|
Colapse all |
Post message
MS04-025 - Ignorance is truly bliss.... 2004-08-05 hellNbak (hellnbak nmrc org) Over the weekend I began writing an information paper on Microsoft Security Bulletin MS04-025 and the three Internet Explorer issues it addressed. The paper slowly went sideways and turned into a large rant low on technical information but relevant about MS04-025, CERT, and other random things in [ more ] [ reply ] Opera: Location, Location, Location 2004-08-05 GreyMagic Software (security greymagic com) GreyMagic Security Advisory GM#008-OP ===================================== By GreyMagic Software, 05 Aug 2004. Available in HTML format at http://www.greymagic.com/security/advisories/gm008-op/. Topic: Location, Location, Location. Discovery date: 19 Jul 2004. Affected applications: ========== [ more ] [ reply ] [ GLSA 200408-04 ] PuTTY: Pre-authentication arbitrary code execution 2004-08-05 Sune Kloppenborg Jeppesen (jaervosz gentoo org) [ GLSA 200408-03 ] libpng: Numerous vulnerabilities 2004-08-05 Sune Kloppenborg Jeppesen (jaervosz gentoo org) [SECURITY] [DSA 536-1] New libpng, libpng3 packages fix multiple vulnerabilities 2004-08-05 Matt Zimmerman (mdz debian org) CORE-2004-0705: Vulnerabilities in PuTTY and PSCP 2004-08-04 CORE Security Technologies Advisories (advisories coresecurity com) MDKSA-2004:079 - Updated libpng packages fix multiple vulnerabilities 2004-08-04 Mandrake Linux Security Team (security linux-mandrake com) Re: CVS woes: .cvspass 2004-08-04 Greg A. Woods (woods weird com) [ On Thursday, July 29, 2004 at 16:30:07 (+0300), Delian Krustev wrote: ] > Subject: Re: CVS woes: .cvspass > > On Tuesday 27 July 2004 23:20, Greg A. Woods wrote: > > Anyone using the CVS pserver mechanism for anything other than totally > > anonymous access gets only what they deserve. > > brr, d [ more ] [ reply ] GoScript Remote Command Execution 2004-08-04 Francisco Alisson (dominusvis click21 com br) GoScript Remote Command Execution Version verified: 2.0 Author: Pete Stein http://www.slack.net/~pete/perl GoScript v2.0 allow remote commando execution as we can see below: http://www.server.com/go.cgi?|id| http://www.server.com/go.cgi?artarchive=|id| May be possible another methods [ more ] [ reply ] Clear text password exposure in Datakey's tokens and smartcards 2004-08-04 vuln hexview com (1 replies) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Clear text password exposure in Datakey's tokens and smartcards Classification: =============== Level: [LOW]-med-high-crit ID: HEXVIEW*2004*08*03*1 Overview: ========= Datakey (http://www.datakey.com) delivers smartcard and token-based authentication [ more ] [ reply ] Re: [Full-Disclosure] Clear text password exposure in Datakey's tokens and smartcards 2004-08-04 Lionel Ferette (lionel ferette belnet be) (1 replies) Re: [Full-Disclosure] Clear text password exposure in Datakey's tokens and smartcards 2004-08-04 Toomas Soome (Toomas Soome microlink ee) Bug@thttpd 2004-08-04 CoolICE (CoolICE China com) Application: thttpd Vendors: http://www.acme.com/software/thttpd/ Version: 2.07 beta 0.4 10dec99 Platforms: Windows Bug: Directory Traversal Date: 2004-08-04 Author: CoolICE e-mail: CoolICE#China.com ================ Content: in libhttpd.c: int httpd_parse_request( httpd_conn* hc ) [...] if [ more ] [ reply ] [ GLSA 200408-02 ] Courier: Cross-site scripting vulnerability in SqWebMail 2004-08-04 Thierry Carrez (koon gentoo org) [OpenPKG-SA-2004.035] OpenPKG Security Advisory (png) 2004-08-04 OpenPKG (openpkg openpkg org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ________________________________________________________________________ OpenPKG Security Advisory The OpenPKG Project http://www.openpkg.org/security.html http://www.openpkg.org openpkg-security (at) openpkg (dot) org [email concealed] [ more ] [ reply ] New MyDoom variant 2004-08-04 albatross tim it (1 replies) The SANS Institute reports a new variant of MyDoom in the wild actually not recognized by AV vendors: New MyDoom On The Loose Initial analysis (we will update as we know more): Currently (16:00GMT), signatures are not yet available. UPDATED (17:00GMT): - Signatures are starting to com [ more ] [ reply ] |
|
Privacy Statement |
They are intercepting DNS requests and returning their
own replies. It could be something malicious, but it could
just as well be the ISP saving bandwidth by caching DNS queries.
If they cache DNS queries they probably cache www queries as
well. This is very comm
[ more ] [ reply ]