpenSite v2.1
:Severity: Critical
:Reporter: Blue Moon Consulting
:Products: OpenSite v2.1
:Fixed in: to be fixed in 3.0
Description
---
OpenSite is an Open Source Content Manage
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c01601492
Version: 1
HPSBMA02384 SSRT071465 rev.1 - HP OpenView Network Node Manager (OV NNM),
Remote Unauthorized Access, Denial of Service (DoS)
NOTICE: The information in this Security Bulle
==
Secunia Research 25/02/2009
- Orbit Downloader Long URL Parsing Buffer Overflow -
==
Table of Contents
Affected Software.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2009:054
http://www.mandriva.com/security/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- -= pPIM Multiple Vulnerabilities =-
Version Tested: pPIM 1.0
Vendor notified
Full details can also be found at http://www.lampsecurity.org/node/18
Author: Justin C. Klein Keane
Description
pPIM (http://www.phlatline.org/index.php?page=prod-ppim)
On Mon, 23 Feb 2009 i...@exposit.co.uk wrote:
> The front-end of the application is composed of COM components that plug
> into the web browser. [...]
> In order to optimize the interaction speed of the application, a cache
> folder is created on the client machine. [...] Indeed, those files are
>
Reproduceable under Gentoo with Proftpd 1.3.1 - But not under debian
etch with Proftpd 1.3.0
The newst Proftpd in Gentoo is 1.3.2-rc2, but there seems to be an
Mysql-related patch in the build-file now. I also tested vanilla
1.3.2-rc4 and 1.3.2, with all three the sql-injection is not
reproduceabl
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2009:053
http://www.mandriva.com/security/
17 matches
Mail list logo