Incidents
Re: Increased activity on port 110 Feb 27 2007 07:29AM
joakim berge gmail com (1 replies)
Thanks for the quick response.
The activity I see, is not directly aimed at windows servers. Looks more like a botnet sweep. The majority of source addresses are from the US.

The latest MailEnable vulnerability I found was: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6605

------------------------------------------------------------------------
-
This list sponsored by: SPI Dynamics

ALERT: "How a Hacker Launches a SQL Injection Attack!"-
SPI Dynamics White Paper
It's as simple as placing additional SQL commands into a Web Form input
box giving hackers complete access to all your backend systems!
Firewalls and IDS will not stop such attacks because SQL Injections are
NOT seen as intruders. Download this *FREE* white paper from SPI Dynamics
for a complete guide to protection!

https://download.spidynamics.com/1/ad/sql.asp?Campaign_ID=70160000000CiN
E
------------------------------------------------------------------------
--

[ reply ]
Anybody recognize this Solaris compromise? Apr 13 2007 06:46PM
David Gillett (gillettdavid fhda edu) (2 replies)
Re: Anybody recognize this Solaris compromise? Apr 13 2007 09:30PM
Axel Pettinger (api worldonline de)
Re: Anybody recognize this Solaris compromise? Apr 13 2007 08:50PM
Jamie Riden (jamie riden gmail com) (2 replies)
Re: Anybody recognize this Solaris compromise? Apr 13 2007 09:43PM
Tim (tim-forensics sentinelchicken org)
Re: Anybody recognize this Solaris compromise? Apr 13 2007 09:42PM
Matthew T. Fata (matt credibleinstitution org)


 

Privacy Statement
Copyright 2010, SecurityFocus