To: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED]
__
SCO Security Advisory
Subject:Linux: integer overflow vulnerability in XDR/RPC routines
Advisory number:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
++
| EnGarde Secure Linux Security Advisory March 20, 2003 |
| http://www.engardelinux.org/ ESA-20030320-010
-
Red Hat Security Advisory
Synopsis: New kernel 2.2 packages fix vulnerabilities
Advisory ID: RHSA-2003:088-01
Issue date:2003-03-20
Updated on:2003-03-20
Product: Red
David Mirza Ahmad
Symantec
sabbe dhamma anatta
0x26005712
8D 9A B1 33 82 3D B3 D0 40 EB AB F0 1E 67 C6 1A 26 00 57 12
-- Forwarded message --
-BEGIN PGP SIGNED MESSAGE-
- ---
Title: Flaw In ISA
Sorcerer Update Advisory
Tap Into the Source
Source Name:glibc-2.3.2
Advisory ID:SORCERER2003-03-20-2
Date:
*** There is an attachment in this mail. ***
_
---
[ATTITUDEX.COM]
http://www.attitudex.com/
---
_
Select your own custom email
Sorcerer Update Advisory
Tap Into the Source
Source Name:linux-2.4.20
Advisory ID:SORCERER2003-03-19
Date:
iProyectos Security Advisory:
XSS Bugs in osCommerce
1. Problem description.
2. Risk
3. Solution
4. Manual fix
5. About iProyectos
1. Problem description:
osCommerce is a widely installed open source shopping e-commerce
: Affected Packages:Corrected Packages:
OpenPKG CURRENT = mutt-1.4i-20030103 = mutt-1.4.1i-20030320
OpenPKG 1.2 = mutt-1.4i-1.2.0= mutt-1.4i-1.2.1
OpenPKG 1.1 = mutt-1.4i-1.1.0= mutt-1.4i-1.1.1
Dependent Packages: none
Description:
According
Verified on Windows XP Pro SP1. Crashes Explorer everytime.
/Alex Kiwerski
On a side note, if you browse to the folder through an application and the
application is set to view all file types it will crash the application
instead of explorer. I have tested this with Windows XP Pro SP1 in
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
IRM Security Advisory No. 003
Safeboot PC Security User Emuneration Vulnerability
Vulnerablity Type / Importance: User Enumeration / Medium
Problem discovered: Fri, 31 Jan 2003
Sorcerer Update Advisory
Tap Into the Source
Source Name:krb5-1.2.7
Advisory ID:SORCERER2003-03-20-1
Date:
***
Subject : IBM Tivoli Firewall Security Toolbox (TFST) remote buffer
overflow vulnerability
Version : Tivoli Firewall Toolbox version 1.2
Platform: All supported platforms
Core Security Technologies Advisory
http://www.coresecurity.com
Vulnerability in Mutt Mail User Agent
Date Published: 2003-03-20
Last Update: 2003-03-19
Advisory ID: CORE-20030304-02
Bugtraq ID: 7120
CVE CAN: None currently
Packages: Corrected Packages:
OpenPKG CURRENT = openssl-0.9.7a-20030317 = openssl-0.9.7a-20030320
OpenPKG 1.2 = openssl-0.9.7-1.2.2 = openssl-0.9.7-1.2.3
OpenPKG 1.1 = openssl-0.9.6g-1.1.2= openssl-0.9.6g-1.1.3
Affected Releases: Dependent Packages
Opera Software released Opera 6.06.
However, the security hole that we had released on Feb 9th, 2003
(Opera Username Buffer Overflow Vulnerability
[http://www.securityfocus.com/archive/1/311194])
has not been fixed yet. Opera 6.06 still has this security hole,
to which we should pay heed.
Here
Security Corporation Security Advisory [SCSA-011]
PROGRAM: XOOPS
HOMEPAGE: http://www.xoops.org/
VULNERABLE VERSIONS: v2.0 (and prior ?)
17 matches
Mail list logo