SpearHead Security
--
Subject : URL encoding
Advisory number : 06-01-0001
Issue date : 6-5-2001
Impact: NetGAP 200 and 300 devices configured as internet gateways
Background
SpearHead's NetGAP is a security device which
[ Advisory for Pragma InterAccess ]
[ Pragma InterAccess is made by Pragma Systems]
[ Site: http://www.pragmasys.com ]
[ by nemesystm of the DHC ]
[ (http://dhcorp.cjb.net - [EMAIL PROTECTED]) ]
[ ADV-0119
Novell Groupwise has similar problems with displaying the address book
name instead of the address (though Groupwise is *not* vulnerable to the
same attack that forces the spoofed entry into the address book). It would
be nice if these email systems would always display both the name and the
Michel Kaempf [EMAIL PROTECTED] writes:
-[ Vudo - An object superstitiously believed to embody magical powers ]-
--[ Michel MaXX Kaempf [EMAIL PROTECTED] ]--
[ Copyright (C) 2001 Synnergy Networks ]
--[ 0x00 - Introduction
Some side bits of information.
Megyer Laszlo [EMAIL PROTECTED] probably said:
accept.c, line 2506:
else if (smtp_reply != NULL) moan_smtp_batch(NULL, smtp_reply);
while moan_smtp_batch is like this:
moan_smtp_batch(char *cmd_buffer, char *format, ...)
So when smtp_reply
On Tue, 5 Jun 2001, 3APA3A wrote:
Author : 3APA3A [EMAIL PROTECTED]
Affected software : Netscape 4.7x All Platforms
Vendor URL : http://www.netscape.com
SECURITY.NNOV advisories: http://www.security.nnov.ru/advisories
Background:
Netscape Messanger
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
CONECTIVA LINUX SECURITY ANNOUNCEMENT
- --
PACKAGE : gnupg
SUMMARY : Fix for two gnupg
There is a security bug in the Internet Explorer 5 (I haven't tested it on
other browsers).
It is possible to read some textfiles (others than cookies) from the
client's hard disk.
If there is for example in the directory 'C:\WINNT' a textfile 'test.txt'
with content:
us=stefaan
passwd=mypasswd
Thomas Dullien wrote:
It would appearat first glance that RSX uses the same technique as PAX.
Naturally, the PAX and RSX teams should confer to make a definitive
statement on similarities and differences.
Just for the record, the technique bears no similarity. PAX provides
real,
Paul Starzetz wrote:
One don't even need code in the libc. There may also be code in regular
code 'segments' mmapped from the binary valuable for jumping into them.
True. libc is just the common point of reference, because nearly all programs
link to it, so it's assured to be there.
/* - su-wrapper.c - */
/*/
/* /usr/sbin/su-wrapper(su-wrapper 1.1.1) local root exploit.*/
/* */
/* Package Description:
The following is a Security Bulletin from the Microsoft Product Security
Notification Service.
Please do not reply to this message, as it was sent from an unattended
mailbox.
-BEGIN PGP SIGNED MESSAGE-
-
-
Red Hat, Inc. Red Hat Security Advisory
Synopsis: Updated GnuPG packages available
Advisory ID: RHSA-2001:073-04
Issue date:2001-05-30
Updated on:2001-06-07
Product:
13 matches
Mail list logo